Sunday, September 30, 2012

How To Use Sales Videos To Improve ... - Business 2 Community

Businesses that start using online video content marketing in their daily sales and marketing process stand to gain significant tangible benefits (increased conversion rates) across their entire lead generation and sales cycle.? Benefits ranging from ranking higher on search engines, higher amount of qualified leads, more engagement during the sales process, more time spent on websites and increased brand awareness to name a few.

If one of your marketing goals is increased search engine rankings, Google, and other search engines, put more search engine ranking value on online video so video will help you move higher up on search engine rankings so prospective customers can find you.? Consumer behavior quickly reveals the power of online video on increasing lead conversion.? Immediately after viewing a company?s video, buyers are 40% more likely to visit a company?s website or contact a company via phone (eMarketer, Jan 2011).

Your website video production will also help you to nurture those leads and make them more sales ready.? Website videos let decision makers research your company on their own time and still get a direct communication from you.? The end result is that they more clearly understand the value proposition of your business, who you are as people (build relationships) and how your product or service will fit their needs.

Sales videos can also be used in deals that involve multiple decision makers and have a long sales process (six months or longer).? The goal of these business-to-business sales videos should keep multiple decision makers engaged with the sales team by giving them examples of your firms skill sets and capabilities ? just like you may do now with white papers and case studies.?Busy decision makers will appreciate your online sales video production because it will be easier, and quicker, for them to gain the insight they need in a more personal presentation.

So online video is just an integral piece of your overall sales process.

But what types of videos do you create and what fits best into your daily sales and marketing routines?? Check out this video that talks about what type of content makes for the best online videos for your company -

Source: http://www.business2community.com/content-marketing/how-to-use-sales-videos-to-improve-conversion-rates-across-your-sales-cycle-0295173

michael turner split pea soup land of the lost cleveland cavaliers cleveland cavaliers war horse k cups

thecysight: VOGUE CHINA OCTOBER 2012 Lindsey Wixson by Sharif...

Home ? About ? FAQ ? My life ? Ask away! ? RSS ? Theme

Designer, artist, prancer, dancer, model, noble, loon.

My nature/celtic blog can be found over here: On The Shores of C?ivien?n
My fandom blog (Game of Thrones, Marvel Comics, Dr. Who) can be found over here: Rattle and Burn
Or follow me on twitter @ladylocharbor

Source: http://lady-oneiromancy.tumblr.com/post/32584380662

2012 state of the union address jorge posada maurice sendak state of the union sotu boehner john boehner

Microsoft pushes for 20,000 more H-1B visas

Software major has 6,000 jobs vacant due to shortage of skilled workers

New Delhi, Sept. 29:?

Microsoft has urged the US Government to issue 20,000 additional H-1B visas to foreign workers with skills in science, technology, engineering and mathematics (STEM).

In addition, it wants US Congress to allocate 20,000 green cards for workers with these skills.

The software giant has proposed that the companies that use the H-1B visas from this supplementary pool should pay $10,000 for each employee who gets the visa, while green card approval will entail a fee of $15,000.

Brad Smith, Microsoft's General Counsel and Executive Vice-President, Legal & Corporate Affairs, has proposed this plan as a long-term strategy wherein the money generated by issuing the additional visas can be utilised to fund higher education for Americans.

According to Microsoft, this approach could raise up to $500 million a year ? or $5 billion over a decade ? that the federal government can distribute to states where STEM education investments are needed.

?Our nation faces the paradox of a crisis in unemployment at the same time that many companies cannot fill the jobs they have to offer. In addition to the short-term consequences for businesses and individuals, we risk these jobs migrating from the US, creating even bigger challenges for our long-term competitiveness and economic growth,? Smith said in his post.

Companies across the information technology sector are creating new jobs in the US faster than they can fill them. Microsoft has 6,000 jobs vacant, an increase of 15 per cent over the last year, due to shortage of STEM-skilled professionals. While the overall unemployment rate hovers around 8 per cent, unemployment in computer-related occupations has fallen to 3.4 per cent.

US visa has become the bane of Indian IT companies. In March the US Citizenship and Immigration Services announced an increase in the application fee of H1-B visas.

In June, the Immigration authority announced that it had reached the cap on Congressionally mandated 65,000 H-1B work visas, the most sought after by Indian professionals.

thomas.thomas@thehindu.co.in

'; } else if (google_ads[0].type == "html") { s += google_ads[0].snippet; } else if (google_ads[0].type == "text") { // Adjust text sizes to occupy the majority of ad space. if (google_ads.length == 1) { ad_title_class = 'ad_title_large'; ad_text_class = 'ad_text_large'; ad_url_class = 'ad_url_large'; } else { ad_title_class = 'ad_title'; ad_text_class = 'ad_text'; ad_url_class = 'ad_url'; } for(var i=0; i

Source: http://www.thehindubusinessline.com/industry-and-economy/info-tech/article3949168.ece

moratorium dwts season 14 cast leap day michigan primary results olympia snowe davey jones dead boston weather

Saturday, September 29, 2012

Study points to potential for improvement in the care ... - Health.am

? Epilepsy ? ? Neurology ? Sep 28, 2012

Routine screening for psychiatric, cognitive and social problems could enhance the quality of care and quality of life for children and adults with epilepsy, according to a study by UC Irvine neurologist Dr. Jack Lin and colleagues at the University of Wisconsin-Madison and Amedeo Avogadro University in Italy.

Physicians who treat those with epilepsy often focus on seizures, Lin said. However, patients show an increased prevalence of psychiatric issues (mood, anxiety or attention-deficit/hyperactivity disorders), cognitive disorders (in memory, language or problem solving) and social difficulties (involving employment or personal interactions). The relationship between epilepsy and these complications is complex and poorly understood. Lin said they may present greater problems for a patient if left untreated.

Study appears today in The Lancet.

?Screening for psychiatric, cognitive and social comorbidities is essential not only in established cases but also with newly diagnosed epilepsy,? Lin said. ?By doing so, we can ensure that these issues are treated and that patients have a better quality of life.?

He emphasized that screening should also be conducted prior to any new drug treatment.

Problems that occur in conjunction with childhood and adult epilepsy are referred to by doctors as comorbidities, meaning that they have a greater than coincidental chance of appearing alongside each other though there is not necessarily a causal relationship between them.

The study suggests a number of possible factors responsible for these comorbidities, including the characteristics of epilepsy and its medication protocol, underlying brain disorders, and epilepsy-related disruptions of normal neurodevelopment and aging.

While experts have begun to recognize the effects of psychiatric, cognitive and social comorbidities in epilepsy, Lin noted, gaps remain in the early detection, treatment and prevention of these issues.

About The Lancet: The world?s leading independent general medical journal, The Lancet features coverage that?s international in focus and extends to all aspects of human health. It publishes original primary research and review articles of the highest standard. The Lancet is stringently edited and peer-reviewed to ensure the scientific merit and clinical relevance of its diverse content. Drawing on an international network of advisers and contributors, The Lancet meets the needs of physicians by adding to their clinical knowledge and alerting them to current issues affecting the practice of medicine worldwide.

About UC Irvine Medical Center: Orange County?s only university hospital, UC Irvine Medical Center offers acute- and general-care services at its new, 482,000-square-foot UC Irvine Douglas Hospital and is home to the county?s only Level I trauma center, American College of Surgeons-verified regional burn center and National Cancer Institute-designated comprehensive cancer center. For 12 consecutive years, U.S. News & World Report has counted UC Irvine among ?America?s Best Hospitals.?

About the University of California, Irvine: Founded in 1965, UCI is a top-ranked university dedicated to research, scholarship and community service. Led by Chancellor Michael Drake since 2005, UCI is among the most dynamic campuses in the University of California system, with nearly 28,000 undergraduate and graduate students, 1,100 faculty and 9,000 staff. Orange County?s second-largest employer, UCI contributes an annual economic impact of $4 billion.

###

John Murray
University of California, Irvine
Medical Center Communications
714-456-7759

Provided by ArmMed Media




?Comments [ + Post Your Own ]?

