Thursday, January 24, 2013

Don?t ignore the snore: Snoring may be early sign of future health risks

Jan. 24, 2013 ? Here's a wake-up call for snorers: Snoring may put you at a greater risk than those who are overweight, smoke or have high cholesterol to have thickening or abnormalities in the carotid artery, according to researchers at Henry Ford Hospital in Detroit.

The increased thickening in the lining of the two large blood vessels that supply the brain with oxygenated blood is a precursor to atherosclerosis, a hardening of the arteries responsible for many vascular diseases.

"Snoring is more than a bedtime annoyance and it shouldn't be ignored. Patients need to seek treatment in the same way they would if they had sleep apnea, high blood pressure or other risk factors for cardiovascular disease," says lead study author Robert Deeb, M.D., with the Department of Otolaryngology-Head & Neck Surgery at Henry Ford.

"Our study adds to the growing body of evidence suggesting that isolated snoring may not be as benign as first suspected. So instead of kicking your snoring bed partner out of the room or spending sleepless nights elbowing him or her, seek out medical treatment for the snorer."

The study reveals changes in the carotid artery with snorers -- even for those without sleep apnea -- likely due to the trauma and subsequent inflammation caused by the vibrations of snoring.

Study results will be presented January 25 at the 2013 Combined Sections Meeting of the Triological Society in Scottsdale, Ariz. It has been submitted to The Laryngoscope journal for publication.

Obstructive sleep apnea (OSA) -- a sleep disorder that occurs due to the collapse of the airway in the throat during sleep and causes loud snoring and periodic pauses in breathing -- has long been linked to cardiovascular disease, along with a host of other serious health issues.

But the risk for cardiovascular disease may actually begin with snoring, long before it becomes OSA. Until now, there was little evidence in humans to show a similar connection between snoring and cardiovascular risk.

For the Henry Ford study, Dr. Deeb and senior study author Kathleen Yaremchuk, M.D., reviewed data for 913 patients who had been evaluated by the institution's sleep center.

Patients, ages 18-50, who had participated in a diagnostic sleep study between December 2006 and January 2012 were included in the study. None of the participants had sleep apnea.

In all, 54 patients completed the snore outcomes survey regarding their snoring habits, as well as underwent a carotid artery duplex ultrasound to measure the intima-media thickness of the carotid arteries.

Carotid intima-media thickness, a measurement of the thickness of the innermost two layers of the arterial wall, may be used to detect the presence and to track the progression of atherosclerotic disease. Intima-media thickness is the first sign of carotid artery disease.

Compared to non-snorers, snorers were found to have a significantly greater intima-media thickness of the carotid arteries, the study finds.

The study also revealed no statistically significant differences in intima-media thickness for patients with or without some of the traditional risk factors for cardiovascular disease -- smoking, diabetes, hypertension or hypercholesterolemia.

"Snoring is generally regarded as a cosmetic issue by health insurance, requiring significant out-of-pocket expenses by patients. We're hoping to change that thinking so patients can get the early treatment they need, before more serious health issues arise."

The Henry Ford research team plans to conduct another long-term study on this topic, particularly to determine if there's an increased incidence of cardiovascular events in patients who snore.

Along with Drs. Deeb and Yaremchuk, Henry Ford study co-authors are Paul Judge, M.D.; Ed Peterson, Ph.D.; and Judith C. Lin, M.D.

Share this story on Facebook, Twitter, and Google:

Other social bookmarking and sharing tools:


Story Source:

The above story is reprinted from materials provided by Henry Ford Health System.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Note: If no author is given, the source is cited instead.

Disclaimer: This article is not intended to provide medical advice, diagnosis or treatment. Views expressed here do not necessarily reflect those of ScienceDaily or its staff.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/top_news/top_health/~3/yw8Pk1xU1ng/130124122741.htm

2001 a space odyssey barefoot bandit polar bear plunge lovelace antioch the grey review demi moore 911 call

Lease & Finance Group Lists Acquisition Trends | Construction ...

The Equipment Leasing and Finance Association, which represents the $725 billion equipment finance sector, has issued its "Top 10 Equipment Acquisition Trends for 2013."

1.?????? Corporate perceptions of the economic outlook will be a primary driver of business investment decisions.?Despite pressing considerations such as technological innovations and aging equipment, the economy will be the true barometer for whether or not businesses acquire new equipment in 2013.

?

2.?????? Equipment investment will pick up in the second half of 2013. Equipment investment will grow this year, although the rate of growth will be hampered by fiscal uncertainty. Some companies will remain cautious about taking on large capital investments even now that important decisions impacting short-term fiscal stability have been made. Equipment acquisition activity will gain momentum through relief from the policy uncertainty that brought the economy to the edge of the fiscal cliff.?An improving housing sector will provide an added boost.

?

3.?????? Pent-up demand will spur investment across varied equipment types. Demand for replacement equipment will drive investment in the construction, agriculture and transportation categories in particular, while other equipment types will await the replacement cycle.?However, greater economic improvements will be needed before significant equipment investment expansion takes place.

?

4.?????? A continuing low interest rate environment will enable companies to acquire the equipment they need and conserve cash.?The prospect of continued low interest rates at least through 2014 will be an incentive for businesses to acquire equipment through financing and still hold on to their cash for uncertainties. In addition to maintaining cash flow, equipment financing will help businesses preserve capital and improve expense planning in challenging economic conditions.

?

5.?????? A majority of U.S. businesses will use some form of financing for equipment acquisition.?In 2013, $742 billion (55 percent) of the projected $1.3 trillion investment in plant, equipment and software investment in the United States will be financed through loans, leases and lines of credit.?Seven out of 10 businesses will use at least one form of financing to acquire equipment.

?

6.?????? Business size will impact equipment acquisition.?Size will matter when acquiring equipment in 2013.?Primarily larger businesses anticipate increasing equipment spending over the next 12 months. Small companies? high degree of concern about general economic conditions and less access to credit will temper their equipment acquisition plans.?

?

7.?????? The gaining prominence of cloud computing will transform the way businesses pay for IT investments. Along with changes in how companies consume software and hardware, cloud computing will spawn new financing options.?Companies will look to equipment financiers for variable payment structures in the cloud. ?

?

8.?????? Credit market conditions will remain favorable for long-term equipment financing. Businesses will generally find an improving credit supply as they consider equipment acquisitions.

?

9.?????? The one-year extension of bonus depreciation may provide incentives for businesses to acquire equipment. The continuation of the depreciation bonus will allow businesses to deduct up to 50 percent of the cost of new equipment purchases in 2013.

?

10.?? Although the value of lease financing will remain, businesses will begin to adapt their equipment acquisition strategies to comply with long-awaited changes to lease accounting standards.?A new draft of proposed changes to lease accounting standards by the Financial Accounting Standards Board and the International Accounting Standards Board should be announced this year, enabling businesses to begin to evaluate how their balance sheets, earnings and other financials will be affected by equipment financing agreements.

?

Source: ELFA

Source: http://www.constructionequipment.com/lease-finance-group-lists-acquisition-trends

foo fighters nikki minaj grammys album of the year grammy red carpet grammy award winners the band perry

Setting the dark on fire

Setting the dark on fire [ Back to EurekAlert! ] Public release date: 23-Jan-2013
[ | E-mail | Share Share ]

Contact: Douglas Pierce-Price
dpiercep@eso.org
49-893-200-6759
ESO

In space, dense clouds of cosmic gas and dust are the birthplaces of new stars. In visible light, this dust is dark and obscuring, hiding the stars behind it. So much so that, when astronomer William Herschel observed one such cloud in the constellation of Scorpius in 1774, he thought it was a region empty of stars and is said to have exclaimed, "Truly there is a hole in the sky here!" [1]

In order to better understand star formation, astronomers need telescopes that can observe at longer wavelengths, such as the submillimetre range, in which the dark dust grains shine rather than absorb light. APEX, on the Chajnantor Plateau in the Chilean Andes, is the largest single-dish submillimetre-wavelength telescope operating in the southern hemisphere, and is ideal for astronomers studying the birth of stars in this way.

