do Employers Expect Increased Regulatory Enforcement Amid Legislative Slowdown in Election Year, Littler Survey Finds By www.littler.com Published On :: Mon, 06 May 2024 14:12:33 +0000 (May 8, 2024) – In an election year that could significantly impact the future of employment and labor law, U.S. employers expect heightened regulatory enforcement as they navigate a host of workplace issues, including the disruptive impact of artificial intelligence (AI) and managing divisive political beliefs among employees. Full Article
do Colorado’s Landmark AI Legislation Would Create Significant Compliance Burden for Employers Using AI Tools By www.littler.com Published On :: Thu, 16 May 2024 21:09:22 +0000 UPDATE: On May 17, 2024, Colorado Governor Jared Polis signed Senate Bill 24-205 into law, although not without reservations. Governor Polis sent a letter to the members of the Colorado General Assembly encouraging them to reconsider and amend aspects of Senate Bill 24-205 before it takes effect on February 1, 2026. Full Article
do Implications for Employers of Colorado’s New Biometrics Law By www.littler.com Published On :: Thu, 27 Jun 2024 20:45:27 +0000 Effective July 1, 2025, an amendment to the Colorado Privacy Act will impose new requirements on companies that collect and use biometric information. Full Article
do Forthcoming Additions and Modifications to Employment Laws in Colorado By www.littler.com Published On :: Tue, 02 Jul 2024 18:32:52 +0000 Colorado enacted several new laws this session affecting employers. New statutes and amendments add protections for delivery network company drivers, amend the state’s non-compete law, add new protected classifications, create tort liability for AI algorithmic discrimination, amend the state’s privacy act, and lower the threshold for qualifying as a small employer for health benefits purposes, among other changes. Full Article
do Implications for Employers of Colorado’s New Biometrics Law By www.littler.com Published On :: Fri, 19 Jul 2024 13:42:19 +0000 Zoe M. Argento, Philip L. Gordon, Kwabena A. Appenteng, Orly Henry and Alyssa Daniels discuss the Biometric Amendment, an amendment to the Colorado Privacy Act that requires employers to obtain consent before collecting and using biometric information. SHRM Online View (Subscription required) Full Article
do New Colorado Employment Laws Enacted, Other Statutes Modified By www.littler.com Published On :: Fri, 19 Jul 2024 13:48:44 +0000 Thomas W. Carroll, Matt Freemann, David C. Gartenberg and Billie Jo M. Risheim provide an overview of the significant new laws passed during the 2024 legislative session that affect Colorado employers. SHRM Online View (Subscription required) Full Article
do New Colorado Law Protects Consumer Biological and Neural Data By www.littler.com Published On :: Fri, 19 Jul 2024 20:49:49 +0000 Zoe Argento talks about the new compliance requirements for employers under Colorado’s biometric privacy law. Law Week Colorado View (Subscription required) Full Article
do New Colorado privacy laws to impact “broad swath” of companies By www.littler.com Published On :: Wed, 14 Aug 2024 21:58:04 +0000 Zoe Argento says more companies are using tools like artificial intelligence that incorporate biometric identifiers, and so new privacy laws are likely to apply to a larger swath of employers than might think they must comply with them. The Sum & Substance View Full Article
do What HR should know about Colorado’s new AI law By www.littler.com Published On :: Fri, 16 Aug 2024 20:41:46 +0000 Philip L. Gordon says a new AI law in Colorado means that any employer doing business in the state with more than 50 employees will have specific obligations when AI is a factor in the decision-making processes that affect personnel. HR Brew View Full Article
do Geopolitics, AI adoption, climate risk worrying European firms By www.littler.com Published On :: Wed, 16 Oct 2024 14:23:50 +0000 Stephan Swinkels, Jan-Ove Becker and Deborah Margolis discuss findings from Littler’s 2024 European Employer Survey Report. International Employment Lawyer View (Subscription required) Full Article
do An Accidental Outcome? Alex MacDonald returns to discuss how the NLRA’s success has resulted in fewer unions & what might happen under a new administration in DC By www.littler.com Published On :: Tue, 22 Oct 2024 21:01:27 +0000 Alex MacDonald discusses his article “The Accidental Success of the NLRA: How a Law About Unions Achieved Its Goals by Giving Us Fewer Unions” on a podcast. Labor Union News Listen Full Article
do Contractor Watchdog Under Trump Stands Ready to Police DEI Again By www.littler.com Published On :: Tue, 12 Nov 2024 21:53:02 +0000 Jim Paretti says the Trump administration’s previous agenda and stance toward IE&D will likely repeat when he returns to office. Bloomberg Law View (Subscription required) Full Article
