POPULARITY
With a strong second-term mandate, Prime Minister Anthony Albanese has a rare chance to drive real change. From tax to housing to climate policy, the moment is ripe for long-term reform that could shape Australia's future for decades. But where to begin? Plus, listener Alex challenges the narrative around government debt and household budgets. Guests:Aruna Sathanapally - Chief executive, and economic prosperity director, of the Grattan InstituteMichael Janda - ABC News Business EditorGet in touch: We read all of your emails, and appreciate each one. Please keep them coming theeconomy.stupid@abc.net.au or use the #PeterMartinEconomy on Instagram to get our attention.Listen to the full interview with Ken Henry on the Joseph Walker podcast: https://josephnoelwalker.com/ken-henry-aus-policy-series/
Whether it's increasing rent or mortgage repayments, the surging cost of buying a house or simply finding a secure place to live, Australians are struggling more than ever with housing costs. And with a federal election around the corner, cost-of-living is one of the biggest issues facing voters. Labor is spruiking the housing policies that it legislated over its first term, including the newly expanded Help to Buy scheme. The Coalition is promising to allow first home buyers to use their super to help purchase their home. Both parties are proposing a two-year ban on foreign residents purchasing existing homes. But do the policies on offer from the major parties go far enough to help make housing more affordable for more Australians? In this podcast, two Grattan experts, Brendan Coates and Matthew Bowes, evaluate the housing policies on offer – and suggest that whoever wins the election should pursue more comprehensive reforms. Read the 2025 Orange Book: https://grattan.edu.au/report/orange-book-2025/
As Australia prepares for the 2025 federal election, our new Orange Book identifies the big reforms needed to set Australia on a more prosperous path. Find out what policies should be on the agenda of whoever wins the election – whether Labor or Coalition, majority or minority – on our latest podcast, with Aruna Sathanapally, Tony Wood, and host Kate Griffiths. Read the Orange Book: https://grattan.edu.au/report/orange-book-2025/
Patron and Aussie mate Emile gives his thoughts on his very first game of WHFB 3rd edition with his mate in Sydney Australia played over a beautifully board filled with hand crafted terrain and painted miniatures.What more could you ask for.Our podcast is now proudly sponsored by Black Arrow Minis.Please check out their website and email contact below:Email: blackarrowgamessales@gmail.comWebsite: https://blackarrowminis.com/Crown of Command Games YouTubehttps://www.youtube.com/channel/UC504rUqQda8H0uXRZajBL3gPatreon:https://www.patreon.com/thecrownofcommandpodcastDiscord community:https://discord.gg/hJXsefB74EEavy Lead Studios:eavylead@gmail.comInstagram:https://www.instagram.com/the_crown_of_command_podcast_/Eavy Lead Facebook Gallery:https://www.facebook.com/profile.php?id=61555431553809Rosemary&Co.https://www.rosemaryandco.com?u=CROWN2024Check out our Herohammer Fanzine here:www.herohammer-fanzine.comCrown of Command Merchhttps://my-store-c355eb.creator-spring.com/Facebook Grouphttps://www.facebook.com/groups/4274948262546353Contact me:thecrownofcommandpodcast@gmail.comMetallicious Metalicious by Alexander Nakarada (CreatorChords) | https://creatorchords.comMusic promoted by https://www.free-stock-music.comCreative Commons / Attribution 4.0 International (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/A Journey Through The Universe by Lesion X | https://soundcloud.com/lesionxbeatsMusic promoted by https://www.free-stock-music.comCreative Commons / Attribution 3.0 Unported License (CC BY 3.0)https://creativecommons.org/licenses/by/3.0/deed.en_USShelter Song by Alexander Nakarada (CreatorChords) | https://creatorchords.comMusic promoted by https://www.free-stock-music.comCreative Commons / Attribution 4.0 International (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/Thanks for your continued support and positive feedback guys.
2025 promises to be another busy year for intellectual property law. In this episode of IP Talk with Wolf Greenfield, you'll hear Wolf Greenfield attorneys from a variety of practice areas reviewing some of the top issues of 2024 and offering their insights on what to expect in the months ahead. Here are some of the highlights:01:02 - Chelsea Loughran's thoughts on The University of California v. Broad Institute, a federal court case involving competing patent applications for the CRISPR-Cas9 gene-editing system02:25 - Zach Piccolomini is watching the Unified Patent Court (UPC) for upcoming decisions in the standard essential patent space and “fair, reasonable and non-discriminatory” royalties03:34 - Jonathan Roses with insight on recent Orange Book developments and what to expect with the new administration 05:31 - Jen Wang offers advice for dealing with rejections in the wake of the Federal Circuit overturning a 40-year-old obviousness test for design patents in the LKQ v. GM case06:34 - Scott McKeown on noteworthy 2024 developments at the USPTO and some thoughts for what might happen in 2025 08:43 - John Strand on the Dewberry case, which was just argued before the Supreme Court (a decision is expected in the spring)10:23 - Gabe McCool discusses the BIO Secure Act
In this episode of Endo Voices, we spotlight Dr. Brooke Blicher, a visionary practice owner, educator and author who has redefined endodontic exam preparation with the groundbreaking "Orange Book." As the co-author of Endodontics Review and Clinical Endodontics along with Dr. Rebekah Lucier Pryles et al, Dr. Blicher has created indispensable resources that simplify complex concepts, making exam preparation more accessible and clinically relevant. These texts not only streamline studying but also serve as essential guides for integrating academic knowledge into everyday practice. Drawing on her rich clinical experience, mentorship and academic engagement, Dr. Blicher has shaped contemporary endodontic education by addressing pivotal topics such as cone beam CT imaging for enhanced case selection and the reimagining of retreatment and surgical procedures as highly successful alternatives to extractions. Her emphasis on mentorship, collaboration and staying current with literature ensures her work aligns with the highest standards of patient care.Episodes of Endo Voices may include opinion, speculation and other statements not verifiable in the scientific method and do not necessarily reflect the views of AAE or the sponsor(s). Listeners should use their best judgment in evaluating the merits of any content.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In this episode, we sit down with one of the most influential figures in government today: Federal Trade Commission Chair Lina Khan. As the youngest FTC chair to ever be appointed, during her tenure the FTC has pushed to ban non-compete agreements, filed lawsuits against healthcare companies engaging in anti-competitive practices, and strengthened the Health Breach Notification Rule (HBNR) to protect sensitive health data.We cover:- The FTC's role in healthcare and how it compares to other sectors- The impact of consolidation and vertical integration in the healthcare industry- The agency's efforts to combat rising drug prices, including the recent actions against major PBMs- The controversial "Orange Book" patent challenges and their implications for drug innovation- The nationwide ban on non-compete agreements and its potential effects on doctors- Chair Khan's vision for the future of competition law and its application to healthcareSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
The Institute of Economic Affairs recently hosted a Book Club event reflecting on "The Orange Book" published by the Liberal Democrats 20 years prior in 2004. The event was hosted by Tom Clougherty, Executive Director of the IEA, and featured three of the original authors - Mark Oaten (Former MP & Home Affairs Spokesperson), Baroness Susan Kramer (Former Minister of State for Transport), and Sir Vince Cable (Former Leader of the Liberal Democrats). The panelists discussed the origins and impact of The Orange Book, which aimed to reclaim economic liberalism within the Liberal Democrat party at the time. They reflected on how ideas changed during the Coalition government years, with insights around industrial policy, privatisations, regulation, public service reform and more. Key topics covered included the struggle to enact radical policies, the role of the market vs. government intervention, and the compatibility of economic and social liberalism. Looking ahead, the panel debated what a new "Orange Book" focused on reclaiming liberalism might include today - addressing issues like the fiscal challenges, Brexit, environmentalism, and even artificial intelligence. While differences remained between the economic and social liberal perspectives, there was shared emphasis on the need for a more popular, outward-looking brand of liberalism to tackle nationalism and populism.
Scott Strumello is here to discuss the topic of pharma companies improperly listing patents in the FDA's Orange Book. Free 14 Day Trial of Aura Eversense CGM Learn about the Medtronic Champions This BetterHelp link saves 10% on your first month of therapy Try delicious AG1 - Drink AG1.com/Juicebox I Have Vision Use code JUICEBOX to save 30% at Cozy Earth Get Gvoke HypoPen CONTOUR NextGen smart meter and CONTOUR DIABETES app Learn about the Dexcom G6 and G7 CGM Go tubeless with Omnipod 5 or Omnipod DASH * Get your supplies from US MED or call 888-721-1514 Learn about Touched By Type 1 Take the T1DExchange survey *The Pod has an IP28 rating for up to 25 feet for 60 minutes. The Omnipod 5 Controller is not waterproof. A full list of our sponsors How to listen, disclaimer and more Apple Podcasts> Subscribe to the podcast today! The podcast is available on Spotify, Google Play, iHeartRadio, Radio Public, Amazon Music and all Android devices The Juicebox Podcast is a free show, but if you'd like to support the podcast directly, you can make a gift here or buy me a coffee. Thank you! Disclaimer - Nothing you hear on the Juicebox Podcast or read on Arden's Day is intended as medical advice. You should always consult a physician before making changes to your health plan. If the podcast has helped you to live better with type 1 please tell someone else how to find the show and consider leaving a rating and review on Apple Podcasts. Thank you! The Juicebox Podcast is not a charitable organization.
Generics Bulletin's editorial team discusses the latest strategic developments for major industry players Teva, Sandoz and Sawai, as well as explaining the recent debate over US patent listings in the FDA's Orange Book.
Panelists will discuss hot topics related to Hatch-Waxman and biosimilar litigation, including recent scrutiny from the FTC over what patents may be listed in the Orange Book. Questions? Inquiries about program materials? Contact Trenon Browne at tbrowne@bostonbar.org
Singer and multi-instrumentalist Jontan performs songs from his debut album The Orange Book.
