Wednesday, May 18, 2005
Demise of a hard-fighting squad
Marines who survived ambush are killed, wounded in blast
By Ellen Knickmeyer
Updated: 4:38 a.m. ET May 12, 2005
HABAN, Iraq, May 11 -
The explosion enveloped the armored vehicle in flames, sending orange balls of fire bubbling above the trees along the Euphrates River near the Syrian border. more »
Email feedback to wooran@ec.rr.com
Wednesday, May 11, 2005
Information Technologies industry in North Carolina
Email feedback to wooran@ec.rr.com
Charlotte Oracle Users Group
ARTICLE I
NAME
The name of this corporation shall be the Charlotte Oracle Users Group, a not-for-profit business association organized under the laws of the State of North Carolina of the United States of America (hereinafter "CLTOUG”)
ARTICLE II
PURPOSES
Section 1. Not for Profit. CLTOUG is organized under and shall operate as a North Carolina not-for-profit business association.
more »
Email feedback to wooran@ec.rr.com
Lebanese Political Journal
The web is blazing with commentary about the recently returned General Michel Aoun.
Here's some more fuel for the fire.
I disagree fundamentally with the claim that Aoun is bad because he killed people.
I differentiate between good war and bad war.
Amal fought very bad war. Jumblatt fought bad sometimes and good sometimes (kind of like his political opinions). Aoun was like Jumblatt. In Lebanese terms, Hezbollah fought good far more than bad.
The reason Aoun and Hezbollah get along so well is because they are both nationalist parties fighting for nationalist causes, although using different allies.
Was President Hafez al Assad better than Saddam? Can Hama (where Assad massacred tens of thousands) be compared with Kurdistan (where Saddam gassed his people)? Can the Lebanese war be compared with Kuwait?
I think going through such lists leads to frivolity.
Aoun did kill, as do all field generals in combat. He was employed to do so. His assignment was to defend his country. When all leaders were gone, he took orders from himself.
more »
Email feedback to wooran@ec.rr.com
'They Came Here to Die'
By Ellen Knickmeyer
Washington Post Foreign Service
Wednesday, May 11, 2005; Page A01
JARAMI, Iraq, May 10 -- Screaming "Allahu Akbar'' to the end, the foreign fighters lay on their backs in a narrow crawl space under a house and blasted their machine guns up through the concrete floor with bullets designed to penetrate tanks. They fired at U.S. Marines, driving back wave after wave as the Americans tried to retrieve a fallen comrade.
Through Sunday night and into Monday morning, the foreign fighters battled on, their screaming voices gradually fading to just one. In the end, it took five Marine assaults, grenades, a tank firing bunker-busting artillery rounds, 500-pound bombs unleashed by an F/A-18 attack plane and a point-blank attack by a rocket launcher to quell them.
more »
Email feedback to wooran@ec.rr.com
Thursday, May 05, 2005
Minutemen end border watch, plan to expand
Chief Washington correspondent
MSNBC
Updated: 11:32 a.m. ET May 4, 2005WASHINGTON - The month-long volunteer effort by a grassroots citizen group monitoring illegal immigration along a desolate 23-mile stretch of the Arizona-Mexico border ended much as it started: in a war of words.
more »
U.S. unprepared for nuclear terror, experts say
Updated: 7:21 a.m. ET May 3, 2005When asked during the campaign debates to name the gravest danger facing the United States, President Bush and challenger Sen. John F. Kerry (D-Mass.) gave the same answer: a nuclear device in the hands of terrorists. more »
Monday, May 02, 2005
President Bush Honors Volunteers on Earth Day
"Yigaquu osaniyu adanvto adadoligi nigohilvi nasquv utloyasdi nihi"
Cherokee - "May the Great Spirit's blessings always be with you."
Tuesday, April 26, 2005
Justice Information Sharing Resource Directory Now Available
HOMELAND SECURITY E-Procurement Purchase Orders for Terrorism Grants
Tuesday, April 12, 2005
The National Security Agency/Central Security Service
The NSA/CSS Public and Media Affairs Office works closely with elements throughout the Agency, to include the Freedom Of Information Act (FOIA) Office and the Center for Cryptologic History, to provide accurate and timely unclassified information in response to public and media requests.
