is US defense contractor to pay former Iraqi detainees $42 million for its role in torture at notorious Abu Ghraib prison - CNN By news.google.com Published On :: Wed, 13 Nov 2024 11:31:00 GMT US defense contractor to pay former Iraqi detainees $42 million for its role in torture at notorious Abu Ghraib prison CNNAbu Ghraib torture survivors win US civil case, $42m damages Al Jazeera EnglishUS jury awards $42m to ex-detainees at Iraq's Abu Ghraib BBC.comHow a Troy lawyer convinced U.S. jury to award $42 million to 3 Iraqi prisoners Detroit Free PressU.S. Jury Awards $42 Million to Iraqi Men Abused at Abu Ghraib The New York Times Full Article
is Why is Elon Musk becoming Donald Trump's efficiency adviser? - BBC.com By news.google.com Published On :: Wed, 13 Nov 2024 12:34:16 GMT Why is Elon Musk becoming Donald Trump's efficiency adviser? BBC.comElon Musk, Vivek Ramaswamy to lead Trump's Department of Government Efficiency Fox News Full Article
is How to Speak Spanish (Basics) By www.wikihow.com Published On :: Mon, 11 Nov 2024 16:00:00 GMT Believe it or not, Spanish is the second-most spoken language on the planet. Developing your Spanish-speaking skills is a great way to meet new people, communicate with Spanish speakers, and immerse yourself in a new way of thinking. If you want to speak Spanish, start by learning the common phrases and vocabulary terms. Once you feel a little more comfortable with the language, you can learn a lot more by immersing yourself in the language, taking classes, and practicing to develop fluency in the language. Full Article
is Bengaluru is the top option for Indian non-residents looking to buy mid-range and affordable homes By info.propertywala.com Published On :: Wed, 24 Jul 2024 04:53:17 +0000 Data gathered from several consulting firms by HT Digital indicated that Bengaluru has maintained its position as the top option for non-resident Indians wishing to invest in India’s residential real estate market, particularly those seeking affordable and mid-segment homes. The … Continue reading → Full Article Real Estate News Affordable Housing Bengaluru real estate Bengaluru's real estate market Indian real estate Indian Real Estate market
is Five things the real estate industry anticipates from the finance minister’s budget in 2024 By info.propertywala.com Published On :: Wed, 24 Jul 2024 05:42:16 +0000 Finance Minister Nirmala Sitharaman is scheduled to present Budget 2024 today, and the real estate industry anticipates that the government will prioritize affordable and middle-class housing in the plan. To increase affordability, it has advocated for an enlargement of the … Continue reading → Full Article Real Estate News India's real estate Indian 2024 budget Indian Real Estate market
is The elimination of indexation benefits in real estate will discourage secondary market sellers By info.propertywala.com Published On :: Thu, 25 Jul 2024 13:10:53 +0000 The real estate industry warned that eliminating indexation benefits for long-term capital gains would stunt its expansion, negatively affecting property owners and potentially increasing taxes. While experts thought low returns could still be a problem, authorities disagreed, citing high real … Continue reading → Full Article Real Estate News 2020 budget's impact on real estate 2024 Budget Indexation Indian real estate Indian Real Estate market LTCG
is DLF is set to debut high-end villas in Goa, priced between Rs 40 and Rs 50 crore By info.propertywala.com Published On :: Wed, 31 Jul 2024 05:01:21 +0000 Approximately 32 kilometers from the Goa International Airport in Dabolim, the opulent project will have 62 villas atop Reis Mago, a hill in Goa. In the second half of the 2024-2025 fiscal year, 62 ultra-luxury villas in Goa, priced between … Continue reading → Full Article Real Estate News DLF in Goa Goa Goa's real estate Goa's real estate market
is By selling 5.5 lakh square meters of land in FY25, Noida Authority hopes to raise Rs 3,700 crore By info.propertywala.com Published On :: Tue, 06 Aug 2024 04:32:24 +0000 According to officials, the Noida Authority projects that in the fiscal year 2024-2025, it will sell group housing plots for a maximum of Rs 1,080 crore and commercial land parcels for Rs 1,010 crore. According to people who know the … Continue reading → Full Article Real Estate News commercial land Indan real estate Indian Real Estate market noida Noida Authority Noida real estate Noida real estate market properties Real Estate Reeal estate market
is Make your properties shine brighter this Diwali! By info.propertywala.com Published On :: Thu, 17 Oct 2024 14:11:17 +0000 Hi there! As we light up our homes and hearts to welcome the joyous festival of Diwali, we want to extend our heartfelt wishes to you and your family for a season filled with health, happiness, and prosperity. ????✨ In … Continue reading → Full Article Announcements
is 12 Hidden iPhone Features You’ll Wish You Started Using Sooner By www.gadgetreview.com Published On :: Tue, 12 Nov 2024 21:30:00 +0000 Try these 12 incredible iPhone tips and tricks for 2024 that will change the way you use your iPhone! From a hidden sleep timer in the Clock app to bypassing annoying ads in Safari WITHOUT an ad blocker, these hacks will save you time and headaches! Full Article Top Lists
is Trump’s Vision for Flying Cars Gains Credibility with Addition of UFO Expert By www.gadgetreview.com Published On :: Wed, 13 Nov 2024 13:30:00 +0000 Trump's flying car initiative gains momentum as UFO expert Dr. Michael Salla signals potential involvement, bringing advanced aerospace expertise to ambitious urban development plan. Full Article Vehicles