Now you're in the public comment zone. What follows is not Armenian Medical Network's stuff; it comes from other people and we don't vouch for it. A reminder: By using this Web site you agree to accept our Terms of Service. Click here to read the Rules of Engagement.

There are no comments for this entry yet. [ + Comment here + ]


Get free support - Headache Causes, Symptoms, Diagnosis, and Treatment on HeadacheCare.net

Source: http://www.health.am/ab/more/quality-of-life-of-epilepsy-patients/

san onofre paula deen birth control recall nick carter leslie carter aaron carter sister pfizer

The 2012 National Solar Tour - Solar Feeds

Once a year solar owners across the US come together and allow the public to tour their homes, businesses and solar and energy efficient buildings. That time is now. And this year there?s an added bonus, a sweepstakes with nearly $4,000 in prizes! While officially the National Solar Tour takes place on Oct. 6, 2012, depending on where people live in the U.S. (and actually across the world), the tour could be taking place on a different day. Either way, as an added incentive for attending a local tour participants can register for the National Solar Tour Sweepstakes as part of the 17th annual National Solar Tour. The grand prize of the sweepstakes is a $2,500 gift certificate to a home improvement store. Second prize is a $1,000 gift certificate. And three, third place prizes will consist of Goal Zero Guide Plus solar-powered mobile battery charging kits, according to the American Solar Energy Society (ASES), which puts on the annual event. To enter into the contest people can go to the ASES site here or by scanning QR codes in the tour. The tour is an opportunity for people interested in going solar to check out how others in their community have done it. And homeowners and installers are on hand to discuss the installation process, how the system or systems work (some homes or buildings have additional renewable energy features like solar hot water, heating and cooling, wind, geothermal heating and cooling, superinsulation or other features) that make the buildings stand out and more sustainable. The tour has grown in size and popularity each year. ?More than 5,000 building owners open their doors for the tour this fall, in nearly every state and in every climate, from the sunny Southwest to the snowy Northeast,? said David Hill, chair of ASES? Board of Directors. ?We expect more than 160,000 people to tour the open-house buildings this fall. Tour visitors have dedicated the better part of a Saturday to see what their neighbors are doing with solar power.? This year over 3,200 communities will host solar tours. Some started as early as Sept. 22, but the majority will occur this and next weekend. For instance, the Denver Area Sustainable Living Tour and the 2012 Coconino County Sustainable Building and Water Conservation Tour take place this Saturday. Meanwhile the Green Energy Ohio Tour runs from Oct. 1 to Oct. 7, as do some others. If you?re interested in participating in a local tour, you can see where a tour is happening near you by clicking here.

Tags: 2012 national solar tour sweepstakes, affordable solar, american solar energy society, ases, back up, back up power, back-up batteries, bioenergy, co on october 1 - five day pv installer courses meet nabcep education requirements, elkhart solar, energy efficiency, energy fair, enphase inverters, geothermal energy, green power, grid tie, grid-tied solar, houston, hydrogen - fuel cells, hydropower, illinois solar, indiana solar, indiana wind, lagrange solar, michiana solar, michiana wind, mishawaka solar, national solar tour, ocean energy, off grid, off-grid solar, off-grid systems, ontility solar training, other, power back-up systems, pv system, schott solar, Solar, solar distributor, solar electric, solar installation, solar installer, solar panels, solar systems, solar tech, solar today, solar training tour visits denver, south bend solar, sunnyboy inverters, tour, tour guide, wind power

Source: http://www.solarfeeds.com/the-2012-national-solar-tour/

golden globe winners 2012 ricky gervais golden globes epidermolysis bullosa miss wisconsin law abiding citizen golden globes 2012 miss america

5 Tips on Insuring Your Small Business | Time To Startup!

By Jessica Sanders

Your small business, no matter how small, needs to be insured. If not only for you, but the employees that you hire on to make your business grow. From workers compensation to errors and omissions insurance, there are many choices to make. So, instead of choosing the first option you come across in a quick Google search, you want to consider a number of aspects including cost savings and your industry.

Get Industry Specific

Your business is likely at risk for any number of unique, industry specific needs; a contract company may want to invest in general liability however a trucking business will need commercial vehicle insurance. Therefore, to ensure that you are completely covered, you want to be sure you have all the right insurance for both your business, you as a business owner and your hard working employees.

Know the Policies

This seems obvious, right? However, too many business owners shop by price and rely on a good sales person instead of truly understanding what their policy holds. Instead of falling back on your limited insurance knowledge and a great sales pitch, be sure that you know what you?re being told.

  • Hire a professional: If you don?t want to hire an insurance professional, consider utilizing the knowledge of your attorney. With a familiarity of your industry and business, this person will be able to make sure you?re getting what you need.

Save Where You Can

Save is not a word that comes to mind when you think of insurance. From premiums to even higher deductibles, it seems like a necessary expense that comes as one size fits all. However, you have the opportunity to save with the proper precautions.

Professionals at Insweb.com suggest, ?Reduce your loss risk with fire sprinklers, security systems and/or other safety devices. Many of these will lead to insurance discounts.? Check with your insurance provider to see how you already qualify and what other modifications you can make.

Shop Around

Though a number of insurance agencies monopolize this industry, it doesn?t mean the top dogs are the best ones for your business. Thus, it?s important that you look into each and every option. For example, local insurance agencies may be able to negotiate pricing and be more convenient in a time of emergency or financial burden.

Spend More to Spend Less

As a small business, your budget for insurance may be minimal. However, sometimes it?s the case that you can spend more up front to spend less later down the line. With insurance, there are a number of payments to be made, including deductibles and premiums, but these can work together for an overall lower investment.

  • Higher deductible: According to RateAlert.com, ?? The higher your deductibles the lower your insurance premium.? If you don?t have the cash flow to start high, make your way there as the business grows.

Choosing the right business insurance can feel like a daunting task. However, it?s a necessary evil for each and every business, big or small. To be sure you make the right choice for you, your growing business and the employees that work for you, make educated decisions each step of the way.

???????????????????????

Jessica Sanders is an avid small business writer touching on topics that range from social media to liability insurance and workers compensation. She is a professional blogger and web content writer for ResourceNation.com.

Source: http://www.bizfilings.com/blog/index.php/2012/09/28/5-tips-on-insuring-your-small-business/

mike jones just friends chronicle george lopez bedtime stories micron susan g komen

Guest Post ? Privacy 101: privacy, anonymity and you | Finally, A ...

This is a double guest post, incorporating two separate presentations from the recent Melbourne Crytoparty event.? Cryptoparties are grass-roots data security education activism ? CryptoParties are free to attend, public, and are commercially non-aligned.? Some of the information provided below is specific to Australian law; find a Cryptoparty MeetUp local to you if you want to check your specific legalities (follow the proceedings online if you can?t get to the MeetUp itself).

Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn?t want the whole world to know, but a secret matter is something one doesn?t want anybody to know. Privacy is the power to selectively reveal oneself to the world. ~Cypherpunk Manifesto

GeorgieBC first explains why privacy is necessary for all of us, then Sarah Stokely expands on privacy matters and outlines the basics of using Tor as one of the tools for online privacy.

* * * * *

First posted on September 22, 2012 at GeorgieBC?s Blog. You can listen to the speech on SoundCloud

SPEECH TRANSCRIPT

Cryptoparty Melbourne

Hello?CryptoParty. My name is Georgie online, Heather Marsh to some people and other things to other people. I would like to talk to you all a bit about privacy and anonymity. We all know privacy is essential in high risk activism, but it is so much more than keeping bloggers from being killed. Privacy is for us all, it is a right we used to have and most people do not realize we have lost it, or that we ever had it.

Most people in democracies feel that freedom of the press is essential in a democracy; this is because we need information about our government in order to participate in a democracy. This freedom has been turned on its head so that people now feel they have the right to see Kate Middleton?s breasts but not foreign policy documents. It?s the other way around. Foreign policy documents are subject to censorship that is not compatible with democracy. Kate Middleton has been subjected to surveillance in violation of her right to privacy. The news obsession with celebrities and their private matters is there to distract you from the real news which they are not showing you. They tell you what US president Obama?s daughters wore to school when we really need to know if he is going to bomb Iran.

