EEG Technician        
NY-Clifton Park, EEG Technician The Child Neurology Group – Per Diem We are seeking an EEG Technician for our growing Child Neurology office in Clifton Park. The EEG Technician will be able to perform routine, ambulatory and long-term video EEGs in an office setting. The EEG tech determines and accommodates patient’s age-based care needs, and provides appropriate age-based patient/family education related to the p
          Part-Time Human Resources Development Instructor (Continuing Education)        
NC-Wilmington, Definition: Teach employability soft skills as they relate to current computer technology and trends vital to the existing job market. Provide classroom instruction to college students through lecture, demonstration, laboratory exercises, handouts, responding to questions and testing for employability purposes. DISTINGUISHING CHARACTERISTICS: Employees within this class are distinguished from the
          Comment on The Open Source – SELRS Update by SELRS at the Lake – SELRS Update | Growing Food Security in Alberta        
[...] & Awareness – implementing open source technology to build more effective online communications and project [...]
          Ingénieur test et validation QA H/F - ALTIM Consulting - Boulogne-Billancourt        
Ce que nous pouvons accomplir ensemble ? Vos principales missions seront les suivantes : Mettre en place les plateformes et environnements de qualification en répondant aux exigences et contraintes des clients Rédaction des cahiers de test à partir des spécifications techniques et fonctionnelles Rédiger les plans de qualification en définissant les différents scénario de test Lancer, exécuter et suivre les campagnes de tests réalisées en interne Utiliser les outils...
          Responsable Assurance Qualité / Recette (H/F) - Alten - Montpellier (34)        
En croissance sur les activités IT sur la région de Montpellier, nous recherchons un Responsable Recette / QA (H/F) pour rejoindre un acteur majeur du secteur du retail. Intégré(e) au sein des équipes de notre partenaire, vous participerez à mettre en place les différentes phases de qualification fonctionnelles et techniques ainsi que des tests de non régression sur les applications en production. Vos missions vous permettront de réaliser et de superviser : Plan de stratégie de...
          Union Bank of India Announces Excellent Results for the Quarter ended June 30, 2017         
Highlights  of  Union Bank of India's Results for the Quarter ended June 30, 2017  

CASA     25.1 per cent YoY
Non Interest Income      `  ` 1414 crore  (up 36 per cent YoY) 
Savings Deposit     27.6 per cent YoY
Operating Profit     ` ` 2057 crore (up 26.5 per cent YoY) 
CASA Share      35.5 per cent 
Net Profit        ` 117 crore (up 7.3 per cent QoQ) 
RAM* Sector      14.8 per cent YoY
CRAR       12.01 per cent 
RAM* Share       55.4 per cent
Tier I      9.24 per cent 

 The growth in Deposits was driven by Savings Deposits, which grew by 27.6 per cent on YoY basis.
 
 Cost to income ratio improved to 43.79 per cent against 48.28 per cent on YoY basis.

 Capital Adequacy Ratio (Basel III) improved to 12.01 per cent compared to 10.75 per cent a year ago. * (Retail, Agriculture & MSME share in domestic advances) 

Business
Global Business grew by 10.5 per cent to `670971 crore as on June 30, 2017 from `607280 crore as on June 30, 2016. Domestic business grew by 10.0 per cent to `635233 crore as on June 30, 2017 from `577473 crore as on June 30, 2016.  Total deposit of the bank grew from `338727 crore as on June 30, 2016 to `375796 crore as on June 30, 2017 showing growth of 10.9 per cent. 
Financial Results for the Quarter ended June 30, 2017 
                                            
CASA deposits grew by 25.1 per cent to `133412 crore as on June 30, 2017 from `106604 crore as on June 30, 2016.   CASA share in total deposits improved to 35.5 per cent as on June 30, 2017 compared to 31.5 per cent as on June 30, 2016. Average CASA ratio also increased by 430 basis points (bps) to 33.5 per cent on YoY basis.  Savings Deposit registered YoY growth of 27.6 per cent.  A total of 8.70 lakh CASA accounts were opened during April-June 2017, out of which 8.38 lakh were Savings Bank Accounts (excl. BSBDA/BSBDS accounts).   The Bank’s Global Advances grew by 9.9 per cent (YoY) to `295175 crore as on June 30, 2017 from `268553 crore as on June 30, 2016.  Due to encouraging growth of 14.8 per cent in RAM (Retail, Agriculture & MSME) sector, Domestic Advances increased by 9.4 per cent from `242935 crore as on June 30, 2016 to `265683 crore as on June 30, 2017. 


Financial Performance for the quarter ended June 2017

Domestic Net Interest Margin (NIM) stood at 2.20 per cent for April -June 2017 as against 2.36 per cent for April -June 2016. Global NIM for April -June 2017 stood at 2.06 per cent as against 2.27 per cent for January-March 2017 quarter. It was 2.28 per cent a year ago.    Yield on funds stood at 6.94 per cent for April -June 2017 as against 7.94 per cent for April-June 2016 and 7.35 per cent for January-March 2017.   Cost of funds stood at 5.03 per cent for April -June 2017 as against 5.82 per cent for April-June 2016 and 5.24 per cent for January-March 2017.  Net Interest Income for April-June 2017 increased by 6.7 per cent to `2243 crore from `2103 crore for April-June 2016. It was `2387 crore during January-March 2017.  Non Interest Income for April-June 2017 stood at `1414 crore, showing increase of 36.0 per cent over April-June 2016.   Operating profit increased by 26.5 per cent to `2057 crore during April-June 2017 over `1626 crore during April-June 2016 and was `2134 crore during January-March 2017.  Net Profit for April-June 2017 sequentially increased to `117 crore from `109 crore in January-March 2017.  Cost to income ratio improved to 43.79 per cent for April -June 2017 from 48.28 per cent for April-June 2016 and it was 44.32 per cent for January-March 2017.  Return on average assets (annualised) stood at 0.10 per cent for April-June 2017 as against 0.17 per cent for April-June 2016 and 0.10 per cent for January-March 2017.  Return on equity (annualised) stood at 2.46 per cent in April -June 2017 as against 3.36 per cent for April -June 2016 and 2.27 per cent for January-March 2017.  Earnings per share (annualised) stood at `6.78 in April -June 2017 as against `9.69 for April -June 2016 and `6.33 for January-March 2017.

Asset Quality
Gross NPA stood at 12.63 per cent as on June 30, 2017 as against 11.17 per cent as on March 31, 2017 and 10.16 per cent as on June 30, 2016.   Net NPA ratio stood at 7.47 per cent as on June 30, 2017 as against 6.57 per cent as on March 31, 2017 and 6.16 per cent as on June 30, 2016.  Provision Coverage Ratio stood at 51.13 per cent as on June 30, 2017 as against 51.41 per cent as on March 31, 2017. It was 49.99 per cent as on June 30, 2016.  

Capital Adequacy

Capital Adequacy ratio of the Bank under Basel III improved to 12.01 per cent as on June 30, 2017 as against 11.79 per cent as on March 31, 2017 and 10.75 per cent as on June 30, 2016 compared to minimum regulatory requirement of 10.25 per cent.  The Tier I ratio as of June 30, 2017 is 9.24 per cent, within which Common Equity Tier 1 ratio is 7.73 per cent compared to regulatory minimum of 6.75 per cent. 

Digital Initiatives

The Bank has been pioneer in taking various digital initiatives and continuously launched various digital products for enhancing the customer services. Following are some of the key achievements during the quarter:
 66 per cent growth in mobile banking users on YoY basis.  U-Mobile transaction volume doubled from June 2016.  90 per cent growth in number of PoS terminals on YoY basis.  7th largest presence in banking industry and 3rd largest presence amongst all PSU banks within short span of time in Social media.  Trendsetter on Social media channels by taking various initiatives like Live streaming, Digital Education Series – #KyaAapJanteHai etc.   67 per cent share of “transactions through digital channels” in “overall transactions”. 

Financial Inclusion:

Under the Pradhan Manrti Jan Dhan Yojana (PMJDY), the the Bank has more than 69 lakh accounts having a balance of `1270 crore.   48.91 lakh Rupay Card issued under PMJDY as on June 30, 2017.

Total enrollment under Pradhan Mantri Suraksha Bima Yojana (PMSBY), Pradhan Mantri Jeevan Jyoti Bima Yojana (PMJJBY) and Atal Pension Yojana (APJ) increased to 30.1 lakh, 12.8 lakh and 2.21 lakh respectively.  The Bank financed `696 crore in 33433 accounts under Pradhan Mantri Mudra Yojana, including an amount of `211 crore to 7964 beneficiaries through a specific scheme for financing of light commercial vehicle during April–June 2017. 

Network

The Bank has 4286 branches as of June 30, 2017 including 4 overseas branches at Hong Kong, DIFC (Dubai), Antwerp (Belgium) and Sydney (Australia). In addition, the Bank has representative offices at Shanghai, Beijing and Abu Dhabi. The Bank also operates in United Kingdom through its wholly owned subsidiary, Union Bank of India (UK) Ltd.   Total number of ATMs stood at 7574 including 1685 talking ATMs as of June 30, 2017. ATM to branch ratio stood at 1.77. 

Awards & Accolades during FY 2017-18 (April-June)

Skoch Award 
Skoch Order of merit Award – Operational Customer Relationship Management (OCRM)
Skoch Financial Technology Award - Unified Payment Interface(UPI)
Skoch Financial Technology Award - Green PIN solution for Debit cards 
Skoch Financial Technology Award - Union Digi Gaon
Skoch Financial Inclusion Award for Financial Inclusion

          BPCL awards its prestigious microsites design & implementation contract to Octaware Technologies        
by Shrutee K/DNS

Mumbai, August 10, 2017: Octaware Technologies Limited (BSE – 540416), a leading software and business solutions development company, is pleased to announce that they have been awarded the prestigious contract from BPCL for the design and implementation of their loyalty and brand microsites. Octaware was one of the bidders and was awarded the contract, post evaluation and presentation of efficient solutions and capabilities to the evaluation committee.

The scope of work under the contract includes design and implementation of microsites for BPCL’s loyalty programs – SmartFleet & PetroBonus and other brands - Speed and In & Out. The engagement includes a period of 3 months for implementation of microsites and an additional three years of support and maintenance. Octaware Technology Limited’s expertise in the areas of online portals & enterprise systems helped them win the contract.

Commenting on the development, Mr. Aslam Khan, Chief Executive Officer, Octaware Technologies Limited, said, “We are extremely delighted to have won the prestigious contract from BPCL, our first major win in the Indian PSU sector, post our IPO in April 2017. The fact that it falls under one of Octaware’s key focus verticals of governance, demonstrates our consistent and steady inroads in the Indian market, surpassing some of the strong players in the region. We look forward to a long-term business association with BPCL”.

About Octaware Technologies Limited:
Incorporated in 2005, Octaware Technologies Ltd is a software development company providing a range of information technology solutions. The company designs, develops, and maintains software systems and solutions. Company's services include custom software development, ECM/portal solution, ERP and CRM implementation, mobile platform solution, RFID solution, cloud and IT infrastructure services, consulting services and geospatial services.
Octaware provides specialized software application and product development services and solutions in the areas of healthcare, finance, and e-government industry. The company has proprietary products for domestic, as well as international markets, such as PowerERM – Human Capital Relationship Management, Hospice – Healthcare and Citizen Services solution, and iOnAsset – Inventory management and tracking System etc. These products are available as packaged products as well as software-as-a-service model integrated with legacy system.
Octaware Technologies Limited (BSE – 540416), got listed on the BSE –SME platform on April 3, 2017 and was oversubscribed by 148%, providing testimony to the faith, the investors have reposed in the company.

          Ziox Mobiles announces Sushant Singh Rajput as its Brand Ambassador along with Rs. 300cr investment for FY17 - 18        
Launches its newest Mobile phone ‘Ziox Duopix’
        Forays into LED TV and Consumer Durables Segment
        Plans to open 2 new manufacturing units and R&D facilities with investment of Rs. 200cr.
        Plans a 360-degree marketing campaign with a budget of
Rs. 100 Cr.
by Shrutee K/DNS
In the light of its vigorous expansion, Ziox Mobiles under the aegis of Sun Air voice Pvt Ltd, one of the fastest growing Mobile handsets brand, ropes in the very versatile, Sushant Singh Rajput, as its Brand endorser who truly lives up to the brand name.  While Ziox mobiles is a preferred brand across the country through its outstanding innovation and quality, the other has won the hearts of a million Indians as he slips into any role with nonchalance. Both the brand and its ambassador ride on the precepts of resilience, hard work and steady growth. A rare blend of energy, perseverance, and popularity coupled with his ability to connect to people, Sushant Singh Rajput is a fine addition to the Ziox Mobiles family. This association will further boost the legacy of Ziox Mobiles as the actor resonates to the brand promise: Quality that Speaks.
Answering strong demand and an overwhelming response from the Indian market, Ziox Mobiles also chalked out a detailed expansion plan and the roadmap for FY 2017-2018.The Brand aims to establish a stronger foothold in the Indian Market, with the total investment of over Rs. 200crore which shall span for a year, the Brand announced its plan to set up 2 new manufacturing units (in Sikkim and Noida) and R&D facilities apart from the existing New Delhi unit, with a holding capacity of around 1 Million units per Month. With the induction of Sushant Singh Rajput as its brand endorser along with the total investment of Rs. 100 Cr. this FY 2017-2018, Ziox aims to achieve an estimated revenue of Rs. 1,000 Cr and a sale of 10 million product units.
Commenting on this association and a promising future, Mr. Deepak Kabu, CEO Ziox Mobiles said “The future looks bright, Ziox Mobiles has a range of phones in the pipeline with exciting new launches. We are enthralled to present Sushant Singh Rajput as the new face of Ziox Mobiles. With Sushant Singh Rajput on board, it will help augment sales and further its reach in the market. The partnership with him is timed with Ziox Mobiles’ next phase of expansion on a pan-India level” Mr. Kabu further adds, “Sushant embodies talent, youthfulness and style. More importantly, he blends well with the core values of hard work, reliability, and is the epitome of our brand philosophy. Today our target audience is the young, driven, forward-moving generation, who have ever changing needs. Sushant understands the pulse of this audience well and has a great rapport with them. That is why, with immense preparation, he goes on to entertain his fans with one performance after another just as Ziox Mobiles constantly strives to understand the changing needs of its customers.”
Speaking on the association, Sushant Singh Rajput said, "I have always known Ziox Mobiles to be an inspirational brand in terms of their persuasion to becomes India’s biggest mobile brand. I am happy to be associated with a brand which is very young, and has a journey that is very similar to mine. I love how this brand designs its products to suit every need of its customers and are constantly innovating themselves as I see myself doing that while working on a role. I look forward to being part of the Ziox Mobiles family and to contribute to its fascinating growth journey in India." The ever-evolving brand has slated a major strategic transformation that entails the signing of a new brand endorser, an aggressive expansion and launches of it new products. The Brand at the event also announced the launch of its newest smartphone Series ‘Duopix”, Phone Series with Dual Cameras. Designed to fulfil the brand promise of providing users with superior camera performance and quality, ‘Duopix’ comes equipped with wide angle Dual front camera (8.0MP + 2.0) front +8.0MP Rear. The latest Dual 4G model runs on Android 7.0, with 5inch HD IPS Display along with 2GB RAM + 16GB ROM all packed in 2500mAh battery. Some of the key features includes strong battery life & also the fast charging capability. The budget friendly Smartphone comes equipped with various other features like 21 language support with multilingual phonebook, MP3 player, FM Radio, Bluetooth connectivity to help you stay connected. The phone will be available across all retail stores in few week’s time. Along with the smartphones, the brand also announces its foray into LED TVS and Consumer Durables category.

About Ziox Mobile: Ziox Mobiles, part of Sun Airvoice Pvt. Ltd., incepted in the Year 2015, with a singular motto to break the boundaries while offering technologically superior products without compromising on quality. Headquartered in New Delhi, Ziox Mobiles has built up an impressive product portfolio of more than 40 distinguished products and constantly innovating to make superior products.
Empowering consumers with affordable technology through quality products- the brand has truly demonstrated quick and robust expansion since inception, showing profitability and growing sales since the first year of operations. Being considered as one of the most innovative and fastest growing brands in the Mobile category, the brand has established its presence across India through its wide network comprising of its various branch offices and system integrators across several states in India.

          Malaysian Palm Oil Council (MPOC) partners with Mumbai Dabbawala Association (MDA)        

Malaysian Palm Oil Council (MPOC) partners with Mumbai Dabbawala Association (MDA)

~A culturally enriching and riveting morning hosted by Malaysian Palm Oil Council with the Dabbawalas of Mumbai~

by Shrutee K/DNS

Mumbai, August 8, 2017 : In April 2017 in conjunction with the visit to India of the Hon. Prime Minister of Malaysia, Dato Sri’ Haji Mohammad Najib bin Tun Haji Abdul Razak, Malaysian Palm Oil Council (MPOC) signed a MoU with Mumbai Dabbawala Association (MDA). Taking this MoU forward, on the morning of August 8th, MPOC and Mumbai Dabbawalas flagged off an event to create awareness for Malaysian Palm Oil and its benefits.

The event took place at the Lower Parel Bridge, where Dabbawalas wore the T-shirts and topis branded with MPOC message. They then delivered the dabbas carrying a booklet of recipes of dishes that can be cooked in palm oil and the benefits of using palm oil. The Dabbawalas are in a unique position to promote MPOC and raise awareness to the positive nutritional attributes of Malaysian Palm Oil. This becomes particularly useful in Indian cuisine as most dishes are cooked in oil. Substituting for a healthier oil can do no harm, besides besides providing the added bonus of eating delicious food cooked in a healthy oil that is nutritious for the body.

To kick off this event, Dr. Kalyana Sundaram, CEO of MPOC, was present, encouraging the use of palm oil and showing appreciation to our Dabbawalas for their exceptional work. The morning was most enjoyable, entertaining and culturally riveting as some of Maharashtra’s best dancers performed the traditional Lezim Dance, a true delight to have watched! For those unaware of the Lezim Dance, it is a Maharashtrian folk dance performed to the beat of the Dholki, a percussion instrument.

Speaking at the occasion, Dr. Kalyan Sundaram, CEO, MPOC, said, “It gives me immense pleasure to be here this morning. Dabbawalas have been an integral part of this city and they define what Indians stand for: hardworking, responsible and efficient. They work relentlessly with a smile on their face, be it rain or storm. Malaysian Palm Oil has been a very important part of the Indian diet and with this unique initiative we wish to create awareness for this wonderful oil and its several health benefits. Our association with the Mumbai Dabbawalas allows us to spread the message of healthy cooking to a large number of households and encourages a healthier cooking lifestyle”


Mr. Subhash Talekar, Association Spokesperson of Mumbai Dabbawala Association said “We Dabbawalas unfailingly deliver thousands of dabbas to hungry people daily, they are undoubtedly the best people to directly reach out to households and create awareness about palm oil and the health benefits of using it. This is a very exciting new chapter, and we are glad to be partnering with MPOC.”

India is the world’s largest importer of cooking oils. Palm oil constitutes about two-thirds of India’s steadily increasing vegetable oil import. The price, in comparison to competing oils and the proximity of origin, Malaysia, has made Malayisan Palm Oil a highly preferred oil. Now the Dabawallas have taken it upon themselves, with the help of MPOC, to inform families about the benefits of palm oil and how exquisite food can be cooked in palm oil in alternative to other vegetable oils.

Amongst some of the benefits we came to learn about during the event was that palm oil is rich in natural chemical compounds essential for health and nutrition. It has a rich source of carotenoids that are rich in Vitamin A, a potent natural antioxidant, Vitamins D, E, K, fatty acids, and other important fat-soluble micronutrients that boost the human immune system. The health benefits from using palm oil are tremendous - it reduces chances of Cancer, protects against heart diseases, type 2 diabetes, and helps children with Vitamin A deficiency.

The oil is great for cooking; it is of vegetable origin, making it free of cholesterol and apt for vegetarians, vegans, and Jains. Furthermore, the oil has a neutral flavor - you needn’t worry about changing tastes, it does not oxidize easily – making it perfect for frying food, and produces less gummy materials and helps in the cooking area maintaining a non-greasy surface; so, most bakers prefer to use a palm-based margarine for baking goods.

With people now more conscious about their health and food habits, palm oil is definitely the healthier choice to make whilst cooking and a step towards healthier bodies and practices.  What better way to create awareness than directly reaching out to the households through our Dabbawalas.


Note to Editors:
MPOC is a Council under the Ministry of Plantation Industries and Commodities of Malaysia.  Its role is to promote the market expansion of Malaysian palm oil and its products by enhancing the image of palm oil and creating better acceptance of palm oil through awareness of various technological and economic advantages (techno-economic advantages) and environmental sustainability.

The Council has set up a network of ten offices all over the world, mainly in China (Shanghai), India (Mumbai), Pakistan (Lahore), Bangladesh (Dhaka), Middle East (Istanbul and Cairo), Europe (Brussels and Russia), Africa (Durban) and Americas (Washington DC)  to support, promote and venture into new areas for the industry.
                                                                                                             

The plantation industry, particularly palm oil, is one of the main pillars of the Malaysian economy.  The palm oil sector has contributed significantly towards providing a continuous inflow of export earnings through the export of raw commodity and valued-added products to the global market. In 2016, palm oil contributed USD 9 billion in export earnings for Malaysia and accounted for 33% of the world’s palm oil production and 39% of total palm oil exports.

          Skillsoft and MIT Sloan Management Review Partner To Train Next Generation Business Leaders        

Superior content and Percipio platform help organizations develop the next wave of leaders

 by Shrutee K/DNS

Mumbai August 08, 2017–Skillsoft, the global leader in corporate learning, has partnered with MIT Sloan Management Review (MIT SMR) to curate the journal’s best leadership assets and deliver them to its 40 million users. This key collaboration kicks off a series of new, innovative content partnerships that will empower Skillsoft’s Leadership and Business Skills learners with professional training from the industry’s top experts.

Organizations and their employees can now access this elite catalog of content to enhance professional development, upskill their workforce, and hone individual career paths. Presented through the highly engaging and intuitive Percipio platform, users will be able to access everything from MIT SMR’s general leadership articles, to Frontier articles that focus on the intersection of business management practice with technology, collaborative research reports, as well as webinars and videos. Content will be optimized for all devices and operating systems, and will be accessible via video, audio and written content for varied learner styles and needs.

“Our Leadership content sets us apart from other corporate learning content providers. We provide the most diverse content catalog with an array of learning modalities. More importantly and unique to Skillsoft, we craft thoughtful learning paths and courses for users to follow,” said Bill Donoghue, Executive Chairman of the Skillsoft group. “Our partnership with MIT Sloan Management Review will supplement our own assets and underscore our commitment to building the most respected and up-to-date portfolio of Leadership training available.”

Skillsoft will embed MIT SMR content within its core Business and video collections, and integrate content within its existing Leadership offerings, like Skillsoft Leadership Advantage, Continuous Leadership Journey and Women-in-Action. The partnership between Skillsoft and MIT SMR will provide organizations with engaging, on-demand corporate learning content that will groom, train and inspire management teams through a consumer-like interface (think Netflix or Amazon) that is designed to engage the learner.

“We see a growing need for effective leadership training to address critical skill gaps in today’s organizations and help increase an organization’s ability to develop talent from within,” said Paul Michelman at MIT SMR. “This partnership gives our content a new vehicle for delivery within those organizations that believe training their internal talent is paramount to creating a competitive edge.”

MIT Sloan Management Review is a pre-eminent platform and content leader that bridges the gap between academic research and daily practice. The Review keeps readers in tune with management trends and innovations. MIT SMR articles cover a wide range of topics relevant to management with a focus on areas such as Data & Analytics, Digital, Global, Innovation, Leadership, Marketing, Operations, Social Business, Strategies and Sustainability. For decades, MIT SMR has been a forum for business-management innovators from around the world to present their ideas and research.

About Skillsoft : Skillsoft is the global leader in corporate learning, providing the most engaging learner experience and high-quality content. We are trusted by the world's leading organizations, including 65 percent of the Fortune 500. Our mission is to build beautiful technology and engaging content that drives business impact for today’s modern enterprise. Our 150,000+ multi-modal courses, videos, books and micro-learning modules are accessed more than 130 million times every month, in 160 countries and 29 languages. With 100% secure cloud access, from any device, whenever, wherever. www.skillsoft.com

          Ambi Pur’s New TVC Focuses on Refreshing Monsoons        
Shrutee K/DNS

Mumbai, August 4, 2017:-Ambi Pur’s Smelly to Smiley campaigns have always challenged and conquered the toughest and most pungent odours in a real time set up with live experiments. The third edition of the Smelly to Smiley campaign focuses on yet another very relevant odour issue that most have us have encountered – the problem of the lingering monsoon odour that plagues all Indian households during the season. While monsoons have always stood for happy, fun times, growing up brings us face-to-face with monsoon-related issues. Akin to the advertisement format that has become synonymous to Ambi Pur, the new TVC is a real-life experiment at a real consumer’s home, where a unique sensorial challenge is conducted. After all, how often would you come across people with blind folds and pegs on their noses?

This interesting play on the senses reveals that a home, which may look immaculately clean, may, in reality, be perceived as unclean because it is doused with the damp monsoon odour. This TVC, conceptualized by Grey Group, features Brand Ambassador Boman Irani who presents a reality check in context to the damp, lingering odours that specially torment during monsoons. Launching nationally on August 03, the TVC positions the New and Improved Ambi Pur, with odour-clear technology, as the perfect solution to restore freshness to your favorite season. 

The recently released findings from a survey conducted by AC Nielsen, commissioned by Ambi Pur, unearthed the extent of suffering that these damp, musty odours impose on all of us. In fact, 9 out of every 10* women felt that monsoons bring issues within the household such as drying clothes inside, that lead to a musty damp odour.
 
Nidhish Garg, Brand Manager, P&G Home Care India, comments: “To drive awareness regarding the New & Improved Ambi Pur with patented odour-clear technology, we have launched the 3rdleg of the very popular Smelly to Smiley campaign. The brand stays with its ideology of putting the product to torture tests against relevant odour issues, and this time we take on the musty odour that all Indians face during monsoons. The TVC captures live reaction of a consumer who experiences the monsoon odour when visiting a friend’s home that looks perfectly clean. The same consumer sees Ambi Pur in action and how it completely eliminates the monsoon odour as opposed to temporarily concealing it with a fragrance. This format of communicating with our consumers through live experiments helps in building brand salience and credibility.”
 

Ambi Pur’s Brand Ambassador, Boman Irani further adds, “Monsoon is my favourite season but we all know the challenges that come with it, right from drying clothes inside to the rigorous cleaning regime. The new TVC shows that the house that looks clean may not actually smell clean due to the overwhelming moisture-heavy air giving out a feeling of lack of hygiene. It is always fun shooting for Ambi Pur ads, as well as extremely reassuring to witness the brand live up to toughest home odours in live experiments, year on year! This time too, Ambi Pur in its new avatar, truly eliminated the musty monsoon odour. So, it’s time to stop being enslaved by this moldy smell and refresh your monsoons with Ambi Pur.”

The New & Improved Ambi Pur uses a distinct formulation that focuses on odour removal, not just on emitting the fragrance. P&G has created a trademarked ‘Odour-clear technology’, which has been brought to India in July. The new technology fights odour at a molecular level, neutralizing it completely, and leaving behind a subtle fragrance, thus truly eliminating all tough odours.

All Ambi Pur fragrances, including the newly launched Sandalwood fragrance, are available across stores at a price of Rs. 299.

Agency Credits:
Lead Creative Agency: GREY Düsseldorf
Local Support: GREY Mumbai
Production House: Casta Diva Pictures, Mumbai

About Procter & Gamble
P&G serves consumers in India with one of the strongest portfolios of trusted, quality, leadership brands, including Vicks ®, Ariel®, Tide®, Whisper®, Olay®, Gillette®, AmbiPur®, Pampers®, Pantene®, Oral-B®, Head & Shoulders® and Old Spice®. P&G operates through 3 entities in India of which 2 are listed on NSE & BSE. The listed P&G entities are: ‘Procter & Gamble Hygiene & Health Care Limited’ and ‘Gillette India Limited’, whereas the unlisted entity (which is a 100% subsidiary of the parent company in the U.S) operates by the name ‘Procter & Gamble Home Products Private Ltd.’ In the last 12 years, P&G’s signature CSR program P&G Shiksha has built and supported 1000 schools that will impact the lives of 10,00,000 underprivileged children across the country by providing them with access to education. Please visit http://www.pg-India.com for the latest news and in-depth information about P&G India and its brands.

          Swipe launches KONNECT at Rs. 4,999 Exclusively on Snapdeal        

by Shrutee K/DNS 

India, 4th August 2017: Swipe Technologies, India’s leading mobile internet technology company, is all set to unveil brand new member in its popular KONNECT Series - Swipe KONNECT Power.  The slim and sturdy smartphone sports 5” HD IPS display and boasts enormous 3000 mAh battery.  The compelling feature rich Swipe KONNECT Power is competitively priced at Rs. 4,999 only. It will be available exclusively on Snapdeal from 7th August 2017.

