ONCE UPON A TIME IN GAZA
Starring: Nader Abd Alhay, Majd Eid, Ramzi Maqdisi
Directors: Tarzan and Arab Nasser
Rating: 4.5/5
About Housecall
Date started: July 2020
Founders: Omar and Humaid Alzaabi
Based: Abu Dhabi
Sector: HealthTech
# of staff: 10
Funding to date: Self-funded
The Settlers
Director: Louis Theroux
Starring: Daniella Weiss, Ari Abramowitz
Rating: 5/5
88 Video's most popular rentals
Avengers 3: Infinity War: an American superhero film released in 2018 and based on the Marvel Comics story.
Sholay: a 1975 Indian action-adventure film. It follows the adventures of two criminals hired by police to catch a vagabond. The film was panned on release but is now considered a classic.
Lucifer: is a 2019 Malayalam-language action film. It dives into the gritty world of Kerala’s politics and has become one of the highest-grossing Malayalam films of all time.
MISSION: IMPOSSIBLE – FINAL RECKONING
Director: Christopher McQuarrie
Starring: Tom Cruise, Hayley Atwell, Simon Pegg
Rating: 4/5
ICC Women's T20 World Cup Asia Qualifier 2025, Thailand
UAE fixtures
May 9, v Malaysia
May 10, v Qatar
May 13, v Malaysia
May 15, v Qatar
May 18 and 19, semi-finals
May 20, final
UK-EU trade at a glance
EU fishing vessels guaranteed access to UK waters for 12 years
Co-operation on security initiatives and procurement of defence products
Youth experience scheme to work, study or volunteer in UK and EU countries
Smoother border management with use of e-gates
Cutting red tape on import and export of food
More from Neighbourhood Watch
Soldier F
“I was in complete disgust at the fact that only one person was to be charged for Bloody Sunday.
“Somebody later said to me, 'you just watch - they'll drop the charge against him'. And sure enough, the charges against Soldier F would go on to be dropped.
“It's pretty hard to think that 50 years on, the State is still covering up for what happened on Bloody Sunday.”
Jimmy Duddy, nephew of John Johnson
Skewed figures
In the village of Mevagissey in southwest England the housing stock has doubled in the last century while the number of residents is half the historic high. The village's Neighbourhood Development Plan states that 26% of homes are holiday retreats. Prices are high, averaging around £300,000, £50,000 more than the Cornish average of £250,000. The local average wage is £15,458.
How to join and use Abu Dhabi’s public libraries
• There are six libraries in Abu Dhabi emirate run by the Department of Culture and Tourism, including one in Al Ain and Al Dhafra.
• Libraries are free to visit and visitors can consult books, use online resources and study there. Most are open from 8am to 8pm on weekdays, closed on Fridays and have variable hours on Saturdays, except for Qasr Al Watan which is open from 10am to 8pm every day.
• In order to borrow books, visitors must join the service by providing a passport photograph, Emirates ID and a refundable deposit of Dh400. Members can borrow five books for three weeks, all of which are renewable up to two times online.
• If users do not wish to pay the fee, they can still use the library’s electronic resources for free by simply registering on the website. Once registered, a username and password is provided, allowing remote access.
• For more information visit the library network's website.
The National's picks
4.35pm: Tilal Al Khalediah
5.10pm: Continous
5.45pm: Raging Torrent
6.20pm: West Acre
7pm: Flood Zone
7.40pm: Straight No Chaser
8.15pm: Romantic Warrior
8.50pm: Calandogan
9.30pm: Forever Young
Company Profile:
Name: The Protein Bakeshop
Date of start: 2013
Founders: Rashi Chowdhary and Saad Umerani
Based: Dubai
Size, number of employees: 12
Funding/investors: $400,000 (2018)
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.