Monday, December 31, 2012

Republican Senate leader urges Biden to break impasse

Senate Minority Leader Mitch McConnell (R-KY) is shown in this C-Span video footage as he addresses the Senate??Republican Senate Minority Leader Mitch McConnell urged Vice President Joe Biden on Sunday to jump into ?fiscal cliff? talks in hopes of breaking an impasse that threatens Americans with sharply higher income taxes come January 1.

In a brief speech on the Senate floor, McConnell complained that Democrats had not yet placed a counter-offer to a new Republican proposal, delivered at 7 pm on Saturday, ?despite the obvious time crunch.?

?I?m concerned about the lack of urgency here,? the Kentucky lawmaker said. ?I think we all know we?re running out of time.?

Besides conferring with his Democratic counterpart, Senate Majority Leader Harry Reid, McConnell said he had reached out to Biden "to see if he could help jump-start the negotiations on his side.?

McConnell added, ?The vice president and I have worked together on solutions before, and I believe we can again."

Absent a breakthrough by tomorrow, income tax rates will rise across the board while government spending on domestic and defense programs will be slashed ? a combination that some experts warn could plunge the economy into a new recession.

President Barack Obama has pressed for extending Bush-era tax rates on income up to $250,000 but letting them expire above that threshold. Republicans have resisted raising taxes on income at all levels. The two sides have also been at odds on issues like the estate tax and whether to extend unemployment benefits that stand to expire for some two million Americans.

Republican aides said that McConnell and Biden had spoken several times. A Biden aide said the vice president went to the White House after spending Christmas with his family in Delaware.

?We?re willing to work with whoever, whoever can help,? McConnell said. ?There?s no single issue that remains an impossible sticking point. The sticking point appears to be a willingness, an interest, or frankly the courage to close the deal.?

?I?m willing to get this done, but I need a dance partner,? he said.

Reid said he had spoken several times on Sunday with Obama but acknowledged that his side had been ?unable? to present a counter-offer to the latest Republican proposal.

?He and the vice president, I wish them well. In the meantime I will continue to try to come up something but at this stage I don?t have a counter-offer to make,? Reid said. ?We are apart on some pretty big issues.?

Reid said he remained "hopeful but realistic" about the prospects for a breakthrough.

But he also seemed to confirm that one key sticking point was a Republican demand for reducing Social Security payments but adopting a less generous cost-of-living calculation known as ?chained CPI? (the CPI being ?consumer price index,? a measure of inflation).

?We?re not going to have any Social Security cuts,? Reid declared, saying it would not be ?appropriate? in a short-term deal. Democratic leaders have cautiously signaled support for that approach ? but only as part of a larger-scale deal that would see the U.S. debt limit raised for a significant stretch of time. Republicans want to use the debt ceiling fight to wrangle deeper government spending cuts.

?We're willing to make difficult concessions as part of a balanced, comprehensive agreement,? Reid said, ?but we'll not agree to cut Social Security benefits as part of a small or short-term agreement, especially if that agreement gives more handouts to the rich.?

Republican aides bristled at Reid's characterization, noting that Democrats had not yet returned with a counter-offer. "If they don't like the CPI thing, they can strike it out," one told Yahoo News.

Republican senators, meanwhile, emerged from a closed door party meeting saying that chained CPI was off the table for now. The proposal was "not a winning hand" in the current standoff, John McCain told reporters drily.

Republican House Speaker John Boehner has said that it's up to the Senate to craft a compromise that can clear both chambers of Congress. Boehner suffered an embarrassing setback 10 days ago when conservative opposition forced him to withdraw legislation that would have let taxes rise on income of above $1 million. But a senior Republican aide noted that the exercise allowed the speaker to gauge how many of his rank-and-file would accept any increase in tax rates.

Source: http://news.yahoo.com/blogs/ticket/top-republican-senator-urges-biden-break-fiscal-cliff-194733815--politics.html

new apple tv sun flare love hewitt new ipad solar flare joseph kony 2012 arian foster

Thursday, December 27, 2012

2012: The year malware surged 'dramatically'

20 hrs.

December is "prediction season" in the cybersecurity industry. Every major anti-virus software maker and digital-security provider issues its own forecasts of what computer users face in the coming year.?

So far this month, the predictions for 2013 look a lot like those for 2012: more?Android malware, increased cyberattacks by nation-states and greater activity by "hacktivist" groups such as Anonymous.?

However, a few companies go back and check their own predictions at the end of the year to see what they got right ??and wrong.?

One company that does so is Moscow-based Kaspersky Lab, one of the top five anti-virus companies in the world.?

"In 2011, we really saw a number of things rising up: hacktivism; big?database breaches; attacks against Androids; attacks against Macs; data espionage became daily business in 2011," said Roel Schouwenberg, senior researcher at Kaspersky's Boston-area office. "When we look at 2012, we saw a further evolution of all these new trends."?

Kaspersky made the following predictions for 2012:?

  • Hacktivist?groups, who attack computer systems for political or social reasons, would continue to increase their activities?
  • A higher rate of "advanced persistent threat" attacks, or state-sponsored espionage efforts?
  • More incidents of cyberwarfare involving customized, state-sponsored malware?
  • Attacks on software and game developers such as Adobe, Microsoft, Oracle and Sony?
  • More aggressive actions from law-enforcement agencies against cybercriminals?
  • An increasing rate in the growth of threats to the Android mobile platform?
  • Successful attacks on Apple's Mac OS X computer platform?

Let's examine five of the top security incidents that shaped 2012 and check the accuracy of the Kaspersky researchers in light of those predictions.?

1. More Mac OS X malware
Security experts had anticipated an outbreak of malware targeting Mac OS X for years; 2012 was when it finally happened.?

The bug that did it, called the?Flashback or Flashfake Trojan, first appeared near the end of 2011, but didn't reach its peak rate of infection until March of 2012.?

Flashback infected more than 700,000 Macs around the world, the largest known Mac OS X infection to date.?

"In 2011, we predicted that we would see more Mac malware attacks," said Kaspersky Lab's Costin Raiu and David Emm in a?blog posting. "We just never expected it would be this dramatic."?

Why did Flashback wreak such havoc??

One reason was a well-documented Java vulnerability, which Apple took a long time to patch even after it had been publicly disclosed. The Flashback authors took advantage of Apple's delay to incorporate the Java exploit into their otherwise unremarkable creation.?

The second reason was the general?lack of awareness among Mac users?about security. Proper anti-virus software would have stopped Flashback's attack, yet most Mac users felt they didn't need it.?

Flashback wasn't the only successful attack on Mac OS X systems in 2012. There were multiple espionage-related attacks on Macs used by Tibetan dissidents and exiles. Some of the attacks used corrupted files purporting to?come straight from the Dalai Lama, Tibet's exiled leader.?

"The espionage angle may be a bigger factor for Mac right now than regular consumer malware," Schouwenberg said. "For general cybercrime, most criminals go after Windows because that's what they know. That's what's easiest for them."?

"But when it comes to these targeted attacks, the attackers go after whichever machines the targets are using. So if the targets are using Macs, they'll go after Macs."?

Schouwenberg said in terms of the proportion of available systems infected, Flashback was the most successful malware outbreak of the year.?

"When you look at relative market share, the Flashback malware in terms of prevalence was the size of [the infamous Windows worm]?Conficker," he said. "This was an absolutely huge event in the Apple world. When you extrapolate [the number of Macs infected] to Windows numbers, that's about 10 million."?

2. Cyberweapons: Flame??
Cyberwarfare is a term that often gets hyped up, especially when a politician or general is speaking.?

