Thursday, April 12, 2012

Never Drop Your Cell Phone Again with Feinger

The Feinger system consists of an mount attachment for the back of your phone and a finger sleeve to attach the phone to your hand.? The neoprene finger sleeve is available in sizes to fit fingers of most sizes.? The mount has an adhesive pad that attaches to your phone or small, handheld device.? Snap [...]

phentermine port of oakland grand theft auto 5 grand theft auto 5 kris jenner kris jenner livestand

Jimmy Kimmel Lets the Elderly Sound Off on Facetagram [Video]

Everyone has weighed in on Facebook's purchase of Instagram. But one key demographic has remained silent—until know. More »


wilt chamberlain joe arpaio cat in the hat green eggs and ham wiz khalifa and amber rose oh the places you ll go blunt amendment

Wednesday, April 11, 2012

First lady marks 1-year point for military effort

[ [ [['Titanic', 7]], 'http://news.yahoo.com/titanic-anniversary/', '[Complete coverage: The Titanic, 100 years later]', ' ', '630', ' ', ' ', ], [ [['A picture is worth a thousand words', 5]], 'http://news.yahoo.com/why-facebook-bought-instagram-4-theories-160400376.html', '[Related: Why Facebook bought Instagram: 4 theories]', ' ', '630', ' ', ' ', ], [ [['He was in shock and still strapped to his seat', 9]], 'http://contributor.yahoo.com/join/yahoonews_virginiabeach', '[Did you witness the jet crash? Share your story with Yahoo! News]', ' ', '630', ' ', ' ', ], [ [['A JetBlue flight from New York to Las Vegas', 3]], 'http://yhoo.it/GV9zpj', '[Related: View photos of the JetBlue plane in Amarillo]', ' ', '630', ' ', ' ', ], [ [['Afghan security forces and police killed three', 3]], 'http://yhoo.it/H9BcJE', '[Related: Bales\' wife on his alleged shooting: \'He would not do that\']', ' ', '630', ' ', ' ', ], [ [['He was in shock and still strapped to his seat', 6]], 'http://news.yahoo.com/photos/navy-jet-crashes-in-virginia-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/cv/ip/ap/default/120406/jet_ap.jpg', '630', ' ', 'AP', ], [ [['This is as serious of a tornado', 7]], 'http://news.yahoo.com/photos/tornadoes-touch-down-in-texas-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/cv/ip/ap/default/120403/trucksdallas.jpg', '630', ' ', 'Reuters', ], [ [['Oikos University', 8]], 'http://news.yahoo.com/photos/deadly-oakland-university-shooting-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/cv/ip/ap/default/120402/shooting.jpg', '450', ' ', 'REUTERS/Reuters TV/KNTV/Handout', ], [ [['Trayvon Martin decked the Neighborhood', 7]], 'http://yhoo.it/GUovUP', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/2/61/261d2c36bccf0971c2734a4d4398aa5a.jpeg', '512', ' ', 'AP/David Goldman', ], [ [['Few thought Santorum would make it this far', 10]], 'http://yhoo.it/I0D5eb', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/d/94/d94312dd12151943f05633f372e64d80.jpeg', '630', ' ', 'Scott Olson/Getty Images', ], [ [['xxxxxxxxxxxx', 11]], 'http://news.yahoo.com/photos/russian-grannies-win-bid-to-sing-at-eurovision-1331223625-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/1/56/156d92f2760dcd3e75bcd649a8b85fcf.jpeg', '500', ' ', 'AP', ] ]