Swipe KONNECT Power is driven by a powerful 1.5GHz quad core processor that runs on Android 6.0 OS for lag-free multi-tasking smartphone experience. It comes with 2 GB RAM plus 16 GB internal memory, expandable up to 32 GB and OTG support enhances the storage options. The new 4G VoLTE-ready KONNECT Power features 5” HD IPS display that allows users to enjoy cleaner & sharper visuals at the highest resolution. Besides, this device has a very sleek body that makes the phone very stylish in its looks. That’s not all. For the photography enthusiast, KONNECT Power comes with 8MP Rear Camera and 5MP Front Camera. The camera app also comes with lots of features to enhance the photography. The new phone gives an extended company to the user with its 3000 mAh battery, which is installed keeping in mind the daily lifestyle and usage patterns of young smartphone users.  Commenting on the launch of KONNECT Power, Mr. Shripal Gandhi, Founder and CEO of Swipe Technologies said: “Fulfilling aspirations of demanding Indians at affordable price is what differentiates Swipe from other smartphone players.  Our latest creation is yet another affordable device under the KONNECT series – KONNECT Power. It is designed for the aspiring youth of the country who requires long lasting battery that too with 2GB RAM yet the phone is light on pocket.”
Vishal Chadha, Sr.Vice President – Business said: “As part of our commitment to the vision of Digital India, we are keen to bring our consumers access to compelling technology products at great value. With Swipe Konnect Power, we are confident that this newest exclusive addition to our smartphone assortment will be well received by our customers”
Swipe KONNECT Power comes with a gorgeous design, and it has a smoother touch experience as well as comfortable grip. Customers will be able to enjoy a greater multimedia experience, as they can capture stunning photos and videos in virtually any lighting condition.
About Swipe Technologies:
Swipe Technologies is an innovation-centric mobility solutions company, having started its operations in July 2012. Within a short span of time, Swipe has become the leading tablet and Smartphone maker in India.   Swipe was started with an aim to bring exciting devices in the growing Indian market and today, it is the leading consumer brand with key innovations across products, pricing and customer support. Founded by technocrat Mr. Shripal Gandhi, Swipe raised $5 million in May 2014 from the Venture Capital firm Kalaari Capital. In the last three years, Swipe has won a number of accolades including the “Top 50 Inspiring Entrepreneurs of India” by The Economic Times, the “Most Innovation-driven Company in India” by World Brand Congress, and the “Most Innovative Start-up” by Franchise India, the “Best Integrated Campaign” by the World Brand and Congress& the “Best Youth Brand Tablet” by CNBC. Also, Swipe’s young founder Mr. Shripal Gandhi has been recognized as the “CNBC Young Turks” for his breakthrough strategies and innovation in the field of mobile communication technologies. For details, logon to www.justswipe.com

          Stella rossa sull'Europa        
"Buongiorno, Anne. Buon anno".
"Buongiorno, Valentin. Buon anno anche a te. Novità?"
"Sì. Un nuovo arrivo. Sabato notte. Hai il colloquio già fissato per le undici. Trovi tutti i dettagli in agenda".
Anne Dupont, psicologa del Centro di Prima Accoglienza di Calais, entrò nel suo ufficio, accese il terminale e consultò la sua agenda elettronica.

Lunedì 5 gennaio 2011, ore 11,00. Colloquio con Monsieur Philip Brasser. Cittadino britannico. Età 38. Celibe. Operazione di salvataggio in mare, Canale della Manica, acque internazionali, 3 gennaio u.s. Condizioni fisiche buone. Non parla francese. Attribuzione provvisoria: codice blu.

Bene, pensò Anne. Un rifugiato politico. Iniziare l'anno nuovo con un codice blu era di buon auspicio. Il colloquio era di lì a due ore. Non c'erano altri impegni per la giornata. Completò con calma alcuni referti clinici iniziati la settimana precedente, fece una partita a Tetris, chattò con alcuni amici in Internet. Quando fu il momento, si aggiustò il make-up e si recò in sala colloqui.

Era una stanza non troppo ampia, arredata come un normale studio specialistico ma con qualche accorgimento per mettere gli ospiti a proprio agio: colori pastello, luci soffuse, lettino basso, comoda poltrona. Su quest'ultima, di fronte alla scrivania della dottoressa, era già seduto il signor Brasser.

"Good morning, Mr. Brasser. Prima di tutto, come sta?"
La domanda non era solo formale. L'uomo appariva molto provato. I tanti capelli bianchi, la pelle del viso magro solcata da numerose rughe, le profonde occhiaie dietro le lenti spesse, lo facevano sembrare più vecchio di dieci anni rispetto alla sua età anagrafica. Al posto degli abiti che indossava al momento del suo salvataggio, fradici e inservibili, gli avevano fornito un nuovo completo, che era tuttavia di due numeri più largo e accentuava la gracilità del suo fisico. Gli tremavano le mani.
Quegli scafisti maledetti, pensò Anne.
"Adesso sto meglio, grazie. Certo, suppongo che la notte passata all'addiaccio su quel canotto non abbia migliorato granché la mia cera. Ma ho fatto una buona dormita, qui da voi, e la vostra cucina è ottima". La sua voce era ferma, con una sfumatura d'ironia. "Solamente, non sono riuscito a procurarmi neppure una sigaretta, dottoressa..."
"Dupont. Ma può chiamarmi Anne. Temo che non ne troverà neppure in futuro. Nell'Unione non se ne producono più. Fino a qualche tempo fa, le importavamo dal suo paese".
"Oh, già, ora ricordo. Le esportazioni cessarono sei anni fa. Troppo pochi fumatori, qui da voi. Non c'era abbastanza profitto. Lo so perché all'epoca lavoravo in un'agenzia di rating".
"Lei è analista finanziario?"
Il signor Brasser rise. "No. Laureato in agraria. Da Troody's ero operatore al call center. Ogni grande compagnia ha il suo. E' la mansione che ho sempre svolto, durante tutta la mia carriera. Ho lavorato per almeno trenta società diverse, ogni volta per non più di sei mesi. Si imparano tante cose, sa?"
"Non ho dubbi. Ma veniamo al punto. Lei ha chiesto lo status di rifugiato politico. Data la sua provenienza, certamente la sua richiesta sarà accettata. Lei diventerà fra breve, a tutti gli effetti, cittadino dell'Unione delle Repubbliche Socialiste d'Europa. Già adesso, comunque, lei è libero di circolare in tutto il territorio dell'Unione, ed eventualmente anche di tornare da dove è venuto..."
"No grazie! Non ci tengo affatto".
"Dicevo per dire. In genere, qui da noi i rifugiati si integrano abbastanza in fretta. Tuttavia, non si può escludere che, all'inizio, lei si trovi un po' spaesato. Il nostro sistema sociale è molto diverso da quello da cui lei proviene. A sua richiesta, lei può fruire di adeguata assistenza psicologica e culturale, per superare eventuali difficoltà di adattamento. In questa fase iniziale, se vuole, mi consideri pure come suo referente".
"Oh. E quanto dura questa... fase iniziale?"
"Può finire anche subito, se crede. L'unico suo obbligo, se intende rimanere nell'Unione, è di iscriversi nelle liste di collocamento e nelle graduatorie per gli alloggi. Non credo che le sarà difficile trovare un lavoro e una casa. Se lei non ha esigenze particolari, penso che troverà una sistemazione accettabile nel giro di un paio di settimane. Fino ad allora, comunque, può rimanere qui, o spostarsi in una delle altre strutture di prima accoglienza nel territorio dell'Unione".
"Sembra magnifico. Dov'è la fregatura?"
"Ecco. Era proprio ciò che intendevo. Non c'è nessuna fregatura, per quanto lei sia abituato a pensare che debba per forza esserci. Non pretendo che lei mi creda. Presto se ne accorgerà da sé".

Non c'erano straordinari da fare, quel giorno. Alle tredici, Anne spense il computer, salutò i colleghi che arrivavano per il turno pomeridiano e, senza passare dalla mensa, prese l'elio-tram che, serpeggiando silenziosamente lungo la costa, la portò a casa sua in dieci minuti. Era una magnifica giornata di sole. Il mare era inusualmente calmo, in quei giorni. Una fortuna, per Brasser. Aveva evitato il triste destino di tanti boat-people che partivano clandestinamente dalla riva inglese ma non riuscivano a raggiungere i nostri mezzi di soccorso nelle acque internazionali.

Anne abitava da sola. Si preparò un leggero pranzo macrobiotico, poi un caffé d'orzo. Accese la radio; la spense. Si guardò nello specchio del soggiorno. Sorrise. Tutto sommato, si piaceva. Si chiese come sarebbe stato il suo sembiante, alla sua età, se anziché in Europa continentale fosse vissuta in quell'inferno che doveva essere Londra. I profughi le avevano raccontato storie orribili. Inquinamento, degrado. Se andava bene, orari lavorativi di dieci o dodici ore. Altrimenti, la disoccupazione, l'emarginazione e la pazzia. Oppure, per una ristretta minoranza, la ricchezza e il potere, ma a costo di rinunciare a qualsiasi barlume d'umanità. Un'altra forma di follia, in fondo.

Mercoledì 7 gennaio, ore 10,00. Secondo colloquio con Monsieur Brasser.

Quella mattina l'aspetto di Mr. Brasser era molto migliorato. Anne glielo disse.
"Grazie, Dottoressa. Lei è gentile quanto bella".
Anne Dupont ignorò il complimento.
"Se ho chiesto un nuovo colloquio" continuò Brasser, "non è per ottenere assistenza psicologica".
"Davvero? E perché, allora?"
"Ho due domande da porle".
"Le risponderò, se posso. Ma prima, permetta che le faccia io una domanda. Cosa sa, lei, dell'Unione?"
"Poco, in realtà. So che dapprima ci fu la Rivoluzione d'Ottobre, in Russia, nel 1917. Poi, tra il '18 e il '20, il capitalismo fu abbattuto in Germania, in Ungheria e in Italia. In rapida successione, tutte le colonie europee in Asia e in Africa conquistarono l'indipendenza. L'India nel 1925, la Cina nel '27, e così via. Poco dopo fu la volta dell'Algeria e del Marocco, e a quel punto la rivoluzione scoppiò anche in Francia e in Spagna. Alla fine degli anni '30, tutta l'Europa continentale era socialista.
Frattanto, il crollo di Wall Street nel 1929 aveva gettato l'America nella crisi più nera. Le elezioni presidenziali del 1940 furono vinte da Charles Lindbergh, un fanatico antisemita che instaurò negli U.S.A. una dittatura razzista, appoggiata dal grande capitale. Presto quel regime si circondò di una serie di stati-satellite che coprivano tutta l'America del Sud e del Nord.
Negli anni '80, quelle dittature iniziarono ad implodere, dapprima in America Latina e poi in Canada. Quando nel 1989 cadde il Muro di Tijuana, finalmente il capitalismo crollò negli stessi Stati Uniti. Da allora, secondo la nostra propaganda, il Regno Unito di Gran Bretagna è rimasto l'ultimo baluardo del libero mercato e della civiltà, contro la barbarie socialista che ha travolto tutto il resto del globo. Questo è quanto".
"Bene - disse la dottoressa - a parte la faccenda del baluardo, il quadro storico è corretto. Non le sarà stato facile ricostruirlo..."
"No, infatti. Da noi, formalmente, la cultura è libera, e ognuno può leggere ciò che vuole. Si possono prendere in prestito, nelle poche biblioteche rimaste, anche testi di Marx o di Lenin, e persino di Fabio Volo. Non è vietato. Di fatto, però, ci sono materie che non conviene approfondire troppo. Se si viene a sapere che lei fa certe letture e che ha determinate idee (e si viene a sapere sempre), non speri di trovare lavoro tanto facilmente. Io me la sono cavata con i call center, solo perché le mie origini non sono troppo umili. Quando avevo vent'anni, i miei riuscirono persino a mandarmi all'università. Certo, oggi non potrei più frequentarla. Da allora le rette sono decuplicate."
"Ah, lei ha letto Fabio Volo? Complimenti. Da noi, molti lo considerano un autore troppo difficile".
"Sì, è molto rigoroso e denso, ma se si ha tempo da dedicargli, è un pensatore affascinante. Le consiglio la Critica del tempo unidimensionale, se non l'ha ancora letta. A me ha aperto la mente. In realtà, uno dei motivi per cui mi sono deciso ad espatriare è che anche studiare per conto proprio da noi è diventato impossibile. Troppo costoso, da quando il dizionario è stato privatizzato".
"Il dizionario?"
"Sì. Tutti i sostantivi che iniziano per vocale appartengono alla Mircosoft. Quelli che iniziano per consonante sono del gruppo Murdogh. Gli avverbi sono di Merdaset, e così via. Per leggere o per usare comunque le parole bisogna pagare il noleggio ai legittimi proprietari. Quando lei scrive una e-mail, oppure quando chatta o quando telefona, un sistema di contatori automatici calcola la cifra e l'addebita sul suo conto. Ottimo sistema, fra l'altro, per controllare i contenuti della comunicazione. Io, per esempio, ho fatto quindici giorni di carcere per uso illecito di marchio registrato, la volta che in una mia mail ho scritto che la Cocca Colla mi faceva schifo".
"Senta, Mr. Brasser. Quali sono i suoi progetti? Cosa intende fare, ora che è venuto qui da noi?"
"Primo, togliermi una curiosità che mi ha tormentato a lungo. Ed è la prima delle due domande che volevo farle, si ricorda?"
La dottoressa Dupont sbuffò. "Va bene. Spari".
"La domanda è: perché non ci avete invaso? Come avete potuto lasciarci a mollo in quella fogna?"
Anne si appoggiò sullo schienale della sedia. "Beh, alcuni partiti in seno all'Internazionale erano per dichiarare guerra. Ma infine prevalse l'idea che il socialismo non può essere imposto con i carri armati. Se ci avessero attaccato, ci saremmo difesi. Per fortuna non accadde. Oggi, poi, molti sostengono che una pluralità di sistemi sociali diversi non è necessariamente un male. In India, in Giappone e in Sud America, dove la transizione al comunismo è molto avanzata, stanno già smantellando le strutture dello Stato, per sostituirle con vari tipi di organizzazione non statuale. In Europa e in Africa ci troviamo ancora nella fase socialista, in vari stadi di sviluppo a seconda dei territori. Forse è bene che ci siano delle zone dove ancora vige il capitalismo."
"Sarà un bene per voi, che ci osservate dall'esterno come se fossimo allo zoo! Ma per noi che siamo in gabbia è un altro discorso".
"Lei ora non è più in gabbia. Comunque, mi sembra che il suo atteggiamento nei confronti del suo paese d'origine sia un po' troppo negativo, non crede?"
"Mi dica lei cosa ci vede di bello, in quel letamaio", ribatté Brasser.
"Beh, che so... Avete una scena musicale molto vivace. Un sacco di gruppi pop, rock, punk, post-punk... Wim Wenders ci ha fatto anche un film. Poi, comunque, il vostro sistema ha ancora una base di consenso popolare".
"Si riferisce a West End London Social Club, vero? Quel film mi dà la nausea! Le televisioni del regime lo replicano senza tregua. L'unico film d'autore trasmesso in prima serata, e senza interruzioni pubblicitarie."
"Ecco, ad esempio - lo interruppe la dottoressa - Perché lei parla di televisioni di regime? Da voi ci sono sei o sette canali, se non sbaglio, tutti privati e in concorrenza fra loro..."
"... e trasmettono tutti le stesse schifezze. Non si distinguono l'uno dall'altro. Anne, lei non ha capito: da noi l'economia è allo sfascio, la società è in piena decadenza, la cultura è morta e sepolta. L'unica attività che va a gonfie vele è la manipolazione del consenso per mezzo dei mass-media. Quella è l'unica industria che non conosce crisi!"
"Non volevo farla arrabbiare. Si calmi. Lei ora è al sicuro. Andrà tutto bene. Respiri profondamente, e mi faccia la seconda domanda che voleva pormi".
"Mi scusi. La domanda è questa. Lei è libera stasera? Ho letto sul giornale che in un cinema d'essai a Dunkerque proiettano L'Atalante di Jean Vigo. E' una vita che desidero vedere quel film, e mi chiedevo se... lei volesse venire con me a vederlo, ecco."


Pubblicato su Evulon in due puntate: la prima il 7 gennaio 2011 qui, e la seconda il 12 gennaio 2011, qui.
          Transformers: Age of Extinction        

Another fun one to work on. Thanks to my supervisor Rene Garcia and all other artists, supervisors, managers, production people and tech guys for making this possible. Here’s what I did on this one: – Lockdown – the main “bad guy” in the movie. I was responsible for modeling his face/head. Additional helmet armor and […]
          '..to get rid of petrol and diesel vehicles by 2025..' - Britain bans gasoline and diesel cars starting in 2040 (no replies)        
'..The Netherlands and Norway previously said they wanted to get rid of petrol and diesel vehicles by 2025 and Germany and India announced similar plans ahead of 2030.'

- Chloe Farand, France will 'ban all petrol and diesel vehicles by 2040', July 6, 2017


'..Dirty air has been linked to cancer, asthma, stroke and heart disease, among other health issues. The problem is especially pronounced in big cities including London.'

'Britain will ban sales of new gasoline and diesel cars starting in 2040 as part of a bid to clean up the country's air.

The decision to phase out the internal combustion engine heralds a new era of low-emission technologies with major implications for the auto industry, society and the environment.

"We can't carry on with diesel and petrol cars," U.K. environment secretary Michael Gove told the BBC on Wednesday. "There is no alternative to embracing new technology."

Gove said the government's air quality plan, which is set to be officially announced later on Wednesday, was needed because gasoline and diesel engines contribute to health problems, "accelerate climate change, do damage to the planet and the next generation."

Roughly 40,000 deaths in Britain each year are attributable to outdoor air pollution, according to a study published last year by the Royal College of Physicians. Dirty air has been linked to cancer, asthma, stroke and heart disease, among other health issues. The problem is especially pronounced in big cities including London.

The timeline for ending sales of internal combustion engines mirrors one proposed in early July by France. President Emmanuel Macron has given the auto industry the same deadline to make the switch to cleaner tech.

"We are quite rightly in a position of global leadership when it comes to shaping new technology," Gove said.

- Charles Riley, Britain bans gasoline and diesel cars starting in 2040, July 26, 2017


Context

'..to Ban Internal Combustion Engines by 2030'

'..committed to 100 percent clean energy by the year 2050.'

(Global) - '..a revolutionary shift to net zero emissions by 2080..'


'Thorium reactor: cleaner, safer and sustainable nuclear energy within sight'

(Fusion Power) - LPP Focus Fusion 1; '..FF-1 results are right now far ahead..'

'..to develop a series of electric and hybrid aircraft..'


The "CityTree" - 'Air pollution is one of the world's invisible killers.'

          '..FORGET fuel-powered jet engines .. looking into hybrid planes .. plasma engine..' (no replies)        
'FORGET fuel-powered jet engines. We’re on the verge of having aircraft that can fly from the ground up to the edge of space using air and electricity alone.

..

Berkant Göksel at the Technical University of Berlin and his team now want to fit plasma engines to planes. “We want to develop a system that can operate above an altitude of 30 kilometres where standard jet engines cannot go,” he says. These could even take passengers to the edge of the atmosphere and beyond.

..

Göksel is hoping for a breakthrough in compact fusion reactors to power his system..

In the meantime, he is looking into hybrid planes, in which his plasma engine would be combined with pulse detonation combustion engines or rockets to save on fuel.'

- Sandrine Ceurstemont, Plasma jet engines that could take you from the ground to space, May 17, 2017


Context

(Fusion Power) - LPP Focus Fusion 1; '..FF-1 results are right now far ahead..'

(The Electric Universe) - SAFIRE as Astrophysical Laboratory | EU2016

'Open source is now mainstream..'


The New Fusion Race - Part 4 - Fusion Race: Who is Ahead, April 6, 2017

          The "CityTree" - 'Air pollution is one of the world's invisible killers.' (no replies)        
'..the "CityTree", a mobile installation which removes pollutants from the air, has been popping up in cities around the world, including Oslo, Paris, Brussels and Hong Kong.'

'(CNN) Air pollution is one of the world's invisible killers.

It causes seven million premature deaths a year, making it the largest single environmental health risk, according to the World Health Organization.

In urban areas, air quality is particularly problematic. More than 80% of people living in areas where pollution is monitored are exposed to air quality levels that exceed WHO limits. And given that by 2050 two thirds of the global population will be urban, cleaning up our cities' air is a matter of urgency.

One well-established way to reduce air pollutants is to plant trees, as their leaves catch and absorb harmful particulates.

But planting new trees is not always a viable option.

That's why the "CityTree", a mobile installation which removes pollutants from the air, has been popping up in cities around the world, including Oslo, Paris, Brussels and Hong Kong.

Moss is in the air

Each CityTree is just under 4 meters tall, nearly 3 meters wide and 2.19 meters deep, available in two versions: with or without a bench. A display is included for information or advertising.

Berlin-based Green City Solutions claims its invention has the environmental benefit of up to 275 actual trees.

But the CityTree isn't, in fact, a tree at all -- it's a moss culture.

"Moss cultures have a much larger leaf surface area than any other plant. That means we can capture more pollutants," said Zhengliang Wu, co-founder of Green City Solutions.

..

So far, around 20 CityTrees have been successfully installed, with each costing about $25,000.

..

Wu also argued that the CityTree is just one piece of a larger puzzle.

"Our ultimate goal is to incorporate technology from the CityTree into existing buildings," he said.

"We dream of creating a climate infrastructure so we can regulate what kind of air and also what kind of temperature we have in a city." '

- By Chris Giles, This 'tree' has the environmental benefits of a forest, June 8, 2017


Context

'..to Ban Internal Combustion Engines by 2030'

'..committed to 100 percent clean energy by the year 2050.'

'The future of shipping is, without a doubt, silent and emission free.'


(Global Infrastructure Upgrade) - Mexico's former president: Global infrastructure needs an upgrade

'Thorium reactor: cleaner, safer and sustainable nuclear energy within sight'

'..reductions in air pollution and lower costs .. moving to low-carbon electricity generation..'


Crowdfunding Focus Fusion (since May 6, 2014) - 'Focus Fusion: Clean Energy For All'

(Fusion Power) - LPP Focus Fusion 1; '..FF-1 results are right now far ahead..'

June, 2017 - 'Renewable sources of energy have generated more electricity than coal and gas in Great Britain..'

          'Open source is now mainstream..' (no replies)        
'Open source is now mainstream. More and more developers, organizations, and enterprises are are understanding the benefits of an open source strategy and getting involved. In fact, The Linux Foundation is on track to reach 1,000 participating organizations in 2017 and aims to bring even more voices into open source technology projects ranging from embedded and automotive to blockchain and cloud.'

- Mike Woster, Global Enterprises Join The Linux Foundation to Accelerate Open Source Development Across Diverse Industries, March 30, 2017


Context

(Open Source) - '..“open innovation.” Companies such as AstraZeneca, Lilly, GSK, Janssen, Merck, Pfizer, Sanofi, TransCelerate, and others..'

'..Microsoft, is shifting over to open source for its development.'

          '..the amount of leverage and excess that has accumulated in bond and Credit markets..' (no replies)        
'..the amount of leverage and excess that has accumulated in bond and Credit markets over the past eight years of extreme monetary stimulus.'

'The Fed is not blind. They monitor stock prices and corporate debt issuance; they see residential and commercial real estate market values. Years of ultra-low rates have inflated Bubbles throughout commercial real estate – anything providing a yield – in excess of those going into 2008. Upper-end residential prices are significantly stretched across the country, also surpassing 2007. They see Silicon Valley and a Tech Bubble 2.0, with myriad excesses that in many respects put 1999 to shame. I’ll assume that the Fed is concerned with the amount of leverage and excess that has accumulated in bond and Credit markets over the past eight years of extreme monetary stimulus.

..

The Fed collapsed fed funds from 6.50% in December 2000 to an extraordinarily low 1.75% by the end of 2001. In the face of an escalating corporate debt crisis, the Fed took the unusual step of cutting rates another 50 bps in November 2002. Alarmingly, corporate Credit was failing to respond to traditional monetary policy measures (despite being aggressively applied). Ford in particular faced severe funding issues, though the entire corporate debt market was confronting liquidity issues. Recall that the S&P500 dropped 23.4% in 2002. The small caps lost 21.6%. The Nasdaq 100 (NDX) sank 37.6%, falling to 795 (having collapsed from a March 2000 high of 4,816). No financial instability?

..

I revisit history in an attempt at distinguishing reality from misperceptions. Of course the Fed will generally dismiss the consequences of Bubbles. They’re not going to aggressively embark on reflationary policies while espousing the dangers of asset price and speculative Bubbles. Instead, they have painted the “housing Bubble” as some egregious debt mountain aberration. And paraphrasing Kashkari, since today’s stock market has nowhere as much debt as housing had in 2007, there’s little to worry about from a crisis and financial instability perspective.

Well, if only that were the case. Debt is a critical issue, and there’s a whole lot more of it than back in 2008. Yet when it comes to fragility and financial crises, market misperceptions and distortions play fundamental roles. And there’s a reason why each bursting Bubble and resulting policy-induced reflation ensures a more precarious Bubble: Not only does the amount of debt continue to inflate, each increasingly intrusive policy response elicits a greater distorting impact on market perceptions.

I doubt Fed governor Bernanke actually anticipated that the Fed would have to resort to “helicopter money” and the “government printing press” when he introduced such extreme measures in his 2002 speeches. Yet seeing that the Fed was willing to push its monetary experiment in such a radical direction played a momentous role in reversing the 2002 corporate debt crisis, in the process stoking the fledgling mortgage finance Bubble. And the Bernanke Fed surely thought at the time that doubling its balance sheet during the 2008/09 crisis was a one-time response to a once-in-a-lifetime financial dislocation. I’ll assume they were sincere with their 2011 “exit strategy,” yet only a few short years later they’d again double the size of their holdings.

..

Despite assertions to the contrary, the bursting of the “tech” Bubble unleashed significant financial instability. To orchestrate reflation, the Fed marshaled a major rate collapse, which worked to stoke already robust mortgage Credit growth. The collapse in telecom debt, an unwind of market-based speculative leverage and the rapid slowdown in corporate borrowings was over time more than offset by a rapid expansion in housing debt and the enormous growth in mortgage-related speculative leverage (MBS, ABS, derivatives).

..

I’ve never felt comfortable that Chinese authorities appreciate the types of risks that have been mounting beneath the surface of their massively expanding Credit system. Global markets seemed attentive a year ago, but have since been swept away by the notion of the all-powerful “China put” conjoining with the steadfast “Fed put.” These types of market perceptions create tremendous inherent fragility.'

- Doug Noland, Discussions on the Fed Put, March 25, 2017


'It’s now an all-too-familiar Bubble Dynamic. The greater the Bubble inflates, the more impervious it becomes to cautious “tightening” measures..'

'The problem today is that years of ultra-loose monetary conditions have ensured everyone is crowded on the same bullish side of the boat. Tipping the vessel at this point will be chaotic, and the Fed clearly doesn’t want to be the instigator. Meanwhile, timid little baby-step increases only ensure more problematic market Bubbles and general financial excess.

It’s now an all-too-familiar Bubble Dynamic. The greater the Bubble inflates, the more impervious it becomes to cautious “tightening” measures. And the longer the accommodative backdrop fuels only more precarious Bubble Dynamics, the more certain it becomes that central bankers will approach monetary tightening timidly. Yellen confirmed to the markets Wednesday that the Fed would remain timid – still focused on some theoretical “neutral rate” and seemingly oblivious to conspicuous financial market excess. The fixation remains on consumer prices that are running just a tad under its 2% target. Meanwhile, runaway securities market inflation is completely disregarded.'

- Doug Noland, Another Missed Opportunity, March 18, 2017


'..In terms of Credit Bubble momentum, it’s notable that Net Worth inflated over $2.0 TN in both Q3 and Q4.'

'The unprecedented amount of system-wide debt is so enormous that the annual percentage gains no longer appear as alarming. Non-Financial Debt expanded 4.7% in 2016, up from 2015’s 4.4%. Total Household Debt expanded 3.6%, with Total Business borrowings up 5.6%. Financial Sector borrowings expanded 2.9% last year, the strongest expansion since 2008.

Securities markets remain the centerpiece of this long reflationary cycle. Total (debt and equities) Securities jumped $1.50 TN during Q4 to a record $80.344 TN, with a one-year rise of $4.80 TN. As a percentage of GDP, Total Securities increased to 426% from the year ago 415%. For comparison, Total Securities peaked at $55.3 TN during Q3 2007, or 379% of GDP. At the previous Q1 2000 cycle peak, Total Securities had reached $36.0 TN, or 359% of GDP.

The Household Balance Sheet also rather conspicuously illuminates Bubble Dynamics. Household Assets surged $6.0 TN during 2016 to a record $107.91 TN ($9.74 TN 2-yr gain). This compares to the peak Q3 2007 level of $81.9 TN and $70.0 TN to end 2008. Q4 alone saw Household Assets inflate $2.192 TN, with Financial Assets up $1.589 TN and real estate gaining $557bn.

With Household Liabilities increasing $473bn over the past year, Household Net Worth (assets minus liabilities) inflated a notable $5.518 TN in 2016 to a record $92.805 TN. As a percentage of GDP, Net Worth rose to a record 492%. For comparison, Household Net Worth-to-GDP ended 1999 at 435% ($43.1 TN) and 2007 at 453% ($66.5 TN). Net Worth fell to a cycle low 378% of GDP ($54.4TN) in Q1 2009. In terms of Credit Bubble momentum, it’s notable that Net Worth inflated over $2.0 TN in both Q3 and Q4.

..

UBS analysts forecast (above) $3.3 TN of 2017 Chinese Total Social Financing (TSF). And with TSF excluding national government deficit spending, let’s add another $300bn and presume 2017 Chinese system Credit growth of around $3.6 TN. As such, it’s possible that China and the U.S. could combine for Credit growth approaching an Unparalleled $6.0 TN. There are, as well, indications of an uptick in lending in the euro zone, and Credit conditions for the most part remain loose throughout EM. Importantly, the inflationary biases that have gained momentum in asset and securities markets and, increasingly, in consumer prices and corporate profits provide a tailwind for Credit expansion.'

- Doug Noland, Unparalleled Credit and Global Yields, March 10, 2017


Context

'..the S&P 500 is now far more overvalued than in 2000, 2007, or indeed in any prior point in history..'

