Hospice Registered Nurse        
MultiLocation, At Community Health Network, we attract experienced Home Care and Home Hospice RN's who love their work, but want more options in their work life. Community Health Network can fit your career into your life by providing you with the choices of when and where to work and the flexibiity to change that with life's demands. We are a nursing Staffing Agency specializing in Hospice and Home Care for ove
          ASAHI INDIA GLASS LTD ANNOUNCES UNAUDITED FINANCIAL RESULTS FOR THE FIRST QUARTER ENDED 30TH JUNE, 2017        
by Shrutee K/DNS

New Delhi – AIS (Asahi India Glass Ltd.), India’s leading integrated glass Company announced its unaudited financial results for the first quarter ended    30th June, 2017 at its Board Meeting.

The consolidated financial performance highlights for the quarter ended 30th June, 2017 are as follows -

Sales (inclusive of Excise Duty) at Rs. 670.98 crores, reflected an increase of 8.60% over the previous period (Rs. 617.84 crores).

Operating EBIDTA i.e. Operating Earnings before Interest, Depreciation, Taxes and Amortisation was recorded at Rs. 109.85 crores registering an increase of 7.89% over the corresponding figure of Rs. 101.82 crores for the previous period.

Cash profit increased by 19.94% from Rs. 66.65 crores in Q4 FY 2016 to Rs. 79.94 crores in Q4 FY 2017.

PBT increased by 25.67% from Rs. 46.08 crores in Q1 FY2017 to Rs. 57.91 crores in Q1 FY2018.

PAT increased by 38.33% from Rs. 28.33 crores in Q1 FY2017 to Rs. 39.19 crores in Q1 FY2018.

The table below gives the details of the financial performance both on standalone and consolidated basis –  

AIS – Financial Results for the first quarter ended 30th June, 2017
(Rs. Lakhs)
Particulars
Standalone
Consolidated
2017
2016
Change (%)
2017
2016
Change (%)
Sales
65,891
61,022
7.98
67,098
61,784
8.60
Operating EBIDTA
11,314
10,427
8.51
10,985
10,182
7.89
Cash Profit
8,329
6,923
20.31
7,994
6,665
19.94
Profit Before Tax
6,202
4,963
24.96
5,791
4,608
25.67
Profit after Tax
4,145
3,058
35.55
3,919
2,833
38.33


We have also implemented some operational upgrades in our float glass plant at Roorkee leading to productivity increases from the next quarter. We also welcome the new regulations & standards from the government for architectural glass which shall be beneficial to everyone in the long term. As required by law, we have migrated to the new IndAS method of accounting and therefore, our results have been restated this quarter with minor upside on PAT coming from positives in depreciation.  Overall, we continue to look forward to consistent growth in auto and architectural segments as well as a stable macro environment.”

About AIS:
Asahi India Glass Ltd. (AIS) is a joint venture between the Labroo family, Asahi Glass Co. Ltd. of Japan, and Maruti Suzuki India Limited. AIS began operations in 1987.
AIS, today, is a leading integrated glass company in India, manufacturing a wide range of international quality automotive safety glass, float glass and architectural processed and value added glass. AIS operates under three strategic business units (SBUs), namely, Auto Glass, Architectural Glass and Consumer Glass.
Auto Glass is India's largest manufacturer of world class automotive safety glass and is, in fact, one of the largest in the field in Asia. It is the sole supplier to almost all the OEMs and has a market share of approx. 77 per cent in the Indian passenger car industry.
Architectural Glass is formed as a result of management merger of Float & Glass Solutions (Processed Glass) SBUs. This SBU manufactures quality float glass and deploys an extensive network of 4 zonal offices and over 1000 distributors. It also markets a wide range of AGC products in India as its distribution partner.
Consumer Glass SBU is Company’s interface with end users for its range of automotive and architectural glass offerings. Impeccable, customized and consumer centric solutions is the key differentiator of Consumer Glass SBU. It includes GlasXperts – a retail initiative in the Architectural Glass segment and Windshield Experts which is India’s only automotive glass repair & replacement specialist.

          Union Bank of India Announces Excellent Results for the Quarter ended June 30, 2017         
Highlights  of  Union Bank of India's Results for the Quarter ended June 30, 2017  

CASA     25.1 per cent YoY
Non Interest Income      `  ` 1414 crore  (up 36 per cent YoY) 
Savings Deposit     27.6 per cent YoY
Operating Profit     ` ` 2057 crore (up 26.5 per cent YoY) 
CASA Share      35.5 per cent 
Net Profit        ` 117 crore (up 7.3 per cent QoQ) 
RAM* Sector      14.8 per cent YoY
CRAR       12.01 per cent 
RAM* Share       55.4 per cent
Tier I      9.24 per cent 

 The growth in Deposits was driven by Savings Deposits, which grew by 27.6 per cent on YoY basis.
 
 Cost to income ratio improved to 43.79 per cent against 48.28 per cent on YoY basis.

 Capital Adequacy Ratio (Basel III) improved to 12.01 per cent compared to 10.75 per cent a year ago. * (Retail, Agriculture & MSME share in domestic advances) 

Business
Global Business grew by 10.5 per cent to `670971 crore as on June 30, 2017 from `607280 crore as on June 30, 2016. Domestic business grew by 10.0 per cent to `635233 crore as on June 30, 2017 from `577473 crore as on June 30, 2016.  Total deposit of the bank grew from `338727 crore as on June 30, 2016 to `375796 crore as on June 30, 2017 showing growth of 10.9 per cent. 
Financial Results for the Quarter ended June 30, 2017 
                                            
CASA deposits grew by 25.1 per cent to `133412 crore as on June 30, 2017 from `106604 crore as on June 30, 2016.   CASA share in total deposits improved to 35.5 per cent as on June 30, 2017 compared to 31.5 per cent as on June 30, 2016. Average CASA ratio also increased by 430 basis points (bps) to 33.5 per cent on YoY basis.  Savings Deposit registered YoY growth of 27.6 per cent.  A total of 8.70 lakh CASA accounts were opened during April-June 2017, out of which 8.38 lakh were Savings Bank Accounts (excl. BSBDA/BSBDS accounts).   The Bank’s Global Advances grew by 9.9 per cent (YoY) to `295175 crore as on June 30, 2017 from `268553 crore as on June 30, 2016.  Due to encouraging growth of 14.8 per cent in RAM (Retail, Agriculture & MSME) sector, Domestic Advances increased by 9.4 per cent from `242935 crore as on June 30, 2016 to `265683 crore as on June 30, 2017. 


Financial Performance for the quarter ended June 2017

Domestic Net Interest Margin (NIM) stood at 2.20 per cent for April -June 2017 as against 2.36 per cent for April -June 2016. Global NIM for April -June 2017 stood at 2.06 per cent as against 2.27 per cent for January-March 2017 quarter. It was 2.28 per cent a year ago.    Yield on funds stood at 6.94 per cent for April -June 2017 as against 7.94 per cent for April-June 2016 and 7.35 per cent for January-March 2017.   Cost of funds stood at 5.03 per cent for April -June 2017 as against 5.82 per cent for April-June 2016 and 5.24 per cent for January-March 2017.  Net Interest Income for April-June 2017 increased by 6.7 per cent to `2243 crore from `2103 crore for April-June 2016. It was `2387 crore during January-March 2017.  Non Interest Income for April-June 2017 stood at `1414 crore, showing increase of 36.0 per cent over April-June 2016.   Operating profit increased by 26.5 per cent to `2057 crore during April-June 2017 over `1626 crore during April-June 2016 and was `2134 crore during January-March 2017.  Net Profit for April-June 2017 sequentially increased to `117 crore from `109 crore in January-March 2017.  Cost to income ratio improved to 43.79 per cent for April -June 2017 from 48.28 per cent for April-June 2016 and it was 44.32 per cent for January-March 2017.  Return on average assets (annualised) stood at 0.10 per cent for April-June 2017 as against 0.17 per cent for April-June 2016 and 0.10 per cent for January-March 2017.  Return on equity (annualised) stood at 2.46 per cent in April -June 2017 as against 3.36 per cent for April -June 2016 and 2.27 per cent for January-March 2017.  Earnings per share (annualised) stood at `6.78 in April -June 2017 as against `9.69 for April -June 2016 and `6.33 for January-March 2017.

Asset Quality
Gross NPA stood at 12.63 per cent as on June 30, 2017 as against 11.17 per cent as on March 31, 2017 and 10.16 per cent as on June 30, 2016.   Net NPA ratio stood at 7.47 per cent as on June 30, 2017 as against 6.57 per cent as on March 31, 2017 and 6.16 per cent as on June 30, 2016.  Provision Coverage Ratio stood at 51.13 per cent as on June 30, 2017 as against 51.41 per cent as on March 31, 2017. It was 49.99 per cent as on June 30, 2016.  

Capital Adequacy

Capital Adequacy ratio of the Bank under Basel III improved to 12.01 per cent as on June 30, 2017 as against 11.79 per cent as on March 31, 2017 and 10.75 per cent as on June 30, 2016 compared to minimum regulatory requirement of 10.25 per cent.  The Tier I ratio as of June 30, 2017 is 9.24 per cent, within which Common Equity Tier 1 ratio is 7.73 per cent compared to regulatory minimum of 6.75 per cent. 

Digital Initiatives

The Bank has been pioneer in taking various digital initiatives and continuously launched various digital products for enhancing the customer services. Following are some of the key achievements during the quarter:
 66 per cent growth in mobile banking users on YoY basis.  U-Mobile transaction volume doubled from June 2016.  90 per cent growth in number of PoS terminals on YoY basis.  7th largest presence in banking industry and 3rd largest presence amongst all PSU banks within short span of time in Social media.  Trendsetter on Social media channels by taking various initiatives like Live streaming, Digital Education Series – #KyaAapJanteHai etc.   67 per cent share of “transactions through digital channels” in “overall transactions”. 

Financial Inclusion:

Under the Pradhan Manrti Jan Dhan Yojana (PMJDY), the the Bank has more than 69 lakh accounts having a balance of `1270 crore.   48.91 lakh Rupay Card issued under PMJDY as on June 30, 2017.

Total enrollment under Pradhan Mantri Suraksha Bima Yojana (PMSBY), Pradhan Mantri Jeevan Jyoti Bima Yojana (PMJJBY) and Atal Pension Yojana (APJ) increased to 30.1 lakh, 12.8 lakh and 2.21 lakh respectively.  The Bank financed `696 crore in 33433 accounts under Pradhan Mantri Mudra Yojana, including an amount of `211 crore to 7964 beneficiaries through a specific scheme for financing of light commercial vehicle during April–June 2017. 

Network

The Bank has 4286 branches as of June 30, 2017 including 4 overseas branches at Hong Kong, DIFC (Dubai), Antwerp (Belgium) and Sydney (Australia). In addition, the Bank has representative offices at Shanghai, Beijing and Abu Dhabi. The Bank also operates in United Kingdom through its wholly owned subsidiary, Union Bank of India (UK) Ltd.   Total number of ATMs stood at 7574 including 1685 talking ATMs as of June 30, 2017. ATM to branch ratio stood at 1.77. 

Awards & Accolades during FY 2017-18 (April-June)

Skoch Award 
Skoch Order of merit Award – Operational Customer Relationship Management (OCRM)
Skoch Financial Technology Award - Unified Payment Interface(UPI)
Skoch Financial Technology Award - Green PIN solution for Debit cards 
Skoch Financial Technology Award - Union Digi Gaon
Skoch Financial Inclusion Award for Financial Inclusion

          Ziox Mobiles announces Sushant Singh Rajput as its Brand Ambassador along with Rs. 300cr investment for FY17 - 18        
Launches its newest Mobile phone ‘Ziox Duopix’
        Forays into LED TV and Consumer Durables Segment
        Plans to open 2 new manufacturing units and R&D facilities with investment of Rs. 200cr.
        Plans a 360-degree marketing campaign with a budget of
Rs. 100 Cr.
by Shrutee K/DNS
In the light of its vigorous expansion, Ziox Mobiles under the aegis of Sun Air voice Pvt Ltd, one of the fastest growing Mobile handsets brand, ropes in the very versatile, Sushant Singh Rajput, as its Brand endorser who truly lives up to the brand name.  While Ziox mobiles is a preferred brand across the country through its outstanding innovation and quality, the other has won the hearts of a million Indians as he slips into any role with nonchalance. Both the brand and its ambassador ride on the precepts of resilience, hard work and steady growth. A rare blend of energy, perseverance, and popularity coupled with his ability to connect to people, Sushant Singh Rajput is a fine addition to the Ziox Mobiles family. This association will further boost the legacy of Ziox Mobiles as the actor resonates to the brand promise: Quality that Speaks.
Answering strong demand and an overwhelming response from the Indian market, Ziox Mobiles also chalked out a detailed expansion plan and the roadmap for FY 2017-2018.The Brand aims to establish a stronger foothold in the Indian Market, with the total investment of over Rs. 200crore which shall span for a year, the Brand announced its plan to set up 2 new manufacturing units (in Sikkim and Noida) and R&D facilities apart from the existing New Delhi unit, with a holding capacity of around 1 Million units per Month. With the induction of Sushant Singh Rajput as its brand endorser along with the total investment of Rs. 100 Cr. this FY 2017-2018, Ziox aims to achieve an estimated revenue of Rs. 1,000 Cr and a sale of 10 million product units.
Commenting on this association and a promising future, Mr. Deepak Kabu, CEO Ziox Mobiles said “The future looks bright, Ziox Mobiles has a range of phones in the pipeline with exciting new launches. We are enthralled to present Sushant Singh Rajput as the new face of Ziox Mobiles. With Sushant Singh Rajput on board, it will help augment sales and further its reach in the market. The partnership with him is timed with Ziox Mobiles’ next phase of expansion on a pan-India level” Mr. Kabu further adds, “Sushant embodies talent, youthfulness and style. More importantly, he blends well with the core values of hard work, reliability, and is the epitome of our brand philosophy. Today our target audience is the young, driven, forward-moving generation, who have ever changing needs. Sushant understands the pulse of this audience well and has a great rapport with them. That is why, with immense preparation, he goes on to entertain his fans with one performance after another just as Ziox Mobiles constantly strives to understand the changing needs of its customers.”
Speaking on the association, Sushant Singh Rajput said, "I have always known Ziox Mobiles to be an inspirational brand in terms of their persuasion to becomes India’s biggest mobile brand. I am happy to be associated with a brand which is very young, and has a journey that is very similar to mine. I love how this brand designs its products to suit every need of its customers and are constantly innovating themselves as I see myself doing that while working on a role. I look forward to being part of the Ziox Mobiles family and to contribute to its fascinating growth journey in India." The ever-evolving brand has slated a major strategic transformation that entails the signing of a new brand endorser, an aggressive expansion and launches of it new products. The Brand at the event also announced the launch of its newest smartphone Series ‘Duopix”, Phone Series with Dual Cameras. Designed to fulfil the brand promise of providing users with superior camera performance and quality, ‘Duopix’ comes equipped with wide angle Dual front camera (8.0MP + 2.0) front +8.0MP Rear. The latest Dual 4G model runs on Android 7.0, with 5inch HD IPS Display along with 2GB RAM + 16GB ROM all packed in 2500mAh battery. Some of the key features includes strong battery life & also the fast charging capability. The budget friendly Smartphone comes equipped with various other features like 21 language support with multilingual phonebook, MP3 player, FM Radio, Bluetooth connectivity to help you stay connected. The phone will be available across all retail stores in few week’s time. Along with the smartphones, the brand also announces its foray into LED TVS and Consumer Durables category.

About Ziox Mobile: Ziox Mobiles, part of Sun Airvoice Pvt. Ltd., incepted in the Year 2015, with a singular motto to break the boundaries while offering technologically superior products without compromising on quality. Headquartered in New Delhi, Ziox Mobiles has built up an impressive product portfolio of more than 40 distinguished products and constantly innovating to make superior products.
Empowering consumers with affordable technology through quality products- the brand has truly demonstrated quick and robust expansion since inception, showing profitability and growing sales since the first year of operations. Being considered as one of the most innovative and fastest growing brands in the Mobile category, the brand has established its presence across India through its wide network comprising of its various branch offices and system integrators across several states in India.

          Lufthansa Cargo Emphasizes Long-Standing Connections with Indian Airfreight Market        
Freighter services to Mumbai increased
Lufthansa Cargo emphasizes long-standing connections with Indian airfreight market
by Shrutee K/DNS
The Frankfurt-based air freight carrier Lufthansa Cargo has increased its freighter services to Mumbai. Since July, the airline operates four instead of three freighter flights to the Indian megacity. “This change sees us strengthening our position in the regional airfreight market”, says Frank Naeve, Lufthansa Cargo Vice President Asia-Pacific.
Lufthansa’s cargo arm also serves the Indian metropoles Bangalore, Chennai and Hyderabad, each with two freighter services a week. Additionally, the cargo capacity of 42 weekly passenger flights between various Indian cities and the hubs in Frankfurt, Munich and Vienna is offered by the German logistic company.

“We are proud to have had long-standing connections with customers in the Indian air cargo industry since 1959. Our aim is to build on this in the future”, says Peter Gerber, Lufthansa Cargo CEO and chairman of the board. Two years ago, the Lufthansa Cargo emphasized this by renaming its McDonnell-Douglas MD-11 freighter with registration D-ALCJ “Namaste India”.
About Lufthansa Cargo AG : Lufthansa Cargo ranks among the world’s leading air freight carriers. In the 2016 business year, the airline transported around 1.6 million tonnes of freight and mail and sold 8.4 billion revenue tonne-kilometres. The company currently employs about 4,500 people worldwide. Lufthansa Cargo focuses on the airport-to-airport business. The cargo carrier serves around 300 destinations in more than 100 countries with its own fleet of freighters, the belly capacities of passenger aircraft operated by Lufthansa, Austrian Airlines and Eurowings, and an extensive road feeder service network. The bulk of the cargo business is routed through Frankfurt Airport. Lufthansa Cargo is a wholly owned Lufthansa subsidiary of Deutsche Lufthansa AG.


          Malaysian Palm Oil Council (MPOC) partners with Mumbai Dabbawala Association (MDA)        

Malaysian Palm Oil Council (MPOC) partners with Mumbai Dabbawala Association (MDA)

~A culturally enriching and riveting morning hosted by Malaysian Palm Oil Council with the Dabbawalas of Mumbai~

by Shrutee K/DNS

Mumbai, August 8, 2017 : In April 2017 in conjunction with the visit to India of the Hon. Prime Minister of Malaysia, Dato Sri’ Haji Mohammad Najib bin Tun Haji Abdul Razak, Malaysian Palm Oil Council (MPOC) signed a MoU with Mumbai Dabbawala Association (MDA). Taking this MoU forward, on the morning of August 8th, MPOC and Mumbai Dabbawalas flagged off an event to create awareness for Malaysian Palm Oil and its benefits.

The event took place at the Lower Parel Bridge, where Dabbawalas wore the T-shirts and topis branded with MPOC message. They then delivered the dabbas carrying a booklet of recipes of dishes that can be cooked in palm oil and the benefits of using palm oil. The Dabbawalas are in a unique position to promote MPOC and raise awareness to the positive nutritional attributes of Malaysian Palm Oil. This becomes particularly useful in Indian cuisine as most dishes are cooked in oil. Substituting for a healthier oil can do no harm, besides besides providing the added bonus of eating delicious food cooked in a healthy oil that is nutritious for the body.

To kick off this event, Dr. Kalyana Sundaram, CEO of MPOC, was present, encouraging the use of palm oil and showing appreciation to our Dabbawalas for their exceptional work. The morning was most enjoyable, entertaining and culturally riveting as some of Maharashtra’s best dancers performed the traditional Lezim Dance, a true delight to have watched! For those unaware of the Lezim Dance, it is a Maharashtrian folk dance performed to the beat of the Dholki, a percussion instrument.

Speaking at the occasion, Dr. Kalyan Sundaram, CEO, MPOC, said, “It gives me immense pleasure to be here this morning. Dabbawalas have been an integral part of this city and they define what Indians stand for: hardworking, responsible and efficient. They work relentlessly with a smile on their face, be it rain or storm. Malaysian Palm Oil has been a very important part of the Indian diet and with this unique initiative we wish to create awareness for this wonderful oil and its several health benefits. Our association with the Mumbai Dabbawalas allows us to spread the message of healthy cooking to a large number of households and encourages a healthier cooking lifestyle”


Mr. Subhash Talekar, Association Spokesperson of Mumbai Dabbawala Association said “We Dabbawalas unfailingly deliver thousands of dabbas to hungry people daily, they are undoubtedly the best people to directly reach out to households and create awareness about palm oil and the health benefits of using it. This is a very exciting new chapter, and we are glad to be partnering with MPOC.”

India is the world’s largest importer of cooking oils. Palm oil constitutes about two-thirds of India’s steadily increasing vegetable oil import. The price, in comparison to competing oils and the proximity of origin, Malaysia, has made Malayisan Palm Oil a highly preferred oil. Now the Dabawallas have taken it upon themselves, with the help of MPOC, to inform families about the benefits of palm oil and how exquisite food can be cooked in palm oil in alternative to other vegetable oils.

Amongst some of the benefits we came to learn about during the event was that palm oil is rich in natural chemical compounds essential for health and nutrition. It has a rich source of carotenoids that are rich in Vitamin A, a potent natural antioxidant, Vitamins D, E, K, fatty acids, and other important fat-soluble micronutrients that boost the human immune system. The health benefits from using palm oil are tremendous - it reduces chances of Cancer, protects against heart diseases, type 2 diabetes, and helps children with Vitamin A deficiency.

The oil is great for cooking; it is of vegetable origin, making it free of cholesterol and apt for vegetarians, vegans, and Jains. Furthermore, the oil has a neutral flavor - you needn’t worry about changing tastes, it does not oxidize easily – making it perfect for frying food, and produces less gummy materials and helps in the cooking area maintaining a non-greasy surface; so, most bakers prefer to use a palm-based margarine for baking goods.

With people now more conscious about their health and food habits, palm oil is definitely the healthier choice to make whilst cooking and a step towards healthier bodies and practices.  What better way to create awareness than directly reaching out to the households through our Dabbawalas.


Note to Editors:
MPOC is a Council under the Ministry of Plantation Industries and Commodities of Malaysia.  Its role is to promote the market expansion of Malaysian palm oil and its products by enhancing the image of palm oil and creating better acceptance of palm oil through awareness of various technological and economic advantages (techno-economic advantages) and environmental sustainability.

The Council has set up a network of ten offices all over the world, mainly in China (Shanghai), India (Mumbai), Pakistan (Lahore), Bangladesh (Dhaka), Middle East (Istanbul and Cairo), Europe (Brussels and Russia), Africa (Durban) and Americas (Washington DC)  to support, promote and venture into new areas for the industry.
                                                                                                             

The plantation industry, particularly palm oil, is one of the main pillars of the Malaysian economy.  The palm oil sector has contributed significantly towards providing a continuous inflow of export earnings through the export of raw commodity and valued-added products to the global market. In 2016, palm oil contributed USD 9 billion in export earnings for Malaysia and accounted for 33% of the world’s palm oil production and 39% of total palm oil exports.

          February 2017        

          How healthcare systems can reduce financial risk with developer-owned hospitals        
Insert Image: 

          Gli infiniti possibili di Giorgio Sollazzi, musicista        
All'epoca ero molto ingenuo e molto presuntuoso e pensavo di poter scrivere “recensioni” di grandi opere musicali del passato. Le pubblicavo su un sito commerciale (che esiste ancora oggi). Quando mi venivano bene, erano “schede" molto pedantesche, contenenti le stesse informazioni che si possono trovare su una qualsiasi garzantina. Infatti, qualche anno dopo, quando Wikipedia arrivò in Italia, smisi di farmi sfruttare dal sito commerciale e trovai quella che probabilmente è la mia vera vocazione internettiana.

Ad ogni modo fu sul sito commerciale che conobbi Giorgio Sollazzi. Anche lui scriveva recensioni. Con la prima, importante differenza che lui è musicista, e quindi sa di cosa scrive, e con una seconda differenza: le sue recensioni erano avvincenti, estrose, godibilissime, anche e soprattutto quando sembrava che non avessero nulla a che fare col brano musicale che - in teoria - ne costituiva l'oggetto. Le recensioni di Giorgio non parlavano precisamente né del brano musicale “in sé”, né della sua ricezione da parte dell'ascoltatore-recensore. Si situavano, piuttosto, in qualche punto lungo la relazione fra questi due elementi, come un acrobata in equilibrio su un filo, o come uno dei fuochi di due specchi parabolici contrapposti. Non per niente “mirrors” (con la m minuscola) era il nickname che Giorgio si era scelto.

A un certo punto Giorgio uscì dal sito e cancellò il suo account. Dev'essere per questo che, cercando ora qualcuna delle meravigliose recensioni di mirrors, non ne trovo nessuna. Qualche tempo dopo si iscrisse nuovamente con un altro nickname e cominciò a pubblicare recensioni di forma più tradizionale, ma sempre molto belle, come ad esempio questa, sulla settima di Beethoven.

L'interpretazione verbale di un brano musicale è sempre un grosso azzardo. "Scrivere di musica è come ballare di architettura", diceva Frank Zappa. Le descrizioni che amo di più sono quelle di musiche inesistenti, come la sonata di Vinteuil in Proust o le composizioni immaginate da Thomas Mann nel Doktor Faustus. Proust mescolava genialmente le carte, inventandosi una sonata per violino e pianoforte che prendeva un po' dalla Sonata in re minore di César Franck, un po' da un quintetto di Saint-Saëns, senza essere né l'una né l'altro; in piena coerenza, d'altronde, con la sua estetica, dove non esistono "descrizioni" "realistiche" del "mondo esterno". Quanto a Mann, Arnold Schönberg s'inalberò quando seppe che la sua musica aveva ispirato quella del romanzo, al punto da pretendere una smentita da parte dello scrittore. E dal suo punto di vista Schönberg aveva anche ragione, in quanto Mann interpretava la dodecafonia come un fenomeno di dissoluzione morale, che era quanto di più lontano dagli intenti del severo musicista.

Ma anche divagare è un'arte, che a me non riesce: ci provo inutilmente, per poi subito ricadere nel mio solito modo di scrivere pedestre e nozionistico. Dunque, meglio rimanere on topic e parlare di Giorgio Sollazzi. Ecco: quando lo conobbi, non attraversavo quello che si dice un buon periodo. Mi ero laureato, avevo fatto il servizio civile, abitavo a casa dei miei in provincia, lontanissimo dall'università e dai miei amici di laggiù. Gli altri miei amici, quelli del liceo, erano sparsi in giro per l'Italia. Facevo pratica in uno studio legale. Ero, in sostanza, disoccupato, e mi sentivo terribilmente solo e senza prospettive. L'amicizia epistolare con Giorgio mi aiutò a tenermi in piedi. Ci scambiavamo commenti e messaggi sul sito commerciale (che fungeva anche un po' da social network), email, ma anche lettere cartacee: ricordo un plico meraviglioso che egli mi spedì con un CD che aveva masterizzato per me. Dentro c'erano un brano di Stockhausen, Il canto sospeso di Nono, un coro dal Trovatore, e non ricordo cos'altro.

A quel tempo Internet non aveva ancora stravolto la distribuzione della musica. C'era Napster, ma con le connessioni lente di allora non è che si riuscisse a scaricare granché. Per ascoltare musica bisognava ancora affidarsi alla radio, oppure ordinare il disco al negozio e aspettare che arrivasse. C'era poi una circolazione semiclandestina di audiocassette duplicate artigianalmente, che passavano di mano in mano come samizdat. Tutta una dimensione romantica, di scoperta, che si è persa dal momento in cui è bastato digitare un nome su un motore di ricerca per avere subito a disposizione l'intera produzione di qualsiasi musicista antico o contemporaneo.

Poco tempo fa ho chiesto a Giorgio se, come musicista, non si sentisse stimolato da questa odierna vasta disponibilità di musiche, e come mai ciò non lo inducesse a scrivere in una tale, enorme varietà di stili e di linguaggi: oggi un brano dodecafonico, domani uno pop, dopodomani uno free jazz, e via dicendo. Non ricordo esattamente il tenore della mia domanda - che comunque era piuttosto stupida, si capisce. Ricordo invece perfettamente la replica di Giorgio: fare come gli suggerivo io - mi ha risposto - avrebbe forse aumentato il suo tasso di libertà ma avrebbe diminuito il tasso di scelta.

In uno dei suoi romanzi, Nicola Lagioia offre alcune riflessioni molto interessanti a proposito del ritrovare sui social network i propri amici di gioventù. Queste amicizie del mondo reale divenute poi virtuali - osserva Lagioia - hanno una strana consistenza umbratile. Simile a quella degli spiriti nell'undicesimo libro dell'Odissea (o nel sesto dell'Eneide), aggiungerei io. Colpa del mezzo, evidentemente, e non dell'amicizia in sé - ma questo è un altro discorso.

Conosco Giorgio da sedici anni e non ci siamo mai incontrati di persona: solo via Internet, e qualche volta per telefono. Però non ho mai avvertito come un limite la virtualità della nostra amicizia. Forse perché nel suo caso manca il confronto con l'immagine mnemonica della persona reale, o forse per il felice paradosso che Giorgio riesce a realizzare nelle sue comunicazioni virtuali, allo stesso tempo lievi e intense.

Sto pensando che “lieve” e “intenso” potrebbero essere i due primi aggettivi che mi vengono in mente ascoltando la musica di Giorgio. Mi rendo conto che come contributo critico è parecchio inadeguato, ma ho già detto che non sono del mestiere. Giorgio ha esposto la sua poetica (o almeno, una delle sue poetiche) in uno scritto che potete trovare qui.

In questo saggio, Giorgio prende le mosse dal personaggio di Amleto (con annesso spettro del re di Danimarca?) per proporre una sua complessa concezione della composizione, come “apparizione” o “evocazione” di “potenziali”. 

Shakespeare era un altro interesse che ci univa quando scrivevamo sul sito commerciale. Giorgio ha molto riflettuto, e qualcosa ha anche scritto, sia in prosa sia in musica, sulla figura di Amleto.


Quanto a me, partendo dalla constatazione che su Internet in italiano c'era ancora poco materiale sull'argomento, mi ero messo in testa di compilare e mettere on line una "recensione" per ciascuno dei drammi del Bardo. Tanto ero sprovveduto, a quell'epoca.

Più tardi abbandonai l'insano progetto, assieme alle mie velleità di anglista, e praticamente smisi di leggere Shakespeare. Oggi amo recarmi, di quando in quando, a visitare l'abbazia cistercense di Morimondo. Questo non c'entra nulla con quanto ho detto finora. Però nell'abbazia c'è un bel coro ligneo di epoca rinascimentale.

Ogni volta che lo vedo recito mentalmente la prima quartina del Sonetto LXXIII.

La migliore traduzione italiana è quella di Ungaretti:

"Quel tempo in me vedere puoi dell'anno
Quando già niuna foglia, o rara gialla in sospeso, rimane
Ai rami che affrontando il freddo tremano,
Cori spogliati rovinati dove gli uccelli cantarono, dolci".

Di solito i commentatori sottolineano il senso di desolazione che promana da quei bare ruin'd choirs, vuoti, semidistrutti e muti. Sta di fatto che Shakespeare, mentre ce li descrive, riesce in qualche modo a farcene riascoltare il suono. Forse questa è una delle cose che il poeta vuole dirci: la memoria, aiutata dall'arte, può riuscire ad evocare la musica di un coro assente.














          La cultura delle destre        
Il libro che sto recensendo è: Gabriele Turi, La cultura delle destre. Alla ricerca dell'egemonia culturale in Italia, Bollati Boringhieri, Torino 2013, pp. 175, Euro 14,00, ISBN 978-88-339-2429-8.

L'autore insegna storia contemporanea a Firenze e dirige la rivista "Passato e presente". Il libro, nonostante il titolo, non ha molto a che vedere col celebre saggio di Furio Jesi; ha un approccio decisamente meno teoretico, in compenso Ã¨ ricchissimo di dati.

Il presupposto da cui parte è molto semplice: la cosiddetta "egemonia culturale della sinistra" nell'Italia del dopoguerra è una leggenda metropolitana. In realtà l'ideologia dominante Ã¨ sempre stata di destra; Turi si spinge fino ad affermare una "centralità del fascismo nella storia culturale e civile del paese". Il berlusconismo Ã¨ l'erede e il continuatore di questa cultura.

La trattazione inizia con un ampio estratto del famigerato intervento di Luciano Violante alla Camera del 10 maggio 1996 (quello che invitava a "riflettere" sui "ragazzi" di Salò in nome dei "valori nazionali comunemente condivisi"). Turi dimostra come l'exploit di Violante sia stato preparato da decenni di "edulcoramento storiografico della dittatura di Mussolini"; tappe importanti di questa operazione di normalizzazione del fascismo, a livello massmediatico, furono due mostre sugli anni '30, una allestita a Milano nel 1982 e l'altra a Roma nel 1984 (quest'ultima con la consulenza di Renzo De Felice): "entrambe promosse da amministrazioni socialiste", ha cura di specificare Turi.

Turi menziona poi un altro "caso esemplare": la proposta, da parte dell'allora sindaco di Roma Francesco Rutelli, nel 1995, di dedicare una via a Giuseppe Bottai. L'iniziativa riscosse il plauso (fra gli altri) di Massimo Cacciari, e fu bloccata solo dalle proteste della comunità ebraica; ci si era dimenticati, fra l'altro, che Bottai era stato uno dei sostenitori più ferventi delle leggi razziali; l'immagine corrente di Bottai era infatti quella giustificazionista del "fascista critico" delineata da Giordano Bruno Guerri nella sua fortunata biografia del 1976.

Il patriottismo, la ricerca di valori nazionali, di una "memoria condivisa" e di una "pacificazione" sono il Leitmotiv che, nella ricostruzione di Turi, caratterizza la polemica anti-antifascista condotta negli anni '90 da intellettuali come Renzo De Felice, Roberto Vivarelli, Ernesto Galli Della Loggia, spesso con l'assenso e il plauso della sinistra istituzionale. Troviamo ancora il buon Francesco Rutelli in prima linea nell'operazione di riabilitazione di Giovanni Gentile, filosofo a cui il comune di Roma dedicò un convegno nel 1994 presentandolo come un patriota al di sopra delle parti e dimenticandone l'organicità al nazifascismo.

Interessante notare che, in questo frame revisionistico, chi ostacola la "pacificazione", chi alimenta la "divisività", è un potenziale terrorista. Turi cita Vivarelli, secondo il quale per colpa degli antifascisti nell'Italia del dopoguerra "si perpetuò un clima di strisciante guerra civile, che [...] produsse la tragica stagione del terrorismo".

Turi sottolinea il ruolo degli intellettuali craxiani nel diffondere in Italia durante gli anni '80 le idee del neoliberismo reaganiano e thatcheriano e nel promuovere l'anticomunismo. Questi intellettuali poi, assieme ad altri di estrazione neofascista o cattolico-reazionaria, divennero nel decennio '90 gli artefici principali dell'ideologia populista berlusconiana, la quale nell'ultimo quindicennio si è dotata di "una rete di think thank, laboratori di idee ispirati al modello statunitense, capaci di costruire e diffondere un comune sentire"; tutta una serie di riviste, fondazioni, case editrici, "poco conosciute presso l'opinione pubblica" ma efficaci come centri di "aggregazione di intellettuali e di elaborazione culturale" (e, di solito, ben finanziate dagli industriali).

Turi ricostruisce minuziosamente alcuni fra i principali momenti dell'offensiva culturale di destra: la battaglia a favore del mantenimento del crocifisso nelle aule scolastiche (una battaglia vinta dalla destra anche a causa dell'atteggiamento imbelle assunto al riguardo dal centrosinistra); la vicenda, davvero tragicomica, della censura proposta dal centrodestra sui manuali scolastici di storia, anche qui in nome della "memoria condivisa", della pacificazione, dell'imparzialità e contro la presunta "egemonia culturale" della sinistra.

Interessante il confronto, proposto da Turi, fra il modo in cui il novantesimo anniversario della fine della prima guerra mondiale è stato ricordato in Italia e in altri paesi europei. Turi mostra come nel 2008 in Gran Bretagna, in Francia, in Germania, le celebrazioni ufficiali siano state improntate alla pietà per le vittime, all'orrore per l'enormità del massacro e siano state accompagnate, a volte, da gesti ufficiali di riabilitazione dei soldati che furono condannati come disertori. Tutto il contrario in Italia, dove "la sostanza della commemorazione è rimasta affidata al tema dell'identità nazionale" e dove il ministero dell'Istruzione ha promosso una serie di conferenze nelle scuole affidate non agli storici ma agli ufficiali dell'esercito, in quella che è stata definita la "più imponente manifestazione di propaganda militare che l'Italia repubblicana abbia mai messo in piedi".

Nell'ultimo capitolo del suo libro Turi prova a tracciare una mappa del revisionismo storico su Internet, individuando "un network molto ampio di riviste e di istituzioni [...] una rete circolare in cui appaiono ripetutamente gli stessi nomi, specchio di una visione della storia che in breve tempo da antagonista è diventata governativa". Il capitolo Ã¨ un ricco dossier di nomi e di indicazioni bibliografiche, una minuziosa schedatura di cui in questa sede non posso dare un'idea.

La conclusione cui giunge Gabriele Turi è che la cultura di destra è saldamente egemone ed è destinata a sopravvivere alla fine politica di Silvio Berlusconi. Aggiungerei che l'attuale esperienza dei governi di “larghe intese” (Monti, Letta, Renzi) getta una luce retrospettiva su molte delle prese di posizione filorevisioniste, da parte di esponenti del centrosinistra, ricordate nel libro di Turi. Bisognerebbe scrivere un libro analogo a quell di Turi, dedicato alla "cultura di sinistra", nel quale si mostrerebbe come a partire da Togliatti il nazionalismo abbia infettato nei decenni la cultura politica del PCI - PDS - DS - PD fino a stravolgerla completamente. Ma questa è un'altra storia.
          'We have no experience in stopping a nuclear war.' - Sidney Drell (no replies)        
'..My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The “Titanic Effect” is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'

'The harsh rhetoric on both sides increases the danger of miscalculations and mistakes, as do other factors. Close encounters between the military aircraft of the United States and Russia have become routine, creating the potential for an unintended conflict. Many of the nuclear-weapon systems on both sides are aging and obsolete. The personnel who operate those systems often suffer from poor morale and poor training. None of their senior officers has firsthand experience making decisions during an actual nuclear crisis. And today’s command-and-control systems must contend with threats that barely existed during the Cold War: malware, spyware, worms, bugs, viruses, corrupted firmware, logic bombs, Trojan horses, and all the other modern tools of cyber warfare. The greatest danger is posed not by any technological innovation but by a dilemma that has haunted nuclear strategy since the first detonation of an atomic bomb: How do you prevent a nuclear attack while preserving the ability to launch one?

..

..the Cuban Missile Crisis, when a series of misperceptions, miscalculations, and command-and-control problems almost started an accidental nuclear war—despite the determination of both John F. Kennedy and Nikita Khrushchev to avoid one. In perhaps the most dangerous incident, the captain of a Soviet submarine mistakenly believed that his vessel was under attack by U.S. warships and ordered the firing of a torpedo armed with a nuclear warhead. His order was blocked by a fellow officer. Had the torpedo been fired, the United States would have retaliated with nuclear weapons. At the height of the crisis, while leaving the White House on a beautiful fall evening, McNamara had a strong feeling of dread—and for good reason: “I feared I might never live to see another Saturday night.”

..

The personnel who command, operate, and maintain the Minuteman III have also become grounds for concern. In 2013, the two-star general in charge of the entire Minuteman force was removed from duty after going on a drunken bender during a visit to Russia, behaving inappropriately with young Russian women, asking repeatedly if he could sing with a Beatles cover band at a Mexican restaurant in Moscow, and insulting his military hosts. The following year, almost a hundred Minuteman launch officers were disciplined for cheating on their proficiency exams. In 2015, three launch officers at Malmstrom Air Force Base, in Montana, were dismissed for using illegal drugs, including ecstasy, cocaine, and amphetamines. That same year, a launch officer at Minot Air Force Base, in North Dakota, was sentenced to twenty-five years in prison for heading a violent street gang, distributing drugs, sexually assaulting a girl under the age of sixteen, and using psilocybin, a powerful hallucinogen. As the job title implies, launch officers are entrusted with the keys for launching intercontinental ballistic missiles.

..

..A recent memoir, “Uncommon Cause,” written by General George Lee Butler, reveals that the Pentagon was not telling the truth. Butler was the head of the U.S. Strategic Command, responsible for all of America’s nuclear weapons, during the Administration of President George H. W. Bush.

According to Butler and Franklin Miller, a former director of strategic-forces policy at the Pentagon, launch-on-warning was an essential part of the Single Integrated Operational Plan (siop), the nation’s nuclear-war plan. Land-based missiles like the Minuteman III were aimed at some of the most important targets in the Soviet Union, including its anti-aircraft sites. If the Minuteman missiles were destroyed before liftoff, the siop would go awry, and American bombers might be shot down before reaching their targets. In order to prevail in a nuclear war, the siop had become dependent on getting Minuteman missiles off the ground immediately. Butler’s immersion in the details of the nuclear command-and-control system left him dismayed. “With the possible exception of the Soviet nuclear war plan, [the siop] was the single most absurd and irresponsible document I had ever reviewed in my life,” Butler concluded. “We escaped the Cold War without a nuclear holocaust by some combination of skill, luck, and divine intervention, and I suspect the latter in greatest proportion.” The siop called for the destruction of twelve thousand targets within the Soviet Union. Moscow would be struck by four hundred nuclear weapons; Kiev, the capital of the Ukraine, by about forty.

After the end of the Cold War, a Russian surprise attack became extremely unlikely. Nevertheless, hundreds of Minuteman III missiles remained on alert. The Cold War strategy endured because, in theory, it deterred a Russian attack on the missiles. McNamara called the policy “insane,” arguing that “there’s no military requirement for it.” George W. Bush, while running for President in 2000, criticized launch-on-warning, citing the “unacceptable risks of accidental or unauthorized launch.” Barack Obama, while running for President in 2008, promised to take Minuteman missiles off alert, warning that policies like launch-on-warning “increase the risk of catastrophic accidents or miscalculation.” Twenty scientists who have won the Nobel Prize, as well as the Union of Concerned Scientists, have expressed strong opposition to retaining a launch-on-warning capability. It has also been opposed by former Secretary of State Henry Kissinger, former Secretary of State George Shultz, and former Senator Sam Nunn. And yet the Minuteman III missiles still sit in their silos today, armed with warheads, ready to go.

William J. Perry, who served as Secretary of Defense during the Clinton Administration, not only opposes keeping Minuteman III missiles on alert but advocates getting rid of them entirely. “These missiles are some of the most dangerous weapons in the world,” Perry wrote in the Times, this September. For many reasons, he thinks the risk of a nuclear catastrophe is greater today than it was during the Cold War. While serving as an Under-Secretary of Defense in 1980, Perry also received a late-night call about an impending Soviet attack, a false alarm that still haunts him. “A catastrophic nuclear war could have started by accident.”

Bruce Blair, a former Minuteman launch officer, heads the anti-nuclear group Global Zero, teaches at Princeton University, and campaigns against a launch-on-warning policy. Blair has described the stresses that the warning of a Russian attack would put on America’s command-and-control system. American early-warning satellites would detect Russian missiles within three minutes of their launch. Officers at norad would confer for an additional three minutes, checking sensors to decide if an attack was actually occurring. The Integrated Tactical Warning/Attack System collects data from at least two independent information sources, relying on different physical principles, such as ground-based radar and satellite-based infrared sensors. If the norad officials thought that the warning was legitimate, the President of the United States would be contacted. He or she would remove the Black Book from a briefcase carried by a military aide. The Black Book describes nuclear retaliatory options, presented in cartoon-like illustrations that can be quickly understood.

..

Although the Air Force publicly dismissed the threat of a cyberattack on the nuclear command-and-control system, the incident raised alarm within the Pentagon about the system’s vulnerability. A malfunction that occurred by accident might also be caused deliberately. Those concerns were reinforced by a Defense Science Board report in January, 2013. It found that the Pentagon’s computer networks had been “built on inherently insecure architectures that are composed of, and increasingly using, foreign parts.” Red teams employed by the board were able to disrupt Pentagon systems with “relative ease,” using tools available on the Internet. “The complexity of modern software and hardware makes it difficult, if not impossible, to develop components without flaws or to detect malicious insertions,” the report concluded.

In a recent paper for the Royal United Services Institute for Defence and Security Studies, Andrew Futter, an associate professor at the University of Leicester, suggested that a nuclear command-and-control system might be hacked to gather intelligence about the system, to shut down the system, to spoof it, mislead it, or cause it to take some sort of action—like launching a missile. And, he wrote, there are a variety of ways it might be done.

..

Strict precautions have been taken to thwart a cyberattack on the U.S. nuclear command-and-control system. Every line of nuclear code has been scrutinized for errors and bugs. The system is “air-gapped,” meaning that its networks are closed: someone can’t just go onto the Internet and tap into a computer at a Minuteman III control center. At least, that’s the theory. Russia, China, and North Korea have sophisticated cyber-warfare programs and techniques. General James Cartwright—the former head of the U.S. Strategic Command who recently pleaded guilty to leaking information about Stuxnet—thinks that it’s reasonable to believe the system has already been penetrated. “You’ve either been hacked, and you’re not admitting it, or you’re being hacked and don’t know it,” Cartwright said last year.

If communications between Minuteman control centers and their missiles are interrupted, the missiles can still be launched by ultra-high-frequency radio signals transmitted by special military aircraft. The ability to launch missiles by radio serves as a backup to the control centers—and also creates an entry point into the network that could be exploited in a cyberattack. The messages sent within the nuclear command-and-control system are highly encrypted. Launch codes are split in two, and no single person is allowed to know both parts. But the complete code is stored in computers—where it could be obtained or corrupted by an insider.

Some of America’s most secret secrets were recently hacked and stolen by a couple of private contractors working inside the N.S.A., Edward Snowden and Harold T. Martin III, both employees of Booz Allen Hamilton. The N.S.A. is responsible for generating and encrypting the nuclear launch codes. And the security of the nuclear command-and-control system is being assured not only by government officials but also by the employees of private firms, including software engineers who work for Boeing, Amazon, and Microsoft.

Lord Des Browne, a former U.K. Minister of Defense, is concerned that even ballistic-missile submarines may be compromised by malware. Browne is now the vice-chairman of the Nuclear Threat Initiative, a nonprofit seeking to reduce the danger posed by weapons of mass destruction, where he heads a task force examining the risk of cyberattacks on nuclear command-and-control systems. Browne thinks that the cyber threat is being cavalierly dismissed by many in power. The Royal Navy’s decision to save money by using Windows for Submarines, a version of Windows XP, as the operating system for its ballistic-missile subs seems especially shortsighted. Windows XP was discontinued six years ago, and Microsoft warned that any computer running it after April, 2014, “should not be considered protected as there will be no security updates.” Each of the U.K. subs has eight missiles carrying a total of forty nuclear weapons. “It is shocking to think that my home computer is probably running a newer version of Windows than the U.K.’s military submarines,” Brown said.In 2013, General C. Robert Kehler, the head of the U.S. Strategic Command, testified before the Senate Armed Services Committee about the risk of cyberattacks on the nuclear command-and-control system. He expressed confidence that the U.S. system was secure. When Senator Bill Nelson asked if somebody could hack into the Russian or Chinese systems and launch a ballistic missile carrying a nuclear warhead, Kehler replied, “Senator, I don’t know . . . I do not know.”

After the debacle of the Cuban Missile Crisis, the Soviet Union became much more reluctant to provoke a nuclear confrontation with the United States. Its politburo was a committee of conservative old men. Russia’s leadership is quite different today. The current mix of nationalism, xenophobia, and vehement anti-Americanism in Moscow is a far cry from the more staid and secular ideology guiding the Soviet Union in the nineteen-eighties. During the past few years, threats about the use of nuclear weapons have become commonplace in Moscow. Dmitry Kiselyov, a popular newscaster and the Kremlin’s leading propagandist, reminded viewers in 2014 that Russia is “the only country in the world capable of turning the U.S.A. into radioactive dust.” The Kremlin has acknowledged the development of a nuclear torpedo that can travel more than six thousand miles underwater before devastating a coastal city. It has also boasted about a fearsome new missile design. Nicknamed “Satan 2” and deployed with up to sixteen nuclear warheads, the missile will be “capable of wiping out parts of the earth the size of Texas or France,” an official news agency claimed.

..

Russia’s greatest strategic vulnerability is the lack of a sophisticated and effective early-warning system. The Soviet Union had almost a dozen satellites in orbit that could detect a large-scale American attack. The system began to deteriorate in 1996, when an early-warning satellite had to be retired. Others soon fell out of orbit, and Russia’s last functional early-warning satellite went out of service two years ago. Until a new network of satellites can be placed in orbit, the country must depend on ground-based radar units. Unlike the United States, Russia no longer has two separate means of validating an attack warning. At best, the radar units can spot warheads only minutes before they land. Pavel Podvig, a senior fellow at the U.N. Institute for Disarmament Research, believes that Russia does not have a launch-on-warning policy—because its early-warning system is so limited.

For the past nine years, I’ve been immersed in the minutiae of nuclear command and control, trying to understand the actual level of risk. Of all the people whom I’ve met in the nuclear realm, Sidney Drell was one of the most brilliant and impressive. Drell died this week, at the age of ninety. A theoretical physicist with expertise in quantum field theory and quantum chromodynamics, he was for many years the deputy director of the Stanford Linear Accelerator and received the National Medal of Science from Obama, in 2013. Drell was one of the founding members of jason—a group of civilian scientists that advises the government on important technological matters—and for fifty-six years possessed a Q clearance, granting him access to the highest level of classified information. Drell participated in top-secret discussions about nuclear strategy for decades, headed a panel that investigated nuclear-weapon safety for the U.S. Congress in 1990, and worked on technical issues for jason until the end of his life. A few months ago, when I asked for his opinion about launch-on-warning, Drell said, “It’s insane, the worst thing I can think of. You can’t have a worse idea.”

Drell was an undergraduate at Princeton University when Hiroshima and Nagasaki were destroyed. Given all the close calls and mistakes in the seventy-one years since then, he considered it a miracle that no other cities have been destroyed by a nuclear weapon—“it is so far beyond my normal optimism.” The prospect of a new cold war—and the return of military strategies that advocate using nuclear weapons on the battlefield—deeply unnerved him. Once the first nuclear weapon detonates, nothing might prevent the conflict from spiralling out of control. “We have no experience in stopping a nuclear war,” he said.

..

Donald Trump and Vladimir Putin confront a stark choice: begin another nuclear-arms race or reduce the threat of nuclear war. Trump now has a unique opportunity to pursue the latter, despite the bluster and posturing on both sides. His admiration for Putin, regardless of its merits, could provide the basis for meaningful discussions about how to minimize nuclear risks. Last year, General James Mattis, the former Marine chosen by Trump to serve as Secretary of Defense, called for a fundamental reappraisal of American nuclear strategy and questioned the need for land-based missiles. During Senate testimony, Mattis suggested that getting rid of such missiles would “reduce the false-alarm danger.” Contrary to expectations, Republican Presidents have proved much more successful than their Democratic counterparts at nuclear disarmament. President George H. W. Bush cut the size of the American arsenal in half, as did his son, President George W. Bush. And President Ronald Reagan came close to negotiating a treaty with the Soviet Union that would have completely abolished nuclear weapons.

Every technology embodies the values of the age in which it was created. When the atomic bomb was being developed in the mid-nineteen-forties, the destruction of cities and the deliberate targeting of civilians was just another military tactic. It was championed as a means to victory. The Geneva Conventions later classified those practices as war crimes—and yet nuclear weapons have no other real use. They threaten and endanger noncombatants for the sake of deterrence. Conventional weapons can now be employed to destroy every kind of military target, and twenty-first-century warfare puts an emphasis on precision strikes, cyberweapons, and minimizing civilian casualties. As a technology, nuclear weapons have become obsolete. What worries me most isn’t the possibility of a cyberattack, a technical glitch, or a misunderstanding starting a nuclear war sometime next week. My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The “Titanic Effect” is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'

- Eric Schlosser, World War Three, By Mistake, December 23, 2016


Context

The International Day for the Total Elimination of Nuclear Weapons

          '..another Cold War that may last even longer than the war with world communism.' (no replies)        
'..until Muslim scholars find a Koran key to the free world and lead their followers to an entrance.'

'Economists pondering about human action distinguish between four types of individual incomes; the Koran permits only two, which explains much poverty in the Muslim world. Economists speak of labor income which flows from services rendered either in self-employment or working for an employer; the Koran smiles upon this basic kind of income. Economists also discern interest income which, reflecting human frailty and mortality, flows from the differences between man’s valuation of present economic goods and future goods; the Koran condemns “riba”, that is, interest income, and threatens all creditors who may be tempted to demand “riba” with “the fire prepared for unbelievers.” Economists also like to wax eloquent about entrepreneurial income, commonly called profits, which may be earned through correct anticipation of economic changes; failure to anticipate changes correctly may inflict entrepreneurial losses. The Koran simply prohibits economic activity that involves uncertainty, risk, or speculation and may earn “ghara.” The prohibition obviously discourages and hampers economic changes, adjustments, modernizations, and improvements that are uncertain and risky.

..

Muslim clerics are the tutors and preceptors not only of Islamic theology but also of social and economic ideology. Surely, they may not descend to the level of envy but may fly into anger and passion about the sinful behavior of all non-believers, that is, Christians and Jews, who grow rich in market economies, engaging in uncertain, risky, and speculative economic activity and prospering on riba and ghara. For some clerics the United States is the “Great Satan” and Israel his little offspring. It cannot be surprising that faithful followers abhor, fear, and hate the Great Satan and wish him evil. When a few Muslim fanatics flew into the World Trade Center in New York, killing more than 2,900 men and women, and another hijacked plane hit the Pentagon, killing 189 employees, jubilant masses thronged streets across the Muslim world, celebrating and rejoicing about the destruction and massacre.

..