In fact, the?Stuxnet worm, which crippled an Iranian uranium-enrichment facility in the summer of 2010, was for nearly two years the only known cyberweapon that had destroyed anything.?

That changed this past spring, when a series of cyberattacks destroyed computer systems at oil facilities in Iran, as well as in the offices of the Iranian oil ministry.?

Wiper, the malware thought to be responsible for the attacks, was never found, although certain tell-tale signs indicated it was similar to Stuxnet and its cousin Duqu.?

During the investigation in May, however, researchers from Kaspersky, the Iranian computer emergency response team MAHER and the CrySyS Lab at Budapest University in Hungary discovered something else ?possibly the most sophisticated piece of malware ever seen. Kaspersky's team called it "Flame."?

The size, age and sophistication of Flame were startling. It was 20 megabytes in size, as large as a complex smartphone game, while most malware is only a few dozen kilobytes in size.?

Flame contained a dozen different modules that could be added and subtracted according to the task at hand, which made it extremely versatile as spyware.?

It could map out networks, index files, record audio and video, log keystrokes, take screenshots and archive emails and instant messages. When its job was done, it would destroy all signs of itself on any 32-bit Windows PC, and sometimes the host system as well.?

Yet despite its size, Flame was at least five years old at the time of its discovery ?an enormous amount of time for a piece of malware to be "in the wild."?

As?Raiu said in a press release, Flame was "an example of a complex malicious program that could exist undetected for an extended amount of time while collecting massive amounts of data and sensitive information from its victims."?

A couple of weeks after its discovery, Dutch researchers found that Flame's creators had pulled off a mathematical breakthrough.?

Using unknown techniques, Flame's creators had created a nearly-impossible?cryptologic collision?that allowed Flame to present itself as a signed, genuine Windows update package direct from Microsoft. No anti-virus software could have stopped it.?

?Gauss...?
In August, Kaspersky researchers found a highly sophisticated Trojan in the Middle East, this time spying on Lebanese banks.?

Like ordinary criminal banking Trojans, this new malware, which Kaspersky researchers dubbed "Gauss," stole online-banking credentials to break into accounts. Yet Gauss didn't steal any money ?just information.

In their year-end review, Raiu and Emmer said Gauss added a "new dimension to nation-state cyber-campaigns," even if it was nowhere as sophisticated as Flame.?

"It appears there is a strong cyber component to the existing geopolitical tensions ?perhaps bigger than anyone expected," they added.?

? and Shamoon?
That would prove to be an understatement. Later in August, Shamoon, a piece of especially destructive, yet simple, malware, made?its world debut.?

Named after a piece of text embedded deep in its code, Shamoon launched an attack against the state-owned Saudi Arabian oil company Saudi Aramco and destroyed data on more than 30,000 computers. ??

Shamoon was crude but effective. It searched an infected system for certain files, sent a list of those files to a remote server, and then methodically deleted key parts of the installed Windows system, rendering the infected machine useless.?

"You have the hacktivist movement claiming credit for that attack, which may or may not be the case," Schouwenberg said.?

"Shamoon wasn't really that sophisticated, but when you look at the relevance of the incidence, it's extremely, extremely important," Schouwenberg added, "especially when you consider the fact that Saudi Aramco announced just recently that they strongly believe that Shamoon's real target was to mess with the oil production rather than just sabotaging the machines in the corporate network."?

Kaspersky researchers said many details about Shamoon were still unknown, such as how the malware infected Saudi Aramco's systems in the first place, or who was behind the malware.?

Some observers suspect Iran created and used Shamoon as an attempt to cripple Saudi Arabia's oil production, which would cause oil prices to rise, benefiting cash-strapped Iran.?

3. Exponential growth in Android malware?
During 2011, there was an explosion in the number of?malicious threats against the Android platform. It was obvious that the trend would go on.?

Kaspersky, as well as most of its competitors, accurately predicted that the number of threats for Android would continue to grow at an alarming rate in 2012.?

"We predicted we would see an explosion in Android malware and that's what we saw," Schouwenberg said. "There is a huge amount of Android malware these days, although not anywhere near the amount of Windows malware that we see. But it's grown very dramatically."?

How dramatically??

"The number of samples we received continued to grow and peaked in June 2012, when we identified almost 7,000 malicious Android programs," Raiu and Emmer wrote. "Overall, in 2012, we identified more than 35,000 malicious Android programs, which is about six times more than in 2011."?

So why is there so much Android malware, and so little malware targeting its competition, Apple's iOS??

It's because?iOS is locked down tight. Apple oversees every part of the hardware and software development, and strictly controls which apps can be installed on iOS devices.?

Android, however, is a free-for-all. Dozens of manufacturers make hundreds of Android devices, and the operating system is a little different on each one. Manufacturers and cellular carriers?refuse to update Android?in a timely manner, resulting in security holes that are left unpatched for months or years.?

"Off-road" app markets flourish, especially in China where access to the official Google Play store is restricted. Google has belatedly tightened security in both Android itself and in the Google Play store, yet its efforts have a long way to go before they can match Apple's.?

Still, the tighter security in the latest versions of Android may be having an effect. Kaspersky's own figures show that while the number of new Android threats continued to grow in the second half of 2012, the rate of growth began to slow.?

4. Advanced persistent threats go quiet?
Advanced persistent threat hackers, i.e. cyberspies, were certainly active in 2012, yet didn't have the spectacular successes they'd had in previous years.?

Perhaps the most visible attack on Western targets was the discovery in September 2012 that two pieces of malware had been signed using a?valid Adobe code-signing certificate.?

Apparently, someone, somehow, had broken into an Adobe server and stolen authentication certificates.?

"This discovery belongs to the same chain of extremely targeted attacks performed by sophisticated threat actors commonly described as APT," wrote Raiu and Emmer. "The fact that a high profile company like Adobe was compromised in this way redefines the boundaries and possibilities that are becoming available for these high-level attackers."?

5. Data breach after data breach?
One thing that Kaspersky failed to anticipate in 2012 was the seemingly unending parade of huge data breaches involving companies and organizations with inadequate security.?

In early June, the business-networking website LinkedIn had?6.4 million passwords stolen. The passwords were encrypted, but in a very simple way that meant most could easily be deciphered.?

A day later, online-dating service eHarmony suffered a similar breach,?losing 1.5 million passwords, also poorly encrypted.?

In July, struggling Web giant Yahoo was embarrassed by a data breach that revealed?450,000 passwords?had been stored without any encryption at all. It wasn't entirely Yahoo's fault, since the database was acquired with the 2010 purchase of another company, but it was also evident that no one had bothered to check.?

Worst of all was the revelation in late October that vital personally identifiable information on?3.8 million adult residents of South Carolina, plus 1.9 million dependents and 700,000 businesses, had been stolen from the state tax agency.?

Entire tax records, containing names, addresses, dates of birth and, worst of all, Social Security numbers, were all stored unencrypted. Virtually the entire state population of 4.7 million people was put at grave risk of identity theft.?

Weeks after the breach was revealed, the state government was blaming the federal IRS for not providing strong security guidelines, and was itself being criticized by security experts for not revealing enough about what had happened.?

Looking back, and forward?
"There isn't too much that was shocking news over 2012, just these up-and-coming things [from] 2011 that really established themselves in 2012," Schouwenberg said. "But we also saw some examples of new nation-state [campaigns] like Flame and Gauss. But from my personal point of view, the most significant event of the year was Shamoon."?