In our grandparents day they had a wonderful thing called mind your own business. They did not give their first names to people they had just met. There were layers of trust you went through to get to know someone and you owned the truth about yourself. This expectation of privacy for individuals is gone and we need to bring it back; transparency is for public organizations and actions which affect the public, not for our private lives. Perfect strangers will now demand any detail of your life and feel they have a right to it. We know the surveillance culture has won when snooping is a virtue, equated with being open, honest, and having nothing to hide while a request for privacy is met with shock and hurt and group shunning. We need to start refusing to provide personal data as much as we can, privacy is a basic right and if we do not use it we will lose it. We have lost it.

It has been proven enough times, famously by Julian Assange and Bradley Manning but in many other cases as well, that authorities do not need to see any transactions or have evidence of any criminal activity to destroy your life; it is enough that you pull attention, that they are aware of your existence. The fact that you are doing nothing wrong or illegal is no protection if you have attracted the attention of someone with power or mental instability. Governments are not the only people on the internet; if you start expressing opinions you will find far more interesting opposition as well. Anonymity, once lost, can never be regained; even if you have no intention of ever expressing a controversial opinion, privacy should become a habit, like brushing your teeth.

Besides the safety aspect, online anonymity is cherished by internet dwellers as the only means to pure thought exchange, where ideas can be judged on their own merits, unclouded by preconceived judgements based on unrelated data.

I started out as a programmer, and there was a time where even just my voice would have made anything I said instantly discredited, people only listened to opinions on programming or politics from baritones and tenors. That is still the case in some circles, there is a reason my online names are usually sexually ambiguous or male. Alan Turing, one of the fathers of computer science faced the same obstacle when it became widely known that he was homosexual; there is a very sad quote from him, ?Turing believes machines think. Turing lies with men. Therefore machines cannot think.? We have lost far too many brilliant ideas because of bigotry against the place they came from. Many women in history would never have been published if they did not publish as men; many brilliant thinkers have been attacked based on irrelevant personal data such as race, age, or opinions on unrelated topics and their ideas have been lost. Until we live in a world with no bigotry, anonymity is the only way for these voices to be heard.

In order to move to an idea driven system, away from a personality based one, we need to all stand up for privacy for us all. Crypto parties are an amazing initiative; Privacy is fun; Tor and PGP and OTR are very fun to use, and when you are comfortable with them, maybe you will also tell the next person who demands personal data from you to mind their own business which is also fun. I hope you all have a great evening!

* * * * *

First published as a slide presentation on 22nd September by @stokely: you can view the slides on GoogleDocs.

#Cryptoparty Workshop: Tor

Saturday, 22 September 2011, by @stokely

This is NOT copyright. It?s in the public domain. Use as you wish. :)

Why are we here?

  • we?re in an era of strong government action against internet users
  • 250,000 Australians under surveillance (excl ASIO)
  • there are two main areas under attack ? piracy, and free speech
  • International legal(?) action against Wikileaks, Megaupload
  • Strong Government interest in the use of online social networks by political activists (Arab Spring, Occupy)

Global problems for cyberactivists & cyberdissidents, bloggers & journalists

*Reporters without Borders- Press Freedom roundup 2008:
- ?Predatory activity is increasingly focused on the internet.?

  • 1 blogger killed
  • 59 bloggers arrested
  • 1,740 websites bocked, shut down or suspended
  • more online journalists incarcerated than other journalists for the first time
  • Internet censorship in China, Cuba, parts of the Middle East
  • western companies including Google and Yahoo selling or modifying their products and services to enable censorship regimes

LESS security, MORE surveillance

It?s never been particularly safe to communicate by email or on social networks due to insecurities in the tech, and it?s about to get worse. WHY?

  • Increased surveillance of activists. There have already been subpoenas on Australians? Twitter accounts & Twitter last week said they?d comply MORE with requests from the Australian police.
  • The US government is strengthening laws to control the internet (See the proposed SOPA/PIPA laws)
  • As signees of the Free Trade Agreement with the US, Australia is legally obliged to enforce laws like the DMCA in Australia. So their law can touch us.
  • Social networks are voluntarily censoring (Twitter announced geo-censorship of tweets yesterday).

Legal disclaimer

  • I am not a lawyer, and this workshop is not about your legal rights or responsibilities.
  • Seek legal advice. Use your common sense.
  • This workshop will give you some simple tools to stay safer
  • The key word is SAFER, not 100% safe.
  • Today we?ll show you one or two layers in the security ?onion? ? we?re not promising to protect you from the world?s best hackers or the FBI. If you are Wikileaks and people could die based on the information you?re sharing, basic security is not enough. You need to learn more about how to keep yourself, your communications and your community safe.

Part 1: Secure your email

Your email is not safe

  • Vulnerabilities are human and technical.
  • Human vulnerability: choosing easy to guess passwords, sending email to someone untrustworthy who forwards it to the authorities or a newspaper, sharing your password with someone who loses it.
  • Tech vulnerabilities: Spyware like keyloggers, your password could be cracked, your login might be insecure (http), transmission of your email over the internet might be insecure.
  • At least two ISPS will handle your email ? the sending & receiving ISP. Do you trust your ISP? (Don?t). They are subject to Australian law and are routinely asked to provide information from/about their customers.

3 steps to safer email

  • Keep your computer free of viruses/malware
  • Keep your password secure
  • Encrypt your email

Viruses/malware

  • Malware exists to steal passwords, and to get exact copies of everything you type ? it?s called keystroke logging.
  • Players of online games like World of Warcraft get targetted by keystroke loggers, who capture their game login password so they can steal their accounts. It doesn?t just happen in the movies. It happened to me.
  • Keep your software & operating system up to date, and install some anti-malware/anti-virus software ? here are some step by step tips: https://security.ngoinabox.org/en/chapter-1

Protect your password

  • Change your password. Today.
  • This should be common to anyone with an ATM card, but it?s not
  • Change it regularly, make it not personal to you (ie birthdays), mix in numbers, letters & capitalisation
  • As a memory aid, use a mnemonic like:
  • ?To be or not to be? That is the question? which becomes ?2Born2b?TitQ?
  • One password to rule them all: Password manager software like KeePass
  • http://keepass.info/
  • Uses one master password to access & manage all your passwords.

Login securely

  • You need your email to be secure at the point of login (if you?re using webmail) and when it?s travelling the internet to reach the recipient of your mail.
  • Webmail is less secure because you are trusting the content of all your emails to the company that?s sending it. (ie Google).
  • Consider switching to an email client (email software like Thunderbird or Mail for Mac instead of using a web-based email like Gmail or Yahoo)
  • Riseup is an email service run by and for activists that can be securely accessed by webmail or using an email client like Thunderbird (https://riseup.net/en)
  • Choose a webmail provider that uses https to login.

Using https for your logins

  • https uses SSL (Secure Socket Layer) to add a security layer to normal web pages (http), you?ll already use it for online banking.
  • Gmail uses https by default. To check if it?s turned on:
  • Sign in to Gmail.
  • Click the gear icon in the upper-right corner, and select Mail settings.
  • In the General tab, set ?Browser Connection? to ?Always use https?.
    If you?ve never changed the setting before, no radio buttons will be selected, even though the default is indeed ?Always use https?.
  • Click Save Changes.

Encrypt your mail

  • Unencrypted email travels as-is online, meaning anyone snooping can read it.
  • Encrypting mail means encoding it so snoopers can?t read it.
  • Later we?ll break into groups to show you how to use Tails to encrypt mail and files and use keys to ensure that the sender (you) and the receipient are who they say they are.

Activity: Secure your webmail

  • Break into groups
  • With your group leader, work out if it?s possible to turn on https for your webmail and make sure it?s turned on.
  • Change your password! Choose something more secure.

