Home Blog

Five Niche Parenting Markets And How To Reach Them Beyond The Mommy Blog

Five Niche Parenting Markets And How To Reach Them Beyond The Mommy Blog

The “mommy blogging” movement began in the early 2000s when internet conversations amongst new moms gave much-needed support and guidance. I had my blog before starting my agency, as did the ladies who would later become my business partners. We used this relatively new medium to discuss our daily highs and lows and build essential bonds that have lasted to this day in many situations.

The “mother blog” has grown into a multibillion-dollar business. And it’s no surprise: according to various studies, American mothers control anywhere from 64 percent to 85 percent of household spending. In 2018, it was predicted that women held as much as $40 trillion in consumer purchasing throughout the globe. While today’s broad parenting audiences are still seeking issues that will always connect with anybody raising small children (for example, first meals, toilet training, and sleepless nights), many parenting makers are increasingly focusing on specialization.

Today’s parenting influencers provide the perfect collaboration opportunity for marketers wishing to access these highly focused, highly engaged audiences. Not only can they talk to the specialist themes that their followers are interested in, but their shared experiences also have the authenticity that customers react to. Here’s how you use parental influencers to reach five highly targeted markets:

  1. Families of Military Personnel

Active-duty troops, reservists, veterans, and their families have similar characteristics: they are often relocated, stationed far away from loved ones, and have a close-knit group of friends and neighbors.

According to a survey, word-of-mouth recommendations and evaluations are critical in this sector, particularly when they come from a reliable source.

Consider influencer marketing efforts that include coupons or discounts and promotions focusing on travel, vacation, or summer relocation. Authentic content from military influencers that understand the community and its needs will ring true in this market, seeking more than lip service.

  1. Consumption

Food-focused parenting producers cover a wide range of themes and recipes on their platforms, and many are accessible for sponsored content, recipe creation, photography, and brand ambassadorship.

These influencers’ material often includes a parenting component, such as solid food introductions or coming up with nutritious, innovative snack ideas. They’re perfect for marketing food products, kitchen gadgets, takeout (for those evenings when everyone’s too tired to cook! ), grocery stores, and more. Sponsored recipes and material based on family rituals, holidays, parenting experiences (getting kids to eat veggies, for example), and entertaining are all excellent choices for this area.

For example, our firm recently completed a campaign for Stonyfield that included a millennial parent blogger’s piece titled “5 Ways to Get Your Child Active This Spring.” Her material contained bright, pinnable visuals and her advice for concentrating on the exercise, which incorporated the brand’s healthy on-the-go snack message.

  1. Education at home

Homeschooling is increasing, with an estimated 3.5 million children enrolled each year. More than home education items, homeschooling parents are interested in life experiences, unique learning methods, and family-first issues in general.

Brands can attract homeschooling audiences by weaving advertising into engaging tales, guidance, activities, and suggestions. Consider sponsoring printables, a summer bucket list, DIY instructions, or recipes that are helpful year after year.

  1. Saving Money/Couponing

According to PaydayNow, While budget-conscious parenting influencers may not immediately spring to mind as a sponsorship partner, their enthusiasm and highly engaged audiences are ideal for advertising rewards programs, coupons/discounts, financial services, or any product with a money-saving advantage.

Brands could consider Family-oriented subjects with the actual value for consumers: a top ten list for saving money over the holidays, how to vacation on a budget, back-to-school shopping under $100, and so on. One frugal-focused influencer, for example, helped promote FreeShipping.com with a holiday-themed article on saving money by utilizing the client’s cash-back program for a campaign we executed with FreeShipping.com.

  1. Handicraft/DIY

Their diversity only equals do-it-yourself parenting gurus’ inventiveness and inspiration. This thriving sector provides infinite options for brand collaborations, from professional designers to home craft aficionados.

Videos and lessons and before and after photos have shown to be quite effective in this market. Because Pinterest is one of the most popular places to look for this sort of material, make sure your campaign contains eye-catching photos with big, legible text and your brand URL, scaled to Pinterest’s ideal image ratio (2:3). (Canva is a tool that many of our influencers use to find and customize Pinterest-ready layouts.)

The topics covered by today’s parenting creators range from fashion to health to vacation. Regardless of the theme, they include more than just the stereotypical “mom” image: men, parents of color, LGBTQ+, mixed and adoptive families are all part of this vibrant content production. Content patterns will change as platforms expand, but the essential aspect of parents bonding over similar interests will stay the same. Brands that provide relevant, compelling information to assist in establishing such relationships will succeed.

Founder Series: Top Tips for Protecting Your Ideas | Orrick, Herrington & Sutcliffe LLP


Orrick’s Founder Series offers monthly advice to UK startups on key considerations at each stage of their life cycle, from incorporating a business to possible exit strategies. The series is authored by members of our market-leading London Technology Companies Group (TCG), with contributions from other members of the practice. Our Band 1-rated London TCG team closed over 310 growth financings and tech M&A deals totaling US$26 billion in 2021 and led the European venture capital tech market for 26 consecutive quarters (PitchBook , Q2 2022). The First payment provided advice to founders on the process of setting up a limited liability company, the second installment provided advice to the founders on building their team, and the third installment provided advice to founders on motivating their team.

Beyond its employees (which we explored in the last two episodes of the series), a company’s intellectual property (or “IPs“) is often its most valuable asset, especially for companies in the technology sector. It is crucial to ensure that you own the rights to your intellectual property and to take the appropriate measures to protect your intellectual property rights. In this article, members of our Technology Transactions group offer advice on ten key issues to consider when looking to protect your intellectual property.

  1. Ownership of employee work product. As pointed out in the second installment of the series, startups should seek to put in place written contracts with their founders and employees, which provide for the transfer to the company of all intellectual property created by them. While the general position in English law is that intellectual property rights created by an employee in the course of their employment automatically vest in the company, the establishment of a stand-alone written agreement to assign intellectual property increases clarity and reduces the risk of future disputes over intellectual property ownership.
  2. Ownership of contractors’ work product. The general rule that applies to employees does not apply to third-party contractors and freelancers. Intellectual property created by third parties will belong to those third parties unless properly assigned to Company under written agreement. You must therefore enter into a subcontract containing appropriate intellectual property attribution provisions with any third-party subcontractor that the company engages to develop its intellectual property.
  3. Keep track of your IP development. It is important to keep traces of drawings and drafts (ideally signed, dated and marked “confidential”) which bear witness to the development of your intellectual property. If a dispute arises and you need to enforce your rights against someone using the same or a similar IP address, these records may be helpful in resolving the dispute. If you choose to register your IP, complete records are also helpful when preparing your IP registration application.
  4. Brands MT / ®. Trademarks or trademarks are the signs used by companies to distinguish their products or services, such as names, logos, slogans and designs. Such a mark can be protected by UK trade mark registration and can be renewed indefinitely in 10 year increments. Registering your marks gives you a monopoly over them in the territories where they are registered for the goods and services covered by the registration (provided these marks are actively used). Registering your marks also makes it easier to take enforcement action against third parties who attempt to copy your marks or use marks very similar to yours. A trademark can be licensed or assigned by its owner and is therefore a valuable business asset. Although you may still be able to file claims regarding your unregistered trademark rights, this relies on the common law doctrine of “passing off” and can be a long, difficult and potentially expensive process.
  5. Don’t confuse trademark registration with other filings. As mentioned in our First payment, it is a common misconception that registering a name with Companies House or a domain name for a website grants trademark protection. The processes are unrelated and the marks must be registered separately with the appropriate intellectual property office(s).
  6. Copyright ©. Software (among other creative works) may be copyrighted. Unlike trademark rights, in the UK copyright protection arises automatically when an eligible work is first created. Copyright protection gives the owner the right to prevent others from copying and improperly profiting from an original work for up to 70 years from the death of its author. You may be able to use the copyrighted work of others under license, but it is important to understand the terms of that license.
  7. Beware of open source software (OSS). Some licenses provide that if you combine the OSS with your proprietary (closed source) software, you are obligated to distribute your software on the same terms – usually for free – so it is essential that you understand the license terms of any OSS you you use.
  8. International intellectual property protection. If you trade overseas (or intend to do so in the future), you may want to consider obtaining intellectual property protection in those jurisdictions. This will help protect your intellectual property as you continue to expand globally and will be something investors will keep an eye on.
  9. Use Non-Disclosure Agreements (NDAs). NDAs are contracts that impose confidentiality obligations on parties to ensure that information exchanged between them remains confidential. Using NDAs is an effective way to protect against leaking or sharing your company’s confidential information (including intellectual property, such as trade secrets and proprietary source code) with competitors. NDAs can be used at different stages of a company’s growth, including with third parties you provide access to new products and designs at the R&D stage of IP development. NDAs can also be put in place before entering into in-depth discussions with potential customers and suppliers and with potential investors when raising funds (although early-stage investors in the UK may be reluctant to conclude NDAs for fundraising purposes).
  10. Protect your IP in contracts. Contracts with customers and suppliers should contain intellectual property ownership and licensing provisions of appropriate scope. Here are some of the key considerations in this context:
  • Clients: Strong provisions are required in contracts with customers who use company-owned intellectual property so that you can retain control and ownership of the intellectual property. The terms must clearly state the scope of the license granted to the customer, including whether it is exclusive, sublicensable, transferable and/or limited in time or geographically.
  • Suppliers: If your startup uses the IP of another company, this must be formalized by a written license or an assignment of IP. Unauthorized use of a third party’s intellectual property rights may result in an infringement action by the third party owner against your business.

NeuShen Therapeutics closes pre-A funding with approximately $20 million

  • Closing of the pre-A financing round led by LAMPAM Capital
  • Dual in-house small molecule discovery and AAV-based gene therapy platform targeting neurological and psychiatric disorders

SHANGHAI, Sept. 29, 2022 /PRNewswire/ — NeuShen Therapeutics, Inc., a biotechnology company focused on developing innovative treatments for central nervous system (CNS) disorders with dual platforms of AAV-based gene therapy and small molecule discovery, announced today the closing of a pre-A series funding of approximately $20 million led by LAPAM, a China-based venture capital firm. NeuShen was founded by a group of industry executives who have extensive global experience in central nervous system (CNS) drug development. The new capital will be used to expand the team and catalyze CNS drug discovery internally in the US and China.

“The success of this fundraising is a testament to our team’s ability to accomplish CNS drug development and re-ignite our discovery engine to build a pipeline with AAV-based small molecule and gene therapy programs. said Joan Shen, MD, Ph.D., CEO and Founder of NeuShen. “CNS disease is an area with huge unmet needs. Our company has had a very clear goal from day one, which is to develop new therapies to relieve the burden of patients with CNS disorders. months, we have developed an achievable R&D strategy and established a substantial core team with experienced CNS drug hunters Significant progress has been made in building the internal small molecule pipeline and new AAV gene therapy programs In addition, multiple collaborations and partnerships were discussed and established.

CNS disorders are increasingly recognized as leading causes of death and disability worldwide, while diagnosis and treatment have lagged far behind. Urgent action is needed to meet the growing challenges. “By bringing breakthroughs and lessons learned from other disease targets such as ophthalmology, oncology and hematology, we believe that AAV-based gene therapy represents a new opportunity in the treatment of brain disorders. SNC. My colleagues and I at the Horae Gene Therapy Center look forward to working with Neushen to explore these treatment opportunities. NeuShen’s team’s experiments in neuroscience will be key to achieving this,” noted Dr. Guangping Gao , Professor, Director, Horae Gene Therapy Center, UMass Chan Medical School Collaborations between NeuShen and UMass are currently under discussion, which will include several CNS gene therapy projects.

“We are very pleased to partner with NeuShen from the beginning. Lapam Capital has a strong commitment to healthcare, and we believe the CNS therapeutic area will attract more investment, given the huge unmet needs and scientific advancements in the field. We highly value Dr. Joan Shen and her management team for their expertise. Lampam Capital is confident in NeuShen’s ability to be a leading player in the development of innovative therapies for CNS diseases. said Mr. Zhihua Yu, Managing Director of Lapam Capital.

“Dr. Shen has brought together a preeminent group of scientists, clinicians and drug developers to build a global biotech developing new drugs for unmet needs in CNS therapeutic areas. TTM Capital is delighted to support Neushen in building of its multi-modality pipelines to help patients around the world,” said Ms. Lilly Zhang, Founder and Managing Partner of TTM Capital.

About NeuShen Therapeutics

NeuShen Therapeutics is a biotechnology company focused on the research and development of innovative drugs to treat CNS disorders, applying dual research platforms including AAV-based gene therapy and the discovery of small molecules. With operations in Shanghai, China and Boston, MA, NeuShen has a world-class team and is honored to be advised by an outstanding Board of Directors and Scientific Advisory Board.


About Lapam Capital

Beijing-based Lapam Capital is one of China’s leading healthcare venture capital firms. Lapam currently manages five RMB funds and one USD fund, with over RMB 10 billion under management. Lapam Capital focuses on investing in fast-growing early to mid-stage companies that have innovative pharmaceuticals and medical devices. It has invested in approximately 60 biopharmaceutical companies and 10 medical device companies to date, including Betta Pharma, RemeGen Co. Ltd., Clover Biopharmaceuticals, Yahong Meditech, Stemirna Therapeutics, Binhui Biotech, ImmuneOnco Biopharmaceuticals, Biostar Pharmaceuticals, Aibo Medical Robot Co. .Ltd. .and many other companies with great potential. Lapam Capital has a professional investment team with more than 20 years of R&D and management experience in the international and domestic biopharmaceutical industry and can provide comprehensive value-added support to invested companies.

About TTM Capital

TTM Capital is an investment company specializing in the healthcare sector in China and around the world. We focus on early-stage and growth-stage companies, including the pharmaceutical, biotech and medical technology sub-sectors.

The TTM Capital team is comprised of seasoned, globally minded investment professionals with extensive industry experience, who work together to deliver superior and consistent returns for the firm’s investors. We are committed to accumulating industry experience over time, with the goal of developing an ecosystem of expertise to build transformative healthcare businesses.

Quote Show original content to download multimedia:https://www.prnewswire.com/news-releases/neushen-therapeutics-closes-pre-a-financing-with-20m-301636539.html

SOURCE NeuShen Therapeutic

October 2022 – Minnesota Women’s Press


Post-school shooting guide, technical shortcomings

The United States has a recovery guide for school shootings

Principals who have been affected by school shootings have created a recovery guide. As retired Columbine superintendent Frank DeAngelis said, superintendents across the country are reaching out to traumatized educators who are also part of “a club no one wants to be a member of.” The Principal Recovery Network, a group of current and former school leaders who have experienced gun violence at school, has created a 16-page guide on what to consider before reopening a school and how to look after the mental health of students and staff.

Source: the74million.org

Lack of technological education

Data source: code.org/promote/mn

Only 24% of high schools in Minnesota offer computer programs. There are currently 13,327 IT jobs open in Minnesota, offering an average salary of $92,494. Less than a quarter of Minnesota’s 1,806 AP computer science tests were taken by female students in 2020; most of the tests were taken by white men.

Source: code.org/promote/mn

Good news for bad news in schools

There are 103 schools in Minnesota that have graduation rates below 67%. The good news: The Minnesota Department of Education is expanding the Collaborative Minnesota Partnerships to Advance Student Success (COMPASS) program. This will help teachers and school leaders improve literacy and math rates, as well as assess school climate and mental health.

Source: education.mn.gov

Governor Hochul Announces Long Island Investment Fund’s First Prize of $10 Million to Feinstein Institutes for Medical Research


Included as part of Governor Hochul’s enacted budget for fiscal year 2023, the Long Island Capital Investment Fund focuses on projects that will support and grow the regional economy, improve communities, and have lasting economic impacts on Long Island. . The $10 million award from the Fund to the Feinstein Institutes for Medical Research will support the renovation and construction of 26 new, two-story, state-of-the-art research labs as well as the hiring of 10 new principal investigators and 60 research staff. These upgraded labs will advance research efforts to develop new therapies for cancer, diabetes, obesity, lupus and other conditions

Empire State Development President, CEO and Commissioner Hope Knight said: “The Long Island Investment Fund represents a strategic investment to further strengthen the region as a powerhouse of the life sciences industry, which is an important driver of New York State’s economy. The Feinstein Institutes play a vital role in life-changing medical and therapeutic discoveries. that can improve our everyday life. ESD is proud to support the growth of visionary life science companies like the Feinstein Institutes, whose work is crucial to building a healthier and stronger Empire State.

Empire State Development Council Chairman Kevin Law said: “Under Governor Hochul’s leadership, New York is making smart investments to catalyze economic growth on Long Island. The Long Island Investment Fund will help the region prosper and strengthen New York’s leadership in the global innovation economy. The Fund’s $10 million award to the Feinstein Institutes reaffirms our commitment to the growing life sciences ecosystem that will support the advancement of breakthrough medical discoveries. »

The Feinstein Institutes are the world’s scientific home for bioelectronic medicine, a burgeoning field of science that uses technology to read and modulate electrical activity in the body’s nervous system. The new, modernized laboratories of the Institute of Bioelectronic Medicine will support discoveries to find cures that will reduce the need for drugs, reduce painful side effects and restore life to those who suffer. Early discoveries have emerged from his labs, opening up new treatment options for patients with diseases such as rheumatoid arthritis, diabetes, paralysis and even cancer. Clinical studies in bioelectronic medicine have already shown results with paralyzed people: recent research using a spinal cord stimulation patch on the skin has allowed participants to regain their ability to move and feel.

The renovation of the Institute of Bioelectronic Medicine includes a wet laboratory space, several tissue culture rooms, cold rooms, workstations for researchers and a brand new biosafety level 3 facility to allow new research on the infectious diseases and other complex viruses, such as COVID -19. The expansion also supports the hiring of 13 new Principal Investigators and 100 new research staff.

Feinstein Institutes President and CEO Dr. Kevin Tracey said: “At the Feinstein Institutes, scientific advances are made every day. With the right facilities and tools, we can help advance those advances even further. We are grateful to the Governor and Empire State Development for funding our new space, and we look forward to continuing our groundbreaking medical research that will benefit our communities on Long Island and beyond.”

Northwell Health President and CEO Michael Dowling said: “This new facility and its resources, made possible by Governor Hochul and Empire State Development, will allow our researchers at the Feinstein Institutes – the home of Northwell research and the global scientific home of bioelectronic medicine – to continue their mission. discovering new treatments to cure disease and improve the health of the communities we serve.”

Local stakeholders sought to guide water planning in South Carolina’s Saluda River Basin


September 26, 2022

The Middle Saluda River flows quietly under a bridge in Jones Gap State Park in northern Greenville County. Two public meetings are being held – one in Columbia and one in Greenville – to discuss surface water management in the Saluda River Basin over the next 50 years. (Photo: SCDNR/Greg Lucas)

The SC Department of Natural Resources (SCDNR) has announced the dates for two public meetings to provide citizens with an overview of a new water planning framework that will guide surface water management in the river basin. Saluda over the next 50 years.

The meetings will also serve as venues to engage volunteers interested in serving on a board that will develop and implement the plan for the Saluda River Basin. Meetings are planned in Colombia at Saluda Shoals Park on Tuesday, November 1 and in Greenville at the Roper Mountain Science Center on Thursday, November 3. Both meetings will take place from 6:00 p.m. to 8:00 p.m.

In March 2018, the SCDNR established the State Water Planning Process Advisory Committee to help draft a “framework” document that will guide the development of individual river basin plans for each of the eight major basins. state rivers. The Planning Process Advisory Committee includes representatives from a wide range of organizations, including SC’s Department of Health and Environmental Control, SC’s Water Resources Center at Clemson University, Systems municipal and rural water utilities, conservation groups, power companies and agricultural interests. In 2019, the group completed a report, the “South Carolina State Water Planning Framework”, which outlines the river basin planning process and the intended content of a river basin plan.

“The planning framework represents a foundation for the development of regional and state water bodies, which are essential to our continued economic growth and the protection of the resources and environment we all share,” said Ken Rentiers, Deputy Director of the Land, Water and and Conservation Division.

Each river basin plan will be created and overseen by a river basin council, a working group made up of stakeholders with interests in the basin. River Basin Councils in the Edisto, Broad and Pee Dee river basins have already been established and planning activities in these basins are underway. The Saluda River Basin has been selected as the next basin to implement the new planning framework. Planning efforts and advice in the other four basins will follow as funding becomes available.

At its most fundamental level, a watershed plan will answer four fundamental questions:

  1. What is the water supply and demand currently available in the basin?
  2. What water uses are currently permitted and registered in the basin?
  3. What will be the demand for water in the basin throughout the planning horizon (50 year planning period) and will the available water supply be sufficient to meet this demand?
  4. What water management strategies will be used in the basin to ensure that available supply meets or exceeds projected future demand?

As stated in the planning framework, “The answer to the fourth question is central to the water planning process and benefits greatly from cooperation and consensus among all stakeholders in the basin. A successful and equitable watershed plan considers the effects that all water users have on each other and on the resource.

Public participation is essential to ensure that future generations of South Carolina have a safe and well-managed supply of our most essential natural resource: water. You can download a copy of the “South Carolina State Water Planning Framework” and learn more about the Planning Process Advisory Committee and the research behind this initiative.

Meeting locations and times:

Colombia—Nov. 1, 2022, 6-8pm

Saluda Shoals Park – Center of the River

5605 Bush River Road

Columbia, South Carolina 29212

Directions via Google Maps

Greenville—Nov. 3, 2022, 6pm-8pm

Roper Mountain Science Center

Environmental Science and Sustainability Building, Room 201

Greenville, SC 29615

Directions via Google Maps

New 5G front-end solutions improve 5G network coverage and quality


26-09-2022 | NXP | Semiconductors

NXP Semiconductors now offers its new, more powerful BTS7202 RX FEM and BTS6403/6305 pre-drivers for 5G massive MIMO at up to 20W per channel. Developed and implemented in its SiGe process, the devices operate with modest current consumption to reduce operational costs for MNOs. They also offer improved linearity and lower noise figures to support better 5G signal quality.

As 5G networks continue to be built across the world, MNOs are increasingly using 32T32R solutions to improve massive MIMO coverage in less dense urban and suburban areas. The use of 32T32R solutions requires the use of more powerful devices that increase the power level per channel to achieve the total power needed to provide strong 5G signal coverage.

“With 5G networks beginning to become denser, higher power solutions are crucial to ensure network consistency and signal quality,” said Doeco Terpstra, Vice President and General Manager, Smart Antenna Solutions, Radio Power, NXP. “Our customers recognize that the higher power solution offers network operators a way to meet the power requirements of 32-antenna solutions without compromising network quality.”

The new pre-drivers provide a complete, easy-to-implement solution for 5G base stations, complementing its power amplification solutions for 32T32R radios. The BTS7202 RX FEMs provide a switch capable of handling up to 20W of power leakage from transmission lines, reducing system complexity. The BTS6305 pre-drivers also combine a balun to save cost.

DraftKings promo code unlocks $200 NFL Sunday bonus


For the biggest NFL Week 3 boost, look no further than this DraftKings promo code. New users can turn any team into a massive underdog, at least when it comes to payout.

Use this DraftKings promo code to receive a 40-to-1 odds boost on NFL Week 3. Bet $5 on any team and if they win, win $200 in bonus money.

Of course, picking a winner is half the battle, but it’s hard to deny the value of this promotion. This 40-to-1 odds increase will give the odds of every NFL team a boost. That said, there are a few highly favored teams that will receive a ton of attention.

Getting started with DraftKings Sportsbook is a stress-free process. New users can sign up, deposit, and download the app in no time. Here’s a deeper dive into the registration details.

Click here to unlock this DraftKings promo code and secure NFL 40-1 odds. Bet $5 on any team to win $200.

Bet $5, win $200 with this DraftKings promo code

This DraftKings promo triggers a 40-to-1 odds increase for new players this weekend. All it takes is a $5 bet on any NFL team for the chance to win $200 in bonus money.

Take a look at Cowboys-Giants to see the true value of this DraftKings promo. The Cowboys are -105 on the moneyline. In order to win $200, existing users would have to wager $210. Giants contributors (-115) would have to risk $230 to win $200. Remember that new users can get the same payout on a $5 bet.

Whoever picks a winner will receive eight $25 free bets. These can be used on any NFL Week 3 game, College Football, MLB, Soccer, Tennis, Golf, UFC, and more.

DraftKings Promo Code: How to Sign Up

This is a simple and streamlined registration process. In fact, there is no need to physically enter a DraftKings promo code when signing up with any of the links on this page. Here’s a step-by-step guide to help new users get started:

  • Click on here to automatically activate this promo code. You do not need to manually enter a promo code to redeem this offer.
  • Create an account and deposit $5 or more to qualify for this bonus. PayPal, online banking, credit cards, and debit cards are common methods of depositing funds.
  • Download the DraftKings Sportsbook mobile app. This is available to anyone with an iOS or Android device.
  • Place a $5 bet on any NFL team to win $200 in bonus money.

This promotion is available in select states for players 21 or older (New York, New Jersey, Connecticut, Pennsylvania, Arizona, Colorado, Indiana, Iowa, Kansas, Louisiana, Michigan, Tennessee, Virginia, West Virginia, and Wyoming) .

Other boosts and bonuses

This odds boost is a great way to start, but it’s not the only way to bet on the NFL this weekend. New and existing users can enjoy the same escalated play betting on any NFL Week 3 game. This will provide bettors with a 100% increase in profits on that same game bet.

Click here to unlock this DraftKings promo code and secure NFL 40-1 odds. Bet $5 on any team to win $200.

Best cars for snow with high IIHS safety scores


Some cars are better equipped for winter than others. Kelley Blue Book says things like all-wheel drive, LED headlights, and safety features like blind-spot monitoring. Mirrors and heated seats also contribute to driver comfort and improve visibility in bad weather. Looking for the best cars for snow with high safety scores from the Insurance Institute for Highway Safety (IIHS)? Check out options from BMW, Mazda and Toyota below.

BMW’s 3 Series is one of the best cars for snow, with high safety scores

The 2022 BMW 3 Series | BMW

Kelley’s Blue Book thought the 2022 BMW 3 Series xDrive ticked all the boxes when it came to best cars for snow. The xDrive AWD adds $2,000 to the price but is well worth it. Forward collision warning, automatic emergency braking and automatic windshield wipers are standard on all 2022 3 Series. The IIHS awarded the 2022 BMW 3 Series its Top Safety Pick award.

Kelley Blue Book says the Active Driving Assistant package adds blind-spot monitoring for $700. Some of the other options available include adaptive LED headlights and better high beams for visibility. If you can’t find the 2022 version, the 2021 model is similar and well equipped for snow.

2022 BMW 330i xDrive: $43,450

IIHS Safety Score: Top Safety Pick

All-wheel-drive Mazda3 is one of the best cars for snow

” src=”https://www.youtube.com/embed/Lih-QWkJvVU?feature=oembed” frameborder=”0″ allow=”accelerometer; automatic reading; clipboard-write; encrypted media; gyroscope; picture in picture” allow full screen >

RELATED: The Best Midsize Luxury SUVs For 2022 With A Stress-Free Ownership Experience

If you opt for the 2022 Mazda3 AWD, upgrading to the Preferred version will better equip this car for snow. Mazda equips the 3 with automatic emergency braking, blind-spot monitoring and automatic high beams as standard. According to Kelley Blue Book, the i-Activsense features make this vehicle better suited for snowy conditions. Additionally, the IIHS awarded the Mazda3 the Top Safety Pick Plus award for 2022.

Additionally, the Mazda3 Preferred gets LED headlights, rain-sensing windshield wipers, and heated seats. The 186 horsepower engine is good enough for snow and winter. The 2021 Mazda3 is also well equipped if you can’t find the 2022 version, but it won’t have heated seats.

2022 Mazda3 Preferred AWD: $26,150

IIHS Safety Score: Top Safety Pick Plus

The Toyota Camry is reliable and efficient in winter

” src=”https://www.youtube.com/embed/b5ZzDHVUL0g?feature=oembed” frameborder=”0″ allow=”accelerometer; automatic reading; clipboard-write; encrypted media; gyroscope; picture in picture” allow full screen >

The best cars for snow with high safety scores cannot ignore the 2022 Toyota Camry AWD. In addition to its reliability history, Safety Sense 2.5+ adds many standard safety features. The Camry gets forward collision warning, automatic forward emergency braking and automatic high beams. Its LED headlights and taillights also help illuminate the road better in winter conditions.

Kelley Blue Book says adding a blind-spot monitor and rear cross-traffic alert adds $680 to the price. The Cold Weather Package is an extra $1,290, which adds a heated steering wheel, heated mirrors and heated front seats. If you can’t find a 2022 version, the 2021 Toyota Camry LE AWD is just as capable. The IIHS agreed, giving the 2022 Camry its Top Safety Pick Plus award.

2022 Toyota Camry LE AWD: $26,795

IIHS Safety Score: Top Safety Pick Plus

Some additional suggestions include the 2022 Charger SXT with AWD and the 2022 Nissan Altima with AWD. All-wheel drive is one of the most important features buyers can add, as it helps maintain traction in the snow. However, a good set of winter or snow tires is also a good suggestion.

RELATED: Consumer Reports Best American SUVs under $50,000

Framework to ban members of Congress and SCOTUS from trading stocks includes provision of crypto


Members of the United States House of Representatives and Senate as well as Supreme Court justices who currently trade cryptocurrencies may have to stop HODLing while in office if a bill gets enough votes.

According to a framework released Thursday, House Administration Committee Chair Zoe Lofgren — responsible for the day-to-day operations of the House — said she had a “meaningful and effective plan to address financial conflicts of interest.” ” in the USA. Congress by restricting the financial activities of SCOTUS legislators and judges, as well as those of their spouses and children. The bill, if passed under the framework, would suggest a change in policy after the 2012 passage of the Stop Trading on Congressional Knowledge Act, or STOCK Act, allowing members of Congress to buy, sell and to trade stocks and other investments during their tenure. , but also by requiring them to disclose these transactions.

“Congress can act to restore public faith and confidence in its officials and ensure that those officials act in the public interest, not their private financial interest, by restricting senior government officials – including including members of Congress and the Supreme Court – and their spouses and dependent children trading in stocks or owning investments in securities, commodities, futures, cryptocurrencies and other similar investments and short selling of stocks,” Lofgren said.

She added:

“I will soon introduce the legislative text of a bill built on this framework for reform. Many MPs have already concluded that reforms are needed.”

The framework suggested that SCOTUS lawmakers and judges could still hold and disclose a portfolio with diversified mutual funds, exchange-traded funds, treasury bills and other investments that “did not present the same potential for conflicts of interest”. disclosure amounts are more specific rather than the “extremely broad” range currently used – for example, $5 million to $25 million – and are publicly available.

Under the STOCK Act, lawmakers are required to report the purchase, sale, or exchange of any investment over $1,000 within 30-45 days, but the law provides for minimal financial and legal consequences. for not reporting on time – sometimes as little as $200 late fee. The proposed framework suggested imposing fines of $1,000 for every 30 days an individual violated disclosure rules, increasing late fees to $500, and allowing the Department of Justice to sue. civil actions if necessary. The House Press Gallery Twitter account reported Thursday that the House could consider the bill as early as next week.

Senators Jon Ossoff and Mark Kelly proposed similar reforms for the STOCK Act in the Senate in January, but there has been no movement on the bill for over 8 months. According to Lofgren, House Speaker Nancy Pelosi tasked the committee with reviewing potential financial conflicts of interest in Congress. However, the speaker has previously pushed back on efforts to ban lawmakers from owning or trading stocks, saying “they should be able to participate in that.”

Related: Powers On…Why Are US Officials Ignoring Ethics and the STOCK Act When Trading Stocks?

A number of House members and senators have revealed their exposure to crypto investments, including Illinois Rep. Marie Newman, Florida Rep. Michael Waltz, Wyoming Senator Cynthia Lummis, Texas Rep. Michael McCaul , Pennsylvania Rep. Pat Toomey, Alabama Rep. Barry Moore, and New Jersey Rep. Jefferson Van Drew. In December 2021, New York Representative Alexandria Ocasio-Cortez said it was inappropriate for her to hold Bitcoin (BTC) or other digital assets because US lawmakers have access to “sensitive and to future politics.

Here’s why the 1990s Yamaha GTS1000 was ahead of its time


Automakers are now playing it safe in terms of implementing the technology. But things were crazy in the 80s and 90s and there were all kinds of futuristic features on motorcycles. One such creation was the Yamaha GTS1000, one of the first motorcycles to feature a forkless front end. The “first” tag actually goes to the Ducati-based Bimota Tesi 1/D 851 which increased Yamaha launching in 1990. But it was the GTS1000 that propelled this technology around the world.

