Friday, October 28, 2005

FEMA: Safe Rooms - Mitigation - Safe Room:

Tornado Safe Rooms Take Center Stage


Lite-Form workers lift the lightweight pre-assembled wall section into place over the cement slab foundation. The cement-filled, foam-formed walls are reinforced with steel rebar and may be built into new housing or added inside or outside to existing structures at a relatively low cost. Its construction is simple enough that it can be built by do-it-yourselfers. For more information and images, see Tornado Safe Rooms Take Center Stage. read more »

Thursday, October 13, 2005

Food For Thought

To laugh is to risk appearing a fool….




To weep is to risk appearing sentimental….




To reach out for another is to risk involvement….




To expose feelings is to risk rejection….




To place your dreams before a crowd is to risk ridicule….




To love is to risk not being loved in return….




To go forward in the face of overwhelming odds is to risk failure….












But risks must be taken because the greatest hazard in life is to risk nothing.




The person who risks nothing does nothing, has nothing, is nothing.




He may avoid suffering and sorrows, but he cannot learn, feel, change, grow, or love.




Chained by his certitudes, he is a slave - he has forfeited his freedom.










Only a person who takes risks is FREE!

Tuesday, October 11, 2005

Iraq attacks kill scores

Aljazeera.net - 3 hours ago
Up to 50 people have been killed and dozens wounded in a series of attacks in Iraq, including a car bomb that ripped apart a crowded market in a town near the Syrian border. In the deadliest attack in Iraq ... read more »

Two things Navy SEALS are always taught:

Keep your priorities in order

Know when to act without hesitation

A college professor, an avowed atheist and active in the ACLU, was
teaching his class. He shocked several of his students when he flatly
stated that once and for all he was going to prove there was no God.
Addressing the ceiling he shouted:

"GOD, if you are real, then I want you to knock me off this platform.
I'll give you exactly 15 minutes!!!!!"

The lecture room fell silent. You could hear a pin drop. Ten minutes
went by.

" I'm waiting God, if you're real knock me off this platform!!!!"

Again after 4 minutes, the professor taunted God saying,
"Here I am, God!!! I'm still waiting!!!"

His count down got down to the last couple of minutes when a SEAL, just
released from the Navy after serving in Afghanistan and Iraq and newly
registered in the class, walked up to the Professor.

The SEAL hit him full force in the face, and sent the Professor tumbling
from his lofty platform. The Professor was out cold!! The students were
stunned and shocked. They
began to babble in confusion. The SEAL nonchalantly took his seat in the
front row and sat silent. The class looked at him and fell
silent.....waiting. Eventually, the professor came to and was noticeably
shaken. He looked at the SEAL in the front row. When the professor
regained his senses and could speak he asked:

"What the hell is the matter with you?! Why did you do that!?"

"God was really busy protecting America's soldiers, who are protecting
your right to say stupid shit and act like an ass!!! So he sent me!!"
ONE NATION UNDER GOD, INDIVISIBLE

Jesus wants A Few Good Men! Living A Life You Always Wanted!:

Jack Nicholson (Col. Jessup) (marine cornel) YOU CAN'T HANDLE THE TRUTH ….Son, we live a world that has walls and those walls have to be guarded by men with guns. Whose gonna do it? You? You, Lt. Weinburg? I have more responsibility here than you could possibly fathom. You curse the marines. You have that luxury. You have that luxury of not knowing what I know. And that my existence as grotesque and incomprehensible to you, saves lives. I know down deep in places you don't want to talk about, you don't want me on that wall, you need me on that wall. We use words like HONOR, CODE, and LOYALTY. We use these words as the very backbone of a life spent defending something. You use them as a punch line. I have neither the time nor the inclination to explain myself to a man who rises and sleeps under the blanket of the very freedom I provide. I prefer you to just say thank you and go on your way. Otherwise, I suggest you pick up a weapon, and stand to post. Either way, I don't give a crap what you think you are entitled to!" (end of scene) more »

fallout shelter

A fallout shelter is a civil defense measure intended to reduce casualties in a nuclear war. Nuclear fallout is radioactive dust created when a nuclear weapon explodes. The explosion vaporizes any material within the fireball, including the ground if it is nearby. Much of this material is exposed to neutrons from the explosion, absorbs them, and becomes radioactive. When this material condenses in the cloud, it forms dust and light sandy material that resembles ground pumice. The fallout emits gamma rays as if each particle were a tiny x-ray machine. Much of this highly radioactive material then falls to earth, subjecting anything within the line of sight to gamma radiation, a significant hazard. A fallout shelter is designed to allow its occupants to avoid exposure to harmful fallout until radioactivity has lowered to a safer level. read more »

Wanted: A Few Good Men

In life we shall find many men that are great, and some that are good,
but very few men that are both great and good.

- Charles Caleb Colton

Sunday, October 09, 2005

Google goes to Washington

Posted by Andrew McLaughlin, Senior Policy Counsel


It seems that policymaking and regulatory activity in Washington, D.C. affect Google and our users more every day. It’s important to be involved - to participate in the policy process and contribute to the debates that inform it. So we’ve opened up a shop there. The first member of our Washington team is Alan Davidson, a veteran thinker and advocate for issues we care about.


Our mission in Washington boils down to this: Defend the Internet as a free and open platform for information, communication and innovation. OK, that sounds a little high and mighty, so let me break it down into something a bit wonkier with a sampling of the U.S. policy issues we’re working on:


Net neutrality. As voice, video, and data rapidly converge, Congress is rewriting U.S. telecommunications laws and deregulating broadband connectivity, which is largely a good thing. But in a country where most citizens have only one or two viable broadband options, there are real dangers for the Internet: Should network operators be able to block their customers from reaching competing websites and services (such as Internet voice calls and video-on-demand)? Should they be able to speed up their own sites and services, while degrading those offered by competitors? Should an innovator with a new online service or application be forced to get permission from each broadband cable and DSL provider before rolling it out? Or, if that’s not blunt enough for you, what’s better: [a] Centralized control by network operators, or [b] free user choice on the decentralized, open, and astoundingly successful end-to-end Internet? (Hint: It’s not [a].)


Copyrights and fair use. Google believes in protecting copyrights while maintaining strong, viable fair use rights in this new digital age. We support efforts by the U.S. Copyright Office to facilitate the use of orphan works (works whose rights-holders can’t be found), while fully respecting the interests of creators. We applauded the Supreme Court’s carefully calibrated decision in the Grokster case, but worked to defeat legislation that would have created new forms of liability for neutral technologies and services like Google.
read more »

Technology Quotes and Proverbs:

In a few hundred years, when the history of our time will be written from a long-term perspective, it is likely that the most important event historians will see is not technology, not the Internet, not e-commerce. It is an unprecedented change in the human condition. For the first time - literally - substantial and rapidly growing numbers of people have choices. For the first time, they will have to manage themselves. And society is totally unprepared for it.



Peter Drucker


read more »

150 computer one-liners

Build a system that even a fool can use, and only a fool will use it.


Computers can never replace human stupidity.



It works! Now if only I could remember what I did...


read more »

Thursday, September 22, 2005

Key Volunteer Network - Home Page:

The Key Volunteer Network is an integral part of a Marine Corps unit family readiness program and is the primary communication link between the commanding officer and the unit families for the enhancement of mission readiness.



The Key Volunteer Network supports the spouses of the unit Marines by providing communication from the command, serving as a source for information and referral services and by helping foster a sense of community within the unit. Learn more

Tuesday, September 06, 2005

How the Red Cross Began


Humanitarian relief, 19th-century style

The full extent of the Hurricane Katrina disaster is starting to become clear. It hasn't been a pretty picture, and people are asking hard questions about what might have been done differently by government and local citizens.


One thing is sure: private charities and relief workers are on the scene in force. The American Red Cross, one of the nation's largest private relief services, has mobilized its largest-ever response to a national disaster. As people open their wallets to support these volunteers, we're opening the books to look at the 19th-century Swiss humanitarian who helped start the Red Cross itself.


Saturday, September 03, 2005

Stock Market News and Investment Information | Reuters.com:

WASHINGTON, Sept 3 (Reuters) - U.S. President George W. Bush, acknowledging the initial federal relief effort for Hurricane Katrina was unacceptable, said on Saturday he will send 7,000 additional troops to storm-ravaged region.



