Sunday, August 4, 2013

D-Link Wireless AC1750 Dual Band Gigabit Cloud Router (DIR-868L)


D-Link's newest pre-draft 802.11ac router, the Wireless AC1750 Dual Band Gigabit Cloud Router (DIR-868L) does not deliver the powerful performance of some competing 11ac routers I've tested, but the device offers good enough performance and adds some feature improvements over D-Link's lackluster introductory 11ac router?the Amplifi Cloud Router 5700 (DIR-865L).

Specs
One noticeable difference between the DIR-865L and the 868L is the physical shape. The DIR-865L is a traditional square router. The DIR-868L has a cylindrical housing reminiscent of a large coffee grinder. The design is very similar to another D-link networking product I've tested, the D-Link Amplifi DAP-1625 Wi-Fi Booster. This shape is intended to enhance a D-Link feature called AC SmartBeam, D-Link's version of beamforming?a technology that helps wireless performance by guiding a wireless signal to the wireless clients. The height of the DIR-868L also is conducive to housing high-power amplifiers. The router measures 8.5 by 3.5 by 4 inches (HWD). The front panel has two LEDs: One indicates power status and the other, WAN activity.

The 868L is a dual-band router, supporting up to a theoretical 450 Mbps at the 2.4GHz band and up to 1300 Mbps at 5GHz. It has four Gigabit LAN ports, a Gigabit WAN port, one USB 2.0 port for connecting external storage and printers. The device also supports WPS (Wi-Fi Protected Setup).

Setup
There are two setup options for the AC1750:? You can either use a Web-browser-based setup wizard or you can perform a QRS Mobile setup. The latter uses D-Link's QRS Mobile app for Android or iOS to allow setup of the router from a smartphone or tablet.?

The router ships with a Quick Connect guide that includes a QRS code. You scan the code from a smartphone and your phone's browser is redirected to Google Play or iTunes to download the D-Link QRS mobile app. Unfortunately, no Windows Phone version is yet available. Once the app is installed, you connect to the router with the phone using the preconfigured SSID and passphrase. That information is printed on a small card that slips in and out of a slot at the bottom of the router.

Once I had the app installed on my Android phone, tapping it open displayed a welcome screen that guided me through setting up the router. From this screen, I could set my own wireless network passphrase and change the admin password to the router?as you should always do.

After using the app to configure the router that way you want, the app applies the changes and throws the router a reboot?or at least it's supposed to. Although I saw confirmation of a reboot in the app's interface, as I stared at the router it never rebooted. I confirmed my smart phone and router were connected to the same Wi-Fi. They were, but the app was unable to reboot the router and apply the changes I made.

So, after all that, I had to go through the browser-based setup anyway. The app not only did not work, but it seems like a time-waster since you have to go into an app store, download, install, and then set up the router. I prefer connecting a laptop or tablet and just using the browser to configure it.

Interface and Features
D-Link's interface has not changed since I had the D-Link DIR-655 Gaming Router back in 2007. The interface is adequate but looks dated and cluttered and could use a refresh. It is, however, still feature-packed as I noted in the review of the DIR-865L. D-Link's routers have always been a favorite among gamers and techies because of advanced capabilities such as QoS that, according to my testing, really does improve buffering time and lag. Other advanced features include robust IPv6 support, the ability to enable IPv4 or IPv6 multicast streams, virtual servers and inbound filtering rules.

I was pleased to see that one feature I'd previously found not up-to-par when reviewing the DIR-856L has improved: the mydlink app. This app allows you to remotely manage the router. When I last tested it, I had problems just signing into the D-Link cloud service the app uses. This time I was able to sign in and easily associate the DIR-868L to the remote management cloud service. The mydlink app and service are convenient for managing the router and monitoring connections remotely from a mobile device or PC.

Source: http://feedproxy.google.com/~r/ziffdavis/pcmag/~3/8Su8c-_U7nw/0,2817,2422521,00.asp

nfl free agents 2012 encyclopedia brittanica nfl free agency jonbenet ramsey jason campbell doobie brothers jennie garth peter facinelli

Monday, July 29, 2013

Arkadium reports strong growth for its Windows 8 mobile and PC games

VentureBeat writes, Arkadium Arkadium's Taptiles Casual game publisher Arkadium said today it has seen strong growth for its titles on Microsoft?s Windows 8 platfrom. Arkadium is also launching a beta test of a Windows 8 games analytics program that it will create for measuring the success of its own games as well as those of other developers. Arkadium is inviting other developers to join it in kicking the tires on the new analytics system. New York-based Arkadium launched four new games, including Taptiles, on Windows 8 PC and mobile game platforms in October. It has seen increased downloads and game plays?

