Page 1,338«..1020..1,3371,3381,3391,340..1,3501,360..»

FACT SHEET: Biden-Harris Administration Outlines Priorities for … – The White House

President Bidens Investing in America agenda is making a once-in-a-generation investment in Americas infrastructure and our clean energy future that is creating good-paying union jobs, growing our economy, building energy security, combating climate change, advancing environmental justice, and helping lower costs for families. To continue to drive these efforts, the Biden-Harris Administration today announced a set of priorities it urges Congress to pass as part of bipartisan permitting reform legislation.

The Biden-Harris Administration has already unleashed over $470 billion in manufacturing and clean energy investments since President Biden took office, providing predictable funding for new projects that would not have been contemplated a few years ago, and secured $1 billion to help expedite federal agency permitting. As a result of the Inflation Reduction Act, near-term clean energy deployment is expected to increase by 25%.

Building clean energy projects in the U.S. at the speed and scale needed to adequately address the climate crisis requires strategic reforms that improve the way such projects are sited and permitted at the federal, state and local levels. The Administration is acting to move projects forward, using its existing authority to accelerate the federal permitting process. These actions include establishing a new interagency Memorandum of Understanding (MOU) to facilitate the timely, responsible, and equitable permitting of electric transmission infrastructure.

But more reforms are needed to build out modern American energy infrastructure and supply chains with the speed and safety that the moment demands. To take just one example, the law governing mineral claims commodities that are critical components of modern energy technologies is more than 150 years old. To ensure that we protect the environment and communities and keep our economy globally competitive, Congress should act on thoughtful permitting reform that puts science and people first.

Administration Objectives for Permitting Reform

The Biden-Harris Administration supports the important reforms contained in the Building American Energy Security Act of 2023 as the kind of bipartisan compromise needed to tackle this challenge. The Administration encourages the inclusion of the following priorities in any bipartisan permitting reform package:

Recommendations to Streamline the Permitting Process

Accelerating Administration Permitting Actions to Deliver ResultsThe Biden-Harris Administration is not waiting on Congressional action to accelerate permitting. Last year the Administration released aPermitting Action Planand is using its existing authorities, where additional Congressional action is not required, to accelerate project approvals to meet our infrastructure and clean energy goals while ensuring strong environmental protections and robust community engagement. Some examples include:

###

Read more from the original source:

FACT SHEET: Biden-Harris Administration Outlines Priorities for ... - The White House

Read More..

Jaxon Mining Receives Deep IP and MT Dataset Inverted by … – Junior Mining Network

Vancouver, British Columbia--(Newsfile Corp. - May 10, 2023) - Jaxon Mining Inc.(TSXV: JAX)(FSE: 0U31)(OTC Pink: JXMNF) ("Jaxon" or the "Company")is pleased to announce it has received the first version from Geotexera of the inverted deep IP data from the geophysical survey conducted by SJ Geophysics in 2021 over Netalzul Mountain. This first set of inverted data has been used to update Jaxon's conceptual geological models and to generate more precise projections of the size, location and orientation of the Netalzul Mountain porphyry system. After the MT and other datasets have been inverted, the projections will be used to generate more accurate vectors that will be used in future drilling programs. The Company expects to publish a full report including an updated 3D geological model including the design of the anticipated test drilling program in Q2-Q3 of 2023.

Geotexera is a pioneer in the development of advanced geophysical modeling and inversion methods (https://www.geotexera.com/about). In the first version of a series of reports on the inversion results, Geotexera's Geophysical Modeling & Inversion "Geotexera GMI" used unstructured meshes to produce the inversions of the IP chargeability and DC resistivity data used to generate the visualizations (Figures 1, 2). The Company now awaits the delivery of the MT and the magnetic vector inversions (MVI) and will use these additional datasets to further advance the Netalzul Mountain target modeling program. These projections will be used to design higher-precision, drill test programs.

Geotexera's April 2023 report of the IP data projections (the "Report") confirm Jaxon's 2D projections and show the strong low IP chargeability or high conductivity anomaly the 2D projections place at the center of the Netalzul Mountain porphyry zone (Figures 3, 4). Geotexera's projections also show a large, medium to strong resistivity anomaly in the left-center of the porphyry target area (Figures 5, 6). The Report provides additional orientation information and confirms the coincident location of the Netalzul porphyry system as projected by Fathom Geophysics' 2021 model which integrated Jaxon's geophysical and geochemical datasets. Figures 7 and 8 show the overlay of both the 3D IP chargeability and resistivity anomalies with soil and rock geochemical anomalies as mapped in Fathom's 2021 model.

The Report further supports the Company's position that a large, deeper porphyry system exists within Netalzul Mountain, elevation between 1200 m to 1500 m, with the porphyry system located approximately 500 to 800 meters below the peak (Figures 4, 6).

The 3D inverted data adds orientation information as well as more refined size and location information to the Jaxon's models. Geotexera's results are consistent with the visualizations and conceptual locations generated by both Jaxon's and Fathom Geophysics' 2021 models which were based on Jaxon's existing 2D geophysical datasets as integrated with then existing geochemical datasets. Jaxon and Fathom will work with Geotexera's 3D IP/DC and other inverted datasets to generate updated models that will be used to visualize the targets and guide drill program design.

The Company is reviewing the inverted IP/DC data and the Report in anticipation of receiving and integrating additional datasets being inverted by Geotexera. Geotexera will also integrate Jaxon's 2021 drilling and other geotechnical data in its model. The additional inverted datasets are expected in the coming days and the Company anticipates Geotexera's final report will be released in Q2 of 2023. Updated versions of Fathom Geophysics' Comparative & Vectoring models will follow.

This same advanced target modeling and vectoring approach will be applied to inform the design of the contemplated drill programs targeting the Red Springs copper polymetallic porphyry system and the Kispiox Mountain and Blunt Mountain antimony-copper porphyry systems.

Figure 1. 3D view of chargeability inversion model, Netalzul Mountain project

Figure 2. 3D view of resistivity inversion model, Netalzul Mountain project

Figure 3. Large, strong, low IP chargeability or high conductivity anomaly in the center area of the Netalzul Mountain project, at 1,200m elevation, showing overlapping with soil, rock and magnetic porphyry targets

Figure 4. Vertical slices of 3D chargeability inversion model at center of area of the Netalzul Mountain project, showing very low chargeability below 1,500m elevation

Figure 5. Medium strong resistivity anomaly area in the center area of the Netalzul Mountain project, at 1,200m elevation, showing overlapping with soil, rock and magnetic porphyry targets

Figure 6. Vertical slices of 3D resistivity inversion model at center area of the Netalzul Mountain project, showing medium strong resistivity below 1,400m elevation

Qualified Person

Yingting (Tony) Guo, P.Geo., President and Chief Geologist of Jaxon Mining Inc., a Qualified Person as defined by National Instrument 43-101, has reviewed and prepared the scientific and technical information and verified the data supporting such scientific and technical information contained in this news release.