Secure your browsing

Use https everywhere that you can

  • If you use the Firefox browser, you can install the ?HTTPS Everywhere addon? so it happens all the time.
  • Download it here: https://www.eff.org/files/https-everywhere-button.png
  • There will be an HTTPS Everywhere button at the top right of your Firefox toolbar which lets you see & disable a ruleset if it?s causing problems with a site. eg if you try to get on a hotel wifi connection.
  • There is no excuse for not using HTTPS-everywhere

Set Facebook & Twitter to https

  • To make Facebook use https, go to the Account Settings menu, change the default value in the ?Account security? sub-menu to https.
  • More info here: https://www.facebook.com/blog.php?post=486790652130
  • To turn on https on Twitter, go to your account settings (https://twitter.com/settings/account) and tick the box next to ?Always use HTTPS? which is at the bottom of the page.

The Tor browser

  • Tor is an online security project.
  • Tor has been described as ?a second Internet running inside the existing Internet?. It allows people from countries with strict regimes to bypass blocking and monitoring software.
  • There?s a video of the Tor project creators talking about how governments and corporations have tried to block Tor.
  • http://www.youtube.com/watch?feature=player_embedded&v=DX46Qv_b7F4#!
  • Tor bounces your online communication around a network of relays run by volunteers, instead of going straight from your IP address to your destination. This means it prevents people who might be spying on your internet connection from learning what sites you visit or learning your physical location and it lets you access blocked sites.

How Tor Works

A diagram showing an encrypted communication between 2 computers.  There is a grid of other computers in the picture, but no connections between them right now.

Step 1: Alice?s Tor client obtains a list of Tor nodes from a directory server

Alice and Dave's computers are shown on the left, then a grid of computers, then Jane and Bob's computers are shown on the right. A path of connections is shown from Alice's computer through the grid of Tor serving computers to reach Bob's computer as the destination.

Step 2: Alice?s Tor client picks a random path to the destination server. All the intermediate links are encrypted (green) only the final link to the destination is unencrypted (red).

The Tor browser

  • You can install & use Tor software, or use the Tor browser to make your web browsing (more) secure.
  • BE AWARE of Tor?s limits. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don?t want the sites you visit to see your identifying information. For example, you can use Torbutton while browsing the web to withhold some information about your computer?s configuration.
  • What does this mean? External applications are not Tor-safe by default, and can unmask you.
  • Tor is TCP only, and then apps can send your IP address, so it?s good to use vetted apps.
  • One way around this is to use a transparent Tor proxy like Tails (https://tails.boum.org/)

The Tor browser bundle

  • An easy way to use the Tor software is to download and use the Tor browser bundle.
  • This means just by using the Tor browser, you?re protected by Tor software.
  • It?s available for Windows, Mac or Linux.
  • It can also run off a USB flash drive (AKA USB key). This means you can safely browse from any computer, by using your USB key.
  • Download the Tor browser bundle here:
  • https://www.torproject.org/projects/torbrowser.html.en

Tor check

  • Make sure you?ve actually got it working right.
  • Once you?ve got the Tor browser installed, visit the Tor Check page: https://check.torproject.org/
  • It will detect whether you?re using Tor or not, and tell you.

Need help?

  • On IRC: #tor
  • Or: http://irc.oftc.net/

Suggested Activity: Set up a secure browser

  • Install Firefox & HPPTS Everywhere and/or the Tor Browser
  • Make sure you use the Tor Check tool as well!

Tools for Activists & Bloggers

Highly recommended:

  • Security in a box: https://security.ngoinabox.org
  • Riseup email for activists: https://riseup.net/en

Resources for safe publishing online

Highly recommended:

Tails ? the amnesiac incognito live system

Suggested Activity

  • Set up a USB key with Tails for secure computing
  • Use Tails to encrypt files, email, and instant messaging

Thanks!

  • Thank you for coming to #Cryptopart to learn and share what you know
  • Remember ?each one teach one? ? please find someone who needs to learn this stuff, and teach them!

I can email out this presentation with handy links to information and downloads, if you email me (sarah.stokely@gmail.com) or tweet me (@stokely).

Cheers!

Source: http://finallyfeminism101.wordpress.com/2012/09/28/guest-post-privacy-101-privacy-anonymity-and-you/

heather locklear mlk memorial mlk memorial heather locklear hospitalized joplin tornado extreme makeover home edition constitution day

MonitorDaily - News ? Blue Bridge Hires New Managers, Opens ...

Blue Bridge Financial said it hired Nate Pfeifer as regional sales manager and Elaina Armlovich as business development manager. Additionally, the company announced the opening of offices in San Francisco, CA and Grand Island, NE.

Brian Gallo, president, commented: ?We continue to see strong demand for our financial services products with small business borrowers and financial institution purchasers. In order to fulfill this demand, we are excited to welcome Nate and Elaina to our management team and welcome their direction. Further, we are very excited to increase our physical office presence to California and Nebraska, providing our customers with seamless support on a nationwide basis.?

Nate Pfeifer will lead the origination services activities of the Company and will be based in Grand Island, Nebraska. Mr. Pfeifer brings over 20 years? experience in the equipment finance and leasing industry in a wide range of management capacities.

Armlovich will lead new national business development activities and brings significant experience in bank credit and business management disciplines. Armlovich is based out of the company?s Buffalo, New York headquarters.

DeBacker, CEO added, ?The addition of Nate and Elaina to our already seasoned team, positions Blue Bridge Financial as a leader in the small ticket equipment industry. Our infrastructure, people and competitive equipment loan programs differentiate us as one of the fastest growing companies within the industry. Business activity thus far in 2012 has doubled from 2011 and we see positive trends toward similar growth into the foreseeable future.?

Coincident to the hiring of these management positions, Blue Bridge announced the opening of new offices in Grand Island, Nebraska and San Francisco, California. The Nebraska office will be run by Pfeifer and house the company?s sales activities. The San Francisco office will be led by company CEO, DeBacker as its west coast operations center. Located in downtown San Francisco, the west coast location will serve the company?s significant financial institution and customer base in California and the western United States.

Other Recent Headlines...

Source: http://www.monitordaily.com/blue-bridge-hires-new-managers-opens-offices-ca-ne/

matt barkley melanie amaro x factor boise state jordans prometheus movie posterior adam lambert arrested

Friday, September 28, 2012

Obama Administration Promises to Ignore SSN Fraud, Protect Law ...

U.S. Citizenship and Immigration Services (USCIS), the agency tasked with overseeing President Obama's controversial Deferred Action for Childhood Arrivals (DACA) program recently updated its "Frequently Asked Questions" webpage to assure applicants that the White House is not concerned with Social Security fraud or illegal hiring practices. Or, as the administration told the New York Times, the White House is "not interested in using this as a way to identify one-off cases where some individual may have violated some federal law in an employment relationship."

The amnesty-advocating National Immigration Law Center (NILC) gleefully sent out the following notice:

Are you (or your clients) waiting to apply for DACA because you've used a Social Security Number (SSN) that was not yours? Or is your employer afraid to provide you with employment records out of fear of immigration enforcement? ? Helpful new guidance from U.S. Citizenship and Immigration Services (USCIS) may answer your questions!

The application form for an Employment Authorization Document, which comes as part of the DACA amnesty, asks illegal aliens to list any Social Security numbers they have used and to "include all numbers [they] have ever used". Many of the applicants (and the lawyers representing them) logically assumed that this required the illegal alien to list any SSNs they had previously used in acquiring a job or government benefit, numbers that may belong to legal residents. In other words, the application seems to require applicants to admit to ID fraud, ID theft, and potentially other crimes depending on how the SSN was used.

But the immigration lobby is powerful ? particularly within the Obama White House ? and USCIS has announced that only those SSNs officially issued by the Social Security Administration need to be listed:

Q9. How should I fill out question nine (9) on the Form I-765, Application for Employment Authorization?

A9. When you are filing a Form I-765 as part of a Deferred Action for Childhood Arrivals request, question nine (9) is asking you to list those Social Security numbers that were officially issued to you by the Social Security Administration.

