are The Adventure zone : the crystal kingdom / based on the podcast by Griffin McElroy, Clint McElroy, Travis McElroy, Justin McElroy ; adaptation by Clint McElroy, Carey Pietsch ; art by Carey Pietsch. By library.gcpl.lib.oh.us Published On :: "A desperate call for help interrupts holiday celebrations at the Bureau of Balance, and sends Taako, Magnus and Merle on a high-stakes mission to find and reclaim a fourth deadly relic: a powerful transmutation stone, hidden somewhere in the depths of a floating arcane laboratory that's home to the Doctors Maureen and Lucas Miller. An unknown menace has seized control of the stone, and is using it to transform the lab into a virulent pink crystal that spreads to everything it touches. It's only a matter of time before this sparkling disaster crash-lands, but in order to find the stone and save the whole planet from being King Midased, our heroes will have to fight their way through a gauntlet of rowdy robots and crystal golems, decide whether they can trust the evasive Lucas Miller, and solve the mystery of what— or who— has put them all in peril, before there's no world left to save." -- Provided by publisher Full Article
are Batman. Damned / Brian Azzarello, writer ; Lee Bermejo, art and covers ; Jared K. Fletcher, letterer. By library.gcpl.lib.oh.us Published On :: "The Joker is dead. There is no doubt about that. But whether Batman finally snapped his scrawny neck or some other sinister force in Gotham City did the deed is still a mystery. Problem is, Batman can't remember … and the more he digs into this labyrinthine case, the more he starts to doubt everything he's uncovering. So who better to set him straight than … John Constantine? The problem with that is as much as John loves a good mystery, he loves messing with people's heads even more. So with John's 'help', the pair will delve into the sordid underbelly of Gotham as they race toward the mind-blowing truth of who murdered The Joker." -- Page [4] of cover. Full Article
are SpotOn London Storify: How are online tools changing science education? By www.nature.com Published On :: Thu, 21 Nov 2013 14:28:55 +0000 Here is a Storify collecting the online conversations from the “How are online tools changing Full Article SpotOn London (#SoLo) Storifys Tools #solo13edu
are You Are Destined to be Together Forever Dean Koontz. By library.gcpl.lib.oh.us Published On :: The singular journey of Odd Thomas is approaching its unforgettable conclusion in Saint Odd. But before Odd's destiny is revealed, this exclusive eBook short story looks back-way back-to where it all began for Odd Thomas and Stormy Llewellyn, two souls who are destined to be together forever. Amid the dizzying rides, tantalizing games of chance, and fanciful attractions of a state fair, two teenage sweethearts on the cusp of life and love's pleasures find their way to a shadowy carnival tent brimming with curiosities. There, from the bizarre and enthralling Gypsy Mummy, a mechanized merchant of dreams and prognosticator of tomorrows, the young couple learns what fate promises for them. But fate, for Odd Thomas and Stormy Llewellyn, is something altogether different: full of dark corners, sharp edges, and things no seer or soothsayer could ever anticipate. And for Odd Thomas, a gallant fry cook from a sleepy California desert town, the future beckons-to listen to unquiet spirits, pursue unsettling mysteries, and learn shocking truths ...for a purpose far greater than himself. Full Article
are Investor Alert: Investors are not required to use claims management companies to communicate with the CSA, CIRO or OBSI By www.osc.ca Published On :: Tue, 19 Mar 2024 13:08:50 GMT TORONTO – The Canadian Securities Administrators (CSA), the Canadian Investment Regulatory Organization (CIRO), and the Ombudsman for Banking Services and Investments (OBSI) remind investors that they all offer investors services related to claims or complaints free of charge. Full Article
are Estudio sobre el COVID-19 en el área rural de Guatemala: Efectos de largo plazo sobre la seguridad alimentaria y nutricional de los hogares en el Altiplano Occidental By www.ifpri.org Published On :: Wed, 21 Dec 2022 5:05:01 EST Desde el inicio de la pandemia del COVID-19, los productores agrícolas de Guatemala han afrontado múltiples restricciones de movimiento tanto locales como nacionales, así como también disrupciones en las cadenas de valor agrícolas. Asimismo, los productores han estado expuestos a varios choques externos como las tormentas tropicales de ETA e IOTA hacia finales de 2020 y el reciente conflicto bélico en Europa del Este y crisis de precios. Full Article
are SpotOn London 2014: Early career researchers And Twitter By www.nature.com Published On :: Sat, 15 Nov 2014 10:00:00 +0000 Full Article
are Othello / William Shakespeare ; art by Julien Choy ; story adaptation by Crystal S. Chan ; lettering, Daria Rhodes. By library.gcpl.lib.oh.us Published On :: "A brilliant general in the service of Venice, Othello is also the new husband of the adoring— and young— Desdemona, whose innocent hero worship has blossomed into love. But can a beautiful girl, so much younger than her husband, truly be faithful? Othello's trusted ensign Iago seems to think not. Can Othello trust him? Can Othello trust anyone? Manga Classics presents Shakespeare's classic story of love, hate, vengeance, and betrayal, in its full, original glory!" -- Description provided by publisher. Full Article
are Aster and the accidental magic / story and script, Thom Pico ; story and art, Karensac ; translated by Anne and Owen Smith. By library.gcpl.lib.oh.us Published On :: "A fun, action-packed fantasy adventure about a girl, her dog, and magic gone wrong! Quiet … birds … nature … . That's what Aster expects when her parents move their whole family to the middle of nowhere. It's just her (status: super-bored), her mom and dad (status: busy with science), her brother (status: has other plans), and … magic? In her new home, Aster meets a mysterious old woman with a herd of dogs who gives her a canine companion of her own. But when she and her dog Buzz are adventuring in the forest, they run into a trickster spirit who gives Aster three wishes. After wishing for the ability to understand and talk to her dog, she becomes only able to talk in dog language … and the trouble she gets into is just starting. Maybe the middle of nowhere will be more interesting than Aster thought." Full Article
are Aster and the mixed up magic / story and script, Thom Pico ; story and art, Karensac ; [translated by Anne and Owen Smith]. By library.gcpl.lib.oh.us Published On :: "Magic turned Aster's life upside-down— and it's not over! Get ready for more family, more fun, and even more magic in this graphic novel adventure. Moving to the middle of nowhere has been less of a disaster than Aster expected. Her mom's science experiments are actually pretty cool; her dad's cooking has gotten much better; her new dog is possibly the best canine companion anyone could ask for. And she's gotten to save the day— and her family— and the whole valley she lives in— from various magical calamities in what even she has to admit were extremely fun adventures. So now she can have a break, right? Guess what? Oh no; things get even more interesting." -- Description provided by publisher. Full Article