The interplay between patent law and competition law has been a consistent focus for the antitrust agencies over the years, most notably in the pharmaceutical sector between brand and generic drugs. But will the FTC take a new approach to dealing with branded drug company patents listed in the FDA's "Orange Book"? Mika Ikeda, Competition Counsel at Johnson & Johnson joins Jaclyn Phillips and Jeny Maier to discuss the FTC's historical interest in Orange Book listings and what actions the agency may take in the future. Listen to this episode to learn more about FTC policy related to competition in drug markets, and why the "Orange Book" is orange! With special guest: Mika Ikeda, Senior Counsel, Competition Law, Johnson & Johnson Related Links: Federal Trade Commission Statement Concerning Brand Drug Manufacturers' Improper Listing of Patents in the Orange Book (Sept. 14, 2023) Hosted by: Jaclyn Phillips, White & Case LLP and Jeny Maier, Axinn, Veltrop & Harkrider LLP
A recent article published in Health Affairs, delves into the Federal Trade Commission's (FTC) concerns regarding the inclusion of improper patents in the FDA's Orange Book by pharmaceutical manufacturers. The… The post Legislative Proposals to Tackle Improper Pharmaceutical Patents in the Orange Book appeared first on DrugPatentWatch - Make Better Decisions.
A live interview with Ev Kontsevoy about the history of access controls and the future of identity-native infrastructure access.
Evoke Pharma CEO Dave Gonyer joined Steve Darling from Proactive to share news the company has achieved a significant milestone with the listing of its recently issued U.S. patent related to GIMOTI in the U.S. Food and Drug Administration's publication, commonly known as the "Orange Book." This development is of great importance as patents listed in the Orange Book cover drugs that the FDA has approved and deemed safe and effective for public use. The patent, titled "Nasal Formulations of Metoclopramide," pertains to a collection of nasal solutions of metoclopramide and outlines its characteristics when formulated. This newly listed patent in the FDA's Orange Book carries a patent term extending until 2029. Its inclusion adds an additional layer of patent protection for GIMOTI, complementing the three prior patents listed. This achievement underscores Evoke Pharma's commitment to advancing its innovative metoclopramide nasal spray, GIMOTI, which is designed to provide a treatment option for patients suffering from gastroparesis. The FDA's recognition of the patent's significance reaffirms GIMOTI's potential to address the unmet medical needs of patients. Furthermore, Dave Gonyer shared insights into the company's recent financial performance, reporting a remarkable 38% increase compared to Q2 2023 and an impressive 88% increase year-over-year in Q3. These positive financial results set the stage for Evoke Pharma's ambitious growth plans for 2024. As Evoke Pharma continues to make strides in the pharmaceutical industry, its commitment to innovation, patient care, and expanding its patent portfolio positions the company for further success in the years ahead. Investors and stakeholders can look forward to the company's continued growth and contributions to improving patient outcomes. #proactiveinvestors #evokepharmainc #nasdaq #evok #gastrointestinaldiseases #Gimoti #DiabeticGastroparesis #HealthcareInnovation #MedicalBreakthrough #PatientCare #Pharmaceuticals #NasalSprayTreatment #CEOInterview #RealWorldData #MedicalConference #Neuropathy #HealthTech #ChronicIllness #InnovationInMedicine #HealthcareIndustry #MedicalResearch #TreatmentAdvancements #CostSavings #HospitalizationReduction #MedicalNews #HealthTechUpdate #Gastroenterology #DrugDevelopment #Year2023Update #invest #investing #investment #investor #stockmarket #stocks #stock #stockmarketnews
Pink Sheet reporter and editors discuss the FTC's challenges of Orange Book patents (:35), DTC promotion practices as part of acquisition due diligence (12:39), and how Intarcia's advisory committee decision appeal could play out (19:06). More On These Topics From The Pink Sheet In Swift Challenge To Orange Book Patent Listings, Federal Trade Commission Fills FDA Ministerial Gap: https://pink.citeline.com/PS149316/In-Swift-Challenge-To-Orange-Book-Patent-Listings-Federal-Trade-Commission-Fills-FDA-Ministerial-Gap Rx Ad/Promo Practices Should Be Part Of Acquisition Due Diligence, DoJ Official Says: https://pink.citeline.com/PS149309/Rx-AdPromo-Practices-Should-Be-Part-Of-Acquisition-Due-Diligence-DoJ-Official-Says Intarcia Appeals Advisory Committee On Diabetes Drug-Device Combo, Claiming ‘Misrepresentation': https://pink.citeline.com/PS149311/Intarcia-Appeals-Advisory-Committee-On-Diabetes-DrugDevice-Combo-Claiming-Misrepresentation
No episódio de hoje, vamos discutir as perspectivas econômicas para os principais setores da nossa economia com base no relatório Orange Book, que é assinado pela área de Pesquisa Econômica, mas elaborado com base em uma série de relatos sobre o ambiente de negócios que a gente ouviu de contatos com empresas-clientes.Participam: José Rudge, diretor de corporate & investment banking do Itaú BBA e Pedro Renault, economista do Itaú Unibanco.Moderação: Marcelo Serrano, equity research Itaú bba Telegram: https://t.me/itauviewsYoutube: https://www.youtube.com/c/ItaúViews
A recent update from Foley & Lardner attorney Courtenay C. Brinckerhoff discusses trends in Inter Partes Review (IPR) and Post Grant Review (PGR) proceedings involving Orange Book and biologic patents, based… The post Insights into Shifting Dynamics: Orange Book and Biologic PTAB Trends appeared first on DrugPatentWatch - Make Better Decisions.
Ecommerce Empowerment | Selling Online | Growing Your Ecommerce Empire | Selling on Amazon FBA
What are COA, MSDS, FDA Orange Book Documents needed for Amazon Selling, Selling on Amazon, How to Sell on Amazon --- Support this podcast: https://podcasters.spotify.com/pod/show/jessica-hill00/support
Welcome back! Thanks for hanging in! Been a while. How have you been? We've been ok. Hey, why not stick around and listen as we talk about some exciting 9th Level Game stuff with Chris and Bug! Intro Jon's Creative Journey part 1 Designer Dungeon with Chris and Bug - Kobolds Ate My Baby, the Orange Book The Hawkeyes Playoffs: Round One Outtro End Music: Cybertronic Warrior by the Cybertronic Spree Preview of The Throttlebot Throt-cast Links: Kobolds Ate My Baby! the Orange Book on BackerKit
In this episode, host Matthew Schnurr joins Todd Mattina, Chief Economist and co-lead of Mackenzie's Multi-Asset Strategies Team. Together, they take a dive further into Mackenzie's Orange Book, which contains expert insights to help investors stay focused on long-term returns. Learn by Key Topics: (0:54) Bank of Japan, Interest Rates & Debt in Japan (10:10) Outlook on the Yen (13:53) 2023 Outlook on Canadian Bonds, Derivatives & Pension Plans At Mackenzie, we want to create a more invested world, partnering with advisors to help investors become more knowledgeable, more educated, and more invested so they can meet their full potential. Learn more at mackenzieinvestments.com
HelixTalk - Rosalind Franklin University's College of Pharmacy Podcast
In this episode, we “deep dive” into diltiazem, describing its most important drug facts, pharmacology and medicinal chemistry, pharmaceutics, AB compatibility, and important medication safety issues. Key Concepts Diltiazem is a non-dihydropyridine calcium channel blocker (CCB). This type of CCB reduces both heart rate and blood pressure whereas dihydropyridine CCBs only reduce blood pressure. Diltiazem has numerous dosage forms (IV, immediate release tablets, and extended-release products). Extended-release products are always dosed once or twice daily. Historically there were a significant number of extended-release capsules with a variety of brand names and AB-compatibility. Today, only a few branded products still exist in the US market (Cardizem CD, Cartia XT, Cardizem LA, Tiazac, Taztia XT). The FDA Orange Book describes “AB” compatibility, which outlines whether one formulation is therapeutically equivalent to another formulation. Depending on state law, pharmacists can use AB compatibility codes to automatically substitute formulations without notifying the prescriber. The numerous dosage forms of diltiazem is a medication safety issue. Remember that immediate release diltiazem is always dosed TID/QID (3-4 times per day) whereas extended-release formulations are always dosed once daily. A twice-daily extended-release product was previously on the market but has since been discontinued.
Ecommerce Empowerment | Selling Online | Growing Your Ecommerce Empire | Selling on Amazon FBA
When learning to sell on Amazon there may be documents that Amazon requests from you: Certificates of Analysis, FDA Orange Book, cGMP documents etc. These can be requested for dietary supplements, beauty and cosmetic products and food items. Things that go in or on the body. Amazon wants to make sure that the products you are selling on the Amazon platform are legit and follow the rules of the governing body in the country you are selling. Be sure to click through our other podcasts to learn more about: Amazon Selling, Sourcing for Amazon, Retail Arbitrage, Online Arbitrage, Wholesale selling and more! --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/jessica-hill00/support
A selection of the most commonly asked questions about CPVC specification, and how to answer them, with new and improved access to The Orange Book. For more information about any of the topics explored in today's episode, visit blazemaster.com.
