-
Posts
7,125 -
Joined
-
Last visited
Content Type
Profiles
Forums
Blogs
Events
Everything posted by ResidentialBusiness
-
FBI Director Kash Patel is considering bringing in trainers from the Ultimate Fighting Championship (UFC) to beef up agents’ martial arts and self-defense skills, according to four people familiar with the plan laid out on a call this week with FBI field offices. The newly appointed director discussed the idea during his first video conference call with the bureau’s 55 field office supervisors on Wednesday, said the people, who were granted anonymity to discuss the call’s contents because they were not authorized to speak publicly. Two people briefed on the matter said current FBI agents described the idea as “surreal” and “wacky.” The FBI declined to comment, and a spokesperson for UFC did not have an immediate comment. President Donald Trump is a fan of the sport, mixed martial arts bouts that pit two competitors against each other in a cage, and notably attended a UFC event in New York days after his November election victory, sitting with UFC President Dana White, who he counts as a close friend. During the call, Patel said that Dan Bongino, a far-right podcaster whom Trump tapped to be the FBI’s deputy director, is a huge UFC fan and that he inspired Patel to try the training, one of the people briefed on the call said. Patel added that he thinks it is great, and is exploring a partnership between the FBI and the UFC. “There is training the FBI receives in physical altercations. If Kash Patel believed that should be beefed up, the answer is not to go to Donald Trump’s best friend who runs the UFC,” a former Justice Department official said, when asked about Patel’s proposal. “It’s clearly motivated by the glitz and glamour show, and Trump’s friend,” said the official, who was granted anonymity out of concern about possible retribution. It was not immediately clear how any partnership would work. Patel has rattled the bureau since he was sworn in last week. One of his first acts was to call for some 1,500 FBI employees to be transferred from Washington to field offices around the country and an FBI office in Huntsville, Alabama. Patel telegraphed his plans to shake up the FBI’s operations in his book “Government Gangsters,” in which he called for moving headquarters out of Washington, D.C., and curbing the historical practice of requiring FBI agents who wish to serve in supervisory roles from doing 18-month stints at headquarters to gain experience. During Wednesday’s nationwide call with field offices, Patel reiterated his commitment to scaling back staffing at headquarters and re-distributing people into the field, two people familiar with the call said. He also said Bongino will begin visiting field offices immediately after he starts his new job in mid-March, one of the people added. —Sarah N. Lynch, Reuters View the full article
-
A stakeholder is any individual, group or organization directly or indirectly affected by a project. That means they are interested in its success and can influence its outcome. This can include the project manager, project team, customers, suppliers, executives, regulatory bodies and sometimes the community impacted by the project. Stakeholder engagement helps manage these various influencers. To understand how to manage stakeholders, we’ll begin by defining stakeholder engagement and a stakeholder engagement plan. Then we’ll outline what should be included in the stakeholder engagement plan and how the process is played out in project management. Then download a few free related templates to help when managing stakeholders What Is Stakeholder Engagement? Stakeholder engagement in project management refers to the process of identifying, communicating with and managing relationships with individuals or groups who have an interest in or influence over a project. These stakeholders may include clients, sponsors, team members, regulatory bodies and end users. Effective engagement ensures that their expectations, concerns and contributions are considered throughout the project lifecycle. Engaging stakeholders involves active communication, collaboration and feedback mechanisms to align project goals with their needs and priorities. It helps prevent misunderstandings, reduce risks and increase project buy-in. This engagement can take various forms, including regular meetings, status updates, surveys and workshops. By prioritizing stakeholder engagement, project managers can enhance decision-making, improve project outcomes and increase overall satisfaction among those impacted by the project. A well-executed stakeholder engagement strategy ensures smoother project execution, fosters trust and minimizes resistance to change. Project management software is critical to successful stakeholder engagement. ProjectManager is award-winning project and portfolio management software with multiple project views to plan, manage and track projects in real time and keep stakeholders informed. The project manager is a stakeholder and can use robust Gantt charts to schedule tasks, resources and costs. But our Gantt charts go the extra mile. They can link all four types of task dependencies to avoid delays and cost overruns, filter for the critical path to identify essential tasks and set a baseline to track progress in real time. Stakeholders can execute their tasks on the tool they prefer, such as kanban boards or task lists. Other stakeholders can get guest passes to see the calendar view and stay updated on progress or their responsibilities. Get started with ProjectManager today for free. /wp-content/uploads/2024/04/critical-path-light-mode-gantt-construction-CTA.pngProjectManager’s Gantt charts help manage stakeholder engagement. Learn more What Is a Stakeholder Engagement Plan? A stakeholder engagement plan is a strategic document that outlines how a project will identify, communicate with and manage relationships with stakeholders throughout its lifecycle. It helps ensure that stakeholders’ interests, concerns and expectations are actively considered, minimizing risks and increasing project success. This plan defines the key stakeholders, their level of influence, communication preferences and the engagement strategies to use. It also establishes a structured approach to keeping stakeholders informed and involved through meetings, reports, feedback sessions and collaboration tools. A well-designed stakeholder engagement plan helps build trust, enhance transparency and improve decision-making by fostering positive relationships with those who impact or are impacted by the project. What Should Be Included in a Stakeholder Engagement Plan? A stakeholder engagement plan provides a structured approach to identifying, analyzing and managing relationships with project stakeholders. It ensures that stakeholders remain informed, engaged and aligned with project objectives. Below are key components that should be included. Stakeholder Register A detailed list of all stakeholders, including their roles, contact information, level of influence and interest in the project. This helps track and manage stakeholder relationships effectively. Stakeholder Map (Power-Influence Matrix) A visual representation that categorizes stakeholders based on their level of power and influence over the project. This helps determine the appropriate level of engagement for each stakeholder group. Stakeholder Engagement Matrix A table that outlines how, when and with whom engagement efforts should take place. It helps project teams tailor communication strategies for different stakeholder groups. Salience Model Chart A model that classifies stakeholders based on their power, legitimacy and urgency, allowing project managers to prioritize engagement efforts with the most critical stakeholders. Current and Desired Stakeholder Engagement Levels This section assesses where stakeholders currently stand in terms of engagement and where they need to be for project success, which is as follows. Unaware: Stakeholders unaware of the project. Resistant: Stakeholders opposed to the project. Neutral: Stakeholders neither supporting nor opposing the project. Supportive: Stakeholders in favor of the project. Leading: Stakeholders actively engaged in and championing the project. Stakeholder Engagement Objectives Defines the goals of engagement based on stakeholder needs and project requirements: Inform: Keep stakeholders updated with relevant information. Consult: Gather stakeholder feedback to refine project decisions. Collaborate: Work together with stakeholders to co-develop solutions. Empower: Give stakeholders decision-making authority in specific areas. Communication Plan The communication plan outlines how information will be shared with stakeholders, including the communication channels, frequency and responsible parties to ensure timely and effective engagement. Stakeholder Engagement Metrics Defines key performance indicators (KPIs) to measure engagement success, such as stakeholder feedback scores, participation rates and response times to communications. Related: 10 Free Stakeholder Management Templates for Excel & Word Stakeholder Engagement Process in Project Management The stakeholder engagement process ensures that all relevant parties are properly identified, analyzed, and involved throughout the project life cycle. Effective engagement helps manage expectations, minimize risks and increase stakeholder support. Below are the key steps in the process. 1. Identify Project Stakeholders The first step is to create a list of all individuals, groups or organizations that have an interest in or can impact the project. This includes internal stakeholders (e.g., project team, executives) and external stakeholders (e.g., clients, suppliers, regulatory bodies). 2. Use Stakeholder Management Charts to Analyze and Prioritize Stakeholder Engagement Efforts Tools like a stakeholder analysis, stakeholder map and stakeholder register help categorize stakeholders based on their level of interest, influence and urgency. This prioritization allows project managers to focus engagement efforts on the most critical stakeholders. 3. Define Stakeholder Expectations and Requirements Engaging with stakeholders early in the project helps uncover their specific needs, concerns and success criteria. Understanding these expectations ensures project goals align with stakeholder interests and helps prevent conflicts later. 4. Identify Stakeholders’ Communication Preferences Different stakeholders require different levels of communication. Some may prefer detailed reports, while others need brief email updates or face-to-face meetings. Defining the right communication approach ensures that stakeholders remain informed and engaged without unnecessary overload. 