The number of illegal alien applicants with a validly issued SSN is likely to be very small, so it remains unclear why the application form would have originally requested "all" SSNs used by applicants if the goal was not to uncover instances of fraud. For the record, some legal, temporary immigrants can get validly issued SSNs; if they overstay their visas they become illegal aliens with validly issued numbers. See the Social Security Administration's webpage "Social Security Numbers for Noncitizens".

Until this latest update, the SSN information collected on the applications would have allowed DHS to investigate the Social Security numbers and names used by the applicants and then contact any legal residents associated with the information. Americans struggling to resolve their identity and credit would benefit greatly. But the Obama administration has decided that the interests of legal residents must take a back seat to the interests of criminal illegal aliens.

The other update to the "Frequently Asked Questions" section of the deferred action webpage is more of a benefit to law-breaking businesses than illegal alien applicants. To prove that the alien has lived in the United States as a quasi-continuous resident, applicants can submit proof of employment. Apparently unscrupulous businesses have become concerned that evidence of their illegal hiring practices is being submitted to the federal government, resulting in the Obama administration promising not to use the evidence in an enforcement action in most instances:

Q4. If I provide my employee with information regarding his or her employment to support a request for consideration of deferred action for childhood arrivals, will that information be used for immigration enforcement purposes against me and/or my company?

A4. You may, as you determine appropriate, provide individuals requesting deferred action for childhood arrivals with documentation which verifies their employment. This information will not be shared with ICE for civil immigration enforcement purposes pursuant to INA section 274A unless there is evidence of egregious violations of criminal statutes or widespread abuses.

There is a secondary reason that law-breaking employers likely have little to worry about. Instead of submitting evidence of employment, applicants can prove they lived in the United States by submitting items like utility bills, rent receipts, copies of money order receipts, dated bank transactions, and birth certificates of babies born to them while in the United States, just to name a few examples. Not only this, USCIS has announced that the "continuous residence since June 15, 2007" requirement does not require applicants to prove they were in the United States on every day, nor even every week or every month of the time period. USCIS explains that "there is no requirement that every day or month of that period be specifically accounted for through direct evidence." As the lawyers at the NILC explain, "USCIS has clarified that only one document per year is required." Illegal aliens simply have to have made one bank transaction a year, and the Obama administration is satisfied. And if the alien cannot even meet this standard, USCIS allows the alien to submit affidavits from friends and family who are willing to claim that the applicant was in the United States during the time period. On top of all this, under existing U.S. immigration law "continuous residence" does not actually require continuous residence. As I've explained in a recent op-ed, aliens can generally leave the country for months at a time with the absences not considered a break in residency.

Nevertheless, in their notice the National Immigration Law Center is instructing illegal alien applicants to not submit any employment records that indicate the alien has engaged in ID fraud: "NILC continues to recommend that DACA applicants avoid submitting employment records that reflect an SSN that does not belong to the applicant, unless the applicant has no other evidence to support DACA eligibility." In other words, the Obama administration and illegal alien advocates are working in concert to keep American victims of ID theft in the dark while shielding unscrupulous businesses from enforcement.

These updates to the deferred action plan should not come as a surprise. The Migration Policy Institute, an amnesty-advocating think tank, recently demanded that the Obama administration add a guarantee that law-breaking businesses listed in DACA applications be shielded from enforcement. Now they have their wish.

If a future president decides to extend this two-year amnesty, it would be helpful to Americans struggling with ID theft if the president were to amend the application language and require applicants to fess up to their ID theft and list all numbers they have ever used. Furthermore, evidence of any employment should be required so that ICE can investigate and penalize employers engaged in illegal businesses practices. Since this amnesty is completely administrative in nature, the application and renewal process can be changed at will. Hopefully future administrations will put the interests of legal residents before the interests of law-breakers.

Bookmark/Search this post with

Source: http://cis.org/feere/obama-administration-promises-ignore-ssn-fraud-protect-law-breaking-businesses

deadmau5 phoebe snow jennifer hudson tribute to whitney houston nicki minaj grammy jason whitlock beach boys tony bennett

Thursday, September 27, 2012

Vipre Internet Security 2013 - CNET Download.com

CNET TechTracker will now automatically install software without requiring further action by you. (Note: This feature automatically accepts associated EULAs and third party applications on your behalf.)

You have selected the following software to Smart Install:

CNET TechTracker will attempt to install this software without interrupting you again. If an application requires manual installation, CNET TechTracker will download the installer and prompt you to take further action.

Proceed with Smart Install?

Confirm Standard Install Cancel

Source: http://download.cnet.com/Vipre-Internet-Security-2013/3000-2239_4-75156564.html

watergate mlb pregnant man outside lands 2012 lineup beloved ufc results water for elephants

Flea-Market Renoir Painting Was Stolen From Baltimore Museum ...

The valuable Renoir painting found at a West Virginia flea market two years ago was apparently stolen from the Baltimore Museum of Art in 1951.?Museum director?Doreen Bolger tells the?Washington Post that an FBI investigation is underway.

The painting, discovered by an unnamed Virginia woman who purchased it for $7, was due to be auctioned off at the Potomack Co. auction house in Alexandria this weekend.

After news broke about the painting's discovery, the Washington Post poked around the Baltimore Museum of Art's library and found that the museum had been in possession of the work, called "Paysage Bords de Seine,"?from 1937 till at least 1949. On loan from a Baltimore native, the piece was stolen in November 1951, but the museum's current staff didn't realize that until this week, reports the Post:

Once the Post showed the museum documents confirming that the painting was part of the [Saidie A.]?May collection, the museum used the painting?s loan registration number to look in its collection and loan records for more clues about the Renoir?s whereabouts.?What the museum found astonished its staff: documents showing that the museum had noted the painting?s theft, and that the BMA had been paid $2,500 by its insurance company for the stolen artwork.

The auction was supposed to take place this Saturday. It has been canceled.

Blog Widget by LinkWithin

Source: http://www.washingtoncitypaper.com/blogs/artsdesk/visual-arts/2012/09/27/renoir-painting-found-at-flea-market-was-stolen-from-baltimore-museum/

the bourne legacy roland martin suspended lake vostok montgomery county public schools the river dr dog ke$ha

Breast Cancer Awareness Month - Eagle Hardware Farm & Ranch

Pretty in Pink Country Pets Contest

cropped pink ribbon Pretty in Pink Country Pets ContestThe month of October is Breast Cancer Awareness Month.? Help Eagle Hardware raise awareness and you could win FREE product for your pet!? Dress your pet up in pink during October, take a picture of your pet, and send it to us using the contact form below.? This will enter you to win a FREE bag of pet food, your choice!? Winner will be notified in early November via email.

We also would like to share with you a list of local resources where you can get a mammogram done for free or at a low cost.? The doctor?s visit alone is stressful enough, so let?s eliminate some of the research stress.?Make October the time to be more aware of Breast Cancer and get yourself and? your loved ones examined.

Please visit Susan G. Komen North Texas or Susan G. Komen Dallas for local Breast Cancer resources, donation opportunities, events and more.

Source: http://www.eaglehardwarefarmandranch.com/news-updates/october-is-breast-cancer-awareness-month-2012-09-2587

cliff harris josh turner barnaby barnaby the cabin in the woods the cabin in the woods trace adkins

Wednesday, September 26, 2012

How to Find the Best Retirement living Home | Studio 39

Sorry, Readability was unable to parse this page for content.

Source: http://www.studio39nyc.com/how-to-find-the-best-retirement-living-home/

MC Chris Colorado shooting suspect accuweather Finding Nemo 2 Provigil abc news denver post

'Blind sheik' will stay in US prison, White House says

By Jonathan DienstNBCNewYork.com

Hai Do / AFP - Getty Images file

Sheik Omar Abdel Rahman, the blind spiritual leader of Egypt's largest Islamic extremist fundamentalist group, Jamaa Islamiyya, in an April 6, 1993, file photo. Abdul Rahman was convicted of conspiracy and sentenced to life in prison for helping to plan the 1993 World Trade Center bombing.

The blind sheik who supported the 1993 World Trade Center bombing and other terror plots that targeted New York landmarks will stay in a U.S. prison, Obama administration officials said Tuesday.??

