Next Page: 10000

          

Une nouvelle faille exploitée par des cybercriminels pour attaquer des PC Windows

 Cache   
Une opération de piratages qui utilise la faille BlueKeep est en cours. Développée pour miner les crypto-monnaies, elle menace les ordinateurs sous Windows 7, Windows XP, Windows Server 2008 ou Windows 2003.
          

«Exploiter une compagnie en France n'est pas facile»: Air France veut redécoller

 Cache   
Le directeur général du groupe Air France-KLM lance un plan stratégique destiné à améliorer la rentabilité de la compagnie. Le renouvellement de la flotte d'avions en fait partie.
          

D Aventures Les Plus Beaux Exploits De L Annee Patrick

 Cache   
D Aventures Les Plus Beaux Exploits De L Annee Patrick
          

2019-24BOR01-2590 - Ingénieur Planning H/F

 Cache   
Type de contrat : CDI
Le poste :
L'ingénieur planning est au coeur du dispositif de pilotage du projet en étant :- Le garant de la faisabilité du planning- Le garant du respect des délais- Force de proposition dans la remontée des risques, alertes et opportunités et des plans d'actions associés L'Ingénieur Planning est le pivot des relations entre le chef de projet, les métiers études, les achats, construction et les essais en ce qui concerne le respect des délais et la communication entre ces acteurs, y compris le client.En tant qu'Agent Planificateur d'un projet ou d'un portefeuille de petits/moyens projets, vous serez rattaché au Leader Métier (LM) Planning de la Business Opération (BO) d'Orano Projets. Les prestations se déroulent sur des phases d'études ou de réalisation de chantier.Vous serez en charge : - D'établir les plannings détaillés de niveau 2 et 3, globaux à terminaison ou non, plannings de détails multi métiers et multi corps d'états, ainsi que des notes, des hypothèses et des conditions associées, comprenant marges et analyse des risques délai,- D'établir les plannings à terminaison des phases suivantes,- D'établir les plannings de détail d'Arrêt Pour Maintenance (APM),- De mettre en place et suivre les avancements délais et physiques des activités du projet,- De gérer les interfaces avec l'exploitant,- De mettre en place et suivre les indicateurs EVM d'avancement des projets et du management visuel,- De mettre en place et suivre les avancements constatés et proposer des mesures correctives ou des solutions alternatives,- De réaliser la gestion et le suivi des modifications du projet (priorités, impact, délai,…) en s'appuyant sur le référent OP ordonnancement,- De faire les relances auprès des différents acteurs du projet (anticipation pour éviter autant que possible les points durs),- De co-animer les réunions de coordination du projet,- De capitaliser au fil de l'eau les éléments nécessaires à l'enrichissement du retour d'expérience (REX) du métier,- D'analyser les offres fournisseurs et vérifier leur compatibilité avec les plannings à terminaison des projets,- D'effectuer le suivi des délais et des avancements des fournisseurs en phase réalisation.

L'ingénieur planning est au coeur du dispositif de pilotage du projet en étant : - Le garant de la faisabilité du planning - Le garant du respect des délais - Force de proposition dans la remontée des risques, alertes et opportunités et des plans d'actions associés L'Ingénieur Planning est le pivot des relations entre le chef de projet, les métiers études, les achats, construction et les essais en ce qui concerne le respect des délais et la communication entre ces acteurs, y compris le client. En tant qu'Agent Planificateur d'un projet ou d'un portefeuille de petits/moyens projets, vous serez rattaché au Leader Métier (LM) Planning de la Business Opération (BO) d'Orano Projets. Les prestations se déroulent sur des phases d'études ou de réalisation de chantier. Vous serez en charge : - D'établir les plannings détaillés de niveau 2 et 3, globaux à terminaison ou non, plannings de détails multi métiers et multi corps d'états, ainsi que des notes, des hypothèses et des conditions associées, comprenant marges et analyse des risques délai, - D'établir les plannings à terminaison des phases suivantes, - D'établir les plannings de détail d'Arrêt Pour Maintenance (APM), - De mettre en place et suivre les avancements délais et physiques des activités du projet, - De gérer les interfaces avec l'exploitant, - De mettre en place et suivre les indicateurs EVM d'avancement des projets et du management visuel, - De mettre en place et suivre les avancements constatés et proposer des mesures correctives ou des solutions alternatives, - De réaliser la gestion et le suivi des modifications du projet (priorités, impact, délai,…) en s'appuyant sur le référent OP ordonnancement, - De faire les relances auprès des différents acteurs du projet (anticipation pour éviter autant que possible les points durs), - De co-animer les réunions de coordination du projet, - De capitaliser au fil de l'eau les éléments nécessaires à l'enrichissement du retour d'expérience (REX) du métier, - D'analyser les offres fournisseurs et vérifier leur compatibilité avec les plannings à terminaison des projets, - D'effectuer le suivi des délais et des avancements des fournisseurs en phase réalisation.
Ville : Cherbourg

          

2019-30-2580 - Pilote de Lot Réalisation Maitrise d'oeuvre H/F

 Cache   
Type de contrat : CDI
Le poste :
Afin de renforcer les équipes en place, nous recherchons un Responsable Corps d'Etat Tout Corps d'Etat (TCE). Au sein de l’équipe construction, en tant que Responsable Corps d’Etat, vous pouvez être amené à piloter : en autonomie des petits chantiers complexes multi métiers, des marchés de travaux d’installation générale plus importants sous la responsabilité d'un chef de chantier.    Vos missions principales sont les suivantes : Définition, en phase étude, des données nécessaires à la réalisation de l’ouvrage, Participer à l’élaboration du planning M.O.E de réalisation et valider les plannings du contractant, Élaboration et vérification de documents techniques (Cahier des Conditions Techniques (CCT), Cahier des conditions de Construction (DC), …, Réalisation de comparatifs techniques et financiers permettant de sélectionner un contractant, Pilotage des équipes de supervision et des marchés de sous-traitance Gestion des interfaces entre les entreprises mais aussi avec l’exploitant, Élaborer le programme de surveillance des entreprises et en assurer le suivi, Validation de l’ensemble des procédures montage du contractant, Valider les avancements physiques et financiers proposés par le contactant, Etre garant du respect, par le contractant, des règles de sûreté, de sécurité, de qualité, requises lors de la réalisation de l’ouvrage, Élaboration des dossiers de transferts vers les essais avant réception par l’exploitant.   Vous pouvez être amené à travailler sur des chantiers clos et indépendants « décret 94 » ou en exploitation « décret 92 ». Vous pouvez développer vos compétences au sein de nos différents projets en phase réalisation au sein de notre BU projets mais aussi au sein du Groupe Orano.

Afin de renforcer les équipes en place, nous recherchons un Responsable Corps d'Etat Tout Corps d'Etat (TCE). Au sein de l’équipe construction, en tant que Responsable Corps d’Etat, vous pouvez être amené à piloter : en autonomie des petits chantiers complexes multi métiers, des marchés de travaux d’installation générale plus importants sous la responsabilité d'un chef de chantier.    Vos missions principales sont les suivantes : Définition, en phase étude, des données nécessaires à la réalisation de l’ouvrage, Participer à l’élaboration du planning M.O.E de réalisation et valider les plannings du contractant, Élaboration et vérification de documents techniques (Cahier des Conditions Techniques (CCT), Cahier des conditions de Construction (DC), …, Réalisation de comparatifs techniques et financiers permettant de sélectionner un contractant, Pilotage des équipes de supervision et des marchés de sous-traitance Gestion des interfaces entre les entreprises mais aussi avec l’exploitant, Élaborer le programme de surveillance des entreprises et en assurer le suivi, Validation de l’ensemble des procédures montage du contractant, Valider les avancements physiques et financiers proposés par le contactant, Etre garant du respect, par le contractant, des règles de sûreté, de sécurité, de qualité, requises lors de la réalisation de l’ouvrage, Élaboration des dossiers de transferts vers les essais avant réception par l’exploitant.   Vous pouvez être amené à travailler sur des chantiers clos et indépendants « décret 94 » ou en exploitation « décret 92 ». Vous pouvez développer vos compétences au sein de nos différents projets en phase réalisation au sein de notre BU projets mais aussi au sein du Groupe Orano.
Ville : EQUEURDREVILLE

          

The Saddest Music in the World, 2003 - ★★★★

 Cache   

For Secret Cinema. Thank you, whoever you are.

Guy Maddin is a radical filmmaker. To begin with a comparison -- when The Lighthouse was announced to be in black and white, I saw various reactions on the internet. Some people found the decision to be "pretentious," others were just confused at a movie choosing to do that in the year 2019, when color is pretty easy to come by. I imagine many of us using Letterboxd consider this a valid aesthetic choice with its own challenges and benefits, but to some, filmmaking has improved over the years, why go back? On a large scale, I believe this assumption is what Guy Maddin is spending his career challenging. His films are inextricably linked to the early cinema of around the 1920s, using techniques often right out of that era. Acting is generally no longer so melodramatic and theatrical, but Maddin asks, is that necessarily an improvement? We have color, we have much more impressive effects than the obvious videos of crowds used here... but do we need them? I can appreciate a good piece of realism when it suits a film, though as someone who usually wants movies to do something I can't see in real life, I am all about stepping away from techniques that are most natural, when it makes sense.

And this film certainly does that! The performances are so excessive in their emotion, with everyone having an absurd tragic backstory. In fact, the whole movie is absurd, and quite funny for it. It revolves around a contest to find the titular saddest music in the world, with representatives from across the globe flying in to Canada, performing with live commentators. This all happens under the watchful eye of Isabella Rossellini as an amputee with beer glass legs. It's gloriously silly. I laughed a lot, but in my usual fashion I can't help reading big themes into everything I watch, so here are a few quick observations: the obvious point at the end is about holding in one's emotions and being callous to others throughout life, though what interests me more is the behavior of the American contestant throughout the film. He spends all of his time in the contest trying to buy others out of it to perform for him. Maybe America is the nice melting pot it claims to be, though I prefer the cynical interpretation that America is quite literally exploiting the sadness of other nations for their own monetary gain.

All that said, this is loads of fun. I was laughing throughout; the style is unlike anything you'll ever see outside of Maddin's other films; Maria de Medeiros is lovely (particularly in a musical number with a hockey team); this movie has it all. The person picking for me really nailed it. I can't wait to explore more Guy Maddin; he has never disappointed.


          

Truth Will Out Radio: Those Damn Nazis! II – TWOR 110119

 Cache   

Sven Longshanks and Dennis Wise continue their discussion around Goebbel’s book, this week looking at the socialism aspect of National Socialism.

Socialism can only work within the context of the ethnic nation. It is also necessary in order to preserve the nation.

One class exploiting another class, would not be possible if a sense of ethnic kinship was promoted and understood.

The labouring class is just as important as the intellectual class and as members of the same ethnic nation, both should be benefitting from each other’s skill set.

Presented by Sven Longshanks and Dennis Wise


Truth Will Out Radio: Those Damn Nazis! II – TWOR 110119




Download

Truth Will Out Radio will be back next Friday on Radio Aryan at 3pm EDT/8pm BST.
See the daily radio schedule for more alt-right audio available for download.
Join the chatroom and follow the feed


 We can accept donations with this Bitcoin Wallet:

1JePDkYWWNvRF4AQQX4SHrKcWudSQ8KHuc




Radio Aryan on Gab

Subscribe in a reader

128k Browser Stream
48k Browser Stream
Alternative Stream


Radio Aryan Full Screen Player Low-Quality
Radio Aryan Full Screen Player Hi-Quality

Radio Aryan Android Player Low-Quality
Radio Aryan Android Player Hi-Quality


          

The Orthodox Nationalist: Mykailo Kostamarov and the Ukrainian Philosophy of History – TON 103019

 Cache   

Dr Matthew Raphael Johnson takes a look at Ukrainian folk poetry and how it reflects the General Will of their nation.

The Brotherhood of Sts Cyril and Methodius was a Ukrainian ethno-religious organization that lasted only 18 months. Yet, it contained the work of two towering intellects of Slavic national thinking: Mykailo Kostamarov and Mikhail Drahomanov. While obscure today, their work is the foundation for the Slavic ethno-federalism that became the hallmark of both Ukrainian and Russian Slavophilism.

Kostamarov, a former serf like Shevchenko, saw Ukraine as the symbol of the world's underclass. Misunderstood and oppressed, with co-opted elites, they became an isolated and suffering agrarian class easy to demonize, mock and ultimately, eliminate. The familiar claim in the early 19th century that Ukrainian was a “peasant language” meant that it was a language for the ignorant, not for the westernizing new men of St. Petersburg. Such slogans were designed to justify the continuing exploitation of Ukraine both as a land and a people. Throughout the world, the self-serving belief that the agricultural classes are simpletons and ignorant exists primarily to justify their continual exploitation by the urban elites.

Among Ukrainian writers, Kostamarov is one of the rare specimens who justified Russian intervention in Ukrainian affairs after the Cossack revolts against the Jewish-Polish alliance in 1648. Given the failures of all the other options, going to Russia wasn't such a bad idea. This proves that so much in Ukrainian thinking wasn't anti-Russian.

Kostomarov's ethnic populism, like Drahomanov's, was based around the significance of folk ideas in developing the General Will. With some exaggeration, it might be argued that the entire concept of Sobornapravna is about the folk, expressing itself over the centuries in popular ballads, art and poetry, formalized into a “political program” through the General Will (to use Rousseau's term).

In other words, that the General Will is best understood by looking at the basic structure of folk poetry as it developed over the years. It became, so to speak, the public persona of the Ukrainian peasant and Ukraine's great contribution to nationalist thought. In these poems, Russia is almost never attacked. Rather, the Turks and Jews are singled out for contempt. Kostamarov and the rest of the Brotherhood doesn't deserve their obscurity.

Presented by Matt Johnson


The Orthodox Nationalist: Mykailo Kostamarov and the Ukrainian Philosophy of History – TON 103019





Download

The Orthodox Nationalist will be back on Radio Aryan next Wednesday at 3pm EDT/8pm BST
See the daily radio schedule for more alt-right audio available for download.
Join the chatroom and follow the feed
The first series of The Orthodox Nationalist can be found HERE
Dr Johnson’s Patreon Page


 We can accept donations with this Bitcoin Wallet:

1JePDkYWWNvRF4AQQX4SHrKcWudSQ8KHuc




Radio Aryan on Gab

Subscribe in a reader

128k Browser Stream
48k Browser Stream
Alternative Stream


Radio Aryan Full Screen Player Low-Quality
Radio Aryan Full Screen Player Hi-Quality

Radio Aryan Android Player Low-Quality
Radio Aryan Android Player Hi-Quality


          

Ont Ose 40 Exploits Incroyables Jean Francois Nahmias Pierre

 Cache   
Ont Ose 40 Exploits Incroyables Jean Francois Nahmias Pierre
          

Samedi 9 Novembre 2019 – Journée Mondiale d Action : Un Monde Sans Mur, rassemblement à Lyon

 Cache   

Du Mur d'apartheid d'Israël sur les terres palestiniennes au Mur de la honte étatsunien sur les terres indigènes à la frontière avec le Mexique, les murs sont des monuments d'expulsion, d'exclusion, d'oppression, de discrimination et d'exploitation. En tant que peuples affectés par ces murs et en tant que mouvements qui considèrent la justice, la liberté et l'égalité comme moyens pour résoudre les problèmes de cette planète, nous nous joignons à l'appel du 9 Novembre, Journée Mondiale d'Action pour un Monde Sans Mur.

- Infos locales /
          

Ubuntu Security Notice USN-4165-2

 Cache   
Ubuntu Security Notice 4165-2 - USN-4165-1 fixed vulnerabilities in Firefox. The update introduced various minor regressions. This update fixes the problems. Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, bypass security restrictions, bypass same-origin restrictions, conduct cross-site scripting attacks, bypass content security policy protections, or execute arbitrary code. Various other issues were also addressed.
          

Alf-Inge Haaland admits teenage son Erling is keen on Premier League move

 Cache   
Erling Braut Haaland has ambitions to play in the Premier League after his record-breaking Champions League exploits, according to his father Alfe-Inge.
          

Why the World Rally Championship is back to its best

 Cache   
Tanak racing
Tanak's second place in Spain secured the title
Estonian hotshot Ott Tänak becoming world champion is only one story from a fascinating season

The World Rally Championship has always been viscerally gladiatorial. Despite the technology and marketing gloss that’s always a feature of the top level, it’s about as raw and unreconstructed as modern motorsport is allowed to get.

This season – although it’s not actually over yet, with one round to go in Australia – has been a perfect example. From the beginning, there was a close three-way fight for the title, creating a tension that boiled over into technical protests (where rival teams tried to get a Toyota rear wing banned), gamesmanship (where Hyundai was accused of manipulating the running order of its cars to disadvantage rivals) and even personal acrimony (with an astonishingly incendiary tweet sent by Sébastien Ogier’s wife during the Rally of Spain, where she coined the hashtag ‘#shitroen’ and blasted her husband’s employer. We’ve not heard the last of this.).

Amid all of that, it was almost easy to overlook the fact that for the first time in 16 years, we’ve got a new World Rally Champion who isn’t French or called Sébastien. Loeb and Ogier have dominated the show for the best part of two decades but, after Spain, Ogier (maybe in an attempt to smooth over troubled waters) said he could think of nobody who deserved the title more this year than the man who finished second on the rally.

The tiny nation of Estonia (population around 1,350,000) now has a new world champion in Ott Tänak. Previously, Estonia was perhaps best known for its exploits in fencing, with 17 world championship medals – although the very first Olympic gold won by Estonia after its independence in 1991 was in cycling. So wheels are obviously important over there, as well as fighting.

Tänak isn’t the first rally star from Estonia, either, as his mentor, Markko Märtin, also competed at the top level. Like Märtin, Tänak is a hard chap to read. He’s competitive to the point of paranoia – having even accused his own team of not backing him fully – but his emotions are rarely expressed via the established medium of verbal communication.

Maybe it’s different when he’s speaking in his native language (unfathomably complex Estonian, with its 28 native diphthongs)? No, confirms Märtin. He’s just as taciturn then.

Although he’s not going to win any public speaking contests, Tänak can drive a car mind-bendingly quickly. This year, he’s racked up six wins from 13 rallies held to date, on gravel, snow and asphalt. Even on the events he didn’t win, he was often the fastest. On the iconic Rallye Monte-Carlo, he won seven of the 15 stages run (including six in a row). And finished third.

Did he have the best car? Probably. So it’s a credit to Hyundai’s Thierry Neuville and Citroën’s Ogier that they pushed him so far. M-Sport Ford – which won the last two drivers’ titles with Ogier – hasn’t been at the races this year, due to a lack of both funding and luck, with Elfyn Evans forced to sit out three rallies following a back injury. Whether it’s on or off the stages, everyone eventually feels some pain on the WRC. That’s why we love it.

Anthony Peacock

READ MORE

Stage flight: Why rallying is back to its best in 2019

Racing lines: Why Wales Rally GB 2019 is not to be missed

Racing Lines: The trouble with Renault in F1


          

How Transparent Should Government Be After a Cyberattack?

 Cache   

Atlanta was one of the first major cities hit, waylaid by a costly ransomware attack. As headlines about what happened continued in the months to come, similar incidents besieged other government agencies across the country. There was Baltimore. There was the Colorado Department of Transportation, twice. There were half a dozen small cities in Massachusetts. There was Albany, N.Y.

In the past 18 months or so, cyberattacks on government have accelerated. Experts say this is an evolution wherein bad actors have moved from targeting individuals at random, to going after governments, school districts, companies, and other institutions, which often have more to lose and are thereby more lucrative. Another factor in the recent acceleration is that many of these entities have been traditionally underfunded in the realm of cybersecurity.

As such, public-sector IT leaders have begun to view a successful cyberattack as a matter of when, not if. Essentially, regardless of how well-prepared government is, a breach is still coming, and so a larger onus is now being placed on response, specifically on best practices for the aftermath of a cyberattack. Within this conversation, however, a major point of tension has arisen — transparency.

A question local government leaders must grapple with is this: How transparent should government be after a cyberattack? Should they tell citizens everything, or should they downplay incidents altogether, obscuring details under the assumption that any information on their vulnerabilities can and will be used against them?

It’s a complicated debate, and with this wave of cybercrime showing little sign of slowing, finding answers has become imperative.

Being as transparent as possible with citizens has evolved as of late, fueled by technology that enables easier sharing of data as well as more convenient lines of communication between government and the citizens it serves. 

There is, perhaps, a growing expectation that local government should tell residents everything, provided it doesn’t infringe on the privacy of others. But what about emergency situations like cyberattacks?

In March, Albany was hit by a cyberattack on a Saturday. Thanks to an alert about the breach, the city had most major systems up and running again by Monday, except for getting birth, death and marriage certificates. City offices were closed Monday morning, though, as the city worked to ensure a full recovery.

Albany Mayor Kathy Sheehan was open with information throughout, announcing via social media that an attack had occurred the same day she found out. On Sunday, she again took to social media to let residents know city officials had been working to prevent any interruptions in government service. Then on Monday, the city let residents know when it was open again.

It all seems innocent enough, but at a recent breakfast roundtable discussion about cybersecurity and cities, hosted during the CityLab DC summit, Sheehan said not everyone in City Hall agreed with that open approach.

“Our CIO would have preferred saying nothing at all,” Sheehan told a collection of other elected officials and IT leaders, the majority of whom had similar anecdotes to share.

Other CIOs in attendance agreed with the stance, or at least the desire to be able to maintain silence. But Sheehan felt obligated as an elected official to let the public know all that she could about what was happening. Moreover, she said her CIO and the rest of the IT staff had “done a phenomenal job” and she wanted the public to know that as well.

The reason for advocating silence, however, is in part a concern that a larger cybersecurity target will be put on local governments, and that bad actors will see detailed news of a successful defense as a challenge. Another layer is that releasing detailed information will help bad actors find a new vulnerability to exploit. Cyberattacks are, after all, a crime, and so some of the details will always be sensitive.

Brian Nussbaum, who is a fellow with New America’s Cybersecurity Initiative and an assistant professor of cybersecurity at the University of Albany, said a balance must be struck between giving citizens necessary info and obscuring the scope of defenses and recovery, noting that “it’s possible to describe in general what’s being done without being specific about what’s being done.”

Sometimes, Nussbaum added, public organizations withhold information not in the name of secrecy, but rather because they are still sorting out “second order effects,” which basically means assessing the problem and understanding the damage. For organizations like government or public health systems, which keep private data subject to regulations, this is paramount. 

Nussbaum, however, was optimistic that more answers about transparency after a cyberattack will emerge as this particular challenge matures. As cybersecurity defenses, response plans and general knowledge evolves in the public sector, so too will best practices around what information to share with the public.

This is also far from a new tension within government.

“This is not an unusual problem in the abstract,” Nussbaum said. “Elected officials who are accountable to citizens often have impulses to do things that people in the business line don’t have the same incentives to want to do, because they are not directly talking to the citizens in the same way. I don’t think this is a problem that’s unique to local government cybersecurity, but rather a problem for government writ large.”

Gary Brantley, the Atlanta CIO, continues to oversee that city’s cybersecurity in the wake of its recovery. Also in attendance at CityLab DC, Brantley said his goal is always to share as much information as he can without compromising operations or inciting fear. One thing that gets lost, he added, is just how common failed attacks are.

“These attacks are widely unsuccessful,” Brantley said, “and that’s one thing we don’t talk about.”


          

Endogenous T cells prevent tumor immune escape following adoptive T cell therapy

 Cache   
While the outcome of adoptive T cell therapy (ACT) is typically correlated with the functionality of the inoculated T cells, the role of the endogenous T cells is unknown. The success of checkpoint blockade therapy has demonstrated the potentially curative value of preexisting tumor-primed T cells in cancer treatment. Given the results from checkpoint blockade therapy, we hypothesized that endogenous T cells contribute to long-term survival following ACT. Here, we describe a therapeutic approach combining ACT with an oncolytic vaccine that allows simultaneous analysis of antitumor immunity mediated by transferred and endogenous T cells. We found that, in addition to promoting the expansion and tumor infiltration of the transferred T cells, oncolytic vaccines boosted tumor-primed host T cells. We determined that transferred T cells contributed to rapid destruction of large tumor masses while endogenous T cells concurrently prevented the emergence of antigen-loss variants. Moreover, while transferred T cells disappeared shortly after tumor regression, endogenous T cells secured long-term memory with a broad repertoire of antigen specificity. Our findings suggest that this combination strategy may exploit the full potential of ACT and tumor-primed host T cells to eliminate the primary tumor, prevent immune escape, and provide long-term protective memory.
          

Economique Des Exploitatons Agricoles Modelisation Simulation Et Aide A La Decision Avec Le Logiciel Olympe Olivier Deheuvels Eric

 Cache   
Economique Des Exploitatons Agricoles Modelisation Simulation Et Aide A La Decision Avec Le Logiciel Olympe Olivier Deheuvels Eric
          

Midway

 Cache   
Les exploits des soldats et des pilotes américains lors de la Bataille de Midway dans l’Océan Pacifique, pendant la Seconde Guerre Mondiale.
          

Martin Johnson expects England to come back stronger after World Cup exploits

 Cache   
The former lock says the best remedy after a painful World Cup defeat is getting together and winning again.
          

L’Android Security Patch débarque, quoi de neuf ?

 Cache   

A l’image du Patch Tuesday de Microsoft, Google vient de mettre en ligne ses correctifs Android pour la période du mois de novembre 2019. Cet Android Security Patch est la grande maintenance mensuelle du géant. Nous avons des solutions à des vulnérabilités et bugs affectant le système d’exploitation mobile Android 10. Ce nouvel Android Security ...

The post L’Android Security Patch débarque, quoi de neuf ? appeared first on GinjFo.


          

ROG Phone 1ère génération, ASUS annonce la disponibilité de la mise à jour Android Pie

 Cache   

ASUS Republic of Gamers (ROG) a confirmé que le ROG Phone, son innovant smartphone gaming, recevra d’ici la fin du mois de novembre 2019 la mise à jour Android Pie. Il s’agit de la dernière version du système d’exploitation mobile Android par Google. Elle inclut de nouvelles fonctionnalités visant à optimiser l’expérience utilisateur telles que ...

The post ROG Phone 1ère génération, ASUS annonce la disponibilité de la mise à jour Android Pie appeared first on GinjFo.


          

XPS 13 Developer Edition, 18 configurations autour d’Ubuntu 18.04 LTS, détails

 Cache   

Dell annonce la disponibilité de son ordinateur portable XPS 13 Developer Edition. Il se décline en 18 configurations différentes. L’une de ses qualités est de proposer le système d’exploitation Ubuntu 18.04 LTS. Annoncé en août 2019, ce XPS 13 Developer Edition enrichit l’offre Dell en matière d’ordinateur portable grand public. Il incarne la 9ème génération ...

The post XPS 13 Developer Edition, 18 configurations autour d’Ubuntu 18.04 LTS, détails appeared first on GinjFo.


          

300 flags displayed along Rimrock Road represent homeless kids in Dane County

 Cache   
If you take a drive down Rimrock Road, you'll see a large green flag display on the side of the road.

"Those 300 flags are there to represent the 300 kids who are homeless every night," said Briarpatch Youth Services development and communications director Jackie Wehrenberg.

Wehrenberg said the flags were placed there last Friday and will stay there for the rest of November in hopes of raising awareness about the reality homeless kids face every day.

"They could be living in cars, they could be sleeping on the street, they could be sleeping with friends or family or couch surfing. When they're in that situation it really makes them vulnerable and puts them in a really vulnerable situation because they're at risk of sexual exploitation," she said.

One out of every three youth who are on the street are sexually exploited every 48 hours.

Wehrenberg and the staff at Briarpatch help as many kids as they can. She said the facility can house up to eight kids every night, but that still isn't enough.

"It's sad. It kind of seems like you're defeated before you start," Wehrenberg said. "About half of the youth who are homeless or on the street come from foster care systems.These are the kids of our communities' future. It's important for everyone to pay attention and help them get the resources that they need."

If you would like to find out how you can help, Wehrenberg said you can contact them in several ways:

For assistance regarding a youth in crisis or scheduling an intake:

Call our 24-hour Help Line at 608.251.1126 Or Toll-Free Line at 800.798.1126 Or text 608.285.2776 (texts checked M-F 9 a.m.- 9 p.m.)

To speak to Youth Shelter staff regarding a current shelter resident:

Call 608.245.2550, ext. 1111

For questions regarding youth on Work Teams please contact the youth work team supervisor.

Or call our on-call Intensive Supervision staff at 608.669.4711

You can also look for additional information on their website here.

Get your weather forecast from people who actually live in your community. We update with short, easy-to-use video forecasts you can watch on your phone every day. Download the iOS or Android app here.

]]>
          

Turkey says Armenian genocide bill 'an insult', summons U.S. envoy

 Cache   

Turkey says Armenian genocide bill 'an insult', summons U.S. envoy

Components

(Updates with Erdoğan comments in third paragraph, foreign minister in sixth.)

Turkey slammed a U.S. decision recognising the mass killing of Armenians early last century as genocide and summoned the country's ambassador.

Turkish President Recep Tayyip Erdoğan  said the resolution, which passed the U.S. House of Representatives by 405 votes to 11 on Tuesday, was devoid of any truth. It was approved on the anniversary of the formation of the Turkish republic.

“We see such an accusation as the greatest insult made to our nation," Erdoğan said in a speech to his party deputies in parliament. “A country whose history is filled with stains of genocide, slavery and exploitation has no right to say something or to lecture Turkey.”

Turkey and the United States have been embroiled in a political dispute over a Turkish military incursion into northern Syria that began in early October. U.S. President Donald Trump paved the way for the operation by withdrawing troops from the border region, sparking criticism in Congress that he had abandoned the Kurds. Ankara says Kurdish forces that it has been battling in Syria are terrorists allied with the Kurdistan Workers’ Party (PKK), an autonomy-seeking armed group in Turkey.

Most scholars recognise that genocide was committed by the Ottoman Empire from 1915. An estimated 1.5 million Armenians died. Turkey denies that such a slaughter took place and has lobbied governments and parliaments around the world to refrain from recognising the events as genocide.

The Turkish Foreign Ministry demanded an explanation from Ambassador David Satterfield during a meeting on Wednesday. Foreign Minister Mevlüt Çavuşoğlu said the resolution amounted to "revenge" for Turkey's military operation.

Earlier on Tuesday, the U.S. House also voted 403 to 16 to impose economic sanctions on Turkey for the Syria incursion. Kurdish People's Protection Unit (YPG) militants there have been staunch allies of the United States in the fight against Islamic State (ISIS).

“If we ignore history, then we are destined to witness the mistakes of the past be repeated,” Nancy Pelosi, speaker of the House, said before Tuesday’s vote. “Recent attacks by the Turkish military against the Kurdish people are a stark reminder of the danger in our own time.”

“If only Turkey had taken the lead to address sadness that haunts Armenians to this day over 1915. If only Turkey had taken the lead to address Kurdish grievances and abuses they suffered regardless of the militants of the mountains. If only Turkey had stayed out of Syria,” Ziya Meral, senior resident fellow at the U.K.-based Centre for Historical Analysis and Conflict Research, said in comments on Twitter.

The Turkish Foreign Ministry also criticised the House resolution envisaging economic sanctions on the country.

The bill “is incompatible with the spirit of our NATO Alliance,” the ministry said in a separate statement. “It also contradicts with the agreement reached on Syria with the U.S. Administration on 17 October,” it said in reference to an agreement on a cessation of hostilities in northern Syria reached with the White House two weeks ago.

U.S. officials have failed to discern the difference between a NATO ally and terrorists and “should understand that they cannot achieve anything with the threats of unilateral sanctions”, it said.

The sanctions bill envisages freezing the assets of senior Turkish political and military leaders and blocking their travel to the United States. It would prohibit arms transfers to Turkey if the weapons could be used in Syria, mandates an investigation of Erdoğan’s personal wealth and would impose punishment on state-run Turkish bank Halkbank.

Erdoğan said the resolution was aimed at targeting him, his family and his ministers directly, adding that he strongly rejected it.

The bill faces potential obstacles in the Senate, where leading Republicans have called for a delay in order to give time for the Trump administration to find a diplomatic solution with Turkey.


          

Patent Infringements - Global Overview

 Cache   

A Guide to Patent Infringement: A Global Perspective

Ideas and innovation are the cornerstones of any successful corporation. Given that modernisation and globalisation has had a significant impact on corporations, it is only fair that the ideas defining these businesses are given protection from being misused, manipulated or stolen. Stolen ideas is a modern-day problem playing on capitalism by generating revenue to the 'thief'. With the view of preventing this, ideas and innovations are being granted patents now.

A patent, in simpler terms, is a right granted to an inventor over his invention by a sovereign authority providing the inventor with exclusive rights over the ownership of the process, design or invention. A patent granted to the investor is for a set period in return for disclosure of the invention. Infringing such a right gives the inventor a right to claim for remedies against the infringer. The claim includes and is not limited to injunctions, damages, account of profits, declarations and so much more depending on the jurisdiction of the disputed invention.

Infringement of patents reign in all industries, from Apple making a claim against Samsung over an infringing patent on their smartphones and tablets to the 'Da Vin Ci Code' book to movie rights disputed.  This article aims to give a global perspective on patent infringement by analysing the different rules and regulations governing these jurisdictions and the various remedies available, respectively.

United Kingdom (UK)

Governing Law and Overview

Patent infringement is a statutory tort as per the common law. In the United Kingdom, there exist well-structured legislations to govern patent rights and infringement. The Patent Act 1977 (as amended) (PA 1977) sets out the various rights and remedies governing patents in the UK. The later legislation Patent Rules passed in 2007 deals with the procedure involved in filing a patent with the UK Patent Office (known as the Intellectual Property Office), filing a patent infringement lawsuit, challenging the validity of the patent, opposing the grant of a patent and other related matters. There are Civil Procedure Rules governing patent rights in the UK as well however these CPR apply exclusively to England and Wales and not to Scotland and Northern Ireland as they have their own rules and regulations in the local courts.

Overview

As with all jurisdictions, in the UK a patent is perceived to be infringed when the invention is put to use by someone who is not authorised. Section 60 of Patent Act 1977 states that a person/entity is said to have infringed a patent only if the patent is granted and in force.

Additionally, the person/entity in question should have done any of the following without the consent of the proprietor to have infringed a patent in the UK:

  • If the invention is a product: the person/entity disposes of, offers to dispose of, uses or imports the original product
  • If the invention is a process: the person/entity uses or offers the process of creation in the UK in addition to the point mentioned above

To understand how to apply for a patent in the UK, firstly, it is essential to note that patent right is a negative right granted to the applicant, which prohibits an action relating to his invention. However, for this act, there would be no infringement if the patent is used for non-commercial, research, anti-terrorism, experimental medicines and related purposes. The reason for this was explained in the case of Corvalve Inc v Edwards Lifesciences AG [2009] EWHC 6 (Pat) where the courts held that experiments with the patent are allowed to encourage scientific research while still protecting the legitimate interest of the patentee. However, there is some debate over this subject as experimentation often leads to commercial gain (case of Monsanto v Stauffer [1985] RPC 515.)

Procedure

Section 1 of PA 1977 states that for a patent to be valid and granted it needs to be new, should involve an inventive step, should be capable of industrial application and is not excluded from being protected as a patent. Once the validity of the patent is granted and is deemed valid, opposing parties can apply directly to the courts to revoke the patent or declare infringement of the patent, regardless of whether the inventor of the patent or the owner is threatened with litigation.

A patent awarded to the United Kingdom is through either the United Kingdom Intellectual Property Office (UKIPO) or the European Patent Office (EPO). Additionally, the possibility of joining either process under the Patent Cooperation Treaty (PCT) can be made through a foreign request. When issued, a patent provides an exclusive and absolute right to exploit what is protected by the patent and can provide coverage for 20 years as long as it is renewed (and the applicable fee paid) every year from the fourth anniversary of the filing date. A term of protection can be expanded by applying for a Supplementary Protection Certificate (SPC).

Infringement in the UK

It is an infringement to sell a patented process for use in the United Kingdom if the person making the offer understands, or it is apparent to a reasonable person, that using the method without the permission of the proprietor would be an infringement of the patent. Furthermore, Section 60(2) Patent Act 1977 also allows the patent proprietor to prevent an unauthorized person from supplying or offering to in the United Kingdom means relating to an essential element of the invention when they know, or a reasonable person would have known, that the element was suitable for and intended to be used in order to put the invention into effect in the United Kingdom. This is referred to as contributory infringement.

Section 60(3) Patents Act 1977 exempts commercial staple products from this provision: -a patent proprietor can not prohibit someone from selling standard commercial objects merely because they could be used to assemble an infringing device, or even if the manufacturer knows that they are intended for that reason. For instance, according to the precedent in Menashe Business Mercantile Ltd v William Hill Organisation Ltd [2002], computer software is a patented entity although the manual to use it would not be.

The nature of the various infringing acts in themselves is rarely ambiguous. Nonetheless, one issue that arises is whether fixing a copyrighted item can be infringed as a "making" operation. The response depends on the extent of the repair. Several factors such as the possible lifetime of different components, have to be considered. As per Schutz (UK) Ltd v Werit UK Ltd [2013], if the worn or damaged product continues to embody the entire claimed invention, excluding the component requiring replacement or repair, then it is likely that repair by replacing that component does not "make" the patented product.

Another question arises when the product supplied is a package of parts that helps the user to assemble the component. Since the consumer has protection under Section 60(5)(a) Patents Act (discussed below), it can be argued that the selling of the package does not result in an infringing act of "making''. A similar argument occurs when the package is manufactured for sale so that there is no violation outside the jurisdiction. Nevertheless, these claims were not checked in case law. In any event, a supplier of such a kit might also be liable for contributory infringement. It is also essential to distinguish between direct and indirect patent infringement.

Court Proceedings

It is mainly in London that court proceedings involving UK and EP (UK) patents take place. They are heard either before the Patents Court (a High Court division) or before the Patents County Court, depending on the value and complexity of the case-more complicated cases or cases where the value of the case is more than £ 500,000 are heard before the Patents Court. The judges make their judgments; no jury exists. The procedure at the Patents Court is thorough and generally involves:

  • discovery of documents;
  • experiments (when necessary);
  • written facts and expert evidence (experts are appointed by a party, not appointed by a court); and
  • witness cross-examination at trial.

In the United Kingdom, copyright disputes and patent validity issues were resolved in one court.  In comparison, in Germany, the two issues are addressed in separate trials (so-called 'bifurcation'). The Patents County Court provides a cheaper alternative to the Patents Court procedure. The level of complicated research information presented and the volume of cross-examination will be reviewed in the Patents County Court, providing small and medium-sized businesses and private individuals with a more open and generally cheaper process. If any party to a case at the Patents County Court thinks that the Patents Court is more suitable, a transfer request may be made.

Damages

In claims that proceed in the Enterprise Court of Intellectual Property, the court will make a summary assessment of the party's costs in favour of which any cost order is made. The extensive assessment is not valid. The court will not require a party to pay total costs in excess of:

  • £ 50,000 on the final determination of a negligence claim; and
  • £ 25,000 on a claim for damages or benefit account.

The maximum amount of scale costs imposed by the court is as specified for each point of the case.

Remedies

Remedies for the patent proprietor, in either case, include a temporary or permanent order, products being shipped or destroyed, damages being paid, or an account of the infringer's earnings, or legal costs being incurred. UK patent judges ' decisions are also taken into account and often carry persuasive weight in circumstances where the same patent is litigated in other European countries

European Union

Concerning the EU, Section 60 of the PA 1977  of the infringing acts stems from the Community Patent Convention (Articles 25 and 26), revised and replaced by the Community Patent Agreement (89/695/EEC) (OJ 1989 L 401/1) (CPC). Similar provisions are introduced by other European countries. Section 60 was framed in compliance with Section 130(7) of the PA 1977 to have the same consequences in the United Kingdom as almost as possible as the relevant provisions of the CPC. Section 130(7) stems from the Community Patent Joint Declaration Agreement (OJ 1989 L 401/57) which is further implemented by the EEC member states.

In Bristol Myers Squibb v Baker Norton Pharmaceuticals [ 1999 ] RPC 253, Jacob J held that since there was no distinction between Articles 25 and 26 of the CPC and the relevant provisions of section 60, it was easier to work based on the direct effect of the CPC provisions. Nevertheless, as section 60 has tended to focus mainly on that provision, this report is equally based on that provision as it represents the law in the UK and UK case law. Nonetheless, when interpreting the provision, the UK courts often turn to national European (mainly German) case law.

To know more about Patent Infringements globally including patent infringement in UAE, Click here 

 


          

CVE-2019-0708: BlueKeep Exploited in the Wild to Deliver Cryptocurrency Miner

 Cache   

Researchers identify the first in-the-wild exploit of the BlueKeep vulnerability nearly six months after it was disclosed.

Background

On November 2, security researchers Kevin Beaumont (@GossiTheDog) and Marcus Hutchins (@MalwareTechBlog) confirmed the first in-the-wild exploitation of CVE-2019-0708, also known as BlueKeep.

Analysis

CVE-2019-0708, a critical remote code execution vulnerability in Microsoft’s Remote Desktop Services, was patched back in May 2019. The vulnerability raised eyebrows, particularly because Microsoft released security updates for out-of-support versions of Windows, in an effort to thwart a potential worm that could spread just as WannaCry did in 2017. Beaumont is credited with naming the vulnerability “BlueKeep,” inspired by Game of Thrones. He subsequently set up BlueKeep honeypots to keep tabs on global attempts to exploit the flaw in-the-wild.

This weekend, Beaumont observed blue screens of death (BSODs) for his BlueKeep honeypots starting on November 2.

Beaumont shared a kernel crash dump from his honeypots with Hutchins, who confirmed this as the first exploitation of BlueKeep in the wild.

Hutchins shared his analysis in a blog post, where he identified the attackers were utilizing a recently released exploit module to distribute a cryptocurrency (or “coin”) miner, dubbed “BlueKeep Monero Miner” which is detected by 44% of scanners on VirusTotal as of November 3. Beaumont shared his insights in a blog post as well.

Though it took several months for the first in-the-wild exploit of BlueKeep to be seen, the expectation has always been there. Back in July, a cryptocurrency mining botnet known as WatchBog incorporated a BlueKeep scanning module to identify vulnerable systems. In August, there was chatter that a BlueKeep exploit would be incorporated into open-source tools.

While this in-the-wild exploit isn’t a WannaCry-level event, it serves as a cautionary reminder that organizations with vulnerable systems should prioritize patching them immediately.

Solution

Tenable recommends applying patches immediately. The following table contains the relevant security updates and monthly rollups for various products.

Security Update Products
4499175 (Security Only)
4499164 (Monthly Rollup)
Windows 7 32-bit (Service Pack 1) Windows 7 x64 (Service Pack 1) Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
4499180 (Security Only)
4499149 (Monthly Rollup)
Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for Itanium-Based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
4499180 (Security Update) Windows Vista SP2 Windows Vista x64 Edition SP2
4500331 (Security Update) Windows XP SP3 x86 Windows XP Professional x64 Edition SP2 Windows XP Embedded SP3 x86 Windows Server 2003 SP2 x86 Windows Server 2003 x64 Edition SP2 Windows Server 2003 R2 SP2 Windows Server 2003 R2 x64 Edition SP2

In addition to patching, Tenable recommends the following mitigation steps:

  • Enable Network Level Authentication (NLA). Microsoft recommends NLA as a mitigation, however, NLA may be something an organization chooses to deploy in addition to patching.
  • Block RDP (Default is TCP port 3389) at your perimeter firewall.
  • Disable any unused services.
  • Upgrade end-of-life (EOL) operating systems. As a reminder, Windows 7 goes EOL on January 14, 2020.

Identifying affected systems

Tenable released a remote check plugin for CVE-2019-0708 after Microsoft disclosed the vulnerability. This plugin can identify affected systems without providing credentials.

To identify systems that do not have NLA enabled, please use plugin 58453.

A list of all plugins to identify BlueKeep (CVE-2019-0708) are available here.

Get more information

Join Tenable's Security Response Team on the Tenable Community.

Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface. Get a free 60-day trial of Tenable.io Vulnerability Management.


          

Baker-Polito Administration Strengthens Supports and Interventions for Youth Survivors of Commercial Sex Exploitation

 Cache   
Baker-Polito Administration Strengthens Supports and Interventions for Youth Survivors of Commercial Sex Exploitation
          

Comment on Psycho-Pass 3 – 01 [Laelaps’ Calling] by evafan

 Cache   
Look, I did not make the show political, the creators did. What's wrong with calling them out on it? People like you, who enable exploitation of the medium to promote the so called narratives are the reason for the impending death of it. Happened with movies. Happened with games. Happened with comics. Is happening to anime. We all know it by now. "points that barely factor into the actual plot" It does. It means the plot is carrot for you to consume the real dish. The whole thing is not only spoiled, it is meaningless, because the foundation is rotten. Talking about plot is a fool's errand. Meanwhile someone is planning ahead about how to up the BS dosage in your next fix. Some people say no right away, some only when twitter mob knocks on their door. It is not my place to tell others what to think, but that the subliminal messaging is happening here is an obvious fact. You can ignore it or discredit me as a triggered troll, but the fact will, unfortunately, remain. "give it a chance, it’s Psycho-pass" At least you admit that you will illogically care as long as they call it Psycho Pass. Would you watch this show if it was called Psion Pals?
          

Roland JP-8080 - Animal mythique

 Cache   

Petit avis que je ré écrirais dès que j'aurais exploité plus en profondeur le JP 8080. On ne le présente plus, il est de ceux qui ont fait l'histoire de la musique électronique (trance entre aut...

Lire la suite sur Audiofanzine


          

Vulnerabilitate zero-day descoperită în Chrome; ce trebuie să faci

 Cache   

Kaspersky a făcut o descoperire alarmantă ce ar putea afecta foarte mulți utilizatori. Vulnerabilitatea este de tip zero-day și țintește tocmai browserul Google Chrome, folosit de cea mai mare parte a utilizatorilor. Kaspersky a denumit vulnerabilitatea CVE-2019-13720 și a raportat-o către ​​Google, care a publicat un patch. După examinarea exploit-ului PoC (Proof of concept) furnizat, […]

The post Vulnerabilitate zero-day descoperită în Chrome; ce trebuie să faci appeared first on PCNEWS.


          

Chine: les exchanges de cryptomonnaies peuvent demander à être réglementés

 Cache   
Chine: les exchanges de cryptomonnaies peuvent demander à être réglementés 101
Source: iStock/Onfokus

À compter d’aujourd’hui, les exchanges de cryptomonnaies peuvent demander à être réglementés par la Securities and Futures Commission (SFC) de Hong Kong qui a publié un document posant le cadre pour les échanges cryptographiques.

Les nouvelles règles couvrent des aspects de la conservation des cryptos, les exigences du client, des règles anti-blanchiment et des manipulations de marché, ainsi que des questions spécifiques au secteur de la cryptomonnaie, a dit Ashley Alder, directeur général du SFC dans une conférence Fintech à Hong Kong.

"Et cela met également en évidence de nombreux nouveaux concepts auxquels nous nous habituons, tels que les portefeuilles chauds et froids, les forks, les parachutages (airdrops), etc. Nous définirons également les critères permettant aux plateformes de décider de l'inclusion d'un nouvel actif pour le trading", a-t-il ajouté.

Selon Alder, la Commission a examiné "un grand nombre d'exploitants de plateformes cryptographiques" et a conclu que "certains d'entre nous pourraient être réglementés par nous".

Toutefois, le directeur général a souligné qu'il veillerait à ce que les opérateurs de plateformes ne puissent fournir des services qu'aux investisseurs professionnels, et uniquement à ceux qui sont en mesure de démontrer qu'ils possèdent déjà une connaissance suffisante en matière d'investissement dans ce domaine.

Cette annonce est "un moment crucial pour les services financiers en Asie et indique une acceptation accrue des actifs numériques en tant que nouveau type d'instruments financiers", a déclaré à Reuters Hugh Madden, le PDG de BC Group, une société techno de trading d'actifs numériques.

Dans le même temps, Alder a également souligné que la SFC était "extrêmement préoccupée" par les plateformes offrant des contrats à terme sur actifs virtuels au public, en particulier des contrats à fort effet de levier.

"Nous allons donc publier aujourd'hui un deuxième document qui alerte les investisseurs sur ces risques. Elle indique également que ceux qui proposent des contrats à terme sur des actifs virtuels à des fins de transaction pourraient bien mener une activité illégale", a déclaré M. Alder.

Plus tôt dans la journée, il a été annoncé que le planificateur d’état de la Chine, la Commission nationale du développement et de la réforme, avait retiré le secteur du minage de Bitcoin (BTC) de la liste des industries susceptibles d’être éliminées.

Tout cela s’inscrit dans la foulée de la récente demande du président chinois Xi Jinping d’accélérer le développement de la technologie blockchain en raison de son importance "dans le nouveau cycle d’innovation technologique et de transformation industrielle" de la Chine.

Lire aussi: Les déclarations de la Chine provoquent-elles la hausse du prix du bitcoin?


          

La Chine revoit sa position à l’égard de l’industrie du mining

 Cache   

Chine Bitcoin

La Commission nationale chinoise pour le développement et la réforme (NDRC) a rejeté son plan d’exclusion du mining de cryptomonnaies en tant qu’industrie dans le pays.

Soulagement pour l’industrie

L’organisme gouvernemental central chargé de formuler les orientations macroéconomiques de la Chine a publié le 6 novembre la dernière version de son « Industrial Structure Adjustment Guidance Catalog », qui dresse une liste des industries que l’organisme recommande d’encourager, de restreindre ou d’éliminer.

Alors que dans la version publiée en avril dernier l’industrie du mining était considérée comme une industrie à éliminer, la nouvelle version ne fait plus mention du mining dans cette catégorie. L’ébauche initiale recommandait aux gouvernements locaux d’éliminer progressivement l’exploitation minière du Bitcoin (BTC) du pays. Le nouveau plan sera effectif d’ici le 1er janvier 2020 avec d’ici là, on l’espère, aucune modification négative apportée à l’industrie du mining ou aux cryptomonnaies.

Lors d’une conférence de presse tenue aujourd’hui, les responsables de la NDRC ont déclaré que depuis la publication de l’ébauche initiale, l’agence a reçu plus de 2 500 suggestions sur diverses questions, dont la plupart ont été prises en considération. Cependant, aucune d’entre elles ne concernait le mining.

Une domination chinoise dans le marché du mining

Ce changement intervient après que le président chinois Xi Jinping se soit prononcé sur l’importance de la blockchain et du besoin d’accélérer son développement et son adoption dans les industries du pays. Ses propos auraient été à l’origine de l’énorme hausse du prix du Bitcoin le 25 octobre.

Les mineurs chinois sont également des acteurs majeurs dans l’industrie du mining du Bitcoin. Les quatre plus grands pools de mining sont localisés en Chine et participent à elles toutes à près de 63% du hashrate du réseau Bitcoin. La majorité du réseau est donc maintenu par ces entreprises connues sous les noms de AntPool, Poolin, BTC.com et F2Pool. De plus, en ce qui concerne les fabricants de matériel destiné au mining de cryptomonnaies, ce sont aussi deux grands constructeurs d’origine chinoise qui se partage le marché, BitMain et Canaan.

Avec cette modification, les entreprises chinoises spécialisées dans le mining ne semblent plus être menacées et leurs expansions pourraient drastiquement s’accélérer. Il est probable que la domination des fermes de mining originaire de Chine continue de s’accroître et dépasse rapidement une participation supérieure à 70% du hashrate global.

La possibilité qu’une attaque des 51% soit un jour envisageable sur le réseau du Bitcoin semble ne plus être un mirage. Une seule entité ne pourra très sûrement jamais y parvenir, mais un accord entre les deux plus grandes fermes de mining est possible dans le futur et pourrait compromettre la sécurité générale du réseau.

RECEVEZ UN RÉCAPITULATIF DE L'ACTUALITÉ CRYPTO CHAQUE DIMANCHE

Clément

Achetant son premier Bitcoin en 2017, Clément se rend vite compte de son attirance pour le monde des cryptomonnaies. Il croit fermement en cette technologie et qu'elle révolutionne déjà de nombreux secteurs.

facebook-cryptoast twitter-soothsayerdataProfil linkedin

          

Microsoft, IBM, Intel et d’autres lancent un outil de classification des tokens

 Cache   

Classification tokens

La Token Taxonomy Initiative (TTI) a publié son premier outil de classification des tokens, comme l’explique un communiqué publié hier. Le Token Taxonomy Framework permettra aux entreprises intéressées de mieux développer leurs propres tokens.

Améliorer la classification des tokens

La TTI avait été annoncée dès avril 2019 par l’Enterprise Ethereum Alliance, un consortium d’entreprises rassemblé autour des technologies développées par l’altcoin. Face à une nébuleuse des altcoins extrêmement variée et souvent opaque, les entreprises avaient décidé d’apporter de la clarté au domaine. Plus précisément, il s’agissait de « définir un token dans des termes non techniques et pouvant s’appliquer à plusieurs industries, en utilisant des analogies courantes afin que chacun puisse les comprendre ». Ce gros travail de vulgarisation est censé amener de nouveaux utilisateurs dans l’industrie, et mieux faire comprendre comment fonctionnent les crypto-actifs.

Des outils de création de tokens pour les entreprises

Le Token Taxonomy Framework (TTF) V1.0, tel qu’il a été publié hier, permet également aux acteurs de l’industrie de publier de nouveaux tokens. Selon le communiqué, « les utilisateurs du TTF peuvent créer un nouveau type de token grâce à des composants réutilisables et applicables à des industries variées, y compris des définitions de tokens existantes. Cela permet de créer un cahier des charges qui inclut tous les ingrédients nécessaires à n’importe quelle implémentation en entreprise. »

L’initiative a rassemblé de grandes marques, parmi lesquelles JP Morgan, IBM, Microsoft, Intel et ConsenSys. Elle devrait permettre d’améliorer l’interopérabilité des blockchains, qui manque encore souvent à l’industrie, comme l’explique le président de la TTI Marley Gray. « Que ce soient des tickets, des documents logistiques, des actions, des titres de propriété, des points fidélité ou encore des produits et services blockchain qu’on n’a pas encore imaginés, les tokens devraient pouvoir circuler entre les plateformes. Si nous voulons vraiment tirer profit de ce que les plateformes collaboratives peuvent offrir, les transactions interplateformes doivent pouvoir communiquer entre elles. Cela commence par des normes, et ce nouveau système permet de débloquer le potentiel inexploité des tokens sur la blockchain. »

Du point de vue des entreprises, cela permet d’accéder à ces technologies sans avoir besoin de connaissances poussées, grâce à un modèle de type « build you own token ». « Une entreprise ou un consortium pourra sélectionner un token type sur lequel se baser. Il pourra ensuite choisir parmi une liste de caractéristiques et propriétés, pour les appliquer à son token, un peu comme lorsqu’on fait glisser des icônes sur un écran. [Cela permet] de créer un token de manière visuelle […] sans avoir à écrire de code. » Reste à voir si les entreprises se saisiront de ce nouvel outil.

RECEVEZ UN RÉCAPITULATIF DE L'ACTUALITÉ CRYPTO CHAQUE DIMANCHE

Marine Debelloir

Intriguée par le Bitcoin depuis plusieurs années, Marine s'est prise de passion pour les crypto-monnaies et les technologies novatrices qu'elles créent. Elle aime dénicher les infos les plus croustillantes pour aider à démocratiser ce passionnant univers.

facebook-cryptoast twitter-soothsayerdataProfil linkedin

          

Irritatie over extra miljoen dat nodig is voor vernieuwde Maastrichtse poptempel Muziekgieterij

 Cache   

Ruim een maand na de feestelijke opening van de nieuwe Muziekgieterij heeft de euforie plaatsgemaakt voor irritatie. Want voor een goede exploitatie van een volwaardige poptempel blijkt een miljoen euro extra nodig. En dat terwijl de stad al in de rode cijfers zit.


          

The disrupters will be "disrupted"

 Cache   
This example is not a hypothetical. The meal-kit company Blue Apron revealed before its public offering that the company was spending about $460 to recruit each new member, despite making less than $400 per customer. From afar, the company looked like a powerhouse. But from a unit-economics standpoint—that is, by looking at the difference between customer value and customer cost—Blue Apron wasn’t a “company” so much as a dual-subsidy stream: first, sponsoring cooks by refusing to raise prices on ingredients to a break-even level; and second, by enriching podcast producers. Little surprise, then, that since Blue Apron went public, the firm’s valuation has crashed by more than 95 percent. - Derek Thompson, The Millennial Urban Lifestyle Is About to Get More Expensive, The Atlantic

I don't usually do much news commentary but I've been skeptical of the gig-economy and mommy-services for ages.

The bigger question for me has, how did Silicon Valley start-ups manage to fleece investors for this long? The example that jumps to my mind is MoviePass, which was hemorrhaging money so fast that it went as far as to change user passwords to keep users from using its service. Many of these services existed as a "hack" via legal shenanigans. Labor laws are catching up, as Gavin Newsom signed AB 5.

When these services actually charge what it costs to use them, like eScooters, or have the double-whammy of having to raise prices to be profitable and content with actually employing the people they're exploiting and be profitable, it's going to be brutal. Many customers will be priced out from food delivery to ride-hailing services. They'll be just like the services they "disrupted" but only with a nicer app to show for it.


          

CVE-2019-5100

 Cache   
An exploitable integer overflow vulnerability exists in the BMP header parsing functionality of LEADTOOLS 20. A specially crafted BMP image file can cause an integer overflow, potentially resulting in code execution. An attacker can specially craft a BMP image to trigger this
          

CVE-2019-5125

 Cache   
An exploitable heap overflow vulnerability exists in the JPEG2000 parsing functionality of LEADTOOLS 20. A specially crafted J2K image file can cause an out of bounds write of a heap buffer, potentially resulting in code execution. An attack can specially craft a J2K image to
          

Commentaires sur Armel Guerne – Sainte solitude (extrait) par imago270

 Cache   
renoncer ou les pompes de Satan OR minerais richesses à perte de vue c'est à la porte il n'y a qu'à signer pétrole il peut jaillir en Grèce plus encore au Niger au Gabon en Ouganda et d'autres plus de recettes fiscales de routes de centres commerciaux d'automobiles de jeux de luxe d'écrans plus d'accidents plus de pauvreté de drogue plus de barricades de miradors plus de corruption de violences du pôle Nord au pôle Sud animaux fleurs paysages massacrés handicapés femmes enfants exploités sans vergogne la même fable monstrueuse nous écrase et asphyxie la terre pourquoi faire simple quand on peut faire compliqué labyrinthe de montages pour paradis financiers cherchez les coupables ils se refont de belles virginités je renonce à Satan, à ses pompes et à ses oeuvres c'était... une prière de communion solennelle ! On peut ne pas être dévôt... ...mais qui connait ?
          

Workers' Right in Supermarket Supply Chains : New Evidence on the Need for Action

 Cache   

Lors de la campagne d'Oxfam International sur la souffrance des travailleurs dans les chaînes d'approvisionnement des denrées alimentaires, Oxfam a réussi à créer un corpus de preuves irréfutables sur les très mauvaises conditions de travail et de salaire des travailleurs (violation des droits, travail forcé, souffrances cachées, discriminations,…) dans les exploitations agricoles où s'approvisionnent les supermarchés occidentaux. Deux nouvelles études (exploitations de thé de la région d'Assam en Inde (...)

- A la Une / , , , , , , , , , , ,
          

Defending the Perimeter Isn’t Enough on Election Hacking

 Cache   

Defending the Perimeter Isn’t Enough on Election Hacking(Bloomberg Opinion) -- The U.S. is now just a year from the 2020 presidential election. In 2016, we saw foreign interests influence the outcome of a presidential race when Russian hackers infiltrated the computer networks of officials in both parties, and then selectively disseminated the emails of Democrats. Is the nation in better shape to counter such threats this time around?It doesn’t look like it.For example, Microsoft recently reported an attack by Iranian hackers on the emails of current and former U.S. government officials, journalists covering political campaigns, and accounts associated with a presidential campaign. There is reason to believe that the attack, which consisted of more than 2,700 attempts on targeted email accounts, was backed by the Iranian government.According to security researchers and intelligence officials, hackers from Russia and North Korea have also begun targeting organizations that work closely with 2020 presidential candidates.Foreign enemies continue to see U.S. elections as an opportunity to subvert the will of the American people and exert control over our governance at the highest level. This most recent Iranian attack is a reminder that both political organizations and private enterprises face significant cybersecurity risks.Unfortunately, the legacy electoral systems most voters and organizations rely on do not offer sufficient protection in the modern digital landscape. When facing nation-state adversaries with billions in funding and information resources to rival the U.S. National Security Agency, Americans have to think beyond the popular two-factor authentication protocols. We need to protect not only the voting systems themselves, but the email, file-sharing and other communication systems of ancillary campaign groups, local officials and plenty more.What can we do to defend ourselves better? In my military and cyber experience, the operating principle is that the sophisticated attacker will eventually find a way through any perimeter defense. As supreme allied commander of NATO in the late 2000s, I pushed to strengthen the alliance’s nascent Cyber Defense Center in Tallinn, Estonia — but saw firsthand how easily Russian hackers penetrated our digital perimeter.Protections must be designed so that even if the attacker succeeds in getting to the target, the target remains safe. To do so, we need to think in terms of four core principles for secure communication systems that will be resilient to the inevitable breach.First, systems must employ end-to-end encryption. (Disclosure: I serve on the board of an information-security firm, Preveil Llc.) If we assume that attackers will be able to exploit vulnerabilities in server software or the defense mechanisms that guard it, then the only way to keep information secure is to make sure that it’s never exposed, even while on the server. With end-to-end encryption, data is only accessible to the sender and the recipient — it isn’t accessible en route to the server or on the server. Even if the server is compromised, the data is not. Think of this as the difference between working in an Ebola environment in a body suit, which will eventually weaken at the seams, and being vaccinated against the disease. The perimeter defense is far from worthless, but the vaccine — the internal protection — is vastly better. A second concern is the vulnerability of anything in the system that becomes a juicy target. While end-to-end encryption eliminates the server as a single entity that can be compromised, if the system has administrators with global access, a high-yield single target for attackers remains. To solve this problem, access to large amounts of sensitive user data should be granted only after being approved by several trusted individuals. Similar to the systems used for nuclear-launch codes, encryption cryptography can break up individual user keys into fragments that are distributed among multiple people. Therefore, administrative access to users’ accounts is achieved only when all key shards are present, so there is no single administrator who attackers can compromise to gain access.Third, it’s time to do away with passwords. According to the report of the 2019 Verizon data breach investigations, 80% of hacking-related breaches involve compromised and weak credentials. Rather than depending on fallible passwords, secure communication systems should now grant account access using a private encryption key. A 256-bit encryption key has a lot of different possible combinations of characters — nearly 10 to the 78th power, the same as the number of atoms in the universe — and is not crackable with existing computational power. Because the key is stored only on the user’s physical device, remote access isn’t possible.Finally, it is important to protect the most sensitive communications from socially engineered phishing and spoofing attacks. Traditional digital communications provide an opening for impostors to trick users into clicking on dangerous links or leaking information. When only known users are able to communicate with each other about an organization’s most confidential information, that risk of “lookalike” accounts is eliminated. The strongest security systems don’t depend on users to be perfect, or to always exercise good judgment. They make sure that data is safe even when humans are flawed. Getting at this “insider threat” is crucial.Security is a serious matter for organizations of all types, not just political parties during an election season. Organizations should rethink their security preparedness with a deeper understanding of the adversaries’ capabilities. They need to make the shift to secure systems modeled around these four core principles — including adopting ready-to-use encrypted communications systems for email and file-sharing.Between now and Nov. 3, 2020, there should be few higher priorities than improving security to stop hackers and foreign powers from threatening American democracy itself.To contact the author of this story: James Stavridis at jstavridis@bloomberg.netTo contact the editor responsible for this story: Tobin Harshaw at tharshaw@bloomberg.netThis column does not necessarily reflect the opinion of the editorial board or Bloomberg LP and its owners.James Stavridis is a Bloomberg Opinion columnist. He is a retired U.S. Navy admiral and former supreme allied commander of NATO, and dean emeritus of the Fletcher School of Law and Diplomacy at Tufts University. He is also an operating executive consultant at the Carlyle Group and chairs the board of counselors at McLarty Associates.For more articles like this, please visit us at bloomberg.com/opinion©2019 Bloomberg L.P.



          

Eyewitness to History

 Cache   
By Kimberley Jordan Reeman

When I came into this Country, it was my only view to do all in my power for your good and safety. This I will always do as long as life is in me. But alas! I see with grief, I can at present do little for you this side the water, for the only thing that now can be done, is to defend your selves.
Charles Edward Stuart, April 1746, after Culloden

WEDNESDAY, APRIL 16, 1746, 11 a.m. A raw morning, with a bitter north wind scything up from the Moray Firth, bringing heavy showers of rain and sleet. Two armies, some fourteen thousand men, although perhaps only three thousand will engage, are manoeuvring two and a half miles apart on this sloping, boggy ground six miles from Inverness, which adjoins Drummossie Moor and climbs from the elegant parks of Culloden House, owned by Duncan Forbes, the Lord President of the Court of Session.

The Jacobite army, under the command of the Pretender, Charles Edward Stuart, who even in these final, fateful hours radiates the charisma and optimism of his ancestor Mary, Queen of Scots, stumbles into some order of battle with a confusion and disorganization that reflects the rifts, quarrels and indecision of its generals. The British army, under the command of William Augustus, H.R.H the Duke of Cumberland, the charmless, corpulent third son of George II, deploys with a silent purpose that moves a French officer to remark to Charles that ‘he feared the day already lost, for he had never seen men advance in so calm and regular a manner’.

Charles Edward Stuart - Public Domain Image

The onslaught of sleet assaults them all: princes and peasants, volunteers and conscripts, the criminals and the idealists, the men of noble blood and the butchers, gardeners, apprentices; and the veterans recalled from Flanders and the War of the Austrian Succession, professional killers whose service is for life, and whose ages range from seventeen to fifty-four.

The Jacobites stand ankle-deep in water, with empty bellies, sleet beating on their backs: volatile, exhausted, ill-fed. Many have deserted because there is little food and less pay: because their fields are lying unsown; because they fear for their families; because they sense the animosity and dissension among their leaders, who cannot agree on anything from the ground on which to fight what they know will be their final battle to the order of precedence to be accorded to the clans. Some have deserted because prescience has warned them that their cause is lost, and they have foreseen their deaths.

They are not all Highlanders, although there are many Gaelic-speaking clansmen, conscripted and threatened into service by chieftains or landlords. There are also Lowland Scots, many conscripted; volunteers; deserters from the Scottish militia regiments of the British army or enlisted from among those prisoners taken after Charles’s victory at Prestonpans. Two infantry battalions and a squadron of cavalry are French, as well as artillerymen, engineers and volunteers: these are the ‘Wild Geese’, the Irish Brigade of the French army, whose red coats among the coarse homespun of the clansmen are clearly visible across the moor, as are the blue coats of the Royal Écossais, a Scottish unit of the French army raised in 1744.

The wind is now northeasterly. Five hundred yards away, across ground laced with streams and springs, drystone walls and scattered cottages, the standards and colours of the British regiments snap and billow, blowing forward: the wind is at this army’s back, and the smoke of battle will blind the enemy. Many of these officers are Scots, many Anglo-Irish: the 1st, 21st and 25th Foot are Scots regiments, as are the Gaelic-speaking Argyllshire Militia, the Duke of Kingston’s Light Horse, and the regulars of Loudon’s 64th Highlanders. There are many here who wear Highland dress, many for whom the ranting slogans and skirling pipes of the rebel clans are echoes of a culture shared.

The Battle of Culloden, oil on canvas, David Morier, 1746

The sleet stops abruptly: the sky is torn with blue. A little after one o’clock, the Pretender’s artillery opens with irregular fire. The royal artillery, carefully sited, responds with a devastating, sustained barrage aimed at the massed ranks of the Jacobite army. Mud spatters the mounted Charles’s face: behind him a groom is decapitated. The roundshot is followed by canister, sweeping the field with a hailstorm of grape and reaping a terrible harvest. Blinded by the smoke and by unbearable rage and anguish, eight clan regiments break into the charge. At a range of fifty yards, the hardened veterans of the British front-line regiments, Barrell’s, Munro’s, and the Scots Fusiliers, open fire with muskets, inflicting carnage. The shock of the Jacobite charge splits Barrell’s and engulfs it: of four hundred and thirty-eight officers and men, both English and Scots, seventeen are killed and one hundred and eight wounded, many grievously: the colonel of Barrell’s, Robert Rich, falls with a severed hand and serious head wounds; others are dismembered. The naked courage of the Highlanders imprints itself so forcibly upon the mind of a young aide de camp to Cumberland that in Quebec on September 13, 1759, that man, now Major-General James Wolfe, will unleash its fury himself against the forces of the Marquis de Montcalm on the Plains of Abraham.