About Jaxon Mining Inc.

Jaxon pursues the discoveries of deeper, under cover, commercial scale and high-grade Cu, Au, Ag, polymetallic porphyry epithermal systems. Jaxon has seven large-scale porphyry system targets on its 100% controlled Hazelton property, an interconnected network of concessions spanning ~730 km2 in the Skeena Arch in northwest British Columbia, Canada. The Company's flagship projects Netalzul Mountain and Red Springs are drill ready. The Kispiox Mountain and Blunt Mountain projects both host extensive and high-grade occurrences of antimony, a strategic and critical metal as designated by the governments of Canada and United States.

ON BEHALF OF THE BOARD OF DIRECTORSJAXON MINING INC.

"John King Burns"

John King Burns, Chairman

For more information, please contact:

Investor RelationsKaye Wynn ConsultingT: 604-558-2630TF: 1-888-280-8128 E: This email address is being protected from spambots. You need JavaScript enabled to view it.

Corporate & Investor Relations T: 604-424-4488E: This email address is being protected from spambots. You need JavaScript enabled to view it. http://www.jaxonmining.com

This news release may contain forward-looking information, which is not comprised of historical facts. Forward-looking information involves risks, uncertainties, and other factors that could cause actual events, results, performance, prospects, and opportunities to differ materially from those expressed or implied by such forward-looking information. Forward-looking information in this news release may include but is not limited to, the Company's objectives, goals, or plans. Factors that could cause actual results to differ materially from such forward-looking information include, but are not limited to, those risks set out in the Company's public documents filed on SEDAR. Although the Company believes that the assumptions and factors used in preparing the forward-looking information in this news release are reasonable, undue reliance should not be placed on such information, which only applies as of the date of this news release. No assurance can be given that such events will occur in the disclosed time frames or at all. The Company disclaims any intention or obligation to update or revise any forward-looking information, whether as a result of new information, future events or otherwise, other than as required by law. Neither TSX Venture Exchange nor its Regulations Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

Continued here:

Jaxon Mining Receives Deep IP and MT Dataset Inverted by ... - Junior Mining Network

Read More..

Brandon Cronenbergs Possessor is one of the most exciting horror films of this century – The Guardian

Stream team

His father is synonymous with body horror, but this director is all about the horrors of the mind. Ahead of his new film Infinity Pool, you must see this one

Brandon Cronenbergs new movie, Infinity Pool, is out in Australia this week, so why not take the opportunity to revisit his second film: Possessor, a blisteringly imaginative scifi-horror movie that messes with your brain.

Tasya Voss (Andrea Riseborough) is an assassin for a secretive organisation, trained to kill using brain implant technology that allows her to inhabit or possess the body and consciousness of a third party in order to get close to her quarry.

Voss is separated from her husband and young son, who have no idea about the double life she leads. Shes a ruthless and talented killer and her boss, Girder (Jennifer Jason Leigh), wants Voss to become her successor but the job isnt as easy as it once was, and the lines between Vosss real self and her assumed identities are beginning to blur.

She accepts an assignment to assassinate tech billionaire John Parse (Sean Bean) by possessing his daughters boyfriend, Colin (Christopher Abbott). She has three days to make her move but things dont go to plan, resulting in Colin and Voss wrestling for control of his mind. She is unable to return to her own consciousness until she can force Colin to commit suicide.

With only three feature films under his belt, you can already rely on a Brandon Cronenberg movie to have a wild premise. Infinity Pool features Cronenbergs inimitable take on cloning; his debut feature, Antiviral, is based around the concept of celebrity viruses becoming a sought-after commodity. Possessors take on mind control tech that allows Voss to become another person hits like a deviant episode of Quantum Leap.

Possessor is set in an alternate reality: it looks much the same as our world, yet is differentiated by small details and large technological advancements. Everybody vapes, big tech companies are data-mining our every move and dangerous technology is in the wrong hands. (So not that different from our universe, on second thought.)

It was the unique filmography of Cronenbergs father David that lead to the adjective Cronenbergian being coined; still, in Possessor, theres a lot of Cronenbergian weirdness in the design of the machinery. Everyday tech, like the possession calibration gadgets and the bug-eye VR headsets, appear well loved and therefore quite believable. The headpiece Voss wears while inhabiting a target is a bizarre mixture of hospital equipment and proboscis-like tubes. This insect motif is fitting: by forcing herself into the mind of a victim and living there undetected, Voss is a parasite.

If there are any certainties in life, then they must surely be death, taxes and that Riseborough will be excellent in whatever you are watching. Her Voss seems disconnected, never entirely present; sifting through the remnants of the multiple identities she has worn and struggling to find the scrambled memories that belong to her. But she carries out her work with cold efficiency, bringing to mind elements of Riseboroughs performance in Crocodile, John Hillcoats unremittingly bleak episode of Black Mirror.

As Colin, Abbott continues to be one of the most interesting actors, having appeared in a run of movies that includes Black Bear, It Comes At Night and Nicolas Pesces dark and criminally underseen Piercing. Colin is chosen as expendable collateral, with a believable motive for killing his girlfriends father. In one electrifying scene, he rages at Beans patronising rich guy, screaming: You think you can step on me? We have no idea if its Voss or Colin talking.

Possessor is also a very bloody movie, so not everyone is going to like it. Its visceral and nasty at times, but so are these characters. The violence is also not Possessors focus: if David Cronenberg is synonymous with body horror, Brandon Cronenberg is exploring the horrors of the mind. And the result is, I think, one of the most imaginative and exciting horror movies of this century.

{{topLeft}}

{{bottomLeft}}

{{topRight}}

{{bottomRight}}

{{.}}

Read the original post:

Brandon Cronenbergs Possessor is one of the most exciting horror films of this century - The Guardian

Read More..

The UK’s approach to regulating AI – Lexology

The UK government's White Paper on AI, published in March 2023, sets out the ambition of being "the best place in the world to build, test and use AI technology". The European Commission's 'European approach to artificial intelligence' sets out the aim of "making the EU a world-class hub for AI". The UK and EU are not alone in their ambitions so the AI race is on. So much so that the Future of Life Institute recently published an open letter from signatories including Elon Musk and Steve Wozniak, calling for a six month moratorium on development of high functionality AI to allow the world to decide how to ensure that AI serves rather than destroys humanity.

