Home Blog Page 3



NEW YORK , May 6, 2022 /PRNewswire/ — Americans received approximately 11.3 billion spam messages and 6.1 billion spam calls in April — month-over-month declines of 2% and 18%, respectively, and the first decline since February 2022 — according to RoboKiller, the app that eliminates 99% of call and text spam.

Even with a monthly drop in spam totals, spam calls and spam text messages are well ahead of 2021 levels. Spam text messages in April 2022 are up 77% compared to April 2021, while unwanted calls increased by 5%. The significant increase in unwanted text messages underlines a change RoboKiller observed in the way scammers operate; it also shows that spammers will stop at nothing to steal your hard-earned money. In fact, according to RoboKiller estimates, Americans have already lost $3.6 billion to telephone fraud in 2022 so far.


As the midterm elections approach, Americans can expect politics-related messages, whether calls or texts, to increase. RoboKiller identified a similar spike in May and June 2020 in the run up to the presidential election, and it’s likely the same pattern will unfold this year. This is especially likely considering that political calls and texts have remained prominent in a non-election year.

Top spam texts nationwide:

Spam text category

Estimated spam texts

% of total spam texts

Shipping (UPS, Amazon, USPS)

983 429 760



333 813 423



219 129 676


Top Spam Calls Nationwide:

Tips to stop phone scams:

  • Do not answer phone calls from unknown numbers, especially those who call or text at odd hours.
  • Do not follow prompts such as “Press 1” or click on any links.
  • Never provide personal information such as bank details or other sensitive information to unknown callers.
  • Download a unwanted text and call blocker like RoboKiller to equip your phone with the latest technology to stop scams.

Any brand interested in protecting themselves against scams perpetrated under their name can contact our business services team for more information.

About RoboKiller
With over 12 million downloads and $400 million in losses avoided, RoboKiller is the first independent blocker of spam calls and SMS. RoboKiller has been named a leader in technical and mobile achievement by Webby Awards, Media Excellence, Best in Biz, etc. RoboKiller was named the the most effective solution to FTC robocalls.

by RoboKiller automated call and junk text the information is powered by a global database of millions of phone scams and audio fingerprints. RoboKiller’s exclusive data was presented by The New York TimesABC World News, NBC Nightly News and many more.

For custom data requests, contact the RoboKiller Information Team here or at [email protected]. For more information on RoboKiller’s enterprise spam blocking solutions, visit company.robokiller.com.

RoboKiller is available for download in the Apple App store and google play. To learn more, visit www.robokiller.com.

RoboKiller, a Teltech brand, is a division of Mosaic Group, an IAC company (NASDAQ:IAC).


At least three dead in suspected terror attack in Israel


Police said the incident, which happened on Israel’s Independence Day, involved two suspected attackers. One fired a rifle while the other attacked people with an ax or a knife, police said.

The suspects have still not been apprehended, according to Israeli police, who urged the public to stay away from the scene.

“At this point, security checkpoints were deployed on various roads, along with a helicopter, to search for a vehicle that was seen fleeing the scene,” a spokesperson for the agency said. the police.

Footage from the scene showed several emergency vehicles, including ambulances and motorcycles.

Two of the injured arrived at Beilinson Hospital, the hospital said. One is in critical condition and the other in serious condition, he said.

“It’s a very difficult event. When we got there, we noticed it was a complex scene,” said Alon Rizkan, a paramedic with Israel’s Magen David Adom (MDA) emergency response service. , in a press release.

The three dead were men in their 40s, Rizkan said.

Two men, ages 60 and 35, are seriously injured, Rizkan said. A 40-year-old man was lightly injured and a 23-year-old man was lightly injured fighting off the attackers, he added.

The attack is the latest in a series of violent incidents that have plagued Israel and the Palestinian territories in recent weeks.

Dozens of people have died in bombings in Israel and the West Bank since March 22, according to a CNN tally.

In one incident, two people were killed and more than a dozen others were injured in a shootout at a bar in a busy Tel Aviv neighborhood.

And in a single week in March, 11 people were killed in three attacks in Israeli towns.

In a statement, Prime Minister Naftali Bennett condemned Thursday’s attack and offered his condolences to the affected families.

“Our enemies have embarked on a murderous campaign against Jews wherever they may be. Their aim is to break our spirits, but they will fail. We will get our hands on the terrorists and their supporting environment, and ensure that they’re paying the price,” Bennett said. said in the press release.

Palestinian Authority President Mahmoud Abbas also condemned Thursday’s violence, his office said in a statement.

“The killing of Palestinian and Israeli civilians only further aggravates the situation at a time when we are all striving to achieve stability and prevent escalation,” Abbas said in the statement.

Abbas warned against Jewish settlers using the incident as an excuse “to carry out attacks and reactions against our Palestinian people”.

He added that “lasting, comprehensive and just peace is the shortest and best way to ensure the security and stability of the Palestinian and Israeli peoples and the peoples of the region.”

Late Thursday, Palestinian militant groups in Gaza, Hamas and Islamic Jihad, praised the alleged terror attack, without explicitly taking credit for it.

Hamas spokesman Fawzi Barhoum linked the attack to clashes inside the al-Aqsa Mosque compound in Jerusalem.

Five people shot dead near Tel Aviv, third attack in Israel in a week

“It’s a brave and heroic act that comes as a natural response to the occupation’s violations against al-Aqsa Mosque,” he told CNN, referring to the Israeli security presence in the building. pregnant.

The attack “sends a message to the occupation that all its crimes and violations will be theirs alone,” he said, referring to Israel. “Our natural right is for our people to respond to the crimes of the occupation, to deter it and to defend our rights. Today, the occupation is paying the bill for its violations.”

Muhammad Hamid Abu Al-Hassan, a member of the Islamic Jihad’s political bureau, praised the attackers.

“The occupation army and settler gangs’ desecration of al-Aqsa Mosque has crossed all red lines, and our people will continue to respond to this aggression,” he said, winking. eye to the clashes that occurred Thursday in the enclosure.

Only Muslims are allowed to visit the holy site, called the Temple Mount by Jews and Haram al-Sharif or Noble Sanctuary by Muslims, during the last 10 days of Ramadan each year. Groups of Israeli Jews began visiting again on Thursday.

US State Department spokesman Ned Price said Thursday’s alleged terror attack appears to be “the latest in a series of despicable terror attacks that have rocked Israel in recent weeks.”

“We saw them before this holy period – the confluence of Easter, Passover, Ramadan. We saw them before the Negev summit. And if that’s what it seems like, that’s something we would condemn in the strongest terms,” Price said.

“Our commitment to our Israeli partners, to Israel’s security, is rock solid, and we will provide whatever assistance may be needed in this case,” he added.

CNN’s Jennifer Hansler and Jorge Engels contributed reporting.

P360 Launches ZING Engagement Suite to Help Pharma Sales Teams Improve HCP Engagement


TOWNSHIP OF PISCATAWAY, NJ–(BUSINESS WIRE)–P360leader in technology developers for the life sciences industry, today announced the launch of its ZING Engagement Suite, which helps pharmaceutical sales teams seamlessly engage with today’s hard-to-reach healthcare professionals at scale. The ZING Engagement Suite is a comprehensive digital-first solution that enables compliant omnichannel HCP engagement by enhancing existing communication channels with features such as text messaging, two-way voice and video calling, on-screen collaboration, and form sharing, incoming communications with QR code reading, artificial intelligent assistance (AI), signature capture, easy access integrations and more. The announcement comes as pharmaceutical sales, marketing and business operations teams grapple with how best to engage with prescribers and other stakeholders amid the pandemic and increasingly stringent regulations and policies.

“The ZING Engagement Suite is the only platform available that gives pharmaceutical sales and marketing teams everything they need to engage with healthcare professionals in a streamlined and digital way; which is fast becoming the norm,” said CEO and Founder of P360, Anupam Nandwana. “ZING integrates with leading CRMs and is packed with powerful features that enhance any sales enablement strategy or workflow. But for healthcare professionals, ZING offers a seamless and hassle-free experience that is seen as nothing different from their normal mobile method of communication. There are no apps to download or sign-ins and subscriptions for end users.

The extended ZING Engagement Suite is the next generation of the previously announced ZING P360 communications module. Enhanced with several enterprise features, the ZING Engagement Suite is a robust Unified Communications-as-a-Service (UCaaS) platform that enables pharmaceutical sales teams to engage with healthcare professionals through multiple modalities without barriers. . It’s something doctors ask for.

The ZING Engagement Suite addresses all of the issues associated with traditional HCP engagement methods by enabling pharmaceutical sales and marketing teams to:

  • Exchange SMS messages with healthcare professionals: Two-way text messaging between pharmaceutical reps and healthcare professionals in support of logical and promotional messages, including digital media and attachments. Healthcare professionals receive messages on their mobile devices via SMS or WhatsApp. Reps receive compliance-approved templates and content.
  • Make two-way voice calls: ZING enables 1:1 calls between reps and healthcare professionals from the same platform as SMS messaging. Representatives are equipped with personalized phone numbers with area codes for each territory. No special application is required; users talk on their standard cell phones and can separate business calls from personal calls.
  • Start an instant video call: No installation is required for the guest or host and invitations can be sent via SMS. Includes full video conferencing features compatible with any device or browser. The User Interface (UI) can be customized.
  • Embed video anywhere: Enables instant video calls from any digital channel. Call buttons can be integrated into presentations, IVAs, branding materials, websites and CRM systems with no installation required.
  • Deploy intelligent bots: Pharma reps can be powered with automated responses to incoming requests (e.g. co-pay card requests). And if needed, reps can seamlessly redirect the conversation back to themselves. Bots can even be customized for each territory, rep, and brand.
  • Capture signatures instantly: Standard forms can be downloaded from the platform and then sent by SMS for electronic signature. The platform also facilitates the integration of data and documents into registration systems.
  • Make communication easier with QR codes: Representatives can provide healthcare professionals with QR codes that enable instant communication via text, call or video. They can be personalized for each brand, with codes programmed to connect directly to the appropriate representatives.
  • Co-browse and share forms: Representatives can work collaboratively with healthcare professionals and staff, sharing forms and other important documents. Teams can collect, validate and process information instantly with no additional software required on the healthcare professional’s side.
  • Easy planning: A smart scheduling engine makes it easy to book multi-party appointments. Healthcare professionals can accept or suggest available schedules instantly. Integrates with MS Office.
  • AI-based content moderation: AI-powered content moderator for outgoing messages. Helps representatives avoid inappropriate language related to social or professional relationships.

The ZING Engagement Suite enables 1:1 personalized communication using native text messaging on an iOS or Android device from HCP with pre-built integrations with leading CRMs. This makes it easier for pharma IT teams to manage and maintain data integrity for things like territory alignments, list changes, and other specific data integration needs. Compliance can track every communication, end-to-end. And managers can measure activity and results with ZING’s powerful dashboards.

For more information, visit P360.com.

About P360

Based in Piscataway Township, New Jersey, P360 is a leading technology developer for the life science industry. We specialize in technology that improves operational efficiency, enables end-to-end visibility, streamlines workflows, and drives physician engagement. Product offerings include ZING Engagement Suite, BirdzAI, PatientJourney360, Data360 and Swittons. To learn more about P360, visit P360.com.

Information shared by Davis school district psychologist may have led to child rape: police


DAVIS COUNTY, Utah (ABC4) — A former Davis school district psychologist has been charged with allegedly sharing information about a student with her husband who then allegedly raped the student.

Natalie Stokes faces one count of unauthorized collection, sharing or use of private student data after her husband Phillip Stokes allegedly raped an 11-year-old student after his wife mentioned the student during of a conversation, according to court records.

When asked by police how he came to target the 11-year-old, he told them, his wife mentioned a child who had behavioral problems at school.

He went on to explain that he had searched for the child’s videos on TikTok using information his wife had given him, police said.

Prior to the sexual assault, Phillip Stokes alleges that while he and his wife were walking around the neighborhood, she pointed to the victim and personally identified her as the girl she worked with as a school psychologist.

Phillip Stokes allegedly created a TikTok around March 15, 2021, using a fake alias known as “Christian”. He befriended the victim and in July they started texting each other. Within three hours of sending a “Christian” text, he began aggressively and persistently asking the 11-year-old for nude photos of herself, according to court documents.

They both exchange naked photos and “Christian” forced the victim to meet in a park where he allegedly sexually assaulted her, according to the police.

Officers traced “Christian’s” TikTok IP address, leading them to identify Phillip Stokes as a suspect.

Officers compared shirtless photos from Phillip Stoke’s social media accounts and found similarities, as well as a T-shirt identical to one of the photos ‘Christian’ sent the victim.

Phillip Stokes was charged on August 21, 2022 with child rape, child sodomy, five counts of aggravated sexual abuse of a child, four counts of sexual exploitation of a minor, one count incitement to a minor and four counts of trafficking in material harmful to a minor by an adult.

A message from Lynn Wells on Red Dress Day – The Brock News


On Thursday, May 5, we honour, commemorate, and mourn missing and murdered Indigenous women, girls, and 2SLGBTQQIA+ (Two-Spirit, Lesbian, Gay, Bisexual, Transgender, Queer, Questioning, Intersex, and Asexual Plus) people.

On this incredibly difficult day, I encourage the entire community of Brock to reflect on the injustices inflicted on Indigenous communities throughout Canada’s colonial history and how colonialism continues to cause injury, pain and suffering. nowadays.

The day is also known as Red Dress Day, as empty red dresses – symbolizing the loss of thousands of Indigenous lives – will be hung in public spaces to raise awareness of the disproportionate rates of violence against Indigenous women and members of the 2SLGBTQQIA+ community.

Since 2018, Brock has marked REDress Day in February with an installation of red dresses on campus. This year, we hosted a roundtable with Jennifer Moore Rattray, who served as the executive director of the National Inquiry into Missing and Murdered Indigenous Women and Girls.

This inquiry resulted in 231 Calls for Justice to governments, institutions, social service providers, industries and all Canadians and, like the Truth and Reconciliation Commission’s Calls to Action, should be required reading for all Canadians.

I encourage members of the Brock community to also show their support by wearing red clothes and joining Robyn Bourgeois, Brock’s Vice-Rector, Indigenous Engagement, and other Indigenous leaders at a Red Dress Day at St. Catharines City Hall starting at 5:30 p.m.

Many resources — including links to other reading, podcasts, and Indigenous artists — can be found on Brock’s dedicated REDress Day website.

I hope you will join me in taking the time today to remember, reflect and learn, as we walk down the path of meaningful reconciliation.

Everyware® partners with MX to provide real-time payments and open banking with Pay By Text


AUSTIN, TX, May 3, 2022 /PRNewswire/ — All, a leading company in contactless payments and customer engagement solutions, announces the extension of its SMS payment options by offering real-time payments (RTP) and its open banking approach to financial data. The RTP and open banking experience, as well as security enhancements, are made possible through Everyware’s partnership with MX, the leader in open finance. The combination of an open banking approach with RTP modernizes the customer relationship and enables better digital access to financial services and data.

Real-Time Payments enables instant, 24-hour electronic payments, transferring funds from one bank to another. Combined with open banking best practices, which create a two-way exchange of information between personal financial data and connected services, Everyware and MX’s partnership forms a direct access to share information in both directions. It provides extremely fast, convenient and secure payments at the discretion of the consumer.

In 2020, more than 70.3 billion real-time payment transactions were processed worldwide, an increase of 41% over the previous year (ACI in the world). Open Banking and RTP mean consumers have control over their information and how they want to share it. They can easily pay merchants via SMS, with the guarantee that funds are available and transferred instantly.

“We are the only contactless payment company to offer the RTP payment option and offer RTP payments to eliminate a significant level of risk with verified accounts and sufficient balance checks,” saidFounder and CEO of Everyware Larry Talley. “With MX, we offer a convenient, instant, and secure payment experience for our customers.”

With Everyware and MX integration, merchants can easily send secure invoices via SMS, which can be paid through an MX-verified bank account containing a sufficient confirmed account balance to cover the payment amount. While maintaining security is Everyware’s top priority, MX also enhances the Everyware RTP payment experience by allowing customers to quickly find and connect their bank accounts without having to leave the payment screen. For consumers and merchants, Open Banking and RTP make payments easy and secure.

“Everyware is a great example of how a seamless account login user experience can be powered with our open funding platform,” said Brett Allredproduct manager, MX. “Open Banking is about building a more connected, frictionless and secure financial ecosystem and we are proud to partner with Everyware in this mission.”

To learn more about becoming an MX Partner, please contact [email protected].

For more information, visit Everyware at Everyware.com or follow Facebook, Twitter, instagram and LinkedIn.

Launched by Larry Talley and Scott Orlinski in 2015, Everyware is a leading company in contactless payments and customer engagement solutions. Everyware offers simple billing solutions for organizations in a wide variety of industries helping businesses collect payments and connect with customers, especially through text messaging, the ultimate contactless technology. The company helps its customers increase revenue, reduce chargebacks and refunds, and improve customer service. There is no other highly secure mobile communication platform and payment gateway in the market that combines these tools to meet the demand. It is the easiest, simplest and most scalable Pay By Text platform that has the ability to work with existing systems with easy integration.

MX, a leader in open finance, helps organizations around the world connect to global financial data and turn raw, unstructured data into their most valuable asset to deliver intelligent, personalized financial experiences. MX connects over 13,000 financial institutions and fintechs, providing the most reliable and secure data connectivity network in the industry. Additionally, MX powers 85% of digital banking providers, as well as thousands of banks, credit unions and fintechs, with a combined reach of over 200 million consumers. To learn more, follow us on Twitter @MX or visit www.mx.com.

Jessica Wade Pfeffer | 305-804-8424 | [email protected]

Tyler Sminkey | 786-390-8510 | [email protected]

SOURCE All articles

Deborah J. DeBelis | News, Sports, Jobs


Deborah J. DeBelis, 72, of Nashua, NH, died Wednesday, April 27, 2022 at St. Joseph’s Hospital in Nashua after a period of declining health.

Born in Lebanon, NH on October 25, 1949, Deborah was one of four children of the late Archie and Margery (White) Hughes. She grew up in Hudson, NH and graduated from Alvirne High School.

She worked for many years entering data for the US Postal Service and retired in 1991.

Along with her parents, Deborah was predeceased by her sister, Sharon Roy, on December 19, 2017.

She will forever be loved by her siblings, Bruce Hughes of Hudson and Sheila and her husband Jerry Burnett of Merrimack; sister-in-law, Ruth Hughes; six nieces and nephews, Steven Roy, Anissa Klieman, Michael Roy, Adam Hughes, Keli Howard and Debi Cupit as well as numerous great-nieces and great-grandnephews.

In accordance with the wishes of the family, a private funeral service will be held at the family grounds of Sunnyside Cemetery in Hudson at a later date.

For those wishing to make a memorial contribution to his memory, you may do so at the Nashua Humane Society, 24 Ferry Rd, Nashua, NH 03064

Please visit rivetfuneralhome.com to leave an online message of condolence for the family.

Australia Post scam joins AusPost SMS, how to find out – Pickr


Scammers may have found a new way to be persuasive, as a recent AusPost SMS scam seems to suggest. How do you say?

He arrived on a Saturday evening, a message to tell us that a package had not been delivered. And it was from Australia Post, or so it seemed.

The message said it was from “AusPost”, and it was found in the same stream of texts previously found on Australia Post. Except this one was different.

While Australia Post’s phone alerts are almost always directed to the postal service’s website, this SMS was going elsewhere.

And it seemed legit because it entered under the same ID. What is happening? Have scammers broken into Australia Post?

How does this scam get in the same list as real AusPost alerts?

Not enough. Don’t worry, the scammers haven’t found a way to bypass Australia Post’s security.

What happened with this evolution of an Australia Post SMS scam is that a scammer found an SMS delivery service that allows him to use “AusPost” as the sender ID.

Typically, online SMS services have specific companies blocked so that scammers cannot use them. They may not be able to use “Microsoft” or “Telstra” because those are prohibited, but they can often use variations that are close enough to fool people. In this case, the scammers seem to have found a service allowing him to use “AusPost”.

When you receive a message from Australia Post, it can and probably will be from multiple phone numbers. They are online and send through multiple phone numbers, but are compiled under the company ID that is sent. This is one of the reasons why if you look under Australia Post contact details you won’t always see a phone number; these are simply collected under the company ID.

With this scam, the cybercriminals have basically found a way to join the regular list of AusPost messages, which makes their message more legitimate.

It’s not, but it sure looks legit, so how can you tell it’s a scam?

How do you know it’s a scam?

Education is often the best way to disarm a scam, as security software is limited. In the case of SMS scams, there is often very little security software to do, as they do not always work on a phone or tablet, which is precisely where it is supposed to be picked up.

So, the best way to figure out what’s wrong with this scam is to know what to look for and figure out what’s wrong with the message.

The first indication that this is a scam is the website itself.

Australia Post officially uses mypo.st like its website, and if you receive a message from its system, you will receive a series of numbers and letters that will send you to your personal location to track your actual package. We’ve blurred them out in our images above, but they’re included to direct you to the correct location for your package.

Not only does this post and this website not have that personal location, but it also does not have Australia Post. mypo.st website.

This is another thing : redeliverysite.com. It’s not really Australia Post. It’s your first gift.

If you click on the link – which you shouldn’t do, but if you do – you will be redirected to a phishing site, which has all the hallmarks of a phishing site made by someone who is not not from Australia. This type of scam is called “smishing” because it is SMS phishing.

One indication that this is a total scam is a reference to “postcode”, which we wouldn’t use in Australia, but the next is that the links on the web page don’t actually work. You can’t click to login, you can’t click on the about page or even on the menu. Nothing works because the scammers only want to make you feel like you’re in the right place, not send you back to the Australia Post site.

If you start entering information, you’ll find that once you enter your postcode – any postcode, even a fake one – you’re suddenly told your package tracking number and it’s pending .

Think about it for a second: there is no way to find a package just on the postal code alone. There would be hundreds of thousands of packages passing through any postcode, so this is clearly a scam, but it comes to light even more clearly after that.

Enter your “details” and all the details will lead you to the heart of this scam. We managed to get a 55th month into the date, and it still pushed us towards the goal: enter your credit card details asking for VAT, a type of tax we also don’t use in Australia.

Scammers are getting better, but you can still outsmart them

Obviously this scam is a bit more proficient than the usual scrambled English we see, and because this one came from an “AusPost” id and managed to integrate with the rest of the messages from the Australia Post, it is a little more convincing.

But there are still clear indicators that this Australia Post scam is just as bad as the others. The shoddy work on the cloned website, the different website address and the fact that Australia Post doesn’t charge delivery costs when they try to re-deliver.

We’ll probably see more, but if you remember Australia Post still uses mypo.st as their website and nothing else no matter what, that’s the first step to stopping this scam from doing any harm. to your bank account.

Joe Schoen Completely Revamped Giants O-Line in NFL Draft, Free Agency – So Maybe Eventually It Won’t Be So Terrible


Every time Joe Schoen has met with the media since being hired as the Giants’ general manager in January, he’s been asked questions about the offensive line. Each time, he was sure to temper expectations – a far cry from his predecessor.

When Dave Gettleman was hired in 2018, he promised to fix the offensive line, a group of positions that have been mostly terrible for the Giants since winning the Super Bowl in 2011. It only got worse. under Gettleman, and by the time he left after the 2021 season, he had hit a low point. Pro Football Focus ranked the Giants 30th in pass blocking in 2021 and 32nd in 2020. They’ve allowed 88 combined sacks over the past two seasons.

Schoen won’t make any bold statements like Gettleman did. Instead, he just worked to make it better. To quote Gettleman: “Rome wasn’t built in a day, my dear. So Schoen took a lot swings this offseason to remedy this. Rest assured: the offensive line starting in Week 1 will be very different from what it was at any time last season.

“I told you guys at the Combine, we had maybe five healthy offensive linemen on the roster,” Schoen said Saturday. “There were several holes.”

Will it get better?

In free agency, Schoen signed six veteran offensive linemen, all but one with starting experience. Mark Glowinski (74 career starts) is locked in as the new right guard. Jon Feliciano (39 starts) followed Schoen and Bills coach Brian Daboll – he’ll start at center. Veterans Max Garcia (52 starts) and Jamil Douglas (11 starts) will compete at left guard. Matt Gono (four starts) will be the swing tackle replacement. Roy Mbaeteka, a tackle, has never even played football, and is more of a project

The most impactful move came in the NFL Draft, when Alabama tackle Evan Neal – once considered a No. 1 overall pick candidate – fell to the Giants’ second-round pick, seventh. in total. He’s locked in as the Giants’ right tackle, the best hope of securing a spot on the O-Line that has long been problematic – especially with Solder in 2021.

The other two rookies came from North Carolina: guard Joshua Ezeudu in the third round and Marcus McKethan in the fifth.

In total, Schoen added eight notable new offensive linemen this offseason. And that’s not even factoring in the comebacks: talented left tackle Andrew Thomas, as well as fellow 2020 draft picks Shane Lemieux and Matt Peart, both seriously injured. Other notables include Ben Bredeson, acquired in a trade last year, and Nick Gates, who may not be ready to play in 2022 after breaking his leg last year.

When the Giants take to the field for the upcoming OTA and minicamp, Daboll and offensive line coach Bobby Johnson certainly have a lot to figure out.

“There are going to be a lot of guys mixing and matching,” Daboll said. “You can write the lineup every day, but it’s going to change from day to day.”

After the Giants drafted Neal on Thursday, Schoen was asked bluntly: Is the offensive line set?

“We haven’t been in the pads yet,” Schoen said.

Expectations, tempered.

“I hope so, but again there will be competition in every position, and I feel like we’ve improved it,” Schoen said. “All of a sudden, I think we could potentially operate from a position of strength in this position.”

Offensive line? A position of strength?

Imagine that.

Please sign up now and support the local journalism YOU rely on and trust.

Zack Rosenblatt can be reached at [email protected].

No crocodile moment as SF box smart on border poll


A possible border poll has been a central concern for the leader of one of Northern Ireland’s two largest parties during this election campaign.

He was mentioned in virtually every one of their statements and incorporated into media responses on a range of issues, from the need for urgent health service reform to the cost of living crisis and the protocol of Northern Ireland. North.

The person in question is not the leader of Sinn Féin north of the border, Michelle O’Neill, but the leader of the DUP, Jeffrey Donaldson.

The message was clear in a headline of an article by the DUP leader in the Belfast trade union daily The News Letter on Friday.

“If SF wins they will demand a date for a border poll,” it read.

In the article, Mr Donaldson said: ‘They won’t admit it, but there are plenty of Republicans who think the election is as good as it gets in the bag and their day has come.’

He added: “Make no mistake, if Sinn Féin wins this election they won’t be talking about fixing our health service, training more GPs or providing 30 hours of free childcare, they will be talking of a date for a divisive border ballot.”

DUP election candidates also sent a similar message ahead of the May 5 ballot.

Speaking on the BBC’s Newsnight program on Thursday, Peter Weir, former education minister for Stormont and candidate for Strangford, suggested that Sinn Féin had diluted talk of a border poll during the campaign.

He suggested it was because the party didn’t want to “scare the horses”, but warned the issue would be a priority if it emerged as the larger party.

A referendum on Irish unity is a political goal of Sinn Féin’s election manifesto, appearing on page 9, after the cost of living crisis and health, but before the economy, housing and education.

One of the stated priorities is “to obtain a date from the Irish and British governments for the unity referendums provided for in the Good Friday agreement”.

If the DUP team leader finishes second, he would be the first union leader to do so in Northern Ireland history.

To the surprise of many political commentators – and it appears to be the DUP – he was not the focus of the party’s campaign.

Time and again, Michelle O’Neill and other party figures have cited health services and tackling the cost of living crisis as key issues.

Taoiseach Micheál Martin, Tánaiste Leo Varadkar, Foreign Secretary Simon Coveney and the leaders of all the other Stormont parties have repeatedly said that setting a date for a border poll at short notice could be extremely divisive and of destabilization.

Sinn Féin disagree, but they have boxed smartly on the issue this campaign, avoiding giving the DUP and other opponents a crocodile moment.

A unitary poll is mentioned on page 9 of the Sinn Féin election manifesto

It was in Lurgan in County Armagh in February 2017, just weeks before the last Stormont Assembly election, that then DUP leader Arlene Foster spoke out against a law on the Irish language, adding that: “If you feed a crocodile, it will keep coming back. for more.”

The comment outraged nationalists and was a monumental political mistake. Sinn Féin couldn’t believe their luck as the anger helped galvanize their support and made people vote, including many who hadn’t backed the party at the polls.

Less than a month later – when the votes were counted – it gave Sinn Féin 27.9% first preferences and 27 seats in the Assembly, just behind the DUP with 28.1% and 28 seats. .

Party strategists know that hardline statements suggesting that a campaign for an Irish unity vote was the priority after this election would have a similar impact: nothing would motivate unionists and loyalists more than talk of an eventual Ireland. united at the corner of the street.

Sinn Féin leader in Northern Ireland, Michelle O’Neill

Similarly, Michelle O’Neill has not openly spoken of a desire to be the first Nationalist prime minister.