5. Keep Stakeholders Informed on Project Status Periodically Regular updates through status reports, meetings and presentations help maintain transparency and trust. Keeping stakeholders engaged throughout the project ensures that their concerns are addressed promptly and that they remain supportive of the project’s progress. Why Is It Important to Build a Stakeholder Engagement Strategy? A well-defined stakeholder engagement strategy ensures all project stakeholders are properly identified, analyzed and involved throughout the project. It helps align stakeholder expectations with project objectives, reducing risks and increasing the likelihood of project success. Without a clear engagement strategy, misunderstandings and misalignment can lead to delays, conflicts and resistance to change. Engaging stakeholders effectively enhances collaboration and decision-making by fostering open communication and transparency. When stakeholders feel heard and involved, they are more likely to support project initiatives and contribute valuable insights. A structured engagement strategy ensures stakeholders receive relevant updates, provide timely feedback and remain engaged throughout the project life cycle. A strong stakeholder engagement strategy also helps build long-term relationships and trust between the project team and key stakeholders. By proactively managing concerns and addressing expectations, organizations can create a positive reputation and increase stakeholder buy-in for future projects. This not only improves the success of the current project but also strengthens partnerships for future collaboration. Stakeholder Management Templates We’ve mentioned tools that are part of the process of stakeholder engagement. Those tools can be found among our over 100 free project management templates for Excel and Word. These free templates cover all aspects of managing projects across multiple industries. Here are a few that can help when managing stakeholders. Stakeholder Map Template Stakeholder engagement begins with identifying the stakeholders of a project. Use this free stakeholder map template for Excel to find and identify stakeholders’ impact and influence, whether individuals, groups or organizations. Stakeholder Register Template Use this free stakeholder register template for Excel to understand how each stakeholder influences the project. This will inform how to communicate and manage them better. This free template helps address stakeholders’ needs and plans to effectively communicate with them. Stakeholder Analysis Template Another free template that can identify and manage stakeholders is the stakeholder analysis template for Excel. This free template collects the key stakeholders by group, which is determined by their level of participation, interest and power or influence on the project. How ProjectManager Helps With Stakeholder Engagement While templates can help identify stakeholders and help determine what stakeholder engagement should look like, they fall short when it comes to managing them during the planning and execution of the project. Managing stakeholders is dynamic and Excel spreadsheets are static documents. Project managers need real-time project management software. ProjectManager is award-winning project and portfolio management software with multiple project views and all the features needed to manage, track and report on progress to manage stakeholder expectations. Robust Resource Management Stakeholders have a vested interest in the project’s success. Project managers set the stage for this by scheduling resources, both human and nonhuman, on Gantt charts. Before assigning teams to tasks, project managers can set their availability, such as PTO, vacation, global holidays and skill sets, to ensure the right person is assigned the right task at the right time. This leads to a smoother execution. However, it’s also important to have an overview of resource allocation to ensure no one is overallocated or underutilized. The color-coded workload chart gives this information with only a glance, and can also balance the workload to keep teams working at capacity and productive without burnout. The team page provides a daily or weekly summary of the team’s activities, which can also be filtered by priority, progress and more. /wp-content/uploads/2023/01/Team-Light-2554x1372-1.png Real-time Project Management Dashboards and Reports The key to stakeholder engagement is providing them with updates to manage their expectations. Our software has many ways to monitor the project, from the high-level overview of the real-time project or portfolio dashboards to customizable reports. All reports can be filtered to highlight the data stakeholders care about and then shared with them across several different formats. Even our secure timesheets help by tracking labor costs to help deliver the project on budget. /wp-content/uploads/2022/07/Dashboard-light-mode.jpg Related Stakeholder Management Content Stakeholder engagement is part of the larger stakeholder management, and for those who are curious about this subject, there is much more to read. We publish multiple blogs per week, as well as free templates, eBooks and tutorial videos. Below are some links to recent pieces we’ve published regarding stakeholders. Free Stakeholder Management Templates for Excel & Word What Is Stakeholder Theory? Stakeholder Analysis 101 (Examples & Template Included) Stakeholder Mapping 101: How to Make a Stakeholder Map Stakeholder Salience Model in Project Management How to Manage Stakeholder Expectations ProjectManager is online project and portfolio management software that connects teams and stakeholders, whether they’re in the office, out in the field or anywhere in the world. They can share files, comment at the task level and stay updated with email and in-app notifications. Join teams at Avis, Nestle and Siemens who are using our software to deliver successful projects. Get started with ProjectManager today for free. The post Stakeholder Engagement in Project Management appeared first on ProjectManager. View the full article
-
I like watching Reels and TikToks about cleaning because in addition to getting some good tips, I find them relatable. Why, yes, Algorithm, I do often find myself in a position where friends are coming over but my home isn't exactly spotless. How did you know? One Instagram user has a suggestion for how to turn that exact situation into a cleaning win: Called the "GFD bin," it's gained some traction on the app as a quick decluttering method worth trying. What is a "GFD bin?"A "GFD bin" is a "guests for dinner" bin, according to its creator, Holly Blakey. The organizing and interior decorating guru shared this video last December explaining the idea: Essentially, before guests come over, you grab a big basket (or even a bag) and take it around the house, tossing anything out of place inside. Then, stash it somewhere, like a closet, committing to putting its contents away the next day. By doing this, you accomplish a few things at once: Obviously, you get your home ready for guests quickly, but you also set yourself up for cleaning success by segmenting the work into two parts. It might seem like a cop-out to just run around and hide all the dirty parts of your home, but it draws on two techniques I really stand by. The first is the idea of segmentation, like you employ when you follow the "magic basket" approach. The magic basket, for its part, involves going around your home every night and depositing out-of-place items into said basket, then putting everything away the next day. The goal here is to space out your labor so it never gets overwhelming. You wake up the next day feeling good about the work you did do the night before, put everything away, then get motivated by that effort, creating a looping cycle instead of one longer, dread-worthy task. The second approach the GFD bin calls on is the idea of rewarding yourself to create further cleaning motivation. You need breaks when you do anything productive or you'll get burned out eventually, but when you're doing a task that is especially unpleasant or tedious, like cleaning, you should also make sure those breaks are fun and enjoyable. In the same way I've recommended eating a favorite candy or watching a favorite show while cleaning, incorporating the arrival of friends as an enjoyable activity mid-cleaning can be motivating, too. Rather than getting down on yourself for letting a mess pile up and being in a rush before someone gets to your place, think of this as a built-in motivational scheme. There's no shame in hiding away the mess as long as you follow through on the commitment to putting it away the next day. View the full article
-
A spike in demand for electricity from tech companies competing in the artificial intelligence race is upending forecasts for natural gas-fired power in the U.S., as utilities reconsider it as a major new power source. That is not what many scientists and climate activists envisioned in the fight against climate change. And it is endangering progress on the greenhouse gas-reduction goals that scientists say are necessary to manage the damage from burning fossil fuels that warms the planet. Across the nation, tech companies are snapping up real estate and seeking new power projects to feed their energy-hungry operations. In some cases, Big Tech is building climate-friendlier projects like solar, wind, geothermal or battery storage. But industry decision-makers are also turning to natural gas for what they say is a cheap and reliable source of power, raising the prospect that gas-fired power will play a bigger role — and for a longer period of time — than even they had anticipated. “Gas is growing faster now and in the medium term than ever before,” said Corianna Mah, a power and renewables analyst at data analytics firm Enverus. Before the spike in electricity demand last year, many in the industry had assumed that there would be few new gas plants and that the nation’s fleet would gradually retire in favor of a grid powered by wind, solar, geothermal, batteries and possibly the next generation of nuclear power — sources that don’t emit the planet-warming greenhouse gas carbon dioxide. For many countries, that ramp down is happening as they work toward the goal of slashing their emissions to zero — or at least, net zero — by 2050, which scientists say could help the world avoid the worst effects of climate change. In the U.S., the electric power sector is the second-biggest emitter of greenhouse gases, according to government figures. And the construction of every new natural gas plant — built to last for decades — is a setback for climate goals, said John Quigley, a senior fellow at the University of Pennsylvania’s Kleinman Center for Energy Policy. “At a top level, we will not get to net zero by 2050 if we are building new gas plants. Period,” Quigley said. Burning natural gas emits carbon dioxide, and before that, when it escapes from wellheads or pipelines in its unburned form, it’s an even more potent greenhouse gas called methane. Quigley and others say there is enough solar, wind and battery storage projects on the drawing board to satisfy growing electricity demand. But, they say, utilities and grid operators lack the will to abandon natural gas. Enverus now projects the next five years will bring roughly 46 gigawatts of gas-fired power online. That compares to 39 gigawatts in the past five years, it said. Announcements last year alone include: — two 705-megawatt plants by Evergy in Kansas; — Entergy’s 2,300-megawatt plant to serve Meta’s $10 billion AI data center in northern Louisiana, a pair of new plants in Texas and another in Mississippi; — a 1,450-megawatt plant by the Tennessee Valley Authority; — a 1,400 megawatt Duke Energy project in North Carolina; — and Georgia Power’s plans for three oil or gas units with a capacity of up to 1,300 megawatts. And that’s not all. Calpine said it’s exploring new gas-fired capacity in the congested mid-Atlantic region, especially Pennsylvania and Ohio, where analysts say the grid operator is trying to fast-track new gas-fired power plants into service. In Pennsylvania, the former Homer City coal-fired power plant is being transformed into a massive gas-fired station that’s expected to supply a data center — and got a $5 million state grant to do it. On top of the artificial intelligence boom, the frenzy for