Index to Volume 25

Total Page:16

File Type:pdf, Size:1020Kb

Index to Volume 25 The Risks Digest Index to Volume 25 Search RISKS using swish-e Forum on Risks to the Public in Computers and Related Systems ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator Index to Volume 25 Forum on Risks to the Public in Computers and Related Systems ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator Volume 25 Issue 00 () Subject: SUMMARY OF RISKS VOLUME 25 (ongoing) (archived in ftp file risks-25.00) Volume 25 Issue 01 (Monday 7 January 2008) Fire! Works! oops, too slow (Mark Brader) Boeing 787 networking issues (Martyn Thomas) Feds Release Pass Card details (Brock N. Meeks via David Farber) Has chip-and-pin failed to foil fraudsters? (Pere Camps) Sears exposes customers' information via its web site (Rich Kulawiec via IP) User Data Stolen From Pornographic Web Sites (David Lesher) Election Computers Stolen in Tennessee (David Lesher) Er, Airline Captains Do What, Again? (Rick Moen) Risks of embedded javascript (Paul Wallich) Mercedes console display with conflicting information (Henry Baker) Mac Quickbooks update deletes user desktop (Bonnie Packert) No more loose lithium batteries in checked luggage (Peter Gregory) Risks of believing what you see on the WayBack Machine (Fred Cohen) Re: Computer Failure Causes Closure of Seattle Downtown Transit Tunnel (Stanislav Meduna) Re: Satnav: Nope, you can't get there from here. (Craig DeForest) Re: Satnav (Martyn Thomas) Re: Drunk a better guide than sat nav (Ross Younger) Passing of Computing and Information Security Pioneer: Jim Anderson (Gene Spafford) Volume 25 Issue 02 (Monday 14 January 2008) Coffee Grounds Qantas (Charles Wood) Computer problem suspected in erratic Airbus flight (Antonomasia) Metal structure beneath runway affects aircraft instruments (David Dixon) Polish teenager uses city trams as train set (Peter Houppermans) Novel approach to reducing electoral fraud (Peter Mellor) Risks of believing a GPS system (Paul Karger) GPS in a tea shop anecdote (Mark Brader) More GPS mishaps (Paul Saffo) Nightmare on VoIP Street (Ed Ravin) http://catless.ncl.ac.uk/Risks/25.00.html[2011-06-10 11:28:26] The Risks Digest Index to Volume 25 A risk of static analysis tools -- and refereeing (Peter Gutmann) Bank gives money to fraudster posing as its chairman (David Dixon) REVIEW: "Managing Knowledge Security", Kevin C. Desouza (Rob Slade) Volume 25 Issue 03 (Tuesday 29 January 2008) Data entry error leads to incompatible transplant (Mark Brader) London Heathrow plane crash (Colin Stamp) "Butterfly Award": French Bank Says Trader Hacked Computers (Henry Baker) Henhouses, guarding of, by foxes: Kerviel Kerfuffle (Steve Summit) Problems with the German tax software "Magpie" (Debora Weber-Wulff) Florida computer problems halt early voting (PGN) The risks of upgrading software (Clive D. W. Feather) Charter Cable deletes 14,000 e-mail accounts. No backups. (Danny Burstein) IRS: Kansas City lost our tapes. Lots of personal info.... (Danny Burstein) Automated parking garage reopens (Rich Mintz) Blue Screened Asphalt Jungle... (David Lesher) Windows virus protection on NASA Linux machines (David Lesher) Authors, pseudonyms, and software (Steven M. Bellovin) Re: Metal structure beneath runway affects aircraft instruments (Roderick A Rees) Re: Boeing 787 networking issues (Mark Siegel) Re: Coffee Grounds Qantas (Brian Hayes) Re: More GPS mishaps (Joel Maslak, Dag-Erling Smørgrav, Paul Saffo) REVIEW: "Fuzzing", Michael Sutton/Adam Greene/Pedram Amini (Rob Slade) Volume 25 Issue 04 (Saturday 2 February 2008) Transplant patient has NEW kidney removed after NHS computer blunder (Richard I. Cook) Tachometer error caused 2005 runway overrun (Mark Brader) Mideast submarine cable disruptions (David Lesher) Empire State Building car e-interference mystery (David Chessler) Technology Review: Stopping cars with microwaves (David Chessler) Manufacturer Blames Bankruptcy on Failed ERP Implementation (Ken Dunham) 2008 meltdown margin player blames s/w for failure to complete trades (George Michaelson) Fifth Amendment: Passphrase cannot be forced (David Lesher) British software pirate sells GBP 12K package at 1/1000 (Peter Mellor) DTV vs USPS (Peter Zilahy Ingerman) Voting Machine Usability Testing (Ken Dunham) Impersonating armored car personnel (Craig Partridge) Another public data loss in the UK (Robert Klemme) Automated calling system glitch locks down school (Steve Eddins) Re: Air Canada A319 upset (Peter Ladkin) Re: Coffee Grounds Qantas (Preston de Guise) Re: Metal structure beneath runway ... (Neil Youngman) Hoist by one's own petard: data security: UK Child Benefits (Adrian Cherry) REVIEW: "Software Testing Practice: Test Management", Spillner et al. (Rob Slade) Volume 25 Issue 05 (Monday 18 February 2008) L.A. School payroll system's spectacular failure (Richard I. Cook) FBI mistakenly receives supposedly protected e-mail (Steven M. Bellovin) Canadian Government Mails Out Confidential Data (Ken Dunham) JAL cabin crews sue over personal info (PGN) JAL near miss on attempted takeoff (PGN) Future of e-voting in doubt in Japan (PGN) http://catless.ncl.ac.uk/Risks/25.00.html[2011-06-10 11:28:26] The Risks Digest Index to Volume 25 Computer Error Strands Tanker off Massachusetts (Lee Rudolph) Bell Canada Data on 3.4 Million Customers Stolen (Ken Dunham) Royal Canadian Mounted Police Censured for Privacy Violations (Ken Dunham) Re: Lost Kansas City IRS tapes with personal info. (Danny Burstein) Critics chuck MS 'friendly worm' plan on the compost heap (Chris Leeson) Another BlackBerry Outage Caused by System Upgrade? (Ken Dunham) Vulnerability info suppressed by criminals paying to hide it (Ken Dunham) New GAO Report on IRS Information Security Pervasive Vulnerabilities (Diego Latella) The GPS miracle (Rich Mintz) 'Woman Says Being Declared Dead Ruins Life' (PGN) A reminder: Eric Sevareid's Law (Ken Knowlton) Ah yes, just what you need!!! (David Lesher) Volume 25 Issue 06 (Monday 25 February 2008) Securing The Wrong Spaces: A Lesson (Paul Ferguson via Gregory Hicks) Software problem at London Heathrow Terminal 4 affects baggage (Peter Mellor) YouTube outage blamed on Pakistan (Amos Shapir) One way not to conduct Internet voting (Peter Kaiser) Being declared dead ruins life (Andrew Koenig) New RFID ticketless bus system in Brisbane goes live... with glitches (George Michaelson) US Treasury "TreasuryDirect" Web site security enhancements (Jonathan Kamens) EU money for 4 small businesses IT risk mgmt pilot (Patrick O'Beirne) Cold Boot Attacks on Disk Encryption (Jacob Appelbaum, Declan McCullagh) Illegal drag race kills eight (John Curran) Free-to-download password cracker (Peter Mellor) Re: the GPS miracle (Steven M. Bellovin) Volume 25 Issue 07 (Saturday 1 March 2008) Risks of Leap Years and Dumb Digital Watches (Mark Brader) Risks of Leap Years and Dumb Airline Software (PGN) $1.2 billion up in smoke (Paul Saffo) Southeast Florida Massive Power Outage (Steven J. Greenwald) FL power failure triggered by human error (Lauren Weinstein) Competent? We can't even archive our own e-mail reliably! (Jim Horning) DreamHost Accidently Bills Customers $7,500,000 (Dan Jacobson) IT Project Failure Blog (Ken Dunham) Is the "law of unintended consequences" biting W3C DTD reference? (George Michaelson) Pakistan, YouTube, Google, and No Simple Answers (Lauren Weinstein) Re: YouTube outage blamed on Pakistan (R A Lichtensteiger, Richard Grady, Jay R. Ashworth) Cold Boot Attacks: Vulnerable While Sleeping (Ed Felten via Monty Solomon) Citibank needs a clue (Rich B. Astaird) Re: Hoist by one's own petard: data security: UK Child Benefits (Merlyn Kline) REVIEW: "Better Ethics Now", Christopher Bauer (Rob Slade) Volume 25 