Located in the constellation of Orion (The Hunter), 1500 light-years away from Earth, the Orion Molecular Cloud Complex is the closest region of massive star formation to Earth, and contains a treasury of bright nebulae, dark clouds and young stars. The new image shows just part of this vast complex in visible light, with the APEX observations overlaid in brilliant orange tones that seem to set the dark clouds on fire. Often, the glowing knots from APEX correspond to darker patches in visible light -- the tell-tale sign of a dense cloud of dust that absorbs visible light, but glows at submillimetre wavelengths, and possibly a site of star formation.

The bright patch below of the centre of the image is the nebula NGC 1999. This region -- when seen in visible light -- is what astronomers call a reflection nebula, where the pale blue glow of background starlight is reflected from clouds of dust. The nebula is mainly illuminated by the energetic radiation from the young star V380 Orionis [2] lurking at its heart. In the centre of the nebula is a dark patch, which can be seen even more clearly in a well-known image (http://www.spacetelescope.org/images/opo0010a/) from the NASA/ESA Hubble Space Telescope.

Normally, a dark patch such as this would indicate a dense cloud of cosmic dust, obscuring the stars and nebula behind it. However, in this image we can see that the patch remains strikingly dark, even when the APEX observations are included. Thanks to these APEX observations, combined with infrared observations from other telescopes, astronomers believe that the patch is in fact a hole or cavity in the nebula, excavated by material flowing out of the star V380 Orionis. For once, it truly is a hole in the sky!

The region in this image is located about two degrees south of the large and well-known Orion Nebula (Messier 42), which can be seen at the top edge of the wider view in visible light from the Digitized Sky Survey.

###

The APEX observations used in this image were led by Thomas Stanke (ESO), Tom Megeath (University of Toledo, USA), and Amy Stutz (Max Planck Institute for Astronomy, Heidelberg, Germany). APEX is a collaboration between the Max Planck Institute for Radio Astronomy (MPIfR), the Onsala Space Observatory (OSO) and ESO. Operation of APEX at Chajnantor is entrusted to ESO.

Notes

[1] In German, "Hier ist wahrhaftig ein Loch im Himmel!"

[2] V380 Orionis has a high surface temperature of about 10 000 Kelvin (about the same in degrees Celsius), nearly twice that of our own Sun. Its mass is estimated to be 3.5 times that of the Sun.

More information

The year 2012 marks the 50th anniversary of the founding of the European Southern Observatory (ESO). ESO is the foremost intergovernmental astronomy organisation in Europe and the world's most productive ground-based astronomical observatory by far. It is supported by 15 countries: Austria, Belgium, Brazil, the Czech Republic, Denmark, France, Finland, Germany, Italy, the Netherlands, Portugal, Spain, Sweden, Switzerland and the United Kingdom. ESO carries out an ambitious programme focused on the design, construction and operation of powerful ground-based observing facilities enabling astronomers to make important scientific discoveries. ESO also plays a leading role in promoting and organising cooperation in astronomical research. ESO operates three unique world-class observing sites in Chile: La Silla, Paranal and Chajnantor. At Paranal, ESO operates the Very Large Telescope, the world's most advanced visible-light astronomical observatory and two survey telescopes. VISTA works in the infrared and is the world's largest survey telescope and the VLT Survey Telescope is the largest telescope designed to exclusively survey the skies in visible light. ESO is the European partner of a revolutionary astronomical telescope ALMA, the largest astronomical project in existence. ESO is currently planning the 39-metre European Extremely Large optical/near-infrared Telescope, the E-ELT, which will become "the world's biggest eye on the sky".

Links

* The research into the dark patch in NGC 1999 discussed above is described in a paper by T. Stanke et al., A&A 518, L94 (2010) (http://dx.doi.org/10.1051/0004-6361/201014612), also available as a preprint (http://arxiv.org/abs/1005.2202).

Contacts

Thomas Stanke
ESO
Garching, Germany
Tel: +49 89 3200 6116
Email: tstanke@eso.org

Douglas Pierce-Price
ESO ALMA/APEX Public Information Officer
Garching, Germany
Tel: +49 89 3200 6759
Email: dpiercep@eso.org



[ Back to EurekAlert! ] [ | E-mail | Share Share ]

?


AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.


Setting the dark on fire [ Back to EurekAlert! ] Public release date: 23-Jan-2013
[ | E-mail | Share Share ]

Contact: Douglas Pierce-Price
dpiercep@eso.org
49-893-200-6759
ESO

In space, dense clouds of cosmic gas and dust are the birthplaces of new stars. In visible light, this dust is dark and obscuring, hiding the stars behind it. So much so that, when astronomer William Herschel observed one such cloud in the constellation of Scorpius in 1774, he thought it was a region empty of stars and is said to have exclaimed, "Truly there is a hole in the sky here!" [1]

In order to better understand star formation, astronomers need telescopes that can observe at longer wavelengths, such as the submillimetre range, in which the dark dust grains shine rather than absorb light. APEX, on the Chajnantor Plateau in the Chilean Andes, is the largest single-dish submillimetre-wavelength telescope operating in the southern hemisphere, and is ideal for astronomers studying the birth of stars in this way.

Located in the constellation of Orion (The Hunter), 1500 light-years away from Earth, the Orion Molecular Cloud Complex is the closest region of massive star formation to Earth, and contains a treasury of bright nebulae, dark clouds and young stars. The new image shows just part of this vast complex in visible light, with the APEX observations overlaid in brilliant orange tones that seem to set the dark clouds on fire. Often, the glowing knots from APEX correspond to darker patches in visible light -- the tell-tale sign of a dense cloud of dust that absorbs visible light, but glows at submillimetre wavelengths, and possibly a site of star formation.

The bright patch below of the centre of the image is the nebula NGC 1999. This region -- when seen in visible light -- is what astronomers call a reflection nebula, where the pale blue glow of background starlight is reflected from clouds of dust. The nebula is mainly illuminated by the energetic radiation from the young star V380 Orionis [2] lurking at its heart. In the centre of the nebula is a dark patch, which can be seen even more clearly in a well-known image (http://www.spacetelescope.org/images/opo0010a/) from the NASA/ESA Hubble Space Telescope.

Normally, a dark patch such as this would indicate a dense cloud of cosmic dust, obscuring the stars and nebula behind it. However, in this image we can see that the patch remains strikingly dark, even when the APEX observations are included. Thanks to these APEX observations, combined with infrared observations from other telescopes, astronomers believe that the patch is in fact a hole or cavity in the nebula, excavated by material flowing out of the star V380 Orionis. For once, it truly is a hole in the sky!

The region in this image is located about two degrees south of the large and well-known Orion Nebula (Messier 42), which can be seen at the top edge of the wider view in visible light from the Digitized Sky Survey.

###

The APEX observations used in this image were led by Thomas Stanke (ESO), Tom Megeath (University of Toledo, USA), and Amy Stutz (Max Planck Institute for Astronomy, Heidelberg, Germany). APEX is a collaboration between the Max Planck Institute for Radio Astronomy (MPIfR), the Onsala Space Observatory (OSO) and ESO. Operation of APEX at Chajnantor is entrusted to ESO.

Notes

[1] In German, "Hier ist wahrhaftig ein Loch im Himmel!"

[2] V380 Orionis has a high surface temperature of about 10 000 Kelvin (about the same in degrees Celsius), nearly twice that of our own Sun. Its mass is estimated to be 3.5 times that of the Sun.

