ca

Los Museos de Bellas Artes de San Francisco presentan «Mary Cassatt at Work»

Los Museos de Bellas Artes de San Francisco presentan «Mary Cassatt at Work» Del 5...




ca

Tenable Web App Scanning Overview

The prevalence of web applications makes them a prime target for cyber criminals. Failure to secure web applications can lead to serious financial and reputational consequences. This report provides details of vulnerability data discovered by Tenable Web App Scanning.

Tenable Web App Scanning provides comprehensive and accurate vulnerability scanning and risk analysis by leveraging OWASP Top 10 risks to vulnerable web application components. Tenable provides comprehensive and automated vulnerability scanning for modern web applications using Dynamic Application Security Tests (DAST). The security and development teams leverage these detailed vulnerability scans of the application at any point in the development lifecycle and are able understand the true security risks of the web application before deployment.

Tenable Security Center uses a comprehensive list of attributes to increase visibility into web application vulnerabilities. Risk managers are able to focus on security challenges that pose the greatest threat and most risk by leveraging Common Vulnerability Scoring System (CVSS) and OWASP references. The report provides a detailed view of the web application components and custom code vulnerabilities. Additionally, vulnerability details related to Log4J are provided, which displays any detected applications that are found to be vulnerable to Log4J exploits.

The report and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable Security Center Feed under the category Security Industry Trends.

The requirements for this dashboard are:

  • Tenable Security Center 6.2.0
  • Tenable Web Application Scanner

Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable Security Center discovers and analyzes assets continuously to provide an accurate and unified view of an organization's security posture.

Chapters

Executive Summary: The Tenable Web App Scanning Overview report provides details of vulnerability data discovered by Tenable Web App Scanning, beginning with summary dashboard style view for leadership team. 

Web Application Vulnerability Statistics: This chapter combines the data collected from Nessus and Tenable Web App Scanner, providing a holistic view of vulnerabilities based on scanning the physical asset as well as the web application asset.  

OWASP 2021 Vulnerability Summary: Security and compliance frameworks, such as the Open Web Application Security Project (OWASP) Top 10, provides risk managers insight into methods used by adversaries to exploit common flaws and misconfigurations. 

Log4Shell: This chapter provides trending analysis along with vulnerability details related to log4shell vulnerabilities detected by both Nessus and Tenable Web App Scanning. Tenable recommends prioritizing these applications immediately for remediation efforts.
 




ca

OWASP Categories

Web application security is a key concern for any organization that develops or uses web applications. The software security community created the Open Web Application Security Project (OWASP) to help educate developers and security professionals on the latest web application security risks. Tenable has published reports for each OWASP version that has been released (2010,2013,2017, API 2019, and 2021). The individual reports provide organizations the ability to monitor web applications by identifying the top 10 most critical web application security risks as described in OWASP's Top 10 Application Security Risks document for the OWASP version being utilized.

The OWASP Top 10 Application Security Risks document outlines several different aspects of web-based security concerns, such as Cross-Site Scripting attacks (XSS), security misconfigurations, and sensitive data exposure. The focus of the OWASP Top 10 is to reduce risk across the most vulnerable business assets across the internet. Following these guidelines empowers organizations to reduce risk of organizational and consumer data theft.

Administrators need to ensure that their organization is not vulnerable to any of the attacks identified in the OWASP Top 10 Application Security Risks document for the relevant OWASP version being currently being used. Compliance related issues, such as known vulnerable components and insufficient logging, must be remediated to eliminate gaps in an organization's security that are not directly tied to exploitable attacks.

This report covers all aspects of the OWASP Top 10 version being utilized and provides administrators the tools and information needed to aid their efforts. The report contains 10 chapters, each aligned with one of the ten most critical web application risks (A1-A10). The information provides guidance to organizations on the actions necessary to mitigate business risk through strong security practices. The report requirements are Tenable Web App Scanning.

Report Templates:

The OWASP Top 10 categories are updated every 3 to 4 years and highlight the most critical web application security vulnerabilities. The following report templates are available and contain sections for each of the listed OWASP Top 10 categories.

  • OWASP Categories 2010 - For 2010, the OWASP Top 10 focuses on Injection, Cross-Site Scripting (XSS), and Broken Authentication in the top three positions.
  • OWASP Categories 2013 - For 2013, the OWASP Top 10 focuses on Injection, Broken Authentication and Session Management in the top three positions.
  • OWASP Categories 2017 - For 2017, the OWASP Top 10 focuses on Injection, Broken Authentication, and Sensitive Data Exposure in the top three positions.
  • OWASP Categories API 2019 - For 2019, the OWASP Top 10 focuses on Broken Object Level Authorization, Broken User Authentication, and Excessive Data Exposure in the top three positions.
  • OWASP Categories 2021 - For 2021, the OWASP Top 10 focuses on Broken Access Control, Cryptographic Failures, and Injection in the top three positions.




ca

Dear husband / Joyce Carol Oates.

The inimitable Joyce Carol Oates returns with Dear Husband-a gripping and moving story collection that powerfully re-imagines the meaning of family in America, often through violent means. Oates, a former recipient of the PEN/Malamud Award for Excellence in Short Fiction-as well as the National Book Award, Prix Femina, and numerous other literary honors-dazzles and disturbs with an outstanding compilation. Dear Husband is another triumph for the author of The Gravedigger's Daughter, We Were the Mulvaneys, and Blonde.




ca

Dear Mendl, dear Reyzl : Yiddish letter manuals from Russia and America / Alice Nakhimovsky and Roberta Newman.

