Next Page: 10000

          How Columnar Databases Support Modern Analytics      Cache   Translate Page   Web Page Cache   

The increased requirements of modern analytical workloads – querying billions of rows on demand, in real time and in unforeseen ways – is a challenge for traditional databases because they’re optimized for transactional workloads (e.g., point and range queries with indexes). A transactional query may return every column in a single row whereas an analytical query may aggregate a single column in every row. Thus, it is far more efficient to store data by column rather than by row. In addition, the use of distributed data and massively parallel processing enables columnar databases to support scalable, high-performance analytics. In this webinar, we will use the architecture of MariaDB AX to explain how columnar storage and massively parallel processing work, and how they enable columnar databases to query billions of rows in real time, and with the full power of SQL – a challenge for Apache Hadoop/Hive.
          Specialist, Marketing Analytics - ENERCARE - Markham, ON      Cache   Translate Page   Web Page Cache   
To accomplish this individual will be knowledgeable in data mining techniques, a strong understanding of modeling database development, time series forecasting...
From EnerCare - Thu, 09 Aug 2018 20:58:06 GMT - View all Markham, ON jobs
          系统管理员的 SELinux 指南:这个大问题的 42 个答案      Cache   Translate Page   Web Page Cache   

获取有关生活、宇宙和除了有关 SELinux 的重要问题的答案

“一个重要而普遍的事实是,事情并不总是你看上去的那样 …” ―Douglas Adams,《银河系漫游指南》

安全、坚固、遵从性、策略是末世中系统管理员的四骑士。除了我们的日常任务之外 —— 监控、备份、实施、调优、更新等等 —— 我们还需要负责我们的系统安全。即使这些系统是第三方提供商告诉我们该禁用增强安全性的系统。这看起来像《碟中碟》中 Ethan Hunt 的工作一样。

面对这种窘境,一些系统管理员决定去服用蓝色小药丸,因为他们认为他们永远也不会知道如生命、宇宙、以及其它一些大问题的答案。而我们都知道,它的答案就是这个 42

按《银河系漫游指南》的精神,这里是关于在你的系统上管理和使用 SELinux 这个大问题的 42 个答案。

  1. SELinux 是一个标签系统,这意味着每个进程都有一个标签。每个文件、目录、以及系统对象都有一个标签。策略规则负责控制标签化的进程和标签化的对象之间的访问。由内核强制执行这些规则。
  2. 两个最重要的概念是:标签化(文件、进程、端口等等)和类型强制(基于不同的类型隔离不同的的进程)。
  3. 正确的标签格式是 user:role:type:level(可选)。
  4. 多级别安全Multi-Level Security(MLS)强制的目的是基于它们所使用数据的安全级别,对进程(域)强制实施控制。比如,一个秘密级别的进程是不能读取极机密级别的数据。
  5. 多类别安全Multi-Category Security(MCS)强制相互保护相似的进程(如虚拟机、OpenShift gears、SELinux 沙盒、容器等等)。
  6. 在启动时改变 SELinux 模式的内核参数有:
    • autorelabel=1 → 强制给系统重新标签化
    • selinux=0 → 内核不加载 SELinux 基础设施的任何部分
    • enforcing=0 → 以许可permissive模式启动
  7. 如果给整个系统重新标签化:

    # touch /.autorelabel 
    # reboot
    

    如果系统标签中有大量的错误,为了能够让 autorelabel 成功,你可以用许可模式引导系统。

  8. 检查 SELinux 是否启用:# getenforce

  9. 临时启用/禁用 SELinux:# setenforce [1|0]

  10. SELinux 状态工具:# sestatus

  11. 配置文件:/etc/selinux/config

  12. SELinux 是如何工作的?这是一个为 Apache Web Server 标签化的示例:

    • 二进制文件:/usr/sbin/httpdhttpd_exec_t
    • 配置文件目录:/etc/httpdhttpd_config_t
    • 日志文件目录:/var/log/httpdhttpd_log_t
    • 内容目录:/var/www/htmlhttpd_sys_content_t
    • 启动脚本:/usr/lib/systemd/system/httpd.servicehttpd_unit_file_d
    • 进程:/usr/sbin/httpd -DFOREGROUNDhttpd_t
    • 端口:80/tcp, 443/tcphttpd_t, http_port_t

    httpd_t 安全上下文中运行的一个进程可以与具有 httpd_something_t 标签的对象交互。

  13. 许多命令都可以接收一个 -Z 参数去查看、创建、和修改安全上下文:

    • ls -Z
    • id -Z
    • ps -Z
    • netstat -Z
    • cp -Z
    • mkdir -Z

    当文件被创建时,它们的安全上下文会根据它们父目录的安全上下文来创建(可能有某些例外)。RPM 可以在安装过程中设定安全上下文。

  14. 这里有导致 SELinux 出错的四个关键原因,它们将在下面的 15 - 21 条中展开描述:

    • 标签化问题
    • SELinux 需要知道一些东西
    • SELinux 策略或者应用有 bug
    • 你的信息可能被损坏
  15. 标签化问题:如果在 /srv/myweb 中你的文件没有被正确的标签化,访问可能会被拒绝。这里有一些修复这类问题的方法:

    • 如果你知道标签:# semanage fcontext -a -t httpd_sys_content_t '/srv/myweb(/.*)?'
    • 如果你知道和它有相同标签的文件:# semanage fcontext -a -e /srv/myweb /var/www
    • 恢复安全上下文(对于以上两种情况):# restorecon -vR /srv/myweb
  16. 标签化问题:如果你是移动了一个文件,而不是去复制它,那么这个文件将保持原始的环境。修复这类问题:

    • 使用标签来改变安全上下文:# chcon -t httpd_system_content_t /var/www/html/index.html
    • 使用参考文件的标签来改变安全上下文:# chcon --reference /var/www/html/ /var/www/html/index.html
    • 恢复安全上下文(对于以上两种情况):# restorecon -vR /var/www/html/
  17. 如果 SELinux 需要知道 HTTPD 在 8585 端口上监听,使用下列命令告诉 SELinux:# semanage port -a -t http_port_t -p tcp 8585

  18. SELinux 需要知道是否允许在运行时改变 SELinux 策略部分,而无需重写 SELinux 策略。例如,如果希望 httpd 去发送邮件,输入:# setsebool -P httpd_can_sendmail 1

  19. SELinux 需要知道 SELinux 设置的关闭或打开的一系列布尔值:

    • 查看所有的布尔值:# getsebool -a
    • 查看每个布尔值的描述:# semanage boolean -l
    • 设置某个布尔值:# setsebool [_boolean_] [1|0]
    • 将它配置为永久值,添加 -P 标志。例如:# setsebool httpd_enable_ftp_server 1 -P
  20. SELinux 策略/应用可能有 bug,包括:

    • 不寻常的代码路径
    • 配置
    • 重定向 stdout
    • 泄露的文件描述符
    • 可执行内存
    • 错误构建的库

    开一个工单(但不要提交 Bugzilla 报告;使用 Bugzilla 没有对应的服务)

  21. 你的信息可能被损坏了,假如你被限制在某个区域,尝试这样做:

    • 加载内核模块
    • 关闭 SELinux 的强制模式
    • 写入 etc_t/shadow_t
    • 修改 iptables 规则
  22. 用于开发策略模块的 SELinux 工具:# yum -y install setroubleshoot setroubleshoot-server。安装完成之后重引导机器或重启 auditd 服务。

  23. 使用 journalctl 去列出所有与 setroubleshoot 相关的日志:# journalctl -t setroubleshoot --since=14:20

  24. 使用 journalctl 去列出所有与特定 SELinux 标签相关的日志。例如:# journalctl _SELINUX_CONTEXT=system_u:system_r:policykit_t:s0

  25. 当 SELinux 错误发生时,使用setroubleshoot 的日志,并尝试找到某些可能的解决方法。例如:从 journalctl 中:

    Jun 14 19:41:07 web1 setroubleshoot: SELinux is preventing httpd from getattr access on the file /var/www/html/index.html. For complete message run: sealert -l 12fd8b04-0119-4077-a710-2d0e0ee5755e
    
    # sealert -l 12fd8b04-0119-4077-a710-2d0e0ee5755e
    SELinux is preventing httpd from getattr access on the file /var/www/html/index.html.
    
    ***** Plugin restorecon (99.5 confidence) suggests ************************
    
    If you want to fix the label,
    /var/www/html/index.html default label should be httpd_syscontent_t.
    Then you can restorecon.
    Do
    # /sbin/restorecon -v /var/www/html/index.html
    
  26. 日志:SELinux 记录的信息全在这些地方:

    • /var/log/messages
    • /var/log/audit/audit.log
    • /var/lib/setroubleshoot/setroubleshoot_database.xml
  27. 日志:在审计日志中查找 SELinux 错误:# ausearch -m AVC,USER_AVC,SELINUX_ERR -ts today

  28. 针对特定的服务,搜索 SELinux 的访问向量缓存Access Vector Cache(AVC)信息:# ausearch -m avc -c httpd

  29. audit2allow 实用工具可以通过从日志中搜集有关被拒绝的操作,然后生成 SELinux 策略允许的规则,例如:

    • 产生一个人类可读的关于为什么拒绝访问的描述:# audit2allow -w -a
    • 查看允许被拒绝的类型强制规则:# audit2allow -a
    • 创建一个自定义模块:# audit2allow -a -M mypolicy,其中 -M 选项将创建一个特定名称的强制类型文件(.te),并编译这个规则到一个策略包(.pp)中:mypolicy.pp mypolicy.te
    • 安装自定义模块:# semodule -i mypolicy.pp
  30. 配置单个进程(域)运行在许可模式:# semanage permissive -a httpd_t

  31. 如果不再希望一个域在许可模式中:# semanage permissive -d httpd_t

  32. 禁用所有的许可域:# semodule -d permissivedomains

  33. 启用 SELinux MLS 策略:# yum install selinux-policy-mls。 在 /etc/selinux/config 中:

    SELINUX=permissive
    SELINUXTYPE=mls
    

    确保 SELinux 运行在许可模式:# setenforce 0

    使用 fixfiles 脚本来确保在下一次重启时文件将被重新标签化:# fixfiles -F onboot # reboot

  34. 创建一个带有特定 MLS 范围的用户:# useradd -Z staff_u john

    使用 useradd 命令,映射新用户到一个已存在的 SELinux 用户(上面例子中是 staff_u)。

  35. 查看 SELinux 和 Linux 用户之间的映射:# semanage login -l

  36. 为用户定义一个指定的范围:# semanage login --modify --range s2:c100 john

  37. 调整用户家目录上的标签(如果需要的话):# chcon -R -l s2:c100 /home/john

  38. 列出当前类别:# chcat -L

  39. 修改类别或者创建你自己的分类,修改如下文件:/etc/selinux/_<selinuxtype>_/setrans.conf

  40. 以某个特定的文件、角色和用户安全上下文来运行一个命令或者脚本:# runcon -t initrc_t -r system_r -u user_u yourcommandhere

    • -t 是文件安全上下文
    • -r 是角色安全上下文
    • -u 是用户安全上下文
  41. 在容器中禁用 SELinux:

    • 使用 Podman:# podman run --security-opt label=disable ...
    • 使用 Docker:# docker run --security-opt label=disable ...
  42. 如果需要给容器提供完全访问系统的权限:

    • 使用 Podman:# podman run --privileged ...
    • 使用 Docker:# docker run --privileged ...

就这些了,你已经知道了答案。因此请相信我:不用恐慌,去打开 SELinux 吧

作者简介

Alex Callejas 是位于墨西哥城的红帽公司拉丁美洲区的一名技术客服经理。作为一名系统管理员,他已有超过 10 年的经验。在基础设施强化方面具有很强的专业知识。对开源抱有热情,通过在不同的公共事件和大学中分享他的知识来支持社区。天生的极客,当然他一般选择使用 Fedora Linux 发行版。[这里][11]有更多关于他的信息。


via: https://opensource.com/article/18/7/sysadmin-guide-selinux

作者:Alex Callejas 选题:lujun9972 译者:qhwdw, FSSlc 校对:wxy

本文由 LCTT 原创编译,Linux中国 荣誉推出


          UKTools:安装最新 Linux 内核的简便方法      Cache   Translate Page   Web Page Cache   

Ubuntu 中有许多实用程序可以将 Linux 内核升级到最新的稳定版本。我们之前已经写过关于这些实用程序的文章,例如 Linux Kernel Utilities (LKU)、 Ubuntu Kernel Upgrade Utility (UKUU) 和 Ubunsys。

另外还有一些其它实用程序可供使用。我们计划在其它文章中包含这些,例如 ubuntu-mainline-kernel.sh 和从主线内核手动安装的方式。

今天我们还会教你类似的使用工具 —— UKTools。你可以尝试使用这些实用程序中的任何一个来将 Linux 内核升级至最新版本。

最新的内核版本附带了安全漏洞修复和一些改进,因此,最好保持最新的内核版本以获得可靠、安全和更好的硬件性能。

有时候最新的内核版本可能会有一些漏洞,并且会导致系统崩溃,这是你的风险。我建议你不要在生产环境中安装它。

建议阅读:

什么是 UKTools

UKTools 意思是 Ubuntu 内核工具,它包含两个 shell 脚本 ukupgradeukpurge

ukupgrade 意思是 “Ubuntu Kernel Upgrade”,它允许用户将 Linux 内核升级到 Ubuntu/Mint 的最新稳定版本以及基于 kernel.ubuntu.com 的衍生版本。

ukpurge 意思是 “Ubuntu Kernel Purge”,它允许用户在机器中删除旧的 Linux 内核镜像或头文件,用于 Ubuntu/Mint 和其衍生版本。它将只保留三个内核版本。

此实用程序没有 GUI,但它看起来非常简单直接,因此,新手可以在没有任何问题的情况下进行升级。

我正在运行 Ubuntu 17.10,目前的内核版本如下:

$ uname -a
Linux ubuntu 4.13.0-39-generic #44-Ubuntu SMP Thu Apr 5 14:25:01 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux

运行以下命令来获取系统上已安装内核的列表(Ubuntu 及其衍生产品)。目前我持有 7 个内核。

$ dpkg --list | grep linux-image
ii linux-image-4.13.0-16-generic 4.13.0-16.19 amd64 Linux kernel image for version 4.13.0 on 64 bit x86 SMP
ii linux-image-4.13.0-17-generic 4.13.0-17.20 amd64 Linux kernel image for version 4.13.0 on 64 bit x86 SMP
ii linux-image-4.13.0-32-generic 4.13.0-32.35 amd64 Linux kernel image for version 4.13.0 on 64 bit x86 SMP
ii linux-image-4.13.0-36-generic 4.13.0-36.40 amd64 Linux kernel image for version 4.13.0 on 64 bit x86 SMP
ii linux-image-4.13.0-37-generic 4.13.0-37.42 amd64 Linux kernel image for version 4.13.0 on 64 bit x86 SMP
ii linux-image-4.13.0-38-generic 4.13.0-38.43 amd64 Linux kernel image for version 4.13.0 on 64 bit x86 SMP
ii linux-image-4.13.0-39-generic 4.13.0-39.44 amd64 Linux kernel image for version 4.13.0 on 64 bit x86 SMP
ii linux-image-extra-4.13.0-16-generic 4.13.0-16.19 amd64 Linux kernel extra modules for version 4.13.0 on 64 bit x86 SMP
ii linux-image-extra-4.13.0-17-generic 4.13.0-17.20 amd64 Linux kernel extra modules for version 4.13.0 on 64 bit x86 SMP
ii linux-image-extra-4.13.0-32-generic 4.13.0-32.35 amd64 Linux kernel extra modules for version 4.13.0 on 64 bit x86 SMP
ii linux-image-extra-4.13.0-36-generic 4.13.0-36.40 amd64 Linux kernel extra modules for version 4.13.0 on 64 bit x86 SMP
ii linux-image-extra-4.13.0-37-generic 4.13.0-37.42 amd64 Linux kernel extra modules for version 4.13.0 on 64 bit x86 SMP
ii linux-image-extra-4.13.0-38-generic 4.13.0-38.43 amd64 Linux kernel extra modules for version 4.13.0 on 64 bit x86 SMP
ii linux-image-extra-4.13.0-39-generic 4.13.0-39.44 amd64 Linux kernel extra modules for version 4.13.0 on 64 bit x86 SMP
ii linux-image-generic 4.13.0.39.42 amd64 Generic Linux kernel image

如何安装 UKTools

在 Ubuntu 及其衍生产品上,只需运行以下命令来安装 UKTools 即可。

在你的系统上运行以下命令来克隆 UKTools 仓库:

$ git clone https://github.com/usbkey9/uktools

进入 uktools 目录:

$ cd uktools

运行 Makefile 以生成必要的文件。此外,这将自动安装最新的可用内核。只需重新启动系统即可使用最新的内核。

$ sudo make
[sudo] password for daygeek:
Creating the directories if neccessary
Linking profile.d file for reboot message
Linking files to global sbin directory
Ubuntu Kernel Upgrade - by Mustafa Hasturk
------------------------------------------
This script is based on the work of Mustafa Hasturk and was reworked by
Caio Oliveira and modified and fixed by Christoph Kepler

Current Development and Maintenance by Christoph Kepler

Do you want the Stable Release (if not sure, press y)? (y/n): y
Do you want the Generic kernel? (y/n): y
Do you want to autoremove old kernel? (y/n): y
no crontab for root
Do you want to update the kernel automatically? (y/n): y
Setup complete. Update the kernel right now? (y/n): y
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages were automatically installed and are no longer required:
 linux-headers-4.13.0-16 linux-headers-4.13.0-16-generic linux-headers-4.13.0-17 linux-headers-4.13.0-17-generic linux-headers-4.13.0-32 linux-headers-4.13.0-32-generic linux-headers-4.13.0-36
 linux-headers-4.13.0-36-generic linux-headers-4.13.0-37 linux-headers-4.13.0-37-generic linux-image-4.13.0-16-generic linux-image-4.13.0-17-generic linux-image-4.13.0-32-generic linux-image-4.13.0-36-generic
 linux-image-4.13.0-37-generic linux-image-extra-4.13.0-16-generic linux-image-extra-4.13.0-17-generic linux-image-extra-4.13.0-32-generic linux-image-extra-4.13.0-36-generic
 linux-image-extra-4.13.0-37-generic
Use 'sudo apt autoremove' to remove them.
The following additional packages will be installed:
 lynx-common
The following NEW packages will be installed:
 lynx lynx-common
0 upgraded, 2 newly installed, 0 to remove and 71 not upgraded.
Need to get 1,498 kB of archives.
After this operation, 5,418 kB of additional disk space will be used.
Get:1 http://in.archive.ubuntu.com/ubuntu artful/universe amd64 lynx-common all 2.8.9dev16-1 [873 kB]
Get:2 http://in.archive.ubuntu.com/ubuntu artful/universe amd64 lynx amd64 2.8.9dev16-1 [625 kB]
Fetched 1,498 kB in 12s (120 kB/s)
Selecting previously unselected package lynx-common.
(Reading database ... 441037 files and directories currently installed.)
Preparing to unpack .../lynx-common_2.8.9dev16-1_all.deb ...
Unpacking lynx-common (2.8.9dev16-1) ...
Selecting previously unselected package lynx.
Preparing to unpack .../lynx_2.8.9dev16-1_amd64.deb ...
Unpacking lynx (2.8.9dev16-1) ...
Processing triggers for mime-support (3.60ubuntu1) ...
Processing triggers for doc-base (0.10.7) ...
Processing 1 added doc-base file...
Processing triggers for man-db (2.7.6.1-2) ...
Setting up lynx-common (2.8.9dev16-1) ...
Setting up lynx (2.8.9dev16-1) ...
update-alternatives: using /usr/bin/lynx to provide /usr/bin/www-browser (www-browser) in auto mode

Cleaning old downloads in /tmp

Downloading the kernel's components...
Checksum for linux-headers-4.16.7-041607-generic_4.16.7-041607.201805021131_amd64.deb succeed
Checksum for linux-image-unsigned-4.16.7-041607-generic_4.16.7-041607.201805021131_amd64.deb succeed
Checksum for linux-modules-4.16.7-041607-generic_4.16.7-041607.201805021131_amd64.deb succeed

Downloading the shared kernel header...
Checksum for linux-headers-4.16.7-041607_4.16.7-041607.201805021131_all.deb succeed

Installing Kernel and Headers...
Selecting previously unselected package linux-headers-4.16.7-041607.
(Reading database ... 441141 files and directories currently installed.)
Preparing to unpack .../linux-headers-4.16.7-041607_4.16.7-041607.201805021131_all.deb ...
Unpacking linux-headers-4.16.7-041607 (4.16.7-041607.201805021131) ...
Selecting previously unselected package linux-headers-4.16.7-041607-generic.
Preparing to unpack .../linux-headers-4.16.7-041607-generic_4.16.7-041607.201805021131_amd64.deb ...
Unpacking linux-headers-4.16.7-041607-generic (4.16.7-041607.201805021131) ...
Selecting previously unselected package linux-image-unsigned-4.16.7-041607-generic.
Preparing to unpack .../linux-image-unsigned-4.16.7-041607-generic_4.16.7-041607.201805021131_amd64.deb ...
Unpacking linux-image-unsigned-4.16.7-041607-generic (4.16.7-041607.201805021131) ...
Selecting previously unselected package linux-modules-4.16.7-041607-generic.
Preparing to unpack .../linux-modules-4.16.7-041607-generic_4.16.7-041607.201805021131_amd64.deb ...
Unpacking linux-modules-4.16.7-041607-generic (4.16.7-041607.201805021131) ...
Setting up linux-headers-4.16.7-041607 (4.16.7-041607.201805021131) ...
dpkg: dependency problems prevent configuration of linux-headers-4.16.7-041607-generic:
 linux-headers-4.16.7-041607-generic depends on libssl1.1 (>= 1.1.0); however:
 Package libssl1.1 is not installed.

Setting up linux-modules-4.16.7-041607-generic (4.16.7-041607.201805021131) ...
Setting up linux-image-unsigned-4.16.7-041607-generic (4.16.7-041607.201805021131) ...
I: /vmlinuz.old is now a symlink to boot/vmlinuz-4.13.0-39-generic
I: /initrd.img.old is now a symlink to boot/initrd.img-4.13.0-39-generic
I: /vmlinuz is now a symlink to boot/vmlinuz-4.16.7-041607-generic
I: /initrd.img is now a symlink to boot/initrd.img-4.16.7-041607-generic
Processing triggers for linux-image-unsigned-4.16.7-041607-generic (4.16.7-041607.201805021131) ...
/etc/kernel/postinst.d/initramfs-tools:
update-initramfs: Generating /boot/initrd.img-4.16.7-041607-generic
/etc/kernel/postinst.d/zz-update-grub:
Generating grub configuration file ...
Warning: Setting GRUB_TIMEOUT to a non-zero value when GRUB_HIDDEN_TIMEOUT is set is no longer supported.
Found linux image: /boot/vmlinuz-4.16.7-041607-generic
Found initrd image: /boot/initrd.img-4.16.7-041607-generic
Found linux image: /boot/vmlinuz-4.13.0-39-generic
Found initrd image: /boot/initrd.img-4.13.0-39-generic
Found linux image: /boot/vmlinuz-4.13.0-38-generic
Found initrd image: /boot/initrd.img-4.13.0-38-generic
Found linux image: /boot/vmlinuz-4.13.0-37-generic
Found initrd image: /boot/initrd.img-4.13.0-37-generic
Found linux image: /boot/vmlinuz-4.13.0-36-generic
Found initrd image: /boot/initrd.img-4.13.0-36-generic
Found linux image: /boot/vmlinuz-4.13.0-32-generic
Found initrd image: /boot/initrd.img-4.13.0-32-generic
Found linux image: /boot/vmlinuz-4.13.0-17-generic
Found initrd image: /boot/initrd.img-4.13.0-17-generic
Found linux image: /boot/vmlinuz-4.13.0-16-generic
Found initrd image: /boot/initrd.img-4.13.0-16-generic
Found memtest86+ image: /boot/memtest86+.elf
Found memtest86+ image: /boot/memtest86+.bin
done

Thanks for using this script! Hope it helped.
Give it a star: https://github.com/MarauderXtreme/uktools

重新启动系统以激活最新的内核。

$ sudo shutdown -r now

一旦系统重新启动,重新检查内核版本。

$ uname -a
Linux ubuntu 4.16.7-041607-generic #201805021131 SMP Wed May 2 15:34:55 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux

此 make 命令会将下面的文件放到 /usr/local/bin 目录中。

do-kernel-upgrade
do-kernel-purge

要移除旧内核,运行以下命令:

$ do-kernel-purge

Ubuntu Kernel Purge - by Caio Oliveira

This script will only keep three versions: the first and the last two, others will be purge

---Current version:
Linux Kernel 4.16.7-041607 Generic (linux-image-4.16.7-041607-generic)

---Versions to remove:
4.13.0-16
4.13.0-17
4.13.0-32
4.13.0-36
4.13.0-37

---Do you want to remove the old kernels/headers versions? (Y/n): y
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages were automatically installed and are no longer required:
 linux-headers-4.13.0-17 linux-headers-4.13.0-17-generic linux-headers-4.13.0-32 linux-headers-4.13.0-32-generic linux-headers-4.13.0-36 linux-headers-4.13.0-36-generic linux-headers-4.13.0-37
 linux-headers-4.13.0-37-generic linux-image-4.13.0-17-generic linux-image-4.13.0-32-generic linux-image-4.13.0-36-generic linux-image-4.13.0-37-generic linux-image-extra-4.13.0-17-generic
 linux-image-extra-4.13.0-32-generic linux-image-extra-4.13.0-36-generic linux-image-extra-4.13.0-37-generic
Use 'sudo apt autoremove' to remove them.
The following packages will be REMOVED:
 linux-headers-4.13.0-16* linux-headers-4.13.0-16-generic* linux-image-4.13.0-16-generic* linux-image-extra-4.13.0-16-generic*
0 upgraded, 0 newly installed, 4 to remove and 71 not upgraded.
After this operation, 318 MB disk space will be freed.
(Reading database ... 465582 files and directories currently installed.)
Removing linux-headers-4.13.0-16-generic (4.13.0-16.19) ...
Removing linux-headers-4.13.0-16 (4.13.0-16.19) ...
Removing linux-image-extra-4.13.0-16-generic (4.13.0-16.19) ...
run-parts: executing /etc/kernel/postinst.d/apt-auto-removal 4.13.0-16-generic /boot/vmlinuz-4.13.0-16-generic
run-parts: executing /etc/kernel/postinst.d/initramfs-tools 4.13.0-16-generic /boot/vmlinuz-4.13.0-16-generic
update-initramfs: Generating /boot/initrd.img-4.13.0-16-generic
run-parts: executing /etc/kernel/postinst.d/unattended-upgrades 4.13.0-16-generic /boot/vmlinuz-4.13.0-16-generic
run-parts: executing /etc/kernel/postinst.d/update-notifier 4.13.0-16-generic /boot/vmlinuz-4.13.0-16-generic
run-parts: executing /etc/kernel/postinst.d/zz-update-grub 4.13.0-16-generic /boot/vmlinuz-4.13.0-16-generic
Generating grub configuration file ...
Warning: Setting GRUB_TIMEOUT to a non-zero value when GRUB_HIDDEN_TIMEOUT is set is no longer supported.
Found linux image: /boot/vmlinuz-4.16.7-041607-generic
Found initrd image: /boot/initrd.img-4.16.7-041607-generic
Found linux image: /boot/vmlinuz-4.13.0-39-generic
Found initrd image: /boot/initrd.img-4.13.0-39-generic
Found linux image: /boot/vmlinuz-4.13.0-38-generic
Found initrd image: /boot/initrd.img-4.13.0-38-generic
Found linux image: /boot/vmlinuz-4.13.0-37-generic
Found initrd image: /boot/initrd.img-4.13.0-37-generic
Found linux image: /boot/vmlinuz-4.13.0-36-generic
Found initrd image: /boot/initrd.img-4.13.0-36-generic
Found linux image: /boot/vmlinuz-4.13.0-32-generic
Found initrd image: /boot/initrd.img-4.13.0-32-generic
Found linux image: /boot/vmlinuz-4.13.0-17-generic
Found initrd image: /boot/initrd.img-4.13.0-17-generic
Found linux image: /boot/vmlinuz-4.13.0-16-generic
Found initrd image: /boot/initrd.img-4.13.0-16-generic
Found memtest86+ image: /boot/memtest86+.elf
Found memtest86+ image: /boot/memtest86+.bin
done
Removing linux-image-4.13.0-16-generic (4.13.0-16.19) ...
Examining /etc/kernel/postrm.d .
run-parts: executing /etc/kernel/postrm.d/initramfs-tools 4.13.0-16-generic /boot/vmlinuz-4.13.0-16-generic
update-initramfs: Deleting /boot/initrd.img-4.13.0-16-generic
run-parts: executing /etc/kernel/postrm.d/zz-update-grub 4.13.0-16-generic /boot/vmlinuz-4.13.0-16-generic
Generating grub configuration file ...
Warning: Setting GRUB_TIMEOUT to a non-zero value when GRUB_HIDDEN_TIMEOUT is set is no longer supported.
Found linux image: /boot/vmlinuz-4.16.7-041607-generic
Found initrd image: /boot/initrd.img-4.16.7-041607-generic
Found linux image: /boot/vmlinuz-4.13.0-39-generic
Found initrd image: /boot/initrd.img-4.13.0-39-generic
Found linux image: /boot/vmlinuz-4.13.0-38-generic
Found initrd image: /boot/initrd.img-4.13.0-38-generic
Found linux image: /boot/vmlinuz-4.13.0-37-generic
Found initrd image: /boot/initrd.img-4.13.0-37-generic
Found linux image: /boot/vmlinuz-4.13.0-36-generic
Found initrd image: /boot/initrd.img-4.13.0-36-generic
Found linux image: /boot/vmlinuz-4.13.0-32-generic
Found initrd image: /boot/initrd.img-4.13.0-32-generic
Found linux image: /boot/vmlinuz-4.13.0-17-generic
Found initrd image: /boot/initrd.img-4.13.0-17-generic
Found memtest86+ image: /boot/memtest86+.elf
Found memtest86+ image: /boot/memtest86+.bin
done
(Reading database ... 430635 files and directories currently installed.)
Purging configuration files for linux-image-extra-4.13.0-16-generic (4.13.0-16.19) ...
Purging configuration files for linux-image-4.13.0-16-generic (4.13.0-16.19) ...
Examining /etc/kernel/postrm.d .
run-parts: executing /etc/kernel/postrm.d/initramfs-tools 4.13.0-16-generic /boot/vmlinuz-4.13.0-16-generic
run-parts: executing /etc/kernel/postrm.d/zz-update-grub 4.13.0-16-generic /boot/vmlinuz-4.13.0-16-generic
Reading package lists... Done
Building dependency tree
Reading state information... Done
.
.
.
.
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages will be REMOVED:
 linux-headers-4.13.0-37* linux-headers-4.13.0-37-generic* linux-image-4.13.0-37-generic* linux-image-extra-4.13.0-37-generic*
0 upgraded, 0 newly installed, 4 to remove and 71 not upgraded.
After this operation, 321 MB disk space will be freed.
(Reading database ... 325772 files and directories currently installed.)
Removing linux-headers-4.13.0-37-generic (4.13.0-37.42) ...
Removing linux-headers-4.13.0-37 (4.13.0-37.42) ...
Removing linux-image-extra-4.13.0-37-generic (4.13.0-37.42) ...
run-parts: executing /etc/kernel/postinst.d/apt-auto-removal 4.13.0-37-generic /boot/vmlinuz-4.13.0-37-generic
run-parts: executing /etc/kernel/postinst.d/initramfs-tools 4.13.0-37-generic /boot/vmlinuz-4.13.0-37-generic
update-initramfs: Generating /boot/initrd.img-4.13.0-37-generic
run-parts: executing /etc/kernel/postinst.d/unattended-upgrades 4.13.0-37-generic /boot/vmlinuz-4.13.0-37-generic
run-parts: executing /etc/kernel/postinst.d/update-notifier 4.13.0-37-generic /boot/vmlinuz-4.13.0-37-generic
run-parts: executing /etc/kernel/postinst.d/zz-update-grub 4.13.0-37-generic /boot/vmlinuz-4.13.0-37-generic
Generating grub configuration file ...
Warning: Setting GRUB_TIMEOUT to a non-zero value when GRUB_HIDDEN_TIMEOUT is set is no longer supported.
Found linux image: /boot/vmlinuz-4.16.7-041607-generic
Found initrd image: /boot/initrd.img-4.16.7-041607-generic
Found linux image: /boot/vmlinuz-4.13.0-39-generic
Found initrd image: /boot/initrd.img-4.13.0-39-generic
Found linux image: /boot/vmlinuz-4.13.0-38-generic
Found initrd image: /boot/initrd.img-4.13.0-38-generic
Found linux image: /boot/vmlinuz-4.13.0-37-generic
Found initrd image: /boot/initrd.img-4.13.0-37-generic
Found memtest86+ image: /boot/memtest86+.elf
Found memtest86+ image: /boot/memtest86+.bin
done
Removing linux-image-4.13.0-37-generic (4.13.0-37.42) ...
Examining /etc/kernel/postrm.d .
run-parts: executing /etc/kernel/postrm.d/initramfs-tools 4.13.0-37-generic /boot/vmlinuz-4.13.0-37-generic
update-initramfs: Deleting /boot/initrd.img-4.13.0-37-generic
run-parts: executing /etc/kernel/postrm.d/zz-update-grub 4.13.0-37-generic /boot/vmlinuz-4.13.0-37-generic
Generating grub configuration file ...
Warning: Setting GRUB_TIMEOUT to a non-zero value when GRUB_HIDDEN_TIMEOUT is set is no longer supported.
Found linux image: /boot/vmlinuz-4.16.7-041607-generic
Found initrd image: /boot/initrd.img-4.16.7-041607-generic
Found linux image: /boot/vmlinuz-4.13.0-39-generic
Found initrd image: /boot/initrd.img-4.13.0-39-generic
Found linux image: /boot/vmlinuz-4.13.0-38-generic
Found initrd image: /boot/initrd.img-4.13.0-38-generic
Found memtest86+ image: /boot/memtest86+.elf
Found memtest86+ image: /boot/memtest86+.bin
done
(Reading database ... 290810 files and directories currently installed.)
Purging configuration files for linux-image-extra-4.13.0-37-generic (4.13.0-37.42) ...
Purging configuration files for linux-image-4.13.0-37-generic (4.13.0-37.42) ...
Examining /etc/kernel/postrm.d .
run-parts: executing /etc/kernel/postrm.d/initramfs-tools 4.13.0-37-generic /boot/vmlinuz-4.13.0-37-generic
run-parts: executing /etc/kernel/postrm.d/zz-update-grub 4.13.0-37-generic /boot/vmlinuz-4.13.0-37-generic

Thanks for using this script!!!

使用以下命令重新检查已安装内核的列表。它将只保留三个旧的内核。

$ dpkg --list | grep linux-image
ii linux-image-4.13.0-38-generic 4.13.0-38.43 amd64 Linux kernel image for version 4.13.0 on 64 bit x86 SMP
ii linux-image-4.13.0-39-generic 4.13.0-39.44 amd64 Linux kernel image for version 4.13.0 on 64 bit x86 SMP
ii linux-image-extra-4.13.0-38-generic 4.13.0-38.43 amd64 Linux kernel extra modules for version 4.13.0 on 64 bit x86 SMP
ii linux-image-extra-4.13.0-39-generic 4.13.0-39.44 amd64 Linux kernel extra modules for version 4.13.0 on 64 bit x86 SMP
ii linux-image-generic 4.13.0.39.42 amd64 Generic Linux kernel image
ii linux-image-unsigned-4.16.7-041607-generic 4.16.7-041607.201805021131 amd64 Linux kernel image for version 4.16.7 on 64 bit x86 SMP

下次你可以调用 do-kernel-upgrade 实用程序来安装新的内核。如果有任何新内核可用,那么它将安装。如果没有,它将报告当前没有可用的内核更新。

$ do-kernel-upgrade
Kernel up to date. Finishing

再次运行 do-kernel-purge 命令以确认。如果发现超过三个内核,那么它将移除。如果不是,它将报告没有删除消息。

$ do-kernel-purge

Ubuntu Kernel Purge - by Caio Oliveira

This script will only keep three versions: the first and the last two, others will be purge

---Current version:
Linux Kernel 4.16.7-041607 Generic (linux-image-4.16.7-041607-generic)
Nothing to remove!

Thanks for using this script!!!

via: https://www.2daygeek.com/uktools-easy-way-to-install-latest-stable-linux-kernel-on-ubuntu-mint-and-derivatives/

作者:Prakash Subramanian 选题:lujun9972 译者:MjSeven 校对:wxy

本文由 LCTT 原创编译,Linux中国 荣誉推出


          Mi-Level Logistician - CSRA - Virginia Beach, VA      Cache   Translate Page   Web Page Cache   
Must perform PSA to create data to maintain and update LPD with in PowerLOG-J Database, and make sure that LPD is available for export to the government....
From CSRA - Fri, 29 Jun 2018 10:23:04 GMT - View all Virginia Beach, VA jobs
          Junior Logistician - CSRA - Virginia Beach, VA      Cache   Translate Page   Web Page Cache   
Must perform PSA to create data to maintain and update LPD with in PowerLOG-J Database, and make sure that LPD is available for export to the government....
From CSRA - Fri, 29 Jun 2018 10:23:03 GMT - View all Virginia Beach, VA jobs
          Mid-Level Logistician - CSRA - Virginia Beach, VA      Cache   Translate Page   Web Page Cache   
Must perform PSA to create data to maintain and update LPD with in PowerLOG-J Database, and make sure that LPD is available for export to the government....
From CSRA - Fri, 29 Jun 2018 10:19:19 GMT - View all Virginia Beach, VA jobs
          Army Integrated Logistics Support (ILS) Manager - MCKEAN DEFENSE/CABRILLO TECHNOLOGIES - Virginia Beach, VA      Cache   Translate Page   Web Page Cache   
Update LPD within the PowerLOG-J database to ensure LPD accurately reflects the results and findings of these activities IAW CDRL A018 (Logistics Product Data)....
From MCKEAN DEFENSE/CABRILLO TECHNOLOGIES - Mon, 11 Jun 2018 06:49:37 GMT - View all Virginia Beach, VA jobs
          How to Develop a Skillful Machine Learning Time Series Forecasting Model      Cache   Translate Page   Web Page Cache   

You are handed data and told to develop a forecast model. What do you do? This is a common situation; far more common than most people think. Perhaps you are sent a CSV file. Perhaps you are given access to a database. Perhaps you are starting a competition. The problem can be reasonably well defined: […]

The post How to Develop a Skillful Machine Learning Time Series Forecasting Model appeared first on Machine Learning Mastery.


          INTENSE 50 VERSUS 50 COMBAT, FRESH CHARACTERS IN RETURNERS GUILD ANNIHILATION WAR UPDATE      Cache   Translate Page   Web Page Cache   
INTENSE 50 VERSUS 50 COMBAT, FRESH CHARACTERS IN RETURNERS GUILD ANNIHILATION WAR UPDATE Military general Napoleon Bonaparte and sly siren Dulcet Bloom join the fray for massive battles, special events and fresh gear in Nexon’s management RPG for iPhone and Android Seoul – Aug. 9, 2018 – Cleopatra, Robin Hood, Hercules, Aladdin and more breathe new life today in the Guild Annihilation War update for Returners, the popular management-style mobile role-playing game (RPG) from NEXON Korea Corporation, subsidiary of NEXON Co., Ltd. (“Nexon”) (3659.TO), a worldwide leader in free-to-play online and mobile games. The update boasts several new features for new and veteran players to enjoy, such as intense 50-vs-50 multiplayer combat, formidable heroes Napoleon Bonaparte and Dulcet Bloom, powerful new gear for players to collect, and numerous special events. The Guild Annihilation War update is available to download now on iOS and Android. Returners features heroes from myth and lore where players engage in rapid 5v5 fights to execute clever strategy and game-winning tactics. The game’s roster of iconic champions, vibrant stylized graphics and active player-community combine for a robust mobile multiplayer experience. The content update upgrades many of the Retuners’ core mechanics, such as the vigorous league system, bold visuals, compelling action gameplay and deep combat system. The Guild Annihilation War update features include: Massive 50 vs. 50 Battles – Players can engage in immense, high-stakes 50-vs-50 Guild Annihilation Wars that take place 3 times per week. Participants will earn Guild Points through close cooperation with other guild members to push player’s guild weekly rankings through the stratosphere; Powerful New Heroes – Famed military tactician Napoleon Bonaparte makes his Returners debut in explosive fashion, dealing extra damage to Tanks and wielding his “Revolutionary Canon” that boasts a deadly 35% chance to instantly vaporize an enemy target. Players will also utilize the Siren Skin for skilled healer Dulcet Bloom. The skin provides Dulcet with increased magic attack and increased hit points (HP) for improved survivability in clutch situations. Unprecedented 7-Star Gear – New and experienced players can now enhance 6-star gear by +25 to upgrade to 7-star gear. All 7-star gear vaunts both hidden and default abilities that can be upgraded by +25; Special Events – Several on-time events, including the 7-Day Attendance Event, allow players to receive 7-star upgrade materials. The Boomerang Event also rewards players with rare high-grade Legendary Gear just for playing. The Guild Annihilation War update is available now in North America, Europe and some Southeast Asian regions. Returners is rated T for Teen (ESRB). Fans of the game are encouraged to visit the Inven Global community page and forum where players will find helpful tips, tricks, strategies, a database to search hero statistics, tactic cards, achievements and more. Additional information for members of the press: Click here for the Official Returners Facebook page Check out the Returners Inven Global community page About NEXON Co. Ltd. NEXON Co., Ltd. (“Nexon”) (3659.TO) is a worldwide leader in free-to-play online and mobile games. Founded in Korea in 1994, Nexon developed one of the world’s first graphics-based massively multiplayer online games. Nexon also pioneered the concept of microtransactions and the free-to-play business model, setting a new standard in which play is free, and users have the option to purchase in-game items to enhance their experience. Nexon currently services nearly 100 titles in more than 190 countries. The Company is headquartered in Tokyo, Japan and its shares are listed on the Tokyo Stock Exchange. # # #
          Talent/Recruitment Sourcer - PHM Search Group Inc - London, ON      Cache   Translate Page   Web Page Cache   
Computer literacy – Windows 7, keyboarding, internet search knowledge, database navigation, data entry. Talent Support Specialist....
From PHM Search Group Inc - Thu, 02 Aug 2018 06:05:46 GMT - View all London, ON jobs
          Paraprofessional - Library Media Tech - Secondary - 8 hrs/day at JCSCS - Sheridan County School Disctrict 2 - Sheridan, WY      Cache   Translate Page   Web Page Cache   
Create and maintain current patron, book, and non-book computerized databases. Paraprofessional - Library Media/Technology - Secondary - 8 hrs/day at John C....
From Sheridan County School Disctrict 2 - Wed, 18 Jul 2018 21:38:18 GMT - View all Sheridan, WY jobs
          Data Administrator - McGill University - Montréal, QC      Cache   Translate Page   Web Page Cache   
Reporting to the Administrative Officer, the incumbent is responsible for the development and maintenance of systems and databases that respond to the needs,... $46,300 - $57,900 a year
From McGill University - Fri, 03 Aug 2018 15:04:28 GMT - View all Montréal, QC jobs
          Tokyo 2020 to boost security with facial recognition system      Cache   Translate Page   Web Page Cache   
Tokyo 2020 will be the first Olympics to use facial recognition technology to increase security around all venues, the organizers announced on Tuesday. Games organizers have linked up with Japanese telecommunications and information technology giant NEC to develop the first system of this kind to be implemented at an Olympics. The technology, which was demonstrated to the media at an event in the Japanese capital, will use IC chips within identification cards to automatically verify the identity of those entering over 40 venues. More than 300,000 athletes and Games staff will have to submit photographs to a database before the Olympics start in July 2020. “Every time they enter the facility, they have to do a security check,” explained Tokyo 2020’s head of security Tsuyoshi Iwashita. “Tokyo’s venues doesn’t always have enough space for the security check or even space to wait for the security check. When the events are happening, we expect many people to come and the weather will be very hot. This is why we introduced this facial recognition.” The system will not be aimed at spectators and will instead concentrate on strengthening security and decreasing waiting times for athletes. “More than 40 facilities, including the main stadium, International Broadcast Centre, the Olympic village and so on, will have the facial recognition system,” said NEC Senior Vice President Masaaki Suganuma. “Athletes, Games staff, volunteers and the media will have this recognition.” NEC said they tested the technology during the Rio 2016 Olympics and that the technology has already been implemented in various locations, including airports. During the demonstration to media, the technology correctly identified a string of people, including those in wheelchairs and of varying heights, which is a key feature of NEC’s system. Suanuma said: “99.7 percent of the time, the face is recognized by the system correctly. “This number will not change according to nationality or if big or small.”
          Secure Storage of Database Credentials?      Cache   Translate Page   Web Page Cache   

To me this situation looks similar to a programmer who has FTP/SSH access to a server - they will also have access to any database credentials. This is normal procedure but requires trust that the programmer is savvy enough not to have his computer hacked, in which case an attacker can get access to sensitive information. In your case you need to make sure the file navigator tool does not have security holes.

A more complicated situation is when some of the programmers are not to be trusted and you want to hide some data from them.


          Secure Storage of Database Credentials?      Cache   Translate Page   Web Page Cache   

I used the term employees to include the head of IT and myself, who are the only ones with access to the PHP files (via a wired connection to IBM i that has the PHP files and the database), whether to read, write, or modify. The PHP uses specially-created profiles with read-only access to specific parts of the database.

We don’t give anyone access they don’t need.


          Secure Storage of Database Credentials?      Cache   Translate Page   Web Page Cache   

This sounds strange. I don’t know if you can share it but I’m wondering what’s the purpose of employees accessing files and even having write permissions for PHP? What files do they need to have access to and to be able to modify? Do they have access to all file system? I was thinking the only people needing access to PHP files are application programmers while regular employees should have a dedicated storage space - like for documents, etc. Unless the employees are also programmers?.. Which would be strange, too, since a programmer would normally access PHP files by FTP or SSH. This sounds like the employees have access to all kinds of files and directories they don’t need to - but then I don’t know the specifics of business requirements.


          Secure Storage of Database Credentials?      Cache   Translate Page   Web Page Cache   

Even when kept on the same server as the database, only IT personnel and myself have access to the PHP. Everyone else is locked out. The same would be true for a separate server.

Essentially my concern was invalid; see my reply to TomB:


          Secure Storage of Database Credentials?      Cache   Translate Page   Web Page Cache   

No, because less people have access to it. Unless I misunderstood you?


          Secure Storage of Database Credentials?      Cache   Translate Page   Web Page Cache   

Unless I’m missing something, this would result in the same behavior as keeping it on the same server.


          Secure Storage of Database Credentials?      Cache   Translate Page   Web Page Cache   

Why not put the PHP files on a server completely separate from the fileserver and close all incoming ports except for 80, 443 and 22, so you can a) access the website over HTTPS and HTTP, and you can use scp or rsync or something to upload files to the server securely.


          Secure Storage of Database Credentials?      Cache   Translate Page   Web Page Cache   
When you say “accessible”, how are they accessed?  Do those computers have write access to PHP scripts on the server?

All employee computers are connected to the web. Some are also connected to the server.

Those connected to the server have a file-navigator tool (which, every time it’s opened, asks for the username and password unique to the employee). The employee username and password has unique authorization to different parts of the database we’re trying to protect, and may have write permissions for the PHP.

If we continue to extend the PHP’s functionality, we would create new read-only credentials for use by the PHP application that could access sensitive files – and thus I was concerned about cases where the employee’s computer may be able to read a PHP file that contains credentials with access to more-sensitive documents than the (probably already compromised) employee credentials.

Of course, now that I’ve explained it fully, I’m realizing that there will almost never be a case where the access granted to a profile stored in the PHP would be of a higher level than an account with write access to my PHP files. Actually, the only people who have PHP write access already have global access…

Sigh. I’ll focus on making sure our computers don’t get compromised, I guess. Thanks for the help!


          Secure Storage of Database Credentials?      Cache   Translate Page   Web Page Cache   

When you say “accessible”, how are they accessed? Do those computers have write access to PHP scripts on the server?


          Secure Storage of Database Credentials?      Cache   Translate Page   Web Page Cache   

This is how the server works by design - it is only accessible by computers that are physically present at our location, with wired connections - so by definition, any attacks will be by those who’ve gained remote access to a computer with a physical connection to the server.

Since employee computers open up connections to remote computers on occasion, I’d like to ensure that gathering credentials is just as hard as using them (in case anything goes wrong).