The complex front suspension and steering system had many benefits, including more precise handling and reduced stress on the main frame. But it was not without its problems and often offered a “different” driving experience. At low speeds, the steering was hard to shift, and there was the problem of changing the angle and length of the steering rake with braking intensity.

In addition, a never-before-seen technological feature also came with a hefty price tag. The Yamaha GTS1000, when launched, was priced at $12,999. With today’s money, you can get the evil MV Agusta Brutale 800 Rosso for an extra $400! Back then, this Yamaha locked horns with BMW K1100RS, Honda CBR1000F, Suzuki Katana 1100 and Kawasaki ZX-11.

The Yamaha GTS1000 with its futuristic features made jaws drop in the 90s; Still in 2022!

Yamaha GTS1000 had the iconic forkless ‘RADD’ front end

The coolest feature of the Yamaha GTS1000 is its forkless front suspension setup. Yamaha derived it from Ratioally Advanced Design Development (RADD) which was the creation of American inventor James Parker. The front suspension and steering system of the GTS1000 was similar to the cars. The wheel and suspension functions were mostly handled by an upper and lower arm as seen in cars. A shock absorber was attached to the left side of the wheel.

A post was attached to the left wheels but is concealed by the mudguard. The front wheel is attached to a large axle that uses roller bearings for movement. Ball joints have been used to connect the upper and lower arms at both ends of the upright, allowing wheel movement on all axes. The steering system consisted of a steering box that connected the handlebars to the front.

The advantages of this system were numerous. Due to the low-slung design, the center of gravity was much lower than a conventional setup, which helped with cornering and stability. Second, because the forkless system was directly connected to the chassis, it eliminated contact load multiplication. Since the suspension arms were much more stable, there was a reduction in steering mass and the steering was much more precise.

Related: Ranking the coolest ’90s sport bikes on the used market

The GTS1000 had a single frame with a Greek connection

The handlebar is connected to the upright above the wheels via a steering box. All of this setup is connected to a uniquely designed frame that forms two C-shaped aluminum plates with a slight forward tilt. Viewed from the side, the main frame resembles the Greek alphabet Ω; hence the name Omega chassis. The main frame is connected to two steel subframes at each end. The front extension is for the fairing and dashboard and the rear is for the seat and body.

Yamaha GTS1000 Packed A 100 Hp FZR1000-Four in line derivative

Yamaha gave the GTS1000 a detuned version of the FZR1000 inline-four engine. This liquid-cooled, 20-valve, DOHC, 1002cc unit developed 100 hp and 78 lb-ft of torque. Power was transmitted to the rear wheel via a five-speed gearbox. Yamaha pitched it as both a tourer and a sportbike, which was a bit confusing.

The seating posture was a little aggressive with the handlebars set lower. This required a slightly forward-facing position. But the motor peaked at around 6,500 rpm, which didn’t fit the “sportsbike” label Yamaha wanted to give it. Nonetheless, the GTS1000 was a comfortable machine to ride and came with a ready-to-carry saddle for rider and passenger.

Related: 5 Fastest Japanese Motorcycles of the ’90s (& 5 Americans We’d Rather Buy)

This futuristic Yamaha flaunts cool design and features

The GTS1000 still looks futuristic by 2022 standards. Those tri-spoke alloy wheels look sick! The bike was low and long, which again was an indication of its touring side. The fixed windshield was enough to protect you against the gales. It was only offered in a metallic red hue for the United States.

Yamaha used a 5/17-inch rear wheel that was attached to an 11-inch brake rotor mated to a two-piston caliper. The rear part was quite normal compared to the front. It came with a conventional swingarm with a monoshock taken from the Yamaha FZR1000. The front brake situation was quite tricky as Yamaha could not deploy a dual-disc setup due to space constraints.

Instead, the GTS1000 has a big 12.6-inch vented disc mated to a 3.5/17-inch alloy wheel six-piston caliper. Those sold in North America came with standard ABS. Another interesting aspect was the position of its fuel tank. The GTS1000 packed a 5.3 gallon tank upright above the gearbox and towards the rear of the main “Omega” frame.

The Yamaha GTS1000 is an impressive modern classic

Yamaha took a bold step with the GTS1000 and created the world’s first production-ready motorcycle with a forkless front end. But this complex creation could not gain traction as Yamaha expected. It sold for only seven years and there are only a few on the roads right now. But there is a thriving community of GTS1000 owners who still share the same pride and passion for this quirk. And this Yamaha clearly looks like a modern classic.

Source: Yamaha

Tornado Cash source code is now available on GitHub


The controversial Tornado Cash virtual currency mixer code Return to GitHub following a month of downtime.

Last month, after the US OFAC announced sanctions against Tornado Cash, GitHub has disabled associated accountsincluding the story of Roman Semenov, co-founder of Tornado Cash.

Then last week, the Treasury Department authorized users to retrieve funds from Tornado Cash, and individuals who deposited funds into Tornado Cash before August 8 could apply for an OFAC license to “engage in transactions involving the virtual currency in question.”

Following this, Ethereum lead developer Preston Vanloon youged GitHub lifted the ban on Tornado Cash, as the Treasury announcement said “U.S. persons would not be prohibited by U.S. sanctions regulations from copying open source code and making it available online for others can see it”.

After the code ban was lifted, Vanloon tweeted, “Looks like everything is in ‘read only’ mode, but this is progressing from an outright ban.”

As of August 24, an unofficial archive of Tornado Cash code is available on GitHub. Matthew Green, a professor at Johns Hopkins University, built the archive.

Tornado Cash addresses continue to be sanctioned, but users can still access the site due to its decentralized structure.

Read also : Why did the US OFAC sanction Tornado Cash?

A new framework for community mining is on the way – Yukon News


The Government of Yukon invites Yukoners to complete a questionnaire on a proposed framework to address potential mining-related disputes.

In a statement, the proposed staking and mining development framework for planned and zoned communities aims to ensure that the process “promotes sustainable development, respects community values ​​and minimizes land use conflicts” when staking and staking mining development are undertaken in the communities.

The framework aims to suggest approaches to prevent and resolve conflict between mining operations and Yukon communities, improve coordination between municipal and unincorporated land use planning and mineral regulatory processes, and find ways so that mining activities respect community values ​​and interests.

For example, disputes and uncertainty surrounding the development of existing mining claims within community boundaries have resulted in lawsuits in Dawson City and Whitehorse.

Comments will be analyzed and published in an online summary after the questionnaire closes on October 14.

Once the responses have been organized, a framework document will be drafted and submitted to the cabinet for approval.

The Yukon government is also seeking input from the mining industry and other interested groups on its intensity-based emissions target for placer and quartz mining.

People can participate by reading the discussion paper, which outlines the proposed approach, and providing feedback by email by October 3.

The discussion paper proposes the mining sector’s goal of reducing greenhouse gas emissions per unit of production by 45% by 2035, with the goal of net zero by 2050.

The target for all other sectors and industries except mining is a greenhouse gas reduction target of 45% by 2030.

In the document, intensity-based targets, as opposed to an absolute greenhouse gas reduction target, define a desired level of emissions per unit of material produced or volume of activity to encourage more efficient operations. , “regardless of the number or number of mines”. are working at any given time.

The results will be published in a “what we heard” report.

Contact Dana Hatherly at [email protected]

ActiveState Artifact Repository Reduces Risk to Secure Python Supply Chain


ActiveState publishes ActiveState Artifact Repository to enable organizations to securely create Python dependencies directly from source code.

Rather than importing pre-built Python dependencies from a public repository like Python Package Index (PyPI), or from an internal build process which may not be secure against supply chain attacks, all Python artifacts are created through ActiveState’s secure build service and stored directly in their own private ActiveState artifact repository for distribution, creating a closed-loop environment that maximizes supply chain security.

ActiveState’s Secure Build Service supports security and integrity controls defined at the highest level of the Software Artifact Supply Chain Tiers (SLSA) framework, significantly reducing the risk of working with predefined Python dependencies. The ActiveState Artifact Repository is a private, customer-customized repository that will only contain Python packages that have been verified by the organization’s security team.

When developing with Python, software vendors typically use their artifact repository to proxy the Python Package Index (PyPI) which provides no security or integrity guarantees for the third-party software assets they provide. In contrast, the ActiveState Artifact Repository provides software vendors with a catalog of secure Python dependencies that have already been vetted by their security team, reducing the risk of using third-party components.

Organizations that create Python dependencies from source code create unique versions that are rarely updated, resulting in buggy and vulnerable applications; or they are forced to implement and maintain separate build systems for each operating system (OS) that developers and deploying systems need, resulting in high operational overhead. Conversely, the ActiveState artifact repository:

  • Ensures the security and integrity of Python artifacts that developers work with.
  • Eliminates the overhead of creating and maintaining build environments for Windows, Mac, and Linux.
  • Uses a secure, cloud-based build service to eliminate the need to periodically audit internal build systems for any compromises.

As a result, software vendors now have a much more secure and cost-effective way to make trusted Python dependencies available to development and DevOps teams.

Loreli Cadapan, VP, Product, ActiveState, said, “Artifact repositories are a proven way to create a consistent and reliable software development process. But the final product is as safe and secure as the initial entries in the artifact repository. This is where ActiveState excels. The ActiveState Artifact Repository reduces the risk and cost of securing your Python supply chain while ensuring the security and integrity of the products and services you create.

Cummins Fuels Hydrogen Pledge at IAA


Cummins Inc. confirmed its commitment to the IAA to play a major role in the hydrogen economy as part of its Destination Zero initiative.

“Cummins has been at the forefront of developing power solutions for more than a hundred years, and we continue to demonstrate industry leadership by developing a diverse line of sustainable powertrains – with hydrogen playing a key role,” said said Alison Trueblood, Executive Director of Cummins – On-Highway Business Europe. “Our goal is to focus on the entire hydrogen value chain to drive sustainability and enable faster adoption.”

Through acquisitions and investments, Cummins is focused on three key areas for hydrogen: green hydrogen production, hydrogen management and transportation, and the application of hydrogen in engines and fuel cells.

Production of green hydrogen

Green hydrogen is produced by electrolysis to transform sustainable energy (wind, solar, hydro) into hydrogen without carbon dioxide emissions. As announced in May 2021, Cummins is establishing a new Proton Exchange Membrane (PEM) Electrolyzer plant in Spain that will house system assembly and testing for approximately 500 MW/year and will be scalable to over 1 GW/year . Cummins is investing in this technology, with more than 600 electrolyzers deployed worldwide in 100 countries.

Hydrogen storage and supply

On-board storage is an essential part of hydrogen production. The hydrogen must be compressed into the available space to store enough of it to meet the vehicle’s duty cycle requirements. Cummins has a joint venture with NPROXX, a world leader in high pressure hydrogen storage for stationary and mobile applications, to support the OEM integration process.

NPROXX hydrogen tanks were installed on the concept medium-duty delivery vehicle on the Cummins booth at the IAA. The truck is powered by Cummins’ 216 ​​kW B6.7H hydrogen engine and paired with a high-capacity hydrogen storage system at 700 bar pressure, enabling a potential range of up to 500 kilometres.

“The offer and the infrastructures will take time to develop. Hydrogen adoption will likely begin with applications where fueling can be done centrally, such as home operations or near large hydrogen hubs,” Trueblood noted.

Hydrogen engines

Cummins is developing hydrogen combustion engines that will provide sustainable solutions more aligned with current vehicle designs to reduce complexity for OEMs and their customers. Reusing appropriate components results in economies of scale while providing reliability and durability equal to diesel.

In addition to the medium truck’s B6.7H hydrogen engine, IAA visitors could see Cummins’ largest X15H hydrogen engine for heavy trucks up to 44T GVW, with a maximum output of 530 hp (395 kW). ) and an impressive peak torque of 2600 Nm.

“A hydrogen combustion engine fits into today’s vehicles, works with today’s transmissions, and integrates seamlessly into existing industry networks and service practices,” said added Trueblood.

Hydrogen fuel cells

Hydrogen fuel cell technology can offer an efficient power solution for heavy-duty vehicles with high energy usage and requirements, while meeting zero emissions needs. The fuel cell uses oxygen to create a reaction, turning hydrogen into electricity. It works with battery technology – ultra-capacitors, lithium-ion or lead-acid – in a parallel hybrid configuration to provide instantaneous response.

Cummins showcased its fourth-generation fuel cell at the IAA that offers improved power density, efficiency, and durability while producing zero greenhouse gases and zero air emissions criteria. It is available in 135 kW single module and 270 kW dual module motors for medium and heavy duty applications.

“We view hydrogen engines and fuel cells as complementary energy sources, offering different options to customers depending on where they are on their path to zero carbon. The introduction of hydrogen engines market will also accelerate the growth of hydrogen infrastructure to support widespread adoption of fuel cell powertrains,” Trueblood concluded.

Read more of our sustainability articles here

How to protect an API from scraping?


What is screen scraping and how does it relate to APIs?

Screen scraping is a common challenge for businesses with a large online presence, such as financial services and e-commerce businesses. It can be referred to by many different names like web data mining, web scraping, web harvesting, etc. While screen scraping was once seen primarily as a front-end web application security challenge, the changing nature of line-of-business applications is bringing the issue of scraping to the realm of API security.

For example, business-to-consumer (B2C) architectures have evolved over time from monolithic web applications to new API-based front-end frameworks that can meet the needs of web and mobile applications. Meanwhile, the growing use of business-to-business (B2B) APIs by industry ecosystem partners creates even more potential scenarios for scraping to occur.

B2B APIs have different API consumers than B2C APIs, which expands the universe of potential data retrieval scenarios. Some forms of scraping can be legitimate, but more often than not they are used to abuse APIs. Examples may include:

  • Aggregation of information for use in unauthorized ways, such as product descriptions and product reviews
  • Collect pricing information from e-commerce sites to inform competitive pricing strategies and offers, especially those with ever-changing pricing patterns like travel, hotel, and car rental to name only a few
  • Access frequently changed information such as interest rates from financial sites or betting odds from gambling sites for competitive reasons.

In addition to unwanted forms of data leakage, API scraping can place a heavy resource load on application infrastructure. And unfortunately, mitigating it isn’t as simple as setting up rate limits or quotas. Many sophisticated players are adept at scraping in a “low and slow” manner that falls below existing limits and quotas. This makes it difficult to shut down without disrupting legitimate API usage.

Additionally, the fact that API scraping likely works within these existing rate limit and quota settings means that most organizations have no visibility into what is really going on.

How do most organizations protect against API scraping?

Most organizations rely on rate limits and quotas to limit the ability to perform web scraping. While not a magic bullet for the reasons outlined above, it is nonetheless an important first step. At a minimum, this sets an upper limit on the amount of scraping that can occur.

Another crucial best practice is to ensure that clients connecting to APIs are valid. For example, if APIs are typically accessed by mobile devices, steps should be taken to ensure that the mobile client accessing the API has not been hacked, that the integrity of the mobile device does not has not been compromised by jailbreak, etc.

Some organizations may also use specialized bot mitigation tools to protect their web applications from automated scraping. These solutions bring value to B2C API traffic. But since they require specific browser or mobile app instrumentation, they are completely inefficient for B2B API scraping, where browsers and mobile apps don’t exist, which usually come from some programmatic client. Similarly, compromised Internet of Things (IoT) or Internet of Everything (IoE) devices can be used to create “swarms” that do not originate from standard web or mobile application clients.

So, in summary, even if you have rate limits and quotas in place, you will still end up with two main points of exposure:

  1. You remain open to weak and slow scraping on B2C APIs.
  2. Authenticated B2B API traffic is completely unmonitored.

And these risks are more than theoretical. Earlier this year, a malicious actor was able to exploit a vulnerability in the Twitter API to retrieve account details of approximately 5.4 million users.

How does Neosec’s approach close these critical protection gaps?

Neosec’s most significant advance in API security is the extension of API monitoring and analysis to authenticated traffic. B2B APIs represent a much larger attack surface and a potential route to more valuable enterprise assets.

Behavioral analysis at the authenticated user level is the key to monitoring B2B APIs. This is the only way to know when a seemingly legitimate and authenticated API consumer using no known attack pattern is scraping your APIs. This requires a context that can only come from analyzing API requests from the same user over a long period of time, even if they have changed access tokens more than 100 times.

Below is a summary of how Neosec’s approach can extend your API protection capabilities beyond traditional bot mitigation techniques.

Comparison of Bot Mitigation and Data Scraping API

Top 10 OWASP APIs Robot Mitigation Neosec
What UI-based API (B2C only) All APIs (B2C, B2B)
Where In the browser Via API
How Detects signals from browser or mobile app and human users – assumes all humans are good Behavioral profiling of users and IPs
Impact on user experience High Down
Endurance Easier to circumvent Robust
Answer Immediate Slow down
Strengths Block high-volume automated scraping on websites Detects a wide range of abuse and misuse by malicious insiders and attackers impersonating legitimate users
Common scraping use cases Scratch prices on the website
(for example: Airlines, Playstation 5)
Scraping any API resource by any authenticated user – from resellers, partners, vendors to customers

*** This is a syndicated blog from the Security Bloggers Blog Network written by the Neosec team. Read the original post at: https://www.neosec.com/blog/how-do-you-protect-an-api-from-scraping

Spill the tea on GTA 6 videos and source code leak


– Advertising –

A hacker allegedly hacked into the Slack server of the Rockstar Games and Confluence wiki, resulting in the leaking of Grand Theft Auto 6 gameplay and source code. The source code and videos were first leaked on the GTA forums where threat actor “teapotuberhacker” shared a RAR archive link containing 90 stolen videos.

Who made these videos?

The videos appeared to be made by developers who were debugging several game features like NPC tracking, camera angles, and locations in Vice City. Some of the videos also contain conversations between the protagonist and NPCs.

The hacker’s confession

The hacker stole the GTA 5 and 6 source code as well as the GTA 6 assets and tests built as shown. He is now extorting Rockstar Games by threatening them to release more data.

The threat actor is ready to sell the GTA 5 source code along with his assets and therefore accept offers above $10,000. However, he is still not ready to see the GTA 6 source code.

When forum members refused to believe the hack was real, ‘teapotuberhacker’ claimed he was also behind the cyberattack on Uber who recently and simultaneously shared screenshots of Grand’s source code. Theft Auto 5 and 6 as proof.

Read also : Hacked Uber security systems; Hacker makes claim with hashtag

What does Rockstar Games say?

While Rockstar Games has yet to release a statement on the attack, Bloomberg’s Jason Schreier tweeted:

Since the leaked videos made their way to Twitter and YouTube, Rockstar Games has issued DMCA infringement notices and takedown requests to remove the videos.

Take 2 Interactive, the owner of Rockstar Games, said, “This video is no longer available due to a copyright claim by Take 2 Interactive,” in a copyright claim . These takedown requests further confirmed the news that the leaked GTA 6 videos are not fake.

Watch this YouTube video:

Last update

Rockstar Games’ efforts haven’t helped much. Indeed, the stolen GTA 6 videos and parts of the source code had started leaking on Telegram by the threat actor and others as well. For example, “teapotuberhacker” leaked the GTA 6 source code file which is 9500 lines long. It seems to be related to running scripts for different in-game actions.

– Advertising –

Dongfeng Motor Corporation showcases several star products at CAEXPO


WUHAN, China–(BUSINESS WIRE)–ASEAN Expo (CAEXPO) was opened in Nanning, Guangxi. As a representative enterprise of China’s automobile industry, Dongfeng Motor Corporation exhibited products such as its commercial vehicles, passenger cars, agricultural machinery, parts, and more. at the exhibition. The company exhibited 9 finished automobiles, 4 sets of critical assemblies, 2 agricultural machines and more than 70 parts to comprehensively display the technical achievements of its technological innovation in moving towards the Association of Nations of the United States market. ‘South East Asia.

Dongfeng Motor held the VOYAH new product introduction meeting on the first day of CAEXPO. VOYAH is a high-end intelligent luxury electric minivan. Equipped with Dongfeng’s self-developed dual-power electric drive ESSA architecture, VOYAH supports two power systems such as pure electric power system and multi-module drive power system. clever. It is the only electric minivan equipped with a dual power system in the industry.

HAOJI is an all-new premium hybrid SUV. Carrying Dongfeng’s self-developed Mach power set, with an acceleration response time of only 0.15s and thermal fuel efficiency of up to 41.07%, HAOJI is capable of expanding with multiple platforms such as hybrid power system, hydrogen power system, etc. It can meet the power requirements of models such as HEV, PHEV, REV, etc., which is why it is called “the fighter engine”.

Dongfeng Aeolus GS MAX has the widest body among vehicles of the same class. Featuring Mach 1.5T power system of Top 10 “Chinese heart” engine and golden power set of 7DCT300 gearbox, it has adequate power and low oil consumption, and is highly safe, comfortable and intelligent, thus embodying the latest technical achievements for Dongfeng Motor’s “electrification, intelligence orientation, networking, sharing and light orientation”.

Dongfeng Motor also launches the top 5 commercial models such as D760, D320, D560, etc. The D760 6×4 tractor, as the main exhibition vehicle at Dongfeng Motor’s outdoor booth, is the representative product of Dongfeng Dragon’s flagship series.

So far, Dongfeng Motor has sold its products to more than 100 countries, including all ASEAN countries. From January to August this year, Dongfeng Motor exported 124,000 vehicles, which was up 90% over the same period last year.

Katahdin Mark returns to victory


BANGOR, ME – Katahdine brand (lofty adventure) returned to form and maintained his high perch atop the Maine Breeders Stakes (MSBS) points standings with another harness racing win on Saturday (Sept. 17) at historic Bass Park in Bangor.

Katahdin Mark and driver coach Gary Hall (Shelley Gilpatrick Photo)

Scoring from the far post in the $18,489 MSBS 3-Year-Old Colt and Gelding Trot, trainer/rider Gary Hall put Katahdin Mark where he likes to be – controlling the tempo up front. While setting aggressive opening fractions of 30, 101.1, Katahdin Mark seemed to have things his way with much of the field scattered following earlier errors in and around the first corner.

By the third stanza of 1:31.1, Katahdin Mark had two more lengths over the Chamorro (Drew Campbell/Valerie Grondin) and over 15 lengths over the rest of the field. As the pair turned home, Chamorro and Campbell started to gain on the leader and came within three quarter lengths at the wire, but the wire came too soon.

Earning his seventh seasonal start, Katahdin Mark scored in 2:01.1 for owners/breeders James and Betsey Kelley. He paid $3.00 to win. Chamorro finished second; Warriorofthevalley finished third.

The first no-bet race for the Maine-bred 3-year-old trotting fillies, vying for a purse of $18,736, had a very different complexion after four of the six entrants took breaks before the quarter pole.

When the dust settled, two of Valérie Grondin’s three trainees had their eyes on the prize with Pembroke Honcho (Aaron Hall) taking the lead from post four, followed by Pembroke Faye (Pembroke Slugger) and driver Heath Campbell who avoided traffic trouble and escaped second from post six.

Pembroke Faye (#6) and driver Heath Campbell defeat Pembroke Honcho (Shelley Gilpatrick Photo)

Honcho and Hall set a quick opening panel of 31 and were ahead by six at quarter pole. Squeezing the brakes resulted in a 1:03.1 halftime and saw stablemate Pembroke Faye close by 2-1/2 lengths. By the 1:34 third panel, Faye and Campbell were out and rolling while putting pressure on the leader.

Down the home stretch, the finishing push saw Pembroke Faye take the lead and win in 2:03.3 by three quarter lengths. It was a new lifetime mark and a first season win for the filly. Owned and bred by Bill Varney, this was only her fifth start of the year.

Pembroke Honcho finished second; Maplewood Slugger finished third.

Sunday’s (Sept. 18) Farmington program features two over $17,000 divisions of the Maine Breeders Stakes for 2-year-old fillies.

The first no-bet event is a four-horse affair with Marc Tardif division leader Pickmepickme looking for his seventh win of the season. sHE was no worse than third in eight seasonal starts. It will be piloted by Andy Harrington. Post office time is 1:30 p.m.

The pari-mutuel card starts at 2 p.m., opening with a $17,989 MSBS companion event for 2-year-old frosh fillies. Katelyn’s Angel (Kevin Switzer Jr./Marc Tardif) was installed as the 2-1 favorite from post five. Having won half of her starts this year, she should manage this group quite easily at home.

South St Dottie (Dave Ingraham/Mike Graffam) won their last start at Windsor and were named the second choice 7-2. Janie (9-2, Mark Athearn/Gretchen Athearn) has finished second in half of her eight season outings and could add to the fray.

The Maine Breed Fair Race continues for three more days at the Franklin County Oval, with all dates carrying post hours to 2 p.m.

After Farmington, harness racing returns to the Cumberland Fairgrounds from September 28 to October 2 for eight days of pari-mutuel betting action. The 150e The annual Cumberland Fair and First Tracks host the Maine Breeders Stakes 2-Year-Old Finals on Saturday, October 1.

The final stop on the Pine Tree State Fairgrounds circuit is historic Fryeburg, Oct. 6-8. Maine’s sophomore finals return to Bangor for all MSBS 3-year-old division finals on October 15.

For more information on the Maine Standardbred Breeders Stakes, follow our facebook page @MaineBreedersAssociation, or visit the State of Maine website at click here.

For complete results of races without wager, Click here.

For complete pari-mutuel race results, Click here.

by Chris Tully, for the Maine Breeders Stakes

The Microsoft team developed a Trusted Consortium Framework (CCF) to bring efficiency and usability to a decentralized trust model


The era of centralized databases has passed with greater confidence in the online world. Many events have shown that centralizing management and oversight, while convenient, has various drawbacks, including duplicate digital transactions, human error, and bias.

Although blockchain offers a more secure alternative to centralized databases, it is far from ideal. Microsoft Research’s Confidential Computing team set out to develop a new system to keep transactions private while gaining the benefits of decentralized trust. However, at the time, there was no system capable of consolidating computing resources.

To solve this problem, the team designed the Confidential Consortium Framework (CCF), a toolkit for building reliable, decentralized, and highly available centralized services with stateful components that rely on distributed consensus. According to the researchers, data privacy is protected by secure, centralized computing, and CCF is based on a distributed trust paradigm similar to blockchain. This paradigm helps reduce massive power consumption in blockchain and other distributed computing settings.

Together with the Azure Security team, they developed the Azure Confidential Registry, a CCF-based service that securely manages sensitive data records in Azure.

By limiting the size of the Trusted Computing Base (TCB), the components of a computing environment, CCF enforces the trust boundary in circumstances where distributed trust and data secrecy are required. By configuring the governance settings of the CCF, operators can significantly reduce their involvement in the TCB or even remove it altogether.

CCF uses trusted hardware to ensure the integrity and secrecy of transactions rather than a social root of trust like a cloud service provider or participant consensus used in blockchain networks. This results in a Trusted Execution Environment (TEE). These TEEs are encrypted memory regions that remain encrypted even throughout program execution. Memory encryption is strictly enforced by the memory chip itself. There is never any way to access the information stored in the TEEs.

The foundation of decentralized trust is remote attestation, which assures an external party that every computation of user data takes place in a publicly verified TEE. This certification and the separate, encrypted TEE establish a decentralized trust framework. By validating each other’s attestation that they are executing the expected code in a TEE, the network nodes build a foundation of trust between them.

A flexible consortium, independent of the operator, is responsible for the governance of the service. To establish its credibility outside the network, the CCF uses a ledger. In order to ensure the reliability of the service and to provide conclusive proof of the execution of transactions for other users, all transactions are recorded in an immutable ledger which its users can access for auditing purposes. This is useful for general users, but it will be especially useful for those who need to follow certain rules and regulations.

The team worked with the Azure Security group to refine and perfect the CCF to use as a stepping stone to developing more secure IT services in Azure. They used Azure API guidelines and ensured that CCF followed Azure recommendations, such as logging actions, reporting errors, and conducting extensive searches. They then created a prototype Azure application, which the Azure Security team used to build the first CCF-based publicly available managed service, Azure Confidential Ledger, which offers a cryptographically verifiable audit trail and protected against tampering.

Github: https://github.com/microsoft/CCF

Article: https://www.microsoft.com/en-us/research/publication/ia-ccf/

Reference: https://www.microsoft.com/en-us/research/blog/ccf-bringing-efficiency-and-usability-to-a-decentralized-trust-model/?OCID=msr_blog_RoadtoCCF_TW

Please Don't Forget To Join Our ML Subreddit

Tanushree Shenwai is an intern consultant at MarktechPost. She is currently pursuing her B.Tech from Indian Institute of Technology (IIT), Bhubaneswar. She is a Data Science enthusiast and has a keen interest in the scope of application of Artificial Intelligence in various fields. She is passionate about exploring new technological advancements and applying them to real life.

Ethereum Post-Merger Transfer Fees Stay Low, As Mid-May High Priority ETH Fees Are 93% Cheaper Coinspeaker


Following Ethereum’s transition from proof-of-work (PoW) to proof-of-stake (PoS) on September 15, blockchain network transaction fees were much lower than they were ten days before The Merge. About four months ago, on May 13, 2022, high priority ether transactions could cost 68 gwei or $2.97 per transaction, and today at $0.18 a high priority ether transaction priority is 93% cheaper.

Ethereum fees remain low after merger

The cost of transactions on the Ethereum network is cheaper after the merger, as the gas tracker of etherscan.io indicates that a high priority transaction on September 17, 2022 is approximately 8 gwei or $0.18 by transfer. 12 days ago, September 5, high priority ETH the transfer was 14 gwei or $0.47 per operation.

Fee metrics from etherscan.io indicate that today ETH transaction fees are over 61% cheaper than 12 days ago. Additionally, Ethereum’s recent change from PoW to PoS also caused a few fee aggregation web portals like bitinfocharts.com to publish erroneous cost data.

Ethereum post-merger transfer fees remain low, as mid-May high-priority ETH fees 93% cheaper
Ethereum Gas Tracker from Etherscan.io on September 17, 2022.

At $0.5888 per transfer, data from ycharts.com shows that the average ethereum (ETH) fees have also fallen since the merger. The metrics show the average transaction fees on the ETH network on September 14 was $0.6293 per transaction, and on the day of the merger the fee increased to $0.9812 per transaction.

Ethereum gas fees are also 93% lower than they were four months ago on May 13, 2022. Ycharts.com statistics show that on May 13 the average fee was $1.37 and they fell 57.66% from the current average fee of $0.58 per transfer.

Data from archive.org says etherscan.io’s gas tracker also shows ether fees were much higher 127 days ago in mid-May. Back then, a high priority transaction was 68 gwei or $2.97 per transfer to just send ethereum, compared to today’s $0.18 high priority transfer.

Today, etherscan.io’s gas tracker shows that an Opensea sale can cost $0.61 and four months ago it would have cost $28.58. A Uniswap decentralized exchange (dex) swap will cost $1.58 on September 17, but on May 13 it was around $26.07.

Sending an ERC20 token as tether (USDT) or usd coin (USDC) is also cheaper today at $0.46 per transaction. But 127 days ago, it would cost a user around $7.65 per transaction to send an ERC20-based coin.

As Bitcoin.com News has repeatedly reported in 2022, Ethereum’s data charges have been dropping steadily since mid-May. Post-merger suite data points to onchain ETH fees have remained low.

Keywords in this story

Bitinfocharts.com, data, dex exchanges, ERC20 token, ERC20 transfer, ETH, ETH fees, ether, Ethereum, Ethereum fees, etherscan, etherscan.io, Gas, Gas Tracker, L1, Layer two, Layer-One, Merge fees , metrics, Onchain, Scaling, September 2022, Statistics, swaps, Transaction, Transaction fees, transfer, Transfer fees

What do you think of the post-merger stats that show ether fees continue to stay low? Let us know what you think about this topic in the comments section below.

Jamie Redman

Jamie Redman is the news manager for Bitcoin.com News and a fintech journalist living in Florida. Redman has been an active member of the cryptocurrency community since 2011. He is passionate about Bitcoin, open-source code, and decentralized applications. Since September 2015, Redman has written over 6,000 articles for Bitcoin.com News about disruptive protocols emerging today.

Image credits: Shutterstock, Pixabay, Wiki Commons

Disclaimer: This article is for informational purposes only. This is not a direct offer or the solicitation of an offer to buy or sell, or a recommendation or endorsement of any product, service or company. bitcoin.com does not provide investment, tax, legal or accounting advice. Neither the company nor the author is responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods or services mentioned in this article.

Our point of view: a setback for Boom | Editorial


As you may know, the much-vaunted new faster-than-sound airliner planned by Boom Supersonic has no engine.