Attorney Jonathan Roses is a shareholder in Wolf Greenfield's Pharmaceutical Practice Group. He works with life sciences companies in a variety of areas, including small molecule pharmaceuticals, pharmaceutical formulations, medical devices and surgical methods.In this episode of IP Talk with Wolf Greenfield, Jon provides insights on a variety of topics, including international patent prosecution, Section 101 reforms, Orange Book challenges and “skinny labels." Here are a few of the highlights:00:41 - Jon's love of chemistry 04:16 - Current challenges in patent procurement 06:01 - Strategies for protecting IP and how to minimize risk 07:52 - Key considerations for international patent prosecution 10:48 - Why have there been fewer challenges to Orange Book patents at the USPTO?12:53 - Induced infringement trends - what's happening with “skinny labels,” aka Section 8 carve-outs?16:15 - An update on potential reforms for Section 101, the issue of patent eligible subject matter 19:14 - Will the Supreme Court take any challenges to patent eligible subject matter?20:12 - How the increase in discretionary denials of post-grant proceedings impacts patent holders.23:08 - Some thoughts on the success of Wolf Greenfield's post-grant group
A look back at a year in the fire safety industry, and the first fire sprinkler specification guide of its kind. For more information about any of the topics explored in today's episode, visit blazemaster.com
The mayor of Lismore Shire, Steve Kreig, was interviewed by Patricia Karvelas on RN Breakfast this morning in a discussion about "Northern NSW braces for intensifying flood crisis". The University of New South Wales has a wonderful podcast covering a host of interesting and fascinating ideas, and you can access them here: "UNSW Centre for Ideas Podcast". Other Quick Climate Links for today are: "South-east Queensland weather emergency live updates: Fears for people missing in floodwaters as Brisbane River peaks, record water level reached in Lismore"; "Zali Steggall, MP Climate Leadership Forum"; "Ireland Looks to Pass Media Law Pushing Climate Change Propaganda"; "Economics: How An Intelligent Society Would Deal With Climate Change"; "Breaking up: ice loss is changing one Anishinaabe fisherman's relationship with Lake Superior"; "Evacuation orders amid deadly Qld, NSW floods"; "Life-threatening floods forecast for Queensland as Sydney records wettest summer in 30 years"; "U.S. Oil Industry Uses Ukraine Invasion to Push for More Drilling at Home"; "Humpback whales removed from Australia's threatened species list but feeding grounds still at risk"; "Very hungry bear ‘Hank the Tank' is in fact three bears, DNA shows"; "The Saboteurs" - George Monbiot; "Climate change drives rise in extreme lake water temperatures"; "Vatican launches online platform to help Catholics fight climate change"; "UK Government announces funding to ensure households cut costs while reaching climate targets"; "Climate change is intensifying Earth's water cycle at twice the predicted rate, research shows"; "Pitt re-issues government millions to Beetaloo gas projects after court slap down"; "One way to combat Russia? Move faster on clean energy"; "Access to green energy is shipping's greatest challenge"; "Electricity 4.0 'fastest route to net-zero and carbon free'"; "Eurocell shortlists three countries for European Gigafactory"; "‘A very anxious night': City under siege as south-east flood crisis deepens"; "Poorest areas of England have less than third of garden space enjoyed by richest"; "Orange Book 2022: Policy priorities for the federal government"; "UN report warns climate change could spur 50% more wildfires by 2100"; "Antarctic Sea Ice Hits Lowest Level Since 1970s"; "Republicans Respond to World-Historical Drought by Propping Up Fossil Fuels"; "America's largest inland port is running out of water"; "The Case for Good News in Climate Coverage"; "Panama Enacts a Rights of Nature Law, Guaranteeing the Natural World's ‘Right to Exist, Persist and Regenerate'"; "In this age of climate crisis, humanitarians need to learn to love tech"; "'Unrelenting' Queensland flood emergency claims another life as state braces for more heavy rain"; "Like rivers in the sky: the weather system bringing floods to Queensland will become more likely under climate change"; "1 in 5 fossil fuel projects overshoot their original estimations for emissions. Why are there such significant errors?"; "Will Russia's invasion of Ukraine push Europe towards energy independence and faster decarbonisation?"; "AGL said no to a $5 billion bid, but it isn't over – here's how takeover bids work"; "10 Steps to Personal Resilience & Empowerment in a Chaotic Climate"; "The Canadian Government Is Funding A Researcher Who Spent Years Denying Climate Science"; "‘It's not rocket science': how the world's fastest parrot could be saved"; "Eighth death confirmed in Queensland floods but missing Goodna man found alive"; "Lismore flood emergency sees people stranded on roofs, evacuation warning issued for entire NSW Northern Rivers"; "Lismore flood: hundreds rescued and thousands evacuated as NSW city hit by worst flooding in history"; "Flood trauma resurfaces from 2011 as Lockyer Valley couple escape with their lives – again"; "Thinktank linked to tech giant Canon under pressure to remove ‘dangerous' climate articles"; "Floods in south-east Queensland and northern NSW: what has happened and which areas could be hit next"; "Emergency services struggle as ‘life-threatening' flood crisis worsens"; "AR6 Climate Change 2022: Impacts, Adaptation and Vulnerability". Enjoy "Music for a Warming World". Support the show: https://www.patreon.com/climateconversations
Australia needs bold policy reform to build back better after the COVID recession. Our 2022 Orange Book maps out a policy blueprint to reignite wages growth and boost Australians' living standards. Listen to our CEO and Program Directors discussing their recommendations for the next federal government - whether Coalition or Labor - from the Orange Book 2022.
Nesse episódio falamos sobre o Orange Book, um relatório do time macro que faz um raio-x dos diversos setores da economia. Falamos sobre perspectivas de investimentos, retomada econômica e cenário para mercado de capitais.Participam: José Rudge, Diretor de Corporate & Investment Banking do Itaú BBA, Pedro Renault, economista do Itaú Unibanco.Moderação: Marcelo Serrano, Equity Research Itaú BBATelegram: https://t.me/itauviews
This talk covers the state of the Art and Practice in Cybersecurity Metrics. The history ranges from the 1970s through the present. Topics include, but are not limited to: Control Objectives, the Orange Book, the Common Criteria, Systems Security Engineering Capability Maturity Model, Common Vulnerability Enumeration, National Vulnerability Database, NIST Pubs such as the Performance Measurement Guide for Information Security, Threat Intelligence Protocols, Exemplar studies such as the Verizon Data Breach Incident Report, Industry Best Practice and Regulatory Assessments, Security Incident and Event Management, Security Analytics, Security Scorecards. About the speaker: Jennifer L. Bayuk,Ph.D., is an Independent Cybersecurity Consultant. She also teaches Cybersecurity Risk Management in multiple academic and professional forums and serves as a Private Cybersecurity Investigator and Expert Witness. She has previously been a Wall Street Chief Information Security Officer, a Global Financial Services Cybersecurity Risk Management Officer, a Global Financial Services Technology Risk Management Officer, a Big 4 Information Risk Management Auditor/Consultant,a Manager of Information Technology Internal Audit, a Security Architect, a Bell Labs Security Software Engineer, a Professor of Systems Security Engineering. In all of these positions, governance using security metrics has been a core component of her job function. Her numerous books, articles, and presentations cover a wide variety of topics in Cybersecurity Management and Engineering. She earned a Ph.D. in Systems Engineering with a dissertation on security metrics: Security as a Theoretical Attribute Construct and is frequently a member of the Metricon program committee(securitymetrics.org)
This talk covers the state of the Art and Practice in Cybersecurity Metrics. The history ranges from the 1970s through the present. Topics include, but are not limited to: Control Objectives, the Orange Book, the Common Criteria, Systems Security Engineering Capability Maturity Model, Common Vulnerability Enumeration, National Vulnerability Database, NIST Pubs such as the Performance Measurement Guide for Information Security, Threat Intelligence Protocols, Exemplar studies such as the Verizon Data Breach Incident Report, Industry Best Practice and Regulatory Assessments, Security Incident and Event Management, Security Analytics, Security Scorecards.
Greg and Bill talk some cybersecurity history about the Orange Book, and how fundamentally the approach to what we put security into has changed. Big IT vendors have trouble with security because it isn't their core business.
Open Web Application Security Project (OWASP) - Portland, Oregon Chapter
Our special guest today is Jeff Williams, Co-Founder and CTO of Contrast Security. Jeff was one of the pioneering members who formed the Open Web Application Security Project® (OWASP). Not only did he chair it, he also contributed to many successful open source projects, including WebGoat, the OWASP Application Security Verification Standard (ASVS), the OWASP Top Ten and much more. Without him and others we would not be doing this podcast today. Besides founding Contrast Security in 2014, he started Aspect Security in 2002. Jeff got his law degree at Georgetown University Law Center along with a computer science and psychology degree at the University of Virginia. In the early 1990's, he built high assurance systems for the U.S. Navy and taught the INFOSEC curriculum for the NSA during the good old days of the Orange Book - a trusted computer system evaluation criteria for the U.S. Department of Defense.We want to say thank you to Contrast Security for being one of our sponsors for the inaugural OWASP Pacific Northwest Application Security Conference 2021.Jeff's LinksContrast SecurityLinkedInTwitterSecurity Maganize Article - New NIST Standards on IAST and RASP Deliver State-of-the-Art AppSecWebGoatASVSBlackHat USA - Enterprise Java Rootkits - "Hardly anyone watches the developers"PNWSEChttps://pnwcon.comTwitter: @pnwsecconpnwseccon@gmail.com (contact)Jeff Williams was interviewed by David Quisenberry and John L. Whiteman.Follow us:HomepageTwitterMeetupLinkedInYouTubeSupport the show (https://owasp.org/supporters/)
The wonderful man that is Eddie O'Mahony joins David and Martin in what was a live broadcast to talk about his new book ‘Green White Orange: The history of the Republic of Ireland soccer shirt 1921-2021.
