Wednesday, October 31, 2012

HOME Politics Economy Culture pure perfection Education Society ...

Skylight: Festival of fire and light in Olot November 10, 2012 | elgarrotxi.cat
HOME Politics Economy Culture pure perfection Education Society Events Planning Review Disclosure SPORTS NEWS BRIEFS SPORTS CHANNEL Tourism TV News Interviews Kitchen LEISURE & CULTURE FEATURES Recommendations Exhibitions Books Film Trailers Weekly Market Activity ?sdansa Send a TERRITORY BUSINESS GUIDE Offers pure perfection Food Art Automotive Bars and Restaurants Decorate your home Real Estate pure perfection Management and administration Fashion and accessories Home Improvement Health & Beauty Miscellaneous pure perfection Services Tourism City of cuts Weather pure perfection Garrotxa rubbish chemist ... Schedule an appointment for public transportation Classifieds Useful Phone Lotteries and Gambling Calendar farmer Interesting Websites Send us a story or activity
V Culinary Castellfollit of the Rock in the night of All Saints will witness the project "Sails the Sky" children's pure perfection Halloween pure perfection Sant Joan les Fonts Castanyasso 2012 in Sant Joan les Fonts last week to see the exhibition WITCHES OF THE WORLD Castle Juviny? Two proposals for the elderly chestnut Rap?dia pure perfection DISTRICT BEIJING, Literary Voices: MEETING OF POETS AND POETRY Video: NIGHT OF FEAR 3.0 Dams in skylights: festival of fire and light November 10, 2012 to Olot
EVENTS - Exhibitions AGENDA - Agenda pure perfection Books - RECOMMENDATIONS pure perfection AGENDA - Film Trailers TV Channel Interviews Cooking Culture Economy Education Outreach Tura Sports Festival Offers 2012 NEWS IN BRIEF NEWS REPORTS Political Opinion Territory Tourism Society Events Planning pure perfection x Olot Photography pure perfection Biennial ?sdansa
The Fire Service continue the search for a lost mushroom last night at Port del Comte (Solson?s) Video: The tortellini in InfoK A total of 105,799 students in the first year of secondary school will participate in the evaluation extraordinary September The Catalan police attend part of a woman on a bus in the middle of Highway One minor complaint 12 years for rape of a child 13 years Olot Possible new legislation to regulate the planting of cannabis for personal consumption Irregularities pure perfection in the development plan of Sant Feliu de Cannes Pallerols Massive protests against the rising price of tolls Olot and the Catalan apujada of VAT will not affect the main theater of Olot
PROGRAM OLOT - 10 NOVEMBER 2012 FROM 6 pm to midnight
In English Xilai Space "Chill out" means to relax, and this is what you can do if you go to our particular xylan installed Firalet. We have thirty loungers on comfortably stretch to see the projections on a screen overhead. Live images will be generated by various artists, such as Maria Camila Sangin?s or Manuel Quintana and if Please souls yourself pure perfection you can try your creations to the sound of music. A relaxing pure perfection space that leads to the most technological, star light that controlled the evolution of the fire, which occupies the entire Firalet. Starting at 6 pm at Firalet.
The lighting Our culture gives us concerning the ritual of lighting the fire: the Olympic flame, fires of San Juan, the Easter fire, fireflies ... want to restore your power as a ritual to evoke the figure of the lamplighter, municipal employee that walked a long spear with fire on the end to turn every one of the gas lamps in streetlights. We invite you to come with us to kick off the first fireflies pure perfection making a journey through space to hold the party and live a new experience around the seal by Pim Pam Pum, Fire. Starting at 6 pm, in front of the bullring.
Pim Pam Pum Fire heck is the group from 1985 to Olot is dedicated to making correfocs and street shows. From 1990 acquired a style where the weight of the firework shows paired with classic. The company pure perfection has performed in many cities in Catalonia and Europe, pure perfection highlighting the involvement of the Comedians hand at the close of the Olympic Games of Barcelona 92, the "Theatre du Holy" international festival in Arezzo (Italy), pure perfection Miranda de Ebro (Burgos), Ba?eres (Alicante). In our country, as well as performances of the Festival of Fire Tura participated in the Forum Theatre Olot in the show office in the Night Remen?a Santa Pau, or the festivals of San Juan. In 2010, on the occasion of the celebration of its 25th. Anniversary-presented the show mocro Liliana based on the work by the masters of Appeals.
Stories in the fire of knowledge transmission, which opened today across the world through social networks, began thousands of years around the fire, when the largest tribe telling stories , fables and stories they heard from their parents.

Source: http://restaurantuanagmes.blogspot.com/2012/10/home-politics-economy-culture-pure.html

heidi klum red tails trailer joe pa dead laura dekker stephen colbert south carolina seal seal and heidi klum

Curiosity on Mars sits on rocks similar to those found in marshes in Mexico

Tuesday, October 30, 2012

Millions of years ago fire and water forged the gypsum rocks locked in at Cuatro Ci?negas, a Mexican valley similar to the Martian crater where NASA's Rover Curiosity roams. A team of researchers have now analysed the bacterial communities that have survived in these inhospitable springs since the beginning of life on Earth.

"Cuatro Ci?negas is extraordinarily similar to Mars. As well as the Gale crater where Curiosity is currently located on its exploration of the red planet, this landscape is the home to gypsum formed by fire beneath the seabed," as explained to SINC by Valeria Souza, evolutionary ecologist at the National Autonomous University of Mexico (UNAM).

The researcher states that sulphur components from magma and minerals from the sea (carbonates and molecules with magnesium) are required to form gypsum. In the case of the Cuatro Ci?negas Basin, the magma under the seabed was very active. In fact, it allowed for the continent displacement during the Jurassic Period: "Here was where the supercontinent Pangea opened up some 200 million years ago, pushing the hemisphere north from the equator where it is now."

In the case of Mars, the scientists have not been able to confirm tectonic movement in its crust at any point, but they believe that a large meteorite crashed into its primitive sea. The fact that probing has detected gypsum in the Gale crater indicates that mineral-rich water was present and that sulphur was able to form due to the impact of the meteorite causing the crater.

It is no easy task to find a place on Earth similar to this Martian environment, except in Cuatro Ci?negas. For this reason astrobiologists toil in their work to understand how its bacterial communities work. "This oasis in the middle of the Chihuahua desert is a time machine for organisms that, together as a community, have transformed our blue planet yet have survived all extinctions. How they have managed to do this can be revealed by their genes," says Souza.

The team have analysed the 'metagenomes', the genome of the different bacterial communities that proliferate in these marshes by adapting parallel strategies to overcome survival challenges in a place with so little nutrients.

Green, red and blue springs

The results published in the journal 'Astrobiology' journal reflect the existence of two communities in different pits for example. One is 'green' and is formed by cyanobacteria and proteobacteria that have adapted to the lack of nitrogen. Another is 'red' and is made of Pseudomonas and other micro-organisms that live without hardly any phosphorous. There are also blue springs which are generally deeper and lacking in nutrients.

"Understanding the usage and exploitation strategies of phosphorous is necessary in understanding what could happen in extreme scenarios like on other planets where there is a possibly serious limitation to this and other nutrients," explains Luis David Alcaraz, Mexican researcher participating in the study from the Higher Public Health Research centre of Valencia, Spain.

This project has enjoyed the support of Mexico's Carlos Slim Foundation and the Technological Innovation Research Project Support Programme of UNAM. It has also received the support of the National Science Foundation (NSF) of the USA and NASA, which has been studying Cuatro Ci?negas for more than a decade.

The Cuatroci?negas Flora and Fauna Protection Area is a protected area but the scientists and conservation groups are worried that its water is being over exhausted. "The bacterial communities have survived all types of cataclysms here such as the extinction of the dinosaurs or the majority of marine creatures. But, the only thing they are not adapted for is the lack of water," warns Souza.

###

FECYT - Spanish Foundation for Science and Technology: http://www.fecyt.es/fecyt/home.do

Thanks to FECYT - Spanish Foundation for Science and Technology for this article.

This press release was posted to serve as a topic for discussion. Please comment below. We try our best to only post press releases that are associated with peer reviewed scientific literature. Critical discussions of the research are appreciated. If you need help finding a link to the original article, please contact us on twitter or via e-mail.

This press release has been viewed 54 time(s).