More information

The year 2012 marks the 50th anniversary of the founding of the European Southern Observatory (ESO). ESO is the foremost intergovernmental astronomy organisation in Europe and the world's most productive ground-based astronomical observatory by far. It is supported by 15 countries: Austria, Belgium, Brazil, the Czech Republic, Denmark, France, Finland, Germany, Italy, the Netherlands, Portugal, Spain, Sweden, Switzerland and the United Kingdom. ESO carries out an ambitious programme focused on the design, construction and operation of powerful ground-based observing facilities enabling astronomers to make important scientific discoveries. ESO also plays a leading role in promoting and organising cooperation in astronomical research. ESO operates three unique world-class observing sites in Chile: La Silla, Paranal and Chajnantor. At Paranal, ESO operates the Very Large Telescope, the world's most advanced visible-light astronomical observatory and two survey telescopes. VISTA works in the infrared and is the world's largest survey telescope and the VLT Survey Telescope is the largest telescope designed to exclusively survey the skies in visible light. ESO is the European partner of a revolutionary astronomical telescope ALMA, the largest astronomical project in existence. ESO is currently planning the 39-metre European Extremely Large optical/near-infrared Telescope, the E-ELT, which will become "the world's biggest eye on the sky".

Links

* The research into the dark patch in NGC 1999 discussed above is described in a paper by T. Stanke et al., A&A 518, L94 (2010) (http://dx.doi.org/10.1051/0004-6361/201014612), also available as a preprint (http://arxiv.org/abs/1005.2202).

Contacts

Thomas Stanke
ESO
Garching, Germany
Tel: +49 89 3200 6116
Email: tstanke@eso.org

Douglas Pierce-Price
ESO ALMA/APEX Public Information Officer
Garching, Germany
Tel: +49 89 3200 6759
Email: dpiercep@eso.org



[ Back to EurekAlert! ] [ | E-mail | Share Share ]

?


AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.


Source: http://www.eurekalert.org/pub_releases/2013-01/e-std012113.php

WRAL John Harbaugh jill biden jill biden martin luther king jr Lumineers Ray Lewis Murder

Wednesday, January 23, 2013

Sting's daughter to make her off-Broadway debut

NEW YORK (AP) ? Sting's daughter Mickey Sumner has signed up to make her off-Broadway debut in Craig Lucas's new comedy "The Lying Lesson."

The Atlantic Theater Company said Tuesday that Sumner, whose credits also include the new Noah Baumbach film "Frances Ha," will star opposite Carol Kane in the comic thriller.

Kane plays a woman who may or may not be legendary screen star Bette Davis and Sumner will portray a woman who tries to discover her true identity.

Previews begin Feb. 20 with an opening set for March 13. Tony Award-nominated director Pam MacKinnon will replace Anna D. Shapiro as the play's director.

Sumner, whose mother is Trudie Styler, made her New York stage debut in a Culture Project workshop of "The Seagull" and is featured in the Showtime series "The Borgias."

Source: http://news.yahoo.com/stings-daughter-her-off-broadway-debut-200214118.html

millennial media nit championship transcendentalism bells palsy channel 5 news uc berkeley harrison barnes

Google Appears To Arrest The Decline in Cost-Per-Click; Page Is Hopeful That Mobile CPCs Will Rise

Screen Shot 2013-01-22 at 3.57.36 PMOne of the reasons that Google’s shares might have popped about 5 percent in after-hours trading is evidence that the company is stabilizing declines in cost-per-click. The closely watched metric is a measurement of how much advertisers are paying on average when consumers actually click through on paid search keywords or on other ads. It declined dramatically throughout 2012, raising concerns that the shift toward searches on smartphones was cannibalizing pricier ads on the non-mobile web. Cost-per-click was up 2 percent quarter-over-quarter, but down 6 percent year-over-year, according to today’s earnings. If you exclude the impact of foreign exchange fluctuations, they were up 1 percent quarter-over-quarter, but down 4 percent year-over-year, according to the earnings call. While the annualized declines don’t look great, they’re far lower than year-over-year declines from the second and third quarter of last year, which were 16 percent and 15 percent respectively. While Google CEO Larry Page and Senior Vice President Nikesh Arora didn’t really explain what helped slow declines in the last quarter, both were optimistic about prices for mobile ads. “We’re in uncharted territory in these things because of the rapid rate of change,” Page said on the earnings call. “The CPCs will improve as these devices improve.” He later elaborated as analysts asked two or three variations on this question (most of which he frankly evaded). “I don’t think this is a long-term problem,” he said. “As I’ve said before, there are a lot of advantages to mobile. You know the location of the user.” Facebook CEO Mark Zuckerberg has said he’s similarly hopeful about mobile ads. The company has been aggressively pushing app install ads and sponsored stories in the mobile news feed throughout the winter. But we won’t know how well these have done until the company reports earnings next week on Jan. 30. At our conference TechCrunch Disrupt back in September, he said on-stage, “I?m really optimistic. It?s more like TV than the Web. The ads we run on mobile perform better than the right-hand ads do on the site.”

Source: http://feedproxy.google.com/~r/Techcrunch/~3/DDrvz84CGKA/

samuel adams snowy owl one for the money 10 minute trainer sarah burke death etta james funeral erin brockovich

Tuesday, January 22, 2013

Google's 4Q earnings rise despite Motorola woes

(AP) ? Google eked out slightly higher earnings in the fourth quarter, despite a financial drag caused by the Internet search leader's expansion into device manufacturing and a decline in digital ad prices as more people gaze into the smaller screens of smartphones.

The results announced Tuesday pleased investors, helping to lift Google's stock by 5 percent in extended trading.

More advertising poured into Google during the holiday shopping season, fueling a moneymaking machine that has steadily churned out higher profits since the company went public in 2004. Google's fourth-quarter ad revenue totaled $12.1 billion, a 19 percent increase from the previous year.

Some of that money, though, has been shifting away from personal computers as advertisers try to connect with an expanding audience that relies on smartphones and tablet computers to reach Google's search engine, email and other online services. By some estimates, about one-fourth of the clicks on Google's search ads are now coming from mobile devices.

So far, advertisers have been unwilling to pay as much money to market their wares on mobile devices, largely because the smaller screens leave less room for commercial links and other marketing messages. The trend is one of the reasons that the average price for the ads that Google shows next to its search results has fallen from the previous year in five consecutive quarters, including the final three months of last year.

In a positive sign, though, Google's average ad prices in the most recent quarter dropped by just 6 percent from the same period in 2011. That's the smallest decline during the pricing downturn, raising hopes that Google may be starting to solve the pricing problems posed by the growing usage of mobile devices.

In a conference call Tuesday, Google CEO Larry Page predicted ad prices will gradually rise as the devices become even more sophisticated to unleash new ways to reach potential customers at the times they are most likely to buy something.

"In today's multi-screen world, the opportunities are endless," Page said.

Google earned nearly $2.9 billion, or $8.62 per share, during the fourth quarter. That compared to net income of $2.7 billion, or $8.22 per share, at the same time last year.

If not for the costs of employee stock compensation and certain other accounting items, Google said it would have earned $10.65 per share. On that basis, Google exceeded the average earnings estimate of $10.54 among analysts surveyed by FactSet.

It proved to be a difficult quarter to decipher because of an accounting quirk and the additions of new business lines that muddied the comparisons with the previous year.

For instance, Google Inc. didn't own Motorola Mobility in 2011, having completed its $12.4 billion acquisition of the troubled handset maker eight months ago. What's more, the Google is bringing in more revenue from tablet computers, which it began selling under the Nexus brand during the final half of last year.

Things were further complicated by Google's recent agreement to sell a part of the Motorola Mobility division that makes cable TV boxes. That division is now accounted for as a discontinued operation whose revenue wasn't booked in the latest quarter, even though it will remain a part of Google until the $2.35 billion sale is completed later this year.