do Developers at MEC Hackathons endorsed by ETSI challenged to trial edge computing for 5G in UK and China By www.etsi.org Published On :: Thu, 28 Apr 2022 08:02:27 GMT Developers at MEC Hackathons endorsed by ETSI challenged to trial edge computing for 5G in UK and China Sophia Antipolis, 27 September 2019 The successful second edition of the MEC Hackathons endorsed by ETSI recently ended in two different parts of the world simultaneously on 17-18 September in London (UK) and Shenzhen (China). Read More... Full Article
do ETSI unveils Augmented Reality Framework enabling multi-vendor ecosystem for industry and consumers By www.etsi.org Published On :: Tue, 24 Mar 2020 08:55:20 GMT ETSI unveils Augmented Reality Framework enabling multi-vendor ecosystem for industry and consumers Sophia Antipolis, 24 March 2020 The ETSI Industry Specification Group on the Augmented Reality Framework (ISG ARF) unveils ETSI GS ARF 003, a key specification towards the interoperability of AR components. Today industrial and end users tend to frequently depend on a single provider to deploy AR applications and services. Compliance with the ETSI framework will allow components from different providers to interoperate via the defined interfaces, allowing broader and quicker adoption of AR technology. It will also take account of a growing and dynamic AR market. Read More... Full Article
do ETSI launches remote Plugtests Programme for Mission Critical Services to accelerate adoption and interoperability By www.etsi.org Published On :: Thu, 28 Apr 2022 06:18:00 GMT ETSI launches remote PlugtestsTM Programme for Mission Critical Services to accelerate adoption and interoperability Sophia Antipolis, 28 April 2020 To accelerate Mission Critical Services (MCS) adoption and interoperability, a key enabler to MCS deployment, ETSI is running an innovative MCX PlugtestsTM Programme. Testing sessions will also benefit from the latest ETSI specification, ETSI TS 103 564, on Plugtests scenarios for Mission Critical Services. Read More... Full Article
do ETSI releases a White Paper on MEC security, first initiative in this domain By www.etsi.org Published On :: Thu, 28 Apr 2022 13:53:31 GMT ETSI releases a White Paper on MEC security, first initiative in this domain Sophia Antipolis, 3 June 2021 ETSI publishes today a White Paper titled MEC security: Status of standards support and future evolutions written by several authors participating in MEC and other related ETSI groups. This White Paper, the very first initiative in this domain, aims to identify aspects of security where the nature of edge computing leaves typical industry approaches to cloud security insufficient. Read More... Full Article
do ETSI Releases TETRA Algorithms to Public Domain, maintaining the highest security for its critical communication standard By www.etsi.org Published On :: Wed, 15 Nov 2023 09:23:53 GMT Sophia Antipolis, 14 November 2023 ETSI is happy to announce that at a meeting in October of its technical committee in charge of the TETRA standard (TCCE), a full consensus was reached to make the primitives of all TETRA Air Interface cryptographic algorithms available to the public domain. Read More... Full Article
do Are we doing it right? Promoting the human rights of children with disabilities By www.alumni.mcgill.ca Published On :: Wed, 31 Dec 1969 19:00:00 -0500 Starts: Thu, 28 Nov 2024 18:30:00 -050011/28/2024 05:30:00PMLocation: Montreal, Canada Full Article
do San Francisco Bay Area Holiday Party - Don't Miss the Fun! By www.alumni.mcgill.ca Published On :: Wed, 31 Dec 1969 19:00:00 -0500 Starts: Sun, 08 Dec 2024 18:30:00 -050012/08/2024 04:30:00PMLocation: San Mateo, U. S. A. Full Article
do Frederick Douglass and Harriet Jacobs: American Slave Narrators By nationalhumanitiescenter.org Published On :: Wed, 17 Mar 2010 15:11:23 -0400 New essay by Lucinda MacKethan just added to Freedom's Story: Teaching African American Literature and History, TeacherServe from the National Humanities Center. Full Article
do SpotOn London 2012 Storify: eBooks and apps By www.nature.com Published On :: Tue, 20 Nov 2012 10:53:56 +0000 Here is a Storify round up of the SpotOn London session: Enhanced eBooks & BookApps: The Full Article Featured SpotOn London (#SoLo) Storifys Tools #solo12ebook
do SpotOn London 2012 Storify: Collaborating and building your online presence: educating scientists and science students By www.nature.com Published On :: Wed, 21 Nov 2012 10:24:27 +0000 Jenny Evans has created a Storify summary of her SpotOn London session: Collaborating and building your online Full Article Featured SpotOn London (#SoLo) Storifys Tools #solo12edu