"Today I ordered the Department of Defense to deploy additional active-duty forces to the region. Over the next 24 to 72 hours, more than 7,000 additional troops from the 82nd Airborne, from the 1st Calvary, the 1st Marine Expeditionary Force and the Second Marine Expeditionary Force, will arrive in the affected areas," Bush said.

Katrina - Wikipedia, the free encyclopedia:# Hurricane Katrina (2005, Atlantic) - catastrophic storm that devastated much of the U.S. Gulf Coast

The Case for Modeling and Simulation of Information Security:

“When I hear I forget. When I see I remember. When I do, I learn.” Confucius

Abstract


A challenge that stands before the security community is to better prepare management, system administrators, and users to respond appropriately to information security crises while simultaneously reducing the anxiety associated with them. One clear approach to achieving this goal is to use modeling and simulation for education, training, and testing. This paper will present the available range of modeling and simulation capabilities in Information Assurance. It will also establish some principles for extending these capabilities into the community. It will do this by establishing a case for utilizing more simulation in our discipline, reviewing past modeling & simulation efforts within information security, reviewing the traditional types of modeling and simulation methodologies, addressing capability and experiences in computer modeling within other areas such as telecomm and economics, and providing a framework for future computer based modeling and simulation efforts in Information security.

Introduction

Friday, August 26, 2005

CRASH TEST DUMMIES LYRICS


"Superman's Song"


Tarzan wasn't a ladies' man
He'd just come along and scoop 'em up under his arm
Like that, quick as a cat in the jungle
But Clark Kent, now there was a real gent
He would not be caught sittin' around in no
Junglescape, dumb as an ape doing nothing

[Chorus:]
Superman never made any money
For saving the world from Solomon Grundy
And sometimes I despair the world will never see
Another man like him

Hey Bob, Supe had a straight job
Even though he could have smashed through any bank
In the United States, he had the strength, but he would not
Folks said his family were all dead
Their planet crumbled but Superman, he forced himself
To carry on, forget Krypton, and keep going

Tarzan was king of the jungle and Lord over all the apes
But he could hardly string together four words: "I Tarzan, You Jane."

Sometimes when Supe was stopping crimes
I'll bet that he was tempted to just quit and turn his back
On man, join Tarzan in the forest
But he stayed in the city, and kept on changing clothes
In dirty old phonebooths till his work was through
And nothing to do but go on home


[Thanks to kevin_c4@hotmail.com, sean_ee@hotmail.com for correcting these lyrics]

[ www.azlyrics.com ]

Tuesday, August 23, 2005

Molly.com That's why it's Called Beta:

I WOKE UP this morning to find countless emails and IMs pouring into my accounts asking me about the IE 7 beta.

Some developers are expressing relief at seeing some of the bug fixes and improvements, but of course as I’ve been expressing all along, this is a process with which we have to be patient. Expecting full bug fixes and implementation in any beta software is ridiculous, as is expecting that WaSP / Microsoft Task Force can perform retroactive miracles. more »

E-Mail Wiretapping' Prosecutions Could Increase in the Future

By Gene J. Koprowski




A federal appeals court ruling in Boston last week on e-mail wiretapping is reverberating throughout the Internet community-and legal world-with a consensus emerging that there may be prosecutions in the future for what today is considered normal business practice by ISPs.



The First Circuit Court of Appeals, voting 5-2, ruled that an e-mail service provider that supposedly read e-mail, intended for customers only, could indeed be tried on federal criminal charges.

This is True: The Lord Giveth, the Feds Taketh Away:

When William H. Irvin III received a government check for $836,939.19 in June, 1992, he considered it a gift from God since he had recently prayed for self-sufficiency. A federal court jury in Kansas City, Mo., was unmoved: it was a computer error, they said, not God, which boosted his $183.69 check to the higher amount. Convicted of knowingly spending government money, filing a false tax return and money laundering, he faces 43 years in prison and a $1.25 million fine. (AP) ...Then his prayers have been answered: he won’t have to buy food or shelter for 40 years.

Saturday, August 20, 2005

Plug-and-play bots worming and warring among Windows systems

More than a dozen different worms have been created from the latest Microsoft Windows vulnerability and readily available bot software and have started attacking each other's compromised systems, security experts warned on Wednesday. “ These guys have been pretty desperate for a new exploit for a while. They had been using LSASS for too long, and been scraping the bottom of the barrel for exploits, so now everyone and his mother is now going to use this instead. ”


Joe Stewart, senior threat researcher, Lurhq The worms--which appear to come from three families of code dubbed Zotob, Botzori and IRCBot--started spreading on Sundaywithout much fanfare. However, on Tuesday, computers at CNN and the New York Times became infected by one or more variants of the worm, and the public profile of the programs increased a notch. more »

Friday, July 29, 2005

Lost in Translation - Government Technology:

As the U.S. population becomes more diverse and the number of non-English speaking residents grows, the more difficult communication between local law enforcement and residents become.

This January, two handheld voice translation devices -- the Phraselator developed by VoxTec, and the Voice Response Translator (VRT) developed by Integrated Wave Technologies -- were tested by the Chula Vista, Calif., Police Department in conjunction with the Space and Naval Warfare Systems Command (SPAWAR) in San Diego. read more »

IE7 nukes Google, Yahoo! search

Update Microsoft's Internet Explorer 7 went on a limited beta release today and contains a nasty surprise for some users.

Users with search toolbars from Yahoo! and arch-rival Google have discovered that these vanish. Other third-party toolbars designed to block pop-ups or aid with form filling appear to be working normally, according to reports from Reg readers. read more »

NASA says Discovery looks safe to fly home - Return to Flight - MSNBC.com:

RELATED STORIES

Thursday, July 28, 2005

Yemeni cleric jailed for 75 years

A Yemeni cleric who once called himself Osama Bin Laden's spiritual adviser has been sentenced to a maximum 75 years in prison in New York.

Sheikh Mohammed Ali Hassan al-Moayad was convicted on charges of conspiring to support the al-Qaeda network and Palestinian militant group Hamas.

At a meeting with two FBI informants in Germany, he was recorded promising to funnel more than $2m (£1.1m) to Hamas.

He was arrested by German police in January 2003 and extradited to the US.

For each of five counts, he received 15-year sentences, each to be served consecutively.

He was also fined $1.25m in a federal court in Brooklyn.resd more »

Thursday, July 14, 2005

EXIT MUNDI: A COLLECTION OF END-OF-WORLD SCENARIOS:

Isn't life a bitch? The world is going to end. You don't even have to be a religious fundamentalist to see that's true.

Some people collect postal stamps; Exit Mundi collects scenarios of what could go wrong with the world. Sure, our planet could get hit by an asteroid. But hey, that's nothing. Did you know we could all be munched away by hungry molecules? Or that our physicists could unintentionally wipe us all out while tinkering with particles? `Oops, sorry...'

Exit Mundi isn't in it for doom preaching, but strictly for fun. It's a fascinating thought: if that &*%#-comet didn't wipe out the dinosaurs 65 million years ago, we wouldn't be here pondering about apocalypses and armageddons in the first place. The dinosaurs roamed our planet millions of years longer than we did. If it wasn't for the comet, they still would.

That's why this site is a tribute to floods, quantum explosions and awfully big chunks of space rock falling out of the sky. If there's a lesson to be learnt, it should be that within every end looms the dawn of a new beginning.
Sounds good, doesn't it?

Guerrilla News Network:

Fallen Heroes of Operation Iraqi Freedom

Remembering the soldiers who died in the service of their country.

The list was last updated at 8:30 PM EDT Wednesday, July 13, 2005
Source: DefenseLINK


Alphabetical: Sort the list in alphabetical order

Base: Sort the list by military base

State: Sort the list by the soldier's home state

Age: Sort the list by the soldier's age

Sort list order: Alphabetical | Chronological | Branch | Base | State | Age

Click a lettter to jump to that section
[ A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z ]

American soldiers listed: 1754

Tuesday, July 12, 2005

Eben Rawls, Attorney at Law

Eben Rawls is a North Carolina criminal defense attorney. He is board certified by the North Carolina State Bar as a Specialist in both Federal and State Criminal Law with over 25 years of trial court experience. While he regularly handles state and federal cases across North Carolina, Mr. Rawls has also defended clients facing serious criminal prosecutions in the trial courts of Florida, Georgia, South Carolina, Tennessee, New Jersey, New York, and California. In one case, Mr. Rawls was admitted to the courts of Norway to defend his client.