are Tenable Introduces AI Aware: A Groundbreaking Proactive Security Solution for AI and Large Language Models By www.tenable.com Published On :: Tue, 10 Sep 2024 09:00:00 -0400 Tenable®, the exposure management company, today announced the release of AI Aware, advanced detection capabilities designed to rapidly surface artificial intelligence solutions, vulnerabilities and weaknesses available in Tenable Vulnerability Management, the world’s #1 vulnerability management solution. Tenable AI Aware provides exposure insight into AI applications, libraries and plugins so organizations can confidently expose and close AI risk, without inhibiting business operations.The rapid development and adoption of AI technologies in the past two years has introduced major cybersecurity and compliance risks that organizations must proactively address without established best practices. As a result, cybersecurity teams face significant AI-related challenges, such as vulnerability detection and remediation, containing data leakage and reining in unauthorized AI use. According to recent Tenable Research, more than one-third of security teams are finding usage of AI applications in their environment that might not have been provisioned via formal processes. In fact, during a 75-day period between late June and early September, Tenable found over 9 million instances of AI applications on more than 1 million hosts. The cybersecurity risk of unfettered AI usage is compounded by the increasing volume of AI vulnerabilities. Tenable Research has found and disclosed several vulnerabilities in AI solutions, including in Microsoft Copilot, Flowise, Langflow, among others.With AI Aware, Tenable transforms proactive security for AI solutions. Tenable AI Aware uniquely leverages agents, passive network monitoring, dynamic application security testing and distributed scan engines to detect approved and unapproved AI software, libraries and browser plugins, along with associated vulnerabilities, thereby mitigating risks of exploitation, data leakage and unauthorized resource consumption. The combined depth of these multiple assessment methods delivers the most complete detection of AI in the modern ecosystem. [Watch the Tenable AI Aware product demo video here.]“In an effort to keep pace with the sea change introduced by AI, organizations around the world ran full speed ahead, potentially bypassing countless cybersecurity, privacy and compliance red flags,” said Shai Morag, chief product officer, Tenable. “Perhaps more so than with any other new technology we’ve seen, there are many risk factors to consider, especially with rushed development and deployment. Tenable AI Aware empowers organizations to deploy AI confidently, ensuring their security measures keep pace with the rapid evolution of AI technologies.”In addition to AI software and vulnerability detection, key AI Aware features available in Tenable Vulnerability Management, Tenable Security Center and Tenable One include:Dashboard Views provide a snapshot of the most common AI software discovered in the ecosystem, top assets with vulnerabilities related to AI and the most common communication ports leveraged by AI technologies. Shadow Software Development Detection illuminates the unexpected existence of the building blocks of AI development in the environment, enabling businesses to align initiatives with organizational best practices.Filter Findings for AI Detections enable teams to focus on AI-related findings when reviewing vulnerability assessment results. Combined with the power of Tenable Vulnerability Prioritization Rating (VPR), teams can effectively assess and prioritize vulnerabilities introduced by AI packages and libraries. Asset-Centric AI-Inventory provides a complete inventory of AI-related packages, libraries and browser plugins while reviewing the detailed profile of an asset. Join the upcoming Tenable webinar titled, "Mitigating AI-Related Security Risks: Insights and Strategies with Tenable AI Aware" on October 9, 2024 at 11:00 am ET, by registering here.More information on Tenable AI Aware is available at: https://www.tenable.com/products/vulnerability-management/ai-aware About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.com Full Article
are Leading Analyst Firm Ranks Tenable #1 for Sixth Consecutive Year in Market Share for Device Vulnerability Management By www.tenable.com Published On :: Thu, 10 Oct 2024 09:00:00 -0400 Tenable®, the exposure management company, today announced that it has been ranked first for 2023 worldwide market share for device vulnerability management in the IDC Worldwide Device Vulnerability Management Market Shares (doc #US51417424, July 2024) report. This is the sixth consecutive year Tenable has been ranked first for market share.According to the IDC market share report, Tenable is ranked first in global 2023 market share and revenue. Tenable credits its success to its strategic approach to risk management, which includes a suite of industry-leading exposure management solutions that expose and close security gaps, safeguarding business value, reputation and trust. The Tenable One Exposure Management Platform, the world’s only AI-powered exposure management platform, radically unifies security visibility, insight and action across the modern attack surface – IT, cloud, OT and IoT, web apps and identity systems.According to the IDC market share report, “The top 3 device vulnerability management vendors remained the same in 2023 as previous years, with Tenable once again being the top vendor.”The report highlighted Tenable’s use of generative AI, noting, “ExposureAI, available as part of the Tenable One platform, provides GenAI-based capabilities that include natural language search queries, attack path and asset exposure summaries, mitigation guidance suggestions, and a bot assistant to ask specific questions about attack path results.”Tenable’s latest innovations in the vulnerability management market – Vulnerability Intelligence and Exposure Response – were also highlighted in the report, stating, “Vulnerability Intelligence provides dynamic vulnerability information collected from multiple data sources and vetted by Tenable researchers, while Exposure Response enables security teams to create campaigns based on risk posture trends so remediation progress can be monitored internally.”The report also spotlighted the Tenable Assure Partner Program and MDR partnerships, noting, “Tenable has made more of a strategic effort to recruit managed security service providers (SPs) and improve the onboarding experience for them, as well as their customers. Managed detection and response (MDR) providers have been adding proactive exposure management because it helps shrink the customer attack surface, helping them provide better outcomes. Sophos and Coalfire are recently announced partners adding managed exposure management services to their MDR and pen testing services, respectively.”