[ [ [['because I know God protects me', 14], ['Brian Snow was at a nearby credit union', 5]], '28811216', '0' ], [ [['The state news agency RIA-Novosti quoted Rosaviatsiya', 6]], '28805461', '0' ], [ [['measure all but certain to fail in the face of bipartisan', 4]], '28771014', '0' ], [ [['matter what you do in this case', 5]], '28759848', '0' ], [ [['presume laws are constitutional', 7]], '28747556', '0' ], [ [['has destroyed 15 to 25 houses', 7]], '28744868', '0' ], [ [['short answer is yes', 7]], '28746030', '0' ], [ [['opportunity to tell the real story', 7]], '28731764', '0' ], [ [['entirely respectable way to put off the searing constitutional controversy', 7]], '28723797', '0' ], [ [['point of my campaign is that big ideas matter', 9]], '28712293', '0' ], [ [['As the standoff dragged into a second day', 7]], '28687424', '0' ], [ [['French police stepped up the search', 17]], '28667224', '0' ], [ [['Seeking to elevate his candidacy back to a general', 8]], '28660934', '0' ], [ [['The tragic story of Trayvon Martin', 4]], '28647343', '0' ], [ [['Karzai will get a chance soon to express', 8]], '28630306', '0' ], [ [['powerful storms stretching', 8]], '28493546', '0' ], [ [['basic norm that death is private', 6]], '28413590', '0' ], [ [['songwriter also saw a surge in sales for her debut album', 6]], '28413590', '1', 'Watch music videos from Whitney Houston ', 'on Yahoo! Music', 'http://music.yahoo.com' ], [ [['keyword', 99999999999999999999999]], 'videoID', '1', 'overwrite-pre-description', 'overwrite-link-string', 'overwrite-link-url' ] ]

regis philbin regis and kelly reno fire regis philbin last show regis philbin last show sarah vowell fire in reno

Phil Cooke, Ph.D.: Nonprofits: Are You Just Asking for Money, or Sharing a Vision?

Over and over I get calls from frustrated nonprofits because they're struggling financially or not getting on the radar of potential supporters. Sometimes they're uncomfortable asking for financial support, but in most cases, they're not actually so afraid to ask. The problem is, they're asking for money, not sharing a vision. Look at your media presentations, videos, live events, print materials, and in-person contacts. What do they say? What story are they telling? It's not enough just to show the great work you're doing and then ask for money. Perhaps more important, it's also not just about information. You can bury people in numbers, statistics, and graphs, and still not inspire them to open their wallets.

The secret is sharing a vision that people want to support. Connecting with potential supporters means making them feel part of the vision, and clearly showing them what role they can play. "What's in it for me?" may sound selfish, but the truth is, that's exactly what potential donors are thinking. They need to see themselves in the picture.

Stop just spouting statistics about the world's problems and the work you're doing, and then asking for donations.

Start sharing an inspiring and compelling vision about the reason what you're doing matters, and people will embrace it.

Have you experienced the difference I'm talking about in your organization, or with nonprofits that you support?

?

?

?

Follow Phil Cooke, Ph.D. on Twitter: www.twitter.com/philcooke

macauly culkin joe namath stefon diggs nazi ss andrej pejic naomi watts macaulay culkin

Tuesday, April 10, 2012

Understanding Network Security in the Age of Unified - VoIP News

In this "always-on" age of connected everything it can be a nightmare for enterprise IT departments to manage the exponential proliferation of hardware and employee devices connected to the corporate network. The current trend in mobile research is seeing corporate users moving away from traditional business mobile devices like Blackberry to consumer friendly devices like the iPhone, meaning that IT departments need to be increasingly vigilant to ward off potentially devastating security breaches. Just in case, the BYOD trend in other words becoming more common in the corporate space is making it moreover difficult for the IT departments to manage network security.

To better manage this connected everything future, where every workplace device from security cameras, to air conditioning, to computers and phones will in the near future be networked, unified communications promises a brave new world of connectivity and integration, where users can use any device they choose to fulfill most any communications need.

Golden age of communication for your business

It will in point of fact be a golden age of communication for your business, an all-encompassing corporate network bound at the same time by Business Phone Systems, IP telephony and Ethernet, however the question becomes, is your company?s network infrastructure up to the task?

