Friday, October 26, 2012

Fortune Girls, Inc. Is on To Something: Girl Power | Makes Me ...

This is not a sponsored post, but as the father of a little girl who is bubbling with confidence I am always on the lookout for ways to nurture that and never let it subside. When Fortune Girls, Inc. approached me I couldn't resist but helping them to share their story. Please continue reading...

How Two Women and a Girl became Fortune Girls

What do you get when you take a girl who has a special gift of drawing, combined with a Mom who discovers her daughter's gift and infuses her professional gift of designing in it, and two Moms who are determined to make a difference in the lives of girls? You get Fortune Girls!

Fortune Girls is the creation of a tween girl Madison Ruiz and her Mom Barbara Clarke Ruiz. It all began when Madison wanted some art on her walls, and her Mom decided to take Madison's drawings, color over them, and the beautiful, bright and whimsical Fortune Girls characters were born! Not long after that one of Barbara's friends, Lisa Osinloye, visited their house and asked, "Why aren't these girls on t-shirts?" This was the question that got the entrepreneurial wheels in motion. Seven Fortune Girls pictures were produced and sold out in one week at a cost of $75.00 apiece. The Fortune Girls were no longer just a hunch, but a viable brand that could used as an aid to empower girls.

Barbara partnered with Co-Founder Lisa, and together they've developed and built a multi-media brand that is dedicated to the empowerment of tween girls age 6-12, building self confidence and self esteem in our girls. Fortune Girls will scale to include a website experience with lots of content and games, television, film, gaming apps for tablets and mobile, music, publishing, dolls, toys, licensing and merchandising deals.

Fortune Girls was named the 'Next Hottest Tween Brand' at the Youth Mega Marketing Event, and reached over 4 million girls through a first of its kind initiative with Girl Scouts USA. Fortune Girls was selected out of hundreds of established brands for the Teen Choice Awards coveted Celebrity Gift Bag. Celebrities and their kids went home with Fortune Girls goodies!

So what is Fortune Girls? Rather, who are the Fortune Girls?

Wouldn't it be great if every girl could grow up believing in themselves and their dreams?

The Fortune Girls brand, co-created by a tween and her Mom, its characters, its concept, its mission? seeks to empower young girls and encourage them to think beyond themselves --- effecting positive change, both large and small, in their local communities and around the world.

Fortune Girls seeks to empower tween girls, ages 6-12, in an online environment via interactive animated characters who promote positive images of girls in the classroom, on the athletic field, spending time with their friends, in their communities and pursuing their dreams.

The Fortune Girls --- Wow Girl Pink, Flame, Cinderita, AyakoLove, Taj, Ashna, Savvy and Margaux will provide guidance and inspiration to get through life?s bumpy roads, help build self-esteem, and encourage our global citizens to have a positive outlook on their lives, goals and achievements all while having fun!

Watch our video to meet the "original" Fortune Girl at https://www.facebook.com/photo.php?v=2145929840306

To learn more about Fortune Girls and the powerhouse team behind the brand, please Like us on Facebook at http://Facebook.com/FortuneGirls --- we promise you'll fall for the Fortune Girls as much as we do. And please share this with your friends, family and most importantly the tween(s) in your life!

Thank you and we hope to see you and your Tweens on Facebook!

~ Barbara Clarke-Ruiz & Lisa Osinloye


Thanks for reading! Follow me on Twitter at @EPayneTheDad.

Source: http://www.makesmewannaholler.com/2012/10/Effectively-Using-Animation-To-Foster-Girl-Empowerment.html

rush limbaugh dionne warwick patricia heaton arsenic and old lace leslie varez ward solar storms

Thursday, October 25, 2012

VMware suffers profit drop, steals Microsoft VP

VMware has reported a slight drop in third fiscal quarter 2012 income despite enjoying record revenue for the quarter.

At the same time, the cloud and virtualisation technology leader expects continued growth to come thanks to a couple of key acquisitions that it expects to help it be a leader in the development of software-defined data centers going forward.

VMware reported revenue for the third quarter of $US1.13 billion, up 20 percent from the $US942 million it reported for its third fiscal 2011 quarter.

Net income for the third quarter was $US157 million, compared to $US178 million for the third quarter of 2011

Revenue from license sales hit $US491 million for the quarter, up about 11 percent over last year, while services revenue rose about 29 percent during the same period to $US643 million.

Carl Eschenbach, chief operating officer and co-president of VMware, said a big feature of the third quarter was the $US1.2 billion VMware invested in acquiring software-defined networking (SDN) startup Nicira and its acquisition of DynamicOps, a developer of management software for provisioning apps and services across heterogeneous cloud infrastructures.

The idea of the software-defined data centre has emerged as the clear winner in terms of data center development going forward, Eschenbach said.

"The excitement around Nicira validates our approach to the software-defined data centre," he said.

For VMware, that spells growing strength for its vCloud Suite of software for building and managing a complete cloud infrastructure, as well as its Cloud Operations Services for helping customers transform their IT infrastructures into cloud infrastructures, Eschenbach said.

"The response to vCloud Suite and Cloud Ops from both partners and customers has been encouraging," he said.

VMware CEO Pat Gelsinger said vCloud Suite is VMware's first implementation of the Nicira SDN technology, giving his company a big opportunity to expand its reach into customers' public, private and hybrid clouds.

"We are the company customers increasingly turn to for help for transforming their IT to the cloud," Gelsinger said.

New CFO, nicked from Microsoft

VMware also used the release of its third quarter 2012 financial results to unveil the hiring of Jonathan Chadwick as its new CFO. Chadwick, who will officially take the CFO spot on November 5, most recently served as corporate vice president of arch-rival Microsoft and CFO of Skype, which Microsoft acquired.

Chadwick will replace Mark Peek, VMware's former CFO, who left the company in June.

Chadwick brings a wealth of financial experience to virtualisation and cloud software developer VMware, including a stint at arch-rival Microsoft, where he most recently served as corporate vice president of Microsoft and CFO of Skype.

Prior to Microsoft, Chadwick was executive vice president and CFO at McAfee, and served a few different financial roles at Cisco Systems.

At VMware, Chadwick will report directly to CEO Pat Gelsinger, who in July took over that role from former CEO Paul Maritz.

Looking behind to vRAM, ahead to 2013

VMware's Eschenbach said VMware's ending of its short-lived vRAM licensing scheme and returning to its previous CPU-based licensing model was welcomed by both channel partners and customers.

Channel partners said the reinstatement of the CPU-based licensing model removed a big sales barrier in the third and fourth quarters of 2012, while customers prefer the CPU-based model because of the simplification versus the vRAM model, he said.

When asked about the potential threat to VMware by the expected release of System Centre 2012 by rival Microsoft, Eschenbach dismissed any concerns by saying that it has yet to reach the market and that the global economic environment is the main factor going forward.

"While Microsoft is coming to market with a new platform, it should be called out that this is the third time in seven years that Microsoft has come to market with a 'good enough' product," he said.

Looking forward, Eschenbach expects VMware's fourth quarter 2012 revenue of between $US1.26 billion and $US1.29 billion, or up between 19 percent and 22 percent over the fourth quarter of 2011. That includes a 14 percent to 18 percent rise in license revenue to between $US587 million and $US605 million.

For all of 2012, VMware is maintaining the midpoint of its previous guidance by calling for total revenue of $US4.57 billion to $4.6 billion, or up between 21.4 percent and 22.2 percent over 2011, Eschenbach said. Licensing revenue for 2012 is expected to be up from 12.8 percent to 13.8 percent over 2011 because of a seasonably strong fourth quarter, he said.

This article originally appeared at crn.com

?

Follow us on Facebook and Twitter

?

Source: http://www.crn.com.au/News/320462,vmware-suffers-profit-drop-steals-microsoft-vp.aspx?utm_source=feed&utm_medium=rss&utm_campaign=CRN+All+Articles+feed

ufc on fox 2 weigh ins brandi glanville convulsions john tyler chuck elisabeth hasselbeck fran drescher

Real Estate Strategies To Follow When Buying A Home | Eric Chua ...

Buying real estate can be intimidating given its complexity, but when you have done your homework and do it well, it is also very rewarding. Don?t worry; this article contains advice so that you can avoid this.

Stay in contact with other property investors and swap information with them. Properties are constantly on the market, and not every listing is a good possibility for each investor. Keeping in touch will let them help you find good property that others may not yet know of.

Real Estate

TIP! Look for programs that assist with down payments. There are quite a few available, and there is sure to be one that is just right for you.

If you have an interest in real estate investments, find a good broker or real estate agent to help you. They will be able to access resources that you cannot. Most brokers have software at their disposal which will allow them to search through MLS listings. While you can search through MLS on your own, these tools can make the process much more efficient and will allow you to find great deals that you would have otherwise missed.