This would represent a historic and extremely symbolic change.

Since its inception a little over a century ago, Northern Ireland has been dominated by political unionism.

There have been Unionist Prime Ministers and Unionist Prime Ministers, but never a Catholic and nationalist head of government.

The slogan of Sinn Féin’s election manifesto, “Time for real change”, alludes to a desire for change in this historic political order, but does not specify it.

Instead, in its public statements, the party has focused on health and the cost of living as it tries to make itself as transfer-friendly as possible.

The single transferable vote system used in Assembly elections allows voters to rank parties in order of preference and their lower preferences come into play once their first choice is elected or eliminated.

Jeffrey Donaldson, leader of the Democratic Unionist Party

The system means Sinn Féin could win most first preferences but not most seats, as transfers could help opponents.

There could be a scenario where Sinn Féin is the leading party in terms of votes, but the DUP still leads in terms of seats.

It is the party with the most seats that appoints a Prime Minister, so if the post of head of government in Northern Ireland is to be filled by a nationalist for the first time, Sinn Féin will need transfers.

If the score is zero and the parties are tied on the number of seats won, the party with the most first preferences wins the right to appoint the prime minister.

The Alliance could be the big winner in terms of additional votes and seats.

In addition to carefully managing transfers between its own candidates, the party knows it must attract as much as possible from the SDLP and the growing number of non-aligned voters who define themselves neither as nationalists nor as unionists.

Asked at the launch of her manifesto in Belfast last week to set out the desired timetable for a border ballot, party leader Mary Lou McDonald spoke of “a decade of change”, but did not specify a timetable: no crocodile to scare Unionist horses.

It will likely be another story on the doorstep of Republican areas where traditional Sinn Féin voters will be assured the party’s commitment to a border ballot remains as strong as ever, but those words will not be heard by Unionist voters. that the DUP hopes to galvanize.

The growing expectation that Sinn Féin is likely to emerge as the biggest party when the votes are counted is putting enormous pressure on Michelle O’Neill and Jeffrey Donaldson.

If the DUP team leader finishes second, he would be the first union leader to do so in Northern Ireland history.

Clare Bailey, Leader of the Green Party

In a party clearly fractured since the coup that led to the ousting of former leader Arlene Foster last year, this could lead to serious recriminations, a widening of the fissures and questions about its position.

Michelle O’Neill has a different kind of pressure to contend with as a series of opinion polls, virtually every political commentator north of the border and bookies make her team the favourites.

A failure to deliver the award would no doubt lead to questions about the election campaign and his direction of it.

Last time out, the SDLP finished third in seats won with 12.

In what has been described as a potentially historic and seismic election, the campaign itself has been surprisingly boring.

A number of his seats are considered vulnerable, but leader Colum Eastwood is hopeful he can secure a number of targeted gains to offset any losses.

Former British Army officer Doug Beattie leads the Ulster Unionist Party into battle for the first time.

He won 10 seats last time out and he hopes his more liberal brand, including opposition to anti-protocol rallies by other unionists and loyalists, will attract more votes.

His first battle is in his own constituency of Upper Bann, where he faces opposition from more radical trade unionists as well as a strong Alliance candidate.

Of all the Northern Ireland party leaders, Naomi Long appears to be under the least pressure with questions centering on how many new seats her party will win.

Naomi Long of the Alliance Party

While Sinn Féin and the DUP focus on retaining what they have and minimizing losses, the Alliance could be the big winner in terms of additional votes and seats.

Green Party leader in Northern Ireland Clare Bailey expects him to keep his two seats, including his in south Belfast, and possibly make a win.

Jim Allister, the leader and sole representative in the Assembly of the traditional Unionist voice, aims to turn his hardline opposition into votes and seats.

He has publicly declared that the party that returns after this election with only one seat will be a failure.

The consensus is that there’s never been a better time for him to break through and give him some company on the benches at Stormont.

TVU leader Jim Allister (left) and UUP leader Doug Beattie

In what has been described as a potentially historic and seismic election, the campaign itself has been surprisingly boring.

But results day promises a lot of drama.

History could be made. Or just repeated.

Then the fireworks could begin.

BBB warns of new job interview scam involving messaging app and personal information


(Gray News) – The Better Business Bureau says scam artists love to bring in a jobs scam whenever the economy threatens to take a dive.

The BBB Scam Tracker has received several reports of a new employment scam involving downloading a messaging app.

BBB officials say the scam begins when people receive a message from someone interested in hiring them. This can come via email, SMS or even a social media platform.

At first glance, this “recruiter” seems professional. They claim to have seen your CV on a job search site and want to interview you for a position. But first, you need to download a messaging app, such as Telegram.

Once the app is downloaded, the “recruiter” will start messaging you and ask you to answer a few interview questions. After giving you enthusiastic feedback, they will offer you a position with their company.

This interaction is followed by an official-looking contract to complete and sign, according to the BBB.

After you sign up, the scammer will ask for your name, address, date of birth, and banking information, claiming to add you to direct deposit payroll and other company systems.

However, the BBB warns that if you provide this sensitive information, you could easily become a victim of identity theft.

And some versions of this scam don’t stop there.

As a new employee, you are directed to a “training manager” who will help you set up your home office. This person sends you a check to buy a laptop and other supplies.

After depositing the check, your contact will say that you have been overpaid and need to return some of what you deposited. However, the check is fake and any funds you “return” to your new employer will be long gone.

The BBB said a victim of such a scam lost $3,000.

BBB officials advise consumers to research job postings first, be wary of jobs that involve receiving and returning money, be careful with your personal information, and be careful of easy hires .

More information on how to avoid employment scams is also available here.

Copyright 2022 Gray Media Group, Inc. All rights reserved.

Create QR codes to better interact with your customers


Disclosure: Our goal is to feature products and services that we think you will find interesting and useful. If you buy them, Entrepreneur may get a small share of the revenue from the sale from our business partners.

If you doubt the world will go fully digital, just go to your favorite restaurant. Chances are they use QR codes to provide access to their menu. Menus are just one way for businesses to use QR codes to connect customers to your products or marketing materials. There are myriad opportunities with QR codes, you just need a way to generate them. This is where PERSA QR code generator Between.


PERSA offers industry-leading universal QR code generation to simplify the way you interact with your customers. Creating dynamic, trackable and customizable QR codes has never been easier.

With PERSA, you can access over 12 use cases in industries ranging from restaurants and hospitality to events, app development, and more. You can create them for Text, URL, Phone, SMS, Email, WhatsApp, FaceTime, etc. Choose between static and dynamic QR codes based on your medium so customers can interact with your brand without leaving the physical map or display they’re viewing. With static QR codes the destination link cannot be changed, but with dynamic QR codes you will have only one code no matter how many times the destination link is changed, giving you more flexibility and control.

With a Persian plan PERSA, you will have access to ten types of QR codes, can save up to 30 QR codes and support one project and one pixel. You’ll also get access to analytics, 180-day stats retention, and a custom back URL for your QR codes.

Even the real world is going completely digital, and you owe it to your customers to keep up. For a limited time, you can get a lifetime subscription to PERSA QR Code Generator Persian Plan for 92% off $499. only $34.99.

Prices subject to change.

Analysis: Will the royal family try to bring Prince Andrew back into public life?


The latest damning judgment against the Queen’s second son was delivered by councilors for the city of York in northern England, who voted unanimously on Wednesday to strip the prince of his citizenship.

The honor was bestowed on him in 1987, and its removal sends a strong message that Andrew, the Duke of York, is undesirable in the place from which he derives his royal title.

This decision was supported by parties from all political persuasions. The council’s largest group, the Liberal Democrats, said in a statement: “We have made it clear that it is not appropriate for Prince Andrew to represent York and its people. Removing this title sends the right message that us as a city stand with victims of abuse.”

Despite the conclusion of the civil case, Andrew’s long association with Epstein has ruined his reputation as a senior royal.

York councilor Darryl Smalley said the logical next step “would be for Prince Andrew to do the right thing and renounce his title as Duke of York”.

This title was a wedding gift from the Queen, and it would take a vote in the British Parliament to have it revoked. No one has tabled such a motion – yet. But if they do, and it passes, Elizabeth should sign it into law in her role as head of state. It would be the ultimate indignity for the prince, who has already had to agree to stop using the title ‘His Royal Highness’ after being stripped of his royal duties and patronages by his mother.

It may not come to that point. York Central MP Rachael Maskell suggested Andrew could voluntarily relinquish his title.

There is no suggestion from Prince Andrew that he plans to do so. If he did, his last remaining title would be “Prince”, which is a birthright for any son of the monarch. Again, an Act of Parliament would be required to remove it.

Andrew was stripped of his military titles and charitable sponsorships in February. A royal source told CNN at the time that he would no longer use the “His Royal Highness” style in an official capacity, adding that the decision had been “widely discussed” within the royal family.

Neither Buckingham Palace nor Andrew’s personal spokesperson had a comment on the council’s vote in York, but the fact that the prince continues to make headlines ahead of Platinum Jubilee celebrations of the queen in June will be frustrating for those involved in the construction.

And it remains to be seen whether the royal family is inclined to give in to pressure against Andrew, or to take the opposite path by trying to gradually reintroduce him into public life.

Although he no longer has an official role, he is still part of the family. That’s why we saw Andrew at Prince Philip’s memorial service, which was televised but was primarily a family event. Eyebrows were raised as Andrew emerged, walking his mother down the aisle to her seat – a reminder that public anger will not dictate every decision made by the palace.

The family will now wonder if or how to fit Andrew into the Jubilee events. Current thinking is that he won’t be involved in the more formal and official proceedings, but we may see him when the family make their traditional appearance on the balcony of Buckingham Palace.


Prince Edward and Sophie, Countess of Wessex visited a high school in Saint Lucia on April 28, 2022.

Another tough royal tour in the Caribbean.

Prince Edward and Sophie, Countess of Wessex have become the second royal couple in weeks to face tough questions about the monarchy’s place in the world while touring the Caribbean.

Antigua and Barbuda’s prime minister told the couple the nation wants ‘one day to become a republic’ during a face-to-face meeting on Monday, months after Barbados took the plunge and severed ties official with the Queen.

Edward, Queen Elizabeth’s youngest child, laughed nervously in response to the comments, according to British news agency PA Media, which was on the trip.

Prime Minister Gaston Browne also raised the issue of compensation for slavery, an issue that has come up frequently during protests in recent months.

Edward and Sophie faced small but consistent protests on the sidelines of their official engagements on the multinational tour. In Saint Lucia, a small group of activists picketed a royal walkabout. A protester told the Palestinian Authority: “We want reparations now. The Queen of England must apologize for slavery.”

The couple have already canceled a leg of their tour at the last minute, announcing abruptly last week that they would not be visiting Grenada. No reason was given for the postponement.

Royal tours have long attracted activists, but the tone of these protests has changed in recent months as the concept of republicanism has entered the realm of reality in some countries.

It would once have been extraordinary for a Commonwealth leader to tell members of the royal family, in front of the press, that they want to leave the monarchy. But Edward and Sophie had to expect trouble to arise this time around.

Sophie and Edward pose during a show in Saint Lucia.
Their trip follows a disastrous Caribbean tour by Prince William and Catherine, Duchess of Cambridge in March. That visit was derailed by large protests and awkward photo ops by the couple. Although the Wessex visit did not cause the same backlash, it does show the complex concerns members of the Royal Family have to deal with when visiting the Commonwealth.
The royal family’s ties to slavery date back to the 16th century. Queen Elizabeth I provided slave trader John Hawkins with his own ship “specifically for the purpose of capturing Africans on the West African coast”, according to an article from the UK National Archives. Later members of the royal family invested heavily in the slave trade, and many large stately homes in Britain today were built on the profits of slavery and colonial exploitation.

Prince William broached the subject during his March trip, discussing Britain’s historic role in slavery in his only speech during the couple’s stop in Jamaica, denouncing the ‘abhorrent’ practice and expressing his “deep sadness”.

But some protesters are demanding a more concrete response, such as a formal apology from the royal family or reparations payments to affected countries.

In parts of the Commonwealth, the legacy of slavery remains prominent, and as these issues persist, the global reach of the monarchy could recede further.


The Queen is back in Windsor.

Elizabeth II was in high spirits as she returned to Windsor Castle after a week’s break at her Sandringham estate. The Queen met the Swiss President on Thursday and could attend the official opening of Parliament in two weeks, ahead of her Jubilee celebrations in early June. Observers will be relieved to see her back at work. For the past few months the Queen has suffered from Covid and has been forced to withdraw from Easter services due to mobility issues.

The Queen received the President of Switzerland at Windsor Castle on Thursday.

Charles greets journalists in Ukraine.

“You are amazing, but it can’t be easy.” That’s what Prince Charles told BBC reporters Lyse Doucet and Clive Myrie, who spent several weeks in Ukraine covering the Russian invasion, as they visited the broadcaster’s London headquarters on Thursday. He was there to toast the BBC World Service’s 90th anniversary and praised journalists for delivering the ‘unbiased truth’ from the conflict zones. “It takes a lot of courage,” he added when speaking with Doucet. The future of the BBC, and in particular its global output, has been in question since the UK government cut funding to the network in January.

Ed Sheeran and corgi puppets sign up to cheer on the Queen.

Details are emerging about the public festival which will mark the Queen’s Platinum Jubilee in June – and it looks like an eclectic spectacle. A musical tribute by Ed Sheeran will be part of the £15million platinum jubilee competition, it was confirmed on Tuesday. A group of corgi puppets will also take center stage, in what organizers say will be a scene of “humorous mayhem” on The Mall outside Buckingham Palace. Other highlights include singer Cliff Richard, an aerial performer suspended beneath a giant helium balloon, a group of maypole dancers and a moving wedding cake that will play Bollywood hits. We will reserve judgment until the big day.


Breaking news: Prince Charles and Camilla try their hand at broadcasting from the BBC News set in London. Charles said he had seen reporters “shivering on the rooftops” while reporting from Ukraine.

“We stand up for those who need to be defended. Service and sacrifice are in our blood and never forget that.”

Prince Harry

Prince Harry gave a powerful speech to the competitors to close the Invictus Games in the Netherlands. The tournament he founded was twice postponed due to the pandemic and finally held its fifth edition this month in The Hague.

Thinking about customer experience? Here’s how to select the right CPaaS provider


Communication Platform as a Service (CPaaS) is currently one of the hottest opportunities in the cloud communication space.

As companies increasingly turn to technology to drive customer experience (CX) transformation and streamline operations, Juniper Research predicts that the CPaaS industry will generate over $34 billion in sales by 2026.

This remarkable growth is propelled not only by the increasing adoption of “traditional” channels such as SMS and voice, but also by a whole new wave of innovation. Key new technologies include real-time video, AI-powered conversational automation, advanced messaging channels, and omnichannel offerings.

With so much to offer, the CPaaS market is a busy space. We have already seen big companies like Microsoft enter the industry, joining a list of established players. In such a crowded market, it is critical for those making the purchasing decision to understand what sets CPaaS vendors apart and what features they should evaluate.

Single applications become a central platform

One of the most important considerations for buyers is how their business, which serves millions of customers, should implement CPaaS.

Traditionally, companies have used SDKs and APIs to deploy communications in their messaging apps on a case-by-case basis. However, as companies expand their efforts, what started as a single app to send SMS notifications will likely morph into hundreds of disconnected apps. Each application will have its own code, system integrations, and logic to manage, and without significant development and IT resources, this approach makes it difficult to scale communications and leads to interrupted customer experiences.

To solve this snowball problem and the proliferation of single-purpose applications, some CPaaS providers provide all the functionality required to automate end-to-end journeys and manage communication applications on a central platform. The platform acts as the glue between existing back-end systems and channels, providing a single point of orchestration that lays the foundation for a connected communication experience.

Therefore, decision makers should prioritize vendors that will give their business the flexibility to deploy their first CPaaS-enabled applications on a use-case basis, prototyping new capabilities and channels, but also offering a central platform to which they swing when they begin to ladder. If they don’t, they may get to a point where their selected supplier becomes a bottleneck for innovation in the future.

CPaaS: key features to evaluate

When evaluating different CPaaS solutions, these five features should be at the forefront of a decision maker’s mind:

1. APIs and SDKs

APIs and SDKs, or Application Programming Interfaces and Software Development Kits, are the cornerstones of CPaaS. Decision makers should take stock of the APIs and SDKs their business needs and check their availability with a potential vendor. The more a supplier offers, the better. This way, if you want to take advantage of new channels or other CPaaS capabilities in the future, you won’t have to add standalone solutions to support them.

2. End-to-end automation

To make disparate business and partner systems interoperable, companies need a vendor to connect them. Inbound system integrations enable events ingested by enterprise systems to trigger communications, while outbound integrations enable finding and updating records in systems. These two-way integration capabilities enable end-to-end automation of journeys that seamlessly orchestrate interactions across multiple systems and channels.

3. Network connectivity

Reliability, traceability and scalability are extremely important for global enterprises. As a result, the type of connection to carrier networks and digital messaging providers offered by CPaaS providers becomes another differentiator, impacting everything from latency, options for sender IDs, delivery reports and message security. Therefore, it is essential to look for a provider that offers Tier 1 connectivity to carriers/mobile operators.

4. Tools throughout the application lifecycle

CPaaS vendors are leading the way in helping companies transition to a low-code development approach. The centerpiece for many vendors is a low-code builder that allows developers to automate and redefine customer journeys incrementally and quickly. Decision makers should evaluate a vendor’s visual builder, but also ensure that there are tools for each stage of the application lifecycle that cater to a broader set of users. Look for built-in tools that simplify debugging, configure communication patterns, help ensure compliance, and help optimize journeys with analytics.

5. Support beyond the platform

The communications landscape is complex, and expertise is needed to design successful communications solutions, manage the different capabilities of each channel, and know which use cases will have a positive impact. Decision makers should assess the level of support they will need, not only at the time of purchase, but also in the future, as each CPaaS vendor takes a different approach to how they support their customers.

Download our CPaaS buyer’s guide for more information

For more information on best practices and other qualities to consider when selecting a CPaaS solution, download our IT Buyer’s Guide to CPaaS.

This article is part of a paid partnership with mobilewhich is part of Webex by Cisco.

New Ideas to Prevent Sexual Assault in the Military | Procedure


On January 23, 2021, Secretary of Defense Lloyd Austin asked subordinate commanders to come up with “new” and “creative” approaches to sexual assault prevention and response. Nearly a decade earlier, in 2012, the 6th Marine Corps Recruiting District (MCD) had already implemented an innovative and creative approach to sexual assault prevention: Operation Restore Vigilance (RV). The 6th MCD commander was inspired by the eradication of disease in the Panama Canal Zone in the early 1900s and applied a similar “systems approach” to eradicate sexual assault. The 6th MCD’s approach, while unlikely to be implementable force-wide, offers several lessons for commanders seeking to achieve the Secretary of Defense’s intent.

In large part, the effectiveness of RV was based on how well it synergized many proven sexual assault prevention strategies. The new and creative aspect of VR was the second line of effort – internal control measures. These aimed to prevent or eliminate precursor conditions strongly correlated to recruiter sexual misconduct, including victim isolation and preparation. Some prohibitions included banning private recruiter/candidate meetings and personal text messaging – in other words, the ordinance criminalized certain behaviors in an effort to deprive recruiters of the ability to set conditions for sexual misconduct . This approach has proven effective. Before enacting internal control measures, the 6th MCD recorded an average of ten confirmed cases of sexual misconduct between recruiters and candidates per year. In the year following enactment, there were no substantiated incidents. However, nine recruiters were relieved for violating RV bans on precursor driving.

Restore Vigilance has produced results. Specifically targeting isolation using the “two person rule”, RV prohibited one-on-one interactions between recruiters and applicants. As a witness was always present, this prohibition deprived recruiters of the possibility of isolating potential victims. Second, the 6th MCD recognized that “[t]Exting is an unsupervised, informal and dangerous mode of communication that can easily be misunderstood and manipulated by predators. Restoring vigilance required that all recruiter-to-candidate communications be done on official government devices. As government schemes are subject to supervision, recruiters have been deprived of the first means of preparing future victims. After training and education on these prohibitions, policy violators were held administratively or judicially accountable. The results validated the approach. The commander relieved nine Marines for violation of orders (gateway crimes) and the command stamped out recruiter/candidate sexual misconduct – the ultimate goal.

Beyond the recruiting environment

Of course, commanders do not have the absolute power to regulate otherwise non-criminal conduct by directive. To be lawful, an order must relate to military duty. This nexus requirement means that an order must be reasonably necessary to accomplish a military mission; necessary to safeguard or promote the morale, discipline and usefulness of members of a unit; or ensure the maintenance of good order in the armed forces. An ordinance may regulate private activity if it does not impose an unjust limitation on a personal right, is not overbroad, and is not arbitrary and capricious.1

The unique recruitment mission gives the commander more leeway to impose certain restrictions that would be too broad or unfair in another context (or command). The narrowly tailored prohibitions in VR (two-person rule and prohibition of private devices) are essential to protect candidates, preserve good order and discipline, and ensure mission accomplishment. Similarly, while a ban on private social interactions outside the workplace would generally be too broad, the recruiting mission and special status of the parties (recruiter/candidate) is sufficient to both narrowly tailor the ban and provide the military bond required.

Nonetheless, Restore Vigilance’s internal control measures offer possible approaches to addressing sexual assault that, with the right tools, could be applied across the force. A potentially effective approach would be to criminalize identifiable precursor behavior under Article 134 of the Uniform Code of Military Justice. If a Service Member takes any action with the specific intent of satisfying sexual desire and such actions are: 1) unreasonable and 2) prejudicial to good order and discipline, discrediting the Service, or both, an appropriate amount of criminal liability should be attached.

An inappropriate string of text or aggressive behavior used to isolate victims could be criminalized as sexual assault. If these types of behavior are prohibited by the penal code rather than by order of a commander, overbreadth, military nexus, and special status considerations related to the legality of military orders become moot. Similarly, providing alcohol to minors, lying to officials, violating firehouse policies, consuming alcohol to minors, repeated unwelcome advances – in fact, any behavior undertaken with the specific intent to obtain sexual gratification – could expose perpetrators to an appropriate level of criminal risk if such actions fall below community standards of reasonableness.

Restore Vigilance’s internal control measures are not a panacea. Their application in a broader context could be regulatory overbreadth, attempting to regulate otherwise non-criminal and constitutionally protected behavior. However, the elements of VR provide proof of concept for an effective, novel, and creative approach to combating military sexual assault across the force.

Short Message Service (SMS) Firewall Market Is Booming Worldwide – Ripon College Days


“Short Message Service (SMS) Firewall Market” study by “marketreports.info» Provides details on market dynamics affecting the Short Message Service (SMS) Firewall market, market scope, market segmentation, and overlays on major SMS Service Firewall market players short messages (SMS), highlighting the favorable competitive landscape and prevailing trends over the years.

This Short Message Service (SMS) Firewall report contains a comprehensive analysis of the Short Message Service (SMS) Firewall market and is assessed using volume and value data validated across three approaches, including top company earnings. It concludes with accurate and genuine market estimations considering all parameters and market dynamics. Every crucial and decisive detail for the development and restriction of the market is mentioned in small points with solutions and suggestion which might affect the market in the near future. Market segmentation is studied specifically to give in-depth knowledge for additional investments in the market.

For a sample Short Message Service (SMS) firewall report, click:

The “Short Message Service (SMS) Firewall Market” report gives a varied description of market segmentation on the basis of segmented dosage, route of administration, and application, and leads with structure descriptive of the trends and restrictions of the various segments and sub-segments. It also provides market size and estimates a forecast from the year 2022 to 2030 with respect to five major regions, namely; North America, Europe, Asia-Pacific (APAC), Middle East and Africa (MEA) and South and Central America. The report also provides exhaustive PEST analysis for all five regions after evaluating political, economic, social and technological factors effecting the Short Message Service (SMS) Firewall market.

The Short Message Service (SMS) Firewall report aids in determining and interpreting key market players, portfolios containing necessary information such as company profiles, components and services offered, financial information recent years, the key developments of recent years, which help to build strategies to obtain a long-term competitive advantage. The Short Message Service (SMS) Firewall report also analyzes factors affecting the Short Message Service (SMS) Firewall market from both demand and supply side and further assesses dynamics of the market affecting the market during the forecast period i.e. drivers, restraints, opportunities and future trend. .

Download Short Message Service (SMS) Firewall Sample [email protected]/sample/20181/Short-Message-Service-(SMS)-Firewall

SMS (Short Message Service) firewall companies mentioned: China Mobile, Global Wavenet Limited, BICS, SAP SE, China Unicom, Tata Communications Limited, Syniverse Technologies, iBasis (Tofane Global), Infobip, Tango Telecom, AMD Telecom, Omobio, Mobileum, Anam Technologies, Openmind Networks, NewNet Communication Technologies, Route Mobile Limited, Symsoft, NTT DOCOMO, Mahindra Comviva, Cellusys, Cloudmark, HAUD, Monty Mobile

By TypeApp-to-Person (A2P)Person-to-App (P2A) MessagingBy ApplicationBSIEntertainmentTourismRetailHealthcareOther

Key Elements Recognized by the Short Message Service (SMS) Firewall Report:

  • Short Message Service (SMS) Firewall Market size and growth rate over the forecast period.
  • Key factors driving the “Short Message Service (SMS) Firewall Market” market.
  • Key Short Message Service (SMS) Firewall Market trends curbing the growth of the “Short Message Service (SMS) Firewall Market”.
  • Challenges for the growth of the Short Message Service (SMS) Firewall market.
  • Major vendors of “Short Message Service (SMS) Firewall Market”.
  • Detailed SWOT analysis of the SMS (Short Message Service) firewall.
  • Opportunities and threats faced by the existing vendors in the global “SMS (Short Message Service) Firewall Market”.
  • Trending factors influencing the Short Message Service (SMS) Firewall Market across geographical regions.
  • Strategic initiatives focused on leading Short Message Service (SMS) firewall vendors.
  • PEST analysis of the Short Message Service (SMS) Firewall market in the five major regions.

Buy Full Short Message Service (SMS) Firewall Report @: marketreports.info/checkout?buynow=20181/Short-Message-Service-(SMS)-Firewall

About Us

Marketreports.info is a global provider of market research and advisory services specializing in offering a wide range of business solutions to its clients, including market research reports, primary and secondary research, demand forecasting services, focus group analytics and other services. We understand how important data is in today’s competitive environment and so we have partnered with industry leading research providers who are constantly working to meet the ever-increasing demand for research reports. market throughout the year.

Contact us:

Carl Allison (Business Development Manager)

Tiensestraat 32/0302,3000 Leuven, Belgium.

Market reports

phone: +44 141 628 5998

Email: [email protected]

Website: www.marketreports.info

Check Vi data, SMS balance and validity.


Vodafone-Idea (Vi) is the country’s third-largest telecommunications operator after Airtel and Jio. Having one of the best download speeds in the country and offering newer services like VoWiFi, Vi is finally catching up to its rivals. See also demonstrated its 5G capabilities in Pune recently and said it was ready with SA and NSA networks. That said, with Vi increasing the prices of its prepaid 4G plans, it’s now more important than ever to control Vi’s data balance. While Vi offers all-night and weekend data rollover with some prepaid plans, it’s important to track your usage so you don’t run out of service when you need it most.

Here is a quick overview of how to check your Vi internet data balance, your SMS balance and the validity of your prepaid SIM card plan.

Read also : New Vi prepaid plans 2021: best Vodafone Idea recharge plans with talk time, validity

How to Check Vi 4G Internet Data Balance

You can easily check your data balance by dialing the USSD (Unstructured Supplementary Service Data) code on your mobile. Just dial *199*2*2# and you will be greeted with a flash message indicating how much data is left for the day and if there is an additional data pack left.

How to Check Vi SMS Balance

Now, it is very important to check your SMS balance, as many plans do not come with SMS benefits. You won’t be able to send text messages if the plan you’ve selected only supports data and calls. To check your SMS balance, simply dial the number

*199*1*8# find out your SMS balance. You will receive a flash message on the SMS you have yet to send.

How to Check Vi Core Balance

Just dial *199*2*1# – This USSD code will verify the main balance of your Vi number. The code also gives you full information about all data packages and the validity of your number. Not only that, you will also get information about existing plans. Alternatively, you can also dial *199# or *121# for the same info.

How to check the validity of Vi

The USSD codes to check the validity of Vodafone Idea are the same as the main balance. Launch the dialer app and call *199#, *121#or *199*2*1#. A message will appear on your screen with the remaining validity information of your Vi mobile number.

How to Check Vi Balance Online

In addition to USSD codes, Vodafone Idea aka Vi subscribers can also check the balance and validity of their plans online through the Vi app, website and WhatsApp. Here’s how they work:

Checking Vi balance via app

The app will tell you how much data you have left for that day, the validity of the pack, and how much data you’ve collected for the weekend data transfer (on some plans). The app also gives you the option to top up your number if the existing plan has expired.