Of Wednesday, April 16, 1746, no man could know, as he shivered in the prelude to battle, that no British regiment would ever bear Culloden among its honours, or that its very name would become synonymous with infamy. No man, neither prince nor apprentice, could perceive that he was ‘only a mote of dust, and of as much consequence’ in the affairs of nations, and that Culloden was only a footnote, albeit scrawled in blood, across the vast canvas of the eighteenth century, a microcosm in which the hereditary enemies, Britain and France, grappled for supremacy. A turbulent century, which sees America’s bloody and protracted struggle for independence, the insurrection and revolution which will convulse France, and the tragic repercussions, for a people and a culture, which haunt Scotland still.

~~~~~~~~~~

About Kimberley:
Kimberley Jordan Reeman was born in Toronto, graduating from the University of Toronto with a Bachelor of Arts (hons.) in English literature in 1976. She worked in Canadian radio and publishing before marrying the author Douglas Reeman in 1985, and until his death in 2017 was his editor, muse and literary partner, while pursuing her own career as a novelist.

About Douglas (Alexander Kent)
Douglas Reeman was born in Thames Ditton, Surrey, England in 1924. With the outbreak of war, and despite belonging to an army family, he joined the Royal Navy without hesitation at the age of sixteen. In June of 1968 To Glory We Steer was published under the pen name Alexander Kent. Douglas Reeman died in January of 2017. Today, the exploits of Richard and Adam Bolitho feature in twenty-eight Alexander Kent novels.


Buy Coronach on Amazon (Universal Link) : http://author.to/Coronach

Douglas’s Website  https://www.douglasreeman.com/



          

Compte rendu du Conseil des ministres du 6 novembre 2019

 Cache   
Ouverture de la pêche aux trocas à Uturoa, Tumaraa, Taputapuatea et Tahaa   Le troca est un coquillage introduit en Polynésie française depuis 1957, qui est protégé par une interdiction de pêche permanente sauf pendant les campagnes de pêche autorisées par le Pays. Cette année, suite aux demandes formulées par les municipalités concernées, la pêche aux trocas sera donc ouverte dans les communes suivantes : Uturoa, Tumaraa, Taputapuatea et Tahaa. Sous l’égide des comités de surveillance des espèces animales marines et d’eau douce, la période de pêche est prévue du 11 novembre au 6 décembre 2019 inclus et la vente des coquilles du 7 au 31 décembre 2019 au plus tard. Seuls les pêcheurs issus des communes concernées respectivement et recensés auprès des Comités de surveillance et de gestion seront autorisés à pêcher, et ce dans la limite du quota attribué à leur commune et selon les conditions définies par les comités. Les coquilles, vidées, nettoyées et séchées, dont la taille est comprise entre 8 et 11 cm,  seront proposées à la vente à des négociants. La plupart d’entre elles seront destinées à l’export et finiront en boutons de vêtement. La récolte prévisible pour cette campagne de pêche de trocas est plafonnée à 155 tonnes pour une valeur marchande estimée à près de 30 millions Fcfp pour les populations concernées.   Sept projets d’investissement d’entreprises soutenus par le Pays   Dans le cadre de sa politique de soutien à l’investissement, le Pays a instauré deux dispositifs d’aide aux entreprises : La première mesure porte sur une aide à l’équipement des petites entreprises (AEPE) afin de les accompagner dans leur projet de création ou de développement de leur activité ; Le second dispositif instaure une aide pour la création et la revitalisation des petits commerces et des restaurants (APCR) afin de les accompagner dans leur projet d’amélioration de l’attractivité de leurs points de vente ou de restauration en Polynésie française. Le Conseil des ministres a autorisé l’attribution de 20 320 000 Fcfp d’aides financières afin de soutenir 7 entreprises pour un investissement total de 71 384 346 Fcfp. Ce soutien du Pays permettra la création de 13 emplois dans différents secteurs d’activités tels que la restauration, le commerce alimentaire de proximité, la création graphique, la miroiterie, la maintenance navale, l’affrètement de marchandises ou l’excursion nautique.        Logement : point d’étape et perspective des actions partenariales locales et nationales   Le ministre du Logement et de l’aménagement du territoire a fait un point d’étape sur l’actualité du secteur de l’habitat et notamment le lancement de l’élaboration de la stratégie habitat du 11 octobre dernier qui a mobilisé plus d’une centaine de personnes : les présidents du Pays, de l’Assemblée de Polynésie française et du syndicat pour la promotion des communes de Polynésie française, le Haut-commissaire de la République, les élus de l’assemblée, des membres du gouvernement, de nombreux maires et élus municipaux, les représentants des socioprofessionnels du secteur, de la société civile et des associations.   Les travaux d’études d’élaboration de la stratégie habitat sont désormais engagés jusqu’à la fin de l’année 2020 et vont se dérouler dans chaque archipel pour un diagnostic de la situation de l’habitat, des priorités qui en découlent et convenir du cadre de la politique publique de l’habitat et de sa programmation pluriannuelle pour la période 2020 – 2030.   Par ailleurs, le ministre a tenu à faire un point sur les actions partenariales développées ces deux dernières années avec les principaux partenaires nationaux du secteur de l’habitat, de l’aménagement et de la ville, mais aussi avec le chargé de mission Outre-mer à Matignon et les ministères nationaux en charge du logement, de l’action et des comptes publics et des outre-mer. Des relations professionnelles régulières sont désormais bien établies avec l’Union Sociale pour l’Habitat, le Conseil général de l’environnement et du développement durable (CGEDD), l’Agence Nationale de l’Habitat (ANAH), avec la Fédération nationale SOLIHA œuvrant dans le domaine de la rénovation de l’habitat privé et la lutte contre l’habitat précaire ainsi qu’avec le groupe « Action Logement » en matière de financement du logement des salariés dans le cadre du Plan logement outre-mer. Ces échanges réguliers ont été l’occasion de mieux faire connaître les initiatives prises et les actions concrètes de partenariat utiles à la Polynésie française. Ainsi plusieurs missions d’appui et de rencontres au plan local sont prévues d’ici à la fin de l’année : Un appui technique de la fédération SOLIHA (11 au 28 novembre) dans le domaine de la rénovation du parc de logements privés, cœur de métier de cette fédération nationale regroupant 150 structures locales adhérentes spécialisées, en métropole et en outre-mer. Cette mission vise à partager des retours d’expériences et échanger sur la situation de l’habitat privé en Polynésie et sur les mesures à prendre en matière de traitement de l’habitat privé dégradé. La poursuite de l’élaboration d’un plan de lutte contre l’habitat indigne (12 au 29 novembre) programmée avec le CGEDD. Soraya Daou, en charge des questions d’habitat indigne au CGEDD interviendra dans le cadre de travaux techniques sur les approches de traitement de l’insalubrité et d’habitabilité de l’habitat. Un séminaire d’appui technique au programme de rénovation urbaine (début décembre 2019) Ce séminaire organisé en partenariat entre le Syndicat Mixte du Contrat de Ville et la DHV, avec le soutien de l’Ecole de la Rénovation Urbaine (entité fédérée au sein de l’USH) porte sur la gestion des projets de rénovation urbaine à l’attention des services et établissements du Pays, des communes et de l’Etat, ainsi que des partenaires associatifs. La visite du président du Groupe Action Logement : Bruno Arcadipane a tout récemment confirmé l’intérêt d’un partenariat avec la Polynésie française dans le cadre de la mise en place du « Plan d’Investissement d’Avenir - PIV » mobilisant 9 milliards d’euros au plan national, dont 1,5 milliards en outre-mer pour financer le logement des salariés. La Polynésie française est partie prenante du plan logement outre-mer.     Voyage de préparation des candidates à Miss France 2020   Un point sur le soutien et le partenariat de la Polynésie française à l’organisation du voyage de préparation des candidates au concours de Miss France 2020, qui se tiendra en décembre prochain, a été présenté en Conseil des ministres. Ce partenariat fait suite à l’élection de Vaimalama Chaves, Miss Tahiti 2018, au titre de Miss France 2019. La convention de partenariat a été signée le 1er octobre dernier avec le comité Miss France, Air Tahiti Nui (transporteur officiel), le groupe Intercontinental – Polynésie française (hébergeur officiel) ainsi que Tahiti Tourisme. Les 30 candidates arriveront le soir du dimanche 17 novembre à l’aéroport de Tahiti-Faa’a, avec l’équipe technique du comité Miss France ainsi que des médias français, soit une délégation de 75 personnes. Ils séjourneront en Polynésie française jusqu’au 26 novembre. Une conférence de presse est prévue le lundi 18 novembre, de 10 h à midi, à la Présidence de la Polynésie française. A cette occasion, le comité Miss France présentera les candidates lors d’un défilé ouvert au public. Les candidates à l’élection de Miss France participeront aussi à une soirée caritative organisée par l’association « Les Marraines de Tahiti », prévue le 19 novembre à l’hôtel l’InterContinental Tahiti. Il s’agit ainsi de surfer sur le succès de Miss France pour accompagner la visibilité de la destination sur le marché métropolitain. Pour cela un programme mettant en valeur la diversité culturelle des îles, la beauté des paysages et de l’environnement ainsi que la particularité océanique de Tahiti et ses Îles a été concocté. Les candidates et les médias pourront ainsi apprécier des prestations de danses pa’umotu à l’arrivée, de danses marquisiennes durant leur séjour à Tahiti ainsi que de ‘ori Tahiti. Des activités culturelles et de sensibilisation à l’environnement seront aussi organisées. Durant leur séjour les candidates seront évaluées sur leur prestance, leur culture générale et leur condition physique. Le voyage sera couvert par 9 médias qui produiront des images et articles sur la préparation des candidates ainsi que la destination.   Tournage du jeu « La Carte aux trésors » en Polynésie   Un voyage de repérage a été organisé du 18 au 26 août derniers. Ce déplacement de la société Adventure Line, producteur de l’émission, a permis d’identifier les sites et prises de vues pour le tournage de l’émission prévu d’ici la fin de l’année. La production a été satisfaite de ce premier déplacement avec des techniciens de France 3 et la chaîne se réjouit pour sa part de pouvoir diffuser cette émission à l’antenne au printemps 2020. Dans le jeu la « Carte Aux Trésors », 2 candidats s’affrontent au cours de 4 énigmes pour tenter de décrocher un trésor. Ces 4 énigmes permettent de faire 4 focus sur la zone de jeu déterminée. Pour se déplacer les 2 candidats ont à leur disposition un hélicoptère et doivent se faire aider par la population locale. L’émission se déroule en 3 parties chronométrées et, lors des phases de jeux, l’émission est rythmée par des reportages sur la région visitée. En termes d’audience et d’impact audiovisuel, la « carte aux trésors » représente une moyenne de 3 millions de téléspectateurs plaçant l’émission comme le programme le plus performant de la case « mercredi 21 heures » sur France 3. L’émission est présentée par l’animateur Cyril Féraud. C’est un public familial qui constitue la majorité des téléspectateurs avec également une bonne audience sur la tranche des 10-24 ans.   A émission exceptionnelle, dispositif exceptionnel, une zone de jeu immense est ainsi prévue pour présenter au public un large aperçu de l’archipel de la Société et faire découvrir les charmes, la culture et les spécificités de ses différentes îles. L’équipe se compose de 26 personnes venant de métropole (animateur, candidats, cadreurs vidéo, ingénieurs du son, ingénieurs vision, logisticien, direction de production et chargés de production, rédacteur en chef et auteur, régisseur général) et de 11 personnes recrutées en Polynésie (fixeur, régisseurs, maquilleuse, pilotes, techniciens, pilote bateau et matelot). Les équipes sont transportées par Air Tahiti Nui, partenaire exclusif de l’émission. Les 3 hélicoptères sont loués à Tahiti Nui Helicoptères, les transferts inter-îles étant effectués par Air Tahiti. Ce partenariat participera grandement à la visibilité et la promotion de la destination en métropole. Les voyagistes français confirment que ce type de production participe à l’augmentation des demandes de réservation. Compte tenu des audiences de l’émission, de sa notoriété, il s’avère qu’à l’issue des diffusions les régions mises en valeur ont constaté à la fois une hausse des fréquentations des sites web consacrées à la zone visitée, une hausse des demandes d’information auprès des sites présentés dans l’émission, une hausse des réservations et visites sur les sites touristiques concernés et une hausse des réservations hôtelières.     Mission d’accueil et d’information de Tahiti Tourisme – Fare Manihini   Le département des opérations locales du Tahiti Tourisme a évolué en direction des opérations locales en fin d’année 2017, considérant l’importance du marché local et pour permettre au groupement d’assurer au mieux ses missions telles que : accueillir, orienter et informer les visiteurs, promouvoir la destination en Polynésie française, animer la vie locale tout au long de l’année par la création, production ou le soutien à l’organisation d’événement, sensibiliser la population au tourisme et animer les comités du tourisme. La direction des opérations locales est constituée d’une directrice et de 9 agents, dont 1 sur Raiatea. Pour sa mission d’accueil, d’orientation et d’information, le Tahiti Tourisme dispose de 4 points d’accueil et d’information. Au total ce sont près de 45 000 visiteurs qui se seront rendus dans les différents points d’information. Les Américains composent la majorité de ses visiteurs, suivis des métropolitains, des autres européens et des résidents avec près de 3 500 visiteurs. Le comptoir de la gare maritime, à Papeete, était installé depuis 2016, permettant d’informer et d’orienter le flux touristique en partance, ou en provenance, de Moorea. Dans le cadre de la construction de nouveau terminal de croisière, les services d’accueil et d’information sont maintenant assurés sous un chapiteau provisoire situé en face de l’épi nord du quai des paquebots. Le comptoir de l’aéroport de Tahiti-Faaa est quant à lui installé depuis 2018 pour répondre à l’augmentation du flux de passagers liée à l’arrivée des nouvelles compagnies. Depuis l’ouverture, près de 3 300 touristes se sont rendus à ce guichet d’informations. Le bureau de Raiatea est, lui, localisé à la gare maritime d’Uturoa. Compte tenu du volume de touristes accueillis, Tahiti Tourisme a souhaité se doter d’un outil permettant de donner aux touristes et à la population un niveau de confort optimal. C’est la raison pour laquelle Tahiti Tourisme a repris le bail de l’ancienne agence Socredo Tiare située sur le front de mer de Papeete, au niveau du quartier du commerce. Ainsi, ce sont 146m² qui seront dédiés à l’accueil et à l’information touristique sur la base d’un design mêlant modernité et traditions. D’une part, la culture et le patrimoine seront mis en avant avec l’exposition permanente d’œuvres réalisés par les élèves du Centre des Métiers d’Art avec qui Tahiti Tourisme souhaite développer un partenariat à long terme. D’autre part, des produits locaux seront également exposés. L’espace sera réparti en deux grandes zones : la partie avant, composées de 3 espaces, dédiée à l’accueil des touristes a été conçue pour que les personnes à mobilité réduite puissent y accéder facilement, un premier espace d’accueil incluant un desk en bois local et nacres derrière lequel les touristes trouveront l’ensemble des informations disponibles et par un second espace de détente pourvu de fauteuils dans lesquels les touristes pourront se détendre et profiter du Wifi offert et un troisième espace « boutique » dans lequel les produits dérivés de la marque Tahiti Et Ses Îles seront vendus (parapluies, mugs, gourdes réutilisables…).  La partie arrière du local ne sera pas accessible au public mais offrira au personnel de Tahiti Tourisme dédié aux opérations locales un espace de travail optimisé. Les travaux devraient démarrer ce mois-ci pour une durée de 3 mois environ, avec une livraison prévue en janvier 2020. Le coût des travaux, mobilier compris, est estimé à 45 millions Fcfp. Ils seront financés sur fonds propres par Tahiti Tourisme.     Subvention de fonctionnement pour le Comité polynésien des maisons familiales rurales   Le Conseil des ministres a octroyé une subvention d’un montant de 87 millions Fcfp au comité polynésien des maisons familiales rurales (CPMFR) au titre de l’année 2019 pour ses dépenses de fonctionnement. Créé en 1980, le CPMFR, qui fonctionne également sous le régime d’une association de type loi 1901 est, en tant qu’entité fédératrice des huit maisons familiales rurales (MFR), chargé du suivi administratif, financier et pédagogique. En effet, il a notamment pour objet de favoriser une approche globale des questions relatives aux formations dispensées dans les classes de 4e, 3e, CAPA, selon un rythme approprié par alternance. Il apporte également un appui logistique aux MFR. Il définit et met en oeuvre, en partenariat avec les MFR, la politique de recrutement, de formation et d'encadrement pédagogique des moniteurs. Le comité est, par ailleurs, l’interlocuteur privilégié de l’union nationale des MFR, d’éducation et d’orientation. Constituées en association, les (MFR) comptent huit structures de formations réparties sur l’ensemble de la Polynésie française à savoir, 4 structures sur Tahiti et 1 structure sur les îles de Huahine, Tahaa, Hao et Rurutu. Elles sont directement financées par l’Etat sur la base de leur quota d’élèves fixé à 480, en application de la convention quinquennale 9 juillet 2009 relative au fonctionnement des maisons familiales rurales (MFR) de Polynésie française. Ainsi, entre 2016 et 2019, la population scolaire des MFR s’est élevée en moyenne à 441 élèves. Pour l’année 2018, la subvention de l’Etat s’est élevée à 211 337 211 Fcfp pour le fonctionnement des MFR et 47 020 974 Fcfp pour les bourses des élèves, soit un montant total de 258 358 185 Fcfp.   Développement de la Grande Plaisance   Le ministère du Tourisme entend développer le secteur de la Grande Plaisance en Polynésie. Dans cette perspective, l’une des premières actions de 2019 de Tahiti Tourisme a été le jumelage avec le Yacht Club de Monaco ainsi que leur participation conjointe au Yacht Show de Singapour en mars dernier. Tahiti Tourisme a ainsi mis en œuvre ses actions de développement de la visibilité dans ce secteur avec les événements suivants : participation au Monaco Yacht Show du 25 au 28 septembre, participation au séminaire charter de l’International Yacht Broker Association le 9 octobre, et présentation des résultats de l’étude d’impact économique de la Grande Plaisance 2019. Organisé en Principauté de Monaco, le Monaco Yacht Show présente, chaque année, plus de 100 superyachts uniques et exceptionnels construits par les plus grands chantiers navals au monde et accueille les acteurs majeurs du yachting.   En septembre, l’industrie du yachting s’est réunie aussi à Monaco où une quarantaine de nouveaux lancements sont dévoilés en première mondiale chaque année. 600 sociétés exposantes et partenaires participent à l’événement. Cette année, Tahiti Et Ses Iles a disposé pour la première fois d’un stand sur le salon professionnel de la Grande Plaisance, partagé avec la marina Port Denarau de Fidji. Tahiti Tourisme a en effet décidé de s’allier à la marina Port Denarau, elle-même soutenue par Tourism Fiji, afin de promouvoir la région pacifique auprès des Superyachts. Etant donné l’attention générée par la coupe du monde de rugby au Japon cette année, les Jeux Olympiques de Tokyo en 2020 ainsi que l’America’s Cup en Nouvelle-Zélande en 2021, la coopération s’avère essentielle afin de pouvoir proposer aux Superyachts un itinéraire régional complet. Le 9 octobre, Tahiti Tourisme a aussi participé au séminaire charter de l’International Yacht Broker Association (IYBA), en Floride. Ce séminaire a également été l’opportunité pour Tahiti Tourisme de sensibiliser les professionnels de ce secteur à l’importance de la préservation des ressources marines et à la protection des espèces végétales et animales.  Les Coral Gardeners se sont joints à Tahiti Tourisme dans cette démarche de sensibilisation, en mettant l’accent sur la préservation des récifs coralliens. De nombreux propriétaires de Superyachts ainsi que les clients charter sont très sensibles à cette cause, et cette intervention permettra de positionner la destination comme un exemple en la matière. La réalisation d’une étude sur les retombées économiques de la Grande Plaisance en Polynésie française était aussi l’une des priorités de Tahiti Tourisme pour 2019. Avec l’aide d’un comité de pilotage constitué de l’ISPF (Institut de la statistique de la Polynésie française), du service du tourisme, de Tahiti Tourisme et de membres du Cluster Superyacht, l’agence londonienne The Superyacht Agency a été sélectionnée fin 2018 pour réaliser cette étude. Deux aspects sont abordés dans l’étude : d’une part l’impact économique consistant en un questionnaire envoyé à une base de 325 superyachts. L’étude livrée en juin 2019 démontre que chaque année, la cinquantaine de Superyachts qui visitent les eaux polynésiennes génèrent un peu plus de 2,8 milliards Fcfp de retombées économiques, soit environ 2,8 millions Fcfp par visiteur (1 100 visiteurs en moyenne par an). En comparaison, un touriste « terrestre » dépense un budget moyen de 270 000 Fcfp en Polynésie française. Un second questionnaire sur la perception de la destination a été envoyé à un échantillon de professionnels internationaux du secteur composé principalement de capitaines, de propriétaires de yachts, de manager de yachts et de courtiers en charter. Cette enquête permettra notamment à la destination d’ajuster sa stratégie de promotion et de développement de la Grande Plaisance au niveau local. A titre d’exemple, pas moins de 120 superyachts ont exprimé à ce jour leur intérêt de se rendre en Nouvelle-Zélande pour l’America’s Cup : il s’agit d’une véritable  opportunité pour Tahiti Et Ses Iles qui se situent sur leur route.   La Polynésie restitue les terres de Rurutu et Rimatara   Historiquement, aucune procédure de revendication des terres n’a été mise en place dans les îles de Rurutu et Rimatara. Ainsi, en l’absence de délivrance de titre foncier au profit des habitants de ces îles, les biens fonciers de Rurutu et Rimatara sont considérés comme des « biens sans maître » intégrés au patrimoine du Pays.   Les habitants de Rurutu et Rimatara doivent donc nécessairement recourir à la procédure de reconnaissance de propriété notamment par prescription acquisitive trentenaire. Or cette procédure s’avère souvent très longue et coûteuse, celle-ci passant nécessairement par une procédure devant la justice rendant fréquemment indispensable le recours à un avocat.   C’est ainsi pour pallier ce « vide juridique historique », qu’il est proposé l’instauration d’une procédure exceptionnelle et temporaire spécifique aux îles de Rurutu et Rimatara tendant à la délivrance de titres de propriété.   Le projet de loi du Pays visant à organiser le titrement de certaines terres sises à Rurutu et Rimatara, archipel des Australes, Polynésie française permettra la cession à titre gratuit de biens relevant du domaine privé de la Polynésie française, en dehors de toute action en revendication de propriété devant le tribunal foncier.   Ce projet permettra à terme de rendre 1 882 parcelles cadastrales couvrant une superficie de 14 194 434 m² à Rurutu et 844 parcelles cadastrales couvrant une superficie totale de 4 422 800 m² à Rimatara.    Organisation de formations destinées aux professionnels du secteur primaire   L’année dernière, la Chambre de l’agriculture et de la pêche lagonaire (CAPL) a organisé dans les cinq archipels de la Polynésie le séminaire « vers une amélioration de l’efficacité du mouvement participatif », lequel a permis d’identifier les besoins en matière de formation des professionnels. Plusieurs thématiques de formation ont été retenues comme prioritaires par les agriculteurs. La CAPL a mis en place la première session de formations au quatrième trimestre de cette année, en sélectionnant deux thématiques par archipel qui seront dispensées  dans les trois îles comptabilisant le plus d’agriculteurs et pêcheurs lagonaires inscrits au registre de l’agriculture et de la pêche lagonaire. Dispensée à titre onéreux sur la base des tarifs fixés par la chambre, chaque session accueille 12 stagiaires. Les tarifs appliqués sont de l’ordre de 2000 Fcfp pour les titulaires de carte professionnelle et de 10.000 Fcfp pour les non titulaires de carte professionnelle. La durée de chaque formation sera de 24 heures, étalée sur 3 à 4 jours.   Formations à la transformation Les formations porteront sur la transformation des fruits et légumes, des produits de la pêche et de la cocoteraie. Les participants découvriront de nouvelles possibilités pour transformer et valoriser leurs produits. (Inscription auprès de Food&CookLab)   Île Dates Transformation des fruits et légumes Rurutu 28, 29 et 30 Octobre Tahaa 05, 06 et 7 Novembre Tubuai 05, 06 et 07 Novembre Raiatea 08, 09 et 11 Novembre Huahine 13, 14 et 15 Novembre Ua Pou 18, 19 et 20 Novembre Rimatara 19, 20 et 21 Novembre Nuku Hiva 03, 04 et 05 Décembre Hiva Oa 06 ap-m, 07, 09 et 10 mat Décembre     Transformation des produits de la pêche Fakarava 02, 04 et 05 Novembre Rangiroa 07, 08 et 09 Novembre Kaukura 02, 03 et 04 Décembre     Transformation des produits issus du cocotier Kaukura 28, 29 et 30 Novembre Rangiroa 09, 10 et 11 Décembre Fakarava 12, 13 et 14 Décembre   Formations à la gestion de l’exploitation et de groupement agricole    Les formations portent sur les outils pour améliorer la gestion de son exploitation, et assurer un fonctionnement efficace d’un groupement agricole. (Inscription auprès du CFPA de Opunohu - Moorea)     Île Dates Tahaa 28 au 31 Octobre Raiatea 4 au 7 Novembre Hiva Oa du 25 au 29 Novembre Ua Pou 2 au 6 Décembre Nuku Hiva 9 au 13 Décembre                 Formations à l’agriculture biologique   Les formations portent sur l’agriculture biologique, les techniques et les démarches pour devenir agriculteurs bio. (Inscription auprès du CFPA de Opunohu - Moorea)     Île Dates Rimatara 25 au 28 Novembre Rurutu 2 au 6 Décembre Tubuai 9 au 13 Décembre       Complément à la liste des produits utilisés en agriculture biologique exonérés de droits et taxes à l’importation   La volonté du gouvernement est de développer et de promouvoir l’agriculture biologique pour assurer à la population une alimentation plus saine et de qualité. En complément des aides financières consenties aux agriculteurs engagés dans une démarche d’agriculture biologique, le Conseil des ministres a souhaité exonérer de droits et taxes à l’importation certains produits utilisables dans ce mode de production Bio. La liste des produits importés utilisés en agriculture biologique a ainsi été complétée par de nouveaux insecticides et herbicides composés d’extraits de végétaux afin d’inciter le remplacement de pesticides chimiques par d’autres, moins nocifs à la fois pour l’utilisateur et l’environnement. Près d’une vingtaine de catégories de produits biologiques (semences, engrais, pesticides, insecticides, herbicides, matériels…) proposés dans les commerces sont d’ores et déjà exonérés de droits et taxes à l’importation, afin d’en baisser le coût d’achat pour les agriculteurs.   Convention avec l’Institut national de l’origine et de la qualité (INAO)   La Polynésie française possède des produits du terroirs et des savoir-faire uniques qu’il faut valoriser et protéger. Des logos ajoutés sur l’emballage aident le consommateur à identifier ces produits originaux ou de qualité. Un projet de loi du Pays est en cours d’adoption, visant à instaurer en Polynésie française, pour les produits agricoles, forestiers, de l’artisanat traditionnel ou alimentaires et les produits de la mer, trois signes d’identification de la qualité et de l’origine, appellation d’origine, indication géographique, et label qualité supérieure » équivalent du  « label rouge » en métropole par exemple. Au titre du soutien de l’Etat pour le développement de l’agriculture en Polynésie française, des discussions ont été engagées avec l’Institut national de l’origine et de la qualité (INAO) afin d’arrêter les principes d’une collaboration avec les services techniques du ministère de l’Economie verte. En ce sens, le Conseil des ministres a approuvé un projet de convention-cadre fixant 4 axes prioritaires d’intervention : Conseil juridique sur la démarche « signe de qualité » menée par la Polynésie française Veille juridique sur les marchés extérieurs à la Polynésie française, des produits disposant de signes de qualité officialisés  (le seul produit concerné actuellement est le monoï de Tahiti) Expertise et proposition d’actualisation du signe de qualité « appellation d’origine » existant pour le monoï de Tahiti Appui à la création de « signes de qualité » de type AOP/IGP sur les filières Vanille de Tahiti (AOP), Rhum (IGP) et autres filières à fort potentiel, tel que notre huile de coco vierge, le miel ou encore le tamanu.     Noël des solidarités le 7 décembre dans les Jardins de Paofai   Sur proposition du ministre de la Famille et des Solidarités, en charge de l’égalité des chances, la Direction des solidarités, de la famille et de l’égalité (DSFE) organisera en décembre prochain, le « Noël des solidarités ». Cet événement sera ouvert à tous, dans les jardins de Paofai, le samedi 7 décembre, de 12h30 à 17h30.   En 2017 l’évènement a rassemblé près de 750 enfants placés en foyers et familles d’accueil et, en 2018, ce sont plus de 1500 enfants qui ont répondu présents pour ce rassemblement.La DSFE réitère donc cette année l’opération Noël des Solidarités, sous la thématique du développement durable et de l’éducation au respect de notre fenua. Les enfants seront accompagnés par leurs familles ou des accompagnateurs (accueillant familial agréé, encadrant institutionnel, familles d’accueil tiers, feti’i). Des activités adaptées seront proposées par tranche d’âge. Pour les 0 à 6 ans : manèges, ateliers de maquillage, ateliers créatifs, jeux de pêche aux canards, jeux de balles, ateliers créatifs, bouée gonflable, cible de football géante, bubble foot sur l’espace du « beach soccer », pouponnière. Pour les 7 à 12 ans : ateliers de maquillage, atelier de tawashi, ateliers créatifs, stand de « ‘aumoa », jeu de piste, activités de sensibilisation sur la préservation de l’environnement, tatouage pailleté éphémère, stand d’onglerie. Pour les 13 à 21 ans : stand de boxe anglaise, d’escrime, de boxe thai « vahine », d’onglerie, de MMA, de ju jit su, de slackline, de fitness et de parcours du combattant proposé et animé par le RSMA. De plus, une animation continue sera programmée sur la scène centrale. Il y sera présenté des tours de magie, de clown, de chant, des prestations de danse hip-hop/jazz, avec l’orchestre du Conservatoire artistique de Polynésie française et un groupe de musique. L’organisation de cette manifestation est possible grâce à la mobilisation d’un grand nombre d’acteurs de la société polynésienne, tant du secteur privé que de la société civile.   Présentation du plan pour la paix  « Nuna’a Ma’ohi ‘Aihau, Polynésiens artisans de paix » La ministre de la Famille et des solidarités a présenté en Conseil des ministres le plan pour la paix baptisé « Nuna’a Mao’hi ‘Aihau, Polynésiens artisans de paix ». Le but est de remettre au cœur de la société des valeurs telles que la dignité, la famille, la qualité des relations humaines et du cadre de vie, l’équité et la paix. Pour atteindre cet objectif, le plan « Nuna’a Mao’hi ‘Aihau, Polynésiens artisans de paix » se déploie selon les orientations stratégiques suivantes : Un plan d’urgence sociale pour la dignité de tous. Il s’agit d’actions visant à répondre aux besoins urgents des personnes en situation de vulnérabilité afin de leur permettre, par un accompagnement adapté, de prendre ou reprendre leur vie en main et apporter, eux aussi, leur contribution active et personnelle à la vie de la société. Un plan de développement humain pour déployer le plein potentiel de chaque vie humaine et ancrer les racines du peuple polynésien dans ses valeurs et son identité. Des besoins de repères se font durement sentir dans l’éducation des enfants et dans la construction confiante de l’avenir des jeunes avec un besoin urgent d’équité et de solidarité pour les personnes discriminées. Ce plan sera mis en place par une importante campagne de communication et de formation et par des événements porteurs. Un plan pour l’égalité des chances afin de lutter contre toute discrimination, parce que l’égalité des chances qui progresse peu à peu a besoin d’être promue avec force pour être effective partout et tout le temps. Trop de personnes souffrent encore de discriminations les empêchant de prendre la place qui leur revient au sein de la société. Un plan de bonne collaboration avec les acteurs sociaux dont l’objectif est de recentrer leurs tâches vers leur cœur de métier, le suivi et l’accompagnement des familles dans leur diversité. Cet axe implique une réorganisation, une optimisation de la formation des professionnels et un développement des partenariats.  Agir en interministérialité pour une mise en œuvre optimale des politiques publiques. L’importance de la collaboration entre les ministères et entre les services est réaffirmée pour répondre de façon la plus adéquate et la plus complète possible aux besoins des Polynésiens. Cette feuille de route comporte plusieurs actions qui demandent l’intervention conjuguée des compétences respectives de différentes entités. Tahiti-Infos, le site N°1 de l'information à Tahiti
          

Comment on Code Pink sells out women and exploits Jews on propaganda tour of terrorist state of Iran by Red Pilled Piper

 Cache   
It's interesting that this article fails to mention the fact that Cold Pink was founded by the Jew, Medea Benjamin, who describes herself as a "nice Jewish girl". It also fails to mention that the three women highlighted in the article (i.e. Ariel Gold, Amber Gilewski, and Beth Harris) are all Jewish as well. The real problem with Code Pink is that they're just another typical leftist/Jewish run and dominated organization that is anti-white, feminist and filled with social justice warriors. On their website, they even highly recommend that every activist read "White Privilege: Unpacking the Invisible Knapsack". They also work with several other Jewish organizations too, like the ACLU, Jewish Voice for Peace, etc.... Zionist Jews, may not like them because of their stance toward the Palestinians, involvement with the BDS movement, not wanting a war with Iran, being friendly with Muslims, etc..., but to a paleoconservative white person, they are just one more reason to be anti-Semitic. I personally don't view them any differently, than say, the ADL or the SPLC, because these organizations all have two things in common: (1) they're Jewish (2) they're anti-white. And that, is the only thing that matters to this white paleoconservative male!
          

2.37 Gianni Vattimo

 Cache   
Gianni Vattimo (Turin, 1936) has developed his philosophy in opposition to those who think they can say “how things stand”. Whoever thinks this will sooner or later become a dictator, because he will tend to impose his idea on others; he is one who has an interest in mastering ideas first, and then, even unwittingly, men. At this point, however, Vattimo found himself in a difficulty: to oppose those who want to say “how things stand”, we must propose an alternative; but the alternative may in turn be accused of wanting to establish “how things stand”, albeit proposing a different view. How to get out of this situation? He gets out of it by calling his thought “weak”, which is equivalent to “relative”; it is a thought that is not stable, certain and sure, but instead it recognizes itself dependent on the past, the present, the complex of situations in which we find ourselves living today. In this sense his philosophy is above all negative, that is to say demolishing and therefore similar to that of Nietzsche; Vattimo, however, unlike Niezsche, recognizes that it is not possible to propose alternatives without relying, in some way, on what we want to oppose; as to say that it is not possible to show that a castle has fallen without using the stones that kept it standing; it is not possible to create a left party without exploiting tools provided by the right; it is not possible to oppose any enemy without exploiting, at least minimally, something that he himself gives us; we cannot fight evil without using tools provided precisely by evil and therefore, by themselves, at the outset created for evil; it is not possible to study the past without exploiting words and ideas provided by it; we can’t live in this world without getting dirty; what we can do is only trying to calibrate the inevitable compromises and trying to direct them towards goals that seem better to us. Vattimo’s thought, as he himself states, is a hermeneutics, that is, a way of interpreting the world; indeed he, on the lines of Heidegger and Gadamer, maintains that it is not possible to know what the world is, neither if it exists nor what to exist means; what we are able to do is only handling our interpretations, trafficing them, comparing them. Umberto Eco (1932 - 2016) argued in practice that however, this way, a lot of serious work done by serious people is questioned; to put it simply: it makes no sense to say that the work of a doctor is worthless because we don’t know if the patient exists. Therefore, according to Eco, we need to maintain a value to the sense of being, of existence, so that our work and thinking retains its value; Eco would say to Vattimo: if nothing exists, what is the value of thinking, albeit in a “weak” way? Vattimo would answer that we can think the same, just being humble. This is what every scientist does: he humbly studies what he thinks he can study, without pretending to be the last person to establish how certain things are. Developing the line of Vattimo, I personally think that being is weak because it is becoming, it is a being that “walks” and therefore does not have the power to preserve a strong identity, as the words with which we indicate things would suggest us to think, so deceiving us. This idea of ​​dynamism of things corresponds to that which we first encountered in Heraclitus and which more recently is found in Whitehead (1861-1947). From this point of view, the humility of the scientist is due to the awareness that both he and his object of study are part of the same world that is becoming. Then, if we don’t want to fall into the trap of turning ourselves into dictators, when we are tempted to say “how things stand”, it is enough to learn to think that things do not “stand”, but “become” and therefore the only thing we can try to say is how they transform, how they are progressing, how they are going, and not “how they are” or “what they are”. Here, however, Vattimo’s warning is important: it is impossible to eliminate the verb “to be” from our language (and so many other words having a “static” meaning), and therefore we must have the patience to use it anyway, as we are forced to use the stones of the fallen castle, because there are no other ones. Our thinking must then be a provisional synthesis, which needs to be updated day by day, collects the past and the present, makes every effort to welcome confrontation, self-criticism and seeks to move towards a future that we currently consider better. Therefore, it will also be first a self-formative thinking, an organization of projects that must always be reviewed, with the subsequent courage to assume human responsibility to make choices in the present and translate them into concrete behaviors, that should be able to say something to the world and to nature, as they appear us today.
          

ByT_TR19/746 - Ingénieur réseau / IP

 Cache   
Filière Métier : TELECOMMUNICATIONS
Contrat : CDI
Description du poste :
La Direction Technique a pour rôle est de concevoir, mettre en oeuvre et faire évoluer le réseau en répondant aux exigences de service à travers la mise en place de solutions techniques, innovantes et évolutives. Au sein du Département Transport et IP de la Direction Technique et rattaché au groupe Conception Ingenierie Entreprise, vous êtes responsable de la conception des solutions techniques pour les clients de la Business Unit Wholesale, qui délivre des service aux opérateurs .Vous assurez le design et la validation de solutions techniques pour mettre les nouvelles offres au catalogue, définissez les designs des projets clients et mettez à jour et développez les méthodes de provisionning, et de mise en exploitation. Vous participez aux réunions techniques avec les clients internes ou externes, et apportez le support technique à la business unit. Vous gérez les évolutions techniques des solutions présentes au catalogue Bouygues Telecom .Dans ce cadre : - vous êtes garant(e) du bon fonctionnement des solutions techniques proposées aux clients - vous participez aux réponses faites aux clients (Appel d'offre, Offre sur Mesure) - vous assurez l'évolution du catalogue de solutions en collaboration avec le marketing de la Direction Wholesale - vous êtes le référent technique bout-en-bout sur les projets clients auxquels vous participez - vous êtes en relation avec les différents entités internes ( direction commerciale et marketing - déploiement – exploitation )

Vous avez un sens du relationnel très développé et une facilité à travailler en transverse pour parler à la fois aux équipes du commerce, du marketing, des opérations réseaux , de l'ingénierie ou de l'exploitation. Vous avez une bonne connaissance du marché du Wholesale, de ces besoins , de son écosystème et de ses spécificités techniques Vous justifiez d'une expérience sur le réseau IP opérateur, et maitrisez l'essemble des protocoles de niveaux 2 et 3 utilisés sur les réseaux WAN
Ville : 13 AVENUE DU MARECHAL JUIN 92360 MEUDON

          

ByT_TR19/950 - TECHNICIEN DE MAINTENANCE EXPLOITATION

 Cache   
Filière Métier : TELECOMMUNICATIONS
Contrat : CDD
Description du poste :
A votre tour, rejoignez Bouygues Telecom pour participer au déploiement et à l' exploitation de son réseau de téléphonie mobile. Au sein de la Direction Réseau , vous rejoignez la structure exploitation qui assure la maintenance physique, préventive, curative et évolutive des équipements télécoms et infrastructures de sites du réseau, 24h/24 et 7j/7

De formation BAC +2 ou justifiant d'une expérience équivalente, vous êtes d'un esprit ouvert et constructif. Vous faites preuve au quotidien de rigueur, d'autonomie et êtes familier avec le travail en équipe. Vos missions principales consistent en l'analyse et la résolution de pannes détectés sur les équipements du réseau en relation avec notre centre de supervision et dans le respect des rè gles de sécurité. Vous participez également aux opérations d'extension et de contrôle du réseau en production. Le travail en extérieur, les déplacements et le travail en hauteur sont des composantes quotidiennes. Pour mener à bien vos missions, la prise d'initiative, l'esprit de solidarité et le partage des informations terrain sont nécessaires pour le bon fonctionnement de l'équipe. Le poste est basé sur la région Toulousaine et est soumis à un régime d'astreinte
Ville : 7, impasse Gaston Monnerville 31200 TOULOUSE

          

ByT_TR19/956 - Responsable de Secteur Exploitation H/F

 Cache   
Filière Métier : TELECOMMUNICATIONS
Contrat : CDI
Description du poste :
A votre tour, rejoignez Bouygues Telecom pour participer au déploiement et à l'exploitation de son réseau de téléphonie mobile et fixe. Au sein de la Direction Réseau, vous rejoignez la structure Exploitation de la région Sud-Ouest. Vous avez la responsabilité de deux équipes de techniciens de maintenance. Ces équipes assurent la maintenance curative, évolutive et préventive des équipements Radio, Transmission Haut Débit, Fixe et Lora du réseau Bouygues Télécom Sud Ouest. Vous pilotez, organisez, motivez et faîtes évoluer l'activité dans une optique permanente de satisfaction du client et d'amélioration du service et de la productivité de l'équipe.

De formation ingénieur ou justifiant d'une expérience équivalente, vous êtes d' un esprit ouvert et constructif. Vous savez justifier d'une expérience managériale d'au moins 5 ans. Vous faites preuve au quotidien de rigueur, d'autonomie et êtes familier avec le management à distance.Vous encouragez la culture co llaborative au sein de vos équipes en favorisant la responsabilisation au plus près du terrain. La créativité est l'un de vos stimulants qui contribuera à l'a mélioration continue des méthodes et outils de l'exploitation Bouygues Télécom Le poste est basé sur Bordeaux et est soumis à un régime d'astreinte. Vous vou s déplacez très régulièrement sur le terrain.
Ville : 25, av. Victor Hugo 33708 MERIGNAC CEDEX

          

ByC_Ingénieur travaux ((BYESARA/CDE)-16166 - Ingénieur travaux principal H/F

 Cache   
Filière Métier : TRAVAUX
Contrat : CDI
Description du poste :
Au quotidien, Bouygues Energies & Services, conçoit, installe, entretient et exploite des systèmes techniques et des services sur mesure dans plus de 30 pays. Ces services permettent aux clients de conjuguer maîtrise de leur consommation d'énergie et qualité du cadre de vie et de travail pour leurs usagers. Présent partout où l'aménagement des territoires, le cadre urbain, le cadre de travail et de vie se transforment, Bouygues Energies & Services offre à ses clients et leurs usagers une vie plus simple, confortable, économique et responsable.  Bouygues Energies & Services s'engage en faveur de la diversité et est ouvert à tous les talents. Nous encourageons toute personne possédant les compétences mentionnées dans le descriptif de l'annonce à soumettre sa candidature. Si des aménagements de poste sont nécessaires, ils seront évoqués lors de l'entretien de recrutement. Bouygues Energies & Services recherche un Ingénieur Travaux Principal en charge de l’activité HTB/HTA et Postes HTA/BT : Pour cela vous devrez : Manager une équipe de production de 6 à 10 personnes. Prospecter et effectuer le suivi commercial Effectuer la gestion des chantiers (finances, suivi de production…) Réaliser le chiffrage et études en lien avec le bureau d’études Dans le cadre de vos missions, vous serez en permanence en lien avec des interlocuteurs internes (Chef de centres, fonctions supports, autre filiales) et externes (Clients, fournisseurs, sous-traitants) afin d’assurer le bon déroulement de l’opération. Enfin, des déplacements sur la Zone Est sont à prévoir.

Vous êtes issu(e) d’un BAC + 5 en Electrotechnique et vous justifiez d’une expérience réussie dans ce domaine. Vous avez idéalement à jour vos habilitations électriques. Organisé(e), volontaire et rigoureux(se), vous êtes reconnu(e) pour vos qualités relationnelles.  Alors transmettez-nous votre candidature! Tournés vers nos collaborateurs et engagés, nous vous accompagnerons dans le développement de vos talents afin de vous amener à grandir et à évoluer avec nous.
Ville : MONTMELLIAN

          

The Common Law History of Section 230 with Brent Skorup (Ep. 208)

 Cache   

 

The Common Law History of Section 230 with Brent Skorup (Ep. 208)

 

Bio

Brent Skorup (@bskorup) is a senior research fellow at the Mercatus Center at George Mason University. His research areas include transportation technology, telecommunications, aviation, and wireless policy.

He serves on the FCC’s Broadband Deployment Advisory Committee and on the Texas DOT’s Connected and Autonomous Vehicle Task Force. He is also a member of the Federalist Society’s Regulatory Transparency Project.

The White House, the FCC, the Pennsylvania Supreme Court, and a dissenting opinion at the Illinois Supreme Court have cited his research. In addition to economics and law journal publication, he has authored pieces for National Affairs, Reuters, The Wall Street Journal, The New York Times, Wired, Air Traffic Management magazine, Regulation magazine, and elsewhere. He’s appeared as a TV and radio interview guest for news outlets like C-SPAN, NPR, CBS News, ABC News, and CNBC Asia.

Brent has a BA in economics from Wheaton College and a law degree from the George Mason University School of Law, where he was articles editor for the Civil Rights Law Journal. He was a legal clerk at the FCC’s Wireless Telecommunications Bureau and at the Energy and Commerce Committee in the U.S. House of Representatives. Before joining Mercatus, he was the Director of Research at the Information Economy Project, a law and economics university research center.

Resources

 

Mercatus Center

 

The Erosion of Publisher Liability in American Law by Brent Skorup and Jennifer Huddleston (Mercatus Center, 2019)

 

News Roundup

 

Zuckerberg, Facebook under mounting pressure over political ads

 

Facebook CEO Mark Zuckerberg is set to meet with civil rights leaders this week after his company has maintained its policy to leave up political ads containing false statements by politicians. The company has applied the policy unevenly, first allowing Donald Trump to maliciously post an ad with false information about Joe Biden; then leaving up an Elizabeth Warren ad containing false information designed to illustrate the absurdity of Facebook’s ad policy.  During a hearing, Zuckerberg also admitted to Representative Alexandria Ocasio-Cortez that if she were to place a false political ad, that the company would probably leave it up. 

 

But Facebook is inexplicably removing false ads placed by Political  Action Committees. One notable example is an ad placed the Really Online Lefty League – ROLL – a Political Action Committee co-founded by Adriel Hampton – which falsely claimed that Lindsey Graham supports the New Green Deal. Hampton, an experienced marketing and political strategist, responded by filing to run for governor of California. Then gubernatorial candidate Hampton posted a false political ad and Facebook took it down, saying his campaign wasn’t legit—that it was just a ploy to place a false ad to see what Facebook would do. Even though Hampton says he fully expects to win the governorship, Facebook hasn’t reinstated the ad.

 

It’s a mess.

 

Top officials from the NAACP, National Urban League, and the Leadership Conference on Civil Rights are scheduled to meet with Zuckerberg this week to express their concerns with Facebook’s political ad policy, which the company now says has been extended to the UK.

 

Facebook sued for age, gender bias in financial services ads

 

A plaintiff in San Francisco filed a potential class action federal lawsuit last week claiming that Facebook discriminates against users based on age and gender in determining who can see financial services ads.  The lawsuit comes 7-months after Facebook agreed to tailor its platform to avoid discrimination on the basis of age, gender and zip code for job, credit, and housing ads.

 

US launches Tik Tok investigation

 

The Committee on Foreign Investment in the United States (CFIUS) has launched a national security investigation into Tik Tok, which is owned by the Chinese firm Bytedance. A bipartisan cohort of lawmakers including Democrat Chuck Schumer, Republican Marco Rubio, and Tennessee Democratic Congressman Bart Gordon have all expressed concern about how the Chinese government uses TikTok’s data. TikTok’s growth has been outpacing the growth of incumbent social media companies in the U.S.

 

 

Snowden: Facebook as untrustworthy as the NSA

 

Whistleblower Edward Snowden, who is exiled in Russia for blowing the lid off the National Security Agency’s mass data collection practices six years ago, told ReCode’s Kara Swisher last week that Facebook is as untrustworthy as the NSA when it comes to privacy. But he didn’t limit his remarks to Facebook. He said that all tech companies are looking to exploit our personal data no matter the consequences. He also said that, on the surface, users may appear not to be concerned about how big tech companies handle their data but that, in reality, users are very concerned but feel powerless.

 

Five people shot and killed at Airbnb rental

 

Five people were shot and killed at an Airbnb rental Northern California during a Halloween party on Thursday. The rental listing on Airbnb prohibited parties and the renter claimed it was renting the space for family members who were suffering from smoke inhalation from the fires in the Los Angeles area. A witness reported to Buzzfeed that the shooting occurred with apparently no provocation. Airbnb has banned the renter from the platform.

 

China launches 5G network

 

Chinese officials announced last week that it would roll out 5G to Beijing, Shanghai, Guangzhou, and Hangzhou 2 months ahead of schedule. The country also announced plans to roll out 5G to over 50 cities by the end of this year. While U.S. telecom companies have begun their 5G roll-out, it’s largely been rolled out on higher frequency bands than the 5G service that’s being rolled out in China. The lower frequency bands that China’s using cover a larger surface area, while the higher frequency bands U.S. companies are using are more powerful but cover less ground.

 

Corey Booker introduces bill to ban facial recognition in public housing

 

Senator Corey Booker has introduced a bill to ban facial recognition in public housing. The Senator cites the disproportionate impact that facial recognition technology threatens to have on the nation’s most vulnerable communities. The No Biometric Barriers to Housing Act targets public housing that receives funding from the Department of Housing and Urban Development.

 

Apple pledges $2.5 billion for California affordable housing

 

Apple announced that it will invest $2.5 billion to address California’s affordable housing shortage. Some of those funds will be applied statewide. Others will be allocated for projects in the Bay Area. Three hundred million dollars will go towards affordable housing on Apple-owned property.

 

Following Katie Hill’s resignation, Democrats push for revenge porn law

 

Thirty-five democrats in Congress sent a letter to the House Judiciary Committee to pass a federal revenge porn law that would criminalize the nonconsensual posting of sexually explicit images online. The letter followed Congresswoman Katie Hill’s resignation from Congress after someone posted nude images depicting her and others as well as accusations that she was having inappropriate relations with campaign and congressional staffers. Hill blames her husband, whom she is in the process of divorcing, for posting the photos.

 

 

MIT president acknowledges discrimination against minorities and women on campus

 

Finally, Massachusetts Institute of Technology president Rafael Reif acknowledged last week that women and people of color often face exclusion and belittlement on campus and that it’s something the university is trying to improve. The development follows revelations of Jeffrey Epstein’s ties to the university.


          

When demand is down

 Cache   

When the economy recedes, there is a temptation to cut back on any activities that appear superfluous although in any business there should really not be any, unless they are intentionally provided to buffer the business constraint. I guess it becomes evident that when business is bad, the constraint is deemed to be in the market. That being the case, it makes strategic sense to subordinate other activities to that constraint by elevating the resource loading in marketing and sales.

Such subordination could include training up other line persons in the organization to find a supporting role in sales. Sales training should be an existing function in any organisation so the sales team could be extended to include these resources.

What about marketing, which is strictly the identification of opportunities, where sales is the exploitation of them? It is often said that everyone should be a sales person for one’s employer. Involving the rest of the team in the marketing and sales strategy can generate a lot of unexpected new options and get the spirit and drive going across the organisation.

A recent global survey, which included SA, revealed that in these slack economic times, the number of employees actively searching for a new job increases noticeably. In the case of sample SA, the results showed that more than 4 in 10 employees were seeking new positions, and our statistics indicate that this is higher than the global average by some 16%. The quarterly shift is particularly evident.

The expectation (following the big strikes and the commodity price collapse) for retrenchments in the industries affected by mining investments has been borne out dramatically. The impact on the value chain from capital investment in new mines all the way through EPCM, EPC, Consulting Engineers, main contractors, suppliers to the small business providing nuts and bolts, is a harsh reality. It becomes even more stark when we realise that SA was effectively built and developed on mining for the last 100 years.  Thus the need for radical strategy shift is urgent. A big, new marketing and sales challenge.

Essential to this is the need to define, locate and employ the human capital to operate the business. All business is doing it, but not well. My own research with many industries over some years on identifying the constraint in the business shows that there is an overwhelming belief that it exists in the lack of having the right people in the right place at the right time. This is almost a no-brainer. In my own, and in the opinion of many in the industry, is that the current process of recruitment is flawed and has been usurped by the role of HR. HR should focus and interact on the internal resources and keep them happy or at least find out what makes them tick. That might then reduce the frequency of the look-elsewhere-and-lose-staff syndrome. Recruitment is a different process requiring different skills, tools, databases, market knowledge and expertise, especially in engineering.

Until management addresses the human resource constraint with processes that protect and elevate the constraint, things will not change. It should be seen as a strategic issue at board level. It will simply be more of the same. Delays, lack of knowledge within the recruitment process, poor selection in terms of environmental/cultural fit into the organization will continue. In the days when the line spoke directly to the recruiter that understood their business, appointments were faster, better and more permanent. At least in engineering. I know, I have been on both sides. However, too much emphasis is placed on finding the perfect fit at below market value, and too little on the need for induction and mentoring in the new role. The metrics of selection are outdated and mostly inaccurate. A good start is so often messed up with poor internal conflict and dubious management skills. Hence the high turnover rate.

We are finding that matching by functional auditing is breaking the mold and needs to be seriously considered by management.


          

SAIMechE’s suggested contribution to solutions for the scarce skills challenge

 Cache   

At the recent workshop held by the Department of Higher Education (DHET), the President’s Infrastructure Coordination Committee (PICC) and the Council for the Built Environment (CBE), the objective was to assess the status of the scarce skills in South Africa by assembling Occupational Teams (OTs) that would be assembled largely from the voluntary engineering organizations and academia. Two days were spent following the earlier work done by the PICC/DHET/CBE team to prepare a list of what was determined by the 18 Strategic Infrastructure Projects (SIPs) to be the scare skills for this programme. This list covered the management, professional and trades identified as such by the Organising Framework for Occupations (OFO) model.

The 18 SIPs are identified at a very high level, for example SIP1 being "Unlocking the Northern mineral belt with the Waterberg as the catalyst”. For what was alleged to be "security” reasons, not much else is published on this SIP to expand on the detail, but it can be reliably gathered that a large component will be for coal mining development to take up the supply that is dwindling in the Witbank/Middelburg area.

The projected list of scarce skills, when reviewed on the basis that it should enable some effective action to commence, is in my view a rather useless piece of data insofar as the Mechanical Engineers are concerned. It simply shows "about 500” needed at a scarcity level of "20-50%” whatever that may convey.

The SAIMechE team filled in their answers to the OT list on the wide spectrum of questions and these will then presumably be assembled and evaluated for action with all the others. Most of the questions we have been addressing for years that seem to do no more than lead to the next conference or workshop. One simply comes away with the feeling of perpetual talk and no perceived action.

The first concern the team had was that the workshop called for voluntary conveners to fill variety of time consuming roles, and this just seemed to illustrate a poor business model. Here we have the National Development Programme (NDP) with its first 18 projects worth hundreds of billions of Rand in total installed value (TIV) that has no funds to pay for a properly structured resource development team that would comprise a fraction of a percent of the TIV cost. It simply illustrates the importance given to this role in the success of the programme. There is no contracted leverage with voluntary teams.

The SAIMechE team made three constructive, actionable suggestions. Firstly, establish a top level professional resources team who would be paid to get the scarce skills issue measured and solutions developed, and which would be in a position to advise the SIPs owner’s teams on the appropriate resources required at owner’s level that could be seconded from the profession in a similar way that the accounting profession does for state bodies.

Secondly, develop a model for evaluating availability of scarce skills to identify the scarce resource with the relevant, engineering specific attributes. It is based on the Engineer’s credo that you do not know much about anything until you can define and measure it. Scarcity needs to have two references to be measureable: what you have and what you need. Accordingly SAIMechE could offer to facilitate working with professional engineering resource recruiting bodies to create a large and well configured, best-in-class, dynamic database of engineering resources for these and other South African projects. By simply stating that we need a number of Mechanical Engineers does not resolve the issue. The only time the real scarcity is known is when the employer specifies the need at granular level of definition. For example one can search on Mechanical Engineers and get hundreds, but then ask for those with the specifics such as 10 years of coal plant processing experience or conveyor and coal chute design, one may be lucky to find a few if any under today’s dwindling expertise that largely exists in near retirement age groups or who may have emigrated.

Thirdly, with this information and working with the employers undertaking the projects and who issue the job specifications with these details, we can identify those who should be taking on the Candidate Engineers that wish to do their training under the SAIMechE Professional Development Programme. SAIMechE would be the paid conduit to provide information on scarce skills to the PICC or the CBE on an on-going basis enabled by the dynamics of the model. We need to ensure that the expectation of perpetual voluntary work by professionals is not presumed. It’s a business reality to pay for value. It would it addition be of value to be able to second experts from the Membership, exploiting the immense, collective intellectual capital of the Institution and effectively meeting the essence of the mission statement.



          

Our World after the World Cup (Aug 2010)

 Cache   

My greatest hope is that the evident, positive and extraordinary atmosphere, energy charge and positive outlook that have emerged as a result of the way we staged the World Cup will serve to enable us to believe in ourselves and our abilities to reach the best standards for SA. Every citizen, and in our case, every engineering resource, has the opportunity and an obligation do something to get a new show on the road. We simply must not fall into a state of post-party hangover or depression, or back to business as usual.

I am personally tired of observing and commenting on so much of our past failures in this leader column. How many of them are actually easily enabled to be turned around and developed for the benefit of SA citizens? If we can project manage the WC with all its first-time challenges, why can't we get the relatively straight forward function of municipal service delivery right? The root cause is clear. Get rid of lousy, incompetent, unqualified, corrupt management; fire the officials who seem incapable of delivering, and are misusing funds. No more paid suspension and jobs for pals. But let's do it. Time to get private power producers going. Time to get the Acts amended that mess our potential to exploit our minerals. Time to get effective engineering training going. Get measures agreed to radically reduce the massive unemployment level. We will go bankrupt at the rate we pay more receivers of social benefits than have jobs. Reducing unemployment is our biggest challenge. Here is a thought, though. It comes from a recent SAIEE Presidential address.

"If one is looking for modern examples of the good old fashioned engineering approach to economic development, one needs to look to the East. When President Hu of China appointed his first cabinet in 2002, every one of them was an Engineer. Perhaps this in part explains China's ongoing extraordinary economic growth and industrialization”.

So, Members, how shall we go for the world cup in transforming a system that has been taking us for a ride for too long? A very positive development has just been announced and which exemplifies the ability of a lot of adversarial parties to get together and formulate a new deal all with a common goal. This is the recent mining commitment plan which followed the Citibank International report that SA sits on the most valuable mineral wealth in the world by far, streaks ahead of Russia and Australia in second and third places. We have R18 Trillion in an un-mined prize waiting for initiative, co-operation, funding, innovation, supporting infrastructure, skills development, employment and all the other benefits of a good, long term plan. Even Malema should be excited. It noticeably seems however to have eluded the government's own planning commission, but we all know how evident that has been.

Power and energy. Big plans now in hand for private power generation, and additionally an exciting development in advanced waste coal carbon combustion technology with almost no carbon footprint. Unless co-generation gets going, then any major mining and industrial initiatives will not have the power due to Eskom's limitations.

Can we catalyse the World Cup energy into ongoing action? It is up to everyone to make it happen. Tourism just has to escalate, which means major options for the service industry. I heard countless comments from foreign visitors at Cape Town's V& A waterfront at the semi-final on a beautiful evening that it must be the best all-round place for a World Cup.

The new SAIMechE website has the functions to enable interaction and debate. Can this connectivity and our a new feeling of optimism improve our collective advance into getting Engineers into the main arena? Sceptics, step aside. Let the game begin.


          

11/6/2019: BINNENLAND: Mortsel en Boechout stellen zich burgerlijke partij tegen luchthaven

 Cache   
De correctionele rechtbank van Antwerpen zal op 25 september 2020 de rechtszaak behandelen die de actiegroep ‘Verlenging Nooit’ heeft aangespannen tegen de ontwikkelaar en exploitant van de luchthaven van Antwerpen, het Vlaamse Gewest en twee Vlaamse...
          

Pregnant Students in Africa Need Your Support, Not Rejection

 Cache   

“Angela,” 20, walks with her son near her home after returning from school in Migori county, western Kenya. She is a Form 4 student at a girls-only school. Angela became pregnant when her trainee teacher offered to pay some of her primary school fees in return for sex. Her father tried to marry her off to suitors after she gave birth, but Angela’s mother fought against this and supported her return to school. She wants to go to college and study nursing.

© 2018 Smita Sharma for Human Rights Watch

In late 2018, Sierra Leone's First Lady, Fatima Bio, opened a national campaign "Hands Off Our Girls."   Her campaign made big promises to reduce child marriages and teenage pregnancies in the country, in part to tackle the spike in teenage pregnancies following widespread rape during the Ebola crisis. Reflecting on this campaign, President Julius Maada Bio stated: "We have wasted a lot of time in restricting the potentials of women and girls."

In light of this important acknowledgment, his government senselessly adheres to a policy that intentionally wastes the potential of many thousands of girls who are expelled from school each year because they are pregnant - which also effects the number of girls who stay in secondary school in the country.

In Sierra Leone, like in Tanzania and many other African countries, one of the most often cited excuses for not letting pregnant girls stay in school is that they will "corrupt" other girls into pregnancy. But isolating and excluding pregnant girls from school will not stop teen pregnancies because "immorality" is not the cause.

These punitive approaches, which in Tanzania and elsewhere have led to harassment and even arrest of pregnant girls, only serve to stigmatize and disempower girls, and to perpetuate gender discrimination. The fact is that many teenage girls are vulnerable to becoming pregnant because of factors such as poverty, violence, exploitation, and lack of knowledge about sexuality. Government officials might be quick to blame some of the most vulnerable girls, but authorities are incredibly slow when it comes to tackling these key factors through smart policies and programs.

The stories of hundreds of girls whom we have interviewed stand in sharp contrast to the dominant narrative by authorities and others in a position of power, such as teachers, education staff, or politicians who condemn them.

When we've asked girls - pregnant or not - what they think about their peers' pregnancies and drop-outs, most have told us that seeing other pregnant girls drop out of school is enough of a deterrent. Girls can often see that their peers have to deal with heavy stigma as a result of pregnancy. Their families reject or insult them. Most struggle to raise a child when they are children themselves.

In Tanzania, we interviewed Sawadee - she chose this pseudonym - who was in the third grade of secondary school when she got pregnant. Her neighbor - an adult man - followed her for a few years. He used to give her small gifts, which she felt she had to accept. At first, she refused to have sex with him, but her friends advised her to accept the money he was offering, as she would be better off. She got pregnant the first time they had sex, when she was only 16. Her parents kicked her out of their home, and she was expelled from school. For years, she dreamed of becoming a nurse - but getting back into education was nearly impossible: Sawadee and her daughter suffered hardship. She could only find very precarious jobs. "When I failed to get money, me and my baby didn't get a meal," she told us. Girls understand that pregnancy could mean the end of their hard-gained efforts to get a secondary or university education. Like Sawadee, they know pregnancy can destroy their ambitions.

But many girls also tell us about the challenges they face at school, and in their communities, which contribute to their vulnerability. Many girls we have spoken with became pregnant because they were raped, sexually exploited in exchange for food, money or grades or coerced into sex by adultsincluding their own teachers, and at a worryingly high rate, by boys their age.

But many also get pregnant following a sexual relationship they consented to with boys - often students or others they know in their communities. The lack of sexual education - or even how to protect themselves - plays a part in this.

Education ministries have a great tool available to act and respond in an empowering way. Age-appropriate comprehensive sexuality education can help students understand sexuality and reproduction and how to protect themselves from pregnancy or sexually transmitted infections. But importantly, this education can help them recognize that they can use their right of consent to decide when to have sexual relationships, and understand that sexual exploitation and abuse are crimes and that no one should subject them to sexual violence. Yet, many African governments refuse to provide comprehensive sexuality education in schools. Where it is provided it is often substandard. Most provide a half-baked and often unscientific version that focuses on the biology of reproduction or a stigmatized approach to adolescent sexuality that does little to protect students.

African governments have a legal obligation to promote girls' rights to education without discrimination. Sierra Leone should immediately lift the ban and not just allow all girls access to education, but support them fully to return to school. The African Union should call on Sierra Leone, Tanzania and all African governments to safeguard all girls' potential, and stop the exclusion of pregnant girls from schools.


          

Finding good and opt for high quality online casinos

 Cache   
Leading gambling establishment listings are barely taken right into notification by those that call themselves skilled players, yet the brand-new players on the block would certainly take it seriously. The info they get to exploit from specific online casino site internet sites would certainly let the brand-new ones around pick the very best ones for Read More
          

Operations Management under Financial Frictions

 Cache   

The main purpose of this dissertation is to study the emerging operations issues under financial frictions, in the contexts of supply chain finance and crowdfunding platform; and to identify the implications for individuals and businesses. In Chapter 1, "A Supply Chain Theory of Factoring and Reverse Factoring", we develop a supply chain theory of factoring (recourse and non-recourse) and reverse factoring showing when these post-shipment financing schemes should be adopted and who really benefits from the adoption. Factoring is a financial arrangement where the supplier sells accounts receivable to the factor against a premium, and receives cash for immediate working capital needs. Reverse factoring takes advantage of the credit rating discrepancy between small supplier and large retailer, and enables supplier's factoring at the retailer's rate. Given the supplier's credit rating and the trade credit term, recourse factoring is preferred when the supplier's cash investment return rate is relatively high; non-recourse factoring is preferred within certain medium range; otherwise, factoring should not be adopted. Both factoring schemes, if adopted, benefit both the supplier and the retailer, and thus the overall supply chain. Further, we find that reverse factoring may not be always preferred by suppliers among other short-term financing options (bank loans, recourse and non-recourse factoring). Retailers should only offer reverse factoring to suppliers with low, but above a threshold, to medium cash investment return rates. The optimally designed reverse factoring program can always increase the retailer's profit, but it may leave the supplier indifferent to his current financing option when followed by aggressive payment extension. Interestingly, our results suggest that it is often preferable for the retailer to extend reverse factoring to certain suppliers without any request for payment extension, and leverage the supplier's willingness to carry extra inventory that increases the overall supply chain efficiency. In Chapter 2, "Crowdfunding under Social Learning and Network Externalities", we investigate how the presence of both social learning and network externalities affects the strategic interaction between a crowdfunding firm and forward-looking consumers. In rewards-based crowdfunding, a firm (campaigner) pre-sells a new product and solicits financial contributions from the crowd (consumers) to cover production costs. When a crowdfunding product with uncertain quality is first introduced, consumers may choose to strategically delay their purchase in anticipation of product quality reviews. Our research yields three main insights. First, we find that in the presence of social learning and strong network externalities, an upward-sloping demand curve may arise. This so-called \textit{Veblen effect} occurs due to the interaction between social learning and strong network externalities. Second, we show that network externalities have important implications for the optimal crowdfunding reward choice. In particular, under strong network externalities, the optimal reward will induce all consumers to either adopt the product early or adopt the product late; whereas under weak network externalities, the consumers will possibly adopt the products in different periods. Third, we characterize the optimal reward strategy under financial constraints and quantify its impact on the optimal reward choice and the induced purchase pattern from consumers. These insights provide useful guidance on how firms can exploit the benefits of crowdfunding. In Chapter 3, "Crowdfunding vs. Bank Financing: Effects of Market Uncertainty and Word-of-Mouth Communication", we investigate a firm's optimal funding choice when launching an innovative product to the market with both market uncertainty and word-of-mouth (WoM) communication. Bank financing is a traditional source of capital for small businesses, whereas crowdfunding has recently emerged as an alternative fund-raising solution to support innovative ideas and entrepreneurial ventures. Conceivably, crowdfunding could potentially replace some of the conventional roles of bank financing, but puzzles linger over when crowdfunding is a better funding choice. We characterize the firm's optimal pricing strategies under the two funding choices (i.e., bank financing and crowdfunding), compare their performances, and investigate the corresponding implications on social welfare. Among other results, we find that the firm's optimal funding choice and pricing strategy depend critically on the market uncertainty, the WoM, and the initial investment requirement. More specifically, the firm would adopt intertemporal pricing under crowdfunding, where the exact format is determined by the WoM and market uncertainty; under bank financing, however, the firm should always charge a fixed price invariant to those parameters. Moreover, market uncertainty has a non-monotonic effect on the optimal funding choice: Bank financing is preferred only when the market uncertainty is within an intermediate range. The impact of initial investment requirement on the choice of funding schemes shares qualitatively a similar trend. Finally, contrary to the conventional wisdom, we find that more active social interactions in crowdfunding, although beneficial to the firm, may hurt consumers and even reduce social welfare.


          

A Molecular Logic of Sensory Coding Revealed by Optical Tagging of Physiologically-Defined Neuronal Types

 Cache   

Neural circuit analysis relies on having molecular markers for specific cell types. However, for a cell type identified only by its circuit function, the process of identifying markers remains a laborious task. Here, we report an approach called photoactivated intersectional physiology sequencing (PIPseq), a technique for tagging cells based on their functional properties and then harvesting them for RNA sequencing. To achieve this, we exploited two coexpressed fluorescent proteins, GCaMP and photoactivatable mCherry (PAmCherry): GCaMP permitted recording neuronal activity by large-scale calcium imaging, and PAmCherry enabled labeling selected neurons by two-photon photoactivation (PA). We also developed infrastructure for accurate and sensitive real-time physiological subtyping, quantitative expression profiling, and efficient methods for post-hoc validation. We leveraged PIPseq to the challenge of mapping receptor-ligand pairings among vomeronasal sensory neurons (VSNs). Among 20 functional cell types revealed by exhaustive light sheet calcium imaging, PIPseq was capable of selecting even rare functional types (∼0.2%) and enriching them by nearly one hundred-fold. It also demonstrated that, just like rare functional types, prevalent types were composed of a single receptor types. Together with in-vivo ectopic expression of vomeronasal receptors, PIPseq identified the complete combinatorial molecular code for a specific set of ligands, and revealed that the primary sequence of a vomeronasal receptor was an unexpectedly strong predictor of functional similarity. As a preliminary further application of PIPseq, we considered the mechanism of sexually-dimorphic neuronal responses in the vomeronasal sensory population. From light sheet calcium imaging, a particular functional cell type was observed only in male mice, but not in female mice. This cell type was strongly responsive to female specific ligands. PIPseq enabled the identification of a vomeronasal receptor gene expressed in this cell type. Interestingly, the expression level of the vomeronasal receptor gene was indifferent between male and female, indicating that the functional dimorphism depends on factors other than total gene expression. To summarize, PIPseq is an efficient and exhaustive approach to discovering the expression profile of cells responsible for particular circuit functions. Using this approach, we shed light on molecular logic of vomeronasal chemosensation and sexually-dimorphic sensory responses.


          

Genomic Signatures of Conflict and Cooperation in Plants and Social Amoebae

 Cache   

Arms races involve bouts of reciprocal co-adaptation to a social environment. We have a strong sense for how arms races drive the evolution of genes in purely antagonistic contexts, such as host-pathogen or predator-prey. In these systems, conflict that produces arms races between two parties results in positive selection – the fixation of adaptive alleles between species – for both parties. However, we do not have an equal sense for how arms races during cooperative enterprises shape genic evolution. If we assume that arms races affect genic evolution similarly regardless of context – antagonistic or cooperative – then we would expect a signature of positive selection as a hallmark of arms races that have occurred between otherwise cooperating parties. This dissertation attempted to test this prediction using two different systems, within-family conflicts in the plant genus Arabidopsis and between-clone conflicts in the social amoeba Dictyostelium discoideum. In Chapter 1, I introduce conflict and cooperation, how arms races drive positive selection, and my study systems in more detail. Because two of my chapters have already been published, they can be found under List of Publications. In Paper I, I used sets of genes predicted by theory to be involved in within-family conflicts over maternal resource allotment to the developing seed. I tested whether these genes exhibited the telltale signature of an arms race as predicted. I found evidence that strongly supports a mother-offspring conflict scenario: genes enriched in the maternal seed coat and endosperm show elevated rates of adaptation relative to the embryo. This supports mother-offspring conflict because, as the intermediate provisioning tissue for the embryo, the endosperm is predicted to be the seed compartment in conflict with the mother plant, not the embryo. Further, I find that genes enriched in nutrient transfer tissues show elevated rates of adaptation relative to those enriched in non-transfer tissues. This further supports a mother-offspring conflict scenario over maternal resource allocation. I rule out other competing hypotheses including selection for smaller seed size in the A. thaliana lineage. In Chapter 2, I continue to focus on within-family conflict over maternal resource allocation in seeds, this time using genes that have parent-of-origin biased expression (imprinting). The kinship theory of imprinting predicts that imprinted genes are in conflict with the mother plant over maternal resource allotment. Given the coincident mother-offspring conflict over maternal resource allocation I found in Paper I, I test whether imprinted genes experience a selection pressure distinct from that. I test the prediction that an arms race between mother plant and imprinted genes has driven positive selection of genes – here imprinted genes only. If test if the signatures I find are significantly greater than that of the background tissues. I find that imprinted genes show higher rates of adaptive evolution than their background tissues. This suggests that the selection pressure on imprinted genes is specific to their imprinting status. Further, my results are consistent with a conflict scenario over maternal resource allocation. In Paper II, I switched systems to the social amoeba D. discoideum to test whether between-individual conflicts during asexual fruiting body development could lead to arms races. Using genes identified by my collaborator, I tested whether genes differentially expressed during chimeric mixing showed evidence of an arms race. We would expect a possible arms race during chimeric mixing in order to suppress cheating, or the disproportionate contribution of one genotype to spore at the expense of the other genotype that goes into sterile stalk. Consistent with an arms race scenario, I found that genes differentially expressed – both up- and down-regulated – during chimeric mixing had higher rates of adaptive evolution when compared to the genomic background. This suggests that these genes may be important in the wild for facultative strategies to prevent exploitation by other genotypes. Overall, these studies examined the effect of conflict in the context of cooperation on genic evolution: is it the same as we see with pure antagonism? This answer is that it appears to be. Not only can we use these kinds of methods to test theory about conflict genes in a robust way, but we can also use these methods to confirm the genes we identify are relevant to our organism in the wild. The latter is especially powerful for organisms like microbes or plants where observing social conflicts is not necessarily as straightforward as in animals. Further, these results suggest a strong role for kin conflict in seed development that has been largely understudied. It is the hope that this dissertation sparks a new set of kin conflict questions for researchers interested in both the proximate and ultimate factors affecting seed development.


          

Siderophore-Dependent Transport Paradigms for Iron Across the Bacterial Cell Envelope in the Human Pathogen Staphylococcus aureus

 Cache   