new electricity is fueled by cryptomining, the broader electrification of society and a bipartisan push to bring manufacturing back to the U.S. It is coinciding with the closure of coal plants and aging nuclear plants, unable to compete with cheaper gas, solar and wind. Across the U.S., gas pipeline operators are exuberant about the new demand and are reporting strong interest in extending their lines. Chris Kalnin, the CEO of BKV, the largest natural-gas producer in the Barnett Shale gas reservoir in Texas, said the trend there is toward gas plants being built next to data centers in a booming data center corridor in metropolitan Dallas. Data center developers there are in an “arms race” to secure power, Kalnin said. “Data center guys are trying to source power and trying to get to market with their data centers as fast as possible,” Kalnin said. The key to signing up cloud-computing customers “is getting your facility online quickly and getting your facility online quickly requires you to have power and dependable power and a cost-efficient power source.” Rob Jennings of the American Petroleum Institute, said the sudden growth in actual and forecast electricity demand has put a premium on power sources that can be built fast and cheaply and are reliable. That means natural gas is once again attractive to investors over solar and wind, he said. “In the near term, the reality has dawned on most that it has to be gas,” Jennings said. Industry officials say they strive to deliver electricity that is clean, reliable and affordable. For instance, some new gas plants are replacing higher-pollution coal-fired plants, some are designed to run only at times of high demand, some are paired with battery storage or a wind farm nearby and some are designed with carbon-capture technology or to run on a hydrogen blend, said Alex Bond of the Edison Electric Institute, which represents U.S. investor-owned electric companies. At the very least, building gas-fired capacity will have high-level political support. In his remarks to the World Economic Forum in Davos, Switzerland last month, President Donald Trump declared that he’d issue “emergency declarations” to get coal – and gas-plants built to make the U.S. a superpower of manufacturing, cryptomining and artificial intelligence. But Amanda Levin of the Natural Resources Defense Council said the U.S. must take big steps by 2035 to reduce its reliance on gas. That means slashing a fleet of roughly 1,500 gas plants down to about 100 if the U.S. is to meet strong climate commitments and preserve a chance of addressing climate change, she said. Still, she said there are reasons to be optimistic that gas plant projects on the drawing board won’t get built. In recent weeks, Chinese tech startup Deepseek released a new AI model that it boasted was on par with similar models from U.S. companies and at a fraction of the cost — calling into question the need for a massive expansion of energy-hungry data centers. And some analysts believe utilities overestimate the electricity they’ll need, essentially by double- or triple-counting data center proposals when firms express interest in multiple locations — but only build in one. Besides, Levin said, data center operators are getting better at energy efficiency, particularly in how they cool their servers. Even if all the gas plants are built, they may not get used, she said. “There are a lot of reasons,” Levin said, “for why we might not actually see all of this (demand) materialize.” —Marc Levy, Associated Press The Associated Press’ climate and environmental coverage receives financial support from multiple private foundations. AP is solely responsible for all content. Find AP’s standards for working with philanthropies, a list of supporters and funded coverage areas at AP.org. View the full article
-
We may earn a commission from links on this page. They don't make movie stars like they used to, but they only made a movie star like Gene Hackman once. Born in 1930, Hackman served as a marine and studied journalism in college before dropping out to work as an actor, earning acclaim on Broadway and in television roles but not breaking out in films until his late 30s, when he earned a Best Supporting Actor Oscar nomination for playing Warren Beatty's brother in the crime classic Bonnie and Clyde. It proved to be the start of an eclectic big-screen career that would see him earn four more Oscar nominations (and two wins, for 1971's The French Connection and 1992's Unforgiven). With hangdog looks and an ability to project gravitas and heroism and weakness and villainy in equal measure, he gave one indelible performance after another, always bettering the films he appeared in. To honor his recent death—and celebrate his truly remarkable career—here are 20 of his most iconic performances. Bonnie and Clyde (1967) Bonnie and Clyde is best remembered today as a harbinger of the auteur era that would transform Hollywood in the 1970s. Filled with dark humor and visceral violence, and borrowing techniques from the French New Wave, Arthur Penn's film overcame tepid early reviews to become a counter-cultural sensation and a major awards contender. Though Warren Beatty and Faye Dunaway are iconic as the title criminals, then-newcomer Gene Hackman made his mark (and earned a Best Supporting Actor Oscar nomination) playing Clyde Barrow's ill-fated brother Buck. You can rent Bonnie and Clyde from Prime Video. Bonnie and Clyde (1967) at Prime Video Learn More Learn More at Prime Video Downhill Racer (1969) The first of a string of memorable movies in which Gene Hackman plays a coach, Downhill Racer is a quintessentially '70s affair—a moody, heady sports drama led by one of Hollywood's biggest stars (Robert Redford) that critic Roger Ebert called "the best movie ever made about sports—without really being about sports at all." Redford commands the spotlight as a cocky, self-centered skiing champ, but it's Hackman who grounds the film as the teamwork-minded coach hoping to lead his athletes to Olympic gold. You can stream Downhill Racer free with ads on Pluto TV or rent it from Prime Video. Downhill Racer (1969) at Prime Video Learn More Learn More at Prime Video The French Connection (1971) Watching The French Connection today, we recognize a certain formula: big-budget, well-choreographed shoot-outs, chases, and car crashes given gravitas by a complex and troubled lead, usually a cop. But it only became a formula because so many other films tried to copy what director William Friedkin accomplished here with Hackman in the lead. All of the action beats land because of his performance as antihero Popeye Doyle, one that landed him his single Best Actor Oscar. You can rent The French Connection from Prime Video. The French Connection (1971) at Prime Video Learn More Learn More at Prime Video The Poseidon Adventure (1972) Poseidon rests firmly in the very ‘70s disaster-movie style: an all-star cast faces doom and soapy drama, this time on a cruise ship turned upside down. These casts were always blends of older, more familiar faces and relatively younger stars, of which top-billed Hackman was representative. These movies aren’t really about the acting, but this one wasn’t received as a dumb action movie: it received multiple Academy Award nominations and earned Hackman a Best Actor BAFTA, a single award given for two performances in two very different movies. The first was his performance as earnest reverend Frank Scott in this one, and as Popeye Doyle in The French Connection. Even way back in 1972 it was clear that Hackman had range. You can stream The Poseidon Adventure on Starz or rent it from Prime Video. The Poseidon Adventure (1972) at Prime Video Learn More Learn More at Prime Video Scarecrow (1973) A little-known entry in the filmographies of both Hackman and costar Al Pacino, this character drama is worth seeking out. Hackman plays a drifter and ex-con who hooks up with a simple-minded sailor (Pacino). The pair set off across the country with plans to open a business together, but get into trouble along the way and wind up doing a stint in prison—and experience that will have a profound effect on both their lives. Though it won the top award at the Cannes Film Festival, it is little discussed today, and that's too bad—it's not often you get to enjoy the likes of Hackman and Pacino playing opposite one another. You can rent Scarecrow from Prime Video. Scarecrow (1973) at Prime Video Learn More Learn More at Prime Video The Conversation (1974) Francis Ford Coppola’s film didn’t do much in the way of business on its initial release, but the critics and the years have been extremely kind to the film, no small accomplishment given that much of its plot hinges on 1970s-era technology. The movie’s themes about the dangers of the surveillance state and ambivalence about our need to know everything about everyone are as relevant now as ever. Hackman plays yet another iconic character in Harry Caul, brilliant at his job but also, himself, a deeply secretive and haunted man. His performance here is simply one of the finest in an era full of brilliant performances. You can stream The Conversation on The Criterion Channel or rent it from Prime Video. The Conversation (1974) at The Criterion Channel Learn More Learn More at The Criterion Channel Night Moves (1975) An absolutely essential neo-noir, Hackman stars here as retired football player Harry Moseby, now a private investigator but with a personal life that’s crumbling around him. Like other noir films before it, the plot thread grow increasingly convoluted and dense, building toward an impressively unexpected ending, but Harry remains the glue that holds it all together. Even as a depressed and sullen character who you wouldn’t want to spend five minutes with in real life, he’s riveting. You can rent Night Moves from Prime Video. Night Moves (1975) at Prime Video Learn More Learn More at Prime Video A Bridge Too Far (1977) Though it received mixed reviews at the time, war film A Bridge Too Far was a box office hit, and stands today as the kind of epic adult drama Hollywood rarely makes anymore. With a screenplay by William Goldman, it depicts a doomed military operation in the Nazi-occupied Netherlands in 1944. Hackman is part of a stacked cast that includes James Caan, Michael Caine, Sean Connery, Elliott Gould, Anthony Hopkins, Laurence Olivier, Ryan O'Neal, and Robert Redford. You can stream A Bridge Too Far on MGM+ or rent it from Prime Video. A Bridge Too Far (1977) at Prime Video Learn More Learn More at Prime Video Superman (1978) For at least a generation, Hackman was the definitive Lex Luthor in the definitive superhero movie. Director Richard Donner promised a level verisimilitude in his Super-saga, which Christopher Reeve and Margot Kidder deliver. Hackman, though, is the third point on that triangle, alternately delivering comic relief and a sense of real menace—even with a full head of hair. Today’s movie supervillains are all about conquering the universe, which feels like a distraction from this movie’s more real and present threat: a ruthless real-estate mogul willing to watch millions die for a few extra bucks. You can stream Superman on Max or rent it from Prime Video. Superman (1978) at Max Learn More Learn More at Max Hoosiers (1986) A sleeper hit at the box office that has come to be recognized as one of the most inspiring sports movies ever made, this 1986 drama gave Hackman one of his best-loved roles. He plays Norman Dale, a teacher at a poor high school in rural Indiana who leads a team of misfits to glory on the court. Though