Opinions differ as to how far off we are from sentient or 'superintelligent' AI, capable of outwitting and potentially wiping out humans, but the potential for AI to radically change our world is undisputed and evolving rapidly. Given how long it's taking individual jurisdictions to develop AI policy (it seems every day brings a new consultation or report), the thought that six months would be sufficient to gain worldwide consensus is wildly optimistic, particularly when there is so much to be gained economically by coming in first. And yet some governments are trying to ensure that AI is developed within an ethical framework they just don't necessarily agree what that looks like you can find out more about various approaches here.

The European Commission proposed the Artificial Intelligence Act in April 2021 (find out more here). It sets out an overarching framework for governing AI at EU level, providing a framework of requirements and obligations for its developers, deployers and users, together with regulatory oversight. The framework is underpinned by a risk-categorisation system for AI with 'high' risk systems subject to the most stringent obligations, and a ban on 'unacceptable risk' AI. The EU is hoping to pass the legislation by the end of the year.

China's approach by way of contrast is both more fragmented, and potentially more controlling, with rules being introduced requiring prior security approval for consumer-facing generative AI.

The UK has taken longer to arrive at its own approach and it has turned out to be rather different from the EU's. One of the most difficult aspects of the EU's AI Act is how to define AI, and then how to allocate risk categories. The UK's answer is to use a principles-based, sector-focused, regulator-led approach instead of creating umbrella legislation requiring a host of definitions which may become quickly outdated.

The UK's road to regulating AI

The UK has been increasingly focusing on AI over the last decade. The Alan Turing Institute is the UK's largely government-funded institute for data science and AI, founded in 2015, to "make great leaps in data science and AI research in order to make the world better". Since its inception, it has worked not only on the research and technical side, but also on ethical questions, liaising closely with government and regulators like the UK's Information Commissioner.

The UK published its National AI Strategy in September 2021, setting out a ten-year plan to "make Britain a global AI superpower". In line with this, in January 2022, DCMS announced that the Alan Turing Institute, supported by the British Standards Institute and the National Physical Laboratory, would pilot a new AI Standards Hub intended to increase the UK's contribution to the development of global AI technical standards.

In July 2022, DCMS announced its AI Action Plan, again, part of its National AI Strategy. An AI paper set out proposed rules based on six principles for regulators to apply with flexibility in order to support innovation while ensuring use of AI is safe and avoids unfair bias. Rather than centralising AI regulation, the government proposed allowing different regulators to take a tailored, more contextual approach to the use of AI, based on sandboxes, guidance and codes of practice.

Separate to the AI Action Plan, the UK government published a response to its 2020 consultation on AI and IP in July 2022 as we discussed here. The consultation looked at three areas:

The government decided:

In November 2022, the House of Commons Science and Technology Committee launched an inquiry into the governance of AI. The Committee is looking at how to address risks to the public from use of AI, and at how to ensure AI is used ethically and responsibly. Written submissions to a call for evidence were invited by 25 November 2022, including on the effectiveness of the current AI UK governance framework, areas for improvement, and how AI should be regulated. The Committee was still gathering evidence at the time of writing and is yet to report.

The AI White Paper

In March 2023, after some delay, the UK government published its White Paper 'A pro-innovation approach to AI regulation', which sets out a framework for the UK's approach to regulating AI. The government has decided not to legislate to create a single function to govern the regulation of AI. It has elected to support existing regulators develop a sector-focused, principles based approach. Regulators including the ICO, the CMA, the FCA, Ofcom, the Health and Safety Executive the MHRA and the Human Rights Commission will be required to consider the following five principles to build trust and provide clarity for innovation:

UK regulators will publish non-statutory guidance over the next year which will also include practical tools like risk assessment templates, and standards. The guidance will need to be pro-innovation, proportionate, trustworthy, adaptable, clear and collaborative, underpinned by the following four core elements of the government's AI framework:

Further elements to be considered by regulators are set out in Annex A.

The government also supports the findings of the Vallance Review published earlier in March, which looked at the approach to regulating emerging and digital technologies. With regard to AI, Sir Patrick Vallance recommended:

Interestingly, while providing for a regulatory sandbox, the AI White Paper does not set out further policy on the relationship between IP and generative AI although the Intellectual Property Office is working on a code of practice which is expected to be ready by the Summer.

The government has also published:

What does a regulator-led, sector approach look like?

Many AI systems are trained using personal data and many generate personal data. This means that data protection regulators (in countries which have them) are at the forefront of ensuring that AI data is used in a way which protects individuals. The way they interact with AI issues provides an indication as to how the government's approach might work.

The UK GDPR (as with its EU predecessor) is principles-based and many of the principles overlap with the government's five AI governance principles. This makes current data protection law a powerful tool for policing AI something clearly recognised in the government's policy choices.

In fact, the UK's regulator, the ICO, has already produced significant guidance on AI including an AI risk toolkit in and guidance on using live facial recognition technology in public places in July 2021, and an AI auditing framework and glossary. This sits alongside two major pieces of guidance Explaining decisions made with AI (developed with the Turing Institute) which covers transparency issues in some depth, and the ICO's guidance on AI and Data Protection which was updated in March 2023 to include a significantly expanded section on fairness (among other changes).

The power of data protection regulators to step in to protect individuals recently became clear when the Italian data protection regulator, the Garante, announced an immediate ban (since lifted) on LLM Chatbot, ChatGPT, and an investigation into its parent company OpenAI's GDPR compliance. Following a variety of responses from national data protection regulators, the European Data Protection Board convened a task force to share information and ensure a consistent enforcement approach.

Of course, as the White Paper recognises, the ICO is not the only regulator in town. Competition law, financial services law, human rights law and other areas can all play their part - the FCA, for example, is about to publish its response to its consultation on the impact of AI on its work. Similarly, the MHRA has published a roadmap clarifying in guidance the requirements for AI and software used in medical devices and is already developing more guidance (find out more here). The regulators themselves are broadly in favour of playing a leading role in regulating AI although both the ICO and the CMA have expressed concerns around funding and coordination.

The government's approach does raise concerns about contradictory guidance being produced by different regulators and about what happens when an AI system falls within the purview of more than one regulator. And what about a system where there isn't an obvious regulator? The government is looking to address the coherence questions and is currently consulting on how best to create a coordinated approach, with the DRCF likely to play a leading role.

Another issue is that the guidance produced by relevant regulators will not be statutory which means it will not be legally binding and while it may be influential in court proceedings, there will be no obligation to take it into account. This leads to questions around enforcement and what incentive there will be on businesses to comply. Enforcement will only be possible where other laws (rather than a specific AI law) have been breached and the pace of AI development is arguably considerably faster than, say an ICO or CMA enforcement action.

