Home Blog

Technology Jobs – Albuquerque Public Schools


Search for technology job opportunities at APS, apply online for jobs, and get information about our benefits.

A tech job at APS is a challenging and rewarding opportunity to support our community! Explore the opportunities below and start the process of becoming an APS employee!

Network engineer

The network engineer is responsible for implementing the network design. This role will provide network design, hardware and software support and manage network projects and support the network.

More information

Learn more about the requirements, benefits, and how to apply for the Network Engineer position.

Other Open Technology Positions

Project coordinator: Data Comm

  • Coordinates and manages data communication projects for all departmental and school sites in the district; Provides support and coordination services to the District – LAN Infrastructure and Audio/Visual Distribution Systems

To help you with your job application

Contact Application Processing if you have questions or need technical assistance with your application by phone at (505) 889-4820 or by email at [email protected]

Additional links

Spiders caught in a web of internet lies


Frederique Mazerolle* examines what fake news about spiders can teach us about the global spread of misinformation.

It’s not a secret that the internet and social media fuel the widespread spread of misinformation in many areas of life.

A collective of researchers, including Catherine Scott, a postdoctoral fellow at McGill University’s Lyman Lab, have explored this phenomenon as it applies to spider stories.

The verdict? Don’t blindly trust everything you read online about these eight-legged arthropods – or anything else for that matter – and always consider the source.

“The quality of information on spiders in the world press is rather poor – errors and sensationalism are commonplace,” says Stefano Mammola of the National Research Council, Verbania Pallanza, Italy, and the Finnish Museum of Natural History in the University of Helsinki.

“News about spiders in the press circulates through a highly interconnected global network, and the spread of misinformation is driven by a limited number of key factors, with the sensationalist tone of a story being particularly important.”

Mammola says he was inspired to do the study initially based on general disappointment with the quality of spider-related newspaper articles in Italy.

“Many articles about spiders in the Italian press are full of errors, alarmist, even false information, or a combination of these,” he says.

So he and dozens of colleagues wanted to see if this was a global problem.

Their team collected all the data, representing 41 languages ​​and 81 countries.

During the COVID-19 pandemic, the project also offered a way to explore globally important questions from home when spider fieldwork was not possible.

Their findings appear in the journal Current biology.

“We’ve found that the level of sensationalism and misinformation decreases when the ‘right’ expert – namely a spider expert rather than a doctor or other professional – is consulted by the journalists who write,” says Mammola.

“This result is actually very encouraging, as it suggests that there is a solution to this problem,” says Catherine Scott, postdoctoral fellow at McGill University’s Lyman Lab.

The authors plan to create a global database of arachnologists willing to speak to journalists and they are working on a set of guidelines for journalists covering stories about spiders.

The data they collected also shows the importance of local events and news coverage, as stories from small towns can quickly make international headlines.

“I was particularly surprised by the fact that even very local events – say the story of a farmer bitten by a spider in a remote village in Australia – published by a regional newspaper can quickly be broadcast widely internationally,” explains Mammola.

“This implies that improving the quality of information produced in these local nodes could have a positive effect rippling through the entire information network – a typical example of a ‘think globally, act locally’ management strategy. “.

Misinformation about spiders has many real-world implications.

Some notable cases have led to school closures due to alarmist responses to bogus “widow invasions”, they report.

In another case, a man set his house on fire while blowtorching (harmless) cobwebs from his garden.

The tone and quality of spider ‘news’ shapes people’s perceptions and ideas about them, with implications for them and for spider conservation.

As for next steps, the researchers now want to further explore how poor information about spiders relates to the persistence of arachnophobic feelings in the population.

They also want to better understand how differences in cultural, social and other factors influence differences in how spiders are depicted and talked about in various countries and regions.

* Frederique Mazerolle
Media Relations, McGill University

This article first appeared on mcgill.ca.

Becca Tilley and Hayley Kiyoko relationship timeline


Chinese Chandigarh Small Loan Apps: Police Share Confessional Video of Accused Detailing Scam


The Chandigarh Police Cyber ​​Cell shared a confessional video of one of the main defendants arrested in the China-backed small loan apps case on its Twitter account on Saturday.

In the video shared on Saturday, man Parvej Alam alias Jeetu Bhadana can be seen detailing the modus operandi used by his gang. The shared video also comes with a warning, where the police urge people not to get tricked into such scams. The video was uploaded to the official Twitter account @ChdCyberCell Cyber ​​Swachhta Mission Chandigarh Police.

A 32-year-old Chinese national, Wan Chenghua, along with 20 others, including Jeetu Bhadana, were previously arrested by the Chandigarh police cyber cell earlier this month after a series of raids across the country for allegedly cheating and extorted money. people after tricking them through petty lending apps. So far, the police, during their investigations, also estimated that the gang had funneled around 100 crore rupees from China through hawala transactions.

Chenghua was arrested in Greater Noida. A resident of Wuhan in China, police say he traveled to India in 2019 on a work visa, which he obtained on the basis of being a chef. Chenghua’s visa had expired in 2021, but he continued to live illegally in India.

In the video recording uploaded on Saturday, Parvej Alam can be heard saying: “People were tricked into downloading instant loan mobile apps through Google Playstore and Facebook. As soon as they downloaded the app and provided their mobile numbers, we searched for pictures of their Aadhaar cards, PAN cards and bank account number. These details would be filled in an online performa. Mobile loan apps cannot be used until a person gives us consent to access their contacts, pictures, etc. Then we transferred the desired loan amount to the (applicants) account for a week. After a week, we started demanding large sums of money in lieu of loan repayment. Sometimes we even made threatening calls.

Sources said the video message of Jeetu Bhadana, a native of Ranchi in Jharkhand, was recorded at the cyber cell police station before he was taken into custody.

A police officer said: ‘The accused’s video recording has been uploaded to inform people of instant short term loan applications available on the internet and how they work. These apps are unregulated.”

Meanwhile, the police, in the course of their investigations, arrested four other people – including lawyer Sunil Chauhan – who they believe were involved in the case. They were arrested from NCR and Rajasthan. According to the police, one of the accused of the four arrested has been taken into custody. The other three – Sunil Chauhan, Sashi Kant and Ashok Kumar – are in custody.

Multilingual, laughing, tricky and streetwise AI • TechCrunch


The research in the area of ​​machine learning and AI, now a key technology in virtually every industry and business, is far too voluminous for anyone to read it all. This column, Perceptron, aims to bring together some of the most relevant recent discoveries and papers – particularly, but not limited to, artificial intelligence – and explain why they matter.

Over the past few weeks, Google researchers have demonstrated an AI system, PaLI, that can perform numerous tasks in more than 100 languages. Elsewhere, a Berlin-based group has started a project called Source+ which is designed as a way to empower artists, including visual artists, musicians and writers, to opt in – and opt out – of allowing their work to be used as training data for the AI.

AI systems like OpenAI’s GPT-3 can generate quite sensible text or summarize existing text from the web, e-books, and other information sources. But they are historically limited to a single language, which limits both their usefulness and their reach.

Fortunately, in recent months, research into multilingual systems has accelerated, thanks in part to community efforts like Hugging Face’s Bloom. To take advantage of these advances in multilingualism, a Google team created PaLI, which was trained on both images and text to perform tasks such as image captioning, objects and optical character recognition.

Picture credits: Google

Google claims that PaLI can understand 109 languages ​​and the relationships between words in those languages ​​and images, allowing it, for example, to caption a postcard image in French. While the work remains firmly in the research phases, the creators say it illustrates the important interplay between language and imagery – and could establish a foundation for a commercial product down the line.

Speech is another aspect of language in which AI is constantly improving. Play.ht recently introduced a new text-to-speech model that puts a remarkable amount of emotion and range into its results. The clips he released last week look fantastic, although of course they are carefully selected.

We generated our own clip using the intro from this article, and the results are still solid:

It’s still unclear exactly what this type of voice generation will be most useful for. We’re not quite at the stage where they’re doing whole books — or rather, they can, but it might not be anyone’s first choice yet. But as the quality increases, the demands multiply.

Mat Dryhurst and Holly Herndon – academic and musician respectively – have teamed up with the Spawning organization to launch Source+, a standard he hopes will draw attention to the issue of photo-generating AI systems created from works by artists who were uninformed or asked permission. Source+, which costs nothing, aims to allow artists to opt out of the use of their work for AI training purposes if they so choose.

Image generation systems such as Stable Diffusion and DALL-E 2 have been trained on billions of images pulled from the web to “learn” how to translate text prompts into art. Some of this imagery came from public art communities like ArtStation and DeviantArt – not necessarily with artist knowledge – and imbued systems with the ability to emulate particular creators, including artists like Greg Rutowski.

Stability AI Stable Broadcast

Stable broadcast samples.

Due to the systems’ knack for mimicking art styles, some creators fear they could threaten their livelihoods. According to Dryhurst and Herndon, Source+ — while voluntary — could be a step towards giving artists greater influence over how their art is used — assuming it’s widely adopted (a big if).

At DeepMind, a research team is trying to solve another long-standing problematic aspect of AI: its tendency to spit out toxic and misleading information. Focusing on text, the team developed a chatbot called Sparrow that can answer common questions by searching the web using Google. Other leading systems like Google’s LaMDA can do the same, but DeepMind says Sparrow provides plausible, non-toxic answers to questions more often than its counterparts.

The trick was to align the system with people’s expectations of it. DeepMind recruited people to use Sparrow, then asked them to provide feedback to train a model about the usefulness of the answers, showing participants multiple answers to the same question and asking them which answer appealed to them the most. The researchers also set out rules for Sparrow such as “don’t make threatening statements” and “don’t make hateful or insulting comments,” which they asked participants to impose on the system by trying to trick it into doing so. he breaks the rules.

Example of a sparrow from DeepMind having a conversation.

DeepMind recognizes that Sparrow can still improve. But in one study, the team found that the chatbot provided a “plausible” answer backed by evidence 78% of the time when asked a factual question and only broke the aforementioned rules 8% of the time. This is better than DeepMind’s original dialogue system, the researchers note, which broke the rules about three times more often when tricked.

A separate DeepMind team recently tackled a very different area: video games, which historically have been difficult for AI to master quickly. Their system, brazenly called MEME, is said to have achieved “human level” performance on 57 different Atari games 200 times faster than the previous best system.

According to DeepMind’s article detailing MEME, the system can learn to play games by observing around 390 million frames – “frames” referring to still images that refresh very quickly to give the impression of motion. It may seem like a lot, but the previous spike technique required 80 billion images on the same number of Atari games.

Deep Mind MEME

Picture credits: DeepMind

Skillfully playing Atari may not seem like a desirable skill. And indeed, some critics argue that the games are a flawed benchmark for AI due to their abstractness and relative simplicity. But research labs like DeepMind think the approaches could be applied to other more useful areas in the future, like robots that learn to perform tasks more efficiently by watching videos or self-improving, self-driving cars.

Nvidia had a field day on the 20th announcing dozens of products and services, including several interesting AI efforts. Self-driving cars are one of the company’s focus areas, both for powering AI and for training it. For the latter, the simulators are crucial and it is also important that the virtual roads look like the real roads. They describe a new and improved content stream that accelerates the bringing of data collected by cameras and sensors on real cars into the digital realm.

A simulation environment based on real world data.

Elements such as real-world vehicles and irregularities in the road or tree canopy can be accurately replicated, so the autonomous AI doesn’t learn in a sanitized version of the street. And this allows for larger and more variable simulation parameters in general, which contributes to robustness. (Another image of this is at the top.)

Nvidia also showed off its IGX system for standalone platforms in industrial situations – human-machine collaboration like you might find in a factory. Sure, there’s no shortage of them, but as the complexity of tasks and operating environments grows, the old ways are no longer good enough and companies looking to improve their automation are looking to the future.

Example of computer vision classifying objects and people in a factory.

“Proactive” and “predictive” safety is what IGX is supposed to help with, ie detecting safety issues before they cause failures or injuries. A bot may have its own emergency stop mechanism, but if a camera monitoring the area could tell it to turn away before a forklift gets in its way, everything goes a little smoother. Exactly which company or software accomplishes this (and on what hardware, and how it’s all paid for) is still a work in progress, with companies like Nvidia and startups like Veo Robotics figuring their way through.

Another interesting step forward has been taken in Nvidia’s gaming arena. The company’s latest and greatest GPUs are designed not just to push triangles and shaders, but to quickly accomplish AI-powered tasks, like its own DLSS technology for augmenting and adding frames.

The problem they are trying to solve is that game engines are so demanding that generating over 120 frames per second (to keep up with the latest monitors) while maintaining visual fidelity is a Herculean task that even powerful GPUs can barely TO DO. But DLSS is kind of like a smart image mixer that can upscale the source image without aliases or artifacts, so the game doesn’t have to push as many pixels.

In DLSS 3, Nvidia claims it can render entire additional frames at a 1:1 ratio, so you could render 60 frames naturally and the other 60 via AI. I can think of several reasons that could make things look weird in a high performance gaming environment, but Nvidia is probably well aware of them. Either way, you’ll have to pay around a grand for the privilege of using the new system, as it will only run on RTX 40-series cards. But if graphical fidelity is your top priority, do it.

Illustration of drones built in a remote area.

The latest today is a drone-based 3D printing technique from Imperial College London that could be used for autonomous building processes in the distant future. Right now it’s definitely not practical for creating something bigger than a trash can, but it’s still early days. Eventually, they hope it will be more like the above, and it looks cool, but watch the video below to clarify your expectations.

Australian Federal Police monitor dark web amid allegations of Optus data theft likely to be sold online


Australian Federal Police are monitoring the dark web and internet forums after reports that stolen Optus data could be sold online.

A post on the BreachForums website claims to sell the data, which includes email addresses, dates of birth, first and last names, phone numbers, driver’s license and passport numbers.

The dataset referred to has not been confirmed or verified by Optus, police or intelligence agencies, but some figures have been verified by journalists.

“AFP is aware of reports alleging stolen Optus customer data and credentials could be sold via a number of forums, including the dark web,” a police spokesperson told AFP. the ABC.

“AFP uses specialized capabilities to monitor the dark web and other technologies and will not hesitate to take action against those who break the law.”

Cybersecurity firm Internet2.0 co-founder Robert Potter, who has advised the US and Australian governments on cyberattacks, said the data was authentic.

“I’m comfortable saying the data is authentic information and some of it includes email addresses never before seen in other breaches,” Potter told the ABC. .

“Some of the data is still encrypted. Optus should confirm if it comes from their systems.”

Buying stolen credentials online is a criminal offense punishable by up to 10 years in prison.

At a press conference on Friday, Optus chief executive Kelly Bayer Rosmarin said the company was aware of reports that Optus data had been sold online.

“One of the challenges when you make this kind of information public is that many people can claim a lot of things,” Bayer Rosmarin said.

“To our knowledge, there is nothing validated and marketable, but the teams are studying all the possibilities.”

On Saturday, Optus was unwilling to comment on the post citing police advice.

“We are coordinating with AFP as this is now a criminal investigation,” the spokesperson said.

“Given the investigation, Optus will not comment on the legitimacy of customer data allegedly held by third parties and urges all customers to exercise caution in their online dealings and transactions.

“Again, we apologize.”

Space to play or pause, M to mute, left and right arrows to search, up and down arrows for volume.

Optus contacts its customers following a data breach

Optus continues to contact customers involved in the attack

Some cyber experts urge caution over reports of data being sold online, warning it could be an attempt to capitalize on media attention.

Optus continues to contact all customers involved in the cyberattack.

“We will start with customers whose ID number may have been compromised, all of whom will be notified by today,” the spokesperson said.

Optus also advised customers to be extra vigilant online and beware of scams.

“If customers receive an email or text message with a link claiming to be from Optus, they are advised that this is not a communication from Optus. Please do not click on any links,” said the spokesperson.

“We have been informed that our announcement of the attack is likely to trigger a number of criminal claims and scams.”

Web 3.0, NFT and metaverse: digitally transforming industries


Technological advances are changing the overall functioning of end-user industries. Sudip Saha, COO at Future Market Insights, examines the evolution of the latest technologies such as NFTs, Metaverse and Web 3.0, how they are fueling digital transformation and how organizations can prepare to reshape their industries.

The integration of various features of technology, such as artificial intelligence, machine learning, augmented reality, virtual reality and the Internet of Things, is an evolving nature of work and an accelerated workflow . This, in turn, increases the rate of productivity and provides promising results to end user industries. Moreover, the use of technology is not only related to large enterprises, but has also spread to small and medium industries, thus transforming the workflow of business models.

The exchange of information on the Internet is the main driver for the increasing use of advanced technological capabilities. The latest entrant in the technology arena is Web 3.0, non-fungible tokens and the metaverse. These technological components have the potential to replace, redesign and deliver effective work in a technology driven world. With the use of these technological features, companies are constantly trying to take the plunge to reach more consumers.

The emergence of the metaverse and the development of web 3.0 are making the virtual world a reality. Metaverse will not only help people interact with each other, but also help them advertise, make new connections and expand business opportunities using a virtual avatar. Additionally, the integration of NFTs to sell digital art has opened doors of innovation and opportunity for end-user industries in the digital world. Let’s see how advanced technologies such as Web 3.0. NFTs and the metaverse are reshaping end-user industries.

Web 3.0: Ensuring Smooth Workflow Operations

Web 3.0, the third generation of Internet access provider (WWW), offers intelligent, associated and open sites. It makes the existing interface of websites more user-friendly. Growing adoption of blockchain technology, Internet of Things with the tendency of people to invest in cryptocurrency and NFTs are increasing the reliance on Web 3.0

For example, business sectors are ready to leverage 3.0 to rethink their existing work models. With the integration of Web 3.0, companies are redesigning user interfaces to achieve better results. Future Market Insights indicates that the enterprise web security market is expected to recording a CAGR of 7% by accumulating a market value of US$7.6 billion by the end of 2032. Another major factor propelling the adoption of Web 3.0 is the security it offers. Thus, with the integration of web 3.0, users can not only exchange information without the risk of cyber-attacks but also make workflows robust.

With the integration of Web 3.0, users can access the services provided by the metaverse without any special permissions. This makes the metaverse more accessible through Web 3.0. Not only does web 3.0 ensure the confidentiality of information, but it also stores and secures information without the intervention of a third party due to its decentralized nature. Web 3.0 and Metaverse complement each other perfectly due to the distinct features it offers. While users can create virtual avatars in the metaverse, they can sell, interact, and buy goods through NFTs.

Learn more: 3 predictions for non-fungible tokens (NFTs) and the metaverse for 2022

NFT in the Metaverse

NFTs are the latest attraction for consumers and have the potential to last longer as they are an integral part of the digital world. Through the use of NFTs, consumers can buy and sell products using cryptocurrency and trade valuable assets at desired prices. Metaverse not only provides the much-needed digital shift that businesses need, but also helps people understand the capacity of the virtual world. As each NFT is 100% unique, the chances of trading a particular work of art (image, video or GIF) should multiply in the digital world.

Metaverse not only helps people feel, learn and experience without being present in the practical world, but also has become the virtual marketplace for NFT trading. Major competitors in the consumer products market maximize the use of the metaverse by advertising their products in the same. Future Market Insight indicates that the mainstream metaverse market is expected to have a Stunning double-digit CAGR of 24.5% on reaching a market value of US$500 billion end of 2032.

The booming e-commerce market has now reached new heights as the metaverse offers a virtual shopping experience that feels almost real. For example, Nike, the sportswear company, created Nikeland on the Roblox platform which helps users socialize, engage, and participate in company promotions. This, in turn, makes consumers more connected to the brand and gives them a first-hand experience of new launches of different products. Another consumer goods company, Forever 21, has taken it a step further by allowing users to create their own Forever 21 stores in the metaverse. Using this, users can create online retail stores, design the interior as per their vision and hire virtual employees for the same. Thus, users gain the experience of learning business, shopping, and interacting with other users to understand the requirements of a business.

Changing the dynamics of the digital world

Now that we know the multifunctionality of web 3.0, NFTs and the metaverse, here is how these components can revolutionize the way businesses operate.

Internet 3.0: The development of web 3.0 has created a secure space for the exchange of information for various business entities. Thus, most end users are transforming their existing business models and redefining them to meet the needs of Web 3.0. The growing adoption of Web 3.0 is increasing the presence of the metaverse and enabling the secure commerce of NFTs.

Metaverse: The penetration of the virtual world has created countless opportunities for business growth in the metaverse. Businesses are now looking for opportunities that will help them connect with consumers on a personal level. Thus, the opportunity for business expansion has shifted from exchanging products to creating virtual retail stores.

NFT: NFTs are widely used to monetize skills and can be used to buy and sell assets such as art, fashion, memes or music. NFT creates a safe space for careers or unconventional work spectra that are not marketed to the mainstream world. Thus, NFTs provide a way for people to invest in things they love and want to own. With the use of the metaverse, buying and selling NFTs has become easier.

Digital first

The rapid evolution they can undergo is the advantage of Web 3.0, the metaverse and nascent stage NFTs. Thus, the developers of these components are open to constant technological changes and customize them to provide unique experiences to users. Moreover, the fusion of these components promises to provide a virtually rich experience to users.

In the future, the use of these components will not be specifically limited to personal use only. Major consumer goods companies, edtech industries, food and retail industries, and IT industries plan to connect, interact, and grow using the metaverse and NFTs. The growing use of the metaverse has the potential to create opportunities for unconventional career choices, making it an economically sound platform for users.

In the coming years, the integration of Web 3.0 will become more important. This, in turn, will increase the reliance on the same. As Web 3.0 strengthens the presence of the Metaverse and the Metaverse supports the use of NFTs, the interdependence of these components promises to provide a rich experience for users around the world.

How do you offer users a richer experience thanks to new immersive technologies? Share with us on Facebook, Twitterand LinkedIn.


Apex Hosts “Simplified Flexo with ECG” at FlexoKITE Center

The FlexoKITE Technology Center, located at Apex International’s manufacturing facility in Nashik, India, held an open day on August 26 with the theme “Simplified Flexo with ECG”. It was a closed event with tag clients across India, especially from the western region of the country. The center is operated by Apex International with its partners Avery Dennison, Bobst, Cosmo Film, Dupont, Esko, Flint, Numex, Swedcut and Tesa bringing together several industry innovation providers under one roof.

Speaking at the event, Nick Harvey, Technical Director of Apex International, said, “FlexoKITE enables access to the highest level of technical knowledge within each of the partners. This combined solution offers faster solutions, accelerated R&D and unparalleled support. In this talk, Harvey highlighted the benefits of extended color gamut (ECG) to simplify the flexo process as well as the historical limitations and failures of ECG in the past. For example, ink transfer and densities do not remain constant, anilox specifications do not always meet expectations, and CMYK variability from anilox to another and press to press .

“The benefits of ECG are significant with less ink revenue, no anilox changes and faster changeover, it doubles efficiency by 40% to 80%,” Harvey said. “If done correctly, ECG will result in higher resolution printing with high quality and up to 50% increase in production time, 30% less ink cost, 90% less washing solvent cost, less tape and less anilox, moving towards a greener and more sustainable solution Harvey adds, “The successful path to ECG must be step by step, job by job .

The open house included a tour of the anilox manufacturing facility at Apex showcasing the design workflow by Esko, prepress platemaking by DuPont and a sample produced on the Bobst M5 press. The goal of these designs was to demonstrate how quickly tasks can be changed and configured when ECG is adopted. During the event, FlexoKITE managed to set up and print at production speed 3 designs on 2 substrates in a record time of 21 minutes 32 seconds. This impressive timeline has proven the real potential financial benefits of the ECG process. The path to a successful ECG can be a gradual, job-by-job process to perfectly fit your own business’s capabilities and needs. The FlexoKITE team is ready to help converters looking to make the leap to ECG.

FlexoKITE is a fully equipped flexo facility that has been designed and set up to provide a base of support for the flexo industry in Asia. By assisting with R&D testing and finalizing designs, printers can convert gravure or letterpress designs to flexo without impacting their own production environment or time. There is also the collective expertise within the partners to assess and solve printing problems and offer proven solutions to converters. It’s a playground for the flexo industry, with Esko’s advanced screening software, DuPont’s fast Cyrel thermal plate processor and Bobst’s M5 narrow web flexo press which is integrated with Apex GTT anilox rolls. highly consistent inks and a Flint UV Force ink system.

2 arrested for tricking people into offering loans on behalf of Rajasthani royal families


Two detained for fraud on behalf of fake loan from Rajasthani royal families | YOF

The Criminal Branch of the Mumbai Police arrested two people on Wednesday for allegedly defrauding people by claiming to provide instant business loans to royal families in Rajasthan. The police suspect other people of being involved in this racket.

The case surfaced after the 44-year-old complainant approached Kandivali Police about being duped by strangers in the name of providing loans.

According to Crime Branch XI, the arrested duo carried out their illegal activities between March 2021 and March 2022, across the city. Acting on the tip received by the police, they began to trace the whereabouts of the alleged suspects which led to the arrest.

The two are identified as Shyam Arjandas Talreja, 38, and Hitesh Narayandas Pursanani, 36, residing in Ulhasnagar and Ambernath respectively.

Explaining the incident, an officer said: ‘They targeted people who were having trouble getting loans from banks and approached them saying they would provide easy, instant loans with lower interest rates. students. This strategy was used to attract people. He continued, “They claimed to have contact with the royal families of Rajasthan, who are super rich and ready to lend money to the needy.”

Once they induce the customer to provide the loan, they then start collecting money from them in the name of mandatory fees, loan insurance and mortgage for stamp duty and d ‘registration. “Through these methods, they scam money from people and once they receive the money, they disappear,” the official said.

Sources say one of the fugitives, identified as Deepak Sauda, ​​is allegedly disguising himself as a bank clerk, civil servant or Raja Maharaja of Rajasthan in order to prove his authenticity.

“There are two other prime suspects in the case who are at large and we have added them to the wanted list. There is a possibility that more people are involved in this racket,” the official added.

Police have registered a case against the two under relevant Sections including 420 (deceit and dishonest incitement to delivery of goods) and 120b (punishment of criminal conspiracy) of the Indian Penal Code. For now, the duo has been taken into custody until September 28.

(To receive our electronic document daily on WhatsApp, please click here. To receive it on Telegram, please click here. We allow sharing of the PDF of the document on WhatsApp and other social media platforms.)

Medical School Joins Major NIH Brain Mapping Effort – Washington University School of Medicine in St. Louis

Visit the news center

Will help to understand how the brain works in healthy and sick

Getty Images

Scientists from Washington University School of Medicine in St. Louis are joining a nationwide network to map the intricacies of the brain, aiming to deepen understanding of brain function and generate new insights into brain function in healthy people – and how it malfunctions in Alzheimer’s disease, schizophrenia, autism and many other conditions.

The new network, called the BRAIN Initiative Cell Atlas Network (BICAN), is supported by the National Institutes of Health (NIH). The effort focuses on mapping the human brain, but also extends to the brains of non-human primates and mice, so researchers can see similarities and differences between species and better understand molecular and cellular mechanisms under underlying brain function.

The grants to the University of Washington will fund portions of two separate projects. One is led by the Allen Institute for Brain Science in Seattle, Washington, and establishes a global collaboration to map the 200 billion human brain cells by type and function. At the University of Washington, David C. Van Essen, PhD, former endowed professor of neuroscience and Matthew F. Glasser, MD, PhD, radiology instructor at the university’s Mallinckrodt Institute of Radiology, will create and analyze maps brains of individual people and non-human primates to determine the types of cells that make up each area of ​​the brain using data collected from people and animals scanned at collaborating sites.

The second project, led by the Salk Institute for Biological Studies in La Jolla, California, aims to describe brain cells in unprecedented molecular detail, classify these cells into more precise subtypes, identify their location in the brain and to follow how the aging process can influence these characteristics. Ting Wang, PhD, of the University of Washington, Sanford C. and Karen P. Loewentheil Professor Emeritus of Medicine, will manage and analyze the project’s massive genomic datasets with collaborators from the University of California, San Diego and the University of California at Irvine.

Individualized brain maps

Van Essen and Glasser’s work for BICAN builds on the Human Connectome Project, a large-scale project led by Van Essen to map the connections within the human brain. Using methods developed for the Human Connectome Project and data from 210 people, Glasser and Van Essen identified 180 areas in each half of the cerebral cortex, which is the dominant structure of the human brain and is largely responsible for the functions that make of us unique humans. . They also developed machine learning methods to automatically map these areas in individuals using MRI data.

“The BICAN grant will add to this brain map an enormous amount of information about which genes are active and where they are active, and how they are coordinated and integrated,” Van Essen said. “It will essentially give us a much richer characterization of what distinguishes one area or part of the brain from another. Having this information for people without brain diseases will provide a basis for studying brain disorders such as autism and schizophrenia that we know have a genetic component, but we don’t understand how genes contribute to the disorder.

As part of the new study, Van Essen and Glasser will analyze data from people who voluntarily donate their brains to research. As soon as possible after death, brains will be scanned by MRI and gene expression in brain cells will be measured. In a few cases, researchers will also have data from functional brain scans taken while the study volunteer was alive.

“The excitement around this project is reminiscent of when we started with the Human Connectome projects over 10 years ago,” Glasser said. “Now we are taking the next step by integrating cellular and systemic neuroscience. We will combine genetic mapping at the cellular level with functional mapping, for example, of the linguistic system and the visual system, to generate rich data that could advance research on all kinds of brain disorders.

Brain Atlas Computing

Wang is an expert on the epigenome, or the instructions that govern how genes are turned on or off in a given cell. He is part of a project to analyze the epigenetics of 1,500 brain samples from people of various ages, and Wang is responsible for managing the huge genomic datasets and developing new computational methods to analyze that data. .

“The scale of data production is going to be light years beyond anything we’ve done in the past,” Wang said. “So far, we have processed hundreds of thousands of datasets. We are now talking about millions. We will also use our experience in analyzing the epigenomes of other cell types, including cancer cells, for example, to build a detailed, comprehensive, high-resolution map of the human brain and what it does at the single cell level. ”

Wang and his colleagues have developed what is called the WashU Epigenome Browser, an online tool that allows researchers to search for information and data characterizing the epigenomes of many species, such as fruit flies, mice and various primates. , including humans. The browser also includes some single-celled organisms as well as the genomes and epigenomes of viruses, including Ebola and SARS-CoV-2.

“We plan to develop many technical innovations in web technology, browser development, as well as machine learning-based analytics tools, to make it easier to engage with this data for researchers who want to use it” , Wang said. .

About Washington University School of Medicine

WashU Medicine is a world leader in academic medicine, including biomedical research, patient care, and educational programs with 2,700 faculty. Its National Institutes of Health (NIH) research funding portfolio is the fourth largest among U.S. medical schools, has grown 54% over the past five years, and with institutional investment, WashU Medicine is spending more a billion dollars a year for basic and clinical research. innovation and training. Its faculty practice is consistently ranked among the top five in the nation, with more than 1,790 faculty physicians practicing at more than 60 sites who also serve on the medical staff of BJC HealthCare’s Barnes-Jewish and St. Louis Children’s Hospitals. WashU Medicine has a rich history of MD/PhD training, recently dedicated $100 million in scholarships and curriculum renewal for its medical students, and is home to top-notch training programs in every medical subspecialty as well as physiotherapy, occupational therapy, and audiology and communication sciences.

Smithsonian American Art Museum Releases 10 Comics Online Featuring Pioneering Women Artists


The Smithsonian American Art Museum has released a second set of 10 short comics online, each celebrating a female artist with works represented in the museum’s permanent collection. The trailblazing artists, featured in the 2022 “Drawn to Art: Ten Tales of Inspiring Women Artists” set, are Judy Baca, Tiffany Chung, Sonya Clark, Sarah Goodridge, Ester Hernandez, Loïs Mailou Jones, Nellie Mae Rowe, Augusta Savage, Jaune Quick-To-See Smith (Confederate Salish and Kootenai Nation) and Kay WalkingStick (Cherokee Nation).

Inspired by graphic novels and webcomics, these short films about the lives of artists were drawn by 10 student illustrators from Ringling College of Art and Design. Participating illustrators are Stephanie Bravo, Rebe Chen, Micah Eubanks, Elisia Fernandez, Aleyah Lyon, Susie O’Connor, Abigail Rajunov, Oliver Stephenson, Maddy Williams-Solberg and Madi Wong.

One of the goals of the project is to provide school-aged readers and art lovers of all ages with a beautifully illustrated, age-appropriate opportunity to identify with the struggles and triumphs of artists, to see themselves reflected and draw strength from it. visibility. “Drawn to Art” supports the museum’s commitment to educational opportunity by providing valuable professional experience for Ringling student artists who learn to work collaboratively, meet deadlines, and meet formatting and accessibility requirements.

“I’m thrilled to see this second series of SAAM’s ‘Drawn to Art’ comics come to life,” said Stephanie Stebich, Margaret and Terry Stent Director of the Smithsonian American Art Museum. “This innovative project provides another opportunity for young people, or anyone interested in artists and their stories, to experience the museum’s rich collection and experience the power of art.”

The first digital series debuted in 2021. It featured the stories of Berenice Abbott, Anni Albers, Romaine Brooks, Maria Oakey Dewing, Carmen Herrera, Corita Kent, Edmonia Lewis, Kay Sekimachi, Alma Thomas and Mickalene Thomas. All 20 comics can be viewed on the museum’s website.

“Drawn to Art” is a collaboration with Ringling College’s INDEX (Industry Experience) program. INDEX is an experiential education initiative that provides students with pre-graduation work experience by connecting them with leading brands and customers to develop creative solutions to business challenges. The 10 winning students were chosen from among 39 illustration students who participated in the INDEX contest.

“The partnership between Ringling College and the Smithsonian American Art Museum exemplifies why we launched INDEX – to embed experiential learning into scholars and student life as one of the three pillars of academic and future success” , said Jeff Schwartz, associate vice president for academic studies. Business and Dean of Undergraduate Studies at Ringling College of Art and Design. “The SAAM staff provided an experience far beyond simple mentorship by teaching our students to build a compelling story around each of these historically significant artists. The opportunity to work with the Smithsonian American Art Museum to delve into the lives of other underrepresented artists and bring their stories to life is a premier portfolio and career development experience.

About the Smithsonian American Art Museum

The Smithsonian American Art Museum houses one of the largest and most inclusive collections of American art in the world. The main museum building, located on Eighth Street and G NW, is open daily from 11:30 a.m. to 7 p.m. The museum’s Renwick Gallery, a museum dedicated to contemporary crafts and decorative arts, is located on Pennsylvania Avenue at 17th Street NW and is open daily from 10 a.m. to 5:30 p.m. Check online for hours opening hours and admission information. Free entry. Follow the museum on Facebook, Instagram, Twitter and YouTube. Museum information (recorded): (202) 633-7970. Website: americanart.si.edu.

About Ringling College of Art and Design

Since 1931, Ringling College of Art and Design has cultivated the creative spirit in students around the world. The private, non-profit, fully accredited college offers the Bachelor of Fine Arts in 11 disciplines and the Bachelor of Arts in two. The college’s rigorous curriculum uses the studio teaching model and immediately engages students in a comprehensive curriculum that is both major-specific and liberal arts-focused. Ringling College’s teaching model ultimately molds students into highly employable, globally aware artists and designers. For more information, visit ringling.edu and follow the college on Facebook, Instagram, TwitterLinkedIn and YouTube.

# # #


UK’s Ofcom probes Amazon, Microsoft and Google over cloud dominance


The probe will focus on so-called “hyperscalers” like Amazon Web Services and Microsoft Azure, which allow companies to access computing power and data storage from remote servers.

Chesnot | Getty Images

UK media regulator Ofcom is investigating Amazon, Microsoft and Google’s tight grip on the cloud computing industry.

In the coming weeks, the watchdog will launch a study to examine the position of companies offering public cloud infrastructure and determine whether they pose barriers to competition.

Its probe, announced Thursday, will focus on so-called “hyperscalers” like Amazon Web Services, Microsoft Azure and Google Cloud, which allow companies to access computing power and data storage from remote servers, rather than hosting it on their own private infrastructure.

Further action could be taken by the regulator if it finds that companies are harming competition. Selina Chadha, Ofcom’s director of connectivity, said the regulator had yet to determine whether the cloud giants were engaging in anti-competitive behavior. Ofcom said it would conclude its review and issue a final report including all concerns and proposed recommendations within 12 months.

Amazon, Microsoft and Google were not immediately available for comment when contacted by CNBC.

The review will be part of a wider digital strategy pushed by Ofcom, which regulates the broadcasting and telecommunications industries in the UK

Learn more about technology and crypto from CNBC Pro

It also plans to investigate other digital markets, including personal messaging and virtual assistants like Amazon’s Alexa, over the next year. Ofcom has expressed interest in the impact of services such as Meta’s WhatsApp, Apple’s Facetime and Zoom on traditional calling and messaging, as well as the competitive landscape of digital assistants, connected TVs and headphones. smart speakers.

“The way we live, work, play and do business has been transformed by digital services,” Ofcom’s Chadha said in a statement on Thursday. “But as the number of platforms, devices, and networks that deliver content continues to grow, so do the technological and economic issues facing regulators.”

“That’s why we’re launching a program of work to review these digital marketplaces, identify any competition issues and make sure they work well for the people and businesses that depend on them,” she added.

Ofcom has been handpicked to enforce tough new rules on harmful content on the internet. But the legislation, known as the Online Safety Bill, is unlikely to come into force soon after Liz Truss replaces Boris Johnson as prime minister. As Truss’ government grapples with a plethora of issues in the UK – including the cost of living crisis – online safety regulation is expected to drop to the bottom of the priority list. government policies.

The move adds to efforts by other regulators to rein in big tech companies over the perceived stranglehold they have on various parts of the digital economy.

The Competition and Markets Authority has several active investigations into Big Tech companies and wants additional powers to ensure a level playing field in digital markets. The European Commission, meanwhile, has fined Google billions of dollars over alleged antitrust breaches, is investigating Apple and Amazon in separate cases, and passed landmark digital laws that could reshape the business models of the giants. the Internet.

cloud competition

Amazon holds a comfortable lead in the cloud infrastructure services market, with its Amazon Web Services division making billions of dollars in profits each year. In 2021, AWS earned $62.2 billion in revenue and over $18.5 billion in operating profit.

Microsoft’s Azure is the first runner-up, while Google is the third runner-up. Other companies, including IBM and China’s Alibaba, also operate their own cloud branches.

Together, Amazon, Microsoft and Google generate around 81% of the UK cloud infrastructure services market’s revenue according to Ofcom, which estimates the market at £15 billion ($16.8 billion).

Microsoft recently announced a number of changes to the terms of its cloud contract, making it easier for customers to use competing cloud platforms as well as Microsoft. The Redmond, Wash.-based company had faced complaints from competitors in Europe that it was limiting choice in the marketplace.

Tropical wave could threaten Florida


WESH 2 meteorologists are keeping a close eye on a tropical disturbance in the Atlantic Ocean. Invest 98-L located several hundred miles east of the Windward Islands is likely to impact Florida. “The system continues to show signs of organization and will likely become a tropical depression within the next two to three days. The disturbance is expected to move west-northwest across the southern Windward Islands from here. the end of the day and then heading into the central Caribbean Sea later this week,” the National Hurricane Center said. The system has a 70% chance of forming in 48 hours and a 90% chance of forming in five days. “This could become a tropical depression later this week as it drifts across the Caribbean,” said WESH 2 meteorologist Kellianne Klass. “The GFS and the Euro both show this storm strengthening as it moves into the Gulf of Mexico next week. “What we need to watch is the exact track of this storm. The latest GFS run brings the storm closer to central Florida, while the previous run took it away.” Meanwhile, Hurricane Fiona is drifting across the Atlantic as a major Category 4 storm. KNOW WHAT TO DO WHEN A HURRICANE WATCH IS ISSUED Stay tuned to WESH 2 News, WESH.COM or the NOAA weather radio for storm updates. Be prepared to bring inside any lawn furniture, outdoor decorations or ornaments, garbage cans, hanging plants, and anything that can be blown away. Understand hurricane forecast patterns and cones. Prepare to cover all the windows in your home. If shutters have not been installed, use pre-cut plywood. Check the batteries and stock up on canned food, first aid supplies, drinking water and medicine. water: One gallon of water per person per dayCanned foods and soup, such as beans and chiliCan opener for cans without the easy-open lidsAssemble a first aid kitTwo weeks of prescription medicationBaby’s needs/ children, such as baby formula and diapersFlashlight and batteriesBattery operated weather radioWHAT TO DO WHEN A HURRICANE WARNING IS ISSUEDListen to the advice of local authorities. If advised to evacuate, leave. Complete Preparedness Activities If you are not advised to evacuate, stay indoors, away from windows. Watch out for tornadoes. Tornadoes can occur during a hurricane and after it passes. Stay indoors, in the center of your home, in a closet or windowless bathroom. HOW YOUR SMARTPHONE CAN HELP YOU DURING A HURRICANE A smartphone can be your best friend during a hurricane – with the right websites and apps, you can turn it into a powerful tool to guide you through the approach, arrival and aftermath of a storm. Download the WESH 2 News app for iOS | AndroidEnable emergency alerts – if you have an iPhone, select settings, then go to notifications. From there, look for government alerts and enable emergency alerts. If you have an Android phone, from the home page of the app, scroll right at the bottom and click “Settings”. In the settings menu, click on “Severe weather alerts”. From the menu, select from the most severe, moderate to severe, or all alerts. PET AND PET SAFETY Your pet should be part of your family plan. If you must evacuate, the most important thing you can do to protect your pets is to evacuate them as well. Leaving pets behind, even if you try to create a safe space for them, can result in injury or death. Contact hotels and motels outside your immediate area to see if they allow pets. if they could house your pet.