do SpotOn London 2012 Storify: BrainSpace, a global interest graph for scientists By www.nature.com Published On :: Tue, 18 Dec 2012 13:20:35 +0000 Here is a Storify summary of the SpotOn London session: BrainSpace, a global interest graph for Full Article Featured SpotOn London (#SoLo) Storifys Tools #solo12PD
do SpotOn London 2013 – draft programme: Tools track By www.nature.com Published On :: Wed, 02 Oct 2013 16:02:22 +0000 This year, Digital Science are sponsoring the Tools track and we’re grateful to them for Full Article Featured Information SpotOn London (#SoLo) Tools #solo13 programme tools
do SpotOn London 2013: What should the scientific record look like in the digital age? By www.nature.com Published On :: Thu, 07 Nov 2013 10:34:33 +0000 Julia Schölermann is the organiser for this year’s SpotOn London session on, What should the scientific Full Article Featured SpotOn London (#SoLo) Tools
do SpotOn London 2013: How are online tools changing science education? By www.nature.com Published On :: Thu, 07 Nov 2013 14:08:14 +0000 The place we’re in as a society is a crowded field of scattered tools and Full Article Featured Guest Posts SpotOn London (#SoLo) Tools
do SpotOn London Storify: Wikipedia editing session By www.nature.com Published On :: Mon, 11 Nov 2013 15:16:19 +0000 Here is a Storify collecting the online conversations from the Wikipedia editing workshop at this year’s Full Article Featured SpotOn London (#SoLo) Storifys Tools #solo13wiki
do How does agricultural productivity growth affect agrifood system transformation goals? By www.youtube.com Published On :: Tue, 9 Jul 2024 16:46:57 GMT Full Article
do Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates By www.tenable.com Published On :: Fri, 25 Oct 2024 09:00:00 -0400 Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips. Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards.Dive into six things that are top of mind for the week ending Oct. 25.1 - CSA: How to prevent “shadow AI” As organizations scale up their AI adoption, they must closely track their AI assets to secure them and mitigate their cyber risk. This includes monitoring the usage of unapproved AI tools by employees — an issue known as “shadow AI.”So how do you identify, manage and prevent shadow AI? You may find useful ideas in the Cloud Security Alliance’s new “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paper.The white paper covers shadow AI topics including:Creating a comprehensive inventory of AI systemsConducting gap analyses to spot discrepancies between approved and actual AI usageImplementing ways to detect unauthorized AI waresEstablishing effective access controlsDeploying monitoring techniques “By focusing on these key areas, organizations can significantly reduce the risks associated with shadow AI, ensuring that all AI systems align with organizational policies, security standards, and regulatory requirements,” the white paper reads.For example, to create an inventory that offers the required visibility into AI assets, the document explains different elements each record should have, such as:The asset’s descriptionInformation about its AI modelsInformation about its data sets and data sourcesInformation about the tools used for its development and deploymentDetailed documentation about its lifecycle, regulatory compliance, ethical considerations and adherence to industry standardsRecords of its access control mechanismsShadow AI is one of four topics covered in the publication, which also unpacks risk management; governance and compliance; and safety culture and training.To get more details, read:The full “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paperA complementary slide presentationThe CSA blog “Shadow AI Prevention: Safeguarding Your Organization’s AI Landscape”For more information about AI security issues, including shadow AI, check out these Tenable blogs:“Do You Think You Have No AI Exposures? Think Again”“Securing the AI Attack Surface: Separating the Unknown from the Well Understood”“Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach”“6 Best Practices for Implementing AI Securely and Ethically”“Compromising Microsoft's AI Healthcare Chatbot Service”2 - Best practices for secure software updatesThe security and reliability of software updates took center stage in July when an errant update caused massive and unprecedented tech outages globally.To help prevent such episodes, U.S. and Australian cyber agencies have published “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers.”“It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements,” reads the 12-page document.Although the guide is aimed primarily at commercial software vendors, its recommendations can be useful for any organization with software development teams that deploy updates internally. The guide outlines key steps for a secure software development process, including planning; development and testing; internal rollout; and controlled rollout. It also addresses errors and emergency protocols.