de How should governments respond to crises? Rapid response using RIAPA modeling system By www.youtube.com Published On :: Tue, 13 Aug 2024 20:58:25 GMT Full Article
de Policy Seminar | Debt Distress and the Right to Food in Africa By www.youtube.com Published On :: Thu, 3 Oct 2024 03:15:37 GMT Full Article
de 2024 Martin J. Forman Lecture | Supporting and shaping the global nutrition agenda with evidence By www.youtube.com Published On :: Wed, 30 Oct 2024 21:19:24 GMT Full Article
de 2024 Martin J. Forman Lecture | Supporting and shaping the global nutrition agenda with evidence By www.youtube.com Published On :: Wed, 30 Oct 2024 21:21:07 GMT Full Article
de Supporting and shaping the global nutrition agenda with evidence: A three-decade journey of resea… By www.youtube.com Published On :: Thu, 31 Oct 2024 03:46:41 GMT Full Article
de Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates By www.tenable.com Published On :: Fri, 25 Oct 2024 09:00:00 -0400 Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips. Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards.Dive into six things that are top of mind for the week ending Oct. 25.1 - CSA: How to prevent “shadow AI” As organizations scale up their AI adoption, they must closely track their AI assets to secure them and mitigate their cyber risk. This includes monitoring the usage of unapproved AI tools by employees — an issue known as “shadow AI.”So how do you identify, manage and prevent shadow AI? You may find useful ideas in the Cloud Security Alliance’s new “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paper.The white paper covers shadow AI topics including:Creating a comprehensive inventory of AI systemsConducting gap analyses to spot discrepancies between approved and actual AI usageImplementing ways to detect unauthorized AI waresEstablishing effective access controlsDeploying monitoring techniques “By focusing on these key areas, organizations can significantly reduce the risks associated with shadow AI, ensuring that all AI systems align with organizational policies, security standards, and regulatory requirements,” the white paper reads.For example, to create an inventory that offers the required visibility into AI assets, the document explains different elements each record should have, such as:The asset’s descriptionInformation about its AI modelsInformation about its data sets and data sourcesInformation about the tools used for its development and deploymentDetailed documentation about its lifecycle, regulatory compliance, ethical considerations and adherence to industry standardsRecords of its access control mechanismsShadow AI is one of four topics covered in the publication, which also unpacks risk management; governance and compliance; and safety culture and training.To get more details, read:The full “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paperA complementary slide presentationThe CSA blog “Shadow AI Prevention: Safeguarding Your Organization’s AI Landscape”For more information about AI security issues, including shadow AI, check out these Tenable blogs:“Do You Think You Have No AI Exposures? Think Again”“Securing the AI Attack Surface: Separating the Unknown from the Well Understood”“Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach”“6 Best Practices for Implementing AI Securely and Ethically”“Compromising Microsoft's AI Healthcare Chatbot Service”2 - Best practices for secure software updatesThe security and reliability of software updates took center stage in July when an errant update caused massive and unprecedented tech outages globally.To help prevent such episodes, U.S. and Australian cyber agencies have published “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers.”“It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements,” reads the 12-page document.Although the guide is aimed primarily at commercial software vendors, its recommendations can be useful for any organization with software development teams that deploy updates internally. The guide outlines key steps for a secure software development process, including planning; development and testing; internal rollout; and controlled rollout. It also addresses errors and emergency protocols.“A safe software deployment process should be integrated with the organization’s SDLC, quality program, risk tolerance, and understanding of the customer’s environment and operations,” reads the guide, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the Australian Cyber Security Centre.To get more details, read:The “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers” guideThe CISA alert “CISA, US, and International Partners Release Joint Guidance to Assist Software Manufacturers with Safe Software Deployment Processes”For more information about secure software updates:“Tenable’s Software Update Process Protects Customers’ Business Continuity with a Safe, Do-No-Harm Design” (Tenable)“The critical importance of robust release processes” (Cloud Native Computing Foundation)“Software Deployment Security: Risks and Best Practices” (DevOps.com)“Software Updates, A Double-Edged Sword for Cybersecurity Professionals” (Infosecurity)“DevOps Best Practices for Faster and More Reliable Software Delivery” (DevOps.com)3 - Report: GenAI, attack variety, data security drive cyber strategiesWhat issues act as catalysts for organizations’ cybersecurity actions today? Hint: They’re fairly recent concerns. The promise and peril of generative AI ranks first. It’s closely followed by the ever growing variety of cyberattacks; and by the intensifying urgency to protect data.That’s according to CompTIA’s “State of Cybersecurity 2025” report, based on a survey of almost 1,200 business and IT pros in North America and in parts of Europe and Asia. These three key factors, along with others like the scale of attacks, play a critical role in how organizations currently outline their cybersecurity game plans.