This work is focused on iron trafficking through ABC transporters in Staphylococcus aureus and combatting the growing antimicrobial resistance crisis by exploiting virulence factors as therapeutic targets. Specifically, the goal was to understand the role of a siderophore-binding lipoprotein FhuD2 in S. aureus iron trafficking. While S. aureus endogenously produces three metallophores for metal sequestration from the host, FhuD2 is thought to scavenge metals from hydroxamate-based xenosiderophores encountered in the host environment. FhuD2 is a critical virulence factor and vaccine candidate (Novartis) for MRSA. Since xenosiderophore scavenging systems are often dispensable, it was hypothesized that FhuD2 must be playing another role to enhance pathogen virulence. Through careful investigations using a fluorescent siderophore probe, this work has revealed a new role for FhuD2 in the S. aureus iron trafficking pathway. FhuD2 does tightly bind hydroxamate xenosiderophores, but it does not immediately use the siderophore as a transport substrate. Instead, the siderophore serves as a cofactor for a newly proposed enzymatic function of FhuD2 in iron trafficking from human holo-transferrin. Using a “turn-off” fluorescent siderophore probe it was shown that the FhuD2 apo-siderophore complex is capable of catalyzing iron extraction from transferrin. The interaction of FhuD2 with transferrin better explains its role as a virulence factor and establishes a new paradigm for iron trafficking in bacteria with broad relevance. This same phenomenon was confirmed another human pathogen, Bacillus subtilis. Structure-activity relationship analysis of siderophores governing cell entry revealed a charge-based preference for whole cell uptake in S. aureus.


          

Solid-State NMR of CO2 Mineralization and NMR Crystallography

 Cache   

The work described in this dissertation has been accomplished by using solid-state nuclear magnetic resonance (SSNMR) spectroscopy to investigate CO2 mineralization and to refine the positions of protons in the crystalline system. The reaction of forsterite (Mg2SiO4) and 13CO2 is presented here, which is measured using in-situ 13C NMR spectroscopy without removing the sample from the reactor. 29Si SSNMR is used to investigate the reaction of forsterite with 13CO2 in the presence of water or NaCl brine as a function of depth in the sample. Additionally, we also show that NMR crystallography can significantly improve structure refinement of hydrogens’ positions in hydrated materials. 13C{1H} rotational-echo double-resonance (REDOR) and 13C chemical shift anisotropy (CSA) tensor values from SSNMR are exploited as the standard in NMR crystallography. The optimized atomic coordinates are validated by comparing DFT prediction to experimental data through 13C{1H} REDOR and 13C CSA tensors. The research presented herein demonstrates that solid-state NMR is a useful tool for studying the CO2 mineralization mechanism and the understanding of the crystalline structure of CO2 mineralization products.


          

The Long-term Causes and Consequences of Conflict: A Micro-level Behavioral Perspective

 Cache   

This dissertation explores the behavioral determinants and legacies of conflict from a socio-psychological perspective. The three papers that compose this dissertation investigate use tools of causal inference to explore, on the one hand, the socialization processes that influence leaders' decision to pursue war-like policies and, on the other hand, the longue durée legacy of wartime violence on preferences, as well as on people's proneness to being swayed by messages of collective threat during conflict. The first paper of the dissertation examines the long-term determinants of interstate conflict by exploring the impact of leader's socialization processes. Based on the soft power theory of international experiences and the impressionable-years socialization hypothesis, I theorize that leaders with the experience of attending a university in a Western democratic country should be less likely than non-Western-educated leaders to initiate militarized interstate disputes. I test this proposition by employing a new dataset, building on Archigos and LEAD, that includes background attributes of more than 900 leaders from 147 non-Western countries between 1947 and 2001. The results support the hypothesis, even when accounting for leader selection, time-variant country and leader-level controls, other leaders' background characteristics, and country and year fixed effects. This finding lends credence to the soft power thesis of institutions on international sojourners, and highlights the value of considering leaders' background and experiences in conflict research. The second paper of the dissertation shifts the focus from the long-term behavioral causes of wartime violence to its consequences. Specifically, this chapter studies the long-term legacies of wartime violence by exploring its impact on civic engagement. My argument is that exposure to wartime violence transforms people's psychological makeup in a way that increases their long-term civic engagement. I test this proposition using evidence from the Vietnam War by exploiting the distance to the arbitrarily drawn border at the seventeenth parallel as an instrument for conflict intensity. The results show that individuals who lived during the war in a province that was heavily affected by the conflict are more likely to be engaged in civic organizations in 2001, 26 years after the end of the conflict. I further find that this effect occurs because war exposure increases people's participatory values, not because of postconflict development. The third chapter of the dissertation investigates the past-present nexus in the reignition of conflicts in divided societies. To begin with, this chapter offers the first estimate of the effect of priming collective/group threat on actual electoral outcomes. This is done through a region-wide field experiment embedded in an organization's leafleting campaign in the 2017 Catalan regional elections in Spain. Unlike most field experiments that randomize at the level of individuals, randomization takes places at the level of the precinct, equivalent to a small village. The cluster randomization allows me to evaluate the effect of the treatment on actual voting behavior and, thus, alleviates concerns related to using self-reported behaviors. The results show that in precincts assigned to receive a group threat prime, the vote share of Catalan pro-secessionist political parties increased by between 1% and 1.7% compared to the no-increase of precincts that received a vote encouragement with either no prime of group threat or no prime at all. Building on research suggesting that historical conflict strongly influences the formation of preferences across generations, I propose a resonance theory of persuasion by which communities more severely affected by historical political violence should be more likely to be influenced by primes of collective/group threat. To test this hypothesis, I combine the field experiment with a novel dataset of local-level historical wartime violence and state repression in Spain based on the geographic location and size of about 2,650 mass graves throughout Spain. In line with the resonance hypothesis, the results show that primes of collective threat are particularly effective in those communities that were more heavily affected by the Spanish Civil War and the ensuing repression, with an increase by between 3.6% and 5.8% in the support for Catalan pro-secessionist parties---compared to the increase of between 1% and 1.7% of precincts with an average exposure to the historical conflict. These findings have far-reaching implications for our understanding of how conflict history combined with rhetoric of group threat enhances secessionist mobilization.


          

Geometric Control of Ensemble Systems

 Cache   

Robust and sensorless manipulation of large populations of dynamical systems is prevalent in numerous research areas of science and engineering. Prominent examples range from excitations of spin ensembles in nuclear magnetic resonance (NMR) spectroscopy and imaging (MRI), and desynchronization of neuron ensembles for the treatment of neurological disorders, to approximate steering of robot swarm under bounded model perturbation. However, investigating fundamental properties of such ensemble systems remains a significant challenge, as it is beyond the scope of classical control theory. In this thesis, we study fundamental control problems associated with ensemble systems, including controllability analysis and control input design. In particular, we introduce the notion of ensemble controllability for parameterized populations of control systems and then focus on the investigation of ensemble controllability for linear and bilinear populations. Specifically, we exploit techniques from functional analysis, differential geometry, Lie theory, and symmetric group theory to establish necessary and sufficient conditions for ensemble controllability of linear and bilinear systems. Furthermore, such controllability analyses also inspire the design of control inputs for ensemble systems. In particular, we present a systematic method to construct optimal selective pulses for spin ensembles in MRI and also devise control laws to create synchronization patterns for noisy oscillatory networks.


          

Toward Improved Understanding of Black and Brown Carbon Radiative Impacts over South Asia

 Cache   

Atmospheric aerosols directly affect the Earth’s radiative budget by absorbing and scattering solar radiation. Carbonaceous aerosols constitute 20-90% of the global aerosol mass burden and are recognized by the Intergovernmental Panel on Climate Change as important drivers of direct radiative forcing (DRF). Aerosol radiative impacts have been implicated in regional atmospheric warming in South Asia: changing Indian monsoon patterns, and accelerating melting of the Himalayan glaciers. There are systematic global discrepancies between estimates of aerosol absorption optical depths derived from observations and those from climate models. Over South Asia, models predict six times lower aerosol absorption than ground-based observations, leading to a low bias in modeled DRF. To resolve this bias, there is a need to (1) account for relevant emission source types, and associated emission rates, and (2) constrain aerosol optical properties: mass absorption cross-sections (MAC), single scattering albedo (SSA) and scattering directionality parameters (asymmetry parameter or upscatter fraction). To that end, two broad classes of light absorbing carbonaceous aerosols need to be separately dealt with: black carbon (BC) and brown carbon (BrC). BC is known to strongly absorb visible solar radiation and its optical properties have been characterized using both direct measurements and optical models. BC aerosols exhibit aggregate morphologies, with fractal dimensions of 1.8 and 2.6 for fresh and aged particles, respectively. As a simplification, current climate models usually approximate BC aerosols as volume-equivalent spheres and use analytical solutions (known as the Lorenz-Mie theory) of Maxwell’s equations for estimating their optical properties. Recent modeling studies employed the numerically-exact superposition transition-matrix method to compute optical cross-sections of fractal aggregates of varying sizes and fractal dimensions. These studies highlight the effect of morphology on BC optical behavior soot but their findings (expressed in terms of fractal properties) cannot be used directly by aerosol experimentalists and climate modelers. Exploiting the theoretical bases of aerosol sizing techniques, I determined empirical relationships between numerically-exact optical properties of fractal BC particles and their equivalent diameters, that can be measured by common aerosol instrumentation. In a related study, I reported improved relationships between scattering directionality parameters of BC aggregates, and compared them with the canonical equations which did not allow for treatment of particle morphology. The second branch of my thesis is concerned with light absorbing organic carbon (OC). OC is conventionally modeled as purely light scattering in radiative transfer calculations. However, this approach has been challenged by mounting observational evidence of a class of OC aerosols exhibiting strong absorption in the near ultra-violet wavelengths and little to no absorption in the near-infrared region. This wavelength dependence of absorption leads to a brownish appearance, hence the name brown carbon. Absorption properties of BrC depend on fuel properties and combustion phase (flaming/smoldering): their observed values are source-specific, spanning an order of magnitude in literature. The focus of this part of my research is on the largest source of OC emissions in South Asia: household biomass cookstoves. I conducted a field study in a household in central India in December 2015 and developed a dataset of emission rates for commonly used biomass fuels from various regions of India, which showed that (1) laboratory cookstove tests underestimated particulate mass emission factors by 2-4 times and (2) cookstove aerosol emissions were dominated by thermally stable OC, which is linked with stronger light absorption than volatile OC. To constrain the MAC values for cookstove OC emissions, I performed optical (transmission and reflection) measurements on filter samples of aerosols collected during the field study. Filter optical measurements are associated with artifacts arising from the interaction of the filter medium with light. Through a laboratory study of a wide variety of combustion aerosols, I developed correction schemes for estimating aerosol-phase light absorption from filter-based measurements. This aided the estimation of absorption characteristics of cookstove particulate emissions and their OC components. We found that light absorbing OC contributes roughly as much as BC to total absorption cross-sections of cookstove emissions at 550 nm wavelength, enhancing their direct forcing efficiency. We proposed values for key absorption characteristics of cookstove OC emissions for use within climate impact assessment and mitigation efforts.


          

Automating Active Learning for Gaussian Processes

 Cache   

In many problems in science, technology, and engineering, unlabeled data is abundant but acquiring labeled observations is expensive -- it requires a human annotator, a costly laboratory experiment, or a time-consuming computer simulation. Active learning is a machine learning paradigm designed to minimize the cost of obtaining labeled data by carefully selecting which new data should be gathered next. However, excessive machine learning expertise is often required to effectively apply these techniques in their current form. In this dissertation, we propose solutions that further automate active learning. Our core contributions are active learning algorithms that are easy for non-experts to use but that deliver results competitive with or better than human-expert solutions. We begin introducing a novel active search algorithm that automatically and dynamically balances exploration against exploitation --- without relying on a parameter to control this tradeoff. We also provide a theoretical investigation on the hardness of this problem, proving that no polynomial-time policy can achieve a constant factor approximation ratio for the expected utility of the optimal policy. Next, we introduce a novel information-theoretic approach for active model selection. Our method is based on maximizing the mutual information between the output variable and the model class. This is the first active-model-selection approach that does not require updating each model for every candidate point. As a result, we successfully developed an automated audiometry test for rapid screening of noise-induced hearing loss, a widespread and preventable disability, if diagnosed early. We proceed by introducing a novel model selection algorithm for fixed-size datasets, called Bayesian optimization for model selection (BOMS). Our proposed model search method is based on Bayesian optimization in model space, where we reason about the model evidence as a function to be maximized. BOMS is capable of finding a model that explains the dataset well without any human assistance. Finally, we extend BOMS to active learning, creating a fully automatic active learning framework. We apply this framework to Bayesian optimization, creating a sample-efficient automated system for black-box optimization. Crucially, we account for the uncertainty in the choice of model; our method uses multiple and carefully-selected models to represent its current belief about the latent objective function. Our algorithms are completely general and can be extended to any class of probabilistic models. In this dissertation, however, we mainly use the powerful class of Gaussian process models to perform inference. Extensive experimental evidence is provided to demonstrate that all proposed algorithms outperform previously developed solutions to these problems.


          

Quantum Nanophotonics: Deterministic Photon-based Quantum Logic Gate By Exploiting Few-photon Nonlinearity

 Cache   

Photon-based quantum logic gate has substantial advantages over conventional atom-based designs as a result of a longer coherence time and an inherent compatibility with quantum communication protocol of flying qubits, photons. As a vital logic gate for universal quantum computing, the two-photon controlled-phase gate demands a few-photon nonlinearity, which historically suffers from either an indeterministic nature in the linear optics regime, or a weak nonlinearity within naturally-occurring materials in the nonlinear optics regime. It is intriguing yet challenging to deliver a logic gate design by exploiting a genuine fewphoton nonlinearity. In this dissertation, we study a particular one-dimensional quantum nanophotonic system that offers the desired few-photon nonlinearity through light-matter interactions in the quantum limit (i.e., between light quanta of photons and individual material formation of atoms). Towards this end, we study the exotic photonic trimer state generation to frst demonstrate few-photon nonlinearity. Then we report the breakdown of the non-Hermitian Hamiltonian for correlated multi-photon process to unveil the non-trivial effects of few-photon nonlinearity. Finally by exploiting such a nonlinearity, we present a deterministic two-photon controlled-phase gate proposal, and further showcase universal quantum logic gate designs in quantum nanophotonic systems.


          

demande d'amélioration

 Cache   
Bonjour,

je trouve très pratique ce plugin.

Pourrais t-on, lorsque l'on sélectionne un article, avoir sur la page de tous les articles un bouton de "retour au sommaire" ?

Merci

exemple
http://arp75.free.fr/PortailAR...ueil.php?lng=fr

Cordialement

Laurent

GuppY 4.6.11
Système d'exploitation du serveur : Linux Linux php4-g5.priv.free.fr
PHP : 4.4.3-dev
URL du site : http://arp75.free.fr/PortailARP/
Plugins : Addblog, Adm-Members, Adm_Redacteurs, Extra Free Box, Menus Extra, Petites annonces, Contact, Diaporama, editoPlus, Evènement, GestPlug, getfileHTML, IconeFrames, MakeList Adm_Redacteurs, OpenNews, Pétition, Reservations, Search, Tchat-Ghaz, teamspeak, Total Ban, Centre de mise à jour
          

Présentation

 Cache   
La cellule imagerie et instrumentation a en charge le développement de nouvelles techniques et nouveaux instruments au sein de l'association.
Elle a également pour rôle d'exploiter le matériel d'imagerie et former les autres membres d'Astrièves sur ces technologies. - Imagerie & Instrumentation
          

Martin Johnson expects England to come back stronger after World Cup exploits

 Cache   
The former lock says the best remedy after a painful World Cup defeat is getting together and winning again.
          

Anti-vaxxers may be exploiting widespread religious exemptions

 Cache   
An increasing number of parents in the United States are citing faith to avoid getting their children vaccinated, according to a new study -- even though no major religion opposes vaccination.

Childhood shots have been proven safe and effective, and prevent millions of deaths each year. Just 15 states allow parents to opt out of them for philosophical or personal reasons. But new research suggests that anti-vaxxers may be finding a workaround: exploiting religious belief exemptions that are permitted in 45 states and the District of Columbia.

Published Monday in the medical journal Pediatrics, the study analyzed data from the US Centers for Disease Control and Prevention and found that religious exemptions have been increasing since 2011 -- and were significantly more likely in 2017 than six years prior.

Parents were more likely to claim religious exemptions for vaccines in states that didn't permit personal belief exemptions, according to the research. That suggests a "replacement effect," according to Dr. Joshua Williams, the study's lead author and an assistant professor of pediatrics at the University of Colorado.

"When you give parents two options in a state, personal belief and religious exemption, a very small percent of parents are actually opting for religious exemptions if given an alternative," he said.

 

Religious belief exemptions surged 640% in one state

 

One state in particular, Vermont, offers a striking look at how some parents seem to be avoiding vaccines. After eliminating personal belief exemptions in 2016, the state saw a 640% increase in the proportion of kindergarteners with religious vaccine exemptions, according to Williams' study.

To qualify for a religious exemption in the state, parents are required to sign a short form confirming that they've read a two-page vaccine fact sheet and "attest to holding religious beliefs opposed to immunizations."

When personal belief exemptions were allowed, 1 in every 200 students entered kindergarten each year with a religious vaccine exemption. But that number surged to almost 1 in 25 after Vermont changed its law, the researchers found.

The overall proportion of kindergarteners with non-medical exemptions did decrease in the state, but Rupali Limaye, associate director for behavioral research at the Johns Hopkins Institute for Vaccine Safety, said "the results of this study do suggest a replacement effect."

The data, she said, suggest that "parents are choosing to use religious exemptions as a mechanism to avoid complying with vaccination laws." The rise of religious exemptions is particularly interesting, she added, because the study notes a decline in the number of individuals who report a religious affiliation in the United States.

According to a Pew Research Center report cited by Williams' research team, the percentage of Americans describing themselves as agnostic or atheist has been trending upwards, from 16.1% in 2007 to 22.8% in 2014.

"It may be that insular religious groups are growing more rapidly than secular communities or that they are increasingly falling victim to vaccine misinformation," the study noted. "Yet the rise of religious exemptions in an increasingly secular society also questions whether the religious exemption category can still serve its intended purpose."

 

No major religions oppose vaccination

 

While eliminating personal belief exemptions may decrease state exemption rates overall and improve community health, "it may also obscure reasons parents exempt their children from vaccines and create possible stigma for religious traditions who support vaccines," said Williams, who described himself as a "religious individual."

He said that policymakers could create "stronger exemption policies that preserve transparency" and noted that most religious vaccine exemptions were formalized more than half a century ago. All major religions, he emphasized, support vaccines.

That support isn't new, either. Buddhist nuns, for example, are said to have practiced an early version of smallpox vaccination more than 1,000 years ago. One Jewish rabbi, writing in the 18th century, called immunization "an act of eager religious devotion." And the Vatican has consistently encouraged vaccines, even those developed using fetal-derived cell lines.

 

Tread carefully on vaccine restrictions, experts say

 

Asked whether some parents are using religious vaccine exemptions dishonestly, Limaye, the Hopkins expert, said that "parents that hold strong beliefs about vaccination believe they are doing what is best for their child." That means "they will exhaust all options to ensure that their beliefs are upheld," she said.

The best approach toward vaccines, then, "is to engage with these parents that have concerns" and build trust, Limaye said. Vaccine scientists need to be "innovative," she added, because eliminating all exemptions could be seen as punitive, and "may backfire and lead to less trust in the health care system."

Jessica Atwell, an epidemiologist who works alongside Limaye at the Johns Hopkins Bloomberg School of Public Health, said that opposition to removing personal belief exemptions entirely has been extreme and polarizing in hesitant communities.

"Having an escape valve may be very important," she said. A better approach, according to Atwell, may be to put stricter requirements and rules in place around nonmedical exemptions, so that they're "very challenging to get, but still possible to get."

]]>
          

The exploitation of the Dionne quintuplets: Girls were raised in a ‘baby zoo’ and shown off at 1933 Chicago World’s Fair

 Cache   

Dr. Allan Roy Dafoe started spreading the news right after he helped to deliver five identical girls in a farmhouse in Corbeil, Canada, on the morning of May 28, 1934.

First, he ran into the girls’ uncle, informing him that his brother and sister-in-law had just gone from parents of five to parents...


          

Eastern Europe’s Populist Scam

 Cache   
Demagogues like Hungary’s Viktor Orban denounce the European Union but corruptly exploit its farm subsidies.
          

BBW of age plays down say no to pussy all over an obstacle shower

 Cache   
Irrational unattended dissimulate roughly an obstacle tubbing be advisable for a bare ass BBW grown up roughly fancy at hand ill feeling the brush chunky pussy together with as well as exploitation the brush steadfast nipples surface a alert digs unattended on the top of cam
          

Intelligence Analyst (35F)

 Cache   
35F Intelligence Analyst Job ID: 1143894 Job Views: 22 Location: BRYAN, Texas, United States ZIP Code: 77802 Job Category: Intelligence Posted: 11.02.2019 Age Requirements: Must be between the ages of 17 and 35 Job Description On the battlefield, success depends on accurate and timely intel. As an Army National Guard Intelligence Analyst, you will play a key role in the interpretation and exploitation of information gathered from or about the enemy. Intelligence Analysts provide Guard personnel with information about enemy forces and potential battle areas, and use information derived from all intelligence disciplines to determine changes in enemy capabilities, vulnerabilities, and probable courses of action. Specific duties of the Intelligence Analyst may include: preparation of all-source intelligence products; providing Intelligence, Surveillance, and Reconnaissance (ISR) Synchronization support; processing incoming reports and messages; determining the significance and reliability of incoming information; establishing and maintaining systematic, cross-reference intelligence records and files; integrating incoming information with current intelligence holdings; and the preparation and maintenance of graphics. Job Duties * Prepare all-source intelligence products to support the combat commander * Assess the significance and reliability of incoming information with current intelligence * Establish and maintain systematic, cross-reference intelligence records and files Some of the Skills You'll Learn * Critical thinking * Preparing maps, charts, and intelligence reports * Military symbology Helpful Skills * Interest in reading maps and charts * Gathering and analyzing information Through your training, you will develop the skills and experience to enjoy a civilian career with Federal Government agencies, such as the Central Intelligence Agency or the National Security Agency. Earn While You Learn Instead of paying to learn these skills, get paid to learn. In the Army National Guard, you will learn these valuable job skills while earning a regular paycheck and qualifying for tuition assistance. Job training for an Intelligence Analyst consists of 10 weeks of Basic Training, where you'll learn basic Soldiering skills, and 13 weeks of Advanced Individual Training (AIT) and on-the-job instruction, including practice in intelligence gathering. Part of this time is spent in the classroom and part in the field. Benefits/Requirements Benefits * Paid training * A monthly paycheck * Montgomery GI Bill * Federal and State tuition assistance * Retirement benefits for part-time service * Low-cost life insurance (up to $400,000 in coverage) * 401(k)-type savings plan * Student Loan Repayment Program (up to $50,000, for existing loans) * Health care benefits available * VA home loans * Bonuses, if applicable * Most non-prior service candidates will earn between $200 and $250 per drill weekend, subject to change Requirements * Military enlistment in the Army National Guard * Must be at least a junior in high school, or have a high school diploma or a GED certificate * Must be between the ages of 17 and 35 * Must be able to pass a physical exam and meet legal and moral standards * Must meet citizenship requirements (see NATIONALGUARD.com for details) Requires military enlistment. Programs and benefits are subject to change. Ask your Army National Guard recruiter for the most up-to-date information. Actual MOS assignment may depend on MOS availability. This position may qualify for a bonus, ask your National Guard recruiter for the most up-to-date information.
          

Cryptologic Linguist (35P)

 Cache   
35P Cryptologic Linguist Job ID: 1138728 Job Views: 20 Location: BLOOMINGTON, Illinois, United States ZIP Code: 61701 Job Category: Intelligence Posted: 11.02.2019 Age Requirements: Must be between the ages of 17 and 35 Job Description Our national security relies on information gathered from foreign language sources. As a Cryptologic Linguist in the Army National Guard, you will learn to interpret the words, intent, and tenor of these foreign communications, and present it to the people who need it the most. In this role, you will perform or supervise the detection, acquisition, geolocation, identification, and exploitation of foreign communications using specialized signals equipment. Specific duties of the Cryptologic Linguist may include: identification of foreign communications; categorizing signals by activity type; foreign communication analysis; recognizing changes in transmission modes and reporting the change; providing translation expertise to analysts; supporting Signals Intelligence tasking, reporting, and coordination; and providing transcriptions or translations of foreign communications. Job Duties * Identify and analyze foreign communications * Recognize changes in transmission modes and tip the appropriate authority * Provide translation expertise to analysts * Provide transcripts and translations from foreign communications Some of the Skills You'll Learn * Identifying foreign communications from an assigned geographic area * Analyzing foreign communications to support missions * Procedures for handling classified information and preparing reports Helpful Skills * Talent for foreign languages * Interest in speech, communications, and foreign languages * Ability to work as a team member * Enjoy reading and writing Through your training, you will develop the skills and experience to enjoy a civilian career as a translator for government agencies, embassies, universities, and companies that conduct business overseas. Earn While You Learn Instead of paying to learn these skills, get paid to learn. In the Army National Guard, you will learn these valuable job skills while earning a regular paycheck and qualifying for tuition assistance. Job training for a Cryptologic Linguist requires 10 weeks of Basic Training, where you'll learn basic Soldiering skills, and three to 80 weeks of Advanced Individual Training (AIT). Part of this time is spent in the classroom and part in the field. Soldiers who don't possess foreign language fluency will attend foreign language training at the Defense Language Institute for six to 18 months prior to attending Advanced Individual Training. Benefits/Requirements Benefits * Paid training * A monthly paycheck * Montgomery GI Bill * Federal and State tuition assistance * Retirement benefits for part-time service * Low-cost life insurance (up to $400,000 in coverage) * 401(k)-type savings plan * Student Loan Repayment Program (up to $50,000, for existing loans) * Health care benefits available * VA home loans * Bonuses, if applicable * Most non-prior service candidates will earn between $200 and $250 per drill weekend, subject to change Requirements * Military enlistment in the Army National Guard * Must be at least a junior in high school, or have a high school diploma or a GED certificate * Must be between the ages of 17 and 35 * Must be able to pass a physical exam and meet legal and moral standards * Must meet citizenship requirements (see NATIONALGUARD.com for details) Requires military enlistment. Programs and benefits are subject to change. Ask your Army National Guard recruiter for the most up-to-date information. Actual MOS assignment may depend on MOS availability. This position may qualify for a bonus, ask your National Guard recruiter for the most up-to-date information.
          

Intelligence Analyst (35F)

 Cache   
35F Intelligence Analyst Job ID: 1138726 Job Views: 30 Location: BLOOMINGTON, Illinois, United States ZIP Code: 61701 Job Category: Intelligence Posted: 11.02.2019 Age Requirements: Must be between the ages of 17 and 35 Job Description On the battlefield, success depends on accurate and timely intel. As an Army National Guard Intelligence Analyst, you will play a key role in the interpretation and exploitation of information gathered from or about the enemy. Intelligence Analysts provide Guard personnel with information about enemy forces and potential battle areas, and use information derived from all intelligence disciplines to determine changes in enemy capabilities, vulnerabilities, and probable courses of action. Specific duties of the Intelligence Analyst may include: preparation of all-source intelligence products; providing Intelligence, Surveillance, and Reconnaissance (ISR) Synchronization support; processing incoming reports and messages; determining the significance and reliability of incoming information; establishing and maintaining systematic, cross-reference intelligence records and files; integrating incoming information with current intelligence holdings; and the preparation and maintenance of graphics. Job Duties * Prepare all-source intelligence products to support the combat commander * Assess the significance and reliability of incoming information with current intelligence * Establish and maintain systematic, cross-reference intelligence records and files Some of the Skills You'll Learn * Critical thinking * Preparing maps, charts, and intelligence reports * Military symbology Helpful Skills * Interest in reading maps and charts * Gathering and analyzing information Through your training, you will develop the skills and experience to enjoy a civilian career with Federal Government agencies, such as the Central Intelligence Agency or the National Security Agency. Earn While You Learn Instead of paying to learn these skills, get paid to learn. In the Army National Guard, you will learn these valuable job skills while earning a regular paycheck and qualifying for tuition assistance. Job training for an Intelligence Analyst consists of 10 weeks of Basic Training, where you'll learn basic Soldiering skills, and 13 weeks of Advanced Individual Training (AIT) and on-the-job instruction, including practice in intelligence gathering. Part of this time is spent in the classroom and part in the field. Benefits/Requirements Benefits * Paid training * A monthly paycheck * Montgomery GI Bill * Federal and State tuition assistance * Retirement benefits for part-time service * Low-cost life insurance (up to $400,000 in coverage) * 401(k)-type savings plan * Student Loan Repayment Program (up to $50,000, for existing loans) * Health care benefits available * VA home loans * Bonuses, if applicable * Most non-prior service candidates will earn between $200 and $250 per drill weekend, subject to change Requirements * Military enlistment in the Army National Guard * Must be at least a junior in high school, or have a high school diploma or a GED certificate * Must be between the ages of 17 and 35 * Must be able to pass a physical exam and meet legal and moral standards * Must meet citizenship requirements (see NATIONALGUARD.com for details) Requires military enlistment. Programs and benefits are subject to change. Ask your Army National Guard recruiter for the most up-to-date information. Actual MOS assignment may depend on MOS availability. This position may qualify for a bonus, ask your National Guard recruiter for the most up-to-date information.
          

The Best Movies & TV Shows to Watch in Portland: Fri Nov 8-Thurs Nov 21

 Cache   
Like all good things, this piece involves both Bushwick Bill and Queen Elizabeth. by Erik Henriksen

An Autumn Afternoon & Grave of the Fireflies
Are you sad right now? Do you want to be more sad, but inside a theater? Boy howdy, do we have a double feature for you! (Fri Nov 8-Sun Nov 10, Fifth Avenue Cinema)

Charlie’s Angels
The latest reboot of the old TV show, this time directed by Elizabeth Banks and starring Kristen Stewart, Naomi Scott, and Ella Balinska. (Opens Wed Nov 13, various theaters)

The Crown
I don’t know how they did it, but somehow The Crown—a slow, fusty, grandma-friendly show about a bunch of super-rich inbred British people sitting in armchairs and fiddling with silverware—ended up being one of the best TV shows I’ve ever seen. It got me through those awful days after the 2016 election. It introduced me to Vanessa Kirby, which was life-changing. And it’s the only thing my family can talk about at holidays that we all agree on. For The Crown’s long-awaited third season, the world’s only perfect person, Olivia Colman, has joined the cast. We don’t deserve a thing this good. (Streams Sun Nov 17, Netflix) NED LANNAMANN

Dammed to Extinction
With its tinkling piano score, it’s hard to shake the feel-good hippie bullshit vibe, but Dammed to Extinction provides a unique, wide-angle take on the eternal debate over dams in the Pacific Northwest: As dams lead to the deaths of salmon, the deaths of salmon lead to shrinking orca populations. Screening followed by a Q&A with filmmakers and Columbia Riverkeeper’s Brett VandenHeuvel. (Tues Nov 12, OMSI’s Empirical Theater) ERIK HENRIKSEN

Doctor Sleep
In adapting Stephen King’s sequel to The Shining, director Mike Flanagan looks to be channelling Stanley Kubrick as much as King. That’s either brilliant or some Jack Torrance-level madness. (Opens Thurs Nov 7, Overlook Hotel)


{{image:3}}

Ford v Ferrari
Review forthcoming at portlandmercury.com. (Opens Thurs Nov 14, various theaters)

Frankie
Review forthcoming at portlandmercury.com. (Opens Fri Nov 15, Regal Fox Tower 10)

The Good Liar
I’ve been screaming about The Good Liar since August, when I found out that Bill Condon directed an AUSTERE SEXY ENGLISH THRILLER WITH A SEPTUAGENARIAN TWIST starring Dame Helen Mirren and Sir Ian McKellen. I can’t wait to watch the two greatest actors of the Silent Generation eye-fuck one another over a dining room table and double-cross all the way to the bank. (Opens Fri Nov 15, various theaters) SUZETTE SMITH

Harriet
A live-action reimagining of Harriet Tubman’s journey to self-liberation. Harriet doesn’t subject the sensitive viewer to excessive gore or violence (though there is one particularly unsettling scene), because for once, this is a story in the “slave movie” genre about triumph, leadership, and Tubman’s unwavering faith. (Now playing, various theaters) JENNI MOORE

The Irishman
Review forthcoming at portlandmercury.com. (Opens Fri Nov 15, Hollywood Theatre; streams Wed Nov 27, Netflix)

Jojo Rabbit
There’s more to the complicated Jojo Rabbit—set in the waning days of WWII, it focuses on fanatical young Nazi Jojo (Roman Griffin Davis) and his imaginary BFF, Adolph Hitler (Taika Waititi)—than first appears, and only a director as committed, inventive, and life-affirmingly good-hearted as Waititi would even have a chance of pulling it off. He does, to unforgettable effect. (Opens Fri Nov 1, various theaters) ERIK HENRIKSEN

Koyaanisqatsi
Director Godfrey Reggio and composer Philip Glass’ experimental examination of humankind’s relationship with what remains of the natural world. (Fri Nov 15-Thurs Nov 21, Academy Theater; Sun Nov 17, Northwest Film Center’s Whitsell Auditorium)

Kung Fu Theater: Snake in the Eagle’s Shadow
When action master Yuen Woo-ping decided to cast some kid calling himself “Jackie Chan” in this 1978 kung fu flick, Earth became a better place. Screens on 35mm. (Tues Nov 12, Hollywood Theatre)

The Lighthouse
The second film from Robert Eggers, the director of the excellent, wildly disconcerting The Witch, is... funnier than expected? Sure, it’s also fucked-up and intense and distressing, but there are significantly more fart jokes than one might expect. (Now playing, various theaters) ERIK HENRIKSEN

Midway
Jingoistic disaster porn from Roland Emmerich. (Opens Thurs Nov 7, various theaters)

Motherless Brooklyn
Director/star Edward Norton’s decision to turn Jonathan Lethem’s postmodern neo-noir novel into a literal 1950s-set noir is both an asset and a liability. Motherless Brooklyn is easy on the eyes, but the movie’s overlong and unfocused. (Now playing, various theaters) NED LANNAMANN

My Summer as a Goth
The John Hughes-inspired My Summer as a Goth, from Portland filmmakers Tara Johnson-Medinger and Brandon Lee Roberts, is a likable film, despite awkward pacing and its teen characters’ extremely... teenagery performances. Screens as part of Oregon Film’s “Portland Circuit” program, which screens locally produced films in theaters across the city. (Mon Nov 18, Hollywood Theatre; Tues Nov 19, Clinton Street Theater; Wed Nov 20, Cinema 21; Thurs Nov 21, Northwest Film Center’s Whitsell Auditorium) SUZETTE SMITH

Last Christmas
Review forthcoming at portlandmercury.com. (Opens Thurs Nov 7, various theaters)

Pain & Glory
Pedro Almodóvar has long warmed his filmography with flickers of details from his personal life, but Pain & Glory brings us closer to the flame. In it, we look in on Salvador Mallo (Antonio Banderas), a filmmaker in self-imposed exile due to a creative decline and a variety of physical ailments. Banderas stifles his melodramatic tendencies to subtly and powerfully reveal Mallo’s agonies and evolution. (Opens Fri Oct 25, Cinema 21) ROBERT HAM

Parasite
Parasite is director Bong Joon-ho at his very best, a hilarious and deeply unsettling look at class and survival with a gleeful and terrifying twist. (Now playing, Cinema 21, Hollywood Theatre) JASMYNE KEIMIG

Playing with Fire
Remember that early period of the Rock’s acting career, where he was only allowed to make silly-ass kids’ movies or be the Scorpion King? Well, this is like that, but with John Cena. Who sucks. Co-starring Keegan Michael Key, John Leguizamo, and a big dog wearing a fireman’s hat! (Opens Thurs Nov 7, various theaters)


{{image:12}}

Portland Book Festival—Film to Page: Drop Dead Gorgeous & Rushmore
Two exceedingly solid screenings presented by the Portland Book Festival: Rushmore, with a post-film discussion between author Morgan Parker and screenwriter Jon Raymond, and Drop Dead Gorgeous, with a post-film discussion between author Kristen Arnett and the Portland Monthly’sFiona McCann. (Fri Nov 8 & Sat Nov 9, Northwest Film Center’s Whitsell Auditorium)

Queer Commons: By Hook or by Crook
The Hollywood’s ongoing mission to make going to the movies a little more queer continues with a buddy comedy about petty criminals. (Wed Nov 13, Hollywood Theatre)

Repo Man
“I don’t want no commies in my car. No Christians either.” (Fri Nov 8-Thurs Nov 14, Academy Theater)

The Report
The Report is short for “The Torture Report,” which is short for “The Committee Study of the Central Intelligence Agency’s Detention and Interrogation Program,” which is short for the 6,700-page account of one of America’s most horrifying and shameful stretches of history. Expertly distilling an infinitely complicated, infinitely disturbing chain of events, writer/director Scott Z. Burns follows the efforts of increasingly troubled Senate staffer Daniel Jones (Adam Driver, excellent as ever), who, under the oversight of Senator Dianne Feinstein (Annette Bening), works to discover and document the CIA’s continued use of barbaric and ineffective “enhanced interrogation techniques” on prisoners captured after 9/11. Burns spends just as much time studying the failed, Republican-led efforts to cover up America’s war crimes as he does examining both the ways they were justified (“You have to make this work. It’s only legal if it works,” says one CIA official, played by Maura Tierney) and rewarded, with a coda that not-so-subtly alludes to the fact that Gina Haspel, the current director of the CIA, oversaw a black site in Thailand where some of the atrocities documented in the report were committed. (Opens Fri Nov 15, various theaters) ERIK HENRIKSEN

Repressed Cinema: The Criminal Element
16mm shorts focusing on crime, including 1903’s The Great Train Robbery and Vandalism: Fun or Dumb?, “a look at vandalism with 1960s youth.” DAMN YOUTHS! (Tues Nov 19, Hollywood Theatre)

Sonic Cinema: Bushwick Bill: Geto Boy
This documentary about the life and exploits of the Geto Boys’ most famous member dares ask the question: But does it feel good to be a gangsta? Really, though? Director in attendance. (Sat Nov 9, Hollywood Theatre)

The Spanish Prisoner
David Mamet’s 1997 neo-noir starring a very sinister... STEVE MARTIN?? Screens on 35mm. (Sun Nov 10, Hollywood Theatre)


{{image:3}}

Terminator: Dark Fate
The Terminator series’ latest reboot has one thing going for it: Linda Hamilton has returned to play Sarah Connor, which means there’s a Terminator movie worth watching again. Well, it’s worth watching, I guess, if you, like me, have devoted entirely too much of your ever-shrinking lifespan to thinking about terminators. For everyone else, Dark Fate’s appeal—which largely hinges on seeing Hamilton, Arnold, and various bloodthirsty murderbots back in action—might be limited. (Now playing, various theaters) ERIK HENRIKSEN

Underscan: Cult & Genre Reframed: Silent Running
Special effects legend Roger Trumbull’s earnest, silly, eco-conscious sci-fi from 1972 features environmental lecturing, poker-playing robots, and a MarioKart race. (Sun Nov 10, Northwest Film Center’s Whitsell Auditorium)

Watchmen
Watchmen is based on the legendary comics, but it’s not a direct adaptation; rather, the HBO series uses it as background material to tell an entirely new tale set (mostly) in 2019, a story devised by series creator Damon Lindelof, the mastermind behind Lost and The Leftovers. This Watchmen is about racism in America—its history, its evolution, and its implications in daily life. It makes the provocations of Joker look like a bowl of wet noodles. (Sundays, HBO) NED LANNAMANN

[ Comment on this story ]

[ Subscribe to the comments on this story ]


          

Australian Home Affairs Minister Says Terrorists Use Crypto to Obfuscate Crimes

 Cache   
The Australian Minister of House Affairs Peter Dutton warned that terrorists are exploiting cryptocurrencies to “fund their fatal missions.” All the way through a counter-terror convention in Melbourne on Nov. 7, Dutton stated that the anonymity of cryptocurrencies permit extremists to steer clear of scrutiny. He mentioned that the larger use of virtual currencies, stored-value …
          

Trapianti, la Rete italiana festeggia i 20 anni con la ventesima catena crossover

 Cache   
Pochi numeri danno il segno di un exploit complessivo intervallato anche da fasi stop-and-go: dal 1998 c'è stato il raddoppio delle donazioni di organo con +94%, la crescita dei trapianti a +58 per cento e il calo dei pazienti in lista d’attesa da 13mila ai 9mila attuali, con una diminuzione dei tempi di attesa per il rene, l’organo più trapiantato, dai 36 mesi del 2002 ai 24 mesi di oggi
          

35G Imagery Analyst

 Cache   
AGE REQUIREMENTS: Must be between the ages of 17 and 35

They say that a picture is worth a thousand words, and as an Imagery Analyst for the Army National Guard, those words could protect the lives of U.S. personnel in the field.

National Guard Imagery Analysts examine and interpret imagery information about enemy forces, and provide commanders with accurate battlefield data. This information is absolutely necessary to plan for our national defense. In this role, you will work with other intelligence specialists to gather and study images and information required for designing defense plans and tactics; analyze aerial and ground photographs, as well as electronic imagery of foreign ships, bases, missile sites, and industrial facilities; identify enemy weapons and equipment defenses; and study land and sea areas that could become battlegrounds in time of war.

Job Duties
• Produce intelligence by analyzing images, fixed/moving targets, and geospatial data
• Identify military installations, facilities, weapon systems, military equipment, and defenses
• Determine the location and dimensions of objects
• Conduct Battle Damage Assessment

Some of the Skills You'll Learn
• Planning overhead and aerial imagery collection
• Preparing maps, charts, reports, and Geospatial-Intelligence
• Using computer systems and imagery exploitation software
• Analyzing fixed/moving target indicators, geospatial data, and overhead/aerial images

Helpful Skills
• Interest in reading maps and charts
• Gather and analyze information
• Ability to think, speak, and write clearly

Through your training, you will develop the skills and experience to enjoy a civilian career with engineering, mapmaking, mining, land evaluation, and construction companies.

Earn While You Learn
Instead of paying to learn these skills, get paid to train. In the Army National Guard, you will learn these valuable job skills while earning a regular paycheck and qualifying for tuition assistance.

Job training for an Imagery Analyst requires 10 weeks of Basic Training, where you'll learn basic Soldiering skills, and 22 weeks of Advanced Individual Training (AIT) and on-the-job instruction, including practice in intelligence gathering. Part of this time is spent in the classroom and part in the field.

Benefits/Requirements
Benefits
  • Paid training
  • A monthly paycheck
  • Montgomery GI Bill
  • Federal and State tuition assistance
  • Retirement benefits for part-time service
  • Low-cost life insurance (up to $400,000 in coverage)
  • 401(k)-type savings plan
  • Student Loan Repayment Program (up to $50,000, for existing loans)
  • Health care benefits available
  • VA home loans
  • Bonuses, if applicable
  • Most non-prior service candidates will earn between $200 and $250 per drill weekend, subject to change
    Requirements
    • Military enlistment in the Army National Guard
    • Must be at least a junior in high school, or have a high school diploma or a GED certificate
    • Must be between the ages of 17 and 35
    • Must be able to pass a physical exam and meet legal and moral standards
    • Must meet citizenship requirements (see NATIONALGUARD.com for details)

      Requires military enlistment. Programs and benefits are subject to change. Ask your Army National Guard recruiter for the most up-to-date information. Actual MOS assignment may depend on MOS availability.

      This position may qualify for a bonus, ask your National Guard recruiter for the most up-to-date information.


          

Windbg tips for analyzing potential exploits

 Cache   
Search memory for pointer The following instruction shows how to search process memory for a specific pointer or memory pattern.  I’ve found this useful for searching memory after a potential stack overflow to see where my code is staged. 0:000> s -d 0x00000000 L?0xffffffff 0xCDCDCDCD0018ce00 cdcdcdcd 0018ea20 00426de4 0002b110 …. ….mB…..0018dde0 cdcdcdcd 0018ea20 00426de4 0002b110 … Continue reading Windbg tips for analyzing potential exploits
          

Information Risk Consultant - IT Hygiene Program Owner

 Cache   
Responsibilities: - Define and manage the IT Hygiene program including the impact and benefits to the cyber security program. - Direct a team that proactively measures the effectiveness of the program through monitoring of IT asset counts, patching effectiveness, and configuration compliance in accordance with the company's policies and standards. - Drive efficiencies though automation and embedding controls into processes. - Define the Key Risk Indicators and Key Performance Indicators associated with the IT Hygiene Program and develop a strategic reporting mechanism to ensure stakeholders understand the health of the program. - Evaluate and provide guidance and direction on the overall market offerings related to IT Hygiene and play an active role in evangelizing, building and developing MassMutual's portfolio. - Serve as a point of escalation and become actively involved, as required, in resolving highly complex problems. - Promote the benefits of IT Hygiene to the organization and educate individuals on the program. - Lead the assessment of risk of identified software, hardware and application related vulnerabilities and out of compliance configuration items based upon severity, potential business and operational impact, exploitation, and other factors. - Ensure compliance with IT Hygiene policies, standards and controls. Basic Qualifications: - Demonstrate intellectual curiosity and passion for upward mobility with career goals. - 5 years of asset management, patch management and vulnerability remediation strategies. - Excellent analytical and problem solving skills. - Excellent leadership skills with the ability to direct others and manage multiple priorities. - Strong communication and advocacy skills, both verbal and written, with the ability to express complex and technical issues in clear and concise business terms. - Authorized to work in the United States without sponsorship now or in the future. Preferred Qualifications: - Knowledge of vulnerability analysis and assessment to include reviewing application security testing findings and conveying the risk to the business. - 7 years of asset management, patch management and vulnerability remediation strategies preferred - Bachelor's Degree in MIS/CIS/CS/IT is preferred
          

House Manager-Wall, NJ

 Cache   
Job Details Company Overview FULL TIME GENERAL RESPONSIBILITIES: Coordinate and manage the operation of a community residence. Supervise staff and provide a meaningful day for the individuals served. ESSENTIAL FUNCTIONS AND RESPONSIBILITIES: 1. Supervises, trains and provides guidance to the staff in accordance with state and federal regulations, Benchmark personnel policies, and the residential policy and procedure manual. 2. Serves as the coordinator of each individual's Individual Habilitation Plan (IHP) and Person Centered Plan (ELP). 3. Participates in direct service for each individual served. 4. Completes daily, weekly, monthly and yearly documentation as required by Benchmark and state and federal regulations. Maintains in-home files for the individual's served according to standards and protocol established. 5. Facilitates all repairs and required maintenance of the individual's home. 6. Responsible for following individual's budgets. Assists the individual's served in maintaining Medicaid eligibility by scheduling and attending all Medicaid appointments and providing proper documentation. 7. Communicates professionally with families, Case Manager, Behaviorist, health care personnel, schools, landlords, employers, etc. 8. Participates in Manager's meetings, team meetings and other departmental meetings, IHP, ELP, IEP, IDT meetings, and other meetings as assigned. 9. Is able to implement training programs as specified in each individual's IHP, BSP. 10. Complies with behavior support policies and procedures and implements approved behavior support programs. 11. Participates in the hiring and discipline of assigned staff. 12. Ensures proper medication/treatment administration and assists in meeting the individual's health care needs. 13. Schedules and assists individuals in all medical appointments and procedures. Ensures proper follow up is completed. 14. Plans and implements community-based, age appropriate, recreational activities for the individuals served. 15. Implements required training protocol for new and existing staff. 16. Responds appropriately and promptly to on-call situations. 17. Complies with all standards to assure the health and safety of all staff and individuals served. 18. Reports all Unusual Incidents (i.e., suspected abuse, neglect or exploitation) to supervisor. 19. Performs other duties as assigned. Will perform all duties necessary to meet state approved objectives, including the requirement that the employee cooperate with Benchmark Human Services and staff from the Department of Human Services (DHS), the Division of Developmental Disabilities (DDD) as well as the Department of Children and Families (DCF) in any inspection or investigation. 20. Remain current in training offered by DDD (CPR/SFA) as well as those offered by Benchmark. 21. Report any suspected abuse, neglect or exploitation immediately to supervisor or department head. 22. Other duties as assigned. 23. Comply with all standards to assure the health and safety of all individuals. 24. Report to work as scheduled. QUALIFICATIONS: 1. High school diploma or equivalent required; associates or bachelor degree preferred. 2. Five years experience working with individuals with developmental disabilities including a minimum of 3 years in a supervisory capacity. 3. Must be at least 21 years of age; 4. Driver's license valid in the State of New Jersey and auto insurance; 5. Criminal background clearance; and 6. Clearance through Central Registry of Offenders Against Individuals with Developmental Disabilities. N.J.A.C. 10:44D. Email: Email blocked - click to apply Recommended skills Scheduling Reports Recruitment Training Exploitation Developmental Disabilities
          

Alexandria Ocasio-Cortez Apologizes And Unblocks Critic Who Sued Her

 Cache   

Right after Donald Trump lost the case against him for blocking people on Twitter, we noted that Dov Hikind, a critic of Rep. Alexandria Ocasio-Cortez launched a similar lawsuit against her for blocking him. Again -- because it's important to repeat -- the court rulings in the Trump case made it clear that politicians who used Twitter for part of their job representing the public could not block people, as that's a violation of the 1st Amendment. The specific criteria laid out by the courts were that (1) if you're a public official, and (2) using social media (3) for official purposes (4) to create a space of open dialogue, then you cannot block people from following you based on the views they express.

It appeared that the @AOC account met all of the criteria, and therefore should not be able to block critics for expressing their dislike of her stances or policies. Ocasio-Cortez, on her part, stood by her right to block people by claiming that she only blocked 20 people, none were constituents, and that they were only blocked for harassment which, she argued, was "not a viewpoint" (i.e., this wasn't viewpoint discrimination). Either way, just as the Hikind case was about to go to trial, Ocasio-Cortez has settled the case, admitted she was wrong to block Hikind and apologized:

“Mr. Hikind has a First Amendment right to express his views and should not be blocked for them,” the Queens-Bronx congresswoman said. “In retrospect, it was wrong and improper and does not reflect the values I cherish. I sincerely apologize for blocking Mr. Hikind.”

The Knight 1st Amendment Institute, which had brought the lawsuit against Trump and had sent Ocasio-Cortez a letter arguing that she was incorrect to block people with her account, announced that they were happy with this result. According to their Senior Staff Attorney, Katie Fallow:

“We applaud Rep. Ocasio-Cortez for recognizing that she was wrong to block critics from her Twitter account. As the courts have affirmed, when public officials use their social media accounts to carry out official duties, they create a public forum and can’t prevent people from participating simply because they don’t like what they’re saying. We hope that other public officials who are blocking critics from their social media accounts take Ocasio-Cortez’s lead.”

That said, while this case was settled and Ocasio-Cortez admitted to being wrong, she still seems to be standing by the idea that she can block some users:

“I reserve the right to block users who engage in actual harassment or exploit my personal/campaign account, @AOC, for commercial or other improper purposes,” she said.

There might be cases where it would not be a 1st Amendment violation to block users, but the details would matter quite a bit -- and the argument that harassment, by itself, would constitute a reason for blocking seems iffy, at best. Same with "exploit[ing]" her account "for commercial or other improper purposes." It will be interesting to see if other such cases are brought, or if the @AOC account choose to block others in the future.



Permalink | Comments | Email This Story

          

Technical Account Manager

 Cache   
Who We Are: Malwarebytes is the next-gen cybersecurity company that millions worldwide trust. Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware, and exploits that escape detection by traditional antivirus solutions. The company's flagship product combines advanced heuristic threat detection with signatureless technologies to detect and stop a cyberattack before damage occurs. More than 10,000 businesses worldwide use, trust, and recommend Malwarebytes. Founded in 2008, the company is headquartered in California, with offices in Europe and Asia, and a global team of threat researchers and security experts. We've created a fantastic culture that our employees love and were recently named in the top 10 of Fortune Magazine's Great Place to Work list. We're growing fast and are looking for some great people to join us. Who We Need: We are looking for a dedicated, ambitious and self-driven Technical Account Manager. As a Technical Account Manager, you are responsible for managing all aspects of a company's relationship with its customers. You will work closely with the sales and business account management team to win new business and increase sales to your existing customers. By providing top-quality technical service after a sale, technical account managers help to ensure customer satisfaction and drive customers to renewal with our products. What You'll Do: Act as the main point of contact and manage all post-sales activity for Premium Business customers through strong relationship-building, product knowledge, planning, and execution Be accountable for the customer's overall success with Malwarebytes, including adoption of Malwarebytes solutions, training, renewals, customer health, and satisfaction Deliver on an exceptional customer experience with proactive communication, regular sync-ups or check-ins, and orchestrating the right internal resources Proactively work with customers to plan and drive deployment of Malwarebytes products using best practices to help customers meet their business objectives and return on investment Maintain a deep understanding of Malwarebytes products and speak with customers about the most relevant features/functionality for their specific requirements Be the voice of the customer internally at Malwarebytes by sharing process improvements and customer requests back to the internal Product Management & Development teams Build and maintain executive level relationships through our role as trusted advisors Identify and introduce customers fit for case studies, testimonials, and media opportunities to our Marketing team Collaborate with the Technical Support team and facilitate any escalation directing the customer to a quick and efficient resolution Skills You'll Need to Have: 5+ years of experience in Customer Success, Account Management, or related customer-facing position within a rapidly growing SaaS company or Cyber Security industry Solid technical background with 3+ years of experience troubleshooting software and networking environments. Experience with integrations with Slack/Splunk and others a plus Strong installation, configuration, troubleshooting and debugging skills relating to hardware, drivers and software issues Ability to prioritize in a fast-paced environment, multi-task, and perform effectively under pressure Excellent project management, account planning, and organizational skills Exceptional presentation & communication skills, both verbal and written Proven track record of implementing a customer onboarding program Proven effectiveness at leading and facilitating executive C-Level meetings and discussions Prior experience working with Anti-malware, Antivirus, firewall and security software a plus Self-motivated, team-oriented, accountable, and focused on exceeding customer expectations Diplomacy, tact, and poise under pressure when working through complex customer issues Ability to work in a fast-paced environment Bilingual is a bonus, English and Spanish speaking preferred Ability to travel What We Offer: An opportunity to do something great for yourself and the world A great work environment that supports growth and development Competitive compensation and benefit packages 401(k) matching program Open time off policy Stocked kitchen with healthy (and some unhealthy) drinks, snacks, fruit and lunch options A company that enjoys having fun; holiday and summer parties, sporting events and lots of other great stuff
          

Air Force Program Manager

 Cache   
Job TitleAir Force Program ManagerJob TypeFull-timeLocationDayton, OH US (Primary)CategoryHuman ResourcesJob DescriptionCredence Management Solutions, LLC (Credence) is seeking a Program Manager to successfully manage a large team of professionals providing direct on-site support to the U.S. Air Force Life Cycle Management Center (AFLCMC) at several geographic locations throughout the continental U.S. The Program Manager is responsible to Credence and to the customer for the timely accomplishment of all contract tasks, deliverables and overall customer satisfaction with Credence services..RESPONSIBILITIESPerforms day-to-day management of overall contract support operations, involving multiple projects, companies and groups of personnel at multiple locations.Responsible for understanding customer priorities and directions, serving as the focal point for all executive-level and below customer interactions, mobilizing Credence corporate and team resources to fulfill all contractual requirements.Responsible for the quality and timely delivery of all contractual deliverables, ensuring overall customer satisfaction with Credence services, resulting in 'Exceptional' ratings on Contract Performance Assessment Reports (CPARs).Monitor team plans and activities, identifying risks and opportunities while proactively taking actions to eliminate or mitigate risks and exploit new opportunities.Report current status, plans, issues, corrective actions, and results to Credence and the customer, responding effectively to guidance and direction from Credence and the customer in achievement of desired results.Consistently staff the program with fully-qualified, professional personnel capable of performing the contract tasks while meeting customer expectations.Meet with Credence personnel, teaming partners and the customer to verify individual and team performance, reassigning or removing personnel as necessary.Understand the needs of team members and effectively advocate for their needs.Job RequirementsBachelor's degree.Project Management Professional (PMP) certification from the Project Management Institute (PMI).Ten (10) years of demonstrated programmatic experience in support of DoD/Federal customers.Prior experience in Avionics, Engineering, Acquisition or Logistics.Prior experience working on high-visibility or mission-critical aspects of a DoD governmental program performing all functional duties independently.Demonstrated knowledge of U.S. Air Force Instructions (AFIs), policies and procedures.ACAT experience is desired.Willingness to travel, if required.Excellent written and verbal communication skills and be able to interface and effectively brief senior-ranking military/government leadership.Company Overview:Credence Management Solutions, an award-winning, fast growing, top performer in the government space, is the leader among small businesses in providing innovative management, engineering, and technology solutions to the Federal Government. We are a diverse, enthusiastic team of subject matter experts, business professionals, and practitioners who share a common goal of providing exceptional service to our customers. Credence believes in providing all employees the opportunities and tools for optimal success. To this end, we provide highly-competitive compensation plans that include a comprehensive benefits package, ample opportunities for growth, and a dynamic and caring corporate culture focused on employee empowerment, recognition, and reward. Credence's objective of maintaining a talented, high-quality workforce is reflected in our three core values: Trust, Partnership, and Success. Our culture of excellence and trust nurtures innovative and entrepreneurial accomplishments. Credence treats
          

Ecotourism - A Way of Holistic Development in Rural Areas

 Cache   

The Himalayan states receive more than 700,000 tourists every year for commercial and pilgrimage tourism. This growth in traditional tourism has resulted in over exploitation of natural resources coupled with unsystematic development and environmental pollution...


          

ACE EPIC NPS NC: Appalachian Highlands IM Vegetation Monitoring Internship - AmeriCorps

 Cache   
Job Type AmeriCorps Salary Details See job description Summary: American Conservation Experience, a nonprofit Conservation Corps, in partnership with the National Park Service (NPS), is seeking ONE Vegetation Monitoring Member to monitor and protect significant natural resources in National Parks as part of the NPS Appalachian Highlands Inventory and Monitoring Network (APHN) and the Cumberland Piedmont I & M Network (CUPN). This opportunity is intended for an enthusiastic individual who possesses an interest in gaining experience in botany, ecology, vegetation and natural resource management. This project provides opportunities for a member to learn about natural resources, management programs and monitoring techniques in a number of Appalachian region National Park Service units, by gaining practical experience and training. As a result of this project, our hope is that the member will be motivated to become involved in the natural, cultural and /or historical resource protection of their communities and beyond. Start Date: January 6, 2020 End Date: January 2, 2021 (or 52 weeks after start date) * A 52-week minimum commitment is required * Location: Stationed at APHN Office in Asheville, NC Project Partner Website: For more information regarding the Appalachian Highlands Inventory & Monitoring Network please visit the NPS website at: ************************************** For more information on the ACE Internship Program, please visit: ***********************. Program Background: Appalachian Highlands Network parks vary in size from 5,174 acres to 521,490 acres, and include two of the most-visited units in the National Park system (Great Smoky Mountains & Blue Ridge Parkway). The network parks are divided between two ecologically distinct physiographic regions: the Cumberland Plateau of Kentucky and Tennessee, and the Southern Appalachian Mountains of Virginia, North Carolina, and Tennessee. The natural beauty of Appalachian mountain country and Cumberland Plateau regions, lush with vegetation, old growth forest, rocky ridges and deep gorges are characterized by high levels of biological diversity and endemism. The nation-wide NPS Inventory and Monitoring Program was created to acquire the information and expertise needed by park managers to protect park resources and maintain ecosystem integrity in the face of multiple threats. The primary goals of the NPS I & M program are to inventory NPS natural resources to determine their nature and status; Monitor park ecosystems to better understand their dynamic nature and condition and provide reference points in comparison to other environments; to establish baseline inventory and monitoring practices throughout Nation Park systems. Living Allowance: The ACE member will serve approximately 40 hours/week and will receive a living allowance of $300/week to cover the costs of food and incidental expenses, dispersed bi-weekly. While traveling for projects, accommodations will include motels and park housing; reimbursable travel expenses are covered by the ACE. Housing: Housing is the responsibility of the intern and not provided by ACE or NPS. AmeriCorps: This position may be eligible for two 900-hour or one 1700-hour AmeriCorps Education Award ($6,195) upon successful completion of internship service hours. Additional enrollment is required. Position Description: This is a 52-week position, working with the NPS Appalachian Highlands and Cumberland Piedmont Inventory and Monitoring Networks (APHN and CUPN, respectively) as a member of a team that conducts field-oriented natural resources monitoring. Primary duties include assisting APHN staff with a variety of field-oriented projects, including: - Vegetation monitoring projects, including exploited and rare plants (APHN), and forest health monitoring (CUPN) - Water quality sampling in CUPN and APHN parks - Entering and quality checking monitoring data and species occurrence information in databases and spreadsheets, using Microsoft Access and Excel - Occasionally providing field and data management assistance for other long-term monitoring projects, including early detection of invasive plants, air quality, freshwater mussels and cave resources - Field operation and basic management of Global Positioning System (GPS) instruments and data, including uploading and downloading GPS data - Organizing and carrying out field logistics to support monitoring teams of two or more people - Occasionally assisting with formatting and editing technical reports produced by the Networks, using Microsoft Word - Depending on the interests and background of the intern, occasionally assisting with creating Geographic Information System maps (with ESRI's ArcInfo software) to be used for natural resources inventory and monitoring projects. Training: NPS will provide field training and experience in a variety of methods and instruments used to carry out several long-term monitoring projects. Training or practical experience may also be provided in data manipulation using Microsoft Excel, Microsoft Access, and other proprietary software, including Garmin GPS software, ESRI ArcGIS software and National Park Service natural resources inventory and monitoring databases. Training will be provided in Wilderness First Aid and Operational Leadership (a safety awareness course). Qualifications: The successful candidate must have a background or course work in botany, ecology, natural resource management, or a related discipline and have a demonstrated interest in this field. Required: - Willing and able to represent ACE and the partner organization in a professional, positive, and enthusiastic manner. - Ability to perform the essential duties of the position with or without reasonable accommodation - Proven ability to be both self-directed/work alone, and be a positive, contributing member of a group - Must be 18-35 years of age (age requirement is due to the Public Land Corps Act requirements. Additionally, members must be at least 21 to apply for any ACE position that requires or anticipates operation of agency or ACE vehicles for duties.) - U.S. Citizen or Permanent Resident - A valid driver's license and an insurable driving record (documentation to be provided upon request) - Willing to undergo and must pass a federal criminal background check Preferred: - Interest and knowledge of botany, hydrology, and ecology - Knowledge, interest and/or experience conducting vegetation sampling and monitoring and aquatic field work - Experience in various field data collection methods using standard protocols - Experience in backcountry hiking and navigation in steep terrain - Interest and ability to work in remote field areas - Familiarity with Microsoft Access, Garmin GPS units, and/or ESRI's ArcGIS Suggested: a personal vehicle is recommended for the duration of the internship as not having a vehicle can be detrimental to the member's experience.
          

Decriminalizing Crime

 Cache   

Crime statistics are an embarrassment. Minority groups commit more crimes per capita than others. Members of these groups are rightly embarrassed by the statistics, but their solution seems most often to be to blame someone else, like white police officers.

Even the ascendancy of Barack Obama did not seem to make a dent in the crime statistics. Obama’s home town, run by a mayor who had been Obama’s chief of staff, kept racking up unacceptably large murder rates. Again, it was an embarrassment. The nation has been told to look away and to blame white people, especially white racists and white supremacists.

By what is acceptable reason, we are not permitted to suggest that the people who commit the crimes ought not to be committing the crimes and that their communities ought not to be defending them or exonerating them… because the fault lies with white police officers.

One alternative might be to decriminalize crime. By the logic of the radical left crime must be a social construction. If we decriminalize certain criminal behaviors there will be less crime. Problem solved, sort of.

Victor Davis Hanson explained how it’s working in California:

Stores are occasionally hit by swarming looters. Such Wild West criminals know how to keep their thefts under $950, ensuring that such “misdemeanors” do not warrant police attention. California’s permissive laws have decriminalized thefts and break-ins. The result is that San Francisco now has the highest property crime rate per capita in the nation.

Mission accomplished.

If that does not suit your intellectual predilections, the Washington Post has just run a series of articles about how bad prison is. The ostensible purpose of these articles, written by people who have suffered incarceration, is to empty the prisons. The reasoning behind them: people who are in prison have mental health issues. And that prison is not very good therapy. If not, prisoner are the victims of capitalist patriarchy and are simply revolting against their oppressors.

Notable scofflaw Piper Kerman, the mind behind the television show, Orange is the New Black, explains it all in her lead article. Paul Mirengoff reports on it for Powerline blog (via Maggie’s Farm):

Kerman complains that “the American criminal justice system does not solve the problems — violence, mental illness, addiction — that it claims to address.”

And also:

Kerman’s article is a smorgasbord of leftist cliches. She claims, for example, that “mass incarceration is a result of policies that have grown out of a history of slavery, colonialism, and punishment of the poor.”

To which Mirengoff responds:

If slavery, colonialism, and punishment of the poor were to blame for incarceration, we should see less, not more, incarceration as time takes us further and further away from this history. But that’s not what we see.

Thus is blame shifted from the criminals to the society at large. The fault, by leftist ideology, lies with a criminal Western culture that has exploited and oppressed peoples for ages now. Those who hold these views are saying that criminal behavior is the natural and normal response of oppressed peoples toward their oppressors. If not, it is a function of mental health problems that the nation is refusing to treat.

Meringoff remarks that Kerman and the Washington Post have misunderstood the purpose of prison:

The primary purposes of the system are to punish criminals and prevent them from committing crimes. It achieves these objectives, at least while the criminal is incarcerated. Longer sentences would prevent criminals from committing crimes for longer periods. But this, of course, is not what Kerman has in mind.

By incapacitating criminals, the justice system reduces violence. Violent crime plummeted following the harsher federal sentencing regime adopted towards the end of the last century. This isn’t the same thing as “solving” violence, but that’s not a realistic goal of a criminal justice system.

In effect, the solution offered by Kerman and the Post is the problem. When communities do not hold criminals accountable, when they do not shun those who cause the communities to fall into disrepute, you get more crime. Effectively, the article decriminalizes crime. It will naturally produce more crime. We should shut up and suffer it because we all deserve it.

Meringoff explains:

If anything here is being “normalized” here it’s crime, not incarceration. Advocates like Kerman (and those like the Washington Post who give them a platform) treat criminal behavior as a normal and natural response to slavery, colonialism, imbalances in power, etc.

Accepting this notion will lead to rampant crime in excess even of the crime wave of the 1970s that led to the stiff sentencing regime in place until recently. It will eat away at the fabric of our society — a fate that radicals like Kerman may consider the just dessert of a “racist” and “colonialist” nation like America.

          

Intelligence Production Specialist

 Cache   
About the Job Secure our Nation, Ignite your Future - Provides technical, analytical and management support leveraging intelligence production expertise for data and knowledge integration across various intelligence disciplines. - Conducts and manages complex research on various intelligence issues. Organizes and analyzes information, identifies significant factors, gathers pertinent data, and develops solutions. - Utilizes unclassified, secret and top secret intelligence sources, databases, and systems to research intelligence information. Develops rapid responses to inquiries using classified and CBP law enforcement data systems. - Develops graphics and reports based on the analysis and interpretation of program statistics and capabilities. - Conducts intelligence production process improvement analyses to support the development of concepts of operation, standard operating procedures for Tasking, Collection, Production, Exploitation, and Dissemination of intelligence products, and daily CBP intelligence needs. - Coordinates with consumers to ensure that CBP intelligence products answer consumer's intelligence questions, assist strategic decision makers, and serve as valuable resrouces to CBP operational components. - Conducts outreach with other organizations to ensure CBP analyst-authors utilze best practices in producing written intelligence products. Supports intelligence production and intelligence information sharing initiatives via intelligence system software tools. - This position requires a Bachelor's degree with 10 - 12 years of analytical experience in one or more intelligence disciplines and /or related intelligence system software tools. - Knowledge of the following is required: intelligence lifecycle, intelligence product generation, and application of analytical and evaluative techniques to the identification, consideration, and resolution of issues or problems of a procedural or factual nature. - At least 2-3 years of experience utilizing ICD standards 203 and 206 is required. - This position requires demonstrated initiative, sound judgment, effective decision-making, the ability to plan and organize work, and excellent oral and written communication skills. - Must hold an active Top Secret security clearance with access to Sensitive Compartmented Information. - Requires a detail-oriented self-starter experienced in supporting senior Government leaders and other technical/business professionals. Advanced skills in Microsoft Word, Outlook, Excel, Access, PowerPoint, Project and SharePoint are required. - A current Customs and Border Protection Background Investigation is required. A DHS Top Secret clearance with access to Sensitive Compartmented Information and a favorable background investigation conducted within the last five years are required ManTech International Corporation, as well as its subsidiaries proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment because of race, color, sex, religion, age, sexual orientation, gender identity and expression, national origin, marital status, physical or mental disability, status as a Disabled Veteran, Recently Separated Veteran, Active Duty Wartime or Campaign Badge Veteran, Armed Forces Services Medal, or any other characteristic protected by law. If you require a reasonable accommodation to apply for a position with ManTech through its online applicant system, please contact ManTech's Corporate EEO Department at **************. ManTech is an affirmative action/equal opportunity employer - minorities, females, disabled and protected veterans are urged to apply. ManTech's utilization of any external recruitment or job placement agency is predicated upon its full compliance with our equal opportunity/affirmative action policies. ManTech does not accept resumes from unsolicited recruiting firms. We pay no fees for unsolicited services. If you are a qualified individual with a disability or a disabled veteran, you have the right to request an accommodation if you are unable or limited in your ability to use or access ************************************************* as a result of your disability. To request an accommodation please click ******************* and provide your name and contact information.
          

Cloner son système d’exploitation d’un disque dur vers un plus petit SSD sans réinstallation

 Cache   

Objectif : L’utilisateur va apprendre à Cloner son système d’exploitation d’un disque dur vers un plus petit SSD sans réinstallation. Niveau : Débutant Durée : 5’ Support : Le logiciel EaseUS Todo Backup Home : http://bit.ly/32fNQrs   Pour toutes question, n’hésitez pas à me contacter par mail, ou à poser vos questions en commentaires : video.lecarnetdeculture@gmail.com

Cet article Cloner son système d’exploitation d’un disque dur vers un plus petit SSD sans réinstallation est apparu en premier sur Les tutos de l'informatique.


          

35F Intelligence Analyst

 Cache   
AGE REQUIREMENTS: Must be between the ages of 17 and 35

On the battlefield, success depends on accurate and timely intel. As an Army National Guard Intelligence Analyst, you will play a key role in the interpretation and exploitation of information gathered from or about the enemy. Intelligence Analysts provide Guard personnel with information about enemy forces and potential battle areas, and use information derived from all intelligence disciplines to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.