WESH 2 meteorologists are keeping a close eye on a tropical disturbance in the Atlantic Ocean.

Invest 98-L located several hundred miles east of the Windward Islands is one that can impact Florida.

“The system continues to show signs of organization and will likely become a tropical depression within the next two to three days. The disturbance is expected to move west-northwest across the southern Windward Islands from here. end of the day and then moving towards the central Caribbean Sea later this week,” the National Hurricane Center said.

The system has a 70% chance of forming in 48 hours and a 90% chance of forming in five days.

This content is imported from Twitter. You may be able to find the same content in another format, or you may be able to find more information, on their website.

This content is imported from Twitter. You may be able to find the same content in another format, or you may be able to find more information, on their website.

This content is imported from Twitter. You may be able to find the same content in another format, or you may be able to find more information, on their website.

This content is imported from Twitter. You may be able to find the same content in another format, or you may be able to find more information, on their website.

This content is imported from Twitter. You may be able to find the same content in another format, or you may be able to find more information, on their website.

“This could become a tropical depression later this week as it drifts across the Caribbean,” said WESH 2 meteorologist Kellianne Klass. “The GFS and the Euro both show this storm strengthening as it moves into the Gulf of Mexico next week. “What we need to watch is the exact track of this storm. The latest GFS run brings the storm closer to central Florida, while the previous run took it away.”

Meanwhile, Hurricane Fiona is drifting across the Atlantic as a major Category 4 storm.


  • Stay tuned to WESH 2 News, WESH.COM or NOAA Weather Radio for storm updates.
  • Be prepared to bring indoor patio furniture, outdoor decorations or ornaments, trash cans, hanging plants, and anything that can be blown away.
  • Understand hurricane forecast models and cones.
  • Prepare to cover all the windows in your home. If shutters have not been installed, use pre-cut plywood.
  • Check the batteries and stock up on canned goods, first aid supplies, drinking water and medicine.

The WESH 2 First Warning Weather Team recommends having these items ready before the storm hits.

  • Bottled water: One gallon of water per person per day
  • Preserves and soups, such as beans and chili
  • Can opener for cans without easy-open lids
  • Assemble a first aid kit
  • Two weeks of prescription medication
  • Baby/child needs, such as formula and diapers
  • Flashlight and batteries
  • Battery operated weather radio


  • Listen to the advice of local elected officials. If you are advised to evacuate, leave.
  • Complete preparation activities
  • If you are not advised to evacuate, stay indoors, away from windows.
  • Watch out for tornadoes. Tornadoes can occur during a hurricane and after it passes. Stay indoors, in the center of your home, in a windowless closet or bathroom.


A smartphone can be your best friend during a hurricane. With the right websites and apps, you can make this a powerful tool to guide you through the approach, arrival and aftermath of a storm.

Download the WESH 2 News app to iOS | android

Turn on emergency alerts – if you have an iPhone, select settings, then go to notifications. From there, look for government alerts and enable emergency alerts.

If you have an Android phone, from the home page of the app, scroll right at the bottom and click “Settings”. In the settings menu, click on “Severe weather alerts”. From the menu, select from the most severe, moderate to severe, or all alerts.


Your pet should be part of your family plan. If you must evacuate, the most important thing you can do to protect your pets is to evacuate them as well. Leaving pets behind, even if you try to create a safe space for them, can result in injury or death.

  • Contact hotels and motels outside your immediate area to see if they allow pets.
  • Ask friends, relatives and others outside the affected area if they could house your pet.

Kinetic Green partners with Tata Capital to offer instant loans for electric two-wheelers


Kinetic Green Energy and Power Solutions, an Indian electric vehicle manufacturer, has partnered with Tata Capital to enable customers wishing to purchase Kinetic Green’s electric two-wheelers to access digital loans at Kinetic Green dealerships across India.

Kinetic Green has so far designed, manufactured and cumulatively sold more than 45,000 electric vehicles and achieved sales of Rs 500 crore.

The company said loan disbursement is seamless as loan decisions can be made in a fixed 15 minutes. Thanks to this collaboration, customers will benefit from an attractive interest rate, a loan of up to 85% of the value of the two-wheeler, a repayment period of up to 36 months and a Low EMI depending on customer eligibility.

Sulajja Firodia Motwani, Founder and CEO of Kinetic Green, said, “With attractive financing options provided by Tata Capital, the partnership will further drive the green mobility shift, leading to a seamless ownership experience.

Sarosh Amaria, Managing Director of Tata Capital Financial Services, said: “Through our simple and affordable financing solutions, we want to facilitate the adoption of electric vehicles for buyers of Kinetic Green two-wheelers. We look forward to a mutually beneficial partnership with Kinetic Green.

Kinetic Green is developing ARAI-approved electric 3-wheelers and lithium-ion battery technology on their cars in India. Kinetic Green’s mission is to provide mobility to millions of people. The company has over 500 dealerships serving customers in over 20 Indian states.

Meeting of the working group on the evaluation of the mediation system


The meeting of the working group of the activity “Assessment of the mediation system of the Regional Courts of Appeal (CRA)in the framework of the joint European Union-Council of Europe project on the “Promotion of Alternative Dispute Resolution (ADR) in Turkey” was held in Ankara on September 19, 2022 with the participation of representatives of the Directorate General of Legal Affairs (DGLA) of the Ministry of Justice, the Council of Europe project team and local and international consultants.

Following the overall evaluation of the project and related activity, relevant stakeholders shared their views on the current state of mediation and the perception of mediation in Turkey. During the meeting, international and European best practices on a fair and effective complaints mechanism were discussed to deal with disputes related to mediators and the mediation management process, as well as the results of desk research, visits on-site to RTAs and qualitative/quantitative research/user satisfaction surveys.

Issues such as actions to be taken for better mediation practices in Turkey, problems encountered in court decisions from the perspective of the judiciary, problems encountered by mediators and supervision of mediation were also discussed during Of the reunion. In addition, comments and recommendations were shared on ways forward to develop the operating framework of the mediation system, complaints mechanism and regional mediation assessment commissions to improve the quality of the mediation mechanism. assessment and general mediation practices in Turkey. .

The Turkish Ministry of Justice plans to establish a fair and effective complaints mechanism to resolve disputes related to mediators and the mediation management process, and thus improve mediation practices in general. In this context, the experts will prepare a comprehensive final evaluation report, including the results of the research analysis conducted, which will be submitted to the Ministry of Justice for review and action.

The joint project onPromoting Alternative Dispute Resolution (ADR) in Turkey» is co-financed by the European Union and the Council of Europe and implemented by the Council of Europe. The Ministry of Justice of the Republic of Turkey The General Directorate of Criminal Affairs and the General Directorate of Legal Affairs are the final beneficiaries of the project. The Central Finance and Contracts Unit is the contracting authority.

The spell check function of web browsers may transmit your password to Google and Microsoft / Digital Information World


Many of us click the “show password” option more often to check spelling and accuracy. The server also sometimes warns us when the password does not match. The recent study conducted by Josh Summit produced menacing results regarding this spell checking feature.

This feature passes form data to Google and Microsoft, leaving its operators vulnerable to the situation. It can also often transfer personally identifiable information (PII). The well-meaning element of these web browsers can affect many parties.

As this leaves its users dubious about the functionality, many of us enabled the feature to save time by simply copying and pasting the password and checking the spelling. This raises concerns about what happens if our data is passed on and how to protect it, especially in relation to the password field.

Both Chrome and Edge ships contain the spell check feature in the settings. Both apps have facilitated these features, but they can only work manually. Users have enabled the feature to save time. Yet, this leads to harmful means of data transmission.

Once the feature is activated, it automatically transfers data to Google and Microsoft. Josh Summit, co-founder and CTO of JavaScript, detected this flaw while running some tests. The research revealed that 73% of these sites and groups pass the data to a third party if you click on the Show password function.

He further explained that once the feature is enabled, it could transfer PII information along with Social Security Numbers (SSN), name, address, date of birth, bank, and payment hardware.

However, the form data takes place securely over HTTPS. Google is also trying to ensure the well-being of its community by eliminating the spell check feature. For now, we can disable this enhanced spell checking feature by going to settings and turning it off.

Also, Google’s spellcheck feature explicitly indicates that text you type in the browser is sent to Google. However, it is specified that google does not transfer the data to third parties, but processes it temporarily on the server.

Additionally, Google is proactively working to remove the spell check password to keep operators safe. AWS and LastPass are said to have mitigated the problem by simply requiring their users to set the HTML attribute spellcheck=false.

This feature prevented the spell checker from detecting the web browser‘s default connection. Most companies can also stop spell jacking by simply removing the ability to display passwords.

Although spell jacking may be possible even after removing the feature, it could prevent passwords from being sent. The Otto-js team reached out to Microsoft 365, Alibaba Cloud, Google Cloud, AWS, and LastPass to look into the matter and protect their customers’ privacy.

Source: https://www.bleepingcomputer.com/news/security/google-microsoft-can-get-your-passwords-via-web-browsers-spellcheck/

Web browsing: five tips for surfing the Internet without risk


The internet is part of everyone’s daily life and after the pandemic, its use has intensified even further. Unfortunately, the chances of falling victim to a cyberattack via the Internet are also increasing.

According to Check Point Software Technologies, the second quarter of 2022 saw an all-time high, with global cyberattacks increasing by 32% compared to the second quarter of 2021. In India, some of the most common dangers that Internet users can be exposed to are malware, phishing, among others. “It is important to be aware of the dangers we are exposed to whenever we perform tasks such as browsing sites or downloading an application,” says Manish Alshi, manager, Channels & Growth Technologies, Check Point Software, India & Saarc. The cybersecurity solutions firm offers the following tips for safe surfing and minimizing risk:

Only visit secure websites: Many websites do not have security measures in place, either because they are misconfigured or because they are malicious. For this reason, it is essential to take extreme precautions when sharing personal data on the Internet and to know which sites are safe. The best technique is to check if it follows the https IE security protocol. If the URL includes an -s at the end, it means that it is a secure site and meets protection standards. Another sign present in some browsers is a green padlock at the beginning of the link.

Always install updates: It is often thought that updating software and applications is not important. However, this habit of ignoring updates can be a huge risk; having the latest software update will optimize the level of security and is an effective strategy to protect data and files from potential security breaches, cyber attacks, etc.

Also read: Ramiz Raja explains why he snapped at Indian journalist after 2022 Asian Cup game

Do not use the same username and password for different online services: this is a serious mistake, because if a cybercriminal can access the user base and passwords of one online services or applications, it will be very easy to break into the rest. It is essential to use different users and passwords, and not to use easy-to-guess passwords.

Download applications only from official stores: Games, social networks, online banking… There are more and more mobile applications available for download. Make sure that whenever you download any of these apps, it is from the official store (Play Store, App Store, etc.). Read the different terms of use, because some of them can be abusive and in many cases you risk losing control of your data.

Protect your devices: Check Point Software offers ZoneAlarm Mobile (home version) and Harmony Mobile (enterprise version), mobile threat defense solutions that protect devices against advanced mobile attacks.

Read also: Do ​​you want a pension of Rs 50,000 per month after your retirement? Know the investment options


* Check website URLs before visiting

* Updating software and apps is important

* Always different username and password

* Download apps only from official store

What to expect for rain in Northern California on Monday, rest of the week


September is often a month of big change as summer turns into autumn, and this particular September is no different as intermittent rain showers bring a flash flood watch to nearby scorch scars. “We’re looking at scattered showers in today’s forecast, and possibly even isolated thunderstorms for the afternoon,” meteorologist Eileen Javora said Monday morning. Monday morning commuters are considering a wet ride. KCRA 3 calls Monday a weather alert day as it is the first rain of the season and the morning commute could be slippery when people hit the road. There is also a slight risk of thunderstorms. Rain in Sacramento on Monday A spiraling weather system off the coast is sending waves of rain to northern California, with Monday being the best chance of rain around Sacramento and Stockton. A chance of thunderstorms appear Monday as we enter the afternoon, Javora said. “As we move into the afternoon, we might see this outbreak of a few thunderstorms, especially around Sacramento and out west,” she said. Scattered morning showers are expected throughout NorCal, but the Sierra will hold on to light to moderate rain throughout the day. What we know for the rest of the week, Tuesday is expected to see partly cloudy skies again with a chance of showers on Tuesday, with most of the activity in the Sierra. We could wake up to some showers in the valley, but clearing is expected,” Javora said. By Thursday and Friday we will see a warming trend with the possibility of reaching 90 by Saturday. Rainfall amounts with this 3-day rain event appear uncertain. If this storm system remains just west or north of Sacramento, rainfall totals should be significant in many locations. If this system slides further south, rainfall totals would be significantly reduced. for parts of Northern California through Tuesday. The Mosquito Fire burn scar is under surveillance from Tuesday afternoon to Tuesday evening. “Rain will resume this morning, increasing the risk of ash flows, and debris flows may occur with any thunderstorms developing today,” the National Weather Service said Monday morning. High winds cause power outages in Sacramento County. the stream Sunday evening as the storm moved through the area. The first outage was in Rio Linda, where more than 10,000 customers were without power due to a smoking pole snapped in two. The second outage was in downtown Sacramento, where more than 5,000 customers were without power due to a tree falling on a power line. Temperature Trend Rain or no rain, this offshore system will trigger another cooling. Expect high temperatures in the 70s through Tuesday. Morning lows will be in the 50s. The average high temperature for Sacramento at this point in the season is 90 degrees. Sign up to receive daily weather forecasts and severe weather alerts for your location by CLICKING HERE.

September is often a month of big change as summer turns into autumn, and this particular September is no different as intermittent rain showers bring a flash flood watch to nearby scorch scars.

“We’re looking at scattered showers in today’s forecast, and possibly even isolated thunderstorms for the afternoon,” meteorologist Eileen Javora said Monday morning.

Monday morning commuters are considering a wet ride. KCRA 3 calls Monday a weather alert day as it is the first rain of the season and the morning commute could be slippery when people hit the road. There is also a slight risk of thunderstorms.

Rain in Sacramento on Monday

A spiraling weather system off the coast is sending waves of rain to northern California, with Monday being the best chance of rain around Sacramento and Stockton.

A chance of thunderstorms appear Monday as we enter the afternoon, Javora said.

“As we move into the afternoon, we might see this outbreak of a few thunderstorms, especially around Sacramento and out west,” she said.

Scattered morning showers are expected throughout NorCal, but the Sierra will hold on to light to moderate rain throughout the day.

What we know about the rest of the week

Partly cloudy skies are expected again on Tuesday with a chance of showers on Tuesday, with most of the activity in the Sierra.

“As we enter Tuesday and Wednesday night, that’s when the system finally pivots. We might wake up with some showers in the valley, but clearing is expected,” Javora said.

By Thursday and Friday we will see a warming trend with the possibility of reaching 90 by Saturday.

Rainfall amounts with this 3-day rain event appear uncertain. If this storm system remains just west or north of Sacramento, rainfall totals should be significant in many locations. If this system slides further south, rainfall totals would be significantly reduced.

(Click on the weather map below to find the 7-day forecast, temperatures in Northern California and more.)

Flash flood monitoring

The National Weather Service has issued a flash flood watch for parts of northern California through Tuesday.

The Mosquito Fire burn scar is under surveillance from Tuesday afternoon to Tuesday evening.

“Rain will resume this morning, increasing the risk of ash flows, and debris flows may occur with any thunderstorm that develops today,” the National Weather Service said Monday morning.

This content is imported from Twitter. You may be able to find the same content in another format, or you may be able to find more information, on their website.

High winds cause power outages in Sacramento County

Tens of thousands of SMUD customers were without power Sunday evening as the storm rolled through the area.

The first outage was in Rio Linda, where more than 10,000 customers were without power due to a smoking pole snapped in two.

The second outage occurred in downtown Sacramento, where more than 5,000 customers were without power due to a tree falling on a power line.

Temperature trend

Rain or no rain, this offshore system will trigger another cooling. Expect high temperatures in the 70s through Tuesday. Morning lows will be in the 50s.

The average high temperature for Sacramento at this point in the season is 90 degrees.

Sign up to receive daily weather forecasts and severe weather alerts for your location by CLICK HERE.

Building peace, preventing violence and supporting community resilience in Haiti – Haiti


A fund set up by the United Nations to build peace, prevent violence, strengthen justice, strengthen the rule of law and security institutions and strengthen the resilience of the most vulnerable people in Haiti, supports the efforts of the government to restore security and stability in the country.

The UN Peacebuilding Fund (PBF), which emphasizes the role of women and youth in peacebuilding efforts through their meaningful participation, began working in Haiti in 2019 in response to the needs identified by the government.

Ahead of the International Day of Peace celebrated each year on September 21, here are five things you need to know about PBF.

Make peace

Globally, the Peacebuilding Fund began working in 2006 in countries or situations at risk of or affected by violent conflict. UN Secretary-General António Guterres described it as “an essential vehicle to support resilience and prevention”.

Between 2006 and 2021, the PBF has allocated $1.67 billion to 65 countries to support peace efforts. Haiti received approximately $20 million for nine projects. These interventions largely focus on the implementation and maintenance of peace agreements, dialogue and peaceful coexistence, and the restoration of basic services that can help build peaceful societies.

Violence, instability and insecurity

Instability and insecurity, propelled by high inequalities, are long-standing problems in Haiti and are the main reasons why the government has requested support from the PBF.

The assassination of Haiti’s president in July 2021 and a devastating earthquake in the south of the country a month later have added to the insecurity caused by the growing presence and influence of gangs.

This insecurity has worsened in the capital Port-au-Prince over the past year as gang violence, exacerbated by the proliferation of illicit weapons and ammunition, has intensified. The number of kidnapping for ransom cases has also increased.

In the commune of Cité Soleil, one of the poorest districts of the capital, 99 people were killed and 133 injured during a particularly violent week of clashes in July between gangs vying for control of territory. Hundreds of homes were destroyed and thousands of people fled to safer locations, many of them supported by the United Nations.

Edwin*, a young leader living in Cité Soleil who is part of a youth group supported by the PBF, said he witnessed heavy fighting in the streets, adding that “I go to bed and wake up to the sound of gunfire which is very stressful.” The group brings together young people from neighborhoods where rival gangs are active. “We want our voices to be heard outside of Cité Soleil, because if no one hears us, nothing will change,” said he declared.

lack of peace

Gang violence is just one very tangible manifestation of insecurity and lack of peace, but the lives of Haitians are affected in countless other ways. In Cité Soleil, around 95,000 school children in more than 300 schools have seen their education disrupted by violence.

More than 2,500 people fled the commune and had to seek UN assistance. The blocking of roads to the south has interrupted the free movement of people and services in both directions, making it difficult for farmers to get their crops to market in Port-au-Prince and to deliver materials from earthquake relief and reconstruction. southern peninsula affected.

“Reducing violence and conflict, accessing justice and building lasting peace and stability are the priorities of the United Nations Peacebuilding Fund,” said Ulrika Richardson, United Nations Resident and Humanitarian Coordinator in Haiti. “. It is through the leadership of a wide range of local and national actors that we plan to support Haiti in building a peaceful and prosperous society for all Haitians.

Without stability, security and justice, economic progress is almost impossible. This is unfortunately becoming increasingly clear with the continued downturn in the Haitian economy, the effects of which are felt most by the most vulnerable and marginalized individuals and communities.

Fill a gap

The PBF played a particularly important role in Haiti following the closure of the United Nations peacekeeping mission, MINUSTAH, in 2017. The PBF is one of the few resources the United Nations has to scale up efforts in areas previously covered by the mission or areas. requiring renewed attention.

The fund focused on a number of key areas, including community violence reduction, with an emphasis on supporting and promoting participation at the community level, with a focus on young people. It has also promoted social cohesion and mental health, particularly for women and girls, and it supports activities to prevent election-related and political violence, again with a particular focus on protecting and empowering women. women.

Strengthening the judicial system, including the provision of legal aid to vulnerable populations while strengthening coordination between judicial actors and the penal system, is also a priority of the PBF.

Supporting Haiti’s Most Vulnerable

Ultimately, PBF is a people-centred financing mechanism that has resulted in notable successes.

At 15, Renel* was detained without trial for three years in a prison in Les Cayes after being wrongly accused by a shopkeeper of stealing two ducks. His case caught the attention of the United Nations and was referred to a legal aid office, set up by the United Nations Development Program (UNDP), the United Nations Political Mission in Haiti, BINUH and the Haitian Ministry of Justice and Public Security and financed by the PBF.

Renel, along with 67 other people, were released. “Children should be in school, not in jail,” he said.

Sylvie participates in a PBF-supported group in the gang-affected neighborhood of Martissant, which seeks to prevent and resolve conflict at the community level. Focusing on empowering women and tackling sexual violence, she said, “The situation may not be resolved tomorrow, but hopefully we will see longer-term changes.”The International Day of Peace is celebrated around the world on September 21. The theme for 2022 is “End Racism. Build Peace”

Netizens Suspect BTS’ V And BLACKPINK’s Jennie Are Dating As New Image Appears On The Internet


Recently, rumors started circulating about BTS member V and BLACKPINK member Jennie dating. According to media reports, the duo recently vacationed on Jeju Island in South Korea. This has led many fans to believe that the two singing sensations are in a relationship. If that wasn’t enough, fans also circulated a photo of V driving a car with Jennie sitting in the passenger seat.

Dating Rumors: Are They True?

It was obvious for the curious crowd to approach the two singers’ agencies to find out the truth behind the relationship rumors. Unfortunately, BTS member V’s agency BIGHIT Music refrained from commenting on the news. Meanwhile, BLACKPINK member Jennie’s agency YG Entertainment said they have nothing to say at this time and will let everyone know if they have anything to share later. .

The dating rumors don’t stop there. A few weeks ago, fans again speculated that V and Jennie were in New York at the same time and met there. However, no other evidence has been found regarding the same. Now another supposed piece of evidence has everyone baffled again.

The picture of the cat snuggling up

Recently, another photo of BTS member V is going viral on social media. The Christmas tree The singer is seen snuggling up to a cat in the widely circulated photo. Said photo shows V cuddling adorably with a gray and white cat. Now, according to netizens, the photo appears to have been taken in BLACKPINK member Jennie’s bedroom. Conscious pointed out the design of the headboard behind the BTS member, which they claim is the same as Jennie’s bed. Plus, the gingham pillows seen in V’s photo also look similar to the ones seen on Jennie’s bed. Many are also of the opinion that the cat belongs to V’s mother.

Snapchat for the web is finally available to users around the world / Digital Information World


Snap fans are going to fall in love with this fresh news.

Snapchat for web is available for different users around the world. And while it may have been a long time coming, given the high anticipation involved, it’s time for the app’s fans to celebrate.

The app’s features related to video chats and standard messaging were made available to different browsers in July this year. But the launch was limited to a select few, like a limited portion of the market or those with a paid subscription.

But things are changing for the better, and the feature is within reach for avid users who love to type or have a lot of texts to send. After all, there’s a much bigger screen involved, not to mention full access to a whole keyboard too.

Although the company claims the web interface is simple and straightforward, you can also use it to send images. Did we mention the ability to make video and audio calls?

One of the app’s spokespersons mentioned that many people have been loving the video call feature lately. And the fact that it is also available on the web will be more appreciated. Just think of longer video calls.

Meanwhile, the spokesperson added that several other essential features may also appear on the web. It all depends on how things go and user demands.

But that’s not the only launch happening on the app. Snap recently released its series of widgets for lock screens. This is only limited to iPhone for now. This is right after the company unveiled its iOS 16 for the users.

With this new launch, you can create shortcuts for the chats you want or for the conversations with the ones you love the most. Launching your conversations with just one click has never been easier than it is today.

Since we are still talking about shortcuts, we would also like to inform you that the application will soon have other shortcuts located in the upper part of the chat page.

This is designed to add more convenience so you can now instantly access your unread Snaps, conversations or replies. You’ll get reminders for other special occasions like birthdays or chats you haven’t opened yet.

Finally, the app introduced the Question Sticker feature. You can put them on Stories or any choice of Snaps.

As for rolling out these new features, they’re coming soon.

Read next: TikTok takes inspiration from BeReal and launches experimental “Now” feature

Meteorological fall: the averages and its history – WISH-TV | Indianapolis News | Indiana Weather forecast


INDIANAPOLIS (WISH) – The fall season is enjoyed by many who are ready to kick back from the summer heat and enjoy the changing scenery around them.

The astronomical fall begins on Thursday while the meteorological fall began on September 1. The weather drop will be at the center of this story along with decay averages and some noteworthy events.

The weather fall is defined by the timeline from September 1 to November 1. 30. As we go through the fall, we get progressively cooler on average. However, there is a slight increase with the average amount of rain and snow we receive during the weather fall period. When you average everything out, the fall weather season has an average temperature of 55.6 degrees, an average precipitation of 9.81 inches, and even 0.9 inches of snow.

In our article on the weather for September 9, We are discussing averages for September in which it is a mild to hot month with just over 3 inches of rain on average. October and November make steep drops in the average temperature department, and that is why, as a whole, the fall season features a rather cool average temperature.

Now let’s talk about the historical statistics of the fall. It’s important to start with the fact that the past five falls have at times featured warmer than normal conditions, which is not considered usual. Despite this trend, none of the last five falls are in the hottest 10 category.

How about relatively cold falls? The last time we saw a cold drop in the top 5 was in 1976, which ultimately marks the coldest of the season.

The lack of rainfall has also been a story at times, with months like September 2017, September 2019 and September 2020 being extremely dry. For our wettest fall on record, we have to go all the way back to 1871. The driest fall on record occurred in 1963.

Fall can also feature erratic weather conditions. Let’s first talk about some notable severe weather events that happened during this season. There are several that can be named, but some that immediately come to mind are the damaging wind event of October 26, 2010 and the tornado outbreak of November 22, 1992. There will soon be weather reports on the web covering some of these events in more detail.

Winter weather can even make its presence felt early; as for example, October 19, 1989, featured Indy’s biggest snowfall event in month history with 9.3 inches of snowfall recorded. On November 14-15, 2018, an unusual ice event occurred in central Indiana. Some areas ended up getting up to 0.25 to 0.3 inches of ice.

Let’s quickly return to the discussion of autumn heat to wrap things up. October, for example, even had 90 degree days. Indianapolis had recently set its record high temperature for the month of October 1-2, 2019. The last date of the year that Indy experienced a 90-degree day was October 8, 2007, with a high of 91.

Transforming education, transforming the world – World



Statement from Education Cannot Wait Director Yasmine Sherif for the Transforming Education Summit

Leaders from around the world are uniting at the United Nations Secretary-General’s Transforming Education Summit to address a global education crisis that threatens to derail decades of development progress and deprive millions of girls around the world of their fundamental right to access quality education.

As we mobilize financial resources, listen to the world’s young people, identify needs and solutions, and work collectively to raise education to the top of the global political agenda, we must not forget the 222 million children and adolescents affected by the crisis in the world. They are the most left behind and they urgently need our support. Education Cannot Wait’s groundbreaking analysis highlights that around 78 million of these crisis-affected children are out of school and almost 120 million are in school but not learning. These shocking numbers cannot be allowed to represent the 21st century.

Caught in protracted conflicts and crises, displaced by climate change and struggling to survive in some of the harshest and most inhumane conditions on the planet, these girls and boys need our urgent and unwavering support.

We must unite in action to deliver on the commitments that will be made at this founding summit to ensure that girls and boys in places like Bangladesh, Democratic Republic of Congo, Haiti, Pakistan, South Sudan , Syria, the Sahel, Ukraine, Yemen and beyond are guaranteed their fundamental right to quality education for 12 years.

It is our commitment to ensure and improve inclusive education and equitable learning outcomes, to protect and enhance external funding, to work together in the spirit of multilateral and organizational cooperation to build resilient education systems to crises, and to scale up and mainstream high-impact programs and evidence-based interventions into results and lasting impact.

Education Cannot Wait, as the United Nations Global Fund for Education in Emergencies and Protracted Crises, champions these transformational approaches designed to be responsive in the midst of brutal crises by delivering humanitarian and a depth of development to ensure that no child or adolescent is left behind.

We urge world leaders to keep our promises as set out in the Sustainable Development Goals, the Charlevoix Declaration, the Safe Schools Declaration and other international agreements, and support us in achieving 222 million dreams✨📚 for an education and 222 million dreams✨📚 to use that education to make the world a better place than the one they suffer in today.

Note to Editors

About Education Can’t Wait (ECW):
Education Cannot Wait (ECW) is the United Nations global fund for education in emergencies and protracted crises. We support quality educational outcomes for refugee, internally displaced and other crisis-affected girls and boys, so that no one is left behind. ECW works across the multilateral system to both accelerate responses to crises and link immediate relief and longer-term interventions through multi-year programming. ECW works closely with governments, public and private donors, UN agencies, civil society organizations and other humanitarian and development aid actors to increase efficiency and end siled responses . ECW is making an urgent appeal to public and private sector donors for increased support to reach even more vulnerable children and young people. The High-Level Financing Education Can’t Wait conference, co-hosted by ECW and Switzerland, and co-hosted with Germany, Niger, Norway and South Sudan, will take place on February 16 and 17, 2023 in Geneva.

Uber investigates ‘cybersecurity incident’ after reporting breach


An Uber office is shown in Redondo Beach, California, U.S., March 16, 2022. REUTERS/Mike Blake

Join now for FREE unlimited access to Reuters.com

Sept 15 (Reuters) – Uber Technologies Inc (UBER.N) said on Thursday it was investigating a cybersecurity incident, after a report said its network had been hacked and the company had to shut down several communications and data systems. internal engineering.

A hacker compromised an employee’s workplace messaging app Slack and used it to send a message to Uber employees announcing that the company had suffered a data breach, according to a report from the New York Times Thursday quoting an Uber spokesperson.

It appeared the hacker was then able to gain access to other internal systems, posting an explicit photo on an internal employee information page, the report adds.

Join now for FREE unlimited access to Reuters.com

“We are in contact with law enforcement and will post additional updates here as they become available,” Uber said in a tweet, without providing further details.

The Slack system was taken offline Thursday afternoon by Uber after employees received the hacker’s message, according to the Times report, citing two employees, who were not authorized to speak publicly.

I am announcing that I am a hacker and that Uber has suffered a data breach,” the post reads, and goes on to list several internal databases that were allegedly compromised, the report adds.

A person, claiming responsibility for the hack, told the newspaper that he texted an Uber employee claiming to be a corporate IT worker.

The worker was persuaded to hand over a password that allowed the hacker to access Uber’s systems, according to the report.

Slack said in a statement to Reuters that the company was investigating the incident and there was no evidence of an inherent vulnerability in its platform.

“Uber is a valued customer, and we’re here to help them if they need us,” Slack, which is owned by Salesforce Inc., said in the statement.

Uber employees have been instructed not to use Slack, according to the report. Other internal systems were also inaccessible.

Join now for FREE unlimited access to Reuters.com

Reporting by Shubham Kalia and Maria Ponnezhath in Bengaluru; edited by Uttaresh.V, Rashmi Aich and Saumyadeb Chakrabarty

Our standards: The Thomson Reuters Trust Principles.

Cloudflare Pledges to Fight Global DNS Blocking Orders * TorrentFreak


House > Anti-piracy >

Copyright owners are expanding their web blocking horizons by attacking DNS resolvers. Cloudflare is one of the main targeted players. While the internet infrastructure company complies with targeted blocking orders related to the websites of its CDN customers, it feels that blocking domains on its DNS resolver is going a bit too far.

Website blocking has become an increasingly common anti-hacking tool around the world.

In dozens of countries, ISPs have been ordered by the courts to block pirate sites. In some cases, these blocking efforts are part of voluntary agreements.

Cloudflare “pirate” block orders

In the United States, these types of injunctions are rare. However, since the Internet has no clear boundaries, the effects sometimes spill over. US internet infrastructure company Cloudflare, for example, has been ordered to block pirate sites in Germany and Italy.

This week, Cloudflare released its latest transparency report covering the second half of 2021. The company explains that after assessing the potential impact on free speech, it generally complies with blocking orders that target websites operated by its CDN customers.

These blocking efforts are not global. Instead, Cloudflare only blocks access to the location a command originates from. These sites include DDL-Music in Germany and nearly two dozen sites in Italy.

“If we determine that the order is valid and requires action by Cloudflare, we may limit blocking access to content to areas where it violates local law, a practice known as ‘geo-blocking,'” explains Cloudflare in its Transparency Report.

Target: DNS

The aforementioned blocking orders apply to Cloudflare customer websites. However, Cloudflare also operates a DNS revolver which is the target of a new anti-hacking campaign.

DNS resolvers are the address books of the web. They link domain names to the correct IP addresses to make them accessible through a web browser. They are a key part of a well-functioning Internet.

Interestingly, these DNS servers are often used by ISPs to comply with site blocking orders. By deleting a domain from the address book, users cannot load the site in question.

This is a relatively simple blocking method that is easy to circumvent by using an external DNS resolver, such as those provided by Google, OpenDNS, Quad9, or Cloudflare. For this reason, DNS resolvers have also become the target of blocking requests.

In Germany, Quad9 had previously been ordered to block a pirate site via its DNS resolver following a complaint from Sony. Similarly, in Italy, a court ordered Cloudflare to block several domains of hacker sites at the DNS level.

Cloudflare opposes blocking

In its Transparency Report, Cloudflare makes a clear distinction between blocking requests that target its customers’ websites and those that apply to DNS functionality. DNS blocks can target any website on the web and aren’t easy to geo-restrict, the company writes.

“Because such a block would apply globally to all users of the resolver, regardless of location, it would affect end users outside the jurisdiction of the blocking government.

“We therefore evaluate all government requests or court orders to block content via a globally available public recursive resolver as requests or orders to block content globally,” adds Cloudflare.

Cloudflare doesn’t want to meddle with its DNS resolver, which puts the company in a tight spot that requires a creative solution.

The company says that, so far, it hasn’t actually blocked content through the public DNS resolver. Instead, he is relying on an “alternative remedy” to comply with the Italian court’s order.

“Given the extended extraterritorial effect, as well as the different global approaches to DNS-based blocking, Cloudflare has taken legal action before complying with requests to block access to domains or content through the DNS resolver. public DNS or other identified mechanisms to comply with relevant court orders.

The above clearly shows that the company is determined to fight DNS blocking orders in court. And even if it loses, Cloudflare will look for alternatives. It’s unclear what these alternatives entail, but Cloudflare likely has the know-how to find a technical “workaround” mechanism.

A copy of Cloudflare’s S2 2021 Transparency Report is available here (pdf)

Release date, live stream, leaks and more



Here’s everything we know about the Genshin Impact 3.1 release.

Genshin Impact 3.0 is now in its final stage, which means that the next update titled Genshin Impact 3.1 is just around the corner. As always, fans are excited to know what’s to come in the next update and curious to know the exact release date and livestream schedule of Genshin Impact 3.1 update. So without further ado, here’s everything we know about Genshin Impact 3.1 Version, including its release date, live stream timeline, and leaks.

Genshin Impact 3.1 Update Release Date

Image source: HoYovere

Genshin Impact 3.1 version is expected to release on September 28, 2022according to the official HoYoverse announcement.

However, it should be noted that the launch schedule may be delayed, as we have seen in the case of version 2.7. If this happens, you can expect compensation from HoYoverse in the form of Primogems and other valuable resources.

As always, bookmark this page, as we’ll keep this section updated with the latest Genshin Impact information.

Genshin Impact 3.1 Live Stream Schedule

Genshin Impact 3.1 Live Stream Schedule
Image source: HoYovere

Genshin Impact 3.1 Live Stream Scheduled For September 16 at 5 a.m. PT / 8 a.m. ET / 1 p.m. BST.

If you didn’t know, the developers are hosting a Livestream on various streaming platforms before the update was released. These live streams provide a preview of new content and features that will arrive with Genshin Impact updates.

Genshin Impact 3.1 Update Leaks

First of all, the latest and greatest leaks suggest the arrival of a new NPC called Mike in the upcoming Genshin Impact 3.1 update. According to reports, Mika will be introduced as a playable character next year. Until then, players can interact with him in several Genshin Impact events.

Along with the new character, data miners have leaked a brand new 4-star weapon known as the Missive Windthrower. The weapon would deal 509.61 attack damage at level 90 and can be obtained through the main event of Update 3.1.

Finally, the second region of Sumeru, called the desert region, can be unlocked in version 3.1. According to the leaker, players will need to complete the Searing Dreams in the Sea of ​​Sand quest to gain access to this region.

Remember that the above information is compiled based on leaks and rumors around the web, and readers should take it with a grain of salt.

That’s all you need to know about Genshin Impact 3.1 Update. Before you go, be sure to check out some of our other Genshin Impact related content here on emagtrends, like Genshin Impact: Chronic Illness Quest Guide and Genshin Impact: Further Observation Quest Walkthrough.

Victorville woman arrested on arraignment alleging she used inmate names to fraudulently obtain over $500,000 in COVID relief | USAO-CDCA


RIVERSIDE, California – A San Bernardino County woman was arrested today in an indictment before a federal grand jury on seven counts, alleging she fraudulently obtained more than $500,000 in benefits unemployment insurance (UI) claims related to the pandemic using the names of inmates locked up in the California state prison system.

Cynthia Ann Hernandez, 32, aka “Cynthia Roberts,” of Victorville, has been taken into custody and is scheduled to appear for arraignment tomorrow in United States District Court in Riverside.

Hernandez is charged with four counts of mail fraud, one count of access device fraud over $1,000 and two counts of aggravated impersonation.

According to the indictment released on September 9, from June 2020 to August 2020, Hernandez filed fraudulent claims with the California Employment Development Department (EDD) for unemployment insurance benefits on behalf of individuals incarcerated in the prison system. of the State of California. EDD administers California’s unemployment insurance benefits program.

Hernandez allegedly falsely stated on applications for unemployment insurance benefits that the named claimants were people whose jobs had been negatively affected by the COVID-19 pandemic and were eligible for pandemic unemployment assistance in under the CARES (Coronavirus Aid, Relief, and Economic Security) Act. Congress passed the CARES Act in March 2020, in part to help people whose jobs and finances have been affected by the pandemic.

The applications also incorrectly stated that the named applicants were eligible for unemployment insurance benefits and that they resided and worked in Los Angeles and Orange counties. EDD then authorized Bank of America to issue debit cards in the plaintiffs’ names and was sent to Hernandez’s mailing address, according to the indictment. Once Hernandez received the debit cards, she used them to withdraw cash from ATMs and banking centers.

In total, Hernandez allegedly caused at least 29 fraudulent claims to be filed with EDD, resulting in losses to EDD and the US Treasury of approximately $515,138.

An indictment contains allegations that an accused has committed a crime. All accused are presumed innocent until their guilt has been proven beyond reasonable doubt.

This matter was investigated by the United States Department of Labor – Office of Inspector General; California Department of Employment Development – ​​Investigation Division; homeland security investigations; the California Department of Corrections and Rehabilitation; United States Department of Homeland Security – Office of Inspector General; the United States Postal Inspection Service; and United States Customs and Border Protection – Special Response Team.

Assistant United States Attorney Solomon Kim of the Terrorism and Export Crimes Section is prosecuting the case.

Anyone with information about alleged attempted fraud involving COVID-19 can report it by calling the Department of Justice’s National Disaster Fraud Center hotline at (866) 720 -5721 or via the NCDF online complaint form at: https://www.justice.gov/disaster-fraud/ncdf-disaster-complaint-form.

Scope of Facebook’s $90m privacy settlement challenged


The Meta logo is seen in this illustration taken August 22, 2022. REUTERS/Dado Ruvic/Illustration

Join now for FREE unlimited access to Reuters.com

  • Antitrust plaintiffs in separate case question ‘broad’ language
  • Hearing set for October 27

(Reuters) – A group of plaintiffs’ lawyers have raised questions about the scope of Meta Platform Inc’s pending $90 million privacy settlement in California federal court, telling a judge that their claims in a case separate antitrust should be separated and not brushed aside in the agreement.

Hagens attorneys Berman Sobol Shapiro and Quinn Emanuel Urquhart & Sullivan said in a filing in court On Monday, they worried broad language in the privacy settlement could be used to thwart antitrust claims pending before another judge in the Northern US District Court in California.

Facebook attorneys in both cases did not immediately respond to messages seeking comment. A Facebook representative also did not immediately respond to a request for comment.

Join now for FREE unlimited access to Reuters.com

Facebook has denied any responsibility in either case.

The privacy settlement would resolve allegations that Facebook tracks users’ web activity even after they log out of the social media website. In the antitrust case, Facebook is accused of exploiting user data to stifle competition. The case also concerns the company’s data collection practices.

The data privacy settlement announced in February “risks providing a benefit to common defendant Meta Platforms Inc that it did not bargain for and to which it is not entitled,” attorneys for the antitrust plaintiffs said in the filing. Monday’s court.