Checking Vi Balance via WhatsApp

  • Vodafone Idea number balance and validity can also be checked via WhatsApp.
  • Just add the number 9654297000 to your contacts and send Hello or Hi
  • An automated message will appear.
  • Tap on the menu, there you will see a balance option. Press it.
  • Another message will appear. Select my balance by typing and sending 1.
  • At first, it will ask you to confirm the phone number for which you want to recharge.
  • Once confirmed, an OTP will be sent to your phone number. Type and confirm the OTP.
  • After confirmation, you will get all your account details. Remaining data pack quantity, all additional pack details, your plan validity and weekend data transfer details.

Checking Vi Balance Online Using Website

You can also easily check your balance on the Vi website.

  • Go to the site www.myvi.in
  • You will need to log in to your account. Login via OTP
  • Once logged in, you will see your prepaid dashboard. Here you will see your pack details. The amount of data remaining for that day, the validity of the plan, as well as the amount of data you collected for the weekend data transfer (on certain plans).
  • By selecting the plan details, you will see your main Vi number balance, active services and last recharge dates. You can also recharge directly on the website.

Checking Vi balance via IVR

Just dial 199 and you’ll be greeted by a Vi IVR (Interactive Voice Response). Select your preferred language by dialing the preferred language the IVR gives you.

Proceed by dialing 1, you will obtain the balance of your data pack as well as its validity. You will also receive top-up offers with your request.


How do I get additional emergency data if my data pack is over?

Vi India offers additional data every month in case you run out of data. This feature is called Data Delights and is available on some prepaid plans. Just open the Vi app and you can claim 1GB mobile data for free. A pop-up window will appear when you check your package details. You can claim 2 GB of free data every month (1 GB of data per day)

Is SMS service included in all data plans?

Unfortunately, it is not the case. Text messages are available on some unlimited plans, so make sure that while you top up the provider explicitly mentions that you will receive free text messages like 100 per day.

Important MPHI investigation into the impact of no automatic fault


The Michigan Public Health Institute (MPHI) is conducting a series of investigations to understand how changes to Michigan’s auto insurance law that went into effect July 1, 2021 impact crash survivors and their families , as well as service providers. The first survey was distributed in October 2021. The survey is now being distributed again for the second time.

If you didn’t have the chance to participate in the first survey in October 2021 or if you haven’t recently received an invitation in your emails, we encourage you to take this opportunity now to participate in this important work.

For survivors and/or family members, the survey will ask about services the crash survivor received before and after July 1, 2021. In addition, the survey will ask for demographic information, including personally identifiable information and health information. Completing the survey should take approximately 30 minutes.

For service providers, the survey will ask about the services provided by your organization and the impact of changes (including the 55% cap, Medicare 200% cap, and utilization review) on your operations. Completing the survey should take approximately 20 minutes.

Your survey responses will be collected by MPHI where the data will be stored in a password protected electronic format and will only be accessible with authorisation. MPHI takes extreme care to protect sensitive data. Only aggregated information will be shared with lawmakers and other stakeholders to understand the effects of these changes on healthcare systems and patients in our state.

To ensure that all those affected by changes to the law are represented in survey responses, we invite you to share the survey link with your contacts who have the potential to contribute.

Please submit your completed survey as soon as possible, but no later than Sunday, May 15, 2022.

Instructions for completing the survey:
1. To open the survey, click on the link

Survey of Motor Vehicle Accident Survivors and Service Providers

or copy

https://redcap.mphi.org/surveys/?s=JD9HKLL4HP in your web browser

2. If you need to stop and continue later, click “Save and come back later” at the bottom of the page

3. Next, write the return code you see on the screen

4. When you want to return to the survey, use the same link to open the survey

5. Then click “You come back ? » in the upper right corner of the page, and enter the return code

6. You can edit your answers by clicking on “Previous page” or “Next page”

7. Finally, click “Submit” at the end of the survey.

If you have any questions, contact Shaohui Zhai, Statistician, PhD at 517 324-8354.

Thank you for your participation in this important effort!


A lesson in growth initiated from a Chattanooga-based text request


It was almost like Chattanooga Text request was born for this moment.

The eight-year-old SaaS startup helps organizations communicate more effectively with customers through text messaging campaigns. The idea was certainly scalable when the startup started. But the team has gone into “hyper-growth” mode, said CEO Brian Elrodas companies from more than 100 different verticals seek to navigate the post-pandemic world.

“Companies were looking for new ways to communicate without contact,” he added. This includes options for appointment scheduling and scheduling, customer service tracking, and member engagement campaigns.

2020 brought new use cases for SMS campaigns. So the SMS Demand Team got to work and launched both SMS payment options and options specific to political campaigns. These were important as companies sought to capture recurring revenue and candidates sought ways to connect with voters under social distancing orders.

But it’s not just COVID-related trends that have driven Text Request’s growth. The platform harnessed the generational shift around communication. “Millennials really drove this business,” Elrod told Hypepotamus. “They are the biggest consumer base and they are the ones who do all of their communication via text. Many don’t even have voicemail set up.


Text request is far from the only option in the conversational texting space. One of its main competitors, Seattle-based Zipwhip, raised nearly $100 million before being bought out by Twilio in 2021. The software side of Zipwhip’s business was dismantled in this acquisition, and Text Request was selected as the preferred vendor for the 20,000 customers looking for a new SaaS messaging service.

Zipwhip raised nearly $100 million prior to the acquisition. Text query started from the beginning. Elrod said at first it was out of necessity as an early SaaS startup in Tennessee. “When we started, we thought because we were a tech company, we had to fundraise because that’s what everyone was celebrating,” he added. “There is a bit of luck, but we have worked very hard to build this product. And as the old analogy goes, the harder you work, the luckier you get.

The company’s payroll is currently pushing 40 people, according to Elrod. Many are based in Chattanooga, with talented engineers from all over the country.

COVID-19 Weekly Report – Community COVID-19 infections remain high


April 25, 2022

OSWEGO COUNTY – The Oswego County Health Department reports an additional 762 residents tested positive for COVID-19 from Monday, April 18 through Sunday, April 24. This includes results from lab-confirmed tests and home tests. Additionally, another death related to COVID-19 has been reported by the New York State Department of Health, bringing the total to 188.

“The seven-day cumulative case count remained at about the same level as a week ago and the positivity rate remains very high in our county,” the Oswego County Public Health Director said. , Jiangcheng Huang. “These two indicators mean that COVID-19 infections in the community are still extremely high. The number of COVID-19 vaccination doses administered in the county last week was lower than the previous week, so we continue to encourage residents to get vaccinated at their local pharmacy, primary care provider’s office, or a county health department clinic.

Oswego County’s COVID-19 community level remains “high,” according to the Centers for Disease Control and Prevention (CDC). At this level, the CDC and NYSDOH recommend people wear a mask indoors in public spaces and keep their COVID-19 vaccines up to date. They should also get tested if they have symptoms and, if they are at high risk of serious illness, should take extra precautions, such as avoiding poorly ventilated or crowded spaces.

The following report reflects data collected from Monday, April 18 through Sunday, April 24:

  • Number of laboratory/supplier tests: 3,645
  • Number of positive cases in laboratory/supplier: 564
  • Percentage of laboratory/supplier positive cases: 15.47%
  • Number of positive home test results: 198

Another 19 Oswego County residents were hospitalized with COVID-19 between Sunday, April 17 and Saturday, April 23, according to the hospitalization report received by the Oswego County Health Department. The new hospitalization counts are not part of a running total of hospitalizations. For hospitalization details such as age ranges and vaccination status, access the Oswego County COVID-19 Dashboard at https://oswegogis.maps.arcgis.com/apps /dashboards/3fd162cd12264b418dc03bdebd7f5300.

Oswego County Medical Director Christina Liepke, MD said, “The CDC Morbidity and Mortality Weekly Report released last Friday said there were approximately 460,000 COVID-19 related deaths in the states. States last year. This makes COVID-19 the third leading cause of death in 2021. This is another important reminder for people not only to get vaccinated, but to keep their vaccinations up to date. (https://www.cdc.gov/mmwr/volumes/71/wr/mm7117e1.htm?s_cid=mm7117e1_w)

The Oswego County Health Department holds immunization clinics every Tuesday afternoon from 12:30 p.m. to 3:30 p.m. by appointment only; and the second Wednesday of each month from 9 a.m. to 11 a.m. and from 1 p.m. to 3 p.m. for walk-in service. However, to reduce wait times at county vaccination clinics, residents are strongly encouraged to visit health.oswegocounty.com/vaccines to schedule an appointment.

The Oswego County Office for Seniors can help seniors 60 and older who need help navigating the internet to book an appointment. Call 315-349-3484.

Vaccines are also available at local pharmacies and health care provider offices. Face masks are required at all clinics and home COVID-19 test kits will be distributed to those who get vaccinated at a county clinic while supplies last.

Free transportation is provided for residents to travel to COVID-19 testing and vaccination sites through a partnership between Oswego County and Oswego County Opportunities, Inc. Rides are available between 6 a.m. and 7 p.m. Monday see you on Friday. Call 315-598-1514 to plan a ride in advance.

Oswego County has developed a portal for residents to report positive COVID-19 home test results, exposure to the virus, and obtain necessary isolation/quarantine documents for schools and employers. Go to https://health.oswegocounty.com/COVID-19 and click on the appropriate link.

Test results received from doctors’ offices, pharmacies, and other testing sites DO NOT need to be self-reported. However, if isolation orders are needed for school, employers, or other reasons, people can request these documents using the “Report a positive (lab) test” option in the portal.

The health department encourages residents who test positive to notify any close contacts immediately. The close contact should then go to the state’s website at https://coronavirus.health.ny.gov/new-york-state-contact-tracing to find out if they meet the quarantine criteria . If they do, they should report the exposure on the county health department’s online portal.

Residents are asked to continue to take precautions to prevent the spread of COVID-19, including:

  • Get vaccinated and keep your COVID-19 vaccinations up to date.
  • Stay home if you are sick and keep your children home if they are sick.
  • Wear a properly fitted mask.
  • Stay six feet away from others.
  • Avoid crowds and poorly ventilated spaces.
  • Test to prevent spreading the virus to others
  • Wash your hands often.
  • Follow isolation and quarantine recommendations.

For more information, visit the Oswego County Health Department’s COVID-19 page at https://health.oswegocounty.com/COVID-19 or call its COVID-19 hotline at 315-349-3330. Callers may need to leave a message and a staff member will return the call.

Residents should also contact their medical providers directly for personal medical advice on COVID-19 and vaccinations or boosters.

For more information on emotional supports, visit the Mental Hygiene Division of the Oswego County Department of Social Services at www.oswegocounty.com/mentalhygiene.

Under New York State Public Health Law, the Oswego County Health Department is the local public health authority for the response to the COVID-19 pandemic in the county of Oswego. The Oswego County Health Department is working closely with the New York State Department of Health regarding COVID-19 surveillance, response, and reporting.

How to Use Emoji Reactions in Google Docs


Google Docs recently added many goodies to its platform, such as Markdown support, a master shortcut, and an activity dashboard. And new features keep coming.

These days, the big G is rolling out emoji reactions to Google Docs, allowing users to respond to specific pieces of body text with smiley faces and/or spanish dancers. You might think emojis aren’t useful in word processing tools, but the collaborative nature of Docs actually ensures that you can easily show how much you like your colleagues’ additions or request edits in a way passive-aggressive.

First, make sure you have emoji reactions

The company announced the rollout of the feature on April 5 and said all users (whether you pay or not) should be able to see and use the tool within the next 15-20 days.

[Related: The greatest Google Docs shortcut you’re probably not using]

To make sure you have access to emojis, all you have to do is select some text and see if the context menu on the right margin includes a yellow smiley. If so, you are good to go. If you can only see shortcuts to enter suggestion mode or add comments, you may need to wait a few days before you get the option. You can also try closing all open documents, restarting your application, or refreshing your browser to see if that changes anything.

How to Add Emoji Reactions to Google Docs

Emoji reactions in Google Docs work very similarly to how they work in text messaging apps. But in this case, instead of long-pressing on a block of words to bring up the emoji options, all you have to do is highlight what you want to react to and click the Add an emoji reaction button-the yellow smiley face we talked about earlier.

Now it’s time to choose your emoji. Like on most platforms, you will be able to scroll and choose any reaction you like. If you’re also using Google Chat, you’ll notice that the last line of emojis is fixed and shows your favorite replies with the skin and gender specs you’ve already set up. These two platforms are now interconnected, so if you change preferences on one, they will carry over to the other.

Clicking on an emoji will post your reaction and, just like a normal comment, highlight the text you selected so other users know what the emoji is connected to. If you or anyone else with access to the document wants to add a reaction to the same piece of text, you can click on it and then press the Smileys to open the emoji menu and choose another icon. You can also second someone else’s reaction by double-clicking the emoji they added, which will add a number to the count on the right. All reactions will accumulate on the margin and you can see who added which emoji by clicking on a specific one and hovering your mouse over it.

[Related: Emojis and reaction GIFs make Slack better. Here’s how to create them.]

Clicking on a phrase you or someone else has reacted to will also bring up the classic Google three-point menu. Click on it, then choose To resolve to remove any emoji no matter who added it. You can also get rid of an emoji you’ve added by double-clicking it.

Unfortunately, this new feature will not allow you to easily react with emojis to comments written in a Google Doc. Still, if you don’t mind the extra work, you can do so by copying an emoji – not the written translation of the characters, but a real emoji like this 👋 – and pasting it in reply to a comment. Google Docs will read it and display it correctly so your colleagues know when you think something in the document is 🔥 or 💩.

Camden County Rebreather | Camden County, New Jersey


From cell phones and laptops to power tools and electric vehicles, rechargeable lithium-ion batteries are becoming more and more prevalent in our lives. By 2025, the global lithium battery market is estimated to exceed $100 billion.

Although rechargeable lithium batteries are recyclable, care must be taken to do so correctly. Batteries of any kind should never be placed in curbside recycling containers as they have caused fires and in some cases destroyed recycling facilities. These batteries burn at extremely high temperatures, making them dangerous to people and property. Fortunately, there are several free and convenient ways to safely recycle them.

One way is to take them to places that participate in a targeted battery recycling program, like Home Depot, Lowes, and Staples. Nationwide, most retailers with battery drop-off stations receive their containers from Call2Recycle, a non-profit organization. New Jersey Counties recently partnered with Call2Recycle to produce a statewide battery awareness campaign for its residents. The Avoid the Spark NJ Campaign has its own website where residents can find convenient drop-off locations and learn more about proper battery safety and identification (see links at the bottom of this article).

Another option is to take them to a municipal electronics recycling site. Many cities accept rechargeable lithium batteries for free if connected to an electronic device or power tool, such as laptops, cell phones, and cordless drills. Many municipalities in Camden County often sponsor electronics recycling collection programs throughout the year. Contact your local public works department for your municipality’s e-waste recycling guidelines.

A third option is to take the batteries attached to electronic devices to a state-licensed e-waste recycling facility, such as Magnum Computer Recycling in Pennsauken.
(856) 333-0991 or Tab Shredding Inc. in Berlin (856) 768-4402. Tab Shredding charges a fee. It is advisable to make an appointment before dropping off items.

Finally, residents can bring all rechargeable batteries and single-use lithium batteries to one of the county’s household hazardous waste collection events. Please note that only loose batteries are accepted at these events – electronic devices are not accepted. See page 8 for the 2022 Fundraising Events Calendar.

Camden County Commissioner and Environmental Affairs Division Liaison Jefferey Nash stressed the importance of proper recycling. “With the proliferation of lithium batteries in our society, it is imperative that they are handled responsibly and safely. The consequences of not disposing of these items properly can create undue risks for our community and harm the health and well-being of our residents. The Board of Commissioners encourages all residents to use one of the many convenient recycling sites around the county for these and all rechargeable batteries.”

To learn more about the proper handling of all battery types and to find convenient drop-off locations near you, visit: call2recycle.org/avoid-the-spark-nj or CamdenCounty.com/LithiumBatteries.

County Takes Steps to Improve Convenience of Electronics Recycling Programs and Document Shredding Events

Prior to the pandemic, county electronics collection events routinely lost participation to more convenient municipal collection/drop-off programs and local businesses that accept e-waste. Many of these drop-off programs are open to the public year-round, providing a convenient opportunity to recycle e-waste. Magnum Computer Recycling in Pennsauken is one of the local companies offering free and convenient e-waste disposal services.

Along the same lines, the county is working to improve its shredding events by reducing the long lines and wait times caused by the hundreds of residents converging at one location. To achieve this, a more localized model similar to e-waste disposal was adopted.

One of the county’s approaches to making recycling and disposal programs more convenient for its residents was to use funding from the State Recycling Enhancement Act (REA) grant to establish a sponsorship program for municipalities that accepted to organize their own shredding events. In 2021, this enabled residents to destroy sensitive documents locally while saving time, fuel and protecting the environment. Municipalities that participated in this county-sponsored program received up to $1,000 to fund a local shredding event. Small towns that opted for joint shredding events with neighboring towns were also eligible for funding of up to $1,000.

A total of nine municipalities took advantage of this sponsorship program and generated 73,406 pounds of shredded paper for recycling. Building on this first-year success, the county will again offer sponsorship for shredding events to interested municipalities in 2022.

Along with the municipality’s efforts, the county plans to host a county-wide shredding event this year on June 4 at the Woodcrest PATCO High Speedline station in Cherry Hill from 9 a.m. to 2 p.m.

Reduce your carbon footprint at home with home composting!

Although all organic matter breaks down over time, there are simple steps you can take at home to effectively speed up the process. The homemade compost you produce can then be used to feed your plants, garden and more around your property.

Step 1
Buy or build a bin about 1 cubic yard (3 ft x 3 ft x 3 ft) or use an open space in your yard without a bin. The size of the pan/area is important to get the right temperature to aid in the decomposition process. If the bin/pile is too small, it will not generate enough heat to support the microbial activity essential for decomposition. If the bin/area is too large, it will not allow enough air to reach the microbes in the center.

2nd step
Mix the two-part brown material (leaves, straw, small twigs,
etc.) with one-component green material (grass clippings, vegetable scraps, etc.). This 2:1 ratio provides the best mix of carbon (leaves) and nitrogen (grass) to promote optimal decomposition. Materials such as kitchen scraps or twigs will decompose faster with increased surface area, so break them into smaller pieces when possible. Also, to avoid unpleasant odors and vermin, never put red meat or poultry in your composter. Check out the lists below for things you can add to your compost, as well as things you should avoid.

Items you CAN compost

• Grass clippings • Weeds
• Vegetables
• Leftover fruit
• Coffee grounds and filters • Tea bags
• Eggshells

• Dead leaves • Hay or straw • Corn stalks
• Sawdust
• Dried and brown grass clippings • Newspaper*
• Cardboard soiled with food*
*Grate and add in small amounts

Items you should not compost at home

• Grease or oil
• Dead animals
• Sick plants
• Fat food
• Any meat or bones
• Human and/or domestic animal waste • Treated wood
• Coal
• Plants treated with pesticides • Weeds with seeds

Step 3
Water your bin/pile as needed to maintain a moisture level similar to that of a wrung out sponge.

Step 4
Compost needs air to decompose. Turning the compost makes it easier to break down the materials and helps prevent potential odors.

Step 5
When the compost is complete, it should look and smell like rich soil. This means it is ready to use for your garden, flower beds, potted plants and lawn.

$LAPSUS leaks show group stole 30,000 T-Mobile source code repositories: Krebs


According to a new moving report by freelance investigative journalist Brian Krebs, who was leaked the LAPSUS$ group’s internal Telegram group messages by a disgruntled former associate. T-Mobile has now admitted the violation.

“The messages reveal that whenever LAPSUS$ was cut off from a T-Mobile employee’s account – either because the employee was trying to log in or change their password – they would just find or buy another set of T-Mobile VPN credentialsKrebs wrote on April 22. The veteran security reporter suggested this week that the ease with which LAPSUS$ can buy access from dark websites means companies should scrape them regularly.

“AYou can access dark web bot shops like Russian Market and Genesis, which means big companies would probably have to pay someone to take down these criminal bot services on a regular basis, or even buy out their own employee credentials to remove these vulnerable systems from the market,” he noted in his own writing.

“Because it’s probably the easiest and cheapest solution money can buy.”

T-Mobile, which reported $58.4 billion in revenue for the year 2021, was also devastatingly hacked in August 2021, with the data of 40 million customers stolen in an incident that its CEO describe as “humiliating”.

T-Mobile CEO Mike Sievert said in August 2021 following the breach that the telecommunications company was entering into “long-term partnerships with leading cybersecurity experts Mandiant and consulting firm KPMG”. as part of “a major one-year multi-investment to adopt best practices and transform our approach. »

The LAPSUS$ hackers then lost all of the stolen T-Mobile source code after storing it on an AWS server that was seized by the FBI – and failed to save the data (“RIP FBI seized my server,” one member wrote on Telegram in posts shared with Krebs in his report this weekend: “So much illegal shit. It’s filled with illegal shit.”)

Attempts to download again from T-Mobile failed, leaked chats surfaced after the access token they were using was revoked. The leader shrugs: “Cloning 30,000 deposits four times in 24 hours is not very normal.”

Krebs wrote: “Access to [T-Mobile] the company’s tools could give them [LAPSUS$] everything they needed to perform hassle-free”SIM exchanges” — reassign a target’s cell phone number to a device they controlled. These unauthorized sim swaps allow an attacker to intercept a target’s text messages and phone calls, including any links texted for password resets, or one-time codes sent for password resets. multi-factor authentication.

T-Mobile played down the consequences of the breach, telling Krebs, “Several weeks ago, our monitoring tools detected a bad actor using stolen credentials to gain access to internal systems that host tool software. operational. The systems accessed did not contain any customer or government or other similar sensitive information, and we have no evidence that the intruder was able to obtain anything of value.

The company, which has more than 75,000 employees, said: “Our systems and processes worked as intended, the intrusion was quickly stopped and closed, and the compromised credentials used became obsolete.”

Attackers appear t

‘Needs further scrutiny’: High Court allows Goa to appeal Tejpal’s acquittal | Latest India News


PANAJI: The Bombay High Court in Goa on Saturday allowed the state government’s request for leave to appeal against the acquittal of former Tehelka editor Tarun Tejpal in the 2013 rape case against him, saying the order “requires further review and reassessment.”

Tejpal was accused of raping a junior colleague in the elevator of a five-star hotel in Goa during the THINK festival in November 2013. He was acquitted by the fast-track court on May 21 last year due to lack of evidence sufficient.

An application for leave to appeal has been made to the High Court as required by law under the Code of Criminal Procedure which states that “no appeal…shall be entertained except with leave of the High Court”.

“We believe that further consideration and reassessment may be warranted of the evidence of the Respondent’s (Tejpal) SMS, WhatsApp and email messages sent to the victim…this evidence must be assessed in the context of corroboration of the victim’s testimony in the case,” ruled the bench of the High Court Division of Judges MS Sonak and RN Laddha.

“Based on this evidence, perhaps some of the Extra Sessions Judges’ findings on the victim’s conduct may also require reconsideration. The inference of the victim’s conduct to consult with certain attorneys before filing his complaint may also require revisiting Finally, the assertion regarding the alleged confessions in the messages or the appropriate scope of such statements should also be considered… At this point, we might have preferred to record only a prima facie case facie has been established and arguable issues arise in the matter,” the high court added.

“At this stage, if the evidence on file reveals the need for further consideration and reassessment, review or reconsideration of the evidence, the Court of Appeal must grant the requested leave and rule on the merits of the appeal,” the High Court said.

Tejpal, through his lawyer Amit Desai, objected to the request claiming that due process was not followed, noting in particular the fact that the appeal was filed even before a certified true copy of the order was made available to the Crown, which he argued was evidence of non-enforcement. of mind when filing the appeal. In the present case, the judgment and the order under appeal were indeed pronounced on 21.05.2021, and even before its copy could be obtained, the appeal decision was taken on 24.05.2021, He specifies.

The High Court, however, rejected this claim.

“Based on the evidence on record, we do not believe that any case is established to infer non-enforcement of the spirit rendering such a decision void. While valid in certain circumstances, the assertion about haste and inference of non-application of the spirit cannot be mechanically drawn in all events and for all purposes,” the High Court said.

“A series of considerations are available to the state government in deciding whether or not to appeal an order of acquittal. A state government may legitimately harbor the perception that such an acquittal must be tested in the high court. Second, he may legitimately be under the impression that there was clear and compelling evidence in the record, on the basis of which no acquittal was possible. Third, the state government may legitimately feel that the Court of Sessions may not have properly assessed the law, particularly with respect to the burden of proof or the credibility of the testimony of ‘a victim. Finally, the state could have legitimately entertained the perception that such a decision was necessary to protect the identity of the victim,” the High Court said.

“…it is also possible that such a decision may, in a given case, be motivated by extraneous or even dishonest considerations. None were at least suggested during the arguments. But then all of that can certainly be considered when the court judicially considers the leave application,” the court noted.

The complainant alleged that Tejpal raped her in a hotel elevator on November 7, 2013, and attempted to assault her again on November 8.

In her ruling, the fast-track court judge gave Tejpal, who faces charges under Sections 376 (rape), 354A (sexual harassment), 354B (criminal assault with intent to undress a woman), 341 ( undue hardship) and 342 (undue hardship). detention) of the Indian Penal Code, the benefit of the doubt while acquitting him.

Earlier, the Bombay High Court in Goa rejected Tejpal’s request for a closed hearing of his appeal.

Rutgers fan can’t wait to see Wimsatt, quarterback competition in Scarlet-White game


April showers bring Mayflowers and more Gavin Wimsatt talk fans of the Rutgers quarterback can’t wait to see.

Hours before the Scarlet-White game kicked off on Friday, fans expressed their excitement to see the budding freshman quarterback and how the caller’s situation is developing ahead of the season opener. Rutgers at Boston College on September 3.

“I would love to see what it has to offer,” said Marc Kollar, one of the mainstays of the Knight Jitney tailgate, which is moving into the Scarlet Lot. ” It is a work in progress. I’m not looking for Tom Brady. Let’s put it this way.

“I want to see consistent growth,” added Kollar.

The quarter hall until spring training remains a three-way race. After starting the last two seasons, Noah Vedral returns as the starter while Wimsatt and second Evan Simon have separate reps. Coach Greg Schiano said the group “did a good job” and all quarterbacks “improved” in spring training.

Wimsatt signed to Rutgers earlier than expected last season. The Kentucky native played in four games but made no appearances at SHI Stadium. Fans will get their first in-person glimpse of Rutgers’ highest-ranked quarterback rookie in school history tonight.

Asked about his preference behind centre, Yefim Vexler said Wimsatt “should be the call”.

“They’re going to do all the smoke and mirrors all offseason, but purely from a talent standpoint, I think he (Wimsatt) has to be the call,” said Vexler, 30, and a Rutgers alum.

His friend Frank Virgili, 31, agreed.

“I agree that Gavin should be the pick and will be the pick, but they’re going to dance with the quarterback situation,” Virgili said. “And that’s what they should be doing. Why would you show your hand so soon?

When the Scarlet-White match begins, Vedral will play for both teams. Wimsatt will play for the Scarlet team. Simon will be on the White side. Will any of the three do enough to make a first impression on fans?

Derek Lynn provided his pre-kickoff assessment?

“We kind of know what Vedral can do,” Lynn said. “He seems to like a good type of locker room and leader. I think Wimsatt has more talent and can be a good double threat, that’s what we need. I can’t wait to see what he can do. »

Thank you for counting on us to deliver journalism you can trust. Please consider supporting us with a subscription.

Patrick Lanni can be reached at [email protected].

Shanghai’s covid lockdown messages circumvent China’s censorship regime

Placeholder while loading article actions

In recent weeks, social media posts from Shanghai have painted a dire picture of life under the Chinese government’s lockdown. To mitigate the spread of the coronavirus, residents have been trapped in their homes, while others are stuck in temporary quarantine centers, unsure when they will be released.

The posts, mostly via Chinese blogging service Weibo and Meta-owned messaging service WeChat, describe loved ones dying after receiving improper care and people hungry amid food shortages. Although the government has responded with denials over the food and medical issues, the outcry has increased pressure on the Chinese Communist Party to address the claims of its citizens.

China has one of the most sophisticated censorship programs in the world, but it has been unable to contain the fury within its borders. It’s unclear exactly how people evade strict censorship protocols to share videos of life in Shanghai and the question remains whether China’s censorship regime will eventually stifle dissent.

Shanghai covid headquarters: food shortages, talking robots, hungry animals

For more, The Washington Post spoke with Yaqiu Wang, senior China researcher at Human Rights Watch, who spent the first 22 years of her life in China and dedicated her career to investigating the censorship of Internet in the country.

“Journalists have often asked me this question. You know, “Is this the tipping point?” Wang said of Chinese dissent on the internet. “It’s happened so many times before… There’s always this uproar. But the government always steps in and contains the situation.”

This interview has been edited for length and clarity.

What kinds of social media content are we seeing coming out of Shanghai?

People just tell their stories because they are in so much pain. Some talk about my mother dying because she couldn’t get to the hospital for her kidney dialysis. People talk about my dad dying because he couldn’t be admitted to the hospital because he didn’t have a negative COVID test result. People say they have no food. There are so many such stories.