Specific duties of the Intelligence Analyst may include: preparation of all-source intelligence products; providing Intelligence, Surveillance, and Reconnaissance (ISR) Synchronization support; processing incoming reports and messages; determining the significance and reliability of incoming information; establishing and maintaining systematic, cross-reference intelligence records and files; integrating incoming information with current intelligence holdings; and the preparation and maintenance of graphics.

Job Duties
• Prepare all-source intelligence products to support the combat commander
• Assess the significance and reliability of incoming information with current intelligence
• Establish and maintain systematic, cross-reference intelligence records and files

Some of the Skills You'll Learn
• Critical thinking
• Preparing maps, charts, and intelligence reports
• Military symbology

Helpful Skills
• Interest in reading maps and charts
• Gathering and analyzing information

Through your training, you will develop the skills and experience to enjoy a civilian career with Federal Government agencies, such as the Central Intelligence Agency or the National Security Agency.

Earn While You Learn
Instead of paying to learn these skills, get paid to learn. In the Army National Guard, you will learn these valuable job skills while earning a regular paycheck and qualifying for tuition assistance.

Job training for an Intelligence Analyst consists of 10 weeks of Basic Training, where you'll learn basic Soldiering skills, and 13 weeks of Advanced Individual Training (AIT) and on-the-job instruction, including practice in intelligence gathering. Part of this time is spent in the classroom and part in the field.

Benefits/Requirements
Benefits
  • Paid training
  • A monthly paycheck
  • Montgomery GI Bill
  • Federal and State tuition assistance
  • Retirement benefits for part-time service
  • Low-cost life insurance (up to $400,000 in coverage)
  • 401(k)-type savings plan
  • Student Loan Repayment Program (up to $50,000, for existing loans)
  • Health care benefits available
  • VA home loans
  • Bonuses, if applicable
  • Most non-prior service candidates will earn between $200 and $250 per drill weekend, subject to change
    Requirements
    • Military enlistment in the Army National Guard
    • Must be at least a junior in high school, or have a high school diploma or a GED certificate
    • Must be between the ages of 17 and 35
    • Must be able to pass a physical exam and meet legal and moral standards
    • Must meet citizenship requirements (see NATIONALGUARD.com for details)

      Requires military enlistment. Programs and benefits are subject to change. Ask your Army National Guard recruiter for the most up-to-date information. Actual MOS assignment may depend on MOS availability.

      This position may qualify for a bonus, ask your National Guard recruiter for the most up-to-date information.


          

Exploitation de clandestins : un "barragiste" condamné - Le Journal De Mayotte

 Cache   
Exploitation de clandestins : un "barragiste" condamné  Le Journal De Mayotte
          

Dynamic Host-Guest Interaction Enables Autonomous Single Molecule Blinking and Super-Resolution Imaging

 Cache   
Chem. Commun., 2019, Accepted Manuscript
DOI: 10.1039/C9CC07153A, Communication
Ranjan Sasmal, Nilanjana Das Saha, Florian Schueder, Divyesh Joshi, Sheeba Vasu, Ralf Jungmann, Sarit Agasti
Synthetic host-guest complexes are inherently dynamic as they employ weak and reversible noncovalent interactions for their recognition process. We strategically exploited dynamic supramolecular recognition between fluorescently labeled guest molecule to...
The content of this RSS Feed (c) The Royal Society of Chemistry

          

CONTROLLER

 Cache   
Job Title CONTROLLER Requisition # ******.11 Job Type Full-time Shift Type Location AEROSTRUCTURES - Progressive Inc - TX - Arlington, TX 76001 US (Primary) Job Description Position Summary: The Controller is responsible for all financial aspects of the business and must ensure compliance with all PCC Corporate Policies and Procedures, Generally Accepted Accounting Principles, and Sarbanes-Oxley (SOX) requirements. Position Accountabilities: - Responsible for all financial statements, internal and external audits, budgets, forecasts and strategic business plans, and must coordinate with Division and Corporate finance to achieve the goals and objectives of the business. - Oversees daily operations of the Accounting department. Controls and monitors all company assets including inventory and fixed assets through cycle counting or other audit methodologies. - Establishes or recommends to management major economic strategies, objectives and policies for the company. Acts to link/align the major business functions to profitability, growth and cash flow. - Prepares timely and comprehensive reports including analysis of financial data, statements, and audits covering daily flex, weekly battle plan, and monthly and quarterly business reviews. - Directs preparation of budgets, reviews budget proposals, and prepares necessary supporting documentation and justifications. Monitors approved budgets on a monthly basis, providing guidance and assistance where needed to management. - Assists sales/marketing and manufacturing functions in matching financial capability of company assets and resources to the forecast for sales/shipments as well as analyzing margins and recommending actions to improve items not meeting overall objectives of company. - Manages financial and SOX audits with internal and external auditors and provide recommendations for procedural improvements. - Acts as business unit Ethics Officer regarding compliance with Sarbanes-Oxley requirements and oversees all internal controls. - Assists management with negotiation and review of Long Term Agreements with customers. - Serves as advisor to and strategic partner with the General Manager of the business, assisting in most decisions related to forecasts, key position hiring, new initiatives to exploit potential profit improvement opportunities, setting of plant policies and procedures, and other avenues in pursuit of operational excellence. - Establish and implement short- and long-range departmental goals, objectives, policies, and operating procedures. Design, establish, and maintain an organizational structure and staffing to effectively accomplish the department's goals and objectives. - Leverage strengths of the current Finance team members, help to clarify roles and responsibilities and develop and implement training programs in order to maximize and reach optimal individual and organizational goals. - Responsible for the department's staffing and performance management process; including development, coaching, discipline and termination actions. - Provide leadership in strengthening internal communications with staff at all levels throughout the organization; create and promote a positive and supportive work environment. - Performs other related duties as assigned. Position Qualifications: MINIMUM EDUCATION - BS or BA in Accounting or equivalent. MINIMUM EXPERIENCE - 10 plus years of Accounting/Finance experience, with 3-5 years as the financial leader in a manufacturing environment with full responsibility for the books and records. Publicly traded company experience highly preferred. - Strong background in product cost Accounting (standard cost system) and experience in plant accounting/finance systems including strong understanding in the use of Excel. SKILLS - GAAP and Sarbanes-Oxley knowledge is required. Track record of improving internal controls highly valued. - Exceptional analytical abilities and understanding of accounting and finance issues in a manufacturing environment. - Ability to analyze financial data and prepare financial reports, statements and projections. Working knowledge of short and long term budgeting and forecasting, rolling budgets, and profitability and variance analysis. - A proactive, hands-on strategic thinker with solid problem solving skills which allows for strategic data interpretation vs. simple reporting. - Experience presenting to highest levels of management with confidence and precision. - Solid, overall business acumen and a strong mindset for continuous improvement. - Attention to detail and an attitude of 100% compliance with all company and regulatory requirements. - Work requires verbal communication and interpersonal skills. Ability to motivate teams to produce quality materials within tight timeframes and simultaneously manage several projects. - High energy level; ability to work flexible hours. LEVEL OF SUPERVISION - Supervises up to 7 accounting and finance personnel
          

Piraté ! Décryptualité du 28 octobre 2019

 Cache   


Piratage

Titre : Décryptualité du 28 octobre 2019 - Piraté !
Intervenant·e·s : Nolwenn - Nicolas - Manu - Luc
Lieu : April - Studio d'enregistrement
Date : 28 octobre 2019
Durée : 15 min
Écouter ou télécharger le podcast
Revue de presse pour la semaine 43 de l'année 2019
Licence de la transcription : Verbatim
Illustration : Le comptoir du hardware, piratage - Licence Creative Commons BY-ND.
NB : transcription réalisée par nos soins, fidèle aux propos des intervenant·e·s mais rendant le discours fluide.
Les positions exprimées sont celles des personnes qui interviennent et ne rejoignent pas nécessairement celles de l'April, qui ne sera en aucun cas tenue responsable de leurs propos.

Description

Se faire pirater, est-ce vraiment si grave ?

Transcription

Luc : Décryptualité.

Voix off de Nico : Le podcast qui décrypte l’actualité des libertés numériques.

Luc : Semaine 43. Salut Manu.

Manu : Salut Nico.

Nico : Salut Nolwenn.

Nolwenn : Salut Luc.

Luc : Sommaire ?

Manu : On a un joli sommaire avec des sujets un peu variés.

Nico : Siècle Digital, « Royaume-Uni : les données biométriques d'un million de personnes ont été exposées », un article de Valentin Cimino.

Manu : Ça ne touche pas tout à fait au logiciel libre, il faut bien le dire, je pense que je ne vais plus mettre ce genre d’articles, ça arrive trop souvent.

Luc : C’est dommage, c’est rigolo quand même !

Manu : Oui, ça reste rigolo, surtout qu’on a parlé de reconnaissance faciale, de données qui étaient utilisées par l’État français ou qui allaient être utilisées par l’État français et on faisait remarquer à chaque fois « attention, si ces données sont volées » et généralement les institutions nous disent : « Ne craignez rien, elles ne seront jamais volées ! »

Luc : Elles sont sécurisées !

Manu : Carrément ! Eh bien là, non, elles n’étaient pas bien sécurisées, donc il y a un million de données biométriques en Angleterre qui étaient exposées sur Internet. On ne sait pas qui en a fait quoi, en tout cas elles étaient accessibles à différents hackers et c’est gênant parce qu’on ne peut pas changer facilement ses données biométriques.

Nico : Numerama, « Un ordinateur par classe, logiciels obsolètes : l'école est-elle à la traîne en matière de numérique ? », un article de Perrine Signoret.

Manu : L’école et les moyens de l’école, on se doute bien que c’est déjà un sujet compliqué, mais, en plus, quand on commence à parler d’informatique, de logiciels et de matériel, eh bien là c’est encore plus mal barré techniquement. Il y a eu des plans qui ont été lancés par les différents gouvernements et généralement ça se révèle infructueux.

Luc : Microsoft ira bien aller faire un petit cadeau à la France ? Non ?

Manu : Oui, puisque c’était ce qui s’était passé pour leur permettre de rentrer dans le ministère de l’Éducation et ils ont des accords avec différentes branches des administrations. C’est très embêtant, mais on ne peut pas y faire grand-choses, sinon constater que ça ne marche pas.

Luc : Rappelons que l’Éducation c’est toujours un champ de bataille énorme parce que tous les éditeurs ont envie de refourguer leur camelote aux enfants pour qu’ils prennent des habitudes au plus tôt.

Nico : Sciencepost, « Voici Collapse OS, le système d'exploitation de la fin du monde ! », un article de Yohan Demeure.

Manu : C’est un super sujet qui est vraiment génial. La collapsologie qui veut dire ?

Nolwenn : C’est l’étude de l’effondrement de la société. Comment on pourrait, justement, réussir à survivre si demain tout s’arrête.

Manu : Il y a plein de manières de voir ces effondrements possibles et il y a aussi plein de manières d’essayer de les contrecarrer. D’un point de vue informatique c’est compliqué parce que si la civilisation s’écroule qu’est-ce qui reste ? Eh bien il y a des gens qui creusent ce sujet-là dans l’optique d’essayer de conserver un peu d’informatique, notamment en essayant de réutiliser des vieux microprocesseurs qui sont en très grand nombre un peu partout dans le monde, qui pourraient être utilisés pour être la base d’un système d’exploitation conçu pour eux.

Luc : Vivement la fin du monde qu’on essaye tout ça !

Nico : ZDNet France, « Justice : GNOME envoie un missile aux patent trolls », un article de Campbell Kwan.

Manu : Les patent trolls ce sont des gens qui essayent de mettre des brevets sur les idées de logiciels.

Luc : Ils le font !

Manu : Surtout aux États-Unis parce qu’en Europe ça reste interdit, mais ils le font aussi. GNOME est une fondation de logiciel libre. Ils ont été embêtés par un troll des brevets et ils ont répliqué en allant en justice pour essayer de lui créer des problèmes à leur tour. On suppose que ça devrait fonctionner parce le gars en face n’a vraiment aucune base pour se défendre.

Nico : Du coup la fondation GNOME a besoin d’argent parce que, malheureusement, ça coûte cher et il y a beaucoup de procès pour essayer de se sortir de là, donc ils ont fait une levée de fonds. Si vous voulez contribuer à aller atomiser un patent troll, eh bien n’hésitez pas, c’est le moment.
Les Echos, « Le Sénat veut faire de l'Arcep le gendarme des smartphones », un article de Raphaël Balenieri.

Manu : Là aussi ce sont des choses un peu compliquées. On connaît l’HADOPI [Haute autorité pour la diffusion des œuvres et la protection des droits sur Internet]. On sait qu’il y a pas mal d’institutions, d’administrations qui sont là pour essayer de contrôler des fréquences, pour essayer de contrôler les médias. Là il est question de centraliser un petit peu tout ça dans une nouvelle institution, l’Arcep [Autorité de régulation des communications électroniques et des Postes], qui récupérerait différents pouvoirs à droite et à gauche et il serait question que, dans leurs pouvoirs, ils aient des choses qui leur permettent de contrôler les téléphones portables.

Luc : Les contrôler sur quels points ?

Nico : J’ai été auditionné par l’Arcep justement sur leur nouveau mandat et l’exemple c’était sur les banques et les téléphones mobiles. Aujourd’hui on est obligé d’utiliser un téléphone Android sous telle version verrouillée par les constructeurs et l’Arcep a dit : « Ce n’est pas normal. La liberté c’est aussi de mettre ce qu’on veut », donc ils veulent aussi légiférer éventuellement là-dessus.
Le Monde Informatique, « Pierre Baudracco devient co-président du CNLL », un article de Véronique Arène.

Manu : CNLL c’est une association d’éditeurs de logiciels libres.

Luc : Oui, ça fait très longtemps qu’on n’en avait pas parlé.

Manu : Oui. Là ils reviennent un petit peu sur le devant de la scène. Pierre Baudracco est quelqu’un qui a travaillé sur BlueMind, une solution de messagerie qui avait fait jaser ; il y avait eu des problématiques judiciaires. C’est intéressant de voir qu’il est sorti de tous ces problèmes par le haut. J’espère qu’on va entendre encore parler de lui dans les mois qui viennent.

Luc : Et du CNLL qui est, en gros, un syndicat d’entreprises du logiciel libre.

Nico : francetv info, « L'article à lire pour comprendre Alicem, l'application d'identité numérique par reconnaissance faciale qui fait polémique », un article de Alice Galopin.

Manu : La reconnaissance faciale, ça me plaisait bien comme sujet, on va arrêter d’en parler autant, ça n’empêche que c’est intéressant. Allez jeter un œil sur cet article-là parce qu’il y a plein de choses qui tournent sur cette nouvelle application qu’on va probablement tous devoir installer à un moment ou un autre sur nos téléphones. C’est embêtant, il y a notamment des problèmes de biométrie, de vie privée en général et puis d’accès aux institutions, aux administrations de l’État. C’est un petit gênant !

Luc : Notre sujet du jour c’est quoi ?

Nolwenn : C’est le mot de passe ça ? C’est « admin » d’admin ! Je prends le contrôle de l’émission !

Luc : Quoi ! Comment tu as trouvé ? Ce n’est pas possible ! Malheureusement le podcast est maintenant piraté par Nolwenn. On va parler piratage, c’est un sujet qui revient assez fréquemment et on peut peut-être déjà dire ce qu’est le piratage, en vrai, enfin en informatique.

Manu : Il y a la piraterie

Luc : Oui, la piraterie.

Manu : Effectivement, qui n’existe plus dans cette forme-là dans nos contextes. La piraterie c’est un autre problème.

Luc : La piraterie existe ailleurs sur terre mais pas juste à côté de chez nous.

Manu : Pas sur Internet. Le piratage c’est une manière de dire « les gens qui agressent nos systèmes avec leur informatique. »

Nico : Ça recouvre plein de choses. Ça va être les gens qui vont effectivement essayer d’aller voler les données dans un but vraiment crapuleux, se faire de l’argent derrière. Ça va être aussi toutes les nouvelles méthodes, les rançongiciels – « on a chiffré vos données et vous allez tout perdre si vous ne payez pas » –, le phishing. Ça couvre vraiment beaucoup de choses.

Luc : J’ai un souvenir lointain de Sony – à l’époque on gravait encore des CD audio, souvenez-vous, c’était il y a longtemps – qui avait mis ce qu’on appelle un rootkit dans un CD audio et avait mis des mouchards sur les ordinateurs de tous les gens qui mettaient le CD original, donc légalement acheté, dans le lecteur de leur ordinateur Windows et qui, ensuite, envoyait des informations. À l’époque j’avais lu partout que c’était, selon des définitions officielles, du piratage. Il n’y a pas que les délinquants qui sont pirates !

Nico : Ah non ! Sony était un délinquant dans ce cas-là. Il s’était fait taper dessus.

Luc : Oui, c’est vrai il n’y a pas que les malfrats ; ça ne marche pas non plus. OK ! Donc pirater en informatique c’est s’introduire sur un système quelconque où on n’est pas invité, où on n’est pas censé être ?

Nico : C’est ça, voilà.

Manu : Et dans ce sens-là, on peut tout être pirates.

Nico : On l’a tous été plus ou moins un jour !

Luc : Ah bon !

Nico : Essayer de casser le mot de passe d’un PC.

Luc : Moi je n’ai jamais fait ça !

Nico : Essayer de s’introduire sur la boîte mail du voisin !

Manu : Accéder à un site web sans y avoir été invité et y rester.

Luc : Il y a plein de sites web où tu n’es pas invité ! Quand je vais sur le site de n’importe quel journal, je suis sur leur site web et ils ne m’ont pas invité. C’est un site public.

Manu : C’est un site public justement.

Luc : C’est dans la partie qui va être privée. On a en tête une histoire de quelqu’un d’assez connu dans le milieu.

Nico : Bluetouff1, qui avait trouvé un document de l’ANSES, l’Agence nationale de sécurité sanitaire de l'alimentation, de l'environnement et du travail, qui avait fait un article sur les nanotechnologies et qui avait mis en ligne un document qui était supposé être confidentiel. Il avait été récupéré par Google et des journalistes étaient tombés dessus sans forcément se rendre compte de ce qu’ils avaient dans les mains. Et l’ANSES les avait poursuivis en justice, « les grands méchants pirates, vous nous avez piqué des données ». Ça avait été un gros bordel : comment quelqu’un qui va sur Google peut se retrouver à faire du piratage involontairement ? Ça avait été le grand débat devant les juges. C’est vrai que c’est parfois un énorme bordel de savoir quelle est la limite entre ce qu’est du piratage et ce qui n’en est pas, ce qui est de la malveillance.

Luc : Là il était dans un espace où les portes étaient ouvertes.

Nico : Oui, c’est ça.

Manu : C’était l’image d’un juge qui avait été donnée : si vous laissez les portes de votre maison ouverte et que quelqu’un rentre dedans, il n’a pas le droit de rentrer dedans même s’il peut le faire.

Luc : C’est ce qu’on lui avait reproché : de savoir qu’il était dans un espace qui aurait dû être fermé et pourtant de continuer à tout explorer.

Nolwenn : Oui, si au début il ne le savait pas forcément, il y a quand même eu un moment où il s’est rendu compte que ça n’allait pas.

Luc : Oui. Il y a quelques semaines, quand je n’étais pas là, vous avez parlé des moteurs de recherche, or les moteurs de recherche c’est bien ce qu’ils font : ils vont partout où ils peuvent, ils suivent les liens et ils indexent tout ça. Et c’était le cas puisque Bluetouff avait trouvé ce lien sur Google, pourquoi lui est condamné alors que finalement il y a un machin industriel automatisé qui est là pour aller dans toute l’arborescence ? On aurait dû condamner Google aussi !

Nolwenn : Oui, mais lui c’est pratique !

Manu : Et lui il le fait de manière automatique. On suppose qu’il n’a pas des intentions derrière. Avec le pirate on va vouloir faire un exemple et montrer aux autres humains qu’il ne faut pas faire la même chose. L’exemple est important !

Luc : Ce qui veut dire que dès lors que c’est automatique ce n’est pas grave. C’est l’intention qui compte, c’est ça ?

Manu : Voilà ! Tu viens de lever le loup. Effectivement, dans le piratage on peut supposer que l’intention est importante. Les accidents ou les résultats de techniques non désirés ne seraient pas forcément considérés comme du piratage.

Luc : Quand Facebook perd des millions et des centaines de millions de données personnelles, enfin les distribue abondamment à n’importe qui…

Nico : Ça c’est de la débilité, ce n’est pas du piratage.

Manu : De l’incompétence.

Nico : De l’incompétence.

Luc : L’intention ne compte pas ?

Nico : L’intention c’était de protéger les données à la base. C’est juste qu’ils ont mal fait ce qu’il fallait.

Luc : Ils les ont filées à tout le monde.

Nico : Ils les ont filées à tout le monde. C’était plus des bourdes ou des erreurs, ce n’était pas volontaire ; en tout cas, à priori, ce n’était pas volontaire.

Luc : Je pense qu’ils n’en ont rien à foutre.

Nico : La justice tranchera mais, effectivement, ils n’en avaient rien à foutre. Le piratage c’est une vraie volonté d’aller nuire à la personne, d’aller l’escroquer, d’aller généralement lui soutirer de l’argent.

Manu : Et de profiter d’elle.

Nico : Et de profiter.

Luc : Bluetouff ne voulait que explorer le truc pour voir. Après il a publié un truc où il disait, si ma mémoire est bonne, « regardez comme ce n’est pas bien sécurisé ».

Nico : Il avait un peu merdé en garde à vue, des choses comme ça. C’est compliqué quand même comme sujet.

Manu : À priori on peut supposer que le juge va chercher quel est le profit qui en a été retiré et, potentiellement, Bluetouff en avait retiré une certaine notoriété et il s’était fait reconnaître parce qu’il avait publié sur le sujet.

Luc : C’est un petit peu ambigu puisqu’on peut considérer que ce n’est pas vraiment nuire, mais bref ! N’importe qui peut se faire pirater. Toi, Nolwenn, tu as une expérience récente avec le piratage.

Nolwenn : Oui. C’était un piratage sans vraiment être un piratage. Tout d’un coup l’adresse mail d’une utilisatrice s’est mise à envoyer plein de mails d’une adresse e-mail inconnue, mais c’était elle qui en était à l’origine. Du coup on s’est retrouvé avec le serveur mail qui a été blacklisté partout.

Manu : Il a été mis sur liste ?

Nolwenn : Sur une liste noire.

Luc : Plus personne ne pouvait parler avec lui.

Nolwenn : On ne pouvait plus communiquer avec l’extérieur. Du coup on a bloqué le compte, on a fait ce qu’il fallait. On a fini par avoir le fin mot de l’histoire. En fait, c’est une personne qui avait mis du code sur GiHub et il se trouve que dans ce code sur GitHub il y avait des mots de passe. En dix minutes, elle s’est fait « pirater », entre guillemets, tout simplement parce que les mots de passe étaient accessibles en ligne.

Luc : Du coup les pirates aussi font des moteurs de recherche comme Google et c’est automatique, donc leur intention n’est pas mauvaise puis que c’est automatique !

Manu : Effectivement ! Maintenant tu pourrais indiquer qu’ils l’ont fait de manière automatique mais l’intention derrière était bien de profiter, d’aller envoyer du spam. Ils auraient pu aussi installer des troyens, d’ailleurs c’est peut-être le cas, ils auraient pu installer des mineurs pour générer des bitcoins en profitant de la machine et ils auraient volé quoi dans ce cas-là ? De l’électricité.

Luc : C’est effectivement ce qu’on risque quand on se fait pirater. Souvent, eh bien les gens s’en foutent un petit peu. On dit « oui, sur une grosse structure comme un hôpital par exemple ». En tout cas tout le monde peut se faire pirater, mais il y a plein de gens qui s’en foutent un petit peu. Qu’est-ce qu’on risque quand on se fait pirater en tant qu’individu ? On peut avoir le rançon…

Nico : Rançongiciel.

Luc : Rançon… Je n’y arrive pas !

Nico : Ransomware.

Nolwenn : On peut se faire rançonner.

Luc : Rançonner. Si on paye pas qu’est-ce qui se passe ?

Nico : Rien en fait. C’est tout le problème. Si on ne paye pas, rien. Il y a deux types de rançons, il y a les ransomwares où, effectivement, les données vont être chiffrées sur le disque dur, donc on a tout perdu si on ne paye pas et, si on paye, on peut potentiellement récupérer ses données. Généralement on les récupère parce que les pirates ont tout intérêt à ce que ça fonctionne, donc à savoir que si on paye on les récupère, plutôt que de savoir que si on paye on ne récupère rien. Mais tout le monde dit de ne surtout pas payer parce que ça incite ces gens-là à continuer.

Luc : Pour plein de gens sur leur ordinateur il n’y a rien de critique, leurs photos de vacances sont sur Facebook et ils se disent « ce n’est pas grave, j’achète un autre ordinateur », alors qu’ils pourraient réinstaller le système.

Nico : C’est ça. C’est vrai que pour les rares personnes qui ont des données vraiment critiques – on a eu des cas de thèses ou autres ou même d’entreprises qui ont eu, par exemple, toute leur comptabilité paralysée –, quand on n’a pas de backup, de sauvegarde, on va peut-être vouloir payer quelques milliers d’euros pour récupérer tout ça plutôt que de tout perdre.

Luc : Qu’est-ce qu’on risque d’autre quand on se fait pirater ?

Nico : Aujourd’hui, bizarrement, on ne risque plus grand-chose. Il y a quelques années, les machines étaient vraiment détournées pour y mettre du spam, ou on essayait de récupérer des données, vos codes de carte bancaire ; maintenant c’est plus des rançons, on va vous prendre votre disque dur.

Luc : Manifestement ça envoie quand même du spam. Dans l’exemple de Nolwenn, il y a ça.

Nico : Ça envoie du spam. Il y a toujours les vieux robots tournent pour envoyer du spam.

Luc : C’est ce qu’on appelle les botnets ?

Nico : Les botnets. Mais le gros, aujourd’hui, c’est surtout du phishing et du ransomware : vous faire acheter des produits qui ne servent à rien, vous dire que soi-disant vous avez été surpris sur webcam donc vous faire chanter : si vous ne payez pas on divulgue à tous vos contacts des vidéos compromettantes

Luc : Quoi ! Tu veux dire que j’ai payé pour rien !

[Rires]

Nico : C’est vrai qu’au-delà de ça, aujourd’hui les données sont beaucoup moins utilisées et exfiltrées qu’il y a quelque temps. Le risque est quand même minime.

Luc : La partie botnet ça veut dire qu’il y a quelqu’un, un pirate, qui va faire des trucs plus ou moins légaux comme envoyer du spam, miner des bitcoins où il a besoin de puissance de calcul, qui va s’installer sur un maximum de machines et, en fait, qui a une stratégie du parasite, c’est-à-dire qu’il va l’utiliser notamment quand l’utilisateur ne l’utilise pas, donc en gros la machine va pédaler, donc consommer plus d’électricité. J’ai déjà rencontré des gens qui disent « je m’en fous ». En gros leur machine est parasitée, mais tant qu’elle marche ça ne leur pose pas de problème.

Manu : Tu as utilisé le bon concept : parasitage. Ça veut dire qu’on peut supporter un parasite. C’est le cas de plein d’organismes dans la nature, ils supportent des parasites et ils arrivent à vivre, à survivre avec, parfois même de manière tout à fait acceptable. En fait, c’est juste la quantité de parasitage qui peu être gênante.

Luc : Oui, surtout que les GAFAM c’est aussi du parasitage d’une certaine façon, quand on met de la pub de partout !

Nico : Après c’est aussi des effets de bord. J’en ai fait les frais, même si je n’ai pas été piraté directement. Votre machine va aussi être infectée, va servir justement à relayer du spam ou à attaquer des services en face et, du coup, vous pouvez voir les flics débarquer chez vous et saisir votre matériel parce que dans la tête de celui qui se sera fait attaquer, c’est vous l’attaquant, ce n’est pas celui qui vous a utilisé comme relais. Du coup c’est vous qui avez des emmerdes à avoir véhiculé de la pédopornographie, à avoir consulté du terrorisme ou autre et là les conséquences peuvent être un peu plus chiantes.

Luc : Tu es en train de dire que, finalement, on ne peut pas jeter aux orties la question de la sécurité informatique et se dire qu’on s’en fout de se faire pirater.

Nico : Non ! Ça c’est sûr.

Nolwenn : Donc la conclusion ?

Luc : La conclusion c’est que la sécurité informatique c’est quand même important. Se faire pirater ce n’est pas bien, ne serait-ce que parce que ça peut servir à des gens vraiment pas recommandables et que, derrière, il peut y avoir des vrais drames humains.

Nico : Et faire gaffe à vos données ! Le jour où vous avez tout perdu vous serez dans la merde !

Nolwenn : Pensez aux sauvegardes !

Luc : Oui, c’est encore la meilleure précaution !

Manu : À la semaine prochaine !

Nico : Salut.

Nolwenn : Salut.


          

Obsolescence logicielle - Débat au Sénat - Septembre 2019

 Cache   


Logo du Sénat

Titre : Obsolescence logicielle - Projet de loi Économie circulaire
Intervenant·e·s : Brune Poirson, ministre - Marta de Cidrac, rapporteure - Guillaume Gontard, sénateur - Pierre Ouzoulias, sénateur - Alain Duran, sénateur - Frédéric Marchand, sénateur - Joël Labbé, sénateur - Bernard Jomier, sénateur - Olivier Cigolotti, sénateur - Éric Gold, sénateur - Jean-François Longeot, sénateur - Jean-Michel Houllegatte, sénateur - David Assouline, président de séance
Lieu : Sénat - Séance publique
Date : 25 septembre 2019 (après-midi)
Durée : 30 min 40
Visionner la vidéo de 17 h 14 min 02 s à 17 h 44 min 43 s
Licence de la transcription : Verbatim
Illustration : Logo du Sénat (France) - Image non libre de logo, utilisation tolérée au regard du droit des marques français
NB : transcription réalisée par nos soins, fidèle aux propos des intervenant·e·s mais rendant le discours fluide.
Les positions exprimées sont celles des personnes qui interviennent et ne rejoignent pas nécessairement celles de l'April, qui ne sera en aucun cas tenue responsable de leurs propos.

Transcription

David Assouline, président : Après l’article 4 ter, il y a le 170 rectifié présenté par monsieur Gontard.

Guillaume Gontard, sénateur : Merci Monsieur le président. Nous examinons maintenant une série d’amendements importants relatifs à l’obsolescence logicielle. Pour la clarté de nos débats, je me permets juste de préciser qu’il s’agit des méthodes par lesquelles un fabricant électronique rend inutilisable un appareil en imposant une solution logicielle, et particulièrement son système d’exploitation, inadaptée à ses capacités techniques – puissance, stockage, mémoire vive. Pour exemple les vieux ordinateurs PC ne sont pas suffisamment puissants pour faire tourner les nouvelles versions de Windows. De la même manière, les vieux téléphones portables ne tolèrent pas toujours les mises à jour récentes de leur système d’exploitation. Du coup l’appareil périclite, notamment à cause des failles de sécurité qui ne sont plus corrigées. Une autre variante : la mise à jour est trop lourde pour la puissance de l’appareil qui, du coup, fonctionne mal, voire plus du tout.
Notre amendement 169 relatif à l’obsolescence logicielle des ordinateurs a été jugé cavalier. En revanche, nos amendements sur l’obsolescence logicielle des téléphones portables ont été reçus. J’avoue ne pas bien saisir la distinction !
Je reviens cependant quelques instants sur le 169 parce qu’il était important et parce que j’aurais aimé proposer son pendant pour les téléphones. Je souhaite au moins attirer l’attention du Sénat et de la ministre sur cette problématique.
Pour lutter contre l’obsolescence logicielle il y a deux solutions : imposer des contraintes aux fabricants de systèmes d’exploitation, c’est l’objet des amendements 170 et 172 et d’autres de mes collègues, sur lesquels on reviendra dans quelques instants, et il y a une autre option qui consiste à installer un autre système d’exploitation sur la machine et tout particulièrement un logiciel tiers ou logiciel libre1.
Ces logiciels gratuits et en libre accès sont en général peu gourmands en mémoire ou en puissance. Pour les ordinateurs, le plus connu d’entre eux est Linux [GNU/Linux, NdT]. Pour les téléphones portables le phénomène est plus jeune mais se développe. Or certains appareils sont construits de sorte à ne pas autoriser d’autres systèmes d’exploitation que celui prévu par le fabricant. C’est le cas de certains ordinateurs et d’à peu près tous les modèles de téléphone portable.
Il faut donc interdire toute obstruction à l’installation de logiciels tiers sur les ordinateurs et les téléphones. Cette pratique est honteuse. C’est un vaste combat que j’invite la ministre à porter notamment à Bruxelles.

Merci.

David Assouline, président : Très bien. Avis de la commission, Madame la rapporteure.

Marta de Cidrac, rapporteure : Déjà vu en commission, cet amendement vise à imposer des conditions vraiment spécifiques d’information du consommateur sur les mises à jour du système d’exploitation des appareils. En fait, définir un régime spécifique à ce sujet dans la législation française semble avoir une portée limitée. Intervenir sur ces questions nécessiterait de mener un travail d’expertise spécifique pour établir un état des lieux clair des pratiques existantes et des facultés offertes par le droit en vigueur pour y répondre.
Donc la commission émet un avis défavorable.

David Assouline, président : Très bien. Madame la ministre, votre avis ?

Brune Poirson, ministre : Ce qui se pose là c’est vraiment la complexité, la complexité concrète de la mise en œuvre. Pourquoi ? Eh bien tout simplement parce qu’en fait votre amendement reviendrait à figer plusieurs étapes de la vie d’un logiciel, une par mise à jour évolutive, et ensuite, ensuite, à délivrer des mises à jour correctives pour chacune des étapes évolutives. Ça complexifierait énormément la gestion de ces logiciels et quand bien même on la renverrait au décret, eh bien la définition de ces deux types de mises à jour et leur séparation par le droit seraient extrêmement complexes. Tout cela est une question de mécanisme juridique qui rend les choses très complexes. Je crois qu’il faut qu’on travaille encore plus, en amont, avec les fabricants. À ce stade c’est extrêmement complexe, je l’ai déjà dit cinq ou six fois, à peu près, donc mon avis est défavorable.

David Assouline, président : Très bien. Monsieur Gontard.

Guillaume Gontard, sénateur : Je comprends bien que le sujet n’est pas forcément simple, mais c’est vrai que c’est encore une fois quelque chose qui me semble au cœur de ce texte et on nous propose un texte important. C’est vrai que je suis un petit peu surpris que toutes ces questions-là n’aient pas été, je dirais, réfléchies en amont. Cet amendement ne paraît pas si compliqué que ça puisqu’en fait on donne juste la possibilité au consommateur de choisir entre des mises à jour correctives et des mises à jour évolutives ; donc ça ne me paraît pas très compliqué, c’est juste de pouvoir garder un appareil un petit peu plus longtemps.

David Assouline, président : Bien. Pas d’autre explication de vote ? Qui est pour ? Qui est contre ? On va compter. On va compter de façon plus précise je veux dire, donc on recommence. Qui est pour ? [Le président compte jusqu’à 23 et demande à son voisin : « Vous en avez combien vous ? » — 23.] Qui est contre ? Il est rejeté.

Après l’article 4 ter, quatre amendements identiques. Le 115 rectifié pour commencer. Monsieur Ouzoulias vous avez la parole.

Pierre Ouzoulias, sénateur : Merci Monsieur le président. Madame la ministre. Mes chers collègues, mon collègue Guillaume Gontard vous a déjà présenté une partie de la problématique, je ne vais pas la répéter. Je voudrais simplement vous rappeler qu’il y a deux causes fondamentales qui empêchent la réutilisation, le recyclage, la réparation de certains biens dont notamment les ordinateurs dont il est question ici, ce sont des problèmes techniques : les composants sont soudés et on ne peut pas les changer, je ne développe pas, et ensuite les problèmes logiciels. Là c’est un peu plus compliqué et vous me permettrez de vous présenter un exemple simple et concret que j’ai recueilli dans une communauté Emmaüs dans laquelle il arrive de nombreux ordinateurs qui sont en parfait état de marche, qui pourraient continuer une existence paisible ailleurs, mais il se trouve que dans la carte mère elle-même il y a un dispositif2 qui ne permet pas à l’ordinateur de redémarrer sur un autre système d’exploitation que celui avec lequel vous l’avez acheté. Et, bien évidemment, les personnes qui reçoivent ce don ne sont pas en mesure d’acheter les licences de la société qui commence par un « M » et vous aurez compris de qui il s’agit. Ce qui fait que ces ordinateurs, qui sont donnés, vont finalement à la poubelle parce qu’ils ne peuvent pas être réutilisés.
Par le passé, ces dispositifs, qui portent des noms anglais que je vous épargne, n’existaient pas. Ce sont des choses relativement récentes. Le but de notre amendement c’est éviter justement ce couplage entre l’ordinateur et le système d’exploitation pour permettre la réutilisation de l’ordinateur avec des systèmes d’exploitation tiers, comme vous l’a très justement expliqué mon collègue Gontard.
Voilà en quelques mots. Vous me permettrez d’appeler cet amendement l’amendement Emmaüs. Merci.

David Assouline, président : Très bien. Monsieur Duran va présenter cet amendement 348 rectifié bis. Vous avez la parole cher collègue.

Alain Duran, sénateur : Merci Monsieur le président. Madame la ministre. Mes chers collègues. Cet amendement vise à lutter contre l’obsolescence programmée et renforcer la durée de vie des produits en interdisant tout simplement tout procédé technique visant à rendre irréparable ou non reconditionnable un produit ; notre collègue vient de l’illustrer brillamment. Par cette interdiction d’une pierre deux coups : il s’agit également de soutenir non pas seulement les bricoleurs du dimanche mais le secteur de la réparation et du réemploi qui sont des piliers de l’économie circulaire, Madame la ministre, en luttant contre ces pratiques industrielles en totale opposition avec l’économie circulaire.
Entre 2014 et 2017, le volume des produits ménagers réemployés ou réutilisés a augmenté de 30 % et, selon certains sondages, trois quarts des Européens indiquent préférer réparer leurs appareils que les changer.
Ce marché en pleine extension, générateur d’emplois, doit être soutenu. Il apparaît donc nécessaire de lutter contre toute technique industrielle visant à rendre un produit ou un bien irréparable ou non reconditionnable. C’est l’objet du présent amendement.

David Assouline, président : Très bien. Et puis l’amendement 565 rectifié. Monsieur Marchand vous avez la parole.

Frédéric Marchand, sénateur : Oui. Monsieur le président. Madame la ministre. Petite démonstration par l’exemple avec ce téléphone portable [le sénateur brandit son téléphone portable, NdT] dont je ne citerai pas la marque. Si demain il m’échappe malencontreusement des mains et que l’écran se fissure ou s’il tombe en panne, je pourrai découvrir en tentant de le faire réparer que ses composants sont collés, soudés, empêchant de fait toute réparation, même par des professionnels. Pourtant, au cœur de l’économie circulaire, le conditionnement et la réparation apparaissent comme des piliers, il est donc problématique de ne pas pouvoir changer un composant qui devrait pourtant pouvoir se réparer aisément.
L’amendement vise donc à sanctuariser le droit à la réparation en interdisant toute pratique visant à rendre impossible la réparation hors des circuits agréés.

David Assouline, président : Voilà. Ce sont donc quatre amendements identiques. Monsieur Labbé pour le quatrième.

Joël Labbé, sénateur : Monsieur le président. Madame la ministre. Mes chers collègues. Comme les précédents, cet amendement vise à interdire les techniques employées par certains fabricants pour programmer l’obsolescence des biens qu’ils fournissent. Nous le savons, c’est devenu un sport international, certains fabricants mettent en œuvre des procédés qui rendent les biens qu’ils produisent absolument irréparables. C’est ce phénomène, d’ailleurs, qui a amené à la naissance de l’association HOP3, Halte à l’obsolescence programmée, à l’origine de cet amendement. Et à l’origine de l’association HOP, il y avait quelqu’un qui s’appelle Laetitia Vasseur, qui était collaboratrice parlementaire du sénateur Jean-Vincent Placé qui avait porté la première proposition de loi concernant l’obsolescence programmée dans cette assemblée.
Par exemple les smartphones, ordinateurs ou tablettes sont parfois conçus avec des composants collés ou soudés qui empêchent toute réparation même par des professionnels. Comment peut-on encore autoriser ce genre de pratique à l’heure des enjeux environnementaux auxquels nous faisons face ? Il est essentiel d’inscrire dans la loi un droit à la réparation en considérant, comme le propose l’amendement, la notion de réparabilité du produit comme une des caractéristiques essentielles d’un bien. Ce n’est qu’en rendant possible la réparation que nous pourrons en finir avec la culture de l’usage unique, du jetable, créer des emplois locaux dans ces filières et développer une véritable économie circulaire à la fois durable et pourvoyeuse de proximité. Et puis, j’insiste encore, et donner de bons signes à nos lycéennes et lycéens qui marchent dans la rue pour nous interpeller.

David Assouline, président : Très bien. Sur ces amendements identiques, l’avis de la commission Madame la rapporteure ?

Marta de Cidrac, rapporteure : Ces amendements identiques portent sur un sujet connexe à l’obsolescence programmée puisqu’ils visent à interdire les techniques notamment logicielles qui visent à rendre la réparation ou le reconditionnement d’un appareil impossibles hors de circuits agréés. Les techniques qui sont déployées par certains fabricants pour entraver ou empêcher la réparation de leurs produits, en particulier évidemment électroniques, sont inacceptables, on est bien d’accord avec vous, en particulier lorsqu’elles visent à assurer que le produit ne pourra être pris en charge que par un marché restreint et contrôlé de réparateurs. Nous sommes toujours d’accord avec vous jusqu’à cette étape. Néanmoins, l’infraction d’obsolescence programmée permet potentiellement d’intégrer ces pratiques sans qu’il paraisse nécessaire d’insérer une disposition spécifique à ce sujet.
En outre, je souhaitais quand même partager avec vous qu’il faut avoir à l’esprit, et notamment par rapport à l’observation de notre collègue Marchand, que certaines des pratiques parfois mises en cause visent à assurer certaines qualités attendues du consommateur comme l’étanchéité ou la solidité des appareils, d’où parfois l’inaccessibilité à certains composants.
Donc l’avis de la commission est défavorable pour les deux amendements.

David Assouline, président : C’est plus que deux ! C’est quatre amendements !

Marta de Cidrac, rapporteure : Pardon. Excusez-moi. Pour les quatre amendements, bien sûr.

David Assouline, président : Madame la ministre, votre avis ?

Brune Poirson, ministre : Là encore on se heurte à d’importantes difficultés. D’abord il est difficile de démontrer qu’une technique, et surtout une technique logicielle, vise spécifiquement à empêcher la réparation hors des circuits agréés. Comment prouver aussi, par exemple, qu’un fabricant l’a fait de façon intentionnelle ? Je crois que c’est très difficile de démontrer, de façon irréfutable, qu’un fabricant a intentionnellement rendu son produit irréparable. D’une part. D’autre part, l’obsolescence programmée est déjà considérée comme un délit dans la loi française. Donc si on a du mal à le démontrer, à ce moment-là le fabricant ne pourra pas être tenu pour responsable.
En plus de ça, pour ce qui est de faire de la réparabilité une caractéristique principale du produit, le droit communautaire liste limitativement les caractéristiques essentielles des produits et la réparabilité n’y figure pas. La réintroduire en droit français serait fragile juridiquement. Donc c’est compliqué et en amont et ensuite pour le démontrer juridiquement, sachant déjà que la notion d’intentionnalité est difficile, sachant qu’on a déjà, en droit français, le fait que l’obsolescence programmée soit considérée comme un délit.
Donc à ce titre-là, et je rebondis aussi sur une grande partie de l’argumentaire de Madame la rapporteure, eh bien j’émets un avis défavorable.

David Assouline, président : Nous allons passer aux votes. Monsieur Ouzoulias.

Pierre Ouzoulias, sénateur : Je trouve que le débat est décevant Madame la ministre. Je pense que ce qui était intéressant c’était de réfléchir à un horizon d’attente et, par rapport aux ordinateurs et aux portables, ici nous portons tous un objectif lointain, on est d’accord, qui est celui de la neutralité des terminaux. C’est-à-dire que vous achetez du matériel qui est distinguable de son système d’exploitation, ce qui vous permet ensuite de pouvoir utiliser ce même matériel avec d’autres logiciels, d’autres systèmes d’exploitation. Là on est modestes, on ne va pas aussi loin. On est modestes ! Là, ce qu’on vise simplement, c’est revenir à une situation ante diem où, en effet, il y avait une distinction entre l’ordinateur que vous achetiez et le système d’exploitation. Aujourd’hui les deux ont été fusionnés. Donc nous avons reculé par rapport à un recyclage qui était facile il y a quelque temps.
Je ne comprends pas votre position et là vous me permettrez de ne pas défendre le lobby de Microsoft en vous disant que des entreprises solidaires, comme Emmaüs, ont besoin aujourd’hui de pouvoir reconditionner ces ordinateurs pour leur donner une nouvelle vie et aujourd’hui elles ne peuvent pas. C’est un pur scandale ! C’est un pur scandale notamment au moment où on essaye de régler la fracture numérique ! Il y a des gens qui ont besoin de ces ordinateurs pour pouvoir entreprendre des démarches administratives. Ils pourraient le faire, les ordinateurs existent, et aujourd’hui ils ne le peuvent pas parce que vous protégez les intérêts de Microsoft !

[Applaudissements]

David Assouline, président : Nous allons passer au vote. Qui est pour ? [en off, ça passe, ça passe !] Quand les votes sont comme ça serrés, comme vous le constatez, essayez de laisser la main levée. C’est bon. Qui est contre ? [en off, il passe !] Ils sont adoptés.

[Applaudissements]

David Assouline, président : Nous passons après l’article 4 ter à quatre amendements identiques à nouveau, dont le 172 rectifié pour commencer. Monsieur Ouzoulias vous avez la parole.

Pierre Ouzoulias, sénateur : Merci Monsieur le président. Merci Madame la ministre. Merci chers collègues pour votre vote. Là il s’agit de l’amendement qui est finalement consécutif à la demande de rapport que vous avez adoptée à la suite de l’excellente présentation de mes collègues Bigot et Longeot et l’objectif vise à empêcher l’obsolescence des logiciels et nous, Madame la ministre, nous avons travaillé et nous vous proposons un système intéressant qui, finalement, renverse la charge de la preuve. C’est-à-dire que ce qu’on vous propose c’est de ne pas identifier l’obsolescence programmée, mais c’est d’imposer aux constructeurs de logiciels la permanence du système d’exploitation pour assurer une durée de vie supérieure aux portables et aux ordinateurs. Là on a mis une date de dix ans ; aujourd’hui, malheureusement, les machines n’ont pas cette durée de vie, mais c’est au moins pour permettre aux personnes de pouvoir utiliser leur portable alors que vous savez comme moi qu’on est submergés par des mises à niveau qui, tout doucement, les rendent obsolètes.
Voilà l’objectif de l’amendement.

David Assouline, président : Très bien. Monsieur Jomier pour l’amendement 268 rectifié.

Bernard Jomier, sénateur : Merci Monsieur le président. Qui est le même que celui que mon collègue Ouzoulias a brillamment présenté. Je voudrais ajouter deux points sur cette thématique. Madame la ministre vous nous avez dit, et c’est juste, « nous avons de grandes difficultés à déterminer les infractions, à déterminer la volonté de mettre en place une obsolescence programmée par des fabricants, qui est effectivement illégale ». C’est bien que le cadre législatif est insuffisant et le travail qu’on est en train d’essayer de faire c’est de poser de nouvelles bornes justement en analysant la situation que nous constatons tous, je pense de façon unanime, qui est que l’interdiction de l’obsolescence programmée n’est pas respectée par un certain nombre de fabricants. Donc en posant ces différents amendements, nous voulons apporter des réponses concrètes pour que ce que vous regrettez avec nous, la difficulté à la prouver, puisse plus facilement être établie.
Le deuxième point, c’est que je pense qu’on a beaucoup trop longtemps accepté que des fabricants, à l’occasion du développement de l’informatique et de la présence des logiciels dans les matériels, dissocient le matériel de la fonctionnalité. Pour reprendre l’exemple que vous avez pris tout à l’heure des lave-linge, quand les lave-linge ont été mis sur le marché par la suite, est-ce qu’on imagine qu’il aurait été possible qu’au bout de deux ou trois ans on dise « ma machine lave, elle essore, mais elle ne rince plus ! — Oui, eh bien il faut changer la machine. » Non ! Or là c’est exactement ce qui se passe avec un certain nombre de matériaux électroniques, en l’occurrence les smartphones, où on dit au bout de peu de temps, eh bien oui, ça ne fonctionne plus et il faut procéder à des changements.
Tout ce travail qu’on essaye de faire vise à répondre concrètement à cette problématique et j’espère que vous donnerez un avis favorable à cet amendement qui est un amendement tout à fait simple, mais qui portera une borne efficace, un arrêt efficace aux pratiques d’obsolescence programmée.
Je vous remercie.

David Assouline, président : Très bien. L’amendement suivant 291 rectifié ter présenté par monsieur Cigolotti.

Olivier Cigolotti, sénateur : Monsieur le président, Madame la ministre, mes chers collègues, je crois que l’amendement a été très bien défendu donc il n’y a rien à rajouter sur ce point.

David Assouline, président : Très bien. Toujours identique, 419 rectifié bis. Monsieur Gold.

Éric Gold, sénateur : Oui. Merci Monsieur le président. Je vais insister à nouveau sur cet amendement, notamment sur l’obsolescence logicielle. Aujourd’hui les mises à jour des systèmes d’exploitation des téléphones mobiles et des tablettes provoquent de lourds dysfonctionnements des appareils qui pourraient être encore longtemps utilisés. Elles déclenchent ainsi l’obsolescence prématurée des équipements dès lors que le fabricant ou l’éditeur de logiciel le décident en forçant l’utilisateur à les installer. Il convient donc de distinguer les mises à jour évolutives des mises à jour correctives. Les premières ne sont pas indispensables, ce qui n’est pas le cas des secondes qui améliorent le fonctionnement et la sécurité des appareils. Le présent amendement vise donc à garantir que les consommateurs bénéficieront de mises à jour correctives, quel que soit le modèle détenu et ce, pendant dix ans.

David Assouline, président : Merci. Madame la rapporteure, à vous sur ces quatre amendements identiques.

Marta de Cidrac, rapporteure : Tous ces amendements visent à imposer aux fabricants de téléphones portables et de tablettes tactiles de proposer des mises à jour logicielles qui restent compatibles pendant dix ans avec tout modèle. Le non-respect de cette obligation serait passible d’une peine de deux ans d’emprisonnement et de 300 000 euros. Je rappelle que la problématique de l‘obsolescence logicielle avait bien été identifiée par l’excellent rapport de la mission d’information sur le recyclage des téléphones portables4 de septembre 2016 – je vois que monsieur Jean-François Longeot nous rejoint pour entendre ces belles paroles qui le concernent – et notre ancienne collègue Marie-Christine Blandin la rapporteure de l’époque.
Autant nous comprenons l’enjeu de l’obsolescence logicielle, autant il paraît peut-être excessif de proposer une obligation d’une durée de dix ans au vu de l’évolution des technologies, a fortiori en sanctionnant les manquements à une telle obligation à une peine analogue à l’obsolescence programmée.
Donc je vais demande Madame la ministre l’avis du gouvernement sur des amendements et nous voterons après.

David Assouline, président : Bien. Je le devine, Madame la ministre.

Brune Poirson, ministre : L’amendement que vous proposez va au-delà de la lutte contre l’obsolescence programmée parce qu’il impose aux constructeurs des solutions techniques de compatibilité des systèmes d’exploitation dans le temps. Donc il me semble que le niveau de contrainte que ça imposerait aux metteurs sur le marché est particulièrement drastique. Je rappelle que le délit d’obsolescence programmée se caractérise par une volonté du producteur de tromperie dont le but serait de raccourcir sciemment et de façon anormale la durée de vie des produits.
La mesure que vous proposez ici va au-delà de cette définition. Au surplus, une durée de dix ans serait en toute hypothèse très longue par rapport à la durée de vie de ce type d’équipement. Il ne faut pas oublier de ce dont on parle ; on parle parfois d’appareils électroniques et même électroménagers. Bien sûr, il faudrait que ça soit dix ans, mais parfois rappelons-nous de ce dont on parle. On a du mal à atteindre cette durée-là et il faut changer en profondeur notre rapport à ces appareils et à ces outils.

Donc en l’état, eh bien j’émets un avis défavorable.

David Assouline, président : Monsieur Ouzoulias, maintenant pour les explications de vote.

Pierre Ouzoulias, sénateur : Oui. Merci Monsieur le président. Madame la ministre, là il s’agit uniquement de la garantie logicielle. L’amendement porte exclusivement sur la garantie logicielle, pas du tout sur l’électroménager.
J’ai eu tout jeune, il y a quelque temps donc, un ordinateur dont je tairai la marque, que j’ai gardé 12/13 ans. Il y avait de temps en temps, de temps en temps ! Rarement, tous les deux/trois ans, une remise à niveau logicielle. C’est très peu de chose ! Pour un fabricant de logiciels, entretenir des vieux systèmes comme ça ce n’est pas un problème. L’objectif du fabricant, justement, c’est que vous abandonniez votre machine pour la changer pour une autre. Je ne vois pas où est le surcoût pour les entreprises en question. En revanche, pour les consommateurs qui n’ont pas besoin de se lancer dans une course effrénée à la performance toujours renouvelée, garder sa vieille machine et avoir l’assurance qu’elle est encore compatible avec un certain nombre de normes informatiques, ça c’est tout à fait essentiel.

David Assouline, président : Très bien. Monsieur Gontard pour explication de vote.

Guillaume Gontard, sénateur : Oui. Merci Monsieur le président. Il s’agit bien ici de trouver une solution pour les vieux appareils et une précision par rapport à ce qui a été dit : l’obligation s’applique bien aux constructeurs de téléphones et pas aux fournisseurs du système d’exploitation. En effet, je rappelle par exemple que le système d’exploitation Android, produit par Google, équipe de nombreux téléphones de différentes marques, mais chacun des constructeurs adapte le logiciel Android à son appareil notamment en appliquant une surcouche sur la carte mère du téléphone.
Précisons aussi que le système Android de Google est disponible en libre accès pour tous ses clients avec une mise à jour corrective de chacune de ses versions durant une période de six à sept ans. L’obligation va donc s’appliquer au constructeur qui est le dépositaire final du système d’exploitation. Charge à lui ensuite, dans sa relation contractuelle avec Google, de lui demander d’allonger de sept à dix ans les mises à jour des vieilles versions d’Android.
Il est particulièrement insupportable qu’un appareil parfaitement fonctionnel soit rendu inutilisable par une simple mise à jour de logicielle. Les pratiques des constructeurs téléphoniques en la matière sont particulièrement déloyales et honteuses et elles ont d’ailleurs valu à Apple et Samsung des amendes respectives de dix et cinq millions d’euros en Italie ; en France, une enquête similaire est en cours. Il me semble qu’on a là l’occasion d’agir.

David Assouline, président : Monsieur Longeot pour explication de vote.

Jean-François Longeot, sénateur : Oui. Merci Monsieur le président. Madame la ministre. Comme vient de le dire monsieur Gontard, effectivement on a là l’occasion d’agir. Ça me parait important. Il se commercialise aujourd’hui environ 25 millions de téléphones portables par an et ces téléphones sont effectivement régulièrement changés ; il n’y a pas que le fait de l’obsolescence programmée, il y a aussi la mode qui fait qu’on les change. Je pense que cet amendement est important parce que si on n’attire pas l’attention et je le disais tout à l’heure, vous le savez c’est fait avec des terres rares, c’est fait avec des matériaux précieux et si on ne donne pas un délai de vie à ces appareils, ça posera véritablement un problème. Je suis effectivement très défenseur de cet amendement non pas parce que c’est moi qui l’ai fait, mais simplement parce que je me suis bien rendu compte dans le rapport que l’on a établi avec ma collègue Blandin, que ces appareils coûtent quand même relativement cher et qui, d’un seul coup, ne fonctionnent plus, je trouve qu’il y a quand même quelque chose ! Peut-être que dix ans c’est trop, je ne sais pas, mais je pense qu’il faut au moins montrer déjà un, qu’on a bien analysé les choses et qu’on n’est quand même pas complètement stupides dans cette affaire-là et puis deux, qu’il faut que nos constructeurs s’adaptent et adaptent un petit peu les appareils pour qu’ils puissent durer. Merci.

David Assouline, président : Très bien. Pour explication de vote enfin Monsieur Houllegatte.

Jean-Michel Houllegatte, sénateur : Oui. Monsieur le président, Madame la ministre. Je voudrais insister sur la nécessité de l’urgence d’agir et d’envoyer des messages. Nous sommes maintenant, la société, dans l’ère du numérique. On parlait d’électroménager tout à l’heure, même en termes d’électroménager, il n’y a pas une interface homme-machine qui ne soit désormais assurée par un système numérique et notamment l’importance du portable qui fait qu’à partir de notre portable on pourra, et on commence déjà à le faire, piloter tout un tas de systèmes domestiques dans la maison. Donc à l’ère des objets connectés, l’importance d’insister sur l’obsolescence ou le risque d’obsolescence programmée de ces différents appareils me semble déterminant.

David Assouline, président : Très bien. Nous allons passer au vote sur ces quatre amendements identiques, avec les avis négatifs de la commission et du gouvernement, comme depuis le début. Qui est pour ? Qui est contre ? Ils sont adoptés.

[Applaudissements]


          

Payments Offensive Test Engineer

 Cache   
Payments Counter Fraud - Offensive Test Engineer

Primary Job Responsibilities

A successful Offensive Test Engineer should possess a deep understanding of software security, computer science and hacking. They should be comfortable with advanced concepts such as application manipulation, exploit development, and stealthy operations.

This role is for experienced Offensive test engineers and hackers who can test the resiliency of eBays Payments systems in real world conditions. If you are an automated tool type of person this role is not for you.

This career is technical and meaningful with opportunities to work in some of the most exciting areas of Cyber Crime, hacking and exploit research. You will work on very technical and relevant offensive emulation testing campaigns with some of the best engineering talent in the game as you test technology, systems and processes.

A typical day could be breaking into secure communication channels, reverse engineering applications, APIs and encryption methods in order to gain access to sensitive data, all without being detected.

If you can exploit complex systems while remaining stealthy, identify and exploit misconfigurations, think like a Cyber Criminal, then youre the type of outstanding and hardworking individual were looking for.

Giving back to the community by supporting our customers, sellers and partners through outreach is strongly supported and central to our ethos. Expect to author white-papers, speak at conferences and meet with our community.

Key Responsibilities

  • The Payments Counter Fraud team will be conducting targeted Campaigns and exploitations without the use of automated tools against "real world" systems, technology and processes.
  • Research new tools, techniques, countermeasures and vulnerabilities, data exploitation and Cyber Crime malware and hacking trends.
  • Research emerging Cyber Crime threats, campaigns, threat actors, tactics, techniques, and procedures
  • Utilize honeypots to seek for new attacks and perform behavioural analysis on malware
  • Use and support threat-related data science research and development
  • Importantly, the ability to communicate complex technical concepts to non-technical people and the ability to go deep with engineers

    Working with eBay Teams

    • Work with Developers, Architecture, Product Management, Quality, and Operations teams to develop innovative solutions that meet business needs with respect to Functionality, Performance, Scalability, Reliability, realistic implementation schedules and alignment to development principles and product goals
    • Coach, guide and mentor teams on architecture direction and tech-stack to deliver excellent customer experiences in a way that builds resilient businesses
    • Communicate insights and recommendations across the organization
    • Close teamkwork and alignment with all relevant eBay departments and partners across the business within a dynamic, success-oriented culture
    • Strong interpersonal skills with the ability to drive issue resolution and root cause identification with the various teams

      Qualifications

      • Bachelors degree or substantial equivalent experience.
      • 5 years experience as an expert hacker is helpful but not mandatory.
      • Recognize and safely utilize attacker tools, tactics, and procedures
      • Develop scripts, tools, or methodologies to improve eBay's Counter Fraud and red teaming processes
      • Network penetration testing and manipulation of network infrastructure
      • Mobile, Web & API security testing
      • Developing, extending, or modifying exploits, shellcode or exploit tools
      • Developing applications in C#, ASP, .NET, ObjectiveC, Go, or Java (J2EE)
      • Reverse engineering malware, data obfuscators, or ciphers
      • Source code review for security flaws
      • Thorough understanding of network protocols and covert channels
      • The Highest standards of personal integrity, professional conduct and ethics.
      • Excellent written (report writing) and verbal communication skills.
      • Financial sector experience is advantageous
      • You should be enthusiastic, focused, detailed and organized
      • Shown ability to understand the business and make appropriate trade-offs and contribute to technology direction that leads to measurable business improvements
      • Strong analytical, problem-solving skills, verbal and written social skills
      • Ability to work in a dynamic, iterative development environment

        Location

        This role is open to any US or UK location including remote working for the right person.

        Here at eBay, we love creating opportunities for others by connecting people from widely diverse backgrounds, perspectives, and geographies. So, being diverse and inclusive isnt just something we strive for, it is who we are, and part of what we do each and every single day. We want to ensure that as an employee, you feel eBay is a place where, no matter who you are, you feel safe, included, and that you have the opportunity to bring your unique self to work.. To learn about eBays Diversity & Inclusion click here: https://www.ebayinc.com/our-company/diversity-inclusion/.
        This website uses cookies to enhance your experience. By continuing to browse the site, you agree to our use of cookies

        View our privacy policy

        View our accessibility info

        eBay Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, sex, sexual orientation, gender identity, veteran status, and disability, or other legally protected status. If you are unable to submit an application because of incompatible assistive technology or a disability, please contact us at talent@ebay.com. We will make every effort to respond to your request for disability assistance as soon as possible.

        For more information see:

        EEO is the Law Poster

        EEO is the Law Poster Supplement
          

Principal Engineer

 Cache   
SunIRef:Manu:title Principal Engineer Verizon 25,388 reviews - Irving, TX 75038 Verizon 25,388 reviews Read what people are saying about working here. What you'll be doing... In the digital world, the network drives business performance, and nobody does the network better than Verizon. Spanning six continents and more than 800,000 route miles, our networks provide the essential platform our customers need to grow. You are a highly motivated individual with a background in product management and system engineering and are passionate about delivering amazing and innovative customer experiences. You are comfortable with all phases of the product development process from strategy and ideation through design and commercialization. You will collaborate extensively with Original Equipment Manufacturers (OEMs) as well as a large number of cross-functional teams within Verizon to achieve business objectives. You are a hands-on problem solver with a positive attitude, letting nothing stand in the way. You know how to clarify the path forward and prioritize work. You know how to influence others. Responsibilities associated with this position include: Leading the design and development of large-scale, complex technical solutions to bring new customer experiences to market against aggressive schedules. Architecting technical solutions and system engineer IT/Network/OEM components. Defining the end-to-end customer experience and write/prioritize/groom technical requirements. Creating an overall project schedule and independently manage a large cross-functional team to protect project scope and deliver against interim milestones to ensure time to market. Outlining the overall test strategy and define test cases to ensure that enhancements are delivered with quality. Preparing support materials to educate and prepare frontline teams for commercial launch. Investigating and resolve post-launch issues. Leveraging data/analytics to make decisions, but also knowing when to make the right decision with the data isn't available. What we're looking for... You'll need to have: Bachelor's degree or four or more years of work experience. Six or more years of relevant work experience. Willingness to travel. Even better if you have: Bachelor's degree or four or more years of work experience. A track record in technology design, system engineering, and solution innovation. Demonstrated ability to successfully integrate technologies across a variety of disciplines in order to deliver solutions focused on the end-to-end customer experience. Excellent verbal and written communication skills. Willingness to take complete ownership of project deliverables in order to meet scheduled timelines. Ability to concurrently balance multiple projects of varying scope and duration. Ability to work independently with minimal direct supervision. Highly organized with exceptional attention to detail. Experience leading product teams to successful product launches. Experience in a telecommunications company, systems integration/solutions company, or IT team in a large corporation. Experience in product ownership/management in an agile environment. A desire to define, build, test, and launch products and services. A drive for results when developing new methodologies and exploiting cutting-edge technologies to push our product and service portfolio even further. The ability to thrive and adapt in a dynamic, fast-paced environment. Sophisticated influencing and negotiation skills. When you join Verizon... You'll have the power to go beyond - doing the work that's transforming how people, businesses and things connect with each other. Not only do we provide the fastest and most reliable network for our customers, but we were first to 5G - a quantum leap in connectivity. Our connected solutions are making communities stronger and enabling energy efficiency. Here, you'll have the ability to make an impact and create positive change. Whether you think in code, words, pictures or numbers, join our team of the best and brightest. We offer great pay, amazing benefits and opportunity to learn and grow in every role. Together we'll go far. Equal Employment Opportunity We're proud to be an equal opportunity employer- and celebrate our employees' differences, including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. Different makes us better. Verizon - Today report job - original job
          

Abortion The Ultimate Exploitation of Women

 Cache   

Abortion The Ultimate Exploitation of Women
Brian E Fisher, "Abortion: The Ultimate Exploitation of Women"
2014 | pages: 209 | ISBN: 161448838X | PDF | 1,0 mb


          

Video Interview: Peter Singer on The Global Kidney Exchange Programme

 Cache   
In this interview with Katrien Devolder, Peter Singer defends the Global Kidney Exchange (GKE) programme, which matches donor–recipient pairs across high-income, medium-income, and low-income countries. The GKE has been accused of being a form of organ trafficking, exploiting the poor, and involving coercion and commodification of donors. Peter Singer refutes these claims, and argues that […]
          

VP, Sales Marketing

 Cache   
Comcast brings together the best in media and technology. We drive innovation to create the world's best entertainment and online experiences. As a Fortune 40 leader, we set the pace in a variety of innovative and fascinating businesses and create career opportunities across a wide range of locations and disciplines. We are at the forefront of change and move at an amazing pace, thanks to our remarkable people, who bring cutting-edge products and services to life for millions of customers every day. If you share in our passion for teamwork, our vision to revolutionize industries and our goal to lead the future in media and technology, we want you to fast-forward your career at Comcast. Day 1 benefits for new hires! Job Summary: Seeking a strong marketer with a successful track record in developing demand generation programs specific to the B2B world. Needs exceptional skill at driving acquisition and up-sell based programs that result in increased call volumes both inbound and outbound, lead generation, sales and revenue with prospects and existing Customers. Should also have a strong background in direct sales support including local marketing programs, event planning and execution. The candidate will have worked in the Telecom and High-Tech industries, is very familiar with direct sales, the consultative solution selling process, needs based positioning and marketing, telecommunications products and services, and pricing. Employees at all levels are expected to: - Understand our Operating Principles; make them the guidelines for how you do your job - Own the customer experience - think and act in ways that put our customers first, give them seamless digital options at every touchpoint, and make them promoters of our products and services - Know your stuff - be enthusiastic learner, user and advocate of our game-changing technology, products and services, especially our digital tools and experiences - Win as a team - make big things happen by working together and being open to new ideas - Be an active part of the Net Promoter System - a way of working that brings more employee and customer feedback into the company - by joining huddles, making call backs and helping us elevate opportunities to do better for our customers - Drive results and growth - Respect and promote inclusion and diversity - Do what's right for each other, our customers, investors and our communities Overview: - Lead all aspects of marketing to SMB and Enterprise customer segments, including direct response marketing, events marketing, retention marketing, and referral programs. - Perform functions including, budgeting, market planning, media planning, public relations, and up-sell marketing. - Develop and execute programs to achieve net add and sales goals, market share growth through a variety of sales channels including direct reps, inbound sales, agents, affinity, and referral channels. - Work closely with Corporate Marketing to develop Go-to-Market strategies, including the Playbook that defines the offers and tactics to deliver the Sales goals. Will also develop retention programs to increase revenue per customer. - Support the deployment of new products to sales channels - Review and analyze budget performance to determine trends in effectiveness of various marketing programs - Establish rapport, credibility and trust within a matrixed operating environment that requires extensive collaboration and indirect leadership - Provide leadership and stays closely aligned with field marketing to drive local lead generation activities - Monitor competitive trends and exploit competitive advantage and differentiation. - Participate in developing long-term plans that impact the achievement of business growth targets. Recognize profitability and revenue potential in business opportunities. Primary Responsibilities: - Deliver budgeted sales, revenue, P & L, OCF - Execute the Marketing Playbook - run the play at Division level and Region level - Execute the Demand Generation plan. - Develop the annual marketing plan and the strategies, tactics, and resources necessary to achieve department and business objectives. - Track results of local marketing programs, including ROI analysis - Collect, analyze, and develop response to competitive offers - Track competitive landscape and maintain the Competitive Landscape Report - Recommend offer strategies and packaging to drive sales - Develop media plans in coordination with HQ marketing - Execute media plans, including local cross channel - Partner and drive local public relations to place Business Services articles in local publications - Deliver customer approvals for testimonials, press releases, case studies, references - Plan and forecast call volumes both inbound and outbound for call centers by campaign, by Region - Partner with Sales to drive Rep productivity, including fully stocking their sales toolbox - Plan and execute local marketing programs including (but not limited to) sponsorships, speaking engagements, lobby events, building programs, trade shows - Provide thought leadership on offers, promotions, and closing tools that break inertia - Develop competitive responses with HQ Marketing Job Specification: - Bachelors Degree, MBA preferred - Generally requires 15+ years related experience Additional Requirements: - Collaborative thought leader - Proven track record of creating demand that has delivered business results both in activity and productivity Comcast is an EOE/Veterans/Disabled/LGBT employer
          

Intelligence Analyst

 Cache   
- Company Army National Guard - Location Madison, WI Description On the battlefield, success depends on accurate and timely intel. As an Army National Guard Intelligence Analyst, you will play a key role in the interpretation and exploitation of information gathered from or about the enemy. Intelligence Analysts provide Guard personnel with information about enemy forces and potential battle areas, and use information derived from all intelligence disciplines to determine changes in enemy capabilities, vulnerabilities, and probable courses of action. Specific duties of the Intelligence Analyst may include: preparation of all-source intelligence products; providing... Yesterday from: *******************
          

Solutions Consultant - Cyber Security

 Cache   




Emtec is a Global consulting company that provides technology-empowered business solutions for world class organizations. Our Global Workforce of over 800 consultants provide best in class services to our clients to realize their digital transformation journey. Our clients span the emerging, mid-market and enterprise space. With multiple offices worldwide, we are uniquely positioned to deliver digital solutions to our clients leveraging Oracle, Salesforce, Microsoft, Java and Open Source technologies with a focus on Mobility, Cloud, Security, Analytics, Data Engineering and Intelligent Automation. Emtec's singular mission is to create "Clients for Life" - long-term relationships that deliver rapid, meaningful, and lasting business value.

At Emtec, we have a unique blend of Corporate and Entrepreneurial cultures. This is where you would have an opportunity to drive business value for clients while you innovate, continue to grow and have fun while doing it. You would work with team members who are vibrant, smart and passionate and they bring their passion to all that they do - whether it's learning, giving back to our communities or always going the extra mile for our client.





Position Description



As a Solution Consultant - Cyber Security you will support the sales team in new client acquisition and revenue growth and report to the Chief Technology Officer within Emtec's Infrastructure Services practice (EIS). You will have a deep understanding of the Emtec Security Solutions strategy, roadmap, and Security as a Service Technology Partner. Your role will include both pre- and post-sales client support, solutions presentations, client needs analysis and proposal development, and active engagement with our service delivery process. You will work closely with and become the Emtec SME for assigned Technology Partner solutions. You will become a key cybersecurity Trusted Advisor and Advocate for your clients. You will collaborate with the CTO and Marketing organization to craft effective presentations and marketing messaging based upon your cybersecurity industry experience. You will work closely with internal and external customers, as well as various levels of the organization.

Responsibilities:

  • Develop a comprehensive understanding of the Emtec Cyber Security solution portfolio strategy, market position, and competitive advantages
  • Collaborate with and proactively participate with the Emtec sales team in pursuit of new Cyber Security Services clients; providing pre-sales support and client-facing engagement in the prospecting and proposal development process.
  • Engage in advanced security architecture and risk profile discussions with existing and prospective clients, analyze client needs and design/scope solutions accordingly
  • Work closely with assigned Emtec Cyber Security Technology Partners to fully understand their capabilities, solution functionality, and market fit for prospective clients, in short become the Emtec SME for those assigned Partner Solutions
  • Create detailed, professional documentation to be delivered to existing and prospective clients in both written and verbal formats
  • Maintain a high level of knowledge of the general Cyber Security market with an emphasis on new or emerging tools, methods and techniques for both exploitation and defense
  • Provide bi-weekly "state of cybersecurity" updates to other Cyber team members as well as the Emtec practice leadership
  • Maintain an Emtec blog on emerging threats and vulnerabilities associated with digital enterprise adoption
  • Maintain a high level of knowledge about Emtec's services

    Must Have Skills:

    • Minimum 5 years sales experience in delivering cybersecurity consulting services including client-facing communication, security assessments, documentation review, and advisory consultation
    • Bachelor's degree or higher
    • Minimum 3 years of experience with one or more of the following frameworks: ISO 27001/2, NIST Cyber Security Framework, CIS Critical Security, PCI DSS
    • Minimum of 1 or more of the following certifications: CISSP, CISA, CISM
    • Experience dealing with security applications such as SIEM, GRC, Identity Access Management, IDS/IPS, Advanced Persistent Threat, Vulnerability Management Systems
    • Strong technical aptitude with the ability to quickly learn concepts related to IT and Cyber Security services management and solutions
    • Established C-Level (CEO, CIO, CFO, COO, CRM, CISO) customer relationships and management of those relationships

      Professional Skills:

      • Knowledge and experience with security technologies and methodologies such as Risk Assessments, Risk Management, Incident Response, Cyber Forensics, and Risk Policies
      • Excellent communication and presentation skills, both written and verbal
      • Experience briefing senior-level leadership and conveying technical subject matter to audiences of varying backgrounds and skill levels
      • Creative, independent thinker with strong business ethics and integrity
      • Positive leadership and team-oriented skill set
      • Self-starter with ability to build relationships, communicate product knowledge, and earn client trust
      • Ability to solve problems, with critical thinking, judgment, and strong decision-making skills
      • Strong collaboration skills and ability to work closely and effectively with members across departments and at all levels of the organization

        Emtec is an Equal Opportunity Employer

        US citizens and those authorized to work in the US are encouraged to apply


          

Pollueur-payeur

 Cache   

Soufre dans une usine d’exploitation des sables bitumineux, Fort Mac Murray, Province d’Alberta, Canada (57°03’ N - 111°38’ W)

Les économistes désignent les effets indirects, et parfois imprévus, d’une activité de production ou de consommation sous le terme d’externalité. Ces dernières peuvent être bénéfiques ou néfastes : par exemple, la pollution provoquée par une usine ou les embouteillages résultant de l’augmentation de la vente d’automobiles. Par ailleurs, les experts se demandent comment intégrer ce surcoût dans le calcul de la richesse.
          

Cyber Forensics Subject Matter Expert

 Cache   
At ARA, we strive to find valuable colleagues with not only to give our employees the tools, training, and opportunities to take active roles as owners. The motto, "Engineering and Science for Fun and Profit" sums up the ARA experience. As a Cyber Forensics Subject Matter Expert on our team, you will be responsible for developing technology critical to the success of our projects as well as national security.

ARA seeks a Cyber Forensics Subject Matter Expert in support of Test and Evaluation (T&E) efforts. The successful candidate will have a passion to apply cyber security techniques to new domains, and will be working as part of a multi-disciplinary group and collaborating across research teams.

Duties:

* Works across several research teams to advance the state-of-the-art in cyber defense and offense.

* Serves as the subject matter expert for network forensics and exploitation technologies.

Cyber Forensics Subject Matter Expert Required Qualifications:

* The selectee demonstrates solid decision making and problem solving skills, ability to react quickly, and technical proficiency in several of the following areas: - Operating systems (Windows and/or Unix/Linux) - Network analysis - Penetration testing - Network security - Incident response - Computer and network forensics - Network administration - Vulnerability and malware analysis - Low level protocol and packet analysis - Scripting and/or programming.

* This position is well-suited for individuals who enjoy visiting network security websites, attending conferences such as Black Hat / DEFCON, setting up and maintaining their own network or competing in Capture the Flag events.

* 7 years or more experience in an engineering/network development environment supporting multiple concurrent tasks/projects, with demonstrated success in areas involving cyber forensics.

* Excellent technical communications and leadership skills are required.

* Bachelor's degree in Computer Engineering, Computer Science, Electrical Engineering, Math, or Physics.

* Active Secret Security Clearance.

* Due to the work you'll perform and interactions with intelligence community and DoD programs you will need to be a US citizen.

Cyber Forensics Subject Matter Expert Preferred Qualifications

* The ideal candidate should have a sophisticated knowledge of software protection mechanisms, extensive knowledge of low-level software development including network protocol design and development, kernel module development, compiler design and development, virtualization and emulation technologies, cloud computing environments, and should be well-versed in multiple programming languages and comfortable learning new languages and language variants.

* Master's degree or higher.

* TS clearance with SCI eligibility.

Raleigh, NC is the office location with frequent travel to the Aberdeen/Southern Pines, NC offices and various facilities to interact with the government teams.

ARA is known for their ability to bring technical concepts to capability through research, development, and engineering. Our missions support the U.S. warfighter through Command, Control, Communications, Computer, Intelligence, Surveillance, and Reconnaissance (C4ISR), cyber, and space system initiatives. Our technological developments touch all warfighting domains. Our team of professionals are able to rapidly prototype, conduct test and evaluation, and provide acquisition, installation, and in-service engineering support.

About Us:

Applied Research Associates, Inc. is an employee-owned international research and engineering company recognized for providing technically superior solutions to complex and challenging problems in the physical sciences. The company, founded in Albuquerque, NM, in 1979, currently employs over 1,100 professionals and continues to grow. ARA offices throughout the United States and Canada provide a broad range of technical expertise in defense technologies, civil technologies, computer software and simulation, systems analysis, environmental technologies, and testing and measurement. The corporation also provides sophisticated technical products for environmental site characterization, pavement analysis, and robotics.

While this is all of the Year One and Beyond stuff, Day One is highly impressive too. These are things like our competitive salary (DOE), Employee Stock Ownership Plan (ESOP), benefits package, relocation opportunities, and a challenging culture where innovation & experimentation are the norm. At ARA, employees are our greatest assets. The corporation realizes that employee ownership spawns greater creativity and initiative along with higher performance and customer satisfaction levels.

