(Annie Pootoogook was found dead in the Rideau River on Sept. 19)APTN National NewsInusiq Shoo said he cried “a little bit” when he heard the news his cousin, famed Inuit artist Annie Pootoogook was the woman whose body was found Sept. 19 submerged in the waters of the Rideau River near downtown Ottawa.Shoo said he was on the computer at the Rideau branch of the Ottawa public library Friday when his friend came over to tell him about a story that just popped up on Facebook from Nunavut newspaper Nunatsiaq News saying Pootoogook was dead.“I was shocked,” said Shoo, during an interview at a men’s shelter in Ottawa Friday night. “I am going to miss her. I loved her as a cousin.”Pootoogook’s body was found in the Rideau River near the Bordeleau Park in an area of Ottawa known as Lowertown. The city’s trendy ByWard Market is just a few blocks from the park.Pootoogook is best known for her artwork, which is in the collections of the National Art Gallery and the Ontario Gallery of Art. Her work has been displayed in galleries from Toronto, to New York City to Germany.Originally from Cape Dorset, Nunavut, Pootoogook moved to Ottawa as her fame in the art world grew. Once in the city, she slid deep into alcohol and wound up at times homeless and eventually pregnant.She was well known among the street and homeless community in the city and news of her death was slowly spreading Friday night.Some expressed grief and anger and disputed the Ottawa police’s statement that no foul play was suspected in her death.Ottawa police also issued a public call for help in tracing Pootoogook’s last movements.“It’s not right what happened to her,” said one woman, who was on a bench in Bordeleau Park late Friday evening.Shoo said he didn’t know what led to Pootoogook’s death in the river. He said he knew she was trying to leave her partner William Watt, known on the street as Bill or Billy.“She always said she wanted to get rid of him, but she couldn’t,” he said.Another woman who claimed she knew Pootoogook but didn’t want her name published, said she would try to leave Watt and escape to a shelter but he would also show up to “sweet talk her” with a bottle.Shoo she shared a special connection with Pootoogook through their language.“We always talked in Inuktitut when we see each other,” he said. “We never spoke English. That is how we know each other.”Pootoogook was 46, police said.“She was the best artist I ever saw,” said Shoo.
KUSI Newsroom, 00:00 00:00 spaceplay / pause qunload | stop ffullscreenshift + ←→slower / faster ↑↓volume mmute ←→seek . seek to previous 12… 6 seek to 10%, 20% … 60% XColor SettingsAaAaAaAaTextBackgroundOpacity SettingsTextOpaqueSemi-TransparentBackgroundSemi-TransparentOpaqueTransparentFont SettingsSize||TypeSerif MonospaceSerifSans Serif MonospaceSans SerifCasualCursiveSmallCapsResetSave SettingsSAN DIEGO (KUSI)- The Bicycle Advisory Board held a press conference Wednesday morning, celebrating the location where the first protective bike lane opened up in downtown San Diego last month. They also called for more action and more bike lanes in the near future, so cars and bikes can safely share the roads.“We have to design streets, not just for cars, but for people,” said Nicole Capretz, Executive Director of the Climate Action Campaign.It’s no secret. A drive in your car around downtown San Diego is enough to make your blood boil.“It’s expensive to park,” said Andy Hanshaw, Executive Director of the San Diego Bicycle Coalition. “There’s very little parking, so let’s start giving people choices, like riding your bike downtown.”Nicole Capretz told KUSI Reporter Dani Ruberti she likes to ride her bike every day, to work, to the grocery store, to run errands, but sometimes it can be scary.“To do that, I have to feel safe,” said Capretz. “Right now, unfortunately, because our streets are designed for cars, because we don’t have protective bike lanes in so many places, I don’t feel safe.”The folks with the Bicycle Advisory Board want to the change the mindset, redesign some of the streets and make San Diego a place where people want to ride their bikes.“It will change the quality of life in our city,” said Capretz. “It will make us more of a world class city where people have options with where they move around.”Hanshaw said the city implemented the first protective bike lane in downtown San Diego along J Street between First Ave and Park Blvd last month. It’s like a sidewalk for a bike. There’s also separate bicycle signals along the path to make the busy intersection safer.“You give them the places to ride to make it easy for them to choose to ride,” said Hanshaw. “If you live in downtown and you now have this access to this safe network, why wouldn’t you consider bike riding?”The Bicycle Advisory Board celebrated accomplishments. They said they’re thankful the city redesigned J Street with a bike friendly route, but Capretz said promises have been made and more needs to be done.“We are never going to give up and we are going to continue to pressure and advocate and hopefully persuade the mayor and the council to use our taxpayer dollars to create safe streets, so families have the opportunity to ride their bike if they choose to when they want to move around San Diego,” said Capretz.Hanshaw said the goal is to have a 9-mile network of protected bike lanes connecting streets throughout downtown San Diego in the next year and a half. Bicycle Advisory Board pushes for more protected bike lanes Posted: February 6, 2019 February 6, 2019 Updated: 10:50 AM Categories: Local San Diego News FacebookTwitter KUSI Newsroom