Now it has no engine manufacturer.

As the Journal’s Richard Craver recently reported, Rolls-Royce has pulled out as the supplier that would develop the critical ingredient that would power Boom’s new Overture jet.

So Boom has to find someone else, which doesn’t bode well for the upstart company’s optimistic schedule to build the planes at a $500 million facility at Piedmont Triad International Airport.

“After careful consideration, Rolls-Royce has determined that the supersonic commercial aviation market is not currently a priority for us and, therefore, will not be continuing work on the (programme) at this time,” he said. the company said in a statement to aviation. industry media. “It was a pleasure to work with the Boom team and we wish them much success in the future.”

People also read…

In other words, buckle up and return your seat pans to their original upright position. There may be turbulence ahead.

Not that such complications were unexpected.

Industries that grow at the cutting edge of technology are susceptible to setbacks. There will likely be more bumps along the way.

If you prefer a smoother ride, we recommend a car or bus.

That’s not to say Rolls-Royce’s sudden exit isn’t serious. This will not only cost time, but also prestige and cachet, at least in the short term.

As a reminder, Roll-Royce developed the engines for the Concorde supersonic transport.

Not having an engine yet is no minor complication, especially one that Boom envisions will offer carbon-free air travel, which no large commercial aircraft currently does.

Denver-based Boom remains typically optimistic. (Sometimes you have to wonder if Boom’s ambitions are faster than the speed of sound.)

“Overture remains on track to carry passengers in 2029,” the company said in a statement. “Later this year, we will announce our selected engine partner and our transformational approach to reliable, cost-effective and sustainable supersonic flight.”

Despite this chipping assessment, Boom must overcome major challenges to deliver what it promises.

Still, a sense of perspective is helpful.

Rolls-Royce is in financial difficulty (it reported a loss of $127 million for the first half of fiscal 2022) and clearly stated that he could not bear the risk of developing a new supersonic engine.

Meanwhile, Boom can list a few notable advantages in its favor:

  • It has established an alliance with aerospace and defense technology company Northrop Grumman.
  • It has advance orders for 130 planes from a customer list that includes American Airlines, United Airlines, the US Air Force and Japan Airlines.
  • Potential successors to Rolls-Royce as engine manufacturers include companies such as Pratt & Whitney, whose sales are on the rise.
  • And leveling of the 400-square-foot Boom plant at PTI Airport is proceeding on schedule.

More importantly for the Triad, Boom could attract related suppliers and inject $32.3 billion into the state’s economy over 20 years and add juice to the Triad’s growing “aerotropolis.”

So the upside still seems to be worth the fuss state officials made about Boom when he announced he was coming here.

That could mean fleets of sleek jets capable of carrying up to 80 passengers each at 1.7 times the speed of sound over water – or at least twice the speed of any existing commercial aircraft.

And that could mean flights from Miami to London in just under five hours and from Los Angeles to Honolulu in three hours.

By planes made in the Triad.

As cool as this all sounds, we’ll see…

In economic development, there are no certainties.

Do you remember the ill-fated Dell computer factory in Winston-Salem?

More recently, even the 800-pound gorilla in almost everything bought or sold, Amazon announced a retirement. The mega-retailer closed or canceled 44 fulfillment centers in the United States, while delaying the opening of 27 others.

This means that a hoped-for settlement in Greensboro will not happen.

Even the safest bets are not always as safe as they seem.

Markets change. Tastes change. Technology evolves.

So you study the prospects. You pitch for new industries and new jobs. And then you hope for the best.

Indo-Pacific Economic Framework and Future of Cross-Border Data Flows


The Indo-Pacific Economic Framework for Prosperity (‘IPEF‘) is a new economic framework between 13 (thirteen) Asian countries and the United States, sharing a commitment to a free, open, fair and prosperous Indo-Pacific that has the potential to achieve sustained and inclusive economic growth[1]. It rests on four pillars to know. (a) improving the transparency, diversity, security and sustainability of supply chains; (b) clean energy, decarbonization and infrastructure growth in line with the goals set out in the Paris Agreement[2]; (c) commitment to promote fair competition and to apply effective tax, anti-money laundering and anti-corruption regimes in accordance with multilateral obligations; and (d) building high-level inclusive, free and fair business engagement, including in the digital economy, which would involve cross-border flow of personal data.

A press release[3] (‘Press release‘) by the Ministry of Commerce indicates that India would not, for the time being, commit to the fourth pillar of the IPEF relating to trade, promoting fair and inclusive practices including in the digital economy, specifying that the government would wait ‘final contours to emerge‘. The press release also acknowledges that the government has considered this step due to the ongoing process of strengthening the digital framework and laws, particularly in relation to privacy and data protection, given the importance that the IPEF’s fourth pillar grants cross-border data flows.

Cross-border transfers: existing and upcoming legislation

The Information Technology Act 2000 (“IT law‘) and the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules 2011 (‘PSDI Rules‘) allow the transfer of data or sensitive personal information[4] (‘PSDI‘) to third parties and entities outside India who perform the ‘same level of data protection‘[5] complied with under the SPDI rules. Since there are no further guidelines on determination, assessment and tools to ensure such a level of protection, this is usually met by contractual requirements.

The impact of data localization and restrictions on cross-border transfers has also increased slightly in industry regulations. Initially, one of the most important cases concerns the local storage of all the data of the operators of payment systems[6], including card information and cardholder data. Similar local storage requirements also apply to policyholder records[7]critical systems and data for organizations in the financial sector[8]guidance on outsourcing[9] applicable to banks and financial institutions.

The Supreme Court of Puttaswamy[10] affirmed the right to privacy and also underlined the importance of information and data flows as socio-economic ordering[11]. It also refers to the report of the Justice Committee AP Shah[12] which highlights the need for a framework that recognizes that global flows of data generate value for individuals and businesses and are at the heart of commerce in the age of the digital economy. Although the Supreme Court did not specify the contours of cross-border data flows, the earlier (and now withdrawn) Data Protection Bill of 2021 (‘Invoice‘) had laid down requirements concerning the compulsory storage of (still undefined) critical personal data in India[13] and conditionally authorize sensitive personal data[14] be transferred out of India. While Sensitive Personal Data may be transferred under approved contracts or intra-group programs, to jurisdictions deemed adequate, or upon authorization to transfer a specific category of Sensitive Data, critical Personal Data may be transferred for very limited reasons, such as the provision of health care or emergency services or upon specific government authorization. While the bill was withdrawn[15]media reports[16] indicate that a new simplified framework for data protection, as well as the Digital India Act, information technology legislation could be introduced in the next sessions of Parliament.

Interface between international agreements and data transfers

It should be noted that the bill is similar in some respects to the construction of the General Data Protection Regulation (‘GDPR‘), this includes the reasons for transferring sensitive personal data. The bill authorizes transfers of sensitive data to third countries based on a determination of adequacy[17]which may be made by the central government for a specific jurisdiction having regard to applicable laws and international agreements. Although this decision is subject to the effective application of relevant laws by the authorities and the authorization of the central government before sharing this data with a foreign government body, these should be taken into account when considering IPEF and subsequent agreements by the government, which could serve as the basis for adequacy decisions.

Therefore, international agreements that oblige countries to promote the free flow of personal data between jurisdictions and provide certain safeguards with respect to the data transferred, may be deemed by the central government to be “adequate”. In the context of the EU, this was seen in the old agreement between the European Union and the United States[18] whose “adequate” decision of the European Commission has been declared invalid by the Court of Justice of the European Union[19].

Future of data flows and cross-border restrictions

There have been many criticisms that cross-border data flow restrictions, geo-blocking and such measures have impinged on commerce and created country-level internets.[20]. As many bilateral and multilateral agreements focusing on free trade and trade also pay attention to digital economies and the free flow of data, as seen in the case of the digital trade agreement between the United States and the Japan.[21], measures to increase interoperability between frameworks, guaranteeing the free flow of personal and other data, in addition to maintaining legal frameworks that provide for the protection of the personal information of digital users, bring out high-ranking prerogatives in these agreements . While some industry regulations requiring local storage applicable to critical sectors may override these standards, attempts to restrict cross-border transfers more broadly (as under the bill) are likely to be perceived as Customs barriersas seen in the USTR report[22].

Although the more precise terms regarding the IPEF requirements have yet to be defined, the future of international data transfers appears to be to balance the prerogatives of protecting personal data with the need for uninterrupted data flows, in order to ensure the supply of goods and services across borders, especially in the context of a dynamic digital economy. Upcoming frameworks in India, such as a draft Data Protection Bill or a Digital India Act, should take this into account and provide much-needed clarification on this issue.

Microsoft Teams vulnerability shows the danger of collaboration apps


Couldn’t attend Transform 2022? Discover all the summit sessions now in our on-demand library! Look here.

Microsoft Teams is perhaps the biggest business communication platform in the world. It has risen to prominence during the COVID-19 pandemic as a key space for enterprise users to maintain productivity.

Teams has over 270 million monthly active users. The pandemic helped accelerate the platform’s reach from 75 million users in April 2020 to 115 million in October 2020 and 145 million in April 2021.

Globally, Gartner recorded a 44% increase in the use of collaboration tools by workers since 2019, to the point that 80% of workers were using collaboration tools for work in 2021.

While these tools are handy, their widespread use has opened the door to serious vulnerabilities.


MetaBeat 2022

MetaBeat will bring together thought leaders to advise on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, California.

register here

For example, according to a study published by Vectra yesterday, versions of Teams for Windows, Mac, and Linux store authentication tokens in plain text on the underlying device. This is important because it means that if an attacker hacks into a system with Teams installed, they can gain access to authentication tokens as well as other information.

This vulnerability underscores that enterprises cannot afford to rely on the security of consumer-grade communication platforms when communicating sensitive information, IP addresses and other data.

How serious is the Microsoft Teams vulnerability?

This isn’t the first time that collaboration tools like Teams have been criticized for their lack of security. At the beginning of this year, Avanan identified a significant increase in cyberattacks on Microsoft Teams, with threat actors using chats and channels to spread malicious .exe files.

These new vulnerabilities are another flaw in the armor of applications that aim to be enterprise-grade communication platforms.

“In essence, it’s still [the] unresolved issue of cookies and other web credentials being stolen by attackers with local access,” said John Bambenek, principal threat hunter at Netenrich. “That doesn’t mean it’s not significant. The fundamental problem is that attackers can steal a cookie and use it on any number of machines to replay an authenticated machine.

“I would like developers and tech companies to send these hashed credentials with local machine-specific information so that cookie and credential relay attackers go away completely,” Bambenek added.

The problem with collaboration apps

Collaboration applications are not immune to vulnerabilities. Like any browser-based software, they have underlying bugs and can be targets of web attacks and phishing attempts.

Just recently it appeared that a bug in Soft exposed the hashed passwords of some users over a period of five years. This happened about a year after attackers used stolen cookies to hack EA Games’ personal communication channel, allegedly stole 780 GB of data, including source code for Fifa 21.

The problem is not that solutions like Slack or Microsoft are particularly weak, but that they are not optimized to keep up with the level of sophisticated threats targeting modern organizations from both cybercriminals and state-sponsored actors.

Despite these weaknesses, many organizations continue to share protected information through these channels. According Veritas Technologies, 71% of office workers worldwide admit to sharing sensitive and critical business data using virtual collaboration tools. So what can organizations do?

Limit the risk of collaboration applications

Vectra reported the new Teams vulnerability to Microsoft in August, but Microsoft disagreed that the severity of the vulnerability warranted a fix.

In any case, companies that handle and manage trade secrets or regulated information should exercise caution when using communications applications that expose high-value data. That doesn’t mean they have to stop using communication apps altogether. But that means they need to put robust controls in place to reduce the risk of data leakage.

As Deloitte report notes, “Collaboration technologies, while vital during the rise of virtual work, can pose serious threats to organizational security and privacy if not properly managed. As these technologies expand their reach and prevalence in business operations, organizations must keep a pulse on potential threats, implement controls where possible, and promote service availability.

In practice, controls include using selected strong random passwords, using cloud access security broker (CASB) solutions to identify data exfiltration, implementing content guidelines for platforms and deploying a web application firewall to detect application layer attacks.

VentureBeat’s mission is to be a digital public square for technical decision makers to learn about transformative enterprise technology and conduct transactions. Discover our Briefings.

The United States is on the cusp of a clean energy revolution – we can’t leave anyone behind


While transitioning our country’s economy from fossil fuels to clean energy is a daunting task, it has never been a better economic decision than it is now.

Clean energy is a major job creator in the United States, employing 3.2 million Americans and account for more than 40% of all energy jobs in the country. In 2021, jobs in the energy sector increased to a much faster pace (4%) than overall employment in the United States (2.8%). These jobs benefit both red and blue states: California, Texas and New York currently employ the most clean energy workers.

Clean energy jobs are set to grow even more in coming years thanks to massive investments in the Inflation Reduction Act (IRA) and the bipartisan Infrastructure Investment and Jobs Act (IIJA) that will inject billions of dollars into clean energy technologies, invest in grid updates and electric vehicles, as well as make the United States more competitive in global markets. Sectors of the U.S. economy will see job growth from these climate-smart investments, including in the buildings and power sectors through energy efficiency, construction of new infrastructure for production zero-emission electricity, grid modernization and electrification.

In reality, new analysis of the World Resources Institute finds that the United States can create nearly one million additional net jobs by 2035 from federal climate actions included in the IRA and IIJA compared to the status quo. But the impact on full employment can be significantly greater when taking into account the provisions related to the relocation of manufacturing of clean energy technologies, which could create up to 3.1 million additional net jobs in the world. during the same period.

With the long-term fiscal policy certainty offered by the IRA, major corporations have announced multi-billion dollar manufacturing investments across the country, including in states that have seen manufacturing declines over the past few years. last decades. Toyota recently announced a $2.5 billion electric vehicle battery plant in North Carolina and First Solar announcement an investment of $1.2 billion to increase the production of solar energy technology. Hyundai is considering speed up your timeline build electric vehicles (EVs) in the United States to take advantage of the IRA’s EV tax provisions that require battery components and critical materials to be sourced from the United States or its free trade partners, with the final assembly of EVs in North America.

However, as the United States transitions to a clean energy economy, it is also important to consider sectors that are highly dependent on fossil fuels and will be impacted by the transition. Without policies incentivizing domestic manufacturing, the net employment impact of economy-wide decarbonization policies could be much smaller and some sectors, such as transport and fuels, will experience a net loss. jobs.

For example, electric vehicles are expected to require less labor to manufacture, assemble and maintain than internal combustion engine vehicles. While engines and transmissions for combustion vehicles are manufactured domestically, battery cells for electric vehicles are currently mainly produced overseas. Increasing domestic battery cell manufacturing capacity can generate jobs and economic growth, as well as offset some of the job loss in the traditional auto industry.

Similarly, the clean energy transition risks creating job losses in the fuels sector associated with oil, natural gas, coal mining and mining, as well as in wholesale trade, distribution and transportation of these fuels. However, we already know which counties and regions of the United States are vulnerable to a transition away from fossil fuels, making it easier to direct clean energy investments and appropriate policy solutions towards them.

Although federal decarbonization policies create positive net job benefits for the entire country, they must be complemented by targeted policies to avoid harming workers and communities closely tied to the fossil fuel industry. . An unmanaged transition will not only impose economic costs on vulnerable workers and communities, but it could also create opposition to climate action that could delay this crucial energy transition. By incorporating additional smart policies, such as those encouraging domestic manufacturing, targeting investment to energy communities likely to see job losses due to the transition, and demanding higher labor standards and worker protections, the IRA seeks to ensure that the clean energy transition will also be fair and equitable.

However, we must go further. Federal policymakers must build on the protections outlined in the IRA and develop additional policies that provide targeted support to communities and workers vulnerable to loss of jobs, public revenue and economic base due to abandonment. fossil fuels. Federal and state policymakers should also collaborate and co-develop clean energy projects with local communities to address concerns about pollution risks, ensure access to quality economic opportunities, and incorporate guidance on maximizing benefits. local benefits.

The United States has made impressive progress in stimulating the clean energy economy, but further action will be needed to achieve net zero emissions in the United States. lead to millions more clean energy jobs – promising that if done right, the clean energy economy can benefit all Americans and ensure a more prosperous and equitable future for the nation.

Devashri Saha is a senior partner at the World Resources Institute, USA. Follow her on Twitter:@Devashree_Saha

Dan Lashof is the director of Global Resources, USA. Follow him on Twitter: @DLashof

The Broncos are well placed, nine of the next 10 opponents did not win in week 1


Two days after the disappointing end against the Seahawks, maybe Broncos Country needs a deep breath.

Yes, Denver is 0-1 after a brutal 17-16 loss. But the same is true for nearly half of the league. The only thing that keeps him from being exactly half of the NFL is made up of the Houston Texans and Indianapolis Colts who play tied in Week 1.

And good news! The Texans and Colts are both on Denver’s schedule in the coming weeks. Houston travels to Denver on Sunday, where the Broncos are heavy favorites, and Indy will be here on a Thursday night in early October.

In fact, a crazy stat has emerged. Nine of Denver’s next 10 opponents haven’t won their Week 1 contest. We knew the start of this schedule was going to be easier than the tough last six games, but that’s a crazy development.

As mentioned, the Texans are tied. After that, the 49ers dropped one to the Bears. The Raiders fell to the Chargers and the Colts were tied as well. Week 6 will include a visit to Los Angeles to take on the Chargers, the only winning team to start the year. Week 7 is at home against the Jets, who lost to the Ravens. The following week, it’s the Jaguars in London; they collapsed in Washington last Sunday.

After the goodbye, the Broncos head to Tennessee, where the Titans gagged a game against the Giants last weekend. Week 11 sees Las Vegas come to the Mile High City and Week 12 is a visit to Carolina, where the Browns beat the Panthers on opening weekend.

There are two big takeaways here. First, losses occur. Yes, the Broncos’ loss happened painfully on a huge stage, but many other cities are currently experiencing the same emotions as Denver fans.

Second, this schedule is actually very manageable by the end of November. That’s when the Broncos will wrap up their 11th game of the year.

Could Denver be 7-4 at this point or even 8-3? Without a doubt. All of these upcoming teams have shown their flaws. Heck, our own James Merilatt thinks they’ll be 7-1 in the end, ready to roll out a monster winning streak after the loss to Seattle.

It’s too early to start looking at the AFC playoff picture, but it’s not too early to start looking ahead. And right now, the schedule continues to look favorable for Denver.

Getting back on track starts with blasting a bad Houston team on Russell Wilson’s home debut. Broncos Country will be ready to roll.


Companies Track Transactions, Bitcoin Privacy Matters CryptoBlog


The below is a direct excerpt from Marty’s Bent Issue #1260: “They use debit and credit card purchases to make lists.Subscribe to the newsletter here.

Jewish population in Europe – note prepared for the Wannsee conference. (Source)

via Reuters

Going through Reuters

Nothing highlights the need for bitcoin more poignantly than attacks on transactional privacy. Last week, a Geneva-based global standards body approved the ability for payment processors to issue a new merchant code for companies that sell firearms to consumers. The idea behind the dealer code is that it will give law enforcement the ability to more easily track down criminals who use these firearms to commit crimes, but one can be sure that making a list like this paves the way for abuse by despots in the future.

The fiat system that has been in place for the past five decades makes this kind of unfettered surveillance possible. The nature of KYC/AML (know your customer/anti-money laundering) injected into every layer of the financial stack that people are forced to interact with on a day-to-day basis has ensured that the individual cannot escape the Eye of Sauron. There is no way to solve this problem from within. The likelihood that governments and their corporate partners will one day wake up and decide they have a moral obligation to stop spying on people is anchored at 0%. The only way out is to build an entirely new financial system that does not allow this type of blanket surveillance to be imposed on the public and that is exactly what Bitcoin provides.

Yes, bitcoin’s privacy safeguards are below average and most people acquire bitcoin by interacting with trusted third parties who engage in KYC/AML monitoring. However, I think these poor assurances and user behaviors will change over time. As tooling improves, people will become smarter bitcoin users. Creating a culture of zero address reuse, coin control, and the use of tools like Samourai’s Whirlpool will make the ability of on-chain monitoring companies to identify end users much more difficult, if not impossible. As bitcoin adoption increases and people start moving their UTXOs into wallets they control because it’s easier and they understand that’s where their bitcoin is most powerful, the circular economy of bitcoin transactions that have never touched services instituting KYC/AML monitoring will increase dramatically. Exacerbating the problems of chain monitoring companies.

Imagine a world in which it has become completely normalized for merchants to accept bitcoin using BTCPay servers they control from customers who use Samourai Wallet, BlueWallet, Muun Wallet or any other noncustodial solution on the market. . The number of transactions that will be facilitated and completely independent of the yoke of KYC/AML will, at some point, reach a critical tipping point and the type of labeling that current payment processors attach to gun purchases will only be Not practical.

This is the future we should be working towards. This is why it is extremely important to educate current and future bitcoin users on best practices when it comes to receiving and sending bitcoins in the most private way possible. Even though it is relatively easy to track some on-chain transactions today due to people linking their UTXOs to KYC services, I am confident that spreading and normalizing this type of bitcoin usage will go a long way to combat the evils that KYC-related use has worked to date.

Financial privacy isn’t a bad thing, no matter how much the powers that be want you to think otherwise. Fortunately, we have the ability to build a future where financial privacy is possible. The only thing that stands between humanity and this materializing future is action. Go ahead and educate, start accepting and sending bitcoins using the proper tools, and work to improve those tools so that they are as easy as possible for others to use.

Linux Foundation to Form OpenWallet Foundation to Promote Universal Digital Wallet Infrastructure


The Linux Foundation has announced plans to form the OpenWallet Foundation (OWF), a new collaborative effort to develop open source software to support interoperability for a wide range of wallet use cases.

The initiative already has strong support, including from leading companies in the technology, public sector and industry verticals, as well as standards organizations.

OWF’s mission is to develop a secure and versatile open source engine that anyone can use to build interoperable wallets. The OWF aims to establish best practices for digital wallet technology through collaboration on open-source code to use as a starting point for anyone striving to create interoperable, secure, and privacy-protecting wallets.

With the OpenWallet Foundation, we are pushing for a plurality of wallets based on a common core.

The OWF does not intend to publish a wallet itself, or offer credentials or create new standards. The community will focus on building an open-source software engine that other organizations and businesses can leverage to develop their own digital wallets.

The wallets will support a wide variety of use cases, from identity to payments to digital keys, and aim to achieve feature parity with the best wallets available.

Daniel Goldscheider, who launched the initiative, said, “With the OpenWallet Foundation, we are pushing for a plurality of wallets based on a common core. I couldn’t be happier with the support this initiative has already received and the welcome it has found at the Linux Foundation.

Executive Director of the Linux Foundation Jim Zemlin said: “We are convinced that digital wallets will play a vital role for digital companies. Open source software is the key to interoperability and security. We are delighted to welcome the OpenWallet Foundation and excited about its potential.

“The Universal Digital Wallet Infrastructure will create the ability to transport tokenized identity, money and objects from place to place in the digital world. A massive business model shift is coming, and the winning digital business will be the one that gains the trust to directly access the real data in our wallets to create much better digital experiences,” said David DealGlobal Metaverse Continuum Business Group & Head of Blockchain, Accenture.

“We are excited to be part of the launch and development of an open source foundation for digital wallet infrastructure to help ensure consistency, interoperability and portability with privacy, security and inclusivity. at the heart of the design,” continued Treat.

Reed Drummond, director of trust services at Avast, a brand of NortonLifeLock, said, “We are on a mission to protect digital freedom for all. Digital freedom begins with the services used by the individual and the possibility of recovering their personal information and restoring trust in digital exchanges. Great endpoint services start with the core digital identity wallet technology. We are proud to be a founding supporter of the OpenWallet Foundation because collaboration, interoperability, and open ecosystems are essential to the trusted digital future we envision.

What to expect in the Draft National Policy on Data Governance Framework, 2022


In February 2022, the Government of India presented a draft titled “Draft Indian Data Accessibility and Usage Policy 2022”. It aimed to transform India’s ability to leverage public sector data. Senapathy Kris Gopalakrishnan, the co-founder of Infosys, also believes that non-personal data generated in India should be allowed to be exploited; he also led the expert committee for the non-personal data governance framework.

However, it was later scrapped and a new draft was presented in May 2022, titled “Draft National Policy on Data Governance Framework”.

Why was the “Draft Indian Data Accessibility and Use Policy 2022” scrapped?

The project has its roots in the 2019 National Economic Survey, which indicated that commercializing government data could help India achieve its goal of becoming a $5 trillion economy. Chapter 4 of the survey said: “The private sector may be granted access to certain databases for commercial purposes…Given that the private sector has the potential to reap massive dividends from this data, it is fair to make them pay for their use.

With databases like Adhaar, Agristack (agricultural sector), e-SHRAM (unorganized workers), Arogya Setu, ABHA (Ayushman Bharat Digital Health Mission) and NDEAR (National Digital Education Architecture), the government has a huge amount of data available. elimination.

However, there were several issues with the monetization of this collected data. In the absence of comprehensive data protection legislation ensuring accountability for data breaches or excessive data collection, the government had tried to monetize it before.

While the policy aimed at anonymization, experts said it lacked legal accountability and independent regulatory oversight. Apart from this, the policy also had other issues, which were tackled by the government in a good mood.

Draft National Data Governance Framework Policy 2022

India’s Draft Data Accessibility and Use Policy 2022 has been superseded by the Draft National Data Governance Framework Policy which aims to modernize government’s data collection to improve governance and develop a nationwide artificial intelligence (AI) and data-driven research and start-up. ecosystem.

The stated objectives of the policy include, among others, the promotion of digital governance, the promotion of the digital economy, the establishment of uniform standards for open access digital platforms and the standardization of practices for the collection, management and data security. According to the policy, the achievement of these objectives would facilitate the implementation of a whole-of-government strategy and would also promote better governance.

The policy states that this must be done while protecting the privacy, security and trust of individuals.

As stated in the draft, the policy would be applicable to all government departments and agencies, and the established norms and standards would apply to all data collected and processed by any government agency. In addition, the policy would apply to all datasets and non-personal data, as well as the platforms, regulations and standards controlling their access and use by academics and startups.

The project proposes to create an “Indian Data Management Office (IDMO)” under the aegis of the Digital India Corporation (DIC), which reports to MeitY. According to the project, the IDMO should be in charge of drafting regulations, standards, recommendations and other operations such as collaboration with the government.

Moreover, by collaborating with the Digital India Start-up Hub (formerly MSH), IDMO is also expected to stimulate and grow the data and Al driven research start-up ecosystems.

Problems with this draft

There are some lingering issues that should be noted, although several think tanks have expressed concerns about the project, and the government is very likely to take these concerns into consideration. For example, the document does not specify what would happen to other portals with similar goals or how they would combine, although it stresses the need for a single platform to access all government data.

For example, the Open Government Data (OGP) portal is already managed by the National Informatics Center (NIC) under MeitY. The National Data and Analysis Platform (NDAP)19 of NITI Aayog also provides a platform for accessing this data.

States like Rajasthan and Karnataka also have their own versions of these portals known as Jan Soochna portal and Mahiti Kanaja portal respectively. It remains to be seen how the administration intends to group everything together or whether it will take care to avoid confusion. Furthermore, no guidelines have been established to prevent duplicity of effort.

The document also includes the development of datasets that would be available to Indian researchers and start-ups. However, it should be noted that he adds that the IDMO would be responsible for deciding whether requests for the use of data are legitimate and genuine.

Furthermore, it does not provide any guidelines that IDMO must follow with respect to operations, accountability or transparency.

This will obscure clarity around the operationalization of IDMO, including providing rationales for approving or rejecting requests, which could therefore have a detrimental effect on people’s trust in its functionality.

Ukraine just captured one of Russia’s most successful aerial electronic warfare modules


Ukrainian forces have captured significant amounts of Russian materiel of all kinds as they continue to push east and south in their ongoing counteroffensives. This spoils of war would now include a relatively intact example of an RTU 518-PSM self-protection jamming pod. This pod is paired with the latest version of the larger Khibiny-U electronic warfare suite used on the Su-30SM Flanker-H, and its capture has potentially significant intelligence value.

Photos of the front of the pod in question began circulating on social media earlier today. It was reportedly discovered among the wreckage of a Russian Su-30SM, with serial number RF-81773 and bort number Red 62, which was shot down earlier in the conflict near the town of Izium (Izyum ) in the Kharkiv region of northeastern Ukraine. It would appear that Russian forces made no serious attempt to locate what remained of the plane and remove or destroy it to prevent their capture before the area was recently liberated.

Installed on Russian Su-30SMs, the RTU 518-PSM is part of a larger suite called Khibiny-U. The whole “complex”, as it is called in Russian, consists of the SAP 518-SM, consisting of an RTU 518-PSM pod on the right wingtip and an RTU 518-LSM1 on the left wingtip, as well as the internal KS REP system, according to a 2021 paper from the Kaluga Scientific-Research Institute for Radio Engineering. Better known by the Russian acronym KNIRTI, it is the manufacturer of all versions of the Khibiny family of electronic warfare complexes.

As previously stated, the RTU 518-PSM is believed to contain an active jamming system, while the companion RTU 518-LSM1 is believed to be a passive receiver that detects threatening emissions from the electromagnetic spectrum, such as those from hostile radars. In its primary role as a self-protection system against enemy air defenses, the full SAP 518-SM subsystem, also known as Regata, is said to have the ability to spot, then block and confuse an adversary’s radars, including the searchers on the incoming radar. -guided missiles – in various ways. This may include the ability to generate fake broadcasts in an attempt to mask the real aircraft using Digital Radio Frequency Memory (DRFM) technology, which you can read more about here.

There are also indications that the SAP 518-SM subsystem is focused on protecting against mid-band threats, while the internal KS REP subsystem is optimized against high-band threats, giving the overall complex a wider range of abilities. This is based on what is known about the function of slightly different modules under the old Khibiny-10M system for the Su-35S. Another earlier version of Khibiny, the Khibiny-10V, also includes separate modules and is used on the Su-34.

The Su-30SM can carry an additional pod, known as the SAP-14, which could provide escort jamming capabilities for larger groups of aircraft, on the centerline. It’s not immediately clear whether SAP-14 is a component of Khibiny-U or not, although it can clearly be used with other elements of that system.

A Russian Su-30SM with at least one of the SAP 518-SM wingtip modules and what appears to be the SAP-134 center module. KNIRTI

Additionally, the U in Khibiny-U is believed to mean unifitsirovannyi, or unified in Russian, suggesting that this may reflect an effort to create a standardized version of the system that will work with multiple aircraft types as part of the development of an electronic warfare suite for the Su-30SM. The Russian Ministry of Defense first contracted KNIRTI to develop the new Su-30SM electronic warfare complex in 2013, a year before the Khibiny-10V became the first version of this system to enter operational service on n any platform.

Russian SU-30SMs were first seen with Khibiny-U in 2018. However, there is evidence that Russian Su-30SMs in Syria have flown at least on some occasions as early as 2015 with the wingtip pods of the Khibiny-10V system of the Su-34.

The ability to glean new details about what the jammer inside the RTU 518-PSM pod, along with the rest of the Khibiny-U system, can and cannot do is exactly why capturing it is important. Elements of all three known versions of Khibiny have almost certainly already been recovered in the land of the fighting, including remains of a Su-35S that went down in the vicinity of Izium in April before Russian forces initially captured the area. However, this newly captured example of the RTU 518-PSM pod appears to be in particularly good condition.

The potential intelligence carry could also be even greater depending on the status of other electronic warfare suite components on the downed aircraft. If indeed from the wreckage of the Su-30SM Red 62, this aircraft could also have been fitted with the L150 Pastel Radar Warning and Guidance System (RHAWS), which is used for self-defense and to aid in targeting of Kh-31P anti-radiation missiles, as well as UV-30MKR chaff / rocket dispensers.

There’s potentially more for Ukrainian intelligence personnel, and almost certainly their foreign partners, like those in the United States, to choose from here than just the hardware too. Any surviving data storage systems with any software used to run parts of the Khibiny-U might actually be more valuable, especially given the reported DRFM signal mimicking functionality.

The actual subcomponents, including computer chips and other electronic components, used in the RTU 518-PSM and any other element of the associated electronic warfare complex could also provide valuable industrial intelligence. As The war zoneamong other things, reported in the past, the conflict in Ukraine revealed the extent to which the Russian defense industry depends on parts of foreign origin.

The apparent decision on the part of the Russian military to do nothing about the remains of this plane, perhaps due to the belief that their positions in this part of Ukraine were relatively safe, can only add to the insult to injury.