Before you purchase a property, ensure you do thorough research of the neighborhood. If the home is not going to suit your needs, then the purchase will be a long term disappointment to you. You need to know the neighborhood you are moving in so you know what you are getting yourself into.

Homes that need extensive repairs or renovations are often sold for cheaper than other homes. This lets you pocket some extra cash up front, and then you can make the repairs on your schedule. Renovations will give you equity with each step, while also allowing you to choose what your home will look like. Try to envision what the house might look like once all the improvements are made rather than dwelling on its current condition. Your dream house might just be a diamond in the rough.

TIP! Always take the time to review your options before buying anything. You will probably not be able to find the perfect piece of property right away, or even any time soon.

Establish and prioritize a set of goals for the negotiation process. Take the time to identify the issues that are on the table, then set your expectations that apply to each of them. The expectations that are most important to you should take priority. Keep in mind that you can?t get everything through negotiation, some things will require flexibility.

Get insurance before moving family and furniture into a new place. If you delay your insurance purchase, you may not be covered if an unfortunate event occurs, like an unpredictable natural disaster.

When you find a house that you want to purchase, hire an inspector to check out the house. While it will cost you, don?t have a friend or relative do it, since something can be missed and you?re left with no recourse.

TIP! With current markets, now is a great time to purchase real estate. Given the burst of the housing bubble, average property value is really low.

Research the available properties and do due diligence before buying one. When you are buying property to rent out, you should look at some certain things. The most important feature is ease of maintenance. Is the property in solid condition and is it going to stay that way with minimal upkeep? The second key feature is the location of the property. Location can determine the value of the rental property. You tenants will want a location that is convenient to retailers and restaurants, as well as service providers. Also, make sure to take into consideration the average income in the neighborhood. You will have to weigh the pros and cons of a high-rent area versus a low-rent area based on the income levels. Location doesn?t always matter as much in areas where the rent is higher then average. It can be much more of an issue when options are limited in areas with lower rents.

If a home has made your short list, have the home inspector get the home?s dimensions. You want to make sure the square footage that the owner listed actually matches up with public records. These numbers need to be at least 100 sq. ft. of one another; if they don?t, reconsider the property or find the reason for the anomaly.

If you can afford it, try to avoid buying a home that faces or backs a busy road. These properties are a bit cheaper than surrounding properties, but once you listen for a bit, it should be obvious why. You may not mind the noise from the road, though you will have a harder time trying to sell it in the future.

TIP! It is prudent to hire an attorney. who specializes in real estate law, to help you manage foreclosure purchases.

Price Range

You can get a precise price range for how much you should spend on your investment thanks to an online calculator. This handy tool asks you to input your income, debts, and living expenses. This gives you an accurate price range of the home you can afford.

If you plan to purchase a house that has a nice view, don?t base your purchase solely on that fact. Even though you might appreciate the view, in the long term, potential buyers may not. As you can see, paying for a view is not wise if you end up paying too much.

TIP! So you want to find a place to purchase, but firstly you have to have a real estate agent who?s qualified. Be sure to find a trustworthy real estate agent.

When interviewing agents to help you through the buying process, find out how long each agent has lived in the town or area in which you are searching. If an agent has recently moved to the area, they will not be as familiar with details such as community restrictions, roads and neighborhoods as a long-time resident. It is ideal to search for an agent that has actually been in the local area for a decade.

Real Estate

So, as you can see real estate buying is not as complicated as it appears. It requires asking the right questions and doing the right research, but it is ultimately worth it. Keep in mind what you have learned from this article, and allow the advice given here to guide you as you buy real estate!

TIP! Don?t just research the property you are interested in; research the surrounding neighborhood, as well. If the neighborhood isn?t suitable, you?ll be upset with the home regardless.

Join me on Facebook:

www.facebook.com/maynaseric

Source: http://www.maynaseric.com/real-estate-strategies-to-follow-when-buying-a-home

susan powell megamillions winners university of louisville louisville ky final four lotto winners mega ball winning numbers

Wednesday, October 24, 2012

Feng Shui Study Article ? Family Home Improvement Articles

Sorry, Readability was unable to parse this page for content.

Source: http://scholarshipsforafricanstudents.net/questions/2012/10/feng-shui-study-article-family-home-improvement-articles/

jerel worthy alshon jeffery miami heat bulls red dawn california earthquake california earthquake

Harry Gross: Bank loan or credit-card loan?

DEAR HARRY: I have a personal loan with my bank with a balance of $13,911. The interest rate is a stiff 8.49 percent. I have a pretty good credit score, and I can get a zero-percent loan until November 2013 with only a 3 percent transfer fee. I plan to transfer any remaining balance next November to another company offering a similar deal. Is it better for my credit score to have the bank loan or the card loan? I have three other cards that I pay in full every month. That should make you happy. There is no other debt. I plan to continue to pay the same $300 a month on the loan that I'm paying now. That will leave me with about $10,000 to transfer to another card. How does this sound?

WHAT HARRY SAYS: That 3 percent transfer fee sounds a helluva lot better than the 8.49 percent the bank is getting. It will save you more than $700 for the first year, and it will speed up your getting out of this debt. It will have some effect on your credit score, and that will be favorable. Lowering your interest rate to zero shows better management than you had before. The key to a great score is to pay on time as a minimum. You'll be able to do that with ease. You're right about my being pleased with your paying those balances in full each month. You are now living beneath your means, and that's the way to accumulate wealth.

?


Write Harry Gross at the Daily News, 801 Market St., Philadelphia, PA 19107. Harry urges all his readers to give blood. Contact the American Red Cross at 800-Red Cross.

Source: http://www.philly.com/philly/columnists/harry_gross/20121022_Harry_Gross__Bank_loan_or_credit-card_loan_.html

neighborhood watch dennis rodman dodgers sale tami roman jetblue captain los angeles dodgers christie brinkley

Are You a Pumpkin Pro? Show Us Your Best Jack-o-Lantern

{ttle}

{cptn}","template_name":"ss_thmb_play_ttle","i18n":{"end_of_gallery_header":"End of Gallery","end_of_gallery_next":"View Again"},"metadata":{"pagination":"{firstVisible} - {lastVisible} of {numItems}","ult":{"spaceid":"7665149","sec":""}}},{"id": "hcm-carousel-257285644", "dataManager": C.dmgr, "mediator": C.mdtr, "group_name":"hcm-carousel-257285644", "track_item_selected":1,"tracking":{ "spaceid" : "7665149", "events" : { "click" : { "any" : { "yui-carousel-prev" : { "node" : "a", "data" : {"sec":"HCMOL on article right rail","slk":"prev","itc":"1" }, "bubbles" : true, "test": function(params){ var carousel = params.obj.getCarousel(); var pages = carousel._pages; // if same page, don't beacon if(("_ult_current_page" in carousel) && carousel._ult_current_page==pages.cur) return false; // keep track of current position within this closure carousel._ult_current_page = pages.cur; return true; } }, "yui-carousel-next" : { "node" : "a", "data" : {"sec":"HCMOL on article right rail","slk":"next","itc":"1" }, "bubbles" : true, "test": function(params){ var carousel = params.obj.getCarousel(); var pages = carousel._pages; // no more pages, don't beacon again // if same page, don't beacon if(("_ult_current_page" in carousel) && carousel._ult_current_page==pages.cur) return false; // keep track of current position within this closure carousel._ult_current_page = pages.cur; return true; } } } } } } })); }); Y.later(10, this, function() {(function() { try{ if (Math.floor(Math.random()*10) == 1) { var loc = window.location, decoded = decodeURI(loc.pathname), encoded = encodeURI(decoded), uri = loc.protocol + "//" + loc.host + encoded + ((loc.search.length > 0) ? loc.search + '&' : '?') + "_cacheable=1", xmlhttp; if (window.XMLHttpRequest) xmlhttp = new XMLHttpRequest(); else xmlhttp = new ActiveXObject("Microsoft.XMLHTTP"); xmlhttp.open("GET",uri,true); xmlhttp.send(); } }catch(e){} })(); }); Y.later(10, this, function() {Y.namespace("Media").ywaSettings = '"projectId": "10001256862979", "documentName": "", "documentGroup": "", "ywaColo" : "vscale3", "spaceId" : "7665149" ,"customFields" : { "12" : "classic", "13" : "story" }'; Y.Media.YWA.init(Y.namespace("Media").ywaSettings); }); Y.later(10, this, function() {if(document.onclick===YAHOO.Media.PreventDefaultHandler.newClick){document.onclick=YAHOO.Media.PreventDefaultHandler.oldClick;} }); }); });

Tuesday, October 23, 2012

Groundbreaking study: Aronia, curcumin extracts effectively kill brain ...