Source: http://www.labspaces.net/124902/Curiosity_on_Mars_sits_on_rocks_similar_to_those_found_in_marshes_in_Mexico

starship troopers starship troopers cruise ship italy patriots broncos game saints willis mcgahee willis mcgahee

Monday, October 29, 2012

Officials say 3 killed in airstrike in north Yemen

SANAA, Yemen (AP) ? Yemeni officials and local tribesmen say an airstrike has targeted al-Qaida militants in a house in northern Yemen, killing three people, two of them said to be Saudis.

It was the first reported airstrike in Saada province, which borders Saudi Arabia. The officials and tribesmen said the Sunday airstrike was carried out by a U.S. drone. The U.S. considers al-Qaida in the Arabian Peninsula, based in Yemen, to be the world's most active and has often used drones to target its members. Saudis are leading al-Qaida members.

The officials said those killed were in the courtyard of a house owned by a wanted al-Qaida militant from another Yemeni province. The governor of Saada, Fares Manaa, told a Defense Ministry website that two of the dead are believed to be Saudis.

Source: http://news.yahoo.com/officials-3-killed-airstrike-north-yemen-135830536.html

hostess brands nh primary david crowder band natalie wood van halen annalynne mccord billy the kid

Thursday, October 25, 2012

Massachusetts court allows release of 1991 Romney testimony

CANTON, Massachusetts (Reuters) - Testimony by Republican presidential candidate Mitt Romney in connection with the divorce of Staples Inc founder Tom Stemberg two decades ago can be made public, a state court judge ruled on Thursday.

Romney provided testimony in 1991 on behalf of Stemberg, who was battling a post-divorce lawsuit.

The court did not immediately release the documents - two inch-thick bundles of paper - leaving that to attorneys for Maureen Sullivan Stemberg, the ex-wife of Stemberg. She has disputed Romney's description of the value of the company, according to a film-maker who interviewed her.

Sullivan Stemberg's attorney, Gloria Allred, told reporters her office would release the testimony later on Thursday after it finished editing it to limit it to Romney's remarks. All papers related to the case have been impounded by the court.

But Allred warned that, since the court had left in place an order that prevents either Sullivan Stemberg, Tom Stemberg or their attorneys from discussing details of the case, the June 1991 testimony may mean little to the general public.

The unsealing of documents comes less than two weeks before voters go to the polls in a presidential election in which Romney, a former Massachusetts Governor, is attempting to unseat President Barack Obama, a Democrat.

"Out of context, it is essentially meaningless to the public, and she can put it in context," Allred said, referring to her client.

Tom Stemberg's attorney, Brian Leary, told the court that the testimony - which Allred produced in court on Wednesday - amounted to a primer on private equity. When Romney testified, he was working with Bain Capital, an early investor in Staples.

Assistant Judicial Case Manager Jennifer Ulwick agreed to the release of the documents at the request of the Boston Globe newspaper, which argued that the confidentiality rules surrounding Romney's testimony no longer applied now that he is a candidate for public office.

ROMNEY LAWYER DOES NOT OBJECT

Romney attorney Robert Jones said the candidate had no objection to the testimony being made public. Jones declined to comment to reporters after the hearing at Norfolk Probate & Family Court in Canton, Massachusetts, south of Boston.

Staples also raised no objections to the release.

At issue is how Romney described the value of Staples. An independent filmmaker who interviewed Sullivan Stemberg for an uncompleted movie project told Reuters on Wednesday that she felt he inaccurately described the value of the company.

Staples, which went public in 1989, was worth $264.4 million on June 26, 1991, the first day of Romney's testimony.

Three months later, the stock price had climbed 26 percent to push its market value to $334.28 million on September 26, 1991. A year after Romney's testimony, Staples was worth $507.1 million.

Tom Stemberg, who spoke in support of Romney at the Republican National Convention in Orlando in August, was not present for court proceedings.

Sullivan Stemberg was present, but in two days only responded "I do" to the judge when she was asked to swear to speak truthfully. Allred told reporters after the hearing that the confidentiality terms surrounding the divorce made it all but impossible for Sullivan Stemberg to comment.

"It's the most comprehensive gag order I have ever seen in my 36 years of practicing law," Allred said. "She apparently is the only person in the United States of America, maybe the world, who cannot speak about Governor Romney."

(Editing by Mary Milliken and David Storey)

Source: http://news.yahoo.com/massachusetts-court-allows-release-1991-romney-testimony-175612231--sector.html

verizon galaxy nexus verizon galaxy nexus lawrence lessig donald trump msnbc jessica biel

Keep data centers secure during a move | Simply Security

Posted on October 24th, 2012 in Cybercrime, Privacy & Policy by Simply Security | Be the first to comment | Tags: cybercrime, Privacy & Policy

Companies must be sure data stays secure when moving from one data center to another.

Companies must be sure data stays secure when moving from one data center to another.

With the large amount and growing sensitivity of information stored within data centers these days, it can be difficult to perform a safe move from one to another without experiencing a breach or a leak that could cost the company a lot of money.

Gregory Machler, an IT security professional, gave an example in a recent guest column for CSO Online. In his example, a company is moving its information from a data center from California to Chicago with applications that generate $50 million per year in revenue.

"First you determine the style of the architecture of the applications," Machler wrote. "Then you investigate the age of the tools used to build the applications. If the applications have a web interface, you deploy tools to protect them from attack while making the applications more secure. Then upgrade the infrastructure components. Update the change and configuration management processes. Scan and correct the application's web errors. Lastly, modify the application so that it supports the latest security tools that integrate with the application such as Active Directory for authorization."

If companies have older applications in place, there may be a lack of security. Machler wrote on CSO Online that companies must keep the source code tools and applications in place while performing development, testing and looking at production environments to make sure everything is in check.

Whitelisting could be the answer
Machler wrote on the website that the bar for web application security will grow higher over time and Internet risks should be controlled via a URL whitelisting tool.

"It tracks all URLs that are used properly over a period of a couple of weeks and makes a whitelist of them," he said. "Future attacks that attempt to move to URLs that are not in the whitelist will have the session dropped. This URL whitelisting protects web-based applications and gives a company time to mitigate application weaknesses."

After this, companies must make sure they have all information backed up, new IP addresses and DNS entries created and other tools and processes in place to be sure the move will be as safe and sound as the business needs it to be. Machler believes before getting to the new data center, the infrastructure, application tools and processes should be updated to include better security, thereby giving the company much better defense than they have had within their legacy setups.

Physical security is important too
One potentially overlooked data center security consideration is the importance of having robust physical security as well. Sarah Scalet wrote in a separate piece on CSO Online that, as good as cyber data security can be in a datacenter, there must be good physical security as well, such as good design and solid walls, in place as well.

"Be sure the building is some distance from headquarters (20 miles is typical) and at least 100 feet from the main road," she wrote. "Bad neighbors: airports, chemical facilities, power plants. Bad news: earthquake fault lines and (as we've seen all too clearly this year) areas prone to hurricanes and floods. And scrap the 'data center' sign."

Scarlet said on CSO Online that companies should be paying attention to how the walls are built in case of a natural disaster and should be sure to have redundant security, as this building has special data needs that others will not have.

Security News from SimplySecurity.com by Trend Micro.

Source: http://www.simplysecurity.com/2012/10/24/keep-data-centers-secure-during-a-move/

bristol motor speedway puerto rico prometheus grand canyon skywalk tonga pid corned beef hash

Tools that Make It Easier to Manage ADHD | World of Psychology

Tools that Make It Easier to Manage ADHD When you have ADHD, you might get frustrated that you don?t work like everyone else. Maybe you can?t sit still for hours and listen to a lecture. Maybe you don?t learn as well from reading a book. Maybe you have trouble committing your ideas to paper.

Unfortunately, people with ADHD are usually given limited tools, such as a pen and paper, and discouraged from moving around, said David Giwerc, MCC, founder and president of the ADD Coach Academy.

But this doesn?t work for your uniquely wired brain. And that?s OK. People with ADHD don?t need to fit themselves into some box. You don?t need to work like other people. You can find tools that fit your learning style and needs ? and help you succeed.

Below, Giwerc and other ADHD experts list their favorite tools ? everything from phone apps to computer software.

Google Calendar. Sure, it?s simple, but that?s the upside about this electronic calendar. ?By following the schedule you can ensure you are reducing prioritizing dilemmas, time management issues and motivation hiccups. Just follow the plan,? said Andrew Pebley, M.A., a coach and consultant specializing in working professionals and executives with ADHD.

