The Future of Transportation: Revolutionizing the EV Industry September 29, 2021 I 11:00AM – 12:15PM
The Future of Transportation: Revolutionizing the EV Industry will provide regional insights to inform the electric vehicle (EV) ecosystem’s decision-makers about the state of the electric vehicle industry. During this virtual event, we’ll discuss where the opportunities exist, not just for technology and innovation but also for workforce development and what that means for the local economy.
What does a well-crafted video, as part of your well-planned, professionally created marketing plan, do for you and your business? If your potential clients are part of the 65% of the population that are visual learners, then the answer is A WHOLE BUNCH. And when you realize that 90% of the information that your brain processes are visual, it is obvious that using video to market your business is increasingly more important.
What You Will Learn: • 10 video topics that will build your business. • 14 ways to make your videos instantly more effective. • Tips to make your video backgrounds better. • The opportunity to have a video interview created for you for free that promotes your business. • First steps to take PLUS Free Stuff
High-Tech In-Store Machine developed by an entrepreneur from Apple and an aerospace engineer Incentivizes Recycling. Being introduced in Northern California Safeway Stores First.
What if recycling of plastic, glass, and metal beverage containers was done at supermarket to make it convenient? And what if the recycling machine was so easy to use and loaded with high-tech components so that it was more like a large, attractive device?
Who knew recycling could be so simple and look so sleek? It really should encourage people to recycle more. Such an elegant solution was engineered by Olyns, a leader in technology-centric recycling solutions, which announced July 28 the launch of its new bottle collection machine designed for high-traffic, indoor locations. To increase recycling of plastics, the innovative solution provides a convenient way for consumers to redeem bottle deposits while earning rewards through a mobile app. The approach also helps break down barriers surrounding the collection and transportation of recyclables. A single Olyns machine can deliver more than one and a half metric tons of clean recycled PET per year.
Most executives are not aware of cyber risks that threaten their businesses. They need to manage cyber security risks in the same thoughtful and intelligent way as they manage other aspects of their business. Fortunately, they don’t need to be a technology expert to improve their cyber risk management skills. This workshop provides practical and to-the-point information for busy executives and small business owners.
What you will learn:
• Real issues with examples that are easy to understand • Big picture events driving cyber-crimes today and the top cyber risks that affect executives and their businesses • Examples of common cyber-attacks, including actual impacts to real businesses • Using germ theory to explain how good “security hygiene” can help executives and their businesses combat security threats and introduce the top actions executives can take to avoid threats such as phishing, identity theft, hacking, and financial fraud • Affordable tools that can help owners mitigate the most common cyber risks
Social Media Essentials for Business August 12th | 1pm-3pm ONLINE
Cost: $20 Social media can be overwhelming for business owners. Which platforms. How often to post. What to post. What is “live”. Why Facebook Groups are important. This class will give you the basics every business owner should know as well as the latest trends to grow your business. Register Here
Intellectual Property and the Business of Licensing – July 27th | 10am-11:30am ONLINE
Patents and licensing have recently become an important part of the business landscape. Regardless of size or years in business, every entrepreneur should understand licensing and how to identify, protect and monetize their intellectual property, which includes patents, trademarks, copyrights and trade secrets. Intellectual Property and the Business of Licensing covers the fundamentals of these topics. It will survey the terminology, available resources, costs, timing and rules of thumb necessary for licensing. With this information, you will have the foundation for integrating the key elements of intellectual property into your business plan.
Axed plan’s 10Mbps standard could have banned public networks in 98% of Ohio
After coming close to imposing a near-total ban on municipal broadband networks, Ohio’s Republican-controlled legislature has reportedly dropped the proposed law in final negotiations over the state budget. The final budget agreement “axed a proposal to limit local governments from offering broadband services,” The Columbus Dispatch wrote. With a June 30 deadline looming, Ohio’s House and Senate approved the budget and sent it to Gov. Mike DeWine for final approval on Monday night.
As we wrote earlier this month, the Ohio Senate approved a version of the budget containing an amendment that would have forced existing municipal broadband services to shut down and prevented the formation of new public networks. The proposed law was reportedly “inserted without prior public discussion,” and no state senator publicly sponsored the amendment. It was approved in a party-line vote as Democrats opposed the restrictions in municipal broadband. The House version did not contain the amendment, and it was dropped during negotiations between the House and Senate.
“Real grassroots movement”
Lawmakers apparently relented to public pressure from supporters of municipal broadband and cities and towns that operate the networks. People and businesses from Fairlawn, where the city-run FairlawnGig network offers fiber Internet, played a significant role in the protests. FairlawnGig itself asked users to put pressure on lawmakers, and the subscribers did so in great numbers. . . . . full story here at Ars Technica
Directive comes as ransomware is exposing the fragility of critical supply chains
The Justice Department has created a task force to centrally track and coordinate all federal cases involving ransomware or related types of cybercrime, such as botnets, money laundering, and bulletproof hosting.
“To ensure we can make necessary connections across national and global cases and investigations… we must enhance and centralize our internal tracking of investigations and prosecutions of ransomware groups and the infrastructure and networks that allow the threats to persist,” Deputy Attorney General Lisa Monaco told US attorneys throughout the country on Thursday. She issued the directive in a memo that was first reported by Reuters. Investigators in field offices around the country would be expected to share information as well. The new directive applies not just to cases or investigations involving ransomware but a host of related scourges, including:
The rise of connected medical devices demands a more proactive approach to cybersecurity.
Connected medical devices have become essential for modern healthcare. Their prevalence has improved healthcare immensely but also brought an increased threat of cyber attacks. Last year saw a 55% increase in cybersecurity attacks on healthcare providers in the United States alone. With patient data, health records, and critical infrastructure at risk—and connected devices only set to become more widespread and complex—the industry needs to reconsider its approach to cybersecurity protection. . . . .
As many healthcare organizations rush to adopt connected solutions, however, many are having to reflect on the cybersecurity implications of connectivity. With HCOs encountering a near 50% increase in cyberattacks by the end of 2020, the need to better address vulnerabilities in digital health systems is more pressing than ever. Cyberattacks aren’t just becoming more frequent, however; they’re also becoming more sophisticated. Recent years have seen a range of new threats come to the fore: 18 zero-day vulnerabilities—codenamed Ripple 20 —were identified recently by Cybersecurity business JSOF, while a range of vulnerabilities in IPNet Software, named URGENT/11, poses a particular threat to the healthcare industry according to FDA. . . . . full story here
In 2011, Chinese spies stole the crown jewels of cybersecurity—stripping protections from firms and government agencies worldwide. Here’s how it happened.
“. . . . THE RSA BREACH, when it became public days later, would redefine the cybersecurity landscape. The company’s nightmare was a wake-up call not only for the information security industry—the worst-ever hack of a cybersecurity firm to date—but also a warning to the rest of the world . . . .” full story here at Wired