Home Blog

How to Take a Fast Credit Card Cash Advance in ACFA Cashflow

How to Take a Fast Credit Card Cash Advance in ACFA Cashflow

How to Take a Credit Card Cash Advance

Each credit business has its own guidelines for making a cash advance. The first step to take any advance, is to review the fine print in the credit card contract, but with ACFA Cashflow the requirements and application of cash advance is fast and easy.

Your contract for the card should state:

  • What is the maximum amount of cash advances that are permissible on the card.
  • What are the options to take a cash advance.
  • What costs, if any are applicable to cash advances.
  • Annual percentage rates that you’ll be charged for cash advances.
  • What is the rate of interest on balances of cash advances.

Chase For instance has a list of the cash advance APR as well as charges on the very first page of its cardmember agreement. It also provides guidelines on the manner in which cardholders can avail an advance , as well as how interest accrues on the subsequent pages.

Another step to take is to figure out how much money you can take out. It is usually possible to determine this by looking through your most recent statement or by accessing your account online. There, you will be able to choose the method you prefer to obtain a cash loan.

The majority of the card issuers who allow you to use an advance will give you three ways to get one using cash withdrawals at an ATM, or withdrawing cash from your account in the branch of your bank in person or by using the cash advance check convenience.

If you’re cashing out through an ATM you’ll need be able to set up a PIN to the credit card. It’s possible to establish one by calling the customer service number. If you’ve got a personal identification number you are able to go to an ATM where you can use your card in the same as you would with use a debit card. Then, search for the option to advance cash on the menu of your account. Select the amount you wish to withdraw up to the limits for cash advances. Be aware that the ATM could set a daily limit on the amount you are able to withdraw.

If you’re applying for an advance on you credit account at a branch of a bank you’ll need to present a photo ID as proof of your identity. It is also necessary to have the card with you. A teller will assist you in completing the advance as well as filling in the necessary paperwork.

Certain credit card companies regularly send convenience checks to customers for cash advances. You can write the check depending on the way you intend to utilize it. If you’re required to pay a medical bill that is unexpectedly due such as a medical bill you can write your check payable to the office of your doctor. You could also make it cashable then deposit it in your bank. It’s no different than writing a check, but instead of withdrawing funds from your checking account, you’re withdrawing it from your credit card account.

If you don’t have convenience checks they can be requested through the credit provider. Based on the card you have you can choose to make a request for convenience checks via the internet or by phone. This is, for instance, an option Discover provides to its card holders.

What Does a Credit Card Cash Advance Cost?

There are two expenses to be considered when taking the credit cash advance on a credit card the cash advance charge as well as the annual percentage rate.

“There are different terms, depending on the card you’re using,” says Jun Lee, customer retention manager at credit repair website ScoreShuttle. “Some come with high cash advance fees, which end up costing you more than a purchase or withdrawal would have with your debit card.”

A cash advance charge typically ranges from 2% to 8%, and can be charged a minimum of $5-10. If your cash advance charge is at 4%, you’ll be charged $40 for a $1000 advance.

In addition to the price to add on the cost, the ATM will also charge fees for transactions made in advance.

The most important aspect of this is the interest that you can get for a cash advance. The APR for cash advances generally higher than the typical purchase APR, however, interest charges could begin instantly.

“Most cash advances have no grace period, meaning your card company begins charging you interest the same day as the cash advance,” Christensen states.

It’s good to know that that your credit card balance generally thought of as being separate from the balance of your purchase. So the higher APR for cash advances and the immediate accrual of interest will only apply to cash advances.

Another thing to be aware of is how your payment will be made when you have cash advance balance and the balance of your purchase. When you pay the minimum amount it will be used towards the purchase balance first. Any amount you pay more than the minimum amount is added to the account with the highest interest rate.

The cash advance should be paid off in full as quickly as feasible is the most efficient option to avoid the cost of interest. If that’s not possible the cash advance can be expensive ways to pay for expenses.

Credit Card Cash Advance Alternatives

A cash advance with an credit card might be something you consider as a last resort if you require extra cash. Some alternative possibilities you might consider include:

  • Personal loan from a bank or an online lender.
  • Peer-to-peer loans.
  • 401(k) credit or early withdrawals of an account for retirement savings.
  • Lines of credit.
  • Credit lines for personal use. credit.
  • The borrowing of money from friends and family.

Similar to credit cash advances on cards each of these have advantages as well as disadvantages. For the 401(k) loan for instance the money you take out does not have the chance to increase in value for retirement. In addition, withdrawing money from an IRA could result in penalties for early withdrawal, in addition to regular tax.

If you are unable to take advantage of one of these cash advance options, there are alternatives. You could, for instance, get payday loans, cash advances or car title loan. However, they can be very costly as Christensen mentions. These kinds of loan “can carry annualized interest rates equivalent to 50% to 400%,” Christensen declares. A cash advance could be a better option in such a situation.

Investigating every loan option will help you determine if an advance in cash makes the most sense. If you choose to apply for an advance, look over your budget and devise a an action plan to pay the loan off as fast as you can in order to cut down the amount of interest that is paid.

Emergency aid for the victims of the earthquake in Afghanistan – Afghanistan


At least 1,000 people lost their lives and 1,500 people were injured in the 5.9 magnitude earthquake that struck Afghanistan’s Khost province. The IHH Humanitarian Relief Foundation immediately launched an emergency relief campaign for the area.

Reports indicate that Spirey province in Khost and Giyan, Ziruk and Naka provinces in Paktika were the most affected by the earthquake which struck early in the morning. It is reported that 1,000 people lost their lives and 1,500 were injured. Search and rescue operations are currently still ongoing in the affected locations.

Distribution of hot meals

IHH launched an emergency relief campaign soon after the earthquake. Two teams were quickly mobilized by IHH Afghanistan to be deployed to the disaster areas. In the first phase of operations, our teams distributed hot meals to 560 victims. 50 double blankets and 50 tents were also delivered. The IHH teams are continuing their operations to help the victims.

Many houses were damaged

Many houses were damaged by the earthquake which could also be felt in Kabul, the capital of Afghanistan and in Islamabad, the capital of Pakistan. Two earthquakes followed in western Punjab in Pakistan. Another 4.3 magnitude earthquake also hit the city of Faizabad in Afghanistan.

This earthquake hit the same area as many times in just one week.

Give support

Donors who wish to support the Afghan earthquake affected population through IHH can donate 10 TL by sending SMS through all operators sending SMS to AFGHANISTAN. Those wishing to contribute larger amounts can donate online through the IHH website or bank account numbers showing code AFGHANISTAN.

Disappearance of Raheem White: Toronto police appeal to the public


More than six months after Raheem White was last seen in Toronto’s Junction neighborhood, the Toronto Police Service (TPS) and Crime Stoppers have released a video in an effort to maintain awareness around the disappearance. and to encourage anyone with information to come forward.

White was last seen Dec. 1 in the Osler Street and Pelham Avenue neighborhood of Toronto around 3:30 p.m. wearing a black jacket, black pants, an orange toque and a black backpack, police said. He is described as a black man, six feet tall, weighing 200 pounds with an athletic build, brown eyes, and black hair worn in dreadlocks.

White was working as a delivery driver and DJ at the time of his disappearance, his relatives said, and intended to move in with his girlfriend.

A vehicle Raheem was driving at the time of his disappearance was located by investigators in a parking lot on Lakeshore Boulevard West near Sunnyside Beach with his wallet and personal effects inside, but his cell phone is still missing.

“Raheem has a large number of family members and friends who are very concerned for his well-being and are advocating for a safe return,” TPS Detective Constable Chriss Sukhdeo said in the video.

“The area where Raheem’s truck was found is a popular recreational trail and walk next year with cyclists, runners and dog owners,” he added, reminding the public if anyone has information for contacting the police.

Despite a significant public response to the disappearance, followed by a number of reported sightings, White remains missing. Police said they conducted extensive research on White, spoke to family and friends, contacted all major hospitals, twice searched local shelters and probed areas they knew White frequented, among “other investigative tools…which we do not disclose”.

They also said they had investigated “numerous separate sightings and conducted video searches”, none of which have been confirmed.

In May, CTV News Toronto spoke to White’s friends and family ahead of his six-month disappearance.

“It didn’t seem like anything was wrong,” said White’s former roommate and close friend Stefan Coward, who saw White two days before the disappearance. “There was no real indication, no real sign.”


White’s mother, Rosemarie, told CTV News Toronto in May that she felt the police investigation had begun to stall.

She said she often receives messages from people claiming to have seen her son, but by the time the information is investigated, its relevance has diminished.

“Oh my god, I’ve had so many sightings,” she said in May. “There have been tips every week, people message me regularly.”

“But if [Raheem] is seen today, and [police] don’t get the message until four days later, [is he] going to be in the same place waiting for you? I do not think so.”

Rosemarie didn’t get an official interview with the force until May 11 – nearly six months after White disappeared.

When contacted for comment, a spokesperson for the Toronto Police Department confirmed to CTV News Toronto that Rosemarie participated in her first official interview with the force on May 11, but stressed that they were in ” weekly communication with [Raheem’s] mother.”

“The Toronto Police Service takes missing persons investigations very seriously and our officers are dedicated to locating people as quickly as possible, using significant resources from across the service to support our efforts,” it said. they stated.

Police are asking anyone with information regarding Raheem White’s whereabouts to contact the TPS Missing Persons Unit at 416-808-7411.

Viral Videos Claiming Anyone Can Steal Money From FASTags Are Fake: Here’s Why


In a public service announcement, the National Payments Corporation of India (NPCI) has demystified ‘Unsubstantiated and fake videos’ circulating on social media claiming to be careful driving on motorways as those claiming to clean car windows can defraud the owner by erasing the FASTag.

According to NPCI, no transactions can be executed through open internet connectivity. Multiple layers of security protocols are placed to ensure secure end-to-end transaction processing, he said. Here we explain why no one can steal your FASTags money.

FASTag uses RFID

FASTag uses Radio Frequency Identification (RFID) technology to communicate with a scanner installed at toll plazas. Once the car has passed the toll plaza, the required toll amount is automatically deducted from a bank account or prepaid wallet linked to the FASTag.

Vehicles must pass through the toll, and if the beacon is linked to a prepaid account like a wallet or debit/credit card, owners must top up/recharge the beacon. If linked to a savings account, the money will be automatically deducted when the balance falls below a predefined threshold. Once a vehicle passes the toll, the owner receives an SMS alert about the deduction. The alert is like money debited from accounts or wallets.

Works on P2M

FASTag can only be used for person-to-merchant (P2M) transactions, which means no person-to-person (P2P) transactions are allowed. “An individual cannot receive money into the NETC FASTag ecosystem from fraudulent transactions,” NCPI said in a statement.


NPCI clarified that only Authorized System Integrators (SIs), who are authorized on behalf of dealerships, are permitted to perform and initiate payment transactions at toll plazas. The infrastructure deployed between the IS system, the dealer and the banks is secured by only whitelisting authorized IP addresses and URLs.

The hardware installed in the Toll Plaza server room is cryptographically secured through the Hardware Security Module (HSM). This ensures that no third party can interact with the system and that the transaction is carried out between the two parties.

Every API call must pass through a secure firewall. Each time the Bank connects to NPCI via API connectivity, the data is encrypted with a secure 256 SHA ECC algorithm and locked with a hexadecimal private key. Only NPCI possessing the corresponding public key will be able to access the information by decryption.

Unique Plaza Code

Each merchant (toll and parking stations) onboarded by NPCI is assigned a unique Plaza code. This is integrated only by authorized acquirer banks active on the FASTag ecosystem.

Each acquiring bank receives a unique acquiring identifier (AID). The combination of Plaza Code and Bank Acquirer ID is mapped to the NPCI end. This makes it impossible for anyone to register on the platform.

Looking for an abortion? Here’s how to avoid leaving a digital trail


Everything you do online is already tracked. This information is about to become even more sensitive if you are seeking an abortion in the United States.

Friday’s Supreme Court decision reversing the landmark abortion rights decision Roe v. Wade means 13 states could ban abortion within a month, and more could follow.

A Google search for a reproductive health clinic, an online order for abortion pills, a location ping to a doctor, and a text about the possibility of terminating a pregnancy could all become sources of evidence. People are constantly sharing data about their fertility online, say privacy advocates – even if they don’t realize it. Other obvious sources of health data include period-tracking apps and digital check-in forms at hospitals.

“People shouldn’t be responsible for doing everything perfectly, when they’re in a stressful situation, to protect their own privacy,” said India McKinney, director of federal affairs at privacy organization Electronic. Frontier Foundation. “Privacy is a basic human right, and it should be protected by law and statute.”

Here are the basic steps anyone can take to protect personal information when weighing an abortion.

– Limit who you talk to

Your biggest risk factor is other people. According to Farah Diaz-Tello, senior attorney and legal director of If/When/How, a nonprofit reproductive justice organization, many cases against people who have had abortions start with people they’ve told they have. report to law enforcement.

“The biggest vector of criminalization is the healthcare system,” Diaz-Tello said. The group has studied cases against people who have had abortions since 2000 and tracked how the process generally unfolds.

When someone goes to a healthcare provider for medical issues related to an abortion, healthcare professionals can report them to the police, who can then seize their phone or computer. With a device in hand, the police can simply check the browser and text messages directly.

Diaz-Tello recommends being judicious about what information you share in an emergency room or doctor’s office. A miscarriage and self-administered abortion using pills will look the same to most healthcare providers and require the same treatment, she said.

Also limit who you tell in your own life, including your friends or family. If you are experiencing threats from intimate partners, follow these steps to protect your communications and devices.

– Chat on a secure and encrypted messaging app

When discussing your situation, use private messaging apps that use encryption. Apple’s iMessage, Meta’s WhatsApp and Signal are all end-to-end encrypted by default, meaning messages are hidden from everyone but the sender and recipient.

Signal may be the safest option. Apple has the key to decrypt iMessages that are backed up using its iCloud service, and law enforcement could ask it to do so. WhatsApp, for its part, leaves room in its privacy policy to share data with Facebook’s parent company, Meta. Depending on the data he shares, this could pose privacy issues.

– Protect your devices

Remember that someone with access to your physical device can see your messages, whether they are encrypted or not. Don’t turn your phone or laptop over to law enforcement without a warrant, privacy experts advise, and turn off biometric authentication such as Face or Touch ID if you’re worried someone will force you to unlock them. Make sure your phone, tablet, and computers all require a passcode or password to use them. Avoid wearing wearable health tracking devices while managing your health.

– Browse the Internet safely

Your browsing activity can put you at risk in two ways: someone seeing it on your device and someone getting it from tech or ad tech companies, said Eric Rescorla, chief technology officer at Firefox.

Always use incognito or private browsing mode on your browser to avoid leaving a trace on your own devices. When choosing a browser, opt for Safari, Firefox, or Brave, all of which have robust privacy features. Make sure all options to prevent cross-site tracking are enabled, and instead of Google, use a search engine like DuckDuckGo or Brave.

To minimize what is logged on your browsing, use a VPN or Apple’s iCloud Private Relay, which acts as a more secure VPN. Avoid using third-party apps for searches. If you want an extra layer of protection, use Tor Browser, a tool for anonymous Internet use that conceals both your identity and your location, Rescorla said.

If you use Google, make sure you’re signed out of your account and have all of your privacy settings turned on. Confirm that all abortion clinic results are real and not fake “pregnancy crisis” centers. If it’s a Google ad, there should be a small line above the site name that says “Provides abortions” or “Does not provide abortions.” The National Abortion Federation has a list of approved providers on its site.

– Disable location sharing or leave your phone behind

Some apps collect your location throughout the day and night and share it with third parties, including data brokers, who sell that data to anyone who wants to pay. To turn off location sharing on an Apple device, go to Settings – Privacy – Location Services and toggle the slider to show gray. (Note that this will prevent location-dependent apps, such as Uber or Maps.) On an Android device, go to Settings – Location and toggle the switch to “off”.

Unfortunately, turning off location sharing won’t stop your mobile carrier from collecting your location. Jennifer Granick, surveillance and cybersecurity adviser at the American Civil Liberties Union, said a Faraday bag, which blocks electromagnetic fields, could help in cases where someone wants to keep their phone on them but prevent tracking of the location by service providers.

To really hide your location, the best thing to do is leave your phone at home or turn it off completely, McKinney said. You can also use a temporary “burner” phone. Don’t add any of your accounts, connect to your home WiFi or turn on Bluetooth, she added.

– Maximize your privacy settings

To ensure that your phone or social media sites collect as little data as possible, lock down your privacy settings. You can find a list of the biggest app and device options in our Privacy Reset Guide.

– Avoid period tracking apps

Trusting any app with sensitive medical information is a risk, especially if it’s not covered by HIPAA requirements. Each period tracking app has different privacy practices, and understanding the nuances can be tricky. A password-protected spreadsheet or paper calendar will be more useful.

If you decide to delete your policy-tracking app, consider submitting a data deletion request as well, said Alan Butler, executive director and president of the Electronic Privacy Information Center. Some companies only honor these requests from people in California due to state privacy law, but others accept requests from anywhere.

“The power of the state and federal government to obtain data right now is incredibly broad,” Butler said. “We haven’t seen new limits on access to government data in decades, which means the laws…have weakened as technology has evolved.”

– Limit where you share health information

Your dentist and even your workout instructor can give you forms asking if you are pregnant. If you’re not comfortable sharing, say so and reserve this conversation for a doctor you trust.

Recording software at your doctor’s office may have privacy flaws, The Washington Post reported. A consent form from recording software maker Phreesia, for example, gives them permission to use your data for marketing purposes. Select “no” on any data sharing prompts you see.

Push your healthcare and insurance providers about what they do with your information, such as date of last period or pregnancy status. Where is it recorded and stored, is it encrypted and how long does it keep? Review each document you sign to see if you are waiving your rights to your information or allowing it to be shared with other parties.

– Know physical surveillance technology

In some cases, law enforcement can extract data from license plate readers or facial recognition software systems that have been strategically placed along state borders, Granick said of the ACLU. If you need reproduction services, you may want to consider other modes of transportation than driving your own car, for example.

“People shouldn’t give up, even though it’s hard and may seem like a lot,” Granick said. “People should take advantage of what they can do while pushing the powers that be to do more.”

How to check PF (provident fund) balance, withdraw money. Lily


Simple ways to check your provident fund account balance and interest

Would you like to know how to check your provident fund (PF) balance and the interest transferred to your account? Continue reading.

Each employee should be updated on the Provident Fund (PF) balance, especially at the end of a financial year.

Each month, an employee contributes a fixed amount of 12% of their base salary to their PF account, and the employer also contributes an equal amount.

Although there are many ways to determine his PF account balance, let’s read about five simple methods to check it.

1. EPFO ​​website:
On the EPFO ​​website, click on ‘Member Passbook’ in the section for employees. You can view the PF passbook by logging in with your universal or UAN account number and password.

The distribution of contributions between the employee and the employer is visible as well as the opening and closing balance. PF interest earned and any PF transfer amount are also mentioned.

If more than one provident fund number is associated with your UAN, all of them will appear. You need to click on the specific member ID to know the balance of that PF account.

2. Unified Portal:
You can also log into the Unified Portal with your UAN and password and open the PF passbook to view the provident fund balance. You can also view PF contributions for different exercises.

3. By SMS:
You can use the SMS service to know the EPF balance on mobile. To use the service, you need to send an SMS EPFOHO UAN ENG to 7738299899. To know the PF balance without UAN, sending an SMS will be useful.

You should send the SMS to 7738299899 but make sure it is sent from your registered mobile number. After sending the SMS, you will receive the latest PF contribution and member balance details specific to your KYC details.

4. Via a missed call:
You can use your mobile phone to check the PF balance, for which you will not need the UAN. You will need to use EPFO’s Missed Call service for this.

You must give a missed call to 011-22901406 from your registered mobile number. After two rings, the call is disconnected and the user will receive the message indicating the PF balance.

It is important to note that this service is available for free and can also be used from non-smartphones.

However, as an employee, you need to ensure that your UAN is linked to your bank account, your Aadhaar number and your PAN and even your mobile number should be linked and registered in the unified portal.

5. PF Balance via UMANG APP:
One can download the UMANG app – Unified Mobile Application for New Age Governance – to get EPF details such as PF balance, claim status, and Know Your Customer (KYC) status, among other details.

How to remove your PF?
The Employee Provident Fund (EPF) is a lifetime investment that can be useful at all important stages of life. It is made up of 12% of a worker’s monthly base salary, which is deposited with the EPFO ​​(Employee Provident Fund Organization). The employer also contributes to this fund which, over time, constitutes an important corpus.

Steps and Rules for Withdrawing from a PF (Provident Fund)
Before withdrawing provident funds, it is crucial to complete the KYC procedures.

The Employee Provident Fund (EPF) is a lifetime investment that can be useful at all important stages of life. It is made up of 12% of a worker’s monthly base salary, which is deposited with the EPFO ​​(Employee Provident Fund Organization). The employer also contributes to this fund which, over time, constitutes an important corpus.

Employees can withdraw their FP online quite easily. This can be facilitated through the EPFO ​​member portal e-SEW. Employees can withdraw all of their CP savings after retirement.

However, if employees meet specific conditions, they can withdraw money even before retirement.

Read here the simple steps to withdraw money from your PF account.

Atmosphere of distrust and violence prevailing in the country: CM Gehlot


An atmosphere of violence and mistrust prevails in the country, Rajasthan Chief Minister Ashok Gehlot said, stressing that it could ruin the nation. “The policy of tension is not good for the country. A family that has tension does not advance and ruins itself. The same applies to the village, the country and the state,” he said. he declares.

Gehlot said: “There is an atmosphere of mistrust and violence. Some people may be happy that bulldozers are running. This bulldozer can also come to your house anytime,” Gehlot said at the unveiling of a statue of former MLA Sanwarmal Mor. and the inauguration of a girls’ college at Kothiyari in Sikar.

He said that without conviction by law, one cannot be called guilty. Targeting Union Minister Jal Shakti, Gajendra Singh Shekhawat on the Eastern Rajasthan Canal Project (ERCP), Gehlot referred to a statement by the leader regarding the political crisis in the state two years ago.

“The minister says if Sachin Pilot had not missed the opportunity and if the government had changed in Rajasthan, then water would have arrived (via ERCP) in the state. A Union minister can- he speak such a language? What could be more shameful than that,” he said.

Gehlot has consistently called for the ERCP to be given national project status. The project aims to supply water to 13 districts in eastern Rajasthan. Pilot and 18 deputies had revolted against the leadership of CM Gehlot in July 2020.

-With PTI input

The annulment of Roe v. Wade by Supreme Court sparks calls for increased privacy


Written by Tonya Riley

The Supreme Court overturned Roe v. Wade on Friday, ending nearly 50 years of the nation’s highest court affirming the constitutional right to abortion and prompting lawmakers and privacy advocates to say the ruling of federal privacy protection legislation privacy is even more urgent.

“Congress must pass legislation protecting people’s data so that their web searches, text messages and location tracking are not weapons against them,” Sen. Ron Wyden, D-Ore., said in a statement. communicated in response to the decision. “Tech companies must take immediate action to limit the collection and retention of customer data so that it does not become tools of persecution.”

Wyden is one of many lawmakers who have urged tech companies in recent months to limit the data they collect that could be subpoenaed or purchased by law enforcement. in cases related to abortion. Wyden – alongside Sens. Elizabeth Warren, D-Mass., Patty Murray, D-Wash., Sheldon Whitehouse, DR.I. and Bernie Sanders, I-Vt. — introduced legislation earlier this month that would block data brokers from selling American’s location and health data.

In May, Motherboard found at least one data broker selling abortion clinic visitation data. (The company said it would end this practice after the report was released.)

Law enforcement exploited user data against abortion seekers long before the reversal.

States like Indiana and Mississippi have used data such as search history and text messages to prosecute women accused of aborting their pregnancies. Other data from the device, such as location data showing that an individual has been to an abortion clinic, could be swept up in a law enforcement net. Geofencing warrants, which allow law enforcement to request data from all mobile devices active in a particular area, have exploded.

Friday’s decision increases those risks, technology policy and defense groups said.

“In the digital age, this decision opens the door to law enforcement and private bounty hunters seeking vast amounts of private data of ordinary Americans.”

Alexandra Reeve Givens, Center for Democracy and Technology

“Today’s decision deprives millions of people of a fundamental right and also underscores the importance of fair and meaningful data privacy protections,” the Electronic Frontier Foundation wrote in a statement. “Everyone deserves to have strict control over the collection and use of information that they necessarily leave behind as part of their normal activities, such as using applications, queries on search engines , posting on social media, texting friends, etc. But those seeking, offering or facilitating access to abortion must now assume that any data they provide online or offline could be sought by law enforcement.

Tech groups are also calling on tech companies to take action.

“In the digital age, this decision opens the door to law enforcement and private bounty hunters seeking vast amounts of the private data of ordinary Americans,” the president and CEO of the company wrote. Center for Digital Technology, Alexandra Reeve Givens, in a statement. “In this new environment, technology companies must step up and play a crucial role in protecting women’s digital privacy and access to information online.”

Facebook, Google and TikTok did not immediately respond to requests for comment. Twitter declined to comment.

Even President Joe Biden, who stressed to Americans in a speech Friday that “privacy is on the ballot,” has raised concerns about how app data could be used.

“Extremist governors and state lawmakers who seek to block mail, search someone’s medicine cabinet, or police a woman’s actions by tracking data on our app she uses are wrong, extreme and disconnected,” Biden said.

Privacy legislation has gained some momentum in recent weeks. On Thursday, a House subcommittee approved legislation that would introduce a comprehensive privacy framework. Senate Commerce Chair Maria Cantwell, D-California, said the Senate will not consider the bill until privacy-enhancing amendments are made.

In the meantime, privacy experts are urging individuals to take steps to protect their data. EFF advises individuals to review privacy settings, disable location services on apps that don’t need them, and switch to encrypted messaging apps like Signal. Experts are also advising people attending protests related to the decision to leave their phones at home or take a burner phone to minimize the risk of location data being used against them by law enforcement.

-In this story-

abortion, Bernie Sanders, Center for Democracy and Technology, Congress, data brokers, Electronic Frontier Foundation, Elizabeth Warren, Patty Murray, privacy, Ron Wyden, Sheldon Whitehouse, Supreme Court, US courts, US Supreme Court




The BNP Paribas Group (https://group.bnpparibas) partially complies with the General Repository for Improving Accessibility (“RGAA”), version 4.0, due to the non-compliances and deviations listed below.


This statement was made on 01/10/2020.


The compliance audit carried out internally indicates 53% compliance with the criteria of the RGAA version 4.0.

The average online service compliance rate is 78%.

Of the 106 criteria, 76 are applicable including:

  • 42 compliant criteria
  • 34 non-compliant criteria


  • 1.1 Does each image conveying information have a textual alternative?

Some images do not convey information and have an irrelevant alternative text. Not very visible on the site, but nevertheless present.

  • 1.2 Is each decorative image properly ignored by assistive technologies?

This problem is more common because decorative images are not ignored by assistive technologies.

  • 1.3 For each image conveying information with a textual alternative, is this alternative relevant (except in special cases)?

In one case on the site, the text alternative is not relevant.

  • 1.3 For each image used as a CAPTCHA or as a test image, having a textual alternative, does this alternative make it possible to identify the nature and function of the image?

In one case on the site, the text alternative is not relevant.

  • 3.1 Information should not be conveyed by color alone on a website. Is this rule respected?

Some information such as breadcrumbs and categories are only indicated by a color change on hover.

  • 3.2 Is the contrast between the color of the text and the color of the background sufficiently clear on each Web page (except in special cases)?

The contrast between the color of the text and the color of its background is not clear enough.

  • 3.3 On each web page, is there sufficient contrast between the colors used in the interface components or the graphic elements conveying information (except in special cases)?

The green color used in interface components is not accessible.

  • 5.7 For each data table, is the appropriate technique used to associate each cell with its headers (except in special cases)?

Data tables do not have cells associated with headers. The tag

must use the “id”, “scope”, “role=rowheader” or “column-header” attributes.
  • 6.1 Is each link explicit (except in special cases)?

On the homepage, the articles have three links in a set, which is problematic for text-to-speech.

  • 6.2 On each web page, does each link, except for anchors, have a title?

On several pages of the site, a title is missing between and .

  • 7.1 Is each script, whenever necessary, compatible with assistive technologies?

Some elements of the site are not vocalized, such as the timeline news page.

  • 7.3 Can each script be controlled by the keyboard and by any pointing device (except special cases)?

Keyboard navigation is not possible throughout the site. On the Spokesperson page, you can open someone’s record, but you cannot use the Esc key or the “X” to exit the window, which is inaccessible.

  • 7.4 For each script that initiates a context switch, is the user notified or in control?

When searching on the news page, the number of results found is not returned to the user. There is no control over the creation of email alerts on the job postings page.

  • 7.5 Are status messages correctly returned by assistive technologies on each web page?

Status messages are not returned correctly, for example missing articles when searching for articles.

  • 8.7 Is each language change indicated in the source code of each Web page (except in special cases)?

Language changes are not specified in the source code, resulting in poor vocalization.

  • 9.1 Is the information structured by the use of appropriate headings on each web page?

Headers were ignored on several pages of the site. The result of this error is the header skipping


as can be seen on the Jobs and Careers page.
  • 9.2 Is the structure of the document consistent on each web page (except in special cases)?

The structure of the source code is not respected on the site. the

is not present on all pages. It is hidden under a

  • 10.6 On each web page, is each link whose nature is not obvious visible in relation to the text that surrounds it?

In the quotes block of the news page, there is a link in the same color as the text.

  • 10.7 Is the focus indicator visible for every element receiving focus on every webpage?

Only the pictograms of the header change color, which does not validate this criterion. Other elements such as the “Reset” button on the “All News” page do not have a visible focus indicator.

  • 10.8 Is hidden content designed to be skipped by assistive technologies on every webpage?

On the newsletter subscription page, the radio button is in display none.

  • 10.14 Can additional content appearing only through CSS styles be made visible using the keyboard and any pointing device on every web page?

On the Media Space page, the More details and Media Library Download pictogram is visible only when navigating with the mouse. The block disappears during keyboard navigation.

  • 11.4 In each form, are all the field labels and their associated fields associated (except in special cases)?

On the Legal Notice page, when I try to share the article by email, we see that the field labels and their associated field are not attached.

  • 11.10 In each form, is the input requirement indicated in a relevant manner (except in special cases)?

In the fields of the newsletter registration forms sharing the Legal Notice page by email, the mandatory fields are not indicated, or they are not indicated above the fields in question.

  • 11.11 In each form, is the entry requirement accompanied, if necessary, by suggestions to facilitate the correction of entry errors?

An error is indicated in the field, but there are no suggestions to help correct errors.

  • 12.11 In each web page, is any additional content that appears when hovering, focusing or activating an interface component accessible, whenever necessary, with the keyboard?

In the Spokesperson page, the “Close” button is not accessible when opening a biography.

  • 13.3 On each web page, does each office document available for download have an accessible version whenever necessary (except in special cases)?

Not all PDF documents on the site are accessible. The 2019 integrated report is not accessible; the document is not tagged. Documents prior to September 23, 2018 are exempt, but this one is dated 06/02/2020.


1.5.1 Technologies used for the production of group.bnpparibas

1.5.2 Test environment

Content recovery checks were carried out according to the RGAA 4.0 standard, with the following versions:

  • Chromium 85 and NVDA 2020.1
  • Firefox and NVDA 2020.1
  • VoiceOver on iOS X

1.5.3 Accessibility assessment tools

  • color contrast analyzer
  • Chrome Developer Tool
  • Web Developer Toolbar (Chrome Extension)

1.5.4 Site pages affected by the compliance check


If you are unable to access content or a service, you can contact the BNP Paribas Group site manager to be directed to an accessible alternative or to obtain the content in another form.

To do this, send a message to:

How to transfer Authy to a new phone


Jack Wallen walks you through the steps of transferring Authy from one phone to another.

Image: Miha Creative/Adobe Stock

authy is a two-factor authentication app that lets you easily work with 2FA codes for the apps and services you use.