“A safe software deployment process should be integrated with the organization’s SDLC, quality program, risk tolerance, and understanding of the customer’s environment and operations,” reads the guide, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the Australian Cyber Security Centre.To get more details, read:The “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers” guideThe CISA alert “CISA, US, and International Partners Release Joint Guidance to Assist Software Manufacturers with Safe Software Deployment Processes”For more information about secure software updates:“Tenable’s Software Update Process Protects Customers’ Business Continuity with a Safe, Do-No-Harm Design” (Tenable)“The critical importance of robust release processes” (Cloud Native Computing Foundation)“Software Deployment Security: Risks and Best Practices” (DevOps.com)“Software Updates, A Double-Edged Sword for Cybersecurity Professionals” (Infosecurity)“DevOps Best Practices for Faster and More Reliable Software Delivery” (DevOps.com)3 - Report: GenAI, attack variety, data security drive cyber strategiesWhat issues act as catalysts for organizations’ cybersecurity actions today? Hint: They’re fairly recent concerns. The promise and peril of generative AI ranks first. It’s closely followed by the ever growing variety of cyberattacks; and by the intensifying urgency to protect data.That’s according to CompTIA’s “State of Cybersecurity 2025” report, based on a survey of almost 1,200 business and IT pros in North America and in parts of Europe and Asia. These three key factors, along with others like the scale of attacks, play a critical role in how organizations currently outline their cybersecurity game plans.“Understanding these drivers is essential for organizations to develop proactive and adaptive cybersecurity strategies that address the evolving threat landscape and safeguard their digital assets,” reads a CompTIA blog about the report.Organizations are eagerly trying to understand both how generative AI can help their cybersecurity programs and how this technology is being used by malicious actors to make cyberattacks harder to detect and prevent.Meanwhile, concern about data protection has ballooned in the past couple of years. “As organizations become more data-driven, the need to protect sensitive information has never been more crucial,” reads the blog.Not only are organizations focused on securing data at rest, in transit and in use, but they’re also creating foundational data-management practices, according to the report.“The rise of AI has accelerated the need for robust data practices in order to properly train AI algorithms, and the demand for data science continues to be strong as businesses seek competitive differentiation,” the report reads.To get more details, read:The report’s announcement “Cybersecurity success hinges on full organizational support, new CompTIA report asserts”CompTIA’s blogs “Today’s top drivers for cybersecurity strategy” and “Cybersecurity’s maturity: CompTIA’s State of Cybersecurity 2025 report”The full “State of Cybersecurity 2025” reportFor more information about data security posture management (DSPM) and preventing AI-powered attacks, check out these Tenable resources:“Harden Your Cloud Security Posture by Protecting Your Cloud Data and AI Resources” (blog)“Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?” (on-demand webinar)“The Data-Factor: Why Integrating DSPM Is Key to Your CNAPP Strategy” (blog)“Mitigating AI-Related Security Risks” (on-demand webinar)“Securing the AI Attack Surface: Separating the Unknown from the Well Understood” (blog)4 - CISA lists software dev practices most harmful for securityRecommended best practices abound in the cybersecurity world. However, CISA and the FBI are taking the opposite tack in their quest to improve the security of software products: They just released a list of the worst security practices that software manufacturers ought to avoid.Titled “Product Security Bad Practices,” the document groups the “no-nos” into three main categories: product properties; security features; and organizational processes and policies.“It’s 2024, and basic, preventable software defects continue to enable crippling attacks against hospitals, schools, and other critical infrastructure. This has to stop,” CISA Director Jen Easterly said in a statement.