As is often the case with new research, particularly new communication solutions, companies often don?t do their due diligence in investigating both the positive and negative effects of such advancements. In the case of UC, and more particularly IP telephony, in my experience businesses often times hear only the promised benefits, not realizing that there are steps that they need to take to prepare their respective corporate data network to fully utilize unified communications.

In my opinion, first among these preparations is always a thorough examination of one?s communication security measures; the protocols companies should have in place to protect sensitive communications with customers, co-workers, and business partners. By running security diagnostics, companies will better be able to recognize potential threats and prevent compromises to the communications network.

The truth of the matter is that running a secure multi-faceted communication network is challenging, as IP telephony brings with it many of the same challenges as traditional data networks coupled with the additional security issues related to voice networking. Not only do network administrators need to protect the network against such threats as hacks, viruses, and malware, however now must be able to ensure that IP phones, particularly those in open environments likes lobbies, are secure from unauthorized access through the phone?s Ethernet port. Better but, and something I like to preach, is the segmentation of both the physical and logical end of a corporate network. It?s not enough to segment a single switch with VLAN?s and expect the network to support a "piggy backed" environment. A logical separation, is always better eventually.

The point being

The point being, during UC does offer unprecedented communications solutions, it brings with it security vulnerabilities as then, vulnerabilities that the old land-line system & TDM simply didn?t have to worry about, issues that companies should be aware of earlier they jump in with both feet.

In the end, if you feel your business is unprepared for the advanced solutions unified communication provides, don?t worry, we here at Digitcom can help. Just give us a call and I promise we?ll help make this connected everything future easier to manage.

The Age of Unified Communications

Listed below are links to sites that reference Understanding Network Security in the Age of Unified Communications, Digitcom.ca:

power rangers jungle fury power rangers jungle fury ufc 139 fight card houston nutt houston nutt peter marshall peter marshall

'Less Than Human': The Psychology Of Cruelty ? Dr. Steve Best

Cover of 'Less Than Human'

?

Before I get to work explaining how dehumanization works, I want to make a preliminary case for its importance. So, to get the ball rolling, I?ll briefly discuss the role that dehumanization played in what is rightfully considered the single most destructive event in human history: the Second World War. More than seventy million people died in the war, most of them civilians. Millions died in combat. Many were burned alive by incendiary bombs and, in the end, nuclear weapons. Millions more were victims of systematic genocide. Dehumanization made much of this carnage possible.

Let?s begin at the end. The 1946 Nuremberg doctors? trial was the first of twelve military tribunals held in Germany after the defeat of Germany and Japan. Twenty doctors and three administrators ? twenty-two men and a single woman ? stood accused of war crimes and crimes against humanity. They had participated in Hitler?s euthanasia program, in which around 200,000 mentally and physically handicapped people deemed unfit to live were gassed to death, and they performed fiendish medical experiments on thousands of Jewish, Russian, Roma and Polish prisoners.

Principal prosecutor Telford Taylor began his opening statement with these somber words:

The defendants in this case are charged with murders, tortures and other atrocities committed in the name of medical science. The victims of these crimes are numbered in the hundreds of thousands. A handful only are still alive; a few of the survivors will appear in this courtroom. But most of these miserable victims were slaughtered outright or died in the course of the tortures to which they were subjected ? To their murderers, these wretched people were not individuals at all. They came in wholesale lots and were treated worse than animals.

He went on to describe the experiments in detail. Some of these human guinea pigs were deprived of oxygen to simulate high altitude parachute jumps. Others were frozen, infested with malaria, or exposed to mustard gas. Doctors made incisions in their flesh to simulate wounds, inserted pieces of broken glass or wood shavings into them, and then, tying off the blood vessels, introduced bacteria to induce gangrene. Taylor described how men and women were made to drink seawater, were infected with typhus and other deadly diseases, were poisoned and burned with phosphorus, and how medical personnel conscientiously recorded their agonized screams and violent convulsions.