Issue 08 (Friday 14 March 2008) Wind Power Risks (Charles Wood) FBI Found to Misuse Security Letters (lynn via Dave Farber's IP) RFID hack could crack open 2 billion smart cards (Sharon Gaudin) Nasty scanner attack: AccuBasic malware (PGN) Hacking a pacemaker (Gadi Evron) More on pacemaker risks (PGN) Stopping cars with microwaves (Matthew D. Healy) http://catless.ncl.ac.uk/Risks/25.00.html[2011-06-10 11:28:26] The Risks Digest Index to Volume 25 It's too easy to access the "off" switch (Robert P Schaefer) UK ISPs to sell users' private browsing information (Mike Scott) TSA can't believe MacBook Air is a real laptop; owner misses flight (Paul Saffo) Deja Vu all over again (Andrew Koenig) CAPTCHA attacks (Monty Solomon) Safari "beachball" black on black (Richard A. O'Keefe) Risks of Leap Years and Dumb Digital Watches (Clive D. W. Feather, Amos Shapir) USENIX Announces Open Access to Conference Proceedings (Lionel Garth Jones) Volume 25 Issue 09 (Thursday 27 March 2008) Billion-dollar IT failure at Census Bureau (eekid via David Farber) A Heart Device Is Found Vulnerable to Hacker Attacks (Barnaby Feder via Monty Solomon) FL power outage NERC updates (Catherine M Horiuchi) Vandals halt some hybrid buses using external 'off' switch (Rick Damiani) Flight Service Software Crashes; Pilot Briefings Delayed (Gabe Goldberg) Substantial supermarket breach affects millions (Robert Heuman) Man arrested by mistake over phone system bug (Rick Damiani) Hoax on Craiglist causes duped victims to steal property (Mark Brader) Payment by fingerprint disappears (Jon Van and Becky Yerak via Paul Saffo) Cute e-mail leak (Steve Summit) Search engine bait? (Steve Schafer) Volume 25 Issue 10 (Tuesday 1 April 2008) A modest proposal for the improvement of Daylight Saving (Tony Finch) A Current Affair: Lauren Weinstein, Inside Risks, CACM April 2008 (PGN) Chaos Computer Club publishes

  1172
Recommended publications
  • Cyber Security Practices and Challenges at Selected Critical Infrastructures in Ethiopia: Towards Tailoring Cyber Security Framework
    ADDIS ABABA UNIVERSITY COLLEGE OF NATURAL AND COMPUTATIONAL SCIENCES SCHOOL OF INFORMATION SCIENCE CYBER SECURITY PRACTICES AND CHALLENGES AT SELECTED CRITICAL INFRASTRUCTURES IN ETHIOPIA: TOWARDS TAILORING CYBER SECURITY FRAMEWORK By TEWODROS GETANEH JUNE, 2018 ADDIS ABABA, ETHIOPIA ADDIS ABABA UNIVERSITY COLLEGE OF NATURAL AND COMPUTATIONAL SCIENCES SCHOOL OF INFORMATION SCIENCE CYBER SECURITY PRACTICES AND CHALLENGES AT SELECTED CRITICAL INFRASTRUCTURES IN ETHIOPIA: TOWARDS TAILORING CYBER SECURITY FRAMEWORK A Thesis Submitted to School of Graduate Studies of Addis Ababa University in Partial Fulfillment of the Requirements for the Degree of Master of Science in Information Science By: TEWODROS GETANEH Advisor: Tebebe Beshah (PhD) JUNE, 2018 Addis Ababa, Ethiopia ADDIS ABABA UNIVERSITY COLLEGE OF NATURAL AND COMPUTATIONAL SCIENCE SCHOOL OF INFORMATION SCIENCE CYBER SECURITY PRACTICES AND CHALLENGES AT SELECTED CRITICAL INFRASTRUCTURES IN ETHIOPIA: TOWARDS TAILORING CYBER SECURITY FRAMEWORK By: Tewodros Getaneh Name and signature of Members of the Examining Board Tebebe Beshah (PhD) __________ _________ Advisor Signature Date Lemma Lenssa (PhD) ___________ __________ Examiner Signature Date Dereje Teferi (PhD) __________ _________ Examiner Signature Date Declaration This thesis has not previously been accepted for any degree and is not being concurrently submitted in candidature for any degree in any university. I declare that the thesis is a result of my own investigation, except where otherwise stated. I have undertaken the study independently with the guidance and support of my research advisor. Other sources are acknowledged by citations giving explicit references. A list of references is appended. Signature: ________________________ Tewodros Getaneh This thesis has been submitted for examination with my approval as university advisor. Advisor’s Signature: ________________________ Tebebe Beshah (PhD) i | P a g e Dedication This work is dedicated to my beloved sister Eleni Getaneh.