“These product security bad practices pose unacceptable risks in this day and age, and yet are all too common,” she added. Here are some of the worst practices detailed in the document, which is part of CISA’s “Secure by Design” effort:Using programming languages considered “memory unsafe”Including user-provided input in SQL query stringsReleasing a product with default passwordsReleasing a product with known and exploited vulnerabilitiesNot using multi-factor authenticationFailing to disclose vulnerabilities in a timely mannerAlthough the guidance is aimed primarily at software makers whose products are used by critical infrastructure organizations, the recommendations apply to all software manufacturers.If you’re interested in sharing your feedback with CISA and the FBI, you can submit comments about the document until December 16, 2024 on the Federal Register.To get more details, check out:CISA’s announcement “CISA and FBI Release Product Security Bad Practices for Public Comment”The full document “Product Security Bad Practices”For more information about how to develop secure software:“Tenable Partners with CISA to Enhance Secure By Design Practices” (Tenable)“Ensuring Application Security from Design to Operation with DevSecOps” (DevOps.com)“What is application security?” (TechTarget)“Guidelines for Software Development (Australian Cyber Security Centre)5 - New EU law focuses on cybersecurity of connected digital productsMakers of digital products — both software and hardware — that directly or indirectly connect to networks and to other devices will have to comply with specific cybersecurity safeguards in the European Union.A newly adopted law known as the “Cyber Resilience Act” outlines cybersecurity requirements for the design, development, production and lifecycle maintenance of these types of products, including IoT wares such as connected cars. For example, it specifies a number of “essential cybersecurity requirements” for these products, including that they:Aren’t shipped with known exploitable vulnerabilitiesFeature a “secure by default” configurationCan fix their vulnerabilities via automatic software updatesOffer access protection via control mechanisms, such as authentication and identity managementProtect the data they store, transmit and process using, for example, at-rest and in-transit encryption“The new regulation aims to fill the gaps, clarify the links, and make the existing cybersecurity legislative framework more coherent, ensuring that products with digital components (...) are made secure throughout the supply chain and throughout their lifecycle,” reads a statement from the EU’s European Council.The law will “enter into force” after its publication in the EU’s official journal and will apply and be enforceable 36 months later, so most likely in October 2027 or November 2027. However, some of its provisions will be enforceable a year prior.For more information and analysis about the EU’s Cyber Resilience Act:“Cyber Resilience Act Requirements Standards Mapping” (ENISA)“The Cyber Resilience Act, an Accidental European Alien Torts Statute?” (Lawfare)“EU Cybersecurity Regulation Adopted, Impacts Connected Products” (National Law Review)“Open source foundations unite on common standards for EU’s Cyber Resilience Act” (TechCrunch)“The Cyber Resilience Act: A New Era for Mobile App Developers” (DevOps.com)VIDEOThe EU Cyber Resilience Act: A New Era for Business Engagement in Open Source Software (Linux Foundation) 6 - UK cyber agency: CISOs must communicate better with boardsCISOs and boards of directors are struggling to understand each other, and this is increasing their organizations’ cyber risk, new research from the U.K.’s cyber agency has found.For example, in one alarming finding, 80% of respondents, which included board members, CISOs and other cyber leaders in medium and large enterprises, confessed to being unsure of who is ultimately accountable for cybersecurity in their organizations.“We found that in many organisations, the CISO (or equivalent role) thought that the Board was accountable, whilst the Board thought it was the CISO,” reads a blog about the research titled “How to talk to board members about cyber.”As a result, the U.K. National Cyber Security Centre (NCSC) has released new guidance aimed at helping CISOs better communicate with their organizations’ boards titled “Engaging with Boards to improve the management of cyber security risk.”“Cyber security is a strategic issue, which means you must engage with Boards on their terms and in their language to ensure the cyber risk is understood, managed and mitigated,” the document reads.Here’s a small sampling of the advice:Understand your audience, including who are the board’s members and their areas of expertise; and how the board works, such as its meeting formats and its committees.Talk about cybersecurity in terms of risks, and outline these risks concretely and precisely, presenting them in a matter-of-fact way.Don’t limit your communication with board members to formal board meetings. Look for opportunities to talk to them individually or in small groups outside of these board meetings.Elevate the discussions so that you link cybersecurity with your organization’s business challenges, goals and context.Aim to provide a holistic view, and avoid using technical jargon.Aim to advise instead of to educate. Full Article