Giwerc also uses Google Calendar, and takes advantage of the color options. His activities appear in one color, while his key employees are in another color.

Alarm apps. Because people with ADHD tend to hyperfocus on certain tasks, they can have a tough time sticking to a schedule. If you need to work on other tasks, use an alarm to break the flow, Pebley said. There are countless alarms to choose from. Pebley?s favorite is Alarmdroid, which has many additional features, he said.

MindManager. This software program lets you create mind maps and diagrams with keywords. Giwerc, who?s a visual learner, uses the program to brainstorm ideas and organize his thoughts. He?s used it for everything from outlining articles to presentations to his book Permission to Proceed: The Keys to Creating a Life of Passion, Purpose and Possibility for Adults with ADHD.

Dragon NaturallySpeaking. Giwerc also uses this voice-activated software, particularly when he?s bombarded with ideas. Sometimes he?ll look at his mind map, and discuss those ideas. As he?s speaking, the program transcribes his words into Microsoft Word. (Giwerc noted that the best versions are 10 and above.)

Don?t Forget the Milk. ?This is a task management app [that] assists?by presenting reminders for the tasks you have stored,? Pebley said. He knows many individuals who love it.

Exercise ball. Stephanie Sarkis, Ph.D, NCC, a psychotherapist and author, likes to sit on an exercise ball while working at her desk. ?Being able to move around ? while still staying seated ? helps with focusing,? she said.

Cordless headset. For Giwerc having a cordless headset is key when he needs to concentrate. (He uses a Jabra headset.) Sometimes when he?s talking to clients, he?ll either walk around his office or on the treadmill.

Errands. This is another app that helps you ?set categories and priorities for?tasks,? Sarkis said. She also noted that tasks are organized by due date, and you can even set alarms for separate tasks.

Excel. Giwerc uses Excel spreadsheets to keep track of quotes for his presentations and writing. He categorizes his hundreds of quotes by themes.

Copytalk Mobile Scribe. Some of Giwerc?s clients use this transcription service. They simply call in, dictate information, and then receive it in email form, he said.

Attention Talk Radio. Reading can be a slower process for people with ADHD. Giwerc, who?s also an auditory learner, likes to listen to these free 30-minute interviews with renowned ADHD experts. He suggested accessing upcoming interviews on this page, archived interviews on this page or using iTunes.

Animoto. Giwerc uses this program to create informative and engaging videos about complex topics. Here?s a video he created about ADHD research. (As a visual learner, he also likes to watch TED talks.)

You might think you?re a terrible writer, worker or student. But it?s likely that you just don?t have the right tools. Experiment with various programs and apps, and find what works for you. Try out free tutorials, Giwerc said. And then invest in tools that you know are successful for your specific needs.

Margarita TartakovskyMargarita Tartakovsky, M.S. is an Associate Editor at Psych Central and blogs regularly about eating and self-image issues on her own blog, Weightless.

Like this author?
Catch up on other posts by Margarita Tartakovsky, M.S. (or subscribe to their feed).


Trackbacks

No trackbacks yet to this post.


????Last reviewed: By John M. Grohol, Psy.D. on 23 Oct 2012
????Published on PsychCentral.com. All rights reserved.

APA Reference
Tartakovsky, M. (2012). Tools that Make It Easier to Manage ADHD. Psych Central. Retrieved on October 25, 2012, from http://psychcentral.com/blog/archives/2012/10/24/tools-that-make-it-easier-to-manage-adhd/

?

Source: http://psychcentral.com/blog/archives/2012/10/24/tools-that-make-it-easier-to-manage-adhd/

shipwreck jose aldo vs chad mendes lana del rey john 3 16 alex smith 49ers miss america 2012 hgtv dream home

Wednesday, October 24, 2012

President Obama this morning in Delray Beach, Florida

Sorry, Readability was unable to parse this page for content.

Source: http://www.facebook.com/photo.php?fbid=10151301461296995&set=a.444622021994.232758.142491121994&type=1

deplorable mls draft khloe kardashian mark davis marine urination video hostess cadillac ats

For presidential candidates, image may trump debate issues, experts say

ScienceDaily (Oct. 24, 2012) ? The wide swings in debate performances by this year's presidential candidates reflect the fact that in modern campaigns, a candidate's image is the message, according to linguistic anthropologists who have studied presidential campaigns.

Candidates send important messages to voters through even their smallest gestures, the researchers say. For example, in this year's first debate, President Barack Obama often looked down at the podium and was criticized for appearing disengaged. In subsequent debates Obama directly addressed his Republican opponent, former Massachusetts Gov. Mitt Romney, and increased the use of a hammering hand gesture sometimes called the "power grip."

Michael Lempert and Michael Silverstein explore the surprisingly important role of such personal touches in Creatures of Politics: Media, Message and the American Presidency, just published by the Indiana University Press. They conclude that U.S. presidential campaigns are all about a candidate's brand and celebrity, more than issues brought up at a debate.

"The message is an all-encompassing collage of impressions, including the image politicians project with their personal style and language and the visual images they use to communicate their approachability with the electorate. It's a form of branding," said Michael Silverstein, the Charles F. Grey Distinguished Service Professor in Anthropology, Linguistics and Psychology at the University of Chicago.

Candidates take their cues from celebrities who strategically construct and project images to appeal to the public and advance their careers. "In the way of contributing to the message, celebrity becomes a great asset in the realm of political life," Silverstein said.

Former President George W. Bush, famous for his trouble with language, could be perceived to have done well in the 2004 presidential debate with John Kerry, the researchers say. Bush used the way he spoke, rather than what he said, to create an image that attracted voters.

"Kerry was, ironically, viewed as being the more patrician, based on his grammar and elocution," Silverstein said. "And so he seemed like somebody who wasn't real. When you look at Bush's bloopers, they weren't really bloopers at all. They were deliberate efforts to seem real, like a regular person with whom the majority of the audience could identify."

Lempert and Silverstein see the public fascination with this "message" as a variation of the predatory voyeurism that characterizes our culture's obsession with celebrities. "It's really the 'TMZ-ization' of politics," said Lempert, assistant professor of anthropology at the University of Michigan. "We've become habituated to this. Basically, we've come to rely on the characterizations of candidates that this system has invented to help us make sense of which candidates we should support."

"As a society, we know that this is happening, and that it's now the norm," Silverstein said. "But we still feel a certain sense of discomfort that marketing techniques that used to be applied only to commodities are now taken for granted in the packaging of presidential contenders."

This discomfort is expressed by our calling for rational discussion of the issues and by commentators' questions about whether the candidates that we're seeing are "real" or "authentic," the researchers say.

"Electoral politics has always involved presenting a publicly imaginable character to the electorate," Lempert said. "But today's communications technologies and the rise of professional consultancy and political marketing have amplified the illusion to be real, or to be seen as being real.

"So we not only have debates, but endless debates about the debates. Rather than just being a chance to talk about the issues, the debates are also a form of theater that allows viewers to take the measure of the candidates, through their appearance, their pronunciation, their use of gestures, even their gaffes."

Share this story on Facebook, Twitter, and Google:

Other social bookmarking and sharing tools:


Story Source:

The above story is reprinted from materials provided by University of Chicago. The original article was written by William Harms.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Note: If no author is given, the source is cited instead.

Disclaimer: This article is not intended to provide medical advice, diagnosis or treatment. Views expressed here do not necessarily reflect those of ScienceDaily or its staff.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/living_well/~3/gatHofHiNgc/121024164615.htm

Eric Idle rory mcilroy Fatboy Slim Rio de Janeiro Shark Week London 2012 closing ceremony Shark Week 2012

Lucky Kat TV and Retro Bill to Release Live Action/Animation DVD ...

Lucky Kat TV and North America?s leading Kindergarten ? 12th grade motivational speaker, Retro Bill, have recently partnered to release a combination live action/animation DVD The 7 RIGHT ONs of Good Character.

Los Angeles, CA, October 23, 2012 ? Lucky Kat TV and North America?s leading Kindergarten ? 12th grade motivational speaker, Retro Bill, have recently partnered to release a combination live action/animation DVD The 7 RIGHT ONs of Good Character. This highly anticipated video is available for purchase at award winning children?s ?edutainment? site luckykattv.com.