Anyway, an important part of a whole family of Russian aircraft electronic warfare suites, one of the most modern systems the country has and uses on a number of its combat aircraft front line, now seems to be firmly in the hands of his opponents.

Contact the author: [email protected]

Indian mobile game publisher Games2win increases ARPU by 40% with unbiased and accurate attribution.


Games2win is a leading casual mobile game publisher based in India. Their games have been downloaded over 475 million times and are played by over 15 million monthly active players. Games2win is the publisher of global hit titles in Dress Up, Car Driving, and Interactive Story game genres like Driving Academy, Decisions, International Fashion Stylist, and more.

As a data-driven company, it was essential for Games2win to have consistent and accurate data to pave the way for better engagement and monetization. While India is among the top download markets in the world, it lags behind in games monetization compared to countries like US, UK, France, Germany, China and Japan. As a result, their strategy had been to focus on creating the best possible free product that could scale organically.

However, in 2019 they were ready to start developing their user acquisition (UA) model. It quickly became apparent that they needed a strong attribution partner to provide the accurate data that is essential to make

“If you’re serious about building a user acquisition engine, you need an MMP/attribution provider. Trying to do attribution on your own isn’t going to help because a lot of time is wasted building systems to be able to scan through gaps, filter out fraudulent installs, etc. This becomes extremely expensive. Tejas Shah, Manager – Revenue and Distribution

Having just started with UA, Games2win weren’t sure what metrics they should be looking at. The Adjust team spent time helping them understand what metrics are available, how to set up dashboards, and what metrics might be beneficial as country KPIsAs average revenue per user (ARPU), back to ad expenses (ROAS)and click to install time (CTIT).

With ROAS as the chosen KPI, Games2win’s MIS and Analytics teams created internal dashboards and reports to help their Product, Monetization and UA teams make data-driven decisions. Cohort-level data and campaign spend data have been widely used to understand cost per install, lifetime value (LTV), retention, and more. They were also empowered to explore granular performance and creative impact by platform.

“Without an MMP, it would have been difficult for us to identify the revenue generated by our UA campaigns and whether or not they were profitable. Understanding our ROAS is critical for us and Adjust makes it very easy.”

Ultimately, Adjust provided Games2win with a single location to monitor their spend, eliminating the need to visit multiple partner platforms and sift through misaligned data points.

Using data from Adjust to Back Campaigns, Games2win was able to:

  • Increase AU spend by 200% year over year
  • Automate raw data exports
  • Get deeper analysis and insights into user-level data
  • Positioning yourself strategically to prepare for the expected growth in gaming monetization in India in the coming years

“Adjust has been a great partner, from their patience when we started our UA journey to helping us with tools and guidance to become more robust as the industry changes. Over the past 2-3 years they have evolved with our needs and the industry as a whole.If you’re looking for a partner who can be patient (if you’re new) and dynamic (if you’re into it), then Adjust is the perfect fit. – Tejas Shah, Manager – Revenue and Distribution

Fair and accurate attribution continues to be one of the most critical elements of their business strategy. Next, Games2win aims to be the world’s largest casual game company for dress-up, car driving and interactive story games.


Adjust is the mobile marketing analytics platform trusted by growth-focused marketers around the world, with solutions to measure and optimize campaigns and protect user data. Adjust powers thousands of apps with built-in intelligence and automation, backed by responsive global customer support.

Adjust is a subsidiary of AppLovin (Nasdaq: APP), a leading marketing software platform offering developers a powerful, integrated set of solutions to solve their critical functions such as acquisition, monetization and measurement of users.


Games2win is a leading casual mobile game publisher based in India. Their games have been downloaded over 475 million times and are played by over 15 million monthly active players. Games2win is the publisher of global hit titles in Dress Up, Car Driving and Interactive Story game genres such as Driving Academy, Decisions, International Fashion Stylist, etc.

NASA to develop flexible new framework for new space activities: US Vice President Kamala Harris


US Vice President Kamala Harris, speaking at the National Space Council on September 9, said her country’s space administration is developing new rules to allow new space activities. During her speech at NASA’s Johnson Space Center, she said the new framework of rules would “promote innovation and enable competition” given the entry of commercial companies into the space sector. Harris further stated that these rules will be “flexible enough to cover space activities that haven’t even been imagined yet.”

The Vice President made these statements while affirming NASA’s involvement in the management of the International Space Station (ISS) after President Joe Biden announced the extension of the United States’ role until 2030. We are aware that the International Space Station will not be operational forever. That’s why NASA is working with the private sector to develop the first generation of space stations,” Harris said.

So far, several private players such as Sierra Space, Blue Origin and Axiom Space are developing commercial orbital outposts that would eventually replace the ISS, currently operated by five member states (US, Russia, Canada, Europe and Japan). On the other hand, countries like China and Russia are planning their own space stations which should be completed during this same decade.

China’s space station named Tiangong is nearing completion as two of its three modules have been launched and the third is expected to dock with the others later this year. On the other hand, the Russian Orbital Service Station (ROSS) is expected to be completed by 2025. Recently, Russian space chief Yuri Borisov announced that Moscow will leave the decades-old space station after 2024, however, NASA’s recent statement after a multilateral Conference Board meeting revealed that “each partner has confirmed that they will continue to work within the respective government processes on the expansion and use of the station at the beyond 2024”.

NASA’s plan to retire the ISS

Earlier this year, NASA released a plan to deorbit the space station in 2030 and crash into the Pacific Ocean, paving the way for commercial installations. The plan states that the orbital outpost would fall at a place called Point Nemo in the Pacific. This place is also called a starship graveyard because it is the farthest point of any land. Once over the target location, mission controllers would use the space station’s propulsion systems to direct the outpost into the ocean.

McAssey continues success at Saratoga Casino – US Trotting News


McAssey continues success at Saratoga Casino

Saratoga, NY— Coach Jaymes McAssey climbed to third place in the coaching rankings at the Saratoga Casino Hotel when, on Friday, September 9, the young conditioner picked up three wins.

Dingle was one of coach Jaymes Mcassey’s three wins on Friday night. Melissa Simser-Iovino Photo.

McAssey, who was named the winner of the Peerless McGrath Award for Promising Trainers in 2017, had seven horses on a heavy trotting card Friday night. The conditioner wasted no time getting into the winner’s circle when his American Soul (American Ideal) prevailed in the first race of the evening in a rare pace event on the map.

Seated behind McAssey-trained Dingle, who made his debut at a new barn Friday night after being acquired by McAssey this week, was Luke Hanners, who rode American Soul to victory. This filly had no trouble going coast to coast on her first start out of her new stable to win by more than eight lengths over a mile in 1:59.1.

From there, Hanners and McAssey teamed up again with trotter Out Of The Blue who fired on the race favorite as they approached three-quarter pole before securing an upset victory at odds of 8 -1 and get a hat trick for his connections.

In the final drink of the night, it was that team again as McAssey’s Explosive Ridge proved second choice 8-5 in the betting and proved to be the match when Hanners guided Explosive Ridge to the forward and never looked back.

The veteran trotter held on in the streak to win for the second time this season and complete a grand slam for Hanners and McAssey. Hanners sits firmly in third place among home coaches in 2022 while McAssey has moved up to fourth after his huge Friday night.

Live racing continues Saturday night in Saratoga with action beginning at 5 p.m.

« Previous article Night of Champions will be played in Hawthorne

Next Article » Pembroke Legacy, Wolverina continues to dominate

Foldable Google Pixel and a ‘Pro’ tablet hinted at in Android 13 code


Google just rolled out the first beta of the Android 13 quarterly platform, and developers have already uncovered some code that hints at a pair of upcoming devices: the rumored foldable Pixel and a new “Pro” tablet (Going through android font).

In a thread on Twitter, developer Kuba Wojciechowski shares screenshots of code referencing the unfolded and folded states of a device called “Felix”. It also mentions the cameras used by the device which may include a 64 megapixel (MP) Sony IMX787 main sensor and a 10.8 MP Samsung S5K3J1 telephoto lens on the back of the phone. The device could also house an 8-megapixel Sony IMX355 sensor (the same used by the Pixel 6A) on the inside and another Samsung S5K3J1 on the front.

The foldable’s dual rear camera system backs up claims the device could fold horizontally like the Samsung Galaxy Z Fold. Last year it looked like Google was also working on a device that folds like a clamshell, but animations found in Android 12L and an icon in the Google camera app point to a phone that folds like a book.

In addition to digging up details about Google’s next foldable, Wojciechowski also spotted references to a “Pro” tablet, called “t6pro” or “tangorpro.” Google confirmed it was working on an Android tablet at I/O in May, and the developers have since understood that “t6” and “tangor” refer to the device. But now that we see the “pro” moniker attached to these codenames, it could indicate that Google is also working on a high-end version of the tablet. As underlined by 9to5Googlethe code doesn’t reveal much other than the fact that the two devices will use different rear cameras.

These results come just under a month away from Google’s Pixel launch event on October 6, where we’ll see the debut of the Pixel 7, Pixel Watch and new Nest devices. We don’t expect to see the rumored tablet or foldable at the event, though – the Pixel tablet isn’t supposed to release until 2023, and rumors suggest the foldable Pixel has been delayed until next year.

There’s a New, Cheaper Way to Get the Hyundai Santa Cruz Turbo Engine


After a highly award-winning inaugural year in the nascent compact pickup segment, the Hyundai Santa Cruz remains a solid option. It’s an almost perfect purchase for those looking for practicality. Plus, it’s a great choice if you don’t need the capacity or price of a bigger truck. Mid-size or full-size pickups offer a higher cost and features that most of us just don’t need for daily driving.

Although the 2023 model is largely a carry-over model from the previous year, for hyundai, there are some changes. Potential buyers will see a price increase for the base model. Plus, there’s a new trim level and a cheaper option to get the turbocharged engine.

The exciting look of the 2023 Hyundai Santa Cruz

RELATED: The 2022 Hyundai Santa Cruz is more practical than a Toyota Tacoma in real life

Unlike most competitors in the midsize pickup market, the 2023 Hyundai Santa Cruz will continue to use the redesigned unibody construction. The Hyundai pickup truck is based on the same platform as the Tucson crossover SUV. Therefore, the Santa Cruz is still likely to be a much more comfortable cruiser and offer more nimble cornering than others in the segment. As a rule, the body-on-frame architecture like the Ford Ranger or the Chevrolet Colorado decreases the comfort of the cabin on the road.

The forward-thinking, off-road-ready presence of the 2023 Hyundai Santa Cruz will still feature segmented headlights. Plus, it has crisp body lines and similar Tucson styling cues. Yet the Sport Adventure Vehicle (SAV), as Hyundai calls it, stands out for its racy attributes, from the front bumper and grille to the truck bed and distinctive rear lines topped with a retractable tonneau cover. . All of its features combine to give the Santa Cruz a competitive edge as a true compact pickup truck.

Performance and safety of the 2023 Hyundai Santa Cruz

” src=”https://www.youtube.com/embed/aMNXi1k0KcA?feature=oembed” frameborder=”0″ allow=”accelerometer; automatic reading; clipboard-write; encrypted media; gyroscope; picture in picture” allow full screen >

Both powertrain options found in the last model will return for 2023 without critical updates. The Santa Cruz is available to buyers with either:

  • 2.5-liter GDI-MPI inline-4 developing 191 horsepower and 181 lb-ft of torque combined with an eight-speed automatic transmission with SHIFTRONIC technology and optional front- or all-wheel-drive
  • 2.5-liter GDI-MPI turbocharged inline-4 engine developing 281 horsepower and 311 lb-ft of torque combined with an eight-speed dual wet clutch transmission with SHIFTRONIC technology and all-wheel drive

Maximum towing capacity is lower than midsize pickups, but the 2023 Santa Cruz can still handle between 3,500 and 5,000 pounds depending on driveline configuration. Although Hyundai does not have an option for a factory-installed trailer brake controller, alternatives are available.

The Insurance Institute for Road Safety (IIHS) did not release a safety rating for the 2023 Santa Cruz. Still, last year’s model was one of the top safety picks among small crew-cab pickups, with a top rating for their forward collision prevention systems.

2023 Hyundai Santa Cruz Trim Levels

” src=”https://www.youtube.com/embed/H7X1XoF-d7U?feature=oembed” frameborder=”0″ allow=”accelerometer; automatic reading; clipboard-write; encrypted media; gyroscope; picture in picture” allow full screen >

RELATED: 2022 Hyundai Santa Cruz Review, Price and Specs

The 2023 Hyundai Santa Cruz is expected to continue using its unique style. With smart functionality and a reasonable price to keep buyers away from large pickup trucks. Although this is a carryover model, Car and driver reports that prices have increased across all four trim options.

  • SE – up to $1,010 to $26,085 – includes base engine with front-wheel drive, eight-inch infotainment system with Apple CarPlay and Android Auto, six-speaker audio system, hold assist lane clearance and front collision mitigation. New to the SE are Blind-Spot Collision Assist (BCA) and Rear Cross-Traffic Collision-Avoidance Assist (RCCA).
  • SEL – up to $150 to $29,085 – includes heated mirrors, smart proximity key, lockable cargo bed storage, wireless smartphone charging features, power-assist driver seat with support adjustable lumbar, heated front seats, BCA and RCCA. The SEL trim is also available with Hyundai’s “Business Package,” offering buyers a cargo bed tonneau cover, sunroof, roof rails, sliding rear window, 150-volt outlet in the bed and an LED bed light, Hyundai says.
  • SEL Premium – up from $1,220 to $37,425 – gets the powerful turbocharged engine, HTRAC all-wheel-drive system, dual-zone climate control, leather-wrapped steering wheel with paddle shifters, Activity Package and a MyHyundai digital key.
  • Limited – up to $150 to $41,615 – will have, in addition to upgrades on other trim levels, leather upholstery all around, ventilated front seats, 10.25-inch infotainment system with navigation , a premium Bose audio system, adaptive cruise control and 360 degree Surround View Monitor (SVM) system.

Santa Cruz’s New “Night” Trim Pack

2023 Hyundai Santa Cruz Night | hyundai

RELATED: Does the 2022 Hyundai Santa Cruz pickup have a manual transmission?

The biggest news for the Santa Cruz is the addition of a bullish, blacked-out version of the compact pickup. The Night package starts at $37,105. It is now the least expensive version of the Santa Cruz with the optional 281 hp turbocharged engine.

The trim package also includes small color changes to the traditional chrome grille and styling touches. Plus, it adds 20-inch black wheels, black mirror caps, door handles, and side steps. Since the Night trim package comes with the more powerful engine, all-wheel drive is included.

RELATED: 10 Best Hyundai Cars, Trucks and SUVs According to TrueCar

The Swiss leader in private television CH Media chooses Kaltura for


New York, NY, September 09, 2022 (GLOBE NEWSWIRE) — Strong points:

  • CH Media, a leading private TV provider in Switzerland, has launched its new Over-the-Top (OTT) streaming service, oneplus powered by Kaltura and hosted on AWS
  • Kaltura provides full service orchestration, including Kaltura TV platform, subscriber and household management solutions, video-on-demand (VOD) media preparation, multi-Digital-Rights-Management content protection (DRM), Kaltura TV platform player and service analysis.
  • Kaltura delivered the project in just four months

Kaltura (NASDAQ: KLTR), the Video Experience Cloud, today announced that CH Mediaone of Switzerland’s leading private television providers, has chosen Kaltura for its new OTT streaming service, one plus.

Kaltura provides CH Media with full service orchestration for oneplus. At the heart of the service is the Kaltura TV platform, Kaltura’s cloud-based back-end. oneplus also benefits from Kaltura’s subscriber and household management solutions, media preparation for VOD, multi-DRM content protection, as well as Kaltura TV Platform Player and service analytics to understand the viewer behavior.

Kaltura delivered the project to tight deadlines, in less than four months. This included integration with front-end application and payment platform providers for web and mobile applications. CH Media is powered by Kaltura’s resilient, reliable and proven cloud platform, which is elastic to support future growth, hosted on Amazon Web Services (AWS).

oneplus offers films, series, documentaries and other entertainment as well as original productions. It is available directly to consumers through web, iOS and Android apps, and through telecom carriers, fast lineand Sunrise, with other mobile networks to follow.

“We are thrilled to partner with Kaltura to power our first-ever streaming service,” said Roger Elsener, Chief Entertainment Officer at CH Media. “We greatly appreciate the flexibility of Kaltura’s technology as well as their customer focus which enabled rapid integration with other system components,” he added.

The flexible monetization capabilities of Kaltura’s platform allowed CH Media to diversify its revenue streams by introducing three Freemium models within a single service. It includes an ad-based free version and two subscription-only premium offers (a standard offer for up to two simultaneous screens and “Family and Friends” for up to four). Combining subscription-based and ad-based VOD, this hybrid monetization model is crucial to oneplus’ strategy to attract new viewers with free titles, driving conversion to higher levels with premium and exclusive content offers.

oneplus offers a rich set of features that increase user engagement and stickiness. These include continuous viewing across all devices, watchlists, and the ability to create custom watchlists.

“Congratulations to CH Media for the launch of oneplus,” commented Nuno Sanches, Chief Strategy Officer at Kaltura. “Today, consumer expectations of OTT services are high, and providing an excellent user experience is essential. Additionally, it is critical for the business to have the ability to launch quickly, have flexible monetization, and data-driven features to understand viewers and expand their engagement.

“We look forward to continuing to support CH Media by providing our proven, robust and scalable technology that will enable the company to achieve its business goals while delighting audiences,” added Sanches.

CH Media Entertainment joins a growing number of leading media companies that use Kaltura to launch, operate and manage their streaming services. To learn more about Kaltura’s offering for the media industry, click here.

About CH Media
CH Media is one of Switzerland’s leading media companies and employs around 1,800 people in German-speaking Switzerland. With its dailies, weeklies and magazines, CH Media offers quality journalism. As the number 1 in Swiss private radio and Swiss private television, CH Media also stands for first-class entertainment. With its publishing and entertainment brands, CH Media reaches around three million people every day across all channels. State-of-the-art printing plants complete the range of products and services of the media group. https://chmedia.ch/

About Kaltura
Kaltura’s mission is to power any video experience for any organization. Our Video Experience Cloud offers live, real-time, and on-demand video products for businesses across all industries, as well as specialized industry solutions, currently for educational institutions and media and telecommunications companies. Our products and solutions are based on a wide range of media services that are also used by other cloud platforms and companies to power video experiences and workflows for their own products. Kaltura’s Video Experience Cloud is used by leading brands reaching millions of users, at home, school and work, for events, communication, collaboration, training, marketing, sales, customer service, teaching, learning and entertainment experiences. www.kaltura.com.


WeChat warns users that their likes, comments and history are being sent to China — Radio Free Asia


Chinese social media platform WeChat warns users outside China that their data will be stored on servers inside the country, RFA has learned.

A number of overseas WeChat users received a notification on September 6, warning that “personal data [including] Likes, comments, browsing and search history, content downloads, etc. will be transmitted to China.

The notification also reminds users that their behavior while using the app is subject to the WeChat License Agreement and Privacy Policy.

A YouTuber living in France who only gave the pseudonym Miss Crook said she was shocked to receive a French translation of the same message.

“I clicked and…this message popped up, so I automatically clicked cancel,” she said. “The difference between a democracy and a dictatorship becomes clear.”

She said the move is likely to affect a large number of Chinese nationals and emigrants living overseas.

“Overseas Chinese have become very dependent on WeChat, but is it really that important?” she says. “We can actually stop using it altogether, so we shouldn’t let them confuse us. It’s really not that important.”

In the face of growing international privacy concerns, WeChat said in September 2021 that it had “separated” its data storage facilities for domestic and international users, asking foreign users to re-sign the data. terms and conditions to continue using the app, which many people rely on to send money to people in China, make purchases in Chinese yuan, and keep in touch with friends and family.

Former Sina Weibo censor Liu Lipeng, however, said the move was largely cosmetic.

“Last year…WeChat re-signed its agreements with all foreign users, but everything in it, except one-to-one chats, must use WeChat protocols,” said Liu. “So as soon as you click OK, you’re back in [the Chinese version] Again.”

“Everything you write is always available [to the Chinese authorities], so it’s basically a sleight of hand. Nothing has changed,” he said. “You are still a WeChat user.”

US lawyer Teng Biao said WeChat’s parent company, Tencent, is already obligated under Chinese cybersecurity law to help the ruling Chinese Communist Party (CCP) with all the data it says it has. need, as are all other internet service providers and social media platforms. in China.

“The Chinese government has always used WeChat in China as a tool to control society and censor speech, which is an integral part of its high-tech totalitarian control agenda,” Teng told RFA.

“It has also always used WeChat as a way to export its censorship beyond its borders, to the United States and other countries,” he said.

“Western countries should consider reassessing WeChat as a threat to national security, data security, privacy, etc.,” Teng said. “[They] cannot allow China’s censorship system to spread to the West and all over the world.”

Growing Concerns

Concerns have been growing for some time over overseas censorship and surveillance via WeChat, with the US banning any US-based person or entity from doing business with Tencent, and rights activists describing it as a “jail” that keeps foreign users within reach of the CCP. law enforcement operations.

Launched by Tencent in 2011, WeChat now has over 1.1 billion users, second only to WhatsApp and Facebook, but the company keeps users behind China’s complex system of blocks, filters and human censorship known as Great Firewall, even when physically in another country.

The app is also used by China’s state security police to monitor and harass exiled dissidents and activists who speak out against human rights abuses in the country or campaign for democratic reform.

And it’s not just Chinese nationals who are targeted.

In May 2020, CitizenLab researchers at the University of Toronto’s Munk School of Global Affairs warned that anyone who uses WeChat, even if they have lived their entire life outside of China, is “subject to ubiquitous surveillance content that was previously considered exclusively for accounts registered in China.”

Documents and images transmitted entirely between unregistered accounts in China are subject to content monitoring in which these files are scanned for politically sensitive content in China, according to the report, titled “We Chat, They Watch.” .

The report warned of “very serious” security and privacy issues associated with WeChat and other Chinese apps, and called on app stores to highlight the risks to users before they don’t download these apps.

And a recent report detailing huge amounts of user data collected by TikTok has also raised privacy concerns around the hugely popular video app, which is owned by Chinese internet company ByteDance.

In a technical analysis of TikTok’s source code, internet security research firm 2-0 found that the app, which is the world’s sixth most used with projected ad revenue of US$12 billion in 2022, was “too intrusive” and that the data collection was “excessive”. .”

While TikTok claims user data is stored in the US and Singapore, the report found evidence of “numerous subdomains in the iOS app scattered around the world”, including Baishan, China.

As of September 2021, TikTok had over 1 billion active users worldwide, including 142.2 million in North America.

The report revealed that TikTok uses a number of permissions considered “dangerous” by industry experts.

Translated and edited by Luisetta Mudie.

California commissioner wants cuts from insurers in new wildfire framework


California Insurance Commissioner Ricardo Lara on Wednesday submitted insurance pricing regulations to the California Office of Administrative Law to recognize and reward wildfire safety and mitigation efforts by owners and businesses.

According to Lara’s office, the settlement is the first in the nation to require insurer rebates for consumers under the Safer from Wildfires framework created by the California Department of Insurance in partnership with emergency preparedness agencies. of State.

The Office of Administrative Law has 30 business days to determine whether the proposed settlement meets the requirements of the State Administrative Procedure Act. Once approved, the text of the settlement will be filed with the California Secretary of State and will become state law.

“My groundbreaking regulations will help more Californians find insurance they can afford,” Lara said in a statement. “It aligns insurance discounts with accelerated fire safety actions by our state emergency officials and local governments. And, most importantly, it will save lives by helping California protect itself from wildfires. »

The regulations incorporate “Safer from Wildfires,” a new wildfire safety measures framework created in January by a partnership between CDI and emergency preparedness agencies in Governor Gavin Newsom’s administration, including including the California Department of Forestry and Fire Protection, the Governor’s Office of Emergency Services, the Governor’s Office of Planning and Research, and the California Public Utilities Commission.

Once approved, the settlement will require all insurance companies to submit new rates that recognize the benefits of safety measures such as improved roofs and windows, defensible space, and community-wide programs such as Firewise USA. and the Fire Risk Reduction Community designation developed by the State Council of Forestry and Fire Protection, which currently includes Los Angeles, Santa Barbara, and Butte counties as well as local cities and districts.

The StrongerCA Coalition, a group of insurers including the American Property Casualty Insurers Association, released the following statement on behalf of APCIA Vice President Mark Sektnan in response to Lara’s regulation.

“The Insurance Commissioner’s regulations will send a strong signal to consumers and businesses to better prepare for extreme wildfires, but more needs to be done to manage the growing risk of climate-induced wildfires. in California while protecting accessibility and affordability of insurance Not only does the mitigation protect homes and properties, but ongoing supply chain delays and inflation are putting additional pressure on homeowners that recover and rebuild after a wildfire, so preventing fire damage is even more critical.

Carriers California Disaster Natural Disasters Wildfire

Interested in Carriers?

Receive automatic alerts for this topic.

James Harden now acts as scout

(Photo by Tim Nwachukwu/Getty Images)

It was recently announced that free agent Montrezl Harrell has been signed with the Philadelphia 76ers.

This started the next chapter of his legendary career.

The plan is to use Harrell as a forward or backup center, which should give the 76ers a huge boost up front.

It only makes the team more exciting with a better chance of finally delivering on their promise of going far in the playoffs.

Apparently, there was a very special member in Harrell’s recruiting process.

Adrian Wojnarowski reported that James Harden “played a role in bringing Harrell to Philadelphia”.

He said Harden’s new contract allowed the 76ers the financial flexibility to land Harrell.

Moreover, Harden himself actively recruited the player and sold the idea of ​​him being a backup center for the team.

Harden’s pitch built on the pair’s experiences playing together for the Houston Rockets.

It shows that Harden doesn’t just talk and really wants to improve the team and is willing to work to make that happen.

Harden’s hard work

Harden is definitely a centerpiece of the team.

But he has taken on a new role, that of a team leader who inspires and sacrifices himself for the crew.

He’s been a lot more encouraging for his team lately.

He also accepted personal sacrifices and spent a lot of time training in the gym.

It’s a side of Harden that we’re not really used to.

Will this make the 76ers actually championship contenders or will this be another season where the team fails?

Harden’s stepping up might be the missing piece the team needed.

What are the best crypto tokens to get excited for


Jhe coin market can be described as a gift that keeps on giving. There is usually a crypto token to watch out for. This token usually has the potential to increase in value exponentially. Most of the wealth generated by crypto comes from these price spikes. This coin will show you which crypto tokens to expect for long-term benefits.

Ripple (XRP) – The OG in Town

Ripple is one of the oldest projects in the coin market. Although it has been around for a while, it has continued to do well. There was some controversy over Ripple in the news several months ago, but those talks have long since ended, and it looks like the crypto token is ready for another run to the top. Ripple is a project that serves as a cryptocurrency and blockchain platform for digital payments. When first introduced in 2012, Ripple existed as a simple payment, similar to how SWIFT is used for international money transfers. XRP is the cryptographic token that works on this payment platform.

It will interest you that XRP is pre-mined and available on several crypto exchanges around the world. This crypto token is designed to act as an intermediary between currencies or networks – in the form of a temporary settlement layer. Ripple does not confirm transactions via blockchain mining, as you will find on several crypto projects. Instead, transactions are validated through a group of servers owned by the bank. Ripple has many advantages over Bitcoin.

For starters, Ripple can process transactions faster than Bitcoin. Additionally, Ripple’s transactions do not require as much energy as those of Bitcoin. It also costs little to process transactions on this blockchain.

Uniswap (UNI) – The OG Decentralized Crypto

Every crypto user and trader is familiar with centralized exchanges. However, decentralized crypto exchanges are also a big deal in the coin market. Uniswap is one of the oldest decentralized crypto exchanges in the world. This crypto exchange is hosted on the Ethereum blockchain. As a decentralized crypto exchange, Uniswap does not work with a traditional order book system. Instead, Uniswap uses an automated market maker to ensure that all of its trades go through accordingly.

Because Uniswap was established on the Ethereum network, it is compatible with many ERC-20 tokens. Every user or trader can access a large pool of resources using this trading platform. Developers can even list their tokens on this crypto exchange for free. Uniswap has an open-source code. As a result, you can expect anyone to copy their code and use it to build their decentralized wallet, app, or exchange. With Uniswap, users are always in control of their funds. Uniswap has over $2 billion worth of cryptocurrencies in its liquidity pool. UNI is the native token of this cryptocurrency. Users must use UNI tokens to pay transaction fees on this platform. UNI is also traded on several crypto exchanges around the world.

AdirizeDAO – The unique project

AdirizeDAO is a unique project in the coin market and has successfully attracted users and investors from all sides. Unlike most crypto projects in the coin market, AdirizeDAO is not interested in building itself as the most valuable crypto coin. This project is unique and instead aims to be one of the biggest stablecoins in the crypto market. Recently, most of the stablecoins in the market are usually pegged to the US dollar. AdirizeDAO plans to end this trend. The Adirize development team has announced its intention to finally create a stablecoin that will not be pegged to the dollar.

Instead, AdirizeDAO will be pegged to a pool of cryptocurrency assets. These assets will not be leased. Instead, they will fully belong to the Adirize project. To maintain the value of this pool of liquidity, AdirizeDAO introduced a floating reserve currency backed by a pool of assets. The development team’s strategy to maintain the value of their token was to focus on supply expansion rather than market appreciation. AdirizeDAO has an effective mechanism to track market pressure and activities. If you want to be part of the AdirizeDAO community, you can learn more about them and participate in their presale.

Adirize DAO (ADI)

Presale: http://join.adirize.com/

Website: http://adirize.com/

Telegram: https://t.me/AdirizeDAO_Official

Disclaimer: This is a press release article. Coinpedia does not endorse or is responsible for the content, accuracy, quality, advertising, products, or other materials on this page. Readers should do their own research before taking any action related to the company.

Was this writing helpful to you?

Castellum Launches Updated Framework for Green MTNs


GOTHENBURG, Sweden, September 6, 2022 /PRNewswire/ — In 2016, Castellum issued its first Medium Term Green Note (MTN). In recent years, the demand for green MTNs has increased. Castellum is now releasing an updated frame with even stricter durability requirements.

Castellum believes that sustainability is a prerequisite for economic growth. As a long-standing major player in the industry, promoting the development of a sustainable society is a natural part of our job.

Funding through the issuance of green bonds under our MTN and euro MTN (EMTN) programs is an opportunity for investors to bring capital to some of our most sustainable projects and properties. The terms and conditions of the green MTNs issued match those that apply to other bonds issued under Castellum’s MTN and EMTN programs, with the crucial difference that the proceeds of the green MTNs can only be applied to eligible projects and assets. to the green frame of Castellum.

“We are seeing a clear demand for green NTDs and this, over time, allows us to reduce funding costs. Thanks to our strict sustainability requirements, our bond investors can be assured that the projects selected genuinely support the transition to a more sustainable society,” said jens anderssonResponsible for the Treasury of Castellum AB.

The updated framework has been adapted to the ICMA 2021 Green Bond Principles and EU taxonomy. Castellum has partnered with Handelsbanken to develop the framework for green NTDs. Castellum also engaged research firm Cicero Shades of Green for an independent assessment of Castellum’s sustainability initiatives and the level of ambition of the framework. The general opinion is that Castellum’s governance of its sustainability initiatives is excellent, and the setting has been given the medium green shade of Cicero. The framework, the second opinion and the updated MTN program are all available on the Castellum website.

For more information, please contact:
jens anderssonHead of Treasury Castellum AB, +46 76-855 67 02

Philippe Ellandsustainability director Castellum AB, +46 70-320 63 26

About Castellum

Castellum is one of the largest listed real estate companies in the Nordic region that develops flexible workplaces and smart logistics solutions. From June 30, 2022the value of the property was approximately 185 billion Swedish crowns, including the ownership share of the Norwegian company Entra ASA. We are active in attractive northern growth regions. One of our sustainability goals is to become fully climate neutral by 2030 at the latest. Castellum is the only Nordic real estate and construction company elected to the Dow Jones Sustainability Index (DJSI). Castellum stock is listed on the Nasdaq Stockholm Large Cap.

Beyond all expectation.

This information was brought to you by Cision http://news.cision.com


The following files are available for download:

SOURCE Castellum

Fugitives from Vassar Treatment Center allegedly stole car, led police in pursuit in Dearborn | New


VASSAR, Mich. (WJRT) — “It’s a crazy story, from start to finish, like it’s just one of those things that comes out of a movie,” says Bay County’s Marissa Kratz.

