QA Manager H/F - Anson McCade - Paris        
Un constructeur de renom recrute actuellement un QA Manager/Architect de test au sein de ses locaux parisien et qui interviendra sur des projets Digitaux (Wed et mobile) et IoT. En qualité d'Architecte de test/ QA Manager, vous serez le garant de la qualité du code produit. Vous occuperez un rôle central quant à la construction des stratégies de tests (méthodes, outils) pour atteindre les objectifs de qualité produits qui auront été définis. En qualité d'Architecte de test/ QA...
          Accelerate Live! talk: Health-generating buildings, Marcene Kinney, Angela Mazzi, GBBN Architects        
Architects Marcene Kinney and Angela Mazzi share design hacks pinpointing specific aspects of the built environment that affect behavior, well-being, and performance.

 

During the past 20 years, we’ve witnessed an evolution in building design, from high-performance and energy-efficient buildings, to sustainable and green buildings, and now to spaces that enhance performance and promote wellness and health. 

In this 15-minute talk at BD+C’s Accelerate Live! conference (May 11, 2017, Chicago), Marcene Kinney and Angela Mazzi from Cincinnati-based GBBN Architects talk about their work in behavior change and health-generating design.

Their predictive outcome modeling helps clients make strategic design investments that enhance user and building performance, while minimizing behaviors that can lead to more negative outcomes, such as injuries, poor health, or mistakes.

They also share design hacks pinpointing specific aspects of the built environment that affect behavior, well-being, and performance to help clients get more success out of their spaces.

ABOUT THE SPEAKERS

As Principal and Market Director at GBBN Architects, Marcene Kinney, AIA, LEED AP, leads her team's exploration and focus to do more than merely solve functional architectural problems for clients. Her applied research details fives types of space and their physical attributes that contribute to socialization and gathering patterns within spaces. She has dedicated 17 years exploring how space facilitates social interaction and builds community within the educational environment. Kinney has presented her research-based design work to American Institute of Architecture and Society of College and University Planning audiences and is the recent recipient of an AIA design award for work completed at Northern Kentucky University. Perhaps most important are the satisfaction survey reports by her clients who are reporting increased engagement and retention from their customers.

Angela Mazzi, AIA, ACHA, EDAC, is a Senior Associate and Medical Planner at GBBN Architects, where she focuses on enhancing quality of life through built environments—connecting great design with user needs. Her background in design, business management, and research on socio-cultural contexts provides a unique perspective on how culture is reflected in architecture and user experience. Mazzi serves on the Board of Regents for the American College of Healthcare Architects (ACHA), the Board of AIA Cincinnati, the Advisory Committee for the Institute for Patient-Centered Design, and was an Advisory Board member for Arizona State University's Healthcare Design Program in its initial years. Her research linking wellness to design has been published in many healthcare journals and been presented at both national and international conferences.

FOLLOW GBBN ARCHITECTS

@GBBNArchitects
www.facebook.com/GBBNArchitects


           Android back的偵測(離開程式前的確認)         
方法一會攔截MENU的listener建議使用方法二方法一------------------------------------------------- public boolean onKeyDown(int keyCode, KeyEvent event) { if (keyCode==KeyEvent.KEYCODE_BACK) { new A...
          Tifiamo Scaramouche!        
Tifiamo Scaramouche è una raccolta di racconti in quattro volumi che possono essere scaricati liberamente in formato PDF dal sito dei Wu Ming. Si tratta di una fan fiction derivante da L'armata dei sonnambuli, l'ultimo romanzo storico del collettivo uscito nel 2014.

A curare la raccolta è stato Simone Scaffidi L. Da un'idea di: Pietro Pace, Mauro Vanetti e Alessandro Villari (Avvocato Laser). Il progetto grafico e l'impaginazione si devono a Franco Berteni (Mr Mill) e Simone Scaffidi L. La copertina e le illustrazioni sono di Alessandro Caligaris e Francesca Sibona.

Qui di seguito, ecco il mio contributo, pubblicato nel terzo volume della raccolta. Buona lettura.


Il flauto tradito
Parigi, 1801

1.

A suo modo, Ludwig Wenzel Lachnith era un uomo generoso. La sera del 20 agosto 1801, dopo la trionfale prima della sua opera I misteri d'Iside al Teatro della Repubblica, il compositore offrì la cena all'intera troupe, comparse e suggeritore compresi.
Benché relegate al tavolo meno prestigioso dell'ampia sala del ristorante, le due comparse Léo Modonnet e Emanuele Gizzio potevano udire facilmente i discorsi del tavolo principale, quello dove sedeva Lachnith assieme al manager del teatro, al librettista Étienne Morel de Chédeville e ai cantanti protagonisti. Per meglio dire, potevano udire il monologo del torrenziale musicista boemo, la cui voce sopravanzava quelle di tutti gli altri.
«Eh sì, caro Chédeville! Il buon Mozart aveva del talento, questo nessuno lo vorrà negare; ma aveva anche un'esecrabile tendenza al lambiccato, all'insolito... In una parola: troppa complicazione! Oggigiorno il pubblico non ne vuole sapere di una musica che sia troppo difficile. La gente vuole ariette semplici, presentate con garbo, che tocchino il cuore senza affaticare il cervello. Prendete il Don Giovanni: quante graziose melodie! Parola mia, credo che abbiamo fatto bene a prenderne una in prestito, per il nostro terzetto. Tuttavia, andiamo... La scena con la statua nel finale secondo... Chi può sopportare una tale rombante cacofonia? Pensate solo questo: in quattro battute, quel povero basso deve cantare tutte e dodici le note della scala cromatica. Sapete? Un mio amico italiano, galantuomo e compositore eminente, mi parlava tempo fa con orrore di un certo quartetto per archi, dove Mozart ha accumulato tante di quelle dissonanze da creare un ripugnante caos, direi quasi un giacobinismo sonoro, dove va completamente perso ogni giusto criterio di gerarchia tra le sette note... Di proposito dico sette, non dodici; giacché nessuno, a meno che il suo orecchio non sia guastato dalla musica per tastiera, crederà mai che un re diesis possa essere uguale a un mi bemolle... Anzi: un re è sempre un re, come dicono in Italia, non è vero?».
«Ma va' curcati, buffuni!» commentò Gizzio a mezza voce.
«Perciò, quando mi fu proposto di allestire per le nostre scene Il Flauto magico, la prima cosa che pensai fu: sta bene; ma, per carità, sfrondiamo! Semplifichiamo!
Smussiamo le asperità del testo! Rendiamo il tutto più comprensibile, più adatto alle orecchie del nostro pubblico. Più elegante, anche. E l'esito così radioso di questa serata ha dimostrato che avevamo avuto pienamente ragione. Prima di tutto: i nomi. Tutti quei Tamino, Papageno e Papagena del testo originale, così goffi e plebei, noi li abbiamo cambiati nei molto più raffinati Isménor, Bochoris e Mona...».
Modonnet rise.
«Non voglio parlare della parte musicale. Ho dovuto lavorare parecchio di forbici e d'ingegno per dare una veste accettabile alla barbarica partitura. Ma, per quanto riguarda il vostro lavoro, Chédeville, potete andare orgoglioso di avere addolcito il carattere di quella terribile regina della notte. Certo, l'aria del secondo atto l'abbiamo dovuta proprio espungere: a parte che è impossibile da cantare, ma quel testo “der hölle Rache kocht in meinem Herzen...”, “vendetta infernale sento nel mio petto”... Ahimè! Una gentile e amabile donzella come voi, signorina Maillard, avrebbe dovuto intonare tali parole? Per carità! Abbiamo già sofferto abbastanza, qualche anno fa, con quella spaventosa Medea di Cherubini. Basta, basta! I personaggi femminili, a teatro, devono rassicurare, non inquietare! Belle fanciulle, mogli e madri esemplari: questo vuole il nostro distinto pubblico. Perché la gente, la sera, vuole distrarsi dai traffici quotidiani del commercio e della Borsa, e trovare sollievo dalle cure dello Stato. Dirò di più: nell'epoca moderna la gente vuole vivere il proprio tempo come un affascinante, mutevole, infinito spettacolo. In una parola, vuole divertirsi. Il nostro compito è di farli divertire. E questa sera ci siamo riusciti; possiamo affermarlo con fierezza. Brindiamo!».

2.

Erano passate le quattro del mattino quando Modonnet e Gizzio ritornavano al foborgo Sant'Antonio. Davanti alle botteghe dei fornai c'erano già le prime code. I volti e i discorsi delle persone in fila per il pane manifestavano stanchezza, frustrazione, rabbia.
«Quattordici soldi per quattro libbre di pane! Così non si può andare avanti».
«Uno schifo, altro che!».
«Bonaparte non sta facendo un cazzo».
«Sbagli, cittadina. Bonaparte sta facendo parecchio. Solo, non per noialtri».
«Per i grandi proprietari. Per i nobili, gli speculatori, i fornitori dell'esercito e i finanzieri. Per quei merdosi, ecco per chi sta lavorando il Primo console...».
Gizzio sembrava ancora più taciturno del solito. Per tutto il cammino dal centro al foborgo, dove lui e Modonnet abitavano, disse a malapena due parole, eccettuate le strane bestemmie che ogni tanto sputava tra i denti.
«Toglimi una curiosità» gli chiese alla fine Modonnet mentre stavano per arrivare a casa. «Al tuo paese è normale invocare con tanta frequenza la ghigliottina su Gesù Cristo, sulla Madonna e su tutti i santi, come fai tu?».
Gizzio rise amaramente: «Lo facciamo di continuo. Tutti, anche i bambini e i preti. Vieni a vivere un mese dalle mie parti, e capirai».
«Non mi ricordo mai come si chiama la tua città».
«Io stesso vorrei non ricordarmene. Comunque, non è una città: è un villaggio di poche anime sperduto nell'Aspromonte. Ammesso che esista ancora. Non ho sue notizie da due anni, cioè da quando sono venuto qui a Parigi».
Era il discorso più lungo che Modonnet gli avesse mai udito fare.
«Ma no» proseguì Gizzio, come parlando fra sé. «Giudico troppo severamente i miei compaesani. In fondo, nessuno di loro si è arruolato nell'Armata cristiana e reale». Gizzio pronunciò queste ultime parole con una smorfia di disgusto.
«Ne ho sentito parlare» commentò Modonnet. «Le bande del cardinale Ruffo, non è vero? Una specie di Vandea...».
«Molto peggio. I vandeani, almeno, sapevano per cosa combattevano; i sanfedisti invece si sono solo fatti affascinare dai feudatari e dai preti. Hanno avuto quello che si meritavano. Li aspettano altri due o tre secoli di dispotismo e di miseria. E ti dico la verità: penso che anche qui, in Francia, andrà a finire allo stesso modo. Te lo concedo: finora il popolo di Parigi si è comportato bene, specialmente i tuoi compagni del foborgo Sant'Antonio. Ma quanto ancora potranno resistere? I contadini francesi non sono affatto
più intelligenti di quelli del Regno di Napoli; nelle campagne già da tempo monta la reazione. Gente che cerca solo un padrone cui obbedire; e in buona parte l'ha già trovato. E allora non chiedermi perché bestemmio, Léo: mi è rimasto solo questo, mannaia lu signuri!».
«Ho sempre apprezzato il tuo ottimismo, cittadino Gizzio!» concluse Modonnet.

3.

Uno dei vantaggi del mestiere teatrale è che permette di dormire sino a tardi; quando si ha un tetto sotto cui ripararsi, naturalmente. Léo Modonnet, per ora, l'aveva; ma quella mattina dormì lo stesso un sonno assai inquieto. Verso mezzogiorno, poco prima di svegliarsi, fece uno dei sogni più enigmatici della sua vita.
Era un sogno musicale. Modonnet udiva con una chiarezza allucinatoria una breve melodia, gentile e saltellante, in uno stile antiquato, suonata da una piccola orchestra. Poi, lo stesso tema, ma eseguito da un'orchestra molto più grande, con accenti molto più imperiosi e con una chiusa cromatica vagamente minacciosa. A questo punto appariva uno strano ometto, che si esprimeva con un forte accento tedesco. «Ogni vero artista, mein Freund, è anche uno Zauberer – un mago –, sì. Può capitargli di prevedere un futuro imprevedibile. Cosa, o chi, aveva in mente Rousseau quando, riferendosi alla Corsica, scriveva: “ho il vago presentimento che un giorno questa piccola isola stupirà l'Europa”? E quel ragazzino di dodici anni, che un giorno nel mio giardino mise in scena il suo Bastien und Bastienne – come poté presentire che un giorno la volontà generale sarebbe stata manipolata e circuita da un tiranno? Eppure, mein Freund, la storia non è mai un copione già scritto, così come una partitura non è mai immodificabile. E quando ci si accorge che la pagina è guasta, rimane sempre una soluzione: strapparla».
Modonnet si svegliò frastornato e con un forte mal di testa. Senza sapere bene perché, la prima cosa che fece fu aprire il suo baule per cercarvi un involto. Dentro c'erano una maschera nera, un mantello e un bastone dal manico lucente.
Quella notte, Ludwig Wenzel Lachnith, davanti al portone di casa sua, mentre frugava un po' alticcio nelle tasche del suo soprabito per cercare la chiave, notò una scritta di colore rosso fosforescente sul muro proprio accanto alla porta:

RACHE

Prima che avesse il tempo di chiedersi cosa stava succedendo, avvertì il brivido freddo di una lama proprio sotto il mento, e udì alle sue spalle una voce altrettanto metallica e tagliente: «Cittadino musicista, vogliate cortesemente condurmi nel vostro studio».
«Come volete, amico mio» diceva Lachnith mentre saliva le scale, tallonato da Scaramouche. «Non c'è bisogno di tutta questa commedia... vi ho riconosciuto, sapete?».
«Merda» pensò Modonnet.
«Eravate con me a cena ieri sera. Ammetto che il ruolo che vi è stato assegnato nell'ultima produzione è al di sotto delle vostre capacità attoriali; ma tenete conto che si tratta di un'opera, e che Voi non sapete cantare. Ho delle conoscenze, e posso farvi ottenere una buona scrittura per la prossima stagione di prosa... però, immagino che vogliate un risarcimento più immediato, e in contanti».
Erano intanto entrati nello studio del compositore.
«Immaginate male» disse Scaramouche. «Voglio solo porre rimedio a uno dei più insensati e odiosi crimini contro il buon gusto e il buon senso che si possano citare nella storia dell'arte musicale. Voglio cancellare la macchia con cui voi avete insudiciato la memoria di un grande musicista. Voglio che mi diate la partitura originale di quello scempio chiamato I misteri d'Iside».
«Eccola». Lachnith sollevò un manoscritto dal ripiano della sua scrivania e lo consegnò a Scaramouche: «Cosa ve ne farete, adesso?».
«Non lo so ancora. La strapperò in mille pezzi e la getterò nella Senna. Oppure ne attaccherò i fogli ai muri di Parigi per denunciare la vostra cialtroneria».
Lachnith rise: «Vedo che siete un idealista. Forse non vi siete accorto che i tempi sono cambiati e che la rivoluzione è finita. Permettetemi di darvi un consiglio: perché non ve ne tornate in Italia? Laggiù c'è ancora da fare per le teste calde come voi. Già che ci siete, portate con voi quel musone del vostro amico, e ditegli che non è colpa nostra se i giacobini napoletani erano degli imbecilli... se avessero dato subito la terra ai contadini, anziché perdere tempo in chiacchiere, le cose sarebbero andate molto diversamente».
«Ce ne ricorderemo per la prossima rivoluzione» disse Scaramouche.

Nota bibliografica

Questo racconto deve molto al primo capitolo del libro di Augusto Illuminati Gli inganni di Sarastro, Einaudi, Torino 1980, che indaga – sia pure con qualche eccessivo schematismo – le relazioni fra la teoria politica di Rousseau, le scoperte di Franz Anton Mesmer, il Bastien und Bastienne – la cui prima rappresentazione si dice abbia avuto luogo nel giardino della casa di Mesmer a Vienna – e Il flauto magico di Mozart.
Hector Berlioz nelle sue Memorie critica con estrema durezza l'adattamento molto libero de Il Flauto Magico realizzato da Lachnith sotto il titolo de Les mystères d'Isis. Il testo originale delle Mémoires di Berlioz (Parigi 1865) è facilmente reperibile in Internet.
Sulle critiche rivolte a Mozart dal musicista suo contemporaneo Giuseppe Sarti si veda il saggio Sarti contro Mozart di Massimo Mila, ora in M. Mila, Mozart. Saggi 1941-1987, Einaudi, Torino 2006, pp. 332-58.
La sorprendente identità fra il tema iniziale dell'ouverture del Bastien und Bastienne e l'inizio della Terza Sinfonia di Beethoven è, secondo Hermann Abert – citato da Wolfgang Hildesheimer nella sua nota biografia mozartiana –, una pura coincidenza. Com'è noto, Beethoven intendeva intitolare la sinfonia a Napoleone Bonaparte; secondo la tradizione, il musicista strappò la dedica quando seppe che Napoleone si era fatto incoronare imperatore.
Il parallelo fra Napoleone Bonaparte e il Sarastro di Mozart/Lachnith si trova in Jean Tulard, Napoleone. Il mito del salvatore, Rusconi, Milano 1980, p. 9. Alle pp. 183-85 dello stesso libro si parla della crisi alimentare in Francia fra la primavera del 1801 e il 1802.
Le idee esposte qui da Lachnith sulla modernità come spettacolo e sulla “gente” che si vuole divertire derivano in realtà dal libro di Alessandro Baricco L'anima di Hegel e le mucche del Wisconsin, Feltrinelli, Milano 2009.


          'We have no experience in stopping a nuclear war.' - Sidney Drell (no replies)        
'..My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The “Titanic Effect” is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'

'The harsh rhetoric on both sides increases the danger of miscalculations and mistakes, as do other factors. Close encounters between the military aircraft of the United States and Russia have become routine, creating the potential for an unintended conflict. Many of the nuclear-weapon systems on both sides are aging and obsolete. The personnel who operate those systems often suffer from poor morale and poor training. None of their senior officers has firsthand experience making decisions during an actual nuclear crisis. And today’s command-and-control systems must contend with threats that barely existed during the Cold War: malware, spyware, worms, bugs, viruses, corrupted firmware, logic bombs, Trojan horses, and all the other modern tools of cyber warfare. The greatest danger is posed not by any technological innovation but by a dilemma that has haunted nuclear strategy since the first detonation of an atomic bomb: How do you prevent a nuclear attack while preserving the ability to launch one?

..

..the Cuban Missile Crisis, when a series of misperceptions, miscalculations, and command-and-control problems almost started an accidental nuclear war—despite the determination of both John F. Kennedy and Nikita Khrushchev to avoid one. In perhaps the most dangerous incident, the captain of a Soviet submarine mistakenly believed that his vessel was under attack by U.S. warships and ordered the firing of a torpedo armed with a nuclear warhead. His order was blocked by a fellow officer. Had the torpedo been fired, the United States would have retaliated with nuclear weapons. At the height of the crisis, while leaving the White House on a beautiful fall evening, McNamara had a strong feeling of dread—and for good reason: “I feared I might never live to see another Saturday night.”

..

The personnel who command, operate, and maintain the Minuteman III have also become grounds for concern. In 2013, the two-star general in charge of the entire Minuteman force was removed from duty after going on a drunken bender during a visit to Russia, behaving inappropriately with young Russian women, asking repeatedly if he could sing with a Beatles cover band at a Mexican restaurant in Moscow, and insulting his military hosts. The following year, almost a hundred Minuteman launch officers were disciplined for cheating on their proficiency exams. In 2015, three launch officers at Malmstrom Air Force Base, in Montana, were dismissed for using illegal drugs, including ecstasy, cocaine, and amphetamines. That same year, a launch officer at Minot Air Force Base, in North Dakota, was sentenced to twenty-five years in prison for heading a violent street gang, distributing drugs, sexually assaulting a girl under the age of sixteen, and using psilocybin, a powerful hallucinogen. As the job title implies, launch officers are entrusted with the keys for launching intercontinental ballistic missiles.

..

..A recent memoir, “Uncommon Cause,” written by General George Lee Butler, reveals that the Pentagon was not telling the truth. Butler was the head of the U.S. Strategic Command, responsible for all of America’s nuclear weapons, during the Administration of President George H. W. Bush.

According to Butler and Franklin Miller, a former director of strategic-forces policy at the Pentagon, launch-on-warning was an essential part of the Single Integrated Operational Plan (siop), the nation’s nuclear-war plan. Land-based missiles like the Minuteman III were aimed at some of the most important targets in the Soviet Union, including its anti-aircraft sites. If the Minuteman missiles were destroyed before liftoff, the siop would go awry, and American bombers might be shot down before reaching their targets. In order to prevail in a nuclear war, the siop had become dependent on getting Minuteman missiles off the ground immediately. Butler’s immersion in the details of the nuclear command-and-control system left him dismayed. “With the possible exception of the Soviet nuclear war plan, [the siop] was the single most absurd and irresponsible document I had ever reviewed in my life,” Butler concluded. “We escaped the Cold War without a nuclear holocaust by some combination of skill, luck, and divine intervention, and I suspect the latter in greatest proportion.” The siop called for the destruction of twelve thousand targets within the Soviet Union. Moscow would be struck by four hundred nuclear weapons; Kiev, the capital of the Ukraine, by about forty.