          Mi-Level Logistician - CSRA - Virginia Beach, VA      Cache   Translate Page   Web Page Cache   
Must perform PSA to create data to maintain and update LPD with in PowerLOG-J Database, and make sure that LPD is available for export to the government....
From CSRA - Fri, 29 Jun 2018 10:23:04 GMT - View all Virginia Beach, VA jobs
          Junior Logistician - CSRA - Virginia Beach, VA      Cache   Translate Page   Web Page Cache   
Must perform PSA to create data to maintain and update LPD with in PowerLOG-J Database, and make sure that LPD is available for export to the government....
From CSRA - Fri, 29 Jun 2018 10:23:03 GMT - View all Virginia Beach, VA jobs
          Mid-Level Logistician - CSRA - Virginia Beach, VA      Cache   Translate Page   Web Page Cache   
Must perform PSA to create data to maintain and update LPD with in PowerLOG-J Database, and make sure that LPD is available for export to the government....
From CSRA - Fri, 29 Jun 2018 10:19:19 GMT - View all Virginia Beach, VA jobs
          Army Integrated Logistics Support (ILS) Manager - MCKEAN DEFENSE/CABRILLO TECHNOLOGIES - Virginia Beach, VA      Cache   Translate Page   Web Page Cache   
Update LPD within the PowerLOG-J database to ensure LPD accurately reflects the results and findings of these activities IAW CDRL A018 (Logistics Product Data)....
From MCKEAN DEFENSE/CABRILLO TECHNOLOGIES - Mon, 11 Jun 2018 06:49:37 GMT - View all Virginia Beach, VA jobs
          Immediate Need for Order Processing Clerk - Up to $18 per hour!      Cache   Translate Page   Web Page Cache   
CA-Stanton, Job Description: Exciting, innovative Biotech/Pharmaceutical company in Orange County looking for an order processing clerk to join their team! The Order Processing Specialist will perform aspects of the customer sample order cycle including: receiving, analyzing customer requests, sample entry into database and sending final reports. Along with routine responsibilities, special projects will be a
          Solution Architect Big Data - Wipro LTD - Burnaby, BC      Cache   Translate Page   Web Page Cache   
Databases-Oracle , PDW, SQl server. SSRS - SQL Server Reporting Services, Microsoft BI....
From Wipro LTD - Wed, 01 Aug 2018 16:48:21 GMT - View all Burnaby, BC jobs
          Marketing Proposal Specialist - AECOM - Markham, ON      Cache   Translate Page   Web Page Cache   
+ Experience with one or more CRM databases such as Salesforce or Deltek Vision, including adding, maintaining, and researching CRM records is preferred....
From AECOM - Fri, 06 Jul 2018 23:21:29 GMT - View all Markham, ON jobs
          CRM Database Administrator – Markham, Ontario - Parsons - Markham, ON      Cache   Translate Page   Web Page Cache   
Experience in SalesForce, Deltek Vision and SharePoint software is a plus. CRM Database Administrator - Markham, Ontario....
From Parsons Corporation - Thu, 28 Jun 2018 15:18:43 GMT - View all Markham, ON jobs
          GIS Specialist - SNC-Lavalin - Saskatoon, SK      Cache   Translate Page   Web Page Cache   
Performing analysis on vector, raster, and tabular datasets. Creating and maintaining vector, raster, and tabular data and databases....
From SNC-Lavalin - Sun, 05 Aug 2018 09:23:16 GMT - View all Saskatoon, SK jobs
          PostgreSQL 10.5-1      Cache   Translate Page   Web Page Cache   
A powerful, open source object-relational database system. 2018-08-09
          Ratings Changes Today      Cache   Translate Page   Web Page Cache   
TheStreet Quant Ratings provides fair and objective information to help you make educated investing decisions. We rate over 4,100 stocks daily and provide 5-page PDF reports for each stock. These ratings can change daily and today's changes are reflected in the email below. If you are looking to check-up on the stocks you currently own or are looking for new ideas, you can find our full database of password-protected ratings reports in our proprietary ratings screener: http://www.thestreet.com/k/qr/flat/stock-screener.html Upgrades: AXL, BIG, DK, FOSL, NFG, NKTR, SRC, TGH, UTSI Downgrades: AIRG, AXAS, HPP, PAA, QDEL, RAD Initiations: FND, RETA, TOCA Read on to get TheStreet Quant Ratings' detailed report:
          Real Estate Office Receptionist - JP - Brampton, ON      Cache   Translate Page   Web Page Cache   
Strong computer and social media skills (Adobe Illustrator, Blogger, Constant Contact Email Marketing Database, Event Planning Software &amp; Photography, Facebook,...
From Indeed - Thu, 12 Jul 2018 15:58:35 GMT - View all Brampton, ON jobs
          Paraprofessional - Library Media Tech - Secondary - 8 hrs/day at JCSCS - Sheridan County School Disctrict 2 - Sheridan, WY      Cache   Translate Page   Web Page Cache   
Assist the library media specialist with database and spreadsheet programs dealing with budget, periodicals, etc....
From Sheridan County School Disctrict 2 - Wed, 18 Jul 2018 21:38:18 GMT - View all Sheridan, WY jobs
          Records & Data Management Clerk 1 - State of Wyoming - Sheridan, WY      Cache   Translate Page   Web Page Cache   
Maintains and monitors database and inputs new records into the database. Enters all project information in database to be used later to compile project... $13.94 - $17.43 an hour
From State of Wyoming - Wed, 08 Aug 2018 14:49:48 GMT - View all Sheridan, WY jobs
          Pheasant Distribution Driver - State of Wyoming - Sheridan, WY      Cache   Translate Page   Web Page Cache   
Computer skills and ability to learn new software packages, including knowledge of Google, Microsoft, and online database programs.... $13.39 an hour
From State of Wyoming - Mon, 30 Jul 2018 22:33:39 GMT - View all Sheridan, WY jobs
          Natural Resources Analyst - State of Wyoming - Sheridan, WY      Cache   Translate Page   Web Page Cache   
Skill in the use of personal computers for word processing, database and spreadsheet applications; Performs district-wide vegetation reviews in the Land Quality... $3,742 - $4,678 a month
From State of Wyoming - Wed, 09 May 2018 20:50:44 GMT - View all Sheridan, WY jobs
          Administrative Assistant - Community Outreach - Park County School District #1 - Powell, WY      Cache   Translate Page   Web Page Cache   
Proficient computer skills, with knowledge of and/or specific training in word processing, spreadsheet, database, etc.... $13.75 an hour
From Park County School District #1 - Tue, 24 Jul 2018 21:56:47 GMT - View all Powell, WY jobs
          Account Executive - HVAC Service Sales - LONG Building Technologies - Cody, WY      Cache   Translate Page   Web Page Cache   
Maintaining and mining CRM database of good fit locations. Throughout our 50 year history, we have worked hard to make LONG an enjoyable and rewarding place to...
From LONG Building Technologies - Tue, 19 Jun 2018 06:24:48 GMT - View all Cody, WY jobs
          Gifts Officer - Buffalo Bill Center of the West - Cody, WY      Cache   Translate Page   Web Page Cache   
Ensure projections are recorded and regularly updated in the development database. Ensure individual prospect plans, strategies and information are regularly... $45,000 - $55,000 a year
From Indeed - Fri, 13 Jul 2018 19:32:16 GMT - View all Cody, WY jobs
          Escrow & Title Officer - First American - Buffalo, WY      Cache   Translate Page   Web Page Cache   
Maintain accurate records in the escrow accounting system, customer database and FAST for processing of escrow and procurement of title. Join our team!...
From First American Corporation - Wed, 18 Jul 2018 18:43:42 GMT - View all Buffalo, WY jobs
          Office Assistant - State of Wyoming - Gillette, WY      Cache   Translate Page   Web Page Cache   
Processes and reviews routine paperwork and/or enters data into a department log or database. Provide the highest standard of customer service while performing... $11.42 - $14.27 an hour
From State of Wyoming - Mon, 30 Jul 2018 22:40:15 GMT - View all Gillette, WY jobs
          America's Promise Grant Enrollment Services Counselor - Northern Wyoming Community College District - Gillette, WY      Cache   Translate Page   Web Page Cache   
Understanding of integrated database systems. The America’s Promise (AP) Grant Enrollment Services Counselor is a two year, grant funded position that is... $35,420 - $53,130 a year
From Northern Wyoming Community College District - Fri, 20 Jul 2018 00:18:13 GMT - View all Gillette, WY jobs
          Enrollment Specialist - Northern Wyoming Community College District - Gillette, WY      Cache   Translate Page   Web Page Cache   
Understanding of integrated database systems. The Enrollment Specialist has an upbeat, positive and outgoing personality as s/he serves as the face of a growing... $12.99 - $19.49 an hour
From Northern Wyoming Community College District - Mon, 09 Jul 2018 18:18:11 GMT - View all Gillette, WY jobs
          Commercial Maintenance Technician - Emcor - Gillette, WY      Cache   Translate Page   Web Page Cache   
Ability to use and operate handheld device and business systems or document management Database software, including but not limited to Microsoft office, Lotus...
From Emcor - Fri, 22 Jun 2018 01:52:14 GMT - View all Gillette, WY jobs
          Social Services Worker - State of Wyoming - Gillette, WY      Cache   Translate Page   Web Page Cache   
Computer skills, including word processing and the WYCAPS database. Under close supervision, provides investigative, protective and social service intervention... $19.93 - $24.91 an hour
From State of Wyoming - Tue, 19 Jun 2018 02:51:53 GMT - View all Gillette, WY jobs
          Patient Financial Services Representative - Banner Health - Worland, WY      Cache   Translate Page   Web Page Cache   
Strong knowledge in the use of common office software, word processing, spreadsheet, and database software are required....
From Banner Health - Thu, 21 Jun 2018 07:16:08 GMT - View all Worland, WY jobs
          Casper Restaurant Kitchen Manager - Winter 2018-2019 - Jackson Hole Mountain Resort Corporation - Teton Village, WY      Cache   Translate Page   Web Page Cache   
Manages all kitchen and food sales operations, all relevant training, and department database. F&amp;B Kitchen Manager....
From Jackson Hole Mountain Resort Corporation - Tue, 07 Aug 2018 21:06:30 GMT - View all Teton Village, WY jobs
          Customer Service and Sales Representative - Avis Budget Group, Inc. - Jackson, WY      Cache   Translate Page   Web Page Cache   
Basic computer skills to enter information into our database. CUSTOMER SERVICE &amp; SALES REPRESENTATIVE – CONNECT WITH OUR CUSTOMERS IN MOMENTS THAT MATTER....
From Avis Budget Group, Inc. - Sun, 15 Jul 2018 11:23:09 GMT - View all Jackson, WY jobs
          Rental Sales Associate - Avis Budget Group, Inc. - Jackson, WY      Cache   Translate Page   Web Page Cache   
Basic computer skills to enter information into our database. RENTAL SALES ASSOCIATE – CONNECT OUR CUSTOMERS TO MOMENTS THAT MATTER....
From Avis Budget Group, Inc. - Wed, 25 Apr 2018 09:48:28 GMT - View all Jackson, WY jobs
          Fuel/Lube/PM Technician - Evans - CRH-Oldcastle - Jackson, WY      Cache   Translate Page   Web Page Cache   
To perform this job successfully, an individual should be able to type and use keyboards accurately and have knowledge of Database software....
From Oldcastle - Wed, 25 Jul 2018 21:09:33 GMT - View all Jackson, WY jobs
          Caseworker - State of Wyoming - Riverton, WY      Cache   Translate Page   Web Page Cache   
Computer skills, including word processing and the WYCAPS database. Under close supervision, provides investigative, protective and social service intervention... $19.93 - $24.91 an hour
From State of Wyoming - Mon, 30 Jul 2018 21:51:52 GMT - View all Riverton, WY jobs
          IT Technician II - City of Casper, WY - Casper, WY      Cache   Translate Page   Web Page Cache   
Implementing database and network connections; Incumbents are responsible for providing advanced technical support to maintain, install, troubleshoot and... $52,208 - $63,544 a year
From City of Casper, WY - Tue, 07 Aug 2018 09:21:57 GMT - View all Casper, WY jobs
          Emergency Maintenance Coordinator - Schneider - Green Bay, WI      Cache   Translate Page   Web Page Cache   
The Emergency Maintenance Coordinator will also update the vendor databases utilized by the Emergency Maintenance Department, Operations, TSC and the PMC....
From Schneider - Tue, 24 Apr 2018 23:37:22 GMT - View all Green Bay, WI jobs
          Iperius Backup Full 5.7.2      Cache   Translate Page   Web Page Cache   
Iperius Backup Full 5.7.2

Iperius Backup - программа резервного копирования, восстановления и синхронизации данных, совместимая со всеми платформами Windows. Позволяет проводить автоматическое резервное копирование на многие носители информации: внешние диски USB, носители RDX, NAS, ленточные накопители LTO/DAT, удаленные компьютеры и сайты по FTP, Облачное хранилище. Iperius Backup включает в себя создание образа диска, резервное копирование баз данных Microsoft SQL Server, MySQL, PostgreSQL, Oracle Database и Аварийное Восстановление.
          SoftoRooM -> NetLimiter Enterprise 4.0.37      Cache   Translate Page   Web Page Cache   
PRYANIK:
Твой софтовый форум: SoftoRooM
NetLimiter Enterprise 4.0.37 + crack (cracked)


Цитата( NetLimiter 4 0 37):
New features
    German, Russian and Brazilian Portuguese translations
    IP address to location database
    In Quotas, you can create rules for both directions
Bug fixes
    minor bug fixes


таблетка от RINDVIEH
Скрытый текст!
Подробности на форуме...

NetLimiter Enterprise 4.0.37
источник: www.softoroom.net

          SoftoRooM -> Universal Extractor 2.0 RC1 /1.7.9.95e / 1.6.1.2026 ML      Cache   Translate Page   Web Page Cache   
HugoBo-SS:
Твой софтовый форум: SoftoRooM
Universal Extractor 2.0.0 RC 1


githubСкрытый текст!
Подробности на форуме...


2.0.0 RC 1 Bioruebe released this Aug 3, 2018
» Нажмите, для открытия спойлера | Press to open the spoiler «


Added support for wix installers
Added support for Spoon installers
Added support for .rpgmvp files
Added support for .utage files
Added support for MDF image files
Added support for Smacker video files
Added support for ECM compressed disk images
Added support for swf executables
Added support for OGG Vorbis audio files
Added support for Mole Box executables
Added support for NScripter version 2 archives using ns2dec
Added support for Smile Game Builder archives
Added support for UNC paths
Added support for Lzip archives
Added support for Visionaire game archives
Added 'Open Log Directory' menu item
Added 'Open Configuration File' menu item
Added detection support for encrypted fsb files
Added check on start to make sure a language file exists
Added Right to left UI mirroring for Arabic, Farsi and Hebrew; thanks to peterooch
Added new error messages: not enough free disk space, missing part for multipart archives
Fixed MS SFX hotfix extraction
Fixed 'Open folder after extraction' being always disabled when UniExtract is opened with command line parameters
Fixed cleanup for .chm and EnigmaVB files
Fixed error message after failed iso extraction: choices were mixed-up
Fixed missing file type information in NOTPACKED error message for FFMPEG extraction
Fixed missing packer name in unpack prompt
Fixed extractors not being found on some systems
Fixed pea extraction writing to wrong directory
Fixed cascading context menu for supported Windows Server operating system versions
Fixed 'Always on top' option not being saved
Fixed endless detection loop occuring for some .exe files
Fixed missing minimize controls
Fixed status box for .swf extraction
Fixed extraction being detected as failed if the output directory is a drive, not a folder
Fixed FFMPEG download/installation problems
Fixed progress display performance in status box and pattern detection
Fixed certain files being ignored by cleanup function
Fixed crash when trying to open preferences GUI if /lang directory does not exist
Fixed log files size display in file menu, if log directory is set to a location, which does not exist
Fixed DGCA plugin installation
Fixed language selection list not being scrollable
Fixed some context menu GUI items not being translated after language change
Fixed 'Not an InstallShield installer' option in MethodSelector not starting additional scans
Fixed output directory not being deleted after failed extraction (unicode mode only)
Fixed video extraction failing for files starting with -
Fixed error message when starting batch mode
Changed feedback GUI design, removed unneeded input fields
Changed feedback GUI to always pre-fill output field
Changed .nrg extraction method to use 7zip for improved unicode support
Changed .arj extraction to use 7z instead of arj
Changed .hlp extraction: improved logging, localized file name
Changed extraction to subdirectory: "."-character is now replaced to prevent collisions with existing files
Changed updater: each file is now updated on its own instead of using update packages, this way extractors can be updated much easier and faster; administrator rights are now only necessary if the program directory cannot be written to
Changed plugin download: URLs are no longer hardcoded; instead they are requested from the server, so when something goes offline UniExtract does not have to be updated to fix the link
Replaced Unreal Engine package extractor with Umodel
Removed redundant 64-bit MediaInfo dll
Removed option to toggle support for game packages from settings GUI
Updated 7zip to 18.01
Updated EnigmaVB unpacker to 0.44, changed logic to use new command line parameter
Updated Exeinfo PE to 0.0.5.0
Updated unrar to 5.50
Updated unrpa to 1.5.2
Updated TrID to 2.24
Updated unshield to 1.4
Updated FFMPEG to 4.0.2
Updated innounp to 0.47
Updated Bulgarian translation, thanks to Jekov J.K.
Updated French translation, thanks to zorbao
Updated Chinese (Traditional) translation, thanks to jfcherng
Updated Portuguese (Brazilian) translation, thanks to igorruckert
Updated Greek translation, thanks to gvp9000
Updated Russian translation, thanks to @wvxwxvw

Pre-release v2.0.0-beta.4
Bioruebe released this Oct 25, 2016 · 82 commits to master since this release
Assets

Beta 4 is planned to be the last beta version before the final release. It adds support for
several new installer types, a new context menu entry 'Extract to last used directory',
improved user interface, a statistics display and multiple bugfixes.

Added support for InstallAware installers
Added support for .gif and apng files (FFMPEG)
Added support for Enigma Virtual Box executables using EnigmaVB unpacker (plugin)
Added support for Ghost Installer Studio installers
Added support for Smart Install Maker installers (plugin)
Added lessmsi for improved support for .msi files
Added statistics GUI
Added status box when moving/copying unicode files to temp directory
Added timeout to some scan functions to prevent delays caused by unresponsive helper binaries
Added extraction to last used directory command line option and context menu
Changed forcing a single instance and auto-adding is now disabled if the extraction
is already finished and only the result message box is opened
Changed unicode path logic: file is now copied instead of moved if it is on a different
drive than the temp directory
Changed status box design
Fixed multiple error messages being displayed on failed update check
Fixed update message display problem
Fixed possible problems when entering relative paths in main GUI input fields
Fixed extraction not working when file directory contains unicode characters and
there is not enough free space on the drive containing the temp folder
Fixed free space check not taking unicode file moving into account
Fixed .sit extraction
Fixed crash when trying to extract wise installers
Fixed swf extraction ignoring some images and sounds
Updated language files for Portuguese, Russian, Swedish, Italian
Removed DMGExtractor and replaced it with 7z
Updated 7zip to 16.04
Updated ExeInfoPE to 0.0.4.3
Updated fsbext to 0.3.5
Updated innounp to 0.46
Updated QuickBMS to 0.7.5
Updated ttarchext to 0.2.10

Pre-release v2.0.0-beta.3

Bioruebe released this Jun 25, 2016 · 104 commits to master since this release
Assets


Beta 3 brings a brand new updater, fixes several errors related to missing permissions
and adds 8 formats to the list of extractable files.

Added support for .mp3, .wmv and .wma files
Added support for bcm compressed files using bcm
Added support for zpaq archives using zpaq
Added support for Android boot images using bootimg (plugin)
Added support for Excelsior Installer executables
Added support for ISO zipped image files using unisz
Added status box to sfx script extraction
Added output directory permission check
Added update summary to update prompt
Added back is5comp (plugin)
Changed .exe detection logic for speed improvements
Changed file type detection: TrIDLib is now used for extraction, TrID for scan only mode, the library
version is much faster but returns less additional information
Changed settings directory: if UniExtract detects insufficient write permissions to its directory,
all settings are stored in %APPDATA%; this way multiple users on the same local system can
also have different preferences
Changed .exe extraction: UniExtract will now terminate with a NOTPACKED error instead of using
generic 7z extraction, which produces useless files
Changed success evaluation: if files were overwritten the extraction was often evaluated as failed
Changed success evaluation: improved failure detection
Changed keepopen option: moved from edit menu to main GUI for better usability
Fixed crash when clicking finish button in plugin GUI if no item has been selected before
Fixed helper binaries execution failing if %comspec% environment variable is unset
Fixed .pea detection
Fixed .chm extraction
Fixed .mht detection
Fixed FreeArc extraction
Fixed AdvancedInstaller extraction
Fixed registry keys are now being deleted after scanning if they did not exist before for ExeInfo, PEid
Fixed settings not being saved if UniExtract lays in program files directory due to lacking permission
Fixed updating/FFMPEG download if user has no write permissions to UniExtract's directory
Fixed free space check failing if output directory does not exist
Fixed not enough free space dialog's 'Abort' button not working
Fixed download progress indicator not being on top of first start GUI
Fixed first start GUI now shows 'Installed' if FFMPEG already exists
Fixed error message display bug for unicode files
Fixed some wrong detections
Fixed unicode multipart rar/7z archive extraction
Fixed unpack prompt in some cases being displayed again after the user clicked 'no'
Fixed 7zip check often returning true, even if the file cannot be extracted, leading to 'failed' extraction result
Fixed crash in update message when UniExtract is run from command line and 'No' is clicked
Fixed syntax help dialog closing automatically
Fixed possible false positives when using checkNSIS function
Fixed password detection for some .rar files
Fixed some untranslated terms in MethodSelect GUI
Removed globalprefs option and preference storage in registry
Removed faad and flac, extraction is now handled by FFMPEG
Removed unnecessary input file moves
Removed 7zip 15.14, reverted to 15.05 as NSIS support was dropped from newer versions
Updated ExeInfoPE to 0.0.4.1
Updated peazip to 0.53/1.0
Updated ttarchext to 0.2.9
Updated Japanese translation, thanks to A. Inaba
Updated Chinese (Simplified) translation, thanks to SeaHOH

Pre-release v2.0.0-beta.2

Bioruebe released this Feb 8, 2016 · 118 commits to master since this release
Assets
25.1 MB UniExtractBeta2.zip
Source code (zip)
Source code (tar.gz)

Added game mode: status box is not being displayed if a foreground fullscreen application is running
Added /update command line parameter
Added wrong password error message (exit code 10) for rar, 7z extractors
Added support for CreateInstall installers (plugin)
Added support for DGCA compressed files (plugin)
Added support for pcm audio tracks in video files and .mxf files
Added support for Advanced Installer installers
Added support for SQLite databases, creates .sql command file
Added fallback extension check for .assets files
Added import function to plugin GUI to simplify plugin setup
Fixed keepopen option not working after batch mode finished
Fixed SQLite dlls not being found
Fixed help command line parameter
Fixed storeguiposition and checkgame options not being saved
Fixed extraction failing for Gentee Installer, Installer VISE and Setup Factory
Fixed preferences and context menu GUI label width for some translations
Fixed updating 7zip binaries
Changed error message if no tracks to be extracted in video file
Changed WarnExecute messages to include full paths instead of untranslated ''
Updated innounp to 0.45
Updated unrar to 5.31 Beta 1
Updated 7zip to 15.14
Updated extraction script for Visionaire files
Updated finnish translation, thanks to Jyrki Vesterinen
Updated portuguese (Portugal) translation, thanks to Luis Neves
Updated russian translation, thanks to an anonymous contributor
Updated Portuguese (Brazilian) translation, thanks to Igor Rückert


Pre-release 2.0.0 Beta 1

Bioruebe released this Jan 1, 2016 · 131 commits to master since this release
Assets

Added support for Ren'Py game engine's .rpa archives using unrpa
Added support for Unreal Engine packages (.u, .uax, .upk) using Unreal Package Extractor (plugin)
Added support for Telltale game archives (.ttarch)
Added support for Livemaker games via crass/crage (plugin)
Added support for .aac audio files (decompress to wav) using faad (plugin)
Added support for .flac audio files using flac
Added support for FreeArc compressed archives (.arc) using FreeArc unpacker
Added support for .mpq archives using MPQ Plugin for Total Commander (plugin)
Added support for .sfArk files using sfarkxtc
Added filescan with MediaInfo dll to provide additional information on media files (scan only mode)
Added delay to update script to prevent 'not found' error, changed execution parameter
Added 'Open program directory' help menu entry
Added file metadata (filesize, creation date,...) to log file when 'Ask for feedback' is enabled
Added timeout exit message
Added additional weblinks to help menu
Added option to disable video track extraction
Added support for Windows 10
Added explaining tooltips to some options
Added option to always keep GUI in foreground
Added tooltips to batch queue view
Added support for password list for .rar, .zip and .7z archives
Added input file not found error message
Fixed after update behaviour when other versions of UniExtract are installed
Fixed last update date not beeing saved when an update was found
Fixed AutoIt error message in first start GUI when no language file was found, now exits with error code 99
Fixed possible infinite loop in run function when helper binary execution terminates too fast, resulting in UniExtract not
shutting down after successful extraction
Fixed BMS scripts were not checked if GAUP detected files, but was unable to extract them
Fixed game archive detection if file extension is not lower case
Fixed detection of Matroska files, extraction of ogg and webm tracks in video files
Fixed context menu GUI: alluser checkboxes not clickable despite having admin rights
Fixed video extraction: multiple audio/video tracks had same names when extracted, so FFMPEG always asked to overwrite,
now type(audio/video) and number of track for each type is added as well as the track's language
Fixed folder size calculation in status box did not work correctly for FFMPEG and probably others
Fixed moving unicode tempfiles to output directory created subdirectory with temporary name
Fixed feedback success evaluation
Fixed some terms not using translation files
Fixed NSIS extraction overwriting existing files; UniExtract still creates not useful output files for some custom NSIS installers
but all content is now kept in output directory
Fixed occasionally high CPU load when reading console output
Fixed tray exit handler not terminating all helper binaries
Fixed FFMPEG updater
Fixed swf: extraction of .jpg files; performance slightly increased
Fixed GameSelect GUI: not a game message is now always the first element and preselected
Fixed unicode files are changed to ???????? and therefore fail to extract when adding them to batch queue
Fixed unicode files' extraction to subdir folder name
Fixed rar extraction returning success if there was a write error or access denied message
Fixed slowdown when extracting to drive root directory caused by size calculation
Fixed /prefs command line parameter not working
Fixed help screen closing after 15 seconds when opened from command line
Fixed some untranslated terms
Fixed rounding issues in free space check when using batch mode
Fixed error when trying to open SQLite database
Fixed scan only command being queued if batch mode is active
Fixed log file naming special cases
Changed percentage indicator detection to include float percentage values
Changed percentage indicator detection to include pattern x/y
Changed user input needed message should be more visible now
Changed check for update behaviour: check is only performed on start if GUI is opened; if run from command line or context menu,
it will be done right before terminating, so extraction/scan will not abort after installing update
Changed internal behaviour for extraction and game select functions
Changed language files, added new %name term to reduce %s usage
Changed FFMPEG is now downloaded to the correct subdirectory (x86/x64), so the appropriate version is used in portable mode on
different operating systems
Changed feedback GUI now displays privacy agreement before sending
Changed after update behaviour, most recent changelog is now opened
Changed translation files, removed %s variables and introduced numbered placeholders, that can be switched to
fit a language's word order; added %name shortcut
Changed unicode files are now renamed instead of moving them to a temporary directory if possible
Changed inno setup extraction to rename ',1' files to avoid extracted programs not finding some files
Changed GUI design on Windows 10 systems to fit standard window style
Changed multiple part rar files are now added only once to batch queue, so it is possible to drag and drop
all rar files onto UniExtract without having to deal with 'file exists' prompts
Disabled directory size calculation when extracting to drive to prevent significant slow down
Removed 64 bit iso.wcx plugin as it does not work correctly with QuickBMS
Replaced booz with unzoo (adds support for 64 bit systems, longer filenames, logging)
Replaced tee with mtee (adds support for unicode and longer filenames, smaller)
Replaced tee with wintee (Windows 10 only, due to mtee not terminating fast enough)
Updated AutoIt to 3.3.14.1
Updated unrar to 5.21
Updated fsbextract to 0.3.4a
Updated exeinfo PE to 0.0.3.8
Updated disunity to 0.3.4
Updated quickbms to 0.6.5
Updated innounp to 0.43
Updated language files, added new terms to all language files, set encoding to UTF-16, updated translation info text,
changed %s to %name and %1, %2,...
»» Нажмите, для закрытия спойлера | Press to close the spoiler ««


35,2 mbСкрытый текст!
Подробности на форуме...

Source code 601 kbСкрытый текст!
Подробности на форуме...

Universal Extractor 2.0 RC1 /1.7.9.95e / 1.6.1.2026 ML
источник: www.softoroom.net

          Paraprofessional - Library Media Tech - Secondary - 8 hrs/day at JCSCS - Sheridan County School Disctrict 2 - Sheridan, WY      Cache   Translate Page   Web Page Cache   
Create and maintain current patron, book, and non-book computerized databases. Paraprofessional - Library Media/Technology - Secondary - 8 hrs/day at John C....
From Sheridan County School Disctrict 2 - Wed, 18 Jul 2018 21:38:18 GMT - View all Sheridan, WY jobs
          Re: Email notification on closed but not on complete      Cache   Translate Page   Web Page Cache   

Hi Cris,

 

I'm finding that when I change Completed to be an Open system type, it no longer makes an entry in the COMPLETED column in the TASKS database table. Is there any way around this? We use the datestamps there for metrics.

 

Thanks,

 

Trevar


          Teledermatology scale-up frameworks: a structured review and critique.      Cache   Translate Page   Web Page Cache   
Related Articles

Teledermatology scale-up frameworks: a structured review and critique.

BMC Health Serv Res. 2018 Aug 07;18(1):613

Authors: Walters LEM, Scott RE, Mars M

Abstract
BACKGROUND: The South African public health sector embarked on a National Telemedicine System implementation program in 1999 and although unsuccessful, the Province of KwaZulu-Natal subsequently implemented teledermatology in 2003, with two currently active services (synchronous and asynchronous). Although sustained these have not been scaled-up to meet the needs of all hospitals in the Province. A recent teledermatology scale-up design requirements elicitation process within KwaZulu-Natal confirmed the need for a framework, and identified requirements through key stakeholders, programme observations, the literature, and experts. This study aimed to identify and characterise existing teledermatology or related eHealth scale-up frameworks, determine whether any met the previously elicited scale-up framework requirements, and were suitable for use in the KwaZulu-Natal public health sector.
METHODS: A structured literature search was performed of electronic databases (Scopus, Science Direct, IEEE, PubMed, and Google Scholar) seeking proposed or developed teledermatology or related scale-up frameworks. Global public health publications were also hand-searched. The teledermatology or telemedicine, telehealth or eHealth related scale-up frameworks identified were critiqued against the previously elicited teledermatology scale-up framework requirements to determine their suitability for use.
RESULTS: No specific teledermatology scale-up framework was found. Seven related scale-up frameworks were identified, although none met all the previously identified teledermatology scale-up framework requirements. The identified frameworks were designed for specific scale-up phases and lacked a more holistic and comprehensive approach.
CONCLUSIONS: There is an evidenced-based need for the development of a health sector aligned, holistic framework that meets the identified teledermatology scale-up framework requirements. The findings of this paper will inform development of such a framework.

PMID: 30086738 [PubMed - in process]