Researchers from the Department of Natural Sciences at?Middlesex University?in the U.K. have made a fascinating discovery concerning two natural ?superfood? compounds and their ability to kill cancer cells. It turns out that both chokeberry extract (Aronia melanocarpa) and turmeric (Curcuma longa) work together with one another to stop the spread of malignant cancer cells, as well as induce cancer cell death, a process more commonly known as apoptosis.

The study, which was published in the journal?Oncology Reports, evaluated the effects of both Aronia and curcumin on a specific glioblastoma line of brain cancer cells known as U373. Because earlier studies have already established that both herbs possess unique anticancer properties, the researchers, who themselves have been studying the herbs? therapeutic benefits for several years, decided to examine further how one of the most common and deadly forms of brain cancer might respond to these two anticancer superfoods.

It turns out that Aronia berry, which is rich in anthocyanin flavonoids and other antioxidants and nutrients, is necrotic to the U373 cancer cell line, which means it actually kills cancer cells. And turmeric, which is abundant in the anticancer polyphenol curcumin, effectively induces apoptosis in U373, meaning that it stops this deadly cell line from producing new cells and spreading. When used together, both Aronia and turmeric appear to elicit a one-two punch defense against?brain cancer.

?The aim of this study was to extend our previous research to evaluate the therapeutic potential of these two agents by testing their ability to induce apoptosis in an established glioblastoma cell line (U373),? wrote the authors in their abstract. ?Taken together, the comparative data suggest that both?curcumin?and chokeberry extract may exhibit their anticancer potential by inducing apoptosis and inhibiting invasion by reducing MMPs (matrix metalloproteinase) gene expression.?

According to a 2003 study published in the journal?Anticancer Research, curcumin also suppresses the proliferation of many other types of cancer cells besides just brain cancer cells, and effectively blocks cancer tumors from forming, reproducing, and metastasizing (ncbi.nlm.nih.gov/pubmed/12680238). The?Life Extension Foundation?(LEF) recommends the highly-bioavailable BCM-95 variety of curcumin as the most effective form. (lef.org/magazine/mag2007/oct2007_report_curcumin_01.htm)

Likewise, Aronia berry has been shown in previous studies to be one of the richest plant sources of cancer-fighting antioxidants. A study published earlier this year in the journal?PLoS One?explains how Aronia juice extract possesses unique chemotherapeutic properties that effectively target lymphoblast-derived tumor cells associated with lymphoblastic leukemia. (ncbi.nlm.nih.gov/pubmed/22412883)

Sources for this article include:
http://www.ncbi.nlm.nih.gov/pubmed/22842701

NaturalNews
By Jonathan Benson

http://thewatchers.adorraeli.com/2012/10/21/groundbreaking-study-aronia-curcumin-extracts-effectively-kill-brain-cancer-cell-line/

Like this:

Be the first to like this.

Source: http://ascendingstarseed.wordpress.com/2012/10/22/groundbreaking-study-aronia-curcumin-extracts-effectively-kill-brain-cancer-cell-line/

leann rimes dakota fanning casey anthony video diary lamarcus aldridge jeremy renner justin timberlake engaged bluefin tuna

Dollar Thrifty Automotive Group, Inc. Thrifty Car Rental launches ...

Oct 23, 2012

TULSA, Okla. - Thrifty Car Rental, a subsidiary of Dollar Thrifty Automotive Group, Inc., today introduced its new mobile app for Microsoft's Windows Phone. The app allows customers to book a rental car on the move with a short, three-step reservation process.

"The new state-of-the-art Thrifty app for Windows Phone, in addition to our Thrifty apps on other major mobile platforms, meets the changing technology needs of our on-the-go customers," said Scott Thompson, Chairman, President and CEO, Dollar Thrifty Automotive Group, Inc. "With this app, Windows Phone users can conveniently book, modify or cancel a reservation for any of our Thrifty locations worldwide."

The Thrifty Car Rental app has many unique, easy-to-use features including the ability to notify users about specials and promotions as well as nearby Thrifty locations. Built by Dollar Thrifty Automotive Group, migration.mobi and Microsoft, the app is customized for Windows Phone's simple, panoramic user interface so that renters can make speedy reservations at any time or place. The app saves existing reservations and customer profiles securely so that renters can modify reservations, view details about all available rental cars and reserve additional features like car seats or a GPS.

The Thrifty Car Rental app is available for free download from the Windows Phone Store.

Source: http://www.eturbonews.com/31877/thrifty-car-rental-launches-mobile-app-windows-phone

ice t downton abbey new york knicks president day lin j.r. smith espn jeremy lin

Earthquake experts condemn manslaughter verdict

Seismologists are condemning a manslaughter verdict for six Italian scientists and one government official accused of being too reassuring about the risk of an earthquake prior to a deadly temblor in 2009.

The researchers, all far from Italy, used words like "unfair," "incredible" and "ridiculous" in discussing the verdict, which comes after a yearlong trial in L'Aquila, Italy.

"I think it's very unfair and very stupid," said Seth Stein, an earth scientist at Northwestern University in Illinois. "It reflects a kind of fundamental misunderstanding of what science can and can't do."

Related: Scientists convicted of manslaughter after quake

After a series of small temblors in early 2009, the six seismologists and the government official held a public meeting in which they said it was "unlikely" that the shaking foreshadowed a larger quake. Days later, on April 6, 2009, a 6.3-magnitude quake struck, crumbling L'Aquila's medieval buildings and killing 309 people. [ Photos: Destruction in L'Aquila ]

Natural disasters on trial
Prosecutors charged that the researchers were too blas? about the risk and asked for four years' jail time for manslaughter for each. Today (Oct. 22), Judge Marco Billi took about four hours to find the defendants guilty, sentencing them to six years apiece. An appeal is likely.

However, earthquake experts said the scientists had been unfairly scapegoated for failing to predict the unpredictable.

"It's too easy to predict an earthquake after the fact and say everyone should have cleared out, but beforehand people, for good reason, thought the risk was low," said John Vidale, a University of Washington seismologist. In fact, Vidale said, the scientists' statements that the quake was unlikely were true.

"There was a very small chance of that earthquake," Vidale told LiveScience. "It didn't make sense for people to evacuate."

Other researchers objected to blaming scientists for civil evacuation decisions.

"The idea is ridiculous, to hold scientists responsible for public policy," said Chris Goldfinger, a professor of geology and geophysics at Oregon State University. "First, scientists have almost zero ability to predict earthquakes, and second, have no direct responsibility for public policy. Something has gone seriously wrong in the Italian legal system."??

Many large earthquakes are preceded by small foreshocks, but there's no way to know when a small quake foreshadows a larger one, seismologists say. One 1998 study of Italian earthquakes found that only 2 percent of small clusters of quakes predicted a large shock.

Evacuation is typically not the best response to these small swarms, according to a 2010 article published in the journal Geophysical Research Letters. That study found the likelihood of death for citizens in L'Aquila's least-safe buildings was still only about one in 100,000 ? a risk that's better ameliorated by retrofitting dangerous buildings than evacuating entire towns for indeterminate lengths of time on the slight chance of a quake, the researchers concluded. (No charges have been brought in L'Aquila regarding building codes or standards.)

Fallout from the verdict
Italy's system for communicating earthquake risk before the trial was imperfect, seismologists contacted by LiveScience agreed. Risk communication tended toward the informal, and defendant Bernardo De Bernardinis, then-deputy chief of Italy?s Civil Protection Department, responded to a reporter's query regarding whether town residents should relax about the earthquakes with a glass of wine by suggesting a vintage.

  1. Science news from NBCNews.com

    1. Watch the launch of the penguins

      Science editor Alan Boyle's blog: You thought "The March of the Penguins" was cool? Check out the launch of the penguins ? an aerodynamic phenomenon that helps these flightless birds take flight.

    2. First human ancestor looked like a squirrel
    3. 'Gospel of Jesus' Wife' faces authenticity tests
    4. German court says collider won't ruin Earth

Nevertheless, researchers said the assessment of risk as low was an accurate assessment, and feared that the criminal verdict might put a damper on future communication improvements. The verdict is also likely to make it harder for Italy to attract top geoscientists, Vidale said.?

Related: Scientists convicted of manslaughter after quake

"We know that the system in Italy for communicating risk before the L'Aquila earthquake was flawed, but this verdict will cast a pall over any attempt to set up a better one. I'm afraid that many scientists are learning to keep their mouths shut," Thomas Jordan, an earth scientist at the University of Southern California and the director of the Southern California Earthquake Center, told LiveScience. "This won't help those of us who are trying to improve how risks from natural hazards are communicated between scientists and the public." [ Natural Disasters: Top U.S. Threats ]

Jordan was a member of a commission convened by the Italian government after the L'Aquila earthquake to improve quake communication. The recommendations, submitted before the L'Aquila trial began, include open sources of scientific information for the public, rigorous earthquake forecasting data, and communication methods approved as effective by social science research.

The key to communicating risk about natural disasters, researchers agreed, is to let the public know what scientists don't know.