“At Tenable, we build products for a cloud-first, platform centric world, meeting customers' evolving risk management needs,” said Shai Morag, chief product officer, Tenable. “We leverage cutting edge technology, innovating across our portfolio to help customers know, expose and close priority security gaps that put businesses at risk.” "The device vulnerability management market is characterized by a focus on broader exposure management, with a number of acquisitions to round out exposure management portfolios," said Michelle Abraham, senior research director, Security and Trust at IDC. "Vendors are advised to enhance their offerings with additional security signals and automated remediation workflows to stay competitive in this evolving landscape."To read an excerpt of the IDC market share report, visit https://www.tenable.com/analyst-research/idc-worldwide-device-vulnerability-management-market-share-report-2023 About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.com Full Article
are Establishing a Software Inventory By www.tenable.com Published On :: Fri, 27 May 2022 09:00:00 -0400 In the event of a security breach, a software inventory is essential to determine what was breached, and who needs to be notified. First responders require a software inventory to perform forensic analysis and determine breach notification requirements for vendors, business partners, and regulatory bodies. Organizations that have a clear understanding of software in their environment can quickly assess a breach impact and identify affected areas. If legal proceedings are involved, an organized software inventory greatly assists in limiting data handed over to Law Enforcement and assists technical staff in depositions or testimony. Business Continuity and Disaster Recovery plans specify requirements for restoration of critical assets and services, but these need to be identified to establish a Recovery Time Objective (the amount of time to recover a service to an acceptable level of operation) and Recovery Point Objective (the last point of known good data.) Developing and maintaining a software inventory is a critical first step in implementing an effective cyber security program. A software inventory helps demonstrate compliance with regulatory controls and Service Level Agreements (SLA) for software used in the environment. From the perspective of “less is more,” a software inventory also identifies unnecessary software running in the environment, which increases the attack surface without providing a business advantage. Security operations perform scans to identify operating system and application versions, including unsupported software and unpatched systems. This information is used to establish a secure baseline and measure drift from that baseline. A software inventory is necessary to determine if the software is authorized, appropriately licensed, supported, and has the most recent security fixes applied. Identifying the authorized software assets is an important step to ensure critical assets are protected. The larger the organization, the more difficult the inventory process becomes. Tenable.io and Tenable.sc help organizations build a software inventory. There are several software discovery plugins that run by default in the following scan templates: Basic and Advanced Agent Scans Advanced (Network) Scan Basic (Network) Scan Credentialed Patch Audit Internal PCI Network Scan Maintaining a software inventory aids in cyber hygiene and minimizes unauthorized software installation. Many organizations perform an annual audit by an external third party, where they are required to enumerate authorized software that is running in the environment. Organizations that maintain a current software inventory throughout the year can produce information required by auditors and vendors with minimal effort. The report and its chapters are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable.sc Feed under the category Discovery and Detection. The report requirements are: Tenable.sc 5.19.1 Nessus 10.0.1 Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable.io discovers and analyzes assets continuously to provide an accurate and unified view of an organization’s security posture. Chapters Executive Summary This chapter presents data for detected operating systems, browsers, unsupported software, and other software installations on systems within a network. Installed Software Iteration This chapter displays software detected across the organizations systems. Software enumeration is utilized to detect Installed software. Issues Gating Remediation This chapter displays known/identified roadblocks to completing remediation efforts. Full Article
are Ransomware Ecosystem By www.tenable.com Published On :: Wed, 22 Jun 2022 09:00:00 -0400 Ransomware has evolved into an ecosystem with multiple players and an expanded threat model. Ransomware groups now deploy a double extortion technique, where they both encrypt and exfiltrate their victims’ data. The Tenable Security Research Team has released a report that enumerates common vulnerabilities exploited by ransomware affiliates and groups. The Ransomware Ecosystem report enables organizations to quickly scan for the vulnerabilities commonly exploited by ransomware groups. Organizations with effective Business Continuity and Disaster Recovery plans are protected against threats to availability of data, which can come in many forms, such as natural disasters, hardware failures, or malicious attacks. These organizations could recover operations from a traditional ransomware attack without paying the ransom. However, the vulnerabilities that gave ransomware groups the opportunity to successfully penetrate the infrastructure may still leave organizations open to significant risk. Like any good business, ransomware players discovered the advantage of threatening data confidentiality by publishing samples of their targets’ sensitive data and threatening to expose all the data unless they are paid. Threat actors understand the economic advantage of investing in the ransomware ecosystem, becoming more sophisticated and efficient over time. Organizations often struggle to secure a budget for resources needed to protect their infrastructure and prevent attacks from succeeding. The Ransomware Ecosystem report displays assets by plugin family along with associated vulnerabilities. Operations teams use this information to evaluate risk based on the organization’s business priorities. The ability to rapidly mitigate vulnerabilities requires data to be presented in a concise manner focused on findings that pose the greatest risk to the organization. Risk managers leverage risk-based vulnerability management platforms to prioritize mitigation efforts. This report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The report can be easily located in the Tenable.sc Feed under the category Compliance & Configuration Assessments. The report requirements are: Tenable.sc 5.18.0 Nessus 8.14.0 Tenable.sc enables organizations to quickly identify and locate vulnerabilities in their infrastructure.This report displays the most common vulnerabilities sorted by platform type that are commonly exploited by ransomware groups. Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Chapters Executive Summary Chapter – Contains information from the Ransomware Ecosystem Dashboard that uses the CVE and Plugin Family filters to display counts of the vulnerabilities and assets that have been affected by ransomware. Linux Chapter – Contains charts and tables that group together Ransomware Ecosystem related CVEs for all Linux Operating Systems and includes an IP Detail for the hosts identified. Windows Chapter – Contains charts and tables that group together Ransomware Ecosystem related CVEs for all Windows Operating Systems and includes an IP Detail for the hosts identified. Other Chapter – Contains charts and tables that group together Ransomware Ecosystem related CVEs for all "Other" Operating Systems and includes an IP Detail for the hosts identified. Full Article
are Dear Juliet : letters from the lovestruck and lovelorn to Shakespeare's Juliet in Verona. By library.gcpl.lib.oh.us Published On :: Every year, over 10,000 letters addressed to Juliet Capulet arrive in Verona, Italy, the famous hometown of Shakespeare's Romeo & Juliet. These handwritten letters come from people all over the world, seeking guidance and support from Juliet herself. Capturing the pain, joy, humor, and confusion of love, the 60 letters in this book offers encouragement, comfort, hope-and a nod to the human condition. Including responses from Juliet herself, this romantic and relatable, and perfect as a Valentine's Day gift, Dear Juliet proves that love is the universal language. Full Article
are File Transfer Solutions Targeted by CL0P Ransomware Group By www.tenable.com Published On :: Wed, 08 Nov 2023 15:43:19 -0500 The CL0P Ransomware Group, also known as TA505, has exploited zero-day vulnerabilities across a series of file transfer solutions since December 2020. File transfer solutions often contain sensitive information from a variety of organizations. This stolen information is used to extort victims to pay ransom demands. In 2023, CL0P claimed credit for the exploitation of vulnerabilities in both Fortra’s GoAnywhere Managed File Transfer (MFT) and Progress Software’s MOVEit Transfer solutions.Research conducted as part of security audits has revealed additional vulnerabilities. This dashboard contains a list of vulnerabilities known to be exploited by the CL0P ransomware group as well as other vulnerabilities that could be leveraged by CL0P and other threat actors. Operations teams can use this data to identify the assets affected by the associated CVEs targeted by the CL0P ransomware group. The following Nessus plugins identify the affected vulnerabilities: 90190: Progress MOVEit Transfer Installed (Windows)176735: Progress MOVEit Transfer Web Interface Detection176736: Progress MOVEit Transfer FTP Detection176567: Progress MOVEit Transfer177371: Progress MOVEit Transfer Critical Vulnerability (June 15, 2023)The dashboard and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The dashboard can be easily located in the Tenable Security Center Feed under the category Security Industry Trends.The requirements for this dashboard are:Tenable Security Center 6.1.1Tenable Nessus 10.5.2The Security Response Team (SRT) in Tenable Research digs into technical details and tests proof-of-concept attacks, when available, to ensure customers are fully informed of risks. The SRT also provides breakdowns for the latest vulnerabilities in the Tenable blog.Tenable Research has posted the FAQ for MOVEit Transfer Vulnerabilities and CL0P Ransomware Gang blog post to provide the latest information about this threat.ComponentsCL0P Ransomware Group MOVEit – This table displays assets that are vulnerable to recent targeted attacks by the CL0P Ransomware Group (aka TA505) related to Progress Software’s MOVEit Transfer solutions. The component specifically provides results for pluginIDs 90190, 176735, 176736, 176567, 177082, and 177371. These vulnerabilities are associated with a zero-day that is actively being exploited. The table displays the IP address, NetBIOS, DNS, and OS CPE of any identified vulnerable assets, and the Vulnerabilities severity bar.CL0P Ransomware Group Fortra GoAnywhere MFT – This table displays assets that may be vulnerable to recent targeted attacks by the CL0P Ransomware Group (aka TA505) related to Fortra GoAnywhere Managed File Transfer (MFT). The component specifically provides results for pluginIDs 171845, 171558, 171771, and 113896. These vulnerabilities are associated with a zero-day that is actively being exploited. The table displays the IP address, NetBIOS, DNS, OS CPE of any identified vulnerable assets, and the Vulnerabilities severity bar. CL0P Ransomware Group Accellion File Transfer – This table displays assets that may be vulnerable to recent targeted attacks by the CL0P Ransomware Group (aka TA505) for CGI abuses related to Accellion Secure File Transfer. The component specifically provides results for pluginIDs 85007, 146927, and 154933. These vulnerabilities are associated with a zero-day that is actively being exploited by the CL0P Ransomware Group, also known as TA505. The table displays the IP address, NetBIOS, DNS, and OS CPE of any identified vulnerable assets, and the Vulnerabilities severity bars.CL0P Ransomware Group Patched Assets – This table displays vulnerabilities that have been remediated related to recent targeted attacks by the CL0P Ransomware Group (aka TA505). The remediated vulnerabilities displayed are specifically related to the vulnerabilities related to Progress Software’s MOVEit Transfer solutions, Fortra GoAnywhere Managed File Transfer, and Accellion Secure File Transfer. These vulnerabilities are associated with a zero-day that is actively being exploited. The table displays the PluginID, Vulnerability Name, Plugin Family, Severity, and Total of remediated vulnerabilities. Full Article
are We are never meeting in real life : essays / by Samantha Irby. By library.gcpl.lib.oh.us Published On :: Sometimes you just have to laugh, even when life is a dumpster fire. With We Are Never Meeting in Real Life., ?bitches gotta eat? blogger and comedian Samantha Irby turns the serio-comic essay into an art form. Whether talking about how her difficult childhood has led to a problem in making ?adult? budgets, explaining why she should be the new Bachelorette— she's "35-ish, but could easily pass for 60-something"— detailing a disastrous pilgrimage-slash-romantic-vacation to Nashville to scatter her estranged father's ashes, sharing awkward sexual encounters, or dispensing advice on how to navigate friendships with former drinking buddies who are now suburban moms— hang in there for the Costco loot— she’s as deft at poking fun at the ghosts of her past self as she is at capturing powerful emotional truths. Full Article