Kolkata: State Transport minister Suvendu Adhkari will hold a meeting with the state government employees’ union at Trinamool Bhavan on Monday, to give a hearing to the demands and problems faced by them. Adhikari has recently been given the responsibility to look after the welfare of the government employees in the state, by Trinamool Congress supremo Mamata Banerjee.It may be mentioned that BJP had taken a lead in 39 among the 42 Lok Sabha seats in the state, when it came to postal ballot voting. Trinamool managed a lead in two seats, while the Left Front had a lead in a solitary seat. Also Read – Rs 13,000 crore investment to provide 2 lakh jobs: MamataTrinamool was ahead in the Kolkata South and Raiganj parliamentary constituencies, while the Left lead was in the Jadavpur seat. The Jadavpur seat, however, was won by Trinamool candidate Mimi Chakraborty, while Left Front’s Bikash Bhattacharjee bagged the third spot. In the Lok Sabha results, Trinamool managed to win 22 seats against 18 won by the saffron party. It may be mentioned that Trinamool Congress secretary general and state Education minister Partha Chatterjee has been looking after the welfare of the government employees till date. Also Read – Lightning kills 8, injures 16 in state”The meeting has been called to apprise Suvendu Babu (Suvendu Adhikari) about various issues regarding the government employees,” said Soumya Biswas, convener of West Bengal Government Employees Federation. Chatterjee will also be present at the meeting. In a number of seats, BJP candidates were found to take huge leads in postal ballot results. Raju Bista from Darjeeling took a lead of 4,679 votes in postal ballot, in comparison to Trinamool candidate Amar Singh Rai. Bista got 5,410 votes against Rai’s 831. In Barrackpore, BJP’s Arjun Singh got 1,504 postal votes, against a meagre 267 managed by Dinesh Trivedi of Trinamool. Sources in the state secretariat Nabanna said that resentment of state government employees over dearness allowance and dragging feet on effective implementation of the sixth pay commission in the state could have been “a factor”, as their votes comprise a part of the overall postal votes in each constituency.
Opinions expressed by Entrepreneur contributors are their own. This week, a teenage high school student reportedly hacked into the email account of CIA Director John Brennan and posted personal details to WikiLeaks. Granted, Brennan was using an AOL account, and the hack was likely a “social engineering” attack, in which personal information, most likely obtained by using information easily found online, was used to break in.Regardless, if the email for the CIA director is not safe, what chance do we have?If you think that having an email hacked is the worst that could happen, consider someone using your information to order countless pizzas, call in bomb threats or make racist comments on your behalf online. This is the terrifying case of Paul and Amy Strater, a middle class couple from Oswego, Ill., whose lives became the unfortunate collateral damage of a cyber war raged against their teenage hacker son, who unwisely picked a fight with another (and better) hacker in an online chat room he frequented.Mike Schroll, the VP of business development for PC Pitstop, a creator of security and performance software, is a former hacker and made his living professionally hacking into and identifying vulnerable areas in the cyber infrastructure of large organizations.Related: Don’t Wait for a Disaster to Interrupt Business. Prepare Now.Schroll points out that several layers of cyber security exist, like an onion — both of which, if hacked, will cause many tears — and entrepreneurs and business managers need to be aware of all the layers to best protect a company’s cyber infrastructure from threats.1. Social engineeringThe first layer is protecting your company from attacks from afar. Hackers have been known to find general information about an individual online — we do, after all, share everything about ourselves on social media — and use this information to manipulate employees of companies, such as banks, to disclose personal and sensitive information. While these disclosures are a failure on the part of the employee, more often it is a systematic failure of the organization to train and emphasize security protocols.Schroll suggest that you make certain you have stated security processes that are reviewed with your employees and tested often. Have a process to verify callers and never disclose