Friday, October 28, 2005
FEMA: Safe Rooms - Mitigation - Safe Room:
Lite-Form workers lift the lightweight pre-assembled wall section into place over the cement slab foundation. The cement-filled, foam-formed walls are reinforced with steel rebar and may be built into new housing or added inside or outside to existing structures at a relatively low cost. Its construction is simple enough that it can be built by do-it-yourselfers. For more information and images, see Tornado Safe Rooms Take Center Stage. read more »
Thursday, October 13, 2005
Food For Thought
To weep is to risk appearing sentimental….
To reach out for another is to risk involvement….
To expose feelings is to risk rejection….
To place your dreams before a crowd is to risk ridicule….
To love is to risk not being loved in return….
To go forward in the face of overwhelming odds is to risk failure….
But risks must be taken because the greatest hazard in life is to risk nothing.
The person who risks nothing does nothing, has nothing, is nothing.
He may avoid suffering and sorrows, but he cannot learn, feel, change, grow, or love.
Chained by his certitudes, he is a slave - he has forfeited his freedom.
Only a person who takes risks is FREE!
Tuesday, October 11, 2005
Iraq attacks kill scores
Up to 50 people have been killed and dozens wounded in a series of attacks in Iraq, including a car bomb that ripped apart a crowded market in a town near the Syrian border. In the deadliest attack in Iraq ... read more »
Two things Navy SEALS are always taught:
Know when to act without hesitation
A college professor, an avowed atheist and active in the ACLU, was
teaching his class. He shocked several of his students when he flatly
stated that once and for all he was going to prove there was no God.
Addressing the ceiling he shouted:
"GOD, if you are real, then I want you to knock me off this platform.
I'll give you exactly 15 minutes!!!!!"
The lecture room fell silent. You could hear a pin drop. Ten minutes
went by.
" I'm waiting God, if you're real knock me off this platform!!!!"
Again after 4 minutes, the professor taunted God saying,
"Here I am, God!!! I'm still waiting!!!"
His count down got down to the last couple of minutes when a SEAL, just
released from the Navy after serving in Afghanistan and Iraq and newly
registered in the class, walked up to the Professor.
The SEAL hit him full force in the face, and sent the Professor tumbling
from his lofty platform. The Professor was out cold!! The students were
stunned and shocked. They
began to babble in confusion. The SEAL nonchalantly took his seat in the
front row and sat silent. The class looked at him and fell
silent.....waiting. Eventually, the professor came to and was noticeably
shaken. He looked at the SEAL in the front row. When the professor
regained his senses and could speak he asked:
"What the hell is the matter with you?! Why did you do that!?"
"God was really busy protecting America's soldiers, who are protecting
your right to say stupid shit and act like an ass!!! So he sent me!!"
ONE NATION UNDER GOD, INDIVISIBLE
Jesus wants A Few Good Men! Living A Life You Always Wanted!:
fallout shelter
Wanted: A Few Good Men
but very few men that are both great and good.
- Charles Caleb Colton
Sunday, October 09, 2005
Google goes to Washington
It seems that policymaking and regulatory activity in Washington, D.C. affect Google and our users more every day. It’s important to be involved - to participate in the policy process and contribute to the debates that inform it. So we’ve opened up a shop there. The first member of our Washington team is Alan Davidson, a veteran thinker and advocate for issues we care about.
Our mission in Washington boils down to this: Defend the Internet as a free and open platform for information, communication and innovation. OK, that sounds a little high and mighty, so let me break it down into something a bit wonkier with a sampling of the U.S. policy issues we’re working on:
Net neutrality. As voice, video, and data rapidly converge, Congress is rewriting U.S. telecommunications laws and deregulating broadband connectivity, which is largely a good thing. But in a country where most citizens have only one or two viable broadband options, there are real dangers for the Internet: Should network operators be able to block their customers from reaching competing websites and services (such as Internet voice calls and video-on-demand)? Should they be able to speed up their own sites and services, while degrading those offered by competitors? Should an innovator with a new online service or application be forced to get permission from each broadband cable and DSL provider before rolling it out? Or, if that’s not blunt enough for you, what’s better: [a] Centralized control by network operators, or [b] free user choice on the decentralized, open, and astoundingly successful end-to-end Internet? (Hint: It’s not [a].)
Copyrights and fair use. Google believes in protecting copyrights while maintaining strong, viable fair use rights in this new digital age. We support efforts by the U.S. Copyright Office to facilitate the use of orphan works (works whose rights-holders can’t be found), while fully respecting the interests of creators. We applauded the Supreme Court’s carefully calibrated decision in the Grokster case, but worked to defeat legislation that would have created new forms of liability for neutral technologies and services like Google.
read more »
Technology Quotes and Proverbs:
Peter Drucker
read more »
150 computer one-liners
Computers can never replace human stupidity.
It works! Now if only I could remember what I did...
read more »
Thursday, September 22, 2005
Key Volunteer Network - Home Page:
The Key Volunteer Network is an integral part of a Marine Corps unit family readiness program and is the primary communication link between the commanding officer and the unit families for the enhancement of mission readiness.
The Key Volunteer Network supports the spouses of the unit Marines by providing communication from the command, serving as a source for information and referral services and by helping foster a sense of community within the unit. Learn more
Tuesday, September 06, 2005
How the Red Cross Began
Humanitarian relief, 19th-century style
The full extent of the Hurricane Katrina disaster is starting to become clear. It hasn't been a pretty picture, and people are asking hard questions about what might have been done differently by government and local citizens.
One thing is sure: private charities and relief workers are on the scene in force. The American Red Cross, one of the nation's largest private relief services, has mobilized its largest-ever response to a national disaster. As people open their wallets to support these volunteers, we're opening the books to look at the 19th-century Swiss humanitarian who helped start the Red Cross itself.
Saturday, September 03, 2005
Stock Market News and Investment Information | Reuters.com:
"Today I ordered the Department of Defense to deploy additional active-duty forces to the region. Over the next 24 to 72 hours, more than 7,000 additional troops from the 82nd Airborne, from the 1st Calvary, the 1st Marine Expeditionary Force and the Second Marine Expeditionary Force, will arrive in the affected areas," Bush said.
Katrina - Wikipedia, the free encyclopedia:# Hurricane Katrina (2005, Atlantic) - catastrophic storm that devastated much of the U.S. Gulf Coast
- Hurricane Katrina (2005, Atlantic) - catastrophic storm that devastated much of the U.S. Gulf Coast
The Case for Modeling and Simulation of Information Security:
“When I hear I forget. When I see I remember. When I do, I learn.” Confucius
Abstract
A challenge that stands before the security community is to better prepare management, system administrators, and users to respond appropriately to information security crises while simultaneously reducing the anxiety associated with them. One clear approach to achieving this goal is to use modeling and simulation for education, training, and testing. This paper will present the available range of modeling and simulation capabilities in Information Assurance. It will also establish some principles for extending these capabilities into the community. It will do this by establishing a case for utilizing more simulation in our discipline, reviewing past modeling & simulation efforts within information security, reviewing the traditional types of modeling and simulation methodologies, addressing capability and experiences in computer modeling within other areas such as telecomm and economics, and providing a framework for future computer based modeling and simulation efforts in Information security.