"The real problem is helping people understand how risk works," Erik Klemetti, a geoscientist at Denison University in Ohio, told LiveScience. "You can't expect that scientists can come in and tell people 'an earthquake will happen here on October 28, 2013.' Instead, they must understand that there is an increased probability of earthquakes or eruptions in certain areas ? and that they must take responsibility for understanding the risks of where they live."

Andrea Thomspon, Douglas Main and Becky Oskin contributed reporting.

Follow Stephanie Pappas on Twitter @sipappas or LiveScience @livescience. We're also on Facebook & Google+.

? 2012 LiveScience.com. All rights reserved.

Source: http://www.msnbc.msn.com/id/49507760/ns/technology_and_science-science/

paulina gretzky toy story 4 toy story 4 steam kristin chenoweth Robert Blake BLK Water

Monday, October 22, 2012

Laptop or computer Technology In Hospitals | Personal Tech and

Laptop or computer Technology In Hospitals

Every person knows that this is a very wide subject due to the fact now a day?s Laptop or computer technology is playing a massive element in hospital performs. Therefore, we deemed Agha Khan University Hospital due to the fact it is nicely knowed and respected hospital in Karachi.

We also like to thank the administration of Agha Khan University Hospital for their helping hand, particularly to Mr. Saleem Quershi (Manager ISD Dept.AKUH), Mr. Sikandar Khan (Manager Bio-Healthcare Dept.AKUH) and Mr. Dilawar Khan (Asst. Manager Bio-Health-related Dept.AKUH).

4 WIDE Locations OF AKUH

Agha Khan University Hospital is utilizing Personal computer technology in 4 wide Places. Those Places can be defined as the backbone of AKUH?s administrative and decisional operates.

1. Software program.

two. Servers.

three. Networks.

Four. Bio-Medicals.

1. SOFTWARES: ?

In this location AKUH are working with 3 Application programs which are as follows:

1.1. Patient Care.

1.two. Administrative.

1.three. Economic.

1.1. PATIENT CARE Programs: ?

In this Computer software AKUH keeps record with regards to 3 varieties of individuals, i.e. Out-individuals, In-individuals and Outdoors referrers.

Out individuals are these who go to a physician for normal checkups and therapy in clinics. The records are kept in the database, which AKUH utilizes for those individuals.

In individuals are individuals who are admitted in emergency instances like burnout, heart attack, fracture and other serious and dangerous circumstances. When a patient is admitted his/her admission date, day and month are updated in this Application Computer software along with bed and ward quantity. A medical doctor and ancillary staff are appointed to that particular patient. The medicine which is prescribed to that patient, the variety of remedy the patient will purchase, the meal he/she will be provided are all updated in this Application Computer software.

Outdoors referrers are these individuals which are prescribed to take X-rays, lab test, and other form of checkups by these medical doctors which are not a element of hospital staff.

1.two. ADMINISTRATIVE Programs: ?

Via this Software AKUH keeps the record of the equipments that are they operating well. The info about current medical doctors, nurses, ancillary staff along with division specifications and requirements. The nutrition records of individuals are also kept here.

The fundamental objective of this Software is to administrate and manage the activities, which are held daily in hospital premises.

1.three. Monetary Programs: ?

In this Software program AKUH keeps the record concerning Economic activities of individuals and hospital. For e.g.

If a patient is admitted in hospital for surgerical objective than how considerably payment he/she had created or how considerably balance has left of his/her actual payment. All the Economic record of individuals is kept in this Software.

Like any other organization entity AKUH also keeps its record, for e.g. how significantly machinery, food and other inventory stuff are left. They also prepare and follow accounting cycle which entails common journal, ledger, trial balance, adjustment, Monetary statement.

two) SERVERS:-

AKUH is working with much more than 200 servers in its network. Some are as follows:

two.1. Database servers

two.two. Computer software servers

two.three. Web servers

two.1. DATABASE SERVERS: ?

To create database server AKUH utilized some language with the passage of time. The languages which they are working with described as beneath.

?? SQL server

?? Oracle

?? Visual Fundamental

?? ASP.NET

?? JAVA

AKUH applied SQL server to create Computer software Software program associated to patient care just before 1980?s. They utilised oracle language as a server to create Application Software associated to patient care and Economic Places in mid 1980?s. In 1995, AKUH employed third generation language to create programs of patient care, administrative and Economic Locations.

These days AKUH are utilizing Visual Standard, ASP.NET and Java to create Computer software softwares.

two.two. Computer software SERVERS: ?

Individuals servers are produced to manage or manage Software softwares connected to patient care, administrative, Monetary and human resource departments. Those servers manage the flow of entries at the time of storing and retrieving info.

two.three. INTRANET: ?

Online servers, communication servers and exchange e-mail server individuals servers are related to the intranet of the hospital to communicate just about every medical doctor and staff member to every single other. They can share reports and other needed facts relating to individuals. AKUH has offered links to its clinics and franchises Outdoors the hospital to communicate, monitor and fulfill their specifications and requirements of machinery connected activities.

three) NETWORKS: ?

AKUH is working with CAN (Campus Region Networking) which is spread in 3 diverse Places but interrelated to just about every other by switches.

Essentially PACS (Image Archiving and Communication Method) is a new technology and only AKUH is utilizing it in Pakistan. It is associated to RIS (Radiology Info Method). Those systems are additional associated to other departments and machinery.

Archiving indicates ?Storage? so, Via this associated networking hospital administration shops any facts relating to a patient which is updated to the network and that patient can retrieve his/her facts by a MR quantity (MR # is an I.D offered to a patient for retrieving details).

PACS is also employed to capture and shop pictures digitally from exactly where medical doctors and surgeons access By means of their thin customers. This technology replaces the old film rule in which an x-ray of a patient is obtained by capturing an Picture on a sheet it was damaging for human health and physique. Right after all this method the info is stored in SAN (Storage Location Network). AKUH has made SAN to facilitate its functioning.

Four) BIO-Health-related: ?

It is a distinct division of AKUH which purchases and monitors the overall performance of Health-related equipment and machinery. This division is additional divided into 4 sub departments which are as follows:

Four.1. Healthcare MANAGEMENT EQUIPMENT: ?

This division bargains with 3 goal which are life saving, therapy and monitory.

In life saving and help, the equipment associated to remedy complicated and important decease are monitored and maintained.

In therapy, all the equipments and machinery utilized to treat an in-patient are monitored.

In monitory, the efficiency of all the equipment and machinery employed by physicians, surgeons and ancillary staff are maintained and monitored.

Four.two. Acquire Division: ?

In this section members of bio-Health-related division have to see that what are the equipment they have to Obtain, Immediately after the decision, 1st they Bought the needed equipment Following acquiring the equipment they saw the technical Instruction to that equipment that how to install that equipment and how to utilised that equipment. Then they create a strategy that how to maintain individuals equipment and if there is a uncertain breakdown happens in the equipment how to manage individuals uncertain breakdown. Soon after all individuals measures the subsequent step is to put the equipment in the appropriate place, Right after the collaboration and expansion of the equipment they train all the unique medical doctors have to employed those equipment that how to employed and deal with individuals equipment. Bio-Healthcare works is to monitor all the equipment individuals are in use in the hospitals. Immediately after monitoring the subsequent step is to replace that equipment. In this replacement section when some equipment comprehensive it life or the equipment is completely depreciated they replace all these equipments. This is what the responsibilities of the Bio-Healthcare acquire division.

Four.three. RESPONSIBILITY: ?

Bio-Health-related division has 3 critical responsibilities which are important care, imaging group and LAB.

Important care includes the staff which is accountable for reporting the failure of a machine and to eliminate the complication which arises in ancillary staff or nurses due to some complicated function of equipment.

Imaging group Essentially functions as a channel or a link amongst vital care and LAB.

LAB is an location exactly where all individuals equipment are treated which occurred a failure to some purpose.

5) E-HEALTH: ?

AKUH has began to create a Online based Software Technique named ?E-Health?. It is probably to be implemented in practically 5 years. E-Health will facilitate the clientele and individuals. As its name means it will give the clients the chance to take reports and appointments World wide web. It will also help AKUH to run applications like awareness of gastro, dengue virus and other dangerous and harmful deceases.