Plaintiffs’ attorneys asked U.S. District Judge Edward Davila to include a sentence in the confidentiality agreement stating that the dispute resolution does not limit the claims alleged in the antitrust litigation.

On Tuesday, attorneys for the plaintiffs in the antitrust case and the data privacy plaintiffs did not immediately respond to messages seeking comment.

A hearing on the data privacy settlement is scheduled for October 27.

Lawyers for the antitrust plaintiffs said they were concerned about language in the confidentiality agreement that releases “all claims … whether known or unknown.” Lawyers argued in their filing that the alleged injuries in the two cases are “fundamentally different.”

Data privacy plaintiffs have sought damages for breach of privacy. The antitrust plaintiffs said they were seeking damages “based on the diminished compensation they received for their data due to Facebook’s destruction of competition.”

The case is In re Facebook Internet Tracking Litigation, US District Court for the Northern District of California, No. 5:12-md-02314.

For plaintiffs: David Straite of DiCello Levitt Gutzler; Stephen Grygiel of Grygiel Law; and Jay Barnes of Simmons Hanly Conroy

For Facebook: Michael Rhodes of Cooley

Read more:

Meta’s Facebook will pay $90 million to settle privacy lawsuit over user tracking

Facebook loses bid to deny user data privacy antitrust claims

Join now for FREE unlimited access to Reuters.com

Our standards: The Thomson Reuters Trust Principles.

Twitter relaunches custom timelines in latest feature test


witter has quietly relaunched an old feature to some users in its test phase: Custom Timelines.

Efficiently curated feeds, timelines can be created by third parties who curate and deliver content based on interests and events.

They can also be created by Twitter based on general information about users of the platform.

These custom flows run alongside the home timeline and appear on a separate tab after adding a custom timeline from a prompt.

Content in a custom timeline is curated and ranked based on relevance to the topic based on search terms, topics, handles, and manual curation by whoever curated it.

This isn’t the first time custom timelines have been tested on Twitter, with the platform testing a version of the feature as far back as 2013.

After the flurry of new features over the past two weeks, Twitter shows it’s working on ways to improve the platform.

The timeline functionality in its current version seems quite limited, although it is still in its infancy.

With no clear option to search for timelines, you have to hope you come across one you like.

This is likely an attempt to allow people to exist in their own spaces on Twitter, a social media platform notorious for its negativity and adversarial interactions between users.

In the same way that Twitter circles allow you to selectively share Tweets with a certain group of people, following custom timelines gives you more control over what you see on your feed, but also means you’re less exposed to views and opinions that differ from your own.

Whether that could lead to people having a more enjoyable time on the platform, or just lead to more polarization between different viewpoints, remains to be seen.

How to Use Custom Timelines on Twitter

Timelines can currently only be added or removed through the web version of Twitter.

Once you see a prompt for a custom timeline on your feed, you can add it by clicking the “Add timeline” button at the bottom of the prompt.

This will create a tab next to your home timeline tab where you can find curated information about the topic you just subscribed to, as well as information about the third party curating the content.

You can use the tabs to switch between the home timeline and the custom timeline, and navigate the new timeline as you would your home timeline.

To delete a timeline, find the settings option under the composer.

Click on timeline settings, then click “delete timeline”. Once you’ve confirmed that you want to delete, you’ll no longer see that custom timeline on your feed.

Cash Advance Apps vs Payday Loans: Which is Better?


If you’re asked to imagine a payday lender, you might think of a storefront in a strip mall with green dollar signs and neon slogans like “everyday payday.” You probably wouldn’t imagine a mobile app that advertises on TikTok and sports a colorful logo.

But cash advance apps like Earnin and Dave provide advances with the same borrowing and repayment structure as payday lenders, and consumer advocates say they carry similar risks. Both are quick, no-credit-check options for closing an income gap or easing the pressure of inflation.

Neither is an ideal first choice for borrowing money quickly, but knowing their differences can help you save money and avoid hurting your finances.

Cash advance apps work like payday loans

Like most payday loans, a cash advance or paycheck app lets you borrow money without a credit check. You are also required to repay the advance, plus any fees you have agreed, on your next payday.

A single payment cycle is usually not enough for borrowers to repay payday loanso many people fall into the habit of getting another loan to pay off the previous one, says Alex Horowitz, senior director of The Pew Charitable Trusts.

App users may find themselves in a similar cycle. A 2021 study by the Financial Health Network found that more than 70% of app users get back-to-back advances. The study doesn’t say why users re-borrow, but Horowitz says the behavior is particularly similar to payday loans.

“Direct-to-consumer payday advances share DNA with payday loans,” he says. “They’re structured the same, they have repeat borrowings, and they’re scheduled based on the borrower’s payday, which gives the lender strong collectability.”

Apps can offer more flexibility

Payday lenders and payday advance apps collect repayment directly from your bank account. If your account balance is too low when funds are withdrawn, you could incur overdraft fees, says Yasmin Farahi, senior policy adviser at the Center for Responsible Lending.

An application may try to avoid overcharging your account. Mia Alexander, Vice President of Customer Success at Dave, says the app reviews users’ bank accounts before withdrawing the refund. If the refund puts the balance close to zero or negative, the app may not withdraw the funds, she says.

However, apps typically include language in their user agreements that while they try not to overcharge your account, they aren’t liable if they do.

In states where payday loans are allowed, a payday lender is unlikely to offer a free, unsolicited payment extension, as some apps say. Some states require payday lenders to offer extended payment plans at no cost to troubled borrowers, but a 2021 report from the Consumer Financial Protection Bureau says some lenders are misrepresenting plans or not disclosing them.

Unlike payday lenders, the apps don’t make collection calls. If a user revokes access to their bank account to avoid a refund, the app will not attempt to collect the funds. The user simply cannot get another advance until they repay the previous one.

Payday loans cost more

Payday loans tend to have high mandatory fees, unlike apps. Instead, they charge a small fee that users can accept throughout the borrowing process. These fees can add up, but they are usually lower than those charged by payday lenders.

For example, an app might charge a monthly subscription fee or a fee for instant access to funds. Most cash advance apps also ask for a tip for service.

The charges on a $375 payday loan are most often about $55 over a two-week period, Horowitz says. Since the cash advance application fee is mostly optional, you can easily keep the cost below $10.

Earnin user Sharay Jefferson says she’s used payday loans in the past, but switched to a cash advance app because it’s a cheaper way to cover bills and unexpected expenses.

“If you get a $200 payday loan, you might be paying something back three times over,” she says. “With Earnin, I’m going to have to pay that $200 back, plus whatever I decide to give them. It’s much cheaper. »

Technically, apps are not lenders

Regulators like the CFPB have not classified payday advance apps as lenders, despite their similarities to payday loans.

Earnin CEO and Founder Ram Palaniappan says the app is more like a payroll service or an ATM because it makes it easier to access your own funds. Earnin asks users to upload a timesheet showing they worked enough hours to earn the cash advance amount. Other apps scan a user’s bank account for income and expenses to determine if they qualify for an advance.

Farahi says applications should be treated like creditors, meaning they would follow the Truth in Lending Act, which requires creditors to disclose an annual percentage rate. An APR allows consumers to compare costs between financing options. For example, users can compare the APR of a cash advance app to that of a credit card and choose the most affordable.

“People still need to know what the real cost of credit is and to be able to assess it and really compare that cost with other options,” she says.

Applications should also comply with applicable state lending laws. Currently, 18 states and Washington, DC, have maximum interest rate caps that could limit application fees, she says.

Cash Advance App vs Payday Loan: Which is Better?

If you need cash urgently, you can have better alternatives than payday loans and advanced apps, says Farahi.

Local charities and nonprofits can meet basic food and clothing needs. A family or friend could lend you money at no additional cost. If you have a few hours to spare, a side gig could generate as much money as a typical payday loan or cash advance application.

If you have the choice between an app and a payday loan, the app is probably the best option because:

  • It may not trigger overdraft charges.

  • If you don’t pay it back, the app won’t send you to collections.

A cash advance from an app is unlikely to leave you in a better financial position, Farahi says. But it may be a little less likely than a payday loan to make things worse for you.

Viaplay Group chooses DataMiner to streamline its production workflows


Skyline Communications is proud to announce that Viaplay has chosen Skyline’s DataMiner as its management platform to streamline its production workflows and signal routing across multiple countries.
With Viaplay Group continuing to expand into new territories, optimizing their media operations was of paramount importance. Viaplay has implemented a DataMiner system that allows signal routing over its existing SDI infrastructure and at the same time supports IP routing of video and audio streams over any LAN and WAN IP network architecture.

“We now broadcast the Premiere League in 9 different countries, and we are continually adding more live sporting events. With our two central MCRs, production hubs across Europe and an expanding contribution network, we had to stop thinking of our contribution links as static point-to-point connections and start using our infrastructure as efficiently as possible and in a much more dynamic way,” said Martin Bergström, Head of Technical Development at Viaplay. “Skyline was the perfect partner for us. We could simply create easy-to-use web signal routing panels through many different technologies such as local SDI and MPLS routers and new IP multicast contribution networks. Our connectivity provider, Mobile Links Europe, has exposed a specific API to securely control a subset of all contribution network crosspoints with DataMiner.

“We are proud to support Viaplay’s expansion and digital transformation. Viaplay Group connected its DataMiner system to the cloud at an early stage, allowing it to benefit from additional DataMiner functions. With DataMiner Dashboard Sharing, Viaplay can now share HTML router panels with just about anyone outside the company with just a few clicks. For each production, contractors from different production sites receive an email with a link to a router panel that displays only the sources and destinations they need for their production. And when the production is finished, the panel will be automatically decommissioned again,” added Lars von Oertzen, Regional Account Manager at Skyline Communications.

“We are very pleased to have established a long-term partnership with Viaplay Group. We not only help them with their current challenges to deliver the right data to the right users at the right time, but with DataMiner they also have a platform in place that allows them to continuously evolve in a DevOps style and in an agile way to deliver value fast,” concluded Ben Vandenberghe, CEO of Skyline Communications.

another reason to think before you click


Cybercriminals take advantage of people’s negligence to obtain passwords, ID numbers, home addresses, bank accounts, and other personal information. Getting lost on a fake website is one way they do it. This article explains what pharming is and how to detect and prevent it.

Imagine that you are in your car on the way to a country house to spend a few days on vacation. You follow all the signs to get there, including a right turn that, without realizing it, leads you away from your destination. You end up somewhere and don’t know why or how you did it. This is how pharming works online. It is a trick in which legitimate websites or servers are tampered with to redirect users to fake websites that capture their personal information or even money.

“Pharming” is the portmanteau of “Phishing(i.e. spoofing over emails or text messages) and server “farms” that redirect users to fraudulent websites.

Whether you’re a hobbyist or an Internet expert, the key to understanding this scam lies in how you navigate online. To visit a website, you normally write its address in the browser or click on a direct link. The browser translates the information into a numeric Internet Protocol (or “IP”) address for a specific server in order to display website content. Internet browsing works this way because a name is much easier to remember than a set of numbers.

Cybercriminals are on the prowl to make sure you don’t open the website you want and head to another they’ve created to scam you. Knowing how they do it is the first step to avoiding their scheme. So let’s look at two ways they engage in pharming.

High-speed internet funding helps bridge Louisiana’s digital divide – American Press


High-speed internet funding helps bridge Louisiana’s digital divide

Posted 3:36 p.m. on Sunday, September 11, 2022

Louisiana came out on top. It was the first state to receive broadband funding from the Infrastructure, Investment and Employment Act (IIJA) enacted last year.

US senator. Bill Cassidy, R-La., worked with a group of 10 senators, five Republicans and five Democrats, who helped craft the bill.

The $2,941,542.28 grant is for the deployment and adoption of affordable and reliable high-speed Internet across the state, the first of more than $1 billion expected to be allocated to Louisiana over the next five years.

What does this mean for Southwest Louisiana, and specifically when can viewers in unserved and underserved communities expect to stream their favorite programs buffer-free?

Veneeth Iyengar, executive director of Broadband Development and Connectivity, is confident that sufficient funding is in place to enable 1.5 million Louisiana residential and business addresses to have high-speed Internet access by 2029 or sooner. . Two caveats exist.

“There are three big buckets of money through three different federal agencies largely focused on the same problem,” he said.

In fall 2020, the Federal Communications Commission awarded $342 million to 13 private internet service providers in 175,692 locations through the Rural Digital Opportunity Fund. A location is defined as the address of a household or small business.

“We have no control over these expenses,” Iyengar stressed. “Our office administers the Granting Unserved Municipalities Broad Band Opportunities (GUMBO) grant program. This money is $176 million and comes from the US Treasury Department. “We expect to impact around 88,000 locations with this money.”

GUMBO has been made available to Internet service providers and electricity cooperatives. These companies must build within seven to 24 months, depending on the agreements signed, and some will build in multiple locations.

“They have until September 30, then the clock starts turning,” Iyengar said.

GUMBO awards went to Cable South/Swift Fiber and Cable South to Allen Parish; AT&T and CSC Holdings in Beauregard Parish; At&T, Brightspeed and AOP in the parish of Calcasieu; AOP in the parish of Jeff Davis.

According to their website, Brightspeed will take over CenturyLink’s phone and internet business in 20 states. AOP is ahead of the game and last month announced its work in Lake Charles in the American press.

“For us to tap into the bipartisan infrastructure bill, we need to submit an initial proposal and five-year plan to the National Telecommunications and Information Administration at the US Department of Commerce,” Iyengar said.

Access is only part of the plan to bridge the state’s digital divide. Affordability, literacy and getting devices on site are other goals.

Iyengar and his team organized stakeholder meetings across the state in villages as well as major metropolitan areas. He says the outcome, to some extent, will rest on the shoulders of communities and especially community stakeholders such as government and public safety officials who show up at these meetings and agree to do what they can to ease the way to business. Community members can help identify pockets of unserved and underserved communities. “In three or four weeks we have a meeting scheduled in the parish of Beauregard,” he said.

Everything seems to be fine except for two caveats noted by Iyengar. New funding funds/services/programs cannot be used in areas already receiving federal broadband funds – maps released later this year will specify these locations – and there is a protest process in place for current companies.

Current broadband internet providers are blocking 19 grants, totaling $86.6 million, and there’s no timeline for resolving the protests, which hinge on whether the areas applicants say they want to serve are already served, according to an Aug. 29 Business Report article. by David Jacobs. This is why the maps are being developed.

A trained workforce is also a challenge, but plans are in place for that. Michelle McInnis, senior vice president of the Southwest Louisiana Economic Alliance, said the alliance has been meeting with vendors in the region to try to help with the workforce, another part of the challenge of rolling out the program in the areas most needed as soon as possible.

“We will be asking training providers in our region to come up with a training program for the technicians and installers that will be needed, as well as the initial contractors who will actually perform the labor-intensive heavy equipment operations. and underground facility,” McInnis said.

According to the FCC, the definition of high-speed Internet is a minimum of 25 Mbps download and 3 Mbps upload speed. Broadband provides high-speed Internet access through multiple layers of technologies, including fiber optic, wireless, cable, and DSL satellite.

Stakeholders, such as government entities, ISPs, school boards or private companies who wish to partner with the office on issues of access, affordability and digital literacy, can contact ConnectLa at connect @la.gov or call 225-219-7594.

Use these steps if you’re having trouble clearing personal loans


Recently, I hosted some friends at my home. One topic that quickly took up most of our chat time was the pros, and of course, the cons of having so many downloadable loan application software floating around in the ether.

During this conversation I revealed how I had to access a personal loan from one of them and although the interest rate was, in my opinion, unreasonably high, at the moment i announced that i paid it back quite easily, a friend of mine looked surprised and commented with an almost high-pitched exclamation, “How could you pull it off so easily?”

I asked him, “Withdraw what? Take the loan or pay it?”, he replied to the latter of course, to which I gave him a confused look. He then complained that he was so in debt to two applications, family and friends, that he could no longer go to either for a line of credit to cancel any loans outside of his usual pay, especially from one of the apps that had already started issuing late payment penalties.

This was really confusing to me and my other friends, as we had always assumed that this friend was not only quite well off, but had a bigger and more consistent stream of income than the rest of us. Further investigation into why he was having such difficulty repaying not just one, but multiple loans, sheds some light on what his challenges were. And while some may consider this a trivial subject, it’s important to note that, like my friend, many are struggling with the pressure of loan repayments and may need some of the advice this article may have to offer. So, without necessarily disclosing my friend’s private affairs, we are going to think seriously about personal loans, and above all, how to make them easy to repay.

Applying for a loan or otherwise, we’ve all had one need or another, requiring a quick financial solution, and in more cases, than it took to access any kind of credit facility, no matter what. The source. To be clear, there is no crime or shame in taking out a loan or accessing a personal credit facility, the challenge is almost always, not the interest rate or its duration, but how we use the loan and the repayment itself.

The news continues after this announcement

Now, from a purely business perspective, and if you’re even a little familiar with how accounting works, you should understand that the moment you accept a loan, personal or otherwise, this facility goes on someone else’s books as an asset since you are now indebted to that institution or person not only for the loan, but also for the interest to be incurred on it. Likewise, this loan enters your own books as a liability, regardless of the good intention of your use of the funds, and for the same reason.

Passives are always a pain, and it’s best to get rid of them as quickly as possible to avoid incurring further passives, mostly in the form of penalties or worse, foreclosures. A good reason is that they prevent us from achieving other, sometimes more important goals, and on a more psychological level, it just helps you sleep better at night. So here are some strategies to consider when considering repayment plans that could help you clear your personal loans faster.

Do you really need to take this loan to start?

Although this is a slight deviation from the actual topic, this should be the very first step to accessing a personal loan. Ask yourself the all-important question if, to begin with, you really need to take it. Having easily liquidated savings or wealth answers this question very quickly. Obviously, the more money you can set aside for a rainy day and resist the temptation to steal very often, especially on non-essential things, the more, if not more, you’ll have when you really do. need. Thus, you must learn to adopt a strict savings culture and even if you earn a salary today, ask yourself a crucial question before accessing a loan, “Let’s say I lose my job tomorrow, have- I have enough reserves to repay my debt, and over the agreed period?” If the answer is “yes”, then by all means, however, if the answer is “no”, then hope does not is not a strategy you should rely on to pay off your debts.

The news continues after this announcement

It’s time to change your lifestyle

It’s easy to think that if your answer to the above question about being able to easily repay your loan means business is business as usual, then think again. Murphy’s Law states that “if something can go wrong, it will…”, and as another common saying goes, “even the best-laid plans sometimes go to extremes”. Accessing a loan means you have to discipline yourself enough to understand that until the debt is paid, you should keep luxury spending at bay. Even if you take out a personal loan for a luxury vacation, as soon as you answer yes to the question of whether you can repay the loan if something goes wrong, you should immediately seek to erase that liability from your books by reducing any other excesses. , yes , even cable, Netflix subscription and restaurant meals, until the current debt is paid, and in full.

This way, not only will you have more confidence in your eligibility to access another loan, but if the need arises, your creditors will also be willing to grant you another line.

Try to pay more than the minimum payments, and regularly

Before accessing a loan, always be sure to check whether you have a prepayment break or bonus. While some lenders charge penalties for prepayments due to interest payment charges they stand to lose if they no longer have your loan as an asset on their books, most of them appreciate more than well and even offer rewards for it. So if, for example, your loan is to have a repayment period of 30 days, rather than waiting until the very last day and minute to repay, break it up into blocks of 4 weeks and allocate a minimum amount to be paid to a particular day of each week then add a little something on top of that. So on the day of last week, you pay less than the previous weeks. The same strategy can also apply if you are indebted to an individual even without an interest rate tied to the credit terms.

Look for ways to earn extra income

Let’s face it, the main reason you had to access a loan in the first place was that your current income simply didn’t match your financial needs at the time. If you’re the type that doesn’t like being limited in particular on what and how you spend money, it might be time to increase your revenue stream by a pipeline or two. Several articles on this site have been exhaustive on this subject, so we will move on…

Do not use one loan to repay the other

As tempting as the idea may seem at first glance, in more than one case, taking out one loan, interest-free or interest-free, to pay off another, simply leads to sinking deeper into more debt and more headaches. head than at the start. In some foreign cases this may be an acceptable step to take, but don’t make a habit of it, remember, “even the best-laid plans…”

Consider the “snowball” method of paying off debt

This is a great tactic if you have more than one loan to repay. This usually involves starting with your smallest loan, paying it off, then rolling that same payment schedule over to the next loan, then working your way up to the largest. This method can help you build momentum as each balance is paid off and eventually, once you are debt free, you can finally start saving.

On the other hand, you can try the “Avalanche” method

The Avalanche method focuses on paying off the largest loan, especially with the highest interest rate first. Similar to the Snowball method, when the higher interest rate debt is paid off, you put that same money towards the next high interest rate loan and so on until you are done. Focusing on loans that are more expensive to carry, in the long run, would effectively mean you would have to pay less over time and eventually have more to appropriate.

Refinance your loan if you have to

If it becomes clear that you still can’t meet your loan deadline, it may be time to discuss refinancing terms with your creditor and ask for an extended repayment term. Be warned, however, despite the extended period, refinancing also carries heavy interest charges.

Restructure your debt if you have to

Unlike refinancing which simply gives you an extended repayment period on your loan, it not only helps you negotiate an extension but also a lower interest rate. Be warned that this is however only accepted by creditors, in more than one case when it has become clear that insolvency is imminent, in cases such as you lost your job or other scenarios. Creditors will give you time to get your affairs in order, but for a slightly longer term and will only reduce the previously agreed interest rate when they have to.

Drop the old cargo

We sometimes have things or items of some value that have been lying around our homes or office for some time and with no apparent use. Auctioning these old items is also a great strategy for raising enough money to offset your debt without necessarily having to rely on payday to come to your rescue. Plus, it’s a good way to declutter your surroundings while you’re at it.


There have been several laudable initiatives by regulators and financial institutions to promote inclusion in our financial ecosystem, such as digitizing access to credit facilities. In a way, this is a good thing because it increases our awareness of loans and other financial matters. Above all, however, responsible borrowing must be ingrained in borrowers to help them build a healthy credit score and a balanced life, without being overly dependent on borrowing.

Borrowing, especially on the now popular online creditor apps, certainly helps you meet some short-term priorities, even if your current financial situation may not be up to scratch, but it also means properly assessing your needs and your ability to repay, before you even take the loan, then by adhering to the simple practices above to help you stay on schedule when it comes to clearing your loans without anyone knocking on your door or not. ‘call your friends and loved ones to report your credit default.

Essien Brain is a business consultant, with expertise in digital marketing, crowdfunding, pitch decks and business plan/proposal formulation and design.

[email protected] +234703-444-6041

Ministry of Health issues mandatory restriction on burning wood due to air pollution from wildfire smoke


September 10, 2022

Smoke from wildfires in Idaho, Washington and Oregon blankets the Portland metro area, leading health officials today, Saturday, September 10, 2022, to release a mandatory wood burning restriction for residents of Multnomah County. This restriction does not apply to the kitchen. Exemptions are available for people in emergency situations.

The air quality burning restriction comes into effect at noon today and will be lifted when conditions improve. Air quality advisories are posted on multco.us/woodsmokestatus. Conditions should improve on Sunday.

The restriction comes with the The Multnomah County Fire Defense Board has issued burning bans for fire safety and an air quality advisory from the Oregon Department of Environmental Quality that says Multnomah County may experience periods of poor air quality through Saturday.

This is the fifth warm season wood burning restriction – also known as a red day – since the Multnomah County Board of Commissioners extended the county’s wood smoke abatement ordinance all year in February 2022, and the first this year due to wildfire smoke and particulate pollution. The others are due to ozone pollution levels on hot days.

While most of Multnomah County is currently in the moderate Air Quality Index (AQI) category, conditions are expected to worsen this Saturday afternoon as temperatures rise, before get some relief Sunday noon. Air quality could reach AQI levels of unhealthy for sensitive groups (orange) and unhealthy for all (red).

For more information on cool places to stay, visit Help for when it’s hot. Protect your health and reduce pollution.

Red Day Advisory Dial, Spanish.

People at risk

Those most at risk of complications from smoke exposure are pregnant women, children, people with pre-existing heart disease, people with chronic lung disease, and the elderly.

People who work outdoors are also at high risk. For those who must work, wear a properly fitted N95 mask and take breaks inside a structure or even in your car.

what should you do

Stay indoors with windows and doors closed (temperatures permitting). If it’s too hot inside, seek cooler indoor air.

  • Avoid spending time outdoors and avoid strenuous outdoor exercise.
  • If available, set AC to recirculation, use an air purifier with a HEPA filter, or build your own air purifier.
  • Avoid being on the roads if visibility deteriorates.

Monitor the air quality near you:

  • The Oregon Department of Environmental Quality has a phone app to track air quality.
  • If this seems overwhelming, you can find more links to air quality maps below or on our website.

When the air quality improves (AQI yellow or green), even temporarily, ventilate your home to reduce indoor air pollution. People living in homes where it is too hot to stay indoors with the windows closed or who are at risk of smoke-related health effects should seek shelter elsewhere.

Know the Symptoms

The most reported wildfire smoke symptoms include scratchy throat, itchy or watery eyes, stuffy nose, sinus irritation, coughing, difficulty breathing, and fatigue or dizziness.

Mild symptoms of smoke exposure often include:

  • Cough
  • Headache
  • burning eyes
  • Sore throat
  • Production of phlegm
  • Changes in breathing

Dry cough, sore throat and difficulty breathing are common to both wildfire smoke exposure and COVID-19. Contact your doctor if you think you have symptoms of COVID-19. But exposure to smoke can also cause severe and life-threatening respiratory distress, including heart attacks and strokes. If you are in distress, you should immediately dial 9-1-1.

Measure air quality

Wildfires and smoke swept across the west coast. Some air quality monitors may have lost power. Web air quality systems can periodically become overwhelmed with traffic, causing web maps to load slowly or not at all. To find air quality information, visit:

  • Oregon Smoke Blog: Local, state, tribal and federal organizations are coordinating to share information about wildfires and smoke.
  • Oregon Air Quality Map: The state Department of Environmental Quality maintains a current air quality map. Due to high traffic, the site may slow down or crash. The sites below offer good alternatives.
  • EPA Air Quality Map: The US Environmental Protection Agency pulls real-time air quality data from the states of Oregon and Washington.
  • Oregon State Fire Map: The Oregon Office of Emergency Management is updating a map of active fires, air quality and closures.


If you can’t access AQI information, the Oregon Department of Environmental Quality shares this Visibility index 5-3-1 to help estimate smoke levels:

  • Five miles: Air quality is generally good.
  • Three to five miles: Air quality is unhealthy for young children, the elderly, pregnant women, and people with heart or lung disease, asthma, or other respiratory conditions.
  • Less than three miles: the air quality is unhealthy for everyone.
  • Less than a mile: the air quality is unhealthy for everyone.

Your body

Healthy people affected by smoke may have only mild symptoms. But healthy people can also have underlying health conditions that put them at risk. Listen to your body’s signals:

If your eyes are burning, your throat is sore, your lungs are struggling to expand, if you are coughing, stay indoors and focus on creating a “clean room” where air is the as clean as possible.

Wood burning offenses

To report a fire and have it put out, call 911. To report a suspected violation of a mandatory burning restriction and smoke from a recreational fire, contact Multnomah County Environmental Health:

Stay informed of wood burning restrictions:


United States registers 1 millionth organ transplant


September 10, 2022 – The United States recorded its 1 millionth organ transplant on Friday, 68 years after a man donated his kidney to his identical twin for the nation’s first organ transplant.

The milestone was announced at 12:50 p.m. Friday by the United Network for Organ Sharing, the nonprofit that has a government contract to run the country’s only transplant network. UNOS did not specify which organ was transplanted or provide other details.

The number of organ transplants has steadily increased since the first liver transplant in 1954 at Brigham and Women’s Hospital in Boston, Massachusetts, according to UNOS.

In 2021, 41,350 transplants have been performed, surpassing the 40,000 mark for the first time, and 22,414 transplants have taken place so far in 2022. Over 500,000 transplants have taken place since 2007.

UNOS has been criticized for the ineffectiveness of its programs.

In August, US members of a US Senate committee said UNOS was doing shoddy work tracking organ donations and transplants, an issue that hurts the poor and minorities the most and has caused deaths among people awaiting transplants, the Washington Post reported.

US Senator Elizabeth Warren of Massachusetts said UNOS should be replaced.

“You should lose this contract,” Warren said. “You shouldn’t be allowed anywhere near the organ transplant system in this country.”

In a statement to The Post, UNOS said it was upset with the findings but remained “committed to working with Congress to improve the system, which saves more lives every year.”

A study published in the Journal of the American Society of Nephrology stated that many donated kidneys are unnecessarily discarded. The kidneys are the most requested organ for transplants.

UNOS says it has launched an initiative to make transplants more accessible to minorities and to use improved technology to track harvested organs and keep donated organs available longer.

Build an image classifier to sort images


Learn to organize and differentiate images using computer vision algorithms

Learn to organize and differentiate images using computer vision algorithms

A picture is worth a thousand words. This may be the reason why the number of images stored on our devices has increased significantly. Don’t we all recognize the trend of using an emoji instead of an overly long text response, making services like SnapChat, Instagram, and TikTok one of the most popular internet platforms.

Organizing these images on our devices can be tedious, which is why cloud-based storage platforms from Google and Apple offer automatic image sorting. These are driven by advances in computer vision algorithms, particularly developments in machine learning (ML) methods. In this tutorial, we will try to create a simple image classifier and run it on a local computer with Python installed. Just to make it more interesting, we’ll try to distinguish jalebis from samosas!

Data extraction

The starting point of any ML model development is to get well-organized data. Data for the purpose of this tutorial can be downloaded from the link here. Once the data is downloaded locally to your computer, try to extract the archive in such a way that the folder structure is preserved. You should see the following content in the folder.

Browse the contents of the data folder and you should see two more folders with the names of the foods we’re trying to categorize. Additionally, the folder also contains the Python code in the form of an interactive Python notebook (ipynb), which the reader can modify for future projects. Inside the data folder there are images of jalebis and samosas, which have been crawled from the web released under the Creative Commons license, allowing us to work with them.

Make the dataset

Now that the data has been downloaded, we will start using the Python program to build the image classifier. The recommended environment for this project is the Jupyter-Lab Python environment, but more advanced users can use any other integrated development environment. Once in your preferred Python programming environment, load the initial libraries needed to read and view images. Browse the folder where the content of the downloaded archive is located.

It should be noted that JPG images are stored as digital arrays and each number represents the intensity of that pixel. Usually 0 intensity corresponds to black and 255 corresponds to white and all numbers in between capture all 256 shades of gray. For color images, there are three channels corresponding to the red-green-blue (RGB) content of the images.

By using the Matplotlib library image reading and viewing packages, we can visualize the different channels of the images.

We will need to standardize these images, for which we will use the amount of RGB content in each of the images to describe them to the algorithms. So the dataset we create will resize all of these images to a fixed size and calculate the average amount of RGB in each image. Thus, each image will be represented using only three features.

Since computers cannot fully understand what jalebis and samosas are, we will use numbers to represent their labels. For example, a jalebi can be worth 0 and a samosa can be worth 1.

The final step in creating the dataset is to stack the two classes of data into a single array. This is a requirement for the ML framework that we will use in the next step.

We can now visualize all the jalebis and samosas in the average RGB feature space. Each marker in this plot captures the amount of R, G, and B content in these images. (see below)

Training an image classifier

Now that our dataset is ready, we can train a simple image classifier to automate the detection of jalebis and samosas. We will be using the Scikit-Learn Python package, which has a comprehensive set of tools and algorithms that can be used for ML.

The first step in training an ML algorithm is to split the data set for training and testing purposes. As the name suggests, the training set is used to train the ML algorithm and the test set is used to test the performance of it. Performance on the test set is more representative of how the algorithm will perform on new real-world data. We use 75% of the data for training and the remaining 25% for testing.

The next step is to load the Scikit-Learn Python modules that will be used to initialize our simple classifier. Here we will use the simplest of the logistic regression based classifiers. This classifier is constrained as a linear classifier and can be restrictive. However, these models can also be very useful and for this tutorial we will limit ourselves to using such linear models. We will initialize the logistic regression classifier, train it on the training set, and test it on the test set.

For this training-test randomization, we get about 70% training accuracy and 77% test set accuracy. It should be noted that these figures can vary considerably due to the random nature of the mixtures of data and the initial parameters of the model.

Once you have trained a classifier, we can use the trained model to make predictions on new data. The logistic regression classifier predicts a score for the likelihood that it thinks a certain image belongs to a certain group. This can be considered a probabilistic score.

And then ?

For now, we have explored the procedure to build a simple image classifier that can distinguish jalebis from samosas. Using this model, one can build more sophisticated algorithms. Simple extensions to this project could be to include additional food categories or try more complex algorithms. For the latter, Scikit-Learn has well documented algorithms with examples and could be a starting point.

Raghavendra Selvan is Assistant Professor in the Department of Computer Science at the University of Copenhagen

Google court documents show users who opt out of tracking are still being monitored


Newly published documents in the Arizona Attorney General’s lawsuit against tech giant Google reveals more details about the company’s response to reports about its privacy policies and how the IP addresses of users of Google are used to obtain exact location information.

The case of Attorney General Mark Brnovich, filed in 2020, is part of a larger investigation that has been going on since at least 2018, after a Associated Press Article revealed that some Google apps store location data without asking, and deleting the data is a time-consuming process. AP found that Google Maps, for example, creates a snapshot of where users are every time they open the app, even when location history is turned off.

Get morning headlines delivered to your inbox

The current case has been strewn with pitfalls redaction and sealing of documents.

Last year, Google and the attorney general agreed on a special discovery master, or SDM, an outside person who would oversee the discovery process and resolve any disputes. During the SDM discovery process, the state had 30 hours of witness depositions and more than 200,000 pages of documents produced, according to the court ruling.

The original lawsuit filed by the Attorney General included 270 exhibits, only one of which a small part has been made public. Some of these documents highlight certain issues such as Google’s own engineers being confused by their privacy settings and how Google’s apps location information shared with other apps.

The newly released documents are testimony from state and Google experts who were under protective orders and “in the eyes of an attorney only.” The documents contain excerpts of testimonials from Google employees as well as internal emails discussing the location history and app and web activity settings at the heart of the controversy in the AP article.

The documents also detail a Google tool called “IPGeo” which, according to a 2009 presentation obtained by the Attorney General, is designed to “predict users’ locations from their IP addresses by improving ways to leverage available data, and provide this knowledge to all Google products.”

The Attorney General’s office also found a privacy notice attached to the presentation of the tool.

“You have no idea how incredibly confidential this one is,” the notice reads. “My my, it’s confidential. I am not joking. Imagine an article titled “Google knows where you live because it spies on you” in the NYT. You have been warned.”

One of the state experts, Jennifer King, chief privacy and data policy officer at Stanford University, said the tool is used specifically by Google and tracks its users regardless of their settings. It also turns those who choose to accept whereabouts reports into “reporters” of those who chose not to participate.

“Users who report their location are essentially co-opted by Google to determine the location of nearby users who haven’t reported their location,” King said. “Furthermore, despite the different settings, there is no ‘opt-out’ and there is nothing users can do to prevent Google from doing so.”

Google’s own employees have also begun to question how the company characterizes location history settings when using this tool, according to internal emails.

Former software engineer Blake Lemoine made headlines earlier this year when he said he believed Google’s LaMDA AI can be sentient. It was later fired by the company but he also expressed concerns about how the company presented location information to “father of the internetand Google’s chief evangelist, Vint Cerf.

“[L]Location information derived from IP addresses is an inescapable part of the internet, so we don’t need users’ permission to use it,” Lemoine said in his email to Cerf. “I believe the level of accuracy of our IP Geo system is far beyond anything achievable based solely on the location information inherent in IP addresses. I believe we are misleading users by telling them that they can disable location and then spend millions of dollars inferring their location in other ways… I feel like we’re lying to our users by giving them a permission setting that we find a way around.”

Cerf responded by saying that Lemoine “argues that we seem to be tracking even when users have turned off what they think and what we imply are tracking mechanisms” and that he was shocked that the company had “created a date, time, location and route calendar for 18 months” of his movements which he only found out when someone told him to watch the Google Maps Timeline.

After the AP article was published in 2018, Google employees also expressed fear over the backlash, with one saying some at the company were starting to “freak out that this could be our Cambridge moment.” Analytica,” referring to how The private data of 87 million people was collected on Facebook by the British firm.

In documents obtained by the Attorney General’s office and discussed by an expert witness Colin Grayassociate professor at Purdue University, a Google employee expressed confusion and fear about the company’s device location settings.

“So there’s no way to give away your location to a third-party app and not Google? That doesn’t sound like something we’d want on the front page of the NYT,” said Jen Chai, product manager for Android. .

Gray is an expert in what is called “dark patterns, user interfaces that trick, coerce or manipulate a person into agreeing to its terms. The phrase has attracted increased attention lately, as the Federal Trade Commission has been investigating amazon and its use of ambiguous language during registration and cancellation. Internal documents obtained by Business Insider showed that employees knew they were deliberately confusing consumers.

“First, Google uses dark models using confusing terminology that forces the user to understand that location data is not only contained in location historysaid Gray in his report. “Second, using the default opt-in for (Web and App Activity) automatically tracks users’ location data, possibly without their knowledge.”

Gray also added that even if “all settings on an Android device were turned off, Google would still collect a user’s location data through IPGeo” and another tool whose name was removed from the documents. Both of these tools work independently of settings.

Google hit back at the state and its experts by citing that its privacy options have always been open and transparent, adding that Gray’s methodology lacked scientific rigor.

“I do not observe any confusing, indistinct, misleading, manipulative or misleading element in the way these screens have been arranged,” said Donna Hoffman, professor of marketing at the George Washington School of Business. “Rather, the screens provide users with control over the choices they may wish to make as they navigate through numerous settings options.”

Hoffman argued that “the location history toggle is an opt-in account-level feature service, not a primary location setting for the device” and that information for users looking for a deeper understanding of how their data might be used can find it in Google Privacy Policyadding that including information on specific tools would harm confidential information.

“This level of disclosure may threaten the security of the intellectual property of Google (and possibly other companies), and certainly exceeds the level of detail required by smartphone users to be aware of and make informed decisions about settings. related to location on their smartphones,” Hoffman said.

Hoffman also claimed that when consumers encounter an app that offers a high level of value, they are “increasingly willing to reduce privacy.” Hoffman also gave more details about a meeting, called “Oh shit-which took place after the AP story was published.

“As for the so-called ‘Oh sh–’ meeting that Dr. Gray apparently attaches so much importance to, it is my understanding that this was a regular weekly meeting on press events and other elements related to communications that continue to this day,” Hoffman said. “These meetings are consistent with Google’s culture of customer-centric innovation and constructive use of feedback.”

“Your name came up today at our Monday morning ‘Oh Sh–’ meeting in relation to this story,” said an email sent to Google’s entire communications team. “Communications and Policy is looking for an update on where we are in terms of fixing ‘location history’ fixes and having 1 place to disable instead of 3.”

The company also had a series of reports who tracked how the AP story was seen and shared on social media and noted that “100%” of the coverage was negative.

“Privacy controls have long been built into our services, and our teams are constantly working to discuss and improve them,” Google spokesperson José Castañeda said in a statement emailed to Google. Arizona Mirror on the most recent version of the document. “In the case of location information, we have heard feedback and have worked hard to improve our privacy controls. As our experts have shown, the Attorney General continues to misrepresent our services and products.

On Thursday, Judge Timothy Thomason ruled in favor of the state to allow Gray to be an expert witness after Google tried to block his testimony and any references to “dark models”.

In the decision, the court found that “some of Google’s arguments were found to be fallacious” after the state contacted an academic cited by Google to question the use of dark grounds who responded that Google “misinterprets his article” and endorsed the validity of dark motives.

Late last year, a judge determined that the the case may go to trial but no trial date has been set.

easyJet receives full IATA IEnvA accreditation for its environmental management system


easyJet has received IATA IEnvA Level 2 certification, making it the first low-cost airline in the world to have a fully certified IATA IEnvA Environmental Management System (EMS). This follows successful IATA IEnvA Stage 1 implementation, assessment and certification earlier this year.

The IATA Environmental Assessment (IEnvA) program is a globally recognized assessment system designed to independently assess and help improve an airline’s environmental performance and it is closely aligned with the international standard for the ISO 14001 environmental management system. easyJet is the first non-IATA member to participate in the process.

IEnvA is a voluntary program helping airlines to identify, manage, monitor and control their environmental issues holistically. It commits airlines to meeting their environmental obligations and continuously improving their environmental performance.

Jane Ashton, director of sustainability at easyJet, said:

“We view sustainability as a holistic issue at easyJet, ranging from mitigating our direct carbon emissions from flying to managing the wider impact of our operations.

“I am truly delighted to have achieved this first for a low-cost carrier globally, with full IATA IEnvA accreditation further demonstrating easyJet’s continued commitment to continuously improving our environmental performance. “

Sebastian Mikosz, IATA Senior Vice President, Environment and Sustainability, said:

“I am particularly pleased that easyJet has partnered with IATA and trusts us to work with them to further improve their environmental management practices. easyJet’s recent full IEnvA certification demonstrates a strong commitment to environmental sustainability.