Sunday, August 28, 2005
Friday, August 26, 2005
CRASH TEST DUMMIES LYRICS
"Superman's Song"
Tarzan wasn't a ladies' man
He'd just come along and scoop 'em up under his arm
Like that, quick as a cat in the jungle
But Clark Kent, now there was a real gent
He would not be caught sittin' around in no
Junglescape, dumb as an ape doing nothing
[Chorus:]
Superman never made any money
For saving the world from Solomon Grundy
And sometimes I despair the world will never see
Another man like him
Hey Bob, Supe had a straight job
Even though he could have smashed through any bank
In the United States, he had the strength, but he would not
Folks said his family were all dead
Their planet crumbled but Superman, he forced himself
To carry on, forget Krypton, and keep going
Tarzan was king of the jungle and Lord over all the apes
But he could hardly string together four words: "I Tarzan, You Jane."
Sometimes when Supe was stopping crimes
I'll bet that he was tempted to just quit and turn his back
On man, join Tarzan in the forest
But he stayed in the city, and kept on changing clothes
In dirty old phonebooths till his work was through
And nothing to do but go on home
[Thanks to kevin_c4@hotmail.com, sean_ee@hotmail.com for correcting these lyrics]
[ www.azlyrics.com ]
Tuesday, August 23, 2005
Molly.com That's why it's Called Beta:
I WOKE UP this morning to find countless emails and IMs pouring into my accounts asking me about the IE 7 beta.
Some developers are expressing relief at seeing some of the bug fixes and improvements, but of course as I’ve been expressing all along, this is a process with which we have to be patient. Expecting full bug fixes and implementation in any beta software is ridiculous, as is expecting that WaSP / Microsoft Task Force can perform retroactive miracles. more »
E-Mail Wiretapping' Prosecutions Could Increase in the Future
A federal appeals court ruling in Boston last week on e-mail wiretapping is reverberating throughout the Internet community-and legal world-with a consensus emerging that there may be prosecutions in the future for what today is considered normal business practice by ISPs.
The First Circuit Court of Appeals, voting 5-2, ruled that an e-mail service provider that supposedly read e-mail, intended for customers only, could indeed be tried on federal criminal charges.
This is True: The Lord Giveth, the Feds Taketh Away:
Saturday, August 20, 2005
Plug-and-play bots worming and warring among Windows systems
Joe Stewart, senior threat researcher, Lurhq The worms--which appear to come from three families of code dubbed Zotob, Botzori and IRCBot--started spreading on Sundaywithout much fanfare. However, on Tuesday, computers at CNN and the New York Times became infected by one or more variants of the worm, and the public profile of the programs increased a notch. more »
Friday, July 29, 2005
Lost in Translation - Government Technology:
This January, two handheld voice translation devices -- the Phraselator developed by VoxTec, and the Voice Response Translator (VRT) developed by Integrated Wave Technologies -- were tested by the Chula Vista, Calif., Police Department in conjunction with the Space and Naval Warfare Systems Command (SPAWAR) in San Diego. read more »
IE7 nukes Google, Yahoo! search
Users with search toolbars from Yahoo! and arch-rival Google have discovered that these vanish. Other third-party toolbars designed to block pop-ups or aid with form filling appear to be working normally, according to reports from Reg readers. read more »
Thursday, July 28, 2005
Yemeni cleric jailed for 75 years
Sheikh Mohammed Ali Hassan al-Moayad was convicted on charges of conspiring to support the al-Qaeda network and Palestinian militant group Hamas.
At a meeting with two FBI informants in Germany, he was recorded promising to funnel more than $2m (£1.1m) to Hamas.
He was arrested by German police in January 2003 and extradited to the US.
For each of five counts, he received 15-year sentences, each to be served consecutively.
He was also fined $1.25m in a federal court in Brooklyn.resd more »
Sunday, July 24, 2005
Thursday, July 14, 2005
EXIT MUNDI: A COLLECTION OF END-OF-WORLD SCENARIOS:
Isn't life a bitch? The world is going to end. You don't even have to be a religious fundamentalist to see that's true.
Some people collect postal stamps; Exit Mundi collects scenarios of what could go wrong with the world. Sure, our planet could get hit by an asteroid. But hey, that's nothing. Did you know we could all be munched away by hungry molecules? Or that our physicists could unintentionally wipe us all out while tinkering with particles? `Oops, sorry...'
Exit Mundi isn't in it for doom preaching, but strictly for fun. It's a fascinating thought: if that &*%#-comet didn't wipe out the dinosaurs 65 million years ago, we wouldn't be here pondering about apocalypses and armageddons in the first place. The dinosaurs roamed our planet millions of years longer than we did. If it wasn't for the comet, they still would.
Sounds good, doesn't it?
Fallen Heroes of Operation Iraqi Freedom
Remembering the soldiers who died in the service of their country.
The list was last updated at 8:30 PM EDT Wednesday, July 13, 2005
Source: DefenseLINK
Alphabetical: Sort the list in alphabetical order
Chronological: Sort the list in chronological order
Branch: Sort the list by military branch
Base: Sort the list by military base
State: Sort the list by the soldier's home state
Age: Sort the list by the soldier's age
Sort list order: Alphabetical | Chronological | Branch | Base | State | Age
[ A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z ]
American soldiers listed: 1754
Tuesday, July 12, 2005
Eben Rawls, Attorney at Law
Sunday, June 26, 2005
Homes may be 'taken' for private projects
WASHINGTON - The Supreme Court on Thursday ruled that local governments may seize people’s homes and businesses — even against their will — for private economic development. more »
Tuesday, June 07, 2005
This page is dedicated to Voltaire!
Voltaire, Epître sur Les Trois Imposteurs:
Si Dieu n'existait pas, il faudrait l'inventer
If God did not exist, it would be necessary to invent him
This statement by Voltaire was so famous that Flaubert included it in his Dictionnaire des idées reçues, and it is still frequently quoted today. But where does it first appear? And what precisely did Voltaire mean when he wrote it? Does it imply, as most of Voltaire's parrots seems to suppose, that God is a fictitious being, created for the comfort of the human race?
Saturday, June 04, 2005
Red Hat Frees Fedora to the Fedora Foundation
Saturday, 04 June 2005
Red Hat announced that it is releasing the copyrights and development work of the free Fedora version of Linux over to the Fedora Foundation.
Fedora FoundationRed Hat, one of the most popular Linux distributions, forked into two projects back in 2002. Red Hat Enterprise Linux (RHEL) was targeted at commercial customers, while Fedora was the free, community distribution. Red Hat, Inc. has failed at trying to attract the outside involvement that it hoped to get with the Fedora project.
"The goal of The Fedora Project is to work with the Linux community to build a complete, general purpose operating system exclusively from open source software. Development will be done in a public forum ... By using this more open process, we hope to provide an operating system more in line with the ideals of free software and more appealing to the open source community," the Fedora Project Web site says.