          Update (February 11, 2017) - '..ethical standards..' ('.. Dr. Bates appeared to distance himself from some of what he wrote in the blog post..') (no replies)        
Update February 11, 2017: 'In an interview on Monday with E&E News, Dr. Bates appeared to distance himself from some of what he wrote in the blog post, and from the way his criticisms were portrayed in the Mail on Sunday article.

“The issue here is not an issue of tampering with data,” he said, “but rather really of timing of a release of a paper that had not properly disclosed everything it was.”

Climate Home, a nonprofit site based in London that offers news and analysis, also weighed in on one of the central contentions of Mr. Rose’s article, that the publication of the NOAA paper had "duped” policy makers into adopting the Paris accord. The site contacted representatives to the talks from 10 countries; none said that the paper had any influence.'

- Henry Fountain, No Data Manipulation in 2015 Climate Study, Researchers Say, February 7, 2016


Update February 09, 2017: 'Dr Bates’ main complaint is that Dr Karl and his co-authors did not follow strict procedures required for NOAA’s ‘operational’ data. It is not yet clear whether Dr Karl should have subjected his research data to the same procedures. Dr Karl, who retired from NOAA in August 2016, has not yet had the opportunity to respond fully to Dr Bates’ allegations.'

- LSE: More fake news in ‘The Mail on Sunday’, February 5, 2017 (Wikipedia Bans Daily Mail As 'Unreliable' Source, February 08, 2017))


'..a failure to observe proper ethical standards..'

'Dr John Bates’s disclosures about the manipulation of data behind the ‘Pausebuster’ paper is the biggest scientific scandal since ‘Climategate’ in 2009 when, as this paper reported, thousands of leaked emails revealed scientists were trying to block access to data, and using a ‘trick’ to conceal embarrassing flaws in their claims about global warming.

Both scandals suggest a lack of transparency and, according to Dr Bates, a failure to observe proper ethical standards.

Because of NOAA ’s failure to ‘archive’ data used in the paper, its results can never be verified.

Like Climategate, this scandal is likely to reverberate around the world, and reignite some of science’s most hotly contested debates.'

- Exposed: How world leaders were duped into investing billions over manipulated global warming data, February 4, 2017


'Whatever takes its place, said Dr Bates, ‘there needs to be a fundamental change to the way NOAA deals with data so that people can check and validate scientific results. I’m hoping that this will be a wake-up call to the climate science community – a signal that we have to put in place processes to make sure this kind of crap doesn’t happen again.

..

Dr Bates said: ‘How ironic it is that there is now this idea that Trump is going to trash climate data, when key decisions were earlier taken by someone whose responsibility it was to maintain its integrity – and failed.’ '


'Dr Bates retired from NOAA at the end of last year after a 40-year career in meteorology and climate science. As recently as 2014, the Obama administration awarded him a special gold medal for his work in setting new, supposedly binding standards ‘to produce and preserve climate data records’.

..

Less than two years earlier, a blockbuster report from the UN Intergovernmental Panel on Climate Change (IPCC), which drew on the work of hundreds of scientists around the world, had found ‘a much smaller increasing trend over the past 15 years 1998-2012 than over the past 30 to 60 years’. Explaining the pause became a key issue for climate science. It was seized on by global warming sceptics, because the level of CO2 in the atmosphere had continued to rise.

..

In the weeks after the Pausebuster paper was published, Dr Bates conducted a one-man investigation into this. His findings were extraordinary. Not only had Mr Karl and his colleagues failed to follow any of the formal procedures required to approve and archive their data, they had used a ‘highly experimental early run’ of a programme that tried to combine two previously separate sets of records.

..

Dr Bates revealed that the failure to archive and make available fully documented data not only violated NOAA rules, but also those set down by Science. Before he retired last year, he continued to raise the issue internally. Then came the final bombshell. Dr Bates said: ‘I learned that the computer used to process the software had suffered a complete failure.’

The reason for the failure is unknown, but it means the Pausebuster paper can never be replicated or verified by other scientists.

..

Whatever takes its place, said Dr Bates, ‘there needs to be a fundamental change to the way NOAA deals with data so that people can check and validate scientific results. I’m hoping that this will be a wake-up call to the climate science community – a signal that we have to put in place processes to make sure this kind of crap doesn’t happen again.

Dr Bates said: ‘How ironic it is that there is now this idea that Trump is going to trash climate data, when key decisions were earlier taken by someone whose responsibility it was to maintain its integrity – and failed.’

NOAA not only failed, but it effectively mounted a cover-up when challenged over its data. After the paper was published, the US House of Representatives Science Committee launched an inquiry into its Pausebuster claims. NOAA refused to comply with subpoenas demanding internal emails from the committee chairman, the Texas Republican Lamar Smith, and falsely claimed that no one had raised concerns about the paper internally.'

- Exposed: How world leaders were duped into investing billions over manipulated global warming data, February 4, 2017


Context '..conduct more meetings on ethics .. Respectful discussion of different points of view should be encouraged.' - John Bates

Climategate: Follow the Money - By Bret Stephens

Those Who Control the Past Control the Future, Climate Data Edition, February 5, 2017

'..Earth is warming more rapidly than previously thought was correct..'


'Trees are the best known ‘technology’ to cool our planet'

Focus Fusion - '..So, production reactors by 2020 or so.'

(Earth Defence - Earth Shield) - Faraday - Tesla - 'The Accelerating Winds of Venus.' (Electric Universe - Solar Climate Change)


(The Electric Universe - Earth Defence - Earth Shield) - Electric Fossils and Thundercrabs

(The Electric Universe) - '..weather systems .. an electric “wind” surrounds and often precedes an electric arc.'

(Thymology - Haptopraxeology) - '..entrepreneurship .. actions he will carry out and estimates the future effect of those actions..'


'...The peer review process is broken...' - '...don't have the "situational awareness"...'

On the Mail on Sunday article on Karl et al., 2015, February 5, 2017

          'We have no experience in stopping a nuclear war.' - Sidney Drell (no replies)        
'..My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The “Titanic Effect” is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'

'The harsh rhetoric on both sides increases the danger of miscalculations and mistakes, as do other factors. Close encounters between the military aircraft of the United States and Russia have become routine, creating the potential for an unintended conflict. Many of the nuclear-weapon systems on both sides are aging and obsolete. The personnel who operate those systems often suffer from poor morale and poor training. None of their senior officers has firsthand experience making decisions during an actual nuclear crisis. And today’s command-and-control systems must contend with threats that barely existed during the Cold War: malware, spyware, worms, bugs, viruses, corrupted firmware, logic bombs, Trojan horses, and all the other modern tools of cyber warfare. The greatest danger is posed not by any technological innovation but by a dilemma that has haunted nuclear strategy since the first detonation of an atomic bomb: How do you prevent a nuclear attack while preserving the ability to launch one?

..

..the Cuban Missile Crisis, when a series of misperceptions, miscalculations, and command-and-control problems almost started an accidental nuclear war—despite the determination of both John F. Kennedy and Nikita Khrushchev to avoid one. In perhaps the most dangerous incident, the captain of a Soviet submarine mistakenly believed that his vessel was under attack by U.S. warships and ordered the firing of a torpedo armed with a nuclear warhead. His order was blocked by a fellow officer. Had the torpedo been fired, the United States would have retaliated with nuclear weapons. At the height of the crisis, while leaving the White House on a beautiful fall evening, McNamara had a strong feeling of dread—and for good reason: “I feared I might never live to see another Saturday night.”

..

The personnel who command, operate, and maintain the Minuteman III have also become grounds for concern. In 2013, the two-star general in charge of the entire Minuteman force was removed from duty after going on a drunken bender during a visit to Russia, behaving inappropriately with young Russian women, asking repeatedly if he could sing with a Beatles cover band at a Mexican restaurant in Moscow, and insulting his military hosts. The following year, almost a hundred Minuteman launch officers were disciplined for cheating on their proficiency exams. In 2015, three launch officers at Malmstrom Air Force Base, in Montana, were dismissed for using illegal drugs, including ecstasy, cocaine, and amphetamines. That same year, a launch officer at Minot Air Force Base, in North Dakota, was sentenced to twenty-five years in prison for heading a violent street gang, distributing drugs, sexually assaulting a girl under the age of sixteen, and using psilocybin, a powerful hallucinogen. As the job title implies, launch officers are entrusted with the keys for launching intercontinental ballistic missiles.

..

..A recent memoir, “Uncommon Cause,” written by General George Lee Butler, reveals that the Pentagon was not telling the truth. Butler was the head of the U.S. Strategic Command, responsible for all of America’s nuclear weapons, during the Administration of President George H. W. Bush.

According to Butler and Franklin Miller, a former director of strategic-forces policy at the Pentagon, launch-on-warning was an essential part of the Single Integrated Operational Plan (siop), the nation’s nuclear-war plan. Land-based missiles like the Minuteman III were aimed at some of the most important targets in the Soviet Union, including its anti-aircraft sites. If the Minuteman missiles were destroyed before liftoff, the siop would go awry, and American bombers might be shot down before reaching their targets. In order to prevail in a nuclear war, the siop had become dependent on getting Minuteman missiles off the ground immediately. Butler’s immersion in the details of the nuclear command-and-control system left him dismayed. “With the possible exception of the Soviet nuclear war plan, [the siop] was the single most absurd and irresponsible document I had ever reviewed in my life,” Butler concluded. “We escaped the Cold War without a nuclear holocaust by some combination of skill, luck, and divine intervention, and I suspect the latter in greatest proportion.” The siop called for the destruction of twelve thousand targets within the Soviet Union. Moscow would be struck by four hundred nuclear weapons; Kiev, the capital of the Ukraine, by about forty.

After the end of the Cold War, a Russian surprise attack became extremely unlikely. Nevertheless, hundreds of Minuteman III missiles remained on alert. The Cold War strategy endured because, in theory, it deterred a Russian attack on the missiles. McNamara called the policy “insane,” arguing that “there’s no military requirement for it.” George W. Bush, while running for President in 2000, criticized launch-on-warning, citing the “unacceptable risks of accidental or unauthorized launch.” Barack Obama, while running for President in 2008, promised to take Minuteman missiles off alert, warning that policies like launch-on-warning “increase the risk of catastrophic accidents or miscalculation.” Twenty scientists who have won the Nobel Prize, as well as the Union of Concerned Scientists, have expressed strong opposition to retaining a launch-on-warning capability. It has also been opposed by former Secretary of State Henry Kissinger, former Secretary of State George Shultz, and former Senator Sam Nunn. And yet the Minuteman III missiles still sit in their silos today, armed with warheads, ready to go.

William J. Perry, who served as Secretary of Defense during the Clinton Administration, not only opposes keeping Minuteman III missiles on alert but advocates getting rid of them entirely. “These missiles are some of the most dangerous weapons in the world,” Perry wrote in the Times, this September. For many reasons, he thinks the risk of a nuclear catastrophe is greater today than it was during the Cold War. While serving as an Under-Secretary of Defense in 1980, Perry also received a late-night call about an impending Soviet attack, a false alarm that still haunts him. “A catastrophic nuclear war could have started by accident.”

Bruce Blair, a former Minuteman launch officer, heads the anti-nuclear group Global Zero, teaches at Princeton University, and campaigns against a launch-on-warning policy. Blair has described the stresses that the warning of a Russian attack would put on America’s command-and-control system. American early-warning satellites would detect Russian missiles within three minutes of their launch. Officers at norad would confer for an additional three minutes, checking sensors to decide if an attack was actually occurring. The Integrated Tactical Warning/Attack System collects data from at least two independent information sources, relying on different physical principles, such as ground-based radar and satellite-based infrared sensors. If the norad officials thought that the warning was legitimate, the President of the United States would be contacted. He or she would remove the Black Book from a briefcase carried by a military aide. The Black Book describes nuclear retaliatory options, presented in cartoon-like illustrations that can be quickly understood.

..

Although the Air Force publicly dismissed the threat of a cyberattack on the nuclear command-and-control system, the incident raised alarm within the Pentagon about the system’s vulnerability. A malfunction that occurred by accident might also be caused deliberately. Those concerns were reinforced by a Defense Science Board report in January, 2013. It found that the Pentagon’s computer networks had been “built on inherently insecure architectures that are composed of, and increasingly using, foreign parts.” Red teams employed by the board were able to disrupt Pentagon systems with “relative ease,” using tools available on the Internet. “The complexity of modern software and hardware makes it difficult, if not impossible, to develop components without flaws or to detect malicious insertions,” the report concluded.

In a recent paper for the Royal United Services Institute for Defence and Security Studies, Andrew Futter, an associate professor at the University of Leicester, suggested that a nuclear command-and-control system might be hacked to gather intelligence about the system, to shut down the system, to spoof it, mislead it, or cause it to take some sort of action—like launching a missile. And, he wrote, there are a variety of ways it might be done.

..

Strict precautions have been taken to thwart a cyberattack on the U.S. nuclear command-and-control system. Every line of nuclear code has been scrutinized for errors and bugs. The system is “air-gapped,” meaning that its networks are closed: someone can’t just go onto the Internet and tap into a computer at a Minuteman III control center. At least, that’s the theory. Russia, China, and North Korea have sophisticated cyber-warfare programs and techniques. General James Cartwright—the former head of the U.S. Strategic Command who recently pleaded guilty to leaking information about Stuxnet—thinks that it’s reasonable to believe the system has already been penetrated. “You’ve either been hacked, and you’re not admitting it, or you’re being hacked and don’t know it,” Cartwright said last year.

If communications between Minuteman control centers and their missiles are interrupted, the missiles can still be launched by ultra-high-frequency radio signals transmitted by special military aircraft. The ability to launch missiles by radio serves as a backup to the control centers—and also creates an entry point into the network that could be exploited in a cyberattack. The messages sent within the nuclear command-and-control system are highly encrypted. Launch codes are split in two, and no single person is allowed to know both parts. But the complete code is stored in computers—where it could be obtained or corrupted by an insider.

Some of America’s most secret secrets were recently hacked and stolen by a couple of private contractors working inside the N.S.A., Edward Snowden and Harold T. Martin III, both employees of Booz Allen Hamilton. The N.S.A. is responsible for generating and encrypting the nuclear launch codes. And the security of the nuclear command-and-control system is being assured not only by government officials but also by the employees of private firms, including software engineers who work for Boeing, Amazon, and Microsoft.

Lord Des Browne, a former U.K. Minister of Defense, is concerned that even ballistic-missile submarines may be compromised by malware. Browne is now the vice-chairman of the Nuclear Threat Initiative, a nonprofit seeking to reduce the danger posed by weapons of mass destruction, where he heads a task force examining the risk of cyberattacks on nuclear command-and-control systems. Browne thinks that the cyber threat is being cavalierly dismissed by many in power. The Royal Navy’s decision to save money by using Windows for Submarines, a version of Windows XP, as the operating system for its ballistic-missile subs seems especially shortsighted. Windows XP was discontinued six years ago, and Microsoft warned that any computer running it after April, 2014, “should not be considered protected as there will be no security updates.” Each of the U.K. subs has eight missiles carrying a total of forty nuclear weapons. “It is shocking to think that my home computer is probably running a newer version of Windows than the U.K.’s military submarines,” Brown said.In 2013, General C. Robert Kehler, the head of the U.S. Strategic Command, testified before the Senate Armed Services Committee about the risk of cyberattacks on the nuclear command-and-control system. He expressed confidence that the U.S. system was secure. When Senator Bill Nelson asked if somebody could hack into the Russian or Chinese systems and launch a ballistic missile carrying a nuclear warhead, Kehler replied, “Senator, I don’t know . . . I do not know.”

After the debacle of the Cuban Missile Crisis, the Soviet Union became much more reluctant to provoke a nuclear confrontation with the United States. Its politburo was a committee of conservative old men. Russia’s leadership is quite different today. The current mix of nationalism, xenophobia, and vehement anti-Americanism in Moscow is a far cry from the more staid and secular ideology guiding the Soviet Union in the nineteen-eighties. During the past few years, threats about the use of nuclear weapons have become commonplace in Moscow. Dmitry Kiselyov, a popular newscaster and the Kremlin’s leading propagandist, reminded viewers in 2014 that Russia is “the only country in the world capable of turning the U.S.A. into radioactive dust.” The Kremlin has acknowledged the development of a nuclear torpedo that can travel more than six thousand miles underwater before devastating a coastal city. It has also boasted about a fearsome new missile design. Nicknamed “Satan 2” and deployed with up to sixteen nuclear warheads, the missile will be “capable of wiping out parts of the earth the size of Texas or France,” an official news agency claimed.

..

Russia’s greatest strategic vulnerability is the lack of a sophisticated and effective early-warning system. The Soviet Union had almost a dozen satellites in orbit that could detect a large-scale American attack. The system began to deteriorate in 1996, when an early-warning satellite had to be retired. Others soon fell out of orbit, and Russia’s last functional early-warning satellite went out of service two years ago. Until a new network of satellites can be placed in orbit, the country must depend on ground-based radar units. Unlike the United States, Russia no longer has two separate means of validating an attack warning. At best, the radar units can spot warheads only minutes before they land. Pavel Podvig, a senior fellow at the U.N. Institute for Disarmament Research, believes that Russia does not have a launch-on-warning policy—because its early-warning system is so limited.

For the past nine years, I’ve been immersed in the minutiae of nuclear command and control, trying to understand the actual level of risk. Of all the people whom I’ve met in the nuclear realm, Sidney Drell was one of the most brilliant and impressive. Drell died this week, at the age of ninety. A theoretical physicist with expertise in quantum field theory and quantum chromodynamics, he was for many years the deputy director of the Stanford Linear Accelerator and received the National Medal of Science from Obama, in 2013. Drell was one of the founding members of jason—a group of civilian scientists that advises the government on important technological matters—and for fifty-six years possessed a Q clearance, granting him access to the highest level of classified information. Drell participated in top-secret discussions about nuclear strategy for decades, headed a panel that investigated nuclear-weapon safety for the U.S. Congress in 1990, and worked on technical issues for jason until the end of his life. A few months ago, when I asked for his opinion about launch-on-warning, Drell said, “It’s insane, the worst thing I can think of. You can’t have a worse idea.”

Drell was an undergraduate at Princeton University when Hiroshima and Nagasaki were destroyed. Given all the close calls and mistakes in the seventy-one years since then, he considered it a miracle that no other cities have been destroyed by a nuclear weapon—“it is so far beyond my normal optimism.” The prospect of a new cold war—and the return of military strategies that advocate using nuclear weapons on the battlefield—deeply unnerved him. Once the first nuclear weapon detonates, nothing might prevent the conflict from spiralling out of control. “We have no experience in stopping a nuclear war,” he said.

..

Donald Trump and Vladimir Putin confront a stark choice: begin another nuclear-arms race or reduce the threat of nuclear war. Trump now has a unique opportunity to pursue the latter, despite the bluster and posturing on both sides. His admiration for Putin, regardless of its merits, could provide the basis for meaningful discussions about how to minimize nuclear risks. Last year, General James Mattis, the former Marine chosen by Trump to serve as Secretary of Defense, called for a fundamental reappraisal of American nuclear strategy and questioned the need for land-based missiles. During Senate testimony, Mattis suggested that getting rid of such missiles would “reduce the false-alarm danger.” Contrary to expectations, Republican Presidents have proved much more successful than their Democratic counterparts at nuclear disarmament. President George H. W. Bush cut the size of the American arsenal in half, as did his son, President George W. Bush. And President Ronald Reagan came close to negotiating a treaty with the Soviet Union that would have completely abolished nuclear weapons.

Every technology embodies the values of the age in which it was created. When the atomic bomb was being developed in the mid-nineteen-forties, the destruction of cities and the deliberate targeting of civilians was just another military tactic. It was championed as a means to victory. The Geneva Conventions later classified those practices as war crimes—and yet nuclear weapons have no other real use. They threaten and endanger noncombatants for the sake of deterrence. Conventional weapons can now be employed to destroy every kind of military target, and twenty-first-century warfare puts an emphasis on precision strikes, cyberweapons, and minimizing civilian casualties. As a technology, nuclear weapons have become obsolete. What worries me most isn’t the possibility of a cyberattack, a technical glitch, or a misunderstanding starting a nuclear war sometime next week. My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The “Titanic Effect” is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'

- Eric Schlosser, World War Three, By Mistake, December 23, 2016


Context

The International Day for the Total Elimination of Nuclear Weapons

          '..another Cold War that may last even longer than the war with world communism.' (no replies)        
'..until Muslim scholars find a Koran key to the free world and lead their followers to an entrance.'

'Economists pondering about human action distinguish between four types of individual incomes; the Koran permits only two, which explains much poverty in the Muslim world. Economists speak of labor income which flows from services rendered either in self-employment or working for an employer; the Koran smiles upon this basic kind of income. Economists also discern interest income which, reflecting human frailty and mortality, flows from the differences between man’s valuation of present economic goods and future goods; the Koran condemns “riba”, that is, interest income, and threatens all creditors who may be tempted to demand “riba” with “the fire prepared for unbelievers.” Economists also like to wax eloquent about entrepreneurial income, commonly called profits, which may be earned through correct anticipation of economic changes; failure to anticipate changes correctly may inflict entrepreneurial losses. The Koran simply prohibits economic activity that involves uncertainty, risk, or speculation and may earn “ghara.” The prohibition obviously discourages and hampers economic changes, adjustments, modernizations, and improvements that are uncertain and risky.

..

Muslim clerics are the tutors and preceptors not only of Islamic theology but also of social and economic ideology. Surely, they may not descend to the level of envy but may fly into anger and passion about the sinful behavior of all non-believers, that is, Christians and Jews, who grow rich in market economies, engaging in uncertain, risky, and speculative economic activity and prospering on riba and ghara. For some clerics the United States is the “Great Satan” and Israel his little offspring. It cannot be surprising that faithful followers abhor, fear, and hate the Great Satan and wish him evil. When a few Muslim fanatics flew into the World Trade Center in New York, killing more than 2,900 men and women, and another hijacked plane hit the Pentagon, killing 189 employees, jubilant masses thronged streets across the Muslim world, celebrating and rejoicing about the destruction and massacre.

..

..Today, the United States is in the early stages of a long struggle with radical Islamism that has been waging war against this country for some thirty years. Radical Islamic states have been breeding, sheltering, and financing the terrorist armies and radical clerics are invoking divine favor upon them.

The Western world, and especially the United States, is facing the prospect of a long and bitter war with a fanatical enemy. It is a desperate enemy because powerful forces of change are eroding its very ideological foundation. Modern communication technology has opened the windows of the world and is allowing people everywhere to observe Western mores and living conditions. A network of communication satellites, for instance, is continuously receiving, amplifying, and rebroadcasting signals to earth. Western ideas are reaching the minds of people everywhere and changing social, economic, political, and educational institutions. It cannot be surprising that Muslim autocracies like to keep the windows closed by monopolizing and disallowing access to such technology.

It is doubtful that the U.S. military will crush and completely render inactive a desperate enemy consisting of an organized guerilla force of Allah-fearing men and women. A small army of suicidal fanatics, a diminutive percentage of one billion and three hundred million Muslims in 206 countries, may wear away the patience and resolve of the American public and its political and military commanders. Such a possibility does not in any way intimate a victory and sway of Muslim fanatics over the forces of the West. Its paramount strength does not rest on brute military might but on its free and open way of life, its private property order and individual enterprise system. Its windows are wide open and its busy subjects are at work all over the world, simple ambassadors or even missionaries of its order. Even if the United States should ever stumble and lose its way, the windows are wide open and the bright light of individual freedom and the private property order would remain visible in many other parts of the West. It is unlikely that it can ever be extinguished.

The U.S. military is not going to conquer many Muslim countries, but individual freedom and the private property order may in time..

..

We shall know the future only when it comes. But our thoughts like to live in the future, and what they see is another Cold War that may last even longer than the war with world communism. They see the Muslim world in a crisis which causes a few revolutionaries to strike at Americans. Insurgents may continue to lash out until Muslim scholars find a Koran key to the free world and lead their followers to an entrance.'

- Hans F. Sennholz, In Another Cold War, 2004


Context

'..the battle of ideas taking place in the Muslim world..'

(Bazaarmodel - To Heal - Teal) - '..is it possible to build a truly Evolutionary-Teal school?'

          (Bazaarmodel - To Heal - Teal) - '..is it possible to build a truly Evolutionary-Teal school?' (no replies)        
'This factory-like system seems increasingly out of date. More and more people are crying out for innovation in education and starting to experiment with curricula, technologies, and governance in schools. But is it possible to build a truly Evolutionary-Teal school? And what would it look like? A superb example can be found in the center of Berlin in Germany. The “ESBZ” is a grade 7-12 school that opened its doors in 2007 with more than a bit of improvisation. Just three months before the start of the school year, the city council had suddenly given a decrepit prefabricated building from communist times to a group of pesky parents who simply wouldn’t let go of their dream. When the school year started, only 16 students were registered. A few months later, at the mid-year point, 30 more students had joined, mostly rejects and troublemakers other schools had expelled. Hardly a promising start for a new school. And yet today, only a few years later, the school has 500 students and attracts hundreds of principals, teachers, and education specialists from all over the country who want to study the ESBZ model.'

- Frederic Laloux, (Reinventing Organizations, Chapter 2.2 _ Self-management Structures), page 93


'..Yet unlike Sudbury, Montessori or Steiner schools, Rasfeld’s institution tries to embed student self-determination within a relatively strict system of rules. Students who dawdle during lessons have to come into school on Saturday morning to catch up, a punishment known as “silentium”. “The more freedom you have, the more structure you need,” says Rasfeld.

The main reason why the ESBC is gaining a reputation as Germany’s most exciting school is that its experimental philosophy has managed to deliver impressive results..'


'..At Oberländer’s school, there are no grades until students turn 15, no timetables and no lecture-style instructions. The pupils decide which subjects they want to study for each lesson and when they want to take an exam.

The school’s syllabus reads like any helicopter parent’s nightmare. Set subjects are limited to maths, German, English and social studies, supplemented by more abstract courses such as “responsibility” and “challenge”. For challenge, students aged 12 to 14 are given €150 (£115) and sent on an adventure that they have to plan entirely by themselves. Some go kayaking; others work on a farm. Anton went trekking along England’s south coast.

The philosophy behind these innovations is simple: as the requirements of the labour market are changing, and smartphones and the internet are transforming the ways in which young people process information, the school’s headteacher, Margret Rasfeld, argues, the most important skill a school can pass down to its students is the ability to motivate themselves.

“Look at three or four year olds – they are all full of self-confidence,” Rasfeld says. “Often, children can’t wait to start school. But frustratingly, most schools then somehow manage to untrain that confidence.”

The Evangelical School Berlin Centre (ESBC) is trying to do nothing less than “reinvent what a school is”, she says. “The mission of a progressive school should be to prepare young people to cope with change, or better still, to make them look forward to change. In the 21st century, schools should see it as their job to develop strong personalities.”

Making students listen to a teacher for 45 minutes and punishing them for collaborating on an exercise, Rasfeld says, was not only out of sync with the requirements of the modern world of work, but counterproductive. “Nothing motivates students more than when they discover the meaning behind a subject of their own accord.”

Students at her school are encouraged to think up other ways to prove their acquired skills, such as coding a computer game instead of sitting a maths exam. Oberländer, who had never been away from home for three weeks until he embarked on his challenge in Cornwall, said he learned more English on his trip than he had in several years of learning the language at school.

Germany’s federalised education structure, in which each of the 16 states plans its own education system, has traditionally allowed “free learning” models to flourish. Yet unlike Sudbury, Montessori or Steiner schools, Rasfeld’s institution tries to embed student self-determination within a relatively strict system of rules. Students who dawdle during lessons have to come into school on Saturday morning to catch up, a punishment known as “silentium”. “The more freedom you have, the more structure you need,” says Rasfeld.

The main reason why the ESBC is gaining a reputation as Germany’s most exciting school is that its experimental philosophy has managed to deliver impressive results..

..

Aged 65 and due to retire in July, Rasfeld still has ambitious plans. A four-person “education innovation lab” based at the school has been developing teaching materials for schools that want to follow the ESBC’s lead. About 40 schools in Germany are in the process of adopting some or all of Rasfeld’s methods. One in Berlin’s Weissensee district recently let a student trek across the Alps for a challenge project. “Things are only getting started,” says Rasfeld.

“In education, you can only create change from the bottom – if the orders come from the top, schools will resist. Ministries are like giant oil tankers: it takes a long time to turn them around. What we need is lots of little speedboats to show you can do things differently.” '

- Philip Oltermann, No grades, no timetable: Berlin school turns teaching upside down, July 1, 2016


Context

(To Heal - Teal - Bazaarmodel) - Striving for wholeness '..We have let our busy egos trump the quiet voice of our soul; many cultures often celebrate the mind and neglect the body..'

(Bazaarmodel - To Heal - Teal) - 'Your physical .. cultural .. soul heredity..'

(To Heal) - Overview of Focus Levels '..to areas of greater free will choice.'


(To Heal) - Overview of Focus Levels '..to areas of greater free will choice.'

          '..Russia .. cyberpower proved the perfect weapon .. political sabotage..' (no replies)        
' “We’d have all these circular meetings,” one senior State Department official said, “in which everyone agreed you had to push back at the Russians and push back hard. But it didn’t happen.”

..

Mr. Putin, a student of martial arts, had turned two institutions at the core of American democracy — political campaigns and independent media — to his own ends..

..

..The Russians clearly had a more sophisticated understanding of American politics, and they were masters of “kompromat,” their term for compromising information.

..

..the hackings of the State Department, the White House and the Pentagon..

..