What happens next?

The government will monitor the effectiveness of this policy and of the resulting guidance, and consider whether it is necessary to introduce legislation to support compliance with the guidance. It intends to publish an AI regulatory roadmap which will set out plans for establishing central government functions for the four elements of the AI framework. The government also plans to publish a draft AI risk register for consultation, an updated roadmap and a monitoring and evaluation report some time after March 2024.

Time will tell whether the EC's top-down approach is more successful than the UK's lighter touch one. While too much regulation can certainly hamper innovation, there's a lot to be said for certainty. But this is difficult to achieve in such a rapidly developing environment. The EU's AI Act does attempt to future proof itself but is naturally more prescriptive when set against a jurisdiction where there is no dedicated AI law.

There is, however, more than one way to measure success. An ethical framework for AI is vitally important not just for economic success, but also for trust and adoption. There has already been push back against the UK government's approach with calls for more specific legislation. There are plenty of people who argue that it is better and safer to have a firmer, holistic framework for this aspect than a patchwork of non-binding guidance underpinned by laws which are not directly related to AI. Ideally, this would be agreed at a global level many argue that we will ultimately need an international supra-body to regulate AI in the same way we try to tackle nuclear proliferation, but achieving that, particularly in today's geopolitical climate, seems currently somewhat less likely than creating sentient AI.

Read more:

The UK's approach to regulating AI - Lexology

Read More..

Bangalore Gastro Centre will be the first hospital to introduce a gut … – Cityairnews

Bengaluru, May 4, 2023: The Bangalore Gastro Centre (BGC), a pioneer in top-quality specialist care for all digestive disorders, today signed a Memorandum of Understanding (MoU) with 3BIGS from South Korea, a global healthcare leader in handling Biodata and Artificial Intelligence technology to transform the diagnostic experience in India. The agreement was sealed in the presence of Dr Yogananda Reddy, Director and Chief Gastroenterologist of Bangalore Gastro Centre and Dr Junhyung Park, Founder and CEO of 3BIGS. The collaboration aims to provide end-to-end customized diagnostic services from collecting samples to recommending a nutritionist/doctor to provide the right medical support. Bangalore Gastro Centre (BGC) is the first hospital to establish this service in India. This collaboration will give access to the doctors from Bangalore Gastro Centre who will develop the gut microbiome test kit to help provide accurate results. This kit will soon be accessible by patients as well as a larger audience.

Dr Yogananda Reddy, Director and Chief Gastroenterologist of Bangalore Gastro Centre, says, Its a great honour for us to collaborate with 3BIGS, who are pioneers in data mining, and experts in AI and bioinformatics. It is for the first time that a South Korean firm is collaborating with an Indian hospital to develop a gut microbe tech testing kit for the benefit of the people at large. This product will be accessible and affordable to all, and will help prevent the onset of gut issues and improve gut health as the first step to boosting overall health.

The Bangalore Gastro Centre (BGC) is known to be Karnataka's top gastro centre. It has a team of highly qualified professionals who can treat a range of gastrointestinal conditions ranging from acidity and liver problems to cancers.

Dr Junhyung Park, Founder and CEO of 3BIGS, says, We are highly privileged to collaborate with Bangalore Gastro Centre as they are known to be the best in providing world-class digestive healthcare facilities in India. There is an increase in cases of chronic digestive issues found among the younger population globally. And with an increase in cases, it is essential to get a quick and accurate diagnosis to avoid end-stage diseases.

We were looking at collaborating with a hospital that has a futuristic approach, believes in innovation and adopts advanced technology for seamless growth in the diagnostic market. This association will certainly change the dynamics of the healthcare industry in India.

Follow this link:

Bangalore Gastro Centre will be the first hospital to introduce a gut ... - Cityairnews

Read More..

UMS brings high-tech digital solutions to mining, forming JV with … – International Mining

Posted by Paul Moore on 10th May 2023

A new partnership has been formed which will see cutting-edge IIoT (Industrial Internet of Things) and Augmented Reality (AR) technology being applied to the conceptualisation, design, construction and operational management of mining projects and mining operations.

The partnership brings together the mining expertise of UMS, a leading provider of engineering and contracting services to the mining industry, with the digital know-how of 1Worx, a specialist in the field of IIOT and AR.

We have signed a shareholder agreement which, in essence, has resulted in the establishment of a new joint venture company, UMS 1Worx, which is based at UMSs headquarters in Sandton, says Digby Glover, CEO of UMS. Not only will UMS 1Worx broaden the UMS service offering but it will also act as an independent business within UMS, with its own customer base.

Heading the new venture as MD is Charles Anderson, who has enjoyed a long career in the IT industry and who has extensive professional experience in robotics and mechanical engineering. The GM is Martin Hobbs, a very well-known figure in mining circles who was previously the MD of one of South Africas best-known shaft-sinking and mining contracting companies.

Anderson co-founded 1Worx in 2016 to market a leading US-developed IIOT development platform in South Africa. We initially aimed simply at selling this product to customers, who could then use it to develop their own solutions, he says. What soon became apparent, however, was that clients were not interested in doing their own in-house development. What they wanted was for us to provide ready-made solutions using the platform and this then became our primary focus.

He adds that the industry where the most traction was gained was mining. One notable project we worked on was a new mine which is still widely regarded as the most digitally enabled operation of its type in South Africa. Given the inroads we were making into mining, we made the decision in mid-2021 to concentrate on this sector, says Anderson.

One of the mining clients 1Worx subsequently interfaced with was UMS. We incorporated the 1Worx technology into one of our projects and liked it so much that we started talking about a partnership. That partnership is now a reality, says Glover.

The UMS 1Worx technology collects and analyses data that is generated automatically from sensors on plant and equipment or, in some cases, entered manually. This information can be displayed in a variety of formats, including dashboards that provide a visualisation of operational performance and status by area or by the entire mine. Immediate notifications and early warning of critical events can be sent to devices such as laptops or cell phones anywhere in the world.

Hobbs makes the point that UMS 1Worx represents a step-change for mining. Its really about delivering transformative solutions which are holistic in nature. Our solutions provide managers with accurate, predictive and actionable real-time data and information of a quality that has never really been available before in mining. In the past few years there has been much talk of the digital twin concept. Our technology delivers this but takes the concept much further.

Anderson says one of the key benefits of the solutions being offered by UMS 1Worx lies in the fact that they enable the exchange of information between the various teams involved in the design, construction and operation of a mine.