          Manager, Strategic Events - University Health Network - Toronto, ON      Cache   Translate Page   Web Page Cache   
Demonstrated success in event management and fundraising. Proficient in Microsoft Office suites, knowledge of fundraising databases including Raisers Edge is an...
From University Health Network - Thu, 02 Aug 2018 17:28:19 GMT - View all Toronto, ON jobs
          Beauty and Social Media: Meitu Announces Strategic Pathways for the Next Decade      Cache   Translate Page   Web Page Cache   
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" style="background:#f6f6f6!important">  <head>    <meta http-equiv="Content-Type" content="text/html; charset=utf-8">    <meta name="viewport" content="width=device-width">    <title>PRNJ Push Email - Headlines</title>    <style>@font-face{font-family:Montserrat;font-style:normal;font-weight:400;src:local('Montserrat Regular'),local('Montserrat-Regular'),url(https://fonts.gstatic.com/s/montserrat/v10/SKK6Nusyv8QPNMtI4j9J2wsYbbCjybiHxArTLjt7FRU.woff2) format('woff2');unicode-range:U+0102-0103,U+1EA0-1EF9,U+20AB}@font-face{font-family:Montserrat;font-style:normal;font-weight:400;src:local('Montserrat Regular'),local('Montserrat-Regular'),url(https://fonts.gstatic.com/s/montserrat/v10/gFXtEMCp1m_YzxsBpKl68gsYbbCjybiHxArTLjt7FRU.woff2) format('woff2');unicode-range:U+0100-024F,U+1E00-1EFF,U+20A0-20AB,U+20AD-20CF,U+2C60-2C7F,U+A720-A7FF}@font-face{font-family:Montserrat;font-style:normal;font-weight:400;src:local('Montserrat Regular'),local('Montserrat-Regular'),url(https://fonts.gstatic.com/s/montserrat/v10/zhcz-_WihjSQC0oHJ9TCYAzyDMXhdD8sAj6OAJTFsBI.woff2) format('woff2');unicode-range:U+0000-00FF,U+0131,U+0152-0153,U+02C6,U+02DA,U+02DC,U+2000-206F,U+2074,U+20AC,U+2212,U+2215}@font-face{font-family:Montserrat;font-style:normal;font-weight:500;src:local('Montserrat Medium'),local('Montserrat-Medium'),url(https://fonts.gstatic.com/s/montserrat/v10/BYPM-GE291ZjIXBWrtCweiyNCiQPWMSUbZmR9GEZ2io.woff2) format('woff2');unicode-range:U+0102-0103,U+1EA0-1EF9,U+20AB}@font-face{font-family:Montserrat;font-style:normal;font-weight:500;src:local('Montserrat Medium'),local('Montserrat-Medium'),url(https://fonts.gstatic.com/s/montserrat/v10/BYPM-GE291ZjIXBWrtCwevfgCb1svrO3-Ym-Rpjvnho.woff2) format('woff2');unicode-range:U+0100-024F,U+1E00-1EFF,U+20A0-20AB,U+20AD-20CF,U+2C60-2C7F,U+A720-A7FF}@font-face{font-family:Montserrat;font-style:normal;font-weight:500;src:local('Montserrat Medium'),local('Montserrat-Medium'),url(https://fonts.gstatic.com/s/montserrat/v10/BYPM-GE291ZjIXBWrtCweteM9fzAXBk846EtUMhet0E.woff2) format('woff2');unicode-range:U+0000-00FF,U+0131,U+0152-0153,U+02C6,U+02DA,U+02DC,U+2000-206F,U+2074,U+20AC,U+2212,U+2215}@font-face{font-family:Montserrat;font-style:normal;font-weight:600;src:local('Montserrat SemiBold'),local('Montserrat-SemiBold'),url(https://fonts.gstatic.com/s/montserrat/v10/q2OIMsAtXEkOulLQVdSl053YFo3oYz9Qj7-_6Ux-KkY.woff2) format('woff2');unicode-range:U+0102-0103,U+1EA0-1EF9,U+20AB}@font-face{font-family:Montserrat;font-style:normal;font-weight:600;src:local('Montserrat SemiBold'),local('Montserrat-SemiBold'),url(https://fonts.gstatic.com/s/montserrat/v10/q2OIMsAtXEkOulLQVdSl02tASdhiysHpWmctaYEsrdw.woff2) format('woff2');unicode-range:U+0100-024F,U+1E00-1EFF,U+20A0-20AB,U+20AD-20CF,U+2C60-2C7F,U+A720-A7FF}@font-face{font-family:Montserrat;font-style:normal;font-weight:600;src:local('Montserrat SemiBold'),local('Montserrat-SemiBold'),url(https://fonts.gstatic.com/s/montserrat/v10/q2OIMsAtXEkOulLQVdSl03XcDWh-RbO457623Zi1kyw.woff2) format('woff2');unicode-range:U+0000-00FF,U+0131,U+0152-0153,U+02C6,U+02DA,U+02DC,U+2000-206F,U+2074,U+20AC,U+2212,U+2215}@font-face{font-family:Montserrat;font-style:italic;font-weight:400;src:local('Montserrat Italic'),local('Montserrat-Italic'),url(https://fonts.gstatic.com/s/montserrat/v10/-iqwlckIhsmvkx0N6rwPmvgrLsWo7Jk1KvZser0olKY.woff2) format('woff2');unicode-range:U+0102-0103,U+1EA0-1EF9,U+20AB}@font-face{font-family:Montserrat;font-style:italic;font-weight:400;src:local('Montserrat Italic'),local('Montserrat-Italic'),url(https://fonts.gstatic.com/s/montserrat/v10/-iqwlckIhsmvkx0N6rwPmojoYw3YTyktCCer_ilOlhE.woff2) format('woff2');unicode-range:U+0100-024F,U+1E00-1EFF,U+20A0-20AB,U+20AD-20CF,U+2C60-2C7F,U+A720-A7FF}@font-face{font-family:Montserrat;font-style:italic;font-weight:400;src:local('Montserrat Italic'),local('Montserrat-Italic'),url(https://fonts.gstatic.com/s/montserrat/v10/-iqwlckIhsmvkx0N6rwPmhampu5_7CjHW5spxoeN3Vs.woff2) format('woff2');unicode-range:U+0000-00FF,U+0131,U+0152-0153,U+02C6,U+02DA,U+02DC,U+2000-206F,U+2074,U+20AC,U+2212,U+2215}@font-face{font-family:Montserrat;font-style:italic;font-weight:500;src:local('Montserrat Medium Italic'),local('Montserrat-MediumItalic'),url(https://fonts.gstatic.com/s/montserrat/v10/zhwB3-BAdyKDf0geWr9FtxZpeM_Zh6uJFYM6sEJ7jls.woff2) format('woff2');unicode-range:U+0102-0103,U+1EA0-1EF9,U+20AB}@font-face{font-family:Montserrat;font-style:italic;font-weight:500;src:local('Montserrat Medium Italic'),local('Montserrat-MediumItalic'),url(https://fonts.gstatic.com/s/montserrat/v10/zhwB3-BAdyKDf0geWr9Ft_zIndX4RYN5BhIaIFu8k_A.woff2) format('woff2');unicode-range:U+0100-024F,U+1E00-1EFF,U+20A0-20AB,U+20AD-20CF,U+2C60-2C7F,U+A720-A7FF}@font-face{font-family:Montserrat;font-style:italic;font-weight:500;src:local('Montserrat Medium Italic'),local('Montserrat-MediumItalic'),url(https://fonts.gstatic.com/s/montserrat/v10/zhwB3-BAdyKDf0geWr9Ft9CODO6R-QMzjsZRstdx6VU.woff2) format('woff2');unicode-range:U+0000-00FF,U+0131,U+0152-0153,U+02C6,U+02DA,U+02DC,U+2000-206F,U+2074,U+20AC,U+2212,U+2215}@font-face{font-family:Montserrat;font-style:italic;font-weight:600;src:local('Montserrat SemiBold Italic'),local('Montserrat-SemiBoldItalic'),url(https://fonts.gstatic.com/s/montserrat/v10/zhwB3-BAdyKDf0geWr9Ft8gif8LsIGoxiaDHvDrXzKs.woff2) format('woff2');unicode-range:U+0102-0103,U+1EA0-1EF9,U+20AB}@font-face{font-family:Montserrat;font-style:italic;font-weight:600;src:local('Montserrat SemiBold Italic'),local('Montserrat-SemiBoldItalic'),url(https://fonts.gstatic.com/s/montserrat/v10/zhwB3-BAdyKDf0geWr9Ft34iWgrNFAiT-cwBwpMBdno.woff2) format('woff2');unicode-range:U+0100-024F,U+1E00-1EFF,U+20A0-20AB,U+20AD-20CF,U+2C60-2C7F,U+A720-A7FF}@font-face{font-family:Montserrat;font-style:italic;font-weight:600;src:local('Montserrat SemiBold Italic'),local('Montserrat-SemiBoldItalic'),url(https://fonts.gstatic.com/s/montserrat/v10/zhwB3-BAdyKDf0geWr9Ft93uLUHnU24AL_1IdxwhTqs.woff2) format('woff2');unicode-range:U+0000-00FF,U+0131,U+0152-0153,U+02C6,U+02DA,U+02DC,U+2000-206F,U+2074,U+20AC,U+2212,U+2215}@media only screen{html{min-height:100%;background:#f3f3f3}}@media only screen and (max-width:630px){table.body img{width:auto;height:auto}table.body center{min-width:0!important}table.body .container{width:95%!important}table.body .columns{height:auto!important;-moz-box-sizing:border-box;-webkit-box-sizing:border-box;box-sizing:border-box;padding-left:30px!important;padding-right:30px!important}table.body .columns .columns{padding-left:0!important;padding-right:0!important}th.small-12{display:inline-block!important;width:100%!important}.columns th.small-12{display:block!important;width:100%!important}table.menu{width:100%!important}table.menu td,table.menu th{width:auto!important;display:inline-block!important}table.menu[align=center]{width:auto!important}}</style>  </head>  <body style="-moz-box-sizing:border-box;-ms-text-size-adjust:100%;-webkit-box-sizing:border-box;-webkit-text-size-adjust:100%;Margin:0;background:#f6f6f6!important;box-sizing:border-box;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;min-width:100%;padding:0;text-align:left;width:100%!important">          <span class="preheader" style="color:#f3f3f3;display:none!important;font-size:1px;line-height:1px;max-height:0;max-width:0;mso-hide:all!important;opacity:0;overflow:hidden;visibility:hidden"></span>  <table class="body" style="Margin:0;background:#f6f6f6!important;border-collapse:collapse;border-spacing:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;height:100%;line-height:1.3;margin:0;padding:0;text-align:left;vertical-align:top;width:100%">  <tr style="padding:0;text-align:left;vertical-align:top">    <td class="center" align="center" valign="top" style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;border-collapse:collapse!important;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;hyphens:auto;line-height:1.3;margin:0;padding:0;text-align:left;vertical-align:top;word-wrap:break-word"> <center data-parsed="" style="min-width:600px;width:100%"><!--[if mso]><style type="text/css">body, table, table.body, h1, h2, h3, h4, h5, h6, p, td, th, a { font-family: 'Montserrat', Arial, sans-serif!important;}</style><![endif]--><table align="center" class="container float-center" style="Margin:0 auto;background:#fefefe;border-collapse:collapse;border-spacing:0;float:none;margin:0 auto;padding:0;text-align:center;vertical-align:top;width:600px"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><td style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;border-collapse:collapse!important;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;hyphens:auto;line-height:1.3;margin:0;padding:0;text-align:left;vertical-align:top;word-wrap:break-word"> <table class="row no-background" style="background:#f6f6f6;border-collapse:collapse;border-spacing:0;display:table;padding:0;position:relative;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><th class="small-12 large-12 columns first last" style="Margin:0 auto;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0 auto;padding:0;padding-bottom:16px;padding-left:30px;padding-right:30px;text-align:left;width:570px"><table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tr style="padding:0;text-align:left;vertical-align:top"><th style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left"><table class="spacer" style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><td height="24px" style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;border-collapse:collapse!important;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:24px;font-weight:400;hyphens:auto;line-height:24px;margin:0;mso-line-height-rule:exactly;padding:0;text-align:left;vertical-align:top;word-wrap:break-word">&#xA0;</td></tr></tbody></table> <p class="text-center view-in-browser" style="Margin:0;Margin-bottom:10px;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;margin-bottom:0;padding:0;text-align:center"><small style="color:#cacaca;font-size:80%"><a href='http://email.prnewswire.com/wf/click?upn=z3qiKnBCpunqdJkRppsiEbSmnibeutBGHu9PCpp0b6U4Q4ZotzjXnIzJXOhYxAYUXB2XyBy0PUS-2FlNm-2FF0ougwnx1bGovu440U1yP0w6asEuqA2WubpbHYEuA-2FpYnCTLW4PxcVes3-2B0LYe7f21LrI2sYtQrnOy7aj44RQuyP-2FyxY-2FYTLaqjUVnbqvQntHWfWjyvp-2BcY1jDFou2z80N56yw-3D-3D_q1N77mbql2CxsoEfo2fFiZ6dnlev64IGUSa1KT1DDw1MuprZmQ6aap9NY9k0Le75SikOsmKsVhERarGZNmT7GvqxxpgrrrYpNU62Rmld3eim4CdvU1UAoefoAxN9G2mHZIKzyxuqQo1DJRGTDyEehPPkT0SH3Y5jhIITZPT8j-2FXhFrXXv3rVJB1VOOlptnTYxDuCtu-2F6b-2Bs-2BUfEQ0GcxsfdhKSD1x51DbpsgSEMSSwH-2F3CmbSipP2YSmBPzh-2FNzNfiARB-2B3wsk1rgqL23J2xVZ-2FKmDo-2B78bModx0yTkcjUWi-2BMblD1I9XMmaOBTIpVA8sFYoxBOc018QCJS69MoM0A-3D-3D'style='Margin:0;color:#00607F;font-family:Montserrat,Arial,sans-serif;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left;text-decoration:none'>View in Browser</a></small> </p> </th><th class="expander" style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th></tr></table></th>  </tr></tbody></table><table class="row sub-header"style="background:#00837E;border-collapse:collapse;border-spacing:0;display:table;padding:0;position:relative;text-align:left;vertical-align:top;width:100%"><tbody><tr  style="padding:0;text-align:left;vertical-align:top"><th class="small-12 large-12 columns first last" style="Margin:0 auto;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0 auto;padding:0;padding-bottom:16px;padding-left:30px;padding-right:30px;text-align:left;width:570px"><table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tr style="padding:0;text-align:left;vertical-align:top"><th style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left"><table class="spacer" style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><td height="16px" style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;border-collapse:collapse!important;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;hyphens:auto;line-height:16px;margin:0;mso-line-height-rule:exactly;padding:0;text-align:left;vertical-align:top;word-wrap:break-word">&#xA0;</td></tr></tbody></table>  <h4 class="text-center" style="-moz-hyphens:none;-webkit-hyphens:none;Margin:0;Margin-bottom:10px;color:#fff;font-family:Montserrat,Arial,sans-serif;font-size:18px;font-weight:400;hyphens:none;line-height:22px;margin:0;margin-bottom:10px;padding:0;text-align:center;text-transform:uppercase;word-break:none;word-wrap:normal">News From Meitu Inc.</h4><h5 class="text-center" style="-moz-hyphens:none;-webkit-hyphens:none;Margin:0;Margin-bottom:10px;color:#fff;font-family:Montserrat,Arial,sans-serif;font-size:14px;font-weight:500;hyphens:none;line-height:18px;margin:0;margin-bottom:0;padding:0;text-align:center;word-break:none;word-wrap:normal">Transmitted by PR Newswire for Journalists on <span class="prevent-break" style="display:inline-block">August 08, 2018 08:00 PM EST </span></h5></th><th class="expander" style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th></tr></table></th></tr></tbody></table><table class="row header" style="background:#e5f2f3;border-collapse:collapse;border-spacing:0;display:table;padding:0;position:relative;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><th class="small-12 large-12 columns first last" style="Margin:0 auto;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0 auto;padding:0;padding-bottom:0;padding-left:30px;padding-right:30px;text-align:left;width:570px"><table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tr style="padding:0;text-align:left;vertical-align:top"><th style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left">                <table class="spacer" style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><td height="24px" style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;border-collapse:collapse!important;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:24px;font-weight:400;hyphens:auto;line-height:24px;margin:0;mso-line-height-rule:exactly;padding:0;text-align:left;vertical-align:top;word-wrap:break-word">&#xA0;</td></tr></tbody></table>               <h1 style="Margin:0;Margin-bottom:10px;color:#4D4E53;font-family:Montserrat,Arial,sans-serif;font-size:20px;font-weight:500;line-height:28px;margin:0;margin-bottom:0;padding:0;text-align:left;word-wrap:normal">Beauty and Social Media: Meitu Announces Strategic Pathways for the Next Decade</h1> <table class="spacer" style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><td height="24px" style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;border-collapse:collapse!important;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:24px;font-weight:400;hyphens:auto;line-height:24px;margin:0;mso-line-height-rule:exactly;padding:0;text-align:left;vertical-align:top;word-wrap:break-word">&#xA0;</td></tr></tbody></table> </th><th class="expander" style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th></tr></table></th>              </tr></tbody></table> <table class="row content" style="background:#fff;border-collapse:collapse;border-spacing:0;display:table;padding:0;position:relative;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><th class="small-12 large-12 columns first last" style="Margin:0 auto;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0 auto;padding:0;padding-bottom:16px;padding-left:30px;padding-right:30px;text-align:left;width:570px"><table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tr style="padding:0;text-align:left;vertical-align:top"><th style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left"> <table class="spacer" style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><td height="24px" style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;border-collapse:collapse!important;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:24px;font-weight:400;hyphens:auto;line-height:24px;margin:0;mso-line-height-rule:exactly;padding:0;text-align:left;vertical-align:top;word-wrap:break-word">&#xA0;</td></tr></tbody></table><p class="prntac"><i>Major Product Upgrades, New Organizational Structure, and a Refined Business Model </i></p>
   <p><span class="xn-location">BEIJING</span>, <span class="xn-chron">Aug. 9, 2018</span> /PRNewswire/ -- Meitu Inc., a leading photo / video editing and sharing company, announced the company's "beauty and social media" strategic pathways for its second decade. As Meitu embarks on the next 10 years, it is poised to enter the social media space, going beyond the beautification products that have shaped the way 1.5 billion users around the world create and share their beauty. </p>
   <ul type="disc">
    <li>Meitu app:&nbsp;Biggest upgrade in a decade slated to be released on <span class="xn-chron">September 21</span>. Three evolutionary stages: from tool, to community, to social media platform </li>
    <li>Meipai app: Repositioning as a pan-knowledge short video platform. New social feature "homework" soon to be launched. </li>
    <li>Reorganize into three business units, including a newly established Social Product Business Unit. </li>
    <li>Refine the Relationship between Infrastructure and Commercial Products</li>
   </ul> 
   <p><b>Three Evolutionary Stages of the Meitu App and Biggest Upgrade in Decade</b></p><th class="expander" style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th></tr></table></th></tr></tbody></table><table class="row content" style="background:#fff;border-collapse:collapse;border-spacing:0;display:table;padding:0;position:relative;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><th class="small-12 large-12 columns first last" style="Margin:0 auto;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0 auto;padding:0;padding-bottom:16px;padding-left:30px;padding-right:30px;text-align:left;width:570px"><table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tr style="padding:0;text-align:left;vertical-align:top"><th style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left"><center data-parsed="" style="min-width:510px;width:100%"><img src="https://photos.prnasia.com/prnh/20180808/2207131-1-a#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000" alt="" align="center" class="float-center" style="-ms-interpolation-mode:bicubic;Margin:0 auto;clear:both;display:block;float:none;margin:0 auto;max-width:100%;outline:0;text-align:center;text-decoration:none;width:auto"></center></th><th class="expander" style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th></tr></table></th></tr></tbody></table><table class="row content" style="background:#fff;border-collapse:collapse;border-spacing:0;display:table;padding:0;position:relative;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><th class="small-12 large-12 columns first last" style="Margin:0 auto;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0 auto;padding:0;padding-bottom:16px;padding-left:30px;padding-right:30px;text-align:left;width:570px"><table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tr style="padding:0;text-align:left;vertical-align:top"><th style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left">
   <p>Meitu is evolving into a social platform. The evolution takes three stages: from tool, to community, to social media. In the first "tool" stage, Meitu successfully dominated photo-related internet traffic by meeting users' needs for photo editing and image enhancement. Meitu is currently in its second "community" stage, focusing on helping users create and share engaging content within the community. In the third "social media" stage, the focus will be on building relational connections among users. </p>
   <p>As an effort to test out the market, Meitu soft launched the community feature "Social Circle" in May. Feedback has been encouraging: each day, core users spend an average of 25 minutes on Social Circle, launch the app 8 times, and view over 75 pages. Linking tools aimed at creating an interconnected community have also proven to be effective. For example, the "Collage of Hearts" feature drove a 29% increase in DAU and created dynamic interactions between users. 41% of new users posted their collage of hearts creation as their first action in the community. </p>
   <p>Given such positive feedback, the Meitu App is poised for its biggest upgrade in a decade. Beginning <span class="xn-chron">September 21</span>, Social Circle will be featured prominently in the Meitu app's homepage, right underneath the tool section. The new version will also allow users to scroll down for more community feeds. </p> 
   <p>"While image-based social media has a massive overseas market, there has been no such counterpart in <span class="xn-location">China</span>. Meitu is set to become a one-stop solution: after processing their photos, users can share right here on the Meitu app," said Wu Xinhong, CEO and Founder of Meitu. </p>
   <p>Along with the Meitu app's social media development comes a new slogan that highlights individuality and an ideal way of life: "<span class="xn-person">My Life</span>, <span class="xn-person">My Style</span>". "My" refers to the individual: younger generations have a strong desire to project their internal self on the world and express their own personality and views. In doing so, they discover and attract people who share their interests,&nbsp;their community. "Life &amp; Style" refers to an ideal way of life – users can share their own ideal way of life, while understanding that of others. The slogan is inspired by the revelation that everyone is looking for their vision of beauty and an ideal lifestyle, a need that is far from being met in today's social media landscape. </p>
   <p>Evolving from community to social media involves three key aspects: making every user feel present, building relational connections, and facilitating interactions among users. "Meitu aims to deliver the best lifestyle community in 2018, and further explore the possibilities of social media in 2019," added Wu Xinghong. </p>
   <p><b>Meipai: "Pan-Knowledge" Repositioning and New Social Features </b></p>
   <p>Meipai will be repositioned to a "pan-knowledge" short video sharing platform. Differentiating itself from other "pan-entertainment" focused products, Meipai aims to add value for users by focusing on the sharing of people's talent, skills and experiences, i.e. "pan knowledge". With the new slogan, "Talent worth sharing", Meipai enables its users to share and learn new dance moves, perform magic tricks or skateboard, apply makeup, do yoga and make dessert, play the Rubik's cube, do crafts, etc. Meipai has a solid foundation for further development: Meipai's content library now includes over 300 sub-genres and more than 30,000 key opinion leaders. Meipai has also partnered with more than 50 top short video MCN organizations. </p>
   <p>Meipai will continue to evolve under the new positioning. The homepage is currently being revamped to be more discovery-oriented, which is better suited toward pan-knowledge content: this is because pan-knowledge seekers are more self-motivated and interested in actively exploring things. Meipai will also release new features to encourage social interactions. A "homework" feature will be released in the following month. The feature will allow users to, for example, upload their own video as a comment beneath the original dance tutorial video. </p>
   <p>"2017 has been a year of both excitement and reflection for the short video industry. We reposition Meipai under the guiding philosophy of developing in a sustainable and healthy manner," said Wu Xinghong. </p>
   <p><b>Reorganize into Three Business Units, including </b><b>A Dedicated Social Product Business Unit</b></p>
   <p>In conjunction with the strategic direction, Meitu will reform its corporate structure toward becoming a product-driven company. Effective <span class="xn-chron">August 8th</span>, Meitu will be divided into three major business units: the Social Product Business Unit, the Beauty Product Business Unit and the Smart Hardware Product Business Unit. The establishment of a dedicated social product unit will consist of both the Meitu and Meipai brands. </p>
   <p>Each business unit is encouraged to innovate independently in every aspect of the business to maximize the value of capital and human resources. </p>
   <p><b>Refine the Relationship between Infrastructure and Commercial Products</b></p>
   <p>Meitu's new strategic direction also calls for refining the relationship between infrastructure and commercial products. </p>
   <p>Photo editing has been Meitu's key entry point to the online world and essential to Meitu's success in the past decade. It has been instrumental in helping the company grow its user base and will drive traffic to the social platform in the future. In addition, social media products will increase Meitu's stickiness and traffic value. They will generate data on additional dimensions that helps Meitu further understand user behavior. This serves as Meitu's infrastructure. </p> 
   <p>The advertising platform serves as a traffic distribution mechanism, a business product that matches users with advertisements. The outer layer is Meitu's "beauty ecosystem" of commercial products, including smart hardware, an e-commerce platform, and value-added services, with more to come. "Beauty and social media are our strategic focus for Meitu's second decade and a long-term goal. There are bound to be bumps on the road ahead, with some things going smoother than others, but that will not shake our conviction," said Wu Xinhong. </p>
   <p><b>About Meitu </b></p>
   <p>Established in <span class="xn-chron">October 2008</span>, Meitu is a leading AI-driven photo/video editing and sharing company headquartered in <span class="xn-location">China</span>. With a mission to inspire more people to express their beauty, the company has developed a rich portfolio of software and smart hardware products designed based on the concept of beauty, including Meitu, BeautyCam, Meipai (a short-form video community app) and Meitu Smartphones. Meitu has amassed over 1.5 billion unique users worldwide, with over one third coming from outside <span class="xn-location">China</span>, including <span class="xn-location">the United States</span>, <span class="xn-location">Brazil</span>, <span class="xn-location">Japan</span>, <span class="xn-location">South Korea</span>, <span class="xn-location">India</span>, <span class="xn-location">Thailand</span>, <span class="xn-location">Indonesia</span>, <span class="xn-location">Malaysia</span>, <span class="xn-location">the Philippines</span>, and <span class="xn-location">Vietnam</span>. As of <span class="xn-chron">February 2018</span>, Meitu engages 454.7 million MAUs. With the largest database of human portraits on the planet, Meitu leverages AI in the pursuit of beauty. MTlab, Meitu's research and development hub, is dedicated to AI and imaging innovations such as Computer Vision, Deep Learning, and Computer Graphics. </p>
   <p>According to <span class="xn-person">App Annie</span>, Meitu has repeatedly ranked as one of the top eight iOS non-game app developers globally between June, 2014 and January, 2017. More information about Meitu, Inc. may be found at <a href="http://email.prnewswire.com/wf/click?upn=2YCkEyUYEN6O3WqBujxncIKbIcLpS4A87-2Bm3RYAOfB8-3D_q1N77mbql2CxsoEfo2fFiZ6dnlev64IGUSa1KT1DDw1MuprZmQ6aap9NY9k0Le75SikOsmKsVhERarGZNmT7GvqxxpgrrrYpNU62Rmld3eim4CdvU1UAoefoAxN9G2mHZIKzyxuqQo1DJRGTDyEehPPkT0SH3Y5jhIITZPT8j-2FXhFrXXv3rVJB1VOOlptnTYa2TzizIjwbvGX4O5ntx4p3dS65bqsOFQ3H4RZVnPJV9ZU2oyXm4NmxUmKwDg3KpPKdiQ8TbRJ4tCKSvcaF8MP3LHXT9vNNjZYDdnnTTLwH8PzdlTab9RHJZrb4Hsf5HnVrghCvDJF8FtdE25jjfvtg-3D-3D#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000" rel="nofollow#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000" target="_blank">http://corp.meitu.com/en/</a></p>
   <p>Photo - <a href="http://email.prnewswire.com/wf/click?upn=z3qiKnBCpunqdJkRppsiEUZjEZBnaZU-2Be4exEX1-2BQ4KLy5k6S1ggByQgGlgql5lCY5gou7uoGwGhaqLIM-2BjRDQ-3D-3D_q1N77mbql2CxsoEfo2fFiZ6dnlev64IGUSa1KT1DDw1MuprZmQ6aap9NY9k0Le75SikOsmKsVhERarGZNmT7GvqxxpgrrrYpNU62Rmld3eim4CdvU1UAoefoAxN9G2mHZIKzyxuqQo1DJRGTDyEehPPkT0SH3Y5jhIITZPT8j-2FXhFrXXv3rVJB1VOOlptnTYcWcW-2FDt-2FpQhpTxrf2yxsacbog-2Bbp5OxFu-2BjlUuB9iD8ZHZStef-2B4o8vXMuazK-2BiT-2F5tHrNTuw4CfA9CthAxcVK-2BP2zfj3g83QY5R1Q36BS-2FF-2FFaBqK1wwH5IPBADObuZEgafMncMgcUe8G6JmrLQZg-3D-3D#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000" rel="nofollow#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000" target="_blank">https://photos.prnasia.com/prnh/20180808/2207131-1-a</a> <br>Photo - <a href="http://email.prnewswire.com/wf/click?upn=z3qiKnBCpunqdJkRppsiEUZjEZBnaZU-2Be4exEX1-2BQ4KLy5k6S1ggByQgGlgql5lCD0C3d-2B3NlJe90VfnMgCO1g-3D-3D_q1N77mbql2CxsoEfo2fFiZ6dnlev64IGUSa1KT1DDw1MuprZmQ6aap9NY9k0Le75SikOsmKsVhERarGZNmT7GvqxxpgrrrYpNU62Rmld3eim4CdvU1UAoefoAxN9G2mHZIKzyxuqQo1DJRGTDyEehPPkT0SH3Y5jhIITZPT8j-2FXhFrXXv3rVJB1VOOlptnTY61svKYqu-2Fx5iln15EafddXLB63M-2BMn4AaXQJu-2F07M9nV-2F03IJvJSaQee1qhDnzH-2Fdk99RKIbsLO26827VIahPWVA4K1MhaDnPWH2fK5yXYRI6iMiSmyD61diNNdyb9Kp4Gtr-2FQG-2BBV2FuSoxythh9Q-3D-3D#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000" rel="nofollow#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000" target="_blank">https://photos.prnasia.com/prnh/20180808/2207131-1-b</a> <br>Photo - <a href="http://email.prnewswire.com/wf/click?upn=z3qiKnBCpunqdJkRppsiEUZjEZBnaZU-2Be4exEX1-2BQ4KLy5k6S1ggByQgGlgql5lC-2BQZRWnuI08s-2Bl7D0IBhU1w-3D-3D_q1N77mbql2CxsoEfo2fFiZ6dnlev64IGUSa1KT1DDw1MuprZmQ6aap9NY9k0Le75SikOsmKsVhERarGZNmT7GvqxxpgrrrYpNU62Rmld3eim4CdvU1UAoefoAxN9G2mHZIKzyxuqQo1DJRGTDyEehPPkT0SH3Y5jhIITZPT8j-2FXhFrXXv3rVJB1VOOlptnTYLUhlyeGTLMsR8PA-2Fk6t4sOW-2B5xhedmcaI9Mb0cgNqP6a50jy-2F5v3Q2Okdung8o581qp8rikWXUyWGDGVzXZ1gT8mvrBTpR6460fKvjZU5j5PTlkP-2FLDEQ1BMx79a-2BFbOaRqcw683tFRxO-2BGsJsNOfQ-3D-3D#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000" rel="nofollow#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000" target="_blank">https://photos.prnasia.com/prnh/20180808/2207131-1-c</a> </p>
   <p>SOURCE Meitu Inc.</p><th class="expander" style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th></tr></table></th></tr></tbody></table><table class="row content" style="background:#fff;border-collapse:collapse;border-spacing:0;display:table;padding:0;position:relative;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><th class="gallery small-12 large-12 columns first last" style="Margin:0 auto;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0 auto;padding:0;padding-bottom:16px;padding-left:30px;padding-right:30px;text-align:left;width:570px"><table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tr style="padding:0;text-align:left;vertical-align:top"><th style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left"><table class="row" style="border-collapse:collapse;border-spacing:0;display:table;padding:0;position:relative;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><th class="small-12 large-12 columns first last" style="Margin:0 auto;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0 auto;padding:0;padding-bottom:16px;padding-left:0!important;padding-right:0!important;text-align:left;width:100%"><table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tr style="padding:0;text-align:left;vertical-align:top"><th style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left"><center data-parsed="" style="min-width:none!important;width:100%"><img src="https://photos.prnasia.com/prnh/20180808/2207131-1-b#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000" alt="" align="center" class="float-center" style="-ms-interpolation-mode:bicubic;Margin:0 auto;clear:both;display:block;float:none;margin:0 auto;max-width:100%;outline:0;text-align:center;text-decoration:none;width:auto"></center><table class="spacer" style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><td height="16px" style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;border-collapse:collapse!important;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;hyphens:auto;line-height:16px;margin:0;mso-line-height-rule:exactly;padding:0;text-align:left;vertical-align:top;word-wrap:break-word">&#xA0;</td></tr></tbody></table><p style="Margin:0;Margin-bottom:10px;color:#4D4E53;font-family:Montserrat,Arial,sans-serif;font-size:14px;font-weight:400;line-height:28px;margin:0;margin-bottom:16px;padding:0;text-align:left">The new Meitu app is slated to be launched on September 21. It will be the app&#8217;s biggest upgrade in a decade.</p><hr style="border:1px solid #8a8a8d;border-bottom:0"></th><th class="expander" style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th></tr></table></th></tr></tbody></table><th class="expander" style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th></tr></table></th></tr></tbody></table><table class="row content" style="background:#fff;border-collapse:collapse;border-spacing:0;display:table;padding:0;position:relative;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><th class="gallery small-12 large-12 columns first last" style="Margin:0 auto;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0 auto;padding:0;padding-bottom:16px;padding-left:30px;padding-right:30px;text-align:left;width:570px"><table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tr style="padding:0;text-align:left;vertical-align:top"><th style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left"><table class="row" style="border-collapse:collapse;border-spacing:0;display:table;padding:0;position:relative;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><th class="small-12 large-12 columns first last" style="Margin:0 auto;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0 auto;padding:0;padding-bottom:16px;padding-left:0!important;padding-right:0!important;text-align:left;width:100%"><table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tr style="padding:0;text-align:left;vertical-align:top"><th style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left"><center data-parsed="" style="min-width:none!important;width:100%"><img src="https://photos.prnasia.com/prnh/20180808/2207131-1-c#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000" alt="" align="center" class="float-center" style="-ms-interpolation-mode:bicubic;Margin:0 auto;clear:both;display:block;float:none;margin:0 auto;max-width:100%;outline:0;text-align:center;text-decoration:none;width:auto"></center><table class="spacer" style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><td height="16px" style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;border-collapse:collapse!important;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;hyphens:auto;line-height:16px;margin:0;mso-line-height-rule:exactly;padding:0;text-align:left;vertical-align:top;word-wrap:break-word">&#xA0;</td></tr></tbody></table><p style="Margin:0;Margin-bottom:10px;color:#4D4E53;font-family:Montserrat,Arial,sans-serif;font-size:14px;font-weight:400;line-height:28px;margin:0;margin-bottom:16px;padding:0;text-align:left">Meitu&#8217;s strategy diagram that illustrates its refined business model</p><hr style="border:1px solid #8a8a8d;border-bottom:0"></th><th class="expander" style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th></tr></table></th></tr></tbody></table>CONTACT: Yin Li, ly39@meitu.com, +86-182-2446-2004<p style="Margin:0;Margin-bottom:10px;color:#4D4E53;font-family:Montserrat,Arial,sans-serif;font-size:14px;font-weight:400;line-height:28px;margin:0;margin-bottom:16px;padding:0;text-align:left">Web Site: <a href='http://email.prnewswire.com/wf/click?upn=2YCkEyUYEN6O3WqBujxncCQY5szH2aim4ysHmAplbpU-3D_q1N77mbql2CxsoEfo2fFiZ6dnlev64IGUSa1KT1DDw1MuprZmQ6aap9NY9k0Le75SikOsmKsVhERarGZNmT7GvqxxpgrrrYpNU62Rmld3eim4CdvU1UAoefoAxN9G2mHZIKzyxuqQo1DJRGTDyEehPPkT0SH3Y5jhIITZPT8j-2FXhFrXXv3rVJB1VOOlptnTYZVqD-2F31K1uuDOSVgK9YuNfi5RHGMjy0VEzvafjcYlrc4lp-2FGDZjRieixTch6A4GIz-2FTpvErMFxHHfpmd3-2BL8tXtWT2ABqK9Q2g-2BEVGs7p5MJcui2xAN4RRYvszBmvVFnL-2BBSeMU2Dh31ay6q5JLD1g-3D-3D' style='Margin:0;color:#00607F;font-family:Montserrat,Arial,sans-serif;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left;text-decoration:none'>http://corp.meitu.com/en</a></p><table class="spacer" style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><td height="8px" style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;border-collapse:collapse!important;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:8px;font-weight:400;hyphens:auto;line-height:8px;margin:0;mso-line-height-rule:exactly;padding:0;text-align:left;vertical-align:top;word-wrap:break-word">&#xA0;</td></tr></tbody></table> <table class="button medium expand" style="Margin:0 0 16px 0;border-collapse:collapse;border-spacing:0;margin:0 0 16px 0;padding:0;text-align:left;vertical-align:top;width:100%!important"><tr style="padding:0;text-align:left;vertical-align:top"><td style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;border-collapse:collapse!important;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;hyphens:auto;line-height:1.3;margin:0;padding:0;text-align:left;vertical-align:top;word-wrap:break-word"><table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tr style="padding:0;text-align:left;vertical-align:top"><td style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;background:#00607F;border:2px solid #00607F;border-collapse:collapse!important;color:#fefefe;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;hyphens:auto;line-height:1.3;margin:0;padding:0;text-align:left;vertical-align:top;word-wrap:break-word"><center data-parsed="" style="min-width:0;width:100%"><a href='http://email.prnewswire.com/wf/click?upn=z3qiKnBCpunqdJkRppsiEbSmnibeutBGHu9PCpp0b6U4Q4ZotzjXnIzJXOhYxAYUXB2XyBy0PUS-2FlNm-2FF0ougwnx1bGovu440U1yP0w6asEuqA2WubpbHYEuA-2FpYnCTLW4PxcVes3-2B0LYe7f21LrI2sYtQrnOy7aj44RQuyP-2FyxY-2FYTLaqjUVnbqvQntHWfWjyvp-2BcY1jDFou2z80N56yw-3D-3D_q1N77mbql2CxsoEfo2fFiZ6dnlev64IGUSa1KT1DDw1MuprZmQ6aap9NY9k0Le75SikOsmKsVhERarGZNmT7GvqxxpgrrrYpNU62Rmld3eim4CdvU1UAoefoAxN9G2mHZIKzyxuqQo1DJRGTDyEehPPkT0SH3Y5jhIITZPT8j-2FXhFrXXv3rVJB1VOOlptnTYJ0w0DtW7ZkCvYBZUBtM0w8-2FE53WMdbZqL0RlAG22S70om9qzEGcMXqunmSXl4QYzNhtHhhjGTJHMmj-2BR5Fr-2FEc7m-2FIBf4X1Y4l2gGHwn8MZXbL8eIhQJMAkiqhFzmB1GtK9xerveysILniINDQU7ng-3D-3D'align="center" class="float-center" style="Margin:0;border:0 solid #00607F;border-radius:5px;color:#fefefe;display:inline-block;font-family:Montserrat,Arial,sans-serif;font-size:14px;font-weight:500;line-height:1.3;margin:0;padding:8px 16px 8px 16px;padding-left:0;padding-right:0;text-align:center;text-decoration:none;text-transform:uppercase;width:100%">View in Browser</a></center></td></tr></table></td><td class="expander" style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;border-collapse:collapse!important;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;hyphens:auto;line-height:1.3;margin:0;padding:0!important;text-align:left;vertical-align:top;visibility:hidden;width:0;word-wrap:break-word"></td></tr></table> </th><th class="expander" style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th></tr></table></th></tr></tbody></table><table class="row sub-footer" style="background:#e5f2f3;border-collapse:collapse;border-spacing:0;display:table;padding:0;position:relative;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><th class="small-12 large-12 columns first last" style="Margin:0 auto;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0 auto;padding:0;padding-bottom:16px;padding-left:30px;padding-right:30px;text-align:left;width:570px"><table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tr style="padding:0;text-align:left;vertical-align:top"><th style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left"><table class="spacer" style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><td height="24px" style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;border-collapse:collapse!important;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:24px;font-weight:400;hyphens:auto;line-height:24px;margin:0;mso-line-height-rule:exactly;padding:0;text-align:left;vertical-align:top;word-wrap:break-word">&#xA0;</td></tr></tbody></table> <h4 class="text-center" style="Margin:0;Margin-bottom:10px;color:#4D4E53;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:500;line-height:1.3;margin:0;margin-bottom:10px;padding:0;text-align:center;word-wrap:normal">Tech</h4><h5 class="text-center" style="Margin:0;Margin-bottom:10px;color:#4D4E53;font-family:Montserrat,Arial,sans-serif;font-size:14px;font-weight:400;line-height:1.3;margin:0;margin-bottom:10px;padding:0;text-align:center;word-wrap:normal"><strong>Username:</strong> aronschatz | <a href="http://email.prnewswire.com/wf/click?upn=z3qiKnBCpunqdJkRppsiEbSmnibeutBGHu9PCpp0b6W-2FoNI0ROearmohKp42569WC64-2FSpdy8Fo3nCX4s3fhCFq-2FttXRiT9oD9muRlENXOn7XeMspKjmOZLHDgA1mW9Y_q1N77mbql2CxsoEfo2fFiZ6dnlev64IGUSa1KT1DDw1MuprZmQ6aap9NY9k0Le75SikOsmKsVhERarGZNmT7GvqxxpgrrrYpNU62Rmld3eim4CdvU1UAoefoAxN9G2mHZIKzyxuqQo1DJRGTDyEehPPkT0SH3Y5jhIITZPT8j-2FXhFrXXv3rVJB1VOOlptnTY2O6nuAdzmJ7kpodA-2B668j9XmmMUo4rE6qzS8Rq0AichU7ViBm-2BZ15gTOl5Gi39LTw0i0QZ-2F8uBM8BlopTwx3dBLuVaqmd4DX7NifdpePuyQsXPX4zA-2BPESMEmHgFfoj1lCTsVBZlPAJ6B1cuwGhF8w-3D-3D" style="Margin:0;color:#00607F;font-family:Montserrat,Arial,sans-serif;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left;text-decoration:none">edit profile</a></h5></th><th class="expander" style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th></tr></table></th></tr></tbody></table>              <table class="row footer" style="background:#f6f6f6;border-collapse:collapse;border-spacing:0;display:table;padding:0;position:relative;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top">                <th class="small-12 large-12 columns first last" style="Margin:0 auto;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0 auto;padding:0;padding-bottom:16px;padding-left:30px;padding-right:30px;text-align:left;width:570px"><table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tr style="padding:0;text-align:left;vertical-align:top"><th style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left">                  <table class="spacer" style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top"><td height="24px" style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;border-collapse:collapse!important;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:24px;font-weight:400;hyphens:auto;line-height:24px;margin:0;mso-line-height-rule:exactly;padding:0;text-align:left;vertical-align:top;word-wrap:break-word">&#xA0;</td></tr></tbody></table>                  <p class="text-center" style="Margin:0;Margin-bottom:10px;color:#4D4E53;font-family:Montserrat,Arial,sans-serif;font-size:10px;font-weight:400;line-height:16px;margin:0;margin-bottom:10px;padding:0;text-align:center">                    <strong style="font-weight:250!important">                      Copyright &copy; PR Newswire Association LLC. All Rights Reserved.                    </strong>                  </p>                  <p class="text-center" style="Margin:0;Margin-bottom:10px;color:#4D4E53;font-family:Montserrat,Arial,sans-serif;font-size:10px;font-weight:400;line-height:16px;margin:0;margin-bottom:10px;padding:0;text-align:center">                    <strong style="font-weight:250!important">                      A Cision company.                    </strong>                  </p>                  <p class="text-center" style="Margin:0;Margin-bottom:10px;color:#4D4E53;font-family:Montserrat,Arial,sans-serif;font-size:10px;font-weight:400;line-height:16px;margin:0;margin-bottom:10px;padding:0;text-align:center">                    350 Hudson Street, Suite 300 New York, NY 10014-4504                  </p>                  <p class="text-center" style="Margin:0;Margin-bottom:10px;color:#4D4E53;font-family:Montserrat,Arial,sans-serif;font-size:10px;font-weight:400;line-height:16px;margin:0;margin-bottom:10px;padding:0;text-align:center">                    <a href="http://email.prnewswire.com/wf/click?upn=TwIh0OIjG8BOSB67uKqqj527Ndmd47su-2BVNkeMqZLyk-3D_q1N77mbql2CxsoEfo2fFiZ6dnlev64IGUSa1KT1DDw1MuprZmQ6aap9NY9k0Le75SikOsmKsVhERarGZNmT7GvqxxpgrrrYpNU62Rmld3eim4CdvU1UAoefoAxN9G2mHZIKzyxuqQo1DJRGTDyEehPPkT0SH3Y5jhIITZPT8j-2FXhFrXXv3rVJB1VOOlptnTYcl-2BGBUbiV2REh9iLcLJB8wn1CKLvEEszw2BhsiUqMBCSjutZThUNY-2B4OAOwnZfHpuVoDUKPKmcrusnRXQBG3PfzBxTGKPVKpo25wBdMoJg2Ezo7f-2FaA4CeOQr6bFq5xZhe47lSqss70WCpWKW5pm8w-3D-3D" style="Margin:0;color:#00607F;font-family:Montserrat,Arial,sans-serif;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left;text-decoration:none">http://www.prnewswire.com</a>                  </p>                  <p class="text-center" style="Margin:0;Margin-bottom:10px;color:#4D4E53;font-family:Montserrat,Arial,sans-serif;font-size:10px;font-weight:400;line-height:16px;margin:0;margin-bottom:10px;padding:0;text-align:center">                    To change the settings for your profile(s), email delivery or unsubscribe go to<br>                    <a href="http://email.prnewswire.com/wf/click?upn=z3qiKnBCpunqdJkRppsiEbSmnibeutBGHu9PCpp0b6W-2FoNI0ROearmohKp42569WxPxLmCJLONMn1VSHyUOtdRl0LgkDpR33F0lynsy9e3o-3D_q1N77mbql2CxsoEfo2fFiZ6dnlev64IGUSa1KT1DDw1MuprZmQ6aap9NY9k0Le75SikOsmKsVhERarGZNmT7GvqxxpgrrrYpNU62Rmld3eim4CdvU1UAoefoAxN9G2mHZIKzyxuqQo1DJRGTDyEehPPkT0SH3Y5jhIITZPT8j-2FXhFrXXv3rVJB1VOOlptnTYvknhQrEjPYemuebKymw4YD8-2BINFDdtnb3S7k8Eo0NCoQ91-2FaD6hxkx1FThDXGTczlST-2BkozqS5Rh9k24Qudcs9FOpqmPkmdv-2B1EpxBQg6MCgjfZr4SCk-2FVdHOok4AvxL-2BDSub-2BJBkUVoBfeqXuucbQ-3D-3D" style="Margin:0;color:#00607F;font-family:Montserrat,Arial,sans-serif;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left;text-decoration:none">https://prnmedia.prnewswire.com/profile/?action=editProfile</a><br>and select the profile you would like to edit or delete. You can select the industries, subjects, languages, geographical areas, companies, delivery options and delivery frequencies of your choice.                  </p>                  <p class="text-center" style="Margin:0;Margin-bottom:10px;color:#4D4E53;font-family:Montserrat,Arial,sans-serif;font-size:10px;font-weight:400;line-height:16px;margin:0;margin-bottom:10px;padding:0;text-align:center">                    In addition to current press releases, you can also find archived news, corporate information, photos, tradeshow news and much more on the PR Newswire for Journalists website:<br><a href="http://email.prnewswire.com/wf/click?upn=z3qiKnBCpunqdJkRppsiEbSmnibeutBGHu9PCpp0b6WyN-2FuRoFWC-2BvU2X16iF3dB_q1N77mbql2CxsoEfo2fFiZ6dnlev64IGUSa1KT1DDw1MuprZmQ6aap9NY9k0Le75SikOsmKsVhERarGZNmT7GvqxxpgrrrYpNU62Rmld3eim4CdvU1UAoefoAxN9G2mHZIKzyxuqQo1DJRGTDyEehPPkT0SH3Y5jhIITZPT8j-2FXhFrXXv3rVJB1VOOlptnTYFAK0jor5-2F-2BC86-2Bzx4wwkCkrFDt0q-2BIYGnpyoBi-2BtP6g4zxUFgycMlyTTIRsSSsHOJvKepNbwsf7npt-2Bsw2YGxFeL-2BKMgiBE7wmLpjb55hSKjWrx8igE1Ba8fpEkkn-2Fs-2BHj-2FxuD14TXzWo938HEFjfA-3D-3D" style="Margin:0;color:#00607F;font-family:Montserrat,Arial,sans-serif;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left;text-decoration:none">https://prnmedia.prnewswire.com</a>                  <br>                  </p>                  <p class="text-center" style="Margin:0;Margin-bottom:10px;color:#4D4E53;font-family:Montserrat,Arial,sans-serif;font-size:10px;font-weight:400;line-height:16px;margin:0;margin-bottom:10px;padding:0;text-align:center">                    To contact us, email: <a href="mailto:mediasite@prnewswire.com" style="Margin:0;color:#00607F;font-family:Montserrat,Arial,sans-serif;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left;text-decoration:none">mediasite@prnewswire.com</a>                  </p>                  <p class="text-center" style="Margin:0;Margin-bottom:10px;color:#4D4E53;font-family:Montserrat,Arial,sans-serif;font-size:10px;font-weight:400;line-height:16px;margin:0;margin-bottom:10px;padding:0;text-align:center">                    Please do not reply to this email; this is an automatically generated message.                  </p>                </th><th class="expander" style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th></tr></table></th>              </tr></tbody></table>              <table class="row no-background" style="background:#f6f6f6;border-collapse:collapse;border-spacing:0;display:table;padding:0;position:relative;text-align:left;vertical-align:top;width:100%"><tbody><tr style="padding:0;text-align:left;vertical-align:top">                <th class="small-12 large-12 columns first last" style="Margin:0 auto;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0 auto;padding:0;padding-bottom:16px;padding-left:30px;padding-right:30px;text-align:left;width:570px"><table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tr style="padding:0;text-align:left;vertical-align:top"><th style="Margin:0;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left">                  <center data-parsed="" style="min-width:510px;width:100%">                    <table align="center" class="menu float-center" style="Margin:0 auto;border-collapse:collapse;border-spacing:0;float:none;margin:0 auto;padding:0;text-align:center;vertical-align:top;width:auto!important"><tr style="padding:0;text-align:left;vertical-align:top"><td style="-moz-hyphens:auto;-webkit-hyphens:auto;Margin:0;border-collapse:collapse!important;color:#0a0a0a;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;hyphens:auto;line-height:1.3;margin:0;padding:0;text-align:left;vertical-align:top;word-wrap:break-word"><table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"><tr style="padding:0;text-align:left;vertical-align:top">                      <th class="menu-item float-center" style="Margin:0 auto;color:#0a0a0a;float:none;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0 auto;padding:10px;padding-right:10px;text-align:center"><a href="http://email.prnewswire.com/wf/click?upn=7VDqtAz2AW-2FeY7XnbvsasQ-2FREeMBG2bqGXdCB4XzZ7DqUZ66ajq2hyxTpb99QH1px3yBpuS-2Bnw-2Fwq19QAjbg6g-3D-3D_q1N77mbql2CxsoEfo2fFiZ6dnlev64IGUSa1KT1DDw1MuprZmQ6aap9NY9k0Le75SikOsmKsVhERarGZNmT7GvqxxpgrrrYpNU62Rmld3eim4CdvU1UAoefoAxN9G2mHZIKzyxuqQo1DJRGTDyEehPPkT0SH3Y5jhIITZPT8j-2FXhFrXXv3rVJB1VOOlptnTYwl4eoini6cuw5A0sSDsD6hmz6cNUOHNckc3AWQ1GOD-2FIiU12Gc8QAOlox-2B8ASy12VNWoQ5g3d7IOg1I5TK-2BiBxSFfmobP-2BpNm6G-2Fw9QvjZA4UnXW7LMnai-2FiSWfjlW0oe1cJSov5oAoKN5xMxGtYzw-3D-3D" style="Margin:0;color:#00607F;font-family:Montserrat,Arial,sans-serif;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left;text-decoration:none"><img class="social-icon" src="http://content.prnewswire.com/designimages/fa-facebook_2x.jpg" width="18#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000" alt="" style="-ms-interpolation-mode:bicubic;border:none;clear:both;display:block;max-width:18px;outline:0;text-decoration:none;width:100%"></a></th>                      <th class="menu-item float-center" style="Margin:0 auto;color:#0a0a0a;float:none;font-family:Montserrat,Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0 auto;padding:10px;padding-right:10px;text-align:center"><a href="http://email.prnewswire.com/wf/click?upn=TwIh0OIjG8BOSB67uKqqj7owuiGA3E3Pj6GpdgAhBSAM-2BLR6wI3HWJ2bn-2BQWA2vhFYfN4C62mtJD6y
          ADO.NET Entity Framework – Code First Development Pattern      Cache   Translate Page   Web Page Cache   

Originally posted on: http://maxblogson.net/archive/2011/04/14/ado.net-entity-framework-ndash-code-first-development-pattern.aspx

Here’s a quick start introduction to the ADO.NET Entity Framework Code First Development Pattern.  For a more complete (but still intro) walkthrough, check out ScottGu’s blog.

At the time of this writing, you’ll need the EF 4.1 Release Candidate.  After EF 4.1 is released you’ll no doubt be able to find it on the ADO.NET team blog.

1.  Create a new empty ASP.NET MVC2 Web Application, add a reference to System.Data.Entity.  If using the EF4.1 RC - add a reference to the EntityFramework dll that comes installed with it.

2.  Add the model classes you’d like to represent your data objects.  For example if you need to represent game nights, you might create a class called Game with properties that describe the game night date, location, and other information.

3.  Create a “Context Class” that inherits DbContext, which contains nothing but DbSet<yourclassnamefromstep2> public properties.  For example if you created in step 2 a class called “Game”, here you’d have a property defined as:

public DbSet<Game> Games { get; set; }

At this point, EF code first will make certain assumptions (which we can override later if necessary) that allow us to write less code:

- The context class will map its properties (those DbSet properties) to tables with the same names (a Games table, in our example).

- Each row in that table will map to an instance of the model class (a Game instance, in our example). 

- Properties in the model class are columns in the table.

- A property in the model class with the name “Id” or “<classname>Id” will be made the primary key.

- Relationships between tables are inferred if one model class has a property with the name “<otherclassname>Id”.

4.  Add a controller to see EF Code First in action.  For example, add Index (to just return a list of our game nights) and Create actions (to create a new game night).

5.  Add the views (Index: strongly typed IEnumerable of Game, Create: strongly typed Game – content Create).

6.  Create the database.  One of those EF Code First assumptions is that it will automatically look for a connection string with the same name as the context class (eg, Games).  Scott Guthrie recommends the use of SQL CE 4 for early development, and moving to SQL Server or SQL Express closer to the time of deployment.

Important:  IF you’re using SQL CE or SQL Express, and your connection string points to a database file that does not yet exist, it will be automatically created for you!

Updating The Model

If you update the model (lets say we add a new property to our Game class), you’ll get an error the next time you attempt to run the application (“context has changed since the database was created”.  EF Code First can handle this too:  in Global.asax, add the following to the Application_Start event handler:

Database.SetInitializer<<yourContextClass>>(new RecreateDatabaseIfModelChanges<<yourContextClass>>());
RegisterRoutes(RouteTable.Routes);

Gu gives a nice tip – create a custom class that implements RecreateDatabaseIfMOdelChanges<<yourContextClass)> and overrides the Seed function to add “seed” rows to the database with default data.  This way when we recreate the database after a model update, the database isn’t empty – but is seeded with our default data.  Use this new custom class in the call to SetInitializer instead of RecreateDatabaseIfModelChanges.


          Senior Database Engineer      Cache   Translate Page   Web Page Cache   
CA-Walnut Creek, About Matrix Precise: Matrix Precise Inc. is a Technology Development, Consulting and R&D Company. We provide solutions in the areas of facial recognition, smart retail, handwriting recognition and smart robots. Our client services also entail a range of development and support solutions from web and mobile application development, infrastructure and production support and testing services. We off
          National Sales Coordinator - David Aplin Group - Acton, ON      Cache   Translate Page   Web Page Cache   
Develop and maintain product/pricing databases and cross-reference tables. Organize and manage pricing pages in collaboration with Product Managers and pricing... $40,000 - $50,000 a year
From David Aplin Group - Fri, 01 Jun 2018 04:28:53 GMT - View all Acton, ON jobs
          Frequency of Opioid Dispensing After Vaginal Delivery      Cache   Translate Page   Web Page Cache   
imageOBJECTIVE: To describe nationwide patterns in outpatient opioid dispensing after vaginal delivery. METHODS: Using the Truven Health Analytics MarketScan database, we performed a large, nationwide retrospective cohort study of commercially insured beneficiaries who underwent vaginal delivery between 2003 and 2015 and who were opioid-naive for 12 weeks before the delivery admission. We assessed the proportion of women dispensed an oral opioid within 1 week of discharge, the associated median oral morphine milligram equivalent dose dispensed, and the frequency of opioid refills during the 6 weeks after discharge. We evaluated predictors of opioid dispensing using multivariable logistic regression. RESULTS: Among 1,345,244 women undergoing vaginal delivery, 28.5% were dispensed an opioid within 1 week of discharge. The most commonly dispensed opioids were hydrocodone (44.7%), oxycodone (34.6%), and codeine (13.1%). The odds of filling an opioid were higher among those using benzodiazepines (adjusted odds ratio [OR] 1.87, 95% CI 1.73–2.02) and antidepressants (adjusted OR 1.63, 95% CI 1.59–1.66), smokers (adjusted OR 1.44, 95% CI 1.38–1.51), and among those undergoing tubal ligation (adjusted OR 3.77, 95% CI 3.67–3.87), operative vaginal delivery (adjusted OR 1.52, 95% CI 1.49–1.54), and higher order perineal laceration (adjusted OR 2.15, 95% CI 2.11–2.18). The median (interquartile range, 10th–90th percentile) dose of opioids dispensed was 150 (113–225, 80–345) morphine milligram equivalents, equivalent to 20 tablets (interquartile range 15–30, 10th–90th percentile 11–46) of 5 mg oxycodone. Six weeks after discharge, 8.5% of women filled one or more additional opioid prescriptions. CONCLUSION: Opioid dispensing after vaginal delivery is common and often occurs at high doses. Given the frequency of vaginal delivery, this may represent an important source of overprescription of opioids in the United States.
          Mine IT Specialist (Mid/Senior) - Point of Rocks, WY - PacifiCorp - Point of Rocks, WY      Cache   Translate Page   Web Page Cache   
General Purpose Support mine IT requirements including desktop and server support, database and security administration, end-user application troubleshooting...
From Pacificorp - Wed, 25 Jul 2018 14:30:09 GMT - View all Point of Rocks, WY jobs
          Full Stack Developer R&D - Fleet Complete - Toronto, ON      Cache   Translate Page   Web Page Cache   
Provide and share knowledge/ expertise in Web, Database, Mobile and/or API development. Full-Stack Developer, R&amp;D....
From Fleet Complete - Wed, 06 Jun 2018 06:29:29 GMT - View all Toronto, ON jobs
          Configuration Specialist      Cache   Translate Page   Web Page Cache   
PA-Philadelphia, Configuration Specialist Our client, a healthcare provider in Philadelphia, is looking to bring on a Configuration Specialist on a contract-to-hire basis. This Configuration Specialist will work within a team to pull data from various tables and databases and assist end users. This role is ideal for a technical coder with an understanding of business flows. If you are interested and would like to
          Oracle RAC Database Administrator - McLane Advanced Technologies - Fort Lee, VA      Cache   Translate Page   Web Page Cache   
The Oracle DBA will support day to day database operations of the Property Book Unit Supply Enhanced (PBUSE) system. Specifically, managing the back-end...
From McLane Advanced Technologies - Sat, 14 Apr 2018 06:31:25 GMT - View all Fort Lee, VA jobs
          Oracle Database Administrator - Perspecta - Charleston, WV      Cache   Translate Page   Web Page Cache   
Every day at Perspecta, we enable hundreds of thousands of people to take on our nation’s most important work. We’re a company founded on a diverse set of...
From Perspecta - Mon, 18 Jun 2018 19:00:05 GMT - View all Charleston, WV jobs
          today's leftovers      Cache   Translate Page   Web Page Cache   

          Как профессионалы в сфере безопасности защищают личные данные      Cache   Translate Page   Web Page Cache   
Иван Бируля

Директор по безопасности «СёрчИнформ».

Половина моих коллег из сферы информационной безопасности — профессиональные параноики. Я и сам до 2012 года был таким — шифровался по полной программе. Потом понял, что такая глухая оборона мешает в работе и жизни.

В процессе «выхода в свет» выработал такие привычки, которые позволяют спокойно спать и при этом не строить вокруг китайскую стену. Рассказываю, к каким правилам безопасности сейчас отношусь без фанатизма, какие периодически нарушаю, а какие соблюдаю со всей серьёзностью.

Излишняя паранойя

Не пользоваться публичным Wi-Fi

Я пользуюсь и не испытываю опасений на этот счёт. Да, при использовании бесплатных общественных сетей возникают угрозы. Но риск сводится к минимуму, если соблюдать простые правила безопасности.

  1. Убедиться, что точка доступа принадлежит кафе, а не хакеру. Легальная точка просит ввести номер телефона и высылает СМС для входа.
  2. Использовать VPN-подключение для доступа в Сеть.
  3. Не вводить логин/пароль на непроверенных сайтах.

Ещё подробнее про третий пункт. Раньше это бы значило, что страница, куда вы вводите конфиденциальные данные, использует защищённое соединение (об этом сигнализирует HTTPS перед названием сайта).

Недавно браузер Google Chrome даже стал помечать страницы, соединение с которыми не защищёно, как небезопасные. Но к сожалению, фишинговые сайты в последнее время тоже переняли практику получения сертификата, чтобы мимикрировать под настоящие.

Так что, если вы хотите войти в какой-то сервис, используя публичный Wi-Fi, я советовал бы сто раз убедиться в оригинальности сайта. Как правило, достаточно прогнать его адрес через whois-сервис, например Reg.ru. Свежая дата регистрации домена должна насторожить — фишинговые сайты долго не живут.

Не заходить в свои аккаунты с чужих устройств

Захожу, но настраиваю двухэтапную аутентификацию для соцсетей, почты, личных кабинетов, сайта «Госуслуги». Это тоже несовершенный метод защиты, поэтому в Google, например, начали применять аппаратные токены для подтверждения личности пользователя. Но пока для «простых смертных» достаточно того, что ваш аккаунт будет запрашивать код из СМС или из Google Authentificator (в этом приложении новый код генерируется каждую минуту на самом устройстве).

Тем не менее небольшой элемент паранойи я допускаю: регулярно проверяю историю посещений на случай, если кто-то посторонний входил в мою почту. И конечно, если захожу с чужих устройств в свои аккаунты, по окончании работы не забываю нажать «Завершить все сессии».

Не устанавливать банковские приложения

Пользоваться банковским мобильным приложением безопаснее, чем онлайн-банкингом в десктопной версии. Даже если он разработан идеально с точки зрения безопасности, остаётся вопрос с уязвимостями самого браузера (а их немало), а также уязвимостями операционной системы. Вредоносное ПО, крадущее данные, может быть внедрено сразу в неё. Поэтому, даже если в остальном онлайн-банкинг совершенно безопасен, эти риски остаются более чем реальными.

Что касается банковского приложения, его безопасность целиком и полностью на совести банка. Каждое проходит тщательный анализ безопасности кода, зачастую привлекаются внешние именитые эксперты. Банк может заблокировать доступ к приложению, если вы сменили сим-карту или даже просто переставили её в другой слот смартфона.

Некоторые, самые защищённые приложения даже не запускаются, пока не выполнены требования безопасности, например телефон не запаролен. Поэтому, если вы, как и я, не готовы отказываться от онлайн-расчётов в принципе, лучше использовать приложение, а не десктопный онлайн-банкинг.

Конечно, это не означает, что приложения защищены на 100%. Даже в лучших обнаруживаются уязвимости, поэтому необходимо регулярное обновление. Если считаете, что этого недостаточно, читайте специализированные издания (Xaker.ru, Anti-malware.ru, Securitylab.ru): там напишут, если в вашем банке хромает безопасность.

Использовать отдельную карту для онлайн-покупок

Я лично считаю, что это лишние хлопоты. У меня был отдельный счёт, чтобы в случае необходимости переводить с него деньги на карту и оплачивать покупки в интернете. Но и от этого я отказался — это ущерб комфорту.

Быстрее и дешевле завести виртуальную банковскую карту. Когда делаешь покупки онлайн с её помощью, данные основной карты в интернете не засвечиваются. Если считаете, что этого не хватает для полной уверенности, оформите страховку. Эту услугу предлагают ведущие банки. В среднем при стоимости 1 000 рублей в год страховка карты покроет ущерб в 100 тысяч.

Не использовать умные устройства

Интернет вещей громадный, и угроз в нём ещё больше, чем в традиционном. Умные устройства действительно таят огромные возможности для взлома.

В Великобритании хакеры взломали локальную сеть казино с данными о VIP-клиентах через умный термостат! Если казино оказалось таким незащищённым, что говорить об обычном человеке. Но я пользуюсь умными устройствами и камеры на них не заклеиваю. Если телевизор и сольёт информацию обо мне — чёрт с ним. Это точно будет что-то безобидное, потому что всё критически важное я храню на зашифрованном диске и держу его на полке — без доступа в интернет.

Выключать телефон за рубежом на случай прослушки

За границей мы чаще всего пользуемся мессенджерами, которые отлично шифруют текстовые и аудиосообщения. Если трафик и будет перехвачен, в нём окажется только нечитаемая «каша».

Операторы мобильной связи тоже используют шифрование, но проблема в том, что они могут отключить его без ведома абонента. Например, по требованию спецслужб: так было при теракте на Дубровке, чтобы спецслужбы могли оперативно прослушивать переговоры террористов.

Кроме того, переговоры перехватывают специальные комплексы. Цена на них начинается с 10 тысяч долларов. Их нет в свободной продаже, но они доступны спецслужбам. Так что, если задача прослушать вас стоит, вас прослушают. Боитесь? Тогда выключайте телефон везде, и в России тоже.

Отчасти имеет смысл

Менять пароль каждую неделю

На самом деле достаточно раз в месяц, при условии, что пароли длинные, сложные и отдельные для каждого сервиса. Лучше прислушиваться к советам банков, потому что они меняют требования к паролям по мере роста возможностей вычислительной техники. Сейчас слабый криптоалгоритм перебирается брутфорсом за месяц, отсюда и требование к частоте смены пароля.

Правда, оговорюсь. Парадоксально, но требование менять пароли раз в месяц содержит угрозу: человеческий мозг устроен так, что при необходимости постоянно удерживать в голове новые коды, начинает выкручиваться. Как выяснили киберэксперты, каждый новый пароль пользователя в этой ситуации становится слабее предыдущего.