After the end of the Cold War, a Russian surprise attack became extremely unlikely. Nevertheless, hundreds of Minuteman III missiles remained on alert. The Cold War strategy endured because, in theory, it deterred a Russian attack on the missiles. McNamara called the policy “insane,” arguing that “there’s no military requirement for it.” George W. Bush, while running for President in 2000, criticized launch-on-warning, citing the “unacceptable risks of accidental or unauthorized launch.” Barack Obama, while running for President in 2008, promised to take Minuteman missiles off alert, warning that policies like launch-on-warning “increase the risk of catastrophic accidents or miscalculation.” Twenty scientists who have won the Nobel Prize, as well as the Union of Concerned Scientists, have expressed strong opposition to retaining a launch-on-warning capability. It has also been opposed by former Secretary of State Henry Kissinger, former Secretary of State George Shultz, and former Senator Sam Nunn. And yet the Minuteman III missiles still sit in their silos today, armed with warheads, ready to go.

William J. Perry, who served as Secretary of Defense during the Clinton Administration, not only opposes keeping Minuteman III missiles on alert but advocates getting rid of them entirely. “These missiles are some of the most dangerous weapons in the world,” Perry wrote in the Times, this September. For many reasons, he thinks the risk of a nuclear catastrophe is greater today than it was during the Cold War. While serving as an Under-Secretary of Defense in 1980, Perry also received a late-night call about an impending Soviet attack, a false alarm that still haunts him. “A catastrophic nuclear war could have started by accident.”

Bruce Blair, a former Minuteman launch officer, heads the anti-nuclear group Global Zero, teaches at Princeton University, and campaigns against a launch-on-warning policy. Blair has described the stresses that the warning of a Russian attack would put on America’s command-and-control system. American early-warning satellites would detect Russian missiles within three minutes of their launch. Officers at norad would confer for an additional three minutes, checking sensors to decide if an attack was actually occurring. The Integrated Tactical Warning/Attack System collects data from at least two independent information sources, relying on different physical principles, such as ground-based radar and satellite-based infrared sensors. If the norad officials thought that the warning was legitimate, the President of the United States would be contacted. He or she would remove the Black Book from a briefcase carried by a military aide. The Black Book describes nuclear retaliatory options, presented in cartoon-like illustrations that can be quickly understood.

..

Although the Air Force publicly dismissed the threat of a cyberattack on the nuclear command-and-control system, the incident raised alarm within the Pentagon about the system’s vulnerability. A malfunction that occurred by accident might also be caused deliberately. Those concerns were reinforced by a Defense Science Board report in January, 2013. It found that the Pentagon’s computer networks had been “built on inherently insecure architectures that are composed of, and increasingly using, foreign parts.” Red teams employed by the board were able to disrupt Pentagon systems with “relative ease,” using tools available on the Internet. “The complexity of modern software and hardware makes it difficult, if not impossible, to develop components without flaws or to detect malicious insertions,” the report concluded.

In a recent paper for the Royal United Services Institute for Defence and Security Studies, Andrew Futter, an associate professor at the University of Leicester, suggested that a nuclear command-and-control system might be hacked to gather intelligence about the system, to shut down the system, to spoof it, mislead it, or cause it to take some sort of action—like launching a missile. And, he wrote, there are a variety of ways it might be done.

..

Strict precautions have been taken to thwart a cyberattack on the U.S. nuclear command-and-control system. Every line of nuclear code has been scrutinized for errors and bugs. The system is “air-gapped,” meaning that its networks are closed: someone can’t just go onto the Internet and tap into a computer at a Minuteman III control center. At least, that’s the theory. Russia, China, and North Korea have sophisticated cyber-warfare programs and techniques. General James Cartwright—the former head of the U.S. Strategic Command who recently pleaded guilty to leaking information about Stuxnet—thinks that it’s reasonable to believe the system has already been penetrated. “You’ve either been hacked, and you’re not admitting it, or you’re being hacked and don’t know it,” Cartwright said last year.

If communications between Minuteman control centers and their missiles are interrupted, the missiles can still be launched by ultra-high-frequency radio signals transmitted by special military aircraft. The ability to launch missiles by radio serves as a backup to the control centers—and also creates an entry point into the network that could be exploited in a cyberattack. The messages sent within the nuclear command-and-control system are highly encrypted. Launch codes are split in two, and no single person is allowed to know both parts. But the complete code is stored in computers—where it could be obtained or corrupted by an insider.

Some of America’s most secret secrets were recently hacked and stolen by a couple of private contractors working inside the N.S.A., Edward Snowden and Harold T. Martin III, both employees of Booz Allen Hamilton. The N.S.A. is responsible for generating and encrypting the nuclear launch codes. And the security of the nuclear command-and-control system is being assured not only by government officials but also by the employees of private firms, including software engineers who work for Boeing, Amazon, and Microsoft.

Lord Des Browne, a former U.K. Minister of Defense, is concerned that even ballistic-missile submarines may be compromised by malware. Browne is now the vice-chairman of the Nuclear Threat Initiative, a nonprofit seeking to reduce the danger posed by weapons of mass destruction, where he heads a task force examining the risk of cyberattacks on nuclear command-and-control systems. Browne thinks that the cyber threat is being cavalierly dismissed by many in power. The Royal Navy’s decision to save money by using Windows for Submarines, a version of Windows XP, as the operating system for its ballistic-missile subs seems especially shortsighted. Windows XP was discontinued six years ago, and Microsoft warned that any computer running it after April, 2014, “should not be considered protected as there will be no security updates.” Each of the U.K. subs has eight missiles carrying a total of forty nuclear weapons. “It is shocking to think that my home computer is probably running a newer version of Windows than the U.K.’s military submarines,” Brown said.In 2013, General C. Robert Kehler, the head of the U.S. Strategic Command, testified before the Senate Armed Services Committee about the risk of cyberattacks on the nuclear command-and-control system. He expressed confidence that the U.S. system was secure. When Senator Bill Nelson asked if somebody could hack into the Russian or Chinese systems and launch a ballistic missile carrying a nuclear warhead, Kehler replied, “Senator, I don’t know . . . I do not know.”

After the debacle of the Cuban Missile Crisis, the Soviet Union became much more reluctant to provoke a nuclear confrontation with the United States. Its politburo was a committee of conservative old men. Russia’s leadership is quite different today. The current mix of nationalism, xenophobia, and vehement anti-Americanism in Moscow is a far cry from the more staid and secular ideology guiding the Soviet Union in the nineteen-eighties. During the past few years, threats about the use of nuclear weapons have become commonplace in Moscow. Dmitry Kiselyov, a popular newscaster and the Kremlin’s leading propagandist, reminded viewers in 2014 that Russia is “the only country in the world capable of turning the U.S.A. into radioactive dust.” The Kremlin has acknowledged the development of a nuclear torpedo that can travel more than six thousand miles underwater before devastating a coastal city. It has also boasted about a fearsome new missile design. Nicknamed “Satan 2” and deployed with up to sixteen nuclear warheads, the missile will be “capable of wiping out parts of the earth the size of Texas or France,” an official news agency claimed.

..

Russia’s greatest strategic vulnerability is the lack of a sophisticated and effective early-warning system. The Soviet Union had almost a dozen satellites in orbit that could detect a large-scale American attack. The system began to deteriorate in 1996, when an early-warning satellite had to be retired. Others soon fell out of orbit, and Russia’s last functional early-warning satellite went out of service two years ago. Until a new network of satellites can be placed in orbit, the country must depend on ground-based radar units. Unlike the United States, Russia no longer has two separate means of validating an attack warning. At best, the radar units can spot warheads only minutes before they land. Pavel Podvig, a senior fellow at the U.N. Institute for Disarmament Research, believes that Russia does not have a launch-on-warning policy—because its early-warning system is so limited.

For the past nine years, I’ve been immersed in the minutiae of nuclear command and control, trying to understand the actual level of risk. Of all the people whom I’ve met in the nuclear realm, Sidney Drell was one of the most brilliant and impressive. Drell died this week, at the age of ninety. A theoretical physicist with expertise in quantum field theory and quantum chromodynamics, he was for many years the deputy director of the Stanford Linear Accelerator and received the National Medal of Science from Obama, in 2013. Drell was one of the founding members of jason—a group of civilian scientists that advises the government on important technological matters—and for fifty-six years possessed a Q clearance, granting him access to the highest level of classified information. Drell participated in top-secret discussions about nuclear strategy for decades, headed a panel that investigated nuclear-weapon safety for the U.S. Congress in 1990, and worked on technical issues for jason until the end of his life. A few months ago, when I asked for his opinion about launch-on-warning, Drell said, “It’s insane, the worst thing I can think of. You can’t have a worse idea.”

Drell was an undergraduate at Princeton University when Hiroshima and Nagasaki were destroyed. Given all the close calls and mistakes in the seventy-one years since then, he considered it a miracle that no other cities have been destroyed by a nuclear weapon—“it is so far beyond my normal optimism.” The prospect of a new cold war—and the return of military strategies that advocate using nuclear weapons on the battlefield—deeply unnerved him. Once the first nuclear weapon detonates, nothing might prevent the conflict from spiralling out of control. “We have no experience in stopping a nuclear war,” he said.

..

Donald Trump and Vladimir Putin confront a stark choice: begin another nuclear-arms race or reduce the threat of nuclear war. Trump now has a unique opportunity to pursue the latter, despite the bluster and posturing on both sides. His admiration for Putin, regardless of its merits, could provide the basis for meaningful discussions about how to minimize nuclear risks. Last year, General James Mattis, the former Marine chosen by Trump to serve as Secretary of Defense, called for a fundamental reappraisal of American nuclear strategy and questioned the need for land-based missiles. During Senate testimony, Mattis suggested that getting rid of such missiles would “reduce the false-alarm danger.” Contrary to expectations, Republican Presidents have proved much more successful than their Democratic counterparts at nuclear disarmament. President George H. W. Bush cut the size of the American arsenal in half, as did his son, President George W. Bush. And President Ronald Reagan came close to negotiating a treaty with the Soviet Union that would have completely abolished nuclear weapons.

Every technology embodies the values of the age in which it was created. When the atomic bomb was being developed in the mid-nineteen-forties, the destruction of cities and the deliberate targeting of civilians was just another military tactic. It was championed as a means to victory. The Geneva Conventions later classified those practices as war crimes—and yet nuclear weapons have no other real use. They threaten and endanger noncombatants for the sake of deterrence. Conventional weapons can now be employed to destroy every kind of military target, and twenty-first-century warfare puts an emphasis on precision strikes, cyberweapons, and minimizing civilian casualties. As a technology, nuclear weapons have become obsolete. What worries me most isn’t the possibility of a cyberattack, a technical glitch, or a misunderstanding starting a nuclear war sometime next week. My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The “Titanic Effect” is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'

- Eric Schlosser, World War Three, By Mistake, December 23, 2016


Context

The International Day for the Total Elimination of Nuclear Weapons

          '..Russia .. cyberpower proved the perfect weapon .. political sabotage..' (no replies)        
' “We’d have all these circular meetings,” one senior State Department official said, “in which everyone agreed you had to push back at the Russians and push back hard. But it didn’t happen.”

..

Mr. Putin, a student of martial arts, had turned two institutions at the core of American democracy — political campaigns and independent media — to his own ends..

..

..The Russians clearly had a more sophisticated understanding of American politics, and they were masters of “kompromat,” their term for compromising information.

..

..the hackings of the State Department, the White House and the Pentagon..

..

What seems clear is that Russian hacking, given its success, is not going to stop. Two weeks ago, the German intelligence chief, Bruno Kahl, warned that Russia might target elections in Germany next year. “The perpetrators have an interest to delegitimize the democratic process as such,” Mr. Kahl said. Now, he added, “Europe is in the focus of these attempts of disturbance, and Germany to a particularly great extent.” '



'..the White House’s reluctance to respond forcefully meant the Russians have not paid a heavy price for their actions, a decision that could prove critical in deterring future cyberattacks.

..

..President Vladimir V. Putin of Russia moved beyond mere espionage to deliberately try to subvert American democracy and pick the winner of the presidential election.

..

..A low-cost, high-impact weapon that Russia had test-fired in elections from Ukraine to Europe was trained on the United States, with devastating effectiveness. For Russia, with an enfeebled economy and a nuclear arsenal it cannot use short of all-out war, cyberpower proved the perfect weapon: cheap, hard to see coming, hard to trace.

..

The United States had two decades of warning that Russia’s intelligence agencies were trying to break into America’s most sensitive computer networks. But the Russians have always managed to stay a step ahead.

Their first major attack was detected on Oct. 7, 1996, when a computer operator at the Colorado School of Mines discovered some nighttime computer activity he could not explain. The school had a major contract with the Navy, and the operator warned his contacts there. But as happened two decades later at the D.N.C., at first “everyone was unable to connect the dots,” said Thomas Rid, a scholar at King’s College in London who has studied the attack.

Investigators gave it a name — Moonlight Maze — and spent two years, often working day and night, tracing how it hopped from the Navy to the Department of Energy to the Air Force and NASA. In the end, they concluded that the total number of files stolen, if printed and stacked, would be taller than the Washington Monument.

Whole weapons designs were flowing out the door, and it was a first taste of what was to come: an escalating campaign of cyberattacks around the world.

..

The Russians were also quicker to turn their attacks to political purposes. A 2007 cyberattack on Estonia, a former Soviet republic that had joined NATO, sent a message that Russia could paralyze the country without invading it. The next year cyberattacks were used during Russia’s war with Georgia.

..

Mr. Obama was briefed regularly on all this, but he made a decision that many in the White House now regret: He did not name Russians publicly, or issue sanctions. There was always a reason: fear of escalating a cyberwar, and concern that the United States needed Russia’s cooperation in negotiations over Syria.

“We’d have all these circular meetings,” one senior State Department official said, “in which everyone agreed you had to push back at the Russians and push back hard. But it didn’t happen.”

..

Last year, the attacks became more aggressive. Russia hacked a major French television station, frying critical hardware. Around Christmas, it attacked part of the power grid in Ukraine, dropping a portion of the country into darkness, killing backup generators and taking control of generators. In retrospect, it was a warning shot.

..

..CrowdStrike’s nicknames for the two Russian hacking groups that the firm found at work inside the D.N.C. network. Cozy Bear — the group also known as the Dukes or A.P.T. 29, for “advanced persistent threat” — may or may not be associated with the F.S.B., the main successor to the Soviet-era K.G.B., but it is widely believed to be a Russian government operation. It made its first appearance in 2014, said Dmitri Alperovitch, CrowdStrike’s co-founder and chief technology officer.

..

Only in March 2016 did Fancy Bear show up — first penetrating the computers of the Democratic Congressional Campaign Committee, and then jumping to the D.N.C., investigators believe. Fancy Bear, sometimes called A.P.T. 28 and believed to be directed by the G.R.U., Russia’s military intelligence agency, is an older outfit, tracked by Western investigators for nearly a decade. It was Fancy Bear that got hold of Mr. Podesta’s email.

..

It was bad enough that Russian hackers had been spying inside the committee’s network for months. Now the public release of documents had turned a conventional espionage operation into something far more menacing: political sabotage, an unpredictable, uncontrollable menace for Democratic campaigns.

..

Julian Assange, the WikiLeaks founder and editor, has resisted the conclusion that his site became a pass-through for Russian hackers working for Mr. Putin’s government or that he was deliberately trying to undermine Mrs. Clinton’s candidacy. But the evidence on both counts appears compelling.

..

Mr. Putin, a student of martial arts, had turned two institutions at the core of American democracy — political campaigns and independent media — to his own ends. The media’s appetite for the hacked material, and its focus on the gossipy content instead of the Russian source, disturbed some of those whose personal emails were being reposted across the web.

..

In late 2014, hackers working for Kim Jong-un, the North’s young and unpredictable leader, had carried out a well-planned attack on Sony Pictures Entertainment intended to stop the Christmastime release of a comedy about a C.I.A. plot to kill Mr. Kim.

In that case, embarrassing emails had also been released. But the real damage was done to Sony’s own systems: More than 70 percent of its computers melted down when a particularly virulent form of malware was released. Within weeks, intelligence agencies traced the attack back to the North and its leadership. Mr. Obama called North Korea out in public, and issued some not-very-effective sanctions. The Chinese even cooperated, briefly cutting off the North’s internet connections.

As the first Situation Room meetings on the Russian hacking began in July, “it was clear that Russia was going to be a much more complicated case,” said one participant. The Russians clearly had a more sophisticated understanding of American politics, and they were masters of “kompromat,” their term for compromising information.

..

..code was put out in the open by the Russians as a warning: Retaliate for the D.N.C., and there are a lot more secrets, from the hackings of the State Department, the White House and the Pentagon, that might be spilled as well. One senior official compared it to the scene in “The Godfather” where the head of a favorite horse is left in a bed, as a warning.

..

As the year draws to a close, it now seems possible that there will be multiple investigations of the Russian hacking — the intelligence review Mr. Obama has ordered completed by Jan. 20, the day he leaves office, and one or more congressional inquiries. They will wrestle with, among other things, Mr. Putin’s motive.

..

Did he seek to mar the brand of American democracy, to forestall anti-Russian activism for both Russians and their neighbors? Or to weaken the next American president, since presumably Mr. Putin had no reason to doubt American forecasts that Mrs. Clinton would win easily? Or was it, as the C.I.A. concluded last month, a deliberate attempt to elect Mr. Trump?

In fact, the Russian hack-and-dox scheme accomplished all three goals.

What seems clear is that Russian hacking, given its success, is not going to stop. Two weeks ago, the German intelligence chief, Bruno Kahl, warned that Russia might target elections in Germany next year. “The perpetrators have an interest to delegitimize the democratic process as such,” Mr. Kahl said. Now, he added, “Europe is in the focus of these attempts of disturbance, and Germany to a particularly great extent.” '

- Eric Lipton, David E. Sanger and Scott Shane, The Perfect Weapon: How Russian Cyberpower Invaded the U.S., December 13, 2016


Context '[Russia] may become a threat to the world. That is the worst thing that could happen to Russia.' - Yegor Gaidar

'..Russian strategy of hybrid influence and destabilization .. German Council on Foreign Relations.'

'German intelligence says Russia is trying to destabilize German society..' - '..war that Moscow is waging against the West..'

'[Putin is doing] anything that can and will expand Russian influence to U.S.S.R.-era levels of power.'


'..Zero tolerance for Russian intrusions .. Estonia .. policy of publicly naming or prosecuting spies..'

'..the Soviet Union was cut off from Western financial markets and was effectively under permanent sanctions..'

          AAC/Medicare Changes        

I was hoping to have written this post last week, so that you might have more time to help out, but life got in the way!  This is a VERY important post, especially to those of you who rely on Medicare to secure AAC devices.  Specifically this is related to patients with ALS, Cerebral Palsy, Muscular Dystrophy, Rett Syndrome,spinal cord injuries, spinal muscular atrophy and other impairments and their ability to retain and receive Speech Generation Devices (SGD).

As of September 1, Medicare will be changing the rules and will not allow patients to receive this devices to "unlock" them.  Thereby, denying individuals the ability to communicate with their families and other individuals via email, text, video chat, etc...  Even though the unlock fee is not paid by Medicare, they will no longer allow individuals to purchase devices that this could be done on.

Medicare has also been denying Eye Gaze devices for those individuals whose only means of access if via an eye gaze system.  Many of these cases have 2 medical professionals certifying the need for an eye gaze system and it is still denied. The backlog of appeals is years long and many patients are being denied the ability to communicate.

Please take a moment and go to this website - Center for Medical Advocacy, fill in your zip code, and the short form that follows to contact your representatives and urge them to sign a petition to stop these rule changes!  It takes just 2-3 minutes.  You only have until August 27, so please do it right away!



Share this
Do you know somebody else who would find this post interesting or useful? Please forward it to them. Did somebody forward this post to you? Visit Teaching All Students and subscribe to receive posts for free. If you need a RSS Reader please visit this post Google Reader Replacements.

          Chrome - QR-Code Extension        
I a big fan of the Google Chrome Browser, there are a ton of amazing extensions and apps that you can use with students.  I've blogged about quite a few of them - Read & Write for Google Docs, Kaizena,  and on EdCeptional #42.  Here's a new one that just for creating and reading QR Codes.

The QR Code Extension is designed to allow you to quickly create QR codes for downloading and sharing.  Once you are on a page, just click the icon in your extension bar (to the right of the address bar) and it will show you the QR Code.  Click "Edit This QR Code" to find options for downloading and sharing.

The other option is not one I've seen in an extension.  Click the "Scan a QR Code" and it allows you to use your webcam to decode a QR Code.  So if you've ever been sitting and wanted to use a code, this is the extension for you!!  It's a great option for students, I've always advocated for using QR Codes for long URL's and this would help do that without a special program.  Just print out QR Codes for your students and let them scan using the extension.

You can try out The QR Code Extension here!



Share this
Do you know somebody else who would find this post interesting or useful? Please forward it to them. Did somebody forward this post to you? Visit Teaching All Students and subscribe to receive posts for free. If you need a RSS Reader please visit this post Google Reader Replacements.