At the turn of the 20th century, Jewish families scattered by migration could stay in touch only through letters. Jews in the Russian Empire and America wrote business letters, romantic letters, and emotionally intense family letters. But for many Jews who were unaccustomed to communicating their public and private thoughts in writing, correspondence was a challenge. How could they make sure their spelling was correct and they were organizing their thoughts properly? A popular solution was to consult brivnshtelers, Yiddish-language books of model letters. Dear Mendl, Dear Reyzl translates selections from these model-letter books and includes essays and annotations that illuminate their role as guides to a past culture.




ca

Investir dans la formation professionnelle des jeunes: Programme de formation professionnelle des secteurs agropastoral et halieutique du Cameroun

L’investissement dans les agriculteurs, c’est-à-dire le capital humain de l’agriculture, est crucial pour relever les défis que posent nos systèmes agroalimentaires.




ca

Afrique de l'Ouest : les tracasseries routières aggravent l'insécurité alimentaire

Créée notamment pour promouvoir le commerce intra-régional de biens dans la région, la Communauté économique des États d'Afrique de l'Ouest devait aussi permettre d'y réduire l'insécurité alimentaire. Mais les « points de sécurité », dressés le long des corridors de commerce par les autorités administratives qui prélèvent des pots-de-vin, sont venus limiter cette ambition. S’élevant jusqu’à 576 dollars aux 100 kms au Togo en 2017, cette corruption se mesure aussi en temps perdu, avec plus de trois heures aux 100 kms.




ca

Musée d’Orsay showcases the work of pioneering Norwegian painter Harriet Backer.

Musée d’Orsay showcases the work of pioneering Norwegian painter Harriet Backer. From 24 September 2024...




ca

Mary Cassatt at Work at the Fine Arts Museums of San Francisco

Mary Cassatt at Work at the Fine Arts Museums of San Francisco From October 5,...




ca

2022 Threat Landscape Report

2022 began with concerns over supply chains and Software Bills of Material (SBOM) as organizations worldwide were forced to reconsider how they respond to incidents in anticipation of the next major event. Tenable’s Security Response Team (SRT) continuously monitors the threat landscape throughout the year, always at the forefront of trending vulnerabilities and security threats. This dashboard provides a summary of Tenable data that has been compiled over the past year.

In a year marked by hacktivism, ransomware and attacks targeting critical infrastructure in a turbulent macroeconomic environment, organizations struggled to keep pace with the demands on cybersecurity teams and resources. Attacks against critical infrastructure remained a common concern. Ransomware continued to wreak havoc, even as some groups had operations shuttered by law enforcement, collapsed under the weight of internal power struggles, or splintered into new groups. New and complex vulnerabilities emerged, providing remediation challenges.

Perhaps most alarming is that the vulnerabilities of years past continue to haunt organizations. In fact, known flaws were so prominent inn 2022 that they warranted a spot on Tenable’s list of top vulnerabilities of 2022. We cannot stress this enough: Threat actors continue to find success with known and proven exploitable vulnerabilities that organizations have failed to patch or remediate successfully.

The constant evolution of the modern digital environment introduces new challenges for security practitioners. Successful security programs must take a comprehensive approach and understand where the most sensitive data and systems reside and what vulnerabilities or misconfigurations pose the greatest risk. Given the brisk rate of digital transformation, a complete understanding of the external attack surface is paramount.

With thousands of new vulnerabilities patched each year, only a small subset will ever see active exploitation. Focusing resources on the vulnerabilities that are exploitable and understanding how attackers chain vulnerabilities and misconfigurations enables security teams to design comprehensive strategies to reduce their overall risk exposure.

The Tenable 2022 Threat Landscape Report (TLR) inspects key aspects of the cybersecurity landscape and describes how organizations can revise their programs to focus on reducing risk. The TLR covers:

  • Significant vulnerabilities disclosed and exploited throughout the year, including how common cloud misconfigurations can affect even large tech companies
  • The continuous transformation of the ransomware ecosystem and the rise of extortion-only threat groups
  • Ongoing risks, vulnerabilities and attacks within the software supply chain
  • Tactics used by advanced persistent threat groups to target organizations with cyber espionage as well as financially motivated attacks.
  • Breach factors and the challenges in analyzing breach data, given the limited information available and lack of detailed reporting requirements
  • Details of the key vulnerabilities affecting enterprise software

Tenable Research delivers world class cyber exposure intelligence, data science insights, alerts, and security advisories. The Tenable Research teams perform diverse work that builds the foundation of vulnerability management. The Security Response Team (SRT) tracks threat and vulnerability intelligence feeds and provides rapid insight to the Vulnerability Detection team, enabling them to quickly create plugins and tools that expedite vulnerability detection. This fast turnaround enables customers to gain immediate insight into their current risk posture. Tenable Research has released over 180,000 plugins and leads the industry on CVE coverage. Additionally, the SRT provides breakdowns for the latest vulnerabilities on the Tenable Blog and produces an annual Threat Landscape Report. The SRT continuously analyzes the evolving threat landscape, authors white papers, blogs, Cyber Exposure Alerts, and additional communications to provide customers with comprehensive information to evaluate cyber risk.

Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable.sc discovers and analyzes assets continuously to provide an accurate and unified view of an organization’s security posture. The requirements for this dashboard is: Nessus.