What seems clear is that Russian hacking, given its success, is not going to stop. Two weeks ago, the German intelligence chief, Bruno Kahl, warned that Russia might target elections in Germany next year. “The perpetrators have an interest to delegitimize the democratic process as such,” Mr. Kahl said. Now, he added, “Europe is in the focus of these attempts of disturbance, and Germany to a particularly great extent.” '



'..the White House’s reluctance to respond forcefully meant the Russians have not paid a heavy price for their actions, a decision that could prove critical in deterring future cyberattacks.

..

..President Vladimir V. Putin of Russia moved beyond mere espionage to deliberately try to subvert American democracy and pick the winner of the presidential election.

..

..A low-cost, high-impact weapon that Russia had test-fired in elections from Ukraine to Europe was trained on the United States, with devastating effectiveness. For Russia, with an enfeebled economy and a nuclear arsenal it cannot use short of all-out war, cyberpower proved the perfect weapon: cheap, hard to see coming, hard to trace.

..

The United States had two decades of warning that Russia’s intelligence agencies were trying to break into America’s most sensitive computer networks. But the Russians have always managed to stay a step ahead.

Their first major attack was detected on Oct. 7, 1996, when a computer operator at the Colorado School of Mines discovered some nighttime computer activity he could not explain. The school had a major contract with the Navy, and the operator warned his contacts there. But as happened two decades later at the D.N.C., at first “everyone was unable to connect the dots,” said Thomas Rid, a scholar at King’s College in London who has studied the attack.

Investigators gave it a name — Moonlight Maze — and spent two years, often working day and night, tracing how it hopped from the Navy to the Department of Energy to the Air Force and NASA. In the end, they concluded that the total number of files stolen, if printed and stacked, would be taller than the Washington Monument.

Whole weapons designs were flowing out the door, and it was a first taste of what was to come: an escalating campaign of cyberattacks around the world.

..

The Russians were also quicker to turn their attacks to political purposes. A 2007 cyberattack on Estonia, a former Soviet republic that had joined NATO, sent a message that Russia could paralyze the country without invading it. The next year cyberattacks were used during Russia’s war with Georgia.

..

Mr. Obama was briefed regularly on all this, but he made a decision that many in the White House now regret: He did not name Russians publicly, or issue sanctions. There was always a reason: fear of escalating a cyberwar, and concern that the United States needed Russia’s cooperation in negotiations over Syria.

“We’d have all these circular meetings,” one senior State Department official said, “in which everyone agreed you had to push back at the Russians and push back hard. But it didn’t happen.”

..

Last year, the attacks became more aggressive. Russia hacked a major French television station, frying critical hardware. Around Christmas, it attacked part of the power grid in Ukraine, dropping a portion of the country into darkness, killing backup generators and taking control of generators. In retrospect, it was a warning shot.

..

..CrowdStrike’s nicknames for the two Russian hacking groups that the firm found at work inside the D.N.C. network. Cozy Bear — the group also known as the Dukes or A.P.T. 29, for “advanced persistent threat” — may or may not be associated with the F.S.B., the main successor to the Soviet-era K.G.B., but it is widely believed to be a Russian government operation. It made its first appearance in 2014, said Dmitri Alperovitch, CrowdStrike’s co-founder and chief technology officer.

..

Only in March 2016 did Fancy Bear show up — first penetrating the computers of the Democratic Congressional Campaign Committee, and then jumping to the D.N.C., investigators believe. Fancy Bear, sometimes called A.P.T. 28 and believed to be directed by the G.R.U., Russia’s military intelligence agency, is an older outfit, tracked by Western investigators for nearly a decade. It was Fancy Bear that got hold of Mr. Podesta’s email.

..

It was bad enough that Russian hackers had been spying inside the committee’s network for months. Now the public release of documents had turned a conventional espionage operation into something far more menacing: political sabotage, an unpredictable, uncontrollable menace for Democratic campaigns.

..

Julian Assange, the WikiLeaks founder and editor, has resisted the conclusion that his site became a pass-through for Russian hackers working for Mr. Putin’s government or that he was deliberately trying to undermine Mrs. Clinton’s candidacy. But the evidence on both counts appears compelling.

..

Mr. Putin, a student of martial arts, had turned two institutions at the core of American democracy — political campaigns and independent media — to his own ends. The media’s appetite for the hacked material, and its focus on the gossipy content instead of the Russian source, disturbed some of those whose personal emails were being reposted across the web.

..

In late 2014, hackers working for Kim Jong-un, the North’s young and unpredictable leader, had carried out a well-planned attack on Sony Pictures Entertainment intended to stop the Christmastime release of a comedy about a C.I.A. plot to kill Mr. Kim.

In that case, embarrassing emails had also been released. But the real damage was done to Sony’s own systems: More than 70 percent of its computers melted down when a particularly virulent form of malware was released. Within weeks, intelligence agencies traced the attack back to the North and its leadership. Mr. Obama called North Korea out in public, and issued some not-very-effective sanctions. The Chinese even cooperated, briefly cutting off the North’s internet connections.

As the first Situation Room meetings on the Russian hacking began in July, “it was clear that Russia was going to be a much more complicated case,” said one participant. The Russians clearly had a more sophisticated understanding of American politics, and they were masters of “kompromat,” their term for compromising information.

..

..code was put out in the open by the Russians as a warning: Retaliate for the D.N.C., and there are a lot more secrets, from the hackings of the State Department, the White House and the Pentagon, that might be spilled as well. One senior official compared it to the scene in “The Godfather” where the head of a favorite horse is left in a bed, as a warning.

..

As the year draws to a close, it now seems possible that there will be multiple investigations of the Russian hacking — the intelligence review Mr. Obama has ordered completed by Jan. 20, the day he leaves office, and one or more congressional inquiries. They will wrestle with, among other things, Mr. Putin’s motive.

..

Did he seek to mar the brand of American democracy, to forestall anti-Russian activism for both Russians and their neighbors? Or to weaken the next American president, since presumably Mr. Putin had no reason to doubt American forecasts that Mrs. Clinton would win easily? Or was it, as the C.I.A. concluded last month, a deliberate attempt to elect Mr. Trump?

In fact, the Russian hack-and-dox scheme accomplished all three goals.

What seems clear is that Russian hacking, given its success, is not going to stop. Two weeks ago, the German intelligence chief, Bruno Kahl, warned that Russia might target elections in Germany next year. “The perpetrators have an interest to delegitimize the democratic process as such,” Mr. Kahl said. Now, he added, “Europe is in the focus of these attempts of disturbance, and Germany to a particularly great extent.” '

- Eric Lipton, David E. Sanger and Scott Shane, The Perfect Weapon: How Russian Cyberpower Invaded the U.S., December 13, 2016


Context '[Russia] may become a threat to the world. That is the worst thing that could happen to Russia.' - Yegor Gaidar

'..Russian strategy of hybrid influence and destabilization .. German Council on Foreign Relations.'

'German intelligence says Russia is trying to destabilize German society..' - '..war that Moscow is waging against the West..'

'[Putin is doing] anything that can and will expand Russian influence to U.S.S.R.-era levels of power.'


'..Zero tolerance for Russian intrusions .. Estonia .. policy of publicly naming or prosecuting spies..'

'..the Soviet Union was cut off from Western financial markets and was effectively under permanent sanctions..'

          Links der Woche, 23. Oktober 2011        
Responsive Webdesign kann er auch, der Werkzeugkasten Foundation 2.0 » t3n News Technisch sehr interessantes Web-Framework Four ways Steve Jobs influenced intranets – Intranet & Digital Workplace Strategies – NetJMC Leicht irreführender Titel, guter Artikel Amazon Helps Cement HTML5’s Place in the Future of Publishing Auftrieb für HTML5 Pressemeldungen von Rechtsanwalt Dominik Boecker – Köln ... weiterlesen
          TOT/TDW and other peace corps acronyms        
Quiche dinner in the transit house Those of us who are helping with training this summer/rainy season are in Yaounde this week and next for the TDW (Training Design Workshop) and TOT (Training of Trainers). Gabe and I are here designing the technical training sessions for the 5 incoming computer literacy trainees as well as working [...]
          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          QR Codes for Vocabulary        


Matt Bergman, at Learn, Lead, Grow, shared a great post on ways to use QR Codes to teach and retain vocabulary.  I love the ideas of engaging students with technology to teach this skill.  Check out all his ideas at his blog:

3 Ways to Use QR Codes to Make Word Walls Assessable to ALL Students #UDL



Share this
Do you know somebody else who would find this post interesting or useful? Please forward it to them. Did somebody forward this post to you? Visit Teaching All Students and subscribe to receive posts for free. If you need a RSS Reader please visit this post Google Reader Replacements.

          Google Classroom for SPED        

Google Classroom is a new offering for districts who use Google Apps for Education (GAFE).  Classroom is a combination of Edmodo and Doctupus; part social network and part document manager.  Once Classroom is enabled you are able to create classes and invite your students to join.  Google creates a folder in your Drive, a place for you to upload and/or create documents to share with those students.  From the main Classroom page you have options for posting Announcements or create assignments.  Assignments can be linked to a Drive Document, Youtube video, weblink or you can attach a file.  Students can then complete the work and turn it in via Classroom.  When using Google Docs you have the option to allow students to view the document, edit one document or it will create a separate document for each student.

For self-contained teachers this immediately solves issues with distributing and collecting Google Doc files.  It's also a place for students to communicate questions with their classmates or you.  While the interface is limited and the themes are pretty basic, I think the potential for this product is astounding.

From my new perspective of a push-in support teacher, I see this as a way to push out modified assignments to students.  Part of our new reading curriculum involves discussion guides and we, as a special education team, are considering modifying them so they are Google Docs.  This would give me a way to push out specific docs, to specific students easily.  I also think giving students a place they can post questions might be useful, especially students who may not want to speak up in class.  I can see it as a way for those students to contact me when we are not together in class.

I'm going to continue to give it a try, and see if there are other ways it can be utilized.  I'd love to hear some of your thoughts on using Google Classroom.  This week Google opened it all users with GAFE account, but there is one caveat.  You and your students must be on the same domain.  This is actually a problem in my district, my email ends in "d57.org" and our students are "students.d57.org" so I cannot create a Classroom unless I have a different login.  This is frustrating, but Google is aware and hopefully they will fix it in the near future.



Share this
Do you know somebody else who would find this post interesting or useful? Please forward it to them. Did somebody forward this post to you? Visit Teaching All Students and subscribe to receive posts for free. If you need a RSS Reader please visit this post Google Reader Replacements.

          Embrace the Shake        



It's been almost 5 months since I've actually sat down and written for this blog.  It's also been over 6 years since I put down my first post.  Over the past 6 years I've shared a lot of information, but it's also been a place for me to reflect.  Something I've missed the past year.  It's interesting, the reason I'm writing this post is because of a video I watched recently.  I'm a fan of TEDTalks and a colleague shared this one with me:

Phil Hansen:  Embrace the Shake

Within the first 2 minutes, I realized that this talk made sense to me.  I had difficulties in my new position and I gave up this blog.  I gave up something that has connected me to so many others and so many experiences.  I'm hoping that this year I can, as Phil says, embrace the shake.  I am starting another new position.  I'll continue in my role in Assistive Technology, but now I'll be (for the first time ever) in a resource special education position.  I've never done anything but self-contained, and while this was something I never thought I would do, I'm looking forward to it.  Whether it's the challenge or just the change I am going in with a lot of new ideas.

I don't know exactly how this will change this blog, but I do know that I am going to keep posting my ideas.  I'll be sharing my thoughts and hopefully getting some feedback!  Take a few minutes and watch Phil, maybe it will inspire you to embrace the shake



Share this
Do you know somebody else who would find this post interesting or useful? Please forward it to them. Did somebody forward this post to you? Visit Teaching All Students and subscribe to receive posts for free. If you need a RSS Reader please visit this post Google Reader Replacements.

          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          weekly Diigo Post (weekly)        

Posted from Diigo. The rest of my favorite links are here.


          Three days in Berlin (or improving the pim user experience)        

KDE Project:

Last weekend I've met with some of our old timer KDEPIM developers and some of the newer ones who are interested in KDEPIM or related technologies in the KDAB offices in Berlin.
Being a KDAB employee for a few years already (wow, time is passing quickly), the place was familiar, the people looked familiar. The foosball table was slightly familiar, although some players changed their dresses in order to spread confusion inside the visitor's heads. That is the only reason we've lost against locals with 5-0, 5-0.
Suprisingly enough, the table wasn't used that much. Why? Because people were busy either working and talking. What they talked about I don't know too much, as I focused on some issues I planned to fix, but others can testify that Volker did not sit too much in front of his computers, but was dragged from one place to another for various discussions.
Most of us started on Friday around noon. I won't tell too much about what others did, that is mostly their problem. Especially if they were on the other side of the room and I didn't saw their screens, I can't tell if they worked at all or not. They looked like they did though. ;) I can share some things about what some sitting nearby did. See later.
As recently I became the de-facto maintainer and bugfixer for mail filters, I worked mostly on them. Unfortunately the first attempt to fix a bug failed: a bug that bothers me, although it is not the most reported one. It is about mails not being filtered for a while after a resume from hibernation. It is hard to reproduce, and although I run into it, I couldn't reproduce reliably enough and in a way I can debug it. After fighting with it and realising it won't work, I gave up. See you next time.
Meantime we had some excellent food in an Indian restaurant, then when finally everybody arrived (almost everybody to be honest, plus even some more from KDAB who didn't sign up, but show up there), we were ready to start with presenting the kdepim and Akonadi architecture. Old time pimsters Volker Krause, Kevin Krammer and Tobias Koenig helped me with it, and sometimes saved me, as my knowledge in some area proved to be superficial. We ended up with a pretty impressive drawing on the whiteboard:
Hopefully for those being on site it was understandable.

Time passed, so we went out for dinner to a Greek restaurant at the corner. Nice place, third time being there, good food (seems Berlin has only good eating places). We even saw how Germany won over Ireland. Too bad Steveire (Stephen Kelly) was not there... We continued with some more talks and hacking, then everybody went to their sleeping places.
Some left earlier, some later waiting for remote developers to show up and discuss the patches (he didn't show up).

Day 2
Next day started around 9 o'clock for some. Later for others. I continued with the filter debugging and fixing. I looked at the bugreports and tried to come up with some bugs that are both would help the users and myself. I'm selfish, I want to fix the bugs I run into. ;) One problem that bothered me for a long time is that email content from online IMAP is downloaded even if no filter for IMAP requires it (but a filter for e.g POP3 needs the full content). Now this is fixed and those who use online imap could notice a great speedup in mail syncing (depending on their filter setup). Another often reported issue was duplicating the mails, especially after spam filtering. You've ended up with a mail in the spam folder and a mail in the original place. This could be combined with a conflict dialog shown up as well for that mail. This problem actually revealed a not-well handled case down inside the Akonadi stack that was created by a reordering of filter commands in the filtering code. For those who want technical details: if there was a move action (like "move mail to spam folder") followed by a modify action (like "mark as read"), the filter reordered this to "mark as read" followed by a move. Unfortunately this exposed two problems, (mostly, but not only) IMAP specific: on IMAP you can't modify a mail, instead you create a new one and delete the old. What happened here is that a filter changed the mail (run through bogofilter/spamassasin), then the "mark as read" action was executed, which uploaded the changes, including the changed mail to the IMAP server. This caused a new ID for the item on the IMAP server. The mail with the old ID was deleted. Then the filter agent performed a move, but he had only the *old* ID, before the modifications. The move - if performed between two different resources, like IMAP and local maildir - is technically a copy followed by a delete. The copy worked fine, but the delete didn't. It tried to delete the old mail again (which was gone), not the modified version. That's how you ended up with a duplicate.
The current solution is to reorder the filtering pipeline, so the move is performed before the flag modifications. The extra benefit is that the filtered message is not uploaded again just to be deleted the next second. Speedup, less network traffic, better user experience. This doesn't fix the main problem with Akonadi, but it is an acceptable workaround. The reordering is so far only in the master branch (KDE 4.10), but the relevant code will be backported to the 4.9 branch, so it will be in 4.9.3.
And speaking of conflicts, that was the next hot topic, and one of the often reported bugs. It was mostly caused by conflicting flag changes (read/spam/important/etc), either caused by KMail itself plus the filtering or just KMail. After some discussion we agreed, that reporting conflicts on flag changes doesn't make sense, so we should not bother the user. It is not data loss, and in worst case some flag is reset. In normal case nothing wrong happens, as Akonadi is able to merge two changes in the flags (or so claims Volker).
I have to admit that this fix was not completed at the sprint, I finished it today, as I noticed more code in KDEPIM that didn't disable conflict check on flag changes.
While doing the changes, I did quite some refactoring, cleaning up the code as much as I could do for the parts I touched. The code was originally deep inside KMail (as most of other code), got extracted from it for 4.8.0, and now we are at the stage that we can make the extracted code more cleaner, we can remove some things that doesn't make sense anymore now that the filtering is not inside KMail.
While reading the bug reports, I also run into one indicating that mails arriving to an MBOX account (like /var/spool/mail/username) are not filtered automatically. Sounds like an easy bug to fix and so was it. Now they are filtered.
Finally another annoying issue was fixed: there was no indication that filtering is ongoing. Now when this happens, you can see in the KMail's progress bar.
The net result of the above: faster filtering, less annoying and useless error dialogs for the users. And according to bugzilla, 31 bugs less (some were duplicates though).

Nepomuk...one of the things that, well, so far I was always recommending for users to turn off. Slight detour here: what is Nepomuk and its relation to KMail? Nepomuk helps you to find data. It indexes all kind of data and with some queries you can find e.g every file where my name is mentioned, all email addresses from any file, etc. There is a process that goes through the akonadi data (emails, calendars, etc) and "feeds" to it for Nepomuk to be indexed. Then there are queries and code in KMail accessing Nepomuk: getting email addresses for composer's autocompletion, searching inside mail bodies, tagging your emails with custom tags, etc.
Unfortunately there are problems around it. One is that some queries ae processed quite slowly, that in turn slows down KMail, leading to poor user experience. E.g switching between mails, sending mails, etc. is slow. Or startup is slow or even blocked. I tried to fix the last part as I just run into it, but as this was my very first Nepomuk related patch, I'm not sure 100% succeeded. We found a problem with the Nepomuk API itself, and I informed Vishesh, the Nepomuk developer about it (even if I used non-blocking calls against Nepomuk, one call is blocking without question). He suggested something I might try later, although I'd be more happier if somebody with real Nepomuk knowledge could give a review of the pim Nepomuk usage.
Then there is the Akonadi feeder, that gives the data to Nepomuk. Something is not perfect there and the indexing causes a serious slowdown, where either itself or Nepomuk (actually its storage backend, virtuoso) starts to use the CPU *a lot*. This is the main reason I recommend to users to disable Nepomuk so far. We had Christian Mollekopf the author of the feeder in the sprint, and he worked on some optimizations. Hopefully this will improve the situation. Meantime we (and I) tried to convince Vishesh to use KMail, so he can see himself the problems our users face.

As a break we had another presentation, this time about KMail itself, what components make up KMail, how they are distributed. As far as I saw, this was less interesting to the audience, they rather looked at their computers and hacked on something. Luckily our KMail maintainer, Laurent Montel, is super active, but I wouldn't mind more contributors. Too bad he wasn't at the sprint.

We had a lunch at a nearby place, nothing extra, but the food was (again) good.

What did other do? Let's see what I can remember... Sune dreamed about crypto stuff and composite jobs. He worked on making some cryptographic code asynchronous and started to get faimiliar with kdepim code. I'd not say he picked up the easiest job.
Volker run around all the time, discussed various things like "spanish sync" with Alex Fiestas (see here), database backends with Martin, change recorder with David Faure (who remotely joined the meeting and got lost inside the change recorder code ... he has the solution now in his head, so be patient, we will end up with a better implementation for it that again speeds up Akonadi), job pipelines with me, and who knows what with others, as for a long time he just disappeared with a bunch of developers. They actually ended up in the lobby discussing "stuff". Milian Wolf, who is not (or not yet?) a KDEPIM developer, but mainly a KDevelop one, joined us and used massif to track down some ugly memory usage in KMail. And he did a good job in it. Previously KMail used more and more memory as you navigated between large folders (Alex mentioned some 2GB for him), while now it levels up at one point and doesn't increase. He might blog himself about, as he has also some nice graphs.
Then there were two guys from KDAB, who are old time pim developers (quiz: find their names in this blog), but they cooked something else, not related to KDEPIM, not related concretely to KDE, but to a lower level: to Qt. It is an amazingly cool stuff, but I don't want to give more details. Expect it to be presented a the Qt Developer Days, either in a talk or at the KDAB booth. Don't worry, I'm pretty sure it will be freely available what they did and KDE can enjoy it in the future.
I'm sorry that I don't remember what the rest did. In general I know that Martin Klapetek worked on the social network resources, Mark Gaiser, who recently started to work on KDEPIM stuff eagerly listened to our presentations and worked on a QML calendar application, Alex kept reporting bugs and discussed improvements with Volker, while John Layt, the "timezone KDE guy" worked on plasma calendar related issues.
As a KDE person Chani also joined us for a while, we quickly nominated her as the QML and Plasma person, so all questions related to them were immediately redirected to Chani. Jos Poortvilet was also supposed to join for some talks, but he could show up only on Sunday for personal reasons.
At the end of the day everybody was so busy, so instead of going out for eating, we just ordered some pizza. And most of us stood in the office well past midnight.

Day 3
Well, the above partially happened on Sunday. It was a shorter day for me, due to the late night standup before, and that I had to go to the airport after lunch. A lunch that wasn't exactly as planned. We went out for a Doner Kebab place that is supposed to be the best one in Berlin. It is just a small kiosk on the sidewalk in a street, but man, there was a big queue for it. On a Sunday! Locals says it is worse on weekdays. Even after almost an hour, we still had 10 persons in front of us, my departure time was approaching, so I gave up and instead bought some (quite good) chinese fast-food from a nearby place, then rushed to the airport.
A long journey awaited me with a 3 hour stopover in Munich, but luckily I had a power supply there and even some network (they offer 30 minutes/day/phone number), so I could continue on the work I started at the sprint. After flying and driving another 2.5 hours, I arrived late (or rather early) morning next day back home, and after sleept until around 10. Then I started to work again for KDAB, a work that is just as enjoyable as working for KDE. After all, the two communities has a serious overlap. ;)
That's from the sprint. If you'll be at the Qt Developer Days Europe, we might meet there. I'm looking forward for a good conference.


          Akonadi misconception #1: where is my data?        

KDE Project:

I regularly see the same misconception and fear popping up on the mailing lists, bug reports and IRC: if the Akonadi database gets corrupted, I will lose my data.

To make it clear from the beginning: the Akonadi database is NOT your MAIN data storage.
Even if it gets destroyed, removed, your data is still safe.

So what is the database?

1) It is an interface: the Akonadi server and the underlying database is a common interface to your (PIM-alike) data for different applications, so those applications do not have to deal with the data files directly.

2) But I see my email headers and even the body in the database and in $HOME/.local/share/akonadi/file_db_data. Why? Because the database is also a cache towards your data. Common, frequently accessed parts (like e-mail headers) are stored in the database. These are usually stored permanently and kept in sync with your original data source (IMAP folders, mails on the local disc).
Parts requested infrequently are either stored in the database or in the above folder. The actual place is decided upon the size of the data. These parts are from time to time cleaned up from the cache, if they were not used for a certain period of time. Technically it is possible to configure when the cache is cleaned or if it is cleaned at all, but the regular user should not have to deal with it.

3) Is there anything I might lose by deleting the database? Yes, there is, and that is the metadata added to your data. That can be anything extra information that cannot be stored in the format of your data, like Nepomuk tags or other custom information. In case of emails, you might think that read/forwarded/etc. can be lost. Luckily this is not the case (since KDE 4.7.2), as the email storage formats can store these informations natively.

The above explains why you will not lose any critical information by losing your akonadi database.

Good, but where is my data if not in the database? This depends on what kind of data we are talking about.

1) E-mail: in case of IMAP (online or disconnected) your data is on the IMAP server. With disconnected IMAP there are windows when your local cache contains data that is not yet syncronized to the server, deleting the local cache in this case indeed will make you lose the unsynchronized files. This is not Akonadi specific though, this is true for any disconnected IMAP client.
In case of POP3, the mails is stored immediately after download in a local maildir folder. The actual place of the folder depends on your configuration, it can be just as $HOME/Mail, as $HOME/kde./share/apps/kmail/ or $HOME/.local/share/.local-mail (for new installations).

2) Calendars and contact information: they can be either on a server (Kolab server, LDAP server) and only cached in Akonadi as explained, or they can be in local vcard or .ics file. The actual location of these files again depends on your setup. The new standard place for them is $HOME/.local/share/contacts.

Still there were reports of data losing, why? Unfortunately programmers are not perfect and introduce bugs in the codebase. One of the most severe bugs caused real data losing when copying mails from one folder to another. This is fixed with KDE 4.7.2+ and any recent Akonadi server. There are other bugs around, but none will cause losing your original data files.

Finally, what will happen if the database gets corrupted? Of course, it needs to be recreated. You can try by shutting down akonadi server (akonadictl stop), removing the $HOME/.local/share/akonadi and syncronize all your resources again (this will take some time). If the database is not recreated, you need to do a full cleanup by removing also the configuration files under $HOME/.config/akonadi.
Then you need to add back your resources (IMAP/POP3/contact files/etc) and syncrhonize them. In case of emails, you need to check your filters, they most probably try to move the mails into a wrong folder.
Yes, this is a lot of work and should be avoided as much as possible, but it should be done only in the rare case of real database corruption.

I hope this will clear some confusion about the data storage inside Akonadi.

And a few word about the database itself.
We use MySql. I don't know the original reason why it was picked up (ask Volker about that ;) ), but I know some people don't like it for whatever reason.
Most of them try to use SqLite. A friendly warning: don't. This is explained also in the akonadi wiki. All what is written there is true, and I experienced myself as well.
Unfortunately recently I learned that MySQL has some severe issues in certain cases: NFS mounted home directories and failed suspend/resume. In these cases the database gets corrupted (this is a MySQL bug!), and cannot be easily restored. I did not experience this corruption myself, but was reported from time to time.
What remains is trying another database server, namely PostgreSQL. Akonadi supports it, it is possible to change the database backend in the akonaditray or in the akonadiconsole application. Changing backends means importing all your data again to the database, like you'd start from scratch. PostgreSQL support is not that well tested, so expect some rough edges, but we would like to see people try it out and reporting their experience with it.
It is my personal opinion only, but if PostgreSQL proves to work fine, we might switch to that as the default backend, given the problems with MySQL.

What about other database backends? There were plans to use Virtuoso, to reduce the number of database severs needed for a KDE desktop, but the work was not completed. See the techbase aritcle.

UPDATE: Christophe Giboudeaux raised a point about PostgreSQL, that their database format changes between major releases in an incompatible way and there is no automated, easy way for upgrade (you need to dump it with the old version and import with the new one). Sad, that there is no perfect solution.


          Chrome: good and bad news        

KDE Project:

Maybe you already know, maybe you don't: Google created its own browser, called Chrome. The good is that it is based on WebKit, thus contains KDE technology. That's is another recognition for the work of KDE developers. The bad is that they mention Apple's WebKit and nothing about KDE/khtml. Sad. :(
See http://googleblog.blogspot.com/2008/09/fresh-take-on-browser.html .


          Around the Globe - Fundación Todo Mejora supports LGBT youth        

Todo Mejora means “it gets better”—and it’s this message that the Chile-based nonprofit has worked tirelessly to advocate for. In the wake of continual LGBT discrimination around the world, Fundación Todo Mejora strives to support the LGBT adolescents who face discrimination, including those considering committing suicide. Chile has one of the highest levels of suicide and school violence in Latin America. It’s projected that if nothing is done, in four years, one adolescent in Chile will end his or her life  nearly each day—an astounding metric that Fundación Todo Mejora hopes to change.1,2

Continuing  with our series about impactful organizations using Google for Nonprofits tools, this week we’re highlighting how Fundación Todo Mejora uses technology to spread its message and creates a safe space for these teenagers to find refuge in times of need.

Showing up when searching for help—Google Ad Grants

By implementing a strategic campaign using Google Ad Grants, the nonprofit targeted Google searches common to suicidal thoughts such as “I want to commit suicide”, “Who should I call if I want to kill myself?”, or “Help me, I want to die”. When a local person searches this on Google, Fundación Todo Mejora’s ads show up to intervene with supportive messages, and provide links to resources to find help. One 19-year-old girl who found support from these ads said, "Amidst my depression, I Googled how to commit suicide. Your foundation, ’Todo Mejora,’ popped up in my search results. It made me smile and reminded me the reason to go on.”

These ads have allowed Fundación Todo Mejora to save lives and navigate people to their website where they can find resources and support. As a result, website traffic increased by 20% in one year alone, which means the organization found a way to reach more people in need. This increase also prompted Fundación Todo Mejora to expand their suicide hotline support to 30 hours/week up from 7 hours/week.

Spreading the word—YouTube

To further increase visibility, Fundación Todo Mejora created a YouTube channel where adolescents share their personal stories, which have helped create a community of support, coupled with the call-to-action overlays inspiring others to follow suit, take initiative, and send donations. In their most popular video, with over 62,000 views, Demi Lovato speaks out against homophobic and transgender bullying and encourages victims to reach out for help.

TODO MEJORA - Demi Lovato, cantante

Storage & syncing—G Suite

Fundación Todo Mejora now uses G Suite exclusively for all its day-to-day operations, relying on Gmail, Google Drive, and Google Calendar to work productively. The unlimited user accounts and 30GB of storage per user has saved them time and money that once went towards paying for other storage products. Now, they can save important data in a shared and collaborative space which has helped them streamline their processes, preserve historical documents, and improve communication.

With more time, funding, and organizational processes, Fundación Todo Mejora can focus on expanding their support for youth in need and the LGBT community. Read more about their story on our Community Stories page on our Google for Nonprofits site.