is Felony offender registries By egov.cathexes.net Published On :: 2004-02-10T13:49:56-05:00 Someone came to the site looking for a Felony Offender registry. As far as I can tell the only state that has an online registry of felony offender is Tennessee. Here are two lists of links to official Megan's Law... Full Article
is Do Not Call List upheld By egov.cathexes.net Published On :: 2004-02-19T10:48:53-05:00 The on again, off again Federal Do Not Cal List is now officially, and permanently, on again. Earlier this week a U.S. Circuit Court of Appeals ruled that the FTC and FCC's registry does not violate the telephone solicitors First... Full Article
is 韓·美 공동 개발 ‘태양 망원경’, ISS 설치 완료 By www.segye.com Published On :: Wed,13 Nov 2024 19:25:24 +0900 한국과 미국이 공동 개발한 태양 관측용 특수망원경이 국제우주정거장(ISS)에 설치 완료됐다. 앞으로 양국은 이 망원경을 이용해 최대 2년간 태양의 최상층부 대기인 ‘코로나’를 집중 관찰할 예정이다. 13일 우주항공청과 한국천문연구원은 미국 항공우주국(NASA·나사)과 공동 개발해 지난 5일 미 플로리다주 케네디우주센터에서 발사한 ‘코로나 그래프’를 고 Full Article
is Web 2.0 is Collapsing Under its Own Weight By www.windley.com Published On :: Mon, 15 Apr 2024 13:44:52 -0400 Summary: The overhead of performing even simple tasks online is getting larger and larger. I question the security of almost all these supposedly "secure" messaging systems. And I'm tired of the 'Utopia of Rules' mindset pervasive in every organization. It's exhausting how they expect customers to constantly adapt to their needs. I don't know if you recall the game Kerplunk. It's a classic children's game that has been around for decades. I remember playing it with my sister. The basic setup involves a transparent plastic tube, a number of sticks, and marbles. The sticks are threaded through the tube to form a web or nest at the bottom on which the marbles rest. We'd take turns removing a stick at a time, trying not to let any marbles fall through the web and out of the tube. At some point, the remaining sticks can't hold the marbles and everything falls down. The modern web reminds me more and more of a big Kerplunk game and I think the marbles are about to fall. What started out as an easier way to do things like shop, bank, and get health care information has become increasingly complex over time. More and more of the email I receive seems to be simply directing me to log into some bespoke system to retrieve a message or engage in some workflow. And even with a password manager, the act of logging in is often a chore with different user interfaces, custom MFA requirements, and weird rules for passwords. Once you're on the system, session time-outs induce their own form of anxiety since stepping away for a few minutes to attend to something else might require going through the whole Kafkaesque process all over again. The modern web has turned into a dystopian theater of the absurd where even reading a simple appointment reminder from your doctor requires several minutes of stress-inducing interaction with baroque systems and processes. And it's not just doctors, of course, banks, government agencies, hospitals, ecommerce sites, and customer service systems all adopt these special purpose messaging systems. If you ask these organizations why they use bespoke messaging systems, they'll list things like "timely and improved communication," "convenience," and "privacy and security." But the real reason is that it's more convenient for them because these systems are integrated with their backends and make their processes more manageable. There's certainly nothing about them that's more convenient, timely, or better than email for their customers1. I also question the privacy and security premise. Email can be insecure. And your email provider can see the contents of your emails. But the messaging system run by your doctor or bank is likely less secure than the email systems run by Apple, Google, and the others. And achieving privacy by making everything incompatible so that you have to use a different system for each correspondent is like chopping off your finger to prevent hangnails. How did we get here? Bureaucracy. Not just government bureaucracy, but bureaucracy of all kinds. In Utopia of Rules2, David Graeber talks about how power imbalances force the less powerful group to perform what he calls interpretive labor, the work of understanding and implementing what's better or more convenient for the more powerful partner. People are not equal participants in online interactions. We don't have the tools to be fully embodied online3. Because of this we are forced to play by the rules organizations online who are digitally embodied with servers, identity systems, customer management systems, and so on. And part of that is being forced to use their inconvenient and anemic messaging systems. What's the answer? People need tools. I think digital wallets (a bad name for an important tool), autonomic (peer) identifiers with strong cryptography, and verifiable credentials are a huge step forward. These tools provide the means for people to be peers online rather that mere ghosts in someone else's machine. That's why I insist on using the term self-sovereign rather than decentralized to describe these systems. Cogito Ergo Sum. Notes For a deeper dive into why one-off messaging systems are never as good as email, see Rich Sharing and Personal Channels. Email and other useful messaging systems exhibit a property called rich sharing that makes them much more robust that the simple idea of "sharing a message" would bring to mind. If you're interested in power imbalances and how they come about, I can't recommend Graeber's book highly enough. He had such a keen understanding of this problem and wrote about it in a way that's both informative and entertaining. I talk about this in more detail in Chapter 17 of Learning Digital Identity when I discuss authentic digital relationships. Photo Credit: Playing Kerplunk from DALL-E (public domain) Prompt: Draw a picture of a boy and girl playing kerplunk that's 1200x500 pixels Tags: web identity authentication authorization verifiable+credentials Full Article