    [Show full text]
  • Nation-State Cyber Surveillance Options: the Role of Suppliers
    Nation-State Cyber Surveillance Options: The role of suppliers Eirik Bae Master’s Thesis Master of Science in Information Security 30 ECTS Department of Computer Science and Media Technology Gjøvik University College, 2014 Avdeling for informatikk og medieteknikk Høgskolen i Gjøvik Postboks 191 2802 Gjøvik Department of Computer Science and Media Technology Gjøvik University College Box 191 N-2802 Gjøvik Norway Nation-State Cyber Surveillance Options: The role of suppliers Abstract When Edward Snowden in 2013 leaked documents about U.S. surveillance, the focus shifted to how nation-states perform surveillance of Internet and telecom communications, and it was then a need for educated information about the topic. In this master thesis we investigate how nation-states can perform their cyber surveillance, how suppliers of products or services can sup- port the nation-states’ cyber surveillance, and how we can protect ourselves against it. We found that the most prominent way consists of collecting data from central points of communication, e.g. Internet and telecom providers. In some cases, it is necessary for the nation-state to perform targeted surveillance by installing surveillance software onto their suspects’ devices. The infor- mation they collect from centralized and targeted surveillance can lead to big data issues that relate to collecting, storing, and processing the massive amounts of data. A supplier can decide to help nation-states in their cyber surveillance, and by exploiting the trust we lay in the supplier it would result in that we would face a completely different threat landscape, where we find it difficult to protect our privacy and security.
    [Show full text]
  • Technical Intelligence ISSUE: 19.04.21
    Technical Intelligence ISSUE: 19.04.21 The CyberScotland Technical Threat Intelligence Bulletin is designed to provide you with information about updates, exploits and countermeasures. We hope that you benefit from this resource and we ask that you circulate this information to your networks, adapting where you see fit. Jump To TECHNICAL THREAT AWARENESS AND HUNTING Microsoft Patch Tuesday (April 2021) Adobe Patches Slew of Critical Security Bugs Patch Chrome to Remediated In-The-Wild 0-Day Exploits F5 urges customers to patch critical BIG-IP pre-auth RCE bug Wordpress Privilege-Escalation and Authentication Bypass Apple rushes to patch zero‑day flaw in iOS, iPadOS Cisco Will Not Patch Critical RCE Flaw Affecting End-of-Life Business Routers Threat Intelligence Bulletin Technical Threat Awareness and Hunting Microsoft Patch Tuesday (April 2021) Microsoft released its monthly security update Tuesday 13th April 2021, disclosing 114 vulnerabilities across its suite of products1. Four new remote code execution vulnerabilities in Microsoft Exchange Server are included, beyond those that were release out-of-band last month. The detection of the vulnerabilities which led to these patches has been attributed to the US’s National Security Agency (NSA)2. Given the recent focus on Microsoft Exchange by varying threat actors, NCSC has produced an alert encouraging organisations to install the critical updates immediately3. More patches are likely to follow for Microsoft’s Exchange servers as, at a recent hacking contest called pwn2own a team called DEVCORE combined an authentication bypass and a local privilege escalation to complete take over the Exchange server. As a result they won $200,000.4 In all, there are 20 critical vulnerabilities as part of this release and one considered of “moderate” severity.