As for 2013, "we expect the next year to be packed with high-profile attacks on consumers, businesses and governments alike, and to see the first signs of notable attacks against the critical industrial infrastructure," Raiu said in a company press release.?"The most notable trends of 2013 will be new examples of cyberwarfare operations, increasing targeted attacks on businesses and new, sophisticated mobile threats."

Source: http://www.nbcnews.com/technology/technolog/2012-year-malware-surged-dramatically-1C7659317

abe lincoln vampire hunter xi jinping matt bomer westminster kennel club dog show jeremy lin game winner chocolate covered strawberries shrimp scampi

Monday, December 24, 2012

Three arrested in St. Bernard shooting | NOLA.com

Three men have been arrested, and St. Bernard sheriff's deputies are searching for another in a Dec. 13 shooting match in Violet. No one was injured in the gunfire on Daniel Drive. Sheriff's officials say it resulted from a feud.

Jeromy Thompson, 18, of Violet is the wanted man.

Arrested were Keith Thompson, 22, of Violet; and Troy Sino, 23, and Roy Ferrand III, 20, both of Plaquemines Parish. All three have been booked on aggravated battery counts. They are being held in lieu of bonds ranging from $17,500 to $27,500.

The sheriff's office is asking anyone with information on Thompson's whereabouts to call 504-271-2501 or Crimestoppers at 504-822-1111.

Source: http://www.nola.com/crime/index.ssf/2012/12/three_arrested_in_st_bernard_s.html

tryptophan BestBuy.com Kohls Black Friday www.walmart.com Macho Camacho Rise of the Guardians Pumpkin Pie

Thursday, December 20, 2012

Tom Hooper, Mychael Danna join crowded slate of Palm Springs honorees

LOS ANGELES (TheWrap.com) - "Les Miserables" director Tom Hooper and "Life of Pi" composer Mychael Danna are the latest awards-season hopefuls to be added to the slate of honorees at the Palm Springs International Film Festival, PSIFF organizers announced on Tuesday.

The two will join a list of honorees that in recent days has expanded to include Helen Mirren, Richard Gere, Bradley Cooper and Sally Field. Other awards will go to Helen Hunt, Naomi Watts, Robert Zemeckis and the cast of "Argo."

Hooper will receive the Sonny Bono Visionary Award, named in honor of the singer/producer/actor and Palm Springs mayor who launched the festival. Past recipients include Danny Boyle, Quentin Tarantino, Baz Luhrmann and last year's winner, "The Artist" director Michel Hazanavicius.

"Tom Hooper brilliantly transforms the classic stage musical 'Les Mis?rables' into a cinema marvel," said festival chairman Harold Matzner in a press release announcing the awards. "By asking his amazing cast of actors to sing live on film, Hooper allows them to connect even further with their characters, resulting in emotional powerhouse performances that are enthralling audiences worldwide."

Danna, who has won acclaim for his score to Ang Lee's "Life of Pi," will receive the Frederick Loewe Award for Film Composing, a PSIFF honor that in the past has gone to T Bone Burnett, Alexandre Desplat, Danny Elfman, Randy Newman and Diane Warren.

Danna previously wrote music for Lee's films "The Ice Storm" and "Ride With the Devil." "Mychael Danna is a pioneer in creating original compositions that are as dramatic and innovative as the films in which they are featured," said Matzner in the release.

PSIFF's Awards Gala will take place on Saturday, January 5, and the festival will run from January 3 through January 14.

Source: http://news.yahoo.com/tom-hooper-mychael-danna-join-crowded-slate-palm-200731361.html

ticket city bowl 2011 nfl playoff schedule cowboys vs giants ndaa timberwolves weight watchers rawhide

Wednesday, December 19, 2012

Apple Keyboard Improvement - Business Insider

The extra half inch on our iPhone 5 is much appreciated.

When the iPhone 5 launched earlier this year, Apple gave users an extra row of icons and an overall better phone. But Reddit user Mds03 points out, the company missed a huge opportunity to improve the keyboard experience with the iPhone 5.

Reddit users have also pointed out that Apple's internal apps already have this feature but we guess it wasn't important enough to the iPhone king to bring to the mainstream.

Developers have the option to add this to their apps, but they just have to go out of their way to make it happen.

Don't Miss:?The Most Innovative Gadgets Of 2012 >

Source: http://www.businessinsider.com/apple-keyboard-improvement-2012-12

Russell Means Taylor Swift Red Walking Dead Season 3 Episode 2 celiac disease san francisco giants Medal of Honor Warfighter Richard Mourdock

Eric Chua : Life, Business and Real Estate in Singapore ? Imporant ...

Using Internet marketing, you can make your business more profitable. The biggest draw of marketing on the Internet is that your market share is worldwide. There are some tricks, however, to market your business more effectively. Read on for some ideas on getting the most out of your Online marketing efforts.

To convince people to purchase the products you are selling, consider sending them a content page filled with product information and maybe even a video. This will arm them with more information about what you want them to spend their money on. When you do this you show them the value of a product, and they don?t feel like you are just trying to sell them random stuff.

Try offering special discounts for buying the same product regularly. For example, if a customer purchases a ream of computer paper, offer him or her a twenty-five percent discount if he or she signs up to buy a ream every month.

TIP! Give customers a chance to pay wholesale or retail prices, which can be dependent on how much they buy of an item. Selling wholesale items at a small amount of profit is one way to boost the amount of items you sell.

Try and make all the information you send out through correspondence as personal as possible. Most people are sick and tired of the usual spam-like bulk emails. There isn?t anyone who enjoys getting hundreds of useless emails on a daily basis. When you personalize the emails you can differentiate yourself from the other guys and make an impact.

If you are interested in having more visitors to your site, it is vital that you rank higher and employ SEO tactics. Simply using the same information, descriptions and graphics will simply let your website fade and it will not stand out to potential customers. This will allow you to gain an advantage over your competitors.

Words such as ?simple? and ?easy? work very nicely in strategies for Web marketing. People generally dislike overly complicated things, so adding tags like ?easy to order? and ?easy to use? can entice them to use your product. This can be a powerful strategy to grow your sales.

TIP! The more you know about your competition, the more successful you will be. Familiarity with the products of your competitor and good marketing skills equal success for you and will leave your competitor watching gape-jawed as you successfully and profitably win the day.

Stay up-to-date with what the Internet is up to. The internet is forever morphing, it is very useful to keep up with new things and websites so you can put your niche in the public eye.

Start small when launching a new website to introduce your offerings. Search engines are built to pay more attention to sites that have 10,000-20,000 pages, rather than to sites that have a million or more pages.

To increase your ad clicks, place an image on your page that, when clicked, leads to a page that describes the item you are advertising or selling. Try creating an advertisement that blends seamlessly with the text of an article, so that it appears to be a continuation of the content. This stealthy method does not look like a traditional advertisement.

TIP! To get a better idea of what is most effective with your customers, test your emails. A/B testing is often used.

Email marketing services are available to help with Internet promotion, but it is best if you learn the proper methods yourself. It is simple to use auto responders, send bulk emails and build contact lists once your know what you?re doing. At the end of the day, the hands-on experience you?ll pick up is truly invaluable. What you learn today will help you indefinitely.

It is always best to handle customer complaints personally. Some business owners outsource this work to specialized companies, but you are best equipped to resolve these issues yourself. If a customer sends you an email about a problem he or she experienced with your product or service, send a personal response back to the customer that offers a method of resolving the issue.

Your website should be coded in a way that links are easily visible. This will keep your audience engaged and they won?t have to dig around for links.

TIP! To have proper internet marketing, you will want to be listed in Google. You need to know what terms people are searching for on Google that relate to your business.