is What Is Decentralized Identity? By www.windley.com Published On :: Tue, 06 Aug 2024 08:07:34 -0400 Summary: What is decentralized identity and why is it important? My attempt at a simple explanation. In Yeah, yeah, yeah, yeah, yeah, nah, Alan Mayo references my recent blog post, Decentralized Identity Comes of Age, and says: My challenge to the decentralization community is for them (someone) to explain how it works in relatively simple and reasonable terms. I say relative because identity is not simple, so we should not expect simple solutions. This post is my attempt to do that for Alan and others. Identity is how we recognize, remember, react to, and interact with other people, organizations, and services. Put another way, identity is about relationships. Online we suffer from a proximity problem. Since we're not near the parties we want to have relationships with, our natural means of recognizing, remembering, and interacting with others can't be used. Digital identity systems are meant to provide us with the means of creating online relationships. Traditional identity systems have not served us well because they are owned and controlled by companies who build them for their own purposes. The relationships they support are anemic and transactional. We can't use them for any purpose except what their owner's allow. Decentralized identity systems1 on the other hand allow you to create online relationships with any person, organization, or service you choose and give you the tools to manage and use those relationships. They help you recognize, remember, react to, and interact with them. The most important tool is a decentralized identity wallet. The world of decentralized identity wallets is still young, but organizations like the Linux Foundation's Open Wallet Foundation give me hope that useful, interoperable wallets are a tool we'll all be able to use soon. They are as foundational to decentralized identity as a browser is to the web. Besides helping you manage peer-to-peer relationships with others online, wallets hold verifiable credentials, the digital analog to the credentials and cards you carry in a physical wallet. One of the most important aspects of digital relationships is providing information about yourself to those you interact with. Sometimes that information can come from you—it's self-asserted—but many times the other party wants to reliably know what others say about you. For example, if you establish a banking relationship, the bank is legally obligated to verify things like your name and address independent of what you say. Decentralized identity wallets allow you to prove things about yourself using credentials others provide to you. At the same time, they protect your privacy by limiting the information disclosed and forgoing the need for the party you're interacting with to directly contact others to verify the information you provide. In summary, decentralized identity systems allow you to create digital relationships with other parties independently, without relying on any other organization or service. These relationships are direct, private, and secure. They also provide the means for you to prove things about yourself inside these relationships so that even though you're operating at a distance, you and the other party can have confidence in the relationship's authenticity. How Does It Work The preceding paragraphs say what decentralized identity is, and provide its benefits, but don't say how it works. Alan and others will likely want a few more details. Everything I describe below is handled by the wallet. The person using the wallet doesn't need to have any more knowledge of how they work than the operator of a browser needs to understand HTTP and HTML. The foundation of a peer-to-peer, decentralized online relationship is an autonomic identifier like a peer DID. Identifiers are handles that someone else can use to identify someone or something else online. Peer DIDs can be created by a wallet at will, they're free, and they're self-certifying (i.e., there's no need for a third party). A relationship is created when two identity wallets create and exchange peer DIDs with each other on behalf of their owners. Peer DIDs allow the parties to the relationship to exchange private, secure messages. There are four primary interaction patterns that wallets undertake when exchanging messages: DID Authentication which uses the DIDs to allow each party to authenticate the other Single-Party Credential Authorization where the same party issues and verifies the credential. Multi-Party Authorization where the credential issuer and verifier are different parties. Generalized Trustworthy Data Transfer which uses a collection of credentials to aid the wallet owner in completing online workflows. Generalized Credential Exchange Pattern (click to enlarge) Verifiable credentials make heavy use of cryptography to provide not only security and privacy, but also confidence that the credential data is authentic. This confidence is based on four properties a properly designed credential presentation protocol provides: The identifier of the credential issuer Proof that the credential is being presented by the party is was issued to Proof that the credential has not been tampered with The revocation status of the credential The credential presentation can do all this while only disclosing the information needed for the interaction and without the verifier having to contact the credential issuer. Not having to contact the issuer ensures the credential can be used in situations with poor