Components

TLR 2022 – Top 5 Vulnerabilities:  This component features the top five vulnerabilities of 2022 as described in Tenable's 2022 Threat Landscape Report: Log4shell, Apache Log4j - CVE-2021-44228, Follina, Microsoft Support Diagnostic Tool - CVE-2022-30190, Atlassian Confluence Server and Data Center - CVE-2022-26134, ProxyShell, Microsoft Exchange Server - CVE-2021-34473, and Known Vulnerabilities - CVE-20XX-XXXX.

2022 TLR – Mitigation Tasks:  This component provides a list of patches that mitigate the key vulnerabilities in 2022, leveraging the CVEs identified in Tenable's 2022 Threat Landscape Report (TLR). The Remediation Summary tool uses the concept of a Patch Chain, and identifies the top patch to be remediated for the greatest risk reduction. When the top patch is applied, all other patches in the chain will be remediated.

2022 TLR – 90 Day Trend Analysis of Key Vulnerabilities: This component provides a 90-day analysis of the most notable vulnerabilities in 2022, leveraging the CVEs identified in Tenable's 2022 Threat Landscape Report (TLR). There are over 180 CVEs discussed in the TLR, which, combined with the trend line, helps risk managers determine how risk has been reduced over a period of 90 days. The vulnerability last observed filter is set to 1 day to display risk changes on a daily basis.

2022 TLR CVSS to VPR Heat Map: This component provides a correlation between CVSSv3 scores and Vulnerability Priority Rating (VPR) scoring for the key vulnerabilities listed in the 2022 Threat Landscape Report (TLR). The CVSSv3 scores are the standard scoring system used to describe the characteristics and severity of software vulnerabilities. Tenable's VPR helps organizations refine the severity level of vulnerabilities in the environment by leveraging data science analysis and threat modeling based on emerging threats. Each cell is comprised of a combination of cross-mapping of CVSS, VPR scoring, and 2022 CVE identifiers. Using a heat map approach, the filters begin in the left upper corner with vulnerabilities that present least risk.  Moving to the right and lower down the matrix the colors change darker from yellow to red as the risk levels increase.  Tenable recommends that operations teams prioritize remediation for risks in the lower right corners, and then work towards the upper left cells.

2022 TLR – Zero Day Vulnerabilities by Software/Hardware Type: This component displays a list of software/hardware that had zero-day vulnerabilities described in the 2022 Threat Landscape Report (TLR). Each indicator uses CVE from the report through the entire 2022 year. Details are provided in Tenable's 2021 Threat Landscape Report (TLR).

2022 TLR Key Vulnerabilities: This component displays cells for the most significant vulnerabilities of 2022 using CVE filters from the 2022 Threat Landscape Report. These filters display the key vulnerabilities from 2022 as well as the notable legacy vulnerabilities from prior years. Details are provided in Tenable's 2022 Threat Landscape Report.




ca

Tenable Web App Scanning Overview

The prevalence of web applications makes them a prime target for cyber criminals. Failure to secure web applications can lead to serious financial and reputational consequences. This dashboard provides a high-level summary of vulnerability data discovered by Tenable Web App Scanning.

Tenable Web App Scanning provides comprehensive and accurate vulnerability scanning and risk analysis by leveraging OWASP Top 10 risks to vulnerable web application components. Tenable provides comprehensive and automated vulnerability scanning for modern web applications using Dynamic Application Security Tests (DAST). The security and development teams leverage these detailed vulnerability scans of the application at any point in the development lifecycle and are able understand the true security risks of the web application.

Tenable Security Center uses a comprehensive list of attributes to increase visibility into web application vulnerabilities. Risk managers are able to focus on security challenges that pose the greatest threat and most risk by leveraging Common Vulnerability Scoring System (CVSS) and OWASP references. The dashboard provides a detailed view of the web application components and custom code vulnerabilities. Additionally, vulnerability details related to Log4J are provided , which displays any detected applications that are found to be vulnerable to Log4J exploits.

The dashboard and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The dashboard can be easily located in the Tenable Security Center Feed under the category Security Industry Trends.

  • The requirements for this dashboard are:
  • Tenable Security Center 6.2.0
  • Tenable Web Application Scanner

Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable Security Center discovers and analyzes assets continuously to provide an accurate and unified view of an organization's security posture.

Components

Web App Scanning - Statistics: The matrix provides a quick overview of actionable metrics collected using Nessus and Tenable Web AppScanner. The first column shows a count of vulnerabilities with a CVSSv3 score present, followed by the most critical of vulnerabilities with a CVSSv3 score greater than 9.  The "Needs Review" column displays the vulnerabilities with CVSSv3 base score of 5 to 8. The "Remediated" column shows all vulnerabilities with a CVSSV3 score greater than 5 that have been remediated.  The last two columns are focused on OWASP based vulnerabilities. The matrix provides two rows, the top showing vulnerabilities detected by Nessus.

Web App Scanning - Log4Shell Vulnerabilities: This chart presents a list of log4shell vulnerabilities detected by both Nessus and Tenable Web App Scanning. The chart uses the plugin name string and "Include Web App Results" to provide ring segments for each discovered vulnerability. Tenable recommends that these applications be prioritized immediately for remediation efforts.