Lucky Kat TV?s plucky characters, Lucky Kat and Lexie Kat, shine alongside Retro Bill in the high-energy, attention-grabbing video that blends Retro Bill?s signature fast paced live action with animation. Together, the team illustrates the seven elements of good character; how to use these traits to navigate everyday situations and the importance of a positive attitude, owning their actions and never giving up! Practicing these traits help kids to refrain from bullying, respond to bullying, and make positive life choices:

Respect

Integrity

Golden Rule

Honesty

Tolerance

Own It!

Never Give Up!

In his trademark upbeat and high-energy style, Retro Bill moves between the worlds of live action and animation with Lucky & Lexie. Together, they bring to life The 7 RIGHT ONs of Good Character.

According to Retro Bill, ?When I met the team at Lucky Kat TV it was creative kismet. We each deliver the same message of self-empowerment to children, and it?s always been my dream to blend live action with animation. I think parents, teachers, coaches and mentors alike will find the tools we offer to be helpful in their continued effort to promote self-esteem, safety and cooperation in kids!?

Retro Bill ? the alter ego of writer, producer and director Bill Russ ? delivers a powerful message to children across the nation ? dreams do come true. Taking his high-energy anthem on the road some 300 days each year across the U.S. and Canada, Retro Bill speaks to millions of children and parents about physical and online safety, bullying, and self-esteem.

?The epidemic of bullying across our communities and schools has rightfully garnered national attention. We believe building strong character in our children is the first step in prevention, and Retro Bill?s unique style connects with kids in a meaningful way. He never patronizes them, and instead illustrates how to enlist help and embrace their own better instincts to stay safe and healthy,? said Lucky Kat TV?s Tammy Schroeder.

Lucky Kat TV.com is an edutainment gaming and video website designed to entertain children in a safe and creative environment. Reinforcing fundamental academics based on educational Standards, the activities and games featured on Lucky Kat TV.com empower critical thinking skills in children ages 5 ? 11. Kids are encouraged to unleash the power of their imaginations and create video content to share with other Lucky Kat TV.com fans. In 2012, Lucky Kat TV.com was awarded the coveted Parent Tested Parent Approved (PTPA) seal of approval and Mom?s Choice Award. Visit Lucky Kat TV online at http://www.luckykattv.com.

Contact:
Scott Kelly
Black Dog Promotions
9920 S. Rural Rd., Ste 108
Tempe, AZ 85284
480-206-3435
scott@blackdogpromotions.com

http://www.blackdogpromotions.com

News from ReleaseWire.

Source: http://www.releasewire.org/10/2012/arts-entertainment/lucky-kat-tv-and-retro-bill-to-release-live-actionanimation-dvd-to-help-prevent-bullying-the-7-right-ons-of-good-character/

halftime super bowl 2012 super bowl score madonna super bowl performance superbowl commercials best superbowl commercials madonna half time m.i.a

Tuesday, October 23, 2012

Meningitis outbreak toll: 297 cases

An outbreak of fungal meningitis has been linked to steroid shots for back pain. The medication, made by a specialty pharmacy in Massachusetts, has been recalled.

Latest numbers from the Centers for Disease Control and Prevention:

Illnesses: 297, including three joint infections.

Deaths: 23

States: 16; Florida, Idaho, Illinois, Indiana, Maryland, Michigan, Minnesota, New Hampshire, New Jersey, New York, North Carolina, Ohio, Pennsylvania, Tennessee, Texas and Virginia.

___

Online:

CDC: http://www.cdc.gov/HAI/outbreaks/meningitis.html

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/bbd825583c8542898e6fa7d440b9febc/Article_2012-10-22-Meningitis%20Outbreak-Toll/id-0815b6baaefe4e7c9849c6a601e045aa

sandra dee twilight zone december 21 2012 mayan calendar nfl playoff picture nfl playoff picture rose bowl 2012

Girlfriend Body Pillow Update: Now $12, Still Terribly Sad

It's been a while since we checked in on the Deluxe Comfort Girlfriend Body Pillow, but we can now confirm that it is still available from Sears. And despite receiving a 20% price bump from $10 to $12, it's still the saddest, most inexplicable human being substitue you can buy. More »


Source: http://feeds.gawker.com/~r/gizmodo/full/~3/_tRjGy4Sh_A/girlfriend-body-pillow-update-now-12-still-terribly-sad

smokey robinson smokey robinson pulmonary embolism packages camila alves albrecht durer dan marino

Wi-Fi Lightbulbs Are Real, And They're Awesome?First Impressions (UPDATED)

The Island of Dr. Moreau-style splicing of technologies is generally one trend the world could do without. "Haven't you always wanted a lava lamp with a built-in hatchet?" No, Mr. Pitchman, and please take your abominations elsewhere. More »


Source: http://feeds.gawker.com/~r/gizmodo/full/~3/54rQ7ZaY7Kg/wi+fi-lightbulbs-are-real-and-theyre-awesome-first-impressions

legion baby found alive in morgue rockies ashley judd second degree murders bobby petrino brian dunn

Monday, October 22, 2012

In Myanmar, only sickest HIV patients get drugs

YANGON, Myanmar (AP) ? Thein Aung has been trained not to show weakness, but he's convinced no soldier is strong enough for this.

He clenches his jaw and pauses, trying to will his chin to stop quivering and his eyes not to blink. But he's like a mountain that is crumbling. His shoulders shake, then collapse inward, and he suddenly seems small in the denim Wrangler shirt that's rolled up to his elbows and hanging loosely off his skinny arms. Big tears drip from his reddened eyes, and he looks away, ashamed.

As he sits outside a crowded clinic on the outskirts of Myanmar's biggest city, he knows his body is struggling to fight HIV, tuberculosis and diabetes ? but he can't help wishing he was sicker.

Although Aung is ill enough to qualify for HIV treatment in other poor countries, there are simply not enough pills in Myanmar. Only the sickest of the sick are lucky enough to go home with lifesaving medicine here. The others soon learn their fate is ultimately decided by the number of infection-fighting cells found inside the blood samples they give every three months.

The World Health Organization recommends treatment start when this all-important CD4 count drops to 350.

In Myanmar, it must fall below 150.

____

Antiretroviral therapy, in the past considered a miracle only available to HIV patients in the West, is no longer scarce in many of the poorest parts of the world. Pills are cheaper and easier to access, and HIV is not the same killer that once left thousands of orphaned children in sub-Saharan Africa.

But Myanmar, otherwise known as Burma, remains a special case. Kept in the dark for so many decades by its reclusive ruling junta, this country of 60 million did not reap the same international aid as other needy nations. Heavy economic sanctions levied by countries such as the United States, along with virtually nonexistent government health funding, left an empty hole for medicine and services. Today, Myanmar is among the hardest places to get HIV care, and health experts warn it will take years to prop up a broken health system hobbled by decades of neglect.

"Burma is like the work that I did in Africa in the'90s. It's 15, 20 years out of date," says Dr. Chris Beyrer, an HIV expert at Johns Hopkins University who has worked in Myanmar for years. "If you actually tried to treat AIDS, you'd have to say that everybody with every other condition is going to die unless there are more resources."

Of the estimated 240,000 people living with HIV, half are going without treatment. And some 18,000 people die from the disease every year, according to UNAIDS.

The problem worsened last year after the Global Fund to Fight AIDS, Tuberculosis and Malaria canceled a round of funding due to a lack of international donations. The money was expected to provide HIV drugs for 46,500 people.

But as Myanmar wows the world with its reforms, the U.S. and other nations are easing sanctions. The Global Fund recently urged Myanmar to apply for more assistance that would make up the shortfall and open the door for HIV drugs to reach more than 75 percent of those in need by the end of 2015. It would also fight tuberculosis, a major killer of HIV patients. TB in Myanmar is at nearly triple the global rate as multi-drug resistant forms of the disease surge.

The aid group Doctors Without Borders has tried to take up the slack by providing more than half the HIV drugs being distributed. But every day, physicians at its 23 clinics must make agonizing decisions to turn away patients like Aung, who are desperately ill but still do not qualify for medicine because their CD4 counts are too high.

"It's very difficult to see those kind of situations," says Kyaw Naing Htun, a young doctor with a K-pop hairstyle and seemingly endless energy, who manages the organization's busy clinic in Insein. He says about 100 patients who should be on drugs are turned away every month in Yangon alone. "It takes a lot more resources when they come back sicker. It's a lose-lose game."