do Social Media for Science Outreach – A Case Study: Career changing and pseudonyms By www.nature.com Published On :: Tue, 30 Apr 2013 15:53:34 +0000 To tie in with this month’s SoNYC birthday celebrations, we are hosting a collection of case Full Article Featured Guest Posts Outreach SpotOn NYC (#SoNYC) #reachingoutsci #SoNYC Social Media Case Study
do SpotOn London 2012 Storify: Fixing the fraud: how do we safeguard science from misconduct? By www.nature.com Published On :: Wed, 14 Nov 2012 12:00:49 +0000 #solo12fraud Full Article Featured Policy SpotOn London (#SoLo) Storifys #solo12fraud
do SpotOn London 2012 Storify: Crowdfunded science – new opportunities or dangerous echo chamber? By www.nature.com Published On :: Wed, 14 Nov 2012 14:55:52 +0000 Finding sources for funding research can be a demanding task, and one that's not always successful. A new trend that's emerging out of the necessity to fund projects that have no traditional means of support is "crowdfunding." A panel at SpotOnLondon weighs the resulting apprehensions and benefits. Full Article Featured Policy SpotOn London (#SoLo) Storifys #solo12funding
do SpotOn London 2012: My not-so-secret-anymore double life: Juggling research and science communication By www.nature.com Published On :: Mon, 19 Nov 2012 12:52:44 +0000 Dr Anne Osterrieder is a Research and Science Communication Fellow in Plant Cell Biology at the Department of Full Article Policy SpotOn London (#SoLo) #solo12jobs
do SpotOn London 2012 Storify: Incentivising Open Access and Open Science: Carrot and Stick By www.nature.com Published On :: Tue, 20 Nov 2012 13:12:21 +0000 Here is a Storify round up of the SpotOn London session: Incentivising Open Access and Open Full Article Featured Policy SpotOn London (#SoLo) Storifys #solo12open
do SpotOn London 2012 Storify: ORCID – why do we need a unique researcher ID? By www.nature.com Published On :: Tue, 20 Nov 2012 15:53:18 +0000 Here is a Storify round up of the SpotOn London session: ORCID – why do we Full Article Featured Policy SpotOn London (#SoLo) Storifys #solo12ORCID
do SpotOn London 2012 Storify: What do you need to start a revolution? By www.nature.com Published On :: Wed, 21 Nov 2012 11:57:53 +0000 Here is a Storify round up of the SpotOn London session: What do you need to Full Article Featured Policy SpotOn London (#SoLo) Storifys #solo12revo
do SpotOn London 2012 Storify: Tackling the terabyte: how should research adapt to the era of big data? By www.nature.com Published On :: Wed, 21 Nov 2012 15:09:37 +0000 Here is a Storify round up of the SpotOn London session: Tackling the terabyte: how should Full Article Featured Policy SpotOn London (#SoLo) Storifys #solo12tera
do SpotOn London 2013 – draft programme: Policy track By www.nature.com Published On :: Wed, 02 Oct 2013 16:07:30 +0000 As we’re getting ready to make tickets available for this year’s SpotOn London conference, we’re Full Article Featured Information Policy SpotOn London (#SoLo) #solo13 policy programme
do SpotOn London 2013: Altmetrics – The Opportunities and the Challenges By www.nature.com Published On :: Tue, 05 Nov 2013 13:52:42 +0000 Marie Boran is a PhD candidate at the INSIGHT Centre for Data Analytics, the National Full Article Featured Guest Posts Policy SpotOn London (#SoLo) #solo13alt
do SpotOn London 2013: Contract for interdisciplinary working By www.nature.com Published On :: Tue, 05 Nov 2013 13:53:59 +0000 In preparation for this year’s SpotOn London 2013 workshop, Interdisciplinary research: what can scientists, humanists Full Article Featured Guest Posts Policy #solo13hss
do SpotOn London 2013 – draft programme: Outreach track By www.nature.com Published On :: Wed, 02 Oct 2013 16:01:21 +0000 As we’re getting ready to make tickets available for this year’s SpotOn London conference, we’re Full Article Featured Information Outreach SpotOn London (#SoLo) #solo13 outreach programme
do SpotOn London 2013: Public Health Links, Lost in Translation By www.nature.com Published On :: Thu, 07 Nov 2013 15:11:04 +0000 Damian Pattinson (@damianpattinson) is a co-organiser of the session on Public Health Links, Lost in Translation at Full Article Outreach SpotOn London (#SoLo) #solo13links
do SpotOn London 2013 Storify: Open, Portable, Decoupled – How should Peer Review change? By www.nature.com Published On :: Mon, 11 Nov 2013 14:51:25 +0000 Here is a Storify collating the online conversation around the Open, Portable, Decoupled – How should Full Article Featured Outreach SpotOn London (#SoLo) Storifys #solo13peer
