Next Page: 10000

          Systems Maintenance Technician and Trainer - Leidos - Virginia Beach, VA      Cache   Translate Page   Web Page Cache   
Recent Operational experience in Ships Signals Exploitation Space (SSES) aboard CG, DDG, or LPD class ships....
From Leidos - Wed, 08 Aug 2018 12:47:09 GMT - View all Virginia Beach, VA jobs
          Photo of Drugged Tiger Exploited as a Prop Is a Reminder of Why We Must Protect These Magnificent Big Cats      Cache   Translate Page   Web Page Cache   

Tigers are one of the most regal animals on the planet, enchanting humans with their beauty, grace, mystery, and power for centuries.

The post Photo of Drugged Tiger Exploited as a Prop Is a Reminder of Why We Must Protect These Magnificent Big Cats appeared first on One Green Planet.


          Systems Maintenance Technician and Trainer - Leidos - Virginia Beach, VA      Cache   Translate Page   Web Page Cache   
Recent Operational experience in Ships Signals Exploitation Space (SSES) aboard CG, DDG, or LPD class ships....
From Leidos - Wed, 08 Aug 2018 12:47:09 GMT - View all Virginia Beach, VA jobs
          "Special counsel Robert Mueller’s team of prosecutors have spent several days building what many legal experts consider a slam-dunk case against President Donald Trump’s former campaign chairman, Paul Manafort."      Cache   Translate Page   Web Page Cache   
"But it has been surprisingly hard going at times, and as they prepare to rest their case by the week's end, they bear battle wounds that Manafort’s lawyers are sure to exploit as they mount their defense," Politico reports.Most notably, Manafort’s attorneys have painted the prosecution’s star witness, Rick Gates, as a serial liar, embezzler and philanderer who — as a defense lawyer asserted in court on Wednesday — engaged in four extramarital affairs.Several other setbacks have come courtesy of the cantankerous presiding federal judge, T.S. Ellis III...  The judge also seemed to give credence to Manafort’s argument that he did not keep close enough track of his money to commit knowing fraud and tax evasion.“Mr. Manafort was very good about knowing where the money is and knowing where to spend it,” Gates said.“Well, he missed the amounts of money you stole from him, though, didn't he?” the…
          Concerns about Roanhorse's TRAIL OF LIGHTNING       Cache   Translate Page   Web Page Cache   
I want Native children to have books that respect who they are, as Native children. I want Native writers to experience success in the publishing world, because that translates to opportunities for more Native writers. And I want Native writers to be successful in every genre--including science fiction and fantasy!

But, there are things that don't belong in books. Let me explain.

I was raised with a deep respect for our ceremonies and our religious ways of being. Wrapped up in that respect is a commitment to protect that knowledge. I can easily see and hear elders telling us, as children, “don’t tell your teacher or your friends ...” Their instructions are based on hundreds of years of experience with exploitation and misrepresentation that were--are--harmful to us as individuals, as people of a community, and as a tribal nation.

Our elders, in essence, drew a curtain. A curtain between what can be disclosed, and what cannot be disclosed. It protects us. That instruction is a guiding principal that I bring to my study of children's and young adult literature. I lost sight of it, recently, and am addressing that failure with this blog post. And I am apologizing to friends and colleagues who are Navajo. 


Whenever I pick up a book, the first thing I do is look at the author. If the author is Native, I relax because I assume that the author is knowledgeable about their nation and that they will only disclose what can be disclosed. If the author is not Native or not of the nation the book is about, I look to see if there’s an indication that the book was looked at by someone with the expertise necessary to spot factual errors--and problems of disclosure, too.


Back in February of 2018, I read and reviewed Legends of the Lost Causes by Brad McLelland and Louis Sylvester (they are not Native writers). I questioned their use of religious aspects of Osage and Abenaki people. So, I did not recommend the book. I noted that the book was blurbed by someone from the Osage Nation but that I had concerns and questions, nonetheless. Then in May, 2018, Elizabeth Bird at School Library Journal, published Sensitivity Readers, Cultural Considerations, and Legends of the Lost Causes. In it, she posed some of my questions to Jessilyn Hudgins of the Osage Nation's Cultural Center. Hudgins replied that McLelland was willing to change or take out anything that she wasn't comfortable with. Because Hudgins is of that nation, her feedback is important. It gives the authors and the publisher a green light to continue with the Osage content in the other books in that series. 

I still have questions, though, because I know that Indigenous people fall on a continuum of what is or is not ok to share. Where any one of us falls is based on the teachings we were given, and where we were raised. Many of us do not grow up on our reservations, and even if we do, some of us make different choices about how we will speak (or not) about our religious ways. In other words, within our nations, we don't all come out at the same place with respect to what we think can be shared. In that continuum, I'm over on the end that says 'do not talk about this at all.' 

I started talking with Rebecca Roanhorse on Twitter about three years ago. In those conversations and on her website, I learned that she is Ohkay Owingeh (San Juan Pueblo) and Black, and married to a Navajo man. I also learned that she is a writer, working primarily in science fiction and fantasy. 

Somewhere along there I learned that she was working on a book with a Navajo protagonist. I learned the book was meant for the adult market, but because of the age of the protagonist, I wanted to see it. Tim Tingle's House of Purple Cedar wasn't marketed for teens. Neither was Louise Erdrich's The Round House or Marcie Rendon's Murder on the Red River. But--I'd hand those books to an older teen in an instant. So, I wanted to see Roanhorse's Trail of Lightning. I also learned that Navajo people were working with her on the Navajo content. Because of that, I assumed that she did not have anything in the book that should not be disclosed. When I got the book, I liked what I read and said so, on Facebook and on Twitter. When invited to do so, I wrote a review of it for Barnes and Noble's website.

For that review, I began with the work of Dr. Rudine Sims Bishop. I find her metaphor -- that books can be windows, mirrors, or sliding glass doors -- tremendously useful. White children have many mirrors. Native children have very few, and some of them are cracked and more like those fun house mirrors at carnivals. This graphic makes the point quite well:



See how many mirrors the White child has? Over seventy percent of the books received at CCBC in 2015 featured White characters, and only .9% featured Native characters. Even worse--the books included in that .9% are ones with stereotypes and otherwise bad representations! So--not only is the mirror the Native child holds small, it is one that distorts who Native people are.

In recent writings, I've begun adding a curtain to Dr. Bishop's metaphor. It is similar to the line of disclosure. For some things, we draw a curtain on our windows. There are things we do not share and do not wish to share. (See, for example, an excerpt of an article I wrote for Language Arts in 2018).

As I read Trail of Lightning, I recognized the places Roanhorse was writing about. The way she wrote about the setting struck me as a mirror. A splendid one, in fact. That's what I titled my article at Barnes and Noble: "A Splendid Mirror for Indigenous Readers."

Roanhorse's book is published by Saga Press--an imprint of Simon & Schuster--which is significant. Simon & Schuster is one of the "Big Five" publishers in the United States. Most Native writers are published by smaller publishing houses. Getting published by one of the Big Five means way more visibility than is otherwise possible. 

So, I was happy on several counts. It looked like what I--as a Native woman and scholar--want to see! As evident on Twitter, there are Navajo readers who are taken with it, too. In some ways, the representations Roanhorse offers to readers of this genre are terrific. In most books set in the future, Indigenous people are completely missing. Roanhorse centers this story in Native spaces and features Native people. 

But, I started to hear directly from Navajo friends and colleagues. They are not at all happy with Trail of Lightning. From what I understand, Roanhorse crossed their lines of disclosure. If she had done this book using Pueblo religion, they said, she'd be called out for doing that. They're right. In fact, I'd be one of the people saying no to that book. And I'm grateful to them for, in essence, calling me out about my recommendation of Trail of Lightning.

This situation is uncomfortable for them, for me, and I am sure it will be uncomfortable for Roanhorse, too, when she reads this post. From her interviews online, she said that she knows that there are things within Ohkay Owingeh that she would not share. This is a concept she understands. It'd be easier to just ignore this whole thing and keep disagreements amongst Native scholars, critics, and readers behind that curtain, too, but that kind of silence does not help writers, editors, and readers grow in their understanding of who Indigenous people are and how some of us feel about the ways our stories are used--even if the person using our ways is Native.

There are many conversations taking place within Navajo circles. Some may write a letter (or letters) about Trail of Lightning. When those letters appear, I will add links to them. In the meantime, I invite you to submit comments or write to me directly with your thoughts or questions about what I've written above.

A quick note on some of the conversations I've had, that I'll summarize here as a Q&A. If they don't make sense, let me know.

Question 1: "What about other writers who have done this, like Tony Hillerman? Are people upset with him, too? And will they talk about his books?"
My answer: Yes, I've talked with Navajo people before about Hillerman's books, and yes, they object to what he did, but I don't know if there are plans to talk about his books within the context of Trail of Lightning. 

Question 2: "Are some of these people jealous of Roanhorse's success?"
My answer: That's possible, but the concerns are from a wide range of Navajo people, and I think that attributing the objections to jealousy rather than as serious concerns about the content is not fair. 

Question 3: "Are people being racist because she's Black?"
My answer: That's possible, but attributing objections to racism is also asking us to ignore the serious concerns about the content. 

Question 4: "What about the Navajo people who are really liking the book? Are they wrong for liking it?"
My answer: No, I don't think they're wrong for liking it. They may not know that traditionalists within the Navajo Nation do not think this content should be shared. They may change their minds later--or they may reject the idea of keeping some kinds of information private. 

Question 5: "What exactly is the problematic content?"
My answer: I would not point out the specific problematic content if the book had violated Pueblo lines of disclosure, because doing that would do precisely what the author has done. I do not know how Navajo people will describe their concerns with it. When I see them, I will link to them. 



          An elite Google hacker is directly challenging Apple CEO Tim Cook to donate over $2 million to charity (AAPL, GOOG, GOOGL)      Cache   Translate Page   Web Page Cache   

Ian Beer

  • Google runs a team called Project Zero that tries to find vulnerabilities in competitors' software.
  • One of its star members focusing on Apple products is Ian Beer.
  • He slammed Apple at the end of a talk at the Black Hat conference in Las Vegas because he has not been invited to Apple's bug bounty program, he said. 

One of the best security researchers in the world publicly criticized Apple's bug bounty program and challenged Apple CEO Tim Cook to donate $2.45 million to charity, the amount he says he should have received had he been a part of the program.

"Hi @tim_cook, I've been working for years to help make iOS more secure. Here's a list of all the bugs I reported which qualified for your bug bounty since its launch, could you invite me to the program so we can donate this money to @amnesty?" Ian Beer, a Google employee, tweeted during a talk at Black Hat, a high-profile security conference in Las Vegas. 

Ian Beer

At the end of his talk, which was a technical look at iOS security, he veered into criticism of Apple.

"I don't think Apple intended to use the bug bounty program as a PR tool, but obviously it's given them plenty of good PR; these supposedly high prices are frequently quoted and, like the million dollar dissident, used as this comfort blanket you can wrap yourself in," he wrote in notes published along his slide deck, which he tweeted on Thursday. 

Beer is one of the most prolific security researchers in the world. He and the group he works for inside Google, Project Zero, frequently find bugs that Apple patches to make its software more secure. 

If you add up all prices for bugs he's found, then double it as if Apple were to match the money for charity, it would come out to $2.45 million, Beer wrote. 

Apple declined to comment. 

Here's an example of two bugs Beer found and reported to Apple earlier this summer: 

Ian Beer

He has a day job

Bug bounties are payouts typically intended for independent security researchers to incentivize them to report bad bugs instead of developing them into exploits or selling them into the black market. Basically: Report what's called a "zero-day," a previously undiscovered bug, and if it's real, you can get some money. 

Apple's bug bounty program offers big payouts, like those listed above, but unusually, it's an invite-only program. Apple launched it in 2016, after most other big tech companies had previously launched their bug bounty programs. Even if you found the biggest exploit in iPhone software, you wouldn't get paid by Apple unless you were part of the program. 

Apple Bug BountiesBut Beer draws a salary from Google as part of one of the strongest bug-hunting teams in the world, which itself is unusual. 

Beer works for Google on its elite Project Zero team, which finds undiscovered bugs in software — even those made by other companies, like Apple, or CloudFlare, or Microsoft. By responsibly squashing those bugs, the team makes software safer for everyone.

But he also said he'd like to be invited to Apple's bug bounty program, which offers large payouts for reporting dangerous bugs to the company. In some ways, he wants to be compensated by Apple for what he's done as part of his day job at Google. (Google didn't immediately return an email about whether its security researchers are allowed to collect bug bounties.)

Project Zero has been controversial — after all, what it does is it tries to break other companies' software, and when it succeeds, it forces the other company to fix it within 90 days. The origins of the program date back to Google cofounder Sergey Brin's frustration that vulnerabilities from other companies could make Google less secure. 

Apple's iPhone security is very tight and has a reputation in the security industry for being hard to crack. But it's not bulletproof — in 2016, the UAE government used a weaponized zero-day exploit against a human rights activist.

The high level of iPhone security means that sometimes researchers can make far more money selling zero-days on the black market than cooperating with Apple. So that makes people like Beer even more notable, given their prolific ability to find iPhone bugs. 

It's unclear if there was a specific reason Beer went public with his complaints about how Apple handles vulnerabilities and disclosures. He said in the notes alongside his talk that it was because Apple does a "poor job of fixing" the bugs he reports. But Apple's culture of discretion means it's unlikely that Cook or Apple will respond warmly to his proposal, either publicly or privately. 

Join the conversation about this story »

NOW WATCH: This hands-free crutch takes the strain off your hands, wrists and arms


          Bankers fear cryptocurrencies while developers don’t understand the problem      Cache   Translate Page   Web Page Cache   
Central bankers worldwide can already see the end of their exploitation coming thanks to cryptocurrencies. The head of the Bank for International Settlements (BIS), Agustín Carstens, now wants programmers to stop trying to create money: In an interview with a Basel-based media outlet on June 30, Agustín Carstens took aim at cryptocurrencies and reiterated his belief that they represent “a bubble, … Continue reading
          Equalizer 2 d’Antoine Fuqua avec Denzel Washington et Pedro Pascal : bande-annonce      Cache   Translate Page   Web Page Cache   

Equalizer 2 est un film d’action d’Antoine Fuqua avec Denzel Washington, Pedro Pascal, Ashton Sanders, Bill Pullman et Melissa Leo. Synopsis : Robert McCall continue de servir la justice au nom des exploités et des opprimés. Mais jusqu’où est-il prêt à aller lorsque cela touche quelqu’un qu’il aime ? Le film sortira le 15 août 2018 au cinéma. A noter qu’il est interdit aux moins de 12 ans. Place à sa bande-annonce !

Cet article Equalizer 2 d’Antoine Fuqua avec Denzel Washington et Pedro Pascal : bande-annonce est apparu en premier sur MaXoE.


          Re: The Fight Over Who Should Own an Old Church Is Really a Battle Over the Soul of Old East Durham      Cache   Translate Page   Web Page Cache   
"the exploitative rules that exist so that the church may accumulate tax exempt properties have been around for a long time"

The properties are tax-exempt only so long as they are used for religious, charitable, or community purposes. A church loses tax exemption for its property if, for example, it acts as a landlord leasing out the premises to commercial tenants.
Posted by ct
          Titre Associé aux Ventes Sans-Fil - Beauport, QC - OSL Retail Services Inc - Beauport, QC      Cache   Translate Page   Web Page Cache   
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Fri, 13 Jul 2018 07:19:00 GMT - View all Beauport, QC jobs
          Titre Associé aux Ventes Sans-Fil - Thetford Mines, QC - OSL Retail Services Inc - Thetford Mines, QC      Cache   Translate Page   Web Page Cache   
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Mon, 25 Jun 2018 07:21:00 GMT - View all Thetford Mines, QC jobs
          Titre Associé aux Ventes Sans-Fil - Blainville - OSL Retail Services Inc - Blainville, QC      Cache   Translate Page   Web Page Cache   
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Fri, 03 Aug 2018 19:22:03 GMT - View all Blainville, QC jobs
          Titre Associé aux Ventes Sans-Fil - Laval - OSL Retail Services Inc - Laval, QC      Cache   Translate Page   Web Page Cache   
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Wed, 08 Aug 2018 19:24:54 GMT - View all Laval, QC jobs
          Titre Associé aux Ventes Sans-Fil - OSL Retail Services Inc - Longueuil, QC      Cache   Translate Page   Web Page Cache   
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Thu, 02 Aug 2018 19:23:52 GMT - View all Longueuil, QC jobs
          Re: University of Virginia Needs To Pay Back By Paying Forward      Cache   Translate Page   Web Page Cache   
The public universities in this country exist to educate the next generation of this countrys citizens, not to research and create recompense programs for some exploited labor cohorts but not others. Sadly, there have been MANY exploited labor groups in America, and, though it may not be politically correct to mention this fact, some of them have been white.
Posted by Try broader policy solutions for higher ed.
          Best SEO Sites in 2018 | DM Web Promotions Tips      Cache   Translate Page   Web Page Cache   
Free website streamlining SEO tips for site advancement. Configuration Tips for web ... Website improvement SEO Tips and FAQs .... The Internet might be another business medium, yet similar guidelines of essential survival applysites that don't exploit each open door will be outperformed by the ones that do.For more information visit website:http://www.dmwebpromotionstips.com/
          Coordonnateur ventes et exploitation - Isarta - Groupe EMD-Batimo - Saint-Eustache, QC      Cache   Translate Page   Web Page Cache   
OFFERT PAR : Groupe EMD-Batimo POSTE : Coordonnateur ventes et exploitation LIEU : Saint-Eustache (Laurentides) Date limite : 31/08/2018 Pour les détails...
From Isarta.com - Fri, 03 Aug 2018 19:49:32 GMT - View all Saint-Eustache, QC jobs
          Coordonnateur ventes et exploitation - Groupe EMD-Batimo - Saint-Eustache, QC      Cache   Translate Page   Web Page Cache   
Le Groupe EMD -Batimo offre un environnement de travail stimulant où les projets et défis sont le reflet de la créativité et de la détermination d’une équipe...
From Isarta.com - Fri, 03 Aug 2018 19:49:32 GMT - View all Saint-Eustache, QC jobs
          Le programme de vendredi : Lamote rêve d'une première consécration, les hurdleurs en quête d'exploit      Cache   Translate Page   Web Page Cache   
"BERLIN 2018 - Favorite du 800m, Rénelle Lamote va tenter d\u0027apporter ce vendredi un troisième titre à la France dans ces championnats d\u0027Europe d\u0027athlétisme. Les hurdleurs (Martinot-Lagarde, Manga, Darien) tenteront d\u0027accrocher une médaille tout comme Assanni-Issouf et Diallo en triple saut. Lavillenie (qualifications à la perche) et Bosse (demies du 800m) seront également à suivre. Un menu copieux."
          La fratrie Ingebrigtsen, ou le rêve d'un triplé en famille      Cache   Translate Page   Web Page Cache   
"BERLIN 2018 - Ce pourrait être la belle histoire de ces championnats d\u0027Europe. En tout cas, ils rêvent de l\u0027écrire. Les trois frères Ingebrigsten sont en quête d\u0027un incroyable triplé lors de la finale du 1500m vendredi soir. Entraîné par leur père, Henrik (27 ans), Filip (25) et le petit prodige Jakob (17) ont tout pour réaliser cet exploit. Qui serait forcément immense."
          The FBI Warns of IoT Security Issues Once Again      Cache   Translate Page   Web Page Cache   

The US Federal Bureau of Investigation has issued a warning about Internet of Things device security issues, the latest in a continuing string of IoT attack and security vulnerability warnings from the US’s top law enforcement agency.

Attackers are using compromised IoT devices as proxies to mask various illicit activities, the FBI said, citing spamming, click-fraud, illegal trade, botnets for hire, and other crimes being committed using IoT devices.

The Bureau said IoT device vulnerabilities are being exploited by these attackers, naming routers, media streaming devices, Raspberry Pis, IP cameras, ...
 


          Exploited College Girls - Eliza      Cache   Translate Page   Web Page Cache   
Eliza - Exploited College Girls Released: August 9, 2018 Pretty little Eliza, with her sweet face and pig tails, no one could blame you to think she was a "nice" girl, but underneath that innocent exterior is dirty little sex kitten that likes it when you get rough with her. Maybe it's because she's a […]
          Ed Skrein Joins Roland Emmerich’s World War II Film ‘Midway’ (EXCLUSIVE)      Cache   Translate Page   Web Page Cache   
Ed Skrein is joining Roland Emmerich’s World War II pic “Midway,” sources tell Variety. He joins an ensemble that includes Woody Harrelson, Mandy Moore, Luke Evans, and Patrick Wilson. Based on the true story of the Battle of Midway, a turning point in the Pacific theater of World War II, the film chronicles the exploits […]
          Tennis - ATP - Toronto - Toronto : Novak Djokovic éliminé par Stefanos Tsitsipas      Cache   Translate Page   Web Page Cache   
Tsitsipas signe un des plus beaux exploits de sa jeune carrière en...
          Banque - Technicien au centre d'assistance - CGI - Lac-Saint-Jean, QC      Cache   Translate Page   Web Page Cache   
Bonne connaissance des systèmes d'exploitation Windows NT, XP, Vista, 7; Description du poste :....
From CGI - Fri, 13 Jul 2018 15:12:04 GMT - View all Lac-Saint-Jean, QC jobs
          Agent soutien technique, Télébec - Bell - Val-d'Or, QC      Cache   Translate Page   Web Page Cache   
Une expertise des systèmes d’exploitation Windows 7,8, et 10, Vista, MAC et Outlook. Code de demande:....
From Bell Canada - Fri, 13 Jul 2018 16:41:03 GMT - View all Val-d'Or, QC jobs
          Analyste au support - Support Analyst - Exela Technologies - Montréal, QC      Cache   Translate Page   Web Page Cache   
Les systèmes d’exploitation de Microsoft, incluant XP, Vista, 2003 et 2008. Microsoft Windows Server and Workstation including XP, Vista, 7, 2003 and 2008...
From Indeed - Fri, 13 Jul 2018 18:17:48 GMT - View all Montréal, QC jobs
          Technicien au centre d'assistance - français / anglais / espagnol / portugais - CGI - Montréal, QC      Cache   Translate Page   Web Page Cache   
Bonne connaissance des systèmes d'exploitation Windows NT, XP, Vista, 7. Description du poste :....
From CGI - Fri, 13 Jul 2018 15:12:47 GMT - View all Montréal, QC jobs
          Review: Friday the 13th's Bloody Terrror in 3-D!      Cache   Translate Page   Web Page Cache   

Courtesy of American Cinematheque - rare opportunity to enjoy old-school exploitation horror leaping off the screen and into your lap!

The post Review: Friday the 13th's Bloody Terrror in 3-D! appeared first on Hollywood Gothique.


          A Bold Foreign Policy Platform for the New Wave of Left Lawmakers      Cache   Translate Page   Web Page Cache   

ACROSS THE COUNTRY, A NEW COHORT OF PROGRESSIVES IS RUNNING FOR—AND WINNING—ELECTIONS. The stunning victory of democratic socialist Alexandria Ocasio-Cortez in the Democratic congressional primary in New York is perhaps the most well-known, but she is far from alone. Most of these candidates are young, more than usual are people of color, many are women, several are Muslims, at least one is a refugee, at least one is transgender—and all are unabashedly left. Most come to electoral politics after years of activism around issues like immigration, climate and racism. They come out of a wide range of social movements and support policy demands that reflect the principles of those movements: labor rights, immigrant and refugee rights, women’s and gender rights, equal access to housing and education, environmental justice, and opposition to police violence and racial profiling. Some, though certainly not all, identify not just with the policies of socialism but with the fundamental core values and indeed the name itself, usually in the form of democratic socialism.

Rashida Tlaib, a Palestinian-American woman in Detroit, just won the Democratic primary for the legendary Congressman John Conyers’ seat. Four women, two of them members of Democratic Socialists of America and all four endorsed by DSA, beat their male incumbent opponents in Pennsylvania state house primaries. Tahirah Amatul-Wadud is running an insurgent campaign for Congress against a longstanding incumbent in western Massachusetts, keeping her focus on Medicare-for-All and civil rights. Minnesota State Rep. Ilhan Omar, a former Somali refugee, won endorsement from the Democratic-Farmer-Labor Party, and is running for Keith Ellison’s former congressional seat as an “intersectional feminist.” And there are more.

Many highlight their movement experience in their campaigns; they are champions of immigrant rights, healthcare, student debt organizing and the fight for $15. Intersectionality has grown stronger, as the extremism of Trump’s right-wing racist assault creates significant new gains in linking separate movements focused on racism, women’s rights, immigrant rights, climate, poverty, labor rights and more.

But mostly, we’re not seeing progressive and socialist candidates clearly link domestic issues with efforts to challenge war, militarism and the war economy. There are a few exceptions: Congressional candidate and Hawaii State Rep. Kaniela Ing speaks powerfully about U.S. colonialism in Hawaii, and Virginia State Rep. Lee J. Carter has spoken strongly against U.S. bombing of Syria, linking current attacks with the legacy of U.S. military interventions. There may be more. But those are exceptions; most of the new left candidates focus on crucial issues of justice at home.

A progressive foreign policy must reject U.S. military and economic domination and instead be grounded in global cooperation, human rights, respect for international law and privileging diplomacy over war.

It’s not that progressive leaders don’t care about international issues, or that our movements are divided. Despite too many common assumptions, it is not political suicide for candidates or elected officials to stake out progressive anti-war, anti-militarism positions. Quite the contrary: Those positions actually have broad support within both our movements and public opinion. It’s just that it’s hard to figure out the strategies that work to connect internationally focused issues, anti-war efforts, or challenges to militarism, with the wide array of activists working on locally grounded issues. Some of those strategies seem like they should be easy—like talking about slashing the 53 cents of every discretionary federal dollar that now goes to the military as the easiest source to fund Medicare-for-all or free college education. It should be easy, but somehow it’s not: Too often, foreign policy feels remote from the urgency of domestic issues facing such crises. When our movements do figure out those strategies, candidates can easily follow suit.

Candidates coming out of our movements into elected office will need clear positions on foreign policy. Here are several core principles that should shape those positions.

A progressive foreign policy must reject U.S. military and economic domination and instead be grounded in global cooperation, human rights, respect for international law and privileging diplomacy over war. That does not mean isolationism, but instead a strategy of diplomatic engagement rather than—not as political cover for—destructive U.S. military interventions that have so often defined the U.S. role in the world.

Looking at the political pretexts for what the U.S. empire is doing around the world today, a principled foreign policy might start by recognizing that there is no military solution to terrorism and that the global war on terror must be ended.

More broadly, the militarization of foreign policy must be reversed and diplomacy must replace military action in every venue, with professional diplomats rather than the White House’s political appointees in charge. Aspiring and elected progressive and socialist office-holders should keep in mind the distinction between the successes and failures of Obama’s foreign policy. The victories were all diplomatic: moving towards normalization with Cuba, the Paris climate accord and especially the Iran nuclear deal. Obama’s greatest failures—in Libya, Syria, Iraq, Afghanistan and Yemen—all occurred because the administration chose military action over robust diplomacy.

Certainly, diplomacy has been a tool in the arsenal of empires, including the United States. But when we are talking about official policies governing relations between countries, diplomacy—meaning talking, negotiating and engaging across a table—is always, always better than engaging across a battlefield.

A principled foreign policy must recognize how the war economy has distorted our society at home—and commit to reverse it. The $717 billion of the military budget is desperately needed for jobs, healthcare and education here at home—and for a diplomatic surge and humanitarian and reconstruction assistance to people of countries devastated by U.S. wars and sanctions.

A principled foreign policy must acknowledge how U.S. actions—military, economic and climate-related—have been a driving force in displacing people around the world. We therefore have an enormous moral as well as legal obligation to take the lead in providing humanitarian support and refuge for those displaced—so immigration and refugee rights are central to foreign policy.

For too long the power of the U.S. empire has dominated international relations, led to the privileging of war over diplomacy on a global scale, and created a vast—and invasive—network of 800-plus military bases around the world.

Now, overall U.S. global domination is actually shrinking, and not only because of Trump’s actions. China’s economy is rapidly catching up, and its economic clout in Africa and elsewhere eclipses that of the United States. It’s a measure of the United States’ waning power that Europe, Russia and China are resisting U.S. efforts to impose new global sanctions on Iran. But the United States is still the world’s strongest military and economic power: Its military spending vastly surpasses that of the eight next strongest countries, it is sponsoring a dangerous anti-Iran alliance between Israel and the wealthy Gulf Arab states, it remains central to NATO decision-making, and powerful forces in Washington threaten new wars in North Korea and Iran. The United States remains dangerous.

Progressives in Congress have to navigate the tricky task of rejecting American exceptionalism. That means recognizing that it is often a good thing when U.S. global military and economic efforts fail, because they are generally aimed at maintaining domination and control. Without that U.S. domination, the possibility arises of a new kind of internationalism: to prevent and solve crises that arise from current and potential wars, to promote nuclear disarmament, to come up with climate solutions and to protect refugees.

That effort is increasingly important because of the rapid rise of right-wing xenophobic authoritarians seeking and winning power. Trump is now leading and enabling an informal global grouping of such leaders, from Egypt’s Abdel Fattah el-Sisi to Victor Orban in Hungary and others. Progressive elected officials in the United States can pose an important challenge to that authoritarian axis by building ties with their like-minded counterparts in parliaments and governments—possibilities include Jeremy Corbyn in the United Kingdom and Andrés Manuel López Obrador in Mexico, among others. And progressive and leftist members of Congress will need to be able to work together with social movements to build public pressure for diplomatic initiatives not grounded in the interests of U.S. empire.

In addition to these broad principles, candidates and elected officials need critical analyses of current U.S. engagement around the world, as well as nuanced prescriptions for how to de-escalate militarily, and ramp up a new commitment to serious diplomacy.

GEOPOLITICAL POWER PLAYS

RUSSIA: Relations with Russia will be a major challenge for the foreseeable future. With 90 percent of the world’s nuclear weapons in U.S. and Russian hands, and the two powers deploying military forces on opposite sides of active battlefronts in Syria, it is crucial that relations remain open—not least to derail potential escalations and ensure the ability to stand down from any accidental clash.

Progressives and leftists in Congress will need to promote a nuanced, careful approach to Russia policy. And they will face a daunting environment in which to do so. They will have to deal with loud cries from right-wing war-mongers, mainly Republicans, and from neo-con interventionists in both parties, demanding a one-sided anti-Russia policy focused on increased sanctions and potentially even military threats. But many moderate and liberal Democrats—and much of the media—are also joining the anti-Russia crusade. Some of those liberals and moderates have likely bought into the idea of American exceptionalism, accepting as legitimate or irrelevant the long history of U.S. election meddling around the world and viewing the Russian efforts as somehow reaching a whole different level of outrageousness. Others see the anti-Russia mobilization solely in the context of undermining Trump.

But at the same time, progressive Congress members should recognize that reports of Russian efforts to interfere with the 2016 and 2018 elections cannot be dismissed out of hand. They should continue to demand that more of the evidence be made public, and condemn the Russian meddling that has occurred, even while recognizing that the most serious threats to our elections come from voter suppression campaignsat home more than from Moscow. And they have to make clear that Trump’s opponents cannot be allowed to turn the president’s infatuation with Vladimir Putin into the basis for a new Cold War, simply to oppose Trump.

CHINA: The broad frame of a progressive approach should be to end Washington’s provocative military and economic moves and encourage deeper levels of diplomatic engagement. This means replacing military threats with diplomacy in response to Chinese moves in the South China Sea, as well as significant cuts in the ramped-up military ties with U.S. allies in the region, such as Vietnam. Progressive and socialist members of Congress and other elected officials will no doubt be aware that the rise of China’s economic dominance across Africa, and its increasing influence in parts of Latin America, could endanger the independence of countries in those parts of the Global South. But they will also need to recognize that any U.S. response to what looks like Chinese exploitation must be grounded in humility, acknowledging the long history of U.S. colonial and neocolonial domination throughout those same regions. Efforts to compete with Chinese economic assistance by increasing Washington’s own humanitarian and development aid should mean directing all funds through the UN, rather than through USAID or the Pentagon. That will make U.S. assistance far less likely to be perceived as—and to be—an entry point for exploitation.

NATO: A progressive position on NATO flies straight into the face of the partisan component of the anti-Trump resistance—the idea that if Trump is for it, we should be against it. For a host of bad reasons that have to do with personal enrichment and personal power, Trump sometimes takes positions that large parts of the U.S. and global anti-war and solidarity movements have long supported. One of those is NATO. During the Cold War, NATO was the European military face of U.S.-dominated Western anti-Communism and anti-Sovietism. With the end of the Cold War and the collapse of the Soviet Union, peace activists from around the world called for the dissolution of NATO as an anachronistic relic whose raison d’etre was now gone.

Instead, NATO used its 50th anniversary in 1999 to rebrand itself as defending a set of amorphous, ostensibly “Western” values such as democracy, rather than having any identifiable enemy—something like a military version of the EU, with the United States on board for clout. Unable to win UN Security Council support for war in Kosovo, the United States and its allies used NATO to provide so-called authorization for a major bombing campaign—in complete violation of international law—and began a rapid expansion of the NATO alliance right up to the borders of Russia. Anti-war forces across the world continued to rally around the call “No to NATO”—a call to dissolve the alliance altogether.

But when Trump, however falsely, claims to call for an end to the alliance, or shows disdain for NATO, anti-Trump politicians and media lead the way in embracing the military alliance as if it really did represent some version of human rights and international law. It doesn’t—and progressives in elected positions need to be willing to call out NATO as a militarized Cold War relic that shouldn’t be reconfigured to maintain U.S. domination in Europe or to mobilize against Russia or China or anyone else. It should be ended.

In fact, Trump’s claims to oppose NATO are belied by his actions. In his 2019 budget request he almost doubled the 2017 budget for the Pentagon’s “European Deterrence Initiative,” designed explicitly as a response to “threats from Russia.” There is a huge gap between Trump’s partisan base-pleasing condemnation of NATO and his administration&rdqou;s actual support for strengthening the military alliance. That contradiction should make it easier for progressive candidates and officeholders to move to cut NATO funding and reduce its power—not because Trump is against NATO but because the military alliance serves as a dangerous provocation toward war.

THE WAR ON TERROR

What George W. Bush first called “the global war on terror” is still raging almost 17 years later, though with different forms of killing and different casualty counts. Today’s reliance on airstrikes, drone attacks and a few thousand special forces has replaced the hundreds of thousands of U.S. and allied ground troops. And today hardly any U.S. troops are being killed, while civilian casualties are skyrocketing across the Middle East and Afghanistan. Officials from the Bush, Obama and Trump administrations have repeated the mantra that “there is no military solution” in Afghanistan, Syria, or Iraq or against terrorism, but their actions have belied those words. Progressive elected officials need to consistently remind the public and their counterparts that it is not possible to bomb terrorism out of existence. Bombs don’t hit “terrorism”; they hit cities, houses, wedding parties. And on those rare occasions when they hit the people actually named on the White House&rdqou;s unaccountable kill list, or “terrorist” list, the impact often creates more terrorists.

The overall progressive policy on this question means campaigning for diplomatic solutions and strategies instead of military ones. That also means joining the ongoing congressional efforts led by Rep. Barbara Lee (D-Calif.) and others  to challenge the continued reliance on the 2001 and 2002 Authorizations for the Use of Military Force (AUMF).

In general, privileging diplomatic over war strategies starts with withdrawing troops and halting the arms sales that flood the region with deadly weapons. Those weapons too often end up in the hands of killers on all sides, from bands of unaccountable militants to brutally repressive governments, with civilians paying the price. Congress members should demand an end of massive arms sales to Saudi Arabia, the UAE and other U.S. allies carrying out brutal wars across the Middle East, and they should call for an end to the practice of arming non-state proxies who kill even more people. They should call for a U.S. arms embargo on Saudi Arabia, the UAE, Qatar, Iraq, Afghanistan, Egypt, Turkey, Pakistan, Jordan and Israel (which presents a whole other set of arms-related challenges), while urging Russia to stop its arms sales to Syria, Iran and Pakistan. Given the power of the arms industries in the United States, arms embargoes are the most difficult—but perhaps the most important—part of ending the expanding Middle East wars.

Progressives in Congress should demand real support for UN-sponsored and other international peace initiatives, staffing whole new diplomatic approaches whose goal is political solutions rather than military victories—and taking funds out of military budgets to cover the costs. The goal should be to end these endless wars—not try to “win&rdqou; them.

ISRAEL-PALESTINE: The most important thing for candidates to know is that there has been a massive shift in public opinion in recent years. It is no longer political suicide to criticize Israel. Yes, AIPAC and the rest of the right-wing Jewish, pro-Israel lobbies remain influential and have a lot of money to throw around. (The Christian Zionist lobbies are powerful too, but there is less political difficulty for progressives to challenge them.) But there are massive shifts underway in U.S. Jewish publicopinion on the conflict, and the lobbies cannot credibly claim to speak for the Jewish community as a whole.

Outside the Jewish community, the shift is even more dramatic, and has become far more partisan: Uncritical support for Israel is now overwhelmingly a Republican position. Among Democrats, particularly young Democrats, support for Israel has fallen dramatically; among Republicans, support for Israel’s far-right government is sky-high. The shift is particularly noticeable among Democrats of color, where recognition of the parallels between Israeli oppression of Palestinians and the legacies of Jim Crow segregation in the United States and apartheid in South Africa is rising rapidly.

U.S. policy, unfortunately, has not kept up with that changing discourse. But modest gains are evident even there. When nearly 60 members of the House and Senate openly skipped Benjamin Netanyahu’s speech when he came to lobby Congress to vote against President Obama’s nuclear deal with Iran, the sky didn’t fall. The snub to the Israeli prime minister was unprecedented, but no one lost their seat because of it. Rep. Betty McCollum’s bill to protect Palestinian children from Israel’s vicious military juvenile detention system (the only one in the world) now has 29 co-sponsors, and the sky still isn’t falling. Members of Congress are responding more frequently to Israeli assaults on Gaza and the killing of protesters, often because of powerful movements among their constituents. When Trump moved the U.S. embassy to Jerusalem, the Israeli daily Ha’aretz acknowledged the divide: “While members of the Republican Party overwhelmingly expressed support for the move, Democrats were split between those who congratulated Trump for it and those who called it a dangerous and irresponsible action.”

That creates space for candidates and newly elected officials to respond to the growing portion of their constituencies that supports Palestinian rights. Over time, they must establish a rights-based policy. That means acknowledging that the quarter-century-long U.S.-orchestrated “peace process” based on the never-serious pursuit of a solution, has failed. Instead, left and progressive political leaders can advocate for a policy that turns over real control of diplomacy to the UN, ends support for Israeli apartheid and occupation, and instead supports a policy based on international law, human rights and equality for all, without privileging Jews or discriminating against non-Jews.

To progress from cautiously urging that Israel abide by international law, to issuing a full-scale call to end or at least reduce the $3.8 billion per year that Congress sends straight to the Israeli military, might take some time. In the meantime, progressive candidates must prioritize powerful statements condemning the massacre of unarmed protesters in Gaza and massive Israeli settlement expansion, demands for real accountability for Israeli violations of human rights and international law (including reducing U.S. support in response), and calls for an end to the longstanding U.S. protection that keeps Israel from being held accountable in the UN.

The right consistently accuses supporters of Palestinian rights of holding Israel to a double standard. Progressives in Congress should turn that claim around on them and insist that U.S. policy towards Israel—Washington’s closest ally in the region and the recipient of billions of dollars in military aid every year—hold Israel to exactly the same standards that we want the United States to apply to every other country: human rights, adherence to international law and equality for all.

Many supporters of the new crop of progressive candidates, and many activists in the movements they come out of, are supporters of the increasingly powerful, Palestinian-led BDS (boycott, divestment and sanctions) movement, that aims to bring non-violent economic pressure to bear on Israel until it ends its violations of international law. This movement deserves credit for helping to mainstream key demands—to end the siege of Gaza and the killing of protesters, to support investigations of Israeli violations by the International Criminal Court, to oppose Israel’s new “nation-state’ law—that should all be on lawmakers’ immediate agenda.

AFGHANISTAN: More than 100,000 Afghans and 2,000 U.S. troops have been killed in a U.S. war that has raged for almost 17 years. Not-Yet-President Trump called for withdrawal from Afghanistan, but within just a few months after taking office he agreed instead to send additional troops, even though earlier deployments of more than 100,000 U.S. troops (and thousands more coalition soldiers) could not win a military victory over the Taliban. Corruption in the U.S.-backed and -funded Afghan government remains sky-high, and in just the past three years, the Pentagon has lost track of how $3.1 billion of its Afghanistan funds were spent. About 15,000 US troops are still deployed, with no hope of a military victory for the United States.

Progressive members of Congress should demand a safe withdrawal of all U.S. troops from Afghanistan, acting on the long-held recognition that military force simply won’t work to bring about the political solution all sides claim to want.

Several pending bills also would reclaim the centrality of Congress’ role in authorizing war in general and in Afghanistan in particular—including ending the 2001 AUMF. Funding for humanitarian aid, refugee support, and in the future compensation and reparations for the massive destruction the U.S.-led war has wrought across the country, should all be on Congress’ agenda, understanding that such funding will almost certainly fail while U.S. troops are deployed.

IRAN: With U.S. and Iranian military forces facing each other in Syria, the potential for an unintentional escalation is sky-high. Even a truly accidental clash between a few Iranian and U.S. troops, or an Iranian anti-aircraft system mistakenly locking on to a U.S. warplane plane even if it didn’t fire, could have catastrophic consequences without immediate military-to-military and quick political echelon discussions to defuse the crisis. And with tensions very high, those ties are not routinely available. Relations became very dangerous when Trump withdrew the United States from the multi-lateral nuclear deal in May. (At that time, a strong majority of people in the United States favored the deal, and less than one in three wanted to pull out of it.)

The United States continues to escalate threats against Iran. It is sponsoring a growing regional anti-Iran alliance, with Israel and Saudi Arabia now publicly allied and pushing strongly for military action. And Trump has surrounded himself with war-mongers for his top advisers, including John Bolton and Mike Pompeo, who have both supported regime change in Iran and urged military rather than diplomatic approaches to Iran.

Given all that, what progressive elected officials need to do is to keep fighting for diplomacy over war. That means challenging U.S. support for the anti-Iran alliance and opposing sanctions on Iran. It means developing direct ties with parliamentarians from the European and other signatories to the Iran nuclear deal, with the aim of collective opposition to new sanctions, re-legitimizing the nuclear deal in Washington and reestablishing diplomacy as the basis for U.S. relations with Iran.

It should also mean developing a congressional response to the weakening of international anti-nuclear norms caused by the pull-out from the Iran deal. That means not just supporting the nonproliferation goals of the Iran nuclear deal, but moving further towards real disarmament and ultimately the abolition of nuclear weapons. Progressives in and outside of Congress should make clear that nuclear nonproliferation (meaning no one else gets to have nukes) can’t work in the long run without nuclear disarmament (meaning that the existing nuclear weapons states have to give them up). That could start with a demand for full U.S. compliance with the Nuclear Non-Proliferation Treaty, which calls for negotiations leading to “nuclear disarmament, and on a treaty on general and complete disarmament.”

SYRIA: Progressive candidates and elected officials should support policies designed to end, not “win” the war. That means withdrawing troops, ceasing airstrikes and drone attacks, and calling for an arms embargo on all sides of the multiple proxy war. The civil war component of the multiple wars in Syria is winding down as the regime consolidates its control, but the sectarian, regional and global components of that war have not disappeared, so continuing a call for an arms embargo is still important. The first step is to permanently end the Pentagon’s and the CIA’s “arm and train” policies that have prolonged the war and empowered some of its most dangerous actors.

There will also need to be negotiations between the regional and global actors that have been waging their own wars in Syria, wars that have little to do with Syria itself, but with Syrians doing the bulk of the dying. That means support for the UN’s and other internationally-sponsored de-escalation efforts, and serious engagement with Russia towards a permanent ceasefire, as well as the arms embargo. U.S. policy should include absolute prohibitions on Washington’s regional allies—including Saudi Arabia and Turkey—sending U.S.-provided arms into Syria. And progressive supporters of diplomacy should also maintain pressure on the United States to back multi-lateral diplomatic processes organized by the UN and others—on humanitarian issues in Geneva, and political issues in Astana. Cutting the United States’ multi-billion dollar arms sales to Saudi Arabia, the UAE, Jordan, Turkey and other U.S. allies involved in the Syrian wars would also lend legitimacy to U.S. efforts within those diplomatic processes to press Russia to stop providing arms to the Assad regime.

IRAQ: Congress has largely abrogated its responsibilities even as the 15-year war initiated by the United States continues. Progressive policymakers would do well to join the existing efforts to end—not replace, but cancel—the 2002 Authorization for the Use of Military Force against Saddam Hussein's government in Iraq, and reopen congressional debate, with the goal of ending funding for war in Iraq once and for all. When President Obama withdrew the last troops from Iraq at the end of 2011, stating that “war in Iraq ends this month,” many assumed that the authorization ended as well. But it was never officially repealed and had no expiration date, and three years later Obama claimed that the then-12-year-old authorization justified the war against ISIS in Iraq. While Trump has relied primarily on the 2001 AUMF, the Iraq-specific authorization of 2002 remains in place and should be withdrawn. 

In the meantime, progressives in Congress should support many of the same policies for Iraq as for Syria: withdraw the troops and special forces, stop the assassination program that is the heart of Washington’s “counter-terrorism” campaign and cease sending arms. Congress should end funding to force the closure of the network of small “forward operating bases” and other U.S. military bases that may remain in U.S. hands in Iraq despite earlier agreements to turn them over to the Iraqi government. The U.S. must figure out new ways to provide financial compensation and support to the people whose country and society has been shredded by more than a dozen years of crippling U.S.-led economic sanctions bookended by two devastating wars (Desert Storm, starting in 1991, and the Iraq War, starting in 2003)—while somehow avoiding the further empowerment of corrupt and sectarian political and military leaders.

YEMEN AND SAUDI ARABIA: The ongoing Saudi-led war against Yemen reflects the most deadly front of Saudi Arabia’s competition with Iran for regional hegemony. The United States is providing indirect and direct support, including U.S. Air Force pilots providing in-air refueling so Saudi and UAE warplanes can bomb Yemen more efficiently, and Green Berets fighting alongside Saudi troops on the border, in what the New York Times called “a continuing escalation of America’s secret wars.”

The U.S.-backed Saudi war against Yemen has also created what the UN has declared the world’s most serious humanitarian crisis. Congress’ first action must be to immediately end all U.S. involvement in the war. Next, Congress must reject all approvals for arms sales to Saudi Arabia and the UAE as long as they continue to bomb and blockade Yemen.

Ending these arms sales may be a serious challenge, given the power of the arms manufacturers’ lobby, Israel’s strong support of Saudi Arabia against Iran and the fact that Saudi Arabia remains the top U.S. arms customer. But recent efforts and relatively close votes in both the House and Senate, while not successful, indicate that challenging the longstanding process of providing the Saudis with whatever weapons they want may be closer to reality than anticipated. The House called the U.S. military involvement in the Saudi war in Yemen “unauthorized.” Reps. Ro Khanna, Marc Pocan and others have introduced numerous House bills in recent months aimed at reducing U.S. arms sales and involvement in the Saudi-led assault. In the Senate, a March resolution to end U.S. military involvement in the Yemen war failed by only 11 votes, a much narrower margin than anticipated. Progressive candidates and new members of Congress should support all those efforts, and move further with a call for ending the longstanding U.S. alliance with Saudi Arabia, especially military sales and support for the Saudi-Israeli partnership against Iran.

A QUICK GLANCE AT SOME OTHER POLICY QUESTIONS

NORTH KOREA: Progressive elected officials will need to support Trump’s diplomatic initiatives, challenging mainstream Democrats willing to abandon diplomacy because Trump supports it (however tactically or temporarily). Progressives will also need to condemn U.S. military provocations that undermine that same diplomacy, and build public and congressional support for the inter-Korean diplomatic moves already underway. That should include pushing for exemptions in the U.S.-imposed sanctions that would allow inter-Korean economic and other initiatives to go forward. Progressives in Congress can also play a major role in supporting people-to-people diplomacy with North Korea, and they can lead the way in replacing the current armistice with a peace treaty finally ending the Korean War.

AFRICA: Across the continent, there is an urgent need to reverse the militarization of foreign policy, including reducing the size, breadth of responsibilities and theater of operations of AFRICOM.  The wide-ranging but unauthorized and largely secretive special operations and other military actions across the continent violate not only international law, but U.S. domestic law as well.

LATIN AMERICA: In Latin America, there is an urgent need for a new anti-interventionist policy, not least to stop the current attempts to take advantage of serious domestic crises in Venezuela, Nicaragua and elsewhere. Progressives will need to challenge the U.S. economic and foreign policies that create refugees from Central America in particular (including the consequences of the U.S. wars of the 1980s), even while fighting to protect those migrants seeking safety in the United States as a result of those earlier policies. Regarding Mexico, Congress needs to fight for a U.S. position in trade negotiations that is not based on economic nationalism, but rather on making sure that Mexican workers and U.S. workers are both equally lifted up. Left policymakers will also have the chance to play a leading role in forging a new relationship with Mexico’s just-elected progressive President Lopez-Obrador. 

All of the areas where U.S. wars are or were underway, as well as places where U.S. economic and climate policies have helped create crises threatening people’s lives, also become areas from which migrants are forced to flee their homes. U.S. policymakers must acknowledge that U.S. policies are direct causes of the refugee crises that exist in and around the war zones and climate crisis zones of the Middle East, Africa and elsewhere—and that the refugees seeking asylum in Europe, and the far fewer trying to come to the United States, are a consequence of those policies. So progressive candidates and policymakers should support massive expansion of funding for these victims of war, including humanitarian support in their home regions and acceptance of far greater numbers of refugees into the United States. They must directly challenge the xenophobic policies of the Trump administration that include the Muslim Ban, the separation of children from their families at the border and the vast reduction in refugees accepted into this country. In Congress, that might include introducing bills to cut funding for ICE or eliminate the institution altogether.

Finally, progressive candidates and elected officials will need to continue to craft policy proposals that recognize what happens when the U.S. wars come home. This requires more voices in Congress challenging the military budget because it’s used to kill people abroad and because the money is needed for jobs, health care and education at home. It means challenging Islamophobia rising across the United States because of how it threatens Muslims in the United States and because it is used to build support for wars against predominantly Muslim countries. It means exposing—on the floor of the House and beyond—the fact that the Muslim bans targeted primarily countries the United States was bombing, sanctioning or stationing soldiers in. And it means being clear that protecting refugees, asylum seekers and other migrants has to include ending the wars that create refugees in the first place.

Certainly, we shouldn’t expect every progressive or even every socialist running for national office to become an instant expert on every complicated piece of U.S. foreign policy. And for those running for state and local office, there may seem to be even less urgency. But we’ve seen how the Poor People’s Campaign, with its inclusion of militarism and the war economy as one of its four central targets (along with racism, poverty and environmental destruction), has demonstrated to all of our movements the importance of—and a model for—including an anti-war focus within multi-issue state and local mobilizations. The Movement for Black Lives has created one of the strongest internationalist and anti-war platforms we’ve seen in years—including calls for cutting the military budget, supporting Palestinian rights, stopping the Global War on Terror and the so-called War on Drugs, ending the militarized U.S. interventions across Africa, and linking U.S. military and economic policies with the rise in Haitian and other—predominantly Black—immigration.

Immigrant rights activists are linking movements for sanctuary (and against ICE) with opposition to the wars that create refugees. Campaignsare underway to reject the training of U.S. police by Israeli police and military forces. Battles are being waged to get local law enforcement agencies to refuse Pentagon offers of weapons and equipment left over from U.S. wars in Afghanistan and elsewhere. These campaigns all play out at the local and state level.

So especially for those running for Congress, but really for all candidates at every political level and venue in this country, there is a clear need for a strong, principled position on at least a few key foreign policy issues. And the key to making that happen still lies with our movements.


          Comment on The left abandoning democracy by Magnavox      Cache   Translate Page   Web Page Cache   
According to the wc program that is 72 words. Using wc is the slightly less autistic way to arrive at that number. Destructure is just angry when rich people promote social liberalism. Everything he says also applies to the rich's history of promoting economic exploitation that they benefit from but that he's perfectly OK with.
          WordPress and the Blank Target Vulnerability      Cache   Translate Page   Web Page Cache   
For those who haven’t yet noticed, WordPress now adds rel="noopener" attributes for any external links added via the link Quicktag in the Visual/RTE. So if you enable the option, “Open link in a new tab”, WordPress automatically will add the rel noopener attribute to the link. This is to protect against CORS and other exploits […]
          IPSC session 3 (trade secret then copyright)      Cache   Translate Page   Web Page Cache   

Session 3:
Trade Secrets, Courtney Cox, Can the Law Force You to Lie? The Use of Deceptive Precautions to Protect Trade Secrets

Reasonable measures to protect the secret are generally required. Should you have to engage in deception, or deceptive misdirection (answering a related question but not what was asked, or answering partially as if it were fully) to be reasonable?  Lying/misinformation can cause real harms to others, if they rely on your representation to do something, and there are dignitary harms in being lied to/treated as an object.  Concerns about trust: if everyone lies when it’s convenient, then representations become incredible.

Companies do in fact lie to protect trade secrets.  E.g., putting out that security officers are listening at the local bar.  Or putting in a deliberate error in a map to identify copiers.  How I Met Your Mother: to protect the finale, they mislabeled scripts/casting calls; Game of Thrones films fake scripts so the cast doesn’t necessarily know what will be shown.  Cisco found source code distributed (disgruntled employee) and rather than attracting attention via takedown it seems to have posted a bunch of different fake versions; this is designed to wear people out and get them to think it’s all fake.

There’s philosophical debate over how to define a lie. Some people bake into the concept the idea of wrongfulness, but she doesn’t want to do that: she means intentional assertions of fact that aren’t true. A lie can be deceptive, if it imparts the false belief.

Some of these techniques are definitely cheaper than demand letters/hiring a lawyer. Thus they could count as reasonable measures, alone or in combination with techniques.  But: (1) doctrine of unclean hands—you shouldn’t be able to get legal relief based on conduct that is itself inequitable/wrongful, which is often about deception; (2) risk of harm to others; (3) general distaste for misrepresentation; (4) immorality of lying no matter what. If trade secret is the codification of commercial morality, then it shouldn’t include this.