Hackman was overlooked, Dennis Hopper earned a Best Supporting Actor Oscar nod for his turn as the town drunk who finds new purpose serving as Dale's assistant coach. You can rent Hoosiers from Prime Video. Starting Feb. 28 you can also stream it free on Prime Video With Ads. Hoosiers (1986) at Prime Video Learn More Learn More at Prime Video No Way Out (1987) Simultaneously smart and trashy, No Way Out pays tribute to noir movies past while steering more firmly into erotic thriller territory—not that big a leap. Hackman here plays Secretary of Defense David Brice, the type of role that’s just window dressing in many other movies. Here, though, Hackman is having a grand time playing Brice as a thoroughly nasty bit of business—duplicitous, murderous, and sharing a mistress (Sean Young) with lead Kevin Costner. It’s not Hackman’s finest performance, but it’s definitely one of his juiciest. You can stream No Way Out with ads on Pluto TV or rent it from Prime Video. No Way Out at Pluto TV Learn More Learn More at Pluto TV Mississippi Burning (1988) Though its politics don't seem quite as progressive 37 years on, there's no arguing the fact that Gene Hackman commands the screen in this racially charged crime thriller, set amid the 1960s civil rights movement and inspired by true events. Hackman and Willem Dafoe play FBI agents investigating the murders of three civil rights workers in a southern town that is cozy with the KKK. Hackman was nominated for Best Actor for his turn as a former good-ol'-boy sheriff turned federal agent, who knows all too well how racism and prejudice operate in the town, and is willing to bend the rules to bring the killers to justice. You can stream Mississippi Burning free with ads on Pluto TV, catch it on Prime Video, or rent it from Apple TV. Mississippi Burning (1988) at Apple TV Learn More Learn More at Apple TV Unforgiven (1992) Unforgiven was seen as a valedictory for Clint Eastwood, but the movie’s sole acting Oscar went to Hackman. He plays Sheriff Little Bill Daggett, whose rejection of vigilantism puts him at odds with Eastwood’s William Munny, in town to avenge the disfiguring of a sex worker. Munny may be the movie’s center, but Little Bill provides all the conflict, and it offers a later-career return to the types of complicated, morally grey characters of his earlier days. You can stream or rent Unforgiven from Prime Video. Unforgiven (1992) at Prime Video Learn More Learn More at Prime Video The Quick and the Dead (1995) Everyone says Unforgiven is a revisionist western, but it looks wildly traditional next to Sam Raimi’s deliberately over-the-top take on the genre. Hackman plays John Herod, the ruthless and endlessly greedy ruler of the Old West town of Redemption. Herod arranges a round-robin style contest of champions in town, in which gunfighters are to fight for cash, win, yield, or die. This isn’t a subtle or insightful performance, but a delightfully hammy one. Even when playing a very recognizable Gene Hackman type, the actor could still be awfully fun to watch. You can stream The Quick and the Dead on Hulu or rent it from Prime Video. The Quick and the Dead (1995) at Hulu Learn More Learn More at Hulu Crimson Tide (1995) Though sometimes dismissed as a spin on The Hunt for Red October, this submarine thriller is impressively smart, pitting Hackman’s experienced sub commander against Denzel Washington as his first officer, both men in conflict over interpretation of an order to launch missiles, the outcome of which could have devastating consequences. You don’t necessarily come to a Tony Scott action thriller for the acting, but the movie is a real showcase for its leads, and a fascinating juxtaposition of two brilliant actors from different generations. You can rent Crimson Tide from Prime Video. Crimson Tide (1995) at Prime Video Learn More Learn More at Prime Video Get Shorty (1995) Gene Hackman's range encompassed all types of characters, but he rarely seemed to be having more fun than when playing a sleazeball—something he does with gusto in this satire of mid-'90s Hollywood excess, directed by Barry Sonnenfeld and based on the novel by Elmore Leonard. He plays a B-movie director in debt with the mob who gets in way over his head when he get involved with a movie-obsessed loan shark (John Travolta) in an attempt to get out a tight spot. Unsurprisingly, things don't go smoothly. You can stream Get Shorty free with ads on the Roku Channel or rent it from Prime Video. Get Shorty (1995) at The Roku Channel Learn More Learn More at The Roku Channel The Birdcage (1996) An indisputable crowd-pleaser, The Birdcage sees Hackman as a thoroughly conservative senator (in stark contrast to the actor’s real-life politics) who heads to South Beach to meet the EXTREMELY GAY family of his daughter’s fiancée. It’s a fun villain-esque role for Hackman, one that memorably sees him in full drag for the final act. You can rent The Birdcage from Prime Video. The Birdcage (1996) at Prime Video Learn More Learn More at Prime Video Enemy of the State (1998) This surveillance-state thriller isn’t nearly as smart as its 1970s influences, but it’s entirely entertaining in the way it approaches many of the same themes with a more action-heavy style. Opposite Will Smith, Hackman here plays Brill Lyle, a paranoid surveillance expert who has so much in common with The Conversation’s Harry Caul that you might consider Enemy of the State a blockbuster take on the earlier film. You can rent Enemy of the State from Prime Video. Enemy of the State (1998) at Prime Video Learn More Learn More at Prime Video Heist (2001) The same year Steven Soderbergh's Ocean's Eleven pulled off a box office cash grab on the backs of (almost) a dozen of Hollywood hottest stars, David Mamet built his own crime caper around a band of aging thieves. Hackman plays the leader of a gang of professional smash-and-grabbers whose face is captured by security cameras during a job, forcing him to go on the run and attracting the ire of his partners in the "business." Hackman handles Mamet's mouthfuls of dialogue with practiced ease, elevating what Roger Ebert described as "the kind of caper movie that was made before special effects replaced wit, construction, and intelligence." You can rent Heist from Prime Video. Heist (2001) at Prime Video Learn More Learn More at Prime Video The Royal Tenenbaums (2001) Though he'd appear in a few more movies before retiring in 2004, Wes Anderson's The Royal Tenenbaums was Hackman's last standout performance, and one of his very best. He's hateable and irresistible in equal measure as the deeply flawed patriarch of a deeply neurotic, Salinger-inspired New York family who assembles his estranged wife (Anjelica Huston) and deeply resentful children (played by Luke Wilson, Ben Stiller, and Gwyneth Paltrow) to tell them he only has weeks to live. You can rent The Royal Tenenbaums from Prime Video. The Royal Tenenbaums (2001) at Prime Video Learn More Learn More at Prime Video View the full article
-
On Valentine’s Day 2025, heavy rains started to fall in parts of rural Appalachia. Over the course of a few days, residents in eastern Kentucky watched as river levels rose and surpassed flood levels. Emergency teams conducted over 1,000 water rescues. Hundreds, if not thousands of people were displaced from homes, and entire business districts filled with mud. For some, it was the third time in just four years that their homes had flooded, and the process of disposing of destroyed furniture, cleaning out the muck and starting anew is beginning again. Historic floods wiped out businesses and homes in eastern Kentucky in February 2021, July 2022 and now February 2025. An even greater scale of destruction hit eastern Tennessee and western North Carolina in September 2024, when Hurricane Helene’s rainfall and flooding decimated towns and washed out parts of major highways. Each of these events was considered to be a “thousand-year flood,” with a 1-in-1,000 chance of happening in a given year. Yet they’re happening more often. The floods have highlighted the resilience of local people to work together for collective survival in rural Appalachia. But they have also exposed the deep vulnerability of communities, many of which are located along creeks at the base of hills and mountains with poor emergency warning systems. As short-term cleanup leads to long-term recovery efforts, residents can face daunting barriers that leave many facing the same flood risks over and over again. Exposing a housing crisis For the past nine years, I have been conducting research on rural health and poverty in Appalachia. It’s a complex region often painted in broad brushstrokes that miss the geographic, socioeconomic and ideological diversity it holds. Appalachia is home to a vibrant culture, a fierce sense of pride and a strong sense of love. But it is also marked by the omnipresent backdrop of a declining coal industry. There is considerable local inequality that is often overlooked in a region portrayed as one-dimensional. Poverty levels are indeed high. In Perry County, Kentucky, where one of eastern Kentucky’s larger cities, Hazard, is located, nearly 30% of the population lives under the federal poverty line. But the average income of the top 1% of workers in Perry County is nearly US$470,000 – 17 times more than the average income of the remaining 99%. This income and wealth inequality translates to unequal land ownership – much of eastern Kentucky’s most desirable land remains in the hands of corporations and families with great generational wealth. When I first moved to eastern Kentucky in 2016, I was struck by the grave lack of affordable, quality housing. I met families paying $200-$300 a month for a small plot to put a mobile home. Others lived in “found housing” – often-distressed properties owned by family members. They had no lease, no equity and no insurance. They had a place to lay one’s head but lacked long-term stability in the event of disagreement or disaster. This reality was rarely acknowledged by local and state governments. Eastern Kentucky’s 2021 and 2022 floods turned this into a full-blown housing crisis, with 9,000 homes damaged or destroyed in the 2022 flood alone. “There was no empty housing or empty places for housing,” one resident involved in local flood recovery efforts told me. “It just was complete disaster because people just didn’t have a place to go.” Most homeowners did not have flood insurance to assist with rebuilding costs. While many applied to the Federal Emergency Management Agency for assistance, the amounts they received often did not go far. The maximum aid for temporary housing assistance and repairs is $42,500, plus up to an additional $42,500 for other needs related to the disaster. The federal government often provides more aid for rebuilding through block grants directed to local and state governments, but that money requires congressional approval and can take months to years to arrive. Local community coalitions and organizations stepped in to fill these gaps, but they did not necessarily have sufficient donations or resources to help such large numbers of displaced people. With a dearth of affordable rentals pre-flood, renters who lost their homes had no place to go. And those living in “found housing” that was destroyed were not eligible for federal support for rebuilding. The sheer level of devastation also posed challenges. One health care professional told me: “In Appalachia, the way it usually works is if you lose your house or something happens, then you go stay with your brother or your mom or your