are Walk to the Trans Awareness Month Keynote (November 13, 2024 6:15pm) By events.umich.edu Published On :: Wed, 06 Nov 2024 15:44:31 -0500 Event Begins: Wednesday, November 13, 2024 6:15pm Location: East Quadrangle Organized By: Michigan Housing Diversity and Inclusion Join the GILE DPE in attending the Spectrum Center's Trans Awareness Month Keynote address. There will be a brief discussion after the event to reflect and share insights. Let’s come together to learn, support, and grow! Full Article Lecture / Discussion
are DCMB / CCMB Weekly Seminar featuring Karen Miga, PhD (UC Santa Cruz Genomics Institute) (November 13, 2024 4:00pm) By events.umich.edu Published On :: Mon, 04 Nov 2024 15:18:54 -0500 Event Begins: Wednesday, November 13, 2024 4:00pm Location: Palmer Commons Organized By: DCMB Seminar Series Abstract: The initial Human Genome Project was a landmark achievement, serving as an essential resource for basic and clinical science, as well as for understanding human history, for over two decades. However, it needs an upgrade due to missing data, inaccurately assembled regions, and its inability to fully represent and identify sequence variants equitably. A single reference map, regardless of its completeness, cannot encapsulate the variation across the human population, leading to biases and ultimately inequity in genomic studies. Recognizing this limitation, the new initiative known as the Human Pangenome Project aims to deliver hundreds of highly accurate and complete genomes. This effort intends to define all bases of each chromosome from telomere to telomere (T2T), ensuring a broader representation of common variants across the human species. Achieving these goals will require the rise of new tools and technology standards for complete genome assemblies and pangenomics, which will have broad and lasting impact on genomic research. Short bio: Throughout her career, she has developed innovative computational and experimental approaches to advance understanding of centromeric and pericentromeric DNAs. She works at the forefront of genome technologies as part of the T2T and Pangenome initiative to construct genetic and epigenetic maps to expand our understanding of their structure and function. As a group leader, she prioritizes fostering a creative and scientifically rigorous environment that supports inclusivity and diversity within our scientific team. She also prioritizes training that operates at the intersection of science, justice, and equity. Full Article Lecture / Discussion
are Learning Seminar in Algebraic Combinatorics: Poincare duality algebras, the Kahler package, and volume polynomials (November 13, 2024 3:00pm) By events.umich.edu Published On :: Sun, 10 Nov 2024 23:52:11 -0500 Event Begins: Wednesday, November 13, 2024 3:00pm Location: East Hall Organized By: Learning Seminar in Algebraic Combinatorics - Department of Mathematics By what has been shown in previous talks, we have seen that we can show coefficients of the characteristic polynomial of a realizable matroid can be realized via specific computations in the Chow ring of its wonderful compactification. In this talk, we will introduce the notion of Poincare duality algebras, which are graded algebras with a degree function giving an isomorphism from the top degree to the base field that induces a non-degenerate pairing between complementary degrees of the algebra. Furthermore, we will introduce a notion of hard Lefschetz and Hodge-Riemann relations for such algebras. When a Poincare duality algebra satisfies a certain version of these properties, we can show that the log-concavity of its "volume polynomial" is equivalent to the eigenvalues of a symmetric form on the algebra arising from the Hodge-Riemann relations. Because the Hodge-Riemann relations in appropriate degree imply the log-concavity of the coefficients of the characteristic polynomial of the matroid, this framework gives us a program to establish the log-concavity result. Throughout this talk, I will attempt to provide intuition from the case of the Chow rings of smooth projective varieties. Full Article Workshop / Seminar
are Early Careers: EY Next Steps: EY Open Science AI & Data Challenge Information Session (November 13, 2024 3:00pm) By events.umich.edu Published On :: Wed, 13 Nov 2024 00:31:33 -0500 Event Begins: Wednesday, November 13, 2024 3:00pm Location: Organized By: University Career Center A sustainable future depends on being able to produce enough nutritious food for the world’s population. Using a combination of data, algorithms, and artificial intelligence we can help develop new toolsto help feed the world. Come learn about the EY Open Science Data Challenge and how you can help solve world hunger. challenge.ey.com. Full Article Careers / Jobs
are Webinar Honoring HHS Veterans: Exploring Career Paths in Science and Medicine at HHS (November 13, 2024 1:00pm) By events.umich.edu Published On :: Wed, 13 Nov 2024 00:31:44 -0500 Event Begins: Wednesday, November 13, 2024 1:00pm Location: Organized By: University Career Center HHS is hosting the virtual event for veterans, “Webinar Honoring HHS Veterans: Exploring Career Paths in Science and Medicine at HHS” on Wednesday, November 13, from 1-3 p.m. ET. Veterans, register for the webinar: Veterans in Action: Careersin Health Science and Medicine at HHSThe webinar will showcaseveterans excelling in diverse career opportunities across HHS in health science and medicine and provide veterans with valuable advice for pursuing similar opportunities. Our veteran panelists from CDC, FDA, and NIH will share insights into their careers and discuss how their military service has shaped their paths.Veterans, join us to discover essential roles in the federal government and to receive valuable advice for pursuingsimilar opportunities. The webinar is open to the public. Full Article Careers / Jobs
are Respiratory Careers: Join Mayo Clinic’s Team in Southwest MN (November 13, 2024 1:00pm) By events.umich.edu Published On :: Wed, 13 Nov 2024 00:32:30 -0500 Event Begins: Wednesday, November 13, 2024 1:00pm Location: Organized By: University Career Center You are invited to an interview with Mayo Clinic's Respiratory Care department on Wednesday, Nov. 13th! Our hiring leaders will be conducting virtual interviews between 11:00 AM - 1:00 PM CST. Consider joining our Respiratory Care department in Southwest MN! We are currently offering a $10,000 sign-on bonus and offer relocation assistance, in addition to ourimpressive benefits package!If you are interested in interviewing, please complete the two steps below and someone from Mayo Clinic Recruitment Team will reach out to you to confirm your appointment: Formally Apply Here Schedule Interview Time Here Want to learn more about this opportunity? Listen to quick video about the Mayo Clinic: Why join the Mayo Clinic respiratory care team Please contact Jenna Kidd at Kidd.Jenna@mayo.edu with any questions. Full Article Careers / Jobs