Many developers have critisized the direction Fedora has taken with Red Hat, Inc. at the wheel. Fedora has become a testing ground for new technologies that eventually find their way to RHEL.
Some members of the community think that transfering control of the project to the new Fedora Foundation will keep the project community-driven.
more »
Intel Security:
In the event of an emergency, you may need to evacuate. A natural disaster as well as a terrorist attack can strike quickly and without warning. Depending on the nature of that evacuation you may have to walk a half a mile or more and/or be outside for as long as three hours.
We recommend that you have an emergency "GO" kit that includes:
Comfortable shoes, socks and warm, dry clothes.
Medication,
A bottle of water, and
Some energy bars.
If told to evacuate, follow the instructions of the Pentagon Police and their Evacuation Assistants.
more »
Thursday, June 02, 2005
Malcolm Wells.com - underground buildings, earth sheltered architecture, energy efficient houses, passive solar...:
* underground buildings,
* earth-sheltered architecture,
* eco-friendly design, and
* energy-efficient houses
... particularly the ideas of pioneer architect Malcolm Wells.
more »
Underground buildings have as many personalities
Entrances to the Underworld Before entering an aboveground building, people can assess its size and character simply by looking at it. A building hidden under the ground offers no such clues, however. Entrance pavilions or kiosks can hint at what lies below, establishing at least a style, if not a sense of scope.
Digging for the Green: Underground Architecture and Sustainable Design Environmental consciousness has been growing for a decade or more among architects. The financial benefits of green design are becoming more apparent, making builders more willing to embrace the movement. Green roofs, for example, are sprouting all over the United States. Why not put them at ground level? more »
Tuesday, May 31, 2005
Residents Moving After Home Invasion
UPDATED: 5:52 pm EDT May 31, 2005
CHARLOTTE, N.C. -- A family at the Waterford Creek Apartments are packing up and leaving after a frightening home invasion at a 7:30 a.m. Tuesday.
WSOC-TV
The family said they heard a knock at the door, but when one of the victims looked through the peephole, he couldn't see anyone. The culprits were hiding out of sight.
The man opened the door and that's when the attackers put a gun in his face.
The family didn't want to be identified because they are afraid the robbers will come back and kill them.
They did say once the men were inside, the intruders pointed a gun at their three children -- ages from 1 to 3 years old.
The gunman threatened to kill the kids if they didn't get money. read more »
Monday, May 30, 2005
Report: Injured Zarqawi has fled Iraq
Updated: 6:09 p.m. ET May 28, 2005
LONDON - Al-Qaida’s leader in Iraq Abu Musab al-Zarqawi had fled the country after being seriously injured in a U.S. missile attack, a British newspaper reported on Sunday, quoting a senior commander of the Iraqi insurgency.
Al-Zarqawi has shrapnel lodged in his chest and may have been moved to Iran, The Sunday Times newspaper reported, adding his supporters may try to move him on to another country for an operation.
The paper quoted an unnamed insurgency commander as saying the Jordanian-born militant was wounded three weeks ago when a U.S. missile hit his convoy near the northwestern Iraqi city of al Qaim.
“Shrapnel went in between the right shoulder and his chest, ripped it open and is still stuck there,” the commander said, adding a second piece of shrapnel penetrated Zarqawi’s chest but exited from his back.
“There was concern about spinal injuries,” the commander said. “But his ability to move eliminated that fear.”
The Sunday Times said Zarqawi, accused of masterminding many of the worst insurgent attacks in Iraq, was carried from his vehicle after the missile strike and given basic first aid in a hideout.
When he became delirious with fever four days later he was taken to hospital in the city of Ramadi, 68 miles west of Baghdad, it said. The paper did not say when the commander was speaking but said the source had proved reliable in the past.
Netscape 8.0 should be uninstalled due to XML problems
According to Microsoft, the new browser interferes with Internet Explorer
After Dave Massy, Microsoft's senior program manager for Internet Explorer, said in a blog that Netscape 8.0 may interfere with Internet Explorer, Microsoft confirmed today the problem.
Also, Microsoft has advised its customers using Netscape 8 and Internet Explorer in the same machine
to uninstall Netscape 8, because Netscape causes Internet Explorer to crash.In fact, according do Dave Massy, Netscape’s updated technology interferes with Internet Explorer’s ability to display some Web pages. Computer users who install Netscape 8, may see some Web pages appear blank in Internet Explorer.
“We’ve just confirmed an issue that has started to be reported on newsgroups and forums that after installing Netscape 8.0 the XML rendering capabilities of Internet Explorer no longer work. That means that if you navigate in IE to an XML file such as an RSS feed or an XML file with an XSLT transformation applied then rather than seeing the data you are presented with a blank page,” Massy said on the blog.
Thursday, May 26, 2005
Nextel is a major player in the market and enjoys tremendous popularity.
“We understand the construction and distribution business,” says Henry Popplewell, Nextel’s vice president of distribution and transportation. “They are two of the backbone industries in our organization. We have worked together as partners and evolved together developing solutions for more than 10 years now.”
According to Kent Lee, Charlotte, N.C. complex manager for wholesaler Parnell-Martin, “Nextel has had good growth and profits along with good people. They give us the basic blocking and tackling tools we need.”
Wednesday, May 25, 2005
Computers Seized in Data-Theft Probe
By Brian Krebs
washingtonpost.com Staff Writer
Thursday, May 19, 2005; 6:16 PM
The federal investigation into the massive theft of sensitive personal records from database giant LexisNexis Inc. intensified this week with the execution of search warrants and seizure of evidence from several individuals across the country, according to federal law enforcement officials.
Three people targeted in the investigation confirmed that federal investigators had served warrants at their homes. The group included a minor who has been in contact with a washingtonpost.com reporter for three months and who said he was directly involved in the LexisNexis breach.
more »
Tuesday, May 24, 2005
MSN Virtual Earth To Take On Google Earth
Micrsoft sends news today that founder Bill Gates has announced a MSN Virtual Earth service is to debut in the summer. The service is promised to provide:
Satellite images with 45-degree-angle views of buildings and neighborhoods
Satellite images with street map overlays
Ability to add local data layers, such as showing local businesses or restaurants
The service will allow users to choose from a number of different data types plus allow people to contribute their own information. The announcement came today at the D3 conference happening this week.
Last week, Google announced that its Keyhole software allowing satellite views of the Earth will be renamed Google Earth. Better images will also be available to those getting satellite views via Google Maps. In addition, Google Maps has also been getting enhanced by others adding on data from other sources. More on this in is covered in our Google Factory Tour Recap post.
So, the planned Microsoft service will help MSN compete against some Google gains in this area, not to mention moves others like Yahoo have been making with maps. Some past reading you may find interesting on these topics:
Google Maps Not In Google Search; Comparing Services & How Do They Do That?
Satellite/Aerial Images Plus Local Info
This post discusses TerraFly. This service has been available for more than five years and receives funding from IBM. Terrafly offers several of the services that MSN plans to provide including street overlays and local business info.