Harm: suppose a screenwriter thinks they’ve been hired to write a finale for Game of Thrones, and they therefore give up lucrative other opportunities. Is this relevant harm?  Should we compare this to other precautions that they should have taken?  You’re allowed to have guard dogs; if the guard dogs are unreasonably vicious, then the remedy is tort law.  Thus, torts should provide the remedy rather than being incorporated into trade secret law.  [Query whether there’s any scenario in which the screenwriter hasn’t contractually waived all rights here.]

Bottom line: yes, there is at least a not insignificant set of deceptive practices that should be okay/not actionably deceptive or unclean hands; there may be a subset that are required.  She would not draw the line at corrective, post-disclosure deception.  Car manufacturers: road tests of a new innovation, protecting from corporate spies with cameras. So they use car disguises: cardboard covering the innovation, or making it look like some other innovation was being tested so that it wouldn’t be properly identified.

Q: gov’t lies all the time, for (they think) good reasons—informants, cooperating witnesses, interrogation. Is there a salient difference b/t gov’t lying and gov’t rewarding lies through policy? Compelled speech considerations: posits that gov’t should never force someone to lie through doctrine even if lying is ok when chosen.  Reactions?

A: There is reason to think gov’t can do what civilians can’t, but that doesn’t cover the whole logical space of actions.  Rewarding might not be enough to compel—you don’t have to claim trade secret protection, but if you want to do so, you have to engage in speech, just as you would to get a professional license of many kinds.

IP and Creativity
Sean Pager, Much Ado About Norms
Issues w/suboptimal norms: if there’s not sufficient communication, people may think norm is popular even though everyone else only goes along b/c they think it’s a norm too—drinking a lot on college campuses, for example.  Became a norm b/c of a vocal minority. Powerful people can also impose norms against the true internal desires of most.  Ellickson’s Shasta farmers are all white men occupying lands stolen from Indians and often exploiting Latino workers.  How seriously should we take these concerns in IP norms?  This is a question worth asking.

One example: People have written about Nollywood, the Nigerian film industry, as a negative IP space. Early on, Nigerian filmmakers used lead time to make money before piracy overtook them; new tech has changed that.  Social norms/marketers guilds have replaced that with a de facto exclusivity norm. That meets the paradigm of social norms solving a gap in IP law, but is it an optimal norm?  He says no. Would be better off with a formal IP system. Guilds often discriminate ethnically, by gender, etc. Filmmakers want a formal system but have been politically blocked by the clout of the marketers—norm-locking.

Chris Sprigman: how important is it to the norms literature whether norms are efficient?  Varies across the literature. Rothman has work on this. Some is descriptive and also attempts to account for why the norms lead to the production of certain types of content and not others. Could categorize this literature in your discussion.

Jennifer Rothman: Lisa Bernstein has some work on this in merchant norms.  Inherent biases in relying on norms based system—pay equity and hiring; informality of the system can reify principles of discrimination. Not well described in the IP context w/r/t these norms.  That would be a meaningful intervention.

Rosenblatt: “good” and “efficient” are not the same thing. I could reasonably be accused of being overoptimistic about norms, but good v. destructive/counterproductive/discriminatory/otherwise suboptimal are different things. Effective governors of behavior, beneficial governors of behavior, good substitutes for law: these are different things from when norms are efficient. 

A: would also add: good/efficient for whom or for what?  [See Glynn Lunney on this Q in IP law generally, not on norms.]

Q: interesting work on architecture—fan fiction sites where the sharing models are designed by women, v. FB where all the creators of the sharing features are men.   [missed the name, want to know it!]

A: link there b/t code as law and norms as law.

Q: identify situations where formal law has replaced norms, or where there is demand to codify norms. Could happen for different reasons: norms might be suboptimal, or somebody lobbies to impose costs on someone else. Transitions are revealing situations.

Andres Sawicki, The Law of Creativity?

Lots of different models of creativity. Law’s traditional model: works are public goods, need incentives.  Categorization: (1) Motivational. Focus on the individual; psychology; motivation for creative behavior. (2) Environmental. Individual behavior isn’t the primary determinant; there’s a lot of serendipity, fortuity, unexpected results, play; what matters is the sociocultural environment in which the individual environment and so we should focus law on opportunities for serendipity.  There’s surface tension, so to speak—the agents operating in these models look very different. Homo economicus is completely unrecognizable in ordinary life; in the creativity models, we have rich portraits of humans operating in recognizable contexts.  There’s also tension in the role of IP law for the models. IP is central to the operation of the model in public goods conception, not so much with the others.  (1) and (2) tend to bash the rational actor’s lack of realism. 

Can we resolve this tension?  Respectable realism, from philosophy of science. There are lots of useful ways to look at a given phenomenon depending on what you’re interested in.  All models are wrong but some are useful, and it’s with that in mind that we should choose our models.

Could also abandon model realism more generally.  Model realism is an important natural sciences issue—are there “really” subatomic particles just because we can make/verify predictions that come from positing their existence?  As legal scholars we don’t need a grand unified theory, or to posit unique differences b/t intrinsic and extrinsic motivation, we just need to know what we want to do. What are we using these models for?  Generating testable predictions is something we want from models.  But we can also make interpretative uses: looking at hypothetical situations.  Models can also be built from the ground up, used as slightly more abstract representations of reality in order to organize our thinking/our world—that’s going on w/some of the models in the literature/critique of public goods model.  There’s no right way to do this.

Jeremy Sheff: Epistemological roots of those philosophical schools matter—American pragmatists, for example. When rubber hits road on doctrine, will intersect w/Legal Realism in important way b/c of the epistemological commitments in philosophy of science and how they map to Legal Realism.

A: His point is that we’re not there yet. Entirely possible that all these models and maybe more will provide useful insights. [Some pluralism about realism?  That would be a fantastic title, I think.]

Sheff: that’s a very pragmatist idea, but there are limits on how far a pragmatist take on epistemology can take you. If it’s about how our community defines truth, then the interest shifts to the definition of our community.

Christopher Sprigman, The Second Digital Disruption: Algorithms & Authorship in the Adult Entertainment Industry

First digital disruption: rise of content distribution on the internet—Napster disrupted the music industry. Now, with porn, content builds brands to sell other stuff: just as with Amazon, its video content is an inducement to get people to sign up for Prime.

Mindgeek started w/ rise of YouTube: pornographic user-uploaded videos. Destroyed the mom & pop outlets. Large financial backing enabled Mindgeek to use piracy to drive down the value of the mom & pop outlets and then buy them up.  Camming has stabilized as an experience good, hard to knock off—like monetizing live music performances.  There’s an enormous custom market now.

But the next thing that happens is Mindgeek’s dominance. Now that they control so much production and distribution, user data comes back to them, allowing them to kick off the second digital disruption centered on data-driven creation, if this is a harbinger of what is coming from Netflix and Spotify and Amazon: to shape the way content is presented and even made.  Netflix made House of Cards because their data told them that a group of consumers they wanted to court would like a BBC-like political show and would like Kevin Spacey.  What picture you see when you see a tile for The Crown is based on your responses to past ads for shows. Amazon is following in Netflix’s wake, greenlighting content and then strangling it in response to data. Spotify is interested in computer generated music.

Data changes the risk of failure. More data: maybe able to create fewer risks.  Can also indirectly address the risk of success (which is piracy).  Entities that engage in data driven creation tend to be big and to have an all you can eat model, which makes piracy less important. We might be able to have less copyright and get the same investment incentives because the risk of failure is less (so the incentive needs to be less) and the risk of piracy is also less.

Moral intuitions about copyright: labor theories.  Consumer preferences and choices might start to be understood as part of the contribution to the “work” that is produced. One model: The creator brings something to humanity, like Prometheus bringing fire: that myth is hard to sustain with data driven creativity. The creator is watching the watched, who are then watching their reflections.

Sheff: I should hate this trend, but not sure about what’s the problem.  (A: Feels manipulative.) Even if it is in this iterative way, you still need experiments: you need an A and a B for your A/B testing.  You don’t reach an equilibrium. Data driven model can’t seem to capture that.

A: lots of research tries to pin this down. Newness plays relatively modest role—we tend to like things that are a little bit new but not a lot. Not that different from what we actually like, but we just tell ourselves a story about what we like that doesn’t match with our real enjoyment.  He thinks of fashion: often the constant churning of the same stuff. Hard to make judgments about whether fashion is more or less creative than other fields. These Qs are above his pay grade.

[Jon Ronson’s The Butterfly Effect influenced my thinking here. Camgirls and customs are the opposite of algorithms: this story you’re telling is not really about algorithmic creation but about the immiseration of the middle class, where Mindgeek makes all the money and we’re back to cottage industry for everyone else.  Note that this content is mostly functional, and the average stay on the site is ten minutes; they don’t think they can give guys more orgasms or longer ones, do they?  So what is the data being used to shape content for? There are good reasons rooted in the structure and incentives of the firm why they might want to use the algorithms to direct the creation of porn and tell people that they are making better porn as a result, but it’s not obvious why this tells us about creating things that have more degrees of freedom/some aim other than producing an orgasm.  So, for example, I’m pretty sure a lot of big companies would prefer AI performers instead of cattle/actors [who might, you know, end up being Kevin Spacey]. But I also have a strong sense that AI performers won’t work for some significant subset of porn consumers, to whom it is important that a woman do something for them. I could be wrong about that, though.

Relatedly: Cui bono: and what is the relationship of who benefits to the content of what is produced? When I was growing up guys didn’t expect to come on our faces, and at least the reporting tells me that things have changed.

A: [partial] Interpretive qs are beyond my pay grade. [But if you’re telling us to draw conclusions about creativity from this example, that’s what you’re getting paid for.  We are privileged white people and some topics might not be our topics to publicize and pioneer the discussion on.] The paper is about a phenomenon of which the adult industry is the best exemplar, but Netflix and Spotify are part of the story. Camming and customs are happening and have nothing to do with data. We’re trying to show you where Mindgeek came from and our fundamental story about how the use of data may transform industries [but if you’re only telling half the story about what the industry is, then is that a useful account? It seems a lot like talking about work without talking about domestic, unpaid labor].

Rosenblatt: consider the things toddlers like to watch on YouTube—it’s not what you think. Normatively may be unclear/different.

Lemley: old enough to remember when cable was going to replace TV with ads b/c of the new business model.  In fact, it just gets layered on top of the existing revenue generation model. Fine w/normative suggestion that we should be fine w/piracy but as a practical matter, the business model is likely to be “here’s a new way to make money.” [Relatedly, dialing down on copyright dials down the only lever that the people in cottage industry production may have, which has serious distributional consequences.]

A: risk of failure going down changes incentive structure, and risk of success going down has indirect effects, suggesting recalibration could be appropriate.

Lemley: differential benefits for big producers which are the only ones who can do this at the necessary scale.  Small producers lose out.

A: this is what people accuse Mindgeek of having done—used piracy to drive down value of companies they acquired. TW/AT&T merger: TW made argument that they needed to be able to hook up to digital distribution in order to target ads/shape content and avoid competitive disadvantage w/Amazon and Netflix; the judge totally bought it.  Data now becoming more salient in creation of content: that’s a fundamental story. Whether this is good or bad is a new set of questions. Sounds like new issues of platform dominance, as w/FB.  That may be indeed what we’re facing. May make sense to oppose it and do something about it but we have to identify it first.

Immiserating the middle class: FastCompany CEO wants lots of middle class musicians, not people earning millions a year.  Self-serving vision but not normatively worse than opposite. Artists do benefit in surprising ways: bands on tour use Spotify data not only to decide where to tour but also what songs to play in what cities. In equilibrium, we should expect artists to do better at identifying and finding their audiences.


          IPSC session 2      Cache   Translate Page   Web Page Cache   

Session 2: IP History and Theory,

Stephanie Bair, IP Inequality
Artists and innovators are not equally distributed. Rich people are more likely to acquire IP rights than poor people; whites than minorities in the US; males than females.  Theoretical lens: income inequality. Children from high-income families are 10x more likely to apply for a patent than children from low income families, even controlling for educational achievement. Only 18% of inventors were women. Brauneis/Oliar on ©.  Income inequality has similar race/gender aspects, and both IP and income inequality contribute to concentration of wealth in the hands of a few. Some people think income inequality is good b/c it encourages risk-taking.  Is the same true of IP inequality?  No, it doesn’t hold water b/c IP is already structured as an optional incentive system. If you want financial and status benefits, you can create something; what’s not required to serve this incentive function is relativity or inequality in the system itself—having more IP than others is not what’s driving the system.

IP isn’t a perfect proxy for innovation, so there could be IP-related reasons for disproportionate participation in the formal IP system. Financial, cultural, value-based reasons. Or they could be disproportionately innovating in areas of IP that aren’t protectable, like social innovation. They could be denied IP rights at higher rates due to explicit/implicit bias, and there’s some empirical evidence of this in patent. Stereotypical male conception of innovation.  There is also a true innovation gap—people from certain groups are innovating at suboptimal levels.

Role of exposure to other inventors/innovators—exposure to such a mentor increases likelihood that person from underrepresented group becomes an inventor.

Psychology literature: Circumstances of poverty bias decisionmaking away from types of thought processes that lead to creative breakthroughs.  Effects of past chronic stress on explorative v. exploitative thinking—when people experience the world as harsh and unfair, people stick to what they know rather than exploring new options. Problematic from creativity perspective. Also, dichotomy b/t habit based and goal based decisionmaking. Chronic sleep deprivation, linked to poverty and racial subordination, contributes to habit based decisionmaking, which also hinders creativity. Even if IP system is fair and open, hard to respond to its incentives.

[Woolf’s A Room of Her Own.  Time and leisure and space, mental and otherwise, are in short supply when people are overburdened with care work/survival work.]

Jeremy Sheff: Effects of poverty on lived experience of individual poor people: if I don’t make a living, I won’t eat and my kids won’t eat.  Don’t need psychology to explain the absence of the capital/time required for innovation.

A: this is additional to the explanations like that one.  Chetty study specifically found financial barriers to entry weren’t as important as one might have hypothesized in that if those barriers were absent but there wasn’t a mentor, it didn’t matter as much.  [People from poorer backgrounds who can make high incomes often feel pressure to do so to support others/justify the sacrifices made to get them there; perhaps a mentor can direct that in the direction of innovation.]

Sean Pager: note that new innovation/creation from underrepresented groups may fill gaps that need filling, rather than more of the same.  Role of incubators set up by interest groups etc.?

Copyright, Andrew Gilden, Copyright’s Market Gibberish

Cases like Nunez and Bond v. Blum reject privacy as something w/in scope of market analysis. Other cases where Ps resist sale for any reason, like Salinger, reason that though Ps don’t want to sell these rights now, they might in the future, so there’s market harm; or they’ve sold similar photos/rights in the past and so have market-based rights now. Cases about political opponents: P isn’t allowed to say there’s market for headshots used by opponent, but Don Henley is allowed to presume a market for political licensing of his songs. Weirdly large body of caselaw about religious disputes: Lerma/Scientology.  Worldwide Church of God: P able to stop splinter group from using founder’s highly racist views—no financial interest in the work or interest in selling it, but court hypothesizes there’s still economic value to defeat fair use.

Does not want to require actual/foreseeable harm to P’s market interests. Not possible to rigorously separate market and emotional reasons. There are distributive problems w/ economic only view—advantages those with track record of success in the market, like Salinger. [Though that doesn’t have to be the case if you use traditional, reasonable or likely to be developed as a standard.] Slicing apart economics and emotions have a disproportionate impact on women, minorities, and the poor, whose injuries are less likely to be valued highly (or at all) in monetary terms.  “Coddling artistic vanity” is a gendered concept w/no place in the © system. Author’s right to change “his” mind and eventually sell a sex tape; courts use “his” and not “her” in this framing.  Courts should instead openly and explicitly discuss the interests that they are actually weighing.  Basis in the statutory text: effect on the potential market for, or value of, the copyrighted work, stated in the disjunctive.  Video Pipeline: © isn’t just about monetary compensation.  We have developed a good taxonomy of defendants who should be allowed to copy and not a good taxonomy of plaintiffs who should be able to assert nonmonetary interests.

Likely pushback: expand © in problematic ways.  He thinks it will help reign in abuses and censorship. We can distinguish between privacy and autonomy and online business reviews or efforts to suppress political opponents.  In cases where courts do openly discuss privacy/religious interests, they do so to deny claims, so expansion of © comes from opacity.  If courts can be open and explicit about noneconomic interests, so can parties, which means that remedies can be tailored to those interests.

Annemarie Bridy: Longstand policy choice not to have moral rights in ©.  Your argument seems to be that courts are backdooring this through market harm, so let’s just embrace it. Normatively I would be inclined to hold the line and criticize the cases. © is looking for public benefits and that generally happens through markets/dissemination, so we should keep that.

A: don’t take a strong stance on what the balance should be, saying that the cases are wrongly framed as market interests v free speech rather than surfacing the conflict. [Shouldn’t the criticism then be that the cases making up fake market interests shouldn’t do that?] He doesn’t think there should be a cause of action for mutilation/distortion, but actual copying cases should consider the motivation behind the invocation of ©. There’s no way to distinguish economic/emotional motivations.

Bridy: but isn’t that what the fair use factors are for, testing for the right motivation in asserting a 106 claim?  If you aren’t experiencing harm under 107, you shouldn’t win.

A: but you can’t actually police that because of the market language that non-market Ps are able to use.  We can’t draw those lines.

Q: Why not tell these Ps that they should bring privacy claims if they have privacy interests, not © claims?

A: then we have to ask why they don’t—it’s b/c of weaknesses in those cases. [But why does that mean it should matter to the fair use analysis?]  Selective access to privacy protection through © is the worst of all worlds.

[Yeah, I have the likely pushback. Allowing “value” to mean “nonmonetary value” creates what I call the “Centerfold” problem: I may feel bad that you made a critical, fair use, and the work may now feel contaminated to me, but I don’t believe that the law should weigh that against fair use.]

Dustin Marlan, Unmasking the Right of Publicity
Protecting the internal dimensions of the person is generally considered the role of privacy, not publicity rights. Jerome Frank’s conception was very influential.  Now a hydra-like right, merchandising, endorsement, and “impressment.” Similar to intrusion upon seclusion, false light, etc. in terms of privacy categorization, but what caused this bifurcation between economic interests and personhood/privacy interests? What is the persona—“mask”—for publicity rights? Might be based on Franks’ own conception of a self split into the private true self and the public false self which is constructed and commodified.  Haelan was the first recognition legally of the persona as an assignable, alienable right independent of the right of privacy.  Frank had been psychoanalyzed and recommended it to his colleagues; wrote about psychological concepts of the law in which judges were father-substitutes making the pretense that law was clear and precise.  He was a fact-skeptic, believing that uncertainty in judicial process resulted not just from uncertainty in law but uncertainty in judge’s perception of facts—law varies w/judge’s personality.

Consider other concepts of the self that better integrate privacy and publicity: Julie Cohen’s postliberal approach to the problem of selfhood is relevant to both: subjectivity emerges gradually, shaped but not determined by surroundings, situated within relationships, practices and beliefs. Celebrity as a mask that eats into the face (hey, I wrote a thing about that)—may be impossible to distinguish them in the way the law now presumes.

Shyam Balganesh: wonders whether other stuff in Frank’s life was more important than his earlier book—Frank himself was very clear about his academic persona versus his judicial persona.

Copyright, Christopher Yoo, Are Ideas Independent from Expression: Implications of Linguistics and Cognitive Science for Copyright

Sapir-Whorf: language structures our worlds, determines our actions, constrains our thoughts. Steven Pinker believes that we think in mentalese: we have a concept of blue that is independent of the word for blue.  Even though Korean treats blue and green the same, Pinker thinks there’s something innate, as does Noam Chomsky who posits a universal grammar and that language/acquisition can be studied out of context.  “Colorless green ideas sleep furiously” is grammatically correct even though it is meaningless—there’s an inherent structure.  Another version of language is agglutinative, with verb at end and particles changing the meaning, like Finnish, Hungarian, Korean, Japanese—another major form that just happens to manifest in different parts of the world b/c there are a limited number of ways to structure language.  Now: renaissance of interest in Sapir-Whorf—studies of directional languages/thinking.  Huge controversy about which way causality runs.  Inuits have multiple words for snow, but the number is in dispute and they need them. 

Implications for ©: Paramount v. Axanar—unauthorized Star Trek prequel; Paramount asserts © in Klingon as a language.  Natural languages aren’t copyrightable, but what about constructed languages that originated from a creative work but are now spoken by people? Axanar case says it’s a jury question. Sapir says language is an agreement b/t people to communicate on certain terms. Doesn’t have to be formal agreement, but genericide is an example: by practice we use thermos to mean a thing.  Tolkien’s estate asserts © in Elvish but doesn’t assert rights in noncommercial uses.  See also Esperanto, Loglan, Na’avi, Dothraki.  Loglan is a constructed language to test the Sapir-Whorf hypothesis, to see if they thought differently when using it; creator asserted © to stop others from using, which seems self-contradictory.

Wikipedia and Aboriginal languages: Tasmanian palawa kani is an attempt to synthesize fragments of 12 extinct indiginous languages and promote its use. Wants to set rules on who can use it, claiming under UN Declaration of Human Rights of Indigenous Peoples, not copyright. Raises how shared language can define a community. Wikipedia rejected request for removal.

Oracle v. Google: can’t © overall computer language, but a specific computer program can be. Where is API in that scheme?  Fed. Cir. reversed two jury verdicts saying it was ok. This is about levels of generality/taxonomies.  Reminiscent of Nichols v. Universal Pictures; EU came out the other way.

Other implications: right to speak a particular language; importance of gendered speech.

Pam Samuelson: how would you rule on computer languages developed in order to become “lingua” of that community versus things that are more artistic such as Klingon? What tool do you use? She thinks of language as system with structure & component elements.

A: the way statute is drafted excludes all that. We have a generality problem. He would draw the line at functionality. Similar to transformative use—now w/database cases it’s about making creative works more useful rather than more/differently creative.  Tolkien’s Elvish: Kind of like laches—once you let it loose in the world, other people should be able to use.

Justin Hughes: Malaysian/Ba’ahasa was a pidgin/trading language for coastal peoples, built into a language—this seems like a functional purpose.

Betsy Rosenblatt: you talk about genericide; we don’t protect systems b/c we think they’re functional. To the extent that it’s a communication tool, it’s functional even if it is expressive in the origin. So wouldn’t draw a line b/t Klingon and Java b/c they are both building blocks.

A: Coders say code is beautiful but most of them don’t do that in their daily work.  Klingon was designed by linguists.


          IPSC session 1      Cache   Translate Page   Web Page Cache   

Standard disclaimers apply: These are my summaries, not the presentations themselves. As usual, I have to skip a lot of interesting presentations and I try to attend things I haven’t seen, no matter how good the ones I have already seen/read drafts of are.

Session 1: Trademarks

Jason George (and Lisa Larrimore Ouellette), Trademarks as Innovation Incentives

Not saying that the goal is/should be innovation. SCt has said multiple times that TMs aren’t about promoting innovation or discovery; that’s patent/©.  We’re saying that this has made us overlook the effects of TM on innovation, which could be good or bad.  Survey evidence: many innovative firms don’t use patents at all. Pharma/chem aside, firms view first mover advantage as more important in appropriating returns from investment.  Not concerned about lines separating doctrines. TM is important in maintaining/extending first mover advantage and thus creates incentives.  Purple pill for Nexium=competitive advantage in the marketplace; the Swiffer, which used lots of existing inventions but appropriated returns through branding.

Economists are now using TM as innovation indicator—registrations correlate w/R&D spending, stock market value, and self-reported innovation as well as patent counts. There are caveats. TM registrations don’t mean 1-1 new product; could be a product new to the firm or the marketplace rather than new to the world, but that’s also true of patentàinnovative product. Also industry-dependent, but in some industries TM better correlates w/innovation than patent, for example in info services.

This doesn’t mean that more TM means more innovation.  TMs have costs to innovation, as w/patents.  Barriers to entry; higher prices to consumers. Overincentive—TMs can endure forever.

How do first movers exploit TMs?  At least three mechanisms: staking out the most effective marks—Beebe & Fromer on the marketing literature on the limited supply of “good” marks.  Causing chosen marks to become synonymous with the innovation—arguably Lyft is a better name for ridesharing, but Uber owns the category mentally.  Using the first mover period to develop brand loyalty, as w/name brand drugs after patent expiration.  Can work together: cronut is an apt name for the hybrid pastry, and it’s a registered TM though it’s arguably generic (and the registrant may not have been the inventor [which seems to be a problem for the theory, as does the Swiffer example]) and developed brand loyalty. [Isn’t this an incentive to create a thing called brand loyalty or goodwill, not the thing that we have historically called innovation?]  Shredded Wheat case goes to the link—protecting a name synonymous w/product has a similar effect as patent protection post-patent expiration. 

Complementarity b/t patents and TM in industries w/low turnover and need for differentiation b/c advertising spills over to similar products, like the pharma industry. [Maybe you need TM differentiation to preserve market share in pharma precisely because pharma depends on patent-type innovation, which is generally free for others to copy once the patent expires?]  But TM provide distinct benefits over patents: Cost. You don’t need anything to get TM protection but bring product to market, and registration is cheaper/faster than patent examination. TM cover more subjects than patent—anything that can be sold in the market.  Quick innovation cycles are poor fits for patent as w/software, but first mover advantage can be significant. Less robust protection than patents, but weaker protection over a longer period can achieve the same incentive w/less deadweight loss.

Any full economic analysis of given TM doctrine should take good & bad into account when trying to measure its effects on a particular industry.  Where doctrines give wiggle room: genericide, secondary meaning, functionality. Unclear if change is needed. Added complexity from trying to factor in may o/w possible efficiency gain but that’s different from believing that these effects don’t exist.

[Why not call this theory a theory about protection against point of sale confusion or maybe just against counterfeiting?  Current formulation seems to be imprecise in just the way that distorts full economic analysis.  Does dilution protection support first movers’ incentives?  Especially given the evidence about how most (non-pharma) firms don’t make internal distinctions b/t IP doctrines (see also Jessica Silbey’s work), it’s hard for me to understand how one would distinguish between “existence of some basic TM right” and “this particular aspect of the doctrine” in performing the economic analysis of a doctrine’s incentive effects.]

Q: this is about what TMs do to compete/bring a product to market, not innovation. What is it about TM law that is stimulation innovative activities as opposed to bringing a product to market? Also: Don’t really get how registration is an innovation indicator. From economic perspective there’s such a low cost that it’s not a great signal. Innovation correlates w/ a lot of stuff like not being starved.

A: Rewards a number of different activities, but mechanisms affect first mover advantage in a lot of ways.  One could argue that first mover advantage is the key thing, and TM extends that.  Causes TM to have more direct effect on innovation.  Also true that correlation isn’t causation.  Don’t rely on those studies.

Christian Helmers (with Carsten Fink, Andrea Fosfuri, and Amanda Myers​), Submarine Trademarks

iPhone mark originally filed in Trinidad & Tobago on paper March 2006, by a company called Ocean Telecom that eventually merged w/Apple.  Filed USPTO by Ocean Telecom Sept. 2006 for extension from T&T.  Official announcement by Apple Jan. 2007.  Released June 2007; merger w/Ocean Telecom Sept. 2007. This reflects the submarine strategy: public disclosure is strategically delayed by filing in a foreign jurisdiction w/o online publication and sometimes combined w/use of shell companies. That can then be used to get US priority when filed w/in 6 months under the Paris Convention.

Small but increasing number of mostly tech firms. Used PTO TM dataset to ID TMs 2002-2016 claiming priority from one of 6 jurisdictions that are Paris Convention but don’t publish online register. Also extracted non-submarine filings from companies that use the submarine strategy.  187 unique company names doing submarine filings. Also distinguish filed in own name/filed by shell company; our prediction is the upward trend of filings will continue to increase.  Apple, Google, Zynga, Mattel, T-Mobile, Cisco, Amazon, LG, Bethesda Softworks, Intel, Beats Electronics, Facebook, Instagrams, Nest Labs, Tivo.  Amazon stands out w/shell company filing strategy, but Apple has done it more numerically so far.  Strong trend: class 41, 42 (computer & entertainment services), goods class 9 (computers): usually filed in products & services.  Mattel stands out here as toy company, but has used the strategy for online characters.

Used Google Trends: are submarine TMs associated w/fewer online searches prior to official product announcement/release?  Answer: yes. iPad Air, for example, had zero search intensity until official announcement; the USPTO filing date was after the official product announcement. Compared to regular TMs: the regular marks have much higher search intensity before the announcement date.

Thus submarine TMs do seem to be associated w/more secrecy than regular TMs. More likely to use when TM/product is more valuable; competition for products/names is intense; company pursues a global branding strategy. Various metrics, including: Where you tend to have a lot of refusals and oppositions, companies are more likely to go submarine.  Madrid filing/Madrid filing in China (indicating a global strategy) is positively associated w/submarines b/c they’re worried about squatting in China.

Daniel Hemel (and Lisa Larrimore Ouellette), Governing the Semantic Commons

Semantic space is elastic, but not infinitely or effortlessly so. English speaking consumers can be trained to remember marks like Krasny Oktyabr, but it’s a cognitive stretch. Example: Hagen Dasz.  Tragedy of the semantic commons include costs of proximity: costs arising b/c marks are too close semantically to one another include consumer confusion, reduced incentives to innovate/invest in quality.  Distance also leads to confusion: medication with name too long for expanded Twitter count makes it hard to identify the medication or to figure out what’s the same/different—leads to greater reliance on gatekeepers and greater start-up search costs.  Compare: last French/Italian wine you drank—what was the mark, not the varietal? For non-connoisseurs, it’s hard to remember and we become reliant on people who restrict market access.

Trouble w/TM is not just that semantic space is limited, it’s also that almost any change to TM law that reduces the costs of distance will increase the cost of proximity, and vice versa.  This tradeoff is almost inevitable. Consider geog. limits on TM protection, or higher showing of secondary meaning before recognizing a descriptive term as a mark: that increases ability to approach the other use, but also risks confusion for the people who do cross over geog. lines or who do think there’s a single source.

3 possible escapes from the dilemma: propertization. TMs are relatively weak property rights; assignment in gross doctrine limits alienability/divisibility, making semantic space heavily zoned—you can’t just do whatever you want w/your property. We could remove the zoning and allow property owners to allocate regardless of actual consumer protection, so the single owner could decide, or not, to allow one user in California and one in Iowa, or one user in one category of beer and another user in another category. Demsetzian logic: trust the mark owner.  Trouble is the Merrill/Smith argument about slicing property.  Other marks lose information value when you do this.  You can’t then look at any TM and understand what it represents, and the property owner doesn’t take that externality into account when making decisions for its own benefit.

Could use Pigouvian tax, or subsidize firms that expand the semantic commons.  Target tax benefit for advertising to those who call their product “Smirnoff” instead of “Natural Light.” 

Alternative ID systems: government generated, like SSNs, or bar codes (privately generated) so that you don’t have to remember what you drank before and can just scan the bar code.  There is need for coordination, whether by gov’t or by private systems.  Some health systems use 10-digit identifiers and others use 11-digit, and not all transfer the 10 to 11 in the same way, which is a problem of semantic space but not generally thought of as a TM problem. 

Q: is propertization sensible given the confusion results?

A: We know that land is finite and we’ve still given strong property rights.


          Football - Ligue Europa - Dudelange réalise un bel exploit à Varsovie      Cache   Translate Page   Web Page Cache   
En s'imposant 1-2 en Pologne face au Legia, jeudi soir en match aller du troisième tour de qualification de la Ligue Europa, le F91 a pris une option sur une place en barrages.
          Security Leftovers      Cache   Translate Page   Web Page Cache   
  • Voting By Cell Phone Is A Terrible Idea, And West Virginia Is Probably The Last State That Should Try It Anyway

    So we've kind of been over this. For more than two decades now we've pointed out that electronic voting is neither private nor secure. We've also noted that despite this several-decade long conversation, many of the vendors pushing this solution are still astonishingly-bad at not only securing their products, but acknowledging that nearly every reputable security analyst and expert has warned that it's impossible to build a secure fully electronic voting system, and that if you're going to to do so anyway, at the very least you need to include a paper trail system that's not accessible via the internet.

  • Dell EMC Data Protection Advisor Versions 6.2 – 6.5 found Vulnerable to XML External Entity (XEE) Injection & DoS Crash

    An XML External Entity (XEE) injection vulnerability has been discovered in Dell’s EMC Data Protection Advisor’s version 6.4 through 6.5. This vulnerability is found in the REST API and it could allow an authenticated remote malicious attacker to compromise the affected systems by reading server files or causing a Denial of Service (DoS crash through maliciously crafted Document Type Definitions (DTDs) through the XML request.

  • DeepLocker: Here’s How AI Could ‘Help’ Malware To Attack Stealthily

    By this time, we have realized how artificial intelligence is a boon and a bane at the same time. Computers have become capable of performing things that human beings cannot. It is not tough to imagine a world where you AI could program human beings; thanks to sci-fi television series available lately.

  • DeepLocker: How AI Can Power a Stealthy New Breed of Malware

    Cybersecurity is an arms race, where attackers and defenders play a constantly evolving cat-and-mouse game. Every new era of computing has served attackers with new capabilities and vulnerabilities to execute their nefarious actions.

  • DevSecOps: 3 ways to bring developers, security together

    Applications are the heart of digital business, with code central to the infrastructure that powers it. In order to stay ahead of the digital curve, organizations must move fast and deploy code quickly, which unfortunately is often at odds with stability and security.

    With this in mind, where and how can security fit into the DevOps toolchain? And, in doing so, how can we create a path for successfully deterring threats?

  • Top 5 New Open Source Security Vulnerabilities in July 2018 [Ed: Here is Microsoft's partner WhiteSource attacking FOSS today by promoting the perception that "Open Source" = bugs]
  • DarkHydrus Relies on Open-Source Tools for Phishing Attacks [Ed: I never saw a headline blaming "proprietary tools" or "proprietary back door" for security problems, so surely this author is just eager to smear FOSS]
  • If for some reason you're still using TKIP crypto on your Wi-Fi, ditch it – Linux, Android world bug collides with it [Ed: Secret 'standards' of WPA* -- managed by a corporate consortium -- not secure, still...]

    It’s been a mildly rough week for Wi-Fi security: hard on the heels of a WPA2 weakness comes a programming cockup in the wpa_supplicant configuration tool used on Linux, Android, and other operating systems.

    The flaw can potentially be exploited by nearby eavesdroppers to recover a crucial cryptographic key exchanged between a vulnerable device and its wireless access point – and decrypt and snoop on data sent over the air without having to know the Wi-Fi password. wpa_supplicant is used by Linux distributions and Android, and a few others, to configure the Wi-Fi for computers, gadgets, and handhelds.

  • Linux vulnerability could lead to DDoS attacks

read more


          Directeur, Exploitation centralisée des magasins - The Home Depot - Ontario      Cache   Translate Page   Web Page Cache   
Posséder des compétences avérées en gestion de projets et être en mesure de réaliser de grands projets, de leur conception à leur mise en œuvre....
From The Home Depot - Thu, 09 Aug 2018 21:58:50 GMT - View all Ontario jobs
          Millions Of Smartphones From All Four Major Carriers Riddled With Exploits Asserts DHS-Funded Study      Cache   Translate Page   Web Page Cache   
Millions Of Smartphones From All Four Major Carriers Riddled With Exploits Asserts DHS-Funded Study Research funded by the United States Department of Homeland Security (DHS) indicates that potentially millions of smartphones have inherent security vulnerabilities. These security holes are built into the devices offered by all four major wireless carries in the US, including AT&T, Sprint, T-Mobile, and Verizon, though it is not clear if

          Some Edinburgh Fringe venues no better than sweatshops, report claims      Cache   Translate Page   Web Page Cache   
Front-of-house, box office and technical staff at the Edinburgh Festival Fringe are routinely exploited by employers and forced to work in unfair

          Comment on Missouri Voters Overwhelmingly Reject ‘Right To Work’ Law by James Pearce      Cache   Translate Page   Web Page Cache   
@<a href="#comment-2339973" rel="nofollow">Gustopher</a>: Guns and abortion are about as settled as policies can get. They're wedge issues used by lazy politicians to scare up votes, not real debates Americans are having. The debates are about magazine limits and pre-consultation literature, parental notification and background checks, and here's the thing those wedge-exploiting politicians don't want you to know: Reasonable people can disagree on that stuff. So there's no reason to allow wedge issues to be the Sorting Hat of American politics. None. Cui bono? Some politician on Election Day maybe, but not we citizens.
          This Orthodox Woman Started An Organization to Create Sex Abuse Free Spaces      Cache   Translate Page   Web Page Cache   
With the explosion of the #MeToo movement and the various allegations and court proceedings, sexual assault and abuse has skyrocketed to virtually all media headlines. Unfortunately, the Jewish community is no stranger to incidents of abuse. Rather than remain silent, Shira Berkovits has decided to make a difference, establishing Sacred Spaces, an organization dedicated to addressing abuses of power in Jewish institutions through “framing the issue in Jewish texts, speaking with board members to generate buy-in, and working with the community to raise awareness.” For a long time, stories of sexual assault were surfacing largely from the Catholic community, but as times and technologies have changed, the episodes of abuse and exploitation in the Jewish community have been brought to the forefront. “The reality is this is not a Catholic problem, this is not a Jewish problem, and this is not an Orthodox problem. It’s a human problem.” Although Judaism has many Halachot dedicated to prevent these abuses of power, no human being is perfect. Judaism, in an ideal world, should create intrinsically safe spaces as “Our culture, history, and traditions set us up for success. The values articulated in the Torah are ones which should make this work.” Yet these rules and concepts are not always observed and followed to the proper extent. As Berkovits encourages us to ask: “We have that blueprint, but the question is, are we following it?” Berkovits, who holds a PHD, JD, and is a proud and active Modern Orthodox Jew initially encountered this troubling subject matter while consulting for youth departments in New York. She found that as she dug deeper into the subject matter, few people had any practical information on the topic. She founded Sacred Spaces in 2016, creating an organization that works with various Jewish groups to establish proper policies and regulations in order to produce a safe,...

Continue Reading
          EDITORIAL COMMENT: Add value to resources for export market      Cache   Translate Page   Web Page Cache   
MANY Zimbabweans might not have been aware that the country has 13 million tonnes of proven gold reserves underneath of which only 580 tonnes have been exploited since 1980, making it a country with the second largest gold reserves per square kilometre in the world.
          Ending Africa’s digital exploitation      Cache   Translate Page   Web Page Cache   
Did you know that when Africans make international calls amongst themselves, the traffic they generate usually has to transit through a hub that is located outside their continent?
          Comment on Christianity’s Criminal History, 82 by Arch Stanton      Cache   Translate Page   Web Page Cache   
Just pointing out you have allies in high places. Don't know about this Ax fella, but the evidence is obvious, Jews hate Christians and their religion in the same manner they hate Europeans, after all they reserve a special place in their special hell for Jesus, roasting him in a vat of boiling excrement. Jews also slaughter non-European Christians in the same manner as they do Europeans. Then there are those child sacrifices where the crucify toddlers. <a href="http://www.stsimonoftrent.com/" rel="nofollow">link</a> <blockquote>Finally the torturers imitated the crucifixion by holding the twitching body upside down and the arms outstretched and during this horrible act they spoke the following: Take this, crucified Jesus. Just as our forefathers did once, so may all Christians by land and sea perish.</blockquote> If that ain't hate, I cannot imagine how the word might be defined. In fact your use of "X" in the word Christianity hearkens back to Stan Freberg's - 1958 <em>Green Christmas</em> line, "Just as sure as there's an X in Christmas." <a href="https://www.youtube.com/watch?v=I5IXlfJSEi4" rel="nofollow">link</a> It's Jews like Freberg that first introduced many young whites to their hatred and scorn for Christianity through the clever use of humor. Note too, how Freberg uses the Jews' crass commercialization of Christianity to discount the religion's foremost holiday. ________ And just to show you that we white guys can be as funny as any two-bit jew humorist, I wrote the following humor piece. Of course, I wouldn't dream of going as far as crucifying toddlers upside down while draining their blood. But with all the grim news coming out, I felt the need for some humor. To that end, I now present another episode of Arch Stanton’s – Theater of the Absurd. Today <b>The Son ‘O God. Our story opens on a bright, sunny day. Jesus has just parked his donkey and ran into the tent calling for his mother.</b> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ “Hi mom I‘m home! What for dinner?” “Is that you Jesus!” “Ya mom, I’m home from the Elysian Fields.” “Jesus you startled me! Your father is working late tonight so we’re having unleavened bread and hasty pudding.” “Aw Mom, not again! Can’t we have pork chops once in a while?” “Not unless you want to become a swineherd. I understand the Gadarines over by the lake have an apprentice program if you’re interested.” “I don’t think so. Besides how would I have time with my last semester of law at Elysian Fields and all? Say where is Pop anyways?” “He’s your <i>Father!</i> Last I saw, he was down in the garden pruning the tree of knowledge and talking with the lead gardener about those itinerant nomads he picked up in the desert last week. Why don’t you go down there and tell him dinner will be ready soon.” “Ok I’m on my way, we’ll be back soon.” “Don’t forget to close the tent flap!” <i>Close the tent flap, close the tent flap. God! How I wish she would quit mothering me. This all started when they left me back at the Temple with those scabrous, old, priests, Yuck! You’d have thought I had fallen off a cliff or something.</i> <b>So Jesus ran down to the Garden of Eden where he found his Father pruning the tree of knowledge.</b> “Mmmmm mmmmm – there, that should do it. These limbs were much too long and you know what they say, too much knowledge can lead to trouble.” “Hey Father!” “Jesus you startled me!” “Sorry Father!” “How about rattling some bushes next time to let me know you’re here.” “Will do daddy-O.” “I’m your <i>Father</i> and don’t you forget it!” “Picky, picky! Ok <i>Father,</i> what’s up with Satan anyway?” “That’s what I want to know. Lately I can’t seem to find him anywhere. Ever since I brought those two into my garden, he’s been hard to find. I think he’s playing footsie with that floozy, Eve. God! (that’s me) I don’t’ know why I don’t fire that snake in the tree. I’m not sure about that Adam fella, either. You know I told him to count the animals, instead he gave them names. “Aw Father, you can’t blame Satan. After all, outside her an’ Mom, women are scarce in the garden. Besides, Satan promised to take me to the chariot races this week.” “Jesus! She’s your <i>Mother!”</i> “Alright already! She’s my <i>Mother, Father</i> this, <i>Mother</i> that, sheesh! You'd think this place is an English class!” “I told you before, I don’t want you hanging around the tracks and I damn sure don’t want you hanging around Satan, he’s a bad influence. Next thing you know I’ll find you down at the Cheribum bar and grill making bets on what names Adam gave to the animals. Don’t think I don’t know what’s going on down there. I’ve heard the talk, ‘I’ll give you good odds he named it Platypus.” “But Father . . .” “No buts! You’re not going to the track, especially with that snake Satan.” “Aw gee . . .” “Come on Jesus, walk with me through the garden. I’m heading over to the tree of life, it needs trimming as well. Look here Jesus, after you finish your law degree you can do what ever you want because you’ll be able to defend yourself in court.” “Court? Gee dad I didn’t know there were any courts.” “There aren’t. I’m creating them next week.” “Gee that’s swell! Now I’ll be able to make a living.” “Right son. I don’t want you to be like that ner-do-well John the Baptist down at the river handing out free baths of forgiveness.” “Yeah, I guess you’re right. There isn’t much future in that career path.” “You’re damn right! He’ll never get ahead doing that kind of work. Remember I’m God and I hang up the phone if it doesn’t ring like a cash register. “Yeah, how could I forget? Hey, what’s this cash register thing anyway?” “You’ll find out in good time my boy, all in good time. Ahhhh here we are. Look why don’t you go look for Satan while I finish pruning the tree of life. These lifespans are entirely too long. I’ve decided to cut at least a millennium off the top. Trim it down to say no more than eighty or hundred years, max, ‘cept mebbe in special cases.” “Ok dad ~ er ~ <i>Fath-er.</i> Boy, sure glad I’m eternal.” “Count your blessings son, count your blessings.” <b>And so Jesus ran off to find Satan, who was at that moment pitching his best line to Eve.</b> “Say babe, would you look at the color of this fruit – and the texture . . . Mmmmmm, juicy! Why this must be the most delicious fruit in the garden. “It sure does look tasty Mr. Satan . . .” “Stan, call me Stan sweetheart, no need to stand on formalities in our secret garden.” “It sure does look good . . . Stan” “It is, good babe, IT IS GOOD! This is the fruit from the tree of knowledge. If you play your cards right, I think maybe we could arrange for you to get some brains.” “Brains?” “Brains! you know, The sum of the squares of the two legs of a right triangle is equal to the square of the hypotenuse.” “You mean - I might wile away the hours Conferrin’ with the powers Consultin’ with the priests And my head I’d be scratchin’ While my plots were busy hatchin’ If I only had a brain” “I could even go more further And say why there is murder And why the law is there” (Satan) “With these thoughts you’d be awed You could be another Gawd If you only had a brain” (Eve) “Oh, I would tell you frank Why there’s money in a bank Why there’s rich and poor. I could think of things I never thunk before And then I’d sit and think some more” “I would not be just a face With a head all full of lace My heart so proud and vain I would dance and be golden Life would be just Tikkun Olam If I only had a brain” “By George, I think she’s got it!” “So can I have a bite now . . . Stan?” “I might if, uh, you agree to some reciprocity.” “Reciprocity? What does that mean?” “See? That right there’s exactly why you need a brain. You’d be right as rain if you only had a brain. So how about we go over into the bushes and work something out” “Work something out? What do you mean ‘work something out?’” “Hmmm, maybe I’m taking this brain thing too far. Never mind sweetheart, let’s go into the bushes and we’ll talk about it.” <b>Jesus now comes walking down the path, humming to himself.</b> “A mighty fortress is our lord, with his amazing grace you can look life in the face . . . Hey! Izzat you Satan?” <b>Satan emerges from the bushes dusting himself off and adjusting his uraeus.</b> “Oh, it’s you Jesus. I thought you might be your Father.” “Well I am, sort of.” “Yeah kid I know, like Father like son. What do you want anyway?” “Pop ~ er ~ <i>Father</i> is looking for you.” “What does he want?” “How the hell should I know, he’s the Father. I’m only the son.” “Keep it up kid and you’ll wind up being a holy ghost.” “Are you threatening me Satan?” “Naw kid, it’s just a joke. Call me Stan kid, call me Stan.” “Ok Stan, I’ll go back and tell Father where you are.” “You do that boy, you do that.” “Uh, where are we anyway?” “Don’t you recognize the crossroad of righteousness and perdition?” “No . . .” “Well that’s where you be standin’, at the corner of righteousness and perdition.” “Say it’s late, you must be hungry, why not have a bite of this delicious fruit? It’s brain food, it’ll help with the law exams” “Don’t tempt me Satan, don’t tempt me. Mother is waiting at home with another dinner of unleavened bread and hasty pudding. Anything is better than that, ANYTHING!” “So have a bite kid.” “Naw, I’d better not. Mom would crucify me if she found out I ruined my dinner.” <b>In the meantime, not far away in the bushes,</b> “Oh Adam, Adam, it’s always been you. I’ve never loved the serpent.” “Yeah babe, sure. You know, I’ve heard it all before.” “Really? From whom?” “I’m not being literal Eve, I’m speaking metaphorically.” “Ahhhh yes, metaphorically: a figure of speech in which a word or phrase literally denoting one kind of object or idea is used in place of another to suggest a likeness or analogy between them (as in drowning in money). Here Adam, have a bite of this delicious fruit. It’s brain food you know.” “Eve! You know we’re not supposed eat of this fruit!” “Yeah I know, but Satan turned me on to a bite.” “Reaaaally?” “Yeah, you wouldn’t believe what I have learned already.” “Like what?” “Like we’re naked.” “What? You know the lord hath provided for us. Just look at these new sneakers he created ‘specially for me.” “Silly Billy. It’s like one of those metaphors you brought up earlier.” “Huh?” “Naked is a euphemism for “without wealth,” you know, poor. We got no gold dear even though this place is loaded with the good stuff.” “Euphemism?” “Here Adam, have a bite of fruit.” “Ok” (munch munch) “Wow! This is really good, crisp, tart and tangy with just a hint of mango. Euphemism: the substitution of an agreeable or inoffensive expression for one that may offend or suggest something unpleasant; also: the expression so substituted. You mean we’re broke?” “Exactly. You know that little apron the lord wears around his waist?” “Yeah, I was a wondering about that. . .” “Well that’s where he keeps his personal gold. It’s sort of a mark of distinction that can be easily covered if needed. So anyone wearing one of those aprons looks dignified and gets respect. Hey! You know we don’t get no respect.” “Respect? From whom?” “Silly Billy, this place won’t always be this empty you know.” “Yeah, I guess you’re right Eve. Here look at this, if I take a few of these large leaves and string them around my waist . . . Look ma! I’m loaded with wealth.” <b>Just then a loud voice is heard nearby.</b> “Adam! Adam! Where the hell are you, Adam!” <b>And in a hushed whisper –</b> “Eve! It’s the Lord of the Garden, we gotta’ get out of here!” “There’s no place to run Adam. Let’s just go out and act innocent.” “Are you crazy if he thinks . . .” “Thinks? What is there to think? He knows we’re an item so, what’s the problem?” “Yeah, I guess you’re right.” <b>So Adam and Eve stumbled from the bushes, Eve plucking grass out of her hair and Adam brushing off his clothes as the Lord speaks:</b> “Adam! Eve! Where the hell have you two been! We’ve been looking for you everywhere!” “Well it looks like you finally found us. What can I do for milord?” “The first thing you can do is explain why you’re wearing that apron!” “Apron what apr . . . oh this old thing, just something I picked up in the bushes.” “Reaaaallly! Do you think I was born yesterday!? I’M ETERNAL AND OMNISCIENT.” “Well, you couldn’t find me in the . . .” “SILENCE! You are wearing an apron. That means you know about wealth and what it signifies. You cannot lie you must have eaten fruit from the tree of knowledge to know these things! Besides, you have the fruit juice of knowledge dribbling down your chin. You shall pay dearly for this transgression and who gave you the idea anyways?” “It was that slut Eve milord! I was minding my own business naming Drosophila melanogaster “fruit fly” when up walks Eve with this piece of fruit and offers me a bite. . .” “SILENCE! And you wench, you ungrateful shiksa slut, what have you got to say for yourself!?” “Milord, if you please, it was Stan, uh, Satan that is, who enticed me to eat of the fruit. I didn’t want it, but he said it would give me a brain and what woman can resist such an offer?” <b>The Lord turned to his head gardener, casting a jaundiced eye at the miscreant.</b> “And what have you got to say for yourself head gardener?” “I was just helping out the poor and oppressed milord with charitable ways. Is it not up to the wealthy to provide welfare for these miserable wretches? Eve is so pretty, all she lacked was a brain because you failed to give her one. I felt it my civic duty to help her with her brain problem.” “SILENCE!” “You are the lowest form of life! You gave away my most guarded secret of wealth creation! You’re one snake that won’t be living in the trees anymore. I’m taking your stripes and busting you down to slave second class. I hereby condemn you to my gold mines where you shall spend the rest of your days crawling on your belly in the dust! How do you like them apples?” “But milord!” “NO BUTS!” “Now where the hell are those cherubim?” “Hey pop, er, I mean Father. What’s going on?” “Jesus! You startled me. Go find my Cherubim and tell them I need to make an arrest.” “But father don’t cherubim have eyes all over the body, shouldn’t they have seen this coming?” “Judging from the optometrist’s bill they must be myopic. They sure missed this one! Now get outta’ here and find a couple. Try looking down at the Cherubim Bar and Grill and stay away from the waitresses. I don’t care if they are goddesses, they’re not good enough for you.” “Sure thing Father.” “Now as for you two desert rats, you’re outta here! Outta’ my garden NOW!” “But . . .” “NO BUTS! Now that you have a brain you can understand my wealth and how I obtain it. You know about good and evil and how to use extortion to leverage money from the suckers, and that’s the real problem, you know what money is and what it represents. You know the truth about inflation and compound interest. I cannot trust you around the garden any longer because the next thing you know you’ll become jealous of my wealth and try to steal it from me. You desert nomads are all alike, turn your back for a moment and there goes the magic carpet right out of the tent flap.” <b>Jesus now approaches with two Cherubim guards.</b> “Hey dad, I mean Father, I brought the cherubim.” “Are they sober? You know how drunk they get on that<i>Power O' God 20/20.”</i> “I think so.” “How may we serve milord?” <b>Turning to the Cherubim, the Lord speaks:</b> “Take this snake and toss him into the mines where he shall crawl on his belly in the dust for the rest of eternity, or his life, whichever comes first. And as for these two, take them to the East Gate and throw them out on their ear! And take off that damn apron Adam; it looks silly on you besides you won’t be needing it where you’re going.” “Yes milord.” “And guards, be sure you use your light sabers to guard the entrance so they don’t try sneaking back in to sample the tree of life. I’m not running a welfare state here with free health care you know.” “Yes milord!” <b>“Turning to Adam and Eve, the Cherubim command:</b> “You two come with us.” “But . . .” “BUT NOTHING! I am a wrathful, judgmental God! I dish out the punishment around here so save it for the coyotes – BEGONE!” “Yes milord.” <b>As the two walk off with the cherubim guards, Jesus turns to his Father.</b> “Gosh Father aren’t you going kind of hard on them banishing them to a hardscrabble life of farming and pregnancy and all.” “It’ll be good for them my son. Some day they will thank me for this.” Approaching the East gate, Eve begins looking gloomy and downtrodden. <b>Just then one of the Cherubim barked. “Out, out you damn spots!” And so the two nomads returned once again to the desert dust from whence they sprang.</b> Heading out into the vast desert expanse surrounding the garden, Eve wailed, “Oh Adam, Adam, what are we going to do? We have nothing! Worse, we have no money, no job and no prospects. Oh what are we ever gonna’ do!?” “Relax Eve, don’t be a Silly Billy. You’re forgetting one thing, we now have brains. We know the difference between the gullible good and profitable evil. We will use evil to advance ourselves in this world. Just wait, we’ll move into a neighborhood somewhere and ingratiate ourselves with the natives to exploit and subjugate them with our knowledge. Soon we will have our own aprons richly embroidered with precious stones. You know babe the future looks bright now that we have brains. We will wile away the hours Conferrin’ with the powers Consultin’ with the priests And our heads we’ll be scratchin’ While our plots are busy hatchin’ Since we got a brain” “I can even go more further To say why we must murder And why the law is there” (Eve) “With these thoughts we are awed You know we’re now like Gawds Because we got a brain” “Oh, I can tell you quite frank Why there’s money in a bank And why there’s rich and poor. I can think of things I never thunk before And now I think I’ll sit and think some more” “We are not just pretty faces With aprons full of laces With hearts so proud and vain Life will now be so golden It will just be Tikkun Olam because we got our brains” ~ Finis ~ Today's Theater of the Absurd has been brought to you by Old Testament soap; the soap made from 100% pure Jewish fat. One shower will leave a neo-Nadzee saying, “This Old Testament soap gives the body a superior feeling!” Yes, a shower with Old Testament makes one feel Temple fresh! Why its better than a Mikveh!
          Comment on Elizabeth Agboola: Five Reasons You Should Consider Morocco as a Vacation Destination by damola      Cache   Translate Page   Web Page Cache   
My sister, nice right up. However, I would not encourage our people to make Morocco their holiday destination for 2 main reasons and I speak from experience. 1. When we go to Morocco, which I don't doubt is a picturesque destination, all we are doing is enriching Morocco's economy, as we will pay for hotel bills, transport, feeding etc. I would suggest we invest in our own Tourist infrastructure, Nigeria has so many places to offer and what is good is that we are investing the money in our local economy and elevating our own people out of poverty instead of Moroccans whom I respect also. 2. Morocco has a record of prejudice against people of Sub-Saharan African heritage en-route to Europe or those who have been stranded. We have records and first-hand experience of this, they are exploited, raped and kidnapped. I have included links below to show evidence and proof, I was involved in the relocation of Nigerians back from Morocco en-route to Cueta/Melila, I don't blame our people for wanting to leave for greener pastures, if you hear their tales it will sadden you, what is so worrying too was the attitude of the Moroccan officials we spoke to. I work with Europeans and I can tell you too that if they were faced with poverty, they too will emigrate, look at the history of the USA, Canada, White South Africa/ Australia for example, Nigeria is our home, look even the US is working on ways to reduce legal paperwork for Legal Immigrants. We now have no choice than to see our future in our own ancestral homeland, Nigeria. https://reliefweb.int/report/morocco/refugees-or-migrants-difficulties-west-africans-morocco https://www.vice.com/en_uk/article/dpww9x/are-moroccan-gangsters-being-paid-to-beat-up-african-migrants-803
          Driemast schoener, EUR 485.000,-      Cache   Translate Page   Web Page Cache   
Driemastzeilschoener "Amazone", dagcharter 125 passagiersbouwjaar1929werfVan Diepen, Waterhuizen (Groningen)lengteromp: 33,45m, totaal circa 42m (incl. kluiverboom en davit)breedteromp: 5,62m, totaal 6,06m (incl. zwaarden)passagiers125prijs:485.000,- euro excl. btwDe Amazone is (als Amazone II) gebouwd als zeilend zeegaand vrachtschip voor met name de vaart op de Oostzee (zgn. Wad- en Sontvaarder).Scheepswerf Van Diepen hanteerde een standaardbestek waarmee zij de markt opging om opdrachtgevers te vinden.Opdrachtgevers pasten het bestek naar hun wensen aan (beetje langer/korter of breder) maar de grondvorm bleef behouden. Veel schepen op basis van dit bestek (zoals ook de Amazone) zijn gebouwd voor Duitse rekening.De schepen worden wel aangeduid als "Von Diepen Schiffe". Verschillende varen er in Nederland nog rond zoalsbijvoorbeeld de "Willem Barentz" (dagtochtenschip Enkhuizen), de "Jutland" (eigendom directeur Maritiem Museum Rotterdam) en de"Emma", voorheen tagrijnschip te Lelystad, nu luxe varend woonschip met behoud van historisch uiterlijk (thuishaven: Veerhaven Rotterdam).De Amazone is al vroeg in haar loopbaan met enkele meters verlengd om economisch beter te kunnen opereren.In 1994 is de Amazone opnieuw opgebouwd en getransformeerd tot luxe charterschip voor dagtochten met 125 passagiers.Sindsdien zeer goed onderhouden met vele vernieuwingen, aanpassingen aan nieuwe eisen etc.Communitair certificaat zonder overgangsbepalingen.Bars:2, toiletten: 5, douches(bemanning): 2, whirlpool: 1, slaapplaatsen(bemanning): 7, waterdichte schotten: 5, agregaten:2, boegschroef etc.De Amazone heeft een unieke ligplaats in centrum Rotterdam aan de rivier met uitzicht op de Erasmusbrug.Geschikt om direct op te gaan wonen met een zee van ruimte en/of te gaan exploiteren voor rondvaarten, varend restaurant, atelier etc.Indeling van voor naar achtervoorpiek:boegschroef, aggregaat in silent box, dieseltank, koelunit bier, opslag.voordek:electrische ankerlier (380v)ruim voor:lounge met bibliotheek, stores met koelkasten, vriezer, aansluiting bierfusten. ruim midden:kombuis, garderobe, buffetopstelling.ruim achter:grote lounge, bar.dek boven ruim:deksalon met ruim uitzicht naar buiten en bar, zitkuipjes buiten.bemanningsgedeelte:2 hutten ieder met douchehierboven:deklounge (2 zitjes) en 4 toiletten.machinekamer:hoofdmotor, aggregaat, hydrofoors, c.v., dieseltanks.hierboven:ruime woning met keukentje, 2-pers. bed, bureau, zitje en badkamer (whirlpool, toilet),intern trap naar stuurhut.achterpiek:opslaghierboven:stuurhutZeilen:vliegerbuitenkluiverbinnenkluiverfokschoenerzeil (stagzeil)grootzeil (gaffelzeil)bezaan (gaffelzeil)Techniek:hoofdmotorCaterpillar 3406 DIT, 305 pk., 1999 nieuw ingebouwd, weinig draai-uren.keerkoppelingTwin-disk MG 5114, 1999.hulpmotor1Vetus-Bosman S4E 25 Kva, motor Mitsubishi in silent boxhulpmotor2Vetus-Bosman K4E 12,5 Kva, motor Mitsubishi in silent boxboegschroefrooster boegschroef 360 graden BallegooyboegschroefmotorDaf 1165, 230 pkankerlierelectrisch 380vhydrofoors1X zoetwater + 1x buitenwater (toiletten)toiletten4X op vuilwatertank, 1x met sanybrouyeur directe afvoer.marifoons2X Debeg (Sailor)kompas1magnetisch kompaskompas2electro magnetisch kompas Euro 345 (Radio Zeeland)centrale verwarmingdoor gehele schip, ACV ketel + Elco brander in Mach. kameromroep/intercomdoor gehele schip, centrale in stuurhutbrandmeldingcentrale in stuurhutbrandblussers10x poederblusser, 3x Co2 blusser.brandbluspompbrandslang aan te sluiten op lenspomp + losse motorbrandbluspomp (benzine)bijbootSecu 12 in davit achterschipwalaansluitingnaar keuze 220v of 380vlenspomp380v met lensverdeelblok conform eisen, tevens dekwas en brandbluspomp.radarDecca R1216AAISComnav Voyager X3electraboordnet 220v, div. aansluitpunten 380v en 12vnoodverlichtingdoor gehele schip, voeding met afzonderlijke accu's aan dekreddingsmiddelen140 reddingsvesten, 15 reddingsvlotten, bijboot.tanksdieselmachk. 2x circa 2500 litervoorpiek circa 500 literdrinkwater2 tanks, totaal circa 6000 litervuilwatercirca 4000 literacculadersautomaat op 24v accu's noodstroomautomaat op startaccu's hoofdmotorKeuken3 wasbakken, 6 pits gas, oven, vaatwasser, magnetron, frituur, koffiezetapp, afzuig.Koelingin stores 2x grote koelkast + 1x grote vriezerin bemanningshutten 1x koelkast (koel/vries) + 1x vrieskist.in woning klein koelkastje (koel/vries)CertificaatCertif. v. onderz.Communitair certificaat 125 passagiers dag, zone 2-zout, geldig tot 18/2/2019geen overgangsbepalingen.
          ✌ ISC Releases Security Advisory for BIND | US-CERT      Cache   Translate Page   Web Page Cache   
✌ ISC Releases Security Advisory for BIND | US-CERT:

The Internet Systems Consortium (ISC) has released a security advisory that addresses a vulnerability affecting multiple versions of ISC Berkeley Internet Name Domain (BIND). A remote attacker could exploit this vulnerability to cause a denial-of-service condition.NCCIC encourages users and administrators to review the ISC Knowledge Base Article AA-01639 and apply the


          Hardship Is Not A Competition: Supporting Our Farmers Doesn’t Mean We Can’t Support Our Neighbours      Cache   Translate Page   Web Page Cache   

With all of NSW now drought declared, and other states fast heading in the same direction, calls for more support for farmers is welcome. But slashing spending to help neighbours we’ve abused for decades is not the way to get there, writes Hayley McQuire.

I support Australian Farmers. What I don’t agree with is the constant argument about “Why are we giving so much in foreign aid yet not supporting our farmers?”

This is a common theme that arises whenever there are a group of Australians in crisis.

“Why are we giving so much in foreign aid while there are so many homeless? Why are we giving so much in foreign aid while our old people are on a horrible pension? Why are we giving so much in foreign aid when Aboriginal and Torres Strait Islander People…..”

Okay, admittedly, it doesn’t seem to appear when First Peoples are in crisis. But for the record, the majority of our Foreign Aid budget is spent with our neighbours in the Asia Pacific.

Let’s keep in mind our history with countries in this region.

A large amount of our aid goes to our closest neighbour Papua New Guinea, with $546.3m allocated in the 2017-2018 budget.

The Kokoda Trail in Papua New Guinea. (IMAGE: Drew Douglas, Flickr)

Every ANZAC Day we celebrate our partnership with Papua New Guinea and how they saved our arse on the Kokoda Track. However, we conveniently forget the fact that PNG was under Australia’s colonial rule as one of our territory’s up until 1972. We conveniently forget how Australia has exploited PNG for their natural resources (here’s looking at you Rio Tinto Bougainville Copper Mine).

Australia also gives aid to other Pacific countries like Vanuatu ($69.8m in 2017-2018) and Solomon Islands ($146m in 2017-2018).

So, I guess some are forgetting the time Australia STOLE people from their homes and forced them into indentured labour and built an entire sugar industry off the back of black bodies.

I sho...


          Le poète du marbre      Cache   Translate Page   Web Page Cache   
886325632-1.JPG
Sur les hauts de Marina di Carrare, en Toscane, à l’aplomb des falaises de marbre, se déploie un val suspendu où foisonnent des centaines de sculptures, parfois monumentales, toutes de la main de Mario del Sarto, surnommé le «poète du marbre». Héritier des ouvriers exploités, dits spartani, parfois affiliés au mouvement anarchiste, l'artiste brut est plus connu des «routards» du monde entier que de ses concitoyens…

Un fabuleux Musée de l’art brut, à Lausanne, dont la première collection fut celle de Jean Dubuffet, qui la légua à notre bonne ville, réunit les productions les plus étonnantes de ce qu’on a longtemps appelé «l’art des fous», à proximité de l’art naïf et de l’art populaire, qu’on a reclassé dans la catégorie particulière d’un art non intégré à la «culture» au sens conventionnel ou institutionnel du terme.

Aloyse.JPG

Dans l’esprit de Dubuffet, Michel Thévoz, premier directeur du musée lausannois (de 1976 à 2001), a codifié plus précisément les critères définissant, non sans ambiguïtés parfois, ceux-là qu’on peut qualifier d’artistes bruts. Or il me semble que Mario del Sarto participe de cette tribu créatrice, avec cela de particulier qu’il a le savoir-faire d’un artisan-artiste de métier et l’intelligence équilibrée d’un autodidacte cultivé.

 2030789264.JPG

 

 

Cela étant, les œuvres de ce sculpteur, descendant des spartani de Carrare, ne sauraient être intégrées dans un musée. Solidement implantées au lieu même où elles ont été taillées, elles constituent, dans un val des hauts de la cité toscane de Marina di Carrare, un ensemble monumental de plus de cinq cents pièces où s’activait encore le sculpteur octogénaire quand nous l’avons rencontré pour la première fois. 102153793.JPG

Plus précisément, lorsque nous nous sommes pointés, avec des amis établis à Marina di Carrare le tenant en haute estime, à l’aplomb des grandes carrières de Carrare, dans le vallon verdoyant où se déploient ses centaines de sculptures, bas-reliefs, bustes, têtes et autres frises et fontaines, Mario del Sarto, en tablier bleu, était en train de sculpter un énorme bloc de marbre quadrangulaire qu’il ornait de scènes en bas-relief évoquant l’histoire des carrières et la destinée particulière des spartani1547513328.JPG

Mais qui sont plus précisément les spartani, dont le nom évoque le dépouillement et l’humilité précisément «spartiates». Ce sont ces ouvriers des carrières de marbre, exploités par les propriétaires de celles-ci, qui passaient, au début du siècle passé, leur temps libre à tailler des «chutes» de marbre qu’ils revendaient ensuite pour survivre. Dans ce milieu s’est d’ailleurs développé un foyer de l’anarchisme italien dont on peut retrouver des traces dans les archives, parfois «gravées dans le marbre», du minuscule village surplombant de Colonnata, par ailleurs fameux pour son lard blanc. Le site s’atteint par l’ancien chemin des carriers, longeant à un moment donné le jardin magique de Mario del Sarto. D’innombrables visiteurs du monde entier ont laissé leur griffe sur le livre d’or de celui-ci, pas vraiment reconnu en revanche par ses plus proches concitoyens...

603867063.JPG

Parce que «travailler repose»...

Mario del Sarto lui-même, natif des lieux, connaît parfaitement l’histoire des spartani. Son père et les siens faisaient paître jadis leurs moutons dans les hauteurs avoisinantes; avec ses frères et sœurs, il parcourait en son enfance la longue marche à pied jusqu’à Carrare, mais à quinze ans déjà il a quitté l’école et des années durant il a travaillé dans les carrières où il devint, notamment, machiniste d’un chemin de fer vertigineux de là-haut. «Tout vient de la terre, me dit-il en évoquant son travail de ces années, pour aller vers le ciel et revenir à la terre». 

3812116627.JPG

L’homme a la modestie des humbles, mais aussi la sûreté de soi de l’artisan se mesurant aux solides matières,  la naïveté de l’artiste sans prétention sociale et la douce folie du terrien sage et sauvage. 

 

790373020.JPG

Lors de notre première visite, quand je lui ai dit ma surprise de voir tant de sculptures de tous côtés, sur les flancs de la colline, parfois taillées dans le calcaire de surface, ou dans son vaste atelier dont une grande partie reste en plein air, Mario m’a répondu qu’un artiste ne pouvait faire que créer sans discontinuer puisque telle est sa vocation; et d’ailleurs «lavorare riposa», travailler repose, est sa devise, qu’il a inscrite au fronton de son atelier. Sur quoi, voyant mon intérêt vif pour ses oeuvres, il est allé chercher un morceau de marbre qu’il a commencé de façonner, au moyen d’une petite meule et d’un ciseau, pour lui donner la forme d’une figure au profil évoquant celles des îles de Pâques…

Or tout de suite j’ai perçu, chez ce grand vieillard de 85 ans au beau visage et aux mains très fines, une qualité de rayonnement, de présence et d’attention, de précision dans le langage et de poésie dans l’expression, qui faisaient bel et bien de lui un artiste.  

Un artiste «brut» qui cite Dante par cœur…

En outre il y a aussi, en version naïve, du philosophe et même de l’apôtre en Mario, et c’est là peut-être qu’il rejoint les artistes bruts, avec des œuvres symboliques ou allégoriques aux visées édifiantes. L’une de ses fresques raconte ainsi les méfaits du sport de masse, à propos d’un match de foot meurtrier en Angleterre.

1605675559.JPG

Non sans candeur, Mario m’explique alors que, tout admirables qu’ils aient été dans leur art, les Grecs anciens et Michel-Ange, imbattables dans la finition de tel corps d’éphèbe ou de tel visage de vierge, ne délivraient pas pour autant de messages, alors que lui s’y emploie; et de m’entraîner vers la grande figure grandeur nature du devin Aronta, qui se réfugia dans une grotte des hauts de Carrare et que Dante évoque dans le chapitre XX de L'Enfer de sa Divine comédieoù l’on trouve les mages et devins qui «marchent à l’envers»; et le sculpteur de réciter par cœur «Aronta è quel ch’al ventre li s’atterga,/che ne’ monti di Luni, dove ronca/lo Carrarese, che di sotto alberga, /ebbe tra bianchi marmi la spelonca/per sua dimora; onde a guardar le stelle/e’l mar non li era la veduta tronca», etc.

Tel étant le message de Dante selon Mario del Sarto: «Le devant d’Aronta, Dante l’a placé derrière, et c’est pourquoi je l’ai sculpté comme ça»...

2420413760.jpg

Et pour les mains immenses qu’il a taillées au bout des bras de sa Mère Teresa, Mario del Sarto conclut: «Ce sont les mains du Don, les mains de la Compassion…» 

571228397.JPG

Enfin ajoutons que, s’il n’a jamais rêvé de gloriole personnelle, Mario del Sarto a fait maintes démarches, vaines au moment de notre dernière rencontre, en sorte de hisser son immense Spartano au sommet d’un pic voisin d’où il dominerait toute la région, visible jusqu’à la ville de Carrare. 

Tel serait l’hommage, qui lui survivrait, aux humbles ouvriers tailleurs de pierre dont il est le poète…


  3622104976.jpg

Le Spartano, statue d'environ quatre mètres de hauteur, destinée à se trouver juchée sur un pic dominant la vallée à l'aplomb des carrières du Canal Grande et des Campanili, au-dessus de Carrare. 

 

 

          Lawsuit filed against new government asylum rules      Cache   Translate Page   Web Page Cache   

Washington D.C., Aug 9, 2018 / 05:30 pm (CNA).- Immigration activists have made a legal challenge to the government’s criteria for migrants seeking asylum on Tuesday, saying that the grounds outlined were too narrow and should be expanded.

The American Civil Liberties Union (ACLU) and the Center for Gender & Refugee Studies filed suit on behalf of a dozen individuals who say they left their home countries after experiencing “horrific persecution,” including the murder of family members. These people were denied asylum in the United States.

The lead plaintiff, identified only as “Grace,” is a native of Guatemala who says she came to the United States after two decades of physical and sexual abuse by her husband. “Grace” faces the possibility of deportation back to Guatemala, where her lawyers say her life is at risk.

Previously, a person could claim fear of gang violence or domestic abuse as a reason why they should be granted asylum into the United States. In June, Attorney General Jeff Sessions released a new policy, stating that these factors “generally” do not constitute a suitable reason.

In a June 11 decision by the attorney general relating to a particular case referred to as A-B-, he ruled that “generally, claims by aliens pertaining to domestic violence or gang violence perpetrated by non-governmental actors will not qualify for asylum.”

While Sessions said that he did not “minimize the vile abuse” that particular woman had endured, “the mere fact that a country may have problems effectively policing certain crimes—such as domestic violence or gang violence—or that certain populations are more likely to be victims of crime, cannot itself establish an asylum claim.”

Catholics have spoken out strongly against the new policy.

At the U.S. Conference of Catholic Bishops’ general assembly in June, USCCB President Cardinal Daniel DiNardo of Galveston-Houston condemned the new policy in his opening address to the bishops.

DiNardo said that the policy would risk the lives of women, and that “unless overturned, the decision will erode the capacity of asylum to save lives, particularly in cases that involve asylum seekers who are persecuted by private actors.”

The ACLU argues that the updated policy is an “attempt to subvert decades of settled asylum law” and is a “fundamental misunderstanding of domestic violence.” The plaintiffs are arguing that the new policy effectively restricts asylum claims to those fleeing persecution either by the government, or that the government actively condoned the persecution.

This, they argue, goes against the established legal standard that the local government merely be “unwilling or unable” to offer protection.

In May, administration officials said that individuals and people-smuggling organizations were exaggerating the threat of violence they faced in an effort to exploit the system and gain entry to the United States.

Sessions said that the June changes would restore "sound principles of asylum and long-standing principles of immigration law."

Under immigration law, a person seeking asylum must prove that they are subject to persecution in their home country due to their race, nationality, religious beliefs, political views, or membership in a certain social group. Over time, the definition of “certain social group” has been expanded to include women who are fleeing domestic violence in countries where there are few legal avenues for a woman to prosecute or even escape her abuser.

Over the past year, the number of people seeking asylum who fail the first step, known as the “credible fear screening,” has increased. People who fail the credible fear screening are subject deportation back to their country of origin.

The case will be heard by the United States District Court for the District of Columbia.


          Titre Associé aux Ventes Sans-Fil - Beauport, QC - OSL Retail Services Inc - Beauport, QC      Cache   Translate Page   Web Page Cache   
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Fri, 13 Jul 2018 07:19:00 GMT - View all Beauport, QC jobs
          Titre Associé aux Ventes Sans-Fil - Thetford Mines, QC - OSL Retail Services Inc - Thetford Mines, QC      Cache   Translate Page   Web Page Cache   
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Mon, 25 Jun 2018 07:21:00 GMT - View all Thetford Mines, QC jobs
          Titre Associé aux Ventes Sans-Fil - Blainville - OSL Retail Services Inc - Blainville, QC      Cache   Translate Page   Web Page Cache   
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Fri, 03 Aug 2018 19:22:03 GMT - View all Blainville, QC jobs
          Titre Associé aux Ventes Sans-Fil - Laval - OSL Retail Services Inc - Laval, QC      Cache   Translate Page   Web Page Cache   
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Wed, 08 Aug 2018 19:24:54 GMT - View all Laval, QC jobs
          Titre Associé aux Ventes Sans-Fil - OSL Retail Services Inc - Longueuil, QC      Cache   Translate Page   Web Page Cache   
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Thu, 02 Aug 2018 19:23:52 GMT - View all Longueuil, QC jobs
          It looks like T-Mobile’s TV service could be about to launch      Cache   Translate Page   Web Page Cache   
Late last year, T-Mobile acquired a small pay TV company called Layer3, which offers a cable-esque TV service in a handful of markets around the US. At the time,  T-Mobile debuted the acquisition in its usual splashy way, saying that “we’re gonna fix the pain points and bring real choice to consumers across the country,” with some vague plan to have a cheap service with 250 channels. Since last December, T-Mobile's focus has shifted to pushing through its merger with Sprint, and we haven't heard much about its TV plans. But all that could be about to change, as the company is now teasing another Un-carrier event on August 15th, and references to a TV service have popped up on the website. Yesterday, T-Mobile CEO John Legere tweeted a 30-second teaser video showing him boxing up another carrier 'relic,' to go alongside things like limited data plans and, uh, taxes and fees. https://twitter.com/JohnLegere/status/1027178015485116418 A couple other leaks have been spotted that make us think the event on August 15th might have something to do with TV. Ads for Layer3's existing TV service -- which is around $90 a month for a cable-esque bundle, including a set-top box that you hook up to your home internet -- are displaying for some users on T-Mobile's website, depending on your location. A job posting from T-Mobile's website also shows the company is staffing up its engineering team for a TV expansion:
This fast-paced group is seeking self-motivated, go getter Software Embedded Engineers who will be responsible for creating Linux-based operating systems and embedded video applications that power Layer3 TV's next-generation cable service. This individual will be developing the firmware on our consumer Set-Top-Box (STB) and these systems and applications exploit the tremendous potential of our remote controls and users' own mobile devices. Day to day responsibilities would include (not limited to) performing Root-causing production issues with the set-top-box and bug fixing, implementing new product features and maintaining the set-top-box operating system, platform, and video stack.
None of this means that T-Mobile is poised to launch a new TV service next week, but with a launch promised "some time in 2018," it does seem possible.
          Police Are Acquiring Surveillance Tech in Secret      Cache   Translate Page   Web Page Cache   
A California bill would give the public a say and require more transparency from law enforcement.

Recent stories about Amazon’s invasive face scanning surveillance technology and Cambridge Analytica’s exploitation of Facebook data have brought the impact of surveillance and data misuse to the fore. But many people don’t realize how often local law enforcement agencies acquire and use similar technologies in their own communities. A groundbreaking bill pending in California would bring this day-to-day local surveillance out of the shadows and give communities a way to fight back against surveillance systems that are disproportionately aimed at immigrants and people of color.

The bill, SB 1186, requires greater transparency and public oversight when law enforcement agencies seek to acquire surveillance technologies that collect sensitive location or other personal data. It builds on a workable model that several California localities have already enacted.

Right now, a key California legislative committee holds the power to advance the bill, which is supported by a broad coalition of California civil rights and civil liberties organizations. In this political climate, it’s a necessary tool for protecting immigrants and other vulnerable residents from surveillance systems that are readily exploitable by the federal government.

The bill requires local law enforcement to get the approval of elected local representatives before acquiring surveillance technology. Before that vote, law enforcement agencies like police departments, sheriffs, and district attorneys must propose a set of written rules that explain their plans for the technology as wells as limits on its use and collection and sharing of data. Next, residents get a chance to weigh in on these rules and the proposal at a public meeting. If a city council or board of supervisors doesn’t approve a proposal, law enforcement cannot acquire or use that technology.

As surveillance technology becomes more powerful and easily available, California needs this bill now more than ever — and hopefully other states will follow its lead. Often bankrolled by federal funds, technologies like automatic license plate readers, drones, and social media surveillance systems have invaded our communities without our knowledge or input. These technologies collect information about our whereabouts and other sensitive details about our lives, and they are frequently turned on local activists.

Warrantless surveillance not only feeds databases that can be abused, it leads to real-world harms that disproportionately affect immigrants, people of color, and Muslim-Americans. Many law enforcement agencies have used social media monitoring products advertised as tools to track activists of color. For example, San Jose police used it to spy on protesters during a visit by India’s prime minister. The L.A. County Sheriff’s Department monitored the residents of Compton using high-powered aerial surveillance. San Francisco police stopped and held an elderly Black woman at gunpoint — all because an automatic license plate reader improperly identified her car as a stolen vehicle. Elsewhere, police have used that same technology to monitor mosque visitors.

Federal immigration authorities are increasingly seeking to exploit these local surveillance systems, often without local knowledge. Earlier this year, for example, news broke that U.S. Immigration and Customs Enforcement had obtained access to a database operated by a company called Vigilant, which hosts license plate location data collected by local law enforcement agencies across the United States.

The ACLU of Northern California has sued to learn more about this arrangement, and some California communities have stood up and rejected this company’s technology. However, these systems continue to prowl cities and rural areas, collecting data about immigrants while they’re driving to work, running errands, or bringing their kids to school. ICE should not be able to exploit this data to target and separate families. SB 1186 gives communities statewide a way to ensure that local law enforcement is not facilitating practices like this.

Communities such as Santa Clara County, Oakland, Davis, and Berkeley have already passed ordinances that require law enforcement agencies to be transparent about surveillance proposals, submit those proposals to a vote by elected leaders, and write strict rules for how the technologies can be used. SB 1186 — which would be the first statewide law of its kind — would ensure that all Californians can benefit from these important reforms. Community voices must be heard if surveillance proposals are on the table.

This bill is a piece of a larger movement. Localities across the country are taking part in a national campaign called Community Control Over Police Surveillance (CCOPS), a reform effort spearheaded by 17 organizations, including the ACLU, aimed at putting local residents and elected officials in charge of decisions about surveillance technology. To date, local CCOPS efforts have sprouted up in more than 20 cities, including New York and St. Louis.

After passing through the California Senate, the California Assembly Appropriations Committee will decide this bill’s fate in the next week. If you live in California, contact your state assembly representative and encourage them to support SB 1186 across the finish line.

This will not be an easy fight. Law enforcement agencies strongly oppose this bill’s transparency and oversight mechanisms. But public safety in the digital era requires that elected representatives and community members have a voice in important decisions like these.


          Spécialiste junior, administration, gestion de l’exploitation et des propriétés (ISTM) - CBC/Radio-Canada - Montréal, QC      Cache   Translate Page   Web Page Cache   
Spécialiste junior, administration, gestion de l’exploitation et des propriétés (ISTM) - MON05121 Famille d'emplois Immobilier Emplacement principal Montréal...
From CBC/Radio-Canada - Thu, 02 Aug 2018 22:34:55 GMT - View all Montréal, QC jobs
          Chef de boutique adjoint - Promenades St-Bruno - Bath & Body Works - Saint-Bruno-de-Montarville, QC      Cache   Translate Page   Web Page Cache   
Le r le de la chef de boutique adjointe consiste soutenir la chef de boutique dans la direction de l'exploitation de la boutique pour assurer un service la...
From L Brands - Thu, 14 Jun 2018 10:52:45 GMT - View all Saint-Bruno-de-Montarville, QC jobs
          Chef de boutique adjoint - Les Quartier 10/30 - Bath & Body Works - Brossard, QC      Cache   Translate Page   Web Page Cache   
Le r le de la chef de boutique adjointe consiste soutenir la chef de boutique dans la direction de l'exploitation de la boutique pour assurer un service la...
From L Brands - Mon, 23 Jul 2018 18:20:05 GMT - View all Brossard, QC jobs
          National Consultant - Justice for Children at UNICEF      Cache   Translate Page   Web Page Cache   
The United Nations Children's Fund (UNICEF) - For 70 years, UNICEF has been working on the ground in 190 countries and territories to promote children's survival, protection and development. The world's largest provider of vaccines for developing countries, UNICEF supports child health and nutrition, good water and sanitation, quality basic education for all boys and girls, and the protection of children from violence, exploitation, and AIDS. UNICEF is funded entirely by the voluntary contributions of individuals, businesses, foundations and governments. If you are a committed, creative professional and are passionate about making a lasting difference for children, the world's leading children's rights organization would like to hear from you.Job Number: 515302 Locations: Abuja? Nigeria Work Type: Consultancy Duration: 6 months Purpose of Assignment Under the guidance of Chief of Child Protection and direct supervision of the End Violence Against Children/System Strengthening manager, the consultant will contribute to the implementation of UNICEF Nigeria Justice for Children programme and 2018-2019 Rolling Work Plan. Tasks Provide technical support to amend the CRL and for the enactment of secondary legislation to the CRL for Lagos, Cross River and Plateau Advocate for the adoption of police guidelines and SOPs at Federal and state levels (Cross River, Gombe, Lagos and Plateau) Provide technical assistance and advocacy for the development of prosecution guidelines Federal and state level (Cross River, Lagos and Plateau) Provide technical assistance for the development of legal aid guidelines for children in contact with the law at Federal and state levels (Cross River, Lagos and Plateau) Provide technical assistance for the development of Family Court Rules at Federal and state levels (Cross River, Lagos and Plateau) Provide technical assistance to strengthen capacity of prosecutors at Federal and state levels (Cross River, Gombe, Lagos and Plateau) Provide technical assistance to strengthen capacity of legal aid providers at Federal and state levels (Cross River, Gombe, Lagos and Plateau) Provide technical assistance to strengthen capacity of the judiciary Deliverables First month deliverables: Consultancy work plan and August plan developed Signature of institutional contract for the strengthening of legal frameworks High level advocacy conducted with Police Inspector General for adoption of SOP and harmonized guidelines NPF bidding process for renovation of police units finalized TOR developed and DCT processed for Lagos legal aid programme Advocacy conducted for adoption of prosecution guidelines conducted in 1 state Monitoring visit report submitted Monthly report submitted and September work plan Second month deliverables: Advocacy conducted for adoption of legal aid guidelines in 1 state NPF renovation of police units work monitored by UNICEF quality assurance team Consultations on Child Protection regulations conducted in Lagos and Cross River Consultations on family court rules held in Lagos and Cross River ToT on legal aid completed in Abuja Family court personnel trained on adjudication of children's cases in Plateau Monitoring visit report submitted Monthly report submitted and October work plan Third month deliverables: Working tools printed and delivered to focus states Training on legal aid conducted in Lagos and Cross River Draft family court rules submitted to chief judge for approval in 1 state Monitoring visit report submitted Monthly report submitted and November work plan Forth month deliverables: Consultations on Child Protection regulations held in Plateau Family court personnel trained on adjudication of children's cases in Cross River Monitoring visit report submitted Monthly report submitted and December work plan Fifth month deliverables: Training for prosecutors in Lagos and Plateau conducted Training for legal aid providers in Gombe and Plateau conducted Documentation of diversion programme initiated Monitoring visit report submitted Sixth month deliverable: Family court personnel trained on adjudication of children's cases in Lagos Assessment report on pilot of police SOPs and harmonized guidelines for specialized units and recommendations by January 2018 Final consultancy report by January 2018 Qualifications or Specialized Knowledge/Experience Required University degree in Law (Masters or equivalent level) Five years experience of relevant professional work experience on child rights, child protection and justice for children Good knowledge of international standards related to justice for children Experience of project management experience supporting government to apply international standards in the justice sector Excellent planning and organizational skills Excellent communication and advocacy skills - both oral and written Familiarity with the systems strengthening approach to child protection Experience working with UNICEF is considered and asset
          National Consultant on Health Sector Response to Violence Against Children at UNICEF      Cache   Translate Page   Web Page Cache   
The United Nations Children's Fund (UNICEF) - For 70 years, UNICEF has been working on the ground in 190 countries and territories to promote children's survival, protection and development. The world's largest provider of vaccines for developing countries, UNICEF supports child health and nutrition, good water and sanitation, quality basic education for all boys and girls, and the protection of children from violence, exploitation, and AIDS. UNICEF is funded entirely by the voluntary contributions of individuals, businesses, foundations and governments. If you are a committed, creative professional and are passionate about making a lasting difference for children, the world's leading children's rights organization would like to hear from you.Job Number: 515314 Location: Abuja Work Type: Consultancy The duration of this consultancy: 6 months Purpose of Assignment Under the overall guidance of the Child Protection Chief, the national consultant will contribute to the design and integration of child protection programme on ending violence against children in the Health setting to existing health Programmes, Polices and guideline to contribute to the prevention and response of violence against children in the health sector. Background Children have a right to be free from all forms of abuse, violence, exploitation and neglect. In recent years, the global community has increasingly recognized that (i) the number of children experiencing abuse, violence, exploitation and neglect is significant, and is rising in some areas (ii) efforts to address child protection issues have been poorly coordinated and resourced, with a focus on stand-alone/single issue based projects (such as on sexual exploitation, child trafficking, street children, child labour etc. with limited sustainability; and (iii) children face multiple risks - abuse can be combined with exploitation and/or abandonment, for example, yet many programs are designed to address a single risk. To corroborate this, the findings of the 2014 VAC Survey highlighted shocking statistics on the various forms of violence children face in Nigeria. Key highlights indicate that before the age of 18 years, 6 out 10 children experience some form of violence; 1 in 4 girls and 1 in 10 boys experience sexual violence and majority of the children reported multiple incidents. The survey further reveals that children are not speaking out or seeking or receiving services. i.e. less than 6% of children who experience sexual or physical violence sought help and less that 5% of those who sought help receive help. These Statistics indicated that very few children knew where to seek help after suffering violence (15.6% of girls and 26.1% of boys who experienced sexual abuse in the last 12 months) and a low percentage of children reported their experiences (5.2% girls and 3.4 boys). It is also distressing to note that out of the few children that reported only 4.2% girls and 3.4% boys received any help. Violence Against Children including physical, emotional and sexual abuse, including sexual assault or rape of children and adolescents is a major global public health problem, a violation of human rights and has many health consequences in the short and long term. The physical, sexual, reproductive health and mental health consequences of such abuse are wide ranging and need to be addressed. Data from several settings show that children are disproportionately represented among the cases of sexual abuse that are brought to the attention of health care providers. Health services in many instances are slow to recognize violence against children, lack staff trained on identifying and responding to violence against children, have limited resources and seldom consider violence against children as health problem, are reluctant to talk about it and may not know how to help. The consultant will be responsible for the implementation of the following tasks: Conduct literature reviews of both qualitative and quantitative studies to identify values and preferences to inform good practices and guiding principles Stakeholders consultation to review existing health policies and inform policy recommendations for the integration of child protection issues and health sector response to VAC Develop and validate national guidelines and protocols for the health sector response child victim/survivors of violence, consistent with international human rights standards and WHO guidelines Develop, validate and finalize pocket books with messages on VAC, guiding principles for front line health care providers (general practitioners, nurses, paediatricians, gynaecologists etc.) Develop guidelines and implementation strategy for sustained capacity building of health care providers (1) training of health care providers on VAC and child friendly/sensitive health care (2) Integration of training on child protection in pre-and in -service curriculum for all health professionals Develop strategy for strengthening routine reporting and documentation of violence against children and final report End Product Inception and literation review report documenting good practices and guiding principles for delivery of clinical care for child victims/survivors of violence National guidelines and protocols for health sector response to VAC and safe guarding policy Pocket books with messages on child protection and VAC including guiding principles for front line health care providers (general practitioners, nurses, paediatricians, gynaecologists etc.) and short messages on health sector response to VAC for different categories of health care providers Guideline and implementation strategy for sustained capacity building and training material /pre and in-service curriculum on CP and VAC for health care providers Mandatory reporting policy and protocol for health facilities and health care providers and a roadmap for operationalizing the protocol including tools and guidelines for reporting, tracking, referral and response on violence against children Qualifications or Specialized Knowledge/Experience Required Advanced university degree in Medicine, Health promotion/child psychology or related field (masters or equivalent) A minimum of eight years of relevant professional work experience with projects related to child protection in the education section Experience in the field child psychology and clinical care of children Experience in the field of child protection system strengthening is an asset Excellent planning and organizational skills Strong communication skills - both oral and written Experience with UNICEF is desirable Fluency in written and spoken English Experience working with government desirable
          Solution Consulting & Digital Transformations Manager at ORACLE      Cache   Translate Page   Web Page Cache   
Oracle provides the world's most complete, open, and integrated business software and hardware systems, with more than 370,000 customers including 100 of the Fortune 100 representing a variety of sizes and industries in more than 145 countries around the globe.Ref: 17001B03 Location: Lagos, Nigeria Job: Pre Sales Travel: Yes, 25 % of the Time Job Type: Regular Employee Hire Job Description To grow the revenue of Oracle SaaS solutions and develop a sustainable business in designated geographies by leading the SAAS/CLOUD focused solution consulting team and leveraging the solution consulting deliveries supporting our sales cycle. Scope Manage the solution consulting (Applications PreSales team) supporting Nigeria & Ghana. Lead and Develop a Modern Solution Consulting team. Ensure Team Excellence. Improve Win Rate to meet set objectives. Be a Business Partner to the Sales Leaders of Nigeria & Ghana. Work in close collaboration with the Sales Team to ensure Sales & PreSales alignment for success. Actively contribute to the achievement of the SAAS/Cloud License revenue target and growth. Have a leading role in developing a growth strategy in collaboration with Nigeria & Ghana Sales Leadership. The growth shall be translated into a pipeline development; this can be done at different levels: industry / solution / market segment/ geography. Leading role in driving transformational & strategic deals Ensure that our SAAS/CLOUD product portfolio is properly exposed and positioned. Work in close collaboration with all other Lines of Business (LoBs) Focus on all industries in the private and public sectors (Communications, Energy & Utilities, Manufacturing, Retail, Distribution, Financial Services, Governments, Healthcare, Higher Education, Defence, etc.) The role reports to Oracle Sub-Saharan Africa Solution Consulting Leader Main Responsibilities Position Apps Solution Consulting organization as a leading force among others to drive the cluster business. Build visibility and reputation across different LOBs, functions, and geographies. Work closely with the SAAS/CLOUD Sales Leaders and Sales Team to ensure improvement of the win rate as per set objectives. Demonstrate strong sales acumen. Understand the sales cycle and account strategy. Act as trusted adviser to the SAAS/CLOUD Sales Leader and sales team. Develop account base solution map. Recommend and drive action plans to develop the pipeline and move the opportunities to sales stage 5 (Resolution stage). Able to disrupt the sales cycle through innovations, and demonstrates solid analytical thinking to winning the deals. Work closely with and build relationships with other Oracle Lines of Business, including Sales Management, Industry Architects, Product Strategy Team, Development, Alliance & Channel, Marketing, etc. Drive Competitiveness and Innovation Use deep customer understanding to deliver competitive advantage. Proactively address changing priorities and operating environment. Foster innovation: create WOW effect and high Customer impact to show case Oracle innovation Maintain clear visibility of Top Deals and Top Accounts for the Fiscal. Ensure close follow-up of Top deals/accounts with the SAAS/CLOUD Sales Leader. Contribute to account qualification, develop solutions value proposition, understand risks and success factors, competitive landscape, objections handling and ensure that necessary resources are assigned to the deal. Develop and communicate value propositions at executive and C-levels that exploit Oracle's solutions, its architecture and capabilities/benefits in different industries. Promote Customer Advocacy. Support customer success and referenceability by driving a focus on go-live, user adoption and customer journey roadmap. Lead the development and delivery of Solution Consulting capability, ensuring that it matches current and future demand. Recruit and induct new team members as required. Build a Modern Solution Consulting team which exemplifies the high standards of the role and continuously raises the bar in performance. Modernise SC Services. Drive Customer Engagement Innovation & Competitive Differentiation across the team. Foster a sense of excitement, ownership, and personal commitment to the work. Drive Field SC Productivity. Increase customer facing time by driving re-use, reducing preparation time required and utilising remote Solution Consulting Resources. Love Public speaking. Speaker in Oracle Marketing events. Fulfil the following management responsibilities: Provide accurate and timely management information Set objectives and review the performance of the Solution Consultants and take action to ensure targets are met and individual Solution Consultants are developed. Support, coach and mentor individuals in achievement of their personal development needs. Manage competencies of the team to anticipate and meet demand. Provide skills development and training where required to provide these competencies. Monitor the effectiveness of the Sales Consulting team in supporting specific opportunities. Operate in line with Oracle's HR policies and procedures Maintain a broad technical and business awareness of Oracle's current and future products and solutions Detailed Description and Job Requirements Provides direction and specialist knowledge in applying the technology/application to client business. Facilitation of customer product/application understanding through presentations demonstrations and benchmarks; provision of support throughout the sales cycle. As part of the Oracle sales team you will direct and manage pre-sales resources throughout the sales cycle. Provides technical/functional leadership to the sales team in the development and implementation of customer applications and customer products. Participates in account planning and strategy development. May publishes technical information of specific applications and/or technical articles. Works with management to define new products. Serves as the company liaison on specific technical projects with customers. Manages and controls activities in multi-functional areas of sections. Ensures appropriate operational planning is effectively executed to meet Corporate business needs Knowledge of software industry relating to all aspects of ebusiness solutions. Demonstrated leadership skills. Strong presentation skills. Ability to travel as needed. BA/BS degree or equivalent. Essential Skills: Experience in leading digital transformations Very knowledgeable in the SAAS/CLOUD solution area and the corresponding products Able to pitch at C-Level, develop and communicate value propositions at executive level Strong leadership skills, with a results-oriented attitude that overcomes barriers Strong interpersonal skills to leverage other functions within the organization Proactive, accessible and reliable. Demonstrate sense of Ownership. Meets deadlines. Ensure transparent/responsible communication with colleagues, managers, sales team and external parties (customers, partners, etc.): Personal Drive, Positive & WIN attitude Commitment to team and effort spend teamwork. Value Based Sales Skills Influencing & Negotiating Customer Focus Teamwork Coaching &Mentoring Results Orientation Customer Needs Analysis Consultative Selling Industry Mastery Opportunity Management Sales Process Acumen Competitive Awareness Passionate for success
          Latest Update – Sbahle Mpisane was freed by emergency services from vehicle wreckage: Video      Cache   Translate Page   Web Page Cache   


The jaws of life are usually required to be used by emergency service providers to cut apart the vehicle wreckage in order for the emergency workers to be able to free those trapped inside the crashed vehicle.

Itumeleng Khune react on Sbahle Mpisane Accident

Rescue Care paramedics have revealed the jaws of life had to be used to free Durban’s popular fitness bunnie Sbahle Mpisane after her horrific crash on the Victoria Embankment at about 4 am on Thursday morning.

Pictures of Sbahle Mpisane Rushed to Hospital after Accident: #PrayForSbahle



Watch the demonstration below to see how the tool is used in case of emergencies.

So horrific was the crash, that advanced life support was required by paramedics to stabilise the woman known for her fitness exploits.

Garrith Jamieson, a spokesperson for Rescue Care Paramedics said: “A woman believed to be in her thirties has sustained critical injuries after the vehicle she was driving lost control and collided with a tree on the Victoria Embankment near the yacht mall in Durban around 4 am this morning.

“Rescue Care Paramedics arrived on the scene to find the driver entrapped in the wreckage, she had sustained critical injuries and Advanced Life Support Paramedics worked to stabilise her whilst the Durban Fire Department used the jaws of life to free her,” said Jamieson.

“The patient was placed on a manual ventilator before being carefully extricated from the wreckage. She was then rushed to a nearby hospital for the urgent care that she required,” he said.

Mpisane’s father, Sbu, said he could not say much, but indicated that his 25-year-old daughter was still in a critical condition in hospital.

Mpisane’s sportsman boyfriend, shot-stopper Itumeleng Khune, said on social media he was praying for his bae – which he referred to as ‘queeno’. The police are investigating a case of reckless and negligent driving.

“Today at about 4:20 am, it is alleged that a vehicle crashed and burst into flames at the Victoria Embankment opposite the Wilson’s Wharf. The driver was injured and taken to hospital for medical attention. The cause of the accident is unknown at this stage. A case of reckless and negligent driving has been opened in Durban Central police station. Circumstances around the incident are being investigated,” said police spokesperson Colonel Thembeka Mbele.

          Lawsuit filed against new government asylum rules      Cache   Translate Page   Web Page Cache   

Washington D.C., Aug 9, 2018 / 05:30 pm (CNA).- Immigration activists have made a legal challenge to the government’s criteria for migrants seeking asylum on Tuesday, saying that the grounds outlined were too narrow and should be expanded.

The American Civil Liberties Union (ACLU) and the Center for Gender & Refugee Studies filed suit on behalf of a dozen individuals who say they left their home countries after experiencing “horrific persecution,” including the murder of family members. These people were denied asylum in the United States.

The lead plaintiff, identified only as “Grace,” is a native of Guatemala who says she came to the United States after two decades of physical and sexual abuse by her husband. “Grace” faces the possibility of deportation back to Guatemala, where her lawyers say her life is at risk.

Previously, a person could claim fear of gang violence or domestic abuse as a reason why they should be granted asylum into the United States. In June, Attorney General Jeff Sessions released a new policy, stating that these factors “generally” do not constitute a suitable reason.

In a June 11 decision by the attorney general relating to a particular case referred to as A-B-, he ruled that “generally, claims by aliens pertaining to domestic violence or gang violence perpetrated by non-governmental actors will not qualify for asylum.”

While Sessions said that he did not “minimize the vile abuse” that particular woman had endured, “the mere fact that a country may have problems effectively policing certain crimes—such as domestic violence or gang violence—or that certain populations are more likely to be victims of crime, cannot itself establish an asylum claim.”

Catholics have spoken out strongly against the new policy.

At the U.S. Conference of Catholic Bishops’ general assembly in June, USCCB President Cardinal Daniel DiNardo of Galveston-Houston condemned the new policy in his opening address to the bishops.

DiNardo said that the policy would risk the lives of women, and that “unless overturned, the decision will erode the capacity of asylum to save lives, particularly in cases that involve asylum seekers who are persecuted by private actors.”

The ACLU argues that the updated policy is an “attempt to subvert decades of settled asylum law” and is a “fundamental misunderstanding of domestic violence.” The plaintiffs are arguing that the new policy effectively restricts asylum claims to those fleeing persecution either by the government, or that the government actively condoned the persecution.

This, they argue, goes against the established legal standard that the local government merely be “unwilling or unable” to offer protection.

In May, administration officials said that individuals and people-smuggling organizations were exaggerating the threat of violence they faced in an effort to exploit the system and gain entry to the United States.

Sessions said that the June changes would restore "sound principles of asylum and long-standing principles of immigration law."

Under immigration law, a person seeking asylum must prove that they are subject to persecution in their home country due to their race, nationality, religious beliefs, political views, or membership in a certain social group. Over time, the definition of “certain social group” has been expanded to include women who are fleeing domestic violence in countries where there are few legal avenues for a woman to prosecute or even escape her abuser.

Over the past year, the number of people seeking asylum who fail the first step, known as the “credible fear screening,” has increased. People who fail the credible fear screening are subject deportation back to their country of origin.

The case will be heard by the United States District Court for the District of Columbia.


          Technicien en géologie et en modélisation 3D - BBA - Abitibi, QC      Cache   Translate Page   Web Page Cache   
Apporter un soutien à la modélisation et à la mise à jour des ressources chez les clients dans des sites d’exploration ou en exploitation, et apporter des...
From BBA - Thu, 14 Jun 2018 13:48:10 GMT - View all Abitibi, QC jobs
          The Strengths And Weaknesses Of Leftists Vs Conservatives      Cache   Translate Page   Web Page Cache   

The two sides of the political spectrum are real, and understanding where each side is coming from helps us be vigilant and avoid exploitation. Here’s more… by Brandon Smith of […]

The post The Strengths And Weaknesses Of Leftists Vs Conservatives appeared first on Silver Doctors.


          Banque - Technicien au centre d'assistance - CGI - Lac-Saint-Jean, QC      Cache   Translate Page   Web Page Cache   
Bonne connaissance des systèmes d'exploitation Windows NT, XP, Vista, 7; Description du poste :....
From CGI - Fri, 13 Jul 2018 15:12:04 GMT - View all Lac-Saint-Jean, QC jobs
          Agent soutien technique, Télébec - Bell - Val-d'Or, QC      Cache   Translate Page   Web Page Cache   
Une expertise des systèmes d’exploitation Windows 7,8, et 10, Vista, MAC et Outlook. Code de demande:....
From Bell Canada - Fri, 13 Jul 2018 16:41:03 GMT - View all Val-d'Or, QC jobs
          Analyste au support - Support Analyst - Exela Technologies - Montréal, QC      Cache   Translate Page   Web Page Cache   
Les systèmes d’exploitation de Microsoft, incluant XP, Vista, 2003 et 2008. Microsoft Windows Server and Workstation including XP, Vista, 7, 2003 and 2008...
From Indeed - Fri, 13 Jul 2018 18:17:48 GMT - View all Montréal, QC jobs
          Technicien au centre d'assistance - français / anglais / espagnol / portugais - CGI - Montréal, QC      Cache   Translate Page   Web Page Cache   
Bonne connaissance des systèmes d'exploitation Windows NT, XP, Vista, 7. Description du poste :....
From CGI - Fri, 13 Jul 2018 15:12:47 GMT - View all Montréal, QC jobs
          Ingénieur logiciel, développement et exploitation, solutions Internet des objets - Bell - Mississauga, ON      Cache   Translate Page   Web Page Cache   
Code de demande: 205588 Bell est une entreprise authentiquement canadienne avec plus de 138 ans de succès. Nous nous démarquons par la passion des membres de...
From Bell Canada - Tue, 31 Jul 2018 17:00:18 GMT - View all Mississauga, ON jobs
          You should be your own privacy hero, but Apple makes it easier      Cache   Translate Page   Web Page Cache   

In a recent article, Bloomberg’s Sara Frier asks the question “Is Apple Really Your Privacy Hero?” It’s a click-baity enough headline on its own, but the article’s premise seems bizarre: Apple should take responsibility for the information customers willingly give not to it, but to the developers of apps on its store.

To be clear, Apple doesn’t allow developers to access user data unless and until the user explicitly allows it. From Apple’s privacy page: “If an app you’ve installed on your device wants to access personal information like photos or contacts, you’re prompted to give permission first.”

As the article points out—somewhat snarkily—Apple has made its policy of protecting its users’ data a selling point. The company has “positioned itself as the champion of privacy,” Frier writes.

An example of that championship is the way Apple scrambles and encrypts the data used to store your fingerprints or face, then stores it in a special chip on your device that not even Apple can access. When you make a purchase using Apple Pay, similar measures are taken. Your credit card number is never transmitted to anyone—not even the payee or your bank.

But there’s plenty of other valuable data on your device, like your contacts, photos, notes, and more. When a user agrees to share with other app developers, Apple doesn’t even see the data that’s being shared, let alone store it. Still, Frier seems to want the company to be responsible for it anyway. But how could it? It’s a little like blaming the lock company when you’ve been burglarized when you’re the one who left the front door open. Actually, it’s more like blaming the lock company when you’ve put your valuables in the front yard next to a sign that says “Free Stuff.”

Apple’s history with data has been to err on the side of caution even over convenience, insisting on user approval before an app can access things like location, contacts, calendar, the camera, and microphone. It has famously refused to provide anyone—even law enforcement officials—with a way to circumvent its security and has put protection in place that Apple couldn’t break if it wanted to.

Fighting fingerprinting

Frier points to a recent strengthening of Apple’s privacy policy that places additional limits on developers around storing or sharing data they receive from app users. The company has also introduced methods of anonymizing data that apps collect, like browser configurations and location. In a practice called “fingerprinting,” companies use such data to build robust profiles that can identify users with relative certainty. The new feature fudges data like location, installed fonts, and other settings in a way that makes users look more like other users to data collectors.

But Frier asserts that Apple should be more accountable for information that’s already been collected, either through fingerprinting or because the user allowed it. She seems to criticize Apple for not holding on to our personal data. “If the company insists on not knowing what happens to our data in the name of privacy,” she writes, “it can at least help us ensure we don’t share more of it than necessary.”

The kind of personalization we’ve grown to expect in our devices requires a certain amount of, well, personal information. There’s a balance to make between knowing enough about us to provide those highly personalized experiences and protecting that information from people who want to exploit it. Apple’s stance has been that a company doesn’t collect it, it can’t leak it. That may prevent Apple from doing much about information we give to others, but it also does a lot to protect it from those who would seek it out through nefarious means.

As Apple software senior VP Craig Federighi put it at the company’s recent WWDC keynote, “We believe your private data should remain private. “Not because you’ve done something wrong or have something to hide, but because there can be a lot of sensitive data on your devices and we think you should be in control of who sees it.”

For now, at least, that requires some amount of personal responsibility—in other words, being your own privacy hero.


          Someday this tiny spider bot could perform surgery inside your body      Cache   Translate Page   Web Page Cache   

A team of Harvard University researchers recently achieved a major breakthrough in robotics, engineering a tiny spider robot using tech that could one day work inside your body to repair tissues or destroy tumors. Their work could not only change medicine–by eliminating invasive surgeries–but could also have an impact on everything from how industrial machines are maintained to how disaster victims are rescued.