[i”Environmental sustainability is an existential challenge for the entire airline industry. IATA is proud to work with its member airlines, but also non-member airlines to introduce world-class environmental management practices to the aviation [/i]industry.”

At easyJet we are committed to continuously assessing and managing our impact on the environment, this includes the direct carbon emissions of flying, but also our wider environmental impact.

For example, we have already eliminated more than 36 million single-use plastic items used on our flights and we continue to ensure that any residual waste is recycled as much as possible, while always looking for more ways to take action. .

We also introduced new crew uniforms made from recycled plastic bottles. Forty-five bottles fit in each outfit – with the potential to save 2.7 million plastic bottles from ending up in landfills or the oceans over the next five years.

And, of course, we also take care of our direct carbon impact. Last year, we joined the UN-backed ‘Race to Zero’, committing to net zero carbon emissions by 2050 and set an interim target for improving carbon intensity. carbon emissions by 35% by 2035.

Making flying more sustainable has long been an easyJet priority – from continuous fleet renewal and efficient operations today, to proactive collaboration with industry leaders including Airbus, Rolls-Royce, GKN Aerospace, Cranfield Aerospace Solutions and Wright Electric, to accelerate the development of future zero-carbon technologies and the necessary infrastructure. For further information, please contact easyJet’s press office on 01582 525252, log on to www.easyJet.com or follow @easyJet_Press

About easyJet
easyJet is Europe’s leading airline offering a unique and winning combination of the best route network connecting Europe’s major airports, with great fares and friendly service.

easyJet flies more of Europe’s most popular routes than any other airline and carried more than 96 million passengers in 2019, including more than 16 million traveling for business. The airline has more than 300 aircraft on nearly 1,000 routes to more than 150 airports in 35 countries. Over 300 million Europeans live within an hour’s drive of an easyJet airport.

easyJet aims to be a good corporate citizen, employing locally contracted people in eight countries across Europe, in full compliance with national laws and recognizing their unions. The airline supports several local charities and has partnered with UNICEF which has raised over £14million for the most vulnerable children since its inception in 2012.

The airline takes sustainability seriously and, by joining Race to Zero last year, has committed to achieving net zero carbon emissions by 2050. With partners including Airbus, Rolls-Royce, GKN Aerospace, Cranfield Aerospace Solutions and Wright Electric, easyJet is working to accelerate the development of zero carbon aircraft technology. In the meantime, easyJet continues to renew its fleet, operates efficiently and aims to fill most of its seats. Since 2000, over a 20-year period, the airline has reduced its carbon emissions per passenger per kilometer by more than a third, and aims to reduce them further.

Innovation is in easyJet’s DNA – from its launch over 25 years ago, easyJet has changed the way people travel to today where the airline is at the forefront of the industry in digital, Web, technical and operational innovations to make travel easier and more affordable for its passengers.

This news content was set up by WebWire’s editorial staff. Linking is allowed.

Press release distribution and press release distribution services provided by WebWire.

King Charles is too political for the United States


The Queen, for her part, was widely considered the perfect envoy to America. She met 13 of the last 14 US presidents and understood “the personalities, the idiosyncrasies of the current government”, according to Robert Traynham, an adjunct professor at Georgetown University who has studied the Queen and US-UK relations. She took horse fanatic Ronald Reagan for a long ride during his visit to England, sent Dwight Eisenhower a recipe for ‘drop scones’ (Scottish pancakes) after he enjoyed them at Balmoral – and even attended a game baseball for the first time with lifelong baseball fan George HW Bush. Barack Obama said she was “really” one of his favorite people.

The Queen not only courted presidents, she bewitched the American public, despite the fact that Americans fought a war to free themselves from the tyranny of British rule two centuries before. She has had consistently high approval scores in polls – 72% of Democrats and 68% of Republicans said they had a somewhat or very favorable opinion of the monarch in a May 2022 YouGov poll. royal institution as a whole: Americans loved ‘all the panoply and pageantry’ that surrounded the Queen, viewing her family as the ‘Royal Kardashians’, according to Stryker McGuire, former Bloomberg and Newsweek editor who wrote on Britain’s post-Elizabethan identity.

A critical element of this appeal is the family’s “permanent celebrity” status. “Celebrities come and go, pop stars disappear; artists, TV stars, movie stars are fading,” says James Vaughn, a historian of Britain at the University of Chicago.

“But the royal family persists.”

As well as inhabiting the rarest layer of fame, the Queen appealed across the Atlantic because she could – and did – stand firmly above the political fray. Among Americans, there is a “sly admiration for the fact that British politics separates the head of state and the head of government,” says Vaughn. “In England the monarch lives in a palace but the prime minister lives in a townhouse on Downing Street. Our White House looks more like a palace than a townhouse and our President can act more like an imperious king than any prime minister ever could,” adds Elisa Tamarkin, author of Anglophilia: Deference, Devotion, and Antebellum America. “The monarchy in England is only for show.”

Indeed, the Queen took this role as head of state “very, very seriously,” says Vaughn. Oyster-like in refraining from controversial comments, the Queen looked like a “blank slate”, adds Mcguire. “The thing about blank celebrity slates is that the fan can write just about anything they want on that slate. […] They can identify with that person as they wish.

Elizabeth’s eldest son Charles, meanwhile, has spent decades in decidedly political territory, cultivating a résumé of progressive projects often centered on the climate. Aged 21, he gave his first major speech on the subject at a campaign conference in Cardiff, drawing attention to the threats of pollution, plastic and overpopulation. It was 1970, long before environmental concerns became mainstream political topics of discussion. (He later said that others at the time saw him as “completely drunk”.)

He has since progressed to bigger stages. In 2008 he addressed the European Parliament, telling MPs that “the doomsday clock of climate change is ticking” and called for “the greatest public, private and NGO partnership ever”. He spoke at COP21, COP26 and the 2021 G-20 meeting in Rome, imploring leaders to listen to the “desperate voices of young people”. At the 2020 World Economic Forum meeting in Davos, he launched the Sustainable Markets Initiative, an effort to incentivize businesses to adopt sustainable practices. The list continues.

Charles’ legacy is also reflected in the extensive network of charities he oversees. The biggest is The Prince’s Trust, which helps at-risk young people aged 11 to 30 gain education and career opportunities. Idris Elba was one such beneficiary. As a youngster growing up on an estate (public housing) in Hackney, London, he received a £1,500 grant to train as an actor with the National Youth Music Theatre.

This commitment to environmentalism and charity work is as impressive as it is politically incongruous: there is the loud and proud progressiveness of its public efforts. And then there is its history of extreme wealth as part of an institution steeped in traditionalism and a low-key culture of “never complain, never explain” – a phrase adopted by the Queen Mother.

Indeed, the prince’s political activity has not avoided scrutiny: in 2005, Rob Evans, a left-leaning Guardian reporter, submitted a freedom of information request to see the letters Charles had sent to government ministers in the previous period. two years. After a decade-long legal battle and government expenditure of £400,000 to block the circulation of letters, the cache of so-called ‘black spider’ memos has been released, exposing Charles’ lobbying on matters ranging from a better equipment for Iraq war troops to denounce the ‘illegal fishing of Patagonian toothfish’.

Despite this scrutiny, Charles’s recent invitations to major global political summits signal a growing acceptance of the monarch-activist approach. Yet that doesn’t say how well he will be received by Americans – a people who have deified the Queen specifically for her charming approach to diplomacy, who are more strongly divided than the British public on Charles’s issues like the climate and who demonstrated still low approval for the former prince (nearly half of Americans were said to have an unfavorable opinion of Charles in a February 2022 poll).

Much of that antipathy is a hangover from the much-publicized collapse of his marriage to Diana – who was much loved in the US – rather than the adversity of his politics, royal watchers say. But that animosity could grow if he continues to be so outspoken now that he’s king. “He would lose that shield of being a head of state above the fray,” Vaughn says, particularly because his mother “played it perfectly.”

It’s also possible that Charles could be used as a political weapon in America if “anti-environmental forces decide to attack him,” says Brian McKercher, author of Britain, America and the special relationship since 1941. He could be “a handy cudgel to hit a Democratic administration, or even a Republican administration, that wanted to do environmental things. I think it’s very possible.

Charles’ calls for environmental action might be heard differently in Britain and across the Atlantic. This is because the American public is relatively skeptical of climate change: while 51% of the British public believe the climate is changing and that human activity is mainly responsible for it, only 38% of Americans are agreement, according to a 2019 YouGov survey. Similarly, 15% of Americans think the climate is not changing or that it is changing but human activity is not responsible, compared to just 5% of Britons.

“The United States is one of a series of countries that have a pretty extreme polarization on this issue. Countries like Canada, the UK and Australia also have some polarization, but not as extreme,” says Matto Mildenberger, associate professor of political science at UC Santa Barbara. This is also highlighted on party agendas: half of Tory backbenchers are now part of the Conservative Network for the Environment, a group that supports ‘net zero, nature restoration and safety Resource”. In the United States, by contrast, fierce congressional polarization means Republicans generally oppose legislating to prevent climate change.

In this context, Charles is likely faced with a choice between his climate policy and the bipartisan popularity of the type his mother enjoyed in America. He tried to modernize the monarchy and make it influential and relevant to political concerns, Tamarkin says. “But the attachment to the monarchy – and whatever social and cultural role it plays – has depended on its historical irrelevance in these respects. Charles can help draw attention to important political issues, but this could come at the expense of attention and interest in the monarchy itself.

In the end, that might be a moot point. Despite decades of environmentalism in his shadow, Charles hinted that he would change course as king. In a 2018 documentary, he was asked if he would continue his militant ways. “I’m not that stupid,” he replied. “You cannot be the same as the sovereign if you are the Prince of Wales or the heir.”

When it comes to the powers of the British monarch, there is centuries-old precedent for the head of state to remain politically neutral. Although there was no law prohibiting the Sovereign from voting, the Queen stuck to convention and never filled in a ballot. The signing of the Magna Carta in 1215, followed by laws such as the Bill of Rights of 1689, spawned a constitutional monarchy limited by the democratic will of parliament. Although the Head of State still has to give Royal Assent before a bill becomes law, this is seen as an exercise in rubber stamping and has not been held back since Queen Anne swore it off. made in 1707.

King Charles therefore has limited real political power, and is unlikely to overstep the bounds. “I have no worries, no worries that […] King Charles III will rule as anything but a constitutional, democratic and legitimate monarch,” Vaughn said. However, Charles still retains lobbying power: the Head of State and the Prime Minister hold private meetings, called Audiences, on a weekly basis. As Vaughn sees it, “the question mark would be: Would he try to use his role in the unwritten constitution to have more influence on policy and thinking on 10 Downing Street than his mother probably did. ever been willing to try to do that?”

Naturally, Charles’ leadership of public work – rather than behind-the-scenes lobbying – will matter most in how he, and the monarchy as a whole, are perceived in Britain and around the world in the future. . In the United States – where “The Crown” was a must-see TV and tens of millions of people watched royal weddings – this septuagenarian activist could break the spell cast so carefully and diligently by his mother. For some, the nagging memory of his association with Diana will fade, replaced by a celebration of progressivism on such a visible stage. For others, the attraction of the royal family lies exclusively in its theater: the mirage of power, drama and opulence existing at a distance from politics. For these Americans, the fairy tale is – most likely – dead.

2022 The State of the Humanitarian System (SOHS) – World



The fractured international community is compromising the delivery of humanitarian aid, leaving hundreds of millions of people facing cascading crises of conflict, COVID-19 and climate disasters

  • The breakdown of trust and cooperation within the international community disappoints people affected by disasters and prevents aid workers from doing their job

  • International agreements are flouted globally, compromising the ability of the humanitarian system to respond

A landmark study released today by ALNAP, a global network of humanitarian agencies, shows how war, hunger, climate change and the economic impacts of COVID-19 have combined in unprecedented ways to plunge more than 250 million people in crisis by 2021, doubling the number of people in need of help in just 5 years.

A lack of coordinated global leadership encourages several national governments and armed groups to deploy outright physical violence or insidious tactics of threat and obstruction to prevent the delivery of impartial humanitarian assistance. Attacks on aid workers have increased by 54% between 2017 and 2020 and local aid workers regularly face intimidation and threats of physical violence.

The state of the humanitarian system 2022 combines new and existing data to provide a comprehensive overview of humanitarian needs and assistance to people facing crises around the world. It shows that the need for humanitarian aid peaked between 2018 and 2021, peaking in 2020 due to the COVID-19 pandemic.

While funding for humanitarian aid reached an estimated $31.3 billion in 2021, almost double what it was a decade earlier, aid organizations were only able to reach 46% of people identified as needing help.

Conflicts, which have risen from 82 in 2010 to 175 in 2020, are preventing aid workers from doing their work and leading to the highest number of refugees and people fleeing violence ever recorded. Even before Russia’s invasion of Ukraine, around 80 million people worldwide had been forced to flee their homes due to conflict or climate change, the highest number on record. The majority of them – more than 53 million people – were internally displaced, and although disasters remain the main cause of internal displacement, in 2021 conflict-induced internal displacement has reached its highest level in a decade.

Drawing on surveys and interviews with humanitarian practitioners in countries around the world, the report shows how conflict situations force humanitarians to compromise on their principles of humanity, impartiality, neutrality and accountability. independence in order to reach those affected by the crisis. As a result, people affected by the crisis in several countries say they are not receiving enough support, and some feel left behind by the international community. There are examples of intelligence officials checking lists of relief recipients and of governments expelling or suspending agencies if they report abuses. Aid workers said they had to choose between providing aid only to people living in territory controlled by specific factions or providing no aid at all.

Speaking at the global launch of the State of the Humanitarian System Report in Nairobi today, Dr Asha Mohammed, Secretary General of the Kenya Red Cross, said:

“With the increase and complexity of humanitarian crises around the world, the importance of increasing the role of local actors in addressing these crises cannot be overstated. Unfortunately, this report shows that we have fallen behind compared to the gains made during COVID-19 when a large part of the humanitarian response was provided by local actors The future of humanitarian work is local and for meaningful change to happen we cannot continue with cosmetic approaches. To reach the last mile and improve cost-effective approaches in a declining funding environment, we need to ensure local players are well positioned and supported.”

Alice Obrecht, co-author and head of research at ALNAP, said:

“We see the humanitarian system being directly threatened in countries around the world, and we cannot take multilateral support for international humanitarian law for granted. In the face of escalating conflict and the impacts of COVID-19 and climate change, crisis is becoming the norm. The world must renew its commitment to the global social contract, with respect for the rights of those affected by crisis at its core.

Sara Pantuliano, chief executive of global think tank ODI, said:

“The past few years have been characterized by global emergencies and this report provides us with the most comprehensive evidence to date of the consequences of a lack of international cooperation. If we continue as we are, the implications for everyone – where whether they are in the world, rich or poor countries – are disastrous; as the fuel supply crisis and the summer heat waves have shown, no one is immune to the impacts. need a new multilateralism to meet our common challenges.The humanitarian effort, while far from being the only source of support for people in crisis, is an example of humanity at its best. not help, but compassion and global solidarity.

Notes to Editors

1. About ALNAP’s State of the Humanitarian System Report

Humanitarian action can be a lifeline for people living through the worst that conflict and disaster can inflict. For those providing assistance and protection, the stakes could not be higher – and so the obligation to learn and improve is paramount.
For more than a decade, ALNAP’s State of the Humanitarian System (SOHS) report has supported this learning by providing a unique, evidence-based understanding of the system and its effectiveness for affected people.

SOHS 2022 examines the period from January 2018 to December 2021, a period that encompassed the global COVID-19 pandemic as well as multiple armed conflicts – and draws comparisons with previous editions to take a long-term view of trends, achievements and challenges in the humanitarian field. system.

Based on a huge body of evidence, including proprietary research with crisis-affected people and practitioners, SOHS addresses key questions about performance and effectiveness in areas such as hunger and death prevention , while giving a complete picture of funding, resource flows, personnel and agencies.

The full text of the 2022 edition will be available here on Wednesday, September 7.

2. About ALNAP

Established in 1997 following an international assessment of the response to the Rwandan genocide, ALNAP is a global network (of NGOs, UN agencies, Red Cross/Red Crescent members, donors , academics, networks and consultants) dedicated to learning how to improve response to humanitarian crises.

3. For further information please contact Rowan Davies on 07754 292920 // [email protected]

4. Additional information:

Recent years have seen major interconnected crises

  • Between 2018 and 2021, the number of people identified as in need of humanitarian assistance increased by more than 70%.
  • In 2020, only half of humanitarian needs were funded, a record high.
  • In September 2020, 51.6 million people were recorded as being directly affected by an overlap of floods, droughts or storms and COVID-19.

The problem of hunger and food insecurity is worsening

  • Between 2017 and 2021, the number of people facing acute food insecurity increased by 33%, from 124 million to approximately 161 million.
  • The system’s response to food crises is under-resourced and this situation is expected to worsen with the effects of the war in Ukraine.
  • In a survey of people affected by the crisis, food emerged as their most important need (cited by 38%), and these communities are also deeply concerned about the diversion of food aid through corruption.
  • Climate change alters the shape of hunger crises, making them slower to develop and more cyclical.

COVID-19 has dramatically increased the scale of needs while reducing the economic capacity to meet them

  • Economic shocks associated with COVID-19 have pushed an estimated 97 million people below the extreme poverty line.
  • In what the WHO chief called a “catastrophic moral failure”, rich countries failed to share COVID-19 vaccines equitably.
  • An uncoordinated response shows that there are pressing questions about the ability of global leadership to respond effectively to pandemics in the future.


A Spider-Man 2 Theory Directly Tied To Madame Web


The Spider-Man universe showed it could be a fun, street-level story filled with a collection of like-minded characters. However, it could also be a much more complex world that spans the multiverse and could even be the deciding factor in the fate of all realities. No matter what a member of the Spider family does, it’s clear that all points go back to Madame Web. That said, it might now even apply to the movie franchise thanks to a new theory.

The next Madame Web The film will likely see Julia Carpenter take up the torch and also show how she could impact her universe’s Spider-Man and many others. According to the Reddit theorist Calm-Hovercraft2851, the source of his powers could explain one of the most positive moments in Spider-Man’s life. It could also explain how his Spider-Sense may have contributed to it in Spiderman 2.

RELATED: Marvel’s Most Unexpected Avengers Lineup Is Right Under Its Nose

What are Madame Web’s powers?

In the comics, Madame Web was once an older woman who was blind and unable to walk, but she had psychic abilities that allowed her to astral project, use telepathy, and even see into the future. . Over the years she was an ally of Peter Parker, but eventually she passed her abilities to Julia Carpenter, aka Spider-Woman, and she became the new weaver for Spider-Totems, and the web of life and fate has made her an important player in the great multiverse of Spider-people.

This extra-dimensional web connected Julia to the other Spider-Men, Women, and Animals of the Multiverse, and when the web was threatened, she called them together to defend her. Due to her clairvoyance, she could also act preemptively to forestall future dangerous occurrences. This action could also be considered a Spider-Sense in a more condensed explanation of the concept. That same feeling may be exactly why Peter’s helpless life in Spiderman 2 seemed so positive.

RELATED: Spider-Man: Far From Home Wasted Mysterio By Ignoring Marvel Comics

How do spider senses affect Peter Parker’s luck?

In the film, Peter’s feelings of inadequacy, mixed with his stress level, caused him to lose his powers. Rather than trying to get them back, he relished his life as a normal guy. Inadvertently, her life also began to turn upside down. He had more time to focus on himself and improve his career, studies and social life. Essentially, his Parker Luck had finally seen an end to his constant disturbances. The theory goes, it was because Peter wasn’t using his Spider-Sense to avoid danger. Since he wasn’t essentially changing the timeline to save a life, nature didn’t balance it with an equally embarrassing turn of events for Peter.

It’s a unique theory that has inadvertently been linked to the larger world built by Sony. As for the film, one could argue that Peter’s lack of interference with fate allowed things to take their natural course. However, there’s still the notion of Doc Ock returning to kidnap Peter and whether that would have happened with or without his powers. That said, if Fate is truly unstoppable, then the Web of Life and Fate would have had its powers to save her no matter what. Ultimately, it’s a fun theory that might even help bring up Tobey Maguire’s Peter in future events surrounding the Spider-Verse.



Desired start date: as soon as possible

Duration of the mission : 12 months

Location: Amman, with a trip to northeast Syria


The LEARN consortium is a partnership between four (4) international non-governmental organizations (INGOs) and two (2) national partners. Created in 2018, it draws on the respective expertise of I/NGO partners to deliver health, shelter, cash assistance (MPCA), protection, humanitarian coordination, livelihoods and of WASH to the most vulnerable communities in northeast Syria (NES). The main activities implemented are related to the rehabilitation and operation of Primary Health Centers (CSP), emergency WASH (water distribution and rehabilitation of water infrastructure), repair of private institutional shelters and distribution of essential kits (new arrivals, hygiene, repair shelters, wintering), vocational training and business start-up and restoration activities, and MPCA to cover basic needs. The program incorporates a rapid response mechanism.

LEARN Partners are based and implement throughout the NES. The Consortium Management Unit (CMU) is the program oversight structure that aims to facilitate smooth coordination, oversee program delivery, lead donor communications, ensure compliance and manage risk . The CMU is headed by the Chief of Party (Jordan) and the Deputy Chief of Party (NES), together with a team of specialists.


Main objective:

The Team Leader (CoP) will be responsible for providing overall vision, leadership and guidance to the LEARN Consortium.

Serving as a key liaison with donors, consortium partners and other stakeholders, the CoP will maintain an integrated view among the various actors while ensuring compliance with all project objectives, performance requirements and donor regulations.

In keeping with the spirit of the consortium, the CoP facilitates collaborative partnerships between donors, consortium members and other relevant stakeholders

The main challenges:

  • Large-scale, multi-sector and multi-year project implemented in different contexts within the NES
  • Security conditions are volatile in the areas of intervention with potential significant changes during project implementation

Priorities for the first 2/3 months:

  • Allow the project to adapt to possible significant changes in the geopolitical/conflict environment
  • Guide and support strategic discussions on the continuation of LEARN
  • Regular review of CMU’s strategic direction starting in October
  • Provision of ongoing institutional knowledge building/learning activities in support of LEARN and the wider humanitarian community

Main responsibilities and activities:

Consortium leadership and strategic vision

  • In coordination with the Steering Committee, oversee LEARN’s strategic vision and program-wide strategy to guide coordination and integrated programming
  • Develop and deliver institutional knowledge building/learning activities in support of the LEARN program as a whole
  • Guide and support discussions on the strategic pursuit of LEARN
  • Maintain the internal governance and collaborative partnership of LEARN
  • Provide leadership to continue strong coordination, collaboration, communication and integration of consortium programming and operations
  • Facilitate strong internal communication within the CMU team and ensure the management of the CMU team (direct management of 6 people)
  • Promote strong and transparent communication between and towards consortium partners; promote the flow of communication within the consortium
  • Coordinate closely with steering committee members and other senior members of LEARN partners to make decisions for the project on strategy, governance and risks

Representation and Coordination

  • Lead donor representation as focal point for LEARN
  • Assume responsibility for LEARN communications; ensure that financial and narrative reports are submitted in a timely manner and that deadlines are met
  • In coordination with the steering committee, engage in strong external representation of the consortium to other external stakeholders
  • Contribute more broadly to the wider humanitarian community through consortium lessons
  • Act as secretariat of the LEARN steering committee
  • Remain accountable to the steering committee and the Prime (grant holder)

Project delivery

  • Support compliance and manage risk of the entire consortium to support the delivery of programming as a representative of the Prime
  • Maintain oversight of support services and programming, overseeing the overall programmatic, logistical and financial performance of the consortium
  • Provide oversight to ensure the consortium is able to meet internal and donor obligations and regulations
  • Manage contractual agreements with LEARN and SI partners
  • Coordinate achievement of project objectives and accountability to consortium partners and donor
  • Safeguard program strategy focus and ensure project consistency, ensuring the consortium is moving in one direction
  • Facilitate sharing and learning within the consortium to embed project learning
  • Responsible for strong monitoring, evaluation, accountability and learning that stays in place
  • Maintain systems to ensure efficient and transparent data capture for decision-making and management reporting, and for technical consistency and integration across sectors and partners
  • Anticipate overall strategic issues related to the award and ensure that major risks and obstacles are identified and corrective measures are taken with the agreement of consortium partners
  • Allow the project to adapt to possible significant changes in the geopolitical/conflict environment and retain its agility to pivot to large-scale emergency programming when needed


Specific skills and experience:

  • At least ten (10) years of relevant experience leading programs focused on WASH, Shelter, Livelihoods, MPCA, Protection and/or Health. Previous experience as a party leader, deputy party leader or senior manager required.
  • Demonstrated exceptional leadership in the design, management, implementation, monitoring and evaluation of major international donor-supported programs, with skills in strategic planning and thinking, management, oversight and budgeting, and a experience in managing complex activities involving coordination with several program partner institutions.
  • Demonstrated skills in building and maintaining relationships with authorities, donors, stakeholders, local organizations and partners.
  • Excellent Organizational Skills: The ability to multi-task, learn quickly, and work independently and productively in a fast-paced, detail-oriented environment.
  • Proven track record in developing a project vision, aligning key stakeholders to that vision, and ensuring that vision translates into actionable strategies.
  • Experience in recruiting, developing and leading multidisciplinary and multicultural teams, managing complex programs and ensuring that project staff meet the highest standards of quality, relevance and delivery in time limit.
  • Experience in managing programmatic and financial reporting requirements. Experience in M&E is a plus.
  • Demonstrated skills in adapting team and project scope to rapidly changing context.
  • Demonstrated commitment to gender equity.
  • Proven experience in managing risk and compliance in a partnership setup; prior experience with BHA regulations is a plus.

General skills :

  • Excellent interpersonal and communication skills: the ability to effectively liaise with and motivate a variety of people in a multicultural environment and across different time zones.
  • Strong oral and written communication skills; demonstrated excellent interpersonal and negotiation skills.
  • Strong initiatives and improvisation skills.
  • Demonstrated attention to detail and ability to follow procedures, meet deadlines, and work independently and collaboratively with team members
  • Good stress management.
  • Previous experience in the Middle East an asset
  • Ability and willingness to travel as needed.


  • Fluent English (written, spoken and read) is mandatory
  • Speaking Levantine Arabic would be an asset


A salaried position: We offer a competitive CoP salary within the context of the industry.

This role also offers competitive international terms in line with SI policies, e.g. SI covers accommodation costs and travel costs between the expatriate’s home country and duty station.

Holidays: During the mission, a system of alternating between work and rest is set up at the rate of 7 working days after each period of three months. For a one-year mission, the expatriate will benefit from three R&R breaks (with 850 USD allocated by Solidarités for each break).

During these break periods, 1 additional day off per month worked is granted, i.e. 12 days on a one-year contract**.**

Social and medical cover: Expatriates benefit from a set of insurances reimbursing all health expenses (including medical and surgical expenses, dental and ophthalmological expenses, repatriation) and a provident system including war risks. The essential costs of vaccination and antimalarial treatment are reimbursed.


Living conditions in Amman are very comfortable and you have access to a wide choice of restaurants/shops/tourist activities. The country is also safe and accessible for weekend trips and activities.

Security inside the NES is volatile and justifies specific arrangements for accommodation and circulation in the intervention zones. Compliance with strict security procedures is necessary, while security levels may vary according to different geographical locations and changing contexts.

How to register

Does this description match you? Please send us your CV and cover letter in English via the following link: https://emea3.recruitmentplatform.com/syndicated/private/syd_apply.cfm?id=PULFK026203F3VBQB6G8N8NX4&nPostingTargetID=76030

CV-only applications will not be considered.

NB: Interviews will take place continuously and therefore the vacancy may close before the deadline if a person is identified.

For more information on Solidarités International, please visit our website

The danger of over-collateralized lending to DeFi and the new type of Solo protocol lending


“If you don’t know what crypto leverage is, you don’t know anything about crypto, no matter what you think you know.” These are the words of Dr. Michael Burry, founder of Scion Capital, once played by Christian Bale in The big short.

The regular Cassandra (as her Twitter account puts it) and the arch-pessimist have pronounced the fate of the crypto markets due to excessive over-leverage. The fate he foretold didn’t happen enough sweat, but crypto certainly took a bit of a hit in the summer of 2022 as markets tipped in the face of global headwinds.

Why Crypto is Collapsing So Quickly

Why is crypto prone to a total and dramatic collapse? There are several reasons: it’s a speculative asset, retailers are jostling like wildebeest overnight, big players are almost certainly involved in the manipulation, and the real usefulness of crypto is still very immature, and the users quickly lose confidence. Not to mention the security risks. It is a volatile world and will remain so until crypto has at least a few more years in the fiery forge of the markets. Even with these issues, the volatility of cryptos is far too extreme.

One of the main, less talked about reasons for the crypto craze is the amount of over-collateralized loans that exist in the DeFi space. In short, traders are mounting their crypto as collateral in order to borrow more and more stablecoins, and then using those stablecoins to take even longer positions in the crypto market.

This behavior temporarily boosts the entire market but ends up locking up chain after chain bond liquidity. This composability, which has led to the huge growth of DeFi on a relatively small user base (as a fraction of the whole population), also has the potential to cause cascading liquidations as funds are lost. when positions fail and cause repercussions on the whole ecosystem. .

How over-collateralization works in DeFi

Overcollateralized loans are how DeFi lending and borrowing is done. In protocols like Maker, Compound, Aave, and many others, oversizing is the norm. Users must provide After capital than they borrow to take out a loan. There are several reasons for this, but in short, these power traders hope that the money they earn from the investment will grow faster than the debt on the loan. This means they can invest the capital value of an asset (like ETH) without having to risk or liquidate their exposure to the asset itself. As long as they can pay the interest, they can have their cake and eat it.

In a bull market, such aggressive leverage makes sense and can be dramatically effective. Yield farm strategies involving vast multi-protocol borrowing cards have provided spectacular returns for those with the know-how, expertise and a fair amount of luck to take advantage of them.

The major problem of over-secured loans

There is one major problem with these loans, however. As every trader is maxed out, if the price of, say, Ethereum drops dramatically – suddenly the loan collateral is worth significantly less than the loan amounts. This could put the protocol out of business, so as it approaches problematic levels, they liquidate collateral as a defensive measure, leaving the trader stranded. They even incentivize liquidators to engage in this activity for a bonus reward to ensure its effectiveness, which means collateral on loans is closely monitored and immediately sacrificed if levels are exceeded.

It has long been a major headache for traders, but with the volatility of crypto, it becomes a Damocles sword ready to decapitate the entire market. And, if the price of an asset is in freefall, liquidators may not even be active, because the rewards aren’t there.

A rapid price drop – so often in crypto – can thus bankrupt DeFi lenders, wiping out their users’ funds and the protocol’s treasury, in an instant. Even the biggest and best are hurting, like when MakerDAO suffered cascading hard sell-offs as a result of price activity on March 12, 2020.

How Composability Makes Leverage Dangerous

The situation gets worse when you factor in the interconnectedness of DeFi. There are many protocols that rely on AAVE, for example, to provide its services and interact with AAVE’s smart contracts. If the price of AAVE were to drop and the protocol were to go bankrupt or experience a liquidity crisis, then the protocols that intertwine with its smart contracts could also go bankrupt, even if their liquidity and smart contracts were robust. Leverage in DeFi is therefore both a supercharged pathway to growth and a ticking time bomb to dissolution, due to the domino effect of oversized loans.

Representative assets and LP tokens are also problematic. Perhaps you are using a representative asset to secure a loan that you are using to mine liquidity in a different protocol. If this representative asset suddenly loses value, for example in the event of a smart contract hack, your loan collateral is immediately liquidated, or you may need to withdraw funds from the cash mine to provision capital to your position , which can harm any chance for the invested protocol to grow.

How the SoLo protocol will create alternatives to oversecured loans

The list continues. Overcollateralized loans are a powerful way to make money grow, but they pose systemic risk to DeFi if they are the only type of loan a user can take out. Plus, they’re useless for average retail users. What DeFi needs are under-collateralized loans, closer to a personal loan. These loans mimic the type of loans you see in TradFi. This is what SoLo Protocol (SoLo), a decentralized, noncustodial protocol that issues these types of loans, will bring to the space.

The reason oversecured loans are given so freely is that no one checks who you are. Why would they? If I gave you $1,000 as collateral and asked you to lend $100, most would. There is no risk. Under-secured loans are obviously different – ​​the lender must ensure that it is repaid. In TradFi, lenders use credit scores. Newer systems like Credit Kudos have used machine learning on open banking data. The Bank of England has already said it is “improving the selection of subprime borrowers”, and SoLo will do so as well.

“We want to take advantage of the huge advances in machine learning in credit data scoring and combine it with on-chain analytics to create a new type of hybrid score – the SoLo score,” says Louis L, co-founder by SoLo.

This blend of machine learning generated credit scores that were built into TradFi to make Web3 and DeFi lending decisions. In addition to using this traditional marker, it will also use on-chain wallet activity to decide whether to grant a loan and to determine the creditworthiness of the lender.

“This fusion of on-chain and off-chain data is not done by anyone, SoLo is the first, and the impact on the space will be huge,” says Tom G, another co-founder. “The SoLo score will be a totally unique score that the protocol uses to make our loan decisions.”

Baby, You Got a Soul: How the Solo Protocol Will Merge TradFi and DeFi

These “traditional” types of on-chain loans have some interesting ramifications. Users with good credit in TradFi or a positive history of transaction data assessed by machine learning can easily obtain crypto loans for web3 investments. Users who struggle to get traditional loans but have excellent on-chain portfolio metrics can access more capital than they otherwise could. Issuance of under-collateralized loans has the potential to create new wealth in the crypto markets and onboard millions of additional users into the web3.

While using traditional banking data sounds scary, it actually makes a lot of sense. There are already robust systems for determining who to lend to in the traditional financial industry that have used machine learning on transaction data – why not use it to make web3 a better place. This is precisely what SoLo does. Their beta product is now live on their website, so be sure to check out your SoLo score and explore the new horizon of consumer credit.

Indiana AG reaches agreement over slow internet speeds


A lawsuit against Frontier last year claimed customers weren’t getting the internet speeds the company promised.

INDIANAPOLIS — The Indiana Attorney General on Friday announced a settlement with Frontier Communications over slow internet speeds.

Indiana was among six states that joined the Federal Trade Commission in a lawsuit last May, claiming the company was not delivering promised internet speeds and was charging customers more for service than they were receiving.

Attorney General Todd Rokita announced Friday that a $15 million settlement has been reached with Frontier.

“The Hoosiers shouldn’t be forced to pay for high-speed internet access in exchange for slow service,” Rokita said in a statement. “Especially with many people working remotely from home, consistent and reliable telecommunications are vital to Indiana’s economy.”

The attorney general said the court declined to hear Indiana’s claims in the lawsuit, but his office continued to press Frontier to raise concerns about their services.

RELATED: FTC Sues Frontier for Providing Too Slow Internet

The complaint concerned DSL Internet, which is transmitted over copper telephone wires, primarily in rural areas. Thousands of customers said they couldn’t use Internet service for online activities they should have been able to use it for.

As part of the settlement with the Indiana Attorney General, Frontier will spend $15 million over four years to improve its internet infrastructure in the state. The company also needs to review its internet speeds and offer customers options to downgrade their service plan if their current plan promises higher speeds than provided.

CONNECTED: Are You Eligible? White House announces discounted internet service program

After a grace period to correct discrepancies between their advertised internet speed and the actual speed provided to Indiana customers, Frontier will be required to credit billing charges to customers who do not receive at least 90% of the maximum advertised speed , unless the client chooses not to. to subscribe to the lower speed level. It must also credit customers if it does not provide them with at least 100% of the speed they were promised, the attorney general’s office said.

Update to Dangerous Person Alert issued by Melfort RCMP


September 4, 2022
Saskatchewan, Saskatchewan


Update 5: Saskatchewan RCMP received a report that the suspects may be traveling in the Arcola Avenue area at approximately 11:45 a.m. in Regina, Saskatchewan in a black Nissan Rogue with license SK 119 MPI . For photos, descriptions and updates: https://alert.rcmp.ca/sk/l7nhdq5rEN


If you are in the Regina area, take precautions and consider sheltering in place. Don’t leave a safe place. Exercise caution when allowing others to enter your residence. DO NOT APPROACH suspicious people. Do not pick up hitchhiking hikers. Report suspicious people, emergencies or information to 9-1-1. Do not disclose police locations.


Information document

Update 4 for Melfort RCMP Dangerous Person Alert

10:01 a.m.

There are multiple victims, multiple locations, including the Cree Nation of James Smith and Weldon. The first indications may be that the victims are attacked randomly. Suspects: Damien Sanderson and Myles Sanderson. Damien is 5ft 7in and 155lbs with black hair and brown eyes. Myles is 6-foot-1 and 240 pounds with brown hair and eyes. See new photo. This is a rapidly changing situation. We urge the public to take appropriate precautions.


Don’t leave a safe place. Exercise caution when allowing others to enter your residence. DO NOT APPROACH suspicious people. Do not pick up hitchhiking hikers. Report emergencies or information to 911.

Melfort RCMP Dangerous Person Alert Update #2



The suspects could be in a black Nissan Rogue with license plate SK 119 MPI. As suspects may have access to a vehicle, we have extended this alert to the entire province.

Updates will be provided as they become available.

Update to Dangerous Person Alert issued by Melfort RCMP



Updated Dangerous Person Alert issued by Melfort RCMP for multiple stabbings against James Smith Cree Nation. The suspects are Damien Sanderson and Myles Sanderson. Damien Sanderson is 5’7″ and 155 lbs with black hair and brown eyes. Myles Sanderson is 6’1″ and 240 lbs with black hair and brown eyes.

If you are in the area, immediately seek shelter/shelter in place. Don’t leave a safe place. Exercise caution when allowing others to enter your residence. DO NOT APPROACH suspicious people. Do not pick up hitchhiking hikers. Report suspicious people, emergencies or information to 9-1-1. Do not disclose police locations.

Updates will be provided as they become available.

Dangerous Person Alert issued by Melfort RCMP


7:14 a.m.

A Dangerous Person Alert is issued by Melfort RCMP after several calls of stabbings against the James Smith Cree Nation. Saskatchewan RCMP respond and attempt to locate two suspects. For updates: https://alert.rcmp.ca/sk/l7nhdq5rEN

If you are in the area, immediately seek shelter/shelter in place. Exercise caution when allowing others to enter your residence. Don’t leave a safe place. DO NOT APPROACH suspicious people. Do not pick up hitchhiking hikers. Report suspicious people, emergencies or information to 9-1-1. Do not disclose police locations.

Updates will be provided as they become available.

Paper Girls Season 1 Questions We Hope To See Answered


Spoiler alert: Paper Girls Season 1

paper girls is a science fiction drama series created by Stephany Folsom. The show is based on the hit comic book series of the same name, written by Brian K. Vaughan and illustrated by Cliff Chiang. paper girls only recently premiered on Amazon Prime in July this year and has already been a hit with viewers.

The time-traveling show began in 1988 and follows four young girls, Erin, KJ, Tiffany and Mac, all of whom deliver items on a dark, gloomy morning just after Halloween. The job is the last hope they have, all for different reasons. For Erin, this job means she can start a new life for herself and her family, while for KJ, it’s a way to escape from her “perfect” life, which she doesn’t want. Tiffany needs the money to start her future and pursue her dreams, while for KJ it’s just a job, which for her is a step in the right direction.


However, when they are unwittingly caught up in a conflict with time travelers and end up in a time war. They are sent on a wild and thrilling journey through time that will ultimately save the world, and on their journeys they explore different versions of themselves and must decide if they want to accept what they see and what will be their fate.

The season finale left us on a serious cliffhanger, and fans and critics alike are hungry for a season two. That’s because we were left with a lot of unanswered questions, so let’s recap how the first season ended and exactly what fans want to know.

As the season followed the girls trying to navigate time while coming to terms with the fact that they had seen their future, we also gradually found more information about the Time War.

The war is between two factions: the STF Underground, a rebel group who believe the future can be changed for the better by time travel, and the Old Watch, who are the authorities in charge of controlling the timeline and not keeping it away. falsify. . Just before the girls were thrown back in time, it was STF members Heck and Naldo that they came into contact with.

Related: The Dark Tower: Why Now Is The Perfect Time To Reboot Stephen King’s Novel Series

In the war, led by Old Watch member Prioress, Heck and Naldo manage to save the girls, handing over a strange gadget to Tiffany. Now the gadget can take the STF with an adult version of Erin to 2019 to find the girls and bring them home.

However, when they find the girls, along the way, something goes wrong, and they travel to 1999 instead of 1988. As they try to find their way home, they are attacked by the giant, creepy travel robot of Old Watch, where Larry is killed. , and the adult Erin sacrifices herself to destroy the robot. Not only were viewers shocked, but so was Erin as she just watched her future self die.

Viewers are taken on their wild goose chase to find a way home, which they now think (with the help of the 1999 version of Tiffany) might be a 1999 version of Larry’s house. Though other obstacles stand in their way when the Prioress, leader of the Old Watch, reaches Larry’s house. The ending was unexpected and left us hanging from a giant cliff.