Выход — использовать сложные пароли, менять их раз в месяц, но использовать для хранения специальное приложение. А вход в него тщательно защищать: в моём случае это шифр из 18 символов. Да, приложения грешат тем, что содержат уязвимости (см. пункт про приложения ниже). Приходится выбирать лучшее и следить за новостями о его надёжности. Более безопасного способа удержать в голове десятки надёжных паролей я пока не вижу.

Не пользоваться облачными сервисами

История с индексацией Google Docs в поиске «Яндекса» показала, насколько пользователи заблуждаются относительно надёжности такого способа хранения информации. Для совместного доступа я лично использую облачные серверы компании, потому что знаю, насколько они защищены. Это не значит, что бесплатные публичные облака — абсолютное зло. Просто перед тем, как выложить документ на «Google Диск», озадачьтесь тем, чтобы зашифровать его и поставить пароль на доступ.

Необходимые меры

Не оставлять номер телефона кому и где попало

А вот это совсем не лишняя мера предосторожности. Зная номер телефона и Ф. И. О., злоумышленник может сделать копию сим-карты примерно за 10 тысяч рублей. В последнее время подобную услугу можно получить не только в даркнете. Или даже проще — переоформить чужой номер телефона на себя по липовой доверенности в офисе оператора связи. Дальше номер можно использовать для доступа к любым сервисам жертвы, где нужна двухфакторная аутентификация.

Так злоумышленники уводят аккаунты в Instagram и Facebook (например, чтобы рассылать с них спам или использовать для социальной инженерии), получают доступ к банковским приложениям и вычищают счета. Недавно СМИ рассказывали, как в один день у московского бизнесмена по такой схеме украли 26 миллионов рублей.

Насторожитесь, если ваша сим-карта без видимых причин перестала работать. Лучше перестраховаться и заблокировать банковскую карту, это будет оправданной паранойей. После этого обращайтесь в офис оператора связи, чтобы разобраться, что произошло.

У меня две сим-карты. К одному номеру, которым я ни с кем не делюсь, привязаны сервисы и банковские приложения. Другую сим-карту использую для общения и бытовых нужд. Этот номер телефона оставляю, чтобы зарегистрироваться на вебинар или получить дисконтную карту в магазине. Обе карты защищены PIN-кодом — это элементарная, но действенная мера безопасности, о которой забывают.

Не загружать на телефон всё подряд

Железное правило. Достоверно узнать, как разработчик приложения собирается использовать и защищать данные пользователя, нельзя. Но когда становится известно, как же создатели приложений их используют, это часто оборачивается скандалом.

Из последних кейсов — история с Polar Flow, в котором можно узнавать местонахождение сотрудников разведок всего мира. Или более ранний пример с Unroll.me, которое должно было защищать пользователей от спам-подписок, но заодно продавало полученные данные на сторону.

Часто приложения хотят знать слишком много. Хрестоматийный пример — приложение «Фонарик», которому для работы нужна только лампочка, но оно хочет знать о пользователе всё, вплоть до списка контактов, видеть фотогалерею и где пользователь находится.

Другие требуют ещё больше. UC Browser отсылает IMEI, Android ID, MAC-адрес устройства и некоторые другие данные пользователя на сервер компании Umeng, занимающейся сбором информации для торговой площадки Alibaba. От такого приложения я, как и коллеги, предпочту отказаться.


Даже профессиональные параноики допускают риски, но осознанные. Чтобы не бояться каждой тени, решите, что в вашей жизни публично, а что приватно. Вокруг личной информации возводите стены, а по поводу сохранности публичной не впадайте в фанатизм. Тогда, если однажды вы обнаружите эту публичную информацию в открытом доступе, вам не будет мучительно больно.

Читайте также


          Administrative Assistant III      Cache   Translate Page   Web Page Cache   
KS-Lenexa, Job Description: Advanced administrative responsibilities include preparation of more complex reports/presentations and analysis using various software packages and databases. Is considered a specialist in the department or division, responsible for a complete process of complex nature. Duties will include determining methods and procedures used to accomplish tasks. Hours: 10:30pm to 5:00am Work W
          Administrative Assistant II      Cache   Translate Page   Web Page Cache   
IL-Elk Grove Village, Job Description: General administrative responsibilities include preparation of reports/presentations using various software packages and databases, compilation of information from various sources, and handling small scale projects. Performs audits of various types. Individuals at this level may still perform office functions outlined in the first two levels but these are not the primary focus of
          Administrative Assistant II      Cache   Translate Page   Web Page Cache   
IL-Elk Grove Village, Job Description: General administrative responsibilities include preparation of reports/presentations using various software packages and databases, compilation of information from various sources, and handling small scale projects. Performs audits of various types. Individuals at this level may still perform office functions outlined in the first two levels but these are not the primary focus of
          Administrative Assistant II      Cache   Translate Page   Web Page Cache   
OH-Cincinnati, Job Description: General administrative responsibilities include preparation of reports/presentations using various software packages and databases, compilation of information from various sources, and handling small scale projects. Performs audits of various types. Individuals at this level may still perform office functions outlined in the first two levels but these are not the primary focus of
          Bitcoin Blockchain Analysis - Upwork      Cache   Translate Page   Web Page Cache   
Hi,

Looking to have a database of this data in minute frequency rather than daily.

https://www.blockchain.com/charts/estimated-transaction-volume-usd

USD transaction values of Bitcoin per block.  Using blockchain's way of formatting the data which is thought to be... &quot;Subtracting out outputs which are spent within k blocks, where k = 4
Identifying change outputs as defined in the Meiklejohn paper&quot;

I have the Bitcoin chain downloaded so would like the script to use that data and to work from my computer.

End goal is for this data to be in a CSV and updated automatically when new blocks are complete.

Budget: $500
Posted On: August 09, 2018 23:08 UTC
Category: Web, Mobile & Software Dev > Other - Software Development
Skills: Bitcoin, Blockchain, Cryptocurrency
Country: United States
click to apply
          SVP of Software and IT Infrastructure - Cannon Search Partners - Andover, MA      Cache   Translate Page   Web Page Cache   
.Net, C#, SQL, ASP.Net, database, SQL Server, Software Development, AWS, Windows, Azure, cloud integration, web-based, CTO, VP, CIO....
From Cannon Search Partners - Thu, 12 Jul 2018 08:18:55 GMT - View all Andover, MA jobs
          Analysis Services Import Performance Improvements In The August 2018 Release Of Power BI      Cache   Translate Page   Web Page Cache   
While I was playing around with the new release (August 2018) of Power BI Desktop I noticed there was an undocumented change: similar to the OData improvements I blogged about here, there is a new option in the AnalysisServices.Database() and AnalysisServices.Databases() M functions that turns on a newer version of the MDX generation layer used […]
          College students create app to help feed those in need      Cache   Translate Page   Web Page Cache   
Led by Maria Rose Belding, a group of students created MEANS Database to help connect businesses with leftovers to charities in need.
          Patient Financial Services Supervisor - (Honolulu, Hawaii, United States)      Cache   Translate Page   Web Page Cache   
Supervises assigned staff. Directs and coordinates business operations for Patient Financial Services. Participates in and collaborates on Region-wide activities relating to areas of responsibility.

Essential Functions:
  • Plans, coordinates, directs, and supervises activities of assigned patient financial servies area. Delegates, monitors, and evaluates activities of assigned staff to ensure accuracy and efficiency of business operations. Coordinates and facilitates monthly department meetings. Develops and implements business operations process changes. Implements work plans and efeciency improvement strategies. Promotes and supports processes, programs, and methods to enhance quality of service. Develops and monitors use of process improvement tools to ensure efficient, productive, quality work flow and environment. Develops procedures and documentation. Prepares and maintains statistical data on incoming work and identifies potential operational problems.
  • Analyzes history of delinquent accounts; determines whether account is collectible; prepares write-off accounts; attaches pertinent information to assist outside attorney; submits to manager for review; summarizes monthly write-off report. Communicates and corresponds with insurance carriers, intermediaries, members, in-service orientation to other departments/personnel; obtains complete and valid information. Processes problem claims and bills. Solves other billing problems.
  • Provides information for and coordinates special projects/activities within area.
  • Contacts debtor and arranges interviews and collection of debt. Receives telephone calls and correspondence pertaining to charges and services, researches complaints and inquiries, and responds to patients in timely manner.
  • Hires, trains, supervises, counsels, disciplines, and terminates assigned staff as appropriate.
  • Communicates goals, objectives, accountabilities, priorities, and authority parameters to assigned staff.

    Basic Qualifications:
    Experience
  • Minimum three (3) years medical insurance claims processing and collections or related experience in the healthcare industry.
    Education
  • Bachelor's degree in business administration, related field, OR four (4) years of directly related experience.
    License, Certification, Registration
  • N/A.


    Additional Requirements:
  • Demonstrated ability to perform diversified clerical functions and basic accounting procedures.
  • Demonstrated knowledge of business operations and organizational practices and procedures.
  • Demonstrated familiarity with medical charts and fee schedules.
  • Knowledge of medical terminology, CPT-4 and ICD-9-CM coding.
  • Demonstrated knowledge of and skill in word processing, spreadsheet, and database PC applications.
  • Demonstrated knowledge of and skill in adaptability, change management, conflict resolution, creativity, innovation, decision making, customer service, influence, interpersonal relations, oral communication, problem solving, quality management, results orientation, systems thinking, team building, teamwork, and written communication.
  • Demonstrated knowledge of state, federal and community agencies, insurance carriers, and intermediaries.

    Preferred Qualifications:
  • Supervisory/lead or project management experience in a healthcare industry.

  •           Administrative Specialist III (Temporary) - (San Leandro, California, United States)      Cache   Translate Page   Web Page Cache   
    Provides administrative support to department manager or staff. Performs a variety of routine administrative duties that have set procedures or precedents; some assignments may be complex. Requires instructions to perform special assignments.


    Essential Responsibilities:
  • Maintains manager/executives and department calendars. Arranges meetings, conferences and travel itineraries. Orchestrates and organizes project meetings, schedules and materials such as agendas, timeliness, reports and presentations. Screens telephone calls/visitors, refers to appropriate staff member. Determines which requests should be referred to others. May provide information to top level management, Board Members. etc. Responds to internal and external requests for information relating to established departmental policies and procedures. Interprets policies and procedures in response to inquiries.
  • Reviews/screens manager/executives mail, researches issues and provides recommendations.
  • Performs data input and maintains established databases.
  • May collect and research information or data needed by manager or staff. Maintains confidential department files and records.
  • May provide training/direction to other non-exempt personnel.
  • Performs other related duties as assigned by management.
  • Various positions are under review with a joint Management/Union review committee for appropriate Union/Non-Union status and this position may be considered a union position or may be converted to a union position at some time in the future. Should this position be determined to be union, it will be returned to the bargaining unit in accordance with the Collective Bargaining Agreement.


    Basic Qualifications:
    Experience
  • Minimum four (4) years experience performing administrative support functions for department managers.
    Education
  • High School Diploma or General Education Development (GED) required.
    License, Certification, Registration
  • N/A


    Additional Requirements:
  • Strong proficiency w/ MS Office applications (Word, Excel and PowerPoint).
  • Strong proficiency in MS Outlook.
  • Well organized and detail oriented.
  • Strong customer service skills.
  • Ability to merge documents and summarize information.
  • Ability to follow written and verbal instructions.
  • Must be able to work in a Labor/Management Partnership environment.


    Preferred Qualifications:
  • N/A


  •           Lvl II Staff RN - Clinic - (San Diego, California, United States)      Cache   Translate Page   Web Page Cache   
    As the leader of the health care team, provides professional nursing care, utilizing the nursing process in accordance with established standards of care, policies, and procedures. Demonstrates performance consistent with the Medical Center Vision, Mission, and Strategic Plan of the organization. Remains flexible to changing systems; is expected to demonstrate quality and effectiveness in work habits and clinical practice; and treats co-workers, patients, families, and all members of the health care team with dignity and respect.


    Essential Responsibilities:
  • The Registered Nurse demonstrates proficiency by exhibiting the following skills, competencies, and behaviors:
  • Leadership:
  • Upholds Kaiser Permanente's Policies and Procedures, Principles of Responsibilities, and applicable state, federal and local laws.
  • Serves as a leader of the health care team; delegates tasks appropriately, and demonstrates appropriate accountability.
  • Understands own and team members scope of practice and escalates issues as appropriate.
  • Demonstrates professional, supportive behavior.
  • Champions new ideas.
  • Leads and directs others through the change process.
  • Utilizes communication strategies including chain of command and issue escalation, which result in intended outcomes.
  • Participates in problem identification and resolution.
  • Mentors, orients, and coaches others in unit specific operations and patient care activities
  • Shares responsibility and authority with subordinates and holds him/her accountable for performance.
  • Demonstrates ability to problem solve with other departments in order to assist member problem resolution.
  • Prioritizes, delegates, and supervises work assignments appropriately to ensure completion of patient care activities.
  • Complies with regulatory requirements, policies, procedures, and standards of practice.
  • Nursing Process:
  • Develops and/or contributes to the individualized plan of care that reflects assessment, planning, implementing, and evaluating the outcomes of that plan.
  • Ensures plan shows multidisciplinary planning, consultation, and education.
  • Ensures plan is reflective of admission or outpatient database, on-going findings, age appropriate care, cultural specific needs, and appropriate acuity.
  • Ensures plan is discussed with patient, family/significant others, and completed in a timely manner.
  • Monitors the patient's progress based on the plan.
  • Revises plan on ongoing basis based on patient condition and evaluation of progress.
  • Ensures care meets standards of practice.
  • Ensures effective development and completion of discharge plan including discharge barriers and patient/family education.
  • Ensures that patient clearly understands discharge instructions. In outpatient, identify barriers and needs for patient/family education that will facilitate the outpatient medical management plan.
  • Ensures patient safety related but not limited to, medications and procedures utilizing the five rights; patient falls; decubitus prevention and prevention of nosocomial infections.
  • Ensures optimal pain control and patient comfort; identifies and discusses patient anxieties, fears or concerns regarding patient condition, treatment or discharge.
  • Ensures that patient understands medication purpose, side effects, and administration instructions in the hospital as well as at the time of discharge.
    Patient Care Experience:
  • Practices customer service standards as defined by the Service Area, Medical Center, and specified department.
  • Promptly answers call lights, alarms, and patient requests.
  • Makes appropriate referrals and facilitates the customer's ability to utilize resources.
  • Maintains and protects patient confidentiality
  • Ensures clean, orderly, and functional work environment.
  • Treats all families of patients with courtesy, respect, kindness and compassion.
  • Provides an optimal patient care experience by actively listening to the needs of patients and family members and taking responsibility for meeting those identified needs.
  • Gives patients information in a way they can understand and ensures comprehension.
  • Provides a patient care experience that exceeds members' expectations.
    Patient Care Experience:
  • Practices customer service standards as defined by the Service Area, Medical Center, and specified department.
  • Promptly answers call lights, alarms, and patient requests.
  • Makes appropriate referrals and facilitates the customer's ability to utilize resources.
  • Maintains and protects patient confidentiality
  • Ensures clean, orderly, and functional work environment.
  • Treats all families of patients with courtesy, respect, kindness and compassion.
  • Provides an optimal patient care experience by actively listening to the needs of patients and family members and taking responsibility for meeting those identified needs.
  • Gives patients information in a way they can understand and ensures comprehension.
  • Provides a patient care experience that exceeds members' expectations.
    Team Commitment:
  • Viewed by others to be an effective team member who is flexible, cooperative, and willing to assist others.
  • Confronts difficult or conflict situations constructively and seeks appropriate assistance.
  • Takes accountability for own actions and accepts constructive criticism.
  • Acts as a resource, preceptor, and mentor to new employees, registry, students, and other team members.
  • Attends all mandatory meetings, in-services and staff meetings as required, actively participates in other departmental professional development. (Requirement may vary for per diem staff).
  • Participates with the assessment of current and future unit learning needs and development of an annual education plan.
  • Keeps self informed of activities on the unit and makes recommendations for change.
  • Adheres to Attendance Program. Reports to assigned area promptly, being present and available for report at beginning of assigned shift.
  • Supports a collaborative Labor-Management Partnership environment through unit based teams.
    Fiscal Responsibility:
  • Organizes work to minimize the use of overtime.
  • Identifies and assists in systems improvement that needs simplification or correction.
  • Utilizes payroll and non-payroll resources to their maximum potential.


    Basic Qualifications:
  • Current CA RN license.
  • BLS certification.
  • 1-year recent (within the last 3 years) full-time equivalent experience in acute care, ambulatory care or home health/palliative/hospice care.

    Notes:
  • Irregularly Scheduled Part Time Position in Family Medicine Residency Program.
  • May float to Carmel Valley, Point Loma, and Vandever.


  •           Experienced PACU RN - Ambulatory Surgery Center (0.9 FTE, Bellevue) No Weekends, Holidays or On Call! - (Bellevue, Washington, United States)      Cache   Translate Page   Web Page Cache   
    Provide nursing care to a defined group of patients, adhering to Kaiser Foundation Health Plan of Washington ambulatory Nursing Care Standards, the Nursing Code of Ethics and Kaiser Foundation Health Plan of Washington policies. Coordinate and facilitate Health Care services for the patient in other segments of the Health Care delivery system. Provide and coordinate nursing care for the patient in collaboration with the Health Care team. The Registered Nurse is an integral member of the Health Care team, overseeing and participating in patient assessment and the formulation and implementation of the care plan.


    Essential Responsibilities:
  • Using the nursing process, provides ongoing assessment of the nursing care needs of a defined group of patients. Uses nursing diagnosis to describe this assessment. Develops a written plan of care for patient care needs. Assists patients and families/significant others in developing health care goals which are part of the individualized plan of care. Determines priorities of patient care based on essential patient needs and available resources. Provides nursing interventions safely and competently. Provides the patient and family/significant others with information preceding interventions. Provides telephone consultation to patients and family/significant others Provides ongoing evaluation of the patient's response to care. Anticipates and recognizes changes in the patient's status and need for nursing care. Modifies the individual plan of care in collaboration with the health care team.
  • Demonstrates understanding of the physiologic and psychological effects of normal aging by assessing, planning, implementing and evaluating care to meet the needs of those populations served. Demonstrates effective communication skills with those specific age populations served. Identifies own learning needs and participates in educational programs related to those age-specific patient populations served (Neonatal, Pediatric, Adolescent, Geriatric). Collaborates, communicates and coordinates with other health care team members in planning and implementing care. Assesses the needs of designated patients requiring hospitalization; initiates nursing admission database and discharge planning in collaboration with inpatient staff and physician. Cooperates and communicates effectively with other team members in order to accomplish the workload.
  • Communicates recognition of the patient's and family/significant others' psychosocial, cultural and emotional needs in each nurse-patient interaction. Orients patients and family/significant others to the role of the professional nurse and other health care team members, the nursing services available, and the means of access to those services. Reinforces orientation to the Consumer Bill of Rights and Responsibilities. Identifies the patient's educational needs as part of the nursing assessment. Develops an educational component for each nursing care plan. Provides teaching/counseling congruent with patients and family/significant others' learning needs and the medical plan of care. Encourages patient compliance with therapeutic and medical regimens. Teaching is based on scientific and behavioral knowledge.
  • Assesses patient lifestyle risk factors. Integrates health promotion and preventive aspects of care with the ongoing assessment of nursing care needs. Works with patient to develop a plan to improve general health status. Implements physical and psychological preventive measures. Promotes patient self-care responsibility for meeting their own health needs. Adheres to KFHPW documentation standards. Provides a safe environment for each patient and adheres to KFHPW safety standards. Adheres to KFHPW infection control standards and guidelines, including the guidelines for reporting communicable diseases.
  • Identifies own learning needs and participates in continued education programs to meet those needs. Participates in staff orientation and student education activities. Collaborates with managers in completing the process for self and colleague/team performance reviews. Assures quality of care through development, implementation and evaluation of professional nursing standards and participation in multidisciplinary quality assurance activities. Participates in professional activities. Participates in nursing research and incorporates research findings into nursing practice. Adheres to KFHPW personnel policies and maintains a high standard of professional work habits. Consistently demonstrates an appearance consistent with current KFHPW dress code policy.
  • Primary Care - Act as clinical resource for team member-review/anticipate patient needs, plan with the team & intervene when necessary. Participate in daily huddle, help solve unusual challenges. Identify high-risk patients using established criteria, coordinate multi-disciplinary team & resources to support patient care needs, provide care coordination/management for chronic medically complex or fragile patients. Incorporate prevention: address patient care need gaps into every visit; act as patient advocate. Assess, anticipate & accommodate for age-specific needs (all ages, pediatric, geriatric, etc.), anticipate & accommodate patient disabilities & limitation, access resources for interpretive services.
  • Medical Specialties - Allergy, Cardiology, Oncology, Neurology, Pulmonology, Dermatology, Diabetes Care, Consultative Internal Medicine, Urology, Endocrinology & more. Work with populations of patients to coordinate, manage, & evaluate care. Coordinate multi-disciplinary team resources to support care of complex patients. Perform complex nursing procedures such as: chemotherapy administration, pulmonary rehab, anticoagulation management pre/post procedures, nursing procedures requiring concurrent assessment of patients & clinical judgment for change in therapy.

  • Surgical Services - General Surgery, ENT, Women's Health, Ambulatory Surgery Centers, Procedures, Neurosurgery, Orthopedics & more. Patient/Family teaching & counseling for select complex procedures or high risk patients to enhance surgical outcomes & self-management pre- & postoperatively. Perform complex nursing procedures such as wound care, administer IV medications, and specialty specific procedures that require concurrent assessment of patient. Perioperative Services/Operating Room: provide nursing care of patients undergoing surgical or other invasive procedures. Work collaboratively to develop, coordinate, & implement a plan of care that is patient & outcome focuses.

  • Urgent Care - Use your ICU/ER background to take care of patients ranging from acute MI, sepsis, cardiac arrhythmias, & all other urgent & critical conditions. Work in close relationship with a team of MDs, Advanced Practice Providers with the support of a Social Worker.

  • Other - The Consulting Nurse Service provides high quality, consistent telephonic nursing advice 24 hours a day, 7 days a week including triage for acute & chronic care needs, care coordination & home care advice. Acute Care/Hospital Services: Assess, evaluate & perform tasks & duties to provide safe & quality care to medical, surgical & telemetry patients working with other disciplines such as physicians, dieticians, OT/PT to meet patient care needs.



    Basic Qualifications:
    Experience
  • N/A
    Education
  • Associates degree in Nursing from an accredited program.
    License, Certification, Registration
  • Current Washington State RN License by date of hire/transfer.


    Additional Requirements:
  • Communication, problem-solving, leadership and decision-making skills.


    Preferred Qualifications:
  • Ambulatory care nursing experience
  • Primary nursing or case management experience.

  • Bachelor of science in Nursing (BSN).


  •           Experienced PACU RN - Ambulatory Surgery Center (1.0 FTE, Bellevue) No Weekends, Holidays or On Call! - (Bellevue, Washington, United States)      Cache   Translate Page   Web Page Cache   
    Provide nursing care to a defined group of patients, adhering to Kaiser Foundation Health Plan of Washington ambulatory Nursing Care Standards, the Nursing Code of Ethics and Kaiser Foundation Health Plan of Washington policies. Coordinate and facilitate Health Care services for the patient in other segments of the Health Care delivery system. Provide and coordinate nursing care for the patient in collaboration with the Health Care team. The Registered Nurse is an integral member of the Health Care team, overseeing and participating in patient assessment and the formulation and implementation of the care plan.


    Essential Responsibilities:
  • Using the nursing process, provides ongoing assessment of the nursing care needs of a defined group of patients. Uses nursing diagnosis to describe this assessment. Develops a written plan of care for patient care needs. Assists patients and families/significant others in developing health care goals which are part of the individualized plan of care. Determines priorities of patient care based on essential patient needs and available resources. Provides nursing interventions safely and competently. Provides the patient and family/significant others with information preceding interventions. Provides telephone consultation to patients and family/significant others Provides ongoing evaluation of the patient's response to care. Anticipates and recognizes changes in the patient's status and need for nursing care. Modifies the individual plan of care in collaboration with the health care team.
  • Demonstrates understanding of the physiologic and psychological effects of normal aging by assessing, planning, implementing and evaluating care to meet the needs of those populations served. Demonstrates effective communication skills with those specific age populations served. Identifies own learning needs and participates in educational programs related to those age-specific patient populations served (Neonatal, Pediatric, Adolescent, Geriatric). Collaborates, communicates and coordinates with other health care team members in planning and implementing care. Assesses the needs of designated patients requiring hospitalization; initiates nursing admission database and discharge planning in collaboration with inpatient staff and physician. Cooperates and communicates effectively with other team members in order to accomplish the workload.
  • Communicates recognition of the patient's and family/significant others' psychosocial, cultural and emotional needs in each nurse-patient interaction. Orients patients and family/significant others to the role of the professional nurse and other health care team members, the nursing services available, and the means of access to those services. Reinforces orientation to the Consumer Bill of Rights and Responsibilities. Identifies the patient's educational needs as part of the nursing assessment. Develops an educational component for each nursing care plan. Provides teaching/counseling congruent with patients and family/significant others' learning needs and the medical plan of care. Encourages patient compliance with therapeutic and medical regimens. Teaching is based on scientific and behavioral knowledge.
  • Assesses patient lifestyle risk factors. Integrates health promotion and preventive aspects of care with the ongoing assessment of nursing care needs. Works with patient to develop a plan to improve general health status. Implements physical and psychological preventive measures. Promotes patient self-care responsibility for meeting their own health needs. Adheres to KFHPW documentation standards. Provides a safe environment for each patient and adheres to KFHPW safety standards. Adheres to KFHPW infection control standards and guidelines, including the guidelines for reporting communicable diseases.
  • Identifies own learning needs and participates in continued education programs to meet those needs. Participates in staff orientation and student education activities. Collaborates with managers in completing the process for self and colleague/team performance reviews. Assures quality of care through development, implementation and evaluation of professional nursing standards and participation in multidisciplinary quality assurance activities. Participates in professional activities. Participates in nursing research and incorporates research findings into nursing practice. Adheres to KFHPW personnel policies and maintains a high standard of professional work habits. Consistently demonstrates an appearance consistent with current KFHPW dress code policy.
  • Primary Care - Act as clinical resource for team member-review/anticipate patient needs, plan with the team & intervene when necessary. Participate in daily huddle, help solve unusual challenges. Identify high-risk patients using established criteria, coordinate multi-disciplinary team & resources to support patient care needs, provide care coordination/management for chronic medically complex or fragile patients. Incorporate prevention: address patient care need gaps into every visit; act as patient advocate. Assess, anticipate & accommodate for age-specific needs (all ages, pediatric, geriatric, etc.), anticipate & accommodate patient disabilities & limitation, access resources for interpretive services.
  • Medical Specialties - Allergy, Cardiology, Oncology, Neurology, Pulmonology, Dermatology, Diabetes Care, Consultative Internal Medicine, Urology, Endocrinology & more. Work with populations of patients to coordinate, manage, & evaluate care. Coordinate multi-disciplinary team resources to support care of complex patients. Perform complex nursing procedures such as: chemotherapy administration, pulmonary rehab, anticoagulation management pre/post procedures, nursing procedures requiring concurrent assessment of patients & clinical judgment for change in therapy.

  • Surgical Services - General Surgery, ENT, Women's Health, Ambulatory Surgery Centers, Procedures, Neurosurgery, Orthopedics & more. Patient/Family teaching & counseling for select complex procedures or high risk patients to enhance surgical outcomes & self-management pre- & postoperatively. Perform complex nursing procedures such as wound care, administer IV medications, and specialty specific procedures that require concurrent assessment of patient. Perioperative Services/Operating Room: provide nursing care of patients undergoing surgical or other invasive procedures. Work collaboratively to develop, coordinate, & implement a plan of care that is patient & outcome focuses.

  • Urgent Care - Use your ICU/ER background to take care of patients ranging from acute MI, sepsis, cardiac arrhythmias, & all other urgent & critical conditions. Work in close relationship with a team of MDs, Advanced Practice Providers with the support of a Social Worker.

  • Other - The Consulting Nurse Service provides high quality, consistent telephonic nursing advice 24 hours a day, 7 days a week including triage for acute & chronic care needs, care coordination & home care advice. Acute Care/Hospital Services: Assess, evaluate & perform tasks & duties to provide safe & quality care to medical, surgical & telemetry patients working with other disciplines such as physicians, dieticians, OT/PT to meet patient care needs.



    Basic Qualifications:
    Experience
  • N/A
    Education
  • Associates degree in Nursing from an accredited program.
    License, Certification, Registration
  • Current Washington State RN License by date of hire/transfer.


    Additional Requirements:
  • Communication, problem-solving, leadership and decision-making skills.


    Preferred Qualifications:
  • Ambulatory care nursing experience
  • Primary nursing or case management experience.

  • Bachelor of science in Nursing (BSN).


  •           Vehicle Exchange Specialist - AutoCanada Inc. - Winnipeg, MB      Cache   Translate Page   Web Page Cache   
    Update database with current emails, trade info &amp; payments, where they bought from etc.…. Vehicle Exchange Specialist....
    From AutoCanada Inc. - Thu, 09 Aug 2018 21:36:53 GMT - View all Winnipeg, MB jobs
              Veille de la semaine #32 de 2018      Cache   Translate Page   Web Page Cache   

    Et un peu hors-sujet :

    (En plus du flux RSS global, les billets veille et uniquement ceux là sont listés dans le flux RSS veille)


              RazorSQL 8.0.4 - Manage multiple databases from a single application. (Shareware)      Cache   Translate Page   Web Page Cache   

    RazorSQL allows you to query, update, navigate, and manage all major databases from one database tool. With RazorSQL, a SQL query tool, SQL editor, and database navigator, you can run SQL scripts, visually edit, create, alter, and view tables, import and export data, build queries with a query builder tool, and navigate databases with the database navigator. It even comes with a built-in relational database engine that requires no configuration.

    The SQL programming editor has syntax highlighting for SQL, PL/SQL, TransactSQL, SQL PL, and Java, automatic function/method lookup, automatic column lookup, key ahead, built-in and customizable templates, multi-tabular display of query results, query logging, and many other features including a tool to call stored procedures and a tool to compare table and/or query data.

    RazorSQL has been tested with virtually all popular databases, and includes built in driver support for Cassandra, DB2, Derby, DynamoDB, Firebird, FrontBase, Hive, HSQLDB, Informix, MongoDB, MySQL, OpenBase, Oracle, PostgreSQL, Redshift, Salesforce, SimpleDB, SQLite, SQL Azure, SQL Anywhere, SQL Server, Sybase, Teradata, and others.



    Version 8.0.4:
    • Redshift Database Browser: Added support for showing external tables via Redshift Spectrum
    • Salesforce: Added support for USING clauses in select queries
    • Increased the default query timeout from 300 seconds to 900 seconds
    • RazorSQL Plugins: Plugins now only load from the plugin directory under the user's home directory


    • OS X 10.7 or later
    • OS X 10.4-10.6 and 32-bit support in Related Links



    More information

    Download Now
              FileBot 4.8.2 - Quickly rename video or music files. (Commercial)      Cache   Translate Page   Web Page Cache   

    FileBot helps you easily and quickly organize and rename movies, TV shows, and music files.

    • Automatic naming. FileBot retrieves file information from various online databases but leaves room for you to manage file naming how you like using groovy expressions.
    • Add subtitles. Manually search for, download, and add subtitles using features built into FileBot.
    • Command-line functionality. FileBot features a simple command-line interface that makes all of FileBot's functionality available from the console or in automated scripts.


    Version 4.8.2:
    • Improved episode / movie auto-detection
    • Added {hdr} binding
    • Disable 0-termination when reading / writing xattr String values


    • OS X 10.10 or later



    More information

    Download Now
              How to Check for Non-Existence of Rows      Cache   Translate Page   Web Page Cache   
    You’re writing a query, and you wanna check to see if rows exist in a table. I’m using the free Stack Overflow database, and I wanna find all of the users who have not left a comment. The tables involved are: In dbo.Users, the Id field uniquely identifies a user. In dbo.Comments, there’s a UserId field...
              History in the Unmaking!      Cache   Translate Page   Web Page Cache   
    obama, obama jokes, political, humor, cartoon, conservative, hope n' change, hope and change, stilton jarlsberg, vault, archive, database, search, keyword, eight years, truth, lies, scandals, racism

    Miss Hope n' Change? Then head over to the all-new Stilton's Place! Fresh cartoons and commentary every Monday, Wednesday, and Friday from the Hope n' Change crew!


              It Takes a Sociopathic Village      Cache   Translate Page   Web Page Cache   
    obama, obama jokes, political, humor, cartoon, conservative, hope n' change, hope and change, stilton jarlsberg, chicago, kidnapping, torture, race, racism
    Boo Radley isn't going to like them, either.
    Barack Obama has announced that he will be making a farewell address to the citizens of Chicago next week, in part to "celebrate the way you've changed this country." We can't think of a better location, considering some of those "changes" include 762 murders in 2016, and the recent abduction and torture (with live Facebook streaming) of a mentally challenged white man by four black thugs, who used their time in the online spotlight laughing and spouting obscenities directed at Donald Trump and white people.

    When white lunatic Dylann Roof murdered nine black members of a South Carolina church, Barack Obama made clear his belief that nobody acts alone (even if they think they do), and larger sociological connections - and corrections - must be made.


    While that point can and should be debated (Obama himself denies his own "logic" every time a Muslim carries out an act of terror), it can't be debated that, even worse than a lone psychopath, there is something sicker and more inherently dangerous about a group of hate-filled people who joyfully torture another human and broadcast it to their friends. That's symptomatic of a culture of sociopathy, malignant and metastasizing.

    While it's easy and appropriate to lay some of the blame on media celebration of thugs, ho's, and the gangster life, we believe the larger share of guilt belongs to generations of Democrat policy makers - Obama most decidedly included - who have destroyed black families, the educational system, and the nation's inner cities in order to provide an unending source of enslaved voters who must rely on government entitlements for survival.

    Add to this the Obama administration's 8 year history of stoking racial fires, showing antagonism towards police, and their active encouragement of rioting in black communities as an appropriate and "understandable" response to acts of imagined racism.

    All of this has created a sickness in the soul of too many black Americans that is as representative of Obama's "legacy" as anything could possibly be. If the man had an ounce of honesty or integrity, he wouldn't be traveling to Chicago to boast of his "accomplishments" - he'd be going there to apologize.

    BONUS: A WORD ABOUT THE "RUSSIAN HACKING" INTELLIGENCE HEARINGS

    Bullshit.

    HOPE AND CHANGING...

    obama, obama jokes, political, humor, cartoon, conservative, hope n' change, hope and change, stilton jarlsberg, retiring

    We'll be talking more about this in the near future, but just to give everyone time to adjust to the idea (including ourselves), we're officially announcing that Hope n' Change Cartoons will be turning out the lights here on or slightly after the day Obama leaves office.

    Hope n' Change has existed with a specific purpose in mind: to comment on the many disasters associated with the Obama administration and the culture of liberalism, and to address those issues with enough humor to boost morale for those on the Right who've been fighting back. That job has been completed and we've got the empty scotch bottles to prove it.

    Mind you, we don't expect the world of politics to get any less ugly and ridiculous now - far from it. These are going to be tumultuous times and no political satirist is going to run out of raw material while Donald Trump is in office and Obama is heckling from the front row.

    But we're looking forward to finding new projects to work on, both personal and professional. A lot has been "back burnered" in the past 8 years, and we're not getting any younger (although oddly, we are getting more distinguished looking). We plan to do more things which are creative, fun and funny - and don't come with rigid (albeit self-assigned) deadlines throughout the week.

    A few additional points:

    • We intend to keep up an easy-to-find public profile.

    • This site will remain intact and we'll do whatever is necessary to keep it visible. There's a lot of history here!

    • Our Hope n' Change Facebook page will continue, although whether new cartoons get posted over there will be purely a matter of whether or not our graphics Tourette's syndrome kicks in.

    Johnny Optimism will continue as usual. Sick kids and life's unfairness never get old!

    • If you're on our mailing list, we're going to maintain the database so when we create another blog, write a book, or just want to stage a huge reunion party at some centrally located bar, we'll be able to reach you. If you're NOT on the mailing list, then add your information here before the end of the month.  It's free, there's no spam, and future historians will list you among the pantheon of heroes.

    There's a lot more that needs to be said, but we'll save that for another day. For now, just know how sincerely appreciated you are - and let's continue business as usual while enjoying the countdown to Barack Obama's final day in office!


              Mercury Marine- IT Mainframe Development Team Leader - Brunswick Corporation - Fond du Lac, WI      Cache   Translate Page   Web Page Cache   
    IMS DBMS Commands and database design. It is our people behind life’s passions who will make the big difference....
    From Brunswick Corporation - Thu, 17 May 2018 14:34:44 GMT - View all Fond du Lac, WI jobs
              Database Administrator - David Aplin Group - Saskatoon, SK      Cache   Translate Page   Web Page Cache   
    In addition, you will help manage Tier 2 Help Desk support, Database administration, security &amp; business analysis, desktop &amp; infrastructure support and aid the...
    From David Aplin Group - Thu, 02 Aug 2018 06:29:09 GMT - View all Saskatoon, SK jobs
              Illegal Logging Threatens Old Growth Forests In Central And Eastern Europe      Cache   Translate Page   Web Page Cache   
    Virgin forest in Ukrainian Carpathians © Mariia-Varvara ZakaliuzhnaVienna - WWF-Austria filed a complaint to the Federal Office for Forests (BfW) in Vienna as Austrian companies fail to implement the EU's Timber Regulation (EUTR). Recent reports of environmental organizations EIA (Environmental Investigation Agency) and Earthsight demonstrate several Austrian timber companies violated their commitments to stop sourcing wood from national parks in Romania. The research also revealed that up to 44% of Ukrainian timber exports to the EU may be illegal, and that a top Ukrainian official demanded illegal payments from foreign companies to supply them with cheap timber from local forests.

    "WWF has been working for years to find technical solutions for removing illegally harvested wood from the supply chains in the Carpathians and other regions in Central and Eastern Europe", said Ionut Sorin Banciu, Regional Forest Lead of WWF-Danube-Carpathian Programme. One technique used is promoting the transparency of wood harvesting and transportation in Romania, Ukraine and Bulgaria.

    In Romania, WWF has supported authorities to develop SUMAL, a best-practice system for tracing wood supply that includes a central database and a hotline people can call to report or verify the legality of wood shipments. National authorities recently accepted WWF proposals for updating and strengthening SUMAL in Romania.

    In Romania, WWF has also built and maintained a dedicated on-line platform  where all risks of illegal logging have been identified and mitigation measures have been proposed as solutions to be used by interested stakeholders or companies in their due diligence systems.

    In Ukraine, WWF and partners have established the Forest Watch programme, which relies on satellite imaging, drones, citizen volunteers and close cooperation with relevant authorities to monitor and identify illegal logging.

    WWF is supporting FSC Risk Assessments in Ukraine, Romania, Bulgaria and Slovakia as best available sources of information related to identifying  risks of illegal logging in these countries. It has also proposed mitigation measures which can be used by companies to address these risks.

    To support implementation of EU Timber Regulation in several Central and Eastern European countries, WWF has organized trainings, developed subsequent legislation for implementing legislation and elaborated guidelines to operators and traders. As a best practice example, WWF and competent Romanian authorities have developed together the first version of a risk map of illegal logging in the country.

    In Bulgaria, anyone may use the information on the WWF website to detect and report illegal logging in the country. Recently, WWF published an analysis of illegal logging in Bulgaria and proposed steps to address the issue.
              Data Analyst - Systematix - Edmonton, AB      Cache   Translate Page   Web Page Cache   
    Acquire data from primary or secondary data sources and maintain databases/data systems. We are Systematix and we are currently looking for a Senior Data...
    From Systematix - Sun, 08 Jul 2018 06:31:42 GMT - View all Edmonton, AB jobs
              Data Architect - Systematix - Calgary, AB      Cache   Translate Page   Web Page Cache   
    Acquire data from primary or secondary data sources and maintain databases/data systems. We are Systematix and we are currently looking for a Data Architect...
    From Systematix - Sun, 08 Jul 2018 06:31:42 GMT - View all Calgary, AB jobs
              IPSC session 2      Cache   Translate Page   Web Page Cache   

    Session 2: IP History and Theory,

    Stephanie Bair, IP Inequality
    Artists and innovators are not equally distributed. Rich people are more likely to acquire IP rights than poor people; whites than minorities in the US; males than females.  Theoretical lens: income inequality. Children from high-income families are 10x more likely to apply for a patent than children from low income families, even controlling for educational achievement. Only 18% of inventors were women. Brauneis/Oliar on ©.  Income inequality has similar race/gender aspects, and both IP and income inequality contribute to concentration of wealth in the hands of a few. Some people think income inequality is good b/c it encourages risk-taking.  Is the same true of IP inequality?  No, it doesn’t hold water b/c IP is already structured as an optional incentive system. If you want financial and status benefits, you can create something; what’s not required to serve this incentive function is relativity or inequality in the system itself—having more IP than others is not what’s driving the system.

    IP isn’t a perfect proxy for innovation, so there could be IP-related reasons for disproportionate participation in the formal IP system. Financial, cultural, value-based reasons. Or they could be disproportionately innovating in areas of IP that aren’t protectable, like social innovation. They could be denied IP rights at higher rates due to explicit/implicit bias, and there’s some empirical evidence of this in patent. Stereotypical male conception of innovation.  There is also a true innovation gap—people from certain groups are innovating at suboptimal levels.

    Role of exposure to other inventors/innovators—exposure to such a mentor increases likelihood that person from underrepresented group becomes an inventor.

    Psychology literature: Circumstances of poverty bias decisionmaking away from types of thought processes that lead to creative breakthroughs.  Effects of past chronic stress on explorative v. exploitative thinking—when people experience the world as harsh and unfair, people stick to what they know rather than exploring new options. Problematic from creativity perspective. Also, dichotomy b/t habit based and goal based decisionmaking. Chronic sleep deprivation, linked to poverty and racial subordination, contributes to habit based decisionmaking, which also hinders creativity. Even if IP system is fair and open, hard to respond to its incentives.

    [Woolf’s A Room of Her Own.  Time and leisure and space, mental and otherwise, are in short supply when people are overburdened with care work/survival work.]

    Jeremy Sheff: Effects of poverty on lived experience of individual poor people: if I don’t make a living, I won’t eat and my kids won’t eat.  Don’t need psychology to explain the absence of the capital/time required for innovation.

    A: this is additional to the explanations like that one.  Chetty study specifically found financial barriers to entry weren’t as important as one might have hypothesized in that if those barriers were absent but there wasn’t a mentor, it didn’t matter as much.  [People from poorer backgrounds who can make high incomes often feel pressure to do so to support others/justify the sacrifices made to get them there; perhaps a mentor can direct that in the direction of innovation.]

    Sean Pager: note that new innovation/creation from underrepresented groups may fill gaps that need filling, rather than more of the same.  Role of incubators set up by interest groups etc.?

    Copyright, Andrew Gilden, Copyright’s Market Gibberish

    Cases like Nunez and Bond v. Blum reject privacy as something w/in scope of market analysis. Other cases where Ps resist sale for any reason, like Salinger, reason that though Ps don’t want to sell these rights now, they might in the future, so there’s market harm; or they’ve sold similar photos/rights in the past and so have market-based rights now. Cases about political opponents: P isn’t allowed to say there’s market for headshots used by opponent, but Don Henley is allowed to presume a market for political licensing of his songs. Weirdly large body of caselaw about religious disputes: Lerma/Scientology.  Worldwide Church of God: P able to stop splinter group from using founder’s highly racist views—no financial interest in the work or interest in selling it, but court hypothesizes there’s still economic value to defeat fair use.

    Does not want to require actual/foreseeable harm to P’s market interests. Not possible to rigorously separate market and emotional reasons. There are distributive problems w/ economic only view—advantages those with track record of success in the market, like Salinger. [Though that doesn’t have to be the case if you use traditional, reasonable or likely to be developed as a standard.] Slicing apart economics and emotions have a disproportionate impact on women, minorities, and the poor, whose injuries are less likely to be valued highly (or at all) in monetary terms.  “Coddling artistic vanity” is a gendered concept w/no place in the © system. Author’s right to change “his” mind and eventually sell a sex tape; courts use “his” and not “her” in this framing.  Courts should instead openly and explicitly discuss the interests that they are actually weighing.  Basis in the statutory text: effect on the potential market for, or value of, the copyrighted work, stated in the disjunctive.  Video Pipeline: © isn’t just about monetary compensation.  We have developed a good taxonomy of defendants who should be allowed to copy and not a good taxonomy of plaintiffs who should be able to assert nonmonetary interests.

    Likely pushback: expand © in problematic ways.  He thinks it will help reign in abuses and censorship. We can distinguish between privacy and autonomy and online business reviews or efforts to suppress political opponents.  In cases where courts do openly discuss privacy/religious interests, they do so to deny claims, so expansion of © comes from opacity.  If courts can be open and explicit about noneconomic interests, so can parties, which means that remedies can be tailored to those interests.

    Annemarie Bridy: Longstand policy choice not to have moral rights in ©.  Your argument seems to be that courts are backdooring this through market harm, so let’s just embrace it. Normatively I would be inclined to hold the line and criticize the cases. © is looking for public benefits and that generally happens through markets/dissemination, so we should keep that.

    A: don’t take a strong stance on what the balance should be, saying that the cases are wrongly framed as market interests v free speech rather than surfacing the conflict. [Shouldn’t the criticism then be that the cases making up fake market interests shouldn’t do that?] He doesn’t think there should be a cause of action for mutilation/distortion, but actual copying cases should consider the motivation behind the invocation of ©. There’s no way to distinguish economic/emotional motivations.

    Bridy: but isn’t that what the fair use factors are for, testing for the right motivation in asserting a 106 claim?  If you aren’t experiencing harm under 107, you shouldn’t win.

    A: but you can’t actually police that because of the market language that non-market Ps are able to use.  We can’t draw those lines.

    Q: Why not tell these Ps that they should bring privacy claims if they have privacy interests, not © claims?

    A: then we have to ask why they don’t—it’s b/c of weaknesses in those cases. [But why does that mean it should matter to the fair use analysis?]  Selective access to privacy protection through © is the worst of all worlds.

    [Yeah, I have the likely pushback. Allowing “value” to mean “nonmonetary value” creates what I call the “Centerfold” problem: I may feel bad that you made a critical, fair use, and the work may now feel contaminated to me, but I don’t believe that the law should weigh that against fair use.]

    Dustin Marlan, Unmasking the Right of Publicity
    Protecting the internal dimensions of the person is generally considered the role of privacy, not publicity rights. Jerome Frank’s conception was very influential.  Now a hydra-like right, merchandising, endorsement, and “impressment.” Similar to intrusion upon seclusion, false light, etc. in terms of privacy categorization, but what caused this bifurcation between economic interests and personhood/privacy interests? What is the persona—“mask”—for publicity rights? Might be based on Franks’ own conception of a self split into the private true self and the public false self which is constructed and commodified.  Haelan was the first recognition legally of the persona as an assignable, alienable right independent of the right of privacy.  Frank had been psychoanalyzed and recommended it to his colleagues; wrote about psychological concepts of the law in which judges were father-substitutes making the pretense that law was clear and precise.  He was a fact-skeptic, believing that uncertainty in judicial process resulted not just from uncertainty in law but uncertainty in judge’s perception of facts—law varies w/judge’s personality.

    Consider other concepts of the self that better integrate privacy and publicity: Julie Cohen’s postliberal approach to the problem of selfhood is relevant to both: subjectivity emerges gradually, shaped but not determined by surroundings, situated within relationships, practices and beliefs. Celebrity as a mask that eats into the face (hey, I wrote a thing about that)—may be impossible to distinguish them in the way the law now presumes.

    Shyam Balganesh: wonders whether other stuff in Frank’s life was more important than his earlier book—Frank himself was very clear about his academic persona versus his judicial persona.

    Copyright, Christopher Yoo, Are Ideas Independent from Expression: Implications of Linguistics and Cognitive Science for Copyright

    Sapir-Whorf: language structures our worlds, determines our actions, constrains our thoughts. Steven Pinker believes that we think in mentalese: we have a concept of blue that is independent of the word for blue.  Even though Korean treats blue and green the same, Pinker thinks there’s something innate, as does Noam Chomsky who posits a universal grammar and that language/acquisition can be studied out of context.  “Colorless green ideas sleep furiously” is grammatically correct even though it is meaningless—there’s an inherent structure.  Another version of language is agglutinative, with verb at end and particles changing the meaning, like Finnish, Hungarian, Korean, Japanese—another major form that just happens to manifest in different parts of the world b/c there are a limited number of ways to structure language.  Now: renaissance of interest in Sapir-Whorf—studies of directional languages/thinking.  Huge controversy about which way causality runs.  Inuits have multiple words for snow, but the number is in dispute and they need them. 

    Implications for ©: Paramount v. Axanar—unauthorized Star Trek prequel; Paramount asserts © in Klingon as a language.  Natural languages aren’t copyrightable, but what about constructed languages that originated from a creative work but are now spoken by people? Axanar case says it’s a jury question. Sapir says language is an agreement b/t people to communicate on certain terms. Doesn’t have to be formal agreement, but genericide is an example: by practice we use thermos to mean a thing.  Tolkien’s estate asserts © in Elvish but doesn’t assert rights in noncommercial uses.  See also Esperanto, Loglan, Na’avi, Dothraki.  Loglan is a constructed language to test the Sapir-Whorf hypothesis, to see if they thought differently when using it; creator asserted © to stop others from using, which seems self-contradictory.