Isn’t China’s censorship regime strict? How can people share these things?

Often when a post goes viral, it’s usually overnight. There are fewer content moderators doing their job. It’s usually those times when these things go viral, and then the next day when it’s 8am, the sensors kick in to start cleaning the internet.

Also, people are doing clever things to try to send a message. People try to reference other things, like movie titles and ironic uses of words, to imply things the government would find sensitive. Of course, the sensors get into it later, and then start censoring what’s new. Then the next thing comes to imply a criticism of the government. It’s almost like a game of cat and mouse.

How does the Chinese censorship regime work?

Suppose I live in Shanghai. If you use certain keywords that are already banned, you simply cannot publish the message. Even if you successfully post a story about yourself, sometimes no one else can see it. Or maybe your own followers can see it, but people who don’t follow you can’t see it. So there are all these ways companies can manipulate who can see a post.

Also, the government periodically gives orders to social media companies saying you know, these keywords are wrong, you need to censor them. But they don’t give precise instructions and not this rule: you must censor. Companies must therefore develop their own words or phrases to censor after taking the government’s broad guidelines.

Shanghai fashionistas face covid lockdown with lipstick, Louis Vuitton

And companies know that if you exist in the Chinese political system, to survive I have to make sure to censor my users long before the government can punish me later. So they need to do a good job of proactively censoring platforms.

In addition, everyone who has an account on Weibo and WeChat must use their real name to register, you can’t do without it. And WeChat is a great app. You use WeChat for social media, for messaging, for food delivery, for taxis, for financial transactions. So if you say something wrong and your account gets suspended then it affects your whole life as the app is also used for many other things. People get the message. They practice self-censorship.

So, with all these lockdown messages coming to light, will China shut down the internet?

I do not think so. The country is quite sophisticated. In no way do I think the government feels the internet is out of control. Sometimes you see it from the outside: people get up. People are very angry. But, you know, I don’t think the government thinks it’s out of control. They perfected censorship.

Journalists have often asked me this question. You know, ‘Is this the tipping point?’ It’s happened so many times before, when there’s a natural disaster, when there’s a big public health issue, a train crash. There is always this tumult.

China’s ‘zero covid’ policy falters as infections spread and complaints about lockdowns rise

But the government always intervenes and contains the situation. They can use very physical, old-fashioned and effective means to enforce the law. Arrest people, put them in jail. The other is the more subtle ways of censoring or deleting posts, or making a post invisible to others.

But if the government wanted to shut down the internet, it could. In Xinjiang, in 2009, there was a huge and violent clash between the Han people and the Uyghurs. They shut down the internet for three months. But I don’t think there’s been this kind of complete internet shutdown since then, mostly because I don’t think it’s necessary anymore.

Moreover, China will hold a Party Congress later this year. It is a very important event. It is extremely unlikely to have any changes before then. Now is not the time for creative methods to change anything. They don’t want to tolerate any type of change, they want to make sure everything is fine.

Shanghai is a leading Chinese city. Does this make it harder to crack down on social media posts?

Absolutely. Shanghai is the financial center of China. Personalities live there. They have more on. It’s easier for their message to go viral. Also, foreign correspondents and foreigners also live there. They have connections outside of China, so they can get the message out to the rest of the world.

And the lockdown isn’t just happening in Shanghai right now, there are many other cities. You don’t hear much about them because the important people don’t live there. It is very difficult for regular residents to go viral.

Rbi publishes new guidelines for credit and debit cards. Highlights


Card issuers are banks that issue debit or credit cards and NBFCs that have been authorized by RBI to issue credit cards in India.

A credit card is a physical or virtual payment instrument containing a means of identification, issued with a pre-approved revolving credit limit, which can be used to purchase goods and services or withdraw cash advances, subject to the terms prescribed.

For credit card business, Regular Commercial Banks (SCBs) other than Regional Rural Banks (RRBs) with a net worth of 100 crore and above are now allowed to undertake credit card business either independently or under a tie-up agreement with other card issuing banks/NBFCs with the approval of their boards. To set up separate subsidiaries to undertake credit card business, these banks will need prior approval from the Reserve Bank.

Meanwhile, RRBs are allowed to issue credit cards in conjunction with their sponsor bank or other banks.

To issue credit cards, issuers are required to provide a one-page key information statement with the credit card application containing important aspects of the card such as interest rate and fee amount, among others. In the event of a rejection of a credit card application, the card issuer must communicate in writing the specific reason(s) which led to the rejection of the application.

In addition, RBI directs card issuers to consider introducing, at customers’ option, insurance coverage to cover liabilities arising from loss of cards, card fraud, etc. For those offering card issuance in partnership with insurance companies, card issuers are required to obtain express written or digital consent from cardholders and contact details of the nominee(s). ).

To ensure card protection, issuers are encouraged to ask the cardholder for one-time password (OTP)-based consent for activation of a credit card if the card has not has not been activated by the customer for more than 30 days from the date of issue. . If no consent is received for card activation, card issuers will close the credit card account at no cost to the customer within seven business days from the date of the customer’s confirmation request.

For a renewed or replaced card, the closure of an inactivated card is subject to payment of all fees by the cardholder.

No card issuer should report credit information relating to a new credit card account to credit reporting companies prior to card activation. Any credit information relating to these inactivated credit cards already reported to these companies will then be removed immediately and it will take no longer than 30 days from the effective date of these instructions.

Among the underwriting standards, card issuers are required to provide full transparency in the conversion of credit card transactions into equivalent monthly installments (EMI) by clearly indicating the principal, interest and initial discount provided by the merchant. /card issuer (to make it free of charge), before conversion. The same should also be shown separately on the invoice/credit card statement. Conversion of EMI with an interest component should not be camouflaged as interest-free/no-charge EMI.

Such issuers shall ensure that loans offered by credit cards comply with instructions on loans and advances issued by the Reserve Bank from time to time.

In addition, issuers are required to ensure that the credit limit as approved and notified to the cardholder is not exceeded at any time without requesting the cardholder’s express consent.

Card issuers are authorized to issue credit/debit cards to individuals for personal use, as well as additional cards where applicable. These cards can also be linked to overdraft accounts. Also, business credit cards are permitted to be issued to business entities/individuals for business expenses.

Additionally, RBI directs that supplemental cards be issued with a clear understanding that the liability will be that of the primary cardholder. Similarly, when issuing corporate credit cards, the responsibilities and obligations of the company and its employees should be specified. The liability of the company/business entity must be part of its assessed credits.

For credit card closure, any request must be honored within seven business days by the credit card issuer, subject to payment of all fees by the cardholder. After a credit card is closed, the cardholder is immediately informed of the closure by e-mail, SMS, etc.

Failure by card issuers to complete the closing process within seven business days will result in a penalty of 500 per day overdue payable to client, until account closed provided there is no outstanding balance on account, directed by RBI.

Additionally, RBI directs that if a credit card has not been used for more than a year, the process of closing the card must be initiated after notifying the cardholder. In the absence of a response from the cardholder within 30 days, the card account will be closed by the card issuer, subject to payment of all fees by the cardholder. Card account closure information must also be updated accordingly with the credit reporting company(ies) within 30 days.

According to RBI, interest charged on credit cards must be justifiable given the fees incurred and the magnitude of the return that the card issuer could reasonably expect. Issuers must also prescribe an interest rate cap in line with other unsecured lending, including processing and other fees, with respect to credit cards as part of their Board-approved policy. In the event that card issuers charge interest rates that vary based on the cardholder’s payment/default history, the collection of these differential interest rates should be transparent.

Additionally, RBI states that card issuers must quote annualized percentage rates (APR) on credit cards for different situations such as retail purchases, balance transfer, cash advances, non-payment of minimum amount due, late payment, etc., if different.

“Card issuers must specify in the billing statement, the level of the unpaid amount of the bill, i.e. partial payment beyond the “minimum amount due, at which the benefits of the credit period without interest would not be available to cardholders,” RBI said in the guidelines.

Meanwhile, RBI is asking card issuers to make fee changes with prospective effect by giving at least one month’s notice. If a Cardholder wishes to return their Card due to a change in charges to their detriment, they are entitled to do so without charging any additional charge for such closure, subject to payment of all dues by the Cardholder . .

“There will be no hidden charges when issuing free credit cards,” said RBI for Credit Cards.

When it comes to collecting dues, card issuers must ensure that they and their agents follow existing guidelines on the code of fair practices for lenders, RBI said.

RBI mentioned that card issuers should ensure they comply with the existing guidelines regarding the engagement of debt collectors issued by the Reserve Bank, as amended from time to time.

RBI strictly prohibits card issuers/their agents from using intimidation or harassment of any kind, verbal or physical, against any person in their debt collection efforts, including acts intended to publicly humiliate or to interfere in the privacy of credit card holders. family members, referees and friends, by making threatening and anonymous calls or making false and misleading statements.

Here are the guidelines for debit cards according to the RBI circular:

1. Banks are required to formulate a comprehensive policy for issuing debit cards with the approval of their boards of directors and to issue debit cards to their customers in accordance with this policy. Prior Reserve Bank approval is not required for banks wishing to issue debit cards to their customers.

2. Debit cards will only be issued to customers with savings/current bank accounts.

3. No bank will issue debit cards to cash credit/loan account holders. However, this will not prevent banks from linking the overdraft facility provided with Pradhan Mantri Jan Dhan Yojana accounts to a debit card.

4. Banks should not force a customer to use the debit card facility and should not link the issuance of a debit card to the use of any other bank facility.

5. SCBs may issue other form factors instead of a plastic debit card, such as handheld devices, after obtaining explicit consent from the customer.

6. Form factors issued in lieu of a debit card are subject to the specific and general guidelines applicable to debit cards.

7. Banks should provide options to disable or block the form factor through mobile banking, internet banking, SMS, IVR or any other mode.

8. Banks must submit a detailed report to the Regulatory Department, Reserve Bank of India, prior to the publication of these form factors. Any bank that has already issued such a product before the effective date of the General Directorate must submit a detailed report to the Regulatory Department within 30 days of the effective date.

9. Banks undertake a review of their debit card operations/issuance on a semi-annual basis. The review will include, among other things, an analysis of card usage, including cards not used for long periods of time and the risks inherent therein.

A debit card is a physical or virtual payment instrument containing a means of identification, linked to a savings bank/current account which can be used to withdraw money, make online payments, transact with POS terminal/quick response (QR) code, transfer funds, etc. subject to the prescribed conditions.

To subscribe to Mint Bulletins

* Enter a valid email

* Thank you for subscribing to our newsletter.

Keven Moore: Try these cybersecurity tips to protect sensitive business information when using public Wi-Fi


There was a time early in my career when I could leave home and go on a business trip leaving my job behind while traveling on a plane, only to land and have my pager ring, forcing me to run to a public telephone nearby to catch up with your work problems.

Phone booths are a thing of the past. In fact, if you want a good laugh, try showing a picture of a payphone to a Gen Z’er and ask him what is it?

(Image from Wikimedia Commons)

Today, we are all interconnected, whether by cell phone, email, text or social media, and reachable 24/7, even when traveling at 30,000 feet. Travel security used to mean securing your purse or wallet, or your credit card, avoiding sleazy motels and crime infested areas. It is still important. But traveling safely today also means protecting yourself when using public Wi-Fi.

When I think back to the number of times I’ve jumped on a computer in a hotel business center without an ounce of concern, it gives me chills. I didn’t realize at the time that hackers could have used malware to steal my password after logging into my work email or checking the balance in one of my bank accounts.

Today, you need to protect your computer, tablet or mobile device like your online passport. You would never leave your passport or wallet lying around the lobby of a restaurant, airport or hotel to allow others to access your personal information. But by using an unsecured public Wi-Fi network while traveling, you could expose data that could make your online accounts vulnerable and put you at risk of identity theft.

Now more than ever, organizations face heightened cybersecurity risks when their employees travel for business. Business travelers are prime targets for cybercriminals because they often carry valuable data and don’t always pay attention to securing their devices.

Laptops, smartphones and tablets of business travelers are particularly vulnerable to data breaches, loss and theft. According to a study by Morning Consult on behalf of IBM Security, more than 1 in 7 travelers have had their personal information stolen while on the road or abroad.

Hotel lobbies with public wifi are a prime location for hackers looking for soft targets (Photo by Wikimedia Commons)

Among the common cyber threats that business travelers may face are publicly accessible hotel computers – 64% of business travelers have used their login credentials to access accounts on public and hotel computers. Public computers often lack sufficient security capabilities and can be infected with malware just waiting to steal your information. Hotels specialize in hospitality, not information security.

Remember that there is no guarantee that the person who set up the business center or hotel Wi-Fi system actually installed, activated and updated the security features. It’s not their information they’re protecting, and they have no interest in protecting your information.

Hackers are finding innovative ways to gain unauthorized access to personal information or company data. However, one of the easiest ways to do this is to use an unsecured Wi-Fi network. According to IBM X-Force Incident Response and Intelligence Services (IRIS), 84% of business travelers connect to public Wi-Fi networks. Although convenient, public Wi-Fi networks are insecure and can allow cybercriminals to gain easier access to connected devices – as well as the data stored on them – than private Wi-Fi networks.

When a Wi-Fi hotspot is unsecured, it means that the data you transmit or receive is not protected. Anyone on the same network could spy on your information if they have the know-how. If you decide to use free public Wi-Fi, be careful about the types of sites you visit. It is best not to connect to sites that require a password.

Keven Moore works in risk management services. He holds a bachelor’s degree from the University of Kentucky, a master’s degree from Eastern Kentucky University, and more than 25 years of experience in the security and insurance industry. He is also an expert witness. He lives in Lexington with his family and works both in Lexington and Northern Kentucky. Keven can be reached at [email protected]

The theft or loss of your electronic devices is a major threat for business travelers, as it can lead to the exposure of important data. Devices can be lost or stolen from airports, hotel lobbies, conference rooms or rental cars.

Neglecting cybersecurity when employees are on the road or abroad can be detrimental and costly for any business or organization. The cost of data breaches is rising rapidly, increasing by 10% year over year according to the CyberSecurity Ventures 2021 report. According to the latest Data Breach Report from IBM and the Ponemon Institute, the cost of a data breach in 2021 is US$4.24 million, a 10% increase from the average cost in 2019 which was $3.86 million.

Here are some countermeasures employers can implement to minimize cybersecurity risks for business travelers:

Establish Wi-Fi policies. Above all, employers should implement policies requiring employees to confirm network name and specific connection procedures with appropriate personnel before connecting to public Wi-Fi networks at airports or hotels. Sensitive activities, such as banking or confidential work-related projects, should not be conducted on public Wi-Fi networks. Employers should provide periodic refresher training to their employees. Auto-connect should also be disabled so that devices do not automatically connect to Wi-Fi networks.

Organize training on the physical security of digital valuables. Most travelers let their guard down once they arrive at their destination, but this can be one of the times when they are most vulnerable to theft. Employers should encourage business travelers never to leave their devices unattended. Employees should also be instructed to use strong passwords or multi-factor authentication capabilities, where possible, and to lock devices in hotel safes when leaving their rooms.

Exchange passwords. Encourage your employees to change their passwords before travelling. If someone needs to log into accounts with sensitive information – like social media, bank accounts, or email accounts – ask them to change to a new complex password before leaving, then ask- him to change it again when you get home.

Enforce the use of virtual private network (VPN). Through a VPN, all online traffic is routed through an encrypted virtual tunnel. Such a network reduces the risk of cyberattacks by establishing a secure connection between users and the Internet. Employers should create VPNs and require employees to use these networks whenever possible, especially when traveling for business.

Encourage employees to pack a minimum of devices. Leaving unnecessary technology at home can help reduce the risk of data theft or loss. Thus, employers should only allow employees to bring devices that are essential to performing their duties on the road or abroad.

Requires regular software updates. Cybercriminals usually look for security holes in outdated software. Updates are sent to fix software flaws and reduce the risk of attack from cybercriminals. Employees should be required to regularly update the software on all their devices.

Establish response plans. Employers must have specific response plans that outline the actions to be taken when devices containing confidential information are compromised, lost or stolen on the road and abroad. Business travelers often carry sensitive personal and business data on various electronic devices, making them vulnerable to cyberattacks. It is important to stay on your guard when traveling to best protect your personal and professional life safely.

Remember, there are hundreds, if not thousands, of hackers who want to shop with your credit cards.

Be safe my friends!

NFL players bond with service members on first NFL-USO tour since pandemic-forced hiatus


The purpose of the trip was to see and learn an assortment of basic activities, including unit tours, K-9 training, and one-on-one meetings for mission briefings. Players also spent time with service members and their families. Additionally, they connected virtually with military personnel in Germany and Poland, which was a “humiliating experience” for Moore.

“I held back an appreciation for our military because that’s something I didn’t know much about before this trip,” Moore added. “I have so much respect for people who risk their lives to give us our freedom, whether they’re in combat or not.”

What has perhaps stood out to players the most is the passion and attention to detail behind each task – much like what happens in any game on a Sunday afternoon. ‘fall. Players and service men and women connected on this common point.

Beck had a different way of relating to the kids who attended the football clinic he attended midweek.

“Growing up around the military definitely gives me a unique perspective,” he said. “I remember moving around a lot and, especially in terms of football, thinking, ‘How am I going to be recruited?’ My dad was adamant that if I worked hard and did my part, the coaches and scouts would come to me, and luckily it worked. But that’s the message I try to get across to the kids, that just because your life might be different because you’re on base or away, your dreams are still possible. I was in their shoes.

Like Beck, Felton and Moore were able to create their own connections to the military. The Colts’ sixth-grade corner befriended Ricky, an Air Force member wearing a Colts hoodie.

“We were about to leave for the day, and he came to the van. I could see his enthusiasm, and I wanted him to feel comfortable and show him the love and support he has. showed me as a Colts fan,” Moore recalled. , who gave Ricky his hat and signed a soccer ball. “For me, I’m just a kid from a small town in Georgia, so I’m not used to people reacting that way when they meet me. It was cool to have that moment with Ricky. We’ve been keeping in touch via social media, and I’m hoping I can bring him to a Colts game, so I can show my appreciation, and he can see the game-day production in person. “

Although the USO tour only lasted a few days, it seemed clear that the memories and mutual respect shared between the players and those on the base will last a lifetime. As the players recounted, it was a unique and eye-opening experience that forever connected Beck, Felton, and Moore to servicemen and women and their families living in Alaska.

Reflecting on the trip, Beck summed it up like this:

“Their resilience is incredible.”

New Bioengineered Food Disclosure Rule



As of January 1, 2022, certain retailers, manufacturers, and importers are required to disclose the presence of foods derived from biotechnology and foods containing ingredients derived from biotechnology on products labeled for retail sale in the United States.

In a minute or less, here’s what you need to know about the National Bioengineered Food Disclosure Standard (NBFDS or Standard) and the implications of these new federal regulations.

What are bio-engineered foods?

The NBFDS defines bioengineered foods as those that contain detectable genetic material that has been modified by certain laboratory techniques and cannot be created by conventional breeding or found in nature.

To help regulated entities decide whether to make a disclosure, the United States Department of Agriculture (USDA) has developed a non-exhaustive “List of Bioengineered Foods”, which includes familiar foods such as as corn, canola and cotton. However, even if a food or ingredient is not on the list, disclosure is still required if the manufacturer actually knows the food is bioengineered.

Who does the SNBFD apply to?

The standard applies to food manufacturers, importers and retailers who package and label food for retail or bulk sale. Certain foods and entities are exempt from the disclosure requirement: (i) restaurants and similar retail establishments; (ii) very small food industries (less than $2,500,000 in annual revenue); (iii) a food in which no ingredient intentionally contains a bioengineered substance, with a tolerance for the accidental or technically unavoidable presence of bioengineered material of up to 5% for each ingredient; and (iv) foods certified under the National Organic Program.

What are the main tasks?


The standard requires regulated entities to ensure that foods derived from biotechnology are disclosed appropriately. There are four types of bioengineered food disclosures: labeling text, symbol, electronic/digital link or quick response code, or text messaging phone number, each with their own specific requirements.

Record keeping

Regulated entities must keep records for at least two years after the date of sale or distribution. The Standard requires records to be kept if an entity’s food or ingredient is on the “List of Foods Derived from Biotechnology” or if the entity actually knows that the food is derived from biotechnology.

Enforcement measures for failure to disclose

The USDA has limited enforcement power against regulated entities that do not meet the standard. It does not have the authority to issue a recall or impose civil penalties or damages. It can, however, investigate complaints of non-compliance, audit a manufacturer’s records and publish its findings. The standard allows anyone who suspects a violation of the standard to file a complaint with the USDA.

Although the Standard prevents states from establishing conflicting disclosure laws for bioengineered foods, states may enact identical bioengineered food disclosure laws that impose liquidated damages and injunctive relief – remedies that are not otherwise available under the NBFDS. In fact, the standard’s pre-emption provision expressly states that it does not prejudge “any remedy created by state or federal statutory or common law.” 7 USC § 1639j.

Although the Standard does not provide an independent private right of action, companies that fail to comply with the Standard still face compliance risk from the threat of private action under state laws that adopt the Standard, as well as the consumer protection and misleading advertising laws described below.

Litigation Landscape

In addition to enforcement actions at the USDA, regulated entities that fail to comply with the standard can expect to be the target of lawsuits for misleading advertising. Plaintiffs’ counsel will argue that the failure to disclose the presence of bioengineered foods when required to do so is misleading to consumers, and that if the consumer had known the product was bioengineering, he wouldn’t have bought the product.

Although the NBFDS does not prohibit manufacturers from making claims about the absence of bioengineered foods (i.e. “non-bioengineered”), manufacturers who make such claims are nonetheless subject to prosecution for false advertising if the product contains genetically modified materials. In fact, courts have allowed similar lawsuits against manufacturers whose labels state “non-GMO” or “non-GMO” when the products actually contain ingredients derived from GM crops or animals raised with GM foods. .

An entity that fails to comply with the NBFDS can also expect to be sued by competitors under the Lanham Act or other state unfair competition laws for misrepresenting the nature and quality of the product in its advertising.

We anticipate the new standard will usher in a new wave of false advertising and unfair competition lawsuits.

Short Message Service (SMS) Firewall Market 2022 Strategic Analysis, Growth Drivers, Industry Trends, Demand and Future Opportunities to 2031


Focusing on the global Short Message Service (SMS) Firewall market and the expansion and general trends of the market for 2022-2030, Marketreports.info reports on the main elements and current trends of the market. There is projected revenue for the Short Message Service (SMS) firewall for the period 2022-2030 (2022 is used as the starting point and 2030 as the projection period). Additionally, the study provides the average growth rate (CAGR) for the projected period.

A comprehensive review of the global expansion of Short Message Service (SMS) Firewall has been conducted based on a unique study approach. These techniques help analysts present their findings in a coherent way by combining secondary information.

DOWNLOAD FREE SAMPLE REPORT: marketreports.info/sample/10888/Short Message Service (SMS) Firewall

Key Players Covered in the Global Short Message Service (SMS) Firewall Market Report:

China Mobile, Global Wavenet Limited, BICS, SAP SE, China Unicom, Tata Communications Limited, Syniverse Technologies, iBasis (Tofane Global), Infobip, Tango Telecom, AMD Telecom, Omobio, Mobileum, Anam Technologies, Openmind Networks, NewNet Communication Technologies, Route Mobile Limited, Symsoft, NTT DOCOMO, Mahindra Comviva, Cellusys, Cloudmark, HAUD, Monty Mobile

The segments covered in the report are:

By Type – Application to Person (A2P) Messaging – Person to Application (P2A) Messaging By Application – BFSI – Entertainment – Tourism – Retail – Healthcare – Other

Company social media statistics, regulatory filings and investor presentations are among the credible sources of the Short Message Service (SMS) Firewall study cited by the professionals. Also included are state publications and administrative databases, including industry professional documents in the National Market Research for the Short Message Service (SMS) Firewall Study.

Short Message Service (SMS) Firewall research is based on important industry regions including

North America (United States, Canada and Mexico)

Europe (Germany, France, UK, Russia, Italy and Rest of Europe)

Asia-Pacific (China, Japan, Korea, India, Southeast Asia and Australia)

South America (Brazil, Argentina, Colombia and rest of South America)

Middle East and Africa (Saudi Arabia, United Arab Emirates, Egypt, South Africa and Rest of Middle East and Africa)

ACCESS FULL REPORT: marketreports.info/industry-report/10888/Short Message Service (SMS) Firewall

For a better understanding of its positioning as a brand, key market players have been identified and specified. In this report, prominent market players discuss reputation as a business, technology trends, financial condition and SWOT analysis.

Free Customization of Short Message Service (SMS) Firewall Report:

This report can be customized to meet customer requirements. Please connect with our sales team ([email protected]), who will ensure that you get a report that meets your needs. You can also get in touch with our executives to share your research needs.

About Us

Marketreports.info is a global provider of market research and advisory services specializing in offering a wide range of business solutions to its clients, including market research reports, primary and secondary research, demand forecasting services, focus group analytics and other services. We understand how important data is in today’s competitive environment and so we have partnered with industry leading research providers who are constantly working to meet the ever-increasing demand for research reports. market throughout the year.

Contact us:

Carl Allison (Business Development Manager)

Tiensestraat 32/0302,3000 Leuven, Belgium.

Market reports

phone: +44 141 628 5998

Email: [email protected]

Website: www.marketreports.info

IHG Hotels selects Kipsu’s digital messaging solution


IHG Hotels & Resorts selected Kipsu’s digital messaging solution to drive guest engagement, increase review scores and improve staff efficiency.
Many customers prefer to message the staff instead of going to the front desk or calling the front desk clerk. Kipsu enables hotel teams to deliver personalized service through digital channels, making guest inquiries simple for both guests and hotel colleagues.

IHG’s Kimpton brand has been using Kipsu’s offerings since 2015. “Kipsu has enhanced Kimpton’s customer services on-site and will certainly bring similar benefits to the broader IHG portfolio,” said Rachel Liao, Director of Customer Experience. at Kimpton Hotels & Restaurants.

Kipsu’s custom messaging solution integrates into key systems like Opera PMS and Quore and streamlines room operations. From the browser or Kipsu mobile app, teams can sync data, stay on top of high-priority requests, and save time while working at reception or moving around the property.

IHG hotels and resorts will benefit from preferred rates, custom integrations, dedicated customer support, and access to SMS text messaging and next-generation messaging channels like Apple Business Chat and Google Business Messaging.

“We see a great opportunity to support IHG Hotels in their guest satisfaction goals as well as increase team efficiency,” said Tom McGurran, SVP and General Manager of Hospitality at Kipsu.

How to apply and obtain an Aadhaar smart card; step by step process to raise the request using mobile number


Photo: iStock

Map of Adhar is a 12-digit unique identification number assigned to any resident of India by the central government. UIDAI manages the Aadhaar card and also stores and saves the applicant’s data and biometrics. It is used by various companies and government institutions for KYC verification and profile maintenance. Here is the step by step process to make applications using registered/unregistered and alternative mobile phone numbers to get Aadhaar PVC card-

How do I apply using the registered mobile number?

* Please visit https://uidai.gov.in or https://resident.uidai.gov.in

* Click on the “Order Aadhaar Card” service.

Related News

All About SBI YONO Insta Home Top-Up Loan

All About SBI YONO Insta Home Top-Up Loan

Binding PF-PAN account can record details of TDS verification and steps to be bound

The PF-PAN account binding can save TDS. Check the details and steps to create a link

* Enter your 12 digit (UID) or 16 digit Aadhaar number Virtual identification number (VID) or 28-digit registration ID.

* Enter the security code

* If you have TOTP, choose the option “I have TOTP” by checking the box otherwise Click on the “Request OTP” button.

* Enter OTP/TOTP received on registered mobile number.

* Click on the checkbox in front of “Terms and conditions”. (Note: Click on the hyperlink to see details).

* Click “Submit” button to complete OTP/TOTP verification.

* On the next screen, a preview of Aadhaar details will appear for the resident to check before placing the reprint order.

* Click on “Make a payment”. You will be redirected to the payment gateway page with payment options such as credit/debit card, online banking and UPI.

* After a successful payment, a receipt will be generated with a digital signature which can be downloaded by the resident in PDF format. The resident will also receive the service request number via SMS.

* Resident can track SRN status till sending Aadhaar Card on Check Aadhaar Card Status.

* SMS containing AWB number will also be sent once dispatched by DoP. The resident can track the status of the delivery by visiting the DoP website.

How do I apply using an unregistered/alternative mobile number?

* Please visit https://uidai.gov.in or https://resident.uidai.gov.in

* Click on the “Order Aadhaar Card” service.

* Enter your 12 digit Aadhaar number (UID) or 16 digit Virtual ID number (VID) or 28 digit Registration ID.

* Enter the security code

* Click on the checkbox “If you do not have a registered mobile number, please check the box“.

* Please enter an unregistered/alternative mobile number.

* Click “Send OTP”

* Click on the checkbox in front of “Terms and conditions”. (Note: Click on the hyperlink to see details).

* Click the “Submit” button to complete the OTP verification.