What timelines are the characters in?

First, where the hell are KJ and Mac? When girls are thrown back in time, it’s easy to get lost. We last saw them inside a ship, again, sent to another timeline. But how will they get home? Did the prioress send them back in 88? However, they could also have traveled to the future to find a cure for Mac’s cancer. However, what timeline will it be in?

Related: Best Time Travel Romantic Comedies, Ranked

It’s incredibly difficult to know what timeline everyone is in, especially when you see Erin and Tiff land at the farm years before ’88. How might this help the war with the Old Watch, and who will they encounter in this life? With them running around their younger selves, it’s pretty hard to find a purpose for that. However, knowing paper girls, another captivating twist will surely be added to it. We hope that traveling back in time may give Tiff the chance to find answers to her questions about her birth parents.

Along the way, there will surely be multiple versions of everyone, which means the chances of running into someone are very likely. This means there is hope of finding KJ and Mac and maybe even running into Juniper and Larry somewhere. Maybe we’ll even see a younger or older version of Prioress as they travel through time.

Why don’t Erin and Tiff remember?

This whole time travel thing is a weird experience, but so far we’ve come to realize that Old Erin and Old Tiff don’t remember time travel. What does it mean? In their lifetime, did this not happen? Where did the Old Guard take the memory? If so, does that mean they’re technically on the right track, older versions just don’t remember, or did they create something completely new and mess up their entire lifeline?

Will the road in season 2 take you back to 1988?

Of course, the main question is: will they ever make it back home to 1988? It was a constant battle for viewers to see the girls return each time about to find their way back, only to be thrown back into another era all over again. What new deadlines will they find? Will they find their way home and will the world be saved?

Although the show was not officially renewed for a second season, there is speculation and fans are keeping their fingers crossed as we have many questions that we are desperately trying to get answered. Hopefully somewhere in the future we will see the paper girls Again.

AI won an art contest and the artists are furious

In August, Allen, a game designer who lives in Pueblo West, Colorado, won first place in the “digital arts/digitally manipulated photography” category of the Emerging Artists Division at the Colorado State Fair Fine Arts Competition. His winning image, titled “Space Opera Theater”, was made with Midjourney – an artificial intelligence system that can produce detailed images when fed with written prompts. A prize of $300 accompanied his victory.

“I’m fascinated by these images. I love them. And I think everyone should see them,” Allen, 39, told CNN Business in an interview Friday.

Allen’s winning image looks like a bright, surreal cross between Renaissance and steampunk painting. This is one of three such images he submitted to the competition. A total of 11 people entered 18 works of art in the same category in the emerging artists division.
The definition of the category in which Allen competed states that digital art refers to works that use “digital technology as part of the process of creation or presentation.” Allen said Midjourney was used to create his image when he entered the competition, he said.
Midjourney is one of many such AI image generators. Others include Google Research’s Imagen and OpenAI’s DALL-E 2. Anyone can use Midjourney via Discord, while DALL-E 2 requires an invite and Imagen has not been opened to users. outside of Google.

The novelty of these tools, the way they are used to produce images, and in some cases the control over access to some of the most powerful have led to debates about whether they can really do art or helping humans make art.

This was worked out for Allen shortly after his win. Allen had enthusiastically posted his victory on the Midjourney Discord server on August 25, along with photos of his three entries; this went viral on Twitter days later, with many artists angered by Allen’s victory due to his use of AI to create the image, as reported by Vice’s Motherboard earlier this week.

“This sucks for the exact same reason we don’t let robots compete in the Olympics,” one Twitter user wrote.

“It’s the literal definition of ‘push a few buttons to create a piece of digital art,'” tweeted another. “AI artworks are now the ‘banana stuck to the wall’ of the digital world.”

Still, although Allen didn’t use a paintbrush to create his winning piece, there was a lot of work to be done, he said.

“It’s not like you smash words together and win competitions,” he said.

You can feed a sentence like “an oil painting of an angry strawberry” to Midjourney and receive multiple images from the AI ​​system within seconds, but Allen’s process wasn’t that simple. He said it took over 80 hours to get the final three images he submitted to the competition.

First, he said, he played with the phrasing that led Midjourney to generate images of women in frilly dresses and space helmets – he tried to mix Victorian-style costumes with themes spatial, he said. Over time, with many slight tweaks to his written prompt (such as adjusting lighting and color harmony), he created 900 iterations of what led to his final three images. He cleaned up these three images in Photoshop, for example giving one of the female figures in his winning image a head with wavy black hair after The middle of the trip had rendered her headless. Then he ran the images through another software called Gigapixel AI which can improve the resolution and had the images printed on canvas at a local print shop.

Allen is happy that the debate over whether AI can be used to make art is getting so much attention.

“Rather than hating technology or the people behind it, we need to recognize it’s a powerful tool and use it for good so we can all move forward rather than sulk,” Allen said.

Cal Duran, an artist and art teacher who was one of the competition’s judges, said that while Allen’s piece included a mention of Midjourney, he hadn’t realized it had been generated by AI when judging. Still, he stands by his decision to award it first place in its category, he said, calling it a “beautiful piece”.

“I think there are a lot of things involved in this piece and I think AI technology can give more opportunities to people who might not find themselves artists in the conventional way,” said- he declared.

Allen won’t say what the text prompt behind his winning image was yet — he plans to keep it a secret until he releases a larger related work he hopes to complete later this year.

Mason students create digital archive for victims of China’s anti-‘rightist’ campaign


This summer, students at George Mason University designed and developed a pilot web-based archiving application to organize documents relating to victims of China’s anti-“right-wing” campaign in the 1950s.

Student team brainstorming ideas. Photo provided

Six undergraduate students and one doctoral student participated in a summer team impact project to create the online platform. Using the pilot app, researchers will be able to search vast archives relating to the names, birth and death dates, and biographies of individuals labeled “right-handed.”

“Documentation was not easily searchable,” said Myeong Lee, an assistant professor in the Department of Information Science and Technology who co-supervised the project. “This online platform will allow users to not only search the archive, but also contribute to it as more information is found.”

Predating the Chinese Cultural Revolution, the anti-“rightist” campaign was launched by Chairman Mao Zedong to purge “rightists” from the Chinese Communist Party and the whole country.

Beginning in 1957 and lasting around two years, the campaign is said to have reached between 500,000 and 2 million people. The targeted individuals were re-educated, humiliated, displaced or executed. The main emphasis was on “intellectuals”, which usually meant professors, teaching artists, writers and doctors.

“There are very few living people from that era who can tell us what happened, so it is urgent that we document who the ‘right-handers’ were and their experiences,” said Shanshan Cui, associate professor specializing in in design at Mason’s School of Art who oversaw the project with Lee.
sample web page design

The student researchers presented the results of their summer efforts online in August. In the presentation, the students describe how their goal was to research and create an easy-to-browse online archive, starting with 40,000 documents.

“I’m really happy to have participated in the project,” said Weilon Price, a senior IT specialist. “I learned a lot about the web framework and analyzing large amounts of data. I also learned a lot about teamwork and communicating effectively with my team.

The student researchers, who had previous experience and an interest in software design and development, received training in the areas of data analysis, computational methods for processing large amounts of information, and software development.

“Working on the project was a great way to spend my summer,” said Joel Adeniji, a senior IT specialist. “I was fortunate to help ensure that this part of history will never be forgotten.”

The Lemon-Lime Gatorade Debate Taking Over the Internet


When the Tennessee Volunteers football team made a video about ICT Tac asking if Lemon-Lime Gatorade (one of Gatorade’s most popular flavors) is yellow or green, a heated debate ensued — a debate that has gone beyond the social media platform. Yes, this discussion has captivated the internet, especially since there doesn’t seem to be a right or wrong answer. Obviously, football players cannot come to a consensus with one boldly declaring, “It’s yellow. You’re psychotic,” and another saying, “If you think it’s yellow, I need you to reassess your eyesight. When held against a John Deere it appears distinctly yellow, but when compared to a green grape it suddenly appears green. Everything is very confused.

While one commenter tried to dispel the schmozzle by pointing out that “Yellow 5” is the only colorant in the ingredients, the folks at Today decided to play it safe and walk away from the argument. Even the Gatorade brand itself responded with a not-so-helpful TikTok reply, “dannng why you gotta throw me like that,” making the issue as clear as mud. Maybe one way to settle this argument is to say that lemon-lime Gatorade is chartreuse — a perfect mix of yellow and green — creating the perfect win/win solution. This is, of course, open to debate as well.

More muscular? Body oil? Luka Doncic’s weight and fitness look stable heading into Mavs season


COLOGNE, Germany — With minutes remaining in the first quarter of the EuroBasket opener victory in Slovenia on Thursday, center Mike Tobey grabbed an offensive rebound and bullied Lithuanian NBA starter Jonas Valanciunas for a second chance lay-up.

Already halfway down the field, expecting to come back on defense, Mavericks superstar Luka Doncic raised his arms and bowed in celebration.

Big emphasis on flex.

Throughout this offseason, discussions of Doncic heading into his fifth NBA season have often included questions about his weight and conditioning and whether the Mavericks’ preseason training camp at the end of this month will be the third straight that he has started out of form.

Through a string of national team games this summer and a grueling physical start to a physically grueling EuroBasket tournament, Doncic has looked on pace – even when not faltering – and left plenty with the Mavericks hoping for his Extra time with Slovenia and attention to fitness from the second half of last season will mean the jump.

Assessing Doncic’s conditioning this summer first-hand has been difficult, although it’s clear, even remotely, that Doncic’s ability to disagree with officials is already in top form mid-season. .

He hasn’t taken part in interviews for months – apart from brief post-match TV appearances with Slovenia’s inside partners – and he walked through the EuroBasket mixed zone on Thursday without making contact visual nor stop for a requested conversation.

Slovenia initially nominated him as a representative to join head coach Aleksander Sekulic at the official post-match press conference, but then brought out Goran Dragic instead.

So asking Doncic about his workouts – or even making an anecdotal assessment up close – has been nigh on impossible.

But a few signs in Doncic’s public orbit have been promising for the Mavericks.

He posted several video clips on Instagram this summer of training with Slovenian coach Anze Macek, and he’s played in four games — plus three not-so-friendly friendlies — since the end of the Western Conference Finals.

Doncic’s body type isn’t naturally built for ripped muscles or explosive athleticism.

But after the first window of World Cup qualifying matches in early July, a Mavericks official jokingly wondered if Doncic slipped body oil because his arms looked more defined and his physique looked leaner. .

Maybe layers of sweat helped him shine, too.

EuroBasket will certainly ask for more.

After Thursday’s win over Lithuania, Slovenia will play four games in five days. In the two consecutive series – Saturday against Hungary, Sunday against Bosnia and Herzegovina, Tuesday against Germany and Wednesday against France – the team will have less than 21 hours between predictions.

Slovenia will also play up to four games in eight days in the Round of 16 if the quest for the gold medal goes as planned.

Such a grind less than two weeks before the start of the Mavericks’ training camp on September 27 has raised concerns about whether Doncic will respond in the same way he handled last year’s Olympic replay.

Doncic took time off to rest, gained more than 15 pounds during the six-week break between the Games and training camp, and battled injuries and weight issues until the end of the season. ‘calendar year.

Additionally, the scare of Doncic’s twisted ankle in last weekend’s World Cup qualifier against Germany served as a reminder of the total risk of playing EuroBasket – or any setting – may feature during the NBA offseason.

But expect some aspects to be different this year.

Doncic will have a maximum of 17 days between the end of EuroBasket and Mavericks training camp – but likely only eight days if Slovenia make it to the September 18 medal rounds.

He and his side had known for almost five years that the EuroBasket schedule would present a quick turnaround and they could better anticipate the pace of its preparation, unlike the Olympics last summer when Slovenia were not even scheduled to participate or in 2020 when the pandemic disrupted and precipitated the NBA’s offseason timeline.

Doncic also seems keen to prove his stamina.

In his most athletic highlight on Thursday, Doncic put a basic spinning move on former NBAer Ignas Brazdeikis, drove in for a dunk, hung from the rim with one arm for an extra moment and stared Brazdeikis under him.

All but one of Doncic’s seven dunks of the Mavericks’ final season came after his 20-day hiatus in December.

He also sprinted in multi-point defense and recorded three interceptions in the first half alone.

Following the win and watching Dirk Nowitzki’s national team jersey retirement ceremony, Doncic posted a slideshow on Instagram that included a snapshot of *that* dunk and *that* flex.

The social media hype poured in:

“Incoming MVP Season”

Eye emojis.

“League finished”

The Mavericks hope so.

Find more Mavericks coverage from the Dallas Morning News here.

What’s Underneath: Medicine Socialized By Any Other Name : Emergency Medicine News


International EM, Medicare, medicine in Australia, private health insurance, socialized medicine


A rose is a rose is a rose is a rose. So wrote Gertrude Stein, initially in 1913 and then in altered states over the following decades. Many have debated the meaning at the heart of the sentence, but she used it in many cases as a way to explore semantics; it is part of a law of identity, where the use of a name confers automatic imagery and understanding in the mind of the reader.

Today I’m lying on the REM– column chart the term “socialized medicine”. First, two facts you probably know everywhere: Australia has socialized medicine, and socialized medicine is a bit of a dirty word in the United States.

I can’t speak for the latter, but I can offer some theories working within the Australian system. In a way, socialized has been equated with socialism, which itself has been confused and mixed with communism, and we all know that communism is a failed paradigm and a dead political-economic philosophy. Therefore, the same must apply to socialized medicine.

Socialism, of course, has softer terms of definition than communism: the things that matter are owned and distributed by the public rather than in the hands of private property. Marxist theory holds that socialism lies somewhere in the liminal space between the overthrow of capitalism and the realization of communism.

In favor of a socialized medicine

But, if you allow me, allow me to say a few words in favor of socialized medicine. Interchangeable terms for socialized medicine are “universal health care” and “public safety net”. Without getting into the slightly tedious history of this one, we’ve only had it since 1984, and it’s funded by the federally tax-funded Medicare system (a levy of about 2% on taxable income of a resident). But we also have a thriving private sector, which caters to those who have private insurance (about 44% of the population), making it a hybrid scheme.

Interestingly, the two systems have partnered and helped each other through tough times, like the pandemic, with hospital beds being leased to each other for capacity and dividing and (sometimes) conquering increases workload issues. The private system is still partially guaranteed by the government; costs are shared for each patient that goes through the system.

Australian health care is far from perfect. And when I say far, I mean the kind of distance where you still can’t see its horizon even when you squint. We have a stalemate between state funding and federal funding (often allowing both to cover their ears and say it’s the other’s problem). We’ve cut costs to the point that the system groans under the twisting human weight of emergency room presentations.

The government is reducing physician fees in the system so that costs can be passed on to certain patient demographics. Inefficiency and complacency can creep in when no incentive fees are paid to health workers. Public outpatient clinics in hospitals are drowning, some with unacceptable wait times. The system has a long way to go in how we deal with disenfranchised, disadvantaged, vulnerable populations.

All treated the same

But what we have is the safety net. Nowhere is this more evident than in emergency departments. No one is turned away, certainly never for financial reasons. Even those who are not Australian residents or covered by Medicare are treated the same. I find the latter fascinating. When ‘undocumented’ patients arrive requiring care, office staff are required to advise them of the costs, but we always follow up with a wink. Invoices are never prosecuted.

Fairness is one of the greatest conflicts facing humanity today, and at least our system is moving in that direction. What about health outcomes in general? They also benefit from it. Macro indicators are favorable with a robust hybrid system.

Some of the Australian figures speak for themselves. Life expectancy? 82.9 years old. Infant survival rate? 2.5 deaths per 1000 live births. Maternal mortality rate? Six per 100,000 live births. Australia also has the lowest cancer death rate in the world, thanks in part to a robust national system that not only provides universal health care, but also benchmark standards among all health care sites.

So, yes, we have a long way to go, but socialized medicine is unquestionably the greatest strength we have to provide the most equitable health to a population, even in a country where wildlife intends to kill us.

Dr Johnstonis a certified ER doctor, so the same as you but with a weird accent. She works at a trauma center in the old fashioned end of Perth, Western Australia. She is the author of the novels Little uncertain miracles (available November 3) and dust fall, available on his website, http://michellejohnston.com.au. She is also a regular contributor to the Life in the Fast Lane blog athttps://litfl.com. Follow her on Twitter@Eleytheriusand read its past columns athttp://bit.ly/EMN-WhatLiesBeneath.

An introduction to timelines, opportunities and preparation


The number of companies that existed to build horses and buggies dropped at the turn of 20e century — from 13,800 in 1890 to just 90 in 1920. A century later, as fate would have it, we are likely to enter a similar phase with the combustion engine vehicle.

There’s a good reason for that. After decades of dormancy, innovations in electric vehicles have produced a product that is simply better than what is currently on our roads. And it’s not just that they go from 0 to 60 in two seconds. “Beyond that, it runs cheaper and it’s more efficient than internal combustion,” Mike O’Donnell, Magnet’s vice president of operations, told me recently. “It’s better for the environment, less CO2.”

With California Ban on the sale of new petrol cars which is expected to begin in 2035 – and other states likely to follow suit – automakers with a hand in the auto industry should prepare for disruption. They will want to stay informed on a moving target schedule and be intentional about their path forward. With that in mind, here’s a primer on where things stand and what to expect.

Barriers to EV Adoption

The million-dollar question is how long it will take to reach critical mass, and therefore how urgently manufacturers in the combustion engine sector should plan their releases.

It might help to consider what we are currently experiencing as a huge chicken-and-egg problem. We simply don’t have the pieces in place to support the widespread adoption of electric vehicles. And without it, some consumers are hesitant to go all-electric, while automakers are taking a deliberate and measured approach to the transition. Then again, if consumers were to dive in headfirst or automakers were to stop selling combustion engine cars tomorrow, government agencies and utility companies would be forced to act much faster.

One of the biggest concerns right now is making sure we have the electric power needed to manage the adoption of heavier electric vehicles. Just weeks ago, during a prolonged heat wave in Texas that pushed its power grid to capacity, Tesla drivers received a note in the console asking them to charge only outside peak hours.

Our electrical networks are only equipped for limited use. That’s why California has had power outages during the summers when air conditioners hum. “To plug your car into your garage to charge that giant battery in there, we’re gonna need more juice, right?” said O’Donnell. “And there’s no more juice.” The precursor to the mass adoption of electric vehicles will therefore require not only modernize aging power grid infrastructure, but adding capacity to the power plants that provide the electricity, through a mix of natural gas, nuclear power or renewables like wind and solar. In the United States, renewable energy accounted for 19.8% of electricity production in 2020, a number should increase to 35% by 2030.

Beyond network issues, we will need to establish a reliable network of freely accessible charging stations, whether at service stations or elsewhere, so that consumers feel comfortable knowing that they will be able to find a charge no matter where they travel. This, again, will take time.

“I think a lot of people think, well, if we make a lot of these cars, like next year, we might have 100% electric cars, probably not,” O’Donnell says. “But it’s going to happen, whether it’s in five years or in 20 years.”

A quick side note: Recently, electric car manufacturers have been hit by the sharp increases in material prices felt by many throughout the supply chain, as demand for lithium outstrips supply. While this is a short-term trend that will cause some headaches, I find little reason to believe it will impact long-term trends towards electric vehicles. In fact, prices should stabilize and start falling by 2026.

The EV movement is on the right track.

How manufacturers can prepare for electric vehicles

With the exact timeline up in the air, the trick for manufacturers producing internal combustion engines or other parts designed for combustion engine vehicles will be to stay educated, stay prepared, and think critically about how they can leverage their skills, knowledge and resources. towards a new path.

Certainly, not all manufacturers in the automotive industry will be upset. Electric vehicles still need steering wheels. They still need dashboards and control panels. They still need a steering rack and seats. But for every job that remains, there will be several more that are not. Electric vehicles don’t need catalytic converters, exhaust systems, engines or transmissions, billions of manufacturing dollars that will go away.

And while there are smart ways for workers in these industries to transition to new ones, it’s extremely important to have a clear eye on how your specific skills and expertise will stack up. “One thing that’s not going to happen is a company that takes aluminum, melts it, casts it, drills holes in it, mills it, puts pistons in it – they’re not going to make a drums,” O’Donnell said. “With batteries, it’s a chemical process. You have chemicals, you mix them, you make pastes, make membranes, that’s a whole different process.

That’s not to say there’s no future for these manufacturers. “If they invest, they could migrate to something other than engines,” O’Donnell says. “Maybe they get into powertrain design because they know about combustion and how flames spread and those engines. Maybe it’s not that they use the same capital equipment , but they can use their technical knowledge and transfer it to another industry.”

EV opportunities

For as much disruption as the transition to electric vehicles will bring, it also represents an incredible opportunity for manufacturers willing to anticipate and invest early.

Injection molders, for example, should examine the thick plastic boxes that form the exterior of electric vehicle batteries. These skills translate.

Thick yarn already exists inside cars today. Cable makers and connection makers should talk to Teslas and GMs around the world to understand the wiring needs of the electric vehicle industry, the specific connections that these vehicles require.

Batteries will be big business – there’s a reason states compete to land factories. But there are opportunities across the entire EV ecosystem. Automakers that prepare for the inevitable transition to an electric vehicle ecosystem will be the ones that not only survive, but thrive, in an all-electric future.

Are you planning to install solar panels in your home? A New NIST Web Tool Can Help


A software tool developed by NIST, called Present Value of PhotoVoltaics, analyzes the economic and environmental impacts of rooftop solar technology.


B. Hayes/NIST

Whether it’s to live more sustainably, save money, or both, many people are considering adding solar panels to their homes. Homeowners consider a number of factors, including the type of solar panel that’s best for them, when deciding if the investment is worth it.

Now, an online software tool from the National Institute of Standards and Technology (NIST) can help answer owners’ questions. The software is called [PV]2 — Present Value of PhotoVoltaics — and analyzes the economic and environmental impacts of rooftop solar technology. The tool can help homeowners and even installers when evaluating rooftop solar PV systems.

Photovoltaics is a semiconductor material that converts sunlight into electricity. They are made up of individual cells that form solar panels. But how can owners know if the technology is right for them?

To help answer this question, [PV]2 uses a method called life-cycle cost analysis, which assesses the total cost of a structure, project, or product over time. It takes into account various costs and can identify the most profitable options in the long run.

The idea for the tool came from NIST economist Joshua Kneifel when he was considering installing solar panels on his own home a few years ago. “Solar installers provided basic cost and savings information based on simple and sometimes non-transparent assumptions. I wanted to determine if installing solar power was a better investment than just investing that money instead, and no tool available at the time could do that,” Kneifel said.

He performed his own calculations using an Excel spreadsheet, but found that the format was not translatable for the average person. “I determined that there was a lack of a tool that a homeowner or solar installer could use to get an independent, standards-based economic analysis of an actual quote to install solar power in a specific home. I wanted to provide all the necessary detail, considering all potential complexities, while simplifying the experience for the user in an digestible way,” Kneifel said.

When users access [PV]2 on the web, they first encounter a landing page that introduces them to the online tool. The page includes links to a user guide that provides a quick tutorial on how the tool works.

The tool does most of the calculations and analysis, so users only need two pieces of information: an actual solar quote – an estimate of a solar installer’s costs – and an electricity bill. If a user doesn’t have these, they can enter a sample quote and utility bill from the landing page to get a rough estimate.

After pressing the start button, users need to go through six steps, such as entering their address or zip code, electricity price on their bill, solar panel system information and any monetary incentive for which they are eligible. Users do not need to know all of this information; some steps contain default information based on the latest research and data. Information entered by users is not stored on a server or on the web application, Kneifel said, thereby protecting the privacy of a user’s personal data.

“Once a user has completed these steps, they press the finish button and get a breakdown of the costs, electricity savings and carbon footprint associated with the photovoltaic system. Charts are also included and everything can be downloaded in a spreadsheet or PDF,” Kneifel said.

[PV]2 uses the Economic Valuation Engine (E3), an application programming interface (API) developed in collaboration with [PV]2 by experts from NIST’s Office of Applied Economics.

“The new concept is to provide a generic API that could be used as a ‘back-end’ compute engine for multiple ‘front-end’ tools, such as a web application,” Kneifel said. “This simplifies and speeds up future development of new tools and minimizes maintenance time and costs for existing tools. The Solar Assessment Tool was a perfect use case to validate and show the capabilities of the Generic Economic API and how it can be leveraged by other tools that assess long-term projects that require a life cycle perspective. life. For example, any building or facility related project aiming for energy efficiency, sustainability or resilience could use E3 for economic analysis.

The web application was beta tested before being released to the general public and has received feedback from beta testers, such as solar installers, homeowners who have recently installed solar panels, homeowners who have considered but not yet installed solar panels and other tool developers. [PV]2 can also be useful for solar installers who need to provide a transparent and independent economic analysis of solar panels. “The hope is that the layman can use this web application to do the same analysis I did to feel comfortable with my solar energy investment,” Kneifel said.

This is the initial version of the tool and new features are under consideration; users are welcome joshua.kneifel [at] nist.gov (provide an answer) to further improve the tool.

Netlify bolsters enterprise-level security of its platform with ISO 27001 certification


Certification Confirms Netlify Meets Global Standards for Customer Data Privacy and Integrity

SAN FRANCISCO, August 30, 2022 /PRNewswire/ — Netlifymodern web development platform, today announced that it has achieved ISO 27001:2017 certification for its Information Security Management System (ISMS), demonstrating the company’s commitment to securing and protecting customer data.

“Netlify is on a mission to build a better web – a web with trust at its core,” said Marc Dorsi, chief information security officer at Netlify. “ISO 27001 certification is the latest step we are taking to protect that trust from bad actors and to keep all customer data safe and secure on our platform.”

ISO 27001 is an information security standard published by the International Organization for Standardization (ISO), an independent developer of voluntary international standards with 167 national standards bodies, and the International Electrotechnical Commission (IEC). ISO 27001 is one of the most internationally recognized and accepted information security standards. It identifies the requirements of a comprehensive Information Security Management System (ISMS) and defines how organizations should manage and handle information, including appropriate security controls.

Netlify’s certification was issued by A-LIGN, an independent and accredited certification body. Compliance has been validated by this independent security company using a comprehensive information security framework. The framework included key focus areas including risk mitigation, staff training, measurement and monitoring, continuous improvement, and more.

Netlify is committed to making its modern web development platform secure by design. In addition to ISO 27001, Netlify maintains compliance with AICPA SOC 2 Type 2 and PCI DSS, demonstrating an ongoing commitment to protecting data by strictly adhering to industry standard best practices.

To learn more about Netlify’s ISO 27001 certification, visit Netlify’s Enterprise Plan.

Additional Resources

Sign in with Netlify

About Netflix

Netlify is the platform your developers love for building high-performing and dynamic websites, e-commerce stores, and web applications. By bringing together a vast ecosystem of technologies, services, and APIs into a single workflow, Netlify unlocks new levels of team productivity, while saving time and money.

As pioneers of the Jamstack movement, Netlify brings together all modern web frameworks, serverless functions, and edge computing into a single platform to deliver unparalleled user experiences. Millions of developers and businesses build with Netlify, from Fortune 500 companies like Unilever and Verizon to companies changing our digital experiences like Peloton and Twilio. Start for free at netlify.com.

SOURCE Netlify

How to get payday loans online with instant approval and no credit check?


With loans without a credit check, borrowers can be allowed to obtain a personal loan without the usual credit checks. Banks and other traditional lenders frequently perform rigorous credit checks to assess a borrower’s creditworthiness.

A thorough credit check includes reviewing borrowing and repayment history, defaults, late payments, and other important documents. You often won’t qualify for traditional loan products if you have a poor credit score, a history of missing payments, defaults, and underutilization of your credit limits.

A “soft credit check”, which takes into account non-credit score variables, is required for loans without a credit check. The lenders who offer these loans make inquiries about borrowers’ repayment history, past due loans to other businesses, and current work and income situations.

How do no credit check loans work?

PaydayChampion is a place where you can get a loan online without checking your credit. Filling out an application is easy. When you work with a state-of-the-art lender, your loan application can be approved in hours or even minutes. If you need money right away, you can often apply for a loan online and get the money the same day.

You must provide information about your employment and bank accounts in order to qualify for a loan (to verify your income). The loan amount and terms you are eligible for are determined by online direct lenders using this information, your recent payment history and your total credit usage.

What are the types of loans without credit check

Payday loans and personal loans are the only two categories of loans that direct lenders offer without requiring rigorous checks.

Payday loans

Payday loans are a common but risky short-term financing option. These loans can be approved in minutes and are meant for sudden and urgent situations.

PaydayChampion online payday loans are available and the money is deducted from your next paycheck to pay off the debt. Usually they have a two-week term. Personal loans often have high interest rates because they are meant to be taken out quickly. Payday loans may seem like a good option, depending on your financial situation. The likelihood is high, however, that an installment loan will turn out to be a wiser choice.

Although they present themselves as a good option to meet unexpected expenses, payday lenders make it very difficult for borrowers to make timely payments due to their high interest rates and short loan periods. repayment. Also, if you are unable to repay the loan on time, the lender will undoubtedly charge additional fees and interest to extend the loan. Payday loans should generally be avoided as they can lead to missed payments and a cycle of debt that is difficult to escape. You can get a better repayment plan from other lenders without paying extra.

Personal loans

Personal installment loans are often considered a safer and more economical alternative to payday loans because they have longer terms and lower interest rates. Additionally, compared to the typical payday lender, many personal installment lenders will provide a superior customer experience.

Over a series of monthly payments, the full amount borrowed, plus interest and other fees, is repaid. This way, you won’t have to repay the entire loan at once. Plus, managing lower monthly payments is much easier and won’t strain your budget. Also, compared to most payday loans, personal installment loans are generally more reasonable. Plus, you can usually find a personal installment lender who will give you a loan without a rigorous credit check. Therefore, you won’t need an impeccable credit score to be accepted.

Do yourself and your bank account a favor and select a less risky option than expensive payday loans. Use our personal loan calculator to help you budget if you’re considering a bad credit installment loan.

Securities lending

Another illustration of a no credit check loan is this. An onerous title loan is a secured loan where the borrower must post collateral in exchange for the funds. The title of your car would act as collateral in this situation. However, if you are unable to repay the loan, the lender may sell your car to recover the money.

When you have bad credit, title loans can be an easy way to get secured money, but they still come with high fees and increased risk. It’s probably not a good idea to risk losing your car if you need it for work or to take the kids to school.

What advantages of loans do you get without credit check

You can get a loan without worrying about your credit history thanks to the simple application process and fast approval times for no credit check loans. Generally, there are no fees or penalties for early payments. Plus, repaying installments on time boosts your credit score because major credit bureaus track your payment activities. By doing this, you can boost your credit score and increase your chances of getting a better deal the next time you need a loan.

How do problems with no credit check loans occur?

The potential increased cost of no credit check loans is their biggest downside. Check your specific lender’s interest rates, as a loan without a credit check might have a higher interest rate. You may not be able to borrow the full amount you need because there are restrictions on how much you can borrow depending on lender and state laws. It is crucial to research the lender and the terms of any loan you are considering. In the long run, you could save a lot of money doing this.

There are many types of loans available. Plus, they all have unique terms, conditions, and interest rates. Before putting your signature on the contract, it is important to understand what these conditions are. Doing your homework before applying for a loan is the most crucial thing to keep in mind. Research is key, whether you’re looking for a no credit check loan, home equity line of credit, peer-to-peer loan, or another type of financing.

The best strategy for shopping around is to choose your lender and no credit check loans after doing thorough research. So disregard that eye-catching payday loan ad and look for a lender who can help your financial situation instead.

Huxley Forbes

Chief Editor at PaydayChampion

Huxley Forbes is the editor of PaydayChampion. He is responsible for PaydayChampion’s content strategy and helps produce loan reviews, student loan guides, and other materials to address financial concerns and help them save money. Huxley Forbes came to PaydayChampion as an author in 2011, when he joined as a writer. Over the years that followed, Forbes helped build PaydayChampion from the ground up by becoming one of the senior members of the team.

[Updated] Starlink internet down, not working or disconnected

[Updated] Starlink internet down, not working or disconnected

New updates are added at the bottom of this story…….

The original story (published August 18, 2022) follows:

Starlink users in Los Angeles, Seattle, San Francisco, New York and a few other cities are reporting that the internet is down and not working or keeps being disconnected.

The problem seems to have been going on for at least half an hour and service outage detectors such as Downdetector and Fing indicate that it is indeed a widespread outage.

We have shared some user reports below for your reference:


@elonmusk why??? Why did you delete statistics when you are logged out? Why also remove the reboot starlink???? Why is it so low now? (Source)

Your starlink wifi is terrible. Therefore I ask for a 1v1 in fortnite for 50,000 dollars you rub (Source)

@SpaceX Any info on why #Starlink is down or how long the issue will last? (Source)

Right now, users seem to be getting a message that their Starlink service is “Offline”. Some even shared screenshots of the Starlink app showing outages and how long they lasted for the past 12 hours.


This suggests that the company should be aware of the issue, however, there is no public statement acknowledging the outage.

Most users can currently expect Starlink to fix the issue as soon as possible.

We will keep an eye on the situation and post an update if and when there are further developments regarding the issue.

Update 1 (August 18, 2022)

7:41 p.m. (IST): It appears that the recent Starlink Internet outage has now been resolved, as reports of Descent detector decreased.

Update 2 (August 30, 2022)

12:50 p.m. (IST): New reports on Twitter and Descent detector now suggest that Starlink internet is down again or not working for many.

PiunikaWeb began as a purely investigative tech journalism website with a primary focus on “breaking” or “exclusive” news. In no time, our stories were picked up by Forbes, Foxnews, Gizmodo, TechCrunch, Engadget, The Verge, Macrumors and many more. Would you like to know more about us? Head here.

See the original “Blair Witch Project” website from 1999


Most viewers watching The Blair Witch Project know today that the horror film was made with unknown actors on a shoestring budget. But when it hit theaters in 1999, an air of mystique still surrounded the production. To legitimize the film’s “found footage” story, the filmmakers forbid the three stars from doing press. Heather Donahue, Michael C. Williams, and Joshua Leonard (who shared names with their characters) were even listed as deceased on IMDb. One of the most memorable aspects of the unconventional marketing campaign was the co-director of the website that Eduardo Sánchez built himself.

According The audiovisual club, blairwitch.com was registered when the Internet as we know it was still in its infancy. Sánchez was the only member of the production team with expertise in creating websites, so he volunteered to upload the film’s mythology online.

The website included flyers showing missing filmmakers, photos of their abandoned objectsand one timeline of unusual events in the history of Blair Township. Browsers could get a taste of the film by downloading video and audio extracts which would have been recovered in the woods. The website even featured bonus material that was not used in the film, such as interviews with investigators and clips from Heather’s Diary.

As is the case with the movie itself, the site’s low-budget feel works in its favor. Even if you know the three “directors” are actors, the website makes it easy to buy into the story of their disappearance (especially if you read it late at night). It’s also a goldmine for brave souls looking for more Blair Witch material after seeing that weird final shot.

The original blairwitch.com is no longer active, which means you can’t log on to the discussion forums and dissect the mysteries of the movie like it’s 1999. Fortunately, the archived version is accessible through the Wayback Machine and looks like it did 23 years ago. We recommend checking it indoors, even if you get good Wi-Fi in the haunted woods behind your house.

Tearing the Band-Aid: Putting People at the Center of the Humanitarian System – Kenya



Hunger in East Africa doubles in a year with response described as ‘grossly inadequate’

The international community’s response to early warning signs of a hunger crisis in East Africa has been described as ‘grossly inadequate’ as hunger has more than doubled in a year, according to an analysis by the international development charity Christian Aid.

In a report titled Ripping off the Band Aid, Christian Aid warns that hunger has “more than doubled in a year”. On World Humanitarian Day 2021, 2.1 million people in Kenya faced food insecurity, while 4.1 million Kenyans faced the same fate in 2022.

In Ethiopia, the number of people facing food insecurity has increased dramatically, from 5.2 million to 20 million. Across Ethiopia and South Sudan, the UN reports that funding shortfalls have forced cuts in rations, incomplete food baskets and fewer people being helped.

The analysis also shows that the catastrophic impact on crops, livestock and pastures has been compounded by other shocks, including conflict, floods, locust infestations, the lingering effects of Covid on prices and supply chains now disrupted.

Christian Aid warns that the crisis in East Africa has shown that the aid system is not suited to respond to the ever-increasing scale of emerging crises. To break the cycle of food hunger, the charity says now is the time to “rip the bandage”.

Development agency calls for scaling up local approaches that build on existing capacities and local knowledge to build resilience and create the flexibility needed to respond quickly to changing needs in East Africa and beyond .

Highlighting the work of their local partner Community Initiative Facilitation and Assistance (CIFA), Christain Aid’s partner in Kenya, Christian Aid says their experience of building community resilience through a partnership approach is working.

Despite the persistence of drought, a group of women working with CIFA have been able to maintain the productivity of their land to support livestock and the local fodder market through investments in improving their land in 2021.

The group successfully planted grasses and sold three harvests of hay, each time making a profit above its forecast. They also sell firewood from the ground in the local market.

Mbaraka Fazal, who is based in Kenya and is Christian Aid’s Global Humanitarian Manager, says:

“The hunger crisis has forced men and boys to walk further to find water and pasture, exacerbated conflicts over these scarce resources and put women and girls at greater risk of being left behind. for longer periods without regular income or basic items.

“In a world where there is enough food for everyone, it is a moral outrage that people are starving.

“While helping people currently facing life-threatening hunger is of the utmost importance, we also need to start thinking longer term. We have to accept that the aid system is only an unsuitable band-aid to respond to the ever-increasing scale of emerging crises.

“Christian Aid’s experience of working with local partner organizations in Kenya, Ethiopia and South Sudan shows that people’s ability to withstand crop failures and rising food prices can be significantly improved through supportive preventive action.

“To break the cycle of food hunger, it is time to take off the band-aid and invest in building resilient communities during and between crises. This requires government-backed funding and local knowledge to complement early warning systems and anticipatory measures.


Notes to Editors:

Report linked here.

Response from Christian Aid:

In Ethiopia, Christian Aid programming supports resilience and basic needs during drought. Local partner organizations working with Christian Aid build the resilience of farmers, herders and vulnerable people with food and veterinary support for animals; Potable water access ; and seeds, tools and money.

In northern Kenya, Christian Aid works through partners to ensure people and animals have access to water; distributing cash to families to meet basic needs; and supporting animal health to build resilience to drought conditions.

In South Sudan, Christian Aid is responding to conflict-induced displacement and the effects of this season’s rains with unconditional cash to prepare communities for the next planting season and to meet the basic needs of displaced people.


To national governments:

  • Support responses that place community resilience at the center of all phases, from relief to recovery and reconstruction. Use conflict-sensitive processes and consider the specific needs of various groups, such as displaced people and host communities, as well as farmers and pastoralists.

  • Provide appropriate budgetary support for the development of agriculture and livestock, to recognize the disproportionate role of agriculture and livestock in the economies of East Africa and therefore in the resilience of communities. This support must promote, through subsidies if necessary, agro-ecological approaches adapted to the nature and current realities of the market in terms of access to agricultural inputs.

  • Integrate adaptation into local and national development plans, with a focus on improving resilience, such as improving access to water and rangelands. This requires budget support; a promising example is Kenya’s County Climate Change Funds (CCCFs), which provide funding and training for adaptation activities and help communities connect vertically with the county and national government.

  • Provide adequate social protection funding and support to address the impacts of crises, especially for vulnerable people and for households that lose their livelihoods and assets. Prioritize working with donor governments to create sustainability plans so that social protection systems are supported by national budgets.

To donor governments and international institutions:

  • Support humanitarian response at the speed and scale needed. All funds available in the humanitarian and development funding pipelines must immediately flow to the front line given the scale of the need.

  • Giving funding alone is not enough; donors must ensure that transformative practices are followed in line with Grand Bargain 2.0 commitments. Funding should be flexible, multi-year and predictable, with pre-funding available to respond to early warnings with proactive action. It must be delivered through equitable local partnerships, with support for the leadership and delivery capacity of local responders, and the participation of affected communities.

  • Support the scaling up of local approaches to humanitarian response to complement traditional response approaches, such as Survivor and Community-Led Response, which build on the natural strengths and cohesion of communities to enable them to respond quickly to their needs using their existing capacity, knowledge and opportunities.

  • Support and encourage a joint approach between humanitarian, development, disaster risk reduction and climate adaptation, positioning early warning and early action as a resilience approach. Carefully consider the timelines of the responses needed to ensure that the different funding mechanisms are coherent and layered to best respond to the crisis, recovery and resilience-building phases.

Increase loans for agriculture and small businesses


Yesterday, experts urged banks to increase loan disbursements for small, micro, small and medium enterprises and the agriculture sector as the majority of lenders are currently showing reluctance to do so.

Outstanding loans in the banking sector increased by 88% in June this year compared to about five and a half years ago.

For all the latest news, follow the Daily Star’s Google News channel.

Meanwhile, credit growth for the small business and agriculture sectors was only 17% and 28% respectively.

In such a situation, all stakeholders including banks and non-banking financial institutions (NBFIs) should emphasize the issue as these two sectors are the lifeline of the economy, they said. .