cousin. … But everybody’s mom and brother and cousin also lost their house. There was nowhere to stay.” From her point of view, “our homelessness just skyrocketed.” The cost of land – social and economic After the 2022 flood, the Kentucky Department for Local Government earmarked almost $300 million of federal funding to build new, flood-resilient homes in eastern Kentucky. Yet the question of where to build remained. As another resident involved in local flood recovery efforts told me, “You can give us all the money you want; we don’t have any place to build the house.” It has always been costly and time-intensive to develop land in Appalachia. Available higher ground tends to be located on former strip mines, and these reclaimed lands require careful geotechnical surveying and sometimes structural reinforcements. If these areas are remote, the costs of running electric, water and other infrastructure services can also be prohibitive. For this reason, for-profit developers have largely avoided many counties in the region. The head of a nonprofit agency explained to me that, because of this, “The markets have broken. … We have no [housing] market.” There is also some risk involved in attempting to build homes on new land that has not previously been developed. A local government could pay for undeveloped land to be surveyed and prepared for development, with the prospect of reimbursement by the U.S. Department of Housing and Urban Development if housing is successfully built. But if, after the work to prepare the land, it is still too cost-prohibitive to build a profitable house there, the local government would not receive any reimbursement. Some counties have found success clearing land for large developments on former strip mine sites. But these former coal mining areas can be considerable distances from towns. Without robust public transportation systems, these distances are especially prohibitive for residents who lack reliable personal transportation. Another barrier is the high prices that both individual and corporate landowners are asking for properties on higher ground. The scarcity of desirable land available for sale, combined with increasingly urgent demand, has led to prices unaffordable for most. Another resident involved in local flood recovery efforts explained: “If you paid $5,000 for 30 acres 40 years ago, why won’t you sell that for $100,000? Nope, [they want] $1 million.” That makes it increasingly difficult for both individuals and housing developers to purchase land and build. One reason for this scarcity is the amount of land that is still owned by outside corporate interests. For example, Kentucky River Properties, formerly Kentucky River Coal Corporation, owns over 270,000 acres across seven counties in the region. While this landholding company leases land to coal, timber and gas companies, it and others like it rarely permit residential development. But not all unused land is owned by corporations. Some of this land is owned by families with deep roots in the region. People’s attachment to a place often makes them want to stay in their communities, even after disasters. But it can also limit the amount of land available for rebuilding. People are often hesitant to sell land that holds deep significance for their families, even if they are not living there themselves. One health care professional expressed feeling torn between selling or keeping their own family property after the 2022 flood: “We have a significant amount of property on top of a mountain. I wouldn’t want to sell it because my papa came from nothing. … His generation thought owning land was the greatest thing. … And for him to provide his children and his grandchildren and their great-grandchildren a plot of land that he worked and sweat and ultimately died to give us – people want to hold onto that.” She recognized that land was in great demand but couldn’t bring herself to sell what she owned. In cases like hers, higher grounds are owned locally but still remain unused. Moving toward higher ground, slowly Two years after the 2022 flood, major government funding for rebuilding still has not resulted in a significant number of homes. The state has planned seven communities on higher ground in eastern Kentucky that aim to house 665 new homes. As of early 2025, 14 houses had been completed. Progress on providing housing on higher ground is slow, and the need is great. In the meantime, when I conducted interviews during the summer and fall of 2024, many of the mobile home communities that were decimated in the 2022 flood had begun to fill back up. These were flood-risk areas, but there was simply no other place to go. Last week, I watched on Facebook a friend’s live video footage showing the waters creeping up the sides of the mobile homes in one of those very communities that had flooded in 2022. Another of my friends mused: “I don’t know who constructed all this, but they did an unjustly favor by not thinking how close these towns was to the river. Can’t anyone in Frankfort help us, or has it gone too far?” With hundreds more people now displaced by the most recent flood, the need for homes on higher grounds has only expanded, and the wait continues. Kristina P. Brant is an assistant professor of rural sociology at Penn State. This article is republished from The Conversation under a Creative Commons license. Read the original article. View the full article
-
Some good news for all the tired parents out there: Having and raising kids may unexpectedly boost your brain and protect your mind from aging over the long run, according to a new study published in the Proceedings of the National Academy of Sciences. The research from Rutgers Health and Yale University found parents developed higher brain-wide functional connectivity as they aged, especially in networks associated with movement and sensation, if they had more children. Those same networks typically show lower functional connectivity associated with greater age, meaning parenthood may protect against “functional brain aging.” The study findings apply to both moms and dads, which suggests the benefits come from parenthood caregiving, rather than pregnancy alone. This study looked at data from 37,000 adults including 19,964 females and 17,607 males from the UK Biobank, using the largest population-based neuroimaging data set to date to investigate the link between the number of children a parent had and age of brain function. It sheds new light on how adult human brains develop over the course of a lifespan, and is encouraging news for women who temporarily suffer from “Mommy brain,” or greater forgetfulness and difficulty concentrating during and after pregnancy. Overall, these results suggest that parenthood may be neuroprotective in later life, and are consistent with preliminary findings of previous studies that show “younger-looking” brain structures in animal parents. Check out the full study here. View the full article
-
We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication. Projectors are a great option for some evening entertainment inside and outdoors (once the weather warms up a bit), but they can be a little bulky. If you're looking for a smaller projector you can take with you to a party or a friend's house, consider the Nebula Capsule 3 GTV projector, currently $379.99 (originally $499.99), the lowest price it has been according to price-tracking tools. Nebula Capsule 3 GTV Projector Resolution: 1080p, Streaming: Google TV, Brightness: 200 lumens, Engine: DLP. $379.99 at Amazon $499.99 Save $120.00 Get Deal Get Deal $379.99 at Amazon $499.99 Save $120.00 The Nebula Capsule 3 came out this past September to an "excellent" review from PCMag. It has an 8-watt speaker, which is decent for a portable projector, but it won't fill a room with sound. Luckily, it does have an eARC port for a home theater setup. What sets this projector apart is its small size of 4.7 inches by 2.7 inches (height by diameter), which is about the size of a tall beer can. The image correction is fast, responsive, and works well—an important feature since you're likely going to be moving the projector often. The auto focus will adjust to the distance and angle of whatever surface you're casting it on. The brightness is 200 lumens, which is not a lot. You'll be limited to darker rooms to get a good image. The resolution is just 1080p with a maximum screen size of 120-inches, which is decent. This is enough for casual watching in a bedroom, but you won't get the same picture quality, colors, or blacks that home projectors offer. With Google TV, you'll be able to use Chromecast to mirror your phone on the screen, download apps, and watch free live TV. The battery life is up to two and a half hours, long enough to watch most movies. At its current price, it's even with the weaker Nebula Capsule Air, making it a great deal. View the full article
-
This post was written by Alison Green and published on Ask a Manager. A reader writes: Do you think it’s a red flag when a team in a smaller company immediately drops you into a group text on your personal phone upon hiring? The context is that I’m very happy in my mid-level position at my very not-toxic Fortune 100 company. I like the work and the people and while I wouldn’t hang out with a few of these folks for recreational coffee, we’re Work Friends. I’ve worked for smaller companies and have found them to always be cliquey and toxic and in each other’s business. Like high-stakes high school, where instead of losing head cheerleader, you lose your job. For me the common denominator red flag was that my toxic jobs had group chats. “We all get along” and “lols” and morning affirmation texts and more. My mother came from big time corporate America and is now working for small time companies. The last one she was at was so toxic and went so far south I legally can’t say what happened. She told me that from day one at her current job, she’s been in group texts with the “team.” More “morning guys!” etc. I’m not going to diss my mom’s new job because she’s so happy to be out of the other place, but I’m seeing signs already and I’m curious if you and/or the readers think group chats/texts are a red flag! I don’t think teams with group chats are inherently a red flag. I do think that when a team is dysfunctional, a group chat can often be something that reinforces that — because it’s used in ways that trample people’s boundaries (like unwelcome work texts during your off hours, or an expectation that you’ll participate in endless socializing that doesn’t interest you or actively distracts you, or a team that expects everyone to be “like family” in problematic ways). But that’s generally a reflection of other problematic norms on the team, not something fundamental to the group texts themselves. There are healthy, functional teams that have group chats! In those cases, I might theorize that they’re more likely to pop up in specific use cases, like when the work is emotionally difficult and the group chat is a place to blow off steam, or if all of the team is in a younger (read: going out) stage of life, or similar. But that’s not exclusively the case either. View the full article
-