* No preview of Aadhaar details will be available.

* Click on “Make a payment”. You will be redirected to the payment gateway page with payment options such as credit/debit card, online banking and UPI.

* After a successful payment, a receipt will be generated with a digital signature which can be downloaded by the resident in PDF format. The resident will also receive the service request number via SMS.

* Resident can track SRN status till sending Aadhaar Card on Check Aadhaar Card Status.

* SMS containing AWB number will also be sent once dispatched by DoP. The resident can track the status of the delivery by visiting the DoP website. (Source- https://uidai.gov.in/)

Carrying the Good Friday message: dates and data from Olmsted


OLMSTED FALLS, Ohio — A somber mood spread through downtown Olmsted Falls on Friday as members of the community commemorated the last day of Jesus Christ’s life as a man.

A group of 80-100 people participated in the Stations of the Cross which started in front of St. Mary of the Falls Catholic Church, north towards the Charles A. Harding Covered Pedestrian Bridge and returned to the church.

Steve Hupp nails the particular intentions of the participants to the cross before the “body” of Jesus is placed on it at Olmsted Falls. (Joanne Berger DuMound, special for Cleveland.com)

It was the fifth year that the parish’s That Man Is You – TMIY – program has sponsored the walk, which has not taken place for the past two years due to Covid-19.

The group walked slowly, stopping, praying and singing on and along the 14 Stations of the Cross, which depict moments from Jesus’ journey to Calvary and then his burial. Men, women and children took turns carrying the cross, a crown of thorns, a whip and a veil on which was the image of the face of Christ. Police stopped traffic at the various intersections the group passed through, including the busy intersection of Columbia-Bagley Roads.

Reverend Ryan Cubera played the role of Jesus, including having his hands tied between the first and second stations as he stood before Pilate. He said the outdoor program was his “favorite” Holy Week activity.

men raise the cross on Good Friday

The body of Jesus is laid in place during the recitation of the 12th Station of the Cross at Olmsted Falls, Christ dies on the cross. (Joanne Berger DuMound, special for Cleveland.com)

“He was born from people. They developed it. They run it,” he said. “It’s a beautiful expression of sincere and deep faith.”

John Gangloff came with his wife, Angela, and his grandson, Trenton Smith, who lives in Pennsylvania. John and Angela live in North Royalton. John is not a parishioner of St. Mary of the Falls, but he is involved with the TMIY – That Man is You program. When he moved to the Cleveland area, he sought out a church with TMIY, a program he helped start in his former parish in Pennsylvania. He found it at Olmsted Falls. The program helps men cope with the pressures present in our current modern culture.

“He teaches men to lead their families, their parishes and their community,” John said. “It definitely got me more involved in my faith.”

The outdoor Stations of the Cross touched him personally.

group at a way of the cross

The crowd recites a short prayer at this Station of the Cross in Olmsted Falls before removing Jesus’ body and placing it in a burial cloth. (Joanne Berger DuMound, special for cleveland.com)

“As you walk, you live it. It was not the Roman soldiers who put him on the cross, but me, each of us by our sins. I am a sinner, although I try every day to be the best I can be,” he said. “It’s a nice way to end Lent.”

Very Happy Easter and Late Passover everyone. These celebrations are also a joyful way to welcome warmer weather – fingers crossed.

Model trains: The Olmsted Falls Depot & Model Railroad Museum holds its annual Spring Open House on April 23, 24, 30 and May 1 at the Olmsted Falls Depot.

The depot is the old city train station with its red caboose on Garfield Avenue. It has amazing “O”, “HO” and “N” layouts. Club members will be there to introduce you to the many trains you will see and see the progress the club has made on all the tracks. It will also offer raffle prizes and refreshments. Don’t forget to delve into the past with a visit to the caboose and historic landmark

Admission to the event is $5. Children are free.

Hours of operation are 11 a.m. to 8 p.m. on April 23 and April 30 and 11 a.m. to 4 p.m. on April 24 and May 1. If you want to check out his website, it’s olmstedfallsdepot.org/.

Sellers galore: Grace Church is hosting its first Mother’s Day Market on April 29-30.

The event will feature dozens of local artisans, raffle baskets, Mother’s Day photo ops, and children’s crafts and games that youth counselors and church teens will lead while you shop!

Grace Church is located at 6941 Columbia Road. Market hours are 5-9 p.m. on April 29 and 10 a.m.-5 p.m. on April 30.

Earth Day Celebration: The township of Olmsted will host its spring stage on April 23. The event is in conjunction with Earth Day with a theme of conservation, ecology, recycling and the environment. In fact, this year’s Earth Day theme is “Investing in Our Planet.”

The event is open to the Olmsted community.

Some of its activities include exhibitions; information from partners such as the Soil Water Conservation District, Solid Waste District, Northeast Ohio Regional Sewer District, Cleveland MetroParks, Olmsted Falls Garden Club, and Northeast Ohio Public Energy Council. There will be a Trash to Treasures craft table for the kids. Scouts will also have an activity for young people. Residents will receive a free sapling to plant. Various department staff will be available to speak and answer questions. Residents can view the Township Parks Initiative with the photos provided. CERT/VIPS will enroll residents in the Cuyahoga County Ready/Notify program. Attendees will receive gift bags, breakfast pizzas, donuts, fruit and refreshments, while supplies last.

It is also Community Shredding Day for those who bring in documents they want to dispose of safely. Please, no newspapers or magazines.

This free event runs from 9 a.m. to noon at the Township of Olmsted Administrative Offices, 7900 Fitch Road. Document shredding is next door at the service center.

Sale of plants: It’s time for the best plant sale in town.

The Olmsted Falls Garden Club will hold its annual perennial sale from 11 a.m. to 2 p.m. on May 1 behind the Olmsted Community Center.

You have the opportunity to buy online again until April 25th at olmstedfallsgardenclub.com. Buy a minimum of $25 and you shop a day earlier when you pick up your order on April 30.

As usual, club selections are locally grown and have plants and flowers for both sun and shade. We are talking about more than 100 varieties. They come from the gardens of club members or their friends. This is a healthy way to periodically divide perennials to ensure their good health.

New this year is a children’s tent that will offer crafts and special shopping opportunities for children. He’s never too young to garden.

To shop online, go to olmstedfallsgardenclub.com and click “shop”.

Fundraising for Meals on Wheels: You can help support Westlake Meals on Wheels by heading to Dean’s Greenhouse in Westlake. The non-profit organization serves Olmsted Falls, Olmsted Township, North Olmsted, Westlake and Bay Village.

The Greenhouse will donate 30% of your purchases from May 1 through June 15 to Westlake Meals on Wheels just by mentioning Meals on Wheels.

Dean’s Greenhouse is at 3984 Porter Road, just south of Center Ridge Road.

Heads up: Start saving your fabric items for the Olmsted Falls Music Association’s Fill the Truck event on May 21. She is once again partnering with Savers, who will remunerate the association based on the kilos of fabric items collected.

Acceptable items for this reader include clothing; shoes; accessories such as scarves, belts, handbags, book bags, fabric lunch boxes; sheets, curtains, drapes, towels, bedding and fabric. It will not accept household items, toys, books, or non-cloth items. You simply place them in a bag or box and bring them between 9 a.m. and 1 p.m. to the Falls-Lenox Elementary School parking lot.

It’s a great way to do your spring cleaning.

Information, please: To include news, information, honors or activities in Olmsted Falls and Olmsted Township, contact Joanne DuMound at [email protected]. She is also on Twitter, @JoanneDuMound. The online version of the section on cleveland.com/olmsted has direct links to many news articles.

How to Automatically Verify SMS with SMS Retriever API in Android 2022


This tutorial is about automatic SMS verification with SMS Retriever API on Android. We will do our best for you to understand this guide. I hope you will like this blog How to Automatically Check SMS with SMS Retriever API in Android. If your answer is yes, please share after reading this.

Check how to automatically verify SMS with SMS Retriever API in Android

With the SMS Retriever API, you can automatically perform customer verification via SMS in your Android app, without requiring the customer to manually enter verification codes and without asking for additional permissions from the app. The moment you implement automatic SMS verification in your application, the verification flow looks like this.

What is the SMS Recovery API?

SMS Retriever is an API that lets you verify users’ text messages without forcing them to enter verification codes. With this API, you can extract verification codes for your application. This is done without asking for full SMS read permissions. When the user’s device receives a message, Google Play Services checks the hash of the app. It then sends the text message to your application via the SMS Retriever API. The app then reads and extracts the code in the SMS message. This code is usually sent back to the server for verification.

SMS verification process

For mobile number verification, you need to implement the client side first. Then on the server side to complete the verification procedure. It usually sends the user’s phone number to the server that performs the verification. The server then sends an OTP (One Time Password) code to the phone number provided. The SMS Retriever API listens for an SMS containing an OTP code. Upon receiving the code, it sends it back to the server to complete the verification process.

Why use SMS AutoRecover API?

  • Google removed all apps that used CALL_LOG and READ_SMS permissions. This is because they violated user privacy. This led to apps with these permissions being removed from the Play Store on January 19, 2021.
  • It provides a smoother and easier user experience.

Create a new Android studio project

  • Create a new Android studio project

Add necessary dependencies

We will use the following.

  • Apache Commons: This library will help us extract the code from the SMS message.
  • Google Play Services API: This library contains the SMS Retrieval class.
  • EventBus: To listen to SMS received from the SMS Retrieval API, we will use a BroadcastReceiver. EventBus is a publisher/subscriber template library. We use it to communicate between our BroadcastReceiver and Activity classes.

Add them to the build.gradle file and sync the project:

Configure the XML layout for our project

We will create an EditText in this section. This edit text will display a unique code obtained from our SMS message.

Sending mobile number to server

In this step, you need to get the user’s phone number from EditText. Submit it to your verification server, which should return the one-time code. Since I don’t have a verification server yet, we won’t use this method in this article. We will send the SMS from another phone. The SMS will contain a four-digit code. This code will be extracted and displayed in the EditText we added in activity_main.xml. To perform SMS verification on a server, see SMS Verification on Server.

Get an instance of SmsRetriverClient

First we will get an instance of SmsRetrieverClient. This is followed by calling the initSmsRetriever instance function and adding onSuccessListener and onFailureListener to the task. We wrap all of this in a function. The above function is called in the onCreate() method. Our API will pass an SmsRetriever.SMS ACTION RETRIEVER attempt to the application. This happens if a device receives a message containing the code. This intent contains the SMS message and background processing status.

To handle this, we’ll create a BroadcastReceiver class: in the onReceive() method, we first check the background processing status of SMS Retriever. We also construct an instance of the RetrievalEvent class. This is the event class that the EventBus will send to our subscriber. The RetrievalEvent class will be a data class. If you’re completely new to EventBus, consider learning more here.

recovery event

The properties of this data class are set on the retrieved SMS message. This is done if background processing was successful. Typically, a timeout occurs if no message is received within 5 minutes. If this happens, the timeout is set to true. Then send the event to the listening subscriber.

Register the BroadcastReceiver in the Android manifest

In your app’s AndroidManifest.xml file, register BroadcastReceiver: Next, in our MainActivity class, we’ll register, unregister, and implement our subscribers. The onReceiveSms() method will be called when an event is posted. It is usually annotated with the @Subscribe annotation. Registering and unregistering receivers is usually done with the onStart() and onStop() methods respectively. The substringAfterLast() function extracts the code sent by SMS.

Final Words: How to Automatically Verify SMS with SMS Retriever API in Android

Hope you understand this article How to Automatically Check SMS with SMS Retriever API in Android, if your answer is no, you can ask anything via the contact forum section linked to this article. And if your answer is yes, share this article with your family and friends.

FCC pushes to reinvent emergency alerts


The FCC recently asked EAS stakeholders to consider what the future of emergency warning in the United States might look like and how to plan a path forward.

The feedback collected covers a lot of ground, but one thing is clear: there is new digital technology to consider, but the reliability of legacy EAS and the structure provided by broadcasters and TV broadcasters should not be underestimated. estimated, commentators say.

The FCC is reviewing correspondence from its EAS Notice of Investigation (NOI) issued last fall in hopes of finding ways to enable greater functionality and accessibility. The notice of intent was part of a larger commission proceeding that focused on ways to improve the visual appeal of EAS, which is expected to primarily impact broadcasters.

The advisory also reflected the need to redesign the old EAS system and perhaps have broadcasters rely solely on the Common Alerting Protocol (CAP) to receive and relay emergency messages. The current EAS system consists of a legacy broadcast infrastructure and an Internet-based CAP, which allows for better visual messaging. And the FCC has already expressed interest in leveraging (CAP) to make meaningful improvements.

In the NOI, the FCC asked: If the legacy EAS cannot be reasonably modified to allow alerting issuers to distribute text and transcribe a two-minute audio message, should the legacy EAS architecture be completely redesigned?

Legacy EAS uses AFSK modulation to convert data into audible tones – is the 30 seconds of tone it would take to match text to 2:00 of audio too much?

The FCC asked, rather than focusing on ways to modify EAS to relay text or CAP, would it make sense to use legacy EAS only for Emergency Action Notification (EAN) and NPT, but require the use of CAP for all other alerts?

Most of the comments received were about the difficulties of upgrading Legacy EAS – the text was never part of Legacy EAS and does not have the capabilities of CAP – but still concludes that Legacy EAS is the ultimate fallback solution when other communication infrastructures fail.

[Related: “NAB Voices Concerns About Proposed EAS Changes”]

Xperi told the FCC that it believes the company’s HD Radio platform should be a central part of any plan to improve EAS in this country.

“The FCC should consider digital emergency alerting as a model for modernizing legacy EAS and, in addition, should actively incorporate the HD Radio emergency alerting protocol into its emergency alerting plans” , commented Xperi.

Xperi emphasizes that broadcast radio is not subject to network congestion delays and outages imposed by natural disasters on LTE and 5G cellular networks. The company estimates that HD Radio Emergency Alert is already used by more than 321 radio stations in the United States. And there’s a visual component to emergency messaging on HD Radio.

“HD Radio services today support the transmission of text and images. Although the images are low resolution (200px x 200px), that would be sufficient to send hazard symbol images to all radios equipped with HD Radio Artist Experience,” he told the FCC. “For HD Radio products, the visual text message can be embedded into standard program fields as emergency alert message text for contextual display.”

HD Radio, which already formats CAP alerts, can also transmit non-real-time files to support additional messaging capability. “Audio clips or text transcripts can be efficiently transmitted in support of alert messaging services,” Xperi commented.

Additionally, Xperi indicates that HD Radio receivers currently provide limited media content, such as thumbnails images and soon these capabilities will expand to allow live transmission of graphics, images, images, maps. Plus URL links, which can provide enhanced critical threat information.

Xperi, which conducted secondary testing for HD Radio in August 2021 when the commission and FEMA jointly coordinated a nationwide test of the IPAWS network, is also developing service validation protocols to address the potential for EAS message spoofing. . The tech company says it listens to automakers’ concerns about “potential cybersecurity vulnerabilities” that bad actors could exploit to compromise vehicle computers and other critical subsystems.

Other stakeholders who responded to the FCC’s NOI include the National Weather Service (NWS), which asked the FCC to continue developing the emergency alert. “While Emergency Action Notification (EAN) is to remain in its current form, evolution and improvements should be continued for the delivery of national and local (non-EAN) alerts,” NWS wrote in its comments. . “If EAS is intended to convey alert information beyond presidential alerts, then EAS needs to be redesigned and redesigned.”

[Related: “MMTC Proposes Compromise Approach to Multilingual Alerts”]

Digital Alert Systems (DAS), which manufactures EAS equipment, said many of the FCC’s forward-thinking accessibility goals of relaying visual information to match audio components can primarily be met with the requirement to broadcasters’ EAS equipment to immediately query its message-configured CAP server. However, he cautions that in the future, relying solely on CAP dissemination would present significant risks.

“The EAS broadcast network provides an essential level of resiliency for times when internet broadcast of CAP messages is inhibited by regional, local or last-mile outages. In short, our recommendation is that the public warning architecture can be “IP first,” but should not be “IP only,” DAS said.

Another EAS player, equipment maker Sage Alerting Systems, is urging the FCC to adopt a centralized text-to-speech engine in the future.

“If the sender does not provide audio with their CAP message, each EAS participant must provide their own. Text-to-speech is provided in most EAS devices, but quality depends on lexicon setting, especially for names and local location abbreviations A centralized TTS engine, publishing TTS audio to a server, supported by a government agency, will provide a significant improvement to CAP audio when audio is not provided by the author,” Sage told the FCC.

Responses to comments on the EAS Notice of Investigation are due May 10. You can file comments with the FCC and read the others here, enter 15-94 in the “Specify procedure” field.

Randy J. Stine has spent the past 40 years working in audio production and broadcasting news on radio. He joined Radio World in 1997 and covers new technologies and regulatory issues. He holds a bachelor’s degree in journalism from Michigan State University.

A call, a text, an apology: How an abortion arrest and a since-dropped murder charge rocked a Texas town

Placeholder while loading article actions

Calixtro Villarreal’s phone rang on Saturday afternoon, some 48 hours after his client, Lizelle Herrera, was arrested and charged with murder – in what local authorities said was a “voluntary abortion”.

It was Gocha Ramirez, the district attorney for Starr County, Texas, a remote area on the border with Mexico. Herrera should never have been charged, Ramirez told the attorney, according to a person familiar with the situation, who spoke on condition of anonymity to describe the private interactions.

The public prosecutor reiterated this feeling in a text that he sent the next day to an acquaintance. “I’m so sorry,” he wrote in the post, which was reviewed by The Washington Post. “I assure you that I never meant to hurt this young woman.”

Texas woman charged with murder after abortion

Ramirez moved to file all charges on Sunday. He did not respond to requests for comment, nor did Herrera. Villarreal declined to comment several times.

Abortion rights advocates in Texas and across the country seized on Herrera’s arrest shortly after his arrest on Thursday, fearing it was tied to a new Texas law banning most abortions and, worse, , pointed to a disturbing future in which women seeking to terminate their pregnancies are treated like criminals.

However, interviews with several people in the South Texas community following the situation closely, as well as statements by leaders of the Texas anti-abortion movement, suggest that it was not part of a broader anti-abortion strategy. , but rather a hasty mistake by a first-term Democrat. district attorney. Herrera’s husband – who filed for divorce the same day as his arrest – is being represented by an attorney from the district attorney’s office, raising questions about a potential conflict of interest.

Still, Herrera’s arrest could ignite a growing state-by-state fight over abortion. The battle escalated to a Supreme Court ruling this summer that could overturn or significantly weaken Roe vs. Wade, the historic precedent that has protected the right to abortion for nearly 50 years. Since the district attorney’s statement that it was a hospital that reported Herrera to law enforcement, her case has raised serious concerns from abortion rights activists, who fear that possible Violations of patient privacy only arouse greater fear among women seeking access to legal abortion.

“There is already such a degree of mistrust and fear around abortion,” especially in Texas, said Blair Cushing, an abortion provider in South Texas.

Texas law explicitly exempts a woman from a criminal homicide charge for terminating her pregnancy. While many details about Herrera’s case remain unclear, even staunch anti-abortion activists have condemned her arrest. Texas Right to Life, the organization that helped draft the Texas abortion ban, said his indictment came as a surprise.

“The Texas Heartbeat Act and other state pro-life policies clearly prohibit criminal prosecutions for pregnant women,” said John Seago, the group’s legislative director, referring to Texas law that allows private citizens to prosecute anyone who helps facilitate an abortion after six weeks of pregnancy. “Texas Right to Life opposes prosecutors who step outside the bounds of careful and carefully crafted Texas policies.”

A haven for Texas patients, Oklahoma clinics brace for abortion ban

Cushing said she sees patients every day who buy pills in Mexico for medical abortion — a two-step procedure that involves mifepristone and misoprostol — and then come to her clinic for a checkup. After learning that a woman in their area had been charged with murder for an abortion, Cushing said she expects patients to try to hide the details of their situation – or not come from the all towards her.

In a statement on Sunday, Ramirez acknowledged that the events surrounding the incident had clearly “taken their toll” on Herrera and his family.

“To ignore this fact would be short-sighted,” he said.

A hospital brought the matter to the attention of the sheriff’s office, according to Ramirez’s statement. Rene “Orta” Fuentes, 61, who became sheriff in 2008 after spending nearly three decades in the department, did not respond to a request for comment.

Ross Barrera, a community organizer and former Starr County Republican Party chairman, said abortion is rarely discussed in public forums in the heavily Democratic county. He described Ramirez as a “hardcore democrat” and said he simply misstepped the Herrera case.

“I think his office just failed to do its job,” he said. “I would get my hands on the Bible and say that was not a political statement.”

Ramirez has largely supported Democratic candidates. He supported the Democratic presidential ticket in 2020 on social media. He contributed to Democratic gubernatorial candidate Beto O’Rourke last year, Democratic gubernatorial candidate Wendy Davis in 2014 and Democrat Barack Obama’s first presidential campaign in 2008, state campaign records show. and the federal government.

Starr County, in the heart of Texas’ predominantly Hispanic Rio Grande Valley, is a mostly rural region dotted with small towns. Residents of Rio Grande City, the county seat, shop at a single HEB supermarket. People gather at church or in their backyards for carne asada, according to the person familiar with the situation involving Herrera. Since the recent opening of a Panda Express, this person added, it has been “all the rage”.

While Starr County residents tend to vote Democrats top to bottom, many are socially conservative, especially when it comes to abortion. The area is saturated with staunch Catholics who always raise an eyebrow to discuss who got pregnant “out of wedlock”, the person familiar with the situation said.

Few details are publicly known about Herrera, the 26-year-old woman at the center of an incident that has drawn national attention. She was released from police custody after advocacy efforts by abortion rights groups led by women of color.

Her husband, Ismael Herrera, filed for divorce on April 7, the same day she was arrested, according to court documents. They married in 2015, when she was 19, and stopped living together on or around January 1, records show. The separation occurred less than a week before the “voluntary abortion” described in her indictment. The couple have two sons, records show.

The attorney who filed the motion, Judith Solis, did not respond to requests for comment. Solis is one of five prosecutors who work in the Starr County District Attorney’s Office.

Court officials referred questions about the prosecutor who presented Herrera’s case to the grand jury to Ramirez. He could not be immediately reached on Wednesday morning. But attorneys say prosecutors in that office are licensed to practice civil litigation.

Melisandra Mendoza, an attorney who previously worked in the district attorney’s office, said if Solis didn’t make Herrera’s arrest an issue in the divorce, there might not be a conflict of interest. However, she said she would not have taken the divorce case. “I probably would have walked away from this case,” she said.

Ismael Herrera also could not be reached by The Post. He spoke briefly in Spanish to a local TV reporter on Monday, saying, “Listen now, I have no words. … He was a son. A boy.”

Ramirez, the 68-year-old district attorney, won the 2020 Democratic primary and did not face a Republican challenger in the general election. Much of his campaign has focused on advocating for children’s rights. On April 1, a week before Herrera’s arrest, his office posted a Facebook post declaring April “Child Abuse Awareness and Prevention Month” in the 229th Judicial District.

The district attorney’s office chose to take this case to a grand jury to seek a murder indictment.

Within the Starr County legal community, Ramirez’s decision to bring the case is widely viewed as “gross negligence,” said a community attorney who, like others interviewed for this story, said spoke on condition of anonymity to frankly discuss sensitive topics.

When Abner Burnett, one of Starr County’s public defenders, first heard of the arrest, he didn’t know what law the district attorney’s office might use, as the Texas criminal code clearly exempts a pregnant woman on this type of murder charge.

“At first I thought maybe someone had slipped me a new law and was trying it out,” Burnett said.

Lawyers from the national abortion rights community rushed to offer financial and legal support to Herrera over the weekend, according to the person familiar with the situation. But Herrera and his family decided to retain Villarreal, a 54-year-old lawyer known for quoting scripture.

Its law firm’s website describes it as “a Christian organization that believes in the teachings of the Lord and the impact that only Jesus Christ can have on individuals.” The website adds, “With this in mind, our intention is to use our wisdom and experience that the Lord has provided to serve our customers with the utmost respect and care. It is an honor to serve our customers, because it is a service rendered to God.

In a small legal community where most attorneys know each other, court records show 19 federal cases in which Villarreal and Ramirez represented co-defendants. Villarreal publicly declared their support for Ramirez in two Facebook posts leading up to his election in March 2020.

“They are friends,” said a person familiar with the situation. “They go back a long way.”

Many abortion rights advocates across the country have called for legal action against Ramirez and others responsible for Herrera’s arrest. Local Starr County practitioners have also signaled their support for legal action.

If Burnett, the public defender, was in Villarreal’s position, he said, he would sue County for what he did to Herrera “in a minute”.

“It’s wrong, not only did they arrest her and charge her with a crime that didn’t exist, but they also exposed her to a kind of public light that she didn’t deserve,” Burnett said. “They should have been a lot more careful before doing that.”

As soon as Cushing, the abortionist, heard the news about Herrera, she said she immediately thought of the women she was seeing in the Rio Grande Valley.

When his patients travel to Mexico for abortion pills, they often receive incorrect instructions on how to take them, Cushing said. Sometimes the fake diet fails to terminate the pregnancy, she said, and sometimes it can endanger a patient’s health.

Cushing worked hard to earn those patients’ trust, she said. Now, she added, she will have to work even harder.

Nate Jones contributed to this report.

How to Check SBI Balance via Missed Call or SMS


The largest banking sector in the country, the State Bank Of India (SBI), offers services to its customers through a toll-free number and SMS feature available on the SBI Quick app. SBI account holders can obtain SMS banking and mobile services, account balance details and mini-statements by simply making a missed call or SMS from the registered mobile number.

The toll-free number is 9223766666, the one through which users can receive balance details via SMS or a call on their devices.


How to check the balance

Users can make a missed call on the toll-free number or text “BAL” to 9223766666.

Get a mini-statement

To receive a mini-statement including the last five transactions, customers can text “MSTMT” to 9223866666.

Checkbook request

To request a checkbook with SBI SMS banking and mobile services, the user must follow certain procedures. They are the following:

Step 1: ‘CHQREQ’ to 09223588888

2nd step: The customer will receive an SMS on the registered mobile number.

Step 3: Then send a consent SMS (6-digit CHQACCY number received by SMS) to 09223588888.

Step 4: Finally, you will receive an SMS within 2 hours of a further processing request.

Get an electronic statement

Step 1: The electronic statement of the last six months can be received by customers holding a savings account in SBI.

2nd step: The statement will be provided with their registered email ID, which is a password protected PDF file.

Step 3: Text ‘ESTMT now to 09223588888’.

Step 4: The code will have a 4-digit number which will be of the user’s choice and will be used to encrypt the PDF attachment sent to registered mobile numbers.


Step 1: SBI account holders must register their account numbers to receive SMS and mobile services.

2nd step: Then they should text “REG Account Number” to 09223488888 from the registered mobile number for the specific account.

Step 3: Upon successful completion of the previous method, the client will receive a shared confirmation message whether the message succeeds or fails.

To note: SBI account holders can also check all data such as online banking, mobile banking, SBI branch, passbook and ATMs through the online banking service.

SPI Software announces the introduction of SPI Connect™ through a partnership with ConnectionsGRP


Gordon McClendon, CEO of SPI Software

New platform provides digital communications and messaging to guests resulting in increased customer service

This unique personalized communication platform is what customers want. Today, texting is the preferred means of communication for most homeowners.

—Gordon McClendon, CEO of SPI Software

MIAMI, FLORIDA, UNITED STATES, April 11, 2022 /EINPresswire.com/ — Gordon McClendon, CEO of SPI Software, the leading provider of software systems and resort management solutions for timeshare developers and operators, recently announced a strategic partnership with ConnectionsGRP and the introduction of SPI Connect™. The new platform will allow guests to connect to resorts, send and receive text messages throughout their vacation, from initial bookings through guest stay and post-stay communication.

SPI’s hyperscale communications platform, SPI Connect™, provides a cloud-based messaging module that is fully integrated into SPI’s advanced timeshare/vacation ownership-focused application software, including a set full of modules that provide world-class timeshare resort management solutions.

McClendon adds, “Our SPI Connect™ energizes the customer experience by advancing the world of customer communications. This transforms communication between resort and guests, increasing revenue, saving time and reducing costs through process streamlining. This unique personalized communication platform is what customers want. . Its implementation will greatly improve customer service and satisfaction scores, greatly enhancing every customer’s vacation experience. Today, texting is the preferred means of communication for most homeowners.

“The integration of ConnectionsGRP CPaaS with SPI’s software is the first step in helping solve the current communication crisis between guest and timeshare/vacation resorts. SPI Connect™ provides properties with the ability to select in real time communication messages that are automatically triggered from SPI’s software, providing operational and communication efficiency for each property.Each outgoing text or IP message sent to a guest allows the guest to respond and communicate across all parties of a timeshare/vacation property,” said Anthony Link, CEO of ConnectionsGRP.

For Anthony Link, “SPI Connect™ represents one of the only truly integrated CPaaS in vacation ownership software. cannot be triggered from events within the property software. This often leads to disjointed communication and a negative guest experience. SPI Connect™ provides a breakthrough event in the vacation industry by prioritizing communication with guest booking data, resulting in frictionless communication between resorts and each guest, enhancing the guest experience, making every guest feel special and important.