Until now, most advanced, small-scale robots followed a certain model: They tend to be built at the centimeter scale and have only one degree of freedom, which means they can only perform one movement. Not so with this new ‘bot, developed by scientists at Harvard’s Wyss Institute for Biologically Inspired Engineering, the John A. Paulson School of Engineering and Applied Sciences, and Boston University. It’s built at the millimeter scale, and because it’s made of flexible materials–easily moved by pneumatic and hydraulic power–the critter has an unprecedented 18 degrees of freedom.

It’s smaller and more dexterous than any of its tiny robotic peers–a significant step toward robots that will be able to perform tasks inside the human body.

[Photo: Wyss Institute at Harvard University]

The engineers call the new technology MORPH, an acronym for Microfluidic Origami for Reconfigurable Pneumatic/Hydraulic. Using it to create a spider–or any other robotic critter–involves three different fabrication techniques. First, micro-lasers cut out 12 layers of material, which are glued together to create the body and arms of the spider. Second, soft lithography draws a complex network of microscopic channels inside those layers; these little “veins” move the spider as fluid or air are pumped through them. Finally, some parts of the ‘bot are hardened to make its basic shape permanent.

According to Sheila Russo, co-author of the study, their little monster can alter its structure, move, and even change colors. It seemed appropriate to test it by creating a replica of the colorful, millimeter-size Australian peacock spider.

While the promise of their spider is huge, Boston University assistant professor and co-author Tommaso Ranzani says its current form isn’t designed for medical applications. It’s more of a way to showcase its abilities. “However, we believe soft robotic technologies have a great potential in overcoming current challenges in minimally invasive surgery,” he said over email. One day, they could be ideal candidates to “manipulate and interact with the most delicate tissues in the body,” such as veins, arteries, and even nerves, after being deployed from a conventional surgical tool. They could also administer drugs or do biopsies.

But Ranzani also believes that similar micro-bots could be helpful in environmental settings, and could maintain industrial facilities and even assist in space exploration. “[The spider] robot is a first demonstration of the manufacturing capabilities that this process enables,” he says. “And we believe it will pave the way to a new generation of soft micro-robots that can exploit their small scale, and deformable and resilient bodies, to explore highly unstructured and complex environments for applications ranging from safe and delicate manipulation of tissues inside the human body to search and rescue.”

Imagine a legion of robots cleaning a rocket engine and fixing microfactures, or looking for survivors in a building destroyed by an earthquake and providing first aid–or even just doing a clean sweep to clear clogged arteries inside a human body. I need a platoon of them, stat.


          Defending the "Gentrifier"      Cache   Translate Page   Web Page Cache   

Gentrification gets bad press. It would appear that the gentrifier (he who engages in gentrification) is a malign exploiter, a bully, someone who takes advantage of the weak and the poor. And these are the nice things said about him.

What is the case against this practice? First and foremost, it pushes previous residents out of their homes. These people may have lived in their neighborhoods for years. They may be the third or fourth generation to occupy these premises. But when someone comes along, flashing big bucks, it is game over: the occupants have to vacate. What is the means through which the gentrifiers do their evil deeds? They simply try to purchase real estate in the target area, or attempt to rent accommodation there, thus bidding up rents and sale prices higher than would otherwise exist. The locals cannot compete with these hyped up rates, and are forced to retreat. Where do they go? Who knows? But wherever it is, they now occupy less preferred real estate. We know this since if they liked their new domiciles more than their previous ones, they would have already moved there, without any pressure being placed on the market by the new gentry. And it not only homes those forced to leave lose out on. These houses are part of neighborhoods, communities, associations. They have a history there. Their children are wrenched away from their friends.

Who are the main guilty parties in this sad story? College students who often have more money than the people they replace (or at least their parents do). When the Olympics come to town, people are moved en masse to make way for the new stadiums, swimming pools, ball fields, etc. Ditto for the World’s Fairs. They, too, export inhabitants with a long history, willy nilly. They, too, eradicate cultures and communities that were thriving before the rampage took place. Although this will not be politically correct, and we shudder to even mention it so beholden are we to the modern dictates and proprieties: urban-affluent homosexual men are also often offenders in this regard.

There are grave problems with the account offered by opponents of gentrification. Before we begin with our analysis, let us make one important distinction, that between owners and renters in the target area. The former are in a far better position than that latter. Yes, when this process occurs, they, too, will leave the neighborhoods they have come to treasure over the years, but it will be “voluntary.” That is, they will have so much money thrust down their throats that they will prefer their new digs to their old ones. Otherwise, they will stay put, and not be “run out of town” by the newcomers. Community, togetherness, history, culture, neighborhood, are not the be-all and end-all of life, as opponents of gentrification would have us believe. At least some owners in target areas consider themselves lucky to be bought out at elevated prices.

The renters are in a far more precarious position. When their leases are up, the prices asked by the landlord will skyrocket out of their reach. They will be “forced” to depart, whether they like it or not. So, let us focus on those who lease real estate in the target area, not those who have taken up ownership positions there.

In order to put this into context, let us consider other arenas apart from real estate. For, something very much like gentrification occurs all throughout the economy. Take automobiles for example. The rich get the pickings and the poor the leavings. The former walk away, or, rather, ride away, in cars such as the Mercedes, the Rolls Royce, the Cadillac; the latter have to content themselves with the vastly inferior Fords, Chevrolets, Hondas, Toyotas. The only difference between this case and the former is that the poor were never “pushed out” of luxurious vehicles, and into inferior ones. They never had the better cars in the first place. Otherwise, the story is the same: the rich eat high off the hog, the poor take the hind quarters. Ditto with food: it is lobster and steak for the wealthy, spaghetti and peanut butter for the impoverished.

But is this unfair? Certainly not. Assume that the rich came by their wealth in an honest way, not through government grants of special privileges, subsidies, bail-outs, a la crony capitalism, but via laissez faire capitalism. Thus they have contributed more to everyone else than the poor. If anything would be unfair, it would be that the well-to-do would have to take the leavings and those without much honestly earned wherewithal get the lion’s share. Or, that everything gets divided equally. We can see that opposition to gentrification is at least in part a disguised demand for equality. But this comes with particular ill-grace from those, for example, with two eyes. Were they to give up one of them to a blind man, they would lose depth perception. This fades into nothingness compared to the benefits of imperfect sight to someone totally without. And, yet, these egalitarians have the nerve to prate on about income inequality.

There is also more than just a little bit of economic illiteracy involved in the case against gentrification. First of all, economic freedom, as Adam Smith so clearly saw in 1776, creates the Wealth of Nations. Those so concerned with the poor and with eradicating poverty, as we all should be, must realize that opposition to gentrification is an attack on the marketplace. To the degree that people are not free to buy and sell, to “barter and truck” is the extent to which the economy is more impoverished than it need be. The free economy is in a continual state of flux. People are being outbid every day for resources, up to and including housing they would otherwise prefer to keep to themselves. Outlaw gentrification, and if we are logically consistent, we must prohibit this entire process of bidding for goods and services, which implies, yes, outbidding some, disproportionately the poor.

Those ignorant of economics also fail to appreciate the distinction between residential housing ownership and tenancy. If real estate prices go down, and they sometimes do, it is the former, not the latter, who take the major hit. Owners are risk bearers, in a way that tenants are not. But, there are also benefits to investing in this way: when gentrification occurs, they benefit in a way unavailable to those who merely rent.

Forget housing, for the moment. Consider the plight of a person who frequents a restaurant for many years. All of a sudden this establishment raises it prices because they can now attract a more affluent clientele. Our man can no longer afford to eat there.  According to the anti gentrifiers, this diner has rights that are now being abridged.  But no. Engaging in a commercial interaction, even over the long haul, does not give either party any special dispensation to continue it on the same terms. One could with equal logic argue that if the diner shifts his custom to a competing restaurant, the eatery that had long served him would have a legal case against him.  Stuff and nonsense. Both sides have for years benefited from this long-standing arrangement, otherwise they would not have continued to partake in it. If one of them wishes to discontinue, either one, he has a right to do so.

It is the same with a person who rents an apartment. His long tenure there avails him nothing as a matter of justice, if the landlord wants to raise the rent and substitute a richer tenant for him. And the opposite, too, holds true. If a long standing tenant wishes to depart for greener pastures, the owner may not compel him, in law, to remain where he is.

[Originally published February 9, 2015]


          Gestionnaire de projets en infrastructures informatiques - Gevity Consulting Inc. - Montréal, QC      Cache   Translate Page   Web Page Cache   
Réseau, serveurs, virtualisation de postes, différents systèmes d’exploitation, infrastructures de stockage et technologies Microsoft ;...
From Gevity Consulting Inc. - Fri, 04 May 2018 10:16:40 GMT - View all Montréal, QC jobs
          Code du travail. Traite d’êtres humains au cœur de la forêt      Cache   Translate Page   Web Page Cache   

Quatre bûcherons marocains recrutés légalement ont été victimes de surexploitation de la part d’un employeur peu scrupuleux basé dans l’Indre. Désormais sans ressources ni travail, mais soutenus par un collectif de citoyens et la CGT, ils réclament justice. Reportage.


          GGW #187: Joe comes home for the Holidays!      Cache   Translate Page   Web Page Cache   
In this epiosde, Joe comes back to the home studio to chat about the latest Geek and Gaming news to include: – Sprint disabling Carrier IQ – iPad – Roku Updates – Windows Phone 7.5 Exploits – Skyrim issues – Is PC Gaming more expensive then Console? With our Picks of the Week! Visit us […]
          Un nez artificiel      Cache   Translate Page   Web Page Cache   

imagesFJ9MN90O

Je ne parle pas du remplacement de l'appendice nasal mais certains chercheurs ont le nez creux : une entreprise située à Grenoble a finalisé des détecteurs d’odeurs.
De la bonne conservation des aliments dans le frigo à la propreté des toilettes publiques, les exploitations sont immenses.

La startup Aryballe voulait venir en aide aux personnes souffrant d’anosmie. Ce trouble de l’odorat, qui se manifeste par un défaut de sensibilité aux odeurs, affecte 2% de la population française et jusqu’à 15% des seniors.
Tour de force technique, l’entreprise grenobloise a miniaturisé un enregistreur de laboratoire d’1 m3 en un petit détecteur portable avec   écran. L'appareil pas plus gros qu’un aspirateur de table, pourra renifler les odeurs et signaler si le lait a tourné, si la soupe sent le moisi ou, plus grave, s’il y a une fuite de gaz. Sa commercialisation a débuté  fin 2017.

Votre hotte de cuisine pourrait vous prévenir si votre steak brûle sur la poêle. Dans l’espace public, des détecteurs placés dans les toilettes publiques sentiront quand le seuil d’odeur acceptable est dépassé et préviendront l’équipe de nettoyage pour intervention.

NeOse-800x480

XVMe0ab7a8e-2e54-11e6-bec0-b53ac594c306

neosepro

[...]Les "nez électroniques" font leur apparition dans les smartphones. Ces dispositifs  s'inspirent du système olfactif des animaux. Ils sont issus des recherches en nanotechnologies. Ces nouveaux capteurs identifient toutes sortes d’odeurs, les polluants, les explosifs et nous alerteront aussi en cas de maladies graves.

Depuis des années, les chercheurs en informatique travaillent à la mise au point de capteurs portatifs permettant de traiter et d’analyser les données issus de notre environnement immédiat. Des détecteurs qui complètent les 5 sens que nous possédons, c'est-à-dire voir, sentir, toucher, goûter et entendre.

Les systèmes de reconnaissance vocale sont bien aboutis, nous conversons sans problème avec nos ordinateurs ou nos smartphones qui nous comprennent parfaitement. Le toucher fonctionne à merveille sur les écrans tactiles des mobiles ou sur nos tablettes. Nos appareils sont dotés du sens de la vue grâce aux caméras et permettent aux systèmes de vidéosurveillance, avec leurs logiciels de reconnaissance des visages, de nous identifier.

Le goût aussi fait l’objet de recherche dans le domaine des interfaces homme-machine. Reste maintenant à mettre au point des détecteurs d’odeurs, qui devront reconnaître des polluants, repérer les traces aériennes d’explosifs ou de détecter la présence de gaz mortel inodore dans l’atmosphère. Les "nez électroniques ", déjà développés, sont destinés à des usages spécifiques, notamment militaires lors des opérations de déminage. Ils sont aussi utilisés par les agents de la sécurité civile dans les aéroports lors d’une alerte à la bombe.

Depuis peu, des micro-capteurs et diffuseurs d’odeurs sont intégrés à nos smartphones avec des applications comme l'oPhone, qui permettent d’envoyer des SMS agrémentés d'un parfum sélectionné par vos soins. Renifler de bons petits plats est aussi possible grâce au programme Smell-o-Vision pour recevoir sur son téléphone un aperçu olfactif des plats que propose le restaurant d’un grand chef étoilé espagnol. Dans les laboratoires, des puces capables d’analyser la composition chimique d’odeurs subtiles, aussi performantes que la truffe d’un chien, sont à l’étude. Elles présentent une sensibilité exceptionnelle, et décèlent en temps réel les changements du métabolisme de son porteur, mesurent par exemple son taux de glycémie ou d’alcoolémie. Des senseurs renifleurs universels qui permettront d’apprécier la qualité de l’air d’une ville, d’analyser la fraîcheur des aliments et de sentir votre haleine afin d’établir un diagnostic médical complet. Des nez électroniques 100% fiables bientôt dans nos smartphones qui, contrairement aux humains, n’ont aucune chance d’attraper, même au printemps, le rhume des foins."[...]  in rfi.fr © 2018 Copyright RFI

Ophone-telephone-olfactif-jewanda-2_0

oPhone, téléphone olfactif © 2018 Copyright RFI

Violette

4422344_4_5828_nos-machines-bientot-dotees-des-cinq-sens_f0c71bed0cee994fa7a1ee477fd47764


          Black Hat 2018: Stealthy Kernel Attack Flies Under Windows Mitigation Radar      Cache   Translate Page   Web Page Cache   
Researchers create PoC of a post-exploitation kernel-mode fileless attack technique.
          Book-A-Day 2018 #221: The Unbeatable Squirrel Girl, Vol. 5: Like I’m the Only Squirrel in the World by Ryan North & Erica Henderson      Cache   Translate Page   Web Page Cache   
The parade of odd would-be world-conquerors continues in this collection of Squirrel Girl’s exploits — I almost said “latest collection,” but I’m still running almost two years behind, so it’s not. She hasn’t turned grimdark in the meantime, has she? That would be sad. Anyway, in the five issues from late 2016 collected in (deep […]
          Bye bye les Gear, bonjour les Galaxy Watch      Cache   Translate Page   Web Page Cache   

Les montres de Samsung s'appellent désormais "Galaxy Watch". Un nouveau nom qui accompagne le lancement de la gamme 2018/2019 dévoilée aujourd'hui lors de l'événement Unpacked de New York.

Les montres du sud-coréen restent sur un système maison Tizen, elles gardent leur design rond avec la couronne autour de l'écran pour naviguer dans l'interface. Les trois Galaxy Watch existent en tailles de 46 mm (batterie de 472 mAh) et 42 mm (270 mAh).

Elles sont équipées d'un processeur Exynos 9110 Dual Core spécialement optimisé pour elles et Samsung promet plusieurs jours d'autonomie sur une seule charge, mais sans donner plus de détails sur d'éventuels compromis. Logiquement c'est la plus grosse des deux tailles qui devrait parvenir à cet exploit.

Ces montres sont étanches jusqu'à 50 mètres (indices IP68 et MIL STD 810 G-516.6 (un indice de l'armée américaine pour l'utilisation en haute altitude et la résistance aux chocs). Un modem 4G est intégré pour l'utiliser loin du téléphone.

Sur le plan fitness, elles ont un cadiofréquencemètre. Elles peuvent également analyser la qualité du sommeil et, plus généralement, dispenser des observations en fonction des changements notés dans les révélés de santé au fil des jours. 6 activités physiques peuvent être détectées automatiquement au début de l'effort.

Samsung a insisté sur le choix de 60 000 cadrans pour personnaliser sa montre.

Le lancement des Galaxy Watch est prévu pour le 7 septembre, le gros modèle existera en coloris argent et le plus petit en noir ou rose, toutes à un peu plus de 300 €.

Enfin, Samsung a montré le Wireless Charger Duo, un tapis de recharge par induction pour y poser simultanément sa montre et son smartphone Galaxy.


          Hamas is exploiting Netanyahu's unwillingness to go to war      Cache   Translate Page   Web Page Cache   
Netanyahu is under fire for failing to deter Hamas from launching rockets at Israel. Why hasn't he come up with a plan to prevent another Gaza war?
          Ingénieur logiciel, développement et exploitation, solutions Internet des objets - Bell - Mississauga, ON      Cache   Translate Page   Web Page Cache   
Code de demande: 205588 Bell est une entreprise authentiquement canadienne avec plus de 138 ans de succès. Nous nous démarquons par la passion des membres de...
From Bell Canada - Tue, 31 Jul 2018 17:00:18 GMT - View all Mississauga, ON jobs
          If for some reason you're still using TKIP crypto on your Wi-Fi, ditch it Lin ...      Cache   Translate Page   Web Page Cache   

It’s been a mildly rough week for Wi-Fi security: hard on the heels ofa WPA2 weakness comes a programming cockup in the wpa_supplicant configuration tool used on linux, Android, and other operating systems.

The flaw can potentially be exploited by nearby eavesdroppers to recover a crucial cryptographic key exchanged between a vulnerable device and its wireless access point and decrypt and snoop on data sent over the air without having to know the Wi-Fi password. wpa_supplicant is used by Linux distributions and Android, and a few others, to configure the Wi-Fi for computers, gadgets, and handhelds.

This key is used in networks that employ EAPOL (Extensible Authentication Protocol over LAN). The good news is that no more than around 20 per cent of wireless networks will be vulnerable, it is estimated, because the attack requires TKIP and WPA2 to be in use and no one should be using TKIP in 2018 .

In this paper [PDF], “Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives," to be presented at the Usenix Workshop on Offensive Technologies symposium next week , Mathy Vanhoef and Frank Piessens of the Katholieke Universiteit Leuven in Belgium, explained how a decryption oracle can be used to perform unauthorized decryption of wireless network traffic. Doing back, er, bit flips

In this Twitter thread , Vanhoef summarized what’s going on: “The problem is that data is decrypted with RC4, and then processed, without its authenticity being checked. So you can flip bits, see how to client reacts, and based on that, recover plaintext.”

And as wpa_supplicant maintainer Jouni Malinen explained in his advisory on Wednesday: “It is possible for an attacker to modify the [EAPOL] frame in a way that makes wpa_supplicant decrypt the key data field without requiring a valid MIC [Message Integrity Code] value in the frame, ie: without the frame being authenticated.”

Malinen added that WPA2 shouldn’t be set up with TKIP as the latter isknown to be weak anyway. However, as Vanhoef noted, there's still people out there using this combination. So, in short, just ensure TKIP is disabled. Malinen added that to recover group encryption keys, a snooper would have to make 128 connection attempts per octet, because an attacker’s bit-flips will make the four-way authentication handshake fail. Not only is this slow, it could crash the access point under attack.

Vanhoef conceded that an attack would be slow to pull off, taking around 20 minutes per byte recovered. “Several clients can be attacked in parallel, but it's still a non-trivial attack. Patch, but don't worry too much,” he said.

Nonetheless, the wpa_supplicant team has taken the bug seriously, and developed a fix that should hopefully or eventually trickle down to netizens. Access points and devices will need an update for networks to be free from the flaw. Malinen said if possible, affected users should just kill off TKIP in their networks.

The wpa_supplicant maintainers have pushed out a hotfix here , and the next version, 2.7, will carry the fix. Vanhoef has a proof-of-concept of his attack over on GitHub .

Sponsored: Following Bottomline’s journey to the Hybrid Cloud


          PRÉPOSÉ(E) aux Chambres Saisonnier – Temps Plein - Auberge de l'Anse - Rivière-du-Loup, QC      Cache   Translate Page   Web Page Cache   
A 12 minutes à pied de la plage et à 3.5 kilomètres du ferry, cette auberge de 11 chambres, chacune avec une magnifique vue sur le fleuve, et en exploitation... $12 - $14 an hour
From Auberge de l'Anse - Tue, 12 Jun 2018 16:37:05 GMT - View all Rivière-du-Loup, QC jobs
          ExploitedCollegeGirls – Eliza      Cache   Translate Page   Web Page Cache   

Pretty little Eliza, with her sweet face and pig tails, no one could blame you to think she was a

The post ExploitedCollegeGirls – Eliza appeared first on PornStreams.


          Lawsuit filed against new government asylum rules      Cache   Translate Page   Web Page Cache   

Washington D.C., Aug 9, 2018 / 05:30 pm (CNA).- Immigration activists have made a legal challenge to the government’s criteria for migrants seeking asylum on Tuesday, saying that the grounds outlined were too narrow and should be expanded.

The American Civil Liberties Union (ACLU) and the Center for Gender & Refugee Studies filed suit on behalf of a dozen individuals who say they left their home countries after experiencing “horrific persecution,” including the murder of family members. These people were denied asylum in the United States.

The lead plaintiff, identified only as “Grace,” is a native of Guatemala who says she came to the United States after two decades of physical and sexual abuse by her husband. “Grace” faces the possibility of deportation back to Guatemala, where her lawyers say her life is at risk.

Previously, a person could claim fear of gang violence or domestic abuse as a reason why they should be granted asylum into the United States. In June, Attorney General Jeff Sessions released a new policy, stating that these factors “generally” do not constitute a suitable reason.

In a June 11 decision by the attorney general relating to a particular case referred to as A-B-, he ruled that “generally, claims by aliens pertaining to domestic violence or gang violence perpetrated by non-governmental actors will not qualify for asylum.”

While Sessions said that he did not “minimize the vile abuse” that particular woman had endured, “the mere fact that a country may have problems effectively policing certain crimes—such as domestic violence or gang violence—or that certain populations are more likely to be victims of crime, cannot itself establish an asylum claim.”

Catholics have spoken out strongly against the new policy.

At the U.S. Conference of Catholic Bishops’ general assembly in June, USCCB President Cardinal Daniel DiNardo of Galveston-Houston condemned the new policy in his opening address to the bishops.

DiNardo said that the policy would risk the lives of women, and that “unless overturned, the decision will erode the capacity of asylum to save lives, particularly in cases that involve asylum seekers who are persecuted by private actors.”

The ACLU argues that the updated policy is an “attempt to subvert decades of settled asylum law” and is a “fundamental misunderstanding of domestic violence.” The plaintiffs are arguing that the new policy effectively restricts asylum claims to those fleeing persecution either by the government, or that the government actively condoned the persecution.

This, they argue, goes against the established legal standard that the local government merely be “unwilling or unable” to offer protection.

In May, administration officials said that individuals and people-smuggling organizations were exaggerating the threat of violence they faced in an effort to exploit the system and gain entry to the United States.

Sessions said that the June changes would restore "sound principles of asylum and long-standing principles of immigration law."

Under immigration law, a person seeking asylum must prove that they are subject to persecution in their home country due to their race, nationality, religious beliefs, political views, or membership in a certain social group. Over time, the definition of “certain social group” has been expanded to include women who are fleeing domestic violence in countries where there are few legal avenues for a woman to prosecute or even escape her abuser.

Over the past year, the number of people seeking asylum who fail the first step, known as the “credible fear screening,” has increased. People who fail the credible fear screening are subject deportation back to their country of origin.

The case will be heard by the United States District Court for the District of Columbia.


          Wiest Teaching Dual Enrollment History Course at Local High School      Cache   Translate Page   Web Page Cache   

Don’t call on Dr. Andy Wiest to fix your leaky faucet, repair a fence, or construct a new deck. His handyman skills prove him to be otherwise.

Reconsider asking him to coach your child’s sports team. He freely admits his own athletic exploits were never letterman-worthy.

But in the classroom, The University of Southern Mississippi distinguished professor of history scores high marks for his pedagogy. Now, Dr. Wiest takes that talent to Hattiesburg’s Sacred Heart High School, where this fall he’s teaching a dual enrollment version of USM’s world civilizations course (HIS 102). Students in the class earn college credit while meeting requirements for high school graduation.

The course covers world history from 1500 to the present, including some of the most interesting and important aspects of the modern world, from the Reformation to the foundation of the United States and Wiest’s own research areas of World War I and II, and the Vietnam War; the Civil Rights Movement, and present-day conflicts in the Middle East.

“I’ve long sought a way to best give my time and talent to Sacred Heart, the school my children attend,” Wiest said. “It’s a small school, and a great one, and in that type of environment I’ve learned that, from coaching, to building things, to painting the parking lot - the hard work of parents is a key component of the school's success. 

“I'm not all that handy, and was never much good at sports — so I kept looking for a way to give of my time. To me, this also represents a real chance to help take Southern Miss out into the local community in a real concrete way.”

When Wiest offered his services, Sacred Heart Schools Director of Administration Dr. Elizabeth Yankay enthusiastically accepted.

“We’re so appreciative of Dr. Wiest giving his time and talents to our students,” Dr. Yankay said. “We constantly seek ways to offer them new opportunities to obtain college credits while still in high school. With Dr. Wiest, they get a world-class teacher who lets them get a ‘taste’ of being in a college class.” 

Although this is a different teaching experience for Wiest, he’s excited about the opportunity and wants to continue beyond this fall semester, including at other local schools such as his own alma mater, Hattiesburg High. He’d also like to see his faculty colleagues in various disciplines teach at local schools.

“My goal is to give these students some intriguing history to think about. Examining such a wide range of events helps them learn where their own nation and history comes from, and prepares them to think critically about their own future,” Wiest said.

“I also want to give them a taste of what college is going to be like, and know about the wonderful opportunities available to them at USM after graduation.”

Christian Nesser, a junior at Sacred Heart, says history is one of his favorite subjects, and was intrigued by the opportunity to enroll in a college-level course. “I love Dr. Wiest’s enthusiasm,” Nesser said after the first meeting Aug. 9. “He’s very interesting and knowledgeable, and makes learning fun. It’s going to be a great class. ”  

Dr. Wiest is founding director of USM’s Dale Center for the Study of War and Society and a member of the University’s Alumni Hall of Fame. A widely respected historian of the Vietnam War, he is the author of several books, including The Boys of '67: Charlie Company's War in Vietnam, which is the basis for the National Geographic Channel and Lou Reda Productions’ Emmy-nominated documentary “Brothers in War,” with Wiest serving as lead historical advisor to the project.

Learn more about Dr. Wiest at https://www.usm.edu/history/faculty/andrew-wiest.


          Comment on PS4 exploits: the status for 5.5x owners (5.50, 5.53, 5.55) by wanted      Cache   Translate Page   Web Page Cache   
Finally 6.00 update are coming...o
          Comment on PS4 hack: The latest status for 5.50, 5.05 (and below) – updates from Qwertyoruiop by THABET ALQURAN      Cache   Translate Page   Web Page Cache   
is there anyway to hack my ps4 but without the need to go to browser and load the exploit every time i boot up the ps4 i mean just hack it then install games then when you turn off and then turn on again no need to do anything cuz its already hacked
          Muzaffarpur case: Krishna Nandan Prasad Verma gets additional charge of social welfare department      Cache   Translate Page   Web Page Cache   

[India], Aug 9 (ANI): Education Minister Krishna Nandan Prasad Verma was given an additional charge of the Social Welfare Department on Thursday, a day after Manju Verma tendered her resignation from the post in connection with the Muzaffarpur shelter home case.

Manju resigned from the post after her husband, Chandrakant Verma, was accused of having alleged links with Brajesh Thakur, the key mastermind of the Muzaffarpur shelter home rapes.

Her resignation came a couple of days after Bihar Chief Minister Nitish Kumar assured that the culprits behind the alleged incident would not be spared, and would be put behind the bars.

Manju lately has been in the eye of the storm, after the opposition parties demanded her resignation after her husband's alleged involvement surfaced.

Chandrakant allegedly used to visit the shelter home quite frequently, spending hours in the girls' room in the shelter home. Both, the minister as well as her husband had denied the allegations.

Although her party, Bharatiya Janata Party (BJP) stood beside her, one of her party colleagues, Gopal Narayan Singh, had demanded her resignation.

The issue of alleged sexual exploitation of more than 40 girls at a Muzaffarpur shelter home was uncovered more than a month ago by the Mumbai-based Tata Institute of Social Sciences. Later, 11 employees of the child shelter home were arrested. (ANI)


          Data Exposure Types: System Information      Cache   Translate Page   Web Page Cache   

There are many different kinds of sensitive data that can be exposed, each with its own particular exploits and consequences. This article will focus on what we have categorized as “systems information,” data that describes digital operations, such as systems inventory, configuration details, data center and cloud design, performance metrics and analyses, application code, and IT business data, such as equipment spend, vendor discount, and budgeting. By better understanding what this data is, why it matters, and what the potential consequences of its exposure are, we can more effectively act to control sensitive information and prevent future data breaches.


          Exploiting ergodicity of the logistic map using deep-zoom to improve security of chaos-based cryptosystems. (arXiv:1808.02949v1 [cs.CR])      Cache   Translate Page   Web Page Cache   

Authors: Jeaneth Machicao, Marcela Alves, Murilo S. Baptista, Odemir M. Bruno

This paper explores the deep-zoom properties of the chaotic k-logistic map, in order to propose an improved chaos-based cryptosystem. This map was shown to enhance the random features of the Logistic map, while at the same time reducing the predictability about its orbits. We incorporate its strengths to security into a previously published cryptosystem to provide an optimal pseudo-random number generator (PRNG) as its core operation. The result is a reliable method that does not have the weaknesses previously reported about the original cryptosystem.


          Exploiting Effective Representations for Chinese Sentiment Analysis Using a Multi-Channel Convolutional Neural Network. (arXiv:1808.02961v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Pengfei Liu, Ji Zhang, Cane Wing-Ki Leung, Chao He, Thomas L. Griffiths

Effective representation of a text is critical for various natural language processing tasks. For the particular task of Chinese sentiment analysis, it is important to understand and choose an effective representation of a text from different forms of Chinese representations such as word, character and pinyin. This paper presents a systematic study of the effect of these representations for Chinese sentiment analysis by proposing a multi-channel convolutional neural network (MCCNN), where each channel corresponds to a representation. Experimental results show that: (1) Word wins on the dataset of low OOV rate while character wins otherwise; (2) Using these representations in combination generally improves the performance; (3) The representations based on MCCNN outperform conventional ngram features using SVM; (4) The proposed MCCNN model achieves the competitive performance against the state-of-the-art model fastText for Chinese sentiment analysis.


          Passive Compliance Control of Aerial Manipulators. (arXiv:1808.03037v1 [cs.RO])      Cache   Translate Page   Web Page Cache   

Authors: Min Jun Kim, Ribin Balachandran, Marco De Stefano, Konstantin Kondak, Christian Ott

This paper presents a passive compliance control for aerial manipulators to achieve stable environmental interactions. The main challenge is the absence of actuation along body-planar directions of the aerial vehicle which might be required during the interaction to preserve passivity. The controller proposed in this paper guarantees passivity of the manipulator through a proper choice of end-effector coordinates, and that of vehicle fuselage is guaranteed by exploiting time domain passivity technique. Simulation studies validate the proposed approach.


          Efficient Outlier Removal for Large Scale Global Structure-from-Motion. (arXiv:1808.03041v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Fei Wen, Danping Zou, Rendong Ying, Peilin Liu

This work addresses the outlier removal problem in large-scale global structure-from-motion. In such applications, global outlier removal is very useful to mitigate the deterioration caused by mismatches in the feature point matching step. Unlike existing outlier removal methods, we exploit the structure in multiview geometry problems to propose a dimension reduced formulation, based on which two methods have been developed. The first method considers a convex relaxed $\ell_1$ minimization and is solved by a single linear programming (LP), whilst the second one approximately solves the ideal $\ell_0$ minimization by an iteratively reweighted method. The dimension reduction results in a significant speedup of the new algorithms. Further, the iteratively reweighted method can significantly reduce the possibility of removing true inliers. Realistic multiview reconstruction experiments demonstrated that, compared with state-of-the-art algorithms, the new algorithms are much more efficient and meanwhile can give improved solution. Matlab code for reproducing the results is available at \textit{https://github.com/FWen/OUTLR.git}.


          On Minimizing Energy Consumption for D2D Clustered Caching Networks. (arXiv:1808.03050v1 [cs.DC])      Cache   Translate Page   Web Page Cache   

Authors: Ramy Amer, M. Majid Butt, Hesham ElSawy, Mehdi Bennis, Jacek Kibiłda, Nicola Marchetti

We formulate and solve the energy minimization problem for a clustered device-to-device (D2D) network with cache-enabled mobile devices. Devices are distributed according to a Poisson cluster process (PCP) and are assumed to have a surplus memory which is exploited to proactively cache files from a library. Devices can retrieve the requested files from their caches, from neighboring devices in their proximity (cluster), or from the base station as a last resort. We minimize the energy consumption of the proposed network under a random prob- abilistic caching scheme, where files are independently cached according to a specific probability distribution. A closed-form expression for the D2D coverage probability is obtained. The energy consumption problem is then formulated as a function of the caching distribution, and the optimal probabilistic caching distribution is obtained. Results reveal that the proposed caching distribution reduces energy consumption up to 33% as compared to caching popular files scheme.


          A Hybrid Dynamic-regenerative Damping Scheme for Energy Regeneration in Variable Impedance Actuators. (arXiv:1808.03143v1 [cs.SY])      Cache   Translate Page   Web Page Cache   

Authors: Fan Wu, Matthew Howard

Increasing research efforts have been made to improve the energy efficiency of variable impedance actuators (VIAs) through reduction of energy consumption. However, the harvesting of dissipated energy in such systems remains underexplored. This study proposes a novel variable damping module design enabling energy regeneration in VIAs by exploiting the regenerative braking effect of DC motors. The proposed damping module uses four switches to combine regenerative and dynamic braking, in a hybrid approach that enables energy regeneration without reduction in the range of damping achievable. Numerical simulations and a physical experiment are presented in which the proposed module shows an optimal trade-off between task performance and energy efficiency.


          ARQ with Cumulative Feedback to Compensate for Burst Errors. (arXiv:1808.03153v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Derya Malak, Muriel Medard, Edmund M. Yeh

We propose a cumulative feedback-based ARQ (CF ARQ) protocol for a sliding window of size 2 over packet erasure channels with unreliable feedback. We exploit a matrix signal-flow graph approach to analyze probability-generating functions of transmission and delay times. Contrasting its performance with that of the uncoded baseline scheme for ARQ, developed by Ausavapattanakun and Nosratinia, we demonstrate that CF ARQ can provide significantly less average delay under bursty feedback, and gains up to about 20% in terms of throughput. We also outline the benefits of CF ARQ under burst errors and asymmetric channel conditions. The protocol is more predictable across statistics, hence is more stable. This can help design robust systems when feedback is unreliable. This feature may be preferable for meeting the strict end-to-end latency and reliability requirements of future use cases of ultra-reliable low-latency communications in 5G, such as mission-critical communications and industrial control for critical control messaging.


          Bayesian bandits: balancing the exploration-exploitation tradeoff via double sampling. (arXiv:1709.03162v2 [stat.ML] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Iñigo Urteaga, Chris H. Wiggins

Reinforcement learning studies how to balance exploration and exploitation in real-world systems, optimizing interactions with the world while simultaneously learning how the world operates. One general class of algorithms for such learning is the multi-armed bandit setting. Randomized probability matching, based upon the Thompson sampling approach introduced in the 1930s, has recently been shown to perform well and to enjoy provable optimality properties. It permits generative, interpretable modeling in a Bayesian setting, where prior knowledge is incorporated, and the computed posteriors naturally capture the full state of knowledge. In this work, we harness the information contained in the Bayesian posterior and estimate its sufficient statistics via sampling. In several application domains, for example in health and medicine, each interaction with the world can be expensive and invasive, whereas drawing samples from the model is relatively inexpensive. Exploiting this viewpoint, we develop a double sampling technique driven by the uncertainty in the learning process: it favors exploitation when certain about the properties of each arm, exploring otherwise. The proposed algorithm does not make any distributional assumption and it is applicable to complex reward distributions, as long as Bayesian posterior updates are computable. Utilizing the estimated posterior sufficient statistics, double sampling autonomously balances the exploration-exploitation tradeoff to make better informed decisions. We empirically show its reduced cumulative regret when compared to state-of-the-art alternatives in representative bandit settings.


          Security: Doing Whatever is Needed... and Not a Thing More!. (arXiv:1802.08915v2 [cs.CR] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Omer Katz, Benjamin Livshits

As malware, exploits, and cyber-attacks advance over time, so do the mitigation techniques available to the user. However, while attackers often abandon one form of exploitation in favor of a more lucrative one, mitigation techniques are rarely abandoned. Mitigations are rarely retired or disabled since proving they have outlived their usefulness is often impossible. As a result, performance overheads, maintenance costs, and false positive rates induced by the different mitigations accumulate, culminating in an outdated, inefficient, and costly security solution.

We advocate for a new kind of tunable framework on which to base security mechanisms. This new framework enables a more reactive approach to security allowing us to optimize the deployment of security mechanisms based on the current state of attacks. Based on actual evidence of exploitation collected from the field, our framework can choose which mechanisms to enable/disable so that we can minimize the overall costs and false positive rates while maintaining a satisfactory level of security in the system.

We use real-world Snort signatures to simulate the benefits of reactively disabling signatures when no evidence of exploitation is observed and compare them to the costs of the current state of deployment. Additionally, we evaluate the responsiveness of our framework and show that in case disabling a security mechanism triggers a reappearance of an attack we can respond in time to prevent mass exploitation.

Through large-scale simulations that use integer linear and Bayesian solvers, we discover that our responsive strategy is both computationally affordable and results in significant reductions in false positives (~20% over traces that are about 9 years long), at the cost of introducing a moderate number of false negatives. Finding the optimal sampling strategy takes less than 2.5 minutes in the vast majority of cases.


          The C.O.W.S. THE AUTOBIOGRAPHY OF MALCOLM X Part III      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the third study session on one of the most popular biographies ever published, The Autobiography of Malcolm X: As Told To Alex Haley (1965). Whites invested a massive amount of time and energy promoting incorrect information and propaganda for the 50th anniversary of the assassination of Minister Malcolm X. CNN delivered a new documentary which significantly minimized the role of COINTELPRO, and Malcolm's daughter, Ilyasah Shabazz, and comrades delivered excellent commentary on the legacy and lessons of El Hajj Malik Shabazz. Last week's session explored Malcolm's early experience in Boston. He acknowledges the self-hate that motivated him to chemically mutilate his hair and his obsession with nightlife and partying. White sexual predators descended on black clubs and dances, and Minister Malcolm was sexually exploited by a White Woman when he was still a minor. He offers explicit details on his employment with the railroad and how performing for Whites could boost a black person's career. As we continue, listeners are advised to keep this text in mind when searching for patience to share with black people. INVEST in The COWS - http://tiny.cc/ledjb CALL IN NUMBER: 760.569.7676 CODE 564943# SKYPE: FREECONFERENCECALLHD.7676 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. Compensatory Call-In 02/28/15      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the weekly Compensatory Call-In. We encourage non-white listeners to dial in with their codified concepts, new terms, observations, research findings, workplace problems or triumphs, and/or suggestions on how best to Replace White Supremacy With Justice ASAP. We'll use these sessions to hone our use of words as tools to reveal truth, neutralize White people. We'll examine news reports from the past seven days and - hopefully - promote a constructive dialog. #ANTIBLACKNESS Black History Month 2015 concluded in sorrowful manner with the death of Dori Maynard; she was a brilliant continuation of the legacy of black journalists. Black thespians tolerated the Academy Awards' annual homage to White Supremacy entertainment with pale mitts clutching almost all the hardware and Patricia Arquette reminding us how White Women have labored for "people of color." Shameless White cliques pretended to revere Minister Malcolm X on the anniversary of his assassination. However, no one cited his analysis of White sexual perversion and White Women rapists who sexually exploited black males. Rodney Reed, a black death row inmate of Texas, asserts that his consensual and tragic sexual arrangement with a White Woman resulted in his wrongful rape conviction and possible execution. The windy city of Chicago had much to say about the mayoral election and an injured black athlete; there was comparative lockjaw about allegations of systemic torture and constitutional violations by the Chicago Police Department. #AnswersForMiriamCarey INVEST in The COWS - http://tiny.cc/ledjb CALL IN NUMBER: 760.569.7676 CODE 564943# SKYPE: FREECONFERENCECALLHD.7676 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. w/ CHICAGO RACISM: Beryl Satter      Cache   Translate Page   Web Page Cache   
Beryl Satter visits The Context of White Supremacy. Dr. Satter is a professor of history at Rutgers University in New Jersey, and her work was rewarded with a 2015 Guggenheim Grant. We'll examine her 2009 publication: Family Properties: Race, Real Estate and the Exploitation of Black Urban America. Ta-Nehisi Coates referenced this text in his prominently discussed analysis of why black people should be granted immense compensation for the terrorism Whites have subjected us to. Satter provides a comprehensive, blistering indictment of White real estate practices which restricted Chicago's black housing to horrendous areas with poor services and astronomical insurance rates. Black people were financially raped for the privilege of living in squalor; the Federal Housing Administration refused to issue home loans for black people. So White predators sold inferior housing to black people... after marking up the price as much as 100%. We'll see if Dr. Satter confirms N.D.B. Connolly's and Andrew Kahrl's assessment that Whites have become increasingly efficient as confiscating black property. INVEST in The COWS - http://tiny.cc/ledjb CALL IN NUMBER: 760.569.7676 CODE 564943# SKYPE: FREECONFERENCECALLHD.7676 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          Car thieves exploit naive car owners      Cache   Translate Page   Web Page Cache   
New research shows leaving your car even for just a few minutes could cost you dearly.
          The C.O.W.S. BEN TILLMAN AND THE RECONSTRUCTION OF WHITE SUPREMACY Part III      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the 3rd study session on Stephen Kantrowitz's, Ben Tillman And The Reconstruction of White Supremacy. Benjamin "Pitchfork" Tillman is one of South Carolina's most revered sons. He's a former governor, US senator, co-founder of Clemson University and Winthrop University, and a "noted white supremacist who unapologetically advocated lynching any black who tried to vote." He gloated about torturing black citizens and inspired White Supremacist legal codes across the country. The June 17th Terrorist assault on Mother Emanuel A.M.E. placed South Carolina under colossal scrutiny. This week, in what's being hailed a monumental victory, Governor Nikki Haley and the South Carolina legislature banished the Confederate flag from the Capitol grounds. Tillman's array of shrines remain untouched. Last week's session described the angst of White South Carolinians following their Civil War defeat. Men like Ben Tillman organized gun clubs to intimidate, harass and murder allegedly free black citizens. White Supremacists orchestrated an array of terrorist attacks - including the 1876 assassination of State Senator Benjamin F. Randolph. Even White people were harassed and killed for failure to champion black exploitation. This text will provide an accurate historical context for the production, deeds and predictability of Dylann Storm Roofs. INVEST in The COWS - http://tiny.cc/ledjb CALL IN NUMBER: 760.569.7676 CODE 564943# SKYPE: FREECONFERENCECALLHD.7676 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. Global Sunday Talk On Racism 08/16/15      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts our once a month Global Sunday Talk On Racism. This broadcast is specifically designed to encourage participation from listeners outside the US and loyal listeners who're unable to join in our usual evening broadcasts. Channy will update us on how her White mother has been practicing Racism and her observations on Workplace Racism. We'll also review the Jonathan Ferrell manslaughter trial, the significance of the NWA biopic, and Prince's commentary on the exploitation of black artists. Observations on Hurricane Katrina are encouraged throughout the month. INVEST in The COWS - http://tiny.cc/ledjb CALL IN NUMBER: 760.569.7676 CODE 564943# SKYPE: FREECONFERENCECALLHD.7676 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. w/ Pam (Black Love Is A Revolutionary Act)      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy welcomes the return of Pam. A co-author at Trojan Horse Press, Pam manages the Racism Is WS website and is the main contributor for a collection of counter-racist texts, including Black Love Is A Revolutionary Act and The Beauty Con Game. We'll review how a better understanding of Racism altered her spending habits and economic practices. Racists routinely encourage non-white people to make shoddy financial decisions - when they aren't directly plundering and exploiting black people. We'll also inspect the ongoing attack on Chicago Public Schools and Minister Farrakhan's "Justice Or Else" march in Washington, D.C. #AnswersForMiriamCarey INVEST in The COWS - http://tiny.cc/ledjb CALL IN NUMBER: 641.715.3640 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. KATRINA: AFTER THE FLOOD Part VIII      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the 8th study session on Gary Rivlin's Katrina: After The Flood. Mr. Rivlin is a White man; while working for the New York Times he reported on the catastrophic engineering failure and negligence that destroyed New Orleans in August of 2005. His 2015 bestseller unpacks a decade of asymmetrical "recovery." To be frank, ten years of black New Orleanians being racially dislocated and purposely impeded from rebuilding their lives. Rivlin examines all areas of people activity: the institution of charter schools, the destruction of public housing, and the looting of funds designated for flood victims. Last week's session revealed the pitiful condition of the city 8 months after the storm. Many black residential areas remained deserted, without electricity, water or even traffic lights. Hoards of Whites hoped to exploit the depoluated town by thwarting Ray Nagin's bid for re-election. Ron Foreman, Jimmy Reiss, Boyse Bollinger, Ashton Phelps and other Whites who bankrolled Nagin's path to city hall, now worked to toss him out with Katrina's debris. We hope this text will offer a more complete understanding of Hurricane Katrina and it's aftermath as a meticulously planned campaign of genocide against black New Orleanians. #AnswersForMiriamCarey INVEST in The COWS - http://tiny.cc/ledjb CALL IN NUMBER: 641.715.3640 CODE: 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. MEDICAL APARTHEID Part VII      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the 7th study session on Harriet A. Washington's extraordinary text, Medical Apartheid: The Dark History Of Medical Experimentation On Black Americans From Colonial Times To Present. Washington's brilliant work uncovers deliberate, premeditated exploitation of black bodies under the guise of "science." Washington's research should drastically shift how black people process the scientific developments of whitefolks - like the "crispr" gene editing technology and DNA tracing websites that stockpile genetic material. Last week's session offered an impressive assessment of the Tuskegee Syphilis Experiment. Washington reminded us that Nurse Eunice Rivers is the name most often linked with the study, but she was one of the least powerful, least educated members of the mostly White male staff that orchestrated this punative exercise. Washington also questioned the ultimate purpose of this 40 year exercise. Were Whites using these black males to keep a fresh culture of the virus for further research? In chapter eight, she deconstructs the history of eugenics and the willful effort to control and minimize the birthrate of non-white people. Margaret Sanger was a seminal figure in this movement. Medical Apartheid should be mandatory reading for attempted counter-racists and all black people. #AnswersForMiriamCarey INVEST in The COWS - http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. MEDICAL APARTHEID Part VIII      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the 8th study session on Harriet A. Washington's marvelous text, Medical Apartheid: The Dark History Of Medical Experimentation On Black Americans From Colonial Times To Present. Washington's brilliant work exposes deliberate, premeditated exploitation of black bodies under the guise of "science." Washington's research should drastically alter black people's interpretation of the scientific developments of whitefolks - like the "crispr" gene editing technology and DNA tracing websites that stockpile genetic material. Last week's exploration of Eugenics and the Racist contempt for black reproductive rights delivered the most powerful sentences of the book: â??Within a century, reproductive coercion had taken a 180-degree turn for black women. During slavery, black women had been forced to procreate, but now they were being forced into sterility. The consistent factor was white control.â?? Washington further explained how the military disproportionately subjected black people to dangerous radiation and examined the urine and feces of black people to learn all they could to maintain White domination. Medical Apartheid should be required reading for attempted counter-racists and all black people. #RacismIsNotAPrivilege INVEST in The COWS - http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. MEDICAL APARTHEID Part IX      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the 9th study session on Harriet A. Washington's remarkable work, Medical Apartheid: The Dark History Of Medical Experimentation On Black Americans From Colonial Times To Present. Washington's awesome research uncovers intentional, premeditated exploitation of black bodies under the guise of "science." Washington's book should permanently alter black people's interpretation of the scientific developments of whitefolks - like the "crispr" gene editing technology and DNA tracing websites that hoard genetic material. Last week's session explored how black prisoners were disproportionately targeted for treacherous experiments when they could not give consent free from coercion. In one of the most important segments of the book, Washington explained how the CIA tested drugs that "could cause 'loss of speech, loss of sensitivity to pain, loss of memory, loss of will power and an increase in toxicity in persons with a weak type of central nervous system.' They tested the drug exclusively on African American prisoners, whom Harry Bailey routinely referred to as 'niggers,' at the Louisiana State Penitentiary." This book should be mandatory reading for all individuals classified as black. #RacismIsNotAPrivilege INVEST in The COWS -http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. w/ Dr. Niyana Rasayon Part XI      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy welcomes the return of Dr. Niyana Rasayon [http://eyesofmaat.com/]. A Behavioral Neuroscientist, Neuropsychologist, and North Carolina A&T alumnus, Dr. Rasayon is also an educator, author and father. Dr. Rasayon has written two books: Reality Check: A Manuel for the Hue-Man Octahedron & The Mystery of Melain and The Awakening: OMG The President is Black. For some reason, Dr. Rasayon's visits to The C.O.W.S. have frequently coincided with mass shootings. We'll certainly get his thoughts on the Orlando, Florida slaughter and how Racists will exploit this event. We're especially excited to hear his thoughts on this incident being simultaneous with the one year anniversary of the Charleston, South Carolina White Terrorist attack. We'll get Dr. Rasayon's perspective on the crushing losses of 2016: Dr. Frances Cress Welsing, Prince, and Muhammad Ali. He referred to this as a spiritual trilogy: the black mother, the black prince, and black manhood. #RacismIsNotAPrivilege INVEST in The COWS â?? http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. MEDICAL APARTHEID Part X      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the 10th study session on Harriet A. Washington's awesome publication, Medical Apartheid: The Dark History Of Medical Experimentation On Black Americans From Colonial Times To Present. Washington's epic research unearths intentional, premeditated exploitation of black bodies under the guise of "science." Washington's book should permanently recalibrate black people's understanding of the scientific developments of whitefolks - like the "crispr" gene editing technology and DNA tracing websites that stockpile genetic material. Last week's session reminded us that black children are not safe from the savagery of Racist brutes. Washington documented how Whites continued to insist that there was a racial correlation between melanin and crime. The criminalization of black people justified all manner of atrocious experiments that exclusively targeted black children. Washington stressed that Whites found numerous ways to deceive black parents about the nature of these studies so they couldn't make an informed decision about their child's participation. Medical Apartheid should be required reading for any and all black people. #RacismIsNotAPrivilege INVEST in The COWS - http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. BLOOD BROTHERS Part IV      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the 4th study session on Randy Roberts' and Johnny Smith's 2016 release, Blood Brothers: The Fatal Friendship Between Muhammad Ali and Malcolm X. The book debuted months before the passing of Ali. Roberts and Smith, both Racist Suspects, investigate the growth and termination of Ali and Minister Malcolm's relationship and how their bond deteriorated as Minister Malcolm's rupture from Elijah Muhammad and the Nation of Islam became permanent. Regrettably, Ali was unable to reconcile things with Malcolm before his 1965 assassination. Last week's session again stressed the gargantuan surveillance apparatus targeting Minister Malcolm and the Nation of Islam. Paid informants, FBI agents and local police officers kept a detailed log of NOI activities and potential conflicts which could be exploited. The book also described how Ali had been keenly interested in the teachings of Elijah Muhammad and Minister Malcolm well before he owned the heavyweight championship. The authors also devoted a good bit of attention to the champion Ali (Cassius Clay) would eventually dethrone, Sonny Liston. White gangsters ruled his career and financially plundered the illiterate prizefighter. Unfortunately, Clay engaged in a sizable amount of anti-black name calling in the build-up to their brawl. This book should illustrate the monumental importance of not name-calling other black people. As the authors of this book are both White, listeners should pay particular attention to word choice and possible Racist influence on the narrative. #RacismIsNotAPrivilege INVEST in The COWS - http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. THE SPOOK WHO SAT BY THE DOOR Part 2      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the 2nd study session on Sam Greenlee's 1969 exemplary novel, The Spook Who Sat By The Door. The best seller was adapted to major motion picture in 1973 and remains an awesome literary commentary on Racism. Greenlee died in 2014. The main character, Dan Freeman, becomes the first black employee at the Central Intelligence Agency (CIA). Freeman acquires as much knowlesge and expertise as possible in order to share this information with terrorized black people, so that they can organize a counter-violence offensive against White Supremacy. Last week's session detailed how a Racist politician seeking re-election accused the CIA of discriminatory hiring practices because they had no Negro agents. In response, the CIA assembled a cadrel of black recruits - including Freeman. Greenlee contrasts Freeman with the other black candidates, underlining their shallow ambitions for material and economic comfort. Freeman exemplifies counter-racist codification: adhering to his well constructed plan, not retaliating when insulted by Whites or blacks, and attempting to learn as much as possible. Early in the text, Greenlee foregrounds the frequency and harm inflicted by Whites sexually exploiting black people. Dr. Niyana Rasayon and others note that the FBI continues to use the book to train new agents. #RacismIsNotAPrivilege INVEST in The COWS - http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. Compensatory Call-In 11/05/16      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the weekly Compensatory Call-In. We encourage non-white listeners to dial in with their codified concepts, new terms, observations, research findings, workplace problems or triumphs, and/or suggestions on how best to Replace White Supremacy With Justice ASAP. We'll use these sessions to hone our use of words as tools to reveal truth, neutralize White people. We'll examine news reports from the past seven days and - hopefully - promote a constructive dialog. #ANTIBLACKNESS Whites let it hang out for Halloween 2016. An NCAA football spectator brandished an effigy of President Obama being lynched - he was allowed to remain at the ball game. A University of Arkansas student dressed in blackface as Bill Cosby - he was expelled. Speaking of ghouls and tricks, the 2016 presidential election is hours from a merciful conclusion. The trend of black people being bullied and exploited throughout the campaign continued as a Mississippi black church was vandalized; "Vote Trump" was scrawled across the sanctuary. White terrorists didn't restrict their barbarism to black places of worship, two White Iowa police officers were reportedly killed by a White man. The suspected gunman, Scott Michael Greene, was "detained without incident;" law enforcement apparently didn't feel threatened or concerned for their safety even though Greene had a history of confrontations with police - including being ejected from a high school football game for brandishing a confederate flag and berating black spectators. #AnswersForMiriamCarey INVEST in The COWS - http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. THE DELECTABLE NEGRO Part 2      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the 2nd study session on Vincent Woodard's The Delectable Negro: Human Consumption and Homoeroticism within US Slave Culture. Mr. Woodard passed away in 2008, but his work was posthumously published in 2014. NYU Press describes the void this book written to fill; "Scholars of US and transatlantic slavery have largely ignored or dismissed accusations that Black Americans were cannibalized." Woodard excavates primary sources, like the writings of Frederick Douglass and Harriet Jacobs, as well as antebellum black newspapers and slave advertisements. Last week's session provided a comprehenisve outline of what The Delectable Negro intends to cover. There was a particular emphasis on the sexual and exploitative environment of the plantation, the colony, the world. The introduction assertively concludes that enslavement and colonization of dark people was a sexually gratifying experience for Whites. Male and female black bodies were literally and figuratively devoured. Many themes explored in this book are staple elements of White culture, visible in the 21st century - like convicted serial killer Jeffrey Dahmer or the delicious "black man cookies". #AnswersForMiriamCarey INVEST in The COWS - http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. Super Bowl LI, Dr. Frances Cress Welsing Re-visted      Cache   Translate Page   Web Page Cache   
While the much of the planet locks in for Super Bowl 51, The Context of White Supremacy re-visits attempted counter-racist and third generation psychiatrist Dr. Frances Cress Welsing. Author of The Isis Papers and founder of the Cress-Welsing Institute of Psychiatry and Social Research, Dr. Frances Cress Welsing visited The C.O.W.S. for Dr. Martin Luther King Jr.'s 2012 holiday. The subject of her visit was the cycle of White predators hunting and consuming black people. We examined the cases of Jeffrey Dahmer and Jerry Sandusky. Dahmer was convicted of butchering, sexually exploiting, and eating the melanated bodies of his Wisconsin victims. Sandusky was convicted of raping an untold number of children over a number of years; there's suspicion that Sandusky specifically violated black children. This discussion is significant for our current review of Vincent Woodard's The Delectable Negro. Use your mute button if you must devour the ball game while digesting Dr. Welsing's teachings. #AnswersForMiriamCarey INVEST in The COWS - http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. Compensatory Call-In 04/22/17      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the weekly Compensatory Call-In. We encourage non-white listeners to dial in with their codified concepts, new terms, observations, research findings, workplace problems or triumphs, and/or suggestions on how best to Replace White Supremacy With Justice ASAP. We'll use these sessions to hone our use of words as tools to reveal truth, neutralize White people. We'll examine news reports from the past seven days and - hopefully - promote a constructive dialog. #ANTIBLACKNESS Fox News figurehead, Suspected Racist, and accused sexual predator Bill O'Reilly was terminated from his television broadcast position. He reportedly cashed out with more than $25 million in severance. Apparently, the 53% of White Women voters who supported Donald Trump were unwilling to help O'Reilly keep his job. Speaking of criminals, In California, a black male, Kori Ali Muhammad, allegedly killed three Whites as an expression of his fury about Racism. This coincidentally occurred on the same day of the debut showing of John Singleton's documentary on the 1992 Los Angeles Riots. The film depicted a number of Black Californians who voiced similar rage at White Supremacists. Other racist viewing options from the week include the premier of HBO's documentary on the medical exploitation of Henrietta Lacks, who had her genetic material stolen without her consent. On the opposite side of the earth, the French presidential election is this weekend, and the country may be poised to do what the United States wouldn't: elect a White Woman. Gus remains confident Marine Le Pen will be snatch the brass ring. #AnswersForMiriamCarey INVEST in The COWS - http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          The C.O.W.S. w/ Dr. Tommy Curry Part 9      Cache   Translate Page   Web Page Cache   
Dr. Tommy Curry returns to The Context of White Supremacy. An associate professor in the Department of Philosophy at the University of Texas A&M, Dr. Curry's research interests include philosophy, jurisprudence, Africana Studies, and Gender Studies. His primary area of study is Critical Race Theory and Africana Philosophy. We're eager to investigate Dr. Curry's new book, The Man-Not: Race, Class, Genre, and the Dilemmas of Black Manhood. The text examines how the suffering of black males is disregarded and minimized. Dr. Curry writes that contrary to claims that too much attention is given to plight of black males - at the expense of Black females, centuries of sexual violence, economic exploitation, and incarceration are poorly understood and buried. Deviating from popular theories, The Man-Not posits that the System of White Supremacy denies Black males the chance to engage in patriarchy. As such, popular models that insist black males are in cahoots with White men to persecute all women, fail to recognize the infinite ways white women and men neutralize black agency in all area of people activity. #AnswersForMiriamCarey INVEST in The COWS - http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943#
          The C.O.W.S. Frantz Fanon: The Wretched of the Earth Part 5      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the 5th study session on Frantz Fanon's 1961 seminal book, The Wretched of the Earth. Born in Martinique in 1925, Fanon is an internationally admired psychiatrist who committed his brief 36 years of life to ending White rule. He fought for Algerian independence from French colonial oppression and black liberation world wide. Fanon also authored Black Skin, White Mask, which is a psychoanalysis of the perversions and neurosis of sexual activity between Whites and black people. Interestingly, Fanon himself married a White woman. The writer and psychiatrist died from leukemia the same year The Wretched of the Earth was published. Last week's session explored the prospects and benefits of spontaneously retaliating against White rule. Significantly, Fanon noted that powerful Whites "analyze the forces of rebellion" aimed against their world empire. He also observed that Racists deployed armed White brutes and Christian missionaries to fortify their dominion over Black people. Fanon consistently acknowledged the astuteness of White Supremacy, pointing out that Whites are skillfully able to fake the appearance of racial progress, while perpetuating the exploitation of Black people. #AnswersForMiriamCarey INVEST in The COWS - http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943#
          The C.O.W.S. Frantz Fanon: The Wretched of the Earth Part 3      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the third study session on Frantz Fanon's 1961 landmark book, The Wretched of the Earth. Born in Martinique in 1925, Fanon became globally recognized psychiatrist and committed his 36 years of life to ending White rule. He fought for Algerian independence from French colonial oppression and black liberation world wide. Fanon also authored Black Skin, White Mask, which is a psychoanalysis of the perversions and neurosis of sexual activity between Whites and black people. Interestingly, Fanon himself was married to a White woman. The writer and psychiatrist died from leukemia the same year The Wretched of the Earth was published. Last week's session detailed how colonized people remain stressed and tense as a result of White domination. Fanon writes that for the native, "the electrode [remains] at his genitals," meaning that he is constantly subjected to lethal, sexually exploitative violence. Fanon described how employing counter-violence against Whites helped bring about justice and the humanity of black people. #AnswersForMiriamCarey INVEST in The COWS - http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943#
          The C.O.W.S. Compensatory Call-In 02/10/18      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy hosts the weekly Compensatory Call-In. We encourage non-white listeners to dial in with their codified concepts, new terms, observations, research findings, workplace problems or triumphs, and/or suggestions on how best to Replace White Supremacy With Justice ASAP. We'll use these sessions to hone our use of words as tools to reveal truth, neutralize White people. We'll examine news reports from the past seven days and - hopefully - promote a constructive dialog. #ANTIBLACKNESS Black History Month 2018 began with the city of Philadelphia commemorating it's first Super Bowl championship - and promptly being chided by many news outlets for mobs of alleged Eagles's fans marauding and looting in the streets in honor of the football triumph. Automobile titan Dodge was also admonished for exploiting the legacy of the late Dr. Martin Luther King, Jr. in a Super Bowl advertisement peddling vehicles. The area of entertainment dominated the week with the release of Marvel's Black Panther. Much like the 2017 smash Get Out, the portrayal of black "superheroes" who use their time and energy in pursuit of justice is being promoted globally and critically acclaimed. Speaking of a "superhero," PBS released a superb documentary on South African freedom fighter Winnie Mandela. The film details her philosophy on counter-violence, her decades of service to counter-racism, and the strategic and international efforts Whites made to neutralize and dominate the Mandelas, all black people. Apartheid-style violence was on display in Gus's Seattle, Washington, where a black male was mauled with a baseball bat by White Terrorists. The Race Soldiers were allegedly motivated to violence because the black male was rumored to be sexually involved with a White Woman. INVEST in The COWS - http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943#
          The C.O.W.S. w/ Dr. Carolyn West: WHITE SUPREMACY and PORNOGRAPHY      Cache   Translate Page   Web Page Cache   
Dr. Carolyn West visits The Context of White Supremacy. Teaching a range of courses related to violence and sexuality, Dr. West investigates the long-term consequences of intimate partner violence and sexual assault as well as the hypersexualization of young women in the media. During our most recent discussion with Dr. Martin Kevorkian, he informed listeners about a superb lecture featuring Dr. West's research on White Supremacy in pornography. Her talk drew from content featured in her documentary film, "Let Me Tell Ya'll Bout Black Chics: Images of Black Women in Pornography." Dr. West used the documentary to expose the flagrant, racist sexual exploitation of black bodies. She also challenged White feminists, who speak loudly and often about the commodification of White Women, but remain mum regarding the porn industry's "sexual sewering" of black females and males. We'll ask Dr. West to speculate why White Supremacists harbor such an insatiable sexual desire for black people, who they consistently label as ignorant and primitive. #AntiBlackness INVEST in The COWS - http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943#
          The C.O.W.S. Reneathia Tate: Interracial Relationships Are SADD      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy welcomes the return of Reneathia Tate. Author of Pieces of a Puzzle, Ms. Tate uses counter-racist logic to assess the devastating consequences of non-white people engaging in sexual activity with Whites. Ms. Tate's book is a collection interviews with non-white females who engaged in sexual activity with White men. The females' reports share a number of tragic patterns, where White Men are able to exercise their power to exploit victims of Racism sexually. With the global attention on the so called "royal wedding," it seemed fitting to invite Ms. Tate back to examine the renewed insistence that "bedroom integration" will eliminate the System of White Supremacy and force Whites to treat black people in a just manner. We'll discuss the historically successful young adult novel The Hate U Give, which is allegedly about police terrorism against black people, but pivots to teenage, interracial soft-core pornography. #RoyalTragedy INVEST in The COWS - http://paypal.me/GusTRenegade CALL IN NUMBER: 641.715.3640 CODE 564943#
          8/10/2018: MÉDIAS ET TECH: Quantic Dream, expériences interactives      Cache   Translate Page   Web Page Cache   