Super Cool: Interact With Satellite and Aerial Images With NASA's World Wind Program
Global in scope. World Wind Central (a wiki) offers links to interesting images that users have found.
Just Mrap It!
Monday, May 23, 2005
LLNL’s ‘Science Week’ festivities celebrate World Year of Physics
Sunday, May 22, 2005
For Japanese Math Wizards, It's a Mind Game
By Ginny Parker, Dec 15, 2000
For Japanese Math Wizards, It's a Mind Game; Contestants Test Skill on Invisible
Abacus
The contestants sit hunched over bare tables, some in sweat shirts, some in
neckties. A small audience watches quietly, while judges pace the floor.
Suddenly, a teenager's had shoots up and shout breaks the silence. "Done!" he
calls out, and passes his answer sheet to a moderator.
Within seconds, Hiroaki Tsuchiya has multiplied in his head a list of numbers
that would make an accountant's head spin. How does he do it? On an imaginary
abacus, just as merchants, students and others have done throughout Asia for
centuries.
Today, despite computers and calculators, the technique survives as a strenuous
workout for the brain. Teachers say almost anyone can master it, although it
takes hours of practice, mental dexterity and extraordinary powers of
concentration.
"If you space out, you lose," said Tsuchiya, who at age 13 recently became the
youngest winner of a Kyoto tournament where Japan's best mental mathematicians
display their amazing feats.
Tsuchiya, for example, takes only a few moments to figure out the quotient of
992.587318 divided by 5,647.723.
more »
Stanford Accelerator Uncovers Archimedes' Text
Posted by timothy on Sunday May 22, @12:49AM
from the 2-quarts-olive-oil-1-bunch-grapes-goat-milk dept.
AI Playground points to a Newsday.com report which reads in part "A particle accelerator is being used to reveal the long-lost writings of the Greek mathematician Archimedes, work hidden for centuries after a Christian monk wrote over it in the Middle Ages. Highly focused X-rays produced at the Stanford Linear Accelerator Center were used last week to begin deciphering the parts of the 174-page text that have not yet been revealed." more »
Friday, May 20, 2005
KnowledgeNews :: Your Home for Learning on the Web:
"Luke, I told you to do your science homework!"
He's baaaack! Unless you've been living in a galaxy far, far away, you've probably heard that the final installment of Star Wars opened just after midnight on Thursday--28 years after Darth Vader and Co. first flashed across the silver screen. All over America, die-hard fans waited in huge lines to see Episode III: Revenge of the Sith at early morning showings.
We love a science fiction thrill as much as anyone, but we can't help noticing that, in Hollywood, the fiction often gets the better of the science. So, to restore balance to the media force, we're sending some simple science correctives. (Just don't blurt them out during the show!
Today's Knowledge
The Top 5 Science Fiction Foul-Ups
Every science fiction movie has them: stupendous scenes of movie magic that sacrifice science on the altar of special effects. Here are our top 5 science fiction foul-ups--common movie scenes where science takes a holiday so we can get our fix of big-screen thrills.
1. No Ear Plugs Necessary
The Scene: The big impressive spaceship flies across the screen, emitting an equally impressive rumble of powerful engine noise. Or maybe just that really cool TIE fighter howl.
The Problem: These ships are moving in space, which is a vacuum, and sound can't travel in a vacuum. It takes matter to propagate the energy waves that we perceive as sound. So the sound of any ship in space is the sound of silence. (Call it the Garfunkel Effect.)
2. This One's a Dud
The Scene: A deadly firefight in space rages until someone goes down in flames, complete with incredible explosion and massive ball of fire.
The Problem: Most explosions are based on combustion, a chemical reaction that requires oxygen to take place. Of course, there's no oxygen in space. You can't even light a match out there, let alone set off stunning fireworks displays.
3. Think Jellyfish
The Scene: Our heroes enter a seedy space bar, full of strange alien life forms. Yet chances are they've got tables and chairs at which to nurse a beer, because the aliens look, and sit, pretty much like us.
The Problem: Our own little corner of the cosmos sports life in all shapes and sizes. Of the millions of species on Earth, only a small fraction look much like us. The odds that the bar crowd on completely different worlds would evolve to look like we do are pretty slim.
4. Set Phasers on "Slow"
The Scene: Science fiction's chosen weapon is the laser. Phaser, blaster, whatever you want to call it--it's a blast of energy fired from a gun. Whether it's dueling ships or dueling pistols, the bad guys get their due in a blaze of beams flashing across the screen.
The Problem: The energy in these weapons doesn't behave like real energy. Energy travels at the speed of light--far too fast for your eyes to follow it in beautiful blue and red beams.
5. "I'm Going Retro!"
The Scene: Squadrons of starfighters duel in a dogfight that puts Top Gun to shame. Inevitably, somebody gets a bad guy on his tail, desperately declares he "can't shake 'em," and, well, see #2.
The Problem: Spacecraft don't fly like planes. Because space is a vacuum, there's no need to maintain "lift," and no "drag" to slow you down once you get going. A starfighter in a dogfight could easily use retro rockets to spin around in mid-flight and blast the guy behind him, all while "vectoring" in the original direction.
Christopher Call and Michael Himick
May 18, 2005
Want to learn more?
Visit the Science Fiction Museum and Hall of Fame
http://www.sfhomeworld.org/
THE MOUSE THAT ATE THE PUBLIC DOMAIN:
Disney, The Copyright Term Extension Act, And eldred V. Ashcroft
By CHRIS SPRIGMAN
Unless you earn your living as an intellectual property lawyer, you probably don't know that the Supreme Court has granted certiorari in Eldred v. Ashcroft, a case that will test the limits of Congress's power to extend the term of copyrights. But while copyright may not seem inherently compelling to non-specialists, the issues at stake in Eldred are vitally important to anyone who watches movies, listens to music, or reads books.
If that includes you, read on.
Mickey Mouse Goes to Washington
Wednesday, May 18, 2005
Demise of a hard-fighting squad
Marines who survived ambush are killed, wounded in blast
By Ellen Knickmeyer
Updated: 4:38 a.m. ET May 12, 2005
HABAN, Iraq, May 11 -
The explosion enveloped the armored vehicle in flames, sending orange balls of fire bubbling above the trees along the Euphrates River near the Syrian border. more »
Email feedback to wooran@ec.rr.com
Wednesday, May 11, 2005
Information Technologies industry in North Carolina
Email feedback to wooran@ec.rr.com
Charlotte Oracle Users Group
ARTICLE I
NAME
The name of this corporation shall be the Charlotte Oracle Users Group, a not-for-profit business association organized under the laws of the State of North Carolina of the United States of America (hereinafter "CLTOUG”)
ARTICLE II
PURPOSES
Section 1. Not for Profit. CLTOUG is organized under and shall operate as a North Carolina not-for-profit business association.
more »
Email feedback to wooran@ec.rr.com
Lebanese Political Journal
The web is blazing with commentary about the recently returned General Michel Aoun.
Here's some more fuel for the fire.
I disagree fundamentally with the claim that Aoun is bad because he killed people.
I differentiate between good war and bad war.