    Wikipedia and Aboriginal languages: Tasmanian palawa kani is an attempt to synthesize fragments of 12 extinct indiginous languages and promote its use. Wants to set rules on who can use it, claiming under UN Declaration of Human Rights of Indigenous Peoples, not copyright. Raises how shared language can define a community. Wikipedia rejected request for removal.

    Oracle v. Google: can’t © overall computer language, but a specific computer program can be. Where is API in that scheme?  Fed. Cir. reversed two jury verdicts saying it was ok. This is about levels of generality/taxonomies.  Reminiscent of Nichols v. Universal Pictures; EU came out the other way.

    Other implications: right to speak a particular language; importance of gendered speech.

    Pam Samuelson: how would you rule on computer languages developed in order to become “lingua” of that community versus things that are more artistic such as Klingon? What tool do you use? She thinks of language as system with structure & component elements.

    A: the way statute is drafted excludes all that. We have a generality problem. He would draw the line at functionality. Similar to transformative use—now w/database cases it’s about making creative works more useful rather than more/differently creative.  Tolkien’s Elvish: Kind of like laches—once you let it loose in the world, other people should be able to use.

    Justin Hughes: Malaysian/Ba’ahasa was a pidgin/trading language for coastal peoples, built into a language—this seems like a functional purpose.

    Betsy Rosenblatt: you talk about genericide; we don’t protect systems b/c we think they’re functional. To the extent that it’s a communication tool, it’s functional even if it is expressive in the origin. So wouldn’t draw a line b/t Klingon and Java b/c they are both building blocks.

    A: Coders say code is beautiful but most of them don’t do that in their daily work.  Klingon was designed by linguists.


              Lead Developer/Technical Sales Support - ImageX - Vancouver, BC      Cache   Translate Page   Web Page Cache   
    Proficiency in Linux administration, Apache configuration, MySQL database design, and PHP web development. We’re looking for a web coding whiz with experience...
    From ImageX - Sat, 16 Jun 2018 06:51:11 GMT - View all Vancouver, BC jobs
              Drupal Developer - ImageX - Vancouver, BC      Cache   Translate Page   Web Page Cache   
    Advanced proficiency in LAMP stack (Linux administration, Apache configuration, MySQL database, and PHP web development)....
    From ImageX - Wed, 09 May 2018 10:29:40 GMT - View all Vancouver, BC jobs
              Dan Langille: PostgreSQL – convert a user to a role      Cache   Translate Page   Web Page Cache   

    Users and Roles in PostgreSQL are very similar. When I set up the FreshPorts database back in mid-2000, I was using PostgreSQL 7.0.3 (that’s my best guess based on my blog entry). I suspect roles were not available then and were introduced with PostgreSQL 8. I am positive someone will correct me if that’s wrong.

    I now have a need to convert a user into a role, then add users to that role. Let’s see what happens.

    I’m doing this on my development server, so there’s no concurrent access issue. I’ll just turn stuff off (disable the webserver, the scripts, etc).

    Creating the new users

    begin;
    ALTER ROLE www NOLOGIN;
    CREATE USER www_dev  WITH LOGIN PASSWORD '[redacted]' IN ROLE www;
    CREATE USER www_beta WITH LOGIN PASSWORD '[redacted]' IN ROLE www;

    That went well, so I issued a COMMIT.

    The two new users will have the same permission as the original user.

    Changing the login

    The login credentials will need to be changed. This is my update:

    #       $db = pg_connect("host=pg02.example.org dbname=freshports user=www password=oldpassword sslmode=require");
            $db = pg_connect("host=pg02.example.org dbname=freshports user=www_beta password=newpassword sslmode=require");

    Access rights

    I also updated pg_hba.conf for this server.

    #hostssl freshports      www          10.0.0.1/32             md5
    hostssl  freshports      www_beta     10.0.0.1/32             md5

    After changing pg_hba.conf, you have to tell PostgreSQL about it. This is the FreeBSD command for that:

    sudo service postgresql reload

    It just worked

    I was impressed with how straight forward this was. https://beta.freshports.org/ came right up.

    I have three other users to convert to roles but if it’s as easy as the above, I should be finished in time for dinner.


              Data Analyst 4      Cache   Translate Page   Web Page Cache   
    CA-San Ramon, job summary: Summary: Client is seeking a Data Analyst to coordinate changes to computer databases, test, and implement the database applying knowledge of database management systems. Job Responsibilities: • Executes test, data extraction, and analysis utilizing the department's various computer software packages within established deadlines. • Prepares, and documents detailed specifications of th
              Database Engineer      Cache   Translate Page   Web Page Cache   
    OH-Columbus, RESPONSIBILITIES: Kforce has a client seeking a Database Engineer in Columbus, Ohio (OH). REQUIREMENTS: Proficient in Big Data application development skills as well as multiple design techniques Working proficiency in Big Data development toolset to design, develop, test, deploy, maintain and improve software Strong understanding of Agile methodologies with ability to work in at least one of the
              GiST Support In GPORCA      Cache   Translate Page   Web Page Cache   

    Introduction

    Pivotal’s SQL Optimizer, GPORCA, does not handle GiST indexes, making any GPORCA generated plan extremely slow when the input grew large. In this blog post, we will look at what GiST indexes are, how we implemented them in GPORCA, and the resulting performance improvement.

    What are GiST Indexes?

    GiST stands for Generalized Search Trees. These trees are a template structure that allows a user to create an index in a database on any complex data type, provided they define a set of seven methods. It is a balanced tree-structured access method that allows users to do more than just the standard less than “<” , equal to “=” or greater than “>” queries when doing an index scan. GiST indexes are particularly great for ranges as well as full text search. Furthermore, using the user-defined methods, GiST tries to cluster data in a way that creates as little overlap as possible.

    In order to create a GiST index, the user must define 7 functions: the Consistent[1], Union[2], Compress[3], Decompress[4], Penalty[5], Picksplit[6] and Same[7] methods. Then GiST will do the rest of the underlying work required of an index, such as reindex-ing and vacuuming. More information about GiST indexes can be found here: http://gist.cs.berkeley.edu/ or at PostgreSQL 9.5 here: https://www.postgresql.org/docs/9.5/static/gist.html

    The user must also define functions for the custom data type that would be used in the predicate. For example, PostGIS has a function called ST_DWithin that returns true given the two points are within a specified distance of each other. We could then use it in a query such as SELECT * FROM foo, bar where ST_DWithin(foo.a, bar.b, 0.0005), which would give all the rows where point ‘a’ from foo and point ‘b’ from bar are within 0.0005 meter from each other.

    Greenplum DB ships with operator classes for some data types (such as Point, Box or Polygon) that can use a GiST index but it is also possible to install extensions like PostGIS that include data types like geometry which can can be used in a GiST index.

    Introduction to GiST in the Query Optimizer

    In the Greenplum Database, there are two query optimizers: Planner and GPORCA (designed specifically for the MPP environment to help accelerate queries). Currently, Planner in Greenplum Database supports GiST indexes and can generate an optimal plan that efficiently uses the GiST index available. However, GPORCA - Pivotal’s SQL Optimizer - is not GiST aware and therefore selects a query plan that does not use any available GiST indexes. The result: a query plan that takes orders of magnitudes longer than a plan that uses the GiST index.

    Say that we had two tables called foo and bar that each had a column called geom of type geometry. Geometry is a GiST-indexable data type from PostGIS that is commonly used for spatial and geographical queries. We now want to find the number of points that are within 0.0005 meters of each other.

    Since it is not GIST-aware, the optimal plan generated by GPORCA uses two Table Scans inside a nested loop join. This can be significantly slow in execution if the tables have a large number of rows.

    Original GPORCA Generated Plan

    EXPLAIN SELECT count(*) FROM foo, bar WHERE ST_DWITHIN(foo.geom, bar.geom, 0.0005);
                                                 QUERY PLAN
    ----------------------------------------------------------------------------------------------------
     Aggregate  (cost=0.00..11647466.55 rows=1 width=8)
       ->  Gather Motion 3:1  (slice2; segments: 3)  (cost=0.00..11647466.55 rows=1 width=8)
             ->  Aggregate  (cost=0.00..11647466.55 rows=1 width=8)
                   ->  Nested Loop  (cost=0.00..11647466.55 rows=26995466 width=1)
                         Join Filter: foo.geom && st_expand(bar.geom, 0.0005::double precision) AND bar.geom && st_expand(foo.geom, 0.0005::double precision) AND _st_dwithin(foo.geom, bar.geom, 0.0005::double precision)
                         ->  Broadcast Motion 3:3  (slice1; segments: 3)  (cost=0.00..431.18 rows=300 width=32)
                               ->  Table Scan on bar  (cost=0.00..431.00 rows=100 width=32)
                         ->  Table Scan on foo  (cost=0.00..443.11 rows=333654 width=32)
     Optimizer status: PQO version 2.65.1
    Time: 226.372 ms
    
    
    SELECT count(*) FROM foo, bar WHERE ST_DWITHIN(foo.geom, bar.geom, 0.0005);
     count
    -------
      1921
    (1 row)
    Time: 302930.381 ms
    

    This plan generated by GPORCA takes a total of 303 seconds in execution, which is quite long for a simple nested loop join. In contrast, the same query run by the planner using the GiST index in its plan, produced the results in under a second.

    Planner Generated Plan

    EXPLAIN SELECT count(*) FROM foo, bar WHERE ST_DWITHIN(foo.geom, bar.geom, 0.0005)
                                                 QUERY PLAN
    ----------------------------------------------------------------------------------------------------
    Aggregate  (cost=702871.96..702871.97 rows=1 width=8)
       ->  Gather Motion 3:1  (slice2; segments: 3)  (cost=702871.89..702871.94 rows=1 width=8)
             ->  Aggregate  (cost=702871.89..702871.90 rows=1 width=8)
                   ->  Nested Loop  (cost=93.11..702871.64 rows=34 width=0)
                         Join Filter: bar.geom && st_expand(foo.geom, 0.0005::double precision) AND _st_dwithin(foo.geom, bar.geom, 0.0005::double precision)
                         ->  Broadcast Motion 3:3  (slice1; segments: 3)  (cost=0.00..18.00 rows=300 width=32)
                               ->  Seq Scan on bar h  (cost=0.00..6.00 rows=100 width=32)
                         ->  Bitmap Heap Scan on foo  (cost=93.11..753.92 rows=34 width=32)
                               Recheck Cond: foo.geom && st_expand(bar.geom, 0.0005::double precision)
                               ->  Bitmap Index Scan on foo_geom  (cost=0.00..93.09 rows=34 width=0)
                                     Index Cond: foo.geom && st_expand(bar.geom, 0.0005::double precision)
    Time: 1.988 ms
    
    SELECT count(*) FROM foo, bar WHERE ST_DWITHIN(foo.geom, bar.geom, 0.0005);
     count
    -------
      1921
    (1 row)
    Time: 87.074 ms
    

    As can be seen above, the plan generated by the planner is at least 3000x (87ms vs 302930ms) faster than GPORCA.

    Implementing GIST support in ORCA

    In order to find the fastest way to execute these SQL queries using GiST indexes, GPORCA needs to become GiST aware. To achieve this, GPORCA needs to first receive information regarding the GiST index and it needs to know how to generate plans using the index information.

    When a SQL statement is given, the information is first translated into DXL (a system-independent XML representation of the query) and sent to GPORCA to be optimized. During this process, only the information necessary for the query and basic information about the involved tables are sent. This can include statistic information, whether or not the table contains an index, and what type of index it is. Since GPORCA did not implement support for GiST indexes, we did not send any GiST index information over at all. This meant that any table with a GiST index was sent to GPORCA as a table that contained no index at all.

    Initial Steps

    The first step of this process: send information about GiST indexes to GPORCA. In Planner, GiST indexes are treated as a general index. What this means is that GiST indexes can follow either the Bitmap Index path or the B-Tree index path when creating a plan. That is, during the intermediate stages of planning, GIST indexes appear either as Bitmap Indexes or B-Tree indexes. But, when the plan is finally executed, , the executor recognizes (based off the index’s unique access method id) that the actual index to be used during execution is the GiST index and not the index type printed in the plan.

    When sending index information, GPORCA requires a few key components: The index’s unique access method id, the index’s type and the columns the index is on. For Bitmap and B-Tree, which GPORCA is already aware of, the index type is, respectively, Bitmap and Btree.

    Our next step was to determine whether a new index type was required for GiST indexes. We tried sending over GiST index information with the correct unique access method id, but with the index type as type Bitmap. We quickly realized that though this was feasible, there are certain conditions that are GiST specific. For example, Bitmap indexes can only be used if the predicate is a standard predicate. However, with GiST, standard predicates are almost never used. In order to make an ORCA generated plan using GiST while following the Bitmap Index path, we needed to either set the predicate type as a standard query (which is not ideal) or we needed to be able to differentiate when we were working with a GiST index versus a Bitmap Index. When sending the index over as a Bitmap type, we lost the ability to make such distinctions within GPORCA’s optimization process and the ability to generate a B-Tree path for GiST indexes. So, in order to deal with this, any solution to make GPORCA GiST aware would involve the creation of a new index type within GPORCA specifically for GiST so that a distinction could be made between different index types when necessary.

    With the addition of the new GiST index type, we considered two implementation alternatives in GPORCA:

    Alternative 1

    The first alternative is to mimic what the planner does. GPORCA could allow GiST indexes to take either the B-Tree or Bitmap path, generating alternatives for both before picking an optimal plan during costing.

    Pros Cons
    - Use of existing optimized paths - Costing would be done based off path taken instead of a GiST specific cost model
    - No additional changes necessary to be able to execute the plan generated - GiST indexes would be disabled if bitmap and btree indexes are disabled.
    - Similar to an implementation that has already proven to work (planner)
    - Support for partitioned tables and Append-Only tables would alredy be implemented

    Alternative 2

    Instead of allowing GiST indexes to follow either the B-Tree or Bitmap path, GPORCA would have a separate path in the code base (much like how Bitmap and Btree do) that would be specific to GiST. This would allow a different alternative altogether separate from the B-Tree and Bitmap path with its own costing and transforms.

    Pros Cons
    - A GiST specific path that could be configurable via GUCs - Duplication of existing code by creating new transforms/classes
    - A cost model specific to GiST - Addition of Executor nodes/or a translation back into existing nodes
    - Adding support for partitioned tables and Append-Only tables would be slow and incremental

    Implementation and Performance Improvements

    When exploring the first alternative, we realized that the addition of the new index type and a few extra conditional checks, GiST would have full support in GPORCA. This includes partitioned tables as well as Append Only Row / Column Oriented tables. In contrast, research into the second alternative indicated that much of the Bitmap and B-Tree transforms would have been duplicated in the process of creating a GiST transform. An additional node would also need to be added to the executor for a GiST specific scan as well.

    By choosing the first alternative we were able to take advantage of the existing paths for indexes in GPORCA, allowing for full GiST support while minimizing code duplication. Going back to our motivating PostGIS example, we see that plan generated by GPORCA now matches that created by the planner.

    GiST Aware GPORCA Generated Plan

    EXPLAIN SELECT count(*) FROM foo, bar WHERE ST_DWITHIN(foo.geom, bar.geom, 0.0005);
                                                 QUERY PLAN
    ----------------------------------------------------------------------------------------------------
    Aggregate  (cost=0.00..344541.02 rows=1 width=8)
       ->  Gather Motion 3:1  (slice2; segments: 3)  (cost=0.00..344541.02 rows=1 width=8)
             ->  Aggregate  (cost=0.00..344541.02 rows=1 width=8)
                   ->  Nested Loop  (cost=0.00..344541.02 rows=26995466 width=1)
                         Join Filter: true
                         ->  Broadcast Motion 3:3  (slice1; segments: 3)  (cost=0.00..431.18 rows=300 width=32)
                               ->  Table Scan on bar  (cost=0.00..431.00 rows=100 width=32)
                         ->  Bitmap Table Scan on foo  (cost=0.00..344015.35 rows=37963 width=1)
                               Recheck Cond: foo.geom && st_expand(bar.geom, 0.0005::double precision)
                               Filter: bar.geom && st_expand(foo.geom, 0.0005::double precision) AND _st_dwithin(foo.geom, bar.geom, 0.0005::double precision)
                               ->  Bitmap Index Scan on foo_geom  (cost=0.00..0.00 rows=0 width=0)
                                     Index Cond: foo.geom && st_expand(bar.geom, 0.0005::double precision)
     Optimizer status: PQO version 2.65.1
    Time: 265.687 ms
    
    SELECT count(*) FROM foo, bar WHERE ST_DWITHIN(foo.geom, bar.geom, 0.0005);
     count
    -------
      1921
    (1 row)
    Time: 309.304 ms
    

    Notice that GPORCA now uses a Bitmap Index Scan in the plan generated instead of a Table Scan. The use of a Bitmap Index Scan in the above plan indicates that the GiST index took the Bitmap path to create the plan. While the plan itself says Bitmap, when the query goes to execution, the actual index used is the GiST index.

    The query execution time reduced to 309 milliseconds from 300 seconds, which is 1000x faster than what it was performing before GiST support. Meanwhile, GPORCA’s query optimization time stays the same (around 250 ms).

    After an initial run of the installcheck-good test suite for GPDB, we observed a clear performance improvement among the different test cases, even with the addition of 4 new tests.

    Test Name Before After % Improvement
    qp_gist_indexes2 196.23 sec 110.62 sec 44%
    qp_gist_indexes3 19.83 sec 13.75 sec 33%
    qp_gist_indexes4 67.67 sec 50.66 sec 25%

    Future Work

    While GiST is now supported in GPORCA, there is still more work to be done. In regards to GiST indexes themselves, they currently do not support partial indexes or index expressions (such as IS NULL or NOT). The cost model still follows that of the Bitmap/B-Tree indexes and further performance tests are necessary to determine the best cost model for GiST indexes.

    Additionally, there are other indexes that are not yet supported in GPORCA such as GIN or Hash indexes. However, these can be implemented in a manner similar to GIST index.

    Conclusion

    GiST indexes are a versatile template index structure that allows for the creation of indexes on custom data types. In the Greenplum Database, GPORCA originally did not handle GiST indexes, making any GPORCA generated plan extremely slow when the input grew large. We compared two different alternatives and chose the path that avoided excessive code duplication. Our final fix took advantage of existing index paths in GPORCA to allow the creation of GiST index plans. This created no/minor differences in the time it took to optimize, but is 1000x faster to run than the original plan.

    Footnotes

    [1] Consistent returns false if, given a predicate on a tree page, the user query and predicate is not true, and returns maybe otherwise.

    [2] Union consolidates information in the tree.

    [3] Compress converts the entry into a suitable format for storage. This is usually what makes GiST indexes lossy.

    [4] Reverse of compress.

    [5] Penalty tells you the cost of inserting the entry into a path would be, it will pick the cheapest path.

    [6] PickSplit helps decide which entries go to which page when an insert requires a page split.

    [7] Same returns true if the two entries are the same.


              mariadb 10.1.35-1 x86_64      Cache   Translate Page   Web Page Cache   
    Fast SQL database server, drop-in replacement for MySQL
              today's howtos      Cache   Translate Page   Web Page Cache   

    read more


              GNOME Development Updates      Cache   Translate Page   Web Page Cache   
    • libgepub + rust

      In 2010 I was working with evince, the gnome PDF document viewer, trying to add some accessibility to PDF files. That was really hard, not because GTK+ or ATK technology but because the PDF format itself. The PDF format is really cool for printing because you know that the piece of paper will look the same as the PDF doc, and because it's vector it scales and don't loose quality and files are smaller than image files, but almost all PDF files have not any metadata for sections, headings, tablets or so, this depends on the creation tool, but it's really hard to deal with PDF content text, because you don't know event if the text that you're reading is really in the same order that you read from the PDF.

      After my fight against the PDF format hell and poppler, I discovered the epub format that's a really simple format for electronic books. An epub is a zip with some XML files describing the book index and every chapter is a xhtml and xhtml is a good format compared to PDF because you can parse easily with any XML lib and the content is tagged and well structured so you know what's a heading, what's a paragraph, etc.

      So I started to write a simple C library to read epub files, thinking about add epub support to evince. That's how libgepub was born. I tried to integrate libgepub in evince, I've something working, rendering with webkit, but nothing really useful, because evince needs pages and it's not easy to split an xhtml file in pages with the same height, because xhtml is continuous text and it adapts to the page width, so I give up and leave this branch.

    • My final report for GSoC 2018

      The Google Summer of Code 2018 is coming to an end for me, so it means that it’s time for the final report!

      [...]

      I’ve created a media (although for now it only works with pictures) viewer for Fractal. Its purpose is to easily have a better view of the images within a room, to be able to zoom in and out of them, to navigate between the different images of the room in the chronological order, to enter in a full screen mode and to save a copy of the media in the filesystem. I made a first implementation and then had to do a lot of other improvements. I’ve spent about a month working on it.

      There is still the need to improve the zoom of the media viewer as the pictures are a little bit blurred and it’s not possible to zoom beyond 100%. There are optimizations to do as the application becomes very slow when trying to zoom beyond 100% on large pictures.

    • GUADEC 2018

      A few weeks ago I attended GUADEC in Almeria, Spain. The travel was a bit of an adventure, because Julian and I went there and back from Italy by train. It was great though, because we had lots of time to hack on Fractal on the train.

      [...]

      On Monday I attended the all-day Librem 5 BoF, together with my colleagues from Purism, and some community members, such as Jordan and Julian from Fractal.

      We talked about apps, particularly the messaging situation and Fractal. We discussed what will be needed in order to split the app, make the UI adaptive, and get end-to-end encryption. Daniel’s work on the database and Julian’s message history refactor are currently laying the groundwork for these.

      On the shell side we talked through the design of various parts of the shell, such as keyboard, notifications, multitasking, and gestures. Though many of those things won’t be implemented in the near future, we have a plan for where we’re going with these, and getting designers and developers in one room was very productive for working out some of the details.

      We also discussed a number of exciting new widgets to make it easier to get GNOME apps to work at smaller sizes, such as a new adaptive preferences window, and a way to allow modal windows to take up the entire screen at small sizes.

    read more


              Red Hat and Fedora      Cache   Translate Page   Web Page Cache   
    • Women in IT Awards USA winner: Margaret Dawson, Red Hat

      Margaret has led teams at companies ranging from startups to Fortune 500 firms including Amazon, Microsoft and HP. She grew up in Detroit and began her career in the automotive industry, an experience that helped her feel at home in the similarly male-dominated technology sector.

      She has a passion for mentoring women in technology and has made it her mission to share the lessons she has learned with others and to mentor them in their own journeys.

    • How do tools affect culture?

      Most of the DevOps community talks about how tools don’t matter much. The culture has to change first, the argument goes, which might modify how the tools are used.

      I agree and disagree with that concept. I believe the relationship between tools and culture is more symbiotic and bidirectional than unidirectional. I have discovered this through real-world transformations across several companies now. I admit it’s hard to determine whether the tools changed the culture or whether the culture changed how the tools were used.

    • GPU Accelerated SQL queries with PostgreSQL & PG-Strom in OpenShift-3.10

      In the OpenShift 3.9 GPU blog, we leveraged machine learning frameworks on OpenShift for image recognition. And in the How To Use GPUs with DevicePlugin in OpenShift 3.10 blog, we installed and configured an OpenShift cluster with GPU support. In this installment, we will create a more sophisticated workload on the cluster – accelerating databases using GPUs.

      One of the key parts of any machine learning algorithm is the data (often referred to as the data lake/warehouse, stored as structured, semi-structured or unstructured data).

      A major part of machine learning pipelines is the preparation, cleaning, and exploration of this data. Specifically removing NAs (missing values), transformations, normalization, subsetting, sorting, and a lot of plotting.

    • Red Hat, Inc. (RHT) stock returned -15.52% negative Quarterly performance
    • Red Hat Inc (RHT) CEO & President James M Whitehurst Sold $6.3 million of Shares
    • Sigma Planning Corp Increases Position in Red Hat Inc (RHT)
    • PHPUnit 7.3

      RPM of PHPUnit version 7.3 are available in remi repository for Fedora ≥ 25 and for Enterprise Linux (CentOS, RHEL...).

    • Reducing the use of non-glibc allocators in Fedora

      Memory allocation for applications is a bit of a balancing act between various factors including CPU performance, memory efficiency, and how the memory is actually being allocated and deallocated by the application. Different programs may have diverse needs, but it is often the kind of workload that the application is expected to handle that determines which memory allocator performs best. That argues for a diversity of memory allocators (and allocation strategies) but, on the other hand, that complicates things for Linux distributions. As a result, Fedora is discussing ways to rein in the spread of allocators used by its packages.

    • Copr has a brand new API

      New Copr version is here and after several months of discussions and development, it finally brings a brand new API. In this article, we are going to see why it was needed, how it is better than previous API versions (i.e. why you should be happy about it) and try some code samples.

    read more


              Dental Office Manager - Smilebuilders Dentistry Inc. - Canton, MS      Cache   Translate Page   Web Page Cache   
    Skill in operating personal computer utilizing word processing, spreadsheets, databases and email. WE WILL NOT TAKE ANY PHONE CALLS FROM APPLICANTS!!!!...
    From Indeed - Wed, 27 Jun 2018 15:29:59 GMT - View all Canton, MS jobs
              WhatsApp漏洞分析      Cache   Translate Page   Web Page Cache   

    本文翻译自:
    https://research.checkpoint.com/fakesapp-a-vulnerability-in-whatsapp/

    作者:Dikla Barda, Roman Zaikin,Oded Vanunu


    WhatsApp拥有用户15亿,有超过10亿个群组,每天发送消息超过650亿(2018年初数据)。大量的用户和消息规模下,出现垃圾邮件、谣言、虚假消息的概率也很大。

    Check Point研究人员近期发现WhatsApp中存在漏洞,攻击者利用漏洞可以拦截和伪造个人聊天和群组聊天会话消息,这样攻击者就可以传播垃圾邮件、谣言、虚假消息了。

    研究人员发现了三种利用该漏洞的攻击方法,这三种方法都是用社会工程技巧来欺骗终端用户。攻击者可以:
    用群组聊天中的引用(quote)特征来改变发送者的身份,即使发送者不是群成员;
    修改其他人的回复消息(以发送者的口吻);
    伪装成公开消息,发送私聊消息给另一个群组成员,当目标个人回复后,会话中所有人都会看到该消息。

    https://www.youtube.com/embed/rtSFaHPA0C4

    技术分析

    WhatsApp会加密发送的消息、图片、语言通话、视频通话和所有形式的内容,这样只有接收者能看到。但不止WhatsApp可以看到这些消息。

    image

    图1: WhatsApp加密的聊天

    研究人员决定分析加密过程,对算法进行逆向来解密这些数据。解密了WhatsApp的通信后,研究人员发现WhatsApp使用的是protobuf2协议。

    把protobuf2数据转变成json数据就可以看到发送的真实参数,然后研究人员伪造了参数数据来验证WhatsApp的安全性。

    研究人员利用Burp Suit Extension and 3 Manipulation方法对其进行研究。
    在伪造之前,研究人员先获取了session的公钥和私钥,并填入burpsuit扩展中。

    访问密钥

    在QR码生成之前,可以从WhatsApp web端的密钥生成阶段获取密钥:

    image

    图2: 通信用的公钥和私钥

    想要获取密钥,就要获取用户扫描QR码后手机发给WhatsApp web端的秘密参数:

    image

    图3: WebSocket中的秘密密钥

    扩展给出的结果:

    image

    图4: WhatsApp Decoder Burp Extension

    点击连接(connect)后,扩展会连接到扩展的本地服务器,服务器会执行扩展所需的所有任务。

    修改WhatsApp

    解密了WhatsApp的通信后,就可以看到手机端WhatsApp和web端之间发送的所有参数。然后就可以伪造消息了,并以此检查WhatsApp的安全性。

    三种攻击场景描述如下:

    攻击1:在群组聊天中修改发送者身份,即使发送者不是群组成员

    在这种攻击者,可以伪造回复消息来模仿另一个群组人员,即使该群组成员并不存在,比如Mickey Mouse。

    为模仿群组中的人,攻击者需要抓取这样的加密流量:

    image

    图5: 加密的WhatsApp通信

    一旦获取流量后,就可以发送给扩展,扩展会解密流量:

    image

    图6: 解密的WhatsApp消息

    使用扩展

    使用扩展时应注意以下参数:

    • Conversation,发送的真实内容;
    • participant,消息的真实发送者;
    • fromMe,该参数表明是否是我发送的数据;
    • remoteJid,表明数据发送的目的群组;
    • id,数据的id,手机的数据库中也会保存系统的id。

    了解了这些参数之后就可以伪造会话消息了。比如,群成员发送的“great”内容可以修改为“I’m going to die, in a hospital right now”,参与者的参数也可以修改为其他人:

    image

    图7: 伪造的Reply消息

    Id也有修改,因为数据库中已经存在该id了。

    为了让每个人都看到伪造的信息,攻击者需要回复他伪造的消息,引用并修改原始消息(将great修改为其他),然后发送给群里的其他人。

    如下图所示,研究人员创建了一个没有消息记录的新群组,然后使用上面的方法创建了假的回复:

    image

    图8: 原始会话

    参数participant可以是文本或不在群中的某人的手机号,这会让群人员认为这真的是该成员发送的消息。比如:

    image

    图9: 修改消息内容

    使用调试工具,结果就是:

    image

    image

    图10: 回复来自群外人员的消息

    攻击2:以发送者的口吻修改回复

    在攻击2中,攻击者能以其他人的口吻发送消息以达到修改聊天的目的。这样,就可以模仿他人或完成欺骗交易。

    为了伪造消息,必须修改消息的fromMe参数,表示在个人会话中发送消息。

    从web端发送的消息在发送到Burp suite之前,我们对其进行分析。可以在aesCbcEncrypt函数上设置一个断点,从a参数出获取获取。

    image

    图11: OutGoing消息修改

    然后复制数据到Burp扩展中,选择outgoing direction,然后解密数据:

    image

    图12: 解密Outgoing Message

    在将其改为false,然后加密后,得到下面的结果:

    image

    图13: Outgoing Message加密

    然后要修改浏览器的a参数,结果是含有内容的推送通知。这样甚至可以欺骗整个会话。

    image

    图14: 发送消息给自己

    如果是其他人的话,整个会话应该是这样的:

    image

    图15: 发送消息给自己,别人看到的结果

    攻击3:在群聊中发送私聊消息,但接收者回复时,整个群都可以看到回复内容

    在这种攻击下,可以修改群组中的特定成员,在群聊中发送私聊信息,当接收者回复给消息时,整个群成员都可以看到回复的内容。

    研究人员通过逆向安卓APP发现了攻击向量。在该实例中,研究人员发现如果攻击者在群中修改了一个消息,那么就会在数据库/data/data/com.whatsapp/databases/msgstore.db中看到该消息。

    image

    图16: 在群聊中发送私聊消息保存在/data/data/com.whatsapp/databases/msgstore.db数据库中

    可以使用sqlite3客户端使用下面的命令打开会话:

    SELECT * FROM messages;

    可以看到下面的数据:

    image

    图17: 修改后的数据库

    为了在群中发送消息,但限制消息只能某个特定群成员才能看到,因此要设定remote_resource参数。

    这里的使用的方法就是将key_from_me参数从0修改为1
    完成这些动作后,运行下面的命令,更新key_from_me和数据:

    update messages set key_from_me=1,data=We, all know what have you done! where _id=2493;
    

    攻击者需要重启WhatsApp客户端来强制引用发送新消息。之后的结果就是:

    image

    只有特定的受害者接收到了消息。

    如果受害者写消息回应(writes something as a response),那么群组内的所有人都可以看到;但如果受害者直接回复(reply to)消息的话,只有他自己可以看到回复的内容,但其他人就可以看到原始消息。

    image

    源码:https://github.com/romanzaikin/BurpExtension-WhatsApp-Decryption-CheckPoint

    WhatsApp Web端在生成QR码之前,会生成一对公约和私钥用于加密和解密。

    image

    图23: 会话用的公钥和私钥

    以下称私钥为priv_key_list,称公钥为pub_key_list

    密钥是用随机的32字节用curve25519_donna生成的。

    image

    图24: Curve25519加密过程

    为了解密数据,需要创建解密码。这就需要从WhatsApp Web端提取私钥,因为需要私钥才可以解密数据:

    self.conn_data[“private_key”] = curve25519.Private(“”.join([chr(x) for x in priv_key_list]))
    self.conn_data[“public_key”]  = self.conn_data[“private_key”].get_public()
    assert (self.conn_data[“public_key”].serialize() == “”.join([chr(x) for x in pub_key_list]))

    然后,QR码就创建了,在用手机扫描QR码之后,就可以通过websocket发送信息给Whatsapp Web端了:

    image

    图25: 来自WebSocket的秘密密钥

    最重要的参数是加密的,之后会传递给setSharedSecret。这会将密钥分成三个部分,并且配置所有解密WhatsApp流量所需的加密函数。

    首先,是从字符串e到数组的翻译,有些部分会把密钥分成前32字节的n和第64字节到结尾ta两部分。

    image

    图26: 获取SharedSecret

    深入分析函数E.SharedSecret,发现它使用前32字节和生成QR码的私钥作为两个参数:

    image

    图27: 获取SharedSecret

    然后可以在python脚本中加入下面的代码:

    self.conn_data[shared_secret] = self.conn_data[private_key].get_shared_key(curve25519.Public(self.conn_data[secret][:32]), lambda key: key)
    

    然后是扩展的80字节:

    image

    图28: 扩展SharedSecret

    分析发现该函数使用HKDF函数,所以看到了函数pyhkdf,还被用于扩展key:

    shared_expended = self.conn_data[“shared_secret_ex”] = HKDF(self.conn_data[“shared_secret”], 80)

    然后,hmac验证函数会将扩展的数据看作参数e,然后分成三部分:

    • i – shared_expended的前32字节
    • r – 32字节的32字节
    • o –64字节的16字节

    还有一个参数s,用来将参数na连接在一起。

    image

    图29: HmacSha256

    然后用参数r调用HmacSha256函数,函数会用参数s对数据进行签名,之后就收到hmac验证,并于r进行比较。

    rt的32字节到64字节,t是数组格式的加密数据。

    image

    图30: 检查消息的有效性

    Python代码如下:

    check_hmac = HmacSha256(shared_expended[32:64], self.conn_data[secret][:32] + self.conn_data[secret][64:]) if check_hmac != self.conn_data[secret][32:64]:
    raise ValueError(Error hmac mismatch)
    

    最后与加密相关的函数是aesCbcDecrypt,它用参数s将64字节之后的扩展数据、扩展数据的前32字节(参数i)和secret 64字节之后的数据连接在一起。

    image

    图31: 获取AES key和MAC key

    解密密钥随后会使用,然后对代码进行翻译:

    keysDecrypted = AESDecrypt(shared_expended[:32], shared_expended[64:] + self.conn_data[secret][64:])
    

    解密后,就得到t即前32字节数据,也就是加密密钥,之后的32字节数据就是mac密钥:

    self.conn_data[“key”][“aes_key”] = keysDecrypted[:32]
    self.conn_data[“key”][“mac_key”] = keysDecrypted[32:64]

    整体代码如下:

    self.conn_data[private_key] = curve25519.Private(“”.join([chr(x) for x in priv_key_list]))
    self.conn_data[public_key]  = self.conn_data[private_key].get_public()
    
    assert (self.conn_data[public_key].serialize() == “”.join([chr(x) for x in pub_key_list]))
    
    self.conn_data[secret] = base64.b64decode(ref_dict[secret])
    self.conn_data[shared_secret] = self.conn_data[private_key].get_shared_key(curve25519.Public(self.conn_data[secret][:32]), lambda key: key)
    
    shared_expended = self.conn_data[shared_secret_ex] = HKDF(self.conn_data[shared_secret], 80)
    
    check_hmac = HmacSha256(shared_expended[32:64], self.conn_data[secret][:32] + self.conn_data[secret][64:])
    
    if check_hmac != self.conn_data[secret][32:64]:
    raise ValueError(Error hmac mismatch)
    
    keysDecrypted = AESDecrypt(shared_expended[:32], shared_expended[64:] + self.conn_data[secret][64:])
    
    self.conn_data[key][aes_key] = keysDecrypted[:32]
    self.conn_data[key][mac_key] = keysDecrypted[32:64]
    

    有了生成QR码的所有加密参数,就可以加入解密过程了。

    首先,拦截(获取)消息:

    image

    图32: 收到的加密后的消息

    可以看到,消息是分成两部分的:tag和数据。可以用下面的函数解密消息:

    def decrypt_incoming_message(self, message):
    message = base64.b64decode(message)
    message_parts = message.split(“,”, 1)
    self.message_tag = message_parts[0]
    content = message_parts[1]
    
    check_hmac = hmac_sha256(self.conn_data[“mac_key”], content[32:])
    if check_hmac != content[:32]:
    raise ValueError(“Error hmac mismatch”)
    
    self.decrypted_content = AESDecrypt(self.conn_data[“aes_key”], content[32:])
    self.decrypted_seralized_content = whastsapp_read(self.decrypted_content, True)
    
    return self.decrypted_seralized_content

    从中可以看出,为了方便复制Unicode数据,接收的数据是base64编码的。在burp中,可以用ctrl+b对数据进行base64编码,然后传递给函数decrypt_incomping_message。函数会把tag与内容分割开,然后通过比较hmac_sha256(self.conn_data[“mac_key“], content[32:])content[:32]来检查密钥是否可以解密数据。

    如果都匹配的话,那么继续进入AES解密步骤,需要使用AES Key和32字节的内容。
    内容中含有IV,也就是aes区块的大小,然后是真实数据:

    self.decrypted_content = AESDecrypt(self.conn_data[“aes_key”], content[32:])

    函数的输出是protobuf(是google 的一种数据交换的格式,它独立于语言,独立于平台):

    image

    图33: Protobuf格式的加密数据

    然后用whatsapp_read函数将其翻译为json格式。

    解密收到的消息

    为了解密收到的消息,首先要了解WhatsApp协议的工作原理,所以要调试函数e.decrypt

    image

    图34: ReadNode函数

    ReadNode函数会触发readNode

    image

    图35: ReadNode函数

    把所有代码翻译为python来表示相同的功能:

    image

    代码首先从数据流中读取一字节的内容,然后将其移动到char_data,然后用函数read_list_size读取入数据流的列表大小。

    然后调用token_byte获取另一个字节,token_byte会被传递给read_string

    image

    图36: ReadString函数

    代码使用了getToken,并把参数传递到token数组的一个位置上:

    image

    图37: getToken函数

    这是通信中WhatsApp发送的第一项,然后翻译readString函数中的所有函数,并继续调试:

    image

    然后就可以看到readNode函数中的readAttributes函数:

    image

    图38: readAttribues函数

    readAttributes函数会继续从数据流中读取字节,并通过相同的token列表进行语法分析:

    image

    WhatsApp发送的第二个参数是消息的真实动作,WhatsApp发送{add:”replay”}表示新消息到达。
    继续查看readNode函数代码,看到发送的消息的三个部分:

    • 相同的token
    • 相同的token属性
    • protobuf编码的消息

    image

    图39: 解密的数组

    接下来要处理的是第三个参数protobuf,然后解密。

    为了了解Whatsapp使用的protobuf方案,将其复制到空的.proto文件中:

    image

    图40: protobuf

    索引也可以从Whatsapp protobuf方案中复制,并编译为python protobuf文件:

    image

    然后用python函数将protobuf翻译为json。

    image

    图41: 解密的数据

    在扩展中应用之后就可以解密通信了:

    image

    图42: 使用扩展来解密数据

    WhatsApp加密(加密收到的消息)

    加密的过程与解密过程相似,就是顺序不同,这里要逆向的是writeNode函数:

    image

    图43: writeNode 函数

    image

    图44: writeNode函数

    有了token和token属性之后,那么需要做的与readNode中一样:

    image

    首先,检查节点长度是不是3;然后给token属性数乘2,并传递给writeListStartwriteListStart会写类别字符的开始和列表大小,与readNode一样:

    image

    然后进入writeString,可以看到翻译为X的action和token index中action的位置:

    image

    图45: writeToken函数

    翻译代码和所有函数:

    image

    writeAttributes会翻译属性,之后由writeChildren翻译真实数据。

    image

    图46: writeChildren函数

    翻译函数:

    image

    解密和解密消息如下:

    image

    为了简化加密的过程,研究人员修改了真实的writeChildren函数,然后添加了另一个实例来让加密过程更简单:

    image

    结果就是加密和解密的收到的消息。

    解密发送的数据请查看github代码:
    https://github.com/romanzaikin/BurpExtension-WhatsApp-Decryption-CheckPoint


              Examining Code Reuse Reveals Undiscovered Links Among North Korea’s Malware Families      Cache   Translate Page   Web Page Cache   

    This research is a joint effort of Christiaan Beek, lead scientist & sr. principal engineer at McAfee, and Jay Rosenberg, senior security researcher at Intezer, and can be found in the McAfee Labs blog as well.

    Attacks from the online groups Lazarus, Silent Chollima, Group 123, Hidden Cobra, DarkSeoul, Blockbuster, Operation Troy, and 10 Days of Rain are believed to have come from North Korea. But how can we know with certainty? And what connection does a DDoS and disk-wiping attack from July 4, 2009, have with WannaCry, one of the largest cyberattacks in the history of the cyber sphere?

    From the Mydoom variant Brambul to the more recent Fallchill, WannaCry, and the targeting of cryptocurrency exchanges, we see a distinct timeline of attacks beginning from the moment North Korea entered the world stage as a significant threat actor.

    Bad actors have a tendency to unwittingly leave fingerprints on their attacks, allowing researchers to connect the dots between them. North Korean actors have left many of these clues in their wake and throughout the evolution of their malware arsenal.

    This post reflects months of research; in it we will highlight our code analysis illustrating key similarities between samples attributed to the Democratic People’s Republic of Korea, a shared networking infrastructure, and other revealing data hidden within the binaries. Together these puzzle pieces show the connections between the many attacks attributed to North Korea and categorize different tools used by specific teams of their cyber army.

    Valuable context

    This article is too short to dig deeply into the history, politics, and economic changes of recent years. Nonetheless, we must highlight some events to put past and present cyber events into perspective.
    The DPRK, like any country, wants to be as self-sufficient and independent as possible. However, for products such as oil, food, and foreign currency for trading, the country lacks resources and has to find ways of acquiring them. What can a nation do when legal international economics are denied? To survive, it must gain foreign currency for trading. One of the oldest ways to do this is to join the worlds of gambling (casinos) and drugs. In 2005, the United States wanted to shut down North Korean enterprises involved in illegal operations. They investigated a couple of banks in Asia that seemed to have ties with North Korea and operated as money laundering sites. One bank in particular is controlled by a billionaire gambling mogul who started a casino in Pyongyang and has close ties to Pyongyang. That bank, based in Macau, came back into the picture during an attack on the SWIFT financial system of a bank in Vietnam in 2015. The Macau bank was listed twice in the malware’s code as a recipient of stolen funds:

     SWIFT code in malware.

    Code reuse

    There are many reasons to reuse malware code, which is very common in the world of cybercrime. If we take an average ransomware campaign, for example, once the campaign becomes less successful, actors often change some of basics such as using a different packer to bypass defenses. With targeted campaigns, an adversary must keep its tools undetected for as long as possible. By identifying reused code, we gain valuable insights about the “ancestral relations” to known threat actors or other campaigns. Our research was heavily focused on this type of analysis.

    In our years of investigating cyber threats, we have seen the DPRK conduct multiple cyber campaigns. In North Korea, hackers’ skills determine which cyber units they work for. We are aware two major focuses of DPRK campaigns: one to raise money, and one to pursue nationalist aims. The first workforce gathers money for the nation, even if that means committing cybercrime to hack into financial institutions, hijack gambling sessions, or sell pirated and cracked software. Unit 180 is responsible for illegally gaining foreign currency using hacking techniques. The second workforce operates larger campaigns motivated by nationalism, gathering intelligence from other nations, and in some cases disrupting rival states and military targets. Most of these actions are executed by Unit 121.

    We focused in our research on the larger-scale nationalism-motivated campaigns, in which we discovered many overlaps in code reuse. We are highly confident that nation-state–sponsored groups were active in these efforts.

    Timeline

    We created a timeline of most of the malware samples and noticeable campaigns that we examined. We used primarily open-source blogs and papers to build this timeline and used the malware artifacts as a starting point of our research.


    Timeline of malware and campaigns.

    Analysis and observations

    Similarities

    During our research, we found many malware family names that are believed to be associated with North Korea’s cyber operations. To better understand this threat actor and the similarities between the campaigns, we have used Intezer’s code similarity detection engine to plot the links between a vast number of these malware families.

    The following graph presents a high-level overview of these relations. Each node represents a malware family or a hacking tool (“Brambul,” “Fallchill,” etc.) and each line presents a code similarity between two families. A thicker line correlates to a stronger similarity. In defining similarities, we take into account only unique code connections, and disregard common code or libraries. This definition holds both for this graph and our entire research.

    We can easily see a significant amount of code similarities between almost every one of the attacks associated with North Korea. Our research included thousands of samples, mostly unclassified or uncategorized. This graph was plotted using a dataset of only several hundred samples, so there might be more connections than displayed here.

    Deep technical analysis

    During our research, we came across many code similarities between North Korean binaries that had not been seen before. Some of these attacks and malware have not been linked to one another, at least publicly. We will showcase four examples of reused code that has been seen only in malware attributed to North Korea.

    1. Common SMB module

    The first code example appeared in the server message block (SMB) module of WannaCry in 2017, Mydoom in 2009, Joanap, and DeltaAlfa. Further shared code across these families is an AES library from CodeProject. These attacks have been attributed to Lazarus; that means the group has reused code from at least 2009 to 2017.

    Code overlap of a MYDOOM sample

    In the next screenshots we highlight the exact code block that reflects the SMB module we found in campaigns other than WannaCry and Mydoom.

    An SMB module common to several attacks.

    A lot has been written about WannaCry. As we analyze the code against our databases, we can draw the following overview:

    WannaCry code comparison overview.
    For our research we compared the three major variants of WannaCry. An early release, called a beta, from February 2017, one from April, and the infamous one that hit the world in May.

    2. Common file mapping 

    The second example demonstrates code responsible for mapping a file and using the XOR key 0xDEADBEEF on the first four bytes of the file. This code has appeared in the malware families NavRAT and Gold Dragon, plus a certain DLL from the South Korean gambling hacking campaign. These three RATs are thought to be affiliated with North Korea’s Group 123. NavRAT and the gambling DLL share more code, making them closer variants.

    Code overlap in a NavRAT sample

    3. Unique net share

    The third example, responsible for launching a cmd.exe with a net share, has been seen in 2009’s Brambul, also known as SierraBravo, as well as KorDllBot in 2011. These malware families are also attributed to the Lazarus group.

    Code overlap of a SierraBravo (Brambul) sample.

    A code block reused in the malware families Brambul/SierraBravo and KorDllBot.

    4. Operation Dark Hotel

    In 2014, Kaspersky reported a more than seven-year campaign against Asian hotels, in which the adversaries used an arsenal of tools to break into the computers of hotel visitors. Zero days and control servers were used, along with the malware family Tapaoux, or DarkHotel, according to the report.

    While we examined the DPRK samples, we noticed a hit with the Dark Hotel samples in our collections. By going through the code, we noticed several pieces of code overlap and reuse, for example, with samples from Operation Troy.

    Figure 11: Code overlap in a Dark Hotel sample.

    Identifying a group

    By applying what we learned from our comparisons and code-block identifications, we uncovered possible new links between malware families and the groups using them.

    With the different pieces of malware we have analyzed, we can illustrate the code reuse and sharing between the groups known to be affiliated with North Korea.

    Groups and families linked by code reuse.

    The malware attributed to the group Lazarus has code connections that link many of the malware families spotted over the years. Lazarus is a collective name for many DPRK cyber operations, and we clearly see links between malware families used in different campaigns.

    The malware (NavRAT, gambling, and Gold Dragon) possibly created by Group 123 are connected to each other but are separate from those used by Lazarus. Although these are different units focusing on different areas, there seems to be a parallel structure in which they collaborate during certain campaigns.

    MITRE ATT&CK

    From our research of these malware samples, we can identify the following techniques used by the malware families:

    When we zoom in on the Discovery category in the MITRE model, for example, we notice that the techniques are typical for first-stage dropper malware. The adversary drops these samples on victims’ machines and collects information on where they landed in the victims’ networks and which user/access rights they gained.

    In 2018, we saw examples of campaigns in which attackers used PowerShell to download and execute these droppers. Once information has been sent to a control server, the adversary determines the next steps, which often include installing a remote access tool to enable lateral movement on the network and pursue the goals of the campaign.

    Final words

    Security vendors and researchers often use different names when speaking about the same malware, group, or attack. This habit makes it challenging to group all the malware and campaigns. By taking a scientific approach, such as looking for code reuse, we can categorize our findings. We believe our research will help the security community organize the current “mess” we face in relation to North Korean malware and campaigns.