April Abele Isaacson has 25 years of experience as a trial lawyer and a registered United States patent attorney. Before starting her legal career, April earned a MS in Pharmacological and Physiological Sciences and was an HIV/AIDS research scientist at Boston Children's Hospital. This technical background plays a significant role in her success as a patent litigator who focuses her practice on pharmaceutical, biotechnology, and chemical patent litigation, particularly on behalf of drug innovators. Her patent litigation experience includes trying cases in several federal district courts throughout the United States, as well as appeals before the Federal Circuit, representing both plaintiffs and defendants. April also counsels biopharma companies on patent and related regulatory issues, including patent portfolio strategy, litigation preparation and strategy, licensing, patent term extension strategy, and Orange Book patent listing and Use Code strategy. April's experience also includes a 5-year stint as in-house counsel at a public specialty pharmaceutical company, and serving as a U.S. Navy JAG Corps prosecutor where she won several high-profile jury cases and earned multiple achievement medals and letters of commendation for superior service and leadership. April's career is a truly her own creation, and her success is built on grit, tenacity, and love of learning. At every turn, she bet on herself and did the hard work that opened new doors. In this episode, April shares her journey and the forces that shaped her life and her career – from mental illness in her family to a changing political landscape in the country to the crucible of serving in the Navy. She also shares how determination and focusing on being her best self allowed her to build a bespoke career that fits her perfectly and that she loves – a career that didn't come with an instruction manual. Highlights include:Why 1984 was the perfect year to attend a Seven Sisters college (2:00) Embracing culture shock (4:35)Finding your tribe (6:38)Leaving it all on the (track-and-)field (7:42)Spurning an athletic scholarship (10:13)The invaluable support of others when there's no family support to lean on (12:14)How Shirley Chisholm derailed plans for medical school (15:06)Letting go of other people's dreams and expectations and finding your own (20:53)Creating a Master's degree in a school that doesn't award them (24:16)Hello, law school, Hello Nashville (27:42)Growing as a leader and a litigator through the Navy JAG Corp experience (30:43)Cross-country and cross-careers: the move to California and to patent litigation (37:21)The generational shift from women competing against each other to a collaborative, symbiotic approach (42:27) Getting ahead in life does not require a “sharp elbows” mentality (45:45)Thanks for listening to Sidebars! Connect with us: Read our Medicine and Molecules (MEMO) Blog Subscribe to our YouTube Channel Questions or feedback? Reach out at socialmedia@kilpatricktownsend.com Learn more about Kilpatrick Townsend **The opinions expressed are those of the attorneys and do not necessarily reflect the views of the firm or its clients. This podcast is for general information purposes and is not intended to be and should not be taken as legal advice.
Analysing the hazards in a typical CPVC installation environment using solvent cement joining solutions. For assistance in comparing compatibility of BlazeMaster CPVC products, visit the FBC System Compatible Program. For the complete guide to BlazeMaster CPVC fire sprinkler system specification, download The Orange Book. For more information about any of the topics explored in today's episode, visit blazemaster.com
Welcome to the launch of BlazeMaster® Fire Protection Systems' first edition of The Orange Book. This is the podcast introduction to your definitive guide to fire sprinkler system specification, available in print or download at blazemaster.com Find out more here
Previous literature demonstrates increased mortality for Traumatic Brain Injury (TBI) with transfer to a Level II versus Level I trauma center. Our objective is to determine the effect of the most recent American College of Surgeons-Committee on Trauma (ACS-COT) Resources for the Optimal Care of the Injured Patient resources manual (“The Orange Book”) on outcomes after severe TBI afterinterfacility transfer to Level I vs Level II center.
So I really hope you guys like it again as much as I love reading it to you guys please favor podcast that would mean so much to me
This time I'll be reading the next book of The Big Orange book I hope y'all guys like it as much as I love reading it
No episódio de hoje fazemos um raio-x da nossa economia e dos impactos da pandemia em cada um dos setores com base no relatório Orange Book, e também pela ótica da nossa área comercial. Participam José Rudge, Diretor Comercial do Itaú BBA e Pedro Renault, economista do Itaú Unibanco.Moderação: Marcelo Serrano
We face an existential threat of permanent damage to critical physical components in our national infrastructure as a result of their poor resilience against cybersecurity attack. A Programmable Logic Controller (PLC) commonly provides the control system for such components, e.g., bulk power generators. Our proof-of-concept implementation dramatically mitigates threats to such cyber-physical systems (CPS) by specifically leveraging what NIST 800-160 calls "highly assured, kernel-based operating systems in Programmable Logic Controllers".We dramatically reduce the attack surface visible to potential attackers to be ~1% of the total compared to competing approaches. Our demonstration refactors the common CPS architectural approach to data and cooperating processes into hierarchically ordered security domains using the widely available OpenPLC project code base. The GEMSOS security kernel verifiably enforces traditional integrity mandatory access control (MAC) policy on all cross-domain flows. GEMSOS is designed for wide-spread delivery as a Reusable Trusted Device, providing the reference monitor for secure single-board, multi-board, and System-on-a-Chip systems.Only a processing component in the highest integrity domain can directly send/receive control signals, enforcing "safe region" operating constraints to prevent physical damage. This very small attack surface protects the critical physical components, making the overall CPS resilient to skilled adversaries' attacks, even though much larger lower integrity software running in other domains on the same Trusted Device hardware and network infrastructure may be thoroughly compromised. We make available our restructured OpenPLC source to encourage control system manufacturers to deliver verifiable PLC products to, as NIST puts it, "achieve a high degree of system integrity and availability" for control systems. UC Davis is using our demonstration on GEMSOS in their Computer Security Lab, today. About the speaker: Roger R. Schell is internationally recognized for originating several key modern security design and evaluation techniques, and was awarded patents in cryptography, authentication and trusted workstation. His experience includes 20 years in US federal program management (computers), 30 years as a computer industry security product vendor, and 5 years as a graduate cybersecurity engineering faculty member.He is President and a founder of Aesec Corporation, a start-up providing a commercial verifiably secure operating system. Previously Dr. Schell was co-founder and vice president for Gemini Computers, Inc., now an Aesec subsidiary. At Gemini he directed development of their highly secure (what NSA called "Class A1") commercial product, the Gemini Multiprocessing Secure Operating System (GEMSOS). He was also the founding Deputy Director of NSA's National Computer Security Center. He has been referred to as the "father" of the Trusted Computer System Evaluation Criteria (the "Orange Book"). Dr. Schell is a retired USAF Colonel. He received a Ph.D. in Computer Science from the MIT, an M.S.E.E. from Washington State, and a B.S.E.E. from Montana State. The NIST and NSA have recognized Dr. Schell with the National Computer System Security Award. In 2012 he was inducted into the inaugural class of the National Cyber Security Hall of Fame.
The FDA Orange Book, or Approved Drug Products with Therapeutic Equivalence Evaluations, is the definitive source to link drugs with the patents that protect them. Over the years we’ve had… The post Free Orange Book PDF Library from DrugPatentWatch appeared first on DrugPatentWatch - Make Better Decisions.
Subscribe: iTunes | Goggle Play | Stitcher Radio | RSS Description: Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. Shon will provide CISSP training and study around the tools you need to better understand what you need to know to be better prepared for the CISSP Exam Questions. His knowledge will provide the skills needed to pass the CISSP Exam. BTW - Get access to all my Free Content and CISSP Training Courses here at: https://shongerber.com/ Available Courses: CISSP Training Course - https://www.shongerber.com/offers/zYsL6MCB CISO Training Course - https://www.shongerber.com/offers/zd2RbL6o CISSP Exam Questions Question: 165 Steve has found out that the software product that his team submitted for evaluation did not achieve the actual rating they were hoping for. He was confused about this issue since the software passed the necessary certification and accreditation processes before being deployed. Steve was told that the system allows for unauthorized device drivers to be loaded and that there was a key sequence that could be used to bypass the software access control protection mechanisms. Some feedback Steve received from the product testers is that it should implement address space layout randomization and data execution protection. Which of the following best describes an item the software development team needs to address to ensure that drivers cannot be loaded in an unauthorized manner? A. Improved security kernel processes B. Improved security perimeter processes C. Improved application programming interface processes D. Improved garbage collection processes If device drivers can be loaded improperly, then either the access control rules outlined within the reference monitor need to be improved upon or the current rules need to be better enforced through the security kernel processes. Only authorized subjects should be able to install sensitive software components that run within ring 0 of a system. https://www.brainscape.com/subjects/cissp-domains ------------------------------------ Question: 166 Steve has found out that the software product that his team submitted for evaluation did not achieve the actual rating they were hoping for. He was confused about this issue since the software passed the necessary certification and accreditation processes before being deployed. Steve was told that the system allows for unauthorized device drivers to be loaded and that there was a key sequence that could be used to bypass the software access control protection mechanisms. Some feedback Steve received from the product testers is that it should implement address space layout randomization and data execution protection. Which of the following best describes Steve’s confusion? A. Certification must happen first before the evaluation process can begin. B. Accreditation is the acceptance from management, which must take place before the evaluation process. C. Evaluation, certification, and accreditation are carried out by different groups with different purposes. D. Evaluation requirements include certification and accreditation components. Evaluation, certification, and accreditation are carried out by different groups with different purposes. Evaluations are carried out by qualified third parties who use specific evaluation criteria (Orange Book, ITSEC, Common Criteria) to assign an assurance rating to a tested product. A certification process is a technical review commonly carried out internally to an organization, and accreditation is management’s formal acceptance that is carried out after the certification process. A system can be certified internally by a company