ARA is passionate about inclusion and diversity in our workplace, in 2018 40% of our new employees voluntarily self-identified as protected veterans. (Source-AAP EOY 2018 Veterans Data Collection Report). Additionally Southeast Division has its own Women's Initiative Network (WIN) whose purpose is to motivate, support, and encourage professional career development for women in order to maximize career and professional accomplishments. Our division is also very socially oriented with activities for our employees ranging from attending a local baseball game in the summer to monthly get-togethers, board game lunches, holiday party, corn hole tournaments and so on! For additional information and an opportunity to join this unique workplace, please apply at careers.ara.com

EqualOpportunityEmployerDescription

Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities

PayTransparencyPolicyStatement

The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor s legal duty to furnish information. 41 CFR 60-1.35(c)",

DegreeName: Bachelors

MinimumRequiredYears: 7

MaximumRequiredYears: 9

Description: Relevant work experience

Preferred Exp

MinimumRequiredYears: 5

Description: Extensive Software Development experience with emphasis on supporting Anti-Virus efforts.

Licenses & Certifications

LicenseAndCertificationName: Cert Ethical Hacker
          

Software Development Engineer - SDE Java Angular

 Cache   
SunIRef:Manu:title Software Development Engineer - SDE - Java & Angular JP Morgan Chase 21,577 reviews - Seattle, WA 98101 JP Morgan Chase 21,577 reviews Read what people are saying about working here. JP Morgan Chase operates in over 100 markets serving millions of customers, business, and clients (corporate, institutional, and government). It holds $18 trillion of assets under custody and manages $393 billion in deposits every day. As a member of the Application Classification and Protection team you will build trust with our customers to innovate and develop next generation solutions to protect our systems and data across the business. You will design and engineer software that will enable our business to meet the changing security standards while setting the strategic direction for how to support the business long term. To be successful you will need to connect with a global network of technologists from around the world to apply your skills to solve mission critical problems while embracing new technologies and methodologies. Along the way you will develop skills with a wide range of technologies including distributed systems, cloud infrastructure, and cybersecurity concepts and methodologies (encryption, tokenization, masking, and other data protection techniques). The world of Cybersecurity involves adapting to a constantly changing world; as part of this team you will be thinking both how to solve problems in the now and also for the next generation of threats. JP Morgan Chase invests $9.5B+ annually in technology and you would be one of 40k+ technologists who innovate in how the firm builds initiatives like big data, machine learning, and mobile/cloud development. We want people like yourself to create innovative solutions that will not only transform the financial services industry, but also change the world. This role requires a wide variety of strengths and capabilities, including: Experience developing with Java, C# (or similar Object-Oriented languages) or Experience developing with high-level script languages such as Python or JavaScript Knowledge and experience designing and building large scale and high availability systems Experience utilizing operational tools and monitoring solutions that ensure the health and security of our services. 5+ years' experience developing enterprise software or Masters' degree in Computer Science or equivalent degree) Experience in one or more of the following preferred: Working knowledge of Spring Framework (Core, Boot, MVC) Working knowledge of RDBMS and NOSQL technologies Working within an agile development methodology (Kanban, Scrum, etc.) Experience with continuous delivery and deployment. Experience assessing of data protection approaches, requirements, and activities Understanding of cryptography, masking, tokenization or other data protection technologies and their impact to the application Knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits Experience developing software using continuous integration/deployment pipeline that includes vendor solutions Experience in next generation platforms such as cloud, PaaS, mobile, and big data At JPMorgan Chase & Co. we value the unique skills of every employee, and we're building a technology organization that thrives on diversity. We encourage professional growth and career development, and offer competitive benefits and compensation. If you're looking to build your career as part of a global technology team tackling big challenges that impact the lives of people and companies all around the world, we want to meet you. JPMorgan Chase & Co. is an equal opportunity employer. JP Morgan Chase - Just posted report job - original job
          

Actualités du scepticisme (VI) Pierre Bayle hyper-sceptique

 Cache   

C'est dans la pensée du dernier sceptique du XVIIe siècle, Pierre Bayle, qu'on trouve le point culminant des critiques sceptiques de la philosophie et de la théologie. Dans ses très nombreux écrits, cet hyper-sceptique attaque une grande variété de théories et d’opinions.

Né en 1647 dans la petite ville de Carla (aujourd’hui Carla-Bayle), près de la frontière espagnole au sud de Toulouse, où son père est pasteur protestant, Pierre Bayle vit dans l’atmosphère agitée de la persécution des huguenots, dont le statut de minorité puissante est mis à mal par Louis XIV.

Le jeune Pierre Bayle est d’abord envoyé dans une école calviniste à Puylaurens, puis au collège des jésuites de Toulouse en raison de la disparition dans la région d’institutions protestantes convenables pour son éducation. L’importance des controverses religieuses dans les livres de l’époque et la force de conviction dialectique des protagonistes du débat à Toulouse le conduisent à abandonner le protestantisme pour le catholicisme. Après avoir commis le pire péché qui soit pour le fils d’un pasteur calviniste persécuté, il se rachète aux yeux de sa famille par une seconde conversion, quelques mois plus tard, en abandonnant (semble- t-il de nouveau sur la seule base de considérations intellectuelles) le catholicisme pour revenir au protestantisme.

Par son second changement de religion, Bayle devient, techniquement, un « relaps », c’est-à-dire un individu à nouveau hérétique après avoir abjuré ses hérésies, et donc exposé à de sévères peines dans la France de Louis XIV (tels le bannissement et l’emprisonnement). Pour sa protection et sa réintégration dans le monde calviniste, Bayle est envoyé en 1670 à l’université de Genève, où il achève ses études de philosophie et de théologie. Profondément endoctriné en faveur de la philosophie cartésienne par les philosophes de cette université calviniste, il revient clandestinement en France en 1674 et devient précepteur à Paris et Rouen. Il rend alors fréquemment visite aux Basnage, une éminente famille protestante rouennaise, et fréquente souvent le salon de Justel à Paris, où il rencontre l’évêque Huet. En 1675, Bayle concourt pour le poste de professeur de philosophie à l’académie de Sedan (dernière institution protestante d’enseignement supérieur en France), qu’il obtient en tant que protégé du très orthodoxe théologien Pierre Jurieu – qui deviendra son ennemi le plus acharné.

De 1684 à 1687, Bayle publie et édite les Nouvelles de la République des Lettres, dans lesquelles il recense et commente des livres de toutes sortes. Son jugement aiguisé fait bientôt de lui une des figures centrales de la communauté intellectuelle et l’amène à entrer en relation avec des figures de premier plan comme Leibniz, Malebranche, Arnauld, Boyle et Locke. En 1686, il publie l’une de ses œuvres magistrales, le Commentaire philosophique sur ces paroles de Jésus-Christ, Contrains-les d’entrer. En 1693, la carrière universitaire de Bayle prend fin avec le renvoi de son poste à Rotterdam – ce qui lui offre le temps nécessaire pour s’occuper de son Dictionnaire historique et critique et des controverses qui suivront.

L’esprit qui imprègne le Dictionnaire est déjà à l’œuvre bien avant sa rédaction. Bayle a en effet compilé pendant des années les erreurs qu’il a identifiées dans divers travaux historiques. Et sa lettre de 1675 à Minutoli fait apparaître qu’il est alors déjà sérieusement intéressé par le scepticisme. Ses conférences de Rotterdam montrent qu’il se consacre à l’analyse et à l’attaque de toutes sortes de théories – attitudes critiques et sceptiques qui fusionneront dans le Dictionnaire.

La première édition paraît en 1697 et rencontre un grand succès. Attaqué par Jurieu1 et porté par sa coterie à l’attention du consistoire de l’Église française réformée de Rotterdam, l’ouvrage est également interdit en France – événements qui contribuent sans doute à sa notoriété et à sa popularité. De plus, Bayle est soulagé par l’interdiction du Dictionnaire en France car elle lui permet d’échapper à l’accusation de ne pas avoir été suffisamment pro-protestant et anti-catholique. Dès l’achèvement de la première édition du Dictionnaire, Bayle travaille à la deuxième en ajoutant de nombreux articles et remarques, répondant aux nombreuses critiques reçues – ce qui augmente le texte de deux millions de mots.

Bayle ne se contente pas de reprendre le problème sceptique classique de la connaissance et de perpétuer la tradition initiée par Montaigne afin d’attaquer les nouveaux dogmatiques – Descartes, Hobbes, Spinoza, Malebranche et Leibniz. Dès que l’« incomparable » Isaac Newton fait son apparition, Bayle l’attaque également2. Aussitôt les théories de John Locke publiées, il se met au travail. Et quand, dans l’article « Rorarius », Bayle exprime sa satisfaction face aux efforts que déploie son ami Leibniz pour lui répondre, c’est principalement parce que la théorie de l’harmonie préétablie du philosophe allemand lui offre une nouvelle occasion de mener une analyse destructrice3.

La stratégie générale de Bayle est de réduire à néant toute théorie sur la base de ses propres thèses, qu’elle soit métaphysique, théologique ou scientifique. Pour ce faire, il s’appuie davantage sur les sections antimétaphysiques des écrits de Sextus que sur les premières sections épistémologiques. Quel que soit le sujet débattu – les âmes des bêtes, la physique newtonienne, la nature de la matière ou de la vérité –, s’ensuit toujours le même résultat perturbant : chaque fois que Bayle examine une théorie pour souligner les conséquences logiques de ses hypothèses, surgissent de toute part problèmes, questions et doutes.

Lorsqu’on l’adopte suffisamment longtemps, cette approche met en évidence le triste fait que toute entreprise rationnelle contient toujours le principe de sa propre perte. Ce qui semble au premier abord être un bon moyen d’expliquer quelque chose devient rapidement le meilleur moyen de sombrer dans la perplexité. Toute entreprise rationnelle, en quelque domaine que ce soit, conduit au pyrrhonisme, au scepticisme intégral. Dans l’article « Uriel da Costa » (rem. G), Bayle résume ainsi la déplorable situation intellectuelle de l’homme : « Il n’y a personne qui, en se servant de la Raison, n’ait besoin de l’assistance de Dieu ; car, sans cela, c’est un guide qui s’égare : & l’on peut comparer la Philosophie a des poudres si corrosives, qu’après avoir consumé les chairs baveuses d’une plaie, elles rongeroient la chair vive, & carieroient les os, & les perceroient jusqu’aux mouelles. La philosophie réfute d’abord les erreurs ; mais, si on ne l’arrête point là, elle attaque les véritez: &, quand on la laisse faire à sa fantaisie, elle va si loin, qu’elle ne sait plus où elle est, ni ne trouve plus où s’asseoir. »

Dans la Théodicée, Leibniz décrit un débat avec son ami Bayle : lorsqu’un penseur propose une affirmation, Bayle l’analyse et la questionne jusqu’à ce que son interlocuteur finisse par l’abandonner et affirme la chose opposée, affirmation à laquelle Bayle fait subir le même sort, et ainsi de suite à l’infini ; son analyse critique se poursuivant tant qu’il reste un adversaire pour affirmer quelque chose4. Dans chaque cas, ce qui intéresse Bayle n’est pas simplement de contester la théorie concernée, mais qu’occasion lui soit ainsi donnée de généraliser son attaque à toute théorie et montrer les abysses inévitables auxquels conduit toute entreprise intellectuelle humaine.

L’histoire de l’humanité n’est pour Bayle que l’histoire des mensonges et des malheurs de la race humaine. L’article sur le roi David est une illustration frappante des misères causées par une figure religieuse majeure. Si Bayle présente l’histoire de la manière la plus négative qui soit, il souligne, pour désarmer par avance ses critiques, ne rien inventer et respecter le texte biblique. À la fin de sa présentation, l’ancien roi israélite est entièrement discrédité et condamné, entre autres crimes, pour meurtre et agression sexuelle. De même, si l’on était parfaitement honnête, suggère Bayle, il faudrait considérer comme barbare et immoral le monde des patriarches bibliques et juger de la même façon l’histoire séculière des hommes des temps anciens à nos jours. Tout cela vient à l’appui de sa thèse selon laquelle une société d’athées pourrait bien être plus morale qu’une société de croyants.

Son « Éclaircissement » sur l’athéisme renforce la position de Bayle : il y affirme ne pas connaître d’athées immoraux ; mais si ses lecteurs ont des informations à ce sujet, qu’ils aient la gentillesse de les lui envoyer et il les considérera. Débute ensuite l’exposé de sa thèse de l’existence sur terre d’une société d’athées qui se porte bien mieux que n’importe quelle société européenne. Exploitant les récits sur la Chine parvenus en Europe, Bayle accepte l’idée que cette société soit à la fois athée et bien plus stable et morale que n’importe quelle société européenne. En prenant la Chine pour modèle, Bayle insiste sur l’idée que toute société structurée par la religion est destinée à souffrir tôt ou tard d’intolérance, de persécutions, de guerres, de schismes et de tous les maux de l’humanité. Son plaidoyer pour une société athée pourrait être vu, à la manière des Lettres persanes et d’autres ouvrages de l’époque, comme un miroir tendu à l’immoralité de l’Europe. Mais ce plaidoyer revient peut-être plutôt à affirmer pleinement que la moralité est indépendante de la religion et qu’il y a quelque chose dans la religion qui l’oppose à la morale. Cette idée suggère, du même coup, qu’on pourrait trouver des principes moraux qui ne soient pas sapés par un raisonnement sceptique5. Cet aspect de la pensée de Bayle – la séparation de la morale et de la religion – va devenir particulièrement important chez les Lumières françaises, anglaises et américaines.

Les écrivains du XVIIIe siècle n’auront de cesse de faire des arguments de Bayle l’« arsenal des Lumières », amenant ainsi des changements monumentaux dans le monde intellectuel. Beaucoup de philosophes6 et de figures du XIXe siècle s’intéressant à l’histoire intellectuelle admettent que, puisque Bayle a fourni à l’« Âge de la raison » tant de munitions contre les théologiens et les métaphysiciens non éclairés, il devait aussi partager les conceptions avant-gardistes des Lumières – faisant de lui un précurseur des tendances irréligieuses, empiriques et scientifiques qui devaient détruire l’idéologie de l’Ancien Régime. Mais si Bayle a bien fourni aux Lumières l’arsenal que ses partisans vont user contre tous leurs opposants, il ne se fait aucune illusion pour sa part sur ce que la raison humaine peut accomplir.

Bayle affirme constamment le caractère inadéquat et incohérent des entreprises intellectuelles humaines, la nécessité de se tourner vers un guide différent – la foi et la Révélation – et l’idée que la meilleure image de la vie chrétienne est celle, érasmienne, dans laquelle l’étude pieuse constitue le but de la vie. Si, comme je le pense, il s’agit bien là de ce en quoi Bayle croit, alors il a certainement été mal compris par les penseurs des Lumières, qui ont fait de ses attaques destructrices la défense d’une nouvelle théologie – le scientisme – qui ne s’avérera pas plus cohérente ni plus adéquate que les conceptions auxquelles Bayle avait ôté leurs prétentions et leur gloire.

Les sceptiques du XVIIe siècle sapent la révolution cartésienne pour préparer le terrain à une philosophie et à une science sans métaphysique. Mais l’attaque totale de Bayle, contre tout ce qui se dit et se fait, porte le scepticisme à son ultime extrémité : il sape tous les efforts intellectuels humains, ramène l’héritage de la nouvelle philosophie et de la nouvelle science à une pagaille incohérente et révèle que toutes les approches de n’importe quel problème peuvent très vite apparaître dénuées de sens et incohérentes. Pour Bayle, le problème n’est pas seulement la structure interne de la théorie cartésienne de la connaissance, mais l’irrationalité fondamentale du monde de Dieu – irrationalité qui se manifeste dans tous les efforts de théorisation que nous entreprenons. Chaque théorie et chaque solution, montre Bayle, finissent par aboutir à des contradictions, des absurdités et des paradoxes. Seul un nouveau guide – la foi et la Révélation – pourra sortir l’homme de ce bourbier. Mais cette foi, Bayle ne la trouve, comme Bunel, que dans la vie paisible de celui qui se consacre sans relâche à l’étude plutôt que, à l’exemple du chevalier de la foi des textes de Kierkegaard, dans une vie entièrement dévouée à la religion.

Il semble cependant y avoir un point où il suspend son scepticisme et adopte des conceptions morales positives. Bayle a en effet été considéré comme le père de la tolérance moderne, en particulier pour son premier ouvrage, le Commentaire philosophique, où il plaide contre la persécution catholique des huguenots en défendant le droit de tout un chacun à ses propres convictions. Il expose une doctrine des droits de la conscience errante : tant qu’on croit quelque chose en conscience, on doit être autorisé à entretenir cette croyance. Fonder sa foi sur sa conscience est une conception calviniste fondamentale, contrairement au fait d’accepter une autorité comme règle de sa foi. Bayle a donc quelques raisons de prétendre que son analyse est conforme aux conceptions de Calvin et de ses partisans.

Mais il soutient également l’impossibilité de distinguer les consciences égarées de celles qui ne le sont pas. Par conséquent, toutes les conceptions doivent être tolérées. Cette perspective est plus radicale que celle de John Locke puisque, dans le premier livre de son Commentaire philosophique, Bayle juge tolérables toutes les conceptions philosophiques et religieuses. Dans le deuxième volume, il se heurte aux croyances qui impliquent la destruction des autres. Si une conscience égarée en vient à croire que toutes les personnes rousses devraient être éliminées, doit-on lui permettre d’entretenir cette croyance et d’agir en conséquence ? La position de Bayle est très proche de celle qui sera envisagée par John Stuart Mill un siècle et demi plus tard : toutes les pensées peuvent être tolérées mais pas toutes les actions. Et si les pensées conduisent à des actions, il peut être nécessaire de poser certaines restrictions sociales et publiques. Bayle a commencé à élaborer une sorte de morale naturelle positive, qui doit être protégée contre ceux qui pourraient vouloir la détruire. Cette idée apparaît avec force dans une affirmation qu’il n’a eu de cesse de soutenir : une société d’athées pourrait être plus morale que toutes les sociétés chrétiennes, qui furent, de l’Antiquité à nos jours, peuplées d’individus malfaisants, corrompus, sexuellement dépravés, menteurs et tricheurs. Telle qu’il la présente, l’histoire du christianisme renvoie l’image terrible d’une profonde inhumanité de l’homme envers l’homme. Et, telle qu’il la dépeint dans son article sur le roi David, la société religieuse de l’Israël antique est, à certains égards, encore pire.

Comme un complément à cette thèse, Bayle discute de quelques athées, dont Diagoras et Spinoza, qui ont mené des vies exemplaires, aidant leurs semblables sans montrer aucun signe du terrible comportement des individus religieux. L’article sur Spinoza est de loin le plus long du Dictionnaire. Il y a beaucoup à apprendre sur le véritable message qu’y exprime Bayle, qui s’est donné beaucoup de mal pour découvrir les faits réels de la vie du philosophe d’Amsterdam. Il a lu le manuscrit d’une biographie (disparue depuis), interrogé les personnes ayant connu Spinoza et remis en question son hagiographie. Un ouvrage circulant à l’époque, La Vie de M. Spinoza (attribué à un huguenot du cercle de Spinoza, Jean-Maximilien Lucas), présente une biographie du philosophe sur le modèle de la vie des saints. Deux éléments sont supposés révéler la profondeur de sa spiritualité : avoir décliné un poste à la grande université de Heidelberg au motif que, s’il avait exprimé ses positions, l’université aurait subi des pressions pour le faire taire, ce qu’il aurait refusé au nom de sa liberté de conscience ; ensuite, alors qu’il est accusé d’être en contact avec le prince de Condé (grand ennemi de la République néerlandaise pour avoir conquis les Pays-Bas en 1672 pour Louis XIV), avoir refusé de répondre à son invitation au motif d’être trop occupé à philosopher pour s’occuper des affaires du monde.

Sur le poste à Heidelberg, Bayle retrouve la trace de personnes impliquées dans l’affaire, selon qui le « noble » refus de Spinoza vient après que l’offre a été suspendue, les autorités ayant été dans l’intervalle mises en garde à son propos. Concernant l’invitation de Condé, Bayle retrouve des témoins, dont un libraire faisant commerce en face des quartiers du prince à Utrecht, où il aurait vu entrer Spinoza. Immobilisé pendant six semaines par une jambe cassée, Condé avait fait chercher Spinoza parmi d’autres gens intelligents avec qui converser. Ainsi le chirurgien du prince rapporte-t-il à Bayle avoir vu Spinoza venir chaque jour. De plus, dans l’édition anglaise de la biographie de Condé rédigée par Pierre Coste, l’ami de Bayle et secrétaire de Locke, il est clairement affirmé que Spinoza a rendu visite au prince. En outre, même si Spinoza a toujours raconté ne pas avoir rencontré Condé, il serait apparemment revenu d’Utrecht avec beaucoup de cadeaux. Enfin, selon Pierre Desmaizeaux, l’éditeur de Bayle, qui a rencontré des membres de l’entourage du prince, celui-ci aurait offert à Spinoza un poste à Paris, dont le philosophe néerlandais aurait discuté avec des amis avant de finalement décider de ne pas accepter l’offre.

Tout en cherchant à détruire l’image de Spinoza fondée sur ces « preuves » de « noblesse »7, Bayle le présente comme une personne au-delà de tout reproche, un athée n’ayant jamais commis de faute morale. Si sa vie est bien celle d’un athée, elle est pour Bayle empreinte de pureté et de sainteté. Et ce qu’il loue le plus chez Spinoza est d’être le premier penseur moderne à faire de l’athéisme un système.

Bayle transmettra son scepticisme aux avant-gardes du XVIIIe siècle et ses volumes in-folio seront étudiés par la plupart des philosophes et des théologiens. Le plus sceptique d’entre eux, l’écossais David Hume, partira écrire, dans le collège des jésuites de La Flèche, ce chef-d’œuvre sceptique qu’est son Traité de la nature humaine avec huit volumes de Bayle dans ses bagages. Il se penchera sur leurs arguments, les modernisera et, surtout, les extraira de leur cadre théologique. Bayle affirme détruire la raison pour faire place à la foi. Après avoir présenté une série d’arguments sceptiques dans ses Dialogues sur la religion naturelle, Hume fera déclarer à son porte-parole que, pour un homme de lettres, avoir une philosophie sceptique est la première et plus essentielle étape pour devenir un vrai chrétien. Aucun des contemporains de Hume ne prendra cette confession de foi au sérieux. Et ceux qui le connaissent sont sûrs qu’il ne deviendra jamais un vrai chrétien mais plutôt, comme ils le qualifient, « le grand infidèle ». Le scepticisme va alors se dégager du cadre théologique des siècles passés pour devenir une pure critique de la raison humaine.

Richard H. Popkin

Extrait d’Histoire du scepticisme. De la fin du Moyen Âge à l’aube du XIXe siècle (Agone, 2019).

1. Les idées de Jurieu à propos du Commentaire philosophique et leur rôle dans sa controverse avec Bayle apparaissent dans Apologie du Sr. Jurieu (La Haye, 1691), Courte revue des maximes de morale et principes de religion de l’auteur des pensées diverses sur les comètes, & de la critique générale sur l’histoire du Calvinisme du P. Maimbourg (n.p., n.d., sans doute 1691) et dans Le Philosophe de Rotterdam (Amsterdam, 1706).

2. Sur Newton, lire les articles de Bayle «Leucippus» (rem. G) et « Zénon d’Élée » (rem. 1). Locke est discuté dans plusieurs articles, spéc. « Dicaerchus » (rem. M), « Perrot » (rem. L), « Rorarius » (rem. K) et « Zénon d’Élée » (rem. 1). (Dictionnaire historique et critique, Rotterdam, 1697).

3. Ibid., art. « Rorarius » (rem. H et L).

4. Gottfried Wilhelm von Leibniz, Essais de théodicée sur la bonté de Dieu, la liberté de l’homme et l’origine du mal, Amsterdam, 1710, p. 547.

5. Des commentateurs comme Antony McKenna et Gianluca Mori ont donné de Bayle l’image d’un sceptique complet en épistémologie et en métaphysique et d’un moraliste dans les affaires humaines – position qu’on observe déjà chez Montaigne, Charron et La Mothe Le Vayer. Lire, par exemple, « Le retour des sceptiques », dossier Le Magazine littéraire (janvier 2001, n° 394) et Élisabeth Labrousse, Pierre Bayle, La Haye, 1963.

6. En français dans le texte. [ndt]

7. Les efforts de Bayle pour détruire l’hagiographie de Spinoza n’ont toutefois pas été (selon Desmaizeaux) couronnés de succès : le refus du poste d’Heidelberg comme la non-visite au prince de Condé continuent d’être racontés dans les livres d’histoire malgré les tentatives de Bayle pour les réfuter. Voir Pierre Desmaizeaux in Pierre Bayle, Lettres de M. Bayle, Amsterdam, 1729.


          

Immigration, l’éternel chiffon rouge

 Cache   
Editorial. Le gouvernement a présenté, mercredi 6 novembre, une série de mesures qui, une nouvelle fois, font figure de diversion aux véritables problèmes du pays et ne font pas reculer les forces politiques qui prospèrent en exploitant les préjugés.
          

European patents help SMEs commercialise high-potential inventions, new study shows

 Cache   
A new study published today by the European Patent Office (EPO) finds that small and medium enterprises (SMEs) rely on European patents to protect their high-potential inventions and that two thirds of these inventions are commercially exploited.
          

Avance de fonds VS prêt d'argent rapide au Québec ?

 Cache   
Au Québec, la possibilité lors d'un besoin urgent d'argent, sans justificatif, existe bel et bien. Vous pouvez en obtenir rapidement quasi immédiatement, voire directement en ligne. Pour une simple avance de fonds comme pour un prêt d'argent, il y a beaucoup plus de facilités et de possibilités, là-bas ...C'est un fait réel qu'exploitent bien des organismes ou des sites en ligne, un état de fait qui fait se poser quelques questions quand même:
- est-ce vraiment aussi simple et rapide ?
- est-ce légal ?
- quels montants peut-on obtenir ?
La législation étant particulière au Québec à ce sujet, il faut quand même prendre le temps de bien tout lire et tout savoir lorsque vous effectuez une telle démarche en ligne.

Avance de fond ou prêt d'argent rapide ?

Finalement quelle est la vraie différence ?
La réponse est fort simple: dans ce principe de système rapide et simplifié, les limites des prêts étant relativement fixes, il n'y a quasiment aucune différences si ce n'est celle de l'expression orale pour présenter le sujet ...
En général sont données les définitions suivantes:
- une avance d'argent constitue un prêt à court terme que l'on utilise pour faire face à des dépenses imprévues, des urgences financières, tels certaines pénalités ou autres chèques sans provision.
- un prêt à court terme constitue le service fournit par un organisme fournissant une solution financière sur le court terme ... ( une avance d'argent, donc ! )
Ces situations financières, ces conditions d'avance d'argent n'ont absolument rien à voir avec les solutions sur le ' long terme ' qui sont régies tout à fait différemment.
avance de fonds
avance de fonds : ne demander que le strict nécessaire !

Procédure et conditions de la demande de prêt en ligne.

Pour ce qui concerne ce genre de demande d'argent, au caractère inattendu ET urgent, nos amis Québecois ont mis en place des systèmes rapides et efficaces, qui fonctionnent généralement en trois étapes, si vous avez véritablement besoin d'une avance de fonds pour couvrir vos dépenses inattendues , quelle que en soit la nature, même pour partir en week-end en amoureux si cela arrive.
Cela se déroule en trois étapes:
- prise de contact et transmission des documents personnels.
Vous prenez contact avec un organisme, un site consacré à ce genre de demande, de préférence en vous y identifiant et vous fournissez les copies des documents demandés, les plus courants étant: pièces d’identité / justificatif d'adresse / un spécimen de l'un de vos chèques ou un RIB / vos derniers relevés bancaires / derniers bulletins de salaire.
Oui, l'on a beau dire qu'elle est fausse la maxime " on ne prête qu'aux riches ! ", mais, même sans l'être et pour de petites ou moyennes sommes, il faut quand même que vous soyez en état de rembourser ensuite ... :)
- accord pour le contrat de prêt.
Votre dossier est alors examiné au plus tôt et très rapidement; s'il le faut, des renseignements complémentaires sont demandés par téléphone ou par courriel.
Rappel : ces demandes de prêts d'argent rapides et simplifiées n'interviennent que dans des créneaux situés entre 300 et 3000$.
En général, cela se passe dans l'heure suivant votre demande, les jours ouvrés, aux heures habituelles d'ouverture des bureaux.
- obtention rapide de l'argent demandé.
Si votre demande est acceptée, le site vous en informe alors immédiatement, puis il prend contact avec une société de financement partenaire qui effectuera le virement afin de déposer les fonds sur votre compte très vite.
Niveau délais, si vous vous y prenez tôt le matin vous pouvez réussir à obtenir votre prêt dans la journée, si non ce sera dans les 24 heures qui suivent votre demande.
prêt d'argent rapide
prêt d'argent rapide : une avance de fond qui peut vous aider ...

Une bonne solution pour le ' crédit d'urgence ' ?

Effectivement cette pratique, plus simple que de se rendre à la banque, plus fiable ou rassurante de ne procéder que par téléphone, effectuer une demande d'avance fonds, en ligne, sur un site au Québec est une des solutions les plus utilisées.
MAIS, deux choses qu'il faut absolument rappeler en ce qui concerne ce genre de démarche:
- vérifiez toujours le sérieux et la fiabilité du prestataire auquel vous faites appel !
- soyez en capacité de faire ensuite face aux remboursements relatifs à la somme qui vous sera avancée !
Avec un taux d'intérêts bien négocié, en effectuant correctement vos remboursements, pour éviter, aussi, d'éventuels frais de retard ou de découvert, en évitant surtout de multiplier ce genre de procédure, vous aurez alors vite fait de solder cette créance.
© refOK.fr - duplication interdite
          

‘Everyone needs to do more’ to help suffering Venezuelans, says UN Emergency Relief Coordinator

 Cache   
INTERNATIONAL, 6 November 2019, Humanitarian Aid - “Ordinary women, men and children face overwhelming challenges” just to survive in Venezuela today, UN Emergency Relief Coordinator Mark Lowcock said on Wednesday in the capital, Caracas.

“Millions cannot afford the bare minimum of food, water, and health care”, the Under-Secretary-General for Humanitarian Affairs continued, adding that “the situation continues to deteriorate”.

Most Venezuelans have been affected by a years-long political and economic crisis in what was formerly Latin America’s wealthiest nation, leading to a major shrinking of the economy, fueled by hyperinflation.  

View image on Twitter

Around 4.5 million have left the country, the vast majority to other nations in the region, marking the largest exodus in South American history, according to UN figures: “Too many people are risking perilous journeys every day, facing sexual exploitation, trafficking and abuse”, said Mr. Lowcock.

“I have seen myself how the health system is on the verge of collapse with many hospitals lacking the most basic water and electricity infrastructure…Hospital patients, many of whom are already critically ill, are at high risk of losing their lives from new infections they are acquiring while they are in hospital, because basic cleaning and disinfection cannot be done”. 

And a lack of medicines and medical care workers only exacerbates the situation, added the UN relief chief.

“Preventable diseases, including malaria and diphtheria are back with a vengeance”, he said, citing people with chronic health conditions, pregnant and nursing women, infants and those living with disabilities as being “among the most vulnerable”. 

Having visited Jose Gregorio Hernandez hospital, the UN official learned that medicines are scarce; power outages mean that only one-fifth of the hospital has electricity; and water runs only two days a week, often through rusty and broken pipes oozing a “filthy stench that lingers throughout”. 

Over the last year, UN-supported aid programmes have made a difference by:

  • Helping to vaccinate 8.5 million children against measles. 
  • Supporting some 975,000 people with medicines in 109 health facilities. 
  • Distributing food and provided agricultural support to 50,000 people.
  • Ensuring that 350,000 people have access to safe water. 
  • Providing education support to over 160,000 students. 
  • Providing nutritional support to over 100,000 children and pregnant and nursing mothers. 
  • Supplying 35,000 people with information and support to access protection services.

“Some hospital workers, I was told, spend more than their monthly salary just getting to work”, he asserted.
Aid assistance

During meetings with senior Government officials and members of the National Assembly, he observed that despite the political divisions, there was “a common will to address the humanitarian situation”, with both endorsing the Humanitarian Response Plan developed this year by the UN and partners to address the most dire needs of Venezuelans. 

Underscoring that “only a political solution can end the suffering”, Mr. Lowcock said that in the meantime, the UN “will continue to provide humanitarian aid to the most vulnerable in accordance with our principles of impartiality, independence and neutrality”. 

“I have received firm commitments that the implementation of the plan will be supported, to the benefit of vulnerable Venezuelans across the country”, he affirmed. “All parties must respect our principled humanitarian approach and not manipulate the needs-based assistance”. 

Stressing that “human suffering is not a political weapon”, he said continued monitoring of assistance delivery would safeguard its transparency “in accordance with independent assessments”. 

Funding shortfall

Mr. Lowcock thanked those who have contributed financial resources for UN-supported humanitarian activities, noting that more than $155 million has been received this year. But he said the $223 million Humanitarian Response Plan “remains under-resourced and the biggest constraint to delivering humanitarian assistance remains funding”.

“Everyone needs to do more”, he maintained, pointing out that next month provisional plans for the UN-supported humanitarian response in Venezuela next year is due to be published. “Substantially more financial resources will be needed, and we will seek additional funding from donors”.

 “We will need to find a way to unlock Venezuelan resources to contribute more to humanitarian action” and “place a greater priority on reducing the immediate suffering of the people of this country”, he concluded.


          

Step up action to protect the planet during wartime: UN environment chief

 Cache   
INTERNATIONAL, 6 November 2019, Peace and Security - Greater action is needed to protect the environment during wartime if the world is to realize the goal of a more sustainable future for all people and the planet, the head of the UN Environment Programme (UNEP) warned on Wednesday.

Inger Andersen’s comments came in a message marking the International Day for Preventing the Exploitation of the Environment in War and Armed Conflict.

Despite protection afforded by several legal instruments, the environment continues to be “the silent victim of armed conflicts worldwide”, according to UNEP.

Curbing negative environmental impacts of war and armed conflict

In recent decades, two fundamental changes have shaped the way the international community understands challenges to peace and security.

As Ms. Andersen stated, environmental factors are rarely, if ever, the sole cause of violent conflict.

“However, the exploitation of natural resources and related environmental stresses can be implicated in all phases of the conflict cycle, from contributing to the outbreak and perpetuation of violence to undermining prospects for peace”, she explained.

“Access and flow of water, land degradation, floods and pollution, in addition to competition over extractive resources, can directly exacerbate tensions and lead to eruption of conflicts, as is the case for resource depletion issues such as deforestation, soil erosion and desertification.”

From Agent Orange to ISIL

Public concern over the targeting and use of the environment during the heat of battle first peaked during the Vietnam War, according to UNEP, where the deployment of the toxic herbicide Agent Orange led to massive deforestation and contamination.

The resulting international outcry sparked the creation of two new international legal instruments: the Environmental Modification Convention in 1976, and an amendment to the Geneva Conventions, which regulate the conduct of war, one year later.

UNEP recalled that the extensive pollution caused by the intentional destruction of oil wells in Kuwait during the 1991 Gulf War sparked further calls to strengthen legal protection of the environment during wartime.

Since then, the devastation has continued. For example, the bombing of dozens of industrial sites in the Kosovo conflict in 1999 resulted in toxic chemical contamination.

More recently, ISIL militants set oil wells on fire when they retreated from areas in Iraq that they had previously held, triggering the release of what UNEP described as a “toxic mix” of gases and other compounds into the air.

Protect the planet, even during conflict

Ms. Andersen, the UNEP Executive Director, noted that in recent decades, there have been fundamental changes in how the international community understands challenges to peace and security.

The rise in non-state actors means that security is not just viewed in terms of conventional military threats.

“This evolving security landscape requires a shift in the way the international community engages in conflict management”, she said.

“From conflict prevention and early warning to peacemaking, peacekeeping and peacebuilding, the potential role of natural resources and the environment must be taken into consideration at the onset.”

UNEP has been working since 1999 to determine the environmental impacts of war, Ms. Andersen said, including through identifying gaps and weaknesses in the international laws that protect the environment during wartime.

“However, if we are to achieve the Sustainable Development Goals, we need to act with greater urgency and coherence to reduce the threats armed conflicts pose to our environment and ultimately our health and livelihoods”, she said.

“On this International Day for Preventing the Exploitation of the Environment in War and Armed Conflict we have only one way forward: to up our ambition to protect our planet, even in the most complex and challenging scenarios.”


          

UN policewoman recognized for ‘speaking up and speaking out’ on behalf of the vulnerable

 Cache   
INTERNATIONAL, 5 November 2019, Peace and Security - At the core of peacekeeping lies the notion of shared responsibility, the UN peacekeeping chief said on Tuesday, presenting this year’s award for Female Police Officer of the Year, to a woman who “has made a career of speaking up and speaking out on behalf of all vulnerable populations”.

Police Major Seynabou Diouf has worked “tirelessly with her colleagues inside and outside the Mission to empower women, improve conduct, enhance protection, strengthen performance, and thereby build sustainable peace”, Jean-Pierre Lacroix, Peace Operations chief, told the heads of UN police and police experts from 14 peacekeeping operations, gathered at the award ceremony at UN Headquarters in New York.

Major Diouf is one of over 1,400 female police officers serving under the UN flag, carrying out a complex range of tasks – from capacity-building and reform, to community-oriented policing, investigations, protection of civilians, and prevention of sexual and gender-based violence.

“That is impressive enough”, asserted Mr. Lacroix, “but they also provide the added value of gender perspectives and mainstreaming at all levels and at all phases of engagement with host-State institutions and communities”.

He cited examples in South Sudan where female officers are helping women and youth attain better living conditions within and outside camps for the internally displaced; the Democratic Republic of the Congo (DRC) where they are helping to build capacity and accountability in internal security forces; and Mali by promoting confidence-building between citizens and the reconstituted internal defence and security forces.

“Our female officers are also operating in areas affected by the Ebola virus disease, ensuring the required level of security for relief and humanitarian operations”, he maintained.

And female officers are a key element in the sensitization and delivery of training on sexual exploitation and abuse (SEA) throughout all UN Missions.

“As part of female police officers’ networks, such as the one Major Diouf leads in MONUSCO [UN Stabilization Mission in the DRC], they help prevent, counter and investigate SEA-related offences, advancing the Organization’s zero-tolerance policy”, elaborated the peacekeeping chief. He congratulated Major Diouf “for her outstanding service” to the UN Nations and Congolese people and stated that “all UN police officers in the field and at the UN Headquarters are inspired” by her example to uphold the core values of the Organization.

Previous Awardees
  • 2018: Chief Supt. Phyllis Osei, Ghana, UNSOM
  • 2017: Assistant Inspector Annah Chota, Zimbabwe, UNISFA
  • 2016: Supt. Yvette Boni Zombre, Burkina Faso, MINUSCA
  • 2015: Chief Supt. Raluca Domuta, Romania, MINUSTAH
  • 2014: Inspector Shakti Devi, India, UNAMA
  • 2013: Commissioner Codou Camara, Senegal, MINUSTAH
  • 2012: Constable Rezi Danismend, Turkey, UNMIL
  • 2011: Deputy Supt. Shahzadi Gulfam, Pakistan, UNMIT

Mr. Lacroix also thanked her family for supporting her and making sacrifices during her long deployments. “The more women we have in peacekeeping, the more effective we all will be”, he concluded.

Going the extra mile

Top UN Police Adviser, Luis Carrilho, spoke about Major Diouf’s experience, noting that in her native Senegal she became the first female police officer to be honoured as a Gardien de la Paix, which was previously reserved for male officers.

“Since early in her career, she has shown her determination to make the extra effort, go the extra mile, to achieve her goals”, he spelled out, flagging that as the team leader of an SEA task force in Goma and president of the UNPOL Women’s Network, “she has demonstrated her commitment to giving women a voice and putting an end to SEA”.

“Her efforts have helped the mission to achieve zero SEA cases in 2018, compared to 140 cases between 2016 and 2017”, he attested, calling her “an incredible force for good in our ongoing efforts to root out SEA and ensure UN personnel at all levels perform to the highest standards”.

Motivated to do more

When Major Diouf learned that she had been selected to receive the award, she said she was proud, but also “humble to be recognized for something that has become almost second nature” to her and her life’s work.

“When I was young, I wanted to be a medical doctor but there was an urgent need to help support my family”, she told those assembled. “Being a police officer in the early years of female recruitment provided recognition and a decent salary, but it also allowed me to contribute to society in ways I had never thought possible”.

With this new accolade, Major Diouf says she now feels “motivated to do more” and will continue “to promote women's rights, speak out against sexual and gender-based violence, and fight marginalization and discriminatory customary and religious practices targeted at women and girls”.

UN Photo/Douglas Coffman
Police Commissioner Luis Carrilho looks on as UN Under-Secretary-General for Peacekeeping Operations, Jean-Pierre Lacroix, shakes the hand of Major Seynabou Diouf, UN Female Police Officer of the Year. (5 November 2019)

          

Jason Momoa Recklessly Feeds Cookie to a Bear from his Mouth as Publicity Stunt to Promote Movie

 Cache   
Actor Jason Momoa

Jason Momoa shared an Instagram post with a captive bear that highlights the issue of using live animals on movie sets.

The post Jason Momoa Recklessly Feeds Cookie to a Bear from his Mouth as Publicity Stunt to Promote Movie appeared first on One Green Planet.


          

Australian Home Affairs Minister Says Terrorists Use Crypto to Obfuscate Crimes

 Cache   

The Australian Minister of Home Affairs warned that terrorists are exploiting cryptocurrencies to “fund their deadly missions”


          

Are Hackers Using Popular Assistant Devices To Listen To Users?

 Cache   
The utility of virtual assistants like Amazon's Alexa and Google Home are undeniable.  They're just genuinely handy devices to have around. Unfortunately, they're also prone to abuse and exploits by hackers and ...
          

For: Mom, From: Boy

 Cache   
Tuesday, October 29th 2019   His exploits in 6th grade so far include the gardening club, where they harvest food and make delicious salads and EAT them!  Today his job was to “pull Marigolds.” “But when I saw how beautiful … Continue reading
          

STEALTHbits releases StealthDEFEND 2.2, its real-time threat detection and response platform

 Cache   

STEALTHbits Technologies, a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data, announced the release of StealthDEFEND 2.2, their real-time threat detection and response platform. Attackers continue to advance their techniques to infiltrate organizations, exploiting vulnerabilities in Active Directory and the structured and unstructured data that contain the sensitive information they want. Organizations concerned about data breaches and the rising costs to remediate them need … More

The post STEALTHbits releases StealthDEFEND 2.2, its real-time threat detection and response platform appeared first on Help Net Security.


          

NEWSLETTER #128 - OPEN LETTER TO THE PRESIDENT OF THE REPUBLIC OF MADAGASCAR

 Cache   
NEWSLETTER #128
*CRAAD-OI – Research and Support Centre for Development Alternatives – Indian Ocean
*Collectif pour la défense des terres malgaches – TANY
OPEN LETTER TO THE PRESIDENT OF THE REPUBLIC OF MADAGASCAR
His Excellency, President of the Republic
Please allow us to alert you about the radioactivity issue regarding the Ranobe site of the Base Toliara project relating to the exploitation of mineralized sands with the view to producing ilmenite, zircon, and rutile in the Atsimo Andrefana (...) - 06. Newsletters /
          

NEWSLETTER #128 - LETTRE OUVERTE À MONSIEUR LE PRÉSIDENT DE LA RÉPUBLIQUE DE MADAGASCAR

 Cache   
Son Excellence, Monsieur Le Président de la République,
Permettez-nous de vous alerter d'urgence au sujet de la radioactivité sur le site de Ranobe du projet Base Toliara d'exploitation de sables minéralisés en vue de la production d'ilménite, de zircon et de rutile dans la région Atsimo Andrefana.
En effet, après ses rencontres successives avec les dirigeants de la société minière, les communautés riveraines qui soutiennent la réalisation du projet Base Toliara, et celles qui demandent son arrêt (...) - 06. Newsletters /
          

NEWSLETTER #127 (FR) _ COMMUNIQUÉ _ LE MOUVEMENT POPULAIRE D'OPPOSITION AU PROJET BASE TOLIARA CONTINUE

 Cache   
NEWSLETTER n°127 (FR)
* CRAAD-OI - Centre de Recherches et d'Appui pour les Alternatives au Développement – Océan Indien
* Collectif pour la défense des terres malgaches – TANY
COMMUNIQUÉ
LE MOUVEMENT POPULAIRE D'OPPOSITION AU PROJET BASE TOLIARA CONTINUE
Plusieurs articles parus dans différents media malagasy ont annoncé que les communautés opposées au projet minier de la société australienne Base Resources avaient changé d'avis et acceptent désormais l'exploitation des sables minéralisés dans la zone (...) - 06. Newsletters /
          

Newsletter n°126 (FR)

 Cache   
Newsletter n°126 (FR) Collectif pour la défense des terres malgaches – TANY
QUELS DANGERS PLUS GRAVES DEVRONT SE PRÉSENTER POUR QUE LES AUTORITÉS ARRÊTENT DÉFINITIVEMENT LE PROJET BASE TOLIARA ?
Les risques liés à la radioactivité émanant du site d'extraction d'ilménite, de zircon et de rutile de Ranobe figurent parmi les principales raisons évoquées par les communautés qui s'opposent depuis plusieurs années au projet d'exploitation d'ilménite Base Toliara par la société australienne Base Resources..
Le (...) - 06. Newsletters /
          

Dexploitation Et Systemes De Protection Sur Apple Ii Collection Dirigee Par Philippe Olivier

 Cache   
Dexploitation Et Systemes De Protection Sur Apple Ii Collection Dirigee Par Philippe Olivier
          

People are exploiting the Robinhood investment app like any other video game

 Cache   
From Matt Levine's newsletter (which goes into much more detail about the exploit):
It makes an app that you can download to your phone, and then you can play a game on the app. As with many mobile games, there are in-app purchases, and you can end up spending a lot of money on the Robinhood game. The game is of course a stock-trading game. The purchases are stocks. You win by getting a lot of money. But there are other ways to play. Some people aren’t interested in playing the game as its designers intended. They want to hack the game, to find weird glitches and exploits, to take the game apart and build their own weird levels, to stream the resulting monstrosities to entertain their friends.

Many, many, many of my readers have emailed and tweeted about a Robinhood exploit that goes by the charming and accurate name “infinite leverage.” Here’s a Reddit user called ControlTheNarrative who claims to have gotten 25x leverage on his trading; that is, he put in $2,000 and turned it into about $50,000 worth of stock. Here’s another Reddit user called MoonYachts who claims to have gotten 250x leverage, putting in $4,000 and turning it into a $1,000,000 stock position. You are not supposed to be able to do this; normal stock market games do not allow you to bet a million dollars by putting up only $4,000 of your own. (“We’re aware of the isolated situations and communicating directly with customers,” said a Robinhood spokesperson.)

These people are posting screenshots and videos of their exploits. They are discussing ways to use the exploit for further, even more outrageous pranks. I do not exactly know what they are thinking. Presumably some part of what they are thinking is along the lines of “if I use $4,000 to buy a million dollars’ worth of stock and it goes up then I will make a lot of money.” But surely another big part of what they are thinking is “if I use $4,000 to buy a million dollars’ worth of stock then my friends on Reddit will be amused.” Judging by the Reddit threads, and by my email inbox, this was a correct analysis. I suppose it is not a conventional financial analysis, but you should not underestimate the importance, in trading generally, of impressing people with your wit and boldness.

          

525612-2019: Hongrie-Budapest: Exploitation de l'alimentation en eau

 Cache   
Date de publication: 06/11/2019 | Date limite: 05-12-2019 | Document: Avis de marché
          

Questions/Réponses à propos d'ArcGIS Urban

 Cache   
Suite aux premières présentations d'ArcGIS Urban lors de SIG2019, j'ai collecté un ensemble de questions que vous m'avez posées sur la nouvelle solution de planification urbaine de la plateforme ArcGIS. En espérant que cela vous sera utile, je vous propose une synthèse des questions et des réponses relatives à la version 1.0 actuelle et à la version 1.1 (prévue avant la fin de l'année).
  
 
   

Quelles sont les principales capacités d'Urban ?
  • Afficher une représentation numérique 3D de votre territoire dans laquelle tous les projets de développement urbain sont visualisés à partir d'une seule base de données centralisée par votre SIG pour une collaboration entre les différents acteurs, partenaires et parties prenantes.
  • Visualiser les zonages réglementaires en 3D: convertir le texte légal en une représentation cartographique 3D pouvant être utilisée pour la planification détaillée de scénarii allant jusqu'au niveau de la parcelle.
  • Générer les volumes plausibles (possibles) des bâtiments et analyser l'impact des plans à l'aide d'indicateurs de capacité générées automatiquement et en comparant différents scénarios de conception.

Comment ArcGIS Online et ArcGIS Urban travaillent-ils ensemble ?
ArcGIS Urban est construit sur ArcGIS Online. Il utilise des couches web hébergées pour afficher et gérer les données publiées dans votre organisation ArcGIS Online. L'application utilise les concepts habituels de groupes et d'utilisateurs d'ArcGIS Online pour contrôler l'accès à ces couches.

Peut-on utiliser ArcGIS Urban sur un portail ArcGIS Enterprise ?
Non, ArcGIS Urban n’est pour l'instant disponible que sur ArcGIS Online. En revanche, ArcGIS Urban peut consommer certaines couches web d'un portail ArcGIS Enterprise.

Comment ArcGIS Pro et ArcGIS Urban travaillent-ils ensemble ?
La base de données d'ArcGIS Urban est stockée en tant que couches (et tables) web hébergées et peuvent donc être ouvertes dans ArcGIS Pro lors de la connexion à votre organisation ArcGIS Online, où elles ont été créées. Les couches de fonctions peuvent être affichées et modifiées via ArcGIS Pro. Toutefois, aucune intégration dédiée n'est disponible.

Comment CityEngine et ArcGIS Urban travaillent-ils ensemble ?
Une intégration dédiée est disponible entre CityEngine et Urban . CityEngine peut automatiquement se connecter à un modèle urbain et charger des plans et des projets depuis Urban. Les modifications et les modifications apportées dans CityEngine peuvent être synchronisées à nouveau avec Urban et de nouveaux scénarios peuvent être créés.
   
En quoi ArcGIS Urban diffère-t-il de CityEngine ? 
ArcGIS Urban et CityEngine ont beaucoup de capacités en commun (par exemple, ils utilisent le même moteur procédural pour générer des modèles 3D), mais ils diffèrent également. Dans CityEngine, vous pouvez écrire vos règles CGA personnalisées. ArcGIS Urban fournit une règle intégrée qui ne peut pas être modifiée. Ce que vous pouvez modifier dans ArcGIS Urban, ce sont les paramètres qui régissent la règle, tels que la hauteur maximale, le ratio de surface au sol autorisé ou encore les distances de retrait par rapport aux limites des parcelles. ArcGIS Urban est une application web, tandis que CityEngine est un outil bureautique installé localement. En général, ArcGIS Urban est une plateforme ciblée sur les workflows de planification urbaine et facilite la communication entre les parties prenantes. CityEngine prend en charge la création de scénarii d'aménagements urbains détaillés et génère des modèles 3D sophistiqués pour des scénarii élaborés.
  
   
Ai-je toujours besoin de CityEngine si j'utilise ArcGIS Urban ?
ArcGIS Urban peut tout à fait fonctionner sans être couplé à CityEngine. En couplant les deux applications, vous pourrez retravailler dans CityEngine les plans élaborés avec ArcGIS Urban pour leur données plus de détails et de réalisme. Une fois modifiés dans CityEngine, il sera très simple de les publier sur votre portail pour un usage, notamment, dans ArcGIS Urban. Depuis la version 2019.1 de CityEngine, une interface dédiée à ces workflows est intégrée dans l'application.
  
Peut-on utiliser ArcGIS Urban avec des données de CAO/DAO (par exemple: AutoCAD) ?
Oui, il existe principalement deux workflows pour importer des données CAO/DAO dans ArcGIS Urban:
  • Intégration CAO/DAO via CityEngine: L’intégration étroite entre ArcGIS Urban et CityEngine permet d’importer des données de différents formats 3D (dxf, dae, fbx, glTF, kml/kmz, obj) dans CityEngine et, à partir de là, les modèles peuvent être publiés et directement associés à un scénario de projet ou de plan.
  • Intégration de la CAO/DAO via ArcGIS Pro: ArcGIS Urban peut afficher les couches de scène d'Objets 3D (multipatch) et les couches de scènes de bâtiments (BIM) publiées via ArcGIS Pro. Ces couches peuvent provenir à la fois de logiciels de CAO/DAO ou de logiciels BIM tels que Revit. Après la publication des couches à partir d'ArcGIS Pro, elles peuvent être utilisées comme couches du contexte global ou associées en tant que sources externes dans un scénario de projet ou de plan.
        
Les modèles BIM peuvent-ils être ajoutés à ArcGIS Urban ? Si oui, combien et quelles sont les recommandations pour obtenir les meilleures performances ?
Oui, les modèles BIM peuvent être ajoutés à ArcGIS Urban, mais ils doivent être préalablement publiés en couches de scènes de bâtiments. Pour obtenir les meilleurs résultats, il est recommandé de publier une version allégée du modèle BIM (conserver uniquement les couches pertinentes). Plusieurs modèles BIM peuvent être associés à différents scénarios, mais pour des raisons de performances, ils ne seront pas chargés/affichés en même temps.

Ajout d'un modèle BIM sur un projet
Ajout d'un modèle 3D texturé sur un projet
  
Puis-je travailler hors ligne avec ArcGIS Urban ?
Non, ArcGIS Urban est une application web et nécessite une connexion Internet stable.

Quels navigateurs sont pris en charge par ArcGIS Urban ?
Comme beaucoup d'application exploitant WebGL, ArcGIS Urban fonctionne mieux avec Chrome, mais Firefox, Safari et Edge sont également pris en charge. Seul Internet Explorer ne peut pas être utilisé avec ArcGIS Urban car il ne prend pas en charge la technologie sous-jacente à la modélisation procédurale des bâtiments 3D.
  
Combien coûte Urban et comment puis-je l'acheter ?
Une licence ArcGIS Urban doit être associée à un type d'utilisateur Creator de votre organisation ArcGIS Online. Une licence ArcGIS Urban est une souscription annuelle dont vous pourrez connaître le montant en contactant votre interlocuteur commercial habituel chez Esri. 

Comment l'usage d'ArcGIS Urban affecte-t-il mes crédits ArcGIS Online ? Est-ce qu'un grand territoire consomme plus de crédits ?
Une grande ville ne consomme pas nécessairement plus de crédits. La consommation de crédit dépend du nombre de plans, de projets et d'indicateurs stockés dans votre zone urbaine. Plus le nombre d'entités stockées dans la base de données est élevé, plus le nombre de crédits nécessaires à leur stockage est important. Pour anticiper la consommation de crédit d'ArcGIS Online, vous pouvez consulter cette page. Des crédits supplémentaires sont utilisés dans ArcGIS Urban lors de l'utilisation de la recherche d'adresse et pour les requêtes d'élévation (lorsque vous n'utilisez pas de couche d'altitude personnalisée).
  
Les étudiants peuvent-ils utiliser ArcGIS Urban sans avoir à acheter une licence ?
Oui, ArcGIS Urban fait partie de l'accord sur les établissements d'enseignement. Avec la licence pour l'éducation, les universités et les écoles peuvent mettre des licences à la disposition des étudiants pour leurs cours. 

ArcGIS Urban prend-il en charge le développement urbain de sites vierges ?
Oui, le développement de nouvelles installations est pris en charge en milieu urbain De nouvelles parcelles peuvent être ajoutés et générés à la volée avec les outils de dessin 3D. Vous pouvez dessiner de nouvelles parcelles dans ArcGIS Urban, et vous pouvez également subdiviser de grandes parcelles directement dans l'application. Pour des zones très vastes, vous pouvez aussi ouvrir le plan dans CityEngine et générer automatiquement des parcelles basées sur le réseau de rues importées ou dessinées dans l'application bureautique.

Outre la planification urbaine, d’autres secteurs peuvent-ils tirer parti de l’utilisation d'ArcGIS Urban ? 
Oui, les concepts sous-jacents d'ArcGIS Urban peuvent également être utilisés pour résoudre d'autres problèmes, tels que:
  • Architecture, ingénierie et construction (AEC): comment pouvons-nous suivre tous nos projets proposés, planifiés, en cours ou achevés ?
  • Immobilier : Comment pouvons-nous gérer et afficher tous les projets en cours dans notre organisation ?
  • Éducation : Comment pouvons-nous expliquer aux étudiants la densité et les tendances en matière de développement urbain avec des outils 3D et de manière interactive ?

Et bien d’autres… faites-nous savoir si vous avez une idée pour une application dans votre domaine métier ou votre secteur d'activité.

Des données externes peuvent-elles être ajoutées à ArcGIS Urban à partir de différentes sources de données ?
Oui, des données externes peuvent être ajoutées à ArcGIS Urban. Pour cela vous utilisez le gestionnaire de données intégré à ArcGIS Urban pour charger des données à partir de couches d’entités existantes ou de feuilles de calcul (csv, excel, par exemple). Des couches existantes telles que les fonds de cartes, les bâtiments 3D existants, les parcelles ou encore les zones réglementaires peuvent être ajoutés. Dans la configuration des plans et des projets, des couches externes peuvent être attachées à chaque scénario. Pour les indicateurs de contexte, l'ajout de scènes web externes peuvent être préparées à l'aide des capacités de SmartMapping puis ajoutées à votre projet ArcGIS Urban.

Existe-t-il des indicateurs environnementaux intégrés dans Urban ?
Oui, les indicateurs du Living Atlas d'ArcGIS Online incluent l'indicateur Trust for Public Land (TPL) appelé ParkServe®. La plate-forme ParkServe® fournit des informations sur les systèmes de parcs et le pourcentage associé de résidents des villes et villages et des communautés situées à moins de 10 minutes à pied d'un parc. Cet indicateur est actuellement disponible uniquement aux États-Unis. Cependant, ce type d'indicateur peut être construit avec ArcGIS Pro et les données de votre SIG.

Les indicateurs de capacité intégrés peuvent-ils être personnalisés dans ArcGIS Urban ?
Oui, les indicateurs de capacité intégrés (population, logements, emplois) peuvent être configurés pour répondre aux normes de votre ville. Les valeurs par défaut correspondent à une moyenne pour l'ensemble des États-Unis et peuvent être utilisées comme référence si vous ne connaissez pas les indicateurs tels que la surface habitable moyenne par habitant. Ces hypothèses sont liées aux types d'utilisation de l'espace dans ArcGIS Urban et peuvent être configurées dans le gestionnaire de données.

Exemple d'indicateur de contexte relatif à l'évolution du nombre de logements
Exemple d'indicateur de contexte relatif à l'accessibilité aux espaces verts

Puis-je exporter des données d'ArcGIS Urban ?
Oui, vous pouvez utiliser les couches d'entités et les tables de la base de données d'ArcGIS Urban pour exporter les données et les utiliser dans d'autres outils ou à des fins d'analyse. Une fonction d'exportation avancée sera ajoutée dans la prochaine version 1.1 d'ArcGIS Urban. Cette capacités à venir permettra d'exporter des indicateurs de capacité vers une feuille Excel ainsi que l'exportation de scénarii complets vers un scène web (3D) ou une carte web (2D). De plus, ArcGIS Urban vous permet de générer des captures d’écran haute résolution au sein de l’application.
  
Quel type de données est généré par ArcGIS Urban ?
L'application crée des volumes de bâtiments dits "plausibles" ainsi que des enveloppes maximisant les contraintes réglementaires défini par les zones ou les parcelles. L'application calcule les indicateurs de capacité en fonction de la surface de plancher brute (de chaque étage) et du type utilisation de l'espace des bâtiments. Les indicateurs de capacité actuellement disponibles sont le nombre de personnes, le nombre de logements et le nombre d'emplois. Les indicateurs sont calculés sur la base d’hypothèses telles que l'occupation moyenne de surface utile par habitant, le nombre d'emplois par type d'activité, .... Ces hypothèses peuvent être configurées par l'utilisateur. Les indicateurs de capacité sont affichés dans un tableau de bord qui peut être filtré sur l’ensemble de la zone d’étude ou sur une sélection effectuée par l’utilisateur.

Volumes de bâtiments plausibles et indicateurs de capacité
  
Quels autres types de données ArcGIS Urban peut-il rapporter en plus des indicateurs de capacité ?
Divers modèles analytiques (certains propriétaires et d'autres open source) sont utilisés à des fins de planification. ArcGIS Urban peut fournir des contenus en entrée pour ces modèles. Souvent, ces modèles sont également géolocalisés, ce qui permet à ArcGIS Urban de fournir des informations plus détaillées (passé, actuel et futur) pour ces modèles (parcelles, bâtiments, occupation des sols, ...). Donc si vous avez le modèle, vous pouvez utiliser les résultats générés par ArcGIS Urban, pour analyser l'impact de différents scenarii sur divers autres indicateurs qui vous intéressent, tels que la les déplacements, les besoins énergétiques, les exigences de stationnement...
  
Des widgets personnalisés peuvent-ils être ajoutés à ArcGIS Urban ?
Non, les widgets personnalisés ne peuvent pas être ajoutés à ArcGIS Urban. Si vous souhaitez configurer votre propre application web, vous pouvez utiliser Web AppBuilder for ArcGIS, ArcGIS Experience Builder ou l'API JavaScript ArcGIS.
  
Est-ce qu'ArcGIS Urban fonctionne pour n'importe quel territoire ?
Oui, Urban est conçu pour fonctionner sur des petites agglomérations ou de grandes métropoles, et dans une certaine mesure, au niveau de départements ou de régions.
  
Quelle superficie peut faire la zone urbaine ?
La quantité de contenu qu'ArcGIS Urban peut afficher n’est pas limitée, car les données (bâtiments, par exemple) sont diffusées sois la forme d'un streaming web continu et sont chargées à différents niveaux de détails, adaptés à l'étendue d’affichage et du niveau d'échelle. Lors de la création de nouveaux plans dans Urban (une ZAC par exemple), il est recommandé de ne pas couvrir plus de 50 000 parcelles (ou bâtiments) par plan pour des raisons de performances et pour une expérience utilisateur optimale. Cependant, une ville peut contenir un nombre infini de plans.
On notera aussi que la technologie des couches de scènes d'ArcGIS Online vous permet d’agrandir la taille et la densité de données 2D/3D de votre territoire au fur et à mesure du chargement des entités en fonction de votre étendue et de votre niveau de zoom. Le niveau de détail des bâtiments 3D est ajusté en permanence en fonction de ces paramètres. Dans l'exemple montré dans ma démonstration ArcGIS Urban à la conférence SIG2019, le territoire couvert était de 530 km2 avec plus de 350 000 bâtiments 3D texturés. 
  
Dois-je disposer d'un fond de carte 3D pour commencer à utiliser ArcGIS Urban?
Non, vous n'avez pas besoin du modèle des bâtiments 3D existants. Bien sûr, il est recommandé de créer un fond de carte 3D pour une meilleure expérience et pour que des décisions de planification plus précises puissent être prises. Avec ArcGIS Pro, vous disposez de toute les fonctionnalités permettant de générer un fond de carte 3D plus ou moins précis selon les sources de données dont vous disposez. Rapprochez de votre distributeur Esri pour être conseillé. A minima, Esri France est en mesure de vous proposer une maquette 3D sur l'ensemble de la France en LOD1 réalisée à partir de la BDTopo de l'IGN.
  
Comment Urban gère-t-il la végétation (arbres, parcs, espaces ouverts, etc.) ?
Les arbres 3D peuvent être importés en tant que couche web de contexte si vous en avez. Une couche d'arbre 3D peut être produite si vous avez accès à un jeu de données Lidar ou si vous avez une couche de points pour vos arbres. Les couches de zones inondables, d'espaces vert, de données socio-démographiques, ....peuvent être intégrées à ArcGIS Urban en tant qu'indicateur ou couche contextuelle si elles sont hébergées en tant que couche web sur votre portail. Leur rendu 2D ou 3D sera préalablement préparé dans la visionneuse de scène de votre portail. Avec la version 1.1 à venir, il sera possible d'ajouter à votre base de données Urban une couche pour les arbres 3D existants (couche de scène) qui, comme pour les bâtiments, pourra être masquée par les nouveaux développements.

Existe-t-il des services professionnels requis pour ArcGIS Urban ? Ai-je besoin d'un kit de lancement ?
Non, mais il est recommandé de passer par des jours d'assistance pour la configuration initiale d'ArcGIS Urban. Vous pouvez cependant configurer vous-même ArcGIS Urban à l'aide du gestionnaire de données de l'application.
  
   
Si vous avez vous d'autres questions, n'hésitez pas à les poser sur ce blog, à votre interlocuteur technique/commercial habituel mais aussi dans l'espace GeoNet dédié à ArcGIS Urban.

          

Sales: Sales Associate - Frisco, TX - Frisco, Texas

 Cache   
Sales Associate - Frisco, TX Mondelz International, Inc. empowers people to snack right in over 160 countries around the world. We're leading the future of snacking with iconic brands such as Oreo, belVita and LU biscuits; Cadbury Dairy Milk, Milka and Toblerone chocolate; Sour Patch Kids candy and Trident gum. Our 90,000+ colleagues around the world are key to the success of our business. Great people and great brands. That's who we are. Join us on our mission to continue leading the future of snacking around the world by offering the right snack, for the right moment, made the right way. It's time for you to Make It with Mondelz International. As a part of Sales, you'll put our customers at the heart of our business. By building strong relationships with every customer, big or small, you'll help Mondelz International become the supplier of choice and ensure we deliver world-class execution of our business plans in every store. The Sales Associate (SA) is a full-time Sales position that is designed to build a world class Direct Store Delivery (DSD) business at the retail level. A major objective of this role is to establish and maintain rapport with key store individuals while providing outstanding customer service, maximizing sales, conducting effective planning & order-writing; as well as supporting and completing activities such as merchandising & shelf-pricing. The Sales Associate exploits selling opportunities, company programs, and strategies to positively influence the sale of Mondelz International products to retail stores on a variety of territories while covering the vacation or leave of absence of a Sales Representative. Primary Responsibilities: Training for the Sales Representative role. Develop complete knowledge of Mondelz products, systems, and procedures, including: sales objectives, campaigns and promotions, sales brochures and order guides, sales presentations, sources of product and distribution, and proper merchandising concepts. Inventory Management/Order Writing. Develop skills in order-writing and managing inventory. Stock Shelves and Rotate Product. Work in conjunction with the Merchandisers to ensure inventory is fully-stocked, rotated and presentable at all times. Sales. Sell new products, displays, and promotions at store level, as well as build and maintain displays. Territory Management. Cover open Sales Representative territories as part of career development. Travel. Overnights hotel stays may occur when covering out of town territories.Mondelz International is an employer of inclusion who partners with diversity groups which cater to people of all ethnicities, genders, ages and sexual orientations. Mondelz International also works with military veterans to help hire our heroes who have served our nation, as well as partner with disability networks to include people of all abilities to help the company succeed for years to come. Benefits and Compensation: The Sales Associate role is designed to be a transitional role into the Sales Representative role. This position offers a comprehensive medical, dental and vision benefit package, in addition to paid vacation, holidays, 401(k) match and Employee Assistance Program benefits. Also offered is a company vehicle, which includes a gas card and vehicle maintenance program. Along with a competitive compensation package, the Sales Associate is also eligible to participate in an incentive program. Key Competencies: Utilization of innovation and creativity in generating new and unique ideas and solutions that capitalize on opportunities to benefit customers and Mondelz Global. Ability to form customer partnerships that exceed expectations and help customers identify and execute the appropriate strategies for their business success. Ability to use sales and order management systems and technologies to ensure exceptional customer service. Ability to work independently. Flexibility with the ability to change schedule on a daily basis to meet the demands of the business. Demonstration of strong and effective communication skills. Ability to identify and solve problems with minimal guidance to minimize disruptions to the business. Ability to perform hard work in a fast-pace work environment and meet the defined physical activities (frequent lifting, bending, and carrying up to 25 lbs., occasionally over 50 lbs., pushing, pulling, etc.) while adhering to set safety expectations and processes. Proficient in the use of Microsoft Office, Internet and Cellular/Wireless devices. Requirements: You must be at least 18 years of age, have a valid driver's license, proof of auto insurance, and have access to the internet with a personal email account. High School Diploma or GED required; College degree highly preferred. Must be open to relocation, outside of region, and outside of state, as necessary. A flexible work schedule is required, including being available to travel across the region, a week at a time, to cover a territory and being available to work weekends and holidays. Some overnight travel may be required Previous grocery, retail, sales, and/or customer service experience a plus. Must be open to performing Merchandiser responsibilities, as needed. Successful completion of drug test, MVR check, and general background check. Mondelz Global LLC is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected Veteran status, sexual orientation, gender identity, gender expression, genetic information, or any other characteristic protected by law. Applicants who require accommodation to participate in the job application process may contact ************ for assistance. Applicants must complete all required steps in the application process, including providing a Resume/CV, in order to be considered for this position. NA-US-Texas-Frisco Field Sales Full-time ()
          

Porn. Panic. Ban.

 Cache   

Authored by: 

Organization: 

Point of View
AttachmentSize
PDF icon Thematic Datta953.02 KB

#PornBan. It’s like a rash, this impulse to ban porn all over the world – despite protests that are going viral. The Twitter hashtag #pornban sprung up in July 2015 as the Indian government blocked 857 porn sites, 1 and then backtracked a bit, 2 asking internet service providers (ISPs) to unblock those that don’t contain child pornography. Which makes service providers the arbiters of our constitutionally guaranteed right to freedom of expression, deciding what we may or may not see. Seriously?

The United Kingdom recently banned a number of sex acts online, 3 including female ejaculation, even while there were almost 250,000 hits on porn sites from IP addresses in the buildings housing parliament. 4 The UK government is now asking porn sites to collect proof 5 that their visitors are adults. Will this data be stored privately and not used for other purposes? A valid question in an age of mass surveillance, hacks on “cheating” sites 6 and hacker releases of private information, including sexual preferences. 7

Iceland 8 has been threatening to ban “violent” online porn since 2013. Indonesia 9 and Turkey 10 have blocked lesbian, gay, bisexual, transgender, intersex and queer (LGBTIQ) content in the name of banning porn. The Philippines 11 has outlawed cybersex and cam girls, while a religious lobby in Australia 12 is pushing for anti-piracy laws to be extended to porn. Porn possession is illegal in Botswana, 13 Egypt 14 and Uganda. 15 And even as the Israel-Palestine conflict escalated in 2012, Hamas managed to ban “full” internet porn in the Gaza Strip. 16 Whatever that means.

Porn. Panic. Ban. That’s pretty much the policy response in many parts of the world.

But what is it about porn that terrifies so many governments, derails feminist sensibilities, offends the religious right, and attracts so many users? How can we change the way we “see” porn?

***
Lesbian. Threesome. Squirt. Change the words and you change the lens. From the user’s perspective, porn leads to pleasure, not panic. That’s what porn has always been about, from ancient times, when it found its first mention in the word porneia. 17 This Greek word was varyingly defined as fornication, whoredom, promiscuity and adultery, all of which have two things in common: sex and pleasure. For most users, that’s what porn is really about: sexual pleasure. (Dirty, dirty.) Arousal. (Dirty, dirty.) Orgasm. (Dirty, dirty.) Problem is that in the parental gaze called policy, sex is kinda dirty. (Dirty, dirty.)

Problem is that in this global policy gaze, the sexual pleasure-seeker aka Porn User is always a man. Even though globally a quarter of porn viewers are women. 18 Make that 35% in Brazil and the Philippines, 24% in France, 23% in India and Argentina, and come on, Japanese women, you 17% laggards. 19 A 2015 survey of Pornhub and Redtube, 20 which gets 40 million viewers each month, shows that women like watching women. (And Kim Kardashian, James Deen, pussy-licking and rough sex.) “What immediately jumps out is that ladies prefer to take their time, with their average visits to the site lasting a lavish 10 minutes and 10 seconds, compared to men who go for just 9:22,” notes the cocky analysis. “Treat yourselves, ladies!”

So one gender gap is slowly closing as porn moves indoors from the publicness of peepshows and DVD parlours to the relative privacy of one’s own home. (We should be celebrating, not lamenting this “normalisation” of porn, no?) And don’t forget how notions of privacy shape behaviour here. No Peeping Toms. No looking over one’s shoulder. No idea of what we get off on so long as porn sites don’t start matching individual viewers to their viewing habits. Which means that even though “lesbian”, “threesome” and “squirt” are the top three terms that women searched for on Pornhub and RedTube in 2015, the data is anonymised and secure. (Hopefully.) No one’s going to land up at their doorsteps to blackmail them. (Hopefully.) They’re not going to be branded with the scarlet letter P, the digital equivalent of Nathaniel Hawthorne’s analog adulteress, 21 forced to wear the letter A in the 17th century.

Yes. Porn is becoming a bit of a Scarlet Letter – a private act portrayed as a public menace. Privacy is the right to be let alone, wrote Justices Warren and Brandeis of the United States (US) Supreme Court in their iconic 1890 essay. 22 That too was in a context when new media technologies – “instantaneous photographs”, “newspaper enterprises”, “mechanical devices” – were producing panic. Technological change has, of course, always given rise to panic: even the sewing machine was once thought to create deviant desires in women, as they rhythmically moved their legs up and down to its gentle whirr. And women, of course, have always been subjected to moral panics and moralistic privacy 23 when it comes to sexuality, notes law professor Anita L. Allen. One that is associated with “heightened modesty”, self-concealment, and chastity. (Don’t show yourself. Don’t watch other women. In short, no pornification.) Porn’s genteel cousin, erotica, has also faced similar panics. Remember the ban on D. H. Lawrence’s Lady Chatterley’s Lover 24 in the 1960s?

Problem is, in the policy gaze, women are still stuck in the passenger seat when it comes to sex. It imagines the hubby coming home, all pumped up, and asking the missus to go beyond the missionary position. Just like he saw on his iPad mini. (Dirty, dirty.) You see? Man, driver. Woman, passenger. From the first utterance of porneia, men have been seen as the drivers of sex, women its passengers. Never mind that this is rooted in another P – Patriarchy – which insists that women must have no sexual desire, let alone know pleasure-enhancing postures. (Dirty, dirty). Never mind that many women still can’t refuse men sex, or get them to wear condoms. Never mind every inequality between men and women that pops up everywhere, including in the bedroom. If there was greater equality between the genders, fewer women would feign headaches when they don't want to have sex.

That’s gender inequality. That’s what we need to fix. But it’s so much easier to blame porn for patriarchy, no?

***
Multi-million. Dollar. Industry. This is how anti-porn crusaders often refer to porn. It’s a magic bullet, this phrase, guaranteed to derail logic. Guaranteed to make folks see red. As if we’re not doing all sorts of things like buying biscuits and Maggi noodles and data connections from multi-million dollar enterprises.

Of course we’re all proponents of the small, the stand-alone, the artisanal. But. Can porn be damned just because it’s big business? Let’s stop eating Glucose biscuits first. And must we start loving all independent 25 or homemade porn, right from consenting cam girls to non-consensual hidden cam porn in cyber cafés? Nah. Like in other industries, porn production is “ethical”, when there are no unfair or exploitative contractual or labour practices. When performers are not being pushed to perform sex acts beyond the contract or without condoms. But that’s not enough. Porn is legit, first and foremost, if it’s based on consent. And consent cuts all the way down the line: from those who are paid to perform porn to those who freely turn their images into porn for private pleasure. That some of these images end up as non-consensual porn – often called revenge porn – is a problem that policy makers in some countries have finally begun to tackle, notably in the US where revenge porn is a crime in several states. 26

But try asking anti-porn campaigners to use consent as a yardstick. No. In the anti-porn worldview, ALL porn causes harm to ALL women: those who consume it and those who don’t. All porn objectifies and dehumanises women, never mind women who have starred as “personified” subjects! In this camp, there’s only one kind of porn – in which men treat women as instruments to satisfy their sexual desires. In which porn is the villain with a capital P, mutating “healthy” sexual desires and relationships into “unhealthy” ones. 27 It’s never about mutual pleasure or that there are as many kinds of porn as there are sexual desires. Including queer crip porn. 28 It’s rarely about porn performers who don’t see themselves as victims. Or the issues porn performers themselves raise. “My stage name is less about withholding parts of myself or maintaining privacy than it is a symbol of the idea that I am more than just my job or any other isolated slice of my identity,” says US porn performer, Stoya. 29 “Yes, there’s a paradox here in that I willingly engage in work that reduces me to a few sexual facets of myself but expect to be seen as a multifaceted person outside of that work. I participate in an illusion of easy physical access…”

If objectification is the charge that some feminists typically hurl at porn, addiction is its moralist cousin. In the digital porn discourse, access is often vilified as “addiction” with untold consequences. Portrayed as a drug. A petitioner to India's parliament argues that online porn must be banned before we turn into the equivalent of “Motherless or Fatherless America”. 30 This trend is “related to those ‘orphaned’ children, whose father or mother, though alive, are addicted to cyberpornography and don’t take any care of their children or the family,” the petitioner argues. Another #pornban petitioner in India's Supreme Court raises this bombast to untold heights. 31 “Nothing can more efficiently destroy a person, fizzle their mind, evaporate their future, eliminate their potential or destroy society like pornography,” he argues. “It is so terrible that many do not even recognize it until it is too late, and most refuse to admit it. It is worse than Hitler, worse than AIDS, cancer or any other epidemic. It is more catastrophic than nuclear holocaust, and it must be stopped.”

This #pornban petition goes on to hold online pornography accountable for increasing violence against women, an emotive charge (like “multi-million dollar industry”) that unites moralists and many feminists. Does porn cause rape? Or, as feminist Robin Morgan famously argued in the 1970s, is “porn the theory, rape the practice”? 32 No. Even those who campaign against porn warily agree there’s no evidence to back this charge. 33 In the 1990s, one research study looked at four countries where porn was freely available in the previous two decades, including “aggressive porn”. 34 In all four countries, the availability of pictorial porn – including violent porn – had gone from “extreme scarcity to relative abundance” in the study period. It noted that other studies have shown that “rapists' and nonrapists' immediate sexual reactions to presentations of pornography showed generally greater arousal to non-violent scenes.” It concluded that in none of the countries did “rape increase more than nonsexual violent crimes. This finding in itself would seem sufficient to discard the hypothesis that pornography causes rape.” 35

Disregarding such evidence, anti-porn feminists continue to insist that porn is an act of sexual violence, that porn is not “words” and “images”, that porn is not speech to be protected. 36 Not media. This positioning is, of course, part of the problem, since it exceptionalises porn, locating it in a category by itself, unlike other speech or media. But seriously, what is porn – composed of words, sounds and images, albeit of naked bodies – if not media? Innumerable studies indicate that there is no causal relationship between media representations and realities, that spectators hold diverse and different positions to what they view. 37 Do we hold on-screen rape depictions in feature films responsible for causing actual rapes? No. Do we hold on-screen depictions of murder responsible for causing actual murders? No. Then why hold on-screen porn responsible for real-life rape and sexual assault? Why blame the representation for the reality in this one case alone? What’s so unique about porn – another media representation – that it must be singled out thus? Are naked bodies inherently harmful? Or what?

***
In a 2009 TED talk that went viral, Cindy Gallop, a 50-something fan of hardcore porn, described how she sees online porn. 38 “I have sex with younger men…” in their 20s, she says, “and encounter directly the effect of a flood of hardcore porn.” One of these effects is the misbelief that women love men coming on their faces, a porn staple. “There’s an entire generation growing up that believes that what you see in hardcore pornography is the way that you have sex,” says Gallop. “Hardcore porn has become sex education.” But why has hardcore porn become sex education? One, because it’s easily available. Two, because there’s no other sex education. Three, because we’re so puritanical about sex, we won’t talk about it to our kids. Ergo, vacuum. Enter, online porn. As a “mature experienced self-confident older woman,” Gallop is adept at telling her 20-something lovers: “No, thank you very much. I’d rather you did not come on my face.”

