Highlights from Yesterdays House of Assembly Meeting

Highlights from Yesterdays House of Assembly Meeting

first_img Attorney General announces 14 Law Reforms for 2016 Facebook Twitter Google+LinkedInPinterestWhatsAppProvidenciales – New law now prevents the government from including scholarship funding in investor development agreements… this coming out yesterday, again in the House of Assembly during the parliamentary question portion of debate. The Public Finance mechanism, explained the ministers prevents TCIG from brokering these extras. Also from the Q&A portion, it was revealed that the Police Force Cold Case Unit had been sleeping… with the loss of key personnel, the unit fell inactive. The Attorney General was responding and explained that Inspector Daniel Miller has now been tasked with reviewing the unresolved death files. There are 15 cases in the Turks and Caicos counted as unresolved… the oldest is from March 2004. Law enacted gives Governor and Planning Board more clout Facebook Twitter Google+LinkedInPinterestWhatsApp AG’s Office warns against false Registrar of Lands accusations Recommended for you Related Items:attorney general, police cold case unitlast_img read more

Virtual reality game Beat Saber reaches licensing deal with Imagine Dragons

first_img Oculus Virtual Reality Review • Oculus Quest is amazing, even months later Gaming Culture Tags The 10-track Imagine Dragons Music Pack will be available across major platforms like Oculus Quest and Rift.  Beat Saber Imagine Dragons fans and VR gaming nerds could soon be attending the same parties.Beat Saber, an award-winning virtual reality game, will get an Imagine Dragons music pack, Beat Games said Monday. The fast-paced music rhythm game is currently available on major VR platforms, such as Facebook’s Oculus Quest and Rift devices.The announcement of the expansion pack comes as the Electronic Entertainment Expo, or E3, gets underway in Los Angeles. The conference is the video game industry’s biggest event of the year, with updates on major game franchises and consoles. Oculus will demonstrate a new 360-degree level that features the Imagine Dragon’s hit “Believer.” A 360-degree level allows the user to look in all directions of their simulated environment as they would in real life. The 10-track music pack includes songs from the Grammy-winning band’s Night Visions, Smoke + Mirrors, Evolve and Origins albums. The addition of Imagine Dragons songs marks the first time major labels have partnered on an expansion pack for the VR game. Imagine Dragons is on the KIDinaKORNER and Interscope Records labels. Players can buy songs individually for $1.99 apiece or purchase the entire package for $12.99. The pack, which goes on sale Monday at 9:15 a.m. PT, will be available on all major VR platforms.  CNET may get a commission from retail offers. In the game, players wear VR controllers and slash beats that zoom towards them. A VR headset uses two small lenses to focus images for players and immerse them in the game experience. Players slash red blocks with their left hands and blue ones with their right hands. The game uses music and visual effects to build excitement and has been compared to the VR versions of Guitar Hero or Just Dance. $398 News • Oculus Quest may have its first killer app with Beat Saber See it 0 Oculus Quest Post a comment Mentioned Above Oculus Quest Share your voicelast_img read more

Union Home Ministry calls for disciplinary proceedings against Rajeev Kumar

Union Home Ministry calls for disciplinary proceedings against Rajeev Kumar

first_imgKolkata: The Union Home Ministry on Tuesday wrote to the Mamata Banerjee government, asking it to start disciplinary proceedings against Kolkata Police Commissioner Rajeev Kumar, alleging indiscipline and violation of All India Services (Conduct) Rules.In a letter to state Chief Secretary Malay De, the Home Ministry said that as per information received, Kumar sat on a dharna along with some police officers and Chief Minister Mamata Banerjee at the dharna manch in Metro Channel, which violates All India Services (Discipline & Appeal) Rules, 1969. His action is prima facie in contravention of the extant provisions of the All India Services (Conduct) rules, 1968 and All India Services (Discipline and Appeal) Rules, 1969, the ministry said. Also Read – Bose & Gandhi: More similar than apart, says Sugata BoseThe MHA communication cited the extant provisions of the Rules 3(1), 5(1) and 7 of the AIS (Conduct) Rules, 1968, which were flouted by Kumar. The Chief Minister, however, made it clear that Kumar had never joined the dharna manch at Metro Channel. “A police officer is free to come and talk with the Chief Minister as it is the duty of a police officer to give protection to the latter. The SPG also accompanies the Prime Minister during political meetings. An IPS officer visits different spots during elections as part of their duty. They (Centre) are doing this only out of political vendetta,” Banerjee said. Banerjee came down heavily upon Prime Minister Narendra Modi, alleging that he is now trying to take control of state agencies as well. Also Read – Rs 13,000 crore investment to provide 2 lakh jobs: Mamata”Will he now try to take control of law and order, education and agriculture which are state subjects? There is no democracy in the country and one man rule is going on. The PM should resign and go back to Gujarat,” she said, adding that IAS and IPS officers are now being targeted out of political vendetta. It has been learnt that Kolkata Police Commissioner Rajeev Kumar has written a letter addressing the CBI director that he is ready to appear before the CBI investigating officers at Shillong on February 8. Kumar has also made it clear in his letter that there is no question of non-cooperation with the Central agency for the sake of investigation.last_img read more