connectivity, that the issuer needn't be online, and preserves the credential subject's privacy about where the credential is being used. A properly designed credential exchange protocol has four important properties: The system is decentralized and contextual. There is no central authority for all credentials. Every party can be an issuer, an owner, and a verifier. The system can be adapted to any country, any industry, any community, any set of credentials, any set of trust relationships. Issuers are free to determine what credentials to issue and whether or not to revoke them. Wallet owners are free to choose which credentials to carry and where and when they get shared. While some verifiers require a specific credential—such as a customs agent requiring a passport—others will accept a range of credentials. Therefore owners can decide which credentials to carry in their wallet based on the verifiers with whom they interact. Verifiers make their own decisions about which credentials to accept. For example, a bar you are trying to enter may accept any credential you have about your date of birth. This means some credentials (e.g., passports, driving licenses, birth certificates) may be much more useful than just for the original purpose for which they were issued. These properties make a decentralized identity system self sovereign. Why is Decentralized Identity Important? Decentralized identity systems are designed to provide people with control, security, and privacy while enhancing the confidence we have in our online relationships. Some time ago, I wrote the following. I think it's an apt way to close any discussion of decentralized identity because unless we keep our eyes on the goal, we'll likely take shortcuts in implementation that fail to live up to their promise. Presently, people don't have operational relationships anywhere online.2 We have plenty of online relationships, but they are not operational because we are prevented from acting by their anemic natures. Our helplessness is the result of the power imbalance that is inherent in bureaucratic relationships. The solution to the anemic relationships created by administrative identity systems is to provide people with the tools they need to operationalize their self-sovereign authority and act as peers with others online. Peer-to-peer relationships are the norm in the physical world. When we dine at a restaurant or shop at a store in the physical world, we do not do so under the control of some administrative system. Rather, we act as embodied agents and operationalize our relationships, whether they be long-lived or nascent, by acting for ourselves. Any properly designed decentralized identity system must provide people with the tools they need to be "embodied" in the digital world and act autonomously. Time and again, various people have tried to create decentralized marketplaces or social networks only to fail to gain traction. These systems fail because they are not based on a firm foundation that allows people to act in relationships with sovereign authority in systems mediated through protocol rather than by the whims of companies. We have a fine example of a protocol mediated system in the internet, but we've failed to take up the daunting task of building the same kind of system for identity. Consequently, when we act, we do so without firm footing or sufficient leverage. Ironically, the internet broke down the walled gardens of CompuServe and Prodigy with a protocol-mediated metasystem, but surveillance capitalism has rebuilt them on the web. No one could live an effective life in an amusement park. Similarly, we cannot function as fully embodied agents in the digital sphere within the administrative systems of surveillance capitalists, despite their attractions. The emergence of self-sovereign identity, agreements on protocols, and the creation of metasystems to operationalize them promises a digital world where decentralized interactions create life-like online experiences. The richer relationships that result from properly designed decentralized identity systems promise an online future that gives people the opportunity to act for themselves as autonomous human beings and supports their dignity so that they can live an effective online life. Notes I prefer the term self-sovereign to decentralized because it describes the goal rather than the implementation, but I'll stick with decentralized here. All self-sovereign identity systems are decentralized. Not all decentralized identity systems are self-sovereign. The one exception I can think of to this is email. People act through email all the time in ways that aren't intermediated by their email provider. Again, it's a result of the architecture of email, set up over four decades ago and the culture that architecture supports. Photo Credit: Young Woman Using a Wallet from DALL-E (public domain) Prompt: draw a rectangular picture of a young woman using a wallet. Tags: identity ssi decentralized+identity verifiable+credentials Full Article
