Ravenda Homes Ltd. v. 1372708 Ontario Inc., 2017 ONCA 556 (CanLII)   
security for costs — chambers — justness — justice of the case required — overarching
          Banking and healthcare robots for SEQ? City leaders on tech tour   

The introduction of robots, autonomous vehicles and improved cyber security in south-east Queensland will be discussed by city leaders during a three-day international venture. On Sunday, representatives from seven councils will head to Singapore on a three-day mission to explore the country's smart technology and find out if and how it could work in south-east Queensland.


          NETGATE Internet Security 19.0.790   
Internet Security is complete security solution against Internet threats.
          Can't modified form-urlencoded response using FiddlerScript   

Hello everyone! I need help. I have this request:

POST https://site/request HTTP/1.1
Host: site
Accept-Language: en-us
X-OQUE-4LM: AQAGMvxvDIIUBF+WCuq5NR+yUKs2RLd2ujdnK3euSZhfYmfEAfz2j4+uSblhagtKNuPv
User-Agent: VerifiedApp/5.11.0
Accept: */*
Content-Type: application/x-www-form-urlencoded
SECURITY-USERID: site.com
DATA-FORMAT: NV
RESPONSE-DATA-FORMAT: NV
VERSION: 1.0.0
Connection: keep-alive
Proxy-Connection: keep-alive
Content-Length: 2071
Accept-Encoding: gzip
 
appGuid=fa8d329215c192d350790b80010063e1&libraryVersion=Dyson/3.5.7 (iOS 9.3.1)&additionalData=%7B%22app_version%22%3A%225.11.0%22%2C%22comp_version%22%3A%223.5.7%22%2C%22locale_lang%22%3A%22en%22%2C%22is_emulator%22%3Afalse%2C%22timestamp%22%3A1498862545599%2C%22ip_addrs%22%3A%22192.168.1.235%22%2C%22linker_id%22%3A%2236867603-6174-40b8-8d60-f00cdd090b57%22%2C%22vendor_identifier%22%3A%2285E52684-7B9B-40C8-8149-3AF751613F33%22%2C%22conf_url%22%3A%22https%3A%5C%2F%5C%2Fwww.siteobjects.com%5C%2Fwebstatic%5C%2Frisk%5C%2Fdyson_config_ios_v4.json%22%2C%22proxy_setting%22%3A%22host%3D192.168.1.242%2Cport%3D8888%2Ctype%3DkCFProxyTypeHTTPS%22%2C%22notif_token%22%3A%22%22%2C%22os_type%22%3A%22iOS%22%2C%22os_version%22%3A%229.3.1%22%2C%22location_auth_status%22%3A%22unknown%22%2C%22pin_lock_last_timestamp%22%3A1498861777904%2C%22pm%22%3A%222d935eb9%22%2C%22sms_enabled%22%3Afalse%2C%22conf_version%22%3A%224.0%22%2C%22payload_type%22%3A%22full%22%2C%22source_app%22%3A11%2C%22app_guid%22%3A%22fa8d329215c192d350790b80010063e1%22%2C%22ds%22%3Atrue%2C%22ip_addresses%22%3A%5B%22%3A%3A1%22%2C%22127.0.0.1%22%2C%22fe80%3A%3A1%22%2C%22fe80%3A%3A41d%3A305e%3A330%3Aecd8%22%2C%22192.168.1.235%22%2C%22fe80%3A%3A3c3b%3A43ff%3Afebe%3A9635%22%5D%2C%22dc_id%22%3A%22e421ce595d27c33a4912dc014213ecbd%22%2C%22tz%22%3A-14400000%2C%22device_model%22%3A%22iPad%20Mini%28WiFi%29%22%2C%22cloud_identifier%22%3A%22f08e9cc8-0f01-42b9-abe7-41d90a64136a%22%2C%22risk_comp_session_id%22%3A%229db8ae3b-d2d2-44ec-bea7-7b4d075825d4%22%2C%22device_name%22%3A%22Jammie%20Markos%22%2C%22local_identifier%22%3A%22a63bbdf6-eae5-4602-857b-4c89eae609b3%22%2C%22is_rooted%22%3Atrue%2C%22total_storage_space%22%3A%2213641986048%22%2C%22source_app_version%22%3A%225.11.0%22%2C%22pairing_id%22%3A%22c8595132fd344f9e9fb24b4a1374f7fa%22%2C%22ssid%22%3A%22default89%22%2C%22app_id%22%3A%22com.xcom.iphone%22%2C%22tz_name%22%3A%22America%5C%2FNew_York%22%2C%22conn_type%22%3A%22unknown%22%2C%22bssid%22%3A%225c%3Ad9%3A98%3Ae7%3Ac7%3A34%22%2C%22email_configured%22%3Atrue%2C%22locale_country%22%3A%22US%22%7D

i

I need to change this parameters, like:

is_rooted%22%3Atrue into is_rooted%22%3Afalse

I'l try use this:

if (oSession.PathAndQuery("sitel.com:443")){
              oSession["ui-backcolor"] = "lime";
              oSession.utilDecodeResponse();
              oSession.utilReplaceInResponse('is_rooted%22%3Atrue','is_rooted%22%3Afalse');
          }

 

But it's not work.

Regards, Ruslan.


          Trump commission asking for state voter information, Louisiana still reviewing   

Louisiana Secretary of State Tom Schedler’s office received a letter June 28 from President Donald Trump’s Advisory Commission on Election Integrity, asking for voter names, addresses, party affiliation, dates of birth, the last four digits of social security numbers, and voter history since 2006. The letter from commission Vice Chair Kris Kobach was sent to all 50 states to identify policies that “enhance or undermine the American people’s confidence in the integrity of federal election processes.” The information will be made publicly available.

Meg Casper Sunstrom, Press Secretary for Louisiana's Secretary of State, told Gambit June 29 that the office had not yet reviewed the letter with staff and attorneys.

          Road construction has serious implications, India tells China   
NEW DELHI, June 30 - The government today expressed deep concern over China constructing a road in the disputed Doklam area near Sikkim, and said it had conveyed to Beijing that such an action would represent a significant change of status quo with "serious" security implications for India.
          FDR3729 17 Intelligence Agencies Did Not Say Russia Hacked Election    
After the New York Times issued a retraction to the often repeated claim that 17 U.S. Intelligence agencies claim that the Russian government "Hacked The Election" - the Russia narrative is dead. New York Times Retraction: "A White House Memo article on Monday about President Trump's deflections and denials about Russia referred incorrectly to the source of an intelligence assessment that said Russia orchestrated hacking attacks during last year's presidential election. The assessment was made by four intelligence agencies — the Office of the Director of National Intelligence, the Central Intelligence Agency, the Federal Bureau of Investigation and the National Security Agency. The assessment was not approved by all 17 organizations in the American intelligence community."Article: https://www.nytimes.com/2017/06/25/us/politics/trumps-deflections-and-denials-on-russia-frustrate-even-his-allies.htmlYour support is essential to Freedomain Radio, which is 100% funded by viewers like you. Please support the show by making a one time donation or signing up for a monthly recurring donation at: http://www.freedomainradio.com/donate
          AWS Dev/Ops Engineer   
MA-Boston, AWS Dev/Ops Engineer AWS Dev/Ops Engineer Are you passionate about developing powerful cloud-based security? Our client in Waltham, MA is seeking an AWS Dev/Ops Engineer to support and improve their revolutionary products! Come be a valued team member and share your ideas- apply today with a copy of your resume! Responsibilities: Automating AWS deployment Ensuring cloud architecture meets each pro
          753798 - Duplex Penthouse for sale in Atalaya Golf, Estepona, Málaga, Spain, 435,000 EUR   

Duplex penthouse with panoramic mountain and sea views, inside the 24h security luxury urbanization El Campanario. Located close to all amenities and furniture
          6/30 Leland Live Hour 2   
Leland Whaley continues to give live updates on the shooter situation at Bronx Lebanon Hospital in NYC. In addition, he engages with callers on topics about hospital security and responsible gun ownership.
          Trump & Putin to meet on sidelines of G20 summit, White House confirms   
Preview US President Donald Trump and Russian President Vladimir Putin will meet on the sidelines of the G20 summit in Hamburg, Germany, national security adviser H.R. McMaster has confirmed. It will be the two leaders' first meeting since Trump's inauguration.
Read Full Article at RT.com
          12 Mildly Interesting Things That Are Actually Pretty Cool   

Some of these are actually more than mildly interesting. Dare I say, normal level interesting?

1. These streetlights in Rwanda that have countdowns.

undefined

Xited

2. This pet store's incorporated camera dome in their mural.

undefined

elysenator

3. This dripping paint coffee table.

undefined

reddtitexter

4. This reflection that makes it look like some dude is selling baked goods out of his vehicle.

undefined

Flynnbojangels

5. This ceiling fan that differentiates the ceiling and light chains with a mini light and fan.

undefined

hammurabi1337

6. This building in Chicago.

undefined

Pavarotti_Flamingo

7. This "melty mouth" design concept for the Ghostbuster's Stay Puft Marshmallow Man.

undefined

Keikobad

8. This supermarket that security tags SNICKERS BARS.

undefined

Fapoleon_Boneherpart

9. This hands-free sunscreen spraying machine.

undefined

relytyler11700

10. This hardware stores hammer handle.

undefined

Squid_ProRow

11. This giant strawberry.

undefined

diogy1210

12. This motion picture money.

undefined

Da_G8keepah


          State officials refuse to turn over voters' sensitive data to Donald Trump's election panel   
The information includes partial Social Security numbers, and voter histories going back to 2006
          Donald Trump says 'the era of patience is over' with North Korea   
'The North Korean dictatorship has no regard for the safety and security of its people,' says Mr Trump
          Bahrain invokes WTO's 'national security' clause in Qatar row   

          Bahrain invokes WTO's "national security" clause in Qatar row   

          Full-time and Part-time Members (all streams) - Social Security Tribunal - Governor in Council Appointments - Canada   
The most frequently appealed decisions cover issues such as voluntarily leaving, misconduct and undeclared earnings or fraud during the course of a claim.... $470 - $550 a week
From Governor in Council Appointments - Wed, 24 May 2017 03:59:08 GMT - View all Canada jobs
          District Loss Prevention Manager - Floor Walking - Legendary Security Inc. - Sarnia, ON   
Detect & apprehend shoplifters (actively participate in floor walking duties) or those committing fraud. Legendary Security Inc.... $16.50 - $18.50 an hour
From Indeed - Fri, 26 May 2017 14:51:48 GMT - View all Sarnia, ON jobs
          Licensed Sales Assistant - BMO Nesbitt Burns - BMO Financial Group - Toronto, ON   
Follow security and safeguarding procedures and apply appropriate due diligence for the prevention of loss due to fraud, counterfeiting, money laundering or...
From BMO Financial Group - Thu, 29 Jun 2017 18:52:32 GMT - View all Toronto, ON jobs
          Sr. Service Representative - BMO Financial Group - Toronto, ON   
Follow security and safeguarding procedures and apply appropriate due diligence in accordance with Bank policy for the prevention of loss due to such things as...
From BMO Financial Group - Thu, 29 Jun 2017 00:51:24 GMT - View all Toronto, ON jobs
          Service Representative - BMO Financial Group - Toronto, ON   
Follow security and safeguarding procedures and apply appropriate due diligence in accordance with Bank policy for the prevention of loss due to such things as...
From BMO Financial Group - Wed, 28 Jun 2017 18:51:18 GMT - View all Toronto, ON jobs
          Fund Accountant - BMO Financial Group - Toronto, ON   
Follow security and safeguarding procedures and apply appropriate due diligence in accordance with Bank policy for the prevention of loss due to such things as...
From BMO Financial Group - Wed, 28 Jun 2017 18:51:17 GMT - View all Toronto, ON jobs
          9 Crucial Tips to Protect Your Small Business From Credit Card Fraud   
Vigilance and readily available security tools can keep fraud losses to a minimum.
          Accenture Security Canada Threat & Vulnerabiliy Management Consultant - Accenture - Canada   
Working with offshore delivery center testing personnel; View the Transcript....
From Accenture - Fri, 14 Apr 2017 10:13:22 GMT - View all Canada jobs
          Accenture Security Canada Threat & Vulnerabililty Management Manager - Accenture - Canada   
Working with offshore delivery center testing personnel; Minimum of 2 years of managing teams of three or more resources including remote offshore resources;...
From Accenture - Fri, 14 Apr 2017 10:12:43 GMT - View all Canada jobs
          Senior Cybersecurity Manager - Capgemini - Toronto, ON   
People management of local and offshore resources. Senior Cybersecurity Manager....
From Capgemini - Wed, 28 Jun 2017 20:04:08 GMT - View all Toronto, ON jobs
          Re: [forosi:28859] Petya Ransomware Reported URGENT   
Buen día, adicional a la información enviada, comparto éste enlace que indica una forma sencilla de prevenir la infección. https://www.bleepingcomputer.com/news/security/vaccine-not-killswitch-found-for-petya-notpetya-ransomware-outbreak/ Feliz día Germán El 27 de junio de 2017, 18:12, Cristian
          Community Mobilization Assistant Position At Action Against Hunger   

Action Against Hunger works to save lives by combating hunger and diseases that threaten the lives of vulnerable communities, through nutrition, food security, water and sanitation, health and advocacy.We are recruiting to fill the vacant position below: Job Title: Community Mobilization Assistant Location: Maiduguri, Borno Job Summary The Community Mobilization Assistant will report to the […]

Community Mobilization Assistant Position At Action Against Hunger


          Synthetic fingerprints make plastic particles tiny security keys   
Randomly-generated wrinkles on tiny plastic particles that are just as unique as fingerprints could be useful for sending secure data
          MySQL Encryption at Rest – Part 2 (InnoDB)   
MySQL Encryption at RestWelcome to Part 2 in a series of blog posts on MySQL encryption at rest. This post covers InnoDB tablespace encryption. At Percona, we work with a number of clients that require strong security measures for PCI, HIPAA and PHI compliance, where data managed by MySQL needs to be encrypted “at rest.” As with all […]
          Security Officer 6 - Halifax Public Libraries - Halifax, NS   
Liaises with police regarding serious incidents. Understands and accepts his/her role in accomplishing branch or department priorities and the HRL Strategic... $22.49 - $25.81 an hour
From Indeed - Thu, 22 Jun 2017 12:58:05 GMT - View all Halifax, NS jobs
          Facilities/Security Lead, Halifax, June 30 - Concentrix - Halifax, NS   
Work at times with local Fire and police departments. BUILDING FACILITIES/SECURITY CO-ORDINATOR....
From Concentrix, Corporation - Wed, 31 May 2017 22:30:04 GMT - View all Halifax, NS jobs
          Program Assistant (summer job) - YWCA Halifax - Halifax, NS   
Must have completed Police Security Check with Vulnerable Sector Search and Child Abuse Registry. Key duties will include:.... $10.85 an hour
From Indeed - Thu, 25 May 2017 14:23:52 GMT - View all Halifax, NS jobs
          Bahrain invokes WTO's 'national security' clause in Qatar row   

By Tom Miles

GENEVA (Reuters) - Bahrain told a WTO meeting on Friday trade restrictions imposed on Qatar by Saudi Arabia, Bahrain and the United Arab Emirates were justified on national security grounds, a trade official who attended the meeting said.

Speaking on behalf of all three countries, Bahrain's representative told the WTO's Goods Council the measures were "in accordance with Article XXI of the General Agreement on Tariffs and Trade", which allows the usual rules to be broken for national security reasons, the official said.

Reuters could not immediately find any precedent in the WTO's 22-year history of a country explicitly and formally citing the "national security exemption" to pre-empt a potential trade dispute.

Some trade experts say that using national security as a defence risks weakening the WTO by removing the taboo and enabling countries to escape international trade obligations.

On Thursday the head of Qatar's WTO office told Reuters that his country was exploring all legal avenues to challenge the "blockade", including a complaint to the WTO.

He said that a national security defence could be challenged on the grounds of necessity and proportionality.

The feud erupted this month when Qatar's three Gulf neighbours, together with Egypt, severed diplomatic and travel links with Doha, accusing it of supporting terrorism and regional foe Iran. Qatar denies the accusations.

Qatar, which had asked for the issue to be discussed at the Council on Trade in Goods, following a similar debate at the Council on Trade in Services earlier this month, said the restrictions affected commercially important sectors such as aluminium.

The UAE's representative said there were treaties against the funding of activities that threaten other countries' national security, and warned against the WTO intervening in the matter, the official who attended the meeting said.

Egypt's representative also said the measures fell under "exceptional circumstances" and were therefore consistent with WTO rules.

A U.S. trade diplomat said that all parties should remain open to negotiations, the trade official said, and that the United States would not get ahead of current diplomatic discussions and would continue to support the mediation efforts of the Emir of Kuwait.

Turkey's representative at the meeting said Turkey hoped for a quick resolution, emphasising "hundreds years of fraternal and strong ties" among the countries involved.

(Reporting by Tom Miles; Editing by Ralph Boulton)


          Exclusive: India presses Microsoft for Windows discount in wake of cyber attacks   

By Euan Rocha

MUMBAI (Reuters) - India is pressing Microsoft Corp to offer a sharply discounted one-time deal to the more than 50 million Windows users in the country so that they can upgrade to the latest Windows 10 operating system in the wake of ransomware attacks.

Microsoft officials in India have "in principle agreed" to the request, Gulshan Rai, India's cyber security coordinator, told Reuters over the phone on Friday.

A spokeswoman for Microsoft in India declined to comment on the matter. Officials at the company's headquarters in the United States and regional headquarters in Asia also declined to comment.

If Microsoft agreed to such a discount, it could open up the global software giant to similar requests from around the world. Rai said the government was in talks with Microsoft management in India. It is not immediately clear whether any other countries were seeking similar deals.

Rai said India began talks with Microsoft after the WannaCry ransomware attack last month, noting that both WannaCry and this week's attack, dubbed by some cyberexperts "NotPetya", exploited vulnerabilities in older iterations of the Windows OS.

"The quantum of the price cut, we expect some detail on in a couple of days," Rai said, adding the Indian government expected the company to offer the software at "throw-away prices."

"It will be a one-time upgrade offer to Windows 10 and it will be a discounted price for the entire country," said Rai, who was hand-picked by Indian Prime Minister Narendra Modi to be the country's first cyber security chief.

Rai declined to be more specific, but said he was confident that it would be "less than a quarter of the current price."

Rai, who has over two decades of experience in different IT areas including cyber security, said his team began coordinating with government agencies and regulators to push for OS upgrades soon after the WannaCry attack began on May 12.

The government's quick action helped minimize the impact of the NotPetya attack, which affected two of India's container port terminals, he said.

The government has also worked with banks to ensure that some 200,000 of the more than 240,000 ATMs in the country, most of which run on older Windows XP systems, have been upgraded with security patches released by Microsoft following the WannaCry attack, Rai said.

This is just an interim solution, however, said Rai, because although the patches fix vulnerabilities in older OS versions, they retain the limitations of those versions.

"New OS versions have different architecture, much improved architecture and much more resiliency," said Rai.

PRICE-SENSITIVE

Windows 10 Home currently retails for 7,999 rupees ($124) in India, while the Pro version of the software typically used by large companies and institutions costs 14,999 rupees ($232).

Roughly 96 percent of an estimated 57 million computers in India currently run on Windows, according to Counterpoint Research. Apple- and Linux-based systems account for the rest.

Given that only a small minority of Windows users in India already have Windows 10, Microsoft could be forgoing several billion dollars of potential revenue if they agreed to sell just the more widely used Home version of Windows 10 at a quarter of its current Indian retail price.

In the price-sensitive Indian market, people using computers in households or small businesses often do not upgrade their OS given the steep costs. The wide use of pirated Windows OS versions, which would not automatically receive security patches, exacerbate the vulnerabilities.

In light of the attacks, Rai said, the government "wants to incentivise the common man to upgrade their systems".

The WannaCry attack in May affected a state-run power firm in western India, while the NotPetya attack this week crippled operations at two port terminals in India operated by shipping giant AP Moller Maersk, which was affected globally.

($1 = 64.5175 Indian rupees)

(Additional reporting by Sankalp Phartiyal in Mumbai, Salvador Rodriguez in San Francisco and Jeremy Wagstaff in Singapore; Editing by Sonya Hepinstall)


          Analysis: "Bad" foreign firms drive U.S. manufacturing jobs revival   

By Lesley Wroughton and Howard Schneider

SPARTANBURG/CHARLESTON, South Carolina (Reuters) - Years before Donald Trump began promising to bring back good manufacturing jobs by getting tough with U.S. trade partners, such jobs have already been on the rise, largely thanks to foreign companies now cast as villains in Trump's narrative.

Reuters analysis of federal jobs data shows that out of 656,000 new manufacturing jobs created between 2010 and 2014, two thirds can be attributed to foreign direct investment.

More recent jobs numbers are not yet available, but over $700 billion in foreign capital has poured in over the last two years bringing total foreign investment to $3.7 trillion at the end of 2016, a world record. (Graphic: http://tmsnrt.rs/2sWkzTB)

Now foreign companies that have spent billions of dollars on U.S. factories and local leaders who host them worry that global supply networks that back those investments will fray if Trump makes good on his pledge to roll back trade liberalization.

The U.S. president has threatened to tear up North American Free Trade Agreement with Canada and Mexico and slap higher tariffs on nations that run trade surpluses with the United States, such as Germany or China. The administration is also discussing tighter immigration rules and more security screening of investment.

The tough message helped sway swing northeastern and Midwestern Rust Belt states Trump's way in the 2016 election, but puts him at odds with companies and local leaders in the south, which has driven the recent growth in manufacturing jobs.

The southern states have voted for Trump, but have also spent decades wooing foreign companies with flexible labor laws, financial incentives and investment in ports, roads and other infrastructure.

POSTER CHILD AND WHIPPING BOY

The courtship has spawned new auto plants from Kentucky to Georgia, and a new Airbus plant in Mobile, Alabama.

Few places highlight the gap between Trump's rhetoric and local aspirations better than Spartanburg in South Carolina.

German carmaker BMW has invested here $8 billion in a 1.2 million square foot (11.15 hectares) assembly plant, which has become the largest single exporter of cars by value from the United States.

South Carolina Governor Henry McMaster, a Republican and Trump supporter, credits the German automaker for putting his state on the global investment map.

"The presence of this company changed everything in the trajectory of our state," McMaster said on Monday at an event unveiling BMW's newest X3 sports utility vehicle.

Its Chief Executive Harald Krueger said the carmaker would invest additional $600 million in Spartanburg over the next four years, adding 1,000 jobs to the 9,000-strong workforce, and spend further $200 million on employee training and education.

But the poster child of South Carolina's success also doubles as a whipping boy. In January, BMW's plans to build a plant in Mexico drew Trump's ire and last month the U.S. president was quoted as saying Germany was "very bad" on trade and selling too many cars in the United States.

And even as the company highlights its contribution to the U.S. economy and the benefits of free trade, it is hedging its bets by preparing for a possible protectionist backlash.

Outside of the spotlight, BMW is retooling factories in South Africa and China to build volume models like the X3 SUV, reducing its dependence on Spartanburg.

“We have a big footprint here, and we are flexible enough," Oliver Zipse, BMW's board member responsible for manufacturing, told Reuters. "We will build the X3 not only in Spartanburg, we will split it into South Africa and then to China, so we will have some flexibility to produce cars somewhere else,” he said.

“If something happens at the political level - which we don’t know yet - we are able to have a flexible response.”

The Trump administration has said it welcomes foreign investment and Secretary of Commerce Wilbur Ross, who spoke at an opening of a new Samsung Electronics <005930.KS> plant in South Carolina, said such projects showed that "America is becoming an even stronger destination for global businesses looking to grow.”

The southern U.S. states owe much of their success to coastal port authorities and cities that have invested heavily to make their channels and docks fit for shipments to and from China and Mexico.

Senator Lindsey Graham, a Republican from South Carolina who has often clashed with Trump, said protectionism would undermine those accomplishments and hurt American workers.

DOOMSDAY SCENARIO

"Negotiate a trade agreement with Europe, modernize NAFTA, don't tear it up," Graham told Reuters at the BMW factory. "We're going in the wrong direction. We need more trade agreements, not less."

Graham noted how low-cost competition from China and Mexico destroyed South Carolina's once thriving textile industry and how the state reinvented itself as a manufacturing hub, bringing the likes of BMW or French tire maker Michelin .

The now humming port city of Charleston has a similar story to tell. When a major navy base shut down in the 1990s wiping out 20,000 jobs, local officials worked to bring foreign manufacturers, which now employ around 10,000 in the three counties around the city and more is set to come.

Mercedes-Benz, part of Daimler AG , is adding 1,300 jobs so it can make its Sprinter van here rather than merely assemble it with imported parts, which also means more business for local suppliers.

Up the road, Volvo Car Group, part of Chinese conglomerate Geely, is due to open its first North American plant next year with a target workforce of 2,000.

Local development officials expect more jobs and investment to come, but worry that some steps discussed by the Trump administration could have a chilling effect.

Claire Gibbons, director of global marketing at the Charleston Regional Development Alliance, said the proposed new tariffs, tougher immigration rules and stricter reviews of foreign investment projects would amount to a "doomsday scenario" for the region.

"This is an education opportunity for us all, for the people making the decisions that don't understand the ramifications."

(1 euro = $1.1350)

(Additional reporting by Edward Taylor in Munich. Editing by David Chance and Tomasz Janowski)


          Global shipping feels fallout from Maersk cyber attack   

By Jonathan Saul

LONDON (Reuters) - Global shipping is still feeling the effects of a cyber attack that hit A.P. Moller-Maersk two days ago, showing the scale of the damage a computer virus can unleash on the technology dependent and inter-connected industry.

About 90 percent of world trade is transported by sea, with ships and ports acting as the arteries of the global economy. Ports increasingly rely on communications systems to keep operations running smoothly, and any IT glitches can create major disruptions for complex logistic supply chains.

The cyber attack was among the biggest-ever disruptions to hit global shipping. Several port terminals run by a Maersk division, including in the United States, India, Spain, the Netherlands, were still struggling to revert to normal operations on Thursday after experiencing massive disruptions.

South Florida Container Terminal, for example, said dry cargo could not be delivered and no container would be received. Anil Diggikar, chairman of JNPT port, near the Indian commercial hub of Mumbai, told Reuters that he did not know "when exactly the terminal will be running smoothly".

His uncertainty was echoed by Maersk itself, which told Reuters that a number of IT systems were still shut down and that it could not say when normal business operations would be resumed.

It said it was not able to comment on specific questions regarding the breach of its IT systems or the state of its cyber security as it had "all available hands focused on practical stuff and getting things back to normal".

The impact of the attack on the company has reverberated across the industry given its position as the world's biggest container shipping line and also operator of 76 ports via its APM Terminals division.

Container ships transport much of the world's consumer goods and food, while dry bulk ships haul commodities including coal and grain and tankers carry vital oil and gas supplies.

"As Maersk is about 18 percent of all container trade, can you imagine the panic this must be causing in the logistic chain of all those cargo owners all over the world?" said Khalid Hashim, managing director of Precious Shipping, one of Thailand's largest dry cargo ship owners.

"Right now none of them know where any of their cargoes (or)containers are. And this 'black hole' of lack of knowledge will continue till Maersk are able to bring back their systems on line."

BACK TO BASICS

The computer virus, which researchers are calling GoldenEye or Petya, began its spread on Tuesday in Ukraine and affected companies in dozens of countries.

Maersk said the attack had caused outages at its computer systems across the world.

In an example of the turmoil that ensued, the unloading of vessels at the group's Tacoma terminal was severely slowed on Tuesday and Wednesday, said Dean McGrath, president of the International Longshore and Warehouse Union Local 23 there.

The terminal is a key supply line for the delivery of domestic goods such as milk and groceries and construction materials to Anchorage, Alaska.

"They went back to basics and did everything on paper," McGrath said.

Ong Choo Kiat, President of U-Ming Marine Transport, Taiwan's largest dry bulk ship owner, said the fact Maersk had been affected rang alarm bells for the whole shipping industry as the Danish company was regarded as a leader in IT technology.

"But they ended up one of the first few casualties. I therefore conclude that shipping is lacking behind the other industry in term of cyber security," he said.

"How long would it takes to catch up? I don't know. But recently all owners and operators are definitely more aware of the risk of cyber security and beginning to pay more attention to it."

In a leading transport survey by international law firm Norton Rose Fulbright published this week, 87 percent of respondents from the shipping industry believed cyber attacks would increase over the next five years - a level that was higher than counterparts in the aviation, rail and logistics industries.

VULNERABLE

Apart from the reliance on computer systems, ships themselves are increasingly exposed to interference through electronic navigation devices such as the Global Positioning System (GPS) and lack the backup systems airliners have to prevent crashes, according to cyber security experts.

There were no indications that GPS and other electronic navigation aids were affected by this week's attack, but security specialists say such systems are vulnerable to signal loss from deliberate jamming by hackers.

Last year, South Korea said hundreds of fishing vessels had returned early to port after its GPS signals were jammed by North Korea, which denied responsibility.

"The Maersk attack raises our awareness of the vulnerability of shipping and ports to technological failure," said Professor David Last, a previous president of Britain's Royal Institute of Navigation.

"When GPS fails, ships' captains lose their principal means of navigation and much of their communications and computer links. They have to slow down and miss port schedules," said Last, who is also a strategic advisor to the General Lighthouse Authorities of the UK and Ireland.

A number of countries including the UK and the United States are looking into deploying a radar based back up navigation system for ships called eLoran, but this will take time to develop.

David Nordell, head of strategy and policy for London-based think tank, the Centre for Strategic Cyberspace and Security Science, said the global shipping and port industries were vulnerable to cyber attack, because their operating technologies tend to be old.

"It's certainly possible to imagine that two container ships, or, even worse, oil or gas tankers, could be hacked into colliding, resulting in loss of life and cargo, and perhaps total loss of the vessels," Nordell said.

"Carried out in a strategically sensitive location such as the Malacca Straits or the Bosphorus, a collision like this could block shipping for enough time to cause serious dislocations to trade."

SECRETIVE INDUSTRY

Cyber risks also pose challenges for insurance cover.

In a particularly secretive industry, information about the nature of cyber attacks is still scarce, which insurance and shipping officials say is an obstacle to mitigating the risk, which means there are gaps in insurance cover available.

"There has been a lot of non-reporting (of breaches) on ships, and we’re trying efforts where even if there could be anonymous reporting on a platform so we can start to get the information and the data," said Andrew Kinsey, senior marine consultant at insurer Allianz Global Corporate & Specialty.

There is also a gap in provision, because most existing cyber or hull insurance policies - which insure the ship itself - will not cover the risk of a navigation system being jammed or physical damage to the ship caused by a hacking attack.

"The industry is just waking up to its vulnerability," said Colin Gillespie, deputy director of loss prevention with ship insurer North.

"Perhaps it is time for insurers, reinsurers, ship operators and port operators to sit down together and consider these risks in detail. A collective response is needed - we are all under attack."

(Additional reporting by Jacob Gronholt-Pedersen in Copenhagen, Keith Wallis and Carolyn Cohn in London, Euan Rocha in Mumbai, Miyoung Kim in Singapore, Alexander Cornwell in Dubai, Michael Hirtzer in Chicago, Noor Zainab Hussain in Bangalore, Adam Jourdan and Shanghai newsroom; Editing by Pravin Char)


          Retail Sales Associate, Colorado Springs, CO   
CO-Colorado Springs, CenturyLink (NYSE: CTL) is a global communications and IT services company focused on connecting its customers to the power of the digital world. CenturyLink offers network and data systems management, big data analytics, managed security services, hosting, cloud, and IT consulting services. The company provides broadband, voice, video, advanced data and managed network services over a robust 265,
          6/30/2017: WORLD OF WORK: ‘Whatever you are doing, do it well’   

With an engineering degree and eight years’ experience working in product design for ACT, Peter O’Connor set up his own busyness, Global Security Devices, in 2006. His timing could have been better, he admits. Eleven years on the Tallaght-based...
          Re: Summer Begins in Cleveland With Shootout at Bump Taylor Field, and Calls for Change Ring Out in Glenville   
For too many alleged civic leaders -- the vital security zone is the central downtown area that is a smiley suburban playground.....for everyone else -- good luck and remember that police response time is not all that good.
Posted by LakeErieSeaGulls
          Statewide Survey: Californians and Their Government   
032317CAGSurvey

About the Program
PPIC's latest survey examines Californians' views on President Trump and Congress, as well as their preferences on immigration policy, terrorism and security, and government regulation. It also covers state issues, including attitudes toward elected officials, high-speed rail, and water infrastructure. PPIC researcher Dean Bonner will outline these and other key findings.

This research was supported with funding from the James Irvine Foundation, the California Endowment, and the PPIC Donor Circle.

The post Statewide Survey: Californians and Their Government appeared first on PPIC.


          Directory Services Administrator   
CO-Colorado Springs, Job Description Duties : Shall locally and remotely operate, configure, administer, troubleshoot, manage, and maintain AFIN directory and authentication services. Providing Tier 2 technical support for all AFIN directory and authentication servers and appliances Providing centralized management of the AF Active Directory (AD) and Windows environments to include administration, security, authentica
          Call: 8373982035 Girls PG in Gurgaon at Affordable Prices (157 Sector 56, Near Huda Market & Metro Statio)   
We provide best PG in Gurgaon with Fully Furnished Paying Guests Accommodation for Girls is available for rent. Our facilities available just telephone, internet, Laundry Service, housekeeping, safety & security etc.Within a safe and secured premises,...
          Survive The Deep End: PHP Security   
Un muy buen recurso para aquellos que usen PHP. Material bastante interesante.
          Re: Fitzgerald family of Adams Co.,Pa.   
I’m not related to any member of this family.

NOTE -
There is a 20 yr. gap in the census records [1880 - 1900] as the 1890 census was burned in the 1920's. Add 20 yrs to everyone's 1880 age for the 1900 census.

Census records do not record the “specific locality” of a person’s birth.
Census records only record where a person was born – state or country.
Census records record where a person was living when the census taker came by.

1940 is the last available census at this time.

Facts you should know about the early census records –

All census records [1790 – 1840] prior to the 1850 census ONLY listed the head of household; whether male or female.

NO specific age was stated for any family member
NO place of birth was stated – city, state, or country
NO city, town, or village is stated – only the county; however some census takers listed the township
NO street address was stated
NO marital status was stated – single, married, widowed, or divorced
NO family relationship was stated – brother, sister, cousin, son, daughter, wife, inlaw, etc…
NO occupation was stated
NO parental birthplaces are stated
NO race was stated [but assume “white”]

1850, 1860 & 1870 census records do not show family relationships, marital status or parental birthplaces.

Step children are not enumerated as “step” children
Adopted children are not enumerated as “adopted”
Grand children are not enumerated as “grand children”
Orphaned children were not enumerated as "orphan"
Immigration date is not recorded

1850 is the 1st census that shows all family members with their birthplaces

1880 is the 1st census that shows parental birthplaces and family relationships +++


Try Vital Records – Birth, Marriage, & Death, Social Security Info, Census Records – FREE ALL STATES
http://search.labs.familysearch.org/

          (IT) Architect - Cyber Security - Contract - London   

Location: London   

An exciting FinTech start-up focused on the Financial sector is currently looking for an experienced Architect to join and support the Cyber Security team. The role will focus on design and architecture across all aspects of cyber-security. In order to be considered for this role, as an experienced cyber-security architect, you will have had experience of: Authentication, authorisation and application security; Cryptography and PKI Network security (with a focus on cloud); Multiple detection systems exposure; Mobile and web security; and Payments systems The cyber-security architect will be able to demonstrate hands on technical strength as well as the ability to engage with multiple stakeholders across all necessary teams. For more information and a confidential discussion, please apply with an updated CV.
 
Type: Contract
Location: London
Country: UK
Contact: Michael Nsiah
Advertiser: Trilogy International
Email: Michael.Nsiah.FF5BE.42DF2@apps.jobserve.com
Start Date: ASAP
Reference: JSARC30

          (IT) Security Analyst - SIEM tools   

Rate: Market Day Rate   Location: London   

Security Analyst required for 10 week contract in Inner London to develop plans to safeguard computer files against accidental or unauthorised modification, destruction, or disclosure and to meet emergency data processing needs. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. Monitor current reports of computer viruses to determine when to update virus protection system. Modify computer security files to incorporate new software, correct errors, or change individual access status. Coordinate implementation of computer system plan with establishment personnel and outside vendors. Experience required: Experience working with Security Incident and Event Management (SIEM) tools Significant experience of system operational security, network and/or application security Technical knowledge in security engineering, system and network security, (authentication and security protocols, cryptography), operation of a PKI, and application security Knowledge of system security vulnerabilities and remediation techniques Analytic skills to understand security implications of technical events Extensive troubleshooting and research skills with a positive and proactive approach to customer service and getting things done Strong experience working in an operational role in a secure environment Knowledge of network and web related protocols (eg TCP/IP, UDP, IPSEC, HTTP, HTTPS, routing protocols) Strong Scripting skills in at least one of the following is highly desirable: Ruby, Python, Shell (bash, ksh, csh). Working knowledge of Linux Clearance Level Required: BPSS (DS) - Baseline Personnel Security Standard (with a Disclosure Scotland) IR35 Scope: Outside If deemed inside IR35 - Please note that the client has determined that the off-payroll working rules will apply to this assignment and where a worker elects to provide their services through an intermediary (such as a personal services company) then income tax and primary national insurance contributions will be deducted at source from any payments made to the intermediary. If deemed outside IR35 - Please note that the client has determined that the off-payroll working rules will not apply to this assignment. CV closing date is Friday 30th June at 3.00 pm. GSA Techsource Ltd operates as an Employment Agency when recruiting for permanent vacancies, and an Employment Business when recruiting for contract vacancies. All contract rates quoted are to Ltd companies.
 
Rate: Market Day Rate
Type: Contract
Location: London
Country: UK
Contact: Jackie Dean
Advertiser: GSA Techsource Ltd
Start Date: July 2017
Reference: JSJD/C/16866

          (IT) Security Developer - Cryptography   

Location: Northern Germany   

Security Developer - Cryptography Task: Work in German/Japanese projects with a focus on the development of security and safety functions for In Vehicle Infotainment systems Requirement engineering, architecture and design of the corresponding components Implementation in the team and protection function and quality up to product maturity Skills: Very good degree in (technical) computer science or electrical engineering Experience in embeded Linux, cryptography Professional experience in security, especially 'Secure Linux' necessary Very good C/C ++ programming skills, Self-employed and goal-oriented work, teamwork Very good knowledge of English. Willingness to international project work, travelling (Japan, India)
 
Type: Contract
Location: Northern Germany
Country: Germany
Contact: Simon Gould
Advertiser: Jet Consulting
Email: Simon.Gould.BB38B.0A016@apps.jobserve.com
Start Date: ASAP
Reference: JSSG_SECDEV

          Sonatype Acquires Vor Security to Expand Nexus Open-Source Component Support   

Sonatype announced the acquisition of Vor Security to extend their open-source component intelligence solutions’ coverage to include Ruby, PHP, CocoaPods, Swift, Golang, C, and C++.

By Helen Beal
          Article: Developing a Secure and Scalable Web Ecosystem at LinkedIn   

LinkedIn’s hyper-growth placed strains on the organization’s infrastructure. A new release model was instrumental to scale and led to increased code quality, security, and member satisfaction.

By James Baker
          Presentation: Building Secure Player Experiences at Riot Games   

David Rook talks about the Riot Games Application Security program and how they define Application Security at Riot, how they’ve grown to meet the demands of their fast paced engineering organization, why they’ve hired software engineers into their team and the tools they’ve developed to help Rioters globally build fun and safe experiences for their players.

By David Rook
          Safely increasing your sales with IULS   

If you’re looking for a product that offers death benefit protection and the opportunity to build long-term cash value accumulation, an Indexed Universal Life (IUL) may fit your needs. Learn how an IUL policy will provide security today with the cash value growth potential you need for tomorrow.

Learn how now!



Request Free!

          African Governments Lead the Way on Data Revolution   

Millions to benefit from commitments that include: data-led agriculture plans to build food resilience and security, a birth registration drive using SMS and web to widen access to healthcare and...

(PRWeb June 29, 2017)

Read the full story at http://www.prweb.com/releases/2017/07/prweb14473188.htm


          This Week in Security News   
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for...
          HIRA ivory silver lace satin faux pearls beaded diamanté crystal rhinestones wrist corsage cuff bracelet shabby chic vintage wedding. by Pebblesaccessorise   

23.00 GBP

It will sparkle like diamonds 💎

This very sparkle wrist cuff bracelet is encrusted with many light reflecting glass jewels in clear with ivory round faux pearl beads and hand sewn 15 mm wide double satin ribbon in ivory which is long enough to be tied in a small bow.

It measures 4 1/2 inches long x 2 1/2 inch wide.

In the ends of the ribbons I've hand sewn some glass jewels for an elegant finishing touch.

There's also hand sewn lace at the back with the top layer being lightly hot glued on for more security.

Could be worn to weddings, parties or even formal events as they look so elegant when worn.

I take a lot of time, effort and loVe in producing all my items with nothing an my mind apart from the piece I'm working on.

All items are hand made by myself. I do not hire anyone in any step of production.

Please check out my shop for more accessories for weddings and parties.

Thanks for your valued visit.


          Charting Russia’s most dangerous cities for LGBT people   

Here are the towns where it’s dangerous to be gay in Russia. A culture of silence and a law “against propaganda” are keeping them that way. Русский

An LGBT pride parade in St Petersburg, 2014. Photo CC BY-NC-ND 2.0: Maria Komarova / Flickr. Some rights reserved.

It’s become a tradition across the globe to celebrate LGBT Pride in the last days of June. Usually, such events are held on the weekend closest to the 28 June, as it was on that day that the modern LGBT movement in the USA began in earnest. It was an initiative that inspired strategies and tactics of human rights advocacy in many other countries. Although it takes different forms across the world, LGBT pride raises issues of freedom of expression, human rights, and healthcare for LGBT people. In some cities Europe and the USA it has turned into something of a commercial event or cultural festival for the wider public. In other locations, LGBT people march under the threat of police brutality.

In Russia, the first LGBT pride march was held in 1991 on the square before Moscow’s Bolshoi theatre as part of the Soviet Union’s first LGBT festival. The more modern history of LGBT parades in Russia began in 2006 when LGBT activist Nikolay Alekseyev attempted to officially organise a pride march in Moscow. Years passed, and the city authorities still haven’t found the guts to permit a march for LGBT human rights through the capital’s streets and provide security for its participants. However, other banned marches have been successfully challenged in the European Court for Human Rights and Alekseyev has generated support in other regions of the country. He and his colleagues have applied for permission to hold pride marches in Blagoveshchensk, Cherkessk, Cherepovets, Kazan, and Nizhny Tagil among many other cities across Russia, though they have always been rejected and sued city governments in response. A notable exception came in 2013, when the governor of St Petersburg did not forbid the city’s LGBT pride parade, although it did encounter violently homophobic protesters who tried to obstruct the march.

The metrics of hatred

In fact, these violent far-right groups keep close tabs on LGBT activists in Russia and the events they hold – or try to. While the government fights some homophobic campaigners and inciters of hatred, it supports others. After all, instigating violence against LGBT people is essentially the Russian state’s official policy towards sexuality. For example, the 2013 law banning “propaganda” of “non-traditional sexual orientations” sparked a wave of hatred against LGBT people across the country. As we discovered from court decisions last year, after the “propaganda” bill was signed into law, the number of hate crimes against lesbians and gay men doubled. 

In 2012, we found 33 examples of such hate crimes, while 2013 saw 50 hate crimes against LGBT citizens. By 2015 there were 65. We registered not only a common rise of LGBT hate crimes, but also the rise of homicides: following the enactment of the “propaganda” bill, there were more and more murders of people simply for being LGBT.

The growth in hate crimes against LGBT people across Russia. Image courtesy of the authors.

Of course, these are only the recorded crimes – many LGBT people may not dare approach the authorities after harassment, humiliation, or worse. These data are based on official court statistics, though we had to dig through the results ourselves. Nobody officially collects information on violence against LGBT people in Russia. On the contrary, the authorities pretend that nothing is happening. This attitude sometimes reaches absurd extremes when government officials claim that LGBT citizens simply do not exist.

After facts came to light about the systematic torture of gay men at secret detention camps in Chechnya, the republic’s press secretary immediately retorted that “you cannot repress those who are not and cannot be here in the Chechen Republic.” Despite the justified focus on Chechnya, these claims are hardly specific to one culture or region within the Russian Federation – officials in other regions speak in much the same manner. For example, the mayor of Svetogorsk in Leningrad Region declared his city “free from gays.” He subsequently argued that LGBT issues and rights are irrelevant there, neither an LGBT community nor LGBT people exist in the small city.

This imagined absence of LGBT people constitutes an active policy of silencing and excluding some citizens from the wider national community on the grounds of their sexuality

This imagined absence of LGBT people constitutes an active policy of silencing and excluding some citizens from the wider national community on the grounds of their sexuality. These comments certainly reinforce existing prejudices and reproduce violence against vulnerable groups. But what is the real picture? Let’s say that the authorities of a Russian city actually permitted an LGBT march to go ahead? Would these violent protectors of a false morality then take to the streets to fight those marching, to stop their fellow citizens expressing their point of view and standing up for their rights?

It depends on where you are. In other words, how dangerous is it to be gay in different Russian cities?

A “sexual stratification” of Russian cities

Media doesn’t simply inform society about current affairs; it also provides frames for understanding social problems, rendering some topics more important than others by virtue of generating discussion around them. Violence against LGBT people may be a key cause for concern in the human rights movement, but that urgency is lost in public discussions.

But media can also remedy societies from oblivion by sharing stories which are otherwise forgotten or ignored, and spark positive change. For example, the murder of gay teen Matthew Sheppard was one of the most publicised hate crimes in the US history. The furore in the press eventually led to changes in hate crime law.

One of the effects of Russia’s “propaganda” law was not simply the rise in violence against LGBT people. It also led to more frequent ewspaper publications on LGBT topics, hence public discussion on a topic which still remains taboo for many people. This was not entirely what legislators intended. We benefitted from this situation by researching the details and contexts of violence against LGBT in Russia as they were reported in media. The Sexuality Lab studied almost 4,500 media publications about violence against LGBT people in Russia between 2011 and 2016. We categorised all newspaper articles in accordance with the sexuality of the victims reported and the locations of crimes committed. All cities were then classified by population, making it possible for us to calculate an index of safety for every urban settlement.

The data reveal that the most dangerous places for LGBT people are villages in the countryside and small towns with a population below 100,000: they are characterised by the highest rates of violence against LGBT people per 1,000 persons. The safest locations are the largest cities (Moscow and St Petersburg): despite the greater number of crimes against LGBT in these cities, their relative indexes are actually the lowest. This can be explained by understanding the circumstances of these hate crimes.

Statistically, a gay person is safer in St Petersburg than in a smaller city like Nizhnevartovsk

Very often, hate crimes are committed as soon as perpetrators learn about the victim’s sexuality, which is usually revealed in a conversation in a private space over a drink or meal. These social gatherings occur more frequently in smaller settlements, because that way of life is simply more common there: there are fewer bars to go to, fewer crowds to blend into, and more free time to kill. People drink alcohol and talk about their personal lives as there’s no other way to spend one’s spare time. Alhough many people in Russia actually do not give a damn about LGBT issues, some still react violently to a person’s coming out – and such reactions are more common in smaller towns and cities.

The graph below shows incidents of violence against LGBT people in different towns and cities of Russia. We compare capital cities, big cities (of 500,000 people and above) and smaller cities (of between 100-500,000 people). This graph shows that the smaller a city, the bigger the probability of violence against LGBT people. Statistically, a gay person is safer in St Petersburg than in a smaller city like Nizhnevartovsk. This could explain why the mayor of Svetlogorsk thinks there are no gay men in his town – anybody with half a mind in that position would leave the place as soon as they felt threatened. 

Violence and hate crimes against LGBT people across Russia, by city size. Image courtesy of the author.

These results aren’t surprising; they just prove once again that homophobia is on the rise in Russia and that hate crimes are supported in its remote regions. We have based our claims on a survey of media publications, which limits the whole picture only to material in the public domain. As a result, there will be many hate crimes which went unreported, and some remote regions not covered in our media survey. However, it is no exaggeration to say that there are parts of the country which are simply not safe for LGBT citizens.

One of the ways to protect oneself is to keep silent about one’s sexuality, concealing it from the public in order not to become a victim of violence. So this secrecy around the existence of homosexuals is reinforced not only by political decisions, but also by individual moves as many LGBT people opt to hide their sexuality. While their response contributes to a culture of silence, they cannot and must not be blamed for it – simply put, they fear for their lives.

The LGBT pride parades pursue a radically different approach: a public and full-throated political demand to recognise that LGBT people exist. Do our data confirm that Russian cities are not ready to host such events on their territories? If our goal is to fight the silence, the data show exactly the contrary: as long as anybody suffers and is killed because of their sexuality, it is important to shout at the top of our voices to try and stop the murders and political climate in which they are tacitly tolerated. Human rights marches across towns and cities of all sizes are one way of articulating this; a means to make violence visible and demand that it stop.

Sideboxes
Rights: 
CC by NC 4.0

          Download B05 Update for ZTE Axon 7 [A2017G][Europe]   

Latest Android 7.1.1 Nougat based B05 Update for ZTE Axon 7 starts rolling out in Europe. The B05 update for ZTE Axon 7 is available for European A2017G variants which bring June Security Patch...

The post Download B05 Update for ZTE Axon 7 [A2017G][Europe] appeared first on STechGuide.


          Remove NewTabSearch (working guide)   

NewTabSearch – What is it? Is NewTabSearch legit? What is it? How to remove NewTabSearch from PC? We wrote the article to explain users how to delete the nasty program as soon as possible. The guide includes screenshots and detailed removal instructions. Please, continue reading. Security experts consider NewTabSearch as … Continue reading

The post Remove NewTabSearch (working guide) appeared first on Malware Removal Solution.


          Food4Patriots 3-Month Supply   

Enjoy real food security and peace of mind with our best-selling Food4Patriots 3-Month Kit. You’ll get a delicious variety of meal selections for breakfast, lunch and dinner. It’s never been easier to protect your family when a crisis hits (and you know it will) than with our survival food kits, good for an astonishing 25 years! Some of the meals you’ll enjoy include: Strawberry Fields Cream of Wheat, Liberty Bell

The post Food4Patriots 3-Month Supply appeared first on Food4Patriots Review.


          Food4Patriots 4-Week Kit   

For those folks wanting solid food security, try our Food4Patriots 4-Week Kit. It’s chock full of delicious meals that’ll really “stick to your ribs!” Some favorites include: Maple Grove Oatmeal, Country Cottage Mac & Cheese, Sweetly Coated Banana Chips, and Chocolate Pudding. As with all our Food4Patriots survival food kits, the 4-Week kit has a shelf life of 25 years, and comes packaged in re-sealable Mylar pouches, tucked into stackable totes.

The post Food4Patriots 4-Week Kit appeared first on Food4Patriots Review.


          Food4Patriots 1-Year Kit   

  Get the ultimate in survival food security. With Food4Patriots 1-Year supply, you get a whopping 1800 servings of the most delicious, nutritious long-term emergency food on the market. You’ll enjoy an amazing variety of easy to prepare favorites like: Maple Grove Oatmeal, Traveler’s Stew, and Traditional Fettuccine Alfredo. One of these kits for every member of your household will give you true disaster-proof peace of mind. With your Food4Patriots

The post Food4Patriots 1-Year Kit appeared first on Food4Patriots Review.


          U.N. to Reduce Peacekeepers in Darfur Region of Sudan   
The Security Council voted to withdraw more than a third of the nearly 19,000 peacekeepers in the volatile region.
          IoT forecasts come into focus   
For years now there has been forecast after forecast predicting the size of the IoT market by the end of the decade or ten years hence. There is always a big number of connected things and impressive valuation for the sum of the whole market, and with the large mobile operators such as AT&T and Verizon now including connected things in their quarterly reports there is hard data to back up the rosy forecasts. At an editorial briefing in San Jose last month, Qualcomm executives said it is now shipping one million wireless connections per day - this certainly gives a perspective on how fast IoT can grow. The company has hundreds of OEM design wins for its MDM9206 LTE modem for IoT.

As of June 15th, the GSMA Intelligence services says there are 8,132,111,132 mobile connections, including M2M. The GSMA's online tracker further reports 5,016,263,289 unique mobile subscribers, which are assumed to mean people with at least one mobile phone and SIM card. By subtraction, this means 3.1 billion M2M connections tracked by the GSMA via their mobile operator members.

This piece collects newly published data from several sources. First, IDC recently reported that worldwide spending on the IoT will reach nearly $1.4 trillion in 2021. Second, the Cisco Visual Network Index (VNI) found that M2M connections globally will grow from 780 million in 2016 to 3.3 billion by 2021, a 34% CAGR or fourfold growth. Third, the newly published Ericsson Mobility Study finds that 70% of wide-areas IoT devices will use cellular technology in 2022. While studies from different authors will never precisely line up, this collection of data agrees that real and significant revenue from IoT for carriers has started to materialize and will grow quickly in the near term.

Highlights from IDC’s Worldwide Semi-annual IoT spending guide

The first big finding to notice in IDC's report is that worldwide spending on IoT will reach $800 billion this year, up 16.7% year over year, which means that the market this month must be worth tens of millions of dollars. These numbers are spread out amongst the hardware, software, services and connectivity that enable the IoT. This means splitting the pot between vendors such as Qualcomm, Sierra Wireless, Cisco Jasper, integration specialists, and of course carriers such as AT&T, Orange and Vodafone. There are many others that could be included on this list, especially when considering the global market.  In that sense, the $800 billion is just a starting point. IDC's forecast says that by 2021, global IoT spending will total nearly $1.4 trillion. In a press release announcing the study, IDC's Carrie MacGillivray, vice president, Internet of Things and Mobility, stated that the true value of IoT is realised when the software and services come together to enable the capture, interpretation, and action on data produced by IoT endpoints.

IDC breaks down 2017 investments in IoT as follows: manufacturing operations ($105 billion), freight monitoring ($50 billion), and production asset management ($45 billion), smart grid technologies for electricity, gas and water and smart building technologies ($56 billion and $40 billion, respectively). Looking to 2021, IDC expects these use cases will remain the largest areas of IoT spending. Smart home technologies are forecast to experience strong growth (19.8% CAGR) over the five-year forecast. The use cases that will see the fastest spending growth are airport facilities automation (33.4% CAGR), electric vehicle charging (21.1% CAGR), and in-store contextual marketing (20.2% CAGR).

IDC sees hardware as the largest IoT spending category to 2021, the last year of the forecast, when it is overtaken by the services category. This is to be expected as the various physical sensors and connectivity units must be deployed first before a service can be offered. IDC says hardware spending will be dominated by modules and sensors that connect end points to networks, while software spending will be similarly dominated by applications software. In addition, IDC says services spending will be about evenly split between ongoing and content services and IT and installation services. The fastest growing areas of technology spending are in the software category, where horizontal software and analytics software will have five-year CAGRs of 29.0% and 20.5%, respectively. Security hardware and software will also see increased investment, growing at 15.1% and 16.6% CAGRs, respectively.

Regional highlights:

•   Asia Pacific (excluding Japan, APeJ) will be the IoT investment leader throughout the forecast with spending expected to reach $455 billion in 2021.

•   The U.S. will be the second largest region with IoT spending reaching $421 billion in 2021.

•   Western Europe will reach $274 billion in 2021.

The IDC Worldwide Semiannual Internet of Things Spending Guide is quite comprehensive, covering IoT spending for 12 technologies and 54 use cases across 20 vertical industries in eight regions and 52 countries (for more details see here: http://www.idc.com/getdoc.jsp?containerId=prUS42799917).

Cisco looks wide with its VNI forecast

Generally speaking, Cisco's forecasts have tended to be the most optimistic. This year’s Cisco VNI indicates that its IoT coverage includes both M2M and emerging category of wearable IoT devices. M2M connections, which Cisco defines as home and office security and automation, smart metering and utilities, maintenance, building automation, automotive, healthcare and consumer electronics, are predicted to grow from 780 million in 2016 to 3.3 billion by 2021, a 34% CAGR or fourfold growth.

Wearable devices, which Cisco notes could connect and communicate to the network either directly through embedded cellular connectivity or through another device (primarily a smartphone) using WiFi, Bluetooth, or another technology, include such things as smart watches, smart glasses, heads-up displays (HUDs), health and fitness trackers, health monitors, wearable scanners and navigation devices and smart clothing. The Cisco VNI predicts that by 2021 there will be 929 million wearable devices globally, growing nearly threefold from 325 million in 2016 at a CAGR of 23%. By 2021, Cisco expects that 7% will have embedded cellular connectivity, up from 3% in 2016. As AR/VR headsets enter the market, they could start to have a tangible impact on mobile traffic.

Ericsson looks to short-range and wide-range IoT connectivity

The newly published Ericsson Mobility Report finds that at the end of 2016 there were around 0.4 billion IoT devices with cellular connections. Ericsson's study divides IoT into short-range and wide-area segments, and it provides some guidance as to how IoT is impacting the network. For instance, the report says use cases with VoLTE calls for IoT (Cat-M1) are starting to emerge. This could extend mobile voice service to IoT devices, an interesting possibility.

By 2021, Ericsson expects there will be 2.1 billion devices connected via LTE-M and NB-IoT networks, roughly a 30% CAGR from today. This trend has already started. This year, several prominent mobile operators have rolled out commercial LTE-M networks. For instance, in March, Verizon announced the commercial launch of its nationwide 4G LTE Category M1 (or Cat M1) network. The coverage spans 2.4 million square miles. Verizon will introduce low rate, multi-year plans to match the longer useful life of Cat M1 devices, including data plans that start at $2 per month per device, with customised options available for bulk activations and volume purchases. In May, AT&T followed suit by announcing the deployment of its nationwide LTE-M network ahead of schedule.


          Nokia – IP networks re-imagined   
Recently we have seen Cisco predict that busy hour global IP traffic will grow 4.6-fold (35% CAGR) from 2016 to 2021, reaching 4.3 Pb/s by 2021, compared to average Internet traffic that will grow 3.2-fold (26% CAGR) over the same period to reach 717 Tb/s by 2021. The latest edition of the Ericsson Mobility Report, released earlier this week, calculates that the total traffic in mobile networks increased by 70% between the end of Q1 2016 and the end of Q1 2017. And now, Nokia Bell Labs has just announced its own prediction: IP traffic will more than double in the next five years, reaching 330 exabytes per month by 2022 while growing at a 25% CAGR. The company anticipates that peak data rates will grow even faster at nearly 40% annually. Nokia Bell Labs also predicts that 3D/4K/UHD will experience a 4.79x growth from 2017 – 22, that wireless traffic will experience 7.5x growth from 2017 – 22, and that worldwide IoT devices to grow from 12bn in 2017 to 100bn in 2025.

Nokia unveils next gen networking processing engine

Nokia's processing engine sets the stage for perhaps the most significant announcement from the company since the merger of Alcatel-Lucent and Nokia Siemens Networks in 2015. In a press event entitled 'IP networks reimagined', Nokia unveiled its FP4 silicon, featuring the 'first' 2.4 Tbit/s network processor, up to 6x more powerful than processors currently available. The proprietary chipset is designed for a new class of petabit-class routers.

Core routers traditionally have been the 'big iron' that powers the heart of the Internet. It is a product category dominated by Cisco, Huawei, Juniper and Nokia, including via its existing 7950 XRS routing platform. However, the market has been in flux. Earlier this month, Dell’Oro Group reported a significant break in Q1 17 with Huawei taking the top spot from Cisco in the core router market for the first time. The report also found Huawei taking over second spot from Nokia in the SP edge router and CES market. The primary reason cited for this shift is that the SP core routing business is only growing at a low single-digit rate, while China Mobile is defying the trend with significant investments in their IP core backbone, for which Huawei is the lead supplier. Nevertheless, the overall predictions for rapid growth in IP traffic over the coming five years makes it more likely that service providers will need a significant refresh of their core backbones to handle hundreds of 100 or 400 Gbit/s connections at major nodes.

Nokia's previous generation FP3 chipset, unveiled by Alcatel-Lucent in June 2011 and launched in 2012, packed 288 RISC cores operating at 1 GHz and leveraged 40 nm process technology; the FP2 chipset offered 112 cores at 840 MHz and was built in 90 nm. This network processor lineage can be traced back to TiMetra Networks, a start-up based in Mountain View, California that launched its first carrier-class routing platforms in 2003.

TiMetra, which was headed by Basil Alwan, was acquired by Alcatel-Lucent later in 2003 for approximately $150 million in stock. The product line went on to become the highly successful 7450, 7750 and eventually 7950 carrier platforms - the basis for the IP division at Alcatel-Lucent. Not bad for an idea from a small start-up to grow into the star platform underpinning all of Alcatel-Lucent + Nokia Siemens Networks.