Sunday, June 26, 2005

Homes may be 'taken' for private projects

Updated: 12:23 p.m. ET June 23, 2005


WASHINGTON - The Supreme Court on Thursday ruled that local governments may seize people’s homes and businesses — even against their will — for private economic development. more »

Tuesday, June 07, 2005

This page is dedicated to Voltaire!

"The story of Zeus transforming himself into a swan so that he might couple with Leda, they call myth, but the tale about a holy ghost impregnating a virgin, they believe..." - Anonymous








Voltaire, Epître sur Les Trois Imposteurs:


Si Dieu n'existait pas, il faudrait l'inventer


If God did not exist, it would be necessary to invent him


This statement by Voltaire was so famous that Flaubert included it in his Dictionnaire des idées reçues, and it is still frequently quoted today. But where does it first appear? And what precisely did Voltaire mean when he wrote it? Does it imply, as most of Voltaire's parrots seems to suppose, that God is a fictitious being, created for the comfort of the human race?

Saturday, June 04, 2005

Red Hat Frees Fedora to the Fedora Foundation

Contributed by Devin

Saturday, 04 June 2005

Red Hat announced that it is releasing the copyrights and development work of the free Fedora version of Linux over to the Fedora Foundation.


Fedora FoundationRed Hat, one of the most popular Linux distributions, forked into two projects back in 2002. Red Hat Enterprise Linux (RHEL) was targeted at commercial customers, while Fedora was the free, community distribution. Red Hat, Inc. has failed at trying to attract the outside involvement that it hoped to get with the Fedora project.


"The goal of The Fedora Project is to work with the Linux community to build a complete, general purpose operating system exclusively from open source software. Development will be done in a public forum ... By using this more open process, we hope to provide an operating system more in line with the ideals of free software and more appealing to the open source community," the Fedora Project Web site says.


Many developers have critisized the direction Fedora has taken with Red Hat, Inc. at the wheel. Fedora has become a testing ground for new technologies that eventually find their way to RHEL.


Some members of the community think that transfering control of the project to the new Fedora Foundation will keep the project community-driven.
more »

Intel Security:

ARE YOU PREPARED FOR AN EMERGENCY?




In the event of an emergency, you may need to evacuate. A natural disaster as well as a terrorist attack can strike quickly and without warning. Depending on the nature of that evacuation you may have to walk a half a mile or more and/or be outside for as long as three hours.




We recommend that you have an emergency "GO" kit that includes:




Comfortable shoes, socks and warm, dry clothes.



Medication,



A bottle of water, and



Some energy bars.


If told to evacuate, follow the instructions of the Pentagon Police and their Evacuation Assistants.
more »

Thursday, June 02, 2005

Malcolm Wells.com - underground buildings, earth sheltered architecture, energy efficient houses, passive solar...:

This site is dedicated to the promotion and discussion of:


* underground buildings,

* earth-sheltered architecture,

* eco-friendly design, and

* energy-efficient houses


... particularly the ideas of pioneer architect Malcolm Wells.
more »

Underground buildings have as many personalities

functions, and intriguing stories as surface buildings do. Why are they built? What are they like, inside and outside? Find out by selecting an article from the list below. For your convenience, the most recent articles are listed first:

Entrances to the Underworld Before entering an aboveground building, people can assess its size and character simply by looking at it. A building hidden under the ground offers no such clues, however. Entrance pavilions or kiosks can hint at what lies below, establishing at least a style, if not a sense of scope.

Digging for the Green: Underground Architecture and Sustainable Design Environmental consciousness has been growing for a decade or more among architects. The financial benefits of green design are becoming more apparent, making builders more willing to embrace the movement. Green roofs, for example, are sprouting all over the United States. Why not put them at ground level? more »

Tuesday, May 31, 2005

Residents Moving After Home Invasion

POSTED: 3:27 pm EDT May 31, 2005

UPDATED: 5:52 pm EDT May 31, 2005


CHARLOTTE, N.C. -- A family at the Waterford Creek Apartments are packing up and leaving after a frightening home invasion at a 7:30 a.m. Tuesday.
WSOC-TV



The family said they heard a knock at the door, but when one of the victims looked through the peephole, he couldn't see anyone. The culprits were hiding out of sight.


The man opened the door and that's when the attackers put a gun in his face.


The family didn't want to be identified because they are afraid the robbers will come back and kill them.


They did say once the men were inside, the intruders pointed a gun at their three children -- ages from 1 to 3 years old.


The gunman threatened to kill the kids if they didn't get money. read more »

Monday, May 30, 2005

Report: Injured Zarqawi has fled Iraq

Top insurgent may have been moved to Iran, source says
Updated: 6:09 p.m. ET May 28, 2005



LONDON - Al-Qaida’s leader in Iraq Abu Musab al-Zarqawi had fled the country after being seriously injured in a U.S. missile attack, a British newspaper reported on Sunday, quoting a senior commander of the Iraqi insurgency.


Al-Zarqawi has shrapnel lodged in his chest and may have been moved to Iran, The Sunday Times newspaper reported, adding his supporters may try to move him on to another country for an operation.


The paper quoted an unnamed insurgency commander as saying the Jordanian-born militant was wounded three weeks ago when a U.S. missile hit his convoy near the northwestern Iraqi city of al Qaim.


“Shrapnel went in between the right shoulder and his chest, ripped it open and is still stuck there,” the commander said, adding a second piece of shrapnel penetrated Zarqawi’s chest but exited from his back.


“There was concern about spinal injuries,” the commander said. “But his ability to move eliminated that fear.”


The Sunday Times said Zarqawi, accused of masterminding many of the worst insurgent attacks in Iraq, was carried from his vehicle after the missile strike and given basic first aid in a hideout.


When he became delirious with fever four days later he was taken to hospital in the city of Ramadi, 68 miles west of Baghdad, it said. The paper did not say when the commander was speaking but said the source had proved reliable in the past.

Netscape 8.0 should be uninstalled due to XML problems

Category: SOFTPEDIA NEWS :: Internet Life


According to Microsoft, the new browser interferes with Internet Explorer




After Dave Massy, Microsoft's senior program manager for Internet Explorer, said in a blog that Netscape 8.0 may interfere with Internet Explorer, Microsoft confirmed today the problem.


Also, Microsoft has advised its customers using Netscape 8 and Internet Explorer in the same machine
to uninstall Netscape 8, because Netscape causes Internet Explorer to crash.In fact, according do Dave Massy, Netscape’s updated technology interferes with Internet Explorer’s ability to display some Web pages. Computer users who install Netscape 8, may see some Web pages appear blank in Internet Explorer.


“We’ve just confirmed an issue that has started to be reported on newsgroups and forums that after installing Netscape 8.0 the XML rendering capabilities of Internet Explorer no longer work. That means that if you navigate in IE to an XML file such as an RSS feed or an XML file with an XSLT transformation applied then rather than seeing the data you are presented with a blank page,” Massy said on the blog.

Thursday, May 26, 2005

Nextel is a major player in the market and enjoys tremendous popularity.

From wholesalers Parnell-Martin (Charlotte, N.C.) and Hughes Supply (Orlando, Fla.) and from Miami-based wholesalers Bond Supply and Lehman Pipe & Plumbing Supply, to Home Depot Supply — each of them said they had at least one Nextel product.

“We understand the construction and distribution business,” says Henry Popplewell, Nextel’s vice president of distribution and transportation. “They are two of the backbone industries in our organization. We have worked together as partners and evolved together developing solutions for more than 10 years now.”

According to Kent Lee, Charlotte, N.C. complex manager for wholesaler Parnell-Martin, “Nextel has had good growth and profits along with good people. They give us the basic blocking and tackling tools we need.”

Wednesday, May 25, 2005

Computers Seized in Data-Theft Probe

Federal Investigators Remove PCs, Discs From Several Locations; LexisNexis Break-In Linked to Paris Hilton Phone Hacking

By Brian Krebs

washingtonpost.com Staff Writer

Thursday, May 19, 2005; 6:16 PM


The federal investigation into the massive theft of sensitive personal records from database giant LexisNexis Inc. intensified this week with the execution of search warrants and seizure of evidence from several individuals across the country, according to federal law enforcement officials.