Amal fought very bad war. Jumblatt fought bad sometimes and good sometimes (kind of like his political opinions). Aoun was like Jumblatt. In Lebanese terms, Hezbollah fought good far more than bad.
The reason Aoun and Hezbollah get along so well is because they are both nationalist parties fighting for nationalist causes, although using different allies.
Was President Hafez al Assad better than Saddam? Can Hama (where Assad massacred tens of thousands) be compared with Kurdistan (where Saddam gassed his people)? Can the Lebanese war be compared with Kuwait?
I think going through such lists leads to frivolity.
Aoun did kill, as do all field generals in combat. He was employed to do so. His assignment was to defend his country. When all leaders were gone, he took orders from himself.
more »
Email feedback to wooran@ec.rr.com
'They Came Here to Die'
By Ellen Knickmeyer
Washington Post Foreign Service
Wednesday, May 11, 2005; Page A01
JARAMI, Iraq, May 10 -- Screaming "Allahu Akbar'' to the end, the foreign fighters lay on their backs in a narrow crawl space under a house and blasted their machine guns up through the concrete floor with bullets designed to penetrate tanks. They fired at U.S. Marines, driving back wave after wave as the Americans tried to retrieve a fallen comrade.
Through Sunday night and into Monday morning, the foreign fighters battled on, their screaming voices gradually fading to just one. In the end, it took five Marine assaults, grenades, a tank firing bunker-busting artillery rounds, 500-pound bombs unleashed by an F/A-18 attack plane and a point-blank attack by a rocket launcher to quell them.
more »
Email feedback to wooran@ec.rr.com
Thursday, May 05, 2005
Minutemen end border watch, plan to expand
Chief Washington correspondent
MSNBC
Updated: 11:32 a.m. ET May 4, 2005WASHINGTON - The month-long volunteer effort by a grassroots citizen group monitoring illegal immigration along a desolate 23-mile stretch of the Arizona-Mexico border ended much as it started: in a war of words.
more »
U.S. unprepared for nuclear terror, experts say
Updated: 7:21 a.m. ET May 3, 2005When asked during the campaign debates to name the gravest danger facing the United States, President Bush and challenger Sen. John F. Kerry (D-Mass.) gave the same answer: a nuclear device in the hands of terrorists. more »
Monday, May 02, 2005
President Bush Honors Volunteers on Earth Day
"Yigaquu osaniyu adanvto adadoligi nigohilvi nasquv utloyasdi nihi"
Cherokee - "May the Great Spirit's blessings always be with you."
Tuesday, April 26, 2005
Justice Information Sharing Resource Directory Now Available
HOMELAND SECURITY E-Procurement Purchase Orders for Terrorism Grants
Tuesday, April 12, 2005
The National Security Agency/Central Security Service
The NSA/CSS Public and Media Affairs Office works closely with elements throughout the Agency, to include the Freedom Of Information Act (FOIA) Office and the Center for Cryptologic History, to provide accurate and timely unclassified information in response to public and media requests.
In addition to answering specific queries, NSA/CSS regularly releases information to the public in the form of hard copy and electronic press releases, congressional testimony, public speeches and briefings, special reports, Freedom of Information Act releases, and declassification intiatives.
NSA/CSS understands that its long-term success is absolutely dependent upon the nurturing of future generations of U.S. cryptologists. Thus, the Agency is totally committed to continual learning and development for its current workforce, and reaches out into the community with a plethora of educational programs for students of all ages. Programs aimed at developing and recruiting the best and the brightest computer/electrical engineers, computer scientists, mathematicians, linguists, cryptanalysts, and signals analysts in the world. » More
Monday, April 11, 2005
Wooran's Web World
Downloads | Education | News | About Us | Copyrights | Law | Military | Proverbs | Theocracy | Fractals | Natives | Syndicate this site
Administration ends largest counterterrorism exercise everNo glaring deficiencies found in national prevention and response capability, but final results will take months to process.
UNITED STATES DEPARTMENT OF COMMERCE
Management of Internet Names and Addresses
Free Web Seminar!Achieving Performance Management Success in the Public Sector:
Lessons Learned from the FieldIn this one hour session featuring Carl DeMaio, president and founder of the Performance Institute, a government-focused non-partisan, private think tank, learn how organizations like yours have navigated the performance management battlefield to achieve success in today?s performance driven environment. Register Today!
World Trade Center 9/11 Investigation Could Result in New Generation of Building Safety and Fire Prevention CodesThe nation's leading developer of building safety and fire prevention codes will use findings from an investigation into the World Trade Center attack to better understand what led to the towers' collapse and develop construction guidelines... More
Loy Testifies Before the Senate Select Committee on Intelligence
"We have dramatically improved our technical ability to share information. Tools such as the Homeland Security Operations Center, the Homeland Security Information Network, and the Homeland security Advisory system are steps toward full capacity and capability."
Cybersecurity Standardization Moves Forward - Compliance with the 2002 Federal Information Security Management Act is an expensive and frustrating process for agencies. The Office of Management and Budget (OMB) has launched a task force on cybersecurity standardization to identify problems and solutions for cybersecurity risks, improve cybersecurity processes, and reduce costs by eliminating duplication. The task force will analyze various elements, including training activities, threat awareness, program management, and the implementation of security products.
...More News
For additional information please visit Wooran's Web World Development.
...More interesting tips on safety on the Internet
Wooran's Web World Development Resources shall continue to evolve for many years to come.
Email feedback to wooran@ec.rr.com
Stephanie Beach Charron Copyleft
107 Circle Drive, Jacksonville, North Carolina 28540
Permission is granted to copy, distribute and/or modify this document under the terms of the
GNU Free Documentation License
Thursday, March 31, 2005
NC Department of Crime Control and Public Safety:
The AMBER Alert issued in North Carolina this morning for two missing Georgia children has been cancelled. The Clayton County Police Department in Georgia has advised North Carolina authorities that the children have been recovered safely.
A Guide to Small Claims Court
Before you file your lawsuit, you must fill out a complaint form. The clerk of court has different complaint forms for different kinds of problems. The three most commonly used forms are:
* Complaint for Money Owed*
* Complaint to Recover Possession of Personal Property
* Complaint in Summary Ejectment (used by landlords).
* [The Complaint for Money Owed is described in detail in
the next section.]
If you want to get back some property which is in dispute, you should use the Complaint to Recover Possession of Personal Property. On that form, you as the plaintiff must say if you are a "secured party" or not. A secured party is usually a finance company or other institution of some sort rather than an individual. If you have a written statement that you may repossess property if payments are not made according to an agreed upon schedule, then you are a secured party.
Landlords use the Complaint in Summary Ejectment form to collect back rent or evict tenants. This form is fairly complicated to understand both for landlords (the plaintiffs) and tenants (the defendants).
If none of the standard forms suits your exact situation, you may write your own complaint. Be sure to state what your claim is and include the type of information.
How to Fill Out "Complaint for Money Owed" FORM
* Step 1. If you are filing the suit, put your correct full name as plaintiff, with your address and telephone number, if any. You must include the name of your county.