In addition to answering specific queries, NSA/CSS regularly releases information to the public in the form of hard copy and electronic press releases, congressional testimony, public speeches and briefings, special reports, Freedom of Information Act releases, and declassification intiatives.
NSA/CSS understands that its long-term success is absolutely dependent upon the nurturing of future generations of U.S. cryptologists. Thus, the Agency is totally committed to continual learning and development for its current workforce, and reaches out into the community with a plethora of educational programs for students of all ages. Programs aimed at developing and recruiting the best and the brightest computer/electrical engineers, computer scientists, mathematicians, linguists, cryptanalysts, and signals analysts in the world. » More
Monday, April 11, 2005
Wooran's Web World
Downloads | Education | News | About Us | Copyrights | Law | Military | Proverbs | Theocracy | Fractals | Natives | Syndicate this site
Administration ends largest counterterrorism exercise everNo glaring deficiencies found in national prevention and response capability, but final results will take months to process.
UNITED STATES DEPARTMENT OF COMMERCE
Management of Internet Names and Addresses
Free Web Seminar!Achieving Performance Management Success in the Public Sector:
Lessons Learned from the FieldIn this one hour session featuring Carl DeMaio, president and founder of the Performance Institute, a government-focused non-partisan, private think tank, learn how organizations like yours have navigated the performance management battlefield to achieve success in today?s performance driven environment. Register Today!
World Trade Center 9/11 Investigation Could Result in New Generation of Building Safety and Fire Prevention CodesThe nation's leading developer of building safety and fire prevention codes will use findings from an investigation into the World Trade Center attack to better understand what led to the towers' collapse and develop construction guidelines... More
Loy Testifies Before the Senate Select Committee on Intelligence
"We have dramatically improved our technical ability to share information. Tools such as the Homeland Security Operations Center, the Homeland Security Information Network, and the Homeland security Advisory system are steps toward full capacity and capability."
Cybersecurity Standardization Moves Forward - Compliance with the 2002 Federal Information Security Management Act is an expensive and frustrating process for agencies. The Office of Management and Budget (OMB) has launched a task force on cybersecurity standardization to identify problems and solutions for cybersecurity risks, improve cybersecurity processes, and reduce costs by eliminating duplication. The task force will analyze various elements, including training activities, threat awareness, program management, and the implementation of security products.
...More News
For additional information please visit Wooran's Web World Development.
...More interesting tips on safety on the Internet
Wooran's Web World Development Resources shall continue to evolve for many years to come.
Email feedback to wooran@ec.rr.com
Stephanie Beach Charron Copyleft
107 Circle Drive, Jacksonville, North Carolina 28540
Permission is granted to copy, distribute and/or modify this document under the terms of the
GNU Free Documentation License
Thursday, March 31, 2005
NC Department of Crime Control and Public Safety:
The AMBER Alert issued in North Carolina this morning for two missing Georgia children has been cancelled. The Clayton County Police Department in Georgia has advised North Carolina authorities that the children have been recovered safely.
A Guide to Small Claims Court
Before you file your lawsuit, you must fill out a complaint form. The clerk of court has different complaint forms for different kinds of problems. The three most commonly used forms are:
* Complaint for Money Owed*
* Complaint to Recover Possession of Personal Property
* Complaint in Summary Ejectment (used by landlords).
* [The Complaint for Money Owed is described in detail in
the next section.]
If you want to get back some property which is in dispute, you should use the Complaint to Recover Possession of Personal Property. On that form, you as the plaintiff must say if you are a "secured party" or not. A secured party is usually a finance company or other institution of some sort rather than an individual. If you have a written statement that you may repossess property if payments are not made according to an agreed upon schedule, then you are a secured party.
Landlords use the Complaint in Summary Ejectment form to collect back rent or evict tenants. This form is fairly complicated to understand both for landlords (the plaintiffs) and tenants (the defendants).
If none of the standard forms suits your exact situation, you may write your own complaint. Be sure to state what your claim is and include the type of information.
How to Fill Out "Complaint for Money Owed" FORM
* Step 1. If you are filing the suit, put your correct full name as plaintiff, with your address and telephone number, if any. You must include the name of your county.