Web App Scanning - OWASP 2021 Categories: This matrix provides a count of assets and vulnerabilities for each OWASP 2021 category that were detected using the Tenable Web App Scanner. Security and compliance frameworks, such as the Open Web Application Security Project (OWASP) Top 10, enables risk managers to gain insight into methods used by adversaries to exploit common flaws and misconfigurations.  Tenable Web App Scanner attributes vulnerabilities using the Cross Reference field to link to all published OWASP versions. Upon completion of the web application scan, the vulnerabilities detected and linked to OWASP 2021 provide an industry best practice approach to mitigating vulnerabilities.

Web App Scanning - Tenable Detected Applications Vulnerable to Log4Shell: The table presents a list of assets detected by both Nessus and Tenable Web App Scanning that are vulnerable to log4shell. The chart uses the plugin name string and "Include Web App Results" to provide entries for assets with the log4shell vulnerability. Tenable recommends that these applications be prioritized immediately for remediation efforts.




ca

OWASP Categories

Web application security is a key concern for any organization that develops or uses web applications. The software security community created the Open Web Application Security Project (OWASP)  to help educate developers and security professionals on the latest web application security risks. This dashboard provides organizations the ability to monitor web applications by identifying the top 10 most critical web application security risks as described in OWASP's Top 10 Application Security Risks document for 2021.

The OWASP Application Security Risks document outlines several different categories of web-based security concerns, such as Cross-Site Scripting attacks (XSS), security misconfigurations, and sensitive data exposure. OWASP's focus is to reduce risk across the most vulnerable business assets across the internet. Following these guidelines empowers organizations to reduce risk of organizational and consumer data theft.

Administrators need to ensure that their organization is not vulnerable to any of the attacks identified by OWASP. Remediating compliance related issues, such as known vulnerable components and insufficient logging, is important to eliminate gaps in an organization's infrastructure that are not directly tied to exploitable attacks.

These dashboards are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The dashboards can be easily located in the Tenable.sc Feed under the category Compliance & Configuration Assessment. The dashboard requirements are:

  • Tenable.sc 6.2.0
  • Tenable Web Application Scanning

This dashboard covers all versions of the OWASP Top 10 from 2010 to 2021, and provides administrators the tools and information needed to aid their efforts. The dashboard provides comparative view between version, using the cross-reference field utilized by plugins. The information will guide organizations on the actions to mitigate business risk through strong security practices. 

Components

WAS Data Concerns: This bar chart displays current (2021) OWASP vulnerability counts, sorted by plugin family and severity. According to OWASP, "the Top 10 represents a broad consensus about the most critical security risks to web applications." Identifying and fixing these issues provides organizations with a solid foundation for secure web development.

OWASP Categories by URL: This component displays vulnerability status counts for each Uniform Resource Locator (URL) within the organization. The URLs are sorted from those with the highest, most severe vulnerabilities to the least severe. Each URL has a graph of severity results for each severity category. 

OWASP Versions by State: This matrix displays the current and all previous OWASP versions along with a column displaying each state (New, Current, Resurfaced, Fixed). This information assists organizations in identifying OWASP vulnerabilities that are new, currently active, have previously been mitigated and have resurfaced, or have been fixed, for each OWASP version. 

OWASP Versions by Severity: This matrix displays the current and all previous OWASP Top 10 from Critical to Low. Each cell displays data on the count of web application vulnerabilities associated with the OWASP Top 10 release, and severity level. This information assists organizations in identifying the most severe OWASP vulnerabilities for the OWASP version in use. 




ca

Identifying guidelines for the design of conditional credit programs to promote sustainable agricultural practices in Latin America

Identifying guidelines for the design of conditional credit programs to promote sustainable agricultural practices in Latin America

Tools for food system policy development.

The post Identifying guidelines for the design of conditional credit programs to promote sustainable agricultural practices in Latin America appeared first on IFPRI.




ca

Síntesis de evidencia: Lineamientos para el diseño de programas crediticios agropecuarios condicionados para el fomento de prácticas agropecuarias sostenibles

Síntesis de evidencia: Lineamientos para el diseño de programas crediticios agropecuarios condicionados para el fomento de prácticas agropecuarias sostenibles

Enfoques para el desarrollo de políticas del sistema alimentario.

The post Síntesis de evidencia: Lineamientos para el diseño de programas crediticios agropecuarios condicionados para el fomento de prácticas agropecuarias sostenibles appeared first on IFPRI.







ca

From risk to resilience: How strategic government partnerships can enhance access to insurance-linked credit for smallholders in Zambia

From risk to resilience: How strategic government partnerships can enhance access to insurance-linked credit for smallholders in Zambia

The power of bundled solutions

The post From risk to resilience: How strategic government partnerships can enhance access to insurance-linked credit for smallholders in Zambia appeared first on IFPRI.





ca

PenderFund Capital Management Ltd.

HeadnotePursuant to National Policy 11-203 Process for Exemptive Relief Applications in Multiple Jurisdictions -- Relief from the prohibition on the use of corporate officer titles by certain registered individuals in respect of institutional clients -- Relief does not extend to interact




ca

Gowest Gold Ltd. – s. 1(6) of the OBCA

HeadnoteApplicant deemed to have ceased to be offering its securities to the public under the Business Corporations Act (Ontario).Applicable Legislative ProvisionsBusiness Corporations Act, R.S.O. 1990, c. B.16, as am., s. 1(6).




ca

Canada Life Investment Management Ltd.