are Respiratory Careers: Join Mayo Clinic’s Team in Austin, MN (November 13, 2024 1:00pm) By events.umich.edu Published On :: Wed, 13 Nov 2024 00:32:30 -0500 Event Begins: Wednesday, November 13, 2024 1:00pm Location: Organized By: University Career Center You are invited to an interview with Mayo Clinic's Respiratory Care department on Wednesday, Nov. 13th! Our hiring leaders will be conducting virtual interviews between 11:00 AM - 1:00 PM CST. Consider joining our Respiratory Care department in Austin, MN! We are currently offering a $10,000 sign-on bonus and offer relocation assistance, in addition to our impressive benefits package!If you are interested in interviewing,please complete the two steps below and someone from Mayo Clinic Recruitment Team will reach out to you to confirm your appointment: Formally Apply Here Schedule Interview Time Here Want to learn more about this opportunity? Listen to quick video about the Mayo Clinic: Why join the Mayo Clinic respiratory care team Please contact Jenna Kidd at Kidd.Jenna@mayo.edu with any questions. Full Article Careers / Jobs
are Cool career spotlight: a day in the life of an aerospace engineer (November 13, 2024 1:00pm) By events.umich.edu Published On :: Wed, 13 Nov 2024 00:32:34 -0500 Event Begins: Wednesday, November 13, 2024 1:00pm Location: Organized By: University Career Center Interested in gaining a first hand account of a career in aerospace engineering? Join Handshake and Pratt & Whitney Production Test Engineer, Anthony Bartolotta, for answers to questions on topics like: An average day in the life of an aerospace engineer Important hard and soft skills for aspiring engineers to know Tips for launching a career in engineering Sign up for free today! Full Article Careers / Jobs
are U.S. EPA Region 8, 9, and 10 Federal Careers Virtual Workshop (November 13, 2024 10:00am) By events.umich.edu Published On :: Wed, 13 Nov 2024 00:31:21 -0500 Event Begins: Wednesday, November 13, 2024 10:00am Location: Organized By: University Career Center Come learn about Federal Employment at Region 8 (Denver), Region 9 (San Francisco), and Region 10 (Seattle) of the EPA! Entry level, early and mid-career professionals are all welcome to attend.Ourwork at EPA has purpose and impact. From tackling the climate crisis to advancing environmental justice, what happens here changes our world. Our mission is to protect human health and safeguard the environment – the air, water, and land upon which life depends.At EPA,you can make a real difference for the environment and the lives of others.Participants have the opportunity to learn about EPA’s mission, how to navigate USA-Jobs and creating a federal resume. There will be panel discussion to provide a glimpse into variety of careers within the EPA.This event begins at 10:00 AM Mountain Time (11:00 AM Central Time, 12:00 PM Eastern Time, 9:00 AM Pacific Time.)No pre-registration required! Just click on the link a few minutes before the event and you’ll bedirected to the MS Teams site.For more information or to request accommodations, please contact mutter.andrew@epa.gov, verges.michelle@epa.gov, or weber.camille@epa.gov Full Article Careers / Jobs
are New Series ‘Dishes of the Diaspora’ Spotlights African Food and Culture in the Bay Area By ww2.kqed.org Published On :: Fri, 15 Jan 2021 18:45:21 +0000 Senegalese akara, South African bunny chow, Nigerian jollof rice — these are just a few of the flavorful dishes African immigrant chefs regularly share with their Bay Area neighbors. Each dish tells a story of ancestry, migration, and memory, and the tastes and aromas keep chefs and diners connected to home, even when they’re far … Continue reading New Series ‘Dishes of the Diaspora’ Spotlights African Food and Culture in the Bay Area → Full Article
are A Bay Area Creamery Gives Kamala Harris Its Highest Honor: An Ice Cream Flavor By ww2.kqed.org Published On :: Tue, 19 Jan 2021 23:00:08 +0000 The co-founders of Koolfi Creamery say they resonate with Harris’ mixed-Indian heritage and support of gay marriage—including their own. Full Article
are Malawi faces a food crisis: why plans to avert hunger aren’t realistic and what can be done (The Conversation) By www.ifpri.org Published On :: Tue, 04 Jun 2024 12:27:12 EDT The Conversation Africa has published an oped by Joachim De Weerdt and Jan Duchoslav analyzing the food security situation in Malawi, which has been put at severe risk by the drought brought on by the El Niño weather pattern. Full Article
are Global crisis: 1.7 billion people in urban and peri-urban areas face food insecurity By www.ifpri.org Published On :: Tue, 02 Jul 2024 15:49:00 +0000 Global crisis: 1.7 billion people in urban and peri-urban areas face food insecurity New UN report highlights urgent need to strengthen urban and peri-urban food systems for global food security and nutrition. The post Global crisis: 1.7 billion people in urban and peri-urban areas face food insecurity appeared first on IFPRI. Full Article
are At ASHG, Illumina to Share Updates to Sequencing, Proteomics, and Single-Cell Technologies - Genetic Engineering & Biotechnology News By news.google.com Published On :: Sun, 03 Nov 2024 07:00:00 GMT At ASHG, Illumina to Share Updates to Sequencing, Proteomics, and Single-Cell Technologies Genetic Engineering & Biotechnology News Full Article
are Proteomic signatures improve risk prediction for common and rare diseases - Nature.com By news.google.com Published On :: Mon, 22 Jul 2024 07:00:00 GMT Proteomic signatures improve risk prediction for common and rare diseases Nature.com Full Article
are CTA Celebrates 40 Years of Rail Service to O’Hare International Airport By www.transitchicago.com Published On :: Fri, 30 Aug 2024 05:00:00 GMT The Chicago Transit Authority (CTA) is marking 40 years of rail service to O’Hare International Airport by inviting customers to take a ride back in time. Full Article
are New U-Pass Plus with Metra popular with UIC students; Thousands sign up for joint Metra/CTA fare product By www.transitchicago.com Published On :: Thu, 19 Sep 2024 05:00:00 GMT More than 4,100 University of Illinois Chicago students have signed up to receive the new U-Pass + Metra, a pass that gives them unlimited rides on Metra and the CTA for a reduced fare price under a one-year pilot program. Full Article
are CTA Joins Government Agencies and Nonprofit and Private Groups to Host A Second Citywide Career Fair By www.transitchicago.com Published On :: Wed, 02 Oct 2024 12:00:00 GMT Following the success of the first Citywide Career Fair last Spring, where over 60 employers and more than 400 job seekers attended, the Chicago Transit Authority (CTA) is joining local and state government agencies, nonprofits and private sector leaders to host a second joint hiring event next week. Full Article