Small and medium-sized businesses are often vulnerable to cyber attacks owing to limited infrastructure. For instance, they use free cybersecurity solutions due to financial constraints or are less prepared to respond to a cyber incident. This often leaves them prone to several attacks that advanced solutions may catch. No wonder, nearly half of the cyber incidents impact small businesses. And companies with 100 employees or less receive 350% more social engineering attacks than large enterprises. The financial repercussions of such attacks is huge with 60% of SMEs going out of business within six months of a cyber attack. Threats like phishing, ransomware, and malware compromise sensitive data and disrupt business operations. To mitigate these cyber risks, small businesses must implement robust network security solutions. In this post, we will share all the information you need to choose a fitting network security solution to secure your business from advanced cyber attacks. The Need for Network Security In today’s digital landscape, cybersecurity is becoming increasingly important as small businesses are the prime target for cybercriminals. Every customer record, transaction, or confidential information is at risk of being compromised. Despite these risks, small businesses often ignore the significance of investing in robust cybersecurity solutions. The common myth is that small businesses are too small to be targeted. But here’s an alarming fact一a 2024 research report stated that in 2024 94% of small businesses faced cyber attacks. The financial and reputational damage that follows a cyber attack underscores the critical need for robust network security solutions to protect confidential data and uphold business continuity. Network security involves applying the best practices to all system components, namely devices, applications, and protocols to keep business data safe from attackers. How to Choose a Suitable Network Security Solution for Your Business In this section, we will discuss the top factors to consider when choosing an ideal network security solution and then compare the top five network security vendors: Cisco, Check Point, Palo Alto, Fortinet, and CrowdStrike. Advanced Threat Protection Capabilities The network security solution you opt for should offer comprehensive threat protection. It should be equipped with advanced features to autonomously predict and prevent attacks Features like multi-layered security, including firewalls, intrusion prevention systems (IPS), deep packet inspection, web filtering, and intrusion prevention features are necessary to steer clear of ransomware attacks, trojans, and other threats. Choose a platform with advanced threat detection for protection against evolving cyber threats. Ease of Deployment Small businesses often do not have a full-fledged IT team or advanced security setup, making them the top target for cybercriminals. Hence, it is critical to look for a network security solution that has an intuitive interface, cloud-based management, and an automated threat response system. This will streamline the security operations while safeguarding your business from the evolving threats. Scalability A scalable network security solution can effortlessly anticipate changes in the digital landscape and proactively address security risks before they cause damage. As the business grows, so do its security needs. Hence, choose a solution that can seamlessly scale with your business’s security needs without compromising on the network speed and performance. Integration Capabilities A tool possessing exceptional integration capabilities can effectively consolidate data from various security tools, allowing more comprehensive analysis. The unified approach allows security teams to spot patterns and anomalies, thus ensuring faster threat identification. The network security solution you choose must integrate seamlessly with your existing IT infrastructure. It must support cloud applications, remote work setups, and third-party security solutions. Customer Support Small businesses need additional support with implementing security best practices, especially in the absence of a dedicated IT and security team. Look for a network security vendor that offers 24/7 support to guide your team and monitor your security alerts. This will ensure a quick and efficient incident response. The Best Network Security Solutions Compared 1. Cisco Cisco, the American multinational, offers a network security solution that combines multiple layers of defense in the network and at the edge. Each security layer implements policies, allowing only authorized users to gain access to the network resources. Cisco’s network security solution offers visibility and control over encrypted traffic, reducing the risk of attacks. It helps businesses respond to threats across networks, clouds, endpoints, and applications. Key Features Flexible network protection to secure users, networks, workloads, and applications. Improved security resilience through tools like firewalls, multifactor identification, and endpoint protection to help small businesses detect threats quickly. Zero-trust access for controlled access from branch offices to headquarters. Built-for-cloud-security solution to ensure that the entire infrastructure, from the edge to in-house service, is secure. 2. Check Point Check Point is the global leader in cybersecurity solutions, known for its multi-layered approach to threat detection and prevention. Its network security solution caters to businesses of all sizes, offering a comprehensive view of various security threats like ransomware, phishing, and zero-day attacks. The advanced network security solution simplifies security for small businesses without any impact on network performance. Check Point helps small businesses strengthen their security posture without the need for a dedicated IT or security team. Key Features: Next-generation firewalls (NGFWs) for deep packet inspection, intrusion prevention, and application control for securing the network. Zero-trust security ensures that only verified users and devices gain access to the network. As such, its network security solution reduces insider threats and unauthorized access. Automated threat intelligence for real-time analytics and AI-powered threat detection. This minimizes response time and prevents attacks. CloudGuard solution offers cloud-based protection to secure SaaS applications and cloud environments. There, this solution is ideal for remote work environments. A User-friendly interface simplifies monitoring and policy enforcement, making it a solid option for SMEs with limited IT infrastructure and teams looking for an advanced network security solution. SandBlast threat emulation technology to detect and prevent malware before it infiltrates the entire network. 3. Palo Alto Palo Alto Networks is known for offering advanced network security solutions that protect businesses from evolving threats in the digital landscape. The platform is powered by next-generation firewalls (NGFWs) that leverage AI for threat detection and deep learning to prevent zero-day attacks, malware, and other threats. Key Features Next-generation firewalls (NGFWs) prevent threats and allow deep packet inspection and advanced malware protection. Prisma Cloud ensures comprehensive cloud security for hybrid and multi-cloud environments. Zero trust security for strict identity verification and least-privilege access to reduce the attack surface. Advanced threat intelligence uses machine learning and automation to spot and respond to cyber threats. 4. Fortinet Fortinet is a global cybersecurity company that offers integrated and automated network security services for businesses of various sizes. Their flagship product FortiGate next-generation firewalls provide AI-enabled threat detection, intrusion prevention, and malware protection. Their solutions offer seamless security across networks, endpoints, and cloud environments. Key Features Next-generation firewalls (NGFWs) for AI-enabled threat detection, deep packet inspection, and intrusion prevention. Fortinet security fabric for seamless protection across networks, endpoints, and varied environments. Advanced endpoint detection and response (EDR) for automated threat mitigation. Zero trust network access (ZTNA) to secure access control and prevent unauthorized entry. 5. CrowdStrike CrowdStrike is a leading name in the cybersecurity industry, specializing in cloud-native endpoint and network security. Its Falcon platform offers AI-powered threat detection, real-time response, and proactive threat hunting to protect businesses from cyber threats and attacks. The platform ensures comprehensive security and rapid breach prevention. It delivers high-performance and scalable security for modern digital environments. Key Features AI-powered threat detection to identify cyber threats in real-time. Next-generation antivirus (NGAV) prevents malware and ransomware with advanced security measures. Zero trust security ensures strict access control and verification for network security. Extended detection and response (XDR) unifies security across multiple endpoints and workloads for enhanced threat visibility. Summing Up Robust network security is crucial to protect sensitive data, prevent cybersecurity attacks, and ensure smooth business operations. With the rise in cybersecurity threats and attacks, businesses need to implement several security measures like firewalls, AI-driven threat detection, and cloud-based protection. A suitable network security solution will offer comprehensive threat prevention, scalability, and ease of integration. Hence, businesses must do their research and choose a solution based on the industry risks, compliance requirements, and infrastructure. We are sure the information shared in this post will help you make an informed security decision to mitigate the risks, safeguard business assets, and ensure long-term business resilience. Image: Envato This article, "5 Network Security Solutions to Protect Your Business" was first published on Small Business Trends View the full article
-
Small and medium-sized businesses are often vulnerable to cyber attacks owing to limited infrastructure. For instance, they use free cybersecurity solutions due to financial constraints or are less prepared to respond to a cyber incident. This often leaves them prone to several attacks that advanced solutions may catch. No wonder, nearly half of the cyber incidents impact small businesses. And companies with 100 employees or less receive 350% more social engineering attacks than large enterprises. The financial repercussions of such attacks is huge with 60% of SMEs going out of business within six months of a cyber attack. Threats like phishing, ransomware, and malware compromise sensitive data and disrupt business operations. To mitigate these cyber risks, small businesses must implement robust network security solutions. In this post, we will share all the information you need to choose a fitting network security solution to secure your business from advanced cyber attacks. The Need for Network Security In today’s digital landscape, cybersecurity is becoming increasingly important as small businesses are the prime target for cybercriminals. Every customer record, transaction, or confidential information is at risk of being compromised. Despite these risks, small businesses often ignore the significance of investing in robust cybersecurity solutions. The common myth is that small businesses are too small to be targeted. But here’s an alarming fact一a 2024 research report stated that in 2024 94% of small businesses faced cyber attacks. The financial and reputational damage that follows a cyber attack underscores the critical need for robust network security solutions to protect confidential data and uphold business continuity. Network security involves applying the best practices to all system components, namely devices, applications, and protocols to keep