HeadnoteNational Policy 11-203 Process for Exemptive Relief Applications in Multiple Jurisdictions -- Exemption granted to existing and future alternative investment funds from the margin deposit limits in subsection 6.8(1) and paragraph 6.8(2)(c) of NI 81-102 to permit each fund to depo




ca

Sleep Country Canada Holdings Inc.

HeadnoteNational Policy 11-206 Process for Cease to be a Reporting Issuer Applications -- The issuer ceased to be a reporting issuer under securities legislation.Applicable Legislative ProvisionsSecurities Act, R.S.O. 1990, c. S.5, as am., s. 1(10)(a)(ii).




ca

Miata Holdings Inc. – s. 1(6) of the OBCA

HeadnoteApplicant deemed to have ceased to be offering its securities to the public under the Business Corporations Act (Ontario).Applicable Legislative ProvisionsBusiness Corporations Act , R.S.O. 1990, c. B.16, as am., s. 1(6).




ca

MacArthur's spies : the soldier, the singer, and the spymaster who defied the Japanese in World War II / Peter Eisner.

The true story of three intrepid people who successfully eluded the Japanese in Manila for more than two years, sabotaging enemy efforts and preparing the way for MacArthur's return. One was a debonair polo-playing expatriate businessman who was also a U.S. Navy intelligence officer. Another was a defiant enlisted American soldier. And the third was a wily American woman, an intinerant torch singer with many names and almost as many husbands. With ample doses of intrigue, drama, skulduggery, sacrifice, and romance, this book has all the complicated heroism and villainy of the best war novels. But it is, in the end, a true tale of courage when it counted the most. -- adapted from book jacket.




ca

Explorer's guide. Cape Cod, Martha's Vineyard & Nantucket, [2017] / Kim Grant ; with photographs by the author.

Features recommendations for dining, lodging, transportation, shopping, recreational activities, landmarks, and cultural opportunities. -- Publisher.




ca

Eyewitness travel. Canary Islands, [2017] / main contributors, Piotr Paszkiewicz, Hanna Faryna-Paszkiewicz, Gabriele Rupp.

Provides background information on the Canary Islands; describes the major sights, and suggests hotels, restaurants, entertainment, and outdoor activities.




ca

Lonely planet. Pocket Reykjavík, [2017] : top experiences, local life, made easy / Alexis Averbuck.

Lonely Planet: The world's leading travel guide publisher Lonely Planet's Pocket Reykjavik is your passport to the most relevant, up-to-date advice on what to see and skip, and what hidden discoveries await you. Jump on a whale-watching boat at Reykjavik's Old Harbour, peruse priceless artefacts at the National Museum, or wash away your cares at the ethereal Blue Lagoon geothermal waters set in otherworldly lava fields; all with your trusted travel companion. Get to the heart of Reykjavik and begin your journey now! Inside Lonely Planet's Pocket Reykjavik: *Full-colour maps and images throughout *Highlights and itineraries help you tailor your trip to your personal needs and interests *Insider tips to save time and money and get around like a local, avoiding crowds and trouble spots *Essential info at your fingertips - hours of operation, phone numbers, websites, transit tips, prices *Honest reviews for all budgets - eating, sleeping, sight-seeing, going out, shopping, hidden gems that most guidebooks miss *Free, convenient pull-out Reykjavik map (included in print version), plus over 13 colour maps *Covers Old Reykjavik, Old Harbour, Laugavegur & Skolavordustigur, Laugardalur, Videy Island, Blue Lagoon, Reykjanes Peninsula, Golden Circle, South Coast, Jokulsarlon, West Iceland and more The Perfect Choice: Lonely Planet's Pocket Reykjavik, a colorful, easy-to-use, and handy guide that literally fits in your pocket, provides on-the-go assistance for those seeking only the can't-miss experiences to maximize a quick trip experience. * Looking for a comprehensive guide that recommends both popular and offbeat experiences, and extensively covers all of Iceland? Check out Lonely Planet's Iceland guide. * Looking for more extensive coverage? Check out Lonely Planet's Scandinavia guide for a comprehensive look at all the region has to offer. Authors: Written and researched by Lonely Planet and Alexis Averbuck. About Lonely Planet: Since 1973, Lonely Planet has become the world's leading travel media company with guidebooks to every destination, an award-winning website, mobile and digital travel products, and a dedicated traveller community. Lonely Planet covers must-see spots but also enables curious travellers to get off beaten paths to understand more of the culture of the places in which they find themselves.




ca

Penguins of America / James & Jack Patterson with Florence Yue ; illustrations by James Madsen.

"Penguins— our lovable, cute, flightless friends who are constantly dressed for a formal occasion— have always fascinated humans. As we shuffle through life one day at a time, it's easy to take things far too seriously, but when we see penguins taking a walk in our shoes it's impossible not to recognize how silly we can actually be. Featuring humorous illustrations with captions that show penguins in the day-to-day situations that we've all experienced— from a relaxing day at the beach to a stressful morning commute— PENGUINS OF AMERICA is a hilarious and charming send-up of daily life." -- from Amazon.com




ca

Campus Philharmonia Chamber Strings (November 13, 2024 8:00pm)

Event Begins: Wednesday, November 13, 2024 8:00pm
Location: Earl V. Moore Building
Organized By: School of Music, Theatre & Dance


Conducted by SMTD graduate student conductors, members of the Campus Philharmonia will perform a program of chamber music.