To learn more about integrating SPI Connect™ as a customer communication tool or other software solutions created exclusively for the hospitality and vacation ownership industry, please visit www.spisoftware. com or contact Lou Wolfson at 305-519-4297 or by email at lou [email protected]

About SPI software. SPI Software is the leading developer of management-oriented systems software in the global resort developer market. Their corporate philosophy of continuous development and innovation has led them to create the most advanced vacation ownership-focused technology in the world. Developed as state-of-the-art business application software, SPI’s technology is available to industry as an enterprise system or through individual modules that can be deployed via the cloud or on-premises.

About ConnectionsGRP
ConnectionsGRP designs, develops and deploys transformative communication technology solutions, alleviating the current communications crisis that businesses have with their customers, patients and guests. ConnectionsGRP’s omnichannel CPaaS communications platform provides connectors to fully integrate all mobile messaging channels (text, WhatsApp, and chat) alongside any voice channel established by enterprises. Connecting businesses to their customers in a more meaningful and simplified way, using mobile messaging as the primary communication channel. For more information, visit www.connectionsgrp.com or text 866-767-CGRP.

Media Contact: (ConnectionsGRP): [email protected] 760-803-4522

Marge Lennon
Communications Lennon
+ +1 2398410553
[email protected]
Visit us on social media:

Elon Musk won’t join Twitter’s board after all


Elon Musk will no longer join Twitter’s board of directors, Twitter CEO Parag Agrawal announced in a message to the company. Agrawal confirmed last week that Musk would be named to the board following his purchase of 9.2% of the company’s shares, but now says Musk has decided not to take the seat.

“We announced on Tuesday that Elon would be appointed to the board subject to background checks and formal acceptance,” Agrawal said. writing. “Elon’s appointment to the board was to become officially effective on 9/4, but Elon shared that morning that he will no longer be joining the board. I believe it is for the best. We and will always appreciate feedback from our shareholders, whether or not they serve on our Board of Directors. Elon is our main shareholder and we will remain open to his contribution. »

Joining Twitter’s board would have prevented Musk from owning more than 14.9% of the company. At the time Musk’s purchase became public, his Twitter stake was worth $2.89 billion.

Ever since Musk’s Twitter stake came to light, the Tesla and SpaceX CEO has publicly tweeted his ideas for the company — though, as always with Musk, it’s hard to tell when he’s just trolling. He posted a poll on whether Twitter should have an edit button the day before the company confirmed that it would indeed add the long-requested feature. More recently – on the same day he apparently told Twitter he wouldn’t be joining the board, in fact – he tweeted suggestions like including verification checkmarks with the paid Twitter Blue service, or convert Twitter’s San Francisco headquarters at a homeless shelter “since nobody shows up anyway.”

Here is Agrawal’s full message:

Elon Musk has decided not to join our board of directors. Here is what I can share about what happened.

The board and I have had many discussions about bringing Elon to the board, and directly with Elon. We were happy to collaborate and clarify the risks. We also believed that having Elon as a trustee of the company where he, like all board members, must act in the best interests of the company and all of our shareholders, was the best way forward. The council offered him a seat.

We announced on Tuesday that Elon would be appointed to the board subject to a background check and formal acceptance. Elon’s appointment to the board was supposed to officially become effective on 9/4, but Elon shared the same day that he would no longer be joining the board. I believe it is for the best. We and will always appreciate feedback from our shareholders, whether or not they serve on our Board of Directors. Elon is our main shareholder and we will remain open to his contribution.

There will be distractions ahead, but our goals and priorities remain unchanged. The decisions we make and how we execute them are in our hands, no one else’s. Let’s ignore the noise and stay focused on the work and what we’re building.

Interoperable cardless cash withdrawal at ATMs likely to see takers in millennials, rural population


Contactless payments are set to get a further boost with the Reserve Bank of India’s (RBI) plan to enable cardless cash withdrawals from ATMs. Although the facility has gained traction during the pandemic, players believe it will now see more usage and adoption, especially among the younger population and in rural areas.

“It’s another channel or another platform for customers to access cash. In the new approach, cash is always withdrawn from ATMs; the change is – instead of physical debit cards, customers can use a UPI-based QR code to withdraw cash,” said Ashish Ahuja, COO, Fino Payments Bank, adding that this will further simplify banking operations.

“This form of cash withdrawal will inherently appeal to the new generation who are digital savvy and experimenting with new initiatives. on UPI,” he added.

Rustom Irani, MD and CEO of Hitachi Payment Services, said such withdrawals would also help the rural population, as many of them do not have or use debit cards. “This will contribute to greater financial inclusion. At Hitachi Payment Services, we plan to provide the installation to our white-label ATMs soon,” he said.

QR code scanning

The RBI said the facility will be based on UPI and details are expected to be announced shortly. According to industry players, this will be based on QR code reading. “We believe QR codes are the future of the banking and payments industry for their inherent ease of use and to facilitate secure cashless transactions,” Ahuja said.

A report from SBI Ecowrap says it also expects it to work as an ATM QR code scanner through UPI to withdraw cash from any ATM. “Furthermore, the introduction of a dual-layer SMS and password withdrawal feature on SBI’s YONO Cash Line could do wonders for various customer segments,” he added.

Banks offer a service

SBI was the first bank to launch the facility in 2019, in which customers could withdraw money through the YONO app. It has grown in popularity during the pandemic, and a handful of other banks offer the service, such as HDFC Bank, ICICI Bank, Kotak Mahindra Bank, Axis Bank, RBL Banks, and Bank of Baroda. But most players use different technology.

“Contactless and contactless means of payment have grown in popularity since the pandemic. A cardless cash withdrawal system also allows people to not worry about the safety and security of their debit cards. People don’t want to touch anything as much as possible and this will solve this problem,” notes a banker.

Depending on the bank, amounts between ₹10,000 and ₹20,000 per day can be withdrawn using the service. Customers usually have the option of withdrawing funds at the bank’s ATM or at specific stores.

Published on

April 10, 2022

Russians face mounting casualties and costs of war in Ukraine


“Mom this is hell, I don’t know if I will come home,” Nikita Avrov, a 20-year-old Russian soldier, wrote in a text message to his mother on February 14 as he and more than 150 Another 000 troops massed along the Russian-Ukrainian border ahead of Moscow’s invasion.

This was the last time Anastasia Avrova, his mother, heard from her son until she learned on April 2 from local authorities that Nikita had been killed along with the rest of his tank crew in late March near of Izyum, the scene of intense fighting in eastern Ukraine.

An indentured soldier from Luga, a town near St. Petersburg, Nikita’s obituary is one of many now filtering across Russia as news about the harsh reality of the six-week war in Moscow in Ukraine are beginning to hit ordinary families.

“Nothing Adds Up In My Head”, Avrova says North of RFE/RL. Realitieswho says she was told to expect the arrival of her son’s body in the next few days.

Many ordinary Russians are still unaware of the extent of their military casualties in Ukraine – and the brutal tactics they have used against civilians – since the February 24 invasion.

Russian authorities tightly control information on military casualties inside the country. Precise public sentiment for the war is not known, but official polls show high support for the Kremlin campaign. Still, the government remains wary of how reports of army casualties could shift public opinion and create backlash at home.

Avrova says it’s still hard for her to discuss Nikita’s death and she still wonders if she considers the war necessary or not, although she thinks “if it wasn’t necessary, she wouldn’t. probably wouldn’t exist.”

Yet, she adds, it is becoming difficult for her as news regularly comes in of young men like her son being killed fighting in Ukraine.

“I worry about every child like it’s my own when I see on the internet someone has died,” she said.

An information breakdown

The Kremlin has cracked down on the flow of information, targeting and banning many independent media outlets and human rights organizations, while Russian state media echo false claims that the Ukrainian government is controlled by the Nazis and that the brutal deaths of Ukrainian civilians, such as those of Bucha, are part of an elaborate hoax.

Russian media coverage and public debate about the war are also subject to strict censorship. Russian President Vladimir Putin signed an executive order declaring all military deaths a state secret in 2015 and the country criminalized statements discrediting the military in 2022.

Ilgiz Akhiyarov, from the Russian region of Bashkortostan whose brother Ilfat was killed fighting in Ukraine, works in the oil industry in Siberia and says that due to long working hours and poor internet connection on his workplace, he only “realized there was a war in Ukraine when my brother was killed there.”

Ilgiz told RFE/RL’s Tatar-Bashkir service that because his family and many others in his native area are Muslim, many bodies of fallen soldiers are returned quickly in order to comply with Islamic burial customs which dictate that someone should be buried as soon as possible afterwards time of death.

Ifat Akhiyarov was killed fighting in Ukraine and buried on April 3.

Ilfat was buried on April 3 in his home village of Durtyuli, north of the city of Ufa, and Ilgiz says the sight of his brother in a zinc coffin made him physically ill. He says he thought the war was something far removed from him and his family and he worries about more casualties in Ukraine.

Like many Russians, Ilgiz says he gets his news from public TV channels and doesn’t have time to browse the internet or messaging platforms like Telegram to do his own research.

“You have to finish what you started,” Ilgiz said of Russia’s military campaign in Ukraine. “So why did my brother and others die? It’s not right to stop halfway.”

A new phase for a brutal war

After suffering heavy losses in northern Ukraine and around Kyiv, Moscow is reorienting its forces towards southern and eastern Ukraine. With more intense fighting expected, continued grim casualties could have a big effect on support for the war across the country.

While estimates point to a staggering Russian death toll, an exact figure remains elusive.

The Russian Defense Ministry said 1,351 soldiers have died in the fighting so far, while NATO estimates that Russia has lost between 7,000 and 15,000 soldiers during the war. Ukraine puts the Russian death toll at 18,600.

Ukraine’s Interior Ministry has created a website and a Telegram channel where Russians can search for photos of the dead and POWs, or fill out an online form for information about their family members.

However, there is no guarantee that such moves could undermine support or break the strong information controls that are in place inside Russia.

“Does everyone [in Ukraine] a Nazi? No, not all of them, but they are part of the management,” Ilgiz said. [Ukrainian] regime must be destroyed so that [ordinary people] don’t take more damage.”

Tesla customer has been waiting over 2 years for a Model X refund


Danny Roman runs a sustainable outdoor adventure company that offers biking and hiking tours in Southern California.

Danny Romain

Danny Roman bought a new Tesla Model X and took delivery of the car on February 28, 2020.

Three days later, he informed the company that he was making the SUV electric under the seven-day, no-questions-asked policy that Tesla CEO Elon Musk was touting at the time.

Today, more than two years after Tesla took possession of the car, Roman still does not have his refund or access to the vehicle, which had an all-inclusive price of around $116,000, including various options and fees.

Records indicate that Tesla picked up its Model X and loaded it onto a tow truck on March 8, 2020, after which it expected its refund to arrive quickly. His bank advised him to ask the EV maker to initiate a “stop sale”, he recalls, and then his Tesla sales representative informed him that his refund would soon be processed.

Instead, several weeks later, while still corresponding with Tesla about the status of his return, Roman received a service alert from Tesla telling him to pick up the electric SUV. The alert explained that it had been repaired and was at a service center in Burbank, Calif., although he originally purchased the vehicle in Century City, about a 40-minute drive away.

Roman told CNBC he was stunned by the service alert. He says he never requested or authorized any repairs and that Tesla has previously acknowledged that he was returning the car. (The correspondence between Roman and Tesla, which he shared with CNBC, confirms his account.)

Roman stopped making payments on the car for a month because he thought everything was going well. Then the bank told him he had missed a payment and his credit rating had dropped 30 points. When he called to ask about it, he was told that Tesla had not issued the stop sale.

As the owner of a small business that offers biking and hiking tours in Southern California, Roman says he needed to maintain a good credit rating. So given Tesla’s stubborn stance on the Model X, he decided he had no choice but to continue making car payments to his bank and pay to keep the car insured.

Roman wanted to avoid any repossession by his bank and knew that the financial institution could have ruined his credit if he hadn’t kept up the payments. He maintained insurance payments if the vehicle was damaged while in Tesla’s possession.

“If you stop paying your bank, it will destroy you! said Roman.

As a result, for two years Roman has been making payments on a car he does not own.

Tesla did not respond to a request for comment on its customer’s predicament.

Why he returned the car

Roman says he bought the car because he was a fan of Tesla, read that the Model X had an excellent safety rating and thought driving a battery electric vehicle would reduce the environmental footprint of his personal transportation.

As the father of a child at that time, he was very concerned about safety. And as the owner of a sustainable outdoor adventure business, he felt buying a battery-electric car was a good way to underscore that commitment.

The car was marketed with a battery with a range of over 400 miles, essential for driving from Southern California to the San Francisco Bay Area and points along the way where it often travels and sometimes leads hikes by bike.

When he first pulled out the Tesla Model X, the vehicle’s range indicator showed that Roman had drained 15 miles from the battery after driving less than half a mile from home.

When he tried to recharge the vehicle’s high-voltage battery on the first day he got the car, driving to a Tesla boost station in Culver City, Roman said it took much longer than he expected. sales reps had promised – hours, not 45 minutes – to charge up to or beyond 80% of the battery’s full range.

Roman shared photos with CNBC of the vehicle’s display and charging status from that trip. Even before the time he spent hooked up to a charging station, Roman said, he had already waited more than an hour to get access to a stand because there was a huge line of cars in front of him.

“It’s LA Everybody has a Tesla.”

Tesla owners wait to charge the batteries of their electric vehicles in Southern California.

Danny Romain

Besides the battery issues, Roman said one of the vehicle’s hawk-wing doors stuck when he tried to open it. And he discovered that installing a charger in his apartment complex would cost 10 times the amount announced by Tesla sales representatives. Sales reps said he could install a charger in his home for about $700; they knew he lived in an apartment building, but instead offered a price for a charger in a stand-alone garage.

In the spring of 2019, Elon Musk told his millions of Twitter followers, “To be clear, orders are fully refundable, even after you’ve had your Tesla for a week” and “If anyone really wants to return the car to good faith on day 8, it’s fine.”

So Roman returned his car.

Danny Roman’s Tesla Model X had battery and door issues that led him to return it to the electric vehicle maker in 2020.

Danny Romain

At one point, messages from Tesla to Roman show that the company tried to convince him that it did not have a seven-day return policy when he purchased his vehicle.

But Tesla had the return policy on its website until October 2020 — months after it purchased and returned the Model X. (The return policy was also mentioned in its sales agreement.) After three months of go- returns with the company, including being told his refund would be coming soon, and then being told he could get it back for repair, Roman sued the company.

To his surprise, instead of being able to sue, he was told that his case would go to an alternative dispute resolution process.

When he signed papers to take delivery of his Model X, Roman had agreed to an arbitration clause.

No day in court

Roman’s predicament regarding the Tesla Model X highlights the vulnerability of American consumers being pushed into arbitration agreements in order to purchase services or items as a matter of course.

Mandatory arbitration is common in new and used auto sales, says Paul Bland, executive director of Public Justice, a consumer advocacy group.

For all intents and purposes, consumers get nothing by agreeing to arbitrate, he says. For companies, however, “their motivation is to limit liability and make it harder for a consumer to win an individual case if they have done something illegal,” Bland said. “It’s such a secret system that it’s much harder for consumers to find out what happened to people in prior related cases, and it’s much harder to have a class action.”

Roman says if he realized the company wasn’t honest with him about the car and the return process upfront, he wouldn’t have bought the Model X and agreed to arbitration . His arbitration is still ongoing.

Meanwhile, Roman had to rent another car to use instead of the Model X. He told CNBC he was renting a hybrid-electric Toyota Prius.

“Every time the money gets sucked out of my account, every month, I cringe,” Roman said. “On top of that, I’ve spent over a hundred hours of my life trying to figure this out and worrying.”

In February this year, Tesla – still refusing to acknowledge that they had accepted his vehicle in return – sent a message to Roman telling him that his car, which he had not seen for about two years, was ready to go. be picked up at a service center.

Puzzled, Roman emailed them and said he would pick him up. But Tesla would not have made an appointment for him to do so. They told him to call his bank instead. It got him nowhere.

Danny Roman used the Tesla app to find the whereabouts of a Model X he returned to the company in 2020.

Furious and curious about what had happened to the Model X over time, Roman logged into the Tesla app to see if he could learn anything about its whereabouts. It turned out that the car he had paid for was in a salvage yard just 11 miles from his home.

“After everything I’ve been through, I’m still a big fan of Tesla, Elon Musk and electric cars,” Roman told CNBC. “I hope my story reaches the powers that be at Tesla and that they make the necessary changes so this doesn’t happen to their future customers.”

How to Check Your Android Phone Notifications on Windows PC


In 2019, Microsoft finally got its own Android notification management system from Windows. Since then, it is possible to see notifications from your Android phone on your Windows 10 or 11 PC as soon as they arrive and retrieve your entire SMS history as well as any pending notifications on demand. You can even reply to messages and compose new texts directly from your computer. Previously called Your Phone, the Windows app has recently (and appropriately) been renamed Phone Link.

Here’s how to start. (These instructions assume you’ve updated your PC to Windows 11, but the process will be similar for Windows 10.) You’ll be going back and forth between your computer and your phone, so be prepared.

First, on your Windows computermake sure you have the latest version of the Your Phone app:

  • Open the Microsoft Store and search Telephone link.
  • If the application is not already installed, install it.
  • If the app is installed, click To open.
  • You will be redirected to the Your Phone app. Click on Begin.
  • You will be reminded which Microsoft account you are signed into. Unless you want to switch accounts, click Continue.

Once you’ve installed the Windows Phone Link app, it’s time to access your Android phone.

I get it? Good. It’s time to move on to call side of things.

  • You will receive instructions on where to go on your Android phone to install the Link to Windows app. For most phones, you’ll type in the web link provided or you can search for it. in the Play Store by yourself, then install it. If you have a Surface Duo or some Samsung phones, Link to Windows will already be installed.
  • Open the Link to Windows app and tap Pair your phone and PC.

Now back to your computer.

  • You should see a checkbox saying I have the Link to Windows app ready. Check it, then click Pair with QR code. You will get a pop-up window with a QR code.

You will use a QR code to link your computer and phone.

You will use a QR code to link your computer and phone.

back to your call

  • You should see a box asking if the QR code on your PC is ready. Since this is the case, press Continue on your phone. Allow Link to Windows to take photos and record videos.
  • Scan the QR code on the computer with your phone. It should connect.
  • Grant the app the various permissions it requests.
  • You will be warned that staying connected may impact your battery life. Faucet Continuethen allow or deny it permission to run in the background.
  • Your phone will tell you to check your computer, and your computer will tell you that you’re ready.

On your computer

  • You’ll be welcomed into the app and prompted to pin it to your Windows 11 taskbar. You’ll then be presented with everything you can do, like see notifications, send text messages, view photos, or make a call .

You will get a checklist of things you can do with Phone Link.

You will get a checklist of things you can do with Phone Link.

But you’re not quite done yet. There’s just a bit of configuration left, the part that allows notifications to pass.

  • If you are still in the intro screen, you can click See my notifications. Alternatively, if you’re in the main Phone Link app window, you’ll see Notifications in the left menu; click on it. You will be asked for permission to sync notifications.
  • Click on Open phone settings. On your phone, you should have been taken to Device and app notifications. Find the Link to Windows app in the list and enable the toggle next to it.
  • Faucet To permit in the confirmation window that appears.

Select Link to Windows on Devices &  app notifications screen.

Select Link to Windows on the “Device and app notifications” screen.

You will be notified of any permissions you allow.

You will be notified of any permissions you allow.

That’s it! All notifications you receive on your phone will now be transferred to the Phone Link app. You can receive and reply to text messages, view your photos, and even make calls (as long as they’re paired via Bluetooth). You can also control four features of your phone via buttons: Do not disturb; Bluetooth; volume on/off; and audio player on/off.

You can view messages, photos, and take calls in the center windows, and receive (and respond to) notifications in the side window.

You can take calls and view messages and photos in the central windows. In the side window, you can receive (and respond to) notifications.

Updated April 8, 2022, 11:45 a.m. ET: This article was originally published on July 30, 2019. It has been updated to reflect app and operating system changes.

Mitchell property developers launch spin campaign to tout ‘benefits’ of proposed Perryman development – ​​Baltimore Sun


A new website, advertising and robocalls to Perryman residents, all with the same message – “Local Project, Local Benefits” – were all launched recently by the Perryman Improvement Project.

It turns out that Perryman’s improvement project is a public relations campaign by the Chesapeake real estate group, promoters of a mega-warehouse project.

On the website, perrymanimprovement.com, the developers describe what the project is about, who would do the work, who owns the property, and what improvements would be made to the property and in the community. They also reiterate the county’s position on the project and the approved zoning for the project.

A “Fact vs. Fiction” tab on the website directly addresses Perryman residents’ concerns about traffic, infrastructure and the environment.

“There’s a lot of misinformation floating around about our project because we haven’t been as aggressive as the 3P coalition,” said Matt Laraway, executive vice president of Chesapeake Real Estate Group. “We just wanted to make sure people understand, at Perryman and elsewhere, that there’s been a lot of stuff that’s not been accurate that’s been aired.”

With panoramic photos and maps, the website shows Perryman as a scenic area with warehouses and clusters of houses. Members of the 3P coalition – Protect Perryman Peninsula – want it to stay that way.

A bill introduced in March by County Council member Curtis Beulah to impose a temporary moratorium on development in Perryman, which is in his district, has gone largely unaddressed by the council. A public hearing on the proposed moratorium was held on March 15. About 50 people spoke at the hearing, which was followed by the regular council meeting, where council chairman Patrick Vincenti told residents who wanted to comment on the Perryman project that they would not would not be allowed to do so.

At Tuesday’s council meeting, proposed amendments to the wording of the bill were read, but no further action was taken and no date for future action was announced. Two board members, Robert Wagner and Andre Johnson, discussed Perryman in their comments, both saying they want the best for all parties involved, but neither gave any indication on the status of the moratorium or the project. Beulah did not comment during the meeting.

Some Harford County residents said they received text messages this week from the Perryman Improvement Project supporting the development of the 700-acre Mitchell property in Perryman. .

The automated text message contained a graphic that read: ‘Tell Harford County Council: Stop being bullied by Perryman Peninsula activists!’ The body of the text message continued the argument, in excerpts such as “For decades the Perryman Peninsula has been zoned for industrial development, creating good jobs and millions in tax revenue. … But now a small group of new owners want it to STOP.

Perryman residents have attended county council meetings for the past few months to speak out against the proposed project, which would include five warehouses totaling 5.2 million square feet.

Chuck Mezan, a Perryman resident who runs the Protect Perryman Peninsula website, protectperryman.com, said the information in the post was misleading, such as the claim that the owners opposing the project were new to the region.

“I’ve lived here on the peninsula for 50 years,” Mezan said, “and there’s a huge number of us who’ve been here that long, if not longer.”

Not only did Mezan and other Perryman residents receive the text message, Mezan said his family members in Fallston and Jarrettsville also received it.

Laraway said the text messages were in response to “extremist information” being spread about the project. He also said their goal was to “get this to as many people as possible in Harford County”.

The Aegis: Top stories

Days of the week

Daily highlights from Harford County’s number one source for local news.

“That’s our response in our effort to set the record straight,” Laraway said, “and get some of the facts from our perspective.”

Residents also mentioned in public comments during the council meeting that they had received robocalls with similar messages. Laraway said the figures were “compiled from publicly available information.”

Perryman Coalition members and developers have faced several issues, including concerns over the Perryman Wellfield, a major source of water for the county, which flows beneath the Mitchell property, according to information presented by the Coalition. 3P.

Despite the wide circulation of the texts, Mezan said it has “favored them in the long run” by driving more traffic to the coalition’s website since Tuesday.

“This message was sent to a large group of people who had no idea what it was about,” Mezan said, “and they’re confused. A lot of them came to us and found us at because of that, and we try to talk to them and let them know that this is not an improvement project.

Maria Morales, editor of The Aegis, also contributed to this report.

How to get better customer service


We all expect to be treated with respect, courtesy and some degree of empathy. In most cases, this is what we get from call center representatives and other people we contact for help. But what about the times when you’re frustrated that a representative doesn’t understand your problem or just can’t solve it? Do you manage to maintain good manners and a cool demeanor?

To help understand customer service a little better, I spoke with Joe Frech, who spent 24 years as a hotline investigator in the Office of the Inspector General of the Office of Personnel Management. Frech also taught the Helpline Operations course at the Federal Law Enforcement Training Center in Charleston, South Carolina.

Here are some tips he shared to help you get courteous service — and more importantly, efficient results — when contacting an organization for help:

By leaving a messagealways provide a phone number or other contact information.

If you leave a phone number, make sure it is connected to an answering machine or voicemail service. Frech said that when he returned calls, he would give three tries. If there was no answer or the call went to voicemail every time, it moved on. He was just too busy to keep calling.

Kill them with kindness. Appearing harsh and demanding will not get results. Instead, do the opposite: be polite and courteous.

Don’t use foul language. Frech said he would tolerate some rudeness, but most employees wouldn’t and shouldn’t.

Avoid using phrases like “you people” or “I pay your salary, so you work for me”. These are not likely to give you better service.

Don’t make threats. If you issue even vague threats out of frustration, you’ll most likely have a bigger problem. It would not be uncommon for a federal agent or a police officer to visit you.

If you do not receive a reminder when you leave a message, do not hesitate to follow up. Sometimes the rep is overwhelmed with so many requests that your message gets pushed aside. A follow-up call can bring it to the top of the stack. But don’t call every day. Then you’re just a pest.

If you find it difficult to communicate exactly what you need, it’s a good idea to have someone on the phone who can verbalize the problem for you. I’ve done this with clients who have problems with their retirement benefits. It can be helpful to have someone who speaks “personal-ese” online with you.

Have your public service pension number and other relevant information at hand, as well as a pen and paper to write down the important information given to you. This includes the name of the representative you are talking to, if they are authorized to give it.

Keep small talk to a minimum. If you were in the military, you might want to bring that up in conversation in case the customer service rep is also a veteran. Just be aware of cues you may be buzzing about for too long.

Use the bathroom before you call. It may sound silly, but you could be put on hold or it could take a long time to resolve your issue.

Don’t be offended when you are asked questions that may identify who you are or the nature of your call. The customer service representative is only making sure that they have the correct information and fully understand the nature of your call.

If the representative did a good job, let them know. Everyone likes to be appreciated.

If you have been granted an exception standard rules, do not share this information with friends or on social media. The same situation may not apply to others.

If you need to email, be sure to keep it concise. Include your phone number in case further clarification is needed. Do not write in capitals, different colors or use larger fonts for certain words.

Don’t tell the rep they “don’t care” even if you are frustrated. Of course they care. It is their livelihood.

Some of these things may seem cumbersome or boring. But remember that ultimately you want your problem solved. So try a little kindness and patience.

Telstra rolls out SMS scam filter in response to rise in questionable mobile text messages


Telstra is responding to a rise in fraudulent messages on its network with a filter designed to block texts before they reach mobile devices.

Scammers are increasingly targeting Australians with dubious malicious texts that use a range of clever tricks to trick people into handing over sensitive information, even to send money.

According to the Australian Competition and Consumer Commission’s (ACCC) ScamWatch, last year Australians lost $100 million to phone scams – that is, calls and texts – compared to $48 million dollars in 2020.

According to Telstra, reports of malicious text messages on Android devices rose from 50 in 2020 to 11,000 the following year.

In the past year, he says he blocked more than 100 million fraudulent calls.

So how does the scam SMS filter work and why has it taken so long for text messages to get a technology email has had for years?

The filter automatically analyzes the content and origin of the text

Telstra hasn’t said exactly how the technology works, other than that it automatically scans text messages for suspicious content and characteristics.

In a post on its website announcing the filter, Telstra said:

“We apply our knowledge of what fraudulent text messages look like to block them at the network level.

“Automatic machine scanning selects suspicious content such as malicious links and combines it with other patterns and characteristics such as time, sender, number of messages sent and recipient.”

It’s also not yet clear how effective the filter will be.

Telstra says it tested the feature in a pilot program with 2,500 employees over the past three months, and participants reported “a reduction in the number of fraudulent SMS messages they received”.

Other networks overseas have reported success with scam filters.

EE, a UK telecommunications provider, introduced a spam filter in July 2021.

In the three months that followed, he blocked more than 42 million spam and fraudulent SMS messages and saw an 85% drop in customer reports of fraudulent text messages.

Telstra says it will not block emergency alerts, government services or “commercial messages from banks and other large companies”.(Getty Images: Budrul Chukrut/SOPA Images/LightRocket)

Paul Haskell-Dowland, a computer and security expert from Edith Cowan University, said the filter would work like those that filter out spam from your inbox.

“It will look at message volumes to see if thousands of messages are coming from a single mobile number,” he said.

“And it will examine the content of the message and determine if it is a format that it has seen before and classified as spam.”

Messages that prove difficult to classify automatically can be checked manually, he added.

If that happens, Telstra said, “recipient details will remain hidden.”