..Today, the United States is in the early stages of a long struggle with radical Islamism that has been waging war against this country for some thirty years. Radical Islamic states have been breeding, sheltering, and financing the terrorist armies and radical clerics are invoking divine favor upon them.

The Western world, and especially the United States, is facing the prospect of a long and bitter war with a fanatical enemy. It is a desperate enemy because powerful forces of change are eroding its very ideological foundation. Modern communication technology has opened the windows of the world and is allowing people everywhere to observe Western mores and living conditions. A network of communication satellites, for instance, is continuously receiving, amplifying, and rebroadcasting signals to earth. Western ideas are reaching the minds of people everywhere and changing social, economic, political, and educational institutions. It cannot be surprising that Muslim autocracies like to keep the windows closed by monopolizing and disallowing access to such technology.

It is doubtful that the U.S. military will crush and completely render inactive a desperate enemy consisting of an organized guerilla force of Allah-fearing men and women. A small army of suicidal fanatics, a diminutive percentage of one billion and three hundred million Muslims in 206 countries, may wear away the patience and resolve of the American public and its political and military commanders. Such a possibility does not in any way intimate a victory and sway of Muslim fanatics over the forces of the West. Its paramount strength does not rest on brute military might but on its free and open way of life, its private property order and individual enterprise system. Its windows are wide open and its busy subjects are at work all over the world, simple ambassadors or even missionaries of its order. Even if the United States should ever stumble and lose its way, the windows are wide open and the bright light of individual freedom and the private property order would remain visible in many other parts of the West. It is unlikely that it can ever be extinguished.

The U.S. military is not going to conquer many Muslim countries, but individual freedom and the private property order may in time..

..

We shall know the future only when it comes. But our thoughts like to live in the future, and what they see is another Cold War that may last even longer than the war with world communism. They see the Muslim world in a crisis which causes a few revolutionaries to strike at Americans. Insurgents may continue to lash out until Muslim scholars find a Koran key to the free world and lead their followers to an entrance.'

- Hans F. Sennholz, In Another Cold War, 2004


Context

'..the battle of ideas taking place in the Muslim world..'

(Bazaarmodel - To Heal - Teal) - '..is it possible to build a truly Evolutionary-Teal school?'

          '..Russia .. cyberpower proved the perfect weapon .. political sabotage..' (no replies)        
' “We’d have all these circular meetings,” one senior State Department official said, “in which everyone agreed you had to push back at the Russians and push back hard. But it didn’t happen.”

..

Mr. Putin, a student of martial arts, had turned two institutions at the core of American democracy — political campaigns and independent media — to his own ends..

..

..The Russians clearly had a more sophisticated understanding of American politics, and they were masters of “kompromat,” their term for compromising information.

..

..the hackings of the State Department, the White House and the Pentagon..

..

What seems clear is that Russian hacking, given its success, is not going to stop. Two weeks ago, the German intelligence chief, Bruno Kahl, warned that Russia might target elections in Germany next year. “The perpetrators have an interest to delegitimize the democratic process as such,” Mr. Kahl said. Now, he added, “Europe is in the focus of these attempts of disturbance, and Germany to a particularly great extent.” '



'..the White House’s reluctance to respond forcefully meant the Russians have not paid a heavy price for their actions, a decision that could prove critical in deterring future cyberattacks.

..

..President Vladimir V. Putin of Russia moved beyond mere espionage to deliberately try to subvert American democracy and pick the winner of the presidential election.

..

..A low-cost, high-impact weapon that Russia had test-fired in elections from Ukraine to Europe was trained on the United States, with devastating effectiveness. For Russia, with an enfeebled economy and a nuclear arsenal it cannot use short of all-out war, cyberpower proved the perfect weapon: cheap, hard to see coming, hard to trace.

..

The United States had two decades of warning that Russia’s intelligence agencies were trying to break into America’s most sensitive computer networks. But the Russians have always managed to stay a step ahead.

Their first major attack was detected on Oct. 7, 1996, when a computer operator at the Colorado School of Mines discovered some nighttime computer activity he could not explain. The school had a major contract with the Navy, and the operator warned his contacts there. But as happened two decades later at the D.N.C., at first “everyone was unable to connect the dots,” said Thomas Rid, a scholar at King’s College in London who has studied the attack.

Investigators gave it a name — Moonlight Maze — and spent two years, often working day and night, tracing how it hopped from the Navy to the Department of Energy to the Air Force and NASA. In the end, they concluded that the total number of files stolen, if printed and stacked, would be taller than the Washington Monument.

Whole weapons designs were flowing out the door, and it was a first taste of what was to come: an escalating campaign of cyberattacks around the world.

..

The Russians were also quicker to turn their attacks to political purposes. A 2007 cyberattack on Estonia, a former Soviet republic that had joined NATO, sent a message that Russia could paralyze the country without invading it. The next year cyberattacks were used during Russia’s war with Georgia.

..

Mr. Obama was briefed regularly on all this, but he made a decision that many in the White House now regret: He did not name Russians publicly, or issue sanctions. There was always a reason: fear of escalating a cyberwar, and concern that the United States needed Russia’s cooperation in negotiations over Syria.

“We’d have all these circular meetings,” one senior State Department official said, “in which everyone agreed you had to push back at the Russians and push back hard. But it didn’t happen.”

..

Last year, the attacks became more aggressive. Russia hacked a major French television station, frying critical hardware. Around Christmas, it attacked part of the power grid in Ukraine, dropping a portion of the country into darkness, killing backup generators and taking control of generators. In retrospect, it was a warning shot.

..

..CrowdStrike’s nicknames for the two Russian hacking groups that the firm found at work inside the D.N.C. network. Cozy Bear — the group also known as the Dukes or A.P.T. 29, for “advanced persistent threat” — may or may not be associated with the F.S.B., the main successor to the Soviet-era K.G.B., but it is widely believed to be a Russian government operation. It made its first appearance in 2014, said Dmitri Alperovitch, CrowdStrike’s co-founder and chief technology officer.

..

Only in March 2016 did Fancy Bear show up — first penetrating the computers of the Democratic Congressional Campaign Committee, and then jumping to the D.N.C., investigators believe. Fancy Bear, sometimes called A.P.T. 28 and believed to be directed by the G.R.U., Russia’s military intelligence agency, is an older outfit, tracked by Western investigators for nearly a decade. It was Fancy Bear that got hold of Mr. Podesta’s email.

..

It was bad enough that Russian hackers had been spying inside the committee’s network for months. Now the public release of documents had turned a conventional espionage operation into something far more menacing: political sabotage, an unpredictable, uncontrollable menace for Democratic campaigns.

..

Julian Assange, the WikiLeaks founder and editor, has resisted the conclusion that his site became a pass-through for Russian hackers working for Mr. Putin’s government or that he was deliberately trying to undermine Mrs. Clinton’s candidacy. But the evidence on both counts appears compelling.

..

Mr. Putin, a student of martial arts, had turned two institutions at the core of American democracy — political campaigns and independent media — to his own ends. The media’s appetite for the hacked material, and its focus on the gossipy content instead of the Russian source, disturbed some of those whose personal emails were being reposted across the web.

..

In late 2014, hackers working for Kim Jong-un, the North’s young and unpredictable leader, had carried out a well-planned attack on Sony Pictures Entertainment intended to stop the Christmastime release of a comedy about a C.I.A. plot to kill Mr. Kim.

In that case, embarrassing emails had also been released. But the real damage was done to Sony’s own systems: More than 70 percent of its computers melted down when a particularly virulent form of malware was released. Within weeks, intelligence agencies traced the attack back to the North and its leadership. Mr. Obama called North Korea out in public, and issued some not-very-effective sanctions. The Chinese even cooperated, briefly cutting off the North’s internet connections.

As the first Situation Room meetings on the Russian hacking began in July, “it was clear that Russia was going to be a much more complicated case,” said one participant. The Russians clearly had a more sophisticated understanding of American politics, and they were masters of “kompromat,” their term for compromising information.

..

..code was put out in the open by the Russians as a warning: Retaliate for the D.N.C., and there are a lot more secrets, from the hackings of the State Department, the White House and the Pentagon, that might be spilled as well. One senior official compared it to the scene in “The Godfather” where the head of a favorite horse is left in a bed, as a warning.

..

As the year draws to a close, it now seems possible that there will be multiple investigations of the Russian hacking — the intelligence review Mr. Obama has ordered completed by Jan. 20, the day he leaves office, and one or more congressional inquiries. They will wrestle with, among other things, Mr. Putin’s motive.

..

Did he seek to mar the brand of American democracy, to forestall anti-Russian activism for both Russians and their neighbors? Or to weaken the next American president, since presumably Mr. Putin had no reason to doubt American forecasts that Mrs. Clinton would win easily? Or was it, as the C.I.A. concluded last month, a deliberate attempt to elect Mr. Trump?

In fact, the Russian hack-and-dox scheme accomplished all three goals.

What seems clear is that Russian hacking, given its success, is not going to stop. Two weeks ago, the German intelligence chief, Bruno Kahl, warned that Russia might target elections in Germany next year. “The perpetrators have an interest to delegitimize the democratic process as such,” Mr. Kahl said. Now, he added, “Europe is in the focus of these attempts of disturbance, and Germany to a particularly great extent.” '

- Eric Lipton, David E. Sanger and Scott Shane, The Perfect Weapon: How Russian Cyberpower Invaded the U.S., December 13, 2016


Context '[Russia] may become a threat to the world. That is the worst thing that could happen to Russia.' - Yegor Gaidar

'..Russian strategy of hybrid influence and destabilization .. German Council on Foreign Relations.'

'German intelligence says Russia is trying to destabilize German society..' - '..war that Moscow is waging against the West..'

'[Putin is doing] anything that can and will expand Russian influence to U.S.S.R.-era levels of power.'


'..Zero tolerance for Russian intrusions .. Estonia .. policy of publicly naming or prosecuting spies..'

'..the Soviet Union was cut off from Western financial markets and was effectively under permanent sanctions..'

          Links der Woche, 30. Oktober 2011        
Firefox With Bing Search: Microsoft, Mozilla Announce New Partnership – The Huffington Post Breaking News: Microsoft to ditch IE, in bed with Mozilla (O RLY?) Für diejenigen unter uns, die nicht Chuck Norris sind The State of the Intranet The Ultimate Collection of Professional Free Fonts connect.BASF – the Online Business Network Traditionsunternehmen erfindet interne ... weiterlesen
          Links der Woche, 24. Juli 2011        
RAMP: Easy Content Deployment for WordPress | alexking.org Google+ is the social backbone – O’Reilly Radar Einen besseren Hintergrundartikel zu G+ habe ich noch nicht gelesen. Weblogs als Fels in der Brandung der Social Networks | WordPress & Webwork Warum es wichtig ist, selbst die Kontrolle zu behalten.
          Google Classroom for SPED        

Google Classroom is a new offering for districts who use Google Apps for Education (GAFE).  Classroom is a combination of Edmodo and Doctupus; part social network and part document manager.  Once Classroom is enabled you are able to create classes and invite your students to join.  Google creates a folder in your Drive, a place for you to upload and/or create documents to share with those students.  From the main Classroom page you have options for posting Announcements or create assignments.  Assignments can be linked to a Drive Document, Youtube video, weblink or you can attach a file.  Students can then complete the work and turn it in via Classroom.  When using Google Docs you have the option to allow students to view the document, edit one document or it will create a separate document for each student.

For self-contained teachers this immediately solves issues with distributing and collecting Google Doc files.  It's also a place for students to communicate questions with their classmates or you.  While the interface is limited and the themes are pretty basic, I think the potential for this product is astounding.

From my new perspective of a push-in support teacher, I see this as a way to push out modified assignments to students.  Part of our new reading curriculum involves discussion guides and we, as a special education team, are considering modifying them so they are Google Docs.  This would give me a way to push out specific docs, to specific students easily.  I also think giving students a place they can post questions might be useful, especially students who may not want to speak up in class.  I can see it as a way for those students to contact me when we are not together in class.

I'm going to continue to give it a try, and see if there are other ways it can be utilized.  I'd love to hear some of your thoughts on using Google Classroom.  This week Google opened it all users with GAFE account, but there is one caveat.  You and your students must be on the same domain.  This is actually a problem in my district, my email ends in "d57.org" and our students are "students.d57.org" so I cannot create a Classroom unless I have a different login.  This is frustrating, but Google is aware and hopefully they will fix it in the near future.



Share this
Do you know somebody else who would find this post interesting or useful? Please forward it to them. Did somebody forward this post to you? Visit Teaching All Students and subscribe to receive posts for free. If you need a RSS Reader please visit this post Google Reader Replacements.

          LATAR BELAKANG DAN SEJARAH JARINGAN KOMPUTER        
LATAR BELAKANG DAN SEJARAH
Sejarah jaringan komputer global ( dunia ), dimulaipada tahun 1969, ketika Departemen Pertahan Amerika, membentuk Defense Advance Research Projects Agency ( DARPA ) yang bertujuan mengadakan riset mengenai ‘cara menghubungkan sejumlah komputer sehingga membentuk jaringan organik’.

Program riset ini kemudian dikenal dengan nama ARPANET ( Advance Research projects Agency Network ). pada tahun 1970, lebih dari 10 komputer telah berhasil dihubungkan ( satu dengan yang lain ), saling berkomunikasi, dan membentuk sebuah jaringan. pada atahun 1972, Roy Tomlinson berhasil menyempurnakan program e-mail yang ia ciptakan setahun yang lalu untuk riset ARPANET.

Program e-mail tersebut begitu mudah dan lansung populer saat itu. pada tahun yang sama, icon [@] diperkenalkan sebagai lambang yang menunjukkan “at” atau “pada”. Tahun 1973, jaringan komputer yang diberi nama ARPANET mulai dikembangkan meluas sampai luar Amerika Serikat. komputer di University College di London merupakan komputer diluar Amerika yang menjadi anggota jaringan ARPANET. pada tahu yang sama pula, dua orang ahli komputer Vinton Cerf dan Bob Khan mempresentasikan sebuah gagasan yang lebih besar yang menjadi cikal bakal pemikiran International Network. ide ini dipresentasikan untuk pertama kalinya di Sussex University.
Hari bersejarah berikutnya terjadi pada tanggal 26 Maret 1976. ketika itu, ratu Inggris berhasil mengirimkan sebuah e-mail dari Royal Signals and Radar Establishment di Malvern. setahun kemudian, lebih dari 100 komputer telah bergabung dalam system ARPANET dan membentuk sebuah jaringan atau Network.
Pada tahun 1979, Tom Truscott, Jim Ellis, dan Steve Bellovin menciptakan Newsgroups pertama yang diberi nama USENET ( User Network ). pada tahun 1981, France Telecommenciptakan sebuah gebrakan baru dengan meluncurkan telepon televisi pertama dunia ( orang dapat saling menelepon sambil berinteraksi denagan Video link ).
seiring dengan bertambahnya komputer yang membentuk jaringan, dibutuhkan sebuah protokol resmi yang dapat diakui dan diterima oleh semua jaringan. untuk itu, pada tahun 1982 dibentuk sebuah komisi Transmission Control Protocol ( TCP ) atau lebih dikenal dengan sebutan Internet Protocol ( IP ) yang kita kenal hingga saat ini. sementara itu, didaratan Eropa muncul sebuah jaringan tandingan yang dikenal dengan Europe Network ( EUNET ) yang meliputi wilayah Belanda, Inggris, Denmark, dan Swedia. Jaringan eunet ini menyediakan jasa e-mail dan newsgroup USENET.

Untuk menyeragamkan alamat jaringan komputer yang sudah ada, pada tahun 1984 diperkenalkan system dengan nama DOMAIN yang lebih dikenal dengan Domain Name System ( DNS ). dengan system DNS, komputer yang tersambung dengan jaringan melebihi 1.000 komputer. pada tahun 1987 diperkirakan komputer yang tersambung ke jaringan tersebut melonjak 10 kali lipat menjadi 10.000 komputer lebih.
Tahun 1988, Jarkko Oikarinen berkebangsaan Finlandia menemukan sekaligus memperkenalkan Internet Relay Chat atau lebih dikenal dengan IRC yang memungkinkan dua orang atau lebih pengguna komputer dapat berinteraksi secara langsung dengan pengiriman pesan ( Chatting ). akibatnya, setahun kemudian jumlah komputer yang saling berhubungan melonjak 10 kali lipat. tak kurang dari 100.000 komputer membentuk sebuah jaringan.pertengahan tahun 1990 merupakan tahun yang paling bersejarah, ketika Tim Berners Lee merancang sebuah programe editor dan browser yang dapat menjelajai komputer yang satu dengan yang lainnya dengan membentuk jaringan. programe inilah yang disebut WWW atau World Wide Web.

Tahun 1992, komputer yang saling tersambung membentuk jaringan sudah melampaui lebih dari stau juta komputer. pada tahun yang sama muncul satu istilah yang beken, yaitu Surfing ( Menjelajah ). tahun 1994, situs-situs Dunia mulai tumbuh dengan subur ( setidaknya, saat itu terdapat 3.000 alamat halaman ) dan bentuk pertama kalinya Virtual Shopping atau e-retail muncul diberbagai situs. Dunia langsung berubah dengan diluncurkannya perusahaan Search Engine Pertama, yaitu Yahoo!. yang dibangun oleh David Filo dan Jerry yang pada bulan April 1994. Netscape Navigator 1.0. diluncurkan dipenghujung tahun 1994.


          Three days in Berlin (or improving the pim user experience)        

KDE Project:

Last weekend I've met with some of our old timer KDEPIM developers and some of the newer ones who are interested in KDEPIM or related technologies in the KDAB offices in Berlin.
Being a KDAB employee for a few years already (wow, time is passing quickly), the place was familiar, the people looked familiar. The foosball table was slightly familiar, although some players changed their dresses in order to spread confusion inside the visitor's heads. That is the only reason we've lost against locals with 5-0, 5-0.
Suprisingly enough, the table wasn't used that much. Why? Because people were busy either working and talking. What they talked about I don't know too much, as I focused on some issues I planned to fix, but others can testify that Volker did not sit too much in front of his computers, but was dragged from one place to another for various discussions.
Most of us started on Friday around noon. I won't tell too much about what others did, that is mostly their problem. Especially if they were on the other side of the room and I didn't saw their screens, I can't tell if they worked at all or not. They looked like they did though. ;) I can share some things about what some sitting nearby did. See later.
As recently I became the de-facto maintainer and bugfixer for mail filters, I worked mostly on them. Unfortunately the first attempt to fix a bug failed: a bug that bothers me, although it is not the most reported one. It is about mails not being filtered for a while after a resume from hibernation. It is hard to reproduce, and although I run into it, I couldn't reproduce reliably enough and in a way I can debug it. After fighting with it and realising it won't work, I gave up. See you next time.
Meantime we had some excellent food in an Indian restaurant, then when finally everybody arrived (almost everybody to be honest, plus even some more from KDAB who didn't sign up, but show up there), we were ready to start with presenting the kdepim and Akonadi architecture. Old time pimsters Volker Krause, Kevin Krammer and Tobias Koenig helped me with it, and sometimes saved me, as my knowledge in some area proved to be superficial. We ended up with a pretty impressive drawing on the whiteboard:
Hopefully for those being on site it was understandable.

Time passed, so we went out for dinner to a Greek restaurant at the corner. Nice place, third time being there, good food (seems Berlin has only good eating places). We even saw how Germany won over Ireland. Too bad Steveire (Stephen Kelly) was not there... We continued with some more talks and hacking, then everybody went to their sleeping places.
Some left earlier, some later waiting for remote developers to show up and discuss the patches (he didn't show up).

Day 2
Next day started around 9 o'clock for some. Later for others. I continued with the filter debugging and fixing. I looked at the bugreports and tried to come up with some bugs that are both would help the users and myself. I'm selfish, I want to fix the bugs I run into. ;) One problem that bothered me for a long time is that email content from online IMAP is downloaded even if no filter for IMAP requires it (but a filter for e.g POP3 needs the full content). Now this is fixed and those who use online imap could notice a great speedup in mail syncing (depending on their filter setup). Another often reported issue was duplicating the mails, especially after spam filtering. You've ended up with a mail in the spam folder and a mail in the original place. This could be combined with a conflict dialog shown up as well for that mail. This problem actually revealed a not-well handled case down inside the Akonadi stack that was created by a reordering of filter commands in the filtering code. For those who want technical details: if there was a move action (like "move mail to spam folder") followed by a modify action (like "mark as read"), the filter reordered this to "mark as read" followed by a move. Unfortunately this exposed two problems, (mostly, but not only) IMAP specific: on IMAP you can't modify a mail, instead you create a new one and delete the old. What happened here is that a filter changed the mail (run through bogofilter/spamassasin), then the "mark as read" action was executed, which uploaded the changes, including the changed mail to the IMAP server. This caused a new ID for the item on the IMAP server. The mail with the old ID was deleted. Then the filter agent performed a move, but he had only the *old* ID, before the modifications. The move - if performed between two different resources, like IMAP and local maildir - is technically a copy followed by a delete. The copy worked fine, but the delete didn't. It tried to delete the old mail again (which was gone), not the modified version. That's how you ended up with a duplicate.
The current solution is to reorder the filtering pipeline, so the move is performed before the flag modifications. The extra benefit is that the filtered message is not uploaded again just to be deleted the next second. Speedup, less network traffic, better user experience. This doesn't fix the main problem with Akonadi, but it is an acceptable workaround. The reordering is so far only in the master branch (KDE 4.10), but the relevant code will be backported to the 4.9 branch, so it will be in 4.9.3.
And speaking of conflicts, that was the next hot topic, and one of the often reported bugs. It was mostly caused by conflicting flag changes (read/spam/important/etc), either caused by KMail itself plus the filtering or just KMail. After some discussion we agreed, that reporting conflicts on flag changes doesn't make sense, so we should not bother the user. It is not data loss, and in worst case some flag is reset. In normal case nothing wrong happens, as Akonadi is able to merge two changes in the flags (or so claims Volker).
I have to admit that this fix was not completed at the sprint, I finished it today, as I noticed more code in KDEPIM that didn't disable conflict check on flag changes.
While doing the changes, I did quite some refactoring, cleaning up the code as much as I could do for the parts I touched. The code was originally deep inside KMail (as most of other code), got extracted from it for 4.8.0, and now we are at the stage that we can make the extracted code more cleaner, we can remove some things that doesn't make sense anymore now that the filtering is not inside KMail.
While reading the bug reports, I also run into one indicating that mails arriving to an MBOX account (like /var/spool/mail/username) are not filtered automatically. Sounds like an easy bug to fix and so was it. Now they are filtered.
Finally another annoying issue was fixed: there was no indication that filtering is ongoing. Now when this happens, you can see in the KMail's progress bar.
The net result of the above: faster filtering, less annoying and useless error dialogs for the users. And according to bugzilla, 31 bugs less (some were duplicates though).

Nepomuk...one of the things that, well, so far I was always recommending for users to turn off. Slight detour here: what is Nepomuk and its relation to KMail? Nepomuk helps you to find data. It indexes all kind of data and with some queries you can find e.g every file where my name is mentioned, all email addresses from any file, etc. There is a process that goes through the akonadi data (emails, calendars, etc) and "feeds" to it for Nepomuk to be indexed. Then there are queries and code in KMail accessing Nepomuk: getting email addresses for composer's autocompletion, searching inside mail bodies, tagging your emails with custom tags, etc.
Unfortunately there are problems around it. One is that some queries ae processed quite slowly, that in turn slows down KMail, leading to poor user experience. E.g switching between mails, sending mails, etc. is slow. Or startup is slow or even blocked. I tried to fix the last part as I just run into it, but as this was my very first Nepomuk related patch, I'm not sure 100% succeeded. We found a problem with the Nepomuk API itself, and I informed Vishesh, the Nepomuk developer about it (even if I used non-blocking calls against Nepomuk, one call is blocking without question). He suggested something I might try later, although I'd be more happier if somebody with real Nepomuk knowledge could give a review of the pim Nepomuk usage.
Then there is the Akonadi feeder, that gives the data to Nepomuk. Something is not perfect there and the indexing causes a serious slowdown, where either itself or Nepomuk (actually its storage backend, virtuoso) starts to use the CPU *a lot*. This is the main reason I recommend to users to disable Nepomuk so far. We had Christian Mollekopf the author of the feeder in the sprint, and he worked on some optimizations. Hopefully this will improve the situation. Meantime we (and I) tried to convince Vishesh to use KMail, so he can see himself the problems our users face.

As a break we had another presentation, this time about KMail itself, what components make up KMail, how they are distributed. As far as I saw, this was less interesting to the audience, they rather looked at their computers and hacked on something. Luckily our KMail maintainer, Laurent Montel, is super active, but I wouldn't mind more contributors. Too bad he wasn't at the sprint.

We had a lunch at a nearby place, nothing extra, but the food was (again) good.

What did other do? Let's see what I can remember... Sune dreamed about crypto stuff and composite jobs. He worked on making some cryptographic code asynchronous and started to get faimiliar with kdepim code. I'd not say he picked up the easiest job.
Volker run around all the time, discussed various things like "spanish sync" with Alex Fiestas (see here), database backends with Martin, change recorder with David Faure (who remotely joined the meeting and got lost inside the change recorder code ... he has the solution now in his head, so be patient, we will end up with a better implementation for it that again speeds up Akonadi), job pipelines with me, and who knows what with others, as for a long time he just disappeared with a bunch of developers. They actually ended up in the lobby discussing "stuff". Milian Wolf, who is not (or not yet?) a KDEPIM developer, but mainly a KDevelop one, joined us and used massif to track down some ugly memory usage in KMail. And he did a good job in it. Previously KMail used more and more memory as you navigated between large folders (Alex mentioned some 2GB for him), while now it levels up at one point and doesn't increase. He might blog himself about, as he has also some nice graphs.
Then there were two guys from KDAB, who are old time pim developers (quiz: find their names in this blog), but they cooked something else, not related to KDEPIM, not related concretely to KDE, but to a lower level: to Qt. It is an amazingly cool stuff, but I don't want to give more details. Expect it to be presented a the Qt Developer Days, either in a talk or at the KDAB booth. Don't worry, I'm pretty sure it will be freely available what they did and KDE can enjoy it in the future.
I'm sorry that I don't remember what the rest did. In general I know that Martin Klapetek worked on the social network resources, Mark Gaiser, who recently started to work on KDEPIM stuff eagerly listened to our presentations and worked on a QML calendar application, Alex kept reporting bugs and discussed improvements with Volker, while John Layt, the "timezone KDE guy" worked on plasma calendar related issues.
As a KDE person Chani also joined us for a while, we quickly nominated her as the QML and Plasma person, so all questions related to them were immediately redirected to Chani. Jos Poortvilet was also supposed to join for some talks, but he could show up only on Sunday for personal reasons.
At the end of the day everybody was so busy, so instead of going out for eating, we just ordered some pizza. And most of us stood in the office well past midnight.

Day 3
Well, the above partially happened on Sunday. It was a shorter day for me, due to the late night standup before, and that I had to go to the airport after lunch. A lunch that wasn't exactly as planned. We went out for a Doner Kebab place that is supposed to be the best one in Berlin. It is just a small kiosk on the sidewalk in a street, but man, there was a big queue for it. On a Sunday! Locals says it is worse on weekdays. Even after almost an hour, we still had 10 persons in front of us, my departure time was approaching, so I gave up and instead bought some (quite good) chinese fast-food from a nearby place, then rushed to the airport.
A long journey awaited me with a 3 hour stopover in Munich, but luckily I had a power supply there and even some network (they offer 30 minutes/day/phone number), so I could continue on the work I started at the sprint. After flying and driving another 2.5 hours, I arrived late (or rather early) morning next day back home, and after sleept until around 10. Then I started to work again for KDAB, a work that is just as enjoyable as working for KDE. After all, the two communities has a serious overlap. ;)
That's from the sprint. If you'll be at the Qt Developer Days Europe, we might meet there. I'm looking forward for a good conference.


          Ø¨Ø§ حساب جی میل خود کامپیوتر را کنترل کنید        
امروزه استفاده از برنامه های Remote برای دسترسی و کنترل کامپیوتر از راه دور در حال گسترش است. اما آیا می  دانستید که شما می توانید از طریق حساب جی... ادامه مطلب »
          UNI Harvest Festival        

The Panther Plot, the on-campus student garden, invites all students, staff, faculty and community members for a celebration of the harvest season! Join us for appetizer samples made with produce straight from the garden, cooking demonstrations by Food Network personality Amy Thielen, music spun by a local DJ, games, and tours of the garden. 

Special Events
Student Organizations
Location: 
The Panther Plot
Thursday, September 4, 2014 -
3:00 pm to 5:00 pm
Enter Your Email: 
Name: 
Kelsey Ewald
Share/Save
          G4NP Around the Globe - Zooming in on Action Against Hunger        

Every dollar and minute count to further your cause and focus on your mission. We’re pleased to highlight nonprofits who were able to make greater impact with fewer resources by using Google tools—from G Suite to Google Ad Grants–made available through Google for Nonprofits (G4NP) at no charge.

Varying in size, scope, and timezones, these nonprofits from around the world share one thing in common: utilizing the G4NP suite of tools to help their specific needs. G4NP offers nonprofit organizations across 50 countries access to Google tools like Gmail, Google Calendar, Google Ad Grants and more at no cost. This week, we’ll take a look at how the nonprofit Action Against Hunger utilizes these tools to increase productivity, visibility, and donations,  in order to improve lives in  the communities they serve.

Action Against Hunger

In 2016 alone, Action Against Hunger provided nourishment to over 1.5 million starving children(1). In order to save lives with nutritional programs, Action Against Hunger looked to Google for aid—not for food, but for technology. Action Against Hunger now utilizes five Google technologies that have drastically improved their ability to save lives around the globe.

Raising Awareness with Google Ad Grants & Analytics

For major international emergencies, like the Ebola outbreak or the South Sudan famine, Action Against Hunger needs a way to inform people and recommend ways to get involved. With Ad Grants, the nonprofit activates targeted keywords relating to the crises to drive people to their page and empower them to take action. Google Analytics then allows them to track their effectiveness and adjust accordingly to increase engagement and improve their fundraising techniques. With this data-driven strategy and the tools’ ability to optimize campaigns, Action Against Hunger has nearly doubled funding year-over-year. In fact, Ad Grants brought 158,000 people to their website in the past year alone, raising $66,000 which is equal to treating 1,466 hungry children.

Ad Grants brought 158,000 people to their website in the past year alone, raising $66,000 which is equal to treating 1,466 hungry children.

Increasing Productivity with G Suite

When working with a global network and managing hundreds of programs abroad, collaboration and communication are key. After experiencing unnecessary latencies in their operations, Action Against Hunger has since adopted G Suite which streamlined their workflow. The nonprofit is especially fond of Gmail, Hangouts, and Drive where Action Against Hunger employees can message each other quickly, share files securely, and collaborate on Docs in real-time—avoiding duplication of efforts and saving time.

Fundraising with One Today & YouTube

To drive donations and expand awareness to broad audiences, Action Against Hunger uses One Today, a Google app that allows users to easily donate $1 or more towards causes they care about. Campaigning on One Today on World Food Day in 2016,  Action Against Hunger raised more than $1,200 in support of their cause with each dollar going directly helping those in need. Additionally, Action Against Hunger creates and shares content on YouTube to reach their global audience, and is  beginning to use the YouTube donation cards to further increase donations. The large exposure and website referrals from both YouTube and Google+ helped Action Against Hunger raise over $20,000.

Using Google products Action Against Hunger gained extra time and energy to focus on what really matters: feeding the hungry.

To read more about Action Against Hunger’s story and learn how they used Google tools so effectively, visit our Google for Nonprofits Community Stories page. Stay tuned in the coming weeks for more inspirational stories about nonprofits using technology to help their cause.

To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours free access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.

Footnote:  Statements are provided by Nonprofits that received products as part of the Google for Nonprofits program, which offers products at no charge to qualified nonprofits.



          Improve your nonprofit’s account security with 2-step verification        

While online accounts allow nonprofits to easily communicate with partners, volunteers and donors across the world, this shared network can also leave your account vulnerable to intruders. As your nonprofit continues to grow its online presence, it’s crucial to keep confidential information (e.g., finances or donor’s information) safe. While passwords have historically been the sole guardian for online account access, research from Google has shown that many passwords and security questions can easily be guessed. That's why we strongly recommend that all nonprofits using GSuite for Nonprofits, or Google products like Gmail, use 2-Step Verification (2SV) as an additional protection on their account(s). 

Account hijacking—a process through which an online account is stolen or hijacked by a hacker—constitutes a serious threat to your nonprofit’s operations. Typically, account hijackings are carried out by phishing attempts or hackers who guess weak passwords. Because of this, it’s especially important for your nonprofit to maintain strong and unique account passwords to keep sensitive data safe.

But 2SV goes beyond just a strong password. It's an effective security feature that combines "something you know" (e.g., a password) and "something you have" (e.g., a text, a prompt, or a Security Key) to protect your accounts. Think of this like withdrawing money from an ATM/cash machine: You need both your PIN and your debit card.

Google Authentication app.png
Our free Google Authenticator app is available for Android and iOS devices, which generates a code for you each time you want to sign in to your account.

Now that you know what 2SV is, head over to our Help Page to start improving your nonprofit’s online security now. (Quick tip: Remember to keep your account settings up to date and configure backup options to use if your phone is ever lost or stolen). Stay safe, nonprofits!  

To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more at no charge. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.


          A nonprofit's guide to online security: So you want to learn the lingo?        
This year marks the 25th anniversary of the World Wide Web becoming publicly available. For many of us, this is a reminder of just how much the Internet has transformed our daily lives. This rings true for nonprofits too: The Internet has revolutionized the way that nonprofits communicate, fundraise, and recruit volunteers. It has enabled nonprofits like yours to share their mission with a global audience. To raise awareness. And to change the world. 

But the power of the Internet also comes with great responsibility -- namely the need to keep information safe and secure. As a nonprofit, it can be difficult to keep up with online security, especially when terminology seems complicated. Yes, you might have heard of terms like “phishing” or “cookies,” but what do they mean?

Today, you can find the answers to your questions with our quick & easy to guide to online security terminology. In less than five minutes, you’ll be well on the way to helping keep your nonprofit safe on the Internet. 

Let’s get started! Here’s a quick guide to familiarize yourself with common lingo and learn how to distinguish terms that are friends vs foes in the online security realm. 


THE BAD GUYS: MALICIOUS ACTIONS/TERMS

  • Advanced Fee Fraud (419 scams): A technique which tricks users into sending or paying money to fraudsters on the promise of receiving greater rewards afterwards. It is most commonly associated with Nigeria, and 419 is the section of the Nigerian legal code that covers this fraud.
  • Botnet: A network of computers that are infected with malicious software without users’ knowledge, used to send viruses and spam to other computers.
  • Malware: Malicious software with the purpose of infecting devices and systems, gathering personal information, gaining access to systems or disrupting the operations of the device or systems. Essentially, any software that maliciously alters or compromises the system or device.
  • Phishing / Social Engineering Attack: An attempt by hackers who pose as trustworthy individuals or businesses in order to get your personal information such as usernames, passwords, and financial information.
  • Trojans: Malicious programs posing as or bundled with legitimate ones, which are designed to compromise your system. They are usually installed on computers from opening attachments in scam emails or by visiting infected websites. The term comes from the Trojan Horse in Greek mythology.

How to avoid social engineering attacks

THE GOOD GUYS: ONLINE SAFETY TERMS


  • [Internet] Cookie: A piece of data from a visited website and stored in the user's web browser in order to remember information that the user has entered or engaged with such as items in a shopping basket on an e-commerce site.
  • Encryption: The process of encoding data, messages, or information, such that only authorized parties can read it.
  • Firewall: A security system used to block hackers, viruses, and other malicious threats to your computer. It does this by acting as a barrier, acting on predetermined rules, which allows trusted traffic but blocks untrusted or non-secure traffic. 
  • HTTPS (Hypertext Transfer Protocol): is the protocol for secure communications over a computer network used on the Internet. It essentially provides authentication of the website and the web servers associated with it. 
  • Transport Layer Security (TLS): TLS is a protocol that encrypts and delivers mail securely, both for inbound and outbound mail traffic. It helps prevent eavesdropping between mail servers – keeping your messages private while they're moving between email providers. 
  • Two Factor Authentication / Two Step Verification: A method of using an additional process to verify your identity online. It combines both ‘something you know’ (like a password) and ‘something you have’ (like your phone or security key) — similar to withdrawing money from an ATM/cash machine, where you need both your PIN and your bank card.

That’s a wrap for now! Pass on these tips to your nonprofit partners to stay safe and secure online, so you can focus on what matters most: changing the world. 

//

To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more at no charge. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.


          From LA to Tokyo: YouTube Spaces opens production studios to nonprofits free of charge        
We know that having a physical space to do your work matters, but it’s not just about where you work — it’s about what you create there. So today, we’re announcing special access to YouTube Spaces, YouTube’s global network of production studios, for eligible nonprofits to learn, connect, and create great content for YouTube.

Given that Google was started in a garage, we’re more than familiar with the limits of physical space. As a nonprofit, it can be difficult to find access to great spaces for video production, especially when time, location, and money are constraining factors. As a result, space often becomes limiting, rather than limitless, to producing great content on YouTube.

From LA to London, Tokyo to Mumbai, Berlin to São Paulo, YouTube Spaces empower nonprofits by providing them exclusive access to the best production resources around — all at no cost. All enrolled nonprofits with 1,000 or more subscribers are now eligible to apply for production access at YouTube Spaces.

But we’re also offering more than just physical space. In addition to our state-of-the-art production facilities, YouTube Spaces brings together creatives of all stripes. YouTube Spaces offers nonprofits opportunities to learn new skills through live workshops, as well as collaborate with the YouTube community through events, panels, screenings, and more! 

YouTube Spaces
Don’t know where to begin? Once enrolled in and approved by YouTube for Nonprofits, start with theYouTube Creator Academy. From there, nonprofits can take advantage of the workshops offered by YouTube Spaces to establish a successful foundation on the platform. From lessons on building your channel to learning physical production, these workshops will help your nonprofit define its strategy and engage subscribers. Then, it’s time to get the cameras rolling! 

Get out of your garage, and get ready to create something amazing. After all, spaces are not just about where we we work -- it’s about what we create there.

Find out more about the YouTube Spaces here. 


To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours free access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.

Nonprofit must have signed up for the Google for Nonprofits program and be enrolled specifically in the YouTube for Nonprofits product with a YouTube channel that has at least 1,000 subscribers. Qualifying YouTube channels must be free of copyright and terms of use strikes.


          Helpdesk Analyst- Alameda (US) - Metaswitch Networks        
Los Altos, CA - Megan Hogan
May 16, 2017 at 2:12 PM
The role

We have a highly expert IT Services team based in both the US and UK, who are responsible for designing, building and maintaining the company?s IT infrastructure as part of the wider Company DevOps team, which provides tools and
          Senior Analyst FP&A (Sales) - Metaswitch Networks        
Los Altos, CA - Senior Analyst FP&A (Sales), Los Altos, CA

Merced Myking
June 16, 2017 at 2:12 PM


JOB DESCRIPTION ? Senior Analyst FP&A (Sales)



The FP&A Role supporting Sales Organization

This is a key management role within the Finance organization of Metaswitch
          Can’t Keep A Good CTU Agent Down: The Return of 24 and Jack Bauer        
And so it has begun! The 2013-14 television season is being birthed in earnest as we recover from last week’s bloody cancellation of over twenty failed shows by the big four (and little one) broadcast networks. They are making way for shinier, newer and hopefully more successful offerings that are to restore our faith in … Continue reading
          NetApp Administrator (Cleared) 2017-019        
TX-San Antonio, Program Overview: US Army North is the Army Service Component Command (ASCC) to US Northern Command (NORTHCOM), and must be capable to stand up and deploy multiple task forces in the event of natural or man-made disasters. The Army North Information Technology Directorate, known as the “G-6,” provides Help Desk/Service Desk, Network Operations Center (NOC), technical management services, and Infor
          How Machine Learning Is Helping Neuroscientists Crack Our Neural Code        
A big challenge in neuroscience is understanding how the brain encodes information. Neural networks are turning out to be great code crackers.
          5 Red Hot Picks for Electrifying Gains From AI & Automation        
Two catchphrases have caught the imagination of investors and companies at the moment, deep learning networks and machine learning. Both these ...
          Business in Buffalo        

Allot was accomplished while back in Buffalo over break. Some of it was already mentioned on facebook but this is where I can do some less official ranting.

So what I want to talk about is doing business in Buffalo. I’m sure allot of people have heard horror stories about working with in the city limits. I know for years people don’t me, don’t even bother if you’re not in the old boys club you can’t get anywhere in the city.  My experience was completely the opposite.

We had narrowed our search into the Black Rock area. I think it’s really an area on the up and up. The people there are really passionate about the neighborhood and eager for business to come back. The success of the black rock bar and kitchen and delish are sort of the test beds. As Chippewa seems to be  kicking out the college crowd there is going to need to be somewhere for all those older college students to go. I’m not saying Black Rock should open clubs and go crazy, just that older crowd is going to be looking for somewhere new to go and that could be black rock without a problem. Elmwood can be a bit ‘high end’ and Buff State is right across the river. Honestly Amherst is going to be where it’s at.

I’ve had the pleasure to bounce around the country for the last couple of years. My position in the Air Force requires allot of traveling form base to base, and I’ve found the same formula in all the ‘up and coming’ urban places is the same.

Provide a service or good that’s 100% better at 50% more cost. It’s what Craft Beer is all about, but it’s also what the whole urban movement seems to be able.  When I visit other cities and find something I think  could be a knock-out in Buffalo I write it down or grab a menu. Sadly for all the great ideas there is only so much money, but the formal is the same.

Chef’s in Manhattan KS is one of the business restaurants I’ve ever been in. It costs about 50% more then Denny’s but when you get Salmon Eggs Benedict, the $5 extra over a grand slam seems like nothing. I’m not saying I’ve stumbled upon the Holy  Grail or anything. I’m just finding that it seems to be true across the whole of the United States. It might the ‘Europeanization’ of America.  That’s a different topic so I’ll get back to Buffalo.

Where I wanted to get was armed with this formal and some really impressive growth numbers from Craft Beer the Councilmen Joe Golombek was willing to sit down for almost 2 hours with us, from that we got an audience with the City Office of Strategic Planning, Department of Labor, Tonawanda BOA, NYSBDC, SBA, ECIDC, NYSIDC. I’m missing once person from that list so I apologize. Point being they we’re great to sit down with, tell them what we want to do, and offer some suggestions on how to go about it. I didn’t run into some brick wall or have to cow tow to anyone to get this. I grew up 25 miles outside of the city, I went to School in Rochester. While Buffalo is my city, its not like I have a network. No Doubt I’m developing one, and the other companies we work with have been paramount to that.

Allot of reasons and things like the $1,000,000,000 that state is talking about I honestly don’t think is going to have nearly the effect it could have if it was $1 thousand million dollar grants or 10,000 $100,000 grants. The things about doing business in NYS being hard then other states.  That’s absolutely true, the taxes are terrible, the bureaucracy is enormous, and the law suits plentiful. Despite all that Government workers are really trying to work around it and with it to get Buffalo back on top.

Point being is Buffalo wants to grow, and the real growth is going to be by small business making an investment in the city, living here working here making that lifelong commitment to the area. There isn’t going to be a hand out from the government to get you started. It’s going to be with the help of people in Buffalo and on your own labors. I encourage anyone who’s thinking about starting to do
          Side-talk: The Ramen Stall at 787 North Bridge Road        
Recently I heard raves about this newly halal food establisment that sells Japanese. I see pictures of their food on various social networking platform like facebook and instagram (especially instagram). Although Singapore has sizable a muslim population, it is not easy to get halal japanese food here; especially good ones. This is because japanese usually uses mirin and pork broth in their cookings. The newly halal restaurant that I am referring to is call The Ramen Stall, located at 787 North Bridge Road. When I heard that still stall sells halal ramen, I was really excited because I am avid viewer of Japanese Hour on Channelnewsasia and often see people eating ramens. I have never tasted japanese ramen simply because it is difficult to get halal ones. I even considered going to Tokyo to get taste of halal ramen there.


So yesterday I decided to give it a try after work. The place is located all the same street as Zam Zam. I was expecting a crowd since it is newly halal certified and I was right about 7.30pm and there was already a long queue. My friend and I then comtemplated whether we should go to Afterwit which was located nearby and serves Mexican food. Alas, we decided to queue up. Fortunately, we got a seat after 10 minutes becauses there was only two of us. Those who came in big groups in front of us has to wait longer.



I knew what to order straight away. I ordered their Volcano Ramen ($11). My friend to longer to decide because she is not familiar with Japanese food (unlike someone who watches Japanses Hour). She settled for Oyakodon ($9.90). We also ordered a sides, Torched Beef Sushi ($7.90).


The first dish to arrive was our Torched Beef Sushim It was soo good that I even considered on seconds. The beef was so soft and well marinated and smokey. It kinda melt in my mouth. It really went well with the wasabi and the preserved radish. Usually I dont even like to put wasabi on my sushi.


The came my volcano ramen. I selected level 1 because I not really a fan of spicy food. I like those which are savourly spicy. The broth before mixing with the chilli was quite mild. It tasted better after mixing with the chilli. The restaurant was quite generous with the toppings but I find the noodles quite little. Maybe because I like carbohydrate. I especially like the kale/seaweed, minced meat and the eggs in the soup. But I find this Volcano Ramen kinda overhyped.


My friend Oyakodon. It is like chicken mixed in batter of ingredients and then fried and placed on top of rice. It is then topped with raw egg and drizzled with soy based sauce. My friend found it nice and mind you she is a picky eater. The serving was also quite big.

There was also a 17% service charge when you dine in. I will definitely come back to try their sushis and unagi rice! 

          AT&T Adds 2.1 Million Net New Customers In Second Quarter Of 2015        
AT&T Adds 2.1 Million Net New Customers In Second Quarter Of 2015

AT&T recently announced that it has added 2.1 million net new customers during the second quarter of this year. Interestingly, almost all of the carrier’s new additions is attributed to strong sales of tablets, and to connected cars. As a matter of fact, AT&T has added one million new additions driven by tablets and connected cars in the period spanning April to June.

It appears that there is a visible shift in the makeup of AT&T’s subscriber base, with a significant part of the new customer additions spurred by tablets and connected devices. Also, it seems that traditional subscribers -- i.e. those that use phones -- may be on the decline, at least in AT&T’s case. It is also possible that such diminished growth from traditional phone customers for AT&T is connected to the increased pressure from competitors like Sprint and T-Mobile, who are only eager to usurp AT&T’s place as the second biggest wireless carrier in the United States.

Earlier in July, T-Mobile had announced that it had added 2.1 million customers during the second quarter of this year. And just a few days ago, Verizon Wireless had revealed that it had gained over 1 million net new customers, and 1.1 million post-paid subscribers. 

As for AT&T, it had added 410,000 post-paid subscribers, however the growth entirely consisted of 600,000 tablets. In the second quarter of this year, the carrier had lost about 200,000 basic phone subscribers. Still, AT&T was able to add 331,000 prepaid customers as a result of boosting its prepaid arm Cricket Wireless. 

A new focus for AT&T is in connected cars. The carrier is signing up with the largest number of automobile manufacturers in order to bring cellular connectivity to vehicles. But perhaps the more pressing question is -- will people actually pay extra money to connect their cars to a cellular network? The potential is there, but for now, it remains to be seen. 

AT&T also managed to generate a profit in the amount of $3.04 billion, or $0.58 per share, during the second quarter of 2015. During the same period in the previous year, the carrier had a profit of $3.55 billion, or $0.68 per share. Not counting costs associated with its acquisition of two wireless carriers based in Mexico and its looming deal with DirecTV, AT&T managed $0.69 per share of adjusted earnings. Moreover, revenues increased 1.4 percent to $33 billion. As per data compiled by Yahoo, analysts predict, on average, revenue of $33.04 billion and earnings of $0.63 per share.

Page Type: 
Post Type: 
Operating System: 

          LG Introduces The Curved Phone G Flex 2        
LG Introduces The Curved Phone G Flex 2

Back in 2014, LG released the G Flex handset, a 6-inch smartphone with a unique curved body design and a self-healing coating that clears up scratches or any damage done to the device's casing.  

Now, the South Korean company is introducing an enhanced and more streamlined version, the G Flex 2. This time around, the newest version comes with a smaller but more handy 5.5-inch display screen, and Qualcomm's most powerful chip set.

The G Flex 2 smartphone was introduced by LG during its very recent press conference at the Consumer Electronics Show 2015 (CES 2015) held in Las Vegas, Nevada in the United States. 

With its introduction, LG's G Flex 2 handset is the first of many phones this year expected to feature Qualcomm's newest offering -- the Snapdragon 810 processor. It is an eight-core 2.0 GigaHertz chip set that is 64-bit compatible for Android 5.0 Lollipop, the latest version of the Android mobile operating system. The 810 processor functions with 2 gigabytes of memory, and can support 3 x 20 MegaHertz LTE carrier aggregation for all networks that support it.

For the device's display screen, LG employed its own plastic OLED display technology. Techies may recall that this is the same display technology utilized in LG's G Watch R wearable device. But in G Flex 2's case, the resolution is set higher to 1080 pixels. 

As for its camera, the G Flex 2 smartphone sports a 13-megapixel camera that has laser autofocus system and optical image stabilization -- features that users may also find in LG's current flagship device (the LG G3).

The G Flex 2 features a 3,000 mAh battery that takes full advantage of Qualcomm's fast charging technology available via the latest Snapdragon chip sets. This technology significantly reduces the recharging time by up to 75 percent. Thus, users can get the G Flex 2 half-charged in just 40 minutes.

But what really makes the G Flex 2 unique is its curved body. The front side (display screen) has a 700 millimeter curved radius, while the rear side is curved just a bit less (650 millimeter radius). This is by design, by the way. According to LG, this helps users hold the phone more easily and also, allows the device to fit more easily in users' pockets.

Naturally, the G Flex 2 will be launched first in South Korea before the end of the month. But American users will not have long to wait. Major carriers AT&T and Sprint have already confirmed that they will be including the device in their respective smartphone line-ups this year. Regional carrier US Cellular has also announced that they will be offering the device in spring. No specific release dates and pricing details have been provided yet, but LG fans in the US should be pretty excited nonetheless. 

Want to know more LG devices? You can start comparing LG phones and plans now.

Page Type: 
Post Type: 
Category: 
Operating System: 

          Sprint Prepaid Teams Up With Best Buy To Offer Free Month Of Service        
Sprint Prepaid Teams Up With Best Buy To Offer Free Month Of Service

Looks like Sprint is on a roll as we enter into the holiday season. The carrier offers another year-end special offer through its Sprint Prepaid brand, which is collaborating with retail giant Best Buy in giving customers one month of service that is completely free of charge. 

This special offer is a limited time offer only, and is open to all subscribers buying a new eligible handset from Best Buy and activating it under a Sprint Prepaid plan. Phones that eligible include the Samsung Galaxy S5, the Samsung Galaxy SIII, the LG Tribute, the LG Volt, and the Sharp Crystal.

Customers get to choose from three Sprint Prepaid plans that already include unlimited calls and unlimited text messaging. These plans are: the $35 monthly plan that includes 1 gigabyte of data, the $45 monthly plan that includes 3 gigabyte of data, and the $55 monthly plan 

Apart from unlimited calls and texting, Sprint Prepaid's plans also offer 50 minutes of off-network voice roaming per month. This is not usually offered by other prepaid service providers, which should delight those who decide to go for a prepaid plan from Sprint.

Sprint's free first month special offer is certainly a treat, but other prepaid brands also offer competitive deals. For instance, Cricket Wireless (AT&T's prepaid brand) has its Basic Plan, which offers unlimited calls, unlimited text messaging, and 1 gigabyte of high-speed data for $35 each month, that is once an AutoPay credit is applied.

New prepaid player Red Pocket also has an interesting offer. Via its GSMT Unlimited Everything plan, you get unlimited calls, unlimited text messaging, 200 minutes of international calls, and 2 gigabytes of data at full speed for $39.99 every recharge. This offer is also eligible for a full month of service free of charge from Red Pocket, provided the customer gets two months worth of recharges.

The year is not over yet, and we may still see other holiday deals from prepaid brands in the coming days or weeks. But Sprint Prepaid's offer is truly worth checking out. Customers can avail of it until January 31st of next year at all Best Buy retail stores in the United States.

Sprint has been rather busy in the past few weeks. The carrier has made its iPhone for Life and Easy Pay options available from Apple retails stores for the holidays. Apart from that, it has also teamed up with Uber in offering a free first ride promo for Sprint customers who sign up for the transport service. Interested to know more about Sprint's deals? You can compare plans and phones from the carrier here.

Page Type: 
Post Type: 
Operating System: 

          AT&T Expands Voice Over LTE To 18 Additional Markets        
AT&T Expands Voice Over LTE To 18 Additional Markets

AT&T first launched its Voice over LTE (VoLTE) service about seven months ago, but now the carrier is expanding its reach by adding 18 new markets for its VoLTE and HD Voice offerings.

The list of new markets include District of Columbia, Georgia, Illinois, Indiana, Maryland, Michigan, Minnesota, Nevada, North Carolina, Ohio, Oregon, Pennsylvania, South Carolina, Texas, Utah, Virginia, Washington, and Wisconsin. 

The good news is that this is just the beginning. AT&T's target is to transition every consumer to VoLTE. That would be easier said than done for sure, considering the tons of networks that need to be set up and the hardware that needs to be deployed. But AT&T is positive about the outcome, and early signs of success are certainly visible.

As stated by John Donovan, AT&T's Senior Vice President of Technology and Operations, the carrier's VoLTE network is performing very well after some internal tests, scoring an average of more than 99 percent in terms of accessibility and retainability (how well the users stay connected).

For those not in the know, VoLTE technology lets users simultaneously make calls and browse the Internet using their smartphones with very fast 4G LTE data speeds. 

As for HD Voice, it is a type of wideband technology that allows for better call quality with minimal background noise, made possible through widening the frequency range of the audio signals.

Voice calls were previously transmitted on a rather limited frequency range (between 300 Hertz to 3.4 Hertz). But with HD Voice, that frequency range is extended from 50 Hertz to 7 KiloHertz, and sometimes even beyond, in order to achieve high definition quality in voice calls.