* Step 2. Put the person's full name being sued as defendant, with the address and telephone number, if any, and the county where the person lives.
If you are suing a business, you must find out if it is a corporation or not. If the business is a corporation, you list the correct name of the corporation as the defendant. Your complaint and summons must go to the "registered agent" of the corporation, or to an officer, director, or managing agent of the corporation. If the business is not a corporation, you list the owners of the business as the defendants. For more explanation of businesses as defendants, see the appendix.
* Step 3. List the name and address of your attorney, if you have one. If you don’t have an attorney, leave this blank.
* Step 4. List the county where you are bringing this lawsuit.
* Step 5. After "Principal Amount Owed," put the exact amount of money which you claim the defendant owes you. If you are claiming interest on this money, put that amount on the next line. Add the two figures to get the "Total Amount Owed."
* Step 6. In the sample complaint form, note the choices of boxes the plaintiff may use. You can check a box and fill in the information on the line next to the box. Or you can check "other" and describe the purpose of your suit.
* Step 7. Sign and date the complaint. If you have a lawyer, he or she may sign it.
Wednesday, March 30, 2005
American copyright law got Charles Dickens down
At issue: whether the companies that make such programs should be held accountable when people use them to infringe someone else's copyright. Many in Hollywood say "yes." Many in Silicon Valley say "no." We say, "time to take a look at the history of copyright."
Today's Knowledge
Copyright Noticed
Ever since William Caxton sold England's first printed books in the 15th century, laws have been passed to regulate publishing rights. But the first publishing laws had as much to do with the crown's rights to censor ideas and collect revenues as with the rights of authors or publishers.
In fact, in the old days, authors hardly had any rights at all. Booksellers who published original works enjoyed what amounted to perpetual monopolies over them. The booksellers, not the authors, could even pass exclusive rights to profitable original works down to their heirs.
Queen Anne's Authorial Rights
That remained the case in England until the Statute of Queen Anne went into effect in 1710. This landmark act, the first full-fledged copyright act in the English-speaking world, said that authors should own the copyrights on their creations.
The statute also established that copyrights should expire after a certain period--in most cases, 14 years, with a one-time-only option to renew for a second 14-year term. That limitation helped create the public domain, the collection of creative works that have passed out of copyright and are now free for all to use and distribute.
The Colonies' Copyright Theft
The Statute of Queen Anne protected authors in Great Britain, but not in America. During the 18th century, American booksellers regularly sold British writers' works without permission (the wily Benjamin Franklin was one prominent offender). Still, America's founders clearly took copyright seriously. Article 1 of the U.S. Constitution says Congress can "promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries."
The United States passed its first major copyright law in 1790, but it protected only native authors. During the 19th century, American publishers continued to sell thousands of copies of British books without permission--and without ever having to pay their authors or legitimate publishers a penny.
Hugely popular British writers like Walter Scott, Benjamin Disraeli, and Charles Dickens tore their hair out in frustration as cheap pirated editions of their novels flooded the American market. Dickens protested against such piracy when he visited America in 1842, but many Americans didn't want to hear it. Piracy meant cheap British books.
The League of Copyrighted Nations
Eventually, the need for international copyright agreements became clear, and in 1886-87 a group of nations signed the Berne Convention for the Protection of Literary and Artistic Works. Each country agreed to extend its domestic copyright protections to any author from any of the other signing countries. One notable holdout was the United States, which didn't join until 1988 (though it worked out bilateral agreements with many nations years earlier).
The U.S. Congress passed the Copyright Act of 1976, which established the basic term of protection as the life of the author plus 50 years. In 1992, copyright renewal was made automatic, which prevented the copyright on many works protected before 1978 from expiring. In 1998, the term of protection was extended again--to the author's life plus 70 years, unless the work was made for hire or was anonymous or pseudonymous, in which case it was protected for 95 years after its publication.
Why so many extensions? For one thing, the heirs of early-20th-century authors--like, say, Walt Disney--aren't anxious to see their copyrights expire. Nor do they want to see their intellectual property shared at the click of a mouse.
Jeffery Vail
March 30, 2005
Want to learn more?
Browse a timeline of copyright history
http://arl.cni.org/info/frn/copy/timeline.html
KnowledgeNews.Net * 110 West Main Street * Urbana, Illinois 61801 * USA
Questions? Comments? Suggestions? Write to us at info@knowledgenews.net.
We read every note and answer as quickly as possible.
Toshiba's New Battery Recharges In One Minute
TechWeb News
Toshiba on Tuesday announced a new lithium-ion battery -- the type used in virtually all laptops -- that recharges 60 times faster than current batteries and loses less than one percent of its capacity after 1,000 recharges.
The new battery can be refilled to 80 percent of capacity in one minute, Toshiba claimed, significantly less time than the one-to-four hours needed for lithium-ion batteries now in use.
According to Toshiba, the secret's in the negative electrode. "Nano-particles prevent organic liquid electrolytes from reducing during battery recharging," said Toshiba in a statement. "The nano-particles quickly absorb and store vast amount of lithium ions, without causing any deterioration in the electrode."
The Japanese technology giant said that it expected to put the new batteries into play in 2006, initially in automotive and industrial applications. One use, Toshiba said, would be within hybrid vehicles, which store power generated when, for instance, the car decelerates.
Toshiba said it would move the new batteries into consumer electronics applications, such as laptops and cameras, at a later date.
Wednesday, March 23, 2005
Experts Fear Drive-by Computer Viruses
By LANCE GAY
Wednesday, March 23, 2005
Security News Home
Until a year ago, the concept that someone could infect a computer while just passing by seemed like a pipe dream.
Today, it's the digital age's nightmare.
Following the appearance of viruses that infect cell phones from a distance, security experts wonder if computers running home digital television sets, burglar alarms or even global positioning systems could be similarly infected and disabled.
Alfred Huger, senior director of engineering at the security software firm Symantec, said he expects in the future that someone just walking through a house with an infected cell phone could pass viruses to home computers or any other device with a wireless connection.
"I think we are looking at threats crossing platforms," said Huger.
Huger said the appearance of cell-phone viruses that can be transmitted through wireless connections were only theoretical until a year ago, when a version of the Cabir virus turned up on two cell phones displayed behind glass windows in a California cell-phone store.
The exact method of infection isn't known, but it's suspected that a passerby transferred the infected viruses through a wireless connection.
Huger said the first generations of the virus were innocuous, but the virus writers released their computer source codes on the Internet, providing vital information to other virus writers. Other versions are appearing that keep cell-phone connections active to run down the battery and run up fees. "The first version was Cabir-A, and we're already up to Cabir-T," he said.
Some experts predict that if cell phone virus writers follow the same pattern as the writers of worms and viruses did with personal computers, the innocuous viruses will soon be followed with malicious versions that do damage; not far behind would be viruses that operate like spyware on computers to steal information.
Page Hijack: The 302 Exploit, Redirects and Google
By Claus Schmidt.