Why did it take so long for text messages to pass a spam filter?

Although welcome, Telstra’s spam filter is an “incredibly late decision”, said Professor Haskell-Dowland.

More than a decade ago, spam cluttering inboxes had a “very real impact” on business, while the recent rise in malicious text messages has generally been an “end-user problem” – that’s i.e. a problem for individual customers, but not for the companies themselves.

Eventually, however, mounting public and government pressure led telecoms providers to do something about the problem, Prof Haskell-Dowland said.

“I suspect there was no commercial will to fix the problem,” he said.

In December 2020, the Australian Communications and Media Authority (ACMA) established an industry code aimed at reducing the number of fraudulent calls.

The Fraudulent Call Reduction Code, developed in partnership with the telecommunications industry, defines processes to identify, track, block and otherwise disrupt fraudulent calls.

This was a direct recommendation from the ACMA Action plan against scamspublished in November 2019.

This plan included a proposal to develop enforceable obligations for telecommunications providers to “implement and update SMS filtering technology” by the second quarter of 2020.

The ACCC has welcomed Telstra’s announcement today of an SMS anti-spam filter.

“The ACCC is pleased to see providers taking action to meet their obligations under the Call Fraud Reduction Code,” a spokesperson said.

“We will continue to monitor the rates of SMS scams received by the public to assess the effectiveness of the measures.”

How serious is the spam wave?

ACCC’s ScamWatch saw a 124% increase in SMS scam reports in the 12 month period to February 2022.

During this period, reported financial losses due to SMS scams have increased more than fivefold.

The actual figure is likely higher, an ACCC spokesperson said.

“Based on previous research by the ACCC, under-reporting is prevalent in all types of scams, so we can only assume that there are many more people affected by these scams and are not reporting them. not.”

Losses from SMS scams are dwarfed by those from phone calls.

Of the A$100 million lost to phone scams in 2021, SMS scams accounted for 10%.

The pandemic has seen more people working from home and isolating themselves from those around them, which has left them vulnerable to scammers, experts say.

Will this prevent politicians from sending me election text messages?

During the last federal election, Clive Palmer sent unsolicited text messages to millions of voters as part of his campaign.

An unsolicited text message from Clive Palmer's United Australia Party
Do you remember these? Although annoying to some, they are perfectly legal.(ABC News)

With another election soon to be announced, you may be wondering if the new filter will stop these texts, or those from another politician or party.

The short answer is that it won’t, Professor Haskell-Dowland said.

Federal Legislation Governing Spam via electronic communications enjoys an exemption for political campaign material, as long as it is not of a commercial nature.

“Clive Palmer’s posts fall into the campaign category, so it’s perfectly legal to send what many would consider spam.”

What if I’m not with Telstra?

If you are with a third-party provider that uses the Telstra network, your messages may still be filtered, depending on the agreement between Telstra and the provider.

Third-party providers are those that offer a telecommunications service but do not have their own physical network infrastructure. They are rather grafted onto one of the Telstra, Optus or Vodafone networks.

If you’re with Optus or Vodafone, chances are you’ll soon have a spam filter, Prof Haskell-Dowland said.

“I think what we’re going to see is a cascading effect now that a major vendor has introduced a filter.

“Over time this will become the norm, just as it has been with email.”

A Vodafone spokesperson said the company introduced a “sophisticated SMS firewall” in 2020.

“Our system blocked more than 522 million fraudulent text messages in the past year alone,” they said.

“During the same period, we also identified and prevented more than 26 million fraudulent calls from reaching our customers.”

Optus said it already has “advanced filtering and machine learning in [its] SMS systems”.

“While we don’t speak publicly about our security measures, we’re excited that more of the industry is putting similar systems in place,” a spokesperson said.

“Since December 2020, Optus has already blocked over 230 million fraudulent calls.”

Telstra will block millions of fraudulent text messages


Telstra has pledged to block the sending of millions of malicious texts to customer devices in a bold crackdown on criminal scammers.

Telstra has rolled out an Australian-first technology that automatically blocks fraudulent text messages at the network level before they have a chance to infiltrate mobile devices.

The telecommunications company will apply the new feature to all devices on its network from Thursday in what is expected to block millions of fraudulent text messages each week.

Its sophisticated technology uses a machine that analyzes and selects suspicious content such as malicious links, and evaluates them in conjunction with the time, sender, number of messages sent and recipient.

The delicate process protects the recipient’s identity while ensuring the delivery of legitimate messages such as emergency alerts and messages from banks, large corporations, government departments and Telstra apps like MessageBank.

As the technology becomes more and more intuitive, some potential fraudulent texts will be reported to Telstra specialists who will examine whether they are really malicious or not.

“Customers might be worried that we’re blocking legitimate text messages, but obviously we have a lot of protocols and procedures in place to make sure we don’t,” Telstra CEO and Managing Director Andy Penn told News. .com.au. .

Customers can also disable the feature if they wish.

Penn highlighted the company’s confidence in the technology’s effectiveness following a three-month internal trial that began in December with around 2,500 employees.

“These trials gave us great insights and helped develop the model, so we augmented it externally,” he said, adding that Telstra anticipated an increased need for the feature after the invasion. of Ukraine by Russia.

Malicious text messages to Android phones also rose massively from 50 reports in 2020 to 11,000 in 2021, which was largely attributed to the Covid pandemic and increased use of digital services.

“The overall level of text messaging has increased quite significantly during these times for these reasons and we’ve just seen scammers take advantage of it,” Penn said.

The technology, part of Telstra’s “Cleaner Pipes” initiative, was developed using a “complex and scalable” threat platform, he said.

“With the technique we’re using, we’ve built a platform of threats and analysis around identifying ranges of different sorts of things that give us a clue as to what’s malicious. Machine learning is getting better with time.

Unfortunately, with every advance in technology, criminals are never too far behind.

“For every day we implement one more, malicious actors become more aggressive and sophisticated,” Penn said.

Customers won’t have to do anything to enable the feature, but they will need to contact Telstra if they want it disabled.

Barack Obama lights up a dismal White House


It was apparently an event to celebrate the Affordable Care Act, signed into law 12 years and 13 days ago. But former President Barack Obama’s visit to the White House on Tuesday was more like a stump speech, a pep talk and a roast rolled into one.

Obama was quick to establish himself as the main event. “Thank you, Vice President Biden,” he said as he took the podium in the presence of President Biden.

He stopped as the crowd laughed. And then, perhaps trying to cover up a mistake, assured the crowd, “It was a joke. Everything was set up. (Obama’s aide Eric Schultz, seated in the back, shrugged, saying he wasn’t sure if it was a mistake or a planned joke.)

Either way, Obama did it again, this time referring to the president as “my brother, Joe Biden.”

Democrats have been weighed down lately by heavy themes of war in Europe, a lingering global pandemic, rising gas prices and plummeting approval numbers. Their own strategists are predicting heavy losses in the November election.

Obama to visit White House as Biden seeks reset

But on Tuesday, Obama’s re-emergence brought moments of levity — as well as, perhaps, fond memories, when the party catapulted the nation’s first black president into the White House, an inspirational figure who signed legislation into law. universal health care. This law has proven popular in the long term, even if it is divisive in the short term, perhaps a trajectory envisioned by the current administration.

Leading Democrats, including Interior Secretary Deb Haaland and Transportation Secretary Pete Buttigieg, thronged with administration officials and members of Congress to the ornate East Room of the White House.

Masks have been mostly abandoned. Obama waded deep into the crowd, freely doling out hugs. No one matched the enthusiasm of House Speaker Nancy Pelosi (D-Calif.), who held Obama’s hand, then pulled it closer and placed a kiss on it. Pelosi had been instrumental in the passage of the ACA.

Even Biden appeared somewhat supported, physically grabbing Obama’s shoulder at one point to guide him toward a member of the crowd.

The party was supposed to take place outside in the rose garden, but storm clouds and rain sent festivities inside.

“It’s good to be back in the White House,” Obama said, with his trademark deliberate cadence. Despite living in a mansion in Washington’s Kalorama neighborhood, about two miles from the White House, he had so far not been invited there for a public event.

Biden continued the jokes when he was introduced. “My name is Joe Biden and I was Barack Obama’s vice president,” he said to laughter from the room. “And I’m Jill Biden’s husband,” he added, which is his typical greeting.

Biden invoked some nostalgia, saying Obama’s return felt like the “good old days.” His presence seemed to evoke a pre-Trump era where political fights were fierce, but Democrats at least didn’t think the country faced an existential threat from the GOP, as many do now.

If Obama brought a burst of energy to the White House, it may have reflected not only the age difference of presidents – Obama is 60, Biden 79 – but also the reality that in many ways he is older. easier to be a former president than a current one.

Ex-presidents, after all, shed their responsibilities to lead the nation and the world and left torturous political struggles behind. In retrospect, their tenure is often viewed more favorably, with their popularity being higher than when they were in power.

Due to the pandemic, Biden has held few major events during his presidency, and his presidential campaign events have been severely limited. But even before that, during the Democratic primary, Biden events were known to start late and have little energy, unlike Obama’s 2008 campaign, which drew thousands to the streets in town after town. .

The lack of in-person communication has weighed on Biden’s public appearances a bit, as many of his speeches have been delivered before a professionally detached press corps lacking the kind of spark that comes from a room full of packed people.

Obama, noting the various changes in the White House since taking office, joked that Biden had demanded that US Secret Service agents wear aviators, a reference to Biden’s favorite sunglasses. He suggested the White House mess was replaced with a Baskin Robbins, referencing Biden’s love of ice cream.

“There’s a cat running around,” Obama added, referring to Biden’s new feline Willow, noting that his own dogs wouldn’t have been happy about that.

Obama has shown some willingness to shed light on his own weaknesses and difficult times, joking that the Affordable Care Act was so unpopular at first that he began to wonder if passing it would cost him the House. White.

Biden, as Obama looks on, to expand ACA eligibility

He gave some reasons for Americans’ initial reluctance to pass the law, largely blaming Republican attacks. But he was also self-critical, citing the near-disastrous rollout of the Obamacare website. “It didn’t help that when we rolled out the ACA, the website wasn’t working,” Obama said. “Not my happiest moment.”

The former president also appeared to offer a message to the liberal wing of the Democratic Party, which he often fought against when in office and which Biden now grapples with. “To get the bill passed, we had to compromise,” Obama said. “We didn’t get everything we wanted.”

And perhaps predictably, the former president played on one of Biden’s most famous gaffes, summing up the health care law by saying, “It was, to quote an American famous, quite a big deal.”

Biden was caught in a live microphone in 2010 congratulating Obama on passing the law saying it was a “great [expletive] OK.”

Biden also referenced the infamous moment before moving on to signing an executive order intended to bolster health coverage. “Barack, let me remind you, this is a hot mic,” he said.

Although the topic is health care, Obama and Biden have emphasized different themes. Obama focused on the nobles, saying the Affordable Care Act showed Democrats can achieve great things when they persist.

“That was the highlight of my time,” Obama said. “Because it reminded me, and reminded us, of what is possible.”

Obama teams up with Springsteen for a new podcast

Biden, when speaking later, stuck to a more immediate and practical message ahead of the midterm elections, saying the health care law and his own actions would lower monthly bills for families.

He said the ACA “protects Americans from shoddy coverage that can lead to a mountain of medical debt.”

Biden also noted that his US bailout “opened a special enrollment period” for the ACA, that he “quadrupled the number of browsers” helping Americans understand how to use the service, and that other states have expanded the Medicaid program.

Tuesday’s event also underscored Biden’s unique role in American history — he served as vice president to a black president and then chose a black woman as his own No. 2. Vice President Harris was among those who spoke, introducing Obama.

“The ACA is the most consequential health care legislation passed in generations in our country – and it’s something more,” she said. “The ACA is a statement of purpose, a statement about the nation we should be, where all people – no matter who they are, where they live or how much they earn – can access the health care they need. , no matter the cost.”

The Center asked to review the PIL for a uniform bank code for foreign exchange transactions


On April 5, the Delhi High Court directed the Center to seriously consider the issue raised in a Public Interest Litigation (PIL) requesting the implementation of a uniform banking code for foreign exchange transactions to control the black money generation and benami transactions.

A bench of Acting Chief Justice Vipin Sanghi and Justice Navin Chawla sent notice to the Center through the Ministries of Interior, Law and Justice and Finance, and asked them to respond to the petition.

Additional Solicitor General Chetan Sharma, representing the Centre, argued that the petitioner has raised a serious issue that needs to be addressed by the government.

The court, which scheduled the case for a rehearing on May 25, asked the Center to “seriously consider the matter” raised by the petitioner.

Petitioner and lawyer Ashwini Kumar Upadhyay has raised flaws in the system regarding the transfer of foreign funds which could be used by separatists, Naxals, Maoists, fundamentalists and terrorists.

During the hearing, the ASG said: “It [petitioner] raised a serious problem. We will think about it and come back. The problems are serious and important, they require a thorough examination.

The petition sought to ensure that Real-Time Gross Settlement (RTGS), National Electronic Funds Transfer (NEFT) and Instant Payment System (IMPS) are not used to deposit foreign money in Indian banks.

The petitioner said that not only does it harm India’s foreign exchange reserve but it is also used to supply money to separatists, fundamentalists, Naxals, Maoists, terrorists, traitors, conversion mafias and radical organizations like SIMI and PFI.

He argued that the immigration rules for a visa are the same whether a foreigner comes in business class or economy class, uses Air India or British Airways and comes from the United States or Uganda.

Similarly, details of deposits in Indian banks, including branches of foreign banks for foreign exchange transactions, must be in the same format whether it is an export payment to a checking account or a salary to a savings account or a donation to a charity checking account or service fees payable in YouTuber Accounts. The format must be uniform whether converted by Western Union, the National Bank or a foreign bank based in India, according to the plea.

“Certificate of payment abroad [FIRC] must be issued and all international and Indian banks must send the link via SMS to get the FIRC automatically in case foreign currency is deposited in the converted INR account. “Furthermore, only a person or company should be allowed to send Indian rupees from one bank account to another bank account inside Indian Territory through RTGS, NEFT and IMPS and international banks should not be allowed to use these national banking transaction tools,” it said.

The plea also demanded that foreign exchange transactions through Indian banks and branches of foreign banks in India must contain information such as depositor’s name and mobile number, International Money Transfer (IMT) not RTGS/NEFT/IMPS and currency name.

” You drive. U Text. The “U Pay” week has arrived. – KCSR/KBPY


This week it’s the national “U Drive.” U Text. U Pay” high-visibility enforcement effort with law enforcement officers across the country working together to enforce laws prohibiting texting while driving as well as distracted driving.

The Chadron Gendarmerie is one of the participating agencies. Sgt Patrick Young said the department receives a grant from the National Highway Traffic Safety Administration through the Neb Department of Transportation’s Office of Highway Safety.

Sgt Young says distracted driving has become a leading cause of road accidents, with texting while driving being the bulk of it.

Federal data shows that 26,004 people died in crashes involving a distracted driver between 2012 and 2019. Fatalities related to driver distraction rose 10% in 2019, the largest increase among causes that year.

Young says people know texting and driving is dangerous and illegal, but often give themselves a “personal exemption” to do it anyway, which unfairly puts others at risk – adding that this week, those who text and drive will pay.

Millennials and Gen Z are the most common distracted drivers, often using their cell phones to talk, text and browse social media while driving.

According to 2019 Traffic Safety Administration figures, 9% of people killed in crashes with teenage drivers died in crashes when those drivers were distracted.

Violating Nebraska’s distracted driving laws can be costly. There is a fine of $200-500 for using a portable communication device while driving and 3 points are added to your driving record.

Drive safely on every trip

Sergeant Young and NHTSA are urging drivers to put their phones away while driving. If you need to text, pull over and don’t drive while doing it. If you are the driver, follow these steps for a safe driving experience:

• If you are expecting a text or need to send one, stop and park your car in a safe place. Once you’re safely off the road and parked, you can safely text.

• Ask your passenger to be your “designated texter”. Allow them to access your phone to answer calls or messages.

• Do not engage in social media scrolling or messaging while driving.

• Cell phone use is addictive. Having trouble not texting and driving? Activate your phone’s “Do Not Disturb” feature or place your phone in the trunk, glove compartment or back seat of your vehicle until you arrive at your destination.

Texting while driving is dangerous and illegal. Break the cycle. Remember: U Drive. U Text. You pay. For more information, visit https://www.nhtsa.gov/campaign/distracted-driving.

SNL’s Michael Che Bangs Jada Pinkett Smith in Fierce Chris Rock Defense


With his stand-up tour in New Jersey this weekend, it must have been tempting for Chris Rock to drop by his old stomping ground to talk about what happened with Will Smith at the Oscars a while ago. barely six days. But instead, it was left to “Weekend Update” co-anchors Colin Jost and Michael Che to come to his defense. And they didn’t hold anything back.

“Intelligence officials say that Vladimir Putin is being misinformed by his advisers about the Russian military’s poor performance in Ukraine,” Jost began, diverting viewers, “which is a bit like Will’s agent Smith had told him, “You crushed him at the Oscars!”

Jost, who is married to Smith star Scarlett Johansson, later joked that the incident “was a shameful act that sets a terrible precedent for having to stand up for your wife at award shows”.

“During his acceptance speech, Will Smith said, ‘Love will make you do crazy things,'” Che added. “You know what else makes you do crazy things?” Crazy! But I understand where Will is coming from. I mean, you can’t expect him to just sit there and watch another man jump on his wife… without signing an NDA.

Che was even more pointed when he asked, “Can we stop pretending everyone knew Jada had alopecia? While we’ve heard about Jada and Will’s personal lives, you can’t expect us to take it all in. It’s like Kanye saying, “Don’t act like you don’t know I have psoriasis.”

“Just selfishly as a comedian, I’m tired of people putting their insecurities on our joking intentions,” he continued. “I mean, I can’t make a joke about the cold outside without someone yelling back, ‘Stop making fun of my little penis!'”

And finally, Che pointed out that Chris Rock “has been very public about his non-verbal learning disability, which means it’s difficult for him to understand non-verbal cues.”

“Kind of like when he saw an angry Will Smith charging towards him,” he explained, “instead of stepping away, he put both hands behind his back, smiled, and said, ‘ Uh oh. “”

Saskatoon police public service announcement showing wheelchair-bound gang member sends able message, disability advocates say


An image from a 2015 anti-gang awareness campaign by BC police is now drawing criticism for use in a campaign in Saskatchewan.

On Monday, the Saskatoon Police Department officially launched its Drop Gangs initiative, which provides education and resources about the realities of gang life.

On Thursday, people on social media were drawing attention to an image on the Drop Gangs website showing a man in a wheelchair with the text “Want to ride like a gangster?”

The word “roll” is underlined in yellow, to highlight a play on “roll with”, or being involved in a gang and rolling in a wheelchair.

The image was released by Saskatoon Police but was not created by the police department.

“I think it really communicates something that’s really damaging to people with disabilities and people who use wheelchairs as their primary mode of transportation,” said Dale Wilson, who is completing his master’s degree in disability studies at the University of Manitoba.

She criticized the use of the image in a tweet on Friday.

“It was just problematic in the way it felt like, ‘Oh, if you stay in the gang, you’re going to end up in a wheelchair,’ and that would be a terrible thing,” she said.

“The reality is that if you live long enough in this world, you will develop a disability. And then the realities of ableism become very prevalent for you,” Wilson said, referring to discrimination and social prejudice against people with disabilities and people who are perceived as disabled.

Wilson added that while the material was not originally produced by Saskatoon police and has since been removed from his Drop Gangs website, it was the image that was posted in the first place. .

“I think the lesson is, you know, look at your sources and consider how someone in the community might view this image.”

Dale Wilson, who lives in Saskatoon, is currently completing his Masters in Disability Studies at the University of Manitoba. (Zoom)

Kayleigh Kazakoff was also among those who tweeted about the image, which she first spotted on a Reddit thread.

In a direct message to CBC News, she also called the message ableist, while acknowledging that the intention was to show “the possible effects of gang life on life.”

“I can’t speak to the effectiveness of the rest of their campaign, but that particular message was hard to see,” said Kazakoff, who lives with a chronic illness and uses a cane intermittently.

“A few decades from now, I’ll probably be using a wheelchair at least some of the time. Insinuating that using a wheelchair is some kind of horrible fate, when it’s an aid to accessibility so common, was quite frustrating to watch.”

Image from the 2015 awareness campaign in British Columbia

In an email, Brad Jennings, spokesperson for the Saskatoon Police Department, said the department issued an apology to those who raised concerns.

The service also shared a statement on Twitter, thanking people who complained “for sharing the impact this image has had.”

“Although the material was not produced by SPS/Drop Gangs, we recognize how it caused damage,” the Twitter statement read. “We are looking to do better in the future.”

The image originally comes from a 2015 awareness campaign video titled End Gang Life, created by British Columbia’s Combined Forces Special Enforcement Unit.

As of April 1, the video has been posted on both the law enforcement unit’s website and YouTube, with over 9,300 views.

The video’s caption describes the initiative as a “comprehensive gang education, prevention and awareness campaign that uses bold, emotional and visually impactful imagery and messaging.”

Another description on the End Gang Life website states that the stories told are “vivid and captivating” and “are universal and can be shown to anyone in any community and still have an impact”.

British Columbia’s special law enforcement unit did not respond to a CBC News request for comment.

New anti-gang program

Jennings noted that there is currently no ad campaign for the Drop Gangs initiative.

In a press release Monday, the Saskatoon Police Department said the program provides education and awareness for outlaw motorcycle and street gangs in Saskatoon.

Saskatoon police “have seen other programs, particularly in British Columbia, that have been very successful and are fortunate to be able to partner with them to share information and resources,” said Patrick Nogier, superintendent. of the Saskatoon Police Criminal Investigations Division, in the Liberation.

In addition to the website, the Drop Gangs initiative features a branded vehicle that “works like a rolling billboard.”

Saskatoon police said the program and vehicle were paid for with proceeds seized from the criminals.

The service plans to take the vehicle out at community events, outlaw motorcycle gang events and, upon request, educational presentations. He will also be present during warrant executions where gangs, drugs and organized crime are involved, according to Saskatoon police.

The 1K Project has raised $3.5 million to help Ukrainians


Alex Iskold

Courtesy: Alex Iskold

Just over a month after Russia’s assault on Ukraine, Alex Iskold tries to take into account the reality of his native country while lending a helping hand as best he knows how.

Iskold, who immigrated to the United States from Ukraine at age 19, is a venture capitalist and managing director of 2048 Ventures in New York. He is also a technology entrepreneur and co-founder of the 1K projecta non-profit organization that allows anyone to donate $1,000 directly to a Ukrainian family.

So far, the project has raised over $3.5 million and helped 3,500 families. But Iskold, now 49, knows the crisis ahead for Ukraine, a country of 44 million people, is about to get worse no matter how much fighting ends.

More than 4 million Ukrainians fled to neighboring countries, more than half of whom entered Poland, as the Russian army shelled population centers. Millions more will certainly lack basic necessities in the distant future and will need money for food, medicine, clothing and transport.

“There are many ways to donate, but when you donate directly, you know a family is better off because you helped them,” Iskold said in an interview.

For a family of three to four, $1,000 only lasts about a month, he said. With more than 70,000 families already waiting for help and more and more applications arriving every hour, the project needs individual and corporate sponsors to keep contributing.

“This is a strong call to action as businesses could make a significant difference, and we are confident we are the right vessel to deliver aid,” he said. “I hope companies can step in and help us reach more families.”

The concept behind Project 1K is simple: an individual donates $1,000, which is sent directly to a Ukrainian family.

“Coping Mechanism”

Iskold started the 1K project for a different purpose. Him and Chrysi Philalithes, a fellow entrepreneur and start-up investor, created it in 2020 to help Ukrainian families during the Covid-19 pandemic. Iskold revived it when Russia invaded Ukraine.

“For me, the 1K project is an outlet, a coping mechanism,” said Iskold, who left Ukraine in the early 1990s to escape anti-Semitic persecution. “I could be sitting on the couch watching TV for hours, or I could be helping out in a different way.”

The 1K Project team consists of more than 50 volunteers, many of whom work 10-hour weeks, from across the United States as well as Latvia, Ukraine, France, and Kazakhstan. The operations team, responsible for reviewing family applications and responding to sponsors, includes high school students and Iskold’s own children. Engineers come from companies such as Techstars, Yahoo, Mozilla, Venmo, and Citigroup.

“We have the best engineering talent I’ve ever seen,” Iskold said. “They move at the speed of light.”

The group needs it because “the engineering challenge is huge,” Iskold said, adding that his experience with distributed systems helped him develop the technology. The team, on the other hand, collaborates using software such as AirTable, Slack, Notion and Front.

“It’s just this amazing combination of code and people that we use to get the job done,” he said.

To request assistance, families complete a single form. They need a bank card that accepts local currency to receive assistance. Of the applicants, around 40% are still in their hometown in Ukraine, 20% are refugees outside the country and 40% are displaced.

Once a volunteer reviews an application, this information is passed on to a sponsor, who then sends the money by Wise, a multi-currency money transfer service. The money is deposited directly into the family’s bank account so that the funds are accessible even if they are on the move.

Alex Iskold

Courtesy: Alex Iskold

“We wanted the system to exist and have been constantly writing code while we’re funding families,” Iskold said. “We’re almost 100% automated where possible, including checking apps for basic errors. Still, support emails and texts for families and sponsors keep us busy.”

Crypto is a popular option

Cryptocurrencies can also be donated. When this happens, they are sold for cash, which is sent to families using Wise and converted into Ukrainian currency, the hryvnia. A partner organization called Open Collective accepts donations over $1,000, whether in cash, stocks, or cryptocurrency.

People have taken advantage of the crypto option in creative ways, Iskold said. meta angelsa community of people working on digital art in the form of non-fungible tokens, created a set of unique NFTs and sold nearly $50,000 for the 1K project.

Iskold said there is a widespread sense of responsibility people feel towards helping Ukrainians. Many are watching the war unfold and looking for ways to help.

Ukrainian officials have pushed for a ceasefire agreement and a resolution to the humanitarian crisis sparked by the Kremlin invasion. At peace talks in Istanbul on Tuesday, Russia said it would scale back its attacks on Ukraine, but military forces continued to carry out strikes around the capital, kyiv.

Iskold’s efforts are not enough to deal with the devastation, but for some families, that may be all they have.

“The 1K project is a bridge until affected families can get back on their feet,” he said.

LOOK: Russia calls for reduced military action near kyiv

Is it OK to use SMS for 2-factor authentication? [Ask ZDNet]

Is it OK to use SMS for 2-factor authentication? [Ask ZDNet]

Welcome to the first episode of a new weekly advice column, Ask ZDNet. It’s an age-old editorial format, like Dear Abby, but with a much better understanding of modern technology.

This week, we tackle three tricky questions: Is texting too dangerous to be used as a second factor in 2FA? Do you really need Windows 11 Pro edition? And why do batteries in smoke detectors always seem to die in the middle of the night?

If you have a question about any of the topics covered by ZDNet, one of our editors and contributors probably has an answer. If they don’t, we’ll find an outside expert who can point you in the right direction.

Questions can cover just about any work and technology-related topic, including PCs and Macs, mobile devices, security and privacy, social media, home office equipment, consumer electronics, business etiquette, financial advice… well, you get the idea.

Send your questions to [email protected] Due to the volume of submissions, we cannot guarantee a personal response, but we promise to read every letter and respond here to any that we think will be of interest to our readers.

Ask away.

Is it OK to use SMS for 2-factor authentication?

I know I’m supposed to use 2-factor authentication for everything, but I keep reading that using text messages for 2FA is dangerous. Should I really be worried about this? What are my alternatives?

First things first: yes, setting up 2FA is a crucial security step for any important online account. When this form of authentication is enabled, you must provide a second proof of your identity when you first sign in to an online service on a device. If your password is stolen during an online data breach or someone tricks you into giving it up, the attacker can’t access your account because they don’t have access to a second authentication factor. (For a detailed explanation, see “Multi-Factor Authentication: How to Enable 2FA to Boost Your Security.”)

The most basic form of 2FA involves a text message, sent via SMS to a phone you previously registered with your account. After typing your password, you receive a text message with a code that you enter as the last authentication step.

SMS-based 2FA is absolutely better than no 2FA. But it’s vulnerable to a variety of attacks, including SIM swapping, where the bad guy is able to intercept SMS messages and take control of the account. This type of attack is labor intensive and is more likely to target a high-value account, such as someone working in the help desk of a large company. But even if you’re not the target of a global hacking network, it’s a good idea to avoid SMS authentication whenever you can.

There are two great alternatives to SMS-based 2FA codes. The first is a free authenticator app, which generates 2FA codes or receives approval prompts right on your phone. (For more details, see “Protect Yourself: How to Choose the Right Two-Factor Authentication App.”) For maximum security, consider a physical hardware key that you connect via USB or NFC. Hardware keys cost more and aren’t as easy to use, but they’re great for high-value accounts that need extra protection. (See “YubiKey Hands-on: Hardware-based 2FA is more secure, but watch out for these pitfalls.”)