    [Show full text]
  • New Media in New China
    NEW MEDIA IN NEW CHINA: AN ANALYSIS OF THE DEMOCRATIZING EFFECT OF THE INTERNET __________________ A University Thesis Presented to the Faculty of California State University, East Bay __________________ In Partial Fulfillment of the Requirements for the Degree Master of Arts in Communication __________________ By Chaoya Sun June 2013 Copyright © 2013 by Chaoya Sun ii NEW MEOlA IN NEW CHINA: AN ANALYSIS OF THE DEMOCRATIlING EFFECT OF THE INTERNET By Chaoya Sun III Table of Contents INTRODUCTION ............................................................................................................. 1 PART 1 NEW MEDIA PROMOTE DEMOCRACY ................................................... 9 INTRODUCTION ........................................................................................................... 9 THE COMMUNICATION THEORY OF HAROLD INNIS ........................................ 10 NEW MEDIA PUSH ON DEMOCRACY .................................................................... 13 Offering users the right to choose information freely ............................................... 13 Making free-thinking and free-speech available ....................................................... 14 Providing users more participatory rights ................................................................. 15 THE FUTURE OF DEMOCRACY IN THE CONTEXT OF NEW MEDIA ................ 16 PART 2 2008 IN RETROSPECT: FRAGILE CHINESE MEDIA UNDER THE SHADOW OF CHINA’S POLITICS ...........................................................................
    [Show full text]
  • Sydney Program Guide
    Page 1 of 42 Sydney Program Guide Sun Mar 14, 2021 06:00 EASY EATS Captioned HD WS G Nutritious & Delicious In this episode of Easy Eats, everything is gorgeous and guilt-free. Dishes like Lamb Stir Fry, Vegie Strudel, and Sweet Corn Soup are low in fat but high in flavour. There's even a low fat version of Hummingbird Cake which is perfect for those watching their waistline. 07:00 WEEKEND TODAY Captioned Live HD WS NA Join the Weekend Today team as they bring you the latest in news, current affairs, sports, politics, entertainment, fashion, health and lifestyle. 10:00 SPORTS SUNDAY Captioned Live HD WS PG Featuring Australia's leading sports personalities, Sports Sunday presents a frank and open debate about all the issues in the week of sport, with the promise of heated opinion and a few laughs along the way. 11:00 SUNDAY FOOTY SHOW Captioned Live HD WS PG Join hosts Peter Sterling, Erin Molan and Brad Fittler, with regular special guests to discuss all things NRL. 13:00 WOMEN'S FOOTY Captioned HD WS PG Join Bianca Chatfield for the 5th Season of Women's Footy for the latest news, opinion and analysis from in and around the AFLW - Each week, a raft of the AFLW's biggest names will join the show to discuss the weekend's action. 14:00 DAVID ATTENBOROUGH'S DYNASTIES Captioned Repeat HD WS PG The Making of Dynasties Follow five of the world's most celebrated, yet endangered animals: penguins, chimpanzees, lions, painted wolves and tigers, as they fight for their own survival and for the future of their dynasties.