Three people targeted in the investigation confirmed that federal investigators had served warrants at their homes. The group included a minor who has been in contact with a washingtonpost.com reporter for three months and who said he was directly involved in the LexisNexis breach.
more »

Tuesday, May 24, 2005

MSN Virtual Earth To Take On Google Earth





Micrsoft sends news today that founder Bill Gates has announced a MSN Virtual Earth service is to debut in the summer. The service is promised to provide:



Satellite images with 45-degree-angle views of buildings and neighborhoods



Satellite images with street map overlays



Ability to add local data layers, such as showing local businesses or restaurants



The service will allow users to choose from a number of different data types plus allow people to contribute their own information. The announcement came today at the D3 conference happening this week.
Last week, Google announced that its Keyhole software allowing satellite views of the Earth will be renamed Google Earth. Better images will also be available to those getting satellite views via Google Maps. In addition, Google Maps has also been getting enhanced by others adding on data from other sources. More on this in is covered in our Google Factory Tour Recap post.




So, the planned Microsoft service will help MSN compete against some Google gains in this area, not to mention moves others like Yahoo have been making with maps. Some past reading you may find interesting on these topics:



Google Maps Not In Google Search; Comparing Services & How Do They Do That?


Satellite/Aerial Images Plus Local Info
This post discusses TerraFly. This service has been available for more than five years and receives funding from IBM. Terrafly offers several of the services that MSN plans to provide including street overlays and local business info.
Super Cool: Interact With Satellite and Aerial Images With NASA's World Wind Program

Global in scope. World Wind Central (a wiki) offers links to interesting images that users have found.

Just Mrap It!

Monday, May 23, 2005

LLNL’s ‘Science Week’ festivities celebrate World Year of Physics

Computer simulation of the gravitational radiation from the head-on collision of two black holes at a time just after the collision. The different colors represent the different strengths of the gravitational wave signal. Techniques for detecting gravitational waves, which are predicted by Einstein’s theory of general relativity, will be discussed during a Science Day talk by Barry Barish of the California Institute of Technology.

Sunday, May 22, 2005

For Japanese Math Wizards, It's a Mind Game

The Washington Post

By Ginny Parker, Dec 15, 2000


For Japanese Math Wizards, It's a Mind Game; Contestants Test Skill on Invisible
Abacus


The contestants sit hunched over bare tables, some in sweat shirts, some in
neckties. A small audience watches quietly, while judges pace the floor.


Suddenly, a teenager's had shoots up and shout breaks the silence. "Done!" he
calls out, and passes his answer sheet to a moderator.


Within seconds, Hiroaki Tsuchiya has multiplied in his head a list of numbers
that would make an accountant's head spin. How does he do it? On an imaginary
abacus, just as merchants, students and others have done throughout Asia for
centuries.


Today, despite computers and calculators, the technique survives as a strenuous
workout for the brain. Teachers say almost anyone can master it, although it
takes hours of practice, mental dexterity and extraordinary powers of
concentration.


"If you space out, you lose," said Tsuchiya, who at age 13 recently became the
youngest winner of a Kyoto tournament where Japan's best mental mathematicians
display their amazing feats.


Tsuchiya, for example, takes only a few moments to figure out the quotient of
992.587318 divided by 5,647.723.
more »

Stanford Accelerator Uncovers Archimedes' Text


Posted by timothy on Sunday May 22, @12:49AM

from the 2-quarts-olive-oil-1-bunch-grapes-goat-milk dept.
AI Playground points to a Newsday.com report which reads in part "A particle accelerator is being used to reveal the long-lost writings of the Greek mathematician Archimedes,
work hidden for centuries after a Christian monk wrote over it in the Middle Ages. Highly focused X-rays produced at the Stanford Linear Accelerator Center were used last week to begin deciphering the parts of the 174-page text that have not yet been revealed." more »

Friday, May 20, 2005

KnowledgeNews :: Your Home for Learning on the Web:



"Luke, I told you to do your science homework!"


He's baaaack! Unless you've been living in a galaxy far, far away, you've probably heard that the final installment of Star Wars opened just after midnight on Thursday--28 years after Darth Vader and Co. first flashed across the silver screen. All over America, die-hard fans waited in huge lines to see Episode III: Revenge of the Sith at early morning showings.


We love a science fiction thrill as much as anyone, but we can't help noticing that, in Hollywood, the fiction often gets the better of the science. So, to restore balance to the media force, we're sending some simple science correctives. (Just don't blurt them out during the show!



Today's Knowledge

The Top 5 Science Fiction Foul-Ups



Every science fiction movie has them: stupendous scenes of movie magic that sacrifice science on the altar of special effects. Here are our top 5 science fiction foul-ups--common movie scenes where science takes a holiday so we can get our fix of big-screen thrills.


1. No Ear Plugs Necessary


The Scene: The big impressive spaceship flies across the screen, emitting an equally impressive rumble of powerful engine noise. Or maybe just that really cool TIE fighter howl.


The Problem: These ships are moving in space, which is a vacuum, and sound can't travel in a vacuum. It takes matter to propagate the energy waves that we perceive as sound. So the sound of any ship in space is the sound of silence. (Call it the Garfunkel Effect.)


2. This One's a Dud



The Scene: A deadly firefight in space rages until someone goes down in flames, complete with incredible explosion and massive ball of fire.


The Problem: Most explosions are based on combustion, a chemical reaction that requires oxygen to take place. Of course, there's no oxygen in space. You can't even light a match out there, let alone set off stunning fireworks displays.


3. Think Jellyfish


The Scene: Our heroes enter a seedy space bar, full of strange alien life forms. Yet chances are they've got tables and chairs at which to nurse a beer, because the aliens look, and sit, pretty much like us.


The Problem: Our own little corner of the cosmos sports life in all shapes and sizes. Of the millions of species on Earth, only a small fraction look much like us. The odds that the bar crowd on completely different worlds would evolve to look like we do are pretty slim.


4. Set Phasers on "Slow"


The Scene: Science fiction's chosen weapon is the laser. Phaser, blaster, whatever you want to call it--it's a blast of energy fired from a gun. Whether it's dueling ships or dueling pistols, the bad guys get their due in a blaze of beams flashing across the screen.


The Problem: The energy in these weapons doesn't behave like real energy. Energy travels at the speed of light--far too fast for your eyes to follow it in beautiful blue and red beams.


5. "I'm Going Retro!"


The Scene: Squadrons of starfighters duel in a dogfight that puts Top Gun to shame. Inevitably, somebody gets a bad guy on his tail, desperately declares he "can't shake 'em," and, well, see #2.


The Problem: Spacecraft don't fly like planes. Because space is a vacuum, there's no need to maintain "lift," and no "drag" to slow you down once you get going. A starfighter in a dogfight could easily use retro rockets to spin around in mid-flight and blast the guy behind him, all while "vectoring" in the original direction.


Christopher Call and Michael Himick

May 18, 2005


Want to learn more?

Visit the Science Fiction Museum and Hall of Fame

http://www.sfhomeworld.org/

THE MOUSE THAT ATE THE PUBLIC DOMAIN:


Disney, The Copyright Term Extension Act, And eldred V. Ashcroft


By CHRIS SPRIGMAN



Unless you earn your living as an intellectual property lawyer, you probably don't know that the Supreme Court has granted certiorari in Eldred v. Ashcroft, a case that will test the limits of Congress's power to extend the term of copyrights. But while copyright may not seem inherently compelling to non-specialists, the issues at stake in Eldred are vitally important to anyone who watches movies, listens to music, or reads books.

If that includes you, read on.


Mickey Mouse Goes to Washington

Wednesday, May 18, 2005

Demise of a hard-fighting squad


Marines who survived ambush are killed, wounded in blast


By Ellen Knickmeyer

Updated: 4:38 a.m. ET May 12, 2005


HABAN, Iraq, May 11 -
The explosion enveloped the armored vehicle in flames, sending orange balls of fire bubbling above the trees along the Euphrates River near the Syrian border. more »





Email feedback to wooran@ec.rr.com

Wednesday, May 11, 2005

Information Technologies industry in North Carolina

NCTA is the primary voice of the Information Technologies industry in North Carolina. NCTA is dedicated to growing and strengthening the IT industry through increasing public awareness and influencing key public policy issues. We provide our members the opportunity to network with other industry leaders, share information on critical technologies, and promote their companies. Learn more!