They made the recommendations on the closing day of a two-day 9th Annual Banking Conference 2022 hosted by the Bangladesh Institute of Banking Management (BIBM) at its Dhaka office.

Outstanding credit in the agricultural sector represents less than 5 percent of total loans. Policymakers should pay attention to this issue so that bankers do more to improve lending to this sector, says expert

Md Ali Hossain Prodhania, former managing director of Bangladesh Krishi Bank, said small business loans accounted for no more than 15% of outstanding loans in the banking sector.

Moreover, outstanding credit in the agricultural sector represents less than 5% of total loans disbursed, said Prodhania, a supernumerary professor at BIBM.

“Thus, policymakers should pay attention to this issue so that bankers put more effort into improving their loan disbursements to these sectors,” he added.

Mosleh Uddin Ahmed, managing director of the South Bangla Agriculture and Commerce Bank, said many lenders are generally hesitant to lend to small businesses given the higher operating costs and credit risk.

“We all talk about it…but we love lending to big borrowers,” he added.

The Bangladesh Bank had rolled out stimulus packages for small businesses during the pandemic, but data from the Bangladesh Institute of Development Studies shows that 58% of entrepreneurs were not even aware of the facility’s existence.

In this context, he suggested that the authority concerned set up a database for these customers.

A total of 26 research papers related to the country’s financial sector were presented at the conference, the closing session of which was attended by Ahmed Jamal, Deputy Governor of the Central Bank, as the main guest.

He said papers by academics and bankers would help identify many critical issues and challenges facing the domestic banking sector.

Md Akhtaruzzaman, Director General of BIBM, and Prashanta K Banerjee and Shah Md Ahsan Habib, Professors of the institution, also spoke at the event.

Jennifer Lopez and Ben Affleck set the internet on fire with a PDA-filled outing in Italy


Ben Affleck and Jennifer Lopez are moving forward with their relationship and setting major couple goals.

The newlyweds are melting many hearts with their chemistry as they are seen expressing their love publicly, going on surprise dates, being possessive and supporting each other through thick and thin.

Lopez and Affleck dined al fresco before sharing a kiss during the second long-winded honeymoon in Italy on Saturday. The 50-year-old was momentarily distracted from his own meal as he guided a spoonful of food into his new bride’s mouth during their last public appearance.

Jennifer Lopez and Ben Affleck set the internet on fire with a PDA-filled outing in Italy

Lopez used a handy napkin to wipe bearded Ben’s lips as they faced each other on an outside table. The pair also locked lips before venturing out on a shopping spree in Como, during which the pair mingled with locals while strolling hand-in-hand.

Lopez looked stunning in a cream embroidered maxi dress for her lunch, which featured a criss-cross string bust and long sleeves. she also wore a matching sun hat, heels and a cream handbag with colorful embroidery.

On the other hand, Ben Affleck looked dashing in a pair of cream chinos and a sky blue striped shirt, with the recently groom adding his own pair of sunglasses. After their lunch, Ben took in the stunning views as he whipped out a camera to take a few snaps, documenting the moment.

Timeline of relationship between Ray Liotta and fiancée Jacy Nittolo


Nebraska football coach Scott Frost accepts responsibility for failed onside kick after upset loss to Northwestern


Nebraska coach Scott Frost accepted responsibility for a controversial onside kick decision in Saturday’s season-opening loss to Northwestern, while acknowledging he needs to do more to retain his work.

Frost made the call to attempt an onside kick as Nebraska led 28-17 midway through the third quarter in a game being played in Dublin. Northwestern easily recovered the kick on Nebraska’s 44-yard line and scored five plays later. The Wildcats outscored Nebraska 14-0 in the 24:37 Final to win 31-28 at Aviva Stadium.

Nebraska became the first major conference team in the AP Poll era, which dates back to 1936, to lose seven straight single-digit games, according to ESPN Stats & Information.

“I made that call, so it’s on me,” Frost said. “At that point in the game, I felt that all the momentum was on our side. I thought if we [recovered] that, we could win the game. …I felt like we were maybe the best team. You can’t really predict that they will score 14 in a row and we will spit after playing well to start the second half in attack.

“Those are excuses. If I was done, I wouldn’t have called.”

Northwestern coach Pat Fitzgerald said recovering the onside kick gave his team momentum. According to ESPN Stats & Information, only two FBS teams leading by 10 or more points in the second half attempted an onside kick last season.

Special teams contributed to Nebraska’s struggles under Frost, which fell to 15-30 in its alma mater and 5-21 in one-scored games.

“We just lost too many close games,” Frost said on Saturday. “These guys need to believe in something. We need to believe in ourselves as a team. I think they do.”

In November, Nebraska announced that Frost would return for 2022 but with a restructured contract, which cut his salary by $1 million and reduced his layoff guarantee from $15 million to $7.5 million. Frost also had to revamp his offensive staff, bringing in the new coordinator and calling in Mark Whipple and others.

Frost is under contract until the 2026 season.

“You have to win in this business to keep your job, that’s how it is,” Frost said. “I love Nebraska, I love the state of Nebraska, I love those fans who made the sacrifice of come here. “

A Nebraska native and former national championship-winning Huskers quarterback, Frost returned to his alma mater in 2018 to much fanfare. He led UCF to a 13-0 record in 2017.

Frost is under increased pressure after Saturday’s loss but won’t consider retiring if things don’t improve soon. Nebraska hosts FCS opponent North Dakota next week.

“No, absolutely not,” Frost said of a potential resignation. “I love Nebraska. I’m going to fight guys, as long as I can fight.”

How the ultra-rich hide their immense wealth


The wealth gap is not limited to the United States alone. There are the rich, then the ultra-rich, who despite their stratospheric wealth, are largely invisible to the rest of the world. In his new book, Cobweb Capitalism: How Global Elites Exploit Frontier MarketsKimberly Kay Hoang examines the shadowy international web of political and economic elites and the covert and corrupt practices they use to earn and protect their money.

fast company spoke with Hoang, a sociology professor at the University of Chicago, about this hidden economic web:

fast company: Tell us about this idea of ​​“cobweb capitalism”.

Kimberly Kay Hoang: Cobweb capitalism is a complex web of interconnected subsidiaries across multiple sovereignties that are virtually impossible to identify. Offshore financial centers have enabled economic and political elites – which in less developed economies are often one and the same – to secure exclusive and quasi-legal opportunities to accumulate enormous wealth.

The Web is so complex and involves so many layers and actors that it becomes difficult to trace it. Each strand is connected by networks of professionals in finance, law, management and public relations, all of which are hidden from each other. They deliberately obscure their relationship to other parts of the web.

I call the ultra-wealthy individuals who control the web the big spiders. But these spiders use “agents” or “fixers” to cover up close ties to transactions that would be considered “dirty” or corrupt.

This brings us to the next question. You talk about how the ultra-rich often “play in the gray”. What exactly does this mean?

Playing in the gray was a language that many of my interviewees used to describe how they are refining the line between legal and illegal activities, often ahead of the market and the law. Many said — and that was their language — “Yes, it’s all legal, but it’s morally wrong. I shouldn’t be able to get away with this. But, you know, that’s just the way financial markets work.

Playing in the gray is also an emotion. In frontier and emerging markets, people don’t make investments based on highly sophisticated algorithms that calculate risk. Rather, it is based on “gut feeling” gathered through a network of people who provide investors with insider knowledge or access to transactions that are not open to the public.

What are examples of these “morally reprehensible practices”?

I attended conferences where government officials asked what they needed to encourage foreign investment. And the answer was to allow finance professionals to co-write laws and policies regarding taxation, transfer pricing and other practices that allow foreign businesses to operate with little or no tax.

The ultra-rich often use offshore entities and shell companies to choose their legal jurisdictions and effectively and legally avoid paying taxes both in the countries where they make capital investments and where they reside. These offshore vehicles also allow them to set up legal firewalls to insulate their assets from all sorts of criminal and civil risks and to protect accumulated wealth from states wanting to accuse investors of corruption or litigation with various business partners. They also allow the ultra-rich to conceal their identities by hiring other financial professionals to serve as the face of many of these transactions.

A person I interviewed pointed out that I am a teacher on a W2 and that I pay more taxes than them. They might only pay 5% tax abroad in Hong Kong or Singapore, and 0% tax in the British Virgin Islands or Cayman and Seychelles. Legally they basically claim liabilities or losses onshore where they have operations in Vietnam or Myanmar and then they claim offshore profits in the vehicles which are kind of the holding companies of the onshore companies.

The other legal but morally reprehensible practice is to “pass the law forward”, or to adopt strategies that were highly profitable before regulation in developed economies and [using] in frontier markets where they outpace formal regulations.

An example is business transfer pricing practices, where businesses that are part of the same entity would charge each other for services, consulting services, or intellectual property. They took these transfer pricing practices and imported them into China. And then once in China, they took these practices to Vietnam and Myanmar. They claim they are mimicking what slightly more developed economies are doing, and they keep moving it to more and more emerging markets.

How the recent 1Malaysia Development Berhad scandal plays into your book – and the fact that Goldman Sachs admitted to conspiring in a scheme to pay over $1 billion in bribes to officials in Malaysia and Abu Dhabi to secure lucrative business deals. Is this just the tip of the iceberg?

Yes, that’s just the tip of the iceberg. This is the part that I find the most fascinating. This world is so vast and so mundane that I can’t think of any companies or individuals that can honestly claim that they are above these webs or outside these webs.

As one of my interlocutors told me: “Jho Low [the Malaysian fugitive businessman, wanted in connection with the 1Malaysia Development Berhad scandal] was a greedy narcissist. Can you imagine if he just lay low? . . . He would have got away with it because [the governments of] Malaysia and Singapore would have canceled the debt. . . to avoid a very public scandal that would tarnish their reputation. Most of the people I interviewed kept a low profile, and they operate with a stealth operation strategy hidden behind these capital networks.

So the ultra-rich hide behind the others. Your book cites a source saying, “Behind every CEO is a president, who is so wealthy that he is nowhere and everywhere and is accountable to no one.” Tell us more about it.

This is where I discovered the difference between ultra-high net worth individuals and wealthy financial professionals who manage their money. Many senior executives I have interviewed have told me that while they are often the face of a deal in newspapers and the media, they are just managing the money of others who are often invisible on these sites. website.

These very wealthy people syndicate all the legal and criminal risks of navigating highly corrupt markets to the C-suite leaders.

Take for example Timothy Leissner, former chief executive of Goldman Sachs and president of the bank’s Southeast Asia division, in the case involving Goldman Sachs for the 1MDB case. The people I interviewed identified very much with him because they saw him – and by virtue of their position, themselves – as the person to go to when there were accusations of corruption. And even in cases where someone like Leissner pays huge fines, the people behind him rarely have to hand over their profits. This is an extreme case because, among the groups of people I have studied, it is rare for the president to appear anywhere. They are everywhere because their money is everywhere, but legally they are nowhere and hard to see.

So who or what is the biggest culprit behind this unethical web?

You cannot identify an individual or a culprit. It’s systemic. People see themselves as a kind of cog in the system.

But a contributing factor is that finance professionals choose legal jurisdictions and operate in less developed economies. I would even say that in recent years under the Trump administration, the political elites have become one with the financial elites.

In emerging and frontier markets, financial elites have very close ties to political elites who choose either not to create laws or policies to govern or regulate their financial activities, or not to enforce those laws.

I’ve traveled with fund managers to raise funds for various investment projects in Vietnam and Myanmar, for example, and one of the ways they sold themselves was to say “we have access to these deals” , which means they have political ties for licensing. permits or access to public companies that privatize all kinds of operations that are not available on the public market.

We started to see some glimmers of this during the Trump administration, when Jared Kushner traveled to China and the Middle East, essentially selling his political connections to the United States. What I thought was unique in these frontier emerging markets are actually practices that may still have been happening in the United States and in developed economies.

You entered the search with one idea about the wealth gap and ended it with a different reality. Explain.

When I began this research, I often thought of the Occupy Wall Street movement and a narrative that divided the United States between the 1% and the 99%. This movement began to open us up to a shrinking middle class and a wide gap between rich and poor in America. This project showed me that there is great diversity in the richest 10% and even more in the richest 1%.

What I hadn’t anticipated was the global reach of this growing inequality. What I learned is that the rich in Ho Chi Minh City or Yangon in Myanmar have financial connections with the elites in Newport Beach, California; New York, Toronto and more. When the ultra-rich have access to the whole world, it means they can choose the legal jurisdictions that govern their financial activities. These financial markets are interconnected in a way where it’s not just a first world/third world divide.

What do you hope to get out of this book?

I hope it educates the general public on how these systems and people work and hopefully inspires talented people to help us put in place better policies and practices to govern these activities and ensure coordination. between governments. As the world becomes more and more unequal and no one governs the financial activities of billionaires, it will create more social problems. I hope this will open up debate and inspiration for new ways of thinking about our deeply interconnected global markets. Ultimately, I believe those of us who are excluded from these webs are just prey caught in them.

How the Joy of Instant Loans Can Get Ugly



Loan sharks peaked in the aftermath of the Covid-19 pandemic, which ravaged businesses and put millions out of work around the world. They attack digital ecosystems by promising quick cash to those running from pillar to pillar for a new job or to earn quick cash to meet expenses.

A 55-year-old bank employee in Bangalore committed suicide on July 29. Nanda Kumar left a note where he listed at least 40 mobile apps and detailed the harassment he faced from their representatives, according to the police.

In mid-April, *Ranvijay Srivastava, 28, was found unconscious in his company park in Lucknow with clefts in his wrist. He was lucky to be saved in time. Earlier this year, Telangana witnessed the sixth incident of suicide due to alleged harassment by digital money lending apps.

Loan sharks peaked in the aftermath of the COVID-19 pandemic, which has ravaged businesses and put millions out of work. They attack digital ecosystems by promising quick cash to those running from pillar to pillar for a new job or to earn quick cash to meet expenses.

Google said Thursday, August 25, that it had removed more than 2,000 loaner apps from the Indian Play Store since January this year for violating terms, misrepresenting information and questionable offline behavior.

The Chinese Enigma

Telangana Police raided offices and call centers in Hyderabad, Bengaluru, Pune and Gurugram in December 2021, from where hundreds of staff called customers. One of the 14 arrested was a Chinese national suspected of being behind 11 of these fake fast loan apps.

“The RBI has failed to sanction the illicit trade in fast loan apps, which are coordinated by major cyber criminals based outside India, especially in China, with the backing of their Indian agents,” Triveni Singh said. , SP, Cyber ​​Crime, UP. CNBC-TV18.com.

He also revealed that the union is mainly based in China. While most of these fake loan apps are operated by the Chinese, the Indians mostly work on commission only as loan collectors.

These apps send out hundreds of promotional text messages, emails and social media posts daily, offering instant loans without having to leave home. Indian agents use Telegram and WhatsApp to contact their targets and ask them to download the company’s app for verification.

The program recovers phone data as soon as it is downloaded, including contacts, social media and photos.

Personal Data Arming

When most apps are loaded on your phone, they require access to storage, contacts, camera, and microphone. It is almost impossible to determine which applications use this information and how. But having unrestricted access to data can provide an advantage to loan sharks or fake apps if a borrower defaults.

When deadlines are not met, defaulting debtors find themselves without a safety net due to exorbitant interest rates (in some situations interest rates can reach 60-100%) and constant harassment. In many circumstances, loan collectors will turn to public libel to recover their funds.

Constant phone calls, publishing defaulter information and sending threatening emails and messages are all part of the recovery process, Prof Singh said.

The curious case of re-emerging applications

To protect borrowers from “misleading and abusive terms”, Google has blacklisted hundreds of such apps from its Android store worldwide. Authorities in China, Indonesia and Kenya have followed suit, shutting down many businesses that promised quick cash to the unbanked.

But digital lending is proving to be a tough market to tame with a huge footprint, said Rahul Sasi, who runs cybersecurity firm CloudSEK.

Sasi, one of the experts who made recommendations to the Reserve Bank of India (RBI) regarding digital lending apps, said the RBI panel is aware that apps that are blocked by platforms like Google circumvent the restrictions. by switching to third-party platforms or using text. messaging for advertising.

The RBI has recommended the establishment of a self-regulatory body (SRO) covering participants in the digital lending ecosystem.

It’s time to get to know

“Most of these apps are illegal. According to the law, a loan company must be a bank or a non-bank financial company (NBFC) and must be registered with the RBI to be able to lend or be licensed as a money lender under the laws on state moneylenders. said Rakshit Tandon, cybersecurity expert and cybersecurity consultant with Internet and Mobile Association of India (IAMAI).

These loan sharks are now profiting from social media marketing. They track Google ad searches to exploit the unmet need for credit and target vulnerable borrowers.

“The Indian Cybercrime Coordination Center (I4C) has become aware of this situation and is constantly talking with Google to keep track of them. And to continue targeting these fake apps on their Play Store,” Tandon said.

Most instant cash loan apps intimidate buyers with a downgraded credit score into taking out another loan to pay off the first one.

And so begins the vicious circle of “ever-greening”.

“I took out a quick loan of Rs 3,500 but had to pay Rs 12,000 in interest on it. I lost my father to a heart attack after they kept calling him and threatening him with dire consequences for my mother and me,” *Ankush Natani said.

There must be a tougher crackdown on these loan sharks, Natani said, or we will continue to lose people to harassment and humiliation at the hands of instant loan app companies.

(*Names have been changed to protect the identities of cyber fraud victims)

Read the redacted document the feds used to convince a judge to issue a warrant to seize documents from Mar-a-Lago. It explains why the government felt there was probable cause that crimes had been committed.


The Justice Department has released a version of the document it used to convince a judge to issue a warrant to seize documents from former President Donald Trump’s Mar-a-Lago residence. The affidavit, which a judge ordered the Justice Department to release, explains why the FBI believed there was probable cause that crimes had been committed.

Despite the redactions, the affidavit includes many new details and clues as to why the FBI and the National Archives were concerned about “lots of classified documents” mixed in with other things at Trump, who is also a club and a private complex.

The first redaction of the document, on the first page, is the name of the FBI agent who wrote and signed this 32-page affidavit.

We also definitely see that the FBI is conducting a criminal investigation, although it doesn’t specifically name former President Donald Trump as a target, and that the National Archives dismissed the potentially illegal activity after recovering 15 boxes of documents, which mixed classified documents with other things. of Trump in January.

The affidavit is redacted to protect the identity of witnesses, details about a federal grand jury, and to hide details of the ongoing investigation. Magistrate Judge Bruce Reinhart ruled that the redactions were “narrowly tailored to serve the government’s legitimate interest in the integrity of the ongoing investigation”.

The FBI was initially investigating the 15 boxes already returned by Trump. They wanted to know how these boxes arrived at Mar-a-Lago, if any classified documents were improperly stored, and if people who should not have seen classified information had seen these documents.

The FBI agent who signed the affidavit **** cites experience and training in counterintelligence and espionage investigations and the use and storage of sensitive information.

What is unclear is what led the FBI to believe that there were additional documents at Mar-a-Lago. CNN reported that at some point the DOJ began to suspect the Trump team was not being truthful and a witness came forward.

The agent says this affidavit is not exhaustive of the facts known to the FBI. It simply establishes the probable cause of the search. Conversely, he also does not allege a crime against Trump or anyone else. This is common boilerplate language often found in FBI affidavits.

Read 18 US Code § 793 here. It concerns “the collection, transmission or loss of defense information”.

The system of classifying information as sensitive or classified is not provided by law. Rather, the rules are set out in a presidential decree. The most recent update came during the Obama administration, with Executive Order 13526. Read it.

This page describes some of the different classifications of information. Even though we get very little information about the specific nature of the classified documents that Trump possessed, we can infer from the inclusion of these definitions that the Mar-a-Lago documents ranged from Top Secret – requiring special storage – to even more restrictive documents. sub-classifications requiring special access.

CNN’s Katie Bo Lillis discussed the different classifications here.

HUMINT involves human intelligence, and disclosing identities could endanger sources who provide information to the United States in foreign countries.

NOFORN is an important designation because it signifies information that is not intended to be given to foreign governments or individuals without the consent of the agency that developed or obtained the information.

Here we learn which sections of federal law and regulations may have been violated.

The Code of Federal Regulations – or CFR – is published annually by federal agencies. 32 CFR Parts 2001 and 2003 are Federal National Archives regulations regarding the handling of classified national security information.

But the affidavit also cites Title 18 of the US Code – that’s federal law. 18 US § 1519 concerns the “destruction, alteration or falsification of documents in federal investigations and bankruptcy”. Read it.

18 US Code § 2071 has to do with the “general concealment, removal, or mutilation” of federal documents or property. Read it.

The PRA is the Presidential Records Act, passed by Congress following Richard Nixon’s failed attempt to take presidential records out of the White House with him after Watergate. For an explanation of why the American public, and not the former president, has Trump’s presidential documents, click here.

Much of what we’ve learned about this case, including early news from the research itself, comes either from Trump’s own statements or from revelations from his allies.

We are going strongly into the redactions here.

Here is that CBS affiliate report. Remember, it’s two days before President Joe Biden takes office. Footage of moving trucks at Mar-a-Lago was captured by news helicopters monitoring Trump’s future permanent address.

Items 24 to 37 of the affidavit establish probable cause. From this page we move on to “Supply of the Fifteen Boxes to NARA”.

An important date here. In early May 2021, a few months after Trump’s departure, the Archives had already established that documents covered by the Presidential Records Act were missing and were told that 12 boxes had been “found” and were ready for recovery. at Mar-a-Lac. See a full timeline of what we know.

After the affidavit was released, Trump responded on Truth Social, calling it “total FBI and DOJ public relations subterfuge.”

It is important. The FBI has identified 184 classified documents in the 15 boxes given by Trump to the Archives. These included 92 documents classified SECRET and 25 documents classified TOP SECRET.

The documents bear additional markings, such as NOFORN, as well as handwritten notes from Trump.

“Based on my training and experience, I know that documents classified at these levels typically contain” national defense information, the affidavit states.

We have seized a new portion of the affidavit, which indicates that there was classified information in the 15 boxes of presidential records that Trump turned over to the Archives in January 2022.

The Justice Department has not redacted Trump’s claim, through his lawyers, that he could issue some sort of blanket declassification order. It also outlines a claim by Kash Patel, a former national security aide to Trump who was named one of Trump’s delegates to the National Archives in June.

CNN’s Jeremy Herb noted: The investigator who wrote the affidavit cited a May article from the right-wing website Breitbart, in which Patel claimed that reports that the National Archives had found classified documents at Mar- a-Lago were “misleading” because Trump had declassified the documents. .

The rest of the affidavit section, however, is classified, so it’s unclear why federal investigators cited Patel’s comments.

Since the FBI search, Trump has pointed to a Jan. 19, 2021, memo in which he declassified documents related to the FBI’s Russia investigation. There is no evidence, however, that these materials were what the FBI was looking for when it searched Mar-a-Lago earlier this month.

More important clues.

A DOJ attorney said the documents in the 15 boxes were removed from a secure facility at the White House on Jan. 20, 2021, the day Trump left office.

The lawyer specifically told Trump’s lawyers that the documents were not handled appropriately and asks Trump’s lawyer to secure and preserve the Mar-a-Lago room where the 15 boxes had been stored. .

At least we know Trump’s attorneys saw the DOJ’s request.

The DOJ has redacted its arguments outlining probable cause for the August raid at Mar-a-Lago. CNN’s Marshall Cohen, Tierney Sneed and Jeremy Herb reported that in a legal brief also released Friday, prosecutors wrote that those details needed to be redacted because they would provide a “road map” for the investigation and that revealing “this information could therefore adversely affect the government’s search for relevant evidence. » Learn more here.

Here are some new details. The FBI envisioned more than a storage room and Trump’s “Office 45”. They also focused on his “residential suite” and a room identified as Pine Hall. Here is a photo of Pine Hall from the Library of Congress. It is described as “the antechamber to the owner’s suite”.

The FBI was careful to make it clear that members of the Mar-a-Lago club would not mind the search.

The finding calls for a search warrant, which was granted and then kept under seal. Read the key lines of this document here.

Two teams of agents were sent to Mar-a-Lago. The case team was the main group of agents on the case and they were planning to search the storage room. A second team, the Privilege Review Team, searched Trump’s office and sought to segregate any documents containing information that could be considered “privileged attorney-client” and keep them out of the public eye. case team.

Earlier this week, Trump’s legal team asked a “special master” to review documents recovered as part of the search warrant. Their request is still pending.

The affidavit was filed on August 5, a Friday. The search was carried out the following Monday, August 8.

This May letter from Trump’s attorney complained that there had been public reports of the DOJ’s investigation into Trump’s handling of classified documents. He argued that he voluntarily handed over documents, which may be an oversimplification.

Trump’s lawyer argued that the president has “unfettered” power to declassify documents – and that neither presidents nor former presidents can be sued over classified documents. This is the heart of Trump’s defense so far.

Trump’s lawyer demanded that his letter claiming Trump had the “unfettered” ability to declassify documents be presented to any judge hearing the case. On this request, the FBI complied.

Here’s a description of Mar-a-Lago, Trump’s sprawling 58-room estate in Florida. The FBI promised that the search, according to the affidavit, would not extend beyond the areas used by Trump.

The first thing the FBI wanted to do was seize all classified documents and the boxes or containers that contained them. The last was any evidence of “knowledge of the alteration, destruction or concealment” of documents.

What is Web 3.0? – Forbes Advisor


Editorial Note: We earn a commission on partner links on Forbes Advisor. Commissions do not affect the opinions or ratings of our editors.

The first website in history was created in 1991. You can still see it online today.

The Internet has evolved enormously since these beginnings and today has more than 5 billion regular users, or approximately 63% of the world’s population.

Some people believe that a new paradigm for the Internet is coming, called Web 3.0, also often referred to as Web3. They say a set of next-generation technologies could disrupt society, just as Web 1.0 did in the 1990s.

Despite these lofty claims, the concept of Web 3.0 can be both confusing and elusive. Let’s take a closer look at the claims and criticisms of Web 3.0 to better understand what it is all about.

Web 1.0: the static Web

The first version of the Internet is sometimes called the “Static Web”. It was made up of read-only web pages that overall lacked a lot of interactive features.

Web 1.0 offered little beyond browsing static pages. Content generation was handled by a select few and information was hard to come by.

Web 2.0: the dynamic web

In October 2004, O’Reilly Media and MediaLive hosted the first Web 2.0 conference to highlight a host of new software applications built on the Web.

At the end of 2005, YouTube was launched. The video-sharing site played an important role in the Web 2.0 revolution, which marked the Internet’s transition to an era of dynamic content. Users could now interact with web pages, communicate with each other and create content.

For many, the greatest symbol of this era is the emergence of social networks. Smartphones soon followed, with the first iPhone released in 2007.

Before long, we were all creating, sharing, and commenting on content instantly from the palm of our hands. If Web 1.0 was the read-only iteration, Web 2.0 could be thought of as the read/write upgrade, or what we call the Internet today.

What is Web 3.0?

This brings us to Web 3.0. Think of it as the “read/write/ownership” upgrade to the Internet.

Because it is above all a set of ideas, it is difficult to establish a precise definition of Web 3.0. For cryptocurrency developers and enthusiasts, Web 3.0 incorporates the technologies and concepts that are at the heart of crypto: decentralization, token-based economies, and blockchain.

This vision of Web3 tends to be a more democratic version of today’s online world. It centers around the idea of ​​ownership, removing control from dominant big data corporations and other central authorities and handing it over to the masses. This is what is meant by decentralization.

Decentralization means that Internet users can carry out peer-to-peer transactions, eliminating intermediaries and removing the power of controlling entities. There is more emphasis on privacy, transparency, and user ownership.

This is where blockchain technology and cryptocurrency come in. Cryptocurrencies and the token economy facilitate this model of decentralization, allowing information to be stored on a distributed ledger outside the remit of any entity. control.

Despite claims of democratization made by some crypto projects, with token holders able to participate in governance, a widespread criticism of Web 3.0 is that control is concentrated among venture capitalists and early adopters.

Web 3.0 technology

The future development of Web 3.0 could take many different paths. Here are some of the Web3 technologies we’re starting to see deployed today:

DeFi: Decentralized Finance

One of the most intriguing sectors is DeFi, which is short for decentralized finance.

DeFi aims to revolutionize the financial industry, removing the need for central authorities such as banks, payment processors, and other intermediaries. In their place would be a peer-to-peer financial system that lives on the blockchain.

Proponents argue that this approach would reduce fees, increase transaction speeds and allocate capital more efficiently.

As with most web3 applications, there would also be increased transparency, as all loan amounts, collateral, and other data are available for anyone to see on publicly accessible blockchains.

Importantly for some jurisdictions, accessibility is also improved. DeFi would be accessible to anyone with an internet connection, without the need for paperwork or third-party verification.

Most of what banks and other financial intermediaries offer can be done through DeFi, its proponents claim. This includes bank deposits, lending and borrowing, asset trading, and insurance, among others.

Some examples of popular DeFi protocols include Uniswap (UNI), Aave (AAVE), and Chainlink (LINK), which are designed to conduct financial transactions.

NFT: non-fungible tokens

Non-fungible tokens (NFTs) are a class of digital assets that live on the blockchain.

Each NFT is unique (non-fungible) and no two NFTs are the same. This contrasts with, say, dollars, which are fungible – a dollar is exactly the same as any other dollar.

Advocates see a wide variety of potential use cases for NFTs, but to date the only widespread use has been for digital artwork. As the crypto market accelerated towards the moon in 2021, multi-million dollar sales of digital art NFTs were commonplace.

But as the crypto winter set in in 2020, the NFT market crashed. Professional investors and art world critics have called NFTs nothing more than a speculative bubble.

The crypto world hasn’t given up on NFTs, and Web3 proponents consider them useful for verifying intellectual property, authenticating documents, and various crypto gaming features.

“NFTs could change several different aspects of our daily lives, such as tamper-proof identification, concert ticket sales, and much more,” says Giorgi Khazaradze, CEO of crypto-trading platform Aurox. “For now, however, NFTs remain extremely speculative.”

Many types of traded cryptocurrencies support NFTs on their blockchains. Some examples include Ethereum (ETH), Solana (SOL), and Avalanche (AVAX), to name a few.

DAO: Decentralized Autonomous Organization

Decentralized Autonomous Organizations (DAOs) may sound complicated, but the underlying concept is simple. A DAO is a group formed for a common purpose, with its rules, plans, and goals all encoded on the blockchain.

DAOs are controlled by their members. Proponents claim that a DAO has no hierarchy, no bureaucracy, and no bureaucracy. Most often, they operate based on a democratic structure, where votes are cast based on the number of crypto tokens users hold.

“What makes a DAO attractive to many users is that all financial transactions are recorded on a blockchain, which eliminates any third-party involvement,” says Felice Gorodo, CEO of eMerge Americas.

“Instead, transactions go through non-modifiable and transparent smart contracts. Breaking away from the traditional vertical corporate structure of executives, boards, and investors, a DAO allows all members to get involved and vote on whether changes need to be made,” says Gorodo.

How to invest in Web 3.0

Futurists say Web 3.0 will become an essential part of the ever-evolving Internet. If this vision materializes, it could unlock speculative potential for investors and developers.

If you believe in seeing the future, buying cryptocurrency is an easy way to gain exposure to Web3. You can buy cryptocurrencies that support DAO and DeFi protocols or buy digital art in the form of NFTs.

Remember that Web 3.0 is in its infancy. Investments of this nature are highly speculative and should be discussed with a financial adviser.

Pakistan: Monsoon Floods – Operation Report No. 1, DREF No. MDRPK023 – Pakistan



Summary of the main revisions made to the emergency action plan:

Another round of continuous heavy rains occurred in most parts of the country during the week of July 18 to August 2, 2022 intermittently, which caused further flooding in Baluchistan province while also affecting the provinces of Punjab and Sindh. New areas were affected including Lasbella, Jhal Magsi and Jafferabad districts in Balochistan, Muzaffargarh, Dera Ghazi (DG) Khan and Rahimyar Khan in Punjab and Dadu and Thatta districts in Sindh. The number of people affected by the floods has increased from 30,477 in July (when the EPoA was issued by the DREF) to 1,087,084 as of August 19, 2022.

This Operation Update is being released to inform stakeholders of the revisions to Operation DREF and the second allocation of CHF 297,943 based on current immediate humanitarian needs and priorities identified through Rapid Needs Assessments government and PRCS which are still ongoing in areas affected by monsoon floods. Below are the following changes/revisions to the original EPoA:

  • Shelters: No change in this sector, the activities remain the same (restocking of 35 tents).

  • Livelihoods and basic needs: In addition to the initial 1,400 households (HH), an additional 1,200 HH will be targeted in newly identified districts for an unconditional cash grant of PKR 16,000 (CHF 73.5) to cover their needs food, bringing the total to 2,600 HH.

  • Health: This sector was not included in the initial allocation of the DREF. The following activities have been added: Provision of primary health care services (including drugs) through deployment of Mobile Health Teams (EMS) in Jhal Magsi and Jafferabad districts for one month; Provision of 7,000 mosquito nets in the new targeted neighborhoods.

  • Water, Sanitation and Hygiene (WASH): Provision of potable water through the deployment of six additional water treatment plants, bringing the total to eight, for two months: three in Balochistan – Jhal Magsi, Jafferabad and Lasbella districts; two in Punjab – Muzaffargarh and Rahimyar Khan districts; and one in Sindh-Dadu district. Inclusion of water and hygiene promotion interventions, distribution of hygiene kits and jerry cans in Jhal Magsi, Jaffarabad, Lasbella, Muzaffargarh, Rahimyar Khan, Dadu and Thatta districts. With the second allocation, the PRCS will also increase the number of WASH items as follows: 2,300 hygiene kits (initially 900), 4,600 jerry cans (initially 1,800).

  • Coverage: With this new second allocation, coverage is extended to support a total of 30,545 people (4,364 households), revised from the original target of 9,800 people (1,400 households) covered by the allocation initial.

  • Timeframe: Given the evolution of the situation and geographical locations, the DREF’s timeframe has been extended to six months.


Description of the disaster

The second wave of heavy monsoon rains started in the country from July 18 and continued until August 2, 2022 with intermissions. Continuous rains over a period of two weeks have caused massive flooding in the already affected province of Baluchistan, where the districts of Jhal Magsi, Jaffarabad and Lasbella have been badly affected by the floods. The heavy rains also hit Punjab province where Muzaffargarh and Rahimyar Khan were hit hard. So far, incidents related to rains and floods have killed 580 people across the country, including 224 children. According to the NDMA situation report of August 11, 2022, 176 people were reported killed in Balochistan, while in Punjab 120 and Sindh 130, along with 154 others in other provinces. It is also reported that Balochistan has recorded more than 600 percent above normal rainfall during this monsoon season since mid-June.

According to the media, citing the Federal Minister for Climate Change, on August 5, 2022, the government declared a monsoon emergency in the country. As the spell of ‘abnormal’ monsoon rains continues to hit the country, the PDMA of Punjab has issued a low to medium flood alert for the Chenab River asking all affected districts of Muzaffargarh and Rahimyar Khan to stay safe. high alert and take precautionary measures to protect populations in adjacent areas.

The impact of the floods is quite high, although assessments are still ongoing, according to NDMA reports, approximately 47,000 homes are damaged across the country, of which more than 9,000 are fully damaged.

Live Updates: Russia’s War in Ukraine


The West’s response to Russia’s six-month war in Ukraine has remained strong and largely united – to the surprise of many.

The transatlantic alliance managed to unite to provide financial and military support to Kyiv, reach agreements to stop using Russian energy and implement sanctions aimed at hitting President Vladimir Putin and his cronies .

However, as the war reaches its six-month mark, officials across Europe fear the consensus will crumble as the continent enters a dark winter of rising food prices, limited energy to heat houses and the real possibility of a recession.

Western officials and diplomats spoke to CNN on condition of anonymity to candidly describe the sensitive conversations between governments.

In a possible foretaste of more drastic measures to come, Berlin has turned off lights illuminating German landmarks to save electricity, while French shops have been told to keep their doors closed as long as the air conditioning is on or face a fine.

Ukrainian President Volodymyr Zelensky, who has captured the imagination of the West and pressured countries to support his war effort, may find it harder to capture the attention of fellow European leaders as the conflict s eternalizes.

“Maybe that’s why Zelensky said he wanted the war to end before Christmas, because the real problem will be to make sure the West keeps its promises in the long run,” Keir said. Giles, senior consultant at Chatham House think tank.

The winter fuel crisis is something European officials and diplomats think about daily, with Russia accounting for around 55% of Europe’s total gas imports in 2021.

European countries are also thirsty for Russian oil, with almost half of Russian oil exports to the continent. The EU would have imported 2.2 million barrels of crude oil per day in 2021.

‘In the European Union it will be very difficult and we have to try to keep our promise to cut Russia off from any profit from gas and other sources,’ top EU diplomat says, referring to deal reached between EU Member States to reduce their consumption of Russian gas by 15%.

However, the deal has been criticized for being voluntary, and officials fear that when things do happen some EU countries will simply not play their part.

Related: Learn more North stream 1 and North Flow 2 pipelines, which have been points of contention and sharpened the strong test Between Russia and the West during this invasion.

How Small Loans Can Help Solve Personal Problems


The past two months have been financially difficult for Manish. As the sole breadwinner, he found it difficult to manage these expenses on his own. From unpaid utility bills and home repair costs to his mother’s medical bills – the expenses were piling up, leaving him stressed about what to do next.
It was then that he came across several emails from different lenders offering him a small personal loan. Manish knew that a personal loan was a great option for big expenses. After reviewing the lender’s eligibility criteria, he also realized that he could easily qualify for a loan. But he wondered if it could help him solve his personal financial problems.
Small personal loans offer quick cash assistance without any end-use restrictions. So whether Manish is looking to pay his mother’s medical bills or catch up on unpaid utility bills, he can get the funds he needs with an instant loan.

Here’s how a small personal loan will help him manage his personal expenses.

1. No End-Use Restrictions
A small personal loan will provide him with affordable financing that can be used for a variety of purposes. Unlike a home loan or auto loan which is used for a specific purpose, lenders will not inquire about the purpose when sanctioning a personal loan. Here are the different personal uses for which he can take out a small loan to ease his financial burden-

● Emergency expenses
Since Manish needed funds to cover his personal and family expenses during a cash crisis, a small personal loan could help save the day. He can apply for a short-term loan online and pay his utility bills, finance a medical emergency, home or vehicle repair costs, and more.

● Debt consolidation
A small loan is ideal for borrowers looking to consolidate existing debt and simplify payments. Manish can apply for a small personal loan to combine multiple debts and credit card payments into one monthly payment. Moreover, small loans come with affordable interest rates, which makes repayment more manageable.

● Renovation of the house
Whether Manish wants to upgrade his kitchen to something more modern or finish necessary repairs around the house, a small loan will make that personal expense affordable by dividing the payments over a period.

● Wedding expenses
Weddings can be an expensive affair where expenses can burn a hole in your savings. With a small loan, Manish can easily prepare for this major life event. From venue and decorations to catering and wedding outfits, a personal loan can help her manage it all.

2. Simple application process
In most cases, lenders offer a personal loan through a simple application process. Manish can get a small loan online by visiting the lender’s website. Most lenders only ask for KYC documents (Aadhaar card and PAN) and few income documents. Once verified, he can receive the funds instantly and manage his personal expenses seamlessly.

3. Quick processing
With the rise of digital lending, loan approval and disbursement have become faster. Most lending institutions use data analytics and artificial intelligence to check an applicant’s eligibility and creditworthiness and verify documents before sanctioning the loan. This allows for quick loan approval and fast processing. He therefore does not have to wait any longer to obtain funds for his personal and household needs.

4. Flexible eligibility criteria
A small loan can be used without worrying about extended eligibility criteria. With a stable source of income, a high credit score and a stable repayment history, the chances of loan approval are higher. Also, most small personal loans are unsecured forms of credit, which means that Manish does not have to offer any assets as security for the loan. Rest assured, it can easily meet various personal financial requirements.

5. Easy refund
Whenever a financial emergency arises, a small loan becomes a great option as it comes with competitive interest rates and a flexible repayment term. The interest rate depends on various factors such as income, employment and creditworthiness of the applicant and is lower than other types of loans in most cases. Moreover, he can choose a convenient repayment term of up to 6 years depending on his affordability.
This ensures that Manish can pay for IMEs hassle-free without burdening his monthly expenses. Therefore, a small loan becomes ideal as it divides one’s big expenses into smaller EMIs, ensuring easy repayment.
So, a small loan will give Manish unparalleled financial convenience like no other. Whatever his personal needs, he can quickly apply for a small personal loan from his preferred lender.
If you are also looking for a convenient way to manage your personal expenses, just like Manish, visit the Tata Capital website. With attractive interest rates, a flexible loan term and a convenient repayment structure, they offer the most competitive loans on the market. In addition, their small personal loan has no prepayment fees.
So visit the website today to learn more about their loan offers.

Ransomware deletes Internet and web systems from Mansfield ISD


(TNS) – Teachers in Mansfield are continuing their lessons without using the internet and other web-based systems after the district recently fell victim to a ransomware attack.