Under that equation, revenue surged 36 percent from the previous year to $14.4 billion.

After subtracting advertising expenses, Google's revenue totaled $11.3 billion. That figure was well below the average analyst estimate of $12.1 billion, according to FactSet.

But many of the analyst forecasts included revenue from Motorola Mobility's set-top division, which Google excluded from its breakdown. Had the set-top division been included in Google's accounting, the company's net revenue would have matched analyst estimates.

The performance boosted Google's stock by $35.33 to $738.20 in Tuesday's extended trading.

Google would be doing even better if not for problems at Motorola Mobility, a cellphone pioneer that has been struggling since Apple revolutionized the industry with the release of the iPhone in 2007.

Motorola Mobility suffered an operating loss of $353 million on revenue of $1.5 billion in the fourth quarter

Google has been able to offset the slump in its search advertising prices by selling more video advertising on its YouTube subsidiary and other more graphical forms of marketing. The number of clicks on Google ads has still been rising, too. That's important because the company typically gets paid by the click. In the fourth quarter, Google's total ad clicks rose 24 percent from the previous year.

To gain a foothold in the mobile market, Google bakes its services into its Android software, an operating system that it gives away to makers of smartphones and tablets.

Android is now powers more than 500 million mobile devices worldwide, giving it a wide lead over Apple's software for iPhones and iPads. Through September, Apple had shipped about 370 million iPhones and iPads. Apple Inc., which has morphed from a Google ally to bigger rival in the past five years, is scheduled to release its fourth-quarter results after the stock market closes Wednesday.

Google, which is based in Mountain View, Calif., didn't update how many more Android devices were activated in the fourth quarter..

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/f70471f764144b2fab526d39972d37b3/Article_2013-01-22-Earns-Google/id-9aae66bac4314612aa36b51785552543

Colorado Shooting News joe paterno British Open MC Chris Colorado shooting suspect accuweather Finding Nemo 2

98% Brooklyn Castle

All Critics (45) | Top Critics (20) | Fresh (44) | Rotten (1)

"Brooklyn Castle" easily checkmates your inner cynic.

Katie Dellamaggiore's lively and affecting documentary introduces us to a cast of characters that's very winning (in both senses of the word).

It's not To Sir, With Love: It's fierce ambition, the channeling of emotion, and hours of drilling.

Enlightening, inspiring and expertly crafted.

An irresistibly uplifting doc.

Castle is suspenseful, funny and, particularly in its depiction of the challenging home lives of some of the kids, moving.

... a powerful and positive story about dedicated teachers helping kids succeed no matter what their circumstances

Like chess, not exactly a high-energy experience but seeing what these kids accomplish, seemingly against all odds is breathtaking all the same.

...provides a corrective to the popular image of American schools as obsessed with sports and popularity, and it makes the strongest possible case for funding after-school activities.

Chess, brilliant young students and great teachers potent mix.

The I.S. 318 team? A delightfully motley, vulnerable, multicultural bunch, whose addiction to chess has allowed them higher aspirations for top high schools and, eventually, college and careers. You will root for them like crazy.

We meet five of the team's members and several of their teachers; by its end, you'll be rooting for them all.

"BROOKLYN CASTLE is a compelling, engaging and inspiring Documentary, featuring Junior High kids that you can relate to. Even if you don't know the game of Chess all too well, it won't stop you from enjoying this pleasant film."

Brooklyn Castle provides a snapshot of indomitable American can-do attitude, and gives one hope.

The admirable Brooklyn Castle transcends its formula to become an optimistic look at extracurricular education and young people.

Great story, well-made, what's not to like?

It's clear that chess isn't just a game; for these students, it can also open doors.

No quotes approved yet for Brooklyn Castle. Logged in users can submit quotes.

Source: http://www.rottentomatoes.com/m/brooklyn_castle_2012/

mpaa south carolina debate lauren scruggs william shatner seattle weather skier sarah burke gingrich wife

Logitech Gaming Software Beta-Testing Program Confirms Future Support For Mac OS X

Screen Shot 2013-01-21 at 8.31.39 PMAccording to a beta tester listing on OnlineBeta.com, Logitech is finally preparing to support OS X gamers, with plans to release a new Gaming Software for Mac OS X that lets users configure their Logitech gaming mice and keyboards to optimize performance and play. It's unclear what this type of software will do specifically, as it hasn't been announced yet, but the most obvious conclusion is that the OS X software will configure the lights and controls of various gaming mice and keyboards sold by Logitech.

Source: http://feedproxy.google.com/~r/Techcrunch/~3/BO_Ga427h_k/

kirkwood chris brown and rihanna nightline brady quinn brady quinn bloom box fat tuesday

Monday, January 21, 2013

Algeria attack poses fresh security issues

Algerian firemen carry a coffin containing a person killed during the gas facility hostage situation at the morgue in Ain Amenas, Algeria, Monday, Jan. 21, 2013. At least 81 people have been reported dead, including 32 Islamist militants, after a bloody, four-day hostage situation at Algeria's remote Ain Amenas natural gas plant. (AP Photo/Anis Belghoul)

Algerian firemen carry a coffin containing a person killed during the gas facility hostage situation at the morgue in Ain Amenas, Algeria, Monday, Jan. 21, 2013. At least 81 people have been reported dead, including 32 Islamist militants, after a bloody, four-day hostage situation at Algeria's remote Ain Amenas natural gas plant. (AP Photo/Anis Belghoul)

A truck loaded with empty coffins waits at the main entrance of the hospital where the bodies of persons killed during the hostage situation in a gas plant are gathered in Ain Amenas, Monday, Jan. 21, 2013. At least 81 people have been reported dead, including 32 Islamist militants, after a bloody, four-day hostage situation at Algeria's remote Ain Amenas natural gas plant. (AP Photo/Anis Belghoul)

Algerian firemen unload a refrigerated truck with bodies killed during the hostages taking in a gas plant while police officers look on at the morgue in Ain Amenas, Monday, Jan. 21, 2013. At least 81 people have been reported dead, including 32 Islamist militants, after a bloody, four-day hostage situation at Algeria's remote Ain Amenas natural gas plant. (AP Photo/Anis Belghoul)

(AP) ? The deadly attack on an Algerian natural gas complex will do little to discourage the drive for lucrative energy exploration in northern Africa, experts say, but it is forcing companies to increase security after largely ignoring the risks of operating in the remote desert region.

Spanish, Norwegian and British oil companies quickly evacuated workers from Algerian energy facilities in the wake of the well-coordinated hostage taking by Islamic militants, which ended in bloody chaos in an Algerian raid. Energy companies are loath to discuss the issue, but experts say the financial bounty is too high to scare away firms like gas giant BP and Norway's Statoil for long.

"The risks are never going to be so much that they outweigh the rewards from working in these environments," Alison Lyall, a security analyst at Harnser Risk Group in Norwich, England, said Monday.

Lyall, author of a recent report for the European Commission on evaluating the costs of security, say companies in the exploration and production industry ? even those operating in risky areas ? have simply paid little attention to the issue.

"There is a strong enterprise culture which prides itself on taking risks," she said. "I can show you that the percentage spent on security on very high-value assets is shockingly low."

The assault last Wednesday on Algeria's Ain Amenas gas complex by a multinational band illustrates the danger posed by Al-Qaida in the Islamic Maghreb and its offshoots, who have grabbed power propelled by long-simmering ethnic tensions in Mali and the revolution in Libya. In the wake of the violence, energy companies will have to study operations for possible flaws and upgrade contingency plans with information gleaned from the shock attack.

Ian McCredie, former vice president of corporate security for Royal Dutch Shell, said the threat had obviously been underestimated.