"There is absolutely no plan to release or transfer the blind ?sheik,? said National Security Staff spokeswoman Bernadette Meehan. "Reports saying otherwise are completely and unequivocally false."

The strong denial came after some Republicans raised concerns that Egyptian leaders may be pressing the Obama administration to free Sheik Omar Abdel Rahman.??


More stories from NBCNewYork.com

Former U.S. Attorney General Michael Mukasey raised concerns in an op-ed in the Wall Street Journal on Tuesday. Mukasey claimed there is circumstantial evidence a secret deal is under way as a goodwill gesture to the new Egyptian government.?

Mukasey added it may be time for Congress to make clear that any such release would be a "gross betrayal of public trust that would justify removal from high office."

Abdul Rahman is currently serving a life sentence in a federal prison hospital in North Carolina. He was convicted in 1995 for his role in supporting a plot to bomb the United Nations, the Holland and Lincoln tunnels and assassinate then-Sen. Alfonse D?Amato, R-N.Y., and current Assemblyman Dov Hikind, D-N.Y.?

A Justice Department spokesman said Tuesday, "The blind sheik will serve the rest of his life in a federal prison serving time for terrorism ? and those who suggest otherwise are badly misinformed."

Rep. Peter King, R-N.Y., sent a letter earlier this month to the State and Justice departments saying such a release would be "a sign of weakness and a lack of resolve by the United States and its president."
??
On the day he was set to take office in June, Egyptian President Mohammed Morsi told a cheering crowd in Cairo that he would press the Obama administration to free the blind sheik.
??
"?I see signs for Omar Abdel Rahman and detainees pictures," Morsi said. "It is my duty and I will make all efforts to have them free, including Omar Abdel Rahman."?
?
New York Sens. Charles Schumer and Kirsten Gillibrand, both Democrats, condemned Morsi comments at the time.?

"Sheik Rahman is a terrorist who planned to kill innocent Americans. Rest assured he will stay right where he belongs -- in jail for the rest of his life," Schumer said in June.

Gillibrand reiterated on Tuesday that any move to release the sheik would trigger a firestorm of opposition.

?If there is any attempt in the future to free this convicted terrorist it will be met with swift condemnation and action to stop it,? she said.

Reports of Egyptian calls to free Sheik Rahman come three years after Scottish authorities set free a Libyan terrorist convicted for killing 270 people in the 1988 bombing of Pan Am Flight 103. The release of Abdel Basset al-Megrahi, who died in May, sparked outrage among the victims? families. ?

More from Open Channel:

Source: http://openchannel.nbcnews.com/_news/2012/09/25/14098101-blind-sheik-terrorist-will-stay-in-us-prison-white-house-says?lite

60 minutes go daddy tim tebow Tom Kenny Long Island Medium Alfonso Ribeiro morgan freeman

Netflix iOS and Android apps have a remote control easter egg for PS3 owners

Netflix iOS and Android apps have a remote control easter egg for PS3 owners

Now that the revamped Netflix interface has hit phones and tablets for both Apple and Android powered hardware, the service has quietly enabled something else: second screen remote control. Currently the feature is only known to work on the PlayStation 3 with a mobile device on the same local network, once the two apps are running you can browse as normal on your phone or tablet and when you go to play a movie or TV show it asks you to choose where it will play. While the video is playing you can stop, pause or seek through it to a certain point, change the audio or subtitles, choose a different episode or even browse for something entirely different without stopping the action. The YouTube app on PS3 works in a similar fashion after its most recent update. We've got a few screens of the mobile apps at work in the gallery, check after the break for a quick video of it working.

Continue reading Netflix iOS and Android apps have a remote control easter egg for PS3 owners

Filed under: , , , ,

Netflix iOS and Android apps have a remote control easter egg for PS3 owners originally appeared on Engadget on Tue, 25 Sep 2012 19:23:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments

Source: http://www.engadget.com/2012/09/25/netflix-ios-android-ps3-second-screen-remote-control/

playoff schedule charles addams pinewood derby cars republican debate tonight tinker tailor soldier spy rich forever rick ross project runway all stars

Old-school Nintendo Zapper light gun transformed into a real laser pistol

DUBAI (Reuters) - A senior Iranian lawmaker accused the head of the United Nations' nuclear watchdog on Sunday of passing confidential information about Iran's nuclear activities to Israel. In the latest sign of strained relations with the International Atomic Energy Agency, Javad Jahangirzadeh, a member of parliament's presiding board, said IAEA chief Yukiya Amano would be to blame if Iran reduced its ties with the body. ...

Source: http://news.yahoo.com/blogs/technology-blog/old-school-nintendo-zapper-light-gun-transformed-real-205240882.html

emily maynard kola boof burmese python national signing day ferris bueller god bless america earned income credit

Guild Wars 2, and the Player Dynamic of Online Gaming | Double Crit

So, lately I?ve been playing?Guild Wars 2?(It?s awesome and you should try it out if you haven?t already, by the way). A funny thing happened to me the other day. I can?t recall exactly what I was up against, ?but after a certain point in my early wanderings, my luck ran out ? I couldn?t take them all on, and my last stand was?less than glorious. I was dead.

A random player happened upon the area: I?d never seen him before, and we?d never had any prior affiliation. He proceeded to slaughter the foes which ended my life. Just as I was about to return to a waypoint, he paused, turned, and revived me, then continued on his merry way without so much as a word.

This sort of thing, I?ve come to learn, is normal in the game world- even if it?s ?tacitly unusual in pretty much every other MMO on the face of the planet. Curious, isn?t it?

My first experience with an MMO, like many, was with?World of Warcraft. The players there were a mixed bag. On the one hand, it was possible to occasionally come across a Good Samaritan ? the horde player who helped you out with a quest, the high-level alliance player who let you go on your merry way instead of ganking you. On the other hand?those people were increasingly rare as you moved up the ranks. It was more frequent on a PVP server to find yourself at the mercy of some angry manchild than it was to have someone actually help you on your way, and I actually found myself being cussed out once because someone found out I played both factions.

Even players within the same faction seemed to often prefer to do things on their own, isolated within their little cliques. True, there was a real sense of community within guilds, but at the same time, it was a very individualistic setting, which very much gave the vibe of ?every player for themselves. You?re on your own unless you can find someone to attach yourself to.

He seems rather cross.

It?s even worse in purely competitive games- but we?ve beaten that horse almost to death here, so I?m going to leave that statement standing.

Guild Wars 2?is?different. A reviewer on Forbes?mused that it honestly played like the developers took a list of everything people disliked about MMOs, then made a conscious effort to get rid of the elements on that list. Arenanet has consciously shunted almost every long-standing tradition in MMO history, and the game?s all the better for it.

Players are actually rewarded for helping one another out, and I?m not talking organized, well-oiled guild raids here (another staple of the genre).?The traditional quest system (which lent itself very well to a ?me first? mentality, along with spawn camping), has been thrown violently out the window. Everybody gets credit for every quest, so long as they participate in its completion. As a result, the mentality has completely shifted from competition to participation. Well, except in the PVP arenas?but that?s another story.

What does this mean? What, if anything, does it say about us as gamers? Is it just a case of similar people gravitating towards similar environments, or is there something more going on beneath the surface? Could it be that the developer of a game subtly influences the attitudes and actions of the players with every design choice they make? That perhaps?the League of Legends?community is so hateful due in part to a conscious (or unconscious) decision on Riot?s part?

Could it be that human beings are, in truth, actually hard-wired to cooperate, and it?s only when placed into an environment that awards competition that they begin to squabble?

Maybe it?s just that?Guild Wars 2?s?environment doesn?t lend itself very well to player cruelty, and as a result, toxic players have far greater difficulty spreading their poison to others. ?You know how it goes ? all it takes is one bad apple, and pretty soon you?ve a whole rotten, worm-ridden barrel of filth. Perhaps it?s a combination of the sorts of people the play environment appeals to as well as active prevention on the part of Arenanet itself.

It?s hard to say -?there?s no straight, simple answer to this quandary, and I?ve neither the resources nor the time to execute a scientific study into the matter.?Ultimately, this post is just a bit of food for thought. Next time you?re online, pay attention to how you act ? and how others behave around you. Your attitudes might be influenced in more ways than you know.