Two-factor authentication adds a layer of security to the sites and services you use. Once you add 2FA to a site, it will not only ask for your account credentials (username/password), but also a six-digit code generated by a 2FA application (such as Authy ) and associated with your account. Without this six-digit code, you cannot log into your account.

Once you start using Authy on your mobile device, at some point you will need to transfer the account to another device.

SEE: Mobile Device Security Policy (TechRepublic Premium)

What you will need

For this to work, you will need the Authy app installed on your current mobile device. When you initially installed the app, you associated it with the phone number of that original phone. You will also need the Authy app installed on your new phone. How you install this app will depend on the mobile operating system you are using (Android or iOS).

How to Transfer Authy

Unfortunately, due to security concerns, Authy does not allow users to take screenshots within the app, so you will need to follow written instructions closely. I will outline the process in such a way that you should have no problem following it.

Open Authy on your old phone and tap the 3-dot menu button at the top right of the screen. From the drop-down menu, tap Settings. In the Settings window, you will see three tabs at the top of the screen: My Account, Accounts, Devices. Tap on Devices and you should see an almost empty page with an ON/OFF slider which is in the OFF position by default. To share Authy on a new phone, you need to enable multi-device support, so tap the ON/OFF slider so it’s in the ON position.

After enabling multiple device support on Authy, open the app on the new phone, where you will be prompted to enter your country code and phone number. You can select your country code from the drop-down menu and then enter your phone number. This phone number must be the same number associated with your old phone as it is the number associated with your Authy account.

Once you’ve typed in your phone number, tap Submit at the bottom of the screen, then select the verification method you want – from Use an existing device with Authy installed, Receive an SMS message, or Receive a call.

If you have already inserted your SIM card into the new phone, tap Receive SMS message. If you haven’t installed the SIM card on the new device yet, tap Use an existing device with Authy installed, which will then send a new device request to the original phone. On the old phone, tap Accept, then when prompted, type OK and tap OK.

You should then see all of your 2FA entries in Authy on the new device.

That’s all there is to making Authy available on multiple devices. One thing to keep in mind is that this isn’t actually a transfer, so all of your accounts will be recalled in Authy on your old device. If you plan to sell, give away, or give away that old device, be sure to uninstall Authy and do a factory reset to ensure none of your data is accessed.

Subscribe to TechRepublic How to make technology work on YouTube for all the latest tech tips for professionals from Jack Wallen.

Twitter notes herald the end of tweetstorms and the original tweet concept


After choosing not to comment on a related leak, Twitter officially revealed that it was testing a way to post much longer tweets. The official Twitter Notes feature teaser showed off something that looked more like an interface for writing blog posts or articles rather than simple 240-character tweets. Coincidentally, the previous leaked version of this feature was called Twitter Article rather than Notes.

Twitter Notes fixes many long-standing issues with tweetstorms and third-party apps or bots. You no longer receive multiple notifications from someone you follow, and you don’t have to go out of the network to view a long post. It also makes it easier to reply and communicate as there would be only one tweet to reply to instead of several in a series.

At the same time, it raises the question of whether it removes the special appeal and unique value of Twitter. Not all users will post long tirades or ramblings, of course, but other social networks have always allowed users to write short posts as well as long ones without having to choose between the two. Either way, Twitter Notes will most likely make Twitter users happy and might give those on other networks more reason to abandon their old homes and jump into the less restricted, but also more chaotic, world of Twitter.

‘Hang ’em all’: Members of the January 6 committee are the target of violent rhetoric on right-wing social networks


Users of these platforms openly call for the execution of committee members, with Wyoming Rep. Liz Cheney appearing to be a specific target. Calls for the hanging of former Vice President Mike Pence that were chanted across Washington DC on January 6 continue to echo online.

Figuring out what is just rhetoric and what could be an active threat is a challenge for law enforcement.

John Cohen, the former counterterrorism coordinator for the Department of Homeland Security and now an adjunct professor at Georgetown University, told CNN that authorities cannot treat social media posts with language. disturbing as mere hyperbole.

Cohen described social media monitoring as a “resource-intensive process that must involve federal, state and local authorities working together, operating under strict protocols that ensure they are able to distinguish between protected speech by the Constitution and those related to the threat”. activity.”

“We are in a very volatile and complex threat period,” he added.

Online threats continue as Illinois Republican Representative Adam Kinzinger revealed on Sunday that he had received a letter in the mail threatening to execute him, his wife and their newborn baby.

Facebook and Twitter’s decision to kick then-President Donald Trump off their platforms for breaking the rules after the insurgency was a boon for a developing cottage industry of media platforms social alternatives.

Alternative sites, like Trump’s Truth Social platform, launched in February, present themselves as bastions of free speech, capitalizing on some Republicans’ perception that they have been unjustly censored by Silicon Valley. Truth Social says it “seeks to create a haven of free speech in the social media sphere and encourages your unfettered free speech.” Its terms of service state that posts must not be “violent” or “harassing”.

An analysis by Advance Democracy Group, a nonprofit that conducts public interest investigations, shared with CNN found posts on Truth Social calling for the execution of Jan. 6 committee members and others. The researchers searched for platform-specific terms like “execute.”

An article on Truth Social includes a photo of a noose and reads, “The J6 committee is guilty of treason. Continuing an insurrection hangs them all.”

On another post referencing Cheney and Pelosi, a user posted a GIF of a guillotine with the message “#MGGA #MakeGuillotinesGreatAgain.”

CNN asked Truth Social about several posts containing violent rhetoric on Tuesday, including posts with a photo of a noose and a GIF of a guillotine. Truth Social did not respond to CNN’s requests for comment, but on Wednesday the posts appeared to have been removed from the platform.

In addition to Truth Social, Advance Democracy also observed violent rhetoric related to the January 6 committee posted on other alternative social media platforms 4chan – which was used by the suspect in the mass shooting in Buffalo, New York – as well as on Gab and another message board popular among some Trump supporters.

While many of the posts identified by Advance Democracy appeared to have little engagement, all of the posts illustrate a pattern of frequent invocation of violence in these online communities.

On a pro-Trump message board, one user commented earlier this month: “If we ever decide to storm the capital again, I promise we won’t make the mistake of not being armed a second time. time.

The post has since been removed.

Truth Social and 4Chan did not respond to CNN’s requests for comment.

Andrew Torba, CEO of Gab, told CNN, “Gab permits all legal political speech protected by the First Amendment, including speech on inherently political topics such as the charge and punishment of treason through the system. U.S. judicial and imminent threats of violence, we will take action and work with our law enforcement partners to mitigate any threats to the public.”

While many people posting to these sites will never commit violence, others will, as evidenced by the social media posts of some of those accused of their role in the insurgency.

“Given the lack of moderation of content on fringe platforms inhabited by far-right communities, the volume of threats is much higher than on mainstream platforms,” ​​Ben Decker, CEO of Memetica, told CNN. digital survey company.

Decker said most about some of these posts seem to encourage “real world violence. [and] are no different from many of the threats that emerged in the weeks leading up to January 6. »

Daniel J. Jones, president of Advance Democracy, said the online threats appear to be coming from people who mistakenly believe the 2020 election was stolen. “It is clear that the lies and actions of Trump and lawmakers who support him continue to pose a serious threat to our democracy and the peaceful transition of power,” he said.

The United States Capitol Police had no comment. CNN has also reached out to the FBI, Pence’s office and Cheney’s office for comment.

Oregon State Raises Reimbursement Rates for Child Care Providers


SALEM, Ore. (KTVZ) – Child care expense reimbursement rates are increasing for providers caring for children of families who receive child care expense assistance through the Department of Oregon Social Services.

ODHS pays child care providers for child care services provided to families receiving child care assistance through employment-related child care programs (ERDC) and Temporary Assistance to Needy Families (TANF).

The new child care reimbursement rates took effect June 1, 2022 and increased due to the passage of House Bill 4005 in the 2022 legislative session.

Average monthly reimbursement rates for full-time care increase by:

  • 18% for the care of family, friends and neighbors
  • Between 6 and 20% for nurseries
  • Between 11 and 25% for licensed home care

“For many families, the cost of childcare can be a barrier to reaching their goals and entering and staying in the workforce,” said Claire Seguin, assistant director of programs at self-sufficiency of ODHS. “These reimbursement rate increases will ensure families have equal access to quality child care.

“As our child care system continues to struggle with staffing shortages and a lack of child care provision, this is an important first step in ensuring that our child care providers receive fair pay,” said Oregon Early Learning System Director Alyssa Chatterjee. “I appreciate the Legislature’s investment in our system and what it will mean for Oregon families receiving assistance with their child care costs.”

Actual child care expense reimbursement rates vary depending on the type of provider, the age of the child, and the community in which the provider is located. A full list of reimbursement rates is available online at https://www.oregon.gov/dhs/ASSISTANCE/CHILD-CARE/Pages/Rates.aspx.

The ERDC helps eligible families pay for work-related child care costs, including enrollment and enrollment fees. ERDC is a subsidy program, which means that some families, depending on their income, may be required to pay a copayment.

TANF helps those engaged in the Job Opportunity and Basic Skills (JOBS) program achieve their goals by providing direct childcare payments to providers as well as assistance with registration fees.

Oregonians can apply online for ERDC, TANF and other government aid online at One.Oregon.Gov or by phone at 1-800-699-9075 or TTY 711.

Resources to meet basic needs

The Oregon Department of Social Services, Self-Sufficiency Programs operates the Work-Related Child Care Program. The Employment Related Day Care program helps working families with child care costs, including registration and registration fees. It also works with statewide partners, including the Division of Early Learning, to help families find quality child care.

Man accused of exchanging explicit photos with 11- and 12-year-old girls


NORRISTOWN, PA — Local authorities have arrested a New Jersey man and charged him with exchanging sexually explicit photos with two preteen sisters in Montgomery County.

The Montgomery County District Attorney’s Office on Tuesday announced charges against Ryan Corcoran, 26, of Andover, NJ, who investigators say sent and requested nude photos first via social media and then by SMS.

Prosecutors say Montgomery County detectives were tipped off in April by the father of two local girls, ages 11 and 12, who said they were approached via TikTok, then via cellphone text messaging, by a user who , at one point said he was a 14-year-old, but who was actually Corcoran.

Find out what’s happening in Norristownwith free real-time Patch updates.

Both sisters were given nude photos and then asked to provide nude photos of themselves, the prosecutor’s office said.

Investigators traced the phone number texted to a service called Ad Hoc Labs, which helps users hide their real phone numbers.

Find out what’s happening in Norristownwith free real-time Patch updates.

Detectives served a subpoena on Ad Hoc Labs and eventually discovered that the phone number associated with the service, as well as the IP address of the computer used in the case, belonged to Corcoran’s father, according to the office. of the prosecutor.

When investigators went to Corcoran’s father’s home to serve a search warrant, the young Corcoran then admitted the cellphone number was his, prosecutors said.

The prosecutor’s office said a download of Corcoran’s phone showed the girls’ phone numbers were stored as contacts; investigators also found the original nude photos sent by one of the girls.

“This defendant was contacting random young girls on a social media platform and soliciting them to take photos of themselves in sexually explicit poses, clearly creating child pornography,” the prosecutor said. Montgomery County, Kevin Steele, in a statement. “This is another example that there are predators on the Internet trying to take advantage of innocent young children. Parents must be ever vigilant to protect their children from these predators.”

The Montgomery County District Attorney’s Office said it was assisted in the investigation by Homeland Security Investigations, the New Jersey Internet Crimes Against Children Task Force and the County District Attorney’s Office. of Sussex, New Jersey.

Corcoran is charged with possession of child pornography, unlawful contact with a minor, corruption of minors and criminal use of a means of communication.

He was arraigned on June 13 before Magistrate District Judge Maureen C. Coggins.

Corcoran was later released after posting bail. He was also ordered to have no contact with minors and to refrain from using the Internet.

A preliminary hearing is scheduled for June 27.

Get more local news straight to your inbox. Sign up for free newsletters and patch alerts.

To request removal of your name from an arrest report, submit these required elements at [email protected]

Response rules:

  • Be respectful. It is a space for friendly local exchanges. No racist, discriminatory, vulgar or threatening language will be tolerated.
  • Be transparent. Use your real name and back up your claims.
  • Keep it local and relevant. Make sure your answers stay on topic.
  • Review the Patch Community Rules.

George Lamming, famous Caribbean novelist, dies at 94

Placeholder while loading article actions

George Lamming, a Barbadian author who placed the legacy of colonialism at the center of his novels and lyrical essays, earning a reputation as one of the finest Caribbean writers of his generation, died on June 4 in a nursing home in Bridgetown, the capital of his country. He was 94 years old.

His death was announced by Mia Mottley, the Prime Minister of Barbados. “Wherever George Lamming went,” she said in a statement, “he embodied that voice and spirit that cried out in Barbados and the Caribbean.” Mr Lamming’s daughter, Natasha Lamming-Lee, said he was ill but did not name a cause.

Alongside novelists and poets such as Kamau Brathwaite, Wilson Harris, Edgar Mittelholzer, VS Naipaul, Andrew Salkey and Derek Walcott, Mr. Lamming helped define a new Caribbean literature in the mid-twentieth century, exploring questions of history , politics, language and freedom at a time when colonial rule was giving way to independence.

Raised on a former sugar cane plantation outside of Bridgetown, he has written books highlighting the experiences of people marginalized because of their race, language, gender or income, and has broadcast a message of liberation and inclusion in his essays and speeches. “I’m kind of a preacher,” he said in a 2002 interview with the Small Ax newspaper. “I am a man with a message.”

Like Naipaul and many other Caribbean writers of their generation, Mr. Lamming launched his literary career in London, where he wrote his first semi-autobiographical novel, “In the Castle of My Skin” (1953), at age 23. He then reviewed the experience. of migration in “The Emigrants” (1954), a dark and sketchy novel about West Indian expatriates in England, and in his collection of essays “The Pleasures of Exile” (1960), which a New York Times reviewer described as “a neo-Gothic piece with arc-shaped ideas like flying buttresses.”

“My subject,” wrote Mr. Lamming in the latter, “is the migration of the West Indian writer, as a colonial and an exile, from his native kingdom, once inhabited by Caliban, to the tumultuous island of Prospero and its language.”

Mr. Lamming returned to the Caribbean for novels such as “Of Age and Innocence” (1958) and “Season of Adventure” (1960), which were set on the fictional island of San Cristobal, where ethnic African groups, Indians and Chinese were fighting. to overcome mutual suspicion while uniting against the white establishment.

It was difficult, he noted, to forge a new identity after years of colonialism. “I had always lived in the shadow of a meaning that others had given to my presence in the world”, observes an independentist leader in “Age and Innocence”, “and I had played no role in the making in this sense, like a chair that is entirely at the mercy of the idea guiding the hand of the man who builds it.

Mr. Lamming had delved into issues of race and ethnicity since the publication of his first and best-known novel. Named after verses by Walcott, “In the Castle of My Skin” shifted between third and first person while chronicling the upbringing of a young man named G, who joins his friends in fishing, diving for the coins thrown by tourists at the beach wondering how the king’s face ends up on pennies.

He also witnesses a workers’ riot, develops a dawning awareness of racial inequality (“No black boy wanted to be white, but it was also true that no black boy liked the idea of ​​being noir”) and went to Trinidad to work as a teacher. , just like Mr. Lamming did after high school.

“I tried to reconstruct the world of my childhood and adolescence,” Mr. Lamming wrote in the introduction to the 1983 edition of the novel. “It was also the world of an entire Caribbean society.”

The book won the Somerset Maugham Award for young writers in Britain and was praised by French philosopher Jean-Paul Sartre, Kenyan author Ngugi wa Thiong’o and American novelist Richard Wright, who wrote the introduction of the American edition.

Critics were also impressed: “Mr. Lamming is a poet by instinct rather than a novelist, a man with an individual and almost private approach to the English language,” wrote Orville Prescott of The Times. “His prose is poetic, sensual, imaginative, adorned with whimsical figures of speech and surprising twists of language.”

In part, Mr. Lamming’s prose style was shaped by his belief in gaining “spiritual possession of the landscape in which you live.” For him, this meant developing an understanding of the “rhythm of the wind…the smell of the sea…the texture of stone and rock”.

“They are not objects outside of you,” Caribbean Beat magazine quoted him as saying. “They are part of your consciousness.”

George William Lamming was born in Carrington Village on June 8, 1927. His parents were unmarried and he barely knew his father. Her mother was a housewife who later married a policeman.

Mr Lamming grew up during a time of social upheaval, prefiguring Barbados’ independence from Britain in 1966, and said he and his peers suffered a more psychological form of colonial cruelty than physical. “It was a terror of the mind; a daily exercise in self-harm,” he wrote in a 2002 essay. “Black against black in a battle for self-improvement.”

After winning a scholarship to the prestigious Combermere High School, he studied under the literary editor Frank Collymore, who welcomed him into his personal library and encouraged Mr. Lamming’s interest in writing poetry and of prose, publishing some of his early work in the Caribbean magazine BIM.

Mr Lamming then worked at a boarding school in Port-of-Spain, Trinidad, teaching English to Hispanic students, before moving to England in 1950, sailing on the same ship as Trinidadian writer Samuel Selvon. “If I hadn’t gone to England,” he told the Washington Post in 1999, “I would have written, but you wouldn’t have heard of me.”

After working in a factory in London, Mr Lamming landed a job with the BBC Colonial Service, where he was a presenter for shows such as “Caribbean Voices”, an influential platform for West Indian writers. He also became active in the city’s literary community, meeting Dylan Thomas and other poets at the Mandrake Club in Soho.

His conversations with English writers were more about business than literature or politics, he recalls: “A very good short-story writer, always in purple velvet, advised me never to visit an editor’s office to talk business without a small gun in my pocket. He gave examples of his success in such encounters.

Mr. Lamming was soon traveling abroad, visiting the United States on a Guggenheim Fellowship and speaking in 1956 at the Congress of Black Writers and Artists in Paris, where he impressed an audience that included James Baldwin and Frantz Fanon.

“Lamming is big, boned, messy, and intense,” Baldwin wrote in an essay on the event, “and one of his real distinctions is his refusal to be bullied into being a real writer. “

With his booming, gravelly voice and crown of graying hair, Mr. Lamming won a wide range of admirers, including Canadian novelist and short-story writer Margaret Laurence. They had a brief affair, according to her biographer James King, and she moved to London with her children in an unsuccessful attempt to settle down with Mr Lamming. (His only marriage, to artist Nina Ghent, had previously ended in divorce.)

By 1967, Mr. Lamming had launched a career in academia, lecturing and working as a writer-in-residence at schools including Brown, Duke, Penn, the University of Texas at Austin and the University of the West Indies in Jamaica. . He returned to Barbados in 1980 and lived for many years at the Atlantis Hotel near the fishing village of Bathsheba, where he said his writing was invigorated by daily swims in the ocean.

Mr. Lamming received the Order of the Caribbean Community in 2008 and a Lifetime Achievement Honor from the Anisfield-Wolf Book Awards in 2014.

In addition to his daughter, Lamming-Lee of Silver Spring, Md., survivors include his longtime companion, Esther Phillips; seven grandchildren; and 10 great-grandchildren. Her son, Gordon, died last year.

Mr Lamming’s later novels include ‘Water With Berries’ (1971), a political allegory centered on a West Indian revolutionary living in London, and ‘Natives of My Person’ (1972), about 16th century explorers and the origins of the colonialism. Towards the end of his life, he was working on a book about Christopher Columbus, imagining that the explorer had been arrested and tried by an indigenous community in the West Indies.

He spent years working on the project, but in a 2002 interview with Caribbean Beat he declined to say when it might be released: “The thing is, with these things, you never end.”

They are human! The Yankees take a big lead and fall to the Blue Jays | Quick reaction


TORONTO — The Yankees were late to play a bad game. It’s baseball. You can’t win them all even though sometimes you feel like you’re so good and hot that you’ll never lose again.

Sunday must have stung. Feeling and looking invincible, the Yankees took a big lead over the Toronto Blue Jays and then ruined the game.

Instead of sweeping the Jays for a 10-game winning streak that would have added to an already huge lead in the American League East, the Yankees spewed a five-point lead and lost 10-9.

Everyone knows the Blue Jays can knock the ball out of the stadium with anyone and that’s how they roared to save the series finale. The Yankees had an 8-3 lead before Lourdes Gourdes Jr., grand slammed in the sixth inning against Miguel Castro to make it a one-run game, then Teoscar Hernandez went deep with two in the seventh against Wandy Peralta to put Toronto ahead. 10-8.

From there, the Yankees clawed back a run in the eighth on a homer hit by Anthony Rizzo, but the Jays held on.

There were nine homers in the game, five from the Yankees and four from Toronto.

The Yankees’ greatest strength this season has let them down in this one. They had a rocky start from Luis Severino, who allowed five runs over five innings, and the bullpen also faltered by allowing five more.

The Blue Jays struck first, taking a 2-0 first-inning lead over Severino, who beat Bo Bichette with one out, then served a two-run homer to Vladimir Guerrero Jr.

The Yankees recovered a run in the second on a Gleyber Torres first homer off Jays starter Yusei Kikuchi, then took a 3-2 lead in the third when Joey Gallo worked a first walk and Josh Donaldson hit a two-out , two- running homer.

The Yankees’ lead grew to 6-2 in the fifth when they scored three on reliever Adam Cimber. Adam Judge doubled in a run and Torres made it an afternoon three-RBI with a two-out two-sack that popped the left field wall.

The Blue Jays salvaged a run in the fifth on a solo homer from George Springer to make it a 6-3 game, but the Yanks responded with two in the sixth on back-to-back homers from their No. 8 and No. 9 hitters. , Kyle Higashioka and Marwin González.

Leading 8-3, Severino returned to the mound for sixth with his pitch count in the 90s. A single line and walk later, Boone went to the bullpen, bringing in Miguel Castro. This move did not work. Castro retired the first two batters he faced, but walked the next to charge the bases and Gurriel Jr. cleared them with a grand slam that cut the Yankees’ lead to 8-7.

The lead was gone the next set when Gurriel took Peralta deep with two on board, making it a 10-8 game.

The Yankees have always made it interesting. Rizzo’s homer in the eighth brought them within a run, and then the next two batters hit a field single from Gonzalez and a walk from Jose Trevino, who hit for Gallo.

The Yanks had the runners tied and green lighted on board with the top of their order coming, but Blue Jay closer Jordan Romano came on and ended the threat by pulling LeMahieu out on a right flyball and Judge on a strikeout.

The Yankees threatened again in the ninth against Romano. Giancarlo Stanton walked with one out and Aaron Hicks scored a single with two downs to put runners in the corners. Hicks then stole second base to put the tying and winning runs in scoring position for Rizzo, who grounded himself short to end a 3 hour, 41 minute marathon.


– Giancarlo Stanton was 0 for 4 with three strikeouts, leaving him 1 for 16 with a home run and two RBIs in his last five games.

— Rizzo has seven home runs and 17 RBIs in his last 15 games.

– Higashioka has homered three times in its last four games after having had none in its first 34.


Monday: Yankees at Rays, 7:10 p.m., YES. RHP Gerrit Cole (6-1, 3.33) vs. LHP Shane McClanahan (7-3, 1.84).

Tuesday: Yankees at Rays, 7:10 p.m., YES. LHP Nestor Cortes (6-2, 1.94) against TBA.

Wednesday: Yankees at Rays, 7:10 p.m., YES. LHP Jordan Montgomery (3-1, 2.72) vs. RHP Shane Baz (0-1, 5.40).

Thank you for counting on us to deliver journalism you can trust. Please consider supporting us with a subscription.

Randy Miller can be reached at [email protected].

WhatsApp now lets you mute people during group calls


WhatsApp rolled out several new features last week, including the ability to mute people during group calls (via Android Central). This sanity saving feature seems useful not only for turning off people who forget to do it themselves, but also if you’re in the same room as someone who’s also online and doesn’t want to hear the echo what he says.

While some conferencing apps, like Zoom and Microsoft Teams, allow hosts to mute all (or selected) participants, they generally don’t offer individual users the ability to mute whoever they want during a call. This feature offers a new level of control that’s probably best retained for chaotic meetings that involve up to eight people on video calls or up to 32 on voice calls.

Along with the new mute feature, WhatsApp now lets you message specific people in a group call, maybe if you want to make a note to someone in a meeting. or crack a joke that might not fly with the whole group. WhatsApp is also rolling out a new banner that will notify you when a new person has joined a call after it has already started.

The messaging service expands on more than just its group call feature. Friday, whatsapp announced that you can now choose which contacts can see your profile picture, about and last seen status which indicates when you were last active on the platform. This could help keep your profile private from business contacts or anyone you don’t want to have access to this information 24/7. Last year WhatsApp started hiding your last seen status to strangers by default due to potential privacy implications.

Earlier this week, WhatsApp finally rolled out the ability for Android users to transfer their chat histories to iPhone after the company initially began allowing users to transfer their chat data in the opposite direction (from iPhone to Android) last year.

Clinical Trial: Email for Older Black and Latino Patients Increased COVID Vaccination


What happened last year when a study was done to test the impact of emailing older black and Latino patients with the names of their primary care physicians and named senders? A statistically significant increase in vacancy rates among these populations, found a team of researchers.

The article, “Effect of electronic and mail-based outreach to primary care physicians for COVID-19 vaccination of black and Latino older adults: a randomized clinical trial,” involved a study of the impact of such awareness. It was published online on June 17 in Open JAMA Network, by a large team of researchers. The researchers were Tracy A. Lieu, MD, MPH; Eric P. Elkin, MPH; Patricia R. Escobar, MPH; Lucy Finn, MPH; Nicola P. Klein, MD, Ph.D.; Cimone Durojaiye, MPH; Stephanie Prausnitz, MS; Charles P. Quesenberry, Ph.D.; Debora Sawyer, MD; Silvia Teran, MD; Nancy Goler, MD; Stephen M. Parodi, MD; and Yi-Fen Irene Chen, MD

As the authors of the article write, “Vaccination is a crucial tool for controlling COVID-19, which has caused disproportionately high morbidity and mortality among black and Latino people in the United States. Vaccination rates among adults of these racial and ethnic groups were initially lower than those of Asian and white adults, and vaccination uptake among black adults continues to lag.Possible causes for this gap include more difficult access, skepticism about the efficacy or safety of vaccines and mistrust Primary care physicians (PCPs) can potentially play a key role in improving COVID-19 vaccination rates, especially for people black and Latino elderly who are hesitant to get vaccinated because PCPs are reliable sources of information.6,7 However, there is little evidence on the efficacy of PCPs for sensitization for p promote vaccination against COVID-19 in these high-risk groups. We conducted a randomized clinical trial of PCP sensitization for COVID-19 vaccination in older Black and Latino Americans in a socioeconomically diverse population. The objectives of this study were to assess the effects of PCP outreach using secure electronic messaging and sending on COVID-19 vaccination among Black and Latino individuals aged 65 years and older and to compare the effects of culturally appropriate and standard PCP messages.

And what did the researchers find? “This 3-arm randomized clinical trial compared secure electronic messaging and email outreach of PCP (culturally appropriate or standard PCP extension) with usual care for Black and Latino people aged 65 and older who had not responded to an earlier non-personalized email and mail outreach for COVID-19 vaccination. The intervention period was March 29 to April 22, 2021, with vaccination results tracked through May 20, 2021. The interventions were developed by The Permanente Medical Group (TPMG), in partnership with Kaiser Permanente Northern California (KPNC) , an integrated system serving a diverse 4.5 million members. For this study, we selected service areas with relatively low vaccination rates and high proportions of black and Latino individuals: California’s Central Valley, Fresno, South Sacramento, and San Jose. KPNC members age 65 and older were eligible “to participate in the clinical trial” if they had been sent in advance but had not received a COVID-19 vaccination (in any location in California, inside or outside KP) or had made a vaccination appointment with KP as of March 29, 2021. Previous outreach used emails (or letters when email addresses were not available) from the KP Regional COVID-19 Vaccination Team to invite individuals to book an appointment for a vaccine online or by phone.

Additionally, “participants in the culturally appropriate and standard sensitization groups were followed from their first study sensitization until first vaccination or until 28 days after their last study sensitization. Participants in the usual care group were followed from the date of first study sensitization mailout (March 29, 2021) through first vaccination or up to 28 days after mailout. last sensitization of the study on April 22, 2021 (resulting in a maximum observation period of 52 days). The primary analysis used intention-to-treat allocation and compared vaccination time between each sensitization group with usual care using Cox proportional hazards regression. The models included a fixed effect for study group and adjustment for race, ethnicity, language group, and geographic area.

Ultimately, the researchers write, “This randomized clinical trial found that secure messaging and mail outreach sent on behalf of individuals’ own PCPs led to a significant increase in COVID-19 vaccination rates among older adults. black and Latino women who had not responded earlier, a less personalized approach. If this culturally appropriate PCP outreach were conducted for all unvaccinated Black and Latino American adults ages 65 and older, assuming the same additional vaccination rate of 2.2% was achieved, an additional 23,000 people nationwide could have been vaccinated. This suggests that PCP outreach should not be overlooked as a potentially effective approach for Black and Latino older adults.

The researchers note that our study was unique in that it focused on black and Latino seniors. Very few outreach randomized clinical trials to promote vaccination against COVID-19 have been reported. An earlier trial in a university healthcare system with individuals of all ages and racial and ethnic groups found that texting increased vaccination rates by 1% among those who had not responded to a prior text message. . In comparison, our trial of PCP sensitization using e-mail and postal messages found an increase of up to 2.2% in black and Latino seniors who had not responded to prior sensitization and less personalized.

And here’s something important: the researchers write, “A notable aspect of our study was that email messages and mailings were sent in the name of each individual’s PCP. The increases in COVID-19 vaccination rates we have observed are consistent with surveys and expert opinion suggesting that physicians are key influencers with their patients. Our finding that electronic reminders for COVID-19 vaccination had significant effects aligns with trials of patient portal or text-based reminders for influenza vaccination and other studies of vaccination reminders.

The old millennium | Fire station


I am a new business owner…

I start again: I am a former company executive with…

Let’s try again: I am a business executive with over 14 years of experience in the business and over 7 years in headquarters but who has just been assigned to the company in which I reside.

If that sounds familiar, then we’re probably similar in other ways: we were raised in the fire service, where being an officer meant you paid your dues for over 10 years as a “full-back”. If you decided, you were promoted to engineer, and several years later you became an officer who was close to retirement, but you were there and you did it. You know the area you’re assigned to and the guys you work with well. That said, it is not the fire department that elevates the firefighters who are currently occupying seats on fire apparatus, myself included.

A disturbing conversation

A “new generation” of firefighters and firefighters is not a problem that arose overnight.

Attend any fire school on the weekend and you’ll most likely hear most mid-level supervisors complaining about “the next generation.” Common complaints from these lieutenants and captains are, “We don’t know how to talk to them” and “They don’t know how to perform the simplest tasks.”

These remarks fell by the wayside for me when I recently attended such a weekend event, as I usually push to the limit to access basic knowledge. After all, it didn’t affect me and I didn’t want to be dragged into negativity.

Flash forward a few weeks to my current assignment. My engineer and I were doing preventive maintenance on our devices. The station phone rang. I popped up and looked at the trainee firefighter from our sister company to get the phone. After looking at me, for what appeared to be sizing me up, he informed me that I should pick up the phone because I was “second most recent on the shift”. I answered with a simple “OK” and let my crew give advice to the trainee firefighter.

At first glance, you might think it was the conversation of concern that inspired me to write this article, but the inspiration came a whole day later when I received a text from the trainee firefighter, to asking me if I was crazy, apologizing and explaining that he didn’t understand that what he had done was wrong. It was then that I realized the disservice to him and the changes that need to be made in the way we serve the next generation of firefighters.

Customer service

A quality organization exists when all employees share the same vision. Many civilians become firefighters today for the same reasons civilians became firefighters 100 years ago: they want to serve their community, ride big trucks, and have exciting work.

Unfortunately, firefighting is not an organization. The department is an organization.