Solicit referrals from your customers by offering incentives. Turning one sale into multiples is easy if you offer your customers something free for referring others to your business. People love free gifts, and this can increase sales!

Ensure your website has relevant information your customers desire. A minimalist one page website which only provides your business address and hours isn?t going to draw traffic and will be easily passed by. To increase the potential to your website add content that will help your prospective customers, such as articles, product reviews and other information pertaining to your product.

Don?t delete stuff that hasn?t yet worked. It may not have worked recently but could work now. Change is extremely rapid in the online world, and users are interacting with websites and each other in new ways all the time. Keep ideas that didn?t work and learn from them and keep them in mind in case they could be workable in the future.

TIP! Provide a money back guarantee as part and parcel of any Internet marketing strategy that you use. This provides your customers with a sense of security in addition to adding credibility for your company.

It is essential when owning a business that you spend your advertising dollars in the right ways. You don?t want to pay a lot for anything that isn?t helping your business. When you spend money, you want to get good deals and that?s why banner ads can be a good investment.

Now you know considerably more than you did about internet promotion strategies. Now you?re ready to start applying these tips to your business. You may well find that you need to modify how you operate. Just remember to keep learning and be daring enough to try new techniques.

Join me on Facebook:
www.facebook.com/maynaseric

Source: http://www.maynaseric.com/imporant-tips-for-beginner-and-expert-internet-marketers

kevin costner whitney houston whitney houston funeral live pat buchanan slither slither naacp glen campbell

Monday, December 17, 2012

Mental Health Care and Tedddy Bears: After Sandy Hook Operation ...

GRANITE BAY?

Sometimes the smallest things make the biggest difference. Dede Bannister knows it.

?Because it felt like there wasn?t anything else I could do,? she said while making her drop-off at Operation Fuzzy Wuzzy II.

Adam Johns knew it too. In 2004, when 186 school children were killed in a massacre in Belzan, Russia, Adam started the first Operation Fuzzy Wuzzy.

?He was impacted by that,? said his mom, Deborah Johns.

She and Adam?s brother are behind Operation Fuzzy Wuzzy?II. It?s an effort to send support, teddy bears and donations, to the families of Newtown, Connecticut.

They are doing it in Adam Johns? memory. He took his own life in March, 2011.

Deborah Johns still clutches the teddy bear someone gave her after Adam?s death. She says it helps, but she says the real help would be to begin a real conversation about mental health in America.

Johns is convinced that if we treated mental health care like we do physical health care, her son and 27 people in Newtown would still be alive today.

?We have to take it out of the darkness and into the light. And work with it,? Johns said.

If you?d like to donate to Operation Fuzzy Wuzzy II, you can drop off stuffed animals or money to and Beach Hut Deli location, or contact Johns directly at this email: customerservice@p7clothing.com

Source: http://fox40.com/2012/12/16/mental-health-care-and-tedddy-bears-operation-fuzzy-wuzzy-is-back/

London 2012 field hockey Missy Franklin Hunter Pence NBCOlympics Danell Leyva Ye Shiwen OJ Murdock

Obama consoles Connecticut town, vows effort to tame violence

NEWTOWN, Connecticut (Reuters) - President Barack Obama on Sunday consoled the Connecticut town shattered by the massacre of 20 young schoolchildren and said the United States was not doing enough to protect its children.

"We bear a responsibility for every child ... This is our first task, caring for our children. It's our first job. If we don't get that right, we don't get anything right," Obama told a packed auditorium at Newtown High School at the end of a somber multi-faith service.

"Surely we can do better than this."

The emotional prayer vigil capped a day when worshippers sought solace in churches to mourn the victims of Friday's slaughter at Sandy Hook Elementary School in Newtown, where a gunman used a military-style assault rifle to kill six adults and 20 first-graders before committing suicide.

A more detailed picture of Adam Lanza's stunning attack emerged on Sunday. Police said he was armed with hundreds of bullets in high-capacity magazines of about 30 rounds each for the Bushmaster AR 15 rifle and two handguns he carried into the school, and had a fourth weapon, a shotgun, in his car outside.

All the dead children were either 6 or 7 years old, feeding more emotion into a revived debate about whether stricter gun laws could prevent future mass shootings in the United States.

"Here in Newtown, I come to offer the love and prayers of the nation," Obama said. "I am very mindful that mere words cannot match the depths of your sorrow, nor can they heal your wounded hearts."

Obama, who on Friday wiped away tears as he addressed the nation following the killings, somberly spoke the first names of the 20 children. People in the audience wailed and cried out as they heard the names.

He read the full names of the six Sandy Hook school staff members who died on Friday, lauding their courage.

"They responded as we all hope we might respond in such terrifying circumstances. With courage and with love, giving their lives to protect the children in their care," he said.

Obama said he would convene a meeting of law enforcers, parents, educators and others in an effort to prevent future tragedies, but he did not call for tougher gun laws.

"Are we really prepared to say we are powerless in the face of this carnage?" he asked.

Parents and children filled the Newtown High School auditorium for the vigil. Some of the children clutched stuffed animals and Red Cross blankets issued to ward off the cold.

"I think it's a good thing. I think it'll help this town begin to heal," Curt Brantl, 47, said of Obama's visit before the president spoke.

"It's a sign of hope that the leader of our country comes here and shows support," said Brantl, whose daughter, Tess, 9, was at Sandy Hook during the shooting. "We're turning the corner, and there's a lot of hope now."

PICTURE OF THE CRIME

While townspeople grieved, investigators examined forensic evidence and scoured the crime scene in a process likely to extend for weeks. Many more witnesses needed to be interviewed, possibly including children who survived the attack, state police Lieutenant Paul Vance said.

Some of the bodies have been turned over to families, he said.

"We have the best of the best working on this case. ... Our goal is to paint a complete picture so that we all know and the public knows exactly what happened here," Vance said.

Painting part of that picture, Connecticut Governor Dannel Malloy said the gunman shot his way through a school door "using several rounds" before beginning to kill adults and children inside, then killed himself as police closed in.

"He discharged to make an opening and then went through it, went to the first classroom ... went to the second classroom. We surmise that it was during the second classroom episode that he heard responders coming and apparently at that, decided to take his own life," Malloy said on the ABC show "This Week."

"This sick fellow, you know, clearly mentally ill, killed his mother, proceeded to go on and kill a great number of people," Malloy added.

Vance said Lanza's mother, Nancy Lanza - found dead on Friday at her home - was shot several times.

Townspeople and visitors took solace in church on Sunday. Mass at St. Rose Catholic church was packed. The priest's announcements included news that the Christmas pageant rehearsal would go on as planned, but without 6-year-old Olivia Engel, killed on Friday before she could play the role of an angel.

MEMORIALS DRAW MOURNERS

Makeshift memorials appeared in this affluent town of 27,000 people about 80 miles from New York City. The largest, festooned with flowers and teddy bears, sat at the end of Dickenson Drive where Sandy Hook Elementary stands.

Residents and visitors streamed past a police roadblock to add to it. One woman knelt down and sobbed violently.

As children walked down the street in the rain, carrying their toys and signs, a man sat on the back of his parked car playing a mournful tune on a violin to accompany them.

"This is a time to come together," said Carina Bandhaver, 43, who lives in nearby Southbury.

The children who survived will not have to return to the scene of the massacre. They will attend classes at an unused school in a Connecticut town about 7 miles away, school officials said. Classes elsewhere in the town will resume on Tuesday, except at Sandy Hook.

GUN DEBATE

Several Democratic lawmakers called for a new push for U.S. gun restrictions on Sunday, including a ban on military-style assault weapons. Senator Dianne Feinstein of California, the author of an assault-weapons ban that lapsed in 2004, said she would introduce new legislation this week.