This crazy story started in Vassar with a stolen car and ended with a police chase in the Detroit area that ended in him being smashed into a fence.

Two people are believed to have walked away from a juvenile drug treatment center in Vassar and stole the car.

The car belongs to Kratz, who was in the process of moving house, which is usually a stressful business.

And then his vehicle disappeared.

Kratz was so happy when she bought her Malibu a few years ago that she had her picture taken with it on the hood.

She parked this car on Sheridan Street in Vassar last Monday, in exchange for a friend’s truck while she was moving house.

“I had to leave my car overnight to move the rest of my stuff,” says Kratz.

Thinking she would be back in a few hours, she left the keys in the car. A cracked water pipe in his apartment delayed his return.

The next morning she was informed that her car was gone.

“I was skeptical at first wondering if it had been towed,” Kratz says.

She called the Vassar police. Wednesday morning, the police called her back.

“They stole my car, then took it to Dearborn and started a police chase,” she says.

The “they” in this story are two young people who were at Wolverine’s Human Services campus in Vassar.

It’s an unsecured residential drug treatment facility for minors and they apparently walked a few miles and stole Kratz’s car.

Tuscola County District Attorney Mark Reene confirms the two minors, two other minors and an adult were arrested in Dearborn after a police chase, which ended in a crushing into a fence.

The police investigation continues. Kratz says Wolverine management apologized for the steps.

“They offered a week’s rental and $100 in gas cards,” says Kratz.

“It’s part of life at Vassar,” says Chris Oprea.

He lives a few houses away from where the car was stolen and worked at Wolverine and says he enjoyed his time there and the teenagers were no problem for him.

“They’re a long way from home and we’re really in the middle of nowhere here, so I think a lot of them, let’s see if I can get there, they usually don’t,” Oprea says.

Kratz says police say his car has damage to the front end but is drivable. She doesn’t know when she will get it back.

Moving can be stressful and then there’s Marissa’s story.

“I have to laugh about it, it’s like a soap opera,” she says.

I left a phone message for Wolverine Human Resources, but got no response.

Criminals claim to have stolen NATO missile blueprints • The Register


In short NATO officials are investigating after criminals put up for sale on dark forums data they say is “classified” information stolen from European missile maker MBDA.

MBDA denied any sensitive material was compromised and said it refused to pay the gang a ransom, saying the data for sale was obtained from an “external hard drive” rather than its systems.

According the bbcwho saw samples of the files and allegedly spoke to the criminals, 80 GB of data – which he was unable to verify – is offered for 15 Bitcoins, or approximately $297,000, and the extortionists claim to have made the minus one sale.

The data would include designs for the common Land Ceptor modular anti-aircraft missile, which the BBC says was used in the Ukraine conflict. The criminals described the data set as “design documentation, drawings, presentations, video and photo materials, contractual agreements and correspondence with other companies”, and also claimed that it contained personal information about employees of the companies. defense companies.

The Italian division of MBDA, meanwhile, claims to have filed a complaint with the police for attempting to blackmail the company and claims not only that there was no real network penetration, but that the data was neither classified nor sensitive.

The BBC nevertheless claimed that the sample it had seen included documents labeled “NATO SECRET”, “NATO CONFIDENTIAL” and “NATO RESTRICTED”.

A former NATO official said that although NATO tends to overclassify documents, a secret-level classification is not applied lightly. If the labels are indeed correct and recent, they said, “This is really the kind of information that NATO doesn’t want released to the public.

The criminal sellers would not verify whether the data for sale online came from multiple sources or just MBDA, but it is understood that the NATO investigation is centered on one of MBDA’s suppliers, which could mean that any blame could ultimately lie with a third party.

TikTok’s Android app vulnerable to one-click takeover

Microsoft security researchers would like TikTok users to know that if they accidentally click on a malicious link that fails to take control of their account, please send their gratitude to Redmond.

It turns out that a specially crafted link sent to the Android versions of the TikTok app, both the Chinese version and the international flavor, could give an attacker full control over the victim’s account as soon as he has click on it.

Microsoft Security Researchers said they first found the bug in the Android version of TikTok in February, which the social media company quickly patched due to its high severity. According to Microsoft, there is no evidence that the exploit was used in the wild.

At the heart of the flaw is a method used to circumvent TikTok’s deep link verification process by forcing code to load an arbitrary URL into WebView, the Android component that allows URLs to be opened inside apps.

From there, the malicious URL can access JavaScript bridges that allow WebView to talk to TikTok, giving the attacker the ability to access and modify a victim’s profile, post private videos, send messages and download publications.

Exploiting JavaScript bridges isn’t new – it’s been a method used to compromise Android apps since at least 2012 when he was demonstrated at Black Hat. In this case, researchers demonstrated how they could run malware inside an Android app after it was scanned by Google Play for malicious code.

Google made changes to Play Store policies in July 2021 that further restricted the misuse of interpretive languages ​​like JavaScript, Python, and Lua by Android apps, but it’s unclear to what extent these policies might have stopped abuse as Microsoft discovered in TikTok.

“From a programming perspective, using JavaScript interfaces poses significant risks…we recommend that the developer community be aware of the risks and take extra precautions to secure WebView,” Microsoft said.

Teen solves government encryption puzzle in an hour

A commemorative crypto puzzle struck on an Australian coin has been cracked, and it took the winner – an unnamed 14-year-old from Tasmania – just over an hour to complete a job that was supposed to take much longer. time.

The Australian Signals Directorate (ASD), which handles foreign intelligence as well as cyber warfare and security tasks in the same way as the American NSA or the British GCHQ, has had a special 50 cent coin minted in a limited series of 50,000 to mark the agency. 75th anniversary.

Security-conscious government agencies often use encryption puzzles, making another a fitting commemoration. ASD chief executive Rachel Noble said the coin featured four different layers of encryption that were increasingly difficult, with clues also located on the coin.

“There’s a challenge out there to see who can correctly break all the layers, and would you believe it, yesterday the coin was tossed at 8:45 a.m.; we’ve got our web form up and running…and believe it or no, a 14-year-old boy in Tasmania, was the first person in just over an hour to pass all four diapers,” the Australian Broadcasting Corporation said. reported Noble as they say.

“So we hope to meet him soon… to recruit him,” Noble said.

Noble did not share what the hidden message on the coin is, saying only that it contained uplifting messages, which she encouraged others to come out and resolve. Noble said the first layers of the puzzle could be solved with pencil and paper, but she cautioned that the final layer might require a computer.

To those who were dismayed at having lost a chance to solve the puzzle, Noble revealed that the game was not quite finished yet: she said there was a fifth level of encryption hidden on the piece that no one had cracked yet, but an intelligence agency whose code was just cracked could say anything to save a little face.

2.5 million student loan records exposed to hacking

Edfinancial Student Loan Servicers and Oklahoma Student Loan Authority (OSLA) contact more than 2.5 million borrowers to notify them that a breach may have exposed their names, addresses, emails, phone numbers, and social security numbers.

Edfinancial and OSLA are not directly responsible for the breach, which was suffered by Nebraska-based Nelnet Servicing, which provides technical services to the two student loan companies. Nelnet also handles loans, but said none of its borrowers were affected by the breach.

Sample letters and a statement from Nelnet filed with the State of Maine indicate that between June and July 22, 2022, an unauthorized party gained access to the records in question. Nelnet said that after noticing the breach, it blocked the activity, patched the vulnerability that led to the breach, initiated an investigation and notified relevant departments.

The US Department of Education has also been notified and law enforcement is investigating, Nelnet said.

As has been the case with previous large-scale breaches, Nelnet said it was offering free credit monitoring services to affected borrowers through Experian, which itself has been deemed vulnerable to account duplication for criminals. , who used them to misappropriate the identity of Experian customers.

Nelnet customers who had their data stolen wasted no time launch a class action against the company, which was filed Tuesday in a Nebraska district court.

The lawsuit asks that Nelnet be forced to comply with higher security standards, as well as seeking an unspecified amount of damages awarded to the class, which includes students from across the country.

Samsung says US customer data was stolen

Samsung has admitted to being the victim of a cyberattack that resulted in the theft of data from some of its US customers in late July.

According to the Korean technology company, an unauthorized third party stole the data, which Samsung said in early August contained personal customer information.

Although no social security numbers were stolen, Samsung admits that customer names, contact and demographic information, date of birth and product registration information may have been taken, the specific stolen information vary from customer to customer. samsung said.

The Galaxy maker said it had taken steps to secure the affected systems and was coordinating with law enforcement, but Samsung’s statement made no mention of how many customers may have been affected.

There’s nothing Samsung customers should do immediately to protect themselves, the multinational said, though it advises kit owners to be wary of unsolicited communications asking for personal information or pressing a link. , not to click on links or download suspicious attachments. emails and review their Samsung accounts for suspicious activity.

While customer data theft may be new to Samsung, breaches of its perimeter resulting in large-scale corporate information theft are not, as the tech company saw 190GB of its internal files, including Samsung Knox source code and the company’s bootloader, released online earlier this year.

The data was stolen by the Lapsus$ online extortion gang, believed to be based in Brazil, who had previously hacked and released files from Nvidia, game publishing company Ubisoft and other high-profile targets .

About the previous breach, Samsung said The register that he replied by “implementing[ing] measures to prevent further incidents of this type”, and that it would continue to serve its customers “without interruption”. ®

A Bridge Over Problematic Data: Giving Enterprises Access to Advanced Machine Learning


From banking to healthcare, nearly every organization wants to implement advanced AI and machine learning-based applications that transform efficiency and create new services and business opportunities.

They want smarter apps for important use cases like real-time fraud prediction, better customer experience, or faster, more accurate analysis of medical images.

The problem that most organizations face is that they store data in different forms and locations, each of which may belong to a business unit or department. Making this data usable by advanced applications is demanding.

Before the advent of the new paradigm – the smart data fabric – the approach would have been to create a data lake or warehouse, using the relatively low cost of storage and compute. The organization also likely uses time-consuming ETL processes to standardize data.

The traditional data lake is slow and increasingly swampy

This approach, which is still widely used, has had its victories but creates a centralized repository that makes data difficult to analyze and often fails to provide consistent or timely answers to business questions. It tends to bring the data to the query rather than the query to the data, creating latency and often causing significant and unnecessary duplication.

This makes it very difficult to adapt new data sources in response to changing business needs, which undermines organizational agility. It is also unable to meet the current demand for clean data suitable for new composite applications that are enabled by AI and use machine learning (ML) and integrate with massive, pre-existing datasets.

In truth, almost every organization still struggles to provide a consistent, accurate, and real-time view of their data. The vast majority still keep data in separate silos, with perhaps only 5% able to use data that is less than an hour old. It will not, for example, allow the transition from relatively simple fraud detection to prediction, capable of identifying and tracking money laundering activity in extremely complex financial flows.

Organizations make too many decisions using outdated information, overwhelmed by the variety of data sources and the complexity of unifying them. A global study conducted earlier this year by InterSystems found that nearly all participating finance organizations (98%) have data and application silos and significantly more than a third (37%) said their biggest challenge in terms of data was the time it took to access that data. Like so many organizations, these financial firms need to be able to see into their complex, heterogeneous data and receive fast, consistent answers to their business questions. They need an architecture built around business needs, rather than a large, convoluted data warehouse or lake that becomes just another rigid silo.

This will allow companies to use ML algorithms that they know will bring them great benefits. But advanced analytics and AI depend on clean, harmonized data, which is hard to achieve in a repository. This is why the level of innovation in ML models currently exceeds the rate and scale of deployment. The absence of reliable data makes it impossible to integrate these models into the operational applications that generate them. In the meantime, the volume and complexity of data continues to grow.

Bring the query to the data

Fortunately, the concept of Smart Data Fabric removes most of these data issues, bridging the gap between data and application. The framework focuses on creating a unified approach to access, data management and analysis. It builds a universal semantic layer using data management technologies that stitch together distributed data regardless of location, leaving it where it resides. A fintech organization can create an API-enabled orchestration layer, using the Smart Data Fabric approach, providing the business with a single source of reference without the need to replace systems or move data to a new one. central location.

Capable of performing in-flight analysis, more advanced data management technology within the structure provides real-time information. It connects all data, including all information stored in databases, warehouses, and lakes, and provides vital, seamless support for end users and applications.

Business teams can dig deeper into data using advanced features like business intelligence. The organization can deploy tools using machine learning algorithms that enable next-generation applications.

It’s a paradigm shift, bringing together two worlds of legacy and new data for advanced, ML-powered use cases. This is critical, enabling a single view of data across what can be a complex organization like a financial institution that has a lot of legacy silos. The technologies that make up the fabric transform and harmonize data from multiple sources on demand, making it usable for a variety of business applications.

Organizations need an intelligent data fabric to bridge all of their many types of data in different locations and sources, to gain seamless access in real time and to be able to deploy the next generation of applications powered by the AI. In fact, it’s not about technology, it’s about execution and how the fabric serves business agility, future-proofing businesses, and bringing revenue-generating transformation within their reach.

About the Author

Saurav Gupta is a sales engineer at Intersystems. InterSystems is the engine behind the world’s most important applications in healthcare, business and government. Everything we build is designed to drive better decisions, actions and outcomes for the people who stake their lives and livelihoods on our technology. We are guided by the IRIS principle, namely that software should be interoperable, reliable, intuitive and scalable.

Livingston Workshop to Discuss Asset Security and Compliance Framework Proposals


The Scottish Procurement Alliance has announced details of a pre-tender engagement workshop for the upcoming ASC1 Asset Safety & Compliance framework.

The workshop will take place at the organization’s offices in Livingston on Thursday, September 15 at 9:30 am.

SPA invites its public sector partners to attend the event to discuss proposals for the new framework. The workshop is designed to provide SPA with an overview of the requests, requirements and help shape the framework.

The ASC1 framework will give public sector bodies, including local authorities and housing associations, the opportunity to find expertise in a range of fire, gas and building safety, property protection and maintenance services for the park of assets, all in a single framework.

The framework will consolidate existing frameworks regarding asbestos (AS2), fire safety (FS1) and vacant properties (V7) while adding water management and heating services.

SPA explained that the exact scope may change after pre-tender engagement, but the services listed below are those currently under consideration:

• Workstream 1 – Asbestos advice, investigations and removal

• Workstream 2 – Servicing, maintenance and consulting of fire safety systems

• Workstream 3 – Protection of vacant assets and associated services

• Workstream 4 – Water analysis, treatment and management

• Workstream 5 – Servicing and maintenance of gas appliances and equipment

• Workstream 6 – Testing and maintenance of elevators and lifting equipment

• Workstream 7 – Lightning and Fall Protection Equipment

• Workstream 8 – HVAC Equipment Care and Maintenance

• Workstream 9 – Electrical Safety Testing

• Workstream 10 – Radon gas analysis and repair services

You can register for the workshop at https://www.scottishprocurement.scot/news/events/asc1-asset-safety-compliance-pre-tender-engagement-workshop/

Rick and Morty Creators Call the Multiverse a Sci-Fi ‘Cheat Code’


Long before Marvel Studios called on the Multiverse, rick and morty were already jumping through the realities and giving fans a wide range of hilarious variants. However, this sci-fi plot is starting to thicken for series creators Dan Harmon and Justin Roiland.

In an interview with ComicBook.comHarmon explained how they initially approached such a daunting prospect by having Rick Sanchez pull off his first big multiversal leap soon enough in rick and morty. At the same time, it was Roiland who coined the term “cheat code” for the series’ antics.


RELATED: MultiVersus Could Have A Lot Of Fun With Rick And Morty Content

“[It’s been] something that we leaned into on this show,” Roiland said, adding that it’s the multiverse that gives them the opportunity to introduce weird variations of the main cast and then go back to the standard lineup of characters like if nothing had happened. Both writers recently offered some form of advice to their MCU counterparts saying it can be easy to keep up with so many variants and timelines, although in their case it’s something they chose to. adopt from the start. “Not only is it a cheat code, but it’s also this cool sci-fi… It’s an awesome thing, which might even be fucking real,” Roiland said, referring to the possibility of the existence of different and multiversal realities. travel, which could one day be proven by modern quantum physics.

According to Harmon and Roiland, tapping into the multiverse was never something they were afraid to do. In fact, it’s this very resource that gives the series much of its unique humor, and why rick and morty is an advertising powerhouse. Ultimately, the multiverse game is what makes rick and morty “Not like the norm, you know, the show, but it’s still something we have to do.”

rick and morty Season 6 will premiere on Adult Swim in September, though one aspect that might get fans more excited about this new chapter in the series is how the previous season’s finale took a more story-driven and canonical which gave more details to Rick’s story. . In that sense, it’s almost as if Harmon and Roiland are ready to take down this cheat that the Multiverse has been up to now and finally provide a straighter path to show that it will eventually come to an end.

Thankfully, that won’t be happening anytime soon, as the current production of 10 episodes per season should see rick and morty last until season 10 at least. In the meantime, those waiting for the show to return can donate MultiVersus a hit with Morty added to the game’s roster imminently as part of the Season 1 updates.

rick and morty Season 6 will air on September 4, 2022.

MORE: Other Game of Thrones Characters Who Could Work In Multiversus

Source: Comicbook.com

NASA’s Artemis 1 is off for a second launch attempt but still troubled, catch it live here


Liftoff of NASA’s Artemis I is scheduled for later today, as long as teams can overcome refueling issues. As of now, the launch is scheduled for 2:17 p.m. (ET) and you can watch live below.

The Artemis program has been one of the most anticipated in recent history. Artemis I is an unmanned mission that will lay the groundwork for future launches that will include returning humans to the surface of the Moon, and possibly Mars. It was originally scheduled to take place on August 29, 2022, but was delayed due to a critical engine issue.

On Monday, an engine purge problem occurred, prompting NASA to scrap its first Artemis launch attempt. When asked what an engine purge was, NASA replied: “An engine purge is part of our regular pre-launch operations to prepare the engines. Teams prefer not to put in super cold fuel in hot engines, so we first run liquid nitrogen through them to cool them.” Now, it looks like the team ran into a different problem ahead of today’s scheduled launch.

A liquid hydrogen leak is now the culprit hampering Artemis I launch attempts. There appears to be a recurring leak in a cavity between the ground side and flight side plates of a quick disconnect in the engine section. At this time, the teams are discussing possible troubleshooting attempts. As of this writing, the team is again attempting to warm up the quick disconnect to try and reset the seal.

The launch window is still scheduled to open at 2:17 p.m. as NASA continues to try to fix the quick disconnect issue. You can watch live above via NASA’s official YouTube channel.

You can stay up to date with the launch of Artemis I here on HotHardware, as we’ll update this page if anything changes.

Coronavirus – COVID-19 – InsuranceNewsNet


Health & Medicine Business Daily

2022 Sep 02 (NewsRx) — By a News Reporter – Staff News Editor at Health & Medicine Business Daily — Investigators release new report on COVID-19. According to news from Punjab, Indiaby NewsRx correspondents, the research said, “After the outbreak of COVID-19, the insurance industry suffered losses in terms of reduced demand for an insurance policy, lower return on investment and ‘increase in claims settlement’.

News correspondents got a quote from the research of Chitkara University“Thus, risk management plays an important role in mitigating risk for businesses. However, risk management is restricted as a predefined approach to manage threats of uncertainty resulting from activity or human error. Additionally, the life insurance industry faces the challenge of paying claims in the event of an increase in the mortality rate after the COVID-19 outbreak. So there needs to be a better risk management framework. This document identifies the gap between the existing risk management model and the model specified by IRDA and proposes a model to mitigate insurance risk.

According to the journalists, the research concluded: “The study posits that whether or not an individual is more suitable for life insurance can be decided based on a simple factor. By using this risk management tool/model, a life insurance company can reduce its risk of providing insurance to a high-risk customer.

For more information on this research, see: A Risk Management Framework for Life Insurance Companies. Review of corporate governance, insurance and risk management, 2022.9(1). The publisher of the Journal of Corporate Governance, Assurance and Risk Management is CIRU – Centar za istrazivanje i razvoj upravljanja doo

A free version of this review article is available at https://doi.org/10.51410/jcgirm.9.1.6.

Our news editors report that more information can be obtained by contacting Sonal Trivedi, Chikara Business School, Chitkara University, Punjab, India.

(Our reports provide factual information on research and discoveries around the world.)

Open source bait and switch


I was reading this article and wanted to post a comment but felt it warranted a reply article. First off, if you don’t know me, I’ve written a ton of Open Source code. Entire platform and then some. I think the general opinion that is expressed in this article and many things I see online are overly simplistic and dangerous.

We have to be paid

Who will pay your salary?

People have different answers for open source business models. For example “consulting” or the vague “support”. I always wonder if these people have ever tried to sell advice? Or maybe “support”.

People don’t buy these things. Especially in a declining economy. The way sellers usually sell these things is the clue that you might be violating a license and it would be much easier if you paid and got the business license. I will even add the “support” for free. Yes, you can get sponsors if you spend all your time on the phone. It’s a never-ending sales process. Find leads and make calls. Running this type of business requires a lot of overhead.

Some developers use problematic open source licenses which they can then exploit for sales. But then they are vilified as “not open source enough”. There is no victory there.

Sun Microsystems paid my salary for part of my OSS work. They plummeted and fell from a valuation of over $200 billion, eventually selling for around $7 billion. Granted, it wasn’t because they were open source. It’s just an anecdote, and it didn’t help. Real people are losing their real jobs because open source doesn’t make money. Even when it is, it pays very little. People used to say it ended with a smaller piece of a bigger cake. That’s true, but that only applies to high rollers and you have two choices: become the high roller or watch a high roller cash in on your hard work.

Don’t get me wrong, I’m not against people taking advantage of my work or even big business. I do OSS for fun and I love the idea of ​​people succeeding through my work. But I feel the frustration that many developers feel, and the “open source advocacy” I see from people is problematic.

bait and switch

The bad thing is corporate cynicism. Take Google. They opened Android when there were no users. Businesses have built on it, and so have developers. Advocacy has formed around it because “it’s open source.” Then they released the closed source Google Play Services which then added the SaaS Firebase requirement for some core functionality (it’s free at the moment) and now we have deep vendor closed source dependencies impersonating for open source.

We don’t have to use Google Play Services if we want to create for Android. Sure. But it makes it much more difficult to create an Android app and if you don’t use it for certain things (eg push, buy, etc.) you get banned from the biggest Android market. A large majority of developers just “use it”. This means anyone who wants to wipe Google Play off their Android device in favor of a 100% open source solution; will find that they have very few software choices for applications.

Take elastic research. They were open source and were killing it. But AWS was forking and not really helping their bottom line. So Elastic changed their license to block AWS. AWS launched its own fork. Some people vilify Elastic in this story, but those people probably never had to fight Amazon for the survival of their business. In this case, both sides have armed open source in a trade fight.

The case of Java is slightly different. Java was not open source and was later made open source. It always kept IP on the tongue. So I get some hold of Oracle on the project and I accept that. It’s good that there’s a steady hand of the ship and that has helped Java’s success. The problem with Google’s lawsuit was that Oracle tried to extend its IP address to include APIs. It was a mistake.

GPL is the best license

About a decade ago, a startup called RoboVM released an open-source compiler that translated Java into native iOS apps. It was pretty cool, and I talked quite a bit with the founder of JavaOne. At the time, we were considering creating our own virtual machine or choosing a solution such as RoboVM. We ended up with the first one and built our own virtual machine which was much simpler and suited our needs better (it’s also open source).

This decision was based on technical merits and I think it paid off, but I still have huge respect for the RoboVM team. My concern was Apple. They break stuff, a lot… Building a low-level virtual machine is a dangerous cat-and-mouse game where Apple would suddenly change something and we’d be stuck. A secondary concern was monetization. I understood that the RoboVM team would have to pay the salaries of its employees and founders one way or another. How to make money with an open source compiler? Note that this was ten years ago and there were no precedents like Zig that we could consider as a model.

At some point my concerns about Apple’s policies materialized and Apple added a bitcode requirement when targeting certain platforms. RoboVM spent a huge amount of time working on bitcode support and decided to shut down its source code. They realized they couldn’t fund continued development without it. Don’t take this as a judgment on their decision. I fully understand that, as I said, OSS monetization is very hard.

The GPL protected the community by forcing RoboVM to release the final version code before the bitcode was migrated. This allowed for a few forks of the code in later years, but it’s still not maintained. The company was purchased by Xamarin and quickly discontinued as the latter was purchased by Microsoft. Without the GPL, the code might have been inaccessible. It also forced third parties to release their code.

In this regard, I’m a big proponent of the GPL over more permissive licenses like MIT, BSD, Apache, etc. I think as a community we should prefer a license that preserves community rights as opposed to corporate rights. It also provides a good monetization option to the creator of the project. Just renew the license as owner license and charge for it. Unfortunately, the GPL is often a failure for many developers because they mistakenly assume it’s bad for them. The opposite is true. The GPL is one of the best ways to preserve community rights in the long term.

Have things changed?

I already mentioned Zig. There are many other examples of successful foundations such as SQLite, Mozilla, etc. Getting to this point is usually difficult and doesn’t necessarily work for all open source projects. For example, cURL is used by just about everyone, but I don’t think we’ll see a cURL foundation. Also note that all of these projects are based in US tech hubs. In my experience, it is much harder to get sponsors in other territories.

Does this mean that all open source should be a hobby or an all-encompassing mega-project?

Unfortunately, I don’t have good answers. But I have a problem: overzealous open source advocates. You are not helping!

Open source is becoming a business-only game. It is being used as a weapon between tech companies fighting each other. There’s a name for it in retail: loss leader.

In retail, a large supermarket would sell certain products at a loss and advertise that incredibly low price. It attracts audiences who buy other things along the way and so the supermarket ends up making a profit. But the reason is to drown out the competition. The competition seems expensive (since they can’t sell at a loss). They go bankrupt and the big retail company raises prices. Initially, it looks like we got a great deal from the competition, but we end up losing. For this reason, some regulators prohibit such practices because they end up destroying a market.

Open source is similarly and cynically used by big tech. They form “communities” by hiring armies of developer relations professionals to create a masquerade of grassroots enthusiasm. Sometimes they don’t need to monetize the market, that’s enough to keep the competition out.


I love open source and I think it’s remarkably important. That’s why we shouldn’t let corporations weaponize it. We need diversity within the ecosystem and we need to support smaller critical projects. The idea of ​​”distribution” to open source projects or “consultation” is not viable.

Big companies are using open source as a weapon to fight each other, we seem to benefit from it in the short term. But as they win, the entrepreneurial spirit takes over and they double in control.

The solutions I propose are:

  • Use the GPL – it’s there to protect the rights of the community. No wonder companies don’t like it.

  • Don’t be an OSS puritan – small businesses need to make money. They will offer SaaS, closed source extensions, etc. It’s OK.

  • Big corporations are not benevolent – ​​the advocacy I see around FAANG (MAANG) corporate OSS projects is problematic. They do not support OSS. They use it and exploit it. Don’t get me wrong, I’m grateful for their code and it’s wonderful that they release it. But we have to be careful, they have fiduciary requirements that could conflict with doing the “right thing” by OSS standards.

I don’t know if the next thing I will do will be OSS. I don’t know if I’ll choose GPL because, like I said, people have a problem with that. But I do know this: if you’re an open source advocate. Turn down the rhetoric. This is not helpful.

Also posted here.

. . . comments & After!

Iowa State and Danfoss Build America’s Largest Public Institute Dynamometer


Athletes can measure the performance of their heart and lungs on a treadmill, but testing the engine efficiency and emissions of a skid steer loader requires a much larger setup.

Iowa State University’s BioCentury Research Farm, located between Ames and Boone, showcased its new off-road vehicle chassis dynamometer lab at an open house this week — the result of a collaboration with the university and Danfoss Power Solutions, based in Ames. A dynamometer is a device used to measure engine power.

The lab won’t officially open until November, but the university previewed the facility during this week. Farm progress showheld nearby.

The dynamometer at the heart of the lab is a massive machine that can hold other massive machines on it – everything from “small utility tractors to very large four-wheel drives” including the largest agricultural sprayer or combine harvester, Stuart said. Birrell, a professor in the Department of Agricultural and Biosystems Engineering at Iowa State, who led the development of the lab.

After:Ames, first student from the University of Iowa to earn a prestigious NOAA scholarship and internship

How big is the Iowa State Dynamometer?

The new lab has the only dynamometer of its size in a public institution in the United States.

Each of the dynamometer rollers – of which there are four sets of six – weighs over 26 tons. The entire machine can operate at over 166 times the amperage load of that drawn from a household electrical outlet, requiring a special line to the installation from a nearby substation.

Birrell said that when the dynamometer is working, it usually generates energy that feeds back into the power grid.

Each set of rollers can independently test one corner of a vehicle up to 600 horsepower. Chains anchor vehicles in place to prevent them from rolling.

The dynamometer hasn’t worked with loads yet, but it can alternate speed and torque to simulate a climbing and braking vehicle. An experiment could last for days, but Birrell said vehicle tires can overheat if used for that long, so most tests will only last about three hours.

“It gives us a unique capability that we didn’t have before,” Birrell said.

After:A new TV show will premiere at Ames on Saturday, an educational series made by students

What will Danfoss Power Solutions use the dynamometer for?

Improving the efficiency of large vehicles is key to reducing harmful emissions, Birrell said.

Internal combustion engines release greenhouse gases and climate-changing air pollutants, such as carbon dioxide and nitrous oxide, which the lab can measure. It can also measure the production of carbon monoxide and hydrocarbons, as well as the amount of fuel used.

Danfoss Power Solutions donated $1.8 million for the lab. Birrell said that covered about two-thirds of the cost.

The laboratory is a public facility not controlled by Danfoss or any other private entity. But Birrell said it would give manufacturers an opportunity to improve vehicle design, particularly the powertrain, the system of parts that moves a vehicle forward.

Iowa State University showcases its new off-road vehicle chassis dynamometer lab during an open house at the university's BioCentury Research Farm, Aug. 31, 2022, in Boone, Iowa.

Lindsay Schleisman, a spokesperson for Danfoss Power Solutions, said the company plans to use the dynamometer for “all-terrain vehicle research and development”, to gather accurate and repeatable vehicle performance data that would otherwise be difficult to obtain outside.

The company has field testing capabilities at application development centers, including Ames, but Schleisman said the dynamometer will improve application support for customers and reduce design and research time.

“We will also continue to support the facility by providing our technical expertise, which in turn will help ISU support student education and research. We have a long, symbiotic relationship with the State of Iowa “Schleisman said.

More news on the state of Iowa, for subscribers:Iowa State professor with relatives in Ukraine develops tool to help refugees find housing

Phillip Sitter covers education for the Ames Tribune, including Iowa State University and PreK-12 schools in Ames and elsewhere in Story County. Phillip can be contacted by email at [email protected] He’s on Twitter @pslifeisabeauty.

A16z Crypto Launches Free NFT License Framework


While the copyright vulnerabilities have led to significant confusion around NFT licensing and various other legal issues, the crypto arm of venture capital firm Andreessen Horowitz (known as a16z) now believes it It’s time for a new set of licenses, designed specifically for NFTs.

Many people buy NFTs to own an avatar, artwork, or a number of other creative outlets. When purchasing an NFT today, they typically purchase a tokenID, along with metadata that “points” or references another content file. This creates confusion regarding the rights of NFT buyers in the vast majority of cases.

As explained in a blog post on August 31, a16z crypto is releasing a set of “Can’t Be Evil” free public licenses, designed specifically for NFTs and inspired by the work of Creative Commons.

“Can’t Be Evil” is a guiding principle of Web3 (and a riff on the slogan “don’t be evil” popularized by Google) stemming from a new computing paradigm: blockchains are computers that can make strong commitments and which are not controlled by people.

The Can’t Be Evil licenses extend this principle to NFTs by transparently codifying the rights of creators, buyers, and sellers of NFTs, so that each party has a common understanding of the rights associated with ownership of NFTs. Projects using the Can’t Be Evil licenses can make NFT ecosystems more trustworthy, providing licensees with a minimum baseline of standard real-world rights, thereby harmonizing real-world ownership with on-chain ownership.

The Can’t Be Evil licenses explicitly outline the buyer’s rights to the artwork for their NFTs, including whether those rights are exclusive, whether they include commercial rights, and whether they allow the buyer to modify, adapt and create derivative works from their purchased work.

SEE ALSO: NFT Weekly: The Future of Metaverse Innovation in China

Licenses are available free of charge for community use. The company has hired attorneys to help define six license levels, and the language is provided on GitHub for those who wish to adopt it.