Email feedback to wooran@ec.rr.com

Charlotte Oracle Users Group

CLTOUG BYLAWS


ARTICLE I


NAME


The name of this corporation shall be the Charlotte Oracle Users Group, a not-for-profit business association organized under the laws of the State of North Carolina of the United States of America (hereinafter "CLTOUG”)


ARTICLE II


PURPOSES

Section 1. Not for Profit. CLTOUG is organized under and shall operate as a North Carolina not-for-profit business association.


more »


Email feedback to wooran@ec.rr.com

Lebanese Political Journal

More on Aoun

The web is blazing with commentary about the recently returned General Michel Aoun.
Here's some more fuel for the fire.
I disagree fundamentally with the claim that Aoun is bad because he killed people.
I differentiate between good war and bad war.
Amal fought very bad war. Jumblatt fought bad sometimes and good sometimes (kind of like his political opinions). Aoun was like Jumblatt. In Lebanese terms, Hezbollah fought good far more than bad.

The reason Aoun and Hezbollah get along so well is because they are both nationalist parties fighting for nationalist causes, although using different allies.
Was President Hafez al Assad better than Saddam? Can Hama (where Assad massacred tens of thousands) be compared with Kurdistan (where Saddam gassed his people)? Can the Lebanese war be compared with Kuwait?

I think going through such lists leads to frivolity.
Aoun did kill, as do all field generals in combat. He was employed to do so. His assignment was to defend his country. When all leaders were gone, he took orders from himself.





more »






Email feedback to wooran@ec.rr.com

'They Came Here to Die'

Insurgents Hiding Under House in Western Iraq Prove Fierce in Hours-Long Fight With Marines

By Ellen Knickmeyer
Washington Post Foreign Service
Wednesday, May 11, 2005; Page A01


JARAMI, Iraq, May 10 -- Screaming "Allahu Akbar'' to the end, the foreign fighters lay on their backs in a narrow crawl space under a house and blasted their machine guns up through the concrete floor with bullets designed to penetrate tanks. They fired at U.S. Marines, driving back wave after wave as the Americans tried to retrieve a fallen comrade.


Through Sunday night and into Monday morning, the foreign fighters battled on, their screaming voices gradually fading to just one. In the end, it took five Marine assaults, grenades, a tank firing bunker-busting artillery rounds, 500-pound bombs unleashed by an F/A-18 attack plane and a point-blank attack by a rocket launcher to quell them.



more »











Email feedback to wooran@ec.rr.com

Thursday, May 05, 2005

Wireless developers plan to meld Bluetooth

Plan comes at crucial time for developing technology

Minutemen end border watch, plan to expand

Gov. Schwarzenegger praises group heading to CaliforniaBy Brock N. Meeks
Chief Washington correspondent
MSNBC
Updated: 11:32 a.m. ET May 4, 2005WASHINGTON - The month-long volunteer effort by a grassroots citizen group monitoring illegal immigration along a desolate 23-mile stretch of the Arizona-Mexico border ended much as it started: in a war of words.

more »

U.S. unprepared for nuclear terror, experts say

Evacuation plans available to public, first responders faultedBy John Mintz

Updated: 7:21 a.m. ET May 3, 2005When asked during the campaign debates to name the gravest danger facing the United States, President Bush and challenger Sen. John F. Kerry (D-Mass.) gave the same answer: a nuclear device in the hands of terrorists. more »

Monday, May 02, 2005

President Bush Honors Volunteers on Earth Day

On April 22nd, President Bush traveled to Tennessee to promote volunteer service and environmental stewardship on Earth Day (continue..)


"Yigaquu osaniyu adanvto adadoligi nigohilvi nasquv utloyasdi nihi"

Cherokee - "May the Great Spirit's blessings always be with you."

Tuesday, April 26, 2005

Justice Information Sharing Resource Directory Now Available

- The Bureau of Justice Assistance (BJA), Office of Justice Programs (OJP), U.S. Department of Justice (DOJ), in conjunction with the National Governors Association (NGA) Center for Best Practices' Homeland Security and Technology Division, has created a resource directory of tools that support the development, design, and implementation of strategies to improve justice information sharing. The principal objective of this initiative is to correlate justice information sharing tools with various identified steps in the justice information technology (IT) integration process.




HOMELAND SECURITY E-Procurement Purchase Orders for Terrorism Grants

Tuesday, April 12, 2005

The National Security Agency/Central Security Service

has served as America's codemakers and codebreakers for over 50 years. At no point in the Agency's history has it been more important to share information about its rich legacy and to educate the public on its missions to protect our nation.


The NSA/CSS Public and Media Affairs Office works closely with elements throughout the Agency, to include the Freedom Of Information Act (FOIA) Office and the Center for Cryptologic History, to provide accurate and timely unclassified information in response to public and media requests.


In addition to answering specific queries, NSA/CSS regularly releases information to the public in the form of hard copy and electronic press releases, congressional testimony, public speeches and briefings, special reports, Freedom of Information Act releases, and declassification intiatives.


NSA/CSS understands that its long-term success is absolutely dependent upon the nurturing of future generations of U.S. cryptologists. Thus, the Agency is totally committed to continual learning and development for its current workforce, and reaches out into the community with a plethora of educational programs for students of all ages. Programs aimed at developing and recruiting the best and the brightest computer/electrical engineers, computer scientists, mathematicians, linguists, cryptanalysts, and signals analysts in the world. » More

Monday, April 11, 2005

Wooran's Web World

Resources|
Downloads | Education | News | About Us | Copyrights | Law | Military | Proverbs | Theocracy | Fractals | Natives | Syndicate this site







Administration ends largest counterterrorism exercise everNo glaring deficiencies found in national prevention and response capability, but final results will take months to process.


UNITED STATES DEPARTMENT OF COMMERCE
Management of Internet Names and Addresses



Free Web Seminar!
Achieving Performance Management Success in the Public Sector:
Lessons Learned from the Field
In this one hour session featuring Carl DeMaio, president and founder of the Performance Institute, a government-focused non-partisan, private think tank, learn how organizations like yours have navigated the performance management battlefield to achieve success in today?s performance driven environment. Register Today!




World Trade Center 9/11 Investigation Could Result in New Generation of Building Safety and Fire Prevention CodesThe nation's leading developer of building safety and fire prevention codes will use findings from an investigation into the World Trade Center attack to better understand what led to the towers' collapse and develop construction guidelines... More




Loy Testifies Before the Senate Select Committee on Intelligence

"We have dramatically improved our technical ability to share information. Tools such as the Homeland Security Operations Center, the Homeland Security Information Network, and the Homeland security Advisory system are steps toward full capacity and capability."




Cybersecurity Standardization Moves Forward - Compliance with the 2002 Federal Information Security Management Act is an expensive and frustrating process for agencies. The Office of Management and Budget (OMB) has launched a task force on cybersecurity standardization to identify problems and solutions for cybersecurity risks, improve cybersecurity processes, and reduce costs by eliminating duplication. The task force will analyze various elements, including training activities, threat awareness, program management, and the implementation of security products.
...More News


For additional information please visit Wooran's Web World Development.


...More interesting tips on safety on the Internet



This page is far from complete - if completion is even possible.
Wooran's Web World Development Resources shall continue to evolve for many years to come.



Email feedback to wooran@ec.rr.com



Stephanie Beach Charron Copyleft


107 Circle Drive, Jacksonville, North Carolina 28540




Permission is granted to copy, distribute and/or modify this document under the terms of the

GNU Free Documentation License

Thursday, March 31, 2005

NC Department of Crime Control and Public Safety:

AMBER Alert Cancelled for Two Georgia Children
The AMBER Alert issued in North Carolina this morning for two missing Georgia children has been cancelled. The Clayton County Police Department in Georgia has advised North Carolina authorities that the children have been recovered safely.

A Guide to Small Claims Court

Choosing A Complaint Form
Before you file your lawsuit, you must fill out a complaint form. The clerk of court has different complaint forms for different kinds of problems. The three most commonly used forms are:

* Complaint for Money Owed*
* Complaint to Recover Possession of Personal Property
* Complaint in Summary Ejectment (used by landlords).

* [The Complaint for Money Owed is described in detail in
the next section.]

If you want to get back some property which is in dispute, you should use the Complaint to Recover Possession of Personal Property. On that form, you as the plaintiff must say if you are a "secured party" or not. A secured party is usually a finance company or other institution of some sort rather than an individual. If you have a written statement that you may repossess property if payments are not made according to an agreed upon schedule, then you are a secured party.