do SpotOn London 2013 Storify: Science games: does play work? By www.nature.com Published On :: Mon, 11 Nov 2013 15:05:12 +0000 Here is a Storify collecting the online conversations from the Science games: does play work? session at Full Article Featured Outreach SpotOn London (#SoLo) Storifys #solo13play
do SpotOn London Storify: Communicating Science in an Open Access World By www.nature.com Published On :: Mon, 11 Nov 2013 15:11:14 +0000 Here is a Storify collecting the online conversations from the Communicating Science in an Open Access Full Article Featured Outreach SpotOn London (#SoLo) Storifys #solo13open
do SpotOn London 2013 Storify: The Dark Art of Dark Social: Email, the antisocial medium which will not die By www.nature.com Published On :: Mon, 11 Nov 2013 15:43:19 +0000 Here is a Storify collecting the online conversations from the, “The Dark Art of Dark Full Article Featured Outreach SpotOn London (#SoLo) Storifys #solo13dark
do Attack on Titan. 4, Humanity pushes back! / Hajime Isayama ; [translator, Sheldon Drzka ; lettering, Steve Wands]. By library.gcpl.lib.oh.us Published On :: "Humanity pushes back! The Survey Corps develops a risky gambit— have Eren in Titan form attempt to repair Wall Rose, reclaiming human territory from the monsters for the first time in a century. But Titan-Eren's self-control is far from perfect, and when he goes on a rampage, not even Armin can stop him! With the survival of humanity on his massive shoulders, will Eren be able to return to his senses, or will he lose himself forever?"-- Page [4] of cover. Full Article
do The Adventure zone : the crystal kingdom / based on the podcast by Griffin McElroy, Clint McElroy, Travis McElroy, Justin McElroy ; adaptation by Clint McElroy, Carey Pietsch ; art by Carey Pietsch. By library.gcpl.lib.oh.us Published On :: "A desperate call for help interrupts holiday celebrations at the Bureau of Balance, and sends Taako, Magnus and Merle on a high-stakes mission to find and reclaim a fourth deadly relic: a powerful transmutation stone, hidden somewhere in the depths of a floating arcane laboratory that's home to the Doctors Maureen and Lucas Miller. An unknown menace has seized control of the stone, and is using it to transform the lab into a virulent pink crystal that spreads to everything it touches. It's only a matter of time before this sparkling disaster crash-lands, but in order to find the stone and save the whole planet from being King Midased, our heroes will have to fight their way through a gauntlet of rowdy robots and crystal golems, decide whether they can trust the evasive Lucas Miller, and solve the mystery of what— or who— has put them all in peril, before there's no world left to save." -- Provided by publisher Full Article
do Firefly. Blue Sun rising. Part 1 / created by Joss Whedon ; written by Greg Pak ; illustrated by Dan McDaid, Lalit Kumar Sharma, Daniel Bayliss ; colored by Marcelo Costa ; lettered by Jim Campbell. By library.gcpl.lib.oh.us Published On :: "Sheriff Mal Reynolds has a new partner— a law enforcing robot from the Blue Sun corporation, who doesn't care about motives, about mercy, about anything other than enforcing the law— no matter the cost. The Blue Sun Corporation has helped to run the universe from the shadows for years, but they're ready to step into the light and take over. If Mal wants to keep his job and protect his sector, the smart move would be to play by their rulebook. But for Mal, there's really one choice— reunite the crew of the Serenity for one last impossible job to save the 'verse. Greg Pak and artist Dan McDaid launch Mal & the crew of Serenity into their biggest war yet, officially continuing Joss Whedon's acclaimed series." -- Provided by publisher. Full Article
do Asadora! Volume 1 / Naoki Urasawa ; translation & adaptation, John Werry ; touch-up art & lettering, Steve Dutro. By library.gcpl.lib.oh.us Published On :: "A deadly typhoon, a mysterious creature and a girl who won't quit. In 2020, a large creature rampages through Tokyo, destroying everything in its path. In 1959, Asa Asada, a spunky young girl from a huge family in Nagoya, is kidnapped for ransom— and not a soul notices. When a typhoon hits Nagoya, Asa and her kidnapper must work together to survive. But there's more to her kidnapper and this storm than meets the eye. When Asa's mother goes into labor yet again, Asa runs off to find a doctor. But no one bats an eye when she doesn't return— not even as a storm approaches Nagoya. Forgotten yet again, Asa runs into a burglar and tries to stop him on her own, a decision that leads to an unlikely alliance." -- Provided by publisher. Full Article