To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours free access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.

Footnote:  Statements are provided by Nonprofits that received products as part of the Google for Nonprofits program, which offers products at no charge to qualified nonprofits.

1 OECD (2016). Low Performing Students: Why They Fall Behind and How To Help Them Succeed. PISA. OECD Publishing. Paris

2.Ministerio de Salud de Chile (2013). Situación Actual del Suicidio Adolescente en Chile, con perspectiva de Género [Current Situation of Adolescent Suicide in Chile, with a gender perspective]. Programa Nacional de Salud Integral de Adolescentes y Jóvenes. Chile.


          G4NP Around the Globe - Zooming in on Action Against Hunger        

Every dollar and minute count to further your cause and focus on your mission. We’re pleased to highlight nonprofits who were able to make greater impact with fewer resources by using Google tools—from G Suite to Google Ad Grants–made available through Google for Nonprofits (G4NP) at no charge.

Varying in size, scope, and timezones, these nonprofits from around the world share one thing in common: utilizing the G4NP suite of tools to help their specific needs. G4NP offers nonprofit organizations across 50 countries access to Google tools like Gmail, Google Calendar, Google Ad Grants and more at no cost. This week, we’ll take a look at how the nonprofit Action Against Hunger utilizes these tools to increase productivity, visibility, and donations,  in order to improve lives in  the communities they serve.

Action Against Hunger

In 2016 alone, Action Against Hunger provided nourishment to over 1.5 million starving children(1). In order to save lives with nutritional programs, Action Against Hunger looked to Google for aid—not for food, but for technology. Action Against Hunger now utilizes five Google technologies that have drastically improved their ability to save lives around the globe.

Raising Awareness with Google Ad Grants & Analytics

For major international emergencies, like the Ebola outbreak or the South Sudan famine, Action Against Hunger needs a way to inform people and recommend ways to get involved. With Ad Grants, the nonprofit activates targeted keywords relating to the crises to drive people to their page and empower them to take action. Google Analytics then allows them to track their effectiveness and adjust accordingly to increase engagement and improve their fundraising techniques. With this data-driven strategy and the tools’ ability to optimize campaigns, Action Against Hunger has nearly doubled funding year-over-year. In fact, Ad Grants brought 158,000 people to their website in the past year alone, raising $66,000 which is equal to treating 1,466 hungry children.

Ad Grants brought 158,000 people to their website in the past year alone, raising $66,000 which is equal to treating 1,466 hungry children.

Increasing Productivity with G Suite

When working with a global network and managing hundreds of programs abroad, collaboration and communication are key. After experiencing unnecessary latencies in their operations, Action Against Hunger has since adopted G Suite which streamlined their workflow. The nonprofit is especially fond of Gmail, Hangouts, and Drive where Action Against Hunger employees can message each other quickly, share files securely, and collaborate on Docs in real-time—avoiding duplication of efforts and saving time.

Fundraising with One Today & YouTube

To drive donations and expand awareness to broad audiences, Action Against Hunger uses One Today, a Google app that allows users to easily donate $1 or more towards causes they care about. Campaigning on One Today on World Food Day in 2016,  Action Against Hunger raised more than $1,200 in support of their cause with each dollar going directly helping those in need. Additionally, Action Against Hunger creates and shares content on YouTube to reach their global audience, and is  beginning to use the YouTube donation cards to further increase donations. The large exposure and website referrals from both YouTube and Google+ helped Action Against Hunger raise over $20,000.

Using Google products Action Against Hunger gained extra time and energy to focus on what really matters: feeding the hungry.

To read more about Action Against Hunger’s story and learn how they used Google tools so effectively, visit our Google for Nonprofits Community Stories page. Stay tuned in the coming weeks for more inspirational stories about nonprofits using technology to help their cause.

To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours free access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.

Footnote:  Statements are provided by Nonprofits that received products as part of the Google for Nonprofits program, which offers products at no charge to qualified nonprofits.



          Unlocking G Suite for Nonprofits: Improve internal workflow and communication        

Whether you have a team of five or 500 a seamless, collaborative workflow is critical in the digital age. Our goal is to make sure that your nonprofit is able to focus on changing the world by using technology to save time -- not waste it. In the digital age though, information sharing can often be complex; your team might not work in the same office, or even the same timezone. Some team members might be in an office with computer access, while others are in the field on mobile devices. Who from your team should be able to access confidential documents?

This brings us to a key question: How do you empower team members to work together towards a common goal, and use technology to enable it?

Great question. We’d like to introduce you to G Suite - (formerly  Google Apps for Work ). G Suite aims to help teams work together in real-time -- no matter where they are in the world.

Today, we’re spotlighting a few nonprofits to share how their teams  are using Google tools and apps to improve workflow and internal communication.

Mercy Beyond Borders - Internal Communication with Sheets & Sites

Mercy Beyond Borders (MBB) is a U.S. nonprofit that aims to forge opportunities for women and girls in extreme poverty to learn, connect, and lead. Utilizing a small office in the U.S. as home base, MBB targets rural areas in Haiti and South Sudan. In both of these areas, cultural norms and poverty prohibit full participation of women. In fact, these areas offer minimal education and opportunities for employment, which often  impedes the development of leadership skills or positions. Mercy Beyond Borders focuses its programs on providing trainings, scholarships, leadership camps, and business loans for women.

To achieve their mission, Mercy Beyond Borders faces the challenge of balancing US-based operations with field work in remote areas like South Sudan and Haiti. Their nonprofit partners range from large organizations to local schools to individuals. So how does Mercy Beyond Borders ensure that all staff, vendors, and partners stay connected and working together in sync?
MBB-trained nurse in South-Sudan village
MBB-trained nurse in South Sudan village. Photo credit: Mercy Beyond Borders

Mercy Beyond Border began using G Suite to streamline its workflow, connecting their team across the globe. Using G Suite, MBB’s team is able to access, share, and collaborate together in real-time. Take a glimpse into how they do it:

  • Track Finances: MBB manages their overseas program budget expenditures in Google Sheets. Using this tool, the domestic office tracks monthly vendor payments in Haiti. This enables the staff to wire more money as needed in order to ensure program success. Additionally, using Sheets enables the team to provide transparency in the organization, clarifying spending and creating a simple overview of total annual expenses. This standardized and collaborative approach to data enables better efficiency and communication between domestic and international offices.

  • Store images: Mercy Beyond Borders regularly takes photos in the field to keep the domestic office up to date on progress and communicate stories to their donors. The team overseas is able to upload the pictures to Google Drive, which allows them to share or retrieve the images at any time.

  • Share Information: It’s imperative that MBB shares frequent updates with the Board of Directors, highlighting current developments, areas for growth, and new opportunities. To keep the Board of Directors apprised of progress, the team created a MBB Board website with Google Sites as a way to provide updates outside of meetings. The site functions as a central hub, where the Board can find all relevant information and resources at their discretion. The website is organized in subsections including internal updates from the Executive Director, background articles on country conditions and descriptions of new partnerships. To take it one step further, MBB also added a comment section for board members to engage in open communication.

“It [G Suite] helps to better connect, engage, and keep Board members up-to-date in between meetings, or  if they are unable to make a meeting (in which case they can view the Meeting Archives page),” said Adrienne Perez.


MyFace - Increasing productivity and improving internal workflow by remote access

Established in 1951, MyFace was founded to address the medical, surgical and psychological needs of those living with facial deformities. The organization offers access to care and treatments --- regardless of the severity of the anomaly, the length of treatment, or the family’s ability to afford care. In America alone, 1 in 650 children is born with an facial cleft. Every year, MyFace helps more than 1,000 patients seek treatment. Of this population, 85% are children, 70% live in poverty, and 95% require long-term care. The costs involved in this are high and verges on insurmountable for low income families. With this in mind, MyFace ensures that all children receive highest quality interdisciplinary and comprehensive reconstructive care by doctors who provide their services pro bono.

As a small nonprofit (their staff of eight including their therapy dog, Bentley), employees are required to perform a variety of different tasks. On any given day, team members might be responsible for website design, grant proposal writing, and marketing strategy. And oftentimes, what one employee starts today is  picked up by another employee tomorrow. Because it’s often all-hands-on-deck, collaboration is particularly key for MyFace.

Our mission of changing faces and transforming lives can be fulfilled with the help of technology from G4NP Carolyn Spector Executive Director MyFace

To address their challenge, MyFace began using Google Drive to centrally store, access, and share information from anywhere at anytime. Drive helped decrease the amount of time that MyFace spends on administrative tasks, like sending documents back and forth or working with out-of-date data or information. Drive’s tools like Docs and Sheets enable the team to collaborate both in and out of office.

MyFace also deals with an overwhelming amount of data and information. The team needs this data to not only be easy to store, retrieve, and share — it needs to be secure, since it contains confidential and personal patient information. G Suite offers that as well, ensuring that all information is kept private and secure. (Want to know more about G Suite security and how safe they really are? Read more about it here).

“Our mission of changing faces and transforming lives can be fulfilled with the help of technology from G4NP because it offers invaluable resources to nonprofits of any size at no cost,” stated Carolyn Spector, Executive Director of MyFace.

MyFace Staff photo
MyFace team. Photo credit: MyFace

Having global teams of different sizes with varying access to technology can make timely communication difficult, if not impossible. While nonprofits like Mercy Beyond Borders and myFace strive to accomplish unique missions, both organizations are passionate about changing the world. And about using the right technology to help. Utilizing tools like G Suite has been key for nonprofits like these in order to improve internal workflow and communications. For Mercy and my Face, making information shared, up-to-date, and secure has been crucial for navigating the Technology Age.

Interested in learning more about the tools available to your nonprofit? Check out our website to see how G4NP can help your nonprofit with real-time, up-to-date communication and data sharing.

//

To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours free access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.

Footnote:  Statements are provided by Nonprofits that received free products as part of the Google for Nonprofits program, which offers free products to qualified nonprofits.


          A nonprofit's guide to online security: So you want to learn the lingo?        
This year marks the 25th anniversary of the World Wide Web becoming publicly available. For many of us, this is a reminder of just how much the Internet has transformed our daily lives. This rings true for nonprofits too: The Internet has revolutionized the way that nonprofits communicate, fundraise, and recruit volunteers. It has enabled nonprofits like yours to share their mission with a global audience. To raise awareness. And to change the world. 

But the power of the Internet also comes with great responsibility -- namely the need to keep information safe and secure. As a nonprofit, it can be difficult to keep up with online security, especially when terminology seems complicated. Yes, you might have heard of terms like “phishing” or “cookies,” but what do they mean?

Today, you can find the answers to your questions with our quick & easy to guide to online security terminology. In less than five minutes, you’ll be well on the way to helping keep your nonprofit safe on the Internet. 

Let’s get started! Here’s a quick guide to familiarize yourself with common lingo and learn how to distinguish terms that are friends vs foes in the online security realm. 


THE BAD GUYS: MALICIOUS ACTIONS/TERMS

  • Advanced Fee Fraud (419 scams): A technique which tricks users into sending or paying money to fraudsters on the promise of receiving greater rewards afterwards. It is most commonly associated with Nigeria, and 419 is the section of the Nigerian legal code that covers this fraud.
  • Botnet: A network of computers that are infected with malicious software without users’ knowledge, used to send viruses and spam to other computers.
  • Malware: Malicious software with the purpose of infecting devices and systems, gathering personal information, gaining access to systems or disrupting the operations of the device or systems. Essentially, any software that maliciously alters or compromises the system or device.
  • Phishing / Social Engineering Attack: An attempt by hackers who pose as trustworthy individuals or businesses in order to get your personal information such as usernames, passwords, and financial information.
  • Trojans: Malicious programs posing as or bundled with legitimate ones, which are designed to compromise your system. They are usually installed on computers from opening attachments in scam emails or by visiting infected websites. The term comes from the Trojan Horse in Greek mythology.

How to avoid social engineering attacks

THE GOOD GUYS: ONLINE SAFETY TERMS


  • [Internet] Cookie: A piece of data from a visited website and stored in the user's web browser in order to remember information that the user has entered or engaged with such as items in a shopping basket on an e-commerce site.
  • Encryption: The process of encoding data, messages, or information, such that only authorized parties can read it.
  • Firewall: A security system used to block hackers, viruses, and other malicious threats to your computer. It does this by acting as a barrier, acting on predetermined rules, which allows trusted traffic but blocks untrusted or non-secure traffic. 
  • HTTPS (Hypertext Transfer Protocol): is the protocol for secure communications over a computer network used on the Internet. It essentially provides authentication of the website and the web servers associated with it. 
  • Transport Layer Security (TLS): TLS is a protocol that encrypts and delivers mail securely, both for inbound and outbound mail traffic. It helps prevent eavesdropping between mail servers – keeping your messages private while they're moving between email providers. 
  • Two Factor Authentication / Two Step Verification: A method of using an additional process to verify your identity online. It combines both ‘something you know’ (like a password) and ‘something you have’ (like your phone or security key) — similar to withdrawing money from an ATM/cash machine, where you need both your PIN and your bank card.

That’s a wrap for now! Pass on these tips to your nonprofit partners to stay safe and secure online, so you can focus on what matters most: changing the world. 

//

To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more at no charge. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.


          3 Reasons why Chromebooks might be a good fit for your nonprofit        
Nonprofits - 08_11 - Chromebooks.JPG

When we speak with nonprofit organizations, we often hear about the challenges related to technological resources. So when it comes to investing in new technology, it’s important to consider three primary factors:

  • Security: Does it keep my information private and secure?
  • Compatibility: Does it work with the programs I use?
  • Price: Is it within budget?
To address these questions, Google created the Chromebook, a series of laptops built with ChromeOS. The vision behind Chromebooks is simple — to create a safe, accessible, and affordable laptop. To improve user privacy and security, Chromebooks  automatically update to provide virus protection, encryption and safe browsing. For easy access and collaboration, they’re outfitted with Gmail, Google Docs, Hangouts (and nonprofits receive the full Google Apps bundle with 30GB of space per user at no charge). What’s more, they start at $169 USD & that’s for a laptop that has up to 10+ hours of battery life!
Nonprofits_-_08_11_-_Chromebooks2.width-1600.png
ASUS Chromebook C201 ($169)

Case Study

Charity:water, a non-profit organization that provides clean and safe drinking water to people in developing countries, has a “100 percent model,” where every dollar donated goes directly to fund clean water projects. As a result, resources are limited. In order to cover operational costs like salaries and supplies, the organization relies on a few passionate and dedicated supporters. With this in mind, Charity:water transitioned to Chromebooks to improve the efficiency of its staff’s workflow. Now, employees can spend more time focusing on their goals and working towards their mission to nourish the world.

Want to learn more?

Chromebooks gives nonprofits unified access to the Google Apps suite, including:

  • Google Docs, Sheets, Slides: Allows you to create documents, spreadsheets, and presentations in real time. They’re automatically backed up online, and you can also open and edit Microsoft Word, Powerpoint or Excel files.
  • Google Hangouts: Google Hangouts can be used to make phone calls, screenshare, and video chat.
  • Google Drive: Store, sync, and share documents in the cloud for secure and easy access.

As a nonprofit, you also receive discounted access to Chrome licenses, which give you management controls via the Chrome Device Management. Chrome Device Management is a unified way to manage all of your nonprofits’ users, devices, and data. For nonprofits, the Chrome management license is discounted to only $30 dollars — in comparison to $150!

Chromebooks are our vision for providing cheaper, easier to use, and more secure laptops. Installed with Google Apps out of the box, nonprofits can maximize impact, while saving both time and resources.


To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours free access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.

To learn more about Chromebooks for nonprofits, take a look at Google for Work’s Chromebook’s website. To take advantage of the Google Nonprofit license discount, a Google partner will reach out to you once you fill out the Contact Us form.


          Unlocking your nonprofit's data insights: Linking Ad Grants and Google Analytics        

So you’re a savvy nonprofit that has mastered Ad Grants? Read on! 

You’re a group of community leaders who know the impact of data. And who know that technology can help you leverage that.     

Like many other businesses, it’s critical for nonprofits to translate clicks on ads into a meaningful action on their nonprofit’s website. These actions could be donations, event registrations, file downloads, volunteer sign-ups or form completions — whatever it is that you’re compelling users to do.

Nonprofits like yours, however, often come to us with an important question: “How do we know if our Ad Grants account is actually resulting in these increased actions?” Great question!Our answer is simple, yet we hope it’s powerful too: Google Analytics.

Google Analytics is your go-to tool for providing insights into user behavior, which can be used to inform Ad Grants, as well as website optimization. By syncing data and using AdGrants & Analytics in tandem, you can boost the quality of traffic reaching your site and increase the chance of visitors completing a meaningful action on your NGO’s page. Best of all, Analytics can be used by nonprofits at no charge.

To get started, we strongly recommend defining your team’s marketing objectives. (If you haven’t set up goals yet, check out Smart Goals, which were designed with groups like nonprofits in mind.)

Then, link your Google Analytics account to your Google Ad Grants account to see your data. (Find out how to do so here: Link Analytics and Ad Grants). In doing so, you’ll unlock insights into your Ad Grants campaign. For instance, what happens after someone clicks on your Ad Grants ad and lands on your site? How does it differ by geographical region? Or how does user behavior differ between services offered?

Going forward, you can also track your nonprofit’s marketing goals in Google Analytics to understand how traffic from your Ad Grants campaigns is converted to meaningful action on your website. To do so, import your goals into Ad Grants as conversions.

Now, you’ll be able to see traffic quality data such as bounce rate, pages per session and average session duration for campaigns, ad groups, and keywords within Ad Grants. By adding goals as conversions, you’ll get the data you need to understand which text ads showing for keywords resonate best with your target audience.

Why, you might ask, is all this important for your nonprofit?

Take Science Buddies, a nonprofit that was one of the earliest adopters of the Google Ad Grants program, joining in 2003. Science Buddies then received 171,000 unique visits in 2004 via Ad Grants, with this number increasing by 4.5X to 773,000 unique visits in 2005. By 2006, Google Ad Grants had doubled the traffic to the website altogether. “Ad Grants really put us on the map!” said Kenneth Hess, President and Founder of Science Buddies.

The takeaway here is that the more you optimize, the better chance you have of improving your quality score — a key metric in an Ad Grants account! And more importantly, the better chance you have of authentically connecting with users who are trying to change the world along with with your nonprofit and you. 


Sign up for Google Ad Grants here.

For more information on how to get started and country availability, please visit our Ad Grants Help Center. To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more — all at no charge. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here. 


Science Buddies’ statements are made in connection with receiving in-kind donations as a participant in the Ad Grants program.


          Competing for a better, more inclusive world at the 2015 Special Olympics World Games        

When athletes from around the world come together, some of them compete for the glory of winning. When the 6,500 athletes from across the globe competed at the 2015 Special Olympics World Games, they were playing for so much more — acceptance and inclusion of people with intellectual disabilities.   

Special Olympics
In order to bring together thousands of athletes, tens of thousands of volunteers, half a million spectators, and tens of millions of dollars in donations, the World Games Organizing Committee had a herculean task ahead of them. They needed technology that could keep up with their ambitious goals. 


Growing an audience for the World Games was paramount. With Google Ad Grants to run an AdWords campaign and Google Analytics to track behavior on their site, they were able to get their message in front of millions of people. Instead of flying around the world to train their many volunteers, they relied on Google Hangouts to efficiently and cost-effectively spread their knowledge. Twenty-five different sporting events means a lot of things to keep track of. They used Google Sheets to ensured everyone stayed on the same page and Google Sites to publicize the transportation schedule. 

As Patrick McClenahan, President & CEO of the 2015 Special Olympics World Games says, “When people are educated, inspired and engaged, hearts and minds are changed.” Carrying their message further means a more inclusive world for us all. 

Watch members of the World Games explain how they used Google tools here.


          Bella Communities: Utilizing technology & Google tools to drive "volunteer-ship"        

In 2009, Khoi Pham co-founded Bella Communities to address low-income housing issues and resident supportive services. Today, Bella Communities is harnessing the energy of thousands of community leaders, affordable housing owners, neighbors, nonprofits, resident volunteers, and professionals to offer a meaningful livelihood to their low-income housing tenants.  In addition to providing affordable housing, Bella’s signature program aims to mobilize low-income residents with an economic-opportunity modeled volunteering program. This programs enables residents to engage with other nonprofits, building civic engagement and social capital; improving career and personal skills; and earning rent credits to have financial capability and housing stability. Through this innovative “volunteer-ship” training program, they seek to help families “not just get by but also get ahead.” 

Bella Communities
What was the key to their success? We sat down with Khoi to hear exactly how they utilized technology and Google Apps for Nonprofits to achieve their goals.

Which role does technology play in Bella Communities?

Khoi: It’s critical! Technology allows us to communicate with our constituencies efficiently and cost-effectively which is vital for us. We want to empower our low-income residents with the tools needed to achieve economic development. With Google Apps for Nonprofits, we’ve built our own technology platform serving this objective. We have been able to switch from a desktop, web-based platform to a smart-phone mobile application, increasing engagement and participation from our residents using Google Forms. Most of them have skipped desktop to go mobile first!

Do you think technology has changed the way you work?

Khoi: Absolutely. It allowed us to operate in multiple states, virtually and real time! Communication, collection, and sharing data became seamless and effortless, which is fundamental to keeping pace.

Also Google Apps for Nonprofits has allowed us access to technology without heavy IT costs in order to preserve limited start-up resources and marshal them effectively. Google tools are all cloud-based and do not require us to build an internal IT infrastructure, which has enabled quick adaptability and flexibility to change. I have been amazed by the intuitiveness of the tools and how easily they integrate with one another!

Can you tell us more about your homemade program “Resident Volunteership United Program”?

Khoi: A study by the Corporation for National and Community Service showed that volunteers have a 27% greater chance  of finding a job after being out of work than non-volunteers? That is precisely why Bella Communities designed and tested an innovative supportive service program to simultaneously tackle both financial empowerment and civic engagement mobilization.  The Resident Volunteership United Program (ReV-UP) engages residents living in low-income communities to volunteer with other non-profit organizations in the immediate neighborhood to build community and economic development..

Google Apps was vital to the deployment of this program — we never would’ve been able to do it without that! It allowed us to manage workflow, and most importantly, it allowed us to gather, collect, and share data to build a case for supporting our program.

How are you measuring the success of this program?

Khoi: Using Google Forms and Google Drive, our low-income residents can easily manage their volunteer records online, as well as share and report their activities to the program managers. For the program pilot years, they contributed nearly 3,500 volunteer hours to their communities and generated earned approximately $21,000 in rent credits for their households.

Want to traverse the IT curve without the huge dollar investments? Find out how your nonprofit can better utilize technology with Google Apps for Nonprofits.

To see if your nonprofit is eligible to participate in the nonprofit programs, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours free access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.

Bella Communities’ statements are made in connection with receiving free products as a participant in Google for Nonprofits, a program which provides free Google products to qualified nonprofits.


          Broadway Unlocked shares five lessons learned from hosting a livestream benefit        
Each year, one in six people in the U.S. will be victims of violent crimes. Two years ago, we became part of the effort to change that, when we began work with Broadway Unlocked. 

Two years ago, we met Jessica Ryan — a woman whose mission is rooted in two seemingly unique spheres: celebrating live theatre and helping survivors of interpersonal violence. Jessica founded the  Broadway Unlocked #giveback concert, a livestream, interactive benefit concert aimed at connecting the two communities and helping raise awareness and donations for the Crime Victims Treatment Center (CVTC). The CVTC, New York State’s largest and most comprehensive hospital-based victim assistance program, provides therapy and services to survivors of assault, abuse and violence. All treatments at CVTC are free.

In an effort to reach a larger audience and expand the nonprofit’s donor base, Broadway Unlocked collaborated with Google for Nonprofits to broadcast the show and spread the message globally in 2016. On February 22, Google for Nonprofits helped bring Broadway to YouTube for the second year in a row with one night of song and social responsibility through the concert. To bring the show beyond NYC, Google Fiber hosted a watch party at the Fiber space with local Kansas City theatre groups and community members. 

This was a Broadway show unlike any other. This was Broadway with a variety of star performers, including Kyle Dean Massey, Carolee Carmello, Ali Stroker, Natalie Weiss, and Collabro. This was Broadway hosted by Google Fiber. Streamed via Google Hangouts on Air. And fueled in part by fundraising through donation cards on YouTube. This was Broadway on the internet -- crowdfunded and broadcast for one night only.

How did Broadway Unlocked make their globally livestreamed and crowdfunded event a success? We’re turning the mic towards Broadway Unlocked to hear what they learned.

5 Lessons Learned from Hosting a Livestream Benefit

  1. Engaging the community is key: Using Hangouts on Air, we were able to pull off a cross-city sing-a-long! Check it out. The video wasn’t flawless, but we successfully transported Broadway beyond the Big Apple.

  2. Global events can help grow engagement and donor base: Putting on an event in different cities is no easy feat. But it's amazingly rewarding to bring like-minded people and groups together to support similar causes. Hangouts and livestream technology made reaching new communities easier to do in one event. And by engaging these communities, we’ve been able to grow a stronger community and ultimately, donor base.

  3. Interactive video adds another dimension of creativity: Using Hangouts allowed us to engage the audience on the other side of the screen, adding a new dimension unique from watching on a passive screen. Our creative team came up with Musical MadLibs, (our new favorite game!), which really shows how we were able to interact with the crowd through video chat.

  4. Google is a gamechanger for nonprofits: YouTube and Google Fiber enabled us to livestream the concert to theatre lovers and supporters in Kansas City and hundreds of people at home that night. This allowed us to increase the viewership of our benefit by 10X more than if we had only shown the concert to the folks at the Greene Space in NYC.

  5. Crowdfunding and donation cards can help you reach your goals: Through crowdfunding using donation cards on YouTube, One Today donations, live fundraising at the concert, and private donations, we raised more than ever before -- an astounding $50,000. This additional funding will hugely impact our ability to provide treatments for victims of domestic violence in tandem with the CVTC.

To see if your nonprofit is eligible to participate in the nonprofit programs, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours free access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.

If you are a U.S. nonprofit looking to add donation cards to your YouTube videos, learn more here.

Nonprofits aren't endorsed by YouTube or Google


          Case study: Youth-oriented nonprofit overcomes limited budget with Google tools        

Just because you don’t have a big budget doesn’t mean you can’t have a big impact. Robin Bossert found that to be true when he started Navigators USA, a nonprofit that provides scouting experiences for children and their parents to help them spend more time outdoors. With over 100 independent chapters in the US and a shoestring budget, Navigators USA uses Google for Nonprofits tools to maintain and grow their organization.

Case Study
As an organization that works with youth, Navigators USA needed to have a way to maintain privacy and security while still being able to share information quickly and efficiently with parents. They use Google Groups and Sites to control access when sharing information. Juggling so many chapters across the country can be a challenge. To keep an open dialogue and get timely feedback from chapter leaders, they use Google Forms to send out questionnaires and use Google Drive to share trip ideas with other chapters. Handling logistics like shipping uniforms across the country is managed through Google Sheets and enables them to track their inventory and make sure their chapters have the supplies they need. By not having to worry about their technology budget or capabilities, Navigators USA can focus on building a movement and get more children outside. 

Watch Robin and other members discuss how they used Google tools to help manage and grow Navigators USA here. 


          Proenhance patch - Get a longer lasting        



Does the wish of enlarging your penis prove you are bored with this and therefore the strategies re the extension of your penis to fulfill your partner? Are you wanting to swing harder than before? So here's your chance to capture the occasion of a lifetime. It's never too late to employ a single patch that can cause your penis to enlarge. While other methods can be useful too ProEnhance patch does it better.

ProEnhance patch has nuanced the awareness on ancient herbs, the newest technology, and the team of researchers did their best to get a product that might make sure of success. This method will supply the latest data and the oldest knowledge in one package.

From the start, the company that provides ProEnhance patch had realized the requirement of men to enlarge their penises. Being aware that several men are unable to adequately satisfy their lover, ProEnhance patch was developed with the understanding that what these men experience is beyond your control and isn't your fault. If men have a small size of the penis, this treatment will be of huge help.

Click here to learn more about Proenhance patch



The different herbs can seriously alter the penis size. The agents on the herbs include Damiana, Palm heart of the Sierra, Gotu Kola, Fo-Ti, and menthol. Menthol carries the responsibility of preparing the skin for the nutrient elements absorption while the rest are nutrient suppliers. Since the ingredients are a hundred p.c natural, you can completely enjoy the benefit of a bigger penis, with no harm of the unwished-for side effects!

ProEnhance patch is dedicated to your triumph over small or normal penis and supports this with a hundred % guarantee and twenty four hour support. It is a cGMP-Certified Pharmaceutical Facility that was attached with the latest technologies and it'll definitely give you the most productive and successful patch there. Being e 100 p.c natural and independently tested, the ProEnhance patch, was developed to be not damaging for you, unlike other more pointy and prepared herbs in the market.



ProEnhance has taken all of the paths to increase penis size, has launched the best that is presently available on the market and offering you only the handiest systems of penis enhancement. While some jump from one system to another, ProEnhance patch has proven that the company can work to simplify the chasing best system and they should not let the clients to do all the work.

Click here to learn more about Proenhance patch



Proenhance patch - Be a better man
Proenhance patch - Skyrocket your confidence
Proenhance patch - Improve your performance on bed
Proenhance patch - Improve your performance on bed

          Proenhance patch - What's the result you can see from Proenahnce patch        



Does the wish of enlarging your penis prove you are bored with this and so the techniques per the extension of your penis to fulfill your partner? Do you need to swing harder than before? So here's your chance to capture the occasion of a lifetime. It's never too late to use a single patch that will cause your penis to enlarge.