JEUX VIDÉO Quantic Dream n’est pas de ces licornes qui défrayent la chronique avec des levées de fonds mirobolantes. Ni de ces studios qui sortent frénétiquement des produits exploitant à outrance des franchises souvent essoufflées. Elle est une PME à...
          The C.O.W.S. w/ Allen M. Hornblum: Sentenced To Science      Cache   Translate Page   Web Page Cache   
The Context of White Supremacy welcomes Mr. Allen M. Hornblum and Mr. Edward "Butch" Anthony. Mr. Hornblum is a White man whose research and policy interests focus on the exploited and leveling the political and economic playing field. His passion for revealing social inequities and instances of outright abuse resulted in his leaving his position in the Sheriff's Office to research and chronicle the history of the Holmesburg Prison medical experiments, which he had personally witnessed earlier in his career. Acres of Skin, Allen's groundbreaking investigation of this heinous chapter in American medical history - and the complicity of many penal systems across the country - has now become the classic work on the subject and a recipient of considerable media attention. We'll discuss his 2007 follow-up text, Sentenced To Science: One Black Man's Story Of Imprisonment In America. This text provides intimate details on the life and White Terrorism that Mr. Edward "Butch" Anthony was subjected. Anthony is a black male, former drug addict, convict and subject in numerous prison experiments. We'll hear details on how he and other black males were exploited by White scientists and how homosexual behavior was promoted by these sadistic "studies." INVEST in The COWS - http://tiny.cc/ledjb CALL IN NUMBER: 760.569.7676 CODE 564943# SKYPE: FREECONFERENCECALLHD.7676 CODE 564943# The C.O.W.S. archives: http://tiny.cc/76f6p
          CCHV : Modification des statuts / Recueil des actes administratifs      Cache   Translate Page   Web Page Cache   

Deux informations concernant la Communauté de Communes des Hautes Vosges : 1. Les statuts de la Communauté de Communes des Hautes Vosges ont été modifiés par arrêté préfectoral n°1731/2018, le 26 juillet 2018. La modification porte sur le transfert de la compétence « Établissement et exploitation d’infrastructures de réseaux de communications électroniques« , relatif à l’installation de la fibre optique […]

Cet article CCHV : Modification des statuts / Recueil des actes administratifs est apparu en premier sur Gerardmer info.


          Who’s the elite insider? McCaskill or Hawley      Cache   Translate Page   Web Page Cache   
Ever notice how politicians who haven’t anything much to deliver try to exploit “culture”? When Josh Hawley, Missouri’s current Attorney …

Continue reading


          ExploitedCollegeGirls - Eliza       Cache   Translate Page   Web Page Cache   
none
          Malwarebytes Anti-Exploit Premium 1.12.1.109 + Keygen      Cache   Translate Page   Web Page Cache   
Malwarebytes Anti-Exploit Premium 1.12.1.109 + Keygen Description: Malwarebytes Anti-Exploit Premium 1.12.1.109 + Keygen  , Popular software programs contain millions of line of code. Bad guys exploit flaws (vulnerabilities) in the code to deliver malware. Except when they can’t. Malwarebytes Anti-Exploit wraps three layers of security around popular browsers and applications, preventing exploits from compromising vulnerable […]
          KOREAN AIR - 1 Attaché Commercial et 1 Agent d'Escale H/F - (Paris 1er et CDG)      Cache   Translate Page   Web Page Cache   


http://www.tourmag.com/docs/emploi/KOREANLOGO.JPG#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

RECRUTE

UN ATTACHE COMMERCIAL H/F

Korean Air, compagnie aérienne coréenne est membre fondateur de Skyteam et dotée d’une flotte moderne de 173 appareils et exploite plus de 400 vols quotidiens vers 46 pays et 131 villes. KE relie Séoul à 14 villes européennes dont Paris en Airbus A380 en vol direct quotidien et en connexion vers l’Asie -Pacifique.

Korean Air recherche un attaché commercial pour assurer sa croissance en France et en Europe, fidéliser ses partenariats existants et contribuer à de nouveaux développements.

MISSION :


Rattaché à la Direction Commerciale, vos missions seront principalement :
- Représentation commerciale et promotion des produits/services de Korean Air
- Développement du chiffre d’affaires et des parts de marché des agences/TMC/entreprises
- Gestion d’un portefeuille clients agences/TMC/société/TO et mise en place d’un plan d’action de fidélisation et de prospection
- Prospection, négociation et finalisation des contrats commerciaux

PROFIL RECHERCHE :


- Formation supérieure commerciale/marketing niveau minimum Bac+3
- Première expérience commerciale, idéalement dans le transport aérien et tourisme
- Flexibilité et adaptabilité pour répondre aux exigences de notre industrie

COMPETENCES REQUISES :


- Réel sens commercial, aisance relationnelle et bonne connaissance du marché français
- Bonne capacité d’analyse, force de proposition et capacité à être autonome dès le départ
- Polyvalence en étroite collaboration avec tous les services Korean Air
- Anglais impératif écrit et oral
- Maîtrise des outils informatiques et en particulier d’un GDS (idéalement Amadeus)

CONDITIONS D’EMBAUCHE :


- Poste immédiatement disponible après approbation d’une période d’essai obligatoire
- Bureau basé au 9 boulevard Madeleine 75 001 Paris

 

UN AGENT D'ESCALE H/F

 

Poste basé à l’aéroport CDG2E
A POURVOIR IMMEDIATEMENT


La compagnie aérienne Korean Air recherche un AGENT D'ESCALE (H/F), poste basé aéroport CDG pour assurer son vol quotidien en A380
 

MISSION :
 

- Accueillir, orienter et informer les passagers
- Réaliser et superviser les opérations d'enregistrement, embarquement et débarquement
- Assister les passagers en correspondance
- Préparer et aider à la coordination des vols au départ et à l’arrivée pour le passage et la piste
- Suivi des activités administratives, opérationnelles et commerciales de l’escale

PROFIL RECHERCHE :


- Formation supérieure minimum niveau Bac +2
- Excellent niveau d’anglais. Coréen souhaité
- Première expérience dans le transport aérien
- Maîtrise des outils informatiques, connaissance GDS souhaitée

QUALITES REQUISES :


- Excellente présentation et élocution
- Grand sens du service client
- Excellence relationnelle et esprit d’équipe
- Rigueur, polyvalence, dynamisme et proactivité

CONDITIONS D’EMBAUCHE :

- Poste : à pourvoir immédiatement, basé à l'aéroport CDG T2E
- Horaires de travail : du lundi au dimanche, horaires décalés

DOCUMENTS A JOINDRE :

- CV en anglais et français (+ si possible, en coréen)
- Lettre de motivation en anglais et français (+ si possible, en coréen)

Intégrer une compagnie aérienne reconnue dans un environnement prometteur et passionnant vous attire ?
 

Merci d’envoyer votre CV + lettre de motivation
(en français et anglais) avant le 31 août 2018 à
 :
kalcontact.paris@gmail.com
 



          Chacun pour soi      Cache   Translate Page   Web Page Cache   

12€

Théâtre (broché). Paru en 07/2018

Chacun pour soi


François De Maigret

Lieu de confrontation d intérêts économiques, l entreprise devient rapidement le champ de conflits entre ses protagonistes. Au sein de la société de services en informatiques Creaneurosoft, l exploitation de l équivoque d une situation entre drague et harcèlement, va s avérer une opportunité de masquer une initiative de diminution des effectifs. Les ingrédients se conjuguent pour engendrer un irréparable. L absence de solidarité entre les salariés, le culte quasi obligatoire du Chacun pour soi mèneront alors vers la tragédie.



          Commentaires sur D’Israël à Haïti, le périple de l’israélien Fernand Cohen-Tannoudji pour Sauveteurs Sans Frontières par Saintil Rlee      Cache   Translate Page   Web Page Cache   
Je tient à applaudit et félicité le courage de monsieur Fernand le représentant de SSF Qui a bravé les danger et l'obstacle pour entré en Haïti ce jour ce n'étais seulement l'ecriteau qui avais sur ce mûr qui vous a donné le courage d'avancée il y avait cet immenses volontés d'aider les autres notre travail serais plus efficace en pensaient a votre exploits encore une fois bravo a vous et a toutes l'équipe de SSF ``Qui sauve une vie sauve lui même`` Saintil Rithzer-Lee président de CSPV (Compassion et secours pour la vie) représentant de SSF en Haïti **chak moun ou ede se tèt ou ede**
          Paris Musette      Cache   Translate Page   Web Page Cache   

23,99€

(CD album). 3 volumes

Paris Musette


L'Intégrale 1990-1997

Les 3 CD «Paris Musette» sont devenus les disques de référence de l’accordéon musette dans le monde entier. Initiées par Franck Bergerot et Didier Roussin pour le label créé par Patrick Tandin, ces productions avaient pour enjeu de donner les meilleures conditions d’enregistrements aux artistes majeurs d’un genre délaissé qui pourtant n’était rien d’autre que la World musique française d’avant et d’après-guerre. Paru en 1990 pour le volume 1, 1993 pour le volume 2, et 1997 pour le volume 3, ces disques furent un phénomène, relançant l’accordéon en France, au sein même des formations de World music, de jazz que de chansons françaises. Origine retrouvée, relégitimée dans un héritage populaire anobli, Paris Musette s’exporta aux États-Unis, au Canada et en Asie, avec de nombreuses tournées internationales, plus de 100 000 disques vendus et une licence au japon exploité par Sony. Patrick Frémeaux



          Box-office des films sortis le 8 août : le retour gagnant de "Neuilly sa mère, sa mère !"      Cache   Translate Page   Web Page Cache   
La suite de "Neuilly sa mère, sa mère !" remporte haut la main la course au box-office devant le film de science-fiction "Darkest Minds : Rébellion" et la comédie américaine "L'espion qui m'a larguée" portée par Mila Kunis et Kate McKinnon.La comédie française "Neuilly sa mère, sa mère !" arrive à la première place du box-office pour son premier jour d'exploitation. Avec 112.452 entrées, le film signé Gabriel Julien-Laferrière réalise un...
          Yes, it is happening here      Cache   Translate Page   Web Page Cache   
Yes, it is happening here

by digby



I know it's considered to be the very height of middle-aged Resistance hysteria to be concerned about Trump and impending fascism. But E.J. Dionne goes there today and I think it's a compelling case:
How do democratic countries get to the point where they give up on self-rule? Under what circumstances do demagogues capture large audiences through irrational, emotional appeals unmoored from fact, logic or morality? When do politicians responsible for maintaining a democratic system surrender to dictators? 
These questions are more pertinent to us in the early 21st century than we would wish. During the 1990s, democracy was thought to be on the march. Now, we worry that the international tide is turning toward autocracy and authoritarianism. This is why Benjamin Carter Hett’s “The Death of Democracy: Hitler’s Rise to Power and the Downfall of the Weimar Republic” should join your summer reading list. 
Hett is a professor of history at Hunter College and the City University of New York Graduate Center. He joins the company of distinguished scholars, notably Richard J. Evans and Ian Kershaw, who have shed light on the social and political forces that brought a murderous regime to life through a democratic system. 
But if this is an oft-told tragic tale, Hett’s brisk and lucid study offers compelling new perspectives inspired by current threats to free societies around the world. 
“In each era, we see the past differently, according to how we see ourselves and our own experiences,” Hett writes. “One era will notice things about the past that another will not. This is one reason why history is, and has to be, constantly rewritten.” 
It is both eerie and enlightening how much of Hett’s account rings true in our time. Consider this declaration from Joseph Goebbels, Adolf Hitler’s chief propagandist: “Certainly we want to build a wall, a protective wall.” There is this dolorous observation from the socialist Ernst Toller: “The people are tired of reason, tired of thought and reflection. They ask, what has reason done for us in the last few years, what good have insights and knowledge done us.” 
As Hett notes, “The key to understanding why many Germans supported [Hitler] lies in the Nazis’ rejection of a rational, factual world. . . . Hitler could give voice to this flight from reality as could no other German politician of his time.” 
The larger story he tells resonates, too. Hett argues the Nazi movement was “a response to an overwhelming triumph of global liberal capitalism at the end of the Great War” and that the logic of a chaotic moment “pushed opponents of austerity to become opponents of liberal democracy as well.” The Nazi movement was rooted in anti-Semitism, bigotry and exclusion. But it also exploited economic discontent bred by orthodox economic policies that deepened the pain of the Depression. 
Conservatives everywhere should ponder the choices made by the German establishment, including big business, the military, culturally traditional Protestants and big landowners. They all helped bring Hitler to power because they hated the left — including the moderate Social Democrats, the backbone of the Weimar Republic — more than they loved republican government and political freedom. 
Hett writes that members of “the conservative establishment . . . could have stopped Hitler in his tracks. Instead, they chose to use him, although the Nazi-conservative alliance was always an awkward one.” He notes at another point: “Democracy was not working for them precisely because their interests could not attract the support of a majority, even a large plurality, of voters.”
The politicians and power brokers who helped Hitler become chancellor believed they could deploy him to destroy the left, but also keep him under control. They achieved the first, but not the second. The consequences were catastrophic to those slaughtered in Hitler’s genocide, and to Germany as a whole. German conservatives had no desire to see their country pulverized by war and shrunken in size afterward. But their choices during the 1930s brought about exactly this outcome.
There is a reluctance to draw lessons from the Nazi experience because personal comparisons between contemporary politicians and Hitler are always a mistake. Hitler’s crimes are in a category of horror all their own. But this should not stop us from heeding the warnings of a political era that led to the collapse of freedom in Germany. Seeing it “as the result of a large protest movement colliding with complex patterns of elite self-interest, in a culture increasingly prone to aggressive mythmaking and irrationality . . . strips away the exotic and foreign look of swastika banners and goose-stepping Stormtroopers.” Hett adds: “Suddenly, the whole thing looks close and familiar.” 
He leaves out one important factor: left and center infighting. The communists and the liberals and the socialists were all obsessively fighting amongst themselves and consequently failed to form a solid resistance.

The good news is that this doesn't seem to be happening here at the moment. For all of the Democratic party's perpetual "disarray" it appears to be handling whatever ideological differences exist within it quite maturely and with a shared sense of purpose about the political crisis in which we find ourselves.

As Michelle Goldberg observed on MSNBC yesterday, a party that has a big majority with various factions is good problem to have in a democracy.

.
          How Mature Are Your Cyber Defender Strategies?       Cache   Translate Page   Web Page Cache   

Our latest research examines real-world vulnerability assessment practices at 2,100 organizations to understand how defenders are approaching this crucial step in cyber hygiene.

For our latest research study, "Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal," we explore how organizations are practicing vulnerability assessment (VA), and what these practices teach us about cyber maturity.

Our curiosity was piqued by our previous study, “Quantifying the Attacker's First-Mover Advantage,” which found it takes attackers a median of five days to gain access to a functioning exploit. In contrast, we learned, defenders take a median 12 days to assess for a vulnerability. The difference between the two results is a median seven-day window of opportunity for an attacker to strike, during which a defender isn’t even aware they’re vulnerable. This led us to consider how defenders are performing in the all-important discovery and assess phases of the Cyber Exposure Lifecycle.

Our Cyber Defender Strategies Report specifically focuses on key performance indicators (KPIs) associated with the Discover and Assess stages of the five-phase Cyber Exposure Lifecycle. During the first phase – Discover – assets are identified and mapped for visibility across any computing environment. The second phase – Assess – involves understanding the state of all assets, including vulnerabilities, misconfigurations, and other health indicators. While these are only two phases of a longer process, together they decisively determine the scope and pace of subsequent phases, such as prioritization and remediation.

We wanted to learn more about how end users are conducting vulnerability assessment in the real world, what this tells us about their overall maturity level, and how this varies based on demographics.

Cyber Defender Strategies: Understanding Vulnerability Assessment KPIs

For our Cyber Defender Strategies Report, we analyzed five key performance indicators (KPIs) based on real-world end user vulnerability assessment behavior. These KPIs correlate to four VA maturity styles: Diligent, Investigative, Surveying and Minimalist.

We discovered about half (48%) of the enterprises included in the data set are practicing very mature (exhibiting a Diligent or Investigative style) vulnerability assessment strategies. However, just over half (52%) exhibit moderate- to low-level VA maturity (exhibiting a Surveying or Minimalist style). We’ll tell you more about what all this means in a moment. First, let’s take a quick look at the methodology we applied to arrive at these results.

To identify our four VA Styles, we trained a machine learning algorithm called archetypal analysis (AA) with anonymized scan telemetry data from more than 2,100 individual organizations in 66 countries. We analyzed just over 300,000 scans during a three-month period from March to May 2018. We identified a number of idealized VA behaviors within this data set and assigned organizations to groups defined by the archetype to which they most closely relate. The vulnerability assessment characteristics for each defender style are described in the table below.

Four Vulnerability Assessment Styles: What They Reveal

VA Style

VA Maturity Level

Characteristics

Diligent

High

The Diligent conducts comprehensive vulnerability assessment, tailoring scans as required by use case, but only authenticates selectively.

Investigative

Medium to High

The Investigator executes vulnerability assessments with a high level of maturity, but only assesses selective assets.

Surveying

Low to Medium

The Surveyor conducts frequent broad-scope vulnerability assessments, but focuses primarily on remote and network-facing vulnerabilities.

Minimalist

Low

The Minimalist executes bare minimum vulnerability assessments, typically as required by compliance mandates.

Source: Tenable Cyber Defender Strategies Report, August 2018.

Here’s what we learned about each vulnerability assessment style:

  • Only five percent of enterprises follow the Diligent style, displaying a high level of maturity across the majority of KPIs. Diligent followers conduct frequent vulnerability assessments with comprehensive asset coverage, as well as targeted, customized assessments for different asset groups and business units.
  • Forty-three percent follow the Investigative style, indicating a medium to high level of maturity. These organizations display a good scan cadence, leverage targeted scan templates, and authenticate most of their assets.
  • Nineteen percent of enterprises follow the Surveying style, placing them at a low to medium maturity level. Surveyors conduct broad-scope assessments, but with little authentication and little customization of scan templates.
  • Thirty-three percent of enterprises are at a low maturity, following the Minimalist style and conducting only limited assessments of selected assets.

Tenable Cyber Defender Strategies Report: Key Findings

Tenable Cyber Defender Strategies Report Key Findings August 2018

Source: Tenable, Cyber Defender Strategies Report, August 2018.

Vulnerability Assessment Matters at Every Maturity Level

By now, you’re probably forming an opinion about how your vulnerability assessment strategies stack up. If your organization seems to be leaning toward the lower-maturity Surveying or Minimalist styles, fear not. There is nothing wrong with being at a low maturity. What is wrong is choosing to remain there.

If you’re a later adopter, it means you have more work to do to catch up. It also means you can learn from the mistakes and experiences of early adopters. Rather than having your organization serve as a testing bed for untried, novel and immature solutions, you’ll benefit from the availability of tried-and-tested offerings. There’s also an existing pool of expertise you can tap into, rather than trying to develop your strategies from scratch. Skipping the experimentation phase, you are poised to jump right into optimization and innovation.

And, if you identify with the most mature vulnerability assessment strategies highlighted here, it doesn’t mean you can take a lengthy sabbatical. Even the most sophisticated defenders know their work is never done.

The ultimate objective – regardless of which style most closely aligns to your own – is to always keep evolving toward a higher level of maturity. We know it isn’t easy. Cybersecurity professionals are hauling a lot of historical baggage. You’re dealing with legacy technology and dependencies alongside the complexities of managing a growing portfolio of continuously evolving and emerging technologies. Meanwhile, the threat environment has escalated noticeably over the past few years. And all of this is happening against a backdrop of competitive business pressures.

When it comes to cybersecurity, we have hit escape velocity, and most organizations now get it.

Our Cyber Defender Strategies Report provides recommendations for each VA style, to help you advance to the next maturity level. We also explore how these four VA styles are distributed across major industry verticals and by organization size, so you can compare yourself with your peers. Click to download the full report.

Learn More:


          The Daily Signal Podcast: Thursday, August 9      Cache   Translate Page   Web Page Cache   

Can drones be used for assassinations, terrorist attacks, and drug trafficking? The Heritage Foundation’s Jason Snead explains how drones are already being exploited by bad... Read More

The post The Daily Signal Podcast: Thursday, August 9 appeared first on The Daily Signal.


          Politicians exploit charter school’s step back from Pledge of Allegiance        Cache   Translate Page   Web Page Cache   
I stand for the pledge and always will, but it’s a symbolic act. I prefer people live American values rather than recite them. That comes in part from decades of writing about elected officials draping themselves in the flag while taking bribes and robbing taxpayers.
          Crazy gold stats as miners haul 21 tonnes      Cache   Translate Page   Web Page Cache   
Gold miners have hauled 21 tonnes in seven months to July 31 this year, shredding all records set since 2009, spurred by the exploits of small-scale miners who have delivered 13,5 tonnes.
          Bye, brokers: Hello, service providers      Cache   Translate Page   Web Page Cache   
Labour brokers were reined in by the Concourt, but they are already trying to exploit loopholes
          Ingénieur logiciel Operating System, SSI et réseaux (H/F) - Thales - Limours      Cache   Translate Page   Web Page Cache   
CE QUE NOUS POUVONS ACCOMPLIR ENSEMBLE :Notre ligne de produits REP (Radar Embedded Processing) se renforce pour faire face à de nouveaux projets liés à la cybersécurité, notamment, des systèmes d'exploitation Linux installés sur les calculateurs embarqués de traitement radar ainsi que des équipements de réseau installés dans nos systèmes.En nous rejoignant, vous vous verrez confier les missions suivantes : * Participer à l'analyse des besoins et des risques de sécurité avec les équipes...
          Child Protective Service Worker Trainee - State of West Virginia - West Virginia      Cache   Translate Page   Web Page Cache   
Learns to prepare safety, service, and/or treatment plans to remedy contributing problems and stop behavior patterns of abuse/neglect/exploitation and solicits... $27,732 - $51,312 a year
From State of West Virginia - Tue, 17 Apr 2018 19:18:26 GMT - View all West Virginia jobs
          Child Protective Service Worker - State of West Virginia - West Virginia      Cache   Translate Page   Web Page Cache   
Prepares safety, service, and/or treatment plans to remedy contributing problems and stop behavior patterns of abuse/neglect/exploitation and solicits family... $31,164 - $57,660 a year
From State of West Virginia - Tue, 17 Apr 2018 19:18:00 GMT - View all West Virginia jobs
          THE MURDER OF MARY MEYER      Cache   Translate Page   Web Page Cache   

On a chilly October 12, 1964 Monday morning, Mary Pinchot Meyer, a high-society socialite, (and also discovered paramour of the late assassinated President John F. Kennedy) became an assassination victim herself during her customary early morning walk to her art studio. 

Click here to enlarge top photo.

Author Peter Janney knew the Meyer family personally, as Janney’s father, Wistar Janney, was a career CIA operative and close friends with CIA chieftains Richard Helms, James Angleton, and Cord Meyer (Mary’s husband).  

“There was nothing pretty or easy about waking up early one morning in 2006 and finally realizing that my own father---Wistar Janney, a career high-level CIA officer---had been involved in the ‘termination’ of Mary Pinchot Meyer, someone I had grown to love and care about,” says Peter Janney.  “Yet there is another horror in the death of Mary Meyer, a horror that reaches far beyond the personal.  It is the intimate and undeniable connection between her murder and that of her lover, President John F. Kennedy, on November 22, 1963 in Dallas, Texas.”  

(Mary’s Mosaic, Peter Janney, Skyhorse Publishing, 307 West36th Street, 11th floor, New York, N.Y. 10018 
info@skyhorsepublishing.com, www.skyhorsepublishing.com, 2012, 548 pages, $26.95.)

For more information or to purchase this book from AMAZON.COM simply click on its title:  Mary's Mosaic: The CIA Conspiracy to Murder John F. Kennedy, Mary Pinchot Meyer, and Their Vision for World Peace
 

MISSING LINKS

Janney begins an excursion through the arrest and trial of a young twenty-five-year-old Raymond Crump, Jr., the accused murderer of Mary Meyer.  Under the skillful counsel of defense attorney Dovey Roundtree, Crump’s attorney was able to disintegrate the accusations and charges brought against her client.  Despite prosecution’s determined “declaration of war” on Ray Crump, Roundtree meticulously dodged and rebuffed the prosecution’s manipulations of justice.  On Friday, July 30, 1965, the jury found Raymond Crump, Jr., not guilty of the murder of Mary Pinchot Meyer.  Yet, Roundtree had discovered a deeper mystery in the forensic history.

Janney explains: “Dovey Roundtree never abandoned her belief that Ray had been a scapegoat, a ‘patsy,’ who had been set up to take the fall. ‘So far as I am concerned,’ wrote Roundtree in 2009, ‘there is in the complex and tangled web of certain truth and unconfirmed rumor, of the inference and speculation and intrigue that surrounds the life and death of Mary Pinchot Meyer a single critical fact: Raymond Crump’s innocence in her murder.’” 

\

Raymond Crump Jr., being arrested 

http://www.ctka.net/reviews/DiEugenio_Janney_Mary's_Mosaic.html.


Joseph W. Shimon floated in the highest of government circles.  He was a special White House Aide, Washington Police Inspector, liaison to the CIA, U.S Attorney’s office, U.S Secret Service, the Mob, and an official assassin:

“People are eliminated,” said Shimon to his daughter in the spring of 1965.  “Honey, you don’t know how many people are just eliminated, just on the operating table alone.  They just need to be disposed of.   And don’t ever believe what you read in the newspapers. It’s all made up…among my many jobs, I used to kill people.  The government hired me to kill people. It’s a job…you have to, if that’s what you’re told to do.”  (Shimon, interviewed by Peter Janney, February 15, 2007.)   


Roundtree further pondered the mysterious phone calls she received, the disappearance of a stalled Nash Rambler and an accompanying “repair order,” as well as the mention of “Mary’s diary having been sequestered by the CIA all these years,” linking Mary’s affair with the assassinated president.   

“Who, then, was the man that Henry Wiggins had seen standing over Mary’s corpse less than fifteen seconds after the fatal second shot was fired?” asks Janney.  “His pristine, unstained clothes appeared to match the clothes worn by Ray Crump that morning.”

NEW LEVEL OF UNDERSTANDING

Janney says that achieving a “new level of understanding in the case” would include a look at “a number of heretofore unseen details, events, experiences, and people.”  (p. 144.)

Author Peter Janney

“Another author, Leo Damore, met with Janney in 1992 while working on his own Meyer project.  Damore had written a bestseller about Senator Edward Kennedy and Chappaquiddick, and he was hot on the trail of Meyer’s killer, or so he confided to Janney.  Damore never finished his book, however.  In 1995 he committed suicide.  Years later, Janney bought Damore’s research files, using them as the basis for ‘Mary’s Mosaic.’

“James H. Smith, a Falmouth lawyer, was among those encouraging Janney to keep digging.  Smith worked for the Kennedy family years ago and knew Damore well. Now 82, he never believed the Warren Commission’s version of JFK’s murder, says Smith today, and finds nothing outlandish in Janney’s the-CIA-did-it scenario.

‘I think Peter’s hit a home run,’ Smith said.’”

https://www.bostonglobe.com/2012/05/25/janney/St45JbWsY5VXTVbPKzAG7M/story.html.

 

Mary had several suitors before her death.  One such admirer was Robert (“Bob”) L. Schwartz who was a young naval officer and a journalist who came to know Mary as a very idealistic woman and a pacifist, but ultimately called her “a prima ballerina assoluta.”  “She was what women were meant to be,” said Schwartz.

Cord Meyer, “a charismatic war veteran,” Yale graduate, congressman, dated and eventually married Mary Pinchot.  Cord decided to work for the Central Intelligence Agency (CIA) in the Directorate of Plans in 1951, “the CIA’s most secretarial division dedicated to the manipulation of world order.”

Janney says:  “Somewhere in the bowels of the Washington E Street offices of the newly formed CIA, Cord Meyer transformed all his poetic, insightful visionary wisdom into perfecting schemes and strategies for America’s greater power and control, the often subtle but effective attempts at world domination---no matter what the cost.”

Mary felt a disdain for the CIA and its “mission.”  Janney quotes an anonymous source:  “Mary absolutely detested Allen Dulles and everything he stood for.  She compared him to Machiavelli, only worse.”  (p. 184.)

Cord and Mary grew apart, possibly due to Cord’s alcoholism, possibly due to Cord’s obsessive life in the CIA, but also due to Mary’s affair with (in his appearance only) “Italian noble” Jean Pierre.  The Meyers were divorced.  Shortly following these events, Michael Pinchot Meyer (the son) was hit and killed by an automobile driver.  During these sordid circumstances, Cord  became director of the CIA’s black project: Operation Mockingbird.

“Having infiltrated more than twenty-five newspapers and wire agencies, Operation Mockingbird had successfully manipulated the American media to promote the CIA viewpoint…an estimated three thousand salaried and contract CIA employees were engaged in propaganda efforts.”

October 12, 1964 - Mary Pinchot Meyer is murdered in broad daylight on the C & O Canal towpath in Georgetown, three weeks after the release of the Warren Report.

The CIA did not take kindly to an expose’ of their media control operation in Ramparts Magazine.  “CIA operative Edgar Applewhite was ordered to operate a campaign to smear the publication and then tender it financially bankrupt,” says Janney.  (p. 192.) 

Further CIA conquests included the CIA surveillance of Alfred McCoy’s The Politics of Heroin in Southeast Asia.  The book revealed that American intelligence had collaborated with the drug trade dating back as far as World War II.  CIA involvement extended about the globe resulting in the “death squads” in Central America (p. 195).  Janney talks about a “CIA-led assassination campaign throughout Southeast Asia, Operation Phoenix, (which) made matters even worse.”

THE LSD PARLANCE

http://i.ytimg.com/vi/E1GySrriCpg/hqdefault.jpg.

Mary’s friends Anne and Jim Truitt began an interest in psychedelic states of consciousness and, according to Jim Truitt, Mary first experimented with psychedelics in 1958, but Janney says a legendary Alfred M. Hubbard (a former World War II OSS agents, uranium entrepreneur) “first introduced her to such exploration.”  Dr. Oscar Janiger, a Los Angeles Psychiatrist, was also a member to Hubbard’s visits.  Hubbard was very distrustful of the CIA’s exploration of LSD.  “The CIA work stinks,” said Hubbard, “they were misusing it…when they were killing people, you couldn’t tell them a goddamn thing.”

Janney says:  “In addition to the CIA, the U.S Army, and Britain’s M16 all had a keen interest in using LSD and other hallucinogens for chemical warfare, in what they hoped would be ‘mind control.’”  In one incident, in 1951, the CIA’s Fort Detrick, Maryland had used a crop-duster airplane to cover the town of Pont-Saint-Esprit in Southern France with an aerosol of LSD.  “Four people committed suicide before the trauma subsided.”

Frank Olson, a CIA chemical warfare expert, became, in the eyes of his peers, a “security risk” and was supposedly thrown out of his tenth-floor hotel window.  It was in his world of high-society intrigue, that Mary’s drug interest expanded.

It was suspected that Mary visited Timothy Leary, the LSD guru, during the early 1960s.  That interest would become entwined with her friendship with Jack Kennedy. 

JACK KENNEDY AND MARY MEYER     

Mary became Friends with her neighbor Jack Kennedy starting somewhere about 1957.  Over a number of years, that friendship turned into a closer attraction.

“Mary’s primary attraction for Jack may have ultimately been trust---in the end,” says Janney, “love’s most powerful aphrodisiac."

Richard Helms: The man who kept the JFK secrets

Mary contacted Doctor Timothy Leary about his research and connection to the Harvard Psilocybin Project.  “Leary depicted Mary Meyer,” says Janney, “as a kind of missionary for the ascension of world peace through the sagacious use of hallucinogens…an opportune mind-altering experience in the lives of powerful political figures, specifically the leader of the free world…”

Leary’s harassment by the government and his eventual arrest and imprisonment only temporarily stifled his investigation of the murder of his Friend, Mary Meyer.   

“Upon his release from prison in 1976, having read the National Enquirer expose’ about Mary’s affair with Jack published earlier that year, Leary would attempt a second investigation of Mary’s murder,” says Janney, “after coming across a copy of Deborah Davis’ book Katharine the Great  at the home of his friends Jon and Carolyn Bradshaw.”

EVOLVING TRAJECTORY  

According to Janney, the Meyer-Kennedy affair began around January, 1962 and perhaps earlier. Both Meyer and the Kennedys, Jack and Bobby, had a growing distrust of Allen Dulles and his increasing exploits, including the Cuban Bay of Pigs, Operation Northwoods, and other nefarious CIA shenanigans.

“Mary’s longtime commitment to world peace, coupled with Jack’s broadening insight that peace, not armed conflict,” says Janney, “was the right path forward, inevitably made an important asset. After the Cuban Missile Crisis, the President’s evolving political trajectory would increasingly isolate him from his own National Security Apparatus.” 

During the Cuban missile crisis, both the U.S military and the CIA, says Janney, were secretly operating unilaterally doing whatever they could to intensify tensions that could ignite a war.

“But in the shadows, evil was very much alive, stalking not only the republic but the president,” says Janney.  “Not only were the Joint Chiefs of Staff enraged that Cuba had been attacked, but were also indignant that Kennedy had made concessions to Khrushchev.”    

Author and researcher Leo Damor told Janney about a confidential source who revealed that Mary and Jack Kennedy had taken “a mild LSD trip” in the summer of 1959. Following this episode, Kennedy pushed for a Nuclear Arms Treaty.

SECURITY OF THE SLAVE 

Mary Meyer and Jack Kennedy’s new found philosophy of world peace could be seen in his address at American University, dubbed his “peace speech”:  “Not a Pax Americana enforced on the world by American weapons of war.  Not the peace of the grave or the security of the slave.  I am talking about genuine peace, the kind of peace that makes life on earth worth living, that kind that enables men and nations to grow and to hope and to build a better life for their children---not merely peace for Americans but peace for all men and women – not merely peace in our time but peace for all time.”

THE OSWALD SYNCHRONISM  

An assassination attempt on Jack Kennedy was planned for November 2, 1963.  The plot would entail multiple gunmen, and a designated patsy, ex-marine Thomas Arthur Vallee.  Like Oswald, Thomas Vallee had also served at a U-2 base in Japan under the Joint Technical Advisory Group (JTAG), the CIA’s code name for its U-2 spy plane surveillance unit.  Like Lee Harvey Oswald, Vallee “found work” in the fall of November, 1963 in a building next to a L-shaped turn on  the route of the Presidential motorcade.  The plot, however, was foiled.

For more information or to purchase this book from AMAZON.COM simply click on its title:  Mary's Mosaic: The CIA Conspiracy to Murder John F. Kennedy, Mary Pinchot Meyer, and Their Vision for World Peace

PART II will be published tomorrow June 23, 2015  http://ufodigest.com/article/mary-meyer-0623

*******

You can reach Steve Erdmann at dissenterdisinter@yahoo.com

- Or - independenterdmann@gmail.com

You can friend him at Facebook https://www.facebook.com/stephen.erdmann1.

- Or - visit the Dissenter/Disinter Group at https://www.facebook.com/#!/groups/171577496293504/.

His Facebook email is http://facebook.com/stephen.erdmann1.

*******

 

Other sections: 

          MUSIC FROM THE DARK SIDE      Cache   Translate Page   Web Page Cache   
Music can and is one of the best things that humanity has come out with. Good music uplifts and stirs the soul. Like beauty is to the eye of the beholder, music is the same to the ears. But like anything else in life there is a dark side to the music industry. In the last few years the envelop is being pushed to the point that's ready to fall off the table. An example is rock music. What is regarded as wild in the 50's and 60's is pretty tame by today's standards.
 
I say the music industry has changed slowly over a long period of time and in a deliberate manner. This is so that changes aren't noticed right off the bat. No longer do I look at music as entertainment but as another mass marketing tool. I do like listening to the radio for what is going on in the community, radio talk shows or shows like "The Shadow". But if I find myself using the radio as background noise, I get up and turn it off as it becomes a distraction. Silence doesn't bother me in the least. Hearing but no listening is leaving  your subconscious open to information that has possible negative side effects.
 
A lot of music today reminds me a lot of the fast food industry. Lots of fill but little in the way of quality value. A number of these so call musicians are living proof that there's not much depth in parts of the music field. Justin Bieber is trying to prove that bad publicity is better than no publicity. He is doing his best here to prove it but we have to remember how the media stretches the truth. Britney Spears once spoke about the sanctity of marriage and remaining a virgin until then. But on stage Spears acts and dresses like a cave woman in heat. Madonna is another one who pushes sexual boundaries to the limit. I hope, they probably don't, act like that in their personal life.
 
The music field resembles the pro wrestling circuit in that so much is done according to the script. Musicians are little more than commodities to be exploited by corporations. So much for being rebels with a cause that fought the system and won. Record companies can easily control on who gets successful, so making or breaking a career is in their hands as musicians need to get their product known.
 
I know subliminal messages are used in recordings to some degree. Back in the 80's two of us played "Another One Bites The Dust" by  Queen. We did hear the line "smoking marijuana is fun" twice. Bass volume when turned so loud eliminates all audio competition and is very hypnotic, especially in establishments where booze is served. Commercialized sex is extensively used in live concerts, music videos and magazine covers. It's as if the dark forces are indoctrinating citizens in a global experiment of some kind. I wonder what this kind of continual mass exposure does to people on a long and short term basis. It might not have to be so subliminal after all, we just need to wake up and pay attention to what is going on around us.
 
I can't see how much the forces of darkness have eroded our way of life but it sure does have a firm grip on religion, politics, entertainment, large media outlets and the fashion industry. I was told several years ago that the Rolling Stones sold their souls to the Devil to make it big in rock and roll. This could be a contrive story to enhance their image as rock and roll bad guys. It has been said that Jimmy Page used occult practices to augment his musical ability but it could have been no more than a hobby of his. Other musicians have been rumoured to be mixed up with the occult to some degree but is it used as a gimmick for career advancement or did they actually sell out to dark entities for material gain?
 
It's not going into the rabbit hole that is a concern these day but what if coming out it that is.
 
 
 
 

          The Battle for Baikal      Cache   Translate Page   Web Page Cache   
In 1918 the Czecho-Slovak Legion found itself fighting the Red Army in Siberia for control of the world’s deepest lake.   ONE OF THE MOST SPECTACULAR YET LITTLE-KNOWN stories of World War I and the Russian Revolution is the epic journey of the Czecho-Slovak Legion, whose exploits burst out of Siberia and onto the world stage …

          Préposé(e), services aux visiteurs - Gouvernement du Canada - Haines Junction, YT      Cache   Translate Page   Web Page Cache   
Exploitation d'affichages interactifs numériques pour attirer les visiteurs dans le nouveau centre d'accueil à Haines Junction.... $21.64 - $23.52 an hour
From Government of Canada - Fri, 20 Jul 2018 05:04:37 GMT - View all Haines Junction, YT jobs
          Animateur(trice)guide, Patrimoine I - Gouvernement du Canada - Haines Junction, YT      Cache   Translate Page   Web Page Cache   
Exploitation d'affichages interactifs numériques pour attirer les visiteurs dans le nouveau centre d'accueil à Haines Junction.... $41,110 - $46,279 a year
From Government of Canada - Fri, 20 Jul 2018 05:04:17 GMT - View all Haines Junction, YT jobs
          Crowdfense platform to allow researchers to safely submit, discuss and sell 0day exploits      Cache   Translate Page   Web Page Cache   

Crowdfense announced the launch of their Vulnerability Research Platform (VRP). This web-based collaboration platform allows vulnerability researchers to safely submit, discuss and quickly sell single 0day exploits and chains of exploits. The VRP will open on September 3, 2018. “Through the VRP, Crowdfense experts work in real time with researchers to evaluate, test, document and refine their findings,” said Andrea Zapparoli Manzoni, Director of Crowdfense. “The findings can be both within the scope of Crowdfense … More

The post Crowdfense platform to allow researchers to safely submit, discuss and sell 0day exploits appeared first on Help Net Security.


          Smart cities are exposed to old-school threats      Cache   Translate Page   Web Page Cache   

Spurred by the false alarm that made Hawaii residents fear for their lives earlier this year, IBM X-Force Red and Threatcare researchers have decided to test several smart city devices and ultimately found 17 zero-day vulnerabilities, some of which could be exploited to create potentially deadly chaos. “While we were prepared to dig deep to find vulnerabilities, our initial testing yielded some of the most common security issues, such as default passwords, authentication bypass and … More

The post Smart cities are exposed to old-school threats appeared first on Help Net Security.


          Banquier universel, Succursale, Distribution - Tisdale, SK (15 heures) - Scotiabank - Tisdale, SK      Cache   Translate Page   Web Page Cache   
Il s’agit de suivre notamment le cadre de gestion des risques d’exploitation, le cadre de gestion des risques de conformité réglementaire, le manuel mondial sur...
From Scotiabank - Thu, 09 Aug 2018 02:12:25 GMT - View all Tisdale, SK jobs
          Directeur adjoint, Succursale, Distribution - Saskatoon, SK - Scotiabank - Saskatoon, SK      Cache   Translate Page   Web Page Cache   
Il s’agit de suivre notamment le cadre de gestion des risques d’exploitation, le cadre de gestion des risques de conformité réglementaire, le manuel mondial sur...
From Scotiabank - Thu, 09 Aug 2018 02:13:06 GMT - View all Saskatoon, SK jobs
          Conseiller financier principal, Planification de la retraite et des placements - Saskatoon, SK - Scotiabank - Saskatoon, SK      Cache   Translate Page   Web Page Cache   
Il s’agit de suivre notamment le cadre de gestion des risques d’exploitation, le cadre de gestion des risques de conformité réglementaire, le manuel mondial sur...
From Scotiabank - Wed, 04 Jul 2018 11:29:06 GMT - View all Saskatoon, SK jobs
          The History of the United States Part 5 (1865-1918) The First Era      Cache   Translate Page   Web Page Cache   

Image result for brooklyn bridge 1883Image result for reconstruction black people
Image result for web dubois booker t washingtonImage result for ida b wellsImage result for ellis island


 The History of the United States Part 5 (1865-1918)  The First Era

This time period of American history was an extraordinary transformative era. Everything changed in America after the U.S. Civil War. The North and the South (including the Midwest plus the West) became more industrialized. More Americans moved into the cities from rural locations. Many black people gained rights, but the racist backlash of Jim Crow apartheid harmed real black progress in the evils of lynching, violence, the burning of locations, rape (especially the rape of black women by white racist terrorists), and the denial of inherit voting rights. The era of Reconstruction saw historic first among many black politicians and many saw hope for the future, but it ended by 1877. Likewise African Americans formed numerous organizations and other institutions courageously to defend the human rights of black people. The end of the 19th century saw Native Americans continuously losing their lands, having their treaties broken, and many of them forced to live in harsh reservations, which was a total injustice. Immigrants came into America in the realm of 27.5 million people between 1865 and 1918). These new immigrants experienced both discrimination and hardships. Yet, they also made outstanding contributions to American society (from inventions to a myriad of cultural developments). The Gilded Age signified the growth of large corporations including robber barons. Also, it was a time where the labor movement increased in power in which they executed strikes in order for them to promote living wage,s better working conditions, and ending child labor. By the end of the 19th century and the beginning of the 20th century, the Progressive era developed. It did numerous goods things in helping the poor, creating legitimate regulations to promote safety, promoting conservation including environmental protections, and holding companies accountable for their actions. Their weaknesses were that many of them ignored racism that harmed the lives of black Americans and some of them advanced the evil of eugenics.

The women suffragists fought for women to have the right to vote in America (plus worldwide) and by 1920, they were victorious in their determined efforts. This was a time when American imperialism expanded globally from the Caribbean to Asia. The end of his period of time started with World War I. U.S. forces came later into the battlefield on the side of the Allied forces. WWI saw new military weapons, chemical warfare, and a more globalized world society. Domestically, the suppression of civil liberties were commonplace, which was wrong. Americans supplies of food, military supplies, and other items were crucial in the Allied victory.  After WWI, a more internationalized world would be formed with the Treaty of Versailles and the League of Nations. Self-determination among nations plus other places expanded in places like China, Turkey, Poland, the Soviet Union, etc. American culture boomed and the continued fight for equality and justice (led by African Americans and other human begins of diverse backgrounds like Native Americans, Mexican Americans, Native Americans, women, the poor, immigrants, etc.) existed.