The Language of Sailing >> Scuttlebutt Sailing News

The Language of Sailing >> Scuttlebutt Sailing News

Whether it’s fictitious names or people, Max Ebb and Lee Helm are regular contributors to Latitude 38 magazine. Here’s their column for the September 2022 issue:

I do a lot less long runs around the buoys these days. Weekday evening club races and longer point-to-point events are becoming my preferred format, and long ocean races are also high on my list – but the traditional all-day YRA races around the buoys seem less and less interesting, especially to those of us who have walked these routes several hundred times.

But when Lee Helm called one evening to see if I could replace a very big, very fast, very competitive boat in the most publicized regatta of the year, some of the old enthusiasm for a bay race kicked in, and I said yes.

“I’m a little rusty for the front,” I admitted, but Lee assured me that my role would be strictly sandbag; they already had more than enough fodder on the foredeck. “The doctor will come tomorrow. We need our maximum allowed rail meat.

I picked up Lee from his housing co-op near campus early on race day, but it turned out I had two passengers, not just Lee Helm.

“Like, I’m bringing another rookie sailor,” Lee explained as the two women piled in. “At 105 pounds, its weight will bring us exactly to the limit of our crew. And we can, for example, use the anchovy lane to avoid traffic.

“The Way of the Anchovies?” I asked.

“HOV lane, if you say it quick,” Lee’s friend explained. “High occupancy vehicles.”

We crossed the bridge and reached the yacht club in record time, and Lee led us to the boat. With barely time for introductions, the owner and skipper got us to work.

“Help the porch boning and bricking the back flapper,” he ordered.

“He means, ‘Help the foredeck crew remove the slats from the practice pipe and bend it into a compact shape,'” one of the crew members translated for the rookie sailor. – Full report

Live Updates: Russia Halts Gas Flows to Europe via Nord Stream 1


Swedish payments provider Klarna’s net losses quadrupled in a bruising first half in which the valuation of Europe’s most valuable private technology plummeted.

The payments company reported a net loss of SEK 6.2 billion ($580 million) for the first half of 2022 on Wednesday, up from SEK 1.4 billion ($130 million) a year earlier. He attributed the worsening losses to higher personnel costs, investments in the integration of the newly acquired Swedish shopping comparison service PriceRunner and rising credit losses. He attributed the higher credit losses to difficulties in underwriting new customers with limited credit histories.

Revenue grew 24% year-on-year to SEK 9.1 billion ($950 million), driven by growth in markets such as the United States, where Klarna has amassed 30 million users, a fifth of its world total. It has also expanded to new countries, including Canada, the Czech Republic and Greece.

“Klarna operated in a very different environment in the first half of 2022,” said Sebastian Siemiatkowski, CEO and Co-Founder. “When we made our business plans for 2022 in the fall of last year, it was a very different world than the one we find ourselves in today.”

Klarna’s difficulties reflect challenges facing the broader buy now, pay later industry as falling consumer spending and increased regulatory scrutiny hit popular credit products, which allow consumers to defer or split payments into multiple instalments.

In July, after several attempts to raise capital at higher valuations failed, Klarna’s share value plummeted to $7 billion after raising $800 million from investors including Sequoia and Mubadala, the sovereign wealth fund of the United Arab Emirates.

Klarna secured a $46 billion valuation as recently as June last year, following a $639 million funding round led by Japan’s SoftBank, the investment group behind it. origin of a disastrous bet on the office sharing group WeWork.

The company cut its workforce by 10% in May as Siemiatkowski said it would focus on “short-term profitability”. Klarna has not been profitable since 2019.

Ranking of the Indian institutional framework: NIT Srinagar obtains the 59th position


Srinagar, 30th August: National Institute of Technology (NIT), Srinagar has been ranked 59th in Indian Institutional Framework (IIRF) Ranking 2022 among all NITs and IITs in India and 1st position in UT Jammu -and-Kashmir.

The rankings were released Tuesday by Education Post, a monthly higher education magazine, in the engineering category across all NITs and IITs.

According to the data, NIT Srinagar has been ranked 59th among the 3500 government colleges of engineering in India and the highest rank in Jammu and Kashmir.

Director of NIT Srinagar, Prof. Rakesh Sehgal commended the faculty, students and non-teaching staff of the institute for making the administration of the institute proud by earning a good ranking in the IRTI rankings .

Prof. Sehgal also praised the work done by Dr. Harveer S. Pali, who was the nodal officer for the IIRF 2022 rankings. He said there is still a lot to do and these results are encouraging.

He said that for several years, NIT Srinagar has focused more on providing good research products. The IRTI rankings are a vital segment of getting good rankings and it will also help people in a wider context,” Prof Sehgal said.

The Registrar of the Institute, Prof. Syed Kaiser Bukhari extended his greetings to all fellow faculty members and said that NIT Srinagar has performed well in the IRTI rankings.

He credited the contribution of all faculty colleagues, senior administrative staff, absentee teaching staff, and students. He also appreciated the role of Dr. Harveer S. Pali and his entire team for their exemplary work.

Prof. Bukhari said NIT Srinagar is committed to bridging the gap between society and technology. Going forward, the Institute will continue to work hard to be ranked among the top colleges in the country, he said.

Dr. Harveer S. Pali, Nodal Rankings Officer, NIT Srinagar, appreciated the efforts and active participation of the IRTI team, teaching staff and students which led to this great achievement.

The IIRF rankings are based on seven crucial parameters, placement performance, teaching-learning resources and pedagogy, research (volume, income and reputation), income and industry integration, investment strategies and support, future direction and external perception, and international outlook.

Global Air invests in an alternative to steel wheels


The Biden-Harris administration, through the U.S. Department of Energy (DOE), has issued a Request for Information (RFI) to help guide the implementation of $335 million in investments for lithium-ion battery recycling programs of the Infrastructure Investment and Jobs Act, otherwise known as the Bipartisan Infrastructure Act. The DOE says batteries are essential for powering clean energy technologies. Additionally, expanding options for domestically producing zero-emissions transportation will allow more Americans to benefit from clean transportation, while adding jobs to the clean energy workforce and supporting the goals. of President Biden’s decarbonization.

The DOE is seeking input on how federal investments can expedite the collection, transportation, treatment, and recycling of batteries and waste, enable second-life applications of lithium-ion batteries previously used to power electric vehicles, and supporting high-quality jobs for American workers.

In line with President Biden’s Justice40 initiative, the department says it will address equity, environmental and energy justice as it relates to battery recycling and manufacturing. The DOE is seeking input from industry, recyclers, retailers, community organizations, tribes, and state and local governments to ensure that future funding opportunities meet the energy and transportation needs of all Americans.

Responses to the RFI are due October 14 at 5 p.m. Eastern Daylight Time.

“Battery recycling not only removes harmful waste from our environment, it also strengthens domestic manufacturing by putting used materials back into the supply chain,” said U.S. Secretary of Energy Jennifer M. Granholm. “The Bipartisan Infrastructure Act makes big investments in our clean energy and transportation future and securing our supply chain here at home will allow more Americans to benefit from the many clean technologies powered by lithium batteries.”

While lithium-ion battery costs have fallen more than 90% since 2008, energy density and performance have rapidly increased, paving the way for an accelerated transition to clean transportation, according to the DOE. With the global lithium-ion battery market expected to experience continued growth over the next decade, the DOE says it is working with industry to build a robust and sustainable battery supply chain in the United States that will support increased market demand.

This RFI builds and expands on the DOE’s announcement in May 2022 of $3.16 billion in funding from the bipartisan Infrastructure Act, including $3.1 billion for mills. refining and production of battery materials, cell and battery pack manufacturing facilities and recycling facilities and $60 million to support second-life applications for batteries once used to power electric vehicles and new ones process to recycle materials into the battery supply chain.

Obstacles to overcome

According to the report “Building Resilient Supply Chains, Revitalizing American Manufacturing and Fostering Broad-Based Growth: 100-Day Reviews under Executive Order 14017”, large-scale collection of end-of-life batteries helps ensure a reliable supply of inputs for the recycling. facilities, supporting high usage that is essential for commercially viable recycling. However, beyond collection rates, recyclers face cost pressures that primarily stem from the safe transportation of batteries over long distances to a recycling center as well as the number of sorting and assessment steps that end-of-life batteries must undergo before recycling and the operating costs of the recycling process itself.

According to the “National Lithium Battery Blueprint,” developed by the Federal Advanced Battery Consortium, recyclers face a net end-of-life cost when recycling EV batteries, with battery transportation costs, which are considered a Class 9 hazardous material, making up more than half of end-of-life recycling costs. Shipments of Class 9 materials must meet special packaging requirements and are charged at higher freight rates. Additionally, the complexity of the regulations confuses stakeholders about whether batteries should be treated as hazardous waste or general waste, according to the DOE. Potential policy action and future innovations that could make batteries electrochemically inert would reclassify these end-of-life batteries as non-hazardous, helping to reduce transportation costs and making the overall recycling process more cost-effective, the department adds. .

End of life and manufacturing scrap each have a role to play

In the short term, the DOE says recycling and recovering critical minerals or materials from batteries contained in consumer electronics, as opposed to end-of-life electric vehicles (EVs), could provide an initial resource that can help mitigate supply chain uncertainties and price volatility. related to critical battery materials.

Recycling manufacturing waste could also be a big step for U.S. industry, the DOE and analysts noted. Scrap from new and potentially large US battery cell manufacturing operations would be available for immediate processing, while cells from those factories used in EV products would not enter the recycling stream for 10 years or so. more.

Given the long life of electric vehicle batteries and the scale of electric vehicle deployment to date, the impact of limited household recycling capacity is mitigated, according to the DOE. In addition, when these batteries reach end of life is variable and difficult to predict. The issue of rechargeable battery recycling is further affected by ongoing R&D efforts to identify abundant substitutes for critical battery materials. Despite these uncertainties, a large supply of end-of-life EV batteries could eventually meet a significant portion of critical battery material needs in a circular economy, the DOE adds.

Many companies in the United States and abroad use pyrometallurgical and hydrometallurgical processing and other technologies to recycle critical battery materials. However, the DOE says cost-competitive recovery of materials other than cobalt and nickel constituents remains difficult. While these metals could be used to meet battery demand, they could also meet other material demand streams.

The DOE says its goal is to recover 90% of used lithium batteries and reintroduce 90% of key materials from those batteries into the materials supply chain, adding that a large amount of recovered battery materials could eventually provide a significant portion of the battery’s critical material. needs in the context of a circular economy.

Commitment to solve the necessary challenges

According to the DOE, establishing a national supply chain for lithium batteries requires a national commitment to solving the science challenges of new materials and developing a manufacturing base that meets the demands of growing electric vehicle and electric vehicle markets. fixed network storage.

Resilient supply chains will require new programs to recycle and recover critical materials from end-of-life products, as well as other unconventional sources, such as minerals mined from coal and other mining wastes, which can minimize the need for new mining operations.

Primarily, the policy support is expected to strengthen the domestic supply chain by advancing demand for US-made batteries and spurring the development of a stronger manufacturing base and resilient supply chain, including battery recycling, depending on the department. Policy tools should also strengthen resilient supply chains for critical upstream minerals and materials through a wide range of strategies aimed at increasing the supply of sustainably produced minerals and metals and building refining and of processing required to support manufacturing.

Researchers find malicious plugins on 25,000 WordPress sites


A new study Researchers from the Georgia Institute of Technology found malicious plugins installed on some 25,000 WordPress websites.

Researchers analyzed backups of over 400,000 web servers and found 47,337 malicious plugins on 24,931 unique WordPress sites using a web development tool codenamed “YODA”. Each compromised website in their data set had two or more infected plugins and 94% of the plugins were found to be active.

Using the YODA tool, researchers were also able to trace the malware used in WordPress plugins back to its source, the George Tech College of Computing. reports. The malware was found to be sold on the open market or distributed on hacking sites, with the malware being injected into the website by exploiting a vulnerability and in most cases infecting the WordPress site after adding the plugin to WordPress.

In some cases, the malicious plugins have been found to mimic benign plugins offered on legitimate marketplaces, sometimes as a trial option on paid plugin sites.

The malicious plugins have also been found to attack other plugins on servers with WordPress installed to spread the infection. The most common forms of exploitation were cross-infection or infection by exploiting existing vulnerabilities.

The researchers noted that while malicious plugins can be harmful, owners can take steps, such as purging malicious plugins and reinstalling malware-free versions that have been scanned for vulnerabilities.

“If an organization absolutely must use WordPress, the plugins should be thoroughly vetted by experienced development and security teams before being used in a production environment,” Cory Cline, senior cybersecurity consultant at the application security vendor nVisium LLC, told SiliconANGLE. “This is facilitated by the fact that the WordPress plugins are all written in PHP and can have their source code reviewed at will by anyone who wishes.”

“The impact of implementing a WordPress plugin that has not been properly vetted could be non-existent if the plugin is not malicious and contains no known vulnerabilities,” Cline added. “However, a malicious WordPress plugin could ultimately lead to a complete takeover of all affected WordPress instances.”

Sounil Yu, Head of Information Security at Cyber ​​Asset Management and Governance Solution Provider JupiterOne Inc. noted that this is a problem not just with WordPress but with any software that leverages third-party plugins, integrations, and apps.

“Verifying PITAs is problematic because there are thousands of these PITAs with no clear provenance, test results, or data flow diagrams,” Yu explained. superficial overview. Like app stores run by Apple and Google, marketplaces need to do more checks to make sure that malicious PITAs aren’t creating problems for their customers.

Photo: Pxfuel

Show your support for our mission by joining our Cube Club and our Cube Event community of experts. Join the community that includes Amazon Web Services and Amazon.com CEO Andy Jassy, ​​Dell Technologies Founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many other luminaries and experts.

NASA postpones Artemis I launch to address critical engine issue


NASA made the very difficult decision to delay the launch of Artemis I to just two minutes after the two-hour launch window opened at 8:33 a.m. Eastern Time. Although disappointing, NASA Administrator Bill Nelson said, “We don’t launch until it’s right.”

The long-awaited launch of Artemis I will have to wait a bit longer, as an engine bleed issue forced the team to scrub the launch this morning. When asked what an engine purge means on its Twitter account, NASA replied, “An engine purge is part of our regular pre-launch operations to prepare the engines. Teams prefer not to put super cold fuel in hot engines, so we use liquid nitrogen. through them first to cool them.”

Artemis I is the first in a series of missions that will bring humans back to the surface of the Moon, and beyond. This mission will not have human astronauts on board but will have several “mannequins” for the ride for testing purposes, as well as other preliminary tests.

“It’s only part of space activity, and it’s part, in particular, of a test flight,” Nelson commented after the delay was announced. “We’re stressing and testing this rocket and the spacecraft in a way you never would with a crew on board. That’s what a test flight is all about.”

As disappointed as the 25,000 NASA employees, dignitaries and other guests of Kennedy Space Center may have been to hear the news of the delay, everyone should agree that it was the right decision to make with a rocket of 4, $1 billion at stake. The SLS is the most powerful rocket ever built for the civilian space agency and will be the pure power behind all missions that bring astronauts back to the Moon for the next three years.

As for when the next launch will be attempted, NASA reports that the earliest date and time will be Friday, September 2 at 12:48 p.m. EST. If this launch date is missed for any reason, the next available date would be around September 5th. After that, the team had to take the massive rocket back to the Vehicle Assembly Building for servicing.

Stay tuned to HotHardware for any future updates regarding Artemis I and when the next launch might be.

EMTECH Introduces the GREEN CBDC(™) Framework | New


NEW YORK, NY, Aug. 28, 2022 (GLOBE NEWSWIRE) — In an exciting move, EMTECH, an award-winning software company and the first-of-its-kind modern central banking infrastructure provider, today unveiled the GREEN CBDC Framework to help central banks unlock unprecedented value by deploying a central bank digital currency (CBDC).

The announcement comes as a wide range of stakeholders, including central banks and the White House, are calling for energy-efficient methods to bring financial services to consumers and businesses, as the need to reduce the carbon footprint remains essential.

Given the unique role of central banks in the financial sector, the acronym “GREEN” specifies five key principles that EMTECH believes should contextualize their financial stability and risk management mandate. Indeed, there is unprecedented value for central banks in:

Governing for impact

Reinventing trust through transparency

Embracing sustainable energy use in the digital world

Foster innovation with basic infrastructure

Foster inclusive and resilient ecosystems

“EMTECH is making ‘going green’ more convenient for central banks with the GREEN CBDC framework,” said Carmelle Cadet, CEO and Founder of EMTECH. “As part of this, we present an actionable and grounded approach for central banks to harness the value of building trust, adopting sustainable technology while empowering ecosystem innovation. By providing Tier 2 layer infrastructure energy-efficient cash flow, central banks can make the entire financial ecosystem greener by design. We believe this is having an impact.

The launch of GREEN CBDC Framework is a natural step for EMTECH, which already uses environmentally friendly technology to power its solution. Last year, he partnered with Hedera to minimize the power consumption of his solution.

Earlier this month, EMTECH’s CEO was released by NASDAQ on how the CBDC can contribute to a greener future.

“Developed and developing economies can adopt this Framework. A CBDC solution should not put more strain on fragile power infrastructure when operating at scale, and can be a viable step to reduce carbon footprint,” says Cadet.

Cadet will speak extensively about the benefits of EMTECH’s GREEN CBDC at the CBDC 2022 conference in Frankfurt, Germany on August 30. Meanwhile, the EMTECH team is ready to support Central Banks with the GREEN CBDC Toolkit which includes: Framework Adoption, Sandbox Pilot and Ecosystem Engagement. The CBDC platform and basic pre-built APIs are also ready for piloting.

You can learn more about GREEN CBDC at Greencbdc.com and Emtech.com.


EMTECH is building the next generation API-First core banking infrastructure. EMTECH provides software, data and services that connect central banks to other regulators and financial service providers. Our platforms power the exchange of regulatory data, the issuance of currencies and the movement of currencies in financial markets.

EMTECH is a diverse global company that makes financial ecosystems inclusive and resilient by design. For more information, visit www.emtech.com.

Matthew Aversa EMTECH [email protected]

Copyright 2022 GlobeNewswire, Inc.

CHANCEY: Be nice when you drive | Opinion


I witnessed another near miss. Driving to the office, I was heading east on the dual carriageway with a double yellow line and a 35 mph speed limit. I was safely behind a car and met another car heading west when suddenly a driver flew behind the westbound vehicle and drove past, almost hitting full force the car in front of me. He barely missed cutting off both cars as the driver turned and continued his frantic journey, well over the speed limit.

After sitting on my horn, I prayed, “Lord, please don’t let him kill anyone.

What happens to people when they get behind the wheel? A councilor blames all these road rage incidents which seem to be escalation on our increasing stress, especially since the pandemic. People are totally stressed and it shows on the roads. And people are in too much of a rush.

Like the trucker I met several years ago. I was on a city street with a 45 mph speed limit. For some reason I was Actually I was going 45 mph when I looked up and my rearview mirror was filled with the shiny silver chrome of the front end of a semi truck. I think, “What is this guy doing?” It stayed on me.

My left turn is approaching, so I waved and moved to the center lane to enter the business. Just like that big blue truck, right on my tail. I waited for the oncoming traffic to clear before turning in, and when I did, he also pulled into the parking lot and stopped behind the building, where he parked.

I wasn’t happy with this guy’s manners. I was driving a small Toyota and had no room for his semi in my trunk or in the back. Also, I didn’t have time to be in the back, hospitalized and in therapy for months. I love pancakes, but I have no desire to get flatter than one.

So, being human, I decided to let this guy know that I didn’t appreciate his manners. I found it and our conversation went something like this:

“Sir, were you driving that truck?”


“Well, I’m the guy you were on the tail of and behind when I was trying to turn left at that time.”

“Well, you shouldn’t have gone so slow. You have to get out of my way.

“I was going at the speed limit. It’s a city street, for Pete’s sake. And you shouldn’t ride on people’s bumpers. What if you knock me down? Would you like to have that on your conscience? »

“It would not be the first time.”

“Let me tell you something. This may be new to you, but the road is not yours.

And I turned around and left.

His company name was on the side of his door, so I called and eventually spoke to his boss. I shared my encounter and the conversation that followed and expressed my displeasure with the tailgating episode and the arrogant, remorseless attitude that followed. The boss apologized, not for the behavior of his driver, but on behalf of the company. He promised to speak to his driver. This guy needed to learn how to manage his anger and practice being kind on the road.

Ephesians 4:32 says, “Be kind to one another.

This also applies to driving.

Here are some suggestions for a smoother ride:

1. Always put others before yourself. They don’t own the road, and neither do you. Pay attention to each other.

2. Hang up the phone and pay attention. And the sandwich. And the makeup. Stay alert to avoid situations that could trigger the driver’s anger.

3. Always use your turn signal to inform other drivers of your intentions.

4. Give in even if it’s your turn to leave. Be patient even when the oncoming driver doesn’t (my main context is navigating roundabouts in our county).

5. Don’t try to beat a red light. You might regret it. Are you really in such a hurry? To leave sooner.

6. When lined up at a red light, leave room for waiting drivers to line up in front of you.

7. Always be aware of pedestrians and cyclists.

8. Stay calm at all times. If the driver behind you shakes his fist, don’t let him shake you.

9. As you drive, remember who you are and who you represent. Ask yourself, “What would Jesus do if he was driving?”

David L. Chancey, a native of Milledgeville, is pastor of McDonough Road Baptist Church, Fayetteville, Ga. Visit www.mcdonoughroad.org for more information and for online viewing options. Visit www.davidchancey.org to see Chancey’s other writings.

Spyware company offers services to hack iOS and Android devices for Rs 64 cr


New Delhi: A little-known spyware company, Intellexa, is now competing with developer Pegasus NSO Group, offering its services to hack Android and iOS devices for $8 million (about Rs 64 crore).

Malware Source Code Provider Vx-underground found documents representing a proposal from Intellexa, offering services that include exploits of Android and iOS devices.

“Documents leaked online show purchase (and documentation) of $8,000,000 zero-day iOS remote code execution exploit,” he tweeted.

The offer includes 10 infections for iOS and Android devices, as well as a “magazine of 100 successful infections”.

According to Security Week, the documents, “labeled as proprietary and confidential”, revealed that the exploits should work on iOS 15.4.1 and the latest Android 12 update.

Apple released iOS 15.4.1 in March, which suggests the offering is recent.

“Specifically, the offering is intended for one-click browser-based remote exploits that allow users to inject a payload into Android or iOS mobile devices,” the report states.

Intellexa is based in Europe, with six R&D sites and laboratories across the continent.

“We help law enforcement and intelligence agencies around the world bridge the digital divide with multiple and diverse solutions, all integrated with our unique and best-in-class Nebula platform,” the company said. on its website.

Last year, a Citizen Lab report mentioned Intellexa, about Cytrox’s predatory iPhone spyware used to target a Greek lawmaker.

Citizen Lab said Cytrox is part of the Intellexa Alliance, described as “a marketing label for a range of mercenary surveillance vendors that emerged in 2019”.

Apple filed a lawsuit last year against NSO Group to ban the company from using its services and devices.

As state-sponsored cyberattacks with government spyware like Pegasus grow, Apple is bringing Lockdown Mode this fall with iOS 16, iPadOS 16, and macOS Ventura.

This mode provides specialized additional protection for high-level users who may be exposed to highly targeted attacks from private companies developing state-sponsored mercenary spyware.

In India, the Pegasus panel said this week that the presence of the controversial Israeli spyware Pegasus had not been conclusively established in 29 cellphones it examined, and the government did not cooperate with the investigation.

The court-appointed top panel said five out of 29 cellphones may have been infected with malware, but that doesn’t mean it was Pegasus spyware.

NSCN-IM decides to respect the framework agreement for a solution to NPI


Dimapur: The NSCN-IM decided on Friday to stick to the framework agreement for a speedy, honorable and acceptable solution to the politically vexed Naga (NPI) question.

The solemn declaration of the outfit was made during the National Convention of Nagaland State Workers NSCN-IM here.

We strongly believe, profess and support the Framework Agreement signed on August 3, 2015 for an honorable and acceptable quick fix, as both parties (the Center and NSCN-IM) have already agreed to define the details of the competencies, a- he declared.

NSCN-IM workers also reiterated to respect the decision of its May 31 national assembly held at its general headquarters in Hebron to uphold and protect the unique history and national principle of the Nagas at all costs.

The Naga group has been negotiating with the Indian government for a quick political solution since 1997 after the ceasefire agreement.

The Framework Agreement was signed between the two parties on August 3, 2015 after several rounds of talks as the basis for a settlement of the decades-old Naga political question.

However, the NSCN-IM has decided to stand firm on its demand for a separate flag and constitution for the Naga people.

Giving up the Naga national flag and constitution in the name of the Naga solution is tantamount to “selling the Naga national identity as fiercely defended by our ancestors”, he said.

NSCN-IM President Q Tuccu, who was among those who spoke on the occasion, said that we cannot waive our rights in the name of the Naga solution and we can never compromise the rights of Naga.

In a statement, the NSCN-IM called the Convention “historic” as nearly 7,000 Naga national workers from 16 regions of Nagaland, both civilian and military, had participated and pledged to abide by its demands.

Read also | Saudi Arabia to invest $1 billion in Pakistan

Latest stories

Court documents say DeSantis election police are arresting people who were told they could vote


The Guardian reports that many of the people (ultimately 19, not 20) who were targeted by the Governor’s Brownshirt Brigade were either told or led to believe – by election officials or other government-sanctioned officials. State – that they were indeed qualified to vote. In many cases, they issued a voter’s card and had no problem voting, so they were completely stunned to learn that they had broken a law.

Court documents show that many of the defendants caught up in this fake sting claim to have very good reason to believe they weren’t breaking the law when they voted in 2020.

One of the voters charged, Douglas Oliver, a 59-year-old black man from Tampa, was convicted of a sex crime in 2001, which made him ineligible to vote in Florida. He told the Guardian he hadn’t thought of voting until a canvasser approached him one day in a store and encouraged him to sign up in 2020. Oliver said he revealed his felony conviction and the solicitor said he was eligible. After submitting a registration application, he obtained a registration card from his local Hillsborough County election office.

As Daily Kos noted, Governor DeSantis announced his intention to create this task force for several reasons, none of which are good. Like all GOP overtures to election integrity, the goal is to scare people out of voting with the threat of incarceration, in a state that has a history of incarcerating all manner of people of color for little nearly any reason. DeSantis and the GOP are also making these shows of force to distract from their lack of actionable policy ideas. The problem is that once you start spending money on door knockers, you’ll find any excuse to kick doors down.

Here is another story from the court documents:

Michelle Stribling, a 52-year-old black woman from Eatonville convicted in 1993 of second-degree murder, told investigators during an Aug. 5 interview at her home that she “couldn’t read or write very well” and could not did not understand the questions related to her ex-criminal status on the registration documents. But Orange County election officials sent her a voter card after she registered, leading her to believe she was able to vote.

DeSantis, of course, didn’t hold a press conference when discussing real bad actors in Republican strongholds who admitted to doing things like “voting twice.” DeSantis also forgot to mention that many of the people they arrested were only told they weren’t allowed to vote this year, nearly two years after they allegedly voted illegally.

Neil Volz, deputy director of the Florida Rights Restoration Coalition, said The Miami Herald that this mess is a design of bad government decisions, after decades of conservatives cutting resources from election infrastructure. “We’ve been beating that drum for years. If you can’t trust the government to tell you if you’re eligible upstream, how can you sue someone downstream?

There are two major variations in DeSantis’ approach to voter fraud: The voters who have valid excuses are mostly people of color and from Democratic areas, while the people DeSantis keeps silent about are white and from areas. Republican votes.

It is not difficult to understand the approaches to dueling, of course. It’s anti-democracy, it’s racist and it’s the platform of the Grand Old Party.


Maybe the GOP should consider a huge Florida retirement community for the Big Lie

DeSantis signs voters bill formally authorizing Gestapo-style election police force

DeSantis gets his own private police force to chase (or invent) ‘voter fraud’

Tips to consider before returning your company laptop or phone when you leave your job



You’ve decided to quit your job and now it’s time to return your devices. But what should you do first? Recover all your personal documents and delete them? Do a factory reset to make sure none of your personal data gets forgotten? Or do you return the devices as is, with the photos and medical documents of your two-year-old child?

These are common questions workers face when changing jobs, which became increasingly popular during the Great Resignation. And that has become particularly tricky as the work and personal lives of many workers – and their corresponding data – have become intertwined during the pandemic with new flexible working styles. But properly navigating how to keep track of what’s yours, what’s not, and the best way to transfer your data can be the difference between an uneventful departure and one that could trigger internal investigations. or even civil or criminal prosecution.

“With the increase in people working remotely and more geographically dispersed due to covid, it comes up all the time,” said Mark Neuberger, labor and employment lawyer at Foley & Lardner, based in Wisconsin. “This is an important issue for employers and employees.”

But do not worry. Experts in workplace safety, software and law have offered us advice to help you through this transition. Before diving in, I would like to remind you that the help desk is there for you. We want to hear about your toughest technological challenges and curiosities in the workplace. Write to us and we will do our best to find answers for you.

What questions do you have about technology in your workplace?

That said, let’s get down to business.

Q: What should I do and avoid before returning my corporate laptop or mobile device?

A: To make your life easier on the way out, experts say it’s better to anticipate the problem than to spend your last days frantically trying to figure out where and if something is yours. The three best ways to do this are to keep as many of your personal documents, photos and files off company devices or alternatively in one place – like a folder on your laptop – so you can easily find your data. . Make sure you know your company’s rules and be transparent with your employer about what you’ll be taking with you. But beware: some things you think you own may be disputed by the company as their ownership.

“The safest and most conservative thing to do is to go to your employer first and not remove anything from company-owned devices that the employer hasn’t consented to,” said Mike Kasdan, partner who focuses on intellectual property law at Connecticut. law firm Wiggin and Dana. “But you should also have a broader idea of ​​what [might be considered] trade secrets. These are financial information and information about customers and suppliers. »

Transfer of contacts/data: A contact list can be thought of as a customer list for your business, which can be considered proprietary information that cannot leave the business. So it’s always best to check with your employer before exporting your contacts from Outlook, Gmail or your smartphone. (Search “export” in Gmail and Outlook to transfer contacts to a CSV file, which can easily be imported to another device. You can also export emails and calendar items. Android devices and iPhones allow you export contacts or directly transfer contacts to certain devices.)

The same can be true for seemingly innocent data transfers. For example, you might want to take a presentation that you would like to use as a model for the future. But if that presentation contains information about a private company, you could be in hot water. The same goes for occasional emails that you want to save or calendar entries that may contain sensitive information.

“It’s one of the easiest ways to get into a lot of trouble,” said Dan Wilson, senior analyst director, who covers digital workplace for Gartner. “So make sure you understand the context and content of the data.”

Even if you take what you consider unquestionably yours – perhaps you have personal medical documents or family photos on your devices – if you move, delete and export large amounts of data, you could trigger the security systems. business monitoring. Wilson said some companies monitor the data movement of employees who may have access to valuable information, are disgruntled, or head to a competitor. Large amounts of data movement could signal an unauthorized transfer even if it is not harmful.

Keystroke tracking, screenshots and facial recognition: the boss can watch long after the pandemic is over

“You better get someone to agree to delete this data, whether it’s HR or a supervisor,” Wilson said.

Search data: Workers often forget where they can store personal data, even though they do their best to keep it together. For example, you may have downloaded some personal files and left them in your laptop’s “downloads” folder or your iPhone’s “files” folder. There may be photos in your WhatsApp or SMS. So be sure to check all apps and folders where you may have inadvertently stored personal items, said Mark Ostrowski, engineering manager at cybersecurity software company Check Point.

Deleting elements and connections: If you decide to delete personal photos or documents, be aware that your company may already have a copy. Deleting the emails probably won’t delete the company copy. The same can be true for items on your phone. But Ostrowski said it’s still worth deleting so there aren’t any extra copies on your devices. You can also view and delete items backed up to your cloud storage.

“Get a good idea of ​​what your footprint looks like,” Ostrowski said. “It’s super important.”

Your business inbox is a mess. These tips can help you manage your emails.

You should also make sure you’re signed out of any apps, especially personal accounts like Amazon, Gmail or Facebook, and clear your web browser history and any saved payment or login information, Wilson said. . Sign out of your Apple ID and turn off the “Find My” tracking setting if you used a personal account.

Back to factory settings? When deleting data, be extremely careful as it could lead to legal issues. Experts recommend against performing a factory reset. Employers often have their own data retention policies and, in some cases, may be legally required to retain certain information for a specified period of time. So leave factory resets to your employer.