          QR Codes for Vocabulary        


Matt Bergman, at Learn, Lead, Grow, shared a great post on ways to use QR Codes to teach and retain vocabulary.  I love the ideas of engaging students with technology to teach this skill.  Check out all his ideas at his blog:

3 Ways to Use QR Codes to Make Word Walls Assessable to ALL Students #UDL



Share this
Do you know somebody else who would find this post interesting or useful? Please forward it to them. Did somebody forward this post to you? Visit Teaching All Students and subscribe to receive posts for free. If you need a RSS Reader please visit this post Google Reader Replacements.

          ãƒã‚¤ãƒ‘ーカード        

ハイパーカードが無くなったのがフリーソフト減少の一旦な感じも…

開発環境が標準添付でもXcodeでは敷居が高いですね。

個人的にはフリーソフトが減ったと言うよりシェアウェアの比率が高くなったのと日本人フリーウェア作者が減った印象です。

日本語アプリじゃなくても構わないという人間には不便しないけど簡単な操作方法でも外国語と言うだけで難しい印象も受けますしね。


          Three days in Berlin (or improving the pim user experience)        

KDE Project:

Last weekend I've met with some of our old timer KDEPIM developers and some of the newer ones who are interested in KDEPIM or related technologies in the KDAB offices in Berlin.
Being a KDAB employee for a few years already (wow, time is passing quickly), the place was familiar, the people looked familiar. The foosball table was slightly familiar, although some players changed their dresses in order to spread confusion inside the visitor's heads. That is the only reason we've lost against locals with 5-0, 5-0.
Suprisingly enough, the table wasn't used that much. Why? Because people were busy either working and talking. What they talked about I don't know too much, as I focused on some issues I planned to fix, but others can testify that Volker did not sit too much in front of his computers, but was dragged from one place to another for various discussions.
Most of us started on Friday around noon. I won't tell too much about what others did, that is mostly their problem. Especially if they were on the other side of the room and I didn't saw their screens, I can't tell if they worked at all or not. They looked like they did though. ;) I can share some things about what some sitting nearby did. See later.
As recently I became the de-facto maintainer and bugfixer for mail filters, I worked mostly on them. Unfortunately the first attempt to fix a bug failed: a bug that bothers me, although it is not the most reported one. It is about mails not being filtered for a while after a resume from hibernation. It is hard to reproduce, and although I run into it, I couldn't reproduce reliably enough and in a way I can debug it. After fighting with it and realising it won't work, I gave up. See you next time.
Meantime we had some excellent food in an Indian restaurant, then when finally everybody arrived (almost everybody to be honest, plus even some more from KDAB who didn't sign up, but show up there), we were ready to start with presenting the kdepim and Akonadi architecture. Old time pimsters Volker Krause, Kevin Krammer and Tobias Koenig helped me with it, and sometimes saved me, as my knowledge in some area proved to be superficial. We ended up with a pretty impressive drawing on the whiteboard:
Hopefully for those being on site it was understandable.

Time passed, so we went out for dinner to a Greek restaurant at the corner. Nice place, third time being there, good food (seems Berlin has only good eating places). We even saw how Germany won over Ireland. Too bad Steveire (Stephen Kelly) was not there... We continued with some more talks and hacking, then everybody went to their sleeping places.
Some left earlier, some later waiting for remote developers to show up and discuss the patches (he didn't show up).

Day 2
Next day started around 9 o'clock for some. Later for others. I continued with the filter debugging and fixing. I looked at the bugreports and tried to come up with some bugs that are both would help the users and myself. I'm selfish, I want to fix the bugs I run into. ;) One problem that bothered me for a long time is that email content from online IMAP is downloaded even if no filter for IMAP requires it (but a filter for e.g POP3 needs the full content). Now this is fixed and those who use online imap could notice a great speedup in mail syncing (depending on their filter setup). Another often reported issue was duplicating the mails, especially after spam filtering. You've ended up with a mail in the spam folder and a mail in the original place. This could be combined with a conflict dialog shown up as well for that mail. This problem actually revealed a not-well handled case down inside the Akonadi stack that was created by a reordering of filter commands in the filtering code. For those who want technical details: if there was a move action (like "move mail to spam folder") followed by a modify action (like "mark as read"), the filter reordered this to "mark as read" followed by a move. Unfortunately this exposed two problems, (mostly, but not only) IMAP specific: on IMAP you can't modify a mail, instead you create a new one and delete the old. What happened here is that a filter changed the mail (run through bogofilter/spamassasin), then the "mark as read" action was executed, which uploaded the changes, including the changed mail to the IMAP server. This caused a new ID for the item on the IMAP server. The mail with the old ID was deleted. Then the filter agent performed a move, but he had only the *old* ID, before the modifications. The move - if performed between two different resources, like IMAP and local maildir - is technically a copy followed by a delete. The copy worked fine, but the delete didn't. It tried to delete the old mail again (which was gone), not the modified version. That's how you ended up with a duplicate.
The current solution is to reorder the filtering pipeline, so the move is performed before the flag modifications. The extra benefit is that the filtered message is not uploaded again just to be deleted the next second. Speedup, less network traffic, better user experience. This doesn't fix the main problem with Akonadi, but it is an acceptable workaround. The reordering is so far only in the master branch (KDE 4.10), but the relevant code will be backported to the 4.9 branch, so it will be in 4.9.3.
And speaking of conflicts, that was the next hot topic, and one of the often reported bugs. It was mostly caused by conflicting flag changes (read/spam/important/etc), either caused by KMail itself plus the filtering or just KMail. After some discussion we agreed, that reporting conflicts on flag changes doesn't make sense, so we should not bother the user. It is not data loss, and in worst case some flag is reset. In normal case nothing wrong happens, as Akonadi is able to merge two changes in the flags (or so claims Volker).
I have to admit that this fix was not completed at the sprint, I finished it today, as I noticed more code in KDEPIM that didn't disable conflict check on flag changes.
While doing the changes, I did quite some refactoring, cleaning up the code as much as I could do for the parts I touched. The code was originally deep inside KMail (as most of other code), got extracted from it for 4.8.0, and now we are at the stage that we can make the extracted code more cleaner, we can remove some things that doesn't make sense anymore now that the filtering is not inside KMail.
While reading the bug reports, I also run into one indicating that mails arriving to an MBOX account (like /var/spool/mail/username) are not filtered automatically. Sounds like an easy bug to fix and so was it. Now they are filtered.
Finally another annoying issue was fixed: there was no indication that filtering is ongoing. Now when this happens, you can see in the KMail's progress bar.
The net result of the above: faster filtering, less annoying and useless error dialogs for the users. And according to bugzilla, 31 bugs less (some were duplicates though).

Nepomuk...one of the things that, well, so far I was always recommending for users to turn off. Slight detour here: what is Nepomuk and its relation to KMail? Nepomuk helps you to find data. It indexes all kind of data and with some queries you can find e.g every file where my name is mentioned, all email addresses from any file, etc. There is a process that goes through the akonadi data (emails, calendars, etc) and "feeds" to it for Nepomuk to be indexed. Then there are queries and code in KMail accessing Nepomuk: getting email addresses for composer's autocompletion, searching inside mail bodies, tagging your emails with custom tags, etc.
Unfortunately there are problems around it. One is that some queries ae processed quite slowly, that in turn slows down KMail, leading to poor user experience. E.g switching between mails, sending mails, etc. is slow. Or startup is slow or even blocked. I tried to fix the last part as I just run into it, but as this was my very first Nepomuk related patch, I'm not sure 100% succeeded. We found a problem with the Nepomuk API itself, and I informed Vishesh, the Nepomuk developer about it (even if I used non-blocking calls against Nepomuk, one call is blocking without question). He suggested something I might try later, although I'd be more happier if somebody with real Nepomuk knowledge could give a review of the pim Nepomuk usage.
Then there is the Akonadi feeder, that gives the data to Nepomuk. Something is not perfect there and the indexing causes a serious slowdown, where either itself or Nepomuk (actually its storage backend, virtuoso) starts to use the CPU *a lot*. This is the main reason I recommend to users to disable Nepomuk so far. We had Christian Mollekopf the author of the feeder in the sprint, and he worked on some optimizations. Hopefully this will improve the situation. Meantime we (and I) tried to convince Vishesh to use KMail, so he can see himself the problems our users face.

As a break we had another presentation, this time about KMail itself, what components make up KMail, how they are distributed. As far as I saw, this was less interesting to the audience, they rather looked at their computers and hacked on something. Luckily our KMail maintainer, Laurent Montel, is super active, but I wouldn't mind more contributors. Too bad he wasn't at the sprint.

We had a lunch at a nearby place, nothing extra, but the food was (again) good.

What did other do? Let's see what I can remember... Sune dreamed about crypto stuff and composite jobs. He worked on making some cryptographic code asynchronous and started to get faimiliar with kdepim code. I'd not say he picked up the easiest job.
Volker run around all the time, discussed various things like "spanish sync" with Alex Fiestas (see here), database backends with Martin, change recorder with David Faure (who remotely joined the meeting and got lost inside the change recorder code ... he has the solution now in his head, so be patient, we will end up with a better implementation for it that again speeds up Akonadi), job pipelines with me, and who knows what with others, as for a long time he just disappeared with a bunch of developers. They actually ended up in the lobby discussing "stuff". Milian Wolf, who is not (or not yet?) a KDEPIM developer, but mainly a KDevelop one, joined us and used massif to track down some ugly memory usage in KMail. And he did a good job in it. Previously KMail used more and more memory as you navigated between large folders (Alex mentioned some 2GB for him), while now it levels up at one point and doesn't increase. He might blog himself about, as he has also some nice graphs.
Then there were two guys from KDAB, who are old time pim developers (quiz: find their names in this blog), but they cooked something else, not related to KDEPIM, not related concretely to KDE, but to a lower level: to Qt. It is an amazingly cool stuff, but I don't want to give more details. Expect it to be presented a the Qt Developer Days, either in a talk or at the KDAB booth. Don't worry, I'm pretty sure it will be freely available what they did and KDE can enjoy it in the future.
I'm sorry that I don't remember what the rest did. In general I know that Martin Klapetek worked on the social network resources, Mark Gaiser, who recently started to work on KDEPIM stuff eagerly listened to our presentations and worked on a QML calendar application, Alex kept reporting bugs and discussed improvements with Volker, while John Layt, the "timezone KDE guy" worked on plasma calendar related issues.
As a KDE person Chani also joined us for a while, we quickly nominated her as the QML and Plasma person, so all questions related to them were immediately redirected to Chani. Jos Poortvilet was also supposed to join for some talks, but he could show up only on Sunday for personal reasons.
At the end of the day everybody was so busy, so instead of going out for eating, we just ordered some pizza. And most of us stood in the office well past midnight.

Day 3
Well, the above partially happened on Sunday. It was a shorter day for me, due to the late night standup before, and that I had to go to the airport after lunch. A lunch that wasn't exactly as planned. We went out for a Doner Kebab place that is supposed to be the best one in Berlin. It is just a small kiosk on the sidewalk in a street, but man, there was a big queue for it. On a Sunday! Locals says it is worse on weekdays. Even after almost an hour, we still had 10 persons in front of us, my departure time was approaching, so I gave up and instead bought some (quite good) chinese fast-food from a nearby place, then rushed to the airport.
A long journey awaited me with a 3 hour stopover in Munich, but luckily I had a power supply there and even some network (they offer 30 minutes/day/phone number), so I could continue on the work I started at the sprint. After flying and driving another 2.5 hours, I arrived late (or rather early) morning next day back home, and after sleept until around 10. Then I started to work again for KDAB, a work that is just as enjoyable as working for KDE. After all, the two communities has a serious overlap. ;)
That's from the sprint. If you'll be at the Qt Developer Days Europe, we might meet there. I'm looking forward for a good conference.


          The story of some bugfixes        

KDE Project:

This is the story of how bugfixes can happen. For each bug there is a bug reporter. It doesn't really matter if it is another developer or a non-developer user, as in the end it is just a user. Or does it? Let's see.

The first bug I fixed not so long ago was a line on the chat asking "what's ctrl+shift+l supposed to do in kmail?" from Albert (tsdgeos). Sounded like user support, but turned out that the reason he asked me was that pressing this combination crashed KMail. Of course, I tried and could reproduce it. It was related to Favorite Folders and as nor the reporter, nor I had such folders configured, it was rather straightforward where the problem is. Half an hour ago the bugfix was committed, everybody is happy.

The second was more complicated. There was a long standing report from our KDE expert David Faure that resulted in losing the mail content on move. It wasn't the first time I looked at the code to find the problem, without success. We couldn't even reproduce the bug. Then suddenly a message came on IRC: he could reproduce it again and found a pattern how it happens: it happens if the source mail account (resource) is in offline mode, meaning KMail *might* not have access to the whole mails, only to the cached parts (the mail header). Having this information finding the bug was relatively easy and next day David has the patch. But he wasn't happy: now he got an ugly message box with an error that doesn't mean too much, an error that doesn't tell what is the problem and what could be the solution. So I looked up how this could be fixed. The solution wasn't straightforward, involved changing several pim related components, including adding a new DBUS method that is used to communicated between different Akonadi part, but in the end I had it...only to realize that although I get a nice error now when copying mails, I can't read my mails. Because it gives a DBUS related error. I've added a method returning a string, but from the error it said that it was expecting a string, but got a boolean. Confusing.
Looked at the code, looked again, tried different things: no go. I told to David (knowing that he is an extermly good developer), that here is the code, here is the error, I have no idea what to do.
He looked at, and all seemed fine. It was late, we both called it a night and went to sleep. Of course the problem bothered me, so next day I wanted to give it a go. Guess what, David was also online (this was Saturday), he was also interested in the problem. :) To make the story short, he found the issue: the problem was a setDelayedReply( true ); call I overlooked. That caused basically QDBus to ignore our return value, that must be sent later (and the code sent a boolean there). David did a refactoring, I found a corner case, we both tested, all was fine. After a few final touches, like making the string translatable the patch was ready for review. As David said, it was a nice teamwork.

The last one was the same day at evening: a complaint that KMail cannot move/delete folders from an IMAP inbox. Weird bug, as most of us use IMAP, so this should have been noticed before. I asked for details, I asked for different logs, to try different scenarios. The reporter followed everything I told promptly, and the surroundings of the bug started to take shape. He had an IMAP server without support for ACL (access rights). In that case we should assume everything is fully accessible. And so was everything for him, but the top-level inbox. Having that information, by reading the code I found the faulty line - a line that was weird, and unneeded. The line was introduced because of a bugfix, so I looked up the bug only to find users complained it is still not fixed. No wonder, as the fix was not doing anything about the original problem, but unfortunately created other problems. I have to admit that the API involved is easy to be used in a wrong way, but hard to fix now. For those interested (and to avoid such API), here is the problem:

// Returns the rights the user has on the collection.
Collection::Rights Collection::rights() const
{
CollectionRightsAttribute *attr = attribute();
if ( attr ) {
return attr->rights();
} else {
return AllRights;
}
}


// Sets the @p rights the user has on the collection.
void Collection::setRights( Rights rights )
{
CollectionRightsAttribute *attr = attribute( AddIfMissing );
attr->setRights( rights );
}

And the problematic commit looked like this:

Collection root;
root.setRights( Akonadi::Collection::CanCreateCollection );

You see, by default, a Collection object doesn't have any rights set. If Collection::rights() is called it will return AllRights. What happens after the above setRights() call? The Collection will have now right attributes (CanCreateCollection), so a further Collection::rights() returns that attribute. But *only* that one. Certainly not the behavior one would expect. We can debate that the plural form (setRightS) suggests that, but I still find bad API.
Back to the reporter, luckily the problem could be fixed with the developer tool called "akonadiconsole", so he was happy. Other users will get the fix in the next release.

From the three reporters two were KDE developers. One not having too much knowledge about the PIM part, the other having some knowledge, as he is the one running in the most weird PIM Issues, and we just tell to him to fix his own bugs, while the third was somebody who I never met before, so I assume he is a regular user.

What helped in all cases was communication: giving valuable information (like how to reproduce, what is your configuration, etc) and carefully following the instructions the developer makes. Especially if the developer cannot reproduce it, the only real chance to fix it is that the user acts as the eyes and hands of the developer. If I tell to my hand to type "foo", but it types "bar", nothing good will result in it, as I'd expecet that "foo" was typed and act further accordingly.
So bug reporters, please try to gather as much information from your side as possible when creating a report and always follow the requests a developer makes.

You should not draw a wrong conclusion from the above: that reporting on *development channels* on IRC helps and you should always come there with your bugs. IRC is great for instant communication. It is very bad though as you might not find the right person there when you report.
Use the bugtracker. Wait patiently for feedback (e.g. I work on KDE only from time to time and many others do the same). It is ok to ask about certain bug on IRC, but don't forget to report it. It is also ok, once the developer responds and starts to work on the bug to contact him on IRC (if you know its nick), as communication is faster on it.
Just saying something doesn't work on IRC will also not do any good, unless you are prepared to help track down the issue. And then you will suddenly become part of the team. It is not that hard to be a KDE contributor, no? :)

To answer my first question: does it matter if the reporter is a developer or a user? In certain aspect it does, I couldn't fix the bug (at least not that easy) without David. It might be slightly easier or faster to get out information from a developer. But if the communication is good, it doesn't matter too much.


          Akonadi misconception #1: where is my data?        

KDE Project:

I regularly see the same misconception and fear popping up on the mailing lists, bug reports and IRC: if the Akonadi database gets corrupted, I will lose my data.

To make it clear from the beginning: the Akonadi database is NOT your MAIN data storage.
Even if it gets destroyed, removed, your data is still safe.

So what is the database?

1) It is an interface: the Akonadi server and the underlying database is a common interface to your (PIM-alike) data for different applications, so those applications do not have to deal with the data files directly.

2) But I see my email headers and even the body in the database and in $HOME/.local/share/akonadi/file_db_data. Why? Because the database is also a cache towards your data. Common, frequently accessed parts (like e-mail headers) are stored in the database. These are usually stored permanently and kept in sync with your original data source (IMAP folders, mails on the local disc).
Parts requested infrequently are either stored in the database or in the above folder. The actual place is decided upon the size of the data. These parts are from time to time cleaned up from the cache, if they were not used for a certain period of time. Technically it is possible to configure when the cache is cleaned or if it is cleaned at all, but the regular user should not have to deal with it.

3) Is there anything I might lose by deleting the database? Yes, there is, and that is the metadata added to your data. That can be anything extra information that cannot be stored in the format of your data, like Nepomuk tags or other custom information. In case of emails, you might think that read/forwarded/etc. can be lost. Luckily this is not the case (since KDE 4.7.2), as the email storage formats can store these informations natively.

The above explains why you will not lose any critical information by losing your akonadi database.

Good, but where is my data if not in the database? This depends on what kind of data we are talking about.

1) E-mail: in case of IMAP (online or disconnected) your data is on the IMAP server. With disconnected IMAP there are windows when your local cache contains data that is not yet syncronized to the server, deleting the local cache in this case indeed will make you lose the unsynchronized files. This is not Akonadi specific though, this is true for any disconnected IMAP client.
In case of POP3, the mails is stored immediately after download in a local maildir folder. The actual place of the folder depends on your configuration, it can be just as $HOME/Mail, as $HOME/kde./share/apps/kmail/ or $HOME/.local/share/.local-mail (for new installations).

2) Calendars and contact information: they can be either on a server (Kolab server, LDAP server) and only cached in Akonadi as explained, or they can be in local vcard or .ics file. The actual location of these files again depends on your setup. The new standard place for them is $HOME/.local/share/contacts.

Still there were reports of data losing, why? Unfortunately programmers are not perfect and introduce bugs in the codebase. One of the most severe bugs caused real data losing when copying mails from one folder to another. This is fixed with KDE 4.7.2+ and any recent Akonadi server. There are other bugs around, but none will cause losing your original data files.

Finally, what will happen if the database gets corrupted? Of course, it needs to be recreated. You can try by shutting down akonadi server (akonadictl stop), removing the $HOME/.local/share/akonadi and syncronize all your resources again (this will take some time). If the database is not recreated, you need to do a full cleanup by removing also the configuration files under $HOME/.config/akonadi.
Then you need to add back your resources (IMAP/POP3/contact files/etc) and syncrhonize them. In case of emails, you need to check your filters, they most probably try to move the mails into a wrong folder.
Yes, this is a lot of work and should be avoided as much as possible, but it should be done only in the rare case of real database corruption.

I hope this will clear some confusion about the data storage inside Akonadi.

And a few word about the database itself.
We use MySql. I don't know the original reason why it was picked up (ask Volker about that ;) ), but I know some people don't like it for whatever reason.
Most of them try to use SqLite. A friendly warning: don't. This is explained also in the akonadi wiki. All what is written there is true, and I experienced myself as well.
Unfortunately recently I learned that MySQL has some severe issues in certain cases: NFS mounted home directories and failed suspend/resume. In these cases the database gets corrupted (this is a MySQL bug!), and cannot be easily restored. I did not experience this corruption myself, but was reported from time to time.
What remains is trying another database server, namely PostgreSQL. Akonadi supports it, it is possible to change the database backend in the akonaditray or in the akonadiconsole application. Changing backends means importing all your data again to the database, like you'd start from scratch. PostgreSQL support is not that well tested, so expect some rough edges, but we would like to see people try it out and reporting their experience with it.
It is my personal opinion only, but if PostgreSQL proves to work fine, we might switch to that as the default backend, given the problems with MySQL.