Gun rights advocates have countered that Connecticut already has among the strictest gun laws in the nation.

Police were trying to establish the relationship between Adam Lanza, Nancy Lanza and the school, and whether the mother and her sons were frequent visitors to gun ranges, according to a law enforcement official briefed on the investigation.

In addition to the military-style Bushmaster assault rifle, a civilian version of the weapon used by U.S. forces in Afghanistan, police said Lanza carried Glock 10 mm and Sig Sauer 9 mm handguns into the school.

Nancy Lanza legally owned a Sig Sauer and a Glock, handguns commonly used by police, in addition to the long gun, according to law enforcement officials.

Lanza had struggled at times to fit into the community and his mother pulled him out of school for several years to home-school him, said Louise Tambascio, the owner of My Place Restaurant, where his mother was a long-time patron.

(Additional reporting by Edith Honan, Martinne Geller, David Ingram and Chris Francescani; Writing by Daniel Trotta and Jim Loney; Editing by Will Dunham and Jackie Frank)

Source: http://news.yahoo.com/obama-consoles-connecticut-town-hit-school-massacre-020247454.html

beverly hills hotel beverly hills hotel the watchmen whitney houston dies dolly parton i will always love you beverly hilton hotel whitney houston found dead

Saturday, December 15, 2012

2 ????, ????? ????????????????? - ????????? ???????? ...

?????????? ???????, 18:30

????, ??? ???? ??????? ????, ?????????????????? ????????? ??????????? ??????????
??? ??????????? ????????? intel
?? ?????? ??????? ??????.
???????: ? ??????? ?????? ??????? ???, ?????? ????? ?????? ? ????????? ?????-?? ???????.
???????????, ??????? ?? ??????

????????? ?????????????? GuardWolf: ???????, 18:43

I love Trance, Drum & Bass
---------------------------
???. 1155 ?????
i5-2300, MSI H67MA-E35(B3), GlacialTech <Igloo 1050 Light PP (E)> ????? ?????? (??????? ????? 7321 PWM (E) - 1500 ????????, ???? ?? ?????????), 2*HYUNDAI/HYNIX DDR-III DIMM 2Gb <PC3-10600>, WD CB 320GB 7200rpm <WD3200AAJS>, FSP <ATX400N> 21.5" Benq G2220HD. W7 Ultimate x64
---------------------------
775 ?????. Linux
---------------------------
??????
GigaByte GA-MA880GM-UD2H, Athlon 2 x3 425, Cooler Master Hyper 212 Plus, 2*2Gb Samsung DDR2-800, IDE 80Gb, ?????-?? ????????? ??, Acer V193W 19", ?????? ?????? ? ???????????? ????????????? ?? (?? ?????? ???????? ?? ???????, ?????? ???????? ?? ??? ???????), ??????. XP Prof

Source: http://forums.ferra.ru/index.php?showtopic=53538

ny giants brandon marshall ryder cup Kate Middleton Bottomless the Pirate Bay Hotel Transylvania looper

Reasons to Download Food Recipes at Asia Food Recipe

Do you like cooking? Do you like doing experiment while cooking some existed food or drinks? Well, actually it is okay for you to do so, but it would be much better if you have a kind of guide of what you are going to do with the dish. It is recommended for you to find references of suitable food recipe you need to guide you cooking. In this case, you can find the cooking recipe you need in the internet for any kinds of food you want.


You will find a lot of food recipes an AsiaFoodRecipe.com. The site is recommended for some reasons you cannot deny. You will find any food recipes from all around the globe. It?s up to you to choose modern, traditional, original, or modified food and drink recipes. The best news you must want to get is that you can print any recipes you want so that you can simply bring the printed recipe to the kitchen while you are cooking. AsiaFoodRecipe.com also shares videos on Youtube.com that will help you to follow the steps of cooking so that you will be able to produce the food very well.


This time you may also think about the coming Christmas. You do not need to worry about what you will cook for this special and important moment for your family. You can go directly to the website and choose the menus for Christmas now. You can prepare yourself from now by shopping for the ingredients as well as the tools you need if you have not already had them. Finally, you can complete your preparation by practicing first at home. Finally, when the day comes, you will do very well by serving the best food ever for your beloved. Just follow the links now and amaze your family with the most delicious food on the table.?

Source: http://thecivilservant.blogspot.com/2012/12/reasons-to-download-food-recipes-at.html

albatross louis oosthuizen phil mickelson 10 year old gives birth c. difficile carmelo anthony nurse jackie

Friday, December 14, 2012

Engineers develop new energy-efficient computer memory using magnetic materials

Dec. 14, 2012 ? By using electric voltage instead of a flowing electric current, researchers from UCLA's Henry Samueli School of Engineering and Applied Science have made major improvements to an ultra-fast, high-capacity class of computer memory known as magnetoresistive random access memory, or MRAM.

The UCLA team's improved memory, which they call MeRAM for magnetoelectric random access memory, has great potential to be used in future memory chips for almost all electronic applications, including smart-phones, tablets, computers and microprocessors, as well as for data storage, like the solid-state disks used in computers and large data centers.

MeRAM's key advantage over existing technologies is that it combines extraordinary low energy with very high density, high-speed reading and writing times, and non-volatility -- the ability to retain data when no power is applied, similar to hard disk drives and flash memory sticks, but MeRAM is much faster.

Currently, magnetic memory is based on a technology called spin-transfer torque (STT), which uses the magnetic property of electrons -- referred to as spin -- in addition to their charge. STT utilizes an electric current to move electrons to write data into the memory.

Yet while STT is superior in many respects to competing memory technologies, its electric current-based write mechanism still requires a certain amount of power, which means that it generates heat when data is written into it. In addition, its memory capacity is limited by how close to each other bits of data can be physically placed, a process which itself is limited by the currents required to write information. The low bit capacity, in turn, translates into a relatively large cost per bit, limiting STT's range of applications.

With MeRAM, the UCLA team has replaced STT's electric current with voltage to write data into the memory. This eliminates the need to move large numbers of electrons through wires and instead uses voltage -- the difference in electrical potential -- to switch the magnetic bits and write information into the memory. This has resulted in computer memory that generates much less heat, making it 10 to 1,000 times more energy-efficient. And the memory can be more than five-times as dense, with more bits of information stored in the same physical area, which also brings down the cost per bit.

The research team was led by principal investigator Kang L. Wang, UCLA's Raytheon Professor of Electrical Engineering, and included lead author Juan G. Alzate, an electrical engineering graduate student, and Pedram Khalili, a research associate in electrical engineering and project manager for the UCLA-DARPA research programs in non-volatile logic.

"The ability to switch nanoscale magnets using voltages is an exciting and fast-growing area of research in magnetism," Khalili said. "This work presents new insights into questions such as how to control the switching direction using voltage pulses, how to ensure that devices will work without needing external magnetic fields, and how to integrate them into high-density memory arrays.

"Once developed into a product," he added, "MeRAM's advantage over competing technologies will not be limited to its lower power dissipation, but equally importantly, it may allow for extremely dense MRAM. This can open up new application areas where low cost and high capacity are the main constraints."

Said Alzate: "The recent announcement of the first commercial chips for STT-RAM also opens the door for MeRAM, since our devices share a very similar set of materials and fabrication processes, maintaining compatibility with the current logic circuit technology of STT-RAM while alleviating the constrains on power and density."