* Step 2. Put the person's full name being sued as defendant, with the address and telephone number, if any, and the county where the person lives.
If you are suing a business, you must find out if it is a corporation or not. If the business is a corporation, you list the correct name of the corporation as the defendant. Your complaint and summons must go to the "registered agent" of the corporation, or to an officer, director, or managing agent of the corporation. If the business is not a corporation, you list the owners of the business as the defendants. For more explanation of businesses as defendants, see the appendix.
* Step 3. List the name and address of your attorney, if you have one. If you don’t have an attorney, leave this blank.
* Step 4. List the county where you are bringing this lawsuit.
* Step 5. After "Principal Amount Owed," put the exact amount of money which you claim the defendant owes you. If you are claiming interest on this money, put that amount on the next line. Add the two figures to get the "Total Amount Owed."
* Step 6. In the sample complaint form, note the choices of boxes the plaintiff may use. You can check a box and fill in the information on the line next to the box. Or you can check "other" and describe the purpose of your suit.
* Step 7. Sign and date the complaint. If you have a lawyer, he or she may sign it.
Wednesday, March 30, 2005
American copyright law got Charles Dickens down
At issue: whether the companies that make such programs should be held accountable when people use them to infringe someone else's copyright. Many in Hollywood say "yes." Many in Silicon Valley say "no." We say, "time to take a look at the history of copyright."
Today's Knowledge
Copyright Noticed
Ever since William Caxton sold England's first printed books in the 15th century, laws have been passed to regulate publishing rights. But the first publishing laws had as much to do with the crown's rights to censor ideas and collect revenues as with the rights of authors or publishers.
In fact, in the old days, authors hardly had any rights at all. Booksellers who published original works enjoyed what amounted to perpetual monopolies over them. The booksellers, not the authors, could even pass exclusive rights to profitable original works down to their heirs.
Queen Anne's Authorial Rights
That remained the case in England until the Statute of Queen Anne went into effect in 1710. This landmark act, the first full-fledged copyright act in the English-speaking world, said that authors should own the copyrights on their creations.
The statute also established that copyrights should expire after a certain period--in most cases, 14 years, with a one-time-only option to renew for a second 14-year term. That limitation helped create the public domain, the collection of creative works that have passed out of copyright and are now free for all to use and distribute.
The Colonies' Copyright Theft
The Statute of Queen Anne protected authors in Great Britain, but not in America. During the 18th century, American booksellers regularly sold British writers' works without permission (the wily Benjamin Franklin was one prominent offender). Still, America's founders clearly took copyright seriously. Article 1 of the U.S. Constitution says Congress can "promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries."
The United States passed its first major copyright law in 1790, but it protected only native authors. During the 19th century, American publishers continued to sell thousands of copies of British books without permission--and without ever having to pay their authors or legitimate publishers a penny.
Hugely popular British writers like Walter Scott, Benjamin Disraeli, and Charles Dickens tore their hair out in frustration as cheap pirated editions of their novels flooded the American market. Dickens protested against such piracy when he visited America in 1842, but many Americans didn't want to hear it. Piracy meant cheap British books.
The League of Copyrighted Nations
Eventually, the need for international copyright agreements became clear, and in 1886-87 a group of nations signed the Berne Convention for the Protection of Literary and Artistic Works. Each country agreed to extend its domestic copyright protections to any author from any of the other signing countries. One notable holdout was the United States, which didn't join until 1988 (though it worked out bilateral agreements with many nations years earlier).
The U.S. Congress passed the Copyright Act of 1976, which established the basic term of protection as the life of the author plus 50 years. In 1992, copyright renewal was made automatic, which prevented the copyright on many works protected before 1978 from expiring. In 1998, the term of protection was extended again--to the author's life plus 70 years, unless the work was made for hire or was anonymous or pseudonymous, in which case it was protected for 95 years after its publication.
Why so many extensions? For one thing, the heirs of early-20th-century authors--like, say, Walt Disney--aren't anxious to see their copyrights expire. Nor do they want to see their intellectual property shared at the click of a mouse.
Jeffery Vail
March 30, 2005
Want to learn more?