“Understanding these drivers is essential for organizations to develop proactive and adaptive cybersecurity strategies that address the evolving threat landscape and safeguard their digital assets,” reads a CompTIA blog about the report.Organizations are eagerly trying to understand both how generative AI can help their cybersecurity programs and how this technology is being used by malicious actors to make cyberattacks harder to detect and prevent.Meanwhile, concern about data protection has ballooned in the past couple of years. “As organizations become more data-driven, the need to protect sensitive information has never been more crucial,” reads the blog.Not only are organizations focused on securing data at rest, in transit and in use, but they’re also creating foundational data-management practices, according to the report.“The rise of AI has accelerated the need for robust data practices in order to properly train AI algorithms, and the demand for data science continues to be strong as businesses seek competitive differentiation,” the report reads.To get more details, read:The report’s announcement “Cybersecurity success hinges on full organizational support, new CompTIA report asserts”CompTIA’s blogs “Today’s top drivers for cybersecurity strategy” and “Cybersecurity’s maturity: CompTIA’s State of Cybersecurity 2025 report”The full “State of Cybersecurity 2025” reportFor more information about data security posture management (DSPM) and preventing AI-powered attacks, check out these Tenable resources:“Harden Your Cloud Security Posture by Protecting Your Cloud Data and AI Resources” (blog)“Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?” (on-demand webinar)“The Data-Factor: Why Integrating DSPM Is Key to Your CNAPP Strategy” (blog)“Mitigating AI-Related Security Risks” (on-demand webinar)“Securing the AI Attack Surface: Separating the Unknown from the Well Understood” (blog)4 - CISA lists software dev practices most harmful for securityRecommended best practices abound in the cybersecurity world. However, CISA and the FBI are taking the opposite tack in their quest to improve the security of software products: They just released a list of the worst security practices that software manufacturers ought to avoid.Titled “Product Security Bad Practices,” the document groups the “no-nos” into three main categories: product properties; security features; and organizational processes and policies.“It’s 2024, and basic, preventable software defects continue to enable crippling attacks against hospitals, schools, and other critical infrastructure. This has to stop,” CISA Director Jen Easterly said in a statement.“These product security bad practices pose unacceptable risks in this day and age, and yet are all too common,” she added. Here are some of the worst practices detailed in the document, which is part of CISA’s “Secure by Design” effort:Using programming languages considered “memory unsafe”Including user-provided input in SQL query stringsReleasing a product with default passwordsReleasing a product with known and exploited vulnerabilitiesNot using multi-factor authenticationFailing to disclose vulnerabilities in a timely mannerAlthough the guidance is aimed primarily at software makers whose products are used by critical infrastructure organizations, the recommendations apply to all software manufacturers.If you’re interested in sharing your feedback with CISA and the FBI, you can submit comments about the document until December 16, 2024 on the Federal Register.To get more details, check out:CISA’s announcement “CISA and FBI Release Product Security Bad Practices for Public Comment”The full document “Product Security Bad Practices”For more information about how to develop secure software:“Tenable Partners with CISA to Enhance Secure By Design Practices” (Tenable)“Ensuring Application Security from Design to Operation with DevSecOps” (DevOps.com)“What is application security?” (TechTarget)“Guidelines for Software Development (Australian Cyber Security Centre)5 - New EU law focuses on cybersecurity of connected digital productsMakers of digital products — both software and hardware — that directly or indirectly connect to networks and to other devices will have to comply with specific cybersecurity safeguards in the European Union.A newly adopted law known as the “Cyber Resilience Act” outlines cybersecurity requirements for the design, development, production and lifecycle maintenance of these types of products, including IoT wares such as connected cars. For example, it specifies a number of “essential cybersecurity requirements” for these products, including that they:Aren’t shipped with known exploitable vulnerabilitiesFeature a “secure by default” configurationCan fix their vulnerabilities via automatic software updatesOffer access protection via control mechanisms, such as authentication and identity