Abstract:
An explanation of the page hijack exploit using 302 server redirects. This exploit allows any webmaster to have his own "virtual pages" rank for terms that pages belonging to another webmaster used to rank for. Successfully employed, this technique will allow the offending webmaster ("the hijacker") to displace the pages of the "target" in the Search Engine Results Pages ("SERPS"), and hence (a) cause search engine traffic to the target website to vanish, and/or (b) further redirect traffic to any other page of choice. more »
Tuesday, March 22, 2005
Public Library of Science:
The internet and electronic publishing enable the creation of public libraries of science containing the full text and data of any published research article, available free of charge to anyone, anywhere in the world.
Immediate unrestricted access to scientific ideas, methods, results, and conclusions will speed the progress of science and medicine, and will more directly bring the benefits of research to the public. more »
Tuesday, March 15, 2005
HP Jornada 540 Pocket PC
Having a problem with your product? Find your solution here.
» Software & Driver downloads
Looking for software & driver updates? Download available software & drivers here.
» Setup and install
Connect, install or verify installation of your product.
» How to use
Enhance your product's performance with details on how to use and maintain.
» Product information
Get product specifications, warranty, supplies, parts and accessories.
» Manuals
Download your product's user documentation.
» FAQs
Frequently asked questions regarding your product
BlackBerry 7520
Features
Wireless Access to Email
• Always on, office email while you're mobile. Receive and answer email from the BlackBerry 7520 handheld wirelessly. Microsoft Outlook, IBM Lotus Notes and ISP/POP3 email capable.
Monday, March 14, 2005
Ga. Woman Held Hostage Describes Ordeal
ATLANTA (AP) - For hours, Ashley Smith gently talked to the armed suspect in Atlanta's courthouse slayings, turning from hostage to confidant as they discussed God, family, pancakes and the massive manhunt going on outside her apartment.
``I believe God brought him to my door,'' Smith said Sunday, only hours after her 911 call ended a manhunt for Brian Nichols, who is accused of shooting four people since Friday.
Over the course of the night, Nichols untied Smith, and some of the fear lessened as they talked. Nichols told Smith he felt like ``he was already dead,'' but Smith urged him to consider the fact that he was still alive a ``miracle.''
Saturday, March 12, 2005
Important Tax Information
W-2 Information
Effective September 17, 2003, all current myPay active/reserve military users and Defense Finance and Accounting Service (DFAS) civilian employees who request or already have a myPay Personal Identification Number (PIN) and access myPay are consenting to receive only an electronic W-2. They may, however, elect to receive a hardcopy W-2. All other Department of Defense (DoD) civilian employees who use MyPay may elect to receive an electronic W-2 in lieu of a hardcopy W-2 through the MyPay system. Click here for more information.
Friday, March 11, 2005
HTC Netstore
Regular price: $65.00
Sale price: $43.90, 2/$83.80, 10/$375.00
D-Link DI-704P Express EtherNetwork 4-Port Broadband Cable/DSL Router Plus Print Server (free shipping)
Regular price: $89.00
Sale price: $61.70, 2/$121.40, 10/$550.00
D-Link DI-707 7-Port Broadband Cable/DSL Router (free shipping)
Regular price: $118.00
Sale price: $82.60
more prices
Tuesday, March 08, 2005
eBay: Learning Center: Selling:
28.02.2005 / Eugene Spafford, Purdue University:
Spafford: I think it can be reduced with some effort, but I do not see how it can be eliminated without also eliminating e-mail, or radically changing the way we run the Internet. Spam is, in part, subjective – what is spam to one person may be a great idea to another. Thus, there will always be some people who actually want some of it!
The biggest problem with spam right now is that the spammers refuse to abide by some procedure that will let users opt out of getting it. The fraud used in sending spam – both deceptive titles and hijack of machines – compounds the problem. If we can cut down on the fraudulent use of servers, and impose some really strong authentication on the advertisements that remain, then perhaps we can control spam ... but it is doubtful we will be able to eliminate it completely in only a few years.
This problem is so large and complex, it was named as one of the CRA Grand Challenges. Those four challenges are:
* Eliminate epidemic-style attacks – worms, viruses, spam, phishing and denial of service attacks.
* Discover how to design and build large-scale, distributed computing systems that must be highly reliable even in the face of probable attack. Examples include medical health records, law enforcement databases, and financial system computing.
* Develop quantitative cyber risk measurement techniques to a point at least the equal of current quantitative financial risk measurement techniques. This will allow us to compare security solutions, measure risk appropriately, and invest the right amounts into protection of our cyber assets.
* Develop mechanisms to allow computing users to set their own levels of data protection and privacy in understandable, repeatable, and reliable manners. Thus, we want each person to be able to interact with systems in a way that allows them to choose how much information to entrust to the systems, and at what level to protect it.
Those interfaces should be understandable and simple to use.
Cybercrime-Hacking
Source: Silicon.com
Date Written: 2005-02-11
Date Collected: 2005-02-14
The 419 Flash Mob, an Internet vigilante group, started attacking fake banking websites February 9, 2005. A statement by Artists Against 419, who supports the 419 Flash Mob, said their aim was to shut down eight such websites within 48 hours using denial-of- service (DoS) attacks in celebration of the Chinese New Year. Many of the attacked websites were hosted by the same service provider in China, and included Abbey Trust & Offshore Bank, First Global Trust, Allied Trust Bank UK, Crystal Bonds & Securities, Allied Trust Bank UK, KASH BANK CORPORATION, and Liberty Stronghold Securities and Finance.
Title: Businesses targeted by ID "hijack" scam
Source: Silicon.com
Date Written: 2005-02-14
Date Collected: 2005-02-14
Online fraud prevention firm Early Warning has discovered a scam targeting British companies through the Companies House database. In this scam, an attacker changes the address of the registered office for a limited company--all that is needed is the current address and the business's registered company number, both of which can be found in an internet search. Once the address is changed, attackers can open trade accounts and order goods in the company's name. Businesses only discover the identity theft when debt collectors and lawsuits appear to recover fraudulently ordered goods. Companies House is working with the Home Office and the Metropolitan Police to address the emerging problem. In the meantime, companies can protect themselves by filing documents electronically through the Proof system, subscribing to the Companies House monitoring service, and periodically confirming registered details.
HOMELAND SECURITY POLICY INSTITUTE GROUP
While this threat assessment is very real, these alerts never really say what we should be alert for. What are the potential targets in California? Are there any relationships to the Inland Empire? Who is the enemy and the ideology that drives it? How is the enemy organized and what are its operational tactics? What are activities and behaviors that might tip the existence of an aQ cell? Further the traditional law enforcement paradigm is ill-equipped to counter this new threat. We are the domestic boots on the ground.
Al-Qaeda seen planning for 'spectacular' attack
Become a member and help us get the word out
Jerusalem Post May 6, 2004
How serious is cyber-terror's threat, and what is the free world doing about it?
In-Depth Coverage
By Alan D. Abbey
Islamic terrorists are winning the on-line war against Western interests because of their virtually unchecked ability to use the Internet to plan, promote, and propagate both physical and cyber attacks.