"There will need to be reassessment," said McCredie, now CEO of Forbes Research Group in the United States.

Nigel Inkster, a former senior British intelligence officer who heads a risk-analysis unit at the International Institute for Strategic Studies in London, said the incident raised questions both for oil companies and Algeria.

"The boardrooms of oil companies looking to work in Algeria are going to be convulsed by this, and uncertain of how to proceed," Inkster said. "It raises all sorts of concerns about all sorts of economic activity ... (including) uranium mines in Niger, which are pretty important to the global economy."

Algeria has taken a strong tack against the terrorists, rejecting offers of help from Britain, the U.S. and other to go it alone in a typical tough and uncompromising response. BP and Statoil were compelled to entrust their employees lives to the Algerian security forces, and that won't change ? at least immediately. Algeria insists that it has the know-how to assure the security of energy plants.

"We are going to reinforce the security and we will rely first of all on our own means," Algerian Energy Minister Youcef Yousfi said on Sunday, according to state news agency APS. "There is no question of accepting outside security forces."

BP and Royal Dutch Shell, whose employees in Nigeria have been the targets of gangs of kidnappers and militants, would not comment on security arrangements in Algeria. But Ted Jones, the CEO of specialist evacuation company Northcott Global Solutions in London, noted companies alarmed by the attack are scaling up their physical security, moving from unarmed to armed operations, and shifting nonessential staff to safer locations.

Companies can become complacent after a period of safe operation, he said, then change course when something terrible occurs.

"Suddenly something like this happens and they realize they're much closer to the danger ... and there's a sort of panic response, which is perfectly natural," he said.

The energy industry is not a new target. McCredie recalled that significant changes in security followed terror attacks in Saudi Arabia, including a 2004 hostage-taking incident at oil industry compounds at Khobar which ended in the deaths of 22 people.

"There have been all sorts of attacks in other places, Yemen, Syria, Iraq. These attacks are not unusual. What's unusual about this one is it was a big surprise. It shouldn't have been," McCredie said. Al-Qaida in the Islamic Maghreb "had been making these threats for a long time. No one thought they had the capacity."

But, he said there are limits to what even extra security forces could accomplish in the battle against terrorists.

"They are mobile, it's a huge vast area, very, very difficult to police, and difficult to keep up surveillance, so a small number of people can have the element of surprise," McCredie said. "Security forces can't patrol the whole area."

___

AP reporters Gregory Katz, Jill Lawless and Cassandra Vinograd in London and Greg Keller in Paris contributed to this report.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/f70471f764144b2fab526d39972d37b3/Article_2013-01-21-Algeria-Security/id-3bb80f6dc23e4ef698686c3cee012b99

black panther party frank martin pink slime eagle cam trayvon martin case affordable care act the line

One form of neuron turned into another in brain

Jan. 20, 2013 ? A new finding by Harvard stem cell biologists turns one of the basics of neurobiology on its head -- demonstrating that it is possible to turn one type of already differentiated neuron into another within the brain.

The discovery by Paola Arlotta and Caroline Rouaux "tells you that maybe the brain is not as immutable as we always thought, because at least during an early window of time one can reprogram the identity of one neuronal class into another," said Arlotta, an Associate Professor in Harvard's Department of Stem Cell and Regenerative Biology (SCRB).

The principle of direct lineage reprogramming of differentiated cells within the body was first proven by SCRB co-chair and Harvard Stem Cell Institute (HSCI) co-director Doug Melton and colleagues five years ago, when they reprogrammed exocrine pancreatic cells directly into insulin producing beta cells.

Arlotta and Rouaux now have proven that neurons too can change their mind. The work is being published on-line Jan. 20 by the journal Nature Cell Biology.

In their experiments, Arlotta targeted callosal projection neurons, which connect the two hemispheres of the brain, and turned them into neurons similar to corticospinal motor neurons, one of two populations of neurons destroyed in Amyotrophic Lateral Sclerosis (ALS), also known as Lou Gehrig's disease. To achieve such reprogramming of neuronal identity, the researchers used a transcription factor called Fezf2, which long as been known for playing a central role in the development of corticospinal neurons in the embryo.

What makes the finding even more significant is that the work was done in the brains of living mice, rather than in collections of cells in laboratory dishes. The mice were young, so researchers still do not know if neuronal reprogramming will be possible in older laboratory animals -- and humans. If it is possible, this has enormous implications for the treatment of neurodegenerative diseases.

"Neurodegenerative diseases typically effect a specific population of neurons, leaving many others untouched. For example, in ALS it is corticospinal motor neurons in the brain and motor neurons in the spinal cord, among the many neurons of the nervous system, that selectively die," Arlotta said. "What if one could take neurons that are spared in a given disease and turn them directly into the neurons that die off? In ALS, if you could generate even a small percentage of corticospinal motor neurons, it would likely be sufficient to recover basic functioning," she said.

The experiments that led to the new finding began five years ago, when "we wondered: in nature you never seen a neuron change identity; are we just not seeing it, or is this the reality? Can we take one type of neuron and turn it into another?" Arlotta and Rouaux asked themselves.

Over the course of the five years, the researchers analyzed "thousands and thousands of neurons, looking for many molecular markers as well as new connectivity that would indicate that reprogramming was occurring," Arlotta said. "We could have had this two years ago, but while this was a conceptually very simple set of experiments, it was technically difficult. The work was meant to test important dogmas on the irreversible nature of neurons in vivo. We had to prove, without a shadow of a doubt, that this was happening."

The work in Arlotta's lab is focused on the cerebral cortex, but "it opens the door to reprogramming in other areas of the central nervous system," she said.

Arlotta, an HSCI principal faculty member, is now working with colleague Takao Hensch, of Harvard's Department of Molecular and Cellular Biology, to explicate the physiology of the reprogrammed neurons, and learn how they communicate within pre-existing neuronal networks.

"My hope is that this will facilitate work in a new field of neurobiology that explores the boundaries and power of neuronal reprogramming to re-engineer circuits relevant to disease," said Paola Arlotta.

Share this story on Facebook, Twitter, and Google:

Other social bookmarking and sharing tools:


Story Source:

The above story is reprinted from materials provided by Harvard University, via EurekAlert!, a service of AAAS.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Journal Reference:

  1. Caroline Rouaux, Paola Arlotta. Direct lineage reprogramming of post-mitotic callosal neurons into corticofugal neurons in vivo. Nature Cell Biology, 2013; DOI: 10.1038/ncb2660

Note: If no author is given, the source is cited instead.

Disclaimer: This article is not intended to provide medical advice, diagnosis or treatment. Views expressed here do not necessarily reflect those of ScienceDaily or its staff.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/top_news/top_health/~3/KplyB3QjEsc/130120150031.htm

huntsville al channel 2 news adrienne bailon yelp stock honda classic news channel 5 nashville weather

Harbaugh Bowl: Brothers Take 49ers, Ravens To Super Bowl XLVII

Preparing to coach the Baltimore Ravens in the AFC championship game Sunday night, John Harbaugh watched on the stadium's big video screen as Jim Harbaugh's San Francisco 49ers wrapped up their victory in the NFC championship game.

John looked into a nearby TV camera, smiled broadly and said: "Hey, Jim, congratulations. You did it. You're a great coach. Love you."

Less than four hours later, the Ravens won, too. Some siblings try to beat each other in backyard games. These guys will do it in the biggest game of all. Yes, get ready for the Brother Bowl.

It'll be Harbaugh vs. Harbaugh when Big Bro John's Ravens play Little Bro Jim's 49ers in the Super Bowl at New Orleans in two weeks.

As much chatter as there will be about the players involved ? from Ravens linebacker Ray Lewis and his impending retirement to 49ers quarterback Colin Kaepernick's sudden emergence ? the Harbaugh family angle will make this coaching matchup the most scrutinized in the nearly half-century of Super Sundays.