managementProtect the data they store, transmit and process using, for example, at-rest and in-transit encryption“The new regulation aims to fill the gaps, clarify the links, and make the existing cybersecurity legislative framework more coherent, ensuring that products with digital components (...) are made secure throughout the supply chain and throughout their lifecycle,” reads a statement from the EU’s European Council.The law will “enter into force” after its publication in the EU’s official journal and will apply and be enforceable 36 months later, so most likely in October 2027 or November 2027. However, some of its provisions will be enforceable a year prior.For more information and analysis about the EU’s Cyber Resilience Act:“Cyber Resilience Act Requirements Standards Mapping” (ENISA)“The Cyber Resilience Act, an Accidental European Alien Torts Statute?” (Lawfare)“EU Cybersecurity Regulation Adopted, Impacts Connected Products” (National Law Review)“Open source foundations unite on common standards for EU’s Cyber Resilience Act” (TechCrunch)“The Cyber Resilience Act: A New Era for Mobile App Developers” (DevOps.com)VIDEOThe EU Cyber Resilience Act: A New Era for Business Engagement in Open Source Software (Linux Foundation) 6 - UK cyber agency: CISOs must communicate better with boardsCISOs and boards of directors are struggling to understand each other, and this is increasing their organizations’ cyber risk, new research from the U.K.’s cyber agency has found.For example, in one alarming finding, 80% of respondents, which included board members, CISOs and other cyber leaders in medium and large enterprises, confessed to being unsure of who is ultimately accountable for cybersecurity in their organizations.“We found that in many organisations, the CISO (or equivalent role) thought that the Board was accountable, whilst the Board thought it was the CISO,” reads a blog about the research titled “How to talk to board members about cyber.”As a result, the U.K. National Cyber Security Centre (NCSC) has released new guidance aimed at helping CISOs better communicate with their organizations’ boards titled “Engaging with Boards to improve the management of cyber security risk.”“Cyber security is a strategic issue, which means you must engage with Boards on their terms and in their language to ensure the cyber risk is understood, managed and mitigated,” the document reads.Here’s a small sampling of the advice:Understand your audience, including who are the board’s members and their areas of expertise; and how the board works, such as its meeting formats and its committees.Talk about cybersecurity in terms of risks, and outline these risks concretely and precisely, presenting them in a matter-of-fact way.Don’t limit your communication with board members to formal board meetings. Look for opportunities to talk to them individually or in small groups outside of these board meetings.Elevate the discussions so that you link cybersecurity with your organization’s business challenges, goals and context.Aim to provide a holistic view, and avoid using technical jargon.Aim to advise instead of to educate. Full Article
de Social Media for Science Outreach – A Case Study: National Science Foundation-funded IGERT project team By www.nature.com Published On :: Wed, 22 May 2013 15:00:23 +0000 To tie in with this month’s SoNYC birthday celebrations, we are hosting a collection of case Full Article Featured Guest Posts Outreach SpotOn NYC (#SoNYC) Uncategorized #reachingoutsci Social Media Case Study
de OSC study finds ESG ratings greatly influence investor decisions but are difficult to understand By www.osc.ca Published On :: Wed, 30 Oct 2024 13:50:36 GMT TORONTO – The Ontario Securities Commission (OSC) today released the results of a study examining the influence of environmental, social and governance (ESG) factors on retail investor decision making. Full Article
de Canadian securities regulators publish coordinated blanket orders to provide temporary exemptions from certain derivatives data reporting requirements By www.osc.ca Published On :: Wed, 30 Oct 2024 17:52:49 GMT TORONTO – The Canadian Securities Administrators (CSA) today published Full Article
de CSA provides update on binding dispute resolution By www.osc.ca Published On :: Wed, 06 Nov 2024 21:18:29 GMT TORONTO – The Canadian Securities Administrators (CSA) is providing an update to interested parties on the status of its work to introduce binding authority for an independent dispute resolution service. Full Article
de SpotOn London 2012 Storify: Crowdfunded science – new opportunities or dangerous echo chamber? By www.nature.com Published On :: Wed, 14 Nov 2012 14:55:52 +0000 Finding sources for funding research can be a demanding task, and one that's not always successful. A new trend that's emerging out of the necessity to fund projects that have no traditional means of support is "crowdfunding." A panel at SpotOnLondon weighs the resulting apprehensions and benefits. Full Article Featured Policy SpotOn London (#SoLo) Storifys #solo12funding
de SpotOn London 2013 Storify: Open, Portable, Decoupled – How should Peer Review change? By www.nature.com Published On :: Mon, 11 Nov 2013 14:51:25 +0000 Here is a Storify collating the online conversation around the Open, Portable, Decoupled – How should Full Article Featured Outreach SpotOn London (#SoLo) Storifys #solo13peer