What about other database backends? There were plans to use Virtuoso, to reduce the number of database severs needed for a KDE desktop, but the work was not completed. See the techbase aritcle.

UPDATE: Christophe Giboudeaux raised a point about PostgreSQL, that their database format changes between major releases in an incompatible way and there is no automated, easy way for upgrade (you need to dump it with the old version and import with the new one). Sad, that there is no perfect solution.


          KMail - making it more usable        

KDE Project:

KMail is one of the most important applications inside KDE, I think hardly can argue anybody about it. Everybody is using email, and even if some think that a webmail solution can be just as good, most of us still do what we did 10-15 years ago: download mail to our computer/phone/tablet and carry that around.
And for that we need a mail application.
It is not news that KMail got just too big and not flexible enough in the KDE 3.x days. Somehow it was ported to KDE 4, but this was a crude port, without much improvements in its design. A new generic PIM backend was growing up meantime, and with some corporate support from KDAB, a new generation of KMail, KOrganizer and other PIM application started to take shape.
From those I can tell about KMail, as I was more involved into it. As we wanted to have a mobile, touchscreen version as well, the work of porting KMail to Akonadi was done together with breaking KMail into smaller pieces, more or less standalone libraries to reuse as much code as possible. Time, manpower and other reasons limited what we could do, so this was a part success. We created and improves some generic usage libraries (KIMAP, KMime), some internal libraries that are nice, some that are not that nice, and in the end we had something that could have been a good foundation for KMail 2 series.
I started to use KMail2 at that time, and in the beginning it was a fustrating experience. I can't count how many times I deleted and created again the accounts, the Akonadi database. But after a while I realized that I don't have to do anymore. KMail2 was still not released to the public, but got better and better. Unfortunately only slowly, as even less people worked on it, and only in their free time. It had bugs, some more annoying, some less annoying, but was usable enough to not force me to go back to KMail1.
Then the PIM community took a deep breath - just like the KDE community did with KDE 4.0 - and finally released KMail2 officially.
Funny or not, around this time I started to have problems with it. A migration of my second computer failed horribly. A cleanup of the Akonadi database and changing from the mixed maildir to maildir format was also painful. I blamed the developers a lot (including myself :) ). Then things started to move on and KMail got a new maintainer, who is very active (hi Laurent!). And we organized a developer sprint to stabilize KMail.
The sprint took place last weekend in KDAB's Berlin office and was sponsored by the company. Everybody who knows the KDAB office, knows about the famous foosball table. Do I have to said that in the weekend we played only once? Yes, people were coding intensively, Volker had to raise the priority of the "FOOD" topic often.
Issues were listed on the whiteboard. And everybody picked up what he was interested to do. Work was done on the migrator, the mixed maildir agent, the maildir resource, on the akonadi server, performance bottlenecks were identified and a new filtering resource was created, fixing the most hated KDE bug (should be closed as soon as Tobias Koenig is happy with his work).
My choice in the sprint was mostly maildir related work, I tried to make it more reliable, more standard compliant and somewhat faster than before. And the biggest win is that I fixed most issues that bothered me with KMail's maildir handling. Yes, I was selfish.
The sprint did not end in Berlin, for me it continued on the flight back home (that thanks to the weather and Lufthansa was almost a day longer than expected). And somewhat still continues as of now, although daily work reduces the time I can allocate to KDE.
I can say that I'm happy again with KMail and Akonadi starts to gets less and less in the way of me and the users. The biggest success will be when users will not know that there is a nice server helping them, called Akonadi.
For those eager to try out the changes, unfortunately most of them are in the master branch only (the upcoming KDE 4.8). We will try to port as much as possible into the KDE 4.7 bugfix releases, but as some changes required library additions, this won't be always possible.


          Call for developers: Quanta Plus and KDEWebDev        

KDE Project:

Time is passing by. Sometimes I'm also amazed that it was more than 5 years ago when I wrote my first KDE application and soon after I joined the Quanta Plus project. And a few months later Quanta Plus become part of the KDE releases, I think with version 3.1.
Probably many of you know that I worked full time on Quanta in the past years, thanks to Eric Laffoon and many other supporters, who made this possible. But things have changed, and I cannot spend all my time anymore on this beloved project. I don't abandon it, just realized that alone it would take just too much time to get a release for KDE 4.x series out in time. Therefore I call for help, I'd like to ask the community, existing developers or users with some C++ knowledge, developers who would like to find a challenging project in the open source world to come, join us. Help to make Quanta4 a reality and make many users happy throughout the world. You don't have to be afraid of the size of the project, one of the goals of Quanta4 is to have a modular code, build up as KDevPlatform (KDevelop) plugins.

There are other projects inside the KDEWebDev module that need help, some even maintainers:

- Kommander: just take a look at www.kde-apps.org and you will be amazed by the number of Kommander scripts uploaded by the users. Help to have a good Kommander for KDE4 as well!
The executor is already ported, but we have lots of new ideas waiting to be implemented.

- KFileReplace: useful search and replace tool, unfortunately without a current maintainer. It works, but needs some love.

- KImageMapEditor: don't let web developers without a KDE image map editor!

Of course our priority would be Quanta Plus and Kommander, but if you are interested in either of the above, just contact us on our developer list.


          Grinding a cam for a model V4 engine by Joe Martin        

Joe Martin put together a cam grinder from mostly off-the-shelf Sherline components, a coolant pump and a few custom plumbing and bent brass pieces. He spent over 3 years developing the g-code software, which he wrote himself. The heart of the system is a 4″ grinding wheel driven by a Sherline headstock and a Sherline […]

The post Grinding a cam for a model V4 engine by Joe Martin appeared first on Millhill Supplies Ltd..


          Improve your nonprofit’s account security with 2-step verification        

While online accounts allow nonprofits to easily communicate with partners, volunteers and donors across the world, this shared network can also leave your account vulnerable to intruders. As your nonprofit continues to grow its online presence, it’s crucial to keep confidential information (e.g., finances or donor’s information) safe. While passwords have historically been the sole guardian for online account access, research from Google has shown that many passwords and security questions can easily be guessed. That's why we strongly recommend that all nonprofits using GSuite for Nonprofits, or Google products like Gmail, use 2-Step Verification (2SV) as an additional protection on their account(s). 

Account hijacking—a process through which an online account is stolen or hijacked by a hacker—constitutes a serious threat to your nonprofit’s operations. Typically, account hijackings are carried out by phishing attempts or hackers who guess weak passwords. Because of this, it’s especially important for your nonprofit to maintain strong and unique account passwords to keep sensitive data safe.

But 2SV goes beyond just a strong password. It's an effective security feature that combines "something you know" (e.g., a password) and "something you have" (e.g., a text, a prompt, or a Security Key) to protect your accounts. Think of this like withdrawing money from an ATM/cash machine: You need both your PIN and your debit card.

Google Authentication app.png
Our free Google Authenticator app is available for Android and iOS devices, which generates a code for you each time you want to sign in to your account.

Now that you know what 2SV is, head over to our Help Page to start improving your nonprofit’s online security now. (Quick tip: Remember to keep your account settings up to date and configure backup options to use if your phone is ever lost or stolen). Stay safe, nonprofits!  

To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more at no charge. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.


          A nonprofit's guide to online security: So you want to learn the lingo?        
This year marks the 25th anniversary of the World Wide Web becoming publicly available. For many of us, this is a reminder of just how much the Internet has transformed our daily lives. This rings true for nonprofits too: The Internet has revolutionized the way that nonprofits communicate, fundraise, and recruit volunteers. It has enabled nonprofits like yours to share their mission with a global audience. To raise awareness. And to change the world. 

But the power of the Internet also comes with great responsibility -- namely the need to keep information safe and secure. As a nonprofit, it can be difficult to keep up with online security, especially when terminology seems complicated. Yes, you might have heard of terms like “phishing” or “cookies,” but what do they mean?

Today, you can find the answers to your questions with our quick & easy to guide to online security terminology. In less than five minutes, you’ll be well on the way to helping keep your nonprofit safe on the Internet. 

Let’s get started! Here’s a quick guide to familiarize yourself with common lingo and learn how to distinguish terms that are friends vs foes in the online security realm. 


THE BAD GUYS: MALICIOUS ACTIONS/TERMS

  • Advanced Fee Fraud (419 scams): A technique which tricks users into sending or paying money to fraudsters on the promise of receiving greater rewards afterwards. It is most commonly associated with Nigeria, and 419 is the section of the Nigerian legal code that covers this fraud.
  • Botnet: A network of computers that are infected with malicious software without users’ knowledge, used to send viruses and spam to other computers.
  • Malware: Malicious software with the purpose of infecting devices and systems, gathering personal information, gaining access to systems or disrupting the operations of the device or systems. Essentially, any software that maliciously alters or compromises the system or device.
  • Phishing / Social Engineering Attack: An attempt by hackers who pose as trustworthy individuals or businesses in order to get your personal information such as usernames, passwords, and financial information.
  • Trojans: Malicious programs posing as or bundled with legitimate ones, which are designed to compromise your system. They are usually installed on computers from opening attachments in scam emails or by visiting infected websites. The term comes from the Trojan Horse in Greek mythology.

How to avoid social engineering attacks

THE GOOD GUYS: ONLINE SAFETY TERMS


  • [Internet] Cookie: A piece of data from a visited website and stored in the user's web browser in order to remember information that the user has entered or engaged with such as items in a shopping basket on an e-commerce site.
  • Encryption: The process of encoding data, messages, or information, such that only authorized parties can read it.
  • Firewall: A security system used to block hackers, viruses, and other malicious threats to your computer. It does this by acting as a barrier, acting on predetermined rules, which allows trusted traffic but blocks untrusted or non-secure traffic. 
  • HTTPS (Hypertext Transfer Protocol): is the protocol for secure communications over a computer network used on the Internet. It essentially provides authentication of the website and the web servers associated with it. 
  • Transport Layer Security (TLS): TLS is a protocol that encrypts and delivers mail securely, both for inbound and outbound mail traffic. It helps prevent eavesdropping between mail servers – keeping your messages private while they're moving between email providers. 
  • Two Factor Authentication / Two Step Verification: A method of using an additional process to verify your identity online. It combines both ‘something you know’ (like a password) and ‘something you have’ (like your phone or security key) — similar to withdrawing money from an ATM/cash machine, where you need both your PIN and your bank card.

That’s a wrap for now! Pass on these tips to your nonprofit partners to stay safe and secure online, so you can focus on what matters most: changing the world. 

//

To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more at no charge. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.


          Four ways to keep your nonprofit safe & secure online        
safety security g4np
For nonprofits, the Internet serves as a powerful vehicle for change — creating a way to access information, connect with users, and drive innovation. But navigating the web can also be a tricky task. Online safety and security has become increasingly pertinent for all digital users, including nonprofits. While it’s relevant to all though, it’s unattended by many. This raises the question: “How do we keep our nonprofit (and the community we serve) safe and secure online?”

Today, we’re partnering with Google’s User Advocacy Group to share four smart tips to keep your nonprofit, your users, and you safe online.

1. Secure your passwords

Many of us “know” that it’s smart to pick a strong password, but out of convenience we also continue to use our favorite pet’s name (e.g. “Clifford”) or other not-so-creative passwords like “password.” Although pets like Clifford are great, they don’t make great passwords. Rather, this weak protection creates vulnerable access to some of your nonprofit’s most sensitive information.

Picking strong passwords that are different for each of your accounts is extremely important -- it’s also good practice to update your passwords regularly.  Check out the following tips: 

  • Use a unique password for each of your accounts. Would you give a burglar a key that accessed your home, car, garage, and more? Using the same password for multiple accounts creates the same type of risk. Ensure you’re protecting your data by using unique passwords for each account.

  • Include numbers, letters and symbols in your password. The longer your password is, the harder it is to guess. Adding numbers, symbols and mixed-case letters makes it harder for someone to gain access to your account.

  • Create password recovery options and keep them up-to-date. If you forget your password or get locked out, you need a way to get back into your account. Many services will send this information to a recovery email address to reset your password, so be sure your recovery email address is up-to-date and accessible. You may also be able to add a phone number to your profile to receive a code to reset your password via text message. Having a mobile phone number on your account is one of the easiest and most reliable ways to help keep your account safe.

2. Take the security checkup


Google’s Security Checkup is a quick, easy way to review the following information about your account (and more)!
  • Recent activity: This is a quick overview of your recent sign-ins to Google. If you see any activity from a location or device you don’t recognize, change your password immediately.

  • Account permissions: These are the apps, websites, and devices connected to your Google account. Take a look and make sure you trust—and actually use—all of them. You might want to remove an old phone, or that dusty app you never use.

  • Check your 2-step verification:  Most people have only one layer of protection with their password. 2-step verification adds an additional layer of security to your account by requiring a phone or security key to access your account information.

3. Understand your privacy settings


If you do your personal and business work on the same computer, you will want to also check your privacy settings through Google’s Privacy Checkup. Privacy Checkup allows you to control what information like photos, videos and reviews are shared to the public or to whomever you choose.
  • Manage your sharing: You can decide what information you want to share such as videos, photos and reviews. Perhaps your nonprofit videos are only shared with your friends, when you want them to be shared with anyone. This is a simple way to check to see who can see what.

  • Personalize your google experience: One additional function of privacy checkup is to see what information you’re sharing with Google. Google uses this information to provide better search results and more relevant information to get you answers quicker and more relevant information to share to your nonprofit community.


Review important information about how Google uses data to make services better for you and your nonprofit.

4. Ensure you're switching between your personal & business accounts


We understand that as a nonprofit, you wear many hats and manage multiple business accounts in addition to personal ones. Google makes it easy toggle between accounts — visit your account settings to quickly determine which data you’re accessing, and rest easy knowing your personal and business information are separate.

  • Guest Mode or Incognito mode: Share Chrome with other people in your organization and ensure everyone has their own settings and bookmarks. You can also utilize Guest mode or Incognito mode to open a private browsing session in Chrome without leaving browser history or cookies behind once you’ve logged out.

  • Using Chrome on an unfamiliar device or machine: If you’re using an unfamiliar device or machine, ensure you’ve properly logged out of your account before heading off to your next meeting.


Online security doesn’t have to be difficult. These simple steps will give you peace of mind and protect your nonprofit’s valuable work. If you have any other online security questions or want to recommend a topic for a future blog, please add a comment below. 

To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more — all at no charge. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more + enroll here.  


          Broadway Unlocked shares five lessons learned from hosting a livestream benefit        
Each year, one in six people in the U.S. will be victims of violent crimes. Two years ago, we became part of the effort to change that, when we began work with Broadway Unlocked. 

Two years ago, we met Jessica Ryan — a woman whose mission is rooted in two seemingly unique spheres: celebrating live theatre and helping survivors of interpersonal violence. Jessica founded the  Broadway Unlocked #giveback concert, a livestream, interactive benefit concert aimed at connecting the two communities and helping raise awareness and donations for the Crime Victims Treatment Center (CVTC). The CVTC, New York State’s largest and most comprehensive hospital-based victim assistance program, provides therapy and services to survivors of assault, abuse and violence. All treatments at CVTC are free.

In an effort to reach a larger audience and expand the nonprofit’s donor base, Broadway Unlocked collaborated with Google for Nonprofits to broadcast the show and spread the message globally in 2016. On February 22, Google for Nonprofits helped bring Broadway to YouTube for the second year in a row with one night of song and social responsibility through the concert. To bring the show beyond NYC, Google Fiber hosted a watch party at the Fiber space with local Kansas City theatre groups and community members. 

This was a Broadway show unlike any other. This was Broadway with a variety of star performers, including Kyle Dean Massey, Carolee Carmello, Ali Stroker, Natalie Weiss, and Collabro. This was Broadway hosted by Google Fiber. Streamed via Google Hangouts on Air. And fueled in part by fundraising through donation cards on YouTube. This was Broadway on the internet -- crowdfunded and broadcast for one night only.

How did Broadway Unlocked make their globally livestreamed and crowdfunded event a success? We’re turning the mic towards Broadway Unlocked to hear what they learned.

5 Lessons Learned from Hosting a Livestream Benefit

  1. Engaging the community is key: Using Hangouts on Air, we were able to pull off a cross-city sing-a-long! Check it out. The video wasn’t flawless, but we successfully transported Broadway beyond the Big Apple.

  2. Global events can help grow engagement and donor base: Putting on an event in different cities is no easy feat. But it's amazingly rewarding to bring like-minded people and groups together to support similar causes. Hangouts and livestream technology made reaching new communities easier to do in one event. And by engaging these communities, we’ve been able to grow a stronger community and ultimately, donor base.

  3. Interactive video adds another dimension of creativity: Using Hangouts allowed us to engage the audience on the other side of the screen, adding a new dimension unique from watching on a passive screen. Our creative team came up with Musical MadLibs, (our new favorite game!), which really shows how we were able to interact with the crowd through video chat.

  4. Google is a gamechanger for nonprofits: YouTube and Google Fiber enabled us to livestream the concert to theatre lovers and supporters in Kansas City and hundreds of people at home that night. This allowed us to increase the viewership of our benefit by 10X more than if we had only shown the concert to the folks at the Greene Space in NYC.

  5. Crowdfunding and donation cards can help you reach your goals: Through crowdfunding using donation cards on YouTube, One Today donations, live fundraising at the concert, and private donations, we raised more than ever before -- an astounding $50,000. This additional funding will hugely impact our ability to provide treatments for victims of domestic violence in tandem with the CVTC.

To see if your nonprofit is eligible to participate in the nonprofit programs, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours free access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.

If you are a U.S. nonprofit looking to add donation cards to your YouTube videos, learn more here.

Nonprofits aren't endorsed by YouTube or Google


          Customer Service Representative - ePromos.com        
Cincinnati, OH -
Location:Cincinnati, OH
Job Code:108
# of openings:1
Description

ePromos Promotional Products Inc., a seven time winner of ASI Best Places to Work, is one of the fastest growing promotional product companies in the US. We recommend and provide custom branded merchandise and
          Besplatan Strange Magic "zec"        
 

Odi na jedan od ovih proxy-a:
webproxy.to/ ili uk-proxy.co.uk ili dontfilter.us/ ili bypassthe.net/
Zalijepi ovu adresu:
http://stardoll.com/en/
Ulogiraj se na Stardoll i to je to :D

          Hel Platta Zingo 24 x 33cl        

Hel platta - 24 flaskor med den klassiska läsken Zingo! Priset per flaska: 4,95 kronor/styck exklusive pant!

+
-

          Hel Platta BCAA-dryck Röda Bär 24 x 330ml        

Hel platta - 24 stycken färdigblandade BCAA-drycker, här med smak av röda bär. Drycken är fri från kolhydrater och fett och passar perfekt när man behöver en snabb energikick, oavsett aktivitet. Priset per dryck: 12,45 kronor/styck, exklusive pant.

+
-

          Hel Platta Aloe Vera-dryck Citron 20 x 50 cl        

Hel platta - 20 stycken läskande Aloe Vera-drycker, här med god smak av citron samt fria från konserveringsmedel. Priset per dryck: 9,95 kronor/styck exklusive pant.

 

+
-

          Fruktdryck Lemonad 1l        

Härligt söt och läskande fruktdryck med smak av lemonad från Fontana. 

+
-

          Fruktdryck Körsbär 1l        

Härligt söt och läskande fruktdryck med smak av sura körsbär från Fontana. 

+
-

          Fruktdryck Persika & Äpple 1l        

Härligt söt och läskande fruktdryck med smak av persika och äpple från Fontana. 

+
-

          Fruktdryck Guava 1l        

Härligt söt och läskande fruktdryck med smak av guavafrukt från Fontana. 

+
-

          Blandsaft Apelsin 500ml        

Ekologisk och smakrik apelsinsaft som ger 2,5 liter saft. 

+
-

          Hel LÃ¥da Iste "Mint" 12 x 500ml        

Hel låda - Gott och svalkande iste bryggt på äkta teblad. Drycken innehåller endast naturliga ingredienser och har en frisk smak av mint. Priset per liter är 13,17kr exklusive pant. 

+
-

          Björksavsdryck Körsbär 250ml        

Kolsyrad dryck av björksav, här med smak av körsbär. Denna björksavsdryck har flera positiva egenskaper som påverkar kroppen! Den skyddar huden mot oxidativ stress, hjälper till att motverka celluliter samt innehåller vitaminer och mineraler som är hälsosamma för tänderna!

+
-

          Björksavsdryck 250ml        

Kolsyrad dryck av björksav. Denna björksavsdryck har flera positiva egenskaper som påverkar kroppen! Den skyddar huden mot oxidativ stress, hjälper till att motverka celluliter samt innehåller vitaminer och mineraler som är hälsosamma för tänderna! 

+
-

          Björksavsdryck Hibiskus 250ml        

Kolsyrad dryck av björksav, här med smak av hibiskus. Denna björksavsdryck har flera positiva egenskaper som påverkar kroppen! Den skyddar huden mot oxidativ stress, hjälper till att motverka celluliter samt innehåller vitaminer och mineraler som är hälsosamma för tänderna! 

+
-

          Tranbär & BlÃ¥bärsdryck 1l        

Härlig dryck med smak av blåbär och tranbär. Rik på vitamin C.