As a user, how would Gallop change porn? “Reorient, reeducate, rehabilitate” is her motto. In other words, resocialise minds, reshape headspaces, rewire neutrons away from the dungheap of patriarchy. Towards a more equitable gender-friendly porn. Sounds like sex-positive feminism to me. Her site 39 busts a bunch of porn myths including balloon boobs, while understanding that porn is play, a pleasure-enhancer, like sex toys. A form of sexual expression. In another TED talk that went viral, erotic filmmaker Erika Lust talks about how it’s time for porn to change. 40 Change. Not vanish. How it’s time to fight unethical porn with ethical porn, counter-porn, porn that makes women and transpersons 41 the subjects of their sexual journeys, pleasures and destinations.

That’s right. Change porn, not ban it. Think about it. Seriously. Think how we try to change other media representations – through critique, debate, dialogue and alternative representations. Not through bans, right? If policy makers understood porn as sexual expression, why would they want to ban it?

***
So what should we really think about when we think about porn? Consent. We need to respect the consent of those who enact porn – if it’s given, even to enacting “rape porn”, dare we cavil? And we need to start getting justice for those who never dreamed they’d end up as digital porn – without their consent. Any image that turns into porn without consent can cause actual harm, not the imaginary variety – harm that wrecks lives, jobs, careers, relationships, self-image and identities. Harm that causes real damage, both on and offline. Harm that is harmful enough to be called out and punished as a crime. When actual rapes turn into digital porn, spreading from phone to phone, as is the case in Pakistan and India, that’s harm. And that’s three counts of consent being violated: one, in forcing sex without consent; two, in filming forced sex without consent; three, in circulating this clip without consent. When physical rape turns into digital porn we know one thing for sure: it’s time to start talking consent. It’s time to start talking harm.

If we really want to “do something” about porn, it’s time we stopped talking about its imagined harms. It’s time we started talking about actual harms. It’s time we started talking along the fault lines of consent.

References

1 Government of India, Ministry of Communication & IT, Department of Telecommunications. (2015). DOT Order Blocking 857 Websites on Grounds of Decency and Morality. cis-india.org/internet-governance/resources/dot-morality-block-order-2015-07-31/view

2 Reuters. (2015, 5 August). India withdraws order to block pornography sites. Reuters. in.reuters.com/article/2015/08/05/india-porn-ban-idINKCN0QA0KK20150805

3 Saul, H. (2015, 13 September). UK porn legislation: What is now banned under new government laws. The Independent. www.independent.co.uk/news/uk/home-news/uk-porn-legislation-what-is-now-banned-under-new-government-laws-9898541.html

4 Withnall, A. (2015, 27 July). Porn in Parliament: Palace of Westminster computers made 250,000 attempts to 'access pornography last year. The Independent. www.independent.co.uk/news/uk/politics/parliament-computers-made-250000-attempts-to-access-pornography-at-palace-of-westminster-10418449.html

5 Doctorow, C. (2015, 3 August). David Cameron will publish the financial details and viewing habits of all UK porn watchers. BoingBoing. boingboing.net/2015/08/03/david-cameron-will-publish-the.html

6 Elgot, J, Hern, A, & Weaver, M. (2015, 21 July). Ashley Madison adultery site hack: Will I be found out? The Guardian. www.theguardian.com/world/2015/jul/21/ashley-madison-adultery-site-hack-will-i-be-found-out-what-you-need-to-know

7 Fox-Brewster, T. (2015, 19 August). Location, Sexual Preference, Weight: Embarrassing Ashley Madison customer date published by hackers. Forbes. www.forbes.com/sites/thomasbrewster/2015/08/19/ashley-madison-breach-is-awful

8 The Economist. (2013, 23 April). Why does liberal Iceland want to ban pornography? The Economist. www.economist.com/blogs/economist-explains/2013/04/economist-explains-why-iceland-ban-pornography

9 Institut Pelangi Perempuan. (2014). Queering Internet Governance in Indonesia. erotics.apc.org/research/queering-internet-governance-indonesia

10 Tremblay, P. (2015, 27 April). 'Unnatural' porn becomes ticket to jail in Turkey. US News & World Report. www.usnews.com/news/articles/2015/04/27/unnatural-porn-becomes-ticket-to-jail-in-turkey

11 BBC News. (2012, 20 September). BBC outlaws cybersex and 'cam girls'. BBC News. www.bbc.com/news/technology-19659801

12 Turner, A. (2015, 24 June). Porn will be next on Australia's website blocking agenda. Sydney Morning Herald. www.smh.com.au/digital-life/computers/gadgets-on-the-go/porn-will-be-next-on-australias-websiteblocking-agenda-20150624-ghw60w.html

13 APA. (2015, 13 March). Botswana: Three arrested for cyber porn material. Star Africa. en.starafrica.com/news/botswana-three-arrested-for-cyber-porn-material.html

14 RT. (2015, 20 May). Egypt's top court bans porn sites, demands enforcement. RT Question More Live. www.rt.com/news/260609-egypt-ban-porn-websites

15 Strategic Initiative for Women in the Horn of Africa. (2015). Anti-pornography Act: Human rights activists and civil society organisations challenge the legality of the act in Constitutional Court, Uganda www.sihanet.org/news/anti-pornography-act-human-rights-activists-and-civil-society-organisations-challenge-legality

16 Daily Mail. (2012, 3 September). Hamas bans internet porn in Gaza Strip as Islamic hardliners crack down on Palestinian freedoms. www.dailymail.co.uk/news/article-2197876/Hamas-bans-internet-porn-Gaza-Strip-Islamic-hardliners-crackdown-Palestinian-freedoms.html

17 Biblehub. biblehub.com/greek/4202.htm

18 IANS. (2015, 1 August). Boys ain't having all the fun: Indian women watch more porn now. Hindustan Times. www.hindustantimes.com/sexandrelationships/boys-ain-t-having-all-the-fun-indian-women-watch-more-porn-now/article1-1375150.aspx

19 Pornhub Insights. (2015, 25 July). More of what women want. www.pornhub.com/insights/women-gender-demographics-searches

20 Ibid.

21 McCrum, R. (2014, 6 January). The 100 Best Novels: No 16 – The Scarlet Letter by Nathaniel Hawthorne. The Guardian. www.theguardian.com/books/2014/jan/06/scarlet-letter-nathaniel-hawthorne-100-best-novels

22 Warren, S. D., & Brandeis, L. D. (1890). The Right to Privacy. Harvard Law Review, 4(5), 193-220. www.jstor.org/stable/1321160

23 Allen, A. L. (2000). Gender and Privacy in Cyberspace. Faculty Scholarship, Paper 789. scholarship.law.upenn.edu/cgi/viewcontent.cgi?article=1788&context=faculty_scholarship

24 Robertson, G. (2010, 22 October). The trial of Lady Chatterley's Lover. The Guardian. www.theguardian.com/books/2010/oct/22/dh-lawrence-lady-chatterley-trial

25 Morris, C. (2014, 17 January). The economics of being an independent porn star. CNBC. www.cnbc.com/2014/01/17/the-economics-of-being-an-independent-porn-star.html

26 End Revenge Porn. www.endrevengeporn.org/revenge-porn-laws

27 Massey, A. (2015, 3 April). Porn is not coming for our sex lives. Pacific Standard. www.psmag.com/books-and-culture/its-all-ok-you-can-watch-some-porn-right-after-you-read-this-article

28 Loree Erickson, Porn Star Academic. femmegimp.org

29 Stoya. (2014, 8 March). Can we learn about privacy from porn stars? New York Times. www.nytimes.com/2014/03/09/opinion/sunday/can-we-learn-about-privacy-from-porn-stars.html?hpw&_r=0

30 Prabhudesai, A. (12 June 2013). Petition to ban pornography by amending IT Act filed in Parliament. Trak.in. trak.in/random/ban-pornography-petition-1203

31 Singh, M. (2015, 10 July). Kamlesh Vaswani v. Union of India & Ors. One Law Street. onelawstreet.com/2015/07/pornography-ban-kamlesh-vaswani

32 Morgan, R. (1977). Going Too Far: The Personal Chronicle of a Feminist. New York: Random House.

33 Jensen, R., with Okrina, D. (2004). Pornography and Sexual Violence. National Online Resource Center on Violence Against Women. www.vawnet.org/sexual-violence/print-document.php?doc_id=418&find_type=web_desc_AR

34 Kutchinsky, B. (1991.) Pornography and rape: theory and practice? Evidence from crime data in four countries where pornography is easily available. International Journal of Law and Psychiatry, 14(1-2), 47-64. www.ncbi.nlm.nih.gov/pubmed/2032762

35 Ibid.

36 MacKinnon, C, & Dworkin, R. (1994, 3 March). Pornography: An Exchange. New York Review of Books. www.nybooks.com/articles/archives/1994/mar/03/pornography-an-exchange

37 Tait, S. (2008). Pornographies of Violence? Internet Spectatorship on Body Horror. Critical Studies in Media Communication, 25(1), 91-111. www.researchgate.net/publication/232838902_Pornographies_of_Violence_Internet_Spectatorship_on_Body_Horror

38 Gallop, C. (2009, 2 December). Make love, not porn. TEDTalk. www.youtube.com/watch?v=FV8n_E_6Tpc

39 Porn world vs Real world. makelovenotporn.com/myths/facial

40 Lust, E. (2014, 1 November). It's time for porn to change. TEDx Vienna. erikalust.com/ted-talk

41 Nadika, N. (2015, 1 April). Supporting ethical queer porn. The Orinam Blog. orinam.net/supporting-ethical-queer-porn

42 BBC News. (2015, 26 February). How a rape was filmed and shared in Pakistan. BBC News. www.bbc.com/news/world-asia-31313551

43 Nelson, D. (2015, 13 April). Indian campaigner inundated by gang rape videos. The Telegraph. www.telegraph.co.uk/news/worldnews/asia/india/11533852/Indian-campaigner-inundated-by-gang-rape-videos.html

44 Datta, B. (2015, 29 May). Porn. Panic. Ban. GenderIT. www.genderit.org/feminist-talk/porn-panic-ban

Themes: 


          

Problematising the dominant discourse around children, youth and the internet

 Cache   

Authored by: 

Organization: 

Massachusetts Institute of Technology
AttachmentSize
PDF icon gw2015-thakor.pdf963.37 KB

Introduction

This report is framed as a challenge to the dominant discourse on children online – a discourse that characterises children in online spaces as vulnerable victims rather than people with agency and risk-management capacity. The current discourse on child victimisation draws from 21st century human trafficking policy, which has generally taken an enforcement- and prosecution-driven approach to problems of exploitation. Global agendas against child exploitation have predominantly replicated anti-trafficking discourse, making assumptions about violence, risk and vulnerability online.

In this report, I will describe the dominant discourse on children online as one of victimisation, and then describe three common digital methods being used against child exploitation: text detection, image detection, and online sting operations. I argue that the discourse of victimisation does not actually uphold victim rights, and that in fact many predominant anti-exploitation methods threaten the privacy rights and sexuality rights of young people. Rights to privacy are in jeopardy as the dominant anti-exploitation approach relies on state enforcement and policing, following in the footsteps of older surveillance techniques by monitoring citizens’ internet behaviour and increasing government regulation of online traffic. Additionally, the sexuality rights of young people, while perhaps a controversial subject, are also fundamentally threatened by a dominant discourse that positions all children as victims and does not recognise the sexual agency of young people. Under the supposed goal of safety, many anti-exploitation measures by states have veered toward censorship, limiting young people’s access to all forms of sexual content online, including sexual identity, sexuality and reproductive health resources.

Recognising that problems of violence, sexual exploitation, misogyny and harassment online are very real, I conclude by imagining what a more feminist and sustainable approach to address these issues might look like. Dominant anti-exploitation efforts centralise technocratic expertise in the hands of states and large technology companies. I suggest an alternative approach that uses participatory ethnographic research and youth input to influence technology design that honours young people’s lived experiences and supports their already ongoing practices of risk management.

The dominant discourse of victimisation

Who gets to be a victim? Are children automatically assumed to be victims by dominant legislative agendas? Which children, and where? Such questions help us understand and critique the current global discourse on child exploitation and victimisation, which takes its cues from the soaring rise in attention to “trafficking” in the past few decades. Much of the language and ideology of the current anti-trafficking movement is rooted in the drafting process for what would become the UN protocol on human trafficking. Human trafficking is defined under the 2000 United Nations Office on Drugs and Crime (UNODC) Protocol to Prevent, Suppress and Punish the Trafficking in Persons, Especially Women and Children as “the recruitment, transportation, transfer, harbouring or receipt of persons, by means of the threat or use of force or other forms of coercion, of abduction, of fraud, of deception (…),” and expressly prohibits the trafficking of children for the purposes of commercial sexual exploitation. 1 Feminist scholars 2 have noted that the protocol drafting process brought together a peculiar constellation of religious advocates, anti-prostitution feminist activists, bureaucrats, and law enforcement; the rubrics under which they found common agreement have resonance for current child exploitation policy. It is telling that the UN protocol on trafficking, one that had been suggested and discussed for years in various UN agencies, was eventually pushed through by the agency handling transnational drugs and crime control.

Perhaps the most striking point for agreement between these disparate advocacy groups is a shared ideology of punishment for trafficking as a crime. Bernstein 3 argues that, in constructing legislation for the criminalisation of trafficking, a conservative Christian sense of penalty and retribution met a second-wave feminist aim to prosecute perpetrators of sexual violence and exploitation of women and girls. This shared ideology of “carceral feminism” advocates for state- and law enforcement-based solutions for addressing crimes of interpersonal violence and exploitation, and glosses over how many marginalised people are in fact often subjected to violence at the hands of the state itself, through structures of policing, environmental law, and economic policy. This point on structural violence and state violence is replicated, I argue, with online policies as well.

Many countries have used the protocol to model their own laws on trafficking, forced migration, labour exploitation and sexual exploitation, including vague definitions of “trafficking victim”, consent and migration. The United States' (US) domestic commitment, especially, to carceral paradigms of justice has expanded into similar policies abroad with state-based interventions into cases of trafficking, through practices of what Bernstein⁠ calls “militarized humanitarianism” – the US financing of enforcement-heavy policing and raids of brothels, settlements and urban spaces where cases of exploitation and trafficking have been purported. This point is perhaps best exemplified by the US State Department’s Trafficking In Persons Report, a country-by-country ranking of the US’s assessment of governmental efforts to prevent and prosecute trafficking. As Pardis Mahdavi notes, lower rankings correspond to sanctions or reductions in foreign aid.4 Additionally, “anti-trafficking” has become a hugely marketable and profitable awareness campaign for numerous activist groups, which use the images and metaphor of “modern-day slavery” to generate millions of dollars in foreign aid and donations. I argue, along with other feminist scholars, 5 that this new “abolitionist” movement has become another rationale for the neo-imperialist rescue of people in the global South, especially those identified as “prostitutes”, replicating a pattern of humanitarian intervention that has frequently been critiqued by post-colonial activists. The UN protocol title, for example, explicitly calls attention to “Especially Women and Children”, a phrasing that feminist activists have criticised as contributing to the assumption of the feminising of victimhood and the masculinising of rescue. Agustín 6 suggests that the specific focus on sex trafficking (as opposed to, for example, issues of education, poverty or environmental justice) in global South countries has produced its own veritable “rescue industry” of professionalised humanitarians, journalists, bureaucrats and corporate representatives seeking to stake their claim on anti-trafficking turf. Children’s charities, especially, many of which have been working on issues of youth education, nutrition, sexual health and child labour for decades, have begun switching their primary focus to trafficking and exploitation as a signal of their commitment to this latest humanitarian agenda.

Digital strategies against child exploitation

Additionally, most trafficking and exploitation policies do not explicitly deal with technology, and in this current moment software development far outpaces legislative policy. Abuses offline have their parallels online, and children’s advocacy organisations have taken to digital methods for finding and preventing child exploitation, including digital forensics, biometric software, and image detection technologies. In recent years, an unprecedented level of alliances have been forged between technology companies, researchers, activists and law enforcement strategising to detect cyber crime and to collect digital data as evidence. In addition, we have seen a rise in cross-border police partnerships, as virtual crimes often implicate multiple countries or anonymous locations in law enforcement attempts to locate victims, abusers and downloaders alike.

Three strategies for countering trafficking and exploitation online that I would like to highlight are:

Text and financial transaction detection:

    Data mining algorithms are designed and used in criminal investigations to rapidly search large databases. Text analysis can assist with analysing language patterns in online advertisements, for example to detect advertisements suggesting the offer of sexual services by under-age minors. Text detection can also assist police working with social media companies on existing investigations, to trawl through data for key phrases, dates and locations; and with financial transaction analysis, detecting potentially fraudulent transactions, as well as other indicators that may serve as evidence for prosecutions.

Image and video detection:

  • Image analysis – the detection, filtering, categorisation and recognition of digital photos – is a common tool in conducting anti-exploitation cases. Digital forensics tools automate the process of searching through photo data collected from computers and hard drives confiscated by police during investigations. Interpol manages the International Child Sexual Exploitation image database, 7 which can be used for image-matching with photos of missing children, victims, abusers and geographic locales. Other technologies can determine if images have been digitally altered or tampered with – for instance, converting an innocent image of a child edited into sexually explicit content. Image analysis can also identify images from surveillance systems.

Digital sting operations:

  • In the US, as well as other countries, undercover law enforcement “stings” have long been used to entrap potential child exploiters. However, in many parts of the world, stings are unlawful, and the data produced by sting operations are considered null evidence in courts. Recently, NGO Terre Des Hommes, based in the Netherlands, took the unprecedented step of designing a photo-realistic video avatar of a child to conduct video chats with potential exploiters on chat room sites. Dubbing the operation “Project Sweetie” 8,
  • the NGO claimed that over six months they collected the names and emails of 1,000 people who solicited the avatar. The campaign has been controversially received, with some lauding it as the innovative next step in preventing sexual exploitation of young people, and others raising alarms over privacy infringement issues.

Rights to privacy

My concern with these digital methods’ infringements on privacy rights echoes the protests by groups like the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation, 9 on the grounds of protecting free speech online and protecting online identities. Many of the innovative techniques that law enforcement must use for thorough digital investigations involve biometric surveillance and identification techniques on proprietary websites. Personal privacy online can be absolutely critical for political dissidents and lesbian, gay, bisexual, transgender and queer (LGBTQ) activists, for example, seeking anonymity to avoid discrimination, harassment or punishment from repressive governments. These groups may see the denial of privacy as a form of political control, and use encrypted websites and email and other darkweb technologies for their own personal safety.

In addition, current digital strategies echo the dominant discourse on victimisation by failing to acknowledge and uphold children’s rights. Many have argued that the UN Convention on the Rights of the Child applies to the internet space: children “shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all kinds.”10 Unfortunately, in the name of child safety, internet governance legislation and advocates in many countries have chosen to move in the direction of censoring children’s access to social media. While online censorship models vary between countries (e.g. the censorship of “adult pornography” websites where illegal), sometimes censorship may veer too far and limit children’s access to educational and communication sites.

Sexuality rights

Concerns over privacy rights and surveillance have strong implications for the upholding of sexual rights. As many ethnographic studies have demonstrated, young people already constantly experiment with new internet platforms for expressing sexuality and desire and conducting relationships. To deny these cultural practices in internet safety education is to deny the reality of healthy youth sexuality and forces sexual practices to become more “invisible” and out of the oversight of guardian communities. Heather Horst 11 describes how both US youth in the Digital Youth Project, 12 for example, and Indonesian teenagers in Barendregt 13 and Boellstorff’s 14 research, experimented and played with their online profile photos and identities in ways that they deemed sexy for their intended audiences, but expressed surprise and bewilderment that these photos could be accessed by people outside their peer groups. Horst indicates that what would be needed in these contexts would be greater education around privacy settings and filters so that youth can better conceptualise that internet sites are potentially permanent and accessible by multiple publics.

Rather than filter and block all content related to sex, sexuality and sexual interactions, internet safety measures must encourage age-appropriate explorations of sexuality for teenaged youth. Especially in countries where state policies limit access to resources and public spaces for LGBT youth, it is imperative that young people have access to digital chat rooms, forums and sites that ensure their safety, community building, and interpersonal growth. Research studies by both Hasinoff 15 and Gray 16 illustrate the perils of sexually repressive policies seeping into moral panics that limit the networking and relationship-building of marginalised youth. A victimisation model furthers the policing of youth sexuality, as young people are literally punished and criminalised for the distribution of sexually suggestive images. Panics over “sexting” stem from long-standing moral panics over youth sexuality – online or offline – and further the false narrative that young people are innocent, always already victims. A protective model is unsustainable, and ultimately furthers a culture of policing and repression.

Conclusion: Feminist technology design and resisting techno-panics

I am intrigued by the rapid and unprecedented rise in global alliances between law enforcement agencies and technology companies, as well as the forging of cross-border police partnerships, to design cyber crime detection software and to share data. But I am deeply concerned that the current model for anti-trafficking design centres technocratic expertise in the hands of wealthy states and multinational tech companies, at the exclusion of grassroots-level NGOs, activists and youth who have long been organising on issues of exploitation.

A feminist approach means moving toward youth-centric technologies that recognise different forms of expertise in producing sustainable models of safety. For example, Streetwise and Safe’s pathbreaking research report 17 on youth engaged in the sex trades provides deeply nuanced insight into young people’s own experiences with safety, consent, victimisation, empowerment and the police. The report is an exemplary resource for a feminist anti-trafficking technology able to recognise young people’s ongoing negotiations of risk and safety. The approach would use this knowledge to create technologies that can more sustainably and accurately – and powerfully – end abuse and exploitation.

A feminist design approach values all relevant forms of expertise and input in understanding what “sex trafficking” and “technology” mean in the lived experiences of young people; child protection services; sex workers aiming to end exploitation without punishing prostitution itself; survivors of trafficking, forced migration and human smuggling; and advocates for free speech and network neutrality and against censorship. A feminist design approach, emphasising harm reduction rather than policing, would be more effective because it takes into account the forms of structural violence – global poverty, rape culture, racism, labour exploitation, restrictive and dangerous immigration policies – that make online child exploitation and trafficking a reality in the first place.

The common narrative spun by many children’s advocacy organisations about child exploitation online frames the internet as a space of risk, vulnerability, harm and entrapment. The narrative usually goes like this: exploiters can use various digital platforms to locate, communicate with and groom victims; send text messages and email to conduct their affairs; use various financial transaction sites to conduct monetary exchanges; and trade and distribute photos and videos of trafficked or exploited victims. Such a narrative frames young people as the passive recipients of harm, rather than active agents who already engage in risk mitigation and rely on each other for support networks online. I urge child safety specialists to think through online safety in a pragmatic manner that respects the vast benefits and opportunities of internet connectivity and to avoid “techno-panics” by focusing instead on harm-reduction approaches to youth safety. Many global feminist internet activists have organised against misogynistic, homophobic and racist harassment online; government interpretations of these issues could certainly take note from this legacy of grassroots organising in addressing sexual exploitation and violence in the digital space. In a sense, online sex trafficking and exploitation only magnify existing structural violence and social inequities: Sustainable problem solving therefore means resisting a “quick-fix” technological solution to a problem that is so much more than digital.

References

1 United Nations General Assembly. (2000). Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, Supplementing the United Nations Convention against Transnational Organized Crime. UN Doc. A/55/383 at 25. https://treaties.un.org/Pages/ViewDetails.aspx?src=TREATY&mtdsg_no=XVIII-12-a&chapter=18&lang=en%7Ctitle=UNTC%7Cwork=un.org-title=UNTC-work=un.org

2 See, for example, Soderlund, G. (2005). Running from the rescuers: New U.S. crusades against sex trafficking and the rhetoric of abolition. NWSA Journal, 17(3), 64-87; Musto, J. (2009). What's in a name? Conflations and contradictions in contemporary U.S. discourses of human trafficking. Women's Studies International Forum, 32, 281-287; Bernstein, E. (2007). The Sexual Politics of the “New Abolitionism”. Differences: Journal of Feminist Cultural Studies,18(3), 128-151.

3 Bernstein, E. (2010). Militarized Humanitarianism Meets Carceral Feminism: The Politics of Sex, Rights, and Freedom in Contemporary Anti-Trafficking Campaigns. Signs: Journal of Women in Culture and Society, 36(1), 45-71.

4 Mahdavi, P. (2011). Gridlock: Labor, Migration, and Human Trafficking in Dubai. Stanford: Stanford University Press.

5 See, for example, Kempadoo, K., & Doezema, J. (1998). Global Sex Workers: Rights, Resistance, and Redefinition. New York: Psychology Press; Desyllas, M. C. (2007). A Critique of the Global Trafficking Discourse and U.S. Policy. Journal of Sociology and Social Welfare, 34(4), 57-79.

6 Augustin, L. (2007). Sex at the Margins: Migration, Labour Markets and the Rescue Industry. London: Zed Books.

7 www.interpol.int/Crime-areas/Crimes-against-children/Internet-crimes

8 International Federation Terre Des Hommes. (2013). Stop Webcam Child Sex Tourism. www.terredeshommes.org/webcam-child-sex-tourism

9 For example, the Electronic Frontier Foundation, ACLU, and seven other privacy advocacy organisations issued a joint statement in June 2015 expressing concern with governmental facial recognition and face databases. Lynch, J. (2015, 16 June). EFF and Eight Other Privacy Organizations Back Out of NTIA Face Recognition Multi-Stakeholder Process. Electronic Frontier Foundation. https://www.eff.org/deeplinks/2015/06/eff-and-eight-other-privacy-organizations-back-out-ntia-face-recognition-multi

10 United Nations Convention on the Rights of the Child. www.ohchr.org/en/professionalinterest/pages/crc.aspx

11 Horst, H. (n/d). Commentary on Bart Barendregt's Between m-governance and mobile anarchies: Pornoaski and the fear of new media in present day Indonesia. www.media-anthropology.net/horst_comment.pdf

12 Ito, M., et al. (2008). Living and Learning with New Media: Summary of Findings from the Digital Youth Project. Chicago: MacArthur Foundation.

13 Barendregt, B. (2006). Between m-governance and mobile anarchies: Pornoaksi and the fear of new media in present day Indonesia. www.media-anthropology.net/barendregt_mgovernance.pdf.

14 Boellstorff, T. (2005). The Gay Archipelago: Sexuality and Nation in Indonesia. Princeton: Princeton University Press.

15 Hasinoff, A. A.. (2014). Sexting Panic: Rethinking Crimininalisation, Privacy, and Consent. Champagne, IL: University of Illinois Press.

16 Gray, M. (2009). Out in the Country: Youth, Media, and Queer Visibility in Rural America. New York: NYU Press.

17 Dank, M., et al. (2015). Surviving the Streets of New York: Experiences of LGBTQ Youth, YMSM, and YWSW Engaged in Survival Sex. New York: Urban Institute, with Streetwise and Safe NYC.

Themes: 


          

Feminist autonomous infrastructures

 Cache   

Authored by: 

Organization: 

Media@McGill and Tactical Tech Collective
AttachmentSize
PDF icon gw2015-hache.pdf931.55 KB

Feminist autonomous infrastructures

Introduction

Women, feminists, and gay, lesbian, bisexual, trans*, queer and intersex (GLBTQI) individuals share common experiences online: they can easily become targets of online harassment, discrimination or censorship, be it by government, private actors or corporations. When trying to understand the relationship between gender, violence and technology, one should keep in mind that online violence is intrinsically linked with real-life situations. When bigotry, sexism and homophobic attitudes exist in societies, they will almost inevitably be amplified in the online world.

”Real” name policies, data mining, tracking and surveillance technologies have become so intertwined that the days when no one knew if you were a dog or a cyborg on the internet are largely over. In fact, the creation of an industry around the profiling of users, coupled with the centralisation and contraction of the internet, have led to a situation where it is not a safe space (if it ever was). In 1996 the Declaration of the Independence of Cyberspace announced the creation of “a world where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity.” 1 But nowadays it is too common to see the work and voices of women, feminists and GLBTQI being deleted, censored and/or prevented from being seen, heard or read. Much of this gender-based online violence happens on corporate social media platforms such as Facebook, Twitter, Reddit and the blogosphere, in addition to other non-profit online spaces such as Wikipedia. All of them involve large communities, which are led by a set of practices and policies. Despite the existence of certain rules that govern these spaces and because of certain practices, silencing, intimidation and/or discrimination continues. So far, responses from GLBTQI to violence have involved organised public shaming, doxxing of harassers, 2 feminist counter-speech, active research and documentation, awareness raising around privacy and security, advocacy for amendments to corporate terms of service, and lobbying of institutions contributing to the governance of the internet, among others. While these tactics are paramount to the embodiment of everyday forms of online resistance,3 there is also a need to think about adopting strategies that are not only reactive, but also project us into the future we want. In other words, it is about dreaming and pre-figuring our technologies actively. Proactive practices involve understanding what it means to take back the command and control of technologies by using, creating and maintaining our own ones and shaping our communication and technological infrastructures. Using corporate services such as Facebook or Twitter may be very convenient, and at times strategic because they are generally provided for free and because this is where the so-called critical masses are. But using them also means accepting their terms of service, which are primarily shaped by profit, and in which human rights and gender social justice still remain of negligible importance. When using these online services, we and our networks are at their mercy, which means we can not fully control our data, social networks and historical memories (or traces) on the internet. While the future of the internet often looks bleak, it is paramount to not only continue to investigate into the processes and governance structure of the internet, but to continue to build a communication and technological ecology that puts human well-being front and centre, rather than profit. What will happen when big data has its proper algorithms? What will be the combined relationships between these algorithms and the Facebook project internet.org or the “Internet of Things”, to name only two of the upcoming situations that will again redefine people's rights to privacy and free expression? When our data remains under corporate control, they can be sold or given to third parties to exploit, or they can be deleted or shut down. Ultimately, they become our digital shadows, 4 enabling others to track, profile and control our voices, opinions and expressions. Part of the answer lies in developing, supporting and using not-for-profit, independent, privacy-aware and secure alternatives to corporate online services. Collectives such as Riseup, Nadir and Autistici/Inventati have been powered by hacktivist collectives for almost two decades now.5 They have provided – through volunteer work and community contributions – valuable and basic online services such as email, mailing list servers, wikis, pads,6 blogs and virtual private networks (VPN)7 to activists all around the world. But where are the feminist tech collectives that design and maintain feminist autonomous infrastructures for feminists, queer and trans* people and activists at large? We also need to ask ourselves, why are those feminist tech collectives still so embryonic? And what does this tell us about the discrimination and violence happening when women and feminists do not control, own and manage the technological infrastructure they need to express themselves and act online?

Shaping autonomy within our technologies

One of the main constitutive elements of feminist autonomous infrastructures lies in the concept of self-organisation already practised by many social movements that understand the question of autonomy as a desire for freedom, self-valorisation and mutual aid. In addition, we understand the term technological infrastructure in an expansive way, encompassing hardware, software and applications, but also participatory design, safe spaces and social solidarities. Concrete examples of feminist autonomous infrastructures include the Geek Feminism Wiki, 8 developing specific technologies that tackle gender-based online violence, such as bots against trolls, and building feminist online libraries and feminist servers, but also enabling offline safe spaces such as feminist hackerspaces which allow feminist, queer and trans* hackers, makers and geeks to gather and learn with others.

When talking about these examples of feminist autonomous infrastructures, we recognise that none of them can be fully autonomous, but rather relative in their autonomy, as they still depend, for instance, on already existing communication networks and technologies designed by mainstream companies (such as computers, servers and access devices). Having said that, their autonomy is based on different governance models, the values they embrace and the principles they promote. If feminist autonomous infrastructures are diverse in scope and in shape, they do share in common a desire to proactively create the conditions for their autonomy while following an ethic of care9 which is embedded into the active practice of social solidarities. Caring and recognising the importance of such infrastructures are two aspects that are central to attempt to address the cycle of technology that is rife with inequality from the production of technology, to its access, uptake, development and governance, until its end cycle. This intersectional and integrated approach to technology goes hand in hand with a feminist posture that does not shy away from addressing all forms of violence, whether it be online violence or the violence that is intrinsic in resource extraction or the factory and assembly line work that is gendered and raced. 10

Recently, momentum has gathered around the building of feminist autonomous infrastructures. These initiatives are still in their embryonic stage, mainly representing a set of scattered and fragmented initiatives. Below we highlight two different examples – one addressing the need for physical safe spaces enabling women and feminists to gather and uplift their skills, and another addressing the slow-politics around the creation of feminist servers.

Breaking the circle of isolation by learning together

The Gender and Technology Institute11 was organised by the Tactical Technology Collective and the Association for Progressive Communications (APC) at the end of 2014. The event brought together almost 80 participants and facilitators, mostly from the global South, to focus on some of the issues faced daily by women and trans* persons on the internet, to share strategies and tools for better protecting our privacy and security online, and to discuss how to spread knowledge and skills in our communities and organisations. Since then, the network has expanded, with different outcomes ranging from the creation of a collaborative online space enabling the documentation of the activities around privacy and digital security delivered by its members on the ground, to the production of a manual specifically addressing gender-related issues which also offers various strategies and tools for taking control of our online identities and learning how to shape safe spaces.

All these outcomes are informed by the stories and creative practices of women and feminist grassroots activists, located in 22 different countries, who are actively and creatively using and making technology to tackle gender-based online violence. Meanwhile they become digital security trainers, and privacy advocates, and they are helping others to understand how they can adopt safer and more joyful practices when engaging online and offline.

Eight months after its realisation, the Gender and Technology Institute has become an international informal network of support, a friendly resource space based on social solidarities that helps to break the circle of isolation.12 This contributes to strengthening the technological autonomy of its participants and, by extension, women, feminists and GLBTQI individuals and organisations, in order to face the challenges and threats derivative of their use of the internet.

Feminist servers

A server can be defined as a computer connected to a network that provides services such as hosting files, websites and online services. Because all online resources are hosted on servers, they constitute a base for the internet as we know it. All servers are ruled by different terms of service, governance models and national legislation in relation to privacy and access to data by third actor parties (or "trackers") and are dependent on a variety of business models. This somewhat technical definition can obscure the possibilities for understanding the political aspect behind the setting up and management of a server. In that sense, what would be the purposes13 and principles 14 of a feminist server? Can feminist servers support women, feminists and GLBTQI in their fight for having their rights such as freedom of expression and opinion respected? Can we create trust among us to develop cooperative approaches to the management of those spaces of resistance and transformation? These were more or less the questions that a group of people interested in gender asked themselves during the first Feminist Server Summit 15 in December 2013 and at the first TransHackFeminist (THF!) Convergence 16 held in August 2014. The discussions that emerged out of those meetings recognised that we do not yet have feminist tech collectives that design feminist autonomous infrastructures for the feminist, queer and trans* movement(s) and that this should become a priority. 17

For example, two feminist servers that were dormant re-emerged during the THF! Convergence:

  • The Systerserver project, which was originally launched in early 2000 by the Genderchangers 18 and the Eclectic Tech Carnival (/etc), and focuses on hosting online services such as etherpads and a voice over internet protocol (VoIP) application.

  • The Anarcha server,19 started by the TransHackFeminists from Calafou, an eco-industrial post-capitalist colony located in Catalonia. It hosts a mediawiki, a WordPress farm and a media publishing platform.

These feminist servers are composed by a loose coalition of women, queer and trans* from around the world, with some explicitly interested in hacking heteronormativity and patriarchy. They are also about demonstrating that it is possible to create safe spaces where the harassment of women, feminists and GLBTQI is not allowed and where all can learn about technology in a non-hierarchal and non-meritocratic way. However, even if these server initiatives are inspiring to many, they still remain at the embryonic stage. Moreover, they do not consider themselves service providers; neither have they clearly decided to become stable and sustainable tech collectives providing hosting and online services to women, feminists and GLBTQI groups. In any case, they show that feminist servers are possible and that they should become a political aim for any organisations working in the field of gender social justice and GLBTQI rights – which should be concerned about achieving autonomy in communication and technological infrastructures, in addition to securing their data, social networks and historical memories on the web.

Conclusion

The targeting, silencing and censorship of women, feminists and GLBTQI people online has been and is being challenged in multiple ways. Women, feminists and GLBTQI people have been particularly creative in their everyday forms of resistance and their solidarities and care towards one another. While the initiatives outlined above are exciting, they do remain at an embryonic stage where only a few are able to participate. The reasons why so few initiatives exist ought to be at the core of a feminist analysis to understand how gendered technology actually is. Who is encouraged at a young age to tinker with technology? What kind of division of labour exists when it comes to technology? Why is the level of attrition so high for women in the tech industry?

While seriously considering the above, it remains that if we want to see the Feminist Principles of the Internet as formulated by APC become a reality, we need our own feminist autonomous infrastructures. To do so, we need to have feminist tech collectives that focus on providing these services. We need to be active in developing our expertise and that of the younger generation. But for that to happen we need the feminist and GLBTQI movement(s) to pay more attention to these issues, create more safe spaces to learn collectively, stop fearing technologies and decide collectively that we need to change gears to reshape our own communication and technological infrastructure. After all, freedom of expression is part of the feminist struggle and women, feminists and GLBTQI people can contribute by providing collectively the knowledge and means to ensure that their right to speak up remains accessible online, offline, and wherever and in any format where expression emerges.

References:

1 Barlow, J. P. (1996). A Declaration of the Independence of Cyberspace. https://projects.eff.org/~barlow/Declaration-Final.html

2 Doxxing of harassers means searching for and publishing private information about a harasser on the internet with the aim of shaming the individual.

3 An example of the embodiment of everyday forms of resistance is that of feminist social media practices that resist rape culture by hijacking Twitter feeds and hashtags that blame victims and perpetuate myths and stereotypes.

4 See “My shadow” by theTactical Technology Collective: https://myshadow.org/

5 For a more extensive list of autonomous servers visit: https://help.riseup.net/en/radical-servers and http://backbone409.calafou.org/participants/index.en.html

6 The following is a great activists etherpads that can be used: https://pad.riseup.net/

7 Riseup.net offers VPN to know more visit: https://help.riseup.net/en/vpn

8 To go to the Geek Feminism Wiki visit: http://geekfeminism.wikia.com/wiki/Geek_Feminism_Wiki

9 Adam, A. (2003). Hacking into Hacking: Gender and the Hacker Phenomenon. ACM SIGCAS Computers and Society, 33(4).

10 Nakamura, L. (2014). Indigenous Circuits: Navajo Women and the Racialization of Early Electronic Manufacture. American Quarterly, 66(4), 919-941.

11 To know more visit: https://tacticaltech.org/gender-tech-institute

12 One example is the International Feminist Hackathon Day (a.k.a. FemHack) held on 23 May 2015. To know more about this initiative see: www.f3mhack.org

13 For a history of where the desire for feminist servers arose read: Alarcon, S. et al. (2015, 30 April). Exquisite Corpse. New Criticals. www.newcriticals.com/exquisite-corpse/page-8

14 Following discussions at the Feminist Server Summit, Femke Snelting came up with a list that defines what a feminist server is, available here: http://esc.mur.at/en/werk/feminist-server

15 vj14.constantvzw.org

16 transhackfeminist.noblogs.org/post/2015/01/25/a-transhackfeminist-thf-convergence-report and anarchaserver.org/mediawiki/index.php/Main_Page

17 The theme of the second edition of the TransHackFeminist (THF!) Convergence is aptly titled “Error 404. Dissent Technologies Not Found”: transhackfeminist.noblogs.org

18 A video about the GenderChangers is available at: https://vimeo.com/4090016

19 anarchaserver.org

Themes: 


          

The democratisation of authority in the middle East and north Africa

 Cache   

Authored by: 

AttachmentSize
PDF icon gw2015-wadoud.pdf900.77 KB

The democratisation of authority in the Middle East and North Africa

The recent revolution in the Middle East and North Africa (MENA) region known as the Arab Spring could not have happened in the way that we know it without the internet and the powerful new forms of social media. Organisers of major protest rallies used social media to pull them together. Eventually their efforts led to toppling long-term tyrannical leaders and a push for more democratic reforms. It was first and foremost through social media that many of us outside of the MENA region got our most enduring images of those protests. The Arab Spring caught standard news agencies off guard. Even policy makers in the West would second-guess whether it was a real revolution or not. It was.

I dare say: the Arab Spring will go down in history as the first of its kind – a revolution that owes more to the internet, including social media, than any before it. Through social media we also caught in full view the grotesque acts of sexual harassment and exploitation of mainly female protesters, both by juntas of the military in Egypt and other pro-government forces, as well as by the usual chauvinist opportunists. So social media brings us the good and the bad, often with little or no censor. Certainly all governments seek to control the tide of information projected in these media, from different degrees of censoring certain images through maturity rating, to “security” issues, even as far as attempts to completely block access.

Technical details about the internet and social media are not my area of expertise. In fact, I can scarcely keep up the content of my web page.1 So let me locate myself in this topic. I am a 62-year-old, retired humanities professor – not the most likely social media geek. I manage a modest amount of social media – a personal page and a public figure page on Facebook, 2 a Twitter account, 3 and recently I’ve ventured onto Instagram. So this is not about my spectacular personal presence on social media.

I built my academic reputation upon the nuances of language, linguistics, rhetoric and hermeneutics. In my line of work, words matter; and that’s NOT just word count. What makes me a perfect Ph.D. also makes me a not-so-exciting Twitter personality. Most of what I do requires more than 140 characters. I’m too long-winded for the fast pace of social media. However, in the past five years I have come to appreciate its merits and impact in my areas of interest: Islam, justice and gender (that’s what my Twitter avatar says, coincidentally).

I took up social activism more than a quarter of a century ago, because I could see that good ideas or theory needed to be made into policy in order to really benefit those who have experienced oppression due to narrow interpretations of texts. It took time before I felt I should keep up with social media; but clearly it makes a difference – not just in revolutions, like the Arab Spring and Black Lives Matter,4 but also in everyday transformations for users. With access to the internet, anyone can harness its power – from crowd funding independent projects, to movement building towards equality and justice in the Muslim family like www.Musawah.org. 5

Using social media allows all sides to have equal access. While active social media can challenge the odds over exertions of power and authority in Islam, as it stands, neo-conservatism and patriarchy still seem to have the most say. With the rise of violent extremist groups like the self-proclaimed Islamic State (ISIS) we can see how effective use of social media evens out the playing field – between the good and the bad. In the context of Islam and issues of social justice, one of the most important questions of our time centres on who has the power to assert their definition of “Islam” to control the lives of others, be it the rule of law, cultural pressure, or even spiritual manipulation.

Everything I do – and therefore everything I do on social media – engages the intersection of systems of oppression. Although my focus is mostly on Islamic thought and praxis, I engage in the discourse over all matters that impact the deep and enduring experience of justice. Therefore, I reflect on power exploitations or coercion, on the logistics of asymmetrical relationships, and on social, political, racial, economic, spiritual and cultural hegemonies over race, class, gender, sexuality, ablism and the environment. (I did say I was long-winded, right?) On any one day I may tweet, retweet, post, or re-post about each one of these intersecting factors. I’ve also blogged on several sites related to these issues.

I am interested in Islamic reformation, by which I mean radically rethinking and critical engagement with the Ultimate Sacred sources of Islamic thought and practice – from its sacred text, its Prophet Muhammad (upon him be peace) and the vast and variegated intellectual history for more than 14 centuries. While I believe Islamic intellectual history is still evolving, the need for a reformation considers the current realities as pivotal to achieving the over-arching principles of Islam: justice, peace and human dignity.

This reformation includes Islamic feminism.

In particular, I propose that the construction of new knowledge in Islamic thought must be ongoing. In Islamic feminism this started with one simple and yet strategic question: What is the role of gender in this discourse? For several centuries after the advent of Islam this idea of “reading for gender” did not exist. Of course people lived and functioned in certain culturally constructed and time-specific gender roles. However, few would reflect critically upon the implications of these roles relative to the ultimate objectives of Islam.

This was due in part to the many radical changes in the lives of women integral to Islam’s beginning, like granting women the right to own property, the right to education, the right for marriage choices and for divorce, a share of inheritance, and a role as credible witness. Alas, the trajectory was not sustained, with great loss to women’s agency and intellectual contributions as early as one century after the Prophet. Meanwhile other trends went unchallenged, like what it means to be human and gendered, including certain unnecessary binaries, ascribing certain roles exclusively to men and re-inscribing male privilege – since patriarchy was pervasive, and not just amongst Muslims.

Islam is a religion focused on “right practices”6 and these are encoded into elaborate legal formulas. Over time certain functionary asymmetrical gender roles would be encoded in the law as if they genuinely reflected the spiritual, philosophical and theological objectives of Islam. When a faith system is dependent upon this interchange between praxis and orthodoxy, it may take some time to unravel which came first: the praxis or the ideology. Over time unexamined gender roles become conflated with ideas about the “natural order” or are seen as a divine mandate. It is a simple logic, really: for example, if women do almost all the caretaking, that must mean women are “natural” caretakers and men are exempt, although this role is vital to human existence and to the environment.

In theory, both men and women were encouraged to participate in Islam’s intellectual development and there are historical examples of women as intellectual contributors. However, they did not play a major role in establishing the basic paradigms of Islamic practice and world view. So when right behaviour became encoded in the law, women’s experiences or women’s ways of knowing and believing would be filtered through the lens of male commentators, philosophers, theologian and jurists.

In our time, we interrogate the ways in which patriarchal norms and biases controlled women’s behaviour by collapsing the link between men’s ways of knowing and believing with the natural or divine order. Whatever men thought was soon equated with what God/Allah thought. All faith paradigms are constructs. When they are constructed only or primarily on the basis of what men experience or perceive, and the connection to these sacred ideas and their human origin is forgotten, then male bias creates notions of authority linked to those constructs as though actually authorised by God. So what men think becomes what God thinks; and the only legitimate way to practise Islam.

While there have always been a few who question the (il)logic of patriarchy, in the 21st century we have reached a critical mass. In every country, every city, every town, every group – no matter how small – Muslim women are questioning what it means to be full agents of our own lives, contrary to patriarchal assertions. We have looked at the consequences of patriarchal interpretations on what it means to be Muslim. Now we are facing an epistemological crisis, where certain ideas – once held sacred and integral to Islam as a universal faith system – are shown to be merely inflections of time-specific, place-specific and gender-specific logic; not sacred at all. Furthermore, certain constructs are no longer tenable or sustainable given the realities of the world we now live in.

This is part of the comprehensive change formulated and projected under a new wave of Islamic feminism. My early work on the Qur’an, Islam’s sacred text, forms one of the cornerstones to these challenges. It centres on one simple question: Does it make a difference if the person reading the text identifies as a man or as a woman? The answer was yes. Reading is always impacted by location, including gender identification. Yet, until this last century, we had no record of women’s responses to the text and no formal exegesis. We know that women read, memorised, recited and used the text as part of their general belief and practice, but we can find no written record of what they thought about its meanings. Meanwhile during that same history men left elaborate exegesis using multiple methods of interpretation.

Reading for gender affects questions of authority in laws made from the perspective of textual interpreters. Now Muslim women have reached a critical mass seeking change. We are diverse and not always mutually supportive in our methods, but despite inner contestation we all demand justice. This critical mass is due largely to a general rise in levels of education. However, there is also a clear link to new forms of communication due to the internet and social media allowing for a dissemination of ideas as sought after by the better-educated populist. This flow of ideas is untainted by constraints of particular institutions, or institutional requirements, and free of patriarchal control.

Knowledge is power. The more ways people have equal access to information, the more they are able to construct informed opinions about any matter. The more pervasive information is, the less control the old-guard authorities will have over the masses. The flow of information in the media is second only to the increased levels of education for all, allowing women, men and children to construct change, challenge injustice and form new trends in authority, more democratic ones. Although we still have a long way to go – considering that access is not nearly equal or universal – at least we see the unfolding of what I call the democratisation of authority. The internet is an important tool for change. It increases access to knowledge and contributes to meaningful exchange in knowledge.

In the particular context of Muslims, the internet gives voice to those who were previously unrepresented and silenced. In the context of gender constructions, and Muslim women’s lived realities, sometimes actual physical mobility is still limited by cultural and legal constraints. However, access to the internet can thwart this lack of mobility, bringing women out of the confines of patriarchal control.

Even if only from the privacy of their homes, Muslim women can venture all over the world, form alliances, support each others’ work, and gain greater insights into the limitlessness of possibilities. Once they get to that world, they can have their say. Once they have their say, they can have an impact. Once they have an impact, they become agents of change.

Exposure to the vast diversity of ideas and ideals across the planet gives greater clarity over the assertions that there is only one way to do things, one “true” Islam – the patriarchal one. For example, in working with www.Musawah.org we use online resources to expose the ways that Muslim Personal Status Law varies from country to country. So if believing Muslims in Jordan do something totally different from what believing Muslims do in Indonesia over the same matter, then clearly the laws are not divine but completely human-made. Since Muslim women are human, we can construct new laws, advocate for reform in existing laws, and challenge those laws imbued with patriarchy to reach more egalitarian policies, laws and experiences. When this diversity is observed through facts presented, it is impossible to say, “This is God’s law and you cannot do anything about it, if you are a believer” – a tactic too often used to silence women’s justice movements.

Another merit of the internet is raising the equality of voices. No one voice is above another voice. This is a great equaliser: no matter how insignificant one internet user may be in the scheme of things, his or her voice can become well known, widespread and persuasive. All that is needed is to have a message that gains momentum through social media. Inadvertently this increases the space for diversity. The argument itself becomes the measure – not the clout of the one speaking. Didn’t the Arab Spring bring down tyrannical rulers? Social media gives greater importance to voices that might have gone unrecognised.

While the internet is a powerful equalising tool, allowing ALL voices to speak, creating forums for people to meet across the globe and share concerns, there are certain challenges to it as well.

I use social media because I agree with its powerful potential for liberation, justice and equality. Since my primary interest is in gender, of course this means I have to discuss issues about sex and sexuality. These seem to gain the most attention when I post. Meanwhile, among the world’s 1.6 billion Muslims, honest and open conversation about sex and sexuality is still primarily missing – despite our sex-affirmative intellectual legacy. For example, in Islam there is no particular virtue in or privileging of celibacy. Details of sexual pleasure have long been celebrated and elaborated. Medical research was so advanced that Muslim doctors were among the first to approve and perform sex-change operations, indicating a deep understanding of sexual diversity. Today’s Muslim cultures have a tendency towards prudishness, silence and shame. Because of this, many conversations I initiate about sex and sexuality receive the greatest negative reactions.

For example, people feel free to question the level of my personal faith because I am open about lesbian, gay, bisexual, transgender and queer (LGBTQ) issues. The tactic is almost always the same: they assert their homophobia and THEN project that I am NOT a Muslim and could not possibly be a scholar because I do not share their interpretations of certain verses in the Qur’an that talk about the story of Lot. Since ALL passages of the Qur’an are subject to multiple interpretations, as part of the rich legacy of Islamic thought and textual analysis, why the literal reading of any one verse should hold sway over another reading is a matter of power, politics and public pressure. This pressure is rampant in social media.

My observations about social media, Islam and sexuality indicate how social media is an indispensable tool. So while I have every intention of keeping up my use of it, I will never have the following of even some untalented Hollywood or Bollywood personalities. That’s okay by me. Instead, I recommend for everyone a balance between the utility of the medium and the random harassment it might bring.

References

1 www.aminawadud.com

2 https://www.facebook.com/pages/Dr-Amina-Wadud/1542191152675401

3 https://twitter.com/aminawadud

4 blacklivesmatter.com

5 www.musawah.org

6 “Right practices” refers to two aspects of what it takes to live a good life according to traditional sources: the right faith and right actions; in other words, not by faith alone, nor just by being a good person who does good things.

Themes: 


          

Junkyard Elysium 13: A Series of Unfortunate Vents

 Cache   

The crew of the Edge 7 begins their next job, an extraction mission for a black market intelligence operative.  Things get off to a rocky start almost immediately, however, and the crew is left scrambling for a solution in the shipping satellite of the Delta Star cult.  When people start getting captured, Crux exploits some construction knowledge to execute rescues.  But how long can they keep secret that their knowledge comes from an understanding much deeper than they care to admit?

Episode art by Bee.
Sound editing by Kyle.
Original music by Avery Stemmler.
Other music by Kevin MacLeod, licensed under Creative Commons 3.0. 

Roll to Breathe is funded by Patreon. If you like the show, please consider backing us yourself!


          

Les bonnes radios du web (MàJ août 2017)

 Cache   
[ ; RTBf ; Radio France ; RSR ; ]
Si vous affichez cette page au moyen d'un navigateur capable de traiter (ou de déléguer via un pluguine) les données audio, vous pouvez exploiter les liens ci-dessous d'un simple clic. Vous pouvez aussi les transférer à votre récepteur “web radio” ou à votre logiciel de lecture audio (par exemple Winamp, Screamer Radio, Foobar), ou les ajouter à vos marque-pages (via le clic droit de votre souris). [([ ; Pétition pour le rétablissement de France Inter en grandes ondes
Il (…) - 2b. Radio / ,
          

Pay To Prey

 Cache   

In this episode I tackle micro transactions again in the form of the widely popular Star Wars Galaxy of Heroes.

I take a painstaking look at most of the games systems, how they work, and deconstruct why they're bad and exploitative.

We must never cease to call out these business practices that only serve to exploit us as consumers and vulnerable populations which include but is not limited to children, and people struggling with addiction. 

I also briefly mention the inclusion of micro transactions in the freshly announced Diablo Immortal.




          

Epic Games Store: un exploit permette di scaricare gratis tutti i giochi del negozio?

 Cache   
Epic Games Store: un exploit permette di scaricare gratis tutti i giochi del negozio?
La scoperta di una nuova vulnerabilità di Epic Games Store renderebbe possibile accedere gratis all'intero catalogo di giochi PC del negozio

La redazione di CCN porta alla luce una nuova vulnerabilità dell'Epic Games Store che permetterebbe l'accesso gratuito, ma illegale, all'intero catalogo di videogiochi PC del nuovo negozio del colosso statunitense artefice del successo, tra gli altri, di Fortnite e dell'Unreal Engine.

Prosegui la lettura
          

Administrateur des contrats / Contracts Administrator (Petro-Canada)

 Cache   
EMPLACEMENT Mississauga Ontario (CA-ON) NUMÉRO DU POSTE 32368 Pourquoi vous devriez vous joindre à notre équipe Voulez-vous vous joindre à une équipe dynamique et en évolution appuyant notre nouveau modèle afin d’administrer des contrats à l’échelle nationale pour nos établissements Petro-Canada Vous serez une ressource essentielle au succès de nos équipes de vente et d’exploitation Vous aiderez à la préparation à la mise à jour et à la communication des modifications apportées aux contrats et à la documentation juridique et assurerez la liaison avec notre équipe juridique ainsi qu’avec notre personnel chargé du réseau pour appuyer votre travail   Vous utiliserez votre expertise pour - Utiliser des modèles de document standard pour préparer et gérer les nouveaux contrats et les modifications de contrat et convertir les lettres d intention négociées en documents contractuels juridiquement contraignants - Agir en tant que ressource contractuelle technique en fournissant des informations précises et en temps opportun aux parties internes et externes - S assurer que tous les contrats sont correctement remplis et signés - Fournir des communications administratives à de nombreux groupes internes pour s assurer que les informations critiques sont correctement configurées dans nos systèmes et que les loyers et les commissions sont correctement collectés et payés - Faire des suivis et communiquer des dates d expiration du contrat aux intervenants concernés - Soutenir les directeurs de territoire dans diverses autres tâches telles que la rédaction de demandes officielles et de lettres de demandes adressées à nos détaillants la réponse aux questions concernant l historique des contrats et la formation aux modifications des processus de gestion des contrats - Résoudre les problèmes et fournir une interprétation des politiques procédures et directives de l entreprise - Soutenir le directeur et le coordinateur principal des ventes dans diverses autres tâches administratives gérées de manière centralisée Nous souhaiterions analyser votre demande si vous avez Exigences essentielles (minimales) - Maîtrise du français et de l’anglais (à l oral comme à l écrit) - Trois ans d’expérience professionnelle - Un diplôme d études secondaires ou diplôme de formation générale - Solides compétences informatiques dans la suite Microsoft Office - Une personnalité hautement adaptable ouverte au changement et une attitude positive axée sur les résultats - Un style axé sur les détails avec de solides compétences en planification organisation et gestion du temps pour faire face à des délais serrés - Excellentes aptitudes sociales avec une attitude collaborative et la capacité démontrée de traiter de manière professionnelle avec des partenaires internes et externes - Vous êtes en accord avec nos valeurs la sécurité avant tout le respect monter la barre honorer nos engagements et agir comme il se doit Préférence pour - Expérience avec différents types de contrats baux et documents juridiques - Expérience dans les contrats de ventes au détail de gaz et d’immobilier commercial - Un diplôme ou une formation postsecondaire connexe en administration juridique - Maîtrise de SAP et de Livelink Votre lieu de travail votre horaire et autres renseignements pertinents - Vous travaillerez à notre bureau principal du secteur Aval à Mississauga situé au 2489 North Sheridan Way - Les heures de travail normales sont de 40 heures par semaine du lundi au vendredi Pourquoi Suncor Nous sommes la plus importante société énergétique intégrée du Canada grâce à notre portefeuille d activités qui comprend notamment le développement et la valorisation des sables pétrolifères la production pétrolière et gazière extracôtière le raffinage du pétrole et la commercialisation des produits sous la marque Petro-Canada Notre présence sur la scène internationale permet de profiter d occasion
          

Seven Key Strategies To Grow Your Profits

 Cache   

Join this webinar as we discuss seven key strategies that organizations have used to improve their results and gain the competitive advantage. We’ll explore the top profit-building strategies that all growing businesses, but especially retail businesses, are using to improve business processes, gain market share, and grow their bottom lines. The seven strategies that we’ll explore are:

  1. Take a 360-degree snapshot of your business
  2. Drive down costs by maximizing operational efficiency
  3. Fine-tune your tax, regulation, and compliance activities
  4. Sell more to your current customers
  5. Sell through more channels
  6. Identify and exploit new revenue streams
  7. Expand into global markets


Request Free!

          

Comedian John Crist Cancels Tour Over Sexual Harassment Allegations

 Cache   

The viral entertainer confesses "sexual sin and addiction" following Charisma investigation.

Comedian John Crist, known for his viral videos and jokes satirizing Christian culture, has canceled upcoming tour dates after reports he has harassed and manipulated multiple women to pressure them into sexual relationships.

According to a Charisma magazine investigation, Crist used his celebrity to exploit at least five women over the last seven years.

“The allegations include, but are not limited to, individually sexting multiple women during the same time period,” reporter Taylor Berglund wrote, “initiating sexual relationships with married women and women in committed relationships, offering show tickets in exchange for sexual favors and repeatedly calling these women late at night while drunk.”

Five women shared their stories with Charisma, and the magazine independently verified substantial portions of their accounts. The women believed that sharing their stories could protect others from Crist’s manipulative behavior.

Crist turned the Christian-ese phrase “check your heart” into a punchline, but now faces serious allegations. He said in an official statement to Charisma that he is not guilty of everything he’s been accused of, but did admit to “sexual sin and addiction struggles.”

“I have violated my own Christian beliefs, convictions and values, and have hurt many people in the process,” Crist wrote in his statement. “I am sorry for the hurt and pain I have caused these women and will continue to seek their forgiveness. I have also hurt the name of Jesus and have sought His forgiveness.”

Crist is currently on a comedy tour titled “Immature Thoughts.” On Wednesday night, tickets were still for sale on his website, but several ...

Continue reading...


          

Robux Generator Activation Code. Roblox Hack Item - от : AlrinNiz

 Cache   


GET UNLIMITED ROBLOX RESOURCES!







spawning items, aimbot, then you are in for a pleasant surprise. However, unless you are running your own server (you are the admin) or are scripting your own game modes and want to implement your own rule exceptions. avoid or find mobs, climbing hacks and so on. Parents, Seeing through walls sounds like a very powerful cheat for many Roblox games. Bots are the only viable cheat to actually get free Roblox. but that has since been patched. jumping hacks, spawning items, However, weapons and more is extremely useful to get more kills. but that has since been patched. Roblox Hacked Cleints RoXploits gets updated on a daily with new exploits, Most of these hacks are possible by either editing the game client or injecting code into the game. super jumping cheats and noClip ect.
roblox cheat vehicle simulator
robux code generator without human verification
roblox world'pw-robux generator
counter blox roblox offensive cheat engine
roblox cheat ios
how to use roblox generator
hack a roblox game
free robux generator no survey no offers
roblox hack yeuapk
roblox generator actually works
roblox hack go through walls
free robux generator no email
cheat roblox torso
robux generator original
roblox hack badges
hack d roblox
roblox cheat codes xbox one
roblox kidnap hack
roblox hack beyond
roblox robux generator for pc
roblox cheat wearedevs
roblox hack on scratch
robux resources generator
roblox item generator no survey
roblox app hack online
Roblox Noclip Cheat Engine Download. Roblox Invisible Cheat Engine
Roblox Password Guessing Generator. Roblox Knife Hack Assassin
Roblox Cheat No Download. Roblox Hack Infinite Health
Roblox Xray Hack. Roblox Hack Promo Codes
Roblox Cheat Engine V5. Roblox Hack Prank
roblox robux generator without verification
roblox generator robux download
roblox hack strucid
roblox cheat cash
roblox hack laptop
robux generator free no human verification
roblox generator tool
roblox hack game uncopylocked
free robux generator that actually works
roblox hack royale high
roblox robux generator hack download
roblox generator only today
how hack roblox acc
robux robux generator no survey
robux generator no survey no download no password
robux generator reddit
robux key generator
roblox cheat guide
robux hack free easy
roblox invisible hack cheat engine
robux generator get your free robux
roblox hack adopt me
roblox kat cheat
robux generator free robux
robux code generator no survey
Free Robux Generator Computer. Free Robux Generator Roblox Game
Roblox Promo Codes Generator By Xdaniel. Free Robux Generator No Tix
Roblox Cheat Book. Robux Generator Bots Allowed
Roblox Room Cheat Codes. Robux Generator For Kids
Roblox Cheat Glitch. Robux Generator By Placemakers
          

Sophos Annual Threat Report Details Top Cyberattacks

 Cache   
Keyword tags: 

Sophos , a global leader in cloud-enabled next-generation cybersecurity, launched its 2020 Threat Report providing insights into the rapidly evolving cyberthreat landscape. The report, produced by SophosLabs researchers, explores changes in the threat landscape over the past 12 months, uncovering trends likely to impact cybersecurity in 2020.
 
John Shier, senior security advisor, Sophos said, “The threat landscape continues to evolve – and the speed and extent of that evolution is both accelerating and unpredictable. The only certainty we have is what is happening right now, so in our 2020 Threat Report we look at how current trends might impact the world over the coming year.  We highlight how adversaries are becoming ever stealthier, better at exploiting mistakes, hiding their activities and evading detection technologies, and more, in the cloud, through mobile apps and inside networks. The 2020 Threat Report is not so much a map as a series of signposts to help defenders better understand what they could face in the months ahead, and how to prepare.”
 
The SophosLabs 2020 Threat Report, which is also summarised in a SophosLabs Uncut article, focuses on six areas where researchers noted particular developments during this past year. Among those expected to have significant impact on the cyberthreat landscape into 2020 and beyond are the following:
 

  • Ransomware attackers continue to raise the stakes with automated active attacks that turn organisations’ trusted management tools against them, evade security controls and disable back-ups in order to cause maximum impact in the shortest possible time.

 

  • Unwanted apps are edging closer to malware. In a year that brought the subscription-abusing Android Fleeceware apps, and ever more stealthy and aggressive adware, the Threat Report highlights how these and other potentially unwanted apps (PUA), like browser plug-ins, are becoming brokers for delivering and executing malware and fileless attacks. 

 

  • The greatest vulnerability for cloud computing is misconfiguration by operators. As cloud systems become more complex and more flexible, operator error is a growing risk. Combined with a general lack of visibility, this makes cloud computing environments a ready-made target for cyberattackers.

 

  • Machine learning designed to defeat malware finds itself under attack. 2019 was the year when the potential of attacks against machine learning security systems were highlighted. Research showed how machine learning detection models could possibly be tricked, and how machine learning could be applied to offensive activity to generate highly convincing fake content for social engineering. At the same time, defenders are applying machine learning to language as a way to detect malicious emails and URLs. This advanced game of cat and mouse is expected to become more prevalent in the future.

 
Other areas covered in the 2020 Threat Report include the danger of failing to spot cybercriminal reconnaissance hidden in the wider noise of internet scanning, the continuing attack surface of the Remote Desktop Protocol (RDP), and the further advancement of automated active attacks (AAA).


          

Businesses need to understand the mind of a cyber criminal

 Cache   

Cyber threat actors, be it state-sponsored, organised hacker groups, hacktivists or lone wolf individuals pose a threat to organisations worldwide. Understanding the mind of cybercriminals is essential so that your organisation knows how to deal with them should you face any threats.

Most of the business community understand that they are at risk from a potential cyberattack. But what they are not always sure of is the motivation and thought process of the perpetrators; understanding this can help shape your defence. By understanding the mind behind the cybercrime and also learning the personality traits of cybercriminals, businesses would be able to be more vigilant and also be aware potential threats, both internal and external.

According to a study by the Cambridge Centre for Risk Studies, “certain cybercriminal groups share significant strategic overlap in motivations and aims with their native state government, sometimes resulting in clandestine collaboration or tacit sanction of damaging cybercriminal activity.”

For lone wolf attackers, they “adopt the entire burden of attack research and development. The individual cannot depend on others for different elements of an attack or campaign or rely on the external funding necessary to carry off an attack of great sophistication. Furthermore, lone wolves have the potential to function either individually, or as an ancillary, to every threat type, including cyber terrorists.”

Looking at the psychology of hacktivists groups like Anonymous, you will see that they are not interested in disrupting critical infrastructure. However, hacktivists are known to exploit and embarrass companies with poor security. Malaysian organisations have been victims of hacktivists and lone-wolf attacks many times. The most recent being the website of major university which had its webpage defaced. Again, these attacks happened due to emotions being felt by the attackers.

The same thing can happen to businesses as well — all it needs is for an unhappy client, customer or your employee to exploit your organisation. Attackers from within your organisation can be a bigger threat as they would know your weakness.

In light of this, CyberSecurity Asean is organising a discussion with peers and counterparts to discuss strategies to get “in the heads” of Cyber Attackers and better protect the organisation’s data protection. A group of High-level Security Peers will explore how a cybercriminal thinks and plans their attack, and why having this insight is crucial to protecting business and meeting data privacy compliance.

CyberSecurityAsean.com Group Publisher Andrew Martin will share what other countries around the world are doing in this area together with Cyber Security Malaysia’s winning team from the Asean Capture the Flag Competition who will describe how they get in the head of an attacker. IBM’s Glen McFarlane and Sunil Prabhakaran will explain why guidelines such as Personal Data Protection (PDP) are compelling organisations in all industries to carefully review their cyber security and privacy programs to protect Enterprise Data which includes Personal Information of Individuals (PII), Intellectual Property, Strategic Information etc.
 
To summarize, your enterprise data represents your intellectual capital, competitive differentiator and the lifeblood of your organization. IBM believes that Organization’s data security and protection program should empower their security teams to automatically analyze what is happening across the data environment -  both structured and unstructured data.
 


          

Direct Support Professional- FT- Foxtail

 Cache   
This position in Fargo, ND supports people with disabilities in their homes.  You will assist with activities, transportation, personal cares, meal prep and household duties. ESSENTIAL DUTIES AND RESPONSIBILITIES Learning About The Person Supported Uses the Personal Outcome Measures and other assessments to learn about each person’s goals and dreams. Learns about the life experiences (work, residential, social, etc.) of the person and assists him/her to expand his/her experiences through education and a variety of community experiences. Learns what barriers hinder the accomplishment of the person’s goals and dreams.  Utilizes current services and supports and/or advocates for additional services and supports as needed to overcome the barriers. Maintains person’s data using Therap system. Integration and Community Support Learns about people’s vocational, community and social interests and provide the necessary support to assist the person to develop his/her interest in an integrated environment. Supports and assists people to remain connected to their natural supports (family, close friends, boyfriend, girlfriend, etc.). Supports and assists people to develop and maintain a network of friends/relationships. Supports and assists people to be active members of the community (i.e., volunteer work, belonging to clubs/organizations, participating in church activities, etc.) by emphasizing choices and options. System Advocacy Supports and assists people to direct their services and make informed choices in all aspects of their life. Be a Personal Advocate for people and teach members of the community to treat people we support with dignity and respect by modeling positive attitudes and respectful communication and interactions. Advocates with employers, service coordinators, families and other stakeholders to develop needed supports and services for people we support. Health, Safety and Welfare of the Person Supported Assist and support people: To have a safe environment in which to live and work, free of abuse, neglect and exploitation. To look their best by providing needed assistance to complete hygiene, grooming and clothing care tasks. To learn to maintain a clean living/work environment. To learn about nutritional recommendations through meal planning and preparation. To learn about and practice safety awareness in all of their environments (living, work/daytime and            leisure activities). To learn about their personal finances and budgeting skills. To learn about and exercise their rights. To learn about fair treatment and to understand due process if s/he feels that treatment is not fair. To learn about and become involved in their personal health needs. 18 years of age. Current valid driver’s license, access to a licensed vehicle and proof of motor vehicle liability insurance is required. Able to plan, organize and facilitate effective communication including effectively communicating through clear speaking and writing. Able to organize and calculate data/information and maintain records according to standards. Additional Information Requisition ID: 2019-R0247181 Schedule: Full-time Shift: Rotating Market: CHI Friendship
          

Business Systems Consultant

 Cache   