Browse a timeline of copyright history
http://arl.cni.org/info/frn/copy/timeline.html
KnowledgeNews.Net * 110 West Main Street * Urbana, Illinois 61801 * USA
Questions? Comments? Suggestions? Write to us at info@knowledgenews.net.
We read every note and answer as quickly as possible.
Toshiba's New Battery Recharges In One Minute
TechWeb News
Toshiba on Tuesday announced a new lithium-ion battery -- the type used in virtually all laptops -- that recharges 60 times faster than current batteries and loses less than one percent of its capacity after 1,000 recharges.
The new battery can be refilled to 80 percent of capacity in one minute, Toshiba claimed, significantly less time than the one-to-four hours needed for lithium-ion batteries now in use.
According to Toshiba, the secret's in the negative electrode. "Nano-particles prevent organic liquid electrolytes from reducing during battery recharging," said Toshiba in a statement. "The nano-particles quickly absorb and store vast amount of lithium ions, without causing any deterioration in the electrode."
The Japanese technology giant said that it expected to put the new batteries into play in 2006, initially in automotive and industrial applications. One use, Toshiba said, would be within hybrid vehicles, which store power generated when, for instance, the car decelerates.
Toshiba said it would move the new batteries into consumer electronics applications, such as laptops and cameras, at a later date.
Wednesday, March 23, 2005
Experts Fear Drive-by Computer Viruses
By LANCE GAY
Wednesday, March 23, 2005
Security News Home
Until a year ago, the concept that someone could infect a computer while just passing by seemed like a pipe dream.
Today, it's the digital age's nightmare.
Following the appearance of viruses that infect cell phones from a distance, security experts wonder if computers running home digital television sets, burglar alarms or even global positioning systems could be similarly infected and disabled.
Alfred Huger, senior director of engineering at the security software firm Symantec, said he expects in the future that someone just walking through a house with an infected cell phone could pass viruses to home computers or any other device with a wireless connection.
"I think we are looking at threats crossing platforms," said Huger.
Huger said the appearance of cell-phone viruses that can be transmitted through wireless connections were only theoretical until a year ago, when a version of the Cabir virus turned up on two cell phones displayed behind glass windows in a California cell-phone store.
The exact method of infection isn't known, but it's suspected that a passerby transferred the infected viruses through a wireless connection.
Huger said the first generations of the virus were innocuous, but the virus writers released their computer source codes on the Internet, providing vital information to other virus writers. Other versions are appearing that keep cell-phone connections active to run down the battery and run up fees. "The first version was Cabir-A, and we're already up to Cabir-T," he said.
Some experts predict that if cell phone virus writers follow the same pattern as the writers of worms and viruses did with personal computers, the innocuous viruses will soon be followed with malicious versions that do damage; not far behind would be viruses that operate like spyware on computers to steal information.
Page Hijack: The 302 Exploit, Redirects and Google
By Claus Schmidt.
Abstract:
An explanation of the page hijack exploit using 302 server redirects. This exploit allows any webmaster to have his own "virtual pages" rank for terms that pages belonging to another webmaster used to rank for. Successfully employed, this technique will allow the offending webmaster ("the hijacker") to displace the pages of the "target" in the Search Engine Results Pages ("SERPS"), and hence (a) cause search engine traffic to the target website to vanish, and/or (b) further redirect traffic to any other page of choice. more »
Tuesday, March 22, 2005
Public Library of Science:
The internet and electronic publishing enable the creation of public libraries of science containing the full text and data of any published research article, available free of charge to anyone, anywhere in the world.
Immediate unrestricted access to scientific ideas, methods, results, and conclusions will speed the progress of science and medicine, and will more directly bring the benefits of research to the public. more »
Tuesday, March 15, 2005
HP Jornada 540 Pocket PC
Having a problem with your product? Find your solution here.
» Software & Driver downloads
Looking for software & driver updates? Download available software & drivers here.
» Setup and install
Connect, install or verify installation of your product.
» How to use
Enhance your product's performance with details on how to use and maintain.
» Product information
Get product specifications, warranty, supplies, parts and accessories.
» Manuals
Download your product's user documentation.
» FAQs
Frequently asked questions regarding your product