    [Show full text]
  • Getting Started with Eudora 5.1 for Windows 95/98/ME/NT/2000 Author Teresa Sakata
    WIN9X003 July 2003 Getting Started with Eudora 5.1 For Windows 95/98/ME/NT/2000 Author Teresa Sakata Introduction ..............................................................................................................................................................1 POP and IMAP Servers ............................................................................................................................................2 Requirements ............................................................................................................................................................2 Changes From Version 4.3.x ....................................................................................................................................3 Issues ........................................................................................................................................................................3 Where do I get Eudora? ............................................................................................................................................4 Getting Started..........................................................................................................................................................4 Installation ................................................................................................................................................................4 Configuring Eudora ..................................................................................................................................................5
    [Show full text]
  • Acmasphere Issue 62
    acma investigations Broadcasting investigations, October to December 2010 � This summary is of ACMA broadcasting investigations completed in the three months from 1 October to 31 December 2010. There is also, with the cooperation of Free TV Australia and Commercial Radio Australia (CRA), a three-month report of the number and substance of complaints made directly to the commercial broadcasters. The broadcasting Complaints about possible breaches Most investigation reports (with the complaints process of program standards (children’s exception of community non-breach Primary responsibility for the resolution television, Australian content, captioning investigation reports) are published of broadcasting code-related and disclosure), provisions of the BSA on the ACMA website at complaints rests with the licensees. and licence conditions may be made www.acma.gov.au (go to About The Broadcasting Services Act 1992 directly to the ACMA. Complainants ACMA: Publications & research > (the BSA) lays down a general procedure are not obliged to contact a licensee Publications > Broadcasting publications for complaints-handling whereby a first in these instances. > Broadcasting investigations reports). complainant is required to approach a licensee first, who in turn is obliged The ACMA may find that a licensee to respond. has breached a broadcasting code of practice or a licensee may admit However, if a complainant does not to a breach of a code. Breaches of receive a response within 60 days, the codes are not breaches of the or considers the response received BSA, although the ACMA may make to be inadequate, the matter may then compliance with a code a condition be referred to the ACMA for investigation.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Apple Debuts Discount Watch, but No New Iphones ... Yet 15 September 2020, by Michael Liedtke
    Apple debuts discount watch, but no new iPhones ... yet 15 September 2020, by Michael Liedtke its new iPhones at this time of year, but production problems caused by the pandemic have delayed their release until at least October. CEO Tim Cook didn't mention iPhones during Tuesday's one-hour presentation recorded at the company's massive, but now mostly empty, headquarters in Cupertino, California. The Apple Watch has never come close to rivaling the iPhone's popularity, but it does dominate the market for smartwatches. Canaccord Genuity analyst T. Michael Walkley estimates about 51 million Apple Watches will be sold this year, a 5% increase from last year. The research firm In this still image provided by Apple from the keynote GlobalData pegs Apple's share of the $64 billion video of a special event at Apple Park in Cupertino, smartwatch market at roughly 60%. Calif., Apple's Chief Operating Officer Jeff Williams unveils Apple Watch Series 6 on Tuesday, Sept. 15, The new discount model, called the Apple Watch 2020. Apple is introducing the cheaper version of its SE, will sell for $279 and be available beginning smart watch in its latest attempt to broaden the appeal of Friday. The price is a markdown from the $399 that its trend-setting products while more consumers are forced to scrimp during ongoing fallout from the Apple is asking for the next version of its higher end pandemic. (Apple via AP) watch, the Series 6. Apple watches have been selling for an average of $377, based on Walkley's calculations.
    [Show full text]
  • Apple Kicks Off Event; $1,000 Iphone Is Expected 12 September 2017, by Michael Liedtke and Barbara Ortutay
    Apple kicks off event; $1,000 iPhone is expected 12 September 2017, by Michael Liedtke And Barbara Ortutay on him with joy instead of sadness." The souped-up "anniversary" iPhone, which would come a decade after Jobs unveiled the first version, could also cost twice what the original iPhone did. It would set a new price threshold for any smartphone intended to appeal to a mass market. WHAT A THOUSAND BUCKS WILL BUY Apple CEO Tim Cook kicks off the event for a new product announcement at the Steve Jobs Theater on the new Apple campus on Tuesday, Sept. 12, 2017, in Cupertino, Calif. (AP Photo/Marcio Jose Sanchez) Apple has kicked off a September product event at which it is expected to unveil a dramatically redesigned iPhone that could cost $1,000. With a photo of former Apple co-founder and CEO Steve It's the first product event Apple is holding at its Jobs projected in the background, Apple CEO Tim Cook new spaceship-like headquarters in Cupertino, kicks off the event for a new product announcement at California. Before getting to the new iPhone, the the Steve Jobs Theater on the new Apple campus, company unveiled a new Apple Watch model with Tuesday, Sept. 12, 2017, in Cupertino, Calif. (AP cellular service and an updated version of its Apple Photo/Marcio Jose Sanchez) TV streaming device. The event opened in a darkened auditorium, with only the audience's phones gleaming like stars, Various leaks have indicated the new phone will along with a message that said "Welcome to Steve feature a sharper display, a so-called OLED screen Jobs Theater." A voiceover from Jobs, Apple's co- that will extend from edge to edge of the device, founder who died in 2011, opened the event before thus eliminating the exterior gap, or "bezel," that CEO Tim Cook took stage.