passwords or other sensitive customer information.2. Physical securityWhile you may believe your building and technology — and hence your sensitive information — is safe and secure physically, good hackers know “tricks” that will allow them to penetrate even this layer of security. Additionally, many business owners pay little attention to other physical aspects of their companies’ operations that pose a threat, such as leaving computers exposed or failing to destroy old hard drives.As with other employees, these physical security breaches are not always an issue with the security personnel but rather the organization’s general security protocols. Schroll recommends that you encrypt your drives, leverage cloud backups, enclose any hardware ports exposed to the public, have old hardware disposed by professionals and use theft recovery software, such as Prey Project, on business devices.3. Wireless securityYour wireless Internet also poses a threat to your company. We often forget that Wi-Fi signals can extend much farther than the walls of our offices, and a hacker with a good antenna can connect to your signal from far away. Once in your network, file shares without protection or computer accounts that have simple passwords become an easy channel for getting to other sensitive information.Schroll says companies should be using WPA2 protocols, not the antiquated WEP or WPA. Additionally, your router password needs to be as strong as all other passwords. Never use a default password and make certain it is nothing that can be easily guessed (your company address, for instance).4. PasswordsAccording to Schroll, passwords are like underpants — they need to be changed often, kept private and never shared with anyone. The best passwords are long, use a combination of uppercase and lowercase letters, numbers and symbols, and are different across accounts.Schroll suggests using phrases, which are easier to remember. For example, consider this famous phrase from the movie, Forrest Gump, “Life’s a box of chocolates, Forrest. You never know what you’re gonna get,” which would translate to a very effective password “L’aboc,F.Ynkwy’gg.”While keeping track of all of these passwords may be overwhelming, consider a service, such as 1Password or LastPass to maintain and keep your passwords secure.Related: Apple’s New 6-Digit Passcodes: What Do They Mean for Your BYOD Policy?5. Two-factor authenticationEven with difficult passwords, good hackers still have ways to penetrate account security. For this reason, businesses should strongly consider using two-factor authentication (2FA). Most large companies, such as Google, Apple and Dropbox, offer 2FA with a mobile phone number or email account, and apps such as Authy and Google Authenticator can help you implement it with other apps and services.As more secure methods continue to be developed, such as fingerprint and facial recognition and even ultrasonic sounds, companies should not shy away from updating security measures as often as needed to stay ahead of hackers.6. Email securityIf you protect nothing else, Schroll emphasizes the need to at least protect email accounts. Consider that once hackers get into an email account, it is not difficult to get access to other accounts, considering your email account is typically how you reset forgotten passwords. While it is old news, Schroll says to never click links in emails or attachments, as many take you to phishing sites that look remarkably like real sites. Instead, open a website by creating a new tab on your browser and typing the website URL.Schroll goes further to recommend using Gmail and Google Apps (with 2FA, of course), as Google has superior spam, virus and phishing protections.7. Anti-virusMost anti-virus software has services that assist in keeping email accounts and other sensitive information safe. Even the best software, however, has vulnerabilities. Malicious software viruses are being created at breakneck speed, and virus-protection companies have difficulty keeping track of all of them on their “blacklists.”For this reason, businesses should consider using a service that employs a “whitelist,” such as PC Matic. With whitelist protection, the security only allows software and programs that are pre-approved to be downloaded, adding an additional layer of protection to your system.Understand that your business stands a very, very good chance of getting hacked — it is just a matter of when. Take the appropriate measures to secure your hardware, software and cloud accounts, and have a clear, detailed and stated information and technology security policy.Remember: Stay out of online chat rooms and never, under any circumstance, mess with teenage hackers or anyone with a profile name that sounds like a mob boss or fantasy wizard with too many misplaced uppercase letters.Related: 5 Growing Cyber-Security Epicenters Around the World Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now Enroll Now for Free 6 min read This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. October 26, 2015