Landlords use the Complaint in Summary Ejectment form to collect back rent or evict tenants. This form is fairly complicated to understand both for landlords (the plaintiffs) and tenants (the defendants).

If none of the standard forms suits your exact situation, you may write your own complaint. Be sure to state what your claim is and include the type of information.

How to Fill Out "Complaint for Money Owed" FORM

* Step 1. If you are filing the suit, put your correct full name as plaintiff, with your address and telephone number, if any. You must include the name of your county.

* Step 2. Put the person's full name being sued as defendant, with the address and telephone number, if any, and the county where the person lives.

If you are suing a business, you must find out if it is a corporation or not. If the business is a corporation, you list the correct name of the corporation as the defendant. Your complaint and summons must go to the "registered agent" of the corporation, or to an officer, director, or managing agent of the corporation. If the business is not a corporation, you list the owners of the business as the defendants. For more explanation of businesses as defendants, see the appendix.
* Step 3. List the name and address of your attorney, if you have one. If you don’t have an attorney, leave this blank.
* Step 4. List the county where you are bringing this lawsuit.
* Step 5. After "Principal Amount Owed," put the exact amount of money which you claim the defendant owes you. If you are claiming interest on this money, put that amount on the next line. Add the two figures to get the "Total Amount Owed."
* Step 6. In the sample complaint form, note the choices of boxes the plaintiff may use. You can check a box and fill in the information on the line next to the box. Or you can check "other" and describe the purpose of your suit.
* Step 7. Sign and date the complaint. If you have a lawyer, he or she may sign it.

Wednesday, March 30, 2005

American copyright law got Charles Dickens down

On Tuesday, the Supreme Court heard arguments in MGM v. Grokster, a case that pits music and movie companies against Grokster and StreamCast. Both companies have made programs that let users share files online, including copyrighted music, movies, and TV shows.

At issue: whether the companies that make such programs should be held accountable when people use them to infringe someone else's copyright. Many in Hollywood say "yes." Many in Silicon Valley say "no." We say, "time to take a look at the history of copyright."


Today's Knowledge
Copyright Noticed



Ever since William Caxton sold England's first printed books in the 15th century, laws have been passed to regulate publishing rights. But the first publishing laws had as much to do with the crown's rights to censor ideas and collect revenues as with the rights of authors or publishers.

In fact, in the old days, authors hardly had any rights at all. Booksellers who published original works enjoyed what amounted to perpetual monopolies over them. The booksellers, not the authors, could even pass exclusive rights to profitable original works down to their heirs.

Queen Anne's Authorial Rights

That remained the case in England until the Statute of Queen Anne went into effect in 1710. This landmark act, the first full-fledged copyright act in the English-speaking world, said that authors should own the copyrights on their creations.

The statute also established that copyrights should expire after a certain period--in most cases, 14 years, with a one-time-only option to renew for a second 14-year term. That limitation helped create the public domain, the collection of creative works that have passed out of copyright and are now free for all to use and distribute.

The Colonies' Copyright Theft

The Statute of Queen Anne protected authors in Great Britain, but not in America. During the 18th century, American booksellers regularly sold British writers' works without permission (the wily Benjamin Franklin was one prominent offender). Still, America's founders clearly took copyright seriously. Article 1 of the U.S. Constitution says Congress can "promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries."

The United States passed its first major copyright law in 1790, but it protected only native authors. During the 19th century, American publishers continued to sell thousands of copies of British books without permission--and without ever having to pay their authors or legitimate publishers a penny.

Hugely popular British writers like Walter Scott, Benjamin Disraeli, and Charles Dickens tore their hair out in frustration as cheap pirated editions of their novels flooded the American market. Dickens protested against such piracy when he visited America in 1842, but many Americans didn't want to hear it. Piracy meant cheap British books.

The League of Copyrighted Nations

Eventually, the need for international copyright agreements became clear, and in 1886-87 a group of nations signed the Berne Convention for the Protection of Literary and Artistic Works. Each country agreed to extend its domestic copyright protections to any author from any of the other signing countries. One notable holdout was the United States, which didn't join until 1988 (though it worked out bilateral agreements with many nations years earlier).

The U.S. Congress passed the Copyright Act of 1976, which established the basic term of protection as the life of the author plus 50 years. In 1992, copyright renewal was made automatic, which prevented the copyright on many works protected before 1978 from expiring. In 1998, the term of protection was extended again--to the author's life plus 70 years, unless the work was made for hire or was anonymous or pseudonymous, in which case it was protected for 95 years after its publication.

Why so many extensions? For one thing, the heirs of early-20th-century authors--like, say, Walt Disney--aren't anxious to see their copyrights expire. Nor do they want to see their intellectual property shared at the click of a mouse.

Jeffery Vail
March 30, 2005

Want to learn more?
Browse a timeline of copyright history
http://arl.cni.org/info/frn/copy/timeline.html






KnowledgeNews.Net * 110 West Main Street * Urbana, Illinois 61801 * USA

Questions? Comments? Suggestions? Write to us at info@knowledgenews.net.
We read every note and answer as quickly as possible.

Toshiba's New Battery Recharges In One Minute

Toshiba announces a new lithium-ion battery -- the type used in virtually all laptops -- that recharges 60 times faster than current batteries.

TechWeb News



Toshiba on Tuesday announced a new lithium-ion battery -- the type used in virtually all laptops -- that recharges 60 times faster than current batteries and loses less than one percent of its capacity after 1,000 recharges.

The new battery can be refilled to 80 percent of capacity in one minute, Toshiba claimed, significantly less time than the one-to-four hours needed for lithium-ion batteries now in use.

According to Toshiba, the secret's in the negative electrode. "Nano-particles prevent organic liquid electrolytes from reducing during battery recharging," said Toshiba in a statement. "The nano-particles quickly absorb and store vast amount of lithium ions, without causing any deterioration in the electrode."

The Japanese technology giant said that it expected to put the new batteries into play in 2006, initially in automotive and industrial applications. One use, Toshiba said, would be within hybrid vehicles, which store power generated when, for instance, the car decelerates.

Toshiba said it would move the new batteries into consumer electronics applications, such as laptops and cameras, at a later date.

Wednesday, March 23, 2005

Experts Fear Drive-by Computer Viruses

Scripps Howard News Service

By LANCE GAY

Wednesday, March 23, 2005



Security News Home





Until a year ago, the concept that someone could infect a computer while just passing by seemed like a pipe dream.

Today, it's the digital age's nightmare.

Following the appearance of viruses that infect cell phones from a distance, security experts wonder if computers running home digital television sets, burglar alarms or even global positioning systems could be similarly infected and disabled.



Alfred Huger, senior director of engineering at the security software firm Symantec, said he expects in the future that someone just walking through a house with an infected cell phone could pass viruses to home computers or any other device with a wireless connection.



"I think we are looking at threats crossing platforms," said Huger.



Huger said the appearance of cell-phone viruses that can be transmitted through wireless connections were only theoretical until a year ago, when a version of the Cabir virus turned up on two cell phones displayed behind glass windows in a California cell-phone store.



The exact method of infection isn't known, but it's suspected that a passerby transferred the infected viruses through a wireless connection.



Huger said the first generations of the virus were innocuous, but the virus writers released their computer source codes on the Internet, providing vital information to other virus writers. Other versions are appearing that keep cell-phone connections active to run down the battery and run up fees. "The first version was Cabir-A, and we're already up to Cabir-T," he said.



Some experts predict that if cell phone virus writers follow the same pattern as the writers of worms and viruses did with personal computers, the innocuous viruses will soon be followed with malicious versions that do damage; not far behind would be viruses that operate like spyware on computers to steal information.

read more »

Page Hijack: The 302 Exploit, Redirects and Google

302 Exploit: How somebody else's page can appear instead of your page in the search engines.

By Claus Schmidt.


Abstract:
An explanation of the page hijack exploit using 302 server redirects. This exploit allows any webmaster to have his own "virtual pages" rank for terms that pages belonging to another webmaster used to rank for. Successfully employed, this technique will allow the offending webmaster ("the hijacker") to displace the pages of the "target" in the Search Engine Results Pages ("SERPS"), and hence (a) cause search engine traffic to the target website to vanish, and/or (b) further redirect traffic to any other page of choice. more »

Tuesday, March 22, 2005

Public Library of Science:

(PLoS) is a non-profit organization of scientists and physicians committed to making the world's scientific and medical literature a freely available public resource.