    [Show full text]
  • Climate Change Adaptation in the Arab States Best Practices and Lessons Learned
    Climate Change Adaptation in the Arab States Best practices and lessons learned United Nations Development Programme 2018 | 1 UNDP partners with people at all levels of society to help build nations that can withstand crisis, and drive and sustain the kind of growth that improves the quality of life for everyone. On the ground in nearly 170 countries and territories, we offer global perspective and local insight to help empower lives and build resilient nations. www.undp.org The Global Environment Facility (GEF) was established on the eve of the 1992 Rio Earth Summit to help tackle our planet’s most pressing environmental problems. Since then, the GEF has provided over $17 billion in grants and mobilized an additional $88 billion in financing for more than 4000 projects in 170 countries. Today, the GEF is an international partnership of 183 countries, international institutions, civil society organizations and the private sector that addresses global environmental issues. www.thegef.org United Nations Development Programme July 2018 Copyright © UNDP 2018 Manufactured in Bangkok Bangkok Regional Hub (BRH) United Nations Development Programme 3rd Floor United Nations Service Building Rajdamnern Nok Avenue, Bangkok, 10200, Thailand www.adaptation-undp.org Authors: The report preparation was led by Tom Twining-Ward in close collaboration with Kishan Khoday, with Cara Tobin as lead author and Fadhel Baccar, Janine Twyman Mills, Walid Ali and Zubair Murshed as contributing authors. The publication was professionally reviewed by fellow UNDP colleagues, Amal Aldababseh, Greg Benchwick, Hanan Mutwaki, Mohamed Bayoumi, and Walid Ali. Valuable external expert review, comments, and suggestions were provided by Hussein El-Atfy (Arab Water Council), Ibrahim Abdel Gelil (Arabian Gulf University), and William Dougherty (Climate Change Research Group).
    [Show full text]
  • Journal Nixes Minority Hiring Plan Union
    THE CHRONICLE Wild and Wooiy Wahoos THURSDAY, SEPTEMBER 19, 1991 © DUKE UNIVERSITY DURHAM, NORTH CAROLINA CIRCULATION: 15,000 VOL 87, NO. 15 Journal nixes minority hiring plan By MATT STEFFORA for it to become enacted, Sussman While the president ofthe Black The Duke Law Journal has said. Law Students'Association, Henry rejected an affirmative-action hir­ Sussman did not have figures Mims, said he was disappointed ing proposal for the third straight on total minority enrollment in the proposal was not passed, he year. the Law School or at the Law found the vote itself a positive Articles editor Ed Sussman, a Journal, but he said minorities sign. third-year law student, had pro­ were under-represented on the "It sounds like a contradiction. posed last week that the journal staff. .. .There is more that they can do, every year accept a number of The affirmative-action proposal but I am encouraged that they minority members "that is only referred to minority repre­ are making a try," Mims said. roughly the same percentage as sentation as a whole, he said, "That they took the vote, and that the representation as the Law without specifically mentioning a majority voted for it, is very School," he said. numbers for each race. encouraging." The Law Journal's staff of about He did have figures on black The editor of the journal, Steve 50 second- and third-year law stu­ participation. While the Law Thomas, defended the journal's dents voted on Sussman's pro­ School is about 10 percent black, minority representation. "I think posal Friday afternoon.
    [Show full text]