However, before users can enjoy HD Voice, they need to meet the requirements. Firstly, the service must be available in their geographical area (AT&T is working on it). Secondly, the person calling and the recipient of the call must both use handsets that are HD Voice capable. For AT&T customers, just about the only devices available from their carrier that meet this requirement are the iPhone 6 and the iPhone 6 Plus.

AT&T is far from being the only major wireless carrier that offers HD Voice though. Sprint may have been the first off the blocks, offering its customers a 30-day trial run of its HD Voice service in June earlier this year. Even Verizon Wireless is working on its own HD Voice brand, and the talk is that the Big Red will utilizing the AMR-wideband standard (the industry norm) for its service.

Interestingly, AT&T and Verizon Wireless are working together in providing clear call quality in both their customers. If they can pull this off, AT&T customers will be able to call their friends and family who are on Verizon as clearly as possible, and vice versa.

Page Type: 
Post Type: 
Operating System: 

          AT&T Throttles Users On Unlimited Data Plans Regardless Of Network Congestion        
AT&T Throttles Users On Unlimited Data Plans Regardless Of Network Congestion

AT&T has confirmed that it is throttling subscribers under its unlimited data plans, no matter how congested the network is. 

As reported by Ars Technica, subscribers who are using non-LTE 3G/HSPA+ handsets and are under unlimited data plans only get throttled when network congestion becomes heavy, and when the users exceed 3 gigabytes of data within a single billing period. But apparently, these same conditions do not apply to customers on LTE.

If a subscriber is under, say, a legacy AT&T unlimited plan and uses up more than 5 gigabytes of data on an LTE-compatible handset in a span of a month, the subscriber's data speeds will automatically be reduced for the remainder of the billing period, even if the network remains free of congestion.

Ars Technica further reported that data speeds slowed down from 23.5 mbps on average to just 0.1 mbps. When the subscriber's billing period is reset, only then are the data speeds returned to their normal levels. However, once the subscriber reaches 5 gigabytes, data speeds are automatically reduced again.

For its part, AT&T issued a statement defending its network management practices as legitimate. The carrier claims that the throttling was put in place in order to provide optimum network service for its subscribers.

AT&T further added that it is planning to address the data throttling concerns between its LTE and non-LTE unlimited subscribers sometime next year. The carrier says that it will be reducing data speeds for LTE users in congested networks as soon as that option is made available.

AT&T may be claiming that it is throttling data speeds for the benefit of all customers using its networks. But others see the throttling as a ploy to lead on long-term customers to more lucrative limited data plans. This tactic has been employed before, namely by Sprint for its Unlimited My Way and My All-In plans. Even Verizon Wireless thought of doing the same thing, but then the Federal Trade Commission (FTC) stepped in and pressured Big Red to reverse its decision. 

Right now, fewer than 20 percent of all AT&T customers are under unlimited data plans. Those that are signed up for the plans because they were thinking they could stream and download without having to worry about high overage fees if they exceed their data allotments. But it appears that they are getting throttled anyway, rendering their data privileges useless. 

As for the network congestion claims, some may find it hard to believe, especially when the subscribers who are under more expensive data plans (up to 100 gigabytes each month) never get to experience throttled data speeds.

Page Type: 
Post Type: 
Operating System: 

          Sprint Introduces Deal To Reduce Bills Of AT&T, Verizon Customers In Half        
Sprint Introduces Deal To Reduce Bills Of AT&T, Verizon Customers In Half

When it comes to grabbing customers from rival wireless carriers, Sprint does not seem to shy away from unusual tactics. Just recently for instance, the carrier introduced a new deal that promises to cut the bills in half of any customer from competitors AT&T and Verizon Wireless. Of course, for the customers to avail of the deal, they would have to produce a current AT&T or Verizon bill. It is a gutsy move for sure, but will it be effective? 

Sprint is calling the deal the Cut Your Bill in Half promo. In this deal, anybody who is currently on an AT&T or Verizon plan and wants to switch to Sprint, must first furnish a copy of their current bills, and either upload them to Sprint's website, or hand-deliver them to any official Sprint store. Sprint will then evaluate the bill submitted, and decide which Sprint plan matches it in terms of calls, text messaging, and data allotment. Sprint will then offer that matching plan for half the price of the defecting subscriber's current AT&T or Verizon plan.

For instance, a customer who hands in a bill for a Verizon family plan costing $260 each month will be offered a family plan with similar inclusions but only for $130 each month.

Sprint already launched a promotion wherein it covered early termination fees up to $350 in the form of a prepaid Visa gift card. This can be paired with the new Cut Your Bill in Half promo, as long as the customer qualifies.

There are a few caveats, of course. One, those who avail of this promo will not be able to buy a subsidized handset from Sprint. They must sign up for the carrier's leasing program, make installment payments, or buy the device outright at its full retail price. Two, participants will have to turn in their current AT&T or Verizon handsets to Sprint. Understandably, it would be weird using an AT&T or Verizon device on Sprint's network, but still, you would be parting ways with something that you've gotten used to. What if you don't have a smartphone to turn in? (Got lost, perhaps?) Sprint will then charge you $200 per line of service. It is not clear yet what Sprint plans to do with the devices that are turned in though. 

Sprint's Cut Your Bill in Half promo is offered on a limited time only. However, people who participate in the deal will be able to keep enjoying discounted bills in the future as long as they do not add more data or minutes. Once they do, their plans will be reverted the normal pricing structure.

One more thing -- this promo is off limits to T-Mobile subscribers. One possible reason is that T-Mobile is already competing with Sprint in offering slashed data prices in a manner that the other carriers, AT&T and Verizon, are not. 

And because the promo is designed to lure AT&T and Verizon subscribers, Sprint's own existing subscribers will not be able to take advantage of the deal. Find out what other deals Sprint is offering right now -- start comparing Sprint plans and phones now.

Page Type: 
Post Type: 
Operating System: 

          CBS' 'Zoo' Speaks Of God And Prayer In A Positive Way        

Last night’s 2-hour episode of CBS’ ‘Zoo’ titled ‘Eats, Shoots and Leaves; Wild Things’ surprised me in a very pleasant way. Not only did the show’s producers kick things up a notch with exciting fight scenes and interrogations that reminded me of one of my favorite old shows ’24,’ but also they spoke of religion in a non-negative way, which is outright shocking given this is a network show and a show populated with militant animal activist characters.


          USA's 'Mr. Robot' Shouldn't Just Delay its Shooting Scene Out Of Respect for Roanoke, They Should Delete It        

USA’s 'Mr. Robot' did not air its season finale Wednesday night. Citing a need to be sensitive to the shooting that killed two journalists in Roanoke, the network aired a previous episode along with this statement to explain their decision:


          'The Carmichael Show' Smashes Stereotypes: Defends Bush, Bashes Obama        

For all conservatives sick and tired of being trashed and talked down to by network television, boy, do I have a show for you!


          Insensitive Priest Doesn't Understand the 'Pure Love' of Polygamy on ABC's 'Mistresses'        

File this under Words I Never Expected to Hear on Network Television: "Yes, Father, it's called a 'throuple.'"

And so began Karen's explanation to her priest of her threesome polyamorous relationship with a husband and wife that led to her getting pregnant, in Mistresses season 3's 10th episode "What Could Have Been."


          Malware: How we are Infected [InfoGraphic]        
So you have a computer, but if it was infected with a virus, what would you do? Would you even know it was there? It is a well-known fact that over 32% of all computers in the world have malware of some sort. Today we will be talking about the infamous computer virus and what it is.

So let's start with something you all have probably heard of, Malware. Malware is a program made to infiltrate your computer, disable parts of it, and thus gain access to your hard drive, search history and such to aid with stealing information. However, there are other types of malware out there. Let's get to know them and how much of the 32% they infect.

At 57%, first we have the virus. This is a software that has the capability to copy itself and send itself into other folders. Then there is the "Trojan" at 21%. The Trojan is malicious software that hides on the internet disguised as some sort of program or free item, and ce you download it, you will soon discover it is malicious. But the Trojan has a brother at 7%, called the "Trojan Downloader". This type of virus does the same thing as the simple Trojan, but once on your computer it downloads more viruses and software, then begins to use those programs.

Then at 3% there is the "Exploit", which finds a glitch, bug or system error and uses that to hack into your computer. Next we have the "Worm" at 2%, this malicious bug works the same as a Trojan, but then copies and pastes itself across your computer network.

But not all viruses seem so bad when you get them, for instance the "Adware" at 3%. This type of virus infects your computer so nothing happens at first, but once you log into your web browser, then immediately your screen will be flooded with ads. There is also the "Monitoring Tool" with 2% of the 32% infected. This malware infects your computer and hides, not doing anything but monitoring your activity, (Search history, keyboard history etc.) and then sends those back to a remote server.

There is also one of the worst at 1%, the "Back Door". This virus infects your computer remotely, not allowing your anti-virus security to even detect it, but sure enough it does. And lastly we have one of the worst but luckily at a low percentage of 0.01%, "Spyware". This diabolically designed software infects your computer and takes the most important pieces of information it can find and sends it back to wherever it came from. This information is generally passwords, credit card numbers and other sensitive information.
All of these viruses have devastating effects. Last year there were 27 million strains of malware made, which means 74,000 new viruses are created every day. The number of homes in the United States that experience spam is 24 million. The number of homes with serious viruses in the last 2 years is 16 million, and the number of houses that had spyware in the last 6 months is 6 million. But most devastating of all, over 1 million of all homes have lost money to spyware in the last year. Another devastating fact is that Viruses cost the world 4.55 billion USD every year.

So be safe, don't download anything you are unsure of, and be sure to have an anti-virus software. But most importantly learn how to detect these programs when you get them.























          What is Remote Code Execution? How to Hack Websites        
According to Wikipedia, Remote Code Execution can be defined as “In computer security, arbitrary code execution or remote code execution is used to describe an attacker's ability to execute any commands of the attacker's choice on a target machine or in a target process. It is commonly used in arbitrary code execution vulnerability to describe a software bug that gives an attacker a way to execute arbitrary code. A program that is designed to exploit such vulnerability is called an arbitrary code execution exploit. Most of these vulnerabilities allow the execution of machine code and most exploits therefore inject and execute shell code to give an attacker an easy way to manually run arbitrary commands. The ability to trigger arbitrary code execution from one machine on another (especially via a wide-area network such as the Internet) is often referred to as remote code execution”

vBulletin RCE Injection

Few websites running vBulletin are vulnerable to Remote Code Execution, by exploiting the vulnerability we can get our PHP backdoor shell uploaded on the website. We’ll use a dork to find the vulnerable website.

Note: Don’t keep yourself restricted when it comes to using dorks, use other search engines too other than Google, like Bing, Yahoo etc. Use of multiple search engines will help you to get more vulnerable websites.

Dork: inurl:faq.php & intext:"Warning: system() [function.system]"

Now, select any website of your choice from th search result, and go to its faq.php page. If the website is vulnerable, you will get the following on the page.


You will get an error similar to Warning: system() [function.system]: Cannot execute a blank command in [path]/faq.php(324) : eval()'d code on line 1

So, firstly upload your PHP shell on any free hosting website or you can use sh3ll.org/c99.txt as it has already got an uploaded .txt shell. (We will be first uploading our shell in .txt form, and later will be changing the extension to .php after the upload process is completed.

Suppose the vulnerable website is http://www.vulnerable.com/faq.php. So in order to upload our shell enter the following in the URL bar:

http://www.vulnerable.com/faq.php?cmd=cd /tmp;wget http://sh3ll.org/c99.txt

To check if we were able to successfully upload our shell, enter the following in the URL bar 
http://www.vulnerable.com/faq.php?cmd=cd /tmp;ls -la c99.txt

Were c99.txt is the name of your uploaded shell. If we were successful in uploading our shell, we see the following text on the page. (Might be a little different in some cases)
-rw-r—r—1 nobody nobody

We know that our shell is successful uploaded on the website, now it’s time to change the file format from .txt to .php in order to execute it on the server.

http://www.vulnerable.com/faq.php?cmd=cd /tmp;mv c99.txt check.php
(You can change check.php to any other name of your choice)

Now, the file format is change. It’s time to execute our shell, so to execute it enter the following in the URL bar
http://www.vulnerable.com/faq.php?cmd=cd /tmp;mv c99.txt check.php
 

Bingo!! We successfully exploited vBulletin Remote Code Execution Vulnerability.


          Basics Of Wi-Fi Security         


Hi all today i am just going to discuss how you can secure your wifi network from hackers. you must have came across many tips on securing wifi network from various blogs and all but here we will discuss from a hackers point of view and all practical and genuine approach to securing Wi-Fi network so lets begin.










 

 

Tips On Securing Wi-Fi Network -


Be Sure To Use the strongest wireless encryption your modem or router provide Making your wireless modem with wpa or wpa2 encrypt do give a trust that your wifi netwok is safe. Typically our router or modem uses various methods of encryption to protect data sent over wifi network. Always use WAP or WPA2 to use secure your wifi network if your router/modem is not having those encryption then never select that brand router/modem. If your modem/router does not provide WPA or WPA2 encryption it is strongly recommended that a new device be purchased.So you must have heard about WEP (Wired Equivalency Privacy) it is quite older technique of securing which easy for hackers to crack with that I can never say you are completely secure.




Remember the use(Change default pass) of strongest possible network password / network
key always ensure better security -














Again Its a simple tips which applies on all field for better security, As  you know general rule, the longer and more complicated the password, the more difficult for hackers to crack it. I do recommend to use minimum an eight character password should be used to allow access to your wireless network. And remember don't forget to change your modem/router default password people do forget it many time which lead to compromise the wifi network. Never use the same password to control or access more than one system or program and never use your wireless network name as your password! Doing such stupid activity makes things too easy for anyone to hack your wifi easily. Its obvious thing that most of the time our modems are designed to use a default password such as “admin”, “password” or the manufacturer’s name. These settings are easily accessible to a user when the modem and network is being set up, however because they are easily accessible and often use weak passwords will unless changed, remain potentially accessible to anyone who wishes to gain access. There are many sites available on internet which give away default passwords for modems /routers (vendor specific as well). Changing your modem or router’s default password offers a simple but effective security measure against unauthorized remote access.




Hide your SSID (network name)  - 









I know the Wi-Fi network is still Hack-able when SSID Is hidden but it makes thing bit difficult for hackers to crack any Wi-Fi network which is invisible. Typically all Wi-Fi network broadcast its presence (beacon frames) when they are turned on so making the SSID hidden keep another layer of protection in securing Wi-Fi network because if the network is not broadcasting its name that make difficult for hackers to hack it.




Access to Remote modem administration -

These days most modern modems or routers can be remotely administered over the internet. If yours can, then someone besides you can potentially locate your modem’s IP (Internet Protocol) address and potentially hack your modem.A simple fix to this vulnerability is to disable remote administration for your modem or router. If you absolutely require remote access then you can try limiting access to a particular IP address or limited range of addresses, to reduce the chance of unauthorized users gaining access to your modem’s configuration settings. As a general rule for home networks, remote access is not necessary and possibly the safest thing is to disable remote access to your modem/router.




MAC address filtering for improve security -



Encryption including WPA2 and strong passwords are the best methods to control who accesses your network, however most modems and routers offer further methods to control your network. It is a better option to make your Wi-Fi network more secure is to use mac filter as you know mac address (unique hardware address of a system)  so it ensure better protection .i know mac address can be spoofed but with all WPA2 and strong password ,mac filtering whole together ensure better security . All Most all modern modems offer the capability to restrict access to a wireless network to known devices (known MAC addresses). Trouble here is if you not setting mac filter properly then you man miss the Wi-Fi services (cannot connect to the network).





Enable modem/router firewall and security features -

Most modern modems and routers come standard with a built in firewall. A firewall can prevent unauthorized people accessing your network, can control which programs inside the network access the internet and should be enabled by default.Some hi-tech modems and routers also feature security programs known generally as intrusion detection systems (IDS). Such systems are capable of detecting attempts at unauthorized access to the system they are protecting and block many forms of attack. For additional security, all computers connected to your network should also have a software firewall system installed, or the manufacturer provided operating system firewall enabled.




Update your modem/router Firm-ware -

Some if your modem is outdated firm ware it may lead to some ready-made exploits using which any attacker can hack your network so it’s better to update firmware also the modem manufacturer provide this update firmware service for free (On modem’s website). Also keep one thing on mind unnecessary you should not make your wifi modem broad cast signal to long distance range (100m).its better to limit your modem/router signal upto 20-30 m. also always better to keep your modem at central position.So keep these things on mind while installing any wifi network and i am sure the hackers will definitely have to go through Hercules task.




This article is a Guest post by -  Chandrakant Nial



          Protecting Our Houses of Worship: Guest Column by Security Expert / Retired NYPD Detective Sergeant         

By ALAN SCHISSEL

Founder & Chief Executive Officer

  • Integrated Security Services

  • According to the Washington Post, “it’s been a bad 2017 for Jews.” During the month of January, 48 bomb threats were called in to Jewish community centers across the country. Also last month, a neo-Nazi made national news by promising to hold a march in Whitefish, Montana to intimidate the town’s small Jewish population.

    This, of course, was followed by another unprecedented press conference by our President during which two reporters were moved to ask Mr. Trump about the rise in anti-Semitism. Many of us were aghast at the President’s rude and dismissive response, and his unwillingness to address the question seriously. The fact is, the country is experiencing an alarming increase of anti-Semitic incidents, and this has been trending upward since 2015. A security report issued by the Department of Homeland Security on protecting houses of worship stated that the United States has approximately 345,000 religious congregations representing 230 denominational groups and roughly 150 million members. Despite being sanctuaries from the troubles of the world, houses of worship have also been targets as violence has spiked across the country in recent years. The killing of nine people at Emanuel A.M.E. Church in Charleston, South Carolina was the largest mass shooting in a house of worship since 1991, when nine people were shot at the Wat Promkunaram Buddhist temple in Waddell, Arizona, northwest of Phoenix.

    [Under relentless pressure, the President subsequently denounced anti-Semitism.]

  • Empathy and action: Muslims unite to help fix vandalized Jewish cemeteries


  • The intent of this column is to generate awareness and provide a short guide which contains security practices for religious institutions, parishioners and our non religious communities to help deter threats, mitigate hazards and risks, and minimize the damage caused by an incident in or around a house of worship, including mass casualty events.

    I preface with the word “short” because there is a wide range of methods from programmatic and procedural considerations to technological enhancements that religious facilities and their leadership may consider implementing based upon the most likely threats to their facilities and their available resources. Basic security principals would suggest taking a blended approach to security and safety with the goal of hardening the facility to deter, detect and/or delay a criminal occurrence before it happens. The next steps are equally important and this is where lives are saved and mass casualties are reduced. Selecting the appropriate response to a threat or armed intrusion will help facilitate a safe transition into an effective recovery and restoration of services mode.

    Identifying Your Threats & Vulnerabilities

    Identifying and evaluating a known or potential threat to a given facility is the first step of a security assessment. The results of which will guide the process of developing a security plan. A proper readiness plan will aim to deter a threat or mitigate a threat by reducing the religious facility’s vulnerability to those threats.

    Natural Hazards vs. Targeted Violence

    As stated before, all life safety solutions should be designed using a blended approach to managing risk. Protecting a religious facility means your emergency management plan(s) must address an all-hazard approach to both natural hazards, e.g., infectious diseases and illnesses, fire, and seismic and weather-related events (hurricanes, tornadoes, flash floods) as well as targeted attacks. Spontaneous and pre-planned attacks are likely to occur by individual(s) who use firearms; improvised explosive devices (IEDs); vehicle-borne improvised explosive devices (VBIEDs); chemical, biological, or radiological attacks; or arson in order to inflict a number of casualties and damage to religious facilities.

    Protective Measures

    As previously mentioned earlier, a house of worship environment is managed by creating layers of protective measures in collaboration with state and local partners that allow religious institutions to deter, detect and delay threats. These layers also allow an institution to consider a threat as soon as possible and to more effectively respond to, further deter, eliminate or mitigate that threat.

    • Technological sensors such as CCTV surveillance cameras or alarms (fire, smoke, wind, and intrusion detection) will trigger informed decision-making.

    • Barriers, such as locked doors or fixed barriers or uniform security personnel should be in place to deter or delay a threat and afford more time for effective decision making.

    • Having the correct inbound and outbound communication network in place will influence a number key decisions. Time, or the lack of time, is a principle disrupter of effective decision-making. Sound communication strategies such as emergency email blasts, voice activated alert systems, and silent alert systems help to improve response to and during a crisis. An effective communication protocol should expand the window of time available to leaders to make sound decisions.

    Additional Measures to Consider:

    • Reporting Procedures

    • Establishing Collaborative Planning Teams

    • Starting an Emergency Operations Plan

    • Define Roles and Responsibilities

    • Notification Procedures

    • Evacuation Lockdown and Shelter‐In‐Place Policies and Procedures

    • Plans for Diverse Needs of Children and Staff

    • Necessary Equipment and Supplies

    • Common Vocabulary

    • Emergency Drills

    Call us at (212) 808-4153, or write us to tell what you think or how we can be of more assistance and remember, always dial 911 first in an emergency!







  • Integrated Security Services


  • About Alan Schissel










  • Cool Justice Editor’s Note: By way of disclosure, Cool Justice is an occasional denizen of Integrated’s Hartford office and once in a while even does a little work …

  • more COOL JUSTICE

  • Hartford PI Stars in Network Real-Life Manhunt Show

  •           Resistance at Standing Rock: Dispatches from the Front Lines        

    UPDATES:





  • Water Protector Legal Collective Files Suit for Excessive Force against Peaceful Protesters


  • Veterans to Serve as ‘Human Shields’ for Dakota Pipeline Protesters



  • Oceti Sakowin encampment on Oct. 6, 2016. The proper name for the people commonly known as the Sioux is Oceti Sakowin, (Och-et-eeshak-oh-win) meaning Seven Council Fires.








    Story and Photos by John Briggs

    Cool Justice Editor's Note: OK to repost, courtesy of John Briggs and The Cool Justice Report.







    Corporate – Government Alliance Versus the American People

    Native Americans from tribes across the country have gathered on the windswept plains of North Dakota to pray with Mother Earth to keep the Dakota Access Pipeline (DAPL) from pumping 500,000 gallons of oil a day beneath the Missouri River. The natives know the pipeline will most certainly leak or break, as have most U.S. pipelines, fouling the water for the Great Sioux Nation and 18 million non-Natives downstream.

    The standoff -- which began in April -- continues as a new U.S. administration ascends to power with a president-elect who campaigned denying human-caused climate change and threatening the Paris Climate accords. This remains the overriding reality despite a mini walk back by Donald Trump pledging an open mind to The New York Times this week.

    Standing Rock illuminates the brazen alliance that has developed between corporate and government interests. Viewed from the front lines, the law has been turned into a fig leaf for repression and suppression. Only the discipline and spiritual clarity of the water protectors and the native elders has kept people from being killed or seriously injured since April when the movement began.

    The fused police-DAPL force is doing everything it can to incite a violent reaction from the resisters so as to crack down, clear the camps, imprison, or even gun down the natives. More than one commentator has found the atmosphere at Standing Rock similar to what led to the Wounded Knee massacre in 1890 when 300 Sioux were murdered by government troops who mistook their prayerful Ghost Dance for a war dance.

    A great deal is at issue at Standing Rock. The Sioux and their numerous native and non-native allies face a militarized force whose composition tells us something dark about the complex façade that U.S. democracy has become and suggests the proto-fascist zombi lurking beneath. More deeply, Standing Rock also emblemizes a struggle that is taking place at this moment in human history between two distinct modes of human consciousness.

    One mode is the familiar anthropocentric (human-centered) consciousness that the dominant culture most of us were born into favors—a consciousness that assumes reality is a collection of objects to be extracted, owned, and branded. Humans are the focus of this consciousness, meaning that our concerns about climate change focus primarily on the fate of our own species.

    Distinct from this anthropocentric mind-set is a second, ancient and spiritual mode of awareness that understands that the earth and its landscapes are not objects; they are relationships, including the tangle of relationships that gave us birth. This ancient mode of consciousness is potential in everyone, but for most it has been buried beneath the piles of conceptual objects that we have come to believe constitute our reality.

    The Indigenous Peoples gathered at Standing Rock are guided by this ancient, holistic, earth-mind consciousness, and so they understand that humans are not the most valuable living objects on the planet: we are not in control of the planet; it is not our job to manage nature; rather, our sacred task is to work with Mother Earth and other beings as members of Earth’s family. If we don’t, Mother Earth will make us face this spiritual truth one way or another.

    Guided by their ancient, earth-mind awareness, Native Americans have taken up a role as “water protectors.” “Mni Wiconi, Water is Life” is the slogan of the Standing Rock movement.

    Every day scores of Sioux from North Dakota, South Dakota and nearby states, along with Paiute, Shoshoni, Diné, and a sampling of other Natives from the 300 or so tribes whose flags fly at the Standing Rock encampments set out to pipeline construction sites in a convoy to engage in “actions” on the “front lines.”

    There the protectors sing and pray in the face of physical harassment and arrests by heavily armed police fused with a corporate security force.

    DAPL and their overlord company, Energy Transfer Partners, have lavished campaign contributions on politicians in North Dakota and the U.S. Congress so that they could use the state’s eminent domain powers to force purchase of land for the pipeline all across North Dakota, beginning in the Bakken fields in the northwest corner of the state where the fracked crude oil is extracted. Similar eminent domain arrangements were achieved in other states through which the 1,200-mile line traverses before reaching a river port in Illinois. The company promised Congress and the public that the pipeline would carry oil for 100 percent domestic use only, but it is clear from reporting done by the website The Intercept that the oil will be sold on international markets.

  • Though Promised for Domestic Use, Dakota Access Pipeline May Fuel Oil Exports


  • The DAPL line, now virtually complete except for permission from the Army Corps of Engineers to fill in the link that crosses under the Missouri River, passes just north of the Standing Rock Sioux Reservation and Cannon Ball, North Dakota. The DAPL construction runs through sacred burial and archeological grounds that the Lakota people were given free access to by treaties with the U.S. Government in the 19th Century. In mounting their resistance to the pipeline, the Standing Rock Sioux have been turned into “trespassers on their own land.”

    In late August, the tribe’s lawyers filed a stop work petition in federal court detailing areas where sacred sites would be disturbed if construction continued on its planned trajectory. The federal judge routinely forwarded a copy of the filing to DAPL. Over Labor Day weekend, when the company would not have been expected to work, pipeline crews leapfrogged to the disputed sacred and preemptively bulldozed them under. Too late, the judge granted the Sioux an emergency restraining order, but, then in a curious move, allowed construction in some areas where sacred sites have been discovered. DAPL has ignored a request from the Obama administration not to work in buffer areas on either side of the river. No fines have been imposed for intentionally bulldozing the disputed sacred sites.

  • The Legal Case for Blocking the Dakota Access Pipeline


  • Burial ground at center of police confrontations is known historical site


  • In recent live-stream videos from the front lines, DAPL-police snipers can be seen perched on top of a sacred mound called Turtle Island, their high-powered rifle crosshairs trained on the water protectors who are standing in prayer in the frigid lake below.

    North Dakota wants the federal government to pick up the tab for the massive expenditures required to keep the Native Americans under their guns. Alternatively, the CEO of Energy Transfers, Kelcy Warren, has offered to pick up the millions-of-dollars tab.

  • ETP CEO Kelcy Warren Says They Have Offered to Pay Protest Related Expenses


  • Native media have documented that DAPL has already been supplying military-style equipment, drones, armored vehicles, riot gear, water canons, concussion grenades and other armaments. The tax-payer-funded and corporate-sponsored front lines phalanx is led by the Morton County Sheriff’s Department, which has local jurisdiction, reinforced by North Dakota State Troopers, North Dakota National Guard units, sheriffs and police from six nearby states—all interpenetrated by DAPL security (while the FBI lurks in the background). A contingent of Hennepin County, Minnesota, Sheriffs’ Deputies were recalled following protests back home. Residents in the state of Ohio are writing letters and calling legislators to express their distress that their law enforcement has been enlisted into this repressive force.

  • Hennepin Co. sheriff's deputies leave Standing Rock protest


  • Native media’s live stream videos show DAPL security teams in mirror-visor helmets and black ops body armor with no identification, mingling with the police, sometimes directing them when and who to mace or pepper spray. They point out media making video for arrest. The big fossil fuel company evidently has plenty of experience dealing with protestors around the world. In their blank, reflecting visors we can see the soulless Darth Vader face of the government-corporate proto-fascist state the U.S. is becoming.

    Of course, this struggle with the Wasi’chu (Lakota word for the white man, meaning literally “takes too much”) is an old story for Native-Americans. In the 18th and 19th centuries it took the form of the Sioux nations trying to hold back the tsunami of colonizers flooding into their ancestral lands, occupying and despoiling them. The big difference now is that the fire-power of the state (think Custer’s 7th Cavalry or present day militarized police) has been fused with vast profit centers dependent for their existence on plundering the earth in the name of energy-squandering lifestyle survival.

    The provocations the water protectors endure take many forms. There is the psychological pressure of constant surveillance: the heavy police presence on the roads around tribal and reservation lands, the DPLA helicopter and a small plane that circle constantly above the encampments; there is the Bureau of Indian Affairs station set up on a knoll to suck out data from the cell phones of anyone in the area. There is the pepper spraying and tasing of water protectors who are praying. There is the more recent blasting of the protectors with freezing water canons in sub zero weather. There is the constant threat of weapons pointed at them. One twitching trigger finger could set off a slaughter.

    The water protectors are unarmed. The resistance movement does not allow guns in the encampments. One day, at one of the front line actions, an armed man showed up with a pistol and began firing. Possibly he was paid by DAPL to create an incident. The Natives are aware of paid provocateurs or agitators passing through the camps, pulling dirty tricks, looking to start something. Antimedia reported about the man with the gun: “According to an official statement from the tribe, the man fired several shots from his gun before being peacefully apprehended by tribal police. Witnesses at the scene say he pointed his gun at several protesters. The man was clearly trying to provoke violence that could later be used to demonize protesters who have so far remained peaceful.”

    The news site added, “The Morton County Sheriff’s Department circulated a false report claiming the man was shot, presumably by protesters… [As images show], the man was not harmed. The Sheriff’s Department has since retracted that report. Anti-Media’s attempts to obtain clarifying comments from Morton County Sheriffs were ignored.”

  • Dakota Access Caught Infiltrating Protests to Incite Violence, Funding Trolls Online


  • On a hill overlooking Oceti Sakowin, the largest of the Standing Rock encampments, an old army tent houses the field office of the rotating teams of lawyers who come to Standing Rock to help out. They use donations made to the resistance to bail out protectors who have been arrested; they try to negotiate with the police so the protectors can be allowed to pray. The constant arrests on trumped-up charges are an ongoing harassment—people maced or beaten, violently thrown to the ground and zip-tied. Often activists are charged with trespass and “riot” on the Morton County Sheriff’s novel legal theory that if several people are arrested for trespass that must signify that they were engaged in a riot.

    All this naturally requires court time and money to defend, incarceration in usually unpleasant conditions, including dog kennels. (Though the white allies who are arrested seem to get better treatment.)

    Arrests are to be expected as a consequence of civil disobedience. But some arrests are directed at chilling speech. One lawyer who came to Standing Rock from the Oregon-based Civil Liberties Defense Center, an activist defense nonprofit primarily involved in climate protests, https://cldc.org/ told Jordan Chariton of The Young Turks Network that often after the day’s action was over, police would stop the last cars in the caravan. They would then make “snatch and grab” arrests, impounding the cars of people who had come to support the water protectors but had no expectation that they’d be arrested when the action was over and the police told them to leave. They have to pay heavy fines ($900) to get their cars back. She said the arrests and impoundment fines for their cars are unlawful. “The intention with those types of actions is to scare out-of-towners from being comfortable coming to these actions. So they’re trying to chill the rights of others to come and participate in these protests.”

  • Environmental Lawyer Explains Standing Rock Legal Issues




  • The authorities regularly characterize the natives as terrorists, and local radio spreads false rumors of farm animals being slaughtered and stolen, reported vandalism—the kind of thing you would expect from psychologically projected homesteader fears about savage Indians of earlier centuries.

    Yes, Magazine on Oct. 31 reported: “The county sheriff is claiming the water protectors were violent and that police were stopping a riot. But hours of live video feed from people caught in the confrontation showed instead a military-style assault on unarmed people: police beating people with batons, police with assault rifles, chemical mace, guns firing rubber bullets and beanbag rounds, tasers.”

  • Why Police From 7 Different States Invaded a Standing Rock Camp—and Other Questions


  • The UN has sent human rights observers. According to Salon, Nov. 16, 2016: “The U.N. special rapporteur said that American law enforcement officials, private security firms and the North Dakota National Guard have used unjustified force against protesters.

    “ ‘This is a troubling response to people who are taking action to protect natural resources and ancestral territory in the face of profit-seeking activity,’ [Maina] Kiai [U.N. special rapporteur] said in his statement, which was issued by the Office of the U.N. High Commissioner for Human Rights and was endorsed by several other U.N. experts.

  • Native Americans facing excessive force in North Dakota pipeline protests – UN expert


  • “At least 400 activists have been detained and often have been held in ‘inhuman and degrading conditions in detention,’ Kiai added. Some indigenous protesters have said they were treated like animals and even held in dog kennels.

  • Dakota pipeline protesters say they were detained in dog kennels; 268 arrested in week of police crackdown


  • “ ‘Marking people with numbers and detaining them in overcrowded cages, on the bare concrete floor, without being provided with medical care, amounts to inhuman and degrading treatment,’ the U.N. expert said.

    “ ‘The excessive use of State security apparatus to suppress protest against corporate activities that are alleged to violate human rights is wrong,’ he continued, noting that it violates U.N. guidelines on business and human rights.

    “Amnesty International USA, which has repeatedly criticized authorities for not respecting the rights of protesters, issued another statement on Tuesday noting that U.S. authorities had put up roadblocks to prevent journalists and human rights observers from documenting the protests and the official response.”

  • U.N. experts call for halt in Dakota Access pipeline, blast “excessive force” against protesters


  • Living on Earth reporter Sandy Tolan reflected: “You know, at times I felt I was back reporting in the West Bank, and not the Northern Plains…”

  • Standing With the Standing Rock Sioux


  • The Bundy crew was the cowboys, not the Indians

    Compare the government response at Standing Rock with the response occasioned by Ammon Bundy and his gang of armed militants when they occupied Oregon’s Malheur National Wildlife Refuge for over a month in January 2016. Imagine if the Bundy gang had been pepper sprayed, beaten, hit with water cannon, tased. But the Bundy crew were taking over the refuge to proclaim their belief that public lands should be given free to the profit-making private ranching business. In other words, the Bundy crew was the cowboys, not the Indians.

    The mainstream corporate media has largely ignored the stand-off at Standing Rock. Rallies have taken place around the world at places like Tokyo, Stockholm, and Auckland, but the sad truth is many foreigners have heard more about Standing Rock than Americans have. Not surprising. The news editors, working for corporate media conglomerates, choose what they believe we should know and what fits the larger corporate agenda, and so they devote massively more play to Brad Pitt, to the gossipy politics of who’s-on-first, and to whatever the latest glittering consumer thing is than they do to climate change and issues highlighted by the poor and the powerless, like Standing Rock. What coverage that does exist is usually cursory and misleading.

    Fortunately, alternative media have been on the scene and active at Standing Rock. As someone who taught journalism for more nearly 20 years, it has been refreshing for me to see what the alternative press is accomplishing.

    Amy Goodman of the webcast Democracy Now brought the prayer-resistance movement to national attention over the summer. She was arrested and charged with riot in absentia for her live reports of water protectors being set upon by dogs. The charge was later dismissed in court.

    Jordan Chariton of The Young Turks Network has done searching interviews and incisive commentary from the scene.

    But my absolute favorite news source at Standing Rock is Myron Dewey’s Digital Smoke Signals. Dewey does updates every day, which he posts on Facebook. I highly recommend anyone who has a Facebook account to “follow” him. I went to Standing Rock on Oct. 4-11 with two friends and I have since been able to keep up with developments on the ground through Dewey’s Facebook broadcasts. He posts live stream unedited clips that constitute what he calls an ongoing “documentation” of what is happening day-to-day at the movement.

    Here is Dewey at night standing on a hillside next to the Oceti Sakowin encampment. His face appears in the glow of his screen. Then he’s panning and zooming in on a large grassfire as he’s telling us about it. His finger appears in the screen and points out where the fire started. He says the helicopter which constantly circulates over the camp suddenly disappeared 20 minutes before they saw the first flames. He zooms to the area where he and the person he is with first spotted the fire. He says, “It looked like someone using a drip torch.” He says they called 911, but it’s been over an hour and the Morton County Fire Department hasn’t shown up. He tells the people in the camp, his audience, not to worry, though. It looks like the fire was started by DAPL employees to scare them or hurt them. But the Oceti Sakowin is full of Indians who supplement their income by wild-land firefighting, work that also benefits Mother Earth; he mentions that he is himself a “hotshot” firefighter [one of the elite crews]. He and his fellow firefighters can tell by the wind direction that the fire won’t harm the camp.

    Now here’s Dewey on a bright morning walking along the road by Oceti Sakowin. A young man appears on screen, and Dewey asks him who he is and why he’s here. He’s from the Paiute nation. “I’m here to protect the water,” he says. Dewey asks him to sing a Paiute song. The young man closes his eyes and sings.

    In another nighttime broadcast find we ourselves looking through a car windshield, headlights illuminating the highway, centerlines whizzing by. We hear voices talking in the backseat. The car drives on and on. We’re just watching the road. Then ahead is a police roadblock. The police van looms. Dewey gets out with his camera and calls over to the officers, asks them where they’re from, inquires about where the road blocks are, what are the open routes. At one level it’s a mundane exchange between a citizen and police, but you experience the edginess of the situation. More deeply, you feel the riskiness and pathos that is involved any human interaction. Dewey firmly exercises his right to have these protect-and-serve police respond to him civilly; he is cordial and respectful in a way that reinforces to them and to his viewers that he is after all not their enemy but a fellow human being. Dewey asks more questions and the lead officer says he doesn’t want to be filmed; Dewey offers to turn his camera away from them and onto himself. The distant officers disappear from the screen and Dewey’s face fills it. The contact officer walks nearer; we can hear his voice. Dewey can’t resist a joke, though. He asks the officer if he’s sure he doesn’t want to become famous by putting his face on Dewey’s screen? You realize these are just guys doing their job. Dewey understands that, but he also wants to educate them about the water protectors’ mission. He never misses an opportunity to educate his adversary, as well as his own people about the larger dimensions of the Standing Rock resistance. When he gets back in the car, someone in the back seat says “Let’s get out of here; this is enemy territory.” Dewey laughs, turning the car around, “It’s not enemy territory.”

    I believe you learn more about Standing Rock by watching Dewey’s unedited video than you ever could from watching any number of dramatically produced, commercially constricted reports on CNN, complete with the drumb-drumb latest crisis theme music.

    Dewey explains to his viewers that what they’re seeing is a “documentation” that’s not edited. “It’s not scripted. It’s not acted out.”

    After a month of watching Dewey’s daily reports I realize more fully than I ever have before how ghastly and vacuous mainstream news reporting is: a production where facts have been emptied of the humanity of real encounters, replaced by the shallow performances of reporters and news sources, slick, clichéd phrasing, behavior slotted into ready made categories, events analyzed and even predigested. The news about reality comes to us compartmentalized in trays like tasteless microwave dinners. Rarely is the reader or viewer allowed to simply experience the event unfolding through the reporter’s eyes or camera. The stories are crafted and slickly packaged. Their very polish and stimulating presentation sabotages their meaning and replaces it with a meaningless, artificial understanding.

    Note that I am not saying that the news these days is politically biased. Some obviously is, but the left or right bias charge is a serious red herring, a mis-direction. In fact, in mainstream media’s very effort to appear neutral and unbiased means events are chopped up and pieced together to fit the templates of a few hackneyed forms of storytelling: the winner-loser story, the conflict story, the individual overcoming obstacles story, the facing bad choices stories, he-said, she-said stories, scandal stories, hypocrisy stories. You’ve seen them all, repeatedly.

    Most of these templates come plated with a cynicism, skepticism, superiority, or sentimentality that grabs our attention by adding a dash of disgust. The current journalistic manner of telling stories reduces and dismisses the story in a way that sometimes makes the commercials and pop-up ads come as a relief. None of the common journalistic templates or attitude has much to do with real life as it’s lived in the moment. It’s not what people really experience in their lives. Instead, it’s how they’ve been conditioned to wrap up experience afterward in a dramatized way that leaches out the nuance, that leaves out the moment-to-moment uncertainty, or as the Lakota call it, the Wakan, the deep mystery of relationships that permeates every event. And that’s what Dewey’s broadcasts have in abundance. You get to see him interacting with the people who show up on his screen. You get to feel his humanity and the mystery of everyday relationships taking place at Standing Rock that he brings to light. It’s certainly not dramatic or melodramatic. It’s not interesting or stimulating in the usual way. It does seem really important.

    So when Dewey sits in his parked car and does an update video on “10 things to know about DAPL” (Nov. 18, 2016), there’s no editing and no script, meaning that you get to see him thinking through what those top 10 things might be. Some points he makes are incisive and comic, others not so much. But the not-so-much ones can lead you to thinking about gray areas, the imprecise observations we all make. He asks a guy who just got in the car to help out with his list and the guy, William Hawk Birdshead, goes immediately serious on him until Dewey says, “I was trying to keep it light.” So the Birdshead says, “Laughter is good medicine.” Suddenly they’re off. Dewey mimics the shifty-eyed look of the FBI guys lurking around the area and denying they are FBI, the DAPL security characters trying to look all steely and tough. We learn that in the encampments they say that “DAPL dresses up like Ninja Turtles.” You can tell that it’s DAPL undercover because those guys never drive rez cars, which are rusted and dented. Nobody is spared. Dewey describes the water protectors just arriving from California as dudes who’ve “got their animal spirits on… They’re all furred up. They’re coming in all mystical and crystals.” He and his buddy laugh, which Dewey says is laughter “in a good way,” because the whole thing going on at Standing Rock is deadly serious but you need laughter, because that’s good medicine for healing. And healing and praying are about “getting reconnected with the Earth.”

    This points to a major difference between anthropocentric prayer as most of us know it and earth-mind prayer. In the prayer that most people are familiar with, an individual seeks intercession for human needs with a transcendent being. The Native prayer is about healing not getting. The prayer is a community ceremony or song or ritual to maintain or restore the balance between and among beings, both animate and inanimate. Prayer is to all my relatives, all my relations, the birds, the water, the wind, the buffalo, my family, even those who oppose me as enemies. Mitakuye Oyasin is an important Lakota phrase that means “all my relations.” When you’re watching a Dewey update from Standing Rock you’re experiencing Mitakuye Oyasin in action. It’s newscasting as a kind of prayer, in the earth-mind sense. Whether he’s engaging in laughter or educating about the spiritual importance of water, you can see that what he’s getting at is healing relationships. Watching and listening, you get to be part of that healing.

    What Dewey does goes way beyond advocacy journalism.

    Our traveling companion for our visit to Standing Rock, Lakota elder Tiokasin Ghosthorse, also provides a good way to keep up with developments through the interviews he conducts for his weekly syndicated broadcast from WPKN in Bridgeport Conn. and WBAI in New York City. On Oct. 31, 2016, Tiokasin interviewed a young man who was seized on Oct. 27 when a frontline camp was destroyed by police. Trenton Joseph Castillas Bakeberg, in the bloodline of Crazy Horse, was praying in a sweat lodge when the militarized police swept through the camp. They yanked him out of the sweat lodge and arrested him. The young water protector told Tiokasin:

    “I pray that we’ll be able to keep a state of prayer and peace, as we have been… Although there’s some people on our side are more likely to tend toward violence. But there’s also people on our side to stop them. Don’t start a fight. That’s what it’s all about, keeping it peaceful because the elders told us in the beginning that all it takes is one single act of violence, one person attacking a police officer and they’ll unleash the fear on all of us. This wrath that we have with our military overseas, we’re beginning to see it now in the heart of our own country. All for the greed and the corporate interests of this government. They say we’re a democracy but it’s not showing anymore. The people didn’t want this pipeline, but this foreign entity that they call a corporation, Energy Transfers, is saying, we don’t care. We want this money. We need this for economic stability of the country and that somehow trumps the interests of our communities and our nation as a whole….We’re standing up to this corporate machine with prayer and love.”

  • Forcibly removed from prayer at Standing Rock


  • Against a heavily armed, corporatized democracy designed to ensure that only powerful business and political elites rule the land and possess the wealth of its objects, the Native-American people at Standing Rock stand in defense of Mother Earth armed with songs, prayers, and an understanding that Earth’s objects are us, and we are them. They are our relatives. It seems better armament than most of us Wasi’shu possess. Webster defines fascism as “a political system headed by a dictator in which the government controls business and labor and opposition is not permitted.” It’s an incendiary word, and readers might think ill of me for introducing it here. Certainly we are not a fascist state yet. But for the prayer-resistance at Standing Rock, the clear alliance between corporate and government interests to quell their opposition under color of the law has a fascist flavor.

    It should not surprise anyone that the new US president reportedly holds stocks that directly fund the Dakota Access Pipeline and that the DAPL CEO Kelcy Warren gave the Trump campaign a substantial donation.

  • Trump's Personal Investments Ride on Completion of Dakota Access Pipeline


  • This is how the proto-fascism works. Ironically (or perhaps absurdly), Trump may have been elected by people hoping he would somehow counter the tightening grip of multinational corporations on their lives. One might wish for that to happen.

    At a deep level, Standing Rock may suggest that such absurdities as a Trump presidency occur because our mode of consciousness is impaired or inadequate to the situation it has created on our planet at this historical time. Too many of us have gone dead to the natural world we come from. Our obsessive anthropocentric mode of consciousness has reduced nature and reality at large to a bunch of things we have names for—things that feed our greed. Fortunately, many Indigenous people have retained an acute and ancient consciousness that we are those rocks and trees and clouds, and birds and water that we see outside our windows, and that restoring our relationships with them is incumbent on us.

    John Briggs is emeritus distinguished Professor of Writing and Aesthetics from Western Connecticut State University. He was the English Department’s journalism coordinator for 18 years and was one of the founders of Western’s Department of Writing, Linguistics, and Creative Process. He is the author of several well-known books on chaos theory, fractals and creativity. He lives in the hilltown of Granville, Mass., where served as a Selectman for five years and as reserve police officer for 10 years.


    When people at Standing Rock talk about the black snake they mean the pipeline, referring to an old Sioux legend about a black snake that will threaten the end of the world. The Lakota prophet Black Elk said that in the seventh generation, the Sioux tribes would unite to save the world.

    Media covering the Standing Rock resistance movement:

  • Digital Smoke Signals


  • Myron Dewey, Facebook


  • The Antimedia


  • Democracy Now


  • The Intercept


  • The Guardian


  • Censored News


  • Unicorn Riot


  • Living on Earth


  • The Indigenous Environmental Network


  • Status of Standing Rock court claim



  •           Burn After Reading        

    Who’s Who
    What’s What

    In the World of CIA Fronts, Partners, Proprietaries & Contractors




    NEW BOOK:

    The Almost Classified Guide to CIA Front Companies, Proprietaries & Contractors
    By WAYNE MADSEN
    ISBN: 978-1-365-11196-9


    Cool Justice Editor's Note: Following are excerpts from author Madsen's introduction and the body of the work. Additional suggested reading: News story about Madsen's book via the Washington, D.C. based Justice Integrity Project [link at the bottom of this post].

    EXCERPTS:

    From the Introduction


    One of the most pervasive uses of companies as intelligence partners was under the CIA’s Operation MOCKINGBIRD. During the Cold War, the CIA, often with the approval of corporate executives, infiltrated their agents to work as journalists in newspapers, radio and television networks, wire services, and magazines. The following pages in this book are rife with examples of this penetration of the Fourth Estate – all too many in the opinion of this journalist. The CIA admitted to at least 400 journalists on the agency’s payroll at the height of MOCKINGBIRD. The CIA traditionally understates its capabilities, especially when its covert activities become publicly known. Moreover, the end of the Cold War did not stop the practice of the CIA in infiltrating the media and slant news reports to its wishes.

    *

    An insightful look behind the veils of secrecy into the CIA’s use of fronts, proprietaries, and partners calls into question the purpose of the CIA. Created by President Harry S Truman to serve as a central collector and repository of intelligence, the CIA became much more than that. A few weeks after the United States witnessed the assassination of President Kennedy in the middle of downtown Dallas, Truman penned an op-ed piece that appeared in several newspapers around the country. In it, Truman shared his regret for having created the CIA in 1947:

    “I think it has become necessary to take another look at the purpose and operations of our Central Intelligence Agency—CIA . . . For some time I have been disturbed by the way CIA has been diverted from its original assignment. It has become an operational and at times a policy-making arm of the Government. This has led to trouble and may have compounded our difficulties in several explosive areas.

    "I never had any thought that when I set up the CIA that it would be injected into peacetime cloak and dagger operations. Some of the complications and embarrassment I think we have experienced are in part attributable to the fact that this quiet intelligence arm of the President has been so removed from its intended role that it is being interpreted as a symbol of sinister and mysterious foreign intrigue.”

    *

    The 21st century’s CIA’s partners are more likely to be found among high-tech companies marketing the latest and greatest mobile applications and data mining programs than among banks, law offices, and advertising agencies. However, in the post-World War II era, the CIA’s top and middle echelons were normally found operating through cover as typewriter-pecking journalists, traveling Madison Avenue admen, corporate lawyers, and chain-smoking oilmen. In the 1970s and 80s, CIA contractors and partners began showing up in the high-tech field, with database, local area networking, and on-line information retrieval systems attracting the most interest by Langley.

    *

    As this book went to press, the smart phone game application Pokémon Go fad was sweeping the planet. Unbeknownst to many of the on-line game’s avid fan’s was the connection of the game’s developers to the CIA’s venture capital firm IN-Q-TEL. All users saw their geo-location and other smart phone data being swept up by a CIA partner firm.

    SELECTED ENTRIES

    Amazon, Inc. [CIA contractor]. Company provides cloud computing services for the CIA. Amazon’s CEO Jeff Bezos also owns The Washington Post.

    American Historical Society. [CIA partner]. Many society officials were OSS/CIA officers.

    American Press Institute. [CIA front]. Operating out of Columbia University, the institute’s director in the 1950s was a CIA officer.

    AmeriCares. [CIA partner]. A non-profit organization that is often the “first in” at refugee situations. Founded by tycoon J. Peter Grace, a board chairman of the CIA front, the American Institute for Free Labor Development (AIFLD) and a trustee of another CIA front, the American Committee for Liberation from Bolshevism, AmeriCares was involved in funding the Nicaraguan contras. The group has also provided the CIA with recruiting opportunities at mass refugee sites, particularly in Latin America and Asia.

    Bechtel Corporation. [CIA contractor]. Bechtel is a large construction company that has included former CIA director Richard Helms, CIA pseudonym “Fletcher M. Knight,” among its executive ranks. Bechtel was active in providing corporate cover for the OSS in the Middle East during World War II. Bechtel has been a consummate service company for various CIA operations, including support for the CIA-inspired coup against the Syrian government in 1949, the Iranian government of Prime Minister Mohamed Mossadeq in 1953, and President Sukarno of Indonesia in 1965. From the 1960s to the 1970s, Bechtel provided cover for CIA agents in Libya under both the regime of King Idris and his successor, Muammar Qaddafi. Sometimes called a “secret arm” of the CIA, Bechtel’s executives included those who would join President Reagan’s Cabinet, including Secretary of State George Schultz and Secretary of Defense Caspar Weinberger.

    Before World War II, Steve Bechtel formed a military-industrial complex partnership with John McCone. McCone later became the chairman of the Atomic Energy Commission and later, director of the CIA. The CIA has used Bechtel to provide cover for non-official cover CIA operatives abroad.

    Blackstone Investment Group. [CIA front]. With offices in Washington, DC and Moscow, arranged for the purchase of KGB documents following the collapse of the Soviet Union. Among the documents sought by the front company were any related to illegal CIA activities during the Cold War, including the 1963 assassination of President John F. Kennedy.

    Bourbon and Beefsteak Bar and Restaurant. [CIA front]. Opened in 1967 in King’s Cross in Sydney, Australia. Served as a rendezvous point for CIA, Australian Security Intelligence Organization (ASIO), and organized crime figures. Its proprietor was Bernie Houghton, a CIA operative with links to Nugan Hand Bank, CIA weapons smuggler Edwin Wilson, and CIA clandestine services officers Theodore Shackley, Rafael Quintero, and Thomas Clines.

    Center for Democracy. [CIA front]. Administered under the aegis of Boston University, the center maintained offices in Boston, Washington, DC, Guatemala City, and Strasbourg, France. Involved in CIA operations in eastern Europe, Central America, and Africa.

    Colt Patent Firearms Company. [CIA partner]. Based in Hartford, Connecticut, provided corporate cover for CIA officers operating abroad.

    Daddario & Burns. [CIA partner]. Headed by former OSS officer Emilio Daddario, a Democratic Representative from Connecticut, the Hartford-based law firm provided services to the CIA.

    DC Comics. [CIA partner]. Worked with the International Military Information Group (IMIG), a joint CIA/Pentagon unit at the State Department, to disseminate propaganda comic books, featuring Superman, Batman, and Wonder Woman, in Serbo-Croatian and Albanian, to youth in the Balkans during the military conflicts in that region.

    Disney Corporation. [CIA partner]. CIA agents who were adept at creating front companies and shell corporations in Florida, worked closely with Disney in preparation for the construction of Disney World near Orlando, Florida. OSS veteran “Wild Bill” Donovan and CIA shell company expert Paul Helliwell helped create two fake Florida cities, Bay Lake and Lake Buena Vista, as well as a number of shell corporations, to keep secret the plans for Disney World. This kept land prices low because real estate speculators were unaware of the prospective value of the land in a desolate area of central Florida.

    Emory School of Medicine. [CIA partner]. Located in Atlanta, Georgia. Involved in the CIA’s MK-ULTRA behavioral modification project.