The internet and electronic publishing enable the creation of public libraries of science containing the full text and data of any published research article, available free of charge to anyone, anywhere in the world.


Immediate unrestricted access to scientific ideas, methods, results, and conclusions will speed the progress of science and medicine, and will more directly bring the benefits of research to the public. more »

Tuesday, March 15, 2005

HP Jornada 540 Pocket PC

» Solve a problem
Having a problem with your product? Find your solution here.


» Software & Driver downloads
Looking for software & driver updates? Download available software & drivers here.


» Setup and install
Connect, install or verify installation of your product.


» How to use
Enhance your product's performance with details on how to use and maintain.


» Product information
Get product specifications, warranty, supplies, parts and accessories.


» Manuals
Download your product's user documentation.


» FAQs
Frequently asked questions regarding your product

BlackBerry 7520

Trade-in your old handheld and get $100 back. Combine with the $100 mail-in rebate for a total savings of $200!


Features


Wireless Access to Email

• Always on, office email while you're mobile. Receive and answer email from the BlackBerry 7520 handheld wirelessly. Microsoft Outlook, IBM Lotus Notes and ISP/POP3 email capable.

Monday, March 14, 2005

Ga. Woman Held Hostage Describes Ordeal

By DANIEL YEE


ATLANTA (AP) - For hours, Ashley Smith gently talked to the armed suspect in Atlanta's courthouse slayings, turning from hostage to confidant as they discussed God, family, pancakes and the massive manhunt going on outside her apartment.


``I believe God brought him to my door,'' Smith said Sunday, only hours after her 911 call ended a manhunt for Brian Nichols, who is accused of shooting four people since Friday.


Over the course of the night, Nichols untied Smith, and some of the fear lessened as they talked. Nichols told Smith he felt like ``he was already dead,'' but Smith urged him to consider the fact that he was still alive a ``miracle.''

Saturday, March 12, 2005

Important Tax Information


W-2 Information

Effective September 17, 2003, all current myPay active/reserve military users and Defense Finance and Accounting Service (DFAS) civilian employees who request or already have a myPay Personal Identification Number (PIN) and access myPay are consenting to receive only an electronic W-2. They may, however, elect to receive a hardcopy W-2. All other Department of Defense (DoD) civilian employees who use MyPay may elect to receive an electronic W-2 in lieu of a hardcopy W-2 through the MyPay system. Click here for more information.

Tuesday, March 08, 2005

eBay: Learning Center: Selling:

First time seller on eBay? The courses below will get you up and running in no time. You'll learn how to create a sellers account, list an item, accept online payments and keep track of all your selling activity on your own My eBay page.

28.02.2005 / Eugene Spafford, Purdue University:

Some experts including Bill Gates believe that spam can be eradicated in a couple of years. What are your thoughts?





Spafford: I think it can be reduced with some effort, but I do not see how it can be eliminated without also eliminating e-mail, or radically changing the way we run the Internet. Spam is, in part, subjective – what is spam to one person may be a great idea to another. Thus, there will always be some people who actually want some of it!





The biggest problem with spam right now is that the spammers refuse to abide by some procedure that will let users opt out of getting it. The fraud used in sending spam – both deceptive titles and hijack of machines – compounds the problem. If we can cut down on the fraudulent use of servers, and impose some really strong authentication on the advertisements that remain, then perhaps we can control spam ... but it is doubtful we will be able to eliminate it completely in only a few years.




This problem is so large and complex, it was named as one of the CRA Grand Challenges. Those four challenges are:




* Eliminate epidemic-style attacks – worms, viruses, spam, phishing and denial of service attacks.




* Discover how to design and build large-scale, distributed computing systems that must be highly reliable even in the face of probable attack. Examples include medical health records, law enforcement databases, and financial system computing.


* Develop quantitative cyber risk measurement techniques to a point at least the equal of current quantitative financial risk measurement techniques. This will allow us to compare security solutions, measure risk appropriately, and invest the right amounts into protection of our cyber assets.




* Develop mechanisms to allow computing users to set their own levels of data protection and privacy in understandable, repeatable, and reliable manners. Thus, we want each person to be able to interact with systems in a way that allows them to choose how much information to entrust to the systems, and at what level to protect it.

Those interfaces should be understandable and simple to use.

Cybercrime-Hacking

Title: Cyber-vigilantes go after scammers

Source: Silicon.com

Date Written: 2005-02-11

Date Collected: 2005-02-14

The 419 Flash Mob, an Internet vigilante group, started attacking fake banking websites February 9, 2005. A statement by Artists Against 419, who supports the 419 Flash Mob, said their aim was to shut down eight such websites within 48 hours using denial-of- service (DoS) attacks in celebration of the Chinese New Year. Many of the attacked websites were hosted by the same service provider in China, and included Abbey Trust & Offshore Bank, First Global Trust, Allied Trust Bank UK, Crystal Bonds & Securities, Allied Trust Bank UK, KASH BANK CORPORATION, and Liberty Stronghold Securities and Finance.


Title: Businesses targeted by ID "hijack" scam

Source: Silicon.com

Date Written: 2005-02-14

Date Collected: 2005-02-14

Online fraud prevention firm Early Warning has discovered a scam targeting British companies through the Companies House database. In this scam, an attacker changes the address of the registered office for a limited company--all that is needed is the current address and the business's registered company number, both of which can be found in an internet search. Once the address is changed, attackers can open trade accounts and order goods in the company's name. Businesses only discover the identity theft when debt collectors and lawsuits appear to recover fraudulently ordered goods. Companies House is working with the Home Office and the Metropolitan Police to address the emerging problem. In the meantime, companies can protect themselves by filing documents electronically through the Proof system, subscribing to the Companies House monitoring service, and periodically confirming registered details.

HOMELAND SECURITY POLICY INSTITUTE GROUP

The moderator of Tactical@yahoogroups.com recently posted an email alert to several egroups. This alert was an issued by the U.S. Attorney General’s Office. This email expressed a new level of concern re an impending al-Qaeda (aQ) attack between now and Inauguration Day. This email has been circulating for the last two weeks. Other intel sources have been quick to point out this alert is not based on any new info/intel. A recent report by Bill Gertz in the Washington Times has much the same information.


While this threat assessment is very real, these alerts never really say what we should be alert for. What are the potential targets in California? Are there any relationships to the Inland Empire? Who is the enemy and the ideology that drives it? How is the enemy organized and what are its operational tactics? What are activities and behaviors that might tip the existence of an aQ cell? Further the traditional law enforcement paradigm is ill-equipped to counter this new threat. We are the domestic boots on the ground.

Al-Qaeda seen planning for 'spectacular' attack




Become a member and help us get the word out

Jerusalem Post May 6, 2004

Virtual jihad

How serious is cyber-terror's threat, and what is the free world doing about it?


In-Depth Coverage


By Alan D. Abbey


Islamic terrorists are winning the on-line war against Western interests because of their virtually unchecked ability to use the Internet to plan, promote, and propagate both physical and cyber attacks.


Efforts to monitor, predict, and counter such attacks are only in the earliest stages. Technical, legal, privacy, and even political challenges are slowing down what could be called cyber counterterrorism in Israel and the US. Private groups have done much of what little successful monitoring has been done so far, as government efforts, particularly in the US, have been hampered by civil liberties concerns.

9-11 News and Legal Resources, Information and Related Services

Terrorism and Homeland Security


Compiled and Edited By: Sabrina I. Pacifici, Editor, Publisher, Web Manager, LLRX.com


See LLRX Newstand for additional daily news updates

Security Tightening Ahead of Eid in Malaysia, Indonesia

By Kazi Mahmood, IOL Southeast Asia Correspondent

Kuala Lumpur, November 24 (IslamOnline) - Security in several countries in South East Asia (SEA) is tightening ahead of the Eid el Fitri festivals that start at the end of the holy month of Ramadhan in December. Indonesia, Malaysia and Brunei have already stepped up routine patrols with more police forces on the streets than usual.

In Jakarta, the police are currently carrying out unusual raids in night spots and streets where foreigners would gather in a bid to deter night clubs, bars and other alcohol vendors to carry out their business during the month of Ramadhan.