We are doing an extremely poor job of getting our new generation of employees on board with our vision. Throughout their schooling, recreational sports, and extracurricular activities, these individuals were led to believe that they could become anything they wanted to be simply by working hard. Valuable descriptions of how to achieve the goals and of certain failures and difficulties along the way have probably been omitted.

Our new generation expects the customer service of a hotel bellboy at the cost of a free valet.

They need to be shown where the organization started, where it is now, where it is going in the short and long term, and where we would like to see them in the mix. We need to replace instant gratification with instant ownership.


For the life of me, I couldn’t get over the fact that this firefighter texted me about a problem at the fire station. It intrigued me at first, then it became more and more clear.

This firefighter graduated from high school virtually. He passed his first interview with the department virtually. He only knew how to solve problems – you guessed it –virtually. How could I hold him accountable for staying within his communication comfort zone? Also, how could I solve this organizational puzzle?

The thing is, it wasn’t a problem. He was simply a young man adjusting to his generational environment.

I texted the firefighter, explaining that, yes, I was initially angry about the situation, but also that I had done him serious wrong by not explaining why I was angry. I used the channel of communication he felt most comfortable with – texting – and laid out the problem of the situation: how we have a hierarchical structure and why seniority in the services fire is important.

Then I gave him time to talk. I let him express himself on the fact that he had not understood until this precise moment that something was wrong and that everything would be fine now.

This firefighter and I now have a bond that will never be broken, because we have found a way to close the communication loop: encode, send, receive, decode, return.

It is our duty as fire officers – and firefighters who have been around – to find the most effective communication methods for all of our firefighters, not just those inside our generational environment.

For those wondering, this firefighter and I are now sitting around the kitchen table having some of the best conversations I’ve ever had in the fire station.

Plobal Apps Raises $8.5M in Round Led by Elevation Capital and Bessemer Venture Partners


The total capital raised to date is $14 million

TORONTO, June 16, 2022 /PRNewswire/ – Global Appsa no-code mobile app platform for e-commerce stores, raised $8.5 million, led by Elevation Capital and Bessemer Venture Partners. Elevation and Bessemer also co-led the funding round in 2021, bringing the total capital raised by Plobal Apps to $14 million over the past 6 months.

Plobal Apps enables D2C brands to quickly build and launch their mobile apps, drive installs, engage customers, and increase revenue. With 73% of all e-commerce transactions conducted through a mobile device, shopping experiences are designed for the mobile customer first. In mobile commerce, mobile apps offer greater personalization for customers, and communication can be tailored based on user interests, location, usage, and behavior. This leads to higher conversion rate, AOV and customer lifetime value.

One of the largest app building platforms in the Shopify ecosystem, Plobal Apps helps merchants drive up to 5x higher conversion rates compared to mobile web.

The company’s mission is to democratize mobile commerce technology to create a level playing field for e-commerce brands globally. For most brands, building apps was expensive, required expertise, and time-consuming. With DIY apps, Plobal Apps has helped solve this problem for merchants. A bigger problem was that after the app was created, these merchants didn’t know how to drive installs and generate revenue. Plobal Apps focuses on what happens after the mobile app is created and aims to make the mobile app the most successful sales channel for a merchant.

“We’ve come a long way in our journey. Brands have now started to realize the importance of a proprietary marketing channel. For many of these D2C brands, personalization and retargeting have become difficult with the increase in policies regulations, and third-party data restrictions With rising acquisition costs and an emphasis on retention, brands are increasing proprietary platforms such as email, text, and mobile. mobile apps to reach their customers and truly own their audience on conversion, deliverability and engagement,” said Atul Poharkar, Founder of Plobal Apps.

Akarsh Shrivastava, Principal of Elevation Capital, said, “At Elevation, we have always been excited about the potential of D2C brands. However, with ever-increasing digital marketing costs and increasingly difficult targeting and marketing, brands need to better own and monetize these customers. . Recent privacy changes have only reinforced these tailwinds. Plobal’s easy-to-build platform, complete with out-of-the-box marketing manuals, helps brands build and operate cutting-edge consumer-facing apps, allowing them to dramatically improve retention, repeat purchases and customer lifetime value. . We are delighted to partner with Atul and the Plobal team.”

Plobal Apps works closely with Shopify mid-market and enterprise customers, with a focus on generating revenue for merchants. With popular and fast-growing brands such as Steve Madden, Goose Creek, Matt & Nat, Koovs and Rare Rabbit as clients, Plobal understands how to drive successful conversions from mobile apps. The company processes millions in the GMV app every month for its enterprise merchants at all levels.

Anant Puripartner, Bessemer Venture Partners, said, “At Bessemer, we believe the future of e-commerce is in apps, as they enable better customer engagement as well as the ability to explore more forms of commerce like streaming. live and influencer based selling. Building an app is just the first step and that’s why we are thrilled to partner with Atul and the whole team at Plobal Apps; not only do they help create mobile apps for their customers in minutes, but they also help them drive adoption, engagement and revenue through the app.”

With a reach of nearly 2.5 million Shopify merchants, Plobal sees a huge market opportunity. Fresh capital from this round will be directed towards building a greater presence in North Americatechnological innovation and the launch of new products.

SOURCE Global Applications

Study from Westmead Hospital finds text messaging program improves lifestyle risk factors in heart attack survivors – thepulse.org.au


A study of the text messaging program, TEXTMEDS, was successful in informing and supporting heart attack survivors on how to prevent a second heart attack.

The randomized controlled study led by Cardiologist and Academic Director of Westmead Hospital and Professor of Medicine at the University of Sydney’s Westmead Applied Research Centre, Dr Clara Chow, investigated whether texting and telephone support to patients could improve risk factors in high-risk individuals. subsequent cardiovascular events.

The trial was the first of its kind to implement a systematic digital health intervention in around 20 hospitals across urban and rural Australia.

About half of all cardiovascular events occur within the first year after a heart attack or stroke, with 20-40% of these patients being readmitted with a subsequent coronary event within 12 months.

To reduce their risk, people who have had a heart attack are encouraged to maintain a healthy lifestyle; manage risk factors for heart disease, including blood pressure, cholesterol and diabetes; and take the medications prescribed by their doctor.

The TEXTMEDS study aimed to improve patient adherence to medication, lifestyle and behavior change.

Hospital admissions for people who have had a heart attack are usually short, and there may not be enough time to provide information and education to support their recovery and how to prevent another heart attack,” Dr. Chow said.

“Post-hospitalization prevention programs can be helpful, however, even with access to these programs, approximately two-thirds of people do not attend due to various barriers including returning to work, hours of rigid schedule, distance or lack of perceived need.”

Participants received four text messages per week for the first six months, then three messages per week for the next six months.

The digital platform developed by the research team applied algorithms that enable the selection of appropriate and personalized messages to support patients who have recently suffered a heart attack across Australia. The text messages explained things like blood pressure and cholesterol goals, how each of the medications worked, and the importance of taking medication regularly. They also covered health topics such as physical activity, diet, quitting smoking and mental health after a heart attack.

Study participants showed improvements in healthy lifestyle measures after 12 months, with text group participants more likely to have a normal body mass index and more likely to report eating five or more servings of vegetables and two servings of fruit each day.

“Even though this study found no significant impact on medication adherence, TEXTMEDS demonstrates that a simple, inexpensive, and personalized SMS-based program can provide systematic post-hospital discharge education and support people after a heart attack with minimal staff.

Of the 509 patients in the text messaging group who responded to a user feedback survey, 86% agreed that the text messaging program was helpful and 63% agreed that the text messaging program reminded them to take their medications and encouraged them to change their way of life.

58% said their diet had become healthier through texting and 48% said they exercised more regularly through texting.

The study was funded by the National Health and Medical Research Council in Australia.

US veterans missing in Ukraine fear capture, families say

Placeholder while loading article actions

Two American veterans have disappeared in Ukraine, and it is feared they have been captured by Russian forces, family members of the missing Americans said on Wednesday.

Alexander J. Drueke, 39, and Andy Tai Huynh, 27, both from Alabama, disappeared in recent days near Kharkiv, a Ukrainian city not far from the Russian border, according to their families. Drueke had served in the US military and Huynh is a Marine Corps veteran, they said.

In phone interviews, the two families shared similar accounts in which the men contacted them on June 8 to tell them they would be unreachable during a multi-day mission. Neither has been heard from since, they said.

Drueke’s mother, Lois, said she received a phone call on Monday from another US citizen who said he was in Ukraine with her son. The caller, whom she did not identify, told her that intercepted communications suggested Russian forces had detained two Americans, she said.

The Russian Embassy in Washington did not immediately respond to a request for comment.

Ukrainian war volunteers return home, counting on a tough fight

alexander Drueke had told his family that he was teaching Ukrainian troops how to use American-made weapons, his mother said.

“Alex was very convinced that he was trained in a way to help Ukrainians be strong and push Putin back,” she added, referring to Russian President Vladimir Putin. “He didn’t go there to fight, but to train.”

Joy Black, who identified herself as Huynh’s fiancée, said he volunteered to fight alongside Ukrainian forces. She also received a phone call on Monday from a person who appeared to be American who told her that Huynh was missing.

“The response we received from our government was very helpful,” Black said. “They took it very seriously. We got the call on Monday morning, and it just went up so high, so fast.

News of the Americans’ disappearance was first reported by London’s Telegraph on Wednesday. The State Department said the Biden administration, which discouraged Americans from joining the war effort, was “aware of unconfirmed reports of two American citizens being captured in Ukraine,” but declined to comment further.

“We are closely monitoring the situation and are in contact with the Ukrainian authorities,” the statement said. “…We also reiterate once again that U.S. citizens should not travel to Ukraine due to the active armed conflict and the singling out of U.S. citizens in Ukraine by the Russian government security official.”

Speaking to the media on Wednesday afternoon, White House spokesman John Kirby said he had no information to share about the missing Americans or if the US government believed they had been captured.

The situation creates another difficult scenario for the United States in its diplomacy with Russia. The Kremlin has detained other Americans for months or years, including WNBA star Brittney Griner and Marine Corps veteran Paul Whelan. Another American held by Russia, Marine Corps veteran Trevor Reed, was released in a prisoner exchange in April.

It is not known how many Americans joined the war. Shortly after the conflict began in late February, Ukrainian officials said around 4,000 people had expressed an interest in doing so.

At least one US citizen, 22-year-old Marine Corps veteran Willy Joseph Cancel, was killed in action.

American killed in Ukraine was a volunteer, other fighters say

Drueke served two tours in Iraq with the US military, leaving around 2010 as a staff sergeant, his mother said. He had struggled with post-traumatic stress since leaving the military, but seemed to find purpose in the Ukraine mission, she added.

Huynh served in the Marine Corps for a few years, including on the Japanese island of Okinawa, his fiancée said.

The Washington Post could not immediately verify the military service history of either man.

Lois Drueke said she last spoke with her son by phone on June 5, then received a message three days later on the Signal encrypted communications platform. His message said he would “go dark” and unreachable for a few days, and would be in touch again after completing a mission.

Alice Crites and Missy Ryan contributed to this report.

Stealth Linux malware. Aoqin Dragon targets Southeast Asia and Australia. Iranian spear-phishing campaign. BlackCat RaaS described.


In one look.

  • Stealth Linux malware.
  • Aoqin Dragon targets Southeast Asia and Australia.
  • Iranian spear-phishing campaign.
  • BlackCat RaaS described.

Stealth Linux malware.

Researchers from Intezer and BlackBerry have discovered a very stealthy strain of Linux malware dubbed “Symbiote”. Notably, the malware is a shared object library that infects all processes running on a machine:

“What differentiates Symbiote from other Linux malware we usually encounter is that it has to infect other running processes to inflict damage on infected machines. Instead of being a standalone executable running to infect a machine, it is a shared object library (SO) which is loaded into all running processes using LD_PRELOAD (T1574.006) and infects the machine from Once it infects all running processes, it provides the threat actor with rootkit functionality, the ability to harvest credentials, and remote access capability. “

Researchers believe that Symbiote was designed to target the financial sector in Latin America.

Aoqin Dragon targets Southeast Asia and Australia.

Sentinel One has published a report on a Chinese threat actor nicknamed “Aoqin Dragon” (pronounced, roughly, “ow-keen”) who conducts cyber espionage in Southeast Asia and Australia:

“We assess the primary threat actor to be espionage and relates to targets in Australia, Cambodia, Hong Kong, Singapore, and Vietnam… The threat actor is familiar with using lures documents with pornographic themes to infect users and makes heavy use of USB shortcut techniques to spread the malware and infect additional targets.Attacks attributable to Aoqin Dragon typically drop one of two backdoors, Mongall and a modified version of the Heyoka open source project.

Iranian spear-phishing campaign.

Checkpoint observed an Iranian spear-phishing campaign that targeted “former Israeli officials, high-ranking military personnel, researchers at research institutes, think tanks, and against Israeli citizens”. The attackers set up a fake URL shortening service, “Litby[.]us”, to redirect users to a fake Yahoo login page:

“One of the simple goals of this campaign is to gain access to its victims’ inboxes, especially for Yahoo inboxes from the feeds we observed. Phishing pages include several steps: ask the user’s account ID followed by an SMS code verification. Interestingly, the truncated phone number in the phishing page was customized specifically for the target and matches public records. We suspect that a once the victim entered their account ID, the phishing backend would send a password recovery request to Yahoo, and the 2FA code would allow attackers to access the victim’s inbox.”

BlackCat RaaS described.

Microsoft released a report on the BlackCat ransomware-as-a-service operation. The researchers said, “BlackCat is one of the first ransomware written in the Rust programming language. Its use of a modern language illustrates a recent trend where threat actors are switching to languages ​​like Rust or Go for their payloads in their attempt to not only avoid detection. by conventional security solutions, but also to challenge defenders who might try to reverse engineer said payloads or compare them to similar threats. BlackCat can target and encrypt Windows and Linux devices and VMWare instances. It has extensive capabilities , including affiliate-configurable auto-propagation for their usage and environment encountered.”

5 Advantages and Disadvantages of Mass SMS Marketing


YONKERS, WESTCHESTER, NY – June 14, 2022 – They say work smarter, not harder, and that sentiment could no longer hold true in modern marketing. Every marketer wants to reach as many people as possible in the shortest possible time, which is essential given how fast things are changing today.

As cold calling and emailing existing and potential audiences becomes less effective, texting has become a preferred communication channel for many. Getting your message across via text can be very effective with the right strategy, and many businesses regularly use bulk texting services.

Bulk SMS is a marketing tool that simultaneously sends promotions, alerts or any other type of message to hundreds or thousands of recipients. There are many benefits to mass texting; fortunately, running a successful campaign shouldn’t be difficult.

This brief guide will help you discover the benefits of starting a mass texting campaign and what to avoid.

Pros: Bulk SMS is profitable

One of the best advantages of using a mass texting service is its cost effectiveness as a means of communication. By sending a mass SMS, companies, schools and municipalities can reach many people in a short time.

Contact methods such as snail mail and emails take longer to compose and are less cost effective than text messaging. The same can be said for cold calling, which requires a dedicated team of phone reps if you’re not using an automated dialing system.

Disadvantage: less human connection

There is something to be said for the human connection when it comes to marketing; in many situations, it remains an essential asset. For example, mass texting is a fantastic strategy for reaching multiple people simultaneously, but it can feel robotic if you’re not careful how you craft your message.

A simple solution to this potential problem is to take the time to develop your message and communicate it to your audience with enthusiasm and tact. Use language that sounds human and give your recipient simple instructions to follow in your call to action.

Advantage: quick form for wide reach

Nothing beats mass texting when you need to reach lots of people quickly. Sending a bulk text is easily one of the best communication methods used in marketing campaigns today. Having the ability to have a fast and wide range is extremely important in situations where you need to alert a large population as quickly as possible.

Municipalities often use mass texting services to send emergency broadcasts because almost everyone has a smartphone and immediately checks an SMS. Likewise, if a school needs to reach out to the student population about a closure or event, they can reach out to their entire school in no time.

Disadvantage: people might think it’s spam

We’re no strangers to daily “Scam Likely” calls. With the scale of spam, it’s easy to feel hesitant about alerts from unknown contacts. People tend to be more cautious of content that could be construed as spam and are unlikely to interact with anything they deem dangerous.

There is a simple workaround and ways to avoid sending texts that look like spam. First, communicate who is sending the message and for what purpose. If the recipient knows why they are receiving a message, they will respond more positively. Also be mindful of how often you are mass texting, as communication is off-putting and can alienate voters.

Pros: Bulk texting is super easy

Marketing is a demanding profession that requires being on the lookout for trends and thinking outside the box. Therefore, finding a way to make your job easier is a must and pays off over time. The great thing about mass texting is that it’s easier than you might imagine and a reasonably streamlined process overall.

All you need to do is compose a thoughtful message, select the contacts you want to receive the text from, and select the best time and date to reach them. Bulk texting services and software do the heavy lifting in creating the code, so marketers just hit send when everything is ready.

Set up a mass marketing campaign now

As you have read, setting up a mass marketing campaign has many advantages, and the disadvantages are easily avoidable with little practice and know-how. At this point, any business with a large audience to reach needs a mass texting service.

Learning how to run a mass texting campaign can dramatically improve your reach or help build customer loyalty. Best of all, mass texting software is generally user-friendly, so you shouldn’t feel nervous about learning it.

MP Adam van Koeverden apologizes after dropping F-bomb on Canadian vaccination mandates


Ontario MP Adam van Koeverden has apologized for insulting a Canadian living abroad who called the former Olympian “a disgrace of a Canadian” for the way he addressed his concerns about the mandates of vaccination.

“Last week I let my emotions get the better of me and I responded in an unacceptable way to a direct message, and I regret that,” said van Koeverden, who represents the Ontario riding of Milton for the Liberals. , in social media. Publish.

“I want to apologize to the person I offended with the message and anyone else I let down.”

Kate Faith, a teacher from Brantford, Ontario. who lives in New Zealand, told CBC News she was not vaccinated. She said she decided against getting the vaccine because she feared she would suffer a reaction that would prevent her family from visiting her in New Zealand.

Faith said vaccination mandates requiring all passengers coming to Canada to be fully vaccinated prevent her from boarding a flight to Canada to visit her parents or attend important family events.

“Last year my grandfather passed away and I had to watch his funeral on FaceTime and right now my uncle is sick and I’m not allowed to come home and see him,” she said.

Faith told CBC News she was fired from her teaching job in November due to her vaccination status. She said she returned to teaching in April when vaccination mandates in New Zealand were dropped.

She said she had written to all Liberal and New Democrat MPs expressing her frustration over the length of Canada’s vaccination mandates, but none of them responded. She said she started contacting MPs on Instagram, but only one MP responded.

In a tense Instagram exchange with van Koeverden, she asked the MP why the vaccination mandates are still in place and suggested it had to do with “corruption and MPs not doing the right thing”.

A tense exchange

“Well, you seem a lot smarter than the epidemiologists I talk to. Sorry for answering,” van Koeverden said in a response.

Faith told van Koeverden that she was a 29-year-old woman who had COVID two months ago and asked her why she wasn’t allowed to fly.

“Not here to tell you Kate, later,” van Koeverden replied.

Faith urged van Koeverden to get evidence to support the vaccination warrants and called the MP “a Canadian’s disgrace”.

“Fuck you,” van Koeverden replied.

Former Olympian Adam van Koeverden was elected to the House of Commons as a Liberal MP in 2019. He is now Parliamentary Secretary to the Minister for Health and Minister for Sport. (Canadian Press)

The MP added that he had ‘made a mistake responding to someone like you’ and wished Faith ‘good luck’.

“He wasn’t receptive and he was quite condescending, just saying I’m not a scientist, but neither was he,” she said. “He just took it all away and said it was justified and said fuck off because I called out his negative behavior.”

Van Koeverden said in his Twitter post that he realizes the past two years have been exceptionally difficult for everyone.

“Going forward, I will work to be more patient and conduct myself with the high standard that people deserve from their elected representatives,” he said in his apology.

MPs need to listen: Lantsman

Faith said Conservative MP for Toronto Melissa Lantsman, who called for an end to vaccination mandates in the House of Commons, responded to her directly about her concerns.

“We told her we were working to reunite her with her family,” Lantsman told CBC News.

Lantsman said that while being an MP is hard work and it can be difficult not to lose your temper, people need to know that MPs are listening to them about their concerns.

Faith said she saw van Koeverden’s tweet back in her language and didn’t think it was genuine.

“I think it would be pretty cool and important for him to reach out to me and apologize. Otherwise, I think it’s just lip service,” she said.

Pumping Now: Launch of the Fuel Information Management System


The Information and Communication Technology Agency (ICTA) has announced the launch of the Fuel Information Management System to improve the efficiency of fuel distribution nationwide.

The initiative is a collaboration between ICTA, Ceylon Petroleum Corporation and the Ministry of Power and Energy.

The fuel information management system will provide the public with visibility into which gas stations are offering fuel and what is available. During the first phase, the system will be updated daily in the morning with fuel shipment information, as well as fuel station details, amount of fuel shipped and stock availability.

The public could search fuel availability by location, gas station and fuel type and the platform will be accessible via web, mobile and SMS. Implementing the system would alleviate the burden, time and hassle of the public queuing at gas stations not knowing when the next tanker of fuel will be received by the gas station.

ICTA Chairman Jayantha De Silva said, “We are pleased to introduce this system with the Ceylon Petroleum Corporation and the Ministry of Power and Energy. Our teams have worked tirelessly to implement this system and we believe it is a timely move to ease the hassle and burden faced by the public.

During the second phase of the system’s implementation, gas stations will be able to issue tokens to the general public. At the same time, the public could also subscribe to updates once stations start rebroadcasting fuel. This feature will soon be available in the system.

The public can log into the system via fuel.gov.lk and follow the instructions. Moreover, one can also use the SMS function by following three simple steps.

1.Step 1 – Type FUEL and send to 1919

2.Step 2 – Fuel availability information will be displayed as follows,

a.Name of shelter

b. Shed phone number

c.Available fuel capacity: P92 (capacity), P95 (capacity), D (capacity), SD (capacity), Kerosene (capacity)

d.Bowser dispatched date and time

e. Date and time of last update

Softball Tournament Honors Shenendehowa’s Deanna Rivers


Meanwhile, another road tragedy forever changes the lives of family members and friends who mourn the loss of another student’s young life.

“That crash on the Northway last weekend was very similar to ours,” said Debbie Rivers, Deanna’s mom. “She was probably coming home and doing nothing wrong and this guy hits her and now she’s gone and he’s walking around. It’s maddening actually.

In that May 28 crash, a New Jersey man was arrested and charged with drunk driving and speeding in a crash that killed a 22-year-old University of Albany student. He now faces charges of manslaughter and aggravated homicide while driving a vehicle. On June 3, mourners gathered at Ballston Spa to bid farewell to crash victim Katryn Fisher on Friday.

Deanna Rivers and her friend Christopher Stewart, both students at Shenendehowa High School, were killed in a drug and alcohol-related crash on the Northway in Saratoga County 10 years ago in December.

The softball tournament gives the high schoolers one last game to end their high school careers while honoring Rivers’ memory. She and Stewart were killed at 17, just months after graduating.

The close-knit softball community that has been such a big part of Deanna Rivers’ life continues to serve as the backbone of an organization that has raised approximately $75,000 over 10 years. This money was distributed to a long list of organizations in the Capital Region, from Joseph’s House, a shelter in Troy where Deanna volunteered for her church, to first responder organizations who worked at the site of the crash and helped save Stewart’s and Rivers’ lives. friends, Bailey Wind and Matt Hardy, who both suffered serious injuries. The foundation has supported Albany’s Westland Hills baseball and softball organization and other community sports programs. The prevention of drunk driving and impaired driving is a permanent mission of the foundation.

“Every organization we donate to, everything we do, has something to do with it,” Debbie Rivers said. “That’s how she was. She was always the child who wanted to help others and give back. It was just his nature.

Shenendehowa Superintendent L. Oliver Robinson will speak at this year’s event.

“Deanna Rivers is the epitome of Shen Pride. Her legacy is an important message for our current and future students at Shen – how she gave back to her community and how she excelled in the classroom and on the softball field – is a story we are proud to share,” Robinson said. . “The Deanna Rivers Foundation has provided our community with connection through sports while awarding scholarships to future leaders, supporting their dreams in memory of Deanna.”

The return of the tournament will be a kind of reunion.

“We ran the tournament flat out and then COVID hit,” Brian Rivers said.

The peak year was 2019. Deanna Rivers softball jersey was number 19 and in 2019 the group gave away $19,000 to the community.

But the pandemic has not stopped their efforts. In 2020, foundation volunteers purchased, packaged, collected and distributed $20,000 worth of food to needy families and overloaded the shelves of the Shenendehowa Helping Hands Food Pantry at Jonesville Methodist Church.

Tournament organizers this year opened the list of softball players who graduated from the classes of 2020 and 2021 and who missed the tournament due to the pandemic.

In the past seven years of hosting the tournament, 72 high schools have been represented.

“Being able to reunite the girls from the past two years who haven’t had the opportunity to play means a lot to us,” said Brian Rivers. Some of these players are friends of their daughter Jenna, who played softball for Shen. Jenna Rivers is also a foundation board member and has just completed her freshman year at Siena College. She plans to get her master’s degree and work as a high school teacher.

The foundation’s board of directors and tournament volunteers, including coaches and referees, have been instrumental in helping the organization achieve its goals. A long list of businesses in the Capital Region donate food and supplies as well as giveaways for the draws.

“So many people have stood by us – and continue to stand by us – over the past 10 years,” Debbie Rivers said. In 2022, in honor of the foundation’s 10th anniversary, an additional $10,000 will be distributed.

PJ Anadio of Herkimer Community College, Mike Brehm of Shaker, Gary Sears of Niskayuna, and travel softball coach Tim O’Gorman served as head coaches throughout the tournament’s eight years. Deanna’s uncle and longtime assistant coach Joe Lanzone joins fellow assistant Lexi Garrison as key volunteers.

Garrison, who is PJ’s assistant coach for the purple team, participated in the 518 Memorial Tournament in 2019 and later played at Herkimer.

“PJ is quite special. Every year, for his team, he only gives his number 19 jersey to someone who replicates what Deanna was. He will choose a player, he will let us know and then we will write him a letter. He also puts on a number 19 banner. PJ and Deanna hit it off and he was trying to recruit her to play Herkimer,” Debbie Rivers said. “I think she brought him into our lives for a reason and he’s been there ever since.”

Shenendehowa softball assistant coach Stephen Decker will lead a children’s clinic with the help of former Shenendehowa softball students. At last count, 55 children were registered.

Deanna Rivers Foundation 518 Memorial Softball Tournament

Sunday 10 a.m. at Miss Shen Fields, Clifton Common Boulevard, Clifton Park

  • Fans are welcome, raffle tickets for gift baskets and donations will be collected at the tournament
  • Raffle tickets can also be purchased through Venmo until noon on Sunday. Donations and raffle ticket purchases can be made through Venmo at @DMRfoundation. Ticket purchasers do not need to be at the tournament to win.

This column is sponsored by Times Union [email protected], the Capital Region’s network of business and professional women. Register today at: https://womenatworkny.com

“I will never forget that night,” Decker said of the accident. “I got the phone call that morning because one of the other kids involved in the accident (Hardy) who I actually had on my JV baseball team at the time. Now, to come full circle and be asked to help is an honor. I worked with Jenna Rivers during my first year working with Shen’s softball program. It will be a nice feature to have all the kids back this year who missed out due to COVID. It will be great to see everyone again.

Liana Bonavita, News10ABC’s soon-to-be-changing athletic director, is the tournament’s emcee.

When the final pitch rolls on Sunday, a champion is determined and a Bonavita-chosen MVP wins a $500 purse. Then the Rivers family will move on to another mission. They will turn their attention to another parole hearing for Dennis Drue, scheduled for July. Drue, 30, formerly of Halfmoon, is serving a 5- to 15-year sentence at the medium-security Collins Correctional Institution in Erie County for the Dec. 1, 2012 crash that killed Rivers and Stewart. In September 2013, Drue pleaded guilty to the 58 charges he faced while admitting he was drunk, speeding and texting when he drove his Volvo sedan into the back of the teenagers’ vehicle, a Ford Explorer.

They plan to create another petition on Change.org and write letters against his release from prison. Around 21,000 people signed the petition while he was on parole in 2020.

Debbie Rivers said she has supported other mothers who have lost children and also speaks in schools about preventing DWI. She recently spoke to students participating in the Anti-DWI Billboard Project at Shenendehowa High School. Prom and graduation seasons are often when school and police officials spend time pleading with teens not to drive while impaired by drugs or alcohol.

“I have met three or four mothers who have lost a child in an accident and we are still in touch. So we help each other get through this together. And I talk to the classes and I just tell my story and you’re just trying to save a life and touch those kids,” Debbie Rivers said.

Just as parents of school shooting victims relive the nightmare every time another mass shooting occurs, victims of DWI-related deaths also find themselves in trouble when other families suffer the same fate.

“People don’t look beyond the accident. You know what I mean? They don’t know what’s going on at every party,” Debbie Rivers said.

“Every birthday,” added Brian Rivers.

Deanna Rivers has always brought out the best in everyone, her parents said. And it is memory that gives them—and its foundation—its strength.

Joyce Bassett’s All In column usually publishes Mondays in the Times Union.

A gun dealer looking to open in Riverhead is the author of a blog disparaging Jews, black people and praising the founder of the Proud Boys hate group


A firearms executive seeking to open on Elton Street in Riverhead wrote a blog for several years in which he espoused views accusing Jews of controlling Congress, posted racist views about black people and launched a campaign to funding for the legal defense of a member of the Proud Boys after the man had been convicted of stabbing another man during a political confrontation.

Anthony Niosi, director of Niosi Firearms Development, which proposed a shooting range, firearms training center and gun store at 680 Elton Street, ran the “SPQR.Today” blog from December 2011 to September 2017.

Niosi in his blog refers to Proud Boys founder and former leader Gavin McInnes, a supporter of violent extremism, as “one of the essential resources for the thinking right”.

Niosi talks about McInnes, whom he describes in the blog post as “an acquaintance”:

“His articulate defense of traditional values ​​and his success in illuminating the fascist tactics the militant left employs to silence conservatives came at a cost,” Niosi wrote.

In a pitch to donate to “Tommy’s Legal Defence” (September 3, 2017), Niosi called out Tommy Christiansen, the Proud Boys member just convicted in the stabbing incident, one of “mostly individuals anonymous caught in the emerging violence of the militant left.

McInnes, co-founder of VICE Media, founded the Proud Boys in the midst of the 2016 presidential election. The Proud Boys describe themselves as “western chauvinists” with an “anti-politically correct” and “anti-white guilt” agenda.

Niosi said in a Thursday night text-messaging interview that he didn’t know McInnes well.

“I only met Gavin once, I guess over six years ago,” Niosi said. “He, his wife, his two daughters and then his infant son visited my house on Dune Rd, WHB. We had been introduced by a mutual friend, and at the time I knew him as someone who had been on Fox TV for several years, basically, if memory serves as a comedic commentator,” Niosi wrote in a text. He called the occasion a “chilling interaction” and said: “I’m not aware of what he’s advocating right now.”

However, he said, “I don’t mean…I’m oblivious to the Proud Boys as part of the zeitgeist.”

In his blog, Niosi called black people “groans about American racism” that “I’ve heard all my life. Barack Obama’s election in 2008 came with ‘a silver lining’ in that “His victory would be to ‘pay for’ the whining…”, he wrote. (“Blue Lives Matter”, July 15, 2016.)

“After a trillion dollars (yes, with a ‘t’) spent on Great Society programs over the past 50 years, the vast majority of black Americans have, fortunately, been given the opportunity to rise to the highest positions. prestigious in our company,” Niosi continued.

“And the dregs then? Activists, dependent multigenerationals, anarchists, nihilists?

“I’m starting to think that skin color is no longer a barrier to getting elected or a multi-million dollar network deal.

“I’m beginning to think the barrier is immersion in ghetto culture, violence, misogyny, rejection of education, and imitation of gang appearance and speech,” Niosi wrote.