Image Credits:?[Guild Wars 2 Guide] [Armed Gamer] [Gamer Zines]

Like this:

Be the first to like this.

Source: http://doublecrit.wordpress.com/2012/09/25/guild-wars-2-and-the-player-dynamic-of-online-gaming/

oakland pinnacle airlines kansas vs kentucky joe posnanski michael kidd gilchrist national championship calipari

Fact Checkers Unite to Predict Debate Deceptions

President Obama and Mitt Romney are still hundreds of miles from the debate stage, but fact checkers are already poised and ready to dissect the half-truths that, if the past 15 months of campaigning are any indication, the presidential candidates are likely to fling at each other during the first presidential debate Oct. 3.

The top fact checkers from Politifact, FactCheck.org, The Washington Post's Fact Checker blog and The Associated Press are putting their heads together this week to root out the less-than-factual lines President Obama and Mitt Romney are likely to spin. The four groups will forecast these debate deceptions during a panel at the Press Club in Washington, D.C., Wednesday.

"In an age where the typical citizen is subjected to an avalanche of the kind of pure baloney that journalists used to keep out of the public discourse ? they are looking for journalists to be kind of adjudicators or referees," said FactCheck.org Director Brooks Jackson. "That's what we try to do."

While FactCheck.org, a subsidiary of the University of Pennsylvania's Annenberg Public Policy, does not issue true or false ratings, Obama has already tallied six "pants on fire" rulings from Politifact and Romney has chalked up ten "4 Pinocchio's" ratings from the Washington Post' Fact Checker.

Glen Kessler, who writes the Post's Fact Checker blog, said one of the biggest falsehoods that Romney continues to reiterate is that Obama has "apologized for America." Kessler gave that statement 4 Pinocchios, the least-factual rating, noting that the president never used "a word at all similar to 'apologize.'"

Kessler said one of Obama's favorite half-truths is saying that vice presidential candidate Paul Ryan's Medicare plan will make seniors "pay nearly $6,400 more for Medicare than they do today." That statement got 2 Pinnochios, because it relies on a previous version of Ryan's budget plan.

But while fact checks like these have become more common this election cycle - Kessler has put out 138 so far on Obama and Romney alone - that increase may have do more to with the public's "hunger" for truth than an uptick in the number of campaign lies, Kessler said.

"I've been covering politics for a long time, and I always maintain that politicians will always stretch the truth if they think it's in their political interest," he said. "But I do think there is a hunger out there from readers and viewers. There's a lot more skepticism out there."

And with the deluge of news from cable TV, blogs and tweets, Jackson from FactCheck.org said fact checkers are needed more than ever before to "marshal the evidence."

"The public's problem is not that they are not getting enough information, it's they are getting too much of it," Jackson said. "They need help sorting through all this stuff."

As Romney and Obama take the debate stage next Wednesday, ABC News will join the fact-checking fray to decipher the true statements from the deceptive lines. You can find those fact checks HERE.

Also Read

Source: http://news.yahoo.com/fact-checkers-unite-predict-debate-deceptions-100125478--abc-news-politics.html

lyrid meteor shower hippocrates andrew breitbart red wings willie nelson penguins the band

Saturday, September 22, 2012

Top 10 Secret Features of iOS 6 [Lifehacker Top 10]

Top 10 Secret Features of iOS 6Apple released iOS 6 this week, bringing a handful of new features to iPhones, iPads, and iPod touches. While they defined many of the flagship features, several were left unsaid. These are our 10 favorite secret features in iOS 6.

10. Pull to Refresh

Top 10 Secret Features of iOS 6Pull to refresh is one of the greatest gestures that Apple took next to forever to adopt. iOS 6 finally allows you to pull down to refresh your mail accounts and various other data sources. Ignore the reload button and start swiping down.

9. Tons of New Emoji

Top 10 Secret Features of iOS 6Some people love their emoji?the cute icons you can add to messages, emails, or really anywhere that accepts text in iOS. Apple just added a ton of new options. If you have your emoji keyboard enabled already, you don't have to do anything. If not, you can enable it in the Settings app by going to General -> Keyboard -> Keyboards -> Add New Keyboard. That will bring up a list. Choose Emoji and you're all set.

8. Limit Ad Tracking

Top 10 Secret Features of iOS 6Everyone's trying to track you on the web, and your phone is no different. If you'd rather advertisers not track your activity and serve up targeted ads, iOS 6 lets you turn off tracking with a simple switch. Just head to Settings > General > About > Advertising and flip the switch to On. It may take a little while for you to stop seeing targeted ads, but soon enough your activity should be much more private.

7. Wake Up to a Song

Top 10 Secret Features of iOS 6Apple update the Clock app?which I still hold to be my favorite native app?to give the alarm functionality a boost. No longer do you have to wake up to one of your ringtones. Instead, you can pick any song in your library. You could even make a recording of yourself telling you to wake the hell up, sync it to your iDevice, and open your eyes to a sunny day and your own, obnoxious voice. Or you could just pick a song that you like. Regardless, you now have a choice. That's very much appreciated.

6. Late Night Listening

Top 10 Secret Features of iOS 6Although not available on all devices, newer iPhones and iPads have a new EQ setting: Late Night. This option lowers bass levels and attempts to make your music less-intrusive in the evening so you can listen and fall asleep easily without being distracted by anything too jarring. Why Apple didn't include this option on earlier devices is beyond us, but iOS 6 has shown how much they like to unnecessarily limit their software to keep you from getting off the upgrade treadmill.

5. Only Receive Message Alerts from Your Contacts

Top 10 Secret Features of iOS 6Don't care if you get an iMessage from an unknown source? You don't have to. If you head into the Settings app, then Notifications, then Messages, you can set your alerts to only show up for your contacts. If you don't want to be bothered by people who aren't worth sticking in your contacts?like spam message bots, for example?iOS 6 lets you ignore them.

4. Sync Your Text Expansion Shortcuts Across Devices

Top 10 Secret Features of iOS 6Apple added text expansion to iOS 5, and it was awesome, letting you type in long usernames, addresses, and other text with just a few strokes on your keyboard. We showed you some essential shortcuts to set up, and now iOS 6 has made the feature even better, letting you sync it between your other iOS devices (like an iPod touch and an iPad)?along with your custom keyboard dictionary. To do so, you'll need an iCloud account. Then, just head to Settings > iCloud, and scroll down to Documents & Data. Tap it, flip the switch to On, and do the same on your other iOS 6 devices. Your custom dictionary and shortcuts should stay in sync between all your devices.

3. Launch Apps with Siri

Top 10 Secret Features of iOS 6Apple told us Siri got smarter in iOS 6, but they neglected to mention that she'd launch apps for you. All you have to do is activate Siri and then say the word "launch" plus the name of the app you want to open. While this may seem a little lazy, it's really useful if you have a bunch of apps and don't necessarily remember where they all are. You no longer need to search?Siri can do the work for you.

2. Archive or Delete Messages in Mail

Top 10 Secret Features of iOS 6A common Mail complaint among Gmail users has long been the need to choose between archiving and deleting a message. iOS just never provided a way to choose on the fly. Now you can. To do this, open a message, tap and hold the Archive button, and make your choice. The unfortunate reality is that you have to actually open the message to do this. You can't tap and hold the Archive button in list view to get these options. That said, it's a welcome improvement. We still prefer Sparrow, though.

1. Walking Directions in Maps

Top 10 Secret Features of iOS 6People are not happy with the new Maps app in iOS 6. It's full of problems. One of the major complaints is that it only provides driving directions, leaving walkers, bikers, and public transit users behind. The good news is that Apple didn't leave out these features entirely. In fact, walking directions are still available. To find them, just tap the bent arrow "directions" button in Maps and you'll see your recent destinations. From there, you can toggle between driving, walking, and public transit. Walking directions will work without issue. Public transit, on the other hand, will try to route you to another app (and fail, for now). Hopefully we'll see Apple improve Maps quickly and bring back these important, lost features. In the meantime, if this secret feature isn't enough to satisfy you then check out Lumatic. It might do the trick.