de Outcast. Volume 4, Under Devil's wing / Robert Kirkman, creator, writer ; Paul Azaceta, artist ; Elizabeth Breitweiser, colorist ; Rus Wooton, letterer. By library.gcpl.lib.oh.us Published On :: "Answers are given, secrets are revealed, and the Barnes family has never been in more danger. Allison learns that there's something very special about her daughter, bu where's Kyle? Will Anderson risk everything to save him?' -- Page 4 of cover. Full Article
de Something is killing the children. Volume 3 / written by James Tynion IV ; illustrated by Werther Dell'Edera ; colored by Miquel Muerto ; lettered by AndWorld Design ; cover by Werther Dell'Edera with colors by Miquel Muerto. By library.gcpl.lib.oh.us Published On :: "As the House of Slaughter arrives to clean up the situation by any means necessary, Erica will find that the true threat to those around her isn't who— or what— she ever expected. And the cost of saving the day may be too high for anyone to pay … ." -- Description provided by publisher. Full Article
de The Black Panther Party : a graphic novel history / David F. Walker ; art, colors, and letters by Marcus Kwame Anderson. By library.gcpl.lib.oh.us Published On :: "Founded in Oakland, California, in 1966, the Black Panther Party for Self-Defense was a radical political organization that stood in defiant contrast to the mainstream civil rights movement. This gripping illustrated history explores the impact and significance of the Panthers, from their social, educational, and healthcare programs that were designed to uplift the Black community to their battle against police brutality through citizen patrols and frequent clashes with the FBI, which targeted the Party from its outset. Using dramatic comic book-style retellings and illustrated profiles of key figures, The Black Panther Party captures the major events, people, and actions of the Party, as well as their cultural and political influence and enduring legacy." -- Page [2] of cover. Full Article
de Dune. House Atreides. Volume 1 / written by Brian Herbert & Kevin J. Anderson ; illustrated by Dev Pramanik ; lettered by Ed Dukeshire ; colored by Alex Guimarães ; cover by Jae Lee & June Chung. By library.gcpl.lib.oh.us Published On :: "Set in the years leading up the Hugo and Nebula Award-winning Dune— 'Dume: House Atreides transports readers to the far future on the desert planet Arrakis where Pardot Kynes seeks its secrets. Meanwhile, a violent coup is planned by the son of Emperor Elrood; an eight-year-old slave Duncan Idaho seeks to escape his cruel masters; and a young man named Leto Atreides begins a fateful journey. These unlikely souls are drawn together first as renegades and then as something more, as they discover their true fate— to change the very shape of history!" -- Description provided by publisher. Full Article
de You look like death : tales from the Umbrella Academy / story, Gerard Way and Shaun Simon ; art & colors, I.N.J. Culbard ; letters, Nate Piekos of Blambot ; cover and chapter breaks by Gabriel Bá. By library.gcpl.lib.oh.us Published On :: "When 18-year-old Klaus gets himself kicked out of the Umbrella Academy and his allowance discontinued, he heads to a place where his ghoulish talents will be appreciated— Hollywood. But after a magical high on a stash stolen from a vampire drug lord, Klaus needs help, and doesn't have his siblings there to save him." -- Provided by publisher. Full Article
de Firefly. Blue Sun rising. Part 2 / created by Joss Whedon ; written by Greg Pak ; illustrated by Dan McDaid, Lalit Kumar Sharma, Daniel Bayliss ; inks by Vincenzo Federici ; colored by Marcelo Costa ; lettered by Jim Campbell. By library.gcpl.lib.oh.us Published On :: "The stage is set for the final battle as the first ever Firefly event concludes, with Sheriff Mal Reynolds— yeah, he's still getting used to it too— making a choice that may cost him those he loves most, whether he knows it or not … Shocking losses lead to stunning decisions as Mal and the crew of Serenity must face the consequences of their choices in war against the Blue Sun Corporation. The 'Verse is changing in ways no one ever expected— and a new chapter of Firefly begins here." -- Provided by publisher. Full Article
de SpotOn London 2013: Open, Portable, Decoupled – How should Peer Review change? By www.nature.com Published On :: Wed, 13 Nov 2013 16:49:22 +0000 At this year’s SpotOn London, one of the most popular and widely tweeted sessions organised Full Article Outreach SpotOn London (#SoLo) #solo13peer
de Study on countermeasures of Agriculture against Economic and Trade Frictions between China and USA [in Chinese] By www.ifpri.org Published On :: Sat, 12 Dec 2020 5:05:01 EST Full Article
de Nutrition and economic development: Exploring Egypt's exceptionalism and the role of food subsidies [in Chinese] By www.ifpri.org Published On :: Wed, 31 Mar 2021 5:05:01 EDT Full Article
de Integrated urban-rural development and common prosperity: Connotation, international experience and implementation path [in Chinese] By www.ifpri.org Published On :: Tue, 13 Dec 2022 5:05:01 EST Since the 18th National Congress of the Communist Party of China, China’s economicdevelopment has entered a new stage. Under the circumstances, the goal of “Common Prosperity” has attracted more and more attention over the past several years. China’s long-term implementation of urban-biased policies led to a huge gap between urban and rural areas for a long time and hindered the realization of common prosperity. Full Article