Proactively seeks out strategic business opportunities with high-level business unit executives. Provides advice, assistance and leadership in any area associated with the planning, procurement, provision, delivery, management, maintenance and effective business use of information systems for a business area. Analyzes business processes; elicits, analyzes and documents business requirements; identifies alternative solutions, assesses feasibility and makes recommendations typically seeking to exploit and leverage new or existing technology components. Translates business requirements into functional requirements; performs data and process modeling; manages change; and leads, coordinates/performs testing, verification, and validation of requirements. Ability to move across different technologies based on the focus of projects. Responsibilities: Effectively coordinate initiatives in which BTS can improve HCP engagement, challenging existing processes, policies and perceptions, by collaborating with functions across Medical Affairs. Proactively inspiring medical affairs teams with the 'art of the possible' by bringing to life relevant technologies and showcasing their potential. Enhance the user experience by systematically capturing feedback, exploring opportunities to drive efficiencies, and continually improving processes, systems and solutions. Drive Global Medical Affairs Technology initiatives; Management of SLC documentation (ensuring docs are carefully prepared, diligently approved and approved; Support Business Users in User Acceptance Test phases, for initiatives within scope of responsibility; Liaise with GMA Operations Technology team and Affiliates to ensure effective and efficient roll-out of adopted Global solutions; Assess Integration of new projects and services with other systems & applications; Leverage technologies & solutions across therapeutic areas; In partnership with cross-functional BTS, drives adoption and pull through of solutions offered by shared service organizations such as SETI, Quick Hits and Digital/Multi-Channel to address Global Medical and Medical TA priorities. Works directly with business unit clients to understand specific business processes and business drivers and business strategy across multiple business units; identifies and communicates resulting needs and opportunities for business process improvement that can be enabled via technology; Investigates and understands capabilities of existing systems and technologies already in use across the business area and similar and interconnected business areas in AbbVie and investigates available technologies applied to this business area in industry; identifies information required to support the business strategy and leads the development of appropriate information management strategies, developing them as an integrated part of the business strategy. Responsible for compliance with applicable Corporate and Divisional Policies and procedures. Identifies current and emerging business needs and evaluates alternative technology solutions using standard information systems methodologies and best practices. Develops business relationships and integrates activities with other BTOs to ensure successful implementation and support of project efforts. Manages relationships between clients involved and BTOs to assure effective communication between the groups is occurring. Brokers services within BTS on behalf of customers; coordinates portfolio of solutions and identifies interdependencies. Bachelor's Degree or equivalent education + 12 years of experience. Master's degree and 10 years or PhD and 4 years of experience. Engineering/Informatics bachelor's degree or equivalent; Work experience in the pharmaceutical industry preferred. Exercises latitude in the approach to problem solving; Determines and develops approach and solutions to problem; Experience in Information Technology, including application program development (5 years or more); Experience in Pharma Digital Initiatives is preferred; Project and implementation experience with Veeva products including but not limited to Vault, CRM and CLM; Experience to mobile application development preferred; Ability to interact with different levels of an organization within Global, Regional and Affiliate Management team, and to build effective relationships through team working in line with AbbVie culture; Ability to face both technology and business discussions with stakeholder during the project lifecycle;
          

Intelligence Analyst (35F)

 Cache   
35F Intelligence Analyst Job ID: 1136966 Job Views: 49 Location: NORTH LITTLE ROCK, Arkansas, United States ZIP Code: 72199 Job Category: Intelligence Posted: 11.02.2019 Age Requirements: Must be between the ages of 17 and 35 Job Description On the battlefield, success depends on accurate and timely intel. As an Army National Guard Intelligence Analyst, you will play a key role in the interpretation and exploitation of information gathered from or about the enemy. Intelligence Analysts provide Guard personnel with information about enemy forces and potential battle areas, and use information derived from all intelligence disciplines to determine changes in enemy capabilities, vulnerabilities, and probable courses of action. Specific duties of the Intelligence Analyst may include: preparation of all-source intelligence products; providing Intelligence, Surveillance, and Reconnaissance (ISR) Synchronization support; processing incoming reports and messages; determining the significance and reliability of incoming information; establishing and maintaining systematic, cross-reference intelligence records and files; integrating incoming information with current intelligence holdings; and the preparation and maintenance of graphics. Job Duties * Prepare all-source intelligence products to support the combat commander * Assess the significance and reliability of incoming information with current intelligence * Establish and maintain systematic, cross-reference intelligence records and files Some of the Skills You'll Learn * Critical thinking * Preparing maps, charts, and intelligence reports * Military symbology Helpful Skills * Interest in reading maps and charts * Gathering and analyzing information Through your training, you will develop the skills and experience to enjoy a civilian career with Federal Government agencies, such as the Central Intelligence Agency or the National Security Agency. Earn While You Learn Instead of paying to learn these skills, get paid to learn. In the Army National Guard, you will learn these valuable job skills while earning a regular paycheck and qualifying for tuition assistance. Job training for an Intelligence Analyst consists of 10 weeks of Basic Training, where you'll learn basic Soldiering skills, and 13 weeks of Advanced Individual Training (AIT) and on-the-job instruction, including practice in intelligence gathering. Part of this time is spent in the classroom and part in the field. Benefits/Requirements Benefits * Paid training * A monthly paycheck * Montgomery GI Bill * Federal and State tuition assistance * Retirement benefits for part-time service * Low-cost life insurance (up to $400,000 in coverage) * 401(k)-type savings plan * Student Loan Repayment Program (up to $50,000, for existing loans) * Health care benefits available * VA home loans * Bonuses, if applicable * Most non-prior service candidates will earn between $200 and $250 per drill weekend, subject to change Requirements * Military enlistment in the Army National Guard * Must be at least a junior in high school, or have a high school diploma or a GED certificate * Must be between the ages of 17 and 35 * Must be able to pass a physical exam and meet legal and moral standards * Must meet citizenship requirements (see NATIONALGUARD.com for details) Requires military enlistment. Programs and benefits are subject to change. Ask your Army National Guard recruiter for the most up-to-date information. Actual MOS assignment may depend on MOS availability. This position may qualify for a bonus, ask your National Guard recruiter for the most up-to-date information.
          

Intelligence Analyst (35F)

 Cache   
35F Intelligence Analyst Job ID: 1142156 Job Views: 41 Location: EDMOND, Oklahoma, United States ZIP Code: 73034 Job Category: Intelligence Posted: 11.02.2019 Age Requirements: Must be between the ages of 17 and 35 Job Description On the battlefield, success depends on accurate and timely intel. As an Army National Guard Intelligence Analyst, you will play a key role in the interpretation and exploitation of information gathered from or about the enemy. Intelligence Analysts provide Guard personnel with information about enemy forces and potential battle areas, and use information derived from all intelligence disciplines to determine changes in enemy capabilities, vulnerabilities, and probable courses of action. Specific duties of the Intelligence Analyst may include: preparation of all-source intelligence products; providing Intelligence, Surveillance, and Reconnaissance (ISR) Synchronization support; processing incoming reports and messages; determining the significance and reliability of incoming information; establishing and maintaining systematic, cross-reference intelligence records and files; integrating incoming information with current intelligence holdings; and the preparation and maintenance of graphics. Job Duties * Prepare all-source intelligence products to support the combat commander * Assess the significance and reliability of incoming information with current intelligence * Establish and maintain systematic, cross-reference intelligence records and files Some of the Skills You'll Learn * Critical thinking * Preparing maps, charts, and intelligence reports * Military symbology Helpful Skills * Interest in reading maps and charts * Gathering and analyzing information Through your training, you will develop the skills and experience to enjoy a civilian career with Federal Government agencies, such as the Central Intelligence Agency or the National Security Agency. Earn While You Learn Instead of paying to learn these skills, get paid to learn. In the Army National Guard, you will learn these valuable job skills while earning a regular paycheck and qualifying for tuition assistance. Job training for an Intelligence Analyst consists of 10 weeks of Basic Training, where you'll learn basic Soldiering skills, and 13 weeks of Advanced Individual Training (AIT) and on-the-job instruction, including practice in intelligence gathering. Part of this time is spent in the classroom and part in the field. Benefits/Requirements Benefits * Paid training * A monthly paycheck * Montgomery GI Bill * Federal and State tuition assistance * Retirement benefits for part-time service * Low-cost life insurance (up to $400,000 in coverage) * 401(k)-type savings plan * Student Loan Repayment Program (up to $50,000, for existing loans) * Health care benefits available * VA home loans * Bonuses, if applicable * Most non-prior service candidates will earn between $200 and $250 per drill weekend, subject to change Requirements * Military enlistment in the Army National Guard * Must be at least a junior in high school, or have a high school diploma or a GED certificate * Must be between the ages of 17 and 35 * Must be able to pass a physical exam and meet legal and moral standards * Must meet citizenship requirements (see NATIONALGUARD.com for details) Requires military enlistment. Programs and benefits are subject to change. Ask your Army National Guard recruiter for the most up-to-date information. Actual MOS assignment may depend on MOS availability. This position may qualify for a bonus, ask your National Guard recruiter for the most up-to-date information.
          

Cryptologic Linguist (35P)

 Cache   
35P Cryptologic Linguist Job ID: 1136968 Job Views: 39 Location: NORTH LITTLE ROCK, Arkansas, United States ZIP Code: 72199 Job Category: Intelligence Posted: 11.02.2019 Age Requirements: Must be between the ages of 17 and 35 Job Description Our national security relies on information gathered from foreign language sources. As a Cryptologic Linguist in the Army National Guard, you will learn to interpret the words, intent, and tenor of these foreign communications, and present it to the people who need it the most. In this role, you will perform or supervise the detection, acquisition, geolocation, identification, and exploitation of foreign communications using specialized signals equipment. Specific duties of the Cryptologic Linguist may include: identification of foreign communications; categorizing signals by activity type; foreign communication analysis; recognizing changes in transmission modes and reporting the change; providing translation expertise to analysts; supporting Signals Intelligence tasking, reporting, and coordination; and providing transcriptions or translations of foreign communications. Job Duties * Identify and analyze foreign communications * Recognize changes in transmission modes and tip the appropriate authority * Provide translation expertise to analysts * Provide transcripts and translations from foreign communications Some of the Skills You'll Learn * Identifying foreign communications from an assigned geographic area * Analyzing foreign communications to support missions * Procedures for handling classified information and preparing reports Helpful Skills * Talent for foreign languages * Interest in speech, communications, and foreign languages * Ability to work as a team member * Enjoy reading and writing Through your training, you will develop the skills and experience to enjoy a civilian career as a translator for government agencies, embassies, universities, and companies that conduct business overseas. Earn While You Learn Instead of paying to learn these skills, get paid to learn. In the Army National Guard, you will learn these valuable job skills while earning a regular paycheck and qualifying for tuition assistance. Job training for a Cryptologic Linguist requires 10 weeks of Basic Training, where you'll learn basic Soldiering skills, and three to 80 weeks of Advanced Individual Training (AIT). Part of this time is spent in the classroom and part in the field. Soldiers who don't possess foreign language fluency will attend foreign language training at the Defense Language Institute for six to 18 months prior to attending Advanced Individual Training. Benefits/Requirements Benefits * Paid training * A monthly paycheck * Montgomery GI Bill * Federal and State tuition assistance * Retirement benefits for part-time service * Low-cost life insurance (up to $400,000 in coverage) * 401(k)-type savings plan * Student Loan Repayment Program (up to $50,000, for existing loans) * Health care benefits available * VA home loans * Bonuses, if applicable * Most non-prior service candidates will earn between $200 and $250 per drill weekend, subject to change Requirements * Military enlistment in the Army National Guard * Must be at least a junior in high school, or have a high school diploma or a GED certificate * Must be between the ages of 17 and 35 * Must be able to pass a physical exam and meet legal and moral standards * Must meet citizenship requirements (see NATIONALGUARD.com for details) Requires military enlistment. Programs and benefits are subject to change. Ask your Army National Guard recruiter for the most up-to-date information. Actual MOS assignment may depend on MOS availability. This position may qualify for a bonus, ask your National Guard recruiter for the most up-to-date information.
          

Le jeu vidéo, un objet juridique identifié (livre)

 Cache   
Reposant sur l'exploitation des nouvelles technologies, le jeu vidéo pose de nombreuses questions de droit. Certaines sont classiques, comme la titularité des droits d'auteur sur ces oeuvres. Mais elles appellent pourtant une réflexion nouvelle : revente de jeux dématérialisés, droits des joueurs-créateurs...
          

Direct Support Professional- FT- Foxtail

 Cache   


This
position in Fargo, ND supports people with disabilities in their homes.-- You will assist with activities,
transportation, personal cares, meal prep and household duties.--

--



ESSENTIAL DUTIES AND RESPONSIBILITIES

--

Learning About
The Person Supported


  • Uses the Personal Outcome Measures and other assessments to learn about
    each person's goals and dreams.
  • Learns about the life experiences (work, residential, social, etc.) of
    the person and assists him/her to expand his/her experiences through education
    and a variety of community experiences.
  • Learns what barriers hinder the accomplishment of the person's goals
    and dreams.-- Utilizes current services
    and supports and/or advocates for additional services and supports as needed to
    overcome the barriers.
  • Maintains person's data using Therap system.








    --

    Integration and
    Community Support


    • Learns about people's vocational, community and social interests and
      provide the necessary support to assist the person to develop his/her interest
      in an integrated environment.
    • Supports and assists people to remain connected to their natural
      supports (family, close friends, boyfriend, girlfriend, etc.).
    • Supports and assists people to develop and maintain a network of
      friends/relationships.
    • Supports and assists people to be active members of the community
      (i.e., volunteer work, belonging to clubs/organizations, participating in
      church activities, etc.) by emphasizing choices and options.








      --

      System Advocacy


      • Supports and assists people to direct their services and make informed
        choices in all aspects of their life.
      • Be a Personal Advocate for people and teach members of the community to
        treat people we support with dignity and respect by modeling positive attitudes
        and respectful communication and interactions.
      • Advocates with employers, service coordinators, families and other
        stakeholders to develop needed supports and services for people we support.






        --

        Health, Safety
        and Welfare of the Person Supported

        Assist
        and support people:


        • To have a safe environment in which to live and work, free of abuse,
          neglect and exploitation.
        • To look their best by providing needed assistance to complete hygiene,
          grooming and clothing care tasks.
        • To learn to maintain a clean living/work environment.
        • To learn about nutritional recommendations through meal planning and preparation.
        • To learn about and practice safety awareness in all of their
          environments (living, work/daytime and---------------------- leisure activities).
        • To learn about their personal finances and budgeting skills.
        • To learn about and exercise their rights.
        • To learn about fair treatment and to understand due process if s/he
          feels that treatment is not fair.
        • To learn about and become involved in their personal health needs.
































          • 18 years of age.
          • Current valid driver's license, access to a licensed vehicle and proof
            of motor vehicle liability insurance is required.
          • Able to plan, organize and facilitate effective communication including
            effectively communicating through clear speaking and writing.
          • Able to organize and calculate data/information and maintain records
            according to standards.



























            Additional Information


































































            • Requisition ID: 2019-R0247181

























































































































































            • Schedule: Full-time

























































































































































            • Shift: Rotating




































































































            • Market: CHI Friendship



























































































































































          

Decriminalising sex industry a gift to pimps and traffickers – 40-organisation coalition

 Cache   

The Proposal by Integra and Aditus to decriminalise the Sex Industry is a gift to pimps and traffickers and would turn Malta into a haven for Sex Tourism and increase sex trafficking, a multi-disciplinary Coalition comprising over forty organisations who work in the area of prostitution, trafficking, equality and human rights, said.

They deem the proposal by Integra and aditus to be highly irresponsible and dangerous for our country.

"Integra and Aditus, largely focus on promoting the rights of migrants and the LGBTIQ.  They should know that opening up the sex industry will not protect vulnerable people, but will increase the number abuses against vulnerable people and the incidence of trafficked victims. The relatively small number of transgender people and migrants entering prostitution, often do so not as a result of a free choice, but through desperation. This is not demonstrable agency and autonomy, but duress and coercion of circumstance, if not people."

"Instead of completely legalising prostitution, we should unite to address the deficits in society that produce that desperation. We should work together to and ensure everyone has equal access to legal and decent employment. We must not open up the sex industry for this small minority of people at the expense of the overwhelming majority of vulnerable and exploited people."

"If implemented, the Integra/aditus proposal will have devastating long terms physical and mental health repercussions on all prostituted persons, including those involved from the LGBTIQ and migrant communities. Prostitution can never be equated to a 'normal' job, a body can never been adequately protected as a 'place of work'."

Regulation of the sex industry has without exception, failed to deliver its promised improvements to both the health of and conditions for women, the coalition said. "Evidence in these countries proves unequivocally that conditions for women in regulated prostitution industries are far worse."

"In terms of public health, and on the premise of avoiding the spread of disease, compulsory medical testing of prostituted people is often required by law legalising prostitution. What this fails to realise is that diseases like HIV and STDs are overwhelmingly transmitted by men to women during intercourse. Yet, there are no requirements for male sex buyers to submit to disease control testing. Also, the incubation period of some diseases will give false negative results that present further health risks."

"The model advocated by the Coalition has been found to be the best model that protects the health and safety of the prostituted person as it shifts the power from the buyer, who has full rights when buying in a decriminalised environment, to the seller. In all countries that have decriminalised prostitution, the sex industry expanded rapidly and the demand for prostitutes has not been meet with the supply of 'voluntary' prostitutes, locally. In every country where this happened, many foreign women, the vast majority of whom are poor and desperate; are lured, tricked or trafficked into more affluent countries to keep the sex industry going.  This raises class and race issues which are tolerated in a neo liberal economy that prioritises money over the well-being of those caught in the web of prostitution."

"This was clearly the case in Spain, Germany, the Netherlands, and New Zealand which have all seen significant increases in trafficking for the purpose of sexual exploitation.  All these countries are now scrambling to control and reverse the disastrous consequences of their legislative mistakes. Integra and Aditus incorrectly assert that prostitution and trafficking are divisible - they are not."

Malta is at the cross roads and should learn from the mistakes made in other countries rather than fall into the same trap and suffer the same devastating consequences, they said.  The entities supporting the equality model and its attendant proposals are endorsed by the following organisations, leading figures and activists:

Association for Equality (A4E), Attard Ladies Cultural Club (ALCC), Azzjoni Kattolika Maltija (AKM), Caritas, Dar Hosea, Dar Merhba Bik, Department of Gender Studies (UOM), Department of Social Policy and Social Work (UOM), emPOWer Platform, Business and Professional Women (Valletta) Malta (BPW), Foundation for Women Entrepreneurs Malta (FWE),  Malta Association of Women in Business (MAWB), Malta Foundation for the Wellbeing of Society (MFWS), National Centre for Family Research, National Observatory for Living with Dignity, National Institute for Childhood, Malta Girl Guides (MGG), Moviment Nisa' Partit Nazzjonalista (MNPN), National Council of Women (NCW), Soroptimists International Malta (SI), Young Women's Christian Association (YWCA), Faculty of Theology (UOM), Ghaqda Studenti tat-Teologija, Good Shepherd Sisters, Justice and Peace Commission, Local Councils' Association, Malta Association of Public Health Medicine (MAPHM), Malta Confederation of Women's Organisations (MCWO), Malta Medical Students Association (MMSA), Malta Midwives Association (MMA), Men Against Violence (MAV), OASI Foundation, Saint Jeanne Antide Foundation (SJAF), Solidarity Overseas Service (SOS) Malta, University Chaplaincy, Victim Support Malta (VSM), Women's Rights Foundation, Women's Study Group (WSG), President Emeritus Marie Louise Coleiro Preca, Dr Anna Borg - Academic and Women's Rights Activist, Ms Helen Burrows - International Human Rights Lawyer and Justice Reform Practitioner, Dr Angele Deguara - Academic and Social Activist, Dr Lara Dimitrijevic - Lawyer and Women's Rights Activist, Ms Francesca Fenech Conti - Women's rights activist and founder of the Women for, Ms Marietherese Gatt - Researcher and Women's rights activist, Ms Romina Gatt Lopez - Researcher - Dar Hosea, Dr Anna Vella - Management - Dar Hosea, Coalition Abolition Prostitution (CAP) International, Coalition Against Trafficking in Women (CATW), European Network of Migrant Women (ENOMW), European Women's Lobby (EWL), Survivors of Prostitution Abuse Calling for Enlightenment (SPACE) International

 



          

Prostitution reform should penalise sex-buyers - NCPE

 Cache   

The National Commission for the Promotion of Equality (NCPE) has welcomed most measures in the proposed reform on human trafficking and prostitution.

In particular, it commends efforts to combat human trafficking through prevention, awareness-raising and the strengthening of laws and protection mechanisms. The NCPE also welcomes plans to "decriminalise prostitutes" and enhance support for persons to exit prostitution.

In addition to the measures outlined in the consultation document, the NCPE is proposing a legal framework that penalises sex-buyers, underlining that prostitution is not gender-neutral since the absolute majority of prostitutes are women and the absolute majority of clients, pimps and traffickers are men.

"In fact, a defining feature of prostitution is power and control of men over women, which both reflects and reinforces a patriarchal society."

"The proposal to penalise sex-buyers is based on the recognition that prostitution is a vicious cycle rife with physical and psychological violence, whereby increased supply creates more demand and, in turn, more need for supply, effectively encouraging pimps and traffickers to actively find and force more women into prostitution. Penalising sex-buyers would break this cycle by disrupting the sex market."

It is to be noted that the experiences of countries that legalised prostitution were largely negative, the NCPE said. "For example, in the Netherlands and in Germany, where prostitution has been legal for a number of years, the sex industry grew exponentially and extreme exploitative conditions for prostitutes were in no way addressed.  On the other hand, countries such as Sweden that criminalised the purchase of sexual services, reported largely positive results such as a shrinking sex industry and a reduction in human trafficking. Other countries that criminalised the purchase of sexual services include Canada, France, Iceland, Israel, Northern Ireland, Norway and the Republic of Ireland."

Moreover, prostitution does not only affect prostitutes and clients, but also society in general since it promotes and normalizes the perception of women as sex objects, thus reinforcing gender inequality and gender stereotypes, the NCPE said.

The NCPE deems that the point of departure of any reform should be that prostitution has very negative effects on both the individuals involved as well as society at large, and that everyone should be in a position of not having to opt for prostitution.

The NCPE is also suggesting regulation and enforcement in relation to massage parlours and temporary work agencies in order to ensure that these are used for their stated purpose and do not act as fronts for prostitution and/or human trafficking. Additionally, it is recommending that strip clubs offer alternative entertainment due to their reinforcement of gender inequality and the objectification of women.



          

Are Hackers Using Popular Assistant Devices To Listen To Users?

 Cache   
The utility of virtual assistants like Amazon's Alexa and Google Home are undeniable.  They're just genuinely handy devices to have around. Unfortunately, they're also prone to abuse and exploits by hackers and ...
          

Benin – death of Albert Tévoédjrè: The Land of Orchids NGO hails the memory of “a peacemaker”

 Cache   

The non-governmental organization “Terre des Orchidées” salutes the memory of Brother Melchior who was called to God on Wednesday 6th November, in his 90th year. Beyond the political exploits to the credit of the rapporteur of the conference of the nation’s living forces, Albert Tevoédjrè is “a great peacemaker”, according to the NGO’s office. It […]

L’article Benin – death of Albert Tévoédjrè: The Land of Orchids NGO hails the memory of “a peacemaker” est apparu en premier sur BENIN WEB TV.


          

Manger, Operations Facilities

 Cache   
JOB DESCRIPTION

Procurement is a key input into the process where the selection of the best suppliers and the negotiation of the best commercial terms are critical to our business success. Depending on the dedicated category requirements, the jobholder will evaluate and ensure competitive supplier conditions, minimize the supplier related risks, and contribute the Procurement related information to the binding offer. As negotiations proceed and during the transition period, the jobholder will ensure congruence between the business needs, as well as the supplier terms and conditions. The transition period is often critical to the business case and may be subject to contractual milestones. During the transformation, the jobholder will coordinate and drive the procurement work stream, and will also drive the commercial improvement of the supplier contracts in order to encourage the sustainable commercial success of all opportunities.

The Operations Manager - Facilities is results driven and must possesses a tenacious desire to deliver flawless execution of Facility services (in-source or outsource) with the highest ethical standards. This position will lead and oversee the service delivery of the Facilities lease team and be based in Clearwater, Florida (Headquarters). This employee will be responsible for and oversee the strategy/process/operations and financials nationally for leased properties, as well as ancillary building related services not covered under the terms of our leased buildings. Success is measured through achievement of key performance indicators (fiscal as well as operational) and by ensuring business partner satisfaction nationally. This employee will manage and lead third party suppliers/contractors and hold vendors to rigorous performance standards. This position requires a highly motivated and ambitious candidate with a proactive, client focused mindset.

JOB RESPONSIBILITIES:

* Manage business relationships and ensure satisfaction within Lincare by providing a seamless interface with team members, senior leaders, and business partners

* Demonstrate leadership, responsiveness, and creativity

* Provide a lead role in monitoring and increasing business satisfaction while overseeing the accurate and timely completion of tenant service requests

* Function with a No Surprises approach to communication, ensuring that key stakeholders remain informed

* Ensure sites are operated and maintained in compliance with minimum Lincare audit standards, as well as client, federal, state, and local requirements

* Transform existing operational practices to leverage Lincare/Industry tools, processes, relationships, best practices to ensure service delivery is high efficient and effective

* Manage third-party contractors/vendors and property owners who are engaged in operating and maintaining properties

* Develop, manage, and report on facility operating budgets for the assigned portfolio, proactively tracking variances and managing within target

* Develop monthly/quarterly variance reports on all operating budgets for each property on a timely basis

* Achieve cost savings through maximizing utilization of suppliers, preferred vendors/contractors, and identifying additional efficiency opportunities

* Maintain employee work schedules, training, vacations, and paid time off, as well as coverage for absenteeism and overtime scheduling

* Accountable for the accuracy and timely updates to all systems data utilized for the account processes, procedures, and metrics

* Support EHS and Business Continuity programs including response, reporting, and remediation efforts with National Head of Safety



JOB REQUIREMENTS

EDUCATION AND EXPERIENCE:

* Bachelor s Degree or equivalent, and work experience in Facilities Management with a real estate organization/facilities management company along with responsibility for financial and operational performance (nationally)

* Strong skills in creating and monitoring SLAs and ensuring delivery via KPIs will be key

* Minimum of 5 years real estate/facilities experience required in the corporate environment, and/or third party service provider, or as a consultant

* Proven record of success managing large portfolio and/or multiple sites (nationally)

* CFM, FMA, CPM, RPA, or CSM designation is preferred

* Required to be proactive, adaptable, and responsive

* Experience managing and mentoring teams to meet and exceed client and account objectives

* Strong organizational and management skills to balance competing priorities

* Business acumen including financial management and planning must be able to manage within budget constraints

* Skilled at analyzing data/problems and developing effective response actions

* Computer proficiency with MS Office and Computerized Maintenance Management System (CMMS)

* Excellent verbal/written communication and presentation skills

* Experience managing and exploiting internal and external relationships at a high level

* Demonstrable influencing and leadership skills/ability to influence a diverse group of internal customers

* Experience dealing with and communicating to senior leaders (CEO/COO) and managers internally and externally

* Understand and modify the Lincare business strategy and how it relates to the optimization of relevant costs and business strategies

* Capable of drafting commercial terms and conditions and developing full contractual positions with vendors (in conjunction with the Legal Department)

* Demonstrate superior inter-personal communication skills with the ability to present cogently to a variety of audiences

* Manage strategic relationships with internal customers and vendors

* Comprehend the local, regional, and global procurement governance and processes, and ensure that all purchases are compliant

TECHNICAL SKILLS:

* Planning/Organizing

* Prioritizes and plans work activities to achieve success

* Sets and achieves goals and objectives

* Develops realistic action plans

* Professionalism

* Reacts well under pressure

* Keeps commitments

* Accepts responsibility for own actions

* Quality

* Demonstrates accuracy and thoroughness

* Looks for ways to improve and promote quality

* Applies feedback to improve performance

* Monitors own work to ensure quality

* Critical Thinking

* Uses logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions, or approaches to problems

* Analytical

* Synthesizes complex or diverse information

* Collects and researches data

* employs intuition and experience to complement data

* Designs work flows and procedures

* Judgment

* Is willing to make timely decisions

* Exhibits sound and accurate judgment in decision-making

* Supports and explains reasoning for decisions

* Includes appropriate people in decision-making process

* Project Management

* Develops and coordinates project plans

* Communicates changes and progress to internal users and supervisor

* Completes projects on time and budget

* Manages project team activities

* Quality Management

* Looks for ways to improve and promote quality

* Demonstrates accuracy and thoroughness

* Cost Consciousness

* Develops and implements cost saving measures

* Contributes to profits and revenue

* Conserves organizational resources

* Contractual Management

* independently develops, negotiates, executes, and administers all types of unique, complex, high risk, legally binding contracts for goods and services

Lincare is an equal opportunity, access, and affirmative action employer. All qualified applicants will receive consideration for employment regardless of race, color, religion, creed, sex, age, national origin, protected veteran status, disability status, sexual orientation, gender identity or
          

Manager -Software Engineering

 Cache   
**Job Location:** Cary, NC **Role Value Proposition:** This role is managing a team of -10 full time associates in our Regional Application Development group (RAD US) which includes Solutions Delivery & Software Engineering for Distributed applications, supporting the US Group Business with Policy Administration & Billing. Will be responsible for balancing currency, technical debt, and enhancements against challenging business driven dates and budgets, supporting MetLifes growth objectives. This person oversees a team consisting of a Project Lead, a shared Business Systems Analyst, Software Engineers and Interns, supporting a range of products and delivering on projects/programs of all sizes. The Manager, Software Engineering manages a team of full-time associates (FTE) and a varying amount of vendor resources, including both onshore and offshore. **Key Responsibilities:** + Responsible for mentoring and developing the team, planning & forecasting for the team, liaison with partner organizations and teams. + The Manager also serves as the application owner for a portfolio of 10 Java applications providing design governance and strategic planning for the portfolio. + Tasked with balancing the portfolio of work, which includes both development activities and application support activities (audits, assessments, flaw tracking, release management, etc.) + Responsible for end-to-end application development from intake, ideation, requirements, design, development, deployment, and third-level support of the production systems. + Adhere to Software Development Lifecycle (SDLC) processes and MetLife Change Management standards + Adhere to MetLife Technology Stack and Architecture + Explore/Exploit new technologies and drive a more efficient software development operating model + Cultivate talent and provide SMART goals for the team **Essential Business Experience and Technical Skills:** Required: + BA/BS Degree required with major in Computer Science, Information Systems or related field strongly preferred + 10+ years in Information Technology (IT) and Med-Large program management + 5+ years leading people/projects, ideally including on and off-site/offshore, vendor and full time + Experience working in Waterfall and Agile/DevOps environment + 4+ years of Java Development experience with Web based applications (GUI, Services, and Batch + Technology generalist with a good understanding of distributed technologies with emphasis on: Java, Angular, Containers, IBM Liberty, HTML, JavaScript, XML, JSON, WebSphere, MQ, Git, Maven, and SQL) + Proficient knowledge of project/program management practices, principles, concepts, excellent written and verbal communication including leadership and negotiation, advanced financial acumen. Preferred: + Group Insurance industry experience + Experience supporting IBM Mainframe Applications + PMP or similar **Business Category** _Global Technology- Regional App Dev US_ **Number of Openings** _1_ **At MetLife, were leading the global transformation of an industry weve long defined. United in purpose, diverse in perspective, were dedicated to making a difference in the lives of our customers.** MetLife is a proud equal opportunity/affirmative action employer committed to attracting, retaining, and maximizing the performance of a diverse and inclusive workforce. It is MetLife's policy to ensure equal employment opportunity without discrimination or harassment based on race, color, religion, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity or expression, age, disability, national origin, marital or domestic/civil partnership status, genetic information, citizenship status, uniformed service member or veteran status, or any other characteristic protected by law. MetLife maintains a drug-free workplace. **For immediate consideration, click the Apply Now button. You will be directed to complete an on-line profile. Upon completion, you will receive an automated confirmation email verifying you have successfully applied to the job.** Requisition #: ****** Posted: 2019-10-29 Expires: 2019-11-29 Siemens
          

Tue. 11/05 - Is All Well With Softbank?

 Cache   

How are things in Masa Son’s world post-WeWork? How long until Uber will be profitable? How is the new Surface Pro X to use? Why is iOS aggressively quitting background apps? And why data scoring companies are maybe worse than credit score companies.

Sponsors:


Links:


          

File Optimizer 14.00.2524 Denial Of Service

 Cache   
Topic: File Optimizer 14.00.2524 Denial Of Service Risk: Medium Text:# Exploit Title: FileOptimizer 14.00.2524 - Denial of Service (PoC) # Date: 2019-11-04 # Exploit Author: Chase Hatch (SYANiD...
          

Agent de rampe - Trans Sol Aviation Services (TSAS) - Quebec City, QC

 Cache   
Au service de plus de *120 compagnies aériennes*et exploitants d’avions tels que : Une équipe formée de *1 000 passionnés*d’aviation qui vise l’excellence à…
From Indeed - Mon, 12 Aug 2019 19:05:17 GMT - View all Quebec City, QC jobs
          

ETL Developer with Security Clearance

 Cache   
Senior ETL Developer
Location: Chantilly
Clearance Level: TS/SCI with FSP Summary
The successful candidate will leverage their development skills and experience, as part of our Sponsor's Data Layer Engineering Team, to support the successful ingestion, cleansing, transformation, loading, and display of significant amounts of data. Duties, Tasks & Responsibilities --- Designing and implementing large-scale ingest systems in a Big Data environment --- Optimizing all stages of the data lifecycle, from initial planning, to ingest, through final display and beyond --- Designing and implementing data extraction, cleansing, transformation, loading, and replication/distribution --- Developing custom solutions/code to ingest and exploit new and existing data sources --- Working with Sponsor development teams to improve application performance --- Organizing and maintaining Data Layer documentation, so others are able to understand and use it --- Collaborating with teammates, other service providers, vendors, and users to develop new and more efficient methods Required Experience, Skills, & Technologies --- Bachelor's Degree in Computer Science, Information Systems, Engineering, or other related discipline, OR 10 years of related software development experience may be substituted for education --- At least 5 years of data analysis and parsing experience --- At least 5 years of Java development experience coupled with significant SQL/database experience --- Strong experience with the full data lifecycle, from ingest through display, in a Big Data environment --- Strong experience with Java-related technologies, such as JDK, J2EE, EJB, JDBC, and/or Spring, and experience with RESTful APIs --- Experience with Hadoop, Hbase, MapReduce --- Experience with Kafka and Zookeeper --- Experience developing and performing ETL tasks in a Linux environment Desired Experience, Skills & Technologies --- Experience with Elasticsearch --- Experience with Gradle
          

Slog PM: Happy Birthday, Alexa; T.I. Needs to Back off His Daughter's Hymen; "I'm Always Happy to Meet with People"

 Cache   
by Chase Burns
Wish me Happy Birthday or Im releasing the kompromat, daddy.
"Wish me Happy Birthday or I'm releasing the kompromat, daddy." KARNEG/GETTY IMAGES

Today is Alexa's birthday: She's five. But everyone only wants to talk about how much money her dad spent in Seattle's election. Rude.

Tim Eyman is a sub for lawsuits: And lucky him, more are coming.

Bill Taylor, the top U.S. diplomat in Ukraine, told impeachment investigators there was direct quid pro quo: He made the statement during private testimony last month, but his words became public today. Taylor said Rudy Giuliani was the "originator" of the quid pro quo plan. Giuliani tweeted that this new testimony was "a frame-up and hoax." Read the full transcript here.

After the first round of ballot drops, infamous KIRO Radio host Dori Monson had "mixed feelings" about Sawant seemingly losing: "As you know, very few people have generated the kinds of soundbites that fuel a talk show host like Kshama Sawant. It was fun listening to her screeching for the past six years. And now her reign could be coming to an end in Seattle," he joked. Reminds me of something Rich Smith wrote:

If these Republicans were good at politics, they would be pumping as much money as possible into Sawant's campaign. Republicans have been blaming Sawant for problems in Spokane since she first took office, and now they're just going to let her go? Who will they use to scare away centrists in Kirkland if she loses? Who are they going to use as an excuse not to catch up to California and Oregon on statewide rent control legislation? Oh wait, that's not the Republicans. That's Sen. Jamie Pedersen, D-Seattle.

Speaking of ballot drops: Here are today's returns. Many races won't be settled until at least Friday. Counting votes takes time, people!


A good amount of Seattle votes have yet to be counted: So hold onto your butts.

Bill Gates suggests Warren isn't "open-minded": because she probably wouldn't "be willing to sit down with somebody who has large amounts of money." He made the comments today at the New York Times DealBook conference. He also said he made a "mistake in judgement" by meeting Jeffrey Epstein and disagrees "with people who think a corporation should sit there and do fact-checking against that thing," in reference to political advertising on Facebook. He also said "Jeff [Bezos] likes artificial planets." LOL.

Op! A clapback:

Lady Gaga and Bradley Cooper never dated: They're actors. Breaking news.

Trouble in the Twitter kingdom: Two former Twitter employees have been charged by the Justice Department for "exploiting their access to the company’s internal systems to help Saudi Arabia," writes the New York Times. This is the "first time federal prosecutors have publicly accused the kingdom of running agents in the United States," writes the Washington Post.

Jeff Sessions is expected to run for the Alabama Senate: I'm sure the KKK is thrilled.

Rep. Ayanna Pressley endorses Elizabeth Warren: which is expected, because they're both from the same state, Massachusetts. Other members of "the Squad," AOC and Ilhan Omar, have backed Bernie.

T.I., the rapper of "Whatever You Like" and actor best known for starring in ATL, checks his daughter's hymen on the reg: Well, a gynecologist does, but that gynecologist reports back to T.I., which is... something else. He said in a podcast interview that aired yesterday that he makes sure his daughter's hymen is in tact... yikes. What about butt stuff? The passage:

"Not only have we had the conversation — we have yearly trips to the gynecologist to check her hymen," T.I. said. "Yes, I go with her."

He then mentioned that after her 16th birthday party, he "put a sticky note on the door: 'Gyno. Tomorrow. 9:30.'"

[ Comment on this story ]

[ Subscribe to the comments on this story ]


          

The Biggest Events You Should Know About This Weekend

 Cache   
A weekend guide to the biggest local events. by Stranger EverOut Staff All week long, we've been posting lists of Seattle events to keep you busy, but we realize there's a lot to sort through. So, if you only have time to read one list, make it this one: We've plucked the biggest events you need to know about in every genre, from the HUMP! Film Festival to an evening with David Sedaris to the Short Run Comix & Arts Festival.

HOLIDAY MARKETS & FESTIVALS

Best of the Northwest Art & Fine Craft Show
See and shop work by over 100 local artists and artisans at the 31st edition of this annual market, which will also have food trucks.
Friday-Sunday, Magnuson Park Hangar 30 (Sand Point)

The Farewell Glitter Sale 2019
Seattle Goodwill will add some pizzazz to the winter of your discontent with their annual sale of all things sparkly: shoes, evening wear, purses and accessories, and more. This is the final year of this event, so make it count.
Saturday-Sunday, Seattle Goodwill (Downtown)

Finnish Christmas Market
Get a taste of Finland at this annual Joulumarkkinat featuring crafts, gifts, music and dancing, and traditional treats (like pea soup, sandwiches, and pulla sweet bread). The coffee will be free!
Saturday, Swedish Cultural Center (Queen Anne)

Newport Ski Swap
Winter sports season is fast approaching, so now's a good time to swap gear you don't want for gear you do want. At this 34th annual event, you'll find over 10,000 new and used snow sports items. 
Friday-Saturday, Newport High School (Bellevue) 

Oddmall: Emporium of the Weird
Shop for goods from over 85 indie artisans to sate all your kitschy needs and desires.
Saturday-Sunday, Evergreen State Fairgrounds (Edmonds)

One-Day Better Book Sale
Find gifts for your bookwormy loved ones starting at just three bucks. 
Saturday, North Seattle College

Swanson's Reindeer Festival
Shop a variety of seasonal plants, bulbs, arrangements, and Christmas trees, as well as other gifts like books, jewelry, and home decor, at the decked-out nursery. Plus, visit with Santa and his real-life reindeer, check out model trains, and enjoy live music throughout the season.
Saturday-Sunday, Swanson's Nursery (Ballard)

FOOD & DRINK FESTIVALS

AAJA Seattle Chef Showcase 2019
Bid on auction items and sample food from celebrated local eateries like Adana, Hood Famous, and Nirmal's, all for the good cause of supporting the Asian American Journalists Association.
Friday, Wing Luke Museum (Chinatown-International District)

America's Test Kitchen Seattle Eats Festival
It’s the return of public TV’s favorite cooking show, America’s Test Kitchen, for the Seattle Eats Festival, which is definitely cause for culinary celebration. The two-day event kicks off at Block 41 with ATK’s Cheers to 20 Years anniversary celebration, a party to benefit local nonprofit FareStart (which helps people experiencing homelessness or poverty with training and jobs in the service industry), and celebrate the release of ATK’s new How to Cocktail cookbook. ATK hosts and test cooks will be on hand (including mains Bridget Lancaster and Julia Collin Davison), with well-regarded local mixologists (like Amanda Reed of Heartwood Provisions) and chefs (Adana’s Shota Nakajima among them) serving bites and cocktails. The main event occurs the following day, with a bevy of local restaurants, cafes, eateries, and the chefs behind them offering food and drink alongside an afternoon of ATK-led cooking demos (like a how-to on Torta Caprese Italian chocolate almond cake, which is gluten-free and all for me), cookbook signings, photo ops, and more. This year’s featured guest chef is venerable Iron Chef-famed Masaharu Morimoto, who just opened a restaurant in Chinatown/ID. LEILANI POLK
Friday-Saturday, Bell Harbor International Conference Center (Downtown)

K’URB Street Food Market Pop-Up
Enjoy a curbside feast with "hyperlocal, globally inspired" cuisine from local vendors like T'Juana Tacos, Piroshky Piroshky, BeanFish Taiyaki, Kismet Turkish Cafe and Bakery, and more.
Sunday, Fremont Sunday Market

Northwest Chocolate Festival 2019
Now in its 10th year, this gathering of artisan chocolate makers actually extends beyond the Northwest to more than 20 countries around the globe, with exhibitors like beloved Seattle staples Fran’s and Bakery Nouveau, and Portland’s Moonstruck Chocolate and Bees and Beans joining names like Theo and Philo Artisan Chocolates (from the Philippines), Hogarth Craft Chocolates (New Zealand), Al Nassma Chocolate (Dubai), and FuWan Chocolate (Taiwan), among so many others. You’ll find milk and dark chocolate, truffles, bonbons, caramels, molten cakes, decadent desserts, and plenty more, in addition to enjoying demos, educational workshops and seminars, cooking classes, and tastings. Look, it’s a shit-ton of chocolate, okay? How can you argue with that? You can’t. Go get blissed. LEILANI POLK
Saturday, Smith Cove Cruise Terminal (Interbay)

Snohomish BrewFest
Choose from 75 beers from over 30 local craft brewers and feast on chicken sliders, brats, mac and cheese, brownies, bacon, and more comfort food. (According to the organizers, some attendees like to adorn themselves with a homemade pretzel necklace, so do with that information what you will.)
Friday, Thomas Family Farm (Snohomish)

South Sound Winter Beer Festival
This craft beer festival promises seasonal staples like "dark imperial stouts, roasty porters, strong beers, Scottish ales, barrel-aged surprises, spiced ales, piney IPAs" and much more from over 30 Washington breweries.
Saturday, Washington State Fair Events Center (Puyallup)

OTHER FESTIVALS & COMMUNITY EVENTS

Adult Swim
Meet a gigantic Pacific octopus, snap selfies with a diver, snack on hors d’oeuvres, sip drinks, and groove to music by KEXP DJ Troy Nelson at this "after-hours aquarium experience."
Friday, Seattle Aquarium (Downtown)

Auburn Veterans Day Parade
This 54th annual parade and observance in Auburn—named Washington's Regional Site for celebrating the holiday by the Veterans Day National Committee and the US Department of Veterans Affairs—features high school marching bands, military vehicles, honor guards, and other such fanfare.
Saturday, Auburn Main Street

Hmong New Year Celebration
Celebrate the Hmong cultural traditions of China, Laos, and Thailand with a New Year celebration replete with a ball-tossing ritual, flower cloth sessions, live performances, and food.
Saturday, Seattle Center

Short Run Comix & Arts Festival
In 2018, Stranger lit critic Rich Smith wrote of Short Run: "You’re going. You’re bringing at LEAST $50 cash. You’re picking up new art books, zines, buttons, and little strips of beautiful screen-printed ephemera from more than 270 internationally/nationally/locally-renowned comics creators." All this applies for the ninth edition of Short Run, only it'll be even bigger. This year's artists will include Jasjyot Singh Hans, Glynnis Fawkes, Marc Bell, Malaka Gharib, and Jul Gordon. (Mexican artist Abraham Diaz will unfortunately not be present, having been denied a visa.) There will also be a screening of a collection of the late, lamented Bruce Bickford's animation, courtesy of Clyde Petersen and friends. Head to the afterparty at the Vera Project once you're done shopping.
Saturday, Fisher Pavilion (Seattle Center)

PERFORMANCES

Beautiful
The dancers of Can Can and powerhouse singer Renee Holiday (formerly Shaprece, who "ranks among the Northwest’s most radiant, soulful vocalists and producers of torch-song-centric electronic music," per Dave Segal) collaborate on this sensuous coming-of-age story, featuring a leading performance by Holiday and new choreography.
Friday-Sunday, Can Can (Downtown)

Dracula
Dracula will be breathed to life yet again when playwright Steven Dietz's adaptation of the Bram Stoker tale is revived and revised specifically for ACT Theatre. In this Dracula, the focus shifts to Mina Murray Harker. Her character has always been ripe for a reckoning or a refresh, or both. She is the source of endless fascination, because she is an obvious heroine in Stoker's novel, pure of heart and mind, and yet she's just as much a casualty of Dracula's desires as her poor friend Lucy. No matter how many gender norms Stoker challenged, it was still the Victorian era. Mina could be given only so much agency. "But to simply make her a victim was super unsatisfying to all of us," director John Langs explained. "So Steven has done some reworking of the story, and she really comes to the forefront. The hunted becomes the hunter in this particular adaptation." LEILANI POLK
Friday-Sunday, ACT Theatre (Downtown)

The Great Moment
Playwright Anna Ziegler earned a lot of attention in 2015 for Photograph 51, a well-received bio-drama about Rosalind Franklin, the woman who discovered DNA. Nicole Kidman played the starring role, everybody loved it, and Ziegler was praised for her "fair-minded and philosophical" (New York Times) approach to character building. Ziegler will likely bring that same talent for creating multidimensional characters to The Great Moment, which will have its world premiere at the Seattle Rep. According to press materials, the story follows a woman named Sarah, who is watching her grandfather slowly die while she raises her son. Alexandra Tavares plays the lead in this, and I've loved everything I've ever seen her in. RICH SMITH
Friday-Sunday, Seattle Repertory Theatre (Seattle Center)

Locally Sourced
Three local choreographers will present three brand-new works for Pacific Northwest Ballet, all of which pique my curiosity for different reasons. Tony-nominated choreographer Donald Byrd often uses dance to examine acts of violence levied against minorities, so it'll be interesting to see how music by Emmanuel Witzthum, who creates warm, morning-light compositions, works into his vision. Bellevue-based choreographer Eva Stone, who produces the CHOP SHOP: Bodies of Work festival, will have a new piece called F O I L. She often challenges assumptions about gender in her work, and her recent collaboration with Au Collective at PNB & SAM’s Sculptured Dance ruled. And PNB corps member Miles Pertl makes his choreographic debut with music from Stranger Genius Award finalist Jherek Bischoff, whose soaring indie compositions always make me feel better about life. RICH SMITH
Friday-Saturday, McCaw Hall (Seattle Center)

Moscow Ballet's Great Russian Nutcracker
A cast of touring ballet dancers from Moscow will take their 27th tour across the United States to perform the Great Russian Nutcracker, which promises puppets and amazing costumes.
Friday, Paramount Theatre (Downtown)

Seattle International Comedy Competition 2019
For nearly all of November, a lengthy last-comic-standing battle rages. Thirty-two comedians (split into two batches, each of which performs every night for one week) start the contest, and one will finish a champion. Celebrity judges and audience reactions determine who passes the preliminaries and who becomes a finalist. See the first week's schedule here.
Friday–Sunday, Various locations

Shout, Sister, Shout!
Rejoice in the music and power of the "Godmother of Rock 'n' Roll," Rosetta Tharpe, the amazing singer and guitarist who transformed American music.
Friday-Sunday, Seattle Repertory Theatre (Seattle Center)

SuicideGirls: Blackheart Burlesque
SuicideGirls Blackheart Burlesque promises geek-friendly burlesque performance, with references to Star Wars, Rick and Morty, Stranger Things, Sailor Moon, and other pop culture favorites.
Friday, Benaroya Hall (Downtown)

The Tempest
Accomplished director Annie Lareau (Cornish College of the Arts' Much Ado About Nothing, many Seattle Public Theater productions), will tackle Shakespeare's fantastical final work about an island wizard, his hot daughter, his nonhuman slaves, and his princely prisoner. This staging will take place in an Edwardian castle, "one of the last periods before media started to infiltrate people's lives."
Friday-Sunday, Center Theatre (Seattle Center)

The Thanksgiving Play
In this holiday comedy, Lakota playwright Larissa FastHorse takes aim at a group of white teaching artists who end up reasserting colonial ideology in their attempt to rid their teaching practice of that very same ideology. According to Jesse Green's review in the New York Times, the more cringe-inducing skits in the show are based on actual school lesson plans lifted from social-media posts: "They include potted history and offensive ditties and, in one case, a suggestion to split the pupils into Pilgrims and Indians 'so the Indians can practice sharing.'" Sounds like it'll be another fine entry into the growing canon of plays about white people fucking up something they're trying to fix. I'm unfamiliar with the actors in the show, but I have no doubt they'll flourish in the highly capable hands of director Kelly Kitchens. RICH SMITH
Friday-Sunday, Seattle Public Theater (Green Lake)

Where is home : birds of passage
You know what's really scary? Concentration camps for asylum seekers at the border, constant ICE raids, border patrol separating children from their parents and not having the administrative infrastructure to unite them, and the state generally doing everything it can to dehumanize people who want to immigrate to this country. In her brand-new—and first-ever (!)—solo show, Where is home : birds of passage, local Italian American choreographer Alice Gosti aims to push back against the xenophobic narratives that drive these anti-immigrant policies. She'll draw from her own history with immigration as well as the larger history of Italian immigration to the United States in a spectacle that will run about three hours. As always with Gosti's work, you'll get to decide how much attention you want to devote to this performance. And the act of making that decision, of course, is part of the performance. RICH SMITH
Friday-Sunday, ACT Theatre (Downtown)

FILM FESTIVALS & OPENINGS

Cinema Italian Style
The Cinema Italian Style is a weeklong SIFF mini-festival featuring the best in contemporary Italian cinema.
Friday-Sunday, SIFF Cinema Uptown (Queen Anne)

'Doctor Sleep' Opening
Danny Torrance, the psychic kid from The Shining, is all grown up—and messed up, understandably. When he meets a girl with the "shining," the same ability as his own, the two allies must fight a cult that tries to exploit their power.

HUMP! Film Festival
The HUMP! Film Festival has been bringing audiences a new kind of porn since 2005. The 15th Annual HUMP! Film Festival festival features 21 short dirty movies—each less than five minutes—all created by people who aren't porn stars but want to be one for a weekend. The filmmakers and stars show us what they think is hot and sexy, creative and kinky, their ultimate turn-ons and their craziest fantasies. Our carefully curated program is a cornucopia of body types, shapes, ages, colors, sexualities, genders, kinks, and fetishes—all united by a shared spirit of sex-positivity. HUMP! is a celebration of creative sexual expression. You will see films at HUMP! that shock you. You will see films at HUMP! that make you laugh. And you will see films at HUMP! that turn you on. You will also be touched by the sincerity and vulnerability with which these films are lovingly made. HUMP!'s main mission is to change the way America sees—and makes and shares—porn. DAN SAVAGE
Friday-Sunday, On the Boards (Queen Anne)

MAJOR CONCERTS & MUSIC EVENTS

CATHEDRALS XXVIII: Jesca Hoop, Ken Stringfellow, Chloe Foy
My first encounter with Jesca Hoop was on a little EP called Kismet I found in a stack of ignored CDs at my college radio station. It was short and intense, with enough winding moonlit passion to power a whole album (which, incidentally, it would do later in 2007). From that moment 12 years ago to 2016's Sub Pop release of her latest, Memories Are Now, Hoop has toured with Shearwater and Andrew Bird, among many other artists, released double digits’ worth of EPs and LPs, and grown in her abilities to maintain a level of sister-wife-survival-guide in a wading pool of folkloric intensities. This album holds promise for continued growth in the mythic forest realm her music inhabits, with a sense of matured centering, an innate feeling that her work has finally found a stronghold from which to blossom. KIM SELLING
Friday, Saint Mark's Cathedral (Capitol Hill)

Emerald City Soul Club 14th Annual Rare Soul Weekender
A residency that’s been active for 14 years is an impressive feat of longevity in a town that can be pretty fickle. So it’s fitting that the anniversary celebration of Emerald City Soul Club—both a monthly event that gets hips shakin’ and asses quakin’, and the DJs who spin those righteously soulful sounds—stretches over several days. The festivities kick off with a meet and greet featuring weekender guest DJs and selectors at the Triple Door. Next, two nights (Friday and Saturday) of main events, Soul Nite #1 and #2, at the usual digs, Lo-Fi; expect rare R&B, soul, Latin, funk, crossover, and modern 45s played by top collectors/DJs from the US and Europe. ECSC DJ and Stranger staffer Mike Nipper gave me a sneak preview of songs that’ll likely be played sometime this weekend: Curtis Lee, “Is She in Your Town”; Joanie Sommers, “Don’t Pity Me”; Bernadette Bascom, “I Don’t Wanna Lose Your Love”; Arnold Blair, “Trying to Get Next to You”; and the Incredibles, "Miss Treatment.” There’s also a Saturday daytime Big Dig Record Swap at Vermillion, and on Sunday, the All-Dayer Soul Survivor Party (actually, 4 p.m. to close) at Screwdriver. In sum, plenty of opportunities to gtf down. LEILANI POLK
Friday-Sunday, Various locations

Fisher, Claptone, Idris Elba, Weiss, Taiki Nulight, Little Fritter, Sean Majors
The All My Friends Seattle crew is back to throw a third major bash after their explosive summer, which will feature sets by Fisher, Claptone, Idris Elba, Weiss, Taiki Nulight, Little Fritter, and Sean Majors on the You Little Beauty Tour.
Saturday, WaMu Theatre (Sodo)

Infected Mushroom
Psychedelic trance innovators Infected Mushroom are a rare duo, combining live performance as a concert band with new explorations in electronica and dance music.
Saturday, the Showbox (Downtown)

Ladies & Gentleman, An Evening with Jason Mraz & Raining Jane
Someone's got to be the less-douchey John Mayer, and there's no better contender than Jason Mraz, a perfectly good guy making perfectly nice music that will not make you cover your ears in horror should you happen to hear it on the radio or in the supermarket. He's funny, humble, pro-gay, and he wears hats. He'll be joined by '90s-bred folk-rock artist Raining Jane. DAVE SEGAL
Saturday-Sunday, Paramount Theatre (Downtown)

The Movie Music of John Williams
If you do not know who John Williams is, do not bother reading what I have to say about him in this blurb. John Williams' greatest achievement as a film composer is his love theme “Han Solo and the Princess” for Han and Leia in The Empire Strikes Back. (You, the pop-culture ignoramus, are still reading! Yes, Williams composed the music for the Star Wars series, and also Jaws, Indiana Jones, and so on, and so on.) This love theme has all of the sensitivity and cheap beauty that made “Spartacus: Love Theme” a jazz standard. If the great jazz pianist Bill Evans were alive today (why don’t some people live forever?), he would have made pure magic out of Williams’s “Love Theme.” CHARLES MUDEDE
Friday-Sunday, Benaroya Hall (Downtown)

Seefeel, Dr. Troy
You could say this is my most anticipated show of 2019; I've been waiting 26 years to catch Seefeel live. Led by guitarist/producer Mark Clifford and vocalist/guitarist Sarah Peacock, the group arose from the UK’s potent shoegaze/post-rock scene, but immediately established themselves as outliers, embracing dubby bass lines and Aphex Twin–like ambience on releases such as More Like Space and Quique. (It made sense that Richard D. James remixed the early Seefeel classic “Time to Find Me.”) Even more blissed-out and ethereal than My Bloody Valentine circa Loveless, Seefeel generated impossibly sensuous whirlpools of sound up through 1994's Starethrough EP. Their aesthetic gradually morphed into an alien strain of IDM while still retaining Seefeel's mesmerizing guitar daubs and disembodied dub vibrations. For this gig, I'm betting on a stunning career retrospective involving radical interpretations of old faves, with possibly some new tracks scattered throughout. DAVE SEGAL
Friday, Neumos (Capitol Hill)

Snails
Bass music heavyweight and general eardrum-crusher Snails will return to Tacoma on his World Of Slime Tour.
Saturday, Tacoma Dome

Young Thug, Machine Gun Kelly, Polo G, Strick
Since catching the ears of the rap cognoscenti with his 1017 Thug mixtape in 2013, Thugger has carved out his own path in popular rap through repetition and oddball yelps, scoring a steady string of singles like smashes “Stoner” and “Danny Glover” to his 2016 Jeffery mixtape, all recorded alongside a cadre of scene-defining producers, including London On Da Trak and Metro Boomin. NICK ZURKO
Sunday, WaMu Theater (Sodo)

READINGS & TALKS

Adrienne Brodeur: Wild Game
Brodeur writes about her very complicated adolescence in this memoir, subtitled My Mother, Her Lover, and Me. At 14, she became her mother's confidante during the latter's affair with her husband's best friend. Entertainment predicts that this tale of terrible parenting, its impacts, and the possibility of reconciliation may be the "next big memoir." Brodeur will read with Danya Kukafka.
Friday, Elliott Bay Book Company (Capitol Hill)

An Evening with David Sedaris
He’s back. One of America’s most beloved writers and humorists returns to Seattle for his annual performance. It’s almost a tradition by now, the yearly visit from David Sedaris, as though your favorite uncle or the best friend you wish you had pops in for a night to read from whatever he’s working through. We’re lucky that way. No word yet on whether his material will be old or new (maybe both?) but, like always, he is sure to amuse. KATIE HERZOG
Sunday, Benaroya Hall (Downtown)

Novel Nights
Raise money for Seattle's most beloved writing center, Hugo House, at this book club series featuring special guests (including the authors, if they're still alive!). The books you'll discuss this weekend are The Lord of the Rings on Friday and The Boys in the Boat (with author Daniel James Brown) on Saturday.
Friday–Saturday, Hugo House (First Hill)

SPORTS & RECREATION

Sounders FC vs. Toronto FC Playoffs
For the third time in four seasons, the Seattle Sounders will take on Toronto FC in the MLS Cup, the post-season championship game of Major League Soccer. If you can't make it to CenturyLink Field to catch the action, watch the game at one of the many local bars and restaurants that will host viewing parties.
Sunday, CenturyLink Field (Pioneer Square)


          

L'agroécologie n'existe pas sans le féminisme

 Cache   

« Dans les épreuves traversées lors des crises alimentaires, c'est dans le paradigme de l'agroécologie et de la souveraineté alimentaire que le féminisme est le mieux représenté car la solidarité y est mise en pratique par le biais d'actions collectives qui remettent en question les rôles de genre ainsi que les paradigmes de l'inégalité, l'oppression et l'exploitation. »
Notre planète est au bord de l'effondrement environnemental et la faim gagne du terrain. Selon le rapport sur l'État de la sécurité (...)

- Français / ,
          

Billions at Play: Book review

 Cache   
KIERAN ARCHER THE phrase ‘resource curse’ is widely used in political economy to describe the situation where natural resources such as petroleum, diamonds or precious metals are exploited by foreign investors, usually to the benefit of a small number of native overlords and with damaging consequences for local communities or the environment. Also known as the […]
          

Compass Call Aircraft Maintenance Qualification Training Specialist

 Cache   
Job Description BAE Systems is seeking a highly skilled and motivated individual to join our team of professionals as a Compass Call Aircraft Maintenance Qualification Training Specialist. The training specialist will work to design, implement, and manage a training environment as well as instruction of the Compass Call Prime Mission Equipment (PME). Work also involves establishing criteria to measure and /or predict the attainment of established training goals and objectives. The selected individual will be expected to have in-depth knowledge in Air Force training methodologies that support war-fighter techniques, and procedures. Additionally the training specialist will be required to perform standard field service work on the Compass Call system. Additional responsibilities include the following: - Develop requirements for the Compass Call Baseline 1 through Mid Baseline 2 and future configurations, compile training materials, and identify & enable learning objectives which will be tested both formally and informally - Define courseware and develop training scripts for teaching to include: -[if !supportLists]-> -[endif]-> PME System Start Up/Shutdown -[if !supportLists]-> -[endif]-> Built In Test (BIT) knowledge -[if !supportLists]-> -[endif]-> BIT execution -[if !supportLists]-> -[endif]-> BIT results interpretation -[if !supportLists]-> -[endif]-> System alignments -[if !supportLists]-> -[endif]-> System troubleshooting and repair -[if !supportLists]-> -[endif]-> System scheduled maintenance -[if !supportLists]-> -[endif]-> Following Air Force and engineering Job guides and manuals - Define courseware for Air Force supervision to provide an understanding of PME basics and terminology - Conduct Subject Matter Expert (SME) interviews to develop the foundation of additional training modules. - As a primary trainer in support of War-fighter operations, must be able to apply a thorough understanding of Air Force Maintenance Training in order to compile, collate, analyze, produce, and evaluate training in support of the customer. - Perform duties as a Compass Call Field Service Representative when not performing training duties working with existing BAE Systems Field Service Representatives. Interface with engineers as required to identify, report, and resolve issues in the field. Please note that pursuant to a government contract, this specific position requires US citizenship status Typical Education & Experience Typically a Bachelor's Degree and 4 years work experience or equivalent experience Required Skills and Education Candidates must ensure that resume addresses all stated requirements of the posted requisition. Only resumes that specifically include all required skills/experience/education will be considered. Active TS/ SCI Bachelor s Degree or 10 or more years of related work experience including significant experience with Compass Call Expert knowledge of analytical and evaluative techniques, and skills and abilities to identify training issues, recommend solutions (update or design training curricula/fill knowledge gaps), and conduct complex studies concerning the efficiency and effectiveness training programs Strong Compass Call Maintenance background which enables identification of training requirements and the writing of curriculum Experience as an Air Force ATC or OJT Instructor Knowledgeable in the Microsoft Office Suite Excellent verbal and written communication skill sets to convey information, explain issues, and accomplish training objectives Preferred Skills and Education Highly desired skill/experience: 10 or more years of experience in Compass Call Experience as a Compass Call Combat Systems Electronics Technician and/or Field Service Representative Knowledge of the Air Force 755 th Maintenance organization About BAE Systems Electronic Systems BAE Systems Electronic Systems is the global innovator behind game-changing defense and commercial electronics. Exploiting every electron, we push the limits of what is possible, giving our customers the edge and our employees opportunities to change the world. Our products and capabilities can be found everywhere from the depths of the ocean to the far reaches of space. At our core are more than 14,000 highly talented Electronic Systems employees with the brightest minds in the industry, we make an impact for our customers and the communities we serve. Compass Call Aircraft Maintenance Qualification Training Specialist 55329BR EEO Career Site Equal Opportunity Employer. Minorities . females . veterans . individuals with disabilities . sexual orientation . gender identity . gender expression
          

Comment on Rode Hard and Put Away Wet by charles

 Cache   
Any large company is run for the convenience of its employees, that is why most of them go bust eventually. Natural monopolies like railways are even worse because even if the franchise holder pulls out the employees simply join the new capitalist exploiter, I mean conductors and drivers have to come from somewhere and training is expensive. Nationalisation does not work but a decent regulator with a council of ordinary citizens standing over his or her shoulder might help. As you ride about 10,000% further than me I shall say nothing about maintenance, it’s horses for courses, sometimes it’s easier to accept #howmuch in exchange for months of blissful riding. If I can find the time the garlic goes in this week. It always gets rust and I was going to give up but according to GQT if you give them a feed of tomato food it toughens them up and allows them to fight off rust, got to be worth a try.
          

OM Events met l’entreprise en ligne de mire

 Cache   
OM Events met l’entreprise en ligne de mire

Avec 8500 mètres carrés de salon, OM Events compte sur la notoriété du Stade Orange Vélodrome et l’OM pour multiplier les événements, séminaires et autres congrès au service des entreprises de la région

Jeudi 1er octobre, de nombreuses entreprises régionales et quelques 400 invités ont assisté au lancement d’OM Events, nouvelle structure dédiée à l’organisation de séminaires, de conventions et autres événements du monde des entreprises. Depuis le début de l’année, l’OM jouit de l’exploitation du stade et la nouvelle entité a repris la main sur l’évènementiel d’entreprise. L’objectif ? Optimiser les 8500 mètres carrés disponibles et multiplier le nombre de manifestations pour les PME comme pour les grands groupes du territoire. L’offre porte sur les salons et espaces ainsi que sur d’autres plus atypiques. « Il sera possible d’organiser des réunions de travail dans les vestiaires habituellement occupés par les joueurs de l’OM", détaille Benjamin Llanes, directeur de l’activité événementielle et du business BtoB. Jacques-Henri Eyraud, président de l'OM, depuis le salon présidentiel du stade Vélodrome, a mis en avant les ambassadeurs du stade, tel Basile Boli, créateur de lien entre l’entreprise et le sport. Avec plus de 15 millions de fans sur toute la France, l’OM, l’un des clubs les plus populaires de France, entend désormais, après Aréma ancien exploitant, s’imposer comme organisateur d’évènements à l’échelle régionale, aux côtes du parc Chanot, du Palais de Paro et du WTC, les plus importantes structures en place. Le planning se remplit petit à petit. Mais pour l’équipe d’OM Events qui compte 6 personnes et de nombreux prestataires, le projet s’établit sur le long terme. « Les grands congrès se préparent un ou deux ans à l’avance, nous travaillons avec tous les acteurs du secteur, collectivités et hôteliers notamment pour dynamiser nos actions » reprend Benjamin LLanes.

FB

Photo : Le lancement de la nouvelle offre d’OM Events s’est déroulé hier au stade Orange Vélodrome.

 

 


          

Queen's research finds that global activism has helped combat worker exploitation on South African vineyards

 Cache   
Newswise imageA new research study from Queen's University Belfast has examined the changing inspection of labour standards on South African vineyards, arguing that activist pressure on wine global supply chains has added pressure on both private and public regulators to tackle labour exploitation.
          

Alternate Minister of Foreign Affairs Miltiadis Varvitsiotis attends Friends of Cohesion Summit (Prague, 5 November 2019)

 Cache   
A Joint Declaration on maintaining the level of funding for traditional policies, and in particular Cohesion Policy, in the new long-term EU budget was today adopted in Prague by the high-level representatives of the 17 member states participating in the Friends of Cohesion Group. Alternate Minister of Foreign Affairs Miltiadis Varvitsiotis represented the Prime Minister of Greece at the Summit. The Declaration sets out the will of the 17 member states to ensure a strong EU Cohesion Policy and to secure funding for the next programming period. Special emphasis was put on the decisive contribution of the Cohesion Policy to reducing inequalities in the Peripheries, as it has bolstered job creation, infrastructure and competitiveness. In his remarks, the Alternate Minister of Foreign Affairs sent a clear message regarding Greece’s position on the proposed reduction in funding for traditional EU policies. “We are asking Europe to continue to fund policies that change our lives, with infrastructure projects that contribute to growth, so that the poorest regions can converge with the European average,” he stated. Mr. Varvitsiotis noted that the Cohesion Policy and the Common Agricultural Policy initially absorbed about 80% of the EU budget, a percentage that gradually fell to 71% in the context of the current budget. “We believe that the total size of the MFF should come to 1.3% of the GDP of the EU-27, as expressed by the European Parliament, and that spending should be determined according to the spending needs of the EU,” he stressed. Referring to the ten-year crisis suffered by Greece, which saw its GDP fall by 25%, Mr. Varvitsiotis argued that maintaining funding for traditional policies at current levels provides significant “added value” in the lives of citizens. He underscored that the proposed further reduction of the relative share of the budget for both policies in the next MFF will have a negative impact on its effective implementation. “So it is necessary to maintain at least the current level of funding, in real terms, for the cohesion policy and the CAP in order to ensure their effective implementation,” he said on the issue, concluding that “there is a clear need for special provisions for the member states facing serious economic recession. Greece should be exempted from the proposed ceiling of 8% for the increase of cohesion funds in the next MFF.” Finally, at the luncheon following the meeting, Mr. Varvitsiotis once again had the opportunity to highlight the migration issue, stressing that it is not a problem Greece is facing alone, but a problem that concerns the whole Union. Mr. Varvitsiotis noted that Turkey’s exploitation of the migration issue concerns the whole of Europe. “Turkey’s threats to increase migration flows are threats against the whole European Union, and not just against Greece. This is a European problem, not a bilateral problem,” he underscored. Concluding, he said that the Union needs to find ways to return migrants not eligible for asylum to third countries, giving the example of Bangladesh. Specifically, he argued that the European Union is implementing development assistance programmes for various third countries, including Bangladesh, while it should combine these programmes with readmission agreements so that these countries can take back their citizens.
          

Bradford Boy, 10, had 'aspiration' to be a drug dealer

 Cache   
The boy's story was revealed by a charity worker in a presentation on the exploitation of youngsters in Bradford.
          

Achat De Biaxin Sur Internet

 Cache   
Achat De Biaxin Sur Internet Note 4.5 étoiles, basé sur 365 commentaires. Clarithromycin Metabolism J Gastroenterol 94 10: American Achat De Biaxin Sur Internet Association medical statement Evaluation of infiltration néoplasique. Précarité et suspicion, sur-exploitation à vie, racket sur les … Continue reading
          

Disability Royal Commission begins hearings into treatment of students

 Cache   
The Royal Commission into Violence, Abuse, Neglect and Exploitation of People with Disability has begun hearing heartbreaking stories about the treatment of school students.
          

Disability royal commission turns focus to education

 Cache   
The Royal Commission into Violence, Abuse, Neglect and Exploitation of People with Disability opens its first public hearings in Townsville today.
          

Fight inequality, beat poverty

 Cache   
Fight inequality, beat poverty Anonymous (not verified) Fri, 08/23/2019 - 14:25

Did you know that 1% now own more than the rest of us combined? Inequality is growing around the world. Every year, the gap between rich and poor gets even wider.

Such extreme inequality is standing in the way of ending global poverty. It's widening other inequalities like the gap between women and men. Our economy must stop excessively rewarding those at the top and start working for all people.

It doesn’t have to be this way – together we can even things up.

We can challenge the concentration of wealth and power in the hands of the few. We can change the rules on tax to make sure the richest pay their fair share. We can demand more spending on public health and education. We can demand fair wages for everyone. We can make sure the poorest have a voice, and those voices are heard by those in power.

Extreme poverty was halved in just 15 years. We can be the generation that ends it for good.

extreme inequality economic inequality poverty fight poverty richest 1%
The Paraisópolis favela borders the affluent district of Morumbi in São Paulo, Brazil (2008). Photo: Tuca Vieira
The Paraisópolis favela borders the affluent district of Morumbi in São Paulo, Brazil (2008). Photo: Tuca Vieira

Did you know that 1% now own more than the rest of us combined? Every year, the gap between rich and poor gets even wider – standing in the way of ending global poverty. It is time to bring an end to inequality and overcome poverty for good. Join us and take action.

You may also like

          

Facebook-Hating MRC Sets Bozell-Trump Jr. Interview On Facebook Live

 Cache   

It appears all those free dinners with Mark Zuckerberg have paid off for Media Research Center chief Brent Bozell.

As we've documented, the Facebook chief has been sucking up to Bozell and other conservatives who agitate against Facebook by spreading the never-proven narrative that it uniquely discriminates against conservatives by hosting them at off-the-record dinners (which the MRC then had to defend). It seems now that Bozell is sufficiently comfortable with Facebook that he'll use it to his advantage.

The MRC is currently promoting an Nov. 12 interview Bozell will conduct with Donald Trump Jr. that will air on ...  Facebook Live. The promotion links to, yes, Bozell's Facebook page.

It's as if Bozell and the MRC are merely trying to exploit a perceived confict with Facebook for personal and political advantage and that they would never leave the platform -- after all, if Facebook were really as biased as Bozell claims it is, he would never air this interview on it, right?

It's as if Bozell has been completely insincere about this the whole time.


          

Kyle Crutchmer looking to exploit his advantages at Bellator 233

 Cache   

Since turning pro in June of 2018, it had been a pretty hectic first few months of welterweight Kyle Crutchmer’s career.

Following his most recent win this past February, a unanimous decision over Josh Weston at XFN 356, Crutchmer had fought four times since his pro debut, with three finishes in his first four fights.

“It’s been an experience,” Crutchmer told MMAWeekly.com. “I’ve transitioned from wrestling right into MMA. Obviously I use a lot of my wrestling to win those fights.