In a launch day webcast, Basil Alwan, now president of Nokia's IP/Optical Networks business group, said we are moving into a new phase of the Internet requiring 'cloud-scale routing'. First, he noted that there is market confusion between Internet-class routers and core data centre switches, which are being used to power the hyperscale infrastructure of the Internet content providers. High-end, data centre spine switches are capable of routing packets at high rates and can handle access control lists (ACLs). Likewise, conventional big iron core routers can switch data flows, and are sometimes deployed in data centres. However, there have been tradeoffs when this role reversal happens. Nokia's new FP4 chipset aims to fix that.

First multi-terabit NPU silicon

Six years have passed since the FP3, or roughly two cycles in the evolution of Moore's Law, so naturally one would expect the new silicon to be smaller, faster and more powerful and efficient. But Alwan said the company took its time to rethink how the packet processing works at the silicon level. To begin with, Nokia redesigned the onboard memory, employing 2.5D and 3D layouts on 16 nm Fin Field Effect Transistor (FinFET) technology. The single chip contains 22 dies, including memory stacks and control logic. It runs at 2.4 Tbit/s half-duplex, or 6x more capacity than the current generation 400 Gbit/s FP3 chipset. The FP4 will support full terabit IP flows. All conventional routing capabilities are included. Deep classification capabilities include enhanced packet intelligence and control, policy controls, telemetry and security.

The FP4 could be used to provide an in-service upgrade to Nokia's current line of core routers and carrier switches. It will also be used to power a new family of 7750 SR-s series routers designed for single-node, cloud scale density. In terms of specs, the SR-s boasts a 144 Tbit/s configuration supporting port densities of up to 144 future terabit links, 288 x 400 Gbit/s ports, or 1,440 100 Gigabit Ethernet ports. Absolute capacity could be doubled for a maximum of 288 Tbit/s configuration. It runs the same software as the company's widely-deployed systems. The first 7750 SR-s boxes are already running in Nokia labs and the first commercial shipments are expected in Q4.

Nokia is also introducing a chassis extension option to push its router into petabit territory. Without using the switching shelf concept employed in the multi-chassis designs of its competitors, Nokia is offering the means to integrate up to six of its 7750 SRS-s routers into a single system. This results in 576 Tbit/s of capacity, enough for densities of up to 2,880 x 100 GBE ports or 720 x 400 Gbit/s ports. Adding up the numbers, it is not truly petabit-class, but at 576 Tbit/s it is more than halfway there.

Network telemetry leads to security
Another interesting twist concerns security and petabit-class routing. In December 2016, Nokia agreed to acquire Deepfield, a start-up specialising in real-time analytics for IP network performance management and security. Deepfield, founded in 2011 and based in Ann Arbor, Michigan, has developed an analytics platform that identifies over 30,000 popular cloud applications and services. Its Internet Genome tracks how traffic runs to and through networks to reach subscribers, in real time, and without the need for probes, taps and monitors in the network itself. At the time of the deal, Nokia said it would integrate Deepfield big data analytics with the dynamic control capabilities of open SDN platforms, such as the Nokia Network Services Platform (NSP) and Nuage Networks Virtualized Services Platform (VSP).

Expanding on this idea, Alwan said Deepfield can really leverage the routers rather than probes to understand what is happening to the traffic. Fewer probes mean lower investment. More importantly, Deepfield could be used to track DDoS attacks passing through the core of the network rather than at the edge destination target. The new FP4 silicon is said to be a very good match for this application.


          Europol, FBI, UK's NCA ride out to Ukraine's cavalry call   

Security service calls NotPetya an 'act of cyberterrorism'

Ukraine, hardest hit by this week's “NotPetya” ransomware/havoc-ware, has called for help from Europol, the FBI, and England's National Crime Agency to investigate who was behind it.…


          Security bug bounty programs are a nice little earner for hackers   

Safe to assume the money will keep getting better

Some security-conscious organizations award hackers up to $900,000 a year, according to what's touted as the biggest bug bounty industry report to date.…


          LuxNetwork picks Ciena    
Ciena announced that LuxNetwork of Luxembourg has selected its 6500 Packet-Optical Platform with integrated WaveLogic Encryption for a new 100 Gbit/s network designed to increase network capacity to support the growing bandwidth and security demands of the major financial sector companies, large enterprises and international wholesale customers.

LuxNetwork, a subsidiary of the NomoTech Group, specialises in providing high-speed, secure optical WAN connectivity to connect businesses to data centres and interconnect data centres. The service provider also offers a suite of managed services for enterprise customers and international telecom operators.

Operating its upgraded network that provides ten times the capacity of its previous system, LuxNetwork can offer higher-capacity services including 10 and 100 Gigabit Ethernet, 8 and 16 Gbit/s Fibre Channel, as well as encryption for protection of in-flight data. Additionally, enterprise and carrier customers are able to leverage dedicated, secure, high-bandwidth and scalable connectivity without the need to own the infrastructure.

The network upgrade will also allow LuxNetwork to consolidate and modernise its infrastructure and to realise operational efficiencies following the acquisition and integration of Telecom Luxembourg.



  • Last week, Ciena announced that Bouygues Telecom of France had selected the 6500 Packet-Optical Platform to enhance the efficiency, scalability and reliability of its network backhaul and aggregation infrastructure, as well as provide the foundation for its new SuperCore network.
  • The deployment was designed to increase capacity to 400 Gbit/s to support growing capacity demand and new high-bandwidth services, as well as allow Bouygues Telecom to expand its mobile and ISP offerings support future 5G services.


          Coding4Fun Second Quarter 2017 Round-Up   

Scanning this past Quarter's posts, it's pretty easy to see some meta-themes. IoT, VS 2017, UWP and lots of Pi... :)

Coding4Fun Blog

Cloning Your VS 2017 Packages
Small Basic is Now Available in the Windows Store
C64ForTheWin - C64 Development on your Windows Machine
Squish That Whitespace
One Browser Extension Tutorial to Rule...
Cortana goes IoT
Menees VS Tools Updated for Visual Studio 2017
ReactXP - A library for building cross-platform apps
"Happy Path” to IoT
Functioning Private Visual Studio Gallery via Azure Functions
dotnet CLI Tool Build Redux
Sock IoT with this Azure Connected System-on-a-chip Project
Breaking the Breakpoint Blues with the Breakpoint Generator
Rion's "Contributing to .NET for Dummies"
End-to-End IoT with Azure Services
Adding Fire to your Coding with Fira Code Font
Keeping Track of Your Code's Performance with CodeTrack
Hello World .NET Core Pi
Make Visual Studio Zoom with Font Sizer
Scratch is Ten!
Raspberry PI ASP.NET Core MVC
WTS FTW 10T (Windows Template Studio For The Windows 10 Template)
Get Started with the Cortana Skills Kit
OpenZWave for UWP and .NET
dotnet new Template Creator
ToDo - Voice Activated IoT RPi ToDo List
Don't Skimp Code Security, Check Out DevSkim
Leveling Up with MonoGame and XML
iBeacons and UWP
CodeMaid Gets Some VB Loving and more...
From 0 to 100 with this ASP.NET Core/AngularX Project Template
Raspberry Pi Online Simulator and Azure IoT
Code Analysis at Compile? Why? Do it Live!
VSCode Your Next PWA
Getting Started with Azure IoT
Remarkable Comments with Remarker
Windows Template Studio (WTS) 1.1 Now Available

Coding4Fun Kinect Gallery

HoloOCR'ing
Kinecting to Art
HoloLens Terminator Vision
Kinect to HoloLens with Hololens-Kinect
Visual Gesture Builder (VGB)
HoloLens, Kinect and Telepresence
UrhoSharp HoloLens
Kinect to Your Inner Actor/Actress with Play The Knave
Kinect to Bouldering Pong
Kinect to Joints... Rotations that is...
Kinect to Zen Meditation
Kinect to at Home Rehab
HoloToolkit Setup - June Edition

Just June's Posts...

Coding4Fun Blog

ToDo - Voice Activated IoT RPi ToDo List
Don't Skimp Code Security, Check Out DevSkim
Leveling Up with MonoGame and XML
iBeacons and UWP
CodeMaid Gets Some VB Loving and more...
From 0 to 100 with this ASP.NET Core/AngularX Project Template
Raspberry Pi Online Simulator and Azure IoT
Code Analysis at Compile? Why? Do it Live!
VSCode Your Next PWA
Getting Started with Azure IoT
Remarkable Comments with Remarker
Windows Template Studio (WTS) 1.1 Now Available

Coding4Fun Kinect Gallery

Kinect to Bouldering Pong
Kinect to Joints... Rotations that is...
Kinect to Zen Meditation
Kinect to at Home Rehab
HoloToolkit Setup - June Edition

Past Round-Ups

Coding4Fun January 2017 Round-up
Coding4Fun February 2017 Round-up
Coding4Fun First Quarter 2017 Round-Up
Coding4Fun April 2017 Round-up
Coding4Fun May 2017 Round-up

Coding4Fun 2014 Round-Up
Coding4Fun 2015 Round-Up
Coding4Fun 2016 Round-Up

Follow @CH9
Follow @coding4fun
Follow @gduncan411


          CN BC: Editorial: Time To Take Action On Marijuana Industry   
Prince George Citizen, 23 Jun 2017 - Thanks, Neil Godbout, for bringing it up (Citizen editorial, June 15). Marijuana is about to become a legal, government-regulated agricultural commodity all across Canada. Mostly, the plant will be cultivated in large greenhouses. Last week, a large greenhouse in the Lower Mainland announced it would no longer cultivate peppers but would switch to growing marijuana. Businesses across every jurisdiction are maneuvering to take advantage of a rare opportunity. This business is coming fast. Last fall, city council heard a bid from two entrepreneurs ready to set up shop and sell the stuff buy mail. They offered strong security and carefully laid plans for distribution, but the location was not approved.
          Re: Multnomah County Republicans Formally Allow Militia Groups to Run Security   
So is this douchbags hiring assholes or assholes hiring douchbags?
Posted by lahar legar
          Re: Multnomah County Republicans Formally Allow Militia Groups to Run Security   
"The volunteers are afraid of going to Portland street fairs and Portland events because of what happened to them,"

'What happened to them' being that some of the Oath Keeper's friends in Patriot Prayer sent an anonymous letter to threaten themselves to claim victim-hood, misunderstanding that Antifa would never deign to send a missive to public entities, since, you know, they don't beleive public institutions are legitimate.
Posted by The Beans
          Re: Multnomah County Republicans Formally Allow Militia Groups to Run Security   
So the MCGOP says it has "no money" to hire legitimate private security contractors and wants to use a bunch of guys who like to cosplay with guns and ammo. OK, great. But aren't they worried about what could happen if one of these "ammosexuals" gets a bit hot under the collar and wounds or kills someone while providing security? Aren't they worried about liability?
Posted by tommyspoon
          Re: Multnomah County Republicans Formally Allow Militia Groups to Run Security   
Pile this on top of the recent NRA ad that is essentially a call-to-arms for a 21st Century civil war in America, and we're looking at a group of insane gun nuts being primed to unleash a good deal of chaos, death, and injury on the general population. This needs to be stopped ASAP. These assholes are a significant threat to everyone.
Posted by FlavioSuave
          Re: Multnomah County Republicans Formally Allow Militia Groups to Run Security   
So they have quit even pretending to be sane.
Posted by jnat
          Human Resources Manager   
MD-Silver Spring, Qualifications: A bachelor's degree and five (5) years working Human Resources experience. 2 years management experience. Previous experience with the Security and EVS Industries a plus. Previous experience working with Collective Bargaining Agreements and union environment is required. HRIS experience – preferably ADP. PHR certification a plus. Bilingual in English and Spanish greatly preferred.
          Exclusive Interview with Steve Douty President/CEO of Nexo, Inc.   

Exclusive Interview with Steve Douty President/CEO/Member of the Board of Directors of  Nexo, Inc. Nexo, Inc. (a private company) Disrupts the Movement of Big Data A New Era of Information Sharing Has Begun Last Friday I sat down with Steve Douty and to discuss the future of big file sharing, the expense and security surrounding big […]

The post Exclusive Interview with Steve Douty President/CEO of Nexo, Inc. appeared first on Live Trading News.


          Linux Plumbers Conference: Containers Microconference accepted into Linux Plumbers Conference   

Following on from the Containers Microconference last year, we’re pleased to announce there will be a follow on at Plumbers in Los Angeles this year.

The agenda for this year will focus on unsolved issues and other problem areas in the Linux Kernel Container interfaces with the goal of allowing all container runtimes and orchestration systems to provide enhanced services.  Of particular interest is the unprivileged use of container APIs in which we can use both to enable self containerising applications as well as to deprivilege (make more secure) container orchestration systems.  In addition we will be discussing the potential addition of new namespaces: (LSM for per-container security modules; IMA for per-container integrity and appraisal, file capabilities to allow setcap binaries to run within unprivileged containers)

For more details on this, please see this microconference’s wiki page.

We hope to see you there!


          How a Bitcoin Whitehat Hacker Helped the FBI Catch a Murderer   
whitehat (1).jpg

An ethical hacker breached the database of a phony darknet website offering hitman services and leaked the data. The information from the data dump helped the FBI in their investigation of a man who murdered his wife.

In November 2016, Stephen Carl Allwine, 47, of Cottage Grove, Minnesota, killed his wife in “one of the most bizarre cases ever seen,” police officers reported. The husband tried to mask the murder as a suicide, including putting a 9 mm pistol next to Amy Allwine’s elbow. However, detectives arriving on the scene identified the case as murder and collected evidence — mostly electronic devices, such as computers — belonging to Mr. Allwine. Later on, in January, investigators arrested and charged Mr. Allwine with second-degree murder based on the forensic evaluation of the confiscated electronic equipment.

In May 2016, a hacker called “bRpsd” breached the database of a controversial hitman service offered on a darknet website. The service, “Besa Mafia,” offered a link between customers and hitmen, who could register on the site anonymously. The price for a murder ranged between $5,000 and $200,000, but clients seeking to avoid fatalities could also hire a contractor to beat up a victim for $500 or set somebody’s car on fire for $1,000.

The hacker uploaded the data dump to a public internet website. The leaked files contained user accounts, email addresses, personal messages between the Besa Mafia admin and its customers, “hit” orders and a folder named “victims,” providing additional information on the targets.

The breach highlighted the fake nature of the website, which operated only to collect money from the customers. Chris Monteiro, an independent researcher who also hacked into the site, stated the owner or owners of Besa Mafia had made at least 50 bitcoins ($127,500 based on the current value of the cryptocurrency) from the scam operation.

According to a message posted by a Besa Mafia administrator and uncovered in the dump, “[T]his website is to scam criminals of their money. We report them for 2 reasons: to stop murder, this is moral and right; to avoid being charged with conspiracy to murder or association to murder, if we get caught.”

The leak of the Besa Mafia database helped the police investigating the murder of Mrs. Allwine. As the officers analyzed her husband’s devices, they discovered the suspect had accessed the dark web as early as 2014. Furthermore, investigators identified the pseudonym Mr. Allwine used on the darknet, “dogdaygod,” which was also linked to his email, “dogdaygod@hmamail.com,” in some cases. Detectives found bitcoin addresses in the conversations between Besa Mafia and Mr. Allwine, which linked the husband directly to the “dogdaygod” pseudonym, providing authorities with necessary evidence for the case.

Eventually, law enforcement agents analyzed the data dump bRpsd leaked and discovered Mr. Allwine’s email in the list. In addition, investigators found messages between the suspect and the Besa Mafia admin. According to a criminal complaint, Mr. Allwine paid between $10,000 to $15,000 to the supposed hitman service to kill his wife. The complaint detailed how Mr. Allwine had decided to have the hitman shoot Mrs. Allwine at close range and burn down the house afterward.

However, once the funds were transferred, the Besa Mafia communicator told Mr. Allwine that “local police [have] stopped the hitman [from] driving a stolen vehicle and taken [him] to jail prior to the hit,” thus rendering him unable to complete his “service.” The complaint cited Sergeant McAlister who reported that during that time, “no one was apprehended in Minnesota and western Wisconsin in a stolen vehicle and possession of a gun.”

It is likely that the ethical hacker’s data breach had an impact on Mr. Allwine’s case; on March 24, 2017, the Washington County District Court charged him with first-degree murder. In addition, officers have gathered more evidence in the case — a drug called scopolamine was discovered at 45 times higher than the recommended level in Mrs. Allwine’s body. Investigators subsequently discovered that her husband had also ordered the substance on the dark web.

The post How a Bitcoin Whitehat Hacker Helped the FBI Catch a Murderer appeared first on Bitcoin Magazine.


          Decent Launches Global Media Distribution Platform   
Decent Launch

Free and open communication has long been an essential component of a successful democracy. Unfortunately, money, power and influence over time have stifled today’s media environment adversely impacting both content producers and consumers alike.

In an effort to democratize creative content, DECENT has officially launched its blockchain-based, global media distribution platform. The name is an acronym for Decentralized Network; Encrypted & Secure; Content Distribution System; Elimination of 3rd Parties; New Way of Online Publishing; Timestamped Data Records.

Designed to bring more transparency and fairness to the media industry, DECENT allows artists to seamlessly distribute digital content for immediate payment and without hefty fees. Peer-to-peer in its orientation, consumers decide the merits of a certain piece of content posted through a Yelp-like community rating system. The content, however, cannot be censored or removed.

This blockchain initiative endeavors to disrupt the legacy world of media distribution by allowing artists more freedom and control over the ownership and distribution of their content, all without compromising on security. It represents a potential gamechanger for the massive global media and content distribution industry — one that’s estimated to grow from $1.7 trillion in 2016 to over $2 trillion in 2019.

DECENT was founded in 2016 by two friends, Matej Michalko and Matej Boda, from Slovakia. It sprouted from a shared vision that blockchain technology could fuel a coordinated system of digital content publishing and sharing throughout the world.

Funding for DECENT was fueled by an ICO campaign last summer, which raised more than 5,881 BTC, at that time valued at $4.2 million USD. There were 4,300 ICO participants in total and no other key funding partners.

Michalko recounted the journey leading up to his own personal discovery of blockchain technology and its potential uses for the content distribution space. “I’ve been extensively involved in Bitcoin since 2011, even mining it from my own laptop at the beginning. I quickly realized that the innovative technology behind Bitcoin had the potential to change the modern world.”

When Michalko started to delve further into blockchain technology, he found a seemingly endless list of use cases the new technology could support. “I became determined to use blockchain technology to create something revolutionary that would be beneficial for people on a global scale. A short time later ongoing discussions between myself and our future co-founder Matej Boda quickly led to DECENT being born.”

He says that DECENT Network is a reaction to the issues that the majority of content producers face nowadays in the entertainment and media industry. “There is too much artificial complexity and too many barriers in the industry affecting both the access to market and income of the content owners.”

DECENT’S digital model allows artists to distribute any form of content, including written, music, videos, ebooks and pictures. These distribution channels are free of third-party influence, meaning that artists can also manage their intellectual property rights and set their own pricing.

One of the innovative adaptations that distinguishes DECENT from other blockchain platforms is the network’s reputation management system. This allows content creators who share their digital work on the platform to build a lifetime reputation, based on ratings from those who purchase content on the platform. DECENT Network also allows content creators to instantly receive payment when someone downloads their content, without any middleman interference.

Michalko believes that DECENT can break the trajectory in which a majority of power is concentrated in the hands of a few players controlling the industry. “Artists, filmmakers and writers lose control over their work and depend on the mercy of the ‘big guys.’ We designed DECENT Network to do away with all that and bring more transparency and fairness to the digital content industry.”

DECENT estimates that writers, for example, lose a healthy 30–75 percent chunk of their earnings when publishing with Amazon. Similarly, musicians, through licensing agreements, lose around 30 percent when selling a track on iTunes. Blockchain technology therefore serves as a mechanism that helps writers and musicians keep more money, while connecting with their audiences directly.

Michalko says that artists will be paid for their downloaded content through DECENT’s own cryptocurrency called “DCT,” which will be launched together with DECENT Network. Other payment options, he says, will be available in the future. “Artists will no longer have to wait months before seeing a penny from their work. And at the time of launch, DECENT Network will be a completely free-of-charge service for artists.”

Michalko hopes that by  2020, DECENT Network will have become the number one worldwide media sharing platform. “We hope to bring more transparency and fairness to the digital content industry for both creators and consumers. I hope that with our launch people will realize the advantage of DECENT Network over other content distribution platforms.”

The post Decent Launches Global Media Distribution Platform appeared first on Bitcoin Magazine.


          Computer Security Incident Responder - Cushman & Wakefield - New York, NY   
Ability to collaborate with business partners in setting business goals and objectives. Follow a comprehensive approach to management of cyber threats, both...
From Cushman & Wakefield - Thu, 25 May 2017 01:27:48 GMT - View all New York, NY jobs
          Brian Johnson to Lead Gamma 2 Robotics as New CEO   

Seasoned security executive brings 35+ years of CEO/CFO/COO experience


          Gas Technician-Furnace Installer - Northern Gas Installers - Red Lake, ON   
Basic security clearance, driver's validity licence check, criminal record check. Measure and mark reference points for installation of gas lines and equipment,... $28 - $34 an hour
From Indeed - Wed, 24 May 2017 14:55:24 GMT - View all Red Lake, ON jobs
          Global Synthetic Biology Market (Products, Technologies, Applications and Geography) - Reports and Intelligence   

Global Synthetic Biology Market (Products, Technologies, Applications and Geography) - Size, Share, Global Trends, Company Profiles, Demand, Insights, Analysis, Research, Report, Opportunities, Segmentation and Forecast, 2013 - 2020

Portland, OR -- (ReleaseWire) -- 09/03/2014 -- Synthetic biology is a novel field that finds its origin at the intersection of biology and engineering. It's a multidisciplinary effort made by scientists to understand the functioning of biological organisms, cells & genes and implementation of artificial genetic processes to give specific characteristics to an organism. It can even be used to develop a completely new biological system. Global synthetic biology market was valued at $3.0 billion in 2013 and it is estimated to reach $38.7 billion by 2020, growing at a CAGR of 44.2% during the forecast period.

Get full report at: http://www.reportsandintelligence.com/synthetic-biology-market

Synthetic Biology Technology market is segmented into enabling technology and enabled technology. Synthetic Biology Enabling technologies segment is growing at a faster rate, and growing at a CAGR of 48.6% during the forecast period.

Synthetic Biology Application market is segmented into research & development, chemicals, agriculture, pharmaceuticals & diagnostics, biofuels and others (biotechnology and biomaterials). Biofuels is the fastest growing segment at a CAGR of 85.2% during the forecast period.

Request for Sample Report at: http://www.reportsandintelligence.com/request-sample/18079

Synthetic Biology product market is segmented into enabling products, enabled products and core products. Enabling product is the fastest growing segment at a CAGR of 53.7% during the forecast period.

Assistance from government and private organizations, rising number of entities conducting research and declining cost of DNA sequencing and synthesizing are key driving factors of the market. Governments are providing funds to research organizations, assisting them to find novel applications of synthetic biology. Bio-safety & bio-security issues, ethical issues and regulations are key retraining factors of the market. The fact that synthetic biology can be misused has raised concerns all around the world. Further, there are possibilities of accidental release of pathogens or genetically modified organisms into free atmosphere.

Visit at: http://www.reportsandintelligence.com/

For more information on this press release visit: http://www.releasewire.com/press-releases/global-synthetic-biology-market-products-technologies-applications-and-geography-reports-and-intelligence-542778.htm

Media Relations Contact

Sona Padman
International Accounts Manager
Reports and Intelligence
Telephone: 617-674-4143
Email: Click to Email Sona Padman
Web: http://www.reportsandintelligence.com/


          Noninvasive Cancer Diagnostics and Technologies Market   

Noninvasive Cancer Diagnostics and Technologies Market - Global Share, Industry Overview, Analysis, Growth, Trends Opportunities and Forecast 2012 - 2020

Portland, OR -- (ReleaseWire) -- 08/28/2014 -- Non-invasive diagnostic is a process of identifying the disease conditions with minimal incision in body during diagnosis. The global market for diagnostic/in-vitro diagnostics valued at $49.2 billion in 2012, which shows potential for market growth, especially in chronic diseases. Non-invasive cancer diagnostics is gaining importance over conventional diagnosis due to increase in incidences of chronic cancer such as breast cancer, and lung cancer. According to American Cancer Society, there were more than 1,660,290 new cases diagnosed in 2013.

Get detailed report at:
http://www.reportsandintelligence.com/noninvasive-cancer-diagnostics-market

Commercialization of non-invasive cancer diagnosis is possible due to completion of Human Genome Project (HGP) that gives enormous diagnostic information based on genomic and proteomic. Increase in stringent regulatory guidelines and cost associated with diagnostics is hindering the growth of non-invasive cancer diagnostic market. The Ovarian Cancer National Alliance regulations for monitoring non-invasive diagnostics are issued by FDA, Medicare and Medicaid Services (CMS) and Social Security Administration (SSA).

The global non-invasive market has a huge potential in developing countries; however, cost of diagnosis is creating hurdles to tap this market. Hence, to overcome this problem, the diagnostic market has to be analyzed by the developing countries such as China, Japan, and India. This report provides key market drivers that are driving the market with impact analysis. The report gives intelligence about key regulatory guidelines issued by respective governments.

Key companies included in report are Precision Therapeutics, A&G Pharmaceutical, Affymetrix Inc., AVIVA Biosciences Corporation, BIOVIEW Inc., Laboratory Corporation of America Holdings (LabCorp), Quest Diagnostics Incorporated Cancer Genetics Inc., Digene Corporation, Gen-Probe Incorporated

KEY BENEFITS:

-Key developmental strategies adopted by top market players engaged in this business so that companies involved in development non-invasive cancer diagnostic device can get competitive intelligence of their competitors

-Market estimation for therapeutics techniques and geographic segment is derived from current market scenario and expected market trends

-Market attractiveness analysis has been included for various product segments, therapeutics, techniques and geographic regions with detailed analysis of factors responsible for rapid growth of the market segments

-In depth analysis of key market drivers, restraints and opportunities of non-invasive cancer diagnostic market with impact analysis

-Value chain analysis, Porter's five force model, top investment pockets (GE9 Cell Matrix) are analyzed and presented in detail in the report so that the decision makers can receive clear picture of cancer diagnosis market

KEY MARKET SEGMENTS

GLOBAL MARKET, BY THERAPEUTICS

- Solid tumors
- Blood cancer
- Lung Cancer
- Breast Cancer
- Others

GLOBAL MARKET, BY TECHNIQUES

- Clinical Chemistry
- Immunochemistry/Immunoassay
- Molecular Diagnostics
- Other Clinical Instruments

GLOBAL MARKET, BY GEOGRAPHY

- North America
- Europe
- Asia-Pacific
- RoW

KEY AUDIENCES

- Medical devices manufacturing companies
- Pharmaceutical companies
- Government and Private Research Institutes
- Academic Institutes

Similar Report:
Global Medical Laser Systems Market (Product Types, Application and Geography)
http://www.reportsandintelligence.com/medical-laser-systems-market

For more information on this press release visit: http://www.releasewire.com/press-releases/noninvasive-cancer-diagnostics-and-technologies-market-541401.htm

Media Relations Contact

Sona Padman
International Accounts Manager
Reports And Intelligence
Telephone: 617-674-4143
Email: Click to Email Sona Padman
Web: http://www.reportsandintelligence.com/


          12265 Senior Programmer Analyst - CANADIAN NUCLEAR LABORATORIES (CNL) - Chalk River, ON   
Understanding of server technologies (Internet Information Server, Apache, WebLogic), operating systems (Windows 2008R2/2012, HP-UX, Linux) and server security....
From Indeed - Wed, 07 Jun 2017 17:50:30 GMT - View all Chalk River, ON jobs
          Security Guard - QC – Scarlet Security Services Ltd - Pond Inlet, NU   
Willingness to obtain Standard First Aid - CPR C &amp; AED. QC – Scarlet Security Services Ltd., a division of the Scarlet Group of Companies, is seeking full-time...
From Indeed - Fri, 26 May 2017 19:33:00 GMT - View all Pond Inlet, NU jobs
          Customer Readiness Testing Engineer 2 (CACS551) - Fortinet - Ontario   
A minimum of 4-6 years experience in a technical role in a networking/security company, preferably with Fortinet products Strong understanding of Service...
From Fortinet - Mon, 26 Jun 2017 21:16:27 GMT - View all Ontario jobs
          Security Analyst - Eagle Professional Resources - Ontario   
Banking / Financial Industry experience. Providing leadership for the provision of technical expertise in development and support of activities, processes,...
From Eagle Professional Resources - Wed, 12 Apr 2017 20:12:08 GMT - View all Ontario jobs
          greenbone-security-assistant 6.0.12-1 x86_64   
Greenbone Security Assistant (gsa) - OpenVAS web frontend
          greenbone-security-assistant 6.0.12-1 i686   
Greenbone Security Assistant (gsa) - OpenVAS web frontend
          Software Development Engineer 3 (CARD2191) - Fortinet - Ontario   
Overview Senior or Intermediate Software Development Engineer Fortinet (NASDAQ: FTNT) is a worldwide provider of network security appliances and the market
From Fortinet - Thu, 25 May 2017 23:49:25 GMT - View all Ontario jobs
          Technical Support Engineer 1 (CACS547) - Fortinet - Ontario   
At least 2+ years experience in a technical support role in a networking/security company or equivalent education Strong understanding of TCP/IP, routing...
From Fortinet - Wed, 24 May 2017 17:50:27 GMT - View all Ontario jobs
          Russian border guards get lost, end up getting arrested in Ukraine   
Russia's domestic security agency says two border guards got lost and ended up in Ukraine.
          Orlando International Airport TSA Agent Caught Stealing Cash From Woman’s Luggage   
As if airport security wasn’t stressful enough, an airline passenger in Florida has had to confront a TSA officer who tried to steal money from her luggage.
          TS95: Cruises, Social Security for Gays, Bikram's Sexual Harassment Problem, with guest Dustin Lance Black   
Hollywood, right people? Bryan and Erin understand Hollywood like Hollywood was their delusional cousin who took out a college loan for breast implants. This week, Erin and Bryan talk all about their Hollywood game night experience, the Social Security tries to find a solution for LGBT spousal benefits, Bikram Choudhury's downward facing sexual harassment suit, and writer/producer/activist/Oscar winner Dustin Lance Black stops by for our new segment HiBrow/LoBrow.  See TSPOD live on our East Coast tour! Buy tickets here Subscribe and Rate on iTunes @gibblertron & @bryansafi #tspod shadethrowing@gmail.com Official Max Fun Page Facebook page RSS Feed
          Truck Gate Security Guard - CAMI Plant Ingersol - G4S Secure Solutions Canada - Canada   
Knows how to use a TELUS Radio. This position description assumes that the individual has satisfied all basic requirements for employment by G4S Secure...
From G4S Secure Solutions Canada - Wed, 28 Jun 2017 17:39:58 GMT - View all Canada jobs
          PM shaken by gruesome attack   

The gruesome murders of 13-year-old Videsh Subar and his 56-year-old sitter Rose Mohammed have impacted on Prime Minister Dr Keith Rowley, so much so that it has left him very disturbed and shaken.

Speaking at yesterday’s post-Cabinet media briefing, Rowley said he hoped the T&T Police Service can bring the perpetrators of the killings before the courts expeditiously.

The throats of Subar and Mohammed were slit by their killers at Mohammed’s Ajim Baksh Street, Malabar home on Wednesday during a home invasion.

Yesterday, Rowley said there were some new developments taking place in the country, some of which were not uplifting and disturbing.

“I am very, very shaken and disturbed with what happened in the East with that child and its guardian who were so brutally murdered, and it makes us wonder what kind of people we have become,” said Rowley, his voice dropping as he spoke.

Saying it is now standard practice that when violent and heinous crimes are committed there is a public demand that the Government do something about crime, Rowley said “that demand is understandable because people want to feel safe, people want to feel secure and people want to know that their families and their communities are protected from these things.”

The PM said the interventions by individuals who make a decision to carry out such activities “shock us all the time.” He said whatever the Government has in place, be it prison, police or court “we are always surprised by these kinds” of murders.

In extending condolences to the family of the victims, Rowley said just looking at the grief on television as a citizen, he was quite “shaken by this kind of thing and I trust that the law enforcement authorities would find the perpetrators of such heinous and disturbing action.”

Asked about the TTPS’ ineffectiveness in its battle against the criminal elements and he could do to fill the gap, Rowley replied, “That is one area where you do not have an alternative. There is no alternative but to keep working and improving the ability of law enforcement in the country. And law enforcement in our country under the Constitution is largely the Police Service.”

In the area of national security, Rowley disclosed that Cabinet took a decision not to pay $200 million to maintain for one year four of the country’s helicopters.

“This is a cost that has been negotiated downward I was told. US$34 million I was told. We just can’t afford that! If we can’t afford it then the helicopters would stay on the ground… much as we would like to have them in the air. If we have $200 million dollars, the question that arises is that the best way to spend $200 million in the fight against crime?”

He said selling the helicopters was one option the Government may look at.


          The New York Times Finally Retracts Russia-Gate Canard   

On Thursday, the Times – while leaving most of Haberman’s ridicule of Trump in place – noted in a correction that the relevant intelligence “assessment was made by four intelligence agencies — the Office of the Director of National Intelligence, the Central Intelligence Agency, the Federal Bureau of Investigation and the National Security Agency. The assessment was not approved by all 17 organizations in the American intelligence community.” Continue reading

The post The New York Times Finally Retracts Russia-Gate Canard appeared first on MintPress News.

Follow this story


          School rallies around family of missing Chinese student   

Twenty days after University of Illinois graduate student Yingying Zhang disappeared from the Urbana-Champaign campus, her family called on the community Thursday to hold on to hope for her safe return.

"She's always a brave girl and she never easily gives up on anything," Zhang's boyfriend, Xiaolin Hou, told a crowd of well-wishers gathered at the school Thursday night.

"She never gives up as long as there's a glimmer of hope ... so we cannot give up either," he said.

Hou and members of Zhang's family led a procession of hundreds of well-wishers through the streets of the Urbana-Champaign campus Thursday night. They waved flags with her name on them and carried her picture as they chanted "let's find Yingying."

The family flew from China to the United States earlier this month to search for the 26-year-old visiting scholar. And they say they're not going home without her.

Zhang's father issued a plea earlier Thursday to those responsible for his daughter's disappearance: Let her go and I'll forgive you.

"The family hopes the kidnappers would not hurt her and know she is really well loved by family and friends," her father told CNN through a translator Thursday. "Let her go, let her come back as soon as possible."

Last seen June 9

Zhang had a yearlong position at the university's department of Natural Resources and Environmental Sciences. She graduated from Beijing's prestigious Peking University in 2016 with a master's degree in environmental engineering.

Zhang is 5 feet, 4 inches tall and weighs 110 pounds, the FBI said. She was last seen wearing a charcoal-colored baseball cap, a pink and white top, jeans and white tennis shoes. She carried a black backpack.

The last known sighting of Zhang was on the afternoon of June 9. Security camera footage shows her entering the passenger side of a black Saturn Astra hatchback that day.

University police said Zhang had just gotten off a public bus before the four-door hatchback approached her on the north end of the university campus. The FBI announced that investigators found the car on Tuesday, but provided no further details.

The FBI is treating the disappearance as a kidnapping, but campus police, in a recently released update, say they are calling it a missing persons case.

Support from around the world

Zhang is one of more than 300,000 Chinese students and scholars attending US universities. The University of Illinois at Urbana-Champaign is one of the most popular universities for Chinese students, with more than 5,600. They make up a sizable community both on campus and in the small town of 207,000.

Her disappearance has triggered widespread concern in China, with groups set up on messaging app WeChat to share information about the case.

A crowdfunding campaign set up to help Zhang's family with expenses as the search continues has raised more than three times its $30,000 goal, with many donors leaving messages of support in Chinese.

'Twenty days is a long time'

Her disappearance has struck a nerve on the Urbana-Champaign campus.

Supporters who joined Thursday's rally echoed her family's hopeful tone.

"I'm praying as I walk," said Champaign resident Donald Baker. "We're hoping we can bring her back home to her family and to this campus."

Another woman said she joined the rally to support Zhang's family. She has a daughter close to Zhang's age who travels internationally, and sometimes she doesn't hear from her for days, she said.

"It was important to me as Americans that we show love and care to this family," she said.

"I want to be optimistic that we will find her," she added. "Twenty days is a long time."

Follow this story


          6/29/2017: YOUR PAPER, YOUR PLACE: AGGRAVATED ROBBERY   
A man toting a sawn-off shotgun has had his robbery of an Auckland bank foiled. Detective Senior Sergeant Glenn Baldwin said the man pointed the weapon at staff in the ASB Bank on Blockhouse Bay Rd, who in response activated an emergency security...
          Can Trump Succeed Where Reagan Failed?   
(AP Photo/Alex Brandon)

People with family members who were killed by undocumented immigrants meet with Attorney General Jeff Sessions on June 29, 2017.

On Thursday, the House passed the No Sanctuary for Criminals Act, which proposes to withhold federal funding from localities that refuse to cooperate with Trump administration immigration measures aimed at criminal noncitizens and other undocumented people. The bill would also allow individuals and close family members of individuals who are victims of felonies committed by undocumented immigrants who have been released from local or state custody against the advice of federal authorities to file suit against states.

The day before, New Orleans Mayor Mitch Landrieu, the new president of the U.S. Conference of Mayors, called on Congress to work on bipartisan immigration and criminal justice law reforms, adding that cities could use more federal assistance to fight terrorism and crime, and provide mental illness, substance abuse, and reentry programs.

Landrieu said in a letter to House members that local leaders do not want their law enforcement officers involved in federal immigration detention activities, nor do they want to be put in legal jeopardy for possible violations of the Fourth Amendment’s prohibitions against unreasonable searches and seizures. (A related bill known as Kate’s Law would establish new mandatory minimum prison terms for deported criminals who return to the United States.)

The sanctuary cities battle, like so many of Trump’s hastily conceived and poorly executed policies, appears headed for another showdown, either when the bills arrive in the Senate, or, in the unlikely event that the upper chamber drums up the 60 votes needed to approve them, almost certainly in the courts.

While the Trumpian turmoil is new, past presidents’ attempts to compel localities to comply with federal policies have met with mixed success. A new report, “Reagan vs. Cities: The 20th Century Battle Over South African Apartheid & Lessons for the Trump Era,” from Jobs to Move America and the Center for Media and Democracy, details the 40th president’s efforts to stamp out the U.S. anti-apartheid movement by several means, including denying federal funds to cities and states that took actions against companies that did business in South Africa.

The report explores the mixed outcomes for two cities that sought to stand their ground against this federal overreach. In 1984, the U.S. Department of Transportation, with the backing of the Justice Department, threatened New York City with the loss of transportation dollars unless the city revoked a local ordinance preventing city officials from contracting with businesses that operated in South Africa or used materials from the country. Although Mayor Ed Koch complained all the way up to President Ronald Reagan, the feisty New Yorker finally backed down, declined to take the matter to the courts, and finally reworked the measure to satisfy federal officials and preserve the city’s federal funding.

Two years later, Baltimore, which had crafted a local ordinance requiring city pension funds to divest $1.1 billion from entities that did business with South Africa, also came under fire. The trustees of the pensions funds and the funds’ beneficiaries (who feared significant financial losses in the short timeframe the funds had to comply with the divestment ordinance) joined forces to take the city to court.

The State Department and the National Security Council submitted briefs supporting the trustees and beneficiaries. But Baltimore ultimately prevailed in the state courts, and the Supreme Court decided not to hear the case. By 1991, nearly 100 cities in 28 states had taken a variety of actions against companies doing business in South Africa.

Although an early attempt by Trump to deny federal funding to sanctuary cities was roundly criticized as unconstitutional (the president aimed to usurp powers granted to Congress) and ultimately blocked by a federal judge, Republicans in Congress have stepped up to take their turn at the issue. Federal courts likely will have the final word on whether the federal government can compel states to assist in immigration enforcement activities or whether such provisions infringe on state powers.

Congress can indeed attach conditions to funding, especially if the funding is related to a specific purpose like law enforcement. Since the Supreme Court has indicated its willingness to consider wider immigration questions like those posed by the administration’s travel ban, it is unlikely that the high court would decline to weigh in, as it did in the Baltimore pension funds question.

Like the anti-apartheid activists, sanctuary cities supporters may find that public response to the crisis may compel different responses from Washington. Grassroots efforts to protect undocumented people have sprouted up all over the country; nearly 650 of the country’s more than 3,000 counties have placed limitations on local law enforcement assistance to federal immigration detention efforts.

But the support for such measures is far from solid in the country at large. Lawmakers in more than 30 states have introduced bills to curb cities’ abilities to weigh in on immigration enforcement. A new Gallup poll shows that Americans’ interests in decreasing the numbers of immigrants admitted to the country have not shifted dramatically.

The “Reagan vs. Cities” report also notes that in addition to cutting off federal funds and other measures, Trump’s tactics include “a public relations strategy aimed at vilifying opponents.” The court of public opinion, however, isn’t always malleable. Reagan may have been the “great communicator,” but he was mostly unable to compel cities and states to abandon divestment and other economic strategies aimed at crippling South African apartheid. Trump, if anything, is more of a great alienator than communicator, who will ultimately run up against the numerical impossibility of deporting millions of undocumented people.


          Voting Fights in the States   
AP Photo/Andrew Selsky

Oregon Governor Kate Brown, at podium, celebrates Oregon's first year of an automatic voter registration program with a news conference, where she said that in the November election, over 97,000 ballots were cast by new voters registered by the so-called motor voter program. Hazelnuts contained in the bags in the foreground represent the 270,000 Oregonians who were registered to vote by the program. 

The national battle over voting rights and “voter fraud” will play out in Washington over the next months in relation to the Kobach-Pence commission and the resistance to it. But in the meantime, issues have been joined this spring in state legislative sessions around the country. And the resulting scorecard may surprise you.

Back in November, when the dust settled after the election, the numbers on partisan control of legislatures seemed stark and frightening for advocates of voting rights and election reform. Republicans controlled both chambers in 31 states, and had the full “trifecta,” including the governor, in 24. In sharp contrast, Democrats controlled both houses in only 13 states, and had trifectas in a mere six. Looking at these numbers, at the post-Shelby decision absence of Voting Rights Act preclearance protections, and at the radically changed posture of the Justice Department, many feared an onslaught of voter-suppression legislation that would create an even more diminished electorate for the elections of 2018.

Well, it’s now the end of June, and while some legislatures are still in session, the great majority have finished their business for the year. Several states have indeed passed bad bills. But, overall, the results are significantly better, both in staving off voter-suppression efforts and in expanding voting rights and voting access, than one might have expected as the sessions began.

First, A Few Real Successes

Perhaps the most remarkable outcome this year is in Illinois, which has a Democratic legislature and a conservative Republican governor, Bruce Rauner. Last year, the legislature passed an automatic voter registration (AVR) bill with bipartisan support, but Rauner vetoed it. 

Under automatic voter registration, people who go to the DMV, and potentially other agencies as well, are automatically put on the voter roll, unless they opt out. In Oregon, which was the first adopter, AVR has added several hundred thousand voters to the rolls.

In Illinois, an AVR bill was reintroduced this year and, remarkably, passed both chambers with unanimous votes. While Rauner has 60 days to sign the bill, all indications are that he will, joining Illinois with eight other states and the District of Columbia where AVR is being implemented, and showing that maybe, at least in Illinois, encouraging people to register and vote doesn’t seem like a partisan trick.

The victory was also the work of a broad and determined coalition of voting-rights and election-reform advocacy groups, under the rubric of Just Democracy. Brian Gladstein, Executive Director of Common Cause Illinois and one of the leaders of the coalition said:

This bill will bring over one million eligible voters into the electoral process in Illinois. During a time of heightened partisanship in Springfield and across the nation, we have demonstrated that breaking down barriers to the ballot box can be achieved and supported by both Democrats and Republicans.

AVR still has a good chance to pass in other states. In Rhode Island, an AVR bill passed the House unanimously and a positive vote in the Senate is expected shortly. Governor Gina Raimondo has said she will sign it if it comes to her desk. In Massachusetts, where the legislative session goes on all year, an AVR bill with 102 legislative sponsors has been heard in committee (23 speakers in favor and none against), and could be before the full legislature in the fall.

In some other states, AVR made headway but was eventually blocked. These include Maine, New Mexico, and Nevada. In Nevada’s case, the bill passed both houses, but was vetoed by Republican Governor Brian Sandoval. A ballot initiative on AVR now goes to the voters, who will have the chance to approve it in the November 2018 general election.

In addition to automatic voter registration, other real gains were made. Utah expanded opportunities for early voting and absentee voting. New Jersey improved its processes for military voters and Indiana improved its registration process at the motor vehicle department.

Another issue where progress was made, though halting and slow, is restoration of the right to vote for citizens with felony convictions. Forty-nine bills were introduced in 16 states to restore voting rights to formerly incarcerated people who have served their sentences. A real victory occurred in Wyoming, which enacted a bill providing that people who completed their sentence after January 1, 2010, do not need to submit an application for restoration of voting rights and will automatically be issued a certificate of restoration.

In Florida, where 1.7 million citizens can’t vote due to the state’s lifetime ban on voting by people with felony convictions (1.5 million have fully completed their sentences), the broad and bipartisan Florida Rights Restoration Coalition has made major strides. The Florida Supreme Court has approved language for a proposed ballot initiative to restore voting rights to ex-felons; now the job is collecting 700,000 signatures on the petition in order to be on the ballot in November 2018.

In Minnesota, the Restore the Vote Coalition got a bill to more effectively restore voting rights through one house of the legislature. And in Nebraska, the state’s conservative unicameral legislature passed a bill to restore voting rights to citizens upon release from incarceration by a 27-13 margin, but the bill was vetoed by Governor Pete Ricketts. (Nebraska voting-rights advocates also derailed a proposed constitutional amendment requiring voter ID.)

Now for the Bad News

To be clear, and clear-eyed, the move to make voting more difficult and restricted continues, and several states enacted laws designed to limit the vote in one way or another. The forces bent on restricting the vote have won significant victories over the last several years, though many of the laws have been successfully challenged in court. In fact, of the worst voter-restriction bills that passed this year, a majority were actually efforts to re-pass laws struck down in court, altered in order to make them more judicially acceptable.

·      Iowa enacted a law, championed by Secretary of State Paul Pate, which includes restrictions on voter-registration drives; hindrances to Election Day, early, and absentee voting; strict voter-ID requirements; and—most troublesome—the right to purge voter rolls of “non-citizen” names without any clarity on who and how such decisions to purge are made. This could lead to significant numbers of eligible voters being disenfranchised.

·      New Hampshire passed a bill restricting registration for students and low-income voters by requiring proof of residency for those who register 30 days before the election, with investigation and criminal penalties for failure to comply. (A component to eliminate same-day registration was dropped from the bill.)

·      In Arkansas, a voter-ID law, modified after courts struck down an earlier, similar law, was passed and signed. The law reinstates the requirement that a voter must provide one of a narrow choice of IDs at the polls. In addition, the legislature put a constitutional amendment requiring voter ID on the 2018 ballot.

·      In North Dakota, the only state that doesn’t require voter registration at all, the governor signed strict voter-ID requirements into law. The bill was softened somewhat, particularly in regard to the Native American community, to avoid the fate of the 2016 version of the law, which was struck down in court.

Why Less Carnage?

No one wants to be naïvely optimistic, or to underestimate how much damage has already been done in states by determined efforts at voter suppression. Racially charged and politically motivated efforts continue at every level to find ways to discourage people from registering and voting. In the wake of Shelby, these efforts have multiplied and will continue to do so.

But, overall, the results in the 2017 legislative sessions were not nearly as bad as seemed likely last November. There was not a deluge of major voter-suppression legislation. Some bad bills were passed, a number were weakened as they made their way through the legislative process, and a significant number were sidetracked along the way. Two main reasons for this seem clear.

First, the courts, both state and federal, have played a significant role in preventing extreme assaults on voting. Prodded by strong litigation efforts from voting-rights organizations, in state after state, courts have found voter-suppression efforts unconstitutional, blocking their implementation. In addition to the direct effects of the cases, their cumulative impact has been to caution and restrain advocates of restrictive legislation from overreaching.

Second, it is deeply encouraging to see the growing power, sophistication, and rapid response capabilities of the movement for an inclusive democracy. In state after state, coalitions were activated, or created, to fight back against the efforts to stifle, shrink, and bleach the vote. 

And the advocates didn’t just play defense. Despite the potentially unfavorable partisan makeup in so many states, the affirmative action for expanding the right and ability to vote continues to make headway—winning in some states, gathering momentum for future victories in others. 

And there is one other cause for optimism worth noting. I recently attended a conference of 200 legislators and election officials from around the country, co-convened by the National Conference of State Legislatures (NCSL) and the Democracy Fund. The focus of the event was election technology and administration. There was strong and bipartisan support for improving election machinery, combating the challenges of cybersecurity, and fighting for adequate funding to run elections in the best way possible. This is one of the reasons that online registration and automatic voter registration are making real progress; they are technical improvements as well as access expansions. The election officials take their responsibilities seriously, and if legislators, state and national, would take their cues, bipartisan progress just might become more possible.

Thanks to Cecily Hines for research and perspective for this column.


          Trump’s Travel Ban Is Back   
AP Photo/Ted S. Warren

Travelers wait in line near an Emirates ticket counter at the Seattle-Tacoma International Airport. 

A limited version of President Trump’s controversial travel ban is back in place after the Supreme Court ruled that the federal government could impose restrictions on certain foreign travelers and refugees. The constant back-and-forth rulings have created a bureaucratic nightmare for those involved in the refugee resettlement process, and Thursday’s developments promise even more disruption.

While President Trump proclaimed victory, refugee and human rights advocates have been on tenterhooks this week. The high court’s decision was certainly a blow to opponents of the ban, but just how hard that blow is will depend on the Trump administration’s next moves.

The government’s new guidelines would significantly limit the total number of noncitizens and refugees that can enter the country, according to a State Department background briefing Thursday afternoon. The department released its guidance just four hours before the ban is scheduled to go into effect. However, the Department of Homeland Security, which controls border enforcement, has not issued its own guidance on the new policies.

During its short but turbulent existence, two versions of the travel ban have been issued, blocked by federal courts, and now given the go-ahead with certain restrictions. But the Supreme Court decision and the subsequent federal guidelines do not reassure refugees advocates. “Nothing is off the table when it comes to this travel ban,” says Justin Cox, a National Immigration Law Center (NILC) staff attorney. “We can’t assume smooth sailing.”

On Monday, the justices said that they would wait until October to hear two cases regarding Trump’s travel ban. Until then, the high court granted a partial stay to injunctions freezing the controversial executive order, allowing a limited version of the travel ban to go into effect.

Noncitizens who can show they have a “bona fide relationship” with a “person or entity” in the United States will be allowed to enter the country, as will anyone who has already been issued a visa. People who cannot prove that they have a close relationship with a U.S. citizen will be banned from entering the country for 90 days if they are from the six Muslim-majority countries included in the executive order. That time period increases to 120 days for refugees from any country who have not yet received permission to enter the U.S. 

The high court gave a few examples of what constituted a bona fide relationship with a person or entity in the U.S., such as visiting a relative or traveling to work or study, but stopped short of providing comprehensive definitions, preferring to leave the work of coming up with more nuanced characterizations to the federal government and lower courts.

But under the new guidelines, relatives only include immediate family members already in the country: parents, spouses, children, adult sons or daughters, sons- or daughters-in-law, and siblings. Grandparents were not included in the guidelines.

Refugees who have already been admitted to the U.S. and are booked to travel before July 6 will be exempt from the ban. A senior administration official said that the fate of those who’ve been booked travel after that date would be addressed at a later time. The briefers also said that establishing valid connections with American entities by refugees would need to be “formal” and “documented”: Simply being connected to a resettlement agency would not be sufficient. Roughly one-third of refugees waiting to be admitted do not have family ties in the United States, according to resettlement agency estimates.

“This is an unduly restrictive approach,” says Eleanor Acer, director of Human Rights First’s Refugee Protection program. “Refugees who go through multiple security entities, are approved by the DHS [Department of Homeland Security], vetted by various government agencies, and have long relationships with resettlement agencies should all be viewed as having requisite bona fide relationships.”

The limited ban could still leave thousands of people in limbo. “This isn’t like postponing a vacation,” says Melanie Nezer, vice president of policy and advocacy at HIAS, a Maryland-based Jewish resettlement agency. “These are life or death situations that refugees could be forced to remain in.”

Of the top 10 countries for total numbers of refugees granted permission to enter the United States during the last fiscal year, only three—Somalia, Syria, and Iran—were listed in Trump’s original executive order. Iraq is also among the top 10, and there are tens of thousands of people who worked with the U.S. government who are waiting to get clearance to resettle in this country. Under these current guidelines, it’s not clear if they would be granted entry.

The reinstated ban has stoked fears of a return to the chaos that played out in airports across the country following the haphazard rollout of Trump’s first executive order.

Naureen Shah, Amnesty International’s senior director of campaigns announced that the organization would be sending researchers to airports to “monitor how the ban is being implemented.”

“There’s going to be massive confusion in airports around the world,” says Acer, who anticipates a heightened legal response to refugees connected to resettlement agencies being blocked from entering the country.

In his partial dissent, Justice Clarence Thomas warned that the court’s decision would “invite a flood of litigation”—a comment that will likely prove prescient in the months to come. Lawsuits challenging the original and updated versions of the travel ban have inundated federal courts.

“I expect that we’ll be back in court soon,” says Cox of the NILC. “No one is going to take this lying down.”

Critics of the ban argue that refugees are already the most rigorously vetted group allowed into the U.S., undergoing a process that can take up to two years or more. “I don’t know how much more extreme the vetting can get, frankly,” says Cornell law professor Stephen Yale-Loehr.

This new wave of uncertainty unfolds at a time when the number of approved refugees approved to enter the U.S. had just started to bounce back after Trump’s initial immigration restrictions. Resettlement numbers plummeted in the wake of Trump’s first two attempted travel bans: In January, the U.S. admitted nearly 7,000 refugees admitted by March that number had declined to just 2,000 in March, according to State Department data

More than 46,000 refugees have been admitted and resettled in the U.S. in fiscal 2017, nearly reaching the 50,000 limit that Trump had specified in his original executive order, but still a long way off from the 110,000 ceiling that the Obama administration had put in place.

The Supreme Court allowed the U.S. to cap refugee arrivals, but justices did not allow the Trump administration to prohibit refugees with bona fide relationships, even if “the 50,000-person cap has been reached or exceeded.”

Officials at HIAS, one of nine agencies that work with the State Department to resettle refugees, were already worried they wouldn’t hit their resettlement targets before the travel ban was reinstated. Even in the “best-case” scenario, the agency expects to resettle 1,400 fewer than they had been approved to resettle at the beginning of the fiscal year. Other resettlement agencies have reported similar drops.

“The program changes on an almost weekly basis,” says Nezer. According to Nezer, these changes in policy can stall refugee case processing. That can often result in medical and security clearances expiring, which in turn creates even lengthier delays.

Trump had originally ordered federal agencies to wait 72 hours after the court’s decision to implement the ban. Trump maintains that the ban is necessary to protect the nation from terrorist activities and praised the court’s decision as “a clear victory for our national security.”


          Trump's Appointment to Gender Equality Office Has Hateful Anti-Trans Record    
PoliticsTransgenderFeminismWomenDonald Trump Tracy E. Gilchrist

Adding to his record of appointing people to posts they are fundamentally unqualified to hold, Donald Trump has named an anti-trans activist as a senior adviser to the office of Gender Equality and Women’s Empowerment. Bethany Kozma, who held positions in the White House and Homeland Security under George W. Bush, vehemently opposed guidelines issued by President Obama's administration that advised schools to let trans students use their preferred names and pronouns and use the restrooms and locker rooms that align with their gender identity, Buzzfeed reports. And to Google the woman who will advise on gender equality in the office that is part of the U.S. Agency for International Development (USAID) is to uncover a treasure trove of hateful, woefully misguided anti-trans propaganda. 

“A boy claiming gender confusion must now be allowed in the same shower, bathroom, or locker room with my daughter under the president’s transgender policies,” Kozma wrote in a 2016 piece about the Obama administration guidelines. “When I learned that predators could abuse these new policies to hurt children in school lockers, shelters, pool showers, or other vulnerable public places like remote bathrooms in national parks, I realized I had to do something.” 

In a disgusting attempt to equate trans women with sexual predators, Kozma’s story included a video of women sharing their stories of how they were sexually assaulted by cisgender men in spaces like bathrooms and locker rooms. 

While naming Kozma, who clearly doesn’t believe that trans women are equal to cisgender women, as an adviser at the office of Gender Equality and Women’s Empowerment is a slap in the face to all women, her position in the office is further complicated by the fact that USAID has a long history of supporting programs that advance LGBT equality around the world, including a program that leverages financial contributions to support “LGBTI human rights and development in 14 countries around the world,” HIV and AIDS prevention efforts, and an initiative to empower Asia’s LGBT people, according to its website.

A spokesperson for USAID said Kozma’s appointment does not mean there has been a change in policy in terms of its commitment to LGBT rights, according to Buzzfeed. 

"USAID is committed to promoting a work environment that is free from sexual-orientation and gender-identity discrimination, in accordance with existing federal law," the spokesperson said. 

But Kozma's anti-trans crusade did not end with her campaign to oppose Obama’s protections for trans students in 2016. Earlier this year she wrote a piece for The Daily Signal (part of the conservative think tank the Heritage Foundation) in which she patted herself on the back for being a part of the movement that she believes helped influence the Trump administration to rescind those protections.  

“Trump’s decisiveness on this issue shows that he cares more about people than political correctness — that all our children deserve a safe and respectful learning environment, not just a very small minority, and that privacy and free speech are rights that American parents hold dear,” Kozma wrote this February. 

00
          Indian Army should learn from 'historical lessons': China   

Army Chief Bipin Rawat had said that India is prepared for security threats posed by China, Pakistan as well as by internal threats. Chinese soldiers put up a flag atop their post at the India-China route at Nathu La.


          S/2017/10/Add.25    
Summary statement by the Secretary-General of matters of which the Security Council is seized and of the stage reached in their consideration
[ Arabic | Chinese | English | French | Russian | Spanish ] - 1 page
          S/2017/524   
Letter dated 20 June 2017 from the Chargé d’affaires a.i. of the Permanent Mission of the United Kingdom of Great Britain and Northern Ireland to the United Nations addressed to the President of the Security Council
[ Arabic | Chinese | English | French | Russian | Spanish ] - 3 pages
          S/Agenda/7986   
Provisional agenda for the 7986th meeting of the Security Council
[ Arabic | Chinese | English | French | Russian | Spanish ] - 1 page
          S/Agenda/7987   
Provisional agenda for the 7987th meeting of the Security Council
[ Arabic | Chinese | English | French | Russian | Spanish ] - 1 page
          S/Agenda/7988   
Provisional agenda for the 7988th meeting of the Security Council
[ Arabic | Chinese | English | French | Russian | Spanish ] - 1 page
          S/Agenda/7991   
Provisional agenda for the 7991st meeting of the Security Council
[ Arabic | Chinese | English | French | Russian | Spanish ] - 1 page
          S/RES/2361 (2017)   
Resolution 2361 (2017) Adopted by the Security Council at its 7986th meeting, on 29 June 2017
[ Arabic | Chinese | English | French | Russian | Spanish ] - 3 pages
          S/RES/2362 (2017)   
Resolution 2362 (2017) Adopted by the Security Council at its 7988th meeting, on 29 June 2017
[ Arabic | Chinese | English | French | Russian | Spanish ] - 5 pages
          Did You See It? Say Something!   
I am surprised at the number of people I’ve come in contact with lately who know nothing about the Homeland Security’s See Something, Say Something program, also known as See It, Say It in Brea. The program is our immediate call to action when we notice someone exhibiting strange behavior, or spot an item that […]
          TECRO in the US - MK 48 Mod 6AT Heavyweight Torpedo (HWT)   
The State Department has made a determination approving a possible Foreign Military Sale to Taipei Economic and Cultural Representative Office (TECRO) in the United States for forty-six (46) MK 48 Mod 6AT Heavyweight Torpedoes (HWT). This sale will include HWT containers, torpedo support, torpedo spare parts, publications, training, weapon system support, engineering and technical assistance. The total estimated program cost is $250 million. The Defense Security Cooperation Agency delivered the ...
          Home Burglar Alarm Systems   
Home burglar alarm systems can provide security for the family, discounts on home insurance, and protection for assets.