    We clearly saw a lot of code reuse over the many years of cyber campaigns we examined. This indicates the North Koreans have groups with different skills and tools that execute their focused parts of cyber operations while also working in parallel when large campaigns require a mix of skills and tools.

    We found our months of research, data gathering, and analysis very satisfying. By combining our skills, data, and technology, we were able to draw connections and reveal links that we had not seen before. The cybersecurity industry would greatly benefit from more collaboration and sharing of information, and we hope that this effort between McAfee and Intezer will inspire the community to work together more often.

    The authors thank Costin Raiu for providing them with samples they did not have in their collections.

    Sources

    Glenn Simpson, Gordon Fairclough, and Jay Solomon, “U.S. Probes Banks’ North Korea Ties.” Wall Street Journal, last updated September 8, 2005.

    Christiaan Beek, “Attacks on SWIFT Banking system benefit from insider knowledge.” https://securingtomorrow.mcafee.com/mcafee-labs/attacks-swift-banking-system-benefit-insider-knowledge/

    Atif Mushtaq, “DDOS Madness Continued…” https://www.fireeye.com/blog/threat-research/2009/07/ddos-madness-climax.html

    Ryan Sherstobitoff and Jessica Saavedra-Morales, “Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems.” https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/

    Alex Drozhzhin, “Darkhotel: a spy campaign in luxury Asian hotels.” https://www.kaspersky.com/blog/darkhotel-apt/6613/

    Warren Mercer, Paul Rascagneres, and Jungsoo An, “NavRAT Uses US-North Korea Summit As Decoy For Attacks In South Korea.” https://blog.talosintelligence.com/2018/05/navrat.html

    Sergei Shevchenko and Adrian Nish, “Cyber Heist Attribution.” https://baesystemsai.blogspot.com/2016/05/cyber-heist-attribution.html

    Mydoom code reuse report. https://analyze.intezer.com/#/analyses/113ba80f-1680-43d7-b287-cc62f3740fad

    NavRAT code reuse report. https://analyze.intezer.com/#/analyses/4f19fd5a-a898-4fdf-96c9-d3a4aad817cb

    SierraBravo code reuse report. https://analyze.intezer.com/#/analyses/8da8104e-56e4-49fd-ba24-82978bc1610c

    Dark Hotel code reuse report. https://analyze.intezer.com/#/analyses/c034e0fe-7825-4f6d-b092-7c5ee693aff4

    Kang Jang-ho, “A foreign currency earned with a virtual currency … What is the life of a North Korean hacker?” http://m.mtn.co.kr/news/news_view.php?mmn_idx=2018062517065863930#_enliple

    Awesome work by the team responsible for the “Operation Blockbuster” report.
    https://www.operationblockbuster.com/resources/

    By Jay Rosenberg and Christiaan Beek

    About the Authors

    Jay Rosenberg, senior security researcher at Intezer Labs, leads the research behind Intezer’s code reuse detection technology. From the young age of 12, he began programming and reverse engineering. He has spoken at various conferences internationally, identified new threats, and published his threat intelligence research on some of the largest cyber attacks.

    Christiaan Beek, lead scientist & sr. principal engineer is part of Mcafee’s Office of the CTO leading strategic threat intelligence research within Mcafee. He coordinates and leads passionately the research in advanced attacks, plays a key-role in cyberattack take-down operations and participates in the NoMoreRansom project. In previous roles, Beek was Director of Threat Intelligence in McAfee Labs and Director of Incident Response and Forensics at Foundstone, McAfee’s forensic services arm. At Foundstone, he led a team of forensic specialists in Europe, the Middle East, and Africa during major breaches. Beek develops threat intelligence strategy, designs threat intelligence systems, performs malware and forensic analysis, pentesting and coaches security teams around the globe. He is a passionate cybercrime specialist who has developed training courses, workshops, and presentations. He speaks regularly at conferences, including BlackHat, RSA, BlueHat and Botconf. Besides conferences, he is also frequently teaching at universities, Police Academies and public schools to recruit, mentor and train the next generation of cyber-security specialists. Beek contributed to the best-selling security book “Hacking Exposed.” and has two patents pending.


              Optimising Caching on Pwned Passwords (with Workers)      Cache   Translate Page   Web Page Cache   

    In February, Troy Hunt unveiled Pwned Passwords v2. Containing over half a billion real world leaked passwords, this database provides a vital tool for correcting the course of how the industry combats modern threats against password security.

    In supporting this project; I built a k-Anonymity model to add a layer of security to performed queries. This model allows for enhanced caching by mapping multiple leaked password hashes to a single hash prefix and additionally being performed in a deterministic HTTP-friendly way (which allows caching whereas other implementations of Private Set Intersection require a degree of randomness).

    Since launch, PwnedPasswords, using this anonymity model and delivered by Cloudflare, has been implemented in a widespread way across a wide variety of platforms - from site like EVE Online and Kogan to tools like 1Password and Okta's PassProtect. The anonymity model is also used by Firefox Monitor when checking if an email is in a data breach.

    Since it has been adopted, Troy has tweeted out about the high cache hit ratio; and people have been asking me about my "secret ways" of gaining such a high cache hit ratio. Over time I touched various pieces of Cloudflare's caching systems; in late 2016 I worked to bring Bypass Cache on Cookie functionality to our self-service Business plan users and wrestled with cache implications of CSRF tokens - however Pwned Passwords was far more fun to help show the power of Cloudflare's cache functionality from the perspective of a user.

    It is worth noting that PwnedPasswords is not like a typical website in terms of caching - it contains 16^5 possible API queries (any possible form of five hexadecimal charecters, in total over a million possible queries) in order to guarantee k-Anonymity in the API. Whilst the API guarantees k-Anonymity, it does not guarantee l-Diversity, meaning individual queries can occur more than others.

    For ordinary websites, with less assets, the cache hit ratio can be far greater. An example of this is another site Troy set-up using our barebones free plan; by simply configuring a Page Rule with the Cache Everything option (and setting an Edge Cache TTL option, should the Cache-Control headers from your origin not do so), you are able to cache static HTML easily.

    Origin Headers

    Indeed, the fact the queries are usually API queries makes a substantial difference. When optimising caching, the most important thing to look for is instances where the same cache asset is stored multiple times for different cache keys; for some assets this may involve selectively ignoring query strings for cache purposes, but for APIs the devil is more in the detail.

    When a HTTP request is made from a JavaScript asset (as is done when PwnedPasswords is directly implemented in login forms) - the site will also send an Origin header to indicate where a fetch originates from.

    When you make a search on haveibeenpwned.com/Passwords, there's a bit of JavaScript which takes the password and applies the k-Anonymity model by SHA-1 hashing the password and truncating the hash to the first five charecters and sending that request off to https://api.pwnedpasswords.com/range/A94A8 (then performing a check to see if any of the contained suffixes are in the response).

    In the headers of this request to PwnedPasswords.com, you can see the request contains an Origin header of the querying site.

    PwnedPasswords Headers

    This header is often useful for mitigating Cross-Site Request Forgery (CSRF) vulnerabilities by only allowing certain Origins to make HTTP requests using Cross-Origin Resource Sharing (CORS).

    In the context of an API, this does not nessecarily make sense where there is no state (i.e. cookies). However, Cloudflare's default Cache Key contains this header for those who wish to use it. This means, Cloudflare will store a new cached copy of the asset whenever a different Origin header is present. Whilst this is ordinarily not a problem (most sites have one Origin header, or just a handful when using CORS), PwnedPasswords has Origin headers coming from websites all over the internet.

    As Pwned Passwords will always respond with the same for a given request, regardless of the Origin header - we are able to remove this header from the Cache Key using our Custom Cache Key functionality.

    Incidently, JavaScript CDNs will frequently be requested to fetch assets as sub-resources from another JavaScript asset - removing the Origin header from their Cache Key can have similar benefits:

    Case Insensitivity

    One thing I realised after speaking to Stefán Jökull Sigurðarson from EVE Online was that different users were querying assets using different casing; for example, instead of range/A94A8 - a request to range/a94a8 would result in the same asset. As the Cache Key accounted for case sensitivity, the asset would be cached twice.

    Unfortuantely, the API was already public with both forms of casing being acceptable once I started these optimisations.

    Enter Cloudflare Workers

    Instead of adjusting the cache key to solve this problem, I decided to use Cloudflare Workers - allowing me to adjust cache behaviour using JavaScript.

    Troy initially had a simple worker on the site to enable CORS:

    addEventListener('fetch', event => {
        event.respondWith(checkAndDispatchReports(event.request))
    })
    
    async function checkAndDispatchReports(req) {
        if(req.method === 'OPTIONS') {
            let responseHeaders = setCorsHeaders(new Headers())
            return new Response('', {headers:responseHeaders})
        } else {
            return await fetch(req)
        }
    }
    
    function setCorsHeaders(headers) {
        headers.set('Access-Control-Allow-Origin', '*')
        headers.set('Access-Control-Allow-Methods', 'GET')
        headers.set('Access-Control-Allow-Headers', 'access-control-allow-headers')
        headers.set('Access-Control-Max-Age', 1728000)
        return headers
    }
    

    I added to this worker to ensure that when a request left Workers, the hash prefix would always be upper case, additionally I used the cacheKey flag to allow the Cache Key to be set directly in Workers when making the request (instead of using our internal Custom Cache Key configuration):

    addEventListener('fetch', event => {
      event.respondWith(handleRequest(event.request));
    })
    
    /**
     * Fetch request after making casing of hash prefix uniform
     * @param {Request} request
     */
    async function handleRequest(request) {
          
      if(request.method === 'OPTIONS') {
        let responseHeaders = setCorsHeaders(new Headers())
        return new Response('', {headers:responseHeaders})
      }
    
      const url = new URL(request.url);
    
      if (!url.pathname.startsWith("/range/")) {
        const response = await fetch(request)
        return response;
      }
    
      const prefix = url.pathname.substr(7);
      const newRequest = "https://api.pwnedpasswords.com/range/" + prefix.toUpperCase()
    
      if (prefix === prefix.toUpperCase()) {
        const response = await fetch(request, { cf: { cacheKey: newRequest } })
        return response;
      }
    
      const init = {
          method: request.method,
          headers: request.headers
      }
      
      const modifiedRequest = new Request(newRequest, init)
      const response = await fetch(modifiedRequest, { cf: { cacheKey: newRequest } })
      return response
    }
    
    function setCorsHeaders(headers) {
        headers.set('Access-Control-Allow-Origin', '*')
        headers.set('Access-Control-Allow-Methods', 'GET')
        headers.set('Access-Control-Allow-Headers', 'access-control-allow-headers')
        headers.set('Access-Control-Max-Age', 1728000)
        return headers
    }
    

    Incidentially, our Workers team are working on some really cool stuff around controlling our cache APIs at a fine grained level, you'll be able to see some of that stuff in due course by following this blog.

    Argo

    Finally, Argo plays an important part in improving Cache Hit ratio. Once toggled on, it is known for optimising speed at which traffic travels around the internet - but it also means that when traffic is routed from one Cloudflare data center to another, if an asset is cached closer to the origin web server, the asset will be served from that data center. In essence, it offers Tiered Cache functionality; by making sure when traffic comes from a less user Cloudflare data center, it can still utilise cache from a data center recieving greater traffic (and more likely to have an asset in cache). This prevents an asset from having to travel all the way around the world whilst still being served from cache (even if not optimally close to the user).

    Argo Infographic

    Conclusion

    By using Cloudflare's caching functionality, we are able to reduce the amount of times a single asset is in cache by accidental variations in the request parameters. Workers offers a mechanism to control the cache of assets on Cloudflare, with more fine-grained controls under active development.

    By implementing this on Pwned Passwords; we are able to provide developers a simple and fast interface to reduce password reuse amonst their users, thereby limiting the effects of Credential Stuffing attacks on their system. If only Irene Adler had used a password manager:

    [embedded content]

    Interested in helping debug performance, cache and security issues for websites of all sizes? We're hiring for Support Engineers to join us in London, and additionally those speaking Japanese, Korean or Mandarin in our Singapore office.


              The Transformation of Gerald Baumgartner      Cache   Translate Page   Web Page Cache   
    Video: The Transformation of Gerald Baumgartner
    Watch This Video!
    Studio: Celebrity Video Distribution
    Gerald Baumgartner (Randall Malin) is a fastidious, delusional man wrapped in an idealized image of a business man ultra-organized, competent, logical...or so he thinks. Pleased with himself, Gerald trips through his life of routine and nth-degree organization until one day he discovers an entirely new vision of himself inspired by the beautiful, bohemian Christiana LaTierre (Melissa Fischer).

    Driven by this "new vision" Gerald sets into play a spectacular life transformation, which involves among other things engineering a seamless separation from his - "current situation" - his wife (Carolyn Koskan) - using sound principles of change management.

    Armed with project plans, databases of suitors for his "replacement", and bizarre decisions skills only Gerald could conceive, he executes his plan.

    The results are distasterous...and hilarious.

    Stars: Carolyn Koskan, Melissa Fischer, Randall Malin

              Senior Analyst      Cache   Translate Page   Web Page Cache   
    FL-Sunrise, RESPONSIBILITIES: Kforce has a client that is seeking a Senior Analyst in Sunrise, Florida (FL). Responsibilities include: Manage the annual review and the individual changes done weekly/daily Present reports from databases to be used in evaluating the performance of contracted par payors and non-par payors Develop evaluation tools to meet operational needs for assessing performance of payors rega
              Data Analyst 4      Cache   Translate Page   Web Page Cache   
    CA-San Ramon, job summary: Summary: Client is seeking a Data Analyst to coordinate changes to computer databases, test, and implement the database applying knowledge of database management systems. Job Responsibilities: • Executes test, data extraction, and analysis utilizing the department's various computer software packages within established deadlines. • Prepares, and documents detailed specifications of th
              New: Yoshon (Food & Drink)      Cache   Translate Page   Web Page Cache   

    Yoshon 1.0.1


    Device: iOS iPhone
    Category: Food & Drink
    Price: Free, Version: 1.0.1 (iTunes)

    Description:

    Welcome to The Yoshon App! What we have all been waiting for has arrived. In the supermarket and don't have "The Guide" handy? Have it but too hard to scroll through the pdf? Just open The Yoshon App and scan the barcode of the product you want Yoshon and Chodosh information for and The Yoshon App will show you the relevant information from "The Guide" (see info page in the app). Just want to search for a product manually? You can do that too! Just type in the brand name or product name and you will see all the relevant results. Is the product you scanned not in our database? No problem, you can request to add it. There are many more features in this new breakthrough Yoshon App. Check it out and rate it on the app store. B"H we should all merit to keep Kemach Yoshon properly.

    What's New

    Bug Fix.

    Yoshon


              Senior IT Database Analyst - Precision Drilling Corporation - Calgary, AB      Cache   Translate Page   Web Page Cache   
    Post-secondary education (degree or diploma) in the field of computers. The IT Database Analyst will have the primary responsibility for the analyzing, design,...
    From Precision Drilling Corporation - Thu, 14 Jun 2018 17:04:18 GMT - View all Calgary, AB jobs
              Senior IT Database Analyst - Precision Drilling Corporation - Calgary, AB      Cache   Translate Page   Web Page Cache   
    The IT Database Analyst is engaged in both the design and implementation of new ERP projects and will be required to analyze technical needs, research and...
    From Precision Drilling Corporation - Thu, 14 Jun 2018 17:04:18 GMT - View all Calgary, AB jobs
              Canada Games Alumni Well Represented at 2018 Olympic Games in PyeongChang      Cache   Translate Page   Web Page Cache   

    Canada Games Alumni Well Represented at 2018 Olympic Games in PyeongChang

    Tuesday, 6th February 2018

    Canada Games alumni represent approximately 34% of the athletes that will compete for Team Canada at the upcoming 2018 Olympic Winter Games in PyeongChang.

    Among Canada Games sports, 38% of Canada's roster competed at a Canada Winter Games. 


    BIATHLON 8/10 (80%) of the Biathlon team competed at the Canada Winter Games. 

    Brendan Green competed for Team NT at the 2003 & 2007 Canada Winter Games where he capped off his illustrious Canada Games career by winning a Gold medal in the 15 km Classic Mass Start. PyeongChang will be his third Olympic Games. 

    Sarah Beaudry had a fantastic showing for Team BC at the 2011 Canada Winter Games where she captured 1 gold and 2 bronze medals. This will be Sarah's first Olympic Games. 

    Rosanna Crawford had a dominant 2007 Canada Winter Games for Team Alberta that saw her earn gold medals in the 7.5km sprint and 12.5km individual. PyeongChang will be her third Olympic Games.

    The Gow brothers both did Team Alberta proud at the 2011 Canada Winter Games and will look to do the same this time around for Team Canada. Scott earned an astounding 4 gold medals while Christian earned a silver and a bronze for Alberta. These are the first Olympic Games for the brothers. 


    CROSS COUNTRY SKIING 7/11 (64%) of the Cross Country skiing team competed at the Canada Winter Games. 

    Anne-Marie Comeau was dominant for Team Quebec at the 2011 and 2015 Canada Winter Games, capturing a silver in 2011 and two golds in 2015. This will be Anne-Marie's first Olympic Games. 

    Knute Johnsgaard is a seasoned Canada Games alumni having competed for Team Yukon at the 2009 Canada Summer Games in Athletics and at the 2011 and 2015 Canada Winter Games in Cross Country Skiing. PyeongChang will be Knute's first Olympic Games. 

    Emily Nishikawa also competed at three Canada Games, representing Yukon at the 2003, 2007 and 2011 Canada Winter Games. Her crowing achievement was bringing home a gold, silver and bronze for Team Yukon in 2011. This will be Emily's second Olympic Games. 

    Jesse Cockney had an incredible 2011 Canada Winter Games where he won 3 golds and one bronze for Team Alberta. PyeongChang will be Jesse's second Olympic Games. 


    SPEEDSKATING

    12/19 (63%) of the Long Track Speed Skating team competed at the Canada Winter Games. 

    4/10 (40%) of the Short Track Speed Skating team are Canada Games alumni. 

    Charles Hamelin and Marianne St-Gelais have taken the speed skating world by storm as a power couple off the ice and as tremendous skaters on the ice. Both represented Team Quebec at the Canada Winter Games (Charles in 2003 and Marianne in 2007). Listen to what they have to say about their Canada Games experience in the below video. 

    Marsha Hudey had an impressive showing at the 2007 Canada Winter Games where she won 3 gold medals, one of them in the team pursuit alongside Team Sask (now Team Canada)  teammate Kali Christ. PyeongChang 2018 will be Marsha and Kali's second Olympic Games. 

    Gilmore Junio became internationally known for his remarkable display of sportsmanship at Sochi 2014 when he gave his spot in the 1000m to teammate Denny Morrison, who had missed qualifying in that event after a fall at the Canadian trials.The speedskater performed well for Team Alberta at the 2007 Canada Winter Games, as evidenced by the below video. 

    Laurent Dubreuil was absolutely stellar for Team Quebec at the 2011 Canada Winter Games, as evidenced by his amazing medal haul - 3 golds, 1 silver and 1 bronze. Heather McLean was a bright spot for Team Manitoba at the 2011 Games, capturing a gold medal.

    Check out highlights of Laurent and Heather here:


    FREESTYLE SKIING

    12/30 (40%) of the Freestyle Skiing team are Canada Games alumni. 

    Chloé Dufour-Lapointe had a strong showing for Team Quebec at the 2007 Canada Winter Games, earning golds in the dual moguls and in the moguls. This will be Chloé's third Olympic Games. 

    Andi Naude was a force for Team BC at the 2011 Canada Winter Games as she captured golds in the dual moguls and in the moguls. This will be Andi's first Olympic Games. 

    Teal Harle won double gold for Team BC less than 3 years ago at the 2015 Canada Winter Games. Take a look at the video he made for us in the lead-up to the Games. 


    HOCKEY

    14/23 (61%) of the Women's Hockey team are Canada Games alumni. 


    Below is the full list of Canada Games alumni by Province and Territory. 

    BC AB SK MB ON QC PEI NL NS NWT YK
    Gilbert Brule Bryan Barnett Kali Christ Bailey Bram Megan Agosta Anne-Marie Comeau Heather Moyse Kaetlyn Osmond Blayre Turnbull Brendan Green Dahria Beatty
    Sarah Beaudry Jesse Cockney Emily Clark Chay Genoway Ivanie Blondin Ann-Renee Desbiens 1 1 1 Kevin Koe

    Knute Johnsgaard

    Stefan Elliott Rosanna Crawford Marsha Hudey Kaitlyn Lawes Candace Crawford Laurent Dubreuil       2 Emily Nishikawa
    Teal Harle Christian Gow Mark McMorris Heather McLean Vincent De Haitre Chloe Dufour-Lapointe         3
    Justin Kripps Scott Gow 4 4 Rachel Homan Marc-Antoine Gagnon          
    Jamie MacDonald Kailyn Irvine     Dara Howell Charles Hamelin          
    Andi Naude Gilmore Junio     Hailey Irwin Olivier Jean          
    Meryeta O'Dine Marc Kennedy     Brianne Jenner Valerie Maltais          
    Julian Ransom Graeme Killick     Rebecca Johnston Brittany Phelan          
    Kelsey Serwa Emma Lunder     Evan McEachran Kevin Poulin          
    Cassie Sharpe Meaghan Mikkelson     Emma Miskew Marie-Phillip Poulin          
    Megan Tandy 11     Kirsten Moore-Towers Audrey Robichaud          
    Broderick Thompson       Kerri Morrison Olivier Rochon          
    Yuki Tsubota       Justin Peters Lauriane Rougeau          
    14       Natalie Spooner Marianne St-Gelais          
            Laura Stacey Alexandre St-Jean          
            Lenny Valjas 16          
            Jennifer Wakefield            
            Wojtek Wolski            
            19            

    For more information, make sure to check our our alumni database. Use the Games filter and select PyeongChang 2018 to see our list of alumni and their profiles. 


              E814: Airtable Co-founder Howie Liu raises $52m Series B for his smart spreadsheets, launches “Blocks” customizable apps to supercharge database insights, shares lessons as a 2nd-time founder & vision for the ultimate workflow      Cache   Translate Page   Web Page Cache   
    none
              Open Shift Architect      Cache   Translate Page   Web Page Cache   
    TX-Austin, Required Skill 10+ years application architecture experience at enterprise level 5 years of software development experience in Java, C+ or .NET Experience in troubleshooting and tuning of enterprise applications and/or data platforms (in-memory databases, messaging systems, NoSQL databases, etc.) preferred Experience in developing software automation solutions with Python, Golang or Perl preferred
              Sr Marketing Strategist - WVU Medicine - Morgantown, WV      Cache   Translate Page   Web Page Cache   
    Familiarity with web-based CMS and marketing analytics tools (Google Analytics a plus). Database management, reporting and analytics, monitoring industry trends...
    From WVU Medicine - Fri, 29 Jun 2018 05:45:01 GMT - View all Morgantown, WV jobs
               Black widow spiders are headed north, new study reveals       Cache   Translate Page   Web Page Cache   
    Researchers from McGill University created an updated species distribution map using citizen science contributions to online databases, and museum collections.
              Senior IT Database Analyst - Precision Drilling Corporation - Calgary, AB      Cache   Translate Page   Web Page Cache   
    SAP Solution Manager. The IT Database Analyst will have the primary responsibility for the analyzing, design, plan, and implementation of the corporate ERP...
    From Precision Drilling Corporation - Thu, 14 Jun 2018 17:04:18 GMT - View all Calgary, AB jobs
              GIS Specialist - LifeLabs - Toronto, ON      Cache   Translate Page   Web Page Cache   
    Produce maps using GIS tools such as ArcGIS. Skilled in Microsoft Office products, GIS products such as ArcGIS and database software....
    From LifeLabs - Wed, 16 May 2018 22:42:15 GMT - View all Toronto, ON jobs
              Database Coordinator      Cache   Translate Page   Web Page Cache   
    IL-Oak Brook, Why work here? Casual dress code Healthcare is 100% covered - no out of pocket costs Great work life balance - hours are from 8:30 - 5pm (tends to slow down between November and December) Donor funded organization with 600 chapters in the US and in 30 countries Duties: Enter donations received into Raiser's Edge donor database Receive donations via checks cash, and wire transfers and enter into Ra
              Senior IT Database Analyst - Precision Drilling Corporation - Calgary, AB      Cache   Translate Page   Web Page Cache   
    Contribute as part of a diverse team to help solution and support complex business issues. Design, test, implement and maintain high availability solutions....
    From Precision Drilling Corporation - Thu, 14 Jun 2018 17:04:18 GMT - View all Calgary, AB jobs
              Database Administrator - David Aplin Group - Saskatoon, SK      Cache   Translate Page   Web Page Cache   
    Skilled in using web based architectures and design practices. Design, implement and configure Oracle and SQLServer databases....
    From David Aplin Group - Thu, 02 Aug 2018 06:29:09 GMT - View all Saskatoon, SK jobs
              Senior IT Database Analyst - Precision Drilling Corporation - Calgary, AB      Cache   Translate Page   Web Page Cache   
    SUSE Linux is preferred but not required. The IT Database Analyst will have the primary responsibility for the analyzing, design, plan, and implementation of...
    From Precision Drilling Corporation - Thu, 14 Jun 2018 17:04:18 GMT - View all Calgary, AB jobs
              Database Chief Architect - $8250/month - REMOTE WORK - Crossover - Dubai      Cache   Translate Page   Web Page Cache   
    Vice President of Technical Product Management (UAE). Executive Vice President of Technical Product Management (Lebanon)....
    From Akhtaboot - Thu, 19 Jul 2018 16:31:49 GMT - View all Dubai jobs
              Inventory Control Coordinator      Cache   Translate Page   Web Page Cache   
    IL-Oak Lawn, * Enters data into inventory database about quantities of issued and transferred parts and inventory and cycle count adjustments * Performs weekly cycle counts and adjust database as needed * Closes received shop packets and purges database * Receives and enters finished goods numbers into database * Troubleshoots quantity discrepancies with department staff * Tracks items with shelf-life daily an
              Consultant, Infrastructure Eng - Database Engineer (BigData & Analytics Engineer) - Nationwide Mutual Insurance Company - Columbus, OH      Cache   Translate Page   Web Page Cache   
    Evaluated March 2010 JDC. If you’re passionate about becoming a Nationwide associate and believe you have the potential to be something great, let’s talk....
    From Nationwide Mutual Insurance Company - Tue, 24 Jul 2018 08:37:48 GMT - View all Columbus, OH jobs
              Police Are Acquiring Surveillance Tech in Secret      Cache   Translate Page   Web Page Cache   
    A California bill would give the public a say and require more transparency from law enforcement.

    Recent stories about Amazon’s invasive face scanning surveillance technology and Cambridge Analytica’s exploitation of Facebook data have brought the impact of surveillance and data misuse to the fore. But many people don’t realize how often local law enforcement agencies acquire and use similar technologies in their own communities. A groundbreaking bill pending in California would bring this day-to-day local surveillance out of the shadows and give communities a way to fight back against surveillance systems that are disproportionately aimed at immigrants and people of color.

    The bill, SB 1186, requires greater transparency and public oversight when law enforcement agencies seek to acquire surveillance technologies that collect sensitive location or other personal data. It builds on a workable model that several California localities have already enacted.

    Right now, a key California legislative committee holds the power to advance the bill, which is supported by a broad coalition of California civil rights and civil liberties organizations. In this political climate, it’s a necessary tool for protecting immigrants and other vulnerable residents from surveillance systems that are readily exploitable by the federal government.

    The bill requires local law enforcement to get the approval of elected local representatives before acquiring surveillance technology. Before that vote, law enforcement agencies like police departments, sheriffs, and district attorneys must propose a set of written rules that explain their plans for the technology as wells as limits on its use and collection and sharing of data. Next, residents get a chance to weigh in on these rules and the proposal at a public meeting. If a city council or board of supervisors doesn’t approve a proposal, law enforcement cannot acquire or use that technology.

    As surveillance technology becomes more powerful and easily available, California needs this bill now more than ever — and hopefully other states will follow its lead. Often bankrolled by federal funds, technologies like automatic license plate readers, drones, and social media surveillance systems have invaded our communities without our knowledge or input. These technologies collect information about our whereabouts and other sensitive details about our lives, and they are frequently turned on local activists.

    Warrantless surveillance not only feeds databases that can be abused, it leads to real-world harms that disproportionately affect immigrants, people of color, and Muslim-Americans. Many law enforcement agencies have used social media monitoring products advertised as tools to track activists of color. For example, San Jose police used it to spy on protesters during a visit by India’s prime minister. The L.A. County Sheriff’s Department monitored the residents of Compton using high-powered aerial surveillance. San Francisco police stopped and held an elderly Black woman at gunpoint — all because an automatic license plate reader improperly identified her car as a stolen vehicle. Elsewhere, police have used that same technology to monitor mosque visitors.

    Federal immigration authorities are increasingly seeking to exploit these local surveillance systems, often without local knowledge. Earlier this year, for example, news broke that U.S. Immigration and Customs Enforcement had obtained access to a database operated by a company called Vigilant, which hosts license plate location data collected by local law enforcement agencies across the United States.

    The ACLU of Northern California has sued to learn more about this arrangement, and some California communities have stood up and rejected this company’s technology. However, these systems continue to prowl cities and rural areas, collecting data about immigrants while they’re driving to work, running errands, or bringing their kids to school. ICE should not be able to exploit this data to target and separate families. SB 1186 gives communities statewide a way to ensure that local law enforcement is not facilitating practices like this.

    Communities such as Santa Clara County, Oakland, Davis, and Berkeley have already passed ordinances that require law enforcement agencies to be transparent about surveillance proposals, submit those proposals to a vote by elected leaders, and write strict rules for how the technologies can be used. SB 1186 — which would be the first statewide law of its kind — would ensure that all Californians can benefit from these important reforms. Community voices must be heard if surveillance proposals are on the table.

    This bill is a piece of a larger movement. Localities across the country are taking part in a national campaign called Community Control Over Police Surveillance (CCOPS), a reform effort spearheaded by 17 organizations, including the ACLU, aimed at putting local residents and elected officials in charge of decisions about surveillance technology. To date, local CCOPS efforts have sprouted up in more than 20 cities, including New York and St. Louis.

    After passing through the California Senate, the California Assembly Appropriations Committee will decide this bill’s fate in the next week. If you live in California, contact your state assembly representative and encourage them to support SB 1186 across the finish line.

    This will not be an easy fight. Law enforcement agencies strongly oppose this bill’s transparency and oversight mechanisms. But public safety in the digital era requires that elected representatives and community members have a voice in important decisions like these.


              FIFA 18 Transfer Update 09 August 2018 Original + Crack      Cache   Translate Page   Web Page Cache   
    Download FIFA 18 Summer Transfer Squad Database Update 09 August 2018 For Original Games + Crack Version by IMS FEATURES  : INCLUDED FIFA 18 official final update! All faces WC 2018 are included! +more than 371 transfers per day! All 5276 summer transfers. HOW TO INSTALL  : Remove old squads file (Documents/FIFA 18/setting), put our […]
              Mine IT Specialist (Mid/Senior) - Point of Rocks, WY - PacifiCorp - Point of Rocks, WY      Cache   Translate Page   Web Page Cache   
    General Purpose Support mine IT requirements including desktop and server support, database and security administration, end-user application troubleshooting...
    From Pacificorp - Wed, 25 Jul 2018 14:30:09 GMT - View all Point of Rocks, WY jobs
              Head of Marketing at Sunrose Consulting      Cache   Translate Page   Web Page Cache   
    Our client is a multinational engineering company. The company distributes and supports construction machines, power systems and material-handling equipment. The company provides its customers with comprehensive solutions backed by technical know-how, experience and in-depth knowledge of its local markets. Its service centers are equipped to perform total overhauls, through its qualified service engineers, with necessary diagnostic and repair tools, which can be dispatched at any time to customers.Reporting to the Managing Director, you will be responsible for the coordination and delivery of 1 and 5 year strategic plans, market intelligence and performance reporting activities in support with the Business Unit (BU) Managing Director. MAIN FUNCTIONS Coordinate the review of the market and competitors for the Business Unit. Liaise with the Group Market Research and Intelligence team to align key macro-economic and market inputs into the BU plans. Coordinate and/or commission ad-hoc market intelligence reports for the Market Intelligence teams. Deploy successful marketing campaigns and own their implementation from ideation to execution Measure and report performance of marketing campaigns, gain insight and assess against goals Support the Business Unit Management team in the application of customer coverage models and strategies considering all parameters including, geography, machine population, customer segmentation, sales force capability etc. Support the Group Marketing team in Customer Insight analysis and reporting. Build strategic relationships and partner with key industry players, agencies and vendors Experiment with a variety of organic and paid acquisition channels. Continuously improve sales operating models, sales lead management and application of sales strategy Facilitate coverage strategy reviews and development in conjunction with the Business Unit Management team, CoE, Strategic Planning team and Group Sales Effectiveness. Identify sources and procure customer databases pertinent to the Business Unit Provide input to the design customer intelligence programs with the Market Intelligence team Coordinate the implementation of Salesforce within the Business Unit Audit Salesforce utilization within the Business Unit JOB REQUIREMENTS A degree or its equivalent in the Social Science / Business Management discipline. A relevant Master's degree will be an added advantage. 10 - 15 years' experience in a senior Marketing role; particularly in the design of market segmentation, sales coverage and the application of market research. Marketing experience in an Engineering / Construction Equipment company will be an added advantage. Proficiency in Ms. Office packages: Excel, Word, Power point Strong interpersonal, communication and influencing skills. Strong team player and ability to work cross-functionally in a matrix organisation.
              Application Developer at Workforce Management Centre      Cache   Translate Page   Web Page Cache   
    Workforce Group - Our client, a reputable company in the Oil & Gas Sector, is currently headhunting for a suitable candidate to fill position below:Department: I.T Department Reporting to: Line Supervisor Job Summary The Application Developer will be responsible for developing, testing, installing and monitoring software applications, in order to ensure that the software performance meets company and user's requirements. Job Responsibilities and Duties Creating, maintaining and implementing the source code that makes up the application or program. Also responsible for designing the prototype application, indicating program unit structure, and coordinating application plans with other members of the development team or customer. Responsible for designing, developing, delivering, and improving in-house software applications on a variety of platforms and systems. Maintaining systems by monitoring and correcting software defects. Working closely with other staff on the maintenance and performance of software systems and asking questions to obtain information, clarify details and implement information. Finding and fixing faults in applications. Solving application problems in a timely manner. Ensuring proper version control and documentation of development activity. Developing user guides and providing varying degrees of software support. Making sure that applications can be run on existing and new hardware. Creating applications tailored to business needs to run on platforms/hardware. Delivering technical presentations/demonstrations of work. Researching, identifying and recommending new applications that would improve company operations. Applying proven analytical and problem-solving skills to help validate, verify, communicate, and resolve software application issues through careful testing in order to maximize the benefit of the company' IT investments and initiatives. Reports - Generating the required weekly, monthly, quarterly, bi-annual and annual reports and presentations based on applications developed or improved on. Monitoring and managing databases for optimal performance. Recognize business needs of the organization and create new applications that answer those needs. Job Requirements Bachelor's Degree in related Information Technology Degree 2-4 years of application development experience. Ability to communicate technical information to non-technical personnel Working technical knowledge of networks, PCs, servers and operating systems Working technical knowledge of current Windows Operating systems software, protocols, and standards, including firewalls and Active Directory Experience with languages such as PHP and JavaScript Frameworks such as ReactJS, VueJS and AngularJS Experience in developing Business Intelligence solutions. Specific experience with Microsoft PowerBI is a plus Demonstrated ability and experience in working with current best practices and technologies for front end web development such HTML5, CSS3, JQuery and Bootstrap Demonstrated ability and experience in working with one or more server-side web development toolsets such as the LAMP stack. Remuneration N150,000 monthly plus other benefits.
              National Human Rights Officer, SB4/3 (equivalent to NOB grade) at UNDP      Cache   Translate Page   Web Page Cache   
    United Nations Development Programme (UNDP), helps developing countries attract and use aid effectively. In all our activities, we encourage the protection of human rights, capacity development and the empowerment of women.Job ID: 17974 Location: Makurdi - Benue and Nasarawa (Multiple duty stations including Middle Belt) Agency: Office High Commissioner for Human Rights Vacancy Type: Service Contract (SC) Contract Duration: 6 months Duties and Responsibilities Within delegated authority, under the supervision of the Senior Human Rights Adviser, the National Human Rights Officer will be responsible for the following duties: Researches, collects, verifies, analyses information relevant to the observance of international human rights and humanitarian law in the mission area; Supports and advises UN and humanitarian actors in mission area on protection activities and compliance with human rights, and where appropriate, relevant authorities, including on the implementation of outcomes of UN human rights mechanisms; Conducts investigations of abuses and violations of human rights and international humanitarian law; Ensures the timely entry of accurate and verified human rights cases in an established database in compliance with established standards; Integrates UN-developed methodology into human rights monitoring, reporting and investigation activities and supports the operational aspects of planning and implementing of monitoring and investigation activities; Writes, reviews, coordinates, if needed, and ensures the timely delivery of a variety of reports, briefings and other types of communications in compliance with established standards and in particular with respect to reporting on human rights situation; Liaises with other UN actors present in the mission area for the collection and verification of information on the human rights situation and informs on human rights considerations that should be taken into account by other actors, including those delivering humanitarian response or coordinating emergency preparedness and response activities, as well as by the UN mission in respect of future operations; Advocates with relevant authorities and other influential actors to stop or prevent human rights violations, seeks remedial action by the authorities to prevent similar violations from occurring in the future; Contributes to the integration of gender perspectives/considerations and specific women/girls' rights issues in all activities; Ensures cooperation and appropriate communication with the United Nations Office of the High Commissioner for Human Rights (OHCHR) in the sharing of human rights information and with respect to the project implementation; Supports more senior staff and/or team leaders in staffing, planning and budgeting as required; Performs other related duties as required. Requirements, Skills and Experience Education: An advanced university degree (Master's degree or equivalent) in Law, Political Science, International Relations, Social Sciences or in a related area. Experience: A minimum of two years of progressively responsible experience in assigned geographic locations in conflict situations in the area of human rights and humanitarian response, including in the causes and resolution of human rights conflicts in accordance with international standards. Previous experience in humanitarian interventions, human rights monitoring, investigations and reporting as well as programme management is required Language Requirements: Fluency in English (both oral and written), is required. Knowledge of local language is an advantage. Competencies Professionalism: Proven sensitivity to the political and social environment and ability to adjust behaviours accordingly; In-depth knowledge of human rights principles, international mechanisms and related concepts, including protection of civilians, transitional justice, humanitarian action, DDR, legislative and rule of law reforms, gender mainstreaming and conflict-related sexual violence; Good knowledge of institutional mandates, organizational policies, and methodologies relating to human rights; Capacity to monitor and coordinate human rights-related matters with other UN, NGO, state and/or government stakeholders and to advocate for the respect and integration of human rights in various fora; Good analytical and research skills, including the ability to gather, validate, evaluate and integrate relevant human rights information from a variety of sources, to assess their impact and to provide recommendations to redress situations; Commitment to seek new and improved methods of work for accomplishing the work of the human rights component; Ability to relate to and integrate human rights issues and perspectives into other fields, including humanitarian action, development, rule of law, legislation reforms and election support, to human rights issues and activities and vice versa; Good knowledge of planning, implementation, coordination and evaluation of human rights capacity development initiatives for multiple stakeholders; Capacity to serve as internal resource person, share knowledge and to deliver training for colleagues and external stakeholders alike; Takes responsibility for incorporating gender perspectives and ensuring the equal participation of women and men in all areas of work. Planning And Organizing: Develops clear goals that are consistent with agreed strategies; Identifies priority activities and assignments; Adjusts priorities as required; Allocates appropriate amount of time and resources for completing work; Foresees risks and allows for contingencies when planning; Monitors and adjusts plans and actions as necessary; Uses time efficiently Communication: Speaks and writes clearly and effectively; Listens to others, correctly interprets messages from others and responds appropriately; Asks questions to clarify, and exhibits interest in having two-way communication; Tailors language, tone, style and format to match audience; Demonstrates openness in sharing information and keeping people informed. Technological Awareness: Keeps abreast of available technology; Understands applicability and limitations of technology to the work of the office; Actively seeks to apply technology to appropriate tasks; Shows willingness to learn new technology. Teamwork: Works collaboratively with colleagues to achieve organizational goals; Solicits input by genuinely valuing others' ideas and expertise; Is willing to learn from others; Places team agenda before personal agenda; Supports and acts in accordance with final group decision, even when such decisions may not entirely reflect own position; Shares credit for team accomplishments and accepts joint responsibility for team shortcomings.
              National Human Rights Officer, SB4/1 (equivalent to NOB grade) at UNDP      Cache   Translate Page   Web Page Cache   
    United Nations Development Programme (UNDP), helps developing countries attract and use aid effectively. In all our activities, we encourage the protection of human rights, capacity development and the empowerment of women.Job ID: 17978 Location: Makurdi-Benue and Nasarawa (Multiple duty stations including Middle Belt) Agency: Office High Comm for Human Rig Practice Area - Job Family: Management Grade: SB4 Vacancy Type: Service Contract (SC) Posting Type: External Contract Duration: 6 months Duties and Responsibilities Within delegated authority, under the supervision of the Senior Human Rights Adviser, the National Human Rights Officer will be responsible for the following duties: Assists in researches, collection, verification and analyses of information relevant to the observance of international human rights and humanitarian law in the mission area; Assists in supporting UN and humanitarian actors in mission area on protection activities and compliance with human rights, and where appropriate, relevant authorities, including on the implementation of outcomes of UN human rights mechanisms; Assists in conducting investigations of abuses and violations of human rights and international humanitarian law; Assists in timely entry of accurate and verified human rights cases in an established database in compliance with established standards; Assists in drafting reports, reviews and other types of communications in compliance with established standards and in particular with respect to reporting on human rights situation; Liaises with other UN actors present in the mission area for the collection and verification of information on the human rights situation and informs on human rights considerations that should be taken into account by other actors, including those delivering humanitarian response or coordinating emergency preparedness and response activities, as well as by the UN mission in respect of future operations; Assists in advocating with relevant authorities and other influential actors to stop or prevent human rights violations and provide redress to victims; Assists in integration of gender perspectives/considerations and specific women/girls' rights issues in all activities; Supports more senior staff and/or team leaders in planning, budgeting and other related duties as required Competencies Professionalism: Proven sensitivity to the political and social environment and ability to adjust behaviors accordingly; In-depth knowledge of human rights principles, international mechanisms and related concepts, including protection of civilians, transitional justice, humanitarian action, DDR, legislative and rule of law reforms, gender mainstreaming and conflict-related sexual violence; Good knowledge of institutional mandates, organizational policies, and methodologies relating to human rights; Capacity to monitor and coordinate human rights-related matters with other UN, NGO, state and/or government stakeholders and to advocate for the respect and integration of human rights in various fora; Good analytical and research skills, including the ability to gather, validate, evaluate and integrate relevant human rights information from a variety of sources, to assess their impact and to provide recommendations to redress situations; Commitment to seek new and improved methods of work for accomplishing the work of the human rights component; Ability to relate to and integrate human rights issues and perspectives into other fields, including humanitarian action, development, rule of law, legislation reforms and election support, to human rights issues and activities and vice versa; Good knowledge of planning, implementation, coordination and evaluation of human rights capacity development initiatives for multiple stakeholders; Capacity to serve as internal resource person, share knowledge and to deliver training for colleagues and external stakeholders alike; Takes responsibility for incorporating gender perspectives and ensuring the equal participation of women and men in all areas of work. Planning and Organizing: Develops clear goals that are consistent with agreed strategies; Identifies priority activities and assignments; Adjusts priorities as required; Allocates appropriate amount of time and resources for completing work; Foresees risks and allows for contingencies when planning; Monitors and adjusts plans and actions as necessary; Uses time efficiently Communication: Speaks and writes clearly and effectively; Listens to others, correctly interprets messages from others and responds appropriately; Asks questions to clarify, and exhibits interest in having two-way communication; Tailors language, tone, style and format to match audience; Demonstrates openness in sharing information and keeping people informed. Technological Awareness: Keeps abreast of available technology; Understands applicability and limitations of technology to the work of the office; Actively seeks to apply technology to appropriate tasks; Shows willingness to learn new technology. Teamwork: Works collaboratively with colleagues to achieve organizational goals; Solicits input by genuinely valuing others' ideas and expertise; is willing to learn from others; Places team agenda before personal agenda; Supports and acts in accordance with final group decision, even when such decisions may not entirely reflect own position; Shares credit for team accomplishments and accepts joint responsibility for team shortcomings Required Skills and Experience Education: An advanced university degree (Master's degree or equivalent) in law, political science, international relations, social sciences or in a related area. Experience: 2 years of experience in assigned geographic locations in conflict situations in the area of human rights and humanitarian response, including in the causes and resolution of human rights conflicts and programme management are highly desired. Language Requirements: Fluency in English (both oral and written), is required. Knowledge of local language is an advantage.
              Sales Executive at Smart Partners      Cache   Translate Page   Web Page Cache   
    Smart Partners Consulting - Our client, who provides learning support and Growth Seminar for Private Schools and develops Mobile Learning App for Schools, have been in business for more than eleven years and a member of an International business growth consulting organisation, offering astute business executives, owners, directors and professionals a fresh, unique and dynamic approach to business in 26 countries spread across 4 major continents. They have trained over 11,000 school leaders in Nigeria and more than 2,000 other business leaders across various sectors.Slots: Full Time Staff, 3 Openings; Contract Staff, 5 Openings Resumption Date: 3rd September, 2018 Job Summary Our client, presently seek to hire Sales Executives who will sell trainings to private school owners in Lagos and part of Ogun State. Job Responsibilities Preparing and delivering customer presentations and demonstrations of the product, articulately and confidentlY Maintaining and updating customer databases; Liaising and networking with customers and prospects Generating and developing new business leads through follow-up calls; asking for referrals and cold-calling in order to create interest in products and services Communicating with target audiences, making presentation to prospects, converting prospects to paying customers and managing customer relationships. Required Skills: Excellent relationship management and interpersonal skills. Great presentation skills and ability to convert prospects into paying customers Attention to details, problem-solving and good listening skills Ability to overcome objections and gatekeepers Must be able to multi-task and commute physically in and around Lagos Ability to generate and follow-up on leads Strong sense of teamwork and superior communication skills Experience: Minimum of 2 years experience in sales
              Transport Broker at Kerildbert      Cache   Translate Page   Web Page Cache   
    Kerildbert Holdings Limited is a leading 3rd Party Logistics Company in the provision of Shipments, Clearing & Freight Forwarding, Customs Brokerage Removals and Procurement Services to firms in the Country.Job Description We need an individual who can multitask and is able to accomplish tasks well and to match authorized and reliable transportation carriers to the shippers and ensure prompt delivery of carriers. Previous experience and knowledge of the Transport industry is key and we will be looking at candidates with years of experience in the industry. Responsibilities Collect and submit empty returned container cards and delivery waybills from transporters and return them to the port Return delivery order which states the terminal the container should be returned to the port Follow up goods in transit Manage and update transporters' database Liaise with third parties to move goods in accordance with clients' requirements Investigate and plan the appropriate route for a shipment, taking account of cost, transit time and security Resolve freight discrepancies in a timely manner Maintain current knowledge of relevant legislation, political situations and other factors that could affect the movement of freight Arrange appropriate packing, terrain, weight, nature of goods and cost, and the delivery and warehousing of goods at their final destination Negotiate contracts, transportation and handling costs with carriers Maintain strong relationship with multiple carriers Check transporters' safety rating and liability and ensure it is of an acceptable standard Check for delays and inconsistency in offloading Receive delivery documents from transporter and check thoroughly Ensure the transporter is within the return period as agreed on KHL/transporter contract Receive accurate invoices from transporter Prepare and raise payment voucher for internal process to pay the transporter Enter transaction details into database; delivery location, transporter's name and the payment amount Check for demurrage Requirements Ability to bargain and persuade stakeholders to secure valuable deals for KHL Ability to make and maintain existing and beneficial connections. Ability to sequence activities, schedules and maintain timeline. Ability to connect with clients and stakeholders in a professional manner Ability to communicate effectively with all KHL stakeholders Ability to develop creative strategies to ensure efficient service delivery Ability to accept criticism and deal calmly and effectively with high stress situations Must be able to generate reports Should have a sound knowledge of Microsoft Office Suite especially Excel Willing to travel at any time Qualifications Minimum of a Bachelor's degree in a relevant field Minimum of a year's relevant experience Ability to handle drivers and 3rd Party Transporters Practical knowledge of routes within ports and outside Nigeria
              Application Developer (Java & .NET) at GVA Partners      Cache   Translate Page   Web Page Cache   
    Growth in Value Alliance (GV Alliance) Partners - Our client, a Lagos based Bank, is currently recruiting suitably qualified candidates to fill the position below:Job Description The application developer role is a technology focused role intended to provide software development and analysis services to the group. This role is best suited to candidates with proven experience building production, commercial-quality web based solutions with technologies like JAVA, .NET and related technologies and also strong in depth SQL-Server development experience. Applicants must be comfortable with advanced SQL syntax, SQL Server development, SQL and Oracle Databases. The candidate needs to be flexible and open to new ideas or change with the passion and drive to excel in their career. He must be self-directed, organized, and extremely attentive to details. Must have an understanding of agile methodology, iterative development processes, SDLC and have strong OOD and OOA skills. Duties and Responsibilities The Application Developer will be expected to have aptitudes, skills, knowledge and experience on the following areas: Demonstrable analytical skills with regard to specifying and detailing business processes and requirements. 5+ years of relevant object-oriented application building experience in a professional environment. Delivery experience with .NET framework, including C#, ADO.NET, LINQ and ASP.NET. 5+ years delivery experience with Java. Extensive experience with SQL Server (2005/2008/2012). Extensive experience in the use of Oracle Database. Experience with SQL data business intelligence (OLAP, etc…) preferred. Advanced knowledge and experience in HTML and DHTML, JavaScript, CSS. Practical experience in Agile development methodologies. Formulation, management and execution of data test strategies, plans and delivery commitments in concert with business and project management efforts. Mobile and web service development experience. Experience with ticketing systems (e.g.; JIRA, Bugzilla) and managed workflows. Strong familiarity with source control systems (e.g. Team Suite). Educational Qualification Bachelor's Degree (B.SB.A), Computer Science, Computer or Electronic Engineering or similar disciplines. Experience: 6 years delivery experience with Java or .NET technologies. Knowledge and Skill Requirements: The Application Developer will often be challenged with new problems to which they will need to rely on strong problem solving skills to resolve: The ability to accurately identify the cause of a system/application malfunction, interprets that to management and their colleagues, document and propose resolutions. Fully understand structured methodologies (e.g. Agile) for using programming code to solve business problems. Ensure all changes and implementations are well tested and managed in a controlled manner with full rollback plans. Correctly identify when assistance is required and request it accordingly. Collaborate with the wider team in matters where their support is required. Experience in managing crisis. A commitment to high professional ethical standards working in a diverse workplace. Excellent communication skills both verbal and written. Knowledge of business and management principles and practices. Experience in organizational effectiveness and operations management implementing best practices.
              Information Security Specialist at GVA Partners      Cache   Translate Page   Web Page Cache   
    Growth in Value Alliance (GV Alliance) Partners - Our client, a Lagos based Bank, is currently recruiting suitably qualified candidates to fill the position below:Job Description The Information Security Analyst reports to the Head of Information Risk Management and is responsible for the design, implementation and maintenance of effective systems security solutions. She/he will also investigate and resolve identified systems security breaches, create comprehensive maintenance of information security policies, standards, guidelines and procedures and monitor for compliance in line with the organization's IT security policy and applicable laws. The successful candidate in collaboration with the Information Technology Services (ITS) Systems Support team, will also monitor, assess, and fine-tune the IT business continuity and disaster recovery program, perform network penetration tests, application vulnerability assessment scans and risk audit reviews. This is a senior opening which provides an opportunity to work with a team of talented technical skills in transforming a leading Emerging Markets Operations in the Financial Services sector, positioning it for growth and leadership within its region, by actively working to achieve the enterprise security goals of the establishment.. Duties and Responsibilities Monitor and advice on information security issues related to the systems and workflow to ensure the internal security controls are appropriate and operating as intended. Coordinate response to information security incidents. Conduct data classification assessment and security audits and manage remediation plans. Collaborate with IT management, the legal department, and other stakeholders to manage security vulnerabilities. Perform the deployment, integration and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise's security documents specifically. Create, manage and maintain user security awareness. Conduct security research in keeping abreast of latest security issues. Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors. Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security. Prepare IT security documentation, including information security policies, procedures, standards and guidelines based on compliance requirements and knowledge of best practices. Knowledge and Skill Requirements Extensive experience in enterprise security architecture design and enterprise security document creation. Solid knowledge of information security principles and practices. Working experience with intrusion detection systems Installation, configuration, monitoring and response to security system Understanding of advanced security protocols and standards Experience with IP networking, networking protocols, IPSec, VPN's, firewalls, proxy services, DNS, email, access lists. Experience with internet, web, application and network security techniques. Proven analytical and problem-solving abilities. Ability to effectively prioritize and execute tasks in a high-pressure environment. Good written, oral, and interpersonal communication skills. Ability to conduct research into IT security issues and products as required. Ability to present ideas in business-friendly and user-friendly language. Experience in designing and delivering employee security awareness training. Highly self-motivated and directed. Keen attention to detail. Team-oriented and skilled in working within a collaborative environment. Experience with software and security architectures Proactively assesses potential items of risk and opportunities of vulnerability in the network Experience with security practices of Intranet and Extranet Support day-to-day administration of various firewalls Strategy & Planning: Lead the planning and design activities for the enterprise security architecture, under the directives of the Head, Information Risk Management. Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines and procedures) in collaboration with other team heads in the Information Risk Management unit. Provide leadership and work guidance to members of the Information Security team. Problem Solving: The post holder will be expected to work actively to achieve enterprise security goals within a set of resource constraints. S/he will need to: Have the ability to think logically and analyse complex situations for effective, sometimes out of the box solutions. Work with all stakeholders to develop strategic solution options and delivery plans Communicating With Others: The Information Security analyst will be expected to have excellent communication skills and experience in working with sponsors and other members of the business. The following points illustrate this: Communication and visibility of all critical issues and their status and service restore plans Define team member roles and expectations, and ensure timely feedback Communicate the technology vision and service improvement plans to internal and external stakeholders Operational Management: The operational scope of the post holder is underscored by the following functions: Identify security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives. Provide technical support in the development, testing and operation of firewalls, intrusion- detection systems, enterprise anti-virus and other automation as required. Ensure the confidentiality, integrity and availability of the data residing on or transmitted through the organization's workstations, servers , systems through databases and other data repositories. Ensure active compliance with information security requirements. Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, (i.e., security tool, workstations, servers, network devices, etc.). Maintain operational configurations of all in-place security solutions as per the established baselines. Review logs and reports of all systems and devices Participate in the design and execution of vulnerability assessments, penetration tests and security audits. Provide on-call support for end users for all in-place security solutions. Educational Qualification A Bachelor's degree in Science, Electronic Engineering or any related discipline. (B.Sc degree in Computer Science, Engineering discipline, Mathematics or Physics will be a distinct advantage) Experience A minimum of 6 years post NYSC experience in IT/Network Security.
              Lead, Database Administration & Critical Infrastructure at GVA Partners      Cache   Translate Page   Web Page Cache   
    Growth in Value Alliance (GV Alliance) Partners - Our client, a Lagos based Bank, is currently recruiting suitably qualified candidates to fill the position below:Educational Qualification First Degree in Computer Science, Engineering or other related courses. Experience: 5+ years post NYSC experience. Good working knowledge of Windows, Unix and Linux operating systems. Knowledge of Oracle and MS SQL database administration. IBM/AIX Websphere administration. Storage infrastructure administration. Professional Competencies Core: Database Administration. Knowledge of Oracle and MS SQL. Application Support. Knowledge of troubleshooting hardware and operational systems. Knowledge of relevant policies and regulations. Research Orientation. Data / Information Management. Stakeholder Management. Data / Information Management. Negotiation. Business Presentation Skills. Customer focus. Vendor management Non Core: Reporting. Project Management.
              Oracle Database Administrator at GVA Partners      Cache   Translate Page   Web Page Cache   
    Growth in Value Alliance (GV Alliance) Partners - Our client, a Lagos based Bank, is currently recruiting suitably qualified candidates to fill the position below:Job Description The role performs effective centralised database administration for multiple databases globally particularly Oracle databases for production, testing, and staging environments across the company. This opportunity will suit an Oracle DBA who enjoys providing technical guidance and who can play a key role in supporting and driving forward our database developments. Duties and Responsibilities Expert knowledge of Oracle Database, Oracle RAC, Oracle ASM. Strong DBA skills and relevant working experience with Oracle Database 11g and 12c Pluggable Database (PDB). Experience implementing high availability features of Oracle Database. Experience with Exadata and Enterprise Manager 11g/12c/13c is a plus. Oracle GoldenGate and ODI (Oracle Data Integrator) Skills is a plus. Sharp technical troubleshooting skills. Performing upgrades of the database and software to new release levels. Performing security updates and patching of the database environments. Managing the database's storage structures. Making database backups and performing recovery when necessary. Pro-actively monitoring the database's health and taking preventive or corrective action as required. Assists with impact analysis of any changes made to the database objects, recommending and implementing solutions to database problems. Securing assistance from vendors and consultants regarding database issues. Completing requests from application developers, business users, etc. Puts standards in place to ensure that all application design and code is produced with proper integrity, security and performance. Evaluating, Planning and Implementing New Database Technologies, Designs, and Solutions. Stay current with the latest technologies and make recommendations to enhance the department's database environment. Knowledge and Skill Requirements Experience in managing crisis. A commitment to high professional ethical standards working in a diverse workplace. Excellent communication skills both verbal and written. Knowledge of business and management principles and practices. Experience in organizational effectiveness and operations management implementing best practices. Strong analytical skills. Collaborate with the wider team in matters where their support is required. Educational Qualification First Degree in Computer Science, Engineering or other related fields. Experience A minimum of 6 years post NYSC experience as an Oracle Database Administrator.
              Database Administration & Critical Infrastructure Officer at GVA Partners      Cache   Translate Page   Web Page Cache   
    Growth in Value Alliance (GV Alliance) Partners - Our client, a Lagos based Bank, is currently recruiting suitably qualified candidates to fill the position below:Educational Qualification First Degree in Computer Science, Engineering or other related courses. Experience: 2-3 years post NYSC experience. Good working knowledge of Windows, Unix and Linux operating systems. Knowledge of Oracle and MS SQL database administration. IBM/AIX Websphere administration. Storage infrastructure administration. Professional Competencies Core: Database Administration. Knowledge of Oracle and MS SQL. Application Support. Knowledge of troubleshooting hardware and operational systems. Knowledge of relevant policies and regulations. Research Orientation. Data / Information Management. Stakeholder Management. Data / Information Management. Negotiation. Business Presentation Skills. Customer focus. Vendor management Non Core: Reporting Project Management.
              MySQL Programmer at Vascon Solutions      Cache   Translate Page   Web Page Cache   
    Vascon Solutions is an ICT company focused on Value Added Solutions Delivery in the Enterprise Technology space. VASCON draws from an experienced base of personnel whilst maintaining a personalized form of business liaison. We are ultimate in ICT Solutions with diversified skills we adapt to meet clients expectations.Job Description The primary job responsibility for the developer position is to provide programming and functionality for a variety of consumer applications. You will be challenged on a daily basis to solve problems in new and creative ways. A successful candidate will have demonstrable experience building real online applications such as a social e-commerce site, desktop applications etc. in a LAMP environment and will be able to make a meaningful contribution from day one. You should be comfortable working with team members at all levels and departments within the organization. You will be willing to share your opinions and insights with business leaders in order to affect rapid decision cycles and effective technical solutions to business requirements. Skills Required & Qualifications Candidate should possess a B.Sc, HND and OND in a related discipline and years of experience in a similar field. Professional certification will be an added advantage. Proven Web and Database Development experience. In depth MySQL, PHP and Tableau knowledge Strong database knowledge specifically SQL Server Excellent communication skills and attention to detail Knowledge of graphic design packages such as Fireworks or Photoshop in order to produce basic layout and manipulate images. Skills in e-commerce and server side technologies, such as PHP, and internet security are also important. Applicants should search for Vascon Solutions on Linkedin, Facebook and Twitter, and follow as updates of other vacancies may be on our social media pages.
              Corporate Sales Manager at E'sorae Luxury      Cache   Translate Page   Web Page Cache   
    E'sorae Luxury - The company was founded in 2010 with the motive to provide the finest selection of bedding and home accessories available, along with unsurpassed customer service to our esteemed clients.Location: Lekki Phase 1, Lagos Job Description Develop the business portfolio based on the company's strategic objective Develop the company's product mix based on customer survey reports Develop the business plan and deliver the sales strategy Develop the portfolio of prospects into clients, selling the full service, products and solutions mix of the company Meet and exceed all revenue targets set quarterly and annually Develop the business opportunities Set up meetings, and presentations Generate leads through market and client research Ensure our client, customers database and all information management is accurate, tidy and regularly updated Manage the CRM tool and ensure regular reporting on the sales funnel Monitor competitor activity and market dynamics within specific markets Oversee the development of marketing literature. Requirements The ideal candidates will have a minimum of second class lower division from a four-year higher institution with a minimum of 1 year working experience.
              Business Development Officer at Bellforte Consulting      Cache   Translate Page   Web Page Cache   
    Cypress Leasing and Investments Limited, provides solutions in Operational and Finance Leases, Asset Management and Investment Advisory. Cypress services includes Consumer and Corporate Leases and Rentals, Logistics and Fleet Management, and Portfolio Management.Job Description Identify and cultivate lease financing and loan lending opportunities within the corporate and retail sectors and specifically your assigned sub-sector. Establish/originate, evaluate/develop, qualify and maintain lease financing and loan lending opportunities and offer lease financing and loan lending to customers. Ensure compliance with all guidelines in the staff/employee handbook. Ensure a Balanced Scorecard perspective of metrics and ratios of financial, customer, internal process, lease terms and payments. Adhere to organizational procedures and policies for all lease processing. Develop and implement policies and procedures to improve efficiency and profitability of the department. Develop and apply full knowledge of application information required, screening processes and policies regarding leases. Ensure efficient and timely processing of all required administrative forms, reports and related information. Ensure the creation, development and maintenance of a comprehensive database of external contacts and clients. Knowledge of current market conditions; competitor and market analysis, monitoring and reporting. Coordinate customer interaction and interface with all parties involved on each individual lease that is originated from application to closing including, but not limited to: counseling and pre-qualifying potential lessees, taking complete and accurate application; obtaining all necessary support documents along with the appropriate fees and equity contributions and lock-in information; overseeing the lease process by monitoring lease status and ensuring conformity with terms; assisting in collecting additional documents and promptly communicate lease status to parties. Maintain a blotter or schedule of all disbursements, pendings, maturities and defaults. Maintain a professional image and standards consistent with company policies and procedures. Submit a weekly, monthly, quarterly, yearly and periodic summary of achievements, closures, meetings/presentations to the Senior Manager. Requirements A good understanding of the leasing industry is required Good dress sense Good command of english language Good marketing skills
              The Edge Search: Bluehost Hosting 2018 Review       Cache   Translate Page   Web Page Cache   