Emergency Response Resource Directory:

This directory provides a comprehensive list of vendors, products and services to the emergency response community and is published directly to the following web sites.

High Tech "NewsBits"

UK Net pedo jailed for eight years A UK man, inappropriately named Lawrence Horn, has been jailed for eight years after trying to seduce a 14-year-old boy in an Internet chatroom. The 14-year-old was in fact detective Mark Bucci from Philadelphia in the States who was working under the pseudonymn Justin. Mr Horn, 35 from near Ashford in Kent, held numerous conversations with "Justin" which became increasingly sexually graphic. http://www.theregister.co.uk/content/6/22447.html


Taliban opposition site a casualty of war A Web site operated by opponents of Afghanistan's Taliban regime will likely remain offline for at least another month after hackers took it out of commission in an apparent case of mistaken identity. Visitors sent about 10,000 hate messages soon after the Sept. 11 terrorism strikes, and hackers brought down the ``AfghanGovernment.org'' site within days. http://www.siliconvalley.com/docs/news/tech/011931.htm

Hacking Incident Closes Security News Site The day before Marquis Grove decided to shutter his popular computer security news site, the operator of SecurityNewsPortal.com was brimming with energy about his labor of love. "I have a large viewership and I feel I owe them a responsibility to be there and keep slamming out the freshest news that I can to keep them amused and informed," said Grove in an e-mail interview Monday. http://www.newsbytes.com/news/01/171478.html


Bin Laden worm wriggling in South Korea A computer virus named after Osama bin Laden, the Saudi-born fugitive accused of masterminding the attacks on the United States, has surfaced in South Korea, a local antivirus software maker said Wednesday. "We received a report from a personal computer user who got an e-mail containing the virus, "Jin Yoon-jung of antivirus company Ahnlab told Reuters. "His computer was not infected, as he reported it to us without opening the e-mail.
http://news.cnet.com/news/0-1003-200-7641111.htmlRead More

UGN Security: Tech News

Google takes 'beta' off desktop search Spammers adopt slippery tactics to bypass ISP defences US Not Quite Ready for High Tech Cell Phones Antivirus Application Could Spread Viruses .US Domain Owners to Lose Anonymity Court Orders Microsoft Retrial – Waives Fine UK Police Want Special Internet Porn Unit Earthlink Announces Flash-Based Webmail Israeli Army Issues Video Screens to Troops New Online Magazine From al-Qaeda's Iraqi Wing Sony PSP to Top iPod as Must-Have in 2005 Judge dismisses spam conviction Sony offers pizza feature for hungry gamers Opera beefs up browser to thwart phishers Jef Raskin, Macintosh Creator, Died Sunday

Tech Law Journal Daily E-Mail Alert

Sen. John Edwards (D-NC), another member of the Subcommittee, also participated in the hearing. He is the sponsor of his own cyber security bills: S 1900, the Cyberterrorism Preparedness Act of 2002, and S 1901, the Cybersecurity Research and Education Act of 2002. S 1900 would authorize the appropriation of $70 Million in FY 2003 for grants to be administered by the National Institute of Standards and Technology (NIST) "to support the development of appropriate cyber security best practices, support long term cyber security research and development, and perform functions relating to such activities." S 1901 would authorize appropriations for a cyber security graduate fellowship program, and other educational programs.

Congressional Record: January 9, 2003 (Senate)

By Mr. DASCHLE (for himself, Mr. Leahy, Mr. Biden, Mr. Kennedy,
Mr. Schumer, Mr. Durbin, Mrs. Clinton, Mrs. Murray, Mr. Dayton,
Mr. Corzine, and Mr. Reed):

S. 22. A bill to enhance domestic security, and for other purposes;
to the Committee on the Judiciary.
Mr. LEAHY. Mr. President, I am pleased today to join Senator Daschle
and other Democratic Senators in introducing the Justice Enhancement
and Domestic Security Act of 2003. This comprehensive crime bill builds
on prior Democratic crime initiatives, including the landmark Violent
Crime Control and Law Enforcement Act of 1994, that worked to bring the
crime rate down.
This year marked an unfortunate turn after a decade of remarkable
declines in the Nation's crime rate. The decade of progress we made
under the leadership of a Democratic President helped revitalize our
cities and restore a sense of security for millions of Americans.
According to the latest FBI report, however, the number of murders,
rapes, robberies, assaults, and property crimes is up across the United
States in all regions of the country except the Northeast, the first
year-to-year increase since 1991. This upswing has been fueled by the
faltering economy and high unemployment rates. The President's ill-
conceived tax cut in 2001, along with the new cuts he proposes now, are
likely to exacerbate these economic woes by plunging us deeper into
deficit spending.Read More

Homeland Security Information

Links to various homeland securty related web sites where the
latest news and information can be obtained. Many of the sites also have
further tips regarding how to prepare for disaster situations regarding
homeland security.

SatCom Systems - Government and Homeland Securty:

SatCom Systems develops and provides critical communication solutions for First Responders and Incident Command Operations in Homeland Defense - available today and ready for the future.


The borders the United States shares with Mexico and Canada are the longest undefended national boundaries in the world. Major portions of these boundaries pass through isolated terrain with, relatively, few ËmannedÓ border crossings. Homeland Defense requires a coordinated response across multi-agency and jurisdictional lines to properly maintain the safety of the citizens from unfriendly incursions across this vast area. Coordinated, interoperable voice and data communications are essential elements for effective protection, and certainly any response.


First Responder and Incident Command Operations in Homeland Defense demand the ability to transmit and receive voice and data anywhere within the ËoperationalÓ area set forth by an incident. This area is dynamically determined as the response to an incident occurs, without regard for geographic or jurisdictional boundaries. The fluid dynamics of rapidly unfolding events creates an interesting set of challenges for even the most experienced organizations. Effective voice and data communications vital to the incident should not be part of these challenges. more »

Monstrous Homeland Securty - Lawyer's Boon and Citizen's DOOM!

By Harsha Sankar


From: WETHEPEOPLE_UNITED@yahoogroups.com

Dear Citizen, December 2002



It is the utmost hope for the sake of next generations that Americans now realize their freedoms have irrevocably been harmed in 2002. Due to the passage of the monstrous Homeland Security Act, the average American can expect the following.


Every credit card purchase, every magazine subscription, every medical prescription, every visited Web site, every e-mail, every academic grade, every bank deposit,and even every booked trip Will Be Recorded. All these transactions and communications will go into a vast database of the Defense Department. This once far-fetched Orweillan scenario is now reality.


The Information Awareness Office will now have the data-mining power to "snoop" on all Americans.Two hundred million dollars have been appropriated to create computer dossiers on all citizens. This Act, along with the U.S.A. Patriotic Act, has officially marked the end of Constitution's 4th Amendment. Since all matters now filter through the judiciary, the official inauguration of the police state will be a boon to the bar associations cult.Read More

Homeland Securty abandons MS for Linux

The United States Department of Homeland Security ( www.dhs.gov )
changed its servers over to Oracle on Linux last week, after running
on Windows 2000 for several months. Experts say that it is unlikely the
change is a reaction to "Slammer," the MS SQL server worm that rocked
the Internet last week. "

Defense tech debated

BY Frank Tiboni

Published on March 04, 2005



Congress will scrutinize the Defense Department's $30.1 billion budget request for military information technology spending for fiscal 2006 by questioning redundancy in the services' warfighting IT systems.


DOD IT officials requested $7.4 billion for command, control, communications and computer systems next year — a $1 billion increase from what they received last year. Lawmakers think troops could better communicate and access intelligence in Iraq and Afghanistan if they consolidated them.

On Line for Independent Inventors (24FEB2005)

This is a transcript of the on-line chat held on Thursday, February 24, 2005.

This final version is an edited version of the actual transcript. Where you see “edited answer” below, the original on-line chat answer has been modified to ensure completeness and accuracy of the answers originally provided by USPTO staff.

As in our previous chats held so far, we received hundreds more questions then we had time to answer. We selected questions for posting which we believed would be of interest to others besides the author of the question. Once we selected the question, we developed the answer, and then posted the question and the answer for viewing by the public. During the actual chat, occasionally the answer was actually posted before the public saw the question. This edited transcript always has the question before the answer. In reviewing the transcript below, if you see the time of the answer before the time of the question, we originally posted them out of sequence. More Info