Source: http://feeds.gawker.com/~r/lifehacker/full/~3/KJ4jODXkAIE/top-10-secret-features-of-ios-6

gli joseph gordon levitt katy perry russell brand mark hurd new ipad 3 jodie fisher zooey deschanel

NCAA study: Football concussions rate stabilizes

The NCAA reported 2.5 concussions for every 1,000 game-related exposures in 2011.

Kevin Jairaj/US PRESSWIRE

INDIANAPOLIS (AP) -- The NCAA reports that the rate of football-related concussions has remained steady over the past eight years.

According to the NCAA's Injury Surveillance Program, there were 2.5 concussions reported for every 1,000 game-related exposures during the 2011 football season. Exposures are the periods of athletic-related activity when injuries can occur.

Football concussion rates increased over a two-decade period beginning in the early 1980s. The NCAA says the trend stabilized and became relatively flat from 2004-12.

NCAA director of health and safety David Klossner said improvements in the detection and clinical management of concussions could be among the factors that led to the increase up until 2004. The rate stabilized as NCAA legislation, education and playing rules have been put in place to help athletic programs better recognize and treat concussions.

Copyright 2012 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

Source: http://sportsillustrated.cnn.com/2012/football/ncaa/09/22/ncaa-concussion-rates-stabilize.ap/index.html?xid=si_ncaaf

weather nyc open marriage department of justice doj dept of justice weather chicago swizz beatz

Apple still draws crowds in Asia with new iPhone 5

SYDNEY/TOKYO (Reuters) - Apple Inc's iPhone 5 hit stores around the globe on Friday, giving the consumer giant a boost ahead of the crucial end-of-year holiday season as rival Samsung Electronics Co stepped up its legal challenge over key technologies.

The new phone - which was unveiled last week - went on sale across Asia with mobile carriers reporting record demand, leading at least one to question Apple's supply capacity.

"It's thin and light. I've used Samsung before, but the operation, the feeling, of the iPhone is better," said Wataru Saito, a semiconductor engineer who had been queuing in Tokyo since mid-afternoon on Thursday with his suitcase, as he had a flight to catch on Friday.

Apple has booked more than 2 million pre-orders for the device in the first 24 hours, double the first-day sales of the previous iPhone 4S.

Masayoshi Son, president of Softbank Corp, one of the two Japanese carriers selling the phone, said he was concerned that Apple does not have enough production capacity to meet demand.

Softbank and Singtel, Singapore's biggest mobile phone operator, said demand for the iPhone 5 had exceeded previous offerings from Apple, partly because the new phones could work on 4G networks that offered much faster data speeds.

KDDI Corp, the other Japanese carrier offering the iPhone, said that it had already run out of the new phone. Australia's Telstra Corp Ltd reported online pre-orders sold out in a record 18 hours and said it was discussing bi-weekly restocking with Apple.

Apple's rival and component supplier, Samsung, moved to crash the party on the eve of the phone's debut, saying it planned to add the new device to existing patent lawsuits against its U.S. rival.

South Korea's Samsung and Apple are locked in a patent battle in 10 countries and the stakes are high as the two vie for top spot in the booming smartphone market.

Both companies are also raising marketing spending to promote their latest products ahead of the holiday sales quarter.

LONG QUEUES

An estimated 600 people queued around the block from the Apple store in central Sydney, the first in the world to hand over an iPhone 5 to buyer at 8 a.m. local time (2200 GMT, Thursday). Customers were limited to buying a maximum of two phones.

In Singapore, SingTel had booths open selling accessories and staff on hand to help buyers transfer data from their old phones, while n a rainy Tokyo, the lines stretched back several blocks.

In Hong Kong, whose proximity to China supports a thriving grey market, small groups of people carrying rucksacks filled with cash waited outside the city's flagship store hoping to snap up phones for resale.

The launches were more tightly controlled by Apple than the release of the iPhone 4S in 2010, resulting in a more subdued atmosphere - most of the noise in Hong Kong came from staff who outnumbered customers and chanted "iPhone 5, iPhone 5".

Guerrilla marketers grabbed the first dozen or so spots in the queue in Sydney, with companies paying staff members to line up for several days in the hope of being photographed and interviewed for being among the first in the world to get their hands on the new devices.

But most of those waiting were aficionados already hooked on Apple's earlier iPhones and best-selling iPad tablet computers.

"I feel like if I leave it at home, I go a bit crazy," James Vohradsky, a 20-year-old student said of his current iPhone. "I have to drive back and get it. I can't do my normal day without it," said Vohradsky, who had queued for 17 hours with his younger sister.

Some people turned up simply for the party atmosphere.

"I'm not worried about getting my hands on a phone, I queued up to make new friends, it's a festival," said Nobuhiko Hirota outside the Tokyo store, holding a Blackberry mobile phone he says recently bought to collect because he says he expects carriers to soon stop selling them.

Some analysts expect Apple to sell up to 10 million iPhone 5 models in the remaining days of September and JP Morgan estimates the phone release could provide a $3.2 billion boost to the U.S. economy in the fourth quarter.

The new phone has a larger, 4-inch screen and is slimmer and far lighter than the previous model. The iPhone 5 supports faster 4G mobile networks and also comes with a number of software updates, including Apple's new in-house maps feature.

Repair firm iFixit pried one open in Melbourne to reveal the phone uses chips from Qualcomm, Avago and Skyworks Solutions.

Apple doesn't disclose which companies make the components that go into its smartphones and teardowns of the latest product give investors a vital glimpse of who has been chosen - or rejected - a development that can sometimes cause drastic swings in stock prices.

Earlier this month, shares of Audience Inc, a small speciality chip maker, plummeted 63 percent after the company said Apple would no longer use its noise filtering technology in the iPhone 5.

MAPS MISS MARK

But not everyone is impressed with the standard of the new technology. The new maps feature has been criticized by some users for a number of geographical errors, missing information and a lack of features.

Kim Tudo, a student at the University of New South Wales who queued overnight, said he was disappointed the turn-by-turn navigation feature under the iOS 6 mobile operating system behind the new phone was not immediately available in Australia.

Vohradsky said the lack of mobile payment chip was also "a bit of a letdown". Apple did not embed Near Field Communication (NFC) technology used to turn cellphones into mobile wallets into the iPhone 5.

Tudo and Vohradsky were less bothered by Apple's decision to drop the wide dock connector used in the company's gadgets for the best part of a decade in favour of a smaller one, a move that some critics have noted adds to costs for users who will now have to buy an adaptor for speakers or other accessories.

The iPhone is Apple's highest-margin product and accounts for half of its annual revenue. Apple has said it will make initial deliveries of the iPhone 5 on Friday in the United States and most of the major European markets, such as France, Germany and Britain. The phone then goes on sale on September 28 in 22 other countries.

Apple plans to sell the new phone in 100 countries by the end of the year, ramping up competition in a smartphone market that has already reached a fever pitch. Apple is up against phones that run on Google Inc's Android software, which has become the most-used mobile operating system in the world, while Samsung has taken the lead in smartphone sales.

Samsung released new ads mocking Apple fans queuing for the new iPhone, showing users favorably comparing the features of Samsung's top-selling Galaxy S3 smartphone.

Apple co-founder Steve Wozniak, in town for a business forum, was among a crowd of several hundred lining up for an iPhone 5 in sub-tropical Brisbane.

"I just feel this impulse, like I want to be part of this big adventure, this big revolution and this advance in technology," Wozniak, who stopped working for Apple in the late 1980s, told local television.

(Additional reporting by Thuy Ong in Sydney, Venus Wu and Stefanie McIntyre in Hong Kong, Kevin Lim in Singapore and Poornima Gupta in San Francisco; Editing by John Mair and Alex Richardson)

Source: http://news.yahoo.com/long-queues-greet-apples-iphone-5-sydney-tokyo-014520076--sector.html

mega upload santorum wins iowa archer ibooks 2 ifl indoor football league newt gingrich wife