business data safe from attackers. How to Choose a Suitable Network Security Solution for Your Business In this section, we will discuss the top factors to consider when choosing an ideal network security solution and then compare the top five network security vendors: Cisco, Check Point, Palo Alto, Fortinet, and CrowdStrike. Advanced Threat Protection Capabilities The network security solution you opt for should offer comprehensive threat protection. It should be equipped with advanced features to autonomously predict and prevent attacks Features like multi-layered security, including firewalls, intrusion prevention systems (IPS), deep packet inspection, web filtering, and intrusion prevention features are necessary to steer clear of ransomware attacks, trojans, and other threats. Choose a platform with advanced threat detection for protection against evolving cyber threats. Ease of Deployment Small businesses often do not have a full-fledged IT team or advanced security setup, making them the top target for cybercriminals. Hence, it is critical to look for a network security solution that has an intuitive interface, cloud-based management, and an automated threat response system. This will streamline the security operations while safeguarding your business from the evolving threats. Scalability A scalable network security solution can effortlessly anticipate changes in the digital landscape and proactively address security risks before they cause damage. As the business grows, so do its security needs. Hence, choose a solution that can seamlessly scale with your business’s security needs without compromising on the network speed and performance. Integration Capabilities A tool possessing exceptional integration capabilities can effectively consolidate data from various security tools, allowing more comprehensive analysis. The unified approach allows security teams to spot patterns and anomalies, thus ensuring faster threat identification. The network security solution you choose must integrate seamlessly with your existing IT infrastructure. It must support cloud applications, remote work setups, and third-party security solutions. Customer Support Small businesses need additional support with implementing security best practices, especially in the absence of a dedicated IT and security team. Look for a network security vendor that offers 24/7 support to guide your team and monitor your security alerts. This will ensure a quick and efficient incident response. The Best Network Security Solutions Compared 1. Cisco Cisco, the American multinational, offers a network security solution that combines multiple layers of defense in the network and at the edge. Each security layer implements policies, allowing only authorized users to gain access to the network resources. Cisco’s network security solution offers visibility and control over encrypted traffic, reducing the risk of attacks. It helps businesses respond to threats across networks, clouds, endpoints, and applications. Key Features Flexible network protection to secure users, networks, workloads, and applications. Improved security resilience through tools like firewalls, multifactor identification, and endpoint protection to help small businesses detect threats quickly. Zero-trust access for controlled access from branch offices to headquarters. Built-for-cloud-security solution to ensure that the entire infrastructure, from the edge to in-house service, is secure. 2. Check Point Check Point is the global leader in cybersecurity solutions, known for its multi-layered approach to threat detection and prevention. Its network security solution caters to businesses of all sizes, offering a comprehensive view of various security threats like ransomware, phishing, and zero-day attacks. The advanced network security solution simplifies security for small businesses without any impact on network performance. Check Point helps small businesses strengthen their security posture without the need for a dedicated IT or security team. Key Features: Next-generation firewalls (NGFWs) for deep packet inspection, intrusion prevention, and application control for securing the network. Zero-trust security ensures that only verified users and devices gain access to the network. As such, its network security solution reduces insider threats and unauthorized access. Automated threat intelligence for real-time analytics and AI-powered threat detection. This minimizes response time and prevents attacks. CloudGuard solution offers cloud-based protection to secure SaaS applications and cloud environments. There, this solution is ideal for remote work environments. A User-friendly interface simplifies monitoring and policy enforcement, making it a solid option for SMEs with limited IT infrastructure and teams looking for an advanced network security solution. SandBlast threat emulation technology to detect and prevent malware before it infiltrates the entire network. 3. Palo Alto Palo Alto Networks is known for offering advanced network security solutions that protect businesses from evolving threats in the digital landscape. The platform is powered by next-generation firewalls (NGFWs) that leverage AI for threat detection and deep learning to prevent zero-day attacks, malware, and other threats. Key Features Next-generation firewalls (NGFWs) prevent threats and allow deep packet inspection and advanced malware protection. Prisma Cloud ensures comprehensive cloud security for hybrid and multi-cloud environments. Zero trust security for strict identity verification and least-privilege access to reduce the attack surface. Advanced threat intelligence uses machine learning and automation to spot and respond to cyber threats. 4. Fortinet Fortinet is a global cybersecurity company that offers integrated and automated network security services for businesses of various sizes. Their flagship product FortiGate next-generation firewalls provide AI-enabled threat detection, intrusion prevention, and malware protection. Their solutions offer seamless security across networks, endpoints, and cloud environments. Key Features Next-generation firewalls (NGFWs) for AI-enabled threat detection, deep packet inspection, and intrusion prevention. Fortinet security fabric for seamless protection across networks, endpoints, and varied environments. Advanced endpoint detection and response (EDR) for automated threat mitigation. Zero trust network access (ZTNA) to secure access control and prevent unauthorized entry. 5. CrowdStrike CrowdStrike is a leading name in the cybersecurity industry, specializing in cloud-native endpoint and network security. Its Falcon platform offers AI-powered threat detection, real-time response, and proactive threat hunting to protect businesses from cyber threats and attacks. The platform ensures comprehensive security and rapid breach prevention. It delivers high-performance and scalable security for modern digital environments. Key Features AI-powered threat detection to identify cyber threats in real-time. Next-generation antivirus (NGAV) prevents malware and ransomware with advanced security measures. Zero trust security ensures strict access control and verification for network security. Extended detection and response (XDR) unifies security across multiple endpoints and workloads for enhanced threat visibility. Summing Up Robust network security is crucial to protect sensitive data, prevent cybersecurity attacks, and ensure smooth business operations. With the rise in cybersecurity threats and attacks, businesses need to implement several security measures like firewalls, AI-driven threat detection, and cloud-based protection. A suitable network security solution will offer comprehensive threat prevention, scalability, and ease of integration. Hence, businesses must do their research and choose a solution based on the industry risks, compliance requirements, and infrastructure. We are sure the information shared in this post will help you make an informed security decision to mitigate the risks, safeguard business assets, and ensure long-term business resilience. Image: Envato This article, "5 Network Security Solutions to Protect Your Business" was first published on Small Business Trends View the full article
-
As Tesla shares continue to decline amid CEO Elon Musk’s controversial behavior and involvement in politics, one of the nation’s largest labor unions is worried about just how low the stock could go. On Thursday, American Federation of Teachers (AFT) president Randi Weingarten sent a letter to the CEOs of six major asset management firms, outlining the union’s concerns over Tesla’s recent stock struggles and urging asset managers to reassess investments in the EV maker. Weingarten pointed to Tesla’s stock price dropping to as low as $290.80 from a high of $489, as well as the company’s market capitalization falling below $1 trillion. She argued that Tesla’s latest financial disclosures should raise red flags, citing missed profit margin expectations and rising cost pressures. “These are not isolated incidents but rather a troubling pattern that suggests Tesla’s pricing power is eroding, leaving it vulnerable to market fluctuations and increased competition,” Weingarten wrote. The letter was sent to Larry Fink of BlackRock, Abigail Johnson of Fidelity, Ronald O’Hanley of State Street, Thasunda Duckett of TIAA, Robert Sharps of T. Rowe Price, and Salim Ramji of Vanguard. Musk and Tesla’s board were copied on the letter as well, reported the the New York Times. Fast Company reached out to Tesla for comment. Weingarten also detailed Tesla’s struggles in Europe, noting a 60% decline in sales in Germany—Europe’s largest auto market. Additionally, she pointed to growing competition in the EV charging sector, particularly with the launch of IONNA, a rival charging network backed by Mercedes, BMW, General Motors, Stellantis, Honda, Hyundai, Kia, and, most recently, Toyota. Musk’s Divided Attention Tesla’s financial troubles come after the company received shareholder approval for Musk’s $56 billion pay package, Weingarten noted. When gathering shareholder approval for the proposal, Tesla board chair Robyn Denholm wrote, “Fairness and respect require that we honor the collective commitment we made to Elon—a commitment that was, and fundamentally still is, about retaining Elon’s attention and motivating him to focus on achieving astonishing growth for our company.” Following the pay package vote, Musk has since established himself as a close adviser to President Trump and is now moving to slash the size of the federal workforce via his Department of Government Efficiency (DOGE). The Trump administration has also announced a halt to federal funding for the expansion of highway EV charging infrastructure, according to Weingarten’s letter. She also pointed to a decline in Tesla’s brand perception, citing data from the American EV Jobs Alliance. According to the organization, “EV swing consumers”—those open to purchasing an EV once costs drop—hold negative views of Musk, further complicating Tesla’s ability to expand its customer base. Weingarten ended her letter by calling for asset managers to take action. “Given these mounting concerns and the potential material impact on pension fund portfolios, I would appreciate a response detailing your firm’s assessment of Tesla’s current valuation and the steps you are taking to protect AFT members who are your clients and beneficiaries,” she wrote. The AFT represents 1.8 million education, healthcare, and public sector workers. According to a union press release, AFT members’ deferred wages are invested in pension funds totaling an estimated $4 trillion, with a significant portion tied to Tesla shares. Additionally, teachers and nurses have billions of dollars in their own savings invested in direct contribution pension plans managed by the asset firms addressed in the letter. Shares in Tesla (Nasdaq: TSLA) are down about 23% year to date. View the full article