At a certain point, the personnel who design a mine hand the project over to the construction team for execution and then, when this is complete, the construction team hands over to the operational team, he explains. There is very little interaction between the teams everyone is working in compartments. With our solutions, this changes. Everyone has access to the same data and information. You have a continuous feedback loop that leads to problems being speedily identified and resolved and operations enhanced.Giving an example of what can be achieved, Glover says that intelligence can now be built into complex operations such as shaft-sinking.

Accurate reporting and analysis around key issues such as stoppages, water ingress, electricity consumption, tons blasted against tons hoisted and similar parameters can make all the difference on a shaft-sinking project and give managers the critical insights that allow operations to be optimised, he says.

Were extremely excited by this joint venture, he continues. The technology available from UMS 1Worx brings the Smart Mine concept a step closer to reality and has the potential to transform the way the mining industry works.

Link:

UMS brings high-tech digital solutions to mining, forming JV with ... - International Mining

Read More..

BIM-based digital platform and risk management system for … – Nature.com

Qian, Q. H. & Lin, P. Safety risk management of underground engineering in China: Progress, challenges and strategies. J. Rock Mech. Geotech. 8(4), 423442. https://doi.org/10.1016/j.jrmge.2016.04.001 (2016).

Article Google Scholar

Tian, S. M. et al. Development and prospect of railway tunnels in China in recent 40 Years. Tunnel. Construct. 41(11), 19031930 (2021).

Google Scholar

Wang, X. L. et al. Geohazards, reflection and challenges in Mountain tunnel construction of China: A data collection from 2002 to 2018. Geomatics Nat. Hazards Risk. 11(1), 766785. https://doi.org/10.1080/19475705.2020.1747554 (2020).

Article CAS Google Scholar

Do, T. N. & Wu, J. H. Simulation of the inclined jointed rock mass behaviors in a mountain tunnel excavation using DDA. Comput. Geotech. 117, 103249. https://doi.org/10.1016/j.compgeo.2019.103249 (2020).

Article Google Scholar

Liu, N. F. et al. Mechanism of secondary lining cracking and its simulation for the Dugongling tunnel. Rock Mech. Rock Eng. 53(10), 45394558. https://doi.org/10.1007/s00603-020-02183-3 (2020).

Article Google Scholar

Fan, S. Y., Song, Z. P., Xu, T. & Zhang, Y. W. Investigation of the microstructure damage and mechanical properties evolution of limestone subjected to high-pressure water. Constr. Build. Mater. 316, 125871. https://doi.org/10.1016/j.conbuildmat.2021.125871 (2022).

Article Google Scholar

Zhou, W. H. et al. Building information modelling review with potential applications in tunnel engineering of China. R. Soc. Open Sci. 4(8), 170174. https://doi.org/10.1098/rsos.170174 (2017).

Article ADS PubMed PubMed Central Google Scholar

Eastman, C., Teicholtz, P., Sacks, R. & Liston, K. BIM Handbook: A Guide to Building Information Modeling for Owners, Managers, Designers, Engineers and Contractors (Wiley, 2011).

Google Scholar

Wang, H., Pan, Y. S. & Luo, X. C. Integration of BIM and GIS in sustainable built environment: A review and bibliometric analysis. Autom. Constr. 103, 4152. https://doi.org/10.1016/j.autcon.2019.03.005 (2019).

Article Google Scholar

Sadeghi, S., Sharifi Teshnizi, E. & Ghoreishi, B. Correlations between various rock mass classification/characterization systems for the Zagros tunnel-W Iran. J Mt. Sci. 17(7), 17901806. https://doi.org/10.1007/s11629-019-5665-7 (2020).

Article Google Scholar

Aygar, E. B. Evaluation of new Austrian tunnelling method applied to Bolu tunnels weak rocks. J. Rock Mech. Geotech. 12(3), 541556. https://doi.org/10.1016/j.jrmge.2019.12.011 (2020).

Article Google Scholar

Tian, X. X., Song, Z. P. & Zhang, Y. W. Monitoring and reinforcement of landslide induced by tunnel excavation: A case study from Xiamaixi tunnel. Tunn. Undergr. Space Technol. 110, 103796. https://doi.org/10.1016/j.tust.2020.103796 (2021).

Article Google Scholar

Cerovsek, T. A review and outlook for a Building Information Model (BIM): A multi-standpoint framework for technological development. Adv. Eng. Inform. 25(2), 224244. https://doi.org/10.1016/j.aei.2010.06.003 (2011).

Article Google Scholar

Song, S., Yang, J. & Kim, N. Development of a BIM-based structural framework optimization and simulation system for building construction. Comput. Ind. 63(9), 895912. https://doi.org/10.1016/j.compind.2012.08.013 (2012).

Article Google Scholar

Pezeshki, Z. & Ivari, S. A. S. Applications of BIM: A brief review and future outline. Arch. Comput. Method Eng. 25(2), 273312. https://doi.org/10.1007/s11831-016-9204-1 (2016).

Article Google Scholar

Chan, D. W. M., Olawumi, T. O. & Ho, A. M. L. Perceived benefits of and barriers to Building Information Modelling (BIM) implementation in construction: The case of Hong Kong. J. Build. Eng. 25, 100764. https://doi.org/10.1016/j.jobe.2019.100764 (2019).

Article Google Scholar

Sharafat, A., Khan, M. S., Latif, K. & Seo, J. BIM-Based tunnel information modeling framework for visualization, management, and simulation of drill-and-blast tunneling projects. J. Comput. Civil. Eng. 35(2), 4020068. https://doi.org/10.1061/(ASCE)CP.1943-5487.0000955 (2021).

Article Google Scholar

Liu, W. P., Guo, H. L., Li, H. & Li, Y. Retracted: Using BIM to improve the design and construction of bridge projects: A case study of a long-span steel-box arch bridge project. Int. J. Adv. Robot. Syst. https://doi.org/10.5772/58442 (2014).

Article Google Scholar

Costin, A., Adibfar, A., Hu, H. & Chen, S. S. Building Information Modeling (BIM) for transportation infrastructureLiterature review, applications, challenges, and recommendations. Autom. Constr. 94, 257281. https://doi.org/10.1016/j.autcon.2018.07.001 (2018).

Article Google Scholar

Yin, X. F., Liu, H. X., Chen, Y., Wang, Y. W. & Al-Hussein, M. A BIM-based framework for operation and maintenance of utility tunnels. Tunn. Undergr. Space Technol. 97, 103252. https://doi.org/10.1016/j.tust.2019.103252 (2020).

Article Google Scholar

Zhang, S. R., Pan, F., Wang, C., Sun, Y. J. & Wang, H. X. BIM-based collaboration platform for the management of EPC projects in hydropower engineering. J. Constr. Eng. Manag. 143(12), 04017087. https://doi.org/10.1061/(ASCE)CO.1943-7862.0001403 (2017).