    Enron Corporation [CIA partner]. Houston-based firm that was used by the CIA to provide commercial cover for its agents around the world. There were at least 20 CIA employees on Enron’s payroll. Andre Le Gallo, a former official of the CIA’s Operations Directorate, went to work as a corporate intelligence officer for Enron.

    Fair Play for Cuba Committee (FPCC). [CIA front]. Officially established by American Trotskyists, the group was penetrated by CIA operatives. The FPCC New Orleans office was a CIA front that provided cover for the anti-Fidel Castro activities of Lee Harvey Oswald, Clay Shaw, and David Ferrie, among others. The New Orleans FPCC office was located at 544 Camp Street and shared the same building entrance with Guy Banister Associates, Inc., a private detective agency, the address for which was 531 Lafayette Street and around the corner from 544 Camp Street.

    In December 1963, after the assassination of President John F. Kennedy, the FPCC ceased all U.S. operations.

    General Electric Company. [CIA partner]. Based in Fairfield, Connecticut, provided corporate cover for CIA officers operating abroad.

    General Foods Corporation. [CIA partner]. Advertising account at CIA’s Robert Mullen Company handled by an active CIA employee.

    Google, Inc. [CIA partner]. Developed as a result of a research grant by the CIA and Pentagon to Stanford University’s Department of Computer Science. The CIA referred to the research as the “google project.”

    Greenberg Traurig. [CIA partner]. Washington, DC “connected” law firm.

    Guy Banister Associates, Inc. [CIA partner]. New Orleans private detective agency headed by former FBI agent Guy Banister. The detective agency coordinated the activities of various anti-Castro Cuban groups in New Orleans, including Banister’s own Anti-Communist League of the Caribbean, as well as the Cuban Revolutionary Council, the Cuban Democratic Revolutionary Front, Friends of Democratic Cuba, and the Crusade to Free Cuba Committee.

    Banister and Associates shared office space with the CIA’s New Orleans front, the Fair Play for Cuba Committee, headed by Lee Harvey Oswald.

    Hale and Dorr. [CIA partner]. Boston-based law firm that provided cover for CIA’s Independence and Brown Foundations.

    Halliburton. [CIA contractor]. Based in Houston, it is the world’s largest oil service company. Recipient of a number of CIA sole-source contracts for services worldwide.

    Harper and Row, Inc. [CIA partner]. Manuscripts submitted to the New York publisher that dealt with intelligence matters, particularly CIA operations, were turned over to the CIA for censoring edits before publication.

    Hewlett Packard Corporation. [CIA partner]. Sold computers to Iraq for Saddam Hussein’s missile program with the knowledge and approval of the CIA.

    Hill & Knowlton. [CIA partner]. Public relations firm that teamed with the CIA on a number of operations. Hill & Knowlton’s numerous offices abroad provided cover for CIA agents. One known Hill & Knowlton office that was a CIA front operation was in Kuala Lumpur.

    Kerr-McGee. [CIA partner]. Provided corporate cover for CIA officers operating overseas.

    Kissinger Associates, Inc. [CIA partner]. New York-based international consulting firm founded by former Secretary of State and National Security Adviser Henry Kissinger. Former National Security Adviser Brent Scowcroft is a co-owner. The firm provided support to the CIA-linked American Ditchley Foundation and the Bilderberg Group. Much of the 1982 seed money for Kissinger Associates was provided by Goldman Sachs.

    Knight Foundation. [CIA partner]. Also known as the John S. and James L. Knight Foundation. Based in Miami, the foundation provides funding for various CIA-connected media operations in the United States and around the world.

    Kroll Inc. [CIA partner]. Founded in 1972 by Jules Kroll, who had links to both U.S. and Israeli intelligence. Based in Manhattan. French domestic law enforcement believed Kroll’s Paris office was a CIA front. Kroll handled the security for the World Trade Center after the 1993 terrorist bombing and continued to be responsible for security up to, during, and after the September 11, 2001 terrorist attack. Kroll employed former FBI assistant director for counter-terrorism John O’Neill, who died in the collapse of the World Trade Center.

    Lincoln Savings and Loan. [CIA partner]. Based in Irvine, California and headed by notorious swindler Charles Keating, Jr., involved in laundering funds for the Iran-contra scandal.

    Lone Star Cement Corporation. [CIA partner]. Based in Stamford, Connecticut and linked to the Bush family, provided corporate cover for CIA officers operating abroad. Involved in the Iran-contra scandal.

    Mary Carter Paint Company. [CIA front]. A money-laundering operation for the CIA. Involved in casinos in the Bahamas.

    Monsanto. [CIA partner]. The firm contracted with former CIA official Cofer Black’s Total Intelligence Solutions (TIS), a subsidiary of the CIA-connected Blackwater USA, later Xe Services, to monitor animal rights groups, anti-genetically modified (GM) food activists, and other groups opposed to Monsanto’s agri-business operations worldwide.

    National Enquirer. [CIA partner]. The tabloid’s founder, Generoso (Gene) Pope, Jr., worked for the CIA’s psychological warfare unit and the agency’s Italy branch in 1950. In 1952, Pope acquired The New York Enquirer broadsheet and transformed it into a tabloid, renaming it The National Enquirer. This transformation bore the imprimatur of the CIA’s Operation MOCKINGBIRD media influence program.

    Newsweek. [CIA partner]. Magazine reporters and stringers fed information to the CIA. Newsweek’s stringers in southeastern Europe and the Far East were CIA agents. When Newsweek was bought by The Washington Post Company in 1961, cooperation between the magazine and the CIA increased. It was a participant in the CIA’s Operation MOCKINGBIRD media influence program. Much of the staff of Newsweek was absorbed into a new online publication, The Daily Beast, which continues to disseminate CIA-influenced articles. See Washington Post.

    Nieman Foundation. [CIA partner]. Located at Harvard University, the foundation awarded Nieman Fellowships, some on behalf of the CIA, for foreign journalists to study at Harvard. The journalists were subjected to CIA recruitment efforts prior to their returning to their home countries.

    Pamela Martin & Associates. [CIA partner], Escort firm run by Deborah Jeane Palfrey, the so-called “DC Madam.” During her 2008 trial for mail fraud, Palfrey attempted to invoke the Classified Information Procedures Act in order to discuss her relationship with the CIA. The U.S. Court refused Palfrey’s request and she was convicted and later said to have committed suicide before her sentencing hearing in Washington, DC. One of her clients was Randall Tobias, the head of the CIA-connected USAID. Another was Louisiana Republican senator David Vitter.

    Paris Review. [CIA front]. Literary magazine edited by George Plimpton. Published works by Jack Kerouac and Samuel Beckett. The magazine’s co-founder, Peter Matthiessen, relied on his affiliation with the magazine as his CIA cover.

    Quaker Oats Company. [CIA partner]. Worked with the CIA and Atomic Energy Commission to place trace amounts of radiation in breakfast cereal served to boys at the Fernald School for the mentally retarded in Waltham, Massachusetts.

    Radio Corporation of America. [CIA partner]. Provided corporate cover for CIA officers operating abroad, particularly in Iran, Philippines, Japan, and West Germany. Provided technical assistance to CIA-financed clandestine and propaganda radio stations worldwide, including Radio Free Europe. RCA founder David Sarnoff was a major supporter of CIA operations, including propaganda dissemination around the world. RCA chairman and chief executive officer Thornton F. Bradshaw was active in the operations of the CIA-linked American Ditchley Foundation.

    Reily Coffee Company. [CIA partner]. Also known as William B. Reily Coffee Company and based in New Orleans, this company employed Lee Harvey Oswald and a number of other U.S. government employees, many of whom were suspected CIA officers.

    Robert M. Mullen Company. [CIA proprietary]. A Washington, DC public relations firm, it was used as a front for CIA activities. E. Howard Hunt, the CIA agent, worked for Robert Mullen when he was arrested in the break-in of the Democratic National Committee headquarters at the Watergate Hotel in Washington in 1972. The Senate Watergate Committee reported that “the Mullen and Company has maintained a relationship with the Central Intelligence Agency since its incorporation in 1959. It provided covers for agents in Europe (Stockholm), Latin America (Mexico City), and the Far East (Singapore) at the time of the Watergate break-in.”

    Rockefeller Foundation. [CIA partner]. Used by the CIA to direct scholarships and grants to the Third World and Eastern Europe. Rockefeller Foundation money was funneled to the American Committee for a United Europe (ACUE), created in 1948. The chairman of ACUE was OSS chief William J. Donovan and the vice chairman was Allen Dulles. One of ACUE’s board members was Walter Bedell Smith, the first CIA director.

    Summa Corporation. [CIA partner]. Owned by Howard Hughes, Summa is believed to have skimmed gambling profits from the Sands, Desert Inn, Frontier, Silver Slipper, Castaways, and Landmark casinos in Las Vegas and Harold’s Club in Reno for the CIA and the Mafia. Provided financial cover for the CIA’s Glomar Explorer project.

    Teneo Intelligence. [CIA partner]. Branch of Teneo Holdings, which is headquartered in New York. Teneo Holdings’s intelligence branch includes former CIA officials. Teneo is closely linked to former President Bill Clinton and Hillary Clinton. Teneo Intelligence has offices in New York, London, Rome, Brussels, Dubai, Bogota, New Delhi, and Tokyo.

    Texas Commerce Bank (TCB). [CIA partner]. Houston-based bank founded by the family of James Baker III. Texas Commerce Bank was used to provide commercial cover for CIA agents. After serving as vice president for Texas Commerce Bank in Caracas from 1977 to 1979, Jeb Bush joined his father’s presidential campaign in 1980. Serving with Bush on the campaign was Robert Gambino, the CIA deputy director of security who gave Bush his orientation brief at Langley in 1977.

    Kenneth Lay, the chairman of Enron, which had its own links to the CIA, served on the board of Texas Commerce Bank. Texas Commerce Bank was acquired by Chemical Bank in 1987.

    The bank provided major loans to Howard Hughes’s Summa Corporation. See Summa Corporation.

    United Fruit Company [CIA partner]. Involved in 1954 CIA overthrow of Jacobo Arbenz government in Guatemala. Published the Latin America Report, a publication that was a CIA front used for clandestine activities. The CIA transferred weapons to United Fruit employees in Guatemala who were involved in undermining the Arbenz government. The joint CIA-United Fruit plan was code named OPERATION FORTUNE. Company provided an airfield in Guatemala for the CIA’s training of Cuban exiles for the Bay of Pigs invasion of Cuba.

    U.S. Rubber Company. [CIA partner]. Headquartered in Naugatuck, Connecticut and later called Uniroyal, provided corporate cover to CIA officers operating abroad. Included those operating under the cover of the Dominion Rubber Company of Canada, a subsidiary of U.S. Rubber Company.

    U.S. Youth Council (USYC). [CIA front]. Founded in 1945 and based in New York. Some 90 percent of its funds came from the CIA. USYC received funding from the Foundation for Youth and Student Affairs (FYSA), a CIA front. The USYC was composed of American Youth Hostels, Camp Fire Girls, 4-H, American Unitarian Youth, National Catholic Welfare Conference, National Students Assembly, YMCA and YWCA.

    Wackenhut. [CIA contractor]. Wackenhut, a Palm Beach Gardens, Florida-based security firm, stood accused of providing the CIA with specialized services around the world, including Chile, Greece, and El Salvador. Its Venezuelan branch, Wackenhut Venezolana, C.A., was accused in 2002 of involvement in the CIA’s coup against President Hugo Chavez. William Casey served as Wackenhut’s outside counsel before becoming CIA director in 1981.

    Wackenhut eventually merged into the global security firm G4S.

    Washington Post. [CIA partner]. The Washington Post was part of the CIA’s Operation MOCKINGBIRD, the agency’s media influence project. Post publisher Phil Graham was a close friend and associate of MOCKINGBIRD chief Frank Wisner, Sr. and CIA director Allen Dulles. Wisner assisted Graham in acquiring The Washington Times-Herald and WTOP radio, creating a sizable CIA-influenced media operation in the nation’s capital.

    W. R. Grace. [CIA partner]. Provided corporate cover to CIA officers operating abroad, particularly in Latin America. Provided donations to CIA front foundations.

  • News story about Madsen's book via The Justice Integrity Project



  •           â€œDexter” strikes again…on CBS        
    CBS snags "Dexter" for a network run.With the writers strike showing no sign of ending soon, networks are calling on their contingency plans.
              PlayStation Network scheduled for maintenance starting at 8AM (PST)        

    PlayStation Network scheduled for maintenance starting at 8AM (PST) May 24

    Today's public service announcement is brought to you by the letter "M." That would be "M" as in maintenance, which is what the PlayStation Network will be going through from 8AM (PST) to 11PM. The outage means that both the PlayStation Store and PlayStation Home might not be accessible while Sony does its maintenance magic. "B-b-but, I'm supposed to be credit farming Firebase White with my Mass Effect 3 buddies during that exact, same time," you say? Chill, buddy -- the maintenance won't affect online play so you can continue to abuse those hapless, chirping Geth. Folks who signed in to PSN within the last five days will still be able to access apps like Amazon Instant Video and Netflix as well. Hey, it could always be worse, you know.


              2016-07-12 13:00:00 / City Talk mal ganz anders mit URBAN X GOLF        
    In Zusammenarbeit mit der Firma Urban Cross Games möchten wir Ihnen anlässlich "40 Jahre AG City" ein neues Eventformat vorstellen. Hierbei haben Sie als Mitglied die Möglichkeit, sich und Ihre Firma auf eine besondere Art zu präsentieren. Das Networking mit den ...

              PS Vita's Twitter app shown off in Hong Kong, we go hands-on (video)        
    Here's a little souvenir for Twitter addicts eyeing the upcoming PS Vita: at today's debut event in Hong Kong, we got to see said console's Twitter app in action for the very first time, and we were also fortunate enough to get some exclusive hands-on time with Sony's in-house software. As you can see in our video after the break, the overall design feels very much in line with Twitter's standard ID: the same shade of blue, the usual tabs on the left column, slick elastic scrolling in the timelines, and support for geotagging, hash tags plus photo attachment while tweeting. No surprises here, but hey, the app worked well for us.

    That said, we were told that the app wasn't quite finished yet, and Sony still couldn't confirm whether this -- along with the other dedicated apps like Skype, Foursquare and Facebook -- will be ready for download by the time the Vita launches in Hong Kong on December 23rd (just a tad later than Japan's launch on the 17th). In case you're wondering, the Vita there will cost HK$2,280 (US$290) for the WiFi version and HK$2,780 (US$360) for the 3G flavor, both unsubsidized but cheaper than their Japanese counterparts. Of course, given that the console isn't region-locked, feel free to go do some shopping in Hong Kong then -- just save some for the locals, OK? Also, check out our gallery below for some close-up shots of the Vita's music and video apps.
    %Gallery-137220%
              Book publishing site reports that Amazon is aggressive in deleting less-than-valid book reviews of self-published books         

    A site called “Just Publishing” offers what looks like good advice to new authors especially with self-published books, especially POD.

    “Why did Amazon delete my book reviews?  Because there was a problem with how you got the reviews”, link.

    I can certainly understand that paying for reviews is unethical (although you would wonder if people pay for Yelp and Angie's List, which both companies adamantly say you cannot).

    I can understand that family is off limits.  But the article also implies social media friends is a no-no.  That’s getting difficult, and I hadn’t heard that before.  People who network enough to sell their books the old fashioned way probably would attract quality Facebook friends and Instagram and twitter followers.  Such a policy would sound a bit self-defeating.

    It is true that there are industry statistics on the expected reasonable ratio of books sold to reviews – it’s high.



    I’ve noticed something else about the POD business.  POD companies often mark the list prices high, which will be only slightly discounted on the Amazon and BN sites, and perhaps some others.  Then they encourage authors to try copies themselves by buying hundreds of copies at maybe 50% off or so.  An author who really wants to operate her own wholesale (with bookstores) and retail (with consumers) could mark them up to about 60% or so and make a profit.  But that would be so time consuming that the author wouldn’t have time for new material.

    It’s frankly very difficult to sell books, or sell advertising on a blog, unless you have built a reputation first in some niche that relates to something people will pay for.  Fiction sometimes provides an exception, but even then it is often niche-like.  Hopefully it’s legitimate (not porn). Given the “gofundme” culture online today (which has become much more prominent than it was two decades ago when I got into this) there is probably opportunity to “sell” in the special needs area – but I have my own psychological and perhaps moral qualms about this.



              LGBT Christians Blog for Sanity        

    Today, Christians across the internet are blogging their faith and their support for LGBT people through a synchroblog project organized by Justin Lee, the Executive Director of the Gay Christian Network. The synchroblog is timed to match the launch of Lee’s new book, TORN: Rescuing the Gospel from the Gays-vs.-Christians Debate.

    Tired of politicized “debates” about the lives of LGBT people and Christians, Lee has attempted to take a middle approach. “This is an issue that is tearing apart families and damaging the reputation of Christianity. But as much as our culture talks about this issue, there’s very little actual conversation going on,” Lee claims.

    Lee’s book, TORN, will reach those in both the Christian world, and those who are, know, or care for someone who is LGBT identified. It asks for people to examine assumptions and to have careful conversations with one another that seek to learn, instead of to “win”.

    The synchroblog draws others into the same conversation. Bloggers are asked to write a blog post in favor of sanity and compassion in LGBT/Christian conversation. Several popular Christian bloggers are already participating, including Rachel Held Evans and Matthew Paul Turner.

    As the country reflects on the successes of marriage equality campaigns, we are seeing that caring conversation is making a real difference. Many in Minnesota credited the defeat of the anti-marriage equality amendment partially on a campaign of conversations across the state. Just a year ago, GLAAD launched a Thanksgiving campaign “I’m Going to Let Aunt Betty Feel a Little Awkward This Thanksgiving” to encourage conversations around the Thanksgiving table.

    Check out the posts that have been submitted so far at Justin Lee’s Tumblr. Share the best quotes or links to the blogs that speak best to your experience. Bloggers interested in joining the synchroblog can still offer submissions and join in the conversation.

    November 13, 2012
    Issues: 

              Cyber Security for the Small Business        

    Cyber Security Month October is Cyber Security Month. If your company uses any kind of computers, cell phones, networks, software, etc. to go about its business, then this month applies to what you do day in and day out. Having these technologies makes our lives more advanced and efficient but they also leave us open […]

    The post Cyber Security for the Small Business appeared first on Blog: News & Legal Articles from Our Team.


              The Real Fruit of Their Labor        
    Acca Shriners, who support a network of hospitals for children, prepare for the 34th Carytown Watermelon Festival.
               : - 10.0.3         
    updated on 02-08-2010 CDT - "Kindergarten - School: Food - Network" is intended for organization of catering in educat...
              Heavy Equipment Operator - Total Oilfield Rentals LP - Lloydminster, SK        
    We offer our customers a wide variety of rental equipment, transportation services and logistical support through our network of 25 branch offices *.*_....
    From Indeed - Tue, 11 Jul 2017 16:13:32 GMT - View all Lloydminster, SK jobs
              Vermittlungsstelle (Network)        
    Die Vermittlungsstelle ist Teil des öffentlichen Telefonnetzes und stellt den Übergabepunkt für den Nachrichtenaustausch zwischen Teilnehmer und dem öffentlichen Telefonnetz dar.
              Five Ways to Have the Best-Ever Virtual Genealogy Conference!        
    Can you believe how fast summer is sailing by? Which means the Family Tree University Virtual Genealogy Conference is right around the corner, Sept. 13 to 15.

    This online event has the excitement and shared knowledge of a genealogy conference, without the expense and difficulty of travel and being away from family and work. Or the pressure to change out of your fuzzy slippers.


    Wikimedia commons, Ch2410

    You get a weekend of video classes (which you can download to keep), networking with genealogy researchers and experts via our conference message boards, and a live keynote. Classes and Q&A sessions cover genetic genealogy, websites, methodology, organizing and preserving your research, and ethnic research.

    I hope you'll join me there. Use coupon code FALLVCEARLY to save $40 on registration! (Code expires Aug. 11, 2017.)

    As a seasoned Virtual Conference attendee, I've got a few tips for making the most of the experience:

    1. Peruse the program ahead of time.
    Most of the conference is on-demand—you log in to watch videos and post to the message board any time during the conference. But Lisa Louise Cooke's keynote presentation on Sunday, "Big Pictures in Little Details," is live, as are the expert Q&A sessions on the message boards. Mark the scheduled bits on your calendar (remember the Virtual Conference is on East Coast Time).

    Since you can download the classes to watch again, don't worry if you can't squeeze them all into the weekend. But do try to watch the ones most related to your research during the conference so you can discuss them on the message boards.

    2. Free up some time.
    The time-saving convenience of attending from home is a MAJOR draw. But carve out some time over the weekend to watch the videos and chat on the message boards. The Virtual Conference genealogy inspiration gets me excited about trying new strategies and resources, so I usually want to spend some time researching, too.

    I minimize errands that weekend, and declare a pizza night for the kids. Daddy does something fun with them and we grant them more screen time. Therefore, my children enjoy the Virtual Conference almost as much as I do!

    3. Log in on Friday.
    Even if you're not planning on doing much conferencing on Friday, take 15 minutes to log in, go over the orientation and click around the conference. Make sure you can download a video. If you have any problems accessing the conference content, just post to the Technical Issues board and we'll address it as quickly as possible.

    4. Play along.
    You'll get the most benefit out of the classes and opportunities to interact with others if your research is fresh in your mind. Go over your tree before the conference to refamiliarize yourself with difficult ancestors. Make a list of your surnames and places for the surnames message board.

    A lot of action happens on those boards! Introductions are made, tips shared, questions answered, brick walls solved, books and websites recommended. We'll even exchange recipes and family stories. Check here often during the conference, post your questions, and answer other peoples'.

    5. Get comfy.
    Everyone talks about how great it is to do genealogy in your pajamas. NOW'S YOUR CHANCE!! Wear your comfiest PJs and fuzziest slippers. Don't bother doing your hair. Make some coffee or tea, fetch your favorite snack and pad over to your computer. Revel in it.

    Visit FamilyTreeUniversity.com to check out the conference details and sign up today. Remember to save $40 (before Aug. 11) with coupon code FALLVCEARLY!


    SaveSaveSaveSave
              Interface deal good for the industry         
    08/09/2017

    The $600 million Interface Security Systems deal has sent—as The Beach Boys once sang—“good vibrations” throughout the security industry, as it provides not only a vote of confidence for what Interface is doing as a modern systems integration company, but also a vote of confidence in the security industry, in general, as companies like Interface represent a new breed of integrator that is staying at the forefront of new technology and innovation.

    John E. Mack III, executive vice president, co-head of investment banking and mergers & acquisitions at Imperial Capital, which acted as financial advisor to Interface on the deal, astutely pointed out that this deal goes beyond validation of what Interface is doing in the space.

    “This is a very cool story for the sophisticated new-age security provider, which is what Interface is—the 2.0 version of what the right kind of security player should be,” he told Security Systems News. “We spend so much time in this industry talking about the residential side of the business, which is interesting, but there is a massive opportunity on the commercial side of the business that Interface is tapping into that I think is a compelling theme.”

    He continued, “There is a lot of validation for a very successful business model here that Prudential is putting up $180 million of new capital, and SunTx is putting up additional capital into the deal. And that you’ve got a very attractive set of debt investors, and just the fundamental backing for the business, is a meaningful part of a positive message for the industry.”

    Jeff Frye, SVP for Interface, told SSN that the support from equity partners is not only a stamp of approval for what the company is doing, but the “capital gives us more fuel to build on our current, better than 15 percent compounded annual growth rate, so we know that we can do more with a little more gas in the tank and we are anxious to prove it.”

    Frye noted that the equity will allow the company to expand its products and services around providing business intelligence, as security is becoming so much more than just, well, security.

    “As a network provider, and a managed services provider of network services and cybersecurity services, we touch a lot of aspects of our customers’ businesses,” Frye explained. “And as a leading purveyor of Internet of Things services, we are able to aggregate intelligence from all of those sensors and data sources to bring actionable insights to a customer’s business. There are some new verticals that we would like to focus on more, including financial services and banking, so this makes that horizon much brighter and much more approachable.”

    And it also makes the security industry’s horizon a little brighter.


              PERS Summit lines up 2017 speakers        
    07/26/2017

    AvantGuard has several speakers lined up for its upcoming PERS Summit, to be held here Sept. 26-28, as well as some of the events.

    This year’s PERS Summit will start with a tour of AvantGuard’s recently remodeled facility. “We’ve got about 25,000 square feet and three levels, and the building will be completely remodeled, inside and out, by the time the event starts. So, people will really get to see—hands on—how that monitoring of the PERS devices works,” Sonja Jorgenson, AvantGuard’s director of marketing, told Security Systems News.

    Aron Ralston will be one of the conference’s keynote speakers. “His story is told in that movie, 127 hours,” Jorgenson noted. Ralston was exploring a Utah canyon when his arm got caught, forcing Ralston to amputate the limb.

    One of the speakers will be Eric Allen, an attorney who can speak to certain marketing techniques. “His expertise is … issues that are raised when businesses are contacting customers through texting and automated calls. He really understands that, the regulations, and the new rules that are coming out in 2017.”

    Laurie Orlov, another speaker at the conference, is focused on aging-in place.  “She has an interesting background in technology, especially targeted to aging seniors,” Jorgenson said. “She’s going to share some predictions about what those technology trends are going to look like in 2017 and beyond.”

    The Summit’s other speakers have not yet been announced.

    “Then, every year, we have a panel of experts in the industry and we talk about a relevant issue. Last time, we talked about fall detection and [the panelists’] feelings about that, and where [the technology] was and if it was really helpful,” Jorgenson said. “We haven’t disclosed what that topic will be yet, but that panel discussion’s always a big talking point.”

    Jorgenson said that AvantGuard hopes to give attendees more access to the presentations at this Summit, which will allow attendees to further review information after returning from the conference. “I think there will be a lot of information, … so, it’s a lot to digest in just a couple days,” she said.

    The company also sends an anonymous survey to its dealers, which asks about a range of topics, including the software that dealers use or the types of customers dealers are seeing, AvantGuard marketing assistant Alex Flitton said. “We actually have a lot of really good feedback so far,” he told SSN. “All of this information will be compiled and interpreted by some of the experts in the industry, to present to our attendees.”

    Networking is another benefit of the event, Flitton noted. “It just puts a lot of like-minded people in a really solid environment where they can interact,” he said.

    The Summit will be held at The Chateaux Deer Valley in Park City, Utah. The conference has been here for each conference.


              PSA TEC 2018 call for presentations now open        
    07/19/2017

    The PSA Security Network, a security and systems integrator cooperative with headquarters in Westminster, Colo., is accepting presentations through Aug. 4, 2017 for its TEC 2018 annual conference. Proposals can be submitted at www.psatec.com/cfp.

    TEC 2018, which will be held at the Sheraton Downtown Denver in Denver, Colo., March 12-16, 2018, is a premier education and networking event for all professional systems integrators in the security and audio-visual markets. TEC features education and certification programs, networking, and dedicated exhibit hours designed to advance the skills and expertise of industry professionals nationwide. This training venue is open to all industry professionals and is designed to meet the educational needs of all employees within an integrator’s organization.

    PSA Security Network’s president and CEO Bill Bozeman told Security Systems News that the move from Westminster—where the conference had been held for several years—to downtown Denver fro 2018 was needed to accommodate the growth of the show.

    “The hotel [Downtown Denver Sheraton] is bigger, so we look forward to having everyone under one roof,” Bozeman told SSN. “In addition, I think some of our younger members and supporters are going to enjoy being in downtown Denver, where there is so much to do.”

    The education program will deliver sessions tailored to physical security and audio-visual integrators focused on emerging technologies, critical issues in the industry, and tool development to augment attendees’ knowledge needed to continue to drive these industries forward. Sessions will be selected that serve a variety of disciplines including business management, sales and marketing, HR and recruiting, project management and operations, and installation and service.

    Proposals are welcome for both certification programs and general education sessions for the security and audio-visual markets. All sessions must be unbiased and minimize commercial references and overt branding. Submissions are evaluated based on topic relevance, speaker expertise, and originality of the content. Additional guidelines are available within the call for presentations submission tool.

    Accepted and approved presenters will receive complimentary registration to TEC 2018 and will have the opportunity to solidify their reputation as an industry resource and subject matter expert while expanding their own professional network and gaining access to strategic partnerships. PSA does not pay honoraria or expenses for accepted proposals.


              SSN talks with I-View Now about recent Eagle Eye integration         
    07/19/2017

    Recently, I-View Now announced a new integration with Eagle Eye Networks. I got the chance to catch up with I-View Now president Larry Folsom to hear a bit about this partnership and how it works.

    “The I-View Now integration with Eagle Eye Networks is a cloud to cloud integration,” Folsom said in an email interview. “We appreciate the architecture in that it is a smart appliance that can be used with inexpensive or expensive cameras depending on the opportunity and requirements. We think this is important for scale (as opposed to cloud systems that require expensive cameras). We found the Eagle Eye Networks APIs to be robust and well thought out.”

    Folsom discussed how the partnership will benefit I-View Now’s customers.

    “We believe this is another great video partner for our dealers and central stations to utilize while protecting their customers,” Folsom said. “It is import to see that the Eagle Eye Networks video will work with all I-View Now compatible signaling integrations (security systems) and will play in the same universal player for operators, end users, and law enforcement.”

    Folsom noted that I-View Now has had a busy year; it partnered with COPS Monitoring and earlier this year announced that cameras from Bosch, OpenEye and Hikvision can now come I-View Now Ready. “We currently have a backlog but we are working our way through it and have been actively hiring engineers to build out the team to support the demand,” he said.

    When asked what the company is currently working on, Folsom pointed to the company’s work with Digital Barriers, announced in early June.

    “This integration is fun because every clip we produce will be processed with the video analytic,” said Folsom. “The process will add intelligence (percent of likelihood of a person) to all of our existing video integrations to reduce false alarms and add bounding boxes so the agent and the end user can see where the changes occurred.”


              how secured is spice works, can someone else collect my info.        

    Also with 4.5 you can begin using SSL. As Andy said, as secure as your network, if you have good passwords for your admins and secure the server your database resides on it is a very secure product.

    In terms of the community posts are searchable by Google, as with any forum don't post any information you are not comfortable sharing with the world.


              how secured is spice works, can someone else collect my info.        

    Its as secure as your network...

    • The data is stored on your local drive in program files so if they can get to that then they can get it
    • If you open the ports to access it remotely they can get at it but need to know a user name and password

              how secured is spice works, can someone else collect my info.        
    how secured is spice works. Can someone else in the spice works network can get access to my network info. This topic first appeared in the Spiceworks Community
              Phải chăng Anime Berserk sẽ tiếp tục có Season 3?        

    Mặc dù vừa qua nhà xuất bản đã thông báo rằng Manga Berserk sẽ bị tạm ngÆ°ng cho đến mùa đông năm nay, nhÆ°ng ở một chiều hướng khác, có lẽ Anime Berserk sẽ vẫn được tiếp tục. Vào hôm thứ sáu vừa qua, tập cuối của Berserk season 2 đã được phát sóng và vào phần cuối […]

    The post Phải chăng Anime Berserk sẽ tiếp tục có Season 3? appeared first on .


              PV mới cho Anime Berserk Season 2: Là Máu – Là Nước mắt – Là Sắc dục        

    Berserk Season 2 – Phần tiết theo của dá»± án Anime chuyển thể từ bộ truyện tranh kinh điển thể loại Seien sẽ được phát sóng vào ngày 7/4/2017 nhằm Anime mùa xuân 2017. Vào hôm nay, trang web chính thức của bộ Anime Berserk đã đăng tải một PV mới giới thiệu về ca khúc […]

    The post PV mới cho Anime Berserk Season 2: Là Máu – Là Nước mắt – Là Sắc dục appeared first on .


              Sau gần ná»­a năm bị tạm ngÆ°ng – Bộ truyện Berserk sẽ quay trở lại vào tháng 3/2017        

    Berserk – Một bộ truyện tranh Seinen điển hình – một trong những bộ truyện khiến người hâm mộ phải mệt mỏi chờ đợi sẽ trở lại vào tháng 3 năm nay. NhÆ° chúng ta đã biết, Kentaro Miura (tác giả của bộ truyện Berserk) là một trong những họa sÄ© truyện tranh “nổi tiếng” với việc liên […]

    The post Sau gần ná»­a năm bị tạm ngÆ°ng – Bộ truyện Berserk sẽ quay trở lại vào tháng 3/2017 appeared first on .


              7 series chúng ta sẽ không bao giờ được xem một cái kết thá»±c sá»± do những gián đoạn        

    Anime có một lịch sá»­ của những câu truyện cho đến phút cuối vẫn chÆ°a rõ kết cục đầy khó chịu và nhức nhối, nhÆ°ng các fan vẫn luôn luôn có thể chuyển sang đọc manga hay light novel để tiếp tục truyện. NhÆ°ng, nếu ngay đến cả nguồn tài liệu cÅ©ng bị hoãn lại? […]

    The post 7 series chúng ta sẽ không bao giờ được xem một cái kết thực sự do những gián đoạn appeared first on .


              Anime Berserk Season 2 sẽ được phát sóng vào Anime mùa xuân 2017        

    Berserk Season 2 – Phần thứ hai của bộ anime hành động (có yếu tố máu me) sẽ chính thức được phát sóng vào Anime mùa xuân 2017. Mới đây, trên trang Web chính thức của bộ anime Berserk đã thông báo rằng, phần hai của bộ phim sẽ chính thức được phát sóng vào Tháng […]

    The post Anime Berserk Season 2 sẽ được phát sóng vào Anime mùa xuân 2017 appeared first on .


              9 nhân vật phá hoại dù có ý định tốt        

    Ý định tốt chÆ°a hẳn đã cho kết quả tốt. Các nhân vật sau đây tuy có lòng tốt nhÆ°ng thường làm rối tinh rối mù mọi chuyện. Hãy cùng Manganetworks điểm qua nào! 1 – Kaito Yashio – Robotics;Note Tớ sẽ ngÆ°ng chÆ¡i video game này trong chốc lát và thu thập các dữ […]

    The post 9 nhân vật phá hoại dù có ý định tốt appeared first on .


              Anime “máu me” Berserk sẽ có Season 2!        

    Sau mùa thứ nhất khá thành công, bộ anime máu me Berserk sẽ chính thức có mùa thứ hai. NhÆ° các bạn đã biết, phần đầu tiên của Berserk – bộ anime được chuyển thể từ bộ truyện thể loại Dark fantasy cùng tên đã kết thúc vào ngày 16/9/2016 để lại nội dung còn khá dang dở. […]

    The post Anime “máu me” Berserk sẽ có Season 2! appeared first on .


              Những cặp đôi anime phải chịu nhiều đau khổ trong tình yêu (phần 1)        

    Rintarou Okabe x Kurisu Makise (Steins;Gate) Anime không quá tập trung xây dá»±ng chuyện tình bi đát của hai người, nhÆ°ng đúng là Okabe đã phải chứng kiến bạn bè của mình chết đi không biết bao nhiêu lần trước khi thá»±c sá»± đến được với Kurisu. Và Kurisu thì cÅ©ng nằm trong số người […]

    The post Những cặp đôi anime phải chịu nhiều đau khổ trong tình yêu (phần 1) appeared first on .


              Sá»± khác nhau giữa manga, manhua, manhwa bạn có biết?        

    Điểm khác nhau giữa manga, manhua và manhwa cũng giống nhÆ° sÆ°Ì£ khác nhau giữa formaggio, queso và fromage. Cả 3 từ đều là một, chỉ khác là cách goÌ£i của mỗi nước mỗi khác. Formaggio là tiếng Italia cho phô mai, trong khi ở Tay Ban Nha được goÌ£i là queso và ở Pháp […]

    The post Sự khác nhau giữa manga, manhua, manhwa bạn có biết? appeared first on .


              Trailer mới của ‘Berserk (2016)’ khiến fan thất vọng        

    ‘NBC Universal Anime’ chỉ vừa tung ra trailer cho ‘hàng hot của năm’ “Berserk”, nhÆ°ng ngay lập tức nhận được nhiều lời phàn nàn từ fan. Đây là một số hình ảnh được cắt ra từ trailer :   CGI của họ có vấn đề rồi ? Xem trailer để thấy rõ hÆ¡n. Đó là […]

    The post Trailer mới của ‘Berserk (2016)’ khiến fan thất vọng appeared first on .


              Anime “Berserk” (2016) sẽ phát sóng vào đầu tháng 7        

    Thông tin mới nhất về series anime “Berserk” đã được hé lộ trên số báo thứ 11 của tạp chí Young Animal. Anime được chuyển thể từ manga cùng tên của tác giả Kentarou Miura, nó nằm trong top manga bán chạy nhất tại Nhật Bản. Vào ngày 1 tháng 7 tới, anime sẽ chính […]

    The post Anime “Berserk” (2016) sẽ phát sóng vào đầu tháng 7 appeared first on .


              Berserk tiếp tục tung ra PV mới chuẩn bị cho sá»± ra mắt trong tháng 7 tới        

    Có lẽ cái tên được mong chờ nhất trong mùa hè năm 2016 đó chính là anime Berserk. Và vừa rồi tại sự kiện Anime Japan 2016 đang diễn ra tại Tokyo cuối cùng thì NBC Universal cũng đã cho ra mắt PV đầu tiên của Berserk

    The post Berserk tiếp tục tung ra PV mới chuẩn bị cho sự ra mắt trong tháng 7 tới appeared first on .


              [Xem gì năm 2016] Những bộ Anime không thể bỏ lỡ trong năm 2016        

    Anime năm 2015 đã đi qua để lại rất nhiều điểm nhấn bởi những bộ Anime chất lượng. Tuy nhiên, có lẽ năm 2016 sẽ chẳng kém phần sôi động so với năm 2015 là bao. Bởi năm 2016 sẽ đánh dấu sá»± quay trở lại mùa tiếp theo của các bộ anime bom tấn […]

    The post [Xem gì năm 2016] Những bộ Anime không thể bỏ lỡ trong năm 2016 appeared first on .


              Vui buồn lẫn lộn về Berserk        

    Berserk – một bộ truyện tranh đình đám của họa sÄ© truyện tranh Kentarou Miura kể về hành trình của Hắc Kiếm SÄ© tiếp tục gây thất vọng cho người hâm mộ. Mới đây, trong số đầu tiên năm 2016, Tạp chí Young Animal đã công bố một số thông tin quan trọng về bộ truyện tranh […]

    The post Vui buồn lẫn lộn về Berserk appeared first on .


              Manga Berserk sẽ trở lại vào tháng này        

    Số 14 của tạp chí Young Animal (thuộc Hakusensha) được phát hành hôm thứ 6 đã thông báo rằng manga Berserk của tác giả Kentarou Miura sẽ trở lại trong số tiếp theo của tạp chí. Bộ truyện sẽ được phát hành mỗi số hàng tháng sau 10 tháng bị tạm ngÆ°ng. Hakusensha sẽ phát hành số 15 của tạp […]

    The post Manga Berserk sẽ trở lại vào tháng này appeared first on .


              Couple Convicted of Satanic Child Abuse Freed From Prison and Declared Innocent        
    You may recall the hysteria in the 80’s and early 90’s when an organized network of daycares were alleged to be involved in satanic ritual child abuse of youngsters in their care, the most infamous being the McMartin preschool case. Virginia McMartin operated her preschool in Manhattan Beach, California employing family members and other staff. … Continue reading Couple Convicted of Satanic Child Abuse Freed From Prison and Declared Innocent
              [Article] Navigating the Oncoming Storm: Opportunities and Challenges with Home Energy Management        
    Home energy management (HEM) systems—comprising smart networked devices that can provide information on, and dynamically adjust, energy use within a home—have been evolving for decades and finally appear poised to enter the mainstream. However, with hundreds of players getting into the home automation space, the increasing availability of myriad smart devices, an increased vendor focus on customer security and convenience over energy savings, and numerous other challenges, it can be daunting for even seasoned energy experts to try to figure out how best to approach this market, much less find ways to realize the many benefits ...
              â€œWhat Does it Mean to Say that Economics is Performative?,” M. Callon (2007)        
    With the last three posts being high mathematical-economic theory, let’s go 180 degrees and look at this recent essay – the introduction of a book, actually – by Michel Callon, one of the deans of actor-network theory (along with Bruno Latour, of course). I know what you’re thinking: a French sociologist of science who thinks […]
              Buffett to Perform in Hawaii in November        
    According to KHON 2, Jimmy Buffett will perform at the Waikiki Shell in Honolulu on Saturday, November 4th. Honolulu, HI Saturday, November 4th, 2017 Waikiki Shell KHON says that it will be an acoustic show and that Jake Shimabukuru will be a special guest. Tickets go on sale Friday, June 9th through Ticketmaster and Ticketnetwork. […]
              Donald Trump warns journalists, calls them most dishonest human beings        

    Washington: Describing journalists as the most dishonest human beings on Earth, US President Donald Trump has said he has been "running a war" with the media and warned them of consequences for falsely reporting that less number of people attended his inauguration.

    "We had a massive field of people. You saw them. Packed.

    I get up this morning, I turn on one of the networks, and they show an empty field," Trump said.

    "I say, wait a minute, I made a speech. I looked out, it looked like a million, million and a half people. They showed a field where there were practically nobody standing there.

    They (media) said, Donald Trump did not draw well. I said, it was almost raining, the rain should have scared them away, but God looked down and he said, we're not going to let it rain on your speech," he said.

    "Then I walked off and it poured right after I left. It poured. But, we have something that's amazing because, it looked like a million and a half people. Whatever it was, it was. But it went all the way back to the Washington Monument.

    And I turn on -- and by mistake I get this network, and it showed an empty field. And it said we drew 250,000 people," he said.

    "Now, that's not bad, but it's a lie. We had 250,000 people literally around in the little bowl that we constructed. That was 250,000 people. The rest of the 20-block area, all the way back to the Washington Monument, was packed.

    So we caught them, and we caught them in a beauty. I think they're going to pay a big price," Trump warned.

    Trump was speaking at the CIA headquarters.

    He told his top spy agency that this is the reason for him visiting the CIA headquarters as the media has portrayed that he has differences with the intelligence community.

    "The reason you're my first stop is that, as you know, I have a running war with the media. They are among the most dishonest human beings on Earth," Trump said amidst applause and laughter from the CIA officials attending his maiden address to them.

    "They sort of made it sound like I had a feud with the intelligence community. And I just want to let you know, the reason you're the number-one stop is exactly the opposite.

    They understand that, too," he said and then said that the crown strength of his inauguration was being accurately being written by the media.

    Then Trump listed out another incident.

    So a reporter wrote that Trump took down the bust, of Martin Luther King.

    "It was right there. But there was a cameraman that was in front of it. So a reporter writes a story about I took down. I would never do that because I have great respect for Martin Luther King. But this is how dishonest the media is," Trump alleged.

    "I only like to say that because I love honesty. I like honest reporting. I will tell you, final time -- when you let in your thousands of other people that have been trying to come in -- because I am coming back -- we're going to have to get you a larger room," Trump said indicating that he would have a bigger room for the White House press corps.

    Donald Trump warns journalists, calls them most dishonest human beings
    Section: 
    Yes
    News Source: 
    Facebook Instant Article: 
    No

              DNA: Today in History, October 12, 2016        

    Watch history moment to learn the events that occurred on this very date i.e October 12.

    Zee News always stay ahead in bringing current affairs from all the valley of National interest, Politics, Entertainment, Sports and International happenings. We take you to the depth of every matter by providing every small detail and makes you familiar with all the happening around you.

    Zee News is the highly popular Hindi News channel of India’s largest television network ZMCL. The channel, which has a huge following in India and abroad, has won several prestigious national and international awards. Among its popular programs are -

    Dr. Subhash Chandra Show: https://goo.gl/fCugXC
    Daily News and Analysis: https://goo.gl/B8eVsD
    Manthan: https://goo.gl/6q0wUN
    Fast n Facts: https://goo.gl/kW2MYV
    Your daily dose of entertainment: https://goo.gl/ZNEfhw
    Sports roundup: https://goo.gl/KeeYjf
    Aapke Sitare: https://goo.gl/X56YSa
    Bharat Bhagya Vidhata: https://goo.gl/QqJiOV
    Taal Thok Ke : https://goo.gl/yiV6e7

    Subscribe to our channel at https://goo.gl/qKzmWg

    Check out our website: http://www.zeenews.com

    Connect with us at our social media handles:
    Facebook: https://www.facebook.com/ZeeNews
    Twitter: https://twitter.com/ZeeNews
    Google Plus: https://plus.google.com/+Zeenews

    Domain: 
    News
    English Title: 
    DNA: Today in History, October 12, 2016
    Home Title: 

    DNA: Today in History, October 12, 2016

    IsYouTube: 
    Yes
    YT Code: 
    6WBNkH_kSOs
    Image: 

              DNA: Work-related stress may increase risk of heart attack        

    Analysis of Pakistan's fourth rank in risky nation for journalists. Watch this special segment and get to know more here.

    Zee News always stay ahead in bringing current affairs from all the valley of National interest, Politics, Entertainment, Sports and International happenings. We take you to the depth of every matter by providing every small detail and makes you familiar with all the happening around you.

    Zee News is the highly popular Hindi News channel of India’s largest television network ZMCL. The channel, which has a huge following in India and abroad, has won several prestigious national and international awards. Among its popular programs are -

    Dr. Subhash Chandra Show: https://goo.gl/fCugXC
    Daily News and Analysis: https://goo.gl/B8eVsD
    Manthan: https://goo.gl/6q0wUN
    Fast n Facts: https://goo.gl/kW2MYV
    Your daily dose of entertainment: https://goo.gl/ZNEfhw
    Sports roundup: https://goo.gl/KeeYjf
    Aapke Sitare: https://goo.gl/X56YSa
    Bharat Bhagya Vidhata: https://goo.gl/QqJiOV
    Taal Thok Ke : https://goo.gl/yiV6e7

    Subscribe to our channel at https://goo.gl/qKzmWg

    Check out our website: http://www.zeenews.com

    Connect with us at our social media handles:
    Facebook: https://www.facebook.com/ZeeNews
    Twitter: https://twitter.com/ZeeNews
    Google Plus: https://plus.google.com/+Zeenews

    Domain: 
    News
    English Title: 
    DNA: Work-related stress may increase risk of heart attack
    Home Title: 

    DNA: Work-related stress may increase risk of heart attack

    IsYouTube: 
    Yes
    YT Code: 
    ymOT4idcTvg
    Image: 

              DNA: Why are politicians and media ignoring the patriotic residents of Gurez Valley? Part III        

    Politicians and journalists are not taking cognizance of patriotic residents of Gurez Valley in Kashmir. Watch this special segment and get to know about the real face of Kashmir.

    Zee News always stay ahead in bringing current affairs from all the valley of National interest, Politics, Entertainment, Sports and International happenings. We take you to the depth of every matter by providing every small detail and makes you familiar with all the happening around you.

    Zee News is the highly popular Hindi News channel of India’s largest television network ZMCL. The channel, which has a huge following in India and abroad, has won several prestigious national and international awards. Among its popular programs are -

    Dr. Subhash Chandra Show: https://goo.gl/fCugXC
    Daily News and Analysis: https://goo.gl/B8eVsD
    Manthan: https://goo.gl/6q0wUN
    Fast n Facts: https://goo.gl/kW2MYV
    Your daily dose of entertainment: https://goo.gl/ZNEfhw
    Sports roundup: https://goo.gl/KeeYjf
    Aapke Sitare: https://goo.gl/X56YSa
    Bharat Bhagya Vidhata: https://goo.gl/QqJiOV
    Taal Thok Ke : https://goo.gl/yiV6e7

    Subscribe to our channel at https://goo.gl/qKzmWg

    Check out our website: http://www.zeenews.com

    Connect with us at our social media handles:
    Facebook: https://www.facebook.com/ZeeNews
    Twitter: https://twitter.com/ZeeNews
    Google Plus: https://plus.google.com/+Zeenews

    Domain: 
    News
    Section: 
    English Title: 
    DNA: Why are politicians and media ignoring the patriotic residents of Gurez Valley? Part III
    Home Title: 

    DNA: Why are politicians and media ignoring the patriotic residents of Gurez Valley? Part III

    IsYouTube: 
    Yes
    YT Code: 
    m7CyeqBPVCM
    Image: 

              DNA: Why are politicians and media ignoring the patriotic residents of Gurez Valley? Part II        

    Politicians and journalists are not taking cognizance of patriotic residents of Gurez Valley in Kashmir. Watch this special segment and get to know about the real face of Kashmir.

    Zee News always stay ahead in bringing current affairs from all the valley of National interest, Politics, Entertainment, Sports and International happenings. We take you to the depth of every matter by providing every small detail and makes you familiar with all the happening around you.

    Zee News is the highly popular Hindi News channel of India’s largest television network ZMCL. The channel, which has a huge following in India and abroad, has won several prestigious national and international awards. Among its popular programs are -

    Dr. Subhash Chandra Show: https://goo.gl/fCugXC
    Daily News and Analysis: https://goo.gl/B8eVsD
    Manthan: https://goo.gl/6q0wUN
    Fast n Facts: https://goo.gl/kW2MYV
    Your daily dose of entertainment: https://goo.gl/ZNEfhw
    Sports roundup: https://goo.gl/KeeYjf
    Aapke Sitare: https://goo.gl/X56YSa
    Bharat Bhagya Vidhata: https://goo.gl/QqJiOV
    Taal Thok Ke : https://goo.gl/yiV6e7

    Subscribe to our channel at https://goo.gl/qKzmWg

    Check out our website: http://www.zeenews.com

    Connect with us at our social media handles:
    Facebook: https://www.facebook.com/ZeeNews
    Twitter: https://twitter.com/ZeeNews
    Google Plus: https://plus.google.com/+Zeenews

    Domain: 
    News
    English Title: 
    DNA: Why are politicians and media ignoring the patriotic residents of Gurez Valley? Part II
    Home Title: 

    DNA: Why are politicians and media ignoring the patriotic residents of Gurez Valley? Part II

    IsYouTube: 
    Yes
    YT Code: 
    DmQKOBs06Zw
    Image: 

              Welcome to college! Here are some things you may want to know…        

    Terry Webb is an assistant professor of counseling at Cuyahoga Community College. Below are things that he wishes he knew before attending college as a first generation college student.

              Home computer repair - Home computer repair Tampa troubleshooting        
    The basic parts of a Home computer repair are monitor, motherboard, SMPS, processor, daughter board, network cards, RAM, CMOS battery, hard disk, buses (cables), keyboard, mouse, UPS and modem. So these components will face damage as they are electronic components.


     Long beep sound heard while starting custom pc repair tampa and OS is not loading. Your RAM is damaged. So buy a RAM either D RAM or SD RAM after checking the slot in your motherboard and install new RAM.


    Your Operating system OS may be damaged due to improper shutdown or due to missing of some files. Please re install your OS. Another problem can be your hard disk damage.


    Huge sound coming from CPU. Your cabinet cooling fan may be making that huge noise while working. Try to replace that bad cooling fan with a good one.


    Sometimes there will be problem in Home PC repair Tampa booting. So Home computer repair boot troubleshooting can be done by pressing delete button while restarting PC and providing appropriate settings in BIOS.


    If you are like most people who often use computer repairs Tampa at work or in your home, then you must also know how frustrating it can be when your Home computer repair crashes in the middle of an important task. Home computer repair errors such as crashes and file corruption are often a result of registry problems. To make sure your PC always performs efficiently, you have to invest in registry repair software.


    Do you use a free windows registry repair for your Laptop computer repair? There are a few guidelines that you need to keep in mind when purchasing software and these are:


    It is important to note however, that software that can find many errors aren’t necessarily the best kind. Some dubious repair programs list errors where there aren’t actually any so choose well.


    Unless you are a certified Home computer repair genius, it is best to choose user friendly software. Everyone needs free window registry repair programs.



     



    Some Home computer repairs actually come with a built-in registry repair program and while you may be tempted to fix the registry yourself, remember that you might inadvertently delete information that is critical to Home computer repair operations.


    About the author: Tampa pc pros inc takes pride in offering a wide range of computing solutions like: Pc Repair Tampa , Computer Repair Tampa , Custom Pc Repair Tampa , Computer Repair Service Tampa , Virus Removal Service Tampa.

    computer security help: data backup

    computer security help: data backup

    Article Source: www.articlesnatch.com


              Content marketing guidelines 2016 2017        

    Content marketing is still hot. The bad news: many marketers think content marketing is about spamming people on social networks. I disagree with this approach. In this deck, I am sharing my 10 insights on content creation, based on my own experiences and best practices. But this is an unfinished document, I would love to receive input from other people in the field and I’d be happy to add their content tips into this deck.
              Customer first without compromise        

    In September 2013, Steven Van Belleghem and Peter Hinssen organized an inspiration journey to the West Coast of the US. Together with 20 top executives, we visted a large group of companies. In this paper, we wrote down our conclusions of this very inspiring tour. We learned the power of combining a customer first mentality with a networked organization and a purpose driven culture. Check out our paper to understand all details.
              Dream It. Do It. Inspires Youth        
    The Dream It. Do It. network aims to inspire youth to pursue careers in manufacturing and also works to educate career influencers, such as teachers and parents, about manufacturing as a high-quality career choice. The network was launched by the Manufacturing Institue in 2005 and since then has engaged thousands of manufacturers, students, parents, and educators. Dream […]
              Occupy's Predicament: The Moment and the Prospects for Movement [Audio]        
    Speaker(s): Professor Todd Gitlin, Professor Craig Calhoun | Erupting in September 2011, Occupy Wall Street was jump-started by a radical core who devised a form of action, occupation, that combined face-to-face with electronic elements. In an election year, the ingenuity of the original core has been overshadowed by the momentum, the stakes, and not least the money of the presidential campaign. Whether an Occupy movement takes shape and endures, focused on transformation of a political system overwhelmingly shaped by plutocrats, depends on the actions of many networks that were mobilized within and around the Occupy moment. Todd Gitlin is professor of journalism and sociology at Columbia University and is the author of 15 books, including, Occupy Nation: the roots, the spirit, and the promise of Occupy Wall Street. Professor Calhoun is a world-renowned social scientist whose work connects sociology to culture, communication, politics, philosophy and economics. He took up his post as LSE Director on 1 September 2012, having left the United States where he was University Professor at New York University and director of the Institute for Public Knowledge and President of the Social Science Research Council.
              Facebook 操弄 Trending 裡的新聞        
    看了 Gizmodo 與 Facebook 的對話,就有種之前某長輩常說的「沒被抓到就不算犯罪喔~」的感覺:「Former Facebook Workers: We Routinely Suppressed Conservative News」。 Gizmodo 接到前員工的線報後,再加上透過關係問到其他的前員工,證實了標題的消息: Facebook workers routinely suppressed news stories of interest to conservative readers from the social network’s influential “trending” news section, according to a former journalist who worked … Continue reading
              Digital Mesh Network Abstract Background        

    [Read More…]


              RE: embedded        
    Yes, because so many people in Apple's target market for the iMac want to hook it up to 2 or more networks at once… Fanless though would be great, pretty hard to achieve though. When someone starts putting out fanless tower cases, I think you have more of a case for demanding a fanless iMac.
              Scienza senza confini        

    Trieste città di confine. In un caldo week end di maggio gli studenti del Master in Comunicazione della scienza della Sissa intraprendono un viaggio tra scienza, sapori, popolazioni, culture e lingue diverse. Un mix di suoni e parole di frontiera diviene così la nuova puntata di Jekyll on air andata in onda sulle frequenze di Radio Fragola (Popolare Network, Trieste) domenica 24 maggio. Eccola qui anche in podcast e streaming. Buon ascolto!