and not pass an evaluation testing process because they are completely different things. https://www.brainscape.com/subjects/cissp-domains ------------------------------------ Question: 167 Sarah’s team must build a new operating system for her company’s internal functionality requirements. The system must be able to process data at different classifications levels and allow users of different clearances to be able to interact with only the data that maps to their profile. She is told that the system must provide data hiding, and her boss suggests that her team implement a hybrid microkernel design. Sarah knows that the resulting system must be able to achieve a rating of EAL 6 once it goes through the Common Criteria evaluation process. Which of the following best describes one of the system requirements outlined in this scenario and how it should be implemented? A. Data hiding should be implemented through memory deallocation. B. Data hiding should be implemented through properly developed interfaces. C. Data hiding should be implemented through a monolithic architecture. D. Data hiding should be implemented through multiprogramming. Data hiding means that certain functionality and/or data is “hidden,” or not available to specific processes. For processes to be able to interact with other processes and system services, they need to be developed with the necessary interfaces that restrict communication flows between processes. Data hiding is a protection mechanism that segregates trusted and untrusted processes from each other through the use of strict software interface design. https://www.brainscape.com/subjects/cissp-domains Want to find Shon elsewhere on the internet? LinkedIn – www.linkedin.com/in/shongerber Facebook - https://www.facebook.com/CyberRiskReduced/ LINKS: ISC2 Training Study Guide https://www.isc2.org/Training/Self-Study-Resources
Subscribe: iTunes | Goggle Play | Stitcher Radio | RSS Description: Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. Shon will provide CISSP training and study around the tools you need to better understand what you need to know to be better prepared for the CISSP Exam Questions. His knowledge will provide the skills needed to pass the CISSP Exam. BTW - Get access to all my Free Content and CISSP Training Courses here at: https://shongerber.com/ Available Courses: CISSP Training Course - https://www.shongerber.com/offers/zYsL6MCB CISO Training Course - https://www.shongerber.com/offers/zd2RbL6o CISSP Exam Questions Question: 165 Steve has found out that the software product that his team submitted for evaluation did not achieve the actual rating they were hoping for. He was confused about this issue since the software passed the necessary certification and accreditation processes before being deployed. Steve was told that the system allows for unauthorized device drivers to be loaded and that there was a key sequence that could be used to bypass the software access control protection mechanisms. Some feedback Steve received from the product testers is that it should implement address space layout randomization and data execution protection. Which of the following best describes an item the software development team needs to address to ensure that drivers cannot be loaded in an unauthorized manner? A. Improved security kernel processes B. Improved security perimeter processes C. Improved application programming interface processes D. Improved garbage collection processes If device drivers can be loaded improperly, then either the access control rules outlined within the reference monitor need to be improved upon or the current rules need to be better enforced through the security kernel processes. Only authorized subjects should be able to install sensitive software components that run within ring 0 of a system. https://www.brainscape.com/subjects/cissp-domains ------------------------------------ Question: 166 Steve has found out that the software product that his team submitted for evaluation did not achieve the actual rating they were hoping for. He was confused about this issue since the software passed the necessary certification and accreditation processes before being deployed. Steve was told that the system allows for unauthorized device drivers to be loaded and that there was a key sequence that could be used to bypass the software access control protection mechanisms. Some feedback Steve received from the product testers is that it should implement address space layout randomization and data execution protection. Which of the following best describes Steve’s confusion? A. Certification must happen first before the evaluation process can begin. B. Accreditation is the acceptance from management, which must take place before the evaluation process. C. Evaluation, certification, and accreditation are carried out by different groups with different purposes. D. Evaluation requirements include certification and accreditation components. Evaluation, certification, and accreditation are carried out by different groups with different purposes. Evaluations are carried out by qualified third parties who use specific evaluation criteria (Orange Book, ITSEC, Common Criteria) to assign an assurance rating to a tested product. A certification process is a technical review commonly carried out internally to an organization, and accreditation is management’s formal acceptance that is carried out after the certification process. A system can be certified internally by a company and not pass an evaluation testing process because they are completely different things. https://www.brainscape.com/subjects/cissp-domains ------------------------------------ Question: 167 Sarah’s team must build a new operating system for her company’s internal functionality requirements. The system must be able to process data at different classifications levels and allow users of different clearances to be able to interact with only the data that maps to their profile. She is told that the system must provide data hiding, and her boss suggests that her team implement a hybrid microkernel design. Sarah knows that the resulting system must be able to achieve a rating of EAL 6 once it goes through the Common Criteria evaluation process. Which of the following best describes one of the system requirements outlined in this scenario and how it should be implemented? A. Data hiding should be implemented through memory deallocation. B. Data hiding should be implemented through properly developed interfaces. C. Data hiding should be implemented through a monolithic architecture. D. Data hiding should be implemented through multiprogramming. Data hiding means that certain functionality and/or data is “hidden,” or not available to specific processes. For processes to be able to interact with other processes and system services, they need to be developed with the necessary interfaces that restrict communication flows between processes. Data hiding is a protection mechanism that segregates trusted and untrusted processes from each other through the use of strict software interface design. https://www.brainscape.com/subjects/cissp-domains Want to find Shon elsewhere on the internet? LinkedIn – www.linkedin.com/in/shongerber Facebook - https://www.facebook.com/CyberRiskReduced/ LINKS: ISC2 Training Study Guide https://www.isc2.org/Training/Self-Study-Resources
Diana Pojar Staff Data Engineer at Slack April, 2020 blog, twitter, linkedin Tell us a little about your current role: your title, the company you wor... https://staffeng.com/stories/diana-pojar blogtwitterlinkedintechnical leadershipJosh WillsStan BabourineBogdan GazaTravis CrawfordCamille Fournier Lara HoganJosh WillsVicki BoykisDavid GascaJulia GraceHolden KarauJohn AllspawCharity MajorsTheo SchlossnagleJessica Joy KerrSarah CatanzaroOrange Bookmy Goodreads accountReady to read another story?
Ecommerce Empowerment | Selling Online | Growing Your Ecommerce Empire | Selling on Amazon FBA
Amazon may ask for certain documents when listing a new item or getting approved for an ASIN, Brand or category. Let's discuss what these documents are and why we need them. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/jessica-hill00/support
Atomic Data Orange Book www.atomicdata.com The post Atomic Data Orange Book appeared first on Today's Business Radio.
Improve Eyesight In January of 2018 I released a video on How to Improve Your Eyesight with Yoga that has recently become incredibly popular on this channel. In this video I am going to answer your most FAQs from the comments in that video. The eye yoga video had 6 yoga eye exercises to improve your eyesight. Because we spend so much time looking at computer screens we need yoga for healthy eyes now more than ever. The 6 eye exercises were designed to help improve your vision naturally and help so that you could have healthy eyes and you guys loved that video so much. There were so many questions in the comments! #1 Should I wear glasses when I practice eye yoga? If you wear glasses or contact lenses, you should take them off when you practice eye yoga. #2 Should I wear glasses after eye yoga? You can put your eyeglasses or contact lenses back on after you practice eye yoga. However, on the topic of eyeglasses, my resource, which I will share next, suggests leaving your glasses off during leisure time. #3 What is the source of these exercises? These exercises come from a book by Swami Satyananda Saraswati called Asana, Pranayama, Mudra, Bandha. It is an Orange Book. I used to own a physical copy, but my copy got lost in a move about 5 years ago. I cannot tell you how many times I reach for this book! #4 How often should I practice eye yoga? Once a day #5 When Should I practice eye yoga? Early in the morning or in the evening #6 How many times should you do these exercises? In other words: what is the frequency and duration of the exercises? The answer is, it depends on the exercise. Prior to doing the eye yoga it is recommended that you splash cold water on your eyes 10xs. This will help stimulate blood flow to the eyes and tone up your eyes. Remember to stay relaxed during the eye yoga exercises. Do not strain because this leads to tiredness and fatigue of your eyes. Keep your facial muscles, eyebrows and eyelids completely relaxed. Between each eye yoga exercise, close your eyes and rest for one minute. For Palming - you want to do this as long as you feel the heat and energy of your hands going into your eyes. You want to repeat the palming exercise three times. For Sideways Viewing - you want to repeat this exercise 10xs each way. Afterwards close your eyes and rest. You may also do some palming between the exercises. This brings us to another question: #7 Can you demonstrate the second exercise? Sure: This is called front and sideways viewing. For this exercise you have one thumb to the left side and one thumb down in front. Inhale look to the left, exhale look down. Repeat ten times and then repeat the entire exercise to the right. In between close and rest your eyes or do some palming. For the up and down viewing, rotational viewing and the nose tip gazing - each exercise should be repeated 10xs with your eyes closed to rest in between. #8 How can you remove black circles under your eyes? One of the ways to reduce black circles under your eyes is with soothing eye treatments. The palming exercise that we did is a good one to try. The palming exercise releases tension in the eyes and revitalizes the eyes. The palming exercise is incredibly relaxing. #9 Is pain in your eyes normal during eye yoga? Well, it is normal if you are pushing too hard and trying too hard. Remember to stay totally relaxed when doing eye yoga. Keep your eyebrows, eyelids, forehead and facial muscles relaxed. Remember to take time between each exercise to close your eyes and allow them to rest. Kind of like a mini savasana for your eyes, to allow them to be bathed in darkness before you do the next eye exercise. The palming exercise between each eye yoga exercise is also incredibly useful to help your eyes stay relaxed and free of tension. #10 What are the best foods for eyesight? Kale and Spinach are good for your eyesight because they are high in lutein.