Image result for reconstruction period america


Reconstruction

Reconstruction changed the world forever. It dealt with debates about governmental power. Also, it gave black Americans freedom that didn’t exist before the Civil War. Some historians and scholars believe that Reconstruction started as early as 1863 when the Emancipation Proclamation was issued which freed slaves in the Confederacy. The end of the Civil War saw Southern cities like Charleston and Richmond completely demolished. The South’s total wealth declined. Southern factories, plantations, and railroads were gone. The South experienced desolations as a response to the Union’s efforts to end the Confederacy. The Confederacy is to be blamed for promoting oppression.  People talked about what to do with eleven states that rebelled against the Union. Reconstruction dealt with rebuilding the South, promoting the lives of newly black freed human beings, and the future of society. African Americans continued to fight for full citizenship and equal rights after the war. Three million African Americans in the South saw a new era and they mostly lived in rural communities. That is why tons of black people were farmers back then and many black Americans came into the cities of the South for economic opportunities. While some people like General William Tecumseh Sherman wanted millions of acres of lands to be given to former slaves by the federal slaves (like forty acres and a mule doctrine of Sherman), many southern landowners opposed this idea. African Americans from the South, during the Reconstruction period and beyond, fought fight for voting rights, access to education, and other benefits that most northern black people (and all black people in general) were fighting for too. Southern white racists would fight legitimate progress at every step of the way since they wanted their status and power in society along with racists being wicked.

As early as 1864, people increasingly knew that the Union was going to win the Civil War. So, people before 1865 talked about what do with newly freed black people once the war was over. There were three views back then. One view was the progressives who wanted land sent to black Americans and full equality. Abraham Lincoln and Andrew Johnson were the moderates who wanted an immediate reconciliation of the Confederacy to the Union after the war was over. Both Lincoln and Johnson wanted a national healing and immediate admission of rebel states into the Union. Abraham Lincoln promoted the ten percent plan. This was the Proclamation of Amnesty and Reconstruction. It wanted ten percent of a state’s voters took a loyalty oath to the Union, and then the state would set up a new government. If the state’s constitution abolished slavery and provided education for African American, then that state would regain representation in Congress. In my personal, opinion, Lincoln was too generous and too accommodating to former Confederates. For example, Lincoln wanted to give pardons (not prison time) for Confederates. He considered compensating them for lost property. He recognized the pro-Union governments of Arkansas, Louisiana, and Tennessee even though they denied African Americans the right to vote immediately after the Civil War.

Then, you have the disgusting reactionaries who rejected political and social equality for black people. The progressives included black leaders and Radical Republicans who stood out to defend the Union and they wanted punishment (including making former Confederate states to have the stipulation of swearing allegiance to the Union) sent to the rebels for their actions of extremism during the Civil War too. One leader of the Radical Republicans was Thaddeus Stevens and Charles Sumer. They opposed Lincoln’s 10 percent plan since Confederates committed the crimes of enslaving black Americans and advancing the Civil War. Lincoln’s plan was rejected and replaced with the Wade-Davis bill in 1864. This policy required the state’s prewar voters to swear loyalty to the Union before the process of restoration started. It promoted guarantees of equality to African Americans. Lincoln ended this plan by a pocket veto or withholding his signature beyond the 10 day decline with the end of the congressional session. Lincoln was wrong to do this.

Image result for frederick douglassImage result for freedmen's bureau

On March 3, 1865, the Freedmen’s Bureau was established. This was supported by Lincoln. It was formed to give assistance to newly emancipated African Americans. It had huge successes and large economic burdens including racist terrorism harming many schools of the Freedmen’s Bureau. It ended by 1872. The Freedmen’s Bureau wanted to give newly freed black persons food, clothing, health care, and education including for white poor folks of the South. It also helped to reunite black families who were split apart as a result of slavery. It was used to aid 4 million newly freed black human beings. It spent about $5 million to set up schools for former slaves. Howard University, Hampton University, and Fisk University were founded and financed with the help from the Freedmen’s Bureau too. After April 15, 1865, Andrew Johnson was President. Johnson would go on to be one of the racist Presidents in American history. Also, he refused to support even middle of road Reconstruction measures in a vindictive way. The Union General Benjamin Butler in 1865 was elected to Congress as a Radical Republican.

After Lincoln’s assassination in April 1865, Andrew Johnson became the next President. Like Lincoln, Johnson wanted to restore Southern states to the Union as quickly as possible. His plan was to allow any Confederate in the Union if they swore alleigance to the Union and the Constitution. He also anted each state to ratify the Thirteenth Amendment and draft a Constitution that abolished slavery. He wanted wealthy planters to write to him personally in order to get a pardon as he detested wealthy planters. Like many southerners, he was a stone cold racist who wanted America to be a “government for white men.” Andrew Johnson didn’t want to give black Americans the right to vote. He believed in states’ rights in allowing the states to deprive black people human freedoms. In December of 1865, most Confederate state had met Johnson’s plan for readmission when Congress reconvened. By December 6, 1865, the 13th Amendment was ratified.

The 13th Amendment abolished slavery in the United States of America. In the same year, Southern states increase the existence of Black Codes. Black Codes are Jim Crow laws that restrict the rights of African Americans involving voting, owning businesses, owning a gun, holding office, etc. Southern states started to allow even Confederates in Congress. The black odes forced African Americans to work in a few jobs like servants or farm laborers. Many states banned black people from owning land as owning land is a key prerequisite in real economic plus political power. Vagrancy laws existed that made any black person who didn’t have a job could be arrested and made to work as prison labor (which involved kidnapping and de facto slavery). During this time when with Union military occupation of the South, many white southerners openly used violence and intimidation to enforce the black codes. This was so evil that Radical Republicans and moderate Republican fought part against the South’s disrespect of the essence of Reconstruction. When southern representative came into Washington, D.C. Congress refused their seats. Congress used a committee to investigate the treatment of former slaves. The spring of 1866 saw more events. Radical Republicans wanted to defend the rights of black people while Johnson opposed this plan. Congress passed a bill to fund the Freedmen’s Bureau. It was given authority to punish state officials who failed to extend rights to African Americans. Johnson vetoed this bill.

April 9, 1866 was the passage of the Civil Rights Act of 1866. This gave citizenship to African Americans and guarantees equal rights. It created federal guarantees of civil rights and tried to stop states trying to do evil. Johnson vetoed the law and defied Congress. Later, Congress overturned the veto to make the Civil Rights Act of 1866 the law of the land. The Memphis race riot from May 1-3, 1866 was when white racists and the police killed 46 Africans and destroyed 90 homes, schools, and four churches in Memphis, Tennessee. By July 30, 1866, the New Orleans race riot had the police to murder more than 40 black Americans and white Republicans. More than 150 people were wounded. 1866 was the year when the Ku Klux Klan was formed. It was a secret organization that wanted to use murder, violence, and rape to terrorize African Americans and establish white rule n the South. It was founded in Pulaski, Tennessee. Radical and moderate Republicans blamed Johnson’s total lenient policies of compromise for the violence against black people in the South. Radical Reconstruction started when more Radical Republicans gained power in Congress.

The 1867 Reconstruction act divided the former Confederacy states (of 10 of them) into five military districts via the Military Reconstruction Act of 1867. Congress had overridden President Johnson’s veto again. The generals (who were Union generals from the Civil War) ruled those districts until the states had an oath of allegiance to the Union (and allow African Americans suffrage). These districts wanted African American men to vote as women wouldn’t be allowed to vote until the 1900’s. In 1867, the Republican convention in New Orleans has a party platform including promoting equality for African Americans.

In 1867, tension with Johnson and the Congress increased. Congress passed the Tenure Office Act to control the President’s power. It said that the President must have Senate approval before getting rid of some members of his office. Later, he tried to get rid of the last Radical Republican in his cabinet who was Secretary of War Edwin Stanton. He barricaded himself in his office for nearly 2 month. Then, the House of Representative voted to impeach Johnson for trying to fire Stanton. Johnson was so stubborn that he had an impeachment trial by the Spring of 1868. From March to May of 1868, by one vote, the U.S. Senate failed to remove President Johnson from office. The moderates didn’t want Johnson to leave office. Andrew Johnson promised to enforce the Reconstruction Acts. The Fourteenth Amendment was ratified in July 21, 1868. This Amendment guaranteed due process and equal protection under the law to African Americans. The 14th Amendment wanted to punish any state the refused to allow black people the right to vote with losing House seats. It banned leading Confederate officials from holding federal or state offices. On November 3, 1868, President Ulysses S. Grant was elected President. He was the 18th President and a former Union general. He beat Democratic candidate Horatio Seymour of New York State and he had a majority of the white vote. Congress passed the Fifteenth Amendment in 1869. It forbade any state from denying suffrage on the grounds of race, color, or previous condition of servitude. Many southern racists used loopholes to deprive black people of voting rights by using literacy or property qualifications.

Image result for o=president grant

This harmed African Americans and the poor. The Enforcement Act of 1870 made intimidation of people having voting rights a federal crime. The first redeemer government was in Tennessee. This was in 1869 when TN replaced a biracial Republican state government with an all-white Democratic government. This was followed by Georgia, North Carolina, and Virginia in 1870. 1870 was the year when all of the former Confederate states had met the requirements under Radical Reconstruction and rejoined the Union. The Republicans dominated state governments. More African Americans used their political power to be part of government at every level. More black people were now school superintendents, sheriffs, mayor, coroners, and legislatures in the South. The Republican Party also had members who were Scalawags or poor white people who agreed with Reconstruction. Carpetbaggers came from the North and they wanted economic profit in the South via businesses. Many of them were accused of financial exploitation of people. By February 23, 1870 was when the first black senator was elected. His name was Hiram Revels of Mississippi and he was in the U.S. Senate as the first black senator.

The Fifteenth Amendment was ratified on March 30, 1870. It extended the vote to all male citizens regardless of race or previous condition of servitude. In 1871, the 43nd Congress had five black members in the House of Representatives: Benjamin S. Turner of Alabama; Josiah T. Walls of Florida; and Robert Brown Elliot, Joseph H. Rainey and Robert Carlos DeLarge of South Carolina. The first African American governor was P. B. S. Pinchback, acting governor of Louisiana from December 9, 1872 to January 13, 1873. Pinchback, a black politician, was the first black to serve as a state governor, although due to white resistance, his tenure is extremely short. In 1874, for the first time since before the Civil War, Democrats control both houses of Congress. Robert Smalls, black hero of the Civil War, elected to Congress as representative of South Carolina. Blanche K. Bruce elected to U. S. Senate. Blanche was born in Virginia as a slave. She learned to read. She left the plantation and went into Missouri during the Civil War. He ran a school for black children and came into Oberlin College in Ohio. He was a great landowner at age 25 by 1866. By his mid-thirties in 1874, he was elected to the United States Senate. Ironically, no black Congressman was elected in the North until the twentieth century. Some Republicans were wrong to not want women’s suffrage immediately since they felt that they couldn’t get enough support to get voting rights for women. Black people and women gained new opportunities during Reconstruction from working in medicine, schools, etc. Many women were leaders in orphanages and relief programs.

Schools grew in the schools. Most were segregated. A few of the Radical Republicans wanted integration. Land speculation, illiteracy, and poverty were fought against by progressive people in the South. African Americans saw a new world with Reconstruction. Most black people in the South were farmers and wanted land to cultivate their own lives and families. Many organized economic institutions and civil rights groups to fight for their rights. The reason is that freedom must be established by both using economic and political power merged into one. In other words, we have to fight for just laws and get our economic power increased in order to fight poverty plus set up our own institutions to benefit the black community as a whole. Black people worked as cooks, carpenters, blacksmiths, and other workers in southern cities. Many experienced low pay, poor food, and substandard housing. African Americans churches were places where black people worshiped, established job opportunities, organized political movements, and helped to educate black people. In rural communities, sharecropping existed. There were share tenancy and tenant farming. Sharecropping was when a landowner dictated the crop and provided the sharecropper with a place to live. In return, a share of the harvested was given to the sharecropper. The problem was that brought supplies on credit with high interest and the sharecropper were forced to pay for these expensive items. Sharecroppers would in term be in debt.

Image result for Robert Brown ElliottImage result for Joseph H. RaineyImage result for otto philly civil rights leader

These leaders during Reconstruction (from left to right) were Robert Brown Elliot, Robert Carlos DeLarge, and Octavius Catto.

Many landlords would lie about the costs of supplies and economic exploit sharecroppers who were both black people and poor whites. Tenant farming involved renting and money management problems existed too involving tenant farming. Sharecropping extended poverty in the black community. White racism and black scapegoating contributed to the violent backlash against Reconstruction. Republicans took over the governments of the South for a time. White racist southerners formed the Ku Klux Klan as a means to stop Reconstruction. The Klan burned homes, schools, and churches. They came out in night and killed, raped, and hanged African Americans and white progressives. Anyone (a minister, a teacher, politicians, etc.), who encouraged black people to vote, were readily assaulted and murdered by the Klan. The violence against black people was very large. The Congress acted by passing the Enforcement Acts in 1870 and in 1871. It made it federal offense to interfere with a citizen’s right to vote. Congress had hearing and invited black politicians and other people to talk about South. George Ruby of Texas told Congress that he dragged into the woods and beat him because he opened a school in Louisiana. Racism terrorism was in the North too. In Philadelphia, civil rights leader Octavius Otto was murdered by a racist mob. He was a teacher and Isaiah Wears and other black protested the racism found in the North as well. Hundreds of Klansmen were indicted in America via the Enforcement Acts. After 1872, violence against black people declined temporarily. With an ex-Confederate general Wade Hampton being elected in South Carolina, the white racist backlash grew. Ulysses S. Grant did many progressive things. His administration fought southern resistance to Reconstruction. His administration later had financial scandals. Grant defeated Horace Greeley in the 1872 election. Later, greed and economic corruption saw the start of the Gilded Age. The Panic of 1873 involved a recession with failed banks and overextended loans to the railroad industry. Job losses came about. 

On March 1, 1875, the Civil Rights Act of 1875 was enacted by Congress. It guaranteed equal rights to African Americans in public accommodations and jury service. It was ruled unconstitutional in 1883. In 1876, Republicans challenged the validity of the voting in South Carolina, Florida, and Louisiana. Wade Hampton was inaugurated the governor of South Carolina, which shown that Southern reactionary extremists didn’t want Reconstruction but oppression. In 1877, Rutherford B. Hayes was inaugurated as President. The Electoral Commission awarded disputed electoral votes to the republican candidate. In 1877, Reconstruction officially ends with the disgraceful Great Compromise of 1877. This allowed Rutherford Hayes to withdrawal federal troops from the South as a means for him to be President.  Reconstruction didn’t end because of one reason. They included: the Northern support evaporated (because of reforming politics and economic matters which is no excuse since you can handle all issues at the same time), Radical Republicans either passed away or retired, Southern racists gained power in Congress, racist terrorists harmed black people and black people lacked adequate protections, and the Supreme Court promoted decisions that attacked equality. The Supreme Court in the Slaughterhouse Cases of 1873 restricted the 14th Amendment in allowing states to regulate the scope of the Amendment.

Image result for exodusters

States in the South soon deprived black people rights further. The 1876 decision of United States v. Cruikshank overturned the conviction of the racist Cruikshank and wanted states to handle 14th Amendment affairs (while saying that the 14th Amendment didn’t apply to individuals). Redeemers or Southern whites who hated Reconstruction took control of legislatures throughout the South. In 1874, Republicans lost control of the House of Representatives. Reconstruction has been debated to this day. The truth is that Reconstruction was a heroic, progressive experiment. Its end should be blamed on bigots. Its goals were noble and it caused an increase of the education of African Americans, the expansion of the industrial economy, and the growth of a tax supported educational system. After 1876, bitterness between North and South continued and 100 years after Reconstruction, the second Reconstruction of the Civil Rights Movement would finally end Jim Crow apartheid once and for all. Reconstruction expanded rights and opportunities for African Americans. Also, the Reconstruction period inspired women to fight for suffrage. Women should have the right to vote ASAP just like black Americans and suffrage activists continued in their cause. Reconstruction expanded the role of the federal government and the Republican Party became known as the party of Lincoln. The Democratic Party included both reactionary southerners and industrial Northerners. The Radical Republicans ended after Reconstruction, but new activists would develop to defend the human rights of black people and humanity in general. Reconstruction truly changed the world forevermore.

Image result for native americans and the westImage result for sitting bull

The West

One of the most important parts of American history deals with the Old West. For thousands of years, Native Americans were living in the Americas. After 1787, the Construction regulated trade among the federal government and the Native Americans. The history is clear that the federal government not only broke treaties with the indigenous peoples, but outraged kidnapped them and placed them into reservations. From the 1840’s to the 1880’s, more settlers desired more lands even on Native American’s lands. After the Civil War, only 200,000 Native Americans lived to the west of the Mississippi River. Native Americans lived in different cultures and lived in diverse areas. Plains tribes like the Sioux, Blackfeet, Crows, Comanches, and Cheyenne relied on the buffalo for survival literally. Native Americans viewed the land as sacred and it wasn’t to be owned for profit while many Europeans wanted to own the land for economic reasons. Clashes occurred among settlers and Native Americans. By the 1860’s, more laws forced Native Americans to live in reservations. Those areas heavily had poverty, dilapidated lands, and other problems. This was after the 1834 law that limited trade with Native Americans and limited white settlers in Indian Territory. Many white settlers brought diseases that harmed the Native American populations and hunters by the 1870’s almost made the buffalo extinct. Some people murdered buffalos for sport. Transpiration and technology rapidly expanded into the West. With that came more conflict among Native American lifestyles and the growing American nation. Horace Greeley of the New York Tribune encouraged people to travel into the West. In 1862, Sioux Native Americans fought settlers in eastern Minnesota over territories. The Sioux rebellion escalated in 1864 when Colorado militia murdered unarmed Cheyenne and Arapaho civilians. The Native Americans raised the American flag to promote peace, but the militia murdered men, women, and even children. This was the Sand Creek massacre. War grew. John Covington was the commanding officer of the incident.

During this time, the West was transformed by railroads, ranches, and mining. Mining communities desired gold, silver, and other resources. Some authorities hired vigilantes to enforce the law in mining towns. Some mining towns existed temporarily. Chinese Americans and others helped to create the Transcontinental Railroads that expanded the developments of cities and towns. Vaqueros and ranchers owned livestock. Cowboys helped to allow cattle to travel for months into various markets. Cowboys were white, Mexican, and African American men. To this day, cowboys perform nationwide and they include women too. The West was complex with discrimination and economic growth. It had Asians, black people, Mexicans, white people, Native Americans, etc. Homesteads expanded land. Exodusters included African American who wanted to escape the South in order to have self-sufficient, autonomous communities in places like Kansas and Oklahoma. By 1890, the Western frontier era ended. The new era of the West would be filled with challenges and fights for equality among Americans.

After the Civil War, both white and black Union soldiers joined forces to subdue the Native Americans. This was imperialism and it was wrong. Recruitment efforts existed to gain more U.S. soldiers for the job. The Plains Native Americans tried to hold onto to their territories, but the federal government wouldn’t let up. In 1866, Red Cloud and his allied lured Captain William Fetterman and his troops. They killed them. Some people wanted education for Native Americans while others wanted strict rule over them. The racist United States Indian Peace Commission wanted Native Americans to submit to white civilization in order for peace to come. The Fort Laramie Treaty of 1868 dealt with Sioux lands. Promises were broken with treaties and conflict continued. The Red River War existed in the late 1800’s as far as Texas. Comanche surrendered by 1875.

 Image result for reservations native americanImage result for Crazy Horse


The Battle of the Little Big Horn was about lands. Crazy Horse and Sitting Bull wanted to drive out prospectors in their lands. By June 1876, General George Custer was defeated by Crazy Horse with his 2,000 Native Americans. Custer and his men died. Sitting Bull escaped into Canada. Crazy Horse and his followers surrendered by starvation and bad weather. Many of the Nez Perces came into reservations, Also, Chief Joseph tried to go into Canada, but he surrendered. He came into Washington, D.C. to defend the interests of his Native American people. The Ghost Dance revival inspired a new resistance movement against U.S. imperialism. In 1890, the government wanted to arrest Sitting Bull. There was the massacre in Wounded Knee, South Dakota where over 100 men, women, and children Native Americans were murdered by U.S. forces.  Assimilation came and many Native Americans were stripped of their rights and culture. Some reformers opposed the brutal treatment of Native Americans like the author Helen Hunt Jackson. Congress passed the Dawes Act in 1887. It dealt with land allotment to Native Americans and other issues. Native Americans would continue to fight for their freedom after the 1890’s too.


Image result for new york city 1880'sImage result for transcontinental railroadImage result for telegraph invention


Industrialization and the Guided Age

The growth of industry after the U.S. Civil War transformed the total landscape of American society. This period also involved new inventions and the Gilded Age including the growth of unions (which were created to defend the rights of workers). The Industrial Revolution started in the late 1700’s. It grew in America by the 1800’s with railroads and other devices. Coal and iron was used as resources. By the 1850’s, a new era came about in America. This new era involved steel, oil, and the new power source of electricity. This was the time when goods were created for quicker and efficiently. Immigration grew in causing more labor resources to construct railroads, goods, and other services in America. The natural resources of wood from trees, oil, etc. were utilized in many machines. 1 million immigrants per year came into America by 1905. Horatio Alger wrote his novel that mentioned the story of a poor boy who worse to wealth and fame by working hard. This promoted capitalism and entrepreneurs. Capitalism believes that the free market enterprise should dictate the functions of the economy. Entrepreneurs invested in money in a product in order for them to make profit. They worked in favor of industrialization. The factories, the mines, and the railroads grew jobs and had foreign investment too. The government encourages the free enterprise system. The government gave millions of acres of lands to railroad builders, so they could link East and West. Congress passed protective tariffs or taxes that would make imported goods cost more than goods that were made locally. Back then, little regulation of businesses occurred, which was laissez faire capitalism.

The government promoted patents to protect inventors and their inventions. In 18976, Thomas Edison worked with wealthy industrialists like j. P. Morgan to promote a research laboratory at Menlo Park, New Jersey. Edison crated a patient for the electric light bulb by 1880. IN 2 years, he installed a street lighting system in New York City.  The telegraph was invented in 1844 by Samuel Morse. The telegraph sent communications among thousands of miles in America. In 1876, Alexander graham Bell invented the telephone and in 1896, Guglielmo Marconi created the wireless telegraph which influenced the development of radio. The sewing machine was created by Elias Howe in 1846. The safety elevator was formed by Elisha Otis. In 1884, the improved steam boiler furnace was created by African American Granville Woods. This helped to power trains. Steel would grow being lightweight, but powerful. Such steel was used in skyscrapers and suspension bridges. The Brooklyn Bridge is a suspension bridge being the first of its kind spanning the East River in New York City. It was completed in 1883. It was the largest bridge in the world back then. Modern time zones would form by the 18 80’s and growth would develop mass production. World markets would be linked more closely with the explosion of modern inventions. More Americans moved into the cities from rural farms. America became a more powerful global political, economic power. Industrial waste increased including dust storms and agricultural problems too, so the environmental movement inspired the creation of the National Park Service and Yellowstone Park in 1872.

Image result for robber baronsImage result for robber barons

With the growth of business, corporations would dominate railroad systems, resources, and other goods plus services. One robber baron was Andrew Carnegie. Corporations were owned by a group of shareholders. Investors would have a dedication to fund the growth of corporations too. Corporations would be dictated by public shareholders, under them would be the Board of Directors, under them were the managers, and the managers control the employees. J. P. Morgan and Cornelius Vanderbilt had massive power. Some corporations dominated a product or service which would be a monopoly. John D. Rockefeller would make deals with railroads in growing his oil profits. Horizontal integration and vertical integration were tactics used by corporations in controlling profits and products. Trusts were used by John D. Rockefeller in order to escape state law preventing companies from owning stock of another company. The paradox is that many robber barons like Carnegie, Rockefeller, and Vanderbilt used cut throat tactics in their economic policies while investing in universities, museums, and libraries at the same time (which they felt would give the disadvantaged the chance to attain wealth). Social Darwinism is related to Charles Darwin’s Origin of the Species book. Social Darwinism means that wealth was one measure of one inherit value and those most fit are entitled to that wealth. Social Darwinism is evil since it promotes classism and it is overtly bigoted against the poor. With these monopolies growing, the government took action. The U.S. Senate created the ICC or the interstate Commerce Commission to oversee railroad operation. The Sherman Antitrust Act in 1890 was passed by the Senate to regulate trusts. It would be rarely enforced until the Progressive Age years later.



With this massive era of the Gilded Age, the workers fought back for economic justice heroically.  Business owners and workers struggles in the midst of conflicts and disagreements on how to move forward. Workers experienced heavy hardships during the Gilded Age. Many workers faced long hours, bad conditions, injuries, and even death from working accidents. Men, women, and children worked in factories. Families struggled to get child care or education for children. Later, states passed laws to ban child labor. Company towns were about business renting areas where workers would live. Corruption inspired the growth of labor union. Labor union fought for workers’ rights like collective bargaining. This was about benefits helping workers. They came after a strike. The National Trades Union was the first national labor union being founded in 1834. Many groups wanted higher wages and the 10 hour work day. Socialism grew too. Socialism believed in public control of property and income. German philosophers Karl Marx and Freiderich Engels promoted the ideas of socialism with their book entitled, The Communist Manifesto. It predicted that capitalism would end when workers would rise up to overturn it. Most Americans rejected Communism, but socialism was popular in many smaller circles back then and today.

Image result for Knights of LaborImage result for Haymarket Square strike

The Knights of Labor was created by Uriah Smith Stephen to defend labor rights. They even recruited African Americans. Stephens wanted a workers’ cooperative to replace capitalism. By 1885, the Knights of Labor had women and people of every race or ethnicity. It disappeared largely by the 1890’s. Samuel Gompers created the American Federation or the AFL in 1886. The AFL wanted union to protect crafts making workers. They wanted higher wages, great working conditions, and low working hours. The AFL excluded women since they falsely believed that women depressed wages. Many AFL excluded black workers when they had no explicit policy banning black people form joining. Strikes occurred in 1877 involving railroad workers. The Haymarket Square strike in 1886 in Chicago wanted an eight hour work day. Many people left the Knights of Labor afterwards. The Homestead Strike wanted higher wages and the Pullman strikes wanted a better cost of living and higher wages. Eugene V. Debs was a leader in that strike. Debs was arrested for being involved in the strike. Debs would be a socialist and help for form the IWW or the Industrial Workers of the World. The Gilded Age ironically helped to spread socialism and labor rights activists worldwide, because the corruption of robber barons were so overt that radical change would be necessary for justice to exist for workers. The Gilded Age saw more skyscrapers, more mass transit like cable cars being electric, trolley cars, and the first subway system in Boston by 1897. New York City had its subway system by 1904.

New Social Realities

America is based on diverse peoples representing their cultures. During the era after the Civil War, massive urbanization (or the rapid growth of cities) developed along with industrialization (or the growth of factories and railroads). There was an expansion of farming as well. This was facilitated by increased high levels of immigration. From 1865 to 1918, there was a historic, unprecedented plus diverse amount of immigrants who came into the United States of America. They came into America in the number of 27.5 million people. 89% of these immigrants or 24.4 million people came from Europe, 2.9 million from Britain, 2.2 million from Ireland, 2.1 million from Scandinavia, 3.8 million from Germany, 4.1 million from Italy, 7.8 million from Russia and other parts of eastern and central Europe. Another 1.7 million came from Canada. Many came from Africa and the Caribbean too. Most of these human beings came through the port of New York City, and from 1892, through the immigration station on Ellis Island. Many ethnic groups settled in different locations. New York City and other large cities of the East Coast became home to large Jewish, Irish, and Italian populations. Many Germans and Central Europeans moved into the Midwest. Some of them had jobs in industry and mining. At the same time, about one million French Canadians migrated from Quebec into New England. Immigrants came into America because of poverty, religious threats. They saw America as the “Promised Land” of milk and honey. Many wanted jobs, farmland, and had kin connections to those in America too. Many of them worked at factories, mines, and construction sites. Some found farming opportunities in the Plains states. Many immigrants were welcomed (other European immigrants weren't for a time) while Asian people experienced massive racism and discrimination. Many Chinese Americans constructed railroads in the West Coast, but were treated in a dismissive fashion unlike Western European immigrants. After massively racist, intense anti-Chinese agitation in the West, Congress passed the evil Chinese Exclusion Act of 1882. It was signed into law by President Chester A. Arthur. It suspended Chinese immigration for 10 years and then it was renewed in 1892 and made banning Chinese immigration permanent in 1902. It was the first evil American law to prevent a specific ethnic group from immigrating into America. It was repealed by the Magnuson Act of December 17, 1943. Yet, even that law allowed for the continuation of the ban against ownership of property and businesses by the ethnic Chinese.  In many states, Chinese Americans (including US citizens) were denied property-ownership rights either by law or de facto until the Magnuson Act itself was fully repealed in 1965. Some immigrants stayed temporarily in the U.S. then returned home, often with savings that made them relatively prosperous. Most, however, permanently left their native lands and stayed in hope of finding a better life in the New World. This desire for freedom and prosperity led to the famous term, the American Dream.

In terms of the religion, the Third Great Awakening existed from the late 1850’s to the early 1900’s. It saw the growth of evangelical Protestantism from the late 1850’s to the early 1900’s. During this time, this movement promoted social activism and affected pietistic Protestant denominations. Many followers of this Awakening believed in the postmillennial theology that the Second Coming of Jesus Christ would come after humankind had reformed the whole earth. A major component was the Social Gospel Movement, which applied Christianity to social issues and gained its force from the Awakening, as did the worldwide missionary movement. New groupings emerged, such as the Holiness movement and Nazarene movements, and Christian Science. At the same time, the Catholic Church grew rapidly, with a base in the German, Irish, Polish, and Italian immigrant communities, and a leadership drawn from the Irish. The Catholics were largely working class and concentrated in the industrial cities and mining towns, where they built churches, parochial schools, and charitable institutions, as well as colleges. The Jewish community grew rapidly, especially from the new arrivals from Eastern Europe who settled chiefly in New York City. They avoided the Reform synagogues of the older German Jewish people and instead formed Orthodox and Conservative synagogues.

Race relations between 1877 and 1918 were horrible. Black Americans during this time lost many of their civil rights obtained via Reconstruction. Many African Americans suffered racial discrimination, racist lynching, violence, and anti-black racial riots. This led to many problems in the living conditions of many African Americans. The South expanded Jim Crow laws. These laws didn’t just deal with restricting voting (literacy tests, poll taxes, and grandfather clauses were used to deprive black people in the South to vote). Grandfather clauses didn’t want people to vote if their grandfathers didn’t vote before 1866. Since, many black people in the South were slaves before 1866, many black people weren’t allowed to vote. It meant separate, unequal restaurants, trains, pools, cemeteries, schools, and other facets of society. Many white people formed all white primaries to only allow whites to have a voice in elections. In 1896, Homer Plessy, an African American, was denied of his rights via the Supreme Court’s Plessy v. Ferguson decision. That decision upheld racial segregation via its sick “separate but equal” doctrine. The case came after Homer Plessy sat in a white section of a Louisiana train car. By the end of World War II, only 3 percent of African Americans had the right to vote. Black people in Louisiana went from 130,000 people voting in 1894 to only 1,300 people voting in 1904. Black Americans fought back too. Frederick Douglass lived during racial oppression, but told his allies to continue to agitate and fight for freedom by the late 1800’s. Black Americans created civil rights groups, women’s clubs, fraternal organizations, schools, colleges, and political organizations in fighting for our human rights back then. Many black people had diverse views on how to achieve equality (like Booker T. Washington and W.E.B. DuBois), but they agreed with the same goal (which is equality and justice for black people). Booker T. Washington was born a slave and became free. His legacy was part of educational opportunities for those of black African descent. He was right to advance education and vocational work for African Americans. He was right to promote land ownership. He was wrong to advance the principle that true equal rights must be based on previous preparation for it. Freedom is not based on a clock, but should be given immediate irrespectively of anything. He was also wrong to believe in a capitalist extremism and to promote the Atlanta Compromise since justice is not compromise, but liberation. You don’t compromise with your oppressor, but you defeat your oppression. Later in his life, Booker T. Washington would support efforts to end Jim Crow.

W.E. B. DuBois believed that political agitation and embracing a liberal arts education would cause equality for black people. DuBois is right that no accommodating of southern white racists is needed and he was right that black people should demand for immediate equality via political agitation. DuBois was wrong to advance the Talented Tenth principle or a select of bourgeois black people being made leaders of the black community. Leadership is egalitarian not possessed on a very few amount of people. We can all be leaders. DuBois is right to promote many progressive positions on housing, the economy, and on being anti-imperialist. Ida B. Wells also opposed lynching and racism. She was raised in Holly Springs, Mississippi. She knew both Frederick Douglass and WEB DuBois. She was one founde
          Création by jaune-cerise.ch - SQL Injection      Cache   Translate Page   Web Page Cache   
Topic: Création by jaune-cerise.ch - SQL Injection Risk: Medium Text:# Exploit Title: Création by jaune-cerise.ch - SQL Injection # Google Dork: intext:"Created by www.jaune-cerise.ch" # Date: ... - Source: cxsecurity.com
          Powered By Integral Info Systems - SQL Injection      Cache   Translate Page   Web Page Cache   
Topic: Powered By Integral Info Systems - SQL Injection Risk: Medium Text:# Exploit Title: Powered By Integral Info Systems - SQL Injection # Google Dork: intext:Powered By integralinfosystems # Date. ... - Source: cxsecurity.com
          Designed by Creative Web Designers SQL Injection      Cache   Translate Page   Web Page Cache   
Topic: Designed by Creative Web Designers SQL Injection Risk: Medium Text: - * Exploit Title: Designed by Creative Web Designers SQL Injection - * Exploit... - Source: cxsecurity.com
          QNap QVR Client 5.0.3.23100 Denial of Service (PoC)      Cache   Translate Page   Web Page Cache   
Topic: QNap QVR Client 5.0.3.23100 Denial of Service (PoC) Risk: Medium Text:# Exploit Title : QNap QVR Client 5.0.3.23100 - Denial of Service (PoC) # Discovery by : Rodrigo Eduardo Rodriguez # Discov ... - Source: cxsecurity.com
          Technicien en géologie et en modélisation 3D - BBA - Abitibi, QC      Cache   Translate Page   Web Page Cache   
Apporter un soutien à la modélisation et à la mise à jour des ressources chez les clients dans des sites d’exploration ou en exploitation, et apporter des...
From BBA - Thu, 14 Jun 2018 13:48:10 GMT - View all Abitibi, QC jobs
          TNW 44: The Not iPhone 9      Cache   Translate Page   Web Page Cache   

Tech News Weekly (Video LO)

  • 1:30 From Hyper-V exploits, to the security implications of Blockchain, The Register's Iain Thomson is on-site at the Blackhat Security Conference and gives his take on a number of presentations from the event.
  • 11:12 Infowars was kicked off of Apple Podcasts and later YouTube and Facebook, but Twitter has held strong. Ian Sherr from CNET talks about the tricky position CEO Jack Dorsey finds himself in, and what freedom of speech means to private companies.
  • 26:11 The White House met with tech executives to discuss the extent of Chinese trade tariffs on technology products. David McCabe from Axios had the scoop and shares his thoughts about what this might mean for technology companies in the near term.
  • 32:24 KTLA's Rich DeMuro attended Samsung's Unpacked event where the company unveiled its latest Galaxy Note 9 smartphone. Rich goes hands-on with the phone and talks about the potential of the Galaxy Home Bixby smart speaker.

Hosts: Megan Morrone and Jason Howell

Guests: Iain Thomson, Ian Sherr, David McCabe, and Rich DeMuro

Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly.

Sponsor:


          More Security Flaws at Comcast Left Customer Data Vulnerable      Cache   Translate Page   Web Page Cache   

Portions of the home addresses and Social Security numbers of more than 26 million Comcast Xfinity customers were exposed thanks to two security flaws.

The vulnerabilities were discovered by security researcher Ryan Stevenson and reported by BuzzFeed News on Wednesday. Comcast emphasizes that it has fixed the problems: “We quickly investigated these issues and within hours we blocked both vulnerabilities, eliminating the ability to conduct the actions described by these researchers,” spokesperson David McGuire told Slate in a statement. “We take our customers’ security very seriously, and we have no reason to believe these vulnerabilities were ever used against Comcast customers outside of the research described in this report.”

The first flaw exposed customers’ partial home addresses on an “in-home authentication” page—a feature that allows customers to pay bills online without signing in if using a device connected to their home IP address (a numeric designation that identifies a computer’s location on the internet). All customers would have to do to verify their identity was select their correct partial home address from one of four options displayed. This was easily exploitable, BuzzFeed pointed out, because a hacker could have spoofed a customer’s IP address and then refreshed the page repeatedly to find their home address, since the correct answer would not change with each refresh. (Finding someone’s IP address is relatively simple.) That would give the hacker the first digit of the street number and the first three letters of the street name—enough to find the city, state, and postal code of the partial address, meaning that the hacker could determine the person’s specific location. Comcast has since changed the page so it requires customers to provide more information to log in.

The second flaw exposed the last four digits of customers’ Social Security numbers on the sign-up page for Comcast’s Authorized Dealer website, which helps customers find sales agents at non-Comcast retail locations. There was no limit on the number of times someone could submit the form, so a hacker would simply have had to input someone’s billing address in the respective boxes. Then, in a box titled “Last 4 Digits of SSN,” the bad actor could have put in random four-digit combinations (or used special software to do so) until they discovered the correct combination. Comcast has since limited the number of attempts.

The company has not found any indication that anyone actually exploited these vulnerabilities, but its review of the situation is ongoing. Comcast does have a submission form for reporting security flaws, though it does not offer a bounty program or compensation in exchange for this information. But Stevenson, the security researcher, did not report his findings to Comcast, according to BuzzFeed.

This isn’t the first time that Comcast customer data have been vulnerable. ZDNet has found two recent flaws: In May, it reported that a bug on the Xfinity website left customers’ Wi-Fi passwords and home addresses vulnerable. In June, it revealed that another page on the Xfinity website had exposed customers’ account numbers and home addresses.


          Commentaires sur Dans le secret des dieux / L’art scandaleux des menaces chez les demi-dieux par Eleusis      Cache   Translate Page   Web Page Cache   
Oh!!! Samuel F c'est peut- être un peu prétentieux ….Allez donc savoir ! "Je suis immunisé contre ce genre de saleté …."Hum.... sommes nous immunisés contre ces perversions qui remuent les tripes et quelquefois appelle la révolte?……...parfois ça fait mal, très mal!!! Pourtant, quand je lis cet article,les autres aussi ….. je retrouve tellement de choses vrai que je me dis , "enfin un Chrétien qui a le courage de dénoncer ces injustices qui se pratiquent au nom de Jésus !!!! Alors il m'arrive dans mes réflexions de me révolter, Mais à quoi bon? les dés sont pipés et nous vivons dans un monde corrompu . Par contre une âme au Seigneur est toujours un âme……... Ceci étant dit, les "justes" j'en ai ma claque , ils ont réussi par leur hypocrisies chroniques à ne plus croire leur "préchis prèchas" . Même si dans leur égos, ils sont sincères . J'ai eu la chance , et je remercie le Seigneur de m'avoir épargné. Ainsi j'ai appris dans mon petit cursus , que si on veut fédérer il faut commencer par écouter .Il m'est arrivé de prier le Seigneur , devant l'absurde de certaines situations . (Je ne dois pas être le seul ) . J'ai participé à certaines réunions pour arriver à une conclusion raisonnable d'attendre parfois des heures pour emmener le ou les "réfractaires " à des finalités plus raisonnables…… C'était dans le dit monde….. Dans les Eglises le support reste la Parole mais si d'un côté se trouve l'infaillibilité de la connaissance , et de l'autre le "bouseux" qui de toute évidence, , ne comprends pas . Il est clair que l'Eglise ne peut pas s'édifier !…….. Qui peut dénoncer ceci ? Qui peut placer chacun au niveau du vase que le Seigneur utilise ou pas? "Jouer des coudes" n'édifie pas (N'y a-t-il pas quelqu'un qui a demandé qu'ils soient d'un côté et de l'autre de Jésus lors de son avènement? Voyons ce que le Seigneur a répondu.) Je remercie le Seigneur , dans mon cheminement qu'il m'ait donné la capacité , aussi bien dans la création que dans la maintenance d'aller voir jusqu'au balayeur , pour savoir si ma décision n'allait pas le pénaliser!. A cette époque j'avais des conducteurs spirituels qui n'imaginaient pas hors mis leur savoir que des conseils du dernier pouvaient impacter le milieu L'écoute est toujours une pédagogie à résultat.. Il est vrai que j'étais le seul(en cravate) où quand l'équipe de maintenance "arrosait", elle m'invitait. Mais La sottise humaine, sans limite reprochait d'être trop près du "manant qu'on exploite" Ce n'était pas porteur ……..(Une autre histoire ….) J'ai appris ainsi , que la nature humaine ne marche pas toujours au même pas, et encore moins au même niveau . Tout le monde, n'a pas le système quantique dans la tête , mais tout le monde peut comprendre l'autre par le cœur!!!! La Parole nous dit qu'il y aurait des pleurs et des grincements de dents. Je n'ai jamais rencontré un conducteur spirituel qui dise, c'est pour moi aussi, j'arrête le "trafic …..". Tant que le Seigneur n'est pas de retour , l'ennemi a encore des beaux jours dans "la salle du savoir imposé" . Sous l'empire romain , il y avait jésus et 12apôtres dont un traitre…….Aujourd'hui , le peuple de Dieu, est-il nombreux ? je crois que proportionnellement il est aussi minoritaire, c'est aussi de notre faute , de ne pas laisser agir le Seigneur librement à notre place . Le Seigneur nous a dit de ne point craindre , attendant avec patience sans bannir celui qui se détourne ,(ex l'enfant prodigue ) sans agréer des pactes de "sorcier" ,attendre patiemment la vision claire du Seigneur en gardant le bon dépôt ,même si les vents sont contraires. Le Seigneur nous garde , nous pouvons en être certain . N'est-ce pas le temps d'Apostasie ? Le monde est rentré dans les églises ceci n'est pas le fruit du hasard , mais une prise de plus en plus accentuée du pouvoir "prédateur". Ouvrons les yeux sans timidité ! Sans idolâtrie ni soumission . Nous sommes libres en Christ! Quand aux demi dieux laissons les tirer des bords par mer calme , si un jour un vent contraire les ralentis, le coup de vent passé, peut-être alors, ils naviguerons dans de meilleurs conditions.…….!Un acte de foi !……..
          Ottawa police charge local man for child porn possession, distribution after tracing internet uploads      Cache   Translate Page   Web Page Cache   
A 33-year-old Ottawa man was facing multiple child pornography charges Thursday after a tip from the National Child Exploitation Coordination Centre led police to a South Keys home. In December 2017, the NCECC sent the Ottawa police’s internet child exploitation unit six reports from its cyber tip line. The reports identified an Ottawa-area IP address […]
          Systems Maintenance Technician and Trainer - Leidos - Virginia Beach, VA      Cache   Translate Page   Web Page Cache   
Recent Operational experience in Ships Signals Exploitation Space (SSES) aboard CG, DDG, or LPD class ships....
From Leidos - Wed, 08 Aug 2018 12:47:09 GMT - View all Virginia Beach, VA jobs
          Practical Web Cache Poisoning      Cache   Translate Page   Web Page Cache   
Abstract Web cache poisoning has long been an elusive vulnerability, a 'theoretical' threat used mostly to scare developers into obediently patching issues that nobody could actually exploit. In this
          Eliza – Exploited College Girls      Cache   Translate Page   Web Page Cache   

Pretty little Eliza, with her sweet face and pig tails, no one could blame you to think she was a “nice” girl, but underneath that innocent exterior is dirty little sex kitten that likes it when you get rough with her. Maybe it’s because she’s a late bloomer losing her virginity at 18, but now...

The post Eliza – Exploited College Girls appeared first on WatchxXxFree.Xyz.


          Directeur de l’exploitation des magasins - Place du Royaume (NEW STORE) - Old Navy - Chicoutimi, QC      Cache   Translate Page   Web Page Cache   
A été, pour une treizième année consécutive, nommée Meilleur environnement de travail par la Human Rights Campaign et a été l’unique gagnant du prix Catalyst...
From Gap Inc. - Tue, 24 Jul 2018 10:34:54 GMT - View all Chicoutimi, QC jobs
          Beware the Slippery Slope of Facebook Censorship      Cache   Translate Page   Web Page Cache   
August 8, 2018
Common Dreams
Matt Taibbi

The social network is too big and broken to properly function, and these “fixes” will only create more problems

You may have seen a story this week detailing how Facebook shut down a series of accounts. As noted by Politico, Facebook claimed these accounts “sought to inflame social and political tensions in the United States, and said their activity was similar — and in some cases connected — to that of Russian accounts during the 2016 election.”

Similar? What does “similar” mean?

The death-pit for civil liberties is usually found in a combination of fringe/unpopular people or ideas and a national security emergency.

This is where we are with this unsettling new confab of Facebook, Congress and the Trump administration.

Read this jarring quote from Sen. Mark Warner (D-VA) about the shutting down of the “inauthentic” accounts:

“Today’s disclosure is further evidence that the Kremlin continues to exploit platforms like Facebook to sow division and spread disinformation… I also expect Facebook, along with other platform companies, will continue to identify Russian troll activity and to work with Congress…”

This was in a story in which Facebook stated that it did not know the source of all the pages. They might be Russian, or they might just be Warner’s idea of “sowing division.” Are we comfortable with that range of possibilities?

Many of the banned pages look like parodies of some paranoid bureaucrat’s idea of dangerous speech.

A page called “Black Elevation” shows a picture of Huey Newton and offers readers a job. “Aztlan Warriors” contains a meme celebrating the likes of Geronimo and Zapata, giving thanks for their service in the “the 500 year war against colonialism.”

And a banned “Mindful Being” page shared this, which seems culled from Jack Handey’s Deep Thoughts bit:

“We must unlearn what we have learned because a conditioned mind cannot comprehend the infinite.”

Facebook also wiped out a “No Unite The Right 2” page, appearing to advertise a counter-rally on the upcoming anniversary of the violence in Charlottesville, Virginia.

Facebook was “helped” in its efforts to wipe out these dangerous memes by the Atlantic Council, on whose board you’ll find confidence-inspiring names like Henry Kissinger, former CIA chief Michael Hayden, former acting CIA head Michael Morell and former Bush-era Homeland Security chief Michael Chertoff. (The latter is the guy who used to bring you the insane color-coded terror threat level system.)

These people now have their hands on what is essentially a direct lever over nationwide news distribution. It’s hard to understate the potential mischief that lurks behind this union of Internet platforms and would-be government censors.

As noted in Rolling Stone earlier this year, 70 percent of Americans get their news from just two sources, Facebook and Google. As that number rises, the power of just a few people to decide what information does and does not reach the public will amplify significantly.

In a way, this is the other shoe dropping after last week’s much-publicized brouhaha over Infowars lunatic Alex Jones. Jones had four videos removed from YouTube and had his Facebook page banned for 30 days, though he seemed to find a way around that more or less instantly.

These moves were celebrated across social media, because who doesn’t hate Alex Jones?

The complainants in the Jones case included parents of Sandy Hook victims, who have legitimate beef with Jones and his conspiratorial coverage. The Infowars reports asserting the grieving parents were green-screen fakes were not just demonstrably false and rightfully the subject of a defamation suit, but also seemingly crossed a separate line when they published maps and addresses of family members, who experienced threats.

When Jones and his like-minded pals cried censorship and bias, they came across as more than a little disingenuous. After all, right-wingers have consistently argued on behalf of the speech rights of big corporations.

Conservative justices have handed down rulings using the First Amendment to hold back regulation of big tobacco and the gun industry, and to justify unlimited campaign spending. Citizens United was a crucial moment in the degradation of the First Amendment, essentially defining corporate influence as speech.

As many pointed out last week, the Jones ban was not a legal speech issue – not exactly, anyway. No matter how often Jones yelped about “Hitler levels of censorship,” and no matter how many rambling pages he and his minions typed up in their “emergency report” on the “deep state plan to kill the First Amendment,” it didn’t change the objectively true fact their ban was not (yet) a First Amendment issue.

The First Amendment, after all, only addresses the government’s power to restrict speech. It doesn’t address what Facebook, Google, YouTube and Twitter can do as private companies, enforcing their terms of service.

So it’s true, there was no First Amendment issue with the Jones ban. But that’s the problem.

The pre-Internet system for dealing with defamatory and libelous speech was litigation, which was pretty effective. The standard for punishment was also very high. In the 1964 Supreme Court case New York Times v. Sullivan — the bedrock case for libel law involving a public figure — the court went out of its way to make sure that complainants needed to prove reckless or knowing disregard for fact.

Among other things, the court worried that absent such a tough legal standard, outlets would play it too safe with speech, and “make only statements which ‘steer far wider of the unlawful zone.’”

This mostly worked. Historically there were few analogs to Infowars that got anything like wide distribution because of the financial threat, which scared publishers most of all. In order to have power to distribute widely you needed resources, but you put those resources at risk if you defamed people.

That all changed with digital media. Way back in 1996, when mastodons roamed the earth and people used dial-up to connect to the Internet, Congress passed the Communications Decency Act.It contained the following landmark language:

“No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.”

Essentially this meant that Internet providers wouldn’t be treated like news organizations. In the eyes of the law, they were less like CBS or Random House than they were bookstores or newsstands.

The rule allowed platforms to grow exponentially without the same fear of litigation. Companies like Facebook and Google became all-powerful media distributors, and were able to profit from InfoWars-style programs without having to be liable for them.

This led to the flowering of so much obnoxious speech that the First Amendment acquired a reputation as a racist con, and online media distributors, instead of being sued themselves as publishers, began to be viewed as potential restorers of order, beneficent censors.

Now, at a moment of crisis and high political tension, the public seems unable to grasp the gravity of allowing the government or anyone else to use that power.

It is already a scandal that these de facto private media regulators have secret algorithmic processes that push down some news organizations in favor of others. Witness the complaints by outlets like Alternet, Truthdig and others that big platforms have been de-emphasizing alternative sites in the name of combating “fake news.”

But this week’s revelation is worse. When Facebook works with the government and wannabe star-chamber organizations like the Atlantic Council to delete sites on national security grounds, using secret methodology, it opens the door to nightmare possibilities that you’d find in dystopian novels.

The sheer market power of these companies over information flow has always been the real threat. This is why breaking them up should have long ago become an urgent national priority.

Instead, as was obvious during the Senate hearing with Mark Zuckerberg earlier this year, politicians are more interested in using than curtailing the power of these companies. The platforms, for their part, will cave rather than be regulated. The endgame here couldn’t be clearer. This is how authoritarian marriages begin, and people should be very worried.

Posted with permission from Common Dreams.