Kendra Chao & Evan Hagan, conductors

The U-M Campus Orchestras are made up of two main orchestras: Campus Symphony Orchestra (CSO) and Campus Philharmonia Orchestra (CPO). Both groups are comprised of non-music major students, faculty members, staff, and alumni of the University of Michigan.




ca

PwC Entry Level Virtual Event Series - Where accounting can take you (November 13, 2024 7:00pm)

Event Begins: Wednesday, November 13, 2024 7:00pm
Location:
Organized By: University Career Center


You should consider being an accountant. Yes, you. Workingas an accountant today is more than just numbers. The accounting field isundergoing a transformation and can offer you a pathway to gain experience and knowledge to create the career of your dreams at PwC and beyond.By attending this session you'll learn more about what accountants do and the benefits, skills, and value a career as a CPA can provide including: 
Flexibility and the ability to work anywhere or for anyone
Always in demand skills that last your entire career
Innovative tools and technology
Collaborative teamwork environment
High earning potential
Prestige of obtaining your CPA 
You won't want to miss out on learning moreabout why accounting might be the right field for you. Note: thisis one of two duplicative sessions being offered this fall.




ca

Music Education Carrigan Lecture: Dr. Kristen Pellegrino (November 13, 2024 7:00pm)

Event Begins: Wednesday, November 13, 2024 7:00pm
Location: Earl V. Moore Building
Organized By: School of Music, Theatre & Dance


Kristen Pellegrino, recipient of the 2024 Christopher Kendall Award from the SMTD Alumni Board, presents a guest lecture with support from the Department of Music Education.

Many researchers have found connections between (a) developing a strong teacher identity; (b) building connections among themselves, their subject, and their students; and (c) positively affecting student learning and teacher satisfaction/ resilience. I will briefly share how I became interested in studying music teacher identity and my process of reframing how to study it. Then, I will spend most of the session sharing what I have learned about college music education majors’ music teacher identity development, and public-school string teachers’ and music teachers’ experiences, beliefs, teaching practices, and identities.

KRISTEN PELLEGRINO, Professor of Music Education at the University of Texas at San Antonio and Past-President of American String Teachers Association, has 40 scholarly publications. In addition to international and national research journal articles and book chapters, Kristen was co-editor of two Oxford University Press books (2019, 2023). She is currently co-authoring a third book, Conway Publications’ *Journeys of Becoming and Being Music Teachers* (forthcoming, 2025). Pellegrino’s degrees are from the University of Michigan (Ph.D. in music education; M.M. in violin/chamber music performance) and the Eastman School of Music (B.M. in music education; B.M. in violin performance).




ca

Teach For America Info Session (November 13, 2024 6:00pm)

Event Begins: Wednesday, November 13, 2024 6:00pm
Location: 4448 East Hall
Organized By: Sessions @ Michigan





ca

Teach For America Ignite Fellowship Info Session (November 13, 2024 6:00pm)

Event Begins: Wednesday, November 13, 2024 6:00pm
Location:
Organized By: University Career Center


Interested in jumpstarting a purpose-driven career and making an impact with elementary, middle school, or high school students this coming spring? Join Teach For America to learn about a paid, part-time, virtual tutoring opportunity as a TFA Ignite Fellow.As a TFA Ignite Fellow, you become a catalyst for change, driving educational success for the students you work with. Our program is designed to break down barriers for students in low income communities, creating limitless learning opportunities. Your efforts will help students achieve their full potential, making education accessible and impactful.Looking for opportunities to gain real world experience and grow as a professional? Join our info session to learn details about the fellowship experience and application process.*Open to all undergraduate and graduate students and accepting applications for Spring 2025**All majors welcome*




ca

Science Café: A problem so small you can see it from space (November 13, 2024 5:30pm)

Event Begins: Wednesday, November 13, 2024 5:30pm
Location: Off Campus Location
Organized By: Museum of Natural History


Do we really consume a credit card’s worth of microplastics in a week? If microplastics are so small, how can they have such a big impact on our waterways? What are microplastics, anyway?

Explore these questions and more at November's Science Café! Please join Chris Ruf, Principal Investigator of the Remote Sensing Group (RSG) in the Climate and Space Sciences and Engineering Department (CLaSP) and graduate student Gopal Sundaram of the College of Engineering; Melissa Duhaime, Associate Professor in the Department of Ecology and Evolutionary Biology; and members of the Duhaime Lab (Rachel Cable, Lizy Michaelson, Skyler Har), for a discussion about one of our planet’s biggest tiny problems.




ca

Early Contract Info Session for Educators #2 (November 13, 2024 5:00pm)

Event Begins: Wednesday, November 13, 2024 5:00pm
Location:
Organized By: University Career Center


Providence Public Schools is excited to announce the launch of our Early Contract Hiring Fair, providing a unique opportunity for prospective employees to connect with the District and secure an early contract for the 2025-2026 school year. This November we will be hosting three virtual info sessions in whichyou will be able to learn more about who we are, opportunities within PPSD, and how to obtain an Early Contract for the 25'-26' academic school year.  Please make sure to RSVP by completing the registration form. If you are having trouble registering or have questions, please reach out to careers@ppsd.org.




ca

USA - Campus - Get to Know EY: General Information Session & Panel (November 13, 2024 4:00pm)

Event Begins: Wednesday, November 13, 2024 4:00pm
Location:
Organized By: University Career Center