de Bulletin on food price dynamics, inflation and the food security situation in Sudan: November-December 2022 [in Arabic] By www.ifpri.org Published On :: Tue, 07 Feb 2023 5:05:01 EST موجز: Full Article
de The economy-wide impact of Sudan’s ongoing conflict: Implications on economic activity, agrifood system and poverty [in Arabic] By www.ifpri.org Published On :: Wed, 04 Oct 2023 5:05:01 EDT دخل النزاع المسلح بين القوات المسلحة السودانية وقوات الدعم السريع في السودان شهره السادس منذ اندلاعه في 15 أبريل 2023، دون أي مؤشرات على انتهائه قريبا. تسببت الحرب في كارثة إنسانية حادة، دمرت البنية التحتية الرئيسية، وقيدت أنشطة التجارة والإنتاج. علاوة على ذلك، أدى ذلك إلى تعطيل الوصول إلى المرافق العامة والخدمات المالية والأسواق، مما أدى إلى ندرة كبيرة في السلع والخدمات. في هذه الورقة، نستخدم إطار نمذجة مضاعف مصفوفة المحاسبة الاجتماعية لتقييم الآثار الاقتصادية على مستوى الاقتصاد لهذه الاضطرابات في النشاط الاقتصادي والموارد الإنتاجية وسبل العيش. Full Article
de Armed conflict and business operations in Sudan: Survey evidence from agri-food processing firms [in Arabic] By www.ifpri.org Published On :: Sat, 21 Oct 2023 5:05:01 EDT Full Article
de Charade Sandra Brown. By library.gcpl.lib.oh.us Published On :: A medical miracle gives TV personality Cat Delaney more than a new heart. With her second chance at life Cat trades Hollywood for San Antonio, where she hosts a TV show for children with special needs. Here she meets Alex Pierce, an ex-cop turned crime writer-and the first man to see her as a woman since her surgery. But her new world turns sinister when fatal "accidents" begin killing other heart recipients, and a mysterious stalker starts shadowing her every move. Soon Cat realizes Alex may-or may not-be her most important ally and that her new heart comes at a terrible price: a tangled web of secrets and someone determined to take her life. Full Article
de 1225 Christmas Tree Lane Debbie Macomber. By library.gcpl.lib.oh.us Published On :: Welcome to Christmas Town! The people of Cedar Cove know how to celebrate Christmas. Like Grace and Olivia and everyone else, Beth Morehouse expects this Christmas to be one of her best. Her small Christmas tree farm is prospering, her daughters and her dogs are happy and well, and her new relationship with local vet Ted Reynolds is showing plenty of romantic promise. But...someone recently left a basket filled with puppies on her doorstep, puppies she's determined to place in good homes. That's complication number one. And number two is that her daughters, Bailey and Sophie, have invited their dad, Beth's long-divorced husband, Kent, to Cedar Cove for Christmas. The girls have visions of a mom-and-dad reunion dancing in their heads. As always in life-and in Cedar Cove-there are surprises, too. More than one family's going to have a puppy under the tree. More than one scheme will go awry. And more than one romance will have a happy ending! Full Article
de Inherit the Dead A Novel Lee Child. By library.gcpl.lib.oh.us Published On :: This New York Times and USA TODAY bestseller, is a collaboration between twenty bestselling mystery novelists who have joined forces to create a spellbinding story of love, betrayal, and intrigue. Pericles "Perry" Christo is a PI with a past-a former cop who lost his badge and his family when a corruption scandal left him broke and disgraced. So when wealthy Upper East Side matron Julia Drusilla summons him one cold February night, he grabs what seems to be a straightforward (and lucrative) case. The socialite is looking for her beautiful, aimless daughter, Angelina, who is about to become a very wealthy young woman. But as Christo digs deeper, he discovers there's much more to the lovely "Angel" than meets the eye. This classic noir tale twists and turns down New York's mean streets and along Hamptons' beaches and back roads during a bitterly cold and gray winter where nothing is as it seems and everyone has something to hide. In this inventive "serial novel" storytelling approach, each of the twenty bestselling writers brings his or her distinctive voice to a chapter of Inherit the Dead, building the tension to a shocking, explosive finale. The editor, Jonathan Santlofer, has arranged to donate any royalties in excess of editor and contributor compensation to Safe Horizon, the leading victim assistance agency in the country. Full Article
de Starry Night Debbie Macomber. By library.gcpl.lib.oh.us Published On :: Carrie Slayton, a big-city society-page columnist, longs to write more serious news stories. So her editor hands her a challenge: She can cover any topic she wants, but only if she first scores the paper an interview with Finn Dalton, the notoriously reclusive author. Living in the remote Alaskan wilderness, Finn has written a megabestselling memoir about surviving in the wild. But he stubbornly declines to speak to anyone in the press, and no one even knows exactly where he lives. Digging deep into Finn's past, Carrie develops a theory on his whereabouts. It is the holidays, but her career is at stake, so she forsakes her family celebrations and flies out to snowy Alaska. When she finally finds Finn, she discovers a man both more charismatic and more stubborn than she even expected. And soon she is torn between pursuing the story of a lifetime and following her heart. Filled with all the comforts and joys of Christmastime, Starry Night is a delightful novel of finding happiness in the most surprising places. Full Article