              Berroth        

    Erika Berroth, associate professor of German, presented a research paper titled "Slow Violence and Vibrant Matter in Marica Bodrožić' Novel Kirschholz und alte Gefühle" at the 38th annual conference of the German Studies Association for a panel with the title Berlin Haunts: Specters of the Past and Future in Recent Berlin Fictions. Berroth also contributed to discussions in a session sponsored by the GSA Environmental Studies Network titled "The Metabolism of Cultures: Consumption, Waste, and Desire in Ecological Humanities," and in a session sponsored by the North American DAAD Centers for German and European Studies titled Mensch/Natur/Umwelt: New Research and Pedagogy of the Green Germany."


              The Art Of The Summer Garden 2009        
    A Photo-Journal Feature
    written and photographed by
    Ginger Van Hook



    Features Beverly Hills Artist
    LINDA KUNIK
    "PLANT IT FORWARD"


    Local Beverly Hills Artist Creates Art
    From Her Garden
    Launching a new project called
    “PLANT IT FORWARD”

    A local artist and resident of Beverly Hills turned her garden into an art form by creating a project called “Plant It Forward”. Linda Kunik, an artist and alumna from Otis College of Art and Design has initiated a project to enhance her artistic community as well as inspire local artists to do the same. “Plant It Forward” is about establishing community while reconnecting with the earth, a vision which includes artists bartering for vegetables either by working in the garden or helping in the documentation of the garden’s delights by photographing, videotaping and or journaling about the experience. Ms. Kunik believes trading services for food in these tough economic times makes sense because while cultivating the soil, a group of artists will also cultivate friendships and nourish the community. The foundation of Linda Kunik’s work is to get back to the roots of sustainable agriculture. “Plant It Forward” does exactly what it says. The seeds are planted now and the fruits of this labor go forward to feed people who take from the harvest the inspiration to plant their own gardens.

    “…My vision is for everyone to have their own garden, large or small and if that is not possible, to raise enough awareness for the people to shop locally and support their local Farmer’s Markets…” Ms. Kunik states as she points to the five large gardens she created in the back yard of her home, replacing flowerbeds and lawns in order to plant vegetables, herbs and fruit trees. Kunik wanted to give back to her community, raise awareness of the need for personal gardens and utilize the artistic medium to make her statement. “My work has always referenced the land. From my early days as a watercolorist painting landscapes to later works making paintings of deforestation or global warming; the beauty and fragility of the earth has been a recurring theme. Combining my agricultural practice with my art-making seems to be an natural evolution.”

    The prospect of jumping into an artistic adventure to produce homegrown fruits and vegetables with a group of fellow artists was contagious. Thus the enthusiasm carried this labor of love into the summer as Ms. Kunik worked with a group of artists to bring in soil, create raised beds and began to fill them with the seeds of tomatoes, carrots, spinach, lettuce, corn, and a variety of herbs, citrus fruits and assorted vegetables. Some of the artists participating in Plant It Forward include Juna Amano (Painting & Sculpture), Marissa Magdalena (Installation, Performance and Drawing), Ofunne Obiamawe (Photographer), Suzanne Oshinsky (Videographer), Michiko Smith (Painting), Whitney Stolich (Photographer) and Ginger Van Hook (Photographer) as well as the new artists joining every week.

    It is the zenith of summer now and already some of the tomatoes have ripened looking fat, juicy and red. In recent weeks, there have already been harvests of endive lettuce, carrots and radishes. The important element in the formation of this garden is the artistic component of Ms. Kunik’s vision. The raised beds and gardens are shaped into asymmetrical forms with a walking path between them. Large Sunflowers adorn the corners of each of the vegetable beds and the aromas of fresh tomatoes and rosemary mixes with the fragrances of roses and lavender permeating the air in her back yard.

    Linda Kunik has written a blog about her work and continues to support the arts by highlighting the artistry of organic gardening in photography and painting. She also founded a community artist forum called the O Salon. The O Salon is where artists network and take part in conceptual critique as well as share information about each other’s works. Ms. Kunik is involved in a number of professional organizations including the Los Angeles Art Association, the Los Angeles County Museum of Art Docent Council and the National Museum of Women in the Arts.

    Linda Kunik photographed beside her painting
    Exhibition at Gallery 825 in Los Angeles, California, 2008
    (Photo by Ginger Van Hook)

    Plant It Forward-the starving artist project
    http://plantitforwardla.blogspot.com
    lindakunik@gmail.com
    www.lkunik.com

    Additional artists websites and blogs:

    • Juna Amano (Painting & Sculpture) http://junaamano.blogspot.com

    • Marissa Magdalena (Installation, Performance and Drawing) www.marissamagdalena.com

    • Ofunne Obiamawe (Photographer) www.RepublicofPeace.com

    • Suzanne Oshinsky (Videographer) http://isoareyesore.blogspot.com/.

    • Michiko Smith (Painting)

    • Whitney Stolich (Photographer) www.whitneystolich.com

    • Ginger Van Hook (Photographer) www.gingervanhook.com
    • http://gingersartjournal.blogspot.com

    • Luke Van Hook (Painting) www.lukevanhook.com








    "Plant It Forward" : The week of June 07, 2009

















    "Plant It Forward" : The week of July 01, 2009





    "Plant It Forward" : The week of July 08, 2009




















    "Plant It Forward" : The week of July 15, 2009





















    "Plant It Forward" : The week of July 22, 2009










    "Plant It Forward" : The week of July 29, 2009








    "Plant It Forward" : The week of August 5, 2009

    Artist, Linda Kunik planted a garden to share with fellow artists.


















    "Plant It Forward" : The day of August 08, 2009

    HARVEST DAY!










































    "Plant It Forward" : The Week of August 12, 2009






























    "Plant It Forward" : Week of August 19, 2009



















              TP-LINK RE360 Network repeater 867Mbit/s Wit bridge & repeater        

    Normale prijs: € 64,00

    Aanbiedingsprijs: € 57,00


              Joint Communiqué – Foundational Meeting of the WPS National Focal Point Network        
    Foundational Meeting of the WPS National Focal Point Network Joint Communiqué   We, Ministers and High-Level Representatives of [list of countries], as well as of the [list of regional organizations], have come together in New York on the 23rd of September, 2016 to launch the Women, Peace and Security National Focal Points Network in the [...]
              Monster.com & Pivot Network bring you: "Career, Country "        
    In honor of Veteran’s Day, Monster.com and the Pivot network to bring you their segment, “Career, Country”.    How do young vets returning from service integrate into the civilian workforce?  We t...

    This is an article summary only. Click on the article's title to enjoy the complete article
              Easy Way to Put Banners on Blogger        
    Beginner bloggers who want to make money from their blog often ask me how to put banners on a Blogger blog (Blogspot blog). In this article I will outline the steps to help you put banners on Blogger the easy way. You will have your banners up and running in no time and starting to earn extra money from your blog.


    Earn $$ with WidgetBucks!


    How to Put Banners on Blogger the Easy Way
    In order to make money online and place banners on Blogger you first need to sign up with a referral program.

    1. Sign up for some affiliate referral programs such as Chitika, Widget Bucks and Linkworth. There are heaps of affiliate marketing networks out there but to start with you might try Commission Junction which boasts a huge range of advertisers.

      • Examples of Some Earnings You Might Expect from Affiliate Programs


    2. Once you have signed up with an affiliate program which pays you referral fees you can start earning money by placing the affiliate banner on your Blogger blog.

    3. Decide where you want to place your banner on Blogger. Here are 2 very easy options:

      • Place Banner in Blogger Sidebar or Footer
        Adding an Affiliate banner to the Blogger sidebar or footer are both easy placement options. While logged in to Blogger, go to Layout > Page Elements and click on Add a Gadget in the Blogger sidebar, choose HTML/Javascript gadget from the list and paste the affiliate banner code into the content box, click on the Save button and your banner should display. If you need to center the banner enclose it in an HTML tag like this:
        <center>YOUR AFFILIATE CODE</center>

      • Place Banner Above First Post in Blogger
        To add a banner above the first post in Blogger you first need to make it possible to add a gadget to this area. If there is no option to add a gadget in the Blogger post area go to Layout > Edit HTML. No need to check Expand Widget Templates for this. Scroll down until you find these lines:

        <div id='main-wrapper'>
        <b:section class='main' id='main' showaddelement='no'>

        Replace the no with yes and save. You will now be able to add a gadget to the area above the first post. To display your banner click on Add a Gadget above Blog Posts and paste the affiliate banner code into the HTML/Javascript gadget and save. Click on View Blog to see your new banner.

    Today I have show you the easy way to add affiliate marketing banners to your Blogger blog (Blogspot blog) to help you earn extra money. Remember affiliate programs are free to join so it costs you nothing to experiment. Why not try a program like Chitika advertising and referral program because even if you don't decide to advertise with Chitika it costs you nothing to put their banner advertising on your blog and you might make your first $10 faster than you think.

    Get Chitika | Premium




    Related Articles
    How to Add Chitika Ads to Blogger
    Make Money from Banners with Blogger
    Earn Money from Blogger with Linkworth Affiliate Program
    Earn Money with Chitika and Blogger


    Subscribe to Blogspot Blogger Guide Full RSS Feed

    Subscribe to Blogspot Blogger Guide by Email

              Earn Money from Blogger Join Linkworth Affiliate Program        
    Want to make money online with your Blogger blog (Blogspot blog)? Earn money with Linkworth. Linkworth is one Affiliate Program that Blogspot Bloggers need to take a good look at if they are serious about making money from their blog. Given that most bloggers are also readers of blogs virtually every reader who arrives on your blog is a possible referral prospect. Therefore having a Linkworth affiliate banner or two on your blog makes sound marketing sense and is an easy way to earn extra money.

    Why Would a Blogger Want to Sign Up for Linkworth?
    Linkworth is a large, established and reputable advertising network. Linkworth offers Blogspot bloggers who become a partner a variety of income earning opportunities to monetize their blogs. Multiple advertising programs offerred by Linkworth include: Text Link Ads, Linkpost, Linkmura, Linkintxt, LinkWords, LinkBB, Linkpack.

    Linkworth offer a variety of ways to monetize your Blogger blogspot blog
    One of the bonuses of Linkworth is that it can be used in conjunction with Google Adsense provided no contextual advertising which is not allowed by Google is used. This makes Linkworth an extremely attractive advertising option for Blogspot bloggers and therefore a good reason to promote the affiliate program. Linkworth is suitable for the newbie blogger too as it is easy to get approval even when a blog has a low Google page rank and is receiving minimal traffic. Make sure you have at least 12 posts before you apply or your application may get declined.

    My Favorite Ways to Make Money Online with Linkworth
    All the programs offerred by Linkworth are good but my two favorite ways to make money online with Linkworth are:

    Affiliate Banner
    LinkPost
    With LinkPost you can earn money by writing sponsored posts. Depending on the Google Pagerank of your blog you can receive up to $50 per review. The process is easy but competitive. Basically you submit your blog to the advertising marketplace and sponsors and advertisers pay you money for your review.

    LinkWords
    With LinkWords keywords in your blog are underlined and if clicked on by a reader you earn money - either 50% or 70% for every ad clicked on depending on what scheme you have opted for. Some niches lend themselves better to text ad advertising and therefore generate more income per click than others. You will need to experiment to find out if LinkWords is worthwhile way for you to earn money from your blog.


    Benefits of the Linkworth Affiliate Referral Program
    Linkworth's referral program is generous and a good way to earn money. You get $50 for just signing up either as a publisher or with a combo account. That $50 is paid out to you once you earn $100 or more in total.

    For every new referral sent through your affiliate link you earn a flat commission of $50. The $50 is held as a pending payment until the referee has spent or earned a minimum of $100.

    Another sweetner for joining the Linkworth referral program is that you will receive 5% of the earnings for all referrals you make for the life of their account. Pretty good way to earn money huh?

    Linkworth claim that most account holders spend/earn well into the thousands. While I am skeptical of this statement Linkworth does offer a chance to make money by actively promoting its affiliate referral program.

    Summary
    You can earn money online if you know how. The Linkworth Affiliate Program offers good rewards for pasting a banner or two on your blog. From there on in it depends on the activity of your referees as to how much money you will actually make but there is scope for reasonable earning particularly if you supplement this with LinkPosts and LinkWords. Why not act now and start earning extra money from Linkworth right away. Sign up with Linkworth Affiliate Program or become a partner or both today.

    Affiliate Banner


    Related Posts
    Making Money From Banners with Blogger
    How to Get More Adsense Clicks with Blogger
    Earn Money with Chitika and Blogger
    Easy Way to Put Banners on Blogger


    Subscribe to Blogspot Blogger Guide Full RSS Feed

    Subscribe to Blogspot Blogger Guide by Email

              Durbhaagya Haider ka (Kashmir ka rajkumar)        
    ------------
    Note 1: It is after a long time that I want to write about an (Indian) movie!

    Note 2: Considering that Haider is adapted from a well-known (and arguably the most famous) Shakespearean play, The tragedy of Hamlet, Prince of Denmark, I will go easy with spoilers and without warning. And for those unfamiliar with tragedies by Shakespeare, spoiler alert, everybody dies.
    ------------


    I knew Vishal Bhardwaj has a fetish for Shakespeare. Haider is the final installment of his trilogy spanning Maqbool (Macbeth) and Omkara (Othello) before this. Shakespeare's influence on him is also evident in his outings not based on plays, most notably in Matru ki Bijlee ka Mandola, and less visibly in 7 khoon maaf, and Ishqiya among others. But this is also a man who truly loves cinema and adores the medium. So much that the characters of Rosencrantz and Guildenstern from the original play are depicted as Salman and Salman, a duo which run a VHS rental store, idling their time away to the moves of Salman Khan, the rising superstar from the 1990s. It is a fitting tribute to the time and place in which Vishal Bhardwaj grew up as a filmmaker.

    I mention this because I wager this man is heavily influenced in his style by another man who adores cinema, Quentin Tarantino, a director famous for his revenge epics. With all the bloody gruesomeness that leaves its trail along a saga of revenge, the conflicts, the deliberations, the mess - how cool is it that our home-grown director does homage to Tarantino's trademark trunk shot and ends Haider with a sampling straight from his movies (edit: my bad. The sampling at the end of Haider is from Extreme Ways.)



    Set in the mid-1990s in Kashmir, the story embeds itself flawlessly in the setting, rather than it just being a background setup for the events adapted from the original play.


    Jhelum, jhelum dhoonde kinara
    Jhelum, jhelum dhoonde kinara
    Dooba sooraj, kin aankhon mein
    Sooraj dooba, kin aankhon mein
    Jhelum huya khaara



    This has to be Shahid Kapoor's highlight performance of his career yet. I was skeptical about this casting choice from the trailers, but boy was I wrong. The amount of preparation he put behind this role shows. The monologue scene in front of an audience at the town square is exaggerated just the right amount, and the execution of the play-within-a-play exposition scene from the original is neat. His costumes, makeup, body language, all fit together seamlessly as he owns his character.



    Hai ki hai nahi, bas yehi sawaal hai
    Aur sawaal ka jawab bhi sawaal hai.

    Dil ki agar sunoon to hai, dimaag ki to hai nahin
    Jaan loon ki jaan doon, mai rahoon ki mai nahin.



    And what a find Shraddha Kapoor is! Elegant, charming, poised, controlled, absolutely not afraid to let her eyes to the talking, and leaves you yearning for more. I wish I was there to see her keeping a straight face as she mispronounces 'loved' as 'love-edd' as they were filming it! I, for one, definitely want to see her do meaningful roles in the future. Irrfan Khan delivers a spirited punch during his meager screen time, playing the ghost from the play.


    But the highlight performance in the movie has to be Tabu's, arguably her career's best, atleast in a very long time. A delight she is as she sets the screen on fire bringing her character to life. There is a scene in which she is trying to convince Haider to leave Kashmir for a better future. With her teary, swollen eyes, and a gun pointed to her head, she ultimately gets her way. I cannot imagine another actress from around here who can pull that off with such elegance.


    "Vaishi bhediyaa ban chuka hai wo."
    "Shukr hai aasteen ka saanp nahi banaa."


    Vishal Bhardwaj, with his direction and music (for Gulzar's excellent lyrics), tops himself. Being true to the source material and still making it his own, he comes out triumphant. He is at the top of his game here. Kashmir has been shot so delicately! (I want to go there ASAP! And we we don't need foreign locations!) The gravedigger scene, in particular, is the crowning jewel, a scene which drips with his love and affection for his craft.


    Arre aao na, ki jaan gayi, jahaan gaya, kho jaao
    Arre aao na, ke thak gayi, hai zindagi, so jaao



    I might have profusely appreciated the movie thus far, but the movie is not without its gripes. I'll start with the anachronisms. In one of the best and most important scenes in the movie, the play-within-a-play scene, there is a mobile cellular tower prominently visible throughout in the background. Forgetting for a moment that we did not have cellular networks in the 1990s, its presence is distracting. I would have expected this to come up in post-processing/editing, especially when a viewer is able to catch it in first viewing. This is the kind of attention-to-detail I would expect from a director of his caliber. Then, to depict Bangalore, they used footage of the iconic Domlur flyover here. Again, its construction hadn't started as late as 2003, and the footage of sprawling flyovers plastered suddenly coming from the valleys of Kashmir moments ago is jarring to say the least.

    Also, in my opinion, the Oedipus aspects of the play were overplayed in the movie. It wasn't necessary. Not as much. But my major complaint is how they handled the character of Ophelia. Transforming it into a childhood love, and having scenes of brimming romance between Haider and Arshia feels out-of-place in a Shakespearean revenge epic such as Hamlet.

    But hey, the movie is probably a little too "heavy" already for Indian audiences, and removing the little romance might have aggravated it, so what do I know? I am sure it took enough courage already to deal with the Censor Board's scissors and to release this film pitted against the 24,000-screens-release of multi-starrer blockbuster Bang Bang.


    I can already read some negative Internet chatter around 1) The depiction of Kashmir; 2) It being a heavily political movie; and 3) "maa bete ka rishta". Please, folks, can we let art remain art? Pretty please?


    I cannot recommend this movie enough. Please go watch it, something like this comes rarely in our country. Thank you Vishal Bhardwaj for making Haider.



              Special 316: CES 2017        

    TWiT Live Specials (Video-HD)

    Networking made easy with Synology. Robots programmed not to hurt people made by Bosch. LG's OLED TV's have come down in price and are paper thin. By developing a safer car Ford is pioneering autonomous driving. The Foldimate is a robot that will fold your clothes for you, and ADT integrates Alexa into home security.

    Host: Fr. Robert Ballecer, SJ

    Download or subscribe to this show at https://twit.tv/shows/twit-live-specials.

    Thanks to CacheFly for the bandwidth for this special presentation.


              3 Easy Steps To Adding a “Share Box” To Your Infographic        
    Synopsis By adding an infographic to your blog, and giving your readers an easy way to share it, is a sure way to help build your network. We can make the infographic easy to share by adding a “share box” … Continue reading
              What Is Twitter? (Infographic)        
    Are you new to Twitter? Do you want to know what Twitter is all about? Dave Sumter is sharing this fun handy (not so little) infographic explains everything you need to know about tweeting, following, and the social network in … Continue reading
              100 episodes 100 characters contest!!!        
       Here's 100 Adventure Time Characters.  CAN YOU NAME THEM ALL?

    That's right, It's a little CONTEST on my blog.  The first person who can name all 100 characters using the numbering system displayed below will get something really cool mailed to them (So will the 2nd and 3rd persons to get them correct, but it won't be quite as cool as the first place prize.)

    (click on the images to make them larger)
    please email your answer to at100contest@gmail.com.  I will announce the winners tomorrow, unless it takes longer than that for people to get the correct answers.
    (please note: this contest is not affiliated with cartoon network in any way.)


    *EDIT*  we got 3 winners!!!!  thanks to everyone that submitted. I will announce who they are tomorrow after i double check their lists!


    **EDIT TWO**  I've posted the answer key and the names of the winners. in the comments section of this blog entry, so you can still play along and see if you can name all 100 of them without being spoiled . 

    -a

              Vermont Hub-and-Spoke Model of Care for Opioid Use Disorder: Development, Implementation, and Impact        
    imageBackground: Opioid use disorders (OUDs) are reaching epidemic proportions in the United States, and many geographic areas struggle with a persistent shortage in availability of opioid agonist treatment. Over the past 5 years, Vermont addiction medicine physicians and public health leaders have responded to these challenges by developing an integrated hub-and-spoke opioid treatment network. Methods: In the present report, we review the development, implementation, and impact of this novel hub-and-spoke model for expanding OUD treatment in Vermont. Results: Vermont's hub-and-spoke system has been implemented state-wide and well-received by providers and patients alike. Adoption of this model has been associated with substantial increases in the state's OUD treatment capacity, with Vermont now having the highest capacity for treating OUD in the United States with 10.56 people in treatment per 1000. There has been a 64% increase in physicians waivered to prescribe buprenorphine, a 50% increase in patients served per waivered physician, and a robust bidirectional transfer of patients between hubs and spokes based upon clinical need. Challenges to system implementation and important future directions are discussed. Conclusions: Development and implementation of a hub-and-spoke system of care has contributed substantially to improvements in opioid agonist treatment capacity in Vermont. This system may serve as a model for other states grappling with the current opioid use epidemic.
              Australia first to introduce a solar energy digital marketplace        

    Australia is famous for its crazy inhospitable environment, but with the introduction of new technology, Australians might actually be able to make money off the burning hot sun. According to the Guardian, Australia will be the first country in the world to implement a network of “virtual” power stations. Instead of building actual power stations, the “virtual” ones will be made by linking rooftop solar panels and batteries of households together with a smart grid, bringing new additional energy into the system. Australian homeowners who have installed solar panels and batteries, will soon be able to trade their excess electricity in a digital…

    This story continues at The Next Web
              Book Review - The Impact Equation by Chris Brogan and Julien Smith        
    René Magritte Disclaimer: I have been a fan of these two guys for quite a few years now, and I loved their first book. So it may not come as a huge surprise that I am enjoying this one, too, which they were kind enough to send me as an advance copy free of charge.

    Let's start with the first page. You know, the frontispiece, the one after the dedications and the table of contents. It says:

    Ceci n'est pas un social networking book.

    So what does this tell us? First of all, that these guys know their Belgian surrealists - that's a twist on a very famous painting, The Treachery of Images, by René Magritte. They are signalling to us that they are smart, funny and cultured. If we are in on that secret, that means we are smart, funny and cultured, too! A good start. The statement is accurate, too - it's not a book about social networking, although obviously said networks are an important tool in their arsenal.

    I was more amused than illuminated by their attempt to quantify the social impact of a business, person or brand using an actual equation, where the variables make a cute mnemonic, no less:

        C x (R + E + A + T + E)

    C = Contrast
    R = Reach
    E = Exposure
    A = Articulation
    T = Trust
    E = Echo

    These are all interesting and useful concepts, and they are nicely broken up into sections: Ideas (which includes Contrast and Articulation), Platforms (which includes Reach and Exposure) and Network (Trust and Echo).

    It all makes consummate sense - you need to start with a good idea (with high contrast and well articulated, so people will get excited about it), but you need a platform to share it with the world (reach a lot of people and get them exposed to the ideas), and most importantly, you need a network of people who care and will share it with their friends, because you have built trust and you echo, or resonate, with their lives and concerns.

    They talk about matters as abstruse as bravery in life and as concrete as mind-mapping, whether in the form of those oval thingies with tails or whole storyboards. The book is chock-full of fascinating stories, from the Dollar Shave Club to Instagram, and analyses all of these businesses to see how they measure up in terms of the Impact Equation.

    One could argue that anybody who has been around on the Net long enough (and has read Seth Godin, Clay Shirky, Chris Garrett, et al.) could have come up with these criteria for success, but Chris and Julien sat down and clarified them for us, and for this we should all be profoundly grateful. That they also peppered their book with examples and good advice as to what has worked well for them makes it even better and more useful - but I really think their main contribution has been to put into words what so many have been struggling to articulate.

    Oh, and their book is just snicker-out-loud funny sometimes. "Welcome to the new tools, same as the old. Only better, because you actually know what to do with them. It's almost like puberty all over again." OK, I'm juvenile. Shoot me.

    In conclusion, I enjoyed The Impact Equation, and I would recommend it to anyone who is looking to make a mark out there in The World.

    P.S. It's my 100th blog post! Yikes. How did that sneak up on me? Paaarty!
              Blog Post: Rooted In Shallow Soil        

    Gamers were dumbfounded when PopCap announced it was transplanting the Plants vs. Zombies series from the backyard to the battlefield. To say the multiplayer-shooter spinoff is a huge departure for the casual game developer is an understatement, but the aesthetics and lighthearted tone are a wonderful change of pace for the violence-obsessed genre. Dig beneath the surface, though, and you find some fundamental flaws that hold back this family-friendly shooter.[Excerpt]

    PopCap is known for making highly polished games that virtually anyone can pick up and play. Unfortunately, that equation only rings half true for Garden Warfare. The developer's simplified approach to the genre does away with basic concepts like sprinting, melee attacks, and limited ammo, making it easy for anyone to get into the swing of battle. However, the gameplay is uncharacteristically buggy; players get hung up on other characters and geometry, corpses twitch on the ground, and even the slightest bit of network lag renders some abilities (like the all-star zombie's dash attack) ineffective. A variety of classes and unlockable characters add some nuance to the simple fun, but PopCap's limited mode offerings hamstring replayability.

    Garden Warfare only features two main competitive modes: Team Vanquish and Gardens & Graveyards. Team Vanquish is your run-of-the-mill team deathmatch. Gardens & Graveyards tasks zombies with assaulting a series of consecutive capture points in a map, similar to Battlefield's rush mode. A classic variant of each mode disables upgrades and unlockable characters (making them less interesting), and the beginner mode gives you more health the more you die, but you're still playing one of two basic formulas.

    Gardens & Graveyards is clearly the main attraction. Maps have unique themes, and capture points are built around interesting locations that facilitate large-scale confrontations. Every map features an interesting final objective, such as sneaking five zombies into Crazy Dave's mansion or destroying the roots of a giant sunflower growing inside of a lighthouse. Gardens & Graveyards provides hours of fun, but eventually you get tired of assaulting or defending the same points on the same handful of maps, and Team Vanquish does little to alleviate the boredom.

    Garden Warfare's co-op offerings are equally uninspired. Garden Ops is a four-player horde mode, which tasks players with defending a garden against ten increasingly difficult waves of zombies. Aside from the occasional zombie boss or special wave, you don't have much to draw you in once you've beaten a few matches. 

    Garden Warfare's most interesting twist is how it incorporates the series' tower-defense elements into matches. Players can spawn zombies or plants in designated locations on the map, which then attack opponents autonomously. Unfortunately, these characters are treated as consumable items that players must purchase before matches using Garden Warfare's microtransaction-ready economy.

    The vast majority of Garden Warfare's content is locked behind its PvZ Coin currency. Support plants and zombies, customization items, weapon upgrades, and even new class characters are bought with the coins you earn from matches. However, can't just buy what you want; instead you must purchase blind card packs of varying prices. Consumable card packs give you a handful of zombies and plants to summon during matches, while more expensive packs provide random upgrades or character stickers – though you have to collect all of the stickers for a character before you can actually play as them. Like any good pusher, EA gives you a couple packs for free, but after that the grinding for coins begins.

    This faux free-to-play approach undermines Garden Warfare's promising tower-defense elements. Each plant or zombie you spawn feels like a waste of money; regardless of how helpful they may be on the battlefield, buying consumable packs just holds you back from the larger goal of unlocking more playable characters, which is the only motivator to continue playing after you've learned the maps inside and out.

    Those extra playable characters are worth unlocking. Although they have the same class abilities, each character has its own unique twist on gameplay. For instance, the marine-biologist zombie features a higher rate of fire than the regular scientist zombie, and the fire sunflower deals extra elemental damage. Unfortunately, characters take an exorbitant amount of time to unlock, and because card packs are random, you can't just unlock upgrades or characters for the class you're interested in.

    [View:3255212410001]

    Perhaps the most surprising aspect of the economy is that there's no option to purchase coins with real money, but EA says it may institute such an option in the future. Frankly, I can't imagine a world where that change doesn't happen, but it doesn't really matter. The progression system and tower-defense elements are already broken to accommodate the possibility. Garden Warfare is designed like a free-to-play game, despite the $30 price tag.

    PopCap's approach to class progression also plays out for the worse. Instead of gaining experience points, you level up classes by completing a series of challenges. Things start out easy – deploy five potato mines, kill three plants with rockets – but more specific challenges distract players from what's best for the match and make leveling up a pain. Killing two scientist zombies with a sun beam or shooting down three garlic drones seems easy enough, but what if the other team isn't using those characters? I went entire matches making zero progress with characters simply because the right elements weren't on the battlefield. Some challenges are downright devious; spawning five conehead zombies first requires you to buy consumable card packs until you randomly receive enough of them to complete the challenge. Luckily, you unlock all of the abilities for a class in the first few levels anyway, so you can abandon the progression scheme after that.

    Before the tedium set in, I had fun with Garden Warfare. Spending a few hours with the accessible combat and charming world was entertaining, but the random card packs and achievement-style leveling system killed my desire to keep playing. Garden Warfare's simplified gameplay and limited map selection can only entertain for so long – without rewarding progression, there's no carrot (or brain) at the end of the stick.

    The Xbox 360 Difference
    While both the Xbox One and Xbox 360 versions have their share of problems, the last-gen incarnation fares considerably worse. While testing the 360 version, I ran into increased gameplay bugs, load times, pop-up, and embarrassingly blurry visuals as the game struggled to stream in the high-resolution textures. These shortcomings don’t ruin the experience, but they are significant enough to earn the Xbox 360 entry a lower score than the Xbox One version. 

              Blog Post: Rooted In Shallow Soil        

    Gamers were dumbfounded when PopCap announced it was transplanting the Plants vs. Zombies series from the backyard to the battlefield. To say the multiplayer-shooter spinoff is a huge departure for the casual game developer is an understatement, but the aesthetics and lighthearted tone are a wonderful change of pace for the violence-obsessed genre. Dig beneath the surface, though, and you find some fundamental flaws that hold back this family-friendly shooter.[Excerpt]

    PopCap is known for making highly polished games that virtually anyone can pick up and play. Unfortunately, that equation only rings half true for Garden Warfare. The developer's simplified approach to the genre does away with basic concepts like sprinting, melee attacks, and limited ammo, making it easy for anyone to get into the swing of battle. However, the gameplay is uncharacteristically buggy; players get hung up on other characters and geometry, corpses twitch on the ground, and even the slightest bit of network lag renders some abilities (like the all-star zombie's dash attack) ineffective. A variety of classes and unlockable characters add some nuance to the simple fun, but PopCap's limited mode offerings hamstring replayability.

    Garden Warfare only features two main competitive modes: Team Vanquish and Gardens & Graveyards. Team Vanquish is your run-of-the-mill team deathmatch. Gardens & Graveyards tasks zombies with assaulting a series of consecutive capture points in a map, similar to Battlefield's rush mode. A classic variant of each mode disables upgrades and unlockable characters (making them less interesting), and the beginner mode gives you more health the more you die, but you're still playing one of two basic formulas.

    Gardens & Graveyards is clearly the main attraction. Maps have unique themes, and capture points are built around interesting locations that facilitate large-scale confrontations. Every map features an interesting final objective, such as sneaking five zombies into Crazy Dave's mansion or destroying the roots of a giant sunflower growing inside of a lighthouse. Gardens & Graveyards provides hours of fun, but eventually you get tired of assaulting or defending the same points on the same handful of maps, and Team Vanquish does little to alleviate the boredom.

    Garden Warfare's co-op offerings are equally uninspired. Garden Ops is a four-player horde mode, which tasks players with defending a garden against ten increasingly difficult waves of zombies. Aside from the occasional zombie boss or special wave, you don't have much to draw you in once you've beaten a few matches. The Xbox One-exclusive modes are even more disappointing. The splitscreen mode is an endless version of Garden Ops, where the second player doesn't get to save his or her progress and the boss mode relegates you to providing support to your team during competitive matches from a topdown map of the battlefield.  

    Garden Warfare's most interesting twist is how it incorporates the series' tower-defense elements into matches. Players can spawn zombies or plants in designated locations on the map, which then attack opponents autonomously. Unfortunately, these characters are treated as consumable items that players must purchase before matches using Garden Warfare's microtransaction-ready economy.

    The vast majority of Garden Warfare's content is locked behind its PvZ Coin currency. Support plants and zombies, customization items, weapon upgrades, and even new class characters are bought with the coins you earn from matches. However, can't just buy what you want; instead you must purchase blind card packs of varying prices. Consumable card packs give you a handful of zombies and plants to summon during matches, while more expensive packs provide random upgrades or character stickers – though you have to collect all of the stickers for a character before you can actually play as them. Like any good pusher, EA gives you a couple packs for free, but after that the grinding for coins begins.

    This faux free-to-play approach undermines Garden Warfare's promising tower-defense elements. Each plant or zombie you spawn feels like a waste of money; regardless of how helpful they may be on the battlefield, buying consumable packs just holds you back from the larger goal of unlocking more playable characters, which is the only motivator to continue playing after you've learned the maps inside and out.

    Those extra playable characters are worth unlocking. Although they have the same class abilities, each character has its own unique twist on gameplay. For instance, the marine-biologist zombie features a higher rate of fire than the regular scientist zombie, and the fire sunflower deals extra elemental damage. Unfortunately, characters take an exorbitant amount of time to unlock, and because card packs are random, you can't just unlock upgrades or characters for the class you're interested in.

    [View:3255212410001]

    Perhaps the most surprising aspect of the economy is that there's no option to purchase coins with real money, but EA says it may institute such an option in the future. Frankly, I can't imagine a world where that change doesn't happen, but it doesn't really matter. The progression system and tower-defense elements are already broken to accommodate the possibility. Garden Warfare is designed like a free-to-play game, despite the $40 price tag.

    PopCap's approach to class progression also plays out for the worse. Instead of gaining experience points, you level up classes by completing a series of challenges. Things start out easy – deploy five potato mines, kill three plants with rockets – but more specific challenges distract players from what's best for the match and make leveling up a pain. Killing two scientist zombies with a sun beam or shooting down three garlic drones seems easy enough, but what if the other team isn't using those characters? I went entire matches making zero progress with characters simply because the right elements weren't on the battlefield. Some challenges are downright devious; spawning five conehead zombies first requires you to buy consumable card packs until you randomly receive enough of them to complete the challenge. Luckily, you unlock all of the abilities for a class in the first few levels anyway, so you can abandon the progression scheme after that.

    Before the tedium set in, I had fun with Garden Warfare. Spending a few hours with the accessible combat and charming world was entertaining, but the random card packs and achievement-style leveling system killed my desire to keep playing. Garden Warfare's simplified gameplay and limited map selection can only entertain for so long – without rewarding progression, there's no carrot (or brain) at the end of the stick.


              Thought for food.        
    Like eating brains? I know you do. Why not add some new dishes to your collection of recipes that use the "fifth quarter?" Despite some negative cultural stereotypes, the practice of eating brains is common in cultures all over the world: Kat-a-Kat is a traditional Pakistani dish containing brains Maghaz Masala is an Arabic course Here is a recipe for Toscano calf brains In France they are known as Cerveaux Chef Mario Batali's restaurant Babbo serves a popular lamb's brains ravioli Sesos in Mexico Some great recipes for Spanish Tortilla Sacromonte Fried brain sandwiches can be found in St. Louis and the Ohio River Valley Australian Slippery Bob This recipe for carpetbag steak would be great with some brains subbed for the oysters Here is an ancient Roman recipe for calf's brains custard German brain soup and brains au gratin Croquettes Lebanese, Syrian and Jordanian recipe for brain omelets Vegan Mock Brains You may be wondering if eating brains is entirely safe. Besides being high in cholesterol, the brain is the main area where prions known to cause transmissible spongiform encephalopathy congregate in the body. In cows it's called Mad Cow disease (Bovine Spongiform Encephalopathy), Scrapie in sheep, and Chronic Wasting Disease in deer and other wild game. Creutzfeldt-Jakob disease and Kuru are two forms of spongiform encephalopathy in humans. Kuru was intensely studied among the Fore tribe of Papua New Guinea from the 1950's to the 70's and it was determined that the high instances of it in the tribe were due to their ritual endocannibalistic funeral practices. It has been posited recently that a resistance to prionic diseases may have been selected for in our ancestors, suggesting that cannibalism was not uncommon. Also of interest to cephalovores may be the effects of aerosolizing pork brains and inhaling them, as were recently demonstrated in a pork plant in Austin, MN.
              Guide for Picking The Best Android Phone for You        
    Sony Xperia X10 vs Nexus One vs Motorola Droid vs Acer Liquid vs Archos


    Xperia X10


    Nexus One


    Motorola Droid


    Acer Liquid



    (Updated: 21st Jan 2010) The Android handset landscape has changed drastically over the past year, from a literal handful of options to – the fingers on both your hands, the toes on both your feet and all the mistresses Tiger Woods has had in the past 24 hours (OK, maybe 4 hours). You get the point though, there are quite a few options and through the course of 2010 these options will only increase.


    The only other mainstream handset smartphone option that rivals the Android handset options available in 2010 will be the Windows mobile platform – and we're all rushing for it – not!


    So what are the handsets to consider in 2010? The ones currently released on the market that we will look at are the Acer Liquid and Motorola Droid and an additional three to be released early 2010, the Sony Xperia X10, Google Nexus One (Passion, HTC Bravo) and Archos Phone Tablet – though we only have a handful of details on the phone.



    Archos Phone


    We will look at hardware and software sub-categories, and compare the phones based based on the information we have.


    HARDWARE


    Processor


    The Nexus One and Sony Xperia X10 have the snappier Qualcomm Snapdragon 1Ghz processor onboard. The Acer Liquid has a downclocked version of the Snapdragon running at 728Mhz – perhaps to conserve battery. This would probably put the Acer Liquids performance more on par with the Motorola Droids. The Archos Phone promises to be a really fast phone with an upgraded ARM Cortex processor running at 1Ghz and also with improved GPU over Droid and iPhone.


    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    Qualcomm Snapdragon QSD 8250, 1.0 GHz

    Texas Instruments OMAP 3430 550 Mhz

    Qualcomm Snapdragon QSD 8250, 1.0 GHz

    Qualcomm Snapdragon QSD 8250, 768 MHz

    ARM Cortex 1Ghz


    Graphics


    The Snapdragon's Adreno 200 Graphics core is phenomenal on the triangle render benchmark, coming in with a score of approximately 22 million triangles per/sec compared to approximately 7 million triangles/sec on the Motorola's SGX530. This is an important element for 3D graphics. Interestingly, the iPhone 3GS has a similar CPU to Motorola Droid but an upgraded faster SGX535 GPU which is capable of 28 million triangles/sec and 400 M Pixels/sec. Archos may get better SGX GPU.


    Xperia X-10 Graphics Demo


    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    Adreno 200 Graphics Core with OpenGLES 2.0

    PowerVR SGX530 Graphics Core with OpenGLES 2.0

    Adreno 200 Graphics Core with OpenGLES 2.0

    Adreno 200 Graphics Core with OpenGLES 2.0

    PowerVR SGX540?

    22 M Triangles/sec

    7 M Triangles/sec

    22 M Triangles/sec

    22 M Triangles/sec

    35 M Triangles/sec

    133 M Pixels/sec

    250 M Pixels/sec

    133 M Pixels/sec

    133 M Pixels/sec

    1000 M Pixels/sec

    HD Decode (720p)

    HD Decode (720p)

    HD Decode (720p)

    HD Decode (720p)



    3-D Graphics Benchmark









    Motorola Droid 20.7 FPS (Android 2.0).

    Nexus One 27.6 FPS. (Android 2.1)

    Acer Liquid 34 FPS. (Android 1.6)

    Xperia X10 34FPS+ est. (Android 1.6)



    Note: All phones tested running WVGA resolution 480 x 800 or 480 X 854. Different versions of Android will be a factor e.g. Android 2.0 + reproduces 16 million colors vs 56K for 1.6. Older phones such as G1, iPhone 3GS may score 25-30 FPS but they use lower 480 X 320 resolution.



    Memory/Storage


    The Nexus One comes in with an impeccable 512MB of RAM. This provides an element of future proofing for the hardware and puts it in a league of its own. The Xperia X10 comes with 1GB of ROM and 384 MB of RAM. The 1GB means you'll be able to have twice as many apps on your phone until Google lets you save on your removable memory. The Acer Liquid and Droid are more or less the same.




    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    RAM

    512 MB

    256 MB

    384 MB

    256 MB


    Flash

    512 MB

    512 MB

    1024 MB

    512 MB



    Display


    The Nexus One uses an AMOLED screen which provides crispy images and more saturated colors than a TFT-LCD. It's also more energy efficient. Xperia X10 packs a 4.0 inch TFT screen with 854 x 480 resolution. Expect similar picture quality to the Motorola Droid for the Sony Ericson phone. The Archos Phone promises to deliver an interesting experience that could potentially make it the King of Androids.



    Spot the difference: Top TFT-LCD screen and bottom OLED



    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    800 x 480 px, 3.7 in (94 mm), WVGA,

    AMOLED

    854 x 480 px, 3.7 in (94 mm), WVGA,

    TFT-LCD

    854 x 480 px, 4.0 in (102 mm), WVGA,

    TFT-LCD

    800 x 480 px, 3.5 in (89 mm), WVGA,

    TFT-LCD

    854x 480px, 4.3 in (109mm), WVGA, AMOLED



    Display Input


    All standard stuff here. All are pretty much Capacitative with multi-Touch depending on the continent you buy your phone from.



    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    Capacitative, Multi-Touch

    Capacitative, Multi-Touch

    Capacitative, Multi-Touch

    Capacitative, Multi-Touch

    Capacitative, Multi-Touch



    Battery


    The Xperia X10 has the largest battery – and might I add likely the best quality battery from the lot. It's the same battery used in the Xperia X1 and it performed admirable. Talk time for the Nexus One is very good and we expect the Xperia X10 to match this or be marginally better. Of concern is Nexus Ones 3G stand-by time of 250 hours. It's worse than the other phones but not bad at a little over 10 days! Updated 21st Jan 2010 - confirmed Xperia battery times. Xperia more or less performs at the same level as the other Android phones, delivering 5 hours talk time.


    Sony 1500 mAh Battery




    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    mAh

    1400 Li-Po

    1400 Li-Po

    1500 Li-Po

    1350 Li-Po


    Talk/Standby 3G

    hrs/hrs

    7/250

    5/380

    5/300

    5/400




    Communication


    The phones are all capable of 3.5G (HSDPA 7.2 Mbit/s) data transfer. The Motorola Droid and Sony Xperia X10 can give you a little bit extra supporting 10.2 Mbit/s data transfer. Obviously the network must exist to support these speeds. Motorola is the only one with Class 12 EDGE, but this is not too important in this day and age of 3G.




    Nexus One, Bravo

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    HSDPA (Mbit/s)

    7.2 (1700 band)

    10.2

    10.2

    7.2


    HSUPA

    2.0 - 5.76

    2.0-5.76

    2.0-5.76

    2.0-5.76


    GSM

    (850, 900,1800,1900)

    Y

    Y

    Y

    Y


    EDGE

    Class 10

    Class 12

    Class 10

    Class 10


    UMTS band 1/4/8

    (2100/AWS/900)

    Y

    Y

    Y

    Y


    GPS

    Y

    Y

    Y

    Y


    Network

    3-3.5G

    3-3.5G

    3-3.5G

    3-3.5G




    Connectivity:Bluetooth/Wifi


    Nexus One is the only Android phone that currently offers 802.11n connectivity. In fact, I can't think of any other phone out there that also has 802.11n. This might be the Google Talk phone we all thought was heading our way after all! All phones have either bluetooth 2.0 or 2.1. These will essentially be the same as far as data transfer (3 Mbit/s) is concerned. Version 2.1 offers better power efficiency though and a few other enhancements.


    Nexus One - Broadcom 802.11n



    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    Bluetooth

    2.1 + EDR

    2.1 + EDR

    2.1 + EDR

    2.0 + EDR

    Y

    802.11 b

    Y

    Y

    Y

    N

    Y

    802.11 g

    Y

    Y

    Y

    Y

    Y

    802.11 n

    Y

    N

    N

    N

    Y


    Ports/Connectors/Sensors


    The 2GB shipped micro-SD card with the Acer Liquid is unrealistic by todays standards. The Motorola Droid offers the best deal with a 16GB micro-SD. The Sony Xperia X10 is shipped with an 8GB micro-SD card, but remember the Xperia X10 also has that slightly bigger 1GB flash memory on-board as well for and impressive total of 9GB expandable to a total of 33GB. Google decided to save on costs by only offering a 4GB micro-SD card with the Nexus One, but if the idea is to compete against the iPhone then 8GB should be the minimum. Clearly the Motorola is on the right track with 16GB shipped, and you can't ignore the impressive 1GB ROM on the Xperia X10.


    SanDisk working on 128GB Micro-SD




    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    Sim Card

    Y

    Y

    Y

    Y

    Y

    3.5 mm jack

    Y

    Y

    Y

    Y

    Y

    Micro USB

    Y

    Y

    Y

    Y


    Shipped Micro SD/Supported (GB)

    4/32

    Class 2

    16/32

    Class 6

    8/32

    Unknown

    2/32

    Class 2


    Unknown

    Light Sensor

    Y

    Y

    Y

    Y


    Proximity Sensor

    Y

    Y

    Y

    Y


    Compass

    Y

    Y

    Y

    Y


    Accelerometer

    Y

    Y

    Y

    Y


    Cell/Wifi Positioning

    Y

    Y

    Y

    Y

    Y



    Case Material


    The Motorola metal case is the sturdiest. Build quality for the Nexus One and Xperia X10 is very good. The Xperia X10 has a refelective plastic whilst the Nexus one is more industrial with teflon and metal on the bottom. Acer Liquid has average build quality, but that was always the intention with the Liquid in order to keep manufacturing costs low.



    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    Rubber/Plastic

    Metal

    Plastic

    Plastic



    Keyboard


    If you want a physical keyboard then the Droid is your only choice in the list. The keys on the Droid keyboard are basically flush so you don't get the comfortable key separation feel on a Blackberry keyboard. The others (Droid as well) have virtual keyboards which work in portrait or landscape mode.



    Droid Slide-out keyboard



    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    Virtual

    Physical

    Virtual

    Virtual

    Virtual


    Camera


    The Xperia X10 is one of the best camera phones. Sony used it's camera know how for their new smartphone lineup and it will be hard to match-up against Sony unless the other guys partner up with someone like Canon. The X10 comes with an 8.1 mp camera with X 16 digital zoom. The software has also been changed from standard Android to include typical camera options. Also included are a four face detection feature that recognizes faces in a photo and appropriately tags/files the photo. Motorola Droid comes in with a 5 mp camera with X4 digital zoom compared to the 5mp and x2 digital zoom on the Nexus One.



    Xperia X10 sample photo

    ***Additional Photos***



    Motorola Droid sample photo



    Nexus One sample photo



    Acer Liquid sample photo




    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    Megapixel

    5

    5

    8.1

    5


    Zoom

    X 2

    X 4

    x16

    1


    Flash

    Y

    Y (dual)

    Y

    Y



    Video


    Video wise, the Nexus One, Motorola Droid and Xperia will perform roughly the same.














    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    Video Res.

    720x480

    720x480

    800x480

    320x240


    Flash

    Y

    Y

    Y

    N




    Size/Height/Weight



    Lightest and thinest is the Nexus one. Motorola is weighed down by the metal used. They all are roughly the same size as the iPhone 3Gs which comes in at 115.5 x 62.1 x 12.3 mm and weighs 135g.



    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    Height (mm)

    119

    115.8

    119

    115


    Width (mm)

    59.8

    60

    63

    62.5


    Depth (mm)

    11.5

    13.7

    13

    12.5

    10

    Weight (g)

    130

    169

    135

    135




    SOFTWARE


    OS Level


    Nexus One has the most current OS level at 2.1. Motorola Droid is expected to upgrade soon as well as the Acer Liquid. The heavily customized Xperia X10 will be more of a challenge to upgrade to 2.1 because of the heavy customization.



    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    2.1

    2

    1.6

    1.6




    Customization


    Xperia X10 shines as far as demonstrating how customizable Android really is. The other 3 phones have very few changes to the standard Android OS.


    Sony TimeScape/MediaScape



    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    None

    None

    Rachael UI

    Acer UI 3.0



    Application Market


    We are likely to see more App market emerge. Sony currently leads the way and Motorola and HTC (Nexus One) will follow suit as well.



    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    Android Market

    Android Market

    PlayNow, Android Market

    Android Market



    Media


    Mediascape is an ambitious effort to add decent media functionality to Android. Sony succeeds and also introduces a fun way to organize your media. Acer has Spinlet which is not as complex as Mediascape.



    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    Android

    Android

    MediaScape

    Spinlet



    Social Networking


    Sony again leds the customization way with Timescape. This is another good job by Sony to add extra functionality to Android. Timescape helps manage your contacts better and brings social networking and contacts onto one application.



    Nexus One

    Motorola Droid

    Sony Xperia X10

    Acer Liquid

    Archos Phone

    Android

    Android

    TimeScape

    Android





              Google vs. Apple        


    The Android vs. iPhone battle is a fight reincarnated that we witnessed decades ago. It's a battle Apple once lost.

    Google therefore decided to steal a page from a small startup called Microsoft and and their Windows OS. Google is doing this by offering Android on multiple hardware platforms compared to Apple that is doing what it has always done since the early 80's back - proprietary. Why won't Apple learn - well - because they still make money.

    The advantage Google has over Apple, much like in the PC world, is they have companies that make cheap handsets and sell them - cheap. This obviously reduces Googles risk since they don't need to sell any hardware. This is analogous to the relationship between Dell, HP etc and Microsoft (back then Linux was not available). These companies put Android OS on their hardware because it's cheap (FREE) and thus increases Google market share.

    Then you get the higher-end phones - with some surpassing the Apple hardware. Apple can't match the might of a collective market - Sony, Acer, Dell, HTC, Motorola, Samsung, LG, etc.

    Apple will be bigger (turnover) than any single one of the hardware manufacturers. But combined they will account for more than 50%+ of handsets on the market in 2-3 years time.

    Just like Microsoft, Google will have the leading OS for handsets. If hardware manufacturers just come up with a way to upgrade hardware - eg RAM, SD cards (doable)!, CPU, Battery (doable)! then it's the Microsoft+PC vs Apple+MAC battle. We all know Microsoft won that battle.

    Let's not forget the direction Google hinted it wants to take for the payment system of Market Place - all Apps bought, will be charged through Carrier. It couldn't be any easier!


    LOOKOUT FOR THIS PHONE:



    I think the Sony Xperia X10 is the Android phone to beat. It's iPhone competitor will be the 4G. The Sony Rachael UI (UX) is very impressive. The downside is the phone runs Android 1.6 which only support 65K colors, unlike Android 2.x wich support 16 million colors. The UI is tightly woven into android 1.6, could this be a problem when it comes to updating the OS?

    HARDWARE

    Camera:
    1) 8MP with 16x digital zoom
    2) Face recognition (automatically recognizes upto 5 faces in a Photo)
    3) Smile Detection (Takes picture when you smile)
    4) + all the usual stuff like video call, geo-tagging, camera/video flash etc.

    CPU:
    1 Ghz Snapdragon

    Memory:
    1 GB internal memory - 384MB RAM

    Display:
    4.1 Inch Capacitative (480 x 854 - WVGA)

    Communication:
    HSDPA and HSUPA

    SOFTWARE

    1) Sony PlayNow - Music/Video/Game/Applications downloads
    2) Sony TimeScape - Social Networking/Communication



    3) Sony MediaScape - Media Player



    4) Sony PS3 Remote Play (In development)

    KILLER APPLICATIONS

    1) Layer



    2) Speed Forge 3D



    ACCESSORIES

    100+ Sony Accessories

    OTHER ANDROID PHONES

    HTC Bravo, Nexus One, Motorola Shadow (Rumoured) - AMOLED Touch screen, multi-mics, 5MP camera, 720p Video recording, HDMI port, 802.11 b/g/n

    Nexus One:


    APPLE

    iPhone 4G (June 2010) - 5MP, AMOLED, Video Calling, 802.11 b/g/n

    Concept 4G:

              I AM HERE: Photo Art on the Behance Network        
    art, paint, and pattern image
              Monitoring Broadband Speed with Loggly        

    I've been having trouble with the speed of my network at home and needed to check whether the broadband link to the internet was working as fast as it should be. To check this, you really need to make many measurements over time, as at different times of the day the performance will vary depending on how many other people in the area are using the same link. To check the speed, I have plugged a spare Raspberry Pi directly into the my Virgin Media Superhub via an ethernet cable and set it up to measure and report the speed every hour. I'm sending the data to an online logging service called Loggly so that I can access it and graph it easily from any other computer.