are Let CTA Be Your Ride As October Fall Festivals Are In Full Swing By www.transitchicago.com Published On :: Fri, 04 Oct 2024 05:00:00 GMT Ride on CTA as you travel to school, work, appointments and other destinations around the city. Customers can save money by purchasing an unlimited rides pass, either the 1-Day ($5) – far more economical and convenient than the price of gas and parking - or the 3-Day ($15) pass – a real budget-saving move. Full Article
are Harlem (O’Hare branch) Station’s West Entrance Temporary Closure (Special Note) By www.transitchicago.com Published On :: (Mon, Feb 19 2024 to TBD) The west entrance to the Harlem (O’Hare branch) Blue Line station on Higgins Avenue and the adjacent Park and Ride lot will temporarily close. Full Article
are Red and Purple Line Trains Share Track between Thorndale and Belmont (Updated) (Service Change) By www.transitchicago.com Published On :: (Sun, May 16 2021 12:01 AM to TBD) Red and Purple line trains share tracks btwn Thorndale and Belmont. Purple Line Express trains continue to make only express stops between Howard and Belmont. Full Article
are Red and Purple Line Trains Share Track between Thorndale and Belmont (Updated) (Service Change) By www.transitchicago.com Published On :: (Sun, May 16 2021 12:01 AM to TBD) Red and Purple line trains share tracks btwn Thorndale and Belmont. Purple Line Express trains continue to make only express stops between Howard and Belmont. Full Article
are You asked for coupons, Delaware, and the truth about goldfish By www.npr.org Published On :: Sat, 15 Oct 2022 00:42:59 +0000 On today's show, we're answering listener questions from the Planet Money inbox. Like, who really benefits from retail coupons? And why are goldfish so cheap?Subscribe to Planet Money+ in Apple Podcasts or at plus.npr.org/planetmoneyLearn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
are How unions are stopped before they start By www.npr.org Published On :: Fri, 20 Oct 2023 23:47:08 +0000 Union membership in the U.S. has been declining for decades. But, in 2022, support for unions among Americans was the highest it's been in decades. This dissonance is due, in part, to the difficulties of one important phase in the life cycle of a union: setting up a union in the first place. One place where that has been particularly clear is at the Volkswagen plant in Chattanooga, Tennessee.Back in 2008, Volkswagen announced that they would be setting up production in the United States after a 20-year absence. They planned to build a new auto manufacturing plant in Chattanooga. Volkswagen has plants all over the world, all of which have some kind of worker representation, and the company said that it wanted that for Chattanooga too. So, the United Auto Workers, the union that traditionally represents auto workers, thought they would be able to successfully unionize this plant. They were wrong.In this episode, we tell the story of the UAW's 10-year fight to unionize the Chattanooga plant. And, what other unions can learn from how badly that fight went for labor. This episode was hosted by Amanda Aronczyk and Nick Fountain. It was produced by Willa Rubin. It was engineered by Josephine Nyounai, fact-checked by Sierra Juarez, and edited by Keith Romer. Alex Goldmark is our executive producer.Help support Planet Money and get bonus episodes by subscribing to Planet Money+ in Apple Podcasts or at plus.npr.org/planetmoney.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
are Why are we so bummed about the economy? By www.npr.org Published On :: Fri, 01 Dec 2023 23:11:04 +0000 Would you say that you and your family are better off or worse off, financially, than you were a year ago? Do you think in 12 months we'll have good times, financially, or bad? Generally speaking, do you think now is a good time or a bad time to buy a house? These are the kinds of questions baked into the Consumer Sentiment Index. And while the economy has been humming along surprisingly well lately, sentiment has stayed surprisingly low.Today on the show: We are really bummed about the economy, despite the fact that unemployment and inflation are down. So, what gives? We talk to a former Fed economist trying to get to the heart of this paradox, and travel to Michigan to check in on the place where they check the vibes of the economy. Help support Planet Money and get bonus episodes by subscribing to Planet Money+ in Apple Podcasts or at plus.npr.org/planetmoney.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
are Why '90s ads are unforgettable By www.npr.org Published On :: Thu, 14 Dec 2023 02:46:07 +0000 Maybe she's born with it, maybe it's __________.The best part of waking up, is _______ in your cup!Got ____?If you can identify these brands based on tagline alone, it's possible you... are a 90s kid.The '90s were arguably the peak moment of advertisers trying to make an impression on us that could last for decades. They got us to sing their jingles and say their slogans. These kinds of ads are called brand or image marketing. And it became a lot harder to pull off in the 21st century. On today's show, we look back at the history of advertising, and two pretty unassuming products that totally transformed ads. This show was hosted by Sarah Gonzalez and Kenny Malone. It was produced by James Sneed, and engineered by James Willets. It was fact checked by Sierra Juarez, and edited by Molly Messick. Alex Goldmark is Planet Money's executive producer.Help support Planet Money and get bonus episodes by subscribing to Planet Money+ in Apple Podcasts or at plus.npr.org/planetmoney.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
are Shopping for parental benefits around the world By www.npr.org Published On :: Fri, 01 Mar 2024 23:53:17 +0000 It is so expensive to have a kid in the United States. The U.S. is one of just a handful of countries worldwide with no federal paid parental leave; it offers functionally no public childcare (and private childcare is wildly expensive); and women can expect their pay to take a hit after becoming a parent. (Incidentally, men's wages tend to rise after becoming fathers.) But outside the U.S., many countries desperately want kids to be born inside their borders. One reason? Many countries are facing a looming problem in their population demographics: they have a ton of aging workers, fewer working-age people paying taxes, and not enough new babies being born to become future workers and taxpayers. And some countries are throwing money at the problem, offering parents generous benefits, even including straight-up cash for kids. So if the U.S. makes it very hard to have kids, but other countries are willing to pay you for having them....maybe you can see the opportunity here. Very economic, and very pregnant, host Mary Childs did. Which is why she went benefits shopping around the world. Between Sweden, Singapore, South Korea, Estonia, and Canada, who will offer her the best deal for her pregnancy?Help support Planet Money and get bonus episodes by subscribing to Planet Money+ in Apple Podcasts or at plus.npr.org/planetmoney.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