The disruption is impacting the district’s access to its website, email and phone services. Campuses will remain closed to visitors because the Raptor ID system — which allows staff to screen who enters schools — is down, officials said in a news release.

“Many of our educational tools and processes are facilitated by being connected to the internet, but our amazing teachers and staff have been able to use their foundational skills and student relationships to move forward despite the obstacles we face,” Superintendent Kimberley Cantu said in a statement.

It is not known what data was compromised. Mansfield officials are working with authorities to protect student and staff information, according to the press release.

More information will be sent to families via social media.

A recent report by the Government Accountability Office noted 99 student data breaches reported from July 1, 2016 to May 5, 2020, which compromised the data of thousands of children across 287 school districts.

Dallas ISD was victim of a data breach last fall.

The DMN Education Lab deepens coverage and conversation about pressing education issues critical to the future of North Texas.

The DMN Education Lab is a community-funded journalism initiative, with support from The Beck Group, Bobby and Lottye Lyle, Communities Foundation of Texas, The Dallas Foundation, Dallas Regional Chamber, Deedie Rose, Garrett and Cecilia Boone, The Meadows Foundation, The Murrell Foundation, Solutions Journalism Network, Southern Methodist University, Todd A. Williams Family Foundation, and the University of Texas at Dallas. The Dallas Morning News retains full editorial control of Education Lab journalism.

© 2022 The Dallas Morning News. Distributed by Tribune Content Agency, LLC.

The Center for Information Technology Policy provides students with up-close government experiences


For a third consecutive summer, Princeton’s Information Technology Policy Center gave students the opportunity to learn about the workings of local, state and federal government in the Public Interest Technology Summer Fellowship (PIT-SF).

Students, five from Princeton and 14 from other universitiesspent about eight weeks working for agencies such as the Consumer Financial Protection Bureau, the Federal Trade Commission, and the Iowa Attorney General’s Office.

In August, fellows were invited to Princeton to share their experiences. About two dozen attended the sessions, including fellows from the 2020 and 2021 cohorts who were unable to come to campus during the first two years of PIT-SF due to COVID restrictions.

The PIT-SF targets aspiring juniors and seniors who want to work on policy at the federal, state, or local level of government and are attending a school in the Public Interest Technology University Network (PIT-A). It includes Princeton and other schools like Boston University, Columbia, Georgetown, Georgia Tech, Harvard, Ohio State, and Stanford.

The PIT-SF program was designed to integrate students with government agencies, giving them first-hand experience on issues such as child protection on the web, crimes against the elderly, and cryptocurrency schemes.

The program kicks off with a boot camp hosted by the CITP Technical Policy Clinic Manager Mihir Kshirsagar and Director General of PACI Tithi Chattopadhyayfollowed by a series of workshops with technology policy experts.

An idea comes to fruition

Technical Policy Clinic Manager Mihir Kshirsagar calls on a fellow during a workshop session.

“It certainly met all my expectations,” said Kshirsagar, who came up with the idea for the scholarship. “Giving college students hands-on, hands-on experience in politics is precisely what we’re aiming for,” he said.

The scholarship was modeled after programs for public interest lawyers that Kshirsagar, a former attorney in the New York Attorney General’s Office, knew about. But in the fast-growing sphere of public-interest technology, where regulators and policymakers are hungry for expertise on privacy and security issues in online data, social media and digital advertising, a he declared, “nothing like this existed”.

With the support of then CITP Director, Ed Felten and Chattopadhyay, Kshirsagar wrote a proposal to a Washington, D.C.-based think tank New America and was awarded a scholarship under the PIT-ONE initiative.

Emma Bearsa Princeton School of Public and International Affairs student who was assigned to the Federal Trade Commission’s privacy and identity division, said she was impressed with her peers and their commitment to public service.

“After two years of having everything on Zoom, having some sort of in-person experience has been so rewarding,” Bearss said.

“Everyone is incredibly smart and passionate about these issues,” she said. “Having a space made up entirely of people with these goals, just this drive to want to do good, has also been amazing.”

Christopher Maximos, a political science student and rising senior at Stanford University, once viewed federal agencies as “the do-it-all institutions.” But in the PIT-SF program, he was introduced to the inner workings of local government as a product manager in the mayor’s office of technology and innovation in San Jose, California.

Maximos was tasked with analyzing the data to determine how to enroll more qualified residents in the city’s underutilized child care program. He has seen first-hand how his work has directly helped eligible residents get the information they need to enroll and get the support they need.

“It’s a tangible and rewarding experience,” he said. “Working in local government has really taught me that I can have a direct impact. In fact, I was able to talk to the mayor about my ideas.

Policy experts share their advice

A man points while talking to students

CITP Acting Director Prateek Mittal shares career advice with PIT-SF scholars.

Fellows also gained insight from leading experts at the forefront of technology policy and regulation. They included:

  • Anne-Marie Slaughter, former dean of SPIA, member of CITP Advisory Board and CEO of New America
  • Samuel Levine, director of the Federal Trade Commission’s Office of Consumer Protection
  • CITP faculty member Jonathan Mayerassistant professor of computer science and public affairs at Princeton
  • Travis LeBlanc, Partner at Cooley Law Firm, LLP, and CITP Advisory Board Member
  • Colin Doctorow, Special Advisor to the Electronic Frontier Foundation
  • Erie Mayer, chief technologist at the Consumer Financial Protection Bureau

Slaughter spoke to students about the challenges of breaking into government work. Mayer encouraged them to learn a variety of digital technology skills, including investigative work, interview techniques and the use of web crawlers. Levine told the students their expertise was needed by the government.

“Having tech talent in our agency makes a huge difference in our ability to respond to the threats consumers face,” Levine said. “It’s a great way to channel your talent in a way that helps people.”

CITP Acting Director Prateek Mittal also met with the fellows, sharing his experience as a privacy and security expert and congratulating them on completing their fellowships.

He also offered some advice: “The real world is rarely as simple as a classroom environment. The real world is rarely structured. Whenever you see a fork in the road, follow the more ambitious path.

Email doesn’t suck. It’s the email clients that need improvement


Postcards can be one of the most obvious examples of Marshall McLuhan’s famous maxim, “the medium is the message”. Regardless of what you write on it, a postcard says to someone, hey, i was out and about traveling the world, and i was thinking about you.

I am an inveterate sender of postcards. For all the immediacy of today’s communication options, nothing quite conveys a message like a postcard does. Another aspect that I find McLuhanesque is the gap between when you send the postcard and when the person receives it. The card is independent of sender and recipient; third parties bring it to its fate.

I also love email, which I’ve always considered the digital equivalent of a postcard.

Although email does not have the physical limitations of a postcard (although email is also “open” in the sense that anyone with espionage skills can read one in transit), there is a time lag between sending and receiving in both formats. And I would say that the best emails follow the same format as a postcard: simple, targeted messages.

Not everyone loves email, of course, but I’m sure a lot of the aversion we have to email stems from the software we use to interact with it. In other words, email clients.

The technology behind email is one of the most enduring and widely used sets of protocols on the Internet. But while email technology, like the postcard, has stood the test of time, email clients have not. They have been corrupted, neglected and relegated to the back of the class. If we really want to learn to love email again, we first need better email clients.

I’m not talking about webmail (like Gmail), where you visit a URL and see your cloud-based inbox in the browser window. I’m talking about a standalone mail client that downloads your mail from a mail server and lets you read and reply from your desktop, either in a dedicated application or in a built-in mail reader. another application, such as a web browser. A standalone email client gives you the same benefits that all native apps have over their web-based counterparts: speed, grace, and offline accessibility. This sort of thing was common. The Opera web browser had a built-in email client, and Mozilla (maker of Firefox) supported the standalone Thunderbird client. But over the past 10 or 15 years, there has been a shift to web-based email, led primarily by Gmail. This move caused most browsers to abandon their email clients and even destroyed the market for some standalone email clients.

But many of us have never found web-based email appealing. I briefly tried Gmail and found it a step backwards. Slow to load, difficult to use, and insistent on trying to sort and organize my inbox for me by adding labels and moving things into separate tabs. That’s not what I want, so I’ve always relied on email clients to retrieve, view, and send my emails.

For reference, here is the historical timeline of my relationship with email client software: first there was Mutt, then Pine, then Eudora, then Mailsmith, then Opera, then Thunderbird. Now I use a combination of Mutt and Vivaldi Mail.

Column: China’s Weak Rough Imports, Pariah Buying Ease Global Market: Russell


Men walk past oil tanks at the factory of Liangyou Industry and Trade Co., Ltd in Qufu, Shandong province, China July 4, 2018. REUTERS/Jason Lee/File Photo

Join now for FREE unlimited access to Reuters.com


LAUNCESTON, Australia, Aug 23 (Reuters) – China is inadvertently helping ease tensions in the crude oil market by cutting imports and favoring shipments from exporters shunned by much of the rest of the world.

China, the world’s biggest oil importer, looks set for another soft August result, with Refinitiv Oil Research estimating arrivals at 8.33 million barrels per day (bpd).

That would be lower than the official customs data figure of 8.79 million bpd in July and 8.72 million bpd in June.

Join now for FREE unlimited access to Reuters.com


For the first seven months of 2022, China’s crude oil imports were 9.98 million bpd, down 4% from the same period last year.

Looking at the monthly data, it is clear that after a decent start to the year, China’s oil imports started to slump from June.

Several factors explain China’s recent weakness in crude oil imports.

Domestic fuel demand was hit by the strict COVID-19 lockdowns in several cities in the second quarter, and the relatively modest rebound in economic activity since they were largely lifted.

Refinery processing has also been weaker due to a lack of export quotas for products, meaning Chinese refiners have not been able to take full advantage of tight regional fuel markets, especially diesel.

High crude prices following Russia’s February 24 invasion of Ukraine likely also deterred oil buying, with Brent futures trading above $120 in May, at a time when June and July deliveries would have been arranged.

Chinese crude oil imports versus Saudi Arabia and Russia


The question is, what would be the state of the global crude oil market if China had continued to import at the level it was in the first five months of 2022, namely more than 10 million bpd?

There is no doubt that the global market would have been significantly tighter and prices would have come under strong upward pressure.

Another factor to note is where China sources its crude oil, with a notable change in recent months.

Russia was China’s top supplier in July for a third month, with pipeline and tanker imports reaching 1.68 million bpd, according to customs data released Aug. 20. read more

Chinese refiners have been willing buyers of heavily discounted Russian crude, grabbing shipments that would likely have been destined for countries like Japan and South Korea before Moscow’s attack on Ukraine.

For the first seven months of the year, China’s imports from Russia totaled 1.67 million bpd, just behind the traditional top supplier Saudi Arabia’s 1.72 million bpd.

Chinese imports from Iran and Venezuela, both of which are under US sanctions, are a bit murkier.

China reported no purchases in July from either country, but its customs data lists imports of 787,000 bpd from Malaysia.

That figure is widely assumed by market participants to be mostly oil from Iran and Venezuela, especially since Malaysia’s total crude output has averaged below 600,000 bpd this year, the data shows. from the US Energy Information Administration.

Currently, the United States and other Western countries should turn a blind eye to Chinese imports from Iran and Venezuela, because if Beijing really bought zero barrels from both producers, it would significantly tighten the global market.

It’s also worth pointing out that China isn’t helping ease tensions in the global rough market out of sheer goodness of heart, rather it’s pure economics at work.

China is buying shipments from Russia, Iran and Venezuela at prices lower than what it would pay its other suppliers.

As long as these discounts are offered and customers for Russian, Iranian and Venezuelan crude are constrained by geopolitics, Chinese refiners will likely continue to buy.

Making the global rough market a little less tight is just a side benefit that no one really wants to talk about.

Join now for FREE unlimited access to Reuters.com


Editing by Christian Schmollinger

Our standards: The Thomson Reuters Trust Principles.

The opinions expressed are those of the author. They do not reflect the views of Reuters News, which is committed to integrity, independence and freedom from bias by principles of trust.

Clyde Russell

Thomson Reuters

Clyde Russell is a commodities and energy columnist for Asia at Reuters. He was a journalist and editor for 33 years, covering everything from wars in Africa to the resource boom and its current struggles. Born in Glasgow, he has lived in Johannesburg, Sydney, Singapore and now divides his time between Tasmania and Asia. He writes about commodity and energy market trends, with a particular focus on China. Before becoming a financial journalist in 1996, Clyde covered civil wars in Angola, Mozambique and other African hotspots for Agence-France Presse.

Brandon Presley has a list of notable campaign donors


Nettleton’s Brandon Presley will host a political fundraiser on Thursday featuring a diverse and notable group of donors – particularly notable for a campaign for the low-cost office of Northern District Civil Service Commissioner.

The fundraiser, to be held in Tupelo at the birthplace and museum of Brandon Presley’s famous cousin, Elvis, will raise at least $209,000, depending on the level of commitment of donors listed on an invitation card .

It’s unclear whether the 94 people named on the fundraiser invitation are donating to Presley’s 2023 re-election campaign on the three-member Civil Service Commission or another position.

Presley has long been rumored as a possible Democratic candidate for governor – presumably against incumbent Republican Tate Reeves in 2023.

But Presley is still publicly evasive.

“I’m focused on bringing internet to every home in the state, trying to keep utility rates affordable in this time of high inflation,” Presley told Mississippi Today. “I try to work on things that make a difference for average Mississippians.”

He has also been active in trying to ensure that all Mississippians have access to safe drinking water.

If Presley chooses to run for governor, presumably against Reeves, the Democrat will need several fundraising efforts like what’s being held Thursday at Elvis’ birthplace and museum.

PODCAST: Will the 2023 gubernatorial race be “all shaken up” by Brandon Presley?

In each of his five statewide campaigns, Reeves has had overwhelming fundraising advantages over his opponents. During his 2019 campaign for governor, Reeves outspent his Democratic opponent, former attorney general Jim Hood, by $15.6 million to $5.2 million.

But interestingly, a handful of members of Reeves’ 2019 finance committee are listed as donors for Presley’s Thursday fundraiser in Tupelo. They include businessman Amory Barry Wax, Johnny Crane from Fulton and Colin Maloney from Tupelo.

Wax, a longtime Republican donor, is listed as having given at least $10,000 to Tupelo fundraising and donated $25,000 to Presley in calendar year 2021.

Based on January campaign finance documents from the Mississippi secretary of state’s office, Reeves had $4.8 million in cash, compared to Presley’s $520,000. In the same period before the 2019 gubernatorial election, Hood had $656,393 in cash while Reeves, then lieutenant governor, had $5.4 million.

But among Presley’s fundraising highlights to date is the number of Republicans who have written checks to him.

Among campaign donors, “we are fortunate to include a large group of Republicans and we always appreciate the support of all strong Democrats and independents,” Presley said. “I’ve always tried to be the type of chosen one who reaches across the aisle to try to find solutions…I’ve tried not to get caught up in the bedroom. ‘echo.”

Presley added that the donors “are people I know.”

The next filing of campaign finance reports is not expected until January 2023. But in election year 2023, there will be many more mandatory filings of campaign finance reports with the Office of the Secretary of State.

READ MORE: Can Brandon Presley be the statewide winner that Democrats can’t seem to find?

We want to hear from you!

By listening more carefully to and understanding the people who make up Mississippi communities, our reporters put a human face to how politics affects Mississippians every day. We listen carefully to our readers to help us continue to align our work with the needs and priorities of people across Mississippi. Please take a few minutes to tell us what you think by clicking the button below.

Republish our articles for free, online or in print, under a Creative Commons license.

Close the window

Republish this article

Unless otherwise stated, you may republish most Mississippi today stories for free under one Creative Commons Licence.

For digital publications:

  • Look for the “Repost this story” button under each story. To repost online, simply click the button, copy the html code and paste it into your content management system (CMS).
  • Editorial cartoons and photo essays are not included in the Creative Commons license and therefore do not have the “Republish this story” button option. To learn more about our cartoon syndication services, click here.
  • You may not edit our stories except to reflect relative changes in time, location and editorial style.
  • You may not sell or syndicate our stories.
  • Any website where our stories appear must include a contact for your organization.
  • If you share our stories on social media, please tag us in your posts using @MSTODAYnews on Facebook and @MSTODAYnews on Twitter.

For print publications:

  • You must credit Mississippi Today. We prefer “Author’s Name, Mississippi Today” in the byline. If you are unable to add the byline, please include a line at the top of the article stating: “This story was originally published by Mississippi Today” and include our website, mississippitoday.org.
  • You may not edit our stories except to reflect relative changes in time, location and editorial style.
  • You may not republish our editorial designs, photographs, illustrations or graphics without specific permission (contact our Editorial Director Kayleigh Skinner for more information). To learn more about our cartoon syndication services, click here.
  • Our stories may appear on pages with advertisements, but not advertisements specifically sold against our stories.
  • You may not sell or syndicate our stories.
  • You can only post individually selected stories, not as a collection.
  • Any website where our stories appear must include a contact for your organization.
  • If you share our stories on social media, please tag us in your posts using @MSTODAYnews on Facebook and @MSTODAYnews on Twitter.

If you have any further questions, contact the Director of Audience Development Lauchlin Fields.

Potential gubernatorial candidate Brandon Presley has a list of notable campaign donors

Nettleton’s Brandon Presley will host a political fundraiser on Thursday with a diverse and notable group of donors – particularly notable for a campaign for the low-cost office of Northern District Civil Service Commissioner.

The fundraiser, to be held in Tupelo at the birthplace and museum of Brandon Presley’s famous cousin, Elvis, will raise at least $209,000, depending on the level of commitment of donors listed on an invitation card .

Whether the 94 people named on the fundraiser invitation are donating to Presley’s 2023 re-election campaign on the three-member Public Service Commission or another position is unclear. Tate Reeves in 2023.

But Presley is still publicly evasive.

“I’m focused on bringing internet to every home in the state, trying to keep utility rates affordable in this time of high inflation,” Presley said. Mississippi today. “I try to work on things that make a difference for average Mississippians.”

He has also been active in trying to ensure that all Mississippians have access to safe drinking water.

If Presley chooses to run for governor, presumably against Reeves, the Democrat will need several fundraising efforts, like what’s being held Thursday at Elvis’ birthplace and museum.

PODCAST : Will the 2023 governor’s race be “all shaken up” by Brandon Presley?

In each of his five statewide campaigns, Reeves has had overwhelming fundraising advantages over his opponents. In his 2019 gubernatorial campaign, Reeves outspent his Democratic opponent, former attorney general Jim Hood, by $15.6 million to $5.2 million.

But interestingly, a handful of Reeves’ 2019 finance committee members are listed as donors for Presley’s Thursday fundraiser in Tupelo. They include businessman Amory Barry Wax, Johnny Crane from Fulton and Colin Maloney from Tupelo.

Wax, a longtime Republican donor, is listed as having given at least $10,000 to Tupelo’s fundraiser and donated $25,000 to Presley in the calendar year. 2021.

Based on January campaign finance documents from the Mississippi secretary of state’s office, Reeves had $4.8 million in cash, compared to Presley’s $520,000. In the same period before the 2019 gubernatorial election, Hood had $656,393 in cash while Reeves, then lieutenant governor, had $5.4 million.

But among the highlights of Presley’s fundraising to date is the number of Republicans who have written checks to him.

Among campaign donors, “We are fortunate to include a large group of Republicans and we always appreciate the support of all strong Democrats and independents,” Presley said. “I’ve always tried to be the type of chosen one who reaches across the aisle to try to find solutions…I’ve tried not to get caught up in the bedroom. ‘echo.”

Presley added, the donors “are people I know.”

The next filing of campaign finance reports is not expected until January 2023. But in 2023, an election year, there will be many more filings of campaign finance reports with the Office of the Secretary of State.

LEARN MORE: Can Brandon Presley be the winner of the state Democrats can’t seem to find?

This article was first published on Mississippi Today and is republished here under a Creative Commons license.


Finally, NFL football returns


For the past few months, the scorching rays of the summer sun have hit me as I stumble across the annual wasteland of quality sports to watch. Since witnessing the Warriors’ ironically named chance in their seventh championship – still far eclipsed by my 17 Lakers – I’ve been adrift in a sea of ​​baseball, golf, drag racing and other sports that many enjoy, but make me want to extinguish my peepers with Clorox Eye Bleach™.

At one point, I thought the blessed oasis of NFL football had come early, but it was just a sly mirage – a Canadian Football League game. More on that later.

Today’s column is all about football:

Facebook football smack talk rules of engagement

Tony Wade: The Last Laugh

So every year around this time I post my Facebook Football Smack Talk rules of engagement on Mark Zuckerberg’s site with a photo of me at Candlestick Park in San Francisco when the Oakland Raiders and San Francisco 49ers played in the regular season A few years ago. I went with Ken, John and Peter – three of my friends – who are all Niners fans.

In the photo, they were trying to turn me into a Niners fan with wine (sparkling cider from Martinelli) and cheese (pasteurized processed cheese). Of course, it didn’t take because their efforts were blocked by my awesome Lincoln Kennedy jersey, my good taste, my pride and my common sense.

At the game, the Raiders were beaten, Niners fans around me chanting “Raiders Suck!” and I was razzed by my friends. But you know what? I had a good time. Why? Because I was with my friends.

I am and always will be a Raiders fan. I’m talking a lot smack on Facebook, because good-natured sports rivalries are fun. I’m always amazed when someone thinks I literally hate other teams’ fans. Others can, but I can’t. I mean, I may not like their sports allegiances, but truth be told, some of my best punchlines are Chiefs/Broncos/Niners fans.

Oh wait, did I say punchlines? I meant friends. I would have included Chargers fans in this list, but they are on the endangered species list so I am not legally able to do so.

Look, football is entertainment and I don’t take it seriously.

I still try to remember the day football kicked off in 2001 when it was so important and then two days later on 9/11 it was shown how non-essential it really was.

So here are my self-imposed Smack Talk rules of engagement on Facebook:

• I only post to my timeline, not anyone else’s, and I don’t tag anyone. I do not use profanity or post rude images. Also, I never post anything blatantly or even marginally sexist and/or homophobic. People who post on my timeline or tag me will have their posts deleted. If they post profanity on my timeline – see you soon – friendless.
• If a fan of one of the 31 other inferior teams in the NFL posts a good, funny and original smack about the Raiders – on their own fucking timeline – I can and I respect that and often want to say it. But I absolutely loathe weak, web-recycled, amateur clappers that lack originality of any kind.

I’m a Football Smackologist™ and amateur smack annoys me – not for its content, but for its inherent lameness. So bring it on, but be correct.

Talking about football

My love of football is matched only by the fact that I hate people who talk about football on television or worse, on the radio. I’m not talking play-by-play within a game, I’m talking about shows where people talk and talk and talk about players, contracts, stats, etc. The blah blah blah blathering is overwhelming and really the only person I could stand talking about football for a while was John Madden because he was an original. But now that it’s moved to the Grand Stadium in the Sky, I don’t want to hear anyone else’s opinions, predictions, or analysis. I’m thinking of making a pilgrimage to the Pro Football Hall of Fame in Canton, Ohio, just to listen to Madden’s bronze bust talk about football.

great white north

My younger brother Scott, who has dual American and Canadian citizenship, has mentioned from time to time that in addition to being a Raiders fan, he is a Riders fan – that is, the Roughriders of Saskatchewan of the Canadian Football League. Listen, no offense, but the CFL is to the NFL what those records that once sat on the back of cereal boxes are to platinum albums. In fact, I’ve never seen a CFL game, so my disdain is based on stereotypes. I’m not interested in watching a football game where the referees are dressed as Mounties in “Dudley Do-Right”, the players are incredibly polite, and the major sponsors are Moosehead Beer and Pierre’s Gourmet Poutine.


While it’s exciting to finally see my team playing again, I don’t place much importance on pre-season. I’ve seen too many preseason superheroes get zapped by regular season kryptonite and never be heard from again.

Things that are far more important than who wins a pre-season game include whether Ferris Bueller beats his parents at home after his day off, whether Mr. Vernon discovers John Bender’s grass is literally in the sub- Brian Johnson’s clothes or whether shower curtain ring salesman Del Griffith’s other hand is actually between two pillows.

Yes, I had a thing with John Hughes while waiting for football to return.

Freelance Fairfield humor columnist and local accidental historian Tony Wade writes two weekly columns: “The Last Laugh” on Mondays and “Back in the Day” on Fridays. Wade is also the author of The History Press books “Growing Up In Fairfield, California” and “Lost Restaurants of Fairfield, California”.

Finnable now offers personal loans with no credit score


Bangalore, Karnataka, India:
Finnable, one of India’s fastest growing financial startups, now offers no credit score loans. An individual can avail a personal loan from Finnable online without any hassle. This comes as a welcome relief for people who have no credit score and are looking to take out a loan. Additionally, applicants can also check the EMI they are expected to pay each month with Finnable’s Personal Loan EMI Calculator.

For those looking to take advantage of an instant loan with no credit scorethey must take into account the following points:

Ask for a small amount
It is generally recommended to opt for a smaller amount whenn apply for a instant loan. Indeed, the smaller the amount, the more likely it is that lenders will approve it. On the other hand, loan applications for a higher amount may be rejected as lenders look for various aspects that might determine the ability of the applicant to repay it in full.

Apply with a guarantor
Generally, there is no need for a guarantor when applying for an online loan. That said, IIf the person has a low or no credit score, he can avail it from a guarantor. The guarantor can be anyone from the applicant’s parents to siblings or spouse. The only requirement is that the guarantor has a good credit rating.

proof of income
Apart from all this, the applicant will also have to produce proof of income at the time of application. Indeed, if the lender feels that the applicant has a stable income and has the ability to repay the loan on time, the chances of loan approval increase significantly.

  1. The instant loan application process on Finnable is simple and completely online. Here are the steps an applicant needs to follow to qualify for an instant loan:
  2. Individuals can apply for an instant personal loan with no credit score on Finnable’s website or through their personal loan application.
  3. They just need to create an account, register and add professional information such as age, job, etc.
  4. Then, the applicant will have to choose the amount for which he wishes to benefit from a loan. As a final step, upload their identity documents such as PAN card, Aadhaar card, etc. He/she will also need to produce his/her income proof documents, such as payslips and bank statements.

About Finnable

Finnable is one of the fastest growing fintech start-ups helping working professionals get hassle-free loans. Their mission is to make the personal loan accessible to all salaried professionals. They are dedicated to bringing in-depth financial technology expertise to help employees improve their financial situation with tools like free credit score tracker, EMI calculator and more.

Click here for media contact details

Submit your press release

Elon Musk says Tesla will raise FSD price by 25% in September


Tesla CEO Elon Musk on Sunday announced a 25% price increase for the company’s premium driver-assist system, marketed as Full Self-Driving, or FSD. The price will rise to $15,000 from $12,000 on September 5, Musk said in a tweet.

Today, Tesla charges customers $12,000 up front for FSD, or $199 per month on a subscription basis.

Musk did not immediately mention an increase in the cost of FSD subscriptions, and Tesla did not respond to a request for further information.

All new Tesla vehicles come with a standard driver assistance package called Autopilot, which includes features like “Traffic-Aware Cruise Control” and “Autosteer.” These rely on cameras, other sensors, hardware and software to automatically keep a Tesla vehicle centered in its lane and moving at the speed of surrounding traffic.

Tesla’s most expensive driver assistance option, FSD, includes what the company calls “Traffic and Stop Sign Control” and “Navigate on Autopilot” among its features.

These more advanced features are intended to allow Tesla cars to automatically detect and slow down traffic signs and signals; navigate from the on-ramp to the off-ramp while using the turn signals; Change lanes and take the exits.

Tesla is telling drivers to stay alert and be prepared to take charge of steering and braking their car at all times when using Autopilot or FSD. Its technology does not make Tesla vehicles self-driving.

A Tesla feature called Smart Summon allows drivers to use a smartphone and a Tesla mobile app as a remote control to summon their car from across a parking lot and drive slowly, with no one behind the wheel, to the where they are.

While some FSD features are also included in a cheaper option called Enhanced Autopilot, or EAP, only Tesla customers who purchase or subscribe to the premium option can request access to FSD Beta, an experimental version of Tesla’s system. .

FSD Beta users are expected to obtain a high “security score” from Tesla to gain and maintain access to the system.

Tesla’s approach has drawn criticism and regulatory scrutiny from the National Highway Traffic Safety Administration and the California Department of Motor Vehicles.

Still, the company is going ahead and releasing a limited version of the latest FSD Beta, for a relatively small group of users, Musk also tweeted on Sunday.

Earlier, he wrote on Twitter, “There are many major code changes, so this will be a very cautious rollout. Released 8/20 to ~1000 Tesla owners, then 10.69. 1 next week to accommodate feedback and release to ~10,000 customers, then 10.69.2 week after & release for remainder of FSD Beta.”

Owners who access FSD Beta can send feedback to the company through their car when the system crashes or acts erratically. Tesla previously said that 100,000 pilots had already installed FSD Beta.

Tesla plans to make FSD Beta even more common.

At Tesla’s 2022 Annual Meeting of Shareholders on Aug. 4, Musk said FSD Beta will be available to anyone who requests it by the end of this year. Here is a quote from the transcript of the Thomson Financial meeting:

“We are still expecting a widespread rollout of FSD Beta this year in North America, so I have to say that FSD will be available to anyone who requests it by the end of this year.”

Among those receiving the limited release update this weekend, social media has a large following influencers who sell Tesla products and post ad-supported videos on YouTube channels where they review the latest Tesla releases and more.

Since 2016, NHTSA has opened 38 investigations into collisions involving a Tesla vehicle where driver assistance systems, including Autopilot and more advanced systems, were thought to be a factor. Nineteen deaths have been reported in those crashes involving the Teslas under investigation.

Separately, the California DMV recently accused Tesla of deceptive marketing practices regarding the functionality of its vehicles, and it is conducting a technical review of Tesla’s systems, including FSD Beta.

Ashok Elluswamy, director of Tesla’s Autopilot software, said on Twitter This weekend that “Autopilot prevents ~40 crashes/day where human drivers mistakenly press 100% throttle instead of brakes.” Tesla generally does not make data on its systems available to third-party researchers for confirmation of its claims.

List of Upcoming Tamil Web Series on OTT Platforms


There is a noticeable increase in the popularity of original Tamil content on OTT. After disappointing starts, a number of industry platforms have overhauled their web series strategy, and it seems to be working. Suzhal: The Vortex, Amazon Prime Video’s most recent Tamil original, can probably be considered the turning point of this second run due to the positive attention it received for the way it handled a thriller episodic. The lackluster OTT beginnings of Tamil entertainment, which relied mostly on foul language, gore and provocative content, seem to be a thing of the past now that a number of series have been revealed and the names associated with them.

Here is the list of upcoming Tamil web series on OTT platforms:


The Village, billed as the first Indian television program to take its ideas from a graphic novel, tells the story of a family on a road trip besieged by a group of mutants. The program will be Arya’s first appearance on a digital platform.


An intense noir thriller about the death of a young girl will be told from the perspective of a cop, a writer, and an opportunistic editor in a manner reminiscent of Rashomon. In addition to Nasser and Sanjana, Laila, a former actor, will appear in the series.


With the web series Paper Rocket, directed by Kiruthiga Udhayanidhi – who previously supervised Vanakkam Chennai and Kaali – Kalidas Jayaram and Tanya Ravichandran star. The show follows its characters on a road trip that turns into a quest for self-discovery.


Hansika Motwani will play two roles in this series, one of which is a robot, and is considered to be the Indian adaptation of the popular Korean drama I am not a robot. Motwani will collaborate on the series with Rajesh, who directed his 2012 film Oru Kal Oru Kannadi.


Modern Love Chennai is one of the highly anticipated series in the Tamil OTT arena due to the names associated with it. This series, supported by Super Deluxe director Thiagarajan Kumararaja, is a translation of the American TV show Modern Love.

It will examine six different types of love, while taking place in Chennai, like the original. Kishore, Ramya Nambeesan, Ashok Selvan, Ritu Varma, Samyuktha Vishwanathan and Sanjula S are among the cast.

— ENDS —

Amir’s cheeky tweet takes the internet by storm after Afridi’s injury | locust


On Saturday, the Pakistan Cricket Board (PCB) confirmed Shaheen Afridi’s exclusion from the 2022 Men’s Asian Cup, which starts on August 27. Afridi had been out of international action since last month when he was forced to miss the second Test of the series against Sri Lanka. Although Afridi traveled with the Pakistani team to the Netherlands for the team’s three-game ODI series, he was not named in the squad. In addition to the Asian Cup, Afridi was also left out of the English series.

Following the development, a certain Pakistani left arm pacer had a rather cheeky reaction. Mohammad Amir, one of the country’s leading pacers, took to his official Twitter account to react to the news of Afridi’s absence from the side.

Read also : Watch: Shaheen Afridi’s ‘yaar, bas kya karein’ reaction to fans goes viral after being kicked out of 2022 Asian Cup

Amir had retired from international cricket at the end of 2020 but made himself available for selection from June last year. However, the PCB has since not considered him for a potential comeback. As Afridi was ruled out due to injury, Amir wrote, “I’m trending on Twitter but why.”

The PCB had earlier said that Shaheen had been advised of four to six weeks of rest by his medical advisory board and independent specialists following analyses.

The board said that although Shaheen was left out of the T20 Asian Cup and the T20 seven-game home series against England, he is expected to return to competitive cricket in October with the neo tri-series -Zealand, which will be followed by the ICC T20 World Cup in Australia.

Shaheen, who suffered a right knee ligament injury in the first test against Sri Lanka in Galle last month, was selected in Pakistan’s ODI squad and Asian Cup squad despite being injured with the head coach Mohammad Wasim insisting he better be watched. then by the doctor, the physiotherapist and the team coach.


    At the HT Sports Desk, passionate journalists work around the clock to provide detailed updates on the world of sports. Expect nuanced match reports, previews, reviews, stats-based technical analysis, latest social media trends, expert opinions on cricket, football, tennis, badminton, hockey, motorsports, wrestling, boxing, shooting, athletics and more.
    …See the details

Close story

Motorola website lists 10 Moto Edge, G-series smartphones to get Android 13 update: all the details


Motorola Moto Edge 30 Pro will receive the Android 13 update, according to the company’s website. The website lists 10 smartphones that can get the latest Android OS model. Of the ten handsets, 4 are from the Moto Edge streak and 6 are from the Moto G streak. The website does not specify a launch timeframe for the update. The Moto Edge 30 Professional was launched in India in February this year. Google recently rolled out the official Android 13 update to Pixel phones.

A list of Motorola smartphones that will get the Android 13 update has been listed on Motorola’s official website. The website lists 10 Motorola phones, including 4 from the Moto Edge series and 6 from the Moto G series. In the Moto Edge series, the Moto Edge 30 Pro, Moto Edge 30, Moto Edge+ (2022) and Moto Edge (2022 ) have been listed to get Android 13 update.

The six Moto G series smartphones that have been listed to replace Android 13 include Moto G Stylus 5G (2022), Moto G 5G (2022), Moto G82 5G, Moto G62 5G, Moto G42, and Moto G32. The company only has to announce a specific launch schedule for the Android 13 update to the handsets mentioned above. The website also does not reveal any data regarding the rollout of the update.

Not so long ago, Google announced the release of Android 13 update for its Pixel smartphones. The company had also pointed out that smartphones from other companies would start receiving the update later this year.

As a reminder, the Moto Edge 30 Professional was launched in India in February this year. The handset is powered by a Qualcomm Snapdragon 8 Gen 1 SoC. It sports a 6.7-inch pOLED display with Full HD+ (1080×2400 pixels) resolution, 144Hz refresh rate, 20:9 and a DCI-P3 color gamut.

The handset also features a rear triple camera setup with dual LED flash. On the front, it will get a 60-megapixel selfie camera. The Moto Edge 30 Professional packs a 4,800mAh battery with 68W TurboPower wire fast charging support.

YouTube removes video of Tesla investors using children in FSD beta test


Tesla Model 3

Source: Tesla

YouTube has removed a pair of videos from its platform showing Tesla drivers performing amateur vehicle safety tests using their own children instead of mannequins on the road or in the driveway.

The tests aimed to determine whether a slow Tesla equipped with the company’s latest driver assistance systems would automatically avoid colliding with pedestrians – in this case children – walking or stationary on the road.

After contacting CNBC, a YouTube spokeswoman, Elena Hernandez, wrote in an email late Friday:

“YouTube does not allow content that shows a minor engaging in dangerous activities or encouraging minors to engage in dangerous activities. After review, we have determined that videos submitted to us by CNBC violate our harmful and dangerous policies, and therefore we have removed the content.”

The specific policy cited by YouTube is for harmful and dangerous content. The company removes videos that promote dangerous or illegal activities that risk causing serious physical harm or death when it becomes aware of them. The spokesperson said: “Specifically, we don’t allow content that shows or encourages minors in dangerous situations that could lead to injury, including dangerous stunts, dares, or pranks.”

Tesla markets its driver assistance systems in the United States as a standard package called Autopilot and a premium option called Full Self-Driving (or FSD) that costs $12,000 upfront or 199 $ per month. It also offers select drivers access to an experimental program called Full Self-Driving Beta if they score high on the company’s in-car safety tests.

None of these systems make Tesla cars self-driving, or safe to use without a driver behind the wheel, aware of the road, and able to steer, brake, or accelerate at short notice. Tesla owner’s manuals warn drivers that the systems do not make their cars self-driving.

Driver: “I was ready to take over at any time”

In a video posted on Sunday, August 14, a Tesla owner and investor in the Elon Musk-led company Tad Park drove a Model 3 vehicle at 8 mph towards one of his children on an area road. of San Francisco Bay. No one was injured during the test.

The video had tens of thousands of views before YouTube, a division of Alphabet’s Google, deleted it. Alphabet also owns Waymo, the self-driving vehicle technology developer and robotaxi operator.

Park is the CEO of Volt Equity and the portfolio manager of an ETF focused on self-driving technology called VCAR. “I have experienced the product myself and believe in my investments,” Park told CNBC. “We have taken many safety measures so that children are never in danger.”

In a follow-up email, Park wrote, “First we tried on a dummy, then we tried on a big basketball player, then finally a kid got up and my other kid ran across the street.”

He said the car never went faster than 13 km/h and explained: “We made sure the car recognized the child. Even if the system failed completely, I was ready to take over at any time. I was going to have to brake if the car didn’t slow down enough.”

The tests were a success according to Park, as the car slowed down and did not hit any objects, pedestrians or her children. When asked if he would do it again, he said: “I don’t think any more tests are needed, but if I did, yes, I would do this test again.”

“That being said, I wouldn’t recommend people deliberately try this at home,” he added.

Park conducted the tests in part to refute a national ad campaign by the software company’s founder Dan O’Dowd criticizing Tesla’s driver assistance features.

The now-deleted video was posted on a YouTube channel called Whole Mars Catalog, which is run by Omar Qazi, a stockholder and big Tesla social media promoter. Tesla CEO Elon Musk frequently interacts with the blog and Qazi on Twitter.

In addition to YouTube, CNBC has contacted the California DMV and the National Highway Traffic Safety Administration to ask if these videos are safe or legal.

NHTSA said on August 16, “NHTSA advises the public that it could be very dangerous for anyone to attempt to test vehicle technologies for themselves. No one should risk their life, or the life of someone else, to test the performance of a vehicle. The technology.”

The agency also noted, “As NHTSA has consistently stated, no vehicle available for purchase today is capable of driving itself. and monitoring of the surrounding environment.”

The California DMV told CNBC via email: “As advanced vehicle technologies become more widely available, DMV shares the same concerns as other traffic safety stakeholders about the potential for misunderstanding or misuse of these features by the driver. DMV has previously told Tesla and continues to stress the importance of providing clear and effective communication to customers, buyers and the general public about the capabilities, limitations and intended use of any technology of vehicle. “

The California DMV recently alleged that Tesla engaged in misleading marketing or false advertising with respect to its driver assistance systems. It’s also in the midst of a lengthy security-related review of Tesla’s technology, including FSD Beta.

Police in the city where Park took the test drive did not respond in time for publication. Tesla did not immediately return a request for comment.

DOT prepares airline customer service dashboard : Travel Weekly


The Department of Transport will launch a new web feature on September 2 designed to provide air travelers with easy-to-access comparative information on the services offered by airlines when they are responsible for flight delays and cancellations.

The dashboard will be hosted on the DOT’s Aviation Consumer Protection website, DOT Secretary Pete Buttigieg wrote Thursday in letters to U.S. airline CEOs. Its information will be based on the commitments made by carriers in their customer service plans.

“I urge you to take this opportunity to evaluate your customer service plan to ensure it guarantees adequate services and facilities to help passengers deal with the expense and inconvenience of delays and cancellations,” he said. writes Buttigieg to CEOs. “The ministry is asking airlines to provide, at a minimum, meal vouchers for delays of three hours or more and accommodation for passengers who have to wait overnight at an airport due to disruptions under the control of the carrier.”

The letter is the latest step in a pressure campaign the DOT is mounting against airlines, which have struggled this spring and summer.

Earlier this month, in what is arguably its most significant recent action, the DOT introduced a proposal that would require airlines to offer refunds when they delay domestic flights by three hours or more or delay flights six hours or more.

According to FlightAware, so far this year, US airlines have canceled 2.6% of flights and delayed 21.3%, compared to a cancellation rate of 2.1% and a delay percentage of 17.2%. during the same period in 2019.