The Harbaughs' sister, Joani Crean, wrote in a text to The Associated Press: "Overwhelmed with pride for John, Jim and their families! They deserve all that has come their way! Team Harbaugh!"

Who's a parent to cheer for?

During the 2011 regular season, the Harbaughs became the only brothers to coach against each other in any NFL game (the Ravens beat the 49ers 16-6 on Thanksgiving Day that year).

Now they'll be squaring off with a championship at stake in a Super Bowl filled with firsts ? and one truly significant last.

It will be the first one between coaching brothers, of course. First one for Joe Flacco, the oft-doubted Ravens quarterback with the superb touch on deep balls and a QB-record six postseason road wins. First one for Kaepernick, the second-year player with the tattooed arms, the sprinter's speed, and a shoulder that zips throws like the high school baseball pitcher he used to be.

And it will be the last game for 17-year veteran Lewis, Baltimore's emotional leader and this postseason's top tackler with 44 so far.

"This is our time," Lewis pronounced.

He appeared to be on the verge of tears before and after helping Baltimore become the only team in 68 tries to overcome a halftime deficit against Patriots quarterback Tom Brady in Foxborough, Mass.

The NFC West champion 49ers (13-4-1) open as 5-point favorites, seeking a record-tying sixth Super Bowl title but first since 1995. The franchise of Hall of Fame quarterbacks Joe Montana and Steve Young is 5-0 in Super Bowls.

The AFC South champion Ravens (13-6) are headed to their second Super Bowl; Lewis was the MVP when Baltimore beat the New York Giants in 2001.

With Kaepernick's terrific passing ? he was 16 of 21 for 233 yards and a touchdown in only his ninth career NFL start ? and two TD runs by Frank Gore, San Francisco erased a 17-point deficit to beat the Atlanta Falcons 28-24 Sunday.

Baltimore then fashioned a comeback of its own by scoring the last 21 points to defeat the New England Patriots 28-13, thanks in large part to Flacco's three second-half touchdown tosses, two to Anquan Boldin.

In the often risk-averse NFL, each Harbaugh made a critical change late in the regular season in a bid to boost his team's postseason chances. Clearly, both moves worked.

After 49ers quarterback Alex Smith, the starter in last season's overtime NFC title game loss to the New York Giants, got a concussion, Jim switched to Kaepernick for Week 11 ? and never switched back. Now San Francisco has its first three-game winning streak of the season, at precisely the right time.

Baltimore, meanwhile, was in the midst of a three-game losing streak when John fired offensive coordinator Cam Cameron and promoted quarterbacks coach Jim Caldwell to replace him.

The 50-year-old John is 15 months older than Jim and generally the less demonstrative of the pair, although John certainly did not lack intensity while making his case with officials a couple of times Sunday.

The ever-excitable Jim ? who was treated for an irregular heartbeat in November ? was up to his usual sideline antics in Atlanta.

He spun around and sent his headset flying when the original call stood after he threw his red challenge flag on a catch by the Falcons. He hopped and yelled at his defense to get off the field after their key fourth-down stop with less than 1 1/2 minutes left. He made an emphatic-as-can-be timeout signal with 13 seconds remaining.

Expect CBS to fill plenty of time during its Super Bowl broadcast with shots of Jim, that trademark red pen dangling in front of his chest, and John, who usually wears a black Ravens hat. Yes, that is sure to be a focal point, until they meet for a postgame handshake.

___

Follow Howard Fendrich on Twitter at http://twitter.com/HowardFendrich

___

AP sports writer Janie McCauley contributed to this report from San Francisco.

___

Online: and

Links:


"; var coords = [-5, -72]; // display fb-bubble FloatingPrompt.embed(this, html, undefined, 'top', {fp_intersects:1, timeout_remove:2000,ignore_arrow: true, width:236, add_xy:coords, class_name: 'clear-overlay'}); });

Source: http://www.huffingtonpost.com/2013/01/20/harbaugh-bowl-brothers-super-bowl_n_2517785.html

les paul fred thompson fred thompson red hook romney tax return the tree of life movie academy award nominees 2012

home improvement | backyard swimming pool options

It?s been cold around here lately. The kind of cold that has me dreaming of jumping on a plane to a tropical destination where I can swim in a warm sea or lounge by an outdoor pool. And then, my daydreaming brings me closer to home and I start thinking about the possibility of installing a swimming pool in my own backyard to take advantage of the nicer months of the year.

Requirements
Depending on the type of pool that you choose, you may or may not be able to realistically have one installed on your property. It will depend on the size of your backyard, access for machinery, and your budget.

Local regulations will likely require a fence or other safety barrier around the pool or yard for safety and security. The height regulations may vary and, in some cases, depend on the type and depth of the pool. Check with your local zoning office for specifications for your area.

Pool Options
There are a wide variety of options available when it comes to choosing the style and model of pool that is right for you and your family.

Natural swimming pools ? I think this is my favorite option! Natural swimming pools, also known as swimming ponds or green pools, are a natural and sustainable alternative to conventional pools. They are chlorine-free mini-ecosystems and depend on plants and microorganism that colonize the gravel aggregate and river rock to keep the water clean for swimming.

Conventional in-ground pools ? Generally, when we think of backyard pools, we think of in-ground chlorinated pools. They can be built in standard rectangles but can also be customized to various shapes or sizes and with varying depths. Additionally, new technology allows for homeowners to use salt-water chlorination systems, which can be easier on the skin and eyes.

Above- ground pools ? much like conventional chlorinated pools but, as their name indicates, they are built above ground. This is the least expensive of all of the pool options as there is no excavation required and you can even buy DIY kits to assemble yourself, plus, these can often be installed in yards where there isn?t enough room for an in-ground pool. Additionally, since you don?t need to excavate, you don?t need as much clearance to access the backyard. Consider building a deck around the pool to make it feel more integrated into the landscape.

Counter-current pools ? if you mainly want to get some exercise, a small counter-current pool is for you. A propeller creates a current that you swim against in this tiny pool where you can practice your strokes and do water aerobics. You literally swim in place as the current pushes against you. The upside to this pool model is that it is quite small and can even be installed indoors or in a small backyard.

Want to find out whether or not your property is big enough to accommodate a backyard pool? Talk to your local home improvement experts or pool specialists.

Resource: doityourself.com

Source: http://www.my-home-improvement.com/2013/01/19/dreaming-of-a-backyard-swimming-pool/

arizona immigration law aubrey huff the killers julianne hough brandy michael pineda charles taylor

Four New Ways Online Scammers Are Taking Your ... - The Next Web

Greetings to you, my friend.
I know this will come as a surprise to you, because you do not know me. My name is Abdul Al-Shallah and I am the son of a deposed government official in Nigeria.

Sound familiar? It?s a boilerplate opening for one of the most common scams in the known world ? the Nigerian scam, also known as the ?419 scam? or the advance fee scheme. The elements are always the same: someone (preferably royalty or some sort of official) has come into a lot of money, but needs another person outside of the country to use their money for a bribe (or to pay legal fees among other means) to spring the money free. The result is also predictable, with a wire transfer to a con artist?s account and a fake check that confirms a scam has taken place.

This scam is a hallmark of the Internet, but it?s actually much older than that ? the advance fee scheme in its modern incarnation dates back to the early 1980s, and various forms can be traced back to before the 20th century. The reason that it sticks around, unsurprisingly, is because it never ceases to swindle millions of dollars from duped victims. The scheme, and many others like it continue to flood inboxes daily, often hitting the Spam folder before you ever lay eyes on it, waiting for a more trusting person to make a trip to the Western Union.