The descriptions in Taylor?s narrative are so horrifying that it?s easy to overlook what might seem like an insignificant rhetorical flourish: his comment that ?these wretched people were ? treated worse than animals?. But this comment raises a question of deep and fundamental importance. What is it that enables one group of human beings to treat another group as though they were subhuman creatures?

A rough answer isn?t hard to come by. Thinking sets the agenda for action, and thinking of humans as less than human paves the way for atrocity. The Nazis were explicit about the status of their victims. They were Untermenschen?? subhumans ? and as such were excluded from the system of moral rights and obligations that bind humankind together. It?s wrong to kill a person, but permissible to exterminate a rat. To the Nazis, all the Jews, Gypsies and others were rats: dangerous, disease-carrying rats.

Jews were the main victims of this genocidal project. From the beginning, Hitler and his followers were convinced that the Jewish people posed a deadly threat to all that was noble in humanity. In the apocalyptic Nazi vision, these putative enemies of civilization were represented as parasitic organisms ? as leeches, lice, bacteria, or vectors of contagion. ?Today,? Hitler proclaimed in 1943, ?international Jewry is the ferment of decomposition of peoples?and states, just as it was in antiquity. It will remain that way as long as peoples?do not find the strength to get rid of the virus.? Both the death camps (the gas chambers of which were modeled on delousing chambers) and the Einsatzgruppen (paramilitary death squads that roamed across Eastern Europe followed in the wake of the advancing German army) were responses to what the Nazis perceived to be a lethal pestilence.

Sometimes the Nazis thought of their enemies as vicious, bloodthirsty predators rather than parasites. When partisans in occupied regions of the Soviet Union began to wage a guerilla war against German forces, Walter von Reichenau, the commander-in-chief of the German army, issued an order to inflict a ?severe but just retribution upon the Jewish subhuman elements? (the Nazis considered all of their enemies as part of ?international Jewry?, and were convinced that Jews controlled the national governments of Russia, the United Kingdom, and the United States). Military historian Mary R. Habeck confirms that, ?soldiers and officers thought of the Russians and Jews as ?animals? ? that had to perish. Dehumanizing the enemy allowed German soldiers and officers to agree with the Nazis? new vision of warfare, and to fight without granting the Soviets any mercy or quarter.?

The Holocaust is the most thoroughly documented example of the ravages of dehumanization. Its hideousness strains the limits of imagination. And yet, focusing on it can be strangely comforting. It?s all too easy to imagine that the Third Reich was a bizarre aberration, a kind of mass insanity instigated by a small group of deranged ideologues who conspired to seize political power and bend a nation to their will. Alternatively, it?s tempting to imagine that the Germans were (or are) a uniquely cruel and bloodthirsty people. But these diagnoses are dangerously wrong. What?s most disturbing about the Nazi phenomenon is not that the Nazis were madmen or monsters. It?s that they were ordinary human beings.

When we think of dehumanization during World War II our minds turn to the Holocaust, but it wasn?t only the Germans who dehumanized their enemies. While the architects of the Final Solution were busy implementing their lethal program of racial hygiene, the Russian-Jewish poet and novelist Ilya Ehrenburg was churning out propaganda for distribution to Stalin?s Red Army. These pamphlets seethed with dehumanizing rhetoric: they spoke of ?the smell of Germany?s animal breath,? and described Germans as ?two-legged animals who have mastered the technique of war? ? ?ersatz men? who ought to be annihilated. ?The Germans are not human beings,? Ehrenburg wrote, ?? If you kill one German, kill another ? there is nothing more amusing for us than a heap of German corpses.?