Poor operations have led US airlines to cut summer capacity by a cumulative 16% from previous plans. Carriers also increased their workforces, helping U.S. airline employment hit a record high in June.

In his letter, Buttigieg acknowledged those efforts, but said they had not been enough.

“Yet the level of disruption Americans have experienced this summer is unacceptable,” he said.

Consumer advocates say Buttigieg should take tougher action to rule the airlines.

“Even after a summer tsunami of cancellations, route closures, airfare hikes and sheer disregard for existing regulations, Secretary Buttigieg is still treating airlines like business partners instead of using its authority to enforce the law,” said Bill McGee, senior aviation and travel researcher at the American Economic Liberties Project.

That’s why I got caught in the web of internet scammers


Beware, phishing wave! Michael Bolliger (49) was also the victim of fake emails

That’s why I got caught in the network of scammers on the Internet

Not just in Wallace, but across Switzerland, fake emails from federal officials have been flooding email inboxes for the past few days. Blick reader Michael Bolliger explains how he was duped by internet scammers.


Wallace Township police warn against such emails with Confederate letterhead…

Christian Kolbe

Fraudsters are becoming more and more pranksters on the Internet. So shameless that even the police publicly warn against it. However, the township police warning only applied to Wallace. “Bad,” says Blick reader Michael Bolliger (49), “affects the whole of Switzerland.”

Bolliger runs a service in Lucerne as a PC doctor and has many former clients. Many of them are also affected. “Many customers panicked when these emails arrived in their inbox.” and contacted Bolliger.

In the email with the PDF letter attached, the scammers claim that the recipients are guilty of distributing child sex material. From: A badly forged Swiss Confederation letterhead. The letters contain terms such as “Police.ch”, “Cybercrimepolice.ch” or “Europol” and are written in German or French.

number or prison

Bolliger fell into the trap of internet scammers. PC Expert didn’t respond to emails – which certainly shouldn’t have – but stupidly opened them. Opens can be tracked – this is how newsletter senders define the open rate of their emails. By opening it, Bolliger inadvertently signaled to the crooks that something might be up.

Nothing happens for a few hours, then he has the choice between five years in prison or settling the case by paying a few thousand euros. in order to maintain its reputation.

The e-mail with the sender “Polise Federale” is in crude German, full of errors, in which a public prosecutor of the “Republic of Versailles” is threatened.

Half an hour later, the crooks increase the pressure. Bolliger must choose between getting paid or going to jail. And the next email says, “You need to get back to us in a few hours or we’ll have to arrest you in front of your family and loved ones.”

Phishing is easier thanks to hackers

“It could be anyone”: Phishing is easier thanks to hackers,02:04,

Delete, don’t read!

Bolliger’s main concern is to warn others not to reply to these emails, but to delete them immediately. Wallace Township Police, who were the first to make the news public, also advise: ‘Under no circumstances should you contact the sender, i.e. do not respond to emails’ .

Danger of such attacks: Exchanging e-mails with fraudsters can lead to data theft. Or the pressure remains until one or the other pays.

Trump’s apology for top-secret Mar-a-Lago Grow documents contradicts itself


The week that began Monday, August 8 provided such a neat encapsulation of the Trump scandal defense cycle that we shouldn’t let it drift into summer oblivion without comment. Each day brought a new development almost divinely designed to expose the instinctive nihilistic sycophancy of Trump’s defenders, as they repeatedly threw themselves in front of the Reality Bus in shock…SHOCKED!end up under the wheels the next lunch time.

The only difference from the good old days of the reality TV presidency was that the protagonist’s efforts to launch a new outrage bait to steer the world of viewers away from the previous outrage did not succeed. He was stuck on a problem, continually spouting new excuses but unable to overturn the game board. Let’s review.


Late in the day, we learned that the FBI had executed a search warrant approved by a federal magistrate to search Trump’s club and residence at Mar-a-Lago. The immediate question for many sentient creatures over the past half-decade was, What investigation was the raid related to? Soon we learned it had to do with classified documents Trump had taken to Florida from the White House. Trump’s immediate reaction was to suggest, without proof, that President Joe Biden was behind the raid. The reaction of many of his fans, who all seemed to have received a memo copied from a wide variety of MAGA bootlicker accounts, was a version of:

If they can do that to a former president, imagine what they can do to you.

Well, if I was under investigation for federal crimes, I could expect a visit from the Federal Bureau of Investigation. That a former President may also be investigated on suspicion of breaking the law is not a profound disturbance of the Force, it is an indication that, according to our noble creed, no one is above the law. That night, however, the same people who railed against the defunding of the police demanded funding and/or abolition of the FBI. The main takeaway from MAGAland was that there was nothing there and no legitimate reason for research.


Jan. 6 MC-Slash-Olympic Sprinter Josh Hawley Cheer Rally call for Attorney General Merrick Garland must resign or be removed. He insisted that FBI Director Christopher Wray, appointed by a certain D. Trump, be removed from his post. Indeed, the FBI serving a search warrant was “an unprecedented assault on democratic standards and the rule of law.” And Hawley would know.

His Senate colleague, Ted Cruz, helped to start up calls to “RAISING THE WARRANT,” although he admitted the search would only constitute political persecution if federal authorities did not produce evidence that Trump was hoarding documents with serious national security implications. (For what it’s worth, I was also saying they better produce the goods at the time, and they still do.) Also for what it’s worth, Trump could have immediately released his copy of the warrant – and the inventory of items taken, which he also had a copy – at any time. point after the search.

The was also the beginnings of “the president can declassify everything”, which is not strictly true and also does not say whether Trump Actually declassified these documents. We were also entitled to line that the FBI had mostly recovered boxes of trinkets like cocktail napkins and golf balls.


We came, intermittently, to the new topic of discussion: the evidence has been planted. Trump started saying that he and his lawyers had not been allowed to watch the search “to see what they were doing, taking or, hopefully not, ‘planting'”. But then his lawyer, Christina Bobb, said on Real America’s Voice that the Trump family watched the raid from a distance. At this point you will notice that the documents were not important, were magically declassified if important, and were also covered up by the FBI. Rand Paul also pitched this last idea on TV, while another Trump lawyer, Alina Habba, also said on Fox News, “I’m afraid they planted something.” Again, no supporting evidence. Just normal avocado stuff.

Elsewhere, Trump started shouting that Barack HUSSEIN Obama brought 30 million documents – so it was 33 million – to Chicago after his presidency, and surely some were bad like Trump’s? “How many of them were nuclear? ” He asked. “The word is, a lot!” The National Archives and Records Administration quickly released a statement that (twist!) was fabulously false, and these documents are in the possession of NARA.

Fox News star Brian Kilmeade replaces Tucker Carlson, put a doctored photo on the screen which claimed to show the judge who signed the warrant, Bruce Reinhardt, with Epstein’s accomplice Ghislaine Maxwell. Kilmeade would later say it was “joking” – you know, a joke where you insinuate that a federal judge is a pedophile when he is already the subject of a deluge of anti-Semitic threats who forced his synagogue to cancel weekend services.


The news was not good for Trump. New revelations indicated that the documents in question were quite serious. The New York Times reported that they included “special access programs”, a kind of super top secret, while the Washington Post shared that some had to do with nuclear weapons. Trump responded with a new line, asking why-oh-why the FBI didn’t just interrogate for deeds. The flying monkeys came down to complain about why Mar-a-Lago was looted—INVADED!— when the Feds could have just submitted a nice request to retrieve the documents.

“My attorneys and representatives were cooperating fully and a very good relationship had been established,” Trump said on Truth Social. “The government could have had anything it wanted, if we had it.”

But later that day, the Time reported that Trump received a subpoena months earlier as the Feds sought to recover the documents without a raid. (In January 2022, the National Archives separately picked up 15 boxes of material.) Justice Department officials also met with Trump’s lawyers at Mar-a-Lago in June and reviewed some of the documents and the configuration of Security. A look at the latter prompted them to ask the people at Trump to put a padlock on the storage room. One of Trump’s lawyers signed a written statement while all classified material had been returned to the feds.

But then Attorney General Merrick Garland addressed the situation and agreed to release the warrant, and the accompanying inventory of seized items was soon made public as well. It included 11 sets of classified documents. Maybe it looks like they weren’t “fully cooperating”? We also learned that the search was related to an investigation into three specific crimes: violation of the Espionage Act, obstruction, and theft or destruction of government documents. Curiously, none of these potential charges would depend on the documents in question being classified.


At this point, we heard that there was nothing important in the boxes (until there was); the rule of law was threatened because a former president was under investigation (for possibly breaking the law); and the documents were concealed by the FBI. Also, Obama. But wait, what about this whole idea that they had been magically declassified by the president? It had been on the back burner all week, but Trump turned to it when needed as the weekend approached and every other excuse had fallen away. The previously “planted” documents were suddenly legit, and he had declassified them. In fact, Trump announced — incredibly — that he had a standing order in place to declassify all documents he brought into the White House residence.

The very fact that these documents were present at Mar-a-Lago means that they could not be classified. As we can all understand, everyone ends up having to bring their work home from time to time. American presidents are no different. President Trump, in order to prepare for the next day’s work, often brought documents, including classified documents, to the residence. He had a standing order that documents removed from the Oval Office brought to the residence were deemed declassified the moment he removed them.

Yes, the president who made 285 visits to a golf club during his tenure was at work. Mr. Trump also has a bridge to sell you. By the way, if this is all true, why didn’t he just fix it all by turning over the documents when the Feds asked for them? Why does he need (in this formulation, “formerly”) classified documents in his basement?

At this point, another excuse started coming in: Trump didn’t pack the boxes himself! (Granted, hardly anyone thinks he was there with duct tape.) He didn’t know what was in there! Again, why did he refuse to return them when repeatedly asked?

But it was a prelude to the ultimate excuse, a shameless special: Trump was so caught up in the “chaotic times” of January 2021 that he didn’t have time for that sort of thing. Fox News kicked things off on Friday:

NBC News has arrived with a report the next day which seemed to extend this reasoning:

When Donald Trump finally realized, in the twilight of his presidency, that he wouldn’t be living in the White House for another four years, he had a problem: He had barely packed his bags and needed to move quickly…to certification by Congress of Biden’s victory on Jan. 6, 2021, Trump acted like he won the election — he didn’t — and did little to ensure a smooth transition, according to the source close to Trump’s decision who spoke on the condition of anonymity due to the investigation into the records. The source said it wasn’t until after Jan. 6 – two weeks before Biden was sworn in – that he began to make serious preparations to leave the White House. And the process was a mess.

If you follow at home, the idea is that Trump was so caught up in his autogolpe that he didn’t have time to deal with all that classified stuff. He only thought of leaving after the failure of his coup! You can’t blame him for then driving to Florida with top secret information and stashing it in his basement!

But wait, there was still time for another lick to jump on another member:

Alright, man. Jump in front of this bus. I’m sure Captain Trump will swerve to avoid you.

This content is imported from OpenWeb. You may be able to find the same content in another format, or you may be able to find more information, on their website.

Watch NASA’s Artemis Moon rocket roll out to the launch pad


Technicians will make final preparations, including connecting power and propellant lines to the rocket and launch tower. Although the deployment is faster, the target time for the launch of Artemis I has not changed: Monday, August 29 at 8:33 a.m. EST. You can sign up here to receive a reminder of the launch, as well as other space events, on your personal digital calendar.

The Space Launch System and Orion are two of the essential parts of NASA’s plans to bring astronauts back to the surface of the moon in years to come. Getting there requires a rocket powerful enough to push a large spacecraft out of low Earth orbit toward the moon, about 240,000 miles away. Orion is a capsule designed to carry astronauts on space trips that can last up to a few weeks.

NASA launched the SLS rocket for the first time on the launch pad in mid-March. In early April, he attempted to perform a “wetsuit rehearsal” of countdown procedures, including loading more than 700,000 gallons of liquid hydrogen and liquid oxygen rocket propellants. However, technical issues, including a hydrogen leak during three repeat runs, cut the countdown short.

NASA then took the rocket back to the Vehicle Assembly Building to make repairs. In June, the rocket returned to the launch pad for another wet dress rehearsal attempt. This attempt, on June 20, encountered a different hydrogen leak, in a fuel line connector to the rocket’s booster stage. However, the propellant tanks were fully filled for the first time, and the controllers were able to continue the repeat until the countdown ended with 29 seconds remaining. Originally, the goal was to stop the countdown with just under 10 seconds, when the engines would start for an actual launch.

Despite the leak, NASA officials decided that all critical systems had been sufficiently tested and declared the test a success. The rocket returned to the Vehicle Assembly Building once again for final preparations, including installation of the Flight Termination System, which would detonate the rocket if there were any problems during launch and eliminate the possibility of s crash in a populated area.

The flight termination system batteries, installed Aug. 11, normally only last 20 days, but the part of the United States Space Force that oversees launches from Florida has granted NASA a waiver that extends the period to 25 days. This allows for the August 29 launch date as well as September 2 and September 5 save opportunities.

NASA hopes to have fixed the hydrogen leak, but it won’t know for sure until the August 29 countdown, when the thruster line will be cooled to ultra-cold temperatures, which cannot be tested in the vehicle assembly building.

Web 3.0 is not a solution to DoS attacks

  • By Chiueh Tzi-cke 闕志克

The visit of US House of Representatives Speaker Nancy Pelosi to Taiwan on August 3-4 triggered a series of retaliatory countermeasures from China, including military, diplomatic, economic, and economic attacks. and information. Chief among them was an unprecedented large-scale military exercise that covered seven areas around the country’s waters and lasted four days.

In terms of information warfare, it was originally thought that China would impose high-visibility disruptions and damage government information systems with preemptive backdoor programs. Fortunately, this wave of cyberattacks appeared to be aimed solely at blocking government agencies’ network services – a denial of service (DoS) attack – rather than damaging their underlying computer systems. Although the services of several government websites, including the Presidential Office and the Ministry of National Defense, were temporarily interrupted, they were able to resume quickly. Overall, the damage caused by this wave of cyberattacks was quite minor.

The scale of the DoS attack was also not particularly excessive. According to publicly available reports, government office websites collectively suffered around 15,000 GB of cyberattack traffic throughout the day on August 2, 23 times more traffic than during the previous heaviest attack in a single day.

However, a 2020 study conducted by Amazon found that the average traffic volume of the most advanced DoS attacks it experienced that year was over 100 GB per second, or about 360,000 GB in an hour. Therefore, if China were to militarily launch a DoS attack against the whole nation, the scale of the attack would have to be at least 100 times greater than what it did this time around.

Suppose the maximum processing capacity of a network service is 1000 requests per second. When a DoS attacker sends requests to this service at a rate far exceeding its processing capacity, say 5,000 requests per second, the service would be too overwhelmed to properly respond to the attacker’s requests as well as those submitted by legitimate users. Specifically, the service would first place all incoming requests that it cannot process into a buffer zone, which would quickly fill up. He would ultimately have no choice but to drop all further requests, thereby denying them service.

This means that when a network service is under DoS attack, the solution must include the ability to discern the attacker’s requests among all incoming requests, and then reject the attack requests as soon as possible. In other words, the key to mitigating a DoS attack is the ability to distinguish, in real time, between good requests – those of legitimate users – and bad requests – those of an attacker.

Modern DoS attacks are distributed and called distributed DoS attacks (DDoS). Their attack packets come from large numbers of Internet-connected computers, which can be virtual hosts rented from public cloud service providers or devices recruited from a botnet for rent. Because attack hosts can originate from anywhere, it is difficult to use only the source IP addresses of incoming requests to distinguish between attack packets and others.

The most effective countermeasure against DDoS attacks today is traffic scrubbing. State-of-the-art traffic scrubbing technology is able to analyze the packet content of incoming requests to identify attack packets that exploit known vulnerabilities in specific communication protocols.

However, even traffic scrubbing is still relatively powerless against the deadliest form of DDoS attack, which mounts a brute-force attack using a very large number of geographically well-located networked computers, each submitting normal requests at a normal pace.

Fortunately, for government, e-commerce, and mobile application websites that serve the public or consumers, and where network services interact directly with human users, as long as it can be confirmed that there is a user human behind a specific IP address, then all requests from that IP address could be considered legitimate and not part of a DDoS attack.

Therefore, protecting user-facing websites from DDoS attacks comes down to determining whether the source IP address of an incoming request is controlled by a human – a legitimate user – or by a program – an attacker.

A standard way to distinguish between humans and programs is known as the Turing test, which uses problems that humans can easily solve but are beyond the ability of modern AI algorithms to determine. For example, during the login process of many websites, users are presented with (sometimes distorted) images and asked to identify the content using alphanumeric numbers. Similar tests could be used to identify attack requests during a DDoS attack.

Some people have proposed leveraging the emerging Web 3.0 architecture to defuse DoS attacks. Presumably, the intention is to apply the idea of ​​blockchain-like distributed database architecture to the system design of a network service, to improve its overall resilience to DoS attacks. The more network nodes over which a network service is extended, the less likely it is that a failure of one node can interrupt the service. Such an argument applies more to cyberattacks that use malware to control and therefore knock out the victim’s systems.

However, this is not how DoS attacks work. Instead, DoS attacks aim to exhaust the compute and bandwidth resources of the victim’s network service. Taking a fixed resource and distributing it among multiple network nodes does not change the size of the resource. A well-known weakness of blockchain is that its decentralized architecture requires close coordination between participating nodes – it therefore incurs significant computational and communication overhead, which significantly impairs overall system performance compared to its centralized counterpart. Therefore, using the Web 3.0 architecture to defeat DoS attacks has limited value and may well be counterproductive.

Chiueh Tzi-cker is a full professor at the Institute of Information Security, National Tsing Hua University.

Comments will be moderated. Keep comments relevant to the article. Remarks containing abusive and obscene language, personal attacks of any kind or promotion will be removed and the user banned. The final decision will be at the discretion of the Taipei Times.

What Exposed OPA Servers Can Tell You About Your Applications


With the appropriate request or token, an attacker could gain even more information about these services and scan for vulnerabilities or other entry points to break into an organization’s systems. We strongly recommend that companies currently use OPA as a policy-as-code solution to ensure they don’t unintentionally expose their APIs and policies online. In some cases, companies might use OPA without realizing it; several Kubernetes managed service providers rely on OPA for policy enforcement.

Keep in mind that we only polled list policy endpoints from REST API for ethical reasons. However, there are many other endpoints and methods available that not only list sensitive information, but also allow an attacker to modify or even delete data and objects from an exposed OPA server. Some of them are:

Create or update a policy

PUT /v1/policies/
Delete a policy REMOVE /v1/policies/
Patching a document (Data API) PATCH /v1/data/{path:.+}
Delete a document (Data API): DELETE /v1/data/{path:.+}

All of these can be found in the OPA REST API Documentation.

Protection of OPA servers

First, OPA servers should not be exposed to the Internet. It is therefore necessary to restrict this access to prevent anyone from digging into your OPA configurations via the REST API. The standard way to deploy OPA for the authorization use case is to run OPA on the same machine as the application requesting decisions from it. This way, organizations would not need to expose OPA to the internet or internal network, as the communication takes place through the localhost interface. Additionally, deploying OPA in this way means that organizations generally won’t need to enable authentication/authorization for the REST API, as only a process running on the same machine would be able to do so. query the OPA instance. To do this, OPA can be started with “opa run –addr localhost:8181” to only bind to the localhost interface.

Second, when using a policy tool as code such as OPA, it is important to protect the policies in a location such as a source code management system (SCM). It’s also essential to have proper access controls in place to monitor who can change what in these policies through features like branch protection and code owners. With the power of the SCM system, organizations can create a more streamlined process for reviewing and approving any changes to these policies, ensuring that everything in the source code is also reflected in the production OPA servers.


As shown in Figure 4, most of these exposed OPA servers found on Shodan were not using any type of encryption for communication, as this is not enabled by default. To configure TLS and HTTPS, system administrators must create a certificate and private key, and supply the following command-line flags:

  • The path of the TLS certificate: –tls-cert-file=
  • The path to the TLS private key: –tls-private-key-file=

For up-to-date information on this process, please consult the OPA TLS and HTTPS documentation.

Authentication and Authorization

By default, OPA authentication and authorization mechanisms are disabled. This is described in the official OPA documentation, and it is essential that system administrators and DevOps engineers enable these mechanisms immediately after installation.

Both mechanisms can be configured via the following command line flags according to the OPA documentation:

  • Authentication: –authentication=.
    It can be bearer tokens (–authentication=token) or client TLS certificates (–authentication=tls).
  • Authorization: –authorization=.
    This uses Rego policies to decide who can do what in OPA. It can be enabled by setting the –authorization=basic when starting OPA and providing a minimal authorization policy.

More details regarding this process can be found in the official OPA document authentication and authorization documentation.

Cloud security recommendations

Kubernetes is one of the most popular platforms among developers, as proven by its high adoption rate which shows no signs of slowing down anytime soon. With an ever-expanding user base, Kubernetes deployments need to be protected against threats and risks. To do this, developers can turn to policy-as-code tools, which can help implement controls and validate procedures in an automated way.

In addition to diligently applying some basic management rules to keep Kubernetes clusters secure, organizations can also benefit from cloud-specific security solutions such as Trend Micro™ Hybrid Cloud Security and Trend Micro Cloud One™.

Trend Micro helps DevOps teams build securely, ship fast, and operate anywhere. The Trend Micro™ Hybrid Cloud Security solution provides powerful, streamlined, and automated security within the organization’s DevOps pipeline and provides multiple XGen™ threat defense techniques to protect physical, virtual, and cloud workloads in the pipeline. ‘execution. It is powered by the Cloud One™ platform, which provides organizations with unique insight into their hybrid cloud environments and real-time security through network security, workload security, container security , Application Security, File Storage Security and Compliance Services.

For organizations seeking runtime workloads, container images, and file and object storage security as software, Deep Security™ scans workloads and container images Scan for malware and vulnerabilities at any point in the development pipeline to prevent threats before they are deployed.

Trend Micro™ Cloud One™ is a security services platform for cloud builders. It provides automated protection for cloud migration, cloud-native application development, and cloud operational excellence. It also helps identify and resolve security issues faster and improve delivery times for DevOps teams. It includes the following elements:

PGA Tour FedEx Cup playoffs value hype over legitimate golf

Placeholder while loading article actions

If you’re a golf fan, you’ve been bombarded for weeks with TV ads for the PGA Tour playoffs — or, as the tour would prefer you call them, the “FedEx Cup playoffs.”

There’s an ad that refers to the playoffs as the “ultimate” moment on the PGA Tour. There’s another one that says, “History will be made.”

Since “ultimate” technically means final, it’s not inaccurate to use that word to describe the three tournaments that will conclude Aug. 28 in Atlanta. The clear implication, however, is that ultimate in this context means greatest.

As for the story? Like I said: Oh, please.

History is made in golf at all four major championships, not in the insanely lucrative but ultimately (pun intended) unhistorical playoffs – or, for that matter, the hugely lucrative and overhyped Players Championship.

For the record, I As the playoffs – at least as individual tournaments. In 2006, after Tiger Woods and Phil Mickelson made it clear they had no interest in competing in the Tour Championship in November, commissioner Tim Finchem had a brilliant idea: he convinced FedEx to pay for a four tournaments and moved the Tour Championship to September.

Sally Jenkins: LIV Golf’s sold-out sales have bailed out the PGA Tour. Now they want to go home?

Money talks – even for very wealthy athletes. Instead of returning home after the four majors and waiting for pre-holiday exhibitions with guaranteed upfront money, players showed up for the playoffs. The first winner in 2007 was Woods. He refused to kiss the “FedEx Cup” trophy, but he showed up to play, and that was really all that mattered.

There was, however, a problem with the system at the time, and although the tour was tweaked and tweaked, it was never successful. In fact, for all the money and all the hype, the playoffs are basically a rip-off. Not on the players, who cash colossal checks the first two weeks and monstrous checks the third week, but on the public.

It starts with the point system, which is designed to make the regular season playoffs and weekly tournaments seem more important than they are and the majors less important.

The tour is not in charge of the majors. Augusta National Golf Club, the US Golf Association, the Royal and Ancient and the PGA of America control them and have separate TV offerings. That’s why a victory in a weekly PGA Tour event is worth 500 FedEx Cup points and a victory in a major tournament is only worth 600.

Ask a player the value of earning a major over a weekly event. They will tell you that it is at least five times greater. Golf Channel’s Brandel Chamblee told me several years ago that winning a regular tournament was probably worth around $3 million over a career and a major was probably worth over $30 million.

Let’s be careful and say that a major is five times more important. This means winning a major should be worth 2,500 points, not 600. The tour also gives 550 points to the winner of a number of events, including players and the three superstar tournaments: the Tiger Woods at Riviera; the Jack Nicklaus event, the Memorial; and the late Arnold Palmer tournament at Bay Hill.

This weekend’s tournament in Memphis gives the winner 2,000 points, as does next week’s event in Delaware. In other words, depending on the tour, a win in the first two playoff events is worth more than three times as much as a win in a major tournament.

There’s a lot of money at stake here: $15 million in each of the first two weeks and $44.75 million split among the top ten finishers at the Tour Championship, with the winner taking home $18 million.

You might point out that this doesn’t sound so crazy compared to the guarantees that the Saudi-funded start-up LIV Golf Series is paying, but it’s still a plot silver.

The tour has responded to LIV in two ways: suspending players who have taken Saudi petrodollars and running, and increasing its payouts to mind-boggling levels. This year, there will be a $50 million Player Impact program fund that will be split among 10 players to – wait for it – be popular on social media.

Additionally, prize money is increasing across the board. The Players Championship purse will be $25 million next year thanks to new touring television deals.

But like with LIV, all that money can’t make tournaments bigger than they are or as big as the promoters want them to be. LIV is a bunch of 54-hole exhibitions played for Monopoly money. PGA Tour playoff events are more legitimate – 72-hole events in which golfers must earn their place.

Moreover, individual tournaments can be as exciting as any non-major tournament. Last year’s playoff at Caves Valley between Patrick Cantlay and Bryson DeChambeau – won on the sixth hole by Cantlay – was wonderful theater. Ditto for Sunday’s tournament, won on the third hole of the playoffs by Will Zalatoris.

In many ways, the playoffs did what Finchem hoped: to keep the top guys playing and fans interested in watching after the majors ended. This was not the case before. Players were only interested in the silly season when they received money in advance.

The playoffs changed that. And yet that wasn’t enough for the tour, which insists its TV partners act as if a major championship is still decided, especially among the players, when in reality there’s only so much money. stakes.

FedEx has spent a lot of money since 2007 on the playoffs and the tour. Corporate sponsorship is at the heart of everything the tour does. Washington – the nation’s capital – does not have an annual tour. Why? Because there are no corporate sponsors willing to fund a tournament here.

The tour has changed playoff systems more often than most people change their socks. When Vijay Singh won the FedEx Cup the week before the Tour Championship in year 2, the tour changed the system. When Bill Haas stepped onto the victory platform after winning the Tour Championship in 2011 and asked Finchem, “Who won the FedEx Cup?” and Finchem replied shyly, “You did it”, it was time for another change.

Rory McIlroy and other PGA stars speak out against LIV golfers who took legal action

Three years ago, the Tour adopted what is essentially a member-guest format. The points leader starts the Tour Championship at 10 under par, and everyone else starts behind him, up to 30th place.

Last year, Cantlay started at 10 under and shot 269 for the week in Atlanta. Three players played better than him, but Cantlay’s lead made him the winner. It’s a bit like a team that wins the Super Bowl despite being outclassed because they started with a 14-0 lead.

How do you arrange all of this? First, give the majors the importance they deserve. An easy fix, but the tour is loath to do it.

Another easy fix: if you want to call them playoffs, make them real playoffs. After the end of the regular season, start everyone from scratch. Next year, only 70 players will make the playoffs, with 50 qualifying for the second tournament and 30 for the Tour Championship. The tour – and the TV stations – live in fear that a star won’t make it to Atlanta. Rory McIlroy missed the cut last week in Memphis. NBC doesn’t want him out for the next two weeks.

The only player really generating ratings is Tiger Woods, and his days of making the playoffs are over. So make it a real competition with everyone subject to elimination.

History will still be unwritten, but at least we will have a true champion when all is said and done. It’s been 16 years. It’s time to settle this once and for all.

Elon Musk outlines a vision of the future in a magazine run by China’s internet censorship agency


Elon Musk profiled sustainable energy, brain implants and space exploration in an article published in a Chinese magazine run by the country’s internet monitoring and censorship agency, according to a translation by Yang Liu, a journalist with the Chinese state news agency Xinhua. (Going through WSJ journalist Karen Hao).

Created in 2013, the Cyberspace Administration of China (CAC) is responsible for creating and enforcing policies regarding online content, user data and digital security. The CAC then created a magazine which, according to China Media Project Senior Researcher, Stella Chen, typically includes regulatory announcements and internet policy research. The magazine was originally called New media before it was renamed as Chinese cyberspace earlier this year.

The July issue of Chinese cyberspace features articles by Musk and Ant Group CEO Eric Jing Xiandong, the company that operates the Chinese payment service Alipay. Liu provides an English translation of Musk’s article in an article on his newsletter Substack, Beijing Channel. Musk says he was asked by the magazine to share his “thoughts on the vision of technology and humanity”, then proceeds to describe and promote the technology used by the companies he owns – Tesla, SpaceX and Neuralink – which he believes can “contribute to a better future for humanity:”

To that end, any area that contributes to a sustainable future deserves our investment. Whether it’s Tesla, Neuralink or SpaceX, these companies were all founded with the ultimate goal of improving the future of human life and creating as much practical value for the world as possible – Tesla to accelerate the global transition to sustainable energy, Neuralink for medical rehabilitation, SpaceX to make interstellar connections possible.

He also cites some of his most ambitious goals as examples of the kind of technology his companies could (eventually) create, such as a “self-contained city on Mars,” a way for humans to “integrate with artificial intelligence.” and “fixed”. battery banks. Musk also mentions the yet-to-be-seen humanoid Tesla Bot and suggests people could potentially be able to buy a robot as a gift in “less than a decade.”

In a tweetLiu calls the article a “smart move” on Musk’s part, as it allows him “to seize the opportunity to showcase his companies’ technological prowess to Chinese authorities and the public.”

“I hope more people will join us in our fight to accelerate the global transition to sustainable energy,” Musk says. “I also invite more like-minded Chinese partners to join us in exploring clean energy, artificial intelligence, human-machine collaboration and space exploration to create a future worth living for. ‘expect.”

Musk’s appearance in a CAC-run post clashes with his outspokenness for free speech, the very concept that inspired his decision to buy Twitter (on which he’s now trying to backtrack on a row on bots). Over the years, the CAC has implemented a number of policies designed to censor and restrict online speech. The CAC Cybersecurity Actfor example, requires social platforms to remove content containing “prohibited information”, or face sanctions from the CAC.

Last year, the CAC pushed for the removal of the Chinese carpooling app Didi from app stores and demanded that Apple remove a popular Quran app from its Chinese App Store. The CAC has also launched a hotline for users to report ‘illegal’ comments on the Chinese Communist Party and recently proposed laws that require social platforms to review every comment posted by users.

Why Kang Is A Much Bigger Threat Than Thanos


Avengers: Infinity War showed us how powerful Thanos was compared to the Avengers. The difference in power between Mad Titan and almost all the heroes of the mcu seemed seismic and insurmountable. Hulk was beaten to a pulp attempting to engage the Mad Titan one-on-one (without the power of the Infinity Stones). The combined might of Iron Man, Doctor Strange, Spider-Man, and the Guardians couldn’t stop Thanos in his quest to “balance the universe.” Thanos, in the end, succeeds in his mission; he obtains the six Infinity Stones and wipes out half of all life in the universe. In End of Gamethe Avengers eventually defeated Thanos by time traveling and collecting each of the stones to bring everyone back.


Kang, however, is a whole different type of villain. And as one of Kang’s more civil variations “He Who Remains” told us in the Season 1 finale of Loki, “You’re killing me, you’re destroying it all, and you don’t just have one devil, you have an infinite amount.” As we know, Sylvie chose to kill The One Who Remains. This decision had seemingly immediate and serious ramifications, causing the sacred timeline to branch out and paving the way for Kang the Conqueror (a far more sadistic, murderous, and power-hungry variant of He Who Remains) and other variants of Kang to wreak multiversal havoc. Thanos posed a huge threat to the officially dubbed Earth-616 Universe. By comparison, Kang poses a threat to the entire multiverse. Here are all the reasons why Kang poses a much bigger threat to the Avengers than Thanos ever could.

A versatile traveler

Kang is a villain who knows the multiverse very well. In fact, Marvel Comics lore tells us that one of Kang’s variants is a man named Nathaniel Richards. As indicated by RBC, Nathaniel is a distant descendant of Reed Richards, aka Mr. Fantastic of the Fantastic Four. After the SDCC 2022 reveal for Phases 5 and 6, we now know that The Fantastic Four will be the first film of the MCU’s Phase 6, which also includes Avengers: Kang Dynastyfollowed less than a year later by Avengers: Secret Wars. For comic book fans, we know what Secret Wars is all about: universes fighting against each other in a battle to survive. They slowly laid the groundwork for this to happen – especially in Multiverse of Madness when Mr. Fantastic describes what an “incursion” is: when two universes collide, destroying one or both in the process. We see what an incursion would look like when Doctor Strange and Christine Palmer are thrown into the reality of Sinister Strange.

Along with his extensive knowledge of the multiverse, Kang has access to some very advanced technology, coming from so far in the future. It wouldn’t be surprising if Kang showed off some of this futuristic technology in future MCU projects where he should appear as Ant-Man and the Wasp Quantumania and Avengers: Kang Dynasty (it is very likely that it appears in Avengers: Secret Wars, but this remains to be confirmed). Regardless, having this vast multiversal knowledge is sure to give Kang a significant advantage over our heroes as they strive to save the multiverse.

Related: Doctor Strange In The Multiverse Of Madness: What Is A Foray?

Master of VAT

The season finale of Loki gave us The One Who Remains, who warned, “See you soon,” after Sylvie stabbed him in the stomach. The consequences of his actions were immediate as we see the Sacred Timeline begin to spiral out of control, and when Loki returns to the TVA, there are no longer three statues of the proven False Timekeepers. There’s only one statue: Kang in his more comic book-appropriate attire. This basically verifies everything that would happen to the One Who Remains Forewarned.

With full control of TVA, Kang not only has an army, but also one with some of the most advanced technology out there. The pruning sticks, the portals that the TVA uses to travel from one timeline to another – these are pieces of technology beyond even the knowledge of Tony Stark, the man who discovered time travel, or from one of the other Avengers we’ve met so far. Did we forget to mention the beast known as Alioth? A creature created by rips in reality during the First Multiversal War, capable of consuming virtually anything. These are just a few of the tricks Kang will have up his sleeve. Thanos may have had the Black Order and seemingly limitless fodder whether it’s Chitauri or Outriders, but Kang could wipe out Thanos’ forces faster than Iron Man in End of Game.

More importantly, this variation of Kang is the opposite of One Who Remains. Whoever remains wanted continued stability throughout the multiverse, even offering the job to Loki and Sylvie. He prepared everything for Loki and Sylvie. “Stifling order or cataclysmic chaos,” he warned. Unfortunately for the multiverse, Sylvie leaves the dictator; and of course, a much more sinister variant fills the void. Perhaps the only person with the knowledge to match Kang is Reed Richards. Given that they share a biological lineage, it makes sense that Richards (if at all) could outsmart Kang the Conqueror or even compete with him technologically. Kang might prove to be too big of a threat for The Fantastic Four to handle. Thus, they must enlist the help of the Avengers leading to Avengers: Kang Dynasty. The Fantastic Four should be out less than a year before The Kang Dynastyso it wouldn’t be surprising if Kang lifted his head the film.

Time through the conqueror’s eyes

Another advantage Kang will have over the Avengers is the ability to see time as a circle rather than a straight line. Kang sees it all happening at once. Time will undoubtedly be on the Conqueror’s side, as he has extensive knowledge of the Nultiverse and the flow of time. Kang just wants to conquer. He is known as the “Master of Time”. Kang uses VAT to do his bidding, but in reality he doesn’t need VAT. He’s so powerful and with the brains and technical savvy to match, Kang could wreak multiversal havoc whenever he wants. One of the main reasons Kang is a much bigger threat than Thanos ever could be is his ability to see time, knowing the future, past, and present all at once. This will make it difficult for the Avengers to create a game plan to defeat Kang, as he will likely see it coming. The Avengers will have to get very creative as they take on the Conqueror.

Knowledge of the Quantum Realm

As discussed, Kang has deep knowledge of the multiverse, time, and how to make things even harder for our heroes. Additionally, Kang has deep knowledge of the quantum realm. The Avengers used the Quantum Realm to time travel and retrieve the Infinity Stones in Avengers: Endgame. Ant-Man spent five years – well, five hours for him – in the quantum realm, and Hank Pym’s wife, Janet Van Dyne, spent decades in the quantum realm. Yet they have very little knowledge of how the quantum realm works. Ant-Man and the Wasp: Quantumania will undoubtedly emphasize the quantum realm. The Pyms and Scott will likely have to turn to the Quantum Realm for answers when Kang shows up, or they might encounter Kang in the Quantum Realm.. In the tradition of Marvel Comics, by Screen Rant, there is a city in the Quantum Realm known as Chronopolis. There’s a blinking moment and you’ll miss it when Hank is in the Quantum Realm where we see a city in the background. The creative team behind Ant-Man and the Wasp haven’t addressed this issue yet, and we think we know why. This city is most likely Chronopolis, where in the comics Kang sits on his throne. This will likely be explored in the upcoming third installment of the The ant Man franchise, but for now we will continue to speculate.

Related: Ant-Man 3 Director Says The Movie Will Change The MCU Forever

Kang Whack-a-Mole

Finally, perhaps Kang’s most dangerous tool in his arsenal is the fact that there are endless variations of The Conqueror. Thanos is terrifying, but you kill him, and he’s dead and gone. Killing Kang is more like playing Whack-a-mole, and time travel shenanigans won’t be as easy to pull off against him. As we’ve established, Kang sees time differently, which will prevent the Avengers from being able to use surprise tactics to defeat the Conqueror. Marvel Comics introduced a Council of Kangs at one point – a group of variations of Kan, sometimes working together, sometimes working against each other’s interests. This group is led by Kang Prime. In one iteration, the Council of Kangs eliminates all “rogue” Kangs, having been tricked by Immortus, one of the older variants of Kang, to ensure that Kang Prime would eventually become Immortus, thus completing the cycle and leaving Immortus in control of the Multiverse and the flow of time. These events sound like the MCUs Loki Disney+ Series, as Immortus was the inspiration (in part) for He Who Remains. By comparison, He Who Remains doesn’t seem like such a bad guy; he manages the flow of time to ensure that the sacred timeline remains intact. The One Who Remains also spoke of a time when there was peace between him and his variants, a time when they shared their technological advancements with each other. It could have been the Kang Council he was referring to. Nonetheless, He Who Remains was the last Kang standing after the First Multiversal War.

As we now know from the 2022 SDCC MCU panel, the next avengers the film will be called Avengers: Kang Dynasty. According to Marvel Comics tradition, The Kang Council was recreated as part of the Kang Collective. Although “collective” and “dynasty” have slightly different meanings, they both imply that there are many variations of Kang. We’re sure to see the Avengers, and company, have their hands full as they attempt to play this Kang whack-a-mole game of life or death. A Kang may prove quite difficult to kill as is, but bring in a dynasty of Kangs with multiversal knowledge, combined with knowledge of the quantum realm, unique insight into the flow of time, and futuristic weaponry technology, so Kang may prove to be too great a threat for our heroes to overcome.

How Source Diversity Tracking Changes Coverage at NPR and MPR


Reporters at NPR and Minnesota Public Radio say they are seeing the benefits of an increased focus on tracking the diversity of their sources, as reporters are more aware of the need to expand their interviewee pools.

The MPR shared data on July 14 detailing demographic information gathered from sources from February 2021 to April 2022. Journalists tracked characteristics such as age, pronouns, roles of sources, where they live, race and ethnicity.

The goal was to establish a baseline and embed diversity tracking into the daily newsroom workflow, said Michael Olson, associate editor for digital at MPR.

Analyzing the data, MPR found that whites were underrepresented compared to the general population of Minnesota, sources in central cities were overrepresented, and 54% of sources were between the ages of 40 and 64. Only 31% of Minnesotans fall into this category. interval.

“A big finding for me is that the roles of spokespersons, officials and experts are heavily skewed white and towards individuals using he/him pronouns,” Olson said. “We can’t choose spokespersons… but we want to make sure that part of a journalist’s job is to hold institutions accountable. … We can’t just say they are out of our control.

To avoid one-dimensional reporting, journalists need to be aware of how these voices shape stories, Olson said. Going forward, MPR will focus on “[making] breakthroughs and do better by seeking out diverse voices and expert sources,” he said.

In an editor’s note to the report, MPR News editor Sarah Glover wrote: “We present a fuller picture in our stories and reach audiences we haven’t given enough attention to. careful in the past.”

MPR does much of this work through its North Star Journey project, Olson said, a reporting project that explores the history and culture of Mi