Forgotten data: Workers should also make sure they check anything they may have inadvertently kept. Have you ever downloaded a presentation or a client file on a USB key or an external drive to be able to work from home? Have you emailed your personal account with documents containing sensitive source code? These are all possible red flags for employers and could cause you problems at your new workplace.

“You don’t have to have the nuclear codes to get in trouble,” Neuberger said. “Worst case scenario…they can sue you with civil or criminal charges.”

The reality is that tracking and separating work and business data has become complicated. Although experts say the best practice is to avoid using work devices for anything personal, there is likely to be crossover. And often, employers are relatively understanding on the issue, experts note.

“Not everyone can have two phones and two laptops,” Kasdan said. “But it helps to be organized…and [honest] with your employer.

Electric Vehicle Transition in California: Is the Era of Gasoline Cars Over?



Five years ago, having an electric vehicle was like bringing your own bags to the grocery store or avoiding plastic straws: some people did it, but those who did were either avid environmentalists (often driving the snub-nosed Nissan Leaf), or wealthy techies (often driving the Tesla Model S). EVs felt like a novelty or a test of purity – they certainly didn’t feel like a doom.

But in recent years, everything has changed. There was the Super Bowl ad for electric vehicles, featuring Will Ferrell punching a globe and yelling, “We’re going to crush those sledders!” (Ferrell was referring to Norway, the country that sells the most EV per capita than any other country in the world.) There was the announcement by six automakers and 30 countries that they would phase out gas-powered car sales by 2040, and President Biden’s call to make 50% of new car sales emissions-free a decade earlier. There was the release of the GMC Hummer EV – a monstrous power-guzzling house on wheels that many environmentalists abhorred – the Ford F-150 Lightning EV and even the Mustang Mach-E EV. In short, automakers have taken their most valuable brands – even brands that appeal to a part of America that is decidedly not crisp and eco-friendly – ​​and rolled out all-electric models.

Buy now or wait? What the new electric vehicle credits mean for you.

In short, the transition from internal combustion engine gasoline vehicles to electric vehicles no longer seems like a niche or speculation. It seems inevitable.

And this week, in another profound development: California, which already leads the nation with 18% of new cars sold electric, is expected to approve a regulation banning the sale of new gasoline-only vehicles by 2035. electric vehicles, only a limited number of plug-in hybrids will be allowed to be sold. That’s a big deal: California’s car market is only slightly smaller than those of France, Italy and Britain – and while many countries have promised to phase out sales of gasoline-powered cars on such and such a date, few have concrete regulations like California. Sixteen states have traditionally followed California’s lead in setting their own independent fuel standards — they may soon follow.

Going from 18% to almost 100% electric vehicle sales in 13 years may seem almost impossible. But Corey Cantor, EV associate at research firm BloombergNEF, points out that in 2019, 7% of new cars sold in California were electric vehicles. In just a few years, that number has more than doubled.

“When things move so fast, it’s pretty surreal,” Cantor said.

Of course, roadblocks remain. Producing hundreds of thousands of electric cars will require supplies of critical minerals and a pace of factory manufacturing that currently does not exist. (Example: Ford has a three years backlog for the Ford F-150 Lightning, thanks to skyrocketing demand.) The Biden administration has invested $5 billion in a network of car chargers across the country, but a recent study on chargers in the San Francisco Bay Area found that more than a quarter were not working.

Across the United States, people are sharing how sky-high gas prices have hurt them

For now, electric vehicle sales are mainly focused on more expensive vehicles, rather than smaller, more affordable sedans, but automakers are trying to bring prices down. And for consumers to take advantage of the new $7,500 tax credit for electric vehicles in the recently signed Inflation Reduction Act, more minerals and batteries will need to be produced in the United States. The combination of high upfront prices, oft-cited “range anxiety,” and unfamiliarity with electric vehicles may cause some Americans to resist going electric for years.

Yet most electric vehicles are now cheaper over the life of the vehicle than comparable gas-powered cars. Soaring gasoline prices this year led many Americans – some of whom had never considered going electric before – to examine what it would be like to drive a car that draws its power from the grid.

“A few years ago there was always a question about electric vehicles – do people want them?” said Cantor. “Now that’s not even the question. It’s all about scaling.

Can NIST advance “trustworthy AI” with a new version of the AI ​​Risk Management Framework?


Couldn’t attend Transform 2022? Discover all the summit sessions now in our on-demand library! Look here.

Is your AI trustworthy or not? As the adoption of AI solutions increases at all levels, consumers and regulators expect greater transparency about how these systems work.

Organizations today not only need to be able to identify how AI systems process data and make decisions to ensure they are ethical and unbiased, but they also need to measure the level of risk posed by these solutions. The problem is that there is no universal standard for creating reliable or ethical AI.

However, last week the National Institute of Standards and Technology (NIST) released an expanded draft of its AI Risk Management Framework (RMF) which aims to “address risks in the design, development , use and evaluation of products, services and systems”.

The second draft builds on its initial March 2022 version of the RMF and a December 2021 concept paper. Feedback on the draft is due September 29.


MetaBeat 2022

MetaBeat will bring together thought leaders to advise on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, California.

register here

The RMF defines trustworthy AI as “valid and reliable, safe, fair and biases are managed, secure and resilient, accountable and transparent, explainable and interpretable, and privacy is enhanced.”

NIST’s Evolution Towards “Trustworthy AI”

NIST’s new voluntary framework provides metrics organizations can use to assess the reliability of the AI ​​solutions they use every day.

The importance of this cannot be underestimated, especially when regulations such as the EU’s General Data Protection Regulation (GDPR) give data subjects the right to ask why an organization has taken a particular decision. . Failure to do so could result in a hefty fine.

Although the RMF does not mandate best practices for managing AI risk, it does begin to codify how an organization can begin to measure the risk of deploying AI.

The AI ​​risk management framework provides a model for making this risk assessment, said Rick Holland, CISO at digital risk protection provider Digital Shadows.

“Security leaders can also leverage the six characteristics of trustworthy AI to assess purchases and incorporate them into request for proposal (RFP) templates,” Holland said, adding that the model could “help defenders better understand what has always been a ‘black box’ approach.”

Holland notes that Appendix B of the NIST Framework, titled “How AI Risk Differs from Traditional Software Risk,” provides risk management professionals with practical guidance on how to conduct such risk assessments. related to AI.

The limits of the RMF

While the risk management framework is a welcome addition to support internal enterprise controls, there is still a long way to go before the concept of risk in AI is universally understood.

“This AI risk framework is helpful, but it’s only a scratch on the surface of real AI data project management,” said Chuck Everette, director of cybersecurity defense at Deep. Instinct. “The recommendations here are of a very basic framework that any experienced data scientist, engineer, and architect would already be familiar with. It’s a good baseline for those getting started with building AI models and collecting data. data. ”

In this sense, organizations using the framework should have realistic expectations of what the framework can and cannot achieve. At its core, it’s a tool to identify deployed AI systems, how they work, and the level of risk they pose (i.e. whether they are trustworthy or Nope).

“The NIST RMF guidelines (and playbook) will help CISOs determine what to look for and what to question regarding vendor solutions that rely on AI,” said Sohrob Jazerounian, head of AI research at cybersecurity provider Vectra.

The drafted RMF includes guidance on suggested actions, references, and documentation that will enable stakeholders to fulfill the “map” and “governance” functions of the IA RMF. The finalized version will include information on the two remaining RMF functions – “measure” and “manage” – will be released in January 2023.

VentureBeat’s mission is to be a digital public square for technical decision makers to learn about transformative enterprise technology and conduct transactions. Learn more about membership.

1 dead, 2 seriously injured after overnight crash in construction zone on I-85, soldiers say – WSOC TV


CHARLOTTE — One person died and two others were seriously injured after a crash in a construction zone on Interstate 85 north of Charlotte, according to the North Carolina State Highway Patrol.

The three-vehicle crash happened around 1:15 a.m. on I-85 northbound near Statesville Avenue.

At 2.30am, MEDIC told Channel 9 they had declared one person dead at the scene of the accident and had taken two people to hospital with serious injuries.

Troopers said the highway was reduced to one lane for overnight construction when a vehicle rear ended another vehicle stopped in traffic. The vehicle that was hit then hit another car in front of it.

A passenger in the back of the vehicle that was hit first died instantly, soldiers said.

The driver of the vehicle that stopped the stopped cars left the scene on foot, the soldiers said. They did not say if the person had been found.

The North Carolina Department of Transportation said all lanes on I-85 reopened around 4:30 a.m.

A Channel 9 crew at the scene saw a lorry with a front end and what appeared to be an SUV with extensive rear damage being towed from the motorway around the same time.

This is a developing story. Check www.wsoctv.com for updates.

(WATCH BELOW: State considering options to relieve hotspots on I-85 in Gaston County)

Firefox 104: Analyze website power consumption and UI throttling


Firefox 104 Stable, Firefox 102.2 ESR and Firefox 91.13 ESR will be released later today. The releases fix security issues and bugs in Firefox; Firefox 104 Stable includes a handful of new features, including an option to analyze the power consumption of specific websites.

All Firefox channels, including development channels, are updated whenever a new major version of Firefox is released to the Stable channel. Firefox Beta and Developer editions are updated to Firefox 105, and Firefox Nightly is updated to Firefox 106.

Firefox for Android is following stable release versioning, which means it will also be updated to version 104.


  • Firefox 91.13 ESR is the last version of Firefox 91. Installs of Firefox 91 will be upgraded to Firefox 102 ESR on September 20, 2022, the next Firefox release day.
  • Firefox has a new Power Analysis tool in the Firefox Profiler, which can be used to analyze a website’s power consumption.
  • Firefox will automatically limit its user interface when minimized or hidden to improve performance and battery usage.

Download and update Firefox 104

firefox version 104

Firefox updates are available the day they are released. Since we release our version reviews early, they may not be available yet.

All Firefox installations can be upgraded through the browser’s built-in update system. To check for updates, select Menu > Help > About Firefox. Firefox displays the installed version on the page and runs a check for updates. The updates found will be downloaded and installed.

Direct downloads are also available, follow the links below to the Mozilla download website to download the new version of the browser.

New features and improvements in Firefox 104.0

UI limitation

To improve the performance and battery of the device Firefox is running on, the browser throttles its user interface whenever minimized or unhidden. The system works the same way background tabs are limited by Firefox to limit battery drain and improve browser and system performance as a whole.

Energy consumption analysis

firefox power usage website

Firefox users on Apple M1 and Microsoft Windows 11 devices can now use the Firefox Profiler to analyze a website’s power consumption.

Other changes and fixes

  • Firefox’s Picture-in-Picture mode now supports subtitles for Disney+.
  • The shortcut for pasting unformatted text, Shift-CTRL-V on Windows and Shift-CMD-V on Mac, now works in plain text contexts.
  • Bypassing HTTPS-only error pages and then backtracking takes Firefox users back to the original site instead of the error page.
  • The highlight color is retained after “typing Enter in the mail composer of Yahoo Mail and Outlook”.


  • Firefox supports the methods Array.prototype.findLast(), Array.prototype.findLastIndex(), TypedArray.prototype.findLast() and TypedArray.prototype.findLastIndex()
  • The SVGStyleElement.disabled property can be used to disable or enable SVG style elements and to check status.

Company changes

  • Full cookie protection can be controlled with the Cookies Politics.
  • Removed security.insecure_field_warning.contextual.enabled preference (not in Firefox 102 ESR)
  • Added AddVersionPin policy, which prevents updates to Firefox versions newer than specified.
  • Added GoToIntranetSiteForSingleWordEntryInAddressBar policy, which forces direct navigation to the intranet site.

Known issues

none listed.

Security updates/patches

Security updates are revealed after the official release of the web browser. You find the information published here after release.


Firefox 105 will be released on September 20, 2022. Firefox 102.2 ESR will also be released. It will replace Firefox 91.x installations through the Firefox update system.

Firefox extension reviews and news

Recent Firefox news and tips

Additional information/sources


Firefox 104: Analyze website power consumption and UI throttling

Article name

Firefox 104: Analyze website power consumption and UI throttling

The description

See what’s new in Firefox 104 Stable, released August 23, 2022 to the public. Learn more about website power analysis and UI throttling.


Martin Brinkman


Ghacks Technology News



The New Regulatory Framework Governing Money Laundering (AML/CFT Compliance) in Nigeria


The practice of money laundering is not exactly new, with criminal organizations looking for ways to divert the profits from their crimes 10 decades ago in most societies.

But due to the dynamic nature of human ingenuity, especially with the advent of fintech, even in criminal activities, governments and law enforcement agencies have had to constantly update their methods to effectively combat money laundering.

In Nigeria, the regulatory framework on money laundering revolved around the Money Laundering (Prohibition) Act 2011 and the Prevention of Terrorism Act 2011. But recently, these laws have been repealed in favor of a new set of laws, even when many people do not yet fully understand the concept of money laundering and terrorist financing.

Registration for the Tekedia Mini-MBA edition 9 (Sept. 12 – Dec. 3, 2022) has started. register here. The cost is N60,000 or $140 for the 12 week program.

So, accordingly, what this article aims to do is:-

– Provide a clear basic understanding of the concepts of money laundering and terrorist financing.

– Describe the new regulatory framework governing money laundering in Nigeria.

– Highlight some of the most important provisions of the new money laundering regulatory framework, including compliance requirements.

– Highlight the legal implications of the new regulatory framework on the practice of anti-money laundering (AML) in Nigeria.

What is SilverWhitening?

While the ordinary definition of money laundering is “the concealment of the origin of money obtained illegally, usually through transfers or legitimate businesses”, Nigerian law defines money laundering as “the concealment, disguise, conversion, transfer or control of any funds or property intentionally knowing that such funds or property are or form part of the proceeds of an unlawful act”.

Terrorist financing, which forms the basis of the practice of counter-terrorist financing (CFT), is the act of providing support in the form of financing to terrorists and their networks to enable them to carry out effective operations. terrorists/acts of terrorism.

What is the New Regulatory Frame governing money laundering in Nigeria?

The legal framework on money laundering in Nigeria once revolved around the following laws:-

– The Money Laundering (Prohibition) Act 2011.

– The (Prevention) of Terrorism Act 2011.

These laws have been repealed in favor of these new laws:-

– The Money Laundering (Prevention and Prohibition) Act 2022.

– The Terrorism (Prevention and Prohibition) Act 2022.

– The Proceeds of Crime (Recovery and Management) Act 2022.

The new Money Laundering Act, along with the other laws mentioned above, was specifically drafted to reflect the recommendations of the Financial Action Task Force (FATF, created by the G-7 group in 1989) on the parameters and the foundations of an effective fight against money laundering. – Framework for the fight against money laundering and the financing of terrorism (AML/CFT).

What exactly is the concept behind AML/CFT Compliance practice?

AML/CFT compliance practice simply refers to the policies, processes and practices of business entities used to identify, assess and report as necessary or necessary money laundering/terrorist financing risks deemed possible by the nature of their business.

What are the more important/remarkable provisions & Compliance terms of the New Regulatory Frame on money laundering?

The most important/notable provisions and compliance requirements of the new money laundering regulatory framework are as follows:-

– Statutory support by the Special Money Laundering Control Unit (SCUML) Money Laundering Act 2022 which was previously under the Federal Ministry of Industry, Trade and Investment and is now a department of the Economic and Financial Crimes Commission (EFCC).

– The introduction of expanded know-your-customer (KYC) requirements which now apply to customers deemed to be “foreign politically exposed persons” and the requirement for proper identification and verification of persons presenting themselves as acting on behalf of these clients.

– Introducing a new mandatory reporting/disclosures line regarding monetary transactions worth more than 5 million Naira and 10 million Naira for individuals and businesses respectively. Financial Institutions (FIs) are now required to send their reports (Suspicious Transaction Reports/STR and Currency Transaction Reports/CTR) to the Nigerian Financial Intelligence Unit (NFIU) while Designated Non-Financial Businesses and Professions (DNFBPs) / DNFI) must submit their report to the SCUML.

– The provision for voluntary reporting of monetary transactions of N1 million and N5 million for individuals and businesses respectively.

– The SCUML category known as DNFIs (Designated Non-Financial Institutions) required to file AML reports has now been expanded under the new regulatory framework to include previously excluded professional and business categories such as jewellers, legal practitioners, casinos (digital casino app companies). and ship-based casinos included), notaries and trust companies, reversing an earlier judgment of the Court to the contrary specifically excluding attorneys from the scope of SCUML.

– The specific prohibition to conduct 2 or more monetary transactions separately or through 2 or more FIs or DNFBPs to deliberately circumvent the mandatory reporting requirement of the transaction which would normally be eligible for mandatory reporting to the relevant regulatory body .

– The Money Laundering Act also requires FIs and DNFBPs to have continuously developed AML/CFT compliance frameworks in place.

– All FIs are specifically required to have designated AML/CFT Compliance Officers.

– The new regulatory framework also requires the establishment of AML training programs for employees by all reporting entities.

– The requirement for an internal audit unit dedicated to ensuring compliance with the provisions of the law.

– The transfer of funds/cash, digital assets (excluding Stablecoins) or securities over $10,000.00 to and from a foreign country by a body corporate must be reported to the Central Bank of Nigeria, to the Securities and Exchange Commission and the EFCC within one day of the Trade Date.

Will be AML/CFT Compliance terms below the money laundering Law to apply same where there is Lawyer/Client privilege?

Yes, as long as it involves the management of client funds/assets/securities, the purchase or sale of real estate or business, the opening/management of bank accounts, fiduciary companies or of any proceeds of an unlawful act.

Do the New money laundering Law carry criminal punishments for delinquents?

Yes, in particular in the form of a minimum term of imprisonment of 4 years or 5 times the value of the proceeds of any illegal activity, applicable also to legal persons convicted of money laundering offences.

Conclusion:- While the description above is certainly not exhaustive, it can be seen that the legal framework governing money laundering has definitely been expanded to meet the ever-changing nature of financial crimes, which is more than enough as a reason for all FIs (Fintech companies included) in particular to seek additional guidance via consultations with trained professionals on all AML/CFT compliance requirements under the new regulatory framework going forward.

Kiely Rodni case: authorities announce the discovery of the remains, probably those of a missing teenager


NEWYou can now listen to Fox News articles!

California authorities have said they believe the remains of missing 16-year-old graduate Kiely Rodni have been found in a reservoir near where she was last seen more than two years ago. weeks.

“We got the vehicle back, we got the vehicle back last night,” Nevada County Sheriff Shannan Moon said at a news conference. “We have located a deceased person inside the vehicle. We believe this is our missing person. We have not been able to identify him for certain, but it is more than likely. “

The investigation is still active, she added.

The Sheriff’s Department announcement comes a day after a volunteer dive team said they found their 2013 Honda CRV missing in 14 feet of water with a body inside.


Kiely Rodni went missing on August 6 just after midnight, shortly after telling her parents she was coming home.

Adventures With Purpose (AWP), a group with a popular YouTube channel that helps with missing persons cases, announced on Facebook on Sunday that they found Rodni’s vehicle upside down in 14 feet of water with a body inside. interior. Law enforcement had previously searched the area by plane, helicopter, boat and with divers.

The vehicle was found in the tank upside down, Captain Troy Sander said during the briefing, in an area that had already been ‘extensively searched’ and very close to where Rodni was last seen. . He said investigators would look into the initial lack during debriefing.

Police arrived at the reservoir later and pulled the light-colored SUV out of the water, but authorities waited for official confirmation throughout the evening. Images of the vehicle show that it has frontal features that resemble those of Rodni’s missing Honda.


Inset: The SUV pulled out of the water near the Prosser Family Campground on Sunday.  Background: Kiely Rodni's 2013 Honda CRV.

Inset: The SUV pulled out of the water near the Prosser Family Campground on Sunday. Background: Kiely Rodni’s 2013 Honda CRV.
(KTXL, Placer County Sheriff)

She was last seen late August 5 or early August 6 at the party – which involved between 200 and 300 minors and young adults, authorities said. There were drugs and alcohol.

Extensive searches of the surrounding area by land, air and sea yielded nothing until the AWP arrived this weekend to assist. Authorities said the reservoir’s water level had dropped more than a meter since August 6, when Rodni went missing.

Kiely Rodni was last seen at a rural campground near the California-Nevada border around 12:30 p.m. on August 6, according to local authorities.

Kiely Rodni was last seen at a rural campground near the California-Nevada border around 12:30 p.m. on August 6, according to local authorities.

Rodni’s disappearance under suspicious circumstances was initially considered a possible kidnapping. Police interviewed more than 100 partygoers, and none of them said they saw her leave.

Sami Smith, a friend who said she was with Rodni the whole evening until she left the party around 12:20 a.m., said they met several new people but no one who seemed suspicious. However, she noted that Rodni seemed too drunk to drive.


Last week, authorities said they interviewed “most” out-of-town visitors who attended the party, which was a high school graduation send-off for students from various high schools in the area in north of Lake Tahoe. Some guests were visiting the vacation community from as far away as the Bay Area.

An autopsy was scheduled for Tuesday, authorities said. Toxicology results could take four to six weeks to come back.

Ten Questions Every Cloud Security Team Should Ask


Security teams should understand that cloud infrastructure differs dramatically from data center infrastructure. Vulnerabilities, attack patterns and security solutions are all different.

The cloud is not just a remote data center in the sky. DevOps developers and engineers build their cloud infrastructure when they need it and can make (and change) infrastructure decisions on the fly, including security-critical configurations. With every change comes a new risk of misconfiguration that leaves cloud environments and data open to attack, and make no mistake: bad guys will find it.

This represents a sea change in the role of the security team and how they go about securing the cloud. Attackers don’t traverse traditional networks that security teams can monitor with familiar solutions, such as intrusion detection and network security tools.

When developers build apps in the cloud, they also build the infrastructure for their apps, instead of waiting for IT teams to provide them with the physical infrastructure they need. This process is now done with code, which means that the basic mechanism of communication in cloud computing is the application programming interface (API) – the “middleman” software that allows different applications to interact. . This eliminates a fixed IT architecture requirement in a centralized data center.

It also means that the traditional data center security model — erecting an outward-facing barrier around the network perimeter to block inbound attacks — doesn’t apply in the cloud.

In an entirely software-defined world, the role of the security team becomes that of subject matter experts who impart their knowledge to the people who create applications (developers) to ensure that they are working in a secure environment. This dissemination of knowledge is done with politics as code (PaC), which allows developers to express security and compliance rules in a programming language that an application uses to verify the correctness of configurations.

PaC checks other code and runtime environments for undesirable anomaly conditions. It allows all cloud stakeholders to operate securely without ambiguity or disagreement about rules and how to apply them at both ends of the software development lifecycle (SDLC).

The security team must also change their mindset by trying to detect intrusions as they occur. It’s just not possible in the cloud. By the time they spot any suspicious activity, the hackers will have taken what they want and slipped away. Prevention has become the only hope in cloud security because hacks are too fast and hard to notice in real time.

Here are 10 questions every cloud security team should answer to effectively secure their cloud environment and data:

  • How well do we understand our cloud environment and use cases? Cloud security teams can’t do their job if they don’t work closely with developers and DevOps teams to understand the architecture of their cloud environment, the applications supported by the infrastructure, the data involved, and the SDLC for the infrastructure.
  • How non-compliant is our environment? It has become a fundamental but important question. Determining the answer requires regular review of the organization’s security policies and regulatory compliance standards. Most enterprise environments are not compliant. So create a prioritized remediation plan that defines specific steps and timelines to bring the cloud environment into compliance.
  • How many misconfigurations do we see? The answer will depend on the size and complexity of the cloud environment, but is significant in terms of risk and the engineering resources needed to manage it. Enterprise-scale cloud environments can experience dozens or hundreds of misconfiguration deployments every day. Put processes in place to quickly identify and prioritize them by severity, then link those issues to IaC so the team can streamline resolutions.
  • Are we reducing the misconfiguration rate? Cloud security can become a never-ending mole game unless teams take steps to prevent misconfigurations earlier in the SDLC, including continuous integration and continuous delivery (CI) safeguards. /CD) and IaC controls. Knowing which vulnerabilities have been discovered and patched is only one piece of the overall security puzzle. The team will also want to know what proactive steps are being taken at this time to reduce the frequency of deployed misconfigurations by checking IaC in development and in CI/CD pipelines.
  • How could hackers attack the environment? Every major cloud breach involves attackers compromising the cloud API control plane for discovery, move, and mining. Security teams need to understand how these attacks occur and protect against them with secure architecture design. Think like a hacker to understand the potential blast radius of any initial penetration into your environment.
  • Are we rotating cloud API keys correctly? The API control plane functions as the collection of APIs used to configure and operate the cloud. Attackers covet API keys they can use to exploit cloud environments, and these are often left in many places, including source code and on disks. Rotating API keys regularly has become one of the fastest ways to guard against this risk, but coordinate closely with application teams when changing key rotation.
  • Can we respond to a zero-day event? Attackers don’t adhere to the arbitrary boundaries we tend to draw around certain parts of our system. They move freely between application and infrastructure layers to get what they are looking for. Security teams need an unobstructed top-to-bottom view of the technology stack to get full context of their security posture and immediately identify the blast radius risk of any vulnerability when it surfaces.
  • How are company cloud security policies expressed? If security policies live in rulebooks and checklists, then the company requires its team members to memorize the rules. This increases the risk of human error. Express all policies in PaC to eliminate ambiguity and differences in interpretation and automate enforcement.
  • Are we retaining the other teams? Security has become the biggest factor limiting the speed at which teams can move into the cloud and the success of digital transformation efforts. It’s not enough to make sure everyone is working securely in the cloud: security teams need to help the organization scale faster. Regularly measuring developer throughput will help identify delays due to manual security review and approval processes that are slowing developer productivity levels.
  • Do we have what it takes to succeed? Effective cloud security requires the right tools, the right skills (especially cloud engineering and architect skills) and a holistic approach to the bridge between teams and cost centers, including the C suite. can only be successful with senior executives supporting developers and security with adequate investments of budget and time.

Companies should set up the job of securing a company’s cloud infrastructure as a constant, never-ending process, like a continuous fitness routine. Implement a policy requiring consistent reporting of the organization’s cloud security posture. Security teams will find this easier to do once they have adequately answered these 10 questions.

Josh Stella, Chief Architect, Snyk

Central Bank of India set to exit RBI PCA framework soon: report


The Central Bank of India, the only public sector lender under the RBI’s Rapid Remedies (PCA), could see restrictions lifted soon after its financial health improves.

The bank has already made representation to the Reserve Bank of India (RBI) on the basis of improving financial metrics on a sustained basis over the past five quarters, sources said.

According to sources, the RBI is considering the bank’s application and may decide on it soon based on quantitative and qualitative parameters.

The Central Bank of India announced a 14.2% increase in its net profit to Rs 234.78 crore in the first quarter ended June this financial year, from Rs 205.58 crore in the same quarter it a year ago.

In the last quarter, the bank’s gross NPA fell to 14.9% of gross advances, from 15.92% a year ago. Net NPAs also declined to 3.93% from 5.09% in the first quarter of the previous year.

Of the three PSU lenders under RBI watch, Indian Overseas Bank and UCO Bank were removed from the framework in September 2021.

The Central Bank of India was placed under the APC framework in June 2017 due to its high net non-performing assets (NPA) and low return on assets.

PCA is triggered when banks breach certain regulatory requirements such as return on assets, minimum capital and amount of non-performing assets, including on loans, executive compensation and attendance fees.

The bank under PCA faces RBI restrictions on dividend distribution, branch expansion, executive compensation or the requirement for promoters to inject capital.

Last year, the RBI issued a revised Rapid Corrective Action (PCA) framework for banks to enable prudential intervention at the “right time” and also act as a tool for effective market discipline.

In line with the revised guidelines, capital, asset quality and leverage are the primary areas of oversight under the revised framework.

(Only the title and image of this report may have been edited by Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)

This is why we love the MK3 Ford Escort


When it comes to Ford, many extremely successful cars come to mind. One is the very popular and enduring Ford Escort, which was in production for 36 years, from 1968 to 2004. The Ford Escort was a family engine, albeit a small family car. With six generations of Escorts launched over its 36 year lifespan, it’s time to check out the third generation model – Escort MK3 which was hugely popular across the pond in the UK.

Because there are so many variants when it comes to the Ford Escort, unfortunately not all of them can be mentioned. But let’s start with the standard base Ford Escort MK3 and move on to arguably the best Escort ever built in the form of the RS Turbo. So the basic Escort MK3 was very popular and moderately cheap. It was very basic and came with a 1.3 liter CVH engine, which was connected to a four-speed manual transmission. The appearance of the base version of the Ford Escort MK3 was attractive and quite nice, but nothing spectacular. While the base MK3 would get you from place to place and provide you with a strong, durable and reliable car, it never gave you the extra thrill and excitement that the RS Turbo offered. So let’s have a good time…

Related: Check Out Princess Diana’s Impressive 1985 Ford Escort RS Turbo

Here’s what went wrong with the RS1600i

Towards the end of the 1970s, sales of the earlier MK2 Escort began to decline and it began to show its age. This is when Ford developed the Escort MK3, which went on sale in September 1980 and became extremely popular very quickly. Unlike the rear-wheel-drive system found on the MK2, the MK3 had a front-wheel-drive system with fully independent suspension mounted all around.

What really got people talking about the Ford Escort, and what got people so excited about the Ford Escort, was Group A MK3 homologation in the form of the RS1600i. Bred for Ford’s thirst for motorsport, this hardcore version of the MK3 has received numerous upgrades specifically designed for racing. This included a revised aero package, improved suspension and a highly tuned engine. Although the MK3 RS1600i was so successful that Ford sold 50% more than it needed to be accepted into Group A, it was a flop and earned very little.

Related: Here’s What a 1981 Ford Escort Costs Today

Was the MK3 RS Turbo the best of the best?

That’s when Ford decided to upgrade the MK3 yet again. They developed the RS Turbo quickly, and with extra power it was able to produce 132 hp and 133 lb-ft of torque rather than the RS1600i’s 115 hp and 106 lb-ft of torque. Ford hoped the RS Turbo would be impressive enough to compete on both circuit and rally. But since the RS Turbo was also a Group A homologation, this meant that 5,000 production cars had to be built in a year. Because of this and many other delays, the RS Turbo was finally launched in October 1984 and finally went on sale in early 1985.

The RS Turbo came standard with an advanced viscous-coupling limited-slip differential, as well as being the first-ever small Ford to feature a turbocharger. The Ford Escort MK3 RS Turbo housed a 1.6-liter CVH inline four-cylinder engine, water-cooled, naturally aspirated, with wet sump lubrication, a single overhead camshaft and two valves per cylinder. Which, of course, was arranged transversely. This rather impressive 1980s engine was mated to a 5-speed manual transmission, while electronic ignition was paired with the turbocharger, intercooler and Bosch KE Jetronic fuel injector to produce as much horsepower as possible.

Just like the RS1600i, the chassis of the RS Turbo was established on the body of the standard MK3. While the majority of the car was built using steel body panels, fiberglass was used to add that racing element. The suspension used on the RS Turbo was pretty much identical to the already upgraded RS1600i suspension. But unlike the RS1600i, the RS Turbo featured anti-roll bars front and rear. To help the RS Turbo in races, longitudinal tie rods, transverse arms with reinforced rubber and separate coilover shock absorbers were added to the rear of the vehicle. At the front of the vehicle, the RS Turbo featured an aluminum crossmember, TCA tie rods and MacPherson struts. Although speed is key in rallying and racing, stopping is also quite important, which is why the Ford Escort MK3 RS Turbo has been fitted with the same 240mm ventilated front brake discs as the RS1600i, while the rear drums increased by 180 mm. at 203mm.

Related: Watch This Mechanic Start A Ford Escort Diesel Cart After 11 Years Of Sitting

It’s easy to see why the Ford Escort was one of the best-selling Ford cars in Europe. its appearance was eye-catching, while its construction was reliable and trustworthy. They have provided you with a fantastic family car that could quickly turn into an absolute beast of a car that could keep you entertained for hours. With the Ford Escort MK3 RS Turbo’s fairly advanced setup, for its time anyway, it was able to reach respectable speeds of 132 mph. While it could manage a straight-line 0-60 mph in 7.8 seconds. Of course, providing its driver with insane amounts of fun!

Source: Ford

There is an afterlife of x86


Box86 and Box64 are two pieces of software that allow applications designed for X86 to run on ARM devices like the Raspberry Pi. It also aims to be both simple to use and able to run on low-end devices.

First and foremost, it’s a fully open-source project, which means it has the full support of the community behind it.