    Read more… (11 min remaining to read)


              Al TBIZ tutte le tecnologie ICT a vantaggio delle aziende        
    Tecnologia VoIP, Unified Communication, Cloud computing, storage, database e tanto altro ancora. Al Technolgybiz 2017, il 13 e 14 settembre a Napoli, si parlerà e toccheranno con mano tutti i servizi ICT a vantaggio dell’azienda. Workshop e focus specifici per comprendere come poter risparmiare ed ottimizzare i propri servizi aziendali. Lo staff di VoipVoice presenterà […]

              SBAM – Speed Business Alliance Meeting 2017: una storia di successo!        
    A due mesi dal CoreTech Partner Tech Summit del 5 Maggio 2017, CoreTech è lieta di annunciare che due dei suoi partner hanno ricavato benefici concreti a seguito degli incontri avvenuti durante la giornata dedicata ai rivenditori IT. Il provider milanese ha voluto rischiare, organizzando un’iniziativa unica nel suo genere e volta al networking, chiamata […]

              innovaphone pubblica un Whitepaper sul tema Smart Working        
    Sindelfingen, 03 luglio  2017 – Lo sviluppo della mobilità sul lavoro, 24 ore su 24, 7 giorni su 7, in qualsiasi luogo del mondo, è ormai praticamente inarrestabile: è quello che viene chiamato appunto “anywhere workplace” o anche spesso “smart working”. innovaphone, lo specialista di Sindelfingen per quanto riguarda la comunicazione aziendale professionale, ha approntato […]

              Sondaggio: un evento italiano dedicato a Cisco?        
    Nel 2010 AreaNetworking.it ha organizzato la Cisco CCIE Dinner, un evento estremamente di nicchia dedicato, appunto, a professionisti Cisco interessati alla certificazione Cisco CCIE. Un evento molto gradito, tanto da ricevere feedback come quello di Andrea Dainese (altre opinioni su AreaNetworking.it le trovate nella pagina “Dicono di noi“): La community di AreaNetworking.it mi ha permesso […]

              Il marchio Overland-Tandberg™ è una garanzia contro le minacce alla sicurezza dei dati        
    Il nuovo brand racchiude fiducia, servizio e una lunga storia nella protezione dei dati contro software malevoli come Ransomware e Cripto-virus SAN JOSE (Calif.) e Dortmund (Ger.) – 29 giugno 2017. Tandberg Data e Overland Storage, società controllate da Sphere 3D Corp. (NASDAQ: ANY), entrambe da tempo leader nel settore dello storage, hanno annunciato il […]

              Soluzioni di comunicazione aziendale in cloud        
    L’adozione di servizi in cloud da parte delle aziende è in costante crescita: dalle startup alle grandi aziende, dalle organizzazioni del settore pubblico fino al no-profit. Il cloud è un valore aggiunto così forte per i clienti che non c’è davvero alcun settore che non lo richieda e non ne tragga beneficio.  Incluso il settore della […]

              Rilasciato VM Explorer 6.3: backup per host vSphere e Hyper-V        
    La soluzione, distribuita in Italia da CoreTech, con la nuova versione 6.3 presenta novità che lo rendono ancora più maturo ed interessante rispetto al passato: il supporto per vSphere 6.5 e la funzione di ripristino granulare della singola email o mailbox di Microsoft Exchange. La nuova release richiede come prerequisito obbligatorio il pacchetto .NET 4.6.2 e, se durante il […]

              MailArchive: archiviare la posta non è mai stato così conveniente        
    L’8 Giugno 2017, il cloud provider di nuova generazione CoreTech ha rivoluzionato l’offerta e ribassato i prezzi di MailArchive, il servizio di archiviazione delle email sicuro, intuitivo e completamente cloud-based. L’archiviazione della posta, che fino a poco tempo fa richiedeva licenze software on premises e un hardware adeguato in casa, adesso è ancora più conveniente. […]

              CoreTech Srl, il nuovo distributore di GFI Software        
    A partire dal 1 Giugno 2017 CoreTech, cloud provider di nuova generazione,  è diventata il nuovo distributore di GFI Software per l’Italia. GFI Software è una società fortemente focalizzata sul Canale tradizionale. Con la sua rete di migliaia di Partner in tutto il mondo copre fino a 117 paesi e coopera con 66 distributori. Se si […]

              Inside E-Learning di Giugno, una nuova opportunità per fare formazione smart        
    Torna l’appuntamento con l’apprendimento virtuale promosso da Inside Factory Tutto sull’ICT in 9 webinar dal 12 al 28 giugno. Pillole formative fruibili in qualsiasi luogo, da ogni device. Le sessioni sono sempre più specifiche, la formazione in continua evoluzione. Benvenuta alla nuova edizione di Inside E-Learning di Giugno, 9 corsi professionali online per perfezionare la […]

              Facebook Relaunched Its Marketplace: Here's How To Use It Effectively        
    As if being the largest social media network in the world wasn't enough, Facebook wants more. This fall, it re-launched an old feature that had gotten little attention in the 9 years since it first appeared. The goal: surpass Craigslist as the largest peer-to-peer selling platform available online. The implications forsocial [...]
              Comment on Conference Handouts from the US Games Presenters’ Network by Aaron Hart        
    Hi Kara - Thanks for reaching out. Here's a link to a document with just the activities and DOK questions. I'll shoot you an email too. <b><a href="https://drive.google.com/file/d/0B8SWch62vs-2WUkzSWYwbE1sSjQ/view?usp=sharing" title="3-6 Basketball" target="_blank" rel="nofollow">3-6 Basketball Activities</b></a>
              Comment on Conference Handouts from the US Games Presenters’ Network by kara        
    Can you please send me the activities you presented at the conference for the Rigor and Vigor workshop. I wanted to use that for my basketball unit Thanks Kara
              CD-i floppy inventory        
    Last weekend I future-proofed my CD-i floppy collection. A bit to my surprise, all floppies except one turned out to be perfectly readable (nearly twenty years after they were last written!). Luckily, the one exception was a backup copy so I didn’t lose any contents.

    I had originally intended to use the borrowed CDI 182 unit for this (it has two floppy drives). The primary motivation for this was that my unstowed CDI 605 could not read beyond track zero of any floppy, but after giving the matter some thought I decided to try my other CDI 605 first, the primary motivation for this being speed (see below). It turned out that this 605 could read the floppies perfectly, including the three 38U0 format ones that gave problems on the 182 unit. Microware has defined a number of OS-9 disk formats for floppies, the 38U0 one supposedly being the “universal” 3.5" format (there is also a 58U0 “universal” 5¼" format).

    The problem with the “universal” formats is that track zero can be (and on my floppies, is) in a different density which makes it a bad fit for most tools, both on CD-i and PC. It also means that only 79 tracks are used for data storage, giving a raw capacity of 79 × 2 × 16 × 256 = 632 KB. The 3803 format used by all my other CD-i floppies uses all 80 tracks and consequently has 8 KB more of raw storage for a total of 640 KB (these are both double-density, double-side formats (DS, DD) with 16 sectors of 256 bytes per track like nearly all OS-9 disk formats).

    Before unstowing my other CDI 605 (it was nearly at the bottom of a 150 cm stowed equipment stack) I tried reading the floppies with my trusty old Windows 98 machine which still has floppy drives. I could not quickly find a DOS tool that handled the 256 byte sectors (not even raread and friends), although I suspect that Sydex’s TELEDISK product would have handled it just fine. I also tried Reischke’s OS9MAX which should handle all OS-9 formats under the sun according to its documentation. The demo version ran under MS-DOS and gave me working directory listings, even for the 38U0 floppies, but it does not support actually reading the files and I am somewhat doubtful about the current availability of the paid-for full version (even apart from cost concerns).

    Why did I decide to use the 605? It was not a question of reading the disks (the 182 did this mostly fine) but of handling the data thus read. The 182 unit has a SCSI connector but I have no drivers for it (yet) and dumping my full floppy collection over the serial port did not really appeal to me for speed and reliability reasons (it could have been done, of course).

    The 605 player has a SCSI connector and includes drivers for it so I could have just connected it to the SCSI disk in my E1 emulator and copied the floppies to hard disk (I would still have needed to transfer them to my laptop which would have been a two-step process via the Windows 98 PC as I have no SCSI connection on my laptop).

    Instead I used the BNC network connector of the 605 to directly transfer floppy images to my laptop (it needs a network switch supporting both a BNC connector and the modern RJ45 connectors, but luckily I have two of those, even if they are only 10 Mbit/s). Starting up the network environment of the 605 took only two OS-9 commands at the command shell prompt:
    ispmode /le0 addr=10.0.0.120
    mbinstall
    After this I could just ftp in to my laptop where I ran ftpdmin, a very minimal ftp server program, and transfer floppy disk images directly:
    ftp 10.0.0.110
    bin
    put /d0@ floppy.dsk
    (where /d0@ is the raw floppy device, for 38U0 I used /d0uv@, both are built-in for the 605).

    The transfers ran at the maximum speed of the floppy drive (way below the 10 Mbit/s network speed), and the resulting .dsk files are perfectly readable using the –v option (virtual disk) of Carey Bloodworth’s os9.exe program even though that program was originally written for Tandy Color Computer OS9/6809 floppies (the floppy disk format was not changed for OS-9/68000 which is at the core of CD-i’s CD-RTOS operating system).

    For easy access I also created a “tar” format archive of each floppy on a RAM disk:
    chd /d0
    tar cvf /r768/floppy.tar .
    and ftp’d those to my laptop as well (the /r768 device is a 768 KB variation of the /r512 built-in 512 KB RAM disk device of the 605 player).

    I ended up with the following collection of unique floppy disk images:
    • 605h3 - 605 H3 Driver Update (1 floppy)
    • 605upd - 605 Driver Update (1 floppy)
    • bcase - Basecase Tests (1 floppy)
    • eboot41 - Emulation Boot Diskette (1 floppy)
    • eburn41 - Emulation and CDD 521 Boot Diskette (1 floppy)
    • inet - CD-I Internet Installation Disk - V1.3 (1 floppy)
    • nfs - OS-9/68000 Network File System V.1.0 (1 floppy)
    • os9sys - OS-9 System Diskette (1 floppy)
    • pubsoft - OptImage Public Domain Software (2 floppies)
    • pvpak - OptImage Preview Pak Installation Disk (1 floppy)
    • ubridge - OS-9 UniBridge Resident Utilities (3 floppies)

    The 605* and eb* floppies are mostly interesting for CD-i 605 or E1 emulator owners, but the bcase floppy contains a set of CD-i standard conformance test programs that.

    The inet and nfs floppies contain a full set of Internet software including Telnet and FTP servers and clients and an NFS client (all except the latter are also in the 605 ROMs).

    The os9sys floppy contains a full set of Professional OS-9 programs and is my original source for most of the OS-9 CD-i disc that I described earlier (most of these are not in ROM on any CD-i player that I’ve seen so far).

    The pubsoft floppies contain miscellanous utilities such as bfed, du, kermit, umacs and vi, most of which can be obtained elsewhere, some CD-i specific utilities such as da (CD-i disk analyzer) and iffinfo (CD-i IFF file dumper) as well as library source files for the CD-i IFF file library.

    The pvpak floppy contains preview software for CD-i images that will preview CD-i IFF files from an NFS-mounted host file system directory.

    The ubridge floppies are the goldmine (and also the 38U0 format ones) as they contain a full set of native Microware C compiler/assembler/linker/debugger software for OS-9 complete with CD-i header files and libraries and C runtime startup sources. Both the srcdbg and sysdbg debuggers are included as well as the rdump utility for dumping ROFF (Relocatable Object File Format) files.

    Unfortunately, most of the above software except for the pubsoft contents is copyrighted property of Microware (now Radisys) or OptImage (a former Philips/Microware joint venture) which means that I cannot distribute it, even though they could be very useful to CD-i homebrew developers. For that the hopefully soon-to-be available GCC cross-port will have to be enough...

    While investigating all of the above I also stumbled upon a 450 MB OS-9 hard disk image for MediaWorkshop. The os9.exe program recognizes it just enough to say that it does not support it so I have no real idea about its contents except the obvious.

    To remedy that problem I’m in the process of adding SCSI disk support to CD-i emulator so that I can use the SCSI support in the CD-i 605 ROMs to mount the disk image and look at it. This should also allow the CD-i 180 to boot from a SCSI disk if I ever find drivers for it (a possible path to that has just appeared, we’ll see...).
              Groundwork of Repentance Pt 2 — Spiritual Discernment        
    A new MP3 sermon from Freely We Give Broadcast is now available on SermonAudio.com with the following details:

    Title: Groundwork of Repentance Pt 2 — Spiritual Discernment
    Subtitle: Groundwork
    Speaker: Tom L. Daniel
    Broadcaster: Freely We Give Broadcast
    Event: Radio Broadcast
    Date: 6/12/1966
    Bible: Luke 5:30-32
    Length: 30 min. (64kbps)

    Overview: CHAPTER 2 -Spiritual Discernment in the Work of Repentance------The Groundwork of Repentance- ... this is the second of a radio series given on Tom L. Daniel's -Gospel of Grace Broadcast- years ago -1966-, from Waco, Texas, over a network of stations in the South and East of the USA.----Please hear all four messages that are posted here separately.
              Patch notes: version 1.0.3.276 (October 27, 2014)        
    A patch has been issued for Sid Meier's Civilization V. Here are the patch notes:

    EXPLOITS
    • Fixed tech overflow bug that could allow a user to get free tech each turn for multiple turns. The size of the maximum allowable science overflow is now set at 5 turns of science (about the same as a unmodified research agreement) OR the unmodified cost of the last tech researched, whichever is larger. AI also understands this adjustment.
    • Fixed a multiplayer bug that would allow a player to steal everything from another player when trading.

    GAMEPLAY
    • Allow Conquest of the New World achievements to be unlocked when playing the Deluxe version of the scenario.
    • Slight nerf to Tradition, and a boost to Piety (by adding one more prerequisite for Legalism and taking one away from Reformation).
    • Scale warmonger penalties by era (50% of normal strength in Ancient up to 90% in Industrial; 100% thereafter). Penalties for warmongering vs. City-States halved.
    • Added Cocoa and Bison resources from the Conquest Deluxe scenario into the main game.

    MULTIPLAYER
    • The autoslotting of human players when loading a saved game in LAN multiplayer was broken when trying to play round-to-round. This has been fixed.
    • Players now properly exit LAN games when they encounter a version mismatch.
    • Players can now set their nick name in LAN games.
    • Fixed an issue where player would get stuck on the joining multiplayer game screen if they used an incomplete IP address while attempting to join by ip address.
    • Notifications are no longer considered “broadcast” unless the player is connected to the game. This will make it easier to communicate information to players who were not connected when the message was broadcast.
    • Players now unready themselves if the host changes the game settings before the game started.
    • The number of player slots available was not updating for connected remote clients when the host increased the map size on the staging room.
    • Fixed an issue causing AI civs that used to be players to still have the player's Steam name after the player leaves in Multiplayer.
    • A player's name in the staging room chat panel no longer swaps if they swapped player slots.
    • Some multiplayer notifications can now expire at the end of the next turn.
    • Some multiplayer notifications will not expire until the player has network connected to the game.
    • Multiple hot-joining bugs fixed in Pitboss.

    MISC BUGS
    • The icon no longer changes to a spinning globe during diplomacy (this normally means the game is busy).
    • Don't show a third-party civ or City-State on the trade panel list to "Declare War" or "Make Peace" unless both players have met that civ or City-State.


              Finisce l'era di Yahoo!, acquisita da Verizon per essere incorporata in AOL        

    Nulla è per sempre, specialmente sul web. Se negli ultimi anni i social network concorrenti di Facebook e Twitter hanno chiuso i battenti (Ping, Orkut, Beats Connect) o vivono di luce riflessa di altri servizi (qualcuno ha detto Google+?), la scure della fine di un percorso...


              Thank you Edge Media Network        
    none
              This is what privatisation did to Australia's household electricity bills        

    When three eastern and one southern state formed the National Electricity Market in December 1998 Australia had the lowest retail prices in the world along with the United States and Canada.

    The rules which underpin this National Electricity Market are created by the Australian Energy Market Commission (AEMC) set up by the Council of Australian Governments (COAG) - through the COAG Energy Council - for that purpose and to advise federal & state governments on how best to develop energy markets over time.

    The Australian Energy Regulator (AER) sets the amount of revenue that network businesses can recover from customers for using networks (electricity poles and wires and gas pipelines) that transport energy.

    So far so good. There's a defined market and there are rules.

    Then the privatisation of electricity supply and infrastructure began in earnest.

    It should come as no surprise that this push towards full privatisation, with its downhill spiral in service delivery and uphill climb in cost to retail customers, began and was progressed during the term of Liberal Prime Minister John Howard.

    By 2017 the NSW Berejiklian Coalition Government has almost completed its three-stage privatisation of state power infrastructure by selling off poles and wires and, it goes without saying that the retail cost of electricity is expected to rise again next year.

    This is where we stand today……………………

    [Graphs in Financial Review, 4 August 2017]
    The Financial Review, 4 Augut 2017:

    The annual cost to households of accepting a standing offer from one of the big three retailers instead of the best offer in the market has been estimated at $830 in Victoria, $900 in Queensland and $1400-$1500 in NSW and SA by the St Vincent de Paul Society.

    Mr Mountain said power bills are constructed in such a complex way that ordinary customers without sophisticated spreadsheet and analytical skills have little hope of analysing competing offers to work out which offers them the best deal.

    Private comparison websites do not include all market offers and charge retailers for switching customers, while the websites offered by the Australian Energy Regulator and the Victorian government do not provide the tools customers need to discriminate among offers.

    Prime Minister Malcolm Turnbull has ordered the Australian Competition and Consumer Commission (ACCC) to conduct an inquiry into electricity supply, costs and pricing, including retail pricing.

    The Treasurer should have a preliminary report from the ACCC in his hands by the end of September this year, however this body does not submit a final report until 30 June 2018 with no guarantee that any recommendations will be adopted by government and industry.

    Quite frankly, it appears the privatisation train left the platform some time ago and there is no way to halt or divert it in order to genuinely benefit household consumers.


              Facebook Inc still pursuing dream of spying on users through their webcams and via their touch screens or mobile phones        

    The Daily Dot, 8 June 2017:

    Your worst internet nightmare could be on its way to becoming a reality.
    newly discovered patent application shows Facebook has come up with plans to potentially spy on its users through their phone or laptop cameras—even when they’re not turned on. This could allow it to send tailored advertisements to its nearly two billion members. The application, filed in 2014, says Facebook has thought of using â€œimaging components,” like a camera, to read the emotions of its users and send them catered content, like videos, photos, and ads.

    “Computing devices such as laptops, mobile phones, and tablets increasingly include at least one, and often more than one, imaging component, such as a digital camera. Some devices may include a front-facing camera that is positioned on the same side of the device as a display. Thus, during normal operation, a user may be looking towards the imaging component. However, current content delivery systems typically do not utilize passive imaging information. Thus, a need exists for a content delivery solution that takes advantage of available passive imaging data to provide content to a user with improved relevancy.”

    This is the US patent application to which the article is referring.

    United States Patent Application 20150242679
    Kind Code:
    A1
    Techniques for emotion detection and content delivery are described. In one embodiment, for example, an emotion detection component may identify at least one type of emotion associated with at least one detected emotion characteristic. A storage component may store the identified emotion type. An application programming interface (API) component may receive a request from one or more applications for emotion type and, in response to the request, return the identified emotion type. The one or more applications may identify content for display based upon the identified emotion type. The identification of content for display by the one or more applications based upon the identified emotion type may include searching among a plurality of content items, each content item being associated with one or more emotion type. Other embodiments are described and claimed.

    Publication number
    US20150242679 A1
    Publication type
    Application
    Application number
    US 14/189,467
    Publication date
    Aug 27, 2015
    Filing date
    Feb 25, 2014
    Priority date
    Feb 25, 2014
    Also published as
    Inventors
    Original Assignee
    Export Citation
    External Links: USPTOUSPTO AssignmentEspacenet

    Facebook Inc appears to have been granted this related patent, Techniques for emotion detection and content delivery (US 9681166 B2- Publication date 13 June 2017):

    ABSTRACT
    Techniques for emotion detection and content delivery are described. In one embodiment, for example, an emotion detection component may identify at least one type of emotion associated with at least one detected emotion characteristic. A storage component may store the identified emotion type. An application programming interface (API) component may receive a request from one or more applications for emotion type and, in response to the request, return the identified emotion type. The one or more applications may identify content for display based upon the identified emotion type. The identification of content for display by the one or more applications based upon the identified emotion type may include searching among a plurality of content items, each content item being associated with one or more emotion type. Other embodiments are described and claimed.

    BACKGROUND
    Users of computing devices spend increasing amounts of time browsing streams of posts on social networks, news articles, video, audio, or other digital content. The amount of information available to users is also increasing. Thus, a need exists for delivering content a user that may be of current interest to them. For example, a user's interests may be determined based upon their current emotional state. Computing devices such as laptops, mobile phones, and tablets increasingly include at least one, and often more than one, imaging component, such as a digital camera. Some devices may include a front-facing camera that is positioned on the same side of the device as a display. Thus, during normal operation, a user may be looking towards the imaging component. However, current content delivery systems typically do not utilize passive imaging information. Thus, a need exists for a content delivery solution that takes advantage of available passive imaging data to provide content to a user with improved relevancy.

    Facebook also appears to have been granted a US patent in May this year for Augmenting Text Messages With Emotion Information (US 20170147202 A1).

    According to CBINSIGHTS this patent would; automatically add emotional information to text messages, predicting the user’s emotion based on methods of keyboard input. The visual format of the text message would adapt in real time based on the user’s predicted emotion. As the patent notes (and as many people have likely experienced), it can be hard to convey mood and intended meaning in a text-only message; this system would aim to reduce misunderstandings.
    The system could pick up data from the keyboard, mouse, touch pad, touch screen, or other input devices, and the patent mentions predicting emotion based on relative typing speed, how hard the keys are pressed, movement (using the phone’s accelerometer), location, and other factors.


              Environment Victoria calls on Andrews Government to challenge NSW Berejiklian Government's "rigging" of Murray-Darling Basin Plan river water extraction rules        

    Environment Victoria, Media Release, Tuesday 25 July 2017:

    Calls for Victoria to stand up to NSW water guzzlers

    Environmental groups, farmers and Indigenous leaders today called on the Andrews government to respond urgently to claims on ABC’s Four Corners that New South Wales irrigators are engaging in “illegal water use” at the expense of Victoria’s rivers and farmers.

    Environment Victoria Acting CEO Dr Nicholas Aberle said:

    “Victoria is being cheated out of water and the Victorian government needs to stand up to these greedy cotton growers who are guzzling billions of litres meant to flow downstream for our environment.

    “Victorians deserve to know exactly how much water has been lost and how this will affect Victoria’s water supplies and the health of our rivers.

    Below: Map showing how alleged illegal water use upstream in NSW affects Victoria


    “The worst part is the New South Wales government has been rigging the rules to let these big irrigators get away with it. This shows utter contempt for the health of Australia’s rivers – an attitude that has no place in a government that shares responsibility for delivering the Murray-Darling Basin Plan,” said Dr Aberle.

    Last night’s Four Corners program exposed major issues in the NSW water industry, including claims of illegal water use and tampering with water meters.

    “The actions of the NSW government are leaving downstream users and the environment quite literally hanging out to dry. This means there’s less water for Victoria’s farmers, communities and our precious rivers and wetlands.

    “We need the Victorian government to take a leadership role in fixing this mess and to make sure this never happens again. The whole plan relies on accurate measurement, tracking and compliance. Based on the revelations last night, it seems clear we can’t rely on big upstream irrigators just to do the right thing.”

    Environment Victoria, together with the Murray Lower Darling Rivers Indigenous Nations and the Environmental Farmers Network, has written to Victoria’s Minister for Water, Lisa Neville, asking her to:
     
    Launch a full investigation into how much water has been lost by changes to water sharing rules in NSW since 2012, and how much damage this has done to Victoria and South Australia.

    Implement the Basin Plan in full so all its objectives are met, including finding smart ways to recover the remaining 450 gigalitres (GL) of water to protect Victoria’s rivers and wetlands.

    Lead the development of Murray-Darling Basin Ministerial Council protocols on water integrity to make sure this type of rule manipulation in favour of vested interests never happens again.

    “Governments across Australia urgently need to re-establish trust in the Murray-Darling Basin Plan and the environmental restoration it is designed to achieve. Victoria can and must play an important role in leading this process,” said Dr Aberle.

    This call was supported by Rene Woods, Chair, Murray Lower Darling Rivers Indigenous Nations & John Pettigrew, Water Spokesperson, Environmental Farmers Network.


              IDM 6.23 Build 12 Final Full Version        

    IDM 6.23 Bulid 12 Final Full Version

    Internet Download Manager (IDM) is a tool to increase download speeds, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

    What's new in version 6.23 Build 12 :

    • Added support for Firefox 39
    • Improved video downloading for several types of web sites
    • Fixed bugs
    Download Files

              Winzip 18 Pro with Patch and Serial Key        
    Winzip 18 Pro
    Winzip 18 Pro with Patch and Serial Key | 82.43 MB

    Unzip all major formats
    With just a click, open all major compression file types, including Zip, Zipx, RAR, 7Z, TAR, GZIP and more.

    Protect your privacy
    Easily encrypt files as you zip to keep information and data secure. Add watermarks to deter unauthorized copying.

    Simplify cloud sharing
    Share directly to more cloud services, manage your cloud files more easily, and quickly share links to your cloud files.

    Just add WinZip
    Bring popular WinZip features into the software you use most with new WinZip Express Add-Ons*.

    Features:
    Zip and manage content
    Compressing large files and folders makes them easier to transfer and saves storage space. Choose files from your PC using simple, drag-and-drop functionality or get files you've stored on Box, SkyDrive, Dropbox, Google Drive, CloudMe and SugarSync to zip instantly. Zip files are perfect for sharing because they let you organize multiple files into one convenient package.

    Unzip anything
    Extract content from the industry's widest selection of compressed file types, including Zip, Zipx, RAR, 7Zip, BZ2, LHA/LZH and many more. When extracting encrypted files, WinZip auto-wipes all temporarily extracted copies to prevent misuse.

    NEW! Connect to more cloud services
    WinZip connects directly to Box, SkyDrive, Dropbox, Google Drive, CloudMe and now SugarSync, so you can organize all your cloud files at once. Use WinZip to zip and save large files to the cloud or retrieve files or links to share. Secure your files and save precious online storage space by zipping and encrypting them first.

    NEW! One-stop cloud file sharing
    Imagine being able to see all your cloud files—even if they are saved on various cloud services—in a single view. Now you can, with WinZip 18. Instead of wasting time moving back and forth between various services to see where your files are and how much space you have, enjoy fast, easy cloud file sharing without leaving WinZip.

    Zip and share to social media
    Use ZipShare to share any type of file to Facebook, Twitter and LinkedIn. Keep everyone in the loop by posting content to all three social networks at once. Simply select the files you want to share, compose your message, and pick the social networks where you want your files to go.
     
    NEW! Email large files with just a click
    WinZip 18 lets you email large files or folders using any of your cloud services. Your files are automatically uploaded to your default cloud service and a link to them is placed in your outgoing email. Send up to 50MB free if you're using the ZipSend cloud or move up to ZipSend Pro to send up to 2GB. and etc

    What's New:
    NEW! Zip and share to more clouds
    Protect your files in the cloud and use less space by zipping them first. WinZip 18 lets you connect directly to your cloud services, including Box, Google Drive, SkyDrive, Dropbox, CloudMe and SugarSync. Zip before you upload, open zip files saved in the cloud, or select files from the cloud to zip and share.

    NEW! Streamlined cloud navigation
    Access and manage your cloud files as easily as you access the files on your computer. WinZip 18 makes it simple to send files to and from the cloud, save between your cloud accounts and monitor your cloud storage space.
     
    NEW! Copy and share Cloud Links
    Quickly send links to your cloud files by email, instant messaging and on social media sites.
     
    NEW! Work faster with WinZip Express Add-Ons
    Bring the power of WinZip into the software you use every day. Download the WinZip Express Add-On for Explorer for free and get instant access to the WinZip features you use most directly within Explorer. Add-Ons are also available for Microsoft Outlook, Photos and SharePoint.
     
    NEW! Compress files even more
    Make Zip and Zipx files even smaller with the enhanced zip engine in WinZip 18.

    Download Link
              Wifi Password Hack v2.3.2 Latest        
    Wifi Password Hack
    Wifi Password Hack v2.3.2 Latest | 4.99 MB

    How to hack a Wifi password? This is not a easy task, so after many years we have crated a very interesting program. This program is called Password Hack v5 and Wifi hack wiil be piece a cake.

    Tutorial:
    Step 1: Just point your mouse to the social buttons bellow!
    Step 2: Click and the installation process will begin
    Next you must open the program and enter SSID code. The you only need to click “start” and the password will be broken.

    How to hack a Wi-Fi network and how to find it’s password?

    First, let me tell you what Wi-Fi is! Wi-fi is a recent technology used by gadgets to connect to the Internet without the use of wires. The Wi-Fi Alliance says that Wi-Fi represent “any wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standards”. Because many WLAN use the same standard, WLAN became a synonym for the Wi-Fi word. Interbrand invented Wi-Fi as a play on words with Hi-Fi (high fidelity), and also created the Wi-Fi logo. This certified trademark can be used only by those Wi-Fi adaptors which pass the Wi-Fi Alliance tests and standards. If it has to do with a connected cable, then the Wi-Fi network is much more vulnerable to hackers attacks. Sites which aren’t sertified with SSL and are usually unencrypted are those which will try to steal the Wi-Fi password and any other private datas such as images or account passworrds. Even this intruder will try to take them, it will be harder for them if the router is protected with WPA, WPA2 or WEP encyption security. An extra feature extra from 2007, known as Wi-Fi Shielded Startup (WPS), experienced a serious catch in which let a great hacker to recoupy the actual router. The latest router devices come with the strongest protection ever known and are very hard for hackers to be breaken into. That’s, of course, if you don’t change the password with which is proveded. Ussualy, the routers have generic names and passwords such as the brand or name of the router, or even admin or 1234 as username and password.

    The Wi-Fi is used nowdays for devices such as PC, Video Console such as PS 2, Ps 3, Xbox 360, PS portable (except the E-1000 one) and any other console which have 3G or Wi-Fi connection toghether with laptops and smart and non-smart phones. Those devices can access the Wi-Fi by using the sho called hotspots, where free internet is ussually given by restaurants or Internet providers. You need to be within 100 m to receive the signal, and it can only be received outdoors. What you receive indoors is the signal of a neighbour’s router, not a hotspot one. Hotspots can have low signals (10-20 meters) to strong signals, which take a few kilometers.
    Any device which has Wi-Fi connectivity can receive Internet signal from this hotspots. The interconected devices are called hang-outs and can be seen each other for distances of over several miles. Outdoor open public Wi-Fi technologies have been used properly with wifi mesh networks with Liverpool, London, and gennerally in the big cities from all the United Kngdom. Wi-Fi is a great way for companies to promote their businessess; it’s very clear that, if there are two restaurants with the same prices and services, but one have also Wi-Fi connectivity, the one with the Wi-Fi will win. And it is not too expensive to provide Wi-Fi, just connect the Internet cable to a router and let it flow. Enthusiasts or perhaps specialists who want to offer products and services or even to enhance company with selected parts at times offer no cost Wi-Fi gain access to. Also there are companies which, in exchage for space used by antena’s on the rooftop of the flat of blocks, gife free internet in that flat. The are radions risks but who cares when you have free Internet, right? I thought so!
    If you want to aquire a router, take a brand one, like Belkin or D-link, because the no-name chinese ones are very vulnerable to hacker attacks and can break easely. Don’t risk to lose all your money from the bank accounts or images with your daughter naked posted on the Internet just because you did’t wanted to spend a couple of extra pennies at the right time.

    The same can apply to a mobile, battery powerd router, which is included in every cellphone existent. Many phone provider give free traffic for their clients in WAP, 2G, 3G or even 4G connectivity, depending on the country you live. Almost all smartphones have nowdays a easy OS to use such as Android, iOS, and the now dead Symbian OS, which make possible to connect to any Wi-Fi decive and also to interconnect. Internet pucksgive separate services in this sort at the same time, without use of any touch screen phone; these include this MiFi, as well as WiBro branded equipment. Out there are also many devices such as notebooks, ultrabooks and even laptops which use Wi-Fi to find any information the users want.

    Now, let’s turn back to the topic of this article. How to hack a Wi-Fi network and how to find it’s password? This is a question many people asked. But now you don;t have to ask yourself anymore. Here is the sollution to all those frustrating days when you were at countrysite, isolated from the rest of the world and you found just a single, slow router. And that was passworded too. Then you and your phone are useless. That’s why our team of developers invented the most powerfull tool on the internet:

    Wi-Fi password Hack v5. With a beautifull design, a silverish skin and a blueish font, this is one hack which is very, vet, very easy to use! Even my granddaughter Mary managed to use it in order to play with her virtual friends on the Internet. What do you have to do? First, type the SSID of the router. Ussualy is admin or the model of the router: you can just find it by scanning with the Windows utilities. Next, choose the security type: it could be WEP, WEP 2 or even WSK, it depends on the router. It doesn’t matter what type of security is, every type is hackable. Next, press on Start hacking and the program will handle you the password. Now you have free internet. Congratulations!

    Download Link
              Naomi Campbell goes topless on Instagram for ‘free the nipple’ campaign        
    Supermodel Naomi Campbell dared to bare her breasts in an Instagram photo as part of the “free the nipple” campaign to protest the social networking site’s stance on nudity. Campbell shared the topless photo by Paolo Riversi from her Garage magazine shoot on Tuesday. The image has since been removed from Instagram, but the image
              AVG Internet Security 2014 v14.0.0.4016 x86 Full        
    AVG Internet Security 2014
    AVG Internet Security 2014 v14.0.0.4016 x86 Full | 125.91 MB

    AVG Internet Security 2014 is a capable security suite which does a generally very good job of protecting your PC from dangers, both on and offline.

    At the program's core is AVG's strong antivirus engine. A little more accurate in this release, and with significantly reduced scanning times, this monitors every file you access, detecting and removing malware before it can cause any damage.

    The suite also includes a firewall, which protects you from network attacks and monitors running programs to make sure malware can't "phone home".

    The spam filter is also significantly enhanced. The last edition blocked only 55% of our test junk emails; AVG Internet Security 2014 has raised the detection rate to an impressive 88%.

    The suite's Windows 8-style interface is little changed, but simple to use, with the various tiles delivering quick access to the program's various functions and features. An Options menu allows you to carry out just about any Internet Security Suite action in just a couple of clicks, and if you're still a little confused then a good local Help file will quickly point you in the right direction.

    As with the previous edition, AVG Internet Security only highlights potentially dangerous search engine results if you install its toolbar, which the setup program will do by default (although if you choose the Custom Installation option then you can change this).

    Fortunately, the suite does include other technologies to help keep you safe online. AVG's LinkScanner module vets web pages before they're displayed in the browser, and if something does get through then it'll still be vetted by the antivirus engine, which will detect and remove most dangerous files.

    The 2014 release looks and feels much like previous builds, but it does feature improved malware detection and full Windows 8.1 compatibility, as well as adding two useful new privacy additions to the suite.

    If you have any confidential documents then the new Data Safe option allows you to protect them in an encrypted file (click Computer > Create Your Safe).

    And if you want to delete confidential files and be sure they're gone forever, with no hope of recovery, then you'll appreciate the Shredder. Simply right-click a file or folder in Explorer, select "Permanently shred with AVG", and after confirming your decision it'll be securely deleted.

    Download Link
              WiFi Password Revealer 1.0.0.4        
    WiFi Password Revealer
    WiFi Password Revealer 1.0.0.4 | 1.9 MB

    WiFi Password Revealer is a simple utility to recover a forgotten or lost password to your wireless network. Simple run the program and it will list all wireless network connections along with their security details and the wireless password. In order for WiFi Password Revealer to be able to recover your password, you must have previously been connected to the wireless network and have selected to let Windows store the password. It will work on Windows XP, Vista, Windows 7 and Windows 8.

    Installation
    1. install the setup
    2. This is a portable version no need to activate

    Download Link
              Active Boot Disk Suite 7.5.2        
    Active Boot Disk Suite 7.5
    Active Boot Disk Suite 7.5.2 | 185.10 MB

    Active@ Boot Disk contains a collection of powerful utilities to perform data recovery, data imaging, secure data erasure and a number of other tasks all from a bootable CD/DVD or USB flash media. The self-contained boot environment by-passes the operating system allowing you to boot previously unbootable PCs.

    Key Features:
    • Ability to start non-bootable PC for full access to it
    • Boot Disk media may be removed from the system after successfully booting the system
    • Start from a CD, DVD or USB flash drive (appropriate BIOS settings required)
    • Multi-boot or dual-boot functionality (DOS + Windows)
    • Anti-virus setup guide
    • Boot Disk has a user friendly interface
    • Boot Disk allows specifying boot settings
    • "Allows addition of drivers, scripts and other user files"
    • Recovery utilities recover deleted files, or recover data from deleted/damaged partitions
    • Ability to backup and restore data (Disk Image)
    • Creating, deleting and formatting partitions on hard disk drives, as well as most USB media
    • Recover deleted partitions by using either automated partition or via low-level HEX editor software
    • Utility for resetting your Windows user passwords including Administrator account
    • Supports: FAT12, FAT16, FAT32, NTFS, NTFS5, NTFS+EFS; advanced search of deleted files; all types of Flash Memory Cards; compressed, encrypted and fragmented files on NTFS, IDE / ATA / SCSI drives
    • DoD-compliant disk erasing & wiping of free space on PC disks
    • Securely erase data
    • Hard Disk Drive temperature and S.M.A.R.T attributes monitoring utility
    • Terminal client, Web browser, Telnet & FTP Clients, and other connectivity tools
    • Paint, Notepad, WordPad Calculator, Task Manager, Registry Editor, HEX editor and other PC tools
    • Disk Defragmenter provides high speed file optimizing to improve read/write operations from a hard disk
    • Network access via TCP/IP, network configurator
    • Ability to load additional drivers on-the-fly
    • Data CD/DVD burning capable
    • A File Manager (Xplorer) allows you to browse directories, search, copy and move files and folders

    Download Link
              Deep Freeze Enterprise 7.70 + keygen        
    Deep Freeze Enterprise 7
    Deep Freeze Enterprise 7.70 + keygen | 35.02 MB

    The function of the program to those who heard him the first time: the program and his job are keeping the device as it is after you install the program
    In other words, when you run this software, you can install programs as you like and delete what you want and change whatever you want, but after you restart the device will return the device as it was, and will delete what you added and retrieval what ..
    So it is important for owners of cafes and computer teachers to protect their devices, as well as matter owners Alajhazh to the their children are using their devices

    Deep Freeze instantly protects and preserves baseline computer configurations. No matter what changes a user makes to a workstation, simply restart to eradicate all changes and reset the computer to its original state - right down to the last byte. Expensive computer assets are kept running at 100% capacity and technical support time is reduced or eliminated completely. The result is consistent trouble-free computing on a truly protected and parallel network, completely free of harmful viruses and unwanted programs. While Deep Freeze provides bulletproof protection, its non-restrictive approach also improves user productivity and satisfaction. Placing no restrictions on a user's ability to access all system resources, users avoid the frustration of downtime due to software conflicts, operating system corruption, virus attacks, and many other problems. Users are always assured of computers that are consistently operable and available

    Explain the work of Enable and Disable the program:
    1 - press the Shift and DoubleClick the program Econh.
    2 - Write responded basses if you've chosen before (if you do not press the Inter and salvation)
    3 - to work Disable press Boot Thawed
    4 - Enable press work Boot Frozen
    5 - Restart the device.

    NOTE Please Disable Your Anti Virus For 10-20 Minutes And Use The KeyGen For Activation.
    1) Install the Application
    2) Run Keygen follow instrunction.
    3) Done.

    Download Link
              What have HMRC got to hide? About £90bn in lost tax.        
    Why are HMRC so reluctant to tell us how they work out their 'official' figure for the tax gap?

    The latest figure they released this week has it at £35bn. An astronomical figure I'm sure you'll agree - when you think that this is the amount that goes uncollected every year in taxes because of evasion, avoidance or HMRC just being too damned stretched to collect what's owed. However, if I was to tell you that tax experts at the tax justice network reckon this figure is grossly underestimated and that the real figure is actually ooh not just twice, not even just thrice but almost four times this figure then you get the picture.

    It's a pretty ugly picture when you think of all the cuts being made to public services in the name of reducing the deficit. There is over £120bn out there that our economy is losing out on, largely because of wealthy individuals and multinationals companies are exploiting the system and are being allowed to get away without paying their fair share.

    Bet who's right about the figure? Well, while the tax justice network have published how they arrived at their figure, it's difficult to say with any certainty how HMRC arrived at theirs' because they simply refuse to share their workings out. As any Maths teacher will tell you, it's important to show your workings to prove you haven't just arrived at your answer by mere chance or guess work.

    Until HMRC share their methodology, I'm inclined to believe the independent experts who've set out why HMRC have got the tax gap wrong. But whatever the true figure, the scandal of massive tax dodging by the wealthy while the rest of us are expected to tighten our belts so much we've run out of notches continues.
              Internet Download Manager IDM 6.17 Build 2 Final        
    IDM 6.17 Build 2 Final
    Internet Download Manager IDM 6.17 Build 2 Final | 5.09 MB

    Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

    Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.

    Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.

    Version 6.17 adds Windows 8.1 compatibility, adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Videos. It also features complete Windows 7 and Vista support, YouTube grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

    What's new in version 6.17 Build 2
    (Released: July 12, 2013)
    >Improved IE 11 integration (Windows 8.1)
    >Added support for new youtube changes
    >Fixed bugs

    Download Link
              How To Hack WhatsApp Without Rooting By Exactspy ?        

    How To Hack WhatsApp Without Rooting By Exactspy ? It is exciting for everybody to hack someone’s WhatsApp account. Whatsapp is most illustrious social networking application that is employed by numerous folks. once WhatsApp has launched, then it suffered from tiny security choices. when typically, a user has several resources which may modify to induce […]

    The post How To Hack WhatsApp Without Rooting By Exactspy ? appeared first on .


              'Cycling is the new golf' - businessman networking on two wheels        
    CYCLING is the new golf, according to an Oxford-based investor.
              Advice for businesses starting out        
    BUSINESSES that are just starting out can get expert advice about how to stay on the right track at Oxford Business Network’s next BioTuesday event next week.
              Everything We Know About Battlefield 4 Multiplayer        

    At the EA booth I jumped into a 64-player conquest battle in the Siege at Shanghai map. After playing through a couple rounds and speaking with executive producer Patrick Bach, here is what I learned.

    • The Xbox One, PlayStation 4, and PC versions eac h support 64-player maps and run at a solid 60 frames per second. The Xbox 360 and PlayStation 3 versions, however, are still limited to 24-players per match and 30 frames per second. 
    • Squads can now include five soldiers instead of just four.
    • Given the larger squad size, Squad Deathmatch mode now includes more competitors. 
    • Like Battlefield 3, the soldier classes you can play as are assault, engineer, recon, and support. All classes now have more shared weapons so players have more versatility when selecting their loadout.
    • Each class and weapon has a deeper persistance tree than previous Battlefield games.
    • DICE is changing how specializations work. It won't go into the finer details, but the developer is creating a system where you and your squad can bump up your specializations as you play if you are doing well. 
    • Gun and player customization are being broadened. You can now have multiple sights on your weapons and add optical magnifiers on the fly.
    • Vehicle progression is deeper as well. 
    • DICE has two new game modes it plans to reveal in the near future, and it plans to drop a few modes that were featured in Battlefield 3. The confirmed modes thus far are squad deathmatch, conquest, rush, and team deathmatch. 
    • Hardcore mode is returning.
    • The crazy wave technology featured in the E3 single-player demo is also coming to multiplayer. All the wave data is being pushed over the network, which means that every player will have the same sea experience at the same time.
    • Given the increased focus on naval combat, DICE is making sure you aren't a sitting duck if you lose your sea vessel or parachute into a body of water. Soldiers can now swim sprint, use sidearms in the water, hit the crounch button to dive underneath the surface of the water, and even deploy C4 to take out boats.
    • Players can rent their own Battlefield 4 servers on consoles from day one, and DICE plans to give them more server modifiers than were available in Battlefield 4.   
    • DICE knows the destruction in BF3 was disappointing so destructibility is coming back in a major way. Expect to see the microdestruction introduced in the Close Quarters map pack, plus large-scale destruction like the crumbling skyscraper in the E3 demo. 
    • You won't be able to completely flatten urban areas, which is a design choice rather than a technical limitation. 
    • Like Titanfall, DICE is using a proprietary matchmaking service instead of using the Xbox One native service.
    • DICE is also incorporating a skill level system on top of your player rank to help match you with players of a similar ability. You can set your rented server to only accept players of a certain ability.
    • DICE learned its lesson with Battlefield 3, and plans to keep a healthy amount of DICE sponsored servers for people who don't want to deal with the quirky rented servers.
    • Rather than build its own battle recorder, however, DICE plans to use the Xbox One and PlayStation 4 recorders.
    • Battlefield 4 also includes a spectator mode.
    • Given the difficult learning curve for some of the more powerful vehicles like jets and helicopters, DICE is including a practice mode or tutorial system of sorts so you can learn the tricks of the trade without hurting your team in a ranked match.
    • Battlelog is being revamped to be more directly integrated into the game and to give console players the same experience as the PC version. DICE wants the console players to have the ALT-TAB experience just like PC players, so you can check your stats at any time.
    • You can alter your loadout directly from the Battlelog app so it will be ready for you when you jump into a match.

    (Please visit the site to view this media)

    Commander Mode

    • You can play as a commmander on consoles, PC, and tablets.
    • Right now commanders are featured in two modes - conquest and rush. DICE also has some new modes that it isn't talk about yet.
    • Commanders gain experience and have a persistant skill tree just like other classes.
    • Unlike Battlefield 2, commanders don't have a physical presence on the battelfield. 
    • The commander roles are not counted against the player count. This means 64 soldiers will be on the battlefield with two commanders overseeing the battle.
    • DICE is aware that given the small number of commanders per server, there could be a supply/demand issue. To address this issue, it has created a gating system that prevents everyone from being allowed to play as commander.
    • If you are having trouble getting a commander role, you can always rent a server yourself and assume the role.
    • Commanders can issue orders to squads and deploy UAVs to spot troops. When the squads follow directives, the commander and soldiers are rewarded with XP. 
    • As they gain XP, commanders can use it to drop in ammo, med packs, and vehicles to their troops.
    • The more flags a team captures in conquest, the more weapons a commander has at his or her disposal. These offensive capabilities include tomahawk missiles and artillery strikes.
    • DICE views the commander mode as a game of chess between the two commanders. They are scored against one another. 
    • You can keep an eye on what the rival commmander is doing and counter their moves. For instance, if they scan an area you can try to jam their signals. If they drop in specific gear you can counter that in different ways. 
    • The commander's eye in the sky view is also used for respawns and spectator mode. It works the same way on all platforms.
    • DICE has rulesets to help populate maps with two commanders, but if one of the two commanders drops out the developer doesn't believe it will be a big issue for the guys on the ground.

    Battlefield 4 is coming to PC, Xbox 360, and PlayStation 3 on October 29. The Xbox One and PlayStation 4 release dates have yet to be announced.


              RELEASE: VPSN, Laneway Living Rooms: Grandma’s House, July 29th        
    Laneway Living Rooms: Grandma’s House WHEN: 12pm – 9pm Saturday, July 29th, 2017 WHERE: 1027 Commercial Drive laneway (south of Venables St between Parker St and Napier St) Kitsch, cookies and nostalgia with an East Van twist – Welcome to Grandma’s House! Grandma’s House is the first of the Vancouver Public Space Network’s two Laneway […]
              Psycho Wyco 50K        



    Psycho Wyco is a fabulous race held in Kansas City, Kansas. Surprisingly, it is in the woods with  lots of roots, rocks, river crossings and hills. All hills. It’s awesome.  It is not what I think of when I think of Kansas!

    I ran Psycho Wyco a few years ago, when it was a cold year, there was no reprieve from the Minnesota winter. This year was a whole different climate!

    Maria and I were running a long run at Elm Creek a few weeks ago when I asked her if she’d like to go out to run PW again. She thought about it for a week and then let me know that she and Doug were up for it. Yippee!! I had travel companions!

    We left Apple Valley around 8AM. Kansas is about 6 hours away. They decided Doug would drive the van so that we would have more room. I was very thankful; as we rode across Iowa, in 60 mile per hour winds, we saw 9 semi trucks that had blown over into the ditches. It was scary stuff. Doug drove us through to safety!

    Maria had planned a few stops along the way. We took a detour into Kansas City Missouri for Christopher Elbow Chocolates. Oh man, it was fabulous. We each spent $80 on high end wonderful chocolate. I binged. It wasn’t pretty. It is all gone now. I even gave Troy the last pieces.




    We traveled on to Kansas and stopped at Cupini’s Italian Deli, a counter that served up Italian staples.  Guy from DDD, FoodNetwork had visited and gave it a rave review. It was very good.

    Before hitting the hotel we swung by the race start. Oh my gosh, green grass, some budding going on in the trees, the smell of spring. It was 70 degrees!  WOW.  As we were checking out the area we saw Minnesota friends: Ed and Andrew Sandor and Dan LaPlant with his girlfriend, Jamie, who WON the women’s race and broke the record. Yeah, way to run!

    We headed over to check into the room where race packet pickup was. The sweatshirt is great, all of the bling was awesome. We received  a trucker hat and cool medal for finishing.

    Saturday morning at 500 it was already 45 degrees. Fabulous!! I had on a skirt and a short sleeved top, really!  I had just purchased a pair of Altra trail and a pair of Altra road shoes from Kurt at Twin Cities Running Company . I was going to try out the trail shoes right from the box. I placed a pair of my tried and true Inov-8s in a drop bag in case they didn’t work out. They did work out!  I wore them for the whole race without a problem.

    I ate breakfast and was ready to roll. We drove to the start, arriving about an hour beforehand. Of course I hadn’t pooped in two days due to the change in my schedule. Ugh. I tried not to worry about it because we were going to be in the woods anyway so it wasn’t like I was running Twin Cities Marathon and wouldn’t be able to find a bathroom upon the way. I stuffed some toilet paper into my pocket.

    I was so excited. This was all about fun, no fast time, no out of breath business, I was going to keep my heart rate low-140 per MAF training. I’d walk when the rate increased too much. I was just happy to be out in the woods for the day. I was glad we were going to be driving home after the race, I’d have a whole day at home and wouldn’t miss out on church. Yeah!

    The race is a 10Mile, beginning at 9 AM and the 50K and 20 Mile beginning at 8 AM. I started with a light Patagonia Hoodini which I had just purchased. I watched someone steal my last one at Superior 100 right after I finished in 2014. Yup. Nice, hu? I was too tired to run this person down and ask for it back.

    I began in the back of the pack, running with a hand held. I didn’t need a pack, there was an aid station every 4 miles and back to the start/finish to my drop bag every 10 miles. After 1 mile I tied my jacket around my waist. It was going to be a delightful day!

    The creek crossings weren’t very deep-the cool water felt good on my feet. The hills were as steep as I remembered but the footing was SO good!  The trails weren’t muddy, they weren’t frozen, they were soft and fabulous. All I did was smile.

    My heart rate hovered between 140-145 most of the time. Climbing hills brought it up to 160 but it quickly recovered back to the 140 area. I felt like I could run forever. I had no pain, I didn’t want the race to end, I was enjoying every step.









    I came into the first loop and refilled my bottle, grabbed some foot potion for chaffing. My chubby thighs were causing some friction.  I was good to go!

    The second loop was awesome. I ran with Doug for a while. He was running the 20 miler. I fell into a line behind him. We just enjoyed the sun. I didn’t feel the need for music, I was thinking about how grateful I was for being able to do this. I really believed I was done running last year at this time. I just couldn’t recover from my foot surgery. It was a long recovery. I was just so pleased to be right where I was. I gave thanks to God and had conversations with Him during the whole race.

    Eventually I passed Doug and took a detour for a potty break. Thank goodness!! I finally went. I was so excited, as I done I yelled out to Doug “I finally went”!  My poop looked like a crocodile poop. Seriously massive. My gut was relieved!

    I ran along, finishing up the second loop. I felt so great. The sun was warm, I was in good health and high spirits. I didn’t stop smiling.

    The third loop was my best. I was able to pick up KTIS from Minneapolis and just sang to the songs, worshiping the whole way. It was amazing. I wasn’t ready to stop.  I came upon the Sandor’s. They had been ahead of me the whole time. I didn’t want to sneak up and pass them in the final miles. I yelled out “you better move!  You don’t want me to pass you now”. They looked back and Andrew asked how it was that I was able to catch them. He said I came out of nowhere. I was on fire, I felt like I was flying. They hoofed it, I didn’t have to pass them. I wanted to run more. I came into the finish at 750, feeling blessed.  Maria was there to take a finish photo and an awesome medal was put around my neck, a hat in my hand. It was awesome.

    We visited for a few minutes at the finish and then headed for home. We stopped at Chipotle to refuel, at Target for Starbucks and at every other rest area on the way home. Doug is a great driver. He doesn’t mind stopping a zillion times along the way for us. We walked around, stretched, peed, drank and ate. We had so much fun. I LOVE road tripping with Doug and Maria.  Can’t wait to plan the next one!

    We rolled into Apple Valley about 1230, I then headed for home and arrived at 130. I unpacked and slept hard.

    What a great trip and race! Oh, and I entered Superior 100 today . Oh yeah. My favorite 100.