Where are all the PCs with Windows 11 Pro?

I’m ready to buy a new PC, but all the PCs I see for sale at my local outlets are running Windows 11 Home Edition. Should I upgrade to Pro? How to do without spending a fortune?

As you have noticed, the PC industry is extremely price sensitive. The reason you see so many PCs running Windows Home Edition is that it costs PC makers less than the Pro Edition, allowing them to lower the price of a PC model by around $100.

For most consumers, the Home edition is good enough. However, businesses that run on Windows corporate networks need the Pro edition because it requires joining a PC to a Windows domain or Azure Active Directory account and then managing that PC with the group and mobile device management software.

The Pro edition has a few extra features you might be willing to pay for, especially if you plan to use your PC for business.

  • It supports full BitLocker encryption without requiring the user to sign in to a Microsoft account. It also enables the use of Windows information protection features for secure document sharing.
  • You can use the full Hyper-V virtualization platform to create and run virtual machines.
  • You can configure the Pro edition to be a remote desktop server, allowing you to connect to it remotely from another Windows PC (even one running the Home edition) or from a Mac or mobile device.
  • Instead of installing updates on Microsoft’s schedule, you can set up custom schedules for devices, deferring updates for up to 30 days while you wait for others to encounter bugs related to the update.

But that’s about all.

If you prefer a PC that comes with Windows 11 Pro (or Windows 10 Pro, for that matter), your best bet is to look online, where you can find stores specializing in PCs designed for business. You can also go to online resellers like Dell, who will be happy to configure a PC to your specifications. Adding the upgrade to Windows Pro usually costs between $50 and $80.

Or you can buy one of these PCs with the Home Edition installed and upgrade it yourself.

If you have a license key for a Pro or Business edition of Windows 7, Windows 8.1, or Windows 10, you can use it to upgrade. (Instructions here: “How to upgrade Windows 10 Home to Pro for free.”)

You can also purchase the Pro license online. The full retail price is $200 (ouch) on the Microsoft Store. You can find legitimate discounts of around $50 from other online retailers, but be wary of any discount more generous than that. If you see someone offering a “lifetime license” for Windows 11 Pro for $49, chances are the seller isn’t authorized to distribute that license, and there’s a chance (small, but not void) that Microsoft may revoke your license key in the future.

How do I silence this smoke alarm chirp?

The smoke detector mounted in the ceiling of my bedroom started ringing again last night, waking me from a restful sleep. I’m tempted to disconnect it completely. Do you have any suggestions on how to set things up so I can get an uninterrupted night’s sleep again?

According to the folks at Kidde, which makes smoke detectors, there’s actually a reason for those chirps in the night.

As a smoke alarm battery nears the end of its life, the amount of energy it produces causes internal resistance. A drop in ambient temperature increases this resistance, which can impact the battery’s ability to provide the power needed to operate the unit in an alarm condition. This battery feature can cause a smoke alarm to go into low battery beep mode when the air temperature drops. Most homes are coolest between 2 a.m. and 6 a.m.

Now that we’ve fixed that, please do not unplug your smoke detector. It can literally save your life by giving you early warning of a fire so you have time to escape. Modern alarms can also detect another potential killer: odorless but deadly carbon monoxide.

The easiest solution is to set a schedule reminder to change these batteries around the same time every year, using new, high quality lithium batteries. Do not use rechargeable batteries and do not use batteries that have been stored for some time. For those of us in the northern hemisphere, Halloween is a good date, in my experience, as it leads into winter when windows are likely to be closed most of the time and house fires ( and carbon monoxide poisoning) are statistically more likely.

If you’d rather avoid this annual chore, get batteries specifically designed for long-term use in smoke detectors and other critical devices. the Energizer Ultimate Lithium Battery, for example, is designed to last 10 years, which is also how often most smoke detectors need to be replaced. Don’t forget to set a calendar reminder in a decade to replace those batteries!

Send your questions to [email protected]. Due to the volume of submissions, we cannot guarantee a personal response, but we promise to read every letter and respond here to any that we think will be of interest to our readers. Be sure to include a working email address in case we have follow-up questions. We promise not to use it for other purposes.

Inside Ginni Thomas’ ‘insane’ hiring memos for former President Donald Trump


Years before becoming one of President Donald Trump’s most prominent coup supporters, Ginni Thomas was already notorious in her West Wing for, among other things, ruining employees’ afternoons by dragging Trump into fits of vengeful rage.

“We all knew that within minutes of Ginni leaving his meeting with the president, he would start yelling about firing people for disloyalty,” a former senior Trump administration official said. “When Ginni Thomas arrived, you knew your day was ruined.”

Since becoming a welcome guest at Trump’s residences, Thomas – an influential and longtime conservative activist, and wife of Supreme Court Justice Clarence Thomas – had developed a tried-and-tested formula for captivating and manipulating emotions. and the mood of the president. On several occasions throughout the Trump era, Thomas would show up at the White House, sometimes for a private meeting or lunch with the president. She often came armed with written memos outlining who she and her allies think Trump should hire for plum jobs — and who she thinks Trump should quickly purge — that she handed out to Trump and other highs. government officials.

The fire lists were particularly problematic, as they were often based on pure conjecture, rumor, or settling of scores, where even staunchly MAGA wizards were targeted for membership in the “Deep State” or other so-called coalition. saying anti-Trump, according to people who saw them during the Trump administration. The recruiting lists were so often filled with infamous fanatics and conspiracy theorists, woefully underqualified names and obvious close friends of Thomas that several senior Trump aides laughed at them, i.e. until Trump forces his staff to put certain names through the official vetting process, three sources familiar with the matter said.

“Those fucking lists were so crazy and unenforceable.”

— a former Trump White House official

During the Trump years, these memos would astonish various administration officials, including those who worked in the White House Presidential Personnel Office (PPO). Some of those officials noted that as Trump’s tenure continued, the Thomas lists would increasingly feature a disproportionate share of names more suited to an OAN guest list than any functional government. . (To be fair, long before Ginni Thomas became a regular visitor, Trump regularly hired people because they entertained or excited him, via Fox and other cable appearances.)

PPO officials routinely annotated the margins of Thomas’ hiring lists, usually including a single line for each rejected name, explaining why potential hires hadn’t worked out. Some failed background checks or suffered security clearance delays. Other annotations noted that a specific person was offered a job in the Trump administration, but turned it down for some reason.

Sometimes the reason for the White House’s preemptive rejection, despite Thomas and Trump’s best efforts, was more outlandish. According to someone who reviewed one of Thomas’ listings, an annotation for a MAGA job applicant noted that this person had made too many extreme or offensive jokes on social media that were still visible.

Another such annotation claimed that a recommendation for a position in the Trump administration was, in fact, a suspected foreign intelligence asset, or a spy.

Thomas did not respond to requests for comment on this story.

Over the years, some of the specific names Thomas had compiled and pushed at Trump and his West Wing have leaked out in the press. Among them were Fox News personality Dan Bongino and Trump-adoring Sheriff David Clarke.

And according to two sources familiar with the matter, Thomas would have, in vain, advised the president at the time to hire Frank Gaffney.

Gaffney, a former Pentagon official in the Reagan administration, has spent the past two decades embracing some of the most absurd conspiracy theories circulating on the far right. He has accused conservative anti-tax crusader Grover Norquist of being a Muslim Brotherhood secret agent and believes US adversaries are working on secret ‘electromagnetic pulse’ weapons frying electrical devices to bring America back to the era. preindustrial.

“These fucking lists were so crazy and unworkable,” said a former Trump White House official who had to personally deal with the memos Thomas provided and Trump’s fascination with them. “Many of them were dripping with paranoia and read as if they were written by a disturbed person.”

After Thomas left, he was soon summoning various government personnel—the West Wing brass, national security aides, lawyers, and other underlings, depending on proximity or occasion—to informing them that he had just spoken to “Ginni”.

Trump would then identify an official — or, at times, he would rattle off a string of names — who he said should be fired “immediately,” according to people familiar with the matter.

When they could get away with it, many of these Trump administration hands slowly followed these Thomas-inspired firing guidelines and waited for Trump to invariably forget about him, calm down, and move on to other fixations and holds. Others would rush to try to calm Trump down themselves, advising their boss to reconsider, telling him that a firing or a bigger purge midway through Trump’s term would make him look bad or attract negative media attention. .

Thomas’ interactions with the Trump administration have taken on new meaning since the Jan. 6 House Select Committee released text messages showing her urging Trump’s chief of staff, Mark Meadows, to help nullify the election of 2020. Committee members are now seeking to interview Thomas, whose efforts to overturn the 2020 election included attending a “Stop the Steal” rally on the National Mall on the day of the uprising.

“Trump loved talking to Ginni so much because he loved hearing who a Never Trumper was, or supposedly one. He liked people who flattered him, [as Ginni would do]said Stephanie Grisham, a former White House aide to Trump who has since had a very public falling out with the ex-president. “But also, apart from his obsession with loyalty, he loved to chat – all the time. It’s something else he took away from his series of meetings at the White House with Ginni Thomas.

In text messages released by the committee last month, Thomas defended Sidney Powell, the “Kraken” attorney whose election conspiracy theories were so outlandish they landed him a billion-dollar libel suit, contempt for rank-and-file Republican officials and punishment from a Michigan court. At the time, a number of Trump aides were trying to steer the president away from Powell over her increasingly outlandish comments about bogus voter fraud. Thomas, however, urged Meadows not to give in to mainstream Republicans, according to The New York Times.

In his texts with Trump’s consigliere, Thomas also showed a fondness for Steve Pieczenik, a far-right pundit and former co-author of Tom Clancy whose conspiracy theories and false claims were so outlandish that even InfoWars told him. briefly blocked from appearing on the network. Before he began posting fake stories about watermarked fraudulent ballots that won Thomas’s endorsement, Pieczenik had pushed QAnon conspiracy theories, claimed to have arrested Pope Francis and told false stories about mass shootings. important being false flags.

During the Obama administration, Thomas and Gaffney participated in a conservative messaging effort known as “Groundswell”. The group, an informal network of conservative journalists, pundits and political operatives, met regularly at the offices of the right-wing activist group Judicial Watch to coordinate talking points opposed to the Obama administration’s agenda. and plotting the ousting of supposedly moderate Republicans like Karl Rove. of the broader conservative movement.

The revelation of Thomas’s texts with Meadows prompted the Jan. 6 Committee to request an interview with her, according to CNN, but that effort falls far short of the more legally binding option of a subpoena.

In the meantime, congressional Democrats are split on how to handle Thomas’ cameo in the Jan. 6 scandal. Some, like Oregon Sen. Ron Wyden, have called on Thomas to recuse himself from Jan. 6-related cases while others like Rep. Alexandria Ocasio-Cortez have called for him to resign or be impeached.

But the lack of a Democratic supermajority in the Senate means neither of the Thomases will likely have to give up their jobs just yet.

DC Church Focuses Its Sunday Message On Helping Former Prisoners


The National Community Church, a multi-site congregation based in the district, has planned a timely message for its members this Sunday: Give former prisoners a second chance.

The Reverend Mark Batterson, the Assemblies of God minister who leads the 5,000-member congregation, said it was “a pure expression” of the Christian gospel to help those coming out of prison find work, a housing and other services to prevent them from reoffending and returning to prison.

Mr Batterson and his church are among congregations nationwide taking part in ‘Second Chance Sunday’, an initiative of Prison Fellowship, the outreach founded by the late Chuck Colson after Nixon’s former aide was imprisoned for misdemeanors during Watergate.

The organization specializes in inmate family support programs, helping prisoners find spiritual direction, and working with released convicts to start their lives over.

April is designated by the group as “second chance month,” to draw attention to the needs of returning inmates, and the group received a boost on Thursday when President Biden issued a House proclamation White for this purpose.

Kelly Friedlander, Prison Fellowship’s senior vice president of marketing and communications, said it was important that congregations such as Mr Batterson’s were on the front lines of helping families with an inmate behind bars or who is returned to society.

“The church is called to care for people who are in prison,” Ms Friedlander said. “Unfortunately, from the surveys we do with Barna Research, we know that incarceration and criminal justice issues are not often discussed from the pulpit. Our goal is really to provide materials to enable pastors and congregational ministers to easily raise the issue with their, with their congregations, to really begin to raise awareness of the role that the church plays in caring not only for people who are incarcerated, but also their children and their families.

Mr Batterson, a best-selling author who has published 22 books, told the Washington Times that letters from inmates who read his posts were part of the motivation to take action.

“One way or another, these books get into the hands of those who are in prison,” he said in a telephone interview. “I have received thousands of letters over the past 15 years, and we have a small group that prays over those letters and where we can we try to step in and be helpful and be a voice of encouragement and love.”

The “Second Chance Sunday” message, Mr Batterson said, will be to encourage church members who are in business to hire released prisoners.

“Finding a job is much harder” as a former offender, he noted, “especially if you have a crime on your record.”

According to the Prison Policy Institute, a nonprofit, nonpartisan research group in Northampton, Mass., poverty is “the strongest predictor of recidivism” among released prisoners, whose unemployment rate is 27 percent, or just over seven times the overall US unemployment rate of 3.8. % for February 2022.

Mr Batterson said helping those who have returned from prison find work is a way of living the message he preaches every week.

“The driving force behind it all is that Jesus had a huge heart and was moved with compassion for those in need,” Mr Batterson said. “And we want to be like Jesus, we want to love our city in a practical and spiritual way.”

He said the 1.5 million children with a parent in prison and the 70 million adults with criminal records deserve help.

“It’s caring for those who need a second chance,” he said. “Last time I checked, there’s not a single person who didn’t need a second chance, a third or a 100th chance. Every number has a name, every name has a story, and every story matters to God.

Ms Friedlander from Prison Fellowship added: “The message we are trying to get across with Second Chance Month is that once people have paid their debt for the crime they have committed, we really call the church and communities at large to ensure people have a chance to succeed. »

PAN-Aadhaar Liaison Deadline March 31: All About Process, Status Verification and Sanction

NEW DELHI: Deadline for linking Permanent Account Number (PAN) to Biometric Aadhaar is March 31st.
In accordance with Section 139AA of the Income Tax Act 1961, it is mandatory for all users to link PAN to their Aadhaar number otherwise the former will become inoperative from 31st March 2023. This would mean that users will not be able to make trades where PAN listing is mandatory, such as mutual funds.
It should be noted that, for those who miss the deadline, PAN will remain functional for 1 more year until March 2023, for ITR filing, refund request and other IT procedures.
In order to mitigate the inconvenience to taxpayers, as per the notification dated March 29, 2022, a window of opportunity has been provided to taxpayers till March 31, 2023 to make their Aadhaar known to the prescribed authority for binding Aadhaar -PAN without suffering any repercussions, the CBDT said, adding that such an intimation should be accompanied by late fees.
The government has extended the deadline several times over the past few years. In September last year, the last date was extended from September 30, 2021 to March 31, 2022 following the challenges faced by people due to the coronavirus pandemic.
Aadhaar is issued by the Unique Identification Authority of India (UIDAI) to an Indian resident and PAN is a 10-digit alphanumeric number assigned by the Income Tax (IT) Department to a person, company or entity .
According to available data, till January 24, 2022, more than 43.34 crores of PAN have been linked to Aadhaar. Over 131 crore Aadhaar cards have been issued so far. The PAN-Aadhaar linkage would help eliminate duplicate PANs and combat tax evasion.
In a tweet, the Central Board of Direct Taxes (CBDT) reminded users to respect the latest date and to link PAN to Aadhaar to help with quick verification of tax returns (ITR).

How to bind:
* Visit the IT department e-filing portal (www.incometaxindiaefiling.gov.in)
* Under ‘Quick Links’ section, click on ‘Aadhaar Link’
* Enter PAN, Aadhaar number and other required details.
* Tick the box only if the year of birth is mentioned on your Aadhaar card then tick the box to agree to validate your Aadhaar details with UIDAI.
* Enter the captcha code on your screen (visually impaired users may request a one-time password, or OTP, instead of the captcha code).
* Click on the ‘Aadhaar Link’ tab.
Alternatively, it can also be linked by SMS:
* Send SMS from Aadhaar’s registered phone number to 567678 or 56161.
* SMS must be in the format: UIDPAN
* Make sure space between UIDPAN, your Aadhaar number and PAN
How to check status:
* Visit the IT department e-filing portal (www.incometaxindiaefiling.gov.in)
* In the “Quick Links” section, click on the “Aadhaar Link Status” option
* In the screen that opens, enter your PAN and Aadhaar number
* Click “View Aadhaar Link Status”
* A pop-up window will appear on your screen confirming the status
Penalty for non-compliance
In a notification, the CBDT had said that Aadhaar’s delayed notice will incur a late fee of Rs 500, in cases where it is bound within the next 3 months or by June 30, 2022.
Subsequently, Rs 1,000 should be paid by taxpayers as a penalty.
Non-binding of the PAN with Aadhaar will lead to the ineffectiveness of the PAN. It can be re-operationalized upon payment of a penalty payment, indicates a CBDT notification dated March 29.
As mentioned above, after March 31, 2023, the PAN of taxpayers who fail to make their Aadhaar known, as required, will become inoperative and all consequences under the law for not providing, suggesting or quoting the PAN will cease. will apply to these taxpayers, the CBDT added.
While PAN is used for various transactions such as opening a bank account, buying real estate or proof of identity, inactive PAN will trigger a domino effect and people who have not linked their Aadhaar can face multiple challenges.
“Once your PAN becomes inactive, the person will be unable to engage in financial transactions (where PAN listing is mandatory such as mutual funds), subject to TDS at higher rates and penalty under section 272B,” Nangia Andersen LLP partner Neeraj Agarwala told the news agency. PTI.
(With agency contributions)

New focus on how Trump tweet incited far-right groups ahead of Jan. 6


The next day, according to prosecutors, Mr. Reffitt began making arrangements to travel to Washington and arrive in time for “Armageddon all day” on Jan. 6, he wrote in the Three Percenters group chat. He told his compatriots he planned to drive because flying was impossible with “all the battle rattle” he planned to bring – a reference to his weapons and body armor, prosecutors say.

Some members of the group seemed to share his anger. On Dec. 22, a member wrote in the chat, “The only way you can do anything in DC is to get the mob to bring the traitors out.”

Mr. Reffitt replied: “I don’t think anyone going to DC has another schedule.”

The House committee also highlighted how the tweet set off a chain reaction that galvanized Mr. Trump’s supporters to begin military-style planning for Jan. 6. As part of the congressional inquiry, investigators are trying to establish whether there was coordination beyond the post that links Mr. Trump’s inner circle to the activists and whether the groups conspired together.

“This tweet could be taken as a call to action,” said Rep. Pete Aguilar, a California Democrat and committee member. “It’s certainly something we ask questions about in our discussions with witnesses. We want to know if the president’s tweets have ignited and mobilized people to take action.

On the day of publication, participants in TheDonald.win, a pro-Trump discussion forum, began sharing tactics and techniques for attacking the Capitol, the committee noted in a report released Sunday recommending contempt of charges. of Congress for Dan Scavino Jr., Mr. Trump’s former deputy chief of staff. In a forum thread linked to the tweet, the report pointed out, an anonymous poster wrote that Mr. Trump “can’t exactly tell you openly to revolt.” It’s the closest he’ll ever get.”

Lawyers for the activists have repeatedly said the groups were simply acting defensively as they prepared for January 6. They were genuinely concerned, the lawyers said, that left-leaning counter-protesters would confront them, as they had at previous pro-Trump rallies.

Mr Trump’s post came as his efforts to cling to power shifted from the courts, where he had little success, to the streets and challenging the certification process that would take place on January 6.

Masks, vaccines and ventilation among ‘common sense’ measures to take as sewage signal increases


As the level of coronavirus appearing in Ottawa’s sewage continues to climb steadily, an epidemiologist says public health officials need to step up promotion of the importance of mask-wearing and three-dose vaccinations.

Raywat Deonandan, an epidemiologist and associate professor at the University of Ottawa, said the city doesn’t need to reinstate more public health restrictions, but some “common sense measures” need to be reconsidered.

“The biggest thing public health can do is not let the narrative that COVID is over become dominant because COVID is not over, we still have work to do,” Deonandan said.

On Monday, Ottawa’s COVID-19 Wastewater Monitoring Team reported that the average level of coronavirus in the city’s wastewater had reached the same level as the peak of the first Omicron wave last January.

Deonandan said the increase is neither a surprise given the recent lifting of public health restrictions nor a cause for panic.

“No one here panics”

At this point in the pandemic, he said people know how to protect themselves by wearing masks, improving workplace ventilation and rolling up their sleeves for a third dose of the vaccine.

“No one here is freaking out or crying woe from the rooftops,” Deonandan said.

“The important part here is the communications narrative, making sure people understand that there are still things they need to do to protect themselves and each other.”

The last time Ottawa saw similar levels of coronavirus in the city’s sewage was in January, when stricter public health measures were already in place.

Dr. Doug Manuel, physician and senior scientist at The Ottawa Hospital, said he is monitoring the current rate of increase as it will help indicate the level of community immunity.

Gradual-sloping patterns suggest it will be a more modest surge than the city saw in January, he said.

“So we’re paying attention to what we’re seeing in Europe and other places where it’s growing quite rapidly,” he added.

Dr. Doug Manuel of The Ottawa Hospital says Ottawa is still not seeing the full effect of lifting restrictions. (The Ottawa Hospital)

Manuel said Ottawa is seeing an increase in test positivity among youth and young adults, ages 15 to 25, a population that may be less likely to be hospitalized.

“The people who are getting sick now may not be the ones who are going to affect vital services or be hospitalized in a few weeks,” Manuel said, adding that the city still hasn’t seen the full effects of the restrictions. lifting.

In early January, Ontario canceled its reopening plan to allow the province to preserve hospital capacity while accelerating the rollout of booster doses.

Currently, 62% of Ottawa residents aged 12 and older, the groups eligible for three doses of the COVID-19 vaccine, have received all three. This represents approximately 54% of the city’s total population.

This bar graph shows immunization coverage by age in Ottawa as of Monday. Only people aged 60 and over have more than 80% coverage for third doses; those under 30 have less than 50%. (Ottawa Public Health)

Stable hospitalization rates

Despite rising sewage indicators, hospitalization rates in Ottawa have remained fairly stable.

This includes at CHEO: On Sunday, the Children’s Hospital Dashboard showed four COVID admissions where the primary reason for admissions was COVID-related.

We are moving into a space where individuals and their families must choose how, rather than being mandated, to best protect themselves.— Ottawa Public Health

Tammy DeGiovanni, senior vice president of clinical services and chief nursing officer at the hospital, said ER volumes increased through February and into March, but that’s typical of the season.

She called it “regular emergency service” with a mix of injuries, as well as respiratory illnesses and many different reasons, and there’s no “big theme”.

She also advocates for masking and vaccinations, but said she believes public health officials are also spreading those messages as best they can.

Choose how to protect yourself

In a written statement, Ottawa Public Health said it would continue to monitor key COVID-19 indicators, including hospitalizations, and assess options if they begin to “elevate in a concerning manner.”

The health authority continues to encourage mask use as an extra layer of protection and recently launched a risk reduction webpage to help individuals and families assess their level of risk for serious consequences.

“We are moving to a space where individuals and their families must choose how, rather than being mandated, to best protect themselves,” the statement said.

WATCH | The parent still does not feel safe after two years:

Ottawa parent says end of mask forces ‘abandonment of science’

Ellie Baird says she is disappointed that after two years of diligently adhering to public health guidelines, her family still does not feel safe due to the end of restrictions. 1:04

Caesars March Madness Promo Code: $1,100 Elite Eight Bet Insurance

Bet the March Madness Bracket risk-free Claim this offer 21+. New customers only. NY, AZ, CO, CT, IA, IL, IN, MI, NJ, PA, TN, VA, WV only. T&Cs apply DraftKings Sportsbook Logo March Madness $25,000 Novelty Contest Claim this offer Available for new and existing users. 21+. NY/NJ/PA/WV/IN/IA/CO/IL/TN/MI/VA only. Full terms and conditions apply. logo bet365 $5 Million March Madness Challenge Claim this offer Available to new and existing customers. Must be 21 years or older. New Jersey only. Full terms and conditions apply. Betway Sportsbook logo $250 Risk Free First Bet Claim this offer New players only, 21 years or older. NJ, PA, IN, CO, IA only. Full terms and conditions apply. Caesars Sportsbook Logo Get up to $1100 in first bet insurance Claim this offer New customers only. 21+. AZ, IL, IN, IA, LA, MI, MD, CO, VA, NJ, NC, NY, TN, WV, Washington, DC and NV. The T&Cs apply. FanDuel Sportsbook logo Bet $5 on March Madness Get $150 in Free Bets Claim this offer 21+. New customers only. NY, AZ, CO, CT, IA, IL, IN, LA, MI, NJ, PA, TN, VA, WV only. T&Cs apply DraftKings Sportsbook Logo Get $50 Free Bet with First Deposit + Deposit Bonus up to $1000 Claim this offer First deposit only. 21+. NY/NJ/PA/WV/IN/IA/CO/IL/TN/MI/VA only. Deposit bonuses issued in the form of site credits. Full terms and conditions apply. DraftKings Sportsbook Logo Bet $5 at any March Madness Moneyline Market and get $200 in free bets Claim this offer New players only, 21+. Available in AZ, CO, CT, IA, IL, IN, LA, MI, NJ, NY, PA, TN, VA, WY or WV only. Full terms and conditions apply. BetMGM logo 100% first deposit match with code “250MATCH” Claim this offer New players only, 21 years or older. Available in NY, AZ, CO, IA, IN, IL, LA, MI, VA, PA, WV only. Full terms and conditions apply BetMGM logo Exclusive Risk-Free First Bet up to $1,000 + Free 1-Year Membership to NJ.com (worth $120)* Claim this offer New customers only. Must be 21 years or older. NY, NJ, CO, DC, IA, IN, MI, NV, PA, TN, WV, IA, VA, WV, WY only. Full terms and conditions apply. *The one-year free subscription to NJ.com is only available to New Jersey players. logo bet365 Bet $1 Get $200 in free bets Claim this offer New players only, 21 years or older. Available only in New Jersey. $10 deposit required. Free bets added to the balance of free bet credits. Free bet risk excluded from returns. Terms and conditions, time limits and exclusions apply. PointsBet Sportsbook Logo Get 2 risk-free bets up to $2,000 Claim this offer New customers only. 21+. NY, CO, IL, IN, IA, MI, NJ, VA, WV only. Get up to $500 cashback (in free bets) if your 1st fixed odds bet loses. Get up to $1,500 cashback (in free bets) if your first PointsBetting bet loses. Eligible customers are entitled to a maximum of two (2) refunds. Full terms and conditions Unibet logo $250 Risk Free Bet Claim this offer New players only. 21+. AZ, NJ, IA and IN only. Full terms and conditions apply. FOXbet Logo FIRST BET ON USA RISK FREE UP TO $500 Claim this offer New customers only. Must be 21 years or older. CO, NJ, PA, MI only. New customers must register for the risk-free offer within 7 days of registration. After registering, customers must place a bet within 7 days to qualify. Full terms and conditions apply. Logo Resorts Casino Sportsbook Get up to $250 risk free Claim this offer New customers only. 21+. New Jersey only. The free bet will be awarded if the first cash sports bet settled by users is a loss. The free bet amount awarded is equal to 100% of the first settled cash sports bet up to $250. All terms and conditions apply. Sugar House sports betting logo 100% match up to $250 Claim this offer New customers only 21+. CT, NJ, PA only. New account holders will be able to use the bonus code, 250MATCH, on their first deposit. The offer is to deposit and receive 100% up to $250 in bonus money with a 1X wagering requirement. Use bonus code 250MATCH on your first deposit. Minimum deposit of $10. Full terms and conditions apply. Bet Rivers logo Get $1000 Risk Free Bet + 1 Month Free Fubo TV Claim this offer Must be present in IA, AZ. Must be 21 years or older. New customers only. Full terms and conditions apply. Bet Rivers logo Get $250 Deposit Bonus + $10 Free Bet Claim this offer Must be present in IA. Must be 21 years or older. New customers only. Full terms and conditions apply. Borgata Sportsbook Logo Get $100 in free bets when you wager $20 Claim this offer NJ players, 21+, first deposits only. Minimum amount to deposit: $20. Customers claiming this sports promotion will not be eligible to receive any other “new customer” free bet sports promotion offer. Full terms and conditions apply. Hard Rock Sportsbook logo Get $100 risk free bet Claim this offer New and existing players. Players must deposit $100 or more to be eligible for this offer. 21+. New Jersey only. Full terms and conditions apply. Sports Illustrated Sportsbook logo Bet $20 Get $300 Claim this offer New players only. 21 years or older. Must use promo code AFF300. Minimum odds -200. Full terms and conditions apply. Betfred Logo Bet up to $500 risk free Claim this offer New players only. 21 years or older. BetFred is only available in CO, AZ, PA and IA. Full terms and conditions apply. MaximBet logo 100% deposit bonus up to $1,000 Claim this offer New players only, 21 years or older. Available only in CO. Full terms and conditions apply.