Article Google Scholar

Zhang, J. H., Zhao, C. D., Li, H., Huijser, H. & Skitmore, M. Exploring an interdisciplinary BIM-based joint capstone course in highway engineering. J. Civ. Eng. Educ. 146(3), 05020004. https://doi.org/10.1061/(ASCE)EI.2643-9115.0000017 (2020).

Article Google Scholar

Lu, Y. J., Wu, Z. L., Chang, R. D. & Li, Y. L. Building Information Modeling (BIM) for green buildings: A critical review and future directions. Autom. Constr. 83, 134148. https://doi.org/10.1016/j.autcon.2017.08.024 (2017).

Article Google Scholar

Santos, R., Costa, A. A., Silvestre, J. D. & Pyl, L. Integration of LCA and LCC analysis within a BIM-based environment. Autom. Constr. 103, 127149. https://doi.org/10.1016/j.autcon.2019.02.011 (2019).

Article Google Scholar

Sun, H. W. & Park, Y. CO2 Emission calculation method during construction process for developing BIM-based performance evaluation system. Appl. Sci. 10(16), 5587. https://doi.org/10.3390/app10165587 (2020).

Article CAS Google Scholar

Jamroz, K. et al. A new perspective in the road asset management with the use of advanced monitoring system & BIM. MATEC Web Conf. 231, 01007. https://doi.org/10.1051/matecconf/201823101007 (2018).

Article Google Scholar

Meng, Q. F. et al. A review of integrated applications of BIM and related technologies in whole building life cycle. Eng. Constr. Archit. Manag. 27(8), 16471677. https://doi.org/10.1108/ECAM-09-2019-0511 (2020).

Article Google Scholar

Alsahly, A., Hegemann, F., Knig, M. & Meschke, G. Integrated BIM-to-FEM approach in mechanised tunnelling. Geomech. Tunn. 13(2), 212220. https://doi.org/10.1002/geot.202000002 (2020).

Article Google Scholar

Tang, F. L., Ma, T., Guan, Y. S. & Zhang, Z. X. Parametric modeling and structure verification of asphalt pavement based on BIM-ABAQUS. Autom. Constr. 111, 103066. https://doi.org/10.1016/j.autcon.2019.103066 (2020).

Article Google Scholar

Du, J., Zou, Z. B., Shi, Y. M. & Zhao, D. Zero latency: Real-time synchronization of BIM data in virtual reality for collaborative decision-making. Autom. Constr 85, 5164. https://doi.org/10.1016/j.autcon.2017.10.009 (2018).

Article Google Scholar

Garbett, J., Hartley, T. & Heesom, D. A multi-user collaborative BIM-AR system to support design and construction. Autom. Constr. 122, 103487. https://doi.org/10.1016/j.autcon.2020.103487 (2021).

Article Google Scholar

Ma, Z. L. & Ren, Y. Integrated application of BIM and GIS: An overview. Procedia Eng. 196, 10721079. https://doi.org/10.1016/j.proeng.2017.08.064 (2017).

Article Google Scholar

Bosch, F., Ahmed, M., Turkan, Y., Haas, C. T. & Haas, R. The value of integrating Scan-to-BIM and Scan-vs-BIM techniques for construction monitoring using laser scanning and BIM: The case of cylindrical MEP components. Autom. Constr. 49, 201213. https://doi.org/10.1016/j.autcon.2014.05.014 (2015).

Article Google Scholar

Randall, T. Construction engineering requirements for integrating laser scanning technology and building information modeling. J. Constr. Eng. Manag. 137(10), 797805. https://doi.org/10.1061/(ASCE)CO.1943-7862.0001744 (2011).

Article Google Scholar

Deng, H., Hong, H., Luo, D. H., Deng, Y. C. & Su, C. Automatic indoor construction process monitoring for tiles based on BIM and computer vision. J. Constr. Eng. Manag. 146(1), 04019095. https://doi.org/10.1061/(ASCE)CO.1943-7862.0001744 (2020).

Article Google Scholar

Song, Z. P. et al. Research on management and application of tunnel engineering based on BIM technology. J. Civ. Eng. Manag. 25(8), 785797. https://doi.org/10.3846/jcem.2019.11056 (2019).

Article Google Scholar

Hegemann, F., Stascheit, J. & Maidl, U. As-built documentation of segmental lining rings in the BIM representation of tunnels. Tunn. Undergr. Space Technol. 106, 103582. https://doi.org/10.1016/j.tust.2020.103582 (2020).

Article Google Scholar

Borrmann, A. et al. Multi-Scale geometric-semantic modeling of shield tunnels for GIS and BIM applications. Comput. Aided Civil Infrastruct. Eng 30(4), 263281. https://doi.org/10.1111/mice.12090 (2015).

Article Google Scholar

Lee, P. P., Wang, Y. H., Lo, T. P. & Long, D. B. An integrated system framework of building information modelling and geographical information system for utility tunnel maintenance management. Tunn. Undergr. Space Technol. 79, 263273. https://doi.org/10.1016/j.tust.2018.05.010 (2018).

Article Google Scholar

Nini, J., Bui, H. G., Koch, C. & Meschke, G. Computationally efficient simulation in urban mechanized tunneling based on multilevel BIM models. J. Comput. Civil. Eng. https://doi.org/10.1061/(ASCE)CP.1943-5487.0000822 (2019).

Article Google Scholar

Yu, G., Mao, Z. Y., Hu, M., Li, Z. & Sugumaran, V. BIM+ topology diagram-driven multiutility tunnel emergency response method. J. Comput. Civil. Eng. 33(6), 04019038 (2019).

Article Google Scholar

Li, M., Yu, H. L., Jin, H. Y. & Liu, P. Methodologies of safety risk control for Chinas metro construction based on BIM. Saf. Sci. 110, 418426. https://doi.org/10.1016/j.ssci.2018.03.026 (2018).

Article Google Scholar

Zhang, L. M., Wu, X. G., Ding, L. Y., Skibniewski, M. J. & Lu, Y. J. Bim-Based risk identification system in tunnel construction. J. Civ. Eng. Manag. 22(4), 529539. https://doi.org/10.3846/13923730.2015.1023348 (2016).

Article Google Scholar

Du, J., He, R. & Sugumaran, V. Clustering and ontology-based information integration framework for surface subsidence risk mitigation in underground tunnels. Cluster Comput. 19(4), 20012014. https://doi.org/10.1007/s10586-016-0631-4 (2016).