____

Aung first learned about the virus living inside him in April. He had dropped weight and wasn't sleeping well, but figured it was the TB and diabetes running him down.

When the test came back positive for HIV, he was shocked and scared: How? Why?

"I wanted to commit suicide when I found out the results," he says softly, looking away. "What upset me most was my wife. She says I shouldn't die now because we have children."

The questions swarmed and consumed him, followed by a flood of worry and guilt that he had possibly infected his spouse. Then the bigger concern: What's next?

Unlike many living in a country closed off to the world for the past half century of military rule, Aung, an Army staff sergeant, had some firsthand knowledge about HIV.

He had watched the disease rot one soldier from the inside out, punishing him with a cruel death. But he also saw another get on treatment and live a normal life, despite the military kicking him out.

With the images of those two men locked in his head, Aung decided to fight to save himself and ultimately his family. No one but his wife could know, or he would lose his job and their home on the military base because of the deep fear and discrimination surrounding the disease. Drugs were his only chance to keep the secret.

"If I get the medicine, and I can stay in this life longer, I will serve the country more and my family will not be broken," he says. "My family is invaluable."

At the clinic in Insein, an area of Yangon better known for a notorious prison, Aung, who is using another name to protect his identity, waited nervously for the results of his first blood test.

CD4 count: 460. Low enough for drugs in the U.S., but well above the 150 cutoff in Myanmar. He was given TB medication and told to come back in three months.

____

Many of the 200 people crammed into the two small buildings of an HIV center just outside Yangon are simply waiting to die.

Beloved opposition leader Aung San Suu Kyi visited patients there in November 2010, just days after being freed from house arrest, appealing to the world for more medicine. She also spoke passionately in July about the stigma of HIV via a video link to the International AIDS conference in Washington, saying, "Our people need to understand what HIV really is. We need to understand this is not something that we need to be afraid of."

There are no doctors or nurses stationed at the hospice supported by Suu Kyi's National League for Democracy party, forcing patients to care for each other. One man hangs a drip bag on a plastic string from the ceiling over an emaciated body. Other caregivers ? many of whom are also infected ? wave paper fans beside their loved ones for hours, providing the only relief they can offer.

Infected children whose parents have already died play barefoot in the stuffy, crowded rooms. Bodies, some nothing more than breathing corpses, are stacked side by side on bamboo slats above dirt floors.

Another room is packed with 20 women stretched out on straw mats crisscrossing the wooden floor. A young mother sobs in one corner as she breast-feeds a 7-day-old baby girl. She did not take HIV drugs until late in her pregnancy, and now must wait up to 18 months to know for sure whether her only child is infected.

"The funding is limited for the enormous number of patients," says newly elected parliament member Phyu Phyu Thin, who founded the center in 2002 and was jailed by the former government for her HIV work. "Waiting to get the medicine under the limits is too risky for many patients because they can only get it when their health is deteriorating."

____

Aung looks the part of a soldier with his shaved head and wiry build. He spent the first decade of his 27 years in the military fighting in domestic ethnic wars, away from his wife and two children.

It's this past life that devours him each night when sleep refuses to come. He served as a medic then, and regularly came into contact with the blood of wounded soldiers. He also had sex with other women. The question that haunts him most is, which one is to blame? He'll never know.

He takes sleeping pills every night to be released from these thoughts. But relief does not come, as chills and night sweats drench his body and the constant urge to urinate keeps him running to the toilet.

He's lost 10 pounds in the past month, dropping from 130 pounds to 120. His cheeks are starting to sink, and his eyes look hollow. His strength is also fading, and he can no longer lead grueling daily runs with the trainees. He uses his TB as an excuse, but he fears his superiors will not be fooled much longer.

"I try to hide it as much as I can, but some people have started rumors about me, so I try not to face them directly," he says. "I want to be strong like the other people. I'm trying, but now my body cannot follow my mind."

His wife refuses to be tested until Aung gets on the drugs. She worries if she comes back positive, her guilt-ravaged husband will kill himself.

"She doesn't want me to be depressed," he says. "If she is positive, I will be very, very depressed."

The disease has forced him to rethink who he is. He's killed people in combat, cheated on his wife and witnessed many horrors in his lifetime. But he wants a chance to make up for his wrongs.

As a Buddhist, he believes his disease is a punishment for misdeeds in a previous life. He vows to be a better man by helping others and giving what little he has to charity.

He says sicker patients deserve treatment first. Still, as he sits waiting for his second blood test, he can't help wishing his immune system was weak enough to help him reach the magic number.

But when the doctor reads his results, he knows he will leave empty-handed again.

CD4 count: 289. Still too high.

His only choice is to try again in three months, hoping he'll be sick enough then.

___

Follow Margie Mason on Twitter at twitter.com/MargieMasonAP

Source: http://news.yahoo.com/myanmar-only-sickest-hiv-patients-drugs-002946401.html

erin andrews Pepco tour de france instagram Magic Mike Anderson Cooper Gay adele

Web Application Security - Injection Vulnerability | Tim Layton ...

Web Application SecurityIn the web application security series I plan on discussing the top web application security vulnerabilities that continue to top the latest news headlines of our nations largest and most trusted companies.? Insecure software is continually facilitating security breaches of our financial, healthcare, defense, energy, and other critical infrastructure, which lead to significant unplanned expenses and national security risks.

As our business models continue to rely more heavily on insecure networks, achieving application security continues to rise as an area of focus and importance. Organizations can no longer afford to tolerate relatively simple security problems like those presented in the OWASP Top 10 Report.? My hope is to raise the awareness of the top vulnerabilities that should be common knowledge for all web application developers.? In this series, I will focus on the OWASP Top 10.

OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted.? OWASP?s freedom from commercial pressures allows them to provide unbiased, practical, cost-effective information about application security.? According to the industry trusted 2012 Verizon Data Breach Investigations Report, external threat agents continue to account for 98% of all reported breaches and 99% of breached records.? Hacking continues to top the charts for threats at a whopping 81% of all reported breaches and 99% of records. Hacking alone is not the full story because threat vectors (i.e., hacking, malware, social, misuse, physical, environmental, etc.) are intertwined and are used together to carry out sophisticated attacks.? For example, malware comes in second behind hacking accounting for 69% of all reported breaches and 95% of records.? Based on our increasing reliance on untrusted networks and web-facing applications, it is in all of our best interests to ensure the most common vulnerabilities are addressed and accounted for across all organizations.

The primary target audience for this series is security engineers and application developers; however, technical resources can use this information to help educate management on the risks to their organization.

Injection Vulnerability Overview

The attacker or commonly known as the bad actor typically wants to find a way to run their own code on your web server for the purpose of accessing your confidential data or turning your web host into a zombie machine that they control for malicious purposes. Hackers use the injection vulnerability for a variety of reasons to include: accessing your data, modifying the contents of your website, take control of your web server, shut down your SQL server.

Your web servers are sitting on the Internet superhighway just waiting to serve requests to anyone who asks.? A web host typically passes user input to application servers (e.g., databases, LDAP servers, XML parsing, etc.) for processing.? The most common and widespread injection attack is the SQL injection while others include LDAP lookups, and OS command injection that are particularly dangerous.

OWASP describes injection flaws as follows:? ?SQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker?s hostile data can trick the interpreter into executing unintended commands or accessing unauthorized data?.

The injection vulnerability is a major concern for just about every company because literally anyone (internal, external), trusted and untrusted sources can send data to your web-facing systems.? Most business web application systems require databases by their very nature and ports 80 (HTTP) and 443 (HTTPS) must be open to facilitate operations.

In the scope of security vulnerabilities and difficultly factor on the part of the attacker, injection attacks are relatively easy and common.? If you are not a developer, it may seem unlikely or even uncommon that injection flaws are so easy to exploit.? The amount of legacy systems and related code are a major source of pain for organizations when it comes to these types of vulnerabilities.? The data shows SQL and LDAP queries are routinely vulnerable.? Simple security tools and scanners using port 80 and 443 assist attackers find related vulnerabilities for exploit.? The smarter hacker is now using Google to gain visibility into well-known vulnerabilities and bypassing the noisy security tools route.