Improve Eyesight In January of 2018 I released a video on How to Improve Your Eyesight with Yoga that has recently become incredibly popular on this channel. In this video I am going to answer your most FAQs from the comments in that video. The eye yoga video had 6 yoga eye exercises to improve your eyesight. Because we spend so much time looking at computer screens we need yoga for healthy eyes now more than ever. The 6 eye exercises were designed to help improve your vision naturally and help so that you could have healthy eyes and you guys loved that video so much. There were so many questions in the comments! #1 Should I wear glasses when I practice eye yoga? If you wear glasses or contact lenses, you should take them off when you practice eye yoga. #2 Should I wear glasses after eye yoga? You can put your eyeglasses or contact lenses back on after you practice eye yoga. However, on the topic of eyeglasses, my resource, which I will share next, suggests leaving your glasses off during leisure time. #3 What is the source of these exercises? These exercises come from a book by Swami Satyananda Saraswati called Asana, Pranayama, Mudra, Bandha. It is an Orange Book. I used to own a physical copy, but my copy got lost in a move about 5 years ago. I cannot tell you how many times I reach for this book! #4 How often should I practice eye yoga? Once a day #5 When Should I practice eye yoga? Early in the morning or in the evening #6 How many times should you do these exercises? In other words: what is the frequency and duration of the exercises? The answer is, it depends on the exercise. Prior to doing the eye yoga it is recommended that you splash cold water on your eyes 10xs. This will help stimulate blood flow to the eyes and tone up your eyes. Remember to stay relaxed during the eye yoga exercises. Do not strain because this leads to tiredness and fatigue of your eyes. Keep your facial muscles, eyebrows and eyelids completely relaxed. Between each eye yoga exercise, close your eyes and rest for one minute. For Palming - you want to do this as long as you feel the heat and energy of your hands going into your eyes. You want to repeat the palming exercise three times. For Sideways Viewing - you want to repeat this exercise 10xs each way. Afterwards close your eyes and rest. You may also do some palming between the exercises. This brings us to another question: #7 Can you demonstrate the second exercise? Sure: This is called front and sideways viewing. For this exercise you have one thumb to the left side and one thumb down in front. Inhale look to the left, exhale look down. Repeat ten times and then repeat the entire exercise to the right. In between close and rest your eyes or do some palming. For the up and down viewing, rotational viewing and the nose tip gazing - each exercise should be repeated 10xs with your eyes closed to rest in between. #8 How can you remove black circles under your eyes? One of the ways to reduce black circles under your eyes is with soothing eye treatments. The palming exercise that we did is a good one to try. The palming exercise releases tension in the eyes and revitalizes the eyes. The palming exercise is incredibly relaxing. #9 Is pain in your eyes normal during eye yoga? Well, it is normal if you are pushing too hard and trying too hard. Remember to stay totally relaxed when doing eye yoga. Keep your eyebrows, eyelids, forehead and facial muscles relaxed. Remember to take time between each exercise to close your eyes and allow them to rest. Kind of like a mini savasana for your eyes, to allow them to be bathed in darkness before you do the next eye exercise. The palming exercise between each eye yoga exercise is also incredibly useful to help your eyes stay relaxed and free of tension. #10 What are the best foods for eyesight? Kale and Spinach are good for your eyesight because they are high in lutein.
A comprehensive conversation with the contributors to the Grattan Commonwealth Orange Book 2019 breaking down the key policy priorities for the next federal government. Drawing on 10 years of Grattan research and reports, the Orange Book recommends that Australia's next federal government should defy the national mood of reform fatigue and stare down vested interests to pursue a targeted agenda to improve the lives of Australians. Read the report - https://grattan.edu.au/report/commonwealth-orange-book-2019/ A time guide to this podcast: – 1:30 John Daley and Brendan Coates – The Orange Book policy priorities – 16:50 John Daley – Economic Development – 25:40 Brendan Coates – Housing – 32:40 Marion Terrill – Cities and transport – 41:30 Tony Wood – Energy – 55:10 Stephen Duckett – Health – 1:05:30 Peter Goss – School education – 1:16:20 Andrew Norton – Higher Education – 1:21:00 Danielle Wood – Budget policy – 1:26:50 Danielle Wood – Institutional reform – 1:32:50 John Daley and Brendan Coates – Final thoughts
After 32 years of the 8-4-4 curriculum, the new 2-6-3-3-3 curriculum rolled out early in January 2019. Its goal is to provide quality education and training policies for all. It aims to improve access, quality, relevance and equity in line with international, regional and national policies, as well as legal commitments, and move us closer towards our education for all goals. It also aims to ensure that all learners acquire competencies and qualifications capable of promoting national values, inspiring individual innovation and life-long learning; and that learners are not unnecessarily delayed at any level of education. The curriculum hopes to fix the gaps left by 8-4-4 according to the team, and put more emphasis on practical and vocational education, nurturing of talents, inclusion of critical life skills and de-emphasize the focus on the cognitive domain. We're joined by Angela Kabari, co-founder of the life skills program School Series, to discuss the curriculum and its implementation. Press play! Resources Curriculum Reform Policy Basic Education Curriculum Framework Curriculum Designs SNE Competency Based Curriculum Support Materials Basic Education Statistical Booklet Curriculum Development Cycle Addendum to the Orange Book on Competency Based Curriculum Episode 45: Reforming Kenya's Education System Episode 74: Exam Cheating Image Credit: Aga Khan Development Network
Event podcast: Following the release of our State Orange Book 2018, this Policy Pitch event, featuring a number of Grattan Institute Fellows and Program Directors, examined some of the policy recommendations from ten years of Grattan Institute reports and outline what state and territory governments should do to improve Australia
This week I go into all the planning I did before for going on a trip to Alabama to buy my newest additions. I show my "Orange Book" with all my prep materials, property notes, and details. I explain where to get the number to fill in on your property analysis as well. Glen Sutherland A Canadian Investing in the US Glen@glensutherland.com
A conversation with the contributors to the Grattan State Orange Book 2018. State and territory governments can do more to improve the lives of Australians. In many cases, states are different because their governments adopted better policies. Every state should learn from the others and do better.
Writer and @Suite_212 presenter Juliet Jacques sits down to interview Tom and Jack about the making of a masterpiece (the Reel Politik Original Radio Play, Tim Peaks: Farron Walk With Me), and about the life and career of Tim Farron, Beveridge vs. Orange Book liberalism, gay frogs, milk, Madchester (plus Oasis), liberal Russia paranoia and much, much more. Functioning as an EPK (electronic press kit) for Reel Politik's acclaimed play, this episode constitutes an instructive guide to the making of true outsider art, and a deep, milky dive into the ins and outs of Farronian liberalism. Listen to the radio play, Tim Peaks: Farron Walk with Me - https://soundcloud.com/reelpolitikpodcast/tim-peaks-farron-walk-with-me-a-reel-politik-original-radio-play
Do you use or collect Bitcoin? Today we discuss some of the many problems that go along with all these Cryptocurrencies and Blockchain technology, and why it is a good idea to steer clear of them. Facebook is sharing your data and your friend's data. What Apple is doing to prevent this. Are you still using XP? There are companies who are. They have embeded systems that run XP. So what can they do. Craig tells you how he handles it for his clients. Craig is putting up a new membership site (Yes, it is free, but you have to sign up) On it will have all his special reports that he puts out and you will be the first to get them. These and more tech tips, news, and updates visit - CraigPeterson.com --- Transcript: Below is a rush transcript of this segment, it might contain errors. Airing date: 06/23/2018 Cryptocurrency Downfall, Apple Closing a Loophole, Windows XP -What to do if you still need it Craig Peterson:[00:00:00] Hello Everybody, Good Morning, Craig Peterson here. Today we've got two major topics, I'm sure are going to interest you. If you or anyone you know has been buying and are using things like bitcoin, we’ve got a lot of news that we'll be talking about today. Also, we are going to be talking about a couple of major security issues here. Why the military can't quit, Windows XP and should you. If the military's not doing it, well they have a plan. We'll talk about that and what Apple is doing to help make sure that the problem that just happened with Facebook and their developers doesn't happen on the Apple platform. I think they're going to do a very good job of that. So welcome, and here we go. [00:00:50] So, we're going to start by talking about blockchain technologies. Now, these are the technologies that are used to make things, like bitcoin, work. The whole idea behind block change technologies is that you have well, to kind of think of it like, a regular ledger that you might have an accounting. You've probably heard of double entry accounting, where things are balanced, right, they're balanced back and forth between, you know, the receivables and payables. But even more, it gets right down into; this money showed up in the bank account, that completely negates this invoice. Therefore, we know everything's balance right, and you know if you want to know more code talk to an accountant right. Well, those types of ledgers can be copied. They can be shared. We've seen them in movies before, where they're used by bad guys to try and cheat people out of money. Let's, put it that way. [00:01:45] And that's a problem. But, when we're talking about bitcoin and blockchain here's how it works. How do you know a transaction is valid? How do you know someone has some of this money that's out there? Well, they do it through a system of ledgers, and there are a lot of ledgers. In fact, when it comes to blockchain technology, the idea is that every one that uses a blockchain technology at all, anybody has a copy of all the ledgers. Now you don't know who the people are, necessarily, all you have is a wallet number. So, you know I'm sending money from here to there, and then all of that information is then distributed and shared with everybody else on the blockchain. So, it's cool technology; banks are starting to use it now, where they are doing with the overnight lending they're sending money back and forth. And they need a way to verify that transactions occurred and who got the money and the overnight rate was it at etc. So, that later on, they can go back and get down to it and figure out all of the details. Well, when you're talking about a ledger like this, where everybody's copy of the ledger needs to agree. That's impossible. Some people are going to have a machine that's offline, some people's hard disks are going to crash, and they are going to lose their ledger. So, you can never have 100 percent of these ledgers agree with each other. So, how does it work. [00:03:26] Well, the idea here is that 50 percent plus one of the ledgers have to agree. And, that's pretty good when you think about a bitcoin, for instance, you're talking about having thousands. Ten of hundreds, of thousands, of ledgers that are out there and they all have to agree. Now, there is a problem with this, in a few different ways. One is the amount of time it takes, but we're not going to get into that, for the ledgers to become insane. And, even to distribute the data, well, that 50-plus-one-person percent is a problem because theoretically, you could have an attack where someone can somehow modify half of the ledgers that are out there. Well, guess what, here it turns out that this very well-known