7 Cybersecurity Layers Every Entrepreneur Needs to Understand

first_img Opinions expressed by Entrepreneur contributors are their own. This week, a teenage high school student reportedly hacked into the email account of CIA Director John Brennan and posted personal details to WikiLeaks. Granted, Brennan was using an AOL account, and the hack was likely a “social engineering” attack, in which personal information, most likely obtained by using information easily found online, was used to break in.Regardless, if the email for the CIA director is not safe, what chance do we have?If you think that having an email hacked is the worst that could happen, consider someone using your information to order countless pizzas, call in bomb threats or make racist comments on your behalf online. This is the terrifying case of Paul and Amy Strater, a middle class couple from Oswego, Ill., whose lives became the unfortunate collateral damage of a cyber war raged against their teenage hacker son, who unwisely picked a fight with another (and better) hacker in an online chat room he frequented.Mike Schroll, the VP of business development for PC Pitstop, a creator of security and performance software, is a former hacker and made his living professionally hacking into and identifying vulnerable areas in the cyber infrastructure of large organizations.Related: Don’t Wait for a Disaster to Interrupt Business. Prepare Now.Schroll points out that several layers of cyber security exist, like an onion — both of which, if hacked, will cause many tears — and entrepreneurs and business managers need to be aware of all the layers to best protect a company’s cyber infrastructure from threats.1. Social engineeringThe first layer is protecting your company from attacks from afar. Hackers have been known to find general information about an individual online — we do, after all, share everything about ourselves on social media — and use this information to manipulate employees of companies, such as banks, to disclose personal and sensitive information. While these disclosures are a failure on the part of the employee, more often it is a systematic failure of the organization to train and emphasize security protocols.Schroll suggest that you make certain you have stated security processes that are reviewed with your employees and tested often. Have a process to verify callers and never disclose passwords or other sensitive customer information.2. Physical securityWhile you may believe your building and technology — and hence your sensitive information — is safe and secure physically, good hackers know “tricks” that will allow them to penetrate even this layer of security. Additionally, many business owners pay little attention to other physical aspects of their companies’ operations that pose a threat, such as leaving computers exposed or failing to destroy old hard drives.As with other employees, these physical security breaches are not always an issue with the security personnel but rather the organization’s general security protocols. Schroll recommends that you encrypt your drives, leverage cloud backups, enclose any hardware ports exposed to the public, have old hardware disposed by professionals and use theft recovery software, such as Prey Project, on business devices.3. Wireless securityYour wireless Internet also poses a threat to your company. We often forget that Wi-Fi signals can extend much farther than the walls of our offices, and a hacker with a good antenna can connect to your signal from far away. Once in your network, file shares without protection or computer accounts that have simple passwords become an easy channel for getting to other sensitive information.Schroll says companies should be using WPA2 protocols, not the antiquated WEP or WPA. Additionally, your router password needs to be as strong as all other passwords. Never use a default password and make certain it is nothing that can be easily guessed (your company address, for instance).4. PasswordsAccording to Schroll, passwords are like underpants — they need to be changed often, kept private and never shared with anyone. The best passwords are long, use a combination of uppercase and lowercase letters, numbers and symbols, and are different across accounts.Schroll suggests using phrases, which are easier to remember. For example, consider this famous phrase from the movie, Forrest Gump, “Life’s a box of chocolates, Forrest. You never know what you’re gonna get,” which would translate to a very effective password “L’aboc,F.Ynkwy’gg.”While keeping track of all of these passwords may be overwhelming, consider a service, such as 1Password or LastPass to maintain and keep your passwords secure.Related: Apple’s New 6-Digit Passcodes: What Do They Mean for Your BYOD Policy?5. Two-factor authenticationEven with difficult passwords, good hackers still have ways to penetrate account security. For this reason, businesses should strongly consider using two-factor authentication (2FA). Most large companies, such as Google, Apple and Dropbox, offer 2FA with a mobile phone number or email account, and apps such as Authy and Google Authenticator can help you implement it with other apps and services.As more secure methods continue to be developed, such as fingerprint and facial recognition and even ultrasonic sounds, companies should not shy away from updating security measures as often as needed to stay ahead of hackers.6. Email securityIf you protect nothing else, Schroll emphasizes the need to at least protect email accounts. Consider that once hackers get into an email account, it is not difficult to get access to other accounts, considering your email account is typically how you reset forgotten passwords. While it is old news, Schroll says to never click links in emails or attachments, as many take you to phishing sites that look remarkably like real sites. Instead, open a website by creating a new tab on your browser and typing the website URL.Schroll goes further to recommend using Gmail and Google Apps (with 2FA, of course), as Google has superior spam, virus and phishing protections.7. Anti-virusMost anti-virus software has services that assist in keeping email accounts and other sensitive information safe. Even the best software, however, has vulnerabilities. Malicious software viruses are being created at breakneck speed, and virus-protection companies have difficulty keeping track of all of them on their “blacklists.”For this reason, businesses should consider using a service that employs a “whitelist,” such as PC Matic. With whitelist protection, the security only allows software and programs that are pre-approved to be downloaded, adding an additional layer of protection to your system.Understand that your business stands a very, very good chance of getting hacked — it is just a matter of when. Take the appropriate measures to secure your hardware, software and cloud accounts, and have a clear, detailed and stated information and technology security policy.Remember: Stay out of online chat rooms and never, under any circumstance, mess with teenage hackers or anyone with a profile name that sounds like a mob boss or fantasy wizard with too many misplaced uppercase letters.Related: 5 Growing Cyber-Security Epicenters Around the World Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now Enroll Now for Free 6 min read This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. October 26, 2015last_img read more