Keep Updated With techmobiz

Source: http://www.techmobiz.com/laptop-or-computer-technology-in-hospitals.html

tony romo big sean sherri shepherd sherri shepherd arkansas razorbacks trisomy 18 ozzie guillen

Source: http://kathyvabuk.blogspot.com/2012/10/laptop-or-computer-technology-in.html

the shining mariano rivera mariano rivera jobs report tiger woods masters 2012 nikki haley stan van gundy

Obama trying to hold off Romney with women voters

Republican vice presidential candidate Rep. Paul Ryan, R-Wis., greets people as he arrives for a campaign stop at Bev's on the River in Sioux City, Iowa, Sunday, Oct. 21, 2012. (AP Photo/Sioux City Journal, Jim Lee)

Republican vice presidential candidate Rep. Paul Ryan, R-Wis., greets people as he arrives for a campaign stop at Bev's on the River in Sioux City, Iowa, Sunday, Oct. 21, 2012. (AP Photo/Sioux City Journal, Jim Lee)

Actress Ashley Judd, center, gives a pep talk to volunteers for the Obama for President campaign at the Fredericksburg, Va. office on Sunday, Oct. 21, 2012. (AP Photo/The Free Lance-Star, Robert A. Martin)

(AP) ? President Barack Obama has been wearing a pink wristband in recognition of breast cancer awareness month and his challenger, Mitt Romney, donned a pink ribbon on his shirt during a factory stop in Ohio.

The symbolic gestures are part of a determined competition in the campaign's closing weeks for suburban and working women who could help determine the winner in a series of toss-up states.

Women have emerged as the pivotal voting bloc in the aftermath of the second presidential debate, where Obama and Romney sparred over contraceptives and pay inequality and Romney spoke about reviewing "binders full of women" as governor when he sought to diversify his Massachusetts administration.

Some national polls suggest Obama's longstanding edge with female voters is narrowing, prompting both sides to make an all-out blitz for women.

At the heart of the debate, which is playing out in the suburbs of northern Virginia and in several swing states, is this question: What will most motivate women in the 2012 election?

Romney's pitch is heavily focused on economic issues ? his campaign contends that the vast majority of women will respond to pocketbook issues like paying for gasoline or groceries, the need for more take-home pay and how the federal debt might affect their children.

Obama has emphasized a mix of economic and social issues, warning that Romney's vow to repeal the Obamacare health law would hurt women and the Republican would fail to protect abortion rights.

Shirley Jackson, an 82-year-old Republican from Vienna, Va., said she continues to support Romney but is worried about how women perceive him. Jackson said she recently facilitated a discussion about the election at her local Red Hat Society meeting and was struck by how many women in the group said they were turned off by Romney's opposition to abortion rights.

"He has lost a tremendous amount of support among women because of this decision," Jackson said.

Democrats say Romney's views on women's health should be a deal-breaker. Melissa Skelton, 41, a stay-at-home mom from Vienna, said women's health has overshadowed other issues for multitudes of women ? and would help the president.

"I'd rather live with a president who struggles with the economy but cares about people," she said.

Romney's campaign is mindful that it does not need to win a majority of women because it maintains a healthy lead among men. But campaign officials say they could severely weaken the president's re-election chances by slicing into the 13-point margin Obama had with women voters in 2008 and picking off support in swing states where women form a majority of the electorate.

Obama's team, meanwhile, is trying to take advantage of the president's personal favorability among women and undermine those voters' trust in Romney.

Ads have highlighted Romney's opposition to federal funding for Planned Parenthood and his shifting views on abortion rights, which he supported in Massachusetts but has opposed during his two presidential bids. The Obama ads end with this tagline: "Women need to know the real Mitt Romney." Abortion-themed ads have been on the rise in recent weeks across the political spectrum, more than tripling in the number of occurrences since mid-September, according to Kantar Media Intelligence.

The campaigns are competing for women in several key suburban markets ? including northern Virginia, the Denver suburbs, central Florida and Cleveland's suburbs ? while simultaneously appealing to unmarried women and those with blue-collar backgrounds who have been more vulnerable to the slow economic recovery. Obama won about 70 percent of unmarried women and carried about 60 percent of suburban women in 2008, setting a high bar for the president's campaign.

The intense effort to reach female voters has grown as national polls have shown cracks in Obama's support among women. Four years ago, Obama and Republican rival John McCain essentially split men in 2008 but polls have shown Romney with a double-digit lead among males this time.

"The big gender gap I'm looking at right now is Obama's male gender gap because those men seem pretty cemented in," said Republican pollster Kellyanne Conway, who served as an adviser to Newt Gingrich's presidential bid. "Whereas there's a fair amount of women who remain fluid, either completely undecided or soft in their support for either Obama or Romney."

Romney has sought to distance himself from statements he made on abortion and contraceptives during the Republican primaries while driving home that his economic plan would create jobs for women and their families. Romney's wife, Ann, has been a key surrogate for her husband, vouching for him before female audiences.

In TV ads, Romney offers a moderate image. In one ad, a woman says that Romney "thinks abortion should be an option in cases of rape, incest or to save a mother's life" but says she's "more concerned about the debt our children will be left with." Another spot features women who served under Romney. "He totally gets working women," says Ellen Roy Herzfelder, Romney's former environmental affairs secretary.

Obama reminds voters that the first law he signed was the Lilly Ledbetter Fair Pay Act, which prevents restrictions on workers filing lawsuits over pay inequity. Romney has not taken a position on the bill but said he wouldn't repeal it.

At rallies, the president routinely talks about the women in his life: how his grandmother watched men she trained get promoted over her, how education lifted his wife, Michelle, from a modest upbringing and why it wouldn't be fair if his two daughters earned less than their male counterparts when they eventually join the workforce.

___

Follow Ken Thomas at http://twitter.com/AP_Ken_Thomas

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/89ae8247abe8493fae24405546e9a1aa/Article_2012-10-22-Presidential%20Campaign-Women%20Voters/id-53692033859a42b6a5cba043b363a196

ufc 144 fight card ufc 144 results acura nsx all star weekend 2012 giada de laurentiis howard hughes nationwide race

Justin Bieber -- Delivers Smiles for Superfan Fighting Cancer - TMZ

Justin Bieber
Delivers Smiles for
Superfan Fighting Cancer

Breaking News

Hailey Roser and Justin BieberMission accomplished for one of Justin Bieber's biggest fans -- a little girl who is fighting cancer, got a private meeting with JB after a huge social media campaign that included a call to TMZ Live.

4-year-old Hailey Roser was all smiles during the 5 minute pow wow backstage with the Biebs before his concert in Milwaukee Sunday night.

Hailey's parents started the "Healing Hailey" campaign on Twitter and Facebook after she was diagnosed with a brain tumor in August -- and a few weeks ago one of the campaign's followers called in to TMZ Live to spread the word.

We joked with the caller, saying ... "we know some people" -- and then informed Justin's manager Scooter Braun about the "Healing Hailey" movement.

Hailey's been undergoing chemotherapy and had to get clearance from doctor's today to attend the concert. After meeting Justin, she tweeted a message to her followers ... "Dreams come true #believe"

Source: http://www.tmz.com/2012/10/21/justin-bieber-meets-fan-cancer-hailey-roser-milwaukee-concert/

pollen count mexico city first day of spring mexico earthquake aziz ansari aziz ansari katherine jenkins

Argentine leader orders evacuation of ship seized in Ghana

{ttle}

{cptn}","template_name":"ss_thmb_play_ttle","i18n":{"end_of_gallery_header":"End of Gallery","end_of_gallery_next":"View Again"},"metadata":{"pagination":"{firstVisible} - {lastVisible} of {numItems}","ult":{"spaceid":"2145892301","sec":""}}},{"id": "hcm-carousel-696506306", "dataManager": C.dmgr, "mediator": C.mdtr, "group_name":"hcm-carousel-696506306", "track_item_selected":1,"tracking":{ "spaceid" : "2145892301", "events" : { "click" : { "any" : { "yui-carousel-prev" : { "node" : "a", "data" : {"sec":"HCMOL on article right rail","slk":"prev","itc":"1" }, "bubbles" : true, "test": function(params){ var carousel = params.obj.getCarousel(); var pages = carousel._pages; // if same page, don't beacon if(("_ult_current_page" in carousel) && carousel._ult_current_page==pages.cur) return false; // keep track of current position within this closure carousel._ult_current_page = pages.cur; return true; } }, "yui-carousel-next" : { "node" : "a", "data" : {"sec":"HCMOL on article right rail","slk":"next","itc":"1" }, "bubbles" : true, "test": function(params){ var carousel = params.obj.getCarousel(); var pages = carousel._pages; // no more pages, don't beacon again // if same page, don't beacon if(("_ult_current_page" in carousel) && carousel._ult_current_page==pages.cur) return false; // keep track of current position within this closure carousel._ult_current_page = pages.cur; return true; } } } } } } })); }); Y.later(10, this, function() {(function() { try{ if (Math.floor(Math.random()*10) == 1) { var loc = window.location, decoded = decodeURI(loc.pathname), encoded = encodeURI(decoded), uri = loc.protocol + "//" + loc.host + encoded + ((loc.search.length > 0) ? loc.search + '&' : '?') + "_cacheable=1", xmlhttp; if (window.XMLHttpRequest) xmlhttp = new XMLHttpRequest(); else xmlhttp = new ActiveXObject("Microsoft.XMLHTTP"); xmlhttp.open("GET",uri,true); xmlhttp.send(); } }catch(e){} })(); }); Y.later(10, this, function() {Y.namespace("Media").ywaSettings = '"projectId": "10001256862979", "documentName": "", "documentGroup": "", "ywaColo" : "vscale3", "spaceId" : "2145892301" ,"customFields" : { "12" : "classic", "13" : "story" }'; Y.Media.YWA.init(Y.namespace("Media").ywaSettings); }); Y.later(10, this, function() {if(document.onclick===YAHOO.Media.PreventDefaultHandler.newClick){document.onclick=YAHOO.Media.PreventDefaultHandler.oldClick;} }); }); });

Tide is AP No. 1 for school-best 8th straight week

Alabama has run its streak of weeks at No. 1 in The Associated Press college football poll to eight, the longest stay atop the rankings by the Crimson Tide.