attack vector has been used. Look at the mono coin, Bitcoin Gold, and Cass Virge, and light coin cash. All of those have had, what's kind of the crypto equivalent of, a bank heist. It's interesting because there's another article that I have in front of me and we put up on the website, that looks at this and see, that in the last six months, there has been one-point-one-billion dollars worth of cryptocurrency stolen, oh think, about that for a minute. What was thought to be the strength or one of the major strengths to these cryptocurrencies, which is that you have to have all these ledgers, and the ledgers have to be pretty much in agreement? And all of that information can be hacked. Now, how is it getting hacked? You know are we talking about people breaking into hundred-thousand-million-plus machines, to manipulate those ledgers, and move that currency, that cryptocurrency, into the black hats bank account. [00:05:32] No, actually we're not, and it's kind of smart the way these guys are doing it, here. There's an article I put out from NYU computer science researcher, Joseph Bonneau, and he released research last year where he went through and came up with estimates of how much money it would cost to execute these type of attacks on the top. Blockchain that is out there right now by simply renting power, rather than buying all the equipment and he concluded that these types of attacks were likely to increase. Of course, as we're talking about right now, it turns out he was right. Here is a quote directly from him when he was talking to Koine desk, he said “generally the community thought this was a distant threat. I thought it was much less distant and I've been trying to warn of the risk even. I didn't think it would start happening this soon.” So, there is there is a huge problem. You know, I have never been a proponent of these cryptocurrencies, for a lot of reasons, or one of them is the fact that they're not secure enough, and this has now been proven many times this year with at least a half a dozen different cryptocurrencies, OK. So, it's pretty bad. There's also another problem. [00:06:56] You can't prevent someone from spending the same piece of data five or even a thousand times, at once, without trusting the third party to do all the dirty work. So, you've got miners who are the people who are using the machines that are running the blockchain software looking for these highly complex mathematical numbers. So, they are consuming electricity, making sure no one's getting money's stolen, and this article is interesting if you are or have been thinking about getting into it at all, have a look. Have a look at the report that came out in this case. These guys in this one case, they were able to amass more than half of the network's power. We're talking about computing power here. The Bitcoin Gold attacker was able to double spend to very expensive transactions, sent to an exchange. So, it goes on, and Cass explains Amol, how even small coins are at risk. This is huge, it's really, really, huge and it's called a 51 percent attack, although it's 50 percent plus one, and we've got to be careful of it. I have another one that's up there, right now, on my website called Healthcare Info security. It is the place that I grabbed this from, and it's showing again, evidence is continuing to mount, the cryptocurrencies seeking criminals are no longer bent, solely on boosting bitcoin or demanding rent, demanding ransomware, but in actually stealing it, directly by being able to get in showing in here from carbon black. The top 10 currencies that are out there right now, of course, this is not surprising to anyone, but bitcoins number one, the 3M RIPL bitcoin cash-like coin, etc. goes on and on. Now Carbon Black says it's found at least one-point-one-billion in cryptocurrency related thefts since December 2017, and right now when we're talking here, June 2018. So, the crypto thieves are black hats are leveraging malware phishing attacks, fake advertising campaigns, and they're just repurposing old tricks. People are falling for all kinds of cheap attack tools, you can get them from anywhere, from a buck to a thousand dollars. It goes on, Krypto Jack and attacks are continuing. [00:09:29] So, we've got a couple more here on the bitcoin stuff before we get into what Apple's doing to try and stop developers from sharing their data and also about Windows XP. Believe it or not, it is still in use today, and XP came out a very long time ago now. Bitcoins, price now, I mentioned this on the show about a year ago. I think we were talking about bitcoin and how there was a lot of fishy stuff going on when it was launched, and it looks like a couple of guys were involved, and they were able to get bitcoin up to 1000 dollars per coin very quickly, and it appears insider trading may have been happening. We talked about some of the rumors that were out there, and now we have a little bit more of a solid piece here. This is from the New York Times dated March 30. [00:10:27] And of course putting this all together today, because we are in a mode of talking about bitcoin, today we're going to kind of cover that thoroughly. So, this article was saying that a concentrated campaign of price manipulation may have accounted for at least half of the increase in the price of bitcoin, and other cryptocurrencies last year. Now, this is according to a paper released at the end of March. It's an academic; he has a history of spotting fraud in the financial markets his name is John Gryffen, finance professor over at the University of Texas. Isn't that interesting, here. So, the price the value was driven up artificially and remained artificial because once you get started, that way it just keeps going. Now, it was being manipulated, it looks like, by at least partially backed Livity at Phoenix, it's largest and one of the least regulated exchanges, in the industry register, in the Caribbean offices, in Asia, and it was subpoenaed by American regulators shortly after article started to appear. Talking about, but halted the digital flow of tokens, in and out of the exchange what was going on. Why were these tremendous price increases happening, last year, and, this paper indicates that manipulation played a large part, in those price increases? So, it's a very, very, big deal. [00:11:59] Yet, another reason to stay out of this, if you need another reason. [00:12:06] To tell your friends, your family, or yourself not to get involved with this. Bitcoin is selling off this year, and they're concerned that this decline. Could cause a lot of damage in the financial markets. So, Bitcoin is now, nearly a third, of its record high that was reached just six months ago. It's dropped by almost two thirds. Isn't that just crazy? So, they're worried that bitcoins, the bursting bubble could spill over into the equity market. Here's a quote from Matt Maylee. He's a strategist over at Miller Tabak, yeah. Miller Tabak, there are things to be concerned about regarding the stock market here with emerging markets and other issues, but I don't think bitcoin is going to be one of them. And he understands the fear or the steep rise and fall in bitcoin prices; it's very reminiscent of the 1990s dot-com bust, he said. But the difference now is everybody's investment wealth. It's a very, big deal. Everybody is talking about both of those things when they're in the bubbles. So, it's looking here, if you look at that article again, we have all of these up on the website, and this particular graph is from CNBC, but it's showing the correlation, between what happened with our tech bubble and what's happening with bitcoin. So, keep an eye out for that. This could be a very, very, bad thing. [00:13:43] Now, we all have heard about Cambridge Analytica and what they did with the Facebook data. They were getting information about friends of friends they were using it, they were manipulating it and, of course, before that eight years, well ten years ago now, the Obama campaign got the information on every Facebook user, worldwide, and of course, there are particularly interested in the United States. [00:14:08] So, we have a history now of abuse of your Facebook data, here, that stored in social media. So, Apple's been concerned. You know, they are probably one of the number one companies, out there, when it comes to trying to make sure you retain your privacy, right. So, Apple came out with new rules just last week for the developers. The idea is, to limit how developers use information about the iPhone owners friends and other contacts. So, there was a bit of a loophole, the lead app makers store shared data, without people's consent. That loophole is being closed. Now some of the apps that you might use, I use like a contact duplicate merger and things those should still work, but they have to keep the data on your iPhone. This whole practice of trying to get information about your contacts has been used for years. When you sign up for Facebook what does it ask for? Hey, is it OK if I help you find your friends on Facebook LinkedIn did the same thing, and now that Microsoft is running it, it is done even more. [00:15:18] Right. Double time here. So, this isn't new, but Apple's new strategy is new. Apple has, of course, the world's, well one of them right, the world's most popular smartphone operating system, Android is more popular. But sharing data, as in a friend's data, without consent is what got Facebook into trouble. They announced all of this at their developer's conference, a little bit earlier this year. Contact List abuse is what it's been called, and it's a huge ecosystem and this will make a very, very, big deal. Interesting article. Want to get into more detail, if you are a developer if you have an Apple iOS app, and a lot of businesses do, make sure you double track this. As far as businesses going with developing their apps, I have got to mention something here, and this is a little self-serving. OK, I'll say that up front. But we are, my company is the only one that can sell this particular software, and right now, anyways, and that's why it's self-serving. Apple and Cisco got together to try and solve a major, major, problem. [00:16:35] The problem is if you’re a business, how do you keep your data safe when it leaves the office? [00:16:45] So, if you have sales people they need access to your data. Don't you think if you have somebody, who has some financial information, they need access to your data? Not all of them, but some of them do. So, how do you control that? Well the way most companies have dealt with it is, they buy some software, and that software runs on that iOS device or that Android device and all of the company data stays within that one. App. One app. So, if you want to use company email, you are using that app to send and receive email. You cannot use any other app; if you want to get into your customer management system, you have to use that app. If you want to get financial data, you have to use that app. If you want to get at your files, you have to use that app, right. So, you're stuck in this one app, and people have hated that for a very, very, long time for good reason. However, the main reason they had to do that was there was no way to have a check and balance on the apps and what they were doing on the phone. [00:17:56] Now, with iOS, you can remotely manage, and we do remotely manage iOS devices for businesses. You can, too. There's even free mobile device management MTM. There's free mobile device management software out there that you can use, depending on who you are and what hardware you have and what vendor relationships you have. So, look into that. But, all that lets you do is control what apps can be installed. It doesn't control the flow of data, between the apps, including the flow of data between your apps and what's happening with your business data. All right, So, I said this was self-serving because we've got a got a solution with Cisco and Apple that's been developed and works great that allows us to control all of the flow of data. Think about the military type system. Think about the Orange Book in the old days, right. How have you compartmentalized the data? And how you don't have your private home server for Clinton e-mail dot com, right on. Now, we found out Comey did it too when he was investigating the Clinton e-mail scandal, where he was using Google Mail. It doesn't and does it. [00:19:10] It's nutty. So, that became a problem and more of a problem. It just goes on and on. So, with this, you can control everything. And, I think you have to I think we've got to start controlling