              Netgear Orbi Home WiFi System: AC3000 Tri Band Home Network Unboxing Review @Netgear        
    Netgear.com FAST WHOLE HOME WIFI SYSTEM – Covers up to 5000 square feet with high performance WiFi; kit includes WiFi router and Satellites TRI-BAND TECHNOLOGY – Unlike other WiFi sets...
              How Can You Advertise Your Brand To An Influencers 500,000 People Audience?        
    As Forbes Top 50 rated influencer you can now advertise your Brand/Product on my networks with your budget. I have an audience across social media of over 500,000 followers. Drive...
              Congress Should Lower Ridiculous Drug Prices by Passing CREATES Act        

    Perpetually increasing prescription drug prices ravage everyday Americans. Specifically, name-brand prices outpace inflation by about 50%, largely due to government-protected market power. A beacon of hope for reducing drug prices are the generic and biosimilar drug industries, which produces existing brand drugs and biologics drugs through distinctly cheaper methods. But big Pharma doesn’t want competition, so it does everything it can to block generic and biosimilar innovation. The CREATES Act, H.R. 2212, solves a loophole commonly abused by big pharmaceutical companies for unlawful market advantages in the emerging generics and biosimilars markets.

    Existing drug companies exploit the Food and Drug Administration’s (FDA’s) Abbreviated New Drug Application (ANDA) requirements for FDA approval of competitive generic and biosimilar products. This is an unlawful tactic to increase market-power. Biosimilars are a type of biologic drug – drugs manufactured from living cells – that mimic both the composition and the function of an existing biologic drug but employ cheaper production processes. Tragically, established producers prevent aspiring competitors from completing ANDA.

    To complete a generic or biosimilar approval process, applicants must acquire sample drugs from existing producers. This allows medical researchers to demonstrate that the functions and properties of the original brand drug and the new generic or biosimilar are, in fact, equivalent. Sadly, many brand companies refuse to provide samples to potential competitors, preventing them from gaining approval. Thus, innovative generics and biosimilars hit the market less frequently, trapping consumers with fewer options and higher prices. While this practice of abusing distribution networks is illegal, there are no enforcement mechanisms preventing it.

    Remember the damnable pharmaceutical executive Martin Shkreli, who raised the price of a biologic AIDS drug Daraprim by over 5000% in one night? One of his profit-protection methods was to deny competitor applicants the samples they need to earn FDA approval. Competing with losers like Shkreli would be easy it if weren’t for this loophole. High school chemistry students reproduced Daraprim for less than $2 a pill compared to Shkreli’s $750.

    A similar monopolistic scam employed by entrenched pharmaceutical companies involves exploiting shared Risk Evaluation and Mitigation Strategy (REMS) procedures. Producers of existing brand drugs are sometimes required by the FDA to establish safety protocols that protect consumers from safety risks. The FDA encourages companies to share, or streamline, their REMS procedures for maximum safety and congruency among user experiences. If a person taking biologic drug X switches to biosimilar drug X, the shared procedure is supposed to ensure that there are no major differences in how this person safely consumes the drug. In a similar fashion to denying samples, big pharma often refuses to share REMS procedures. When a REMS program has previously been required, FDA cannot approve a generic or biosimilar until a shared REMS has been negotiated or the agency has been given sufficient evidence to waive the requirement. This imposes redundant and costly burdens on biosimilar producers, and ultimately delays market entry for far less expensive but equally safe drugs.

    Both of these tactics, refusal to share samples and failure to fairly negotiate shared REMS programs, establish de facto monopolies for original drug producers, but they’re easily fixed by the CREATES Act. Under the CREATES Act, generics and biosimilar manufacturers will be able to seek injunctive relief in court against companies that withhold samples or REMS information. This will improve competition with new generics and biosimilars, reducing prescription drug costs possibly as much as 40%. It will also help sustain Medicare Part D, the national deficit, and debt, by reducing government drug expenses by up to $5 billion per year.

    Congress should end illegal monopolies and help Americans afford their medications by passing the CREATES Act, all without increasing the size of government.


              Pat Robertson Says ‘Totally Bogus’ Fox News Scandals Are The Result Of A Conspiracy To Destroy The Network        
    Group:

    Christian Broadcasting Network


    Headline: Pat Robertson Says ‘Totally Bogus’ Fox News Scandals Are The Result Of A Conspiracy To Destroy The Network

    -- Delivered by Feed43 service


              SEJARAH LAPTOP        
    “SEJARAH  LAPTOP” Pada tahun 1970an Alan Kay dari Xerox Palo Alto Research Center memiliki suatu visi untuk sebuah komputer jinjing yang tudak memerlukan kabel, seukuran buku catatan. Ia menamakannya Dynabook. Dynabook milik Kay ini di ciptakan dengan kemampuan network wireless. Dan hal ini mulai menngerakkan roda perkembangan sebuah komputer jinjing yang sebenarnya seperti sekarang ini. […]
              United Small Business Alliance Networking at El Pollo Inka        
    These photos were taken at the Free Food Tasting & Networking event hosted by the United Small Business Alliance and Small Business EXPO at El Pollo Inka in Rolling Hills Estates on Wednesday afternoon. The event featured a few samples of El Pollo Inka’s Peruvian foods and an opportunity to network with other small business [...]
              Showcase Hermosa        
    At Friends POV we got our introduction to event photography by photographing trade shows and their related networking events; whether it is a large party of several thousand or a more intimate venue such as a hotel suite party. Photos are a great way to memorialize your event and Friends POV knows how to take [...]
              Gta 4 Porn - Aubrey&amp;amp;Elijah passionate nylon duo        
    Gta 4 PornThis sultry lady in red was passionately tongue kissing her guy itching for hardcore nylon sex. Aubrey had the sex drive of a real whore, so soon she was hungrily gobbling on Elijah"s meat and balls. Then she switched to a sixty-nine mode to have the guy eat her soaking snatch too before she was ready to go for a ride. The horny dude fucked this stockinged nympho good and hard coating her back with cum in the end..View Gallery :: Brought to you by LoveNylons.com @ FerroNetworkCheck Official Reviews to learn more about FerroNetwork sitesRelated tags: gta 4 porn, huge tits nude pics, naked women on street, naked women on street, naked women on street, naked women on street
              Bi Bi Porn - GinaGerson&amp;amp;Rolf kinky pantyhose action        
    Bi Bi PornThis fair-haired babe looked very sexy in her white tank top and fancy design floral skirt, but Rolf couldn&#8217;t take his eyes off Gina Gerson&#8217;s slim legs covered by sleek glossy tights. The couple began kissing in the sitting-room, and soon the guy reached under the girl&#8217;s skirt and spotted an open gusset in her tights. Later they moved to the big leather sofa for some licking and dicking right through pantyhose..View Gallery :: Brought to you by PantyhoseTales.com @ FerroNetworkCheck Official Reviews to learn more about FerroNetwork sitesRelated tags: bi bi porn, sexy lingerie shop, facials porn tubes, facials porn tubes, facials porn tubes, facials porn tubes
              Stiletto Heel Boots - FeliciaC in hot pantyhose video        
    Stiletto Heel BootsKneeling on the huge brown divan in her black crotchless pantyhose and high heels only, Felicia C is playing with her big plastic cock. She gives it a good lick before getting ready to stuff it into her little puckered hole. The babe does it on all fours before spread-eagling on the sleek leather cushions and later sliding one of her hands under the tights to enjoy their silky soft feel..View Gallery :: Brought to you by ePantyhoseLand.com @ FerroNetworkCheck Official Reviews to learn more about FerroNetwork sitesRelated tags: stiletto heel boots, horny stocking clad women in high heels, mature nylon sex, videos of high heels drop from nylon stocking feet video, amateur latex stockings, seamed stocking milf
              Hot Sexy Asses In High Heels - Aubrey&amp;amp;Elijah stunning pantyhose couple        
    Hot Sexy Asses In High HeelsAubrey began shamelessly groping Elijah&#8217;s groin encouraging him to touch her down there as well. Since this wanton hottie was wearing silky smooth pantyhose, the guy soon got in the mood for more. He licked her pussy through the black crotchless tights and got a nice blowjob too before the chick straddled him right in her tights allowing him to lick and cream them in the end..View Gallery :: Brought to you by PantyhoseLine.com @ FerroNetworkCheck Official Reviews to learn more about FerroNetwork sitesRelated tags: hot sexy asses in high heels, free nude mature pantyhose vids, hot babes stockings gallery, wide leather belts, mature women high heels, latin milf legs high heels pornhub
              Keeping up with CONA        
    Image may contain: 5 people, people smiling, people sitting, hat, table and indoor

      We just got back from our annual convention with the Carriage Operators of North America. This years convention was held in San Antonio, Tx. The photo was taken on our riverboat ride and dinner. As you can see everyone is all smiles and having a great time! 
       
       CONA is an organization that supports the horse drawn carriage industry. The group keeps us up to date on marketing options, helpful tips, and lots of face to face networking with our peers allowing us to share information. Education is a major key to a top quality carriage operation and CONA members are dedicated to stay educated about this industry that we all love.

      Having been a member for a good number of years now we naturally have formed many friendships from other companies from all around the US. Its always so much fun to see our old friends and sometimes meet new ones too! We had a great time! and are looking forward to next years convention!

      

              Save Data Costs with Wifi-Only Game Downloads        
    Starting today, gamers are now able to queue games to be downloaded over wifi instead of downloading over operator network. This is great news for gamers with limited data plans and for those those who like to download large games. Using the feature is easy. Gamers specify the maximum file size to be downloaded over […]
              Playcredits are now Playpoints        
    We have renamed Playcredits to Playpoints and enhanced Playpoints functionality. The shift to Playpoints will make it even easier to track and use Playphone’s network virtual currency.  Playpoints are displayed in real currency, so it’s easy to know exactly what credits are available to purchase paid games and in-game items.  Other updates include: When Playpoints […]
              Jeff Johnson Underground Training Lab 2.0 Review        






    Underground Training Lab review


    Underground Training Lab 2.0 by Jeff Johnson is live. Jeff is launching again his successful coaching program where he teaches his students his own secrets as a super affiliate but he gives special attention to SEO and Traffic and how to convert traffic into leads and subsequently more money. Thousand have success by follow his proven method. A lot of satisfied customer that still in his coaching club since joined the 5 years back. Jeff only give proven methods that he really use to make million dollar online.




    This course its also about Affiliate Marketing, SEO, Product Creation, Social Network Marketing, Data Feeds, Static Sites, Blogs… you name it. Is all-in-One solution.


    Why Underground Training Lab 2?

    Underground Training Lab 2 is a membership coaching club available for a limited number of customers . It’s a 10 modules program and as i know that what you see is better than what you read , so if you want to check the modules of this Now, Let’s here from Satisfied Customer who joined the first edition of this program :






    David J said :


    “Hi Jeff, I just wanted to send you a quick email to let you know you have had a massive influence on the way I view marketing online. Your big picture thinking has enabled me to re-engineer my online presence… I have “gone wide” and am now working on the “go deep”. In fact, you have been directly responsible for increasing my monthly adsense revenue by $1,000+ a month… and it’s still growing. Your strategies have also increase affiliate revenue too. In short, of all the membership clubs I have even been a member of, yours is by far the best and most valuable. Well done and I look forward to being a member of your club for years to come.”

     






    Scott Spink said :

      “I just wanted to thank you again for the time you spent with me.  In those few short hours you showed me how to turn my site into a money making machine. 

    Using the tools you recommended and your easy to follow strategy, the income from my site has jumped to over $3000.00 a month in just over 30 days…and is still climbing.”


    Joseph Chmielewski said :


    “Amazing product!

    I created a Blog this afternoon, and within three hours the site was indexed by Google.

    And this was without content or a single Blog post.

    Without a doubt, everyone should get this product. “

    Yes, let me join the Underground now!


    Underground Training Lab 2.0 Plus has everything you need to start earning money online from the first week of applying the techniques taught inside.

    I would like to emphasis on this:: "Underground Training Lab 2.0 Plus is by far the BEST product in it’s class I’ve seen so far this entire year.."


    And then it takes real money online and you pay all those things you've been dreaming for so long ... you will remember this day, the day he decided to stop allowing others to dictate your life and start making their own future.

    Imagine a life where they have to get up at seven in the morning to go to work and earn money for someone else.


    Imagine a life financial independent, you can work where and whenever you want. Spend lovely time with you love one, travel all around the world, enjoy nice , drive your dream car and stay at your dream home.




    It’s an entire Traffic-Getting System designed to help you get more traffic, generate more leads and convert that traffic into money.




    Yes, let me join the Underground now!





              Re: Avatars [by Winterhawk]        
    HeroMorph site questions & Suggestions:: Avatars
    A couple of ways to get there.

    First method.
    Method one. From the home page click view account on the user menu one the second column. Then click the avatar link on the new page, located near the top in the middle.

    Second method.
    On the main menu click the HM network link. Then the My photo’s sublink. Upload an image to your HM network page you want as your avatar. Once uploaded click the icon that looks like a “head and shoulders in a frame” this will set the image as your own custom avatar. Remember when if using this method, to make the images avatar size as well as not too big in file size. If the picture is too big either dimensions or file size it just will not work. As well adult images are not allowed as avatars.
              Re: Lady Heromorph Social Networks [by Machobubba]        
    HeroMorph site questions & Suggestions::[Announcement - please read] Lady Heromorph Social Networks
    What is google+
              Re: Avatars??? [by OCP]        
    HeroMorph site questions & Suggestions:: Avatars???
    Quote:

    Bongop wrote:
    No I can?t... I don?t have 100 posts... :|


    Read Hawk's reply below about the HM Network, Bongop.
              How to Make Money Online Through Internet Marketing        
    By Brian Kos

    Internet Marketing is one of the tools made by many websites today to keep their websites keep a steady traffic. The income they make through successful marketing of their products and services rely so much on how much their websites are being visited. To make this possible, they employ various methods to advertise all over the web.

    Of course, they have to use the widest tools to reach the most markets that they could advertise at, and they could not do it alone. They have to hire people to do the legwork for them. This is where affiliate marketing enters the picture.

    Affiliate marketing works like task networking. Websites hire people who will post their banners and links for visitors to see. When visitors click this certain banner, they will be redirected to the advertisement site and the advertiser gets paid for that single click. This makes the advertiser and affiliate. Any web owner or blog owner can be an affiliate as long as the site has steady visitor statistics. Therefore, if you are in that league, you can definitely apply as an affiliate. This could make you earn by benefiting from the clicks that is made on your site.

    If you are really intent on making money, all you have to do is keep your site traffic forthcoming, so as to earn more potential clicks. There are various tutorials to make the most out of Internet Marketing all around the net. These tutorials could help you enhance your Internet Marketing strategies and polish your own product's or services' marketing.



              Congratulations to #VMTN Community Warrior: @jfrappier        

    Submit a nomination for the next VMTN Community Warrior. In 2017, this program will be recognizing and rewarding 25 users who commit time and energy to engaging in community discussions and capturing the values of VMware Technology Network. Learn more. Congratulations, and welcome to the VMTN Community Warrior Hall of Fame @Jfrappier.  It is an honor to […]

    The post Congratulations to #VMTN Community Warrior: @jfrappier appeared first on VMTN Blog.


              VMworld: 8 VMTN Community Opportunities You Don’t Want to Miss        

    VMware Technology Network is fueled by customers, partners, and employees like you, who take the time to read and contribute information to our VMware ecosystem. Under the VMTN umbrella, all of community is captured – from bloggers, to vExperts, to developers in {code}, to CloudCred leaders. To recognize VMTN Community contributors, there are going to […]

    The post VMworld: 8 VMTN Community Opportunities You Don’t Want to Miss appeared first on VMTN Blog.


              Congratulations to #VMTN Community Warrior: @rajeevsrikant        

     Submit a nomination for the next VMTN Community Warrior. In 2017, this program will be recognizing and rewarding 25 users who commit time and energy to engaging in community discussions and capturing the values of VMware Technology Network. Learn more. I’m happy to announce, and extend my congratulations to VMTN’s new Community Warrior @rajeevsrikant. Welcome […]

    The post Congratulations to #VMTN Community Warrior: @rajeevsrikant appeared first on VMTN Blog.


              Discover VMTN: 3 Remarkable Reasons to Come to Communities for Support        

    Blog 3 – series predecessors: VMTN Global Forums, 7 Ways to Gain Points VMware Technology Network is a communities’ platform comprised of 3.2 million members and only three, as of today, can boast that they host this badge on their profile. What makes these 3 users remarkable? They are a part of VMware’s Global Services […]

    The post Discover VMTN: 3 Remarkable Reasons to Come to Communities for Support appeared first on VMTN Blog.


              Call for Content: VMworld #vBrownBag Tech Talks – A VMware Technology Network Member        

    vBrownBag and VMware Technology Network have partnered to make the 2017 community Tech Talk experience at VMworld US and Europe exceptional. The call for content for Tech Talks is officially open! Submit by JUNE 30TH for a chance to present: https://docs.google.com/forms/d/e/1FAIpQLSdtpMS5ychaZN__1eY7rJh6eOHKfgIGSCbzDgYVVJojGo9DQ/viewform Wait, what? Good question Captain Jean Luc Picard. Let’s answer that, plus a few […]

    The post Call for Content: VMworld #vBrownBag Tech Talks – A VMware Technology Network Member appeared first on VMTN Blog.


              News Corp Dumps MySpace For $35 Million        
    When you buy something for $580 million, the goal is not to part with it for $35 million a few years later. Yet that’s exactly what News Corp has done, ending its 6-year ownership of the sputtering social networking site by selling it for scrap. Don’t feel bad for News Corp, which made its money back when it struck an …
              Just In Case You Haven't Seen It Yet.        

              Piers Morgan seeks apology over phone hacking claim        
    Former British tabloid editor Piers Morgan has demanded an apology from a lawmaker who made claims about him admitting to phone hacking, at the London hearing which quizzed Rupert Murdoch. In an angry on-air exchange, Morgan, who is now a celebrity interviewer for US television news network CNN, cha...
              Links from Hanselminutes 349        
    As if I had nothing better to do (I'm supposed to be cleaning the bathroom), I collected a bunch of links whilst listening to the Hanselminutes podcast episode 349. This show was one of the Hanselminutia episodes where Scott chats with Richard Campbell. They were talking about a lot of home automation stuff that's interesting to me so I gathered links to follow up on later (after the bathroom is clean, of course).

              SynchronEX        
    SynchronEX - Advanced File Synchronizer Software
    "SynchronEX enables robust multi-directional file tree synchronization and backup over local & network paths in any situation: From laptop synchronization to scheduled periodic backup to incremental website upload."

              Data Must Fall        
    5FM — South African's are upset about the high costs of data. Following #DataMustMall, Nick chats to Indra de Lanerolle (Television and mobile media at Wits Journalism and lead researcher on the South African Network Society Survey) and Reshaad Sha (Executive Director and Chief Strategy officer at Dark Fibre Africa) about what needs to happen in order for costs to come down
              Sean Moodley (Anti Racism Network South Africa)        
    5FM — The Anti-Racism Network of South Africa (ARNSA) is an alliance of organisations working to respond to racism in South Africa. The Nelson Mandela Foundation and the Ahmed Kathrada Foundation facilitated the formation of ARNSA and currently serve as the secretariat. #TakeOnRacism
              Comment on Mikrotik L2TP with IPsec for mobile clients by David        
    Great work! work for me in win7 & samsung S7 at first try :-) just 1 question (problem) in the mikrotik I have 4 differant network 10.0.0.0/24 10.0.1.0/24 10.0.2.0 /24 10.0.3.0/24 when I connect I can only go to 10.0.2.0 /24 any reason for it? what do I need to add? (when I connect to the mikrotik by cable I get access to all networks....) Thanks ,
              blackdating1.com-Black Singles Network        
    Join now free membership to black online dating site. Black singles can meet and communicate worldwide. BlackDating1.com features include instant messaging, video, audio, 1000's of photos including text messaging.
              April 2015 Daring Bakers' Challenge - Focaccia         
    Focaccia
     photo 06_zpsz4e1yaww.jpg
     photo 01_zpslqdfjxyl.jpg

    I love making focaccia – I make it twice (sometimes thrice) a week. So this challenge was a breeze since I had two doughs ready in the refrigerator when the challenge was announced.

    See the challenge PDF here

    A big thank you to Rachael of pizzarossa and Sawsan of Chef in Disguise for hosting this month's challenge.

    A most enjoyable challenge and I stunned at the sheer variety of focaccias made by the other Daring Bakers', the spelt flour focaccia was of note.

    My focaccia recipe uses mashed potato which produces a wondrously soft chewy tender (almost cake-like) moist open crumb with a crisp thin crust and increases the shelf life of the bread. Basically you replace ½ cup of water with ½ cup of mashed potato which produces a softer than normal dough that is slightly tacky which encourages the formation of large holes in the crumb of the bread. Also I like to cold-ferment my dough. That is use ice-cold mashed potato and ice-cold water and rise the dough in the refrigerator (overnight or up to five days) which really produces a very flavoursome bread. Using mashed potato captures a lot of moisture so allows for a higher temperature and longer bake time so the crust can develop a deep brown colour and flavour.  I like to really brown (in a very hot 260°C/500°F/gas mark 11 oven) my focaccia since ¾ of the taste of bread comes from the crust. I usually stuff my focaccia with olives, salami sticks and semi-dried tomatoes (or roasted capsicums) and then cut and slice them so I can use them as pizza bases. 

    Cold-Ferment Potato Focaccia
    Using mashed potato and the cold-ferment method produces a thin crisp crust with a crumb (interior) that is soft, tender, moist and airy with large open holes. The slow cold fermentation process gives maximum flavour to the bread and it's still great to eat the next day. The high hydration dough allows a thin crisp deeply coloured and flavoured crust to develop without the bread drying out.

    Notes:
    1. The dough is about 90% hydration it is soft, pliable and elastic and slowly flows into the shape of the pizza pan which ensures that the focaccia is level when baked. The dough when cold-fermented has the consistency of "warm melted mozzarella cheese". Every day in the fridge the dough will improve its internal structure (up to five days) to produce a silky smooth well-hydrated gluten network.  
    2. Resist the temptation to add more flour, the dough should be soft, tacky and loose these characteristics create a crisp crust with an open crumb. The high water content (hydration) of the dough produces a lot of steam when baking so creating a thin crisp crust and large holes within the crumb (interior) of the baked bread.
    3. Using milk increases the colour of the crust when baked.
    4. Cold-fermentation creates the maximum amount of flavour compounds in the dough. 
    5. If using rosemary coat it lightly in oil so it will not burn in the very hot oven.
    6. Gentle handling of the dough is essential when spreading out the dough in the final rise.
    7. If you find your bread is doming too much you can gentle pat (using a clean tea towel) it level ½ way through the baking time.   
    8. Preheat your oven to maximum for an hour, so the initial blast of heat will really give a huge "oven spring" to the focaccia dough. The baked focaccia should have a thin crisp crust with an airy crumb with large holes.
    9. Using mashed potato gives the focaccia an extra soft tender crumb and extends its shelf life since the potato "locks" in the water so delays the bread going stale.
    10. You can use instant mash potato powder, just make up the required amount then add that to the flour mixture do not add the powder to the flour it will lump-up and these lumps will never go away so you will have to start again.
    11. Use the water that the potatoes were cooked in for the water in this recipe to add extra tenderness to the crumb. I usually freeze the water I cook the potatoes in and use that for all my bread doughs it adds a nice touch of tenderness to the crumb. Also yeast just loves potato water it seems to give the yeast beasties extra lifting power. 
    12. Use the best quality extra virgin olive oil you can afford, it will really add a gourmet taste to your final focaccia.
    13. It is important to add a good amount of olive oil to the baking pan before adding the dough for the final rise. The oil soaks into the dough and during the bake it creates a super tasty "fried" base for the focaccia.
    14. Focaccia is a wonderful treat to bring to BBQs, pot-lucks, parties etc. Since you can make the focaccia look authentically rustic or exquisitely elegant by the decorative placement of the toppings into and on the bread.   

    Ingredients:
    For the dough
    3 cups (750 ml) (450 gm) "OO" bread flour or all-purpose (plain) flour, firmly-packed
    ¾ cups (300 ml) ice-cold water (or milk), might need a few tablespoons extra
    ½ cup (120 ml) ice-cold mashed potato, make sure the mash is very smooth
    ¼ cup (60 ml) best quality extra virgin olive oil
    2 teaspoons rock crystal (Kosher) salt
    1 teaspoon dried yeast (½ satchel of yeast) for overnight cold-ferment OR ½ teaspoon dried yeast (¼ satchel of yeast) for three day cold-ferment OR ¼ teaspoon dried yeast (1/8 satchel of yeast) for five day cold-ferment
    ¼ cup (60 ml) best quality extra virgin olive oil, for the baking pan
    Toppings for the stuffed focaccia
    500 gm jar (2 cups) pitted olives, stuffed with pimento or anchovies or chilli/garlic or a combination, or marinated artichokes or marinated feta cheese or similar antipasto
    200 grams (7 oz) salami sticks or spicy cooked-sausage, chopped to the same size as the olives
    Optional 2 large red capsicums (red bell peppers) blackened under the grill (broiler), skins removed, chopped to the same size as the olives
    3 tablespoons (45 ml) best quality extra virgin olive oil, for the dimples
    Toppings for the rosemary and sea salt focaccia
    3 stems of rosemary, washed, dried, whole sprigs removed and lightly-oiled
    2 teaspoons sea salt crystals, try to have some large and small crystals
    3 tablespoons best (45 ml) quality extra virgin olive oil, for the dimples

    Method:
    Making the cold-ferment focaccia
    1. Whisk the flour & dried yeast in a medium bowl. Add the salt whisk until mixed.
    2. Add the ¾ cups ice-cold water (or milk), ½ cup ice-cold mashed potato and the ¼ cup of olive oil.
    3. Mix with a plastic scrapper or wooden spoon until just combined about a minute, it will look like a shaggy blob of just-mixed flour and water with lumps, just make sure all of the flour is moistened with the liquid. Don't worry the cold ferment process will "knead" the dough for you.
    4. Cover the dough and bowl with a thin layer of oil or oil-spray. The dough should be like a shaggy mess. It will be sticky and tacky but over the cold-ferment it will become a smooth elastic soft dough. 
    5. Cover the bowl in plastic wrap.
    6. Place the bowl in the refrigerator's coldest spot overnight or up to five days max.
    7. The dough will hydrate and knead itself to a soft elastic slow-flowing dough (like "warm melted mozzarella cheese") during its time in the refrigerator. The dough's structure will get better each day (up to five day max) during this process. Add a couple of tablespoons of cold water if the dough isn't soft enough.
    8. Everyday; turn, stir and fold the dough over itself using a scrapper or wooden spoon about 30-60 secs. Re-spray the dough with oil-spray and re-cover the bowl with plastic wrap. Place back into the refrigerator.
    9. If making the overnight version; turn, stir and fold the dough over itself, after a few hours of refrigeration to ensure max gluten formation. This step is not necessary if making a multi-day cold-ferment dough.  

    Baking the focaccia
    1. Preheat oven to maximum or to very hot 260°C/500°F/gas mark 11 for one hour. Modern ovens can behave erratically at very high temperatures so go as hot as your oven can handle to establish an even stable temperature most likely 240°C/465°F/gas mark 9.
    2. You can use one large deep pan or two medium pans. On the day you wish to make your focaccia take out the bowl from the refrigerator. Cover your baking pan(s) with the ¼ cup of olive oil (the oil layer should be at least 3 mm (1/10 inch), a little more is even better) & gently “pour” (without deflating too much) the dough into your pan(s). Gently level the dough in the pan(s) using your finger tips in slow careful movements. If the dough resists let it rest a few minutes and continue levelling until completed. 
    3. Firmly poke the stuffed olives, salami (or cooked-sausage) into the dough in a decorative pattern. As an option you can poke the capsicum (red bell pepper) pieces into the pattern as well. (If making the rosemary/sea salt version firmly poke the lightly-oiled rosemary sprigs into the dough in a decorative pattern try to make the sprigs look like open-flowers). Cover with oil-sprayed plastic wrap.   
    4. Let rise in a warm draft-free place until doubled (about one to two hours could be longer) in volume. The risen dough should almost cover the olives and salami pieces (or rosemary sprigs) just leaving a dimple of olive or salami (or rosemary) showing. You can poke down the olives and salami pieces (and the optional capsicum pieces) (or rosemary sprigs) if they are poking out of the dough too much. If you wish you can dimple the dough between the olives and salami (or rosemary sprigs).
    5. Drizzle 3 tablespoons of olive oil over the focaccia. (Then sprinkle the sea salt crystals over the focaccia if making the rosemary version) 
    6. Bake in a preheated very hot oven for 35-40 mins for the large focaccia and about 20-25 mins for the two medium focaccia, rotate the pans half way, and cover with foil if over-browning (or reduce oven temperature 20°C/40°F half-way through bake). If baking this recipe for the first time watch carefully since very hot ovens can behave erratically check how the focaccias are baking half-way through and adjust temperature or cover with foil. The crust should be well-browned almost blackened in a couple of small places and the sides of focaccia will have shrunk away from the pan. The base should sound hollow when tapped. Using a high hydration dough allows for a crisp deeply coloured crust to develop with a fully developed taste and a moist chewy open crumb interior.

    Stuffed Focaccia with olive and spicy salami sticks
    I usually make pizza with my stuffed focaccia. I slice the focaccia into two pizza bases then top with fried tomato paste, well-fried onions, blue cheese, some sun-dried tomatoes and extra spicy sausage and bake in a moderate oven for 15 minutes. The cooked pizza stays crisp the next day if wrapped in foil and plastic wrap and stored in the fridge.
     photo 01_zpslqdfjxyl.jpg
     photo 02_zpsou6hopur.jpg
     photo 11_zpswuo4pimq.jpg
     photo 03_zpsawsvhiir.jpg

    Rosemary and sea salt focaccia I love the look of this rustic looking bread. I always try to use whole sprigs of rosemary and poke them into the dough to look like open-flowers which really adds to the to the appearance of the final bread. Remember to oil the rosemary so it doesn't burn in the very hot oven. I will be bringing this to the Royal Easter Show tomorrow we are having a picnic there.
     photo 06_zpsz4e1yaww.jpg
     photo 13_zpsr5n8i8jq.jpg
     photo 05_zpsqgnxvb8s.jpg
     photo 04_zpsliqezb9u.jpg
     photo 12_zpsygcjlpcr.jpg
     photo 07_zpsbyxt9c0j.jpg
     photo 10_zpsmcuvmgcp.jpg
     photo 15_zpsgvttzmax.jpg
              January, 2012 Daring Baker Challenge: Back to Basics:Scones (Biscuits)        
    Introduction:  Hi my name is Audax from Audax Artifex (yes this web site). Whenever I visit my sister and her family in S.E. Queensland Australia she always welcomes me with a fresh batch of my favourite baked treat which we devour gleefully with cups of tea while we chat and catch up with the events in our lives.

    Photobucket
    Photobucket

    The treat that I'm talking about is the basic scone (also know as baking powder biscuits in North America) my sister really knows how to make them, they are wondrously light with soft sides and a lovely airy crumb – superb with jam and cream. This month I want the Daring Bakers' to share my delight and I invite you to bake a batch of scones to enjoy with friends and family.

    For our North American members I wish to clarify what this challenge is all about and try to avoid any confusions. Scones in North American are nearly always triangular in shape have a slightly crisp crust usually covered in sugar and have a soft interior crumb and sometimes are laced with dried fruit (these baked goods in Australia and England are called “rock cakes” since they are usually made to look like “rocky” cakes not wedges), meanwhile biscuits in North American are a round shaped buttery slightly flaky baked good usually eaten with meals (these items in Australia and England are called “scones” and are eaten with butter and jam usually with cups of tea or coffee as a sweet snack). So this challenge (using the North American name) is to make biscuits. Or using the Australian or English name this challenge is to make scones.

    To further clarify for our North American bakers this month's challenge is to make biscuits (also called baking powder biscuits) if you choose to make your biscuits using buttermilk as the liquid you are making what are known as “Southern” Biscuits which are one of the most famous examples of home cooking in the Southern States of America (that is they are a baking powder biscuit made with buttermilk). In Australia and England “Southern” Biscuits would be called buttermilk scones. So restating the above, the challenge is to make scones (using the Australian/English name) or to make  biscuits (using the North American name). Incidentally if you use cream as your liquid in the challenge recipe the final baked good would be called a cream biscuit in North America or a cream scone in Australia and England.  

    Scones (biscuits) contain only a small number of ingredients they are fast to make, quick to bake, only cost cents per batch and most importantly are super FUN to eat. In England and Australia scones are eaten with jam and butter usually with cups of tea or coffee mostly as a sweet snack, while in North America they are usually eaten with meals as a savoury side.

    Photobucket

    Of course scones (biscuits) have a notorious reputation as being difficult for some people to make  comments like “hockey pucks”, “These made great door-stops ” and the like fill the comment sections of most recipe websites. You see scones (can be said as a rhyme with cone and also can be said as a rhyme with gone) are a type of quick bread that is a white flour dough that is raised using chemical agents usually baking powder and/or baking soda. Basic scones contain flour, raising agent(s), butter (or shortening or lard), salt, and milk (or buttermilk or soured milk or cream). Most recipes just say to “rub the fat into the flour” then combine the dry and wet ingredients until “gathered together” and then “lightly knead” the gathered mixture until a soft dough forms, then “roll or pat” out this dough and then “cut” out rounds and bake them in a hot oven. Well how hard could it really be I thought uh-mm as you can see below my first batch wasn't the greatest success … they didn't raise at all and the texture was barely OK I thought … I was left wondered what I had done wrong …   

    My first attempt at scones (really pretty terrible I thought, no height no tenderness and no flakiness)

    Photobucket

    So after studying many many (288 websites bookmarked) scone/biscuit recipes and the bakers' comments about these recipes and after doing 16 batches! myself I have acquired a lot of information to help you master the techniques involved I hope that at the end of this challenge that you will be able to make a good if not great scone (biscuit).

    After much research and many attempts …  finally some scones (the 14th, 15th and 16th batches) that I wouldn't mind sharing with my sister.

    The Classic Australian scone ring (Aussie Damper) – the crumb is very similar to bread
    Photobucket

    Cheese and chives scones – a “sky-high” light and tender scone flavoured with cheese and chives
    Photobucket
    Photobucket
    Photobucket

    The classic Southern Biscuit (buttermilk scone) – a superbly flaky scone made with buttermilk and laminated to form distinct layers when baked
    Photobucket

    Fairy Ring
    As I mentioned in the challenge posting in Australia and England scones are usually eaten as a sweet treat (with butter and jam) with cups of tea on that theme while doing my research for this challenge I thought I would do a variation on the sweet side of the scone. Here is one recipe that is suitable for kids and adults when you want something special and sweet yet can be made at a moment's notice.

    In Australia one of the most popular children's party food item is fairy bread. This is a variation of fairy bread called Fairy Ring made with an Aussie Scone (Damper) ring laced with 100s and 1000s then iced (with some icing sugar and a touch of lemon juice made into a sticky paste) then sprinkled with more 100s and 1000s (coloured sprinkles). My 9 year old niece went crazy with delight and literally squealed with glee when I showed her this Fairy Ring and say I made it especially for her.

    Normal (Damper) Scone Ring
    Photobucket

    Fairy Ring straight from the oven
    Photobucket

    Completed Fairy Ring
    Photobucket
    Photobucket

    Hot Dog Buns
    Here is a savoury variation, I made hot dog buns using the basic scone recipe. They worked out great I couldn't believe the crumb and they tasted great with the hot dog and relishes and I made them in under 15 minutes (once the oven was hot enough). I was very surprised how well the basic scone dough complimented savoury food.  
    Photobucket
    Photobucket
    Photobucket

    Touch of Grace Scones
    (Click on the title to go to a great posting about this recipe)
    Here is the answer to dry biscuits this recipe is called "touch of grace" biscuits which uses a few simple techniques to create a super moist crumb. These scones are all about tenderness everything is designed to obtain the softest and most tender crumb possible. These are very different from the normal bread-like scones that Australians like with jam and cream. These would be perfect with a savoury meal. They were so buttery with a soft creamy crumb that literally melts in your mouth, the mouth feel is like clouds. As one reviewer lovingly opined "They're squat little puffs you'll want to grab, steaming, from a basket passed over fried chicken or bacon and eggs". The way I make them is slightly adapted from the original recipe,  I use a lot of very large pieces of butter and all buttermilk with very low gluten cake flour and some resting time in the fridge. Resting the dough after the buttermilk is stirred into the dry ingredients is essential you would never be able to form the soft balls of dough coated in flour that are the "rounds" in this case and keeping everything cold helps the baking process. While baking the large pieces of butter melt into the flour causing large air holes to form in the baked dough and since we use soft flour (6%) which cannot form flaky layers we thus obtain a feather-light creamy tender crumb infused with the maximum amount of butter that the dough can hold.
    Photobucket
    Photobucket
    Photobucket
    These scones are made entirely from cake flour (6% gluten), I used 1 cup of flour, 2 teaspoons baking powder, 1/2 teaspoon baking soda, 1/4 cup very large-sized butter pieces, about 1/2 cup buttermilk and 1/2 teaspoon sea salt. I rubbed in butter making sure most of the fat/flour where large pea sized pieces. I rested the dough after I mixed in the wet ingredients for 10 minutes until cold, during this time the dough "firms" up making it possible to turn it out in one cohesive dough ball onto a lightly floured board. I formed a rectangle of the soft dough floured the top lightly then I stamped out rounds. You could feel the pieces of butter in the formed round The rounds are very soft but can be picked up and placed into the baking dish. Then I place the baking dish with all the formed rounds back in the fridge for 10 minutes until cold then bake. (This procedure is much easier than the original recipe's method and it gives as good results I think). As you can see the crumb is saturated with butter and has masses of large airy pockets to trap your favourite topping. Absolutely delicious.
    Photobucket
    Photobucket
    Photobucket
    Photobucket

    Raisin Scones
    Photobucket
    Photobucket
    I wanted to make one batch of flavoured scones I went with sweet raisins and some molasses in the dough. I rubbed in the butter until it was like fine sand and I used "OO" cake flour about 7% protein and some cornflour (cornstarch), I was very happy with the look of the baked scones and the crumb was very tender very much like bread which is what I wanted. These were very cute looking but to be honest I like plain scones much better.
    Photobucket
    The bread like crumb of the scone so so tasty and soft.
    Photobucket

    As you can see scones (biscuits) are all about technique since the scones pictured above used the same basic recipe. 

    Recipe Source:  The challenge scone (biscuit) recipe has been especially formulated by Audax Artifex after a large amount of research and experimentation. It is designed to help you master the techniques involved in making scones (biscuits) exactly the way you like them. 

    Blog-checking lines: Audax Artifex was our January 2012 Daring Bakers’ host. Aud worked tirelessly to master light and fluffy scones (a/k/a biscuits) to help us create delicious and perfect batches in our own kitchens!

    Posting Date:  January 27, 2012

    Challenge Notes:
    The Ingredients – since scones contain only a small number of ingredients each should be of the highest quality
    Flour – lower gluten (i.e. soft) flours (about 9% or less protein) produce taller and lighter scones than normal plain (all-purpose) flour (about 10%+ protein). But to be honest it wasn't that great a difference so long you sifted the dry ingredients thoroughly at least three times. That is always triple sift the dry ingredients this will ensure that the flour is well aerated and the raising agents are evenly distributed so resulting in light scones. I found that finely milled soft “OO” flour gave the best results but don't worry you can get excellent results with sifted plain (all-purpose) flour. You can use self-raising flour if you wish (remember to leave out the raising agents and salt) in the recipe below it is important to triple sift the self-raising flour as well I like to add about ½ teaspoon of extra fresh baking powder per cup of self-raising flour to ensure a good lift in my scones. In the northern states of America and most of Canada all-purpose flour is generally very hard (high in protein) you can replace for each cup 4 tablespoons of all-purpose flour with cake flour  OR for each cup replace 2 tablespoons of all-purpose flour with cornflour (cornstarch). Or you can let the scones rest (20 mins) in the fridge before baking. 
    Fat – unsalted butter gives the best flavour while lard gives the flakiest texture since it has a much higher melting point than butter so promoting a flaky texture in the final scones. The best compromise is to use a combination of the two in equal measure. I usually use all (unsalted) butter for flavour and health reasons. In most recipes the fat is rubbed into the flour using fingers or a pastry cutter (don't use two knives or forks since it takes too long to cut in the fat using this method). It is best to grate the butter using the coarse side of a box-grater and then freeze it until you need it. Freezing the butter prevents the fat from melting into the flour. The idea is to coat the fat particles with the flour. You are looking for a fat/flour combination that looks like very coarse bread crumbs with a few pieces of butter about the size of peas, the finer you make your fat pieces the more tender the crumb of your final scones. If you want very flaky scones then make the fat pieces large like Lima beans and only lightly coat them in the flour. If your kitchen is very hot you can refrigerate your flour so helping to keep the fat from melting. Don't freeze your flour as this will make it too difficult to rub the fat into the flour. (Typical usage about 1 to 8 tablespoons of fat per cup of flour).
    Chemical raising agents – always use fresh raising agents, baking powder deteriorates within two months once the jar is opened, typical usage 1 to 2 teaspoons per cup. Baking powder nowadays is double action – there is an initial release of gas once the dry and wet ingredients are combined and there is another release of gas from the high heat of the oven. If you are using acidic ingredients (such as buttermilk, soured milk, honey, citrus juice, yoghurt, tomato sauce etc) then use an additional ¼ teaspoon of baking soda per cup of liquid to help neutralise the acid and make the final baked product raise correctly. Baking soda is much stronger (x4) in raising power than baking powder. You can make you own single action baking powder by triple sifting together one part baking soda and two parts cream of tartar store in an airtight container. To check if your double action baking powder is fresh place 1/4 teaspoon in 1/2 cup of water it should bubble a lot, then microwave it for 30 secs it should bubble it again. To check your baking soda place 1/8 teaspoon into 1 tablespoon of vinegar (or lemon juice) it should bubble a lot. 
    Liquid – you can use milk (any sort), buttermilk, soured milk, yoghurt, half-and-half, cream, coconut cream, soda water, even lemon-flavoured soda pop (soft drink) or a combination of these as the liquid in your scones. You can sour regular milk with a tablespoon of cider vinegar or lemon juice for every cup. Just stir it in and let it sit for 10 minutes or so to curdle. Typical usage is 1/3 to 1/2 cup of liquid per cup of flour.
    Salt – a small amount of salt (about ¼ teaspoon per cup of flour)  helps improve the action of the raising agents and enhances the flavour of the scones.

    The Equipment
    Baking pans – use dark coloured heavy weight baking pans as these have the best heat distribution and really give a great raise to your baked goods. Many people like to use cast iron skillets for best results.
    Measuring cups and spoons – try to accurately measure all ingredients especially if this is your first attempt at making scones (biscuits) remember to scoop the ingredient into the measure and level with a knife. If you can weigh the flour using scales even better.
    Scone (biscuit) cutters – use a cutter that is made of sharp thin metal with straight sides and is open at both ends this ensures that the scone will raise straight and evenly and ensures the cut scone is easy to remove from the cutter without compressing the dough. Try to avoid using cutters with wavy sides, thick walled cups, glasses, metal lids, small jars or any cutter with only one opening since it is difficult to remove the cut scones from these without compressing the dough therefore leading to 'tougher' scones. If you cannot get a good cutter you can cut out squares or wedges etc using a sharp knife if you wish.
    Rolling pins – most scone doughs are very soft (and wet) so can be easily patted out using your fingers. For a large amount of dough you can use a rolling pin remember to use light pressure from the centre outwards to form an even thickness of dough ready to be cut into scones. Avoid rolling back and forth over the same area as this can overwork the dough.    

    The Techniques
    Triple sift the dry ingredients – sift your dry ingredients from a height this permits plenty of air to be incorporated into the mixture which allows for maximum lightness in your scones and ensures even distribution of all the raising agents and other ingredients.
    Rubbing in the fat – this is the stage where you can control how tender or flaky your final scone crumb will be. The more you coat your fat with flour and the smaller the particles of the final mixture, the more tender the end product because you’re retarding gluten formation in the flour (unfortunately the price you pay for this tenderness is that the final dough will be soft and might not raise very well since the gluten isn't developed enough to form a stable structure to trap the gases that are released when the dough is baked). Conversely the larger you leave the pieces of fat (the infamous "pea-sized" direction you always see in scone/biscuit recipes), the flakier the final scones will be (that is the gluten in this case is more developed but you might find that the final baked product is dry and the mouth feel of crumb could be too firm i.e. tough). So summarising the tenderness/flakiness of your scone is achieved in this stage by manipulating the size of the fat particles and how much of the flour is used to coat the fat (the more flour used to coat the fat promotes more tenderness while larger fat pieces promote more flakiness).  Either way quickly rub in the grated frozen fat into the dry ingredients using
    1)your finger tips – as you lightly rub and pinch the fat into the flour, lift it up high and let it fall back down into the bowl, this means that air is being incorporated all the time, and air is what makes scones light, continue this until you have the desired sized flour/fat particles in the mixture, or
    2)a cold pastry cutter – begin by rocking the pastry cutter into the fat and flour mixture continue rocking until all the fat is coated in flour and the desired sized flour/fat particles are obtained.
    Moistening and bringing the dough together -  add nearly all of the liquid at once to the rubbed-in dry ingredients.  When mixing the dough (I use a soft plastic spatula, my sister uses a knife), stir with some vigour from the bottom to the top and mix just until the dough is well-moistened and begins to just come together it will be wet (and sticky). And remember the old saying – the wetter the dough the lighter the scones (biscuits)!  
    Handling the dough – as most people know it is important not to overwork the dough but what isn't appreciated is that under-working is almost as common a mistake as overworking. Look at my first attempt (the first photo in this article) at making the challenge recipe it is crumbly and a bit leaden and the crumb isn't flaky at all this is due to under-working the dough and making the flour/fat particles too small, it took me about six batches to understand this and not be afraid to handle the dough so the scone (biscuit) would raise correctly. Under-working causes as many problems as overworking. Overworking leads to tough, dry and heavy scones while under-working leads to crumbly leaden ones. If you are not happy with your baked goods look carefully at your final scones (biscuits) and decide if you have under- or over-worked your dough.
    Kneading or folding/turning the dough – this is the stage where you can control whether or not your scone has distinct layers by 1) only kneading the dough (for no layering effect) or 2) only turning and folding the dough (for a layering effect).  As mentioned above given the same amounts of flour and fat, leaving larger pieces of fat equals more gluten formation and, therefore, flakiness. Leaving smaller pieces of fat equals less gluten formation and, therefore, tenderness. Your dough at this stage of the recipe will be a mixture of different gluten strengths since it is almost impossible to make a totally homogeneous dough at home. The major idea at this stage of the process is to exploit these gluten differences to achieve a desired degree of lamination (layering) in the final baked good. That is at this stage your dough (after you have added the liquid and mixed it until it just holds together), will have different layers of relatively gluten-rich (tougher) dough (the more floury parts of the dough), and layers of relatively gluten-free (tender-er) dough with small pieces of fat (the more fatty parts of the dough). So at this point if we only lightly knead the dough these layers will become less distinct which means the dough will become more homogeneous so producing a more even and more tender crumb when baked. But if at this stage you only fold and turn the dough (as shown below in pictures) over itself, these different layers will remain intact but will get thinner and thinner with each fold and turn, so when the fat melts and the liquid turns to steam in the oven, this steam pushes the tougher layers apart, leading to an overall flakiness and a layering effect in the scone crumb (see picture of the buttermilk biscuit above). So if you want an even more tender crumb just lightly knead (much like you would knead bread but with a very very light touch) the turned-out dough a few times until it looks smooth. If you want to form layers (laminations) in your final baked goods do a few folds and turns until it looks smooth. Always do at least one light knead to make the final dough structurally strong enough to raise and hold its shape whether you are aiming for a smooth tender crumb or a flaky layered crumb.
    Pat or roll out the dough – since most scone (biscuit) doughs are soft (and sticky) it is best to use your fingers to gently pat out the dough once it has been kneaded or folded and turned. Use a very light touch with little pressure while forming the dough rectangle to be cut into rounds for the scones. If you want tall scones then pat out the dough tall, about 3/4 inch to 1 inch (2 cm to 2½ cm) thick is about right.
    Cutting out your scones – use a well-floured scone (biscuit) cutter for each round that you stamp out from the dough. That is dip your cleaned cutter into fresh plain flour before each separate cut. Do not twist the cutter while stamping out the scone, push down firmly until you can feel the board then lift the cutter the round should stay inside the cutter then gently remove it from the cutter  and place the round onto the baking dish. You can use a sharp knife to cut out other shapes if you wish from the dough, also the knife should be floured before each cut as well. 
    Baking your scones – always preheat your oven when baking scones. Place each scone almost touching onto the baking dish this encourages the scones to raise and also keeps the sides soft and moist. If you want crisp sides widely space your scones on the baking dish. Don’t over-bake your scones. Over-baking for even a minute or two will dry your scones out. As soon as the sides begin to turn brown and are set, remove them from the oven. Immediately, place the scones on a wire rack—the hot pan will continue to dry the scones.
    Extra comments about resting the dough – I found in my researches that a number of respected sources mentioned resting the dough in various stages in the recipe. Surprisingly this advice is sound. I found that if you rested the just mixed dough (in the fridge) for 20 minutes there was a huge improvement in the dough's handling qualities and the final scones height, lightness and crumb were outstanding. Also I found that if you rest your patted out dough covered in plastic for 10 minutes in the fridge that the rounds are easier to stamp out and the final baked goods raise higher and have a better crumb. Also you can rest your stamped out rounds in the fridge for a couple of hours without harm so you can make your scones place them into the fridge and then at your leisure bake them later great for dinner parties etc. This is possible because modern baking powder is double action, i.e. there is another release of gas when you bake the rounds in the heat of the oven.

    Troubleshooting  
    Problems with bitter after-taste or dry chalky mouth-feel

    The biggest problem that scone/biscuits can sometimes have is an after-taste (sometimes described as metallic or a salty chemical taste) or the mouthfeel is dry and chalky (i.e. the crumb is tough and doesn't have enough moisture).

    If the problem is the after-taste try these tips
    • use freshly opened raising agents, many people claim old baking powder has a stronger taste
    • look for a single action baking powder (that only uses baking soda and cream of tar tar with a little cornflour) or make your own, since some double action baking powders can have metallic salts in them which some people can taste even in small quantities. Also keep in mind that homemade baking powder works faster and at a lower temperature, so put your recipe together quickly
    • look for a double action baking powder that uses non-metallic ingredients in it, check the ingredients listing on the packet.
    • use less baking powder
    • if you used an acidic liquid (buttermilk etc) and did not use some baking soda with the normal baking powder then some of the acid in the liquid wouldn't have been neutralised so leaving some salts behind causing the salty aftertase, that is make sure you are using the correct combination of agents for the liquids that you use, see the link below for full details about this. 
    • use only baking soda and an acidic liquid (buttermilk) like in the famous Irish Soda bread which very few people complain about having an aftertaste
    • use bakers' ammonium (available from King Arthur's flour) it was one of the most common chemical raising agents in the old days before modern baking powder, it smells like ammonia when baking but the ammonia smell totally dissipates and this chemical leaves nothing behind. I use it a lot in my baking it really gives baked goods that old-fashioned taste that people really can pick up on also it gives cookies extra crispness when baked.   

    See here for a comprehensive posting on baking powder/baking soda and how to use them in recipes.
    See here for the most interesting discussion on the use of baking soda and baking powder

    If the problem is the mouthfeel try these tips
    • try smaller sized scones and bake them quickly in a very hot oven and make the dough wetter since large sized scones using a drier dough baked in a moderate oven will give you a dryer crumb therefore a dry chalky mouthfeel
    • over-handled dough will lead to a dry mouth
    • eat them immediately fresh out of the oven, scones do really suffer (they become dry and tough) when stored for any length of time
    • try using more fat about 1/4 cup+ per cup of flour - more fat gives moister crumb. Also try using all shortening, since shortening contains no water or milk solids it gives a very tender crumb.
    • use this great recipe they are called "a touch of grace" biscuits they are the most tender and moist biscuits (scones) that I have had.
    • some people claim that a very hot oven is best to start the baking process then lower the temperature to moderate to finish baking the scones

    The problem lopsided scones
    About lop-sided scones this is usually caused by uneven cutting out of the scone. Some hints
    1. Clean and flour the scone cutter (by rubbing off any wet dough and then dipping the cutter into fresh flour the entire height of the cutter) every time you stamp out each round. Remember not to twist when you are stamping out the scones. If you are using a knife remember to clean and flour it for each cut.
    2. Try to pat out or roll out the dough as evenly as possible.
    3. Did you sift the dry ingredients three times? (uneven distribution of ingredients can lead to uneven scones).
    4. Try to get the scone out of the cutter by applying gentle even pressure on the entire scone circumference that way you do not compress just one place so making that area less tender so raising less when cooked.
    5. Turn the cut scone upside down onto the baking dish, since this side will be flatter than the patted out top surface.
    6. Only glaze the tops of the scone, a small amount of liquid on the sides will inhibit raise in that area.
    7. Some people like to use a fork and prick some holes in the top of the unbaked scones supposedly this helps the scone raise evenly.
    8. Also some people like to use their thumb and press a small hollow into the top of the scone supposedly this helps the scone raise evenly.
    9. A good article about "making the perfect scone" see here it goes through a lot of the best scone recipes by master bakers.
    10. Try this recipe and its method from Bakers' 911 which seems to make straight-sided scones even from wavy-sided cutters

    How to test baking soda
    1. Place a 1/4 teaspoon of baking soda into a tablespoon of vinegar it should bubble a lot.

    How to test your single action baking powder
    1. Place a teaspoon of baking powder into a cup, add 1/4 cup room temperature water it should bubble a lot.

    How to test your double action baking powder
    1. Place a teaspoon of baking powder into a cup, add 1/4 cup room temperature water it should bubble a lot.
    2. Wait 30 secs and then place your cup into the microwave heat for about 30 secs until about 180F it should bubble again.
    3. If it doesn't then discard and buy a new jar.

    How to test your self-raising flour - add one tablespoon of S.R. flour into some hot water it should bubble a bit. Or try adding some vinegar and see if it bubbles. Usually SR flour is only good for about three months.