This wasn?t idle talk. The Wehrmacht had taken the lives of 23 million Soviet citizens, roughly half of them civilians. When the tide of the war finally turned, a torrent of Russian forces poured into Germany from the east, and their inexorable advance became an orgy of rape and murder. ?They were certainly egged on by Ehrenburg and other Soviet propagandists?? writes journalist Giles McDonough:

East Prussia was the first German region visited by the Red Army ? In the course of a single night the red army killed seventy-two women and one man. Most of the women had been raped, of whom the oldest was eighty-four. Some of the victims had been crucified ? A witness who made it to the west talked of a poor village girl who was raped by an entire tank squadron from eight in the evening to nine in the morning. One man was shot and fed to the pigs.

?

bonnaroo 2012 lineup twisted metal sea lion si swimsuit 2012 westminster dog show abe lincoln vampire hunter detroit red wings

Solar Steam Helps Coax Heavy Oil from Old Fields

solar-steamSOLAR STEAM: Chevron is using concentrating solar power to create steam to help melt remaining heavier oils and coax them to the surface in California. Image: Courtesy of Chevron

The Coalinga oil field in California has been pumping out crude since 1887, and the remaining oil has gotten heavier and heavier and harder and harder to extract?but it will soon get a boost from the sun. Specifically, the old field will use steam generated by concentrated sunlight to help melt the remaining heavy oils and make them liquid enough to be pumped to the surface.

"It's operating and providing the bulk of the steam generated to support enhanced oil recovery," explains Jerry Lomax, vice president of emerging energy at Chevron, the energy company that funded the project. The idea is to "turn photons into solar steam and then? get that into an oil field injector."

Chevron partnered with BrightSource Energy, a company that designs and builds concentrating solar power plants, to build a version of that technology in the Coalinga oil field. They have built more than 7,000 mirrors on mechanized devices?known as heliostats?to track the sun on 65 acres and concentrate sunlight from this broad area to a point atop a 327-foot-tall tower. Inside that tower, water turns to steam at a pressure of 700 pounds per square inch and an average temperature of 500 degrees Fahrenheit. That steam flows to a heat exchanger, where it turns water from the oil field to steam so that it can be pumped back underground to loosen the remaining oil. All told, the power tower system pumps out 350 barrels of steam an hour, which will be used to supplement water boiled to steam by burning natural gas if testing goes well.

"It's an extra 5 percent for them," Lomax says, "and they save that much natural gas." As it stands, Chevron pumps nearly 8,000 barrels of "oil equivalent" per day out of the Coalinga field.

Over the course of 2012, Chevron will determine how reliable the solar steam is, as well as what kind of steam volumes it can expect under various conditions. By next year, once hookups are in place, the solar steam will start supplementing that from burning natural gas. "Solar steam will always be an augmentation of an alternate traditional fuel source, such as natural gas, so we have 24-hour coverage," Lomax says. On the sunniest days, the system can produce steam almost 12 hours of the day, but Chevron will investigate whether it is feasible to run an oil field exclusively on solar steam as part of this demonstration project.

Heavy oils are a big part of new oil being produced around the world, whether oil from the tar sands of Canada or thicker crude from Indonesia. Chevron has brought up 150,000 barrels of bitumen in California alone and roughly 500,000 barrels per day around the world. Solar steam?should it prove successful in California's San Joaquin Valley?might make sense to get more oil out of the ground in places like the partition zone between Saudi Arabia and Kuwait or Indonesia. "All three locations have sites with ample sunlight and ample amounts of flat acreage near oil fields where you could include a solar field of this scale," Lomax says, and the company is also studying whether solar steam might make sense for complexes that refine oil or produce petrochemicals, both of which employ a lot of heat.

Of course, oil fields are not the friendliest or cleanest places for mirrors that must remain highly polished to be effective. Thus far, the oil company has only broken one of the heliostats by running into it with machinery and has been pitting human crews against automated cleaning machines. "The machine uses slightly less water than a manual crew," Lomax says.

rose parade mount rainier national park drop dead gorgeous ticket city bowl 2011 nfl playoff schedule cowboys vs giants dallas cowboys