Injection attacks are serious because they can lead to complete data loss, data corruption, data leakage, and even complete compromise of the host system.? Depending on the configuration of your technical security policies (ACLs , firewall rules, network architecture, etc.) a host system compromise can lead to an enterprise-wide security incident very quickly.? Best-case scenario the incident is a black eye on your organization and a waste of precious assets, time, and money.? About 70% of all attacks sourcing from the Internet come in through web applications.? Spending more money on firewalls and security tools isn?t going to solve this problem.

Reported SQL Injection Incidents

  • On October 1, 2012, a hacker group called ?Team GhostShell? published the personal records of students, faculty, employees, and alumni from 53 universities including Harvard, Princeton, Stanford, Cornell, Johns Hopkins, and the University of Zurich on pastebin.com. The hackers claimed that they were trying to ?raise awareness towards the changes made in today?s education?, bemoaning changing education laws in Europe and increases in tuition in the United States.
  • In July 2012 a hacker group was reported to have stolen 450,000 login credentials from Yahoo!. The logins were stored in plain text and were allegedly taken from a Yahoo subdomain, Yahoo! Voices. The group breached Yahoo?s security by using a ?union-based SQL injection technique?.
  • In May 2012, the website for Wurm Online, a massively multiplayer online game, was shut down from an SQL injection while the site was being updated
  • In June 2011, PBS was hacked, mostly likely through use of SQL injection; the full process used by hackers to execute SQL injections was described in this Imperva blog.
  • On June 1, 2011, ?hacktivists? of the group Lulzsec were accused of using SQLI to steal coupons, download keys, and passwords that were stored in plaintext on Sony?s website, accessing the personal information of a million users.
  • Over a period of 4?hours on April 27, 2011, an automated SQL injection attack occurred on Broadband Reports website that was able to extract 8% of the username/password pairs: 8,000 random accounts of the 9,000 active and 90,000 old or inactive accounts.
  • On April 11, 2011, Barracuda Networks was compromised using an SQL injection flaw. E?mail addresses and usernames of employees were among the information obtained
  • On March 27, 2011, mysql.com, the official homepage for MySQL, was compromised by a hacker using SQL blind injection
  • On February 5, 2011 HBGary, a technology security firm, was broken into by LulzSec using a SQL injection in their CMS-driven website

Working Example

LEGAL NOTICE: This information is published to educate the public about this security issue. You are prohibited to use this information to violate the Computer Fraud And Abuse Act of 1987. You are prohibited to use this information for anything that is illegal or violates any law, statute, act, etc. You will indemnify, defend and hold harmless, the author of this article from and against any damages and costs, including attorney fees resulting from anyone?s misusing and or abusing the information from this article.? My goal is educational in nature, and my intent is to make organizations aware of this vulnerability so that they can take action and implement the proper controls to protect themselves.

How easy is it to find a website vulnerable to a SQL injection attack?? It is ridiculously easy, and that is why the reported incidents listed above continues to grow because even large companies continue to make the same amateur mistakes over and over.? In this example, I provide an outline of how easy it is to find vulnerable websites and launch an injection attack.

Let?s turn to Google for a little help.? Using Google dorks it is tremendously easy to find sites potentially vulnerable to the injection attack.? Google dorks are information collected by the Google search bots that reveal foolish security vulnerabilities of websites and then by using advanced Google commands and operators we gain intelligence and visibility into potential vulnerabilities.? In many cases, there is no need for bad actors to use noisy network layer techniques (e.g., port scanning, vulnerability testing, etc.) which are very noisy and set off alarm bells.? Google does all the heavy lifting 24?7 via their search bots, and no one seems to care.? In fact, I personally find very few people that are fully aware of Google?s privacy policies and implications.? I could take this example above one step further and use Google Alerts to monitor a targeted website for specific dorks and vulnerabilities.

You can find well known Google dorks on sites like exploit-db and hackers for charity.? Entire books have been written on using Google to support hacking activities, and it is a skill and topic within itself.

Moving forward with the example, I used a common Google dork for injection vulnerabilities and for illustration purposes, I will use the inurl: advanced search command.? You can use the Google supplied advanced search page if you are lazy and don?t want to learn the operators and commands.? I entered ?inurl:index.php?id=? into a Google search query to identify a potential list of vulnerable sites.? I won?t list the sites I found for obvious reasons.? Once you get the returned list from Google all you have to do is click on the returned list or enter the URL of the target site into your address bar with the appended Google Dork and an ending single quote.? For example: http://www.exampledomain.com/index.php?id=2?. If the site remains on the same page or shows page not found, then it is not vulnerable.? If it returns any type of SQL error, it is vulnerable to a SQL injection attack.? There are script kiddie applications freely available to automate all of this for anyone who has a computer and an Internet connection.

If you would like to test your website for a wide range of injection vulnerabilities, one open source tool, you could use is sqlmap.? sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to access the underlying file system and executing commands on the operating system via out-of-band connections.

In this video by 7Safe is a solid overview and walk through of SQL Injection.? The information is a little dated, but the concept and overview is very good.

OWASP Vulnerability Check

Per the OWASP guidance, ?The best way to find out if an application is vulnerable to injection is to verify that all use of interpreters clearly separates untrusted data from the command or query. For SQL calls, this means using bind variables in all prepared statements and stored procedures, and avoiding dynamic queries.

Checking the code is a fast and accurate way to see if the application uses interpreters safely. Code analysis tools can help a security analyst find the use of interpreters and trace the data flow through the application. Manual penetration testers can confirm these issues by crafting exploits that confirm the vulnerability.

Automated dynamic scanning, which exercises the application may provide insight into whether some exploitable injection problems exist. Scanners cannot always reach interpreters and can have difficulty detecting whether an attack was successful.?

Controls for Injection Vulnerabilities

The primary design goal for web applications is to separate the server side actions (commands, queries) from the user input (untrusted data).

OWASP recommends the following actions to help prevent injection-based attacks from being realized:

  1. The preferred option is to use a safe API which avoids the use of the interpreter entirely or provides a parameterized interface. Beware of APIs, such as stored procedures, that appear parameterized, but may still allow injection under the hood.
  2. If a parameterized API is not available, you should carefully escape special characters using the specific escape syntax for that interpreter. OWASP?s ESAPI has some of these escaping routines.
  3. Positive or ?whitelist? input validation with appropriate canonicalization also helps protect against injection, but is not a complete defense as many applications require special characters in their input. OWASP?s ESAPI has an extensible library of white list input validation routines.

Web Application Security Series

  • Injection
  • Cross-Site Scripting
  • Broken Authentication & Session Management
  • Insecure Direct Object References
  • Cross-site Request Forgery
  • Security Misconfiguration
  • Insecure Cryptographic Storage
  • Failure to Restrict URL Access
  • Insufficient Transport Layer Protection
  • Unvalidated Redirects and Forwards

?

I always welcome your input and comments.

Tim Layton

Follow Tim on Twitter at http://twitter.com/timlaytonstl

Read New Articles at http://www.timlayton.com

Connect with Tim on LinkedIn at http://www.linkedin.com/in/timlayton

EMC Infocus Blog at http://infocus.emc.com/author/tim_layton/

Source: http://www.timlayton.com/2012/10/22/injection/

khloe kardashian mark davis marine urination video hostess cadillac ats bain capital marines urinating

The One Thing that Kills Most Lifestyle Entrepreneurs Within Six ...

The internet is a great thing.

It?s made it possible for myself and millions of others to create businesses that can be run from pretty much anywhere.

However, that?s also part of the problem.

It?s gotten too easy.

In less than an hour you can have a new domain, WordPress installed, and be ready to rock.

Why is this a problem? Because for a business to be successful usually there needs to be a modicum of planning that goes into it. ?When you can start half a dozen new businesses in a weekend, you?re simply setting yourself up for failure.

There will never be a shortage of great ideas, however we all have a shortage of time. ?If you?re going to be successful working for yourself, being selective about what projects you take on and when, is going to be absolutely key.

The Biggest Road Block to Success

Over the last year I?ve talked to and worked with hundreds of people who are getting started with their own businesses online, and more often than not, their plan is flawed.

?I want to open an e-commerce store for designer shoes, do freelance graphic design, build people WordPress websites, and start a massively successful blog.?

I hear stuff like this all the time.

What happens when you decide to do all of those things at once?

Absolutely nothing ? and there in lies the problem.

Despite all of your good intentions, you?re never able to gain enough traction on any one project to replace your income. ?So you never end up leaving your job, and are even more unhappy than when you began because you feel like you?ve let yourself down.