ProEnhance patch has nuanced the awareness on ancient herbs, the most recent technology, and the team of analysts did their best to get a product that might ensure success.

From the start, the company that provides ProEnhance patch had realized the requirement of men to enlarge their penises. If men have a little size of the penis, this treatment will be of big help.

Click here to learn more about Proenhance patch



The extensive research has given credit to many herbal products that may truly enlarge the size of the penis. The agents on the herbs include Damiana, Palm heart of the Sierra, Gotu Kola, Fo-Ti, and menthol. Menthol carries the responsibility of preparing the skin for the nutrients absorption while the rest are nutrient suppliers. Since the ingredients are a hundred p.c natural, you can fully enjoy the benefit of a larger penis, with no harm of the unwished-for side effects!

ProEnhance patch is devoted to your victory over little or normal penis and supports this with a 100 percent guarantee and 24 hour support. The ProEnhance patch method is authorized by gurus. Being e a hundred % natural and independently tested, the ProEnhance patch, was invented to be not harmful for you, unlike any other more pointy and prepared herbs in the market.

The other ten percent still have a need of streamlining to make them take effect better.

ProEnhance has taken all of the methods to increase penis size, has launched the finest that is at present available on the market and offering you only the best techniques of penis enhancement. While some jump from one system to another, ProEnhance patch has demonstrated that the company can work to simplify the chasing best system and they should not let the clients to do all the work.

Click here to learn more about Proenhance patch



More articles:
Proenhance patch - Improve your performance on bed
Proenhance patch - Improve your performance on bed
Proenhance patch - Skyrocket your confidence
Proenhance patch - The Worries Are Over

          Proenhance patch - How can you Use Effectively The Proenhance Patch        



Many of us don't like swallowing pills. Many others don't need to waste time to exercise or pumping the penis. Many other still don't wish to trust the safekeeping of his penis to some means of traction.

The patches have found so far great achievement in abandonment of smoking, in the old-muscle inflammation and certain hormonal treatments.

ProEnhance was developed in order to supply a safe, trustworthy and efficient help to lengthen your penis. ProEnhance is a mixture of ancient awareness of herbal drugs and complicated technologies, resulting in a product that will guarantee the desired level of success.

Click here to learn more about Proenhance patch



Through intensive research, the company that produces the Proenhance patch for penis enlargement have chosen a variety of natural ingredients that certainly affect the further enlargement of the penis. The different herbs can drastically change penis size.

A few of these herbs are Fo-Ti, Damiana, Saw Palmetto, Gotu Kola as well as Menthol. Since the parts are one hundred pc natural, you can enjoy all the benefits of a bigger penis, without worrying about upsetting side effects.

The ProEnhance patch is a strategy that received approval recently by several pros from many countries of the world. Being a completely natural product and being tested by independent bodies could be one strategy of consider the ProEnhance penis enlargement market more fascinating and definitely the least intrusive when it comes to the enlargement of your penis.

On the other hand, the Proenhance patch is a transdermal product.

The Proenhance patches are extremely convenient to carry, but there are still some questions that will be asked about the product, generally when you are at a security check of an airfield. On the other hand, Proenhance patch is fashioned more of a bandage and you may be sure no one will ask you questions about bandages! In view of the indisputable fact that you are at any time wearing it on your body, they are to a certain extent discreet and convenient.

therefore , in many ways, using the Proenhance patch is a more convenient way of enlarging the penis than the herbal pills alternative. This is the explanation why you may begin now seriously thinking about making the swap over to the Proenhance patch.

Click here to learn more about Proenhance patch



Related info:
Penis enlargement devices - The reason why it is popular
Penis enlargement devices - The reason why it is popular
Penis enlargement devices - The reason why it is popular
Penis enlargement devices - Truth about penis enlargement devices

          Proenhance patch - How can you Use Effectively The Proenhance Patch        



Many folks do not like swallowing pills. Many others do not wish to waste time to exercise or pumping the penis. Many other still don't want to entrust the care of his penis to some method of traction. So which strategy to choose for penis enlargement? Another strategy would be the patch.

The patches have found so far great achievement in abandonment of smoking, in the old-muscle inflammation and certain hormonal treatments.

ProEnhance is a mix of traditional awareness of herbal medicine and sophisticated technologies, leading to a product that can guarantee the desired level of success.

Click here to learn more about Proenhance patch



The different herbs can drastically change penis size.

Since the components are one hundred pc natural, you can enjoy all the advantages of a bigger penis, without worrying about upsetting complications. ProEnhance is also flanked by an one hundred percent guarantee and a purchaser service 24 hours on twenty-four.

The ProEnhance patch is a technique that was given approval recently by several pros from many nations of the world. In addition to this, these patches are produced by a cGMP Certified Pharmaceutical facility. Being a completely natural product and being tested by independent bodies may be one method of consider the ProEnhance penis enlargement market more interesting and actually the least intrusive when it comes to the enlargement of your penis.

You need to attach it on the skin and all the active ingredients are without delay driven to the bloodstream all the way through the skin. So, you don't have to fret about any harmful ingredients the patch might are taken into your bloodstream in their total.

The Proenhance patches are intensely suitable to carry, but there are still some questions that can be asked about the product, generally when you are at a security check of an airport.

therefore , in a number of ways, using the Proenhance patch is a more convenient way of enlarging the penis than the herbal pills alternative.

Click here to learn more about Proenhance patch



Related info:
Penis enlargement devices - Learn more about penis enlargement devices
Penis enlargement devices - The reason why it is popular
Penis enlargement devices - Learn more about penis enlargement devices
Penis enlargement devices - Learn more about penis enlargement devices

          Information Assurance (HBSS) - Zurka Interactive        
Washington, DC - We're looking for an Information Assurance Engineer with experience managing HBSS to join a top-notch group supporting world class science and technology at the U.S. Naval Research Laboratory (NRL).
          Head of Technology - SnapStrat Inc.        
Oakland, CA - CTO title possible for candidates with extraordinary track record
The head of technology will be an integral part of SnapStrat's leadership team. Architect, design and build our product, own the technology vision, lead the technology team
          Windows System Administrator - Zurka Interactive        
Washington, DC - Join a sharp, fun team doing challenging work supporting world class science and technology. At the Center for Computational Science at the US Naval Research Laboratory you'll be part of a team responsible for providing Windows platform administration.
          Active Directory Administrator - Zurka Interactive        
Washington, DC - Join a sharp, fun team doing challenging work supporting world class science and technology. At the Center for Computational Science at the US Naval Research Laboratory you'll be part of a team responsible for providing Windows platform administration.
          Windows Admin / Help Desk - Zurka Interactive        
Washington, DC - Join a team supporting world class science and technology. At the US Naval Research Laboratory, you'll be part of a small team responsible for managing the day-to-day operations of Windows platform user workstations.
          Senior Linux Administrator - Zurka Interactive        
Washington, DC - We're looking for an outstanding Sr. Linux Admin to join a top-notch group supporting world class science and technology at the U.S. Naval Research Laboratory (NRL). Zurka Interactive is expanding our team at NRL in Washington DC.
          Manager, Training Program (for Program Center Manager placement) - RuffaloCODY        
Cedar Rapids, IA -

Ruffalo Noel Levitz is the recognized leader in technology-enabled enrollment and fundraising services utilized by non-profits around the world. Over the past 25 years, Ruffalo Noel Levitz has grown on-campus fundraising efforts to include calling centers on nearly 200 college
          Sr. Software Development Engineer - Test - Skytap        
Seattle, WA - Engineering Seattle, Washington

Apply
Description
Skytap is looking for talented senior level Software Development Engineers in Test to join our engineering team. Cloud computing is one of today's hottest technologies, and Skytap is leading the way by providing self-service
          SMT Machine Operator - Nextek        
Madison, AL - Madison, ALFull-time
Company Description
Nextek is a niche market, technology-driven Electronics Manufacturing Services (EMS) company, founded in 1995. We offer precision electronic assembly and engineering services to customers with needs-driven, non-commodity products. Nextek
          Lead Blockchain Engineer - Talla        
Boston, MA - Lead Blockchain Engineer Boston, MA or Palo Alto, CA
Talla is looking for an entrepreneurial lead blockchain software engineer with experience building innovative services and technologies to help Talla incorporate blockchain & cryptocurrency functionality into their
          Linux Administrator - Retail Solutions, Inc.        
Providence, RI - Technical Operations - Providence, RI - Full Time
POSITION SUMMARY:

The Linux Administrator position is a contributing member of the RSi Technical Operations team. This team strives to provide a consistent level of world-class, utility grade support for its internal and external
          Sales and Marketing Intern (CapDB) - Bullhorn        
Boston, MA - Sales
Boston, MassachusettsIntern

Job Description

Our international recruitment software delivers best-of-breed technology solutions for the world?s leading recruitment firms. With over 300,000 users, we work at a rapid pace to deliver an incredible customer experience. As a
          Customer Success Manager - OneSpot        
Austin, TX - Client Services - Austin, TX - Full Time
Company Overview

OneSpot is a technology platform for sitting at the intersection of personalization technology and content marketing. The company?s machine learning based Content Sequencing engine helps the world?s best brands use their
          Senior Product Manager - Bullhorn        
Boston, MA - Product Management
Boston, MassachusettsFull time

Job Description

At Bullhorn, we put the world to work. Our international recruitment software delivers best-of-breed technology solutions for the world?s leading recruitment firms. Our engineers use modern technologies in agile
          Materials Analyst - Nextek        
Madison, AL - Madison, ALFull-time
Company Description
Nextek is a niche market, technology-driven Electronics Manufacturing Services (EMS) company, founded in 1995. We offer precision electronic assembly and engineering services to customers with needs-driven, non-commodity products. We
          Quality Inspector (pcb) - Nextek        
Madison, AL - Madison, ALFull-time
Company Description
Nextek is a niche market, technology-driven Electronics Manufacturing Services (EMS) company, founded in 1995. We offer precision electronic assembly and engineering services to customers with needs-driven, non-commodity products. We
          Entry-Level DevOps Engineer - Bullhorn        
Boston, MA - Development/IT
Boston, MassachusettsFull time


Share
Print
Job Description

Bullhorn is the leading provider of CRM software to relationship-driven businesses. Our engineers use modern technologies in Agile development to innovate and create the future of our product suite.
          Entry Level Software Engineer - Bullhorn        
Boston, MA - Development
Boston, MassachusettsFull time

Job Description

Entry-Level Software Engineer

At Bullhorn, we put the world to work. Our international recruitment software delivers best-of-breed technology solutions for the world?s leading recruitment firms. With over 300,000
          Manufacturing Specialist - Assembly/Hand Load - Nextek        
Madison, AL - Madison, ALFull-time
Company Description
Nextek is a niche market, technology-driven Electronics Manufacturing Services (EMS) company, founded in 1995. We offer precision electronic assembly and engineering services to customers with needs-driven, non-commodity products. We
          Lab Technician - Assurex Health        
Mason, OH - All times are in Mountain Daylight Time.
Job ID 2017-6436
Location US-OH-Mason
Location Details Mason, OH
Posted Date 8/3/2017
More information about this job:

Overview:

At Assurex The Laboratory Technologist is responsible for specimen processing, test performance and
          Soldering - Manufacturing Specialist - Nextek        
Madison, AL - Madison, ALFull-time
Company Description
Nextek is a niche market, technology-driven Electronics Manufacturing Services (EMS) company, founded in 1995. We offer precision electronic assembly and engineering services to customers with needs-driven, non-commodity products. We
          Vice President of Technical Operations (TechOps) - Vesta        
Atlanta, GA - POSITION SUMMARY:

Based in Atlanta, GA, the VP of TechOps is responsible for the planning, buildout and daily operations of the end-to-end strategy and governance of Vesta's infrastructure. The role also helps develop the overall strategic and budgeting plan and respective
          Calibration Technician II (Temp-to-Hire)#270 - KBI Biopharma        
Boulder, CO - Company:KBI Biopharma
Job Location(s):Boulder, CO
Start Date:

Employment Term:Temp-to-Hire
Employment Type:Full Time
Hours per Week:40
Work Hours (i.e. shift):Day Shift
Starting Salary Range:Not Provided

Required Education:High School or Equivalent
Required Experience:3 to 5
          Senior Software Engineer, Platform Services - Coursera        
Mountain View, CA - Engineering ? Mountain View, CA
Coursera?s mission is to transform lives by providing access to the world's best education.

Coursera is looking for an experienced payments engineer to lend their technical expertise and leadership to our team. As a member of the Platform Services
          Marketing Contractor - Pixability        
Boston, MA - Boston HQ
Who We Are
Pixability is a video advertising technology company that gives media professionals the ability to plan, buy, and report across YouTube, Facebook, Instagram, Twitter, Snapchat, and Spotify. Pixability?s holistic solution empowers advertisers to deliver
          Technical Support I - HighJump Software        
Cranberry, PA -
Job Title:Technical Support I
Job Type:Full-Time
Location:Cranberry, PA
Submit Your Application
Send to a Friend
Printer Friendly Page

Job Description:

TrueCommerce, a HighJump company, revolutionizes trading partner connectivity by linking suppliers, retail hubs and end
          Design of the blade in your food processor        
This plays a huge roll in the overall performance of your food processor. It is technically possible to sharpen the blade, but it is a very difficult thing to do, and I personally couldn’t name a single parson that I know (myself included), who does it regularly. A high quality blade for your processor will feature micro serrations, which are retaining their ability to cut for much longer period of time than your razor-like smooth edge. It’s a problem even with some of the most expensive and downright best food processors in existence. They have overpowered motors, which would obliterate...
          PokemanGO? Give your eyes a break with Blue Light Filtering Anti-reflective Coating        

Have you been out looking for your next Pikachu? Are your eyes feeling red, dry and fatigued? If so, stop in for our special Technology Package. In this package, you can get a pair of glasses for 89.95, which includes a special coating that filters out the blue light that radiates off of your smart...

The post PokemanGO? Give your eyes a break with Blue Light Filtering Anti-reflective Coating appeared first on Affordable Eye Care | Optometrist | Chicago Suburbs.


          Google Glass        

In early February, 2014, Metropolitan Eyecare became one of the first in the United States to fabricate high-tech digital prescription lenses into one of the new Google Glass frames. The Google Glass frames did not originally have an option for prescription lenses. However, on January 26, 2014, Google announced they were adding four prescription frame choices. Google...

The post Google Glass appeared first on Affordable Eye Care | Optometrist | Chicago Suburbs.


          The Picture Book Dummy: Made Easy        
It's time to admit something: No matter HOW many times I've done it, no matter how MANY of them I have published, no matter HOW I repeatedly try to convince my brain that page 1 really starts on page 6, I often begin a picture book all wrong. Picture books, those lavishly colored, wildly intoxicating, altogether breathless mix of word and art, they follow a very specific format -- one necessitated by production techniques, cost considerations and, alas, literary tradition. Of course there are execptions to the rule, but when we talk about a "picture book" we're speaking of a "32-pager" (or depending on how liquored up your editor is) a "40-pager". Think of it this way: you as the artist only have to worry about 15 spreads, a title page image, a single page finale and, of course, the cover. When the book is finished you'll have to create some really snazzy endpapers (those sheets that hold the pages of the front and back cover to the book), but don't worry about that right now -- an idea from those will come later. So, now that you have written your picture book, your opus, your masterpiece that's gonna pull every kid in the country away from a 48" inch flat screen blasting 'Grand Theft Auto' into their eyeballs and deep into your story, you need to dummy the whole thing. Use this dummy. Print it, follow it, don't deviate from it -- just make your books follow the "15 spreads and a finale page" rule. It's as easy as that -- and you have NO idea how many times I've been off by a page or two. Oh, wait -- one more thing: Just because you adhere to the traditional dummy it doesn't mean that your book will actually get published. At the end of the day, that's kinda the toughest part. Start the easy way though -- with this.


          Are These Offers That Provide Unsecured Personal Loans For Poor Credit All They're Cracked Up to Be?        
With the downturn in the world's economy, it appears more and more people now have a bad credit rating than ever before. You would think borrowing money would be more difficult now, but it seems this is when you become inundated with offers of Unsecured Personal Loans For Poor Credit.

Are the companies and organizations that offer these deals, what they actually appear to be, or are they trying to hide some dark secret from you. In all honesty, if you have bad credit score, or defaults/judgements registered against or even a bankruptcy, you cannot expect to be offered the same terms and conditions as when you had a clean record. However, this does not mean that unscrupulous lenders should be able to take advantage of your situation by charging excessively high interest rates.

This is when it may be more appropriate to educate yourself in the way that lenders think, prior to approaching them for a loan. A program that i have recently reviewed is My Miracle Loans. My Miracle Loans is a program that teaches it's members a number of different strategies on how to approach a lender during these trying times. They promise that as long as you thoroughly research and understand the techniques they teach you, once you put them into practice, you are 100% guaranteed a loan.

My Miracle Loans have a different approach for every situation. There is no one method to use. Depending on your personal circumstances, they can provide help for you:-

- Bad Credit

- No job or income

- Student

- Bankruptcy

- Very Low Credit Score

- Been turned down before

And not just Unsecured Personal Loans For People With Poor Credit, they can help you secure a loan or home finance for any purpose.

If you are struggling and not sure where to turn and you are looking for an Unsecured Personal Loan For Poor Credit, then please read my full review on My Miracle Loans and discover how to ease your financial troubles today.
          Do You Have A Poor Credit Rating But Desperately Need A Loan?        
Are you someone who feels completely helpless because you have a poor credit rating and can't seem to get a loan? Being able to secure a loan would actually solve your credit problems and see you on the road to recovery. However, because of a poor credit history or poor credit rating, no lender in their right mind would ever consider you for a loan!

I'm sure that is a very familiar story for many of you. I know myself it is one of the worst feelings that you can ever have. I recall the days of having a fairly decent job and being offered credit left, right and centre. I'm not sure why, but I pretty much accepted all the offers of credit cards or loans. I think it was something to do with the “kid let loose in a sweet shop” scenario. The repercussions never really occurred to me at the time, so I continued to take out credit card after credit card and loan after loan.

If you can't wait any longer to secure a loan then Click Here to register for the "My Miracle Loans" program right now. For those of you who wish to read my story and review, you can access the program at the end of this article.

I think the effects of what I was doing finally hit me a few years down the line. I started to use less and less credit every month and tried to act a lot more responsibly. However, I had got to the stage where my minimum repayments for all my credit was pretty much the same amount as what I earned in a month. I once read a magazine article that stated – in order to repay $10,000 on a credit card, by just making the minimum payment, this would take up to 12 years. Wow! Unfortunately it wasn't just the one credit card I had to repay!

That's when it dawned on me that I had to do something...and quickly. After some careful investigation, I decided a debt consolidation loan and a couple of 0% APR credit cards was the way to go. I had racked up a total of $26,000 in debt. I looked at my current credit card limits and assumed I wouldn't get offered more than a $5000 dollar limit on a new credit card. So my plan was to apply for two 0% APR credit cards and a $16,000 loan. This would allow me to cut up all my credit cards and have all my debts cleared within 5 years. Or so I thought, I didn't count on getting declined for every bit of credit I applied for. My credit score was shot and at an all time low!

That's when I started searching for different methods and other forms of help. Nothing illegal, of course. I just thought to myself, I can't be the first person to find themselves in this situation and I definitely won't be the last! I actually found a total of 8 different companies, courses or websites, that said they could help and even provided me with testimonials of previous satisfied customers. Today I want to talk to you about My Miracle Loans.

My Miracle Loans is a program that will teach you a number of different strategies to obtain a loan. They advise you to read through their techniques and apply what you have learned. My Miracle Loans guarantee a 100% success rate, as long as you carry out their systems and procedures to the letter! They have helped people, like you and me, those with poor credit ratings, bad credit and even bankruptcies to secure credit and finance. My Miracle Loans are responsible for helping their members acquire over $10,000,000 in loans during 2008. They also claim to be able to help anyone secure a loan of $1,000 - $1,000,000 within 7 days! (Although it's very tempting, I think I will always steer clear of the possibility of securing a loan for $1,000,000!)

So what type of people can My Miracle Loans help:-

No job or proof of income – Obviously if you have a lot of money, you wouldn't need their help! You will never be asked for proof of income or to provide evidence of your income.

Bad Credit, No Credit or Slow Credit – There are absolutely no credit checks for some of the methods you will learn. So a poor credit history will not effect the outcome.

A FICO score of 450 – That's Bad! As mentioned above, many of methods you will learn do not require a credit check. So you're covered.

Bankruptcies in the last 7 years – My Miracle Loans dispel the myth that if you have been made bankrupt, you will not be able to borrow any money for up to 7 years. They can show you the exact methods to secure a loan or credit.

No Collateral or Assets – Their system has nothing to do with what worldly possessions you own. You will not be required to provide proof of what you do or do not own.

Been turned down before - Not a problem. These methods will still work for you.

I think that comprehensive list just about covers everyone. My Miracle Loans had quite clearly stated that not all the methods and techniques will work for everyone. Not all individuals are the same. This is why they have provided you with numerous different methods to try. If you do not get accepted for one, you move on and try the next one. They have an iron-clad guarantee that EVERYONE will find success with their program.

So for what purpose can you use the loans that My Miracle Loans will help secure for you?

Business loans – Whether you are purchasing a business, looking to expand or you need supplies. They will help you get whatever you want.

Cash Advance – Do you need a pay-day advance for your job? No problem you can secure that cash advance within 10 minutes!

Car Loans – You can get that luxury car of your dreams and you don't need the salary to match.

Student Loans – This is where my problems originally started. There are many students out there, who are yet to even start college, that may be affected by poor credit.

Debt Consolidation – If you need that peace of mind. Turn all your debts into one loan and make the monthly repayments easier to handle and keep track of.

Home Loans – You have no fear of being turned down, no matter how much you want to borrow. My Miracle Loans guarantee to help you find that dream home.

Personal Loans – A personal loan is usually determined and granted by you having a great credit score. My Miracle Loans will help those of you, who are not in a position to boast about your credit score!

So let me run through the main benefits that My Miracle Loans offer:-

100% success rate – As long as you carry out their instructions correctly, you will never be turned down again for a loan.

Take up to 30 years to repay the money – In many cases, lenders may penalize you for not paying back money as soon as you can. This is not the case with My Miracle Loans.

Receive your cash in 7 days guaranteed – This doesn't have to be a long drawn out process. My Miracle Loans will guarantee that you will receive your money in 7 days or less in the majority of cases.

Use your money for any purpose – as described earlier.

No upfront fees – Paying a company to lend you money does not seem ethical...does it?

Ease of use – this is not a complicated guide on how to write loan proposals or where to find investors and this is definitely not an outdated list of lenders willing to help people with poor credit secure a loan. This is a program that allows you access to many little known and closely guarded techniques.

So what's the catch? There is no catch! My Miracle Loans program will work for you no matter who you are and what your situation may be.

There is little more I can add about this great program. If you find yourself in the situation of having a poor credit rating and you desperately need a loan, you need look no further.

You have absolutely nothing to lose and everything to gain by registering with this fantastic program.

Click here to get started and acquire that loan that will ease all your money problems today.
          Who Else Wants To Know How To Raise Their Credit Score?        


Click Here To Get Access To Your FREE REPORT

Or Read On And Collect Your Free Report At The End Of This Article

Have you ever asked yourself, "How Do I Raise My Credit Score?" Over the years you may have racked up numerous debts. These may include, loans, credit cards and mortgages. As your debts increase through constant interest charges, things seem to get a little harder month after month. Perhaps, you have been unfortunate enough to miss some payments. This, regrettably, has the knock-on effect of additional late-payment charges and will eventually ruin your credit score.

The problem is, once you hit the rocky road of having a bad or low credit score, creditors or lenders will look at you with disdain. Gone are the days of being instantly approved for any form of credit. You are now looked upon as a high risk and no-one seems willing to help you.

This is pretty much what happened to me. I had a fairly decent job and that had helped me to secure various forms of credit. It was never a worry to me then, as i always had enough money coming in to cover at least the minimum payments, if not more. However, eventually mounting interest charges or the end of a 0% credit card deal, started to have an adverse effect on me being able to continue making full and regular payments. I had even got to the stage of using one credit card to make a payment on another credit card. So even though i was making some form of monthly payment, i was increasing my debt at the same time. Not Good! This, ultimately ruined my credit score and brought it to an all time low.

I then started searching for professional credit repair agencies. I soon discovered that many of these agencies make substantial claims to improve and raise your credit score. However, the majority charge a King's ransom for the privilege and they don't seem to deliver on their promises.

This is when i came across Chris Brisson's "37 days to clean credit" course. Chris had been in the same boat as many of us before him. As a college student he had built up a total of $14,000 in student loans and credit card debt. He had a small amount of income coming in and started to miss payments. Chris had managed to get his credit score down to a horrid 520! Once again, like so many of his predecessors, Chris scoured every possible resource to improve his credit score. He eventually admitted he got scammed by these so called "professional" credit reference agencies. This is when Chris decided to do something himself about it.

Chris had made a few discoveries along the way. He then went about legally "stealing" some of top secret methods that credit reference agencies use to remove negative items, inquiries, judgements and bankruptcies. After 37 days, Chris had managed to delete 9 inquiries, 5 late-pays, 4 default accounts and 1 judgement. In the process, Chris boosted his score by 135 points to a respectable 655.

So what exactly does Chris reveal in his Course:-

- How to easily delete 30, 60, 90, 120 or 150 day late-pays from your file

- How to easily set up a budgeting system to track income, expenses and all your payments

- A little known secret technique to getting your credit card APR interest dropped to 0%

- How to stop the harassing collections telephone calls

- How to repair bad credit in less than 30 days

- How to boost your credit score by 50 points even if you have the worst credit in the world.

- How to stop foreclosure and then negotiate with your bank to lower your monthly payment by 10% - 20%

These are just a few of the methods that Chris will go through. There are just far too many helpful little techniques to mention here.

One of my favourite systems i learned from Chris, was how to reduce the interest rate of my current credit card. It was as simple as making a phone call. Mention that you have in front of you a competitors details and that they are offering a 0% deal for six months, which will then turn into a 8% rate. Chris advises to always be polite and state that you will be looking to balance transfer unless they can lower your interest rate. In most cases, the operator will speak to a supervisor, who has the ability to drop your interest rate. To threaten to leave (in a nice way) is the key! So simple, but effective.

Another invaluable source contained within this course, is the copy and paste letters. Chris has structured a number of letters to be sent to creditors depending on what form of credit repair you are looking to achieve. The letters are organized in such a way, that you simply need to insert your own personal details in the blank spaces.

In addition to the course, Chris offers an unbelievable 5 free bonuses. They would usually retail at a value of $757, but are yours for free, once you sign up to Chris's course. I absolutely loved world renowned credit card expert, Scott Bilker's Interest Annihilation Method. This is one of your free bonuses. Scott unveils how to get approved for 0% APR credit cards. Scott also discusses the secret language indicators to use when you speak to your creditors. (yes, it's all down to the actual words you use!) and his 3 step debt elimination strategy system.

So if you have finally had enough of the way that lenders treat you, it's time to do something about it! Chris Brisson has come up with a guaranteed program to help you get the credit rating you have always wanted. So let me just quickly run through what you will get, once you have signed up to Chris Course:-

- The complete "37 days To clean Credit Course"

- The Interest Annihilation Method Audio with Scott Bilker

- The Credit Millionaire System with Donna Fox

- Credit Repair Mystery with Brett Bruce

- 45 "Copy & Paste" proven Credit Repair letters

- Super Budgeting Video Walk through

Don't forget to grab your Free Report on the 6 Deadly Credit Repair Myths as well.

Click Here to get started on raising your Credit Score today.

          Data Scientist TS/SCI with CI Polygraph        
MD-Bethesda, Data Scientist Bethesda, MD TS/SCI w/CI poly required Data Scientist The Data Scientist shall provide data analysis support to counterintelligence (CI) evaluations of US national security issues. The Data Scientist will use technical and analytical expertise to explore and examine data from multiple disparate sources with the goal of discovering patterns and previously hidden insights, which in tu
          Systems Engineer TS/SCI with CI Polygraph        
MD-Bethesda, TS/SCI w/CI poly required Summary System Engineer serve to maintain a strong awareness of technical trends in information technology, develop and maintain a strong awareness of on-going IT projects, and business unit requirements; be able to apply the project management model selected for a given development effort; and provide analysis, design, development, deployment, and lifecycle support for i
          Information Technology Project Manager TS/SCI with CI Polygraph        
MD-Bethesda, Bethesda, MD TS/SCI w/CI poly required DJ Duties: · Performs project planning activities including scope definition, schedule development, resource planning for technical data transformation projects. · Support development an evaluation of technical documentation such as Concept of Operations, Implementation Plans, Requirements documents and test plans involving cloud technologies and data transfo
          Information Technology Project Manager TS/SCI with CI Polygraph        
MD-Bethesda, TS/SCI with CI Poly required Performs project planning activities including scope definition, schedule development, resource planning for technical data transformation projects. Support development an evaluation of technical documentation such as Concept of Operations, Implementation Plans, Requirements documents and test plans involving cloud technologies and data transformation Support IC-wide w
          Windows Server Administrator Consultant        
NY-Syracuse, Windows Administrator Consultant is needed in Syracuse, NY for 6+ months – Job MB1006144 (Microsoft Certification Preferred) Specific Technical Skills · Minimum of 5 years’ experience with Microsoft operating systems · Extensive knowledge in installing, configuring, and supporting Windows 2000,Windows 2003, and Windows 2008/R2 · Extensive knowledge of AD, DNS, DHCP, WINS, · Extensive knowledge sup
          NetApp Administrator (Cleared) 2017-019        
TX-San Antonio, Program Overview: US Army North is the Army Service Component Command (ASCC) to US Northern Command (NORTHCOM), and must be capable to stand up and deploy multiple task forces in the event of natural or man-made disasters. The Army North Information Technology Directorate, known as the “G-6,” provides Help Desk/Service Desk, Network Operations Center (NOC), technical management services, and Infor
          Field Service Technician - ABE        
PA-Allentown, Job Description Field service technicians are vital members of the ABE team. Technicians provide fast and effective service for our customers for Toshiba and Lexmark. They are responsible for the repair and maintenance of digital multifunction machines at the customer's location. A good work ethic and troubleshooting skills are key to this position where you are held accountable to the highest sta
          Will Machine Learning Revolutionize Healthcare (and other) Collections?        
The intersection of behavioral psychology, classic marketing strategy and tech for the masses—including machine learning—has added tremendous ...
          IBM makes a deep learning breakthrough        
IBM announced PowerAI DDL on Tuesday, a new technique designed to reduce the time it takes to train distributed deep learning systems, according ...
          Mild Ale        

Due to work, I spent allot of time flying around the country to different bases for training or to train people. The last couple of months there hasn’t been allot of  flying going on since the government didn’t pass a budget again this year. All those can’s have been kicked down to the road to the point we have to do them, so over the next two months I’ll get a solid 48 hours of time in the back of a plane. This means I get allot of reading done. So expect more book reviews like the one below.