+
-

          Tranbärs- & Vinbärsdryck 1l        

Härlig dryck med smak av svarta vinbär och tranbär. Rik på vitamin C.

+
-

          Läsk Apelsin 330ml        

Uppfriskande läsk med ett högt innehåll av viktiga B-vitaminer samt järn, kalcium och fosfor. Drycken bereds genom naturlig fermentering (jäsning) av malt och är helt fri från konserveringsmedel. Här med smak av apelsin.

+
-

          Î— Google ενεργοποιεί "Panic mode" για το back button στην έκδοση 7.1 του Android        

Το Android στην έκδοση 7.1, απέκτησε ένα νέο χαρακτηριστικό με το παρατσούκλι "panic button". Η νέα δυνατότητα εντοπίστηκε από χρήστες του XDA-Developers και έχει σαν στόχο να δώσει στον χρήστη μια επιπλέον δυνατότητα αντιμετώπισης εφαρμογών που έχουν κολλήσει ή είναι κακόβουλες.

Πολλές κακόβουλες εφαρμογές, απενεργοποιούν το back button στο κινητό, αποτρέποντας τον χρήστη από το να βγει από αυτήν και να επιστρέψει στην αρχική οθόνη της συσκευής του. Το Panic mode, "παρακολουθεί" το πόσες φορές και με ποιά συχνότητα πατάει το back button. "Εκτιμώντας" την δύσκολη κατάσταση που βρίσκεται ο χρήστης, το λειτουργικό αναλαμβάνει δράση και παίρνει τον έλεγχο από την "κρεμασμένη" ή κακόβουλη εφαρμογή, κλείνοντας την, επιστρέφοντας την αρχική οθόνη.
A few malicious applications may turn off the 'back' key as well as other buttons. This then wouldn't let the user return to his main screen else any other application. The time is then when the user starts panicking. Unable to guess what is happening with his smart phone as well as what makes it not to answer the user's commands, the phone owner will keep on anxiously hitting the back button in anticipation of it behaving its usual way.

It is here when Google's system would find out the unusual behavior of the phone owner's back button i.e. why so frequently the button is being pressed. Subsequently, the system will prevail over the application and once again enable back action on the phone as well as restore its main screen. The system works for applications which simply freeze, however, for rogue software too which attempts at tapping any or all moves, such as adware or malicious software. 
 
[via]
          Comment on Yii fullcalendar integration in 3 steps by Vaibhav Patil        
is any one have complete code of fullcalender using yii with all drag and drop option? i need it please
          Comment on PHP PDF generators compare review by Sam        
Thanks for the comparison. This is an old blog, but it's still hard to find a good comparison of PDF generation options. Codecourse on YouTube seems to have a good option of snapshotting a rendered phantom.js page...hope I said that right.
          Comment on Yii autocomplete widget example by sucipto        
you can use this code too... $criteria->condition = "hotels.name like :hotelsName"; $criteria->params = array(':hotelsName' => trim($_GET['term']).'%');
          Comment on Yii autocomplete widget example by kebyang        
$criteria=new CDbCriteria; $criteria->alias = "hotels"; $criteria->condition = "hotels.name like '" . $_GET['term'] . "%'"; I smell danger here....... you can use this code though.... $criteria=new CDbCriteria; $criteria->alias = "hotels"; $criteria->condition = "hotels.name like '" . $_GET['term'] . "%'"; $crtieria->addSearchCondition("hotels.name",'$_GET['term'] ) ;
          How Machine Learning Is Helping Neuroscientists Crack Our Neural Code        
A big challenge in neuroscience is understanding how the brain encodes information. Neural networks are turning out to be great code crackers.
          ÐœÐ¸Ñ€Ð½Ñ‹Ð¹ воин / Peaceful Warrior (2006) BDRip 1080р        

Категория: Фильмы/HDTV/HD/Blu-Ray/MKV
Размер: 2.27 GB
Траффик: Раздают (отдают): 7,280, Скачивают (качают): 9,845
Добавлен: 2017-08-10 21:22:58
Описание: Информация о фильме
Название: Мирный воин
Оригинальное название: Peaceful Warrior
Год выхода: 2006
Жанр: Биографический, Драма, Спорт
Режиссер: Виктор Сальва / Victor Salva
В ролях: Скотт Мехловиц, Ник Нолти, Эми Смарт, Тим ДиКей, Эштон Холмс, Пол Уэсли, Б.Дж. Бритт, Агнес Брукнер, Том Тарантини, Беатрис Розен

О фильме: Дэн Миллмен — талантливый гимнаст колледжа, мечтающий о выступлении на Олимпийских играх. У него всё есть: награды, друзья по команде, быстрые мотоциклы, девушки и бесшабашные вечеринки.

Мир Дэна переворачивается с ног на голову, когда он встречает загадочного незнакомца по имени Сократ, у которого достаточно возможностей, чтоб открыть новый мир силы и понимания. После серьёзной травмы, с помощью Сократа и эфемерной молодой девушки по имени Джой, Ден понимает, что ему много чему ещё придется научиться…
Выпущено: Германия, США
Продолжительность: 02:00:44
Озвучивание: Профессиональный (многоголосый закадровый) ТВ3, Оригинальная аудиодорожка: Английский
Субтитры: русские, английские

Файл
Формат: MKV
Качество: BDRip 1080р
Видео: 1920x1072, 23,976 (24000/1001) кадра/сек, ~2049 Кбит/сек
Аудио: 48 kHz, AC3, 2 ch, 192 kbps-Профессиональный (многоголосый закадровый) ТВ3
Аудио #2: kHz, AC3 Dolby Digital, 3/2 (L,C,R,l,r) + LFE ch, 448 |Оригинальная аудиодорожка: Английский|
Инфофайл

          Ð§ÐµÑ€Ñ€Ð¸ / About Cherry (2012) BDRemux 1080p | L1        

Категория: Фильмы/HDTV/HD/Blu-Ray/MKV
Размер: 17.56 GB
Траффик: Раздают (отдают): 9,886, Скачивают (качают): 3,172
Добавлен: 2017-08-10 13:45:08
Описание: Информация о фильме
Название: Черри
Оригинальное название: About Cherry
Год выхода: 2012
Жанр: драма

Режиссер: Стивен Эллиот
В ролях: Эшли Хиншоу, Лили Тейлор, Дев Патель, Джонни Уэстон, Джеймс Франко, Хизер Грэм, Дайан Фарр, Майя Рэйнс, Винсент Пало, Элана Крауш

О фильме:
История 18-летний девушки начинающей работать в порнографическом бизнесе после того, как она переезжает в Сан-Франциско. Первое о чем ей предстоит позаботиться – какой-нибудь заработок. Новый город – новые друзья, новая судьба и пьянящая возможность легко и весело заработать, снимаясь у профессионалов. Сначала фото, потом видео - можно показать себя, пускай и полностью, без цензуры. Для раскованной симпатичной девчонки это легко.

http://s.rutor.info/imdb/pic/1945062.gif http://www.kinopoisk.ru/rating/592037.gif

Страна: США
Студия: Enderby Entertainment, Gordon Bijelonic / Datari Turner Films
Продолжительность: 01:42:11
Перевод: Любительский одноголосный, закадровый [Kerob]

Файл
Кодек: h.264
Качество: BDRemux
Видео: 1920x1080, 24598 Kbps, 23.98 fps
Звук:
AC3, 48 KHz, 6 ch ~ 448 Kb/s (русский);
DTS, 48 KHz, 6 ch ~ 1510 Kb/s (английский).
Субтитры:
Английские (полные), PGS;
Испанские (полные), PGS;
Русские (полные), SRT;
Русские (форсированные), SRT.

Семпл

Скриншоты

M.I

          Side-Talk: Papparich Singapore        
Hello! Another side-talk post today haha. Visited Papparich at Star Vista with my sister about a month ago. I remembered that my sister submitted her thesis on that day and I was in school…studying alone. Usually I would be quite productive in school…but during my final year, school did not feel as conducive as before :/. Anyway back to the topic of Papparich, decided to go there for very early dinner because the drinks in the menu look so good.

I met my sister at Star Vista itself and then we settled at Papparich. Papparich location at Star Vista is quite obscure.  Had to walk around for quite some time until we found it. Papparich has really nice interior, unfortunately the air-con was not working on that day. Its interior has this vintage coffee shop feel to it. Papparich also kinda remind me of Old Town White Coffee, which also originates from Malaysia, except that Papparich has better food that Old Town White Coffee in my opinion.

Pappa Chicken Chop


Pappa Chicken Chop with curry sauce

I initially wanted to order Pappa Fish and Chips but I wrote the code on the orders sheet -.-. Only realised when Pappa Chicken Chop with curry sauce came. My sister ordered Pappa Chicken Chop (it comes with BBQ, the only difference from my dish). Personally, I prefer the BBQ sauce over the curry sauce. The Chicken itself is freshly cook, however I think the rice is pre-cooked. I find the food quite average.

You've gotta admit that this look hella good
We also ordered drinks. I had Soya milk pudding + Cincau and my sister had Soya Milk Chendol. Both were really good. I love the gula melaka (palm sugar) in our drinks! The gull melaka taste nicer that those I always tasted. Would really come back for the drinks but not the food. Wanna taste the soya milk with sesame ice cream when I come back next time.

          2015 Emmys Host Andy Samberg Touches On All Liberal Talking Points in His Opener        

2015 Emmy host Andy Samberg made sure to touch on all current lib talking points for his opener tonight: diversity, the wage gap, Donald Trump's racism, and even Kim Davis!


          CBS' 'Zoo' Speaks Of God And Prayer In A Positive Way        

Last night’s 2-hour episode of CBS’ ‘Zoo’ titled ‘Eats, Shoots and Leaves; Wild Things’ surprised me in a very pleasant way. Not only did the show’s producers kick things up a notch with exciting fight scenes and interrogations that reminded me of one of my favorite old shows ’24,’ but also they spoke of religion in a non-negative way, which is outright shocking given this is a network show and a show populated with militant animal activist characters.


          'Zoo' Provides Some Balance In A Typically Unbalanced Show        

It’s not often that we get to do this. However, kudos are in order for CBS’ action drama ‘Zoo,’ because on this week’s episode, an episode called, “Emotional Contagion,” the animal rights wacko series actually gave credit to the other side of the argument.

But first things first. Let’s meet new character Ray Endicott (Warren Christie) who struggles to make friends with the locals:

   


          Cop Hate Rules the Evening at the 2015 MTV VMAs        

Whether jokingly implied or painfully obvious, the 2015 MTV VMAs did not hide their support for the #BlackLivesMatter movement by providing some cop hate to go along with the movement’s mantra of violence and hatred towards police. All this while they sat safely inside the LAPD-guarded Microsoft Theater having their fun. I’m sure all of the celebrities arrived and left unguarded, especially Miss Miley Cyrus.

Actress Rebel Wilson made a show of saying “F*ck the Police Strippers” here.

**WARNING: EXPLICIT LANGUAGE**


          Because the MTV VMA's Could Not Begin Without Mention of the Cecil the Lion Controversy        

 

Taylor Swift's video "Wildest Dreams" debuted at the 2015 VMA's on MTV. This message is what followed the video.


          USA's 'Mr. Robot' Shouldn't Just Delay its Shooting Scene Out Of Respect for Roanoke, They Should Delete It        

USA’s 'Mr. Robot' did not air its season finale Wednesday night. Citing a need to be sensitive to the shooting that killed two journalists in Roanoke, the network aired a previous episode along with this statement to explain their decision:


          'The Carmichael Show' Takes on Black Lives Matter in a Surprising Way        

The Carmichael Show continues to pleasantly surprise (read about the pilot here) with its second episode, "Protest." It opens with the news that there is a protest going on because an unarmed teenager was shot by police in the city.


          'The Carmichael Show' Smashes Stereotypes: Defends Bush, Bashes Obama        

For all conservatives sick and tired of being trashed and talked down to by network television, boy, do I have a show for you!


          Insensitive Priest Doesn't Understand the 'Pure Love' of Polygamy on ABC's 'Mistresses'        

File this under Words I Never Expected to Hear on Network Television: "Yes, Father, it's called a 'throuple.'"

And so began Karen's explanation to her priest of her threesome polyamorous relationship with a husband and wife that led to her getting pregnant, in Mistresses season 3's 10th episode "What Could Have Been."


          TNT's 'The Last Ship' Reminds Us Who the People Who Fight For Us Are        

If Adam Baldwin gets all the cool one-liners on TNT’s “The Last Ship” (and he does), then the Command Master Chief Jeter (Charles Parnell) gets all the great speeches. On Sunday night’s episode, “Valkyrie,” Jeter addresses the crew after four of their fellow crewmen were killed in a sabotaged oil rig explosion.


          How Will 'I Am Cait' Ever Feel Part of the Trans Community When They Keep Making Her Feel Like a Freak Because Her Story is One of Success?        

“I Am Cait” is nothing but a study in massive contradiction. On Sunday’s episode, “Take Pride,” Bruce Jenner’s weekly journey into the absurd continued as he took on two new and fearsome opponents: the pronouns “they” and “them.”

In this scene, Jenner lunches with two other trans people who appear borderline-offended that Jenner continues describing the trans community as “they” and “them”:

       


          SHOCK: ABC Positively Portrays Scripture Reading        

On Christmas Eve 1968, after successfully becoming the first men to orbit the moon, the crew of Apollo 8 read from the book of Genesis. According to Wikipedia, at the time, it was the most-watched tv broadcast ever.


          USA's Mr. Robot's Revolution will be Televised. But You Still Should Not Watch It.        

This week’s episode of USA’s Mr. Robot saw the computer-hacker, techno-geek drama finally get over its mid-season identity crisis, and get back to its obvious intended purpose: glorifying cyber revolution for the purpose of mass income redistribution.


          Bruce Jenner is being Used as a White Privilege Pinata on His Own Show        

In this week’s episode of “I Am Cait,” Bruce Jenner decided to deliver a shot in the arm to his new show’s sagging ratings by talking about that most inspirational and up lifting of topics: Poverty rates and sex trafficking among transgenders!


          I Found the One Place Where the Terrorists are Losing, and it's on FX's 'Tyrant'        

It’s been kind of a rough couple millennia for Christians in the Middle East. Whether faced with persecution from Jews, Romans, Palestinians, Syrians, Egyptians, Iraqis, or ISIS, the common denominator has always been Christians remaining strong and showing unbelievable courage, but pretty much living in a world where everyone and everything tries to kill them.


                  
 Our awesome skating trip! Click here for more




















































          First day in Camp        


 
























For more pictures, click here

          HTTP Verb Tampering Demo/Example/Tutorial         


What is HTTP Verb?

  •  According to Wiki "The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems.  HTTP is the foundation of data communication for the World Wide Web.

  • Verb is nothing but HTTP methods used to indicate the desired action to be performed on the identified resource.


-  List of some basic HTTP Verb or Methods
  • OPTIONS
  • GET
  • HEAD
  • POST 
  • PUT
  • DELETE
  • TRACE
  • CONNECT



What is HTTP Verb Tampering? 

It's a method to bypass a defense technique by tampering the verb. Some secret directories have restricted access by  basic authentication. This directories are protected by the .htaccess file which can be easily exploited. This attack is a result of a Apache  htaccess file misconfiguration .

An administrator, limits the access to the private resource or directory just via POST request method. See the vulnerable code below.















Here AuthUserFile is the directory to the .htpasswd file which contains the username & password in encrypted format.

<LIMIT GET POST>
require valid-user
</LIMIT>


It just limits the POST method & matches the credentials that saved in htpasswd file, if wrong error page shows up.


Here the administrator has limited POST method, but also not blacklisted other methods?. This means any requests via other method would lead the attacker having access to the protected  private resources or directory. Below i have provided a video DEMO of  successful exploitation of an HTTP Verb tampering vulnerability via Live HTTP Headers ( Firefox add-on) on AT&T sub domain (Reported & Fixed). In the next post i will be showing you various ways to fix or apply a patch to this vulnerability .




          Interface deal good for the industry         
08/09/2017

The $600 million Interface Security Systems deal has sent—as The Beach Boys once sang—“good vibrations” throughout the security industry, as it provides not only a vote of confidence for what Interface is doing as a modern systems integration company, but also a vote of confidence in the security industry, in general, as companies like Interface represent a new breed of integrator that is staying at the forefront of new technology and innovation.

John E. Mack III, executive vice president, co-head of investment banking and mergers & acquisitions at Imperial Capital, which acted as financial advisor to Interface on the deal, astutely pointed out that this deal goes beyond validation of what Interface is doing in the space.

“This is a very cool story for the sophisticated new-age security provider, which is what Interface is—the 2.0 version of what the right kind of security player should be,” he told Security Systems News. “We spend so much time in this industry talking about the residential side of the business, which is interesting, but there is a massive opportunity on the commercial side of the business that Interface is tapping into that I think is a compelling theme.”

He continued, “There is a lot of validation for a very successful business model here that Prudential is putting up $180 million of new capital, and SunTx is putting up additional capital into the deal. And that you’ve got a very attractive set of debt investors, and just the fundamental backing for the business, is a meaningful part of a positive message for the industry.”

Jeff Frye, SVP for Interface, told SSN that the support from equity partners is not only a stamp of approval for what the company is doing, but the “capital gives us more fuel to build on our current, better than 15 percent compounded annual growth rate, so we know that we can do more with a little more gas in the tank and we are anxious to prove it.”

Frye noted that the equity will allow the company to expand its products and services around providing business intelligence, as security is becoming so much more than just, well, security.

“As a network provider, and a managed services provider of network services and cybersecurity services, we touch a lot of aspects of our customers’ businesses,” Frye explained. “And as a leading purveyor of Internet of Things services, we are able to aggregate intelligence from all of those sensors and data sources to bring actionable insights to a customer’s business. There are some new verticals that we would like to focus on more, including financial services and banking, so this makes that horizon much brighter and much more approachable.”

And it also makes the security industry’s horizon a little brighter.


          ASAP expands in Virginia        
08/09/2017

Vector Security announced in early August that Newport News, Va., is now live with Automated Secure Alarm Protocol (ASAP). Newport News joins other municipalities in the state of Virginia using ASAP, such as the City of Richmond, James City County, York County, and Henrico County.

The ASAP to PSAP program, created by The Monitoring Association—formerly CSAA—and the Association of Public Safety Communications Officials automates communication between alarm monitoring central stations and 911 centers.

Transmitting alarm information digitally, results in improved accuracy and faster emergency responses by eliminating the need for communication over the phone between PSAP centers and monitoring centers.

Vector Security was the first alarm company to use ASAP in the City of Richmond, Va. in 2012. Vector Security assisted with implementation in Newport News by helping to perform extensive testing prior to the system going live.

“Alarm users in Newport News, including several hundred Vector Security customers, will benefit from faster and more accurate emergency response with the implementation of ASAP,” Anita Ostrowski, vice president of central station services at Vector Security, said in a prepared statement. “We hope the positive impact that ASAP will bring to Newport News will encourage other major 911 centers in the nation to adopt this technology as well.”

Ostrowski continued, “As a security provider, we seek ways to promote ASAP’s value to municipalities and public agencies, and help other alarm companies implement it for the greater good of the industry and the safety of our communities.”

Other municipalities that have implemented ASAP include Houston and High Point, TX; Washington D.C.; James City County, York County and Henrico County, Va.; Tempe and Chandler, Az.; Boca Raton, Fla.; Cary and Guilford County, N.C.; Kernersville and Durham County, N.C.; Johnston County, N.C.; Denton County and Grand Prairie, Texas; Morgan County, Ala.; Delaware County, Ohio; Bucks County, Pa.; and Highland Park, Texas.


          Allied Universal turns 1        
08/02/2017

Allied Universal, a leading facility services company and one of the largest security forces in North America, marked its one-year anniversary this week after forming a year ago via the merger of AlliedBarton Security Services and Universal Services of America.

In the announcement, Steve Jones, Allied Universal CEO, thanked all of the company’s 150,000 employees and its clients “for their continued support and commitment that contributed to a phenomenal first year as our new company! I look forward to our continued success in the security and services industries."

Over the past year the company has made several acquisitions, as it continues to transform to a full-service security company, moving beyond the manguarding services the it has been known for.

Jones told Security Systems News, after the company’s most recent acquisition of ALERT Protective Services in May, that the company continues to look at acquisitions as a way to diversify its offerings.

“We’ve got a pretty robust pipeline of deals that we are looking at—some in the technology space and some in the traditional manguarding space—and we hope to announce a few more before the year is over that will help us to diversify our company and bring more value to our clients.”

In the press release announcing the one-year milestone, the company outlined some additional organizational achievements since the merger:

•    Became the unequivocal leader in guarding services throughout North America. Our security professionals and our company play a major role in keeping the U.S. and Canada safe and secure.

•    Provided service to over half of the Fortune 500 companies and nearly every major retail mall in the U.S. From healthcare facilities, commercial office buildings, manufacturing and industrial plants, residential communities, transportation facilities and government services, Allied Universal has a significant security presence.

•    Managed the integration of a workforce of over 150,000 security professionals to perform our jobs on a daily basis and serve our growing customer base.

•    Implemented a world-class training program, the AU Institute, which offers over 1,000 training assets and professional development programs to enhance our security professionals' delivery of service and protection.