Times Are a Changin?

There was a time 5-10 years ago where you could start up 10, 50 or even 100 affiliate sites at once and see success. ?Throw a bunch of spam links at your new domains that have nothing but spam copy, put up some adsense, and voila, instant millionaire!

These days, I can?t think of a worse idea.

SEO is getting much harder.

Whereas you used to be able to link build very effectively for very cheap with spun content and link wheels, that?s becoming a less viable option. Last week SEO may have been dealt it?s biggest blow yet with it?s new ?Disavow Links? tool. ?For people who have been hit with a Google penalty, this could potentially be a great thing, ?but for SEO professionals it means a complete re-think in your strategy.

Simply put, it?s next to impossible to do a good job with SEO on that many sites ? especially if they don?t have rock solid content.

Good Content Will Win in the End

Most of the time when people start a barrage of projects all at once, one of two things happen:

  • Each site never gets updated, dies a quick death, and is relegated to some dark corner of the internet never to be seen again
  • They?re updated with really crappy spam content, and eventually die and are relegated to the same dark corner of the internet

Yes there have been people who have made a bunch of money with adsense sites and other low quality niche sites. ?However in the end, it?s the sites that provide excellent, high quality information on the selected niche that will win.

If you?re considering starting a new project and don?t have every intention of investing the time and/or money to load it up with solid content, you might want to rethink your business strategy.

Over the coming months and years, that?s what will win.

Over a year ago I discussed the importance social influence will have on the search engine results. ?This is proving more true than ever as Facebook, G+, Twitter, Klout etc. all start to have more relevance in search rankings.

The Economics of Too Many Projects

It?s easy to get caught up in a good idea. ?You buy the domain immediately, and get to work.

Wait 48 hours.

I learned about the 48 hour rule from Dan and Ian, and it?s so money.

If in 48 hours you still think you have an excellent idea, then start planning and see where it goes.

Think about it, if you?re going to create 100 niche sites that?s over $1k/annually in domain registration alone. ?Not to mention creating content, hosting the sites, keeping everything up to date and fresh ? that get?s really expensive, really quickly.

Especially when the majority of your sites are probably never going to be profitable.

Now imagine if you had one site that you put the same amount of time and money into. ?In my experience, most people are better off creating one site than dozens. ?It?s easier to provide value and in turn become profitable than it is with tons of small sites or projects that die before even getting off the ground.

So, How Do You Decide What Project to Take On?

I went off a little bit on affiliate sites, but this applies on a much more fundamental level as well.

When you?re first getting your start online, I?m a firm believer that you should pick one project or business model and ride that out until you?re absolutely confident in your ability to take on something new.

I started out building my skills and writing this blog. ?It was over a year before I started my next (personal) site, Daily HDR. ?It was a great idea in theory, but now it hasn?t been updated in months.

Realistically I didn?t take on a personal project that was successful until almost 18 months after beginning the first one.

Why?

Because everything I did on the first business (the blog), was laying the foundation for the next one, Overcoming the Fear of Uncertainty.

I was building skills, establishing expertise, and garnering a small following to put myself in a good spot to be successful.

Then slowly but surely, I began adding other projects to my core business.

Everyday I have a new idea for a fun project, and sometimes I?ll even buy a domain. ?However, I don?t go full speed ahead until I know the following:

  • That there?s a need for what I?m providing
  • That there?s the potential to profit
  • That I have both the interest and the time to invest in the new project

So, how should you go about finding new projects? ?Here?s what I do:

Step #1: Assess Your Current Situation

What?s your current goal? ?Do you just want a little side business built around a hobby? Do you want something that will allow you to travel the world? ?Do you want to become the next millionaire entrepreneur?

Each of these goals has a different startup path.

Assess where you are, and then make sure you have the skills necessary to get started.

Step #2: Pick the ONE Project that Will Get You Closest to Your Goal Fastest

Are you trying to build a business as quickly as possible so you can quit your job and travel? ?Then stop trying to create a bunch of bullshit affiliate sites and start freelancing.

Pick one specialty, become a relative expert, and then get clients.

I?ve said it before, and I?ll say it again: Freelancing is the best way to build your first business online.

Step #3: Stabilize the Business

Do you know how much money you?re going to bring in every month? ?Do you have clearly defined processes for managing clients and finding new ones? ?Is work coming to by word of mouth? Are you beginning to become well known in your niche?

Great, keep that going.

Before taking on any new,?significant?projects you want to make sure you have a solid base and are able to manage your current situation.

Step #4: Reassess Your Priorities and Select the Next Project

The chances are, whatever you choose to freelance in isn?t going to be something your totally passionate about. ?It?s going to be a means to being able to live out the things you are passionate about.

Once you?re freelance business is stable, then you can start thinking about other projects you want to take on that are more directly in line with what you like to do.

Two years after I began Location 180, we started up HDR Software. ?Once that was stable, Location Rebel was born. ?Then it wasn?t until a year later that Hacking the High Life was released.

Each of those are businesses built around fundamental interests of mine, but none of them started until the previous one was completely stable.

Step #5: Repeat

This is the thought process I go through everytime I?m going to begin something that I know will be a significant investment of my time and money:

  • Assess where I?m at
  • Decide which project will get me to my desired goal the fastest
  • Begin and stabilize the business
  • Reassess priorities, and find the next opportunity.

Am I saying that you should absolutely, no matter what just take on one project or business? No, I?d be a complete hypocrite if that?s what I was suggesting. ?I love having multiple projects; it?s what keeps everything fresh and interesting for me.

However I am saying you should do your best not to overextend yourself. ?Once you have a base, each future project gets easier and easier to take on, because of the work you?ve put in previously.

Put in the work up front to build your core, and then expand into the fun stuff down the road.

Questions about how to choose between business ideas? Share them with us in the comments!

Source: http://www.seanogle.com/entrepreneurship/business-killer

mark sanchez obama open mic jefferson county colorado extenze tenacious d steve smith zou bisou bisou

Sunday, October 21, 2012

PwC: U.S. Commercial Real Estate Recovery To Advance | Big4.com

PwC: U.S. Commercial Real Estate Recovery To Advance

October 21, 2012

By Rob Starr, Content Manager, Big4.com

According to the findings of theEmerging Trends in Real Estate? 2013 report, released recently by PwC US and the Urban Land Institute (ULI), despite a slow real estate recovery track, U.S. property sectors and markets will register better prospects this year over last.? Recent job creation should increase absorption and push down vacancy rates in the office, industrial, and retail sectors. Robust demand for apartments should hold up,? even as new construction ramps up ? and even the housing sector makes progress in most regions.

Mitch Roschelle, partner, U.S. real estate advisory practice leader, PwC comments on the improving picture:

?With the outlook for commercial real estate continuing to improve in 2013, investors are expected to allocate substantial sums of capital to the real estate asset class, according to our survey respondents,? he said. ?As yield in bonds and other financial instruments tighten in a still volatile market, commercial real estate?s income producing and total return attributes offer investors potentially attractive risk-adjusted returns.?

Respondents to Emerging Trends cite a number of best investor bets for 2013, including top urban markets outperform the average, bolstered by move-back-in trends and gen-Y appeal. Top core districts in these cities have become too pricey, so look in districts where ?hip? residential neighborhoods meet commercial areas.

?

5 Newest Positions on Big4

Source: http://www.big4.com/pricewaterhousecoopers/pwc-u-s-commercial-real-estate-recovery-to-advance/

masters leaderboard frozen four joe avezzano kanye west theraflu joey votto the masters live mega millions winner

Tide is AP No. 1 for school-best 8th straight week

Alabama wide receiver Amari Cooper (9) and teammate Kenny Bell (7) celebrate a touchdown during the first quarter of an NCAA college football game against Tennessee, Saturday, Oct. 20, 2012, in Knoxville, Tenn. (AP Photo/Wade Payne)

Alabama wide receiver Amari Cooper (9) and teammate Kenny Bell (7) celebrate a touchdown during the first quarter of an NCAA college football game against Tennessee, Saturday, Oct. 20, 2012, in Knoxville, Tenn. (AP Photo/Wade Payne)

Alabama head coach Nick Saban, front left, waves as he leave the field after an NCAA college football game against Tennessee, Saturday, Oct. 20, 2012, in Knoxville, Tenn. Alabama won 44-13. (AP Photo/Wade Payne)

Alabama has run its streak of weeks at No. 1 in The Associated Press college football poll to eight, the longest stay atop the rankings by the Crimson Tide.