is Is Voting Secure? By www.windley.com Published On :: Tue, 29 Oct 2024 14:21:00 -0400 Summary: I'm fairly certain that what I write here won't change the minds that need changing. But I feel like I need to make a statement anyway: your vote is secure. There's a lot of fear mongering about the security of elections. I've wanted to discuss this for a while. I have several things in my background that have given me insight into how elections work. I was the CIO for the State of Utah. I was a member of the Lt Governor of Utah's voting equipment selection committee. And I've been involved in identity and security for several decades. Let me give you the headline up front: committing election fraud in a way that changes the result is difficult, nearly impossible. Let's examine how elections are run and how fraud could happen to see why. First a caveat: there is no single way that US elections are run. Elections in the US are quite decentralized. Each state has different election laws and in most cases the mechanics of running an election are given over to county clerks who must follow state law, but also have freedom to create their own workflows and processes within that law. There are 3244 counties in the US. The analysis that follows is generalized and likely more true of Utah, which I'm very familiar with, than other places. Still, I think the big ideas are largely the same everywhere. The process of voting is divided into two parts: (1) voter registration and (2) voting. This is important because most people who make up scenarios to convince you that voting is insecure usually ignore voter registration. Registration requires that you provide an address. This is an important piece of information because if you're voting by mail, it's where the ballot will be mailed. If you're voting in person, you need to vote at a specific polling place depending on your address. When you vote, you either mail back the ballot that was mailed to you at the address you provided or you go to your assigned polling place and fill out a ballot (usually via a voting machine). In either case, the ballot presented to you depends on your address since the candidates listed on your ballot depend on your voting precinct. Also, as of 2024, 35 states require voters to present identification at the polling place in order to vote. Of those that don't, many require it for voters who are voting for the first time after their registration. Now, let's examine voting fraud and how it might work. One important factor is scale. You need to commit fraud at a scale necessary to impact the outcome. For small elections (say a single state legislative race or a small school board election) you don't need to change a lot of votes to change the outcome in a tight race—hundreds of votes might do it. For larger elections, like the presidential election, scale is a significant issue. I'm going to focus on presidential elections since they are the most consequential. Less consequential elections are not likely to attract the kind of money and talent necessary to commit election fraud. A second factor is stealth. You have to keep the fraud from being discovered so that it's not reversed. Proving consequential fraud would likely result in the election being challenged and rerun. You don't have to identify who did it, just prove that it was done. So election fraud is much more dependent on not being discovered than commercial transaction fraud where the loss is likely to only be recoverable if the identity of the perpetrator is known. The nature of presidential elections is greatly influenced by the electoral college system. You need to influence the votes in enough states to swing that state's electoral votes to the candidate you favor. You don't want to commit fraud where it's not needed because you'll waste money while increasing your chances of discovery. So, selecting the states where you want to commit fraud is critical. Each of those states will have different requirements, so you'll have to tailor your attack to each of them. Furthermore, you'll have to tailor your attack to each voting precinct within the counties you determine are the most likely to impact the election. There are a few ways to attack an election: Sending your people to vote—for this to work, your fake voters have to have been registered and, in most cases, provide some form of ID. To register, they need a plausible address. The election office might not notice if one or two extra people with different last names are registered at a specific address, but they might if this is systematic or if an unreasonable number of people register at the same address. Remember that elections are run at the county level, so you have to assume that the election workers have a good understanding of the local environment. These fake voters now have to go to many different polling locations and cast a vote. They can't easily cast multiple ballots at the same polling location since the poll workers might remember them. So, you need lots of people going to lots of different polling locations. Intercepting mail-in ballots—for this to work, you have to register at someone else's home address and then get to the mail before they do or steal their ballots after they've filled them in and change the vote. This requires lots of people. You can't do this remotely. It requires "boots on the ground" as the saying goes. Furthermore, those people are exposed since they're looking in mailboxes in neighborhoods where they don't live. Doable, but not very stealthy. Paying people to vote—for this to work, you have to contact a lot of people, convince them to commit fraud, and then be satisfied with the fact that you'll never know if they voted for your candidate or not because ballots are secret. They could take your money and vote for whoever they want. Or just not vote at all unless you're supervising them, an activity that will call attention to you and your agents. Replacing real ballots with fake ones—for this to work, you have to create realistic facimiles of real ballots for many different polling places (remember they're different because of overlapping jurisdictions), intercept the ballots somewhere in transit or on delivery, and replace the real ballots with ones that you've filled out for your candidate. This likely involves subverting county election workers. Not just one, but many. Again, the risk of discovery goes up with each contact. Destroying ballots—for this to work, you need to destroy ballots