    Bluehost is one of the most affordable and reputable web hosting companies in the world. Established in 2003, they continue to grow and attract more than 20,000 new customers each month.

    Known for rock-solid reliability, Bluehost's shared hosting comes complete with generous disk space and bandwidth, free domain name plus an array of additional hosting features such as automated backups and one-click WordPress installation.

    By always going out of their way to help their customers, you can be sure of receiving all the technical support you need

    Bluehost Features

    Since the beginning of 2003, Bluehost has always provided high-quality service while keeping pace with the technical developments and improvements in the industry.

    As the needs of webmasters have evolved, so too has the Bluehost offering. Their reputation for reliability and quality service has been well earned and is why they remain a leader in the ultra-competitive web hosting industry.
    1. Free Domain Name Included
    2. Unlimited Bandwidth
    3. Unlimited Disk Space
    4. Unlimited Add-On Websites
    5. 30 Day Money Back Guarantee

    Visit Bluehost.com - 30 Day Money Back Guarantee. It's Risk Free!

    Bluehost's outstanding service is combined with a feature-packed offering and industry leading uptimes. This is all possible due to their state-of-the-art network infrastructure. Their hi-tech data centre is very impressive and boasts Internet connectivity over their OC-48 connection at an incredible 2GB/sec bandwidth.

    Quad processor servers, 24/7 monitoring, a diesel-powered backup generator and mirrored storage backups round out the data centre's notable list of features.
    Total Domains:
    2,163,617
    • .com
      1,810,607
    • .org
      167,674
    • .net
      130,598
    • .us
      21,703
    • .info
      20,392
    • .biz
      12,643


    Even though Bluehost's basic hosting package is on a shared server, the specifications are far from typical when compared to industry standards for shared hosting plans.


    Bluehost's servers run on 64-bit Linux distributions. What's more, excessive CPU load and server slowdowns are non-existent on this setup while super-fast site performance is maintained even at peak usage times. These specs are hard to match and leave Bluehost's competitors trailing in their wake.

    Visit Bluehost.com - 30 Day Money Back Guarantee. It's Risk-Free!

    Control Panel

    For back-end administration, Bluehost provide the industry favourite cPanel interface. With its comprehensive features and intuitive design, webmasters have everything they need to easily launch and maintain their sites.

    Furthermore, Bluehost's own Page Wizard application enables professional looking Web pages to be created with just a few clicks. Web-based file management and script support for Fantastico are just a few of the many other features that cPanel boasts.

    Scripts

    SimpleScripts, Mojo and Fantastico support enables users to quickly install a wide variety of popular software packages such as WordPress, Drupal, and Joomla. Never before has it been so easy to install blogs, forums, image galleries, polls and content management systems.

    Fantastico de Luxe popularity amongst webmasters is a testament to its simple operation, and its inclusion in Bluehost's plan adds even more value to their already featured packed offering. For more advanced users who prefer installing scripts manually, Bluehost supports all popular scripting languages including:
    1. CGI
    2. Python
    3. PERL 5
    4. PHP4 & PHP5
    5. Ruby on Rails
    6. CRON jobs, Apache .htaccess and custom php.ini are also supported
    WordPress is now one of the most widely used blogging and content management system platforms in the world and it's worth noting that Bluehost offers 1-Click installation of WordPress with all their hosting packages.


    Visit Bluehost.com - 30 Day Money Back Guarantee. It's Risk-Free!

    Uptime & Performance


    Feature-laden, value for money hosting packages are important, but nothing is of greater importance than your web host providing basic network reliability. Claims of 99.9% uptime are all well and good but only the select few can back up their promises with actual data.


    Bluehost is proud of their network integrity and list it as one of their key features. No longer do webmasters need to worry about losing business because their site is down. In fact, downtime is one of the most prevalent reasons why site owners shift from mediocre providers to a company like Bluehost who take their commitment to 99.9% up-time very seriously.

    Independent testing on a site hosted by Bluehost revealed only thirty minutes of total downtime over a 90-day period. What's really impressive about this result is that, out of the total downtime, all thirty minutes were identified as planned maintenance. Bluehost's planned downtime is always scheduled during periods when Web traffic is off-peak to keep impact to a minimum.

    Visit Bluehost.com - 30 Day Money Back Guarantee. It's Risk Free!


    A webmaster will always find any amount of downtime unpalatable but 30 minutes in 90 days equates to 99.93% uptime, which is a highly impressive result. Given that performance is a key factor in the choice of a web hosting provider, we decided to undertake some performance testing of our own. We tested the page load time of the Bluehost homepage .

    Bluehost Results: 

    Homepage is loaded in 3.4 seconds
    Homepage is fully loaded in 5.1 seconds

    (Test server region: Dallas, USA. Connection: Cable (5/1 Mbps, 30ms). Date: 11 August 2013)

    Help & Support

    Bluehost offers customers several ways to access their technical support, one of which is the Bluehost Help Center. The Help Center contains a complete database of troubleshooting issues and fixes, together with instructions for hundreds of site-management tasks. It's the quickest and easiest way to get minor issues resolved.
    Alternatively, clients with more complex problems can submit a help ticket through the Help Center and will receive email or live support as needed. Tickets are always answered in less than 12 hours, with most being addressed within just 1-2 hours.

    Lastly, Live Phone support is also offered 24/7. This allows customers to speak directly with a technical expert and have all their questions comprehensively answered. Clients outside of the United States have not been forgotten either with additional phone numbers being provided specifically for them.

    Bluehost Plans & Pricing

    Bluehost have a straightforward approach to shared hosting. They only offer Linux shared server hosting on two simple plans; a standard hosting plan and a professional hosting plan (Bluehost also offers VPS, Dedicated Servers and Managed WordPress hosting).

    STANDARD HOSTING PLAN

    • $3.95 per month
    • Unlimited Disk storage space
    • Unlimited Monthly Bandwidth
    • Unlimited Addon Domains (One free domain registration with account)
    • Unlimited Sub-domains
    • Unlimited Parked Domains
    • International Domains Supported
    • 1000 FTP Accounts (anonymous FTP support included)
    • Unlimited IMAP or POP3 E-mail Accounts
    • Secure IMAP Email Support
    • Unlimited Forwarding Email Addresses
    • Spam-Assassin Free-mail Filtering
    • cPanel Control Panel
    • 50 Postgre SQL or MySQL Databases
    • Frontpage 2000/2002/2003 Extensions
    • Ruby on Rails, CGI, Python, Perl 5, PHP 4&5 Scripts
    • Fully supported Server Side Includes (SSI)
    • SSH Shell Access
    • Fantastico Support
    • CRON Access and .htaccess
    • Free 1-Click Script Install
    • $100 Google Advertising Offer
    • 24/7 Phone, Chat & Email Support

    Sign Up Now - Risk free - 30 day money back guarantee


    PRO HOSTING PLAN

    • $19.95 per month
    • Unlimited Disk storage space
    • Unlimited Monthly Bandwidth
    • Unlimited Addon Domains (One free domain registration with account)
    • Unlimited Sub-domains
    • Unlimited Parked Domains
    • International Domains Supported
    • 1000 FTP Accounts (anonymous FTP support included)
    • Unlimited IMAP or POP3 E-mail Accounts
    • Secure IMAP Email Support
    • Unlimited Forwarding Email Addresses
    • Spam-Assassin Free-mail Filtering
    • cPanel Control Panel
    • 50 Postgre SQL or MySQL Databases
    • Frontpage 2000/2002/2003 Extensions
    • Ruby on Rails, CGI, Python, Perl 5, PHP 4&5 Scripts
    • Fully supported Server Side Includes (SSI)
    • SSH Shell Access
    • Fantastico Support
    • CRON Access and .htaccess
    • Free 1-Click Script Install
    • $100 Google Advertising Offer
    • 24/7 Phone, Chat & Email Support
    •  More CPU, Memory and Resources Added
    •  SiteBackup Pro Included
    •  Free Dedicated IP Address
    •  Free SSL Certificate
    •  Free Domain Name Privacy
    •  10 Free Postini
              IP Geolocation API by WHOIS API Launches Comprehensive IP Geolocation Database      Cache   Translate Page   Web Page Cache   
    Online tool for instantly finding IP address’ physical geolocation enables users to uncover which country, state or city website visitors originate from.
              Software Design Engineers II      Cache   Translate Page   Web Page Cache   
    OK-Tulsa, Software Design Engineers II (Tulsa, OK): Design, create, and maintain Microsoft .NET application code for integrated web applications, server APIs and services and database structures in SQL Server. Resume to: Navico, Inc. Attn: Heather Burge, 4500 S. 129th E Ave. Ste. 200 Tulsa, OK 74134-5885 Reference job #VI424707NP
              Intermediate - Senior Environmental Consultant - Ridgeline Canada Inc. - Lloydminster, SK      Cache   Translate Page   Web Page Cache   
    Valid driver’s license. Proficient with Microsoft Office and database entry. Understanding of the upstream oil and gas regulatory requirements in AB &amp; BC....
    From Indeed - Fri, 20 Jul 2018 00:09:53 GMT - View all Lloydminster, SK jobs
              Mine IT Specialist (Mid/Senior) - Point of Rocks, WY - PacifiCorp - Point of Rocks, WY      Cache   Translate Page   Web Page Cache   
    Knowledge of UNIX, LINUX, Windows Operating systems, AD. Support mine IT requirements including desktop and server support, database and security administration...
    From Pacificorp - Wed, 25 Jul 2018 14:30:09 GMT - View all Point of Rocks, WY jobs
              Oracle/SQL SERVER DBA      Cache   Translate Page   Web Page Cache   
    TX-Plano, Database Design Engineer will play a key role for all aspects of the design, development and delivery of data and database standards and solutions, responsible for building and architecture to support Disaster Recovery, High Availability, and replication for database. This position will ensure that all database implementations are consistent with enterprise standards. Perform knowledge transfer an
              Data Coordinator      Cache   Translate Page   Web Page Cache   
    CA-Sacramento, job summary: The Data Coordinator supports the Digital Team in gathering, inputting, validating and analyzing data for our client's consumer facing website databases. The Data Coordinator: - Supports data management for system-level databases, including provider search, location search, health plan, etc. - Has an understanding of how site behavior and rules impact display of data in front end appl
              Senior Tealium Digital Analytics Implementation Engineer - Ascent Services Group - Austin, TX      Cache   Translate Page   Web Page Cache   
    Knowledge of database and data warehouse/data lake – Oracle, SQL Server, IBM DB2. Please contact Aparna Ghosh at (925) 627 4984 or email at aparna@ascentsg.com....
    From Ascent Services Group - Wed, 23 May 2018 15:35:29 GMT - View all Austin, TX jobs
              Current Vacancies In A Reputable Bank      Cache   Translate Page   Web Page Cache   
    Current Vacancies In A Reputable Bank Growth in Value Alliance (GV Alliance) Partners – Our client, a Lagos based Bank, is currently recruiting suitably qualified candidates to fill the position below:     Job Title: Lead, Database Administration & Critical Infrastructure Location: Lagos Educational Qualification First Degree in Computer Science, Engineering or other related courses. Experience: 5+ …
              Driver Recruiter      Cache   Translate Page   Web Page Cache   
    MI-Plymouth, Whiteline Express, Ltd., is growing and has an immediate opportunity available for an experienced Driver Recruiter located at our corporate headquarters in Plymouth, MI. Driver Recruiter Responsibilities · * Handle inbound and outbound calls from potential CDL A drivers · * Qualifying potential driver applicants to ensure they meet minimum hiring qualifications · * Utilizing third-party databases
              Sales Associate - GUESS?. Inc. - San Juan, PR      Cache   Translate Page   Web Page Cache   
    Provides efficient service at the cash wrap, offers Gift Cards, maintains cash wrap cleanliness and captures customer information in the database....
    From GUESS?. INC. - Thu, 09 Aug 2018 04:44:26 GMT - View all San Juan, PR jobs
              RCS Recruiter      Cache   Translate Page   Web Page Cache   
    NC-Charlotte, Position objective The primary objective of the RCS Recruiter is to drive order fill rates for our RCS client units by evaluating their staffing needs, as well as candidates' skill and experience, to make effective matches. The successful Recruiter builds and manages a database of placeable candidates for a specific RCS account, District, or Region. Education • HS Diploma required • Bachelor's pre
              Computing’s Hippocratic oath is here      Cache   Translate Page   Web Page Cache   

    Computing professionals are on the front lines of almost every aspect of the modern world. They’re involved in the response when hackers steal the personal information of hundreds of thousands of people from a large corporation. Their work can protect–or jeopardize–critical infrastructures, such as electrical grids and transportation lines. And the algorithms they write may determine who gets a job, who is approved for a bank loan, or who gets released on bail.

    Technological professionals are the first, and last, lines of defense against the misuse of technology. Nobody else understands the systems as well, and nobody else is in a position to protect specific data elements or ensure that the connections between one component and another are appropriate, safe, and reliable. As the role of computing continues its decades-long expansion in society, computer scientists are central to what happens next.

    That’s why the world’s largest organization of computer scientists and engineers, the Association for Computing Machinery, of which I am president, has issued a new code of ethics for computing professionals. And it’s why ACM is taking other steps to help technologists engage with ethical questions.

    [Photo: Hero Images/Getty Images]

    Serving the public interest

    A code of ethics is more than just a document on paper. There are hundreds of examples of the core values and standards to which every member of a field is held–including for organist guilds and outdoor-advertising associations. The world’s oldest code of ethics is also its most famous: The Hippocratic oath that medical doctors take, promising to care responsibly for their patients.

    I suspect that one reason for the Hippocratic oath’s fame is how personal medical treatment can be, with people’s lives hanging in the balance. It’s important for patients to feel confident their medical caregivers have their interests firmly in mind.

    Technology is, in many ways, similarly personal. In modern society, computers, software, and digital data are everywhere. They’re visible in laptops and smartphones, social media and video conferencing, but they’re also hidden inside the devices that help manage people’s daily lives, from thermostats to timers on coffeemakers. New developments in autonomous vehicles, sensor networks, and machine learning mean computing will play an even more central role in everyday life in coming years.

    [Photo: Hero Images/Getty Images]

    A changing profession

    As the creators of these technologies, computing professionals have helped usher in the new and richly vibrant rhythms of modern life. But as computers become increasingly interwoven into the fabric of life, we in the profession must personally recommit to serving society through ethical conduct.

    ACM’s last code of ethics was adopted in 1992, when many people saw computing work as purely technical. The internet was in its infancy and people were just beginning to understand the value of being able to aggregate and distribute information widely. It would still be years before artificial intelligence and machine learning had applications outside research labs.

    Today, technologists’ work can affect the lives and livelihoods of people in ways that may be unintended, even unpredictable. I’m not an ethicist by training, but it’s clear to me that anyone in today’s computing field can benefit from guidance on ethical thinking and behavior.

    [Photo: Hero Images/Getty Images]

    Updates to the code

    ACM’s new ethics code has several important differences from the 1992 version. One has to do with unintended consequences. In the 1970s and 1980s, technologists built software or systems whose effects were limited to specific locations or circumstances. But over the past two decades, it has become clear that as technologies evolve, they can be applied in contexts very different from the original intent.

    For example, computer vision research has led to ways of creating 3D models of objects–and people–based on 2D images, but it was never intended to be used in conjunction with machine learning in surveillance or drone applications. The old ethics code asked software developers to be sure a program would actually do what they said it would. The new version also exhorts developers to explicitly evaluate their work to identify potentially harmful side effects or potential for misuse.

    Another example has to do with human interaction. In 1992, most software was being developed by trained programmers to run operating systems, databases, and other basic computing functions. Today, many applications rely on user interfaces to interact directly with a potentially vast number of people. The updated code of ethics includes more detailed considerations about the needs and sensitivities of very diverse potential users–including discussing discrimination, exclusion, and harassment.

    More and more software is being developed to run with little or no input or human understanding, producing analytical results to guide decision making, such as when to approve bank loans. The outputs can have completely unintended social effects, skewed against whole classes of people–as in recent cases where data-mining predictions of who would default on a loan showed biases against people who seek longer-term loans or live in particular areas. There are also the dangers of what are called “false positives,” when a computer links two things that shouldn’t be connected–as when facial-recognition software recently matched members of Congress to criminals’ mug shots. The revised code exhorts technologists to take special care to avoid creating systems with the potential to oppress or disenfranchise whole groups of people.

    [Photo: Hero Images/Getty Images]

    Living ethics in technology

    The code was revised over the course of more than two years, including ACM members and people outside the organization and even outside the computing and technological professions. All of these perspectives made the code better. For example, a government-employed weapons designer asked whether that job inherently required violating the code; the wording was changed to clarify that systems must be “consistent with the public good.”

    Now that the code is out, there’s more to do. ACM has created a repository for case studies, showing how ethical thinking and the guidelines can be applied in a variety of real-world situations. The group’s “Ask An Ethicist” blog and video series invites the public to submit scenarios or quandaries as they arise in practice. Word is also underway to develop teaching modules so that concepts can be integrated into computing education from primary school through university.

    Feedback has been overwhelmingly positive. My personal favorite was the comment from a young programmer after reading the code: “Now I know what to tell my boss if he asks me to do something like that again.”

    The ACM Code of Ethics and Professional Conduct begins with the statement “Computing professionals’ actions change the world.” We don’t know if our code will last as long as the Hippocratic oath. But it highlights how important it is that the global computing community understands the impact our work has–and takes seriously our obligation to the public good.

    Cherri M. Pancake is Professor Emeritus of Electrical Engineering & Computer Science at Oregon State University. This post originally appeared on The Conversation.

              Industry Coordinator, Engineering Career Centre - University of Calgary - Calgary, AB      Cache   Translate Page   Web Page Cache   
    Assisting the Internship Specialist with posting positions, accepting internship students and general administration related to the database on both industry...
    From University of Calgary - Thu, 09 Aug 2018 22:17:29 GMT - View all Calgary, AB jobs
              Senior IT Database Analyst - Precision Drilling Corporation - Calgary, AB      Cache   Translate Page   Web Page Cache   
    Minimum 5 years hands-on Basis/Oracle/SQL Server experience in a Microsoft Windows environment including these systems:....
    From Precision Drilling Corporation - Thu, 14 Jun 2018 17:04:18 GMT - View all Calgary, AB jobs
              医療費適正化、介護費適正化      Cache   Translate Page   Web Page Cache   
    メディウォッチ「2018年3月の後発品割合75.0%、80%以上の自治体は沖縄・鹿児島・岩手の3県―協会けんぽ」(http://www.medwatch.jp/?p=21910)。<以下引用>
    <主に中小企業のサラリーマンとその家族が加入する協会けんぽにおいて、ジェネリック医薬品(後発品)の使用割合は、今年(2018年)3月時点で75.0%となり、前月から0.4ポイント上昇した。都道府県別に見ると沖縄県・鹿児島県・岩手県の3自治体で、政府の第2目標「80%以上」をクリアしている―。こうした状況が、協会けんぽを運営する全国健康保険協会が8月7日に公表した医薬品使用状況から明らかになりました。直近1年間の上昇ペースが続けば、2019年4月に後発品割合80%をクリア 高齢化や医療技術の高度化などを背景に医療費が膨張し、我が国の財政を圧迫しています。医療費が膨張を続け、我々の負担能力を超えてしまえば、公的医療保険制度、国民皆保険制度が崩壊してしまい、結果として我が国の健康水準は大きく低下してしまいます。2025年にはいわゆる団塊の世代がすべて後期高齢者となるため、今後、医療・介護ニーズが飛躍的に増加することから、「医療費の適正化」が非常に重要なテーマとなっています。医療費適正化方策としては、▼平均在院日数の短縮▼後発医薬品(ジェネリック医薬品)の使用促進▼医療機能の分化と連携の強化▼地域差の是正―などさまざまあります。このうち「後発品の使用促進」については、政府が▼2017年央に後発品の使用割合を数量ベースで70%以上とする(第1目標)▼2020年9月に80%以上とする(第2目標)―という2段階の目標値を設定するとともに、診療報酬における加算の設定や充実、地域での保険者協議会の活用依頼など、さまざまな取り組みが進められています。協会けんぽの運営主体である全国健康保険協会でも、従前より後発品の使用促進に取り組んでいます。例えば、医療機関を受診し医薬品を処方された加入者個々人に宛てて「貴兄に処方される医薬品を先発品から後発品に切り替えれば、自己負担額が○○円軽減されます」といった通知を発出しているほか、毎月の後発品使用割合の公表などです(前月の状況はこちら、前々月の状況はこちら)。今年(2018年)3月の状況を見ると、前月から0.4ポイント上昇し、数量ベースで75.0%(新指標、調剤分)となりました。第2目標「80%以上」との間には、今年(2018年)3月時点で、5.0ポイントの開きがあります。直近1年間(2017年4月から2018年3月)には、単純計算で「1か月当たり0.4ポイント」のペースで後発品割合が上昇しています。仮に、このペースが継続するとなれば、計算上は来年(2019年)4月に「80%」をクリアできることになります。もっとも、昨年(2017年)1年間は「後発品の使用が思うように進まない」状況もあり、今後もこうした状況に陥る可能性もあります。今後の動向を注視していく必要があります。80%以上をクリアする自治体がある一方で、徳島、山梨、高知の3県で依然、70%未達 後発品割合は協会けんぽ全体では着実に上昇していますが、都道府県別に見ると、依然として大きなバラツキがあります。最も後発品割合が高いのは沖縄県で84.6%(前月から0.3ポイント上昇)、次いで鹿児島県の81.6%(同0.4ポイント上昇)、岩手県の80.4%(同0.6ポイント上昇)で高く、「80%以上」クリアは3自治体に増加しました(前月は沖縄・鹿児島の2県)。逆に最も低いのは徳島県で66.5%(同0.7ポイント上昇)。また今年(2018年)3月時点で、第1目標の「70%以上」をクリアできていない自治体は、徳島県のほか▼山梨県:67.2%(前月から0.1ポイント上昇)▼高知県:69.4%(同0.2ポイント上昇)—となっています。最高の沖縄県と最低の徳島県との間には、18.1ポイントの格差があります。2018年度からは、国民健康保険の財政責任主体が都道府県に移管されており、「医療費適正化」を、まさに「我が事」と捉え、先進県(沖縄県や鹿児島県)の取り組みを参考に、後発品の使用促進に取り組むことが期待されます。なお、主な薬効分類別に後発品使用割合が高い医薬品を見ると、数量ベースでは血管拡張剤の81.1%(同0.6ポイント上昇)、去たん剤の77.7%(同0.3ポイント上昇)、高脂血症用剤70.6%(同0.7ポイント上昇)など。逆に、後発品使用割合が低いのはホルモン剤(抗ホルモン剤を含む)の17.8%(同2.8ポイント上昇)、代謝拮抗剤の23.6%(同0.3ポイント上昇)、抗ウイルス剤の24.0%(同14.5ポイント上昇)などとなっています。また金額ベースでは、血管拡張剤の69.6%(同0.9ポイント上昇)、去たん剤の62.9%(同0.4ポイント上昇)、抗生物質製剤のうち「主としてグラム陽性菌、マイコプラズマに作用するもの」の47.3%(同1.1ポイント上昇)など、逆に、後発品使用割合が低いのは、抗ウイルス剤の4.3%(同1.6ポイント上昇)、糖尿病用剤の7.1%(同増減なし)などとなっています。>

    協会けんぽ「医薬品使用状況」(https://www.kyoukaikenpo.or.jp/g7/cat740/sb7200/sbb7203/h29)が更新されている。全国健康保険協会運営委員会(http://www.kyoukaikenpo.or.jp/g7/cat720/h29/dai90kai/300129)の「平成30年度都道府県単位保険料率」(http://www.kyoukaikenpo.or.jp/~/media/Files/shared/direction/dai90kai/2018012901.pdf)では佐賀県10.61%~新潟県9.63%であるが、激変緩和措置(http://www.kyoukaikenpo.or.jp/~/media/Files/shared/direction/dai90kai/2018012903.pdf)がされており、本来はもっと差がついていることは認識したい。なお、後発医薬品割合;厚労省資料(http://www.mhlw.go.jp/file/05-Shingikai-12201000-Shakaiengokyokushougaihokenfukushibu-Kikakuka/0000153730.pdf)p96~p113「自治体別後発医薬品使用割合」が出ており、内閣府「経済・財政と暮らしの関係「見える化」ポータルサイト」(http://www5.cao.go.jp/keizai-shimon/kaigi/special/reform/mieruka/index.html)の「経済・財政一体改革に係る「見える化」ページ リンク集」(http://www5.cao.go.jp/keizai-shimon/kaigi/special/reform/mieruka/db_top/link/index.html)には、「調剤医療費の動向調査:集計結果」(https://www.mhlw.go.jp/bunya/iryouhoken/database/zenpan/cyouzai_doukou_yougo.html)で、市町村別の後発医薬品割合(https://www.mhlw.go.jp/topics/medias/year/16/gaiyou.html)が公表されていることは知っておきたい。さて、今年8月から、「70歳以上医療保険高額療養費の引き上げ」(http://www.mhlw.go.jp/file/06-Seisakujouhou-12400000-Hokenkyoku/0000209857.pdf)と「現役並み所得者の介護保険利用負担割合の引き上げ」(http://www.mhlw.go.jp/file/06-Seisakujouhou-12300000-Roukenkyoku/20180608.pdf)がなされたが、財政制度分科会(https://www.mof.go.jp/about_mof/councils/fiscal_system_council/sub-of_fiscal_system/proceedings/index.html)の「新たな財政健全化計画等に関する建議」(https://www.mof.go.jp/about_mof/councils/fiscal_system_council/sub-of_fiscal_system/report/zaiseia300523/index.html)(https://www.mof.go.jp/about_mof/councils/fiscal_system_council/sub-of_fiscal_system/report/zaiseia300523/06.pdf)p106「薬剤自己負担の引き上げ」、p107「受診時定額負担の導入」、p108「ケアプランの利用者負担」、p113「多床室の室料負担」、p123「後期高齢者医療の負担割合」、p124「介護保険の利用者負担割合」など、様々な負担増が検討されている。来年10月には消費税10%も予定され、「財政健全化に向けた取組みについて~長期財政試算を踏まえて~」(https://www.mof.go.jp/about_mof/councils/fiscal_system_council/sub-of_fiscal_system/proceedings/material/zaiseia300514/01.pdf)p7「ベースシナリオ;少なくとも17%までの消費税率引き上げ」・p8「リスクシナリオ;少なくとも22%までの消費税率引き上げ」も示されている。しかし、負担増を嘆いてばかりではいけない。全国数値だけではなく、地域のデータに基づく比較議論を積極的にする時代のように感じる。例えば、経済財政諮問会議(http://www5.cao.go.jp/keizai-shimon/)の資料「経済・財政一体改革 (社会保障改革)の取組状況」(http://www5.cao.go.jp/keizai-shimon/kaigi/minutes/2016/1021/shiryo_04.pdf)p1で、後発医薬品の使用割合の目標達成(70%→80%)【▲約4000億円】、医薬品の投与の適正化(重複、多剤投与の是正)【▲約600億円】の平成35年度の効果額が示されているように、薬による医療費適正化が大きい。また、資料「経済・財政一体改革 (社会保障改革)の取組状況」(http://www5.cao.go.jp/keizai-shimon/kaigi/minutes/2016/1021/shiryo_04.pdf)p1で、糖尿病重症化予防(全国的に取組推進+平均以上は差を半減) 【▲約800億円】、特定健診・保健指導実施率(全国目標:各70%、45%)【▲約200億円】の平成35年度の効果額が示されているように、メタボ対策による適正化も重要である。厚労省資料(http://www.mhlw.go.jp/stf/shingi/2r98520000015v0b-att/2r98520000015v4o.pdf)p11~15、(http://www.mhlw.go.jp/stf/shingi/2r9852000001w361-att/2r9852000001w3ai.pdf)では、それぞれ保健事業による大幅な医療費適正化事例が紹介されているように、保健事業による医療費適正化はけっして夢物語ではない。これからの社会保障は「一人当たり医療費の地域差半減、一人当たり介護費の地域差縮減」にどれだけ取り組めるかにかかっているといえるかもしれない。医療費の地域差については、医療保険データベース(https://www.mhlw.go.jp/stf/seisakunitsuite/bunya/kenkou_iryou/iryouhoken/database/index.html)では、「医療費の地域差分析」(https://www.mhlw.go.jp/stf/seisakunitsuite/bunya/kenkou_iryou/iryouhoken/database/iryomap/index.html)、「市町村国民健康保険における保険料の地域差分析」(https://www.mhlw.go.jp/stf/seisakunitsuite/bunya/kenkou_iryou/iryouhoken/database/iryomap/hoken.html)が出ているほか、日医総研「医療費の地域差について (都道府県別データ)」(http://www.jmari.med.or.jp/research/research/wr_644.html)(http://www.jmari.med.or.jp/download/WP405.pdf)も参考になる。また、介護費の地域差については、「地域包括ケア「見える化」システム」(http://mieruka.mhlw.go.jp/)で、地域別の要介護認定率、介護費用額、保険料額が公表されていることは常識である。そういえば、経済財政諮問会議(http://www5.cao.go.jp/keizai-shimon/)の「2040年を見据えた社会保障の将来見通し(議論の素材)-概要-」(http://www5.cao.go.jp/keizai-shimon/kaigi/minutes/2018/0521/shiryo_04-1.pdf)p22~23「医療・介護の1人当たり保険料・保険料率の見通し」が出ていたが、全国一律ではない。保健福祉関係者は、最低限、国保データベース(KDB)システム(https://www.kokuho.or.jp/hoken/kdb.html)と地域包括ケア「見える化」システム(http://mieruka.mhlw.go.jp/)を使いこなせなければならないように感じる。保険者の取り組みの見える化と業績評価とのリンクも全くあり得ない話ではないかもしれない。
              Elections Supervisors Not Aware of Breaches Announced by Sen. Nelson      Cache   Translate Page   Web Page Cache   
    Elections supervisors are reacting after U.S. Senator Bill Nelson announced some Florida county’s voter databases have been penetrated by Russian hackers. The Florida Association of Supervisor of Elections says it was not aware of any breaches prior to Nelson’s comments, but are not surprised that the Russians would be trying to interfere. Executive Director Ron […]
              Junior Software Engineer - Leidos - Morgantown, WV      Cache   Translate Page   Web Page Cache   
    Familiarity with NoSql databases (Apache Accumulo, MongoDB, etc.). Leidos has job opening for a Junior Software Engineer in Morgantown, WV....
    From Leidos - Wed, 25 Jul 2018 12:47:39 GMT - View all Morgantown, WV jobs
              Oracle Database Administrator - Perspecta - Charleston, WV      Cache   Translate Page   Web Page Cache   
    Exposure to Hadoop, MongoDB, NoSql and Docker technologies will be a plus. Every day at Perspecta, we enable....
    From Perspecta - Mon, 18 Jun 2018 19:00:05 GMT - View all Charleston, WV jobs
              Database Administrator - Sentry Insurance - Stevens Point, WI      Cache   Translate Page   Web Page Cache   
    You will be able to work with SQL Server and MongoDB to start, and play a role in shaping our cloud and colocation strategies in the future....
    From Sentry Insurance - Wed, 04 Jul 2018 12:36:50 GMT - View all Stevens Point, WI jobs
              Software Engineer - Renaissance - Wisconsin Rapids, WI      Cache   Translate Page   Web Page Cache   
    SQL (MSSQL, PostgreSQL) and MongoDB or other NoSQL databases. Imagine helping to develop products that truly make a difference in the lives of millions of...
    From Renaissance - Sat, 04 Aug 2018 03:10:39 GMT - View all Wisconsin Rapids, WI jobs
              Programmer Analyst - Renaissance - Wisconsin Rapids, WI      Cache   Translate Page   Web Page Cache   
    SQL (MSSQL, PostgreSQL) and MongoDB or other NoSQL databases. Imagine helping to develop products that truly make a difference in the lives of millions of...
    From Renaissance - Tue, 10 Jul 2018 03:07:24 GMT - View all Wisconsin Rapids, WI jobs
              Systems Consultant / Programmer - Renaissance - Wisconsin Rapids, WI      Cache   Translate Page   Web Page Cache   
    SQL (MSSQL, PostgreSQL) and MongoDB or other NoSQL databases. Imagine helping to develop products that truly make a difference in the lives of millions of...
    From Renaissance - Sat, 02 Jun 2018 03:08:08 GMT - View all Wisconsin Rapids, WI jobs
              Software/Application Developer (Back-End Development Focused) - Yahara Software - Madison, WI      Cache   Translate Page   Web Page Cache   
    MongoDB or other NoSQL databases. If you are interested in joining our team, please send your resume to careers@yaharasoftware.com and please indicate the...
    From Yahara Software - Fri, 08 Jun 2018 14:41:07 GMT - View all Madison, WI jobs
              Web Application Developer (Front-End Development Focused) - Yahara Software - Madison, WI      Cache   Translate Page   Web Page Cache   
    MongoDB or other NoSQL databases. If you are interested in joining our team, please send your resume to careers@yaharasoftware.com and please indicate the...
    From Yahara Software - Fri, 08 Jun 2018 14:41:07 GMT - View all Madison, WI jobs
              Junior Full Stack Web Developer - Education Analytics - Madison, WI      Cache   Translate Page   Web Page Cache   
    Database technologies like MySQL, Oracle, PostgreSQL, MongoDB,. Education Analytics is a non-profit organization that uses data analysis to inform education...
    From Education Analytics - Fri, 06 Jul 2018 11:19:28 GMT - View all Madison, WI jobs
              Senior IT Database Analyst - Precision Drilling Corporation - Calgary, AB      Cache   Translate Page   Web Page Cache   
    Day to day monitoring of ERP and database systems. The individual must have experience in administration, design, troubleshooting, and monitoring of SAP and...
    From Precision Drilling Corporation - Thu, 14 Jun 2018 17:04:18 GMT - View all Calgary, AB jobs
              Database Manager - Hudson - Singapore      Cache   Translate Page   Web Page Cache   
    Able to handle and streamline database on a cloud platform and set up a new team within a greenfield space Database Manager - handle and streamline database...
    From Hudson - Wed, 08 Aug 2018 05:09:35 GMT - View all Singapore jobs
              Senior IT Database Analyst - Precision Drilling Corporation - Calgary, AB      Cache   Translate Page   Web Page Cache   
    Contribute as part of a diverse team to help solution and support complex business issues. Design, test, implement and maintain high availability solutions....
    From Precision Drilling Corporation - Thu, 14 Jun 2018 17:04:18 GMT - View all Calgary, AB jobs
              Systems Engineer ( Enterprise Applications/ Relational Databases - Semiconductor Manufacturing )      Cache   Translate Page   Web Page Cache   
    TX-Austin, Job Description: Business Unit: Enabling the movement toward advanced chip design, KLA-Tencor's Measurement, Analytics and Control group (MACH) is looking for the best and brightest research scientists, software engineers, application development engineers and senior product technology process engineers to join our team. The MACH team's mission is to collaborate with our customers to innovate tech
              Programmer Analyst - The Raymond Corporation - Greene, NY      Cache   Translate Page   Web Page Cache   
    Provides Web-based software development within Microsoft SQL database and Cold Fusion, HTML/CSS user interface environments. Designs, codes, tests, and...
    From The Raymond Corporation - Thu, 14 Jun 2018 12:03:34 GMT - View all Greene, NY jobs
              Integration Architect - Silverline Jobs - Casper, WY      Cache   Translate Page   Web Page Cache   
    Strong understanding of relational databases structure and functionality and experience with all major databases - Microsoft SQL Server, MYSQL, postgreSQL or...
    From Silverline Jobs - Tue, 10 Jul 2018 00:33:35 GMT - View all Casper, WY jobs
              Lecturer,Asst - University of Wyoming - Laramie, WY      Cache   Translate Page   Web Page Cache   
    Strong statistical and psychometric knowledge, e.g., multiple regression, logistic regression, data visualization, relational databases, SQL, IRT,...
    From University of Wyoming - Sat, 04 Aug 2018 15:48:20 GMT - View all Laramie, WY jobs
              Labware Developer - UL LLC - Laramie, WY      Cache   Translate Page   Web Page Cache   
    Strong capability using SQL and Database Concepts in support of our database platform:. You will help build a culture of learning and continuous improvement in...
    From UL LLC - Wed, 11 Jul 2018 03:22:36 GMT - View all Laramie, WY jobs
              Labware Developer - Underwriters Laboratories - Laramie, WY      Cache   Translate Page   Web Page Cache   
    Strong capability using SQL and Database Concepts in support of our database platform:. You will help build a culture of learning and continuous improvement in...
    From Underwriters Laboratories - Tue, 10 Jul 2018 22:54:24 GMT - View all Laramie, WY jobs
              Epic Analytics Developer I - Cheyenne Regional Medical Center - Cheyenne, WY      Cache   Translate Page   Web Page Cache   
    Proficient with SQL and relational database concepts, including primary keys, foreign keys, and joins....
    From Cheyenne Regional Medical Center - Wed, 18 Jul 2018 15:28:17 GMT - View all Cheyenne, WY jobs
              Domestic Liquid Detergent Market Growth Analysis & Forecast 2018-2023: Leading Key players- Pangkam, NaFine, Lam Soon, Lonkey, Reward Group, Kaimi      Cache   Translate Page   Web Page Cache   
    (MENAFN Editorial) iCrowdNewswire - Aug 8, 2018 HTF MIrecently broadcasted a new study in its database that highlights the in-depth market analysis with future prospects of Domes...
              Thin Clients Market 2018 Global Industry Key Players, Share, Trend, Segmentation and Forecast to 2025      Cache   Translate Page   Web Page Cache   
    (MENAFN Editorial) Wiseguyreports.Com adds 'Thin Clients Market ?Market Demand, Growth, Opportunities, Analysis of Top Key Players and Forecast to 2025' To Its Research Database. ...
              Inside Technical Sales Representative - W.C. Branham - River Falls, WI      Cache   Translate Page   Web Page Cache   
    Previous experience with ERP/Manufacturing system, CAD, MS office products, email and database systems such as HubSpot a plus....
    From W.C. Branham - Sun, 10 Jun 2018 08:17:02 GMT - View all River Falls, WI jobs
              Executive, Programme Management Team - Civil Service College - Singapore      Cache   Translate Page   Web Page Cache   
    Manage database system for CSC alumni. Provide administrative and logistical support for existing and new training programmes, seminars, conferences, study...
    From Careers@Gov - Thu, 09 Aug 2018 05:52:37 GMT - View all Singapore jobs
              Update: Cronometer (Healthcare & Fitness)      Cache   Translate Page   Web Page Cache   

    Cronometer 2.2.7


    Device: iOS Universal
    Category: Healthcare & Fitness
    Price: Free, Version: 2.2.6 -> 2.2.7 (iTunes)

    Description:

    CRON-O-Meter is a popular online diary for tracking your diet, exercise, and other health related information. We have a whole-food database that tracks over 60+ micronutrients, and support for specialized diets (ketogenic, paleo, vegan).