He continues, offering advice to “drop the ghetto/gang talk, dress, and attitude” because “America has evolved to the point where the choices of an individual, not the chance of race, will determine his fate. (As written.)

“AnyHowitzer, let’s hope the current situation defuses before self-isolating thugs learn that the locks on our front doors are for their protection, not ours,” he concludes. (As written.)

In a June 29, 2017 article titled “Run…don’t walk,” Niosi addressed the question of whether a person crossing the street “while being approached by a black person” to avoid passing by is racist. Statistics provided by the NYPD show “you shouldn’t cross the street in New York when approached by a black person; they should run,” Niosi wrote, noting that the percentages of those arrested by the NYPD for major violent crimes who are black were disproportionately higher than the percentage of blacks in New York’s population, offering a “logic” that doesn’t does not take other factors into account. , such as the predispositions of arresting officers or the focus on arrests in relation to the crime committed.

Niosi devotes many of his blog posts to discussions of Jews, Israel, and US policy toward Israel and the Middle East. He is an advocate for the BDS (Boycott, Divestment, Sanctions) movement and calls Zionists and Congress members and the media “Israel’s fifth column”.

He says American Jews have ‘dual loyalties’, meaning they are loyal to Israel as well as the United States

“And not to be outdone, Diaspora Jews have been granted infinite preferential treatment by claiming anti-Semitic threats against their synagogues, schools, businesses, lives and personal property. Almost all of these threats have come to light under false flags with the recent arrest of Mr. Michael Kadar, a Jew with American and Israeli citizenships. (As written.)

Referring to an article by Victor Davis Hanson, Niosi writes: “Jew’s [sic] The problem is that they refuse to assimilate. Paranoid for their safety (even in America, their last best hope), they shun their loyalties and are seen as “internationalists” or “cosmopolitans”. And when bad times inevitably follow good ones; as ‘F-ing Treaters’ with divided loyalties.

Niosi said in a text last night that he had ‘no general opinion on any race or religion’. If RiverheadLOCAL’s request for comment on the views it has published on blacks and Jews “is designed to imply bias,” he said, “I will rely on forty years of working with all the ethnicities and religions, including my current business partner. I will freely admit that a reading of some of my polemics clearly illustrates my opposition to any theocratic governance that upsets the opinion of current liberal and academic thought,” he said. he declares.

“One can oppose the actions of a nation without opposing the individual citizens of that nation,” Niosi said.

Michele Lynch, vice president of the Riverhead Anti-Bias Task Force, said today that Niosi’s blog statements should be a red flag for the town of Riverhead.

“Someone making statements like this on a blog is definitely not someone the city should be doing business with — especially this kind of business,” Lynch said.

“These are racist and anti-Semitic thoughts,” she said.

The name of Niosi’s blog itself is associated with the white supremacist movement.

SPQR is an acronym for the Latin phrase “Senatus Populusque Romanus” meaning “The Roman Senate and People”, which in Roman antiquity was a shorthand way of designating the entire Roman state.

“SPQR” has since been adopted by American white supremacist groups as a symbol of their movement. For example, he appeared on flags at the Unite the Right rally in August 2017.

Niosi said he was unaware that “SPQR” had been adopted as a hate symbol by white supremacist groups.

He said he was a lifelong student of Roman history and pointed out that SPQR is the title of a book by classics professor Mary Beard, which he said he was currently reading.

The survival of local journalism depends on your support.
We are a small family business. You rely on us to stay informed, and we rely on you to make our work possible. Just a few dollars can help us continue to provide this important service to our community.
Support RiverheadLOCAL today.

Learn more about Passkeys, passwordless login technology coming to iOS 16 and Android


This story is part WWDC 2022CNET’s full coverage from and about Apple’s annual developer conference.

What is happening

Apple and Google will update their phone software and web browsers later this year with a technology called passkeys, designed to be easier to use and more secure than passwords.

why is it important

Passwords are plagued with problems, but tech giants have cooperated to design a convenient alternative that reduces vulnerabilities and hacking risks.

Apple and Google will introduce support for security keys later this year, a new login technology that promises to be more secure than passwords for protecting access to our bank accounts and emails. Apple demonstrated security keys at its Worldwide Developers Conference and said they would come iOS16 and Mac OS Ventura this autumn.

Access keys are as easy – perhaps easier – to use than passwords. They replace the riot of keystrokes needed for passwords with biometric verification on our phones or computers. They also stop phishing attacks and banish the complications of two-factor authentication, such as SMS codes, which reinforce weaknesses in the password system.

After you set up a password for a site or app, it’s stored on the phone or personal computer you used to set it up. Services like Apple’s iCloud Keychain or Google’s Chrome Password Manager can sync passkeys across your devices. Dozens of tech companies have developed the open standards behind security keys in a group called the FIDO Alliancewho announced security keys in May.

“Now is the time to embrace them,” said Garrett Davidson, authentication technology engineer at Apple, in a WWDC talks about access keys. “With access keys, not only is the user experience better than with passwords, but whole categories of security – like weak and reused credentials, credential leaks, and phishing – are simply no longer possible.”

You will have to spend some time on the learning curve before security keys reach their potential. You’ll also need to decide if Apple, Microsoft, or Google is the best option for you.

Here is an overview of the technology.

What is a password?

This is a new type of login ID consisting of a bit of numerical data that your PC or phone uses when connecting to a server. You approve each use of this data with an authentication step, such as fingerprint verification, facial recognition, a PIN, or the login pattern familiar to Android phone owners.

Here’s the catch: you’ll need to have your phone or computer with you to use the passkeys. You cannot log into a password-secured account from a friend’s computer without your own device.

Security keys are synchronized and backed up. If you get a new Android phone or iPhone, Google and Apple can restore your security keys. With end-to-end encryption, Google and Apple cannot see or change access keys. Apple has designed its system to keep security keys safe even if an attacker or Apple employee compromises your iCloud account.

How does setting up a password work?

It’s quite simple. Use your fingerprint, face, or other mechanism to authenticate a passkey when a website or app prompts you to set one up. That’s it.

A three-step illustration of the authentication key login process on an Android phone

These steps show how to sign in with passkeys on an Android phone: choose the passkey option, choose the appropriate passkey, and authenticate with a fingerprint ID. Facial recognition is also an option on compatible phones.


How do I use a password to log in?

When using a phone, a password authentication option appears when trying to log into an app. Tap that option, use your chosen authentication technique, and you’re there.

For websites, you should see a password option in the username field. After that, the process is the same.

Once you have a passcode on your phone, you can use it to make logging in easier on another nearby device, like your laptop. Once logged in, this website may offer to create a new password related to the new device.

What if I need to log into a website while using someone else’s computer?

You can use a password stored on your phone to log in to another nearby device, like a borrowed laptop. The login screen on the borrowed laptop will have the option to present a QR code that you can scan with your phone. You’ll use Bluetooth to make sure your phone and computer are nearby, and then let you use fingerprint or face ID verification on your own phone. Your phone will then communicate with the computer over a secure connection to complete the authentication process.

Why are access keys more secure than passwords?

Access keys use a proven security foundation called public key cryptography for the login operation. It’s the same technology that protects your credit card number when you enter it on a website. The beauty of the system is that a website only has to base its passkey record on your public key, data designed to be openly visible. The private key used to set up a password is stored only on your own device. There is no database of passwords that a hacker can steal.

Another great advantage is that security keys block phishing attempts. “Security keys are inherently tied to the website or application for which they were configured, so users can never be tricked into using their security key on the wrong website,” Ricky Mondellowho oversees authentication technology at Apple, said in a WWDC video.

Using passkeys requires you to have your device at hand and be able to unlock it, a combination that offers the protection of two-factor authentication but with less hassle than SMS codes. And with passkeys, no one can snoop over your shoulder to watch you type in your password.

When will I see the access keys?

Master keys could emerge this year.

At its Worldwide Developers Conference, Apple said it will bring access keys to iOS 16 and MacOS Ventura, its major operating system software updates expected this fall. In May, Google said it would bring support for Android software passkeys by the end of 2022 for developer testing, said Google Authentication Manager Mark Risher. Passkey support is expected to arrive in Chrome and Chrome OS at the same time. Microsoft is planning Windows support in the coming months.

Some websites and apps will be eager to update their login software to use security keys so that they can enjoy the security benefits. Others will move more slowly. Even though access keys are spreading rapidly, don’t expect passwords to disappear.

Will websites and apps require me to use passkeys?

You are unlikely to be forced to use security keys when the technology is new and unfamiliar. Websites and apps you already use will likely add passkey support to existing password methods.

A person uses a phone to scan a QR code to activate passkey login on a nearby computer

If you need to connect to a friend’s computer who doesn’t have your password, scanning a QR code will allow your phone to handle the authentication process.


When you sign up for a new service, Access Keys may be presented as the preferred option. Eventually, they may become the only option.

Will access keys lock me into the Apple or Google ecosystems?

Not exactly. Although security keys are rooted in a company’s technology suite, you will be able to disconnect, for example, from the world of Apple to use security keys with those of Microsoft or Google.

“Users can sign in on a Google Chrome browser running on Microsoft Windows, using a password on an Apple device”, Vasu Jakkala Microsoft leader in security and identity technologies, said in a blog post in May.

Passkey advocates are also working on technology to allow people to migrate their passkeys from one area of ​​technology to another, according to Apple and Google.

How are password managers involved with access keys?

In short, they are not, for the moment. Password managers are playing an increasingly important role in generating, storing, and synchronizing passwords. But the passkeys will be rooted to your phone or personal computer, not your password manager.

That could change, however.

“We expect a natural evolution toward an architecture that allows third-party passkey managers to plug in and portability across ecosystems,”

Google’s Risher expects security keys to evolve to reduce barriers between ecosystems and accommodate third-party security key managers. “That’s been a talking point since the start of this industry push.”

1Password maker AgileBits has just joined the FIDO Allianceand DashLane and LastPass are already members.

Brazil asks Mexico to solve the problems that delay travelers


Passengers, wearing protective masks following an outbreak of the coronavirus disease (COVID-19), wait for flights at the Aeromexico counter at Benito Juarez International Airport in Mexico City, Mexico, July 1, 2020. REUTERS/Edgard Garrido

Join now for FREE unlimited access to Reuters.com


MEXICO CITY, June 9 (Reuters) – Brazilian officials on Thursday expressed concern over a bureaucratic standoff thwarting the plans of hundreds of Brazilians trying to travel to Mexico.

Brazil’s foreign ministry said hundreds of Brazilians are unable to process an electronic authorization required to enter Mexico and it is following the matter “with concern”.

The ministry added in a statement that it had requested urgent action from the Mexican Ministry of Foreign Affairs and Tourism and the National Institute of Migration (INM) to resolve the problem with the website that processes the authorization.

Join now for FREE unlimited access to Reuters.com


Mexico ended a visa waiver program for Brazilians in December 2021, but Brazilians traveling by air can enter Mexico if they submit a so-called electronic authorization form 30 days before travelling.

About 200 people struggled to submit the form last week, according to news outlet GZH.

The Mexican consulate in Sao Paulo, whose Facebook page has been inundated with complaints, said in an email to Reuters that it was not involved in the electronic authorization process, noting that the service is provided by the Institute. National Migration Board (INM).

“INM’s electronic authorization system continues to experience problems. So far, there is no estimate when it will return to normal,” the consulate said, adding that those who need authorization should try again or make an appointment with the consulate to apply for a visa.

“I’m about to lose nearly 10,000 reais ($2,042) and see my dreams turn into a nightmare,” one person wrote on Facebook, while GZH quoted a couple saying they missed their flight for a five-day trip due to publish.

On the INM website, most requests received a message that the authorization “could not be processed”.

“If you want to travel to Mexico, you can go to a Mexican consulate to get a visa,” the post read.

Neither Mexico’s INM nor the ministries of foreign affairs and tourism immediately responded to a request for comment.

Join now for FREE unlimited access to Reuters.com


Reporting by Carolina Pulice, Gabriel Araujo and Kylie Madry; Editing by Brendan O’Boyle

Our standards: The Thomson Reuters Trust Principles.

New implicit bias training requirement – ​​June 1, 2022


The Michigan Department of Licensing and Regulatory Affairs (LARA) now requires implicit bias training for physicians and other healthcare professionals. The requirements apply to new applicants as well as those renewing their existing licenses or registrations on or after June 1, 2022.

Below are some frequently asked questions and their answers regarding the new training requirements:

Which professions must comply with this new rule regarding training on implicit biases?

All healthcare professionals licensed or registered under the Michigan Public Health Code are required to complete implicit bias training. This includes medicine, osteopathic medicine, nursing, and physician assistants.

Are MSMS implicit bias training opportunities acceptable for re-licensing of other healthcare providers?

Yes, MSMS Implicit Bias Training is acceptable to all healthcare professionals.

When does this requirement begin?

The new requirement took effect June 1, 2022. If you are renewing on or after June 1, 2022, training is mandatory. JThe training is also required for all new license applications received on or after June 1, 2022.

How many hours of training do I need?

New candidates to obtain a license must have completed 2 hours of implicit bias training in the 5 years immediately preceding the issuance of the license or registration.

Renew licensees are required to complete 1 hour of implicit bias training for each year of their licensing or registration cycle. However, for initial renewal after June 1, 2021, licensees will only need one hour for each year since the rule’s June 1, 2021 enactment date.


Renewal deadline

Implicit biases Hours of training required

June 1, 2021 – May 31, 2022


June 1, 2022 – May 31, 2023

1 hour

June 1, 2023 – May 31, 2024

2 hours

June 1, 2024 – May 31, 2025

3 hours

Subsequent renewals will require 1 hour of implicit bias training for each year of the license or registration cycle. For fully licensed doctors, it will be 3 hours for their 3 year license.

How is this training different from other mandatory CMEs?

1. Training should include strategies to reduce disparities in access to and delivery of health care services.

2. Training should include the administration of implicit bias assessments before and after testing.

3. The training must have a live component.

Does watching a video meet the training requirements?

No. Only recorded or archived content is not allowed, a live component is required that incorporates interaction between participants (both with each other and with the instructor). Acceptable training modalities are teleconference or webinar that allows for live synchronous interaction, live presentation, or interactive online instruction.

BUYERS BEWARE!! Many professional medical education companies are rushing to provide implicit bias content in order to meet Michigan’s license renewal requirements. Although they claim to meet Michigan LARA requirements, most do not. Please ensure that your class has a live (i.e. in-person) component and that a pre-AND-post implicit bias assessment is included.

What courses can I take through MSMS?

MSMS has many opportunities to meet your implicit bias training needs from 1-3 hours of training.

The MSMS Foundation has worked with diversity and equity experts across the state on an all-new two-part monthly series, titled “Reducing Unconscious Bias – An Imperative (RUBI): Rationale and Impacts on Patient Care“, which includes a one hour video on demand followed by a half hour live webinar. To meet the implicit bias requirement, physicians will need to complete parts 1 and 2 to receive 1.5 AMA PRA™ Category Credit(s).

After completing Part 1, participants can choose one of the following sessions from Part 2 to complete the activity:

June 15, 2022

July 13, 2022

August 10, 2022

September 21, 2022

October 12, 2022

November 16, 2022

November 30, 2022

All sessions will take place from 12:00-12:30 p.m.

Additional opportunities for 2022 include:

Title of the conference:




A Day of Board of Medicine Renewal Requirements – September 2022

September 23, 2022

Live Onsite – Marriott East Lansing

1 hour of medical ethics

Pain and symptom management in 3 hours

3 hour implicit bias

Monday night medicine: implicit bias

October 3, 2022

Virtual live

Implicit bias of 1.5 hours

ASM: implicit bias

October 13, 2022

Virtual Live

3 hour implicit bias

A Day of Board of Medicine Renewal Requirements – November 2022

November 4, 2022

Live onsite – Sheraton Ann Arbor

1 hour of medical ethics

Pain and symptom management in 3 hours

3 hour implicit bias

Monday night medicine: implicit bias

November 7, 2022

Virtual Live

Implicit bias of 1.5 hours

More information on the MSMS Implicit Bias Monthly Series>>

Accreditation Statement: The Michigan State Medical Society (MSMS) is accredited by the Accreditation Council for Continuing Medical Education (ACCME) to provide continuing medical education for physicians.

AMA Credit Designation Statement: The MSMS designates this live activity for a maximum of 1.5 AMA PRA Category 1™ credit(s). Physicians should only claim credit commensurate with the extent of their involvement in the activity.

Nurses: ACCME is approved by the Board of Nursing as an acceptable continuing education provider for license renewal or renewal.


Scam Calls To Australian Phones Halved As Crypto SMS Scams Soar | Scams


Fraudulent phone calls have halved since this time last year, according to data from the Australian Competition and Consumer Commission’s Scamwatch shows, but other investment fraud – including on social media and SMS – soared over the same period.

The Fraudulent Calls Discount Code was introduced by the Australian Communications and Media Authority (Acma) in December 2020. It has seen telecom operators block over 549 million fraudulent calls since its inception.

The code was developed by the Communications Alliance, the communications industry’s flagship body, in conjunction with major vendors and had been in the works for several years.

Communications Alliance chief executive James Stanton said: “The code has significantly improved communication and coordination of actions between operators to identify, track and block fraudulent calls.”

“The difficulty is that scammers are incredibly nimble. As soon as they see a blocked avenue, they know very well how to find a new one to exploit. So it’s a constant car chase to try to prevent this activity.

The code’s introduction coincided with a major spike in phone scams during the pandemic, underscoring the need for an industry-wide approach.

Stanton said most vendors had provisions in place to tackle scammers, but consolidating processes and creating legally binding liability provided more effective deterrence.

The code requires telecommunications providers to monitor their networks and identify patterns of fraudulent calls, then block them.

Significantly, it also requires participants to inform other telecommunications companies and the regulator of the identified scam, so that the rest of the industry can be alerted.

Acma’s Fiona Cameron said the code had been effective but the adaptability of the crooks meant the fight was far from over.

“You will always find that the phone is the most used way for scammers to reach potential victims. And that’s largely because scammers choose very easy targets. And if you have a landline phone at home, if you are older and more at home and more available to pick up the phone, the scammers will come to you,” Cameron said.

“In 2020, when we were developing the code, we didn’t want to make the phone such an easy target.”

Data from the ACCC shows Australians lost over $205 million in the first four months of 2022, with the majority of losses stemming from “crypto investment scams” ​​which rose by over 300%. These scams were mostly via text – a method that has seen a 54% increase in scams since last year.

ACCC Vice-Chair Delia Rickard said: “Australians should be wary of anyone asking them to invest or transfer money using cryptocurrency, especially if it involves someone you’ve only met online. Many consumers are unfamiliar with the intricacies of cryptocurrency and this can make them more vulnerable to scams.

A new code that will be implemented this year will try to tackle text messaging in the same way as the telephone code. The project has been finalized by the Communications Alliance and is currently being reviewed by Acma.

“The text code has now been registered with us and we will, over the next few weeks, be working to ensure that all safeguards that we believe are necessary are in the code,” Cameron said. She also confirmed that the new code had been delayed due to privacy concerns with telecom operators accessing text messages to scan them for scams.

Verizon Customers Unable to Call City of Bend Offices; alternative access methods offered


BEND, Ore. (KTVZ) — Anyone calling a City of Bend phone number from a phone with Verizon service couldn’t get through Tuesday, city officials said, because they were offering other ways to reach various services.

The city said Verizon customers were getting an “all circuits are busy now” or “you’ve reached a number that’s not working” message because of a call routing issue with Verizon’s network.

“We apologize for any inconvenience and do not know how long it will take Verizon to resolve this issue,” the city said in its announcement, which continues below:

Emergencies should always be directed to 911 and non-emergencies to 541-693-6911. These are not City phones and are not affected by the outage.

Here are some alternatives to help Verizon customers access City services:

Utility Billing:

  • To access the Utilities Billing Call Center, email [email protected] or visit in person at 639 NW Franklin Avenue, open Monday through Friday, 8 a.m. to 5 p.m.
  • Customers can make utility bill payments online at [email protected] or through drop boxes located on the City Hall Campus, 710 NW Wall Street, West Parking Lot; inside the double doors of City Hall at the West Entrance or in the Utility Billing Lobby on Franklin Avenue.

Public services and public worksinfrastructure questions or issues: [email protected]

Transport & Mobility Department:

Department of Community and Economic Development:

For planning and permitting questions, email [email protected] or visit the Permit Center at City Hall, 710 NW Wall St., which is open to the public.

Curve font:

Email [email protected] or visit Lobby 555 NE 15th Street between 8:00 a.m. and 5:00 p.m.

town hall or other?

For other general questions not covered above, email [email protected] and City Hall staff will route the message.

No access to email?

For those unable to access a computer or send email to the above addresses, City Hall reception staff are also monitoring a cell phone until the problem is resolved. Dial 541-410-9341 and staff will forward your message to the appropriate location.

City phones can call, so we can call back people who email us a phone number.

Ubse.uk.gov.in Uttarakhand UBSE Result Available Now


Check Details on Uttarakhand UBSE 10th, 12th Results 2022

New Delhi:

UK Board 10th, 12th results 2022: The Uttarakhand Board of School Education (UBSE) declared the 10th and 12th UK Board results today, June 6. percent. In the 10th and 12th exams, the girls outperformed the boys. UK board 10th, 12th result 2022 – Direct link

Last: Check out the top 100 careers after 12th grade. Free download!
Don’t miss: Best Courses after the 12th Sciences/Arts/Commerce, Get it here
Recommended: Popular courses after 10th class, Free download!
Browse: Best Colleges in Uttarakhand after 12, Access now!

Uttarakhand Board result is available at ubse.uk.gov.in. Students can check their results at Uttarakhand High School (HS) and Inter Board using their matriculation number, date of birth and captcha code. A total of 2.42 lakh (2,42,955) candidates sat for the 10th and 12th UK Board Examinations 2022; 1.29 lakh (1 29,785) students showed up for high school (class 10) and another 1 lakh for intermediate exams (class 12).

UK Board 10th 12th result 2022: How to check

  • Visit the official website – ubse.uk.gov.in
  • Click on the link “UBSE 10th, 12th result”
  • Enter your registration number and your captcha code
  • Now click on “Get Result” button
  • UK Board 2022 result will appear on screen
  • Download it and print it for future reference

Live updates

UK Board 10th, 12th Result 2022 Live Updates: Uttarakhand Board UBSE has announced the results of the 10th, 12th class 2022 on the official websites uaresults.nic.in, ubse.uk.gov.in. Know how to tick marks, time, link, topper list.

4:40 p.m. HST

June 6, 2022

UK Board 10th Result 2022: Girls Shine In High School Exam

A total of 84.06% of female students passed the High School Examination, Class 10 in 2022, while the passing percentage among male students was 71.12%. The overall pass rate was 77.47%.

uk board result 2022 class 10,uk board result 2022 kab ayega,uk board 10th result 2022,uk board 12th result 2022,uk board 10th result 2022 date be declared?,how to check uttarakhand board result? ,How to check uttarakhand result

By submitting your details, you are registering with Careers360

4:32 p.m. HST

June 6, 2022

UK Board 12th result 2022: girls outperform boys

The pass percentage for female students in the UK Board’s 12th result was 85.38%. The passing percentage for the male student was 79.74%. The girls outperformed the boys in the UK Board’s 12th exam.

uk board result 2022 class 10,uk board result 2022 kab ayega,uk board 10th result 2022,uk board 12th result 2022,uk board 10th result 2022 date be declared?,how to check uttarakhand board result? ,How to check uttarakhand result

4:22 p.m. HST

June 6, 2022

UK Board 12th Result 2022: 82.63% Pass in Class 12

A total of 82.63% of pupils passed the UK Board Class 12 exam. Education Minister Dhan Singh Rawat congratulated the pupils who passed.

4:11 p.m. HST

June 6, 2022

UK Board 10th result 2022 declared, 77.74% pass

A total of 77.74% of students passed the 10th UK Board exam 2022 this year.

4:08 p.m. HST

June 6, 2022

UK Board 10th, 12th 2022 results reported

The Uttarakhand Board (UK Board) Class 10, 12 declared results. Students can check the 10th, 12th result on the official website – ubse.uk.gov.in.

3:54 p.m. HST

June 6, 2022

UK Board 10th, 12th Results 2022: Press conference to start soon

The UK Board 10th, 12th 2022 results press conference will begin at 4pm. Minister of Education, Dhan Singh Rawat will announce the pass percentage for Class 10, 12 shortly.

3:51 PM IST

June 6, 2022

UK Board 10th, 12th Results 2022: SMS Steps

Students can check UK Board 10th, 12th results via SMS. They should send the UK10/UK12 Roll Number to 56263.

3:46 p.m. HST

June 6, 2022

UK Board 10th, 12th Results 2022: How to Download Scorecard via Digilocker

  • Visit the digilocker online portal
  • Enter your login credentials – Aadhar card, mobile number, email id, Aadhar number
  • Submit Details
  • Click UBSE 10th, 12th Certificate of Achievement
  • Your grade sheet will appear on screen
  • Download and print for more references.

3:41 PM HST

June 6, 2022

UK Board 10th, 12th Results 2022: Minimum Passing Scores at Ubse.uk.gov.in

Students must achieve a minimum of 33% marks in each subject and overall to pass the 10th and 12th UK Board Examinations 2022.

3:35 PM HST

June 6, 2022

UK Board 10th, 12th Results 2022: Past Years Pass Percentage

Last year, 99.09% of the total students passed the class 10 exam, while 99.56% of the students passed the 12th exam. The passing percentage in 2020 was 83.65% in class 10 and 80.26% in 12th.

3:29 PM IST

June 6, 2022

UK Board 10th, 12th Result 2022: Education Minister Dhan Singh Rawat to announce result at 4pm

Uttarakhand Education Minister Dhan Singh Rawat will announce the results of Class 10, 12-4 p.m. Direct link, websites to get UK Board 10th, 12th results at ubse.uk.gov.in

3:16 PM IST

June 6, 2022

UK Board Result 2022 At Ubse.uk.gov.in: Credentials On 10th, 12th Result 2022

These are the details mentioned on the UK Board 10th, 12th score card 2022.

  • Applicant’s name, school number and contact details
  • Marks obtained in each subject
  • Grades obtained by students in each subject
  • Total scores
  • Pass/fail status.

3:12 p.m. IST

June 6, 2022

UK Board 12th Result 2022 When?

The 12th result of the UK Board 2022 will be announced in an hour for students in classes 10 and 12 on ubse.uk.gov.in.

3:03 PM IST

June 6, 2022

Uttarakhand UBSE 10th, 12th Results 2022 At Ubse.uk.gov.in: How To Check

  • Students should visit the official website- ubse.uk.gov.in
  • Click on the UBSE 10th, 12th result link
  • Use your registration number and your captcha code
  • UBSE 10th, 12th result 2022 will appear on screen
  • Download, print for more references.

2:58 PM HST

June 6, 2022

UK Board Result 2022 Class 10 and 12 Result Time

The 10th and 12th Uttarakhand Board Results 2022 will be announced by press conference at 4 p.m. Class 10, 12 results will be available on the website- ubse.uk.gov.in.

2:46 p.m. HST

June 6, 2022

British High School Results

UK Board High School results will be announced at 4pm on the official website ubse.uk.gov.in.

2:32 p.m. HST

June 6, 2022

Uttarakhand Council 10th, 12th result

Uttarakhand Board 10th, 12th result can be viewed on UBSE official website.

2:29 PM HST

June 6, 2022

Ubse.uk.gov.in Result 2022

Students can check their Uttarakhand High School (HS) and Inter Board 2022 results using their matriculation number on the official website – ubse.uk.gov.in.

2:22 p.m. IST

June 6, 2022

Uttarakhand Result 2022: How to Check Result via SMS

To check UK Board 2022 result date by SMS type UT12 and send it to 5676750.

2:15 PM IST

June 6, 2022

UK Board Result 2022: Websites

The result of the UK Board 2022 will be available on-

  • results.nic.in
  • uaresults.nic.in
  • ubse.uk.gov.in

2:09 PM IST

June 6, 2022

UK Board Result 2022 Kab Ayega

Several students have been asking for the UK Board 2022 kab ayega result on social media. The Uttarakhand Board of School Education (UBSE) will declare the UK Board 2022 result today, June 6, at 4 p.m.

2:03 p.m. HST

June 6, 2022

How to check Uttarakhand result?

  • Visit the official website – ubse.uk.gov.in
  • Click on the link “UBSE 10th, 12th result”
  • Enter your registration number and your captcha code
  • Now click on “Get Result” button
  • UK Board 2022 result will appear on screen

Read more

13:52 IST

June 6, 2022

Www.ubse.uk.gov.in Result 2022

UK Board Class 10, 12 2022 results will be available on the official website-ubse.uk.gov.in.

1:44 p.m. HST

June 6, 2022

Uttarakhand 12th result 2022

The 12th UBSE Uttarakhand 2022 result will be announced at 4pm today.

1:40 p.m. HST

June 6, 2022

How can I check my 10th class result in the UK?

To check UK Board 10th results, students must use their school number, date of birth and captcha code. Class 10 grade sheets will appear on screen, download and print for further reference.

1:35 PM IST

June 6, 2022

UK Board Result 2022

Uttarakhand Board of Directors will announce UBSE Class 10, 12 2022 results on Monday June 6th.

Attack on Owo church kills dozens of Nigerian Catholics…… | News and reports


ABUJA, Nigeria – Terrorists launched a gun and bomb attack at the end of a Catholic Mass in southwestern Nigeria on Sunday, killing around 70 worshipers according to locals and church leaders .

Terrorists attacked St. Francis Xavier Catholic Church in Owo, Ondo state at around 9am, church leaders and residents told Morning Star News (MSN) via text message shortly. after the attack.

A priest from the church, Andrew Abayomi, told MSN that as the worship drew to a close, the terrorists threw explosive devices and fired on worshipers.

“We were in worship when the terrorists attacked us. They fired on the congregation by breaking into the church by throwing improvised explosive devices at the church building,” Abayomi said. “Some of us hid inside the church as they fired at us randomly. It lasted about 20 minutes before they retreated.

He said it was difficult to give details of the numbers killed and injured as officials were focused on moving the injured to hospitals.

Among other Owo residents, Loye Owolemi said around 70 worshipers were shot dead and others abducted when terrorists attacked the church service.

“Today is a black day in Owo town, Ondo state, as around 70 Christians were killed in an attack on a Catholic church,” another resident of Owo told MSN. Owo, Augustine Aluko. “Christian victims were killed while on worship service.”

Ondo Governor Arakunrin Oluwarotimi Akeredolu said it was “Black Sunday” in Owo.

“Our hearts are heavy. Our peace and tranquility have been attacked by the enemies of the people,” Akeredolu said in a press release. “This is a personal loss, an attack on our dear state. … I am shocked to say the least.

“Nevertheless, we will commit all available resources to tracking down these attackers and making them pay,” the governor said. “We will never pander to the machinations of heartless elements in our resolutions to rid our state of criminals.”

Although no one immediately took responsibility for the attack, mostly Muslim Fulani herders were suspected. They carried out kidnappings and killings mainly in northern Nigeria, but were increasingly active in the otherwise peaceful Ondo state, prompting the state government to set up recent restrictions on grazing.

Adeyemi Olayemi, an Ondo lawmaker, told reporters that Fulani terrorists were suspected, likely in retaliation for grazing restrictions put in place in response to an increase in kidnappings in the state.

“We have enjoyed better security since herders were driven out of our forests by this administration,” Olayemi reportedly said. “This is a retaliatory attack to send an evil message to the governor.”

Muhammadu Buhari, President of Nigeria, condemned the attack.

“No matter what, this country will never give in to evil and the wicked, and darkness will never triumph over light,” Buhari said. “Nigeria will eventually win.”

Numbering in the millions across Nigeria and the Sahel, the predominantly Muslim Fulani include hundreds of clans of many different lineages who do not hold extremist views. But some Fulani adhere to radical Islamist ideology, the UK’s All-Party Parliamentary Group for International Freedom or Belief (APPG) noted in a recent report.