that are for the candidate you don't want to win. You could simple destroy ballots without regard to how they're filled, but this won't assure you'll meet your goal. To be effective, you have to just destroy the ones for the other candidate and leave the ones for your candidate. Again, you will have to subvert election workers to get your hands on the ballots and determine who the ballot is for. Changing the results after the ballots are counted—for this to work, you have to either hack the machines that record the vote or hack the machines that are tabulating the vote. Hacking the machines won't work if the machines keep a paper audit trail and it's used to audit results. Hacking the tabulators means getting access to those machines. Recall those are kept at the county level, so you have to hack many in different locations unless a single county can swing the election your way. I hope all of this has at least given you a feel for the scale and scope of the problem. Pulling it off successfully without anyone knowing it happened is a difficult problem. Each method involves many people being let in on the secret—in some cases a lot of people. This isn't an operation that a small group of hackers can reliably pull off. Having lots of people involved increases the chances that you'll be discovered. The decentralized and distributed nature of how elections are run is a feature and makes elections more secure and trustworthy. On top of all this, election officials aren't stupid, lazy, or inept. Sure, you're going to find a few who are. But as a rule the elections officials I've interacted with at the state and county level are professionals who are attuned to these dangers and take active steps to protect against them. They are usually happy to talk about how they operate and will respond to polite requests for information about how they audit systems and the processes they have in place to protect the vote. As an aside, do you know what's easier than committing election fraud? Using social media to convince people that election fraud is happening to reduce confidence in the election and sow discontent. Then you can use that discontent to challenge a legitimate election and maybe change the outcome. Ask yourself which is more likely. Successfully changing the results of a presidential election isn't impossible. But the odds of doing so and not leaving any evidence—the perfect crime—are vanishingly small. I have confidence in the security of the US election system. Photo Credit: Voting from DALL-E (public domain) Prompt: Draw a horizontal picture of a woman casting a ballot with a ballot box Tags: voting identity security government Full Article
is Your brain isn't the only part of the body that makes memories By www.downes.ca Published On :: Wed, 13 Nov 2024 08:37:00 -0400 James Devitt-NYU, Futurity, Nov 13, 2024 This article challenges us to think more deeply on the distinction between knowledge and memory. The claim made here is that parts of the body - the kidney, say - can replicate the massed-spaced effect, retaining information over time, which is the same thing we see when connections are formed between neurons in the brain. But is that the same as forming a memory? I have Haglund's Deformity, a 'memory' of my many years of walking in bad shows. That seems more like "what our pancreas remembers about the pattern of our past meals to maintain healthy levels of blood glucose" and rather less like "knowing Paris is the capital of France". We can interpret these 'memories' as retained information, but it's not clear this is in any way any sort of knowledge. Web: [Direct Link] [This Post] Full Article
is Show Me State of Missouri News By Published On :: 2004-09-01T12:51:20-07:00 The State of Missouri has created a number of departmental RSS news feeds. The most recent headlines of most feeds, but not all, are aggregated to a centralized agency news portal. Every hour the State Webmaster scours feeds on her agency servers to update this portal. Full Article
is Missouri Newsfeed Team Lauded By Published On :: 2004-09-03T08:23:19-07:00 Missouri Governor Bob Holden this week awarded a Governor's Award for Quality and Productivity to the State Portal Newsfeed Development Team. This annual award that recognizes excellence in service, efficiency and innovation went to employees from 17 different state agencies who developed a system for state agencies to share the state's news feed portal at little or no cost to the agency. This system currently publishes the news from 18 government agencies, offices and organizations at the top of each hour on the state homepage, in addition to providing continuous newsfeed to web sites in the public sector. Full Article
is Top Gear Exposes Plan To Convert EVs To Piston Power By cleantechnica.com Published On :: Sat, 09 Nov 2024 15:00:37 +0000 Can you imagine a Prius with a big, honking V8 engine stuffed under the hood? Neither can we buy Top Gear says it's happening. The post Top Gear Exposes Plan To Convert EVs To Piston Power appeared first on CleanTechnica. Full Article Clean Transport Electric Cars Electric Vehicles Media humor
is A 30-Megawatt Space Solar Power Plant Is Scheduled For 2030 By cleantechnica.com Published On :: Sat, 09 Nov 2024 17:00:05 +0000 Innovators in the field of space solar power are outperforming expectations for commercial application, motivated by the potential for harvesting solar energy on a 24/7 basis, unimpeded by weather or climate. The post A 30-Megawatt Space Solar Power Plant Is Scheduled For 2030 appeared first on CleanTechnica. Full Article Clean Power Solar Energy Solar Power Plants Energy Renewable Energy space based solar Space based Solar Energy space solar space solar energy startups UK United Kingdom (UK) usa