          Weymouth woman arrested on child pornography      Cache   Translate Page   Web Page Cache   
The RCMP’s Provincial Internet Child Exploitation (ICE) Unit has arrested a Weymouth woman for child pornography offences. On August 8, the RCMP’s ICE Unit searched a home in Weymouth and was assisted by the RCMP’s Technological Crime Unit and RCMP officers from across the province. Summer Ann McCauley, 21, was arrested without incident. She has …
          Madame et Monsieur , dans le but de lutter contre sur Poireaux vinaigrette à la clémentine      Cache   Translate Page   Web Page Cache   
Madame et Monsieur , dans le but de lutter contre la pauvreté et l’exclusion bancaire, Nous vous proposons en ligne.
-Des Prêts commerciaux -Des Prêts personnels -Des Prêts pour des rachats de crédits -Des Prêts immobilier et tous allant de 1000€ à 700.000 € Nous réservons à nos clients un accueil parfait basé sur le respect, la courtoisie et le meilleur des services, nous avons la qualification nécessaire pour vous aider dans vos projets, Nous offrons de prêts aux Particuliers ; Co- exploitation et organismes qui ont besoin de prêts pour les petites et moyennes entreprises,investissements personnels pour un taux d’intérêt allant de 2% à 5 % fixes en fonction du montant et la durée du crédit avec des conditions de remboursement qui sont très avantageuses et moins coûteuses. Par ailleurs, l'argent sera sur votre compte avant toute situation de paiement. contacter moi au: stoltz.beatrice.marie@gmail.com Un crédit vous engage et doit être remboursé. Vérifiez vos capacités de remboursement avant de vous engager. Pas de sérieux s'abstenir
          Madame et Monsieur , dans le but de lutter contre sur Poireaux vinaigrette à la clémentine      Cache   Translate Page   Web Page Cache   
Madame et Monsieur , dans le but de lutter contre la pauvreté et l’exclusion bancaire, Nous vous proposons en ligne.
-Des Prêts commerciaux -Des Prêts personnels -Des Prêts pour des rachats de crédits -Des Prêts immobilier et tous allant de 1000€ à 700.000 € Nous réservons à nos clients un accueil parfait basé sur le respect, la courtoisie et le meilleur des services, nous avons la qualification nécessaire pour vous aider dans vos projets, Nous offrons de prêts aux Particuliers ; Co- exploitation et organismes qui ont besoin de prêts pour les petites et moyennes entreprises,investissements personnels pour un taux d’intérêt allant de 2% à 5 % fixes en fonction du montant et la durée du crédit avec des conditions de remboursement qui sont très avantageuses et moins coûteuses. Par ailleurs, l'argent sera sur votre compte avant toute situation de paiement. contacter moi au: stoltz.beatrice.marie@gmail.com Un crédit vous engage et doit être remboursé. Vérifiez vos capacités de remboursement avant de vous engager. Pas de sérieux s'abstenir
          www/p5-Mojolicious - 7.92      Cache   Translate Page   Web Page Cache   
Update Mojolicious to 7.92 This release reverts the addition of stream classes (added in 7.83), which have unfortunately resulted in many Mojolicious applications becoming unstable. While there are no known exploits yet, we've chosen to err on the side of cautiousness and will classify this as a security issue. MFH: 2018Q3
          Superviseur BBW - Galeries de la Capitale - Victoria's Secret - Québec City, QC      Cache   Translate Page   Web Page Cache   
Incorporer les messages de pr vention des pertes et de s curit dans l'exploitation quotidienne. Pr senter de la r troaction individuelle et en quipe et faire...
From L Brands - Tue, 31 Jul 2018 10:19:27 GMT - View all Québec City, QC jobs
          Detenteur de cle BBW - Galeries de la Capitale - Bath & Body Works - Québec City, QC      Cache   Translate Page   Web Page Cache   
Incorporer les messages de pr vention des pertes et de s curit dans l'exploitation quotidienne. Pr senter de la r troaction individuelle et en quipe et faire...
From L Brands - Sat, 14 Jul 2018 15:31:48 GMT - View all Québec City, QC jobs
          Comment on My Take On “The Boers in Russia” by Rommel 41      Cache   Translate Page   Web Page Cache   
Sad to say this is what happens when you allow yourself to be cucked by jews, When you stop being aggressive and dominating, and slowly but surely become soft, compassionate, accommodating, apologetic, then in the end victims and losers. And it's not like there is no track record of the kikes doing this before, or examples in nature of how weakness is exploited. I'm compassionate for animals, esp. for Man's companion, farm, and work animals. Respect for them. Other races - alien races - I don't give a damn. And neither should you if you wanna call yourself a White Nationalist or National Socialist. And if you want to continue to win and determine your own fate. Hate to trot out that tired old phrase, 'Nature abhors a vacuum', but ain't it the truth ?! If you're not willing to call the shots, run the show, & maintain your status, then you'll surely lose it or give it up. The Whites in South Africa should be a fricking case study if there ever was one. They aren't just being run out of their own damn country, the one THAT THEY BUILT for themselves from scratch, but they are being cursed and condemned and even killed in the bargain. Thank you very much. Seen enough White man ?!! Notice how much others care about you, are grateful to you, and hold your best interest near and dear. Benevolence is a luxury best reserved for your own. We either rule or we are GETTING RULED and having our asses handed to us in the bargain. I feel like I'm giving a speech here and I guess I am. But I am sickened by this article & what it demonstrates. I'm infuriated by the reality that a once strong, proud, prosperous people who could certainly "handle their business" if organized and committed, are having to skulk off to another country and surrender their land and their achievements to a bunch of ungrateful niggers who didn't earn it, and won't appreciate it OR maintain it all due to a bunch of vile subversive jew sputum. (Definition: mixture of mucus and saliva coughed up typically as a result or infection or disease) Does that work or what ?! I'll close using my favorite of analogies: FOOTBALL. No not soccer - pleeez. American tackle Football. You're either on offense or defense. ONE or THE OTHER. If you're not attacking, then you HAVE TO defend against attack. Just because you don't want to vigorously defend, the other side isn't gonna take it easy or stop trying to score. If you DO NOTHING, they will surely march that ball right across the goal = Touchdown. Keep allowing that, and GIVE UP on trying to score, or ATTACKING, and at the end of the day, YOU LOSE. That simple. So now the jews and the niggers get to 'point at the scoreboard' (to borrow a phrase) and laugh at you. And they should. Because while you were busy trying to be nice, trying not to be "racist", trying not to be an evil colonizer imperialist - "Oh, you stole our land" they were busy not giving a damn about you and planning on kicking your ass and taking your shit. In increments, as always. The Boers, and the weak traitors within, forgot this eternal truth. Don't you. As Will Ferrell said, "If you're not first, you're last." How do you like it South Africa ?!!
          The Daily Signal Podcast: Thursday, August 9      Cache   Translate Page   Web Page Cache   
On 08.08.18 11:01 PM posted by Katrina Trinko Can drones be used for assassinations, terrorist attacks, and drug trafficking? The Heritage Foundation’s Jason Snead explains how drones are already being exploited by bad actors—and why the U.S. needs to act more aggressively on the drone issue. Plus: The Oscars are trying a new strategy to get viewers. We also cover*these stories: * Rep. Chris Collins, R-N.Y., is facing charges of insider trading.
          "Beyonce's family tree reveals her great-great-great grandfather was a wealthy white merchant who married a slave in a 'love match'"      Cache   Translate Page   Web Page Cache   
It doesn't take much imagination to re-write the Daily Mail's rehashed spin.

The whole thing is about how her black female ancestors were slaves bought and exploited by wicked white men.

For sure they were, but you might as well say that she is descended from wicked white men who forced themselves on female slaves.

Or, she might accept that whatever happened two centuries ago is pretty irrelevant to her. For example, one of my grand-dads was a quartermaster in the British Army in India 'handing out underpants' as he liked to say; the other developed photographs for Luftwaffe reconaissance on the Eastern Front. The bit I'm proud of is that neither fired a shot in anger, and my German grand-dad actually deserted a few days before the Russians overran them. But frankly, so what?
          Ethical Hacking - Capture the Flag Walkthroughs      Cache   Translate Page   Web Page Cache   
Ethical Hacking - Capture the Flag Walkthroughs
Ethical Hacking - Capture the Flag Walkthroughs
.MP4, AVC, 1000 kbps, 1280x720 | English, AAC, 128 kbps, 2 Ch | 2h 57m | 2.36 GB
Created by Professor K

Video and lab Walkthroughs for Capture the Flag Exercises

Using the hacking methodology, this course will teach you how to use the those pentesting tools to enumerate and gain root access. Over the span of the course, you will learn the different attack vectors used to exploit a target.


          OUR UNIVERSITIES: A Force For Evil      Cache   Translate Page   Web Page Cache   
By Walter E. Williams

Many of the nation’s colleges have become a force for evil and a focal point for the destruction of traditional American values. The threat to our future lies in the fact that today’s college students are tomorrow’s teachers, professors, judges, attorneys, legislators, and policymakers.

A recent Brookings Institution poll suggests that nearly half of college students believe hate speech is not protected by the First Amendment. Of course, it is.

Fifty-one percent of students think that it’s acceptable to shout down a speaker with whom they disagree. About 20 percent of students hold that it’s acceptable to use violence to prevent a speaker from speaking. Over 50 percent say colleges should prohibit speech and viewpoints that might offend certain people.

Contempt for the First Amendment and other constitutional guarantees is probably shared by the students’ high school teachers, as well as many college professors.

Brainwashing and indoctrination of young people has produced some predictable results, as shown by a recent Gallup poll. For the past 18 years, Gallup has asked adults how proud they are to be Americans. This year, only 47 percent say they are “extremely proud,” well below the peak of 70 percent in 2003. The least proud to be Americans are nonwhites, young adults, and college graduates.

The proudest Americans are those older than 50 and those who did not graduate from college. The latter might be explained by their limited exposure to America’s academic elite.

Johnetta Benton, a teacher at Hampton Middle School near Atlanta, was recorded telling her sixth-grade students, “America has never been great for minorities.” In a tirade, she told her class: “Because Europeans came from Europe … you are an immigrant. You are an illegal immigrant because you came and just took it. … You are an immigrant. This is not your country.”

To exploit young, immature people this way represents an act of supreme cowardice. The teacher should be fired, but I’m guessing that her colleagues share her sympathies. At the same school, students were given a homework assignment that required them to write a letter asking lawmakers for stricter gun control laws.

One might be tempted to argue that the growing contempt for liberty and the lack of civility stem from the election of Donald Trump. That’s entirely wrong. The lack of civility and indoctrination of our young people have been going on for decades.

UCLA history professor Mary Corey told her class: “Capitalism isn’t a lie on purpose. It’s just a lie.” She added that capitalists “are swine. … They’re bastard people.”

An English professor at Montclair State University, in New Jersey, told his students, “Conservatism champions racism, exploitation and imperialist war.”

An ethnic studies professor at California State University, Northridge and Pasadena City College teaches that “the role of students and teachers in ethnic studies is to comfort the afflicted and afflict the comfortable.”

The University of California, Santa Barbara’s school of education emailed its faculty members to ask them to consider classroom options concerning the Iraq War, suggesting they excuse students from class to attend anti-war events and give them extra credit for writing about it.

Rodney Swanson, a UCLA economics professor, told his class, “The United States of America, backed by facts, is the greediest and most selfish country in the world.”

There is little question that colleges stand at the forefront of an attack on America and Western values.

Leftists often say that the U.S. is the world’s worst country. But here are some empirical facts they might explain. According to a recent Gallup poll, about 13 percent of the world’s adults—630 million people—would like to move to another country. Roughly 138 million would like to live in the U.S.—making us the No. 1 destination, followed by the U.K., Canada, and France.

There’s something exceptionally appealing about America and the Western world that leftists choose to ignore or lie about.


Read more at Daily Signal.

          Performances Analysis of GNSS NLOS Bias Correction in Urban Environment Using a Three-Dimensional City Model and GNSS Simulator      Cache   Translate Page   Web Page Cache   
The well-known conventional least squares (LS) and extended Kalman filter (EKF) are ones of the most widely used algorithms in science and particularly in localization with global navigation satellites systems (GNSS) measurements. However, these estimators are not optimal when the GNSS measurements become contaminated by nonGaussian errors including multipath (MP) and nonline-of-sight (NLOS) biases. On the other hand, this kind of ranging measurements errors occurs generally in urban areas where GNSS-based positioning applications require more accuracy and reliability. In this paper, we use additional information of the environment consisting of bias prediction from a three-dimensional (3-D) model and a GNSS simulator to exploit constructively NLOS measurements. We use this 3-D GNSS simulator to predict lower and upper bounds of these biases. Then, we integrate this information in the position estimation problem by considering these biases as additive error and exploiting the bounds to end-up with a constrained state estimation problem that we resolve with existing constrained least squares (CLS) and constrained EKF (CEFK) algorithms. Experimental results using real GPS signals in down-town Toulouse show that the proposed estimator is capable of improving the positioning accuracy compared with conventional algorithms. Theoretical conditions have been established to determine the acceptable bias prediction error allowing better positioning performance than conventional estimators. Tests are conducted then to validate these conditions and investigate the influence of the bias prediction error on the localization performance by proposing new accuracy metrics.
          Computationally Efficient Bistatic MIMO Radar Signal Processing Architecture Based on Coupling of Range and Direction      Cache   Translate Page   Web Page Cache   
Since targets located in the same direction of arrival (DOA) have different directions of departure (DOD), the computation burden of signal processing in bistatic multiple-input multiple-output (MIMO) radar is huge. In this paper, a novel computationally efficient signal processing architecture is proposed for bistatic MIMO radar by exploiting the coupling of range and direction (CRD) property. In the proposed architecture, the echo signals of the targets located in the same DOA are processed first using the same space–time matched filter (STMF) without considering the DOD difference. Due to the CRD, the echo signals can be matched efficiently, but the locations of the targets deviate from their true values in the processing result. Then, through analyzing the CRD thoroughly, an iterative method is proposed to rectify the deviation and the targets’ real location can be obtained accordingly. Since the echo signals of the targets located in the same DOA can be processed effectively with the same STMF, the proposed architecture is more efficient in computation than the conventional one. The convergence property of the proposed iterative method is guaranteed theoretically, and the effectiveness of the new signal processing architecture is verified through numerical experiments.
          Fast Angle Estimation for MIMO Radar With Nonorthogonal Waveforms      Cache   Translate Page   Web Page Cache   
In this letter, a fast angle-estimation method for multiple-input-multiple-output radar with nonorthogonal waveforms is devised. This method first estimates the noise-free covariance matrix by exploiting its low-rank property as well as the sparse structure of the noise-covariance matrix. A subspace-based procedure is then developed to determine the directions-of-arrival (DOAs) based on the matrix composed of the principal eigenvectors of the noise-free covariance-matrix estimate. Compared with the state-of-the-art prewhitening algorithm, the proposed method does not need the knowledge of the correlation matrix of transmitted waveforms. Moreover, it is computationally attractive since the DOAs can be estimated in closed form. In addition, the proposed method offers promising DOA-estimation performance as verified by simulation results.
          Comment on Harm vs. Purity by Martin      Cache   Translate Page   Web Page Cache   
Pokemom used porn to illustrate why using the "harm" angle is more effective than the "purity" angle in teaching kids to stay away from porn. And she/he isn't wrong in every case -- just probably in most. The fact is, it's very hard to demonstrate that simply viewing porn is actually hurting anybody. There are plenty of people who indulge in porn who would testify that it hasn't hurt their personal relationships or that it has anything to do with their personal relationships at all. Porn is free, it's easily accessible, and whether or not one random teenage boy views it or not makes no difference to any exploited actors. Plus, even among the readers of this blog, you'll find a substantial number who think the dangers/harms of porn are vastly overblown. Even if you think the arguments in defense of porn are specious, they certainly give enough cover for your average, attempting-to-be-moral-but-horny teen to justify indulging. Desiring to maintain personal purity, and desiring not to tempt others into damaging their own, is still a valuable motivator to a lot of people. To further illustrate this point, if you take the "harm" angle to it's logical conclusion, unless an action can be demonstrated to cause harm, it cannot be considered immoral. So, those aforementioned blog readers who think the harms of porn are vastly overblown would also not view indulging in porn as being immoral. Judging from what Jesus has said in the New Testament about "lusting after", He doesn't sound like he'd agree with that point of view. Please don't get me wrong -- I use the harm angle in my personal evaluation of morality more than I do the purity angle as well. But if it's the only angle (which seems to be true of many progressives), then what choices does one make when the harm, which may actually be there, isn't apparent? I think it's much wiser to blend all the angles presented to us in the scriptures, rather than smugly dismissing one as inferior.
          préposé/préposée de mine - GroupeSFP - Fermont, QC      Cache   Translate Page   Web Page Cache   
CONFIDENTIEL FERMONT (Québec) G0G1J0 Précisions sur le lieu de travail : ArcelorMittal Exploitation minière Canada s.e.n.c. est le numéro un mondial de l...
From GroupeSFP - Wed, 18 Jul 2018 06:40:14 GMT - View all Fermont, QC jobs
          Hamas and Israel reportedly reach ceasefire after violent exchange near Gaza left 3 dead - Business Insider      Cache   Translate Page   Web Page Cache   

Business Insider

Hamas and Israel reportedly reach ceasefire after violent exchange near Gaza left 3 dead
Business Insider
Israel and Hamas reportedly reached an uneasy ceasefire after a fiery night of rockets and bombings left three people dead and several others injured in Israel and near Gaza. A pregnant Palestinian woman and her 18-month-old child were killed in ...
Israel and Hamas Trade Blows Amid Talks Toward a Cease-FireBloomberg
Israel and Hamas seem to pull back from the brink of war after violence flaresPBS NewsHour
Palestinians Say Hamas, Israel Reach Truce in GazaVoice of America
New York Times -CNN -Fox News -Haaretz
all 1,339 news articles »

          [bart13] Sen. Dianne Feinstein’s Ties To China Go Way Deeper Than An Alleged Office Spy S...      Cache   Translate Page   Web Page Cache   
Sen. Dianne Feinstein’s Ties To China Go Way Deeper Than An Alleged Office Spy
Sen. Dianne Feinstein’s warm relationship with and advocacy for Communist China go back decades and involve millions, if not billions, of dollars.



By Ben Weingarten
August 8, 2018

“I sometimes say that in my last life maybe I was Chinese.”—Sen. Dianne Feinstein

As media, intelligence agency, and political scrutiny of foreign meddling is seemingly at its apex, a story with big national security implications involving a high-ranking senator with access to America’s most sensitive intelligence information has been hiding in plain sight.

The story involves China and the senior U.S. senator from California, and former chair of the Senate Select Committee on Intelligence, Democrat Dianne Feinstein. It was buried eight paragraphs into a recent Politico exposé on foreign efforts to infiltrate Silicon Valley, as a passing example of political espionage:

Former intelligence officials…[said] Chinese intelligence once recruited a staff member at a California office of U.S. Senator Dianne Feinstein, and the source reported back to China about local politics. (A spokesperson for Feinstein said the office doesn’t comment on personnel matters or investigations, but noted that no Feinstein staffer in California has ever had a security clearance.)

Later comes additional detail:

According to four former intelligence officials, in the 2000s, a staffer in Senator Dianne Feinstein’s San Francisco field office was reporting back to the MSS [ China’s Ministry of State Security, its intelligence and security apparatus]. While this person, who was a liaison to the local Chinese community, was fired, charges were never filed against him. (One former official reasoned this was because the staffer was providing political intelligence and not classified information—making prosecution far more difficult.) The suspected informant was ‘run’ by officials based at China’s San Francisco Consulate, said another former intelligence official. The spy’s handler ‘probably got an award back in China’ for his work, noted this former official, dryly.

This anecdote provides significantly more questions than answers. For starters: Who was the spy? For how long was the spy under surveillance? What information about “local politics” was the spy passing back to China? Just how close was the spy to the senator? Did law enforcement officials sweep vehicles and other areas for listening devices? Was there an investigation into whether others in the senator’s circle may have been coordinating with Beijing?

Did the senator expose herself to potential blackmail, or the public to danger through leakage of sensitive, highly classified information? Is firing really the proper punishment for providing political intelligence to a foreign power?

The Details Right Now Are Few and Blurry We now know only the most basic of additional details about what occurred in Feinstein’s office. Five years ago, the FBI approached the senator to apprise her that a San Francisco-based staffer was being investigated under suspicion of spying for China. According to the San Francisco Chronicle, Feinstein’s hometown paper, this staffer, who had worked with Feinstein for almost 20 years, drove her around in San Francisco and “served as gofer in her San Francisco office and as a liaison to the Asian American community, even attending Chinese Consulate functions for the senator.”

An unnamed source added that a Chinese MSS official first approached the staffer during a visit to Asia several years prior. Given his proximity to Feinstein, we have no idea what information he could have gleaned in her employ. We do have a presumed identity. The Daily Caller discovered that a Feinstein staffer named Russell Lowe, listed on the senator’s payroll as an “office director” as of 2013 before he was let go, matches the description of the Chinese asset.

It appears Lowe continues to operate freely in the United States. A year after he was removed from Feinstein’s staff, Lowe spoke at a conference on Chinese investment in California. In October 2017 he visited a South Korean publication’s office with former Rep. Mike Honda (D-CA), indicating he still had access to political figures.

Lowe presently serves as secretary general of the Education for Social Justice Foundation, which seeks to “educate the public on unresolved historical conflicts, human rights, and crimes against humanity.” The Chinese government likely views its present focus favorably: Japanese abuses during the World War II era via its “comfort women” system whereby 200,000 girls from 13 or more Asian countries were forced into sexual slavery. Lowe discusses the nonprofit’s work here.

It took a tweet from President Trump implying hypocrisy, given Feinstein’s role investigating “Russian collusion” as a member of the Senate Select Committee on Intelligence, while a Chinese spy had infiltrated her own office, to force the senator to address the issue.

(1/2) The FBI told me 5 years ago it had concerns that China was seeking to recruit an administrative member of my Calif staff (despite no access to sensitive information). I took those concerns seriously, learned the facts and made sure the employee left my office immediately. pic.twitter.com/qpVyPanpJk

— Sen Dianne Feinstein (@SenFeinstein) August 4, 2018

Feinstein’s account conflicts with what has been reported regarding the recruitment and activities of the Chinese spy. She conveniently omits that her office employed this individual for almost 20 years in a close capacity, while he represented the senator in interactions with Chinese officials.

A Short History of Dianne Feinstein’s Love for China For the last 40 years, no politician in America has arguably maintained a deeper, more longstanding and friendlier relationship with China, at the highest levels of its ruling Communist Party, than Feinstein. It dates back to the opening of U.S.-Chinese diplomatic relations in 1979.

Shortly thereafter, Feinstein, then mayor of San Francisco, established a “sister city” relationship with Shanghai, one of the earliest and most robust such relationships in U.S.-China history. Soon after, Feinstein led a mayoral delegation to China joined by her husband, investor Richard Blum, a trip they took together many times over the ensuing years as the relationship between both Feinsteins and China grew.

During the 1980s, as mayor of San Francisco, Feinstein developed a close friendship with Shanghai Mayor Jiang Zemin. This substantially enhanced Feinstein’s foreign policy profile, and created an important linkage to the U.S. government for China’s Communist Party (CCP).

Just as Feinstein rose to a prominent position in foreign affairs and national security in the U.S. Senate, first on the Foreign Relations Committee and later as chairman of the Senate Select Committee on Intelligence, Jiang rose to the top of Chinese leadership, serving as chairman of the Central Military Commission, general secretary of the CCP, and president of the People’s Republic of China (PRC). Under Jiang’s leadership, the PRC initiated a brutal crackdown against practitioners of Falun Gong, including mass imprisonments, beatings, torture, rape, organ harvesting, and murder, and engaging in alleged human rights atrocities against Tibetans. Feinstein never renounced her friendship with Jiang, in spite of these acts.

Feinstein and Jiang reportedly visited each other regularly in the 1980s, with Jiang once spending Thanksgiving in San Francisco with Feinstein and her husband. Jiang supposedly danced with Feinstein during one such visit, which surely must have been a propaganda coup for the CCP a la Ted Kennedy and the Soviets.

It Turned Out to Be a Lucrative Relationship In 1986, Feinstein and Jiang designated several corporate entities for fostering commercial relations, one named Shanghai Pacific Partners. Feinstein’s husband served as a director. His financial position was relatively small, less than $500,000 on one project, the only such position in China the Feinstein family held when Feinstein entered the Senate in 1992.


‘They said that Feinstein’s consistent support for China’s interests cannot help but benefit her husband’s efforts to earn profits there.’
That project, however, which Blum’s firm participated in alongside PRC state-run Shanghai Investment Trust Corp., was one of the first joint ventures between San Francisco and Chinese investors, reportedly “cited by Chinese officials as a testament to the friendly business ties between Shanghai and San Francisco that Feinstein had initiated.” Subsequently Blum’s investments in the Middle Kingdom mushroomed.

In May 1993, Feinstein expressed her strong support on the Senate floor for continued trading with China. Contemporaneously, her husband was seeking to raise up to $150 million from investors, including himself, for a variety of Chinese enterprises.

In August 1993, Feinstein and her husband visited Beijing for extensive meetings with Chinese leaders at President Jiang’s invitation. As the Los Angeles Times reported in a 1994 exposé on Feinstein’s husband’s business ties and the potential conflict of interests they presented: “Such encounters are fondly remembered when deals are clinched back in China, according to American experts in Chinese business practices. They said that Feinstein’s consistent support for China’s interests cannot help but benefit her husband’s efforts to earn profits there.”

The historical record suggests these American experts were right. Blum successfully raised $160 million for the aforementioned Asia fund under his Newbridge Capital investment company, including investing $1-2 million himself. The fund invested in several state-owned and Chinese government-linked businesses.

Why, We Love Trading with China Blum’s firm’s largest holding—at the time his China investments began to draw scrutiny in 1997—was its stake in Northwest Airlines. The then-estimated $300 million position was poised to significantly appreciate in value, as Northwest happened to be the sole airline operator providing nonstop service from the United States to any city in China.


On one such visit in January 1996, Feinstein and Blum enjoyed a meal with President Jiang.
When questioned on his China investments, Blum pledged to donate future profits from the holdings to his nonprofit foundation to help Tibetan refugees, thereby “remov[ing] any perception that I, in any way, shape or form benefit from or influence my wife’s position on China as a U.S. senator.” But these conflict of interest issues persisted.

In January 1995, Feinstein was appointed to the Senate Foreign Relations Committee. Subsequently, she made several visits to China, accompanied by her husband, where she met with senior government officials.

During these trips it the couple was wined and dined. On one such visit in January 1996, Feinstein and Blum enjoyed a meal with President Jiang in Zhongnanhai, the exclusive leadership compound for China’s Communist Party, where according to Feinstein they ate in Mao Zedong’s residence in the room where he died.

Feinstein kept up her dogged support for increased trade with China. In May 1996, she penned an editorial in the Los Angeles Times calling for the United States to grant most-favored-nation trading status to China “on a permanent basis and get past the annual dance that is proving to be extraordinarily divisive and not at all helpful toward reaching the oft-stated goal: improvement in human rights.”

Campaign Contributions from Foreign Sources While Feinstein maintained her pro-China positions, in March 1997, the senator revealed that the FBI had warned her the Chinese government might seek to funnel illegal contributions to her campaign fund. She was one of only six members of Congress to receive such a warning. As the New York Times noted at the time, Feinstein had returned $12,000 in 1994 contributions from people with connections to Lippo Bank, an arm of a multi-billion dollar conglomerate owned by the Riady family, with investments and operations throughout Asia. It employed a senior American executive named John Huang.


At the time Feinstein disclosed returning the Lippo-tied contributions, Huang was under Justice Department investigation.
The Riadys had been friends and supporters of the Clintons since Bill Clinton was governor of Arkansas. Clinton named Huang, a top fundraiser for the Democratic National Committee (DNC), his deputy assistant secretary of commerce.

At the time Feinstein disclosed returning the Lippo-tied contributions, Huang was under Justice Department investigation for making potentially illegal contributions to the Democratic Party from foreign sources. He later pled guilty to violating campaign finance laws as part of the investigation into Chinese attempts to influence U.S. policy through illegal campaign contributions stemming from the 1996 election.

It was later revealed that Huang may have had a direct financial relationship with the Chinese government. The DNC returned more than half of the $3 million he had collected for the party. In 1998, an unclassified report from the Senate Committee on Governmental Affairs stated that the Riadys—Huang’s former employer, the leader of which had also pled guilty to campaign finance violations—“had a long-term relationship with a Chinese intelligence agency.”

What is the connection to Feinstein? In June 1996, the senator held a fundraiser at her home attended by President Clinton, Huang, and Xiaoming Dia, chairman of a Hong Kong-based investment company in which Lippo Group had owned a controlling stake until 1994.

The Chinese Get Feinstein’s Lucrative Political Support In May 2000, Feinstein lobbied for making permanent normal trading relations with China, a measure that ultimately passed, and helped pave the way for its entrance into the World Trade Organization, which Feinstein also supported. At the time, a spokesperson for Feinstein indicated that her husband had divested of his last holdings in mainland China in 1999. But Blum’s stake in another Newbridge Capital Asia fund, which contained investments in China, belied that assertion.

Meanwhile, in the years leading to the passage of that legislation, Blum’s Newbridge Capital reportedly invested more than $400 million into East Asian businesses, at least $90 million of which was “invested in companies whose profits are pegged to the burgeoning mainland China market, according to the companies themselves,” and several of which were partly owned or founded by the Chinese government. If nothing else, Blum still stood to profit handsomely from management fees for these portfolios.


Defense companies in which Blum’s firms were invested signed billions of dollars in military contracts approved by Feinstein’s committee.
Such investments in Chinese assets continued. In 2004, Newbridge Capital purchased an 18 percent stake in Shenzhen Development Bank, the first time a foreign company took effective control of a Chinese lender. From 2001 to 2005, Feinstein served as chair of the Senate Military Construction Appropriations Committee. During this time, defense companies in which Blum’s firms were invested signed billions of dollars in military contracts approved by Feinstein’s committee.

This suggests a parallel pattern in the Feinstein family’s political and business dealings that adversaries like China surely could have sought to exploit. When pressed on conflicts of interest, however, on multiple occasions Feinstein has flippantly responded by rhetorically asking what she could do to satisfy those raising the issue, short of getting divorced.

Feinstein’s husband has stressed that his ties to the Dalai Lama and criticism of Chinese human rights violations would never have helped him curry favor with the Chinese, and maintained no conflict of interest between his wife’s position and his investments.

The senator recently co-sponsored the Foreign Investment Risk Review Modernization Act of 2018 (FIRRMA), incorporated into the pending National Defense Authorization Act (NDAA), which gives the Committee on Foreign Investment in the United States greater oversight over foreign transactions, geared in part towards China’s malign efforts to gain valuable technology and steal intellectual property. But provisions penalizing sanctions-violating Chinese telecommunications company ZTE were stripped from the NDAA at the Trump administration’s urging.

Interestingly, perhaps anticipating future troubles (the House Intelligence Committee would first warn that ZTE posed national security risks in 2012), in October 2011, ZTE hired its first in-house lobbyist: None other than former Feinstein aide Peter Ruffo, a position it appears he still holds today.

Feinstein’s Related Apologism for the Chinese Government Feinstein’s economic positions frequently downplayed the PRC’s rampant human rights violations. The senator has fashioned herself a peacemaker, often urging appeasement of the Chinese regime in both apologism for such abuses and urging restraint.


Feinstein also argued against tying China’s most-favored-nation trading status to human rights improvements.
These efforts date back to the early 1980s. Until that time, participants in San Francisco’s Chinese New Year Parade displayed the flag of the Nationalist Chinese government, which had ruled in exile on Taiwan after 1949. According to San Francisco Gate, then-mayor Feinstein “asked organizers to stop the partisan practice because she wanted to encourage trade with China.”

Feinstein also argued against tying China’s most-favored-nation trading status to human rights improvements. In an argument that reads as not only beyond naïve, but demonstrates an offensive moral equivalency, Feinstein added: “Chinese society continues to open up with looser ideological controls, freer access to outside sources of information and increased media reporting. More people in China vote for their leadership on the local level than do Americans. Economic liberalization is introducing market forces into the economy. Educational levels are up, along with wages and the standard of living” (emphasis mine).

In March 1996, Feinstein sought to ease tensions between China and Taiwan, arranging discussions with high-level Chinese dignitaries on Capitol Hill, at China’s behest. During this period, Feinstein took an uncharacteristically aggressive stance towards China’s hostile actions, conducting missile tests near Taiwan, presumably in line with the Clinton administration: “We view the missile exercises…as provocative and unnecessary.”

She took an arguably harsher line towards then-Taiwanese President Lee Teng-Hui, stating: “What is really necessary is for [the leaders of] Taiwan to make a statement in word and in deed that they will adhere to a one-China policy.”

In February 1997, Feinstein against sought to draw an offensive moral equivalence between America and Communist China in calling for a joint U.S.-China commission to examine “the evolution of human rights in both countries over the last 20 or 30 years,” that would “point out the success and failures–both Tiananmen Square and Kent State.”

In a June 2010 interview with the Wall Street Journal covering a trip to China in which she met with old pals Jiang and former premier Zhu Rongji, Feinstein seemed to further downplay and even alibi the Tiananmen Square massacre:

I think that was a great setback for China in the view of the world. And I think China has also – as we would – learned lessons from it.

It just so happens I was here after that and talked to Jiang Zemin and learned that at the time China had no local police. It was just the PLA [People’s Liberation Army]. And no local police that had crowd control. So, hence the tanks.

Clearly none of that made good sense. But that’s the past. One learns from the past. You don’t repeat it. I think China has learned a lesson.

That year, Feinstein also challenged the Obama administration’s $6.4 billion arms sale to Taiwan, calling it a “substantial irritant” to U.S.-China relations.

Similarly, in late 2015, Feinstein effectively sought to defend the CCP from criticism, on a purportedly pragmatic basis, in fighting legislation from Sen. Ted Cruz (R-TX) that would have named the street running in front of the Chinese Embassy in Washington DC “Liu Xiaobo Plaza.” Xiaobo, a Nobel Prize-winning anti-Communist writer and human rights activist, had at the time been held in jail for seven years by the Chinese government for criticizing the regime.

When Cruz sought unanimous consent for the bill on the occasion of President Xi Jinping’s U.S. visit, Feinstein blocked it. A month later, when Cruz reintroduced the measure, citing a statement co-authored by Feinstein and her Democrat colleague Pat Leahy calling for Xiaobo’s release, Feinstein again blocked the legislation.

Finally, in February 2016, the bill cleared the Senate in a unanimous voice vote, though it died in the House amid a veto threat from the Obama administration. Later, Feinstein did co-sponsor a resolution honoring Xiaobo’s freedom-fighting efforts—shortly after his death, in state custody, in July 2017.

This Is About Much More than a Chinese Spy Let us review the facts here.

  • China has for almost 40 years cultivated warm relations with Feinstein.
  • Feinstein has uniformly taken political positions supporting greater ties with China while taking a relatively dovish and strictly apologist line on its human rights atrocities.
  • Feinstein’s husband has profited handsomely during Feinstein’s career from the greatly expanded China trade she supported. It is of course possible that the Feinstein family’s privileged position with the Chinese regime improved his investment opportunities.
  • Feinstein has served as a key intermediary between China and the U.S. government, while serving on committees whose work would be of keen interest to the PRC.
  • A staffer of almost two decades in close proximity to Feinstein was allegedly successfully recruited by China’s MSS and fed China “political intelligence.”
Imagine for a second how a motivated and empowered prosecutor would operate in this situation if tasked with exploring “any links and/or coordination” between the Chinese government, Feinstein, and individuals associated with her office.

Few American officials could have been as potentially exposed to the PRC’s skilled intelligence service as Feinstein. Here we have not only proof of a spy, but real evidence of consistently pro-Chinese policy that at very best created the appearance of a financial conflict of interest.

Recall that the Chinese regime conducted the cataclysmic U.S. Office of Personnel Management hack, arming it with the most compromising possible information on 21 million government employees and applicants. Then the PRC liquidated America’s entire informant network on the Chinese mainland. So why isn’t this a major national story drawing hysterical cries of treason and calls for impeachment?

Feinstein’s dealings with the Chinese must be investigated. But so too ought the links between federal officials and all of our adversaries, be it the Chinese and Russians, the Pakistanis and Iranians, or the Muslim Brotherhood and its state supporters. Feinstein is only one politician. How many other relationships with American politicians have the Chinese and our other adversaries fostered? How many spies might they have recruited?

We need a top-to-bottom reform of our government’s vetting efforts, and enhancement of our counterintelligence capabilities. Attempts by foreign countries to infiltrate our political offices pose a grave national security threat, as Feinstein’s record clearly shows. With people like her on pertinent congressional committees, however, how many foxes have been elected to guard the henhouse? Representatives’ responses to reform measures will help us find out.


          Media Blame Climate Change For California Wildfires, Ignore Forestry Policy, Land Use Factors      Cache   Translate Page   Web Page Cache   
By Julia A Seymour ~ California is burning. Multiple wildfires are claiming lives and property and the smoke is so bad, even Yosemite had to be evacuated. News outlets should be reporting all the factors that contributed to the terrible fires and not exploit tragedy to score political points. Instead, the liberal media have been latching onto the […]
          BIND DNS software includes a security feature that could be abused to cause DoS condition      Cache   Translate Page   Web Page Cache   

The Internet Systems Consortium (ISC) announced the presence of a serious flaw in the BIND DNS software that can be exploited by remote attackers to cause a denial-of-service (DoS) condition. The vulnerability tracked as CVE-2018-5740 was discovered by Tony Finch of the University of Cambridge. The flaw has been assigned a CVSS score of 7.5, the […]

The post BIND DNS software includes a security feature that could be abused to cause DoS condition appeared first on Security Affairs.


          Pick a serverless fight: A comparative research of AWS Lambda, Azure Functions ...      Cache   Translate Page   Web Page Cache   

The saturation point is nowhere to be seen in the serverless discussion with tons ofnews coming online every day andnumerous reports trying to take the pulse of one of the hottest topics out there.

This time, however, we are not going to discuss any of the above. This article is going to be a bit more…academic!

During the last USENIX Annual Technical Conference ’18 that took place in Boston, USA in mid-July, an amazingly interesting academic research was presented .

The paper “Peeking Behind the Curtains of Serverless Platforms” is a comparative research and analysis of the three big serverless providers AWS Lambda, Azure Functions and Google Cloud Functions. The authors (Liang Wang, Mengyuan Li, Yinqian Zhang, Thomas Ristenpart, Michael Swift) conducted the most in-depth (so far) study of resource management and performance isolation in these three providers.

SEE ALSO: The state of serverless computing: Current trends and future prospects

The study systematically examines a series of issues related to resource management including how quickly function instances can be launched, function instance placement strategies, and function instance reuse. What’s more, the authors examine the allocation of CPU, I/O and network bandwidth among functions and the ensuing performance implications, as well as a couple of exploitable resource accounting bugs .

Did I get your attention now?

In this article, we have an overview of the most interesting results presented in the original paper.

Let’s get started!

Methodology

First things first. Let’s have a quick introduction to the methodology of this study.

The authors conducted this research by integrating all the necessary functionalities and subroutines into a single function that they call a measurement function .

According to the definition found in the paper, this function performs two tasks:

Collect invocation timing and function instance runtime information Run specified subroutines (e.g., measuring local disk I/O throughput, network throughput) based on received messages

In order to have a clear overview of the specifications for each provider, the following table provides a comparison of function configuration and billing in the three services.


Pick a serverless fight: A comparative research of AWS Lambda, Azure Functions  ...

The authors examined how instances and VMs are scheduled in the three serverless platforms in terms of instance coldstart latency, lifetime, scalability, and idle recycling and the results are extremely interesting.

Scalability and instance placement

One of the most intriguing findings, in my opinion, is on the scalability and instance placement of each provider. There is a significant discrepancy among the three big services with AWS being the best regarding support for concurrent execution :

AWS:“3,328MB was the maximum aggregate memory that can be allocated across all function instances on any VM in AWS Lambda. AWS Lambda appears to treat instance placement as a bin-packing problem, and tries to place a new function instance on an existing active VM to maximize VM memory utilization rates.”

Azure:Despite the fact that Azure documentation states that it will automatically scale up to at most 200 instances for a single Nodejs-based function and at most one new function instance can be launched every 10 seconds, the tests of Nodejs-based functions performed by the authors showed that “at most 10 function instances running concurrently for a single function”, no matter how the interval between invocations were changed.

Google:Contrary to what Google claims on how HTTP-triggered functions will scale to the desired invocation rate quickly, the service failed to provide the desired scalability for the study. “In general, only about half of the expected number of instances, even for a low concurrency level (e.g., 10), could be launched at the same time, while the remainder of the requests were queued.”

Interesting fact: More than 89% of VMs tested achieved 100% memory utilization.

Coldstart and VM provisioning

Concerning coldstart (the process of launching a new function instance) and VM provisioning, AWS Lambda appears to be on the top of its game :

AWS:Two types of coldstart events were examined: “a function instance is launched (1) on a new VM that we have never seen before and (2) on an existing VM. Intuitively, case (1) should have significantly longer coldstart latency than (2) because case (1) may involve starting a new VM.” However, the study shows that “case (1) was only slightly longer than (2) in general. The median coldstart latency in case (1) was only 39 ms longer than (2) (across all settings). Plus, the smallest VM kernel uptime (from /proc/uptime) that was found was 132 seconds, indicating that the VM has been launched before the invocation.” Therefore, these results show that AWS has a pool of ready VMs! What’s more, concerning the extra delays in case (1), the authors argue that they are “more likely introduced by scheduling rather than launching a VM.”

Azure:According to the findings, it took much longer to launch a function instance in Azure, despite the fact that their instances are always assigned 1.5GB memory. The median coldstart latency was 3,640 ms in Azure.

Google:“The median coldstart latency in Google ranged from 110 ms to 493 ms. Google also allocates CPU proportionally to memory, but in Google memory size has a greater impact on coldstart latency than in AWS.”

SEE ALSO: What do developer trends in the cloud look like?

Additional to the tests described above, the research team “collected the coldstart latencies of 128 MB, python 2.7 (AWS) or Nodejs 6.* (Google and Azure) based functions every 10 seconds for over 168 hours (7 days), and calculated the median of the coldstart latencies collected in a given hour.” According to the results, “the coldstart latencies in AWS were relatively stable, as were those in Google (except for a few spikes). Azure had the highest network variation over time, ranging from about 1.5 seconds up to 16 seconds.” Take a look at the figure below:


Pick a serverless fight: A comparative research of AWS Lambda, Azure Functions  ...

Source: “Peeking Behind the Curtains of Serverless Platforms”, Figure 8, p. 139

Instance lifetime

The research team defines as instance lifetime “the longest time a function instance stays active.

Keeping in mind that users prefer the longer lifetimes, the results depict Azure winning this one since Azure functions provide significantly longer lifetimes than AWS and Google, as you can see in the figures below:


Pick a serverless fight: A comparative research of AWS Lambda, Azure Functions  ...

Source: “Peeking Behind the Curtains of Serverless Platforms”, Figure 9, p.140

Idle instance recycling

Instance maximum idle time is defined by the authors as “the longest time an instance can stay idle before getting shut down.” Specifically for each service provider, the results show:

AWS:An instance could usually stay inac
           Comcast breach exposes 26.5m customers' Social Security Numbers and partial addresses       Cache   Translate Page   Web Page Cache   

Comcast Xfininty's login page had an easily found bug that allowed anyone to gain access to the Social Security Numbers and partial home addresses of over 26.5 million customers. Comcast spokesapologist David McGuire says the company patched the bug quickly after being notified of its existence by security researcher Ryan Stevenson, and added that the company "take[s] our customers’ security very seriously," adding that the company didn't think anyone had exploited the bug.


          Mahmoud Abbas: Stop Exploiting Ahed Tamimi for Personal Gain      Cache   Translate Page   Web Page Cache   

The father of 11-year-old, Abdul Rahman Nofal contacted me, asking for help. His son was shot in the leg during Gaza’s "Great March of Return" protests. The Strip’s dilapidated health care system could not save the little boy’s leg, as it was later amputated. His father, Yamen, himself a young man from the Buraij Refugee … Continue reading "Mahmoud Abbas: Stop Exploiting Ahed Tamimi for Personal Gain"

The post Mahmoud Abbas: Stop Exploiting Ahed Tamimi for Personal Gain appeared first on Antiwar.com Original.


          Vice-président, Affaires juridiques et secrétaire corporatif - Aéroports de Montréal - Montréal, QC      Cache   Translate Page   Web Page Cache   
Aéroports de Montréal (ADM), l’autorité aéroportuaire du Grand Montréal est responsable de la gestion, de l’exploitation et du développement de l’Aéroport...
From Kenniff & Racine - Mon, 30 Jul 2018 05:13:45 GMT - View all Montréal, QC jobs
          Comment on PS4: Specterdev publishes writeup on the 5.05 exploit by run 3      Cache   Translate Page   Web Page Cache   
I like your blog, the content is great and detailed, thanks to it I learned and learned a lot from it.
          Offer - Danny Boice - USA      Cache   Translate Page   Web Page Cache   
Danny Boice is the co-founder and CEO of Trustify, providing private investigators on demand. Danny founded Trustify out of his passion for truth, trust and safety — especially with vulnerable populations such as children and the elderly. Danny and his wife, Trustify co-founder and president Jennifer Mellon, lead Trustify's charitable giving by providing pro bono investigative and protective services to vulnerable populations such as missing and exploited children, domestic violence survivors, those in the foster care and adoption system, aging Americans and more.Manage risks, gather intelligence, and protect your business with Danny Boice's private investigators. Schedule your consultation now! https://www.dannyboice.com/
          Banque - Technicien au centre d'assistance - CGI - Lac-Saint-Jean, QC      Cache   Translate Page   Web Page Cache   
Bonne connaissance des systèmes d'exploitation Windows NT, XP, Vista, 7; Description du poste :....
From CGI - Fri, 13 Jul 2018 15:12:04 GMT - View all Lac-Saint-Jean, QC jobs
          Agent soutien technique, Télébec - Bell - Val-d'Or, QC      Cache   Translate Page   Web Page Cache   
Une expertise des systèmes d’exploitation Windows 7,8, et 10, Vista, MAC et Outlook. Code de demande:....
From Bell Canada - Fri, 13 Jul 2018 16:41:03 GMT - View all Val-d'Or, QC jobs
          Analyste au support - Support Analyst - Exela Technologies - Montréal, QC      Cache   Translate Page   Web Page Cache   
Les systèmes d’exploitation de Microsoft, incluant XP, Vista, 2003 et 2008. Microsoft Windows Server and Workstation including XP, Vista, 7, 2003 and 2008...
From Indeed - Fri, 13 Jul 2018 18:17:48 GMT - View all Montréal, QC jobs
          Technicien au centre d'assistance - français / anglais / espagnol / portugais - CGI - Montréal, QC      Cache   Translate Page   Web Page Cache   
Bonne connaissance des systèmes d'exploitation Windows NT, XP, Vista, 7. Description du poste :....
From CGI - Fri, 13 Jul 2018 15:12:47 GMT - View all Montréal, QC jobs
          Indictment alleges conspiracy behind recruitment, hiring of undocumented workers in Midwest      Cache   Translate Page   Web Page Cache   
A Nebraska-based company is accused of procuring undocumented agricultural workers and exploiting them.
          "This Is About Much More than a Chinese Spy"      Cache   Translate Page   Web Page Cache   
In The Federalist, Ben Weingarten writes,
Sen. Dianne Feinstein’s warm relationship with and advocacy for Communist China go back decades and involve millions, if not billions, of dollars.

Feinstein's husband is an investor named Richard Blum.
...From 2001 to 2005, Feinstein served as chair of the Senate Military Construction Appropriations Committee. During this time, defense companies in which Blum’s firms were invested signed billions of dollars in military contracts approved by Feinstein’s committee.

This suggests a parallel pattern in the Feinstein family’s political and business dealings that adversaries like China surely could have sought to exploit. When pressed on conflicts of interest, however, on multiple occasions Feinstein has flippantly responded by rhetorically asking what she could do to satisfy those raising the issue, short of getting divorced.

...Feinstein’s economic positions frequently downplayed the PRC’s rampant human rights violations. The senator has fashioned herself a peacemaker, often urging appeasement of the Chinese regime in both apologism for such abuses and urging restraint.

...This Is About Much More than a Chinese Spy
Let us review the facts here.

China has for almost 40 years cultivated warm relations with Feinstein.

Feinstein has uniformly taken political positions supporting greater ties with China while taking a relatively dovish and strictly apologist line on its human rights atrocities.

Feinstein’s husband has profited handsomely during Feinstein’s career from the greatly expanded China trade she supported. It is of course possible that the Feinstein family’s privileged position with the Chinese regime improved his investment opportunities.

Feinstein has served as a key intermediary between China and the U.S. government, while serving on committees whose work would be of keen interest to the PRC.

A staffer of almost two decades in close proximity to Feinstein was allegedly successfully recruited by China’s MSS and fed China “political intelligence.”

Here we have not only proof of a spy, but real evidence of consistently pro-Chinese policy that at very best created the appearance of a financial conflict of interest.

...Attempts by foreign countries to infiltrate our political offices pose a grave national security threat, as Feinstein’s record clearly shows. With people like her on pertinent congressional committees, however, how many foxes have been elected to guard the henhouse? Representatives’ responses to reform measures will help us find out.
Read more here.
          Zonnepark Sinnegreide Bij De Swadde In Buitenpost Met 34.000 Zonnepanelen by Solarfields      Cache   Translate Page   Web Page Cache   
Solarfields is gestart met de aanleg van zonnepark Sinnegreide bij Buitenpost. Solarfields plaatst 34.000 panelen met een opgesteld vermogen van ruim 10 megawatt. Hiermee worden straks meer dan 3.000 huishoudens voorzien van duurzame energie. Op basis van een uitvraag heeft de gemeente Achtkarspelen in het voorjaar van 2016 gekozen voor Solarfields voor de realisatie en exploitatie van [...]

          Driemast schoener, EUR 485.000,-      Cache   Translate Page   Web Page Cache   
Driemastzeilschoener "Amazone", dagcharter 125 passagiersbouwjaar1929werfVan Diepen, Waterhuizen (Groningen)lengteromp: 33,45m, totaal circa 42m (incl. kluiverboom en davit)breedteromp: 5,62m, totaal 6,06m (incl. zwaarden)passagiers125prijs:485.000,- euro excl. btwDe Amazone is (als Amazone II) gebouwd als zeilend zeegaand vrachtschip voor met name de vaart op de Oostzee (zgn. Wad- en Sontvaarder).Scheepswerf Van Diepen hanteerde een standaardbestek waarmee zij de markt opging om opdrachtgevers te vinden.Opdrachtgevers pasten het bestek naar hun wensen aan (beetje langer/korter of breder) maar de grondvorm bleef behouden. Veel schepen op basis van dit bestek (zoals ook de Amazone) zijn gebouwd voor Duitse rekening.De schepen worden wel aangeduid als "Von Diepen Schiffe". Verschillende varen er in Nederland nog rond zoalsbijvoorbeeld de "Willem Barentz" (dagtochtenschip Enkhuizen), de "Jutland" (eigendom directeur Maritiem Museum Rotterdam) en de"Emma", voorheen tagrijnschip te Lelystad, nu luxe varend woonschip met behoud van historisch uiterlijk (thuishaven: Veerhaven Rotterdam).De Amazone is al vroeg in haar loopbaan met enkele meters verlengd om economisch beter te kunnen opereren.In 1994 is de Amazone opnieuw opgebouwd en getransformeerd tot luxe charterschip voor dagtochten met 125 passagiers.Sindsdien zeer goed onderhouden met vele vernieuwingen, aanpassingen aan nieuwe eisen etc.Communitair certificaat zonder overgangsbepalingen.Bars:2, toiletten: 5, douches(bemanning): 2, whirlpool: 1, slaapplaatsen(bemanning): 7, waterdichte schotten: 5, agregaten:2, boegschroef etc.De Amazone heeft een unieke ligplaats in centrum Rotterdam aan de rivier met uitzicht op de Erasmusbrug.Geschikt om direct op te gaan wonen met een zee van ruimte en/of te gaan exploiteren voor rondvaarten, varend restaurant, atelier etc.Indeling van voor naar achtervoorpiek:boegschroef, aggregaat in silent box, dieseltank, koelunit bier, opslag.voordek:electrische ankerlier (380v)ruim voor:lounge met bibliotheek, stores met koelkasten, vriezer, aansluiting bierfusten. ruim midden:kombuis, garderobe, buffetopstelling.ruim achter:grote lounge, bar.dek boven ruim:deksalon met ruim uitzicht naar buiten en bar, zitkuipjes buiten.bemanningsgedeelte:2 hutten ieder met douchehierboven:deklounge (2 zitjes) en 4 toiletten.machinekamer:hoofdmotor, aggregaat, hydrofoors, c.v., dieseltanks.hierboven:ruime woning met keukentje, 2-pers. bed, bureau, zitje en badkamer (whirlpool, toilet),intern trap naar stuurhut.achterpiek:opslaghierboven:stuurhutZeilen:vliegerbuitenkluiverbinnenkluiverfokschoenerzeil (stagzeil)grootzeil (gaffelzeil)bezaan (gaffelzeil)Techniek:hoofdmotorCaterpillar 3406 DIT, 305 pk., 1999 nieuw ingebouwd, weinig draai-uren.keerkoppelingTwin-disk MG 5114, 1999.hulpmotor1Vetus-Bosman S4E 25 Kva, motor Mitsubishi in silent boxhulpmotor2Vetus-Bosman K4E 12,5 Kva, motor Mitsubishi in silent boxboegschroefrooster boegschroef 360 graden BallegooyboegschroefmotorDaf 1165, 230 pkankerlierelectrisch 380vhydrofoors1X zoetwater + 1x buitenwater (toiletten)toiletten4X op vuilwatertank, 1x met sanybrouyeur directe afvoer.marifoons2X Debeg (Sailor)kompas1magnetisch kompaskompas2electro magnetisch kompas Euro 345 (Radio Zeeland)centrale verwarmingdoor gehele schip, ACV ketel + Elco brander in Mach. kameromroep/intercomdoor gehele schip, centrale in stuurhutbrandmeldingcentrale in stuurhutbrandblussers10x poederblusser, 3x Co2 blusser.brandbluspompbrandslang aan te sluiten op lenspomp + losse motorbrandbluspomp (benzine)bijbootSecu 12 in davit achterschipwalaansluitingnaar keuze 220v of 380vlenspomp380v met lensverdeelblok conform eisen, tevens dekwas en brandbluspomp.radarDecca R1216AAISComnav Voyager X3electraboordnet 220v, div. aansluitpunten 380v en 12vnoodverlichtingdoor gehele schip, voeding met afzonderlijke accu's aan dekreddingsmiddelen140 reddingsvesten, 15 reddingsvlotten, bijboot.tanksdieselmachk. 2x circa 2500 litervoorpiek circa 500 literdrinkwater2 tanks, totaal circa 6000 litervuilwatercirca 4000 literacculadersautomaat op 24v accu's noodstroomautomaat op startaccu's hoofdmotorKeuken3 wasbakken, 6 pits gas, oven, vaatwasser, magnetron, frituur, koffiezetapp, afzuig.Koelingin stores 2x grote koelkast + 1x grote vriezerin bemanningshutten 1x koelkast (koel/vries) + 1x vrieskist.in woning klein koelkastje (koel/vries)CertificaatCertif. v. onderz.Communitair certificaat 125 passagiers dag, zone 2-zout, geldig tot 18/2/2019geen overgangsbepalingen.
          Faire avancer le secteur bancaire grâce au droit de l'intermédiation en crédit      Cache   Translate Page   Web Page Cache   
Le secteur bancaire français est traversé par plusieurs pulsations profondes. Celles-ci provoquent sa transformation à haute vitesse, avec des perspectives bienfaitrices pour les consommateurs comme pour les professionnels, utilisateurs de services bancaires devenus particulièrement inadaptés, trop coûteux et surtout, dégradés. Les Intermédiaires bancaires, ou " IOBSP ", plus généralement connus sous leurs formes de courtiers et de mandataires en crédits, contribuent fortement au remodelage du secteur bancaire français. Ils développent en effet la distribution des services et des produits bancaires de manière indépendante des établissements (" des banques ") qui les produisent. Une rupture puissante. Après le fort recadrage législatif dont l'intermédiation bancaire à fait l'objet, en 2013 et en 2016, il est temps pour le législateur français de faire, pour une fois, preuve d'audace et d'ambition pour parfaire la législation de l'intermédiation bancaire. Quatre propositions pour faciliter la transformation du secteur bancaire au moyen de la législation de l'intermédiation bancaire. L'intermédiation bancaire transforme activement le secteur bancaire L'intermédiation bancaire est à présent très bien connue, sous la forme notamment du courtage en crédits et spécialement, du courtage en crédits immobiliers. Là où les agences " bancaires " (des " banques ") disparaissent de nos rues, les agences bancaires des courtiers s'épanouissent en abondance. Pour autant, les courtiers en crédit et les IOBSP (leur dénomination juridique, pour " Intermédiaires en Opérations de Banque et en Services de Paiement "), nécessairement immatriculés au registre unique national des Intermédiaires tenu par l'ORIAS) restent les professionnels en verre du secteur bancaire. Maintenus en état de transparence, ils en sont les grands anonymes. Alors qu'ils ont déjà profondément renouvelé la distribution, comme la consommation, bancaires, à des niveaux inégalés historiquement, ils sont pratiquement absents de toutes les analyses économiques ou juridiques, de l'enseignement comme des débats. Cette situation constitue, en soi, une curiosité. Elle est même franchement suspecte. L'action des banques accapare, voire étouffe le secteur bancaire. Il est indispensable de restituer aux IOBSP la place qui est à présent la leur dans l'économie bancaire contemporaine. Le marché de l'intermédiation bancaire est entré dans une phase de restructurations, avec des rapprochements, des fusions ou des alliances d'enseignes et de réseaux. Discrète, peu visible du grand public, cette restructuration est pourtant particulièrement active. Elle ne vise pas à purger des difficultés, comme c'est souvent le cas, mais à structurer la forte croissance future, attendue de ce marché à fort potentiel. Le courtage en crédit fait l'objet d'entraves juridiques infondées L'intermédiation bancaire dispose, depuis 2013, d'un cadre juridique précis et complet, assurant la protection des consommateurs, les clients des courtiers. La bonne compréhension du fort déterminisme juridique que comporte à présent la profession d'IOBSP est essentielle. Il s'agit d'un droit récent, qui poursuit sa transformation. Il s'agit également d'un droit encore bancal, pas aussi accessible qu'il le devrait, qui réclame des ajustements volontaristes et ambitieux. C'est par le droit que la profession d'IOBSP a connu son émergence. C'est par le droit que les IOBSP pourront apporter à l'économie bancaire tout leur potentiel, à condition que celui-ci ne soit pas négligé. Or, la situation actuelle est simple : le courtage en crédits se trouve entravé. Par son propre cadre juridique. Que cette situation soit le fruit d'une stratégie construite, ou d'une inattention, peu importe ; c'est indifférent. C'est le constat et telle est la réalité. Il ne s'agit évidemment pas d'adresser un faux procès en niant l'utilité du droit pour cette profession : elle est parfaitement admise, sans réserve. Le développement de l'intermédiation bancaire nécessite la confiance des consommateurs, donc leur sécurité effective. Simplement, le droit doit être efficace : objectif souvent délaissé ; et il doit s'appliquer identiquement à tous : tel n'est pas le cas. Quatre propositions pour réformer le Droit de l'intermédiation bancaire, afin d'accélérer la transformation du secteur bancaire dans son ensemble Agrave; l'issue d'une première phase de montée en puissance juridique, le courtage en crédits reste donc porteur d'un fort potentiel de renouvellement du secteur bancaire. La structure actuelle du droit de la distribution bancaire comprime ce potentiel, limite son expression ou sa vitesse de diffusion dans l'économie. C'est regrettable, car l'optimisation du développement économique de l'intermédiation pourrait, très efficacement, compenser largement les emplois perdus dans d'autres zones du secteur bancaire, notamment dans les réseaux directs d'agences bancaires des établissements de crédit, dont la débandade est en fait bien supérieure à la description qui en faite. Les IOBSP de France procurent au secteur bancaire français une avance considérable, en Europe, y compris dans la banque digitale. La législation de l'intermédiation bancaire aurait tout à gagner à engager un travail d'ajustement volontariste : d'une part, tous les professionnels pratiquant la distribution bancaire devraient appliquer les mêmes principes, ceux de la distribution bancaire. Les statuts juridiques ne peuvent exonérer tel ou tel professionnel, notamment les banques, de ces principes. D'autre part, les principes juridiques des différentes distributions (crédits, assurances, paiements, investissement, notamment) manquent totalement de cohérence. Leur harmonisation s'impose, pour faciliter l'activité professionnelle des Intermédiaires tout en respectant les besoins des consommateurs. Quatre familles d'actions participeraient aisément à cet ajustement. Premièrement, clarifier le droit de la distribution bancaire, perclus de complexités inutiles et de zones d'ombre : des questions simples, courantes, devraient disposer de réponses juridiques claires et partagées. Deuxièmement, supprimer les interdits de principe, sans contrepartie juridique ou économique, qui sont autant de blocages inutiles : ceci est notamment vrai pour faciliter l'intermédiation bancaire digitale, dont le droit semble se méfier par principe, sans raison autre que la crainte de l'inconnu. Troisièmement, harmoniser entre eux les principes juridiques des différentes distributions, notamment de crédit et d'assurance : cette culture de la différence systématique handicape directement les Intermédiaires. Enfin, exiger de tous les professionnels, quels que soient leurs statuts, qu'ils appliquent les mêmes principes de distribution, dès lors qu'ils pratiquent les mêmes activités, sans dérogations injustifiées. Sans réforme ambitieuse du droit de la distribution bancaire, les atouts qu'apportent les IOBSP et les courtiers en crédit resteront, en large part, inexploités ou sous-exploités : pour conduire à un gâchis économique. Mieux équilibrer la distribution bancaire en France est un enjeu économique majeur d'évidence. Cet enjeu devrait être pris en considération à tous les niveaux de responsabilités : législatif, économique et politique. Un travail législatif spécifique pourrait être dédié à ces améliorations, dont le bénéfice économique serait rapidement palpable.
          A Bear Lashed Out, While Another Dared to Escape ‘A Grizzly Experience’      Cache   Translate Page   Web Page Cache   

A Bear Lashed Out, While Another Dared to Escape ‘A Grizzly Experience’

Tell A Grizzly Experience to retire them from a life of exploitation and send them to a reputable sanctuary where they can finally live the way bears should.