But that?s not to say that Internet scammers are resting on their laurels and leaving their dirty work to these classic methods. As Internet users become more sophisticated (and laugh at the advances of the forlorn Nigerian prince or similarly befallen individual), the chances of finding a willing innocent victim slowly dwindles. Like any other industry, scammers are looking for smarter, more efficient ways to reach their big payouts and to keep their ?businesses? running smoothly, so they are forced to adapt and reach new extremes to get their money.

Now, security experts are seeing disturbing trends among scammers that make the old schemes appear to be child?s play. Appealing to the emotional pull of a victim is now just part of the scheme, which now includes familiarity dupes and long-term schemes to raid a bank account. These cons are more targeted, more ruthless and can take out even large corporations and entire governmental programs. There?s a new evolution in Internet con artistry, and it?s putting everyone at risk.

Check out the four new and scary ways con artists are getting their money on the Internet, and real-life examples of how they work.

What do you think of these schemes? Let us know in the comments.

The long con

In the past few years, ?spear-phishing? has risen to become one of the biggest trends in online scamming. A play on the hacking technique ?phishing,? spear-phishing is a technique that con artists use to specifically target individuals or companies and gain access to information or bank accounts. This method has also become the tactic du jour for cyber criminals interested in attacking big business or government officials. But, that doesn?t mean spear-phishing is too advanced for the regular user.

In a spear-phishing scenario, a hacker is able to crack into an inbox of an unsuspecting victim. But, instead of doing a smash-and-grab and gathering as much information as possible, the criminal takes his time ? akin to casing a house before a robbery. Then, the hacker masquerades as an email account of a relatively important company, like Bank of America. The hacker then sends a personalized email explaining to the victim that her account has been compromised, including the victim?s account number to establish credibility, and urges her to quickly change her name and password via a link provided in the email. The victim is duped into downloading nasty malware onto her computer, and the con artist is able to walk away with cash in his pocket.

?They dig deeper down. They know who you?re talking to and what the subject matter is about,? ?says George Waller, executive vice president at New Jersey-based cybersecurity software corporation StrikeForce Technologies. ?Then they?ll most likely spear-phish you with a malicious attachment or direct you to a site with a malicious download on it.?

And, at times, spear-phishing can drift into the absurd, like the story told by?ESET?Security Evangelist?Stephen Cobb of hackers who had used a victim?s account to steal his money by stealing his heart. The hackers broke into a wealthy victim?s Gmail account and began rifling through the inbox. While reading the emails, they discovered the victim enjoyed frequenting dating websites, looking for a potential long-term mate. The hackers found the victim on the website and posed as a beautiful woman who was romantically interested in him. The hackers proceeded to forge a long-term relationship with him before begging for ?emergency? money to be wired via Western Union. The victim readily accepted and the con went off without a hitch.

?This technique is particularly pernicious because it doesn?t immediately look like a scam,? Cobb says. ?This isn?t some stranger saying, ?Hi, you do not know me, but I have come into a large sum of money.? You?ve gotten to know this person on social media and they?ve targeted you that way.?

The authority dupe

88373578 730x463 As Internet users adapt to old tricks, scammers find new tactics to exploit

Hackers aren?t only making emotional appeals, but also using fear or urgency to manipulate victims into giving over their identities and bank accounts. Waller explains that one of the common methods is that hackers use this tactic while posing as a common workplace resource, like a payroll company. Hackers can lure victims by claiming (ironically) a security breach or emergency that requires a change of password or download of a file. At that point, victims begin to divulge critical information or, perhaps even worse, download malware onto their computers that allows hackers to infiltrate computers and unlock even more information. Victims are tricked into believing they?re securing their systems and tying up loose ends, not compromising them.

?We?re all tied to the Internet and it?s part of our daily lives,? Waller explains. ?We?re looking at it to check our emails and to conduct our business, but if you?re multi-tasking and you see something you recognize that?s actually a piece of spyware, it only takes one click. One click, and you?re infected.?

Another notable way that con artists take advantage of victims doesn?t directly involve a computer at all, but instead relies on a victim?s?lack of knowledge?about technology to earn a quick dollar. Cobb explains that one of the most common scams the ESET teams see are ?IT phone calls,? where con artists call computer owners pretending to be Microsoft or Apple support techs and convince victims that their computers are riddled with ?errors? ? standard computer functions that can look threatening to an uninitiated computer user. They will even go so far as to walk the victim through a series of tests to ?prove? the infections exist on the computer, even though many of them are common. By feigning emergency (and following a script), con artists can snag a quick $50 or so from concerned people.

?This scam is going on everywhere in the English-speaking world,? Cobb explains. ?And everybody who has Windows has gotten a problem before. The pitch for the product is constantly evolving and it really tricks people.?

The puppet

Hackers are posing as friends, authority figures, and they?re even pretending to be you. One of the easiest ways hackers can trick victims is by posing as a real friend or relative of someone they know ? a type of hyper-specialized spear-phishing that chooses new marks by consulting information from a previous victim. Con artists, through a key-logger or malware, can figure out their next targets by simply looking at emails. The former victim?s closest friends are usually the easiest targets, as it is simple to convince them to open a suspicious file or link. As the new crop of users get conned, they create new pools by which a hacker can find new victims. In this vicious cycle, it turns those who fall for scams into tools to be used against the people they care about most.

?I think it?s a natural evolution for the scammer,? Cobb says, ?Spam in general is all about volume ? you have to send out large number in order for it to work. But now, the numbers games aren?t working and hacking costs money, so putting more time into a victim is becoming more lucrative. Why try to target someone for a wire transfer who has never done a wire transfer? Find someone who knows how to do a wire transfer and has money, and it?s worth the time to work that person.?

This technique was actually recently used on Waller himself while he was at his own company, no less. As an executive that works frequently with local shipping services, Waller wasn?t surprised to find that USPS sent him an email one day explaining that a package missed delivery and needed to be picked up. The email looked legitimate, and included directions to his nearest post office (listing a known address three blocks away) and a link to the receipt. Waller was certain his company didn?t have any outstanding orders or package deliveries, and remained suspicious of the email. Still, he clicked the email?s link anyway ? and it turned out to be malware.

?This isn?t even a sophisticated attack. This is just a standard phishing attack,? Waller said, ?But if you?re a larger company or a person, it?s easy to see how someone can be deceived by all of this.?

The bait and switch

137179490 730x486 As Internet users adapt to old tricks, scammers find new tactics to exploit

Of course, nothing does quite as well as an updated version of the classic bait and switch ? a con artist promising one piece of information and instead providing something unwanted such as a trojan or malware. Bait and switch operations are finding a niche in the Internet, where it is easy to pass off a malicious piece of software as a PDF or other file. Waller spoke of a group of hackers that had bought the email addresses of thousands of CFOs on the black market and was able to successfully bait them into downloading malicious software. Using the bought names, the hackers posed themselves as the IRS and sent emails to everyone, claiming that the enterprise tax codes for the year had changed. The email offered a ?handy? PDF of all of the changes which, of course, was infected with a keylogger. After the CFOs unwittingly downloaded the harmful software, the keylogger set to work ? analyzing the keystrokes until it was able to gather the usernames and passwords of each companies? payroll system. That was when the magic happened.

?The hackers picked out CFOs that had several hundred to several thousand employees on purpose because those companies always experience a large turnover of full-time and contracted employees,? Waller explained. ?The hackers were able to log in to the payroll service as the CFO and add a few extra payees to the account without attracting any suspicions.?

This technique occurs on a larger scale in the classic con artist technique of the dubious poll. Companies of varying repute are always advertising online polls and surveys that promise something free ? whether it be an iPad or a cruise to the Bahamas. Users can take these polls online with the promise of a cash payout or fancy prize on the horizon, only to be goaded into a high-pressure situation where they must either sign up for multiple subscriptions or buy additional products in order to get their ?free? reward. This scheme has been used across other media, including phones, but it remains one of the most persistent and successful scams. Cobb attributes the technique?s profitability to the ongoing economic crisis throughout the world.