is Inchcape & BYD Partner In New Distribution Agreement For Ethiopia! By cleantechnica.com Published On :: Sat, 09 Nov 2024 20:17:50 +0000 In an unprecedented move some months ago, Ethiopia became effectively the first country in the world to ban the import of internal combustion engine vehicles. That ban was not some futuristic target for 2030 or 2035. It was an immediate ban on the import of ICE cars, with no exceptions. ... [continued] The post Inchcape & BYD Partner In New Distribution Agreement For Ethiopia! appeared first on CleanTechnica. Full Article Clean Transport Electric Cars Electric Vehicles Africa BYD ethiopia
is The City Center In Paris Is Now Designated A Limited Traffic Zone By cleantechnica.com Published On :: Sun, 10 Nov 2024 13:44:13 +0000 Many citizens in Paris were caught off-guard on November 5 when a new ban on motorists in the first four arrondissements of central Paris came into effect. As they looked around their city neighborhoods, residents could see nearly forty signs for the ‘Zone à Trafic Limité’ (ZTL) — or “limited ... [continued] The post The City Center In Paris Is Now Designated A Limited Traffic Zone appeared first on CleanTechnica. Full Article Clean Transport Mass Transit / Public Transit Policy & Politics Carbon Emissions cities France Paris Waste Reduction
is Is This The Year Of Peak Energy Emissions? By cleantechnica.com Published On :: Sun, 10 Nov 2024 17:05:30 +0000 On one hand, 2024 is likely to be the year of global peak energy emissions. “It is a historic moment,” cheers the World Economic Forum (WEF) in this year’s edition of DNV’s Energy Transition Outlook. On the other hand, we have so much more work to do before we can ... [continued] The post Is This The Year Of Peak Energy Emissions? appeared first on CleanTechnica. Full Article Coal Fossil Fuels Carbon Emissions
is Toyota Exec Says California ZEV Goal Is Impossible To Achieve By cleantechnica.com Published On :: Mon, 11 Nov 2024 14:16:40 +0000 Toyota is already complaining about the state of California and CARB as it seems an opportunity to shove its point of view down our throats. The post Toyota Exec Says California ZEV Goal Is Impossible To Achieve appeared first on CleanTechnica. Full Article Clean Transport Electric Vehicles Policy & Politics California California Air Resources Board (CARB) Donald Trump Toyota ZEV mandates
is The Tesla Ethicist: How Can I Reconcile My Tesla Stock Gains With Musk’s Skewed Self-Interest? By cleantechnica.com Published On :: Mon, 11 Nov 2024 17:40:17 +0000 Today, CleanTechnica’s Tesla Ethicist columnist answers a question about the tensions among being true to one’s morals, Tesla CEO Elon Musk’s absolutist tendencies, and personal Tesla stock portfolios increases. Dear Tesla Ethicist: I’ve always prided myself on my personal wherewithal. I self-financed my own college education by working and extending ... [continued] The post The Tesla Ethicist: How Can I Reconcile My Tesla Stock Gains With Musk’s Skewed Self-Interest? appeared first on CleanTechnica. Full Article Clean Power Clean Transport Climate Change Electric Vehicles Green Economy Investment Solar Energy Elon Musk Tesla
is The Domestic EV Supply Chain Is Getting A Big Dose Of Synthetic Graphite By cleantechnica.com Published On :: Tue, 12 Nov 2024 03:00:44 +0000 Stellantis is the latest US electric vehicle stakeholder to firm up its EV supply chain with synthetic graphite produced in Tennessee. The post The Domestic EV Supply Chain Is Getting A Big Dose Of Synthetic Graphite appeared first on CleanTechnica. Full Article Batteries Clean Transport Electric Cars Electric Vehicles Energy Storage Lithium-Ion Batteries artificial graphite Bipartisan Infrastructure Law China EV batteries EV supply chain graphite Joe Biden Panasonic Energy Storage startups Stellantis synthetic graphite
is Toyota Is Digging Its Own Grave By cleantechnica.com Published On :: Tue, 12 Nov 2024 04:50:37 +0000 I can’t say how well Toyota will be able to change course in years to come when the company realizes that it’s really time to switch to electric vehicles (BEVs). What I can say is that I’m a bit shocked the company is still dragging its feet to such an ... [continued] The post Toyota Is Digging Its Own Grave appeared first on CleanTechnica. Full Article Clean Transport Electric Cars Electric Vehicles Policy & Politics BYD California Toyota ZEV mandates
is The Extraordinary Traction & Torque of LANKELEISI MG740PLUS Dual-Motor Electric Bike — CleanTechnica Tested By cleantechnica.com Published On :: Tue, 12 Nov 2024 12:59:27 +0000 Following Hurricane Helene, I had difficulty getting a dual-motor e-bike shipped to me in Asheville that I so wanted to review. So, as it went back to the company after more than a week of not being able to be delivered in devastated Western North Carolina, they shipped me another ... [continued] The post The Extraordinary Traction & Torque of LANKELEISI MG740PLUS Dual-Motor Electric Bike — CleanTechnica Tested appeared first on CleanTechnica. Full Article Bicycles Clean Transport CleanTechnica CleanTechnica Exclusive CleanTechnica Reviews Electric Bikes Electric Vehicles Sponsored LANKELEISI
is Swiss Experiment Will Place Solar Panels Between Train Tracks By cleantechnica.com Published On :: Tue, 12 Nov 2024 16:05:59 +0000 Solar panels between the rails of train tracks is a new idea being tested in Switzerland by start-up Sun-Ways. The post Swiss Experiment Will Place Solar Panels Between Train Tracks appeared first on CleanTechnica. Full Article Clean Power Clean Transport Research Solar Energy Solar Panels Trains / Rail solar powered trains Sun-Ways Switzerland