Mild Ale History Brewing Techniques, Recipes by David Sutula.

This was the first book in the Classic Beer Style Series I’ve read, I plan on ordering the rest of them since I had such a good time reading this book. The book is mostly a history of the brew and it puts in some real information in how to make your own at home. I like history so it was great to ready about the English brewing system and the vast changes to the quality and type of beer consumed. It seems that beer smelled of “wet goat” and had a final gravity often around 1.60-1.70. Clearly there was allot of extra junk in that beer. Even the term beer is fairly modern which is pretty cool. The History section talks about the raise of victoria brewing towers as well as a float of Porter that killed. Also the use of Finings(fish bladder goo) to pull out suspended sediment in the beer was something I had thought gone away ages ago. The books claim it’s the only way to make a proper English Mild.  I’m not sure if I’m going to try that one anytime soon.

A bit more about the beerThe English Mild by style is normally a tea like brew in color and in taste with an underwhelming 3-4% ABV, its mildly hopped by Fuggle or Golding that help develop the tea like characters of the brew. Somehow an English brew tasting like tea is fitting.

The confusion of Brown Ale and Mild is explained as well. Also the history of the rise of brown Ale and many brewers renaming there Mild a Brown Ale did more to hurt the style than anything else. Even with in Mild there are some big variations. 

He closes with a collection of home brewing recipes to replicate some of the biggest Mild’s still in production as well as a formula to approximate the brew as it was in the early 1800s.

I highly encourage anyone who’s interested in the history of brewing as well as this style to enjoy the book. Its only 200 pages and the print is big, front to back it only took about 3 hours to read. Below you’ll find the link the amazon for the book:

http://www.amazon.com/Mild-Ale-History-Brewing-Techniques/dp/0937381683/ref=sr_1_1?s=books&ie=UTF8&qid=1318261545&sr=1-1

          Quando ero famoso…        
L’articolo sugli influencer pubblicato da La Repubblica mi ha fatto venire in mente quando “ero famoso”. Quando ero famoso erano gli anni del millenium bug Quando ero famoso il mio tech era nella top 20 tech di Technorati (se non sai cos’è ti invidio un po’ perché sei gggiovane) Quando ero famoso non si condivideva una […]
          The FWA Podcast: Friday 21 April        
The Daily Telegraph's Chief Football Correspondent, Jason Burt, is this week's guest on the FWA Podcast. Jason speaks to William Hill's Dave Kelner on the Champions League, video technology, managers and gives his predictions for the FA Cup semi-finals. #FWA #FWAPodcast #betting #FACup
          LG Introduces The Curved Phone G Flex 2        
LG Introduces The Curved Phone G Flex 2

Back in 2014, LG released the G Flex handset, a 6-inch smartphone with a unique curved body design and a self-healing coating that clears up scratches or any damage done to the device's casing.  

Now, the South Korean company is introducing an enhanced and more streamlined version, the G Flex 2. This time around, the newest version comes with a smaller but more handy 5.5-inch display screen, and Qualcomm's most powerful chip set.

The G Flex 2 smartphone was introduced by LG during its very recent press conference at the Consumer Electronics Show 2015 (CES 2015) held in Las Vegas, Nevada in the United States. 

With its introduction, LG's G Flex 2 handset is the first of many phones this year expected to feature Qualcomm's newest offering -- the Snapdragon 810 processor. It is an eight-core 2.0 GigaHertz chip set that is 64-bit compatible for Android 5.0 Lollipop, the latest version of the Android mobile operating system. The 810 processor functions with 2 gigabytes of memory, and can support 3 x 20 MegaHertz LTE carrier aggregation for all networks that support it.

For the device's display screen, LG employed its own plastic OLED display technology. Techies may recall that this is the same display technology utilized in LG's G Watch R wearable device. But in G Flex 2's case, the resolution is set higher to 1080 pixels. 

As for its camera, the G Flex 2 smartphone sports a 13-megapixel camera that has laser autofocus system and optical image stabilization -- features that users may also find in LG's current flagship device (the LG G3).

The G Flex 2 features a 3,000 mAh battery that takes full advantage of Qualcomm's fast charging technology available via the latest Snapdragon chip sets. This technology significantly reduces the recharging time by up to 75 percent. Thus, users can get the G Flex 2 half-charged in just 40 minutes.

But what really makes the G Flex 2 unique is its curved body. The front side (display screen) has a 700 millimeter curved radius, while the rear side is curved just a bit less (650 millimeter radius). This is by design, by the way. According to LG, this helps users hold the phone more easily and also, allows the device to fit more easily in users' pockets.

Naturally, the G Flex 2 will be launched first in South Korea before the end of the month. But American users will not have long to wait. Major carriers AT&T and Sprint have already confirmed that they will be including the device in their respective smartphone line-ups this year. Regional carrier US Cellular has also announced that they will be offering the device in spring. No specific release dates and pricing details have been provided yet, but LG fans in the US should be pretty excited nonetheless. 

Want to know more LG devices? You can start comparing LG phones and plans now.

Page Type: 
Post Type: 
Category: 
Operating System: 

          AT&T Expands Voice Over LTE To 18 Additional Markets        
AT&T Expands Voice Over LTE To 18 Additional Markets

AT&T first launched its Voice over LTE (VoLTE) service about seven months ago, but now the carrier is expanding its reach by adding 18 new markets for its VoLTE and HD Voice offerings.

The list of new markets include District of Columbia, Georgia, Illinois, Indiana, Maryland, Michigan, Minnesota, Nevada, North Carolina, Ohio, Oregon, Pennsylvania, South Carolina, Texas, Utah, Virginia, Washington, and Wisconsin. 

The good news is that this is just the beginning. AT&T's target is to transition every consumer to VoLTE. That would be easier said than done for sure, considering the tons of networks that need to be set up and the hardware that needs to be deployed. But AT&T is positive about the outcome, and early signs of success are certainly visible.

As stated by John Donovan, AT&T's Senior Vice President of Technology and Operations, the carrier's VoLTE network is performing very well after some internal tests, scoring an average of more than 99 percent in terms of accessibility and retainability (how well the users stay connected).

For those not in the know, VoLTE technology lets users simultaneously make calls and browse the Internet using their smartphones with very fast 4G LTE data speeds. 

As for HD Voice, it is a type of wideband technology that allows for better call quality with minimal background noise, made possible through widening the frequency range of the audio signals.

Voice calls were previously transmitted on a rather limited frequency range (between 300 Hertz to 3.4 Hertz). But with HD Voice, that frequency range is extended from 50 Hertz to 7 KiloHertz, and sometimes even beyond, in order to achieve high definition quality in voice calls.

However, before users can enjoy HD Voice, they need to meet the requirements. Firstly, the service must be available in their geographical area (AT&T is working on it). Secondly, the person calling and the recipient of the call must both use handsets that are HD Voice capable. For AT&T customers, just about the only devices available from their carrier that meet this requirement are the iPhone 6 and the iPhone 6 Plus.

AT&T is far from being the only major wireless carrier that offers HD Voice though. Sprint may have been the first off the blocks, offering its customers a 30-day trial run of its HD Voice service in June earlier this year. Even Verizon Wireless is working on its own HD Voice brand, and the talk is that the Big Red will utilizing the AMR-wideband standard (the industry norm) for its service.

Interestingly, AT&T and Verizon Wireless are working together in providing clear call quality in both their customers. If they can pull this off, AT&T customers will be able to call their friends and family who are on Verizon as clearly as possible, and vice versa.

Page Type: 
Post Type: 
Operating System: 

          AT&T Throttles Users On Unlimited Data Plans Regardless Of Network Congestion        
AT&T Throttles Users On Unlimited Data Plans Regardless Of Network Congestion

AT&T has confirmed that it is throttling subscribers under its unlimited data plans, no matter how congested the network is. 

As reported by Ars Technica, subscribers who are using non-LTE 3G/HSPA+ handsets and are under unlimited data plans only get throttled when network congestion becomes heavy, and when the users exceed 3 gigabytes of data within a single billing period. But apparently, these same conditions do not apply to customers on LTE.

If a subscriber is under, say, a legacy AT&T unlimited plan and uses up more than 5 gigabytes of data on an LTE-compatible handset in a span of a month, the subscriber's data speeds will automatically be reduced for the remainder of the billing period, even if the network remains free of congestion.

Ars Technica further reported that data speeds slowed down from 23.5 mbps on average to just 0.1 mbps. When the subscriber's billing period is reset, only then are the data speeds returned to their normal levels. However, once the subscriber reaches 5 gigabytes, data speeds are automatically reduced again.

For its part, AT&T issued a statement defending its network management practices as legitimate. The carrier claims that the throttling was put in place in order to provide optimum network service for its subscribers.

AT&T further added that it is planning to address the data throttling concerns between its LTE and non-LTE unlimited subscribers sometime next year. The carrier says that it will be reducing data speeds for LTE users in congested networks as soon as that option is made available.

AT&T may be claiming that it is throttling data speeds for the benefit of all customers using its networks. But others see the throttling as a ploy to lead on long-term customers to more lucrative limited data plans. This tactic has been employed before, namely by Sprint for its Unlimited My Way and My All-In plans. Even Verizon Wireless thought of doing the same thing, but then the Federal Trade Commission (FTC) stepped in and pressured Big Red to reverse its decision. 

Right now, fewer than 20 percent of all AT&T customers are under unlimited data plans. Those that are signed up for the plans because they were thinking they could stream and download without having to worry about high overage fees if they exceed their data allotments. But it appears that they are getting throttled anyway, rendering their data privileges useless. 

As for the network congestion claims, some may find it hard to believe, especially when the subscribers who are under more expensive data plans (up to 100 gigabytes each month) never get to experience throttled data speeds.

Page Type: 
Post Type: 
Operating System: 

          USA's Mr. Robot's Revolution will be Televised. But You Still Should Not Watch It.        

This week’s episode of USA’s Mr. Robot saw the computer-hacker, techno-geek drama finally get over its mid-season identity crisis, and get back to its obvious intended purpose: glorifying cyber revolution for the purpose of mass income redistribution.


          Comment on Episode 210: Characterization by Megan        
I practice for RPGs, but generally when I know that I'm going to be doing a character thing that doesn't specifically come naturally to me. For example, I practiced accents and vernacular prior to heading into the studio to record with One Shot Podcast a few weekends ago. That to me felt more like acting than playing a game to me, and I approached it like I would a performance gig. I've done prep work for Jank Cast APs before when I know that we're recording a specific thing for an audience to listen to, because again - it's a permanent thing that will exist for people to consume as entertainment. As far as games I'm not "performing" in, I do tend to research things that will be instrumental to my character so that when the time comes for me to add to the narrative, I can do it from an informed place. I did some prep like this for my latest Mountain Witch game, mostly so that when I was describing things my samurai used and wore that they were correct, and so that when I added detail into the narrative, that it was period correct. I find that I draw a lot of my RP in the moment via improv and Meisner technique skills I've learned over the years, so from a perspective of relationships and allowing myself to be affected by actions/dialogue/events, I prefer to be a blank slate in game. This does not, however, keep me from making speeches that I WOULD HAVE SAID in that perfect moment when I get home from a game session that I just didn't think of at the time. My cats love them. Even though it's a weird little unpacking mechanism I have, I do find it helps to set me up for the next session, because I can practice my character's voice and their intentions.
          How to use Twitter to promote your business online        

Twitter can be a very powerful tool for marketing any business or website online, and by using Twitter, a person can easily reach thousands, hundreds of thousands or even millions of potential customers consistently.


Tweeting Consistently
Once a person creates a profile for their business or for their website on Twitter, they should tweet consistently and update their profile consistently. Tweeting consistently will ensure that their Twitter followers are engaged in the information that they're posting, and usually, tweeting consistently can help a person to obtain new followers for their Twitter account.


Respond To Tweets
When a person has a Twitter account, people can send them tweets, or Twitter users can direct tweets to their Twitter profile. This is an excellent way for a business to connect with its customers and with its potential customers.

If a person has any questions for a business owner, they can easily ask the business owner those questions on Twitter. In addition, a question that is asked by one customer or one potential customer on Twitter is likely a question that many other people have, so when a business owner answers a question from one person, they are likely answering a question that many other people have as well.


Gaining More Followers

In order to reach a large amount of people on Twitter, it's vital to gain a large amount of followers. There are many ways to gain followers on Twitter, and one of the ways is to buy Twitter followers.

When a business owner buys Twitter followers, they should make sure that the Twitter followers that they bought are real and active. The more active that Twitter followers are, the more successful that the marketing strategy of a business on Twitter will be.


Following Other Twitter Users


In addition to gaining followers on Twitter, a business should follow other Twitter users. Following other Twitter users helps to promote interactivity among users on Twitter, and in addition, a business that follows many other people and many other profiles is likely to gain more followers much more quickly for its Twitter profile.


Posting Funny And Interesting Information

A business owner should frequently post funny and interesting information and content on Twitter. Posting funny, interesting and informative content will help to ensure that a person's Twitter followers stay interested and engaged, and in addition, posting funny and interesting content can increase the likelihood that the Twitter followers of a business profile will retweet the tweets of the business owner.

When Twitter users retweet content that a business has posted, that content can easily reach hundreds of thousands or even millions of other Twitter followers very quickly, and as a result, a business can very easily reach many more potential customers by having its followers retweet content that it has tweeted.

In addition, a business owner should also post deals and discounts for certain products and services sporadically by using their Twitter account. Posting deals and discounts will attract new customers to the business, and these deals and discounts make it likely that customers that have already placed orders with a business will place more orders in the near future. 


About Author: This article was written by Andy G, a tech geek and Linux fan from Austria. At the present moment he maintains firmware 
and driver download website called http://www.helpjet.net/


          HTTP Verb Tampering Demo/Example/Tutorial         


What is HTTP Verb?

  •  According to Wiki "The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems.  HTTP is the foundation of data communication for the World Wide Web.

  • Verb is nothing but HTTP methods used to indicate the desired action to be performed on the identified resource.


-  List of some basic HTTP Verb or Methods
  • OPTIONS
  • GET
  • HEAD
  • POST 
  • PUT
  • DELETE
  • TRACE
  • CONNECT



What is HTTP Verb Tampering? 

It's a method to bypass a defense technique by tampering the verb. Some secret directories have restricted access by  basic authentication. This directories are protected by the .htaccess file which can be easily exploited. This attack is a result of a Apache  htaccess file misconfiguration .

An administrator, limits the access to the private resource or directory just via POST request method. See the vulnerable code below.















Here AuthUserFile is the directory to the .htpasswd file which contains the username & password in encrypted format.

<LIMIT GET POST>
require valid-user
</LIMIT>


It just limits the POST method & matches the credentials that saved in htpasswd file, if wrong error page shows up.


Here the administrator has limited POST method, but also not blacklisted other methods?. This means any requests via other method would lead the attacker having access to the protected  private resources or directory. Below i have provided a video DEMO of  successful exploitation of an HTTP Verb tampering vulnerability via Live HTTP Headers ( Firefox add-on) on AT&T sub domain (Reported & Fixed). In the next post i will be showing you various ways to fix or apply a patch to this vulnerability .





All of this, however, does not clearly separate out the populist right.

The article refers to a National Review article, March 28, 2016 in National Review by Kevin Williamson, “The Father Fuhrer” – Trump indeed, even well before the GOP convention last year.
Milo says that the alt-right is about western supremacy, not white supremacy.


          Graduated publication of novels online, with user participation and even editing        

Some authors have tried a new technique for staged publication of novels.

The idea is to post one chapter (or a few chapters) and invited comments and even editing help from readers, before moving on to future chapters or even deciding the ending.  The idea reminds me of a style of dinner theater where the audience decides who committed the murder (like "Clue").

The books of James Strauss seem to fit this model.  A recent project is “30 Days Has September”, based on his experiences as an Army officer during the Vietnam war.  (I, a draftee, was stateside at Fort Eustis and sheltered from combat at the time).

 The chapters seemed to be based on individual days in combat.  I do remember being told in Basic Combat Training that a typical infantry platoon went on patrol every third night.

The comments appear, under the name of Chuck Barton, on a blog posting by Ramsay Taplin on his “Blogtyrant” site, a post titled “What will you sell if you give away your best blog content for free?”, here.


 
The idea of gradual publication online to get an audience is interesting.  I think Stephen King has tried it.  But my own idea right now is to finish a complete draft, with all loose ends tied, of  "Angel’s Brother" myself (about 105,000 words) and put them through a copyeditor before it goes anywhere.  There is a draft now (all 27 chapters);  but I have a lot of polishing to do.  I guess I want to be the dictator of what happens to each character in this sci-fi, ongoing apocalypse setting.  I decide who is going to get it.


          NatGeo magazine issue warns Trump on climate change, then describes artificial human evolution         

The April 2017 issue of National Geographic has two very important items.

One if “7 Climate Facts You Need to Know Now”, especially in view of President Trump’s pulling out of the Paris accords.

NatGeo says that extreme weather events even now are related to climate change, and some animals are already going extinct.

But the feature article is “The Next Human” by D. T. Max, with illustrations by Owen Freeman. The article traces how life in the desert, high altitudes, and later colder climates all affected human evolution. Human behavior may have favored development of starch metabolism.  Environments seemed to encourage a “thrifty gene” which leads to obesity in some native populations when exposed to processed foods, but less so in European populations because of centuries of food preparation technology. Sometimes European men became taller and kept more body hair partly because women regarded them as more sexually attractive, but this did not happen in warmer climates.


 
There is a section called “Distant Future” regarding human manipulation of genetics, and particularly “Can Humans Adapt to the Red Planet?” On Mars, bodies would become tall and thin in lower gravity and hairless in an indoor controlled environment without dust.


          Dean Koontz's "Moonlight": how a commercially prolific suspense novelist remains relevant as technology and politics change         

During my first year of employment at USLICO in Arlington in 1990 (what would become my last main job, for 12 years and four owners), I read the Dean Koontz 1989 novel “Midnight”, and shared it (paper, Putnam was original publisher) with a few people in production control in what would become a coffee break book club.

The novel is remarkable in its huge number of chapters, and organization into three parts each with its own chapter 1.



The novel starts with a jogger running in a California beach town (Moonlight Cove  -- “In the Moonlight, Do Me” indeed) being attacked by a mysterious alien-like creature, and soon the mystery, somewhat in a “Twin Peaks” -like fashion, is examined from the viewpoint of various characters, whose narratives gradually connect.  (Irving Wallace had used this technique for building plots for Cold War spy novels back in the 1960s).  It seems as though people are getting converted into hybrid creatures and that a sociopathic computer scientist Shaddock is involved.



I would have thought that this novel would make a good miniseries on a cable channel,, even today, as the premise has less dependence on political circumstances and even technology than most sci-fi suspense novels.  Koontz sometimes gets into Shaddack’s head, anticipating the psyche of a modern terrorist, deflecting the social issues (like gay rights in one passage) in surprising ways.
I mention the novel because Koontz is often heralded in some circles as the ideal author who writes strictly to sell, and he indeed has a huge career of a long list of novels, divided into various subcategories of suspense.   Literary agents love his approach, because it is so commercial.  So do trade publishers.

One problem with developing suspense novels is that sometimes they become very vulnerable to changes in world politics, which can come suddenly and be largely unexpected by suspense authors, like the fall of the Soviet Union at the end of 1991.  Today it’s not clear who is the biggest threat: North Korea, Iran, ISIS, Russia, China.

I’ve had that problem, and my own approach to fiction has to start with my own narrative first.  I make no apologies, despite the disruptive advice and sales calls from others.


          Popular Science: "The Future of Space Travel"         

Popular Science offers a “Special Edition” mag “The Future of Space Travel”, 96 pages, from Times Books.

There are many short illustrated articles in 5 parts, “Places We’re Going”, “How We’ll Get There”, “How We’ll Survive There”, “Other Tools of Exploration.”.

There is a wide variety of interesting information. One fact is that Proxima Centauri, in a 3-star system that is the closest to the Earth, may have a rocky planet in the “GoldiLocks” zone. The shortest time that it is technologically possible to send a robotic probe on a photon light sail with laser accelerator would be about 20 years, which means it would take 24 years to get the photos and information back as to what the planet looks like.  It is about 8000 times as far to this star system as it is to Pluto.



The other most interesting section is “The Everyday Life of an Astronaut”.  This would be very important for a voyage to Mars, for example.  It raises questions as to who would go:  what about childless or single people?  The long exposure to zero gravity is bound to cause physical deterioration, so this is not a place for pretty preppies.  Essential body functions are different.  You bathe with soap that does not have to be rinse off but stays on the skin to disintegrate. Without gravity, it is hard for your body to sense when it needs to urinate.
 
There is an artist’s closeup of Europa on page 8, a closeup on Pluto on p. 16.  There is an article on space mining on p. 16.  I didn't see any discussion of Titan.


          Progressive Policy Institute: "Building a New Middle Class in a Knowledge Economy"         

Harry Holzer, of the McCourt School of Public Policy at Georgetown University in Washington DC, has offered a position paper through “Progressive Policy”, “Building a New Middle Class in the Knowledge Economy”, a PDF with this link (34 pages).

Holzer picks up on Donald Trump’s exploitation of the disenchantment of some groups, especially older white males without college degrees, with the job market and their earnings ability.

He notes that the stability of jobs with regimentation but narrow skill sets has become less, as has the pay, not only because of foreign offshoring, but because of technology and automation. He says that families need incomes of at least $50000 a year to be middle class (possibly $40000 for smaller families) and notes the difficulties of single parents.



The most effective measure would be to improve trade or vocational education opportunities at the community college level, especially in smaller communities or rural areas.  He also mentions the value of paid family leave.

What I noticed after my forced “retirement” at the end of 2001 was the tendency for companies to resort to hucksterism to create jobs, and for the employment outplacement services and policy makers not to notice that this was happening so much. This has led to a culture clash:  aggressive attitudes in some communities about preserving telemarketing and door-to-door sales, versus resistance from consumers who see accelerating security problems. We need more manufacturing jobs to reverse this trend toward hucksterism.


          How to Use Technology as a Mirror, Not a Screen        

Since the times of ancient Greece, philosophers, religious leaders and authors have strongly believed that self-knowledge was the key to human potential. They have posed questions you most likely remember studying in your freshman year philosophy class: what makes us … Continue reading

The post How to Use Technology as a Mirror, Not a Screen appeared first on The Emotion Machine.


          Kagylós fali kép 40 x 30 cm - Jelenlegi ára: 9 000 Ft        

Kasírozott vászonra készített festmény, igazi kagylókkal és üveggyönggyel.
Vegyes technika. Mérete: 40 x 30 cm.
Bármilyen szabvány képkeretbe tehető.

Kagylós fali kép 40 x 30 cm
Jelenlegi ára: 9 000 Ft
Az aukció vége: 2017-08-10 22:42
          Building Strong Technology Companies One Royalty Deal at a Time        
By:  Robert Benson, Ph.D. How to write license agreements to ensure monitoring and auditing is as simple as possible. This was the topic of a seminar (“Licensing Compliance – Getting What You Negotiated – Pitfalls and Best Practices”) hosted recently by MATTO (Massachusetts Association of Technology Transfer Offices).  This event was mainly attended by tech […]
          Curso de Ger. de Projetos e Preparação PMP em Porto Alegre        
Turma de Final de Semana inicia nesta sexta. http://www.pmtech.com.br/curso_pmp.html [...]

          Futuro brilhante para empregos em gerenciamento de projetos        
O relatório Job Growth and Talent Gap 2017–2027 aponta para um futuro promissor para os profissionais de projetos. [...]

          CZK - 7,5cm tankový kanon vz.39/44N (úprava kořistní zbraně pro ST-I)        
Autor: Jiří Tintěra

Datum: 10.08.2017 19:32:31



 
Název:
Name:
7,5 cm tankový kanon vz. 39/44 N 7.5 cm tank cannon Mk. 39/44 N
Originální název:
Original Name:
7,5 cm tankový kanon vz. 39/44 N
Výrobce:
Producer:
Rheinmetall-Borsig AG, Düsseldorf /
Období výroby:
Production Period:
DD.MM.1944-DD.MM.1945
Vyrobeno kusů:
Number of Produced:
neuveden (Not specified)
Prototyp vyroben:
Prototype Built:
DD.MM.RRRR ?
Použití:
Use:
ST-I (1)
Technické údaje:
Technical Data:
 
Hmotnost:
Weight:
1350 kg 2976 lb
Ráže:
Calibre:
75 mm 2.95 in
Náboj:
Cartridge:
75 x 495 mm
Délka hlavně:
Barrel Length:
d/48 mm (2) L/48 (2)
Celková délka:
Overall Length:
neuvedena Not specified
Používaná munice:
Ammo Used:
tříštivo-trhavý granát vz. 34
protipancéřový granát vz. 39
protipancéřový granát vz. 40
kumulativní granát vz. 38, verze B
kumulativní granát vz. 38, verze C
Mk-34 High Explosive
Mk-39 Armour Piercing
Mk-40 Armour Piercing
Mk-38 Granate with Shaped Charge, mod. B
Mk-38 Granate with Shaped Charge, mod. C
Výkony:
Performance:
 
Maximální dostřel:
Maximum Range:
~7,7 km ~4.8 mi
Rychlost střelby:
Rate of Fire:
12-15 ran/min 12-15 rpm
Úsťová rychlost:
Muzzle Velocity:
740 - 790 m/s 2428 - 2592 ft/s
Poznámka:
Note:
Kořistní zbraň upravená ve Škodových závodech Plzeň.
(1) 7,5 cm stihač tanků ST-I
(2) Dostupné prameny uvádí dva rozdílné údaje o délce hlavně: 3600 mm a 3375 mm
Prey weapon modified at Skoda Pilsen.
(1) 7.5 cm tank destroyer ST-I
(2) Sources show two different length barrel: 3600 mm or 3375 mm


Zdroje:
Sources:
Výkres VTÚ: Nápisy na dělech, č.v. I-3C1-1-2/1, in VHA Praha, FL: MNO VTV, rok 1947, KL: 167, SL: 13871,
Krátký popis 75mm tanového kanonu vz.39/44N ..., in VHA Praha, FL: MNO-VTVM, rok 1952, KL: 65, SL: 24-1/242.
https://forum.valka.cz/topic/view/179099

          Novidades no Guia PMBOK 6ª edição – Atualizado        
Saiba o que há de novo no Guia PMBOK 6ª edição. Artigo atualizado. [...]

          Estatísticas sobre o PMI        
Dados estatísticos públicos do PMI atualizados mensalmente [...]

          Artigos sobre gerenciamento de projetos        

No website da PM Tech você encontra uma série de artigos sobre uma variedade de tópicos em gerenciamento de projetos, programas e portfólio, métodos ágeis, competências, PMO e muito mais. Novos artigos são adicionados de forma regular. Aproveite a leitura!

Veja a seguir alguns dos artigos na base:

Categoria Nome Descrição PMBOK Fluxo de Processos do Gerenciamento de Projetos – Guia PMBOK® 5a Edição – Ícones Diagrama com um fluxo proposto por Mauro Sotille para os processos necessários para se gerenciar um projeto descritos no Guia PMBOK® 5a Edição – com ïcones Processos do [...]

          PMO Value Ring        
Conheça o PMO Value Ring, uma ferramenta de benchmarking para criar, avaliar e gerenciar seu PMO. [...]

          USA - AN/TPQ-53 (délostřelecký rádiolokátor)        
Autor: buko1

Datum: 10.08.2017 12:33:36



 
Název:
Name:
AN/TPQ-53 AN/TPQ-53
Originální název:
Original Name:
AN/TPQ-53 Quick Reaction Capability Radar
Kategorie:
Category:
mobilní dělostřelecký rádiolokátor mobile artillery radar
Výrobce:
Producer:
Lockheed Martin Corp., Syracuse, New York
Lockheed Martin Corp., Owego, New York
Lockheed Martin Corp., Moorestown, New Jersey
Lockheed Martin Corp., Clearwater, Florida
Období výroby:
Production Period:
DD.07.2011-DD.MM.RRRR
Vyrobeno kusů:
Number of Produced:
~ 170 ks (pre / for )
26 ks (pre / for )
Prototyp vyroben:
Prototype Built:
DD.MM.RRRR
Obsluha:
Crew:
4
Technické údaje:
Technical Data:
 
Hmotnosti:
Weights:
Anténne vozidlo:


Vozidlo s riadiacim stanovišťom:


Príves:
Antenna vehicle:


Command vehicle:


Trailer:
Rozměry:
Dimensions:
Anténne vozidlo:


Vozidlo s riadiacim stanovišťom:


Príves:
Antenna vehicle:


Command vehicle:


Trailer:
Pohon:
Propulsion:
 
Typ:
Type:
? ?
Výkony:
Performance:
Pracovná frekvencia: pásmo S (2-4 GHz)
Dosah: 60 km
Frequency: S-Band (2-4 GHz)
Range: 60 km
Další údaje:
Other Data:
Systém sa skladá z dvojice vozidiel (anténa, riadiace pracovisko) a dvoch prívesov s energetickými jednotkami.
Rádiolokátor s elektronicky vychyľovaným lúčom je schopný zamerať letiace delostrelecké rakety, projektily a mínometné granáty na vzdialenosť až 60 km a na základe ich dráhy určiť miesto odpálenia a miesto dopadu.
Radar consist of 2 vehicles (antenna and command vehicle) and 2 trailers (energy units).
Mobile Active electronically scanned array counter-battery radar is specifically designed to locate the firing positions of both rocket and mortar launchers to 60 km range.