Alabama received 59 of 60 first-place votes from the media panel. The Tide has twice previously been No. 1 for seven consecutive weeks ? in 1979 when Bear Bryant coached 'Bama to a national title and in 1980 when the Tide finished sixth.

Oregon is No. 2 for the fifth consecutive week, though the gap between the Ducks and No. 3 Florida, which received the other first-place vote, narrowed after the Gators beat South Carolina 44-11 on Saturday. Alabama had gone three straight weeks as unanimous No. 1.

The rest of the top six was also unchanged after No. 4 Kansas State, No. 5 Notre Dame and No. 6 LSU all won.

South Carolina dropped from ninth to No. 17.

Source: http://news.yahoo.com/tide-ap-no-1-school-best-8th-straight-171632314.html

golden globes 2012 winners golden globes 2012 red carpet golden globes red carpet nfc championship game martin luther king jr quotes martin luther king jr i have a dream speech packers score

Saturday, October 13, 2012

Pet Shop Boys ?Leaving (Believe In PSB Remix)?: Idolator Premiere ...

Beautiful Single, Fab Remix

Whether they?re doing high-profile gigs like the closing ceremony of the London Olympics or recording exquisite albums like their latest, Elysium, Pet Shop Boys always manage to keep pop fans satisfied with their attention to detail. Case in point: the slew of demos, b-sides and remixes for new single ?Leaving,? which will be made available in three separate digital bundles on iTunes on Tuesday, October 16 in the US (and on October 15 in the UK).

Today Idolator is premiering the ?Believe In PSB Remix? of ?Leaving,? which pretty much serves as a good old-fashioned extended version of the song ? one where many of the flourishes in the background are more prominent and punched up. Listen below!

Yesterday we spoke with Andrew Dawson, co-producer of Elysium, about recording ?Leaving? with Pet Shop Boys members Neil Tennant and Chris Lowe. He noted the following: ?There are a lot of little subtle production elements in ?Leaving,? and some we went back and fourth on quite a few times. Sometimes I think more than the average listener would catch or hear. The great thing about it is we were all very focused on the larger details all the way down to the small ones, so you?ll hear a little more each time you listen.?

See if you can catch some of those details more easily in the ?Believe In PSB Remix? of ?Leaving?:

One quality that stands out the most on ?Leaving? ??and on many of the tracks on Elysium ? is the unmistakeable presence of backing vocalists Oren, Maxine, Luther and Julia Waters, who have worked with everyone from Michael Jackson in his Motown days to Adele. You can hear them prominently in the remix above.

?Chris and Neil knew from the start that they wanted a thick lush BV environment on this album,? Dawson told us. ?Early on in the process I was talking with my management and they had just done some work with the Waters. I ended up reaching out to them and invited them over to see how it would work, and as I recall, ?Leaving? was one of the first songs they recorded on. We were recording within 30 minutes of them arriving to the studio. They were wonderful at harmonizing everything and working out the balance and blend between themselves, because they have been singing together for so long.?

As we noted in our review of Elysium, ?Leaving? is a song about growing older and facing death ? in particular, Tennant penned the lyrics to reflect his thoughts on the recent passing of both of his parents. Still, it?s an upbeat track, and the ?Believe In PSB Remix? really plays up its more uplifting pop elements.

Andrew explained how he and the Boys went about creating that quality: ?The? ?happy sad? tone of the album is most easily set by Neil?s lyrics. A very bittersweet, reflective, yet peaceful look at things. So the challenge is to find something that compliments that direction. Certain instrumentation can subtly and subconsciously steer your emotions to angry, happy, sad, thoughtful ? the whole gamut of sounds. So the challenge is to put the pieces together that work as a whole, not throw everything in the kitchen sink at it. Let it breathe, but still give detail to the music. There?s a lot of clever subtlety in this album.?

Pet Shop Boys have been Grammy-nominated several times, most recently for their 2009 album Yes. Dawson himself has three Grammys thanks to his work on Kanye West?s albums. Still, the producer notes that collaborating with Neil and Chris allowed him to explore new avenues with music.

?Usually in the pop/urban world, an extremely high prevalence is put on the ?beat? ? almost to the point that sometimes the melody, and more so the harmony, are an afterthought. Chris and Neil from the start have top notch chordal and harmonic structure, complimented by really great melodies. The harmony/melody are really important to them, so it was really fun for me ? especially being from a classical background ?to embellish and work with harmony/melody.?

Elysium is out now. Pet Shop Boys? ?Believe In PSB Remix? of ?Leaving? will be made available on iTunes on Tuesday, October 16. Give it a spin above, and let us know your thoughts on the song below, or by hitting us up on Facebook and Twitter!

Source: http://idolator.com/7117292/pet-shop-boys-leaving-believe-in-psb-remix-premiere

Jessica Lange houston texans houston texans NFL scores week 3 kat dennings Steve Sabol Yom Kippur 2012

Friday, October 12, 2012

After all the drama, Apple Storage building back on the market ...

After all the drama, Apple Storage building back on the market

Posted on 12 October 2012

building

An ?Available? sign now hangs on the Apple Storage building, again bringing into question the building?s future. (Photo by Mike Lyons)

Months of neighborhood drama accompanied the sale and re-zoning of the Apple Storage building to a developer who pledged to turn the hulking shell near 52nd and Baltimore into apartments. Now, six months after the plan won zoning approval, the building is back on the market.

Real estate developer Iron Stone proposed to convert the seven-story warehouse into 112 studio, one- and two bedroom apartments and retail space. The neighborhood group Cedar Park Neighbors, many business owners along Baltimore Avenue and Councilwoman Jannie Blackwell supported the project. Meetings were held with neighbors who live near the building and feared their property taxes would increase as a result of the development. Iron Stone successfully navigated the often tricky zoning process.

Now the project appears to be on hold indefinitely.

Through a real estate agent, NAI Geis Realty Group, Iron Stone is marketing the building as a ?fully approved student housing/apartment project? with an asking price of $2 million.

?They have a couple of other things in the pipeline,? said real estate agent Jack Byers from NAI Geis. ?They just want to see if there is any interest.?

Byers said that very little of the planned renovation has been done so far.

The zoning requirements would transfer to the new owners if the building is sold. Here is more text from the marketing brochure (pdf link here):

?Apple Lofts is the next great student housing opportunity. Cedar Park represents stable housing stock in a quickly revitalizing up and coming market. This market is brimming with students seeking unique housing opportunities with off-street parking and supporting retail amenities near University of Pennsylvania and Drexel and St. Joseph?s Universities.?

?

Source: http://www.westphillylocal.com/2012/10/12/after-all-the-drama-apple-storage-building-back-on-the-market/

top model all stars americas next top model mark buehrle mark buehrle rick perry ad rick perry ad dragnet

Thursday, October 11, 2012

Forex Financial institution - Forex Reserve - Us Currency Exchange ...

Every time a forex trader buys options, he is hoping the trade level will fall good enough to overcome the high quality paid and also come up with a financial gain. So getting to be a successful options trader isn?t any indicate straightforward activity. In contrast, spreads with different expiration months are known as horizontal (or time) spreads.

Research suggest that seventy for every cents of options expire worthless. Options trading is an excellent approach for making use of monetary leverage for making bigger buys. A discussion board is a superb spot to come across these sorts of people, but do keep in mind, you will need to know what you need.

This trade results in a financially rewarding trade in the event the inventory closes on expiry earlier mentioned $102. They produce a defined revenue should they expire worthless and can generate no much more. Calls boost in worth as being the inventory price rises, and puts maximize in benefit to be the inventory cost declines.

A placement that takes advantage of a mix of various strike rates and expiration months is usually termed a diagonal disperse. The next day, on March eighth, BBH went many of the way up to $196.fifty so it crossed in excess of the strike selling price plus the selling price with the choice went from $1.50 to $2.75, which is more than an 80% acquire. Betting within the horse which includes the greater odds will not likely net as much cash, but might be more very likely to generate you a financial gain. When about three months passes, they both pay back the remaining $99,000 to the shares on the inventory, or forfeit the option.

