Sat.Oct 23, 2021 - Fri.Oct 29, 2021

article thumbnail

Technology Pathways to Decarbonize China’s Heavy-Duty Trucks

The City Fix

The transport sector is the third largest source of GHG emissions in China, following the power and industry sectors. Heavy-duty truck transportation accounts for 41% of the country’s freight demand (in tonne-kilometers) and 84% and 40% of motor vehicles’ NOx. Continue reading on TheCityFix.com.

article thumbnail

Master of information

Princeton Public Library

Some call us wizards or the keepers of knowledge. Superheroes, geniuses, guides and human search engines – we’ve heard it all. I recently earned my master’s degree and, when it came in the mail, it read “Master of Information.” This got me thinking, what makes us, librarians, the masters of information? Yes, the years of […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Innovating Our Way Out of Crisis

Meeting of the Minds

Whether deep freezes in Texas, wildfires in California, hurricanes along the Gulf Coast, or any other calamity, our innovations today will build the reliable, resilient, equitable, and prosperous grid tomorrow. Innovation, in short, combines the dream of what’s possible with the pragmatism of what’s practical. That’s the big-idea, hard-reality approach that helped transform Texas into the world’s energy powerhouse — from oil and gas to zero-emissions wind, sun, and, soon, geothermal.

52
article thumbnail

The Pros & Cons Of Singapore's Housing Model

The Market Urbanism Report

Singapore's housing market is a mix of market-based and centrally-planned norms - but reflects the same problems as the U.S.

Housing 52
article thumbnail

The Ultimate Playground Inspection Handbook

Dive into the world of playground safety with this complimentary guide. It offers a detailed exploration of essential practices to ensure the utmost safety for children. Delve into inspection techniques, from assessing equipment conditions to evaluating surfacing materials. Gain insights into maintenance strategies to keep playgrounds in top-notch condition year-round.

article thumbnail

AI for Sustainability 

Public Sector Future

In this episode we speak with Dr. Vik Pant, the Chief Scientist and Chief Scientific Advisor for Natural Resources Canada (NRCan). Dr. Pant shares his priorities in his role and learnings from NRCan’s digital accelerator as they work to implement new technologies. Discover how new artificial intelligence capabilities are being used to promote sustainability, from improved flood mapping and wildfire response to mining risk mitigation.

article thumbnail

Modernization of Legacy Security Systems with CyCognito

CarahCast

One of the biggest vulnerabilities state and local governments face is the huge installed base of legacy hardware and software. They are very expensive to maintain, draining resources that could be used to offer new, internet-based services. They often are riddled with security flaws, from bad code to unsecured ports –it’s next to impossible to keep up with all the patches that need to be implemented.

More Trending

article thumbnail

The Pros & Cons Of Singapore's Housing Model

The Market Urbanism Report

Singapore's housing market is a mix of market-based and centrally-planned norms - but reflects the same problems as the U.S.

Housing 52
article thumbnail

AI for Sustainability 

Public Sector Future

In this episode we speak with Dr. Vik Pant, the Chief Scientist and Chief Scientific Advisor for Natural Resources Canada (NRCan). Dr. Pant shares his priorities in his role and learnings from NRCan’s digital accelerator as they work to implement new technologies. Discover how new artificial intelligence capabilities are being used to promote sustainability, from improved flood mapping and wildfire response to mining risk mitigation.

article thumbnail

Ransomware with Hewlett Packard Enterprise

CarahCast

Ransomware cyberattacks vaulted into public awareness with a vengeance when an East Coast gasoline pipeline shut down for days, causing a shortage and long lines at the gas pump when drivers panicked. But hospitals, schools and local governments have been dealing with ransomware threats for some time. Ransomware cyberattacks vaulted into public awareness with a vengeance when an East Coast gasoline pipeline shut down for days, causing a shortage and long lines at the gas pump when drivers panick

article thumbnail

Episode 177: Trailer for the President's Management Agenda

FedHeads

In a world. imaging what a movie trailer for the President's Management Agenda would look like. Francis is available for the voice over. In a world. imaging what a movie trailer for the President's Management Agenda would look like. Francis is available for the voice over.

article thumbnail

7 Signs Your Local Government ERP Is Holding You Back: A Guide for Small Municipalities

Local governments and municipalities serving populations under 200,000 face distinctive challenges in delivering efficient and effective services to their communities. To overcome these challenges, many rely on Enterprise Resource Planning (ERP) systems tailored to their specific needs. Not all ERP systems are created equal, and some may hinder progress rather than support it.

article thumbnail

Is Your TV Listening to You? Cyber Tips from a Chief Information Security Officer

The CIO Council

The Nation’s response to the pandemic has highlighted that our society not only uses technology but is also profoundly reliant on technology in our daily lives. We can go to work, school, shop, work out, and watch newly released movies all from the comfort of our home. We have come to embrace that convenience of access, and the wealth of information technology brings to our fingertips.

article thumbnail

Intergenerational Mobility Analysis of the Forbes 400 List

The Lowe Down

. Article by Kara Hagler. The “ Great Gatsby Curve” , coined by former chair of the Council of Economic Advisors, Alan Krueger, shows that countries with higher income inequality also typically have lower intergenerational income mobility. In this article, I study mobility at the very top of the wealth distribution in the US using the Forbes 400. The Forbes 400 is a detailed list of the wealthiest Americans and their approximated net worth.

2020 52
article thumbnail

Securing the Supply Chain with IronNet Cybersecurity

CarahCast

In the end, any IT system is only as secure as its various components. Federal, state, and local agencies have learned that the hard way, as software platform and application providers have been hacked as a way to get into government systems. The Executive Order on Improving the Nation's Cybersecurity issued by the White House in May dedicates Section 4 to the topic of enhancing the security of the software supply chain.

article thumbnail

Visions of Recovery: Leveraging Libraries for Vital Communities

First State Insights

Betsey Suchanic, Senior Program Manager with the Urban Libraries Council, speaks with Troy Mix, Associate Director of the University of Delaware’s Institute for Public Administration (IPA), about local libraries' critical community economic development roles. Topics covered include the essential local government services provided by libraries during the pandemic and the need to reinvest in public libraries as we move forward in recovery.

article thumbnail

ASPA TIMES Magazine: Diversity, Equity and Inclusion

PA TIMES Magazine is a publication of the American Society for Public Administration (ASPA), a not-for-profit corporation. This edition focused on diversity, equity and inclusion in public administration, including guest columns, insights for the field and interviews with city government DEI officers about their work at the local level.

article thumbnail

Blockchain Security with Chainalysis

CarahCast

Blockchain is most commonly considered the foundation for cryptocurrency – the usual form of payment by ransomware demands – because it is a method of recording information that makes it difficult to impossible to change, hack, or cheat records of transactions. It’s a form of “distributed ledger” that records every transaction to every participant’s copy of that ledger.

article thumbnail

Phishing with VMware

CarahCast

Of all the security threats that face IT, phishing stands out because it is not an attack on the technology – it is “social engineering,” getting incautious users to click seemingly innocuous links or visit seemingly harmless websites and allowing hackers to steal user names, passwords, financial data, or other information they can use. Today, phishing is usually a “gateway crime” – hackers often use it as a way to get the credentials to gain entry into the broader IT system and launch other att