The research was presented Dec. 12 in a paper called "Voltage-Induced Switching of Nanoscale Magnetic Tunnel Junctions" at the 2012 IEEE International Electron Devices Meeting in San Francisco, the semiconductor industry's "pre-eminent forum for reporting technological breakthroughs in the areas of semiconductor and electronic device technology."

MeRAM uses nanoscale structures called voltage-controlled magnet-insulator junctions, which have several layers stacked on top of each other, including two composed of magnetic materials. However, while one layer's magnetic direction is fixed, the other can be manipulated via an electric field. The devices are specially designed to be sensitive to electric fields. When the electric field is applied, it results in voltage -- a difference in electric potential between the two magnetic layers. This voltage accumulates or depletes the electrons at the surface of these layers, writing bits of information into the memory.

"Ultra-low-power spintronic devices such as this one have potential implications beyond the memory industry," Wang said. They can enable new instant-on electronic systems, where memory is integrated with logic and computing, thereby completely eliminating standby power and greatly enhancing their functionality."

The work was supported by the Defense Advanced Research Projects Agency (DARPA) NV Logic Program. Other authors included researchers from the UCLA Department of Electrical Engineering; UC Irvine's Department of Physics and Astronomy; Hitachi Global Storage Technologies (a Western Digital Company); and Singulus Technologies, of Germany.

Share this story on Facebook, Twitter, and Google:

Other social bookmarking and sharing tools:


Story Source:

The above story is reprinted from materials provided by University of California - Los Angeles. The original article was written by Matthew Chin.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Note: If no author is given, the source is cited instead.

Disclaimer: Views expressed in this article do not necessarily reflect those of ScienceDaily or its staff.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/matter_energy/electricity/~3/d0bloDU7lis/121214191516.htm

Robin Givens Gus Malzahn hyperemesis gravidarum lindsay lohan Ronda Rousey BCS Bowls palestine

Age not factor in immunity to viruses, researchers find

Dec. 13, 2012 ? Our immune system does not shut down with age, says a new study led by McMaster University researchers.

A study published in PLOS Pathogens today shows a specialized class of immune cells, known as T cells, can respond to virus infections in an older person with the same vigour as T cells from a young person.

"For a long time, it was thought the elderly were at a higher risk of infections because they lacked these immune cells, but that simply isn't the case," said Jonathan Bramson, the study's principal investigator. "The elderly are certainly capable of developing immunity to viruses."

Researchers at McMaster, University of Toronto and the University of Pennsylvania examined individuals, younger than 40, between 41 to 59 years of age and older than 60, infected with three different viruses, including West Nile, and found the older group demonstrated perfectly normal immune responses.

Both the number of virus-fighting T cells and the functionality of the T cells were equivalent in all three groups.

"So as we age, our bodies are still able to respond to new viruses, while keeping us immune to viruses we've been exposed to in the past," Bramson said.

He added that these results have important implications for vaccination of elderly individuals.

Currently, vaccines for the elderly aren't designed to elicit responses from these immune cells, and this might explain the lack of effective protection from the flu vaccine, he said.

Vaccines specifically designed to generate T-cell immunity may be more effective at protecting older adults, Bramson said.

The research was funded by the Canadian Institutes for Health Research and the U.S. National Institutes of Health. PLOS Pathogens is an open-access, peer-reviewed journal of the Public Library of Science.

Share this story on Facebook, Twitter, and Google:

Other social bookmarking and sharing tools:


Story Source:

The above story is reprinted from materials provided by McMaster University, via Newswise.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Journal Reference:

  1. Alina Lelic, Chris P. Verschoor, Mario Ventresca, Robin Parsons, Carole Evelegh, Dawn Bowdish, Michael R. Betts, Mark B. Loeb, Jonathan L. Bramson. The Polyfunctionality of Human Memory CD8+ T Cells Elicited by Acute and Chronic Virus Infections Is Not Influenced by Age. PLoS Pathogens, 2012; 8 (12): e1003076 DOI: 10.1371/journal.ppat.1003076

Note: If no author is given, the source is cited instead.

Disclaimer: This article is not intended to provide medical advice, diagnosis or treatment. Views expressed here do not necessarily reflect those of ScienceDaily or its staff.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/top_news/~3/4SzUmgLsjT4/121213172306.htm

david crowder band natalie wood van halen annalynne mccord billy the kid neville neville

1Password 4 for iOS, re-crafted from pixel to bit to keep your data conveniently secure

1Password 4 for iOS, re-written from pixel to bit to keep your data safe and more accessible than ever

Turns out you can have security and convenience. Long time users have 1Password, the password manager for iOS and Mac, have long suspected that very thing. But the latest version, 1Password 4, proves it.

I've already written extensively about 1Password 4's vault view, so if you haven't already, go read that now. All done? Good, because there's more. There's a wonderful web view that you can access with a tap of the globe icon or, more viscerally, pull open from the side. In it you can browse to any website you like, use 1Password to enter login, identity, or credit information, and go about your business. And then you can slide right back to vault view.

Given the limitations imposed by iOS, which includes no browser plugins or in-app communications beyond URL schemes, it's about the best way to maintain strong, different passwords across the web without locking yourself out of your own stuff.

Overall, 1Password 4 is simpler. It's more elegant. It's better.

And it's available now.

(Yes, it's a new app. Yes, it's universal for iPhone and iPad. Yes, if you bought the old version, you still have to buy the new version. Yes, it's on sale for 50% off at launch so everyone gets upgrade pricing. Yes, that's the only option Apple allows. Yes, I bought it immediately because I want to support great developers so they continue to make great apps. Yes, if you like 1Password, you should absolutely buy it as well.)



Source: http://feedproxy.google.com/~r/TheIphoneBlog/~3/z5kvDh4k7OI/story01.htm

anchorman capybara duggars peter facinelli bobby rush supreme court justices 19 kids and counting

Thursday, December 13, 2012

Can the Health Care System Fix Our Health Crisis?

The Patient Protection and Affordable Care Act (PPACA) is a huge gesture towards fixing our spiraling health care dilemma. Health care costs are rising, increasing numbers of Americans do not have access to health care services, and the overall health of Americans is declining in epidemic proportions. As we look to employers to implement workplace wellness programs, can we depend on the health care system as we currently know it to offer the tools we need to turn this trend around?

The World Health Organization (WHO) published a study in 2009 indicating that the leading risks for mortality in the world are high blood pressure, tobacco use, high blood glucose, physical inactivity, and obesity. In addition to their role in global death rates, these five risk factors are also responsible for increasing the risk of chronic degenerative diseases such as heart disease, cancer, and diabetes. They affect health status in all income groups across the globe.

In 2012, the Centers for Disease Control (CDC) sites four common causes of chronic disease; physical inactivity, poor nutrition, tobacco use, and excessive alcohol consumption.

As we correlate this data with our concerns over economic growth, employee wellness, Return-on-Investment (ROI), and Cost-of-Illness (COI) metrics focus on pairing financial statistics and projections with those identified high-risk factors and behaviors noted above. The following figure projects statistics we expect to see for 2011 with a comparative note on the substantial difference between direct costs associated with treating chronic illness, and the soft costs herein noted as lost productivity. When we think of costs associated with employee illness, we often think of the cost of doctor visits, prescription drugs, or hospital care. However, lost productivity associated with employee poor health can actually cost a company more than the health insurance premiums it pays.

The soft costs of ill health include employee absenteeism, presenteeism (when an employee is at work, but not able to be productive) and turnover. What is important to note is that the soft costs associated with productivity consistently outweigh their associated direct costs.

Can the Health Care System Fix Our Health Crisis?
The bottom line is that illness is costing a lot of money. The problem with our current model is that we are not initiating real change through a difference in how we are analyzing the problems nor in our proposed solution vehicles.