“They adopt a strategy comparable to that of Boko Haram and ISWAP (Islamic State West Africa Province) and demonstrate a clear intention to target Christians and powerful symbols of Christian identity” , says the APPG report.

Christian leaders in Nigeria said they believed the herdsmen’s attacks on Christian communities in Nigeria’s middle belt were inspired by their desire to forcibly seize land from Christians and impose Islam, as desertification has made it difficult to maintain their herds.

According to the 2022 World Watch List (WWL) report by Open Doors, Nigeria leads the number of Christians killed for their faith last year with 4,650 (from October 1, 2020 to September 30, 2021), compared to 3,530 for the previous reference period. The number of kidnapped Christians was also the highest in Nigeria, at over 2,500, compared to 990 the previous period.

Nigeria is second only to China in the number of churches attacked, with 470 cases listed, according to the report.

In the 2022 WWL ranking of the 50 hardest countries to be a Christian, Nigeria jumped to seventh place, its highest ranking ever, from ninth the previous year.

First published on Morning Star News

WhatsApp for iOS to add another verification code to prevent fraud


WhatsApp for iOS will soon add another layer of protection when a user tries to log into an account for the first time. After people started being tricked into giving their verification code to criminals last year, WhatsApp is finally considering a way to prevent this from happening.

According WABetaInfo, WhatsApp is developing a double check code to improve user privacy and security. The post explains that when you try to register your phone number on another smartphone, you will be asked for an additional verification code in addition to the first verification code sent via SMS.

WhatsApp will display the following message:

The XXX number is already used for WhatsApp on another phone.

To ensure that your account is under your control, you must confirm another verification code. For added security, you must wait for the timer to expire before you can send the code. When you receive the code, enter it here.

WABetaInfo indicates that when the first attempt to login to a WhatsApp account is successful, another 6-digit code will be required to complete the process. With this, another message will be sent to the owner of the phone number, so that they know that an attempt to log in to their account has just occurred.

As this is a feature in development, it is unclear when or if it will see the light of day. That said, it is very interesting to see a third layer of protection on WhatsApp. In case you don’t know, from now on, besides the 6-digit code you have to add when trying to log in to a new phone, you can also enable a 6-digit PIN to prevent unwanted access .

With this new feature, users will have another layer of protection to avoid having their account stolen.

What do you think of this upcoming feature, would you use it? Share your thoughts in the comments section below.


FTC: We use revenue-generating automatic affiliate links. After.

Check out 9to5Mac on YouTube for more Apple news:

Manny Banuelos’ Yankees debut is a ‘dream come true’ – and a highlight of the season


NEW YORK – If you don’t know the story of Manny Banuelos, you were probably too young to stay up late enough to see him make his Yankees debut on Friday night anyway.

Now get off my lawn.

If you know Banuelos’ story and weren’t impressed when he stood behind the mound to soak it all up before his first pitch, you should check your pulse. If your heart is beating, in fact, you should pinch your cheek. And if you are somehow in touch with reality, you should be in touch with your emotions.

“That was the coolest part of the night, I think,” said Gerrit Cole, who didn’t do much unless you were planning to take a perfect 6 2/3 innings game in a 13-0 Tigers blowout at Yankee Stadium also pretty cool.

Yeah, Cole flirted with history, and the Yankees treated the basics like a merry-go-round, but it was Banuelos who stole the show, stole the night, and won the Yankees Game Player’s Championship belt in an emotional in camera. Party.

“My dream has come true,” Banuelos said.

In 2011, a 20-year-old Banuelos was the Yankees’ most exciting prospect, a southpaw who seemed destined to lead the rotation in the Bronx for years to come.

In 2015, injuries and inconsistencies forced a 24-year-old Banuelos out of the organization via a trade with the Braves.

Last year, he was a pitcher in Taiwan.

But on Friday night Banuelos, 31, pitched two scoreless innings for the team he loved in Mexico, long after so many people – probably including Banuelos at one point – never thought that he would come back.

Banuelos struck out one and allowed a hit behind Cole’s seven innings.

“It was awesome,” manager Aaron Boone said. “It was emotional in (the clubhouse). Obviously, most of you are aware of his story for being here. He’s just a great guy. To see him achieve this later than expected but never giving up, never losing sight that this was what he wanted to do and where he wanted to do it. Watching people persevere through so many different things is special.

Banuelos joined the organization in the offseason, impressed in spring training, but was cut off at camp at the last minute when he finally looked like he was about to wear pinstripes. But he went to Triple-A Scranton/Wilkes-Barre, persevered, and the Yankees called him up on May 26.

He had to wait until Friday for his debut with the Yankees. It couldn’t have come at a better time. His wife and daughter were in the stands to watch. Wide receiver Jose Trevino, who was a Yankees fan in high school when Banuelos was a hot prospect, delivered a heartfelt message to Banuelos on the mound early in the eighth inning.

“I know the story,” Trevino said. “Everyone should know the story. The trip was long. I know a lot of people dream of playing with the Yankees, and this was one of his. I just went over there and just said to him, ‘Hey, man. Welcome to the house. This is where you’re supposed to be. This is where you are right now. Enjoy it.’ You could tell the emotions were running high, but I think he did a good job.

Trevino added: “Stories like that, those go a long way, not just for guys but for kids all over the world. Maybe you are not where you are supposed to be right now. But, later, that doesn’t mean you can’t come back.

Baneulos has returned. He said he had received the first baseball pitch. He said he would take it home and display it amid baseballs he signed by Derek Jeter and Mariano Rivera during his spring training with the Yankees in 2012.

“I’ve been waiting for this for a long time,” Baneulos said.

And so many Yankees and their fans will remember it for years and years.

Please subscribe to us now and support the local journalism YOU rely on and trust.

Brendan Kuty can be reached at [email protected].

UOmail security change on June 27 may require action


The latest stage of a security upgrade for the UOmail system could temporarily disrupt email access for some members of the University of Oregon community later this month.

On June 27, News Services will complete a behind-the-scenes change that will require email programs to use a newer, more secure way to verify login credentials for the cloud-hosted UOmail service. The University of Oregon is moving to “modern authentication” ahead of Microsoft’s global deadline in October for everyone using Exchange Online, the platform behind UOmail.

After the change, some students and employees may receive an automated email with the subject line “Your email access has been blocked”.

UOmail users who receive such a message can still access their email through a web browser at uomail.uoregon.edu.

The message usually indicates that it is necessary to adjust the settings of the messaging application on one or more devices to continue to access UO messaging through this application. The easiest way to do this is to remove the UO email account from the Mail app and then add it back. Instructions are available on the Modern Authentication page of the UO Services Portal.

Older devices are more likely to experience this hiccup.

“Because people check email on different devices at different times, it’s hard for us to know who will be impacted by this change,” said Patrick Chinn, associate chief information officer for customer experience. “We recommend that all UOmail users bookmark both the UOmail URL and the Modern Authentication Info page in case you need it on June 27.”

Removing an account from an email program will delete all associated emails from that device. However, these messages and other data will remain in the UOmail service in the cloud. When the account is added to the messaging app, it prompts the device to download all that data again.

“If you have a lot of email messages or calendar items, plan to do this step when you have several hours to spare,” Chinn said. “Adding the account is quick, but your data will take time to transfer.”

Many faculty, staff, and students are already using Modern Authentication, either because their email program automatically configured their UO account that way, or because information services recently moved their account to the modern authentication pool.

“We gradually moved UOmail accounts to the ‘modern authentication’ requirement throughout the spring, starting with accounts that seemed least likely to be impacted,” Chinn said. “We’re sorry for the inconvenience some people experienced, but we’re happy to report that browsing was smooth for the most part.”

Since early April, news services have been emailing accounts that may be impacted by the change due to the use of older authentication protocols. This outreach will continue for the rest of June.

Anyone seeking help with email can contact the IT staff that supports their unit or the Technology Service Center or submit a ticket through the UO Service Portal’s Email and Calendar Help page.

New text alerts for missing dogs and cats in Charlotte, North Carolina


A North Carolina lawmaker has added to his pet-centric business to launch a new text-based service to help find lost pets.

NC Rep. John Bradford, III, a Republican from the northern county of Mecklenburg, was brought up in a house full of animals, including squirrels and rabbits rescued by his mother. He owns Pet Screening, a service for landlords and landlords aimed at helping them accept more tenants who have pets.

Last month he launched FidoAlert and tabby alert, a free service that uses text messages to alert neighbors to lost pets and reunite pets with families. In a recent interview with The Charlotte Observer, Bradford said the goal was to keep pets safe and that a wider user base would broaden the reach of alerts.

Text alerts for missing animals

The technology sends SMS alerts with credentials and a photo of the animal to all registered users within five miles of where the animal was last seen. When users register, they enter their phone numbers, up to 10 emergency contacts and information about their pets into the system. In return, the PetScreening sends a free stainless steel tag with a QR code that anyone can scan and find information about the pet’s owner.

The cat plates are shaped like a mouse and the dog plates are shaped like a bone. The back of the tag displays a nine-digit unique ID number in addition to the FidoAlert or TabbyAlert website, so those without a phone that scans QR codes can also find the owner. When someone finds the animal, the owner and their emergency contacts are notified by text message.

Texts are the fastest form of communication, Bradford said. This is essential, as an extinct animal becomes more endangered with each minute it is lost. More than 10 million dogs and cats in the United States are lost or stolen each year, according to the American Humane Association.

Fortunately, CMPD’s Animal Care and Control Unit stray dog ​​admissions have dropped from 5,511 dogs and cats in 2019 to 1,384 stray dogs as of April 30, 2022. Yet Melissa D. Knicely of CMPD ACC says the microchip and extra layers of tracking are vital to keeping animals safe. She signed up for FidoAlert and praised the user-friendly experience, as well as the fact that it’s free and at no additional cost.

Before entering politics and founding PetScreening, Bradford ran a property management company in Charlotte that he always made sure was pet-friendly. When their insurance made them exclude certain dog breeds, he changed the company’s insurance so that all breeds were welcome on their properties. After running the company for 13 years, Bradford moved on and launched PetScreening. The service provides pet owners and owners with information about pets and their education that assures them that it is safe for owners to keep their pets with them.

Pet Events Charlotte

The FidoAlert/TabyAlert team kicked off a tour across North and South Carolina with their “first annual lifesaving meeting” last Saturday in Iredell County. Here are the events in the Charlotte area:

Saturday, June 4 from 12 p.m. to 5 p.m.: Doggie Day at Sycamore Brewing

Thursday, June 30 from 7 p.m. to 10 p.m.: Charlotte Knights Bark in the Park

Friday, July 15, 7 p.m. – 10 p.m.: Charlotte Knights Bark in the Park

Sunday July 17 from 12 p.m. to 7 p.m.: Doggie Day Summer Blitz at Sycamore Brewing

This story was originally published June 3, 2022 5:00 a.m.

Charlotte Observer Related Stories

The Scripps Whittier Diabetes Institute celebrates four decades


In 1982, Zach Leigh was one of a handful of kids who helped start the Scripps Whittier Diabetes Institute.

Forty years later — his 9-year-old handprints still visible in a piece of concrete preserved at a ceremony for the budding institute — almost everything about diabetes has changed.

Leigh, now a digital cartographer, father and husband with a penchant for mountain biking, recalls his hopes four decades ago had a lot to do with the urine strips that were used at the time to track blood levels. blood sugar. Besides being awkward, especially for elementary school kids looking to fit in with their peers, the tapes weren’t particularly accurate. They didn’t change color until the glucose level reached 200 milligrams per deciliter, a point where the situation was already out of control.

“By the time those strips showed something in the urine, you were already hours too late,” Leigh said.

His younger self would be amazed to see where things stand for type 1 diabetes in 2022, he said.

Today, Leigh is enrolled in a clinical trial through Whittier that gives her early access to the latest closed-loop blood glucose monitor, which is equipped with an automatic insulin pump. The device can both detect its blood sugar levels in near real time using a small needle embedded just under the skin and also deliver microdoses of the drug it needs to maintain well-balanced blood sugar levels day and night.

Diabetes patient Zach Leigh lays his hands on his childhood handprints and name which were carved into concrete in a ceremony for what is now called the Scripps Whittier Diabetes Institute.

(Eduardo Contreras/The San Diego Union-Tribune)

The system can even transmit its data to their smartphone for easy viewing and transmission to their doctor.

Those without diabetes might think it was the convenience of this technology that would impress Leigh’s childhood so much. And he would surely have been impressed. But there is something deeper that only people who have dealt with the disease for decades can truly understand.

For so long, Leigh explained, diabetes was a private matter handled largely behind closed doors. It was difficult for a person with diabetes to recognize another unless they saw testing supplies, insulin syringes or other unmistakable objects.

But wearing an automatic blood glucose meter creates a telltale bump under a person’s shirt near the midsection that others wearing the same device can easily spot.

“It kind of opened up a whole new world of talking to other diabetics because you can see them,” Leigh said. “It’s like a club in some ways. It’s the camaraderie.”

History of Whittier

The Scripps Whittier Diabetes Institute, just north of Scripps Memorial Hospital La Jolla, was originally called the Whittier Institute for Diabetes and Endocrinology. It is named after the late philanthropist N. Paul Whittier, who contributed $5 million in seed capital to get the organization off the ground.

The institute has carried out its own research throughout its four decades, first operating out of its own building on the Scripps La Jolla campus, then moving to nearby 10140 Campus Point Drive at Health System Headquarters. of Scripps when the expansion caused the destruction of the original structure. .

Whittier has recently come to prominence for his extensive behavioral research into blood sugar control in type 2 diabetics. The institute has received millions in federal grants to document and teach his “promotora” model, which has demonstrated real gains in diabetes control by using peer educators from the Latin American community to help people with the disease live healthier lives through diet and exercise. More recently, efforts have explored the use of digital means, turning to text messaging as a two-way channel to provide real-time advice and encouragement.

The methods have evolved, the drugs too. Dr Athena Philis-Tsimikas, endocrinologist and director of Whittier, said that when she started treating patients 30 years ago, only human insulin and two drugs – metformin and sulfonylureas – were available for the diabetes treatment.

Although both drugs can stimulate the pancreas to produce more insulin, they have sometimes overstimulated, leading to weight gain and other side effects.

In the decades that followed, science developed better drugs, often called SGLT2 and GLP-1 inhibitors, that could reduce the amount of glucose taken up by the body or stimulate insulin production. Both are less likely to exceed a balanced blood sugar level and can cause those who take them to lose weight. Taken appropriately, the drugs have been shown to reduce the number of patients who die from diabetes complications.

“When I started my career, there were only three ways to treat diabetes,” Philis-Tsimikas said. “There are now over 14 different classes of drugs available.

“Only the needles have come so far. I’ve heard stories of patients sharpening their own needles and boiling them to sterilize them, and now the needles in the injection pens we use to deliver insulin are so thin you can’t feel them going into the skin.

Although many drugs and technologies are made by companies based outside of San Diego, Whittier has always served as a critical access point for the national clinical trials that brought them to market. At least a dozen trials are regularly available with a team of experts on hand to help customers determine the possible risks and benefits of participation and whether they are eligible to participate.

Paul Whittier’s seed money for the institute that bears his name helped lure Dr Willard VanderLaan – an endocrinologist who was then director of an existing diabetes research center at the Scripps Clinic – to the hospital principal of Scripps in La Jolla. VanderLaan was also the personal physician of Olive Whittier, Paul’s first wife, who died of complications from diabetes in 1976.

Whittier’s philanthropy as chairman of MH Whittier Corp. of South Pasadena accelerated with the sale of Bellridge Oil Co. to Shell Oil in 1979 for the then record sum of $3.65 billion. The family is also known for its partnership with the Rodeo Land and Water Co., which sold and sold Beverly Hills to movie stars.

Much of the money was used to fund the Confidence Foundation, a charity still active today named after the ship that took family ancestor Thomas Whittier from England to New England in 1638 .

The foundation continued to support the organization it helped create. It is now in the fifth year of a $1 million donation to establish the Paul and Lucy Whittier Endowment for Diabetes Education and Research.

Confidence Foundation trustees Arlo Sorensen and Linda Blinkenberg, who both knew Paul Whittier and had worked with the family since the 1960s, said support was occasional rather than ongoing, tied to proposed new initiatives.

Whittier, who died in 1991 at the age of 87, wanted his gifts to be seeds that could grow into trees with roots deep enough to sustain themselves, Blinkenberg said. Thus, the additional donations were intended for new branches rather than supporting the old trunk.

“We’re very proud of what they’ve done with Paul’s gifts,” Blinkenberg said. “They’ve made great strides to be able to grow themselves.”

“It just came as a great example of how to use philanthropy to achieve something bigger than you,” Sorensen said.

The Comprehensive Grants Database maintained by the National Institutes of Health lists more than $30 million in federal research grants awarded to the Whittier Diabetes Institute and Scripps Health for diabetes research.

The list of scientific research includes basic research on fundamental questions which, together with the work of many others in many other places, has progressively improved the lives of diabetics around the world. In 1985, VanderLaan gained support to further explore the role of insulin control by pituitary peptides, a topic explored in more detail by Dr. Andrew Baird in the 1990s.

Others, like Dr. Alberto Hayek, have won international recognition and support for research into the transplantation of islet cells, which are essential for insulin production. ◆

Senior officer faces sexual misconduct allegations retires from Canadian Forces


The former head of human resources for the Canadian Armed Forces is retiring before his sexual assault case goes to trial next year.

A new message from the Forces’ senior leadership to members confirms that Vice-Admiral Haydn Edmundson is retiring after more than 30 years.

Edmundson was charged with sexual assault and indecent acts last year. He has been on indefinite paid leave for more than a year after reporting on his case by CBC News. His lawyer, Brian Greenspan, said he looked forward to restoring his client’s “distinguished reputation for service to our country”.

Tuesday’s message from the Vice Chief of the Defense Staff, Lt. Gen. Frances Allen lists more than 50 promotions this year and nearly 30 retirements. Two former top executives criticized for participating in a controversial golf game will retire. A third person still under investigation for alleged sexual misconduct has already left.

The Forces are in the midst of a major overhaul of their senior ranks, with the army, air force and navy all having new commanders.

The list of personnel changes is dated May 22, but was made public days later after former Supreme Court Justice Louise Arbor released her report into the Forces’ sexual misconduct crisis. The much-anticipated report addressed how best the military can respond to the crisis, which has tarnished the public image of the Forces for more than a year.

Lieutenant General. Allen’s post says the Army has, in response to the report, begun implementing changes to its promotion and selection processes, including a new character evaluation process.

The message states that this new verification process has caused delays in the publication of the list of promotions.

“The Canadian Armed Forces continues to add rigor and science to its promotion selection process, beginning first with flag officers and flag officers,” the message to military personnel reads. “This evolved process is taking longer than traditionally, and hence the delay in promotion announcements.”

Three more retreats

The post names retired Lt. Gen. Trevor Cadieu among those who recently left the military. Cadieu was set to take command of the army, but the change of command was delayed during a military police investigation into sexual misconduct. Cadieu denies the allegations.

Cadieu told CBC News in April that he was continuing to cooperate with the investigation but – instead of receiving “an indefinite salary” when the army could not employ him – he chose to take his retire and “explore other opportunities to contribute to a greater good.”

Lieutenant General. Mike Rouleau, who faced intense public criticism after a controversial round of golf, plans to retire this summer. (Adrian Wyld/Canadian Press)

Lieutenant General. Allen reported that Vice Admiral Craig Baines, the former commander of the Navy, and former second in command of the Army, Lt. Gen. Mike Rouleau also plans to retire this summer.

The couple faced intense public criticism after a controversial golf match last year at the height of the Forces sexual misconduct crisis.

Baines and Rouleau had fun with Jonathan Vance, the former Chief of the Defense Staff who was then under investigation by the military police. Vance has since admitted he had a sexual relationship with a subordinate, Major Kellie Brennan, when he was Chief of the Defense Staff, after denying the allegations.

In April, Vance pleaded guilty to obstruction of justice for repeatedly contacting Brennan and trying to persuade her to make false statements to investigators about their relationship, according to court documents.

Trevor Cadieu, the senior military leader who was about to take command of the Canadian Army, retired from the army earlier this month. (Phil LaPlante/CBC)

Military police chief to stay in post for 2 more years

Along with retirements, the military appointed the brigadier-general. Simon Trudeau will stay on for another two years as Provost Marshal of the Canadian Forces. In this role, Trudeau is the commander of the military police and advises the Chief of the Defense Staff on law enforcement matters.

The announcement came the same day the Forces acknowledged that Trudeau had recently apologized to two Royal Military College officer cadets for handling their cases. A review by a military police watchdog revealed several issues in the way the military police investigated a case at Canada’s officer academy.

Last month, Brigadier General. Trudeau also rescinded the appointment of another high-ranking police officer after the officer was disciplined three years ago for making sexual comments.

Arbor announced this week that she recommended the military be stripped of its authority, granted in 1998, to investigate and prosecute sex offenses.

“The treatment of sexual offenses by military tribunals over the past 20 years has done little to improve efficiency, discipline and morale. On the contrary, it has served to erode it,” said Arbor on Monday during the presentation of his report.

Charlotte Duval-Lantoine, a fellow at the Canadian Global Affairs Institute who studies culture change in the military, questions the decision to allow Trudeau to continue in his current role in light of the botched RMC deal and the “sheer incompetence” demonstrated by the military’s handling of some sexual misconduct investigations by police.

“You have to wonder why he should stay at work,” Duval-Lantoine said.

Defense Minister Anita Anand was asked on Tuesday if she still had faith in Trudeau.

“I have confidence in General Eyre and his appointments and we continue to work very hard to ensure high standards of integrity in the Canadian Armed Forces,” Anand said after his speech at CANSEC, a global defense and of security.

In a statement released to CBC, a spokesperson for the Department of National Defense said Trudeau had been reappointed to oversee changes to the military justice system recommended by Arbor’s report and by the report of another judge in retired Supreme Court Justice Morris Fish.

“As an independent player in the military justice system, the Canadian Forces Provost Marshal has an important role to play in efforts to reform our institution,” the statement read, adding that Trudeau’s tenure was extended “to ensure continuity of police leadership in efforts to implement the recommendations.

The statement said Trudeau did not investigate the controversial golf game because “Military Police determined that the matter was inconsistent with the level of service/criminal offense(s) and therefore did not reached the threshold for investigation by the military police”.

Expert texts could help narrow post-COVID health coverage gap / Public Information Service


The COVID-19 public health emergency requiring continued coverage for Medicaid enrollees is set to expire later this year, and experts say states such as Kentucky could speed up communication, including text and email to beneficiaries, to ensure that residents do not slip through the cracks at the end of the policy.

Since the start of the pandemic, many Kentuckians have moved, and changed addresses and possibly phone numbers.

Farah Erzouki, senior policy analyst for the Center on Budget Policy and Priorities, said state agencies likely don’t have up-to-date information for a significant number of their Medicaid populations.

“And that will present a significant challenge if not resolved, as many people will not receive notices in the mail when it is time for them to renew,” Erzouki explained. “And won’t know what they need to do to keep their Medicaid coverage.”

She noted that people often lose coverage for procedural reasons during the renewal process, such as not submitting required forms even though they are still eligible. Erzouki also pointed out that long wait times at call centers can make it even harder for households to navigate the process.

Erzouki added that state Medicaid agencies should use methods like text and email to reach as many people as possible with upcoming reminders about policy changes and clear instructions to help them take. steps to remain listed or seek market coverage.

“We know that approximately 97% of people with incomes below $30,000 per year have a cell phone, and text messaging is quickly becoming the norm in how people want and expect to receive updates. up-to-date,” Erzouki pointed out. “States should respond to this by adopting text messaging as a means of reaching enrollees.”

She pointed out that residents whose incomes have exceeded the eligibility threshold and are no longer eligible for Medicaid are particularly at risk of losing coverage. Supporters have called on Congress to expand enhanced subsidies making market coverage more affordable for millions of people.

Disclosure: Kentucky Voices for Health contributes to our fund to report on policy and budget priorities, children’s issues, consumer issues, and health issues. If you would like to help support news in the public interest, click here.

get more stories like this via email

Disruption of 911 service for Telus and Koodo customers resolved – Campbell River Mirror


Regional districts across British Columbia sent out alerts on the afternoon of Monday, May 30, saying there was a disruption in 911 service for Telus and Koodo cellphone customers.

Kaila Butler, spokeswoman for E-Comm 911, which operates 911 services for 25 regional districts in British Columbia, said that as of 4:50 p.m., the Telus disruption had been resolved by Telus technicians.

The alerts urged people to use other cellular service providers or a landline if they couldn’t reach 911 on their cell phone, although now that the issue has been resolved, people are “encouraged to call 911 so we can get them the help they need.” need as soon as possible,” Butler said.

Butler confirmed he became aware of an issue around 2:20 p.m. and issued an alert about a problem with the Telus network.

Some clients were connecting but couldn’t be heard, others couldn’t hear operators, and some were getting failure message notifications, Butler said.

For those who were able to log in, E-Comm was able to get their contact information and call them back, Butler said.

According to a statement from Telus, problems with 911 service have affected customers in some locations in British Columbia and Alberta.

“Upon learning of the degradation, our team immediately conducted a thorough investigation and have now resolved the issue,” the statement said. “We take our responsibility to provide safe and uninterrupted access to emergency services very seriously, and we know how essential this access is for our customers. We sincerely apologize for the service interruption and thank our customers for their patience and understanding.


How to Enable Fortnite 2FA and Get the Boogie Down Emote


It is highly recommended that you spend time enabling 2FA (two-factor authentication) for your Fortnite Account.

Not only will this protect your account from potential scammers, but you can also earn an exclusive emote for your problem. Fortnite cups also require 2FA to be enabled in order to earn rewards like skins.

Here is how to enable 2FA in Fortniteand what you will get for it.

Fortnite Chapter 3 Season 2 Resistance Story Trailer

How to activate Fortnite 2FA

Epic Games has provided an in-depth process for enabling 2FA in Fortnite. You can find a step-by-step breakdown below:

  1. Go to the ‘Account’ page.
  2. Click on the “Password and Security” tab.
  3. Under the “Two-factor authentication” heading, click the 2FA option you want to enable:
  4. Third-party authentication app: Use an authenticator app like two-factor authentication (2FA). When you log in, you will need to use the security code provided by your Authenticator app.
  5. SMS Authentication: Use your phone as two-factor authentication (2FA) when you log in, you’ll need to use the security code Epic sends you via text message.
  6. Enable Email Authentication: Use a security code sent to your email address as two-factor authentication (2FA). The security code will be sent to the address associated with your account. You will need to use it when logging in.
  7. If you choose to use an authenticator app for 2FA, these common authenticator apps can be found in your mobile device’s app store.
  8. Check that 2FA is enabled
  9. Refresh your account page and confirm that the authentication method shows as enabled by looking for the blue button that says “Enabled”.

Please note that if you choose more than one authentication method, you will need to check the “Make this my primary Two-Factor authentication method” box on your preferred contact method.

Chapter 3 Season 2 is here! New additions include the Prowler skin, as well as the return of jetpacks and Choppas. As we enter the final month of Season 2, it’s a good idea to know how to get XP fast in Fortnite. You can also complete resistance challenges, including collecting signal jammers and finding an energy fluctuation. Don’t forget the seasonal challenges, which include planting saplings and calling in an airstrike on a tank. Meanwhile, the Victory Crowns and Character Collection are back, along with a new Victory Umbrella to earn.

Exclusive Boogie Down Emote

Once you’ve enabled 2FA in Fortnite, reload the game and you’ll receive the Boogie Down emote. This is your reward for securing your account, and it’s the only way to get this emote currently.

Why should you enable Fortnite two-factor authentication

There are a number of reasons to enable 2FA in Fortnite. The main thing is to protect your account from fraudsters. Having an extra step when logging into your account makes it harder for someone to gain access, which is recommended if you have linked payment methods. V-Bucks scams are unfortunately quite common, so adding that extra layer of security means you’ll be less likely to be hacked.

The Boogie Down emote in Fortnite.

If you are looking to participate in Fortnite Cup events, you will also need to enable 2FA. This is so that you can earn the rewards associated with each event. For example, the recent Obi-Wan Cup allowed players to earn the Obi-Wan skin for the competition. This was only possible if you had 2FA enabled.

Finally, having two Factors active on your account will allow you to gift items in the Item Shop. You can buy and gift everything from skins to V-Bucks and send them to your friends.

Here’s how to enable 2FA on your Fortnite account. For more on the game, check out our guide to the current Fortnite map, to make sure you’ve unlocked all Named Locations.

Missouri asks to dismiss Sunshine Law lawsuit against Hawley’s office


A Cole County judge this week heard arguments about whether staff in the Missouri Attorney General’s Office, when it was headed by current US Senator Josh Hawley, used private email accounts to to overturn open state archive laws.

A 2019 lawsuit filed by the Democratic Senatorial Campaign Committee alleges Hawley’s office violated the Sunshine Law when it withheld emails between Hawley’s taxpayer-funded staff and its political consultants during the 2018 campaign for the US Senate.

The suit asks the court to impose civil penalties against the attorney general’s office for “knowingly and willfully” violating the Sunshine Act.

On Thursday, the Missouri Attorney General’s Office argued to Cole County Judge Jon Beetem that despite the emails being about public business, they should not be considered public records.

Indeed, the conversations took place using private email accounts and were never stored on government servers.

“There is no dispute that the emails were related to public business,” Jason Lewis, assistant attorney general under Hawley’s successor Eric Schmitt, said Thursday. “But these are not public records. There was no retention here.

The lawsuit stems from a records request the DSCC made in September 2017 for communications between staff in the attorney general’s office and Hawley’s political consultants.

Hawley’s office denied the request in a letter to the DSCC in October 2017, saying the office “searched our records and found no responsive records.”

But a year later, a Kansas City Star investigation found that the communications did exist.

The Star reported in October 2018 that shortly after being sworn in as attorney general, Hawley and his staff began using private email rather than their government accounts to communicate with political consultants outside the US. who would go on to lead Hawley’s U.S. Senate campaign. .

Hawley’s campaign consultants gave direct advice and assignments to his taxpayer-funded staff and led meetings during working hours in the state Supreme Court building, where the official office of the Attorney General.

Among those included in the private email discussions was Daniel Hartman, who was the custodian of records for the attorney general’s office.

Hartman being involved in the conversations is significant, said John Geise, an attorney representing the DSCC.

“The attorney general’s office cannot defeat Sunshine Law requirements by requiring the custodian of records to store certain records on his personal email,” Geise said Thursday.

Geise argued that Hawley hid the records from the DSCC because he didn’t want embarrassing information made public before the election.

The revelation that Hawley and his team were using private email to coordinate with his political consultants sparked accusations that he had illegally used public resources to benefit his Senate campaign.

The Missouri Auditor’s Office concluded in February 2020 that Hawley may have misused state resources. But the audit stopped short of officially saying Hawley broke the law, saying the widespread use of private email and text messaging in the office made a definitive determination impossible.

The attorney general’s office didn’t officially keep the files, Lewis said, until December 2018. That’s when Hartman printed them out and brought them to the office to be scanned for delivery to the office. office of the Missouri Secretary of State, which was investigating the matter.

Beetem raised the retention issue several times with Geise on Thursday, questioning whether emails about public affairs were automatically public records if they were never retained by the office.

It’s similar logic to Beetem’s decision in 2019 in a lawsuit over former Governor Eric Greitens’ use of a self-destructing text messaging app. He ruled in that case that since the texts were automatically deleted, and therefore never preserved, there could not have been a violation of the Sunshine Law.

But Geise said Thursday that Hartman knew, or should have known, that reactive recordings existed. And because of his role in the office as custodian of the records, Geise said, the fact that they were in his possession meant they were kept.

If Beetem sided with the attorney general’s office, Geuse explained, “government agencies would simply forward all communications to private emails to avoid the Sunshine Act.”

Beetem did nothing on Thursday.

Missouri Independent is part of States Newsroom, a grant-supported media network and donor coalition as a 501c(3) public charity. Missouri Independent maintains editorial independence.