is 研究情報のオープン化に関する国際会議Paris Conference on Open Research Informationの開催報告書が公開 By current.ndl.go.jp Published On :: Wed, 13 Nov 2024 08:09:38 +0000 2024年9月にフランス・パリのソルボンヌ大学で開催された研究情報のオープン化に関する国際会議Paris Conference on Open Research Informationの開催報告書が、リポジトリZenodo上に掲載されています。 同会議には、2024年4月に出された研究情報のオープン化に関するバルセロナ宣言(“Barcelona Declaration on Open Research Information”)の署名者や支援団体らが参加しました。オープンな研究情報の作成や管理、利活用に関する経験やベストプラクティスが共有されるとともに、宣言の内容を実現するためのロードマップ策定に向けた議論が行われたとあります。 Paris Conference on Open Research Information(Barcelona Declaration on Open Research Information)https://barcelona-declaration.org/conference_2024_paris/続きを読む Full Article カレントアウェアネス-R オープンアクセス オープンデータ メタデータ 学術情報 学術情報流通
is Apple Pay's Visa flaw risks letting hackers drain money from iPhones By www.telegraph.co.uk Published On :: Thu, 30 Sep 2021 05:00:00 GMT Full Article structure:technology topics:organisations/apple topics:organisations/transport-for-london storytype:standard
is Facebook whistleblower to detail tech firm's impact on health of children By www.telegraph.co.uk Published On :: Mon, 04 Oct 2021 16:35:50 GMT Full Article topics:things/duty-of-care-campaign structure:technology topics:organisations/facebook topics:things/social-media topics:organisations/instagram storytype:standard
is Uber raises prices amid surging demand for rides By www.telegraph.co.uk Published On :: Thu, 11 Nov 2021 12:05:20 GMT Full Article structure:technology topics:organisations/uber topics:places/london topics:organisations/transport-and-industry storytype:standard
is Sadiq Khan bans electric scooters from London’s Tube, trains and buses over fire risk By www.telegraph.co.uk Published On :: Thu, 09 Dec 2021 13:23:55 GMT Full Article structure:technology structure:environment topics:organisations/transport-for-london topics:things/electric-scooters storytype:standard
is Google denies it stifled criticism of Indian billionaire By www.telegraph.co.uk Published On :: Tue, 11 Jan 2022 20:21:18 GMT Full Article topics:organisations/google structure:technology topics:organisations/media-and-telecoms structure:business storytype:standard
is Facebook suffers biggest one-day fall in history as shares plunge over 26pc By www.telegraph.co.uk Published On :: Thu, 03 Feb 2022 21:31:09 GMT Full Article topics:organisations/tiktok structure:technology topics:organisations/facebook topics:organisations/nasdaq structure:business storytype:standard
is Twitter must wean itself off advertising, says Elon Musk By www.telegraph.co.uk Published On :: Sun, 10 Apr 2022 17:24:19 GMT Full Article topics:people/elon-musk topics:organisations/twitter structure:technology structure:business storytype:standard
is Elon Musk sued for delay in disclosing Twitter stake By www.telegraph.co.uk Published On :: Wed, 13 Apr 2022 05:33:33 GMT Full Article topics:people/elon-musk topics:organisations/twitter structure:technology structure:business storytype:standard
is MPs demand Elon Musk comes to London to discuss Twitter takeover By www.telegraph.co.uk Published On :: Wed, 04 May 2022 10:55:19 GMT Full Article topics:people/elon-musk topics:organisations/twitter topics:things/social-media topics:things/mergers-and-acquisitions structure:technology structure:business storytype:standard
is Forget your passwords, the era of facial recognition and fingerprints is finally here By www.telegraph.co.uk Published On :: Thu, 05 May 2022 14:04:00 GMT Full Article topics:organisations/apple topics:organisations/google topics:organisations/microsoft structure:technology storytype:standard
is SpaceX fires staff over letter criticising Elon Musk By www.telegraph.co.uk Published On :: Fri, 17 Jun 2022 11:50:24 GMT Full Article topics:organisations/tesla topics:people/elon-musk topics:organisations/spacex structure:technology structure:business storytype:standard
is Swarm of malfunctioning driverless taxis brings traffic to a halt for hours By www.telegraph.co.uk Published On :: Fri, 01 Jul 2022 11:06:31 GMT Full Article topics:things/driverless-cars structure:technology storytype:standard
is Cambridge professor raises £50m for 5-minute electric car charging By www.telegraph.co.uk Published On :: Fri, 15 Jul 2022 12:13:27 GMT Full Article topics:things/electric-cars topics:organisations/university-of-cambridge topics:things/renewable-energy topics:things/uk-startups structure:technology storytype:standard
is Twitter founder Jack Dorsey calls for end to China’s Communist Party over zero-Covid policies By www.telegraph.co.uk Published On :: Mon, 08 Aug 2022 12:03:47 GMT Full Article topics:people/jack-dorsey topics:places/china topics:organisations/twitter topics:things/social-media topics:in-the-news/coronavirus structure:technology storytype:standard
is The misheard word that directed public to mourn late Queen in Yosemite By www.telegraph.co.uk Published On :: Fri, 16 Sep 2022 06:32:19 GMT Full Article topics:events/queen-elizabeth-death topics:things/homegrown-tech-talent topics:organisations/mountain-rescue structure:technology structure:business storytype:standard
is Apple warns of Christmas iPhone 14 shortages By www.telegraph.co.uk Published On :: Mon, 07 Nov 2022 09:17:18 GMT Full Article topics:organisations/apple topics:things/iphone topics:things/mobile-phones topics:in-the-news/coronavirus topics:places/china structure:technology storytype:standard
is Hacking fears after $650m vanishes from collapsed crypto firm By www.telegraph.co.uk Published On :: Sat, 12 Nov 2022 20:00:00 GMT Full Article topics:things/cryptocurrency topics:things/bitcoin structure:technology structure:business storytype:standard
is Meet Mastodon, the Twitter ‘killer’ Elon Musk is keeping an eye on By www.telegraph.co.uk Published On :: Fri, 18 Nov 2022 09:52:00 GMT Full Article topics:organisations/twitter topics:things/social-media topics:people/elon-musk structure:technology structure:business storytype:standard