the apps which don't know what the developers are doing. But you might have a look for this out there. It is available for iOS. It is not generally available right now. We're the only ones in the world that can sell it. I guess that means, we're just kind of cool. But, I guess the other side of that is, isn't it kind of cool that you have a guy, here, that is tied in that tightly, with the security market. [00:19:50] In fact, I've got to go as soon I get off the air, here because I'm doing an interview, that we're going to be airing, because I'm running webinars for the FBI. Infragard program, which is the infrastructure guard, if you will, for the businesses that have a critical infrastructure. So, I'm doing that right after this. We're talking about the dark web. In fact, that's who it will be. I'll be doing that interview here shortly. You can join InfraGard if you are involved in critical infrastructure. You can find them online InfraGard dot Org. There are chapters in, I think, every state. [00:20:32] Well, you know Windows XP should not be used, right, don't even have to repeat that. But the military still is using it. It's using it in our ships even though the British navy just launched a nuclear submarine a brand-new build from scratch running Windows XP. Now, why do they do that? Well, the bottom line is Windows XP is a known, well-known commodity, very well, known. So, they know where the bugs are for the most part. Microsoft is still supporting it for them at an incredibly high cost, here. But what that means is that the military computers running XP are stuck with legacy hardware. They're stuck with legacy software that runs on it. So, we've got to be careful about this. The rest of the government operations are moving to Windows 10. I think we've got all of our clients on to Windows 10 now that are using Windows, and we're keeping them up to date, obviously, with the patches and we do that all automatically. And we have people that hop on when there are problems, which there are, this week. I'm not getting to it on the radio, but check out my Web site Craig Peterson dot com because there are a bunch of Windows 10 updates and they are not all working. So, I've gotten instructions on how to install them which machines are having problems. [00:21:59] What that means for you and what you should do. So, check that out on my Web site, again, Windows 10 update problems this week. So, they are working on trying to get rid of it; they've got Windows XP 2003 other legacy Microsoft products that are out there and the problems just continue to pile up. Now one of the things we have done for companies that are running XP, and you might look at this as well, is we take that Windows XP machine we put it into a virtualized environment, and then we put special firewalls around it with full intrusion detection and prevention. So, you can do that as well, if you're a business and you're stuck with Windows XP. We're doing that for manufacturers, as well, where their hardware, their manufacturing hardware, is running Windows XP. So, we put it in a box, if you will, with all kinds of protection around that. So, keep an eye out, and that's what's happening. Make sure you join my mailing list, so you get my weekly e-mails. They come out on Saturday morning, and we have some special reports. Those people who signed up for my insider club here, there is a membership site. [00:23:13] It is closed but we've got some more special reports, we'll be sending them to you along with information on retrieving them. And that's something that we've offered for free. We shut down that Facebook group by the way because we just won't get in the activity. I think people are just used to me telling me what's going on and what should happen right as opposed to the interactive back and forth. [00:23:36] Although we had some interactivity, and we still have it, multiple times a week, usually it's via text. If you want to text me, if you want to sign up, if you have any questions, just text me directly 8 5 5 3 8 5 55 53, 8 5 5 3 8 5 55 53 and I'll let you about any major alerts or other problems that come up, until then, have a great week and we'll see you online. You've been listening to Craig Peterson. --- Related articles: Critical Patches Issued for Microsoft Products – HIGH THREAT Microsoft Confirms New Windows 10 Cumulative Update KB4284835 Issue More Reports of Windows 10 Cumulative Update KB4284835 Failing to Install Unbreakable smart lock devastated to discover screwdrivers exist Cryptocurrency Theft: $1.1 Billion Stolen in Last 6 Months Blockchain’s Once-Feared 51% Attack Is Now Becoming Regular Bitcoin’s Price Was Artificially Inflated, Fueling Skyrocketing Value, Researchers Say Apple Tries to Stop Developers From Sharing Data on Users’ Friends Multiple Vulnerabilities in Microsoft Exchange Server Could Allow for Information Disclosure The big picture: We’re getting closer to AI doctors --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Message Input: Message #techtalk Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553
Officially known as Approved Drug Products With Therapeutic Equivalence Evaluations, the FDA Orange Book contains a list of drugs considered by the FDA as both effective and safe. It does… The post 3 Uses for Historical Versions of the FDA Orange Book appeared first on DrugPatentWatch - Make Better Decisions.
While the Patent Trial and Appeal Board invalidates Orange Book-listed patents less than 20 percent of the time, it accepts 66 percent of petitions from generic drugmakers and takes no… The post What We Know From 4-Plus Years of Drug Patent Challenges Heard by the PTAB appeared first on DrugPatentWatch - Make Better Decisions.
How to Order the FDA Orange Book Historical copies of the FDA Orange Book archives are very potent tools for scholarly research and for litigation support, but until now there… The post Download FDA Orange Book Archives appeared first on DrugPatentWatch - Make Better Decisions.
In part 2 of this two-episode podcast, with the help of Australian Perspectives Fellow Brendan Coates and Productivity Growth Director Jim Minifie we follow up on our discussion into the evidence that economic growth may be slower in the future and what might explain it with an in-depth chat about what policymakers could do in response. One of the big policy debates in Australia and around the world right now is whether economic growth will be slower in the future than in the past. Nearly a decade after the Global Financial Crisis and economic growth remains weak in many rich nations. Australia has been an exception to the malaise, but growth has slowed as the mining boom winds down. A growing number of voices are wondering whether we’ve entered a “new normal” of slower economic growth, which would have big implications for Australians’ future living standards, our public policy choices and the state of our politics. Further readings To help listeners navigate the debate, below are a few references cited in the podcast discussion. John Daley et al, Gamechangers: economic reform priorities for Australia, 2012. If Australian governments want to increase rates of economic growth they must reform the tax mix, and increase the workforce participation rates of women and older people. Together these game-changing reforms could contribute more than $70 billion to the Australian economy. Governments should concentrate their limited resources for economic reform where they can have the greatest impact on Australian prosperity https://grattan.edu.au/report/game-changers-economic-reform-priorities-for-australia/ John Daley et al, Balancing Budgets: tough choices we need, 2013. This report examines all realistic reforms that would contribute $2 billion a year or more to government budgets. It favours reforms that are big enough to make a difference, do not produce unacceptable economic and social effects, and spread the burden of reform across the community. Sharing the pain is not only fair, it makes change easier to sell to the public. https://grattan.edu.au/report/balancing-budgets-tough-choices-we-need/ John Daley et al, Orange Book 2016: Priorities for the next Commonwealth Government, 2016. This report surveys policy recommendations from seven years of Grattan Institute reports and outlines what the incoming Commonwealth Government should do to improve Australia. https://grattan.edu.au/report/orange-book-2016-priorities-for-the-next-commonwealth-government/ Jim Minifie et al, Stagnation nation, Grattan Institute, 2017. Is Australia at risk of economic stagnation as the mining investment boom fades? While the decline in business investment is no cause for panic, policymakers must do more to ensure we remain a dynamic, growing economy. https://grattan.edu.au/report/stagnation-nation/
Plenty of people love their jobs. But even on a job you love, you still have obstacles in that job.You need to acquire skills in this business in order to earn the amount of money you need to meet your goals.You have obstacles when you have a job. You also have obstacles when you have your own business.The reason so many people quit when they run into obstacles is that they didn't expect to have the obstacles in the first place.No one prepared them to handle the obstacles, in fact no one even mentioned that there were obstacles.Marketing requires skills. Skill acquisition is a major obstacle.What investment are you willing to make to acquire the skills you need to earn what want each month?Obstacles:Fear of rejectionCalling people I have not talked to in several years. Trouble getting people to commit to coming to an event, or meeting, or get on a call. Classes that can help you with this online marketing.Kim's Blog and opt into the “Orange Book”100 Customers in 100 Days - generating demand for you and what you have“How to sell on Facebook without selling on Facebook”The Authority Marketer See acast.com/privacy for privacy and opt-out information.
Exams are over, time to celebrate! This week, we talk antibiotics. Probably the most important thing know about antibiotics is having a first-line and second-line antibiotic (and dosing) in mind for common infections. Two great resources for this: RXFiles (the "Common Infections" page) MUMS Health’s "Anti-infective Guidelines for Community Acquired Infections" (commonly known as the "Orange Book")
In this episode—an introductory snip from a Fire From Ashes retreat at St Luke Orthodox Church, Garden Grove, California—Fr. Joseph says, "Enough about me... a bit about the book."
In this episode—an introductory snip from a Fire From Ashes retreat at St Luke Orthodox Church, Garden Grove, California—Fr. Joseph says, "Enough about me... a bit about the book."
No Deodorant In Outer Space (books turned into movies - Science Fiction, Fantasy and related genres)
S1E2* (Show Notes) Book: "A Clockwork Orange" by Anthony Burgess Movie: "A Clockwork Orange" by Stanley Kubrick (Malcom McDowell) Hosted by: Ryan Sean O'Reilly David Wilkinson a/k/a "Wilk" James Rauch a/k/a "Beam" Website: www.nodeodorant.com * DISCLAIMER: Please be advised that the views and opinions of the hosts and guests of NDIOS are completely their own and do not necessarily reflect the views and beliefs of the other hosts and guests or that of NDIOS.
The Orange Book, published in 2004, is a collection of political essays by leading Liberal Democrats. Although the writers come from a range of viewpoints, the book has been seen as an attempt by party right wingers to reclaim the party's economic liberal origins in the nineteenth century and give it a new modern emphasis. But for some leading Liberal Democrats these ideas are now closer to tenets of Conservative thought. So will the Orange Bookers bind the coalition ever closer together or lead to fractures and even splits in Liberal Democrat ranks? Edward Stourton talks to one of the leading Orange Book Liberal Democrats, David Laws MP, about the philosophy behind the book and why they were so keen to publish it. He discusses the consequences for the party of the gap which has now emerged between public perceptions of where the party stands on major issues and where its leadership's inclinations lie. And he discusses what the longer-term implications of the Orange Bookers' relationship with David Cameron's Conservatives will be. Among those he talks to are Baroness Williams of Crosby; the former Conservative Shadow Home Secretary, The Rt. Hon. David Davis, MP; the historian and newly-elected Labour MP, Tristram Hunt; the expert on political leadership, Professor Peter Clarke; and the former Liberal Democrat policy director and Orange Book sceptic, Richard Grayson.