Article Google Scholar

Li, M., Yu, H. L. & Liu, P. An automated safety risk recognition mechanism for underground construction at the pre-construction stage based on BIM. Autom. Constr. 91, 284292. https://doi.org/10.1016/j.autcon.2018.03.013 (2018).

Article Google Scholar

Liang, Y. & Liu, Q. X. Early warning and real-time control of construction safety risk of underground engineering based on building information modeling and internet of things. Neural Comput. Appl. 35(5), 34333442. https://doi.org/10.1007/s00521-021-05755-8 (2021).

Article Google Scholar

Providakis, S., Rogers, C. D. F. & Chapman, D. N. Predictions of settlement risk induced by tunnelling using BIM and 3D visualization tools. Tunn. Undergr. Space Technol. 92, 103049. https://doi.org/10.1016/j.tust.201103049 (2019).

Article Google Scholar

Li, L. P. et al. Risk assessment of water inrush in karst tunnels and software development. Arab. J. Geosci. 8(4), 18431854. https://doi.org/10.1007/s12517-014-1365-3 (2014).

Article Google Scholar

Pan, Y. & Zhang, L. M. A BIM-data mining integrated digital twin framework for advanced project management. Autom. Constr. 124, 103564. https://doi.org/10.1016/j.autcon.2021.103564 (2021).

Article Google Scholar

Li, S. C. et al. An overview of ahead geological prospecting in tunneling. Tunn. Undergr. Space Technol. 63, 6994. https://doi.org/10.1016/j.tust.2016.12.011 (2017).

Article Google Scholar

See the original post:

BIM-based digital platform and risk management system for ... - Nature.com

Read More..

Experts Detail New Zero-Click Windows Vulnerability for NTLM Credential Theft – The Hacker News

Cybersecurity researchers have shared details about a now-patched security flaw in Windows MSHTML platform that could be abused to bypass integrity protections on targeted machines.

The vulnerability, tracked as CVE-2023-29324 (CVSS score: 6.5), has been described as a security feature bypass. It was addressed by Microsoft as part of its Patch Tuesday updates for May 2023.

Akamai security researcher Ben Barnea, who discovered and reported the bug, noted that all Windows versions are affected, but pointed out Microsoft, Exchange

servers with the March update omit the vulnerable feature.

"An unauthenticated attacker on the internet could use the vulnerability to coerce an Outlook client to connect to an attacker-controlled server," Barnea said in a report shared with The Hacker News.

"This results in NTLM credentials theft. It is a zero-click vulnerability, meaning it can be triggered with no user interaction."

It's also worth noting that CVE-2023-29324 is a bypass for a fix Microsoft put in place in March 2023 to resolve CVE-2023-23397, a critical privilege escalation flaw in Outlook that the company said has been exploited by Russian threat actors in attacks aimed at European entities since April 2022.

Akamai said the issue stems from complex handling of paths in Windows, thereby allowing a threat actor to craft a malicious URL that can sidestep internet security zone checks.

"This vulnerability is yet another example of patch scrutinizing leading to new vulnerabilities and bypasses," Barnea said. "It is a zero-click media parsing attack surface that could potentially contain critical memory corruption vulnerabilities."

In order to stay fully protected, Microsoft is further recommending users to install Internet Explorer Cumulative updates to address vulnerabilities in the MSHTML platform and scripting engine.

See the original post here:
Experts Detail New Zero-Click Windows Vulnerability for NTLM Credential Theft - The Hacker News

Read More..

Feds Dismember Russia’s ‘Snake’ Cyberespionage Operation – BankInfoSecurity.com

Cyberwarfare / Nation-State Attacks , Endpoint Security , Fraud Management & Cybercrime

Federal prosecutors said Tuesday that they had disrupted a Russian intelligence cyberespionage operation by targeting malware used by Kremlin hackers to steal classified and sensitive information. The disruption occurred through the remote deployment of an FBI tool dubbed Perseus that issued commands causing the malware, known as Snake, to overwrite itself.

See Also: Live Webinar | Education Cybersecurity Best Practices: Devices, Ransomware, Budgets and Resources

A U.S. District Court judge issued a search and seizure order Thursday authorizing the FBI to use the tool to target eight U.S. systems infected by Snake as part of an effort the Department of Justice dubbed "Medusa." In Greek mythology, Perseus slayed the Gorgon Medusa after being tricked into the quest by his would-be father-in-law.

The FBI in a sworn statement tied the malware to a unit of Russia's Federal Security Service also known as Turla, a group also dubbed "Krypton," "Venomous Bear" and "Waterbug" by security researchers.

Turla regularly targets both government agencies and the private sector, and is known to have stolen documents from hundreds of systems worldwide. Its victims include NATO governments, journalists and others of interest to Moscow.

Michael J. Driscoll, assistant director in charge of the FBI's New York field office, described Snake as the Russian government's "foremost cyberespionage tool."

Most Snake infections use the host computer as a routing point in a peer-to-peer network used by Russian state hackers, the FBI said, "to make it more difficult for compromised victims to identify and block suspicious connections to Snake-compromised endpoints, among other reasons." Although Snake's code is the basis for a range of highly prolific malware including the Carbon backdoor, Kremlin hackers have not deployed Snake widely in a bid to decrease the probability of detection, the FBI also said.

Snake gains persistence on infected systems by loading a kernel driver and employing a keylogger that routinely reports back to FSB hackers, says a joint cybersecurity advisory released Tuesday by the Five Eyes intelligence alliance, comprised of Australia, Canada, New Zealand, United Kingdom and United States.

"Many systems in this P2P network serve as relay nodes which route disguised operational traffic to and from Snake implants on the FSB's ultimate targets," the advisory says. "Snake's custom communications protocols employ encryption and fragmentation for confidentiality and are designed to hamper detection and collection efforts."

Snake's kernel component examines inbound internet traffic to see if it contains a unique authentication code. When it does, it forwards the packets onward to another Snake node. That method of interception allows the malware to communicate without detection by ordinary intrusion detection security apps or firewalls.

Versions of Snake infect systems running Windows, as well as Linux and MacOS, and are designed to allow attackers to push modules with additional malicious capabilities onto infected endpoints. Even when victims detect the malware, it has historically been tough to eradicate.

Nevertheless, the DOJ said Snake's developers made some errors that it was able to exploit to find ways to disrupt the malware and its associated infrastructure.

Even if Snake operations are permanently disrupted, the group accused of wielding the Turla toolset has already secured its place in cybersecurity history, having been tied to one of the first known episodes of cyberespionage in the 1990s, dubbed Moonlit Maze by the FBI. Later, Turla was accused of building the malicious Agent.btz worm discovered in 2008, which successfully stole military secrets and helped birth U.S. Cyber Command.