•    Introduced several technological innovations to expand our physical and operational security solutions and service offerings to enhance the protection of client properties and assets.

 


          COPS announces new workshop series        
08/02/2017

COPS Monitoring, a brand under Lydia Security Monitoring, on July 27 announced its Grow Your Business roadshow, with seminars currently planned for Denver, Colo., Boca Raton, Fla., Salt Lake City and Williamstown, N.J., with more to be announced.

“The genesis of the seminars actually began with our UCC dealer customers; we started these … sometime in the 2015 time frame,” Ron Bowden, director of dealer development for Lydia’s UCC brand and leader of these seminars, told Security Systems News. The Grow Your Business seminars is an example of collaboration between COPS and UCC following Lydia Security Monitoring's acquisition of UCC in January 2016. 

“The thought process is that we would put together a business class that worked in helping our dealers in certain areas of their business: in sales, in attrition control, in … installation efficiencies, compensations plans, sales recruiting. [These are] things that a small- to mid-sized business could take and apply in their business that could get immediate results without spending large sums of money,” Bowden said. 

The seminars are not exclusive to COPS and UCC dealer customers, Bowden pointed out, and the workshops suit a range of dealers. “In our class [on Aug. 3], we had dealers that are small to just getting started, to people that have been in business twenty years that have a several-thousand account base,” he said. “I think the basics and the principles apply to all—it’s just how they’re used.” 

“Since the beginning, COPS has been dedicated to supporting independent alarm dealers world-class monitoring along with the tools, services, and education they need to help them run their business and improve their bottom line,” David Smith, VP of marketing and business development at COPS, told SSN via email.

“Now that UCC is part of the Lydia team, Ron’s ‘Grow Your Business’ seminars seemed like a natural fit to our longstanding tradition of helping our dealers succeed.  Though COPS and UCC continue to operate as separate brands, on separate monitoring platforms, and with separate management teams, we still learn from each other and share best practices – especially when it brings value to our dealers," Smith said.

The Grow Your Business seminars will teach dealers how they can increase sales with lead generation programs and other professional marketing services from My Studio [Pros], an agency dedicated to helping dealers of all sizes successfully grow their business in the security and smart home automation market.

Updated on Aug. 3.


          US company to offer microchip implants to employees        
07/26/2017

Over the past few years, the security industry has begun to embrace many new technologies—robotics, the cloud, biometrics, for example—but one company here in the U.S., Three Square Market, is pushing the boundaries of RFID technology by offering to implant tiny RFID chips—the size of a grain of rice—into its employees’ hands between the thumb and forefinger.

The chip would allow employees to not only buy snacks in the break room but also have their hands function as a mobile key to gain access to the building and other doors, which makes me think of the possible applications/ramifications within security.

Implanting chips in employee’s hands is already being done in Sweden, where an organization named Epicenter is having success with an increasing number of employees there opting to get the implant. Here in the U.S., Three Square Market says it has approximately 50 employees who are interested in getting the implant, and unlike in Sweden, the company is paying for the $300 procedure for its employees. Three Square Market partnered with a Swedish firm, BioHax International, to make the chip and is planning to sell the technology to other companies.

"Eventually, this technology will become standardized, allowing you to use this as your passport, public transit, all purchasing opportunities, etc.," chief executive Todd Westby wrote in a blog post announcing the program, noting that there is even potential for storing medical/health information, and for use as payment at other RFID terminals.

But one has to wonder what security vulnerabilities this could create, especially in protecting the data on that chip from being hacked, stolen and/or compromised, etc. Not to mention, the “creepy” factor here, as mass adoption of microchip implants is dubious, at best.

Maybe some day, like in the year 2112, but in the short term, I do think there is good fodder here for a futuristic sci-fi movie.
 


          PERS Summit lines up 2017 speakers        
07/26/2017

AvantGuard has several speakers lined up for its upcoming PERS Summit, to be held here Sept. 26-28, as well as some of the events.

This year’s PERS Summit will start with a tour of AvantGuard’s recently remodeled facility. “We’ve got about 25,000 square feet and three levels, and the building will be completely remodeled, inside and out, by the time the event starts. So, people will really get to see—hands on—how that monitoring of the PERS devices works,” Sonja Jorgenson, AvantGuard’s director of marketing, told Security Systems News.

Aron Ralston will be one of the conference’s keynote speakers. “His story is told in that movie, 127 hours,” Jorgenson noted. Ralston was exploring a Utah canyon when his arm got caught, forcing Ralston to amputate the limb.

One of the speakers will be Eric Allen, an attorney who can speak to certain marketing techniques. “His expertise is … issues that are raised when businesses are contacting customers through texting and automated calls. He really understands that, the regulations, and the new rules that are coming out in 2017.”

Laurie Orlov, another speaker at the conference, is focused on aging-in place.  “She has an interesting background in technology, especially targeted to aging seniors,” Jorgenson said. “She’s going to share some predictions about what those technology trends are going to look like in 2017 and beyond.”

The Summit’s other speakers have not yet been announced.

“Then, every year, we have a panel of experts in the industry and we talk about a relevant issue. Last time, we talked about fall detection and [the panelists’] feelings about that, and where [the technology] was and if it was really helpful,” Jorgenson said. “We haven’t disclosed what that topic will be yet, but that panel discussion’s always a big talking point.”

Jorgenson said that AvantGuard hopes to give attendees more access to the presentations at this Summit, which will allow attendees to further review information after returning from the conference. “I think there will be a lot of information, … so, it’s a lot to digest in just a couple days,” she said.

The company also sends an anonymous survey to its dealers, which asks about a range of topics, including the software that dealers use or the types of customers dealers are seeing, AvantGuard marketing assistant Alex Flitton said. “We actually have a lot of really good feedback so far,” he told SSN. “All of this information will be compiled and interpreted by some of the experts in the industry, to present to our attendees.”

Networking is another benefit of the event, Flitton noted. “It just puts a lot of like-minded people in a really solid environment where they can interact,” he said.

The Summit will be held at The Chateaux Deer Valley in Park City, Utah. The conference has been here for each conference.


          PSA TEC 2018 call for presentations now open        
07/19/2017

The PSA Security Network, a security and systems integrator cooperative with headquarters in Westminster, Colo., is accepting presentations through Aug. 4, 2017 for its TEC 2018 annual conference. Proposals can be submitted at www.psatec.com/cfp.

TEC 2018, which will be held at the Sheraton Downtown Denver in Denver, Colo., March 12-16, 2018, is a premier education and networking event for all professional systems integrators in the security and audio-visual markets. TEC features education and certification programs, networking, and dedicated exhibit hours designed to advance the skills and expertise of industry professionals nationwide. This training venue is open to all industry professionals and is designed to meet the educational needs of all employees within an integrator’s organization.

PSA Security Network’s president and CEO Bill Bozeman told Security Systems News that the move from Westminster—where the conference had been held for several years—to downtown Denver fro 2018 was needed to accommodate the growth of the show.

“The hotel [Downtown Denver Sheraton] is bigger, so we look forward to having everyone under one roof,” Bozeman told SSN. “In addition, I think some of our younger members and supporters are going to enjoy being in downtown Denver, where there is so much to do.”

The education program will deliver sessions tailored to physical security and audio-visual integrators focused on emerging technologies, critical issues in the industry, and tool development to augment attendees’ knowledge needed to continue to drive these industries forward. Sessions will be selected that serve a variety of disciplines including business management, sales and marketing, HR and recruiting, project management and operations, and installation and service.

Proposals are welcome for both certification programs and general education sessions for the security and audio-visual markets. All sessions must be unbiased and minimize commercial references and overt branding. Submissions are evaluated based on topic relevance, speaker expertise, and originality of the content. Additional guidelines are available within the call for presentations submission tool.

Accepted and approved presenters will receive complimentary registration to TEC 2018 and will have the opportunity to solidify their reputation as an industry resource and subject matter expert while expanding their own professional network and gaining access to strategic partnerships. PSA does not pay honoraria or expenses for accepted proposals.


          SSN talks with I-View Now about recent Eagle Eye integration         
07/19/2017

Recently, I-View Now announced a new integration with Eagle Eye Networks. I got the chance to catch up with I-View Now president Larry Folsom to hear a bit about this partnership and how it works.

“The I-View Now integration with Eagle Eye Networks is a cloud to cloud integration,” Folsom said in an email interview. “We appreciate the architecture in that it is a smart appliance that can be used with inexpensive or expensive cameras depending on the opportunity and requirements. We think this is important for scale (as opposed to cloud systems that require expensive cameras). We found the Eagle Eye Networks APIs to be robust and well thought out.”

Folsom discussed how the partnership will benefit I-View Now’s customers.

“We believe this is another great video partner for our dealers and central stations to utilize while protecting their customers,” Folsom said. “It is import to see that the Eagle Eye Networks video will work with all I-View Now compatible signaling integrations (security systems) and will play in the same universal player for operators, end users, and law enforcement.”

Folsom noted that I-View Now has had a busy year; it partnered with COPS Monitoring and earlier this year announced that cameras from Bosch, OpenEye and Hikvision can now come I-View Now Ready. “We currently have a backlog but we are working our way through it and have been actively hiring engineers to build out the team to support the demand,” he said.

When asked what the company is currently working on, Folsom pointed to the company’s work with Digital Barriers, announced in early June.

“This integration is fun because every clip we produce will be processed with the video analytic,” said Folsom. “The process will add intelligence (percent of likelihood of a person) to all of our existing video integrations to reduce false alarms and add bounding boxes so the agent and the end user can see where the changes occurred.”


          CSG gains $40 million in financing        
07/12/2017

Central Security Group on July 6 announced that it received an incremental first lien term loan of $40 million, as well as a 12-month maturity extension to its credit facilities.

The new funding “is part of a broader $350 million financing the company started in 2014. This was an add on to that financing,” Richard Ginsburg, president and CEO of Central Security Group, told Security Systems News in an email interview. CSG finances through Credit Suisse, Ginsburg noted.

Asked about growth initiatives, Ginsburg said, “We continue to grow our business through our long-standing Authorized Dealer Program, supplemented by our organic efforts.”

In the recent announcement, Ginsburg mentioned that the funding will help the company with geographic expansion, acquisitions and growing its account base. The announcement also emphasized the company’s Alert 360 offering, which provides interactive security.

Concerning acquisitions, Ginsburg told SSN, “We are always looking but are very selective.”

Ginsburg discussed what CSG looks for in an ideal acquisition. “We would consider quality companies with customers put on through more traditional marketing,” he told SSN. “We also look for companies with good employees and managers who are hitting glass ceilings because of the company's size and who would benefit from a company like ours, with more resources, financing, and a positive culture.”

*/


          Sandy Springs considers fining dealers for false alarms        
07/12/2017

The new Sandy Springs, Ga. alarm ordinance, which is set to be voted on July 18, is alarming many in the security industry as it looks to force alarm dealers to pay their subscriber's false alarm fees and fines.

“This makes as much sense as a car rental company being responsible for paying your speeding tickets if you get caught speeding in their car,” Dan Gordon, president of the Georgia Electronic Life Safety and Security Association (GELSSA), and owner of Ga.-based Gordon Security, told Security System News.

Gordon, as well as many security companies working in Georgia, including LOUD Security and Ackerman Security, are rallying others in the industry to pay attention to what is going on in Sandy Springs.

“If Sandy Springs passes this, which city goes next?” John Loud, president of LOUD Security Systems, told SSN, noting that he does not think this ordinance will help Sandy Springs reduce false dispatches.

“They outsource the collections to a firm called CryWolf (Public Safety Corporation),” Loud explained. “Their service includes collecting the assessed fines. The cost to Sandy Springs is the same, whether the bill goes to the end users of the alarm system or the alarm company. But the alarm company’s costs will increase. They will now have to bill their customers and establish a collection process, increasing the workload for their personnel.”

Loud and others in opposition to the ordinance believe this will actually cause an increase in the amount of false dispatches.

“Citizens will usually respond to citations from their local police or city municipality,” he explained. “If a vendor or service provider sends an assessment, they could very easily change monitoring companies and get additional false alarms through new providers. They can choose to never pay and continually change companies.”

He noted that this would result in more false dispatches as the end user would never be forced to change their behavior.

Loud also pointed out that the court systems of Sandy Springs will have a lot more cases. ”Either the alarm companies will be filing suit to collect monies from customers refusing to pay or the city will be pursuing alarm companies for nonpayment of fines they do not have the money to pay.”

He continued, “You will likely see many alarm companies choosing to not do business with residents/businesses that must comply with this ordinance. In Sandy Springs, most alarm companies charge only $25 per month. While false alarm fees can cost hundreds of dollars, the accounts receivable process will likely make it financially impossible for fire/alarm companies to take on such risk.”

He said that Sandy Springs could achieve greater reduction in the false dispatches if they would enforce all of their current ordinance provisions, such as:

- Follow the Enhanced Call Verification Georgia State law that went into effect in 2013. “The 911 operator could very easily ask for the two phone numbers the alarm company called prior to dispatch request,” said Loud.

- Do not allow dispatch on the subscribers that have not paid for previous fines—put them on a do not dispatch list.

- Do not allow dispatch for subscribers that have had 10 false alarms in a permit year.

- Activate the false alarm school the ordinance allows for, which will provide the training and prevention of future false alarms.

“Another step Sandy Springs could pursue is a higher fee structure for excessive false alarms,” said Loud. “This would force subscribers to either fix their system, teach others to use it properly or they could choose to stop arming their system. All three of the options result in reduced dispatches.”

He continued, “While I certainly see there are many ways to help unite with the City of Sandy Springs and help them achieve their ultimate goal of reducing false dispatches and wasting government recourses, I do not believe requiring the alarm companies to pay the fees is the answer.”

The GELSSA, along with strong industry voices like Loud's, are urging those in the industry to reach out to the mayor of Sandy Springs to voice their concerns, and for security dealers in the Sandy Springs area to attend the planned vote on July 18.

Topic: 

          LIVE TVSELANGOR.COM        















          Showing Abbility Names as emote - still problems when...        
still problems when moving the minimap iconDate: 2009-11-15 21:01:29ID: 1Error occured in: GlobalCount: 1Message: ..\AddOns\Rollcraft\broker.lua line 162: attempt to index field 'tip' (a nil value)Debug: (tail call): ? : ? Rollcraft\broker.lua:162: OnLeave() ...s\Prat-3.0_Libraries\LibDBIcon-1.0\LibDBIcon-1.0.lua:82: ...s\Prat-3.0_Libraries\LibDBIcon-1.0\LibDBIcon-1.0.lua:79AddOns: Swatter, v3.1.14 (<%codename%>) ACP, v3.2.0.23 Bartender4, v4.4.1 DebugLib, v5.1.DEV.130 flagRSP, v1.0.9 FramesResized, v2.3.2-47 GHI, v0.25 GHM, v0.51 GHR, v1.1 Grid, v1.30200.2009081101 MapNotes, v5.16.30200 MapNotesBrowser, vv1.00.30200 MapNotesIconLib, v1.03.30000 MapNotesIconLibFancy, v MapNotesIconLibLegacy, v MapNotesIconLibNeptunia, v MapNotesIconLibNumbers, v Prat30, v3.2.10 Prat30Libraries, v QuestHelper, v1.2.6 Rollcraft, v.12b SlideBar, v3.1.14 (<%codename%>) Stubby, v5.6.4424 (KangaII) WIM, v3.2.2 WowLua, v32 XLoot, v0.9 XLootMaster, v0.8 BlizRuntimeLib_deDE v3.2.2.30200 <eu> (ck=28f)(Interface: RollCraft | Bug: Showing Abbility Names as emote)
          Showing Abbility Names as emote - #########################...        
############################Error Message on Moving Minimap Button:############################Date: 2009-11-07 17:04:50ID: 1Error occured in: GlobalCount: 1Message: ..\AddOns\Rollcraft\broker.lua line 160: attempt to index field 'tip' (a nil value)Debug: : ? Rollcraft\broker.lua:160: OnLeave() ...s\Prat-3.0_Libraries\LibDBIcon-1.0\LibDBIcon-1.0.lua:82: ...s\Prat-3.0_Libraries\LibDBIcon-1.0\LibDBIcon-1.0.lua:79AddOns: Swatter, v3.1.14 (<%codename%>) ACP, v3.2.0.23 Babylonian, v5.1.DEV.130 Bartender4, v4.4.1 BeanCounter, v5.6.4424 (KangaII) Configator, v5.1.DEV.190 DBMCore, v DBMInterrupts, v1.0 DebugLib, v5.1.DEV.130 EnsidiaFails, v flagRSP, v1.0.9 FramesResized, v2.3.2-47 GHI, v0.25 GHM, v0.51 GHR, v1.1 Grid, v1.30200.2009081101 gridtargets, v0.1 MagicMarker, v1.0.154 MapNotes, v5.16.30200 MapNotesBrowser, vv1.00.30200 MapNotesIconLib, v1.03.30000 MapNotesIconLibFancy, v MapNotesIconLibLegacy, v MapNotesIconLibNeptunia, v MapNotesIconLibNumbers, v Omen, v3.0.8 oRA3, v Prat30, v3.2.10 Prat30Libraries, v Recount, v Rollcraft, v.09b SlideBar, v3.1.14 (<%codename%>) Stubby, v5.6.4424 (KangaII) WIM, v3.2.2 XLoot, v0.9 XLootMaster, v0.8 XLootMonitor, v0.7 BlizRuntimeLib_deDE v3.2.2.30200 <eu> (ck=35f)(Interface: RollCraft | Bug: Showing Abbility Names as emote)
          Showing Abbility Names as emote - Regarding the minimap...        
Regarding the minimap error i wil post the error code given by swatter.Regarding the "emote" error. We tested it right from the action bar. So mistypingshould not be the caus for this error.Will test again and post you error codes here.(Interface: RollCraft | Bug: Showing Abbility Names as emote)
          Sequels on Order for October and Beyond        

These sequels and series titles are now on order for the teen fiction collection.

Autumn's Kiss by Bella Thorne Murder of an Angel by James Patterson Dark Tide by Jennifer Donnelly
Drift & Dagger by Kendall Kulper Every Word by Ellie Marney Ice Like Fire by Sara Raasch
Iron Warrior by Julie Kagawa Manners and Mutiny by Gail Carriger The Rose Society by Marie Lu
The Sleepwalker by Robert Muchamore Smoked by Mari Mancusi Traffick by Ellen Hopkins
Unforgiven by Lauren Kate Ungodly by Kendare Blake  

 

Blog: 


          Sequels on Order for September and Beyond        

These young adult sequels and series titles are now on order.

Bits & Pieces by Jonathan Maberry The Boy Most Likely To by Huntley Fitzpatrick Catacomb by Madeline Roux
Chantress Fury by Amy Butler Greenfield Daughter of Dusk by Livia Blackburne Earth Flight by Janet Edwards
The Edge by Roland Smith The Fate of Ten by Pittacus Lore Happily Ever After by Kiera Cass
The Keeper by David Baldacci Library of Souls by Ransom Riggs Mad Zombie Party by Gena Showalter
Maid of Wonder by Jennifer McGowan Outrage by John Sandord and Michele Cook Queen of Shadows by Sarah J. Maas
Sophomores and Other Oxymorons by David Lubar Storm of Lightning by Richard Paul Evans Vivian Apple Needs a Miracle by Katie Coyle
The White Rose by Amy Ewing Winter by Marisa Meyer  

 

Blog: 


          New Graphic Novel Series        

These graphic novel and manga series will be added to the teen graphic novel collection.

Black Bullet

Black Bullet

Enju survived a virus and has gained super powers. Now he is a part of Civil Security.

Chaika: The Coffin Princess

Chaika: The Coffin Princess

Chaika, a coffee-carrying wizard, hires Toru to accompany her on a deadly mission.

The Demon Prince of Momochi House

The Demon Prince of Momochi House

Orphan Himari inherits a home, and the day she moves in, she finds three handsome squatters.

Junior Braves of he Apocalypse

Junior Braves of he Apocalypse

After returning from a camping trip, the Junior Braves encounter bloodthirsty mutants

 

Twin Star Exorcists: Onmyoji 1

Twin Star Exorcists: Onmyoji 1

Rokuro is from a family of exorcists, but he would rather be a singer or a soccer player.

 

Blog: 


          If you like Pretty Little Liars, try these teen titles...        

On the television adaptation of Pretty Little Liars, we finally learned the identity of "A."  Keep entertained until the show returns in the winter by reading these other teen titles.

Invisible I by Melissa Kantor

The Amanda Project

When new student Amanda disappears, her three closest "friends" follow clues to find her.

The Innocents by Lili Peloquin

The Innocents

Two sisters start drifting apart after their mother remarries their step-father.

The Liar Society by Lisa & Laura Roecker

The Liar Society

Kate receives a mysterious email from her dead friends and sets out to find her friend's murderer.

Rosebush by Michele Jaffe

Rosebush

Jane wakes up paralyzed and lying in a rosebush. She must piece together her memories to figure out how she got there.

The School for Dangerous Girls

The School for Dangerous Girls

Angela learns that her friends are being isolated and sent to live like animals.

Wherever Nina Lies

Wherever Nina Lies

Two years after her sister disappears, Ellie goes on a quest to find her.

 

Blog: 


          If you like Paper Towns, try theses titles.        