Alabama received 59 of 60 first-place votes from the media panel. The Tide has twice previously been No. 1 for seven consecutive weeks ? in 1979 when Bear Bryant coached 'Bama to a national title and in 1980 when the Tide finished sixth.

Oregon is No. 2 for the fifth consecutive week, though the gap between the Ducks and No. 3 Florida, which received the other first-place vote, narrowed after the Gators beat South Carolina 44-11 on Saturday. Alabama had gone three straight weeks as unanimous No. 1.

The rest of the top six was also unchanged after No. 4 Kansas State, No. 5 Notre Dame and No. 6 LSU all won.

South Carolina dropped from ninth to No. 17.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/347875155d53465d95cec892aeb06419/Article_2012-10-21-FBC-T25-College-FB-Poll/id-10c249198c364a12a13ad0572e9a7078

leigh espn greg oden st patricks day st. bonaventure ira glass march madness

Thefts of cell phones rise rapidly nationwide

FILE - In this Saturday Aug. 13, 2011 file photo, Nick Sabatasso checks his cell phone while waiting for a BART train at San Francisco's Civic Center station. A woman riding a city bus is punched in the face, then her cell phone is snatched. A man walking near Golden Gate Park is asked for the time, then a gunman demands his phone and wallet. Police say nearly one out of every three robberies in San Francisco this year has involved a cell phone. (AP Photo/Noah Berger, File)

FILE - In this Saturday Aug. 13, 2011 file photo, Nick Sabatasso checks his cell phone while waiting for a BART train at San Francisco's Civic Center station. A woman riding a city bus is punched in the face, then her cell phone is snatched. A man walking near Golden Gate Park is asked for the time, then a gunman demands his phone and wallet. Police say nearly one out of every three robberies in San Francisco this year has involved a cell phone. (AP Photo/Noah Berger, File)

In this photo taken Sept. 21, 2012, Kevin Mahaffey, chief technology officer and co-founder, poses for a portrait at the Lookout Mobile Security headquarters in San Francisco. A woman riding a city bus is punched in the face, then her cell phone is snatched. A man walking near Golden Gate Park is asked for the time, then a gunman demands his phone and wallet. Police say nearly one out of every three robberies in San Francisco this year has involved a cell phone. (AP Photo/Marcio Jose Sanchez)

In this photo taken Sept. 21, 2012, programmers work at the Lookout Mobile Security headquarters in San Francisco. A woman riding a city bus is punched in the face, then her cell phone is snatched. A man walking near Golden Gate Park is asked for the time, then a gunman demands his phone and wallet. Police say nearly one out of every three robberies in San Francisco this year has involved a cell phone. (AP Photo/Marcio Jose Sanchez)

In this photo taken Sept. 21, 2012, Kevin Mahaffey, chief technology officer and co-founder, poses for a portrait at the Lookout Mobile Security headquarters in San Francisco. A woman riding a city bus is punched in the face, then her cell phone is snatched. A man walking near Golden Gate Park is asked for the time, then a gunman demands his phone and wallet. Police say nearly one out of every three robberies in San Francisco this year has involved a cell phone. (AP Photo/Marcio Jose Sanchez)

(AP) ? In this tech-savvy city teeming with commuters and tourists, the cell phone has become a top target of robbers who use stealth, force and sometimes guns.

Nearly half of all robberies in San Francisco this year are cell phone-related, police say, and most occur on bustling transit lines.

One thief recently snatched a smartphone while sitting right behind his unsuspecting victim and darted out the rear of a bus in mere seconds.

Another robber grabbed an iPhone from an oblivious bus rider ? while she was still talking.

And, in nearby Oakland, City Council candidate Dan Kalb was robbed at gunpoint of his iPhone Wednesday after he attended a neighborhood anti-crime meeting.

"I thought he was going to shoot me," recalled Kalb, who had dropped his phone during the stickup. "He kept saying, 'Find the phone! Find the phone!'"

These brazen incidents are part of a ubiquitous crime wave striking coast to coast. New York City Police report that more than 40 percent of all robberies now involve cell phones. And cell phone thefts in Los Angeles, which account for more than a quarter of all the city's robberies, are up 27 percent from this time a year ago, police said.

"This is your modern-day purse snatching," said longtime San Francisco Police Capt. Joe Garrity, who began noticing the trend here about two years ago. "A lot of younger folks seem to put their entire lives on these things that don't come cheap."

Thefts of cell phones? particularly the expensive do-it-all smartphones containing everything from photos and music to private e-mails and bank account statements? are costing consumers millions of dollars and sending law enforcement agencies and wireless carriers nationwide scrambling for solutions.

In San Francisco, police have gone undercover and launched a transit ad campaign, warning folks to "be smart with your smartphone." Similar warnings went out in Oakland, where there have been nearly 1,300 cell phone robberies this year.

When Apple's ballyhooed iPhone 5 went on sale last month, New York City police encouraged buyers to register their phone's serial numbers with the department. That came just months after a 26-year-old chef at the Museum of Modern Art was killed for his iPhone while heading home to the Bronx.

In St. Louis, city leaders proposed an ambitious ordinance requiring anyone who resells cell phones to obtain a secondhand dealers license. Resellers also would need to record the phone's identity number and collect detailed information including the seller's names, addresses, a copy of their driver's licenses ? even their thumbprints.

"It will take a national solution to make this problem go away," St. Louis Mayor Francis Slay said of the phone thefts.

Though some experts put annual cell phone losses in the billions of dollars, there is no precise figure on how many devices are stolen each year.

However, the problem has become so visible that it has caught the attention of lawmakers and regulators seeking to take the profit out of cell phone theft.

In April, U.S. Sen. Charles Schumer, D-New York, and New York City Police Commissioner Ray Kelly announced that the major U.S. cell phone carriers and the Federal Communications Commission have agreed to set up a national database to track reported stolen phones. It is scheduled to launch in late 2013.

Schumer also introduced a bill called the Mobile Device Theft Deterrence Act, which proposes a five-year prison sentence for tampering with the ID numbers of a stolen cell phone. The bill is supported by the Cellular Telecommunications Industry Association (CTIA), a Washington, D.C. advocacy group.

In addition, CTIA officials said carriers are expected to launch individual databases later this month to permanently disable a cell phone reported stolen. The initiative is similar to a successful decade-old strategy in Australia.

Previously, U.S. carriers have only been able to disable so-called SIM cards, which can be swapped in and out of phones. That's led to a profitable black market for stolen phones.

Chris Guttman-McCabe, CTIA's vice president of regulatory affairs, said the goal of creating theft databases is to render stolen cell phones worthless.

"We want to dry up the aftermarket," Guttman-McCabe said. "Hopefully, there will be no sense in stealing a phone and a once valuable piece of hardware will essentially turn into useless metal."

Right now, the incentive is to steal and that's creating huge losses, said Kevin Mahaffey, a co-founder of Lookout, a San Francisco-based mobile security firm which has advised carriers about the national database.

"Thieves know that carrying a smartphone is like carrying $500 in your hands," said Mahaffey. His company estimates that stolen and lost cell phones could cost American consumers more than $30 billion this year.

Many cities with highest rates of stolen and lost phones also rank among the FBI's listing of U.S. cities with the highest crime rates, including Cleveland, Detroit, Oakland and Newark, N.J., Mahaffey said.

Meanwhile, cell phone thefts and police response continue at a frenzied pace.

In Chicago, two men were each charged with armed robbery last week after stealing an iPhone from a teen.

In Oakland, nearly three dozen people were recently arrested during a sweep for allegedly stealing smartphones. On Tuesday, police arrested 15-year-old boy who allegedly swiped a woman's iPhone near Oakland's City Hall and sold it in downtown San Francisco for $200 to buy marijuana.

"It's a quick crime of opportunity, a snatch and grab, either by foot or on bike," Officer Johnna Watson, an Oakland police spokeswoman, said. "The thieves are gone in an instant."

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/386c25518f464186bf7a2ac026580ce7/Article_2012-10-20-Cell%20Phone%20Thefts/id-672d4e7b34f744f4b8a7d131558e1ccd

nit championship transcendentalism bells palsy channel 5 news uc berkeley harrison barnes brett ratner