Officials ‘Detained’, CPWD Staff Seek Action Against J&K LG Assistant


With the Amarnath Yatra a month away, the construction of dormitories for en route pilgrims in Ramban has come to a halt following the alleged detention of two senior engineers from the Central Public Works Department (CPWD) by the Jammu and Kashmir, reportedly on the orders of Principal Secretary Lieutenant Governor Manoj Sinha.

CPWD Engineering Associations alleged that Executive Engineer (Civil) RK Mattu and Assistant Engineer (Civil) Rizwan Alam were detained for more than 10 hours on May 25 on the orders of Principal Secretary Nitishwar Kumar, who is considered as Sinha’s right-hand man and holds the position of Managing Director of the Shri Amarnathji Shrine Board (SASB), as well as Principal Secretary of the Energy Development Department.

While Ramban District SP Mohita Sharma declined to say anything about it, Kumar did not respond to repeated calls and messages. CPWD’s two engineering associations – Central Engineering Service Group A (Direct Recruits) Association and Central PWD Engineers Association – have also written separately to Union Minister for Housing and Urban Affairs Hardeep Puri and Lieutenant Governor Sinha to seek action against Kumar and SP Sharma.

CPWD Superintendent Engineer Mohan Lal told The Sunday Express that since the incident on May 25, “nobody, including engineers, contractors and laborers, is prepared to visit the construction site. In my progress report, I informed the authorities of the detention of our engineers by the police as well as the suspension of work on the site.

The best of Express Premium

The Sunday profile: father, son and “holy costumes”Prime
Tavleen Singh writes: India must choosePrime
7 airports with him, Adanis is looking to buy a stake in key aircraft back-end companies...Prime

Officer of the IAS of Uttar Pradesh, Nitishwar Kumar is in deputation in Jammu and Kashmir. He had arrived at Ramban on the morning of May 25 for a scheduled inspection of the progress of the dormitories being constructed by the CPWD for Amarnath pilgrims. According to several sources, Kumar objected that the work was incomplete and CPWD Executive Engineer (Civil) RK Mattu was not available at the site.
Before leaving for Banihal for an inspection there, he allegedly verbally ordered the Ramban SP, who was accompanying him, to arrest or detain Mattu, as well as the assistant (civilian) engineer Rizwan Alam. While Alam, who was present, was detained off site, Mattu was detained on his way.

YK Tomer, the vice-president of the Central PWD Engineers’ Association, told the Sunday Express that the two engineers were first detained at Ramban police station for nearly eight hours, starting at noon, then transferred to a government guesthouse. They were released around 10:30 p.m.

On the same day, Jammu Circle Superintendent Engineer Mohan Lal sent a letter to UT Chief Secretary Arun Kumar Mehta with copy to Director General of Police, LG Chief Secretary (Niteshwar Kumar) , the LG Special Duty Officer, and the CPWD General Manager, among others, detailing what happened.

Mohan Lal wrote that they were not informed of the time of Kumar’s planned visit until two and a half hours before his arrival. He said that after receiving the information, he left immediately for Ramban, but could not arrive in time “due to the 130 km travel time in the hills and landslides area, because his office is stationed in Jammu”.

However, he said: “The CPWD Assistant Engineer together with the Junior Engineer and contractors representatives were present during the inspection… It is learned that the CEO, SASB during his inspection gave instructions verbal to SP Ramban, who was also present during the site visit, to stop/detain AEs/EEs (Assistant Engineers, Executive Engineers) solely on the basis of certain minor works/pending items.

As a result, writes Lal, while Alam was taken into custody from the site itself, Mattu was arrested on his way there.

Lal said they wrote a letter to SP Ramban and also called her to get the men released, but she ignored them. In her letter to the UT Chief Secretary, Lal said that when they asked the policeman about the reasons for the detention, she threatened them with consequences.
“Subsequently, I tried to contact the CEO, SASB, by phone, but the call was not answered. So, a WhatsApp message was sent with the request to release our government agents on duty from the However, no action in this regard (was) taken, neither by SP Ramban nor by the CEO, SASB, to get our officers released even after… around 8 hours which is a serious matter and highly unconstitutional (unlawful detention of government officials in the line of duty),” he wrote, adding that there were prescribed rules and procedures to deal with any failure on the part of the government officials.

Buy now | Our best subscription plan now has a special price

The superintendent engineer also denied any delay on their part in the work. He said CPWD was awarded the construction of prefabricated, steel, dormitories by SASB in April 2021 and began work the following month. “According to the Memorandum of Understanding signed between CPWD and SASB, Rs 10.67 crore was to be paid to him as an advance by the latter, but he only deposited Rs 8 crore (in June 2021, the first time, after much persuasion… Subsequently, all payment installments/reimbursements made to contractors were delayed for 2-3 months each time, even after (submission of) details by the engineer in charge… of time in time,” Lal wrote in his letter.

He added that out of the revised total cost of Rs 47 crore, only Rs 32 crore had been communicated to the CPWD till date. “Therefore, there has been no delay from CPWD for the completion of the works,” Lal said, adding that the rest of the works will be completed before the start of the Amarnath Yatra “subject to the release. of the balance amount to all seven contractors working on the site”.

Seeking to take action against Nitishwar Kumar and the Ramban SP, Tomar in a letter to the Lieutenant Governor also referred to the delay in receiving the funds and accused the authorities of “forcing the field staff to complete the works without following the memorandum of understanding, harassment and misconduct”. “You can imagine the authoritarianism of the local administration officers as they do not bother to pick up the phones and respond to messages from senior CPWD officers for the release of illegally detained EEs and AEs,” he said. he writes.

About Online Teen Counseling Service


We include products that we believe will be useful for our readers. If you buy through links on this page, we may earn a small commission. Here is our process.

Teen Counseling is a talk therapy service for people between the ages of 13 and 19. Its parent company is BetterHelp, and online counseling services like these can help teens and their caregivers by offering affordable remote counseling.

According to the most recent data from Mental Health America, more than 15% of young Americans have had a major depressive episode in the past year, and that percentage is growing. More than 60% of young people with severe depression do not receive any mental health treatment.

Depression is just one of the mental health issues teens may face, but counseling services, such as Teen Counseling, can be beneficial.

Teen Counseling is a platform offering affordable counseling with licensed therapists to people aged 13-19 in a private online environment. A person needs an internet connection to use this service.

However, Teen Counseling is not suitable for someone in crisis or who needs immediate treatment.

The Teen Counseling website describes the company’s mission as building, maintaining, and supporting a platform that enables individuals and therapists to communicate effectively.

A person connects with an assigned therapist when they sign up for the platform, but they can switch therapists if they wish.

The individual and their therapist are responsible for scheduling sessions, and methods of interaction may include:

  • Text messaging: Teens and parents or caregivers each have their own secure and private chat rooms available 24/7 to send and receive messages with their therapist.
  • Live Chat: Offering the immediacy of real-time communication in a texting environment, individuals and therapists schedule live discussions in advance.
  • Live phone calls: A person must also schedule live phone calls in advance and start in an individual’s private therapy chat room.
  • Video conference: Similar to live phone calls, these sessions are similar to using Zoom or Skype. A person arranges these sessions in advance and initiates them in their private therapy room.

The therapists work as independent contractors, therefore Teen Counseling is not their employer and does not supervise their work.

However, Teen Counseling is not always an appropriate substitute for face-to-face mental health care, as its licensed therapists cannot prescribe medication, make an official diagnosis, or assume the responsibilities of court-ordered treatment.

Teen Counseling strives to keep user data and what they say during sessions private. And even if a person uses their private phone for a session, their therapist does not get their personal phone number. The Teen Counseling system provides the connection through an individual’s secure online link.

However, in the following circumstances, a therapist must, by law, break a person’s confidentiality and notify authorities if:

  • a person is seriously thinking about harming themselves or others
  • a person under the age of 18 discloses that they are a victim of abuse or neglect
  • a person knows that a minor is being abused or neglected
  • a person discloses that an older person is being abused or neglected

Teen Counseling costs $60-90 per week, depending on where a person lives, their preferences, and the availability of their therapist.

Neither Teen Counseling nor its therapists submit bills to Medicare, Medicaid, or private insurers. This means that it is up to the parents or guardians of the person using Teen Counseling to seek reimbursement from their insurance.

The company’s website notes that many insurance plans don’t fully cover mental health care. However, a person should check with their insurer to confirm the benefits.

Below, we look at the pros and cons of teen counseling.

Once a parent or guardian signs up for Teen Counseling, they complete a questionnaire about the teen’s behavior and areas where they may need support. The company will then appoint a therapist based on this information. A person can also change therapists whenever they wish.

The service’s therapists can be psychologists, marriage and family therapists, social workers, or professional therapists, and they are all fully licensed and licensed in the states where they provide services.

The Better Business Bureau gives Teen Counseling’s parent company, BetterHelp, a 4.07 out of 5 star rating based on more than 400 reviews. The service also has accreditation and an A rating on this review platform.

Positive reviews mention that Teen Counseling is easy to use, provides good complaint resolution, and is cost effective. The specific advisers also have many compliments.

However, the negative comments focused on the lack of response and availability of therapists, overwork, and customer service issues.

Trustpilot gives the company a 4.6 out of 5 star rating from over 4,100 reviews.

Favorable comments include ease of use, flexibility, and great choice of therapists. However, negative reviews have pointed to a lack of pricing transparency, customer service issues, and unprofessional therapists who lack empathy.

Online alternatives to teen counseling include:

  • Discussion area: This online service provides online counseling to individuals, couples and teens via video, messaging and phone. It accepts many forms of insurance. It also offers an online psychiatric consultation option, which could allow a person to obtain prescriptions for medications, such as antidepressants.
  • MDLive: In addition to emergency care, primary care and dermatology services, MDLive offers online talk therapy and psychiatric care from licensed therapists and psychiatrists, addressing issues such as addiction, anxiety , stress and trauma. A person can get prescription drugs, if needed, while registration is free.
  • Synergy eTherapy: One of the specialties of this online company is psychological support for teenagers. Sessions are conducted via video chat and phone. The company points out that many teens prefer to use digital devices to communicate, so its methods would help young clients feel more comfortable with therapy. However, it does not work in all 50 states. Some of its therapists may be in-network for certain insured clients.

If a person’s mental health issues, whether related to anxiety, depression, or stress, are frequently causing distress or interfering with their ability to live their life, they should see a doctor for a assessment and treatment options.

Online advice can provide significant help, but it is not suitable for someone in a crisis or at risk of harming themselves or others. Instead, individuals should speak with a qualified professional.

Below are some common questions and answers about teen counseling.

Does teen counseling accept insurance?

Neither Teen Counseling nor the therapists who work with it submit bills to Medicare, Medicaid, or private insurers. This means that it is up to the parents and guardians of the person using Teen Counseling to seek reimbursement from their insurance.

Does Teen Counseling have a free trial?

Teen Counseling does not currently offer free trials.

Can I register my child for Teen Counselling?

A parent or caregiver can enroll in Teen Counseling without their child present. After they sign up, the company will match a person’s child with a licensed therapist, with whom they can schedule an appointment. He can then invite his child who will receive an email and an SMS inviting him to the session.

Which is better, BetterHelp or Teen Counselling?

BetterHelp is the parent company of Teen Counseling and therefore operates the service.

Online counseling offers people of all ages a more convenient, private and potentially cheaper way to access mental health treatment.

Teen Counseling focuses on providing teens with access to mental health care using their preferred method of communication. It can be a useful tool to help them deal with what can be a difficult time in life.

Richard Marles says Coalition decision to publicize interception of Sri Lankan boats undermined border security and put lives at risk


The deputy prime minister accused the former government of risking lives in its decision on election day to publicize the interception of a boat of suspected asylum seekers.

The ABC revealed today that one of Scott Morrison’s last acts as Prime Minister was to ask the Australian Border Force (ABF) to issue a rare statement about the Sri Lanka boat.

Shortly after, Mr Morrison discussed the issue at an election day press conference.

The Liberal Party also sent a mass text message to voters in marginal seats, urging them to support the government and its tough border policies.

Speaking after the ABC revelations, Deputy Prime Minister Richard Marles said the former government’s actions on Saturday had compromised border security.

“It is serious in the sense that it has made our borders less secure.

“It is serious in that it has risked lives, it has risked lives and it has undermined the national consensus that exists around border security.”

Sources confirmed to the ABC that the Prime Minister’s Office had made a direct request to release details of the sensitive ABF operation before it was completed.

Speaking after the report was published, Prime Minister Anthony Albanese said he believed the only reason the former government wanted the press release released was so they could send their campaign text message.

“The Prime Minister’s Office contacted my office in the middle of Saturday and we advised that it would be completely inappropriate for this event to be politicized,” he told ABC’s AM show.

“This is a flagrant violation of custodial conventions.”

Scott Morrison has asked the Australian Border Force to release a statement on the boat from Sri Lanka.(ABC: Avani Dias, file)

But constitutional law professor Anne Twomey said there did not appear to be any breach of the transitional conventions.

“The reason he’s not breaking the conventions themselves is that he’s not making some sort of commitment that binds the opposition in the future,” she said.

“But it potentially violates the problems associated with the non-politicization of the civil service.”

The ABC approached former Prime Minister Scott Morrison specifically to ask why his office asked the Australian Border Force to reveal the boat’s interception, but he declined to comment.

The unusual disclosure of dealings “on water matters” is now the subject of an investigation by Home Office Secretary Mike Pezzullo, ordered this week by the new Labor government.

Professor Twomey said while there would be no consequences for Mr Morrison, there could be for the officials involved.

“For the officials involved, there may be questions about whether or not disciplinary action should be taken,” she said.

“If public servants are found to have breached, for example, Australian Public Service values, which require them to act impartially and apolitically, particularly during an election campaign.”

On Tuesday, Rear Admiral Justin Jones confirmed that the shipment of asylum seekers intercepted near Christmas Island on election day had now been returned to Sri Lanka after proper assessments.

Job , updated

SMS Aggregators A2P Messaging Services Market 2022, Size, Share and Development, Company Records, Advances, Market Drivers, Possibilities, Challenges and Risk Factors, and Key Findings Operating Result, Sales and Forecast 2028


This full report on SMS Aggregators A2P Messaging Services Market provides real information about global and regional market statistics and status. Its field of study extends from the market situation to comparative pricing between key players, spending in specific market areas and profit. It represents a comprehensive and succinct analysis report of major competitors and price statistics to help newbies establish their place and survive in the market. Additionally, it also focuses on the market overview for the upcoming period of 2022 to 2028. This has proven to be of great help for entrepreneurs. This detailed market research is heavily based on insights received through interviews with key executives, research, and innovative resources.

Major Players Covered in SMS Aggregators A2P Messaging Services Market:

Twilio, Infobip, Sinch, Montnets Cloud Technology, Guru interconnection, SAP Digital Interconnect, Telesign, MessageBird, OpenMarket Inc., Vibes, Wavy, Beijing TrustMeDu Sci-Tech, Plivo, Zenvia, Beijing Emay Softcom Technology, Mitto, Genesys Telecommunications, Route Mobile Limited, Silverstreet BV, ACL Mobile, Tyntec, Clickatell, Pontaltech, TXT Impact, Accrete

In addition to the information presented in this SMS Aggregators A2P Messaging Services Market report, it includes financial losses incurred as a result of COVID-19. It also explains how the most important business sectors in the market are coping with the epidemic and how to get out of it. This market report is a way to present accurate information about company profiles and competitiveness analyzes in an orderly manner. It anticipates the competition in the market for the predicted period of 2022 to 2028. This SMS Aggregators A2P Messaging Services Market study also examines industry channels and performance rates to help key players keep a leg up ahead of the competition.

Get Special Price With Buying Report Just 2000 USD On Different Types Of Licenses On Buy It Now (Use corporate email id to get higher priority) @ https://www.stratagemmarketinsights.com/cart/135439

The regional analysis covers:

⦿ North America (USA and Canada)
⦿ Latin America (Mexico, Brazil, Peru, Chile and others)
⦿ Western Europe (Germany, UK, France, Spain, Italy, Nordic countries, Belgium, Netherlands and Luxembourg)
⦿ Eastern Europe (Poland and Russia)
⦿ Asia-Pacific (China, India, Japan, ASEAN, Australia and New Zealand)
⦿ Middle East and Africa (GCC, Southern Africa and North Africa)

By product type, the market is primarily split into

Industrial Application SGS
SMS verification code
text message marketing

By application, this report covers the following segments:

Government agency
Transport and logistics


The report highlights the latest revenue trends and market progress along with all the realistic business statistics. It provides pre-planned prevention and management and highlights a summary of the Global SMS Aggregators A2P Messaging Services Market along with the classification, definition, and market chain structure. The global report highlights issues affecting the global SMS Aggregators A2P Messaging Services market including gross margin, cost, market share, capacity utilization, revenue, capacity, and supply . It also highlights the future scope of the global SMS Aggregators A2P Messaging Services Market over the coming period. The study accurately predicts the market size and volume in the present and future. The report offers a comprehensive study of the SMS Aggregators A2P Messaging Services market industry and insights into foreseeable future trends which will have a significant impact on the development of the market. The weekly then looks at the main global players in the industry.

Industry research methodology includes:

1) Primary research

We regularly conduct primary interviews with participants and industry commentators to validate data and analysis. A typical research interview performs the following functions:

It provides first-hand information on market size, market trends, growth trends, competitive landscape, future prospects, etc.
Helps validate and strengthen secondary research findings
Further develop the expertise and market understanding of the analysis team
Primary research involves email interactions, phone interviews as well as face-to-face interviews for each market, category, segment and sub-segment across geographies

Participants who typically take part in such a process include

Industry participants: CEOs, VPs, Marketing/Clinical Trials Phase Managers, Market Intelligence Managers and National Sales Managers
Purchasing managers, technical staff, distributors and resellers
External experts: investment bankers, valuation experts, research analysts specializing in specific markets
Key opinion leaders specializing in different areas corresponding to different end users in the industry

2) Secondary research

Secondary research sources commonly referenced include

Company Websites, Annual Reports, Financial Reports, Investor Presentations, and SEC Filings
Internal and external proprietary databases, relevant patent and regulatory databases
National Government Documents, Statistical Databases and Reports on SMS Aggregators A2P Messaging Services Market
Company-specific press articles, press releases and webcasts operating in the SMS Aggregators A2P Messaging Services Market

3) Models

4) Business share analysis model

5) Revenue-Based Modeling

6) Research limitations and conclusion

The report is insightful documentation and provides important information to clients, business owners, policy makers, vendors, distributors, suppliers, decision makers, manufacturers, investors and individuals who have a keen interest in the A2P messaging services market of SMS aggregators.

Additionally, the research report covers all major countries and regions with good market sizes for different vendors in a particular region. The report also forecasts the market size of SMS Aggregators A2P Messaging Services with a compound annual growth rate in terms of revenue over the forecast period. The research report also provides a detailed analysis of the contracts, collaborations and partnerships between different vendors across the globe to expand your business in the SMS Aggregators A2P Messaging Services market. The research highlights key developments in terms of growth opportunities at the national or regional level. We also focused on PESTLE, SWOT and Porter’s Five Forces Analysis of the global A2P messaging services market of SMS aggregators

Industry Analysis Services

Industry analysis can be an effective tool to help an organization design strategies and policies for a business. Stratagem Market Insights investigates gaps in the existing market space and aligns client perspectives in the market by providing advanced data, research and analysis. These research findings can offer valuable information to our clients, helping them to project long and short term future industry trends, consumer needs, overall cost reduction, etc. of expertise and adopting advanced analytical tools to deliver unbiased competitive research analysis to help our valued clients align their strategies with their long-term growth goals.


  • Unparalleled, industry-leading research service
  • A panel of experienced and versatile experts
  • Using advanced analytical tools to deliver highly personalized industry intelligence research
  • Professional reports to convey easy-to-use information

Buy Now This Premium Report Just 2000 USD @https://www.stratagemmarketinsights.com/cart/135439

This SMS Aggregators A2P Messaging Services Market reports the Market status and outlook of global and major regions, from angles of players, countries, product types and end industries; This report analyzes the major players in the global industry and splits them by product type and applications/end industries. This report also includes the impact of COVID-19 on the SMS Aggregators A2P Messaging Services Market industry. Global A2P Message Service SMS Aggregators Industry Market 2022 Research Report is spread across 120+ pages and provides exclusive vital statistics, data, insights, market trends and landscape details competitive in this niche sector.

Contact us:

Mr Shah
Stratagem Market Overview
Tel: US +1 415 871 0703 / JAPAN +81-50-5539-1737
E-mail: [email protected]


Texas gunman sent direct messages ahead of school shooting, Facebook says

Placeholder while loading article actions

Facebook said Wednesday that the Texas shooter sent direct messages about his attack on one of its platforms, which the social media giant learned after the school shooting.

Governor Greg Abbott told a news conference the gunman posted his plans on the social media site ahead of the attack. The shooter, whom authorities identified as 18-year-old Salvador Rolando Ramos, wrote, “I’m going to shoot my grandmother” and “I’m going to shoot an elementary school” shortly before the attack, according to Abbott.

But in a tweetFacebook spokesman Andy Stone said: “The posts described by Governor Abbott were private text messages that were discovered after the terrible tragedy.”

Another company spokesman, Joe Osborne, said the messages were sent privately but declined to say which of his social networks were used. Facebook, which was renamed Meta last year, also operates Instagram and private messaging service WhatsApp.

Gunman who killed 21 in Texas school shooting posted plans on Facebook

Nineteen children and two teachers were killed Tuesday at Robb Elementary School in Uvalde when the gunman opened fire. Ramos first shot his grandmother in the face, Abbott said, and she was airlifted to hospital.

Ramos’ private social media messages were revealed on Wednesday as the investigation into the shooting continues. Social media platforms have emphasized private messaging for years, and several sites have rolled out features that allow users to post temporary statuses or stories that disappear from public profiles after a certain period of time.

Facebook, along with other tech companies, has been at odds with law enforcement around the world who have urged the social media giant to drop plans to implement end-to-end encryption on its services. messaging, as they claim it would hamper their ability to spot criminal activity. The company plans to extend encryption, which prevents third parties from being able to read message content, to Facebook and Instagram. He already uses it on WhatsApp.

It is unclear if Ramos posted any public messages that could have hinted at the shooting on any social media platform. The Uvalde Consolidated Independent School District previously used an artificial intelligence-based program to analyze social media posts for potential threats years before the attack.

Before Buying Rifles, Shooter Turned Erratic, Violent, Friends Say

The school district said in a document for the 2019-2020 school year that it uses Social Sentinel to monitor all social media with a “connection to Uvalde as a measure to identify any possible threats that may be made against students and/or or school district personnel.”

It is not known if the program was in use at the time of filming. Navigate360, which operates Social Sentinel, did not respond to a request for comment.

Social Sentinel bills itself as an artificial intelligence-based software that can analyze conversations in organizations’ emails and public social media posts to identify people at risk of inflicting harm on themselves or others. others.

Ramos seemed to have been active on Instagram before. High school classmate Nadia Reyes told The Washington Post that he posted an Instagram story two months ago in which he yelled at his mother, who he said was trying to kick him out of their home .

“He posted videos on his Instagram where the cops were there and he was calling his mom a b—- and saying she wanted to kick him out,” Reyes said. “He was screaming and talking to his mother very aggressively.”

Social media company Snap said on Wednesday it had suspended an account that may have been connected to Ramos and was also working with law enforcement.

So far, what is known of the shooter’s social media trail does not appear to show that he broadcast his plans to a large group of people, said Emerson T. Brooking, senior researcher at Digital Forensic Research. Atlantic Council Lab, which studies how information travels online. Instead, it appears the shooter sent messages, sometimes encrypted, to individuals.

Private messaging apps may not be secure

It shows the mismatch between services that analyze publicly available social media posts and the way many people now communicate online, Brooking said.

“There has been such a shift towards closed messaging platforms and ephemeral messaging,” he said.

Asci revises codes for more inclusiveness in ads


NEW DELHI : Any advertisement in India that discriminates against or makes fun of any gender identity, sexual orientation, body shape, age or any type of physical or mental condition, will now be considered a violation of the code set by the industry regulator, the Advertising Standards Council of India (ASCI). On Wednesday, the industry regulator said it updated its advertising code for greater inclusiveness in all brand communications through advertisements.

The current ASCI code already required that advertisements not make fun of anyone based on race, caste, creed, gender or nationality. However, the regulator said new areas of possible discrimination or derision have now been included in Chapter 3 of the advertising code. The updated code now states that “no advertising will be permitted that” makes fun of any individual or group on the basis of race, caste, color, religion, gender, body shape, age, sexual orientation, gender identity, physical or mental condition, or nationality.”

A statement from the self-regulatory body says that as a forward-looking organization, ASCI ensures that its guidelines keep pace with the ever-changing society. As consumers are increasingly concerned about unfavorable portrayals of certain sections of society, this change ensures that advertising also keeps pace with these legitimate expectations.

ASCI CEO and General Secretary Manisha Kapoor said that although the clause has always existed, it has now been expanded to include different types of potential issues. The additions were made with the public discourse about them and how consumers hold others accountable for these constructs in mind.

Kapoor said ads need to be able to show all sorts of shapes and forms that actually exist, but not in a mocking way. “Depictions are welcome, we would like more diversity and inclusion in advertising, but we don’t want them to be disrespectful. The idea is not to make people look cartoonish and to put in ads just to make fun of them,” she said.

“The idea is to follow the evolution of society because that is what consumers think is important today and it is important that advertisers understand this and ensure that they meet the expectations of consumers on the how they should be represented,” Kapoor added.

Communications strategy consultant Karthik Srinivasan said he believes the updated ASCI code is quite comprehensive and extensive on paper, but its implications will only be understood when they are applied and challenged and the Decisions will be made by ASCI on such complaints.

“For example, associating laziness with a certain body shape often occurs in advertisements for cooking oil or health malt drinks, even if they don’t deride the characters. Instead, they’re used to make a bigger point about health, in a positive way. And no brand or agency worth their salt would even dream of ridiculing based on physical harm,” he said.

He added that when it comes to gender identity, there is a definite increase in the way the spectrum is portrayed in Indian advertising and it is good to see ASCI gradually adding it to the code.

With the code change, “ASCI hopes to ensure that advertising becomes more inclusive and aware of all sections of our country, and does not perpetuate certain portrayals that have no place in a progressive society,” said said Kapoor. code have been approved by the board recently.

ASCI seeks to ensure that all advertisements comply with its Self-Regulatory Code, which requires advertisements to be legal, decent, honest and truthful and not dangerous or harmful while respecting fair competition. ASCI investigates complaints in media such as print, TV, radio, billboards, text messages, emails, internet/website, product packaging, brochures, promotional materials and materials point of sale.

To subscribe to Mint Bulletins

* Enter a valid email

* Thank you for subscribing to our newsletter.

If Nancy Pelosi is refused communion, why not William Barr?


Is abortion a bigger problem than the death penalty? By punishing one politician and celebrating the other, some Catholic leaders act like mere partisans.

(The New York Times) US House Speaker Nancy Pelosi, left, and former US Attorney General William Barr.

San Francisco Archbishop Salvatore Cordileone announced that he had barred House Speaker Nancy Pelosi from receiving communion in his archdiocese because of her support for abortion rights. Let’s set aside for a minute the fact that single issue altar policing is pastoral malpractice and that denying the Eucharist to the California Democrat will only further divide Catholic parishes and squander the already severely diminished credibility of the leaders of the church.

Doing communion politics, moreover, reveals the hypocritical partisanship of certain vocal segments of the Catholic right. When former Attorney General William Barr, a Catholic who served in Trump’s Republican administration, played a key role in reviving the federal death penalty in 2019, there were no calls to deny him the communion. The Catholic Church teaches that executions are always morally unacceptable, with the Catechism referring to the death penalty as “an attack on the inviolability and dignity of the person”.

For the Church, in short, the state-sanctioned killing of a human being on death row is a “pro-life” issue.

But instead of calls to deny Communion by the then attorney general, Barr was honored with an award for his church service from the National Catholic Prayer Breakfast, an event in Washington that featured an address by the then president, Donald Trump. Texas Governor Greg Abbott, a Catholic, also touts his “pro-life” values ​​while presiding over one of the world’s busiest death row chambers without fear of being denied communion.

I am not advocating that politicians whose agendas conflict with Catholic teaching be excluded from the grace of the Eucharist, a sacrament the Church teaches as “the source and summit of Christian life.” Deploying the Eucharist in political battles is a mistake, whether it is aimed at supporters of the right to abortion or supporters of the death penalty.

But it is hypocritical for bishops to selectively inflict punishment, especially by withholding what we Catholics believe to be the real body of Christ. This hypocrisy undermines the integrity of the Church and sends the message that the hierarchy is just a political interest group.

In a letter to worshipers in San Francisco, Cordileone said he was only protecting Pelosi from “danger to his own soul”, while insisting that his public actions had caused a “scandal” among worshipers. The real scandal is the damage the archbishop is doing to the church and to those who find spiritual nourishment in a holy sacrament by doubling down on a culture war strategy that his own pope has insisted is dangerous.

The archbishop’s decision shows a brazen disregard for Pope Francis and other Vatican officials who have warned US bishops not to weaponize a holy sacrament.

“I have never refused Communion to anyone,” Francis told reporters in September. He urged bishops to be “pastors” and warned that “if we look at church history, we will see that whenever bishops did not deal with an issue as pastors, they took party politically”.

Francis, who opposes abortion but favors dialogue, met Pelosi last October at the Vatican. A few weeks later, the pope met President Joe Biden, who also defends the right to abortion. Both meetings sent a strong signal to the relatively small but vocal choir of conservative U.S. bishops who want to deny communion to “pro-choice” Catholic elected officials.

In case the message wasn’t clear enough, the Vatican’s top doctrinal official, Cardinal Luis Ladaria, wrote a letter to the president of the American Episcopal Conference, Archbishop of Los Angeles Jose Gomez, last May, warning that it would be “misleading” to give the impression that abortion is the only serious moral issue for the church.

Instead of publicly shaming Pelosi and further dividing the Church at a time of intense national polarization, Cordileone could play a more pastoral role if he worked to bring people together, engage with the majority of Catholics who support the right to abortion and followed the example of Pope Francis. looking for common ground.

(John Gehring is director of the Catholic program at Faith in Public Life and author of “The Francis Effect: A Radical Pope’s Challenge to the American Catholic Church.” The views expressed in this commentary do not necessarily reflect those of Religion News Service.)

‘Obi-Wan Kenobi’ Could Be Star Wars’ Last Hope Under Disney


In the original Star Wars movie, released in 1977, Luke Skywalker cleans up his newly acquired droid R2-D2. He accidentally triggers a secret message sent by Princess Leia aboard the ship Tantive IV, revealing a message that launches the film’s second act and – in many ways – the Star Wars franchise as a company:

“Help me, Obi-Wan Kenobi. You are my only hope.”

It’s a classic line. Perhaps the guideline of a series that contains it. But in 2022, on May 4 everyday, it’s a line that hits differently.

In May 2022, a few weeks before Obi Wan Kenobiis the first on Disney+it might be me deliver this line. Me: A bruised and battered Star Wars fan, watching in dismay as Disney released clunker after clunker into canon.

When I press play on the new series trailerit could be me in hologram form: “Help me, Obi-Wan Kenobi. You are my only hope.”

And from a weird and meta point of view, it could be disney himself. After a big-budget mixed trilogy and largely unsuccessful spin-off filmschased by mediocre shows like Boba Fett’s Book, Obi-Wan Kenobi looks like a huge bet for Disney. A moment to do or die for a series languishing in the doldrums. A last hope.

Page turners, they weren’t

Don’t get me wrong: Star Wars, for at least a decade, has sort of sucked. During this time, Star Wars took me on a crazy journey that started with anger, then acceptance, but ultimately ended in utter indifference.

I don’t care about Star Wars anymore, and I don’t think I’m alone. I am not invested in its universe, its characters or its success. Star Wars – this legendary tale set a long, long time ago in a galaxy far, far away – has has lost its mystique.


The Last Jedi reigned supreme when it was released, and it only gets better with age.