The post A Bear Lashed Out, While Another Dared to Escape ‘A Grizzly Experience’ appeared first on PETA.


          Jackson man arrested for alleged possession of child pornography      Cache   Translate Page   Web Page Cache   
Christopher Collins, 48, was arrested at his home Wednesday and charged with one count of child exploitation.
      
 
 

          Hamas Blackmail, Media Silence      Cache   Translate Page   Web Page Cache   
Bassam Tawil 
            
             Hamas's strategy is to remain in power forever; to achieve that goal, it is prepared to do anything. Hamas has always acted out of its own narrow interests while holding the Palestinians in the Gaza Strip hostage to its extremist ideology and repressive regime.

             "Those who claim to be confronting Israel are nothing but corrupt, extortionist bribe-takers. Today, every politician in the Gaza Strip is well aware of the fact that the corruption at the border crossings has become the norm of the official establishment, and not actions by individuals or a certain apparatus." — Hassan Asfour, former Palestinian Authority minister, human rights activist and political columnist.

             Here one always needs to ask: where is the role of the international media in exposing Hamas's corruption and exploitation of its own people? Why is it that the mainstream media in the West does not want to pay any attention to what Asfour and other Palestinians are saying? The answer is always simple: As far as foreign journalists are concerned, if Israel is not the one asking for bribes or blackmailing the Palestinians, there is no story there.

Hamas, the Palestinian Islamist group that rules the Gaza Strip, says it wants Israel and Egypt to keep the border crossings with its coastal territory open on a permanent basis. The message that Hamas has been relaying to Israel and Egypt has been along the lines of: If you seek a cease-fire, you must reopen, on a permanent basis, the Kerem Shalom commercial border crossing (with Israel) and the Rafah terminal along the border with Egypt.

The Rafah border crossing between Egypt and the Gaza Strip. Photo: Chris McGrath/Getty Images
Continue Reading Article »

          Exploited College Girls – Eliza      Cache   Translate Page   Web Page Cache   
Cast: Uploaded Download: http://ul.to/onl33jul Rapidgator Download: https://rg.to/file/6478a4ffbcfea6759134e32327be67e1/ExploitedCollegeGirls.18.08.09.Eliza.XXX.SD.MP4-KLEENEX.mp4.html
          Why “Shift Left” is Bulls*t…and Imperative      Cache   Translate Page   Web Page Cache   

Why “Shift Left” is Bulls*t…and Imperative

DevSecOps has eclipsed DevOps as the most annoyingly overused portmanteau of the software world. “Shift Left” is the central concept in DevSecOps, stating that security should be addressed earlier in the Continuous Delivery pipeline. Great. But many have taken “Shift Left” to mean, “it’s all on developers’ plates now!” Since developers are the source of most vulnerabilities ― so the theory goes ― they should be the ones responsible for security. This sounds great…to everyone who isn’t a developer!

“Shift Left” spends a lot of time pointing a finger at developers while leaving the Sec and Ops members of the DevSecOps triad strangely unaddressed. We need to refocus on all three parts ― development, security, and operations ― to really understand how to build and deploy secure software. “Shift Left” must be about timing, not about ownership.

Leaving Security to a Security Team Doesn’t Work

The later an application problem is discovered, the more costly and complex it is to fix. This has been true for the entire history of software development. And it’s not just for security ― any bug is easier and cheaper to fix the nearer it’s discovered to when the code was written. Quality, performance, security ― all these needs are best addressed early .

Unfortunately, application security has traditionally been something left to the very end of a development process ― and it’s been focused on detection, not remediation. A small team or third party would test an application just prior to its production deployment. If a problem was found, deployment was halted and the app was sent back to dev. Security experts are good at discovering application security problems, but they have no ability to fix them!

Bear in mind, this bad situation is only the case for organizations who have an application security team ― a 2016 survey found that only 7% of organizations have a security expert outside of IT. It’s actually worse for most others. The vast majority of organizations leave application security until after the very end. They only “find” a problem after it’s been exploited resulting in a breach ( see Equifax for a refresher on the potential damage that can be done by that).
Why “Shift Left” is Bulls*t…and Imperative
Developers Don’t Care about Security

If we can’t leave security to security teams (because organizations simply don’t have them, or because it’s too difficult and costly to address security problems late, and security folks can find, but not fix, problems), that means that developers should handle it, right? Well, I’ve been building developer tools and security products for many years and if there’s one phrase I’ve heard more than any other, it’s “developers don’t care about security.”

Before security, I used to hear the same thing about quality ― developers don’t care about quality, they just want to write code and chuck it over the wall to QA. Then it was developers don’t care about performance. But they did (and do) care about both of those things ― they just needed an easy way to work them into their development process.

Developers want to build good software ― that’s software that works well and delivers value. Good software doesn’t have bugs. Good software is fast. And good software shouldn’t be vulnerable to attacks. No developer wants to be the person responsible for committing the code that brought the company down! So, yes, actually, developers do care about security. Unfortunately, not all developers know how to build secure software.

Shift Left is a mandate for a Whole Team

Fixing security issues late is too complex and costly. Security teams are stretched thin (or not present at all), and developers aren’t security experts and need assistance to understand how to build security into their apps. So how can we “shift left” realistically? Security must be a full-team effort. Yes, address security early and often ― but it’s not solely the responsibility of developers.

Security teams need to work with developers to help them improve their secure software development skills. Threat modeling, writing abuse cases along with use cases, and regular training and professional development all are good places to start. If you don’t have a security team,look to tools and online training to help with these goals.

Operations teams need to incorporate application security tools into the CD pipeline and production environments, just like they do for quality and performance. APM tools assist developers in identifying ways to improve performance during development, and then monitor production apps at runtime for problems. Likewise, a runtime application security tool (like Bluefyre) does the same for security.

Finally developers need to consider security ― just as they consider quality, performance, scalability, etc. ― as another aspect of good software. It should be discussed when planning an app, and tested while developing.

Shift Left is about timing, not about ownership. You wouldn’t wait until an application was in production to see if it was fast enough, would you? You wouldn’t wait until a user reported a bug to think about quality? So integrate security into the entire process , just like you do those attributes of good software. Just don’t cite “shift left” as an excuse to dump all the responsibility on devs alone.

Editor’s note: This post originally appeared here .

Related Resources: DevSecOps for Enterprise Continuous Delivery A DevSecOps Demo: Early, Everywhere, At Scale The Ultimate List of Software Security Tools 10 Tips for Integrating Security into DevOps Crossing the DevOps and Infosec Divide
Why “Shift Left” is Bulls*t…and Imperative
About the Author ( Author Profile ) Tim Buntel is DevOps Advocate for XebiaLabs. He is an experienced leader in developing (and creating passionate users of) technology products, projects, and teams.
          Norton Core Validates Need for Home Wi-Fi Network Security: More Than 90 Million ...      Cache   Translate Page   Web Page Cache   

Routers remain the most targeted and exploited device in the home 1

MOUNTAIN VIEW, Calif. (BUSINESS WIRE) Since launching in August 2017, Symantec’s Norton Core secure Wi-Fi

router for the connected home has blocked more than 90 million threats

at the network level. Powered by Symantec’s global Threat Intelligence

Network, the world’s largest civilian cyber intelligence network, Norton

Core is helping defend consumers’ home networks from hackers, botnets

and other sophisticated and aggressive malicious attacks.

Last year, a staggering 143 million Americans experienced cybercrime or

know someone who has more than half the U.S. adult online population 2 .

Further, Symantec research 1

found there was a 600 percent increase in overall IoT attacks since

2017, with routers identified as the most attacked device in the home.

As the world becomes more connected analyst firm Gartner 3

estimated 8.4 billion IoT devices would be in use by the end of 2017.

“Norton Core was developed to address the alarming trend of IoT attacks,

such as VPNFilter, the malware that recently infected more than half a

million routers in more than 50 countries,” said Ameer Karim, vice

president and general manager of Consumer IoT Security at Norton by

Symantec. “It’s mission-critical we continue to provide consumers with

great Wi-Fi performance and peace of mind even while on-the-go by

designing secure products with capabilities that help protect users’

privacy and personal information.”

Drawing on Symantec’s vast security expertise, Norton Core helps protect

consumers’ personal data and information from a variety of different

attacks, including: malware; software specifically designed to gain

access or damage to a computer; phishing and infected websites; botnets;

potentially unwanted programs (PUPs); and other emerging scams that

target consumers.

Since the product’s general availability in August 2017, Norton Core has

blocked more than:

51 million malware attacks 20 million botnets 13 million spam and phishing emails 3 million Potentially Unwanted Programs (PUPs, which are programs that
come bundled and add functions the user didn’t want or that may slow
down systems) 3 million potential scams, which include blocking sites that promote
scams such as work-from-home and pay-to-surf, as well as Ponzi schemes
and sites that provide or sell legally questionable content or services

Norton Core is available for purchase online for $199.99 at Norton.com,

BestBuy.com and Amazon.com, as well as Best Buy stores nationwide.

Purchase of Norton Core, available in Titanium Gold and Granite Gray,

comes bundled with a one-year complimentary subscription to Norton Core

Security Plus, which includes protection for an unlimited number of

connected devices, including computers, smartphones, tablets and smart

connected devices. After the first year, a subscription renewal is

available for $9.99/month. Subscription is required for security and

parental control features. To learn more, visit us.norton.com/core.

About Symantec

Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security

company, helps organizations, governments and people secure their most

important data wherever it lives. Organizations across the world look to

Symantec for strategic, integrated solutions to defend against

sophisticated attacks across endpoints, cloud and infrastructure.

Likewise, a global community of more than 50 million people and families

rely on Symantec’s Norton and LifeLock product suites to protect their

digital lives at home and across their devices. Symantec operates one of

the world’s largest civilian cyber intelligence networks, allowing it to

see and protect against the most advanced threats. For additional

information, please visit www.symantec.com

or connect with us on Facebook ,

Twitter ,

and LinkedIn .

NOTE TO U.S. EDITORS: If you would like additional information on

Symantec Corporation and its products, please visit the Symantec News

Room at http://www.symantec.com/news .

All prices noted are in U.S. dollars and are valid only in the United

States.

Symantec and the Symantec logo are trademarks or registered trademarks

of Symantec Corporation or its affiliates in the U.S. and other

countries.Other names may be trademarks of their respective owners.

FORWARD-LOOKING STATEMENTS: Any forward-looking indication of

plans for products is preliminary and all future release dates are

tentative and are subject to change. Any future release of the product

or planned modifications to product capability, functionality, or

feature are subject to ongoing evaluation by Symantec, and may or may

not be implemented and should not be considered firm commitments by

Symantec and should not be relied upon in making purchasing decisions.

1

2018

Symantec Internet Security Threat Report

, Symantec, 2018 2
          Google Bug Hunter Urges Apple to Change its iOS Security Culture      Cache   Translate Page   Web Page Cache   

Project Zero researcher highlights stubborn iOS bugs as an example of why Apple and the rest of the industry needs to take a fresh approach to securing systems.

LAS VEGAS Prolific Google bug hunter Ian Beer ripped into Apple on Wednesday, urging the iPhone maker to change its culture when it comes to iOS security. He said the company suffers from an all-too-common affliction of patching an iOS bug, but not fixing the systemic roots that contribute to the vulnerability.

Since 2016, the Project Zero team member said he has found over 30 iOS bugs. In his Black Hat session “A Brief History of Mitigation: The Path to EL1 in iOS 11” he reviewed the “async_wake” exploit for iOS 11.1.2 he released in December along with reviewing nearly a half dozen additional bugs he suggested Apple dragged its feet to fix.

Beer said he doesn’t blame individual security researchers. Instead, he saved his criticism toward organizations with security leads that have an academic background versus an exploit background.

“Undeniably these people have really strong engineering security skillsets. But, they don’t have an exploitation background… Their focus is on the design of the system and not on exploitation,” he said. “Please, we need to stop just spot-fixing bugs and learn from them, and act on that.”

Beer said each bug needs to be a lesson where a security lead needs to ask: “Why is this bug here? How is it being used? How did we miss it earlier? What process problems need to be addressed so we could of found it earlier? Who had access to this code and reviewed it and why, for whatever reason, didn’t they report it?”


Google Bug Hunter Urges Apple to Change its iOS Security Culture
And in a provocative call to Apple’s CEO Tim Cook, Beer directly challenged him to donate $2.5 million to Amnesty International roughly the equivalence of bug bounty earnings for Beer’s 30-plus discovered iOS vulnerabilities.

“Two years ago on this stage Apple announced a bug bounty program … Apple said it welcomed people to join the program,” Beer said. Part of Apple’s pitch to the entire research community was that all bugs would be taken seriously and Apple would consider rewards to bounty hunters outside the program in an altruistic quest to secure the platform. Apple said in lieu of a bounty payments it would consider donating to a charity of the researcher’s choice.

Beer called on Cook to donate any bounty rewards Apple might be willing to share with Beer to Amnesty International.

Beers singled out the charity because of a recent attack against it.Earlier this month, Amnesty International released a report asserting it was targeted by a nation-state adversary who used the mobile cyberweapon known as Pegasus sold by Israel-based company NSO Group. Beer noted that the messages sent by adversaries appeared to be iMessages.

In 2016, Citizen Lab and Lookout found that Pegasus was being used to take control of Apple devices using three zero-day iOS vulnerabilities, collectively called Trident . Amnesty reported both Android and iOS phones were targeted during its attacks.

Beer suggested that Apple needed to better lock down iOS because APT victims and alike are increasingly the users of iPhones. He cited another reported incident where backers of an anti-obesity tax on soda in Mexico were targets in an attack that singled out iPhone users with text messages that linked the Pegasus spyware.

“Targeted exploitation is more widespread than you think,” he said. He noted that Pegasus had moved from nation state attacks to what appeared to be attacks by a pro-sugary soft drink ring.

Beer called any security approach that uses bug fixes as a yardstick for safety flawed. He called it a “comfort blanket” that offered only an illusion of progress.The time of isolated security fixes is over, he said and the goal is understanding root causes and mitigating against those.


          5 Open Source Security Risks You Should Know About      Cache   Translate Page   Web Page Cache   

By giving developers free access to well-built components that serve important functions in the context of wider applications, the open source model speeds up development times for commercial software by making it unnecessary to build entire applications completely from scratch.

However, with research showing that 78 percent of audited codebases contained at least one open source vulnerability, of which 54 percent were high-risk ones that hackers could exploit, there is clear evidence that using open source code comes with security risks. Such risks often don’t arise due to the quality of the open source code (or lack thereof) but due to a combination of factors involving the nature of the open source model and how organizations manage their software.

Read on to find out the five open source security risks you should know about.

Publicity of Exploits

The nature of the open source model is that open source projects make their code available to anybody. This has the advantage that the open source community can flag potential exploits they find in the code and give open source project managers time to fix the issues before publicly revealing information on vulnerabilities.

However, eventually such exploits are made publicly available on the National Vulnerability Database (NVD) for anyone to view. Hackers can use the publicity of these exploits to their advantage by targeting organizations that are slow to patch the applications that may be dependant on open source projects with recent vulnerabilities.

A pertinent example of issues due to publicly available exploits was the major Equifax breach in 2017 wherein the credit reporting agency exposed the personal details of 143 million people. The reason the exposure occurred was that attackers noticed Equifax used a version of the open source Apache Struts framework which had a high-risk vulnerability, and the hackers used that information to their advantage.

Dealing with this risk from the organization perspective means recognizing that open source exploits are made vulnerable and that hackers stand to gain a lot from attempting to breach services that use vulnerable components. Update as quickly as possible or pay the consequences.

Difficulty Managing Licenses

Single proprietary applications are often composed of multiple open source components, the projects for which are released under any of several license types, such as Apache License, GPL, or MIT License. This leads to difficulty in managing open source licenses considering the frequency with which enterprises develop and release software and the fact that over 200 open source license types exist.

Organizations are required to comply with all individual terms of different licenses, and non-compliance with the terms of a license puts you at risk of legal action, potentially damaging the financial security of your company.

Tracking licenses manually is prohibitively time-consuming―consider a software composition analysis tool that can automatically track all of the different open source components and licenses you use in your applications.

Potential Infringement Issues

Open source components may introduce intellectual property infringement risks because these projects lack standard commercial controls, giving a means for proprietary code to make its way into open source projects. This risk is evident in the real-world case of SCO Group , who contended that IBM stole part of the UnixWare source code and used it for their Project Monterey and sought billions of dollars in damages.

Appropriate due diligence into open source projects can flag up potential infringement risks.

Operational Risks

One of the main sources of risks when using open source components in the enterprise comes from operational inefficiencies. Of primary concern from an operational standpoint is the failure to track open source components and update those components as new versions become available. These updates often address high-risk security vulnerabilities, and delays can cause a catastrophe, as was the case in the Equifax breach.

It’s vital, therefore, to keep an inventory of your open source usage across all your development teams, not only to ensure visibility and transparency, but to avoid different teams using different versions of the same component. Keeping an inventory needs to become part of a dedicated policy on open source usage, and software composition analysis tools provide a means to enforce this practice in an automated, easily manageable way without manually updating spreadsheets.

Another issue is abandoned projects that perhaps begin with much active involvement from the open source community but eventually peter out until nobody updates them anymore. If such projects make their way into apps in the form of libraries or frameworks, your developers are responsible for fixing future vulnerabilities. Part of good inventory management is to track projects that are updated infrequently.

Developer Malpractices

Some security risks arise due to developer malpractices, such as copying and pasting code from open source libraries. Copying and pasting is an issue firstly because you copy any vulnerabilities that may exist in the project’s code when you do it, and secondly because there is no way to track and update a code snippet once it’s added to your codebase, making your applications susceptible to potential future vulnerabilities that arise. You can avoid this issue by creating an open source policy that specifically forbids copying and pasting snippets directly from projects to your application codebases.

Another malpractice that can occur is the manual transfer via email of open source components across teams. This is opposed to the recommended best practice which is to use a binary repository manager or a shared, secure network location for transferring components.

Conclusion

Open source is a highly useful model that deserves its current standing as the bedrock of the development of many modern applications. However, smart use of open source components involves acknowledgment of the security risks involved in using these components in your applications and prudent, proactive action to minimize the chances of these risks affecting your organization directly.


          Under half of firms use vulnerability assessments      Cache   Translate Page   Web Page Cache   

A study of 2,100 organisations reveals a global divide in how organisations assess cyber risk, with less than half using strategic vulnerability assessments .

Only 48% of organisations polled use mature or moderately mature programs that include targeted and tailored scanning of computer resources based on business criticality as a foundational element of their cyber defence and risk reduction strategies, according to Tenable’s Cyber defender strategies report .

The report uses data science and real-world telemetry data to analyse how organisations are assessing their exposure to vulnerabilities to improve their cyber security posture.

Of those organisations using strategic vulnerability assessments, the study found that only 5% display the highest degree of maturity, with comprehensive asset coverage a cornerstone of their programs.

The “diligent” approach represents the highest level of maturity, achieving near-continuous visibility into where an asset is secure or exposed and to what extent through high assessment frequency.

On the other end of the spectrum, 33% of organisations take a “minimalist” approach to vulnerability assessments, doing the “bare minimum” as required by compliance mandates, thereby increasing the risk of a business-impacting cyber event, the report said. This group represents a lot of enterprises which are exposed to risk and still have some work to do, with critical decisions to make on which key performance indicators to improve first.

A previous study by Tenable revealed that cyber attackers generally have a median seven-day window of opportunity to exploit a known vulnerability, before defenders have even determined they are vulnerable.

The real-world gap is directly related to how enterprises are conducting vulnerability assessments, with smaller gaps and lower risk associated with more strategic and mature approaches, the latest report said.

“In the not too distant future, organisation will either fall into the category of those that rise to the challenge of reducing cyber risk or the category of those who fail to adapt to a constantly evolving and accelerating threat landscape in modern computing environments,” said Tom Parsons, senior director of product management, Tenable.

“This research is a call to action for our industry to get serious about giving the advantage back to cyber defenders, starting with the rigorous and disciplined assessment of vulnerabilities as the basis for mature vulnerability management and ultimately, cyber exposure.”

The research analysed telemetry data for over three months from organisations in more than 60 different countries to identify distinct security maturity styles and strategic insights which can help organisations.

Other strategies of vulnerability assessment

In addition to the “diligent” and “minimalist” approaches, the study identified two other strategies of vulnerability assessment.

The “surveyor” approach is characterised by frequent broad-scope vulnerability assessments, but with little authentication and customisation of scan templates. Of those organisations reviewed, 19% follow this approach, placing them at a low to medium maturity.

The “investigator” approach is characterised by the execution of vulnerability assessments with a high maturity, but assesses only selective assets. Of the organisations reviewed, 45% follow this approach, indicating a solid strategy based on a good scan cadence, targeted scan templates, broad asset authentication and prioritisation.

“Considering the challenges involved in managing vulnerabilities, securing buy-in from management, cooperating with disparate business units such as IT operations, maintaining staff and skills, and the complexities of scale, this is a great achievement and provides a solid foundation upon which to mature further,” the report said.

Across all levels of maturity, the report said organisations benefit from avoiding a “scattershot approach” to vulnerability assessment and instead making strategic decisions and employing more mature tactics such as frequent, authenticated scans to improve the efficacy of vulnerability assessment programs.


          The Sensors That Power Smart Cities Are a Hacker's Dream      Cache   Translate Page   Web Page Cache   

At this point, it seems like every so-called consumer smart device―fromrouters andbaby monitors to connected thermostats andgarage door openers―has been shown to have vulnerabilities . But that same security crisis has also played out on a macro scale, exposing municipal works and public safety sensors to manipulation that could destabilize traffic lights, undermine radiation sensors, or even create a calamity like causing a dam to overflow because of tainted water level data.

Researchers from IBM Security and data security firm Threatcare looked at sensor hubs from three companies―Libelium, Echelon, and Battelle―that sell systems to underpin smart city schemes. Smart city spending worldwide is estimated to reach about $81 billion globally in 2018, and the three companies all have different areas of influence. Echelon, for example, is one of the top suppliers of smart street lighting deployments in the world.

Fundamentally, though, the systems the researchers analyzed are similar. By setting up an array of sensors and integrating their data, a municipality can get more nuanced insight into how to solve interconnected problems. These sensors monitor things like weather, air quality, traffic, radiation, and water levels, and can be used to automatically inform fundamental services like traffic and street lights, security systems, and emergency alerts.

'When they fail, it could cause damage to life and livelihood.'

Daniel Crowley, IBM X-Force Red

That last one might sound familiar; an accidental missile alert in January sent Hawaii's residents scrambling, while a hack set off Dallas's tornado sirens last year. In fact, those incidents and others like it inspired Daniel Crowley of IBM X-Force Red and Jennifer Savage of Threatcare to investigate these systems in the first place. What they found dismayed them. In just their initial survey, the researchers found a total of 17 new vulnerabilities in products from the three companies, including eight critical flaws.

“The reason we wanted to focus on hubs was that if you control the central authority that runs the whole show then you can manipulate a lot of information that’s being passed around,” Crowley says. “It appears to be a huge area of vulnerability, and the stakes are high when we’re talking about putting computers in everything and giving them important jobs like public safety and management of industrial control systems. When they fail, it could cause damage to life and livelihood and when we’re not putting the proper security and privacy measures in place bad things can happen, especially with a motivated and resourced attackers.”

The researchers found basic vulnerabilities, like guessable default passwords that would make it easy for an attacker to access a device, along with bugs that could allow an attacker to inject malicious software commands, and others that would allow an attacker to sidestep authentication checks.

Many smart city schemes also use the open internet, rather than an internal city network, to connect sensors or relay data to the cloud, potentially leaving devices exposed publicly for anyone to find. Simple checks on IoT crawlers like Shodan and Censys yielded thousands of vulnerable smart city products deployed in the wild. The researchers contacted officials from a major US city that they found using vulnerable devices to monitor traffic, and a European country with at-risk radiation detectors.

"I live in a city that’s starting to implement smart city devices," Threatcare's Savage says. "We bought a house here and we can choose not to have IoT devices in our home, we can go out of our way to buy a dumb TV not a smart TV. But I can’t control if there are street lights with cameras baked into them right outside my house and I have no control over the vehicle hub that my city might be using. It gets to me as a security researcher that a city might be making these types of decisions for me."

The three companies have made patches available for all 17 bugs. Echelon, whose smart city offerings include not just lighting but also building automation and transportation, says it collaborated with IBM to resolve its issues. "Echelon confirmed the vulnerability, developed mitigation solutions, notified customers, and informed DHS ICS-CERT," spokesperson Thomas Cook told WIRED, referring to the Department of Homeland Security's Computer Emergency Readiness Team, which tracks vulnerabilities.

Battelle spokesperson Katy Delaney noted that the group is a technology development nonprofit, and that the vulnerability IBM researchers found was in an open source smart city hub collaboration with the Federal Highway Administration that hasn't yet been deployed. "We appreciate IBM bringing their considerable resources to bear in finding these potential security issues," Delaney told WIRED. "We wanted feedback and we appreciate the scrutiny, improvement, and help." Libelium, a Spanish company with extensive smart city offerings, could not be reached for comment.

'It gets to me as a security researcher that a city might be making these types of decisions for me.'

Jennifer Savage, Threatcare

While having patches available for all the flaws is a crucial step, the researchers note the importance of raising awareness about these problems to make sure that municipalities are prioritizing patching, which organizations so often don’t . The smart city hubs the researchers looked at don’t have automatic update capabilities, a common setup on industrial control devices since a buggy update could destabilize vital infrastructure . But the downside is that every entity using these products will need to proactively apply the patches, or devices in the wild will continue to be vulnerable.

And while the researchers emphasize that they don't have evidence of any of the bugs they found being abused, they did discover that someone posted an exploit for one of the flaws on a hacker forum in August 2015. "There are people out there who aren’t white hat hackers who have had at least one of these exploits for ages and who knows what they’ve done with it," Savage says. "This is something that people have been looking into."

Industrial control hacking has recently become a major focus of nation state attackers, for instance, with Russia taking the most prolific known interest. State-sponsored Russian hackers haveprobed US grid and election infrastructure and have wreaked havoc overseas, causing two blackouts in Ukraine and compromising payment systems in the country with malware campaigns. As the risk grows worldwide, US officials have increasingly acknowledged the vulnerability of US infrastructure, and agencies like the Department of Homeland Security are scrambling to implement systemic safeguards.

Cities will continue to invest in smart technology. Hopefully as they do, they'll appreciate that more data will often mean more risks―and that those vulnerabilities aren't always easy to fix.

More Great WIRED Stories In nature, Google Lens does what the human brain can’t Crying ‘pedophile‘ is the oldest propaganda trick around The wild inner workings of a billion-dollar hacking group Inside the23-dimensional world of your car’s paint job Crispr and the mutant future of food Looking for more? Sign up for our daily newsletter and never miss our latest and greatest stories
          Operations Manager/ Directeur de l'exploitation - GWL Realty Advisors - Montréal, QC      Cache   Translate Page   Web Page Cache   
Computer literate in Microsoft Office – Word and Excel and familiarity with Metasys, Angus software would be a plus....
From GWL Realty Advisors - Tue, 31 Jul 2018 00:25:34 GMT - View all Montréal, QC jobs
          Current Affairs:Outgoing race discrimination commissioner slams 'resurgence of far-right politics' - 【時事報導】政界及傳媒被指利用種族議題獲益      Cache   Translate Page   Web Page Cache   

The outgoing Race Discrimination Commissioner says Australia does not seem to have the political resolve or leadership to have a mature conversation about race. Dr Tim Soutphommasane has made the comments during his last speech as commissioner, accusing politicians and the media of exploiting race for monetary or political gain. Selina Kong and Ivan Leung report.

-

即將卸任的反種族歧視專員索奉馬賽恩指摘澳洲政壇人士以及傳媒均利用種族問題,從中獲利。同時,他亦指澳洲並沒有政治決心亦沒有在領導層面上,就種族問題進行成熟的對話。詳情請聽鄺美玲和梁焱剛的報導。


          Junge Turner schaffen den Exploit      Cache   Translate Page   Web Page Cache   
Die Schweizer haben an den Europameisterschaften in der Qualifikation überzeugt. Das Team von Bernhard Fluck erreichte als Vierter den Teamfinal vom Samstag
          Mondonville. Une écurie aux abords de la forêt de Bouconne      Cache   Translate Page   Web Page Cache   
Les «Écuries de La Bordette» est une écurie de propriétaires située à la lisière de la forêt de Bouconne, à Mondonville, et qui est tenue par Frédéric Piton. Sur un site verdoyant de 26 hectares, il accueille les chevaux et poneys de loisir, de compétition ou à la retraite. C'est sur les terres de l'ancienne exploitation agricole qui appartenait à ses parents il y a quinze ans, qu'il a pris sa suite, mais sans vouloir forcément devenir...
          Spécialiste junior, administration, gestion de l’exploitation et des propriétés (ISTM) - CBC/Radio-Canada - Montréal, QC      Cache   Translate Page   Web Page Cache   
Spécialiste junior, administration, gestion de l’exploitation et des propriétés (ISTM) - MON05121 Famille d'emplois Immobilier Emplacement principal Montréal...
From CBC/Radio-Canada - Thu, 02 Aug 2018 22:34:55 GMT - View all Montréal, QC jobs
          Rickards: U.S. Must Turn To Russia To Contain China      Cache   Translate Page   Web Page Cache   

Authored by James Rickards via The Daily Reckoning,

Vladimir Putin stands accused in the media and global public opinion of rigging his recent reelection, imprisoning his political enemies, murdering Russian spies turned double-agent, meddling in Western elections, seizing Crimea, destabilizing Ukraine, supporting a murderous dictator in Syria and exporting arms to terrorist nations like Iran.

At the same time, the country of Russia is more than Mr. Putin, despite his authoritarian and heavy-handed methods. Russia is the world’s 12th-largest economy, with a GDP in excess of $1.5 trillion, larger than many developed economies such as Australia (No. 13), Spain (No. 14) and the Netherlands (No. 18).

Its export sector produces a positive balance of trade for Russia, currently running at over $16 billion per month. Russia has not had a trade deficit in over 20 years. Russia is also the world’s largest oil producer, with output of 10.6 million barrels per day, larger than both Saudi Arabia and the United States.

Russia has the largest landmass of any country in the world and a population of 144 million people, the ninth largest of any country. Russia is also the third-largest gold-producing nation in the world, with total production of 250 tons per year, about 8% of total global output and solidly ahead of the U.S., Canada and South Africa.

Russia is highly competitive in the export of nuclear power plants, advanced weaponry, space technology, agricultural products and it has an educated workforce.

Russia’s government debt-to-GDP ratio is 12.6%, which is trivial compared with 253% for Japan, 105% for the United States and 68% for Germany. Russia’s external dollar-denominated debt is also quite low compared with the huge dollar-debt burdens of other emerging-market economies such as Turkey, Indonesia and China.

Under the steady leadership of central bank head Elvira Nabiullina, the Central Bank of Russia has rebuilt its hard currency reserves after those reserves were severely depleted in 2015 following the collapse in oil prices that began in 2014.

Total gold reserves rose from 1,275 tons in July 2015 to about 2,000 tons today. Russia’s gold-to-GDP ratio is the highest in the world and more than double those of the U.S. and China.

In short, Russia is a country to be reckoned with despite the intense dislike for its leader from Western powers. It can be disliked but it cannot be ignored.

Russia is even more important geopolitically than these favorable metrics suggest. Russia and the U.S. are likely to improve relations and move closer together despite the current animosity over election meddling and the attempted murders of ex-Russian spies.

The reason for this coming thaw has to do with the dynamics of global geopolitics. There are only three countries in the world that are rightly regarded as primary powers — the U.S., Russia and China. These three are the only superpowers. Some analysts may be surprised to see Russia on the superpower list, but the facts are indisputable.

More to the point, Russia is a nuclear superpower at least on par with the United States and well ahead of China, France, the U.K. and other nuclear powers.

All others are secondary powers (U.K., France, Germany, Japan, Israel, etc.) or tertiary powers (Iran, Turkey, India, Pakistan, Saudi Arabia, etc.). This strategic reality sets up a predictable three-party dynamic.

In any three-party dynamic, whether it’s a poker game or a struggle for global control, the dynamic is simple. Two of the powers align explicitly or implicitly against the third. The two-aligned powers refrain from using their power against each other in order to conserve it for use against the third power.

Meanwhile, the third power, the “odd man out,” suffers from having to expend military and economic resources to fend off adventurism by both of its opponents with no help from either.

China is the greatest geopolitical threat to the U.S. because of its economic and technological advances and its ambition to push the U.S. out of the Western Pacific sphere of influence. Russia may be a threat to some of its neighbors, but it is far less of a threat to U.S. strategic interests.

Therefore, a logical balance of power in the world would be for the U.S. and Russia to find common ground in the containment of China and to jointly pursue the reduction of Chinese power.

One of the keys to U.S. foreign policy the last 50 or 60 years has been to make sure that Russia and China never form an alliance. Keeping them separated was key, but China and Russia are forging stronger ties through the Shanghai Cooperation Organization – a military and economic treaty – and the BRICS institutions.

The BRICS analogs to the IMF and the World Bank, critical infrastructure, bilateral trade deals, bilateral currency swaps, arms sales, etc.

Meanwhile, the U.S. finds itself at odds with both Russia and China over different issues. Who’s on the losing end of that? Obviously, the United States.

This two-against-one strategic alignment of China and Russia against the U.S. is a strategic blunder by the U.S.

The United States has largely withdrawn from the Middle East while Russia has stepped in on Syria and elsewhere, China is expanding in the South China Sea, and Russia is expanding on its periphery. They have each other’s back, and the U.S. is the odd man out.

But the Russian/Chinese relationship can be exploited. China and Russia have a history of conflicting interests, despite the fact that they were both communist during the Cold War.

The two countries had a number of border skirmishes in the 1960s, and one in 1969 was particularly serious. According to a senior Soviet defector to the United States, “The Politburo was terrified that the Chinese might make a large-scale intrusion into Soviet territory.”

The Soviets even considered a preemptive nuclear attack on Chinese nuclear facilities. Soviet officials advised Washington of the possibility, but the U.S. response was firm, warning that any nuclear attack would possibly lead to World War III.

The point being, there are fissures in the Chinese-Russian relationship that the U.S. could exploit.

For another thing, the U.S. and Russia are the first and second largest energy producers in the world. Saudi Arabia is the third largest energy producer in the world. If you put the U.S., Russia, and Saudi Arabia in a loose alliance, they dominate the energy markets. They can cut you off, they can supply, they can set prices.

Who needs energy the most? China.

China has very little oil or natural gas. It does have coal, but if you’ve been to Beijing lately, you know it looks black at noon because the air is so bad and you can’t breathe it. Pulmonary disease is becoming fairly common. They’re literally choking themselves to death. So, Russia, the U.S., and Saudi Arabia acting jointly have China completely at their mercy.

But the U.S. presently has no relationship with Russia to help back up our position against China. It’s two-against-one, and the U.S. is the odd man out — thanks to U.S. political dysfunction and the media.

In a three-handed poker game, if you don’t know who the sucker is, you’re the sucker. Trump will try to make China the odd man out. Very few people seem to get this.

As China’s power expands and as U.S. power is put to the test in Asia, it is likely that the U.S. will correct its recent strategic shortsightedness and find ways to work with Russia. Or at least it should. This will not be done out of wishful thinking about the true nature of Putin or his regime but as a simple matter of geopolitical necessity.


          Chef d'équipe - Réseau Central - Canadian National Railway - Montréal, QC      Cache   Translate Page   Web Page Cache   
À PROPOS DE LA TI AU CN Le CN exploite en tout temps le pouvoir de l’information afin de prendre des décisions plus éclairées. Notre entreprise dépend de la...
From Canadian National Railway - Sat, 30 Jun 2018 00:37:23 GMT - View all Montréal, QC jobs
          INTÉGRATEUR OU INTÉGRATRICE TÉLÉCOMMUNICATIONS, LIVRAISON MPLS - Canadian National Railway - Montréal, QC      Cache   Translate Page   Web Page Cache   
À PROPOS DE LA TI AU CN Le CN exploite en tout temps le pouvoir de l’information afin de prendre des décisions plus éclairées. Notre entreprise dépend de la...
From Canadian National Railway - Mon, 18 Jun 2018 18:42:58 GMT - View all Montréal, QC jobs
          INTÉGRATEUR PRINCIPAL OU INTÉGRATRICE PRINCIPALE TÉLÉCOMMUNICATIONS, INGÉNIERIE MPLS - Canadian National Railway - Montréal, QC      Cache   Translate Page   Web Page Cache   
À PROPOS DE LA TI AU CN Le CN exploite en tout temps le pouvoir de l’information afin de prendre des décisions plus éclairées. Notre entreprise dépend de la...
From Canadian National Railway - Wed, 06 Jun 2018 18:38:20 GMT - View all Montréal, QC jobs
          Titre Associé aux Ventes Sans-Fil - Beauport, QC - OSL Retail Services Inc - Beauport, QC      Cache   Translate Page   Web Page Cache   
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Fri, 13 Jul 2018 07:19:00 GMT - View all Beauport, QC jobs
          Titre Associé aux Ventes Sans-Fil - Thetford Mines, QC - OSL Retail Services Inc - Thetford Mines, QC      Cache   Translate Page   Web Page Cache   
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Mon, 25 Jun 2018 07:21:00 GMT - View all Thetford Mines, QC jobs
          Titre Associé aux Ventes Sans-Fil - Blainville - OSL Retail Services Inc - Blainville, QC      Cache   Translate Page   Web Page Cache   
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Fri, 03 Aug 2018 19:22:03 GMT - View all Blainville, QC jobs
          Titre Associé aux Ventes Sans-Fil - Laval - OSL Retail Services Inc - Laval, QC      Cache   Translate Page   Web Page Cache   
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Wed, 08 Aug 2018 19:24:54 GMT - View all Laval, QC jobs
          Titre Associé aux Ventes Sans-Fil - OSL Retail Services Inc - Longueuil, QC      Cache   Translate Page   Web Page Cache   
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Thu, 02 Aug 2018 19:23:52 GMT - View all Longueuil, QC jobs
          Orages : les maraîchers de la région bordelaise particulièrement impactés      Cache   Translate Page   Web Page Cache   
Le Pian-Médoc, Blanquefort, Parempuyre, Bruges, le Haillan. Nombreuses sont les communes de l'agglomération bordelaise à avoir été impactées par les orages de ce week-end. Des averses violentes, mais très localisées et qui ont causé de nombreux dégâts, notamment sur la commune d'Eysines où l'activité maraîchère a particulièrement souffert des intempéries. Un avatar météorologique qui, loin d'être le premier depuis le début de l'année, s'inscrit dans une (trop) longue liste mais aussi, une situation face à laquelle élus locaux et exploitants agricoles sont vent debout.
          Rickards: U.S. Must Turn To Russia To Contain China      Cache   Translate Page   Web Page Cache   

Authored by James Rickards via The Daily Reckoning,

Vladimir Putin stands accused in the media and global public opinion of rigging his recent reelection, imprisoning his political enemies, murdering Russian spies turned double-agent, meddling in Western elections, seizing Crimea, destabilizing Ukraine, supporting a murderous dictator in Syria and exporting arms to terrorist nations like Iran.

At the same time, the country of Russia is more than Mr. Putin, despite his authoritarian and heavy-handed methods. Russia is the world’s 12th-largest economy, with a GDP in excess of $1.5 trillion, larger than many developed economies such as Australia (No. 13), Spain (No. 14) and the Netherlands (No. 18).

Its export sector produces a positive balance of trade for Russia, currently running at over $16 billion per month. Russia has not had a trade deficit in over 20 years. Russia is also the world’s largest oil producer, with output of 10.6 million barrels per day, larger than both Saudi Arabia and the United States.

Russia has the largest landmass of any country in the world and a population of 144 million people, the ninth largest of any country. Russia is also the third-largest gold-producing nation in the world, with total production of 250 tons per year, about 8% of total global output and solidly ahead of the U.S., Canada and South Africa.

Russia is highly competitive in the export of nuclear power plants, advanced weaponry, space technology, agricultural products and it has an educated workforce.

Russia’s government debt-to-GDP ratio is 12.6%, which is trivial compared with 253% for Japan, 105% for the United States and 68% for Germany. Russia’s external dollar-denominated debt is also quite low compared with the huge dollar-debt burdens of other emerging-market economies such as Turkey, Indonesia and China.

Under the steady leadership of central bank head Elvira Nabiullina, the Central Bank of Russia has rebuilt its hard currency reserves after those reserves were severely depleted in 2015 following the collapse in oil prices that began in 2014.

Total gold reserves rose from 1,275 tons in July 2015 to about 2,000 tons today. Russia’s gold-to-GDP ratio is the highest in the world and more than double those of the U.S. and China.

In short, Russia is a country to be reckoned with despite the intense dislike for its leader from Western powers. It can be disliked but it cannot be ignored.

Russia is even more important geopolitically than these favorable metrics suggest. Russia and the U.S. are likely to improve relations and move closer together despite the current animosity over election meddling and the attempted murders of ex-Russian spies.

The reason for this coming thaw has to do with the dynamics of global geopolitics. There are only three countries in the world that are rightly regarded as primary powers — the U.S., Russia and China. These three are the only superpowers. Some analysts may be surprised to see Russia on the superpower list, but the facts are indisputable.

More to the point, Russia is a nuclear superpower at least on par with the United States and well ahead of China, France, the U.K. and other nuclear powers.

All others are secondary powers (U.K., France, Germany, Japan, Israel, etc.) or tertiary powers (Iran, Turkey, India, Pakistan, Saudi Arabia, etc.). This strategic reality sets up a predictable three-party dynamic.

In any three-party dynamic, whether it’s a poker game or a struggle for global control, the dynamic is simple. Two of the powers align explicitly or implicitly against the third. The two-aligned powers refrain from using their power against each other in order to conserve it for use against the third power.

Meanwhile, the third power, the “odd man out,” suffers from having to expend military and economic resources to fend off adventurism by both of its opponents with no help from either.

China is the greatest geopolitical threat to the U.S. because of its economic and technological advances and its ambition to push the U.S. out of the Western Pacific sphere of influence. Russia may be a threat to some of its neighbors, but it is far less of a threat to U.S. strategic interests.

Therefore, a logical balance of power in the world would be for the U.S. and Russia to find common ground in the containment of China and to jointly pursue the reduction of Chinese power.

One of the keys to U.S. foreign policy the last 50 or 60 years has been to make sure that Russia and China never form an alliance. Keeping them separated was key, but China and Russia are forging stronger ties through the Shanghai Cooperation Organization – a military and economic treaty – and the BRICS institutions.

The BRICS analogs to the IMF and the World Bank, critical infrastructure, bilateral trade deals, bilateral currency swaps, arms sales, etc.

Meanwhile, the U.S. finds itself at odds with both Russia and China over different issues. Who’s on the losing end of that? Obviously, the United States.

This two-against-one strategic alignment of China and Russia against the U.S. is a strategic blunder by the U.S.

The United States has largely withdrawn from the Middle East while Russia has stepped in on Syria and elsewhere, China is expanding in the South China Sea, and Russia is expanding on its periphery. They have each other’s back, and the U.S. is the odd man out.

But the Russian/Chinese relationship can be exploited. China and Russia have a history of conflicting interests, despite the fact that they were both communist during the Cold War.

The two countries had a number of border skirmishes in the 1960s, and one in 1969 was particularly serious. According to a senior Soviet defector to the United States, “The Politburo was terrified that the Chinese might make a large-scale intrusion into Soviet territory.”

The Soviets even considered a preemptive nuclear attack on Chinese nuclear facilities. Soviet officials advised Washington of the possibility, but the U.S. response was firm, warning that any nuclear attack would possibly lead to World War III.

The point being, there are fissures in the Chinese-Russian relationship that the U.S. could exploit.

For another thing, the U.S. and Russia are the first and second largest energy producers in the world. Saudi Arabia is the third largest energy producer in the world. If you put the U.S., Russia, and Saudi Arabia in a loose alliance, they dominate the energy markets. They can cut you off, they can supply, they can set prices.

Who needs energy the most? China.

China has very little oil or natural gas. It does have coal, but if you’ve been to Beijing lately, you know it looks black at noon because the air is so bad and you can’t breathe it. Pulmonary disease is becoming fairly common. They’re literally choking themselves to death. So, Russia, the U.S., and Saudi Arabia acting jointly have China completely at their mercy.

But the U.S. presently has no relationship with Russia to help back up our position against China. It’s two-against-one, and the U.S. is the odd man out — thanks to U.S. political dysfunction and the media.

In a three-handed poker game, if you don’t know who the sucker is, you’re the sucker. Trump will try to make China the odd man out. Very few people seem to get this.

As China’s power expands and as U.S. power is put to the test in Asia, it is likely that the U.S. will correct its recent strategic shortsightedness and find ways to work with Russia. Or at least it should. This will not be done out of wishful thinking about the true nature of Putin or his regime but as a simple matter of geopolitical necessity.


          Junge Turner schaffen den Exploit      Cache   Translate Page   Web Page Cache   
Die Schweizer haben an den Europameisterschaften in der Qualifikation überzeugt. Das Team von Bernhard Fluck erreichte als Vierter den Teamfinal vom Samstag
          Quelques nouvelles graphiques... et poétiques.      Cache   Translate Page   Web Page Cache   
 Extraits de cycles (janvier, mars, avril et mai 2018)

Comme régulièrement, des nouvelles en images ET en mots de mon projet de drawing in progress ou de work in progress il me semble que les deux appellations sont valables ici développé sur Tumblr et baptisé Le Horlart à 1,99.

Le Horlart ?... 

Toujours et encore... mais différent de ce blog-ci. Plus précisément, il s'agit d'une variante, disons plutôt... d'une excroissance. Oui, parce que si cette idée de publication quotidienne en prolonge le fil directeur, expérimenter, dessiner-écrire, associer les images et les mots, composer,  accumuler les expériences et les traces d'une recherche littéraire et artistique sans cesse renouvelée dans ses sujets et ses angles de vue, elle a sa propre raison d'être. 

À travers cette idée-là, j'ai souhaité en effet aller vers un autre type de production. D'une part, fondamentalement ludique, elle est "à contraintes", de format en tout premier lieu, mais aussi de sujet, de technique —  et de modalités parfois, suivant une logique de création "oulipienne"* appliquée à l'image. La contrainte quelle qu'elle soit stimule ma créativité. D'autre part, autant que possible, c'est m'essayer à une production... plus brute, c'est-à-dire dessinée à partir de ce qui vient tout de suite jaillissant, dans un cadre prédéfini sans esquisse préalable ou recherche documentaire approfondie.

 Extraits de cycles (octobre, janvier, avril et juillet 2017)

À chacune, à chacun, en visitant librement  les archives de ce projet, d'estimer ce qui est (vraiment) abouti, ce qui relève davantage de l'ébauche d'une idée à creuser plus tard ou ce qui ne soulève aucun commentaire il y en a aussi de cette catégorie-là, que je considère comme mes petits ratés assumés. Pris dans la masse d'images, ils trouvent néanmoins leur place et leur cohérence. 

.... à 1, 99 ? ...

Ce chiffre décimal curieux fait tout simplement référence au prix du bloc de feuilles de papier acheté, il y a plus de deux ans, dans une petite surface, et qui m'a servi de support d'inspiration durant... plus de 790 jours ! Il faut imaginer une sorte de cube en plastique avec, à l'intérieur, des feuillets mobiles blancs. Tout carré, ils ont été la plupart du temps, le support idéal de mon exercice journalier. Car, pour mes illustrations, je choisis prioritairement des feuilles de ce format. 

À d'autres moments, il faut avouer qu'ils ont représenté une certaine gêne : je voyais l'idée à dessiner plus grande que celle jetée sur le papier ; j'aurais voulu utiliser une autre technique moins graphique, plus picturale, incompatible malheureusement avec un papier de 70 g/ ! J'aurais voulu percer, couper, parfois creuser à l'intérieur de ce support. 

Il a fallu faire avec, contre, pour, dans cet espace de 9 cm x 9 cm de côté, invariablement blanc et fin. Il a fallu user de stratégies pour éviter la répétition et (ma)la lassitude.

... Projet ?...

Projet, j'ai parlé de projet ? À savoir : 
1 Un début. Sous le coup d'une soudaine inspiration individuelle ou d'une profonde conviction personnelle de faire le bien, le beau, le bon, commencer, foncer.
2 Un milieu. Un déroulement (approprié), progressif, tendant vers un résultat (même abstrait), qui écarte d'un geste sûr les remises en question (matinales, intestines et vaines) venant ainsi confirmer l'intuition de départ. 
3Un résultat. Peut-être beau. Fort. Drôle. Ou anodin, gratuit. En tout cas, visible, compréhensible, traduisible (exploitable ! ) à différents niveaux. Et une fin (car il faut que cela se conclut, à un moment don.)
Extraits de cycles (août, septembre, février et mai 2017)

Le début ? J'en ai maintes fois parlé. Le milieu ? Chacune, chacun peut aller voir dans mes archives, comment se succèdent les images-mots, jour après jour et mois après mois. Le résultat ? L'intérêt premier est de pouvoir se lancer un défi à chaque fois renouvelé et de s'y tenir, tout en restant attentive aux micro-variations qui s'opèrent dans le traitement graphique et thématique à l'intérieur du même sujet et des évolutions écarts, progressive maîtrise ou échec de ma pratique et de mon regard, en général.  

Disposer de plusieurs centaines de dessins (portraits, études, objets, personnages, végétaux, matières...) regroupés dans plus de 24 carnets virtuels, composés eux-mêmes de 29 à 31 productions, présentées dans leur ressemblance et leur hétérogénéité est intéressant