-
We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication. While I was poking around online shopping this week, I noticed a great deal: Amazon has the Dyson V8 Plus Cordless Vacuum marked down to $349.99, a 26% discount off its normal price of $469.99. A little over a quarter off doesn't usually move me, as far as sales go, but on something as expensive as a Dyson that's a solid deal. The spring and summer get dusty and allergen-y, so a strong vacuum is always a smart upgrade to make before the sneezy season hits. Dyson V8 Plus Cordless Vacuum (Silver/Nickel) $349.99 at Amazon /images/amazon-prime.svg $469.99 Save $120.00 Get Deal Get Deal $349.99 at Amazon /images/amazon-prime.svg $469.99 Save $120.00 I have loved every Dyson vacuum (and, frankly, all Dyson products) I've ever used and everyone I know with one feels the same, but before I recommended this sale confidently, I wanted to check around other parts of the internet to make sure I wasn't missing something about Amazon's markdown. I was missing something: This thing is on sale everywhere, which is great news if you have a membership or general brand loyalty to one store or another. The $349.99 price point on the Dyson V8 Plus is reflected not only on Amazon, but at the following retailers: Best Buy Walmart Williams Sonoma Chewy Wayfair Crate & Barrel Bloomingdale's P.C. Richard & Son Basically, wherever you're most likely to shop, you can find the cordless vac on sale. Take it as a sign you should finally upgrade your hoover. Dyson V8 Plus product detailsWhy upgrade to this one, though, beyond the fact that it's on sale? It runs for up to 40 minutes on a single charge but is still light enough that it's not a hassle to carry around, weighing in at 5.6 pounds. It will run for a shorter amount if you turn on MAX mode, but having access to an even more powerful suction when you're facing a major mess is worth it. Besides being a traditional stick vacuum, it also transforms into a handheld device to reach difficult spots. It docks to your wall to charge and stay out of your way, has attachments to reach high spaces, empties out with the push of a button, and makes quick work of dust, hair, and fur. Dyson really does make a quality vacuum and this one, with its low price, is a solid entry point if you've been looking into getting one. View the full article
-
When it comes to stock markets around the world, this year has clearly not been “America First.” The U.S. stock market has risen in 2025 and isn’t far from its all-time high set last week. But it’s climbed less than stock indexes in Mexico City, Paris and Hong Kong. The difference in performance has been so stark that an index of stocks from 22 of 23 developed economies around the world, excluding the United States, has trounced the S&P 500: a 7.5% rise through Monday versus 1.7% for Wall Street’s benchmark. The split in performance has many causes, and if it continues, it would mark a sharp reversal following years of U.S. exceptionalism. The U.S. stock market has been the clear winner for so long among global markets in large part because the U.S. economy’s growth has been so much stronger and more stable than nearly anywhere else. But the steep divide means many other stock markets now don’t look as pricey as Wall Street, where critics say prices for many stocks rose too quickly relative to their companies’ admittedly booming profits. And the Big Tech stocks that have accounted for more and more of the U.S. stock market as they kept soaring look particularly expensive to some. Morgan Stanley strategist Michael Wilson said many of his clients in recent weeks have been asking if they should be focusing more outside the United States. That includes tech stocks from China, where an upstart called DeepSeek rocked the artificial-intelligence industry by saying it had developed a large language model that could compete with big U.S. rivals but at a much lower cost. Central banks in other countries also seem much more willing to cut interest rates, a move that often tends to boost stock prices there. The European Central Bank eased rates in January, for example. A day later, the Federal Reserve in Washington said it would hold rates steady, and minutes from that meeting indicate U.S. policy makers may not move rates for a while given worries about how President Donald Trump’s tariffs and other policies could keep upward pressure on inflation. The rise in the U.S. dollar’s value against other currencies has also helped big exporters from other countries. Some big U.S. companies, meanwhile, have already begun cutting their forecasts for upcoming profits in part because of the bite that a stronger dollar will take from their results. At Amazon, shifting currency values erased about $900 million of its revenue during the latest quarter, which totaled $187.8 billion, for example. The tech giant said the pain will likely continue, and it forecasted an “unusually large, unfavorable impact of approximately $2.1 billion” for its revenue in the current quarter from currency shifts. Professional investors have noticed. It’s still popular among global fund managers to bet on Apple, Nvidia, and the other five Big Tech U.S. stocks that make up the group known as the “Magnificent Seven.” But the recent outperformance for stocks outside the United States may show a “peak in investor conviction of U.S. exceptionalism,” Bank of America strategist Michael Hartnett wrote in a recent BofA Global Research report. —Stan Choe, Associated Press business writer View the full article
-
We may earn a commission from links on this page. As we’ve discussed before, there are three ways to hold onto a barbell if you’re worried your grip is going to slip. You can use straps; you can face your palms in different directions (mixed grip); or you can hook your thumb underneath your fingers, a technique known as hook grip. A hook grip is more secure than mixed, and it's essential for lifts like snatches and cleans where mixed grip isn't an option. Yes, it hurts. Yes, you'll get used to it. I am happy to report that, after six years of training and competing in olympic weightlifting (where hook grip is neither feared nor debated, but simply a part of life), I now believe that hook grip is not nearly as painful as it is reputed to be. And yes, I am the person who wrote in an earlier article that hook grip “hurts like hell.” This is partly because I’ve gotten used to it, but it’s also partly because I used to do it wrong. So here are some tips for learning how to get comfortable with hook grip. Use a thinner barThis is a tip for everyone, but especially people with small hands (including most women). You'll find a wide variety of barbells in most gyms, and they aren't all the same diameter at the handle. Some are thick and sturdy; these are hard to grip, and may be reserved for squats or bench press, where that doesn't matter as much. Bars made for deadlifts or for Olympic weightlifting will be thinner, making it easier to wrap your fingers around. So make sure that the bar you're trying to hook grip isn't a super thick one. If you have larger hands, any normal barbell should be fine—that usually means a 28 millimeter handle. Deadlift bars tend to be a little thinner at 27 millimeters, and women's Olympic weightlifting bars are the thinnest common bar, at 25 millimeters. If you've had trouble trying to hook grip on a regular bar, try a women's bar and see if you can get the technique to click. I used to think I "couldn't" hook grip a regular bar, but after I learned to hook grip properly with a women's bar, I found that I was able to hook a men's bar without too much trouble. Lay your thumb so it is parallel to the barA common mistake—and a thing that makes hook grip hurt a lot more than it needs to—is placing your thumb on the bar incorrectly. Don’t think of your thumb as wrapping underneath the bar; it’s not like a pincer opposing your fingers. You also don't want to grip the bar with your thumb, as if your thumb's job were to squeeze the bar. The purpose of the thumb, in a hook grip, is to provide a sort of roadblock to stop things from slipping. I took some photos of myself setting my hook grip on a bar, so you can see exactly how I do it. (I'm sure every lifter has their own idiosyncrasies, but mine should be a solid example to convey the basics.) Here's how I set my grip: First I find my hand placement on the bar (usually by lining up my hand with the knurling or the rings). I press the web of my thumb into the bar, which allows me to reach my thumb away from my body, and bring the side of my thumb into contact with the bar. When I bring the rest of my hand back into place, my middle finger crosses my thumbnail perpendicularly. (If you can only remember one checkpoint for whether you're doing it right, remember this.) I loosely wrap the rest of my fingers around the bar. I don't have to squeeze—the hook locks everything into place. Credit: Beth Skwarecki The exact positions will depend on the size and shape of your hands, and you may find yourself grasping the bar slightly differently for a wide grip (snatch grip) versus a closer grip. But make sure that your thumb goes more or less along the bar, parallel to its length. (It may help to think about pointing your thumb toward your pinky.) You do not want to jam your thumb under as many fingers as possible, nor should you try to wrap it deeply around the bar. If you get a pain in your thumb knuckle, where your thumb meets your palm, this is likely what you’re doing wrong. PracticeWill it still hurt? Your first time going heavy, yeah. But you'll get used to it more quickly than you think. If you commit to making hook grip work, and using it as often as possible, the adaptation process only takes about two weeks. If any pain, bruises, or calluses develop, they should be mild, roughly parallel to the length of your thumb, and on the side of your thumb rather than in the middle of the thumb pad or on the knuckle. During this time, hook grip everything that you can. If that means you're only hook gripping your deadlift warmups, but once there's more than 135 pounds on the bar you can't stand it, that's fine for that day. Next time you do deadlifts, you'll probably be able to hook 135 just fine, and maybe you have to switch back to your old grip at 225. You get the idea. Before long, you'll be hook gripping everything. To get more practice, hook grip every exercise you can (rows, etc) just for the sake of practice. Once you're used to hook grip, the pain won't be an issue, but I'd be lying to say your thumbs will always feel great. If I'm doing an exercise for multiple reps, I'll use straps rather than hook grip 10 heavy reps in a row. Some lifters like to tape their thumbs. This provides a little compression, so the pressure doesn't hurt as much, and it also prevents the knurling from digging into your skin. You can use regular athletic tape if you leave a cutout for your knuckle, but it's more common these days to use a stretchy, grippy thumb tape like this over your whole thumb. Warm Body Cold Mind Premium Lifting Thumb Tape $15.99 at Amazon /images/amazon-prime.svg Shop Now Shop Now $15.99 at Amazon /images/amazon-prime.svg View the full article