    The problem an unreliable oven
    1. Try and use heavy grade dark metal baking dishes which give the best heat distribution.
    2. If your oven heating cycle is unreliable (varies the temperature a lot) lower the temperature to hot 220C (430F), preheat the oven along with a heavy metal baking dish for a good 20 mins then bake the scones on the baking dish which acts as a heat sink helping to bake the scones more evenly. Try to bake smaller sized scones which helps with a constantly varying temperature.
    3. If your oven has hot spots which mine does just rotate the dish at about 3/4 of the total baking time.

    The problem my dairy-free margarine doesn't do a good job of cutting in
    1. Just melt the margarine and add it to the liquid and proceed as normal (this is the best you can do if the margarine is "bad for cutting-in or just bad for scones" in the first place).

    Mandatory Items: You must make one batch of basic scones (i.e. basic biscuits using the North American name). The challenge recipe has been designed to be fast, very cheap and easy to follow so allowing for multiple attempts to be made until you can achieve your desired result. I encourage you to make a couple of batches to see how small changes in technique can obtain vastly different final baked products. I estimate all of my 16 experimental batches cost less than $4 and took about four hours, so please do take this opportunity to explore the possibilities of the different techniques and advice that have been presented here in this challenge. I have included a number of links to the most popular scone (biscuit) recipes (and variations) in a number of countries feel free to use these if you can make a good basic scone (biscuit) already.  

    Variations allowed:  A number of variations (cheese and chives, herb, etc) on the basic challenge recipe are included use them if you wish.  

    Preparation time: Scones: Preparation time less than 10 minutes. Baking time about 10 minutes.

    Equipment required:
    Large mixing bowl
    Baking dish
    Measuring cups and  spoons (optional)
    Flour Sifter (optional)
    Board (optional)
    Scone (biscuit) cutter (optional) or knife (optional)
    Dough scraper (optional)
    Spatula (optional)
    Weighing scale (optional)
    Cooling rack (optional)
    Pastry brush (optional)

    Basic Scones (a.k.a. Basic Biscuits)
    Servings: about eight 2-inch (5 cm) scones or five 3-inch (7½ cm) scones
    Recipe can be doubled

    Ingredients:
    1 cup (240 ml) (140 gm/5 oz) plain (all-purpose) flour
    2 teaspoons (10 ml) (10 gm) (⅓ oz) fresh baking powder
    ¼ teaspoon (1¼ ml) (1½ gm) salt
    2 tablespoons (30 gm/1 oz) frozen grated butter (or a combination of lard and butter)
    approximately ½ cup (120 ml) cold milk
    optional 1 tablespoon milk, for glazing the tops of the scones

    Directions:
    1. Preheat oven to very hot 475°F/240°C/gas mark 9. 
    2. Triple sift the dry ingredients into a large bowl. (If your room temperature is very hot refrigerate the sifted ingredients until cold.)
    3. Rub the frozen grated butter (or combination of fats) into the dry ingredients until it resembles very coarse bread crumbs with some pea-sized pieces if you want flaky scones or until it resembles coarse beach sand if you want tender scones.
    4. Add nearly all of the liquid at once into the rubbed-in flour/fat mixture and mix until it just forms a sticky dough (add the remaining liquid if needed). The wetter the dough the lighter the scones (biscuits) will be!
    5. Turn the dough out onto a lightly floured board, lightly flour the top of the dough. To achieve an even homogeneous crumb to your scones knead very gently about 4 or 5 times (do not press too firmly) the dough until it is smooth. To achieve a layered effect in your scones knead very gently once (do not press too firmly) then fold and turn the kneaded dough about 3 or 4 times until the dough has formed a smooth texture. (Use a floured plastic scraper to help you knead and/or fold and turn the dough if you wish.)
    6. Pat or roll out the dough into a 6 inch by 4 inch rectangle by about ¾ inch thick (15¼ cm by 10 cm by 2 cm thick). Using a well-floured 2-inch (5 cm) scone cutter (biscuit cutter), stamp out without twisting six 2-inch (5 cm) rounds, gently reform the scraps into another ¾ inch (2 cm) layer and cut two more scones (these two scones will not raise as well as the others since the extra handling will slightly toughen the dough).  Or use a well-floured sharp knife to form squares or wedges as you desire.
    7. Place the rounds just touching on a baking dish if you wish to have soft-sided scones or place the rounds spaced widely apart on the baking dish if you wish to have crisp-sided scones. Glaze the tops with milk if you want a golden colour on your scones or lightly flour if you want a more traditional look to your scones.
    8. Bake in the preheated very hot oven for about 10 minutes  (check at 8 minutes since home ovens at these high temperatures are very unreliable) until the scones are well risen and are lightly coloured on the tops. The scones are ready when the sides are set.
    9. Immediately place onto cooling rack to stop the cooking process, serve while still warm.

    Variations on the Basic recipe
    Buttermilk – follow the Basic recipe above but replace the milk with buttermilk, add ¼ teaspoon of baking soda, increase the fat to 4 tablespoons, in Step 3 aim of pea-sized pieces of fat coated in flour, in Step 5 fold and turn the dough, rounds are just touching in the baking dish, glaze with buttermilk.
    Australian Scone Ring (Damper Ring) – follow the Basic recipe above but decrease the fat to 1 tablespoon, in Step 3 aim of fine beach sand sized pieces of fat coated in flour, in Step 5 knead the dough, in Step 7 form seven rounds into a ring shape with the eighth round as the centre, glaze with milk.
    Cream – follow the Basic recipe above but replace the milk with cream, add ¼ teaspoon of baking soda, in Step 3 aim of beach sand sized pieces of fat coated in flour, in Step 5 knead the dough, rounds are just touching in the baking dish, glaze with cream.
    Cheese and Chive – follow the Basic recipe above but add ¼ teaspoon of baking soda, after Step 2 add ½ teaspoon sifted mustard powder, ¼ teaspoon sifted cayenne pepper (optional), ½ cup (60 gm/2 oz) grated cheese and 2 tablespoons finely chopped chives into the sifted ingredients, in Step 3 aim of beach sand sized pieces of fat coated in flour, in Step 5 knead the dough, rounds are widely spaced in the baking dish, sprinkle the rounds with cracked pepper.
    Fresh Herb – follow the Basic recipe above but after Step 3 add 3 tablespoons finely chopped herbs (such as parsley, dill, chives etc).
    Sweet Fruit – follow the Basic recipe above but after Step 3 add ¼ cup (45 gm) dried fruit (e.g. sultanas, raisins, currents, cranberries, cherries etc) and 1 tablespoon (15 gm) sugar.
    Wholemeal –  follow the Basic recipe above but replace half of the plain flour with wholemeal flour.
    Wholemeal and date – follow the Basic recipe above but replace half of the plain flour with wholemeal flour and after Step 3 add ¼ cup (45 gm) chopped dates and 1 tablespoon (15 gm) sugar.     
       
    Pictorial guide to the challenge recipe
    I was at my brother's house and we had a hankering for a baked treat so I decided to make the challenge recipe also I needed some photos of the challenge recipe being made for this posting. My brother isn't a cook, all he had to hand as equipment was concerned was a mixing bowl,a thin walled 20 cm (8 inch) cake tin and a knife, he didn't even have a cup measure only mugs so I improvised.

    As you can see in the collage below I roughly chopped some butter (I eye-balled about 2 tablespoons) and froze it. Then I throw the frozen cubed butter onto one mug of cold self-raising flour I couldn't sift the flour since my brother doesn't own a sifter. Then I proceeded to rub in the butter with my fingers until I got pea-sized fat pieces coated in flour.
    Photobucket

    I added the liquid (½ mug of cold lite-milk) to the rubbed-in fat/flour mixture until I got a sticky dough I turned this out onto a floured board, I lightly floured the top of the sticky dough then I kneaded it once  then I patted it out into a rectangular shape then I proceeded to fold and turn the dough. Notice that you fold 1/3 of the dough over itself then the other 1/3 over that and turn it 90° degrees. Notice the lines on the broad this will help you understand how to do the folding and the turning.
    Photobucket

    I did a couple more folds and turns and used a well-floured knife to cut out squares of prepared dough.
    Photobucket

    Here is a close-up of the finish patted-out dough notice how you can see the fat particles in the dough this is what causes flakiness in the final baked scone.
    Photobucket

    I used the inverted cake tin as my baking dish and baked the scones in a very hot oven for 10 minutes they worked out really well I thought. Notice the nice central lamination in the scone and the great crumb and how well they rose in height.
    Photobucket

    I placed two unbaked scones in the fridge to test whether resting them for 20 minutes helped improve the raise of the final baked product. As you can see the left scone and the middle scone are taller than the right scone which was baked immediately after it was cut out from the dough. So don't worry if you cannot bake the scones straight away they do better with a little resting time. 
    Photobucket

    Videos of my sister making scones (baking powder biscuits) – using a very popular Australian recipe
    (http://www.taste.com.au/recipes/8163/basic+scones) 
    Part 1 – my sister making the scones (baking powder biscuits)
    (http://www.youtube.com/watch?v=ZF9YJiHZ1K0)
    Part 2 – my sister showing off her scones (baking powder biscuits)
    http://www.youtube.com/watch?v=GorStLKSoMo)
    Pictures of my sister's scones
    Photobucket

    Storage & Freezing Instructions/Tips:
    Scones are best eaten warm. Scones (biscuits) are really easy to store – bag the cooked and cooled scones and freeze until needed then reheat in a moderate hot for a few minutes.


    Additional Information: 
    Australia’s most popular scone recipe uses lemon-flavoured soda pop and cream as the liquid
    (http://figjamandlimecordial.com/2010/08/08/lemonade-scones/)
    A great English scone recipe this uses more sugar and fat and has an egg
    (http://www.instructables.com/id/Perfect-English-Scones/)
    Classic Southern Buttermilk Biscuits recipe by Alton Brown
    (http://www.foodnetwork.com/recipes/alton-brown/southern-biscuits-recipe/index.html)
    An index of North American recipes
    (http://allrecipes.com/Recipes/Bread/Biscuits-and-Scones/Biscuits/Top.aspx)
    Another index of North American recipes
    (http://www.breadexperience.com/biscuit-recipes.html)
    Three great Australian recipes
    (http://www.smh.com.au/lifestyle/homestyle/blogs/tried-and-tasted/how-to-bake-the-perfect-scone-20110504-1e7xn.html)
    An index of Irish recipes
    (http://www.littleshamrocks.com/Irish-Bread-Scone-Recipes.html)
    An interesting discussion on “what makes a scone a scone”
    (http://chowhound.chow.com/topics/810928)  
    Videos of Alton Brown making biscuits (scones) with his granny (super cute to watch)
    Episode one ( http://www.youtube.com/watch?v=d3QuQSdjMVE)
    Episode two (http://www.youtube.com/watch?v=Qcz4JQUwY9Q)
    Links to advice about chemical raising agents
    http://www.seriouseats.com/2010/06/what-is-the-difference-between-baking-powder-and-baking-soda-in-pancakes.html
    http://www.kingarthurflour.com/tips/quick-bread-primer.html 

    Disclaimer:
    The Daring Kitchen and its members in no way suggest we are medical professionals and therefore are NOT responsible for any error in reporting of “alternate baking/cooking”.  If you have issues with digesting gluten, then it is YOUR responsibility to research the ingredient before using it.  If you have allergies, it is YOUR responsibility to make sure any ingredient in a recipe will not adversely affect you. If you are lactose intolerant, it is YOUR responsibility to make sure any ingredient in a recipe will not adversely affect you. If you are vegetarian or vegan, it is YOUR responsibility to make sure any ingredient in a recipe will not adversely affect you. The responsibility is YOURS regardless of what health issue you’re dealing with. Please consult your physician with any questions before using an ingredient you are not familiar with.  Thank you! :)[/quote]
              Preserving Transactional Data        

    This paper is an adaptation of a longer report commissioned by the UK Data Service. The longer report contributes to on-going support for the Big Data Network – a programme funded by the Economic and Social Research Council (ESRC). The longer report can be found at doi:10.7207/twr16-02.

    This paper discusses requirements for preserving transactional data and the accompanying challenges facing the companies and institutions who aim to re-use these data for analysis or research. It presents a range of use cases – examples of transactional data – in order to describe the characteristics and difficulties of these ‘big’ data for long-term access. Based on the overarching trends discerned in these use cases, the paper will define the challenges facing the preservation of these data early in the curation lifecycle. It will point to potential solutions within current legal and ethical frameworks, but will focus on positioning the problem of re-using these data from a preservation perspective.

    In some contexts, these data could be fiscal in nature, deriving from business ‘transactions’. This paper, however, considers transactional data more broadly, addressing any data generated through interactions with a database system. Administrative data, for instance, is one important form of transactional data collected primarily for operational purposes, not for research. Examples of administrative data include information collected by government departments and other organisations when delivering a service (e.g. tax, health, or education) and can entail significant legal and ethical challenges for re-use. Transactional data, whether created by interactions between government database systems and citizens or by automatic sensors or machines, hold potential for future developments in academic research and consumer analytics. Re-use of reliable transactional data in research has the power to improve services and investments by organisations in many different sectors. Ultimately, however, these data will only lead to new discoveries and insights if they are effectively curated and preserved to ensure appropriate reproducibility. This paper explores challenges to this undertaking and approaches to ensuring long-term access.

     


              Comment on Sansar Creator Beta: personal thoughts by Belldon Gambit        
    Opening the Beta was a necessity because as with any MMO-like experience you will need to do a pile-on test and for that you need large numbers of users. That tests network performance and that is a crucial element for Sansar. So opening up the Beta to get as many people as possible was a necessity. Was it too early ? It can seem that way (and did to me) but none of us are part of the development team so we can not tell.
              The Network Week in Review and Look Ahead: October 24-28        
    Happy Halloween Weekend! Everyone figure out their costumes and have all their candy ready for the trick or treaters?! To get in the Halloween spirit, check out this awesome pumpkin a Cisco fan created for us last Halloween. Then, take a look at The Network’s top news stories of the week! 1.) Security Quiz: Test […]
              The Network Week in Review and Look Ahead: October 17-21        
    It was another busy week here at Cisco! Check out the top news stories of the week. 1.) The Broadband Debate This new feature addresses the issue of broadband as a basic right. Country by country issues vary, but how can access be achieved? Do you think countries should make broadband access a basic right? […]
              The Network Week in Review and Look Ahead: October 10-14        
    Another week has passed and this one went by fast, don’t you think? Check out what Cisco has been up to during this busy week! 1.) A Silicon Valley in the Heart of London? Check out this new feature on how the UK government and a Who’s Who of high-tech giants, including Cisco, are working […]
              The Network Week in Review and Look Ahead: September 19-23        
    TGIF! Before you start enjoying your weekend, check out The Network’s top news stories of the week! 1.) 2011 Cisco Connected World Technology Report Did you know that two out of five college students say the Internet is more important than dating, hanging out with friends, partying and listening to music? This is just one […]
              The Network Week in Review and Look Ahead: September 12-16        
    It was a busy week over here at Cisco! How did your week go? Check out below all our top news stories of the week! 1.) More than Just a Vendor: How Cisco Differs from the Competition For more than 25 years, Cisco has systematically invested in customer relationships and developed a reputation for doing […]
              THE NETWORK Week in Review and Look Ahead: June 20-24        
    Happy Friday! In case you didn’t hear we launched a new corporate news site! “The Network: Cisco’s Technology News Site” is our effort to tell stories and share information on the topics that are the most important to Cisco, namely: Video, Collaboration, Core Networks, Data Center, Cisco Culture and social media! We will create, share […]
              Sewing for my Mental Well-being        


    I went home to Australia for a short visit and noticed that the television network ABC (the Australian BBC) was really promoting Mental Health week. This made me super excited! Mental Health has unfortunately taken the back seat when it has come to Health, so to see it in the lime light was marvelous. I have worked in the area of mental health for many years now and I work in a holistic sense.... so what has this all got to do with sewing? Read on!





    'Why is sewing good for my mental health?'

    1. Beat Depression and Burn out. 
    In this fast paced world, where many people live and breathe their 9-5 job, it is easy to get burnt out and experience depression. Having something else to come home to can provide some relief. I find that when I am having a difficult period at work, I know that I can shift my focus to my creative projects at home

    2. Supportive Sewing Community

    You are apart of a fantastic supportive community who are truly passionate about creating! They can brighten your day!

    2. Develop patience, resilience and  persistence
    Patience - Sewing can force you to slow down and take your time, so in a sense it can help to calm you. 
    Resilience - We all have those projects which seem to go all wrong, so you need to be resilient to get through it. Bounce Back and persist!

    3. Learn new skills and create new neural pathways!
    Learning new skills is good for healthy brain development. Create those new pathways!

    4. Experience Flow
    I experience moments of flow when exercising and when I sew (or design or print). Flow is when someone experiences total immersion in an activity. For me it is intrinsically rewarding and I experience a feeling of serenity. Here is a good article on flow

    5. Pride and satisfaction 
    There is always an element of pride and satisfaction when you complete and wear a garment. My proudest sewing moment was on my wedding day when I designed and sewed many outfits for the occasion:)

    6. Unleashing creativity.
    Unleashing your creativity can be a great outlet for your emotions and it can make you happy!

    Martin Seligman specilises in positive psychology and discusses creativity and mental health. So check out some of his work for more info!



    Have you noticed the link between positive mental health and sewing?



              Foursquare Fully Redesigns Check-In App To Become An Anti-Social Network        

    Partilho para lerem Foursquare Fully Redesigns Check-In App To Become An Anti-Social Network

    O conteúdo Foursquare Fully Redesigns Check-In App To Become An Anti-Social Network aparece primeiro em ActiveMedia.is/Digital and everything else.


              DENSI Day One        
    I decided to (attempt to) write a blog post each day that I am at the Discovery Educator Network Summer Institute (DENSI). DENSI is a week that Discovery brings together a hundred or so educators from across the country to … Continue reading
              à¸„วามเห็นบน Wheatgrass : อาหารสำหรับคนรักษ์สุขภาพอย่างแท้จริง โดย Lecithin        
    This is very interesting, You're an excessively professional blogger. I've joined your rss feed and sit up for searching for extra of your great post. Also, I've shared your site in my social networks
              Belgium: Eib Lends 100 M Euros to Elia for Electricity Network        
    The European Investment Bank (EIB) and Elia, the operator of the Belgian high-voltage grid, have concluded a loan agreement for 100 million euros with a tenor of 7 years. This loan will be used primarily for financing the Stevin project; this includes bringing ashore the wind energy produced at sea and the optimal integration of the future energy-exchange with the UK (Nemo project) in the Belgian electricity network. These two projects enable both the integration of large quantities of re...
              Portugal: Juncker Plan: EUR 29 million EIB loan to finance the expansion of gas distribution        
    The European Investment Bank (EIB) is granting EUR 29 million loan to support the investment programme of Sonorgas aimed at expanding its natural gas distribution networks to new areas in northern Portugal. These investments will increase and improve the security of energy supply in the country and contribute to economic growth and job creation in an EU cohesion region. The agreement was made possible by support from the European Fund for Strategic Investments (EFSI), the central pillar of the E...
              Largest Ever EIB Loan Provides GBP 1.5 Bn for National Grid Investment        
    The European Investment Bank has agreed to provide GBP 1.5 billion (EUR 1.92 billion) for investment by National Grid plc across its national electricity transmission network. This new support for connecting new power generation, upgrade ageing assets and improve network resilience to climate and security risks represents the largest ever single loan made by Europe's long-term lending institution. The new long-term loan will include capital investment by National Grid reinforcing infrastructure...
              Bangalore University Fourth Semester BCA Exams Question Papers        
    Bangalore University Fourth Semester BCA Exams Question Papers

    Question Papers 2015

    IV Sem Visual Programming- Y2k8 Scheme
    IV Sem Unix Programming- Y2k8 Scheme
    IV Sem Language Sanskrit-IV
    IV Sem Language Kannada-IV
    IV Sem Data Communication and Networks -Y2K8 Scheme

    Question Papers (2010-2013)

    Computer Graphics Dec-09
    Computer Graphics 2011-(O.S)
    Computer Graphics-2013
    Data Comm.IV Jun-2010
    Data Communication Networks 2011
    Data Communication and Networks 2011
    Data Communications Networks 2013
    English-2010
    English-2013
    Environmental Studies May-2011
    Hindi-2011(N.S)
    Hindi-2011
    Hindi-2013
    Hindi Jun-2010
    Kannada Jun-2010
    Kannada 2013
    Kannada Part II 2011
    Microprocessors 2013
    Sanskrit Jun2010
    Software Engineering
    Software Engineering 2010
    Software engineering 2011
    System Program IV-Jun2010
    System Programming 2011
    System Programming 2013
    System Software 2010
    System Software 2011-(O.S)
    System Software Dec-09
    System Sofware 2013
    Unix Operating System Dec-09
    Unix Operating System May-2011
    Unix Operating Systems 2013
    Unix Programming Jun-2010
    Unix Programming-2013
    Unix Programming May-2011
    Visual Programming Jun-2010
    Visual Programming-2013
    Visual Programming May-2011


              Hosting that You can Make Money With.        

    Hosting that You can Make Money With.

    Tags:


              Hosting that You can Make Money With.        

    Hosting that You can Make Money With.

    Tags:


              3 Lessons I Learned From Meeting Oprah        

    Last Updated: April 6, 2017Ten years ago, I had the good fortune to be featured as an expert on The Oprah Winfrey Show and to meet the all-time queen of daytime talk TV.   That life-changing experience led to many more connections with Oprah’s vast production network of TV shows and spinoffs, not to mention increased speaking engagements and book sales.   After appearing on Oprah, I initially went on to do Oprah After the Show, and later Oprah’s reality TV show, called The Big Give. I had already appeared The Dr. Phil Show, but I got re-booked there repeatedly. Ditto for The Rachael Ray Show. I also went on to become Tyra’s featured money expert on The Tyra Banks Show, and now I’m a core money expert on The Dr. Oz Show.   I have gratitude for all these wonderful TV opportunities and others as they’ve allowed me to expand my brand and become nationally known as Lynnette Khalfani-Cox, The Money Coach®.   Beyond helping me achieve a greater level of fame and TV exposure, however, Oprah taught me many key lessons that have served me well in many ways over the years.   In the spirit of paying […]

     

    Got a question for The Money Coach? Sign-up today for one-on-one coaching with Lynnette.

     

    The Money Coach - The Personal Finance Blog of Lynnette Khalfani-Cox, The Money Coach®


              Weight Inward into Lightness: A Reading of Canoe Repair        
    by
    Flore Chevaillier
    2004-08-19

    “Canoe Repair” takes place at a transitional time for the main character. Zanes moves from New York City to a New Hampshire town and has to adapt to a new life and a new job, running a Laundromat, as well as to his son’s new hang-gliding activity and his wife’s new TV job. Thus, “Canoe Repair” occurs at a moment when rural and urban worlds are put in “connection and disconnection at the same time” (“Midcourse Corrections” 50). While we learn more about Zanes’ occupations, we also read a portrait of the town’s life. We discover a picture of America and its smell of “coffee richly dripping and poppy-seed-blue corn muffins” (69). We read Zanes’ discussions with “Seemyon Stitching … a spring immigrant from Byelorussia and a trained marathon runner” (62), and find out about the “president’s eight o’clock message to the nation” they listen to when “no one among the machine-users seemed to be waiting for the president’s speech” (72). The story deals with the movements of people from the town who use the Laundromat and the movements of the canoe on the lake, as well as the hang-gliding and the weather.

    One might describe the events in these terms. But the story is also a reflection on time and on strange, everyday moments in one’s life. “Canoe Repair” presents a section of a man’s life, also a canoe’s, since its repair is at the center of the story’s multiple directions, its focus on space and movement. The story is a space where different tensions meet. It shows the strain between two worlds, two generations, between different experiences of time and perception, and between two voices telling the story. “Betweenness” is central in McElroy’s writing. In “Canoe Repair,” “ ‘Betweenness’ is… the crumbling edge of the interface of worlds, selves, and situations” (Saltzman 100). Betweenness is also at stake when we consider “Midcourse Corrections,” an unusual autobiographical interview/essay ended by “Canoe Repair.”

    “Is a canoe too beautiful to be funny unless somebody falls out of it?” asks Joseph McElroy in “Midcourse Corrections” - “falls out, tipping it over? Put two people in it facing forward. What’s the stern paddler see? What’s the bow paddler feel? - for the stern paddler?”(42).

    These questions about canoe uses are put into practice in McElroy’s short story, independent but part of the essay, as he explains. “Some of the material in ‘Midcourse Corrections’ could be said to turn into ‘Canoe Repair’… I wanted to use ‘Canoe Repair’ to fulfill ‘Midcourse Corrections,’ that peculiar interview memoir … that should turn into fiction at the end.” Personal correspondence with the author, June 16, 2001.

    “Corrections” is itself an experiment in literary form that in many ways epitomizes the body of McElroy’s writing. “With its inserted interviews, its odd proportions, and its highly colored perspectives of me,” McElroy writes in a letter, “[‘Corrections’] is a hybrid fiction, I suppose. A daydream posing as a document.” (cited in Tabbi 156)

    The thematic and structural research of this “hybrid fiction” turns into practical experience in “Canoe Repair.” The author’s reflections upon space, motion, and perception connect to the movement of the boat on water because the “canoe becomes an occasion to think.” Personal correspondence with the author, February 6, 2003. We can approach the story from different angles due to the openness of its particular structure linking it to the essay, of which it is also the unusual closing part. Nevertheless, it would be unfair to consider the story strictly as a conclusion to “Midcourse Corrections;” it has its own structure, dynamics, and meaning. It is a complex and intense story because of the multiple tensions we can feel in its narration.

    To understand “Canoe Repair,” we have to focus on the transient aspect of Zanes’ life and its relation to tensions that appear both thematically and structurally. The text is literally at the end of the “Midcourse Corrections” but metaphorically “in between.” It connects to “Midcourse Corrections” but is autonomous. Moreover, it plays strangely with the reader’s expectations. It is organized around a double voice that disturbs the reader’s traditional way of reading. The reading, because of structural devices that put us “in between,” becomes the experience of the transition moment Zanes goes through, his shift from one world to another, his perception of the world.

    Zanes’ visions can sometimes be confusing. Hence, some aspects of the story can be destabilizing to the reader. The story starts with a family scene: Zanes and his son are watching the river. A strange canoe used by a black man and a blond woman catches their attention. Zanes’ neighbor calls him afterward to fix the canoe for the blond woman’s son; the canoe captures Zanes’ attention throughout the rest of the story. Parallel to Zanes’ work on the canoe, we learn about his arguments with his son regarding the latter’s hang-gliding practice. We also get to know more about the life that goes on at the Laundromat where Zanes meets with Seemyon Stytchin and a group of young punks that disturb the community. Zanes starts a friendship with Lung, a member of this group. However, this summary contradicts the story’s original presentation of Zanes’ world because it reassembles what is purposefully fragmented in “Canoe Repair.” We only achieve this vision of the story retrospectively because it is not told linearly.

    Our expectations as readers are challenged, as David Porush notes when associating the technique of “de-automatization” provoked by the unsettling language of McElroy’s novel Plus. Plus ’ main character Imp Plus is a brain detached from its body and put in orbit to communicate with earth during a scientific experiment. When relearning ways to communicate, Imp Plus uses language unusually. Therefore, the reader is forced to see words in a different way. Imp Plus presents a new use of words that questions the systems we automatically refer to when using language. In “Canoe Repair,” the challenge to our automatisms lies in the distortions that affect the structure of the story. The compact paragraphs of “Canoe Repair” are juxtaposed without transitions. When turning to a dialogue, McElroy does not use rules of quotation to let the reader know that the viewpoint is changing. Tabbi claims that for McElroy “the mental text … does not precede the work at all but exists instead in the work, where the reader might imaginatively participate in the compositional or self-creative effort that went into the life/work’s composition” (158). The activity of the reader is thus part of the structure of the short story. Disjunction calls up the reader’s activity of representation. It asks us to create a coherent image of the narrative, a coherent text. Omitting the relation between two events leaves room for the reader to fill in the blanks. This crafted incompleteness creates the structure of “Canoe Repair.” Facts have more than one logical order; the reader coordinates elements by analyzing fragments.

    Thus, the reader organizes the very space of the text. We shift, for example, from “When he took his canoe out, Zanes also thought,” to “The ideas knew how to get away sometimes” in the next paragraph (59). Reading “Zanes also thought,” the reader does not expect the sentence to stop at this point. S/he expects a complement to the verb “thought.” Therefore, reading “Canoe Repair” can be somewhat frustrating; the author even ironically refers to our unsatisfied expectation when we lack a transition between the two sentences. That is why, as Wolfgang Iser notes in The Implied Reader, we have to use imagination to compensate for the gaps. The context created by the sentence: “When he took his canoe out, Zanes also thought,” is destroyed so that the reader steps back and reflects upon the narrative as a work of art. “The artwork itself is represented as an artwork” (McHale 30). The reader finds metafictional allusions that suggest a fiction conscious of its fictionality, which makes the reader understand the story at another level of representation. These metafictional moments create a disjunction in addition to the fragmenting of the plot itself.

    Each blank invites interpretation and coordination. Do the gaps become the theme of the narrative? When analyzing Modern texts such as Ulysses, Iser engages the issue of semantic richness and incoherence of gaps, moments of inconsistency, disruption, or omission. He sees reading as a process the reader undergoes to synthesize fragmented elements; the reader creates meaning.

    The unconnected allusions and the abrupt alternation of stylistic devices disclose a large number of gaps … [that give] rise to the stimulating quality of the text. On the one hand, the density of allusions and the continual segmentation of style involve an incessant changing of perspectives, which seems to go out of control whenever the reader tries to pin them down; on the other hand, the gaps resulting from the cuts and abbreviations tempt the reader to fill them in. (Iser 213)

    The structural breaks in “Canoe Repair” might be less extreme than those in Ulysses but, similarly, the gaps and omissions become part of the story’s theme, possibly denying thematic synthesis itself. Zanes’ fragmented thinking and his way of experiencing life are present in the style the author uses. The medium is often the message. The construction of sentences that might make us insecure reminds us that reading “Canoe Repair” is a special experience that enables us to coordinate elements of the story and thus penetrate Zanes’ mind and his somewhat eccentric thinking. The reader, by grasping multiplicity, references, and rambling elements, maps out what is happening in Zanes’ mind. The way things get originally connected structurally mirrors Zanes’ experience of the world that also reaches for unusual connections.

    How do we find our bearings reading “Canoe Repair?” The narration resists linear order. It seems laminated into different sequences of the character’s life. Flashes are exposed with neither explanation nor transition. Joseph McElroy “never hid the gaps” (“Neural Neighborhoods” 204). Chronology is not respected; events follow a pattern of shifts from one subject to another, from one point of view to another, and everything seems important and unimportant at the same time. There is sometimes no link between consecutive sentences: “Was it my time device operating again?” and “A canoe is what makes you do” (77). Here, gaps interfere with our sense of the evolution of the story and the progression in the character’s life, if there is one. These gaps are caused mostly by the double narration of the story, and they are even more challenging to the reader. When we shift from, “Was it my time device operating again?” to “A canoe is what makes you do” (77), we shift from an “I” to an omniscient narrator. Zanes’ own perspective on his life is balanced by the omniscient narrator. To understand Zanes’ life, we need to be inside him and outside him. We need to know the world exterior to Zanes’ subjectivity to understand his reactions, hence the role of the omniscient voice.

    The embedded structure of the story told by two narrators juxtaposes two sources of information. This construction enables the insertion of one perspective within another and it leads us to see Zanes’ life as an accumulation of fragments. Different perspectives provide distinct information about and approaches to the same life. Can the story be seen as a dialogue between these two poles? Unlike traditional narrations where the reader faces a set of events exposed in a linear way, “Canoe Repair” makes the reader feel the duality of life.

    McElroy constructs a dynamic that can be paralleled with the theme of the double, often present in gothic stories. In these stories, the narrator and the character are the same person, although it is usually not clearly stated in the text. In “Canoe Repair,” there is, to some extent, a renewal of the theme of the double since our character has a double voice. The schizophrenic tensions represented by the strange vision of the double in the gothic stories appear in “Canoe Repair” in a somewhat different way. The strain between two voices can be understood as the representation of power over the development of the story.

    First, the omniscient exterior narrator controls the story. Progressively, “I” becomes dominant. At the end, rapid shifts of viewpoint break up the story. The evolution of each viewpoint implicitly lets us gather details about the context of each narrator’s intervention. The constant shift form “I” to “he” changes the reader’s relation to the narrator because it implies a nonlinear way to gather information. Each narrator puts the reader into a frame of mind that influences interpretation. The shifting of frames makes the reader’s activity intense. When we change frames, we have to change our interpretation. How to base our understanding of the story on a specific context when the latter is always denatured?

    The two narrators fragment the story, and they produce a repetitive pattern. Each of the narrators gives us details on the same moments of Zanes’ life. The double narration is thus based on the repetition of similar life sequences. The double narration allows repetition to penetrate the narrative. It is thanks to repetition that the reader can make sense of the story’s disconnected elements. The gaps that we apparently cannot coordinate - such as “Is there somebody over there? Zanes said. Probably, his son said” and “All but one of the machines were in use that evening”(72) - are so large that the only way the reader can assemble the fragments of the story is by focusing on the repetitive patterns that connect these partial perspectives. We constantly come across the same moments: the observation of the canoe, meetings between Zanes’ wife and the producer of her cooking show, scenes with Lung, discussions with Seemyon, and so on. The plot offers not so much progress as recurrence, duplication, and reiteration.

    In our mind, those terms are usually connected to something monotonous. Yet in “Canoe Repair,” the iteration of words, ideas, and/or themes does not result in a redundant effect on reading. The first reference to “sunset” (56) is echoed by “[o]ne of them materialized at sunset” and “at sunset a window beamed” (57). Through repetition, meaning emerges. Repetition is not used to stop the progression of the plot: the elements of Zanes’ life are never told twice in exactly the same terms. The accumulation of repetitions creates an unusual meaning, a meaning understood through indirect means. Zanes refers to his own time: “my time device” (58), “another time” (61) as opposed to “my wife’s cookbook, my time machine” (69). Zanes’ experience of life does not rely on a chronological structure. When we accept repetition, we understand that time does not need to be seen as a linear progression.

    Repetition lets us understand how Zanes organizes his life. The first and last moments of the story present similar scenes. “It was sunset and the boy was angry and wanted to be somewhere else” (56). Zanes and his son are outside watching the canoe for the first time. The first words of the story put the reader in the middle of a situation. The first character we meet is not Zanes but his son referred to as a “boy.” He could be anybody. In that sense, the story can be considered a statement about any family life, its structure, its implicit rules, and its repetitive patterns. The reference to “somewhere else” also puzzles the reader at the beginning of a story; we do not even know where the character is. At the end, we have circled back: “Above me, I felt the presence of my son at his window. If I didn’t take down the screens, it would soon be summer again” (78).

    The end is paradoxical since it does not explain the story but at the same time concludes it through indirect means. The story ends on “again,” which alludes to an opening, a repetition of what we have read, maybe an allusion to the beginning if we think of the circularity of the repetitive pattern of the narration. On the other hand, the allusion to the coming summer ends with a period. Spring will soon be finished. We note here again the parallel between the first scene and the last one since the story opens on the ending of something, of a day. We are at a time when Zanes makes a pause in his life. His work on the canoe is what “makes [him] do” (77). His crafting the canoe changes aspects of his life, his relationship with his family and his community. The end of spring makes a kind of conclusion to the story but, at the same time, it opens the story toward a new time period. The conclusion and the opening lead us to different interpretations. We face some conflicting perception of time and closure. Depending on the type of time framework one has in mind, things can be open or closed; that is where the tension originates. The last and first scenes teach us to pay attention to how things are repeated in variation in the story. Both scenes point to a double direction. By examining this process, one understands that repetition is used to let one access Zanes’ subjective knowledge.

    In the two scenes, the son and the father are both watching another place, an outsider place. They disagree on the hang-gliding activity. But this tension gets somewhat resolved at the end when they both look again in the same direction. An open conversation about this issue never appears in the story. Tensions are solved indirectly: “Is the leak like worry, no more than worry?” (75). The boat becomes the center of our attention; it is a place where Zanes’ concerns are to be projected and fixed too. The leak of the boat is associated with Zanes’ life: “When you left your job last year you were taking what you had and making it flow into a new system rather than holding onto what had been used. It would have leaked away if you had not made it move into a new system” (63). The canoe becomes a system of reference we share with Zanes to understand his life. The changes he goes through are projected into the repairing of the canoe, and thanks to the details of the crafting we understand the adjustments of his own life.

    Connection is hidden where we cannot see it at first sight, where we do not expect it. For instance, a paragraph describing Zanes canoeing ends, “A wind was coming up, and I heard a breathing sound of paddling” (65). The next paragraph begins, “He treaded water and in his mind smelled fish scales. A wind came up. Zanes felt a wash against his dome” (65). The wind coming up appears twice, but the repetition is not identical because it lets us collect different details about Zanes canoeing. The first time, the wind relates to sound, while the second time it is linked to smell and then touch because of the sensation of “wash.” The different senses are connected to the same moment of Zanes’ life, and we gather this general image as well as its fragmented aspect thanks to repetition. Zanes’ sense of the world is not constructed upon a close frontier between things. Wind and breath become one; canoe and lake become one. To Zanes, “the beautiful canoe could loosen in your mind” (73). The different parts of his life (his relationship to Lung, his son, his wife, the canoe, the neighbor) are permeable. They communicate in an unusual way because they get to influence one another without ever being purposely or directly connected. The apparently rambling progression of the content of the story mirrors Zanes’ vision of life. As a result, the nonlinearity guides us.

    The relationship between “Canoe Repair” and “Midcourse Corrections” emphasizes the reflections on moments of “repair” or “correction” in one’s life. The two works present pauses at a transitional time. The reading of “Canoe Repair” is the reading of images and themes mapped out in a paradigm linking scattered elements from the story, “Midcourse Corrections,” and the reader’s world. McElroy’s variation on themes common to both “Midcourse Corrections” and “Canoe Repair” is close to Andy Warhol’s technique in a series such as Marilyn. Like the painter, the author chooses a theme and modulates it. This project changes the narrative framework and our reaction to it. We can consider “Midcourse Corrections” and “Canoe Repair” to be doublings on a similar project: both pieces give different perspectives on the same thing, the way “Canoe Repair” also gives partial perspectives on the same plot. When reading “Canoe Repair,” the reader may have “Midcourse Corrections” in mind. Both pieces are meant to add to each other.

    In that sense, McElroy “repeat[s] something now to make you remember something then and set[s] you up for something later” (Kawin 34). The reiterations linking the two pieces can be understood as emphases on moments that create echoes in the reader’s network of references. In “Midcourse Corrections,” McElroy writes that his essay is written to “interrupt, interleave, break diverse kinds of documents” (10). “Canoe Repair” can be read as the application of such a project to fiction. The gaps are motivated by a wish to mix disconnected “documents.” Tabbi notes that the interviews “are like a fiction” (160). In that sense, the frontiers between the essay and fiction are blurred because of their connections. Tabbi also claims, “McElroy locates his compositional self in the space between plural subjectivities” (160). The double narration of the story pluralizes Zanes’ subjectivity in a parallel way.

    Structurally, the two pieces are surprisingly close. “Midcourse Corrections” is a combination of three interviews interrupted by the author’s reflections, “INSERTS,” and ” workpoints.” The short story and the autobiographical essay display a structure that accepts gaps and emphasizes echoes that connect the two texts. The substance of the canoe’s texture is mirrored by other parts of the essay:

    INSERT: hinge turning: remember those trick hinged pieces of wood that were really constructed with curiously attached canvas strips?

    An essay like that. An interview. A sentence fly-by that manufactures its own canvas in the space it also generates out of a music its thought spun off. (“Corrections” 20)

    The crafting activity of canoe repair is paralleled by the composition of writing. The texts’ themes and images branch into one another. As McElroy expresses it, the “mixed metaphor of [his] work extends a fluid trial. Like a mixed metabolism and through the pulmonary winding also unfolding and exfoliation of the sentence’s plot it holds exchanges even between incompatibles” (“Corrections” 15). A paradigm of images is used to progressively construct the original way Zanes conceives his world. We understand how in the story, incompatibles such as “weight” and “lightness” can correlate. In the canoe, “the noble forcing of the ribs into this oval narrow form turned the weight inward into lightness” (67). In one’s life “corrections” and “repair” bring “weight” and “lightness” in contact. Traditional oppositions are reconciled in “Canoe Repair.”

    The Laundromat is a place where clothes are washed, but it also becomes a place to meet, a place where life is concentrated. In addition, when Zanes thinks “rowing looks like work” (58), we see how things can serve different purposes. For Zanes, things do not have a unique meaning. Commonly, a Laundromat is used for washing. The rowing activity is meant to move a boat. However, experience changes the use of things. Zanes gives them a power to influence the world indirectly. His time influences the “real time;” his vision of space dialogues with the “real space.”

    The reader adapts, concentrating on the unsettling aspects of Zanes’ representation of the world, and it participates in the creation of a simultaneous immobility and movement as when “the canoe [is] moving but … [is] still” (56). The apparent contradiction of this statement is illustrated by the structure of the story, which is partly why we may wonder if the canoe or the landscape is moving. Referring to a similar moment of immobility and movement in Hind’s Kidnap, Tony Tanner explains that “we are all familiar with such optic illusion pictures which can be read in more than one way, often as focus shifts so that figure and ground seem to change places” (219). This optic effect is rendered by the way the story is told. The process of perception alters the representation of time and space: “[t]he lake was part of the canoe” (58).

    When reading the description of the canoe, we have an example of a moment when “the eye following the line of something creates motion.” Personal correspondence with the author, June 16, 2001.

    Its grand lines flared to a beam so wide it seemed low and was. Which end was which? Ribs curved with a beautiful singleness up to the gunwales, and, out of the bent tension in which they seemed to grip and bow the ribs, as you ran your eyes over it and felt it the canoe developed a force of tightness and actual lift, as if the noble forcing of the ribs into this oval narrow form turned the weight inward into lightness. (67)

    The passage describes the canoe precisely and technically - “ribs,” “gunwales.” We are so close to the ribs of the boat that we get an impression of immensity. The sentences saturated with commas and information prevent us from picturing a full image of the canoe. Each small detail gets enlarged so that each part seems to expand itself infinitely. The movements are underlined: “flared,” “curved,” “bent,” “grip,” “bow,” “lift,” “turned.” The canoe is still but its description creates motion.

    This passage can be seen as a micro-structural template for the way the story evolves. The story is the combination of different lines gathered into a unique moment. Indeed, there is a network of words that refer to either abstract images or other words linked to the movement of the boat in the story. The circuitry of words and their relation to other words is as important as what the words refer to. The formal fragmentation and disconnection lets us experience literally what happens in Zanes’ mind. The narrator explains Zanes has a “restless mind” (60) but never explicitly explains what it means. He never gives a full description of the way Zanes orders his thoughts. We access the definition of Zanes’ “restless mind” through the organization of the story. The tensions inviting for “repair” in Zanes’ life are present at any level of the text without ever being clearly expressed. The slow paths of the narration, its fragmentation, and its echoes are images of the canoe which itself reflects the tensions at stake in Zanes’ life.

    These descriptions let us experience a different sense of space but also reveal the story’s sensual approach to the world. Zanes’ readjustments orient and transform his vision. Things are examined, and their perception is detailed when Zanes describes his wife swimming, for instance: “He imagined her, and he knew her words had reached some reservoir in his brain, where she was swimming at night, the luminous things like tiny muscular wakes lit up her thighs and the curve of her back” (60). The “luminous things like tiny muscular wakes” are observed with attention, and remind us of a vision of a sculpted body where forms and relief are emphasized. Narration zooms in on details of surfaces, and the intense observation of body parts and of the canoe makes a paradigm of sensual representations. The story pays attention to the concrete surface of things: the canoe looks like a “deer swimming” (56). Things and people are described minutely, and the scale used is so close that the images of the story appear as details of a painting. The details Zanes’ vision focuses on remind us of the indirectness of his actions. Zanes pays attention to things in their details and cannot always see the overall framework of these things. Similarly, he cannot perceive the outcomes of all his actions.

    McElroy refers to “’[a]ttention’ [as] a rather cold word [he] use[s] to suggest that the ways in which we embrace the world and embrace other people can be more precise and clear than we think sometimes” (Anything 248). Zanes’ attention to the canoe and to his breath, for instance, as he feels the “air filling the space of [his] chest to be measured by another time” (60), is his way to “embrace the world.” His attention to the world indirectly penetrates his relationships. Zanes’ precise description of the exterior world lets us access his interior world. We understand, when paying attention to the depiction of his environment, why “the lake [is] part of the canoe” (58). People’s lives are permeable, their energies travel into one another. Zanes’ activities involuntarily connect to other areas of his life. The clearer vision of life that appears when Zanes repairs the canoe gets transferred in mysterious ways to the other parts of his life. Different aspects of Zanes’ life influence one another, although it is not clear to him or us how they connect.

    The flashes and fragments emphasized in the sequences of the story are used to represent the world: “it is the very abundance of perspectives that conveys abundance of the world under observation” (Iser 226). The canoe is personified by Zanes’ interest in it: “A body was what it was” (73). Zanes’ observations change our perception of the canoe. It is compared to a lover, an animal, and a body: “he almost loved the canoe” (67), “[t]he canoe attracted others to it, they were in its future” (75), and “[a] canoe is what makes you do” (77). Intensity changes the character’s visions of the world.

    This intensity also affects the way time is represented in the story. Perception is altered. Likewise, time is distorted. McElroy refers to “the arranging of things in space, the motion of things and persons in space. Time dissolved into spatial relations.” Personal correspondence with the author, June 16, 2001. When Zanes asks, “what if space was time?” (72), his question could be considered as a comment on the devices used by the author. In “Canoe Repair,” time is peculiar since it is fragmented and does not follow a plain progression. McElroy writes in “Midcourse Corrections” that his writing is to be understood as “modifications of language editing the rhetoric of what’s inside and not disclaiming faith that the words really rendered things and motions outside - and outside, somehow, consciousness” (13). The subjective experience of Zanes’ time is spatialized in the story. “Outside” and “consciousness,” connected in “Midcourse Corrections,” become the pivot of “Canoe Repair.”

    The story covers approximately seven months (“One bright mid-September afternoon” [65] to “summer soon” [77]), but the vision we have is the vision of an infinite time without bearings or perhaps a very short time so dense that the notion of its temporality is not valid. The sentences are constructed in order to convey the circuits and canals of Zanes’ stream of consciousness and even his perception process sometimes. Time is altered by perception and becomes spatialized in the story. We think about the witty reference to the Times and the “two Timeses for the price of one” (“Corrections” 19) that could ironically summarize the treatment of time in the short story where subjective time is juxtaposed to seasonal time. When reading “Canoe Repair,” we face two experiences of time: one that is subjective and distorted by experience, and the other that is universal and related to the seasons referred to in the story. The original structure of the story, its fragmentation, and connections to “Midcourse Corrections,” is a means for the author to present a subjective system of perception.

    When allowing the defamiliarizing elements of the story to change our reading, we penetrate a new experience of the world, of perception, and of time. For example, the image of the canoe passing is a recurrent pattern in the short story: “It came out of a cove as quiet as a deer swimming” (56), “[t]he canoe’s animal flanks and low length absorbed the two paddlers” (57), “[t]he lake was part of the canoe” (58), “[t]reading water, my hand upon the overturned canoe” (65), and so on. These allusions create a network of references to the symbolical meaning of the slow movement characteristic of an infinite moment. The personal experience of Zanes’ time transforms the time of the story: “But he wondered what the long bark canoe felt like. Its length and strong delicacy. Its secret speed. Its time” (64). The canoe has its particular pace, its own time. Reading “Canoe Repair” is experiencing canoe(ing) time.

    Works Cited

    Culler, Jonathan. On Deconstruction. Theory and Criticism after Structuralism. London: Routledge, 1983.

    Kawin, Bruce. Telling it Again and Again. Repetition in Literature and Film. Ithaca and London: Cornell UP, 1972

    Iser, Wolfgang. The Implied Reader. Patterns of Communication in Prose Fiction from Bunyan to Beckett. Baltimore and London: John Hopkins UP, 1974.

    McHale, Brian. Postmodernist Fiction. London: Routledge, 1996.

    McElroy, Joseph. “Canoe Repair.” The Review of Contemporary Fiction 10. 1. (Spring 1990): 56-79.

    _____ “Midcourse Corrections.” The Review of Contemporary Fiction 10. 1. (Spring 1990): 9-56.

    _____ “Neural Neighborhoods and Other Concrete Abstracts.” Tri Quarterly 34 (Fall 1975): 201-17.

    LeClair, Tom and Larry McCaffery. Anything Can Happen: Interviews with Contemporary American Novelists. Urbana: University of Illinois P,1983.

    Porush, David. The Soft Machine: Cybernetic Fiction. New York: Methuen, 1985.

    Saltzman, Arthur. The Novel in the Balance. Columbia: U of South Carolina, 1993.

    Tabbi, Joseph. Postmodern Sublime. Technology and American Writing from Mailer to Cyberpunk. Ithaca and London: Cornell UP, 1995.

    Tanner, Tonny. Scenes of Nature, Signs of Men. Cambridge and New York: Cambridge UP, 1987.

    Notes


              Green Festival, the largest sustainability event - part 2        
    Dog Flushies
    O problema de sacos plásticos + cocô de cachorro acabaram!
    A empresa dogflushies desenvolveu um saco biodeagradável que você coleta as sujeiras do seu amiguinho, joga na privada, dá descarga e pronto!
    O plástico em contato com a água se decompõe em 10 dias!
    Perfeito!




    Kate's Caring Gifts
    Sabe aqueles de brindes de firma como caneta, chaveiro e caneca personalizados? Então, agora é possível ter brindes green para sua companhia.
    Pense em jogos de talher feitos de bambu, ecobags, cantil...



    Green Dentistry
    Se você acha que já viu tudo em green, certeza que não pensou na possibilidade ter uma clínica dentária com práticas sustentáveis!

    The first dentist to make a serious commitment to green sustainable business practices in San Francisco. Dr. Patel takes a unique approach to combine dentistry and conserve the environment, using non toxic products, reducing waste and being minimally invasive.





    New Resource Bank
    Um banco que é líder em conhecimento green e business sustentável.

    The shareholders of New Resource Bank have built leading Bay Area companies as well as leading green and sustainable businesses. They are part of the New Resource Community, which the Bank draws upon to tap broader networks and knowledge to serve its clients. It’s the old fashioned benefits of a community bank matched together with an innovative bank.



    Eco Haus
    Materiais sustentáveis para a construção da sua linda casinha!



    TSdesign
    Quer silkar a camiseta? Então utilize tinta 100% a base de água, camiseta feita 65% de garrafa pet, 35% de algodão reciclado, 0% de pvc e derivados de petróleo.



    Pangea Organics
    Quero muito esse kit!


    Crucial Hemp
    Uma empresa dedicada 100% a erva e desenvolve produtos a base de marijuana.
    No green festival havia infinitos stands de roupas a base de hemp, no entanto, somente a crucial vendia linhas feitas de maconha.


    Adorei essas linhas para tecer! imaginem fazer crochês com isso! demais!



    Conscious Clothing
    Vestidos de noiva feitos a partir de seda de maconha. Ahhhhhhhhhhhhhhhhh


    Made green Video
    Um studio que faz videos empresariais com consciência ambiental, ou seja, visando o menor desperdício, utilizando opções de materiais sustentáveis e reciclados e de menor impacto no meio ambiente.
    Empresa meio caretinha né? Mas é uma idéia/ conceito que pode ser totalmente adaptada aos hype film production.



              PTV Academia – Doing research with and for robust software tools        
    Members of PTV’s Scientific Advisory Board and Scientific Network at the conference held at PTV’s head office in Karlsruhe in mid-July.

    Members of PTV’s Scientific Advisory Board and Scientific Network at the conference held at PTV’s head office in Karlsruhe in mid-July.

    “Excellent presentations and intensive discussions”, concluded Dr.-Ing. Klaus Nökel, Head of Technology Innovation at PTV, on the first ‘PTV Academia’ conference of the members of PTV’s Scientific Advisory Board and Scientific Network.Read more


              On its way to becoming a Smart City: Indian City of Pune        

    Iris Becker (centre) represents the Karlsruhe India Board Network in the Indian City of Pune and maintains close ties with PTV.

    Last weekend, the first India Summer Days took place in Karlsruhe (please also read our report).  We have seized the opportunity to conduct an interview with Iris Becker from Let’s Bridge IT.Read more


              The Worst of Super Bowl 49 Vol.VIII        
    Bye, Money Shot!
    For being the final Super Bowl that I "cover" here, it sure did not disappoint for drama.  I would say that it was one of the best ever until you realize that the Patriots won and fuck them so whatever.  There should not be any sort of asterisk attached (unless you are trolling and, in that case, asterisk your ass off).  The better team might not have won but the healthiest did and that makes sense.  Let's talk about the game itself. 

    The Wolf of Wall Street - I finally watched this movie over the weekend and while the tits and drugs and language were quite incredible and Jonah Hill's buck teeth were LOL, I couldn't help thinking that this movie was the exact same as Boiler Room only twice as long.  If I'm going to watch a movie about shady stock brokers, I'm going to need Businessman Vin Diesel dammit.  Good movie but should have never been nominated for an Oscar IMO.

    Bob Costas - I watched some of the never-ending pregame show and the former Newsradio guest star (beat up Joe Rogan!) was whining because the Commish stood him up for an interview.  He probably has a point though.  Shouldn't the head of the league talk to the network broadcasting the biggest game?  Fuck Goodell.  Someone should have murdered him after he tried to big time my girl, Rachel Nichols, last week.

    Not Dude Perfect - I had no idea who these guys were before yesterday.  Are they legit?  Because they are sick as all get out if that trick shot group is legit.

    Tom Izzo - I watched the second half and overtime of the WE ON/WE ON State game yesterday and while laughing at regular WE ON for having three players worth a shit, I couldn't help but notice that Sparty leads the nation in really light-skinned black guys.  They've got at least four.  It was unsettling to me.  WE ON sucks.

    Jeremy Lane - Did you see the picture of his arm snapping in half?  NASTY.  He pulled a Grumpy!

    Who the fuck is that guy? - That Chris Matthews cat has some skills.  I would ask "where did they find that guy" but Al and Chris told us where 40 times and also called him Hardba