By requiring all Americans citizens to carry health care insurance, we do in fact save money on the front end by getting illness in earlier stages and by promoting the proper utilization of health care services. But in the long term, are we really just providing another government buyout to a failing industry without initiating meaningful change to a failing business model?

The Wellness Council of America (WELCOA) argues that the health care system as it currently exists will bankrupt American business and their employees. How so? Let?s look at some statistics:

  • The cost of healthcare has increased to 274 times what it was in 1950 even though the average cost of all other goods and services increased only eight times. If we translated those numbers to our grocery bill, we would be paying $80.20 for a dozen eggs and $24.20 for a roll of toilet tissue.
  • The Department of Health and Human Services published a report, ?Health, United States 2004? citing that at least half of all Americans are on at least one prescription drug. For our elderly population, that jumps to three or more prescriptions.
  • As many as 129 million Americans under the age of 65 have medical problems that would have marked them for higher health care premiums or rejection by insurance companies (prior to PPACA)
  • Ninety-one percent of hospitals report overcrowding

By 2020, it is estimated that we will have shortages of:

  • 85,000 to 96,000 primary care physicians
  • One million nurses
  • 157,000 pharmacists

1,500,000,000,000 Insurance claims:

  • Include a 30% error rate
  • 15% of those claims are ?lost?

Some more shocking statistics:

  • Studies suggest that approximately 100,000 people die each year from the side effects associated with prescription drugs
  • Another 100,000 deaths annually are attributed to medical errors#
  • The annual premium in 2008 for an employer-sponsored health plan covering a family of four averaged $12,500
  • In 2008, premiums for employer-based health insurance rose by two times the rate of inflation for employers with 25 or more employees ? more for smaller employers
  • Health care coverage is a company?s largest expense outside of payroll

?But what?s becoming better understood is that our health care crisis is fundamentally a business problem.? ? John Hammergren, ?Skin in the Game?

Does this all mean that medical treatment has no place in our health plan? ABSOLUTELY NOT!

Combining medical treatment with self-care and behavior modifications to address the root cause of any degenerative illness is the only way to achieve sustainable change. A comprehensive wellness program that includes education, wellness coaching, and solid business plan for implementation will create a positive Return on Investment for large and small companies. Additionally, we have to look at all of the factors that play a role in degenerative illness ? such as stress, depression, culture, the food industry, and sleep deprivation.

This problem is more complex than push-ups and portion control, and the solution requires thinking outside of the box.

Corporate Wellness Programs
Corporate Wellness Programs FREE EvaluationResearching Corporate Wellness Programs?

The FitNuts are in the field RIGHT NOW helping companies develop and increase participation in their corporate wellness programs.

Using a comprehensive planning formula, we make sure that your employees have effective options for exercise, eating and mindset! If you would like to find out more, check out our 2 Hour Corporate Wellness Evaluation offer!

?

article references:

?An Unhealthy America: Economic Burden of Chronic Disease? Milken Institute
?100,000 Americans Die Each Year from Prescription Drugs, While Pharma Companies Get Rich?,Alternet, June 24, 2010

Source: http://fitnessnutritiondenverboulder.com/can-the-health-care-system-fix-our-health-crisis/

Paula Broadwell Tilted Kilt Barbara Palvin Yahoo Fantasy Football Nick Foles Auguste Rodin Breaking Amish

How to get started with Passbook on your iPhone

How to get started with Passbook on your iPhone

Passbook is a great way to store loyalty cards, flight information, coupons, gift cards, and members cards right on your iPhone. Many participating merchants will even scan your iPhone in order to take payment or redeem points. As long as you've got iOS 6 or higher on your iPhone, you've got Passbook.

Follow along and we'll get you set up and utilizing Passbook in no time.

How to add cards and other items to Passbook

There are many apps in the App Store that already support Passbook. They aren't always loyalty cards or gift cards either. Airlines such as American Airlines and United allow you to store boarding passes in Passbook while Klout allows you to view your score in one place without ever having to open the actual app.

The process for adding cards may differ from app to app depending on how the developer chose to implement Passbook. For this example, we're going to use Starbucks app.

  1. Launch the Passbook supported app of your choice, in this case, Starbucks.
  2. Somewhere within the app there should be settings for Passbook. In this case, I can tap on the Manage button underneath the myCard tab.
  3. Now tap the Manage button.
  4. Tap on Add Card to Passbook.
  5. The app should show you a preview of your card. In this instance, I tap Add in the top right corner.
  6. That's it, I can open the Passbook app in order to confirm that the card is there and ready for use.

How to access your items in Passbook

  1. Launch the Passbook app from the Home screen of your iPhone.
  2. Here you will see any card you've added to Passbook. Simply tap on the card you'd like to view or use.
  3. Once you are done using that card you can either tap the Home button to exit out of Passbook, tap it again to return it to your Passbook stack or swipe downwards. Any of these gestures will return you to the main Passbook screen.

How to refresh items in your Passbook

Every one in a while apps don't refresh as often as we'd like in Passbook so if you don't think your balance or point value is right, you can manually refresh that card on your own.

  1. Launch the Passbook app from the Home screen of your iPhone.
  2. Tap into the card you'd like to refresh.
  3. Tap the small info button in the bottom right hand corner of the card.
  4. The card will turn over to reveal some information. This may vary from card to card but across all cards you can see the last time it was updated at the very top.
  5. To refresh it manually just pull down and release on the screen in order to update the card yourself.
  6. Tap the Done button in the upper right hand corner to flip the card back over.
  7. The data on your card should now be updated.

How to delete items and cards from Passbook

Things that expire such as coupons are probably something you'll want to delete on a regular basis so they don't clutter up your Passbook app. It's very simple to delete a card from inside Passbook itself.

  1. Launch the Passbook app from the Home screen of your iPhone.
  2. Tap into the card you'd like to delete from the main screen.
  3. Tap the small info button in the bottom right hand corner of the card.
  4. Tap on the trash icon in the upper right hand corner.
  5. Confirm that you want to delete the card by tapping on Delete.
  6. Passbook will now run the card through a virtual shredder and delete it from Passbook.

Need help finding Passbook apps?

We all know Apple's list of Passbook apps on the App Store is nowhere near complete. Our forum members have found quite a few Passbook compatible apps that you may want to check out. Hit the link below for some new ideas and as always, leave anything interesting you find either in the forums or in the comments below!



Source: http://feedproxy.google.com/~r/TheIphoneBlog/~3/AtUggl5ksAk/story01.htm

American flag Happy 4th of July 4th Of July Desserts fireworks fireworks 4th of July Andy Griffith

How come in sports they have horse racing but not rodeo?

Barry
Posted 2 hours ago

I agree completely however there are a few things that will keep rodeo out. 1st is the issue of PETA and their groups. They are very quick to point out their uneducated and bias attempts to not only keep rodeo away from the category of sports but also to stop it permanently.

2nd. I think that because there really is no off season to rodeo they may not want to do the yearly and believe that ppl will lose interest.

But I do wisht that they would add it.

Source: http://answers.twimbe.com/sports/how-come-in-sports-they-have-horse-racing-but-not-rodeo.html

r kelly r. kelly macular degeneration whitney houston funeral judi dench bobby brown leaves funeral donnie mcclurkin

Wednesday, December 12, 2012

"Dallas" planning a funeral for J.R. Ewing

LOS ANGELES (TheWrap.com) - J.R. Ewing, the corrupt oil baron played by recently deceased actor Larry Hagman on "Dallas," will have a proper sendoff on the TNT drama.

