A young man wades through a flooded street in Kochi, Kerala state, India. According to reports, the region is on a high alert with schools and offices been closed due to the rising water levels of Periyar river after the gates of the Idukki reservoir were opened. The Indian state of Kerala has been hit by heavy rains that caused floods and reportedly killed at least 20 people.  EPA

Deadly flash floods in Kerala - in pictures



Read more: Deadly flash floods in Kerala trigger US travel alert

Disclaimer

Director: Alfonso Cuaron 

Stars: Cate Blanchett, Kevin Kline, Lesley Manville 

Rating: 4/5

Other ways to buy used products in the UAE

UAE insurance firm Al Wathba National Insurance Company (AWNIC) last year launched an e-commerce website with a facility enabling users to buy car wrecks.

Bidders and potential buyers register on the online salvage car auction portal to view vehicles, review condition reports, or arrange physical surveys, and then start bidding for motors they plan to restore or harvest for parts.

Physical salvage car auctions are a common method for insurers around the world to move on heavily damaged vehicles, but AWNIC is one of the few UAE insurers to offer such services online.

For cars and less sizeable items such as bicycles and furniture, Dubizzle is arguably the best-known marketplace for pre-loved.

Founded in 2005, in recent years it has been joined by a plethora of Facebook community pages for shifting used goods, including Abu Dhabi Marketplace, Flea Market UAE and Arabian Ranches Souq Market while sites such as The Luxury Closet and Riot deal largely in second-hand fashion.

At the high-end of the pre-used spectrum, resellers such as Timepiece360.ae, WatchBox Middle East and Watches Market Dubai deal in authenticated second-hand luxury timepieces from brands such as Rolex, Hublot and Tag Heuer, with a warranty.

COMPANY PROFILE
Name: Almnssa
Started: August 2020
Founder: Areej Selmi
Based: Gaza
Sectors: Internet, e-commerce
Investments: Grants/private funding
Company%20Profile
%3Cp%3E%3Cstrong%3ECompany%20name%3A%20%3C%2Fstrong%3ENamara%0D%3Cbr%3E%3Cstrong%3EStarted%3A%20%3C%2Fstrong%3EJune%202022%0D%3Cbr%3E%3Cstrong%3EFounder%3A%20%3C%2Fstrong%3EMohammed%20Alnamara%0D%3Cbr%3E%3Cstrong%3EBased%3A%20%3C%2Fstrong%3EDubai%20%0D%3Cbr%3E%3Cstrong%3ESector%3A%20%3C%2Fstrong%3EMicrofinance%0D%3Cbr%3E%3Cstrong%3ECurrent%20number%20of%20staff%3A%20%3C%2Fstrong%3E16%0D%3Cbr%3E%3Cstrong%3EInvestment%20stage%3A%20%3C%2Fstrong%3ESeries%20A%0D%3Cbr%3E%3Cstrong%3EInvestors%3A%20%3C%2Fstrong%3EFamily%20offices%0D%3Cbr%3E%3C%2Fp%3E%0A
Wicked
Director: Jon M Chu
Stars: Cynthia Erivo, Ariana Grande, Jonathan Bailey
Rating: 4/5
Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.

How%20I%20connect%20with%20my%20kids%20when%20working%20or%20travelling
%3Cp%3E%0D%3Cstrong%3ELittle%20notes%3A%20%3C%2Fstrong%3EMy%20girls%20often%20find%20a%20letter%20from%20me%2C%20with%20a%20joke%2C%20task%20or%20some%20instructions%20for%20the%20afternoon%2C%20and%20saying%20what%20I%E2%80%99m%20excited%20for%20when%20I%20get%20home.%0D%3Cbr%3E%3Cstrong%3EPhone%20call%20check-in%3A%20%3C%2Fstrong%3EMy%20kids%20know%20that%20at%203.30pm%20I%E2%80%99ll%20be%20free%20for%20a%20quick%20chat.%0D%3Cbr%3E%3Cstrong%3EHighs%20and%20lows%3A%20%3C%2Fstrong%3EInstead%20of%20a%20%E2%80%9Chow%20was%20your%20day%3F%E2%80%9D%2C%20at%20dinner%20or%20at%20bathtime%20we%20share%20three%20highlights%3B%20one%20thing%20that%20didn%E2%80%99t%20go%20so%20well%3B%20and%20something%20we%E2%80%99re%20looking%20forward%20to.%0D%3Cbr%3E%3Cstrong%3EI%20start%2C%20you%20next%3A%20%3C%2Fstrong%3EIn%20the%20morning%2C%20I%20often%20start%20a%20little%20Lego%20project%20or%20drawing%2C%20and%20ask%20them%20to%20work%20on%20it%20while%20I%E2%80%99m%20gone%2C%20then%20we%E2%80%99ll%20finish%20it%20together.%0D%3Cbr%3E%3Cstrong%3EBedtime%20connection%3A%20%3C%2Fstrong%3EWake%20up%20and%20sleep%20time%20are%20important%20moments.%20A%20snuggle%2C%20some%20proud%20words%2C%20listening%2C%20a%20story.%20I%20can%E2%80%99t%20be%20there%20every%20night%2C%20but%20I%20can%20start%20the%20day%20with%20them.%0D%3Cbr%3E%3Cstrong%3EUndivided%20attention%3A%20%3C%2Fstrong%3EPutting%20the%20phone%20away%20when%20I%20get%20home%20often%20means%20sitting%20in%20the%20car%20to%20send%20a%20last%20email%2C%20but%20leaving%20it%20out%20of%20sight%20between%20home%20time%20and%20bedtime%20means%20you%20can%20connect%20properly.%0D%3Cbr%3E%3Cstrong%3EDemystify%2C%20don%E2%80%99t%20demonise%20your%20job%3A%20%3C%2Fstrong%3EHelp%20them%20understand%20what%20you%20do%2C%20where%20and%20why.%20Show%20them%20your%20workplace%20if%20you%20can%2C%20then%20it%E2%80%99s%20not%20so%20abstract%20when%20you%E2%80%99re%20away%20-%20they%E2%80%99ll%20picture%20you%20there.%20Invite%20them%20into%20your%20%E2%80%9Cother%E2%80%9D%20world%20so%20they%20know%20more%20about%20the%20different%20roles%20you%20have.%3C%2Fp%3E%0A