?In an?economy?where a lot of people are?underemployed?and looking for extra money, a lot of people will be interested in a $1000 Wal-Mart Survey,? Cobb says. ?And, people think that it?s not really free money because they?re?convinced?they?re working for it. They can convince themselves that what they?re doing is okay.?

How to stay safe

The world of cyber scams isn?t only constantly evolving ? it?s relying on a variety of old and new methods to keep the income of cash flowing. This is just a fraction of the kind of schemes that are happening on the Internet today, and only related to email. Scammers are constantly trolling places like Craigslist, message boards and even Facebook groups to make a quick dollar off of unsuspecting people, and there?s a lot at stake.

As always, when avoiding these con schemes, there?s no substitute for good old fashioned common sense. The better that you as an Internet user become at detecting and fending off scams, the less likely you will find yourself upset at the hands of a manipulative con artist.

It?s simple enough to find out whether something is a scam by doing a routine search on Google when any suspicious activity appears in your mailbox. If something has come up in the recent past to indicate that the email you?re reading is actually a piece of malware or a scam, it will likely show up on message boards or in blog posts of security firms. It?s also a smart idea to research anyone you do not know who has contacted you or requested your friendship on a social network. Knowledge, in this case, truly is power.

Cobb agrees that it?s best to be skeptical of your surroundings, and also cautions others to be aware of what they put on social media. The more valuable information a user puts on a public social media profile like Facebook or Twitter, the easier it is to not only break into accounts but also dupe you into believing a scam?s authenticity. So, refrain the next time you think about putting your entire family tree or the history of places you went to school on your public timeline.

?People just don?t realize how helpful over-sharing in social media is to bad people,? Cobb says. ?We talk to people about not sharing too much because it?s?embarrassing? but there?s also an exploitation factor. Use the technology with an understanding that there are people out there who are working all the time to exploit you.?

Waller advises that every user maintain a comprehensive security system that blocks all forms of attacks, including keystroke-logger protection and anti-virus. Because software solutions rarely cover all bases, it?s also important that you secure available programs with a reliable two-factor authentication system like Google Authenticator. A combination of apps and steady vigilance will ensure that hackers won?t be able to sneak into your important accounts unannounced.

?You need to look for proactive approaches to all of this, because the deceptiveness that occurs every day is incredible,? Waller says.

And never, ever go to a Western Union and wire cash unless you know what you?re doing. Ever. Seriously. Just don?t.

Image Credits: Paul J. Richards/Getty Images, Jeff J Mitchell/Getty Images, Mario Tama/Getty Images

Source: http://thenextweb.com/insider/2013/01/20/four-new-ways-online-scammers-are-taking-your-money/

Kerri Strug Ledecky Nadia Comaneci Rebecca Soni Snoop Lion London 2012 Table Tennis badminton

Hoping to revive an ancient tongue, Pope tweets in Latin

12 hrs.

Pope Benedict tweeted in Latin for the first time on Sunday, taking his mission to revive the Catholic Church's official language to a very 21st-century medium.

"Unitati christifidelium integre studentes quid iubet Dominus? Orare semper, iustitiam factitare, amare probitatem, humiles Secum ambulare," the pontiff wrote.

Baffled? So were many Twitter users. "Benny, nobody understands a word of Latin! #adviceforthepope" read one response on the online messaging service.

The pope's tweet meant: "What does the Lord command to those wholly eager for the unity of those following Christ? To always pray, to continually do justice, to love uprightness, to walk humbly with Him," according to University of Cambridge scholar Tamer Nawar.

The message was shorter and, arguably, more elegant in its original language ??one of the reasons why Latin-lovers want to conserve the tongue of ancient Rome, Pope Benedict foremost among them.

The Holy See, where even ATM bank machine transactions are available in Latin, is one of the last bastions of the language that gave rise to Spanish, Portuguese, French, Italian and Romanian.

In November the pope set up a new Vatican department charged with promoting the study and use of the language within the Roman Catholic Church and beyond.

Known for his traditionalist leanings, the 85-year old pontiff has also allowed a partial return of the old-style Latin Mass that was phased out more than four decades ago.

Once the international language of science and learning, Latin has declined in use among priests since the Church began allowing them to hold masses in vernacular languages in the mid 1960s.

To keep the language updated, Vatican produces a dictionary of modern words in the ancient tongue. "Inscriptio cursus electronici" is the vital word "email", while "brevissimae bracae femineae" means hotpants.

With just over 5,000 followers, the pope's Latin-language Twitter account is the smallest of his eight profiles, through which he communicates with more than 2 million followers in languages including Arabic and his native German.

However, Sunday's tweet was not actually the first instance of Latin used by the Pope on Twitter.

Benedict's Twitter handle "Pontifex" is a Latin word literally meaning "bridge-builder", an ancient title for high priest once held by the emperors of Rome.?

(Reporting by Naomi O'Leary; Editing by Andrew Heavens)

Copyright 2013 Thomson Reuters.

Source: http://www.nbcnews.com/technology/technolog/hoping-revive-ancient-tongue-pope-tweets-latin-1B8040228

dallas fort worth dfw 1930 census nike new nfl uniforms nfl uniforms andrew bailey the village

Saturday, January 5, 2013

A New Solopreneur's Guide Of What Not To Do ... - Internet Billboards

New Business No No

I just published a guest post by Celene Harrelson, she?s got some great ?new solopreneur? lessons to share.

She says:

I?d like to share with you why my business didn?t grow at the rate it should have and why I wasn?t making the income I knew I was capable of.

See, some solopreneurs are making very healthy 6 and 7 figure incomes online. They are no smarter than you or I, so why are they more successful? They are doing the right things in the right way.

via A New Solopreneur?s Guide Of What Not To Do

Content Curator Kelly McCausey

I'm Kelly McCausey and I love hosting the Solo Smarts podcast. Being a solopreneur, operating unique online businesses and helping others find their own success makes me one happy camper.

Source: http://www.internetbillboards.net/2013/01/a-new-solopreneurs-guide-of-what-not-to-do-solo-smarts/

fiscal cliff Pitbull Hannah Storm jenny mccarthy Psy fergie minnesota vikings

MGT610 Business Ethics Idea Solution Assignment 2 fall 2012 On ...

MGT610 Business Ethics Idea Solution Assignment 2 fall 2012 On January 2013

Kentucky Fried Chicken
(KFC) is a renowned fast food chain having its operations all
across the globe and enjoys a lot of reputation due to its spicy food items. KFC has
planned to launch its operation in India in early 1990?s amid of strong protest from the
People for Ethical Treatment of Animals (PETA) and violation of the food Adulteration act,
1954, with an excessive amount of active ingredient of monosodium glutamate. Along
with this heavy protest from the opposition parties to stop the invasion of KFC into Indian
food market.
KFC, after two decades is now again planning to invest and expand its operations in India.
Being as an industry analyst, how would you analyze the major issues faced by KFC in
India and develop a roadmap for its successful investment.
Hint: Major issues should be considered as Cultural, Political, Economic, Ethical and Agricultural
issues.

Solution Idea:
Vegetarian menu with a sideline of chicken for Indian Muslims (cultural issue)
Approval from the food authorities, have it?s products judged and tested by a committee (ethical issue)
Use alternate salt forms, instead of MSG use table salt/black pepper
Economic downfall since 2010 might be an issue, however a cheaper rate list might help KFC establish their place.

Source: http://www.urducell.com/2013/01/mgt610-business-ethics-idea-solution.html

dear john derrick rose torn acl pacers undrafted free agents braveheart earthquake california earthquake california