It stings harder because Disney initially got it to the right. After a well-done (though sure) tribute film in The Force Awakens, Star Wars broke the mold with The Last Jedi; a movie that challenged not just assumptions about Jedi lore and other hokey-pokey bullshit, but notions of nostalgia and fandom itself. In short, he absolutely ruled.

In perhaps the best Star Wars scene ever filmed, Yoda stands before a blazing fire that he started himself. “The sacred texts”, shouts Luke, in agony.

“The page-turners, they weren’t,” Yoda replies.

It was a film that told us to “let the past die, kill it if necessary”. It was everything the Star Wars series needed, and it was amazing.

Of course, everyone got angry. Disney panics. Rise of Skywalker, a cobbled-together spreadsheet of a movie, was the result. It looked, felt, and played like a movie written by a toxic Reddit thread turned sensitive, and it undid all the bold decisions made in The Last Jedi. It was the first nail in the coffin for my own Star Wars fandom, but it wouldn’t be the last.

In the wake of Rise of Skywalker, we’ve seen Star Wars do nothing but flatter audiences desperate to bask in nostalgia. To be clear: we all have to take our share of responsibility. We’ve become a cursed collective that judges the quality of shows like The Mandalorian and The Book of Boba Fett based on the quality of their cameos. Did a grotesque CGI Luke Skywalker appear? Good. No Ahsoka Tano or Baby Yoda in this episode? Evil.

It’s completely distorted.

It’s a name I haven’t heard in a long time

Given the lackluster quality of Disney’s recent Star Wars outing, it’s unreasonable to expect Obi-Wan Kenobi to signal drastic change, but I still have a smoldering ember of hope. For several reasons.


We now have another generation of nostalgic fans of a different kind of Star Wars.

Merrick Morton

Reason 1: The stakes seem high. Obi-Wan Kenobi is a central character in the Star Wars universe, and he’s played by one of Hollywood’s biggest stars. Of all the shows streaming on Disney Plus, you feel it’s important they get this one to the right. These stakes might cause Disney to play it safe, but hopefully that translates to higher quality production across the board.

Reason 2: We have a generation of Star Wars fans who yearn for a different type of nostalgia. The final Star Wars trilogy spent a good six hours playing with or against the original trilogy. In 2022, we have a group of thirty-somethings who have grown up alongside the prequel trilogy.

I’m a nostalgia-bait hater in nearly every medium I consume, but I suspect it might be fun to go back to the prequel aesthetic with a new set of collectively aging eyeballs. Prequel-land feels like a different, less rigid, less lived-in Star Wars universe. There is potential here for something unique.

In this regard, Obi-Wan could also act as a kind of bridge. Not a Rogue One-style bridge – a boring movie striving to fill in gaps that never needed filling – but something more expansive and imaginative. Within the narrow confines of the Star Wars universe, there’s room in Obi-Wan’s timeline for something different: new characters, new enemies, new planets. There’s also space to create connective tissue between the trilogies that feels less convoluted. Recent movies and shows have made Star Wars feel rickety and small, held together with superglue and duct tape. Maybe I’m guilty of projecting my own hopes and dreams here, but maybe Obi-Wan Kenobi can make Star Wars feel vast and unknowable again. I do not know. Perhaps.

I will be very disappointed if he continues to paint by numbers. Obi-Wan Kenobi could become yet another Star Wars show bleh, stumbling from one fan service cameo to the next like a rotting zombie in search of brains. That’s almost certainly the most likely outcome here, but we can dare to dream.

Help us, Obi-Wan Kenobi. You are our only hope.

Tennessee Army National Guard spearheads program for continued service of retired noncommissioned officers on active duty


NASHVILLE, TN. – Under a first-of-its-kind program led by the Tennessee National Guard, NCOs who have retired from active duty Army can now join the National Guard and continue their service.

In 2021, the U.S. Army and National Guard Bureau updated their policies to give the National Guard the tools to recruit retired qualified warrant officers to active duty. These NCOs will retain their retirement pay while also serving in the National Guard.

“This program has been discussed for years, however, Tennessee is the first in U.S. Army history to implement this strategy,” said Brig. Gen. Warner Ross, deputy adjutant general of Tennessee. “This will have a significant impact on our force readiness as it will allow our organization to complement our ranks and hard to fill positions with highly qualified individuals.”

Historically, this was only permitted with soldiers deemed essential by the Secretary of the Army. Now, all retired Army non-commissioned officers on active duty are eligible. The Tennessee National Guard is the first state in the nation to formalize a state policy to begin accepting non-commissioned officers with valuable talents into their ranks.

“It’s an exciting time for warrant officers,” said Chief Warrant Officer 2 Nykeah Williams, chief warrant officer for Tennessee. “Tennessee’s NCO strength is currently at 92%. Our goal is to continue to build our strength and establish a higher standard than we have ever achieved.

One example where this new program benefits the Tennessee National Guard is the vacant Warrant Officer position for Air Drop Systems Technician (Military Occupational Specialty 921A). Currently, there are no qualified parachute riggers in the Tennessee Guard and no positions in this career field. The position has been vacant for 1,430 days. In the next 12 months alone, eight warrant officers will be retiring from active duty Army who meet the requirements for Drop Systems Technicians. Tennessee could fill that position with this new program.

Another issue driving this program is the changing demographics within the cohort of active duty warrant officers. In 1991, the active component had 1,500 warrant officers with over 20 years of experience. As of 2019, the active component had less than 350 warrant officers with over 20 years of experience, and they were all Chief Warrant Officers 5. With a smaller population of talent leaving active duty, and therefore available for the reserve component, new recruiting initiatives were necessary to maintain National Guard readiness.

Tennessee issued a policy in May 2022 codifying the process and providing implementation guidance for appointing retired active duty warrant officers to the Tennessee Army National Guard.

The process begins with the Tennessee Command Chief Warrant Officer identifying critical vacancies. The list of vacancies and corresponding career areas are then made available to all military personnel management offices of all U.S. Army commands in coordination with Human Resources Command message updates and military personnel.

Retired active duty warrant officers may apply for vacancies by contacting the Warrant Officer Force Manager for Tennessee. Once this office has a complete and approved package, it will coordinate with the Tennessee Officer Personnel Branch to advance to warrant officer in the Tennessee Army National Guard.

Final approval for membership in the Tennessee Army National Guard is approved by the Tennessee Adjutant General on the advice of the National Guard Bureau and State Command Chief Warrant Officer .

Retired active duty warrant officers will be accepted into the Tennessee National Guard for an initial three-year tour. Continuation after the initial tour will be granted based on state need and the performance of the warrant officer.

The preferred ranks for membership are Chief Warrant Officers 2 and 3. Members at the rank of Chief Warrant Officer 4 will be accessible by exception and at the discretion of the State Command Chief Warrant Officer. This program will not apply to Chief Warrant Officers 5.

One of the main points of interest for warrant officers considering this program may be the potential impact of National Guard and retirement. Also, how continued service might affect retirement salary calculations.

For compensation purposes, the individual can choose either day retirement or exercise compensation. They will not be paid for both.

For retirement calculations, the retired warrant officer’s rank will be his rank at the start of Army National Guard service. If promoted while in the Tennessee Army National Guard, their active duty retirement will be updated when the warrant officer retires again from the National Guard. The member will remain on the U.S. Army Retired List after their National Guard service ends, even though the Warrant Officer serves more than 20 years in the National Guard after retiring from the active component.

For those receiving a Veterans Administration disability, there is no change in how this is paid. If they receive exercise compensation, they will lose 1/30th of their monthly VA disability compensation for each day they exercise. It’s the same for the warrant officer’s retirement pension, it’s his choice. A member could receive VA disability and active duty retirement at the same time if they choose not to receive drill compensation.

There are other stipulations if ordered or volunteered for active duty while in National Guard status. The retirement will be calculated at the end of the on-call service to reflect this time in the retirement. If activated for a Title 10 mobilization, the member will be recalled from retirement to active duty status regardless of the duration of the orders. At the end of Title 10 activation, the member’s pension will be recalculated to reflect the years of service, rank, and year of the new pay scale.

Tennessee is excited to be at the forefront of this new personnel management policy and if you would like to learn more, please contact the Tennessee Warrant Officer Force Manager at ng.tn.tnarng.mbx.ngtn [email protected]

Tennessee Warrant Officer Corps logo (Tennessee National Guard photo)

How to turn YouTube video into GIF


Using a website called GIFs.com, users can convert any YouTube video into a GIF that they can share on social and messaging platforms. Here’s how.

Looking at a Youtube video, users may want to convert it to GIF. It could be a scene from their favorite superhero movie, comedy or animated series. Whatever the content of the video, users can make it into a short animated GIF which can be downloaded and sent to other users through messaging platforms. All popular instant messaging apps support GIFs, including WhatsApp, Telegram, Facebook Messenger, and even Instagram.

When people are connected through digital platforms, sending plain text messages may not be enough. Instead, users prefer to send GIFs to express their emotions or in response to add fun to messaging. While platforms like WhatsApp and Instagram come with a built-in GIF gallery, some users are eager to create their GIFs as they convey the exact message or sentiment they want. After learning how to convert YouTube videos to GIF, users will be able to create many GIFs.


Related: How to Share YouTube Videos on Snapchat

If anyone wants to explore the available GIFs, there are several websites like Giphy, where users can choose from thousands of options. Upon opening the website, you will notice GIFs organized into categories including trending, artists, entertainment, sports, and more. Users can upload a video from their computer and convert it to GIF as well. However, those who want to create GIFs from videos available on YouTube should skip this method. Instead, they should explore a website called GIFs.com.

Turn YouTube videos into GIFs

YouTube desktop

To create GIFs from YouTube video, users need to open the video on a computer through a web browser like Chrome or any other web browser. Once the video is open, go to the address bar, double click on the URL you want to modify and add “gif” before “youtube”. So if the video’s original URL looks like “https://www.youtube.com/example1”, after adding the word, it should look likehttps://www.gifyoutube.com/example1.’ After changing the URL, hit enter and wait for the webpage to load. The user should be redirected to GIFs.com, where they will see the YouTube video on the right side and a bunch of editing options on the left side.

Users select the part of the video to convert to GIF on the editor. Next, drag either end of the chosen part highlighted in blue to adjust the length of the GIF. At this point, users can add captions and images, blur the video, and crop it to the desired format. When users have created the GIF, they should click on the “Create GIF” button on the top right corner of the screen. The website will ask them to fill in a few fields, such as GIF title and tags. Additionally, users can also mark their GIFs as private or public. Enter the required information and click “Next”. It might not be as simple as using the recently launched YouTube Green Screen feature, but it’s worth it.

On the screen that opens, users can copy a link to the GIF and download it in four different formats: small GIF, original GIF, Facebook GIF, and original MP4. Although users can experiment with all four formats, downloading the Facebook GIF should work for most scenarios. Select the format and click download. Now users can share the GIF they created from a Youtube video on social and messaging platforms.

Next: What is YouTube’s “most replayed” feature and where can you find it?

Source: GIFs.com

Annie David, 90 Day Fiancee

90 Day Fiancé: David shocks by wearing Annie’s pants after weight loss

Stay away from fake Sbi Sms alerts asking to share confidential details: Government


In order to combat the escalation of phishing attempts, the Press Information Bureau (PIB), a nodal agency of the Government of India, has warned users of the State Bank of India (SBI) not to respond to fake SMS alerts asking for personal and banking information in order to unblock their accounts. Fraudsters often send a fake SMS alert in the name of SBI saying that your account has been blocked; to unblock the account, they invite you to enter your bank and private details by clicking on the URL indicated in the SMS. The link you click on will take you to a fraudulent SBI website, where you will be the victim of a phishing attempt.

According to a tweet from PIB “A circulating message claiming that your @TheOfficialSBI account has been blocked is #FAKE.” In response to such fraudulent activity, PIB said via a recent tweet that “Do not respond to emails/text messages asking to share your personal or bank details. If you receive such a message, report it immediately to report.phishing @sbi.co.in.”

Customers should be aware that SBI or any other bank never asks you to update or complete your KYC by clicking on links inserted in an SMS, so customers should be careful before clicking on a link asking them to update update their KYC or give account details in order to unlock their account.

Last month, in an attempt to counter ongoing bank SMS fraud, SBI informed its customers via a tweet that “Such SMS messages may lead to fraud, and you may lose your savings. Do not click on embedded links. Check the correct short code from SBI when receiving an SMS. Stay vigilant and stay #SafeWithSBI.”

SBI also mentioned on its website that “SBI never sends emails to obtain customer information. Please report immediately if you receive an email purporting to be from SBI to collect your username or your password or other personal information. This may be a phishing email.”

“State Bank or any of its representatives never emails/SMSs or calls you by phone to obtain your personal information, password, or one-time-use SMS password (high security ). Any email/SMS or phone call constitutes an attempt to fraudulently withdraw money from your account via Internet Banking. Never respond to such emails/SMS or phone calls. Please report immediately to [email protected] sbi.co.in if you receive such an email/SMS or phone call. Change your passwords immediately if you accidentally reveal your credentials,” the bank said on its website.

Never share your personal or bank details with anyone and never save your account information on a website. The Reserve Bank of India (RBI) says: “If someone has fraudulently withdrawn money from your bank account, notify your bank immediately. When you notify the bank, remember to take the acknowledgment of receipt from your bank. The bank must resolve your complaint within 90 days from the date of receipt. If the transaction took place due to your negligence, i.e. because you shared your password, PIN, OTP, etc., you will have to bear the loss until you report it. at your bank. If the fraudulent transactions continue even after you have informed the bank, your bank will have to reimburse these sums. If you delay reporting, your loss will increase and it will be decided based on the guidelines of the RBI and the policy approved by your bank’s board.” Contact your bank promptly if you suspect a fraudulent transaction, according to the RBI , or you can give 14440 a missed call for more information.

To subscribe to Mint Bulletins

* Enter a valid email

* Thank you for subscribing to our newsletter.

Biden delivers message to Kim Jong Un as he completes first leg of Asia trip


“Hello,” Biden said when asked for his message for Kim Jong Un. “Period.”

The succinct greeting reflected the Biden administration’s so far unsuccessful attempts to revive diplomacy with Pyongyang. Attempts to raise awareness in the North went mostly unanswered. Instead, Kim has stepped up missile launches and may be preparing for a seventh underground nuclear test.

Biden said he was prepared for such eventualities on his first trip to Asia.

“We’re ready for whatever North Korea does. We’ve thought about how we’re going to react to whatever they do. And so I’m not worried,” Biden said.

He was speaking before visiting some of the roughly 30,000 US military personnel stationed here as the final leg of his visit to South Korea.

Americans deployed on the Korean peninsula have long acted as a signal of US military strength in a region made anxious by the nuclear-armed nation to the north. Increasingly, they also act as a reminder of Western muscle in a region heavily influenced by China.

Biden observed a joint airspace control center where members of the U.S. and South Korean militaries work side-by-side to monitor airspace made stretched by North Korea’s missile testing ramp-up.

“Our alliance was formed through the shared sacrifices of the Korean War and decades later, thanks to you, the Republic of Korea is a strong and thriving democracy,” Biden told the group, standing near a large screen showing images of the Korean Demilitarized Zone. Biden opted out of the DMZ during his visit, unlike his predecessors, because he wanted to see American servicemen at their base.

“All of the American troops who are here and your families, thank you for what you are doing for our country and our allies,” he said. Later, he joined a group of military families for ice cream.

Earlier in the day, the president met with Hyundai Motor Group Chairman Chung Euisun in Seoul, where he highlighted $11 billion in new investments from the Korean automaker, including $5.5 billion to open a new electric vehicle plant in Savannah, Georgia.

One of Biden’s main goals during his visit to Asia this week has been to reaffirm his commitment to two key alliances while seeking ways to further expand cooperation. He will depart South Korea for Japan later today, bringing with him a similar message of reassurance that America’s longtime ally in the Pacific can count on the United States as an economic and reliable security.

A day earlier, Biden and his South Korean counterpart, President Yoon Suk Yeol, wrote in a joint statement that they were open to expanding joint military exercises that Biden’s predecessor cut back, deeming them too costly. and provocateurs. Biden said the cooperation between the two countries demonstrates “our willingness to face all threats together.”

The expanded military drills will aim to ensure “whatever it takes to best ensure military readiness and best ensure our ability to work closely together,” a senior administration official said on Sunday, though he declined. to provide a timetable or advice on the scope of the enlargement. drills.

“Mr. President, your country’s democracy shows the power of being able to deliver for its people,” Biden told Yoon during a toast at the start of a state dinner on Saturday night. “We are proud to say, the generals with me today can say it too, that our armed forces have stood side by side, standing on a peninsula for seven decades to preserve peace and make this shared prosperity possible.”

He was likely to send a similar message to Japan, which also hosts a large US military population and maintains a mutual defense treaty with the United States. North Korea’s increased provocations and Chinese territorial seizures have caused deep concern in the country, which has turned to the United States for assurances about its security.

Biden is expected to visit Emperor Naruhito at his Imperial Palace before meeting Prime Minister Fumio Kishida, who took office last fall, on Monday. Later, he will outline a business plan for Asia that officials hope can generate broad support. And he will conclude his visit with a summit of the collective Quad – made up of the United States, Japan, India and Australia – which is widely seen as an attempt to counter China’s military and economic ambitions.

Japan turns away from post-WWII pacifism as Chinese threat grows

Biden sought on his trip to connect the parallel sets of economic and security issues that emerged during his discussions with leaders. His trade plan, seen as a scaled-down alternative to the Trans-Pacific Partnership trade pact abandoned by his predecessor, is expected to place a strong emphasis on resilient supply chains decoupled from Chinese parties – a message he repeatedly conveyed to Seoul. .

Among the myriad other issues he hopes to raise – including regional security, trade, the Covid pandemic and the war in Ukraine – is the issue of improving ties between the two countries he is visiting this week. Relations between Japan and South Korea have soured in recent years, a combination of long-simmering historical resentments and more recent trade actions.

Biden told reporters in Seoul on Saturday “it’s extremely important” that the United States, South Korea and Japan have “a very close trilateral relationship.”

He said the current state of the world, where autocratic regimes like China and Russia have defied democratic norms, demands that the rest of the world stick together, despite lingering differences.

“Things have changed,” Biden said during his press conference. “There is a feeling among Pacific democracies that there is a need to cooperate much more closely, not only militarily but also economically and politically.”

Action News Troubleshooters: Experts Issue Warning to Protect Your Cryptocurrency Accounts From Hackers

MARLTON, New Jersey (WPVI) – This is a warning to anyone getting into or investing in cryptocurrency.

A South Jersey man turned to convenience stores after hackers took tens of thousands of his money.

Vibhor Jain of Marlton, Burlington County says he feels physically sick whenever he thinks about his depleted cryptocurrency account.

“It’s just ridiculous that this happened,” he said.

Jain had been developing his Coinbase account for five years. His investment during this period was between $28,000 and $30,000.

Then last year he received a suspicious message.

“I received a notification on my phone that my Coinbase password has changed and I was unable to log into my Coinbase account,” he said.

Jain says that within minutes the hackers used 400 transactions to drain his account.

He said about $34,500 was missing.

Jain thinks Coinbase should have flagged the transactions.

“It’s a financial institution that Coinbase should have been able to verify this pattern and immediately stop these transactions,” he said.

As a computer engineer, Jain thought he had done everything necessary to secure his accounts.

But Jain later learned that his personal information had been compromised in two separate data breaches involving Coinbase and its mobile operator.

He says he has not received any notification from either.

“They should have made sure all accounts change their passwords. Enforce that,” Jain said.

Chris Pierson, founder and CEO of a cybersecurity company Black Coat said that creating a long and complex password is essential.

Ideally, it should be a phrase or phrase that only you can guess.

“Ensuring that your crypto account password isn’t being used on another account will be vitally important,” Pierson said.

If it’s hard to remember, Pierson suggests using an encrypted password vault.

Also, make sure you have an extra layer of authentication to access your account.

“Two-factor authentication will either be an SMS code that’s texted to your phone, or you have some type of authenticator,” he said. “It could be an actual token that you insert into the computer to complete the transaction or an actual authenticator app.”

And never accept any unsolicited offers you receive via text, email, or phone call to get involved in cryptocurrency.

Experts say that if you already have a crypto account, do not accept any incoming requests asking you to provide information.

The troubleshooters reached out to Coinbase on Jain’s behalf, and Jain said that while he couldn’t divulge the details, he’s happy with the outcome after the troubleshooters got involved.

Coinbase told troubleshooters they couldn’t speak to Jain’s case specifically because of confidentiality.

However, they have released a statement on security and customer service in general.

Coinbase statement

“Coinbase is taking extensive security measures to ensure that our customer accounts remain as secure as possible. In addition to educating our customers on best practices To secure their Coinbase accounts, Coinbase has a dedicated fraud investigation team and policy to provide expert support to our customers. We have also started rolling out telephone support specifically for ATOs in August from 2021, and provided global phone support to all customers, as well as live messaging late last year.

When issues arise, we work directly with customers to resolve them. We are unable to share Mr. Jain’s account details due to customer privacy. In most cases, Coinbase does not cover any loss resulting from unauthorized access to Coinbase accounts due to compromise of a customer’s login credentials, which is often the cause of account takeovers.

We recognize that these are terrible crimes that can have a significant impact on consumers. With more and more of our personal information available online, it is increasingly important for consumers to understand how to protect their personal email accounts and cell phones from unauthorized third parties. Once a third party gains access to a consumer’s email or phone, that consumer’s other online accounts may also be at risk. This is why Coinbase regularly works to educate our customers on how to protect their personal email accounts and phones – it’s the single most important thing they can do to prevent unauthorized access to all of their online accounts, not just Coinbase.

We encourage all of our customers to take important steps to secure their online accounts. You can see a preview below and all the details in our Help Center.

Use a strong and unique password for each of your online accounts

Do not store API key data in a public area or forum

Make sure all financial accounts and emails have 2FA (two-factor authentication) enabled, preferably using a Time Based One-Time Passcode (TOTP) code generator

Log out of your Coinbase account regularly

Make sure your mobile device carrier has additional security features enabled for your mobile account.”

Copyright © 2022 WPVI-TV. All rights reserved.

The Point, May 20, 2022: UF holds evening vigil to honor lives lost in Buffalo shooting


Subscribe to The Point, arriving in your inbox Monday through Friday at 8 a.m.

• WUFT News: Candlelight vigil held on UF campus to honor lives lost in Buffalo Massacre. “Communities continue to mourn the lives of those who lost their lives after Saturday’s racially motivated attack at the Buffalo supermarket that killed 10 people and injured three. On Thursday morning, UF announced that a candlelight vigil would be held in remembrance of those whose lives were taken on Saturday….Before a crowd of about 60, Pastor Gerard Duncan of Prayers by Faith Outreach Ministries in Gainesville delivered a powerful prayer and message about the importance of unification in these times of tragedy.

• WUFT News: Florida Gators radio host Mick Hubert talks about career. “The Gators will have new head coaches in football and men’s basketball next season, and a new head play-by-play announcer will also arrive. After 33 years, Hubert announced his retirement on Thursday. He will end his career with the Gators’ next baseball home series against South Carolina, according to the University Athletic Association.

• Mainstreet Daily News: ACPS accidentally sends active shooter text. “A series of Alachua County Public School (ACPS) test scripts warning of an ‘Active Shooter Alert’ issued Thursday morning was mistakenly sent to all families in the district. CSPA spokeswoman Jackie Johnson said in a statement that the text messages were only for a select group to test the panic button mobile app for employees that the district recently rolled out. in place.

• WUFT News: Vet Healing Craft Program helps veterans at High Springs Library. “The program provides a safe space for Alachua County veterans to come together and share their experiences. Participants receive therapy kits that allow them to build crafts such as birdhouses, jewelry, wooden clocks and leather soccer balls.

• Ocala Star-Banner ($): A man pleads guilty to torturing black bears in the Ocala National Forest, sentenced to one year in prison. “Two months ago, a judge approved a plea deal for a man accused of abusing and mistreating black bears in forests across the state. Thursday morning, the same judge was on the bench as another person has decided to accept a plea deal in this case.

We focus our legal attention on these areas of practice:
• Family law
• Business Law
• Estate planning
• Approval
• Guardianship

Visit lawyergainesville.com or call 352-373-3334 today to learn more.

• Tallahassee Democrat ($): “It’s true”: Florida’s version of “Tinder Swindler” pleads guilty in federal court in Tallahassee. “Brian Brainard Wedgeworth, a man accused of defrauding nearly two dozen women of more than $1 million in eight states, pleaded guilty in Tallahassee federal court to 25 counts related to his romantic plans .”

• WUWF-Pensacola: Fried calls for state of emergency for Florida. “Florida’s Commissioner of Agriculture is asking Governor Ron DeSantis to declare a state of emergency, due to the high cost of food and fuel. … A declaration of emergency, she said, would give the Department of Agriculture the ability to suspend a law that requires gas stations to sell fuel at or above cost.

• WTSP-Tampa: ‘Someone selling fentanyl is murdering people’: DeSantis signs bill increasing penalties. Gov. Ron DeSantis on Thursday signed a bill that increases the mandatory minimum sentences for trafficking fentanyl from three years to seven years, increasing the sentence to at least 20 years for trafficking larger amounts.

• Florida Politics: Census undercount likely cost Florida a seat in the US House. “A new report from the U.S. Census shows that Florida’s population was significantly underestimated in 2020. Underestimating Florida’s population by more than 700,000 people likely cost the state a seat in Congress for the next decade. A post-count survey released Thursday estimated significant undercounts in six states: Arkansas, Florida, Illinois, Mississippi, Tennessee and Texas. This is based on low self-response rates to census surveys.

• Florida Information Service: NRA says California ruling bolsters challenge to Florida gun law. “Indicating a ruling in a California case, attorneys for the National Rifle Association this week urged a federal appeals court to strike down a Florida law banning the sale of rifles and other long guns to adults under the age of 21. … The ban on long gun sales to people between the ages of 18 and 20 was included in a sweeping school safety law.Federal law already banned the sale of handguns to those under 21 years.

• Axios Tampa Bay: Voice of Dozier school victims die, 76. “Jerry Cooper, who led an organization of former pupils of Florida’s oldest public reform school and helped secure a formal apology from state lawmakers for a century of school abuse, died Saturday. at his home in Cape Coral after battling cancer, his wife, Babbs, tells Axios.

• NPR News: Photo of Florida college students spelling racial slur under investigation. “A South Florida school district said it was launching a full investigation into a photo showing students spelling out a racial slur that was shared online on Monday. The Martin County School District confirmed that the photo with the six students spelling out the racial slur was genuine, according to a statement from the district. In the photo, each of the six students is depicted holding a large letter that spells out the word N.”

• World: Millions rushed to leave Ukraine. Now the line to go home stretches for miles

• Health: The CDC is investigating 180 cases of children with hepatitis. The cause is a mystery

• Science: how Rahima came to occupy a special place in the history of smallpox and contribute to its end

• National: Wrongly Accused Bird Watcher in Central Park Video Receives Birding TV Show

• National: Oklahoma legislature passes bill banning nearly all abortions

• Politics: Jan. 6 panel wants answers from lawmaker who it says led Capitol tour before attack

• Politics: Trying to condemn the war in Ukraine, Bush inadvertently calls the war in Iraq unjustified

About Today’s Curator

I’m Ethan Magoc, editor at WUFT. Originally from Pennsylvania, I found a home that tells stories of Florida. I’m part of a team that searches every morning for local and national stories that are important to you. please send your comments on today’s edition or ideas for stories we may have missed to [email protected]

Parents concerned over complaints of sexual misconduct by substitute teacher


ROCK ISLAND, Ill. (KWQC) – According to the Rock Island-Milan School District, on May 11, a sixth grade substitute teacher was escorted from the Rock Island Center for Math and Science following multiple allegations that he had been sexually inappropriate with young girls in his class.

Two of the girls’ parents told TV6 they felt the school had not acted quickly enough to protect their children.

It all started with an SMS that no mother wants to receive.

“At 2:08 p.m. I got a text from my daughter Jasmine saying ‘Mom, tell me why a substitute teacher was staring at my boobs licking her lips,'” said Sarah Kruise, mother of Jasmine Gillen , who was in sixth grade. in the substitute teacher’s class.

Gillen says that at recess around noon, she saw two of her classmates crying and telling the principal that they had been touched inappropriately by the substitute.

She says at that time a sub came out of the school to line up the class and go back inside.

When the students lined up, Gillen said she had a strange interaction with the substitute.

“I was like, ‘how’s your day?’ and he gets a little too close,” Gillen said, “and I look around, ‘you see that, don’t you?’ and out of nowhere he’s like, have you been to florida? and i look around confused, then look down at my shirt.

Gillen says she wore a T-shirt with the word Florida written across the chest. “I’m like ‘no’ and I just look at his eyes on my breasts,” she said.

Gillen says she made an official statement at school about what happened with a few of her classmates.

A mother who asked to remain anonymous said her daughter had experienced a similar situation the day before.

The woman said her daughter told her what happened after the teacher was escorted off campus the next day.

“[My daughter] dropped her pencil sharpener on the floor and bent down to pick it up,” said the woman, who then said her daughter noticed the teacher getting excited, “he hurt her comfortable and asked to be moved to sit elsewhere. I’m not comfortable that they just let the guy go.

According to Gillen, the teacher was able to bring the class back into the room to teach for a little while after the allegations were released at recess. He was then escorted out by the principal.

TV6 asked the school about this specific allegation and the school did not respond.

“My problem is they turn around and let this man take them back to the classroom,” Kruise said, “they were in the classroom 30 minutes before the principal came in to get him off the charges.”

According to the parents, the school did not inform them of the allegations until later in the afternoon. “If it wasn’t for my daughter who texted me at 2 p.m., I wouldn’t have heard about it until 3:30 p.m.,” Kruise said, adding, “we got a robocall at 3:30 p.m. saying that for the sixth year bodies that allegations have been brought to their attention.

In an email to TV6, district spokeswoman Holly Sparkman said the principal sent a robocall to sixth-grade families on the evening of the alleged incidents. Sparkman said the principal also interviewed many students during the afternoon and “worked on putting supports in place to ensure students felt physically and emotionally safe.”

A parent, however, said he was not informed of the incident because his daughter, who attends the same school, is not in sixth grade.

“He’s still a staff member,” said Stacey Charleton, mother of a fifth and third at the school, “he’s an adult and he could have taken advantage of any of our children , so as parents, we all should have been informed.”

Kruise mostly says she feels worried that the school called DCFS instead of the police.

“I don’t feel safe sending my child to a school knowing a procedure in a lifetime of calling DCFS first,” Kruise said.

TV6 contacted the school district about their contact with DCFS. They said the state of Illinois requires teachers to report suspected minor misconduct to DCFS. DCFS then communicates with local police, the district says.

The Rock Island-Milan School District says the situation is currently under police investigation and the school followed proper protocol.

The substitute teacher has not been officially charged, so TV6 will not name him for the moment.

According to the district’s employment website, the teacher has worked for the district since 2018.

Here is the full statement the Rock Island-Milan School District gave to TV6 via email:

“On Wednesday, May 11, Principal Amy Nitzel received concerns from students regarding inappropriate and unprofessional behavior by a temporary/substitute individual at the Center for Math & Science.

The principal immediately removed the person from the school campus, then took statements from students and worked to put supports in place to ensure students felt physically and emotionally safe.

Because RIMSD #41 staff are mandated by the State of Illinois to report to the Department of Children and Family Services (DCFS) when they have reasonable grounds to believe that a child ( minor) may be abused or neglected, the information has been reported to DCFS for investigation.

The school district is fully cooperating with the Rock Island Police Department and the Department of Child and Family Services in the investigation. The replacement/individual has been removed from the School District’s list and will no longer be used by RIMSD #41.

The safety and well-being of students is the top priority of RIMSD #41. Once Principal Nitzel learned of the students’ complaints, she acted quickly in the situation to remove the substitute from the school, take student statements, and communicate with parents and staff about the situation this after -noon there.

Given the sensitive nature of the complaints, every effort was made to ensure that the emotional well-being of students was considered and that parents were aware of the event.