          Cyber Security IT Apprentice   
Swindon, At Nationwide, we’re here for our members and we put their needs first in everything we do. And now, more than ever, two things are helping us go from strength to strength: we put our customers first, and we’re known for being open, honest and trustworthy. We’re also the world’s largest building society, with communities at the heart of everything we do. We aim to do the right thing for our member
          Swindon - SIA licensed Door Supervisors   
SW-Swindon, Phoenix Security are now recruiting SIA licensed Door Supervisors to work in Swindon. As a Door Supervisor you will be an essential part of the venue safety team, maintaining order, customer care and safety. Your responsibilities will involve supervising customer arrivals, carrying out identification checks, screening and searching individuals, controlling entry and exit routes, crowd control and
          Senior Sitecore Developer   
NJ-Park Ridge, RESPONSIBILITIES: Kforce has a client that is seeking a Senior Sitecore Developer in Park Ridge, New Jersey (NJ). Responsibilities: Participate in all aspects of application development and design including performance, scaling, coding, caching, security, encryption, state management, error logging and testing Work with development partners to implement and maintain applications Take a product thr
          Washington Has Been At War For 16 Years: Why?   
For sixteen years the US has been at war in the Middle East and North Africa, running up trillions of dollars in expenses, committing untold war crimes, and sending millions of war refugees to burden Europe, while simultaneously claiming that Washington cannot afford its Social Security and Medicare obligations or to fund a national health More
          Administrative Assistant - Homeland Security and Emergency Services, Division of - Albany, NY   
Administer communication by preparing and keeping track of correspondence and answering questions from staff, the public, elected and appointed officials.... $55,082 - $68,351 a year
From StateJobsNY - Thu, 15 Jun 2017 20:40:18 GMT - View all Albany, NY jobs
          Parisa Tabriz, "Hacker" Wanita yang Jadi Bos di Google   

KOMPAS.com -  Google merekrut banyak peretas untuk melindungi sistemnya dari gangguan pihak luar. Tugas mereka adalah mencari lubang keamanan dalam sistem sebelum ditemukan peretas jahat.

Salah satu peretas yang direkrut Google adalah wanita 31 tahun bernama Parisa Tabriz yang di kalangan karyawan Google dijuluki sebagai "Security Princess." Kenapa bisa dijuluki seperti itu?

Menurut Parisa yang kini menjabat sebagai Head of Security di tim peramban Google Chrome mengatakan bahwa ia memang meminta mendapatkan nama jabatan yang tidak terlalu serius.

"Saya rasa gelar Information Security Engineer kedengarannya membosankan, semua pria-pria di Google kerjanya sangat serius, karena itu julukan "Security Princes" rasanya lebih cocok," ujar wanita keturunan Iran-Amerika ini kepada Telegraph (4/10/2014).

Gelar Security Princess itu pun dipakai Parisa di dalam kartu namanya.

Parisa kini menjadi salah satu anomali di Silicon Valley, bukan hanya karena ia seorang wanita, namun juga menjadi bos dan memimpin 30 ahli yang tersebar di AS dan Eropa.

Parisa yang pada tahun 2012 pernah masuk dalam daftar 30 orang di bawah umur 30 tahun yang layak diperhatikan yang dibuat oleh Forbes itu mengatakan bahwa masih sediktinya wanita dalam industri teknologi juga disebabkan karena wanita masih meremehkan dirinya masing-masing.

Äda studi yang dilakukan beberapa tahun lalu yang mempertanyakan mengapa orang-orang meninggalkan kuliah ilmu komputer mereka," katanya.

"Wanita yang drop-out cenderung memiliki nilai rata-rata B minus dan alasan utamanya adalah pelajaran yang susah, sementara pria yang keluar rata-rata memiliki nilai C dan alasan mereka adalah ilmu itu tidak menarik," lanjut Parisa.

"Di industri keamanan komputer, keahlian itu lebih penting daripada jenis kelamin, pria atau wanita, untuk mendapatkan pekerjaan itu, kita harus berusaha semaksimal mungkin," demikian tegasnya.

Sebagai white-hat hacker, Parisa merasa keberadaan mereka perlu lebih dipromosikan. Ia mencontohkan kasus pembobolan iCloud yang mengakibatkan beredarnya foto-foto bugil artis-artis Hollywood.

" Hacker butuh publikasi yang lebih baik, semua harus tahu bahwa tidak semua dari kami berperilaku negatif seperti itu," ujarnya.

          "Hacker" Tak Selalu Jahat, Contohnya Pemuda 13 Tahun Asal Pakistan Ini   

KOMPAS.com - Ahsan Tahir bukan remaja sembarangan. Di umur yang baru genap 13 tahun, ABG asal Karachi, Pakistan ini sudah menemukan aneka macam celah sekuriti di sistem komputer berbagai perusahaan besar.

Untunglah, Tahir tak berniat jahat. Dia adalah hacker putih alias “ethical hacker” yang mencari kelemahan sistem, lalu memberitahukannya ke perusahaan terkait supaya diperbaiki. Atas jasanya ini, Tahir kemudian diberikan imbalan berupa uang.

Mekanisme pelaporan celah keamanan oleh pihak luar tersebut sudah jamak diterapkan perusahaan-perusahaan teknologi di AS lewat serangkaian program “ bug bounty”. Penemu bug akan diganjar hadiah apabila melaporkannya.

Tahir sang hacker muda berkiprah di ranah “ bug bounty” ini. Perusahaan-perusahaan teknologi yang pernah dibantunya menemukan bug termasuk para raksasa seperti Google dan Microsoft.

 “Semakin banyak hacker yang bekerja, semakin banyak bug ditemukan, semakin aman pula perusahaan-perusaan itu. Sederhana saja sebenarnya,” ujar Tahir menjelaskan motivasinya, sebagaimana dirangkum KompasTekno dari NBC News, Senin (15/5/2017).

Belajar sendiri

Kedua orang tua Tahir tidak memiliki latar belakang teknologi. Tahir pun awalnya tak tahu menahu soal peretasan komputer. Ketertarikannya terhadap dunia hacking berawal ketika situsnya sendiri menjadi korban peretasan.

“Saya kemudian memutuskan untuk mencari bug di situs milik saya,” kata Tahir. Dia belajar hacking secara otodidak, dengan menonton video tutorial di YouTube, membaca blog, dan bereksperimen.

Tahir kemudian menemukan situs yang menerangkan bahwa seorang hacker bisa mendapat bayaran dengan meretas situs perusahaan, kemudian melaporkan celah keamanan yang ditemukan. Itulah yang kemudian dia lakoni.

Di usia yang masih belia, Tahir kini menjadi seorang rising star di industri cyber security. Casey Ellis, pendiri dan CEO perusahaan crowdsourcing sekuriti Bugcrowd, mengatakan bahwa remaja seperti Tahir adalah pejuang masa depan di ranah keamanan digital.

“Digital native (orang yang sejak kecil familiar dengan teknologi komputer dan internet) berpotensi besar untuk menjadi hacker yang mahir. Mereka bisa memberi sumbangsih luar biasa untuk perusahaan yang hendak menjaga keamanan bisnis dan konsumen,” kata Ellis.

Program bug bounty kini sudah banyak digelar oleh banyak perusahaan, mulai dari Apple hingga Pentagon. Maklumlah, hacker luar biasanya bisa memberikan masukan tentang celah keamanan yang luput dari pengamatan tim sekuriti internal perusahaan.

Besarnya hadiah uang yang ditawarkan bermacam-macam, tergantung kebijakan perusahaan dan tingkat kegawatan bug. Rentangnya bisa antara 50 dollar AS hingga 350.000 dollar AS.

Ingin bantu mengamankan internet

Tiap hari usai bersekolah, Tahir pulang ke rumah untuk hacking selama enam jam. Setelah itu dia mengerjakan PR dan tugas-tugas lain.

Penghasilannya dari berburu bug terbilang besar dibanding remaja seusianya yang menempuh jalan lain untuk mencari sampingan.

Tahir bahkan bisa membeli iPhone 7 dan sedang menabung untuk membeli mobil. Rencananya mobil akan dibeli ketika dia sudah berusia 18 tahun dan boleh memiliki SIM.

Usia Tahir yang masih belia kadang menjadi kendala dalam mengikuti program bug bounty. Microsoft, misalnya, menetapkan usia minimal 14 tahun buat hacker yang ikut serta. Tahir pun baru bisa menarik bayaran sebesar 500 dollar AS dari Microsoft pada Juli nanti, saat dia genap berusia 14 tahun.

Saat dewasa nanti, Tahir bercita-cita ingin menjadi software engineer sambil terus terus melakoni bug bounty sebagai pekerjaan sampingan.  Dia ingin bantu membuat internet jadi tempat yang lebih aman dan menyebarkan ilmu hacking yang dimilikinya lewat tutorial YouTube.  

“Saya bangga bisa ikut membantu mengamankan internet dan dunia,” kata Tahir. “Ini karena mungkin peperangan berikutnya akan berlangsung di jagat cyber.”


          Tamera Mowry   

birthday : 1978-07-06
nick : Thing 2
birthname : Tamera Darvette Mowry
sign : Cancer
hometown : Gelhausen, West Germany

Introduction

Tamera Mowry is a clone of her sister, Tia Mowry. She was created as a part of the WB's now defunct genetics division which ended in the late 1970s.

Life Story

See: Tia Mowry

Just kidding! Not really, but if you're too lazy to click, here goes...

Tamera was born in Gelhausen, West Germany. Her parents are Darlene Flowers, who managed her children's careers and also worked as a security guard, and Timothy Mowry, who was in the armed services and later became a police officer in California.Her mother is African American and her father is Italian-American; the two met in high school in Miami and both joined the military. She is older than her twin sister, Tia, (by two minutes), brother Tavior Mowry and brother Tahj Mowry, who starred in television's "Smart Guy." Her family is "close-knit" and "deeply religious", as ...

read more about Tamera Mowry

          Security fears over return of foreign fighters   

The military onslaught against so-called Islamic State in Syria is likely to result in increasing numbers of foreign fighters returning to their home countries, according to the Government’s draft risk report.


          Senior Sales Engineer   
CA-Santa Clara, CenturyLink (NYSE: CTL) is a global communications and IT services company focused on connecting its customers to the power of the digital world. CenturyLink offers network and data systems management, big data analytics, managed security services, hosting, cloud, and IT consulting services. The company provides broadband, voice, video, advanced data and managed network services over a robust 265,
          A-Rod Tells Jimmy Fallon He Gets Confused for J-Lo's Security Guard, Plays Egg Russian Roulette   
Happens.
          Assistant Project Engineer - Network Rail - Glasgow   
Network Rail adheres to the Baseline Personnel Security Standard (BPSS). Network Rail welcomes applications regardless of age, disability, marital status... £31,000 - £33,000 a year
From Network Rail - Thu, 29 Jun 2017 07:54:01 GMT - View all Glasgow jobs
          Senior Gauging Engineer - subject to consultation - Network Rail - Glasgow   
Network Rail adheres to the Baseline Personnel Security Standard (BPSS). Network Rail welcomes applications regardless of age, disability, marital status... £50,000 - £56,250 a year
From Network Rail - Tue, 27 Jun 2017 07:50:43 GMT - View all Glasgow jobs
          Liability Negotiations Researcher - Network Rail - Glasgow   
Network Rail adheres to the Baseline Personnel Security Standard (BPSS). Network Rail welcomes applications regardless of age, disability, marital status... £24,000 - £28,000 a year
From Network Rail - Fri, 23 Jun 2017 07:47:25 GMT - View all Glasgow jobs
          Construction Manager - Network Rail - Glasgow   
Experience within the rail industry. Network Rail adheres to the Baseline Personnel Security Standard (BPSS).... £39,200 - £44,100 a year
From Network Rail - Thu, 22 Jun 2017 07:46:11 GMT - View all Glasgow jobs
          Oxfam warns that modern day land rush is forcing thousands into greater poverty   

Oxfam calls for British company to investigate the forced eviction of more than 20,000 Ugandans to make way for its plantations

Oxfam today launches a major new report highlighting the growing pace of land deals brokered around the world, often to the peril of poor communities who lose their homes and livelihoods – sometimes violently – with no prior consultation, compensation or means of appeal.

In the report Land and Power, the international agency reveals preliminary research indicating as many as 227 million hectares have been sold, leased or licensed in large-scale land deals since 2001, mostly by international investors. Lack of transparency and the secrecy that surrounds land deals makes it difficult to get exact figures but to date up to 1,100 of these deals amounting to 67 million hectares have been cross checked. Half of these deals are in Africa, and cover an area nearly the size of Germany. (1)

Oxfam warns this modern day land rush follows a drive to produce enough food for people overseas, meet damaging biofuels targets or speculate on land to make an easy profit. However, many of the deals are in fact ‘land grabs’ where the rights and needs of the people living on the land are ignored, leaving them homeless and without land to grow enough food to eat and make a living.

This is likely to get worse as the increasing demand for food, the gathering pace of climate change, water scarcity and non-food crops like biofuels compete for land. Already, nearly three billion people live in areas where demand for water outstrips supply.

Land grabs: devastating vulnerable communities

Oxfam International’s Executive Director Jeremy Hobbs said: “The unprecedented pace of land deals and the increased competition for land is leaving many of the world’s poorest people worse off. In the scramble for more land, investors are ignoring the people who currently live on the land and depend on it to survive.”

Oxfam’s report profiles the devastating effect land grabs in Uganda, South Sudan, Indonesia, Honduras and Guatemala are having on vulnerable communities. The report is part of Oxfam’s GROW campaign which aims to secure a future where everyone has enough to eat. Women, who produce up to 80 per cent of food in some poor countries, are usually most vulnerable as they have weaker land rights.

In Uganda, Oxfam’s research indicates that at least 22,500 people have lost their homes and land to make way for a British timber company, the New Forests Company. Many evictees told Oxfam how they were forcibly removed and have been left destitute, without enough food or money to send their children to school. There were court orders in force which named the company but eye-witnesses say that company workers took part in some of the evictions anyway. NFC denies that it was involved in any evictions. (2)

Evicted without consultation or compensation

Christine, a farmer in her mid 40s, who lived in Kiboga district before the Uganda land grab said: “All our plantations were cut down – we lost the banana and cassava. We lost everything we had. The company’s casual laborers would attack us – they beat and threatened people. Even now they won’t let us back in to look for the things we left behind. I was threatened – they told me they were going to beat me if we didn’t leave.”

Hobbs said: “The Uganda case clearly shows how land grabs are slipping through the net of existing safeguards which are intended to ensure the protection of vulnerable people. Thousands of people are suffering because they have been evicted without meaningful consultation or compensation.

“The New Forests Company describes itself as an ethical company, adhering to international standards. It needs to investigate these claims urgently. It’s not acceptable for companies to blame governments. They must respect the needs and rights of poor communities affected by their investment.”

Prioritize existing land use rights

Oxfam is calling for investors, governments and international organizations to prioritize putting a stop to land grabbing by fixing the current policies and regulations which all too often fail to ensure that, when investors negotiate deals, local people are consulted, treated fairly, and that all relevant international standards are respected. These include the World Bank's International Finance Corporation Performance Standards and the Forest Stewardship Council’s standards.

Governments should avoid pandering to investors’ wishes, and prioritize existing land use rights – not just where legal land title or formal ownership rights are held. Governments should recognize that women have equal rights over land and ensure that all agricultural investments benefit local communities who rely on the land to survive. While governments and companies get their house in order to stop future land grabbing, there is an urgent need to remedy the damage done by existing land grabs, including in the case of the Uganda international investment.

Flawed biofuels policies

Perverse incentives such as the flawed biofuels targets, like the EU’s target of obtaining 10 per cent of transport fuels from renewable sources by 2020, should be scrapped to curb the rush on land to meet biofuel demand.

Meanwhile, the UN’s Committee on Food Security in Rome could take an important first step when it meets in Rome next month, by adopting credible pro-poor, pro-women guidelines on land tenure.

Hobbs said: “Land investment should be good news for people in poverty but the frenetic scramble for land risks putting development in reverse. We need urgent global action so that local people with relatively little do not lose everything for the benefit of a few, and to secure a future where everyone has enough to eat.”

Read more

English
Pull quotes: 
I was threatened – they told me they were going to beat me if we didn’t leave.
Quotee's organisation: 
Farmer from Kiboga district, Uganda
Notes to editors: 
  1. This data is compiled by the Land Matrix Partnership, a coalition of academic, research and non-governmental organisations. The 227 million figure is based on information on land deals over 200 hectares from a whole range of different sources including government reports, academic research, company websites, media reports and the few contracts that are available. The coalition is currently cross checking the records of land deals it has identified.  It is calling for increased transparency among companies and governments so that the true scale of the problem can be accurately understood.
    The Land Matrix Partnership includes the International Land Coalition, the universities of Bern and Hamburg, the French research institute CIRAD, the German agency for technical cooperation, GIZ and Oxfam.
  2. The evictions took place between 2006 and 2010. One High Court order was granted on 24 August 2009 and remained valid until 18 March 2010. The other was granted on 19 June 2009 and remained in force until 2 October 2009. Both were to restrain evictions by the company.
    The New Forests Company stated that the majority of local residents had no legal right to the land, that they had left peacefully and that the process was the sole responsibility of the Ugandan National Forestry Authority.  It told Oxfam that it had brought jobs and amenities to local communities and that its activities had been approved by the Forestry Stewardship Council and International Finance Corporation.

Useful figures:

  • The global economy, which is expected to triple in size by 2050, will demand ever more scarce natural and agricultural resources
  • Palm oil has become the world’s most consumed edible oil and can be found in up to half of all packaged food and hygiene products. Production is expected to double by 2050, increasing the land area under cultivation worldwide by 24 million hectares – six times the size of the Netherlands
  • In Guatemala, eight per cent of farmers account for 78 per cent of the land in production. Of the smallholders who control the remaining land, just eight per cent are women.

Oxfam’s GROW campaign is calling for global action to fix a broken food system where 925 million people already go hungry every day. This could get worse in the face of dwindling natural resources, like land, the gathering pace of climate change and increasing food price volatility. Find out how we can help prevent this from getting worse at www.oxfam.org/grow

Contact information: 

Tricia O'Rourke, tricia.orourke@oxfaminternational.org, +44 1865 339157 or +44 7876 397915

Space: 
Space only: 
Quotee: 
Christine

          VIDEO: Fan Runs Into Cardinals Shortstop Paul DeJong, Is Mobbed by Security   
No one was hurt.
          Re: how to apply visibility security on menu items or menu groups ?   

Well if it's data it might be easier actually.

If you are using a selection field in your record definition ("Request" for example) and a fixed list of values then yes it will be a problem.

 

A possible way would be to create a record definition (let's say "Menu Item" so it'll bring back memories ) that will hold the item list (so "request", "approve" etc...).

Then you create a named list based (let's say "request type") on this record definition "Menu Item").

Then in your record definition "Request" instead of having a selection field, you have a character field and you select as the named list "request type".

So now in your record editor in the UI design you will have a list with "request" or "approve".

 

Now the next step is hiding some entries. To do this you could implement some of the solution I mentioned or simply use the "security labels":

Creating or modifying security labels in record definitions - Innovation Suite


          Frederick Law Olmsted   
AVI has a good piece on the famous designer's early travels. I have nothing of value to add to what he says, but I do have a relevant story of roguery and mis-spent youth.

Way back in mumble-mumble I graduated from High School. This was at a school in Atlanta, Georgia. Naturally, we gave some attention to the "senior prank" that might have been better spent on preparing for the SATs. In fact, we planned the thing months in advance. It was decided that we would steal a desk from the school, one of the proprietary ones that obviously belonged to a school, spray paint it with "Kilroy was Here!" graffiti, and then hang it in a big oak opposite the school's main building.


The operation was divided into three phases. Mine was the first phase, the stealing of the desk. Needless to say this had to be done in such a way that the hanging of the desk would later seem to be a tremendous surprise. Thus, it had to disappear long before the prank, and in such a way that no one would be sure where it had come from. For that reason, I arranged to defeat the school's security systems -- both lock and electronic -- so that we could spirit out a desk in the middle of the night, in the winter-time long before graduation. We also rearranged the desks in the room during the operation so that no one would notice a missing one.

That was effected before Christmas. We then had plenty of time to paint the desk appropriately, concealing it for months in a secret location.

Near graduation day we had one of our comrades who was an expert tree-climber sneak into the park opposite the high school headquarters at night, and toss lines over the high tree limbs. Assuming his success -- this was before everyone had a cell-phone -- we arrived about 2 AM with the desk, so that it could be hoisted and secured in position. After that, it was a simple matter of removing the lines and exfiltrating the park before police noticed our activity. It was thus secured well above where anyone would be able to simply remove it.

Here is the tie-in: unbeknownst to any of us, the next day was the 100th anniversary of that park, which was designed by Frederick Law Olmsted. The mayor of Atlanta came down to give a speech at the very spot where we'd secured the "Kilroy was here!" desk.

Our comrade the tree-climber was immediately captured, as his hobby was too well-known for him to avoid detection. He was a stand-up guy, however, and the rest of the team escaped unpunished. I'm sure we're well past the statue of limitations now.
          American Pravda: Did the US Plan a Nuclear First Strike Against Russia in the Early 1960s?   
Several years ago, my articles advocating a large hike in the minimum wage caught the attention of James Galbraith, the prominent liberal economist, and we became a little friendly. As president of Economists for Peace and Security, he invited me to speak on those issues at his DC conference in late 2013. And after the...
          Java SE 8 Update 131 and More    
p.p1 {margin: 0.0px 0.0px 32.0px 0.0px; font: 20.0px Arial; color: #404040} li.li2 {margin: 0.0px 0.0px 31.2px 0.0px; font: 20.0px Arial; color: #1f4f82} li.li3 {margin: 0.0px 0.0px 31.2px 0.0px; font: 20.0px Arial; color: #252525} span.s1 {font-kerning: none; color: #1f4f82} span.s2 {font-kerning: none} span.s3 {color: #252525} span.s4 {font-kerning: none; color: #252525} ul.ul1 {list-style-type: none}

Java SE 8u131 (Java SE 8 update 131) is now available. Oracle strongly recommends that most Java SE users upgrade to the latest Java 8 update, which includes important security fixes. For information on new features and bug fixes included in this release, please read the following release notes:

Important Note: Starting with this Critical Patch Update releases, all JRE versions will treat JARs signed with MD5 as unsigned. Learn more and view testing instructions here. For more information on cryptographic algorithm support, please check the JRE and JDK Crypto Roadmap.

Oracle Java SE Embedded Version 8 Update 131 is also available. You can create customized JREs using the JRECreate tool. To get started, download an eJDK bundle suitable for your target platform and follow instructions to create a JRE that suits your application's needs.

Also released are Java SE 7u141 and Java SE 6u151, which are both available as part of Oracle Java SE Support. For more information about those releases, please read the following release notes: 


          Küçük lg g6 plus Hakkında Gerçekler Bilinen.   
LG G6 Plus Vs Galaxy S8 Plus Vs İPhone 7 Plus The LG G6+ will hit specific markets beginning next month with improved ​​security and user experience. The camera tweaks do not stop there as LG has also added a new square camera that is excellent for Instagram and comes
          Senior Information Security Advisor   

           Sudan says UN troops cut shows Darfur a 'closed chapter'    
The UN Security Council's decision to cut peacekeepers in Darfur shows the conflict in Sudan's war-torn region is a "closed chapter", the foreign ministry...
          The Ritz-Carlton, Dubai International Financial Centre: SECURITY OFFICER (Preferred Arabic speaker)   
Competitive: The Ritz-Carlton, Dubai International Financial Centre: At more than 80 award-winning properties worldwide, The Ritz-Carlton Ladies and Gentlemen create experiences so exceptional that long after a guest stays with us, the experience stays with them. As the premier worldwide provider of luxury experiences, we United Arab Emirates - Dubai
          From Human Rights to Biological Threats, 25th National Security Law Institute Covers U.S. Safety   
Streaming Audio

Prominent national security scholars and other experts, including former and current government officials, convened at the University of Virginia School of Law for the 25th National Security Law Institute earlier this month to discuss the nation


          Study Finds Hackers Could Use Brainwaves to Steal Passwords    
Research suggests EEG headsets, growing in popularity among consumers, need better security.
          Glenn Gerstell Discusses NSA’s Current and Future Challenges   
Streaming Audio

Glenn Gerstell, general counsel for the National Security Agency, discusses current challenges in national security, life in the general counsel’s office and careers in national security law.


          Social Security milestone: what happens when clients turn 66   
Four key features of the program hinge on reaching full retirement age.
          Women in National Security Law and U.S. Cybersecurity   
Streaming Audio

Panelists discuss how the roles and responsibilities related to U.S. cybersecurity are shared by the U.S. Department of Homeland Security, the U.S. Department of Defense and the private sector, and how each woman has become involved in this aspect of national security law.


          "The Evolving Threat of Terrorism," With Former NSA General Counsel Matt Olsen   
Streaming Audio Audio icon 16_09_29_olsen_counterterrorism.mp3

Matt Olsen, former director of the National Counterterrorism Center and general counsel to the National Security Agency, discusses the evolving threat of terrorism. 


          Tom Donilon '85 Explains Threats Next U.S. President Faces   
Streaming Audio

Former National Security Adviser Tom Donilon, a 1985 graduate of the University of Virginia School of Law, contends that the next president of the United States will inherit some of the worst global instability in modern times, and must be nimble enough to address a plethora of threats.


          Think Tank Director Shares Thoughts on Defeating ISIS   
Streaming Audio Audio icon 16_06_17_mcfate_isis.mp3

How to win the war against ISIS? Jessica Lewis McFate, a director at the Institute for the Study of War, discusses the intricacies at the 24th National Security Law Institute. 


          Professor Ashley Deeks Discusses Law and Policy Related to Drones in Armed Conflict   
Streaming Audio

UVA Law Professor Ashley Deeks, a senior fellow with the Center for National Security Law, talks about the use of drones in armed conflict, including the need for law and policy to catch up to technological capabilities.


          Neue Kaspersky-Suite für alle Geräte: Mit CHIP kommen Sie günstig an die Vollversion   
Das CHIP-Magazin Ausgabe 8/2017 hält ab 7. Juli eine ganz besondere Vollversion für Sie parat: Mit dem Magazin erhalten Sie den umfangreichen Schutz des brandneuen Kaspersky Security Cloud. Das Besondere: Die Software schützt Sie nicht nur unter Windows, sondern auch unter macOS, Android und iOS effektiv gegen alle aktuellen Bedrohungen. Wir stellen
          National Security Law, with UVA Law Professor Ashley Deeks   
Streaming Audio Audio icon 16_01_13_deeks_classroom.mp3

In the her fall National Security Law class, Professor Ashley Deeks discusses military targets and the use of drones, along with other national security law issues. Deeks previously served as the assistant legal adviser for political-military affairs in the U.S.


          "The Future of Violence," with Ben Wittes   
Streaming Audio

With the proliferation of data and technology, new threats to national security are coming, Benjamin Wittes explains in a talk about his book, "The Future of Violence: Robots and Germs, Hackers and Drones – Confronting a New Age of Threat." A senior fellow in governance studies at the Brook


          GROKTALKS @ TechEd    

Originally posted on: http://teamfoundation.net/archive/2005/05/19/40083.aspx

Do you GROK topics such as security? WSE? Biztalk? Advanced .NET topics? (to name a few)  Yes or no, you won't want to miss GROKTALKS at TechED2005... What are they? Stay Tuned...
          "International Law and Cyber Security," with Eneken Tikk-Ringas   
Streaming Audio

Eneken Tikk-Ringas, senior fellow for cyber security at the International Institute for Strategic Studies, talks about the development of international law in the context of cyber security.


          "The Role of the Legal Counsel to the Chairman of the Joint Chiefs of Staff," with Brig. Gen. Richard Gross '93   
Streaming Audio

Brig. Gen. Richard Gross, a member of the U.S. Army JAG Corps, is legal counsel to the chairman of the Joint Chief of Staff. His talk was given as part of the National Security Law Institute, sponsored by the Center for National Security Law. 


           Qatar to comply with new U.S. airline security measures -minister    
By Allison LampertMONTREAL, June 30 (Reuters) - Qatar will comply with enhanced security measures for flights to the United States designed to prevent...
          Tekmodo Inds Inc. (TEKXD: Grey Market) | Halted Security   
Fri, Jun 30, 2017 12:00 - Tekmodo Inds Inc. (TEKXD: Grey Market) - Halted Security - Effective Fri, Jun 30, 2017, TEKXD is designated with the status Halted. You may find a complete list of revoked/suspended securities at otcmarkets.com.
          Posera Ltd. (PRRSF: Grey Market) | Halted Security   
Fri, Jun 30, 2017 12:00 - Posera Ltd. (PRRSF: Grey Market) - Halted Security - Effective Fri, Jun 30, 2017, PRRSF is designated with the status Halted. You may find a complete list of revoked/suspended securities at otcmarkets.com.
          Profound Medical Corp. (PRFMF: OTCQX International) | Halted Security   
Fri, Jun 30, 2017 12:00 - Profound Medical Corp. (PRFMF: OTCQX International) - Halted Security - Effective Fri, Jun 30, 2017, PRFMF is designated with the status Halted. You may find a complete list of revoked/suspended securities at otcmarkets.com.
          Pilgrim Petroleum Corp. (PGPM: OTC Pink Limited) | Suspended Security   
Fri, Jun 30, 2017 12:00 - Pilgrim Petroleum Corp. (PGPM: OTC Pink Limited) - Suspended Security - Effective Fri, Jun 30, 2017, PGPM is designated with the status Suspended. You may find a complete list of revoked/suspended securities at otcmarkets.com.
          Immunoprecise Antibodies Ltd. (IPATF: OTC Pink Current) | Halted Security   
Fri, Jun 30, 2017 12:00 - Immunoprecise Antibodies Ltd. (IPATF: OTC Pink Current) - Halted Security - Effective Fri, Jun 30, 2017, IPATF is designated with the status Halted. You may find a complete list of revoked/suspended securities at otcmarkets.com.
          Fairmount Resources Inc. (FRSSF: Grey Market) | Halted Security   
Fri, Jun 30, 2017 12:00 - Fairmount Resources Inc. (FRSSF: Grey Market) - Halted Security - Effective Fri, Jun 30, 2017, FRSSF is designated with the status Halted. You may find a complete list of revoked/suspended securities at otcmarkets.com.
          Electrovaya Inc. (EFLVF: OTCQX International) | Halted Security   
Fri, Jun 30, 2017 12:00 - Electrovaya Inc. (EFLVF: OTCQX International) - Halted Security - Effective Fri, Jun 30, 2017, EFLVF is designated with the status Halted. You may find a complete list of revoked/suspended securities at otcmarkets.com.
          Israel's Illegitimate Tactics Against Palestinian Armed Resistance...   

Israel, a rogue state if ever there was one , pursues its "security" as a Jewish Zionist entity on all of Mandate Palestine through demonizing Palestinian Arabs, whom it has long subjected to a racist campaign that defines their resistance, both violent and non-violent, as anti-Semitism on the one hand and as terrorism on the other. Thankfully, Israel's cover for its exploitation of anti-Semitism to serve unconscionable Zionist ends has finally been blown .


          Aberforth Geared Income Trust PLC (AGITF: Grey Market) | Halted Security   
Fri, Jun 30, 2017 12:00 - Aberforth Geared Income Trust PLC (AGITF: Grey Market) - Halted Security - Effective Fri, Jun 30, 2017, AGITF is designated with the status Halted. You may find a complete list of revoked/suspended securities at otcmarkets.com.
          Israela s ex-PM Ehud Olmert granted early release from prison   

The parole board of Israel's Prison Service on Thursday granted former Prime Minister Ehud Olmert early release from his 27-month corruption sentence, in perhaps the final chapter of a stunning fall from grace that forced him from office amid the last serious round of peace talks with the Palestinians. Israel's Justice Ministry had objected to Olmert's early release after asking police last week to investigate whether he committed a "criminal offense" when his lawyer was caught leaving the prison with a chapter of his unpublished book that contained "sensitive security issues."


           Argentina sends 2,000 police into raid on slum    
BUENOS AIRES, Argentina (AP) - Argentina says more than 2,000 police and other security agents have staged a massive raid into one of the most dangerous...
          Strategic Targeted Execution Process for Industrial Customer   

Strategic Targeted Execution Process for Industrial Customer Relationship Management

Tinton Falls, NJ -- (ReleaseWire) -- 12/15/2006 -- The deployment of any CRM system takes proper planning. In order to assist customers during this process, Commence has developed S.T.E.P., (Strategic Targeted Execution Process). a proven methodology for the successful implementation of the Commence CRM solution.

S.T.E.P is the result of more than a decade of experience in providing high quality business solutions to small and mid-size businesses. By working with hundreds of companies around the world, the company acquired the knowledge and skills necessary to design and deliver business solutions that are easy to implement and easy to use. This has allowed customers to realize the maximum value from products and an immediate return on their investment.

S.T.E.P outlines the key areas of responsibility, resource requirements and timeframes for implementation. This helps the implementation team guarantee a timely, cost effective and successful installation process.

Outlined below is a brief overview of S.T.E.P

STEP I: Needs Analysis

Before the process begins it imperative to review the strategic objectives of the CRM implementation and to gain management acceptance and commitment to begin the project. During this phase we clearly define the policies and procedures for managing customer interaction and discuss how the system will automate this workflow.

STEP II: Project Planning

A detailed implementation plan will be created and finalized during this phase. It will outline the responsibilities of the implementation team and those of in-house personnel. A system administrator will be selected, as well as team members from each department, who will work in conjunction with the vendor or system integrator managing the implementation process.

STEP III: Implementation

It is during this phase that the software implementation will begin. System configuration and administration will be completed such as setting up security profiles, e-mail accounts, data entry for drop down menus and data migration from disparate systems. Administrative training will also begin at this time.

STEP IV: Testing & Quality Assurance

An operational prototype of the system is up and running at this time. Operational issues are identified and resolved and basic modifications will be made to tune the solution to the customers' specific requirements.

STEP V: Deployment & Training

During this phase the CRM system will be completely operational. Training will begin for all end users. Ongoing support will be provided by the system administrator with assistance from Commence Corporations support staff.

Commence offers lean industrial companies complete "Freedom Of Choice" to select the solutions and platform that best meets the business requirements of manufacturers and distributors. The comprehensive CRM Industrial application suite is available for use on premise or on-demand as a hosted service. Industrial leaders often build departmental lean CRM solutions with the award winning Commence Lean Industrial CRM Framework. These choices are why so many industrial companies choose Commence as the solution for managing customer relationships. All Commence Industrial solutions support mobile or wireless connectivity and integration to back-office accounting and ERP systems.

For more information on this press release visit: http://www.releasewire.com/press-releases/release-9649.htm

Media Relations Contact

Larry Caretsky
President
Commence
Telephone: 732-380-9100
Email: Click to Email Larry Caretsky
Web: http://www.commence.com/mfg/


          Industrial CRM via the STEP System   

Industrial CRM via the STEP System

Tinton Falls, NJ -- (ReleaseWire) -- 11/30/2006 -- Commence offers lean industrial companies complete "Freedom Of Choice" to select the solutions and platform that best meets the business requirements of manufacturers and distributors. The comprehensive CRM Industrial application suite is available for use on premise or on-demand as a hosted service. Industrial leaders often build departmental lean CRM solutions with the award winning Commence Lean Industrial CRM Framework. These choices are why so many industrial companies choose Commence as the solution for managing customer relationships. All Commence Industrial solutions support mobile or wireless connectivity and integration to back-office accounting and ERP systems. The deployment of any CRM system takes proper planning. In order to assist customers during this process, Commence has developed S.T.E.P., (Strategic Targeted Execution Process). a proven methodology for the successful implementation of the Commence CRM solution.

S.T.E.P is the result of more than a decade of experience in providing high quality business solutions to small and mid-size businesses. By working with hundreds of companies around the world, the company acquired the knowledge and skills necessary to design and deliver business solutions that are easy to implement and easy to use. This has allowed customers to realize the maximum value from products and an immediate return on their investment.

S.T.E.P outlines the key areas of responsibility, resource requirements and timeframes for implementation. This helps the implementation team guarantee a timely, cost effective and successful installation process.

Outlined below is a brief overview of S.T.E.P

STEP I: Needs Analysis

Before the process begins it imperative to review the strategic objectives of the CRM implementation and to gain management acceptance and commitment to begin the project. During this phase we clearly define the policies and procedures for managing customer interaction and discuss how the system will automate this workflow.

STEP II: Project Planning

A detailed implementation plan will be created and finalized during this phase. It will outline the responsibilities of the implementation team and those of in-house personnel. A system administrator will be selected, as well as team members from each department, who will work in conjunction with the vendor or system integrator managing the implementation process.

STEP III: Implementation

It is during this phase that the software implementation will begin. System configuration and administration will be completed such as setting up security profiles, e-mail accounts, data entry for drop down menus and data migration from disparate systems. Administrative training will also begin at this time.

STEP IV: Testing & Quality Assurance

An operational prototype of the system is up and running at this time. Operational issues are identified and resolved and basic modifications will be made to tune the solution to the customers specific requirements.

STEP V: Deployment & Training

During this phase the CRM system will be completely operational. Training will begin for all end users. Ongoing support will be provided by the system administrator with assistance from Commence Corporations support staff.

For more information on this press release visit: http://www.releasewire.com/press-releases/release-9402.htm

Media Relations Contact

Larry Caretsky
President
Commence
Telephone: 732-380-9100
Email: Click to Email Larry Caretsky
Web: http://www.commence.com/mfg/


          CRM on Demand Provides Unique Platform Benefits   

CRM on Demand Provides Unique Platform Benefits

Tinton Falls, NJ -- (ReleaseWire) -- 11/13/2006 -- Commence CRM On-Demand provides breakthrough technology for Manufacturers and distributors with greater functionality and flexibility than traditional application service offerings. Using the industrial strength JAVA (J2EE) platform, Commence CRM On-Demand offers robust functionality, ease of use and limitless scalability. Customization capabilities allow user-defined fields, custom reports, queries, filters; even personalized desktop settings.

Platform Highlights

Enterprise Class Platform
Encrypted Database Security
Automated Processes
One-to-Many Data Relationships
Remote Synchronization
Built-in Report Writer
Multi-level Security
Centralized File management
Mail Merge with MS Office
Web E-Mail Client
Global Search
On-Line Help and Knowledgebase Facility
Support for Handheld Devices
Project Tracking
Group Calendar & Scheduling
E-mail Integration
Web Integration
Application Programming Interface (API)

Platform Benefits include:

Scalable enterprise class platform Flexible architecture that promotes customization and add-on functionality. Operate quickly without IT infrastructure cost. Customizable without the headaches of traditional On-Demand offerings. Integrate people, processes and technology for improved performance and agility.

Commence CRM On-Demand allows manufacturers and distributors to focus on sales efficiency and customer service, monitor and improve business performance and drive higher profits by bringing down cost through streamlining processes.

Commence offers lean industrial companies complete "Freedom Of Choice" to select the solutions and platform that best meets the business requirements of manufacturers and distributors. The comprehensive CRM Industrial application suite is available for use on premise or on-demand as a hosted service. Industrial leaders often build departmental lean CRM solutions with the award winning Commence Lean Industrial CRM Framework. These choices are why so many industrial companies choose Commence as the solution for managing customer relationships. All Commence Industrial solutions support mobile or wireless connectivity and integration to back-office accounting and ERP systems.

For more information on this press release visit: http://www.releasewire.com/press-releases/release-9090.htm

Media Relations Contact

Larry Caretsky
President
Commence
Telephone: 732-380-9100
Email: Click to Email Larry Caretsky
Web: http://www.commence.com/mfg/


          S.T.E.P. Formula Changes Industrial CRM Efficiency   

S.T.E.P. Formula Changes Industrial CRM Efficiency

Tinton Falls, NJ -- (ReleaseWire) -- 11/10/2006 -- The deployment of any CRM system takes proper planning. In order to Assist customers during this process, Commence has developed S.T.E.P., (Strategic Targeted Execution Process). A proven methodology for the successful implementation of the Commence CRM solution.

S.T.E.P is the result of more than a decade of experience in providing High quality business solutions to small and mid-size businesses. By Working with hundreds of companies around the world, the company Acquired the knowledge and skills necessary to design and deliver Business solutions that are easy to implement and easy to use. This Has allowed customers to realize the maximum value from products and An immediate return on their investment.

S.T.E.P outlines the key areas of responsibility, resource Requirements and timeframes for implementation. This helps the Implementation team guarantee a timely, cost effective and successful Installation process.

Outlined below is a brief overview of S.T.E.P

STEP I: Needs Analysis

Before the process begins it imperative to review the strategic Objectives of the CRM implementation and to gain management acceptance And commitment to begin the project. During this phase we clearly Define the policies and procedures for managing customer interaction And discuss how the system will automate this workflow.

STEP II: Project Planning

A detailed implementation plan will be created and finalized during This phase. It will outline the responsibilities of the Implementation team and those of in-house personnel. A system Administrator will be selected, as well as team members from each Department, who will work in conjunction with the vendor or system Integrator managing the implementation process.

STEP III: Implementation

It is during this phase that the software implementation will begin. System configuration and administration will be completed such as Setting up security profiles, e-mail accounts, data entry for drop Down menus and data migration from disparate systems. Administrative Training will also begin at this time.

STEP IV: Testing & Quality Assurance

An operational prototype of the system is up and running at this time. Operational issues are identified and resolved and basic modifications Will be made to tune the solution to the customers specific Requirements.

STEP V: Deployment & Training

During this phase the CRM system will be completely operational. Training will begin for all end users. Ongoing support will be Provided by the system administrator with assistance from Commence Corporations support staff.

Commence offers lean industrial companies complete "Freedom Of Choice" To select the solutions and platform that best meets the business Requirements of manufacturers and distributors. The comprehensive CRM Industrial application suite is available for use on premise or On-demand as a hosted service. Industrial leaders often build Departmental lean CRM solutions with the award winning Commence Lean Industrial CRM Framework. These choices are why so many industrial Companies choose Commence as the solution for managing customer Relationships. All Commence Industrial solutions support mobile or Wireless connectivity and integration to back-office accounting and ERP systems.

For more information on this press release visit: http://www.releasewire.com/press-releases/release-9020.htm

Media Relations Contact

Larry Caretsky
President
Commence
Telephone: 732-380-9100
Email: Click to Email Larry Caretsky
Web: http://www.commence.com/mfg/


          Military disrupting life in Deir Abu Mash’al for 2 weeks, since 3 residents killed Border Police officer   

The Palestinian village of Deir Abu Mash'al lies some 25 kilometers northwest of Ramallah. It has a population of about 5,000, many of whom work in Ramallah. About 150 of the residents work in Israel and have to cross the Ni'lin checkpoint on their commute every day. On the evening of Friday, 16 June 2017, three residents of the village carried out an attack near Damascus Gate in East Jerusalem, killing Border Police Officer Hadas Malka, 23, and wounding four other people. The three assailants, Baraa Saleh, 18, ‘Adel ‘Ankush, 18, and Ousama ‘Ata, 19, were shot to death by Israeli security forces over the course of the attack. Ever since then, Israel has been disrupting the lives of all residents of the village, although they were not involved in the attack and have not been accused of any wrongdoing.

Following the attack, Border Police officers and soldiers entered the village and imposed several restrictive measures. On the night of the attack itself, Israeli security forces installed an iron gate at the main entrance to the village and refused to let anyone cross it in either direction, neither on foot nor by car. The military also blocked off the three dirt roads leading to the village with stones and piles of earth. The next day, village residents removed some of the blockage from two roads, enough to enable only a four-wheel drive to get through. This recurred over the following days, with the military blocking the roads and residents removing the obstacles.

Soldiers stand beside the gate installed by the military at the main entrance to the village. Photo by 'Amer 'Aruri, B'Tselem, 19 June '17
Soldiers stand beside the gate installed by the military at the main entrance to the village. Photo by 'Amer 'Aruri, B'Tselem, 19 June '17

On Monday, 19 June 2017, security forces allowed most of the village residents to leave the village on foot via the main entrance, barring men between the ages of 15 and 25. The next day, the forces opened the gate part of the way, allowing cars through but only after lengthy checks, including searches of the cars. The ban on exit by men aged 15 to 25 remained in place.

It wasn’t until the evening of Saturday, 24 June 2017, when the high holiday of ‘Eid al-Fitr began, that security forces made travel by car easier. Nonetheless, the iron gate remains in place and forces are stationed beside it some of the time, performing random checks.

In addition to the restrictions on movement, which have affected the entire population of the village, security forces confiscated some 50 vehicles from residents for ostensibly lacking licenses. In addition, 50 village residents who work in Israel – all from the assailants’ extended families – had their work permits revoked. The permits were revoked when they reached the checkpoint on their way to work, without prior notice and with no opportunity to challenge the decision.

On Sunday, 18 June, soldiers raided five homes in the village, three of them belonging to the families of the assailants. The soldiers informed the parents of the assailants that their houses for the actions of their sons. If this occurs, 15 people, including 5 innocent minors, will be left without a roof over their heads.

In one home, the soldiers damaged property and left a mess behind them. ‘Adel ‘Ankush’s mother, 46, was arrested on 21 June and is still in custody. On 29 June, forces again entered the village, arresting ‘Ancush’s father and searching Ousamah Ata’s home once again.

When the forces first entered the village, violent altercations erupted between them and local residents, during which two young men from the village were hurt. They were taken to hospital in Ramallah in an ambulance that had to use a bypass dirt road. Three days later, on 19 June, security forces returned to the village at 5:00 A.M. and went into a home to carry out arrests. This also resulted in altercations in which two more local residents were hurt. The clashes ended when the forces left the village at around 8:00 A.M.

For almost two weeks now, ever since the attack, the military has been disrupting the lives of all 5,000 or so residents of the village, although they have been accused of no personal wrongdoing. This automatic form of retaliation has become a matter of policy for the military, in a cynical abuse of its power to mistreat civilians. This kind of collective harm is morally and legally indefensible.

One of the dirt roads blocked by the military. Photo by 'Amer 'Aruri, B'Tselem, 19 June '17
One of the dirt roads blocked by the military. Photo by 'Amer 'Aruri, B'Tselem, 19 June '17

On 21 June 2017, B’Tselem field researcher 'Amer 'Aruri spoke with two village residents who feared to disclose their names, and with another who agreed to be identified.

A village resident who preferred to remain anonymous related:

I’m a merchant, and I have a permit to enter Israel. On Saturday I wasn’t able to leave, but on Sunday, 18 June, I had to get to the bank in Ramallah. I have a regular car that can’t drive on the unpaved farm roads, so I borrowed my brother’s four-wheel drive. It took me about half an hour on the farm road just to get to Deir Nidham, and there I took the main road to Ramallah. The trip took almost an hour. Usually, it takes half an hour at most to get to Ramallah.

On Tuesday, 20 June 2017, I heard that the soldiers had opened the gate and lifted the closure. At around eleven o’clock in the morning, I set out in my car towards the main exit. When I got there, I saw that the soldiers were still there. They opened the iron gate part of the way. Cars were going both ways and the soldiers were checking every single car going in or out, as well as the IDs of the passengers. There was a huge traffic jam at the entrance. 

When it was my turn, the soldier went through my car from top to bottom. He even popped the hood and opened the trunk. He checked my ID and asked me sarcastically if I had an M16 . I said no and drove off.

Another resident said:

I am from the ‘Ata family. I work in construction inside Israel. On Sunday, 18 June 2017, at around four o’clock in the morning, I got to Ni’lin checkpoint after going the long way on a farm road to get out of the village. There were five more laborers with me in the car, four of them from our family. At the checkpoint, they only let the laborer who wasn’t from our family through. They turned the rest of us back. I asked the guard why I wasn’t allowed across, and he said our family was “causing trouble”.

I couldn’t do anything that day, so I went back home. Other laborers from the ‘Ata, ‘Ankush and Saleh families told me that the exact same thing happened to them. 

I have five children and no other source of income. The day I went back home, my employer called me and said that if I didn’t come in to work, he’d fire me. I don’t know what I’ll do if they don’t give me my permit back. ‘Eid al-Fitr is coming up and I don’t think I’ll be able to buy the kids clothes, as is the custom on high holidays. I’m worried that if I don’t go back to work, I’ll need the money to put food on the table. 

Muhammad Faiz Muhammad ‘Ata, a married father of five, said in his testimony:

Damaged property and mess left by soldiers in the 'Ata home. Photo courtesy of the family, 21 June '17

I live in the al-Mu’alaka neighborhood in the village, in  a two-story building. The second story is still under construction. We have a livestock pen next to the house. 

Today, 21 June 2017, at six in the morning, I heard loud banging on the door. I opened it and found myself facing soldiers and an officer. The officer ordered me to lie down on the floor, but I refused. One of the soldiers grabbed me and sat me down on the floor. The other soldiers came in and started searching our home. I got up immediately and followed them. I told them my wife and children were asleep, but it was no use.

The soldiers went into the kitchen and threw the dishes on the floor. The sound of the breaking dishes woke my wife and children. When they saw the soldiers in the house, some of them started crying. Several soldiers went into our bedroom and started throwing our clothes on the floor. They also turned over the couches and the tables in the living room. I asked the officer if they had a search warrant. He said: “They kill Jews and want a search warrant”?

This went on for about an hour. They left a terrible mess all over the house. In the kitchen, they broke dishes and spilled rice. They broke a livestock milking pump that we were keeping on the second story. They turned the living room upside down and left clothes all over the floor in our bedroom. I don’t know what they were looking for and why they came into our house. They refused to tell me. 

Photos: Damaged property and mess left by soldiers in the 'Ata home. Photos courtesy of the family, 21 June '17

Damaged property and mess left by soldiers in the 'Ata home. Photo courtesy of the family, 21 June '17


          Diserang Teroris, Mabes Polri Kecolongan? Ini Kata Pengamat   
POJOKSULSEL.com, JAKARTA – Aksi teroris kembali menyasar anggota polisi. Tak tanggung-tanggung, kali ini teroris menyerang Mabes Polri! Penyerang dilakukan di dalam masjid usai shalat Isya di Masjid Falatehan di depan Mabes Polri, Jalan Trunojoyo, Kebayoran Baru, Jakarta Selatan, Jumat (30/6) malam WIB. Pengamat terorisme dari Institute for Security and Strategic Studies (ISESS) Khairul Fahmi menilai, aksi ini sama sekali tak bisa dikatakan Polri telah kebobolan. Menurutnya, teroris bercirikan selalau menyerang yang bersifat lemah. “Intinya teroris akan menyerang pihak-pihak yang dianggap menganggu dan harus dilawan. Mereka selalu mencari orang-orang yang lemah,” katanya. Selain itu, aksi teror akan selalu memasang target acak
          HP Brings AMD Ryzen PRO Muscle To EliteDesk 705 G3 Series Workstations   
HP Brings AMD Ryzen PRO Muscle To EliteDesk 705 G3 Series Workstations Yesterday, AMD announced its new Ryzen PRO family of processors, which feature the multi-core performance muscle of the Zen microarchitecture along with built-in security features. AMD has already begun shipping the new processors to its OEM partners, and one of the first to deploy Ryzen PRO will be Hewlett-Packard via its EliteDesk 705 G3
          CenturyLinkVoice: Why Security Should Become A Service At Cloud-Centric Businesses   
Red dots on the network status map bother Nathan Shanks, CenturyLink director of security services.
          Research Data Storage on Campus and Beyond   
Default thumb Thu, Jul 27 02:00 PM until 03:30 PM Eastern Time (US & Canada)
During this workshop, we will cover strategies, tools, and computational solutions to ensure the availability, the safety and the security of your research data and documents.
Location: Instructional Center, 37 Dewey Field Road

           WTO hears widespread criticism of U.S. steel tariff plan    
GENEVA, June 30 (Reuters) - U.s. President Donald Trump's proposal to restrict imports of steel and aluminium for national security reasons came under fire...
           UN commends achievements in Ivory Coast as UN troops leave    
UNITED NATIONS (AP) - The U.N. Security Council is commending "the remarkable achievements" in Ivory Coast since it sent peacekeepers to the West African...
          Full-time and Part-time Members (all streams) - Social Security Tribunal - Governor in Council Appointments - Canada   
For the Income Security Section Only, a provincial or territorial license in medicine, nursing, occupational therapy, pharmacy, physiotherapy, or psychology... $470 - $550 a week
From Governor in Council Appointments - Wed, 24 May 2017 03:59:08 GMT - View all Canada jobs
           Pakistan beefs up security in tribal northwest    
Pakistan is beefing up security in the tribal northwest, the military said Friday, after days of protests over twin blasts which killed 69 people in the town...
          Global Cyberattack Seems Intent On Havoc, Not Extortion   

A cyberattack that caused indiscriminate economic damage around the world was apparently designed to create maximum havoc in Russia’s neighbor and adversary Ukraine, security researchers said. While the rogue software used in the attack was configured as extortionate “ransomware,” that may have just been a ruse. “It is clear that this was targeted indiscriminately at Ukrainian businesses, and the Ukrainian government,” Jake Williams, president of the security firm Rendition Infosec and a former member of the U.S. National Security Agency’s elite cyberwarfare group, told The Associated Press in an online chat. “The ‘ransomware’ component is just a smokescreen (and a bad one).” UKRAINE IN PAIN Although the attack was global in its reach, Ukraine bore the brunt. Computers were disabled at banks, government agencies, energy companies, supermarkets, railways and telecommunications providers. Many of these organizations said they had recovered by Thursday, although some experts suspected that work was incomplete. “There is still a lot of damage, especially in banks,” said Victor Zhora, CEO of the Kiev cybersecurity firm InfoSafe. “ATMs are working (again) but some bank operations are still limited.” He estimated damage in “the millions of dollars, perhaps tens of millions.” And that’s just in Ukraine. Microsoft said the malware hit at least 64 nations, including Russia, Germany and the United States. “I expect that we will see additional fallout from this is the coming days,” said Williams. In Ukraine, suspicion immediately fell on hackers affiliated with Vladimir Putin’s regime, although there is no direct, public evidence tying Russia to the attack. Relations between the two nations have been tense since Moscow annexed the Crimean peninsula from Ukraine in 2014. Pro-Russian fighters are still battling the government in eastern Ukraine. Experts have also blamed pro-Russian hackers for major cyberattacks on the Ukrainian power grid in 2015 and 2016, assaults that have turned the eastern European nation into the world’s leading cyberwarfare testing ground. A disruptive attack on the nation’s voting system ahead of 2014 national elections is also attributed to Russia. THE MOSCOW CONNECTION The malicious program, which researchers are calling NotPetya, initially appeared to be ransomware. Such malware locks up victims’ files by encrypting them, then holds them hostage while demanding payment — usually in bitcoin, the hard-to-trace digital currency. But researchers said the culprits would have been hard-pressed to make money off the scheme. They appear to have relied on a single email address that was blocked almost immediately and a single bitcoin account that collected the relatively puny sum of $10,000. Firms including Russia’s anti-virus Kaspersky Lab, said clues in the code indicate that the program’s authors would have been incapable of decrypting the data, further evidence that the ransom demands were a smoke screen. The timing was intriguing, too. The attack came the same day as the assassination of a senior Ukrainian military intelligence officer and a day before a national holiday celebrating the new Ukrainian constitution signed after the breakup of the Soviet Union. “Everything being said so far does point to Russia being a leading candidate for a suspect in this attack,” said Robert M. Lee, CEO of Dragos Inc. an expert who has studied the attacks on Ukraine’s power grid. What’s most worrisome and reprehensible, said Lee, is that whoever was behind the attack was unconcerned about the indiscriminate, collateral damage it […]

The post Global Cyberattack Seems Intent On Havoc, Not Extortion appeared first on Yeshiva World News.


          PHOTOS: Israel To Security Council: Iran Used Jewish Symbol For Missile Practice   

(PHOTOS IN EXTENDED ARTICLE) Israeli Ambassador to the United Nations Danny Danon revealed new information to the United Nations Security Council today about Iran’s ballistic missile program and their intention to harm Israel. In a document distributed to the Council members, Ambassador Danon provided new satellite imagery showing the Iranian military using the Star of David as the intended target of the Qiam, a medium-range MTCR category one ballistic missile, last November. The Star of David was painted in white on the ground as the target and a crater from the impact of the missile is visible next to the Star of David. This launch was in direct violation of Security Council Resolution 2231. “This use of the Star of David as target practice is hateful and unacceptable,” Ambassador Danon wrote. “The missile launch is not only a direct violation of UNSCR 2231, but is also a clear evidence of Iran’s continued intention to harm the State of Israel,” the Ambassador continued in his letter to the Council. Last month, the Iranians fired ballistic missiles at targets in Syria, and then released statements threatening Israel. This follows a series of ballistic missile tests conducted by the Iranians since 2015 in defiance of Security Council Resolution 2231. “The targeting of a sacred symbol of Judaism is abhorrent,” Ambassador Danon said about this revelation. “It is the Iranians who prop up the Assad regime as hundreds of thousands are killed, finance the terrorists of Hizbullah as they threaten the citizens of Israel, and support extremists and tyrants throughout the Middle East and around the world. I call on the Security Council to respond decisively to these Iranian violations and provocations,” the Ambassador concluded. (YWN – Israel Desk, Jerusalem/Photo Credit: UN photo)

The post PHOTOS: Israel To Security Council: Iran Used Jewish Symbol For Missile Practice appeared first on Yeshiva World News.


           Tight security in Hong Kong as Xi leads celebrations    
Tight security contained protesters in Hong Kong Friday night as China's President Xi Jinping led lavish celebrations to mark 20 years since the politically...
          US Blacklists China Bank, Revving Up Pressure Over NKorea   

The United States has blacklisted a small Chinese bank accused of illicit dealings with North Korea, escalating the pressure on Beijing to rein in its wayward ally amid increased signs of frustration among President Donald Trump and his top advisers with China’s diplomatic efforts. The Treasury Department on Thursday declared the Bank of Dandong a “primary money-laundering concern,” proposing to sever it entirely from the U.S. financial system, pending a 60-day review period. Although Trump’s treasury secretary said the move didn’t target China, it comes a week after the president lamented that China’s promise to help with North Korea “has not worked out.” Calls to Bank of Dandong rang unanswered on Friday. Beijing, however, criticized Washington’s action, saying that unilateral sanctions outside the U.N. Security Council were inappropriate. “We also firmly oppose any individual country to exercise long-arm jurisdiction under its own domestic law,” said Lu Kang, spokesman for China’s foreign ministry. Lu added that Beijing will investigate possible wrongdoings by Chinese individuals and entities under Chinese laws. Trump had been leaning on President Xi Jinping to help stop the North’s development of nuclear weapons before they can threaten the U.S. homeland. A main focus of the coordination has been getting China to fully enforce international sanctions intended to starve North Korea of revenue for its nuclear and missile programs. The U.S. action is likely to anger China, which handles about 90 percent of North Korea’s external trade, and whose banks and companies are said to provide Pyongyang access to the U.S.-dominated international financial system. The sanctions bar Americans from doing business with Bank of Dandong, which is based in a northeastern Chinese city on the North Korean border that serves as a gateway for trade with the isolated nation. The U.S. also slapped sanctions Thursday on a Chinese shipping company and two Chinese people that it said have facilitated illegal activities by North Korea. Treasury Secretary Steve Mnuchin said the U.S. still wants to work with Beijing on combating the North Korean threat. “We are in no way targeting China with these actions,” Mnuchin told a White House news briefing. The punitive steps were presaged by a tweet from Trump last week reflecting dissatisfaction with Beijing’s efforts. “While I greatly appreciate the efforts of President Xi & China to help with North Korea, it has not worked out. At least I know China tried!” Trump tweeted on June 20. The Trump administration may be struggling to maintain international pressure on Pyongyang. The president was to meet for the first time Thursday with South Korea’s new leader, President Moon Jae-in, who has long advocated outreach to North Korea. His predecessor had staunchly backed Trump’s harder line. Mnuchin said the Bank of Dandong has facilitated millions of dollars of transactions for companies involved in North Korea’s weapons of mass destruction and ballistic missile programs. Anthony Ruggiero, a sanctions expert and former Treasury Department official, described it as a small Chinese bank “sitting at the heart” of trade between North Korea and China. “This is a strong message to Chinese leaders that the Trump administration will act against North Korea’s sanctions evasion in China,” he said. The other targeted Chinese entities are: —Dalian Global Unity Shipping Co., which Treasury accused of transporting 700,000 tons of freight annually, including coal and steel products, […]

The post US Blacklists China Bank, Revving Up Pressure Over NKorea appeared first on Yeshiva World News.


          Friday 6/30   
“Helen”
400m – Sprint
21 – KB Swings – 1.5 / 1 pood
12 – Pull Ups
3 rounds for time:

post time in comments. 

OH Squats


This Weeks Focus / Quote ~
No amount of security is worth the suffering of a mediocre life chained
to a routine that has killed your dreams.
           Bahrain invokes WTO's "national security" clause in Qatar row    
GENEVA, June 30 (Reuters) - Trade restrictions imposed on Qatar by Saudi Arabia, Bahrain and the United Arab Emirates are justified by national security,...
          Free Kaspersky Internet Security 2017 1 PC (Key Card) at Newegg.com   
none
           Hezbollah says army manhunt in Syrian refugee camps protects border security    
AMMAN, June 30 (Reuters) - Lebanon's Hezbollah said on Friday that a widescale army manhunt for militants hiding inside Syrian refugee camps in a border...
          Security gaps as favourite toys | Deutschlandfunk - Germany   
none
           U.N. closes Ivory Coast mission, security remains fragile    
By Joe BavierABIDJAN, June 30 (Reuters) - The United Nations closed its peacekeeping mission in Ivory Coast on Friday after 13 years during which it...
           Taliban kill 6 Afghan police in west; roadside bomb kills 7    
KABUL, Afghanistan (AP) - The Taliban stormed an Afghan security post in the western Farah province, killing at least six policemen and wounding three,...
           India warns China over border road 'security' threat    
India condemned a new road that China is building on the rivals' Himalayan border on Friday, saying it raises "serious security" concerns.The two sides are...
          For Rent (Huntington) - $800.00   
Very nice 2 bedroom 1 bath house for rent in Huntington WV. 800 dollars per month with 500 dollars security deposit. Clean house and nice neighborhood. Fridge, stove, washer and dryer included. Gas heat and cold window air conditioners.Contact ryajackson@...
           Germany approves Israel submarine deal - Der Spiegel    
BERLIN, June 30 (Reuters) - Germany's national security council has approved a deal to sell three further nuclear-capable submarines to Israel, magazine...
          Chauffeur Classe 1 / Class 1 Driver - STYRO RAIL - La Pêche, QC   
Hold a valid class 1 and 3 permit. The driver is entirely responsible of his vehicle, of loading and the driving security of himself as well as those around him... $17 - $21 an hour
From Indeed - Fri, 09 Jun 2017 16:16:45 GMT - View all La Pêche, QC jobs
          Senior Security Network Analyst - BMO Financial Group - Toronto, ON   
Solid knowledge of Cisco, Nortel/Avaya network, Checkpoint/Juniper Firewall devices configurations including Cisco nexus series....
From BMO Financial Group - Fri, 23 Jun 2017 06:46:00 GMT - View all Toronto, ON jobs
          Security Analyst - Eagle Professional Resources - Toronto, ON   
Cisco 65xx, 72xx or Nexus product lines experience; Eagle is currently seeking a Security Analyst for a three (3) month contract position, scheduled to begin...
From Eagle Professional Resources - Tue, 13 Jun 2017 20:35:08 GMT - View all Toronto, ON jobs
          Clarification: Trump-Russia stories   
WASHINGTON (AP) -- In stories published April 6, June 2, June 26 and June 29, The Associated Press reported that all 17 U.S. intelligence agencies have agreed that Russia tried to influence the 2016 election to benefit Donald Trump. That assessment was based on information collected by three agencies - the FBI, CIA and National Security Agency - and published by the Office of the Director of National Intelligence, which represents all U.S. intelligence agencies. Not all 17 intelligen...
          6/30/2017: WORLD: Chinese president’s visit sparks protests   

HONG KONG— Chinese President Xi Jinping landed in Hong Kong Thursday to mark the 20th anniversary of Beijing taking control of the former British colony, accompanied by a formidable layer of security as authorities showed little patience for...
          6/30/2017: WORLD: Iraq mission extended to 2019   
OTTAWA— The defence minister announced Thursday that Canada’s military mission in Iraq would be extended by another two years, to March 31, 2019, with a new focus on training Iraqi security forces, despite their troubled record of human rights...
          6/30/2017: WORLD: Trump to have first in-person meeting with Putin at next week’s G20 summit   
WASHINGTON— U.S. President Donald Trump will convene a high-stakes meeting with Russian President Vladimir Putin at the summit of industrial and emerging-market nations in Germany next week, the White House said Thursday. National security adviser...
          Re: Moodle 3.2 - Guest Access   

by Colin Fraser.  

That is as good a way as any, and likely more tidy than others. The only issue is that the Guest will need to have some signpost or attractor to ensure they actually do go to that course to find the documents you really want them to look at. All you need do is to set Allow Guest access to "Yes" and all done.

Guest Access allows for Read Only access. They cannot engage any activity, AFAIK.   

As far as security goes, if that is your main concern, an alternative can be to have on the same server as your Moodle, or in DropBox or Google Spaces or even OneDrive a separate folder that holds the files. All you need then is a prompt of some sort that will lead to the files. That way there is no opportunity for a Guest to compromise the security of your Moodle.  


          Steps taken to enhance IT infra security at JNPT: Government   
One of the four terminals, run by Danish firm AP Moller- Maersk at JNPT, ranked among top 12 major ports in the country, was impacted by the 'Petya' ransomware attack.
          Torpig Botnet Hijacking Reveals 70GB Of Stolen Data   

We did mention Torpig in passing back in January 2008 when talking about the Mebroot rootkit which digs down deep into the Master Boot Record. It seems like Torpig has been pretty active since then and the latest break is that some security researchers have managed to infiltrate the botnet and collect some data on […]

The post Torpig Botnet Hijacking Reveals 70GB Of Stolen Data appeared first on Darknet - The Darkside.


          PT Security Officer Guard - American Security - Eagan, MN   
American Security &amp; Investigations offers you an exciting, stable and interesting career, with an opportunity for advancement. PT Security Officer Guard....
From American Security - Mon, 12 Jun 2017 23:14:25 GMT - View all Eagan, MN jobs
          FT Security Officer Guard - American Security - Eagan, MN   
American Security &amp; Investigations offers you a solid, stable and interesting career, with an opportunity for advancement. FT Security Officer Guard....
From American Security - Mon, 12 Jun 2017 23:14:20 GMT - View all Eagan, MN jobs
           apartment for sale in Regent’s Park new cairo with 6 years installment    
[tag]apartment[/tag] [tag]for sale[/tag] in [tag]Regent’s Park[/tag] apartment 188 m second floor with good view 3 bedrooms 3 bathrooms 3 receptions 80% green area club parking security 24/7
          Forum Post: RE: Trying to remove the Cancel Work Button from WMS All Work Forms for some users   
Hi, For a given userrole you can assign the form control by performing following steps: i) Under the forms node, within the security role add the new form Path: \Security\Roles\ \Permissions\Forms\Add new form(RtClk + addnew) ii) Add new control to the added form, which has the needed permission set to true. On the properties window of the control, provide values for property control to formcontrolname and for property effectiveaccess to either read/update. Perform same thing on the other role with effective access on the formcontrol to NoAccess. Thanks, Chaitanya Golla
          U.S.-South Korea summit exposes spat on trade, resolve on North Korea   

President Donald Trump took South Korea to task over its trade surplus with the United States on Friday, demanding renegotiation of a bilateral pact, even as the close security allies voiced joint resolve against the nuclear weapons threat from North Korea.

Trump talked tough on North Korea, vowing...


          Trump trashes media, cheers wins at $10 million fundraiser   

Pedestrians walk by the security fence in front of the Trump International Hotel in Washington, Wednesday, June 28, 2017. President Donald Trump will attend a fund raiser at the hotel this evening.


          China demands U.S. cancel $1.4 billion arms sale to Taiwan   

China on Friday strongly protested a U.S. plan to sell $1.4 billion worth of arms to Taiwan and demanded that the deal be canceled.

Chinese foreign ministry spokesman Lu Kang said the sale would severely damage China's sovereignty and security interests and run counter to Washington's commitment...


           Jefaira North Coast Finished Condo Chalet Sale by Installment    
Real Estate Egypt, North Coast , [tag]Marsa Matrouh[/tag] , [tag]Jefaira Resort[/tag] : [tag]Chalet for Sale in Jefaira North Coast[/tag] with Surface Area 135 SQM Terrace Area 46 SQM , 1st Floor , include : Master Bathroom with private bathroom , Bedroom, Reception, Nanny Room, Kitchen, Bathroom, Terrace, Guest toilet Payment Terms: Down Payment : 5% 5% after a month 5% after 3 Months Rest over 7 Years Jefaira is stretched over 5.5 million sqm, it contains private residences ranging from spacious two and three-bedroom condos, a range of family villas, and twin houses alongside breezy chalets and cabins. 75% of Jefaira is composed of greenery and open space to ensure that there is enough expanses for the residents to enjoy. The epicenter of these elegantly designed homes is the downtown area where the majorimajority of the food and beverage outlets will be arranged. The commercial, educational, and medical areas will be arranged at the heart of the project, which provides easy access from the external road that leads to Alexandria and Marsa Matrouh. There are control points throughout the project to ensure privacy and security between the commercial and residential areas.
          House GOP backs bills to crack down on illegal immigration; Trump hails passage   

Warning of threats to public safety and national security, the Republican-led House on Thursday approved two bills to crack down on illegal immigration, a key priority for President Donald Trump.

One bill would strip federal dollars from self-proclaimed "sanctuary" cities that shield residents...


          Global cyberattack seems intent on havoc aimed at Ukraine, not extortion   

A cyberattack that caused indiscriminate economic damage around the world was apparently designed to create maximum havoc in Russia's neighbor and adversary Ukraine, security researchers said.

While the rogue software used in the attack was configured as extortionate "ransomware," that may have...


           Sale Chalet plus Garden North Coast Jefaira plus installment    
Real Estate Egypt, [tag]North Coast[/tag] , [tag]Marsa Matrouh[/tag] , [tag]Al-Alamein[/tag] , [tag]Jefaira Resort[/tag] : [tag]Chalet for Sale in Jefaira North Coast[/tag] with Surface Area 172 SQM Garden Area 293 SQ.m , Ground Floor , include : Master Room & private bathroom , 2 Bedrooms, Reception, Maid Room, Kitchen, Bathroom, Terrace, Guest toilet Payment Terms: Down Payment : 5% 5% after a month 5% after 3 Months Rest over 7 Years Jefaira is stretched over 5.5 million sqm, it contains private residences ranging from spacious two and three-bedroom condos, a range of family villas, and twin houses alongside breezy chalets and cabins. 75% of Jefaira is composed of greenery and open space to ensure that there is enough expanses for the residents to enjoy. The epicenter of these elegantly designed homes is the downtown area where the majorimajority of the food and beverage outlets will be arranged. The commercial, educational, and medical areas will be arranged at the heart of the project, which provides easy access from the external road that leads to Alexandria and Marsa Matrouh. There are control points throughout the project to ensure privacy and security between the commercial and residential areas.
          Trump's voter fraud commission wants voting history, party ID and address of every voter   

The chair of Donald Trump's Election Integrity Commission has penned a letter to all 50 states requesting their full voter role data, including the name, address, date of birth, party affiliation, last four Social Security number digits and voting history back to 2006 of potentially every voter...


           Greek Design Twin House Villa Sahel Jefaira Sale Installment    
Real Estate Egypt, [tag]North Coast[/tag] , [tag]Marsa Matrouh[/tag] , [tag]Jefaira Resort[/tag] : Villa [tag]Twin House for Sale in Jefaira North Coast[/tag] with Installment Over 7 Years with Plot Area 340 M Total Area 250 SQM Terrace Area 33 M , Ground Floor Consists of : Maid's Room plus Private Bathroom, Driver's Room + Bathroom, Reception, Dining, Kitchen, Guest Room plus Bathroom , Guest toilet First Floor Consists of : Master Bedroom with Dressing Room plus Bathroom, 2 Bedrooms, Dressing, 2 Bathrooms, Living , Storage Payment Methods : Down Payment : 5% 5% after a month 5% after 3 Months Rest over 7 Years Jefaira is stretched over 5.5 million sqm, it contains private residences ranging from spacious two and three-bedroom condos, a range of family villas, and twin houses alongside breezy chalets and cabins. 75% of Jefaira is composed of greenery and open space to ensure that there is enough expanses for the residents to enjoy. The epicenter of these elegantly designed homes is the downtown area where the majorimajority of the food and beverage outlets will be arranged. The commercial, educational, and medical areas will be arranged at the heart of the project, which provides easy access from the external road that leads to Alexandria and Marsa Matrouh. There are control points throughout the project to ensure privacy and security between the commercial and residential areas.
          White House: Trump to meet Putin at G-20 summit   

President Donald Trump will convene a high-stakes meeting with Russian President Vladimir Putin at the summit of industrial and emerging-market nations in Germany next week, the White House said Thursday, amid swirling allegations about Moscow's role in the 2016 elections.

National security adviser...


           Chalet plus Garden North Coast Jefaira sale plus installment    
Real Estate Egypt, [tag]North Coast[/tag] , [tag]Marsa Matrouh[/tag] , [tag]Al-Alamein[/tag] , [tag]Jefaira Resort[/tag] : [tag]Chalet for Sale in Jefaira North Coast[/tag] with Surface Area 172 SQM Garden Area 293 SQ.m , Ground Floor , include : Master Room & private bathroom , 2 Bedrooms, Reception, Maid Room, Kitchen, Bathroom, Terrace, Guest toilet Payment Terms : Down Payment : 5% 5% after a month 5% after 3 Months Rest over 7 Years Jefaira is stretched over 5.5 million sqm, it contains private residences ranging from spacious two and three-bedroom condos, a range of family villas, and twin houses alongside breezy chalets and cabins. 75% of Jefaira is composed of greenery and open space to ensure that there is enough expanses for the residents to enjoy. The epicenter of these elegantly designed homes is the downtown area where the majorimajority of the food and beverage outlets will be arranged. The commercial, educational, and medical areas will be arranged at the heart of the project, which provides easy access from the external road that leads to Alexandria and Marsa Matrouh. There are control points throughout the project to ensure privacy and security between the commercial and residential areas.
          Mastermind of lottery fraud scheme rigged jackpots, collected $2 million in illegal winnings   

A former lottery computer programmer has pleaded guilty in Iowa to running a criminal scheme that allowed him to collect millions of dollars in lottery winnings in four other states.

Former Multi-State Lottery Association security director Eddie Tipton on Thursday admitted that he manipulated the...


          The Polish example   
This speech in Poland by the God-Emperor sounds promising.
President Trump will ask other European nations to “take inspiration” from Poland, which has rejected refugee resettlement, in a speech later this week.

National Security Adviser H.R. McMaster told reporters Thursday that President Trump will deliver a speech in Warsaw’s Krasinski Square, which symbolizes Polish heroism. He is flying to Poland next Wednesday and stopping there before he attends the G20 summit in Hamburg.

McMaster said that Trump will deliver a “major speech” in which he will “praise Polish courage” and its “emergence as a European power.” The nation is currently ruled by a nationalist Christian party that has rejected refugee resettlement and mass immigration.
Of course, the President's message would be more meaningful if he would follow the Polish example and reject refugee resettlement and mass immigration in the USA too.

The Czech example isn't bad either:
The Czech parliament is working to liberalize the country’s gun laws, allowing people to better defend themselves. The reason for this new policy is safety, as well as practicality; in light of recent attacks in neighboring countries, the Czech government recognizes that disarming people puts them in danger, and that broad European gun control policies are ineffective. The Interior Minister said it best when he asked parliament to “show [him] a single terrorist attack in Europe perpetrated using a legally-owned weapon”.

          Obama Excuses Chavez While American Rots in Cuba   
Accuracy in Media Except for some innuendo in the mainstream press that the Republicans are “desperate” for an issue to use in the presidential campaign, Obama’s mind-boggling statement about Marxist Hugo Chavez of Venezuela not having “a serious national security impact” on the United States is getting little national media attention. But like the private […]
          Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox   
iOS 10 security enhancements include a new...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
          (IT) Software Developer - Highly Skilled   

Location: Englewood Cliffs, NJ   

Job Title: Software Developer - Highly Skilled Qualifications: The CNBC Digital Technology team is seeking a Software Engineer to manage and build software solutions across CNBC's Digital Platform. Software engineer (primarily focusing on Backend development) will be responsible for building and managing software solutions for various projects. This role requires hands-on software development skills, deep technical expertise in web development, especially in developing with core java, spring, hibernate. Software engineer will be required to provide estimates for his tasks, follow technology best practices, participate and adhere to CNBC's Technical Design Review Process, Performance metrics/scalability, support integration and release planning activities in addition to being available for level 3 support to triage production issues. Required Skills " BS degree or higher in Computer Science with a minimum of 5+ years of relevant, broad engineering experience is required. " Experience with various Web-based Technologies, OO Modeling, Middleware, Relational Databases and distributed computing technologies. " Experience in Digital Video workflows (Ingest, Transcode, Publish) " Experience in Content Delivery Networks (CDN) " Experience with Video Content Management Systems " Expertise in cloud transcoding workflows. " Demonstrated experience running projects end-to-end " Possess expert knowledge in Performance, Scalability, Security, Enterprise System Architecture, and Engineering best practices. " Experience working on large scale, high traffic web sites/applications. " Experience working in financial, media domain. Responsibilities: Languages and Software: " Languages : JAVA (Core Java, Multithreading), Object Oriented languages 3Z 4 Web Technologies: XML, JSON, HTML, CSS, OO JavaScript, jQuery, AJAX, SOAP and RESTful web services " Framework : MVC Framework like Spring, JPA, Hibernate, Jaxb " Database : RDBMS like MySQL, Oracle, NO SQL databases " Tools : Git, SVN, Eclipse, Jira
 
Type: Contract
Location: Englewood Cliffs, NJ
Country: United States of America
Contact: Hiring Manager
Advertiser: First Tek
Reference: NT17-03957

          ‘Multi-Layered’ Security Plan In Place For 4th Of July In Boston   
The 4th of July is a huge part of the very fabric of Boston, but it's also a monstrous security headache.
          (IT) Techncial Lead -London - £650pd   

Rate: £550 - £650 per Day   Location: London   

A leading global Bank are now looking to hire a a Techncial Lead for London (Canary Wharf or London Brigde to be confirmed). We need someone who is very technical still, who is use to managing teams and planning/strategy etc. 6 months assignmemnt to start as soon as possible. Development Lead We are looking for a development lead to support a large global digital transformation programme within the commercial banking sector. The objectives of the programme are to replace a JSP (Java server pages) based online banking platform with a widget based vendor product which utilises modern web technologies and frameworks and move towards a REST based architecture. The candidate will be responsible for: Technical leadership of multiple cross-functional scrum teams Driving technical delivery against an agile roadmap Early identification and escalation of technical issue/risk Point of contact for external scrum teams/infrastructure/environment teams Enforcing industry best practice and coding standards/techniques Essential skills: Development strategy (branching, delivery, continuous integration, automated testing) Test automation tooling Mobile automation tooling CI/CD Pipeline tooling (Jenkins/puppet etc) Frontend development preferred: web technologies - HTML5, JavaScript, AngularJS, AJAX, JSP Backend development preferred: Core Java, Spring, Spring Security, Maven, Camel, WAS/Liberty Data development: Oracle, SQL, JPA, ORM Tooling: IntelliJ, Maven, GitHub, Nexus, Jira, Confluence Rate - up to £650 per day. Reed Specialist Recruitment is an Employment Agency and an Employment Business for permanent and temporary recruitment. In response to your application Reed will contact you by phone, email or SMS to discuss it and related opportunities. You can opt out at any time using the links provided.
 
Rate: £550 - £650 per Day
Type: Contract
Location: London
Country: UK
Contact: Richard Davies
Advertiser: Reed Technology
Reference: JS-JS-RD-DEVLEAD

          (IT) Full Stack Developer   

Rate: £350 - £450 per Day   Location: Glasgow, Scotland   

Full Stack Developer - 12 month contract - Glasgow City Centre One of Harvey Nash's leading FS clients is looking for an experienced full stack developer with an aptitude for general infrastructure knowledge. This will be an initial 12 month contract however the likelihood of extension is high. The successful candidate will be responsible for creating strategic solutions across a broad technology footprint. Experience within financial services would be advantageous, although not a prerequisite. Skill Set: - Previous Experience full-stack development experience with C#/C++/Java, Visual Studio, .Net, Windows/Linux web development - Understanding of secure code development/analysis - In-depth knowledge of how software works - Development using SQL and Relational Databases (eg SQL, DB2, Sybase, Oracle, MQ) - Windows Automation and Scripting (PowerShell, WMI) - Familiarity with common operating systems and entitlement models (Windows, Redhat Linux/Solaris) - Understanding of network architecture within an enterprise environment (eg Firewalls, Load Balancers) - Experience of developing in a structured Deployment Environment (DEV/QA/UAT/PROD) - Familiarity with the Software Development Life Cycle (SDLC) - Experience with Source Control and CI systems (eg GIT, Perforce, Jenkins) - Experience with Unit and Load testing tools - Experience with Code Review products (eg Crucible, FishEye) - Excellent communication/presentation skills and experience working with distributed teams - Candidates should demonstrate a strong ability to create technical, architectural and design documentationDesired Skills - Any experience creating (or working with) a "developer desktop" (dedicated desktop environment for developers) - Experience of the Linux development environment - An interest in cyber security - Knowledge of Defense in Depth computing principles - Experience with security products and technologies(eg Cyberark, PKI) - Systems management, user configuration and technology deployments across large, distributed environments (eg Chef, Zookeeper) - Understanding of core Windows Infrastructure technologies (eg Active Directory, GPO, CIFS, DFS, NFS) - Monitoring Tools (eg Scom, Netcool, WatchTower) - Experience with Apache/Tomcat-web server "Virtualisation" - Design patterns and best practices - Agile development: Planning, Retrospectives etc. To apply for this role or to discuss it in more detail then please call me and send a copy of your latest CV.
 
Rate: £350 - £450 per Day
Type: Contract
Location: Glasgow, Scotland
Country: UK
Contact: Cameron MacGrain
Advertiser: Harvey Nash Plc
Start Date: ASAP
Reference: JS-329601/001

          USB control software: The best tools to protect your files from data theft   

We all use all sorts of USB devices on our PCs, but sometimes USB devices can be a security risk. USB flash drives and other storage devices can be infected with viruses, but you can easily protect your PC from USB threats. There are tools that can help you manage your USB devices, and today […]

The post USB control software: The best tools to protect your files from data theft appeared first on Windows Report - Windows 10 and Microsoft News, How-to Tips.


          The security measures in Windows 10 S security are being questioned   

Security has always been a very important element when it comes to Microsoft and their Windows operating system. That being said, the tech giant has come out with an improved version of Windows 10 it calls Windows 10 S. Windows 10 S is claimed to be superior to the original in terms of security and […]

The post The security measures in Windows 10 S security are being questioned appeared first on Windows Report - Windows 10 and Microsoft News, How-to Tips.


          5 best malware tracker maps to see security attacks happen in real-time   

The Internet used to be a safe place when it was first launched. Fast forward 30 years later to present day, the situation has dramatically changed. To put is plain and simple: malware is everywhere. Antivirus and antimalware solutions are now compulsory in order to avoid getting your computer infected with malicious code. Unfortunately, the […]

The post 5 best malware tracker maps to see security attacks happen in real-time appeared first on Windows Report - Windows 10 and Microsoft News, How-to Tips.


          Windows 10 gets important Windows Defender updates as Microsoft bets big on self-security   

Microsoft has stirred quite a few discussions in the aftermath of people learning of their plans of putting all their eggs in the security basket, so to speak. While it’s most common for the Windows operating system to be paired with a third party antivirus service, Microsoft seems to want to move away from that […]

The post Windows 10 gets important Windows Defender updates as Microsoft bets big on self-security appeared first on Windows Report - Windows 10 and Microsoft News, How-to Tips.


          Zynga Poker Security Alert   
If you see this message "zynga poker security alert"after opening texas holdem poker on facebook, that means you tried to acess zynga poker from a different country(maybe you maybe someone else...).



You should go to your email and check your inbox messages.

On your inbox you will see an email from zynga texas holdem poker, open it



If you entered from this country then click on "authorize play from [country]"

If you didnt, click on "do not authorize" and change your facebook password

          CNX Institute Offers New Certification for Professionals in...   

CNX Institute is offering a new credential to help professionals in information security become confident in their knowledge of industry regulations and best practices.

(PRWeb June 30, 2017)

Read the full story at http://www.prweb.com/releases/20170630/CNX-Institute-new-CISO-FS/prweb14467296.htm


          National Guard unit supports local, state, federal agencies   
While most South Dakota Army National Guard units focus their yearly training on missions for a combat theater, one aviation unit is honing its skills to support homeland security.
National Guard unit supports local, state, federal agencies [Image 1 of 3]
          Command post serves as nerve center of Offutt   
Tucked away behind secure doors inside the 55th Wing headquarters building is an office with the sole responsibility of keeping leadership and personnel apprised of important information. From there, communications are received and disseminated 24 hours a day to radios, loud speakers, cell phones, computers and satellites. They involve everything from weather notifications and threat condition updates to situational reports and matters of national security. Every base has one and it is called the Command Post.
Command post serves as nerve center of Offutt [Image 1 of 3]
          Life of MWD Aslan honored   
The 341st Security Forces Squadron held a remembrance ceremony at the Grizzly Bend June 30 for one of Malmstrom’s military working dogs who passed away early this month.
Life of MWD Aslan honored [Image 1 of 4]
          CorreLog, Inc. Issues Mainframe Data Security Guidelines for FISMA...   

CorreLog releases four-page executive summary along with thought-leading whitepaper simplifying NIST guidelines for FISMA compliance relative to z/OS, outlining best practices for a complete,...

(PRWeb June 29, 2017)

Read the full story at http://www.prweb.com/releases/2017/07/prweb14473874.htm


          Qualcomm and 360 Discuss Shared Connected Families Vision, Launch 4G Kid Watch Powered by Snapdragon Wear for China   

At Mobile World Congress Shanghai, Qualcomm Technologies, Inc., a subsidiary of Qualcomm Incorporated (NASDAQ: QCOM), and 360, one of the largest internet security companies in China, today announced that the two companies are working on 4G kid watches and are launching 360's first product for this industry, 360 Kids Watch 6S, based on the Qualcomm® Snapdragon™ Wear 2100 platform. The 360 Kids Watch 6S combines the Snapdragon Wear 2100 platform with the 360 OS for Wear operating system,...

Read the full story at http://www.webwire.com/ViewPressRel.asp?aId=210394


          phpzm/security (1.3.0)   
Simples Security package
          USDA Announces Summer EBT Grants; Includes New States, Rural Communities   

The U.S. Department of Agriculture (USDA) announced the award of $31.5 million in Summer Electronic Benefits Transfer for Children (Summer EBT) Grants to explore ways to alleviate hunger among low-income children during the summer, including new projects in Texas and Tennessee. Rigorous evaluations of continuing projects have found that Summer EBT can significantly reduce very low food security among children, the most severe form of food insecurity, by one-third. “Summer EBT can help clo...

Read the full story at http://www.webwire.com/ViewPressRel.asp?aId=210383


          Going all in: Toyota Kentucky launches production of cutting-edge Camry   

Chad Lindon has worked at Toyota in Georgetown, Ky., for 22 years and said the 2018 Camry is the most exciting vehicle launch he's seen, and for good reason. “The 2018 Camry takes it to another level,” said Lindon, a Powertrain production team member. “It catches the eye. It has more horsepower, better fuel economy, and new technology that customers want. That all adds up to more job security and stability for my family.” The excitement that has been building for months peaks today insid...

Read the full story at http://www.webwire.com/ViewPressRel.asp?aId=210379


          Senior Security Network Analyst - BMO Financial Group - Toronto, ON   
Solid knowledge of Cisco, Nortel/Avaya network, Checkpoint/Juniper Firewall devices configurations including Cisco nexus series....
From BMO Financial Group - Fri, 23 Jun 2017 06:46:00 GMT - View all Toronto, ON jobs
          Security Analyst - Eagle Professional Resources - Toronto, ON   
Cisco 65xx, 72xx or Nexus product lines experience; Eagle is currently seeking a Security Analyst for a three (3) month contract position, scheduled to begin...
From Eagle Professional Resources - Tue, 13 Jun 2017 20:35:08 GMT - View all Toronto, ON jobs
          Operations Support Manager - Verizon - Basking Ridge, NJ   
Windows Phone, iOS, Android Ability to comply with any regulatory requirements Six or more years managing IT security teams with an emphasis on security...
From Verizon - Thu, 29 Jun 2017 10:58:13 GMT - View all Basking Ridge, NJ jobs
          How a tiny L.A. cybersecurity firm pulled the plug on a global ransomware attack   

Salim Neino had been waiting for something like WannaCry.

Fast, indiscriminate and disruptive, the computer infection locked up computers in British hospitals and was spreading across the world when Neino’s company Kryptos Logic stepped into the ring.

One of his researchers found a so-called kill...


          How Do I Open a Port in Windows 10 (refused connection) ?   

Originally posted on: http://geekswithblogs.net/AskPaula/archive/2017/06/27/how-do-i-open-a-port-in-windows-10-refused.aspx

If you are seeing the "connection refused" message when attempting to set up a localhost access port, the chances are good that the port is blocked from allowing connections through Windows. To open the port, follow these instructions:

1. Navigate to Control Panel, System and Security and Windows Firewall.
2. Select Advanced settings and highlight Inbound Rules in the left pane.
3. Right click Inbound Rules and select New Rule.
4. Add the port you need to open and click Next.
5. Add the protocol (TCP or UDP) and the port number into the next window and click Next.
6. Select Allow the connection in the next window and hit Next.
7. Select the network type as you see fit and click Next.
8. Name the rule something meaningful and click Finish.

          Writing a Voice Activated SharePoint Todo List - IoT App on RPi   

Originally posted on: http://geekswithblogs.net/hroggero/archive/2017/05/16/writing-a-voice-activated-sharepoint-todo-list---iot-app.aspx

Ever wanted to write a voice activated system on an IoT device to keep track of your “todo list”, hear your commands being played back, and have the system send you a text message with your todo list when it’s time to walk out the door?  Well, I did. In this blog post, I will provide a high level overview of the technologies I used, why I used them, a few things I learned along the way, and partial code to assist with your learning curve if you decide to jump on this.  I also had the pleasure of demonstrating this prototype at Microsoft’s Community Connections in Atlanta in front of my colleagues.

How It Works

I wanted to build a system using 2 Raspberry Pis (one running Windows 10 IoT Core, and another running Raspbian) that achieved the following objectives:

  • * Have 2 RPis that communicate through the Azure Service Bus
    This was an objective of mine, not necessarily a requirement; the intent was to have two RPis running different Operating Systems communicate asynchronously without sharing the same network
  • * Learn about the Microsoft Speech Recognition SDK
    I didn’t want to send data to the cloud for speech recognition; so I needed an SDK on the RPi to perform this function; I chose the Microsoft Speech Recognition SDK for this purpose

    * Communicate to multiple cloud services without any SDK so that I could program the same way on Windows and Raspbian (Twilio, Azure Bus, Azure Table, SharePoint Online)
    I also wanted to minimize the learning curve of finding which SDK could run on a Windows 10 IoT Core, and Raspbian (Linux); so I used Enzo Unified to abstract the APIs and instead send simple HTTPS commands allowing me to have an SDK-less development environment (except for the Speech Recognition SDK). Seriously… go find an SDK for SharePoint Online for Raspbian and UWP (Windows 10 IoT Core).

The overall solution looks like this:

image

Technologies

In order to achieve the above objectives, I used the following bill of materials:

Technology Comment Link
2x Raspberry Pi 2 Model B Note that one RPi runs on Windows 10 IoT Core, and the other runs Raspbian http://amzn.to/2qnM6w7
Microphone I tried a few, but the best one I found for this project was the Mini AKIRO USB Microphone http://amzn.to/2pGbBtP
Speaker I also tried a few, and while there is a problem with this speaker on RPi and Windows, the Logitech Z50 was the better one http://amzn.to/2qrNkop
USB Keyboard I needed a simple way to have keyboard and mouse during while traveling, so I picked up the iPazzPort Mini Keyboard; awesome… http://amzn.to/2rm0FOh
Monitor You can use an existing monitor, but I also used the portable ATian 7 inch display. A bit small, but does the job. http://amzn.to/2pQ5She 
IoT Dashboard Utility that allows you to manage your RPis running Windows; make absolutely sure you run the latest build; it should automatically upgrade, but mine didn’t. http://bit.ly/2rmCWOU
Windows 10 IoT Core The Microsoft O/S used on one of the RPis; Use the latest build; mine was 15063; if you are looking for instructions on how to install Windows from a command prompt, the link provided proved useful  http://bit.ly/2pG9gik
Raspbian Your RPi may be delivered with an SD card preloaded with the necessary utilities to install Raspbian; connecting to a wired network makes the installation a breeze. http://bit.ly/2rbnp7u
Visual Studio 2015 I used VS2015, C#, to build the prototype for the Windows 10 IoT Core RPi http://bit.ly/2e6ZGj5
Python 3 On the Raspbian RPi, I used Python 3 to code. http://bit.ly/1L2Ubdb
Enzo Unified I installed and configured an Enzo Unified instance (version 1.7) in the Azure cloud; for Enzo to talk to SharePoint Online, Twilio, Azure Service Bus and Azure Storage, I also needed accounts with these providers. You can try Enzo Unified for free for 30 days. http://bit.ly/2rm4ymt

 

Things to Know

Creating a prototype involving the above technologies will inevitably lead you to collect a few nuggets along the way. Here are a few.

Disable Windows 10 IoT Core Updates

While disabling updates is generally speaking not recommended, IoT projects usually require a predictable environment that does not reboot in the middle of a presentation. In order to disable Windows Updates on this O/S I used information published Mike Branstein on his blog: http://bit.ly/2rcOXt9

Try different hardware, and keep your receipts…

I had to try a few different components to find the right ones; the normally recommended S-150 USB Logitech speakers did not work for me; I lost all my USB ports and network connectivity as soon as I plugged it in. Neither did the JLab USB Laptop speakers. I also tried the 7.1 Channel USB External Sound Card but was unable to make it work (others were successful). For audio input, I also tried the VAlinks Mini Flexible USB microphone; while it worked well, it picked up too much noise compared to the AKIRO, and became almost unusable in a room with 20 people where you have background noise.

Hotel WiFi Connections

This was one of the most frustrating part of this whole experience on Windows 10 IoT Core. You should know that this operating system does not currently come equipped with a browser. This means that you cannot easily connect to a hotel network since this usually requires starting a browser so that you can enter a user id and password provided by the hotel. Further more, since there is also no possible way to “forget” a previously registered network, you can find yourself in a serious bind… I first purchased the Skyroam Mobile Hotspot, hoping it would provide the answer. Unfortunately the only time I tried it, in Tampa Florida, the device could not obtain a connection. So I ended up adding a browser object into my UWP application and force it to refresh a specific image every time I start the app; this will force the hotel login page to show up when needed. I am still looking for a good solution to this problem.

Speech Privacy Policy on Windows

Because parts of the code I am running leverages the underlying APIs of Cortana, it seems that you must accept the Cortana privacy policy; this is required only the first time you run the application, but is obviously a major nightmare for applications you may want to ship. I am not aware of any programmatic workaround at this time. This stackoverflow post provides information about this policy and how to accept it.

How It Looks Like

A picture is worth a thousand words… so here is the complete setup:

20170502_225941

C# Code

Since this is an ongoing prototype I will not share the complete code at this time; however I will share a few key components/techniques I used to make this work.

Speech Recognition

I used both continuous dictation speech recognition, and grammar-based recognition from the Microsoft Speech Recognition API. The difference is that the first one gives you the ability to listen to “anything” being said, and the other will only give you a set of results that match the expected grammar. Both methods give you a degree of confidence so you can decide if the command/text input was sufficiently clear. The following class provides a mechanism for detecting input either through continuous dictation or using a grammar file. The timeout ensures that you do not wait forever. This code also returns the confidence level of the capture.

 

using Enzo.UWP;
using System;
using System.Collections.Generic;

using System.Diagnostics;
using System.Net.Http;
using System.Threading.Tasks;
using Windows.ApplicationModel;
using Windows.Devices.Gpio;
using Windows.Media.SpeechRecognition;
using Windows.Media.SpeechSynthesis;
using Windows.Storage;

namespace ClientIoT
{

    public class VoiceResponse
    {
        public string Response = null;
        public double RawConfidence = 0;
    }

    public class VoiceInput
    {
        private const int SPEECH_TIMEOUT = 3;
        private System.Threading.Timer verifyStatus;
        private string lastInput = "";
        private double lastRawConfidence = 0;
        private bool completed = false;
        private bool success = false;

        public async Task<VoiceResponse> WaitForText(string grammarFile)
        {
            return await WaitForText(SPEECH_TIMEOUT, grammarFile);
        }

        public async Task<VoiceResponse> WaitForText(int timeout = SPEECH_TIMEOUT, string grammarFile = null)
        {
            var resp = new VoiceResponse();
            try
            {
                success = false;
                completed = false;
                lastInput = "";
                lastRawConfidence = 0;

                SpeechRecognizer recognizerInput;
                DateTime dateNow = DateTime.UtcNow;

                recognizerInput = new SpeechRecognizer();
                recognizerInput.ContinuousRecognitionSession.ResultGenerated += ContinuousRecognitionSession_InputResultGenerated;
                recognizerInput.StateChanged += InputRecognizerStateChanged;
                recognizerInput.Timeouts.BabbleTimeout = TimeSpan.FromSeconds(timeout);
                recognizerInput.ContinuousRecognitionSession.Completed += ContinuousRecognitionSession_Completed;
                recognizerInput.ContinuousRecognitionSession.AutoStopSilenceTimeout = TimeSpan.FromSeconds(SPEECH_TIMEOUT);
                recognizerInput.Constraints.Clear();

                if (grammarFile != null)
                {
                    StorageFile grammarContentFile = await Package.Current.InstalledLocation.GetFileAsync(grammarFile);
                    SpeechRecognitionGrammarFileConstraint grammarConstraint = new SpeechRecognitionGrammarFileConstraint(grammarContentFile);
                    recognizerInput.Constraints.Add(grammarConstraint);
                }

                var compilationResult = await recognizerInput.CompileConstraintsAsync();

                // If successful, display the recognition result.
                if (compilationResult.Status != SpeechRecognitionResultStatus.Success)
                {
                    Debug.WriteLine(" ** VOICEINPUT - VoiceCompilationError - Status: " + compilationResult.Status);
                }

                recognizerInput.ContinuousRecognitionSession.AutoStopSilenceTimeout = TimeSpan.FromSeconds(timeout);
                recognizerInput.RecognitionQualityDegrading += RecognizerInput_RecognitionQualityDegrading;
                await recognizerInput.ContinuousRecognitionSession.StartAsync();

                System.Threading.SpinWait.SpinUntil(() =>
                    completed
                );
               
                resp = new VoiceResponse() { Response = lastInput, RawConfidence = lastRawConfidence };
               
                try
                {
                    recognizerInput.Dispose();
                    recognizerInput = null;
                }
                catch (Exception ex)
                {
                    Debug.WriteLine("** WaitForText (1) - Dispose ** " + ex.Message);
                }
            }
            catch (Exception ex2)
            {
                Debug.WriteLine("** WaitForText ** " + ex2.Message);
            }
            return resp;
        }

        private void RecognizerInput_RecognitionQualityDegrading(SpeechRecognizer sender, SpeechRecognitionQualityDegradingEventArgs args)
        {
            try
            {
                Debug.WriteLine("VOICE INPUT - QUALITY ISSUE: " + args.Problem.ToString());
            }
            catch (Exception ex)
            {
                Debug.WriteLine("** VOICE INPUT - RecognizerInput_RecognitionQualityDegrading ** " + ex.Message);
            }
        }

        private void ContinuousRecognitionSession_Completed(SpeechContinuousRecognitionSession sender, SpeechContinuousRecognitionCompletedEventArgs args)
        {
            if (args.Status == SpeechRecognitionResultStatus.Success
                || args.Status == SpeechRecognitionResultStatus.TimeoutExceeded)
                success = true;
            completed = true;
           
        }

        private void ContinuousRecognitionSession_InputResultGenerated(SpeechContinuousRecognitionSession sender, SpeechContinuousRecognitionResultGeneratedEventArgs args)
        {
            try
            {
                lastInput = "";
                if ((args.Result.Text ?? "").Length > 0)
                {
                    lastInput = args.Result.Text;
                    lastRawConfidence = args.Result.RawConfidence;
                    Debug.WriteLine(" " + lastInput);
                }
            }
            catch (Exception ex)
            {
                Debug.WriteLine("** ContinuousRecognitionSession_InputResultGenerated ** " + ex.Message);
            }
        }

        private void InputRecognizerStateChanged(SpeechRecognizer sender, SpeechRecognizerStateChangedEventArgs args)
        {
            Debug.WriteLine("  Input Speech recognizer state: " + args.State.ToString());
        }
    }
}

For example, if you want to wait for a “yes/no” confirmation, with a 3 second timeout, you would call the above code as such:

var yesNoResponse = await (new VoiceInput()).WaitForText(3, YESNO_FILE);

And the yes/no grammar file looks like this:

<?xml version="1.0" encoding="utf-8" ?>
<grammar
  version="1.0"
  xml:lang="en-US"
  root="enzoCommands"
  xmlns="http://www.w3.org/2001/06/grammar"
  tag-format="semantics/1.0">

  <rule id="root">
    <item>
      <ruleref uri="#enzoCommands"/>
      <tag>out.command=rules.latest();</tag>
    </item>
  </rule>

  <rule id="enzoCommands">
    <one-of>
      <item> yes </item>
      <item> yep </item>
      <item> yeah </item>
      <item> no </item>
      <item> nope </item>
      <item> nah </item>
    </one-of>
  </rule>

</grammar>

Calling Enzo Unified using HTTPS to Add a SharePoint Item

Another important part of the code is its ability to interact with other services through Enzo Unified, so that no SDK is needed on the UWP application. For an overview on how to access SharePoint Online through Enzo Unified, see this previous blog post.

The following code shows how to easily add an item to a SharePoint list through Enzo Unified. Posting this request to Enzo requires two parameters (added as headers) called “name” and “data” (data is an XML string containing the column names and values to be added as a list item).

public static async Task SharePointAddItem(string listName, string item)
{
            string enzoCommand = "/bsc/sharepoint/addlistitemraw";
            List<KeyValuePair<string, string>> headers = new List<KeyValuePair<string, string>>();

            string data = string.Format("<root><Title>{0}</Title></root>", item);

            headers.Add(new KeyValuePair<string, string>("name", listName));
            headers.Add(new KeyValuePair<string, string>("data", data));

            await SendRequestAsync(HttpMethod.Post, enzoCommand, headers);
}

And the SendRequestAsync method below shows you how to call Enzo Unified. Note that I added two cache control filters to avoid HTTP caching, and additional flags for calling Enzo Unified on an HTTPS port where a self-signed certificate is installed.

private static async Task<string> SendRequestAsync(HttpMethod method, string enzoCommand, List<KeyValuePair<string, string>> headers)
{
            string output = "";
            var request = EnzoUnifiedRESTLogin.BuildHttpWebRequest(method, enzoCommand, headers);
           
            var filter = new Windows.Web.Http.Filters.HttpBaseProtocolFilter();
            if (IGNORE_UNTRUSTEDCERT_ERROR)
            {
                filter.IgnorableServerCertificateErrors.Add(Windows.Security.Cryptography.Certificates.ChainValidationResult.Untrusted);
                filter.IgnorableServerCertificateErrors.Add(Windows.Security.Cryptography.Certificates.ChainValidationResult.InvalidName);
            }
            filter.CacheControl.ReadBehavior = Windows.Web.Http.Filters.HttpCacheReadBehavior.MostRecent;
            filter.CacheControl.WriteBehavior = Windows.Web.Http.Filters.HttpCacheWriteBehavior.NoCache;

            Windows.Web.Http.HttpClient httpClient = new Windows.Web.Http.HttpClient(filter);

            try
            {
                using (var response = await httpClient.SendRequestAsync(request))
                {
                    output = await response.Content.ReadAsStringAsync();
                }
            }
            catch (Exception ex)
            {
                System.Diagnostics.Debug.WriteLine(" ** Send Http request error: " + ex.Message);
            }
            return output;
}

Last but not least, the BuildHttpWebRequest method looks like this; it ensures that the proper authentication headers are added, along with the authentication identifier for Enzo:

public static Windows.Web.Http.HttpRequestMessage BuildHttpWebRequest(Windows.Web.Http.HttpMethod httpmethod, string uri, List<KeyValuePair<string,string>> headers)
{
            bool hasClientAuth = false;

            Windows.Web.Http.HttpRequestMessage request = new Windows.Web.Http.HttpRequestMessage();

            request.Method = httpmethod;
            request.RequestUri = new Uri(ENZO_URI + uri);

            if (headers != null && headers.Count() > 0)
            {
                foreach (KeyValuePair<string, string> hdr in headers)
                {
                    request.Headers[hdr.Key] = hdr.Value;
                }
            }

            if (!hasClientAuth)
                request.Headers["authToken"] = ENZO_AUTH_GUID;

            return request;
}

Text to Speech

There is also the Text to Speech aspect, where the system speaks back what it heard, before confirming and acting on the command. Playing back is actually a bit strange in the sense that it requires a UI thread. In addition, it seems that Windows 10 IoT Core and Raspberry Pi don’t play nice together; it seems that every time a playback occurs, a loud tick can be heard before and after. A solution appears to be using USB speakers, but none worked for me. The code below simply plays back a specific text and waits a little while in an attempt to give enough time for the playback to finish (the code is non-blocking, so the SpinWait attempts to block the code until completion of the playback).

private async Task Say(string text)
{
            SpeechSynthesisStream ssstream = null;

            try
            {
                SpeechSynthesizer ss = new SpeechSynthesizer();
                ssstream = await ss.SynthesizeTextToStreamAsync(text);
            }
            catch (Exception exSay)
            {
                Debug.WriteLine(" ** SPEECH ERROR (1) ** - " + exSay.Message);
            }

            var task1 = this.Dispatcher.RunAsync(Windows.UI.Core.CoreDispatcherPriority.Normal, async () =>
            {
                try
                {
                    await media.PlayStreamAsync(ssstream);
                }
                catch (Exception exSay)
                {
                    Debug.WriteLine(" ** SPEECH ERROR (2) ** - " + exSay.Message);
                }
            });

            // Wait a little for the speech to complete
            System.Threading.SpinWait.SpinUntil(() => 1 == 0, lastInput.Length * 150);

}

Calling the above code is trivial:

await Say("I am listening");

 

Python

The code in python was trivial to build; this RPi was responsible for monitoring events in the Azure Service Bus and turning on/off the LED attached to it. The following pseudo code shows how to call Enzo Unified from Python without using any SDK:

import sys
import urllib
import urllib2
import requests

enzourl_receiveMsg=”http://…/bsc/azurebus/receivedeletefromsubscription”
enzo_guid=”secretkeygoeshere”
topicName=”enzoiotdemo-general”
subName=”voicelight”

while 1=1
   try:
      headers={‘topicname’:topicName,
         ‘authToken’:enzoguid,
         ‘subname’:subName,
         ‘count’:1,
         ‘timeoutSec’:1
      }
      response=requests.get(enzourl_receiveMsg,headers=headers)
      resp=response.json()
      if (len(resp[‘data’][‘Table1’]) > 0
         #extract response here…

 

Conclusion

This prototype demonstrated that while there were a few technical challenges along the way, it was relatively simple to build a speech recognition engine that can understand commands using Windows 10 IoT Core, .NET, and the Microsoft Speech Recognition SDK. 

Further more, the intent of this project was also to demonstrate that Enzo Unified made it possible to code against multiple services without the need for an SDK on the client side regardless of the platform and the development language.  Abstracting SDKs through simple HTTP calls makes it possible to access Twilio, SharePoint Online, Azure services and much more without any additional libraries on the client system.

About Herve Roggero

Herve Roggero, Microsoft Azure MVP, @hroggero, is the founder of Enzo Unified (http://www.enzounified.com/). Herve's experience includes software development, architecture, database administration and senior management with both global corporations and startup companies. Herve holds multiple certifications, including an MCDBA, MCSE, MCSD. He also holds a Master's degree in Business Administration from Indiana University. Herve is the co-author of "PRO SQL Azure" and “PRO SQL Server 2012 Practices” from Apress, a PluralSight author, and runs the Azure Florida Association.


          Java Developer   
FL-Gainesville, For Mindtree, "Welcome to possible" is more than a slogan - it reflects our approach to every engagement.We are among the fastest growing technology firms globally with more than 200 clients and offices in 14 countries. We deliver amazing results: Helping 150 million passengers fly safely. Improving security and performance for one of the world*s largest e-commerce stores. Unifying brand messaging
          So you want to go Causal Neo4j in Azure? Sure we can do that   

Originally posted on: http://geekswithblogs.net/cskardon/archive/2017/04/26/so-you-want-to-go-causal-neo4j-in-azure-sure.aspx

So you might have noticed in the Azure market place you can install an HA instance of Neo4j – Awesomeballs! But what about if you want a Causal cluster?

image

Hello Manual Operation!

Let’s start with a clean slate, typically in Azure you’ve probably got a dashboard stuffed full of other things, which can be distracting, so let’s create a new dashboard:

image

Give it a natty name:

image

Save and you now have an empty dashboard. Onwards!

To create our cluster, we’re gonna need 3 (count ‘em) 3 machines, the bare minimum for a cluster. So let’s fire up one, I’m creating a new Windows Server 2016 Datacenter machine. NB. I could be using Linux, but today I’ve gone Windows, and I’ll probably have a play with docker on them in a subsequent post…I digress.

image

At the bottom of the ‘new’ window, you’ll see a ‘deployment model’ option – choose ‘Resource Manager’

image

Then press ‘Create’ and start to fill in the basics!

image

  • Name: Important to remember what it is, I’ve optimistically gone with 01, allowing me to expand all the way up to 99 before I rue the day I didn’t choose 001.
  • User name: Important to remember how to login!
  • Resource group: I’m creating a new resource group, if you have an existing one you want to use, then go for it, but this gives me a good way to ensure all my Neo4j cluster resources are in one place.

Next, we’ve got to pick our size – I’m going with DS1_V2 (catchy) as it’s pretty much the cheapest, and well – I’m all about being cheap.

image

You should choose something appropriate for your needs, obvs. On to settings… which is the bulk of our workload.

image

I’m creating a new Virtual Network (VNet) and I’ve set the CIDR to the lowest I’m allowed to on Azure (10.0.0.0/29) which gives me 8 internal IP addresses – I only need 3, so… waste.

image

I’m leaving the public IP as it is, no need to change that, but I am changing the Network Security Group (NSG) as I intend on using the same one for each of my machines, and so having ‘01’ on the end (as is default) offends me Smile

image

Feel free to rename your diagnostics storage stuff if you want. The choice as they say – is yours.

Once you get the ‘ticks’ you are good to go:

image

It even adds it to the dashboard… awesomeballs!

image

Whilst we wait, lets add a couple of things to the dashboard, well, one thing, the Resource group, so view the resource groups (menu down the side) and press the ellipsis on the correct Resource group and Pin to the Dashboard:

image

So now I have:

image

After what seems like a lifetime – you’ll have a machine all setup and ready to go – well done you!

image

Now, as it takes a little while for these machines to be provisioned, I would recommend you provision another 2 now, the important bits to remember are:

  • Use the existing resource group:
    image
  • Use the same disk storage
  • Use the same virtual network
  • Use the same Network Security Group
    image

BTW, if you don’t you’re only giving yourself more work, as you’ll have to move them all to the right place eventually, may as well do it in one!

Whilst they are doing their thing, let’s setup Neo4j on the first machine, so let’s connect to it, firstly click on the VM and then the ‘connect’ button

image

We need two things on the machine

  1. Neo4j Enterprise
  2. Java

The simplest way I’ve found (provided your interwebs is up to it) is to Copy the file on your local machine, and Right-Click Paste onto the VM desktop – and yes – I’ve found it works way better using the mouse – sorry CLI-Guy

Once there, let’s install Java:

image

Then extract Neo4j to a comfy location, let’s say, the ‘C’ drive, (whilst we’re here… !Whaaaaat!!??? image 

an ‘A’ drive? I haven’t seen one of those for at least 10 years, if not longer).

Anyways - extracted and ready to roll:

image

UH OH

image

Did you get ‘failed’ deployments on those two new VMs? I did – so I went into each one and pressed ‘Start’ and that seemed to get them back up and running.

#badtimes

(That’s right – I just hashtagged in a blog post)

Anyways, we’ve now got the 3 machines up and I’m guessing you can rinse and repeat the setting up of Java and Neo4j on the other 2 machines. Now.

To configure the cluster!

We need the internal IPs of the machines, we can run ‘IpConfig’ on each machine, or just look at the V-Net on the portal and get it all in one go:

image

So, machine number 1… open up ‘neo4j.conf’ which you’ll find in the ‘conf’ folder of Neo4j. Ugh. Notepad – seriously – it’s 2017, couldn’t there be at least a slight  improvement in notepad by now???

I’m not messing with any of the other settings, purely the clustering stuff – in real life you would probably configure it a little bit more. So I’m setting:

  • dbms.mode
    • CORE
  • causal_clustering.initial_discovery_members
    • 10.0.0.4:5000,10.0.0.5:5000;10.0.0.6:5000

I’m also uncommenting all the defaults in the ‘Causal Clustering Configuration’ section – I rarely trust defaults. I also uncomment

  • dbms.connectors.default_listen_address

So it’s contactable externally. Once the other two are setup as well we’re done right?

HA No chance! Firewalls – that’s right in plural. Each machine has one – which needs to be set to accept the ports:

5000,6000,7000,7473,7474,7687

image

Obviously, you can choose not to do the last 3 ports and be uncontactable, or indeed choose any combo of them.

Aaaand, we need to configure the NSG:

image

I have 3 new ‘inbound’ rules – 7474 (browser), 7687 (bolt), 7000 – Raft.

Right. Let’s get this cluster up and contactable.

Log on to one of your VMs and fire up PowerShell (in admin mode)

image

First we navigate to the place we installed Neo4j (in my case c:\neo4j\neo4j-enterprise-3.1.3\bin) and then we import the Neo4j-Management module. To do this you need to have your ExecutionPolicy set appropriately. Being Lazy, I have it set to ‘Bypass’ (Set-ExecutionPolicy bypass).

Next we fire up the server in ‘console’ mode – this allows us to see what’s happening, for real situations – you’re going to install it as a service.

You’ll see the below initially:

image

and it will sit like that until the other servers are booted up. So I’ll leave you to go do that now…

Done?

Good – now, we need to wait a little while for them to negotiate amongst themselves, but after a short while (let’s say 30 secs or less) you should see:

image

Congratulations! You have a cluster!

Logon to that machine via the IP it says, and you’ll see the Neo4j Browser, login and then run

:play sysinfo

image

You could now run something like:

Create (:User {Name:'Your Name'})

And then browse to the other machines to see it all nicely replicated.


          Cybersecurity Steps Every Lawyer Should Consider   
All lawyers face technology threats, ranging from the inconvenient to practice-threatening disasters. From unauthorized access, lawyers risk having confidential information stolen, destroyed or made inaccessible. Hackers might be thrill seekers,...
By: Bradley Arant Boult Cummings LLP
          Custodians of SDG Land Indicator 1.4.2 Facilitate Methodology Discussions   
The Global Donor Working Group on Land has published a policy brief discussing progress on incorporating Sustainable Development Goal (SDG) indicator 1.4.2 on land tenure security into the formal SDG monitoring process. The report stresses that the systematic measurement of tenure security is critical for informed policy making, especially "given the inextricable link between securing property rights and ending poverty and inequality". Additional steps that need to be taken before 1.4.2 "can get over the hurdle" include agreeing on the administrative data that national land agencies will need to supply to satisfy the "legal documentation" component of the indicator.
          UN Agencies, World Bank Urge Preparation for Drought, Climate Change   
FAO warned of the serious impacts of drought on food security and poverty, which will hamper achievement of the Sustainable Development Goals (SDGs). FAO and the WMO signed an agreement to cooperate on improving the provision of weather-related information to farmers to enable better planning and preparation for droughts. FAO research has proposed a technique for collecting water in degraded drylands, and has considered how the use of "unconventional water resources," such as recycled wastewater, can return water to the landscape.
          Recording of PASS Security VC Webinar   
If you were unable to attend this month’s PASS Security Virtual Chapter webinar, The Dirty Business of Auditing , it has been published to YouTube. As requested, here are the slides:  The Dirty ... - Source: www.sqlservercentral.com
          Comment on The Real Security Threats on Iran’s Periphery by rosemerry   
If only Trump, Clinton, all the "Trump administration", Obama and anyone involved, even "ordinary Americans" would read this clear, understandable and comprehensive report and take some notice, even perhaps use their brains (not the "intelligence" they claim to receive from Israel and elsewhere), we would all be better off. Thank you for this important contribution.
          Comment on The Real Security Threats on Iran’s Periphery by James Canning   
The US vastly increased instability in the Middle East with its idiotic invasion of Iraq in 2003. Many of those who so foolishly called for that invasion also promote increased hostility toward Iran.
          Comment on The Real Security Threats on Iran’s Periphery by Decker   
Bizarre to do such an exhaustive survey without mentioning Israel, which has been lobbying the US to overthrow Iran since the 1990s. Probably the #1 threat to Iranian security.
          Clarification: Trump-Russia stories   
WASHINGTON (AP) -- In stories published April 6, June 2, June 26 and June 29, The Associated Press reported that all 17 U.S. intelligence agencies have agreed that Russia tried to influence the 2016 election to benefit Donald Trump. That assessment was based on information collected by three agencies - the FBI, CIA and National Security Agency - and published by the Office of the Director of National Intelligence, which represents all U.S. intelligence agencies. Not all 17 intelligen...
          Technical Content Developer   
Qualys is looking for an experienced technical blog writer to create marketing blogs, technical white papers for our IT security and compliance solutions in the cloud. The applicant must possess experience in technical white paper writing/technical blog writing with 5+ years content development experience for IT products. In this role you'll communicate internally with Developers, Support engineers and Product Management to create on-line blog content, technical white papers and other written marketing content that helps our customers understand the product objectives, feature usage and concepts in a simple and catchy way. The perfect applicant has worked with networking and/or security products, and is passionate about creating helpful technical content in a modern way. KNOWLEDGE, SKILLS, AND ABILITIES REQUIRED: Technical - Solid understanding of all sections related to the anatomy of a blog/white paper. - Expertise to operate independently and as a member of a team.
          Cybersecurity? Ecco i ruoli chiave: CISO e DPO   
Le crescenti minacce in ambito cybersecurity, dalle violazioni degli account di posta alle presunte azioni di spionaggio informatico durante le elezioni americane, hanno iniziato a portare all’attenzione sempre più prepotentemente la necessità di dotarsi di nuove misure preventive e di protezione. Chiaro indizio a supporto di questo sono le richieste sempre più numerose delle aziende Continua →
          A short leap and closure for Pardes   

Khurana threatens to kill Naina, if he does not get his son. He asks Naina to give him his child. The security catches Khurana and stop his madness. Naina and Dadi take care of the baby. Sudha plans to give a farewell gift to Naina. Sudha calls Harjeet and informs her that they all are […]

The post A short leap and closure for Pardes appeared first on TellyReviews.


          Security Specialist - Systematix - Waterloo, ON   
Must work effectively with others in a team environment Previous experience with monitoring tools an asset Software troubleshooting &amp; PC, laptop hardware...
From Systematix - Fri, 09 Jun 2017 06:38:32 GMT - View all Waterloo, ON jobs
          Books I Read   
Below, you will find a list of all the books I read between the 2008-2011. I link to those I recommend.



Adult Non-Fiction


Adult Fiction


Adult Religious


Young Adult [Note: These titles vary greatly in recommended grade levels. Review carefully before assigning to students.]

          Reeling from Horrifying GOP Health Care Bills? Just wait till you lose your Voting Rights, just around the corner.    
While everyone is still wondering how Republicans could ever seriously fix their health care bills that drop 22 to 23 million Americans with a few more insane amendments, voting rights is about to take a huge hit:
The Republican presidential tactic of crippling agencies you don't like by putting either the incompetent or the actively hostile in charge of them (continues) ... Kris Kobach, the godfather of the national movement to suppress the votes of people the GOP would prefer not to exercise the franchise (was) named as vice-chairman of his Presidential Advisory Commission on Election Integrity, a snipe hunt the only apparent purpose of which is maintaining the fiction that masses of people, many of them brown, are gaming our elections. 
Here's the most damning news that might just alert us to specific Republican governors who take the bait:
Kobach wrote a letter to his fellow secretaries of state that left many jaws on the floor. From The Kansas City Star: In a Wednesday letter, Kobach asked the Connecticut secretary of state's office to provide the commission with all publicly available voter roll data, including the full names of all registered voters along with their addresses, dates of birth, the last four digits of their Social Security numbers, voting history and other personal information ... he sent similar letters to election officials in every state. 

Quite simply, any secretary of state who complies with this request is either too stupid to hold the job, or is in sympathy with Kobach's goal of whitewashing the electorate.  Alex Padilla, the Secretary of State for California, said, "California's participation would only serve to legitimize the false and already debunked claims of massive voter fraud made by the President, the Vice President, and Mr. Kobach. The President's Commission is a waste of taxpayer money and a distraction from the real threats to the integrity of our elections today: aging voting systems and documented Russian interference in our elections."

Connecticut Secretary of State Denise Merrill was a bit more discreet: "The courts have repudiated his methods on multiple occasions but often after the damage has been done to voters. Given Secretary Kobach's history we find it very difficult to have confidence in the work of this commission."
BREAKING: Scott Walker gives up voter information to Trump's big government demands. Hey, we just had a recount too. All is well?

Wisconsin elections officials said Friday that they'll sell some voter information to a presidential commission investigating election fraud. Administrator Mike Haas issued a statement Friday saying data is available for purchase and the commission must release it to buyers, adding that the commission routinely sells the information to political parties, candidates and researchers. The commission would charge the presidential panel $12,500 for the data.
Having done a lot of research on "the right to vote," I found that despite the guarantee in the 14th, 15th and 19th Amendments...with help from the Voting Rights Act (now destroyed by activist conservative Justices), voting seems to be the least defended squishy right ever. In fact, I could make the argument that women and African Americans were definitely given the right to vote, but anyone else including white guys...nope.

What if Obama did this? Always the best test against hypocritical Republican policy:
As Vanita Gupta points out in that same K.C. Star report, if someone in the Obama administration had made this request, at the very least, there would be a full week of howler monkeys screaming about federalism from every perch in every conservative think-tank in the jungle. At the most, there would be hearing after hearing about the Obama administration's plan to seed thousands of the president's fellow Kenyans in every crucial precinct in Ohio and Florida. What's more important, though, is that the national campaign to roll back voting rights now has reached the highest levels of government, with the blessing of the president* and the president*-in-waiting. This is the final step backwards across the Edmund Pettus Bridge.

          In Kenya’s drylands, education is an insurance policy, but only for some   

Livestock is so central to the economy, food, and status of pastoralists in Kenya’s northern drylands that formal education has traditionally taken second place to the role children play in tending to cows, goats, and sheep.

But with climate change increasingly seen as imperiling livelihoods, many pastoralists are now taking the longer view and regard education as a sort of insurance policy. And yet the severity of the current drought affecting much of east Africa, coupled with a long interruption in the provision of free meals, has led to a drop in school attendance.

“The drought has become too harsh,” said Atiir Lokwawi, a 42-year-old mother who lives in the village of Kalokutanyang, in Kenya’s Turkana County. “Animals are dying in huge numbers. We restock, but before we stabilise, drought comes and takes away our investment.”

Lokwawi’s husband travelled to Uganda to graze most of the family’s herd. Of the 40 goats he left behind, 35 have died because of the drought.

“It is good if at least one child goes to school,” said Lokwawi. “Educating our children is also another way to earn money – animals alone cannot help us survive,” she said, explaining that of her seven children, only one, a 15-year-old girl, is currently attending school.

“It will take time for our children to go to school and get jobs, but at least there is hope that, someday, someone will be there for us.”

To help make ends meet, Lokwawi makes charcoal and attends evening classes at a local mobile school.

“I burn charcoal to invest in my daughter’s education. The government pays for her fees, but I have to buy her books, pen, and uniforms. She is my hope, my only family hope,” said Lokwawi, adding that she would like her daughter to become a doctor.

Another of her daughters was married off, bringing the family a substantial dowry of livestock. But most of these animals also perished.

Teaching adaptation

Christine Tukei, a teacher at Kalokutanyang’s mobile primary school, said education for pastoralists “needs to go beyond the [national] curriculum.

“It needs to add value and incorporate their lifestyle. It is vital to help communities prepare for and respond to impacts of climate change while promoting a sustainable way of life.”

The mobile school has about 100 students: roughly two thirds youths aged between nine and 17, and one third adults aged between 35 and 42.

Classes take place between 8 and 10 pm, as during daytime the children are usually tending to livestock herds while the adults make and sell charcoal.

The ravages of the drought have led Tukei to add adaptation strategies to what she teaches.

“We discuss the importance of early destocking, minimising herds to manageable levels; the importance of investing in education; and alternative businesses. I also teach about preserving meat with salt as they slaughter some animals and store for food; and about good health and sanitation,” she explained.

Disastrous drought

The current drought, which started in 2016 and which the Kenyan government deems a national emergency, has dried up water resources in half of the country’s 47 counties, leaving an estimated three million people lacking access to clean water, according to OCHA, the UN’s emergency aid coordination body.

“Recurrent droughts have destroyed livelihoods, triggered local conflicts over scare resources and eroded the ability of communities to cope,” OCHA said, noting that prices of staple food had risen considerably.

The drought has sent rates of global acute malnutrition soaring: in Turkana North sub-county, the rate is 30.7 percent, more than double the emergency threshold.

Across Kenya, up to 3.5 million people are expected to need food assistance in August, up from 2.6 million in February, according to the UN’s World Food Programme.

Large numbers of livestock deaths have been reported in Turkana County, as well as in the counties of Marsabit, Samburu, and Mandera.

As well as Kenya, drought is ravaging Ethiopia and Kenya. In these three countries, the education of some six million children has been disrupted, according to OCHA.

A Turkana boy herds his family's cows in Kenya
Wendy Stone/IRIN
Many children in Turkana tend livestock rather than attend school

Low enrolment

Although the national introduction of free primary education in 2003 led to an increase in school attendance across Kenya, enrolment rates in dryland counties such as Turkana remain much lower than the rest of the country.

And of those who enroll in the first year of school, barely one in five stick it out through the eighth year, with dropouts attributed to early marriage and the need to look after livestock.

Even though going to school can lead to improved agriculture, better health, improved community relations, and better management of natural resources, “the culture [here] does not allow the community to attach much premium on education,” Muthengi Muvea, the director of education in the sub-county of Turkana Central, told IRIN.

“A high number of pastoralists are not willing to wait for over 20 years to see returns on their investment, while a child has immediate returns such as dowry for girls and herding for boys,” he explained.

According to Muvea, at any given time, at least 40 percent of children who are supposed to be in school in Turkana County are not.

This is attributed to: parents migrating during drought in search of pasture and water; inadequate infrastructure; understaffing in schools; and the parents’ general unwillingness to enroll their children in school.

“January 2017 saw enrollment [in Turkana] drop by over 9,200 from the 2016 third term,” said Jesse Nyongesa, of the Ministry of Education.

Matters were made worse in the first few months of 2017 by an interruption in the provision of free school meals across much of the country, although these meals – provided since 1980 by WFP and the Kenyan government and now benefiting 1.5 million children at an annual cost of four billion shillings ($39 million) – resumed in May.

“During drought, the meal the children get in school is the only meal they are likely to get for the day,” said Matthew Epetet, the head teacher of a primary school in the Turkana Central village of Lochwa.

“It’s critical to attaining food security in this part of the country. Unless it's assured, the rate of retention is low, especially for the junior classes.”

Since it launched a Home-Grown School Meals programme in 2009, the government of Kenya has gradually increased its role in feeding school children. HGSM now benefits twice as many children as WFP’s contribution and is set to feed all by 2019.

Under the programme, food is bought from nearby farmers, thereby stimulating the local economy while encouraging children to attend school.

The interruption of free school meals, combined with the migration of parents in search of water and pasture, led attendance at the school to fall by more than half, said Epetet.

“From a total of 585 students, only 257 students are attending class now,” he said. “Among the 103 girls enrolled in school, about 37 are no longer in school. The pre-primary pupils have already stopped coming to school.”

The head teacher explained that the recent start of oil exploration in Turkana’s Lokichar Basin had been another factor in falling attendance.

“Fifteen boys have dropped out of school to work as motorcycle riders within Lokichar,” he said. “Some are seeking manuals job from those employed in oil exploration companies such as fetching water.”

Muvea believes it will take time before education fully improves the welfare of the community and contributes to a meaningful, sustainable manner of resilience.

“It's about perception,” asserted Muvea. “School becomes necessary during drought emergencies because of food access. The way pastoralists perceive education has to change if it is to play a fundamental role in strengthening their resilience.”

sm/am/ag

(TOP PHOTO: Break time at Karoge Primary School. Sophie Mbugua/IRIN)

Turkana school Feature Solutions and Innovations Environment and Disasters Climate change In Kenya’s drylands, education is an insurance policy for some Sophie Mbugua IRIN Kalokutanyang Kenya Africa East Africa Kenya
          Policy Analyst   
VA-Arlington, Zachary Piper Solutions is currently seeking an experienced Policy Analyst to join a cybersecurity contract located in Rosslyn, VA. The Policy Analyst will be a contributing factor to a team responsible for developing and administering department-wide cybersecurity policies and standards. Responsibilities of the Policy Analyst include: Conducting in-depth research on new and emerging technologies
          Checkpoint Security Administrator   

          Ransomware has been around for almost 30 years, so why does it feel like it's getting worse?   

Ransomware is not new. The malware, which encrypts data and demands payment in exchange for decryption keys, has been with us for almost 30 years.

So why does it feel like it's getting worse? Well, that's because it is getting worse.

In seemingly no time at all, ransomware has gone from an obscure threat faced by a select few to a plague crippling hospitals, banks, public transportation systems, and even video games. Frustratingly, the explosive growth of ransomware shows no signs of abating - leaving victims wondering why them, and why now?

The answer to both of those questions involves cryptocurrency and the National Security Agency.

But first, a little history

The first known ransomware attack hit the healthcare industry way back in 1989. According to the cybersecurity blog Practically Unhackable, a biologist by the name of Joseph Popp sent close to 20,000 floppy disks to researchers claiming they contained a survey which would help scientists determine a patient's risk for contracting HIV.

What was left unmentioned in the promotional material was that the disks also encrypted file names on infected computers - rendering them practically unusable. Instead of their typical boot screens, victims were shown a message demanding a $189 payment in order to unlock the system.

The message displayed by PC Cyborg. PHOTO:  Palo Alto Networks

Popp, who had a PhD from Harvard, was an evolutionary biologist and fell outside of what we think of today as a stereotypical hacker.

According to The Atlantic, after he was arrested and charged with blackmail, Popp insisted that he intended to donate the proceeds from his scheme to HIV-related research.

Read the full article here

Friday, June 30, 2017 - 12:34

More about

ransomware
Others

          CAPS United back manager Chitembwe ahead of Zamalek encounter   

CAPS United have insisted that manager Lloyd Chitembwe will stay at the club despite poor start to the season. Chitembwe’s security at the Zimbabwean champions looked more precarious than ever after a poor start to the season, gaining only 13 points from their first nine league games, however, the club’s board have insisted that the manager will stay […]

The post CAPS United back manager Chitembwe ahead of Zamalek encounter appeared first on KingFut.


          Apple secrets: Most leaks come out of the mothership   

LOS ANGELES - Apple is known for its secrecy, but journalists and bloggers have nonetheless reported about many of the company's recent products beforehand.

A new report now suggests that most of these leaks come directly from Apple employees, as opposed to contract manufacturers.

The Outline got its hands on a recording of an internal briefing on Apple's fight against leaks. The company is running an internal global security team to fight leaks, and hunt down leakers.

The team is being led by former members of US spy agencies, and reportedly spent three years on investigating, and eventually unmasking, one leaker.

These kinds of internal investigations aren't unheard of in tech. Most of the big tech companies employ internal security teams for this very purpose, and often use a number of tricks to unmask leakers.

However, Apple is unique in that it manufactures large numbers of devices in secrecy in order to be able to sell the next iPhone just days after it is being announced.

In the past, this often led to leaks coming out of the massive factories in China that make Apple's products.

But Apple and its contract manufacturers have reportedly been able to crack down on leaks at manufacturers in recent years.

In 2013, employees at factories assembling the iPhone stole some 19,000 enclosures before the device was even announced, and then sold them on the black market.

In 2014, that number was down to 387. By 2016, Apple only had 4 stolen enclosures.

These enclosures are particularly sensitive for Apple, since they reveal the screen size, ports and other key elements of a device.

However, while leaks overseas have been stopped, there is still plenty of leaking going on at Apple itself.

That why the company is encouraging employees not to talk to anyone, not even their families, about their work. That approach seems to have its limits, as the leaked recording about leaking shows.

on SPH Brightcove

Friday, June 30, 2017 - 09:29

More about

Apple
Others
https://studio.brightcove.com/products/videocloud/media/videos/5488952123001

          A room full of Republicans just addressed climate change, here’s why   

The House Armed Services Committee passed an amendment recognizing climate change as a threat to national security. The amendment tells the defense secretary to take steps to address it.

The post A room full of Republicans just addressed climate change, here’s why appeared first on FederalNewsRadio.com.


          Perhaps the women get the    
A married adult female becomes a one-woman adult female for one of two reasons: extermination or separation. The ex is an solid state, the latter is not.When a female person loses her married man to release the neighbours all call up corpulent and give meals and any support they can make a contribution near admiration to household repairs or improvement or thing that is needed. They are compliant to offer solace and a shoulder to cry on. They are unclaimed for the woman and they embrace her in their activities, response regretful for her that she is now so alone.However, things are fairly disparate when a marital status ends due to adultery or nuptial breakdown. That straight away plunges a adult female into a new accumulation. She is transformed, instantaneously it seems,from a mated female person to a woman. Becoming one of many, division of a agency of used and abandoned women, seen as funny by all those who are motionless undamagingly ensconced in the female internal reproductive organ of their wedding.Post ads:spy cell phone pc free / cheating on your love / my friends boyfriend is cheating on her do i tell her / surveillance 1984 quotes / spy call nokia 6233 / china security surveillance technology buyout / spy call software 6300 / text monitoring for iphone / cheating husband body language / monitoring of phone calls software / spice mobile 6868n / cell phone spy how to detect / funny cheating spouse quotes / e.jean cheating / recording devices on computer / fable 3 cheating on your wife / 007 keylogger spy software reviewsPeople lean to recede from her. Invitations to get togethers stop. It appears that women have a sneaking suspicion that their husbands may possibly be attracted to the notion of an "available woman" and so the women who utilised to be friends move back and leave your job her alone with her bodily process and her fears. There are no meals braced and no offers of assistance. Husbands are kept at territory merely in case, for such as is the representation represented of a woman. The husbands possibly will not be safe and sound. She may perhaps basis the waste of opposite marriages.
          Global cyberattack seems intent on havoc, not extortion   

Security experts say the cyberattack that has locked up computers around the world while demanding a ransom may not be an extortion attempt after all, but an effort to create havoc in Ukraine.

The post Global cyberattack seems intent on havoc, not extortion appeared first on FederalNewsRadio.com.


          Daddy a sweetening begetter is    
The vocabulary explanation for sweetener papa is "a easy unremarkably aged man who supports or spends magnificently on a kept woman or woman."  A a tad more contemporary altered copy could likewise regard "boyfriend" in the account.  But, in footing of the sincere planetary...what scientifically is a sweetening daddy?A sweetening begetter is your middling old man, not necessarily old and worn.  He is more often than not in his mid-40s.  Many modern times he is married, but he may be unconnected or (rarely) a literal bachelor.  A sweetening pater is looking for joy and project.  He may be bored beside his wedding or his partner doesn't afford him the pleasure he of necessity.  He may be birth a mid-life crisis...or trying to skirt one.  Maybe he's bored.  Or friendless.  Maybe he doesn't privation a old-world human relationship because he complex long, problematical hours.  No business the reason, he has designated to chase a sweetening pop similarity to fulfil his needs.  Contrary to popular belief, a man does not have to be well-heeled in decree to be a sugar pa.  A refined sugar male parent can be someone.  Rich or middle-class.  Young or old. Single or married.  Chiseled physique or Jabba the Hut (but in general in concerning).  He's the man you come together at the furniture supply or the bar in your city's commercial enterprise constituency.  He is the fine-looking man on the golf game instruction or the bourgeois.  More than anything, he is a man who enters a connection wise to that he is foretold to present economic assist.  He knows that this is critical in maintaining the empathy.  Post ads:record call n95 / ways tell if he's cheating / hidden recorder android / i have never cheated on my wife / real spy monitor software / how to record phone call at home / he keeps on cheating on me / tennessee bureau investigation records / how to catch a cheater spy equipment / sms forwarding for android / iphone 4 vinyl / voice recording software for phone / bmw car key spy camera / dr. oz 5 signs of cheating / descargar programa para espiar conversaciones celular / best monitor computer graphics / china security & surveillance technology mergerA sugar father is not anticipated to be your unexceeded friend, an accomplished lover, your husband-to-be (though it has been known to occur), a Hollywood adult male.  More likely, he is a workaholic, a touch dysfunctional, a pink-collar white-collar.  When you do insight a sweetening daddy, you can trust him to be a financial advisor, a striking friend, human who pays for your car, teaching or rent, a "regular" guy.
          Are you fain to    
Tiger Woods is by far the optimal linksman in this age group and one day he will be the best possible in the history of golf game. Do not expect for a trice it is due to God specified talent, Tiger has been golfing since the protective age of cardinal.Now much than ever we are superficial for examples to follow and Tiger Woods is as flawless as it gets. So what does Tiger Woods and population tongued have to do with one another?The language unit calibre comes to consciousness when rational of Tiger Woods on the golf game track and the influential general population speakers in the worldwide.Post ads:TACCO - Italian Leather Coin Purse / Tommy Hilfiger Mens Security Passcase / Kate Spade New York Cobble Hill-Lacey Wallet / HOBO Maxine Wallet / Oakley Square Wire Sunglasses MPH Pewter/Grey, One Size / Purple Knit Ruffle Edge Poncho Shawl Cloak Wrap Cape / Tommy Hilfiger Men's Magnetic Money Clip / Eel Skin Basic Checkbook Cover / Bosca Old Leather 6 Hook Keyfree Key Case / Master Hatters of Texas Men's La Mesa Cowboy Hat / Black Floral/Damask Print Thick Fatty Flat Wallet w/ / (71) Red Christmas Baby boy or girl leg warmers by MyWhile observant the Professional Golf Association (PGA) canonical BMW Golf Tournament nearest Chicago end weekend, Tiger was trailing the person in charge on the crucial day of the thing. Anyone that knows thing almost golf knew Tiger would brand name a persuasive energy to win the tournament.
          Add it to your loan    
Lender enforced engulf insurance is an dynamic for umpteen Texas homeowners. When a hole is placed in an section of enhanced stake for flooding, the national policy tells lenders to demand deluge guarantee.When you buy a household next to a security interest it is standardised custom for the loaner to get a "flood certificate" which tells if you are requisite to get snow under amount of money. A determination of difficult jeopardy of overflowing will consequence in your realtor or lender ratting you of the condition for a deluge set of guidelines.FEMA is continuously in work on maps to set areas at stake of flooding. When they alter a map for a consistent area, several homes will be fresh rated as needing deluge amount. (And one homes that were antecedently rated as needing deluge amount of money will be re-rated as not needing it.)Post ads:Babylegs Baby-Girls Infant Ringmaster Leg Warmer / Darice VL3067 Mother of The Groom Embossed Handkerchief / Soft Faux Leather Classic Eyeglass Slip Case - Set of 4 / Tumi Alpha Double Billfold / Zan Headgear Spider Web Neoprene Cold Weather Half Face / Gucci GG 4202/S WPOAE Black Gold Grey Gradient 60mm / New Era New York Jets Weather Advisory Cuffed Knit Beanie / Niebla French Anglobasque Mid-Range Waterproof Wool Beret / Amicale Women's 100% Cashmere Leopard-Print Scarf / Diamond Supply Co O.G Logo Snap Back - Men's / New Guess Leather & Canvas Signature Logo Billfold Slim / Hurley - One & Only Blk Flxfit Boys Hat / DeLux Grey Raccoon Wool Animal Mittens / Zutano Print Cap / Arnette Pilfer Sunglasses - Polarized / Metal Gear FOX HOUND Black Ops Special Force PATCH / Womens Chic Corduroy Style Double Grommet Fashion Belt / Lesportsac Lily Wallet / Anarchy Men's Signal Aviator SunglassesIf your investor requires a inundation logical argument and they breakthrough you don't have one you will get a good-natured reminder about that. It will in all likelihood say that you have so abundant life to get amount or they will buy it for you and add it to your loan. You DO NOT poverty them to buy violent flow amount for you! In many an cases it will be far much pricey when the investor buys it.
          Enhancing Middle School Sports Quarter Back   
Building your muscles and endurance through Weightlifting




No practice regime would be complete without lifting weights. The effects of weight lifting will add muscle to your body and increase strength, this straighten will add to your maximum power. Maximum power is different from strength because it is the power that you exert on the field during a play. It is the quickness and exertion that will enable a football player to accomplish their plays with skill on the field. Weight lifting can cause injuries, and as such we highly recommend having a professional coach on hand during weightlifting sessions. You trainer will also help you accomplish your weightlifting goals and teach you new techniques.




Some fundamentals of ball security




A team that prevents fumbles is a team that wins. Football teams have lost many games because a couple of players were lax in there ball carrying and fumbled the football. A great way to teach tight ball security is with four points. The first point is the claw, meaning that your fingers are wrapped over the tip of the football. The second point is making sure that your forearm is wrapped tightly on the outer rim of the football. The third point is securing the other point of the football with your bicep making sure that it is right up against it. Last point is to hold the back of the football right up against the ribcage and as you run keep it high and tight. As a player, you will want to make sure that you are well practiced in this skill, and as a coach you should dedicate some time to ball carrying skills. As your ball carrying continues to improve you will insure less turnovers and greater success on the field.




How to overpower on the line of scrimmage




In various plays whether you are on offense or defense you will want to have a strategic advantage over your opponents. Use the proven technique of double teaming to get great results on the field!It is basically putting two linemen on one. If you ever need to get a running back through or perform a great blitz, remember this technique. To execute this properly have both linemen step together at the same time and lock their hips together. They form a wall that the opponent cannot break. Hit the shoulders hard and pin the opponent down as you drive them back. Work it fast and work it hard!




The High Toss Football Catch




As a receiver, or any player that is going to catch a pass, you know that not all passes are going to go right to the chest. Here are some simple steps when making a high catch: When you go to make the high catch extend your arms, but keep your hands close together with your hands coming together in a diamond formation. When you try to catch the ball with your body there is a greater chance that it is going to bounce off and cause an incomplete pass. Important Tip: never, ever, under any circumstances, for any reason, take your eyes off the ball; even after you have caught it watch the ball until you know that it is safely in your grips.


Are you looking for some great football gear. Miami Hurricanes online store is the official carrier of Miami Hurricanes clothing and apparel. Find official Miami Hurricanes jersey, shirts, hats, and more. Shop now!

smith machine: buy smith machine

smith machine: smith machine

Article Source: www.articlesnatch.com


          Urgent Security Alert: Phishing Scam Requesting Login Credentials   

A new email is circulating that’s requesting a “validation” of your login credentials to “add new security measures.” It’s designed to look like a valid email from your tax and accounting software provider, and contains language about valid security updates implemented over the last year. This phishing email is another example of bad actors using [...]

The post Urgent Security Alert: Phishing Scam Requesting Login Credentials appeared first on Thomson Reuters Tax & Accounting.


          Comment on Yoruba Leaders Took Bribes To Cover Abiola’s Killers – Al-Mustapha by We Didn't Take Bribes, Al-Mustapha Is A Liar - Opadokun   
[…] Former Secretary of the defunct National Democratic Coalition (NADECO) Ayo Opadokun, has described the ex-Chief Security Officer to Gen. Sani Abacha, Al-Mustapha Hamza, as a pathological liar for alleging that he, alongside some Yoruba leaders, took a bribe from the killers of MKO Abiola. […]
          Comment on Joint Northern Groups Give Igbos 3 Months To Leave Northern Nigeria by Security Operatives On Top Of Northern Youths Threat - Lai Mohammed   
[…] Tuesday, it was reported that a coalition of Northern group gave the Igbos living and doing business in the North three months ultimatum to vacate the region […]
          IT Security Officer Job at Stanbic IBTC Bank   

Stanbic IBTC Bank is a leading African banking group focused on emerging markets globally. It has been a mainstay of South Africa’s financial system for [...]

The post IT Security Officer Job at Stanbic IBTC Bank appeared first on Jobzilla Nigeria .


          Action Against Hunger recruitment for Graduate Community Mobilization Assistants   

Action Against Hunger works to save lives by combating hunger and diseases that threaten the lives of vulnerable communities, through nutrition, food security, water and [...]

The post Action Against Hunger recruitment for Graduate Community Mobilization Assistants appeared first on Jobzilla Nigeria .


          Honoring the 'Accomplices' to Truth Who Caught Clapper in a Lie   
The tide is turning. Yesterday's traitor is today's hero, and the brave journalists who helped Edward Snowden get the word out are at last being honored for their public service. Or so one hopes. On Sunday it was announced that the prestigious George Polk Award for National Security Reporting would be given to the four...
          Enabling a more strategic role for IT with Microsoft Enterprise Mobility + Security   

The post Enabling a more strategic role for IT with Microsoft Enterprise Mobility + Security appeared first on News Center.


          The Guard v1.6.1 – Security Company WordPress Theme   
The Guard is a WordPress Theme for security companies, private investigators, bodyguards, alarm and protection services companies, guardians and security systems companies.

Demo: https://themeforest.net/item/the-guard-security-cctv-and-bodyguard-services-company-wordpress-theme/16449726
          TeleBots are back: Supply-chain attacks against Ukraine   

This blogpost reveals many details about the Diskcoder.C (aka ExPetr or NotPetya) outbreak and related information about previously unpublished attacks.

The post TeleBots are back: Supply-chain attacks against Ukraine appeared first on WeLiveSecurity


          Workplace social media security: 5 questions answered   

Workplace social media security is undoubtedly important for many businesses. In this feature, we answer five key questions relating to it.

The post Workplace social media security: 5 questions answered appeared first on WeLiveSecurity


          How to make a strong password   

Passwords are often the first line of defense in protecting our personal and financial information, so it pays to have a strong, long and complex password (and easy to remember). Our one minute guide shows you how.

The post How to make a strong password appeared first on WeLiveSecurity


          Homeland Security officer charged with kicking handcuffed man in the head   

A sworn officer with the Department of Homeland Security has been charged with kicking a handcuffed man in the head outside a federal building in Pomona.

Jason Rouswell, 46, was indicted Thursday and accused of violating the civil rights of the handcuffed man during the Oct. 20, 2016, incident,...


          I Want Your Feedback on the #NISOPRIVACY Principles   
  This week NISO published the NISO Consensus Principles on Users’ Digital Privacy in Library, Publisher, and Software-Provider Systems (PDF). As you may remember I am serving on this committee, which we had originally hoped would wrap up in July, but is still going strong. Privacy is nuanced and opinions vary widely. Combine that with the frequent conflation of privacy and security and […]

          India warns China over border road ‘security’ threat   
The two sides are trading increasingly stern diplomatic warnings over the new hotspot, a remote scrap of territory where the frontiers of China, India and Bhutan meet.
          Surf Anonymous Free 2.5.9.8   
Free surf anonymously to protect your online security and privacy via hiding IP
          Information Security Engineer   
Expedite Technology Solutions Atlanta, GA
          IT Product Manager with MES exp. (Welland, Ontario) - General Electric - Ontario   
Demonstrates knowledge on technical topics, such as caching, APIs, data transfer, scalability, and security....
From GE Careers - Sat, 03 Jun 2017 10:24:45 GMT - View all Ontario jobs
          McAfee Mobile Security 1 Device 1 Year Product Key At Just Rs.55 (MRP-Rs.199)   

IMPORTANT INFORMATION- Go to McAfee website and register your e-mail ID and then enter the product key found after scratching, and get yourself registered. Download the apk through the website page itself and install. Now open the app and you are subscribed to 1-year membership. Now go to play store and update the application. Note: […]

The post McAfee Mobile Security 1 Device 1 Year Product Key At Just Rs.55 (MRP-Rs.199) appeared first on Tricks By Kabir.


          Zones CustomerConnect Conference Examines Software and Its Role in the Digital Enterprise   

Customer Event Focuses on Software Enabling Security, Mobility, Cloud Computing, and the Internet of Things

(PRWeb October 14, 2015)

Read the full story at http://www.prweb.com/releases/2015/10/prweb13020062.htm


          Zones Teams with Samsung to Offer Secure Mobile Solutions via the KNOX Security Platform   

Zones and Samsung Provide Secure Solutions for the Mobile Enterprise Workforce

(PRWeb February 10, 2015)

Read the full story at http://www.prweb.com/releases/2015/02/prweb12501644.htm


          Comment on Are There Any Disadvantages Associated With Paying off a Mortgage Early? by Darrin Roseborsky   
This is an insightful post that every person who is planning for a mortgage or has already taken it should read. Though paying off a mortgage early is good for some to give a feeling of satisfaction and security but at the same time taking smart decisions as per your situations such as financial conditions, your age, your existing debts etc so taking a decision as per the prevailing situation is of utmost importance.
          U.S. warns businesses of hacking campaign against nuclear, energy firms   
TORONTO (Reuters) - The U.S. Department of Homeland Security and Federal Bureau of Investigation this week privately warned American businesses about a hacking campaign targeting the nuclear, energy and manufacturing sectors, according to a report by the agencies.

          White House: Trump to meet Putin at G-20 summit   

President Donald Trump will convene a high-stakes meeting with Russian President Vladimir Putin at the summit of industrial and emerging-market nations in Germany next week, the White House said Thursday, amid swirling allegations about Moscow's role in the 2016 elections.

National security adviser...


          Industrial Control Systems Security Market by Solution (Firewall, Antivirus/Anti–Malware, Identity and Access Management, Security Information & Event Management, DDOS, UTM), Service, Security Type, Vertical, and Region - Global Forecast to 2022..., Market Research Report: MarketsandMarkets   
The Industrial Control Systems (ICS) security market is expected to grow from USD 10.24 Billion in 2017 to USD 13.88 Billion by 2022, at a Compound Annual Growth Rate (CAGR) of 6.3%. The major vendors in the ICS security market include ABB Ltd. (Zurich, Switzerland), AO Kaspersky Lab (Moscow, Russia), BAE Systems, Inc. (Farnborough, UK), Bayshore Networks (Maryland, US), Belden Inc. (Missouri, US), Carbon Black, Inc. (Massachusetts, US), Check Point Software Technologies Ltd. (Tel Aviv, Israel), Cisco Systems, Inc. (California, US), Claroty (New York, US), CyberArk Software Ltd (Massachusetts, US), FirEye, Inc. (California, US), Fortinet, Inc. (California, US), General Electric Company (Massachusetts, US), Honeywell International Inc. (New Jersey,US), IBM Corporation (New York, US), Indegy (New York City, US), McAfee LLC (California, US), Nozomi Networks (California, US), Raytheon Company (Massachusetts, US), Rockwell Automation, Inc. (Wisconsin, US), Schneider Electrics (Rueil-Malmaison, France), SecurityMatters (Virginia, US), Siemens AG (Munich, Germany), Symantec Corporation (California, US), and Trend Micro (Tokyo, Japan)....
          Oregon Republican group to have right-wing ‘government resistance’ militia run their security: report   
The Republican Party of Multnomah County, Oregon has elected to allow local right-wing militias to run security for them at events, as per the Portland Mercury newspaper. According to documents leaked to the Mercury, the Multnomah County Republicans voted Monday to allow the Oregon Three Percenters ...
          Computer problems disrupting Hawaii driver licenses fixed   

Honolulu Mayor Kirk Caldwell said in a statement Thursday workers found a problem that interfered with the computer system's security software. The software worked once the problem was fixed.


          Russia threatens retaliation if Pentagon bans controversial Kaspersky Lab cybersecurity software   
Communications Minister Nikolay Nikiforov served notice on Friday that the Russian government would retaliate against U.S. companies if Congress bans the Pentagon from using controversial cyber-security software from Kaspersky Lab. In an interview with Bloomberg, Nikiforov said that any “unilateral ...
          Beware of Trump steel tariffs’ ‘slippery slope,’ ex-Commerce secretary says   
Trump has "absolute authority" to cite national security concerns in order to impose tariffs on steel imports, Carlos Gutierrez told CNBC.
          Safety & Security Team - Clevelander - The Clevelander Hotel - Miami Beach, FL   
DESCRIPTION Delivers an enthusiastic, professional greeting to guests upon arrival and departure Ensures area around entrances is clean, safe and secure $12 - $14 an hour
From The Clevelander Hotel - Wed, 10 May 2017 23:27:12 GMT - View all Miami Beach, FL jobs
          Digital Marketing News: Content Is Still King, Purchases from Email, B2B Tech Influencer Marketing   

Here Are 7 Reasons Why Content is Still King in 2017 [Infographic]
The way content marketing draws attention and helps build genuine relationships with the audience is what sets it apart from other marketing tactics. Smart marketers are using content marketing to approach their target audience in a more subtle way to ensure the customer needs are met while building brand credibility and trust. (Social Media Today)

What Influences Consumers to Purchase From Marketing Emails?
A recent survey conducted of 1,004 consumers who have received marketing emails in the past year reports how the different generations are influenced in their purchase decisions. Consumers are most influenced to make purchases from marketing emails by sales/discounts and brand reputation. (MarketingProfs)

The Rise of Influencer Marketing in B2B Technology
B2B marketing has definitely shifted with new challenges when it comes to influencer marketing in enterprise technology. To better understand these shifts and get actionable solutions, 10 industry experts have weighed in about implementing and scaling influencer marketing. (TraackrClick here for the Influence 2.0 study from today's video!

See How You Stack Up With Inline Competitive Metrics
Six new metrics are available at the campaign, ad group and keyword levels in the main UI and Reports tab in Bing Ads. You can also access these reports via the Bing Ads API. Advertisers can now see how their campaigns, Ad groups and keywords stack up against the competition. (Bing Ads Blog)

Google to Stop Using Information in Gmail to Target Personalized Ads
Google announced that the enterprise version of Gmail and the consumer version will more closely align later this year. Both enterprise and consumer versions of Gmail will not be used to target personalized ads. The ads shown will be based on a user’s settings, including the option to disable personalized ads altogether. (Search Engine Journal)

New Ways to Protect Your Pinterest Account
Pinterest is rolling out a two-factor authentication to everyone in the next few weeks to add security by requiring a verification code every time you log in. You can receive the code via text message, or for added security, download Twilio’s Authy app. If the two-factor authentication is enabled, it works across your entire account on all devices. (Pinterest Blog)

Adobe Is Launching AI-Powered Voice Analytics
Adobe is adding voice analytics to the Adobe Analytics Cloud which will help people better understand how media is consumed via voice-enabled devices. You can track voice usage by intent and add specific parameters and a brand can measure top-of-funnel metrics, as well as trends and patterns at scale over time. (AdWeek)

Messenger Just Added More Fun to Your Video Chats
Facebook Messenger has added new features to video chats. You can now use animated reactions, filters, masks and effects. You can also take pictures of your one-on-one and group video chats and share them with your friends. (Facebook Newsroom)

What were your top digital marketing news stories this week?

We'll be back next week with more top digital marketing news. For more news and expert insights, follow @toprank on Twitter!

The post Digital Marketing News: Content Is Still King, Purchases from Email, B2B Tech Influencer Marketing appeared first on Online Marketing Blog - TopRank®.


          Exchange Server is Unavailable Error in Outlook 2013, 2010, 07 – Fixed   

Outlook is a well-known personal information manager that provides its users with many features and added security. Through this, one can send and receive emails, create contacts, tasks, journal, notes, etc. It is easy-to-use and creates a profile based on IMAP and POP protocols. Some of the Outlook’s own mailboxes are created in Exchange server. […]

The post Exchange Server is Unavailable Error in Outlook 2013, 2010, 07 – Fixed appeared first on TechJaws - Technology Blog.


          Microsoft Tackles Ransomware with Controlled Folder Access   

In the wake of global malicious attacks such as WannaCry and NotPetya, Microsoft this week announced a new feature meant to keep users’ data safe from ransomware and other type of malware.
read more


          Majority of Sites Fail Mozilla’s Comprehensive Security Review   

A thorough review of the top 1 million websites reveals 93 percent fail Mozilla’s Observatory security review.


          Free EternalBlue Vulnerability Scanner Released   

A free tool that can scan networks to discover computers that are vulnerable to the NSA-linked EternalBlue exploit is now available.
read more


          Unpatched Flaws in Schneider Electric U.motion Builder Disclosed   

The details of several vulnerabilities affecting Schneider Electric’s U.motion Builder software have been disclosed before the vendor released any patches.
read more


          8tracks Prompts Password Reset After Hack   

Internet radio service 8tracks this week informed users of a database hack, prompting them to reset their passwords to prevent account compromise.
read more


          UK Snoopers' Charter to be Challenged in High Court   

Human rights group Liberty was today granted permission by the UK High Court to challenge part of the UK government's mass surveillance Investigatory Powers Act (IPA). The IPA, nicknamed the Snoopers' Charter, became UK law in November 2016 and came into force at the end of December.
read more


          Industry Reactions to Destructive NotPetya Attacks: Feedback Friday   

A wiper malware disguised as ransomware wreaked havoc this week, infecting the systems of numerous organizations across more than 60 countries.
read more


          Environmental Pollution: Experts Talk Food Insecurity In the Niger Delta   

… Demilitarization, Aquatic Culture Can Restore Productivity  … Says Emphasis Must Be On Remediation, Not Clean-up  – Senator Ogola By Chinelo Chikelu Environmental experts and stakeholders say demilitarization of the Niger Delta, cultivation and investment in aquatic culture and an emphasis on remediation rather than clean-up of Ogoni will check food insecurity in the region. […]

The post Environmental Pollution: Experts Talk Food Insecurity In the Niger Delta appeared first on leadership.ng.


          Security Summit: IGP Receives Communique, Directs Circulation To Relevant Agencies   

By Ejike Ejike, Abuja ‎The Inspector General of Police, Ibrahim Idris has received the communique issued at the end of the 2017 National Economic Summit and directed that it should be circulated to the relevant ministries and agencies for study and implementation. Receiving the report, the IGP reinstated the force’s commitment to ensuring the safety of […]

The post Security Summit: IGP Receives Communique, Directs Circulation To Relevant Agencies appeared first on leadership.ng.


          Spencer Stuart, Nasdaq and Boardroom Resources Launch Next Gen Board Leaders   

Major investors are demanding that more younger people be named to boards of directors in an effort to take advantage of their digital knowhow and the perspective they can bring to emerging areas of board oversight, including e-commerce, digital marketing and cybersecurity. To help equip these younger, often first-time directors to be effective in the

The post Spencer Stuart, Nasdaq and Boardroom Resources Launch Next Gen Board Leaders appeared first on Hunt Scanlon Media.


          Teléfono SPC Basic IP Phone 3 Cuantas SIP Con POE   





El nuevo teléfono SIP Yealink SIP-T23G es un teléfono IP de media gama pero con prestaciones de alta gama. Fabricado en materiales de alta calidad, pantalla extra grande LCD gráfica 132 x 64 píxeles con 5 líneas claras, que ofrece una experiencia de usuario más sencilla y agradable, dejando la información más clara en un vistazo. El T23P soporta 3 cuenta SIP y opciones de instalación simple, flexible y seguro, además de soportar los estándares IPv6, Open VPN, también funciona con SRTP / HTTPS / TLS, 802.1x. El nuevo Yealink SIP-T23G se caracteriza por su interfaz de usuario intuitiva y unas funcionalidades mejoradas para que sea fácil para que el usuario y para maximizar la productividad. El modelo 23G viene con 2 puertos Ethernet Gigabit. La tecnología HD de Yealink permite sonidos y comunicaciones de voz completamente reales. Es una solución IP muy rentable, que ayuda a los usuarios a optimizar los procesos de comunicaciones con seguridad en entornos de pequeñas y medianas empresas Interoperabilidad con líderes en el mercado PBX IP: Alcatel - Aastra - Avaya - 3CX - Asterisk - Sipleo Voz de alta definición. 2 puertos de red 10/100/1000Mbps. PoE integrado. Pantalla 132x64 p. 3 cuentas SIP. Full dúplex. Agenda hasta 1000entradas. 1 puerto RJ 9 para casco. 5 teclas funciones. Soporta Llamada en espera, desvío, transferencia, rechazo de llamada. Con Voicemail, marcaciones rápidas, Flash, ajuste de Volumen, selección de timbre. Multi idioma, con soporte para castellano. Conferencia a 3. Agenda: 1000 registros. Funciones de intercomunicador. Bloqueo del terminal para protección de la privacidad personal. Modos de configuración para Administrador y usuario. Permite montaje mural. Otras carácteristicas técnicas: Chipset TI TITAN y procesador de voz Texas Instruments Protocolo SIP: 2.0(RFC3261) protocol, NAT transversal: modo STUN Acceso a configuración por HTTP y/o HTTPS Soporta SRTP/TLS/HTTPS, encriptación AES Comunicaciones seguras activando SRTP (RFC3711) en la configuración Soporte de Transport Layer Security (TLS) Soporte en la configuración de VLAN (802.1 pq), QoS Gestión de la autentificación usando MD5/MD5-sess Configuración segura via cifrado AESMarcación In-band DTMF y out-of band RFC2833 DTMF Modo Proxy y modo SIP peer-to-peer Codecs HD: G722 Codecs VoIP estándar: G.711, G.723.1, G.726, G.729AB

Precio: 63,99 € (Iva incluído)




          PC Network Support Technician 3 Fairmont, WV - STS International, Inc. - Fairmont, WV   
Science, or similar technical-related field with 3. Experience with technical security implementation. Produce system data and observations for engineering as....
From STS International, Inc. - Sat, 20 May 2017 17:41:21 GMT - View all Fairmont, WV jobs
          Fee, Levy and Security Regulation, BC Reg 8/2014 [Modifiée le 27 juin 2017]   
Fee, Levy and Security Regulation a été modifié ou est entrée en vigueur le 2017-06-27
          Index Funds?   
What are index funds and should you invest in them?

A few years back, a reader wrote that I should look into index funds.  And I did and bought some shares in a couple of them.  What are index funds?  They are just mutual funds - that follow some stock index.   There are a plethora of mutual funds out there, investing in everything from stocks to bonds, to government bonds, to whatever.   And each fund usually has some sort of goal or strategy.  Small Cap, Large Cap, foreign bonds, US bonds, Municipal Bonds, tech stocks, energy stocks, income stocks, or whatever.

And each fund has a fund manager or managers who manage the fund and decide what to invest in.  And for the most part, you have no idea on what they are investing in, on a day-to-day basis.   You can sort of get an idea from the prospectus and annual report, but you don't know what they are buying and selling in real-time.   You are leaving it to an expert to make sound decisions, and he generally gets paid more for making better decisions, so his interests are aligned with yours.

Compare this to hedge funds, where the managers get paid a percentage of the fund balance regardless of whether they make money or not.   You can understand why people are fleeing hedge funds these days - the overhead is high and the returns in recent years are not as attractive.

Mutual funds may have front-end loads or back-end loads or they may be no-load.   For a typical "load" fund may have to pay a fee upfront (deducted from your investment) when you invest, and often this fee goes in part to the salesman who sold you the fund.  Yes, that friendly "investment advisor" isn't working for oxygen, he needs food on his table.  And that is why, when you, as a young person, go to a "storefront" investment advisor (and you know exactly which one I am talking about - coming to a strip mall near you!) they really aren't interested in talking to you unless you have at least $10,000 to invest - so they can make $500 "advising" you which mutual funds to invest in.   If you are just starting out in investing, well, go fuck yourself.   Come back when you got some real money, kid!  (Or at least that was my experience when I was in my 20's).

Some funds have fees (back end loads) you have to pay when you sell shares in the fund.  The idea here is to encourage you to invest for the long haul, rather than trade. So they penalize you when you decide to sell.   And some funds are "no load" which seems to defy gravity.  How does a mutual fund company make money if they are not charging a fee?  Volume?  No, they have something called an expense ratio that they charge to the fund every year.  You don't see this as a line-item on your statement, but it is buried in the annual report somewhere if you look for it.  And no, the friendly storefront investment advisor doesn't mention it unless you ask, and even then....

And let me just say right here that I was invested in mutual funds for well over a decade before I understood any of this.   And yes, I had investment "advisors" tell me I was investing in a "no load" fund which turned out to have a 5% front-end load, of which the advisor got half.   When rolling over a 401(k) or IRA, be particularly aware of this.   You might, after a few years of hard work, accumulate $100,000 or more in your 401(k).   Your friendly "investment advisor" will suggest you roll this over when you leave the company.   And if you are not careful, he may skim 5% off the top when you move the funds to his company - as a State Farm rep once tried to do with me.

It seems that no matter what investment house you use, the want you to "roll over" your investments to their little playpen, and usually there is a reason for this - a monetary reason.   Caveat Emptor.

But there are "no load" funds out there, and these funds make their money for their managers through the expense ratio fees.  And some funds charge a lot, and some charge a little.  Vanguard has a lot of low expense ratio funds.  And of these, index funds usually have the lowest expense ratios.  Why?  Well an index fund, as the name implies, invests in a "market basket" of stocks that correspond to some market index, such as the Dow Jones Industrial Average (DJIA), the S&P 500, the NASDAQ Composite, or the like.

What are these indexes?  Well, that is the funny thing.  When people say "the stock market went up" or "the stock market went down" they are not talking about the entire market but an index instead.  The DJIA, for example, tries to measure the health of the market using a collection ("market basket") of stocks, usually "blue chip" type stocks.  And who is on this list of stocks and who is not, changes over time.  So in essence, the Dow, Jones people are "managing" your fund by determining what stocks are in the DJIA.   Your management company merely buys these stocks, takes a small, small cut as the expense ratio (like 0.15%) and then pays you the rest.

The advantages touted by such funds are many.   These indexes seem to go up over time far more than many "managed" investments.   People say if you just followed "The Dow" you'd make out better than most prognosticators, over time.   And since the expense ratios are tiny, you don't waste a lot of money on overhead costs.   For the mutual fund company, the costs are low, as a computer can basically trade the stocks automatically, as each person buys into the fund or sells out.

For example, Vanguard Total Stock Market Index Fund, states its goals as follows:
The Fund seeks to track the performance of a benchmark index that measures the investment return of the overall stock market. The Fund employs a "passive management" approach designed to track the performance of the CRSP US Total Market Index.
So in this case, the "index" is the "US Total Market Index" as determined by the Center for Research in Security Prices (CRSP).   This is an index that actually tries to track the overall market.   How does the fund perform?  What are they invested in ?   Well our friends at Morningstar (who I thought made breakfast sausages, but I was mistaken) have some data on this:

Performance  VTSMX More...


YTD 1 Mo 1 Yr
3 Yr  * 5 Yr  * 10 Yr  *

Growth of 10,000 10,970 10,142 12,299
13,026
20,251
20,256
Fund 9.70 1.42 22.99
9.21
15.16
7.31
+/- S&P 500 TR USD -0.42 0.22 0.59
-0.65
-0.20
0.07
+/- Category 0.40 0.21 1.36
1.41
1.11
1.05
% Rank in Cat 44 32 35
27
26
16
# of Funds in Cat 1,431 1,495 1,358
1,197
1,056
788
* Annualized returns.
Data as of 06/28/2017. Currency is displayed in USD.

Top Holdings  VTSMX More...


 
Weight % Last Price Day Chg % 52-Week Range


Apple Inc 3.00 144.57 -0.88
93.63 - 156.65

Microsoft Corp 2.02 68.98 -1.15
49.80 - 72.89

Amazon.com Inc 1.59 981.77 -0.84
710.10 - 1017.00

Facebook Inc A 1.41 151.34 -1.23
112.97 - 156.50

Johnson & Johnson 1.38 133.13 -0.50
109.32 - 137.00

% Assets in Top 5 Holdings 9.40

What is a little scary to me about index funds is that these indexes tend to include popular and trendy stocks.   I would not buy Facebook stock on a dare, but since I am invested in mutual funds, I end up owning some of it, although only 1.41% of the overall fund.

Should you invest in an index fund?  Sure, why not.  But not as the only thing you invest in.  Odds are, at your place of work, if you have a 401(k), one of the choices of funds to invest in, is an index fund.   I would not put all my eggs into one fund basket, though, as indexes do go down over time.

Which are the best funds?   Well, it depends on who you ask, and when.  "Investorplace" has a list of the 7 best funds, but they also have a list of 10.  Kiplinger has a list of "only five" funds you need to know about.   Even Motley Fool has a list.   Odds are, your investment house has some of their own funds.  Fidelity and Vanguard have them, I am sure Merrill does as well.  The real decision to make is which index to use and who has the lowest expense ratios.   It goes without saying that paying a "load" on an index fund is sort of pointless.   It is not like they are advising you or trading your shares.

The advantages are many.  It sort of puts your investments on auto-pilot.   The market goes up, you make money.  It goes down, you lose with everyone else (unless your particular index outperforms the overall market).  You don't have to worry about traders churning your account down to zero by making crappy trades.  It is a pretty brainless form of investing.

But for the most part, it is a risk-taking venture, and unless your index fund is indexed on a government bond index or something, you can lose money.   So putting all your eggs into the index-fund basket is, in my opinion, a bad idea.

          NGFW Competition   
I have not seen the 2017 Gartner NGFW report, and not even sure if its out yet.  But I know that my thoughts on the best NGFW firewall lines up with what Gartner appears to think.  Personally, I base my opinion on my experiences and my own knowledge of firewalls.  I've spent a long time working with firewalls, and Palo Alto and Check Point are the best on the market (IMHO).
One more thought about security.  Please don't expect that your company is secure because you bought a firewall at a great price.  Threat protection, Anti-Virus, Anti-Malware, etc.  These come at a price.  Don't think your company is secure because you have an ASA (without FirePower) or a cheap firewall.  If you are on the security team or the Director/Manager, security should always be in the forefront of your mind.   Think about the companies you hear about in the news.  You may not make the news, but you may have a "resume generating event" if you have not properly prepared your company in the security world.
From 2016:


          Even Restaurants Need Security   
Even restaurants need security.
http://money.cnn.com/2017/05/28/technology/chipotle-credit-card-hack/
Contact me for the security discussion you need.
          Company Offerings Growth   
As I get the company (www.whiterhinosecurity.com) offerings tuned, my plan is to add services as I go along. Today, I've added intrusion protection to the mix of services. I will manage your current IPS, or I'll provide an IPS for your company for a monthly service. I'm excited about growing our offerings to my customers.
          Every Company Needs Security   
www.whiterhinosecurity.com
Every company needs security. See the latest news article I've come across.
http://deadline.com/2017/05/pirates-of-the-caribbean-dead-men-tell-no-tales-hackers-ransom-1202094203/
          Ransomeware Warnings   
If you are paying attention to what's going on in cybersecurity, it's time to get serious about your company security. Contact me and let's work on it. www.whiterhinosecurity.com
          Cisco CUCM 11   
I'm doing an install of CUCM version 11.  Its good to see the voice stuff again, although not what White Rhino Security is about.  Thats ok.  It helps me and the customer.  But more importantly, the customer.  Its good to meet good people and work with them, something I absolutely love about the consulting arena.
          Some White Rhino Thoughts   
I'm offering something different to the White Rhino offerings, just as an FYI.  I'm trying to make sure I'm offering things that are a value add to customers.  Things that benefit you (the customer) as opposed to just benefiting me (your consultant).  If you need onsite support, I can do that.  If you need someone to come out for a week, do security assessments, remediation, network assessments, network work, even voice work, I can do that.  And here is the real differentiator:  I'll mentor your team.  Contact me, lets discuss it further.
          Security And Network Consultant   
If you are thinking about hiring a security or network consultant, contact me. I think I have some interesting conversation that is a win for you and your company.  Use the "Contact Shane Killen" on the right side of this page.
          Slow...   
I know the blog has been a little slow lately. I'm in process of studying for a series of certifications. Sometimes, as times change, so does the need for different certs. I'll post more when I can. In the meantime, if you have any recommendations for my company site (www.whiterhinosecurity.com), I'd be glad to hear your ideas. I'm good at networks and security, but not so much on website building.
          Your Personal Info That You Have At The Company   
I've been posting on Linkedin things to consider when it comes to security. If you have an accounting department, you need a security vulnerability assessment done and mitigation to completion to keep your company information safe. There are a lot of IT staff that believe they just don't need an assessment done. My question to you: "When you hired in to the company, did you give them your social security number?" Did you give them any other information you don't want a hacker/criminal to have? If you did (and you did to be employed there), you want that data protected. This should be the minimum question to ask yourself for you to realize you need an assessment and mitigation done. You wouldn't just hand over your drivers license or birth certificate over to someone you didn't know, would you? Well, you did at least one of those things when you hired in to the company. And I'm sure you want the company to be responsible with your data. Visit my company web site at www.whiterhinosecurity.com and reach out to me there or from this blog.
~~ Shane
          Orlando International Airport TSA Agent Caught Stealing Cash From Woman’s Luggage   
As if airport security wasn’t stressful enough, an airline passenger in Florida has had to confront a TSA officer who tried to steal money from her luggage.
          Petition for Safer BART   

Petition for Safer BART: https://www.change.org/p/bart

Note: Your support is needed for the success of this petition. You may or may not like everything in the petition. Please sign and share if you like most of it. Thank you.

Forums: 

          Customer Representative - Carleton Place, Ottawa, ON - Scotiabank - Ottawa, ON   
Adhering to cash, custody and security procedures and policies at all times; Complying with regulatory requirements as part of the service process, including...
From Scotiabank - Thu, 29 Jun 2017 18:49:28 GMT - View all Ottawa, ON jobs
          RN (registered nurse) - CareGivers - Bonavista, NL   
Participate in community needs assessment and program development Security and Safety. College/CEGEP Credentials (certificates, licences, memberships, courses,... $30 - $34 an hour
From Canadian Job Bank - Tue, 20 Jun 2017 02:19:59 GMT - View all Bonavista, NL jobs
          AMD introduces Ryzen PRO processors   
This morning AMD is introducing their Ryzen PRO processors for business and commercial desktop PCs. The new lineup of CPUs includes the Ryzen 3 PRO, Ryzen 5 PRO and Ryzen 7 PRO families with four, six, or eight cores running at various frequencies. A superset to the standard Ryzen chips, the PRO chips have the same feature set as other Ryzen devices, but also offer enhanced security, 24 months availability, a longer warranty and promise to feature better chip quality. I guess it makes sense from a marketing perspective, but I'm not a fan of segmentation like this - it just makes an already complicated market even more complicated.
          Comment on Customer Testimonials by Bob   
Thanks Ron you saved my computers life. Looks like my security is sorted out too. Thanks again
          Alex Rodriguez: I Get Mistaken For Jennifer Lopez's Security Guard   
none
          US demands more security on international flights to US   
WASHINGTON (AP) -- The Homeland Security Department is demanding that airlines around the world step up security measures for international flights bound for the United States or face the possibility of a total electronics ban for planes....
          €4 million EU funding for proposed electricity link between France and Ireland   
A project to build an interconnector linking for the first time the French and Irish electricity systems will today be awarded a €4 million grant from the European Commission. The Celtic Interconnector will make it possible for energy to be traded more freely between EU countries, enhancing Ireland’s security of energy supply and allowing the … Continue reading €4 million EU funding for proposed electricity link between France and Ireland
          US blacklists China bank, revving up pressure over North Korea   
WASHINGTON — The United States has blacklisted a small Chinese bank accused of illicit dealings with North Korea, escalating the pressure on Beijing to rein in its wayward ally amid increased signs of frustration among President Donald Trump and his top advisers with China's diplomatic efforts.

The Treasury Department on Thursday declared the Bank of Dandong a "primary money-laundering concern," proposing to sever it entirely from the U.S. financial system, pending a 60-day review period. Although Trump's treasury secretary said the move didn't target China, it comes a week after the president lamented that China's promise to help with North Korea "has not worked out."

Calls to Bank of Dandong rang unanswered on Friday. Beijing, however, criticized Washington's action, saying that unilateral sanctions outside the U.N. Security Council were inappropriate.

"We also firmly oppose any individual country to exercise long-arm jurisdiction under its own domestic law," said Lu Kang, spokesman for China's foreign ministry.

Lu added that Beijing will investigate possible wrongdoings by Chinese individuals and entities under Chinese laws.

Trump had been leaning on President Xi Jinping to help stop the North's development of nuclear weapons before they can threaten the U.S. homeland. A main focus of the coordination has been getting China to fully enforce international sanctions intended to starve North Korea of revenue for its nuclear and missile programs.

The U.S. action is likely to anger China, which handles about 90 percent of North Korea's external trade, and whose banks and companies are said to provide Pyongyang access to the U.S.-dominated international financial system.

The sanctions bar Americans from doing business with Bank of Dandong, which is based in a northeastern Chinese city on the North Korean border that serves as a gateway for trade with the isolated nation. The U.S. also slapped sanctions Thursday on a Chinese shipping company and two Chinese people that it said have facilitated illegal activities by North Korea.

Treasury Secretary Steve Mnuchin said the U.S. still wants to work with Beijing on combating the North Korean threat.

"We are in no way targeting China with these actions," Mnuchin told a White House news briefing.

The punitive steps were presaged by a tweet from Trump last week reflecting dissatisfaction with Beijing's efforts.

"While I greatly appreciate the efforts of President Xi & China to help with North Korea, it has not worked out. At least I know China tried!" Trump tweeted on June 20.

The Trump administration may be struggling to maintain international pressure on Pyongyang.

The president was to meet for the first time Thursday with South Korea's new leader, President Moon Jae-in, who has long advocated outreach to North Korea. His predecessor had staunchly backed Trump's harder line.

Mnuchin said the Bank of Dandong has facilitated millions of dollars of transactions for companies involved in North Korea's weapons of mass destruction and ballistic missile programs.

Anthony Ruggiero, a sanctions expert and former Treasury Department official, described it as a small Chinese bank "sitting at the heart" of trade between North Korea and China.

"This is a strong message to Chinese leaders that the Trump administration will act against North Korea's sanctions evasion in China," he said.

The other targeted Chinese entities are:

—Dalian Global Unity Shipping Co., which Treasury accused of transporting 700,000 tons of freight annually, including coal and steel products, between China and North Korea. It cited a U.N. expert panel as saying the company has violated a ban on trade in luxury goods with the North.

—Chinese national Sun Wei, said to have been running a cover company for North Korea's Foreign Trade Bank, which is already subject to U.S. sanctions.

—Chinese national Li Hong Ri, said to have established several front companies that end up benefiting Koryo Bank, a U.S.-sanctioned conduct for financial transactions on behalf of North Korea.


          Global cyberattack seems intent on havoc, not extortion   
PARIS – A cyberattack that caused indiscriminate economic damage around the world was apparently designed to create maximum havoc in Russia's neighbor and adversary Ukraine, security researchers said.

While the rogue software used in the attack was configured as extortionate "ransomware," that may have just been a ruse.

"It is clear that this was targeted indiscriminately at Ukrainian businesses, and the Ukrainian government," Jake Williams, president of the security firm Rendition Infosec and a former member of the U.S. National Security Agency's elite cyberwarfare group, said in an online chat. "The 'ransomware' component is just a smokescreen (and a bad one)."

UKRAINE IN PAIN

Although the attack was global in its reach, Ukraine bore the brunt. Computers were disabled at banks, government agencies, energy companies, supermarkets, railways and telecommunications providers. Many of these organizations said they had recovered by Thursday, although some experts suspected that work was incomplete.

"There is still a lot of damage, especially in banks," said Victor Zhora, CEO of the Kiev cybersecurity firm InfoSafe. "ATMS are working (again) but some bank operations are still limited." He estimated damage in "the millions of dollars, perhaps tens of millions."

And that's just in Ukraine. Microsoft said the malware hit at least 64 nations, including Russia, Germany and the United States. "I expect that we will see additional fallout from this is the coming days," said Williams.

In Ukraine, suspicion immediately fell on hackers affiliated with Vladimir Putin's regime, although there is no direct, public evidence tying Russia to the attack. Relations between the two nations have been tense since Moscow annexed the Crimean peninsula from Ukraine in 2014. Pro-Russian fighters are still battling the government in eastern Ukraine.

Experts have also blamed pro-Russian hackers for major cyberattacks on the Ukrainian power grid in 2015 and 2016, assaults that have turned the eastern European nation into the world's leading cyberwarfare testing ground. A disruptive attack on the nation's voting system ahead of 2014 national elections is also attributed to Russia.

THE MOSCOW CONNECTION

The malicious program, which is known by a variety of names, including NotPetya, initially appeared to be ransomware. Such malware locks up victims' files by encrypting them, then holds them hostage while demanding payment – usually in bitcoin, the hard-to-trace digital currency.

But researchers said the culprits would have been hard-pressed to make money off the scheme. They appear to have relied on a single email address that was blocked almost immediately and a single bitcoin account that collected the relatively puny sum of $10,000.

Firms including Russia's anti-virus Kaspersky Lab, said clues in the code indicate that the program's authors would have been incapable of decrypting the data, further evidence that the ransom demands were a smoke screen.

The timing was intriguing, too. The attack came the same day as the assassination of a senior Ukrainian military intelligence officer and a day before a national holiday celebrating the new Ukrainian constitution signed after the breakup of the Soviet Union.

"Everything being said so far does point to Russia being a leading candidate for a suspect in this attack," said Robert M. Lee, CEO of Dragos Inc. an expert who has studied the attacks on Ukraine's power grid.

What's most worrisome and reprehensible, said Lee, is that whoever was behind the attack was unconcerned about the indiscriminate, collateral damage it caused – much of it within Russia itself. That's highly atypical behavior for nation-states.

ACCOUNTING FOR MALWARE

Williams and other researchers said all evidence indicates that NotPetya was introduced via Ukrainian financial software provider MeDoc. It is one of just two companies in the eastern European nation that supplies required tax software, Zhora said.

Security experts believe MeDoc was the unwitting victim of something akin to a "watering-hole attack," where a malicious program surreptitiously planted at a popular destination infects parties that visit. MeDoc's user base is heavily financial – and includes multinational corporations with offices in Ukraine.

NotPetya was cleverly engineered to spread laterally within Windows networks and across the globe via private network connections. Globally, dozens of major corporations and government agencies have been disrupted, including FedEx subsidiary TNT.

Danish shipping giant A.P. Moller-Maersk, one of the global companies hit hardest, said Thursday that most of its terminals were running again, though some are operating in a limited way or more slowly than usual.

Problems have been reported across the shippers' global business, from Mobile, Alabama, to Mumbai in India. At Mumbai's Jawaharlal Nehru Port, several hundred containers could be seen piled up at just two of more than a dozen yards.

"The vessels are coming, the ships are coming, but they are not able to take the container because all the systems are down," trading and clearing agent Rajeshree Verma said. "We are actually in a fix because of all this."


          Germany approves Israel nuclear submarine deal: Der Spiegel   
Germany’s national security council has approved a deal to sell three further nuclear-capable submarines to Israel, magazine Der Spiegel reported on Friday, the latest act ...
          Trump criticized for trash-talking MSNBC hosts   
WASHINGTON – President Donald Trump launched a crude Twitter attack on the brains, looks and temperament of a female TV personality Thursday, drawing bipartisan howls of outrage and leaving fellow Republicans beseeching him: Stop, please just stop.

Trump's tweets aimed at MSNBC's Mika Brzezinski revived concerns about his views of women in a city where civility already is in short supply and he is struggling for any support he can get for his proposals on health care, immigration and other controversial issues.

"I heard poorly rated @Morning_Joe speaks badly of me (don't watch anymore)," Trump tweeted to his nearly 33 million followers Thursday morning. "Then how come low I.Q. Crazy Mika, along with Psycho Joe, came to Mar-a-Lago 3 nights in a row around New Year's Eve, and insisted on joining me. She was bleeding badly from a face-lift. I said no!"

The tweets served to unite Democrats and Republicans for once in a chorus of protest that amounted to perhaps the loudest outcry since Trump took office.

"Obviously I don't see that as an appropriate comment," said Republican House Speaker Paul Ryan. House Democratic leader Nancy Pelosi called Trump's tweets, "blatantly sexist." The president, she added, "happens to disrespect women ... it's sad."

Republican Sen. James Lankford of Oklahoma even linked the president's harsh words to the June 14 shootings of House Majority Whip Steve Scalise and three others.

"The president's tweets today don't help our political or national discourse and do not provide a positive role model for our national dialogue," Lankford said, noting that he had just chaired a hearing on the shootings.

On Trump's level of insult-trading, Brzezinski responded on Twitter by posting a photograph of a Cheerios box that included the phrase "made for little hands." People looking to get under the president's skin have long suggested that his hands appear small for his frame.

Trump's allies cast his outburst as positive, an example of his refusal to be bullied.

White House spokeswoman Sarah Huckabee Sanders said the president was "pushing back against people who have attacked him day after day after day. Where is the outrage on that?"

"The American people elected a fighter; they didn't elect somebody to sit back and do nothing," she added.

First lady Melania Trump, who has vowed to fight cyberbullying while her husband is president, gave his tweets a pass.

"As the first lady has stated publicly in the past, when her husband gets attacked, he will punch back 10 times harder," her communications director, Stephanie Grisham, said in a statement.

As Trump welcomed South Korean President Moon Jae-in for a White House dinner Thursday evening, he did not respond to shouted questions from reporters about whether he regretted the tweet.

Some of the administration's most high-profile women – daughter and presidential assistant Ivanka Trump, Counselor Kellyanne Conway and Deputy National Security Adviser Dina Powell – did not respond to requests for comment.

The White House has shown increasing irritation over harsh coverage of the president on Brzezinski and Scarborough's "Morning Joe," including commentary questioning Trump's mental state.

About two hours before his tweets, Brzezinski said on the show that "it's not normal behavior" for any leader to be tweeting about people's appearances or to be bullying, lying, undermining managers and throwing people under the bus. She said that if any business executive behaved the way Trump does, "there would be concern that perhaps the person who runs the company is out of his mind."

On Wednesday, she had mocked Trump after a story in The Washington Post said he had posted fake Time magazine covers of himself in some of his golf resorts.

"Nothing makes a man feel better than making a fake cover of a magazine about himself, lying every day and destroying the country," Brzezinski said.

Trump, who has a habit of throwing up distractions to deflect bad news, has been straining to advance his agenda lately, with the Senate this week coming up short in finding enough votes to begin debate on a bill to roll back President Barack Obama's health care law.

His demeaning broadside against a woman raised new complaints among critics who have long accused him of sexism and inflaming tensions in a deeply polarized nation. Trump also has consistently stoked a long-running feud with the press that has not hurt him with his base of roughly a third of the electorate.

But one expert rejected the idea that Trump's tweets about the MSNBC hosts amounted to a calculated push-back against the media.

"It's not a critique of the press. It's a diatribe. It's a rant," said Theodore L. Glasser, professor emeritus at Stanford University and an expert in mass media.

It wasn't the first time Trump has assailed a television personality who is a woman. In 2015, he went after then-Fox News Channel host Megyn Kelly when she questioned him at a debate. Trump said later that during the exchange, Kelly had "blood coming out of her wherever."

It's also far from the only time he's raised eyebrows with remarks about the physical attributes of women. Just this week in the Oval Office, Trump interrupted his phone conversation with the new prime minister of Ireland to remark on a "beautiful" Irish journalist in the room and take note of the "nice smile on her face."

The latest flare-up did nothing to improve Trump's chances of advancing the health care bill that formed a centerpiece of his campaign.

"This has to stop - we all have a job - 3 branches of gov't and media," tweeted Republican Susan Collins of Maine, a critic of the Senate GOP bill. "We don't have to get along, but we must show respect and civility."

Tweeted Republican Sen. Ben Sasse of Nebraska, a frequent Trump critic: "Please just stop. This isn't normal and it's beneath the dignity of your office." Agreed South Carolina Republican Lindsey Graham: "Mr. President, your tweet was beneath the office and represents what is wrong with American politics, not the greatness of America."

Brzezinski and Scarborough, who are engaged, have known Trump for years and interviewed him numerous times during the campaign. But they have been highly critical of Trump since he took office.

They did meet with Trump at his Florida estate on New Year's Eve for what they described as a brief visit, and also spent time with the president and senior staff at the White House in February. But Brzezinski supporters disputed Trump's characterization of the Mar-a-Lago meeting, saying it was the president who repeatedly asked the couple to visit him. Brzezinski and Scarborough were staying in the area for the holidays.

NBC News spokeswoman Lorie Acio said in a statement, "It's a sad day for America when the president spends his time bullying, lying and spewing petty personal attacks instead of doing his job."


          Travel ban takes effect but less chaos expected   
WASHINGTON – A scaled-back version of President Donald Trump's travel ban took effect Thursday evening, stripped of provisions that brought protests and chaos at airports worldwide in January yet still likely to generate a new round of court fights.

The new rules, the product of months of legal wrangling, aren't so much an outright ban as a tightening of already-tough visa policies affecting citizens from six Muslim-majority countries. Refugees are covered, too.

Administration officials promised that implementation this time, which started at 8 p.m. EDT (0000 GMT), would be orderly. Customs and Border Protection spokesman Dan Hetlage said his agency expected "business as usual at our ports of entry," with all valid visa holders still being able to travel.

Still, immigration and refugee advocates are vowing challenge the new requirements and the administration has struggled to explain how they will make the United States safer.

Under the temporary rules, citizens of Syria, Sudan, Somalia, Libya, Iran and Yemen who already have visas will be allowed into the United States. But people from those countries who want new visas will now have to prove a close family relationship or an existing relationship with an entity like a school or business in the U.S.

It's unclear how significantly the new rules will affect travel. In most of the countries singled out, few people have the means for leisure travel. Those that do already face intensive screenings before being issued visas.

Nevertheless, human rights groups on Thursday girded for new legal battles. The American Civil Liberties Union, one of the groups challenging the ban, called the new criteria "extremely restrictive," ''arbitrary" in their exclusions and designed to "disparage and condemn Muslims."

The state of Hawaii filed an emergency motion Thursday asking a federal judge to clarify that the administration cannot enforce the ban against relatives – such as grandparents, aunts or uncles – not included in the State Department's definition of "bona fide" personal relationships.

Los Angeles City Attorney Mike Feuer met with customs officials and said he felt things would go smoothly.

"For tonight, I'm anticipating few issues because, I think, there's better preparation," he told reporters at Los Angeles International Airport on Thursday night. "The federal government here, I think, has taken steps to avoid the havoc that occurred the last time."

Much of the confusion in January, when Trump's first ban took effect, resulted from travelers with previously approved visas being kept off flights or barred entry on arrival in the United States. Immigration officials were instructed Thursday not to block anyone with valid travel documents and otherwise eligible to visit the United States.

Karen Tumlin, legal director of the National Immigration Law Center, said the rules "would slam the door shut on so many who have waited for months or years to be reunited with their families.

Trump, who made a tough approach to immigration a cornerstone of his election campaign, issued a ban on travelers from the six countries, plus Iraq, shortly after taking office in January. His order also blocked refugees from any country.

Trump said these were temporary measures needed to prevent terrorism until vetting procedures could be reviewed. Opponents noted that visa and refugee vetting were already strict and said there was no evidence that refugees or citizens of those six countries posed a threat. They saw the ban as part of Trump's campaign promise to bar Muslims from entering the United States.

Lower courts blocked the initial ban and a second, revised Trump order intended to overcome legal hurdles. The Supreme Court on Monday partially reinstated the revised ban but exempted travelers who could prove a "bona fide relationship" with a U.S. person or entity. The court offered only broad guidelines.

In guidance issued late Wednesday, the State Department said the personal relationships would include a parent, spouse, son, daughter, son-in-law, daughter-in-law or sibling already in the United States. It does not include other relationships such as grandparents, grandchildren, aunts and uncles. On Thursday, the State and Homeland Security departments had both expanded the range of bona fide relationships to include fiancés.

Business or professional links must be "formal, documented and formed in the ordinary course rather than for the purpose of evading" the ban. Journalists, students, workers or lecturers who have valid invitations or employment contracts in the U.S. would be exempt from the ban. The exemption does not apply to those who seek a relationship with an American business or educational institution purely for the purpose of avoiding the rules.

Refugees from any country will face similar requirements. But the U.S. has almost filled its quota of 50,000 refugees for the budget year ending in September and the new rules won't apply to the few remaining slots. With the Supreme Court set to consider the overall ban in October, the rules could change again.

The travel ban may have the largest impact on Iranians. In 2015, the most recently available data, nearly 26,000 Iranians were allowed into the United States on visitor or tourist visas. Iranians made up the lion's share of the roughly 65,000 foreigners from the six countries who visited with temporary, or non-immigrant visas that year.

American journalist Paul Gottinger, said he and his Iranian fiancee applied for a visa nearly a year ago but are still waiting on a decision. Gottinger says they were to wed at a Japanese garden in his parents' home state of Minnesota this month but postponed the ceremony until August because they had not yet received the visa.

Now, he expects they will have to delay again.

"Every twist and turn of the courts, we're holding our hearts and our stomachs are falling to the floor," he said by phone from Turkey.

The new regulations are also affecting the wedding plans of Rama Issa-Ibrahim, executive director of the Arab American Association of New York.

She is Syrian-American and had planned to get married this fall. While her father in Syria may be able to get a visa, her aunts and uncles may well be blocked.

"I would love for them to be at this wedding, and unfortunately, they aren't going to be able to be here," she said, adding that the ceremony would be postponed.

___

Associated Press writer Amy Taxin and Andrew Dalton in Los Angeles and Michael Noble in New York contributed to this report.


          Algonquin-based District 300's first safety director caps nine years on job   
Retiring District 300 Safety Director Gary Chester remembers former Superintendent Kenneth Arndt asking him whether he would be one of those six-month wonders who stays for a short while until something better comes along.

Chester's background made him more than qualified. He spent 35 years as a police officer – 22 of them as a police chief and 15 of them as a public safety director, plus military experience and a certificate from the FBI national academy.

However, his family lived in Michigan, and while Chester reassured Arndt that his stay would last longer than half a year, in the back of his mind he thought he would take the next job offer he got closer to home.

Instead, despite several job offers, Chester spent the next nine years working for the district on weekdays and commuting to his Union City, Michigan, home on the weekends.

He never imagined he'd stay as long as he has, and now, as he moves on to retirement, he faces the challenge of leaving the friendships he's built and the community he's grown to love behind.

If his family was nearby, Chester said they would have to drag him out in his coffin.

"There are bookmarks in your life as you go on. Usually, it's marriage, it's your first kids, it's all your kids being born. It's graduation of the kids," Chester said. "This [job] is one of the big bookmarks of my life."

Looking back, Chester believes the most important part of his job was what staff affectionately dubbed the "Scary Gary Show" – training that covers what to do during weather emergencies, fires and violent situations.

How staff responds to an emergency situation is what ultimately determines the outcome, Chester said, and working on managing staff's psychological response to emergencies is important.

Knowing where to go and what to do in a crisis situation does not matter if a teacher or supervisor freezes up, he said.

"The general public and parents don't really understand how much responsibility we place on the shoulders of those teachers," Chester said. "It's hard enough to get through [a crisis situation] alone and now, we throw 20 to 30 kids at them and say protect them as well."

One piece to that training that Chester said many other schools and school districts fail to do is include substitute teachers.

There are anywhere from two to 20 substitutes in each school on any given day, which is why Chester made sure every substitute is required to watch a two-hour safety presentation before filling in for teachers.

"It's not just ensuring that our students have a safe environment," Superintendent Fred Heid said, "but that our staff does, too."

Heid said that the staff appreciated Chester's presence, and the training Chester gave was always well-received.

"It's easy to put policies into place," Heid said. "It's hard to get people on board with them."

Heid said he has seen safety directors at other districts have an intimidating presence and create an uneasiness when they enter a room. This is not the case with Chester, Heid said. Chester is just there to help.

Chester said he leaves District 300 feeling the appreciation of the community he served over the last nine years. A joint effort of several grateful staff members led June 14 to officially become Gary Chester Day.

Several staff members, local fire fighters, police officers and Algonquin village officials that Chester worked with over the years came together to celebrate his retirement and announce that his name is in several village calendars.

"Even though we promised not to make a huge fuss, we did anyways," Linda Keyes, Heid's executive assistant, said.

Keyes went to all nine municipalities that the district serves and asked them to put together a resolution for Gary Chester Day which was eventually passed with each one.

Chester started as safety director when it was a brand new position to the 22,000-student district. Todd Rohlwing will fill the position after spending the past two months being trained by Chester.

Rohlwing worked for the Illinois State Police and has a military background. To learn more about how school security works on the ground level, he took on the role of student security officer at Hampshire High School.

Chester believes he is leaving the district in good and capable hands, but still finds it to be a challenge to leave the position behind.

"What happened to all the years that [have] flown behind me? It's a transition," Chester said. "If I didn't love what I was doing, it would be a lot easier, but it's hard to walk away from something you love and the love I also get from the staff."


          Apartment Holiday Rentals in Marbella in   
5013
Beautiful and spacious apartment situated in Marbella town, in a second line beach development. The property comprises fully equipped kitchen, air conditioning, terrace of 90 m2, community swimming pool and garden, 24 hours security, south/west...
4 rooms 3 bathrooms garden swimming pool terrace air conditioning
Fri, 30 Jun 2017 03:25:28 -0400
          Security Week 26: ExPetr – не вымогатель, Intel PT позволяет обойти PatchGuard, в Malware Protection Engine снова RCE   
Мимикрия чрезвычайно распространена в животном мире. Чтобы было проще прятаться от хищников, или наоборот, легче подкрадываться к добыче незамеченными, звери, рептилии, птицы и насекомые приобретают окраску, схожую с окружающей местностью. Встречается мимикрия и под предметы, и, наконец, под животных других видов – более опасных, или менее вкусных.

Схожим образом поступает новый троянец-вымогатель ExPetr, который вроде бы Petya, да не совсем он. Распространяясь как чума, он навел шороху в 150 странах. Один из векторов распространения, но не единственный – сладкая парочка EternalBlue и DoublePulsar, от которой многие так и не удосужились запатчиться после WannaCry.

Так вот, о чем я. При внимательном рассмотрении оказалось, что ExPetr никакой не вымогатель, и самый натуральный стиратель данных. Восстановление зашифрованных данных не предусмотрено и невозможно.
Читать дальше →
          El Beto of the Cartel Arellano Felix arrested in Tijuana   
Translated by Otis B Fly-Wheel for Borderland Beat from a Milenio article

Subject Matter: El Beto, CAF, AFO
Recommendation: No prior subject matter knowledge required


Elements of the Baja California Police detained a person identified as El Beto, alleged leader of a cell of the Cartel Arellano Felix. In a communication, the Secretary of State Public Security announced the effective detention deriving from intelligence work of the referred to Police corporation.

He indicated that the detention was carried out at a traffic circle at Simon Bolivar Avenue and Calle Tecate, in the Alba Roja Colonia, where officials located a Toyota Camry vehicle carrying the detained.

He referred that in the cabin they found a 9mm pistol, a spare magazine and 24 rounds of ammunition, another pistol of .22 calibre, they also found a bag that contained four packets with a weight of 18 kilos of marijuana.

The person arrested responded to the name of Carlos Alberto N, 34 years of age, who carried in the vehicle a sub-machine gun of 5.7 mm calibre two two spare magazines with ten rounds in each. (Otis: probably a FN P90.)




They also found three other plastic packages which contained a white granular substance with the characteristics similar to the synthetic drug know was Ice, weighing 3.9 kilos.

He noted that according to investigations, El Beto and several accomplices were dedicated to collecting quotas for the sale of drugs and executions of rival gang members operating in the local colonias, although this can only be determined by the corresponding authority.

Original article in Spanish at Milenio
          How to Clear Your Drupal Cache When Your Website WSOD or Errors   
How to Clear Your Drupal Cache When Your Website WSOD or Errors
drupal-support
David Csonka Fri, 02/10/2017 - 18:02

The Drupal "White Screen of Death" or WSOD for short, would be a hilariously named aspect of Drupal if it wasn't actually an incredibly frustrating part of developing with this CMS. Unfortunately it is something that you can encounter when deploying updates for Drupal modules or when developing a new module of your own.

Definition from Drupal.org:

Occasionally a site user or developer will navigate to a page and suddenly the page content disappears, and it becomes blank. No content. No errors. Nothing. This happens sometimes, It could happen after updating a module, theme, or Drupal core. This is what is referred to by most members of the Drupal community as the White Screen of Death or WSOD. There are several reasons why this might occur, and therefore several possible solutions to the issue.

There are various steps to help you determine the cause of the WSOD such as enabling more robust error reporting, etc. but sometimes a WSOD can make it so your Drupal website is completely locked down. For example, if the error that is causing the Drupal white screen of death originated from a custom module you were developing, and the Drupal code that is problematic is cached, you may not be able to easily clear the cache in order to propagate the fix for the error. trying to use the Drush command "drush cc all" (for clear cache all) or going to the Performance settings page to manually clear the cache, will both likely fail.

Manually Empty Database Tables

If you are familiar with working with MySQL or even using tools like PHPMyAdmin, one step you can take is to go into the database and manually empty or "truncate" the tables labeled as "cache" for the Drupal website's database. This is more of an advanced technique, and is not really recommended unless you know what you're doing or you have no other alternative. At the very least, be sure to make an update of your Drupal website database before proceeding.

Drush SQL Commands

If you can't get around manually truncating those cache tables in your database, but don't want to go into MySQL directly and are concerned about potential human error while messing around with the database tables, or simply don't have permissions for direct access to the Drupal database, another alternative is to use the Drush command to truncate the table "cache".

Summary of Options

(If clearing the cache normally with Drush or the UI isn't possible)

  • Empty or truncate the cache tables in the Drupal database through MySQL or PHPMyAdmin
  • Empty or truncate the cache tables in the Drupal database with a Drush command

Using these techniques, you should be able to get your Drupal website to respond again after resolving the error that was causing the "white screen of death" in the first place. And if you are lucky, sometimes just clearing the cache is enough to fix the problem anyway. Just be sure to test your Drupal updates so that when these kinds of problems happen, that occur in a testing environment instead of your live website!

Still having trouble getting your Drupal website back up and running?

We might be able to help you! Contact Us


          Norton Antivirus Customer Support Services for Mac from Vsupport24   
Discover Norton Antivirus Customer Tech Total Security Support via Phone Contact Number help line /Chat for Install Windows Norton, Virus and Spyware

          What is The Drupal Security Shield For Contributed Modules?   
What is The Drupal Security Shield For Contributed Modules?
drupal-security
David Csonka Sun, 02/05/2017 - 15:54

If you have been looking around for new Drupal contributed modules lately, or just reviewing the release versions and statuses for modules that you are using, you might have noticed a new shield icon at the bottom of the project information section.

Nicknamed the "Drupal Shield of Awesomeness" by some of the leaders of the Drupal community, this small but useful graphic is intended to help people recognize contributed modules that receive a higher level of scrutiny and support by the Drupal security team than others.

drupal-project-module-information

So, who is the Security Team? You can find more information on drupal.org, but in short the Drupal Security Team is a group of highly skilled volunteer developers and software security professionals that identify vulnerabilities in Drupal code and provide fixes.

Their public contributions come in the form of security advisories, which inform the Drupal community of issues with Drupal core and released contributed modules.

There are a lot of Drupal developers, many of whom are actively making contributed modules, so it would be difficult for the Security Team to individually vet each module out there. So the process has evolved to demonstrate to the wider community that contributed modules which have opted to promote their project to a stable release, so no longer alpha, beta, dev, etc. they can and will have their project subjected to more in-depth scrutiny. After passing, it will receive this shield icon to help identify it as a module with the backing of the Drupal Security Team's review.

Review entails a mixture of automated code analysis tests and actual review of the code by a person or persons. Considering the multitude of Drupal modules, this can be a laborious process and is all the more remarkable that the bulk of this work is done by volunteers. If you see a Drupal Security Team member at the next DrupalCon, be sure to say "thank you"!

What does this ultimately mean for the average Drupal user? Well, you can still continue using any of the other contributed modules out there, but you need to recognize that if your website is for official use by a company or organization, and is live and open to the public, you'll want to seriously consider using only modules which have this backing by the Security Team.

To be frank though, it is rarely possible to complete your Drupal website with only stable release modules, it seems like there is always that one feature that you want that needs an obscure module that is still in a "dev" state. You can do this of course, just be sure to follow the modules issue queue and stay informed about ongoing work that it may need.


          Thank-You's, Compliments & Testimonials   
This from one of my old promo pages from a few years ago ago (perhaps good to keep these things on record I suppose):

Trevor Nel - S.A.'s Leading CHANGE-AGENT
Personal - Business - Community
Proven Developer of Multi-Million Rand Projects
'He WALKS His TALK'

How does one measure one's success in life..? Simple... you don't... you go out there and do the best YOU can in your chosen endeavours to please YOU... and let other people give you their measure of your success by their thank-you's... if they really want to... :-)

If you go out looking for compliments you are likely to be disappointed. If you go out looking to achieve your own happiness in life with integrity... the compliments come flowing in.

Each year Trevor has had the wonderful privilege of receiving many 100's of unsolicited thank-you letters from folks grateful for the impact he has had on their lives.

As Trevor travels the country... sharing his own Personal, Business and Community experiences and views on Success... he shares a quick selection of some of the thank-you messages on file to show you how people feel when YOU take the time to make a difference in their lives.

Thank-you's are FOOD for the soul... ;-)

Personal

1. Hi Trevor, It's good to have you back! It feels like you are the heartbeat of business and you shine a BIG bright light making this world look like a dream place of opportunity and possibility, all packed neatly into your emails ... a nice, warm, fuzzy feeling! Just by the way, one can feel your heart and it feels good to have someone around who cares and keeps being the good shepherd. Thanks and God bless... Debbie

2. Hi Trevor, Welcome Back from the Fairest Cape – my home town. Your holiday brought back many good memories for me. That’s going to be my destination next year during the festive season – for an AWESOME break with friends and family! It’s always good to hear from you as you write such uplifting and informative e-mails. Here’s wishing you and your family a GREAT YEAR, FILLED WITH NEW CHALLENGES AND SUCCESS. Kindest regards, Rene Ring

3. Trevor, Just to echo the mails at the bottom. You are superb and it has been one of my finest pleasures getting to meet you and Tony. As I said this morning, the energy you exude is phenomenal and your integrity goes without saying - it is of the highest quality. Lynda Fussell

Business

1. Hi Trevor, Thank you for the infomation you're sending us. As I mentioned before, my life and that of my family has changed due to your inspiration and the articles I have been receiving. I am still using the process of sharing this idea with friends and those I meet. Thank you Martin

2. Trevor, "Just" a compliment and thanks. I have spent the last 2 hours reading your book 'Another Great Day In Africa' and your web links galore..etc,etc,etc. Really amazing how much you have produced in what appears such a short time. Commitment and dedication to the idea keeps it going. Fantastic that your efforts can be made so easily and readily available to the entire world! Thank you, George Savage

3. Hi Trevor, Just a short note to say thanks once again for last Friday at our Business Forum. Jean sent me an e-mail in appreciation, and I quote: '...met sprekers soos Trevor, raak mens weer bewus van die belangrikheid om jouself te omring met positiewe mense. Trevor het daarin geslaag om weer die lekker van die lewe, en die lekker van besigheid, te bevestig. Dra asseblief my waardering aan Trevor en die span oor'. Enough said! Groetnis Chris

4. Trevor, Thanks! You and your group are the most professional team I have ever seen. I'm am so excited to have the chance to work with you. Thanks for your Leadership, Eddie Terranova

5. Hi Trevor, Juvio is one of those fantastic business opportunities that present themselves only on very rare occasions. I am fully committed to do whatever it takes - I like your analogy of R1 million in the bank - that is my goal for 12 months down the line. The incredible support provided by you and the team makes this business a winner in all respects. My heartfelt thanks for the opportunity and the support. Many thanks and kind regards... Vic Burrows

6. Thanks Trev... for ALL of the background efforts as well as the time you put in for all of us. Viv Brown

7. Dear Trevor, Having spoken to Eunice yesterday and having heard of the success she has enjoyed from INNER Circle, I realise that I cannot afford to miss a meeting, neither can any other business person. Janis Bryden

8. Well done Trevor, the pending visit from Steve is amazing, little old South Africa has got someone's attention... you must be very proud of what you have started in a short time frame. Who thought INNER Circle would have resulted in this! Good stuff big guy!! Iain Johnstone

9. Hi Trevor, I would like to first of all say thank you for inspiring me to take the final leap of faith and start my own business. Thank you very much. Ursula Gouws

Community - (a good few 100 on file this year alone :-)

1. Testimonial:, Trevor Nel began the "Lonehill Security Project" in July of 2000. He witnessed one of South Africa's most violent terror attacks which has resulted in one of S.A.'s most successful stories to-date. He decided to take on a 3000 strong community of residents in Lonehill to rise up and fight fire with fire. Residents still stand amazed at the results Trevor has achieved and the buy-in he has attained from the most radically negative and apathetic who today stand as allies in a most noticeable synergy. We all acknowledge the tremendous efforts put in by this one individual and today Trevor is a household name. Tony Henry - Chairman - Lonehill Residents Association 2001

2. Testimonial:, I have had the pleasure of working with Trevor for over 4 years from mid-2000 to the end of 2004 in my capacity as co-director and, for the last three years, Chairman of the Lonehill Residents’ Association. The LRA has achieved results that are world-class in pulling together a community to manage its security and environment to a level with little or no peer. In under 5 years, the LRA has gone from a fairly typical residents’ association with little formal structure and limited means to an operation that now manages R1m a month, a security provider with some 230 people directly employed on the project, a full-time Estate Manager with a team of five gardeners, and a full-time administration service provider managing the infrastructure. A great deal of the credit for these achievements goes to the efforts of Trevor, whose vision and marketing dynamism have been major factors in driving the project forward. Trevor is clear and determined in his goals, and not one to let controversy slow him down. Chris Crozier - Chairman - Lonehill Residents Association 2002 - 2005

3. Hi Trevor, This note to wish you and all your family all the best through the coming year. I also was extremely pleased to see that everything was still intact back home and I would like to express my appreciation for what has been done by you and the rest of the team in keeping Lonehill the place where I want to continue living. Kind regards John Siddall

4. Subject: Grateful - Trevor, my best wishes and thanks for your good care - Charbonnel : Costa Rica Consulate (Lonehill)

5. Dear Trevor, I would like to applaud your dedication to the cause and thank you for your untiring efforts to get the entire Lonehill community on board. Where would we be without you. My very best Christmas wishes to you and the LRA. Yours gratefully, Jennifer Clinton

6. Dear Trevor, I would like to wish you a very happy end-of-year and all the best for 2003. You have been such an inspiration to all of us throughout this year and I am sure there have been hard times for you but we really, really appreciate all your hard work and effort. Keep your spirits up. Kind Regards Cindy and Tony Maddison

7. Dear Trevor, Wishing you and your loved ones a very Merry Christmas and a wonderful New Year. I hope next year brings you lots of good things. Thank-you so much for all you, Fidelity and the LRA have done for us Lonehill residents. Sandra Hughes

8. Trevor, I appreciate all the hard work and effort that you put into the Lonehill Security Action Group - thank you. (Letter Shortened) My unreserved good wishes to all 'Lonehillers', and God Bless all of you. Sincerely, Moyra Webster.

9. Trevor, As always - well done on your amazing efforts! I know that to keep up the momentum takes a huge effort. I would like to suggest that all residents who receive your emails, print 3 or 4 copies each and deliver them to their nearest non-contributing neighbours, every single week!. This way we can reach a larger number of these residents. Jen Atkins

10. Dear Trevor, It is really quite daunting to read in your latest bulletin that you are now into the last few months of your commitment to Lonehill. Three years ago you made an undertaking and you have surely delivered "tenfold" in the face of much mindless apathy and resistance. You have rattled many cages and created some antagonisms ... but you have kept the whole process moving forward.

I know that you have created a structure which will endure. Lonehill residents will realise, in the years ahead, how much they owe to you and your "key" group of volunteers, all of whom are busy men with little time to spare. When the LRA is finally set-up to administer and control the activities of the village the residents will have a real asset in their hands. An asset which will continue to improve the values of their homes and businesses, and the quality of their lives in this lovely suburb.

It is just astounding how long and difficult it has been to get across the idea of all working together for the general good. I was sad to note the comments of the Chairperson of Pilgrims Rest Chamber of Tourism ... " one positive aspect of the murder is that the entire community has for the first time all been working together to improve the security and infrastructure of the village" !! What a tragedy that it should need such a terrible thing to happen to make people THINK. We had a wake-up call three years ago... have our non-contributors forgotten ??

I must not write any more ... I'm sure you've heard it all ....and sometimes come close to despair. I started off to say how much all that you and your colleagues have done is appreciated by the "thinking" locals and I finish with warmest good wishes for a Blessed Christmas, and Health, Peace, Good Fortune and Happiness to you all in the New Year.
From Bill and Gina Parr

PS Wishing you and your family a magic and blessed Christmas. May the New Year bring you all the joy, and peace that you so rightly deserve. You are a "giant" of a man, may the Lord continue to bless you and give you the strength you need. Love, Gina.

For tons more testimonials Click Here

Trevor adds this quick message and contact number:

'Hope you get just as inspired to make a difference in other people's lives as I do.'

Regards
Trevor Nel - (int. 2711) 705-2790 - growth@global.co.za
          UU ITE, Policy, Regulation and Security   
none
          Masked Men Tie Up Arcadia Couple, Ransack Multi-Million Dollar Home   
As many as four masked men got past the gates and security call box of a multi-million dollar Arcadia home and tied up the homeowners before ransacking the place.
          Lilienfeld - 30-Jähriger muss sitzen   
Mit 1,8 Promille drohte Vorbestrafter, zwei Security-Männer zu erschießen. Richter verdonnerte ihn zu zwei Monaten Gefängnis.
          httpClient Https 单向不验证(httpClient连接池)    
废话少说,直接上代码,以前都是调用别人写好的,现在有时间自己弄下,具体功能如下:
1、httpClient+http+线程池:
2、httpClient+https(单向不验证证书)+线程池:

https在%TOMCAT_HOME%/conf/server.xml里面的配置文件
<Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true" 
     maxThreads="150" scheme="https" secure="true" 
     clientAuth="false" keystoreFile="D:/tomcat.keystore" 
     keystorePass="heikaim" sslProtocol="TLS"  executor="tomcatThreadPool"/> 
其中 clientAuth="false"表示不开启证书验证,只是单存的走https



package com.abin.lee.util;

import org.apache.commons.collections4.MapUtils;
import org.apache.commons.lang3.StringUtils;
import org.apache.http.*;
import org.apache.http.client.HttpRequestRetryHandler;
import org.apache.http.client.config.CookieSpecs;
import org.apache.http.client.config.RequestConfig;
import org.apache.http.client.entity.UrlEncodedFormEntity;
import org.apache.http.client.methods.CloseableHttpResponse;
import org.apache.http.client.methods.HttpGet;
import org.apache.http.client.methods.HttpPost;
import org.apache.http.client.protocol.HttpClientContext;
import org.apache.http.config.Registry;
import org.apache.http.config.RegistryBuilder;
import org.apache.http.conn.ConnectTimeoutException;
import org.apache.http.conn.socket.ConnectionSocketFactory;
import org.apache.http.conn.socket.PlainConnectionSocketFactory;
import org.apache.http.conn.ssl.NoopHostnameVerifier;
import org.apache.http.conn.ssl.SSLConnectionSocketFactory;
import org.apache.http.entity.StringEntity;
import org.apache.http.impl.client.CloseableHttpClient;
import org.apache.http.impl.client.HttpClients;
import org.apache.http.impl.conn.PoolingHttpClientConnectionManager;
import org.apache.http.message.BasicHeader;
import org.apache.http.message.BasicNameValuePair;
import org.apache.http.protocol.HttpContext;
import org.apache.http.util.EntityUtils;

import javax.net.ssl.*;
import java.io.IOException;
import java.io.InterruptedIOException;
import java.net.UnknownHostException;
import java.nio.charset.Charset;
import java.security.cert.CertificateException;
import java.security.cert.X509Certificate;
import java.util.*;

/**
* Created with IntelliJ IDEA.
* User: abin
* Date: 16-4-18
* Time: 上午10:24
* To change this template use File | Settings | File Templates.
*/
public class HttpClientUtil {
private static CloseableHttpClient httpsClient = null;
private static CloseableHttpClient httpClient = null;

static {
httpClient = getHttpClient();
httpsClient = getHttpsClient();
}

public static CloseableHttpClient getHttpClient() {
try {
httpClient = HttpClients.custom()
.setConnectionManager(PoolManager.getHttpPoolInstance())
.setConnectionManagerShared(true)
.setDefaultRequestConfig(requestConfig())
.setRetryHandler(retryHandler())
.build();
} catch (Exception e) {
e.printStackTrace();
}
return httpClient;
}


public static CloseableHttpClient getHttpsClient() {
try {
//Secure Protocol implementation.
SSLContext ctx = SSLContext.getInstance("SSL");
//Implementation of a trust manager for X509 certificates
TrustManager x509TrustManager = new X509TrustManager() {
public void checkClientTrusted(X509Certificate[] xcs,
String string) throws CertificateException {
}
public void checkServerTrusted(X509Certificate[] xcs,
String string) throws CertificateException {
}
public X509Certificate[] getAcceptedIssuers() {
return null;
}
};
ctx.init(null, new TrustManager[]{x509TrustManager}, null);
//首先设置全局的标准cookie策略
// RequestConfig requestConfig = RequestConfig.custom().setCookieSpec(CookieSpecs.STANDARD_STRICT).build();
ConnectionSocketFactory connectionSocketFactory = new SSLConnectionSocketFactory(ctx, hostnameVerifier);
Registry<ConnectionSocketFactory> socketFactoryRegistry = RegistryBuilder.<ConnectionSocketFactory>create()
.register("http", PlainConnectionSocketFactory.INSTANCE)
.register("https", connectionSocketFactory).build();
// 设置连接池
httpsClient = HttpClients.custom()
.setConnectionManager(PoolsManager.getHttpsPoolInstance(socketFactoryRegistry))
.setConnectionManagerShared(true)
.setDefaultRequestConfig(requestConfig())
.setRetryHandler(retryHandler())
.build();
} catch (Exception e) {
e.printStackTrace();
}
return httpsClient;
}

// 配置请求的超时设置
//首先设置全局的标准cookie策略
public static RequestConfig requestConfig(){
RequestConfig requestConfig = RequestConfig.custom()
.setCookieSpec(CookieSpecs.STANDARD_STRICT)
.setConnectionRequestTimeout(20000)
.setConnectTimeout(20000)
.setSocketTimeout(20000)
.build();
return requestConfig;
}

public static HttpRequestRetryHandler retryHandler(){
//请求重试处理
HttpRequestRetryHandler httpRequestRetryHandler = new HttpRequestRetryHandler() {
public boolean retryRequest(IOException exception,int executionCount, HttpContext context) {
if (executionCount >= 5) {// 如果已经重试了5次,就放弃
return false;
}
if (exception instanceof NoHttpResponseException) {// 如果服务器丢掉了连接,那么就重试
return true;
}
if (exception instanceof SSLHandshakeException) {// 不要重试SSL握手异常
return false;
}
if (exception instanceof InterruptedIOException) {// 超时
return false;
}
if (exception instanceof UnknownHostException) {// 目标服务器不可达
return false;
}
if (exception instanceof ConnectTimeoutException) {// 连接被拒绝
return false;
}
if (exception instanceof SSLException) {// ssl握手异常
return false;
}

HttpClientContext clientContext = HttpClientContext.adapt(context);
HttpRequest request = clientContext.getRequest();
// 如果请求是幂等的,就再次尝试
if (!(request instanceof HttpEntityEnclosingRequest)) {
return true;
}
return false;
}
};
return httpRequestRetryHandler;
}



//创建HostnameVerifier
//用于解决javax.net.ssl.SSLException: hostname in certificate didn't match: <123.125.97.66> != <123.125.97.241>
static HostnameVerifier hostnameVerifier = new NoopHostnameVerifier(){
@Override
public boolean verify(String s, SSLSession sslSession) {
return super.verify(s, sslSession);
}
};


public static class PoolManager {
public static PoolingHttpClientConnectionManager clientConnectionManager = null;
private static int maxTotal = 200;
private static int defaultMaxPerRoute = 100;

private PoolManager(){
clientConnectionManager.setMaxTotal(maxTotal);
clientConnectionManager.setDefaultMaxPerRoute(defaultMaxPerRoute);
}

private static class PoolManagerHolder{
public static PoolManager instance = new PoolManager();
}

public static PoolManager getInstance() {
if(null == clientConnectionManager)
clientConnectionManager = new PoolingHttpClientConnectionManager();
return PoolManagerHolder.instance;
}

public static PoolingHttpClientConnectionManager getHttpPoolInstance() {
PoolManager.getInstance();
// System.out.println("getAvailable=" + clientConnectionManager.getTotalStats().getAvailable());
// System.out.println("getLeased=" + clientConnectionManager.getTotalStats().getLeased());
// System.out.println("getMax=" + clientConnectionManager.getTotalStats().getMax());
// System.out.println("getPending="+clientConnectionManager.getTotalStats().getPending());
return PoolManager.clientConnectionManager;
}


}

public static class PoolsManager {
public static PoolingHttpClientConnectionManager clientConnectionManager = null;
private static int maxTotal = 200;
private static int defaultMaxPerRoute = 100;

private PoolsManager(){
clientConnectionManager.setMaxTotal(maxTotal);
clientConnectionManager.setDefaultMaxPerRoute(defaultMaxPerRoute);
}

private static class PoolsManagerHolder{
public static PoolsManager instance = new PoolsManager();
}

public static PoolsManager getInstance(Registry<ConnectionSocketFactory> socketFactoryRegistry) {
if(null == clientConnectionManager)
clientConnectionManager = new PoolingHttpClientConnectionManager(socketFactoryRegistry);
return PoolsManagerHolder.instance;
}

public static PoolingHttpClientConnectionManager getHttpsPoolInstance(Registry<ConnectionSocketFactory> socketFactoryRegistry) {
PoolsManager.getInstance(socketFactoryRegistry);
// System.out.println("getAvailable=" + clientConnectionManager.getTotalStats().getAvailable());
// System.out.println("getLeased=" + clientConnectionManager.getTotalStats().getLeased());
// System.out.println("getMax=" + clientConnectionManager.getTotalStats().getMax());
// System.out.println("getPending="+clientConnectionManager.getTotalStats().getPending());
return PoolsManager.clientConnectionManager;
}

}

public static String httpPost(Map<String, String> request, String httpUrl){
String result = "";
CloseableHttpClient httpClient = getHttpClient();
try {
if(MapUtils.isEmpty(request))
throw new Exception("请求参数不能为空");
HttpPost httpPost = new HttpPost(httpUrl);
List<NameValuePair> nvps = new ArrayList<NameValuePair>();
for(Iterator<Map.Entry<String, String>> iterator=request.entrySet().iterator(); iterator.hasNext();){
Map.Entry<String, String> entry = iterator.next();
nvps.add(new BasicNameValuePair(entry.getKey(), entry.getValue()));
}
httpPost.setEntity(new UrlEncodedFormEntity(nvps, Consts.UTF_8));
System.out.println("Executing request: " + httpPost.getRequestLine());
CloseableHttpResponse response = httpClient.execute(httpPost);
result = EntityUtils.toString(response.getEntity());
System.out.println("Executing response: "+ result);
} catch (Exception e) {
throw new RuntimeException(e);
} finally {
try {
httpClient.close();
} catch (IOException e) {
e.printStackTrace();
}
}
return result;
}

public static String httpPost(String json, String httpUrl, Map<String, String> headers){
String result = "";
CloseableHttpClient httpClient = getHttpClient();
try {
if(StringUtils.isBlank(json))
throw new Exception("请求参数不能为空");
HttpPost httpPost = new HttpPost(httpUrl);
for(Iterator<Map.Entry<String, String>> iterator=headers.entrySet().iterator();iterator.hasNext();){
Map.Entry<String, String> entry = iterator.next();
Header header = new BasicHeader(entry.getKey(), entry.getValue());
httpPost.setHeader(header);
}
httpPost.setEntity(new StringEntity(json, Charset.forName("UTF-8")));
System.out.println("Executing request: " + httpPost.getRequestLine());
CloseableHttpResponse response = httpClient.execute(httpPost);
result = EntityUtils.toString(response.getEntity());
System.out.println("Executing response: "+ result);
} catch (Exception e) {
throw new RuntimeException(e);
} finally {
try {
httpClient.close();
} catch (IOException e) {
e.printStackTrace();
}
}
return result;
}

public static String httpGet(String httpUrl, Map<String, String> headers) {
String result = "";
CloseableHttpClient httpClient = getHttpClient();
try {
HttpGet httpGet = new HttpGet(httpUrl);
System.out.println("Executing request: " + httpGet.getRequestLine());
for(Iterator<Map.Entry<String, String>> iterator=headers.entrySet().iterator();iterator.hasNext();){
Map.Entry<String, String> entry = iterator.next();
Header header = new BasicHeader(entry.getKey(), entry.getValue());
httpGet.setHeader(header);
}
CloseableHttpResponse response = httpClient.execute(httpGet);
result = EntityUtils.toString(response.getEntity());
System.out.println("Executing response: "+ result);
} catch (Exception e) {
throw new RuntimeException(e);
} finally {
try {
httpClient.close();
} catch (IOException e) {
e.printStackTrace();
}
}
return result;
}


public static String httpGet(String httpUrl) {
String result = "";
CloseableHttpClient httpClient = getHttpClient();
try {
HttpGet httpGet = new HttpGet(httpUrl);
System.out.println("Executing request: " + httpGet.getRequestLine());
CloseableHttpResponse response = httpClient.execute(httpGet);
result = EntityUtils.toString(response.getEntity());
System.out.println("Executing response: "+ result);
} catch (Exception e) {
throw new RuntimeException(e);
} finally {
try {
httpClient.close();
} catch (IOException e) {
e.printStackTrace();
}
}
return result;
}





maven依赖:
  <!--httpclient-->
        <dependency>
            <groupId>org.apache.httpcomponents</groupId>
            <artifactId>httpclient</artifactId>
            <version>4.5.2</version>
        </dependency>
        <dependency>
            <groupId>org.apache.httpcomponents</groupId>
            <artifactId>httpcore</artifactId>
            <version>4.4.4</version>
        </dependency>
        <dependency>
            <groupId>org.apache.httpcomponents</groupId>
            <artifactId>httpmime</artifactId>
            <version>4.5.2</version>
        </dependency>

<dependency>
<groupId>org.apache.commons</groupId>
<artifactId>commons-collections4</artifactId>
<version>4.1</version>
</dependency>


abin 2016-04-27 19:04 发表评论

          Shift Lead - Taco Bell | Taco Bell Corporate - Hialeah Gardens, FL   
Following cash, security, inventory and labor policies and procedures. You support the Restaurant General Manager (RGM) by running great work shifts and meeting...
From Taco Bell - Sat, 10 Jun 2017 07:42:35 GMT - View all Hialeah Gardens, FL jobs
          Outpatient Registration Representative - The University of Kansas Hospital - Kansas City, KS   
Enters information in computer system with correct spelling of patient name and diagnosis, date of birth, social security number employer, guarantor and correct...
From The University of Kansas Hospital - Wed, 21 Jun 2017 21:10:20 GMT - View all Kansas City, KS jobs
          Computer Security Specialist - BTAS - Dayton, OH   
Assist with technical security activities relative to the development, acquisition, and sustainment of aeronautical weapon systems, subsystems, and associated...
From BTAS - Fri, 21 Apr 2017 08:47:47 GMT - View all Dayton, OH jobs
          6月29日(木)のつぶやき   

8月5日:アニメ上映会@東京
9月2日:ちかつくっ
9月16日、17日:京まふ
#地下鉄に乗るっ

— 佐野リヨウタ/魚雷映蔵 (@sgyorai) 2017年6月29日 - 01:18

議員をボランティアでやればよいとする人がいますが、それをやれば宗教団体や労組など無償の奉仕者がいる人か鳩山さんのような大金持ちしか議員になれなくなってしまう。それは間違いでしょう。大衆の支持を集めれば誰でも議員になれる。そして、活動を支持者が支えるのが筋

— 渡邉哲也 (@daitojimari) 2017年6月29日 - 06:45

私は国会議員の数を2倍程度まで増やすべきという立場 17の委員会があり、振り分ければ大した数ではない。逆に議員を減らすと一人一人の議員の権限が拡大し、地方の声も届かなくなる。一票の格差の点からも増やすべきなのです。 健全な民主主義の維持にはコストがかかるのは当然の話

— 渡邉哲也 (@daitojimari) 2017年6月29日 - 06:57

それを決めるのは有権者であり、選挙なんですよ。寝ている議員が無能とは限らず、起きている議員が有能とも限らない。また、年齢も同様 忙しければ忙しいほど睡眠時間が取れないのも事実 twitter.com/nisebito_/stat…

— 渡邉哲也 (@daitojimari) 2017年6月29日 - 07:12

今年の国会の予算委員会が代表格でしたが、審議内容に所轄の官庁が関係していれば大臣は議場に座っていなくちゃいけない。しかし、モリカケばかりで一向に関係質問が出ず、忙しいのに時間が無駄に過ぎてゆくわけです。これは拷問に近いと思いますよ。 twitter.com/nisebito_/stat…

— 渡邉哲也 (@daitojimari) 2017年6月29日 - 07:17

議会の運営は議会運営委員会で決める しかし、野党がこれを守らず、予算委員会で予算の質問をしなかった。RT @nisebito_: 言わんとしていることは分かるのですが、今の国会の議題と進行を見ていると、『この人たちは何をしているのか?』と思うことしきりです。

— 渡邉哲也 (@daitojimari) 2017年6月29日 - 07:18

減らしたらどんどん優秀な人がいなくなりますよ。バカをたくさん集めても仕方ない。RT @nhkuwa: 議員報酬を減らして議員を増やすのは、良いですね❗️ twitter.com/daitojimari/st…

— 渡邉哲也 (@daitojimari) 2017年6月29日 - 07:20

民主党がどれだけダメだったのか わかりやすい ■国の税収55・5兆円前後 jp.reuters.com/article/idJP20…

— 渡邉哲也 (@daitojimari) 2017年6月29日 - 07:33

外国の主権に踏み込んでいる。 ■中国、国家情報法案を採択 国内外での諜報活動など規定 jp.reuters.com/article/china-…

— 渡邉哲也 (@daitojimari) 2017年6月29日 - 07:38

東北の皆さんはどんどん東北ずん子を使って欲しいと思いますし、白石市のようにずん子さんが浸透している町が増えてくれると嬉しいです。その為に必要であれば僕らの持っているノウハウは出し惜しみしません。twitter.com/t_zunko/status…

— 東北ずん子スタンプラリー事務局 (@ZunkoStampRally) 2017年6月28日 - 22:53

宮城県白石市の東北ずん子による「まちづくり」も今年で5年目なので、そこそこ資料は溜まってきました。ほんの一部を記事にまとめてありますので、ご覧ください。
fuboh.jp/zunko/post-793/

— 東北ずん子スタンプラリー事務局 (@ZunkoStampRally) 2017年6月28日 - 23:00

過去に「東北ずん子スタンプラリーと町づくり」というテーマのセミナーとか、各種団体の会合でスピーチしたりしていますので、ご興味ありましたらお話しにいきますのでお声掛けください。お問い合わせはこちらです。
fuboh.jp/zunko/ikenbako/

— 東北ずん子スタンプラリー事務局 (@ZunkoStampRally) 2017年6月28日 - 23:06

地下鉄に乗るっクリアファイル、全員集合のものが完売いたしました!ありがとうございました。麗ちゃんのクリアファイルはまだ若干ながら在庫ございます。 #地下鉄に乗るっ

— 大垣書店★Kotochika御池店 (@kotochika_ogaki) 2017年6月29日 - 09:18

職務と内容がどれだけ多岐にわたっているのかわかっていないのだと思う。 twitter.com/daffodi8528001…

— 渡邉哲也 (@daitojimari) 2017年6月29日 - 11:05

いすみ鉄道社長の意見。「航空会社の準備不足もいけないけど、このやり方はどうなの」わかりやすい。
車いすで飛行機に乗る時は isumi.rail.shop-pro.jp/?eid=2918

— Jun1 Sugiyama / 杉山淳一 (@Skywave_JP) 2017年6月29日 - 13:45

#GUMI生誕祭2017
#おめでとうGUMIちゃん8th
当日には間に合わなかったけど…おめでとう!!大好きです✨ pic.twitter.com/QjyboqAwb3

— 26(にむ)🍆 (@2underworld6) 2017年6月29日 - 13:17

会長も!! #fejp Newsから:アレックス・リン、ニューヨーク大会で出走
tv-asahi.co.jp/formulae/conte… pic.twitter.com/GtJgR073Ln

— フォーミュラE(テレビ朝日) (@formulaE_ex) 2017年6月29日 - 14:44

【巨影速報】次回情報公開日が判明!
新たな巨影、その正体がいよいよ明らかに。

7月6日発売の「週刊ファミ通」に新情報掲載予定です。4日の「先出しファミ通」にもご注目ください。

巨影都市公式サイト⇒… twitter.com/i/web/status/8…

— 「巨影都市」公式 (@knst_PR) 2017年6月29日 - 17:33

「ドーナッツプラント 吉祥寺店」兼「セントラルキッチン」
「できたてをお客さまに提供したい」という思いから夜の20時にオープンし、開店同時に、入れ替わり、立ち替わりお客様が来店されます。... fb.me/1staa64tM

— ドーナッツプラント (@doughnutplant) 2017年6月28日 - 14:29

いい話だなあ……
地方は消滅しない――岐阜県長良川鉄道の場合 bunshun.jp/articles/-/2082 #長良川鉄道 @bunshun_onlineさんから

— Jun1 Sugiyama / 杉山淳一 (@Skywave_JP) 2017年6月29日 - 17:55
          Technology Instructor, Cybersecurity Administration (Quantico, VA) - Embry-Riddle - Virginia   
Software and Systems Academy program to an Embry-Riddle Aeronautical University. Would you like to....
From Embry-Riddle - Wed, 29 Mar 2017 05:52:20 GMT - View all Virginia jobs
          Technology Instructor, Cybersecurity Administration (Camp Lejeune, NC) - Embry-Riddle - North Carolina   
Software and Systems Academy program to an Embry-Riddle Aeronautical University. Would you like to....
From Embry-Riddle - Wed, 29 Mar 2017 05:52:42 GMT - View all North Carolina jobs
          Security Operations Technical Consultant - ServiceNow - Alberta   
Technical Consultant Location(s): Western Canada ServiceNow is changing the way people work. With a service-orientation toward the activities, tasks and
From ServiceNow - Sat, 18 Mar 2017 05:02:29 GMT - View all Alberta jobs
          Surplus Hose Security Ranger schwarz XL   

Surplus Hose Security Ranger schwarz XL SURPLUS steht für hochwertige trendbewusste Freizeit- und Outdoor-Bekleidung. Bereits seit 1983 vers...
CHF 32.90


          Property Manager   
FL-Lakeland, -Maintains property rentals by advertising and filling vacancies; negotiating and enforcing leases; maintaining and securing premises. -Attracts tenants by advertising vacancies; obtaining referrals from current tenants; explaining advantages of location and services; showing units. -Contracts with tenants by negotiating leases; collecting security deposit. -Maintains property by investigating and
          Project Plan Suggestions for IT project   

I have concern with some of these "free" cloud-based project management solutions. Think about the security provided by these solutions. Consider what information could be revealed through non-secure communication or a data breach of the provider, e.g. internal business documents, contact information and privileged information. I feel that free doesn't always mean low cost in the long run.


          Morning News Brief: Health Care Vote Delayed, New Ransomware Attack Spreads   
Copyright 2017 NPR. To see more, visit RACHEL MARTIN, HOST: A massive cyberattack is still taking a toll on computer systems around the world. It all started yesterday in Russia and Ukraine and then spread around Europe and on to the U.S. A number of major international corporations were hit, including the U.S. pharmaceutical-maker Merck, the Russian state oil company Rosneft and the shipping giant Maersk, which caused the Port of New York to shut down as well as ports in Rotterdam and Mumbai. With us now is Matt Tait. He's a security expert based in London and the CEO of Capital Alpha Security. He's with us on Skype. Hey, Matt. MATT TAIT: Hey, how you doing? MARTIN: Doing well. What do we know about who's responsible for this? TAIT: So at the moment, we don't know who's responsible for it. We know how the attack has been taking place. Essentially, a Ukrainian firm that builds accountancy software was compromised yesterday, and they started distributing malware through their auto
          State celebrates YesVets Veteran Hiring Initiative with Flag Day event at Capitol   

Washington State Department of Veterans Affairs and Employment Security Department

Media Release

WDVA Director Lourdes E. Alvarado-Ramos        ESD Commissioner Dale Peinecke

             logocw                                                     

For Immediate Release

Date:              June 15, 2016

Contact:       
DVA Heidi Audette 360-725-2154 or heidia@dva.wa.gov

ESD Janelle Guthrie 360-902-9289 or jguthrie@esd.wa.gov

State celebrates YesVets Veteran Hiring Initiative with Flag Day event at Capitol

OLYMPIA —State Rep. Gina McCabe joined leaders of the Washington State Departments of Veterans Affairs (WDVA) and Employment Security (ESD) at the state Capitol on June 14 to celebrate the success of a new statewide initiative to promote hiring veterans.

The initiative is a result of House Bill 2040, sponsored by 14th Legislative District Representative Gina McCabe in 2015. Originally conceived as a demonstration project to take place in the Yakima Workforce Development Area, YesVets quickly spread across the state and now any employer can sign up and begin hiring veterans through the program.

Since the state launched the YesVets hiring initiative, nearly 200 businesses have signed up to support the initiative and 183 veterans have been hired.

“It’s been amazing to watch what was an idea a group of veterans shared with me in 2015 turn into a valuable and encouraging statewide incentive program,” McCabe said. “To have the program start in the 14th District, where the idea originated, is incredible.

“YesVets truly embodies what Washington’s communities are all about – neighbors helping neighbors in times of need, and recognizing the value our veterans have in the workforce,” she said. “It was an honor to speak at the ceremony in Olympia honoring employers who have said ‘yes’ to hiring veterans. YesVets is only the beginning of my efforts to fulfill the promises made to our military heroes and their families. Ensuring veterans have jobs to return to should be a priority of not only our state, but our nation.”

“Before I joined the Employment Security Department, when I worked in the private sector in aerospace, I always tried to hire veterans because I know they are highly skilled and work hard,” said Employment Security Commissioner Dale Peinecke. “Now at ESD, we have a highly qualified team of veterans who work to connect our state’s veterans with the businesses who need them. We have a challenge for Washington’s employers: Hire a veteran! You won’t regret it.”

“In case you didn’t already know this - Veterans make incredible employees,” said WDVA Director, Lourdes E. “Alfie” Alvarado-Ramos. “Their work ethic, ability to thrive in a team, self-confidence, discipline, and problem solving abilities are absolutely unparalleled.  Add to that the technical skills and abilities that they learned in their military job, and you’ve got a pretty unstoppable workforce.”

The group honored more than 25 businesses and state government agencies who had received their YesVets recognition to date. Each representative present at the event received a WDVA challenge coin.

How it works

YesVets provides public recognition to employers who actively commit to, recruit for and hire veterans into their open positions. By creating a business environment that publically recognizes and values employers who commit to hiring veterans, YesVets hopes to continue decreasing veteran unemployment. The YesVets decal presented to employers who have hired a veteran, also provides a very public way for both customers and veterans to see that the business supports veterans.

Enrolling in YesVets is quick and easy. Employers simply visit www.yesvets.org and enter basic business and contact information into the online form. Then they are contacted directly by their local veterans employment representative who can help them use the new WorkSourceWA.com job match site built and powered by Monster. Once the employer has hired a veteran, their local veteran’s employment representative presents them with their YesVets decal to proudly display on their business window.

More information:     www.yesvets.org

                                 www.dva.wa.gov

                                 www.esd.wa.gov

###


          BitDefender Mobile Security para Android Disponible para Descarga   
BitDefender Mobile Security es una excelente app para Android que funciona de verdad. Hay muchas apps para android de Antivirus, Malware, etc que prometen cosas y no cumplen. Este no es el caso de BitDefender...
          Telegram 1.1.9   
Telegram is a mobile/desktop messaging app with a focus on speed and security. ...
          Technical DBA Team Manager (ITIL, Oracle, Linux, Manager) / HM Revenue and Customs / Newcastle, Staffordshire, United Kingdom   
HM Revenue and Customs/Newcastle, Staffordshire, United Kingdom

Technical DBA Team Manager (Oracle, SQL, Manager)

With 60000+ staff and 50m customers HMRC is one of the biggest organisations in the UK, running the largest digital operation in Government and one of the biggest IT estates in Europe. We have six modern, state-of-the-art digital delivery centres where multiple cross functional agile teams thrive in one of the most dynamic and innovative environments in the UK. We are expanding our CBP Delivery Group and are recruiting into a number of posts within the Revenue & Customs Digital Technology Service in Newcastle.

About the Technical DBA Team Manager (ITIL, Oracle, Linux, Manager) role

This is a hands on technical management role responsible for the availability and performance of production databases within the agreed KPI's and ITSLA.

You will be managing a team of DBA's supporting both critical production databases for a high profile HMRC service as well as engaging in the end to end

project delivery life-cycle.

You will help ensure the effective operations of database platforms, and proper integration with dependent services through effective staffing, monitoring, metrics, and operational excellence.

You must possess strong leadership, be detail-oriented, a quick decision maker, and have a passion for getting things right.

You will excel at managing multiple projects and tasks, and cross-functional communication within internal Delivery Groups and external suppliers in addition to managing teams during high pressure problem resolution.

You will possess strong written and verbal communication skills and be comfortable handling internal stakeholders and external vendor communications.

The ideal candidate will have experience supporting large-scale, massively concurrent, highly available database systems.

You will lead and performance manage a new team of talented and dedicated DBA's focusing on the health of the database tier through the complete system lifecycle.

You will support teams through scheduled maintenance and release deployment activities after hours.

You will share domain and technical expertise, providing technical mentorship and support the development of a virtual team community in database administration.

Your experience with Oracle RDBMS will be critical to your success; however, you should be prepared and knowledgeable and willing to innovate to explore new technology offerings that will help HMRC to adopt any future technology platform pertinent to the systems being supported.

Other information for the Technical DBA Team Manager (ITIL, Oracle, Linux, Manager) role

Essential:

• Educated to degree level

• 7+ years of industry experience

• 4+ years of experience leading DBAs

• Relevant hands-on technical management experience of DBA support teams and skills - troubleshoot, debug, evaluate, and resolve database software defects.

• Strong technical background on DBA domain

• Excellent communication skills, written and oral communication skills;

• Well versed with the ITIL framework

• People and performance management

• Ability to take the initiative, set schedules and prioritise independently

Desirable:

• Oracle Certified Practitioner

• Management level certification

• Project management experience (involving database maintenance project planning,

capacity planning, knowledge transfer plans)

• Agile Development framework and DevOps

• Good understanding of the underpinning Oracle technology stack:

• Oracle GoldenGate

• Oracle RAC One Node

• Oracle Database 12c

• Oracle DBFS

• Oracle Data Guard

• Oracle Enterprise Linux

• Oracle Enterprise Manager

Working Pattern:

It should be noted that this role will require the successful candidate to provide support 24/7 outside of normal working hours as part of an on-call rota.

Must pass basic security checks and undertake National Security Clearance - Level 2- if security clearance at this level is not already in place

CV's should clearly demonstrate how the candidate meets the essential criteria and qualifications stated above.

The post is based in Longbenton with occasional travel/ to other HMRC and Government departments/locations and supplier offices.

To apply for the role of Technical DBA Team Manager (ITIL, Oracle, Linux, Manager), please click 'apply now'.

Employment Type: Permanent

Pay: 57,000 to 63,000 GBP (British Pound)
Pay Period: Annual
Other Pay Info: £57,000 - £63,000

Apply To Job
          Automation Manager (Automation, Cloud, Data Analyst, ITIL) - Cloud Del / HM Revenue and Customs / Telford, Shropshire, United Kingdom   
HM Revenue and Customs/Telford, Shropshire, United Kingdom

Cloud Automation and Orchestration Manager (Automation, Manager, Data Analyst, ITIL) - Cloud Delivery Group

Salary: Competitive

Location: Telford

With 60000+ staff and 50m customers HMRC is one of the biggest organisations in the UK, running the largest digital operation in Government and one of the biggest IT estates in Europe. We have six modern, state-of-the-art digital delivery centres where multiple cross functional agile teams thrive in one of the most dynamic and innovative environments in the UK. We are expanding our Cloud Delivery Group and are recruiting into a number of posts within the Revenue & Customs Digital Technology Service in Telford.

Background

This is an exciting opportunity to join HMRC's Cloud Delivery Group (CDG) where you will be working across one of the biggest IT estates in Europe and supporting a large scale and radical transformation that will have a profound impact for both the customers and the staff of HMRC. As part of the Development, Test and Operate (DTO) Directorate, the Cloud Development team is responsible for translating overarching IT strategy into the technical architecture for CDG. This is a unique opportunity for an experienced Technical Architect to work within HMRC's Cloud domain during a time of significant change and transformation as HMRC drives the focus of IT delivery away from product centric solutions and fully exploits the opportunities that Digital Services and Data Analytics can provide. This position will play a key role in supporting Delivery Groups with the creation and execution of technology roadmaps that will drive HMRC's hugely complex IT estate towards a smaller set of strategic systems whilst decommissioning a large proportion of the legacy.

Role Requirements for the Cloud Automation and Orchestration Manager (Automation, Manager, Data Analyst, ITIL) role

• The Cloud Automation and Orchestration team are responsible for developing and continually evolving a cloud brokerage framework enabling cloud offerings to be easily available and consumed by other teams within the IT department.

• The Cloud Automation and Orchestration team will also be responsible for developing Enterprise architecture templates (archetypes) via the Cloud Brokering platform to enable the standardisation of infrastructure design across HMRC.

We are therefore looking for a seasoned Lead Technical Manager with a hands on background in Hosting and Cloud technology. Candidates should have experience working on large enterprise estates designing and implementing Cloud automation tooling and processes as well as designing and developing templated Cloud environments.

This is a dynamic and changing environment and so we're looking for someone who's up for working in an ever changing technology landscape that is centred on Cloud.

Accountabilities of the Cloud Automation and Orchestration Manager (Automation, Manager, Data Analyst, ITIL):

• Managing a team, a IT specialist

• Manage the teams' personal development and training.

• Lead the development of new Cloud Brokering capabilities as defined by Product Owner.

• Manage the development and delivery of hosting templates archetypes (creation improvement and de-commission) using automation tooling such as Ansible and terraform.

• Ensure the suitable technical resources are available to deliver the automation of archetypes.

• Ensure the development of archetypes that deliver value for money.

• Ensure archetypes and associated assets conform to HMRC technical standards.

• Identify opportunities for continual optimisation of archetypes and make recommendations to the Product Owner.

Tasks of the Cloud Automation and Orchestration Manager (Automation, Manager, Data Analyst, ITIL):

• Lead the continual professional development of your team.

• Lead regular reviews of personnel performance.

• Lead continual service improvement in your area.

• Conduct knowledge transfer and mentoring of CDG staff.

• Ensure collaboration between Automation and Orchestration in delivery of Cloud archetypes.

• Maintain knowledge of the underpinning product and tooling roadmaps.

• Lead on the design and development of archetypes.

• Prioritise workload for archetype delivery.

• Lead on the compliance of HMRC technical and security standards within your area.

• Work closely with Cloud Broker Product Owner to ensure development activities are aligned with Cloud Broker operations and that new developments are transitioned appropriately.

• Engage in personal development to maintain and enhance knowledge.

• Deputise for Head of Cloud Development as required.

Essential Criteria for the Cloud Automation and Orchestration Manager (Automation, Manager, Data Analyst, ITIL)

You will need to demonstrate within your application the following essential experience -

• Working knowledge of Public Cloud offerings (AWS, Azure etc.) and building enterprise environments on them.

• Working knowledge of the following tools: Puppet, Ansible, Jenkins, and Terraform.

• A good understanding or working knowledge of Container technologies such as Docker

• A good understanding or working knowledge of Cloud Brokering technology and tools.

• Demonstrate an ability to communicate across IT disciplines to get the best solution and ensure nothing gets overlooked that could jeopardise performance or the integrity of the existing IT estate.

• Proven experience in developing Technical Capability within an organisation. Including empowering, supporting and developing staff to achieve the highest performance standards.

• Able to work effectively in pressurised situations and can be relied upon to deliver, irrespective of circumstances.

• Able to work in highly ambiguous situations and without supervision

• The successful applicant for this role will need to be eligible for and willing to undergo SC clearance following appointment in to the post.

Desirable Experience for the Cloud Automation and Orchestration Manager (Automation, Manager, Data Analyst, ITIL) role

• Experience of working in an agile environment and experience with agile methodologies such as TDD, Scrum, Kanban.

• Experience or awareness of ITIL ways of working

Key leadership behaviours of the Cloud Automation and Orchestration Manager (Automation, Manager, Data Analyst, ITIL):

• Changing and Improving

• Leading and Communicating

• Delivering at Pace

• Delivering Value for Money

To apply for the role of Cloud Automation and Orchestration Manager (Automation, Manager, Data Analyst, ITIL), please click the 'apply now button'.

Employment Type: Permanent

Pay: 58,187 to 64,312 GBP (British Pound)
Pay Period: Annual
Other Pay Info: £58,187 - £64,312

Apply To Job
          Tencent PC Manager 12.3.26448.901   
Tencent PC Manager offers a user-friendly all-in-one antivirus suite that boasts a large security cloud base for detecting and neutralizing viruses, spyware, malware, rootkits, and other threats to yo...
          Linux/Windows Software Support Engineer - Weymouth - SC Cleared / Square One Resources / Weymouth, Dorset, United Kingdom   
Square One Resources/Weymouth, Dorset, United Kingdom

Linux/Windows Software Support Engineer - Weymouth - SC Cleared

Square One are looking for a Linux/Windows Software Support Engineer to come on board for a 3 month contract based in Weymouth.

The Purpose of the Role:

Support the software development teams for the configuration, customization and administration of the Operating Systems (Linux/Windows) and virtualisation environment of the development, test and target platforms in use for delivering large solutions. As a secondary purpose, to support the teams in designing and programming functionalities for the final software solution during administration activities down time.

Essential

Educated to Degree level or equivalent in software, computer science or software related discipline

Certified Linux (RHEL) administrator with at least 3 years' experience

Certified Windows Administrator with at least 3 years' experience

A minimum of 3 years' experience in the following areas:

o Virtualisation platforms using hypervisors/VMs in a multi-OS configuration (Linux/Windows)

o Fine customisation of VMs in a complex networking environment

o PC-Over-IP in virtualised environment

o Network and switch configuration/administration

Experience with Packer and Vagrant.

An understanding of software design methodologies (UML) and programming languages (C++ or Java)

Self-starter and able to learn on the fly

The successful candidate must be capable of achieving security (SC) clearance as a minimum

Desirable

Exposure to Data Distribution Service (DDS)

Commercial experience of UML and OO design methodologies

Commercial experience of Real Time designs, programming concepts and design patterns.

Proficiency in high level programming language (C++ or Java).

Experience of specification development, verification and validation.

Experience of line management or mentoring

Background in defence

Undertake all administration activities for the development, test and target environments of large projects covering:

o Operation Systems administration (Linux/Windows)

o Virtualisation platform configuration (hypervisor, Virtual Machine )

o Networking aspects (Switches, drivers, TCP or UDP IP )

o PC-Over-IP configuration

Contribute to the definition of the system network and topology configuration in support of the software architect.

When required on projects, design, code and unit test software in accordance with the company's procedure and project specific requirements.

Estimate the hours and duration required for own tasks.

Support planning input to project schedules and deliver own work commensurate with those plans.

Contribute information to project reports.

Share Linux/Virtualisation/Networking expertise with the rest of the development team.

This is a 3 month contract based in Weymouth starting immediately.

Linux/Windows Software Support Engineer - Weymouth - SC Cleared

Employment Type: Contract
Duration: 3 months
Other Pay Info: Market rates

Apply To Job
          Oracle DBA (Support, Oracle, Linux) / HM Revenue and Customs / Newcastle, Staffordshire, United Kingdom   
HM Revenue and Customs/Newcastle, Staffordshire, United Kingdom

Oracle Database Administrator (Support, Oracle, Linux)

With 60000+ staff and 50m customers HMRC is one of the biggest organisations in the UK, running the largest digital operation in Government and one of the biggest IT estates in Europe. We have six modern, state-of-the-art digital delivery centres where multiple cross functional agile teams thrive in one of the most dynamic and innovative environments in the UK. We are expanding our CBP Delivery Group and are recruiting into a number of posts within the Revenue & Customs Digital Technology Service in Newcastle.

About the Oracle Database Administrator (Support, Oracle, Linux) role

The database administrator will be responsible for the implementation, configuration, maintenance, and performance of critical Oracle systems to ensure the availability and consistent performance of our corporate applications.

Working as part of a team, the successful candidate will support the development and sustainment of the databases, ensuring operational readiness (security, health and performance), executing data loads, performing monitoring and support of both development and production support teams.

This is a technical role requiring solid technical skills, excellent written and interpersonal skills, the ability to work effectively both independently and within a team environment. Sharing knowledge/skills and developing productive working relationships, as well as being able to use own initiative. A flexible team player with a pro-active outlook to delivery and the rapidly changing working environment.

Responsibilities of the Oracle Database Administrator (Support, Oracle, Linux)

Manage databases through multiple product lifecycle environments, from development to mission-critical production systems to decommissioning on both virtual and physical midrange systems

Configure and maintain database servers and processes, including monitoring of system health and performance, to ensure high levels of performance, availability, and security.

Support development teams to ensure development and implementation support efforts meet integration and performance expectations.

Independently analyse, solve, and correct issues in real time, providing problem resolution end-to-end.

Refine and automate regular processes, track issues, and document changes.

Perform scheduled maintenance and support release deployment activities after hours.

Other Information about the Oracle Database Administrator (Support, Oracle, Linux) role

Essential:

2 years+ experience in database management and performance tuning and optimisation, using native monitoring, maintenance and troubleshooting tools, backup restores and recovery models on virtual machines and physical midrange systems.

A good working knowledge of Oracle Enterprise Linux operating systems running on Oracle 12c.

Experience in building virtual multi-tenant databases within on a Linux virtual platform to include database upgrade and regular patching and maintenance.

A good knowledge of Oracle GRID Infrastructure plus Oracle Enterprise Manager(OEM).

Has undertaken and can demonstrate appropriate Oracle technical training for the role.

Desirable:

• BSC degree in computer science or equivalent.

• Oracle GoldenGate

• Oracle RAC One Node

• Oracle DBFS

• Oracle Data Guard

• Netbackup

Training for the desirable criteria will be provided for the right candidate who meets the essential criteria.

Working Pattern:

This post is full time however applicants whom would like to work an alternative working pattern - are welcome to apply. All requests will be considered, although the preferred working pattern may not be available.

It should be noted that this role will require the successful candidate to provide support 24/7 outside of normal working hours as part of an on-call rota.

Must pass basic security checks and undertake National Security Clearance - Level 2- if security clearance at this level is not already in place

CV's should clearly demonstrate how the candidate meets the essential criteria and qualifications stated above.

Sift / Interviews

Applicants will be sifted based upon demonstration of the essential criteria.

The post is based in Newcastle with occasional travel/ to other HMRC and Government departments/locations and supplier offices.

To apply for the role of Oracle Database Administrator (Support, Oracle, Linux), please click 'apply now'.

Employment Type: Permanent

Pay: 37,537 to 41,488 GBP (British Pound)
Pay Period: Annual
Other Pay Info: £37,537 - £41,488

Apply To Job
          Infrastructure Security Engineer/Security Operations/SIEM Specialist - / Nexere Consulting Limited / Edinburgh, Midlothian, United Kingdom   
Nexere Consulting Limited/Edinburgh, Midlothian, United Kingdom

SIEM Specialist - Splunk - Senior Infrastructure Security Engineer/Security Operations/Information Security Analyst - Scripting - Cyber Security - Banking - Edinburgh

Great opportunity for Senior IT Security Analyst/SIEM Specialist to work in a senior position as part of a specialised Security Operations team. Be part of a bank that are leading the way in IT Cyber Security and are investing heavily into a new 3 year strategic Cyber Security programme.

Responsibilities include:

- Responsible for the delivery of key services within security operations within a large enterprise with multiple sites

- Technical support and development of SIEM - Splunk, QRadar, Arcsight, Logrhythm, Solar winds

- SIEM administration and configuration to SME level

- Provide advice and guidance around IT Cyber Security related best practice

- Engage with and provide consultation at senior management level.

- Scripting capabilities, Python, Perl, Shell etc

- To provide knowledge and deep understading of other technologies such as Firewalls, proxies etc

Please note that we are grateful for every application, only the suitable will be contacted. Thank you for your time and interest in NEXERE.

SIEM Specialist - Splunk - Senior Infrastructure Security Engineer/Security Operations/Information Security Analyst - Scripting - Cyber Security - Banking - Edinburgh

Employment Type: Permanent

Pay: 55,000 to 65,000 GBP (British Pound)
Pay Period: Annual
Other Pay Info: Excellent benefits inc Pension, Bonus, PMI + more

Apply To Job
          IOS Developer FTSE 100 Organisation - Knutsford, Cheshire. / Nigel Frank International / Knutsford, Cheshire, United Kingdom   
Nigel Frank International/Knutsford, Cheshire, United Kingdom

IOS Developer FTSE 100 Organisation - Knutsford, Cheshire.

An innovative FTSE 100 Tech leading client are looking for several IOS developers to join their awesome new Cheshire based Tech Hub. This client prides themselves on their innovation, leading the market in technological advancement. They have changed the way that they design and implement software ensuring that customers are their main focus. They look to tech companies like Apple for inspiration, wanting to capture the vibe and environment which makes such businesses so great at satisfying their customers and staff alike.

Why you would fit into this role

Essential:

-Recognised as an expert in following:

IOS application development

Git

IOS unit testing

-Proven ability of working in an agile team following Scrum methodology, and leading a development team.

-Proven track record of successfully using different software development methodologies TDD, BDD

Desirable:

-Knowledge of application security principals, Java cryptography and secure coding techniques.

-Knowledge of C/C++

-Knowledge of HTML5, Angular, Ionic

-Financial services experience.

The benefits of the role

-Competitive salary.

-10% pension before contribution.

-25 days holiday.

-life insurance.

-Flexible working hours.

You will be based in the new Cheshire Tech Hub which boasts a fantastic gym, highly subsidised restaurant with onsite chefs, a drycleaners and coffee shops. Access to 5 a side football along with fitness boot camps means that you won't have the hassle of travelling to keep fit. An on-site florist sweetshop and day-care means that all eventualities are covered.

If this sounds like an environment that you would fit into well please send your application to Harry Lees.

I understand the need for discretion and would welcome the chance to speak to any IOS candidates that are considering a new career or job either now or in the future.

Pearson Frank International Ltd is acting as an Employment Agency in relation to this vacancy.

IOS application development/Git/IOS unit testing/Scrum methodology/TDD/Test Driven Development/BDD/Behavior Driven Development/Continuous Integration/Java cryptography/C/C++/HTML5/Angular/Ionic/Knutsford/Cheshire/North West/Manchester/Lancashire/Liverpool/Warrington/Stockport/UK Wide.

Nigel Frank International is acting as an Employment Agency in relation to this vacancy.

Employment Type: Permanent
Other Pay Info: Pension, Flextime, Life insurance

Apply To Job
          OSCE admits Ukrainian side violating agreement on transportation of heavy weapons   
Special monitoring mission of the OSCE has recorded a violation of the agreement on the withdrawal of heavy weapons from the contact line in the Donbass, by Ukrainian security officials. In the Ukraine government-controlled areas, the mission has noted that three towed antitank guns MT-12, caliber of 100 millimeters, are missing- as stated by a representative of the OSCE.
          Well-trained: US senators propose another $558M for Israeli missile defense   
A Senate committee markup of the 2018 Pentagon funding bill would give $705 million to Israeli "cooperative" missile defense programs, a $588 million increase from the budget request made by President Donald Trump. The Senate Armed Services Committee draft of the 2018 National Defense Authorization Act (NDAA) would allocate $268.5 million for research, development, testing and evaluation for "multi-tiered missile defense systems" and another $290 million for purchasing them. The American Israel Public Affairs Committee (AIPAC) identified the systems that would benefit from the funding as Iron Dome, David's Sling, Arrow-2 and Arrow-3. "These funds will help Israel defend its citizens against rocket and missile threats, and contribute to America's missile defense programs," AIPAC said Thursday, in a statement thanking the Senate and House armed services committees. The David's Sling weapon system and the Arrow program would receive $120 million apiece, while $92 million would go towards Israeli procurement of Tamir interceptors for the Iron Dome short-range system through co-production in the United States, according to the Senate committee markup. The 2018 Senate proposal would be a $105 million increase over the funds approved for 2017, AIPAC noted. "As Israel faces dramatically rising security challenges, AIPAC urges inclusion of these vital funds in the final versions of the Fiscal Year 2018 defense authorization and appropriations bills," the lobbying group said. Comment: Israel would have little to no 'dramatically rising security challenges' if it minded its business, didn't force settlements on others' land, wasn't committing Palestinian genocide and didn't bomb Syria over false provocation. But that is just not how pathocrats operate.
          BEST OF THE WEB: New York Times retracts Russia-gate canard...finally!   
Exclusive: A founding Russia-gate myth is that all 17 U.S. intelligence agencies agreed that Russia hacked into and distributed Democratic emails, a falsehood that The New York Times has belatedly retracted, reports Robert Parry. The New York Times has finally admitted that one of the favorite Russia-gate canards - that all 17 U.S. intelligence agencies concurred on the assessment of Russian hacking of Democratic emails - is false. On Thursday, the Times appended a correction to a June 25 article that had repeated the false claim, which has been used by Democrats and the mainstream media for months to brush aside any doubts about the foundation of the Russia-gate scandal and portray President Trump as delusional for doubting what all 17 intelligence agencies supposedly knew to be true. In the Times' White House Memo of June 25, correspondent Maggie Haberman mocked Trump for "still refus[ing] to acknowledge a basic fact agreed upon by 17 American intelligence agencies that he now oversees: Russia orchestrated the attacks, and did it to help get him elected." However, on Thursday, the Times - while leaving most of Haberman's ridicule of Trump in place - noted in a correction that the relevant intelligence "assessment was made by four intelligence agencies — the Office of the Director of National Intelligence, the Central Intelligence Agency, the Federal Bureau of Investigation and the National Security Agency. The assessment was not approved by all 17 organizations in the American intelligence community."
          Gallup poll: The happiest and unhappiest nations in the world   
It's a tough world out there, a new report on the emotional well-being of people worldwide shows. In the survey, pollsters asked nearly 150,000 people in 142 countries to rate their levels of emotional positivity and negativity. They found that people's reports of their positive emotions have stayed relatively constant over the past 10 years, but reports of negative emotions have slowly crept up, reaching an all-time high in 2016, according to the Gallup Global Emotions Report. The report also revealed that the world's happiest country is Paraguay, which placed first for the second year in a row. The least happy country was Yemen. Comment: No surprise considering the atrocities committed on the Yemeni people by Saudi Arabia and the U.S. 'Yemen on brink of abyss': 19 months of hell, 7,000+ killed, 37K injured, 2.1M displacedAs Saudi-led, US backed war on Yemen rages on, children continue to starve and die Researchers conducted the survey over the phone or by face-to-face interviews with people ages 15 or older. Syria, the least happy country in 2015, was not included this year because its ongoing civil war was a security issue, Gallup reported. To learn about participants' positive experiences, pollsters asked people questions including whether they felt well-rested, respected and enjoyed themselves the day before. For negative experiences, they asked about feeling physical pain, worry, sadness, stress and anger the day before. Gallup used these results to formulate an index score for each country.
          US slams Damascus as OPCW says sarin used in April Syria attack, silent on blame   
The US State Department is scolding the Syrian government, as the OPCW has reportedly determined that sarin, a banned nerve gas, was what killed dozens of Syrians in northern Idlib province on April 4. Members of the UN's chemical weapons watchdog, the Organisation for the Prohibition of Chemical Weapons (OPCW), reviewed the fact-finding mission (FFM) report at The Hague, Netherlands, on Thursday, but it was not released to the public, Reuters reported. The news outlet obtained a copy of the report that relied on eyewitness interviews and samples previously collected from the site of the alleged chemical attack in the town of Khan Sheikhoun. The FFM was reportedly unable to make it to the location in question because of security issues. "A large number of people, some of whom died, were exposed to sarin or a sarin-like substance," the summary of the report said.
          (USA-FL-Clearwater) Registered Nurse (RN) - Home Health (8a to 5p)   
Home Health  –  Registered Nurse (RN)  –  Pinellas / Clearwater  We're currently seeking a talented Registered Nurse for a contract opportunity, providing in-home healthcare for adult and geriatric patients. Our client is a well established, reputable home health organization serving Pinellas County. Ideal candidates have 2+ years of recent homecare RN experience, availability to work 3+ days (24-36 hrs per wk), and are able to drive between visits in Pinellas (within reason; most patients located S. of Roosevelt)! Hours are 8a to 5p, and we're offering $25+ per hour (DOE).  This is an immediate opening -- don't let it pass you by! If you're interested or have questions, please don't hesitate to call and/or apply today. We can be reached at 813-405-1773and look forward to hearing from you! **Benefits for the Registered Nurse (RN) Home Health Position:** * Top Compensation and Weekly Pay w/ Direct Deposit * Flexible Schedules – Full Time, Part Time, PRN, Perm Positions * Generous Benefits Including: Medical, Dental, Vision, and 401K * Referral Bonus Program and Guaranteed Hours (based on opportunity) * The security of over 25 years of experience in the industry! Our strong, long-term connections—with the most admired companies—mean a new world of possibilities for your career. Partnering with ReadyNurse is the kind of proactive move that can put you on an inside track, give you access to more career opportunities, and get you that dream job faster than going at it alone.  Qualifications for the Registered Nurse (RN) Home Health Position: * Prepare patients for examination according to setting and specialty * Perform preliminary physical tests, take blood pressure, weight, and temp, reporting patient history summary * Ability to work with other personnel and develop/maintain good relations * Demonstrate thorough knowledge of care and current clinical practice, treatments and interventions, specific to position specialty. * Ability to understand and monitor applicable regulations, policies and procedures. * Maintain a safe and clean working environment by complying with rules and regulations. * Ability to make independent decisions, follow instructions, and to accept constructive criticism. * Ability to deal tactfully with patients, residents, students, family members, visitors, government agencies/personnel and the general public, according to position setting. * Ability to maintain the care and use of supplies, equipment, etc. * Maintain patient confidence and protect operations by keeping information confidential. * Demonstrate proficiency in written/verbal skills in English language * Sufficient computer skills required to perform duties.  **Requirements for the Registered Nurse (RN) Home Health Position:** * Minimum 1 year of recent Registered Nurse experience inhomehealthcare  * Minimum 1 year of Registered Nurse experience and IV nursing experience  * Registered Nurse​ license (Florida); Graduate from accredited Nursing School / Program * CPR/BLS Certification; PE/TB/MMR/Varicella/TDAP and Professional References  **About ReadyNurse:** ReadyNurse has been connecting talented clinicians with great facilities for over 25 years. Our goal is to find a nursing job that offers the pay, flexibility and the lifestyle that you desire. Whether you are interested in contract opportunities or just picking up an extra shift, our specialists are available around the clock to ensure that you get the assistance and support you deserve!   **The secret to our success is simple:** our management team sets extraordinarily high standards, and we refuse to compromise on the quality of our personnel or the caliber of service that we give to our clients and employees. Our 30 locally run offices allow us to provide personalized support in each community while still benefiting from the national resources and assistance of our larger CareerStaff Unlimited family.  Thank you!   Jessica Wiksten – Recruiter  ReadyNurse, a CareerStaff Unlimited Company **P: 813.405.1775 | 888.802.8687 | F:** 505.468.9141 Jessica.Wiksten@ReadyNurse.com | www.ReadyNurse.com  Genesis HealthCare, LLC and all affiliated entities are proud to practice Equal Employment Opportunity and Affirmative Action (EEO/AA) 
          (USA-GA-Milledgeville) Registered Nurse (RN) - Home Health Visits   
Registered Nurse RN - Oasis Home Health  We are currently seeking to hire a qualified Registered Nurse (RN) for a Full-Time Home Health position inMilledgeville, GA. This position will cover the general areas of Putnam, Baldwin, and Wilkonson Counties. This is an immediate opening and all interested applicants should be available to begin opportunity within a 2-3 week time-frame. Hours for this position are typically Monday-Friday 8:00 AM - 5:00 PM with possible on - call one night per week. Applicants must have a minimum of 12 months of recent Home Health experience and must be comfortable with Oasis. This is an 13 week contract position with the strong possibility to extend.  This position will paid on an hourly basis so that the candidate is compensated for drive time. Applicants will be paid $35-$40/hour plus mileage based on years of experience. If you have questions, are interested, or would like to refer a friend, please apply or call us ASAP. Thanks so much - we hope to hear from you soon! Benefits of ReadyNurse Staffing Services * Competitive Compensation: $35 to $40 per hour DOE * Flexible Schedules and Weekly Pay with Direct Deposit * Immediate Openings and Orientation Offered by Client * Medical, Dental, Vision Insurance and Referral Bonuses * The security of over 25 years of experience in the industry! Position Qualifications * Ability to work with other personnel and develop/maintain good relations * Demonstrate thorough knowledge of nursing care and current clinical practice, treatments and interventions, specific to position specialty. * Ability to understand and monitor applicable regulations, policies and procedures. * Maintain a safe and clean working environment by complying with rules and regulations. * Ability to deal tactfully with government agencies and personnel, according to position setting. * Ability to maintain the care and use of supplies, equipment, etc. * Demonstrate proficiency in written/verbal skills in English language * Sufficient computer skills required to perform duties.  Certification / Requirements * 1 to 3 years of Oasis Home Visits experience * Nursing Degree from an accredited institution. * Current CPR/BLS Certification, Physical, TB Test * Current RN license by the state of practice  **About ReadyNurse:** ReadyNurse has been connecting talented clinicians with great facilities for over 25 years. Our goal is to find a nursing job that offers the pay, flexibility and the lifestyle that you desire. Whether you are interested in contract opportunities or just picking up an extra shift, our specialists are available around the clock to ensure that you get the assistance and support you deserve!   **The secret to our success is simple:** our management team sets extraordinarily high standards, and we refuse to compromise on the quality of our personnel or the caliber of service that we give to our clients and employees. Our 30 locally run offices allow us to provide personalized support in each community while still benefiting from the national resources and assistance of our larger CareerStaff Unlimited family.    Thank you! Simone Ceasar - Staffing Manager ReadyNurse, a CareerStaff Unlimited Company **Phone: 770-394-6986 | Fax:** 866-384-1426 Simone.Ceasar@careerstaff.com | www.ReadyNurse.com Genesis HealthCare, LLC and all affiliated entities are proud to practice Equal Employment Opportunity and Affirmative Action (EEO/AA)
          (USA-GA-Fayetteville) Registered Nurse (RN) - Home Health Visits   
Registered Nurse RN - Oasis Home Health  We are currently seeking to hire a qualified Registered Nurse (RN) for a Full-Time Home Health position inFayetteville, GA. This position will cover the general areas ofFayetteville. This is an immediate opening and all interested applicants should be available to begin opportunity within a 2-3 week time-frame. Hours for this position are typically Monday-Friday 8:00 AM - 5:00 PM with possible on - call one night per week. Applicants must have a minimum of 12 months of recent Home Health experience and must be comfortable with Oasis. This is an 13 week contract position with the strong possibility to extend.  This position will paid on an hourly basis so that the candidate is compensated for drive time. Applicants will be paid $35-$40/hour plus mileage based on years of experience. If you have questions, are interested, or would like to refer a friend, please apply or call us ASAP. Thanks so much - we hope to hear from you soon! Benefits of ReadyNurse Staffing Services * Competitive Compensation: $35 to $40 per hour DOE * Flexible Schedules and Weekly Pay with Direct Deposit * Immediate Openings and Orientation Offered by Client * Medical, Dental, Vision Insurance and Referral Bonuses * The security of over 25 years of experience in the industry! Position Qualifications * Ability to work with other personnel and develop/maintain good relations * Demonstrate thorough knowledge of nursing care and current clinical practice, treatments and interventions, specific to position specialty. * Ability to understand and monitor applicable regulations, policies and procedures. * Maintain a safe and clean working environment by complying with rules and regulations. * Ability to deal tactfully with government agencies and personnel, according to position setting. * Ability to maintain the care and use of supplies, equipment, etc. * Demonstrate proficiency in written/verbal skills in English language * Sufficient computer skills required to perform duties.  Certification / Requirements * 1 to 3 years of Oasis Home Visits experience * Nursing Degree from an accredited institution. * Current CPR/BLS Certification, Physical, TB Test * Current RN license by the state of practice  **About ReadyNurse:** ReadyNurse has been connecting talented clinicians with great facilities for over 25 years. Our goal is to find a nursing job that offers the pay, flexibility and the lifestyle that you desire. Whether you are interested in contract opportunities or just picking up an extra shift, our specialists are available around the clock to ensure that you get the assistance and support you deserve!   **The secret to our success is simple:** our management team sets extraordinarily high standards, and we refuse to compromise on the quality of our personnel or the caliber of service that we give to our clients and employees. Our 30 locally run offices allow us to provide personalized support in each community while still benefiting from the national resources and assistance of our larger CareerStaff Unlimited family.    Thank you! Simone Ceasar - Staffing Manager ReadyNurse, a CareerStaff Unlimited Company **Phone: 770-394-6986 | Fax:** 866-384-1426 Simone.Ceasar@careerstaff.com | www.ReadyNurse.com Genesis HealthCare, LLC and all affiliated entities are proud to practice Equal Employment Opportunity and Affirmative Action (EEO/AA)
          (USA-GA-Duluth) Registered Nurse (RN) - Oasis / Home Health   
Registered Nurse RN - Oasis Home Health Care   We are currently seeking to hire a qualified Registered Nurse (RN) for a Full-Time Oasis Home Health position in theDuluth, GAarea. Our client is a leading national home health organization. They provide the care that is best for their patients, whether that is home-based recovery and rehabilitation after an operation or injury, chronic disease management, palliative or hospice care! Hours for this position are generally Monday-Friday 8am to 5pm with possible on-call and rotating weekends. Applicants must have a minimum of 12 months of recent Oasis and Home Health experience. This position is paid on an hourly basis so that you are compensated for drive time in-between visits. The pay range is $35 to $39+/hour plus mileage based on years of experience. If you have questions, are interested, or would like to refer a friend, please apply or call us ASAP. Thanks so much - we hope to hear from you soon! **Benefits for the Oasis Home Health RN Registered Nurse Position:** * Competitive Compensation: $35 to $40 per hour DOE * Flexible Schedules and Weekly Pay with Direct Deposit * Immediate Openings and Orientation Offered by Client * Medical, Dental, Vision Insurance and Referral Bonuses * The security of over 25 years of experience in the industry! **Qualifications for the Oasis Home Health RN Registered Nurse Position:** * Ability to work with other personnel and develop/maintain good relations * Demonstrate thorough knowledge of nursing care and current clinical practice, treatments and interventions, specific to position specialty. * Ability to understand and monitor applicable regulations, policies and procedures. * Maintain a safe and clean working environment by complying with rules and regulations. * Ability to deal tactfully with government agencies and personnel, according to position setting. * Ability to maintain the care and use of supplies, equipment, etc. * Demonstrate proficiency in written/verbal skills in English language * Sufficient computer skills required to perform duties.  **Requirements for the Oasis Home Health RN Registered Nurse Position:** * 1 to 3 years of Oasis / Home Visits experience * Nursing Degree from an accredited institution. * Current CPR/BLS Certification, Physical, TB Test * Current RN license by the state of practice  **About ReadyNurse:** ReadyNurse has been connecting talented clinicians with great facilities for over 25 years. Our goal is to find a nursing job that offers the pay, flexibility and the lifestyle that you desire. Whether you are interested in contract opportunities or just picking up an extra shift, our specialists are available around the clock to ensure that you get the assistance and support you deserve!   **The secret to our success is simple:** our management team sets extraordinarily high standards, and we refuse to compromise on the quality of our personnel or the caliber of service that we give to our clients and employees. Our 30 locally run offices allow us to provide personalized support in each community while still benefiting from the national resources and assistance of our larger CareerStaff Unlimited family.    Thank you! Madison Junk - Staffing Coordinator CareerStaff Unlimited - A Genesis Company Madison.Junk@careerstaff.com **P: 770-394-6986 I F:** 866-384-1426 Genesis HealthCare, LLC and all affiliated entities are proud to practice Equal Employment Opportunity and Affirmative Action (EEO/AA)
          (USA-GA-Rome) Registered Nurse (RN) - Home Health Visits   
Registered Nurse RN - Oasis Home Health  We are currently seeking to hire a qualified Registered Nurse (RN) for a Full-Time Home Health position inRome, GA. This position will cover the general areas ofFloyd County. This is an immediate opening and all interested applicants should be available to begin opportunity within a 2-3 week time-frame. Hours for this position are typically Monday-Friday 8:00 AM - 5:00 PM with possible on - call one night per week. Applicants must have a minimum of 12 months of recent Home Health experience and must be comfortable with Oasis. This is an 8 week contract position with the strong possibility to extend.  This position will paid on an hourly basis so that the candidate is compensated for drive time. Applicants will be paid $35-$40/hour plus mileage based on years of experience. If you have questions, are interested, or would like to refer a friend, please apply or call us ASAP. Thanks so much - we hope to hear from you soon! Benefits of ReadyNurse Staffing Services * Competitive Compensation: $35 to $40 per hour DOE * Flexible Schedules and Weekly Pay with Direct Deposit * Immediate Openings and Orientation Offered by Client * Medical, Dental, Vision Insurance and Referral Bonuses * The security of over 25 years of experience in the industry! Position Qualifications * Ability to work with other personnel and develop/maintain good relations * Demonstrate thorough knowledge of nursing care and current clinical practice, treatments and interventions, specific to position specialty. * Ability to understand and monitor applicable regulations, policies and procedures. * Maintain a safe and clean working environment by complying with rules and regulations. * Ability to deal tactfully with government agencies and personnel, according to position setting. * Ability to maintain the care and use of supplies, equipment, etc. * Demonstrate proficiency in written/verbal skills in English language * Sufficient computer skills required to perform duties.  Certification / Requirements * 1 to 3 years of Oasis Home Visits experience * Nursing Degree from an accredited institution. * Current CPR/BLS Certification, Physical, TB Test * Current RN license by the state of practice  **About ReadyNurse:** ReadyNurse has been connecting talented clinicians with great facilities for over 25 years. Our goal is to find a nursing job that offers the pay, flexibility and the lifestyle that you desire. Whether you are interested in contract opportunities or just picking up an extra shift, our specialists are available around the clock to ensure that you get the assistance and support you deserve!   **The secret to our success is simple:** our management team sets extraordinarily high standards, and we refuse to compromise on the quality of our personnel or the caliber of service that we give to our clients and employees. Our 30 locally run offices allow us to provide personalized support in each community while still benefiting from the national resources and assistance of our larger CareerStaff Unlimited family.    Thank you! Simone Ceasar - Staffing Manager ReadyNurse, a CareerStaff Unlimited Company **Phone: 770-394-6986 | Fax:** 866-384-1426 Simone.Ceasar@careerstaff.com | www.ReadyNurse.com Genesis HealthCare, LLC and all affiliated entities are proud to practice Equal Employment Opportunity and Affirmative Action (EEO/AA)
          (USA-GA-Winder) Registered Nurse (RN) - Home Health Visits   
Registered Nurse RN - Oasis Home Health  We are currently seeking to hire a qualified Registered Nurse (RN) for a Full-Time Home Health position inWinder, GA. This position will cover the general areas ofWinder and Buford. This is an immediate opening and all interested applicants should be available to begin opportunity within a 2-3 week time-frame. Hours for this position are typically Monday-Friday 8:00 AM - 5:00 PM with possible on - call. Applicants must have a minimum of 12 months of recent Home Health experience and must be comfortable with Oasis. This is an 8 week contract position with the strong possibility to extend.  This position will paid on an hourly basis so that the candidate is compensated for drive time. Applicants will be paid $35-$40/hour plus mileage based on years of experience. If you have questions, are interested, or would like to refer a friend, please apply or call us ASAP. Thanks so much - we hope to hear from you soon! Benefits of ReadyNurse Staffing Services * Competitive Compensation: $35 to $40 per hour DOE * Flexible Schedules and Weekly Pay with Direct Deposit * Immediate Openings and Orientation Offered by Client * Medical, Dental, Vision Insurance and Referral Bonuses * The security of over 25 years of experience in the industry! Position Qualifications * Ability to work with other personnel and develop/maintain good relations * Demonstrate thorough knowledge of nursing care and current clinical practice, treatments and interventions, specific to position specialty. * Ability to understand and monitor applicable regulations, policies and procedures. * Maintain a safe and clean working environment by complying with rules and regulations. * Ability to deal tactfully with government agencies and personnel, according to position setting. * Ability to maintain the care and use of supplies, equipment, etc. * Demonstrate proficiency in written/verbal skills in English language * Sufficient computer skills required to perform duties.  Certification / Requirements * 1 to 3 years of Oasis Home Visits experience * Nursing Degree from an accredited institution. * Current CPR/BLS Certification, Physical, TB Test * Current RN license by the state of practice  **About ReadyNurse:** ReadyNurse has been connecting talented clinicians with great facilities for over 25 years. Our goal is to find a nursing job that offers the pay, flexibility and the lifestyle that you desire. Whether you are interested in contract opportunities or just picking up an extra shift, our specialists are available around the clock to ensure that you get the assistance and support you deserve!   **The secret to our success is simple:** our management team sets extraordinarily high standards, and we refuse to compromise on the quality of our personnel or the caliber of service that we give to our clients and employees. Our 30 locally run offices allow us to provide personalized support in each community while still benefiting from the national resources and assistance of our larger CareerStaff Unlimited family.    Thank you! Simone Ceasar - Staffing Manager ReadyNurse, a CareerStaff Unlimited Company **Phone: 770-394-6986 | Fax:** 866-384-1426 Simone.Ceasar@careerstaff.com | www.ReadyNurse.com Genesis HealthCare, LLC and all affiliated entities are proud to practice Equal Employment Opportunity and Affirmative Action (EEO/AA)
          (USA-GA-Atlanta) Registered Nurse (RN) - Home Health Visits   
Registered Nurse RN - Oasis Home Health Care  We are hiring qualified Registered Nurse(s) (RN) for an Oasis Home Visits position(s) in theAtlanta, GAarea. This is a reputable, well established Home Health organization with locations nationwide. This client is in need of a full-time position with an immediate opening (minimum 13 weeks / extendable).Ideal candidates are local, and have at least 6-12 months of recent Oasis Visits Nursing experience.  This position is paid on an hourly basis so that you are compensated for drive time in-between visits. The pay range is $35 to $39+/hour plus mileage based on years of experience. If you have questions, are interested, or would like to refer a friend, please apply or call us ASAP. Thanks so much - we hope to hear from you soon! Benefits of ReadyNurse Staffing Services * Competitive Compensation: $35 to $40 per hour DOE * Flexible Schedules and Weekly Pay with Direct Deposit * Immediate Openings and Orientation Offered by Client * Medical, Dental, Vision Insurance and Referral Bonuses * The security of over 25 years of experience in the industry! Position Qualifications * Ability to work with other personnel and develop/maintain good relations * Demonstrate thorough knowledge of nursing care and current clinical practice, treatments and interventions, specific to position specialty. * Ability to understand and monitor applicable regulations, policies and procedures. * Maintain a safe and clean working environment by complying with rules and regulations. * Ability to deal tactfully with government agencies and personnel, according to position setting. * Ability to maintain the care and use of supplies, equipment, etc. * Demonstrate proficiency in written/verbal skills in English language * Sufficient computer skills required to perform duties.  Certification / Requirements * 1 to 3 years of Oasis Home Visits experience * Nursing Degree from an accredited institution. * Current CPR/BLS Certification, Physical, TB Test * Current RN license by the state of practice  **About ReadyNurse:** ReadyNurse has been connecting talented clinicians with great facilities for over 25 years. Our goal is to find a nursing job that offers the pay, flexibility and the lifestyle that you desire. Whether you are interested in contract opportunities or just picking up an extra shift, our specialists are available around the clock to ensure that you get the assistance and support you deserve!   **The secret to our success is simple:** our management team sets extraordinarily high standards, and we refuse to compromise on the quality of our personnel or the caliber of service that we give to our clients and employees. Our 30 locally run offices allow us to provide personalized support in each community while still benefiting from the national resources and assistance of our larger CareerStaff Unlimited family.    Thank you! Genesis HealthCare, LLC and all affiliated entities are proud to practice Equal Employment Opportunity and Affirmative Action (EEO/AA)
          (USA-GA-Decatur) Registered Nurse (RN) - Home Health Visits   
Registered Nurse RN - Oasis Home Health Care  We are hiring qualified Registered Nurse(s) (RN) for an Oasis Home Visits position(s) in theDecatur, GAarea. This is a reputable, well established Home Health organization with locations nationwide. This client is in need of a full-time position with an immediate opening (minimum 13 weeks / extendable).Ideal candidates are local, and have at least 6-12 months of recent Oasis Visits Nursing experience.  This position is paid on an hourly basis so that you are compensated for drive time in-between visits. The pay range is $35 to $39+/hour plus mileage based on years of experience. If you have questions, are interested, or would like to refer a friend, please apply or call us ASAP. Thanks so much - we hope to hear from you soon! Benefits of ReadyNurse Staffing Services * Competitive Compensation: $35 to $40 per hour DOE * Flexible Schedules and Weekly Pay with Direct Deposit * Immediate Openings and Orientation Offered by Client * Medical, Dental, Vision Insurance and Referral Bonuses * The security of over 25 years of experience in the industry! Position Qualifications * Ability to work with other personnel and develop/maintain good relations * Demonstrate thorough knowledge of nursing care and current clinical practice, treatments and interventions, specific to position specialty. * Ability to understand and monitor applicable regulations, policies and procedures. * Maintain a safe and clean working environment by complying with rules and regulations. * Ability to deal tactfully with government agencies and personnel, according to position setting. * Ability to maintain the care and use of supplies, equipment, etc. * Demonstrate proficiency in written/verbal skills in English language * Sufficient computer skills required to perform duties.  Certification / Requirements * 1 to 3 years of Oasis Home Visits experience * Nursing Degree from an accredited institution. * Current CPR/BLS Certification, Physical, TB Test * Current RN license by the state of practice  **About ReadyNurse:** ReadyNurse has been connecting talented clinicians with great facilities for over 25 years. Our goal is to find a nursing job that offers the pay, flexibility and the lifestyle that you desire. Whether you are interested in contract opportunities or just picking up an extra shift, our specialists are available around the clock to ensure that you get the assistance and support you deserve!   **The secret to our success is simple:** our management team sets extraordinarily high standards, and we refuse to compromise on the quality of our personnel or the caliber of service that we give to our clients and employees. Our 30 locally run offices allow us to provide personalized support in each community while still benefiting from the national resources and assistance of our larger CareerStaff Unlimited family.    Thank you! Genesis HealthCare, LLC and all affiliated entities are proud to practice Equal Employment Opportunity and Affirmative Action (EEO/AA)
          1db 30000mAh Külső táp Bank akku töltő ultra vékon - Jelenlegi ára: 3 443 Ft   
Ultrathin 30000mAh External Power Bank Backup Battery Charger for Cell Phone
Features: Brand new and high quality.
Fashion, stylish, ideal companion for on the go use.
Ultrathin metal hard shell, compact design.
Dual USB output ports, can charge two devices at the same time.
Electricity-saving function, Long service life, more than 800 times the charging and discharging.
High efficiency of power conversion, Safe and reliable, Easy to take and charge conveniently, perfect for using on travelling and outdoor activities.
High security: Protection for overcharge, overdischarge, overload, and short circuit. Mobile Business, Entertainment, Charging anytime and anywhere.
Compatible with iPhone, iPad, Nokia, MP3, MP4, and other mobile phones.
Capacity: Approx. 30000mAh
Input: DC 5V-1. 5A.
Output 1: DC 5V- 2. 1A.
Output 2: DC 5V- 1. 0A.
Charging time: about 7 - 8 hours
Size: 15. 1cm x 7. 6cm x 1cm - 5. 94inch x 2. 99inch x 0. 39inch.
Color: Black, Silver, Rose, Golden,Blue
Package Included: 1 x 30000mAh Power Bank
NO Retail Box. Packed Safely in Bubble Bag.
P064400
Vásárlással kapcsolatos fontos információk:
Köszöntjük oldalunkon!
Az adásvétel megkönnyítése érdekében, kérjük olvassa el vásárlási feltételeinket, melyeket rendelésével automatikusan elfogad.
Kedvezmény: Amennyiben termékeink közül minimum 50 db-ot vásárol, kedvezményt biztosítunk. Kérjük igényelje a kedvezményt ügyfélszolgálatunktól.
US hálózati csatlakozós termékeink esetén, külön rendelhető a termékeink között található US-EU átalakító adapter.
Fontos! Ha a leírásban NEM szerepel, hogy ? We dont offer color/pattern/size choice? (szín/minta/méret nem választható), akkor rendeléskor kérjük mindenképp írja bele a megjegyzés rovatba a kiválasztott színt/mintát/méretet, ellenkező esetben kollégáink véletlenszerűen postázzák. Ez esetben utólagos reklamációt nem fogadunk el.
Ahol a ? We dont offer color/pattern/size choice? kijelentés szerepel, sajnos nincs lehetőség szín/minta/méret kiválasztására. Ilyenkor kollégáink véletlenszerűen küldik a termékeket.
Kommunikáció: minden esetben kizárólag email-ben, mert így visszakövethetőek a beszélgetések.
Hibás termék: visszautaljuk a vételárat vagy újrapostázzuk a terméket megállapodástól függően, miután visszapostázta a megadott címre.
Visszautalás: a vételárat visszautaljuk, vagy a terméket újraküldjük ha nem érkezik meg a termék.
Ez esetben kérjük jelezze email-en keresztül, hogy megoldást találhassunk a problémára!
Garancia: 3 hónap! Amennyiben valóban hibás a termék, kérjük vegye fel velünk a kapcsolatot és kicseréljük vagy visszavásároljuk a terméket megegyezéstől függően.
Számlázás: Az elektronikus számlát (pdf. formátumú) Angliában regisztrált cégünk állítja ki, az ÁFA nem kimutatható, az utalás magyar céges számlánkra történik.
A szállítási idő: az összeg átutalása után 9-12 munkanap, de a postától függően előfordulhat a 25-35 munkanap is! A posta szállítási idejéért cégünk nem tud felelősséget vállalni, az említett szállítási idő tájékoztató jellegű!
Nagyon fontos! Kérjük ne vásároljanak akkor, ha nem tudják kivárni az esetleges 35 munkanap szállítási időt!
strong>Postázás: Termékeinket külföldről postázzuk.
Nagy raktárkészletünk miatt előfordulhat, hogy egy-két termék átmenetileg vagy véglegesen elfogy raktárunkból, erről mindenképp időben értesítjük és megfelelő megoldást kínálunk.
Utalás: Kizárólag átutalást (házibank, netbank) fogadunk el (bankszámláról bankszámlára),   Banki/Postai készpénz befizetést/Rózsaszín csekket ill. egyéb NEM!
Átutalásnál a rendelésszámot feltétlenül adja meg a közlemény rovatba, ellenkező esetben előfordulhat, hogy nem tudjuk visszakeresni a rendelését. Ebben az esetben nyilvánvalóan nem tudjuk a terméket postázni ill. Önt sem tudjuk értesíteni, hiszen nincs kiindulópontunk!
Fizetés/szállítás:
-2000Ft felett (postaköltséggel együtt) CSAK es KIZÁRÓLAG ajánlottan postázzuk a terméket az alábbiak szerint:
-Ajánlott posta esetén az első termékre a posta 890Ft , minden további 250 Ft/db.
- Sima Levélként 2000Ft alatt: az első termékre a posta 250Ft, minden további termék posta díja 250Ft/db.
Átvétel: azoknak a vásárlóknak akik nem veszik át a rendelt terméket a postától és visszaküldésre kerül a termék cégünkhöz, a postaköltség újbóli megfizetésével tudjuk csak újraküldeni, illetve amennyiben az összeget kéri vissza, a termékek árát tudjuk csak visszautalni, postaköltség nélkül. A termék átvétele az Ön felelőssége! Amennyiben a Mi hibánkból nem tudja átvenni, pl téves címzés miatt, így a postaköltség minket terhel.
Amennyiben a megrendelést követő 24 órán belül nem kap emailt tőlünk, ez azt jelenti, hogy az email cím (freemail és citromail esetén főleg) visszadobta a küldött email-t. Ilyenkor küldjön üzenetet egy másik e-mail címről.
Kellemes Vásárlást Kívánunk!
1db 30000mAh Külső táp Bank akku töltő ultra vékon
Jelenlegi ára: 3 443 Ft
Az aukció vége: 2017-07-01 02:36
          1db külső Mobil USB töltő PowerBank iPhone HTC - Jelenlegi ára: 3 475 Ft   
Features: Brand new and high quality.
Fashion, stylish and compact design, durable, ideal companion for on the go use.
Dual USB output ports, can charge two devices at the same time.
LED indicator.
High security: Protection for overcharge, overdischarge, overload, and short circuit.
Compatible with Nokia, iPhone, iPad, MP3, MP4, and other mobile phones and ect.
Capacity: 20000mAh.
Input: DC 5V-1A.
Output 1: DC 5V- 1A.
Output 2: DC 5V- 2. 1A.
Charging time: about 7 - 8 hours.
Size: 13. 5cm x 7cm x 2. 4cm-5. 13inch x 2. 76inch x 0. 94inch.
Color: Black, White, Blue, Pink.
Package Included: 1 x Power Bank 20000mAh
1 x USB Charger Cable
4 x Charger Adapter
NO Retail Box. Packed Safely in Bubble Bag.
P035729
Vásárlással kapcsolatos fontos információk:
Köszöntjük oldalunkon!
Az adásvétel megkönnyítése érdekében, kérjük olvassa el vásárlási feltételeinket, melyeket rendelésével automatikusan elfogad.
Kedvezmény: Amennyiben termékeink közül minimum 50 db-ot vásárol, kedvezményt biztosítunk. Kérjük igényelje a kedvezményt ügyfélszolgálatunktól.
US hálózati csatlakozós termékeink esetén, külön rendelhető a termékeink között található US-EU átalakító adapter.
Fontos! Ha a leírásban NEM szerepel, hogy ? We dont offer color/pattern/size choice? (szín/minta/méret nem választható), akkor rendeléskor kérjük mindenképp írja bele a megjegyzés rovatba a kiválasztott színt/mintát/méretet, ellenkező esetben kollégáink véletlenszerűen postázzák. Ez esetben utólagos reklamációt nem fogadunk el.
Ahol a ? We dont offer color/pattern/size choice? kijelentés szerepel, sajnos nincs lehetőség szín/minta/méret kiválasztására. Ilyenkor kollégáink véletlenszerűen küldik a termékeket.
Kommunikáció: minden esetben kizárólag email-ben, mert így visszakövethetőek a beszélgetések.
Hibás termék: visszautaljuk a vételárat vagy újrapostázzuk a terméket megállapodástól függően, miután visszapostázta a megadott címre.
Visszautalás: a vételárat visszautaljuk, vagy a terméket újraküldjük ha nem érkezik meg a termék.
Ez esetben kérjük jelezze email-en keresztül, hogy megoldást találhassunk a problémára!
Garancia: 3 hónap! Amennyiben valóban hibás a termék, kérjük vegye fel velünk a kapcsolatot és kicseréljük vagy visszavásároljuk a terméket megegyezéstől függően.
Számlázás: Az elektronikus számlát (pdf. formátumú) Angliában regisztrált cégünk állítja ki, az ÁFA nem kimutatható, az utalás magyar céges számlánkra történik.
A szállítási idő: az összeg átutalása után 9-12 munkanap, de a postától függően előfordulhat a 25-35 munkanap is! A posta szállítási idejéért cégünk nem tud felelősséget vállalni, az említett szállítási idő tájékoztató jellegű!
Nagyon fontos! Kérjük ne vásároljanak akkor, ha nem tudják kivárni az esetleges 35 munkanap szállítási időt!
strong>Postázás: Termékeinket külföldről postázzuk.
Nagy raktárkészletünk miatt előfordulhat, hogy egy-két termék átmenetileg vagy véglegesen elfogy raktárunkból, erről mindenképp időben értesítjük és megfelelő megoldást kínálunk.
Utalás: Kizárólag átutalást (házibank, netbank) fogadunk el (bankszámláról bankszámlára),   Banki/Postai készpénz befizetést/Rózsaszín csekket ill. egyéb NEM!
Átutalásnál a rendelésszámot feltétlenül adja meg a közlemény rovatba, ellenkező esetben előfordulhat, hogy nem tudjuk visszakeresni a rendelését. Ebben az esetben nyilvánvalóan nem tudjuk a terméket postázni ill. Önt sem tudjuk értesíteni, hiszen nincs kiindulópontunk!
Fizetés/szállítás:
-2000Ft felett (postaköltséggel együtt) CSAK es KIZÁRÓLAG ajánlottan postázzuk a terméket az alábbiak szerint:
-Ajánlott posta esetén az első termékre a posta 890Ft , minden további 250 Ft/db.
- Sima Levélként 2000Ft alatt: az első termékre a posta 250Ft, minden további termék posta díja 250Ft/db.
Átvétel: azoknak a vásárlóknak akik nem veszik át a rendelt terméket a postától és visszaküldésre kerül a termék cégünkhöz, a postaköltség újbóli megfizetésével tudjuk csak újraküldeni, illetve amennyiben az összeget kéri vissza, a termékek árát tudjuk csak visszautalni, postaköltség nélkül. A termék átvétele az Ön felelőssége! Amennyiben a Mi hibánkból nem tudja átvenni, pl téves címzés miatt, így a postaköltség minket terhel.
Amennyiben a megrendelést követő 24 órán belül nem kap emailt tőlünk, ez azt jelenti, hogy az email cím (freemail és citromail esetén főleg) visszadobta a küldött email-t. Ilyenkor küldjön üzenetet egy másik e-mail címről.
Kellemes Vásárlást Kívánunk!
1db külső Mobil USB töltő PowerBank iPhone HTC
Jelenlegi ára: 3 475 Ft
Az aukció vége: 2017-07-01 02:36
          (USA-FL-St Petersburg) Physical Therapist (PT) - Home Health   
*Full-Time Home Health Physical Therapist (PT) - Covering South Pinellas County* St Petersburg, FL Job #: PTnspFL382032 * * Nurse on Call - Home Healthcare by Brookdale, is a Medicare certified agency providing home healthcare services. We take pride in our strong reputation for furnishing the high quality skilled nursing, rehabilitation and related services that our patients and their families and physicians expect and deserve. We enrich lives every day. *As a physical therapist with Brookdale Healthcare Services you"ll make breakthroughs every day, helping seniors regain their mobility, dignity and happiness. Working for Brookdale opens doors to advancement opportunities while affording you the security of being part of the largest senior living solutions company in the nation. Many of our PTs are promoted into local management roles before finding opportunities at the regional and corporate levels. We offer a true work/life balance allowing you the flexibility to set your own schedule. You"ll also enjoy the job diversity we offer and the opportunity to gain new therapy skills by letting us pay for approved certifications. We don"t micromanage. Our therapists get the support they need to enrich the lives of their patients. * Duties include*: *Communicating patient status and needs to family members, staff and other professionals *Developing treatment plans and therapy goals *Submitting billing, payroll and expense documentation Brookdale offers a number of benefits to full-time associates including, but not limited to: medical, dental, vision, disability, life, paid time off, educational reimbursement. All associates, age 21 and older, are eligible to participate in the 401(k) retirement savings plan. * */Brookdale./*/Bringing new life to senior living. / A career with Brookdale Healthcare Services has never been so rewarding! Brookdale Home Health is ranked among the Top Ten largest home heath companies in the country. Many of our agencies carry a five-star rating and are recognized by Decision Health as Home Care Elite agencies. We own and operate more than 80+ agencies nationwide, serving approximately 17,000 patients throughout our Brookdale Home Health Division. *Required skills and qualifications:* * Bachelor"s degree in physical therapy from an accredited program * Completion of the National Certification Examination for Registered Physical Therapists * Physical therapy license within the state of practice * One year of physical therapy experience * Flexible schedule, including availability to work evenings, weekends and holidays as needed *Questions? Please contact Erin Graham at 919-830-0156 orErin.Graham@Brookdale.com* * * If you"re a Brookdale associate, please consider referring someone through the Good People Program! Brookdale is an EOE-(Equal Opportunity Employer) and drug-free workplace.
          [Eugene Volokh] Czech parliament’s lower house passes right of citizens to keep and bear arms ‘to participate in the security of the Czech Republic’   
[Existing provision:] (2) State authorities, territorial self-governing bodies, and legal and natural persons are obliged to participate in the security of the Czech Republic. The scope of duties and other details are set by law. [New provision:] (3) Citizens of the Czech Republic have the right to acquire, hold, and carry weapons and ammunition for […]
          Administrator, Access Control - Melco Crown Entertainment - City of Dreams   
Administrator, Access Control participates in technical research and development to enable continuing innovation within the security technology infrastructure
From Melco Crown Entertainment - Fri, 02 Jun 2017 06:42:22 GMT - View all City of Dreams jobs
          Officer, Security - Melco Crown Entertainment - City of Dreams   
Officer, Security (Hotel) is responsible for monitoring all activities within the environs of the Hotel and Retail premises at the Company, to ensure the
From Melco Crown Entertainment - Thu, 18 May 2017 13:20:05 GMT - View all City of Dreams jobs
          Technician - Melco Crown Entertainment - City of Dreams   
As directed by the Technical Supervisor, the Technician is responsible for the installation and maintenance of equipment allocated to support Security,
From Melco Crown Entertainment - Wed, 26 Apr 2017 08:07:55 GMT - View all City of Dreams jobs
          dodał wpis: Czuje dobrze człowiek! Gość...   
Czuje dobrze człowiek! Gość dodał zdjęcie aby pochwalić się nagrodą w facebookowym programie Bug Bounty, w adresie URL widoczny jest jednorazowy token, który pozwala na wypłatę szekli przez paypal albo BTC, niestety przed publikacją screena nie użył go, zgadnijcie kto jest do przodu blisko 30 tys zł:

pokaż spoiler nie ja ( ͡º ͜ʖ͡º) przypisałem płatność do swojego profilu, a następnie napisałem do supportu aby anulowali wypłatę i skontaktowali się z nim, bo ktoś o złych zamiarach mógłby mu tę kasę ukraść ( ͡°( ͡° ͜ʖ( ͡° ͜ʖ ͡°)ʖ ͡°) ͡°) Szekle są już u właściciela ;-)


#czujedobrzeczlowiek #hacking #bugbounty #facebook #security
          The Fiscal Cliff: A Love Story   
America, if you're scared by all the talk you've been hearing about the fiscal cliff, take heart: There are reasons for people across the political spectrum to love the cliff. There's a lot for liberals to like in the fiscal cliff, says Matthew Yglesias , who writes wonky articles about economics for Slate. Take the spending cuts. Entitlement programs like Social Security and Medicaid that liberals generally support are left unaffected, while a large share of the cuts fall on the military, which many liberals would be happy to reduce anyway. The combination of tax hikes and spending cuts could eventually send the country into recession. But that probably won't happen, Yglesias says, because at some point in the next few weeks Congress will probably agree on a compromise. That's partly because going off the cliff will let Congress sell a tax increase as a tax cut. Simon Johnson, an economist at MIT, walked me through how that works. A big part of the fiscal cliff is the expiration of
          Why The Falling Birthrate Is Bad News For My 2-Year-Old Son   
The U.S. birthrate just fell to its lowest point since we've been keeping track . Here's why that may be a problem for my 2-year-old son. Right now, I, my colleagues and everybody else with a job is paying to support our parents, our grandparents and all the other elderly people in the U.S. who currently receive Medicare and Social Security. Relatively speaking, there are still plenty of us working people, compared to the number of retirees. But the fall in the birthrate means that, by the time my son gets to be my age, there will be fewer working people for each retiree. So he'll have to pay a bigger share of my retirement costs — which he may not want to do. So maybe we should start paying more now, or agree that retirees should accept a bit less, or do both. Or maybe we shouldn't worry about it. Hand-wringing about declining birthrates is totally unnecessary because workers become more productive over time, says Dean Baker of the Center for Economic and Policy Research. "You know, a
          An adventure with clocks, component, and clojure.spec   

I have long parted with my initial, lacking approach to component handling in Clojure. I now rely on Stuart Sierra’s component library for this.

In this short post, I want to showcase how this library helps structure code around clear functional boundaries and allows testing without having to depend on mocking. This might induce building components for seemingly innocuous code. I will also dive into clojure.spec to show how it helps writing automated tests on top of correct generated inputs.

This article was initially written as a litterate programming org mode file, If you edit the source you can use C-c v t to generate a single file which can be used as an executable *boot* script, which means you will need to have boot installed in order to execute this.

I used *boot* here because it is easy to build a standalone executable script with it. Be sure to have BOOT_CLOJURE_VERSION set to 1.9.0-alpha14, since clojure.spec is only available from 1.9.0 onward.

To start we will add a shebang line to make sure that boot is invoked to run this script.

#!/usr/bin/env boot

For the purpose of this article, we will only use a few dependencies:

(set-env! :dependencies '[[com.stuartsierra/component "0.3.1"]
                          [org.clojure/test.check     "0.9.0"]])

For the purpose of this article, we will be building request signing functionality. Since this is a standalone *boot* project test namespaces are pulled here as well:

(ns request.signing
   (:require [com.stuartsierra.component :as component]
             [clojure.test :refer :all]
             [clojure.test.check.generators :as tgen]
             [clojure.spec :as s]
             [clojure.spec.gen :as gen]
             [clojure.spec.test :as st])
   (:import javax.crypto.Mac javax.crypto.spec.SecretKeySpec))

Our request signing functionality will work on incoming requests which look like this:

{:timestamp     1483805460         ;; UNIX Epoch of request
 :payload       "some-command"     ;; Request payload
 :authorization {:key       "..."
                 :signature "..."}}

Provided each user is given an API key, and an API secret, we can define the request signing mechanism to be:

signature = hexadecimal_string(hmac_256(secret-key, timestamp + payload))

Factoring the request timestamp in the signing mechanism provides a good protection against replay attacks: by ensuring that requests come-in within a reasonable time-delta (let’s say 500ms). To implement this a first implementation could be based on two components:

  • A *keystore* component which maps API keys to API secrets
  • A *signer* component which signs a payload

We can do away with the *keystore* component here, rely on a map, or something that behaves like a map. (If you want to investigate how to build map-like constructs, there is an article describing how to do that). I won’t describe here how to build an alternate implementation which would look-up keys in a database, but it is rather straightforward.

As far as signing is concerned, interacting with the JVM is required. To avoid pulling-in additional dependencies, we use the javax.crypto available classes:

(defn bytes->hex [bytes]
  (reduce str (map (partial format "%02x") bytes)))

(defn sign-string [secret-key payload]
  (let [key (SecretKeySpec. (.getBytes secret-key) "HmacSHA256")]
    (-> (doto (Mac/getInstance "HmacSHA256")
          (.init key))
        (.doFinal (.getBytes payload))
        (bytes->hex))))

We now have all necessary bits to write a first authorization function. Here is a first version without the addition of components for now:

(defn request-signature [keystore request]
  (when-let [secret (get keystore (get-in request [:authorization :api-key]))]
    (sign-string secret (str timestamp payload))))

(defn authorized-request? [keystore equest]
  (when-let [signature (request-signature keystore request)]
    (= (get-in request [:authorization :signature]) signature)))

This already gives us a lot of safety: a stolen secret key does not allow signing arbitrary requests as would a simple key/token validation approach, commonly found in API implementations.

One thing this authorization scheme is subject to though is replay attacks, a stolen signed payload can be replayed at will.

To limit this risk, we can rely on good wall clocks to ensure that requests are sent within a reasonable timeframe, which we can store as an option:

(def max-delta-ms 500)

We can then write our updated auhtorization function. Note how here we made authorized-request? use a Authorizer as its input. This can be safely done, since started component get their depencies provided.

(defn authorized-timestamp? [timestamp]
  (let [now (System/currentTimeMillis)]
    (<= (- timestamp max-delta-ms) now (+ timestamp max-delta-ms))))

(defn request-signature [keystore request]
  (when-let [secret (get keystore (get-in request [:authorization :api-key]))]
    (sign-string secret (str (:timestamp request) (:payload request)))))

(defrecord Authorizer [keystore])

(defn authorized-request? [{:keys [keystore]} request]
  (when-let [signature (request-signature keystore request)]
    (and (= (get-in request [:authorization :signature]) signature)
         (authorized-timestamp? (:timestamp request)))))

This solution will provide a good layer of security while being secure enough for most practical purposes. Going one step further would involve guaranteeing no replay attack can be performed by handing-out a one-time token for each request. We will not describe this scheme in this article.

While complete, the solution is now hard to test, since it relies on a wall clock. There are three approaches to testing we can take:

  • Good old sleep calls which are a safe way of having spurious test errors :-)
  • Mocking wall clock calls
  • Making the clock a component

It does seem overkill to build a specific clock component for the standard behavior of a wall clock which just reaches out to the system.

(defprotocol Clock  (now! [this]))
(defrecord WallClock [] Clock (now! [this] (System/currentTimeMillis)))

With this simple protocol we can now build our complete component system. This will be quite similar to the previous presented implementation, with the exception that the Authorizer component now depends on clock as well and will use both in authorized-request?.

(defn authorized-timestamp? [clock timestamp]
  (<= (- timestamp max-delta-ms) (now! clock) (+ timestamp max-delta-ms)))

(defn request-signature [keystore request]
  (when-let [secret (get keystore (get-in request [:authorization :api-key]))]
    (sign-string secret (str (:timestamp request) (:payload request)))))

(defrecord Authorizer [clock keystore])

(defn authorized-request? [{:keys [keystore clock]} request]
  (when-let [signature (request-signature keystore request)]
    (and (= (get-in request [:authorization :signature]) signature)
         (authorized-timestamp? clock (:timestamp request)))))

Our resulting system will thus be a three-component one:

  • A *clock* component which will give the current time.
  • A *keystore* component to look-up the secret key corresponding to an API key.
  • An *authorizer* component, used to authorize incoming requests, relying on the two above components.

We can then imagine building the system like this:

(defn start-system [secret-keys]
   (-> (component/system-map :keystore   secret-keys
                             :clock      (->WallClock)
                             :authorizer (map->Authorizer {}))
       (component/system-using {:authorizer [:clock :keystore]})
       (component/start-system)))

With this, everything necessary for authorizing requests is available, but there are no tests yet. If we were to rely on this implementation for tests, we would have to play with timing for test purposes:

(deftest simple-signing
  (let [sys (start-system {:foo "ABCDEFGHIJK"})]
    (doseq [cmd ["start-engine" "thrust" "stop-engine"]]
      (let [request {:timestamp (now! (:clock sys))
                     :payload       cmd
                     :authorization {:api-key :foo}}
            signed  (assoc-in request [:authorization :signature]
                              (request-signature (:keystore sys) request))]
        (is (authorized-request? sys signed))
        (Thread/sleep 600)
        (is (not(authorized-request? sys signed)))))))

This is unfortunately brittle and does not lend itself easily to a large number of tests since it relies on sleep.

Thanks to our component-based approach we can now write an alternate clock:

(defrecord RefClock [state] Clock (now! [_] @state))

Once we have our new clock, we can adapt the start system function:

(defn start-system [secret-keys time]
   (-> (component/system-map :keystore   secret-keys
                             :clock      (if time (->RefClock time) (->WallClock))
                             :authorizer (map->Authorizer {}))
       (component/system-using {:authorizer [:clock :keystore]})
       (component/start-system)))

This new clock can then be used for our tests, doing away with brittle sleep calls and paving the way for generative tests.

(deftest simple-signing
  (let [time (atom 0)
        sys  (start-system {:foo "ABCDEFGHIJK"} time)]
    (doseq [cmd ["start-engine" "thrust" "stop-engine"]]
      (let [request {:timestamp (now! (:clock sys))
                     :payload       cmd
                     :authorization {:api-key :foo}}
            signed  (assoc-in request [:authorization :signature]
                              (request-signature (:keystore sys) request))]
        (is (authorized-request? sys signed))
        (swap! time + max-delta-ms 1) 
        (is (not(authorized-request? sys signed)))))))

While this is nice, it only tests a very small subset of input. To go beyond this, we can reach out to clojure.spec to give us compile-time guarantees that we are using correct types for our functions and to allow building generative tests.

In a few instances, we help generators by providing a set of known values. We start off by forcing every generated keystore instance to be:

{:foo "ABCDEFGH"
 :bar "IJKLMNOP"}

Generated api-key instances will also always be either :foo or :bar. Clock instance generation is bound to a RefClock instance as well.

Let’s look at the code in detail. We start by defining a few predicates to make our specs a bit easier to understand:

(def lookup?           #(instance? clojure.lang.ILookup %))
(def clock?            #(satisfies? Clock %))
(def not-empty-string? #(not= "" %))
(def sig-bytes?        #(= 32 (count %))) ;; Number of bytes in a signature
(def valid-sig-width?  #(= 64 (count %)))
(def valid-sig-chars?  #(re-matches #"^[0-9a-f]+$" %))

Next we can define data types for every plain and compound type we have created:

(s/def ::keystore lookup?)
(s/def ::clock clock?)
(s/def ::authorizer (s/keys :req-un [::keystore ::clock]))
(s/def ::signature (s/and string? valid-sig-width? valid-sig-chars?))
(s/def ::api-key keyword?)
(s/def ::authorization (s/keys :req-un [::api-key] :opt-un [::signature]))
(s/def ::timestamp int?)
(s/def ::secret-key (s/and string? not-empty-string?))
(s/def ::payload (s/and string? not-empty-string?))
(s/def ::request (s/keys :req-un [::timestamp ::payload ::authorization]))
(s/def ::bytes (s/and bytes? sig-bytes?))

I like to also provide separate specs for argument lists:

(s/def ::auth-request? (s/cat :authorizer ::authorizer :request ::request))
(s/def ::request-signature (s/cat :keystore ::keystore :request ::request))
(s/def ::auth-timestamp? (s/cat :clock ::clock :timestamp ::timestamp))
(s/def ::sign-string (s/cat :secret-key ::secret-key :payload string?))
(s/def ::bytes->hex (s/cat :bytes ::bytes))
(s/def ::now! (s/cat :block ::clock))

We can now use the above types to specify our functions. Nothing extraordinary here if you have already used spec.

(s/fdef bytes->hex :args ::bytes->hex :ret ::signature)
(s/fdef sign-string :args ::sign-string :ret ::signature)
(s/fdef now! :args ::now! :ret ::timestamp)
(s/fdef authorized-timestamp? :args ::auth-timestamp? :ret boolean?)
(s/fdef request-signature :args ::request-signature :ret ::signature)
(s/fdef authorized-request? :args ::auth-request? :ret boolean?)

We are now fully specified and using instrument will allow verifying functions are called properly.

The complex bit is to go from here to tests which use generators for building sensible data. Relying on the provided generators will not cut it as they would not be able to build clock and keystore instances, nor would they be able to provide sensible timestamp or signature values.

This is most obvious in request which contains co-dependent information, since the :signature field in the :authorization map depends on the payload and timestamp of the request. Likewise, testing authorized-timestamp? relies on having a solid way of generating timestamp, which we built our Clock protocol for.

Fortunately, spec allows overriding generators. We can start by building simple generators for values we want picked from a narrow set, this is for instance the case for our keystore and related api keys:

(def fake-keystore {:foo "ABCDEFGH" :bar "IJKLMNOP"})
(def fake-time     (atom 0))
(def fake-clock    (->RefClock fake-time))

(defn keystore-gen [] (s/gen #{fake-keystore}))
(defn api-key-gen  [] (s/gen (set (keys fake-keystore))))
(defn clock-gen    [] (s/gen #{fake-clock}))

We can test out this generators on the repl:

(gen/sample (s/gen (s/with-gen ::api-key api-key-gen)))
(gen/sample (s/gen (s/with-gen ::clock-gen clock-gen)))

To instrument bytes->hex we will need a way of generating 32 wide byte arrays. Since there is no such generator, we will need to compose the creation of a 32-width vector and its coercion to a byte array:

(defn bytes-gen    [] (gen/fmap byte-array (gen/vector tgen/byte 32)))

In the above we use byte from clojure.test.check.generators since no such generator exists in clojure.spec.gen.

Only the most complex generator remains, request-gen for building request maps. If we look at our base building blocks, here is what we need to build a correct request map:

  • A *keystore* to sign the request
  • A *clock* to get a correct timestamp
  • A random *api-key*
  • A random *payload*

Once we have these elements we can transform them into a correct request. We will use fmap again here, and split out request generation in two functions:

(defn sign-request [[ks req]]
   (assoc-in req [:authorization :signature] (request-signature ks req)))

(defn build-request [{:keys [clock payload keystore api-key]}]
  (vector
    keystore
    {:timestamp     (now! clock)
     :payload       payload
     :authorization {:api-key api-key}}))

(defn request-gen []
  (gen/fmap
    (comp sign-request build-request)
    (s/gen (s/keys :req-un [::clock ::keystore ::api-key ::payload])
           {::clock clock-gen ::keystore keystore-gen ::api-key api-key-gen})))

We now have a solid way of generating requests, we can again test it on the repl:

(gen/sample (s/gen (s/with-gen ::request request-gen)))

Now that we have good generation available, we can write automated testing for all of our functions. We can do this by enumerating all testable symbols in the current namespace and running generative testing on them, supplying our list of generator overrides. This involves checking that the result is true for all test outputs generated by clojure.spec.test/check:

(def gen-overrides {::keystore      keystore-gen
                    ::clock         clock-gen
                    ::api-key       api-key-gen
                    ::bytes         bytes-gen
                    ::request       request-gen})

(deftest generated-tests
  (doseq [test-output (-> (st/enumerate-namespace 'request.signing)
                          (st/check {:gen gen-overrides}))]
    (testing (-> test-output :sym name)
      (is (true? (-> test-output :clojure.spec.test.check/ret :result))))))

To go, one last step further, we can supply a different function spec to our most important function, authorized-request? to make sure that given all provided inputs, our authorizer determined the request to be authorized:

(deftest specialized-tests
   (testing "authorized-request?"
      (is (true? (-> (st/check-fn authorized-request?
                                  (s/fspec :args ::auth-request? :ret boolean?)
                                  {:gen gen-overrides})
                     :clojure.spec.test.check/ret
                     :result)))))

Last, we run all tests:

(run-tests 'request.signing)

I’d like to thank Max Penet and Gary Fredericks for their valuable input while writing this.


          Easy clojure logging set-up with logconfig   

*TL;DR*: I love clojure.tools.logging, but setting JVM logging up can be a bit frustrating, I wrote logconfig to help.

When I started clojure development (about 5 years ago now), I was new to the JVM - having no real Java background. My first clojure projects where long running, data consuming tasks and thus logging was a consideration from the start. The least I could say is that navigating the available logging options and understanding how to configure each framework was daunting.

JVM logging 101

Once you get around to understanding how logging works on the JVM, it makes a log of sense, for those not familiar with the concepts, here is a quick recap - I will be explaining this in the context of log4j, but the same holds for slf4j, logback and other frameworks:

  • Logging frameworks can be configured inside or outside the application.
  • The common method is for logging to be configured outside, with a specific configuration file.
  • User-provided classes can be added to the JVM to format (through layout) or write (through appenders) logs in a different manner.

This proves really useful, since you might need to ship logs as JSON-formatted payloads to integrate with your logstash infrastructure for instance, you might even rely on sending logs over the network, without the original application writer having had to worry about these use-cases.

The meat of the problem

While having the possibility of configuring logging in such a way, it’s not a use case many people have, and spreading an application’s configuration through-out several files does not facilitate starting out.

I think elasticsearch is a project which gets things right, allowing logging to be configured from the same file than the rest of the service, only exposing the most common options.

Introducing logconfig

logconfig, which is available on clojars (at version 0.7.1 at the time of writing), provides you with a simple way of taking care of that problem, it does the following things:

  • Provide a way to configure log4j from a clojure map.
  • Allow overriding of the configuration for people wanting to provide their own log4j.properties config.
  • Support both enhanced patterns and JSON event as layouts, enabling easy integration with logstash.
  • Append files with a time based rolling policy
  • Optional console output (for people using runit or debug purposes).

A nice side-effect of relying on logconfig is the reduced coordinates matrix:

;; before
  :dependencies [...
                 [commons-logging/commons-logging "1.2"]
                 [org.slf4j/slf4j-log4j12 "1.7.7"]
                 [net.logstash.log4j/jsonevent-layout "1.7"]
                 [log4j/apache-log4j-extras "1.2.17"]
                 [log4j/log4j "1.2.17"
                   :exclusions [javax.mail/mail
                                javax.jms/jms
                                com.sun.jdmk/jmxtools
                                com.sun.jmx/jmxri]]]
;; after
  :dependencies [...
                 [org.spootnik/logconfig "0.7.1"]]

Sample use-case: fleet

fleet, our command and control framework at exoscale is configured through a YAML file, the file is read and contains several sections: transport, codec, scenarios, http, security and logging.

logging:
  console: true
  files:
    - "/var/log/fleet.log"
security:
  ca-priv: "doc/ca/ca.key"
  certdir: "doc/ca"
  suffix: "pem"
scenarios:
  path: "doc/scenarios"
http:
  port: 8080
  origins:
    - "http://example.com"

The logging key in the YAML file is expected to adhere to logconfig’s format and will be fed to logconfig. Users relying on existing log4j.properties configuration can also set external to true in the YAML config and provide their log4j configuration through the standard JVM properties.

Both cyanite and pithos now also rely on this mechanism.

I hope this can be useful to other developers building services, apps and daemons in clojure, the full documentation for the API is available here: http://pyr.github.io/logconfig, check-out the project at https://github.com/pyr/logconfig.


          Alarm Install Technician - Sonitrol New England - Providence, RI   
We have a great opportunity for a RI Licensed Installer of security and fire alarm systems, with a strong work ethic and a desire to be the best....
From Indeed - Sat, 25 Mar 2017 15:14:23 GMT - View all Providence, RI jobs
          Weekend project: Ghetto RPC with redis, ruby and clojure   

There’s a fair amount of things that are pretty much set on current architectures. Configuration management is handled by chef, puppet (or pallet, for the brave). Monitoring and graphing is getter better by the day thanks to products such as collectd, graphite and riemann. But one area which - at least to me - still has no obvious go-to solution is command and control.

There are a few choices which fall in two categories: ssh for-loops and pubsub based solutions. As far as ssh for loops are concerned, capistrano (ruby), fabric (python), rundeck (java) and pallet (clojure) will do the trick, while the obvious candidate in the pubsub based space is mcollective.

Mcollective has a single transport system, namely STOMP, preferably set-up over RabbitMQ. It’s a great product and I recommend checking it out, but two aspects of the solution prompted me to write a simple - albeit less featured - alternative:

  • There’s currently no other transport method than STOMP and I was reluctant to bring RabbitMQ into the already well blended technology mix in front of me.
  • The client implementation is ruby only.

So let me here engage in a bit of NIHilism and describe a redis based approach to command and control.

The scope of the tool would be rather limited and only handle these tasks:

  • Node discovery and filtering
  • Request / response mechanism
  • Asynchronous communication (out of order replies)

Enter redis

To allow out of order replies, the protocol will need to broadcast requests and listen for replies separately. We will thus need both a pub-sub mechanism for requests and a queue for replies.

While redis is initially an in-memory key value store with optional persistence, it offers a wide range of data structures (see the full list at http://redis.io) and pub-sub support. No explicit queue function exist, but two operations on lists provide the same functionality.

Let’s see how this works in practice, with the standard redis-client redis-cli and assuming you know how to run and connect to a redis server:

  1. Queue Example

    Here is how to push items on a queue named my_queue:

    redis 127.0.0.1:6379> LPUSH my_queue first
    (integer) 1
    redis 127.0.0.1:6379> LPUSH my_queue second
    (integer) 2
    redis 127.0.0.1:6379> LPUSH my_queue third
    (integer) 3
    

    You can now subsequently issue the following command to pop items:

    redis 127.0.0.1:6379> BRPOP my_queue 0
    1) "my_queue"
    2) "first"
    redis 127.0.0.1:6379> BRPOP my_queue 0
    1) "my_queue"
    2) "second"
    redis 127.0.0.1:6379> BRPOP my_queue 0
    1) "my_queue"
    2) "third"
    

    LPUSH as its name implies pushes items on the left (head) of a list, while BRPOP pops items from the right (tail) of a list, in a blocking manner, with a timeout argument which we set to 0, meaning that the action will block forever if no items are available for popping.

    This basic queue mechanism is the main mechanism used in several open source projecs such as logstash, resque, sidekick, and many others.

  2. Pub-Sub Example

    Queues can be subscribed to through the SUBSCRIBE command, you’ll need to open two clients, start by issuing this in the first:

    redis 127.0.0.1:6379> SUBSCRIBE my_exchange
    Reading messages... (press Ctrl-C to quit)
    1) "subscribe"
    2) "my_hub"
    3) (integer) 1
    

    You are now listening on the my_exchange exchange, issue the following in the second terminal:

    redis 127.0.0.1:6379> PUBLISH my_exchange hey
    (integer) 1
    

    You’ll now see this in the first terminal:

    1) "message"
    2) "my_hub"
    3) "hey"
    
  3. Differences between queues and pub-sub

    The pub-sub mechanism in redis, broadcasts to all subscribers and will not queue up data for disconnect subscribers, where-as queues will deliver to the first available consumer, but will queue up (in RAM, so make sure of your consuming ability)

Designing the protocol

With the following building blocks in place, a simple layered protocol can be designed offering the following functionality, offering the following workflow:

  • A control box broadcasts a requests with a unique ID (UUID), with a command and node specification
  • All nodes matching the specification reply immediately with a START status, indicating that the requests has been acknowledged
  • All nodes refusing to go ahead reply with a NOOP status
  • Once execution is finished, nodes reply with a COMPLETE status

Acknowledgments and replies will be implemented over queues, solely to demonstrate working with queues, using pub-sub for replies would lead to cleaner code.

If we model this around JSON, we can thus work with the following payloads, starting with requests:

request = {
  reply_to: "51665ac9-bab5-4995-aa80-09bc79cfb2bd",
  match: {
    all: false, /* setting to true matches all nodes */
    node_facts: {
      hostname: "www*" /* allowing simple glob(3) type matches */
    }
  },
  command: {
    provider: "uptime",
    args: { 
     averages: {
       shortterm: true,
       midterm: true,
       longterm: true
     }
    }
  }
}

START responses would then use the following format:

response = {
  in_reply_to: "51665ac9-bab5-4995-aa80-09bc79cfb2bd",
  uuid: "5b4197bd-a537-4cc7-972f-d08ea5760feb",
  hostname: "www01.example.com",
  status: "start"
}

NOOP responses would drop the sequence UUID not needed:

response = {
  in_reply_to: "51665ac9-bab5-4995-aa80-09bc79cfb2bd",
  hostname: "www01.example.com",
  status: "noop"
}

Finally, COMPLETE responses would include the result of command execution:

response = {
  in_reply_to: "51665ac9-bab5-4995-aa80-09bc79cfb2bd",
  uuid: "5b4197bd-a537-4cc7-972f-d08ea5760feb",
  hostname: "www01.example.com",
  status: "complete",
  output: {
    exit: 0,
    time: "23:17:20",
    up: "4 days, 1:45",
    users: 6,
    load_averages: [ 0.06, 0.10, 0.13 ]
  }
}

We essentially end up with an architecture where each node is a daemon while the command and control interface acts as a client.

Securing the protocol

Since this is a proof of concept protocol and we want implementation to be as simple as possible, a somewhat acceptable compromise would be to share an SSH private key specific to command and control messages amongst nodes and sign requests and responses with it.

SSL keys would also be appropriate, but using ssh keys allows the use of the simple ssh-keygen(1) command.

Here is a stock ruby snippet, gem which performs signing with an SSH key, given a passphrase-less key.

require 'openssl'

signature = File.open '/path/to/private-key' do |file|
  digest = OpenSSL::Digest::SHA1.digest("some text")
  OpenSSL::PKey::DSA.new(file).syssign(digest)
end

To verify a signature here is the relevant snippet:

require 'openssl'

valid? = File.open '/path/to/private-key' do |file|

  OpenSSL::PKey::DSA.new(file).sysverify("some text", sig)
end

This implements the common scheme of signing a SHA1 digest with a DSA key (we could just as well sign with an RSA key by using OpenSSL::PKey::RSA)

A better way of doing this would be to sign every request with the host’s private key, and let the controller look up known host keys to validate the signature.

The clojure side of things

My drive for implementing a clojure controller is integration in the command and control tool I am using to interact with a number of things.

This means I only did the work to implement the controller side of things. Reading SSH keys meant pulling in the bouncycastle libs and the apache commons-codec lib for base64:

(import '[java.security                   Signature Security KeyPair]
        '[org.bouncycastle.jce.provider   BouncyCastleProvider]
        '[org.bouncycastle.openssl        PEMReader]
        '[org.apache.commons.codec.binary Base64])
(require '[clojure.java.io :as io])


(def algorithms {:dss "SHA1withDSA"
                 :rsa "SHA1withRSA"})

;; getting a public and private key from a path
(def keypair (let [pem (-> (PEMReader. (io/reader "/path/to/key")) .readObject)]
               {:public (.getPublic pem)
                :private (.getPrivate pem)}))

(def keytype :dss)

(defn sign
  [content]
  (-> (doto (Signature/getInstance (get algorithms keytype))
        (.initSign (:private keypair))
        (.update (.getBytes str)))
      (.sign)
      (Base64/encodeBase64string)))

(defn verify
  [content signature]
  (-> (doto (Signature/getInstance (get algorithms keytype))
        (.initVerify (:public keypair))
        (.update (.getBytes str)))
      (.verify (-> signature Base64/decodeBase64))))

Redis support has several options, I used the jedis Java library which has support for everything we’re interested in.

Wrapping up

I have early - read: with lots of room for improvements, and a few corners cut - implementations of the protocol, both the agent and controller code in ruby, and the controller code in clojure, wrapped in my IRC bot in clojure, which might warrant another article.

The code can be found here: https://github.com/pyr/amiral (name alternatives welcome!)

If you just want to try out, you can fetch the amiral gem in ruby, and start an agent like so:

$ amiral.rb -k /path/to/privkey agent

You can then test querying the agent through a controller:

$ amiral.rb -k /path/to/privkey controller uptime
accepting acknowledgements for 2 seconds
got 1/1 positive acknowledgements
got 1/1 responses
phoenix.spootnik.org: 09:06:15 up 5 days, 10:48, 10 users,  load average: 0.08, 0.06, 0.05

If you’re feeling adventurous you can now start the clojure controller, it’s configuration is relatively straightforward, but a bit more involved since it’s part of an IRC + HTTP bot framework:

{:transports {amiral.transport.HTTPTransport {:port 8080}
              amiral.transport.irc/create    {:host "irc.freenode.net"
                                              :channel "#mychan"}}
 :executors {amiral.executor.fleet/create    {:keytype :dss
                                              :keypath "/path/to/key"}}}

In that config we defined two ways of listening for incoming controller requests: IRC and HTTP, and we added an “executor” i.e: a way of doing something.

You can now query your hosts through HTTP:

$ curl -XPOST -H 'Content-Type: application/json' -d '{"args":["uptime"]}' http://localhost:8080/amiral/fleet
{"count":1,
 "message":"phoenix.spootnik.org: 09:40:57 up 5 days, 11:23, 10 users,  load average: 0.15, 0.19, 0.16",
 "resps":[{"in_reply_to":"94ab9776-e201-463b-8f16-d33fbb75120f",
           "uuid":"23f508da-7c30-432b-b492-f9d77a809a2a",
           "status":"complete",
           "output":{"exit":0,
                     "time":"09:40:57",
                     "since":"5 days, 11:23",
                     "users":"10",
                     "averages":["0.15","0.19","0.16"],
                     "short":"09:40:57 up 5 days, 11:23, 10 users,  load average: 0.15, 0.19, 0.16"},
           "hostname":"phoenix.spootnik.org"}]}

Or on IRC:

09:42 < pyr> amiral: fleet uptime
09:42 < amiral> pyr: waiting 2 seconds for acks
09:43 < amiral> pyr: got 1/1 positive acknowledgement
09:43 < amiral> pyr: got 1 responses
09:43 < amiral> pyr: phoenix.spootnik.org: 09:42:57 up 5 days, 11:25, 10 users,  load average: 0.16, 0.20, 0.17

Next Steps

This was a fun experiment, but there are two outstanding problems which will need to be addressed quickly

  • Tests test tests. This was a PoC project to start with, I should have known better and wrote tests along the way.
  • The queue based reply handling makes controller logic complex, and timeout handling approximate, it should be switched to pub-sub
  • The signing should be done based on known hosts’ public keys instead of the shared key used now.
  • The agent should expose more common actions: service interaction, puppet runs, etc.

          (USA-NC-Raleigh) Physical Therapist-Home Health   
*Full-Time* Raleigh, NC Job #:PTHHralNC381844 This position will provide Home Health services to the general community in the Raleigh, NC area. As a physical therapist with Brookdale Healthcare Services you"ll make breakthroughs every day, helping seniors regain their mobility, dignity and happiness. Working for Brookdale opens doors to advancement opportunities while affording you the security of being part of the largest senior living solutions company in the nation. Many of our PTs are promoted into local management roles before finding opportunities at the regional and corporate levels. We offer a true work/life balance allowing you the flexibility to set your own schedule. You"ll also enjoy the job diversity we offer and the opportunity to gain new therapy skills by letting us pay for approved certifications. We don"t micromanage. Our therapists get the support they need to enrich the lives of their patients. *Duties include*: *Providing physical therapy services to patients, including assessment, treatment, program planning and implementation *Communicating patient status and needs to family members, staff and other professionals *Developing treatment plans and therapy goals *Submitting billing, payroll and expense documentation Brookdale offers a number of benefits to full-time associates including, but not limited to: medical, dental, vision, disability, life, paid time off, educational reimbursement. All associates, age 21 and older, are eligible to participate in the 401(k) retirement savings plan. */Brookdale./*/Bringing new life to senior living. / A career with Brookdale Healthcare Services has never been so rewarding! Brookdale Home Health is ranked among the Top Ten largest home heath companies in the country. Many of our agencies carry a five-star rating and are recognized by Decision Health as Home Care Elite agencies. We own and operate more than 80+ agencies nationwide, serving approximately 17,000 patients throughout our Brookdale Home Health Division. *Required skills and qualifications:* * Bachelor"s degree in physical therapy from an accredited program * Completion of the National Certification Examination for Registered Physical Therapists * Physical therapy license within the state of practice * Three years of physical therapy experience * Flexible schedule, including availability to work evenings, weekends and holidays as needed If you"re a Brookdale associate, please consider referring someone through the Good People Program! Brookdale is an EOE-(Equal Opportunity Employer) and drug-free workplace.
          (USA-TX-Houston) Home Health Pay Per Visit Weekend Physical Therapist PT   
*PRN* Houston, TX Job #: prnPTHHhouTX381920 * * *This candidate will need to be available on Saturdays and Sundays for weekend admissions and add on evaluations for the Houston network.** As a physical therapist with Brookdale Healthcare Services you"ll make breakthroughs every day, helping seniors regain their mobility, dignity and happiness. Working for Brookdale opens doors to advancement opportunities while affording you the security of being part of the largest senior living solutions company in the nation. Many of our PTs are promoted into local management roles before finding opportunities at the regional and corporate levels. We offer a true work/life balance allowing you the flexibility to set your own schedule. You"ll also enjoy the job diversity we offer and the opportunity to gain new therapy skills by letting us pay for approved certifications. We don"t micromanage. Our therapists get the support they need to enrich the lives of their patients. * Duties include*: *Communicating patient status and needs to family members, staff and other professionals *Developing treatment plans and therapy goals *Submitting billing, payroll and expense documentation Brookdale offers a number of benefits to full-time associates including, but not limited to: medical, dental, vision, disability, life, paid time off, educational reimbursement. All associates, age 21 and older, are eligible to participate in the 401(k) retirement savings plan.* */Brookdale./*/Bringing new life to senior living. / A career with Brookdale Healthcare Services has never been so rewarding! Brookdale Home Health is ranked among the Top Ten largest home heath companies in the country. Many of our agencies carry a five-star rating and are recognized by Decision Health as Home Care Elite agencies. We own and operate more than 80+ agencies nationwide, serving approximately 17,000 patients throughout our Brookdale Home Health Division./ / *Required skills and qualifications:* * Bachelor"s Degree in physical therapy from an accredited program * Completion of the National Certification Examination for Registered Physical Therapists * Physical therapy license in the state of practice * Two years of physical therapy experience * Must be available Saturday and Sunday* * If you"re a Brookdale associate, please consider referring someone through the Good People Program! Brookdale is an EOE-(Equal Opportunity Employer) and drug-free workplace.
          ADT - Install Technician - Miami - Safe Haven Security - Miami, FL   
Valid driver's license, and clean driving record. Provide your own basic tools, and be available to work Monday-Saturday with some early evenings required.... $60,000 a year
From Indeed - Thu, 06 Apr 2017 22:18:15 GMT - View all Miami, FL jobs
          Judicial Notice of Claim – June 29, 2017   
Originally posted on Maine Republic Email Alert:
 Judge Anna von Reitz This message is to Judge Thomas Hogan and Judge Royce Lambert and shall constitute an official Judicial Notice of Claim to them and to The United States District Court for the District of Columbia: The American states and people that are the Paramount Security…
          Strážný/á   
Bezpečnostní agentura hledá strážného – ostraha objektu. Místo výkonu Veltrusy. Požadujeme fyzickou a psychickou odolnost, věk od 18 let a trestní bezúhonnost. Plat dohodou, po zapracování možnost HPP. Více informací na personal@cssecurity.cz nebo...
          Draymond Green Snapchats the Extra Security Presence to Protect KD in OKC (Video)   
Draymond Green Snapchats the Extra Security Presence to Protect KD in OKC (Video)

          Brazil Braces for Nationwide Strike Against Reform Bills Today   
By Lise Alves, Senior Contributing Reporter SÃO PAULO, BRAZIL – Brazilian officials are bracing for what may become a significant nationwide protest today, Friday June 30th, against the government’s labor and social security reform bills in Congress. Demonstrations have been reported around the country, as groups block large urban highways and public transportation comes to […]
          Challenges abound as ‘significant’ numbers of displaced return within Syria, warns UNHCR   
Citing “significant” returns of displaced persons to and within Syria, the United Nations refugee agency said today that while it will be scaling up its response to assist those coming back, it can neither promote nor facilitate returns given the security and humanitarian situation in the war-torn country.
          Monitoring and Evaluation Deputy Project Manager at Cooperazione Internazionale (COOPI)   

Cooperazione Internazionale (COOPI) is an Italian humanitarian non-governmental organization founded in Milan in 1965. COOPI aims to help the world’s poorest to improve their access to healthcare, food, and financial security, and to overcome their special vulnerability to wars, civil conflicts and natural disasters. With more than 3,900 humanitarian workers employed, and an average of […]

The post Monitoring and Evaluation Deputy Project Manager at Cooperazione Internazionale (COOPI) appeared first on Career Hob.


          Entry-level Complaints Response Mechanism (CRM) Officer at COOPI – Cooperazione Internazionale   

Cooperazione Internazionale (COOPI) is an Italian humanitarian non-governmental organization founded in Milan in 1965. COOPI aims to help the world’s poorest to improve their access to healthcare, food, and financial security, and to overcome their special vulnerability to wars, civil conflicts and natural disasters. With more than 3,900 humanitarian workers employed, and an average of […]

The post Entry-level Complaints Response Mechanism (CRM) Officer at COOPI – Cooperazione Internazionale appeared first on Career Hob.


          Assistant Country Director (ACD) at CARE Nigeria   

At CARE, we seek a world of hope, tolerance and social justice, where poverty has been overcome and people live with dignity and security. This has been our vision since 1945, when we were founded to send lifesaving CARE Packages® to survivors of World War II. Today, CARE is a global leader in the movement […]

The post Assistant Country Director (ACD) at CARE Nigeria appeared first on Career Hob.


          Nifty On-Sale Items for Your Bedroom and Bath   
Can you spot the hidden security camera? Yes, it’s that Minion HD Wi-Fi Camera. Your kids will not mind having that in their room as it’s super fun. You can
          Burma: Drop Charges Against 3 Journalists   

A reporter looks at an article about the three detained journalists in the Democratic Voice of Burma newsroom in Rangoon, Burma, June 29, 2017.

© 2017 Reuters

(Bangkok) – Burmese authorities should immediately drop charges against three journalists for news gathering at a public event organized by the Ta’ang National Liberation Army (TNLA) in northern Shan State, Human Rights Watch said today.

On June 26, 2017, the Burmese military detained Aye Nai and Pyae Phone Naing from the Democratic Voice of Burma and Thein Zaw, also known as Lawi Weng, from The Irrawaddy after stopping their car as they returned from a TNLA drug-burning ceremony marking the United Nations International Day Against Drug Abuse and Illicit Trafficking. On June 28, the reporters were charged under section 17(1) of Burma’s colonial-era Unlawful Associations Act of 1908, local media reported. All three have been detained at Hsipaw prison in Shan State and are next scheduled to appear in court on July 11.

It’s appalling that the Burmese authorities are charging journalists for simply doing their job.

Phil Robertson

Deputy Asia Director

“It’s appalling that the Burmese authorities are charging journalists for simply doing their job,” said Phil Robertson, deputy Asia director. “Burma’s government, which consists of many former political prisoners held on similarly dubious grounds, should drop these charges immediately and ensure the three are released.”

During the nearly three days the military held the journalists without charge, their location was unknown. Four other people were reportedly also arrested and detained.

Section 17(1) of the Unlawful Associations Act carries a sentence of up to three years in prison for anyone who “is a member of an unlawful association, or takes part in meetings of any such association, or contributes or receives or solicits any contribution for the purpose of any such association, or in any way assists the operations of any such association.” This broadly worded provision has been routinely used for decades to punish people suspected of having any contact with an opposition armed group.

Ta’ang National Liberation Army soldiers burn an opium field in northern Shan State, January 16, 2014.

© 2014 Reuters

The TNLA is among more than a dozen ethnic minority armed groups that for decades have been fighting Burma’s central government, and has been designated an “unlawful armed group” by the Burmese authorities. While the TNLA is not a signatory to the Nationwide Ceasefire Agreement signed in October 2015, representatives of the armed group attended the second round of the Panglong Peace Conference held by the Burmese government in the capital, Naypyidaw, in May 2017.

Arresting journalists who are gathering news about an armed group is a serious blow to media freedom in Burma. While the government may place restrictions on the media for national security reasons, these restrictions must be strictly necessary for a legitimate purpose and not be overbroad. They may not be used to suppress or withhold information of legitimate public interest not harmful to national security, or to prosecute journalists for reporting such information.

For the government to fulfill this responsibility, journalists must be able to speak and meet with a variety of people without fear of arrest or harassment – including those who are in conflict with the government or military.

The arrest of the three journalists appears to conflict with Burma’s News Media Law. Section 7(a) of the law, in force since June 2015, states that a journalist “shall be exempt from being detained by a certain security related authority, or his/her equipment being confiscated or destroyed,” while gathering news in areas “where wars break out, and where conflicts or riots and demonstrations take place.”

“The Burmese military is using the Unlawful Associations Act to attack the country’s news providers,” Robertson said. “All charges under section 17(1) should be dropped and the provision rescinded so that journalists can accurately cover the country’s ethnic conflicts.”


          Terrorists use tech to their advantage, but it's time to stop them, UN expert says   
David Scharia from the UN Security Council Counter-Terrorism Committee Executive Directorate talks fighting terrorism online.
          Iraq: New Abuse, Execution Reports of Men Fleeing Mosul   

A member of Iraqi security forces stands on the turret of an armoured vehicle along a highway near west of Mosul, Iraq, June 22, 2017. 

© 2017 Reuters
 
(Beirut) – Allegations are emerging of Iraqi forces beating and unlawfully killing men and boys fleeing Mosul in the final phase of the battle against the Islamic State (also known as ISIS), Human Rights Watch said today.

Four witnesses told Human Rights Watch that they saw Iraqi forces beat unarmed men and boys fleeing the fighting within the last seven days, and said they also obtained information about Iraqi forces executing unarmed men during this time period.

“As Iraqi forces are poised to retake the entire city of Mosul, allegations of unlawful killings and beatings significantly raise concerns for the civilians there who have been living under ISIS control,” said Lama Fakih, deputy Middle East director at Human Rights Watch. “Iraqi forces are promising liberation, but they need to find out what’s happening now and stop any abuse.”

One witness said that three Emergency Response Division and Iraqi Security Force (ISF) members on a key route for civilians fleeing the city boasted to him that they were executing captured unarmed men who were thought to be ISIS-affiliated instead of detaining them. The Emergency Response Division and ISF fighters, stationed three kilometers from the heaviest fighting in the Old City, said they made an exception for elderly men, the witness said.

Two other witnesses said they saw Iraqi uniformed soldiers pick at least six men and boys out of crowds of fleeing civilians at a checkpoint, beat them, and drive them away. They said they saw soldiers pick out another man, beat him, and then move him into a building they were using as a base. One of the witnesses said that soldiers later said they had killed him.

“I have heard of countless abuses and executions in this battle,” one witness said. “But what’s changed is that in this final phase fighters are no longer hiding what they are doing and are comfortable allowing us to witness the abuses first-hand.”

The same witness said that earlier this week, he heard three screams coming from a building being used by the elite Counter Terrorism Service (CTS), after which fighters from the unit ushered him away. That afternoon in another neighborhood of west Mosul, the witness saw two CTS fighters take down the corpse of an alleged ISIS fighter that had been strung up to an electrical pole, and stone the body before taking a few photos of each other posing with it.

That night, he said, a CTS fighter also showed him a video of a severely beaten man who the fighter said was an ISIS prisoner. In the video the CTS fighter shoots and kills the unarmed detainee, he said.

In the days before, the man said he saw five Iraqi soldiers at a checkpoint pick out at least 10 men over a period of an hour, beat them, and drag them toward a building the soldiers were using as a base. He said that one of the men the soldiers were beating was wounded and that he had arrived with his family from a front-line field hospital. The witness said that as he was leaving the area he saw the soldiers single out more and more men, beat them and take them away, but lost count of how many.

An article published in a Swedish outlet on June 28, 2017, by a Swedish journalist who was on the front-line says that a Federal Police officer boasted about decapitating at least 50 men with knives and beating others, with fellow officers watching, cheering, and sometimes filming. The article said the Federal Police backed up these claims with photos and videos.

Throughout the operation to retake Mosul, Human Rights Watch has documented Iraqi forces detaining and holding thousands of men and boys in inhumane conditions without charge, and in some cases torturing and executing them, under the guise of a screening them for ISIS-affiliation. In May 2016, Iraqi forces retook the city of Fallujah from ISIS, but in the operation committed horrific abuses, including executions, torture, and the disappearance of over 600 men whose bodies have yet to be found.

Human Rights Watch has raised concerns regarding allegations of ill-treatment, torture, and executions numerous times in meetings with Iraqi officials in Baghdad as well as with representatives from US-led coalition member countries. Human Rights Watch does not know of a single transparent investigation into abuses by Iraqi armed forces, any instances of commanders being held accountable for abuse, or any victims of abuse receiving compensation.

Iraqi criminal justice authorities should investigate all alleged crimes, including unlawful killings and mutilation of corpses, committed by any party in the conflict in a prompt, transparent, and effective manner, up to the highest levels of responsibility. Those found criminally responsible should be appropriately prosecuted. Extrajudicial executions and torture during an armed conflict are war crimes. Despoiling dead bodies and other outrages on personal dignity are violations of the laws of armed conflict and may amount to war crimes.

“Reports of unlawful executions and beatings by Iraqi soldiers should be enough to raise concern among the highest ranks in Baghdad and among members of the international coalition combatting ISIS,” Fakih said. “Iraqi officials should translate that concern into accountability for war crimes.”


          Petya Update: Ukraine Claims To Have Seized Equipment Used By Russia In Cyberattack   
The Security Service of Ukraine (SBU) reported Friday that it seized equipment belonging to agents of Russia that was used to carry out a number of cyberattacks against Ukraine and other countries, Reuters reported. The agency claimed the equipment was used in part to carry out attacks in May and June, and may have been involved in an attack earlier this week that resulted in the spread of malware to computer systems in at least 65 countries.
          តើអាច​ការពារ​កុំព្យូទ័រ មិន​ឲ្យ​ឆ្លង​មេរោគ បាន​ដោយ​របៀបណា?   

(បច្ចេកវិទ្យា)៖ ចូររក្សាម៉ាស៊ីនកុំព្យូទ័ររបស់អ្នក ឲ្យបានស្អាត (មិនឲ្យមានមេរោគ ឬក៏ចំនុចខ្សោយ)៖ ធ្វើបច្ចុប្បន្នភាពកម្មវិធីសន្តិសុខរបស់អ្នក (Keep security software current)៖ ការធ្វើបច្ចុប្បន្នភាពថ្មីបំផុតនៃកម្មវិធីកំចាត់និងទប់ស្កាត់មេរោគ កម្មវិធីបើកមើលវិបសាយ (web browsers) និងប្រព័ន្ធប្រតិបត្តិការ (operating system) គឺជារបងការពារយ៉ាងប្រសើរ ប្រឆាំងទៅនឹងមេរោគ (virus, malware) និងការគំរាមគំហែងតាមប្រព័ន្ធអិនធឺណែតដទៃៗទៀត។ ធ្វើបច្ចុប្បន្នកម្មដោយស័្វយប្រវត្តិ (Automatic Software Updates)៖ កម្មវិធីជាច្រើននឹងធ្វើការភ្ជាប់ដោយស្វ័យប្រវត្តិ ទៅកាន់អិនធឺណែត និងធ្វើបច្ចុប្បន្នកម្ម-កម្មវិធី ដើម្បីការពារប្រឆាំងទៅនឹងហានិភ័យ។ ចូរកំណត់ (turn on) ការធ្វើបច្ចុប្បន្នកម្មដោយស្វ័យប្រវត្តិ បើសិនជាអាចធ្វើទៅបាន។ ការពាររាល់ឧបករណ៍ទាំងអស់ ដែលភ្ជាប់ទៅកាន់អិនធឺណែត (Protect all devices that connect to the Internet)៖ ក្រៅពីកុំព្យូទ័រនៅមានឧបករណ៍ដទៃទៀត ដូចជា ទូរស័ព្ទដៃទំនើប (smart phones), ប្រព័ន្ធហេ្គម (gaming), iPad, Tab, និងឧបរកណ៍ចល័តដទៃទៀត […]

The post តើអាច​ការពារ​កុំព្យូទ័រ មិន​ឲ្យ​ឆ្លង​មេរោគ បាន​ដោយ​របៀបណា? appeared first on Khmer Talking.


          Va. man sues Bank of America again for declaring him dead again   
RICHMOND, Va. — An Elkton, Virginia man has sued Bank of America for a second time claiming the bank has, once again, falsely declared him to be dead. The first time it happened, in 2012, the bank reported the purported death of George J. McClellan to the Social Security Administration, Medicare, credit reporting bureaus and ...
          Information Security Risk Analyst - 318169   

          Visiongain: Anti-Counterfeit Packaging Technologies Market Report 2017-2027   
Forecast by Type (Coding & Printing Technology, RFID, Holograms, Security Labels, Packaging Designs) (...)
          Inside Mae Beavers: A Parody Arises   
Your PeskyFly was considering a soft-core parody of Tennessee's puritanical, porn-busting gubernatorial candidate Sen. Mae Beavers. The premise: Me and May would destroy millions of innocent young lives with passionate acts of slippery abandon. Awesome so far, right? Catch was, I couldn't come up with the right title. Should it be Around the World with Mae Beavers? 69 Things I Know About Mae Beavers? Strangers in a Strange Beaver? Butt Slammers Vol. 4? So many choices, none of them quite right.

Like they say, when you snooze you lose. While I was dithering, some industrious person was busy crafting a Mae Beavers parody that's so much better than anything I might have come up with because, presumably, this call's coming from inside "the House."

The entire text, typos and all, as originally shared by the Nashville Scene.

How to be The Ultraconservative Candidate
Nothing is more important when running for office in Tennessee than getting the conservative vote – and it is the ultraconservative who will probably win the election. So how can you appear to be the ultraconservative candidate?

Preeminence: Make yourself the preeminent conservative in the state. Remember, it is a competition, and by passive aggressively one-upping all other politicians, you can appear to be really nice but in reality, you are crushing the reputations and political futures of potential opponents. Which is good to do because self-centered, attention-grabbing is a useful skill to ensure your future political success.

Secure your superiority through negative contrasting; unnecessarily make comparisons that negatively contrast other elected officials with you. This will present you in the most positive light. Should an official try to claim that they are conservative, what they are really doing is claiming to be more conservative than you. Put an end to this by calling them a RINO, and inferring that they secretly support an income tax.

The key to being the preeminent conservative is control. Control is the glue that holds conservatives who lack critical thinking skills together. It is also a passive aggressive technique you can use against other Republicans; it is really the best way to ensure that you receive the constant attention and admiration from the public that you deserve.

Remember, being in office for 25 years doesn’t mean you are an establishment politician as long as you always call other conservatives who have been in office for a shorter amount of time than you establishment politicians. This helps you assert your dominance in the lives of everyone around you, and dominance helps to improve your life. If anyone doubts you, simply recite your impossible dogmatic standards or your rabid deep-seated feelings of victimization.

Public Speeches: Supplying detail in your public speeches is bad, and may cause you to have to answer actual questions; so speak in vague generalities and platitudes at all times. People will read between the lines and respond with total adoration and obedience. If political insecurities necessitate wild claims about ISIS infiltration or constituents – sweep the room for mics first.

Be sure to call all other Republicans RINOs, that way these officials will learn that they have done something wrong, and because you should be speaking in vague generalities, people will just assume you are the only real conservative without any way to actually measure. They will also believe that all other legislators are simply RINOs at the core of their being.

Further, each time you make negative accusations about the legislature, it is encouragement for them to be more conservative.

Statesmanship: Emphasizing your own statesmanship through snarky comments has the added benefit of shaming other legislators – communicating your own statesmanship through misdirected shame is a direct way to communicate that you are preeminent, and don’t forget – they deserve it.

Legislation: Be legislatively savvy. File bills that appear so conservative that they are actually unconstitutional. Then issue a press release that takes advantage of the blind support of people who don’t know the difference. Insist on running these bills in committee; when the Attorney General opines that the bill is constitutionally suspect this is your big chance to issue a second press release that labels the AG and your Republican colleagues as RINOs – which makes you appear to be the only real conservative in the legislature.

Paint your record as something completely different than what it is. Your oath to uphold the Constitution should never get in the way of your own narcissistic desire for preeminence. Only a true freedom fighter would file an unconstitutional bill, and your refusal to fix your bill by making it constitutional can easily be justified by a plain folks’ appeal that encompasses name calling and proper over simplification of the actual legal issues.

Never let anyone else’s conservative efforts be good enough for you. Remember, if another legislator asks for your support for their ultraconservative idea, they’re not trying to be friendly, they are trying to overthrow your tyrannical reign of control and dominance. You can’t let that happen. You’ll want to play the trump card of filing a nearly identical bill, except, make it a little more outrageous. Then issue a press release containing a directly indirect passive aggressive message that the first legislator has stolen your work. This clearly puts you back in the driver’s seat.

This technique works for dead ultraconservative bills too. If another legislator’s ultraconservative measure died because it came smack dab up against legal realities, you can steal that bill next year and announce to the world that because that legislator was such a RINO and pathetically decided not to get the job done, you will justly assume your natural position of conservative preeminence. When you come up against the same issues as the prior legislator, you can thoroughly enjoy the renewed sense of purpose that floods into your life while you sit on top of your moral high ground calling the committee members who can’t vote for your unconstitutional bill RINO's.

Budget: Take advantage of the fact that the state budget is so large that no one can possibly know off hand all that it contains. This fact alone creates a lot of suspicion and skepticism among ultraconservatives. In this way, year after year, you can receive statewide attention for being the lone conservative vote against the budget. When media ask why you voted no, supply a simplistic platitude, “There is too much pork in that budget”, an explanation so simple that even a democrat can understand. Pork works because people identify pork with fat, and fat makes people think of indulgence and waste.

Supreme Court: Ignoring Supreme Court cases that have already been decided is another good way to lock down your support from a statewide ultraconservative base while at the same time unmistakably signal your disrespect for the judiciary.

Security: You are entitled to your feelings of needing special treatment, and requiring security makes you appear important enough to protect. But what if no one has actually threatened your life? No problem – your paranoia can assist you in just making something up. Also, by pleading, a wealthy conservative businessman is likely to pay for you to have the constant presence of security whenever you are out in public – this has the added benefit of making you look really important and worthy of protection.

Look the Part: Drive a conservative vehicle. It may be tempting to develop a Lexus nexus with other candidates but that’s really sketchy and y’all in Tennessee … a pickup truck is your best bet.

The Constitution: If you’ve gotten this far, understanding constitutional facts isn’t necessary for you so don’t spend any time on this subject. You’ll want to spend most of your time creating new unconstitutional bills that appear ultraconservative but in reality, will rigidly control people’s lives or help them to realize that they are going to spend eternity in hell.
Since being an ultraconservative is a political philosophy that doesn’t have an actual platform or rule book, you don’t need to know what constitutes an ultraconservative and neither does anybody else. This also means that you have zero knowledge of what may or may not be constitutional in your ultraconservative sense. But don’t worry about that, to fill this small little loop-hole, you only need to publicly preach with conviction that any views you hold are truly ultraconservative, and if anyone else who may actually know something about the constitution raises the specter that you are incorrect, it will be crystal clear that they are actually a RINO and you can call them out on that fact.

These suggestions are a really good start towards your goal of ultraconservative preeminence. Good luck with your political future. 

Hot.


          IT Security Engineer   
MA-Wilmington, Our client in Wilmington, MA has a Temp to Hire opening for an Information Security Technical Engineering Lead that possesses both technical and theoretical expertise in the security space. The successful candidate will enhance security by protecting perimeter systems as well as endpoint devices, keeping computer systems and network devices hardened to industry standards. The candidate will work t
          Nikki Haley shines again at the UN   
With every month that goes by, Nikki Haley is proving herself to be a stellar US ambassador to the United Nations in the tradition of Jeane Kirkpatrick and Daniel Patrick Moynihan. On Thursday, for example, she called out other members of the Security Council for praising Iran over its compliance with the Obama nuclear deal....
          Assistant Project Engineer - Network Rail - Glasgow   
Network Rail adheres to the Baseline Personnel Security Standard (BPSS). Network Rail welcomes applications regardless of age, disability, marital status... £31,000 - £33,000 a year
From Network Rail - Thu, 29 Jun 2017 07:54:01 GMT - View all Glasgow jobs
          Senior Gauging Engineer - subject to consultation - Network Rail - Glasgow   
Network Rail adheres to the Baseline Personnel Security Standard (BPSS). Network Rail welcomes applications regardless of age, disability, marital status... £50,000 - £56,250 a year
From Network Rail - Tue, 27 Jun 2017 07:50:43 GMT - View all Glasgow jobs
          Liability Negotiations Researcher - Network Rail - Glasgow   
Network Rail adheres to the Baseline Personnel Security Standard (BPSS). Network Rail welcomes applications regardless of age, disability, marital status... £24,000 - £28,000 a year
From Network Rail - Fri, 23 Jun 2017 07:47:25 GMT - View all Glasgow jobs
          Construction Manager - Network Rail - Glasgow   
Experience within the rail industry. Network Rail adheres to the Baseline Personnel Security Standard (BPSS).... £39,200 - £44,100 a year
From Network Rail - Thu, 22 Jun 2017 07:46:11 GMT - View all Glasgow jobs
          House for sale in drogheda, louth - 625000 eur   
House for sale in drogheda, louth - 625000 eur Grange rath is situated on the dublin road, in the popular and historic colpe area of south drogheda. the besideby coastline and extensive sandy beaches at laytown and bettystown offer great opportunities for swimming, sailing, windsurfing, fishing and walking. there is a fine selection of shopping, great and small, catering for all tastes and requirements. there are a number of excellent restaurants and hotels to choose from. those interested in sports and leisure activities are spoiled for choice with an array of golf courses, rugby clubs, football clubs, athletic clubs and varied leisure facilities. there is a very good selection of primary and secondary schools and plenty of local activities for children of all ages. this house was built circa 2002/2003 by shannon homes. traditionally built by block construction, a pitched roof with ridged tiles. the current owner of the property has kept the property well maintained and tastecompletely decorated over the years. this stunning 5 bedroom detached residence is an ideal family home with its spacious interior and excellent layout. on arrival the magnificent entrance hall with its custom-made rounded staircase gives a sense of grandeur, 4 generous reception rooms allow for family get-togethers and perfect for entertaining guests. the kitchen comprises of a high quality german fitted kitchen with feature island unit and polished granite work surfaces, along with the dining area this is a substantial space which is ideal for the heart and soul of any modern home. a guest wc and utility room complete the downstairs accommodation. upstairs comes with 4 double bedrooms (2 complete with en-suites), 1 single bedroom and family bathroom. the overall condition of the property is excellent and is tastecompletely decorated throughout. to the outside the abundant driveway offers ample parking space which has the added security of electronic gates, complete with a handsome secluded patio seated area just inside the property entrance. the rear garden is part in lawn and part in decorative stone complete with raised water features along with outside studio/gym measuring circa 40m. services sewage: mains water: mains electricity: mains heating: natural gas ber rating building elements building energy rating - c1 (copy available on request) rarely does a house located on the front row of this estate come to the market, viewing is highly recommended! accommodation entrance hall (5.30m x 6.07m) toilet (1.14m x 1.54m) living room (4.76m x 5.98m) dining room (4.67m x 4.77m) dining area (3.47m x 6.16m) kitchen (4.58m x 5.55m) sunroom (5.03m x 4.37m) utility (2.11m x 3.12m) reception 2 (5.39m x 4.82m) bedroom 1 (5.05m x 4.43m) en-suite (2.41m x 3.41m) bedroom 2 (2 4.77m x 3.141m) bedroom 3 (2.83m x 3.42m) bedroom 4 (5.0m x 3.52m) bedroom 5 (4.6m x 4.7m) en-suite (1.94m x 2.14m) bathroom (3.46m x 2.78m) outside studio/gym (4.77m x 8.02m)features:natural gas heating system (zone controlled) cobblelock driveway completely alarmed great side entrance electronic security gates double glazed pvc windows ample parking spaces security cctv cameras
          How to Achieve Continuous Container Security for Your CI/CD Pipeline   
Integrate and Automate Security in Your Build, Ship, & Run Processes As enterprises move quickly to deploy containers and microservices with a continuous integration and delivery (CI/CD) pipeline, security often becomes an afterthought. DevOps and security teams should also strive to achieve continuous container security in