Curious about a career at EY? Come join us to learn more about EY, our service lines, practices, and overall culture. This sessionwill start with a general firm overview, followed by a panel of EY stafffrom our Assurance, Tax, Consulting, and Strategy and Transactions service lines. EY campus recruiters will close out with recruiting reminders and resources. We hope to see you there!




ca

NCAL Kaiser Permanente - Psychology Postdoctoral Residency Program- Info. Session (November 13, 2024 4:00pm)

Event Begins: Wednesday, November 13, 2024 4:00pm
Location:
Organized By: University Career Center


Kaiser Permanente’s Northern California Mental Health Training Program would like to invite you to join us and a panel of experts at one of our upcoming Psychology Postdoctoral Residency Virtual Information Sessions. The session will provide you with a high-level overview of Kaiser Permanente, details around the program and position, and an opportunity to ask questions. We look forward to seeing you!




ca

Engaging Scientists in Policy and Advocacy (ESPA) Elevator Pitch Workshop (November 13, 2024 4:00pm)

Event Begins: Wednesday, November 13, 2024 4:00pm
Location: Taubman Health Sciences Library Room 6000
Organized By: Sessions @ Michigan


Welcome! Whether or not you're a member of ESPA, we encourage you to join us in this workshop to learn about and practice forming elevator pitches. 
Here, you will learn how you can quickly pitch your research to a a variety of audiences both familiar and unfamiliar with your discipline, helping you catch the attention of individuals ranging from policy-makers to fellow scientists. If you want to hone your ability to quickly explain your work in an eye-catching fashion, join us for this workshop and grab some free food while you're at it!




ca

Algebraic Geometry Seminar: Homological mirror symmetry for K3 surfaces (November 13, 2024 4:00pm)

Event Begins: Wednesday, November 13, 2024 4:00pm
Location: East Hall
Organized By: Algebraic Geometry Seminar - Department of Mathematics


Joint work with Ailsa Keating (Cambridge). We prove the homological mirror symmetry conjecture of Kontsevich for K3 surfaces in the following form: The Fukaya category of a projective K3 surface is equivalent to the derived category of coherent sheaves on the mirror, which is a K3 surface of Picard rank 19 over the field of formal Laurent series. This builds on prior work of Seidel (who proved the theorem in the case of the quartic surface), Sheridan, Lekili--Ueda, and Ganatra--Pardon--Shende.

I will try to keep prerequisites to a minimum, in particular, I will not assume prior knowledge of the Fukaya category.




ca

Learning Seminar in Algebraic Combinatorics: Poincare duality algebras, the Kahler package, and volume polynomials (November 13, 2024 3:00pm)

Event Begins: Wednesday, November 13, 2024 3:00pm
Location: East Hall
Organized By: Learning Seminar in Algebraic Combinatorics - Department of Mathematics


By what has been shown in previous talks, we have seen that we can show coefficients of the characteristic polynomial of a realizable matroid can be realized via specific computations in the Chow ring of its wonderful compactification. In this talk, we will introduce the notion of Poincare duality algebras, which are graded algebras with a degree function giving an isomorphism from the top degree to the base field that induces a non-degenerate pairing between complementary degrees of the algebra. Furthermore, we will introduce a notion of hard Lefschetz and Hodge-Riemann relations for such algebras. When a Poincare duality algebra satisfies a certain version of these properties, we can show that the log-concavity of its "volume polynomial" is equivalent to the eigenvalues of a symmetric form on the algebra arising from the Hodge-Riemann relations. Because the Hodge-Riemann relations in appropriate degree imply the log-concavity of the coefficients of the characteristic polynomial of the matroid, this framework gives us a program to establish the log-concavity result. Throughout this talk, I will attempt to provide intuition from the case of the Chow rings of smooth projective varieties.




ca

Early Careers: EY Next Steps: EY Open Science AI & Data Challenge Information Session (November 13, 2024 3:00pm)

Event Begins: Wednesday, November 13, 2024 3:00pm
Location:
Organized By: University Career Center


A sustainable future depends on being able to produce enough nutritious food for the world’s population. Using a combination of data, algorithms, and artificial intelligence we can help develop new toolsto help feed the world. Come learn about the EY Open Science Data Challenge and how you can help solve world hunger. challenge.ey.com.




ca

Jenna Moon, carillon (November 13, 2024 1:20pm)

Event Begins: Wednesday, November 13, 2024 1:20pm
Location: Lurie Ann & Robert H. Tower
Organized By: School of Music, Theatre & Dance


SMTD doctoral alumna Jenna Moon performs on the Ann & Robert H. Lurie Carillon, an instrument of 60 bells with the lowest bell (bourdon) weighing 6 tons.

Thirty-minute recitals are performed on the Lurie Carillon every weekday that classes are in session. During these recitals, visitors may take the elevator to level 2 to view the largest bells, or to level 3 to see the carillonist performing. (Visitors subject to acrophobia are recommended to visit level 2 only.) An optional spiral stairway between levels 2 and 3 allows for up-close views of some of the largest bells.




ca

Webinar Honoring HHS Veterans: Exploring Career Paths in Science and Medicine at HHS (November 13, 2024 1:00pm)

Event Begins: Wednesday, November 13, 2024 1:00pm
Location:
Organized By: University Career Center