When the trader employs and options unfold that takes advantage of contact options, a bullish shift would cause a delta with the call to raise. Many search for for making a fortune by striking a grand slam as a result of getting out of the cash options. You can find more free guidance on options trading and standard trading procedures.

In bullish marketplaces, the most popular spreads are Bull Contact debit unfold or possibly a Bull Put credit spreadIn bearish marketplaces, the trader would then deploy a Bear Set debit distribute or Bear Get in touch with credit disperse. We will start out speaking about another thing, and ahead of we all know it, it can be late. At the very same time, the trader will offer an ?out of your dollars call? for a similar protection in the similar expiration time period. The head and shoulders, wedge and flag styles normally fall less than this heading.

Not surprisingly recognizing that there is a limitation on the utmost reduction is wonderful, but options trading is about making earnings. Actually, I feel you are going to save a lot more time executing online options trading because you help save on your own the hassle of assembly your consumer or broker and can rather devote much more time exploring and study the varied options and stocks.

Nonetheless, for that amateur options trader it could appear to get too exotic. Options trading message boards will allow you to debate options trading with fellow like minded investors. Seeking support from others is actually a normal course of action, in addition to a reciprocating affair. Getting a possibility offers you the ideal, but not the obligation to purchase the asset in a certain rate (named the strike cost). You are able to elect to generally be both the buyer or the seller.

In the event the stock?s closing price on expiration is $108, the $100 call possibility will conclude at an earnings of $8 a reveal, or $800 per deal, while the $115 simply call possibility expires worthless and you also keep the $500 made for the authentic sale. An additional technique to participate options acquiring is thru the utilization of a mix of extensive and brief placements or possibly a ?spread.? A possibility spread is often a hedged trade that will lower risk even though for the similar time restricting gains. If you?re nevertheless holding the options at that time they are going to expire and be worthless.

For more interesting articles, informations and resources visit our website

Source: http://www.autodilnaburian.cz/forex-financial-institution-forex-reserve-us-currency-exchange-rate/

peyton manning super bowl nsx chad ochocinco roman numerals new england patriots madonna madonna

Overview of Cyber Laws In India

CA Rajkumar S. Adukia

1. INTRODUCTION

?Cyber? is a prefix used to describe a person, thing, or idea as part of the computer and information age. Taken from kybernetes, Greek word for ?steersman? or ?governor,? it was first used in cybernetics, a word coined by Norbert Wiener and his colleagues. The virtual world of internet is known as cyberspace and the laws governing this area are known as Cyber laws and all the netizens of this space come under the ambit of these laws as it carries a kind of universal jurisdiction. Cyber law can also be described as that branch of law that deals with legal issues related to use of inter-networked information technology. In short, cyber law is the law governing computers and the internet.

The growth of Electronic Commerce has propelled the need for vibrant and effective regulatory mechanisms which would further strengthen the legal infrastructure, so crucial to the success of Electronic Commerce. All these regulatory mechanisms and legal infrastructures come within the domain of Cyber law.

Cyber law is important because it touches almost all aspects of transactions and activities on and involving the internet, World Wide Web and cyberspace. Every action and reaction in cyberspace has some legal and cyber legal perspectives.

Cyber law encompasses laws relating to ?

? Cyber crimes

? Electronic and digital signatures

? Intellectual property

? Data protection and privacy

1.1. History of Internet and World Wide Web

The Internet is a global system of interconnected computer networks that use the standardized Internet Protocol Suite (TCP/IP). It is a network of networks that consists of millions of private and public, academic, business, and government networks of local to global scope that are linked by copper wires, fiber-optic cables, wireless connections, and other technologies. The Internet carries a vast array of information resources and services, most notably the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail, in addition to popular services such as online chat, file transfer and file sharing, online gaming, and Voice over Internet Protocol (VoIP) person-to-person communication via voice and video.

The origins of the Internet dates back to the 1960s when the United States funded research projects of its military agencies to build robust, fault-tolerant and distributed computer networks. This research and a period of civilian funding of a new U.S. backbone by the National Science Foundation spawned worldwide participation in the development of new networking technologies and led to the commercialization of an international network in the mid 1990s, and resulted in the following popularization of countless applications in virtually every aspect of modern human life.

The terms Internet and World Wide Web are often used in everyday speech without much distinction. However, the Internet and the World Wide Web are not one and the same. The Internet is a global data communications system. It is a hardware and software infrastructure that provides connectivity between computers. In contrast, the Web is one of the services communicated via the Internet. It is a collection of interconnected documents and other resources, linked by hyperlinks and Uniform Resource Locator [URLs].

The World Wide Web was invented in 1989 by the English physicist Tim Berners-Lee, now the Director of the World Wide Web Consortium, and later assisted by Robert Cailliau, a Belgian computer scientist, while both were working at CERN in Geneva, Switzerland. In 1990, they proposed building a ??web of nodes?? storing ??hypertext pages?? viewed by ??browsers?? on a network and released that web in December.

Overall Internet usage has seen tremendous growth. From 2000 to 2009, the number of Internet users globally rose from 394 million to 1.858 billion. By 2010, 22 percent of the world?s population had access to computers with 1 billion Google searches every day, 300 million Internet users reading blogs, and 2 billion videos viewed daily on YouTube.

After English (27%), the most requested languages on the World Wide Web are Chinese (23%), Spanish (8%), Japanese (5%), Portuguese and German (4% each), Arabic, French and Russian (3% each), and Korean (2%). By region, 42% of the world?s Internet users are based in Asia, 24% in Europe, 14% in North America, 10% in Latin America and the Caribbean taken together, 6% in Africa, 3% in the Middle East and 1% in Australia/Oceania.

1.2. Need for Cyber law

In today?s techno-savvy environment, the world is becoming more and more digitally sophisticated and so are the crimes. Internet was initially developed as a research and information sharing tool and was in an unregulated manner. As the time passed by it became more transactional with e-business, e-commerce, e-governance and e-procurement etc. All legal issues related to internet crime are dealt with through cyber laws. As the number of internet users is on the rise, the need for cyber laws and their application has also gathered great momentum.

In today?s highly digitalized world, almost everyone is affected by cyber law. For example:

? Almost all transactions in shares are in demat form.

? Almost all companies extensively depend upon their computer networks and keep their valuable data in electronic form.

? Government forms including income tax returns, company law forms etc. are now filled in electronic form.

? Consumers are increasingly using credit cards for shopping.

? Most people are using email, cell phones and SMS messages for communication.

? Even in ?non-cyber crime? cases, important evidence is found in computers / cell phones e.g. in cases of divorce, murder, kidnapping, tax evasion, organized crime, terrorist operations, counterfeit currency etc.

? Cyber crime cases such as online banking frauds, online share trading fraud, source code theft, credit card fraud, tax evasion, virus attacks, cyber sabotage, phishing attacks, email hijacking, denial of service, hacking, pornography etc are becoming common.

? Digital signatures and e-contracts are fast replacing conventional methods of transacting business.

Technology per se is never a disputed issue but for whom and at what cost has been the issue in the ambit of governance. The cyber revolution holds the promise of quickly reaching the masses as opposed to the earlier technologies, which had a trickledown effect. Such a promise and potential can only be realized with an appropriate legal regime based on a given socio-economic matrix.