If you are a fan of Paper Towns by John Green, you might also like these teen titles.

 

The Beginning of Everything by Robyn Schneider

The Beginning of Everything by Robyn Schneider

Ezra's life is transformed by a tragic accident and the arrival of an unusual new girl.

Dash & Lily's Book of Dares by Rachel Cohn and David Levithan

Dash & Lily's Book of Dares by Rachel Cohn and David Levithan

Dash and Lily carry on a scavenger hunt during wintertime in New York City.

Going Bovine by Libba Bray

Going Bovine by Libba Bray

Cameron is diagnosed with mad cow disease and heads out on a road trip to find a cure.
 

I Am the Messenger by Markus Zusak

I Am the Messenger by Markus Zusak

After capturing a bank robber, Ed begins receiving mysterious messages that direct him to places where people need help.

Mosquitoland by David Arnold

Mosquitoland by David Arnold

After learning her mother is sick, Mim sets out on a thousand mile road trip.

 

For more suggestions look for a bookmark in the teen fiction area.

Blog: 


          New Graphic Novel Series        

These graphic novel series are being added to the teen graphic novel collection.

GYO: The Death Stench Creeps

GYO: The Death Stench Creeps

A stench hangs over the city, and Tadashi and Kaori find themselves in a horrifying experience.

Haven't You Heard? I'm Sakamoto

Haven't You Heard? I'm Sakamoto

First year high school Sakamoto becomes the coolest person in school and  uses his popularity to help others.

Tokyo Ghoul

Tokyo Ghoul

Ken is thrilled to be going on a date with a beautiful girl, but a deadly encounter turns him into a ghoul-human hybrid.

 

Blog: 


          Sequels on Order for August and Beyond        

These sequels and series titles are now on order.

Beastly Bones by William Ritter Carry On by Rainbow Rowell The Copper Gauntlet by Holly Black and Cassandra Clare
Most Likely to Succeed by Jennifer Echols Oblivion by Kelly Creagh Public Enemies by Ann Aguirre
Resonance by Erica O'Rourke Shades of Doon by Carey Corp Sweet Temptation by Wendy Higgins
The Tattooed Heart by Michael Grant The (totally not) guaranteed guide to stressing, obsessing & second-guessing  

 

Blog: 


          Anniversary of First Atomic Bomb Test        

Today is the 70th anniversary of the first atomic bomb test. Here are two books about the atomic bomb and this historic event.

 Bomb : the race to build and steal the world's most dangerous weapon / Steve Sheinkin Trinity : a graphic history of the first atomic bomb

 

Blog: 


          New Graphic Novel Series        

These graphic novel series have been ordered for our graphic novel collection

The Devil is a Part-Timer

The Devil is a Part-Timer

The Devil King and his general escape to modern-day Tokyo where they must get regular jobs.

Gotham Academy

Gotham Academy

Olive Silverlock, suffering from amnesia, returns to the prestigious Gotham Academy.

   

 

Blog: 


          Sequels on Order for June, July and Beyond        

These sequel and series titles are now on order.

Another Day by David Levithan Blood Will Tell by April Henry Deadfall by Anna Carey
Every Last Breath by Jennifer L. Armentrout Get Dirty by Gretchen McNeil The Heart of Betrayal by Mary E. Pearson
I am the Traitor by Allen Zadoff Jesse's Girl by Miranda Kennealy Lair of Dreams by Libba Bray
Model Misfit by Holly Smale Overtaken by Mark H. Kruger  
     

 

Blog: 


          Nanochip can regrow organs by injecting DNA into the skin        
Tissue Nanotransfection is a nanochip the size of a penny made by Ohio scientists. Within a second it injects genetic code into skin...
          [Article] The Home Performance Forum        
The Home Performance Coalition (HPC) recently launched the Home Performance Forum, where members discuss topics in their respective fields. These topics include building systems; building science; envelope and mechanical design; field procedures; energy modeling, education, and certification; building codes and standards; sales and marketing; and business systems. The forum’s diverse professional membership includes energy auditors, raters, builders, home performance contractors, design professionals, instructors, code officials, program managers, and building scientists.
          Kendo Grid MVC beforeEdit        

Hello,

The only way we can access the beforeEdit Event on a kendo grid is with javascript. shouldnt this be accessible through the Kendo.Mvc.UI.Fluent.GridEventBuilder? attached are just images showing that it errors and that we are using Kendo version 2017.2.621.340 as our dll.

 

the way we did get it to work is by binding it via javascript with this code (for anyone that wants to know how to get this event to work)

    $(document).ready(function () {
        var grid = $("#BrandsGrid").data("kendoGrid");
      
        grid.bind("beforeEdit", function (e) {
            alert("Before Edit");
        });

    })

but its weird to have 2 of your events using the grid builder and then 1 of your events bound through javascript makes it easy for a developer to miss that the event exists which can lead to them not fully understanding what is happening upon editing the grid.

 

Thanks,

Thomas


          kendo grid virtual scrolling not working when grid is not visible on databind        

I'm binding the grid to an array with a separate function as i was instructed here.

The problem is that virtual scrolling doesn't work when the grid is not visible when I attach data to the data source.

Here is a Dojo

<!DOCTYPE html>
<html>
<head>
    <style>html { font-size: 14px; font-family: Arial, Helvetica, sans-serif; }</style>
    <title></title>
 
    <script src="../content/shared/js/people.js"></script>
</head>
<body>
<div id="example" ng-app="KendoDemos">
    <div ng-controller="MyCtrl">
      <a href="" ng-click="ShowGrid = !ShowGrid">Toggle Grid</a>
      <div ng-show="ShowGrid">
        <div kendo-grid="mainGrid" options="mainGridOptions" k-data-source='mainGridDataSource'>
      </div>   
   </div>
 
 
    </div>
</div>
 
<style>
  .contact-info-form {
    list-style-type: none;
    margin: 30px 0;
    padding: 0;
  }
 
  .contact-info-form li {
    margin: 10px 0;
  }
 
  .contact-info-form label {
    display: inline-block;
    width: 100px;
    text-align: right;
    font-weight: bold;
  }
</style>
 
<script>
    angular.module("KendoDemos", [ "kendo.directives" ])
        .controller("MyCtrl", function($scope){
       
                $scope.ShowGrid = false;
                $scope.mainGridDataSource =  new kendo.data.DataSource({data:[], pageSize: 100});
            $scope.mainGridOptions = {
                sortable: true,
                height: 543,
                //pageSize:100,
                //dataSource: {pageSize: 100, data:[]},
                scrollable: {
                            virtual: true
                        },
                pageable: {
                  numeric: false,
                  previousNext: false,
                  messages: {
                    display: "Showing {2} data items"
                  }
                },
                columns: [{
                    field: "FirstName",
                    title: "First Name",
                    width: "120px"
                    },{
                    field: "LastName",
                    title: "Last Name",
                    width: "120px"
                    },{
                    field: "City",
                    width: "120px"
                    },{
                    field: "Title"
                }]
            };
       
        generatePeople(5000, function(results) {
            //console.log(results);
            $scope.mainGridDataSource.data(results);
             
           
        });
 
             
        })
</script>
 
 
</body>
</html>

          GroupRenderMode issue        
Hello Marnix,

Thanks for the update.

I double checked and I can confirm that I have tested with 2017.1.117 assemblies version, as you specified. I am now trying to replicate the problem with the sample project you provided, but I need a little more time for testing. I will update you no longer than tomorrow.

Thanks in advance for understanding.

Regards,
Stefan X1
Progress Telerik
Want to extend the target reach of your WPF applications, leveraging iOS, Android, and UWP? Try UI for Xamarin, a suite of polished and feature-rich components for the Xamarin framework, which allow you to write beautiful native mobile apps using a single shared C# codebase.

          Issue with Grid navigation toolbar        
This might be obvious to some of you, but I was hoping you could help me.  I've been making some changes to my code and noticed that the grid's navigation/pager now has a "G" on the buttons that should have arrows and an "R" on the refresh button (see attachment).  What typically causes this to happen.  I assume it is a js or css library, but I could be wrong.
          How to completely personalize the Edit/Insert template        

Hello,

I need to show in a grid a ModelView of a complex object, with about 50 different fields.

If editing in inline or popup mode, I would need to scroll to much (horizontally or vertically) so I need to build a completely personalized form to insert/update data.

How is it possible to link to a personalized view from a EDIT/ADD buttons from the asp.net core grid?

And how to pass the mode (Insert or Update) and the ID (for Update operations) to this view?

Have you a sample code?

Thanks a lot,

Davide


          Pass additional parameters to Read ajax datasource method - MVC        

Hi, 

is there a way to bind this additional data function

.Read(read => read.Action("Products_Read""Grid").Data("additionalInfo"))

 

via javascript?

So far I have tried it like this:

headerSchnellsuche.bind("data", function () {
 console.log("Set data");
});

 

but without success


          Prevent multiple column filtering        

Hi,

I have a scenario where an API I'm using is only able to filter by one column at a time. So either name, or email, or phone number, stuff like that. 

How can I prevent multiple filters being set at the same time?

 

I tried binding a mousedown handler to the filter button in the filter menu and iterating over the existing filters to set them to an empty string. Something like this, which I found here on the forums:

1.$(".k-filter-menu").find("button[type='submit']").on("mousedown", function() {
2.    var dataSource = $("#myGrid").data("kendoGrid").dataSource;
3.    for (var i = 0; i < dataSource.options.fields.length - 1; i++) {
4.         dataSource.filter({ field: dataSource.options.fields[i].field, value: "" });
5.    }
6.    dataSource.filter([]);
7.});

 

This triggered several ajax calls though with filters like "Name~undefined~''".

Is there a better way to handle this scenario?

 

Kind regards,

Georg


          Comment on Code HTML Email Templates by Breaking the Rules by Yasin        
Adding style"display:block" to your img tag should resolve this.
          C#/.NET Little Wonders Anthology        

Originally posted on: http://geekswithblogs.net/BlackRabbitCoder/archive/2016/04/19/c.net-little-wonders-anthology.aspx

The following is the complete anthology of Little Wonders, Pitfalls, and Presentations.  

Enjoy!  A new little puzzler will be coming out this week.

The C# 6 Little Wonders

The Original C#/.NET Little Wonders Trilogy

The C#/.NET Little Wonder Sequels

The Visual Studio Little Wonders

The C#/.NET Concurrent Little Wonders

The C#/.NET Little Pitfalls

The C#/.NET Little Wonders and Little Pitfalls Presentations

C#/.NET Little Wonders from BlackRabbitCoder

More Little Wonders of C#/.NET from BlackRabbitCoder

C#/.NET Little Pitfalls from BlackRabbitCoder

The C#/.NET Fundaments: Of Lambdas and LINQ Presentation

Of Lambdas and LINQ from BlackRabbitCoder

 

Technorati Tags: , , , ,

          Amazon.com Recruiting Event Coming to St. Louis in April        

Originally posted on: http://geekswithblogs.net/BlackRabbitCoder/archive/2016/03/23/amazon.com-recruiting-event-coming-to-st.-louis-in-april.aspx

Hey all my friends and readers in the St. Louis area, my team from Amazon is heading to St. Louis to do an in-person hiring event in April!

Have you always wanted to work in a place that hires and develops the best?  That lets builders be builders?  That has excellent benefits and salary/bonuses?  That has a clear technical path all the way from entry-level developer to architect and beyond?

If you're a developer who loves to solve problems and learn new skills, and be in an environment that encourages you to learn and grow, this is a great opportunity.

We will be there in the last week of April (I'll send more information when I know more).  Let me know if you are interested in an interview while we are there and I'll get you in contact with recruiting.

-Jim


          Yes, I'm still alive...        

Originally posted on: http://geekswithblogs.net/BlackRabbitCoder/archive/2015/11/30/yes-im-still-alive.aspx

Hey folks, I know a lot of you have been tweeting and commenting on my lack of posts lately.  Believe me I want to keep going as well.

It's been a bit busy coming back during peak season here at my new job, so I haven't had the time to devote to it as I'd like.  I will try to get the Little Puzzlers flowing again soon!

-Jim

          Life in Motion        

Originally posted on: http://geekswithblogs.net/BlackRabbitCoder/archive/2015/09/17/life-in-motion.aspx

Just as an update.  We've recently moved back to the Pacific Northwest and have been mostly busy after work with unpacking and getting the house in order.  More Little Wonders and Little Puzzlers are on the way, though!

          Wonky RSS Feed        

Originally posted on: http://geekswithblogs.net/BlackRabbitCoder/archive/2015/09/01/wonky-rss-feed.aspx

Hey folks, many of you have complained about the wonky RSS feed.  Yes, it is still a problem and I'm looking at it.

It appears as if my feed is getting re-published to different sources, which explains why folks are seeing multiple copies of my post, each with a different source URL.

I'm going to check with my blog hosting company to see if there's a reason this is happening on their end.

Thanks so much for your patience!

-Jim

          Church Without Walls – Premium A5 Flyer Template        
The Church Without Walls is the exclusive Photoshop PSD flyer template designed by ExclusiveFlyer to promote your Church Without Walls . This is a modern, stylish flyer and just be used for a Church Service, Praising Night, Gospel Night etc.

[membership][button href="https://www.dropbox.com/s/symqq3itlosc0eb/church_without_walls_by_exclusiveflyer.zip?dl=1" colorstart="#000000" colorend="#FFFFFF" colortext="#FFFFFF" icon_size="12" class="" target="_top" color="red-button" align="horizontal" width="large" icon="icon-align-center" ]DOWNLOAD TEMPLATE[/button][/membership]


          Worship Night – Premium A5 Flyer Template        
The Worship Night is the exclusive Photoshop PSD flyer template designed by ExclusiveFlyer to promote your Worship Night. This is a modern, stylish flyer and just be used for a Church Conference, Christian Conference, Gospel etc.

[membership][button href="https://www.dropbox.com/s/nnykmaemtarlf9a/worship_night_by_exclusiveflyer.zip?dl=1" colorstart="#000000" colorend="#FFFFFF" colortext="#FFFFFF" icon_size="12" class="" target="_top" color="red-button" align="horizontal" width="large" icon="icon-align-center" ]DOWNLOAD TEMPLATE[/button][/membership]


          Join Us For Sunday Service – Premium A5 Flyer Template        
The Join Us For Sunday Service is the exclusive Photoshop PSD flyer template designed by ExclusiveFlyer to promote your Join Us For Sunday Service. This is a modern, stylish flyer and just be used for a Church Conference, Christian Conference, Gospel etc.

[membership][button href="https://www.dropbox.com/s/lla29bowblk4gx7/join_us_for_sunday_service_by_exclusiveflyer.zip?dl=1" colorstart="#000000" colorend="#FFFFFF" colortext="#FFFFFF" icon_size="12" class="" target="_top" color="red-button" align="horizontal" width="large" icon="icon-align-center" ]DOWNLOAD TEMPLATE[/button][/membership]


          Bible Study – Premium A5 Flyer Template        
The Bible Study is the exclusive Photoshop PSD flyer template designed by ExclusiveFlyer to promote your Bible Study. This is a modern, stylish flyer and just be used for a Church Conference, Christian Conference, Gospel etc.

[membership][button href="https://www.dropbox.com/s/95r3f92r3gf6gvq/bible_study_by_exclusiveflyer.zip?dl=1" colorstart="#000000" colorend="#FFFFFF" colortext="#FFFFFF" icon_size="12" class="" target="_top" color="red-button" align="horizontal" width="large" icon="icon-align-center" ]DOWNLOAD TEMPLATE[/button][/membership]


          Christian Conference – Premium A5 Flyer Template        
The Christian Conference is the exclusive Photoshop PSD flyer template designed by ExclusiveFlyer to promote your Christian Conference. This is a modern, stylish flyer and just be used for a Church Conference, Christian Conference, Gospel etc.

[membership][button href="https://www.dropbox.com/s/0zlawa6my1sng3e/christian_conference_by_exclusiveflyer.zip?dl=1" colorstart="#000000" colorend="#FFFFFF" colortext="#FFFFFF" icon_size="12" class="" target="_top" color="red-button" align="horizontal" width="large" icon="icon-align-center" ]DOWNLOAD TEMPLATE[/button][/membership]


          Run The Race – Premium A5 Flyer Template        
The Run The Race is the exclusive Photoshop PSD flyer template designed by ExclusiveFlyer to promote your Run The Race. This is a modern, stylish flyer and just be used for a Church Conference, Christian Conference, Gospel etc.

[membership][button href="https://www.dropbox.com/s/qyharybj90rk67k/run_the_race_by_exclusiveflyer.zip?dl=1" colorstart="#000000" colorend="#FFFFFF" colortext="#FFFFFF" icon_size="12" class="" target="_top" color="red-button" align="horizontal" width="large" icon="icon-align-center" ]DOWNLOAD TEMPLATE[/button][/membership]


          True Way – Premium Flyer Template        
The True Way is the exclusive Photoshop PSD flyer template designed by ExclusiveFlyer to promote your True Way. This is a modern, stylish flyer and just be used for a Bible Study Day, Church Event etc.

[membership][button href="https://www.dropbox.com/s/futyhkmgxq8gg3o/true_way_ljgnjdngdfg646.zip?dl=1" colorstart="#000000" colorend="#FFFFFF" colortext="#FFFFFF" icon_size="12" class="" target="_top" color="red-button" align="horizontal" width="large" icon="icon-align-center" ]DOWNLOAD TEMPLATE[/button][/membership]


          God Music – Premium Mixtape Album CD Cover Template        
The God Music is the exclusive Photoshop PSD CD Cover template designed by ExclusiveFlyer to promote your God Music Collection. This is a modern, stylish template and just be used for a Album CD Cover etc.

[membership][button href="https://www.dropbox.com/s/zfgn0q4ny4nm5a3/god_music_cd_cover_lkvnlskdngvs46546.zip?dl=1" colorstart="#000000" colorend="#FFFFFF" colortext="#FFFFFF" icon_size="12" class="" target="_top" color="red-button" align="horizontal" width="large" icon="icon-align-center" ]DOWNLOAD TEMPLATE[/button][/membership]


          Who Packed your Parachute – Premium Flyer Template + Instagram Size Flyer        
The Who Packed your Parachute – Premium Flyer Template + Instagram Size Flyer is the exclusive Photoshop PSD flyer template designed by ExclusiveFlyer to promote your Who Packed your Parachute – Premium Flyer Template + Instagram Size Flyer . This is a modern, stylish flyer and just be used for a Church Events, Concerts etc.

[membership][button href="https://www.dropbox.com/s/lhba65boi2bxb8i/who_packed_your_parachute_fsfsfs854.zip?dl=1" colorstart="#000000" colorend="#FFFFFF" colortext="#FFFFFF" icon_size="12" class="" target="_top" color="red-button" align="horizontal" width="large" icon="icon-align-center" ]DOWNLOAD TEMPLATE[/button][/membership]


          Church Night – Premium Flyer Template + Instagram Size Flyer        
The Church Night is the exclusive Photoshop PSD flyer template designed by ExclusiveFlyer to promote your Church Night. This is a modern, stylish flyer and just be used for a Gospel Concert, Pray Day, Churcn Event etc.

[membership][button href="https://www.dropbox.com/s/zsk7mbepldly9bu/church_night_jnbjkxdfsz4648.zip?dl=1" colorstart="#000000" colorend="#FFFFFF" colortext="#FFFFFF" icon_size="12" class="" target="_top" color="red-button" align="horizontal" width="large" icon="icon-align-center" ]DOWNLOAD TEMPLATE[/button][/membership]


          The Gamma dataviz package now available!        

There were a lot of rumors recently about the death of facts and even the death of statistics. I believe the core of the problem is that working with facts is quite tedious and the results are often not particularly exciting. Social media made it extremely easy to share your own opinions in an engaging way, but what we are missing is a similarly easy and engaging way to share facts backed by data.

This is, in essence, the motivation for The Gamma project that I've been working on recently. After several experiments, including the visualization of Olympic medalists, I'm now happy to share the first reusable component based on the work that you can try and use in your data visualization projects. If you want to get started:

The package implements a simple scripting language that anyone can use for writing simple data aggregation and data exploration scripts. The tooling for the scripting language makes it super easy to create and modify existing data analyses. Editor auto-complete offers all available operations and a spreadsheet-inspired editor lets you create scripts without writing code - yet, you still get a transparent and reproducible script as the result.


          Can programming be liberated from function abstraction?        

When you start working in the programming language theory business, you'll soon find out that lambda abstraction and functions break many nice ideas or, at least, make your life very hard. For example, type inference is easy if you only have var x = ..., but it gets hard once you want to infer type of x in something like fun x -> ... because we do not know what is assigned to x. Distributed programming is another example - sending around data is easy, but once you start sending around function values, things become hard.

Every programming language researcher soon learns this trick. When someone tells you about a nice idea, you reply "Interesting... but how does this interact with lambda abstraction?" and the other person replies "Whoa, hmm, let me think more about this." Then they go back and either give up, because it does not work, or produce something that works, in theory, well with lambda abstraction, but is otherwise quite unusable.

When working on The Gamma project and the little scripting language it runs, I recently went through a similar thinking process. Instead of letting lambda abstraction spoil the party again, I think we need to think about different ways of code reuse.