Copyright 2022 KWQC. All rights reserved.

Beware of SMS messages claiming to be from two major Spanish banks


The messages want people to click on a fraudulent link. / on

The Spanish National Institute of Cybersecurity warns that these are fraudulent and constitute a means of acquiring personal and banking information

Cybercriminals never stop and are always on the lookout for new ways to defraud people, or rehash old ones that have worked in the past. Today, Spain’s National Cybersecurity Institute warns of a new attempt at ‘smishing’, where criminals send text messages (SMS) claiming to be from Bankinter or BBVA banks. The Institute says similar messages may also appear to come from other banks.

Smishing is similar to “phishing”: criminals attempt to obtain personal information such as passwords, credit card numbers, bank details and other sensitive and confidential information which they will use to commit a fraud or theft.

It is not the first time that they have used the name of Bankinter and BBVA, but on this occasion the experts have identified different messages. These messages normally indicate that an unusual access has been detected on your online banking account, or that your card has been blocked, and they ask you to click on a link to fix the problem.

The links lead to a website that looks like the bank’s, but once the customer enters their login credentials, criminals can access and use their account. They also have all the personal and bank details of the person concerned.

What to do

The Cybersecurity Institute advises that anyone who receives such an SMS should ignore or delete it, and never click on the link or download an app.

If someone clicks on the link and inserts their bank account access details, it is best to immediately change the online banking password and contact the bank to let them know what happened. past. Also take a screenshot of all messages and save emails etc. as evidence when you report the problem.

To avoid falling victim to these scams:

• Never open links in text messages from unknown users; delete messages immediately.

• Never reply to an SMS of this type.

• Be very careful when opening links or downloading attachments from emails, messaging apps and social networks, even known contacts.

• Make sure your operating system and applications are always up to date.

• Check the website URL. If there is no security certificate or it does not coincide with the website, never provide personal or banking information.

• If in doubt, contact the company or service directly for verification, or report it to the police or the Cybersecurity Helpline.

Key things to keep in mind for a secure UPI payment


The Unified Payment Interface (UPI) has revolutionized the electronic payment system in India. It allows payments to be made through the mobile application linked to your bank account. You can transfer money to the recipient’s bank account in less than a minute. The entire payment process through UPI is contactless, and it has proven its usefulness during the Covid period. UPI uses a highly secure platform. Users must first register for UPI using the same mobile number already registered with the bank. Despite the secure platform, there are still risks of fraud if you are not careful when using UPI for transactions.

Here are the key things you need to keep in mind for a secure UPI payment and to avoid fraud.

Check UPI ID before sending money

You can transfer payment through your UPI-enabled app to the recipient’s unique UPI ID. Similarly, you can receive payment from others through your unique UPI ID. It is important to share the correct UPI ID when you want to receive the payment. You must verify the recipient’s UPI before initiating the transaction when you send the payment. To further reduce the risk of error, you can transfer/receive a very small amount (e.g. Rs 1) for a confirmation.

Check when paying via QR code

You can transfer the payment to the recipient by scanning a UPI QR code. Once you scan the QR code, the recipient’s unique UPI code will be displayed on the payment page. You must verify the QR code before transferring the amount. There are cases where fraudsters have replaced the merchant’s QR code with their QR code. Then people transferred the payment and got cheated. To avoid such a situation, you should use the verified QR code shared by the merchant or payment recipient.

Never share your UPI PIN

When transferring payment using the UPI-enabled app, a unique PIN code is required to authenticate the transaction. The unique PIN must be configured when linking your bank to your UPI ID. UPI PIN code is required to transfer payment and not to receive payment. You should not share the UPI PIN with anyone.

Keep your phone screen locked by password

Keeping your phone password-locked reduces the risk of fraud when using UPI for a payment transaction, especially when your phone gets lost and falls into the wrong hands. It would be helpful to avoid easy-to-guess passwords that anyone can easily crack. Try to memorize your passwords. Always change your password at regular intervals.

Avoid using multiple UPI apps

Having multiple UPI apps loaded on your mobile can be confusing and you can easily make a mistake. Since UPI transactions are free, there is no benefit to you in using more than one UPI application. “UPI is interoperable, which means that money can be transferred between two UPI users through any bank or UPI app. When you pay someone using a different app than yours, you may experience difficulties pay on their phone number, but you can still pay on their QR code or UPI ID which follows the [email protected] format,” suggests Adhil Shetty, CEO of BankBazaar.com.

Never click on unverified links

There have been many reported cases where people have been tricked into clicking on a link they received via text or email. You should avoid clicking on unverified links received on your phone. These links are often used to hack into your phone to steal your identity and bank password/PIN. You can remove them immediately or block the source if you receive such links. In some cases, people get a call from scammers claiming to be bank officials. They ask people to provide OTP, PIN or download an app using the link they send via SMS/WhatsApp. Never follow such instructions from strangers or unknown sources.

Check the SMS received on the deduction of the amount

Despite all efforts, you must remain vigilant about all transactions that occur in your bank account. Whenever you use UPI to make a payment transaction, you need to check the SMS received on your registered mobile number from the bank to verify the amount deducted from your account.

If you have a problem with the UPI transaction, you can contact your bank’s customer service department by calling them on the toll-free number provided. All UPI-enabled apps come with phone support features. You should use these features and report any unscrupulous financial activity on your account.

Environmental groups want Earth Day message heard year-round / Public News Service


Since its inception, Earth Day has been an opportunity to advocate for a cleaner planet – but in 2022 there is greater concern about climate change as the global environment changes.

Communities in Arizona and across the country were out in force on April 23, calling for new investments in clean energy, green jobs and environmental justice.

The Environmental Defense Fund’s grassroots campaign coordinator Emma Benninghoff said they hoped to turn the energy of the Earth Day rallies into a year-round campaign for climate action.

“I think we’re in this race to limit the dangerous impacts of climate change,” Benninghoff said. “Having hundreds of volunteers and activists during Earth Week was an opportunity to really show the broad support for climate action.”

Benninghoff said that while the U.S. House of Representatives passed a $550 billion plan to invest in clean energy and transportation, there’s still work to be done to get the measure approved in the Senate.

She said thousands joined in Earth Day activities at rallies across the country, including events in Arizona.

“In Phoenix,” Benninghoff said, “we heard from elected officials, tribal chiefs, community leaders, city council members during the rally. There were over 400 people in attendance at the State Capitol. Arizona.”

Benninghoff said Earth Day events in Phoenix and other cities feature elected officials, community leaders, students and social justice activists speaking about the importance of climate advocacy.

“It’s really important for our nation and our world to deal with this crisis,” Benninghoff said. “I hear a lot on the ground that people understand how urgent this issue is and the impact of this crisis.”

Disclosure: Environmental Defense Fund contributes to our fund for reporting on energy policy, the environment, environmental justice, and health issues. If you would like to help support news in the public interest, click here.

get more stories like this via email

Oprah shares moving message during Naomi Judd’s memorial tribute


Oprah spoke about the legacy of country music legend Naomi Judd in a video message shared during the star’s touching tribute in Nashville on Sunday night. Brandi Carlile and Little Big Town were among those who performed at the ceremony, which aired on CMT. Other stars, including Salma Hayek and Bono, also paid tribute.

Naomi, who made up one half of musical duo The Judds with her daughter Wynonna, died late last month, just a day before the group was inducted into the Country Music Hall of Fame. Naomi’s daughter Ashley Judd has opened up to ABC Newsby Diane Sawyer about her mother’s “mental illness” and her death in a hello america interview last week, revealing the tragic detail that her mother “used a gun” to end her life.

“I really accepted the love my mother was able to give me because I knew she was fragile. So when I walked around the back of their house and walked in through the kitchen door and she said, “Here’s sweetie, there’s my baby” and she is on, I savored those moments,” Ashley said. CMG. “And every time we hugged and she drank me, I was very present for those tactile experiences. Because I knew there would come a time when she was gone, whether it was sooner or later. late, whether through illness or some other cause.

The Judds have a special place in Mrs. Winfrey’s heart: they have made several appearances in The Oprah Winfrey Show over the years, and the family has also had an original TV series on OWN. Watch his message broadcast at Naomi’s memorial in the video above, or read the full text below.

Read Oprah’s meaningful message to the Judd family

“I have had the delightful and joyous privilege of being in conversation many times over the years with Mrs. Naomi Judd. A fond memory dates back 22 years, when she and Wynonna appeared on The Oprah Show when the Judds were named the best vocal duo of the year by the Academy of Country Music and we talked then about the honesty, the purity of country music, and I remember her thinking about something that I found so revealing of her outlook on life. She said, “Country music is about real people and it’s about real stories. I was just like these people sitting right here; it just so happens that what we do for a living ‘, she said, ‘we sing. We sing at home, we sing at church, on the porch right now, because that’s what we do. We sing.’ I found it so beautiful and so revealing of her spirit because we were all so moved by her music, in part because of how she viewed her ingrained connection with all of us. And every time we hear her voice, we will forever remember the purity of her heart and the vulnerability she bravely shared with the world.

My heart goes out in comfort and grace to you, Wynonna and Ashley, and to all of her family and those who loved her as we come together today to honor her life which touched us all so deeply. blessed with song. Her body is gone, but her gentle spirit and legacy remain as a heart imprint. A heart print for every life she touched. And thank you, Mrs. Naomi Judd, for touching mine.

If you or someone you know is struggling with a mental health issue, call the National Suicide Prevention Lifeline at (800) 273-8255. It offers free and confidential support 24/7. Starting July 16, 2022, people across the United States will also be able to dial, chat or text 988 to be routed to the same lifeline.

This content is imported from OpenWeb. You may be able to find the same content in another format, or you may be able to find more information, on their website.

Why aren’t older Americans getting their COVID-19 booster shots?


Even as top US health officials say it’s time America learned to live with the coronavirus, a chorus of leading researchers say faulty messages about booster shots have left millions elderly in grave danger.

According to the Centers for Disease Control and Prevention, about 1 in 3 Americans age 65 and older who have completed their first round of vaccinations have yet to receive a first booster. The figures have appalled researchers, who note that this age group continues to be most at risk of serious illness and death from covid-19.

People 65 and older account for about 75% of covid deaths in the United States. And some risk remains, even for older people who have completed an initial two-dose series of the Moderna or Pfizer vaccine or received a dose of the Johnson & Johnson vaccine. Among the elderly who died of covid in January, 31% had completed a first round of vaccination but had not been boosted, according to a KFF analysis of CDC data.

Failure to further stimulate this group has resulted in the loss of tens of thousands of lives, said Dr. Eric Topol, founder and director of the Scripps Research Translational Institute. “The recall program was botched from day one,” Topol said. “This is one of the most significant issues of the American pandemic, and it has been mishandled.”

“If the CDC said, ‘It could save your life,'” he added, “that would help a lot.”

Although the initial one- or two-dose vaccination schedule is effective in preventing hospitalization and death, immunity wanes over time. Boosters, which renew that protection, are especially important for older adults now that covid cases are rising again, more transmissible omicron subvariants are proliferating and Americans are ditching their masks, Topol said.

Some seniors, who were prioritized for the first vaccination in January 2021, are now more than a year away from their last vaccination. Adding to the confusion: The CDC defines “fully vaccinated” as people who have completed an initial one- or two-dose course, even though an initial booster is considered crucial for extending covid immunity.

Numerous studies have confirmed that the first booster shot is an essential weapon against covid. A study of older veterans published in April found that those who received a third dose of an mRNA vaccine were up to 79% less likely to die from covid than those who received only two injections.

A central question for scientists advocating for recalls is why rates have stagnated among people age 65 and older. Surveys have shown that politics and misinformation play a role in vaccine hesitancy in the general population, but this is not the case among the elderly, who have the highest initial vaccination rate of all age groups. More than 90% of older Americans had completed a one- or two-dose first course by May 8.

In contrast, 69% of older Americans vaccinated received their first booster.

Overall, less than half of eligible Americans of all ages have received a booster.

The gap for the elderly is likely due to changes in how the federal government distributed vaccines, said David Grabowski, professor of health care policy at Harvard Medical School. Although the Biden administration coordinated the delivery of vaccines to nursing homes, football stadiums and other targeted locations early last year, the federal government has played a much less central role in delivering vaccines. reminders, Grabowski noted.

Today, nursing homes are largely responsible for increasing their residents, relying on the pharmacies they traditionally hire to administer flu shots, Grabowski said. And outside of nursing homes, people usually have to find their own boosters, either at clinics, local pharmacies or primary care providers.

Dr. Thomas Frieden, former CDC director, said that in theory shifting responsibility for ongoing covid vaccination from government-sponsored clinics to individual providers might seem logical, given the privatized design of health care. in the USA. In reality, Frieden said, that approach doesn’t work because “our primary health care system is anemic and deadly” and not set up to easily take on a public health mission.

Most health care providers don’t have the technology to safely track patients who have been vaccinated and schedule follow-up shots, Frieden said. There are also no financial incentives for doctors to vaccinate and boost their patients.

Even before the pandemic, 28% of Americans had no regular source of medical care.

Grabowski said nursing homes in particular needed more support. Although less than 1% of Americans live in nursing homes or assisted living facilities, they account for more than 20% of covid deaths. He would like the Biden administration to resume coordinating booster delivery to nursing homes through mass vaccination efforts. “I would like these centralized clinics to come back so residents and staff would be strengthened at the same time,” Grabowski said. “It seems like a no-brainer to me.”

The Biden administration has touted its ongoing efforts to vaccinate the elderly. For example, the Centers for Medicare & Medicaid Services sent quality improvement teams to advise nursing homes with low immunization rates. The Medicare program sent letters to all 63 million beneficiaries encouraging them to get reminders and sent millions of emails and text reminders.

Yet many health advocates agree the country has lost the momentum it had in the early months of the covid vaccination campaign.

“There doesn’t seem to be the urgency we’ve seen with the first knocks,” said Lori Smetanka, executive director of National Consumer Voice for Quality Long-Term Care, an advocacy group.

Some researchers attributed the slowdown to initial disagreement among health officials over the value of recalls, followed by a staggered rollout. The boosters were approved in stages for different age groups, without the fanfare that usually accompanies a single major policy change. The CDC recommended booster shots for people with weakened immune systems in August; then for the elderly in October; for all adults in November; and for children 12 years and older in January.

Also, although vaccine ads seemed to be everywhere a year ago, government agencies have been less vocal in encouraging recalls. “I felt like we were all hit in the head originally and all roads led to vaccines,” Grabowski said. “Now you have to find your own way.”

For many seniors, the barriers that can make private health care difficult to access in non-pandemic times also exist for recalls. For example, many seniors prefer to come in for a shot, walk-in, or book appointments over the phone, even as pharmacies increasingly shift to online-only scheduling that requires customers to navigate a multi-level system. Some seniors also lack ready transportation, a sometimes daunting obstacle in rural areas where health clinics can be 20 to 30 miles apart.

“If people have to take two buses or miss work or take care of family, people are less likely to get vaccinated,” Smetanka said.

Dr. LaTasha Perkins, a family physician in Washington, DC, said she worked hard to persuade her family in Mississippi to get vaccinated. Her grandmother agreed to get her first shot in the fall, just as the CDC approved boosters for all adults.

“We finally got to a place where we were asking people to get their shots twice and then we were like, ‘Oh, by the way, you need a third one,'” Perkins said. shocking to a lot of communities. They were like, ‘You convinced me to join, and now you’re saying two knocks isn’t enough.’

While national leadership is important, Perkins said, local relationships can be more powerful. Perkins lectured on vaccines at his church. Congregants are more likely to trust her medical advice, she said, because she is a member of the tithe they see every Sunday.

Some communities have been more successful in overcoming resistance than others. Minnesota has increased 83% of vaccinated residents age 65 and older, a larger share than any other state, according to the CDC.

Dakota County in Minnesota has increased a greater percentage of vaccinated people age 65 and older than any other US county with at least 50,000 seniors, according to a KHN analysis of CDC data.

Christine Lees, an epidemiologist and public health supervisor for Dakota County, said her department hired an agency to provide reminders to residents and staff at nursing homes and assisted living facilities. The health department holds vaccination clinics at noon and some evenings to accommodate workers.

The department tapped into money from the federal Coronavirus Aid, Relief, and Economic Security Act, or CARES, to purchase a mobile vaccination clinic to bring boosters to neighborhoods and parks in mobile homes. “We raced it all last summer, and we started it again,” Lees said. “We went to food shelters and libraries. We were going out at least once a week to keep those numbers high.

Community health workers paved the way for vaccination clinics by visiting residents ahead of time and answering questions, Lees said.

Dakota County also used funds from the American Rescue Plan Act to provide $50 incentives to people receiving early and booster shots, Lees said. The incentives “were really important for people who might have to pay a little extra to get to a vaccination site,” Lees said.

Topol at Scripps said it’s not too late for federal leaders to look at what’s working — and not — and reinvigorate the stimulus effort.

“It will be difficult to restart now. But an aggressive and all-out campaign for the elderly – whatever the cost – is certainly indicated,” Topol said. “These people are the sitting ducks.”

Phillip Reese, assistant professor of journalism at California State University-Sacramento, contributed to this report.

ALERT: Hackers can now unlock and steal vehicles, NCC warns Nigerians


The Nigerian Communications Commission (NCC) has warned the public of an ongoing cyber vulnerability that allows a nearby hacker to unlock vehicles, start wireless engines and dump cars.

In a statement on Saturday, Ikechukwu Adinde, director of public affairs at NCC, said the notice was in line with the latest notice issued by the commission’s Computer Security Incident Response Team (CSIRT), the Cybersecurity Center for the telecommunications sector.

NCC said the vulnerability is a man-in-the-middle (MitM) attack or, more specifically, a replay attack in which an attacker intercepts RF signals normally sent from a remote key fob to the car, manipulates and returns later to unlock the car at will.

He added that the latest type of cyberattack can manipulate captured commands and retransmit them to achieve a completely different result.

“Several researchers have revealed a vulnerability, which would be used by a nearby attacker to unlock certain Honda and Acura car models and start their engines wirelessly. The attack consists of a threat actor capturing radio frequency (RF) signals sent from your key fob to the car and sending those signals back to take control of your car’s remote keyless entry system,” said the CSIRT.

However, he offered some precautionary measures that could be adopted by car owners to avoid being victimized.

“When affected, the only mitigation is to reset your key fob at the dealership,” he said.

“Additionally, the relevant car manufacturer may provide a security mechanism that generates new codes for each authentication request, making it difficult for an attacker to ‘replay’ the codes afterwards.

“In addition, vulnerable motorists should store their key fobs in signal-blocking ‘Faraday pouches’ when not in use.”

He added that owners of cars in the listed categories are being asked to choose passive keyless entry (PKE) as opposed to remote keyless entry (RKE), which would make it more difficult for an attacker to read the signal because criminals should be nearby. to carry out their operations.

The PKE is an automotive locking system that operates automatically when the holder is near the vehicle.

The RKE system, on the other hand, represents the standard solution for conveniently locking and unlocking the doors and trunk of a vehicle using the remote control.

Additionally, in a related advisory, the NCC, based on another detection by the CSIRT, announced the resurgence of wildcard Trojan-infected Android apps on the Google Play Store.

“This is due to the activities of criminals who intentionally download legitimate apps from the Play Store, modify them by embedding the Trojan horse malware, and then upload the app to the Play Store with a new name,” he said. he declares.

“The malicious payload is only activated once the apps go live on the Play Store, allowing apps to evolve through Google’s strict review process. Once installed, these apps request permissions that, when granted, allow apps to access critical functions such as text messages and notifications.

Therefore, he said a compromised device would subscribe unwitting users to premium services, charging them for services that don’t exist.

“A device like this can also be used to commit SMS (Short Messaging Service) fraud without the owner’s knowledge,” the CSIRT added.

“It can automatically click on online advertisements and even use one-time SMS passwords (OTPs) to secretly approve payments. Without verification of bank statements, the user will not know that they have subscribed to an online service Other actions, such as stealing text messages, contacts, and other data from the device, are also possible.

“To avoid falling victim to manipulation by hackers deploying Android apps infected with the Joker Trojan, Android users have been advised to avoid downloading unnecessary apps or installing apps from untrusted sources. official.”

The NCC also advised telecom consumers to ensure that apps installed from the Google Play Store are carefully reviewed before downloading.

“In conclusion, the NCC recommends that unauthorized transactions be checked against any installed application. This is because all unused apps should be removed, while users are also advised to ensure that a device is always patched and updated with the latest software,” he said.

Andrew Symonds’ hilarious final text message revealed as Nathan Lyon shares haunting conversation


Hilarious final text message from Andrew Symonds surfaces as Nathan Lyon reveals haunting words they shared at Shane Warne’s memorial service

  • Symonds sent a funny text to his boss at Fox Sports shortly before his death
  • Roy was known for his larrikin wit and cheeky sense of humor
  • Nathan Lyon shared a surprising conversation they had at Warne’s memorial

Andrew Symonds was known for his larrikin’ sense of humor on and off the pitch, and it showed when his latest text message was revealed on Sunday.

Symonds, 46, was killed when his 4×4 left the road and rolled into the Hervey Range, around 50km west of Townsville in Far North Queensland at around 10.30pm on Saturday.

At 8.45pm that evening, the cricketing legend sent a message to Steve Crawley, the boss of Fox Sports, where Symonds worked as a commentator.

Symonds – pictured with fellow commentator Kath Loughnan at the Shane Warne memorial – sent a hilarious text to Fox Sports boss Steve Crawley shortly before his death.

It contained news that American football superstar Tom Brady would receive $540 million over 10 years to work as a commentator for the American branch of Fox, according to the Courier Mail.

Out of contract with Fox Sports, Symonds wrote: ‘Crawls we need to talk. Roy.’

Crawley also offered insight into the kind of man Symonds was.

“When he started making some comments towards the end of his playing days, he said he would comment for us if our kids could sit with him while he was doing it,” he said. to publication.

“He wasn’t doing this for himself. He made their day.

Meanwhile cricket star Nathan Lyon has revealed the haunting words Andrew Symonds shared with him at Shane Warne’s memorial service as he joins the rest of Australia in mourning following the all-rounder’s death in a car accident.

'Roy', as he was affectionately known, shared a haunting conversation with Nathan Lyon in the service of their mate Shane Warne

‘Roy’, as he was affectionately known, shared a haunting conversation with Nathan Lyon in the service of their mate Shane Warne

Lyon posted a heartfelt tribute to his fellow Test star, calling him an inspiration to many

Lyon posted a heartfelt tribute to his fellow Test star, calling him an inspiration to many

Devastated cricketers past and present have paid tribute to the legendary all-rounder since the tragic news broke, with Lyon posting heartfelt words to Instagram and revealing a surprising conversation he had with ‘Roy at their companion Shane Warne’s memorial service in March.

“I am heartbroken by the news that we all woke up this morning too. It was only 2 months ago at Warnie’s memorial service, Roy and I had a great chat and both agreed that he was too young to leave us…now this! Lyons wrote.

‘RIP mate, a true legend of the game we love and an inspiration to so many! My thoughts and prayers go out to his family, children and friends!

While Symonds’ playing career was over by the time Lyon made their Test debut in 2011, they both shared a relationship with Warne, who died of a heart attack in Thailand on March 4, aged just 52.

The versatile and hard-hitting played many games for the spin king as Australia swept all before them in the early 2000s, and Lyon have previously said he “always idolized” the tweak sheikh.

JAMB Releases UTME 2022 Results and Advises Candidates to Use SMS | The Guardian Nigeria News


JAMB has released the 2022 Unified Tertiary Matriculation Examination (UTME) results.

In a statement issued Saturday in Abuja, Dr. Fabian Benjamin, Public Affairs and Protocol Officer at JAMB, advised candidates to text UTMERESULT in one word to 55019 to have their results checked.

He said JAMB did not upload the results to its website for obvious reasons; candidates could therefore check their results using the SMS code.

“To check the UTME 2022 result, all a candidate needs to do is simply text UTMERESULT to 55019 using the same phone number they used for registration.

“The result will be sent in response to the candidate’s SMS. This is the only UTME 2022 result verification process for now as the council has not uploaded it to their website for obvious reasons.

“Additionally, candidates are warned that they will, as usual, receive all sorts of messages from desperate scammers about how to verify that their results differ from the above-mentioned one.

“Therefore, JAMB urges all candidates to ignore all such messages on how to verify their UTME 2022 results as they are all products of deception aimed at misleading them,” he said.

Benjamin pointed out that JAMB has embraced the user-friendly and streamlined process of checking UTME results through the use of SMS to adhere to the government’s ease of doing business protocol.

He added that the process has been streamlined to prevent unreasonable exploitation of applicants by shylock business centers and internet cafes which have often taken advantage of unsuccessful applicants.

UTME 2022 started on May 6 and ended on May 16.

This program pays new grads a hefty tech salary to work in nonprofits


When Chase Thomas graduated from Cornell with a concentration in data science, he could have gotten a job at a big tech company. But he started working with nonprofits instead, developing technology that could help solve bigger problems.

“I had done a few internships at Big Tech in the past, at Microsoft, and it was technically interesting,” he says. “And it was fun. But that’s not really sustainable – you don’t wake up every day thinking, “Oh, I can’t wait to increase shareholder value.”

Thomas is one of 11 recent graduates from a unique Associate Product Manager (or APM) program run by Schmidt Futures, the philanthropic organization created by former Google CEO Eric Schmidt. Google launched an APM program in 2002 to train new project managers; other tech companies followed. Five years ago, Schmidt Futures decided to launch a similar program focused on training new leaders to use technology for the public good and offering a salary that can rival what anyone could earn if they began a career at Google.

Chase Thomas [Photo: courtesy Schmidt Futures]

The program lasts two years, with each APM alternating between six-month or one-year assignments in nonprofits, government departments, or social impact businesses aligned with their own interests. Cassie Crockett, who leads talent programs at Schmidt Futures, explains that the program has two main goals: to use technology to help increase the impact of organizations that do socially beneficial work, and to create a cohort of technologists who are excited about use their public utility skills. One of Thomas’ projects at a non-profit organization called Uptrust was to create new technologies to help people navigate the criminal justice system. Previously, when someone had to go to court, they received a letter in the mail.

“If you couldn’t [make that court date] because you have a job or you have kids, it’s hard to reprogram those things,” Thomas says. “You have to send a literal letter in the mail, by snail mail, to your attorneys saying, ‘Can we ask for a separate date?’ reduce technical offenses and re-arrest warrants by more than 50%. The tool texting is now in place in 44 counties in 22 states.

“It’s a goal of most of our projects to find that area where a little technical talent at the right time and in the right place can have an outsized impact,” he says. During his next rotation, at the nonprofit Broad Institute, he helped create tools to help biologists use machine learning and cloud computing to discover new drugs for cancer and infectious diseases. Another APM, Adedoyin Olateru-Olagbegi, recently finished working on an open-source platform that can be used by child helplines around the world and allows children to seek help via WhatsApp, SMS or various other platforms. “A lot of times the technology they have now is very outdated and prevents the helpline counselors from doing their job well,” she says.

Adedoyin Olateru-Olagbegi [Photo: courtesy Schmidt Futures]

A participant works with a startup to create technological tools for farmers in Kenya to avoid food insecurity. Another built a tool that has helped Connecticut enroll thousands of new people in a program to help low-income new mothers and their children. (The work will help unlock $3 million in additional food benefits over a year.) Someone else worked with startup Recidiviz to create tools to reduce the prison population, helping to reduce the prison population by 25% number of prisoners in North Dakota. Early in the pandemic, another APM helped create an app in Colorado to generate notifications when someone was exposed to COVID-19. After completing the program, some APMs became entrepreneurs or took jobs with social impact businesses.

Many computer science graduates may be interested in social impact, but few are going that route now. “I think people just don’t know about all of these nonprofit opportunities,” Thomas says. “And if they do, maybe they’re scared because it’s their first job. Bids aren’t as competitive – Big Tech can really swoop in on anyone for talent, and nonprofits can’t afford to do that. A new software engineer at Google in New York could earn about $138,000, plus a $41,000 stock award and a $22,000 bonus; salaries for nonprofits vary widely, but are significantly lower. His own classmates, he says, mostly ended up either at big tech companies or in consulting.

Nonprofits and governments typically need more funding to modernize their systems, as well as to compete with large corporations for other types of talent. Nonprofits also need to evolve, says Josh Hendler, chief technology officer at Schmidt Futures. “Another element is that nonprofits can be a place where technologists want to work and be tech-literate,” he says. In the Schmidt Futures program, the more than 150 participating organizations already have technology leaders in place who can guide and train APMs as they learn both technical skills and user-centered design, as well as general project management skills and how to gain political support. for projects within an organization. (Schmidt Futures also provides ongoing support to participants themselves.) But many nonprofits may not have staff in place to guide new employees, or may not have career paths that new graduates can follow after accepting an entry-level position.

If more new graduates can be persuaded to give up big tech jobs for social impact, the impact could be significant, says Olateru-Olagbegi. “I went to college with so many brilliant people who had so many skills in computers and other technical areas,” she says. “If I could just take all that shine and channel it into all of these issues that are the main issues of today, I just have to think the world would be so different.”

aadhaar: How much does it cost to update Aadhaar details via mAadhaar app?

Aadhaar is a 12-digit identification number issued by UIDAI to all citizens of India. As it has become the most vital document for availing any form of financial services, you must have your Aadhaar with you at all times. To avoid misplacing your Aadhaar, you can download an Aadhaar online by registering on the UIDAI mAadhaar app.

maadhaar mobile app

Anyone using a smartphone in India can download and use the mAadhaar app. However, only a few services, such as Locate Registration Center, Verify Aadhaar and Scan QR Code, will be available to residents without a registered Aadhaar mobile number.

However, all other Aadhaar services, including Aadhaar profile services listed under My Aadhaar, require a registered mobile number.

According to a recent tweet from UIDAI, “Update your demographic information such as name (only minor edits allowed, twice), gender (once), date of birth (once), and address ( no limits) online via #mAadhaarApp”.

Demographic Update Fee

Any demographic update will cost Rs 50 per request, and multiple details can be updated at once, according to the tweet.

Where can m-Aadhaar be used?

mAadhaar app can be used anywhere in India anytime. mAadhaar is more than just a wallet card. On the one hand, airports and railways recognize the mAadhaar profile as valid proof of identity, while residents can use the features of the app to share their eKYC or QR code with service providers who require Aadhaar authentication of their clients before offering Aadhaar services.

Features/Benefits of M-Aadhaar App

According to UIDAI website, below are important features and benefits of maadhaar app.

mAadhaar is more than an Aadhaar card in a wallet. By using the mAadhaar application, the resident can benefit from the following advantages:

  • Get Aadhaar by downloading or recovering lost or forgotten Aadhaar
  • Show/Show Aadhaar in offline mode, especially when residents need to show their IDs
  • Update address to Aadhaar via document or without proof of document
  • Keep/manage Aadhaar of family members (up to 5 members) in mobile
  • Share paperless eKYC or QR code with service provider agencies
  • Secure Aadhaar by locking Aadhaar or biometrics
  • Generate or retrieve a VID that the user can use instead of Aadhaar to avail Aadhaar services (for those who have locked their Aadhaar or do not wish to share their Aadhaar)
  • Use Aadhaar SMS services in offline mode
  • Check Request Status Dashboard: After signing up for Aadhaar, ordering a reprint or updating Adhaar data, the resident can check the status of the service request in the app.
  • Help others who don’t have a smartphone to enjoy Aadhaar services using common services
  • Get update history and authentication records
  • Make an appointment to visit Aadhaar Seva Kendra
  • Aadhaar Sync feature allows residents to retrieve updated data in Aadhaar profile after successful update request
  • Time-based one-time password can be used instead of SMS-based OTP to avail Aadhaar online services available on UIDAI website
  • Locate Enrollment Center (EC) helps the user to find the nearest Enrollment Center
  • More section of app includes information about mAadhaar app, contact, usage guidelines, terms and conditions of app usage and other necessary information.
  • Apart from useful FAQs and the link to Chatbot, the More section also contains links to important documents from which residents can download the Aadhaar registration or Aadhaar update/correction forms.