de Starlight Debbie Macomber. By library.gcpl.lib.oh.us Published On :: One of cherished author Debbie Macomber's classic novels, this is an enchanting tale of a love that is challenged at every turn. At a magical Christmas fete, Karen McAlister meets a man she cannot ignore-the first man to interest her in a long while. Before she laid eyes on Rand Prescott, Karen would have said her life was complete and content . . . much to the dismay of her widowed father, who would love to see her married and settled. But everything changed that enchanted night: The stars, the moonlight, the music, and the champagne all conspired to throw two people together. But the fates are determined to pull them apart. Long ago, Rand Prescott erected a steel façade around his heart. He never had any intention of maintaining any kind of relationship with a woman. Independent, proud, and nearly blind, Rand felt he had no capacity to return a woman's love. But that was before he met Karen. In one night, she shattered all of his preconceived ideas about romance and threatened to break through his walls. Rand is convinced that Karen deserves better than the love of a blind man. Can he ever accept this beguiling woman into his life-and into his soul? Full Article
de You Are Destined to be Together Forever Dean Koontz. By library.gcpl.lib.oh.us Published On :: The singular journey of Odd Thomas is approaching its unforgettable conclusion in Saint Odd. But before Odd's destiny is revealed, this exclusive eBook short story looks back-way back-to where it all began for Odd Thomas and Stormy Llewellyn, two souls who are destined to be together forever. Amid the dizzying rides, tantalizing games of chance, and fanciful attractions of a state fair, two teenage sweethearts on the cusp of life and love's pleasures find their way to a shadowy carnival tent brimming with curiosities. There, from the bizarre and enthralling Gypsy Mummy, a mechanized merchant of dreams and prognosticator of tomorrows, the young couple learns what fate promises for them. But fate, for Odd Thomas and Stormy Llewellyn, is something altogether different: full of dark corners, sharp edges, and things no seer or soothsayer could ever anticipate. And for Odd Thomas, a gallant fry cook from a sleepy California desert town, the future beckons-to listen to unquiet spirits, pursue unsettling mysteries, and learn shocking truths ...for a purpose far greater than himself. Full Article
de The Minor Adjustment Beauty Salon Alexander McCall Smith. By library.gcpl.lib.oh.us Published On :: Modern ideas get tangled up with traditional ones in the latest intriguing installment in the beloved, best-selling No. 1 Ladies' Detective Agency series. Precious Ramotswe has taken on two puzzling cases. First she is approached by the lawyer Mma Sheba, who is the executor of a deceased farmer's estate. Mma Sheba has a feeling that the young man who has stepped forward may be falsely impersonating the farmer's nephew in order to claim his inheritance. Mma Ramotswe agrees to visit the farm and find out what she can about the self-professed nephew. Then the proprietor of the Minor Adjustment Beauty Salon comes to Mma Ramotswe for advice. The opening of her new salon has been shadowed by misfortune. Not only has she received a bad omen in the mail, but rumors are swirling that the salon is using dangerous products that burn people's skin. Could someone be trying to put the salon out of business? Meanwhile, at the office, Mma Ramotswe has noticed something different about Grace Makutsi lately. Though Mma Makutsi has mentioned nothing, it has become clear that she is pregnant . . . But in Botswana-a land where family has always been held above all else-this may be cause for controversy as well as celebration. With genuine warmth, sympathy, and wit, Alexander McCall Smith explores some tough questions about married life, parenthood, grief, and the importance of the traditions that shape and guide our lives. This is the fourteenth installment in the series. This ebook edition includes a Reading Group Guide. Full Article
de Heartsong Debbie Macomber. By library.gcpl.lib.oh.us Published On :: One of beloved author Debbie Macomber's classic novels, this is a heartwarming story of hope and possibility. Skye Garvin treasures her work as a volunteer in the pediatric ward of the local hospital. Bringing even a small amount of joy to a suffering child-whether through her playful attitude or her gift for music-is a blessing that Skye cherishes. But due to overcrowding, her favorite young patient's new roommate is an adult-a man who catches Skye completely off guard. Despite his gruff exterior, Skye is compelled to help the unnerving man. But the old scars of personal tragedy-and a fundamental difference of faith-might undermine Skye's chances at a happy ending. Jordan Kiley can't imagine anything more frustrating than his current situation. A car accident has left him confined to a hospital bed, his arm painfully pinned in traction. He can't even feed himself. But when he first lays eyes on the beautiful volunteer, he knows there are far greater challenges awaiting him. Astutely, he senses that Skye's sparkling wit hides a heart that has been unbearably broken. And Jordan has deep secrets of his own. Can he convince Skye that she is worthy of love-and earn her heart in the process? Full Article