Uživatelské státy:
User States:

(od roku 2017)

(from 2017)
Poznámka:
Note:
Vzdušná prepraviteľnosť: C-17 Globemaster III Air transport: C-17 Globemaster III
Zdroje:
Sources:
www.radartutorial.eu
www.lockheedmartin.com
en.wikipedia.org
www.prnewswire.com
www.syracuse.com

          Non-Disclosure Agreements – Employee Solicitation        

Non-Disclosure Agreements – Protect Your Employees This week I reviewed three Non-Disclosure Agreements and was surprised when two of the NDAs were silent regarding employee solicitation. Working with clients over the years I have found that in virtually every successful company, it is almost always the employees, along with the technology, that are among the […]

The post Non-Disclosure Agreements – Employee Solicitation appeared first on Blog: News & Legal Articles from Our Team.


          Cyber Security for the Small Business        

Cyber Security Month October is Cyber Security Month. If your company uses any kind of computers, cell phones, networks, software, etc. to go about its business, then this month applies to what you do day in and day out. Having these technologies makes our lives more advanced and efficient but they also leave us open […]

The post Cyber Security for the Small Business appeared first on Blog: News & Legal Articles from Our Team.


          3 Apps and Gadgets to Help You Be More Efficient        
Trying to maximize your time so you can monetize your business ideas? Jessica Abo has advice from the founder of TechSesh.
                  
When I helped Dave Vanderzee, owner of the Easton View Outfitters ranch in Rensselaer County make a dream hunt come true for a young hunter with severe health problems this past October I saw several Texas Dahl Rams roaming around the woods and I knew at some time I would be hunting them. That sometime was just last week. Unfortunately the morning that I arrived at the ranch it was a very cold 7 degrees and the ground was covered with a crusty 10 plus inches of snow. As someone who likes to sneak and peek hunt the 2 1/2 mile perimeter of the preserve, I knew the moving through the crunchy snow was not going to be quiet. 

When I entered the preserve I walked over a small rise toward the swamp I saw movement across the pond on the edge or the swamp. And sure enough it was a group of Rams just coming out into the field. I lay down in the snow and watched them through my scope as they headed for higher ground. I waited until they were behind a hedge row and started up toward them and I knew they could hear me coming. When I finally reached the hedgerow I could see all 12 of them in a tight group looking right at me. They were about 150 yards away slowly moving up toward the woods. I actually could have shot but they were literally in a group so tight; and too close together for me to shoot.

With the hedgerow as cover I was able to get within 150 yards but they still were in that tight group. It was then that I decided to go down and come at them from a different angle. To do this required crawling through the snow to stay out of sight; “That was fun.” I know it took me at least an hour and a half to get to the thick brush. And when I did get there I could see them a long way off but headed my way. This particular hedgerow was so thick I could hardly move much less raise my rifle. If I was going to get any shot here I would need to clean out where I could kneel and make sniper’s hole to shoot from. It was a lot of breaking and bending of branches and twigs but finally I was able to kneel and shoulder the rifle.

By now they were closer but still in that tight group. After kneeling for some time I made a slight movement and they saw it. Now looking through the scope I put the crosshair on what I believe was the leader but he was leaning right against another ram; I still could not shoot safely. Slowly they were walking away and suddenly I saw daylight between “my” ram and the one he had been leaning on. It was now or never. I had one shot and when I squeezed the trigger I had my Texas Dahl ram.

As I walked back down to the barn the ranch hand Doug Everard greeted me and said “saw you sneaking around up there and heard the shot and from the smile on your face I assume you got it; I’ll I get the Kubota RTV and we will go get him.” The ram tipped the scales at 138 pounds and his horns measured 25 and 26 inches long and had 11 and 11 1/2 bases. It was absolutely a great and memorable hunt.

 WHAT DOES A PRESERVE HUNT OFFER
In addition to the Wounded Warrior hunts that I had the privilege to witness at Easton View and more recently a young man with severe disabilities take his first whitetail it offers an excellent opportunity for a parent to take and teach their first time young hunter techniques and hunter safety. And one that I believe is very important is that a preserve hunt offers those with limited incomes and opportunity to experience the excitement of the hunt that they otherwise could not afford.

Now I have also been told that preserve hunting is too easy. Let me just tell you about one of these “easy” hunts.
 Last year on a 90 degree day in July I entered the Easton View preserve at sunup in search of a boar Berkshire pig. I believe on that day I covered every bit of that preserve that included walking through a muddy swamp in which a fell twice, hunted to the top of the preserve twice and did not see a pig until 6 p.m. that afternoon. I was in the upper field catching my breath and quenching my thirst when I saw 4 pigs come out of the heavy brush headed for the swamp. I made my way through the swamp and finally at 7 p.m. I finally clicked off my safety ending the HUNT.  



          Magic Luminizer        
Light-reflecting technology behind Magic Luminizer highlights skin with moon-lit champagne opalescence. This product magically illuminates skin giving it a perfect glow. For a warmer glow, Magic Luminizer brightens skin with incandescent neutrals and subtle pink undertones.
          Volkswagen Beetle Commercial        
Advertising.
Volkswagen Beetle Commercial


          Interface deal good for the industry         
08/09/2017

The $600 million Interface Security Systems deal has sent—as The Beach Boys once sang—“good vibrations” throughout the security industry, as it provides not only a vote of confidence for what Interface is doing as a modern systems integration company, but also a vote of confidence in the security industry, in general, as companies like Interface represent a new breed of integrator that is staying at the forefront of new technology and innovation.

John E. Mack III, executive vice president, co-head of investment banking and mergers & acquisitions at Imperial Capital, which acted as financial advisor to Interface on the deal, astutely pointed out that this deal goes beyond validation of what Interface is doing in the space.

“This is a very cool story for the sophisticated new-age security provider, which is what Interface is—the 2.0 version of what the right kind of security player should be,” he told Security Systems News. “We spend so much time in this industry talking about the residential side of the business, which is interesting, but there is a massive opportunity on the commercial side of the business that Interface is tapping into that I think is a compelling theme.”

He continued, “There is a lot of validation for a very successful business model here that Prudential is putting up $180 million of new capital, and SunTx is putting up additional capital into the deal. And that you’ve got a very attractive set of debt investors, and just the fundamental backing for the business, is a meaningful part of a positive message for the industry.”

Jeff Frye, SVP for Interface, told SSN that the support from equity partners is not only a stamp of approval for what the company is doing, but the “capital gives us more fuel to build on our current, better than 15 percent compounded annual growth rate, so we know that we can do more with a little more gas in the tank and we are anxious to prove it.”

Frye noted that the equity will allow the company to expand its products and services around providing business intelligence, as security is becoming so much more than just, well, security.

“As a network provider, and a managed services provider of network services and cybersecurity services, we touch a lot of aspects of our customers’ businesses,” Frye explained. “And as a leading purveyor of Internet of Things services, we are able to aggregate intelligence from all of those sensors and data sources to bring actionable insights to a customer’s business. There are some new verticals that we would like to focus on more, including financial services and banking, so this makes that horizon much brighter and much more approachable.”

And it also makes the security industry’s horizon a little brighter.


          ASAP expands in Virginia        
08/09/2017

Vector Security announced in early August that Newport News, Va., is now live with Automated Secure Alarm Protocol (ASAP). Newport News joins other municipalities in the state of Virginia using ASAP, such as the City of Richmond, James City County, York County, and Henrico County.

The ASAP to PSAP program, created by The Monitoring Association—formerly CSAA—and the Association of Public Safety Communications Officials automates communication between alarm monitoring central stations and 911 centers.

Transmitting alarm information digitally, results in improved accuracy and faster emergency responses by eliminating the need for communication over the phone between PSAP centers and monitoring centers.

Vector Security was the first alarm company to use ASAP in the City of Richmond, Va. in 2012. Vector Security assisted with implementation in Newport News by helping to perform extensive testing prior to the system going live.

“Alarm users in Newport News, including several hundred Vector Security customers, will benefit from faster and more accurate emergency response with the implementation of ASAP,” Anita Ostrowski, vice president of central station services at Vector Security, said in a prepared statement. “We hope the positive impact that ASAP will bring to Newport News will encourage other major 911 centers in the nation to adopt this technology as well.”

Ostrowski continued, “As a security provider, we seek ways to promote ASAP’s value to municipalities and public agencies, and help other alarm companies implement it for the greater good of the industry and the safety of our communities.”

Other municipalities that have implemented ASAP include Houston and High Point, TX; Washington D.C.; James City County, York County and Henrico County, Va.; Tempe and Chandler, Az.; Boca Raton, Fla.; Cary and Guilford County, N.C.; Kernersville and Durham County, N.C.; Johnston County, N.C.; Denton County and Grand Prairie, Texas; Morgan County, Ala.; Delaware County, Ohio; Bucks County, Pa.; and Highland Park, Texas.


          Allied Universal turns 1        
08/02/2017

Allied Universal, a leading facility services company and one of the largest security forces in North America, marked its one-year anniversary this week after forming a year ago via the merger of AlliedBarton Security Services and Universal Services of America.

In the announcement, Steve Jones, Allied Universal CEO, thanked all of the company’s 150,000 employees and its clients “for their continued support and commitment that contributed to a phenomenal first year as our new company! I look forward to our continued success in the security and services industries."

Over the past year the company has made several acquisitions, as it continues to transform to a full-service security company, moving beyond the manguarding services the it has been known for.

Jones told Security Systems News, after the company’s most recent acquisition of ALERT Protective Services in May, that the company continues to look at acquisitions as a way to diversify its offerings.

“We’ve got a pretty robust pipeline of deals that we are looking at—some in the technology space and some in the traditional manguarding space—and we hope to announce a few more before the year is over that will help us to diversify our company and bring more value to our clients.”

In the press release announcing the one-year milestone, the company outlined some additional organizational achievements since the merger:

•    Became the unequivocal leader in guarding services throughout North America. Our security professionals and our company play a major role in keeping the U.S. and Canada safe and secure.

•    Provided service to over half of the Fortune 500 companies and nearly every major retail mall in the U.S. From healthcare facilities, commercial office buildings, manufacturing and industrial plants, residential communities, transportation facilities and government services, Allied Universal has a significant security presence.

•    Managed the integration of a workforce of over 150,000 security professionals to perform our jobs on a daily basis and serve our growing customer base.

•    Implemented a world-class training program, the AU Institute, which offers over 1,000 training assets and professional development programs to enhance our security professionals' delivery of service and protection.

•    Introduced several technological innovations to expand our physical and operational security solutions and service offerings to enhance the protection of client properties and assets.

 


          US company to offer microchip implants to employees        
07/26/2017

Over the past few years, the security industry has begun to embrace many new technologies—robotics, the cloud, biometrics, for example—but one company here in the U.S., Three Square Market, is pushing the boundaries of RFID technology by offering to implant tiny RFID chips—the size of a grain of rice—into its employees’ hands between the thumb and forefinger.

The chip would allow employees to not only buy snacks in the break room but also have their hands function as a mobile key to gain access to the building and other doors, which makes me think of the possible applications/ramifications within security.

Implanting chips in employee’s hands is already being done in Sweden, where an organization named Epicenter is having success with an increasing number of employees there opting to get the implant. Here in the U.S., Three Square Market says it has approximately 50 employees who are interested in getting the implant, and unlike in Sweden, the company is paying for the $300 procedure for its employees. Three Square Market partnered with a Swedish firm, BioHax International, to make the chip and is planning to sell the technology to other companies.

"Eventually, this technology will become standardized, allowing you to use this as your passport, public transit, all purchasing opportunities, etc.," chief executive Todd Westby wrote in a blog post announcing the program, noting that there is even potential for storing medical/health information, and for use as payment at other RFID terminals.

But one has to wonder what security vulnerabilities this could create, especially in protecting the data on that chip from being hacked, stolen and/or compromised, etc. Not to mention, the “creepy” factor here, as mass adoption of microchip implants is dubious, at best.

Maybe some day, like in the year 2112, but in the short term, I do think there is good fodder here for a futuristic sci-fi movie.
 


          PERS Summit lines up 2017 speakers        
07/26/2017

AvantGuard has several speakers lined up for its upcoming PERS Summit, to be held here Sept. 26-28, as well as some of the events.

This year’s PERS Summit will start with a tour of AvantGuard’s recently remodeled facility. “We’ve got about 25,000 square feet and three levels, and the building will be completely remodeled, inside and out, by the time the event starts. So, people will really get to see—hands on—how that monitoring of the PERS devices works,” Sonja Jorgenson, AvantGuard’s director of marketing, told Security Systems News.

Aron Ralston will be one of the conference’s keynote speakers. “His story is told in that movie, 127 hours,” Jorgenson noted. Ralston was exploring a Utah canyon when his arm got caught, forcing Ralston to amputate the limb.

One of the speakers will be Eric Allen, an attorney who can speak to certain marketing techniques. “His expertise is … issues that are raised when businesses are contacting customers through texting and automated calls. He really understands that, the regulations, and the new rules that are coming out in 2017.”

Laurie Orlov, another speaker at the conference, is focused on aging-in place.  “She has an interesting background in technology, especially targeted to aging seniors,” Jorgenson said. “She’s going to share some predictions about what those technology trends are going to look like in 2017 and beyond.”

The Summit’s other speakers have not yet been announced.

“Then, every year, we have a panel of experts in the industry and we talk about a relevant issue. Last time, we talked about fall detection and [the panelists’] feelings about that, and where [the technology] was and if it was really helpful,” Jorgenson said. “We haven’t disclosed what that topic will be yet, but that panel discussion’s always a big talking point.”

Jorgenson said that AvantGuard hopes to give attendees more access to the presentations at this Summit, which will allow attendees to further review information after returning from the conference. “I think there will be a lot of information, … so, it’s a lot to digest in just a couple days,” she said.

The company also sends an anonymous survey to its dealers, which asks about a range of topics, including the software that dealers use or the types of customers dealers are seeing, AvantGuard marketing assistant Alex Flitton said. “We actually have a lot of really good feedback so far,” he told SSN. “All of this information will be compiled and interpreted by some of the experts in the industry, to present to our attendees.”

Networking is another benefit of the event, Flitton noted. “It just puts a lot of like-minded people in a really solid environment where they can interact,” he said.

The Summit will be held at The Chateaux Deer Valley in Park City, Utah. The conference has been here for each conference.


          PSA TEC 2018 call for presentations now open        
07/19/2017

The PSA Security Network, a security and systems integrator cooperative with headquarters in Westminster, Colo., is accepting presentations through Aug. 4, 2017 for its TEC 2018 annual conference. Proposals can be submitted at www.psatec.com/cfp.

TEC 2018, which will be held at the Sheraton Downtown Denver in Denver, Colo., March 12-16, 2018, is a premier education and networking event for all professional systems integrators in the security and audio-visual markets. TEC features education and certification programs, networking, and dedicated exhibit hours designed to advance the skills and expertise of industry professionals nationwide. This training venue is open to all industry professionals and is designed to meet the educational needs of all employees within an integrator’s organization.

PSA Security Network’s president and CEO Bill Bozeman told Security Systems News that the move from Westminster—where the conference had been held for several years—to downtown Denver fro 2018 was needed to accommodate the growth of the show.

“The hotel [Downtown Denver Sheraton] is bigger, so we look forward to having everyone under one roof,” Bozeman told SSN. “In addition, I think some of our younger members and supporters are going to enjoy being in downtown Denver, where there is so much to do.”

The education program will deliver sessions tailored to physical security and audio-visual integrators focused on emerging technologies, critical issues in the industry, and tool development to augment attendees’ knowledge needed to continue to drive these industries forward. Sessions will be selected that serve a variety of disciplines including business management, sales and marketing, HR and recruiting, project management and operations, and installation and service.

Proposals are welcome for both certification programs and general education sessions for the security and audio-visual markets. All sessions must be unbiased and minimize commercial references and overt branding. Submissions are evaluated based on topic relevance, speaker expertise, and originality of the content. Additional guidelines are available within the call for presentations submission tool.

Accepted and approved presenters will receive complimentary registration to TEC 2018 and will have the opportunity to solidify their reputation as an industry resource and subject matter expert while expanding their own professional network and gaining access to strategic partnerships. PSA does not pay honoraria or expenses for accepted proposals.


          Selecting, Applying the Right Technology for Welding Batteries        
Joining materials battery manufacturing allows different options, including resistance, ultrasonic, micro-TIG and laser welding.

read more


          Mechanical Weld Backing Methods        

read more


          First Omnidirectional Trackless Arc Welding        
Lincoln Electric has acquired exclusive global license to Helical Robotics proprietary magnetic robotic technology.

read more


          Shiloh Acquires Radar, Adding Stamping, Custom Welding        
Shiloh Industries Inc. is buying Radar Industries, a series of stamping and fabricating plants in Michigan and Mexico, adding tooling and stamping technologies to its portfolio.

read more


          Nowa Idea        
Polscy producenci maszyn poważnie potraktowali tegoroczne targi Polagra-Farm, o czym świadczy liczba zaprezentowanych nowości. Dla wielu z nich była to swego rodzaju rozgrzewka przed targami Agritechnica w Hanowerze, do których solidnie się przygotowują. Trzeba przyznać rozgrzewka bardzo interesująca także dla naszych rolników.
          Russian antitrust officials fine Google $6.8 million        

Earlier today, Google has been slapped with a $6.8 million fine by Russia’s Federation Antimonopoly Service after the antitrust body found that the search engine giant has unfairly abused its market position with Android, the world’s most popular mobile operating system. Google’s problems in Russia started last year when Yandex, the Russian search engine that […]

The post Russian antitrust officials fine Google $6.8 million appeared first on TechOptimals.


          At $99, ZTE ZMax Pro Smartphone Promises High-End Features        

ZTE continues to press its advantage on big, affordable phones. ZTE has just launched the ZMax Pro in the U.S. via MetroPCS. The company has shifted its focus towards the American markets as of recently and we expect the handset to break cover in the Indian markets fairly soon. As far as the hardware is […]

The post At $99, ZTE ZMax Pro Smartphone Promises High-End Features appeared first on TechOptimals.


          Review: Lenovo ZUK Z1 Best Combination of software and hardware        

Our Verdict The Lenovo Zuk Z1 is an able performer, despite the two year old SoC. At Rs. 13,499, it’s not more powerful than the Xiaomi Redmi Note 3, but if you like modding your smartphone, it’s worth a shot. For those waiting for a CyanogenMod-powered phone worth buying, this is it. PROS Great display […]

The post Review: Lenovo ZUK Z1 Best Combination of software and hardware appeared first on TechOptimals.


          Battle Of The Datafeeds        

Which Futures data feed is the quickest? Today’s post is for futures traders. Specifically, I would like to talk about data feeds. Have you ever wondered what happens when you click the mouse to enter an order? Where does the order go? How long does it take to get there? Have you ever wondered if Broker A is faster than Broker B? When you open a futures trading account, and the broker gives you a choice of routing providers, which should you choose? Is CQG faster than Rithmic? Is Trading Technologies faster than everyone? And what about TradeStation? Or Transact,

The post Battle Of The Datafeeds appeared first on Trading Schools.Org.


          Heiken Ashi Strategies: It works. Sometimes.        

Nearly every week, someone sends TradingSchools.Org a request, asking about various topics related to technical analysis tools used to analyze stocks, futures, Forex or options. Nearly all modern trading platforms contain a plethora of basic trading tools. Some of the more common technical analysis tools are moving averages, stochastics, volume analysis, Japanese candlesticks, Heiken Ashi, MACD, divergence, Bollinger Bands, to name a few. It seems like every few years, we get an entirely new set of tools that capture the imagination of the investing public. Crafty vendors and trading educators quickly pick up on these consumer trends and create their

The post Heiken Ashi Strategies: It works. Sometimes. appeared first on Trading Schools.Org.


          Oil Trading Group ***Updated Review***        

Oil Trading Group…6 months later. This past December, 2014, I posted a very positive review of The Oil Trading Group. You can read the original review by clicking here. What is the Oil Trading Group? The Oil Trading Group is a live day trading room, owned and moderated by Jason Love. Since my last review, The Oil Trading Group has grown a bit. There is now has a full time assistant named Dave Hamman. Dave’s job is to handle subscribers, answer technical questions, help subscribers set up their trading platforms correctly, take sales calls, basically Dave Hamman allows Jason Love to

The post Oil Trading Group ***Updated Review*** appeared first on Trading Schools.Org.


          Microchip implants for employees? One U.S. company says yes        
On Aug. 1, employees at Wisconsin tech company Three Square Market can get a chip the size of a grain of rice injected between their...
          Galaxy Dolomites by Daniel F.        


Galaxy Dolomites by Daniel F.


VIDEO TUTORIALS BILDBEARBEITUNG WEBSITE INSTAGRAM Many techniques used on this image are demonstrated in my set of in depth tutorials. Just check out my website for more information. ____ Viele der hier angewandten Techniken werden sehr ausführlich in meinen aktuellen Video Tutorials demonstriert. Mehr Infos dazu findet Ihr auf meiner Website.


Daniel F.: Photos


          [Article] The Evolution of Smart Home Performance and Its Benefits to the Grid        
As the number of residential demand-response programs and the use of smart home technologies has grown over the last several years, an important opportunity has emerged in home performance to increase residential energy savings. Namely, the opportunity to use smart home technologies to target leaky, inefficient homes that cannot hold a constant temperature during a period of several hours once an air conditioner, for example, is turned up or off during a demand response event called as part of a utility program.
          [Article] Measured Performance of Heat Pump Clothes Dryers        
The DOE Building America team—Partnership for Improved Residential Construction—collaborated with Florida Power & Light from 2012 to 2015 to conduct a phased residential energy efficiency retrofit program to determine whether installing advanced residential technologies reduced annual energy consumption. As part of this study, Florida Solar Energy Center (FSEC) researchers carried out an end-use energy savings and economic evaluation of heat pump clothes dryers (HPCD). The field evaluation involved eight study homes, each of which received the Whirlpool model WED99HED HPCD and a matched Whirlpool Energy Star clothes washer.
          simple example not working        
Hello Mo,

This is likely because you did not register the renderer in your platform target app's MainActivity.cs, AppDelegate.cs or MainPage.xaml.cs.

If you're using a version older than R2 2017, you must manually registering the renderer. Please follow each step on this page in the documentation, at the bottom is the step where we state you register the renderer.

If you update to R2 2017 and later, you no longer need to manually register the renderer. Additionally, there have been significant improvements in the R2 2017 release that make the update worthwhile.

Let us know if you have any further trouble or open a support ticket here.

Regards,
Lance | Tech Support Engineer, Sr.
Progress Telerik
Do you want to have your say when we set our development plans? Do you want to know when a feature you care about is added or when a bug fixed? Explore the Telerik Feedback Portal and vote to affect the priority of the items

          Shelties in the technology age.        

A cell phone & laptop – how else would a Sheltie stay in touch? (I’ve been told that Mika’s favorite website is Sheltie Nation.)LOL…of course Barbara, Shelties are smart that way!  :)

Sheltie Nation - Largest Community of Sheltie Lovers on the Net!


          Do you have a solar filter?        
Are you ready for the Solar Eclipse? What you are seeing here is not the latest in mirror technology. It is actually a solar filter. What is a solar filter […]
          Yoga        

Yoga is a holistic way of life that integrates all elements of ancient knowledge of Yoga, to make a prayerful discipline uniting the body, mind, and soul. Along with the series of simple, yet effective yoga postures and breathing techniques, a greater emphasis is placed on the inner experience of meditation, for the well-being of […]

The post Yoga appeared first on Medical Treatment, Medical Treatment centre, Medical healthcare Centre.


          Balloon Sinuplasty        

Balloon Sinuplasty (BSP) is a breakthrough sinus surgery procedure performed by ENT doctors that open sinus passages to relieve sinus pain and sinus pressure associated with chronic sinusitis. Medical therapy and Functional Endoscopic Sinus Surgery (FESS) are two very common techniques used for patients suffering from sinus infections. Advantages of Balloon Sinuplasty Balloon Sinuplasty is […]

The post Balloon Sinuplasty appeared first on Medical Treatment, Medical Treatment centre, Medical healthcare Centre.


          Cervical Microforaminotomy        

Navigated posterior cervical microforamitomy (PCM) is a promising minimally invasive technique for treating radiculopathy caused by lateral disc herniations and foraminal stenosis. The aim of this paper is to describe the surgical technique and clinical results of minimally invasive posterior cervical microforaminotomy (PCM) assisted by an O-arm-based navigation system for the treatment of unilateral radiculopathy […]

The post Cervical Microforaminotomy appeared first on Medical Treatment, Medical Treatment centre, Medical healthcare Centre.


          Sculptra        

Sculptra®Aesthetic is a new facial injectable treatment indicated for the correction of shallow to deep nasolabial fold (smile lines) contour deficiencies and other facial wrinkles, which are treated with the appropriate injection technique in healthy people. It works gradually to replace collagen that is lost during the aging process. Most injectables can fill these wrinkles, […]

The post Sculptra appeared first on Medical Treatment, Medical Treatment centre, Medical healthcare Centre.


          C#/.NET Little Wonders Anthology        

Originally posted on: http://geekswithblogs.net/BlackRabbitCoder/archive/2016/04/19/c.net-little-wonders-anthology.aspx

The following is the complete anthology of Little Wonders, Pitfalls, and Presentations.  

Enjoy!  A new little puzzler will be coming out this week.

The C# 6 Little Wonders

The Original C#/.NET Little Wonders Trilogy

The C#/.NET Little Wonder Sequels

The Visual Studio Little Wonders

The C#/.NET Concurrent Little Wonders

The C#/.NET Little Pitfalls

The C#/.NET Little Wonders and Little Pitfalls Presentations

C#/.NET Little Wonders from BlackRabbitCoder

More Little Wonders of C#/.NET from BlackRabbitCoder

C#/.NET Little Pitfalls from BlackRabbitCoder

The C#/.NET Fundaments: Of Lambdas and LINQ Presentation

Of Lambdas and LINQ from BlackRabbitCoder

 

Technorati Tags: , , , ,

          Amazon.com Recruiting Event Coming to St. Louis in April        

Originally posted on: http://geekswithblogs.net/BlackRabbitCoder/archive/2016/03/23/amazon.com-recruiting-event-coming-to-st.-louis-in-april.aspx

Hey all my friends and readers in the St. Louis area, my team from Amazon is heading to St. Louis to do an in-person hiring event in April!

Have you always wanted to work in a place that hires and develops the best?  That lets builders be builders?  That has excellent benefits and salary/bonuses?  That has a clear technical path all the way from entry-level developer to architect and beyond?

If you're a developer who loves to solve problems and learn new skills, and be in an environment that encourages you to learn and grow, this is a great opportunity.

We will be there in the last week of April (I'll send more information when I know more).  Let me know if you are interested in an interview while we are there and I'll get you in contact with recruiting.

-Jim


          Nerve Grafts        

Nerve Grafts are used when a patient has a nerve injury resulting in complete loss of muscle function or sensation. A nerve grafting is a surgical technique in which a segment of unrelated nerve is used to replace or bridge an injured portion of the nerve. The donor’s nerve serves as a “track” along which […]

The post Nerve Grafts appeared first on Medical Treatment, Medical Treatment centre, Medical healthcare Centre.


          Knee Arthroscopy        

Knee Arthroscopy is a technique used to diagnose and treat problems in the knee Joint. During the procedure, your surgeon will make a very small incision and insert a tiny camera — called an arthroscope — into your knee. It allows them to view the inside of the joint on a screen. Arthroscopy diagnoses several […]

The post Knee Arthroscopy appeared first on Medical Treatment, Medical Treatment centre, Medical healthcare Centre.


          Female tech CEO on sexist Google memo: It's time to push back and say 'no'        
"It's time for every single woman to denounce this line of thought."
          â€˜Three parent’ technique must not be marketed in US, says FDA        
The US Food and Drug Administration has asked John Zhang, who pioneered a technique to prevent mitochondrial disease, to stop performing the procedure
          Westinghouse, Blue Castle Working to Bring Benefits of AP1000® Plant Technology to Western US        

Westinghouse Electric Company and Blue Castle Holdings today announced the signing of a memorandum of understanding to pursue the development of a two-unit AP1000® nuclear power plant at the Green River site in Utah.

(PRWeb August 20, 2014)

Read the full story at http://www.prweb.com/releases/2014/08/prweb12109308.htm


          Innovative Westinghouse Technology Addresses Nuclear Industry Concern        

Westinghouse Electric Company today announced the successful installation of its spent fuel pool level instrumentation system at Watts Bar Nuclear Plant, operated by Tennessee Valley Authority.

(PRWeb July 11, 2014)

Read the full story at http://www.prweb.com/releases/2014/07/prweb12012542.htm


          Westinghouse Disappointed in ČEZ Tender Cancellation; Reasserts the Strength of its Proposal, Technology and Business Model        

Westinghouse Electric Company is deeply disappointed in the decision by ČEZ, a.s. to cancel the Temelí