The show is preparing a funeral for Ewing, which will air during the eighth episode of the upcoming second season, an individual with knowledge of the situation told TheWrap.

The episode is tentatively scheduled to air March 11.

Hagman, who played Ewing on both the original CBS series that ran from 1978 to 1991 and in the TNT revamp of the series that launched earlier this year, died November 23 at the age of 81, of complications from throat cancer.

No other details about the funeral episode, or of the nature of Ewing's demise. Perhaps a twist on the famous "Who Shot J.R.?" cliffhanger is in order?

Source: http://news.yahoo.com/dallas-planning-funeral-j-r-ewing-201933192.html

winning mega million numbers bruce weber boston globe google maps 8 bit mirror mirror robyn texas relays

Seafood Sleuthing Reveals Pervasive Fish Fraud In New York City

Farmed Atlantic salmon was sometimes labeled at "wild salmon," researchers found when the tested seafood sold in New York City.

iStockphoto.com

Farmed Atlantic salmon was sometimes labeled at "wild salmon," researchers found when the tested seafood sold in New York City.

iStockphoto.com

If you buy fish in New York City, particularly from a small market or restaurant, there's a pretty good chance it won't be the fish it claims to be.

An ocean conservation group announced today that three in five retail outlets it visited, including 100 percent of sushi restaurants, were selling mislabeled fish. The report is just the latest in a string of investigations revealing that seafood mislabeling is commonplace.

The researchers, from the group Oceana, collected 142 fish samples earlier this year from 81 retail outlets, including large grocery stores, corner bodegas, high-end restaurants, and sushi bars. They analyzed the samples using DNA barcoding, and found that 39 percent of the fish were labeled as other species.

Farm-raised Atlantic salmon had been substituted for wild-caught salmon, they found. Ocean perch, tilapia, and goldbanded jobfish were sold as red snapper. Fish labeled "white tuna" was escolar, which can cause acute gastrointestinal problems. And one serving of halibut was really tilefish, a species with so much mercury that the Food and Drug Administration has placed it on the do-not-eat list for pregnant women and young children.

The study didn't address who exactly is responsible for the mislabeling ? whether at the supplier or the retail level. "That's for the enforcers," notes Kimberly Warner, a senior scientist at Oceana.

Last year the Boston Globe reported that 48 percent of fish in Massachusetts were mislabeled, similar to findings in Los Angeles (55 percent) and Miami (31 percent). A follow-up from the Globe published earlier this month found that 76 percent of fish in a new survey were mislabeled.

And in 2008, two New York City high school students conducted their own DNA study of four restaurants and 10 grocery stores in Manhattan and found that a quarter of the fish they sampled were mislabeled.

Warner says that traceability ? a better system that would make it easier to track seafood from net to plate ? would help to eliminate the fraud. "We have a very complex and murky seafood chain with no traceability."

A bill introduced to Congress in July is intended to address seafood fraud. Fish suppliers, restaurants, and stores would have to provide more information to their customers about the seafood they sell. In addition, the bill would require more coordination between the FDA and the National Oceanic and Atmospheric Administration ? the two government agencies responsible for food and fisheries regulation.

But Gavin Gibbons, a spokesman for the National Fisheries Institute, says that the enforcement of current law is what's really needed. "If there were more enforcement on the ground as opposed to more regulations on the books, we think we'd be seeing less fraud," Gibbons says.

Figuring out the source of a fishy fraud, whether it's a retail outlet or a supplier, Gibbons says, "is really not that hard." With only a DNA test, a menu, and an invoice, an enforcer can see that if the "invoice matches the menu and not the DNA, then you know that the supplier was the source of the fraud."

In the absence of better enforcement, Gibbons suggests that consumers ask their local shop or restaurant if their fish supplier is a member of the Better Seafood Board, an industry group that works to eliminate fish fraud.

The source of mislabeling isn't always greed ? sometimes two species look too similar even for fishermen to tell them apart. But when some fish sellers are playing fair and others are getting away with substituting cheaper species for more expensive ones, "it harms a lot of people," Warner notes, "not just the consumer."

Source: http://www.npr.org/blogs/thesalt/2012/12/11/166981454/seafood-sleuthing-reveals-pervasive-fish-fraud-in-new-york-city?ft=1&f=1007

brett ratner stevie nicks anchorman capybara duggars peter facinelli bobby rush

Historic Caribbean Earthquake Was Felt in NYC

SAN FRANCISCO ? More than 150 years ago, a fault ringing the Caribbean shook half the Atlantic, including New York City, with a mega-earthquake. The quake rivaled those that have struck Indonesia in recent years, geologists reported last week at the annual meeting of the American Geophysical Union.

The Caribbean's beautiful tropical islands and coral reefs rise above a complex junction of four major tectonic plates. Many of the islands sit above a subduction zone, where two plates meet and one slides haltingly under the other, down into the Earth's mantle. The Dec. 26, 2004, Sumatra, Indonesia, earthquake, a subduction zone earthquake that generated deadly tsunamis, has galvanized scientific interest in potential quake hazards from the Caribbean's similar earthquake-producing faults.

The Feb. 8, 1843, Lesser Antilles earthquake was in many ways remarkably similar to the magnitude-8.7 earthquake that struck Sumatra just one year later, in 2005, researchers reported at the meeting. [The 10 Biggest Earthquakes in History]

Historical sleuthing by Francois Beauducel and Nathalie Feuillet of the Paris Institute of Earth Physics upwardly revised the temblor's estimate of magnitude to 8.5 (from a previous estimate of 7.8).

Maps from the French national marine service revealed that many palm-covered islets in the bay at Pointe-?-Pitre, the biggest city on the island of Guadeloupe, disappeared between 1820 and 1869, Feuillet told OurAmazingPlanet. The islets likely subsided, or dropped below sea level. The stress of the two plates stuck together makes the earth's crust flex and warp. After the earthquake, the deformed crust rebounds in some areas and drops down in others.

Portions of Antigua subsided up to 10 feet (3 meters), Feuillet said. Wharfs at the shore of Pointe-?-Pitre sunk one foot (33 centimeters), she found. Cliffs along the island collapsed, and historic accounts describe 5-foot-high (1.5 m) mud fountains.

Combining the 19th-century records of such effects with modern earthquake models helped Beauducel and Feuillet pin down both the quake's magnitude and the location of the fault rupture, the spot where the subduction zone tore apart.

"The only way to explain the subsidence of the islands is to have a rupture ? in the very deep part of the subduction zone, between 40 and 60 km (25 to 40 miles) depth," Feuillet said. Such as depth is comparable to that of the 2005 Sumatra quake, the researchers said.

The quake was felt up and down the East Coast, including in New York City, Washington, D.C., Raleigh, N.C., and Charleston, S.C., said Susan Hough of the U.S. Geological Survey. Hough also unearthed reports of shaking at three locations in South America, she said.

But, just as with the 2005 Sumatra quake, there was no giant wave on Feb. 8, 1843. Reports describe a 4-foot (1.2 m) wave in Antigua, but no significant tsunami arose, Feuillet said. Even so, several thousand people died in Pointe-?-Pitre from fires and damage caused by the severe shaking.

Reach Becky Oskin at boskin@techmedianetwork.com. Follow her on Twitter @beckyoskin. Follow OurAmazingPlanet on Twitter?@OAPlanet. We're also on?Facebook?and Google+.

Copyright 2012 OurAmazingPlanet, a TechMediaNetwork company. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Source: http://news.yahoo.com/historic-caribbean-earthquake-felt-nyc-170847980.html

vangogh yield crossbow airhead atherosclerosis steven tyler tropic thunder