de Lost and Found in Cedar Cove (Short Story) Debbie Macomber. By library.gcpl.lib.oh.us Published On :: Debbie Macomber's heartwarming series, set at the Rose Harbor Inn in picturesque Cedar Cove, displays the author's signature talent for creating characters who feel like friends, and small towns that feel like home. In this original short story, Jo Marie Rose readies her inn for spring, turning to her new friends Grace and Olivia when she needs them most. Jo Marie has big plans for her bed-and-breakfast. With the help of handyman Mark Taylor, she intends to plant a beautiful rose garden in time for her upcoming open house. Jo Marie and Mark rarely see eye to eye-especially on matters of home improvement-but she knows he has her best interests at heart. After the two walk the grounds, Jo Marie realizes that her beloved rescue dog, Rover, is missing, and at a time when she most needs a friend, Mark abruptly leaves. Confused by Mark's behavior and worried for Rover's safety, Jo Marie searches for her precious pup all over Cedar Cove. Rover is on an adventure of his own-one that will lead to a delightful surprise for two unlikely people. Includes an excerpt from Debbie Macomber's Last One Home. Full Article
de After Dead What Came Next in the World of Sookie Stackhouse Charlaine Harris. By library.gcpl.lib.oh.us Published On :: Find out what happened after the conclusion of the #1 New York Times bestselling Sookie Stackhouse series. Dead Ever After marked the end of the Sookie Stackhouse series-novels that garnered millions of fans and spawned the hit HBO television show True Blood. It also stoked a hunger that will never die...a hunger to know what happened next. With characters arranged alphabetically-from the Ancient Pythoness to Bethany Zanelli-bestselling author Charlaine Harris takes fans into the future of their favorite residents of Bon Temps and environs. You'll learn how Michele and Jason's marriage fared, what happened to Sookie's cousin Hunter, and whether Tara and JB's twins grew up to be solid citizens. This coda provides the answers to your lingering questions-including details of Sookie's own happily-ever-after... Full Article
de Dead Ever After Charlaine Harris. By library.gcpl.lib.oh.us Published On :: THE FINAL NOVEL IN THE #1 NEW YORK TIMES BESTSELLING SOOKIE STACKHOUSE SERIES! When a shocking murder rocks the small town of Bon Temps, Louisiana, psychic cocktail waitress Sookie Stackhouse learns that she has more than one enemy waiting to get vengeance for the past, because nothing is ever clear-cut in Bon Temps. What passes for truth is only a convenient lie. What passes for justice is more spilled blood. And what passes for love is never enough... Full Article
de A perfect Manhattan murder / Tracy Kiely. By library.gcpl.lib.oh.us Published On :: Thrilled that their playwright friend’s Broadway debut was a rousing success, Nic and Nigel are trying to enjoy the A-list after-party with their pal Harper. Unfortunately, all the champagne and repartee in the world aren’t enough to overlook the churlish behavior of Harper’s theater-critic husband, Dan. Nic is shocked the next morning when she learns that Dan’s been murdered. Nigel thinks the world may be a better place without him. Still, Harper is their friend and they’re intent on helping her any way they can. Invigorated by the thrill of the hunt and fortified by a flood of cocktails, catching the killer becomes the Martinis’ top priority . . . with their behemoth Bullmastiff Skippy along for the ride. Includes cocktail recipes! Full Article
de Edited out : a mysterious detective mystery / E. J. Copperman. By library.gcpl.lib.oh.us Published On :: Mystery author Rachel Goldman is getting used to the idea that her fictional creation Duffy Madison has somehow taken flesh-and-blood form and is investigating missing person cases not far from where Rachel lives. Wait. No. She’s not getting used to it at all, and the presence of this real-life Duffy is making her current manuscript—what’s the word?—lousy. So she doesn’t want to see Duffy—the living one—at all. To make matters worse, when he shows up at her door and insists on talking to her, it’s about the one thing she doesn’t want to do: Find a missing person. But the man Duffy seeks this time around might be able to solve Rachel’s problem. He might just be the man Duffy was before he became Duffy five years ago. The only problem is she could be letting Duffy lead her into danger yet again… Entertaining and witty, the second in E.J. Copperman's Mysterious Detective Mystery series Edited Out will delight his fans, both new and old. Full Article
de OSC Investor Alert: Ernest Anderson By www.osc.ca Published On :: Wed, 23 Nov 2022 15:54:32 GMT TORONTO - The Ontario Securities Commission (OSC) is warning Ontario investors not to invest with Ernest Anderson (aka Edward Banayoti aka Edward Banayoti Sawiris), or any companies associated with him. Ernest Anderson is permanently banned from trading securities in Ontario. Full Article