1.3.? Cyber crime on the rise

  • As per the cyber crime data maintained by the National Crime Records Bureau (NCRB), a total of 217, 288, 420 and 966 Cyber Crime cases were registered under the Information Technology Act, 2000 during 2007, 2008, 2009 and 2010 respectively. Also, a total of 328, 176, 276 and 356 cases were registered under Cyber Crime related Sections of Indian Penal Code (IPC) during 2007, 2008, 2009 and 2010 respectively. A total of 154, 178, 288 and 799 persons were arrested under Information Technology Act 2000 during 2007-20 10. A total number of 429, 195, 263 and 294 persons were arrested under Cyber Crime related Sections of Indian Penal Code (IPC) during 2007-20 10.
  • As per 2011 NCRB figures, there were 1,791 cases registered under the IT Act during the year 2011 as compared to 966 cases during the previous year (2010) thereby reporting an increase of 85.4% in 2011 over 2010.
  • Of this, 19.5% cases (349 out of 1,791 cases) were reported from Andhra Pradesh followed by Maharashtra (306), Kerala (227), Karnataka (151) and Rajasthan (122). And 46.1% (826 cases) of the total 1,791 cases registered under IT Act, 2000 were related to loss/damage to computer resource/utility reported under hacking with computer systems.
  • According to NCRB, the police have recorded less than 5,000?only 4,829 cases and made fewer arrests (3,187) between 2007 and 2011, under both the Information Technology (IT) Act as well as the Indian Penal Code (IPC).
  • And convictions remain in single digits, according to lawyers. Only 487 persons were arrested for committing such offences during the year 2011. There were 496 cases of obscene publications/transmission in electronic form during the year 2011 wherein 443 persons were arrested.
  • Out of total 157 cases relating to hacking under Sec. 66(2), most of the cases (23 cases) were reported from Karnataka followed by Kerala (22 ) and Andhra Pradesh (20 cases). And 20.4% of the 1184 persons arrested in cases relating to IT Act, 2000 were from Andhra Pradesh (242) followed by Maharashtra (226).
  • The age-wise profile of persons arrested in cyber crime cases under the IT Act, 2000 showed that 58.6% of the offenders were in the age group 18?30 years (695 out of 1184) and 3 1.7% of the offenders were in the age group 30-45 years (376 out of 1184). Madhya Pradesh (10), Maharashtra (4), Kerala (3) and Delhi (2) reported offenders whose age was below 18 years.
  • Meanwhile, a total of 422 cases were registered under the Indian Penal Code or IPC Sections during the year 2011 as compared to 356 such cases during 2010 thereby reporting an increase of 18.5%. Maharashtra reported maximum number of such cases (87 out of 422 cases i.e. 20.6%) followed by Chhattisgarh 18.0% (76 cases) and Delhi 11.6% (49 Cases).
  • Majority of the crimes out of total 422 cases registered under IPC fall under 2 categories?forgery (259) and Criminal Breach of Trust or fraud (118). Although such offences fall under the traditional IPC crimes, these cases had the cyber overtones wherein computer, Internet or its enabled services were present in the crime and hence they were categorised as Cyber Crimes under IPC.
  • Crime head-wise and age-wise profile of the offenders arrested under Cyber Crimes (IPC) for the year 2011 reveals that offenders involved in forgery cases were more in the age-group of 18-30 (46.5%) (129 out of 277). 50.4% of the persons arrested under Criminal Breach of Trust/Cyber Fraud offences were in the age group 30-45 years (65 out of 129).
  • Meanwhile 9 out of 88 mega cities did not report any case of cyber crime i.e., neither under the IT Act nor under IPC Sections during the year 20 11.
  • And 53 mega cities have reported 858 cases under IT Act and 200 cases under various sections of IPC. There was an increase of 147.3% (from 347 cases in 2009 to 858 cases in 2011) in cases under IT Act as compared to previous year (2010), and an increase of 33.3% (from 150 cases in 2010 to 200 cases in 2011) of cases registered under various sections of IPC.
  • Bangalore (117), Vishakhapatnam (107), Pune (83), Jaipur (76), Hyderabad (67) and Delhi (City) (50) have reported high incidence of cases (500 out of 858 cases) registered under IT Act, accounting for more than half of the cases (58.3%) reported under the IT Act. Delhi City has reported the highest incidence (49 out of 200) of cases reported under IPC sections accounting for 24.5% followed by Mumbai (25 or 12.5%).

A major programme has been initiated on development of cyber forensics specifically cyber forensic tools, setting up of infrastructure for investigation and training of the users, particularly police and judicial officers in use of this tool to collect and analyze the digital evidence and present them in Court.

Indian Computer Emergency Response Team (CERT-In) and Centre for Development of Advanced Computing (CDAC) are involved in providing basic and advanced training of Law Enforcement Agencies, Forensic labs and judiciary on the procedures and methodology of collecting, analyzing and presenting digital evidence.

Cyber forensic training lab has been set up at Training Academy of Central Bureau of Investigation (CBI) to impart basic and advanced training in Cyber Forensics and Investigation of Cyber Crimes to Police Officers associated with CBI. In addition, Government has set up cyber forensic training and investigation labs in Kerala, Assam, Mizoram, Nagaland, Arunachal Pradesh, Tripura, Meghalaya, Manipur and Jammu & Kashmir.

In collaboration with Data Security Council of India (DSCI), NASSCOM, Cyber Forensic Labs have been set up at Mumbai, Bengaluru, Pune and Kolkata. DSCI has organized 112 training programmes on Cyber Crime Investigation and awareness and a total of 3680 Police officials, judiciary and Public prosecutors have been trained through these programmes.

Indian Computer Emergency Response Team (CERT-In) issues alerts, advisories and guidelines regarding cyber security threats and measures to be taken to prevent cyber incidents and enhance security of Information Technology systems.

1.4. Important terms related to cyber law

?Access? with its grammatical variations and cognate expressions means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network. (Sec.2(1)(a) of IT Act, 2000)

?Addressee? means a person who is intended by the originator to receive the electronic record but does not include any intermediary. (Sec.2(1)(b) of IT Act, 2000)

?Affixing Electronic Signature? with its grammatical variations and cognate expressions means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of Electronic Signature. (Sec.2(1)(d) of IT Act, 2000)

?Asymmetric Crypto System? means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature. (Sec.2(1)(f) of IT Act, 2000)

?Certifying Authority? means a person who has been granted a license to issue a Electronic Signature Certificate under section 24. (Sec.2(1)(g) of IT Act, 2000)

?Communication Device? means Cell Phones, Personal Digital Assistance (Sic), or combination of both or any other device used to communicate, send or transmit any text, video, audio, or image. (Sec.2(1)(ha) of IT Act, 2000)

?Computer? means any electronic, magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network (Sec.2(1)(i) of IT Act, 2000)

?Computer Network? means the interconnection of one or more Computers or Computer systems or Communication device through-

(i)?? the use of satellite, microwave, terrestrial line, wire, wireless or other communication media; and

(ii)? terminals or a complex consisting of two or more interconnected computers or communication device whether or not the interconnection is continuously maintained. (Sec.2(1)(j) of IT Act, 2000)

?Computer Resource? means computer, communication device, computer system, computer network, data, computer database or software. (Sec.2(1)(k) of IT Act, 2000)

?Computer System? means a device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable of being used in conjunction with external files, which contain computer programmes, electronic instructions, input data, and output data, that performs logic, arithmetic, data storage and retrieval, communication control and other functions. (Sec.2(1)(l) of IT Act, 2000)

?Cyber cafe? means any facility from where access to the Internet is offered by any person in the ordinary course of business to the members of the public. (Sec.2(1)(na) of IT Act, 2000)

?Cyber Security? means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction. (Sec.2(1)(nb) of IT Act, 2000)

(o) ?Data? means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in a formalized manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer. (Sec.2(1)(o) of IT Act, 2000)

(p) ?Digital Signature? means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3. (Sec.2(1)(p) of IT Act, 2000)

?Electronic Form? with reference to information means any information generated, sent, received or stored in media, magnetic, optical, computer memory, micro film, computer generated micro fiche or similar device. (Sec.2(1)(r) of IT Act, 2000)

?Electronic Record? means data, record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche. (Sec.2(1)(t) of IT Act, 2000)

?Electronic signature? means authentication of any electronic record by a subscriber by means of the electronic technique specified in the second schedule and includes digital signature. (Sec.2(1)(ta) of IT Act, 2000)

?Function?, in relation to a computer, includes logic, control, arithmetical process, deletion, storage and retrieval and communication or telecommunication from or within a computer. (Sec.2(1)(u) of IT Act, 2000)

?Information? includes data, message, text, images, sound, voice, codes, computer programmes, software and databases or micro film or computer generated micro fiche. (Sec.2(1)(v) of IT Act, 2000)

?Intermediary? with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web hosting service providers, search engines, online payment sites, online-auction sites, online market places and cyber cafes. (Sec.2(1)(w) of IT Act, 2000)

?Key Pair?, in an asymmetric crypto system, means a private key and its mathematically related public key, which are so related that the public key can verify a digital signature created by the private key. (Sec.2(1)(x) of IT Act, 2000)

?Originator? means a person who sends, generates, stores or transmits any electronic message or causes any electronic message to be sent, generated, stored or transmitted to any other person but does not include an intermediary. (Sec.2(1)(za) of IT Act, 2000)

?Private Key? means the key of a key pair used to create a digital signature. (Sec.2(1)(zc) of IT Act, 2000)

?Public Key? means the key of a key pair used to verify a digital signature and listed in the Digital Signature Certificate. (Sec.2(1)(zd) of IT Act, 2000)

?Secure System? means computer hardware, software, and procedure that -:

(a)? are reasonably secure from unauthorized access and misuse;

(b)? provide a reasonable level of reliability and correct operation;

(c)? are reasonably suited to performing the intended functions; and

(d)?? adhere to generally accepted security procedures. (Sec.2(1)(ze) of IT Act, 2000)

?Subscriber? means a person in whose name the Electronic Signature Certificate is issued. (Sec.2(1)(zg) of IT Act, 2000)

To Read more

Download Free eBook on Cyber Laws In India

Source: http://taxguru.in/finance/overview-cyber-laws-india.html

Montenegro Olympic Games Dana Vollmer phillies phillies Ryan Dempster Phelps