"Turla is a Russian cyberespionage actor and one of the oldest intrusion groups we track, existing in some form as early as the 1990s when Kevin Mandia was responding to their intrusions into government and the defense industry," said John Hultquist, head of intelligence analysis at incident response firm Mandiant, which is part of Google.

Western intelligence officials say Snake began development as "Uroburos" in late 2003 and debuted in early 2004. They say it appears to be tied to a specific facility in Ryazan, Russia, backed by daily operations that run from about 7 a.m. to 8 p.m. local time.

Turla pursues "the classic targets of espionage - government, military and the defense sector - and their activity is characterized by a reliably quiet assault on these targets that rarely draws attention," said Hultquist, adding that the group has become known for its continuing innovation.

One of Turla's more innovative alleged efforts involved hijacking attack tools and command-and-control servers used by an Iranian nation-state group called OilRig - aka APT34, Crambus or Helix Kitten.

Russian-speaking attackers' use of the suborned Iranian infrastructure caused private-sector security researchers to first attribute the attacks to Iran. Later, the National Security Agency and U.K. National Cyber Security Center issued a joint alert saying that Russia had been behind a number of seeming OilRig campaigns (see: Turla Teardown: Why Attribute Nation-State Attacks?).

Turla's activities were detailed in a secret 2011 presentation by Canada's Communications Security Establishment that was leaked by ex-NSA contractor Edward Snowden in 2013.

The presentation describes the activities and infrastructure of Turla, which has the codename MAKERSMARK, as "designed by geniuses, implemented by morons." It says Turla members appeared to be using the attack infrastructure for personal browsing and that the group's development environment had been "infected by crimeware."

Read this article:
Feds Dismember Russia's 'Snake' Cyberespionage Operation - BankInfoSecurity.com

Read More..

CRN’s 2023 "Women of the Channel" Honors VIPRE Security … – PR Newswire

Two of VIPRE's channel program leaders are named to the prestigious list published annually by CRN.

NEW YORK, May 10, 2023 /PRNewswire/ -- VIPRE Security Group, a global leader and award-winning cybersecurity, privacy, and data protection company, announced today that CRN, a brand of The Channel Company, has named Tiffany Torson, senior director, cybersecurity sales and client success, and Heather Scaglione, global channel marketing manager, to the Women of the Channel list for 2023.

Each year, CRN recognizes women from vendor, distributor, and solution provider organizations whose expertise and vision have a noticeable and commendable impact on the technology industry.

CRN's annual Women of the Channel list honors exceptional women for their strategic vision, thought leadership and channel advocacy that impacts growth and innovation in the channel. The annual Women of the Channel list is the official guide to the top female leaders of the IT channel.

With this recognition, CRN honors leading women for their unwavering dedication and commitment to furthering channel excellence.

Torson leads VIPRE's retention business for channel partners. In her role, Torson assisted in the re-vamp and re-launch of VIPRE's channel partner program, re-organized the channel client success team to better serve partners, mentored new partner account managers, and provided them with ongoing training.

She's also focused on the VIPRE channel team maximizing incentives for new channel business referrals and partner expansion efforts, as well as increasingengagement with the company's key strategic partners to help drive their marketing efforts.

"I am thrilled to be counted among this group of amazing women and to represent the philosophy of VIPRE Security Group," Torson said. "We are re-launching our channel partner program with a "Channel First" strategy to better help our partners grow their business, providing increased lead generation support, additional marketing development fund opportunities and partner portfolio expansion to increase their margins.

"Our partnership with the IT channel community has always been the cornerstone of our growth strategy, and this year, with our newly re-launched partner program, it means we're taking our commitment to the channel to the next level," Torson added.

Scaglione leads VIPRE's global channel marketing efforts to empower partners with the resources they need to grow their businesses. Some of the programs she's led include the launch of VIPRE's global channel roadshows to promote face-to-face engagement and information exchange among partners, global webinar programs, newly introduced MDF programs, and a completely revamped global partner portal experience.

"I am truly honored and humbled to be recognized on the same list as so many other extraordinarywomen in the channel," Scaglione said. "With our new and improved VIPRE partner program, we hope to enable our partner community with everything they need to be successful and profitable while having a little bit of fun, and I'm committedto growing the channel through our amazing partners and continuing to bring them world-class cybersecurity solutions."

Lee Schor, chief revenue officer for VIPRE, who has a long history working in the channel, noted VIPRE's renewed commitment to the channel is obvious and is paying dividends to the organization and its partners, as evidenced by this acknowledgment from CRN.

"Tiffany and Heather are channel professionals of the highest merit and we're thrilled that they have been recognized by CRN and are here helping us make VIPRE one of the world's best channel-focused organizations," Schor said. "There are many channel-focused initiatives underway with VIPRE and Tiffany and Heather are significant contributors to the success of these programs and to all who benefit from working with us."

Blaine Raddon, CEO of The Channel Company, said, "We are ecstatic to announce this year's honorees and shine a light on these women for their significant achievements, knowing that what they've accomplished has paved the way for continued success within the IT channel. The channel is stronger because of them, and we look forward to seeing what they do next."

The 2023 Women of the Channel list will be featured in the June issue of CRN Magazine, with online coverage starting May 8 atwww.CRN.com/WOTC.

About The Channel Company

The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers, and end-users. Backed by more than 30 years of unequaled channel experience, we draw from our deep knowledge to envision innovative solutions for ever-evolving challenges in the technology marketplace. http://www.thechannelcompany.com

About VIPRE Security Group

VIPRE Security Group is a leading provider of internet security solutions purpose-built to protect businesses, solution providers, and home users from costly and malicious cyber threats. With more than 25 years of industry expertise, VIPRE is one of the world's largest threat intelligence clouds, delivering exceptional protection against today's most aggressive online threats. Its award-winning software portfolio includes next-generation antivirus endpoint cloud solutions, advanced email security products, along with threat intelligence for real-time malware analysis, and security awareness training for compliance and risk management. VIPRE solutions deliver easy-to-use, comprehensive layered defense through cloud-based and server security, with mobile interfaces that enable instant threat response. VIPRE is a proud Advanced Technology Partner of Amazon Web Services operating globally across North America and Europe. The group operates under various brands, including VIPRE, StrongVPN, IPVanish, Inspired eLearning, Livedrive, and SugarSync. http://www.VIPRE.com

Press Contact:

Scott E. Rupp941-448-7566https://millerrupp.com/

SOURCE VIPRE Security Group

Excerpt from:
CRN's 2023 "Women of the Channel" Honors VIPRE Security ... - PR Newswire

Read More..