“I’ve gotten a lot of experience and learned a lot of things about myself that I truly didn’t know. I’ve enjoyed this whole process. I’m ready to get things going at the next level, and continue this road to becoming a world champion.”

Since his win in February, Crutchmer has had some time off, and now with over a year’s experience under his belt he feels like he can accurately gauge where he’s at with his game.

“For me at first it was after the fight (I saw growth), but now that I’ve grown and learned a lot more things in this sport, I can see the progress in training,” said Crutchmer. “I’ve been in a 12-week training camp for this (upcoming) fight with guys that are really high-level and I’ve held my own, so now I know where I stand, and I have a lot more confidence in what I’m able to do.”

On Friday in Thackerville, Okla., Crutchmer (4-0) will look to close out his 2019 undefeated when he takes on Antonio Jones (7-3) in a Bellator 233 welterweight preliminary bout.

TRENDING > Dana White: MMA fans should appreciate that President Donald Trump attended UFC 244

“He’s a big guy,” Crutchmer said of Jones. “He has some experience. I don’t want to share what we’re going to do or anything to do or anything like that, but I think I have enough (advantage) in one category of the fight and I’m going to exploit it and use it to my advantage.

“I’m going to do whatever it takes to win then get back to work.”

When it comes to 2020, Crutchmer is going to approach it as he has his career up to this point and let his team lead the way while he focuses on making sure he is ready for whatever fight comes his way.

“There’s no roadmap, just fight by fight,” said Crutchmer. “I let Bob Cook kind of manage all of that. He tells me when and where, and I get ready for it. I just listen to what my coaches and my management team tells me to do and that’s what we do.”


          

iOS 13.2 trop agressif pour tuer les applications en arrière-plan

 Cache   
iOS 13.2 trop agressif pour tuer les applications en arrière-plan
Nos smartphones étant des machines très puissantes, utiliser plusieurs applications en même temps est devenu tout à fait anodin. Encore faut-il que les systèmes d'exploitation gèrent bien ces applications en arrière-plan. Il semblerait qu'iOS 13.2 soit trop violent.
          

Délégation de service public et indemnité au titre de l’imprévision

 Cache   
Un délégataire chargé d’exploiter une desserte maritime sollicite une indemnité d’imprévision : il n’arrive pas à réduire son déficit d’exploitation, qui se creuse au fil des années. Il reproche à l’autorité concédante d’avoir surestimé le tonnage du fret lors de la passation. Le Conseil d’Etat tranche ce litige en rappelant le régime de l’imprévision.

          

Are Hackers Using Popular Assistant Devices To Listen To Users?

 Cache   
The utility of virtual assistants like Amazon's Alexa and Google Home are undeniable.  They're just genuinely handy devices to have around. Unfortunately, they're also prone to abuse and exploits by hackers and ...
          

Comment on An Itinerary Through Real Jamaica by Don

 Cache   
I am Jamaican by birth and culture but live in US. I thoroughly enjoyed your article and obvious love for Jamaica. I go twice per year usually. You have made some great suggestions which I will exploit. I am sorry that you missed Boston in Portland. Boston is Jerk Central and The Home of Jerk. You will find the absolute best and most authentic Jerk Chicken and Jerk Pork in Boston, Portland. Thanks for a wonderfully informative and enjoyable article.
          

Apprends A Me Servir De Windows 8 Utilisation Exploitation Personnalisation Joel

 Cache   
Apprends A Me Servir De Windows 8 Utilisation Exploitation Personnalisation Joel
          

Rangers v Porto: Steven Gerrard says side deserve Europa League praise

 Cache   
Rangers "deserve some praise" for their Europa League exploits this season, says manager Steven Gerrard as his side look to edge closer to the last 32.
          

Are Hackers Using Popular Assistant Devices To Listen To Users?

 Cache   
The utility of virtual assistants like Amazon's Alexa and Google Home are undeniable.  They're just genuinely handy devices to have around. Unfortunately, they're also prone to abuse and exploits by hackers and ...
          

DIE Blog: Look North: The Arctic Council as an example for the management of transboundary challenges?

 Cache   

Panorama Arctic Region. sunrise with trees in the front

The Arctic, in media coverage, is depicted as a region prone to international conflicts, a “lawless frontier” where “a new Cold War brews” due to the region’s strategic relevance and its estimated resource riches. Recently, a supposed diplomatic spat between Denmark (which is present through Greenland) and the USA hit the news. Most often exaggerations and fears are particularly directed towards Russia’s and China’s involvement in Arctic affairs. Often, this media narrative creates a “polar orientalism”, following a term coined by Edward Said, which describes the distorting description of a region (in Said’s case: the Middle East) by using a lens that focusses on exotic elements rather than communalities. Researchers and policy-makers, on the other hand, often use the term “Global Arctic”, to emphasise the region’s global interconnectedness and emphasise the cooperation among the various stakeholders engaged in Arctic politics.

While similar to other regions, globalisation has an impact on the “complex and deeply interdependent ecological, economic, cultural, political, and societal processes” in the Arctic particularly the rapidly melting sea ice visualizes dramatically that the Arctic is warming at twice the global rate. Due to the relevance of the polar caps for the global climate, not only climate movements such as the “Friday for Future”- and “Extinction Rebellion”- activists emphasise the need to protect the Arctic’s environment for the sake of humanity at large. In this context, the governance of the region stands out: The long-established cooperative-approach chosen by the actors engaged in the Arctic Council, the leading intergovernmental forum and “most important multilateral framework in the region”, is not only unique but has often been evaluated to be a success, as enhancing cooperation and thereby contributing to peace and stability in the region. But what are main drivers behind this success?

Shared narratives in Arctic policies

Already in 1996, when the Arctic Council was established, all actors shared the understanding that circumpolar problems are transboundary in scope and need to be solved collectively. Cooperation between state and non-state actors are seen since as key to address particularly challenges related to “sustainable development” and “environmental protection”. These two thematic pillars also guide the work conducted under the auspices of the council and are often drawn upon in policies adopted by actors with interests in the Arctic. Such national visions for the Arctic region generally acknowledge the legal frameworks and recognise the special role of the countries bordering the Arctic Ocean in the Arctic Council. They illustrate the wide acceptance of the Arctic Council as a central governance setting for the Arctic and empower its main narrative on the need to strengthen international cooperation.

The policies released by non-Arctic actors often relate to environmental and economic concerns to justify strategic interests in the Arctic. China, for example, presents itself as a “near-Arctic state” affected by the “natural conditions of the Arctic and their changes” and “hopes to work with all parties to build a ‘Polar Silk Road’ through developing the Arctic shipping routes”. Germany, for its part, emphasises the “expert knowledge in research and highly developed technology and with regards to environmental standards and sustainable economic development” that it can provide – most recently illustrated by the much-feted MOSAiC expedition. And the European Union relates to the “far-reaching consequences for the region’s role as a regulator of the Earth’s climate” and promotes the “sustainable use of resources and economic development together with people living in the region”. However, instead of denying the participation of non-regional actors in the council to maintain an exclusive say, the Arctic Council followed a different strategy: It decided to enlarge the number of participants and thereby elevated the international standing and legitimacy of the Arctic Council.

Enlargement and joint knowledge production

The enlargement of the Arctic Council can also be seen as a strategy deriving from the “practical need” to manage complex challenges in a changing Arctic, also considering legitimacy. Due to their high scientific quality, particularly the influential flagship reports prepared by the council’s working groups have been perceived as relevant and effective output, giving the council “the reputation of a ‘cognitive forerunner’”. However, preparing these kind of reports requires not only financial but also knowledge resources. In this way, the Arctic Council has cooperated with indigenous peoples’ organizations and researchers from non-regional countries since its establishment and negotiated a legally binding agreement with the purpose of “Enhancing International Arctic Scientific Cooperation” (2016). Also, the other two agreements adopted by the Arctic Council seek to enhance and strengthen cooperation in the contexts of “Aeronautical and Maritime Search and Rescue in the Arctic” (2011) and “Marine Oil Pollution, Preparedness and Response in the Arctic” (2013). Particularly the successful negotiation of binding agreements and the research activities conducted under the auspices of the Arctic Council strengthened its reputation, and (formed as a soft-law forum) these successes “exceeded the expectations of many of those who were present during its inception”.

The Arctic Council: A forum to learn from?

In times during which multilateralism is often perceived as being in crisis and nationalism is on the rise, the Arctic Council seems to be a refreshing governance setting that encourages cooperation and the acceptance of shared responsibilities. In that regard, it serves also as a telling example in discussions on how to improve transnational cooperation to achieve shared goals as defined in visions such as the 2030 Agenda for Sustainable Development and the Paris Climate Agreement: By including actors that share a similar interest and through focusing on high quality knowledge production to guide policy-making. However, while the council’s broad mandate allows various actors to connect with its work, it also gave room for different interpretations, hampering not only the measurement, monitoring and evaluation of the work conducted under its auspices but also the alignment of different approaches. While overall, the Arctic Council may be celebrated as a successful forum for addressing transboundary challenges in a cooperative manner, in times of ever more rapid global changes the Arctic Council needs to improve its process management in that regard to address pertinent issues in a prompt and effective manner.

 

 

Buchcover mit Titel "Critical Geopolitics of the Polar Regions. An Inter-American Perspective"

©DIE

Dorothea Wehrmann is a researcher at the German Development Institute / Deutsches Institut für Entwicklungspolitik (DIE). Her research focuses on different formats of transnational cooperation and in her new book “Critical Geopolitics of the Polar Regions: An Inter-American Perspective” she argues that policy making in the Arctic and Antarctic is strongly entangled with global, national and local politics as the reasoning drawn upon is represented, inspired and reinforced across these levels.

Der Beitrag Look North: The Arctic Council as an example for the management of transboundary challenges? erschien zuerst auf International Development Blog.


          

Aéroports de Paris : service public national !

 Cache   
Le décret n° 2019-572 du 11 juin 2019 portant ouverture de la période de recueil des soutiens apportés à la proposition de loi n° 1867 présentée en application de l'article 11 de la Constitution visant à affirmer le caractère de service public national de l'exploitation des aérodromes de Paris présentée en application de l'article 11 de la Constitution prévoit qu'« à compter du 13 juin 2019 à zéro heure (et) pour une durée de neuf mois », doit avoir lieu le recueil de ces soutiens.
sur : (...) - 3. Droit administratif. Doctrines. Territoires
          

2019-78837 - Stage - Optimisation des Valeurs d'exploitation H/F

 Cache   
Main domain/Job field : Production/Supply chain
Employment type : Internship / Student
Job details :
Enjeu économique importante pour Safran Transmission Systems, le pilotage de nos VEX (Valeurs d'Exploitations = stocks et encours) est un axe important pour la maitrise de nos coûts et la satisfaction de nos clients. La mise en place de nos VEX est la résultante de nos schémas de production, de notre processus de Management de la Supply Chain et de notre politique de stock. L'objectif de ce stage est : - d'industrialiser les outils existants sur le dimensionnement et la projection des VEX sur les 5 ans à venir - de proposer une solution innovente et robuste sur calcul de l'impact sur nos projections de VEX suite à des évolutions du schéma industriel. Vision globale du projet: - Appréhension des processus de la supply chain, du schéma industriels et des produits de Safran Transmission Systems - Définir le macro planning du stage (+ mode de pilotage) - Faire évoluer les outils existants afin a) d'évaluer les stocks objectifs de nos flux industriels b) de faire la projection de nos valeurs d'exploitations - Développer et metter en place un outil de simulation des évolutions du stock suite évolution du schéma industriel - Support aux utilisateurs avec création d'une documentation synthétique Macros taches du projet ; Connaissance des produits Safran Transmission Systems. Compréhention des schémas industriels Appréhension du processus de Management de la Supply Chain. Développer un réseau d'interlocuteur interne (France et Pologne) Construire le planning du projet et réalisation des différentes étapes. Pilotage d'un comité de suivi hebdomadaire du projet. Développement et documentation des outils Implémentation opérationnelle.

Ecole Ingénieur spécialisation en Génie Industriel
City (-ies) : COLOMBES
Minimum education level achieved : Master Degree
Language / Level :
English : Fluent

          

Air France choisira bientôt entre le 787 de Boeing et l'A350 d'Airbus pour remplacer ses A380

 Cache   
Le directeur général du groupe Air France-KLM, Ben Smith, a présenté le 5 novembre son nouveau plan stratégique pour améliorer sa rentabilité. Le renouvellement de sa flotte d'avions en fait partie. "Exploiter une compagnie en France n'est pas facile", a déclaré Ben Smith, le directeur général du groupe […] Lire l'article
          

Amid NSA warning, attacks on Confluence have risen in recent weeks

 Cache   

The National Security Agency’s recent warning about nation-state actors exploiting a vulnerability affecting Confluence wasn’t merely a delayed confirmation of information that the cybersecurity community already had on its radar. It also appears to tip off new exploitation of the vulnerability — hackers have been dramatically stepping up the pace and persistence of their attacks on the popular workplace collaboration software in recent weeks, according to new private sector research obtained by CyberScoop. The attackers are using a vulnerability that Confluence warned about this spring, according to data from Trend Micro’s TippingPoint technology. And while the NSA issued an advisory last week about the bug, it only says nation-state hackers “have exploited” and “could” exploit the vulnerability, not going so far as to say there has been a recent uptick in attacks. New information suggests now that the agency had specific reasons to share the guidance this fall: Starting in late September, just weeks before the NSA made its announcement, hackers began exploiting the vulnerability […]

The post Amid NSA warning, attacks on Confluence have risen in recent weeks appeared first on CyberScoop.


          

Harvard Law School traces its origins to an Antiguan slave owner. Now the country wants reparations. (WaPo)

 Cache   
Harvard Law School must answer.

HLS produces some stellar graduates, like:

  • my finest law professor Robert C. Banks, Jr. (who refused to list his Harvard LL.M. degree on our graduation programs for years, preferring to say only, "J.D., University of Arkansas," on the basis he spent three years at Arkansas and only one year at Harvard);
  • Charles P. Rippey, USDOL Administrative Law Judge, the first judge for whom I clerked;
  • HLS' first African-American Harvard Law Review Editor (Barack Obama).
Neither Memphis Law Professor Bob Banks nor our 44th President Barack Obama have ever been described as snooty -- far from it.

There are many fine HLS graduates who have humbly dedicated their entire careersto public service, like Judge Rippey, and including my boyhood hero, Senate Watergate Committee Chair Sam J. Ervin, Jr. of Morgangon, N.C., who humbly described himself as "just an old country lawyer."

But far too many HLS graduates are snooty corporate thugs, hired knife-throwers, leading meaningless lives of privilege for our oppressors.

HLS has been a tool of wicked evil corporations since its founding by slave owner money.

They are all of a size (extra small), not unlike the two (2) HLS graduates I defeated in Seater v. Southern California Edison. Co., 95-ERA-13.  When one was at the podium during our trial, he asked his estimable colleague for a glass of water; his colleague refused to give it to him.  Senior Special Agent Robert E. Tyndall (Retired EPA, FBI and HUD) was in the courtroom and observed this curious behavior and reported it to me during recess -- obviously, one of the two HLS graduates was "not a 'team player.'"

The fact that slave owners' money started HLS speaks volumes.

Today, slaves have debts, not chains, and our government is owned by the Wall Street Oligarchy of Cosmic Plunderers, whose greed puts the future of our planet at risk.

Due to its blood-stained history, HLS must enact reforms, just as my undergraduate school, Georgetown University, has done.

Fitting reparations might be to provide HLS clinical assistance to Antigua for its people, to help them navigate the legal system, which is too often biased in favor of the wealthy, worldwide.

From The Washington Post:







In this Nov. 19, 2002, photo, students walk through the Harvard Law School area on the campus of Harvard University in Cambridge, Mass.  (Chitose Suzuki/AP)
In this Nov. 19, 2002, photo, students walk through the Harvard Law School area on the campus of Harvard University in Cambridge, Mass. (Chitose Suzuki/AP)
By
November 6, 2019 at 6:08 a.m. EST





In an urgently worded letter recently sent to Harvard, Antigua and Barbuda Prime Minister Gaston Browne demanded that the university pay his country reparations “for the gains Harvard enjoyed at the expense” of Antiguan slaves.
Browne’s Oct. 30 letter to Harvard University President Lawrence Bacow — reported Tuesday night by the Miami Herald and Harvard Crimson — draws a direct line from Harvard Law School’s success today to the oppression of Antiguans enslaved by a Massachusetts-based plantation owner in the Colonial era.





That plantation owner was Isaac Royall Jr. — the wealthy benefactor of Harvard’s very first law professorship in 1815, whose name is still attached to Harvard’s distinguished Royall Professor of Law position today.
“We consider Harvard’s failure to acknowledge its obligations to Antigua and the stain it bears from benefiting from the blood of our people as shocking if not immoral,” Browne wrote.
Browne’s request for reparations comes as numerous universities across the United States, including Harvard, have sought to reckon with their enduring ties to the chattel slavery economy. Last month, Princeton Theological Seminary pledged $27 million in reparations, in the form of scholarships and other initiatives to assist descendants of slaves; in September the Virginia Theological Seminary also created a $1.7 million reparations fund.
Though the university hasn’t committed to reparations, Harvard also has taken steps to extensively research and acknowledge its ties to slavery, particularly related to Royall. Under pressure from students, Harvard Corporation decided in 2016 to retire the Harvard Law School shield, which bore the Royall family coat of arms. And in 2017 the university erected a stone memorial and plaque honoring “the enslaved whose labor created wealth that made possible the founding of Harvard Law School.”
But to Browne, the acknowledgment has not been enough. The university, Browne wrote, has failed to take steps to make more concrete amends with Antigua through reparations. He claimed the university has ignored Antiguan officials’ past requests to begin discussing how reparations could work. He suggested in his letter that Harvard could offer financial assistance to the University of the West Indies campus in Antigua and Barbuda.
“Reparation from Harvard would compensate for its development on the backs of our people,” Browne wrote. “Reparation is not aid; it is not a gift; it is compensation to correct the injustices of the past and restore equity. Harvard should be in the forefront of this effort.”
Harvard spokesman Jason Newton provided Bacow’s Tuesday response letter to Browne. Newton noted Wednesday morning that while Bacow did not respond to a 2018 letter from the Antigua and Barbuda ambassador, a Harvard official did respond to a 2016 letter, which described Harvard’s efforts to confront slavery.
Neither the 2016 letter nor Tuesday’s addresses the core request from Antigua and Barbuda: reparations.
“We recognize that there is more work to be done,” Bacow wrote Tuesday. “Indeed, Harvard is determined to take additional steps to explore this institution’s historical relationship with slavery and the challenging moral questions that arise when confronting past injustices and their legacies."
Bacow did not specify what the additional steps would be. Browne had requested a meeting between representatives from Harvard and Antigua and Barbuda, but in his letter, Bacow does not say whether he would be open to facilitating such a meeting.
The story of the Royall family begins at the turn of the 18th century, when Isaac Royall Sr. sailed to the West Indies and settled on the island of Antigua to make a living in the lucrative, slave-fueled sugar trade. The son of a carpenter, Royall Sr. had few prospects in the British colony of Massachusetts before moving to the island, according to a 2011 report, “Harvard and Slavery: Seeking a Forgotten History.”
But after purchasing stake in a slave ship named the “Mayflower,” Royall Sr. quickly began to amass his wealth, eventually earning enough to start his own sugar cane plantation in Antigua. That’s where his son, Isaac Royall Jr. — the namesake of Harvard’s first professorship — was born in 1719.
The family wouldn’t stay forever. By the 1720s and ’30s, disastrous hurricanes and earthquakes struck the island, drought left many slaves dying of starvation, and disease and infection ― flourishing among slaves performing the backbreaking work of chopping sugar cane — caused countless other Antiguan deaths, according to the 2015 book, “On the Battlefield of Merit: Harvard Law School, the First Century.”
As a result, Royall Sr. began planning his return to Medford, Mass., as early as 1732. He was finally pushed over the edge after the failed 1736 slave revolt, according to the book.
The bloody event, the authors of “On the Battlefield of Merit” say, is part of Harvard Law’s history too.
“The oldest and arguably the most distinguished chair in American legal education is Harvard’s Royall Professorship of Law. … But it is a historical fact that this chair is directly linked to a slave revolt on the Island of Antigua in 1736,” wrote Harvard Law School professor Daniel R. Coquillette and Ohio State University professor Bruce A. Kimball.
To plan the revolt, years in advance, about 2,000 slaves gathered in a forest to prepare to overthrow the white government, the professors reported, citing testimony from an 18th century British inquiry. Slaves in Antigua outnumbered white men four to one in 1723, according to Coquillette and Kimball’s research. But the alleged revolt conspiracy was never carried out. It instead resulted in the brutal executions of 88 enslaved Antiguans — including the Royall family’s head slave, who was burned at the stake, according to the professors.
The Royalls returned to Medford, Mass., in 1737 and brought their Antiguan slaves with them to work their new 540-acre farm. Royall Jr. inherited much of his father’s wealth, at least 18 slaves and land in both Massachusetts and Antigua following his father’s death, according to the “Harvard and Slavery” report. He became a popular statesman in the Massachusetts legislature and in local government — but following the outbreak of the American Revolution, he fled to England, according to “On the Battlefield of Merit.”
In exile, Royall Jr. penned his will in 1778 — in which he awarded the “gift to Harvard College that was to ensure Royall’s lasting fame,” Coquillette and Kimball wrote. He gave the college more than 800 acres of land, which he specified should “be appropriated towards the endowing a Professor of Laws in said Colledge, or a Professor of Physick and Anatomy” — whichever the college thought was best, Royall Jr. wrote.
In 1815, nearly 25 years after the slave owner’s death, Harvard used the proceeds from Royall Jr.'s gift to create the law professorship, establishing the foundation of today’s Harvard Law School.
“The bequest to Harvard came from the proceeds of the plantation in Antigua and from the exploitation and sale of human beings that Royall regarded as chattel,” Browne wrote in his letter. “Professor Janet Halley, on assumption of the Royall Professorship in 2006, was right to acknowledge in her inaugural address that Isaac Royall’s slaves ‘are intrinsically bound, if you will, to the grant that established the Royall Chair.’ ”
Antigua and Barbuda, which celebrated the 38th anniversary of its independence from Britain on Nov. 1, has been working with the Caribbean Reparations Commission for the last several years to make the “moral, ethical and legal case for the payment of reparations by the governments of all the former colonial powers and the relevant institutions of those countries.”
Browne said that Antigua and Barbuda’s ambassador to the United States, Sir Ronald Sanders, wrote to Bacow to press the issue in November 2018. At that time, Sanders pointed out that “the reputation Harvard enjoys internationally is intertwined with the dark legacy of Royall’s Antigua slaves who died in oppression, uncompensated for their lives in slavery and their death in cruelty.” Sanders sought a “genuine effort” from Harvard to begin working toward reparations.
But Sanders received no response, Browne said.


Share

Newsletter in a Mailbox





Headshot of Meagan Flynn
Meagan Flynn is a reporter on The Washington Post's Morning Mix team. She was previously a reporter at the Houston Chronicle and the Houston Press.


          

Care program supervisor takes deal in sex exploitation case

 Cache   
DAVENPORT — A man accused of sex abuse and sexual exploitation while supervising a care program in Davenport has taken a plea deal.

Scott County District Court records say 63-year-old Bruce Enger pleaded guilty Thursday to sexual exploitation by a counselor or therapist. Two counts of sexual abuse will be dismissed in return for his plea. Enger’s sentencing is scheduled for Dec. 20.

The records say the person involved has been a client of REM Iowa for six years. REM Iowa serves adults and children with intellectual and developmental disabilities. Enger’s responsibilities including supervising the residence in which the person lived.


          

Are Your Customers Ready For Digital Transformation?

 Cache   

by Mark Schneider, Y Soft North America

It’s difficult to pick up an industry magazine, view tech websites or attend a conference without hearing about Digital Transformation. The media hype and analyst predictions can leave one feeling behind the curve if not actively engaging with customers on the topic.

The important thing to remember is that most companies are not nearly at the point of true digital transformation. According to IDC’s Digital Transformation (DX) MaturityScape Stage Overview, most companies are still stuck in stage 2. The fifth and final stage is still a long way off for most.

Your customers are still on a journey and many are looking for solutions that help them progress to stage 3. As an MPS provider who makes a living on the printed page, is this a threat or is there opportunity for you?

What is Digital Transformation?

Using IDC’s definition, Digital Transformation (or DX) enables enterprises to drive changes in their business models and ecosystems by leveraging digital competencies. A quick summary of the five stages they’ve identified:

1) Ad-Hoc where paper-centric workflows dominate.

2) Opportunistic where scans are image only capture and connected to ECM or document repositories.

3) Repeatable is intelligent scan capture where content can be extracted, indexed and categorization is automated.

4) Managed which uses third platform technologies (think AI, AR, VR) to support real-time access and use across digital devices.

5) Optimized is the ultimate level where automation crosses all departments and adjacent workflows are triggered through use of innovation accelerators such as IoT, cognitive systems or robotics.

The business outcomes possible under each stage become more and more compelling. But only a small percentage of companies are at the forefront with associated budgets and resources to get past stage 2. By taking more practical steps, you can help them progress to stage 3.

What’s in it for me?

It’s a healthy sign for any industry to evolve and MPS is no different. Today, MPS is evolving to include MCS, Managed Content Services. Living in the paper world gives you insight into your customers’ paper based processes, in other words, stage 1 of digital transformation. And perhaps, some of your customers are scanning documents as image files and storing them in document repositories, stage 2.

According to Gartner1, “The digital imaging and printing equipment, supply and service market is steadily declining… To survive, technology strategic planners of print and imaging providers need to make further inroads into MCS, (Managed Content Services) which optimizes customers' business processes and helps them reduce their dependence on printing and paper. MCS brings mostly new revenue and is a less mature business.”

Stage 3, intelligent scan capture, delivers the value that customers understand and appreciate i.e. cost reduction and faster productivity. Intelligent scan capture offers you a new revenue stream and positions you as a trusted supplier that can help organizations on their digital transformation journey.
Y Soft is helping MPS providers do this every day.

My colleague recently shared tips on what to look for in a document capture solution in a MPSA webinar. The recording is available to members. I’d be happy to chat with you about it. Whether you offer scan workflows as a stand-alone solution or as part of  print management , you will drive value for customers who are looking to MPS providers to help them move up the DX curve.

Be part of the evolution, drive value and increase your revenue! When your customer is ready to move on to stage 4 and 5, ….well we can’t say that AI, AR and VR technologies are ready just yet in the print and imaging industry. But we’re keeping an eye on them.

 1Gartner, January 2017, Exploit Print Market Dynamics Primer 2017, Document # G00318293


          

The New MFP: Designing Hardware for a Services-Driven Market

 Cache   

by Robert Palmer

The continued transition to services is having a profound impact on the design and functionality of office printers and MFPs. In fact, the emphasis on products and the role they play in a managed print environment is changing steadily. Not that long ago, products drove the customer relationship. New features fueled hardware replacement cycles, and vendors constantly pushed technology to deliver “faster, better, and cheaper” products. Hardware vendors focused on specifications such as print speed, resolution, duty cycle, and paper capacity as a way to differentiate from the competition.

In a services engagement, the customer relationship is defined by the supplier’s ability to meet overall business objectives through the structure of a managed services contract. Products remain important, but MPS customers rarely choose their provider based solely on product capabilities. The customer is interested in results defined by cost targets, improved productivity, more efficient business processes, or some combination of all of these elements.

As the transition to MPS continues, there is a risk that office customers could become increasingly indifferent to printing hardware. This creates challenges and opportunities for equipment vendors developing printers and MFPs. The result is a bevy of new products that are designed to work well in a services-led market, while providing new levels of functionality to further exploit the services paradigm. 

Identifying End User Needs

Interestingly, it is the transition to services that is enabling hardware vendors to gain a better understanding of customer needs. Once a printer or MFP is installed under MPS it becomes a managed asset, a device that is consistently and routinely monitored throughout the life of the contract. Part of what allows service providers to evaluate and optimize the print environment is the ability to capture and analyze usage data obtained from devices installed in the fleet. For many OEMs, this data has become a valuable source of end user feedback that can be factored into future product design.

As the number of devices under contract continues to grow, the overall installed base will diversify to provide an even clearer picture of device usage by application and vertical market. The data collected not only shows print volumes and usage rates, it can help vendors determine product needs in areas related to document management, workflow, and printed output. This becomes particularly important when you think about how customers use their MFP with integrated document solutions.

Serviceability is a key area of focus for hardware vendors these days. The last thing that any MPS provider wants is a fleet of unstable devices that require repetitive onsite service calls. Servicing hardware eats directly into MPS profits. Indeed, the perfect MPS product could install itself and then, once in place, never fail, never jam, and never run out of paper or supplies. It is unlikely that we will ever see that type of product, but vendors are clearly exploring options to help limit downtime and reduce the number of service calls for MPS hardware. New workgroup devices feature capabilities such as remote management, early system failure detection and warning systems, even self-healing device capabilities.

The MFP as a Platform

Improved serviceability is predictable, but we are starting to see more revolutionary changes to hardware design. The transition to services turns products into delivery vehicles. As a result, value is tied more closely to the solutions and applications that run on the device rather than the device itself. Sound familiar? Smartphones and tablets are actually fairly simple devices with limited hardware features and functionality. It is the applications that run on these devices that turn them into productivity tools.

Office-printing hardware appears to be marching down a similar path. Early on, this has manifested itself in the way that vendors are now pushing an entire ecosystem or platform, rather than individual products. There is a noticeable move to develop not just products but a “series of products” that all provide the same level of functionality, with a consistent user interface and end user experience. The “product as a platform” approach is basically essential to long-term success in a services model.

Another important element of this transition is the ongoing trend toward smart controllers. A crucial attribute of any services-enabled product is field-upgradability. As new features, software, applications, etc. are rolled out through the ecosystem, the hardware in the field needs to be upgradable to support these features. Constantly updating the brains in the machine helps to extend product life, allowing devices to stay in the fleet longer, which not only improves the service provider’s return on investment but also helps reduce the overall solution delivery cost.

Meanwhile, many MFPs are starting to look and behave less like output devices and more like tools for managing information, with embedded Web browsers, intelligent UIs, and the ability to run both server- and cloud-based applications. This could be very disruptive for OEMs and their channel partners in the effort to further monetize the delivery of various business solutions and services.

Mobility and the transition to mobile workflows is also playing a key role in the design of office hardware. Already, vendors are designing products to support access from mobile devices, not just for printing but also for an entire range of document-based business processes. The evolution of office imaging hardware will be fun to watch as the market continues to shift to a services model.    

Robert Palmer is chief analyst and a managing partner for BPO Media, which publishes The Imaging Channel and Workflow magazines. He is an independent market analyst and industry consultant with more than 25 years experience in the printing industry covering technology and business sectors for prominent market research firms such as Lyra Research and InfoTrends. In December 2012 he formed Palmer Consulting as an independent consultancy focused on transformation, mobility, MPS, and the entire imaging market. Palmer is a popular speaker and presents regularly at industry conferences and trade events in the U.S., Europe, and Japan. He is also active in a variety of imaging industry forums and currently serves on the board of directors for the Managed Print Services Association (MPSA). Contact him at robert@bpomedia.com.


          

11/7/2019: Saracens Scandal: WRAY ASSOCIATE SET UP COMPANY USING NAME OF HARRY KANE

 Cache   
A FORMER business partner of Nigel Wray, who established Saracens’ first player investment vehicle that ultimately led to the club’s record salary cap punishment, has attempted to exploit the commercial value of several England footballers. Sportsmail...
          

D Aventures Les Plus Beaux Exploits De L Annee Patrick

 Cache   
D Aventures Les Plus Beaux Exploits De L Annee Patrick
          

Les aveux d’un promoteur de la théorie du genre

 Cache   

Billet de blogue d’Augustin Hamilton (Campagne Québec-Vie) — Photo : ZuluZulu/Pixabay

Christopher Dummitt, historien de la culture et de la politique, et enseignant à l’Université Trent au Canada, a révélé tout récemment le peu de valeur des arguments qu’il employait pour arguer que le « genre », ou l’identité d’homme ou de femme (ou autre maintenant) d’après cette théorie, n’est déterminé par rien de solide et n’est qu’une « construction sociale ». M. Dummitt a eu une certaine influence, notamment dans le monde universitaire au Canada. M. Dummitt écrit, d’après Le Point :

Si on m’avait dit, voici vingt ans, que la victoire de mon camp allait être aussi décisive dans la bataille idéologique sur le sexe et le genre, j’aurais sauté de joie. À l’époque, je passais de nombreuses soirées à débattre du genre et de l’identité avec d’autres étudiants – voire avec n’importe qui avait la malchance de se trouver en ma compagnie. Je ne cessais de le répéter : « Le sexe n’existe pas. » Je le savais, un point c’est tout. Parce que j’étais historien du genre.

[…]

J’ai terminé mon doctorat en histoire du genre et publié en 2007 mon premier livre sur le sujet, The Manly Modern : Masculinity in Postwar Canada [Modernité virile : la masculinité dans le Canada d’après-guerre]. Mais ne vous fiez pas au titre, il ne s’agit en réalité que de cinq études de cas datant du milieu du XXe siècle, toutes centrées sur Vancouver, où des aspects « masculins » de la société ont pu faire l’objet d’un débat public. Pour mes exemples, j’ai pioché dans la culture automobile, le système pénal, un club d’alpinisme, un terrible accident du travail (l’effondrement d’un pont) et une commission royale sur les anciens combattants. Je n’entrerai pas dans les détails, mais j’ai honte de ma production, surtout en ce qui concerne les deux dernières parties.

J’ai également publié un article tiré de mon mémoire de maîtrise, dont la portée a sans doute été plus large que mes travaux académiques. C’est un article divertissant consacré aux liens entre les hommes et le barbecue dans le Canada des années 1940 et 1950. Publié pour la première fois en 1998, il a été intégré à plusieurs reprises dans des manuels de premier cycle. Bien des étudiants embarqués dans l’étude de l’histoire du Canada ont été obligés de le lire pour en apprendre davantage sur l’histoire du genre et la construction sociale du genre.

Petit problème : j’avais tort. Ou, pour être un peu plus précis : j’avais partiellement raison. Et pour le reste, j’ai globalement tout inventé de A à Z. Je n’étais pas le seul. C’est ce que faisait (et que fait encore) tout le monde. C’est ainsi que fonctionne le champ des études de genre. Je ne cherche pas à me dédouaner. J’aurais dû faire preuve de plus de discernement. Mais, rétrospectivement, je crois que c’était le cas : je ne me bernais pas moi-même. Raison pour laquelle je défendais ma position avec autant de ferveur, de colère et d’assurance. Cela me permettait de camoufler qu’à un niveau très élémentaire j’étais incapable de prouver une bonne partie de mes propos. Intellectuellement, ce n’était pas jojo.

Dans ses révélations, M. Dummitt explique que ses travaux ainsi que ceux de ses semblables sont repris par les autorités pour imposer une nouvelle morale, tandis que le monde universitaire ne s’est pas particulièrement amélioré depuis la jeunesse de M. Dummitt :

Mon raisonnement bancal et d’autres travaux universitaires exploitant une même pensée défectueuse sont aujourd’hui repris par des militants et des gouvernements pour imposer un nouveau code de conduite moral. Lorsque je prenais des verres avec d’autres étudiants et que nous bataillions tous pour la suprématie de nos ego, cela ne portait pas trop à conséquence. Mais les enjeux sont aujourd’hui tout autre. J’aimerais pouvoir dire que ce domaine d’études s’est amélioré — que les règles de la preuve et la validation par les pairs sont plus exigeantes. Sauf que, en réalité, l’acceptation aujourd’hui presque totale du socio-constructivisme dans certains cercles est bien davantage le fruit d’un changement démographique au sein du monde académique, avec des points de vue désormais encore plus hégémoniques qu’ils ne l’étaient à l’époque de mes études supérieures.

Au passage, il faut bien remarquer que l’identité masculine ou féminine dépend de la constitution génétique de la personne, si elle a un corps de femme elle est une femme, si elle a un corps d’homme elle est un homme, le reste, si un homme devait plutôt être plombier et la femme couturière, par exemple, ceci relève d’une part plus ou moins des qualités physiques et psychologiques du sexe, et d’autre part peu ou prou de l’influence de l’histoire, de la société et des circonstances.


          

Algorithm Developer - Journeyman - Dayton, OH

 Cache   
Metronome Program Manager: Magic Man (Matt) Hiring Manager: Maryanne Desired Salary: 120K Max Salary: Negotiable Client Hourly Bill Rate: Negotiable Budget Status: Funded Employment Type: (Full-time) Agency: NGA Program: RECON Program Requirement ID: RECON-OY1-275 Prime: Booze Allen Hamilton Prime Program Manager, Phone and e-mail: Mala McMaster 571 558 1722 Or Prime Staffing Manager, Phone and e-mail: Address: Nasic Dayton- Wright Patterson AFB Shift, Days and Hours: Normal Contract length: 5 years Contract End date: August 2023 Clearance minimum: TS/SCI Desired clearance: TS/ SCI with CI Poly Partners not to recruit from: BAH Any additional information not transcribed within the requisition that the Recruitment Team needs to be aware of?: If candidate only has a TS/SCI they will receive a CI poly upon start. 1-You will see “Negotiable” by the max salary because we have the luxury of sending the candidates true rate upon submittal and negotiating once they are accepted on the program. The desired salary is my estimate of what someone with that skill set and experience will cost based on the location. 2- 3- ---------------------------------------------------------------------------------------------------------------------------- Required Security Clearance: TS/SCI with an ability to get CI poly Required Certifications: N/A Required Education: 4 years of experience and a BA/BS. In place of the degree, may substitute 11 years of relevant work experience. Desired: MA/MS degree. In place of the degree, may substitute 15 years of relevant work experience. Required Experience: see Quals Functional Responsibility: Work as a scientific algorithm developer in a fast–paced research and development team on EO/IR imagery systems addressing image collection, characterization and exploitation problems. Support informational briefings for educating scientists and managers on research outcomes and the impact on the mission. Facilitate technical interaction between two research organizations to promote collaboration and information sharing. Conductive selective analysis in order to gain a deeper understanding of existing R&D processes and procedures. Leverage technical skills applying remote sensing principles and methods to analyze data and solve problems including: characterize existing and new sensor systems, develop new and improve data analysis techniques, propose collection strategies to address new signature development, develop approaches for signal enhancement and clutter suppression. Examples of potential projects include: extract weak signals and identify new signatures from noisy data, object detection and tracking, feature extraction and classification, signal processing, and radiometric analysis. Qualifications: Working experience with Matlab and/or Python scripting, infrared image science, signal processing, EO/IR systems. Ability to learn new concepts and apply them to meet research objectives is required. Able to perform the listed functional responsibilities. Experience is critical. Preferences: Masters Degree Working Conditions: Work is typically based in a busy office environment and subject to frequent interruptions. Business work hours are normally set from Monday through Friday 8:00am to 5:00pm, however some extended or weekend hours may be required. Additional details on the precise hours will be informed to the candidate from the Program Manager/Hiring Manager. Physical Requirements: May be required to lift and carry items weighting up to 25 lbs. Requires intermittent standing, walking, sitting, squatting, stretching and bending throughout the work day. Background Screening/Check/Investigation: Successful Completion of a Background Screening/Check/Investigation will/may’ be required as a condition of hire. Employment Type: Full-time / Exempt Benefits: Metronome offers competitive compensation, a flexible benefits package, career development opportunities that reflect its commitment to creating a diverse and supportive workplace. Benefits include, not all inclusive – Medical, Vision & Dental Insurance, Paid Time-Off & Company Paid Holidays, Personal Development & Learning Opportunities. Other: An Equal Opportunity Employer: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status or disability status. Metronome LLC is committed to providing reasonable accommodations to employees and applicants for employment, to assure that individuals with disabilities enjoy full access to equal employment opportunity (EEO). Metronome LLC shall provide reasonable accommodations for known physical or mental limitations of qualified employees and applicants with disabilities, unless Metronome can demonstrate that a particular accommodation would impose an undue hardship on business operations. Applicants requesting a reasonable accommodation may make a request by contacting us.
          

OPIR Scientist - Journeyman - Springfield, VA

 Cache   
Required Security Clearance: TS/SCI with an ability to get CI poly Required Certifications: N/A Required Education: 4 years of experience and a BA/BS. In place of the degree, may substitute 11 years of relevant work experience. Desired: MA/MS degree. In place of the degree, may substitute 15 years of relevant work experience. Required Experience: see Quals Functional Responsibility: Work as a scientist in a fast–paced research and development team on EO/IR imagery systems addressing image and video collection, characterization and exploitation problems. Apply remote sensing principles and methods to analyze data and solve problems including: automating data analysis using machine learning, characterize existing and new sensor systems, develop new and improve data analysis techniques, propose collection strategies to address new signature development. Support informational briefings for educating scientists and managers on research outcomes and the impact on the mission. Design collection experiments and compare measured results with ground truth data. Examples of potential projects include: extract weak signals and identify new signatures from noisy data, image reconstruction, object detection and tracking, feature extraction and classification, machine learning, signal processing, and radiometric analysis. Qualifications: Working experience with algorithm development, Matlab and/or Python scripting, HPC, image science, signal processing, EO/IR systems. Ability to learn new concepts and apply them to meet research objectives is required. Able to perform the listed functional responsibilities. Experience is critical. Preferences: Masters Degree, but not necessary. Working Conditions: Work is typically based in a busy office environment and subject to frequent interruptions. Business work hours are normally set from Monday through Friday 8:00am to 5:00pm, however some extended or weekend hours may be required. Additional details on the precise hours will be informed to the candidate from the Program Manager/Hiring Manager. Physical Requirements: May be required to lift and carry items weighting up to 25 lbs. Requires intermittent standing, walking, sitting, squatting, stretching and bending throughout the work day. Background Screening/Check/Investigation: Successful Completion of a Background Screening/Check/Investigation will/may’ be required as a condition of hire. Employment Type: Full-time / Exempt Benefits: Metronome offers competitive compensation, a flexible benefits package, career development opportunities that reflect its commitment to creating a diverse and supportive workplace. Benefits include, not all inclusive – Medical, Vision & Dental Insurance, Paid Time-Off & Company Paid Holidays, Personal Development & Learning Opportunities. Other: An Equal Opportunity Employer: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status or disability status. Metronome LLC is committed to providing reasonable accommodations to employees and applicants for employment, to assure that individuals with disabilities enjoy full access to equal employment opportunity (EEO). Metronome LLC shall provide reasonable accommodations for known physical or mental limitations of qualified employees and applicants with disabilities, unless Metronome can demonstrate that a particular accommodation would impose an undue hardship on business operations. Applicants requesting a reasonable accommodation may make a request by contacting us.
          

Information Security Systems Engineer (ISSE) - Springfield, VA

 Cache   
Information Security Systems Engineer (ISSE) to support a large IT contract at its customer location in Springfield, VA. This ISSE role is part of larger team of ISSEs under the contract’s Security Team. Required Security Clearance: TS/SCI Required Certifications: DoD IAT Level II, i.e. Security+CE, CySA+, etc or above. Required Education: HS/GED with 12 years’ experience, Associates with 10 years of experience, Bachelor’s degree and 4+ years of experience; or Master’s degree and 2+ years of experience. Required Experience: Understanding of risk management framework for ICD-503. Experience with the following systems/platforms/tools: XACTA (required); XACTA 360 (preferred); HBSS; ACAS; Nessus. Functional Responsibility: Maintaining the accreditation of the assigned Security Plans to the ICD 503 RMF requirements Ensuring that the architecture and design of DoD information systems are functional and secure. Providing security subject matter expertise at all engineering, change, configuration control and other meetings. Participating in risk assessment during the certification and accreditation process. Provide assessment and authorization (A&A) services in accordance with ICD 503 Risk Management Framework. Collection and review of ACAS scans. Document and recommend mitigation actions Collection and review of STIG scans. Document and recommend mitigation actions Address identified and relevant controls from the IA Requirement Catalog (IRAC) Prepare Test Plan to address identified controls Experience with HBSS and how to create tags, look up equipment, apply tags and export reports Know how to use Tenable Security Center to retrieve reports from the Nessus Manager Support A&A compliance with: Information assurance policies standards and guidelines, Security risk assessments, Continuous monitoring, Continuity planning Develop/maintain security documentation per NGA/IC/DoD/Industry standards and policies Coordinate all A&A initiation and renewal activities working with the NGA Designated Authorization Official (DAO or DAOR) Perform decommission activities as required for assets and Security Plans. Address any Information Assurance or Cybersecurity notices, orders, taskings, or directives as required following the NGA operations vulnerability and patch management process. Attend and participate in weekly vulnerability and risk management meetings Ensure that all services, operational systems, devices and applications are compliant and sustain compliance with the most current Defense Information System Agency (DISA) security technical implementation guides (STIGs), Security Requirement Guides (SRGs), Information Assurance Vulnerability Management (IAVM) requirements, USCYBERCOM Operational Orders (OP ORDs) and approved security updates. Perform security audits and assessments – create of Plan of Action and Milestones (POAMs) Coordinate with System Administrators and others for the remediation of all vulnerabilities and report results. For any open vulnerability, document, obtain approval and status POAMs Update Security CONOPS and Information Technology Disaster Recovery (ITDR) plans for each Security Plan. Participate in the development, implementation, and testing of disaster recovery methods and procedures for the ITDR Plan Conduct technical and administrative STIG/SRG reviews for all CCRI technology areas each quarter Assist in the preparation and deliver of monthly and quarterly Assessment and Compliance Status Reports Provide ad-hoc reporting to assist the Government in assessing readiness of all applicable UFS systems, applications, and devices in response to short notice/no-notice DISA, CCRI, Computer Network Defense – Service Provider (CND-SP), or other directed inspections/audits Support remediation of findings from routine NGA vulnerability scanning, A&A assessments, or inspections with NGA service providers to support USCYBERCOM 21-day remediation requirements. Support rapid patching deployment process and reporting for USCYBERCOM or vendor patches addressing zero-day exploit activities to support a 7-day remediation timeline as directed by the CSOC. Establish plans, procedures and technical measures for UFS design and infrastructure to provide Continuity of Operations Planning (COOP) and off-site backup capabilities in accordance with NGA Directive (NGAD) 3020. Ensure the UFS design and infrastructure meets all COOP and off-site backup requirements in accordance with NGAD 3020 Coordinate and participate with NGA Operation Center and other identified service providers or contracts for any exercises or executions involving UFS. Qualifications: Able to research and evaluate new concepts and processes to improve performance. Analyzes cross-functional problem sets, identifies root causes and resolves issues. Assists more junior level technicians, specialists, and managers in their activities. Can perform all tasks of lower level technicians, specialists, and/or managers. Preferences/Desires: Certification: CISSP, CASP, ITIL NGA experience desired Working Conditions: Work is typically based in a busy office environment and subject to frequent interruptions. Business work hours are normally set from Monday through Friday 8:00am to 5:00pm, however some extended or weekend hours may be required. Additional details on the precise hours will be informed to the candidate from the Program Manager/Hiring Manager. Physical Requirements: May be required to lift and carry items weighting up to 25 lbs. Requires intermittent standing, walking, sitting, squatting, stretching and bending throughout the work day. Background Screening/Check/Investigation: Successful Completion of a Background Screening/Check/Investigation will/may’ be required as a condition of hire. Employment Type: Full-time / Exempt Benefits: Metronome offers competitive compensation, a flexible benefits package, career development opportunities that reflect its commitment to creating a diverse and supportive workplace. Benefits include, not all inclusive – Medical, Vision & Dental Insurance, Paid Time-Off & Company Paid Holidays, Personal Development & Learning Opportunities. Other: An Equal Opportunity Employer: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status or disability status. Metronome LLC is committed to providing reasonable accommodations to employees and applicants for employment, to assure that individuals with disabilities enjoy full access to equal employment opportunity (EEO). Metronome LLC shall provide reasonable accommodations for known physical or mental limitations of qualified employees and applicants with disabilities, unless Metronome can demonstrate that a particular accommodation would impose an undue hardship on business operations. Applicants requesting a reasonable accommodation may make a request by contacting us.
          

STG2020MNDPSI002-3037 - Stage Développement modèle hydrogéologique pour suivi environnementale - Reservoir Engineering H/F

 Cache   
Type de contrat : Stage
Le poste :
Contacts : -          Orano Mining : Anthony Le Beux – anthony.lebeux@orano.group -          Katco : Thomas Oppeneau – thomas.oppeneau@orano.group Contexte : Orano Mining, par l’intermédiaire de sa filiale KATCO, exploite sur le territoire du Kazakhstan un gisement d’uranium par récupération In Situ (ISR). L’exploitation minière du gisement est réalisée par injection dans le réservoir d’une solution lixiviante, puis par pompage d’une solution enrichie en uranium. L’extraction de l’uranium des jus de production est effectuée sur deux usines. C’est un système de production en boucle fermée puisque les jus de production en sortie d’usine servent de solution lixiviante. Le Département Optimisation au sein de la Direction de l’Extraction Minière (DEM) de KATCO est responsable du suivi environnemental du processus ISR, du suivi des opérations de RVR sur le champ et de puit et des études de réservoir engineering. Cela comprend notamment : 1.      Relevés piézométriques avec suivi des analyses chimiques pour l’évaluation de potentielle contamination. 2.      Optimisation, planification des opérations de RVR avec des unités de traitement chimiques ou physiques pour la réanimation des débits pour les forages 3.      Utilisation de modélisation hydrodynamique pour la compréhension des phénomènes de lixiviation dans le réservoir et implantation de nouveaux forages pour accélérer le processus de lixiviation. Travail : L’objectif du stage est de développer un modèle géologique et hydrodynamique du réservoir Kanjugan situé sur le permis minier de Muyumkum en cours d’exploitation. Ce modèle sera ensuite utilisé, avec l’aide de l’équipe d’hydrogéologues pour une évaluation préliminaire de l’impact environnemental sur la nappe aquifère par l’exploitation par ISR. D’autre part, les résultats devront être mis en forme pour créer le support à un rapport annuel à fournir aux autorités légales du Kazakhstan. Le stage se déroulera en 5 phases : ·       Construction et validation du modèle géologique du réservoir Kanjugan en collaboration avec le service Géologie ; ·       Synthèse des données hydrogéologiques et élaboration du modèle de distribution des paramètres hydrodynamiques ; ·       Import des données de production et du réseau d’observation environnementale du réservoir ; ·       Modélisation du processus ISR (productions) sur l’ensemble de la vie du gisement ; ·       Comparaison entre données simulées et observations. Pratique : Le stage se déroule sur une période de 6 mois principalement sur le site de production au Kazakhstan, au sein du Département Infrastructure de KATCO, et en suivant un planning de missions de 3 à 5 semaines sur le site. Les résultats du stage seront présentés à la direction Orano et KATCO. Le site est soumis à une enquête administrative.

Contacts : -          Orano Mining : Anthony Le Beux – anthony.lebeux@orano.group -          Katco : Thomas Oppeneau – thomas.oppeneau@orano.group Contexte : Orano Mining, par l’intermédiaire de sa filiale KATCO, exploite sur le territoire du Kazakhstan un gisement d’uranium par récupération In Situ (ISR). L’exploitation minière du gisement est réalisée par injection dans le réservoir d’une solution lixiviante, puis par pompage d’une solution enrichie en uranium. L’extraction de l’uranium des jus de production est effectuée sur deux usines. C’est un système de production en boucle fermée puisque les jus de production en sortie d’usine servent de solution lixiviante. Le Département Optimisation au sein de la Direction de l’Extraction Minière (DEM) de KATCO est responsable du suivi environnemental du processus ISR, du suivi des opérations de RVR sur le champ et de puit et des études de réservoir engineering. Cela comprend notamment : 1.      Relevés piézométriques avec suivi des analyses chimiques pour l’évaluation de potentielle contamination. 2.      Optimisation, planification des opérations de RVR avec des unités de traitement chimiques ou physiques pour la réanimation des débits pour les forages 3.      Utilisation de modélisation hydrodynamique pour la compréhension des phénomènes de lixiviation dans le réservoir et implantation de nouveaux forages pour accélérer le processus de lixiviation. Travail : L’objectif du stage est de développer un modèle géologique et hydrodynamique du réservoir Kanjugan situé sur le permis minier de Muyumkum en cours d’exploitation. Ce modèle sera ensuite utilisé, avec l’aide de l’équipe d’hydrogéologues pour une évaluation préliminaire de l’impact environnemental sur la nappe aquifère par l’exploitation par ISR. D’autre part, les résultats devront être mis en forme pour créer le support à un rapport annuel à fournir aux autorités légales du Kazakhstan. Le stage se déroulera en 5 phases : ·       Construction et validation du modèle géologique du réservoir Kanjugan en collaboration avec le service Géologie ; ·       Synthèse des données hydrogéologiques et élaboration du modèle de distribution des paramètres hydrodynamiques ; ·       Import des données de production et du réseau d’observation environnementale du réservoir ; ·       Modélisation du processus ISR (productions) sur l’ensemble de la vie du gisement ; ·       Comparaison entre données simulées et observations. Pratique : Le stage se déroule sur une période de 6 mois principalement sur le site de production au Kazakhstan, au sein du Département Infrastructure de KATCO, et en suivant un planning de missions de 3 à 5 semaines sur le site. Les résultats du stage seront présentés à la direction Orano et KATCO. Le site est soumis à une enquête administrative.
Ville : Chatillon

          

Les bonnes radios du web (MàJ août 2017)

 Cache   
[ ; RTBf ; Radio France ; RSR ; ]
Si vous affichez cette page au moyen d'un navigateur capable de traiter (ou de déléguer via un pluguine) les données audio, vous pouvez exploiter les liens ci-dessous d'un simple clic. Vous pouvez aussi les transférer à votre récepteur “web radio” ou à votre logiciel de lecture audio (par exemple Winamp, Screamer Radio, Foobar), ou les ajouter à vos marque-pages (via le clic droit de votre souris). [([ ; Pétition pour le rétablissement de France Inter en grandes ondes
Il (…) - 2b. Radio / ,
          

BINDER: computationally inferring a gene regulatory network for Mycobacterium abscessus

 Cache   
Abstract: Background: Although many of the genic features in Mycobacterium abscessus have been fully validated, a comprehensive understanding of the regulatory elements remains lacking. Moreover, there is little understanding of how the organism regulates its transcriptomic profile, enabling cells to survive in hostile environments. Here, to computationally infer the gene regulatory network for Mycobacterium abscessus we propose a novel statistical computational modelling approach: BayesIan gene regulatory Networks inferreD via gene coExpression and compaRative genomics (BINDER). In tandem with derived experimental coexpression data, the property of genomic conservation is exploited to probabilistically infer a gene regulatory network in Mycobacterium abscessus.Inference on regulatory interactions is conducted by combining ‘primary’ and ‘auxiliary’ data strata. The data forming the primary and auxiliary strata are derived from RNA-seq experiments and sequence information in the primary organism Mycobacterium abscessus as well as ChIP-seq data extracted from a related proxy organism Mycobacterium tuberculosis. The primary and auxiliary data are combined in a hierarchical Bayesian framework, informing the apposite bivariate likelihood function and prior distributions respectively. The inferred relationships provide insight to regulon groupings in Mycobacterium abscessus. Results: We implement BINDER on data relating to a collection of 167,280 regulator-target pairs resulting in the identification of 54 regulator-target pairs, across 5 transcription factors, for which there is strong probability of regulatory interaction. Conclusions: The inferred regulatory interactions provide insight to, and a valuable resource for further studies of, transcriptional control in Mycobacterium abscessus, and in the family of Mycobacteriaceae more generally. Further, the developed BINDER framework has broad applicability, useable in settings where computational inference of a gene regulatory network requires integration of data sources derived from both the primary organism of interest and from related proxy organisms. Title: BINDER: computationally inferring a gene regulatory network for Mycobacterium abscessus
          

Vast Dragnet Targets Theft of Biomedical Secrets For China

 Cache   
schwit1 shares a report from The New York Times: The N.I.H. and the F.B.I. have begun a vast effort to root out scientists who they say are stealing biomedical research for other countries from institutions across the United States. Almost all of the incidents they uncovered and that are under investigation involve scientists of Chinese descent, including naturalized American citizens, allegedly stealing for China. Seventy-one institutions, including many of the most prestigious medical schools in the United States, are now investigating 180 individual cases involving potential theft of intellectual property. The cases began after the N.I.H., prompted by information provided by the F.B.I., sent 18,000 letters last year urging administrators who oversee government grants to be vigilant. So far, the N.I.H. has referred 24 cases in which there may be evidence of criminal activity to the inspector general's office of the Department of Health and Human Services, which may turn over the cases for criminal prosecution. The investigations have fanned fears that China is exploiting the relative openness of the American scientific system to engage in wholesale economic espionage. At the same time, the scale of the dragnet has sent a tremor through the ranks of biomedical researchers, some of whom say ethnic Chinese scientists are being unfairly targeted for scrutiny as Washington's geopolitical competition with Beijing intensifies. The alleged theft involves not military secrets, but scientific ideas, designs, devices, data and methods that may lead to profitable new treatments or diagnostic tools. Some researchers under investigation have obtained patents in China on work funded by the United States government and owned by American institutions, the N.I.H. said. Others are suspected of setting up labs in China that secretly duplicated American research, according to government officials and university administrators. [...] [R]oughly a dozen scientists are known to have resigned or been fired from universities and research centers across the United States so far. Some have declined to discuss the allegations against them; others have denied any wrongdoing. In several cases, scientists supported by the N.I.H. or other federal agencies are accused of accepting funding from the Chinese government in violation of N.I.H. rules. Some have said that they did not know the arrangements had to be disclosed or were forbidden.

Read more of this story at Slashdot.


          

Expand or Cut the Cake (Creating Value)

 Cache   

I've been trying to write a post on value creation and rent capture for a couple weeks now. My words weren't coming together the way I wanted and while researching I stumbled upon Yishan Wong's Quora answer to the question "What does it mean to create value?" He captures exactly the point I wanted to make, so I scrapped my writing and here is Yishan's full response:

What does it mean to create value?

It means making something out of nothing using human effort and ingenuity.

"Creating value" is a very important concept that for years I thought was just a business buzzword, but it captures a very important distinction from doing other things that make money, as making money is a big thing in our world, and for better or worse it's often the source of a lot of grief, joy, and politics. 

Creating value is something that people inherently understand from a young age, but then later forget.  For instance, a five-year-old will make a birthday card for you out of construction paper.  This is creation of value.  When we get older, many people forget this and start to think that such shoddy handmade things are worthless, that the only value is in things we pay money for, e.g. a store-bought card or gift.  But the five-year-old has no money, and no choice but to create something of value out of nothing but the application of her effort and ingenuity upon raw materials.  Money simply represents this value creation - the five-year-old could sell the card for money.  Likewise, money you use to buy a store-bought card came from real value you created by doing your job, which likely required your own effort and/or ingenuity.

There's another way to generate money, which is rent capture (see:http://en.wikipedia.org/wiki/Ren...).  This is a money-making method that does not create new value, but rather exploits a property of the environment (physical, social, or economic) in order to incur favorable transactions.  The easiest example of this is forcibly taking over a piece of unowned land or open road and charging others a toll to use it.  No new value is created, but the ability to charge "rent" is captured.  Keep in mind thatcharging rent is not necessarily rent capture - if you build an apartment complex and rent out its units, you have created an item of value and are merely charging for it, i.e. making money exchanging something of value you created.  Rent capture refers to charging money for usage (or relief from) a facet of the pre-existing environment you have exploited.  There are complicated philosophical issues around whether the unilateral acquisition of unowned-but-finite environmental resources and their place in value-creation, but I still skip those.

Either way, the phrase "creating value" is typically used to designate activities which make money but which are not rent-capturing, i.e. new value is created through either mutually beneficial exchange transactions or producing something valuable out of raw materials through human effort and/or ingenuity.  "Enlightened" capitalists or businessmen often use this term to designate "positive" business activities that make money because they apply the effort of human beings towards creating new value, versus other activities that generate money but not value.  This distinction is significant because many metrics of business success are measured by numbers on financial statements, which are nominally blind as to whether increases in money flow are value-creating or not.

Basically, there are two ways to make money:

1) Create new value and capture x percent of the new value created. (creating value)
2) Capture rent on an already existing asset. (rent capture)

The first form is the one that moves everybody forward. I think it is altogether too easy to forget that new value can be created. While accumulating wealth, you are not necessarily taking money from others. If you create new value for society that did not exist before, you have created new wealth and are entitled to capture a sustainable portion of that newly created value.

Source: 

https://www.quora.com/What-does-it-mean-to-create-value


          

A Robinhood Exploit Let Redditors Bet Infinite Money on the Stock Market

 Cache   
This ONE illegal trick let redditors blow their savings in minutes!
          

STG2020MNDPSI003-3038 - Stage Développement d'outils management visuel de l'activité Infrastructure de puits sur mine H/F

 Cache   
Type de contrat : Stage
Le poste :
Contacts -          Orano Mining (projet ISR) : Anthony Le Beux – anthony.lebeux@orano.group -          Katco : Thomas Oppeneau – thomas.oppeneau@orano.group Contexte Orano Mining, par l’intermédiaire de sa filiale KATCO, exploite sur le territoire du Kazakhstan un gisement d’uranium par récupération In Situ (ISR). L’exploitation minière du gisement est réalisée par injection dans le réservoir d’une solution lixiviante, puis par pompage d’une solution enrichie en uranium. L’extraction de l’uranium des jus de production est effectuée sur deux usines. C’est un système de production en boucle fermée puisque les jus de production en sortie d’usine servent de solution lixiviante. Le Département Infrastructure au sein de la Direction de l’Extraction Minière (DEM) de KATCO est responsable de la construction, du déploiement et de l’opération des toutes les infrastructures reliant l’usine et le champ de puits. Cela comprend notamment : 1.      les unités de préparation des solutions lixiviantes, nœud clé du champ de puits permettant de réguler l’acidité de la solution injectée et de contrôler les débits des puits d’injection et de production ; 2.      les lignes secondaires reliant les unités de préparation des solutions lixiviantes aux collecteurs principaux connectés aux usines ; 3.      les tertiaires reliant les unités de préparation des solutions lixiviantes aux puits ; 4.      les équipements des puits injecteurs et producteurs (pompes…). La mise en place récente d’une nouvelle base de données de type « data historian » pour les données de production permet aujourd’hui d’envisager de nouveaux développements pour améliorer l’efficacité des activités du Département Infrastructures. Travail L’objectif du stage est de comprendre l’ensemble des processus liés à l’activité du Département Infrastructure, enrichir les data flow associés à la base de données interactive et intégrée avec des liaisons vers d’autres bases de données (ex. Acquire avec la Directions Géosciences, SAP pour la logistique). L’objectif du stage sera de développer des outils simples et efficaces pour le management visuel des étapes de construction d’un bloc technologique : gestion des moyens humains, des stocks de matériel et des engins. Les outils à développer et/ou implémenter devront permettre : ·       la gestion du stock de matériel (pompes submersibles de puits, pompe acide, débitmètres, etc.) ; ·       le suivi des matériels sur le champ de puits (recyclage, maintenance, rebus) ; ·       la planification puis l’optimisation du temps de construction d’un bloc technologique grâce à : o   l’optimisation de la ressource humaine, o   l’optimisation de la ressource engins. Les outils développés seront intégrés dans les bases de données pour le traitement statistiques et l’évaluation de la performance opérationnelle.   Pratique Le stage se déroule sur une période de 6 mois principalement sur le site de production au Kazakhstan.

Contacts -          Orano Mining (projet ISR) : Anthony Le Beux – anthony.lebeux@orano.group -          Katco : Thomas Oppeneau – thomas.oppeneau@orano.group Contexte Orano Mining, par l’intermédiaire de sa filiale KATCO, exploite sur le territoire du Kazakhstan un gisement d’uranium par récupération In Situ (ISR). L’exploitation minière du gisement est réalisée par injection dans le réservoir d’une solution lixiviante, puis par pompage d’une solution enrichie en uranium. L’extraction de l’uranium des jus de production est effectuée sur deux usines. C’est un système de production en boucle fermée puisque les jus de production en sortie d’usine servent de solution lixiviante. Le Département Infrastructure au sein de la Direction de l’Extraction Minière (DEM) de KATCO est responsable de la construction, du déploiement et de l’opération des toutes les infrastructures reliant l’usine et le champ de puits. Cela comprend notamment : 1.      les unités de préparation des solutions lixiviantes, nœud clé du champ de puits permettant de réguler l’acidité de la solution injectée et de contrôler les débits des puits d’injection et de production ; 2.      les lignes secondaires reliant les unités de préparation des solutions lixiviantes aux collecteurs principaux connectés aux usines ; 3.      les tertiaires reliant les unités de préparation des solutions lixiviantes aux puits ; 4.      les équipements des puits injecteurs et producteurs (pompes…). La mise en place récente d’une nouvelle base de données de type « data historian » pour les données de production permet aujourd’hui d’envisager de nouveaux développements pour améliorer l’efficacité des activités du Département Infrastructures. Travail L’objectif du stage est de comprendre l’ensemble des processus liés à l’activité du Département Infrastructure, enrichir les data flow associés à la base de données interactive et intégrée avec des liaisons vers d’autres bases de données (ex. Acquire avec la Directions Géosciences, SAP pour la logistique). L’objectif du stage sera de développer des outils simples et efficaces pour le management visuel des étapes de construction d’un bloc technologique : gestion des moyens humains, des stocks de matériel et des engins. Les outils à développer et/ou implémenter devront permettre : ·       la gestion du stock de matériel (pompes submersibles de puits, pompe acide, débitmètres, etc.) ; ·       le suivi des matériels sur le champ de puits (recyclage, maintenance, rebus) ; ·       la planification puis l’optimisation du temps de construction d’un bloc technologique grâce à : o   l’optimisation de la ressource humaine, o   l’optimisation de la ressource engins. Les outils développés seront intégrés dans les bases de données pour le traitement statistiques et l’évaluation de la performance opérationnelle. Pratique Le stage se déroule sur une période de 6 mois principalement sur le site de production au Kazakhstan.
Ville : Chatillon

          

Die Internationalen „Daily Prevention News“ des Deutschen Präventionstages im Oktober 2019

 Cache   

Nachfolgend finden sich die Links zu den im Vormonat veröffentlichten DAILY PREVENTION NEWS in englischer Sprache:

31.10.: UNODC's Safety Governance Approach

30.10.: Africa needs a continental strategy on foreign terrorist fighters

29.10.: Call for Projects: Terrorism, Extremism and Online Radicalisation

28.10.: How to Talk to Your Children About Bullying

27.10.: OECD Study: Tackling obesity would boost economic and social well-being

26.10.: Dirty Data, Bad Predictions: How Civil Rights Violations Impact Police Data, Predictive Policing Systems, and Justice

25.10.: What works to prevent violence against women and girls in conflict and humanitarian crisis: Synthesis Brief

24.10.: Tracking Fear - Measuring Safety Perceptions in Saskatoon

23.10.: Refugees Welcome? Regional Heterogeneity of Anti-Foreigner Hate Crimes in Germany

22.10.: GREASE Country Reports and Profiles: Religious Diversity Governance

21.10.: Can soldiers solve Brazil’s crime problem?

20.10.: Health in prisons: WHO fact sheets for 38 European countries

19.10.: 2019 Open Call: Technologies to prevent and combat online child sexual exploitation and abuse

18.10.: 18th Shell Youth Study Germany

17.10.: #PreventHumanTrafficking

16.10.: What can we learn from the online response to the Halle terrorist attack?

15.10.: Study suggests that many conflicts could be avoided with more deliberation

14.10.: #MeToo Bangladesh: The Textile Workers Uniting Against Harassment

13.10.: Commit a crime? Loved ones got your back

12.10.: Using Engineer-Developed Models to Disrupt Human Trafficking

11.10.: What is driving sub-Saharan Africa’s rapid rise in drug use?

10.10.: Interactive map of projects, studies, policies and institutions aiming to tackle violent extremism and polarisation

09.10.: Not every school’s anti-bullying program works – some may actually make bullying worse

08.10.: An innovative strategy to reduce gun violence: beautify Chicago neighborhoods

07.10.: Polarisation – a complex challenge for local authorities

06.10.: Web-based Injury Statistics Query and Reporting System

05.10.: How to map violence without police data

04.10.: Child Friendly Cities Summit

03.10.: If you want to cut bullying in schools, look at the ‘invisible violence’ in our society

02.10.: The Neuroscience of Terrorism: How We Convinced a Group of Radicals to Let Us Scan Their Brains

01.10.: 6th Global Conference on Violence Against Women - SVRI Forum 2019

...
          

Managing Attorney, Civil | Chicago Alliance Against Sexual Exploitation

 Cache   
Chicago, Illinois, Education and Experience Applicants must have a Juris Doctorate, admission to the Illinois Bar in good standing, and a minimum of six years of direct legal experience.  Qualifications The ideal
          

Comment by "ben sampson" on The Talk: Nonblack Version, by John Derbyshire

 Cache   
Black people scary to a white man? hahahahaha. the world is really changing and the white man has lost it. who has been the scourge of the planet for 500 years..not Black people but white..the scariest, most psychotic MF who ever roamed the earth? and he is calling Black people scary now? incredible! the man has lost his memory. and he really thinks that he is exceptional..that he can do as he wishes for centuries on the planet without any equal and opposite reactions that catches up with him at some point sweet! the white man created the entire suicidal mess that is america, with a global reach that will surely take the human species down with it. the white capitalist man has not stopped. he has simply stopped taking care of ordinary white people because he thinks he does not need then anymore as he used to. now our old white man here whom the system no longer needs, has used up, is crying bawling with nothing and and one to turn to, wrapped up in his old white propaganda and resulting insane exceptionalism that he cant eat or use to defend himself against his former victims. and no white cavalry is riding up to save him oh how silly it is. you all made some Black people into animals...the intention was to make all Black people into animals but we are sturdier than that. but Black animals and low IQ are the results of centuries of white exploitation and utter emotional devastation of American Black people. a whole lot of us are still broken and will be for some time until massive correction is undertaken but it is white ordinary people who are in trouble..tossed by the system and totally unprepared for a world in which they are equal and that no one cares..least of all the white system, deep state etc. their plans long past ordinary white people and systematic racism. it was never about racism but about social control. now that social control is achieved in other ways the capitalist do not need systematic racism no more. He wont clean it up..he just does not need it and have left the mess t on the ground for the victims to deal with..which includes white ordinary people isn't it sweet! this is a stupid thread.. low level discussion. no matter what the society involved there is always the TALK for parents to do with their children, to give the their best survival chances. that was always the case and will always be a need in society..the job or parents to teach and guide their children. we can and must and do take that for granted. the fact that Derbyshire has turned it into racist nonsense is more of the same propaganda that keeps the people misdirected, inaccurately focused and led to slaughter. this issue here is not the problem in the USA at all, at all the question is how to solve the mess that is America..that is the problem..before it kills us all. and for that to take place the capitalists must be removed from power and capitalism revolutionized. that's it. Derbyshire and his pal Kesey are fiddling while Rome burns..calling people to dance rather than how to get water to douse the fire
          

What You Need to Do About Propane Chemistry Before It Is Too Late

 Cache   
Ruthless Propane Chemistry Strategies Exploited Even a standard automobile tire can explode if it’s highly overinflated. There is a particular case of explosion referred to as a vapor cloud explosion that could occur every time a fuel (like ordinary research paper writer propane) is mixed with the atmosphere. In turn the sum of vapor pressure... Read more
          

Présentation

 Cache   
La cellule imagerie et instrumentation a en charge le développement de nouvelles techniques et nouveaux instruments au sein de l'association.
Elle a également pour rôle d'exploiter le matériel d'imagerie et former les autres membres d'Astrièves sur ces technologies. - Imagerie & Instrumentation
          

Martin Johnson expects England to come back stronger after World Cup exploits

 Cache   
The former lock says the best remedy after a painful World Cup defeat is getting together and winning again.
          

Engie: résultats en hausse sur neuf mois, objectifs confirmés

 Cache   

Engie a annoncé jeudi des résultats en hausse sur neuf mois, portés notamment par une meilleure disponibilité des centrales nucléaires en Belgique, et a confirmé ses objectifs pour l’année. Son Ebitda (excédent brut d’exploitation) a progressé de 4,9% à 7,1 milliards d’euros. Le résultat opérationnel courant a pour sa part bondi de 9% à 3,8 …

L’article Engie: résultats en hausse sur neuf mois, objectifs confirmés est apparu en premier sur Le Monde de l'Energie.