Efforts to monitor, predict, and counter such attacks are only in the earliest stages. Technical, legal, privacy, and even political challenges are slowing down what could be called cyber counterterrorism in Israel and the US. Private groups have done much of what little successful monitoring has been done so far, as government efforts, particularly in the US, have been hampered by civil liberties concerns.
9-11 News and Legal Resources, Information and Related Services
Compiled and Edited By: Sabrina I. Pacifici, Editor, Publisher, Web Manager, LLRX.com
See LLRX Newstand for additional daily news updates
Security Tightening Ahead of Eid in Malaysia, Indonesia
Kuala Lumpur, November 24 (IslamOnline) - Security in several countries in South East Asia (SEA) is tightening ahead of the Eid el Fitri festivals that start at the end of the holy month of Ramadhan in December. Indonesia, Malaysia and Brunei have already stepped up routine patrols with more police forces on the streets than usual.
In Jakarta, the police are currently carrying out unusual raids in night spots and streets where foreigners would gather in a bid to deter night clubs, bars and other alcohol vendors to carry out their business during the month of Ramadhan.
Emergency Response Resource Directory:
High Tech "NewsBits"
Taliban opposition site a casualty of war A Web site operated by opponents of Afghanistan's Taliban regime will likely remain offline for at least another month after hackers took it out of commission in an apparent case of mistaken identity. Visitors sent about 10,000 hate messages soon after the Sept. 11 terrorism strikes, and hackers brought down the ``AfghanGovernment.org'' site within days. http://www.siliconvalley.com/docs/news/tech/011931.htm
Hacking Incident Closes Security News Site The day before Marquis Grove decided to shutter his popular computer security news site, the operator of SecurityNewsPortal.com was brimming with energy about his labor of love. "I have a large viewership and I feel I owe them a responsibility to be there and keep slamming out the freshest news that I can to keep them amused and informed," said Grove in an e-mail interview Monday. http://www.newsbytes.com/news/01/171478.html
Bin Laden worm wriggling in South Korea A computer virus named after Osama bin Laden, the Saudi-born fugitive accused of masterminding the attacks on the United States, has surfaced in South Korea, a local antivirus software maker said Wednesday. "We received a report from a personal computer user who got an e-mail containing the virus, "Jin Yoon-jung of antivirus company Ahnlab told Reuters. "His computer was not infected, as he reported it to us without opening the e-mail.
http://news.cnet.com/news/0-1003-200-7641111.htmlRead More
UGN Security: Tech News
Tech Law Journal Daily E-Mail Alert
Congressional Record: January 9, 2003 (Senate)
Mr. Schumer, Mr. Durbin, Mrs. Clinton, Mrs. Murray, Mr. Dayton,
Mr. Corzine, and Mr. Reed):
S. 22. A bill to enhance domestic security, and for other purposes;
to the Committee on the Judiciary.
Mr. LEAHY. Mr. President, I am pleased today to join Senator Daschle
and other Democratic Senators in introducing the Justice Enhancement
and Domestic Security Act of 2003. This comprehensive crime bill builds
on prior Democratic crime initiatives, including the landmark Violent
Crime Control and Law Enforcement Act of 1994, that worked to bring the
crime rate down.
This year marked an unfortunate turn after a decade of remarkable
declines in the Nation's crime rate. The decade of progress we made
under the leadership of a Democratic President helped revitalize our
cities and restore a sense of security for millions of Americans.
According to the latest FBI report, however, the number of murders,
rapes, robberies, assaults, and property crimes is up across the United
States in all regions of the country except the Northeast, the first
year-to-year increase since 1991. This upswing has been fueled by the
faltering economy and high unemployment rates. The President's ill-
conceived tax cut in 2001, along with the new cuts he proposes now, are
likely to exacerbate these economic woes by plunging us deeper into
deficit spending.Read More
Homeland Security Information
latest news and information can be obtained. Many of the sites also have
further tips regarding how to prepare for disaster situations regarding
homeland security.
SatCom Systems - Government and Homeland Securty:
The borders the United States shares with Mexico and Canada are the longest undefended national boundaries in the world. Major portions of these boundaries pass through isolated terrain with, relatively, few ËmannedÓ border crossings. Homeland Defense requires a coordinated response across multi-agency and jurisdictional lines to properly maintain the safety of the citizens from unfriendly incursions across this vast area. Coordinated, interoperable voice and data communications are essential elements for effective protection, and certainly any response.
First Responder and Incident Command Operations in Homeland Defense demand the ability to transmit and receive voice and data anywhere within the ËoperationalÓ area set forth by an incident. This area is dynamically determined as the response to an incident occurs, without regard for geographic or jurisdictional boundaries. The fluid dynamics of rapidly unfolding events creates an interesting set of challenges for even the most experienced organizations. Effective voice and data communications vital to the incident should not be part of these challenges. more »
Monstrous Homeland Securty - Lawyer's Boon and Citizen's DOOM!
From: WETHEPEOPLE_UNITED@yahoogroups.com
Dear Citizen, December 2002
It is the utmost hope for the sake of next generations that Americans now realize their freedoms have irrevocably been harmed in 2002. Due to the passage of the monstrous Homeland Security Act, the average American can expect the following.
Every credit card purchase, every magazine subscription, every medical prescription, every visited Web site, every e-mail, every academic grade, every bank deposit,and even every booked trip Will Be Recorded. All these transactions and communications will go into a vast database of the Defense Department. This once far-fetched Orweillan scenario is now reality.
The Information Awareness Office will now have the data-mining power to "snoop" on all Americans.Two hundred million dollars have been appropriated to create computer dossiers on all citizens. This Act, along with the U.S.A. Patriotic Act, has officially marked the end of Constitution's 4th Amendment. Since all matters now filter through the judiciary, the official inauguration of the police state will be a boon to the bar associations cult.Read More
Homeland Securty abandons MS for Linux
changed its servers over to Oracle on Linux last week, after running
on Windows 2000 for several months. Experts say that it is unlikely the
change is a reaction to "Slammer," the MS SQL server worm that rocked
the Internet last week. "
Defense tech debated
Published on March 04, 2005
Congress will scrutinize the Defense Department's $30.1 billion budget request for military information technology spending for fiscal 2006 by questioning redundancy in the services' warfighting IT systems.
DOD IT officials requested $7.4 billion for command, control, communications and computer systems next year — a $1 billion increase from what they received last year. Lawmakers think troops could better communicate and access intelligence in Iraq and Afghanistan if they consolidated them.
On Line for Independent Inventors (24FEB2005)
This final version is an edited version of the actual transcript. Where you see “edited answer” below, the original on-line chat answer has been modified to ensure completeness and accuracy of the answers originally provided by USPTO staff.
As in our previous chats held so far, we received hundreds more questions then we had time to answer. We selected questions for posting which we believed would be of interest to others besides the author of the question. Once we selected the question, we developed the answer, and then posted the question and the answer for viewing by the public. During the actual chat, occasionally the answer was actually posted before the public saw the question. This edited transcript always has the question before the answer. In reviewing the transcript below, if you see the time of the answer before the time of the question, we originally posted them out of sequence. More Info