are How much of your tax dollars are going to Israel and Ukraine By www.npr.org Published On :: Fri, 29 Mar 2024 17:13:35 +0000 There's been a lot of disagreement in Congress and in the country about whether the U.S. should continue to financially support the wars in Ukraine and Gaza. Some taxpayers don't think the U.S. should give Ukraine any money to fight off Russia's invasion. And some taxpayers have concerns about how they might be funding weapons that have been used to kill civilians in Gaza. And there are questions about how much individual taxpayers contribute to war efforts, generally. So in this episode, we attempt to do the math: The average taxpayers' contribution to Israel and Ukraine. It's not so simple. But in attempting to do this math, we get this window into the role of our tax dollars on foreign assistance, and how the U.S. sells weapons to other countries. For links to some of the reports we looked at to report this episode, check out the episode page on NPR.org.This episode was hosted by Sarah Gonzalez and Alexi Horowitz-Ghazi. It was produced by Sam Yellowhorse Kesler and edited by Jess Jiang. It was fact-checked by Sierra Juarez and engineered by Robert Rodriguez. Alex Goldmark is our executive producer.Help support Planet Money and get bonus episodes by subscribing to Planet Money+ in Apple Podcasts or at plus.npr.org/planetmoney.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
are How unions are stopped before they start (Update) By www.npr.org Published On :: Wed, 24 Apr 2024 22:12:02 +0000 (Note: This episode originally ran in 2023.)Union membership in the U.S. has been declining for decades. But, in 2022, support for unions among Americans was the highest it's been in decades. This dissonance is due, in part, to the difficulties of one important phase in the life cycle of a union: setting up a union in the first place. One place where that has been particularly clear is at the Volkswagen plant in Chattanooga, Tennessee.Back in 2008, Volkswagen announced that they would be setting up production in the United States after a 20-year absence. They planned to build a new auto manufacturing plant in Chattanooga. Volkswagen has plants all over the world, all of which have some kind of worker representation, and the company said that it wanted that for Chattanooga too. So, the United Auto Workers, the union that traditionally represents auto workers, thought they would be able to successfully unionize this plant. They were wrong.In this episode, we tell the story of the UAW's 10-year fight to unionize the Chattanooga plant. And, what other unions can learn from how badly that fight went for labor. This episode was hosted by Amanda Aronczyk and Nick Fountain. It was produced by Willa Rubin. It was engineered by Josephine Nyounai, fact-checked by Sierra Juarez, and edited by Keith Romer. Alex Goldmark is our executive producer.Help support Planet Money and get bonus episodes by subscribing to Planet Money+ in Apple Podcasts or at plus.npr.org/planetmoney.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
are Zombie mortgages are coming back to life By www.npr.org Published On :: Fri, 10 May 2024 22:25:00 +0000 Karen McDonough of Quincy, Mass., was enjoying her tea one morning in the dining room when she saw something odd outside her window: a group of people gathering on her lawn. A man with a clipboard told her that her home no longer belonged to her. It didn't matter that she'd been paying her mortgage for 17 years and was current on it. She was a nurse with a good job and had raised her kids there. But this was a foreclosure sale, and she was going to lose her house. McDonough had fallen victim to what's called a zombie second mortgage. Homeowners think these loans are long dead. But then the loans come back to life because they get bought up, sometimes for pennies on the dollar, by debt collectors that then move to collect and foreclose on people's homes. On today's episode: An NPR investigation reveals the practice to be widespread. Also, what are zombie mortgages? Is all this legal? And is there any way for homeowners to fight the zombies? You can read more about zombie second mortgages online at: npr.org/zombie Correction: An earlier version of this episode description misspelled Karen McDonough's last name as MacDonough.Help support Planet Money and get bonus episodes by subscribing to Planet Money+ in Apple Podcasts or at plus.npr.org/planetmoney.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
are The strange way the world's fastest microchips are made By www.npr.org Published On :: Wed, 13 Nov 2024 08:00:32 +0000 This is the story behind one of the most valuable — and perhaps, most improbable — technologies humanity has ever created. It's a breakthrough called extreme ultraviolet lithography, and it's how the most advanced microchips in the world are made. The kind of chips powering the latest AI models. The kind of chips that the U.S. is desperately trying to keep out of the hands of China.For years, few thought this technology was even possible. It still sounds like science fiction: A laser strong enough to blast holes in a bank vault hits a droplet of molten tin. The droplet explodes into a burst of extreme ultraviolet light. That precious light is funneled onto a wafer of silicon, where it etches circuits as fine as a strand of DNA. Only one company in the world that can make these advanced microchip etching machines: a Dutch firm called ASML.Today on the show, how this breakthrough in advanced chipmaking happened — and how it almost didn't. How the long-shot idea was incubated in U.S. nuclear weapons laboratories and nurtured by U.S. tech giants. And, why a Dutch company now controls it.This episode was hosted by Jeff Guo and Sally Helm. It was produced by Willa Rubin and edited by Jess Jiang. It was fact-checked by Dania Suleman, and engineered by Patrick Murray. Alex Goldmark is Planet Money's executive producer.Help support Planet Money and hear our bonus episodes by subscribing to Planet Money+ in Apple Podcasts or at plus.npr.org/planetmoney.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
are Sense of Place: The Bawdies are faithful craftsmen of the art of rock music By www.npr.org Published On :: Mon, 26 Aug 2024 15:24:54 +0000 The Japanese band's discography is heavily inspired by the American rock of the '60s, but with their own distinctive twist.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
are X aren't interested in reliving old memories on 'Smoke & Fiction' By www.npr.org Published On :: Tue, 12 Nov 2024 18:30:26 +0000 The punk pioneers talk about their ninth and final studio album.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article