HHS is hosting the virtual event for veterans, “Webinar Honoring HHS Veterans: Exploring Career Paths in Science and Medicine at HHS” on Wednesday, November 13, from 1-3 p.m. ET. Veterans, register for the webinar: Veterans in Action: Careersin Health Science and Medicine at HHSThe webinar will showcaseveterans excelling in diverse career opportunities across HHS in health science and medicine and provide veterans with valuable advice for pursuing similar opportunities. Our veteran panelists from CDC, FDA, and NIH will share insights into their careers and discuss how their military service has shaped their paths.Veterans, join us to discover essential roles in the federal government and to receive valuable advice for pursuingsimilar opportunities. The webinar is open to the public.




ca

Respiratory Careers: Join Mayo Clinic’s Team in Southwest MN (November 13, 2024 1:00pm)

Event Begins: Wednesday, November 13, 2024 1:00pm
Location:
Organized By: University Career Center


You are invited to an interview with Mayo Clinic's Respiratory Care department on Wednesday, Nov. 13th! Our hiring leaders will be conducting virtual interviews between 11:00 AM - 1:00 PM CST. Consider joining our Respiratory Care department in Southwest MN! We are currently offering a $10,000 sign-on bonus and offer relocation assistance, in addition to ourimpressive benefits package!If you are interested in interviewing, please complete the two steps below and someone from Mayo Clinic Recruitment Team will reach out to you to confirm your appointment: 
Formally Apply Here
Schedule Interview Time Here
 Want to learn more about this opportunity? Listen to quick video about the Mayo Clinic: Why join the Mayo Clinic respiratory care team Please contact Jenna Kidd at Kidd.Jenna@mayo.edu with any questions.




ca

Respiratory Careers: Join Mayo Clinic’s Team in Austin, MN (November 13, 2024 1:00pm)

Event Begins: Wednesday, November 13, 2024 1:00pm
Location:
Organized By: University Career Center


You are invited to an interview with Mayo Clinic's Respiratory Care department on Wednesday, Nov. 13th! Our hiring leaders will be conducting virtual interviews between 11:00 AM - 1:00 PM CST. Consider joining our Respiratory Care department in Austin, MN! We are currently offering a $10,000 sign-on bonus and offer relocation assistance, in addition to our impressive benefits package!If you are interested in interviewing,please complete the two steps below and someone from Mayo Clinic Recruitment Team will reach out to you to confirm your appointment: 
Formally Apply Here
Schedule Interview Time Here
 Want to learn more about this opportunity? Listen to quick video about the Mayo Clinic: Why join the Mayo Clinic respiratory care team Please contact Jenna Kidd at Kidd.Jenna@mayo.edu with any questions.




ca

Cool career spotlight: a day in the life of an aerospace engineer (November 13, 2024 1:00pm)

Event Begins: Wednesday, November 13, 2024 1:00pm
Location:
Organized By: University Career Center


Interested in gaining a first hand account of a career in aerospace engineering? Join Handshake and Pratt & Whitney Production Test Engineer, Anthony Bartolotta, for answers to questions on topics like:
An average day in the life of an aerospace engineer 
Important hard and soft skills for aspiring engineers to know
Tips for launching a career in engineering
Sign up for free today! 




ca

Revisiting the Divide: A Dialogue Between Asian and Asian American Studies (November 13, 2024 12:00pm)

Event Begins: Wednesday, November 13, 2024 12:00pm
Location: Rackham Graduate School (Horace H.)
Organized By: Asian Languages and Cultures


Upcoming DEI event, "Revisiting the Divide: A Dialogue Between Asian and Asian American Studies," this Wednesday, November 13th!

This conversation will bring together scholars of Asian Studies and Asian American Studies to reflect on the academic divisions between these two fields. We kindly request that you RSVP at the QR code on the poster below or this link, as seating and food will be limited.

Please join us for a light lunch and fruitful discussion from 12-1:30 PM in the Rackham West Conference Room.




ca

North Campus Mindfulness Meditation Drop-In (Online) (November 13, 2024 12:00pm)

Event Begins: Wednesday, November 13, 2024 12:00pm
Location: Off Campus Location
Organized By: Mindfulness @ Umich


Take a moment to create some space to breathe and invite a sense of calm into your day. This is a guided mindfulness meditation drop-in session. No experience necessary. Free and open to all.

Email dmitryb@umich.edu to sign up for the mailing list. You will receive a weekly reminder with the zoom link. Also, you can add the sessions to your Google Calendar: https://tinyurl.com/y3kbkwd6




ca

Kathy Beck, carillon (November 13, 2024 12:00pm)

Event Begins: Wednesday, November 13, 2024 12:00pm
Location: Burton Memorial Tower
Organized By: School of Music, Theatre & Dance


Kathy Beck performs on the Charles Baird Carillon, an instrument of 53 bronze bells located inside the Burton Memorial Tower. The largest bell, which strikes the hour, weighs 12 tons, while the smallest bell, 4½ octaves above, weighs just 15 pounds.

Thirty-minute recitals are performed on the Charles Baird Carillon at noon every weekday that classes are in session, followed by visitor Q&A with the carillonist. The bell chamber may be accessed via a combination of elevator and stairs. Take the elevator to the highest floor possible (floor 8), and then climb two flights of stairs (39 steps) to the bell chamber (floor 10). Earplugs are available from the carillonist upon request. Be prepared to walk on ice and snow in the bell chamber during winter. Built in 1936, the Charles Baird Carillon is not ADA accessible. Visitors with mobility concerns are invited to visit the Lurie Carillon: https://smtd.umich.edu/facilities/ann-and-robert-h-lurie-carillon/