de Do safety net programs reduce conflict risk? Evidence from a large-scale public works program in Ethiopia By essp.ifpri.info Published On :: Wed, 06 Nov 2024 09:08:15 +0000 Summary of the findings • We find that the PSNP did not significantly alter the risk of violent events. • However, it had a negative impact on demonstrations (protests and riots) as well as fatalities. • These effects are most pronounced during the period of 2014-18, coinciding with widespread protests in Amhara and Oromia, the […] Source: IFPRI Ethiopia: Ethiopia Strategy Support Program Full Article News Presentations Publications
de Do social protection programs reduce conflict risk? Evidence from a large-scale safety net program in rural Ethiopia By essp.ifpri.info Published On :: Wed, 06 Nov 2024 09:10:32 +0000 PSNP is largest public works program in Africa • Started in 2005 in four main highland regions • Approximately 8 million participants • We examine the effect of PSNP on both high-intensity and low-intensity conflict • Using Govt. of Ethiopia administrative PSNP records and geocoded data on conflict events (Armed Conflict Location & Event Data […] Source: IFPRI Ethiopia: Ethiopia Strategy Support Program Full Article News Presentations Publications
de Register: Delivering for Nutrition in South Asia Conference By bangladesh.ifpri.info Published On :: Thu, 07 Nov 2024 08:02:49 +0000 South Asia grapples with escalating levels of malnutrition in various forms, including undernutrition, overweight and obesity, and micronutrient deficiencies, alongside the increasing incidence of diet-related non-communicable diseases. Malnutrition re... Source: IFPRI Bangladesh Country Office Full Article D4N2024 Delivering for Nutrition Events News Conference implementation research
de Hybrid Research and Policy Conference on “Livestock, Gender, and Agency Amid Conflict in Ethiopia” By essp.ifpri.info Published On :: Wed, 13 Nov 2024 04:55:41 +0000 The CGIAR Initiative on National Policies and Strategies (NPS) presents: 'Livestock, Gender, and Agency Amid Conflict in Ethiopia' 📅 Dec 11, 2024, ILRI Info Center, Addis Ababa. Join us as we discuss CGIAR NPS’s latest findings to guide policies that strengthen Ethiopia’s livestock sector. CGIAR International Food Policy Research Institute (IFPRI) International Livestock Research Institute (ILRI) Policy Studies Institute […] Source: IFPRI Ethiopia: Ethiopia Strategy Support Program Full Article Events Featured Post News
de Agricultura, seguridad alimentaria, desarrollo y proteccion ambiental: Un futuro para Honduraas basado en la ciencia, tecnologia e innovacion By www.ifpri.org Published On :: Thu, 14 Jul 2022 5:05:01 EDT Full Article
de Diferentes configuraciones de derechos de exportación, la economía Argentina y el sector agropecuario: Simulaciones con el modelo mundial del IFPRI By www.ifpri.org Published On :: Wed, 28 Sep 2022 5:05:01 EDT Este documento es parte de una consultoría del IFPRI con el Banco Mundial para apoyar al gobierno de Argentina, y en particular al Ministerio de Agricultura, Ganadería y Pesca (MAGyP), en el análisis de los derechos o impuestos de exportación (DEXs), llamados también retenciones en la Argentina. Este es un tema con importantes implicaciones políticas, económicas y sociales. Full Article
de Estudio sobre el COVID-19 en el área rural de Guatemala: Efectos de largo plazo sobre la seguridad alimentaria y nutricional de los hogares en el Altiplano Occidental By www.ifpri.org Published On :: Wed, 21 Dec 2022 5:05:01 EST Desde el inicio de la pandemia del COVID-19, los productores agrícolas de Guatemala han afrontado múltiples restricciones de movimiento tanto locales como nacionales, así como también disrupciones en las cadenas de valor agrícolas. Asimismo, los productores han estado expuestos a varios choques externos como las tormentas tropicales de ETA e IOTA hacia finales de 2020 y el reciente conflicto bélico en Europa del Este y crisis de precios. Full Article
de Mapeo de intervenciones en seguridad alimentaria y nutrición en Guatemala: Análisis a nivel municipal By www.ifpri.org Published On :: Wed, 28 Dec 2022 5:05:01 EST La desnutrición y la deficiencia de micronutrientes es un problema grave en Guatemala. Los resultados de la IV Encuesta Nacional de Salud Materno-Infantil 2014-15 (MSPAS, INE, ICF, 2017) indican que el 46.5% de los niños menores de cinco años padecen de desnutrición crónica. Según el portal de datos del Banco Mundial, Guatemala es el país con mayor prevalencia de desnutrición crónica de América Latina y el Caribe y sexto en el mundo. Full Article
de Informe de políticas alimentarias mundiales 2023: Repensar las respuestas a las crisis alimentarias: Sinopsis By www.ifpri.org Published On :: Fri, 21 Apr 2023 5:05:02 EDT En 2022, el mundo se enfrentó a múltiples crisis. Continuaron las perturbaciones de los sistemas alimentarios debidas a la prolongada pandemia de COVID-19, las grandes catástrofes naturales, los disturbios civiles y la inestabilidad política, así como los crecientes efectos del cambio climático, mientras la guerra entre Rusia y Ucrania y la inflación agravaban una crisis mundial de alimentos y fertilizantes. Full Article
de Empoderamiento de la mujer rural en Guatemala, necesidades y oportunidades de medición: Posibles aplicaciones de una Métrica de Empoderamiento de las Mujeres para los Sistemas Estadísticos Nacionales (WEMNS) By www.ifpri.org Published On :: Tue, 12 Sep 2023 5:05:01 EDT La igualdad de género y el empoderamiento de las mujeres y niñas se ve reflejado en distintas prioridades de políticas a nivel global y local. El Objetivo de Desarrollo Sostenible 5 busca lograr la igualdad de género y empoderar a todas las mujeres y niñas. Full Article