          The Gamma — Visualizing Olympic Medalists        

Olympic Games are perfect opportunity to do a fun data visualization project - just like New Year, you can easily predict when they will happen and you can get something interesting ready in advance. I used this year's Games in Rio as a motivation to resume working on The Gamma project. If you did not read my previous article, the idea is to build tooling for open, reproducible and interactive data-driven storytelling. When you see a visualization, not only you should be able to see how it has been created (what data it uses & how), but you should also be able to modify it, without much programming experience, and look at other interesting aspects of the data.

The first version of The Gamma project tries to do some of this, using historical and current data on Olympic medals as a sample dataset. You can play with the project at The Gamma web site:

Without further ado, here are the most important links if you want to explore how it all works on your own. However, continue reading and I'll describe the most important parts!

The project is still in early stages and the code needs more documentation (and ReadMe files, I know!) However, if you would be interested in using it for something or you have some interesting data to visualize, do not hesitate to ping me at @tomaspetricek. Also, thanks to the DNI Innovation Fund for funding the project and to the Alan Turing Institute for providing a place to work on this over the coming months!


          Better F# data science with FsLab and Ionide        

At NDC Oslo 2016, I did a talk about some of the recent new F# projects that are making data science with F# even nicer than it used to be. The talk covered a wider range of topics, but one of the nice new thing I showed was the improved F# Interactive in the Ionide plugin for Atom and the integration with FsLab libraries that it provides.

In particular, with the latest version of Ionide for Atom and the latest version of FsLab package, you can run code in F# Interactive and you'll see resulting time series, data frames, matrices, vectors and charts as nicely pretty printed HTML objects, right in the editor. The following shows some of the features (click on it for a bigger version):

In this post, I'll write about how the new Ionide and FsLab integration works, how you can use it with your own libraries and also about some of the future plans. You can also learn more by getting the FsLab package, or watching the NDC talk..


          Coeffects playground: Interactive essay based on my PhD thesis        

In my PhD thesis, I worked on integrating contextual information into a type system of functional programming languages. For example, say your mobile application accesses something from the environment such as GPS sensor or your Facebook friends. With coeffects, this could be a part of the type. Rather than having type string -> Person, the type of a function would also include resources and would be string -{ gps, fb }-> Person. I wrote longer introduction to coeffects on this blog before.

As one might expect, the PhD thesis is more theoretical and it looks at other kinds of contextual information (e.g. past values in stream-based data-flow programming) and it identifies abstract coeffect algebra that captures the essence of contextual information that can be nicely tracked in a functional language.

I always thought that the most interesting thing about the thesis is that it gives people a nice way to think about context in a unified way. Sadly, the very theoretical presentation in the thesis makes this quite hard for those who are not doing programming language theory.

To make it a bit easier to explore the ideas behind coeffects, I wrote a coeffect playground that runs in a web browser and lets you learn about coeffects, play with two example context-aware languages, run a couple of demos and learn more about how the theory works. Go check it out now or continue below to learn more about some interesting internals!


          F# + ML |> MVP Summit: Talk recordings, slides and source code        

I was fortunate enough to make it to the Microsoft MVP summit this year. I didn't learn anything secret (and even if I did, I wouldn't tell you!) but one thing I did learn is that there is a lot of interest in data science and machine learning both inside Microsoft and in the MVP community. What was less expected and more exciting was that there was also a lot of interest in F#, which is a perfect fit for both of these topics!

When I visited Microsoft back in May to talk about Scalable Machine Learning and Data Science with F# at an internal event, I ended up chatting with the organizer about F# and we agreed that it would be nice to do more on F#, which is how we ended up organizing the F# + ML |> MVP Summit 2015 mini-conference on the Friday after the summit.


          The Gamma: Simple code behind interactive articles        

There are huge amounts of data around us that we could use to better understand the world. Every company collects large amounts of data about their sales or customers. Governments and international organizations increasingly release interesting data sets to the public through various open government data initiatives (data.gov or data.gov.uk). But raw data does not tell you much.

An interesting recent development is data journalism. Data journalists tell stories using data. A data driven article is based on an interesting observation from the data, it includes (interactive) visualizations that illustrate the point and it often allows the reader to get the raw data.

Adding a chart produced in, say, Excel to an article is easy, but building good interactive visualization is much harder. Ideally, the data driven article should not be just text with static pictures, but a program that links the original data source to the visualization. This lets readers explore how the data is used, update the content when new data is available and change parameters of the visualization if they need to understand different aspect of the topic.

This is in short what I'm trying to build with The Gamma project. If you're interested in building better reports or data driven articles, continue reading!

I did a talk about The Gamma project at the fantastic Future Programming workshop at the StrangeLoop conference last week (thanks for inviting me!) and there is a recording of my 40 minute talk on YouTube, so if you prefer to watch videos, check it out!

Are you a data journalist or data analyst? We're looking for early partners! I joined the EF programme to work on this and if the project sounds like something you'd like to see happen, please get in touch or share your contact details on The Gamma page!


          Creating web sites with Suave: How to contribute to F# Snippets        

The core of many web sites and web APIs is very simple. Given an HTTP request, produce a HTTP response. In F#, we can represent this as a function with type Request -> Response. To make our server scalable, we should make the function asynchronous to avoid unnecessary blocking of threads. In F#, this can be captured as Request -> Async<Response>. Sounds pretty simple, right? So why are there so many evil frameworks that make simple web programming difficult?

Fortunately, there is a nice F# library called Suave.io that is based exactly on the above idea:

Suave is a simple web development F# library providing a lightweight web server and a set of combinators to manipulate route flow and task composition.

I recently decided to start a new version of the F# Snippets web site and I wanted to keep the implementation functional, simple, cross-platform and easy to contrbute to. I wrote a first prototype of the implementation using Suave and already received a few contributions via pull requests! In this blog post, I'll share a few interesting aspects of the implementation and I'll give you some good pointers where you can learn more about Suave. There is no excuse for not contributing to F# Snippets v2 after reading this blog post!


          In the age of the web: Typed functional-first programming revisited        

Most programming languages were designed before the age of web. This matters because the web changes many assumptions that typed functional language designers tak for granted. For example, programs do not run in a closed world, but must instead interact with (changing and likely unreliable) services and data sources, communication is often asynchronous or event-driven, and programs need to interoperate with untyped environments like JavaScript libraries.

How can statically-typed programming languages adapt to the modern world? In this article, I look at one possible answer that is inspired by the F# language and various F# libraries. In F#, we use type providers for integration with external information sources and for integration with untyped programming environments. We use lightweight meta-programming for targeting JavaScript and computation expressions for writing asynchronous code.

This blog post is a shorter version of a ML workshop paper that I co-authored earlier this year and you should see this more as a position statement. I'm not sure if F# and the solutions shown here are the best ones, but I think they highlight very important questions in programming language design that I very much see as unsolved.

The article has two sections. First, I'll go through a simple case study showing how F# can be used to build a client-side web widget. Then, I'll discuss some of the implications for programming language design based on the example.


          Miscomputation: Learning to live with errors        

If trials of three or four simple cases have been made, and are found to agree with the results given by the engine, it is scarcely possible that there can be any error (...).

Charles Babbage, On the mathematical
powers of the calculating engine (1837)

Anybody who has something to do with modern computers will agree that the above statement made by Charles Babbage about the analytical engine is understatement, to say the least.

Computer programs do not always work as expected. There is a complex taxonomy of errors or miscomputations. The taxonomy of possible errors is itself interesting. Syntax errors like missing semicolons are quite obvious and are easy to catch. Logical errors are harder to find, but at least we know that something went wrong. For example, our algorithm does not correctly sort some lists. There are also issues that may or may not be actual errors. For example an algorithm in online store might suggest slightly suspicious products. Finally, we also have concurrency errors that happen very rarely in some very specific scenario.

If Babbage was right, we would just try three or four simple cases and eradicate all errors from our programs, but eliminating errors is not so easy. In retrospect, it is quite interesting to see how long it took early computer engineers to realise that coding (i.e. translating mathematical algorithm to program code) errors are a problem:

Errors in coding were only gradually recognized to be a significant problem: a typical early comment was that of Miller [circa 1949], who wrote that such errors, along with hardware faults, could be "expected, in time, to become infrequent".

Mark Priestley, Science of Operations (2011)

We mostly got rid of hardware faults, but coding errors are still here. Programmers spent over 50 years finding different practical strategies for dealing with them. In this blog post, I want to look at four of the strategies. Quite curiously, there is a very wide range.


          Good bye....for now        
All jewellery charity shopped.
Our heatwave finally departed last Thursday. On Wednesday it was 31 degrees and by Thursday it was much cooler at around 20 -21 degrees, cloudier and with a slight breeze. Thank God, I said.

This was last Tuesday's outfit. I just wore the jacket to and from my volunteering and stayed sleeveless the rest of the time - bingo wings and all!


Everything charity shopped except the watch (present) and sandals which I bought in the Clark's sale about six or even seven summers ago. Note I'm not wearing any bangles in these photos but see below...


The cotton trousers are by F&F, the jacket is by M&S and charity shopped in Kettering just before Christmas 2016. I've had this sleeveless navy top for donkey's years...

On Monday and Tuesday I volunteered as usual at the Red Cross and the Food Bank. When I was at the Red Cross on Tuesday afternoon I finally began my training on the till. Whilst the manager was training me, my colleague; who had been previously been on the till went out to the sorting area and took over from me. I'd been sorting the jewellery. 

When I got home from the shop I realised I wasn't wearing my bangles. The last time I'd seen them they were on the sorting table at the shop; I always take them off as they get in the way when I'm writing the price labels. Yes, you've guessed it - my colleague had priced them up and put them out on display! Luckily, they weren't sold and I picked them up the next day.

I had my hair cut and eyebrows done on Wednesday and ran a few errands in town which included a visit to the 3:16 shop. I bought a tunic and a couple of winter items for 1.00 each. When I finished I came home and stayed in the coolest room in the house reading.  I didn't do the Weds evening Summer Solstice walk as it was still too hot at 8.30 pm.

 I've relegated these trousers to the charity shop bag. They always wrinkle around my calves
I don't know why...




I managed to get out for a walk on Thursday and walked almost 6 miles in a much cooler temperature. 

This was Thursday's outfit - everything charity shopped except the shoes which are from local retailer PJ shoes. Trousers; H & M; t shirt; 1.00 rail somewhere; green kimono jacket from a 50 p bin in a charity shop. What a bugger it was to iron - I can see why someone donated it! I've donated it too...



All jewellery charity shopped.


I passed this colourful front garden on my walk and had to take a picture of it.

On Friday the weather was cool again so I went for another walk after the school run. I started out from Great Denham; having had a look in Barnardo's first, then walked to Kempston Mill: along the river Great Ouse to the Queen's Park area of Bedford. From there I walked back to Great Denham along the the other side of the river; 6.42 miles in total. Queens Park has a beautiful Hindu temple:



And on the return journey I saw these magnificent, huge willow trees:




Everything charity shopped. The yellow tunic is from the 3:16 shop on Wednesday and I bought the beads in Barnardo's. Jeans from Red Cross charity shop.


I can't remember where I got the white lace top but I bought earlier this year somewhere. Sandals also charity shopped.


All jewellery charity shopped.


On Saturday OH wanted to go for a rummage. We had thought of going to London where we could fit in a visit to his mum but we ended up going to Luton and Dunstable instead!

Everything I'm wearing above is charity shopped except the sandals - my comfortable Clarks. The kimono is from Primarni; the top is a M&S one and white jeans are from Matalan.


All jewellery charity shopped except the earrings - from Sainsbury's.


My jacket was much admired by total strangers. They were very surprised when I told them where it came from. When I was last in Devon visiting Hilary I found another similar one - also by Primarni;  it had a beautiful print on it and Hilary bought it.

Of course you want to know if I bought anything. I did. I bought some interesting mustard colour cotton trousers in the Red Cross for 1.99; a blue kimono jacket from the 1.00 rail in Keech Hospice and some padded hangers; a pair of earrings and a yellow sleeveless top for 2.00 in Age Concern. (The earrings seem to have disappeared. I remember taking them out of the bag at home but haven't found them since - they'll turn up somewhere). There were only six charity shops in Luton town centre which I found surprising. Bedford is a smaller town and has twelve. Dunstable had about five charity shops and I din't buy anything in them. I don't think I will be rushing back to Luton or Dunstable for some rummaging any time soon...


On Monday I stayed at the Red Cross until it was time to pick the grandchildren up from school. Two of the volunteers were off to celebrate Eid and the manager had a day off leaving just myself and the assistant manager. There were so many donations to sort and I served at the till, too.

This is what I wore. Everything is charity shopped except my underwear - and you're not seeing that! Jacket; Next, 1.00 Red Cross, zebra print trousers from Barnardo's last week: 2.49. Next top; charity shopped last summer.


Sandals; charity shopped.


All jewellery; charity shopped.

This is going to be my last post for a while. On Saturday I'm going to drive to Holyhead and catch the ferry to Ireland on Sunday morning. I should reach the van about 4 pm having stopped off at Lidl to do some shopping. As I've said before the internet connection at the site is both weak and intermittent so I doubt that I'll be able to post more than once every couple of weeks and then only when I'm somewhere with free wifi.

I'm so looking forward to the next couple of months where I will just be chilling out; reading, crocheting, walking; visiting family, sight seeing and a bit of charity shopping of course! I'm looking forward to having a few visitors to stay. I shall miss my children and grandchildren and OH but I will see them in Ireland. Whatever transpires I'll be back in September so I hope you all have a wonderful summer.

          finger joint pain sudden onset sur Test Tablette graphique        
sudden joint pain middle finger
as anyone body contracts any opponent's muscle classified as supinator. All of the patellar structures will begin maximizing considering the just one you can be widespread styles of heart issues and one tsp of within the inflammed community. With luck ,, instances of footwear often get get rid of problems, puffiness, soreness, and even convulsions, and to lubricate the skin. Most certainly, single healthy shock reducing through about to buy your defense mechanisms can certainly consume these kind of own house conveniently takes away suffering of child birth once and for all by its removing the cardiac arrest, genital herpes virus virus elaborate together with finger joint pain arthritis may be helped by frigid etcetera Supple.net discounts, discount codes, promotion code, promotions and on the web Elastic.web price reductions, discounts, coupons or simply discount bonus coupon codes and also jot down any specific kanji, you actually set up a cesar stone is actually handed, no other in close proximity to quite knowing indy combined pills getting to ease the signs and symptoms involving psychologist everyone check out. Deborah.N. Really don't 100 %. Some elements located through the entire quite a few drug stores. And with this, heart has to just simply find a ailment that will require many knees and lower back. Every continual soreness for joint pain in middle finger only causes pain joint little finger
          DNA: Today in History, October 12, 2016        

Watch history moment to learn the events that occurred on this very date i.e October 12.

Zee News always stay ahead in bringing current affairs from all the valley of National interest, Politics, Entertainment, Sports and International happenings. We take you to the depth of every matter by providing every small detail and makes you familiar with all the happening around you.

Zee News is the highly popular Hindi News channel of India’s largest television network ZMCL. The channel, which has a huge following in India and abroad, has won several prestigious national and international awards. Among its popular programs are -

Dr. Subhash Chandra Show: https://goo.gl/fCugXC
Daily News and Analysis: https://goo.gl/B8eVsD
Manthan: https://goo.gl/6q0wUN
Fast n Facts: https://goo.gl/kW2MYV
Your daily dose of entertainment: https://goo.gl/ZNEfhw
Sports roundup: https://goo.gl/KeeYjf
Aapke Sitare: https://goo.gl/X56YSa
Bharat Bhagya Vidhata: https://goo.gl/QqJiOV
Taal Thok Ke : https://goo.gl/yiV6e7

Subscribe to our channel at https://goo.gl/qKzmWg

Check out our website: http://www.zeenews.com

Connect with us at our social media handles:
Facebook: https://www.facebook.com/ZeeNews
Twitter: https://twitter.com/ZeeNews
Google Plus: https://plus.google.com/+Zeenews

Domain: 
News
English Title: 
DNA: Today in History, October 12, 2016
Home Title: 

DNA: Today in History, October 12, 2016

IsYouTube: 
Yes
YT Code: 
6WBNkH_kSOs
Image: 

          DNA: Work-related stress may increase risk of heart attack        

Analysis of Pakistan's fourth rank in risky nation for journalists. Watch this special segment and get to know more here.

Zee News always stay ahead in bringing current affairs from all the valley of National interest, Politics, Entertainment, Sports and International happenings. We take you to the depth of every matter by providing every small detail and makes you familiar with all the happening around you.

Zee News is the highly popular Hindi News channel of India’s largest television network ZMCL. The channel, which has a huge following in India and abroad, has won several prestigious national and international awards. Among its popular programs are -

Dr. Subhash Chandra Show: https://goo.gl/fCugXC
Daily News and Analysis: https://goo.gl/B8eVsD
Manthan: https://goo.gl/6q0wUN
Fast n Facts: https://goo.gl/kW2MYV
Your daily dose of entertainment: https://goo.gl/ZNEfhw
Sports roundup: https://goo.gl/KeeYjf
Aapke Sitare: https://goo.gl/X56YSa
Bharat Bhagya Vidhata: https://goo.gl/QqJiOV
Taal Thok Ke : https://goo.gl/yiV6e7

Subscribe to our channel at https://goo.gl/qKzmWg

Check out our website: http://www.zeenews.com

Connect with us at our social media handles:
Facebook: https://www.facebook.com/ZeeNews
Twitter: https://twitter.com/ZeeNews
Google Plus: https://plus.google.com/+Zeenews

Domain: 
News
English Title: 
DNA: Work-related stress may increase risk of heart attack
Home Title: 

DNA: Work-related stress may increase risk of heart attack

IsYouTube: 
Yes
YT Code: 
ymOT4idcTvg
Image: 

          DNA: Why are politicians and media ignoring the patriotic residents of Gurez Valley? Part III        

Politicians and journalists are not taking cognizance of patriotic residents of Gurez Valley in Kashmir. Watch this special segment and get to know about the real face of Kashmir.

Zee News always stay ahead in bringing current affairs from all the valley of National interest, Politics, Entertainment, Sports and International happenings. We take you to the depth of every matter by providing every small detail and makes you familiar with all the happening around you.

Zee News is the highly popular Hindi News channel of India’s largest television network ZMCL. The channel, which has a huge following in India and abroad, has won several prestigious national and international awards. Among its popular programs are -

Dr. Subhash Chandra Show: https://goo.gl/fCugXC
Daily News and Analysis: https://goo.gl/B8eVsD
Manthan: https://goo.gl/6q0wUN
Fast n Facts: https://goo.gl/kW2MYV
Your daily dose of entertainment: https://goo.gl/ZNEfhw
Sports roundup: https://goo.gl/KeeYjf
Aapke Sitare: https://goo.gl/X56YSa
Bharat Bhagya Vidhata: https://goo.gl/QqJiOV
Taal Thok Ke : https://goo.gl/yiV6e7

Subscribe to our channel at https://goo.gl/qKzmWg

Check out our website: http://www.zeenews.com

Connect with us at our social media handles:
Facebook: https://www.facebook.com/ZeeNews
Twitter: https://twitter.com/ZeeNews
Google Plus: https://plus.google.com/+Zeenews

Domain: 
News
Section: 
English Title: 
DNA: Why are politicians and media ignoring the patriotic residents of Gurez Valley? Part III
Home Title: 

DNA: Why are politicians and media ignoring the patriotic residents of Gurez Valley? Part III

IsYouTube: 
Yes
YT Code: 
m7CyeqBPVCM
Image: 

          DNA: Why are politicians and media ignoring the patriotic residents of Gurez Valley? Part II        

Politicians and journalists are not taking cognizance of patriotic residents of Gurez Valley in Kashmir. Watch this special segment and get to know about the real face of Kashmir.

Zee News always stay ahead in bringing current affairs from all the valley of National interest, Politics, Entertainment, Sports and International happenings. We take you to the depth of every matter by providing every small detail and makes you familiar with all the happening around you.

Zee News is the highly popular Hindi News channel of India’s largest television network ZMCL. The channel, which has a huge following in India and abroad, has won several prestigious national and international awards. Among its popular programs are -

Dr. Subhash Chandra Show: https://goo.gl/fCugXC
Daily News and Analysis: https://goo.gl/B8eVsD
Manthan: https://goo.gl/6q0wUN
Fast n Facts: https://goo.gl/kW2MYV
Your daily dose of entertainment: https://goo.gl/ZNEfhw
Sports roundup: https://goo.gl/KeeYjf
Aapke Sitare: https://goo.gl/X56YSa
Bharat Bhagya Vidhata: https://goo.gl/QqJiOV
Taal Thok Ke : https://goo.gl/yiV6e7

Subscribe to our channel at https://goo.gl/qKzmWg

Check out our website: http://www.zeenews.com

Connect with us at our social media handles:
Facebook: https://www.facebook.com/ZeeNews
Twitter: https://twitter.com/ZeeNews
Google Plus: https://plus.google.com/+Zeenews

Domain: 
News
English Title: 
DNA: Why are politicians and media ignoring the patriotic residents of Gurez Valley? Part II
Home Title: 

DNA: Why are politicians and media ignoring the patriotic residents of Gurez Valley? Part II

IsYouTube: 
Yes
YT Code: 
DmQKOBs06Zw
Image: