среда, 29 февраля 2012 г.
VIC: Main stories in today's Melbourne newspapers
AAP General News (Australia)
02-25-2008
VIC: Main stories in today's Melbourne newspapers
MELBOURNE, Feb 25 AAP - The main stories in today's Melbourne newspapers:
HERALD SUN:
Page 1: More truck drivers than ever are putting Victorian motorists at risk by taking
drugs to stay awake at the wheel.
Page 2: Abandoned baby Catherine has found a new home with a family that hopes to adopt her.
Page 3: Hawthorn president Jeff Kennett says the AFL needs to bow to the "national
interest" and support Australia's bid to host the 2018 soccer World Cup.
World: An enraged Hillary Clinton has …
FED:Cadets were 'friends with benefits': court
AAP General News (Australia)
04-29-2011
FED:Cadets were 'friends with benefits': court
The statement to the court goes on to detail the immediate aftermath of the incident.
After returning to her room .. the female discovered a message on her Facebook site
.. which stated the sender was about to have sex with a girl and had a webcam set up to
the boys in another room.
The statement says MCDONALD told the woman someone else must have posted it as a joke.
But on Friday April 1 .. the Australian Defence Force Investigative Service told the
cadet she had been filmed.
ACT Chief Magistrate JOHN BURNS heard argument from MCDONALD'S lawyer that the case
should be suppressed due to national security concerns .. but Mr Burns rejected the request.
MCDONALD and DEBLAQUIERE have been bailed to appear before the court on May 20.
AAP RTV pv/sb/wz
KEYWORD: CADET 2 CANBERRA
� 2011 AAP Information Services Pty Limited (AAP) or its Licensors.
FED:Aust at "pretty good starting point"=4
AAP General News (Australia)
08-26-2011
FED:Aust at "pretty good starting point"=4
Mr Stevens said that caution was not necessarily a bad thing.
"That's good because some day if there is a downturn, you don't want those households
to be excessively exposed in terms of their leverage when there is an adverse shock to
income," he told the committee in response to a question.
"We have got an investment boom , it is actually not a bad thing to have some savings
to help fund that."
Three months ago, the central bank was leaning toward raising interest rates to combat
inflationary pressures in the local economy.
But since then it had "sat still" and watched as stock prices fell, loan growth moderated
and the Australian dollar rose.
Looking ahead, consumer price index (CPI) inflation in the September quarter was likely
to remain "well above" three per cent - which is high in inflationary terms.
It was then likely to fall into the early part of 2012, as the impact of the summer
floods in Queensland on food prices waned.
However, the RBA board would still need to be careful when considering interest rate
settings in the months ahead.
"It would be reasonable to anticipate that a decline in confidence arising from the
recent events internationally may well dampen demand somewhat," Mr Stevens said.
"That, together with the increased visibility of structural change in the economy,
may also condition wage bargaining and price setting.
"If these forces persist, they may act to lessen the upward trend in inflation pressures
that appeared to be in prospect."
On the other had, significant rises in a range of "administered" prices - such as electricity
- were due to occur over this time.
"So as usual, there are varying factors about which the Board will need to make careful
judgements over the months ahead," he said.
As well, Mr Stevens said while there had been some moderation in growth in the Chinese
economy it remained solid, inflationary pressures were rising.
"Asia's management of these challenges will ultimately matter a good deal for Australia,
and for the world," he added.
Mr Stevens also said it would not be until next year that coal production in Queensland
was likely to recover, following the summer floods.
"The process of de-watering pits is taking longer than initially expected," Mr Stevens
said in Melbourne.
"So the recovery in coal production is only about two-thirds complete at this time.
"It may be early next year until production is fully recovered.
Mr Stevens noted also that Australian bank funding costs had fallen, resulting in lower
interest rates for fixed mortgages.
AAP klm/it
KEYWORD: RBA 4 CANBERRA
� 2011 AAP Information Services Pty Limited (AAP) or its Licensors.
SA:Two men caught riding a freight train to Vic
AAP General News (Australia)
02-15-2011
SA:Two men caught riding a freight train to Vic
Two young men have been caught riding a freight train bound from Adelaide to Melbourne.
Police stopped the train early today after receiving a report two people were riding
between containers on the train near Mt Lofty .. in the Adelaide hills.
A 20 year-old man has been arrested and charged with riding on rolling stock and giving
a false name and address.
A second man .. also aged 20 .. was issued with an 800 dollar fine.
AAP RTV lk/sw/
KEYWORD: TRAIN (ADELAIDE)
� 2011 AAP Information Services Pty Limited (AAP) or its Licensors.
Streamcore Introduces New Traffic Classification for SaaS Applications
Wireless News
11-12-2010
Streamcore Introduces New Traffic Classification for SaaS Applications
Type: News
Streamcore, a provider of visibility and dynamic performance control solutions to manage interactive applications and real-time communications delivery over the WAN, announced the availability of a new, HTTPS traffic classification capability for Software-as-a- Service (SaaS) applications on enterprise networks.
Streamcore said its new classification feature automatically detects SaaS traffic such as Salesforce, Citrix GoToMeeting, Google Apps or Microsoft Online Services. Once classified, Streamcore solutions can monitor and prioritize any type of SaaS traffic over corporate Internet access links to ensure the best possible performance.
The Company noted that maintaining acceptable service levels for SaaS is one of the biggest concerns that enterprises have when considering the adoption of public cloud computing services. Interactive or real-time SaaS applications are accessed by employees through corporate Internet access links and compete with bandwidth intensive traffic such as recreational Web surfing, emails and software updates. As a result, network congestion can severely degrade the performance of SaaS traffic, hindering all the benefits that SaaS should deliver.
According to a release, the adoption of SaaS results in the need for both controlled network performance and better WAN traffic visibility, which are two of Streamcore's core competencies. However, in order to gain visibility and control of SaaS traffic, the capability to identify this type of traffic on the network is required. For security reasons, SaaS HTTP traffic is always encrypted and exchanged over SSL (HTTPS), making traditional traffic classification processes based on TCP/UDP ports or HTTP URLs useless. Consequently, Streamcore has enhanced its Deep Packet Inspection (DPI) engine to automatically identify and classify SSL- based WebEx, Salesforce and other public cloud computing SaaS traffic into specific classes for monitoring and prioritization. While most network solutions managing SSL traffic (e.g., firewalls, application acceleration) must act as a SSL proxy to decrypt and re- encrypt the traffic, Streamcore's SSL classification engine does not intercept or modify SSL traffic and is non-intrusive.
"Awareness of all types of applications on the network is the first critical step in managing performance," said Frederic Hediard, vice president of product strategy at Streamcore. "Streamcore provides one of the most advanced DPI engines for detecting business applications, especially real-time communications such as voice over IP and video. Our new capability for automatically classifying business-critical SaaS applications further helps enterprises to ensure their public cloud computing projects are not jeopardized by poor network performance over corporate Internet access links."
More information:
www.streamcore.com
((Comments on this story may be sent to newsdesk@closeupmedia.com))
Copyright 2010 Close-Up Media, Inc. All Rights Reserved.
n/a
FED: Flu vaccine still safe: AMA
AAP General News (Australia)
04-24-2010
FED: Flu vaccine still safe: AMA
CANBERRA, April 24 AAP - Doctors have moved to quell concerns about the seasonal flu
vaccine, reassuring adults it remains safe to use.
Doctors have been told to immediately stop immunising children under five after a spike
in the number of West Australian youngsters experiencing fever and convulsions.
Health authorities are urgently investigating a possible cause.
Australian Medical Association boss Andrew Pesce backed quality control processes used
to test the vaccine, saying it remained safe for anyone aged over five.
"It's not possible to say why this has happened in WA," he told Sky News on Saturday.
"We need to wait for all the information to come in, but the public can be reassured
vaccines are adequately clinically trialled when they are developed."
No other states have experienced a similar spike.
It was possible this was simply a "bad batch" but Dr Pesce was confident authorities
will get to the bottom of the issue.
He urged those aged over five to go ahead with vaccinations.
AAP cj/jhp
KEYWORD: FLU
� 2010 AAP Information Services Pty Limited (AAP) or its Licensors.
NSW: Govt apologises for failing to protect toddler
AAP General News (Australia)
12-10-2009
NSW: Govt apologises for failing to protect toddler
By Patrick Caruana
SYDNEY, Dec 10 AAP - The NSW government has apologised for failing to protect Dean
Shillingsworth, the Sydney toddler murdered by his mother.
A NSW Ombudsman's report found child protection agencies neglected to look after Dean,
who was murdered by Rachel Pfitzner before his body was stuffed into a suitcase and dumped
in a pond at Ambarvale, in Sydney's southwest, in October 2007.
Pfitzner was sentenced in the NSW Supreme Court on Wednesday to a minimum of 19 years
and two months jail.
Community Services Minister Linda Burney has apologised to Dean's grandmother, Ann
Coffey, who had been trying to gain custody of her grandson.
"I say to Ms Coffey without reservation 'we're really, really sorry'," she told reporters
in Sydney on Thursday.
"Not enough was done to protect Dean."
Ombudsman Bruce Barbour's report, released on Thursday, was critical of the way the
Department of Community Services (DoCS) and a non-government agency handled the case.
"At times, information was not relayed, or not relayed effectively," Mr Barbour said
in the report.
"The department's actions ... revealed a continued failure to adequately respond to
reports about the risk of harm to the children."
Ms Burney said the government had worked tirelessly on child protection reforms in
the wake of the findings of the Wood Report.
But opposition community services spokeswoman Pru Goward said talk of reform was not enough.
"The minister cannot hide behind the word 'reform' any longer," Ms Goward said.
"We cannot have any confidence left that their further promises of reform will save
a single child."
Mr Barbour said a non-government agency involved with the family was more concerned
about the welfare of Pfitzner than her children.
"They were very much buying into the mother's desire to regain the care of her children
in circumstances where there were clear risks to the children," he said.
"Because their focus was on the mother they lost sight of the risk issues for the children."
Mr Barbour said 34 risk of harm reports were made about Dean and his older sister.
"None of those resulted in a comprehensive risk of harm assessment," he said.
"Most of them were closed and there was no action taken."
Ms Burney said DoCS didn't handle the case appropriately.
"There is no way that I'm going to defend that. It's not defendable," she said.
"Community Services did not do an adequate job in protecting Dean."
AAP pbc/ev/it/mn
KEYWORD: SHILLINGSWORTH WRAP
2009 AAP Information Services Pty Limited (AAP) or its Licensors.
Vic: Cabbie assaulted in early morning brawl
AAP General News (Australia)
08-02-2009
Vic: Cabbie assaulted in early morning brawl
MELBOURNE, Aug 2 AAP - A Melbourne cabbie suffered head injuries in an attack by a
group of men outside a bayside nightspot early on Sunday.
Police were called to a brawl outside the Prince of Wales Hotel in St Kilda where a
taxi driver had been attacked with a machete at about 5am (AEST).
A police spokesman said the cabbie suffered two head wounds when he was struck a number
of times with the machete.
The cab driver told police he had been assaulted by a large group of men, police said
in a statement.
Officers arrested four men at the scene but later released them pending further inquiries.
Police are looking for four more men, including a man who may have a large cut on his
right hand that may have required medical attention.
The man was missing a shoe at the time, police believe.
He is described as Caucasian, of medium height with short light-coloured hair.
Taxi drivers and in particular drivers of Indian descent have been the subject of a
string of attacks. The stabbing of a 23-year-old cabbie from India in April last year
prompted a mass protest rally in Melbourne streets.
AAP md/jl
KEYWORD: ASSAULT
2009 AAP Information Services Pty Limited (AAP) or its Licensors.
FED: Baby bonus means test kicks in on Jan 1
AAP General News (Australia)
12-31-2008
FED: Baby bonus means test kicks in on Jan 1
Federal changes from January 1:
* Baby bonus means test kicks in
* Baby bonus to be paid in instalments .. not lump sum
* New federal-state funding framework agreements kick in
* New National Disability Agreement comes into force, aiming to improve disability services
* New child protection information sharing protocols come into force
* Government's national plan to increase organ donation swings into action
* Maths and science university students to benefit from lower fees
* Truckies to be slugged with heavy vehicle road user tax increase
AAP RTV ag/crh/fdf
KEYWORD: CHANGES FEDERAL FACTBOX
2008 AAP Information Services Pty Limited (AAP) or its Licensors.
0600 2GB Sydney Headlines
AAP General News (Australia)
08-21-2008
0600 2GB Sydney Headlines
- Bolt claims double sprint and world record in Beijing
- Calls for softball to be brought back to the Olympics after bronze for Australia
- Unclear if any Australians are involved in an horrific plane crash in Madrid
- 19-y-o man charged over stabbing during Sydney home invasion
SPORT
- NRL, Cricket
- Oly wrap
AAP RTV tm
KEYWORD: 0600 2GB
2008 AAP Information Services Pty Limited (AAP) or its Licensors.
Vic: Australia Post releases Anzac Day stamps
AAP General News (Australia)
04-15-2008
Vic: Australia Post releases Anzac Day stamps
MELBOURNE, April 15 AAP - Five stamps commemorating Anzac Day have been unveiled by
Australia Post.
The stamp series depicts Australians showing their respect on the remembrance day.
Each stamp features a different scene, from veterans united in friendship during the
march, a bugler playing the Last Post, to young Australians holding the flag.
Alongside each picture are significant lines from The Ode.
The stamps were unveiled after a wreath laying ceremony at Melbourne's Shrine of Remembrance
this morning.
Defence Force Chief Air Chief Marshal Angus Houston said the stamps were special because
they were part of remembering what the Anzac troops did all those years ago.
He said young people were recognising the significance of Anzac day.
"I think we all look back at the Anzacs with a great deal of awe. These were very young
people, part of a very young nation, and I think they set an example for all of us to
strive for."
AAP kb/gfr/apm
KEYWORD: ANZAC STAMPS (PIX AVAILABLE)
2008 AAP Information Services Pty Limited (AAP) or its Licensors.
NSW: Truck slams into cyclists leaving one dead, one in hospital
AAP General News (Australia)
12-11-2007
NSW: Truck slams into cyclists leaving one dead, one in hospital
A truck has slammed into a group of cyclists near Newcastle .. leaving one person dead
and another in hospital.
One northbound lane of the Old Pacific Highway remains closed at Blacksmiths .. north
of Swansea .. following the incident at 6.45am (AEDT).
A 33-year-old man was in cardiac arrest when emergency crews arrived .. but he died
a short time later from his injuries.
NSW Ambulance originally reported another cyclist died at the scene .. but a spokesman
says only one fatality occurred as a result of the incident.
A second cyclist was treated for minor injuries and made his own way to hospital.
AAP RTV vpm/was/ibw/bart
KEYWORD: CYCLISTS (SYDNEY)
2007 AAP Information Services Pty Limited (AAP) or its Licensors.
TAS: Climate change impacting on fish growth: CSRIO
AAP General News (Australia)
04-27-2007
TAS: Climate change impacting on fish growth: CSRIO
By Glenn Cordingley
HOBART, April 27 AAP - Climate change is leading to bigger fish in shallow water, but
they are growing slower at greater depths, CSIRO research in Tasmania suggests.
The study involved scientists examining 555 fish earbones aged two to 128 years, which
show similar characteristics to tree growth rings.
Water temperature records taken over 60 years from Maria Island in the Tasman Sea,
off Tasmania's east coast, were also used in the analysis.
"We have drawn correlations between the growth of fish species related to their environmental
conditions - faster growth in waters above a depth of 250 metres and slower rates of growth
below 1,000 metres," report author Dr Ron Thresher said.
"These observations suggest that global climate change has enhanced some elements of
productivity of shallow-water stocks but at the same time reduced the productivity and
possibly the resilience of deep water stocks."
The Australian research was published by the US National Academy of Sciences this week.
Dr Thresher said water temperatures had been a primary factor in determining juvenile
growth rates in the species examined - banded morwong, redfish, jackass morwong, spiky,
black, smooth and warty oreo and orange roughy.
He said growth rates of a coastal species, juvenile morwong, in the 1990s were 28.5
per cent faster than at the beginning of the period under assessment in the mid-1950s.
By comparison, juvenile oreos, a species found at depths of around 1,000 metres, were
growing 27.9 per cent slower than in the 1860s.
There was no or little change in the growth rates of species found between 500 and 1,000 metres.
"We can't assume that everything in the fishing industry will stay the same while the
biology of fish is changing," Dr Thresher said.
"Fishing managers need to be aware of these changes and be more conservative in the
way they treat these fish stocks.
"The other big message is the eco-system is changing and as a result fisheries and
conservation management will become complicated as fish adapt to living in warmer waters."
He said data suggests that, with increasing global warming, temperatures at intermediate
depths were likely to rise "near-globally".
"This could mean that over the course of time, the decrease in growth rates for the
deep-water species could slow or even be reversed," Dr Thresher said.
AAP grc/cjh/cdh
KEYWORD: CSIRO (PIX AVAILABLE)
2007 AAP Information Services Pty Limited (AAP) or its Licensors.
SA: Hotel staff charged with assaulting patron
AAP General News (Australia)
12-28-2006
SA: Hotel staff charged with assaulting patron
Two staff at an Adelaide hotel have been charged with assaulting a patron.
Police say the male victim was allegedly assaulted after a verbal exchange when asked
to leave the hotel at Bolivar in Adelaide's north about two this morning (CDT).
Two hotel staffers .. a 49-year-old man from Salisbury North and a 25-year-old man
from Lockleys .. have been arrested and charged with assault.
They'll appear in court at a later date.
AAP RTV sl/cp/els/
KEYWORD: PUB (ADELAIDE)
2006 AAP Information Services Pty Limited (AAP) or its Licensors.
Boeing unplugs in-flight InternetNumber of users fell short of projections
International Herald Tribune
08-19-2006
Maybe it was the Internet bubble in the sky, or perhaps the business plan that just couldn't fly.Boeing on Thursday scrapped its in-flight Internet service, saying there was insufficient demand. But don't tell that to its customers. Anecdotally, in research and according to the German airline Lufthansa, which has deployed the service more than any other carrier, passengers adore the option of staying connected while flying. ''I will be extremely sad if this service ends,'' said Marcel Reichart, a managing director in Munich for strategy at Hubert Burda Media who flies frequently and used the service nearly a dozen times flying to the United States. ''There is a stable connection that allows me to get a full day of work done while speaking over Skype, sending e-mails and everything,'' Reichart said. The service is much like that in a Web cafe, with passengers gaining access to the Internet through a high-speed wireless network. The system, also used by executive jets as well as oil rigs and vessels at sea, bounces the Internet connection off a series of satellites. Boeing published a survey of 3,200 airline passengers in April that seemed to indicate that the airborne Net would soar in popularity. The survey found that 83 percent said Internet availability would have an impact on their future travel plans and choice of airline. Of those who actually used the service, called Connexion, 92 percent said they would recommend it. The problem, it seems, is the number, rather than the enthusiasm of users.In announcing the project in 2000, Boeing projected that the market for in-flight Internet access would be worth $70 billion over 10 years. But the company said Thursday that the number of passengers using the service on the 156 aircraft with 12 airlines amounted to little more than ''low single digits'' a flight. Boeing declined to say how much it cost to run the service. The cost to airline passengers is $9.95 an hour or $26.95 for an entire flight, and revenue is shared between Boeing and the airlines.Lufthansa, which operates 62 aircraft using the system, said the maximum number of passengers ever connected at one time was around 40 a flight, usually on routes to North America and Asia.''Given the usage level, we just didn't see the kind of numbers that add up to a business,'' said John Dern, a spokesman for Boeing. ''You could say it flew well technically, but it didn't fly so well as a business.''Dern said that while the shutdown was entirely unrelated to the airport security alert in Britain last week, difficulties faced by airlines following Sept. 11, 2001, did not help. Ken Dulaney at the research firm Gartner in San Jose, California, predicted the system would rise again. ''It seems clear to me there is a business there, just not the way Boeing built it,'' he said. ''There will be a fire sale of Boeing's investments, and then someone will take over this niche market.''Dulaney drew a parallel with the Iridium global satellite-based telephone system that collapsed shortly after its completion but is still operating under new ownership.''The service was really badly marketed, so that is something the new operators can improve,'' Dulaney said. ''The biggest problem right now is that airlines can barely afford a new tire, much less a service like this.'' Airbus, Boeing's biggest rival, seems to agree with Dulaney that such a service has a future. ''We are full speed ahead with deploying wireless Internet on board our aircraft,'' said Justin Dubon, a spokesman for Airbus. ''We see Internet as much more than just surfing the Web.'' Airbus plans to introduce its own Internet service with the delivery of the first of the giant A380s to Singapore Airlines at the end of this year, Dubon said. The provider of the service, OnAir, is a joint venture between Airbus and SITA. Lufthansa offers Internet service on several Airbus aircraft, but using the Boeing system. Customers flying Airbus can expect the Internet to be a crucial part of their in-flight experience, Dubon said. ''The possibilities are really endless once you put Internet in an aircraft,'' he said. ''Passengers might be able to download films or even send a message to someone they see across the aisle.'' For Lufthansa, Boeing's imminent shutdown of the system is daunting.''We really want to continue offering this service, but right now we just don't know how we will,'' said Michael Lamberty, a spokesman for Lufthansa. ''Fortunately, Boeing said the service will continue for several months, so perhaps we can find a solution.''
) 2006 Copyright International Herald Tribune. http://www.iht.com
NSW: Govt to make state wage case submission
AAP General News (Australia)
04-13-2006
NSW: Govt to make state wage case submission
EDS: Embargoed to 0001 Thursday, April 13.
SYDNEY, April 13 AAP - The NSW government will today make a submission to the 2006
state wage case calling for a $20 weekly increase in the minimum wage.
State Industrial Relations Minister John Della Bosca said the NSW Industrial Relations
Commission hearing was going ahead in defiance of federal government attempts to block
it.
"We will not be intimidated by the Commonwealth's bullying tactics and we will not
relinquish our responsibility to maintain a balanced system for workers and business,"
Mr Della Bosca said.
Mr Della Bosca said the NSW government would push for an increase, in contrast to the
Howard government's contention that there should be a $70 weekly cut to the minimum wage.
"Our submission presents substantial economic and statistical evidence that an immediate
$20 increase is both necessary, responsible and affordable," he said.
"(It) demonstrates that such an increase will have a significantly beneficial impact
on labour force participation and productivity."
Mr Della Bosca said the NSW government also welcomed the federal government's request
to be heard in the state wage case.
"NSW welcomes the Commonwealth's involvement and await with interest its view on the
minimum wage for workers in NSW," he said.
AAP ajc/cjh/tnf
KEYWORD: WORKPLACE NSW (EMBARGOED)
2006 AAP Information Services Pty Limited (AAP) or its Licensors.
понедельник, 27 февраля 2012 г.
NSW:Paraplegic has four operations cancelled for wound surgery=2
AAP General News (Australia)
12-08-2004
NSW:Paraplegic has four operations cancelled for wound surgery=2
Mr Iemma later said Mr Graham would undergo surgery next week.
"I am advised by the area health service that Mr Graham will be reviewed by the spinal
injuries team at Prince of Wales Hospital later this week," Mr Iemma said.
"Pending that review I'm advised that Mr Graham's surgery is scheduled for next week."
AAP tam/nf/was/jlw
KEYWORD: WOUND 2 SYDNEY (REOPENS)
2004 AAP Information Services Pty Limited (AAP) or its Licensors.
Northwest Airlines to begin new service between Memphis, Tenn. and Pittsburgh, Penn.; Northwest Airlines is the first carrier to provide nonstop service to Memphis, Tenn. from Pittsburgh, Penn.
M2 PRESSWIRE-17 August 2000-NORTHWEST AIRLINES: Northwest Airlines to begin new service between Memphis, Tenn. and Pittsburgh, Penn.; Northwest Airlines is the first carrier to provide nonstop service to Memphis, Tenn. from Pittsburgh, Penn. (C)1994-2000 M2 COMMUNICATIONS LTD
RDATE:16082000
MINNEAPOLIS/ST. PAUL -- Northwest Airlines and its Northwest Airlink affiliate, Express Airlines I, announced today new nonstop jet service to Pittsburgh, Penn. from its Memphis, Tenn. hub.
Effective October 29, 2000, travelers from Pittsburgh International Airport will be able to take advantage of two daily nonstop flights to Memphis, Tenn. This new route is a result of Northwest's recent service expansion underway at Memphis-Shelby County Airport.
"This new service will provide Pittsburgh travelers with a direct connection to our Memphis hub, the most on-time hub airport in the United States and a gateway to more than 60 non-stop destinations," said Jim Cron, Northwest vice president - market planning and airlink. "Leisure travelers will enjoy easy access to great get-away destinations and business travelers will experience better connections and reduced flying time by using this strategically located, award-winning hub." Both daily flights will be operated by Northwest's Airlink partner, Express Airlines I Airlines, utilizing 50-passenger Canadair Regional Jet (CRJ) aircraft. This new service provides nonstop flights to Memphis, Tenn., with convenient connections beyond.
Passengers now have easy access to destinations such as San Antonio, Tex., Oklahoma City, Okla., Baton Rouge, La. and Gulfport/Biloxi, Miss., as well as the only service to locations such as Tupelo, Laurel - Hattiesburg and Greenville, Miss.; and other cities in Western Kentucky and North Alabama.
Passengers traveling to and from Greater Pittsburgh, Penn. will benefit from this enhancement to our service. Northwest will now provide non-stop jet service to each of its domestic hubs at Minneapolis/St. Paul, Minn., Detroit, Mich. and Memphis, Tenn., providing a wide range of departure times and simple connections to its global network.
New CRJ Service Between Memphis and Pittsburgh
Memphis-Pittsburgh Pittsburgh- Memphis Flight # Depart Arrive Flight # Depart Arrive 5944 8:50 a.m. 11:55 a.m. 5945 6:45 a.m.
7:50 a.m.* 5906 8:45 p.m. 11:50 p.m. 5949 2:50 p.m. 3:55 p.m.
*Effective October 30, 2000.
Northwest Airlines is the world's fourth largest airline offering more than 2,600 daily departures with hubs in Minneapolis/St. Paul, Detroit, Memphis, Tokyo and Amsterdam. With its travel partners, Northwest serves more than 750 cities in nearly 120 countries on six continents. Northwest and partner KLM Royal Dutch Airlines Received Air Transport World's prestigious "Airline of the year" in 1997.
Based on statistics compiled by the U.S. Department of Transportation, Northwest is the most on-time U.S. airline of the decade among the seven largest network carriers and is the 2000 recipient of the Air Transport World Airline Technology Management Award. Northwest's WorldPerks frequent flyer is the highest rated U.S. - based program reviewed by InsideFlyer Magazine, the leading authority on airline free travel programs, and in 1999 was named the most preferred frequent flyer program by the readers of Time in Asia. WorldPerks received the special "Industry Impact Award" during InsideFlyer's 12th Annual Freddie Awards. In 1999, Northwest's nwa.com was chosen as best airline web site by zdNews.com and business 2.0 and was named one of the top 50 sites by Internet World Magazine.
Express Airlines I is a wholly-owned subsidiary of Northwest Airlines, doing business as Northwest Airlink. The airline provides valuable passenger and cargo feed to Northwest and operates the Canadair Regional Jet and Saab 340. Express I was presented the Diamond Award for Maintenance Excellence and the On-Time, Every Time award for operational excellence in 1999.
CONTACT: Northwest Airlines Corporate Communications Tel: +1 612 726 2331
((M2 Communications Ltd disclaims all liability for information provided within M2 PressWIRE. Data prepared by named party/parties. Further information on M2 PressWIRE can be obtained at http://www.presswire.net on the world wide web. Inquiries to info@m2.com)).
воскресенье, 26 февраля 2012 г.
Leader of men: JD Samson dishes on her new project and bringing genderqueer into the mainstream.(OUT LOUD)(Interview)
It's a rainy night at the Triple Rock Social Club in Minneapolis' West Bank neighborhood and JD Samson is feeling the weight of the world. "On our record there's a song called 'If You Want Something'," the former Le Tigre member explains backstage. "Go for what you desire and somehow it will come to you. I think that's clearly what we all need to do right now. Our days are numbered." In stark contrast to this morbid sentiment, Samson's new record, Talk About Body, has her coming out of the shadows in a big way to lead the dance-pop outfit, MEN, bringing a new breed of genderqueer hero to the forefront while opening up a dialogue that even the mainstream music press can't ignore.
"For a while everything I did was gay and that's not all I am," Samson says. "But at the same time, our outfits are completely made out of queer symbols. I feel like it's very important to maintain my image as a queer person and support equal rights for queers in general. But I also feel like it's important to play a show and not ever bring up the fact that you're queer and for people to just enjoy the music."
Samson's music and stage show is a hyperactive concoction of in-your-face politics, bubbly synths and retro-queer slogans. The hand-sewn yin and yang tee she sports underlines both the balance and the contradictory nature of Samson's identity.
"I usually pass as a guy, even during shows," she shrugs. "Afterward, people will be like, your voice is so high, how do you do that And I'm like, Oh, wow. They have no idea."
With Samson's boyish good looks and razor-thin moustache, she could easily nudge Justin Bieber off the pages of Tiger Beat if not for the fact that she is ... well ... a she.
"This record is good," Samson argues. "I don't get why we're not huge right now. I don't think it's about the way we sound. I think it's about who we are as humans. I think the front person of this band being some gender-queer weirdo definitely does not help us in the mainstream music world."
Despite the relative novelty of trans and genderqueer pop stars, Samson is also quick to point out the progress of the past 15 years, helped along in no small part by the power of the press. "[curve] changed my life. Did you know that?" she asks, shaking her head."I would look at the music reviews and I would write down everything on a little piece of paper and then I would go to the record store and buy all the records. That's the way I knew about everything. I didn't have the Internet."
With the economy firmly in recession, global turmoil and the looming fears of 2012, Samson takes refuge and respite in the power of dance music. "With Le Tigre, Kathleen and Jo brought me into such an amazing world and I think that there's this juxtaposition with the music that we were making and the music that I'm still making now that is about movement," Samson explains. "Whether that movement is physical or figurative that is where they come together for me. It's really vulnerable to move your body with other people and to take up space and be sweating together and it's the perfect place to talk about politics, while you're in your body and vulnerable and surrounded by others that are doing the same thing."
Her point was illustrated at a Madison, Wisc. show the previous evening. Coinciding with the Union rally in protest of the legislation to effectively end collective bargaining rights in the state, political tensions ran high.
"I felt so excited to be there during this moment," she says. "Coming in to town, I was really prepared for that audience to be there and I felt like that's exactly what happened. Everybody was freaking out. I totally miss that. Last night I felt the audience acting like the audience of Le Tigre. It's this hunger for activism."
Whether music can save the world or not, JD Samson is glad to provide a soundtrack. "I feel really lucky to be where I am and connect with all these awesome people: she smiles. "That's the biggest thing for me. When people tell me, You've helped me, or You changed me, or I'm so inspired by you, that helps me to move forward with my life and keep going." (menmakemusic.com)
USA: LARRY SNYDER AWARDED CONTRACT FOR JOPLIN TORNADO RECOVERY.
According to DOD: Larry Snyder and Co., Ozark, Mo., was awarded a $40,000,000 firm-fixed-price multiple-award-task-order contract. The award will provide for the debris reduction and removal effort in support of Joplin tornado recovery. Work will be performed in Joplin, Mo., with an estimated completion date of Dec. 24, 2011. The bid was solicited through the Internet, with 31 bids received. The U.S. Army Corps of Engineers, Kansas City, Mo., is the contracting activity (W912DQ-11-C-4025).
Dangers of hero worship: cult of personality feeds human love for stories, but we need to keep focus on God.
When author Greg Mortenson visited Aurora University in Illinois this spring, he spoke to a sold-out crowd crammed into the university's largest auditorium and overflowing into a second theater, where a video streamed the event live. But even those of us who had to watch it the following week on our computer screens could make out the backdrop of banners proclaiming the school's core values, including the word "Integrity" right behind Mortenson's head.
It made for a bit of irony a few weeks later when clips from that speech ended up as part of a "60 Minutes" piece that alleged multiple inconsistencies in Mortenson's best-selling Three Cups of Tea: One Man's Mission to Promote Peace ... One School at a Time, as well as fiscal mismanagement of his nonprofit foundation, the Central Asia Institute.
In the book, which has sold 4 million copies and is required reading for U.S. forces in Afghanistan, Mortenson describes how he was nursed back to health by local tribespeople in northern Pakistan after failing to summit K2, the second-tallest mountain on Earth. He promises the village he will return to build a school for children and eventually founds a charity that has built more than 140 schools, primarily for Muslim girls.
I required Three Cups of Team an intercultural communication class this spring, and the class watched the video of Mortenson's campus talk. The students loved the book, even a few who had admitted they had reservations about it. It was the perfect vehicle for discussing cultural differences, communication styles and possible intercultural misunderstandings.
The book's title refers to the Pakistani saying that emphasizes the importance of relationship m that culture: After one cup of tea together, you're strangers; after two, friends; after three, family. Mortenson humbly shares his failure to grasp this and other important cultural lessons, even though he had lived in Africa as a child with his missionary parents.
In fact, if there's one quality about Mortenson that comes through the pages and across in person it's his humility. My students picked up on his lack of ego right away, and it gave him credibility. They were open to Mortenson's views--even those they might normally disagree with--because he admitted his own failures (mountaineering, financial, organizational and even romantic), eschewed material things, gave credit to others and preferred to stay out of the spotlight.
So they, like many Others, were shocked when the allegations about him surfaced. Sensing a teachable moment, I showed the "60 Minutes" segment in class to prompt a discussion. Some refused to believe any of it. A few business majors pointed out that many companies pad their expenses; others argued that the ethical bar is higher for charities and nonprofits.
A number of lessons could be learned from this still-unfolding drama, including some for future public relations and journalism professionals. For example, don't try to hide from the "60 Minutes" camera crew; it only makes you look guilty. Also, journalists should not trust secondary information (fellow mountaineer/author Jon Krakauer quotes one of Mortenson's climbing partners, who later says he was misquoted or at least misinterpreted).
But might there be broader, even spiritual, lessons too?
Despite his humility, Mortenson's book, speeches and charity are ultimately centered on him. I doubt hundreds would have packed Aurora University's auditorium to hear coauthor David Oliver Relin or even a graduate from one of Mortenson's schools. Mortenson is the main character, indeed the hero, of the book.
Enter the danger of the cult of personality. After the Mortenson allegations, many commentators pointed out that any time one person's story becomes famous, there's a danger of these "personalities" starting to believe their own hype and to think the rules of society don't apply to them.
We have seen it over and over again with entertainment celebrities, businesspeople, politicians and world leaders. Sad to say, we also have cults of personality in our church--on both sides of the ideological spectrum. In fact, you can quickly identify which way a Catholic leans by who their heroes or heroines are: Mother Angelica, or Joan Chittister? Fr. John Corapi, or Fr. Roy Bourgeois? Padre Pio, or Oscar Romero?
Of course, in today's world, everyone has something of a public platform: the Internet. Blogging, tweeting and "personal branding" are almost requirements for any quasi-public figure, if not all job seekers. With these public personas, any person can theoretically fall prey to the pitfalls of the cult of personality.
But those of us whose fame still starts with a lower-case letter are usually guiltier of propagating personality cults as fans of those with capital-F Fame. As I write this, half the world is obsessed with a recent royal wedding; the other half is obsessed with the canonization of a late pope. I'm not saying Kate and William or John Paul II aren't deserving of massive interest. In fact, the church uses the language of "public cult" in reference to saints.
As humans, we love stories. That's why Jesus told parables, and why his own story has fascinated for centuries. Let's just be sure to put our worship where it belongs--on God.
[Heidi Schlumpf teaches communication at Aurora University.]
New Technology-Based Service Solution to Change the PC Service Market.
A revolutionary new PC Service offering will be made available to the public for the first time anywhere when CyberSpa opens its first Service Center at Arundel Mills Mall in Hanover, MD on Monday, May 9 at 10 a.m.
Throwing out the decades-old, diagnose-and-repair model, CyberSpa's new Fresh Start™ Service restores laptop and desktop personal computers to new machine performance levels by -
Replacing the PC's old hard drive with a new faster, higher capacity drive, then
Loading it with fresh installations of the latest software releases for all licensed as well as free applications, then
Virus scanning and copying all data files, personal preferences, and settings to the new hard drive.
At the conclusion of this service, the customer gets their PC back, virus free and running like a new machine, with all of their data files, music, pictures, settings and favorites retained. They also get their old hard drive back, with all their original data, fully virus scanned and ready for use as a backup drive.
"With an all-inclusive, fixed price of $149.99 - and same day service availability - CyberSpa's new Fresh Start™ service offering will set new standards for price, performance and convenience," says CyberSpa Founder and CEO Allen Shay.
"We are not just introducing new service technology," says Shay. "We are changing the entire PC service experience. Our customers schedule their appointments for drop off at their convenience. While the service itself is fully automated, our staff helps provide our customers information on choices they can make prior to service that will enhance their computer's security and performance.
Shay continues, "These options come at no additional cost. At CyberSpa we offer one comprehensive service at one comprehensive price. Since we do not sell computers or other products, our customers can trust that our recommendations are in the best interest of improving their current computer's performance and security and nothing else."
CyberSpa's new model of computer service relies on sophisticated forensic technology and hardware replacement rather than repair. This allows CyberSpa to offer a more comprehensive service solution on-site in less time and at less cost that at the traditional PC repair stores.
CyberSpa also provides their customers better data privacy and security than turning your PC and its data over to some overseas internet based remote service center. The CyberSpa customer's PC stays in the store until they pick it up, and the CyberSpa systems are not connected to the internet during the automated service process.
For more information about CyberSpa, visit the CyberSpa service center location at Arundel Mills, 7000 Arundel Mills Circle in Hanover, MD, or visit CyberSpa online at www.cyber-spa.com.
Keywords: CyberSpa, Software, Technology, Virology, Viruses.
This article was prepared by Information Technology Newsweekly editors from staff and other reports. Copyright 2011, Information Technology Newsweekly via VerticalNews.com.
Club stoKe bid to get Delilah bacK in top ten.(News)
FOOTBALL fans have started an internet campaign to get Tom Jones' classic Delilah back into the Top 10.
Stoke City officials say they have held talks with the Welsh pop legend's people in the hope he might re-record the song in time for their FA Cup Final appearance against Manchester City on May 14.
Now, Stoke fans have set up Facebook and Twitter groups to urge people to download it before the final and boost sales. Club folklore has it that back in the 1980s lifelong Stoke fan Anton Booth was in a pub with pals when officers asked them not to sing any songs with swear words. Delilah came on the jukebox and the rest is history.
From then on Mr Booth would be held aloft on the terraces to sing Delilah's opening lines.
Fan of 26 years, Shawn Beardmore, said: "It's our anthem.
It's the song that every other club associates with Stoke. To get in the top 10, we're going to need 15,000 downloads. So if everyone who goes to the final buys it just once, that's 25,000 downloads and I would imagine that would get us top 10."
Delilah reached number two in the UK charts in 1968.
суббота, 25 февраля 2012 г.
Sex Goes to School: Girls and Sex Education before the 1960s.(Book review)
Sex Goes to School: Girls and Sex Education before the 1960s. By Susan K. Freeman (Urbana: University of Illinois Press, 2008. xvii plus 220 pp. $25).
In the 1988 song, "Come in From the Cold," Joni Mithcell sings "Back in 1957, we had to dance a foot apart/And they hawk-eyed us from the sidelines/holding their rulers without a heart/And so with just a touch of our fingers/Oh we could make our circuitry explode/All we ever wanted/Was just to come in from the cold." These lyrics evoke images of strict rules in a prescribed setting, a school event that promoted heterosexual socialization yet strongly discouraged sexual activity. According to Susan Freeman's book Sex Goes to School: Girls and Sex Education before the 1960s, sex education mirrored this contradiction. "Mid-century educators," writes Freeman, "wanted adolescents to be interested--but not too interested--in sex" (xi).
Freeman's well-written, engaging book primarily focuses on sex education in the 1940s and 1950s, briefly discussing its roots in the first decades of the twentieth century and its initial focus on disease prevention. By the time it spread nationally, the emphasis had shifted to "shaping the minds and imaginations of young people, more so than their bodies" (9). This story, however, is national and local, as school districts around the country developed policies, approaches, and curricula with both common themes and distinct characteristics.
By looking at sex education nationally, Freeman finding opposition in isolated, high profile cases, but overall support for teaching about biological and psychological development through the sex education curriculum. Freeman begins with the development of the field and then shifts to look at content, approach, and teaching strategies. She then examines three communities (the state of Oregon, the town of Toms River, New Jersey, and the increasingly urban San Diego, California) that received national attention for their sex education curricula. All three, despite varied approaches, shared an emphasis on student discussion and participation.
Sex Goes to School weaves the words and thoughts of young people into the larger body of material created by and for students, presenting a key (and often overlooked) glimpse at how young people themselves experienced and responded to lessons about puberty, reproduction, and family. Within an emphasis on white, middle class, heterosexual norms, most curricula advocated "cooperative marital partnerships and family units," challenging, however subtly, the notion of an authoritarian, patriarchal family structure. According to Freeman, this, along with an emphasis on dialogue and discussion, "supplied girls with critical tools for questioning exploitation and male dominance, whether in relationships, in family dynamics, or in society" (145).
Listening to the questions students asked through workbooks and as reported by sex education instructors, young people might have danced a foot apart in the school gym, but they were not completely in the dark about sex, sexuality, and other topics not publicly discussed in the mid-century, such as sexual violence, teenage pregnancy, and homosexuality. Students asked questions such as, "How do you get crabs?" "What causes rapists?" "Where is the male organ placed during intercourse?" and "Is a homosexual case over-loaded with hormones of the opposite sex?" (26). These questions represent both a lack of basic knowledge and a fairly broad introduction to a range of behaviors related to human sexuality. Through a close look at how specific issues were addressed, such as masturbation, menstruation, and sexual reproduction, Freeman notes that the curriculum as a whole offered fairly inconsistent, and sometimes inaccurate, information, ignoring almost completely, for example, sexual pleasure or the physical changes a woman's body experiences during pregnancy. The widely circulated film, The Story of Menstruation, for example, failed to mention sperm in relation to conception, "'Pregnancy occurs,' the narrator explained, 'when a woman is going to have a child'" (93).
Freeman's work is an excellent contribution to the study of mid-century sexual behavior, education, and the experiences of young people. While the book includes several thorough descriptions of images, the book itself offers none of the rich visual material mentioned. A handwritten student worksheet, for example, or a still from the 1947 film Human Growth, would have been wonderful additions, providing the reader with insight into the sources and the look and feel of the materials. An interested reader, in fact, can watch several of these films on the Internet Archive.: Prelinger Collection website (http://www.archive.org/details/prelinger) by searching on "sex education."
Freeman ends with a brief discussion of the politically charged nature of sex education in the late twentieth century that led in some cases to more limited sex education than students received in the 1940s and 1950s. A large, suburban school district today near Washington, D.C., for example, teaches students to "identify reasons for avoiding premarital sexual intercourse" and to prevent sexually transmitted diseases through, "sexual abstinence, fidelity within marriage, and avoidance of needle sharing and intravenous drug use." There is no mention of condoms as an effective method of preventing STD, and the advice to avoid sexual activity outside of government sanctioned, heterosexual marriage ignores the lived reality of many Americans. According to the 2000 census, less than fifty percent of the population lives in "married couple, family" households. Seventeen percent live in male or female headed family households, and thirty-three percent live in "nonfamily" households. Where sex education will go in the twenty-first century may still be an open question.
Kelly Schrum
George Mason University
China Telecom's mobile business grows in FY 2009.(WIRELESS)
For FY 2009 China Telecom reported total revenue of $30.57 billion, up 12 percent year-on-year.
The company changed into a full-service provider as conventional fixed-line voice service now accounted for 37 percent of total revenue, down from 52 percent year-on-year. The company increased mobile subscriber base over two times in 2009 and its mobile voice sales rose fivefold to $2.92 billion, compared with $585.10 million year-on-year. Its 2009 EBITDA stood at $11.99 billion 39 percent of sales. China Telecom is expected to continue to benefit from China's economic revival and increasing Internet penetration. The mobile market is another aggressive growth area for the company. As of December 2009, China Telecom held 7.7 percent share of China's mobile subscriber base of 726 million.
Back to school.
Byline: Linda Sailer
Aug. 17--The days and weeks leading up to the first day of school in Dickinson have been a flurry of activity. The custodians scrubbed the desks and shampooed the carpets, but the rest is up to the teachers. They decorate the bulletin boards, sort the texbooks and prepare lessons plans for the upcoming weeks. The Dickinson Public Schools and Dickinson Catholic Schools begin on Thursday, Aug. 21, while Hope Christian Academy starts Wednesday, Aug. 20. Kristi Meidinger Dickinson Heart River Elementary first grade teacher Kristi Meidinger made a two-page list titled "Things to get done before the first day of school."
She arranged the desks and made bulletin boards. She catalogued and stamped the new science materials purchased by the Dickinson Public School District. Then she reviewed the classroom schedules, ran off worksheets for math, reading, social studies and phonics. She created name tags, set out the books and got videos from the library. Her goal is to memorize every student's name on the first day. It's not that hard because she has written their names several times already or has had their brothers and sisters in prior classes. "It actually takes less than a day. It's harder to know the parents," she said.
Deb Walth Deb Walth, veteran third grade teacher at Heart River Elementary, knows how to entice students to learn: Give them hands-on projects. "I'm planting seeds for science," she said during a visit to her classroom. "I want to plant seeds so they are growing by the time students come and we can observe them." She had a bag filled with vegetables and flowers, but she decided to plant some herbs.
"They can take them home and continue growing them," she said.
She appreciates the new science series for grades K-12. Serving on the science committee, the teachers wanted a currculum featuring hands-on learning skills. It also features DVDs, games and a Web site for parents to explore. She anticipates an easy transition for the students to her classroom. "I know the kids. The second grade was across from my room. I know who the second graders are and they've seen me," she said. "Once I've hauled out the garbage and made the name tags, I'm ready to go," she said. Sue Biesiot Sue Biesiot has spent numerous days getting her kindergarten classroom ready at Dickinson's Roosevelt Elementary. Grandparent volunteer Sandy Lackner made new curtains and new blinds, while the school invested in lockers and white boards. There's even new pillows for nap time.
Students visit the classroom twice before the start of classes. They came for registration last week, and are invited to return for open house this week. "The kids bring their backpacks, and of course they love all the toys. The parents sit down for an overall view of school," she said. A veteran teacher, the first days are always exciting, but this year is special -- new students, new shades, new white board and new lockers, she said. "I'm just as excited as they are. I'm always ready to quit in the spring and I'm always ready in the fall," said Biesoit. Carolyn Blake Carolyn Blake, Lincoln Elementary second grade teacher, uses the remaining days of summer to decorate her classroom and to update the classroom's Web site. A veteran teacher, she has embraced the technology of the Internet.
"It really keeps parents informed. I can put up words and assignments. I take pictures of special proejcts with my personal camera, she said.
She appreciates the open house as an opportunity to meet students and parents. "The open house is really cool. Students bring backpacks and meet us," she said. "I'm always ready for a break by the middle of May, but once we get into August, I'm ready to get back. It's never boring. Every group of students is different." Bobbie Hansen
Dickinson Trinity Elementary East fifth grade teacher Bobbie Hansen has used the last few days to organize her textbooks and to prepare lessons. Actually, preparations take longer than that. "It takes days and days...weeks and weeks," she said. She spends time going over the files and checking Internet sites for new ideas. She attended a "Love and Logic" workshop and the Emergency Community Response Team (CERT) training this summer. "It's a way to help react when an emergency occurs like the weather," she said. "I also did a school improvement class. We did that as a team." Arlene Hondl Trinity Elementary East teacher Arlene Hondl took a break this summer to spend time with her family. "This is my 48th year of teaching," she said. "I absolutely enjoy teaching and I enjoy being with the kids." She came to school a few days early to arrange her classroom and to prepare lesson plans for the upcoming weeks. She has an enrollment of 23 students this year, higher than previous years. She views it as an advantage in that she can divide the students into groups for projects. Peggy Mayer Dickinson Catholic Schools Elementary Principal Peggy Mayer said many of the teachers attended classes this summer. Teachers could attend a science institute or "Love and Logic" classes. Others attended a workshop focusing on a school improvement plan. The plan calls for a reemphasis on writing skills. "Teachers were in school during the summer so they are ready for school in the fall," she said. Trinity East is planning an open house from 6:30-7:30 p.m. on Monday, Aug. 18, and Trinity West's open house is from 6:30-7:30 p.m. on Tuesday. "It's an opportunity for kids to meet their teachers and drop off their school bags," she said. Toni Hostetler Toni Hostetler is looking forward to her first year as the seventh-eighth grade teacher at Dickinson's Hope Christian Academy. "I taught kindergarten on the reservation at Twin Buttes, but this is a big difference," she said. She spent last week trying to make the classroom appealing to the students. "I need to get the materials out to the kids, and I was working on taking measurements for bulletin boards," she said. Ron Dazell Hope Christian Academy Administrator Ron Dazell didn't catch much of a break this summer. He supervised the construction of a kitchen make-over, a storage area and a handicapped-accessible restroom. The phone intercom system was upgraded and the school invested in new computers for faculty. The new grading software will allow parents access to students' grades and assingments. "We're upgrading our Web site too," he said. And just when he thought everything was ready, the copier died last week. He has scheduled an inservice for staff on Tuesday, Aug. 19, prior to the start of school on Wednesday.
To see more of The Dickinson Press, or to subscribe to the newspaper, go to http://www.thedickinsonpress.com.
Copyright (c) 2008, The Dickinson Press, N.D.
Distributed by McClatchy-Tribune Information Services.
For reprints, email tmsreprints@permissionsgroup.com, call 800-374-7985 or 847-635-6550, send a fax to 847-635-6968, or write to The Permissions Group Inc., 1247 Milwaukee Ave., Suite 303, Glenview, IL 60025, USA.
Guarding against Internet intruders. (includes related article)
As you read this, a band of knowledgeable, determined hackers are attacking the computers at the National Library of Medicine (NLM). If they succeed in penetrating the computer system's defenses, the attackers could tamper with anything from MEDLINE, the huge medical bibliographic database, to GenBank, the database that collects DNA sequences deciphered by geneticists around the world. Such tampering could have disastrous effects on the work of thousands of scientists. Yet NLM didn't make any special preparations. "We're not supposed to do anything extraordinary," says NLM computer specialist Jules Aronson rather cheerily. "Then they see how far they can get."
Aronson isn't panicking because "they" are actually benign intruders - members of a "tiger team" from the Computer Security Technology Center at Lawrence Livermore National Laboratory whose job is to probe for weaknesses in computer systems. The attack, explains Aronson, will test the barriers that NLM has erected to protect the integrity of its precious databases, which are heavily used by the outside world. That world includes scientists who routinely communicate with NLM's computers over the Internet - and perhaps a handful of hackers bent on serious mischief.
The security exercise at NLM shows how worried scientific organizations have become about their vulnerability to hackers roaming the Internet. The danger is mounting as the net becomes ever more tightly interwoven with scientific life. Large scientific databases are queried and updated every day via the Internet. Most university computer systems are open to all comers over the Internet. And scientists themselves are putting more and more of their data and reputations on the line - literally - as they use the Internet to collaborate, send out papers, and exchange data. Although most e-mail accounts, databases, and local networks are officially "secure" - inaccessible without a password - hackers have many methods of attack, from exploiting software weaknesses to stealing passwords.
But systems administrators nervous about the security threat are just as nervous about imposing security restrictions that might be anathema to the culture of free exchange on the Internet. "We need to define that balance between security and user needs" says Marcus Ranum, a senior scientist at Trusted Information Systems (TIS), a computer security consulting firm. For example, many industrial and government research labs and data centers, including NLM, are erecting "fire walls": the high-tech equivalent of a castle moat, where everyone and everything that crosses is checked before being allowed inside. But most universities have balked at that measure, which they consider extreme. Instead, while experimenting with less intrusive measures like stepped-up monitoring to detect intruders before they do serious damage, these universities have chosen to wait - and hope that they won't be next.
Overall statistics on hacking incidents or attempts are impossible to come by, but some universities estimate that they get from 10 to 30 "doorknob-rattling" attempts a week. When hackers do succeed in breaking in, the opportunities for mischief range from altering critical scientific data to tarnishing someone's reputation by sending false e-mail in his or her name. Grady Blount, an earth scientist at Texas A&M University in Corpus Christi, has personal experience of the kind of damage that can result.
In late October, hackers used a password-cracking program to log on to Blount's account and sent out racist e-mail in his name to thousands of people. When Blount arrived at his office one Monday morning, he found about 90 e-mail messages waiting for him instead of the usual three or four. "They were ranging from death threats to `I'll make sure you never publish again,'" says Blount.
The threats caused Blount to move his classes to undisclosed locations around campus. His collaborations with the National Aeronautics and Space Administration were jeopardized because the agency viewed him as a possible security risk. He had to change his e-mail address and pull his contact information from the university's on-line directory. In Blount's own words, he is now "submerged." He adds: "It was purely random, but that doesn't seem to matter. I don't know what the ultimate fallout is going to be."
Ad hoc security
As Blount learned to his dismay, the Internet - a loose confederation of networks rather than a single network - was designed for ease of communication, not security. As a result, many security measures are cumbersome add-ons. "I'd have to describe the security services available on the Internet today as ad hoc," says Dan Nessett, a computer scientist at Sun Microsystems and a member of the Internet Society's Privacy and Security Research Group. Take one-time passwords, a strategy for countering the password-stealing that is the most common method hackers use to break into computers.
Ordinary passwords travel over the network each time a user logs on, making them vulnerable to password-sniffing programs. A one-time password is discarded after a single use, so even if it is captured, it's of no value. When the user tries to log on, the computer issues a challenge consisting of a string of numbers and/or letters. The user then chooses a response - the one-time password - from a pre-printed list or computes it based on a secret key, rather like a PIN number. In one arrangement, each authorized user is equipped with an authentication device, a small hand-held keypad that looks like a calculator. The user enters the challenge and the key into the keypad, which computes a one-time password.
But one-time passwords can limit new outside users - each one may have to be given a keypad and a code - and can inconvenience existing ones. Says Paul Dourish, a researcher at the Rank Xerox Research Centre in Cambridge, United Kingdom which relies on one-time password: "It's a real pain - it makes logging in much longer." One-time passwords tend to be adopted by industrial labs, which are more security-conscious than universities and have an easier time imposing such measures on their employees.
Less cumbersome for users within an organization, but just as restrictive for outsiders, is another common approach to security: shielding an institution's internal network behind a fire wall. A fire wall allows computer traffic to pass only via certain restricted gateways, consisting of computers and filtering programs. Generally, users inside the fire wall can reach the outside world easily, but outsiders trying to gain access to the organization's network face impediments.
One kind of fire wall relies on so-called packet filters. These systems block packets of information or allow them through depending on what computer they come from or the kind of service they are seeking on the destination computer. A packet filter might, for example, permit any computer outside the fire wall to connect to any computer inside the fire wall to send e-mail, but might only allow outside machines to connect to a few specially secured machines inside the wall for other services such as telnet (for remote log-ins) or ftp (for transferring files J. Those services are more risky, as they allow outside users to actually log in to the system.
Another type of fire wall, found at several major corporate research labs including IBM's Thomas J. Watson Research Center, Xerox PARC, and AT&T Bell Laboratories, allows access to more services but monitors each stream of packets closely by funneling it through a separate "application-level" gateway, one for each Internet service such as telnet, ftp or e-mail. These gateways can log all transactions and control them, for example by requiring one-time passwords or by allowing outside messages through only if they come from certain preapproved machines.
So far, gateways can't reproduce the freedom of open Internet access. When an e-mail gateway is down, for example, e-mail doesn't go through. Says one graduate student who has worked at Bell Labs: "It happens pretty regularly that you don't have e-mail for a day [at Bell Labs], much more often than at a university." Gateways have other drawbacks as well. It may take months to get new Internet services running on them. Bill Cheswick, a security expert at Bell Labs who helped design their fire wall, acknowledges that "every time there's a new Internet application, like Mosaic, we have to figure out how to support it through the fire wall." And fire walls can't guarantee security. In a break-in last Christmas at the San Diego Supercomputer Center, hackers penetrated the fire wall by masquerading as "friendly" computers.
Many government centers make life easier for outside users by setting up their computer resources so that outsiders need not pass through filters and gateways at all. The National Center for Biotechnology Information (NCBI), which runs GenBank, places the computer that acts as the GenBank server to the world outside its fire wall. The archival copy of the database resides on NCBI internal machines, to which the outside world has no access, at least in theory. Similarly, the National Oceanic and Atmospheric Administration (NOAA) puts information ranging from real-time data on solar flares to the last 100 years of weather observations on some 40 computers outside its fire wall. "The dump is done by a physical, hardwire connection, which is then turned off until the next dump," says Thomas Pyke, NOAA's director for high-performance computing and communication.
But making some resources freely accessible while seating off others won't work for the National Center for Atmospheric Research (NCAR), because the centerpiece of its system is a Cray supercomputer for use by scientists all over the world. NCAR also runs a Mass Storage System (MSS), which contains over 30 terabytes of atmospheric and oceanographic data. Right now, scientists enjoy open access to these resources. They can send their own data to the MSS, then use the supercomputer to run calculations on the data. The downside of open access was brought home by a recent intrusion that briefly crippled the machine on which the director of the computing division reads his e-mail.
But none of the alternatives to open access looks very attractive, says Greg Woods, an NCAR software engineer. A single gateway, he says, "would be a real bottleneck. ... We will have to have more than one [gateway] machine directly accessible to Internet users." Woods and his colleagues are also considering one-time passwords. But many scientists send in their data in automatic scripts that run in the middle of the night. One-time passwords could make that more difficult because someone might have to be present to respond to the computer's challenge. "We have to be careful not to make it too hard for our users," says Woods. "If it's too hard, people will try to get around it. They'll try - unintentionally - to subvert the security."
Laissez-faire at the universities
These dilemmas are felt even more keenly at universities, long used to keeping their computers open to the easy flow of information. One university's experience with a fire wall has been positive (see box), but many others insist that their students and faculty won't put up with even minor restrictions on their Internet access. System administrators at Columbia University, for example, say the idea of a fire wall has been tossed around, but their users simply Wouldn't stand for it.
Yet security problems at universities can be even more acute than at government institutes because their computer systems are managed so loosely. Thanks to cheap desktop computing power, nearly every departmental research group has its own workstations, ordered directly from the manufacturer and installed and maintained by a graduate student who would rather be doing something else. Most universities have taken a rather laissez-faire attitude toward these security vulnerabilities, but as evidence of the dangers mount, they are taking some first steps. Many are adopting network programs that conceal informative files such as lists of user names and force users to choose passwords that are hard to crack. The Massachusetts Institute of Technology is trying to reduce its system's vulnerability through its use of Kerberos, a program that encrypts information passing through the huge campus network.
For the long term, universities are hoping that the burgeoning research on computer security will soon deliver some better way to balance security with user needs. One line of work is aiming at building a better fire wall, such as the experimental one erected by the distributed systems group of Stanford University's computer science department last year to protect the group's computers. Thanks to some fancy programming, the fire wall appears virtually transparent to authorized users both inside and outside it.
Another avenue of research starts with the assumption that computers and networks cannot be designed without security holes and aims instead to detect break-ins early. For example, researchers at the University of California, Davis, are working on artificial intelligence programs that can recognize anomalies in network use. Ultimately, such programs might be able to respond to suspicious activity by cutting off the suspect user or notifying the system administrator.
In the meantime, universities and other institutions are moving cautiously. As TIS's Ranum puts it: "If you're so scared of the hackers that you destroy the network to protect it, they've won."
Learning to Live With a Fire Wall
On Tuesday, 25 August 1992, the supercomputer center at Texas A&M University in College Station realized it had been hacked. The intrusion had gone on for 4 months before it was noticed; by then the hackers were so cocky they were using one of the university machines as a bulletin board to discuss their attacks. Computer break-ins aren't unusual at universities these days, as links with the Internet expose their computer systems to intruders (see main text). But Texas A&M's response was exceptional: Within 10 days, programmers had thrown up a fire wall around the university's computing network.
The fire wall - a means of screening all attempts by the outside world to reach university computers - has been in place ever since, making the Texas A&M campus one of the few to opt for security over keeping the door to the Internet wide open. And although the university community objected at first, fearing that the fire wall would hamper communication with colleagues elsewhere and interfere with remote log-ins, concerns have subsided thanks to the programmers' efforts to make the barrier as unobtrusive as possible. Says biology professor Jim Golden, "The fire wall is not something we're constantly battling with."
When Texas A&M systems analyst Doug Schales and his colleagues first put up the fire wall, he recalls, "I thought they were going to hang us." The barrier consisted of a "packet-filtering" program that allowed the outside world to send e-mail to all computers at Texas A&M but blocked other incoming services such as telnet and ftp, which are considered more dangerous because they allow outsiders to log on to university computers. As a result, faculty who wanted to log in from home found they couldn't.
But that problem was fixed very quickly; for example, the computing center can now provide temporary access to workstations inside the fire wall within minutes after receiving a request. Meanwhile, the fire wall itself has been modified to make it transparent for outbound Internet services. Faculty and students can browse with Mosaic, log in to outside computers, and transfer files.
Scientist at Texas A&M now say the fire wall presents a minor inconvenience at most. Chemist A. T. Watson says he has adapted without much trouble. "I spent a year in Norway and was accessing my computers over here," he recalls. "I had to set up something special [beforehand]," and the computers he wanted to use weren't always directly accessible from outside. But he concludes, "If that's the cost of business, it's not too bad."
And the computer security experts at Texas A&M can argue that the cost is worth it. Since that scary summer of '92, the university has suffered only a few minor break-ins, usually because someone's password was compromised. "We're able to show that the packet filter is blocking attempts," Schales says. "And people are pretty happy, especially since we can answer their needs."
пятница, 24 февраля 2012 г.
Shuffle Master, Inc. Announces Exclusive Distribution Agreement with Lightning Poker, Inc.
LAS VEGAS -- Shuffle Master, Inc. (NASDAQ Global Select Market: SHFL) announced today that it has entered into an exclusive distribution agreement with Lightning Poker, Inc., a corporation based in Aston, Pennsylvania. Under the terms of the agreement, Shuffle Master will be responsible for promoting, marketing, distributing and servicing the Lightning Poker[TM] Gaming System worldwide. Additionally, Shuffle Master will have the option to make an equity investment in Lightning Poker, Inc. as well as to acquire an additional interest in the company if a Lightning Poker, Inc. initial public offering is conducted.
The Lightning Poker Gaming System is a fully-automated electronic poker table that enables up to 10 players to make their wagers and game decisions via individual touch screen betting stations. It can also be configured to offer a variety of poker games and formats including "sit-n-go" tournaments and will be expanded to include several of Shuffle Master's proprietary titles.
"We are pleased to offer Lightning Poker's electronic poker table as one of our multi-player electronic table game platforms," stated Paul C. Meyer, Shuffle Master President and Chief Operating Officer. "Since we exhibited the table at G2E last November, the table has been installed successfully at Turning Stone Casino in New York, and we are currently exhibiting it at the International Casino Exhibition (ICE) in London where it is generating tremendous interest. We are confident that the table will be a welcome addition to casinos worldwide and look forward to adding our proprietary content to the platform to further extend its appeal."
"Lightning Poker is thrilled with the commitment that Shuffle Master has made to our business," stated Ron Skotarczak, Lightning Poker President. "Their worldwide sales and service network is second to none, and will enable the Lightning Poker product to gain entry into casinos worldwide."
Shuffle Master, Inc. is a gaming supply company specializing in providing its casino customers Utility Products, including automatic card shufflers, roulette chip sorters and intelligent table system modules, to improve their profitability, productivity and security, and Entertainment Products, including live proprietary table games, electronic multi-player table game platforms, traditional video slot machines for select markets, live table game tournaments and wireless gaming solutions to expand their gaming entertainment content. The Company is included in the S&P Smallcap 600 Index. Information about the Company and its products can be found on the Internet at www.shufflemaster.com.
This release contains forward-looking statements that are based on management's current beliefs and expectations about future events, as well as on assumptions made by and information available to management. The Company considers such statements to be made under the safe harbor created by the federal securities laws to which it is subject, and assumes no obligation to update or supplement such statements. Forward-looking statements reflect and are subject to risks and uncertainties that could cause actual results to differ materially from expectations. Risk factors that could cause actual results to differ materially from expectations include, but are not limited to, the following: changes in the level of consumer or commercial acceptance of the Company's existing products and new products as introduced; increased competition from existing and new products for floor space in casinos; acceleration and/or deceleration of various product development, promotion and distribution schedules; product performance issues; higher than expected manufacturing, service, selling, legal, administrative, product development, promotion and/or distribution costs; changes in the Company's business systems or in technologies affecting the Company's products or operations; reliance on strategic relationships with distributors and technology and manufacturing vendors; current and/or future litigation, claims and costs or an adverse judicial finding; tax matters including changes in tax legislation or assessments by taxing authorities; acquisitions or divestitures by the Company or its competitors of various product lines or businesses and, in particular, integration of businesses that the Company may acquire; changes to the Company's intellectual property portfolio, such as the issuance of new patents, new intellectual property licenses, loss of licenses, claims of infringement or invalidity of patents; regulatory and jurisdictional issues (e.g., technical requirements and changes, delays in obtaining necessary approvals, or changes in a jurisdiction's regulatory scheme or approach, etc.) involving the Company and its products specifically or the gaming industry in general; general and casino industry economic conditions; the financial health of the Company's casino and distributor customers, suppliers and distributors, both nationally and internationally; the Company's ability to meet its debt service obligations, including the Company's senior convertible notes and its senior secured revolving credit facility, which will depend on its future performance and other conditions or events and will be subject to many factors that are beyond the Company's control; various risks related to the Company's customers' operations in countries outside the United States, including currency fluctuation risks, which could increase the volatility of the Company's results from such operations; and the Company's ability to successfully and economically integrate the operations of any acquired companies, such as Stargames. Additional information on these and other risk factors that could potentially affect the Company's financial results may be found in documents filed by the Company with the Securities and Exchange Commission, including the Company's current reports on Form 8-K, quarterly reports on Form 10-Q and annual report on Form 10-K.



