    The app can also sync nutrition data and activity with the Apple Health App.

    Cronometer can be used for free, but it also has optional in-app subscriptions to our Gold tier of service which offers an ad-free experience along with additional features.

    SUBSCRIPTION PRICING & TERMS

    The Gold subscriptions purchased here will be charged to your iTunes account.

    By default, your subscription will auto-renew on a Monthly ($5.99 USD), Biannual ($24.99 USD), or Annual ($34.99 USD) term as per on your selection. You can change or cancel your subscription renewal under the iTunes Account settings. Your subscription will auto-renew on schedule unless you cancel with at least 24 hours prior to the renewal date.

    By subscribing, you acknowledge and agree to the Terms of Use, and Privacy Policy.

    https://cronometer.com/terms/
    https://cronometer.com/privacy/

    What's New

    Updated add serving dialog to hi-light nutrition details more clearly, as well as the type of data (Full labs, Label data, or Custom foods)

    Cronometer


              Software Presales Engineering Consultant, Database Performance      Cache   Translate Page   Web Page Cache   
    OR-Remote, Overview Quest is an award-winning IT management software provider offering a broad selection of solutions that solve some of the most common and most challenging IT problems. We are currently looking for a Presales Engineering Consultant supporting our Database Performance Monitoring solutions. This position can be based remotely anywhere in the US. Quest strives to be the best of the very best i
              Issues resolved in 6.10.2      Cache   Translate Page   Web Page Cache   

    Page added by Release Deployment Bot

    The Atlassian Confluence team is pleased to announce the release of Confluence 6.10.2, which is a bug-fix release.

    Don't have Confluence 6.1 yet?

    Check out the new features and other highlights in the Confluence 6.1 Release Notes.

    Get the latest version

    We recommend you read the Confluence 6.1 Upgrade Notes and you back up your confluence-home directory and database before upgrading.

    Released on 10 August 2018


              Recruiting Coordinator - Onni Group - Vancouver, BC      Cache   Translate Page   Web Page Cache   
    Database management and computer skills with strong knowledge of excel an asset. The Onni Group is a leading real estate firm based in Vancouver, British...
    From Onni Group - Wed, 08 Aug 2018 05:31:59 GMT - View all Vancouver, BC jobs
              Senior manager database marketing      Cache   Translate Page   Web Page Cache   
    Anbieter: Unitymedia
    Senior Manager (m/w) Database Marketing Du magst Veränderung? Wir auch! Bei...
    Von: 10.08.2018 01:43 · Ort: Deutschland
    Diese Stellenanzeige Nr. 1.033.509.877
    : ansehen · merken · weiterempfehlen

              Peter Hutterer: How the 60-evdev.hwdb works      Cache   Translate Page   Web Page Cache   

    libinput made a design decision early on to use physical reference points wherever possible. So your virtual buttons are X mm high/across, the pointer movement is calculated in mm, etc. Unfortunately this exposed us to a large range of devices that don't bother to provide that information or just give us the wrong information to begin with. Patching the kernel for every device is not feasible so in 2015 the 60-evdev.hwdb was born and it has seen steady updates since. Plenty a libinput bug was fixed by just correcting the device's axis ranges or resolution. To take the magic out of the 60-evdev.hwdb, here's a blog post for your perusal, appreciation or, failing that, shaking a fist at. Note that the below is caller-agnostic, it doesn't matter what userspace stack you use to process your input events.

    There are four parts that come together to fix devices: a kernel ioctl and a trifecta of udev rules hwdb entries and a udev builtin.

    The kernel's EVIOCSABS ioctl

    It all starts with the kernel's struct input_absinfo .

    struct input_absinfo { __s32 value; __s32 minimum; __s32 maximum; __s32 fuzz; __s32 flat; __s32 resolution; };

    The three values that matter right now: minimum, maximum and resolution. The "value" is just the most recent value on this axis, ignore fuzz/flat for now. The min/max values simply specify the range of values the device will give you, the resolution how many values per mm you get. Simple example: an x axis given at min 0, max 1000 at a resolution of 10 means your devices is 100mm wide. There is no requirement for min to be 0, btw, and there's no clipping in the kernel so you may get values outside min/max. Anyway, your average touchpad looks like this in evemu-record:

    # Event type 3 (EV_ABS) # Event code 0 (ABS_X) # Value 2572 # Min 1024 # Max 5112 # Fuzz 0 # Flat 0 # Resolution 41 # Event code 1 (ABS_Y) # Value 4697 # Min 2024 # Max 4832 # Fuzz 0 # Flat 0 # Resolution 37 This is the information returned by the EVIOCGABS ioctl

    (EVdev IOCtl Get ABS). It is usually run once on device init by any process handling evdev device nodes.

    Because plenty of devices don't announce the correct ranges or resolution, the kernel provides the EVIOCSABS ioctl (EVdev IOCtl Set ABS). This allows overwriting the in-kernel struct with new values for min/max/fuzz/flat/resolution, processes that query the device later will get the updated ranges.

    udev rules, hwdb and builtins

    The kernel has no notification mechanism for updated axis ranges so the ioctl must be applied before any process opens the device. This effectively means it must be applied by a udev rule. udev rules are a bit limited in what they can do, so if we need to call an ioctl, we need to run a program. And while udev rules can do matching, the hwdb is easier to edit and maintain. So the pieces we have is: a hwdb that knows when to change (and the values), a udev program to apply the values and a udev rule to tie those two together.

    In our case the rule is 60-evdev.rules . It checks the 60-evdev.hwdb for matching entries [1], then invokes the udev-builtin-keyboard if any matching entries are found. That builtin parses the udev properties assigned by the hwdb and converts them into EVIOCSABS ioctl calls. These three pieces need to agree on each other's formats - the udev rule and hwdb agree on the matches and the hwdb and the builtin agree on the property names and value format.

    By itself, the hwdb itself has no specific format beyond this:

    some-match-that-identifies-a-device PROPERTY_NAME=value OTHER_NAME=othervalue But since we want to match for specific use-cases, our udev rule assembles several specific match lines. Have a look at 60-evdev.rules again, the last rule in there assembles a string in the form of "evdev:name: the device name : content of /sys/class/dmi/id/modalias

    ". So your hwdb entry could look like this:

    evdev:name:My Touchpad Name:dmi:*svnDellInc* EVDEV_ABS_00=0:1:3 If the name matches and you're on a Dell system, the device gets the EVDEV_ABS_00

    property assigned. The "evdev:" prefix in the match line is merely to distinguish from other match rules to avoid false positives. It can be anything, libinput unsurprisingly used "libinput:" for its properties.

    The last part now is understanding what EVDEV_ABS_00 means. It's a fixed string with the axis number as hex number - 0x00 is ABS_X . And the values afterwards are simply min, max, resolution, fuzz, flat, in that order. So the above example would set min/max to 0:1 and resolution to 3 (not very useful, I admit).

    Trailing bits can be skipped altogether and bits that don't need overriding can be skipped as well provided the colons are in place. So the common use-case of overriding a touchpad's x/y resolution looks like this:

    evdev:name:My Touchpad Name:dmi:*svnDellInc* EVDEV_ABS_00=::30 EVDEV_ABS_01=::20 EVDEV_ABS_35=::30 EVDEV_ABS_36=::20 0x00 and 0x01 are ABS_X and ABS_Y , so we're setting those to 30 units/mm and 20 units/mm, respectively. And if the device is multitouch capable we also need to set ABS_MT_POSITION_X and ABS_MT_POSITION_Y

    to the same resolution values. The min/max ranges for all axes are left as-is.

    The most confusing part is usually: the hwdb uses a binary database that needs updating whenever the hwdb entries change. A call to systemd-hwdb update does that job.

    So with all the pieces in place, let's see what happens when the kernel tells udev about the device:

    The udev rule assembles a match and calls out to the hwdb, The hwdb applies udev properties where applicable and returns success, The udev rule calls the udev keyboard-builtin The keyboard builtin parses the EVDEV_ABS_xx properties and issues an EVIOCSABS ioctl for each axis, The kernel updates the in-kernel description of the device accordingly The udev rule finishes and udev sends out the "device added" notification The userspace process sees the "device added" and opens the device which now has corrected values Celebratory champagne corks are popping everywhere, hands are shaken, shoulders are patted in congratulations of another device saved from the tyranny of wrong axis ranges/resolutions

    Once you understand how the various bits fit together it should be quite easy to understand what happens. Then the remainder is just adding hwdb entries where necessary but the touchpad-edge-detector tool is useful for figuring those out.

    [1] Not technically correct, the udev rule merely calls the hwdb builtin which searches through all hwdb entries. It doesn't matter which file the entries are in.
              PHP using SLIM framework      Cache   Translate Page   Web Page Cache   
    Need a web application done that uses the SLIM framwork: -download SMS messages from the Orange M2M SOAP server • validate, sanitise and store new messages in the database • allow a user to view stored... (Budget: £20 - £250 GBP, Jobs: HTML, MySQL, PHP, Software Architecture, Website Design)
              Add Calendar Event Module to my web application      Cache   Translate Page   Web Page Cache   
    SCOPE Calendar Events for PHP Bootstrap Bulletin Board Web Application - Driven by database - Ability to display a calendar in my bootstrap - Add event page where events can be added to calendar - You can only add an event when you are logged in... (Budget: $30 - $250 USD, Jobs: HTML, Javascript, MySQL, PHP, Website Design)
              Install Customized Script (Soundcloud Clone) on Linux VPS      Cache   Translate Page   Web Page Cache   
    We have a customized script that we would like to have installed. It will entail configuring the VPS with the required packages (php, MySql, etc) on the VPS. Database may be installed on a separate VPS... (Budget: $25 - $50 USD, Jobs: Apache, Linux, MySQL, PHP, System Admin)
              Scrum Master, Jira, (Agile Analyst) - Must be local to WA - VedAlgo, Inc - Washington State      Cache   Translate Page   Web Page Cache   
    Role: Scrum Master (Agile Analyst) - Datawarehouse/Big Data [SCRUMAGILE] - LOCAL ONLY Skills: Jira, other Atlassian products, SQL, relational databases, big...
    From Dice - Wed, 18 Jul 2018 04:34:54 GMT - View all Washington State jobs
              ENGINEER III - DATABASE ENGINEERING - VeriSign - Reston, VA      Cache   Translate Page   Web Page Cache   
    The Engineer III - Database Engineering provides 24x7 system administration support and responsible for the installation, configuration, upgrade, patching,...
    From VeriSign - Mon, 25 Jun 2018 15:30:51 GMT - View all Reston, VA jobs
              Mongodb (MDB) Downgraded to Sell at Zacks Investment Research      Cache   Translate Page   Web Page Cache   
    Zacks Investment Research cut shares of Mongodb (NASDAQ:MDB) from a hold rating to a sell rating in a research note released on Sunday, July 15th. According to Zacks, “MongoDB, Inc. provides general purpose database platform. Its products include MongoDB Enterprise Advanced, MongoDB Enterprise for OEM, MongoDB Professional, MongoDB Stitch, MongoDB Atlas, Development Support, Ops Manager, […]
              Comment on Global Infrared Land Surface Emissivity: by Antonio Leone      Cache   Translate Page   Web Page Cache   
    I need database for teaching and research in my University
              500 Error ajax response after database query      Cache   Translate Page   Web Page Cache   

    Replies: 0

    Hi,
    Any help with the following issue will be greatly appreciated.

    I have been encountering a 500 : Internal Server Error after requesting data from the database from an ajax call.

    I am using admin-amax.php enqueueing it as follows:

    $my_handle = array(
    			'ajaxurl' => admin_url( 'admin-ajax.php' )
    	);
    	wp_localize_script( 'javascript', 'ajax-access', $my-handle );
    	wp_enqueue_script('javascript');

    My ajax request:

    $.ajax({
    	    url: ajax-access.ajaxurl,
    	    type: 'POST',
    	    async: false,
    	    dataType: 'json',
    	    data: {
    	    	sentvariable: true,
    	    },
    	    success: function (data) {
    	    	alert(data.returnedvariable);
    	    },
    	    error: function (data) {
                    //always run this section whenever db is queried
    	    	alert('ERROR: ' + data.status + ' :: ' + data.statusText);
    	    }
    	});

    If I remove the database query from the php file and send a hard coded string response I get that string as my response in the js file. Everything works fine as long as I don’t query the database on that call.

    • This topic was modified 20 minutes ago by hmonlouis.

              Così con un drone TELLO trecentino faccio le foto per il sito di Repubblica      Cache   Translate Page   Web Page Cache   

    Molti lettori di DronEzine si sono stupiti nel vedere una pattuglia di droni giocattolo, i Ryze Tech TELLO, registrati ad ENAC come SAPR inoffensivi sotto i 300 grammi. Anche se il microbo cinese da 80 euro non arriva nemmeno a un etto. Possibile che con un giocattolino si possano fare operazioni specializzate professionali? A quanto [...]

    L'articolo Così con un drone TELLO trecentino faccio le foto per il sito di Repubblica proviene da Tutte le news sul mondo dei droni, APR, UAV, regolamento e database operatori.


              Practice Makes Perfect German Problem Solver With 130 Exercises      Cache   Translate Page   Web Page Cache   
    Practice Makes Perfect German Problem Solver With 130 Exercises

    ISBN: 0071791159
    Category: Uncategorized
    Tag: Database/SQL

    Read more
              Classy Wallpapers (389)      Cache   Translate Page   Web Page Cache   
    Classy Wallpapers (389)

    Category: Arts
    Tag: Database/SQL

    Read more
              Mozilla Thunderbird 60.0      Cache   Translate Page   Web Page Cache   
    Mozilla Thunderbird 60.0

    Category: Software
    Tag: Database/SQL

    Read more
              Manga Art for Intermediates A Step-by-Step Guide to Creating Your Own Manga Drawings      Cache   Translate Page   Web Page Cache   
    Manga Art for Intermediates A Step-by-Step Guide to Creating Your Own Manga Drawings

    ISBN: 1510729526
    Category: Uncategorized
    Tag: Database/SQL

    Read more
              How to Protect Your Family's Assets from Devastating Nursing Home Costs Medicaid Secrets (11th Ed.)      Cache   Translate Page   Web Page Cache   
    How to Protect Your Family's Assets from Devastating Nursing Home Costs Medicaid Secrets (11th Ed.)

    ISBN: 1941123058
    Category: Uncategorized
    Tag: Database/SQL

    Read more
              The Aquariums of Pyongyang [Audiobook]      Cache   Translate Page   Web Page Cache   
    The Aquariums of Pyongyang [Audiobook]

    ISBN: 1549174533
    Category: Audiobooks
    Tag: Database/SQL

    Read more
              I Love My Bread Machine More Than 100 Recipes for Delicious Home Baking      Cache   Translate Page   Web Page Cache   
    I Love My Bread Machine More Than 100 Recipes for Delicious Home Baking

    ISBN: 184899317X
    Category: Uncategorized
    Tag: Database/SQL

    Read more
              Finite Time and Cooperative Control of Flight Vehicles      Cache   Translate Page   Web Page Cache   
    Finite Time and Cooperative Control of Flight Vehicles

    ISBN: 9811313725
    Category: Uncategorized
    Tag: Database/SQL

    Read more
              An Experimental Economic Analysis of Banker Behavior      Cache   Translate Page   Web Page Cache   
    An Experimental Economic Analysis of Banker Behavior

    ISBN: 3658228075
    Category: Uncategorized
    Tag: Database/SQL

    Read more
              Science Museums in Transition Cultures of Display in Nineteenth-Century Britain and America      Cache   Translate Page   Web Page Cache   
    Science Museums in Transition Cultures of Display in Nineteenth-Century Britain and America

    ISBN: 0822944758
    Category: Uncategorized
    Tag: Database/SQL

    Read more
              Director of Resource Development - Boys & Girls Club of Douglas - Douglas, WY      Cache   Translate Page   Web Page Cache   
    Knowledge of accessing and managing donor database. Research and analyze agency, corporate, individual and foundation donor base and recommend solicitation... $45,000 - $65,000 a year
    From Indeed - Fri, 06 Jul 2018 19:17:05 GMT - View all Douglas, WY jobs
              Transferir trama via GPS desde cualquier lugar      Cache   Translate Page   Web Page Cache   
    I want to transmit a trama: 0050 25.52 26.51 24.87 4.85 7.28 0.30 4.62 0.31 6.73 184.24 0.49 169.18 0.14 609.45 0.11 0.05 every 5 minutes to a database on own server via GPS from any location, Only through... (Budget: $30 - $250 USD, Jobs: API, MySQL, PHP, Web Development)
              QA Analyst (Functional) - NexJ Systems - Toronto, ON      Cache   Translate Page   Web Page Cache   
    You have knowledge of relational database technologies such as DB2, Microsoft SQL, Oracle and the have the ability to write SQL queries....
    From NexJ Systems - Mon, 30 Jul 2018 23:51:09 GMT - View all Toronto, ON jobs
              Senior IT Database Analyst - Precision Drilling Corporation - Calgary, AB      Cache   Translate Page   Web Page Cache   
    The IT Database Analyst will have the primary responsibility for the analyzing, design, plan, and implementation of the corporate ERP system, SAP R/3 and SAP S...
    From Precision Drilling Corporation - Thu, 14 Jun 2018 17:04:18 GMT - View all Calgary, AB jobs
              BI Consultant - Blueocean Market Intelligence - Vancouver, BC      Cache   Translate Page   Web Page Cache   
    Business intelligence consultants must have an advanced knowledge of databases such as SQL server, Oracle, MySQL and Teradata, as well as various BI tools like...
    From Blueocean Market Intelligence - Tue, 05 Jun 2018 14:05:01 GMT - View all Vancouver, BC jobs
              Senior Technical Consultant for A Great Employer - ROSS Recruitment - Richmond Hill, ON      Cache   Translate Page   Web Page Cache   
    Experience with relational databases (SQL Server or Oracle preferred). Our client is a fast-growing software company whose last quarter licensing revenue grew...
    From ROSS Recruitment - Tue, 24 Jul 2018 09:51:58 GMT - View all Richmond Hill, ON jobs
              Re: Moodle assumes student credentials while accessing with Administrator login      Cache   Translate Page   Web Page Cache   
    by Colin Fraser.  

    When Moodle appears without any formatting, it's not connecting properly to the server, not establishing adequate contact with the database, the scripts and so on. This usually means that the change made to the HTTPS is not properly reflected in the config.php file. I understand this need to be done manually, changing the $wwwroot value and probably the $dbhost and $dataroot values as well. 

    As for the other, I don't know, but I would likely start by looking at how much cache is being used, is it being cleaned at all? Are you sharing computers? Do users save their logins on a shared computer to save themselves the bother of entering details every time they are logging in? Is there a repetitive set of circumstances where this login error is recurring? Is it really random? Start by eliminating possible errors and what's left has to be the cause. 


              Radon Inversion via Deep Learning. (arXiv:1808.03015v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

    Authors: Ji He, Jianhua Ma

    Radon transform is widely used in physical and life sciences and one of its major applications is the X-ray computed tomography (X-ray CT), which is significant in modern health examination. The Radon inversion or image reconstruction is challenging due to the potentially defective radon projections. Conventionally, the reconstruction process contains several ad hoc stages to approximate the corresponding Radon inversion. Each of the stages is highly dependent on the results of the previous stage. In this paper, we propose a novel unified framework for Radon inversion via deep learning (DL). The Radon inversion can be approximated by the proposed framework with an end-to-end fashion instead of processing step-by-step with multiple stages. For simplicity, the proposed framework is short as iRadonMap (inverse Radon transform approximation). Specifically, we implement the iRadonMap as an appropriative neural network, of which the architecture can be divided into two segments. In the first segment, a learnable fully-connected filtering layer is used to filter the radon projections along the view-angle direction, which is followed by a learnable sinusoidal back-projection layer to transfer the filtered radon projections into an image. The second segment is a common neural network architecture to further improve the reconstruction performance in the image domain. The iRadonMap is overall optimized by training a large number of generic images from ImageNet database. To evaluate the performance of the iRadonMap, clinical patient data is used. Qualitative results show promising reconstruction performance of the iRadonMap.


              Sentimental Content Analysis and Knowledge Extraction from News Articles. (arXiv:1808.03027v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

    Authors: Mohammad Kamel, Neda Keyvani, Hadi Sadoghi Yazdi

    In web era, since technology has revolutionized mankind life, plenty of data and information are published on the Internet each day. For instance, news agencies publish news on their websites all over the world. These raw data could be an important resource for knowledge extraction. These shared data contain emotions (i.e., positive, neutral or negative) toward various topics; therefore, sentimental content extraction could be a beneficial task in many aspects. Extracting the sentiment of news illustrates highly valuable information about the events over a period of time, the viewpoint of a media or news agency to these events. In this paper an attempt is made to propose an approach for news analysis and extracting useful knowledge from them. Firstly, we attempt to extract a noise robust sentiment of news documents; therefore, the news associated to six countries: United State, United Kingdom, Germany, Canada, France and Australia in 5 different news categories: Politics, Sports, Business, Entertainment and Technology are downloaded. In this paper we compare the condition of different countries in each 5 news topics based on the extracted sentiments and emotional contents in news documents. Moreover, we propose an approach to reduce the bulky news data to extract the hottest topics and news titles as a knowledge. Eventually, we generate a word model to map each word to a fixed-size vector by Word2Vec in order to understand the relations between words in our collected news database.


              “E.T. was mediocre”: Writer offers to retweet your hot takes that are too hot for Twitter      Cache   Translate Page   Web Page Cache   

    This is all just a ploy by recruiters to build a database of controversial opinions.

    The post “E.T. was mediocre”: Writer offers to retweet your hot takes that are too hot for Twitter appeared first on twitchy.com.


              The KIT Motion-Language Dataset. (arXiv:1607.03827v2 [cs.RO] UPDATED)      Cache   Translate Page   Web Page Cache   

    Authors: Matthias Plappert, Christian Mandery, Tamim Asfour

    Linking human motion and natural language is of great interest for the generation of semantic representations of human activities as well as for the generation of robot activities based on natural language input. However, while there have been years of research in this area, no standardized and openly available dataset exists to support the development and evaluation of such systems. We therefore propose the KIT Motion-Language Dataset, which is large, open, and extensible. We aggregate data from multiple motion capture databases and include them in our dataset using a unified representation that is independent of the capture system or marker set, making it easy to work with the data regardless of its origin. To obtain motion annotations in natural language, we apply a crowd-sourcing approach and a web-based tool that was specifically build for this purpose, the Motion Annotation Tool. We thoroughly document the annotation process itself and discuss gamification methods that we used to keep annotators motivated. We further propose a novel method, perplexity-based selection, which systematically selects motions for further annotation that are either under-represented in our dataset or that have erroneous annotations. We show that our method mitigates the two aforementioned problems and ensures a systematic annotation process. We provide an in-depth analysis of the structure and contents of our resulting dataset, which, as of October 10, 2016, contains 3911 motions with a total duration of 11.23 hours and 6278 annotations in natural language that contain 52,903 words. We believe this makes our dataset an excellent choice that enables more transparent and comparable research in this important area.


              UW officials to ask for $19M in additional funding      Cache   Translate Page   Web Page Cache   
    LARAMIE, Wyo. (AP) — University of Wyoming officials have agreed to ask state lawmakers for at least $19.35 million in additional funding for the 2019-2020 fiscal biennium. The Laramie Boomerang reports earlier this year, the Wyoming Legislature approved $350.5 million in block grant funding for the university to spend during 2019-2020 biennium. The university's Board of Trustees agreed Wednesday to ask for $10 million in one-time state funding to create a President's Endowed Scholarship endowment as part of efforts to get Wyoming students to continue their education in the state. Officials will also ask for more funding for its College of Agriculture, Science Initiative, student athletes and Natural Diversity Database.
              Reading Data in GML Format & Working with ESRI File GeoDatabases Format using .NET      Cache   Translate Page   Web Page Cache   
    none
              Oracle Database Administrator      Cache   Translate Page   Web Page Cache   
    MA-Boston, Title: Oracle Database Administrator Location: Boston, MA Duration: 3 months to start, will extend if things go well The Oracle DBA must be able to manage database related services from the planning phase through the implementation and management phases. He or she will interface with other team members, management, and end-users on a regular basis. After hours availability is required for emergenc
              Driver Recruiter      Cache   Translate Page   Web Page Cache   
    MI-Plymouth, Whiteline Express, Ltd., is growing and has an immediate opportunity available for an experienced Driver Recruiter located at our corporate headquarters in Plymouth, MI. Driver Recruiter Responsibilities · * Handle inbound and outbound calls from potential CDL A drivers · * Qualifying potential driver applicants to ensure they meet minimum hiring qualifications · * Utilizing third-party databases
              Integration Architect - Silverline Jobs - Casper, WY      Cache   Translate Page   Web Page Cache   
    Strong understanding of relational databases structure and functionality and experience with all major databases - Microsoft SQL Server, MYSQL, postgreSQL or...
    From Silverline Jobs - Tue, 10 Jul 2018 00:33:35 GMT - View all Casper, WY jobs
              Integration Architect - Silverline Jobs - Cheyenne, WY      Cache   Translate Page   Web Page Cache   
    Strong understanding of relational databases structure and functionality and experience with all major databases - Microsoft SQL Server, MYSQL, postgreSQL or...
    From Silverline Jobs - Tue, 10 Jul 2018 00:33:35 GMT - View all Cheyenne, WY jobs
              Lead Banner Developer - ITS - Careers | West Virginia University - Morgantown, WV      Cache   Translate Page   Web Page Cache   
    Broad experience in software design, development, maintenance, testing and implementation in an Oracle database environment....
    From West Virginia University - Wed, 08 Aug 2018 22:05:53 GMT - View all Morgantown, WV jobs
              Keuntungan Jual Beli Rumah Pakai Agen Properti      Cache   Translate Page   Web Page Cache   

    Liputan6.com, Jakarta - Lantaran sejumlah alasan sebagian orang memilih menggunakan jasa agen real estat untuk memasarkan rumahnya. Dengan serangkaian pengalaman dan bakatnya di bidang penjualan dan negosiasi, agen properti dapat membantu proses jual beli rumah menjadi lebih mudah, cepat, dan nyaman. Hal inilah yang membuat profesi agen semakin berkembang dan dikelola oleh sejumlah perusahaan broker besar.

    Biasanya orang akan mempercayai agen handal yang memiliki banyak pengalaman dalam transaksi jual beli properti. Kelebihannya, karena mereka dapat mendorong kliennya agar lebih percaya diri dalam mengambil keputusan.

    Selain itu, ada sederet keuntungan yang bisa Anda dapatkan ketika menggunakan jasa agen properti. Dan keuntungan bagi pengguna jasa agen properti ini tentunya juga merupakan syarat yang wajib dipenuhi oleh seorang agen properti yang handal.

    Mau beli rumah? Agar transaksi pembelian rumahnya nyaman dan aman manfaatkan saja jasa Agen Properti Profesional yang ada di Rumah.com

     

    Agen properti miliki area spesialis

    Biasanya agen properti profesional memiliki area spesialis tersendiri. Mereka memilih sebuah lokasi untuk memasarkan properti dengan pemahaman lingkungan dan harga yang sangat baik. Hal seperti ini akan sangat membantu calon pembeli ketika hendak bertanya mengenai keuntungan investasi dan kondisi lingkungan tempat tinggal.

    Sementara penjual rumah juga tak perlu lagi melakukan riset karena sudah ada agen yang menjelaskan potensi daerah dimana properti Anda berada.

    Hemat waktu dan fokus pada penjualan

    Seorang agen profesional akan memberikan Anda kelonggaran waktu untuk fokus pada hal-hal yang penting saja. Jadi Anda tidak perlu menghabiskan waktu untuk memantau leads atau menerima banyak telepon dari calon pembeli.

    Biarkan tugas ini diselesaikan oleh agen sehingga tugas Anda hanya melakukan follow up untuk calon pembeli yang prospektif. Mau tahu apa saja dokumen yang harus diurus dalam proses pembelian properti? Simak lebih lengkapnya di Panduan Rumah.com.

    Mempercepat proses penjualan

    Setiap agen memiliki strategi jitu dalam memasarkan properti yang dipercayakan kepadanya. Selain teknik pemasaran yang baik, mereka juga memiliki database dan koneksi yang luas dalam memasarkan properti. Para agen juga biasanya bertukar informasi jual beli rumah demi mempercepat proses penjualan masing-masing.

     

    Memiliki reputasi dan kemampuan negosiasi baik

    Memilih agen properti yang handal sangat penting ketika ingin properti Anda terjual cepat. Salah satu alasannya ialah mereka memiliki reputasi, jaringan, dan memiliki kemampuan melayani calon pembeli seperti lewat keahlian berkomunikasi, cara memberikan informasi atau jawaban atas pertanyaan yang diajukan.

    Salah satu perusahaan broker properti yang punya reputasi baik dan dikenal banyak masyarakat adalah Century 21. Agensi properti ini sendiri baru saja melakukan rebranding untuk memperkuat posisi di tengah ketatnya persaingan.

    Rina Ciputra Sastrawinata, President Director Century 21 Indonesia mengatakan, rebranding dilakukan karena melihat adanya pergeseran segmentasi di era milenial, baik para pelaku yaitu para agen properti maupun konsumen di masa depan. Generasi milenial ini hidup di era digital dan social media. Munculnya generasi millenial pun diyakini membuat pelaku usaha harus memahami karateristik mereka.

    Kunjungi juga Review Properti dari Rumah.com yang disajikan secara obyektif dan transparan sehingga Anda dapat menilai spesifikasi material hunian, rencana pembangunan infrastruktur di sekitar lokasi, hingga perbandingan harga dengan hunian lain di sekitarnya.

    “Logo baru Century 21 terlihat lebih modern dan digital friendly. Ini sebagai salah satu strategi dan upaya kami beradaptasi dengan segmen young generations sekaligus sebagai modal untuk membidik pangsa pasar mereka,” ungkap Rina.

    Logo baru Century 21 ini memang lebih simpel, menarik dan sangat fleksibel untuk diimplementasikan secara digital. Hal ini diyakini bisa menarik lebih banyak generasi milenial untuk mencoba terjun ke dalam industri broker properti. Selain itu tentu saja juga akan membantu para agen properti Century 21 beradaptasi dengan konsumen di masa depan.

    “Perubahan logo ini juga menandakan bahwa bisnis properti adalah bisnis yang dinamis, dan selalu relevan di segala masa. Kita harap perubahan ini bisa meningkatkan minat generasi milenial untuk bergabung ke kami. Karena bisnis ini sangat menjanjikan,” tandas Rina.

    Rebranding ini juga, lanjut Rina, untuk memberi pesan bahwa Century 21 tidak hanya berjualan rumah, melainkan beragam jenis properti lainnya, seperti apartemen, tanah, gedung, pergudangan, dan lainnya.

    Manfaatkan event DealJuara, Pameran Properti Online Terbesar di Indonesia yang digelar Rumah.com mulai 20 Juli sampai 30 September 2018, dengan beragam penawaran menarik mulai dari DP 0%, cash back, gratis biaya KPR, hingga diskon Rp135 juta!

    Hanya Rumah.com yang percaya Anda semua bisa punya rumah


              Database Administrator Junior (W2, Mountain View) - cPrime, Inc. - Mountain View, CA      Cache   Translate Page   Web Page Cache   
    Mountain View (W2) Top 2-3 skills you look for when reviewing resume- Oracle experience (3-5 YOE) AWS/RWS is a plus Demonstrated Python experience 3-5 YOE...
    From Dice - Sat, 21 Jul 2018 02:03:31 GMT - View all Mountain View, CA jobs
              DBA II      Cache   Translate Page   Web Page Cache   
    KS-Leawood, Job Description: ESSENTIAL DUTIES AND RESPONSIBILITIES 1. Create and maintain all databases required for development, testing, education and production usage. 2. Perform ongoing databases tuning. 3. Install new versions of the RDBMS and its tools and any other tools that access databases. 4. Plan and implement databases backups and recovery. 5. Control migrations of programs, database changes, and
              Programming Assignment Help Online UK -Myassignmenthelp.com      Cache   Translate Page   Web Page Cache   
    Programming Assignment Help is the online programming help service provided to the students in UK by expert coders. We provide Programming Homework help service in Java, Python, C, C#, Php, C++, Databases, SQL, HTML, Android or iOS. Get Coding help from the best programming assignment help website in UK. Quick & Best computer science programming help service provider. https://myassignmenthelp.com/uk/programming-language-assignment-help.html tel:+44-121-285-4112
              Operational Support - Pradz Personel - Rosebank, Gauteng      Cache   Translate Page   Web Page Cache   
    Client take-on / Database AdministrationAssist Relationship Managers and their assistants with requests relevant to client take-on Communicate with clients to... R27 000 - R30 000 a month
    From JobVine.co.za - Mon, 30 Jul 2018 14:00:06 GMT - View all Rosebank, Gauteng jobs
              Database/Data Administrator - Edmonton Mennonite Centre - Edmonton, AB      Cache   Translate Page   Web Page Cache   
    Carry out other duties agreed upon in consultation with the Outcomes Measurement Specialist and Deputy Executive Director....
    From WorkInNonProfits.ca - Thu, 09 Aug 2018 20:55:26 GMT - View all Edmonton, AB jobs
              EFF Tells Bay Area Regional Transit: Reject Proposed Face Surveillance Scheme      Cache   Translate Page   Web Page Cache   

    Around the country, communities concerned about privacy and surveillance are seeking to secure a robust role for public community oversight to constrain the co-optation of local police departments by electronic surveillance. EFF supported recent victories for community control in Oakland and Berkeley, CA, before recommending today that the Bay Area Regional Transit (BART) Board reject recent proposals to expand surveillance on the BART system. 

    The Board considered two proposals today. One was for a hastily crafted “Safety and Security Action Plan,” including a provision for a “Physical Security Information Management system” (PSIM) that “would be capable of monitoring thousands of simultaneous video streams and automating response recommendation.” The other was for a face surveillance scheme that seems to lack any awareness of the profound threat it could present to privacy, dissent, communities of color, and immigrants.

    Facial recognition is an especially menacing surveillance technology, and BART should reject it. Given the wide proliferation of surveillance cameras and the choice of most people to expose their face in public, facial recognition technology can enable the government to track all of our movements and activities as we go about our days in public places.

    If allowed to proceed, a face surveillance system will deter people from engaging in First Amendment activity in public places monitored by surveillance cameras. It will disparately impact people of color, because they are more likely than white people to suffer “false positive” matches, and because of structural inequities in our criminal justice system regarding who is listed in over-inclusive watchlists and error-riddled warrant databases. And it will menace immigrant communities, because federal immigration agencies may seek the massive set of sensitive data captured by these systems. 

    Finally, both proposals ignore the Board’s prior discussions about creating a process for community oversight, and threaten the principles of community control advancing across California and elsewhere across the country. At a time when the federal government’s arbitrary uses of surveillance tools have prompted widespread concerns about the rights of vulnerable minorities, BART should place a priority on heeding communities’ concerns, rather than half-baked proposals for new surveillance schemes.

    Below is the letter we submitted.


              Topple Track Attacks EFF and Others With Outrageous DMCA Notices      Cache   Translate Page   Web Page Cache   

    At EFF, we often write about abuse of the Digital Millennium Copyright Act (DMCA) takedown process. We even have a Hall of Shame collecting some of the worst offenders. EFF is not usually the target of bad takedown notices, however. A company called Topple Track has been sending a slew of abusive takedown notices, including false claims of infringement levelled at news organizations, law professors, musicians, and yes, EFF.

    Topple Track is a “content protection” service owned by Symphonic Distribution. The company boasts that it is “one of the leading Google Trusted Copyright Program members.” It claims:

    Once we identify pirated content we send out automated DMCA takedown requests to Google to remove the URLs from their search results and/or the website operators. Links and files are processed and removed as soon as possible because of Topple Track’s relationship with Google and file sharing websites that are most commonly involved in the piracy process.

    In practice, Topple Track is a poster child for the failure of automated takedown processes.

    Topple Track’s recent DMCA takedown notices target so much speech it is difficult to do justice to the scope of expression it has sought to delist. A sample of recent improper notices can be found here, here, here, and here. Each notice asks Google to delist a collection of URLs. Among others, these notices improperly target:

    Other targets include an article about the DMCA in the NYU Law Review, an NBC News article about anti-virus scams, a Variety article about the Drake-Pusha T feud, and the lyrics to ‘Happier’ at Ed Sheeran’s official website. It goes on and on. If you search for Topple Track’s DMCA notices at Lumen, you’ll find many more examples.

    The DMCA requires that the sender of a takedown notice affirm, under the penalty of perjury, that the sender has a good faith belief that the targeted sites are using the copyrighted material unlawfully. Topple Tracks notices are sent on behalf of a variety of musicians, mostly hip-hop artists and DJs. We can identify no link—let alone a plausible claim of infringement—between the pages mentioned above and the copyrighted works referenced in Topple Track’s takedown notices.

    The notice directed at an EFF page alleges infringement of “My New Boy” by an artist going by the name “Luc Sky.” We couldn’t find any information about this work online. Assuming this work exists, it certainly isn’t infringed by an out-of-date case page that has been languishing on our website for more than eight years. Nor is it infringed by Eric Goldman’s blog post (which has more recent news about the EMI v MP3Tunes litigation). 

    EMI v. MP3Tunes was a case about a now-defunct online storage service called MP3Tunes. The record label EMI sued the platform for copyright infringement based on the alleged actions of some of its users. But none of this has any bearing on Luc Sky. MP3Tunes has been out of business for years.

    It is important to remember than even the most ridiculous takedown notices can have real consequences. Many site owners will never even learn that their URL was targeted. For those that do get notice, very few file counternotices. These users may get copyright strikes and thereby risk broader disruptions to their service. Even if counternotices are filed and processed fairly quickly, material is taken down or delisted in the interim. In Professor Goldman’s case, Google also disabled AdSense on the blog post until his counternotice became effective.

    We cannot comprehend how Topple Track came to target EFF or Eric Goldman on behalf of Luc Sky. But given the other notices we reviewed, it does not appear to be an isolated error. Topple Track’s customers should also be asking questions. Presumably they are paying for this defective service.

    While Topple Track is a particularly bad example, we have seen many other cases of copyright robots run amok. We reached out to Google to ask if Topple Track remains part of its trusted copyright program but did not hear back. At a minimum, it should be removed from any trusted programs until it can prove that it has fixed its problems.


              Database Coordinator      Cache   Translate Page   Web Page Cache   
    IL-Oak Brook, Why work here? Casual dress code Healthcare is 100% covered - no out of pocket costs Great work life balance - hours are from 8:30 - 5pm (tends to slow down between November and December) Donor funded organization with 600 chapters in the US and in 30 countries Duties: Enter donations received into Raiser's Edge donor database Receive donations via checks cash, and wire transfers and enter into Ra
              Genealogical Proof for the Novice Genealogist - free webinar by Annette Burke Lyttle now online for limited time      Cache   Translate Page   Web Page Cache   
    Genealogical Proof for the Novice Genealogist by - free webinar by Annette Burke Lyttle now online for limited time
    The recording of today's webinar, "Genealogical Proof for the Novice Genealogist” by Annette Burke Lyttle is now available to view at www.FamilyTreeWebinars.com for free for a limited time.
    Webinar Description
    How do you know if the facts you've uncovered are correct? How do you avoid attaching somebody else's ancestors to your family tree? This introduction to the Genealogical Proof Standard will get your research moving in the right direction from the beginning and help you avoid errors and frustration.

    View the Recording at FamilyTreeWebinars.com

    If you could not make it to the live event or just want to watch it again, the 1 hour 31 minute recording of "Genealogical Proof for the Novice Genealogist” is now available to view in our webinar library for free for a limited time. Or watch it at your convenience with an annual or monthly webinar membership
    Webinar Memberships/Subscriptions
    Webinar Members get:
    • On-demand access to the entire webinar archives (now 739 classes, 986 hours of genealogy education)
    • On-demand access to the instructor handouts (now 3,293 pages)
    • On-demand access to the live webinars' chat logs
    • 5% off all products at www.FamilyTreeWebinars.com (must be logged in at checkout)
    • Access to all future recordings for the duration of their membership
    • Chance for a members-only door prize during each live webinar
    • Access to register for bonus members-only webinars
    • Ability to view which webinars you are registered for
    • Use of the playlist, resume watching, and jump-to features
    Introductory pricing:
    • Annual membership: $49.95/year
    • Monthly membership: $9.95/month
    Click here to subscribe.
    Register for our upcoming webinars (free)
    50 Websites To Find Vital Records 08/10/2018 Gena Philibert-Ortega
    Everything you need to know about Genealogical Charts and Reports 08/14/2018 MyHeritage Webinars
    Untangle the Web of Germanic Websites 08/15/2018 Teresa Steinkamp McMillin  CG
    GPS: Finding Your Way Through Tough Research Problems 08/21/2018 James Ison  CG  AG
    Researching Forces Ancestors (England and Wales) 08/22/2018 Kirsty Gray
    How Photos Enhance Genealogical Research 08/28/2018 MyHeritage Webinars
    The YDNA Test Should Be Your Favorite 08/29/2018 Diahan Southard
    What's Been Done: Using Someone Else's Genealogy Research 09/05/2018 Thomas MacEntee
    Legacy 9 Unlocked (part 6): Adding a Death Certificate 09/07/2018 Geoff Rasmussen
    Examining Migration & Researching Migrants in the British Isles 09/12/2018 Julie Goucher
    Slave Narratives: Telling the Story of Slavery and Families 09/14/2018 Ann Staley  CG  CGL
    Using Lists to Find Proof 09/18/2018 Cari Taplin  CG
    25 Simple Research Hacks Every Genealogist Should Know 09/19/2018 Lisa Alzo
    Importance of Newspapers for family research 09/25/2018 MyHeritage Webinars
    Remote Research in the Databases of the Daughters of the American Revolution Genealogical Research System 10/03/2018 Rick Sayre  CG  CGL  FUGA
    Legacy 9 Unlocked (part 7): Adding Email Correspondence 10/05/2018 Geoff Rasmussen
    On the Go: Using Your Mobile Device for Genealogy 10/09/2018 MyHeritage Webinars
    In Search of My Brother's Mother - An Adoption Story 10/10/2018 Beth Foulk
    Strategies for Using FamilySearch 10/12/2018 Shannon Combs-Bennett
    Using Emigrant Guides for Genealogical Research 10/16/2018 Julie P. Miller  CG  CGL
    Ho to California! The Draw of the Gold Rush 10/17/2018 Peggy Clemens Lauritzen  AG
    True Stories of Families Reunited thanks to Genetic Genealogy 10/23/2018 MyHeritage Webinars
    10 Eastern European Genealogy Resources You Might be Missing 10/24/2018 Lisa Alzo
    Researching your French and Indian War Ancestor 10/26/2018 Craig R. Scott  MA  CG  FUGA
    Privacy Issues with Online Family Trees 10/31/2018 E. Randol Schoenberg
    Legacy 9 Unlocked (part 8): The Smoking Gun 11/02/2018 Geoff Rasmussen
    City Directories: Much More than Ye Olde Phonebooks 11/06/2018 MyHeritage Webinars
    Using Voting and Election Records to Find Your Ancestor 11/07/2018 Melissa Barker
    Introduction to the Bayou State: Louisiana for Beginners 11/14/2018 Rorey Cathcart
    Every Day Life of Our Ancestors 11/20/2018 Ann Staley  CG  CGL
    Railroad Records and Railroad History: Methods for Tracking 11/28/2018 Paula Stuart-Warren  CG  FMGS  FUGA
    Ins and Outs of Indexes: Keys to Unlocking County and State Records 12/05/2018 Mary Kircher Roddy
    Legacy 9 Unlocked (part 9): Adding an Entry from an Online Database 12/07/2018 Geoff Rasmussen
    101 Ways to Design a Genealogy Chart 12/12/2018 Janet Hovorka
    Citation for beginners 12/14/2018 Shellee Morehead  PhD  CG
    Proving Identity and Kinship Using the GPS: Finding a Freedman's Family 12/18/2018 Nancy A. Peters  CG
    That Splendid Little War: Researching Your Spanish American War Ancestors 12/19/2018 Michael L. Strauss  AG

    Print the 2018 webinar brochure here
    .
    See you online!

              Integration Architect - Silverline Jobs - Casper, WY      Cache   Translate Page   Web Page Cache   
    Strong understanding of relational databases structure and functionality and experience with all major databases - Microsoft SQL Server, MYSQL, postgreSQL or...
    From Silverline Jobs - Tue, 10 Jul 2018 00:33:35 GMT - View all Casper, WY jobs
              Lecturer,Asst - University of Wyoming - Laramie, WY      Cache   Translate Page   Web Page Cache   
    Strong statistical and psychometric knowledge, e.g., multiple regression, logistic regression, data visualization, relational databases, SQL, IRT,...
    From University of Wyoming - Sat, 04 Aug 2018 15:48:20 GMT - View all Laramie, WY jobs
              Labware Developer - UL LLC - Laramie, WY      Cache   Translate Page   Web Page Cache   
    Strong capability using SQL and Database Concepts in support of our database platform:. You will help build a culture of learning and continuous improvement in...
    From UL LLC - Wed, 11 Jul 2018 03:22:36 GMT - View all Laramie, WY jobs
              Labware Developer - Underwriters Laboratories - Laramie, WY      Cache   Translate Page   Web Page Cache   
    Strong capability using SQL and Database Concepts in support of our database platform:. You will help build a culture of learning and continuous improvement in...
    From Underwriters Laboratories - Tue, 10 Jul 2018 22:54:24 GMT - View all Laramie, WY jobs
              Epic Analytics Developer I - Cheyenne Regional Medical Center - Cheyenne, WY      Cache