However, one man is at the forefront of this effort, and I had the pleasure of chatting with him about what Box86 and Box64 are, where they came from, and what the future holds for the project.

Here’s what we discussed.

Interview with the main developer of Box86 and Box64: Ptitseb

I hope the questions and their answers will make for a good read and give you a better understanding of X86 emulation and ARM peripherals in general.

Q. What were your main reasons for creating Box86 and Box64?

Ptitseb: My main goal was to create an x86 emulator that worked on low spec hardware. I am quite active in the Open Pandora community [a small single-core ARM computer from 2012] and I wanted to create a usable emulator for it. Simply put, I wanted a small and fast emulator for my Open Pandora

Q. Who is your target audience with Box86 and Box64? Is it intended to be used only by Linux enthusiasts or only by the average Linux user?

Ptitseb: Besides speed, one of my other goals with Box86 and Box64 is to have something that everyone can use. I designed Box86 to be as unintrusive as possible; you install it, and then it works. For now I’m only providing the source code, so until it’s pre-compiled it’s not for everyone as it still needs to be compiled from source (even though it’s is relatively easy to do).

For now, it’s for power users, but the end goal is to make it easy for everyone to use.

Q. How are Box64 and Box86 different from previous attempts to run X86 applications using QEMU?

Ptitseb: As I said before, my goals were to have something quick and easy to use. So I made a lot of choices that the QEMU team didn’t. For example, the main goal of QEMU is to be as accurate and as close to real hardware as possible. My goal is not that. Instead, I want something fast, even if I have to do some guesswork to do it.

I guess the biggest difference between Box86/Box64 and QEMU is that I want Box86 to be as close to real hardware as possible and not as close to emulated hardware (like you would find in QEMU). For example, X86 processors use 80-bit data, which ARM processors simply cannot handle. Although I can emulate this, it would reduce the speed drastically, so I’m using 64-bit double data instead. And it works! Even if it doesn’t work 100% of the time, for games, who cares!

Simply put, with this approximation, I get a lot more speed, at the cost of accuracy.

Q. Linux runs on an incredibly large number of devices. Due to this diverse target, I guess not all hardware will work. So what type of hardware is currently supported?

Ptitseb: For Box86 to work, the computer must be Little Endian. This is a strict requirement, because Box86 translates code, not memory. Other than that, there isn’t much stopping Box86 and Box64 from working, other than a few other things.

Obviously, for Box86 to work you need a 32-bit operating system and for Box64 a 64-bit operating system, which is another essential requirement. Finally, if you want to use Dynarec, which increases the speed considerably, you must use ARM and not test on an X86 PC.

Q. With the release of the Steam Deck, Valve promised vastly improved compatibility with Windows games thanks to the Proton Compatibility Layer. Once the new version of Proton is released, do you think it will be possible to run these games with Box64?

Ptitseb: Honestly, I don’t know, I still have to start working on that. It’s definitely something I want to work towards, mainly because it would be nice to have that! However, before I can get this to work, I have a few other things that need to be completed first. For example, Steam is not working very well yet, so it will need to be improved before I can start working on Proton.

So yes, it is a goal, but it will still take time before it works well.

Q. I’m sure you’re familiar with Apple’s Rosetta 2 translation layer. How do Box64 and Box86 compare?

Ptitseb: It’s hard to say, because I haven’t analyzed Rosetta 2 much yet. My understanding is that Rosetta uses an offline code converter, which neither Box86 nor Box64 have. Unlike Rosetta, Box64 does not keep translated code, but does everything in the runtime.

Other than that, Apple will always do the translation better than Box64 because they control the entire operating system. After all, I can’t just change Linux to fit Box64, it has to be the other way around.

Q. What future plans do you have for Box64?

Ptitseb: I am currently thinking of a new Box software, Box32, because why stop at two emulators when I can do three? Box32 will be a 64-bit emulator that runs 32-bit software. I can see, especially on ARM, that 32-bit hardware is being phased out, and as such Box86 will soon become obsolete as we won’t have any hardware to run it on.

But this one will be tricky because the wrapper will need to be much smarter than the implementations in Box86 and Box64. It’s a huge amount of work, so I always try to find a good solution that doesn’t require too much work on the conversion phase while still having something quick and usable. However, this is a future project, just because of its size.

Q. Looking at your GitHub profile, it looks like you’ve already done a lot of work porting individual games to Open Pandora. Is Box86 an extension of that, or is it a completely different project with different goals?

Yeah, I guess it’s an extension of that in some ways. On Pandora, I wear a lot of stuff, and to make the process easier, I forked GLshim, creating Gl4ES. This allows automatic translation from OpenGL to GLES2, which makes porting much faster.

After that I created Box86 which was yet another step to make porting easier. Now, even though I don’t have the sources, I can still port things to Open Pandora.

So yes, it’s kind of an extension of porting and making software available for hardware that it wouldn’t otherwise be available for.

Q. How does GL4ES fit into the picture? Is it necessary to play most games?

It really depends on the hardware. Some hardware doesn’t have a full OpenGL driver (or at least supported by Mesa), so you’ll need GL4ES to play games on hardware like this, because full PC games don’t care about GLES.

If the hardware is supported by Mesa, like the Raspberry Pi 4 or RK3399 SoC with Panfrost, you should be fine without it; you won’t need Gl4ES.

So if Mesa doesn’t support the hardware or the hardware doesn’t support OpenGL, you will need GL4ES to run games.

Q. Finally, is there anything you would like to say to the community?

Well, I see Intel, AMD, and the X86 world as a whole is dying. We saw in 2020 that Apple really shook up the world with the M1, and suddenly we saw that X86 isn’t the only thing that might be powerful enough for desktop computers.

We are now seeing alternate architectures such as RISC-V emerge, and ARM is also starting to appear on desktop computers. So, X86 isn’t the only way to have a powerful PC for gaming and general use, and Box86 and Box64 are really trying to help that movement.

After all, there is life after X86’s death.

Final Thoughts

With all the amazing work that Ptitseb has done, it was truly an incredibly interesting experience to get a deeper insight into how a project like Box86 works. The mention of a possible Box32 release was also very exciting to hear, and I hope you’re excited too.

If you want to learn more about Box64, I strongly suggest you read our post about it.

Box64 Emulator Released for Arm64 Linux

Box86, the popular x86 emulator, just got a huge update. This comes in the form of Box64, the ARM64 equivalent. If you didn’t know, Box64_86 lets you run 64-bit or 32-bit Linux programs on ARM systems. In other words, it allows you to access

With that, are you using Box86 or Box64? What do you think of the future of these projects? Please let us know in the comments below.

Preliminary PDP Framework Unveiled – BusinessWorld Online


The National Economics and Development Authority (NEDA) has unveiled an updated preliminary framework for the Philippines Development Plan (PDP) for 2023-2028, focusing on human capital and income development, as well as revitalization of the main sectors of agriculture, industry and services.

“It must be about developing and protecting the capacities of individuals and families. We want them to have the capabilities to earn more and protect that income,” NEDA Undersecretary Rosemarie G. Edillon said at the inaugural SyCip Gorres Velayo & Co. (SGV) Tax Symposium. Friday.

In an email to BusinessWorld, Edillon clarified that the framework she presented at the forum was updated the previous day (August 18).

As noted in the presentation, promoting human capital and social development will involve strengthening health and nutrition; improving education and lifelong learning; and establish viable communities.

“We need to address these learning losses, pre-pandemic and then during the pandemic, so that we can grow much faster in the future,” Ms. Edillon said in her presentation.

On the other hand, the goal of increasing income-earning capacity will require expanding training and skills development and intensifying employment facilitation.

At the same time, the protection of purchasing power is envisaged by ensuring food security and rationalizing social protection by targeting aid to the poorest.

At the same time, another aspect of the framework concerns the transformation of production sectors to generate more quality jobs and competitive products.

The modernization of agriculture and agro-industry, the revitalization of industry and the revitalization of the service sector will be achieved through advanced research and development, technology and innovation; strengthened cross-industry links; and promoted trade and investment.

The framework also mentions appropriate government interventions, namely: ensuring macroeconomic stability; develop and upgrade infrastructure; promote competition and regulatory efficiency; achieve peace and security; good governance and bureaucratic efficiency; and accelerating climate action and building resilience to disasters.

The framework will be finalized by next week, Ms Edillon said.

“If ever, [there will be] very minimal changes and maybe [it] will just have to be reflected in the long [and] More detailed PDP. In the latter case, there is no need to revise the PDP’s strategic framework,” she said in the email.

During the forum, Ms. Edillon acknowledged the risks to growth, including inflation, high input costs, fiscal deficit and slowing global demand.

“If this takes inflationary expectations into account, it will impact consumption, and that’s easily three-quarters of our GDP (gross domestic product), our demand,” she said. “The slowdown in global demand would have an impact on our exports [and] manufacturing too. »

Global commodity prices have surged in recent months due to the ongoing Russian-Ukrainian war and supply chain disruptions. Wheat and fertilizer prices have soared amid global supply shortages, putting pressure on the domestic agricultural industry.

Inflation stood at 6.4% in July, bringing the seven-month average to 4.7%.

The government has set its inflation rate assumption at 4.5-5.5% for 2022, reflecting the impact of soaring spending on transport, fuel and food.

The debt-to-GDP ratio also stood at 62.1% at the end of the second quarter, above the threshold prescribed by multilateral lenders for developing markets.

Earlier this week, Ms Edillon told reporters that NEDA was working to expedite the submission of the new PDP before its deadline in December.

The PDP serves as the government’s general guide for development planning. The new PDP created by NEDA is also anchored in an eight-point socio-economic program which also mentions ensuring food security, reducing transport and logistics costs and reducing the high cost of electricity.

The short-term program also includes mitigating the scarring impact of the pandemic by addressing learning losses and strengthening social protection, as well as ensuring strong macroeconomic fundamentals by improving bureaucratic efficiency.

The DPP coincides with the government’s medium-term fiscal strategy which aims to achieve GDP growth of 6.5-7.5% this year and 6.5-8% next year until 2028.

The new Porsche 911 GT3 RS comes with all the aero tricks in the book


Porsche’s latest 911 GT3 RS is here and with the looks of it, there’s no doubt that means business.

Rather than throwing a ton of power at the new RS, Porsche has instead focused on aero and cooling by taking proven features of the track-only 911 GT3 R and applying them to this road-racing car. .

Aerodynamics and cooling
First on the list of new additions is a larger radiator in the nose where the frunk of a normal 911 would be, replacing the usual setup of three smaller units. Like many aspects of the new RS, this comes from the 911 RSR and 911 GT3 R racing cars and leaves more room for active aerodynamics at the front.

Active elements in the nose maintain maximum grip and direct air to the radiator while pressure in and around the wheel arches is managed by a combination of blades and vents above and behind the front wheels. The cooling setup is so efficient that the inlets in the rear wheel arches are now just for aero channeling and no longer needed to keep the 518-hp flat-six happy in the back. The rear wheel arches feature a similar arrangement of slats and vents to the fronts.

Side view of the new Porsche 911 GT3 RS

Then we come to the absolutely massive, DRS-capable gooseneck rear wing. Featuring a fixed main section and a movable upper section, the DRS can be deployed with the press of a button on the steering wheel for straight-line speed, and can also act as an air brake in cooperation with the front flaps in case of strong deceleration.

It all adds up to give twice the downforce of the car it replaces and triple that of the “normal” 911 GT3: 900 pounds. at 125 mph and 1895 lbs. at 177 mph. Probably quite handy around corners then.

Image showing the actuator on the rear wing of the new Porsche 911 GT3 RS which gives it DRS and airbrake capabilities.

This aerodynamic attachment penetrates the bowels of the RS, with Porsche engineers believing that “the wheel arches of the new 911 GT3 RS are subjected to powerful airflows”. To manage and exploit these flows, the new GT3 RS has a suspension designed with “teardrop profiles” that generate 88 lbs. downforce on the front axle at high speed. If that doesn’t make you smile… you’re probably not a big nerd and you have a busy life.

For the rest of us, Porsche engineers have tweaked the RS’s front and rear suspension to “significantly reduce pitching under braking”, while the rear wheel steering has also been revised.

Rear quarter view of the new Porsche 911 GT3 RS on a circuit.

There are three driving modes: Normal, Sport and Track, the latter allowing the driver to adjust the compression and damping behavior of the car’s front and rear suspensions on the fly via a motorsport-derived operating system. . There is also a dial on the steering wheel to adjust the rear differential.

Image showing the interior of the new Porsche 911 GT3 RS.

Image showing the new Porsche 911 GT3 RS instrument cluster with suspension adjustment dials.

New camshafts with more aggressive cam profiles boost power from the naturally aspirated four-liter flat-six to 518 horsepower while the seven-speed PDK gearbox gets shorter ratios than the GT3 for acceleration. more explosive. Dedicated air intakes on the underbody keep the drivetrain cool during the extended trail work the RS was designed for. The 0-60mph sprint takes 3.2 seconds and at full throttle the GT3 RS will do 184mph.

Side view of the new Porsche 911 GT3 RS in a wind tunnel with air flowing through it.

Wheels and brakes
The RS gets slightly larger brakes than the GT3 with Porsche’s ceramic composite discs available as an option. A set of light-alloy forged center lock wheels come standard, but shell out extra for the Weissach set and you have the option to shell out again for a set of featherweight forged magnesium kicks that allow for save an extra 18 pounds.

Speaking of lightweight materials, Porsche has used carbon fiber reinforced plastic extensively on the RS with the door skins, front fenders, bonnet, roof and bucket seats made from this material, giving the GT3 RS has a base weight of 3268 pounds.

The Clubsport package can be optional at no extra cost by adding a steel roll bar, fire extinguisher and six-point harness for the driver. The Weissach package comes at extra cost but gives exposed carbon on the roof and aero parts as well as replacing the front and rear anti-roll bars and roll cage with CFRP versions for further weight savings.

Porsche’s latest and greatest road race car starts at $233,577.61.

Porsche images licensed under CC BY 2.0.

James Walker is an automotive journalist at Torque News focusing on Lucid Motors. If he has wheels, he’s interested and he can’t wait to see what kind of cars the electric vehicle revolution will bring us. Whether it’s fast, slow, new or old, James wants to take a look and share it in print and video, ideally with some twisty roads involved. You can connect with James at TwitterInstagram and LinkedIn.

How to Avoid Violation of Open Source Licenses


For developers, integrating software from open source projects into codebases is a great way to save time and avoid having to reinvent the wheel.

But it also comes with a major challenge: the risk of license infringement. When you reuse open source code, you must comply with one of the many open source licenses govern this code. If you don’t, you (or the company you work for) risk lawsuits for violating open source licenses.

And although such trials are relatively rare, they does it happen – and they may happen more and more often given that many open source projects are now controlled by corporations eager to champion the investment they make in open source communities.

Related: Secure open source software helps businesses find their edge

Keep reading for tips on how to avoid these legal issues if you’re borrowing open source code for your projects.

1. Learn about open source licenses

The most important step in avoiding open source license violation issues is to understand open source licensing.

It’s easy to assume that all open source licenses have the same requirements, or that they all boil down to requiring the source code to remain open. In reality, there are several dozen open source licenses, and their terms vary widely. It’s a big mistake to assume that just because you get code from an open source project, you can reuse it however you want, as long as you keep the source open. You may also need to attribute the original authors, as an example of a common – but easily overlooked – requirement of some open source licenses.

So, before choosing to use open source, learn the basics of open source licensing and understand the nuances and diversity between them.

2. Document when using Open Source

A second best practice for borrowing open source code is to establish a consistent process for documenting when you do so.

It’s quite easy to import a module or copy and paste code from GitHub. But if you don’t record where that code comes from or what license governs it, you can easily lose sight of where and how you integrate open source into your code base. It also becomes more difficult to prove that you have complied with the license terms that applied at the time you borrowed the code, which could become an issue if the applicable open source license changes.

To avoid this problem, consider including a page in your documentation wiki (if you have one) that records the open source code you have borrowed. At a minimum, you should also comment in your own source code when introducing open source components or dependencies.

3. Avoid Unlicensed Open Source Components

Sometimes you may come across an obscure GitHub repository or other source code hosting location that contains code you want to borrow but doesn’t specify licensing requirements at all.

You might be tempted to assume that the developers of the code want it to be open source and that they will let you do whatever you want with it. But this is a risky assumption. It is possible that the developers will later impose certain license terms on the code and expect you to follow them, which will lead to allegations of license violation down the line. Unless you have a very good reason to use obscure code without specific license terms, avoid it.

4. Create your own open source code

One way to mitigate some open source licensing risks is to make your own code base fully open source. This means that you will by default comply with any open source license terms that require derivative source code to remain open.

Related: Who Uses Open Source Software and Why

Keep in mind, however, that simply opening your own code does not guarantee full license compliance. The licenses that apply to the code you’ve borrowed may be different from the open source license you choose, so you’ll still need to put some effort into making sure you meet the requirements of each license. But at least you won’t have to worry about terms related to source code sharing.

5. Automatically identify open source components

While it’s recommended to manually track where and how you use open source in your codebase, you can reduce the risk of oversights by using software that helps you automatically identify open source components and dependencies.

There are two types of tools to consider here. One is Source composition analysis, or SCA, which automatically analyze source code and identify components borrowed from known third-party sources. The other is software supply chain management tools, which help identify and track (among other things) all open source dependencies within your application stack.


Open source is great, but navigating the complexities of open source licensing can be harder than it first appears. Make sure you have the right tools and processes in place to leverage open source responsibly without running into license violation issues.

About the Author

Christopher Tozzi is a technology analyst specializing in cloud computing, application development, open source software, virtualization, containers, and more. He also teaches at a major university in the Albany, New York area. His book, “For Fun and Profit: A History of the Free and Open Source Software Revolution”, was published by MIT Press.

First responders and volunteers practice emergency skills at event at Cedar City Airport – St George News


CEDAR TOWN — A full-scale disaster simulation exercise designed to give emergency responders hands-on practice in dealing with a mass casualty event was held at Cedar City Regional Airport on Tuesday evening.

Rescuers evacuate and treat passengers during a mock disaster drill at Cedar City Regional Airport, Cedar City, Utah, August 16, 2022 | Photo by Jeff Richards, St. George News/Cedar City News

The scenario, which involved some three dozen volunteer “victims”, was designed to simulate a runway accident between a small airliner and a helicopter.

An old school bus served as the fuselage of the plane, which had 34 passengers on board. A short distance away, the hull of a helicopter contained six mannequins representing deceased victims, plus a survivor with serious injuries.

At approximately 7:30 p.m., the ignition of some solid rocket fuel sent large bursts of flame and clouds of smoke into the sky, signaling the “crash” between the two planes and the start of the exercise.

The first to respond was a large Oshkosh Striker 1500 airport rescue fire truck, which quickly sprayed water on the flames.

Soon after, numerous fire trucks, ambulances and law enforcement vehicles began arriving in preparation for a rescue effort to help passengers off the bus and treat them for their “injuries”.

Many of the passenger “victims” had applied realistic-looking molded makeup and were instructed to act as if they had a particular injury or set of symptoms. They were sorted into three different groups based on the severity of their imagined injuries.

Mock Disaster Exercise at Cedar City Regional Airport, Cedar City, Utah, Aug 16, 2022 | Photo by Jeff Richards, St. George News/Cedar City News

The first wave of passengers who got off the bus were those who could get out on their own. They were taken to a green tarp, where they sat and were treated for minor injuries. The remaining passengers, who ended up making it to the yellow (moderate) or red (critical) tarps, were helped off the bus by firefighters and treated by paramedics.

Airport manager Nick Holt said the exercise is a mandatory event held every three years, as required by the Federal Aviation Administration.

“It’s a requirement for the airport to maintain its Commercial Airport Operator Certificate,” Holt said.

Airport operations specialist Tyler Galetka said he and others had been planning the event for the past six months.

“We had a lot of planning meetings. We have involved many entities and many contributions from critical actors,” he said.

Specifically, he said Tuesday night’s exercise was meant to follow the scenario of what could happen if a SkyWest CRJ200 aircraft collides with an SUU Aviation helicopter “and how we would react to that and assess the response.”

Rescuers evacuate and treat passengers during a mock disaster drill at Cedar City Regional Airport, Cedar City, Utah, August 16, 2022 | Photo by Jeff Richards, St. George News/Cedar City News

“There are always hiccups in these drills,” Galetka added. “There are always communication losses and breakdowns. And that’s why we do it. The FAA wants us to do this, so we can assess it, see what’s wrong and fix it when a real-life scenario happens and prepare for it.

The Cedar City Fire Department had about three dozen firefighters responding to the incident, along with several fire trucks and other devices. Several Gold Cross crews and paramedics also responded, as did personnel from the Cedar City Police, Iron County Sheriff’s Office, Iron County Emergency Management, Southern Utah University and from Intermountain Healthcare.

Also in attendance were personnel from Cedar City Regional Airport and the Transportation Security Administration, as well as SkyWest Airlines and SphereOne Aviation. Local radio amateurs and other volunteers also lent their support.

Two medical helicopters also responded, one from Intermountain Life Flight and the other from Air Methods Mercy Air.

“Life Flight landed at the scene and participated until notified of another call,” noted Holt, adding, “Classic helicopters were also en route when they received a page and n couldn’t get to the airport.”

Additionally, a MedEx Air One fixed-wing aircraft from Nevada also loaded a patient and took off from the runway during the simulation.

“What this exercise does is bring all the agencies together to deal with if an incident at the airport were to occur,” Cedar City spokeswoman Gabrielle Costello said afterwards. “We have victims who are played by members of the community and who simulate (so that) if something were to happen, how we would deal with it and how we would manage our resources.”

“This is a great opportunity for all of us to work together and resolve these issues so that we can respond as effectively as possible,” Costello added.

Photo gallery

Copyright St.George News, SaintGeorgeUtah.com LLC, 2022, all rights reserved.

North Glasgow Strategic Development Framework Update


A Glasgow City Council committee has reviewed the final version of the North Glasgow (SDF) Strategic Development Framework.

This framework, one of six for the city, will guide the development and regeneration of the area over the next 30 years, setting out area-specific principles that will help determine key planning applications and include programs for action to support the delivery of key proposals in North Glasgow.

The North Glasgow SDF project was partly shaped by public consultation in late 2020/early 2021, and its vision is for North Glasgow to become a healthy, high quality and sustainable place in which to live, work and visit.

The SDF has four key results as its main objectives:

  • A Working North – attractive and accessible places of business that support business, employment and economic inclusion
  • A livable North – thriving and sustainable neighborhoods that support healthy living
  • A Connected North – an area with excellent public transport and active connections, to encourage increased use of healthy travel modes and reduce car use
  • A Green North – an accessible, multifunctional green network where nature and communities can thrive.

The North Glasgow SDF reflects the policies of the city’s development plan, sets principles to guide development and supports the delivery of initiatives such as the City Deal work at Sighthill and Canal/North Gateway, the Glasgow Canal Regeneration Partnership and the Transformational Regeneration Areas (TRA). at Sighthill and Maryhill. It sets out the following vision and key outcomes for this area of ​​the city.

Councilor Kenny McLean, responsible for housing, development, built heritage and land use at Glasgow City Council, said: ‘The North Glasgow Strategic Development is a long-term plan which will guide future development of this area of ​​the city, building on the extensive work currently underway at various sites. North Glasgow is an area with underutilized assets, and this framework will help us realize them, benefiting not just local communities, but the city as a whole.

The North Glasgow SDF scheme will now be referred to the council’s City Management Committee for approval, and the Scottish Government will be advised before the North Glasgow SDF is adopted as further guidance to the town’s development plan. town.

What’s new with the facelifted 2023 BMW X7?


When BMW revamped its X7, it took one of its most controversial cars and made it even more controversial. However, for some enthusiasts (including this humble blogger), it has improved with its new facelift. Not only in its appearance, but also in its technology. So let’s take a look at some of the new X7 updates.

We have to start at the front, where the massive grille remains massive but its headlights have changed quite a bit. Replacing the old, far too skinny lamps are new split headlights borrowed from the new 7 Series. The new headlights actually make the grille look more proportionate to the rest of the front end. While I don’t to like the design, I think it’s much better than before.

Inside, the BMW X7 also receives some updates. The main one is the addition of iDrive 8, which replaces the old iDrive 7. It is an improved infotainment system that adds more features, while making the user interface simpler and easier to use. utilize. Admittedly, the new air conditioning functions, integrated into the touch screen, are annoying. However, the rest is an improvement.

bmw x7 facelift gray dravit 05 554x830
Photo by Hendrick BMW and instagram.com/krispycaptures

One of the biggest upgrades inside is the new digital gauge cluster, which comes in a package with iDrive 8. The old Live Cockpit Professional kind of sucked. It was confusing, ugly and lacked any kind of real customization, the latter being the whole point of digital gauges. However, the new one is sharper to look at, has better graphics, is easier to read and understand, and offers more customization, but still not as much as its competitors.

The BMW X7 LCI also gets a new engine, the all-new S68 engine. The S68 is a true M Division V8 that will power all future V8-powered BMWs, even non-M cars. In its M Performance X7 M60i specification, the S68 produces an identical 523 horsepower and 553 lb-ft as outgoing S63 engine. However, this is just to keep the M division hierarchy alive.

[Photos by Hendrick BMW and instagram.com/krispycaptures]

Lendflow uses Ocrolus to improve access to credit for small businesses

By Edlyn Cardoza


  • Cash flow
  • credit decision
  • credit management

Ocrolus, the document and data analytics platform that helps financial services firms make high-quality decisions with trusted data, announced that it is working with Lendflow to quickly and accurately determine the viability of borrowers and provide critical access to capital.

“In a challenging economic environment with rising interest rates, small businesses are finding it difficult to access credit from traditional financial institutions that are tightening lending criteria in an effort to mitigate risk,” said John Forrester, Senior Vice President of Products at Ocrolus. “Lendflow has really stepped in to enable every lender, fintech, or SaaS company serving SMBs to provide faster, easier, and cheaper access to credit.”

Lendflow, an embedded solutions provider SME loans, leverages Ocrolus’ document automation technology to analyze data from documents, such as bank statements, W-2s, and business tax returns, and provide critical insights into income, daily balances, and more of a business. Ocrolus provides Lendflow with information about a borrower’s cash flow to determine where a loan request should be routed within its lender network. Lendflow also uses individual cash flow metrics provided by the document and data analytics platform in its credit decision engine, enabling lenders to process SME credit applications efficiently.

“Ocrolus has allowed us to increase efficiency and automation at scale,” said Jon Fry, CEO and co-founder of Lendflow. “With Ocrolus, our customers can launch new credit products and get to market quickly because cash flow analysis is at the heart of decision-making. In turn, they can help their SME clients with seamless and faster access to financing that they didn’t have before. »

Industry leaders like Lendflow are increasingly turning to Ocrolus to make better, faster lending decisions through AI-powered automation. Ocrolus is a document automation platform that powers the digital lending ecosystem, automating credit decisions for small business, mortgages and consumer loans.

Previous post

Mambu enables OKEO to offer multi-currency payments

Read more

Capital Power Releases First Green Finance Framework


EDMONTON, Alberta, Aug. 15, 2022 (GLOBE NEWSWIRE) — Capital Power Corporation (“Capital Power” or “the Company”) (TSX: CPX) has released its first Green Financing Framework (“Framework”) under which the Corporation will issue green bonds and green loans (“green financing”). The framework reflects the company’s commitment to allocate capital to wind, solar and storage projects that align with the company’s sustainability goals and support its strategy to be net carbon neutral by 2050 .

“Establishing a green finance framework exemplifies Capital Power’s commitment to powering a sustainable future for people and the planet. Developing wind, solar and storage projects is a critical pillar of our growth and decarbonization strategy,” said Sandra Haskins, Senior Vice President, Finance and Chief Financial Officer. “The framework provides transparency to our stakeholders as we execute our strategy.”

The framework sets out guidelines for Capital Power’s green financing in accordance with the Green Bond Principles 2021 issued by the International Capital Markets Association (“ICMA”) and the Green Loan Principles 2021 issued by the Loan Market Association and Loan Syndications and Trading Association. The framework has also been designed to align with the practices, actions and information recommended in ICMA’s Climate Transition Finance Handbook 2020.

Under the framework, the net proceeds of green financing will be earmarked or used to finance or refinance, in part or in whole, new and/or existing green investments and expenditures made by the company that meet the renewable energy category. , as defined in the framework and are aligned with the UN Sustainable Development Goals: Affordable and Clean Energy; industry, innovation and infrastructure; and climate action.

Until the green financing issued under this framework is fully allocated, Capital Power will report publicly on the use of the proceeds within one year of issuance and annually thereafter. Allocation and impact reports will be posted on the company’s website. An external verification of the allocation report will be carried out by an independent external auditor on an annual basis until the funds have been fully allocated.

Sustainalytics has reviewed the framework and provided a second-party opinion confirming that the framework is credible and impactful and aligns with the 2021 Green Bond Principles and the 2021 Green Lending Principles. BMO Capital Markets advised Capital Power on the development of the framework as the main structuring agent.

Sustainalytics’ green finance framework and second-party opinion can be viewed on the company’s website.

Forward-looking information
Certain information contained in this press release is forward-looking within the meaning of Canadian securities laws with respect to anticipated financial and operational performance, events or strategies. Forward-looking information or statements are provided to inform shareholders and potential investors of the Company of management’s assessment of Capital Power’s future plans and operations. This information may not be suitable for other purposes. Forward-looking information in this press release is generally identified by words such as want, anticipate, believe, plan, intend, target and expect, with similar words suggesting future results.

Material forward-looking information contained in this press release includes expectations regarding: (i) the Company’s intention to conduct Green Financings, (ii) the use of Green Financing proceeds and the allocation of such proceeds in accordance with Framework, (iii) the impact of Green Finance spending on the achievement of the Company’s decarbonization objectives, and (iv) Allocation and Impact Reports and external verification of Allocation Reports.

These statements are based on certain assumptions and analyzes made by the Company in light of its experience and its perception of historical trends, current conditions, expected future developments and other factors it deems appropriate, including its review businesses and assets purchased. Important factors and assumptions used in making these forward-looking statements relate to: (i) electricity and other energy prices, (ii) performance, (iii) business prospects (including potential renewal of facilities) and opportunities, including growth and investment projects, (iv) status and impact of policy, legislation and regulation, (v) effective tax rates, (vi) availability and sources of capital, and (vii) the ability to obtain required regulatory approvals.

Whether actual results, performance or achievements will be consistent with the Company’s expectations and projections is subject to a number of known and unknown risks and uncertainties that could cause results and actual experience differ materially from the Company’s expectations. These important risks and uncertainties are: (i) variations in electricity, natural gas and carbon prices in the markets in which the Company operates and the use of derivatives, (ii) regulatory and political environments, including including changes in environmental, financial reporting, market structure and tax legislation and the receipt and timing thereof of required regulatory approvals, (iii) the availability and performance of production facilities, including including equipment maintenance, (iv) ability to finance current and future capital and working capital requirements, (v) acquisitions and developments, including timing and costs of regulatory approvals and construction, ( (vi) changes in market prices and fuel availability, (vii) the ability to realize the anticipated benefits of acquisitions, (vii) inherent limitations in reviewing by the Company of the assets acquired, (viii) changes in general economic and competitive conditions, including interest and exchange rate fluctuations, and (ix) changes in the performance and cost of technologies and development new energy efficient technologies, products, services and programs. See “Risks and Risk Management” in the Company’s 2021 MD&A for further discussion of these and other risks.

Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of the date of endorsement specified. The Company neither undertakes nor accepts any obligation or undertaking to issue updates or revisions to any forward-looking statements to reflect any change in the Company’s expectations or any change in events, conditions or circumstances about which a such statement is based, except as required by law.

About Capital Power
Capital Power (TSX: CPX) is a growth-oriented, strategically focused North American wholesale power producer in sustainable energy headquartered in Edmonton, Alberta. We build, own and operate high-quality, large-scale generation facilities that include renewable and thermal energy. We have also made significant investments in carbon capture and use to reduce carbon impacts and are committed to going coal-free by 2023. Capital Power has approximately 6,600 MW of power generation capacity in 27 facilities in North America. Projects in advanced development include approximately 385 MW of renewable power generation capacity held in North Carolina and Alberta and an additional 512 MW of natural gas-fired combined cycle capacity from the Genesee 1 and 2 resupply in Alberta.

For more information please contact:

Media Relations:
Catherine Perron
(780) 392-5335
[email protected]
Investor Relations:
Randy Mah
(780) 392-5305 or (866) 896-4636 (toll free)
[email protected]