PropelTO networking group launches in Toronto for all ages in the travel

PropelTO networking group launches in Toronto for all ages in the travel

first_img Share Tags: Events, PropelTO, Toronto Travelweek Group Posted by PropelTO networking group launches in Toronto for all ages in the travel industrycenter_img Thursday, July 25, 2019 << Previous PostNext Post >> TORONTO — From the ashes of Young Travel Professionals (YTP) rises a new networking group in Toronto called PropelTO, giving the travel industry a place to network, connect and share ideas.The sold-out launch event, sponsored by Tour Radar and Sherpa, was held last night at the Toronto Island Marina & Yacht Club and successfully brought together over 100 industry professionals of all ages.“When YTP disbanded all its global chapters in April, the Toronto board still saw an undeniable need to provide a venue for community and networking in a relaxed setting, for those of us who are passionate about driving the industry forward, “ says Iris Serbanescu, PropelTO board member and TourRadar’s director of partnerships.The main difference between YTP and PropelTO is that it intends to be more inclusive, welcoming all ages. Added Annie Ewing, PropelTO board member and TTI luxury travel advisor: “Rather than focusing on an age cohort, we are building a membership that is enthusiastic and forward-thinking about the future of the travel industry at any age.”The vision for PropelTO is to continue having causal networking events, like the launch event on the island, but also to incorporate roundtable discussions and leading edge speakers into the event series. PropelTO intends to be a voice of the travel industry and would like to be a collaborative association, getting ideas from its members and focusing on community engagement.More news:  Hotel charges Bollywood star $8.50 for two bananas and the Internet has thoughtsAt the event last night, travel professionals had the chance to network, enjoy food and beverages and take in the beautiful views of the Toronto skyline. Also, an open mic session allowed guests 30 seconds to promote their brand and job openings or share anything that might be relevant to the group. This will be a staple of events going forward, with the next event planned for September.“The event was awesome and I was able to meet a lot of different people within a short period of time. When the age limit was lifted, it seems like there were a lot more people in attendance and it was a great opportunity for me to connect with many different people across the industry,” says Kate Ivchenko, Wheels Up Network content manger and PropelTO member.Here’s how you can get involved in PropelTO:• Become a member and get notified of future events by signing up at propelto.org/#join-us• Volunteer to be an Ambassador and help recruit attendees for future events• Follow us on Facebook and use #PropelTO in social media postsMore news:  Windstar celebrates record-breaking bookings in JulyPropelTO is also seeking corporate event sponsors. Like-minded travel businesses can benefit from connecting with PropelTO’s membership base in person. Sponsors would commit to covering all or some of the cost of drinks and snacks in exchange for a chance to scout potential new hires, increase brand awareness and receive marketing privileges.“We all love working in the travel industry and know that there is a lot of passion, knowledge and ideas floating around the community. We intended to bring together all individuals that are committed to creating an even better industry for the future, as well as continuing to build our industry friendships” says Devin Kinasz, board member and Travelweek publisher.For more information contact PropelTO at propeltoorg@gmail.com.last_img read more