Continue reading Arkadium reports strong growth for its Windows 8 mobile and PC games at VentureBeat

Source: http://mobilitybeat.com/venturebeat-mobile/124778/arkadium-reports-strong-growth-for-its-windows-8-mobile-and-pc-games/

rush limbaugh karl rove Election 2012 Results polling place comedy central philadelphia eagles obamacare

At least 38 dead after coach plunges off viaduct in Italy

MONTEFORTE IRPINO, Italy - Thirty-eight people were killed and 10 injured when a bus plunged off a viaduct in southern Italy in one of the country's worst road accidents.

Initial reports suggested that the coach was travelling at speed and had hit four or five cars before crashing over the roadside barriers on a stretch of road near Monteforte Irpino, east of Naples, on Sunday night.

Many children were among the 50 people on board.

"It was an immense tragedy where we first had to rescue the injured people who were trapped inside the coach and then successively have had to work to pull out the bodies," said Alessio Barbarulo, head of the local fire brigade division that coordinated the rescue effort.

It was the second transport disaster to hit southern Europe in the space of five days. Seventy-nine people were killed when a high-speed train derailed in the Spanish pilgrimage town of Santiago de Compostela on Wednesday.

Crushed wreckage from the coach lay on its side, while bodies covered in white sheets were lined up on the road. It was not clear for the moment whether there was any mechanical damage to the vehicle's brakes or problems with its tyres, or whether there was any fault on the part of the driver, who was killed in the accident.

"You would think that the barriers on the viaducts and bridges should prevent this type of accident but evidently it seems the impact was so strong that even the barrier gave way," Barbarulo said.

Prosecutors have already opened an investigation into the case.

All of the victims appear to have been Italians returning from an excursion to the town of Telese Terme, known for its hot sulphurous springs and a nearby lake popular as a fishing spot. Local media said the stretch of road where the bus crashed had been the scene of repeated accidents.

?

Source: http://www.lfpress.com/2013/07/28/at-least-24-dead-after-coach-plunges-off-viaduct-in-italy

Ash Wednesday 2013 ted nugent westminster dog show Pope Resigns Christopher Dorner Manifesto mardi gras Christopher Dorner

Microsoft prices XboxOne controller at $60, headset at $25

Video games

5 hours ago

Microsoft has revealed the prices of two of the Xbox One's key accessories.

Microsoft

Microsoft has revealed the prices of two of the Xbox One's key accessories.

Microsoft revealed early Monday the prices for two of the key accessories for the upcoming next-generation Xbox One video game console ? the standalone controller, which will cost $59.99, and an official Xbox-branded wireless headset to support the consoles various chat and voice features for an additional $24.99. Like most video game hardware, the starting bundle that Xbox One owners receive will include a single controller, and Microsoft has said that the new device will not be compatible with current-generation Xbox 360 controllers.

For a point of comparison, Sony's upcoming PlayStation 4 console ? which at a starting price of $399.99 will debut for $100 less than the Xbox One ? comes bundled with an earbud-style headset but will only offer its motion-controlled camera peripheral, the imaginatively named PlayStation Camera, for an extra $59.99. Unlike the Xbox One's Kinect hardware, the PlayStation Camera is not a mandatory feature for the PlayStation 4 console. Additional PS4 controllers also cost $59.99, and the console is not backwards compatible with older versions of the PlayStation DualShock controller.

Regardless of whether or not a headset is contained in the starting console package, however, that most serious gamers will likely look to make a heftier investment in a high-end gaming headset like those offered by Turtle Beach, Tritton, or Astro if they're actually planning to use either console's chat capabilities for actual gameplay purposes. According to a report from the video game site Polygon, Sony has confirmed that the PlayStation 4 will be compatible with the same headgear that currently befits the PlayStation 3. Microsoft, meanwhile, has been vague on whether or not gamers will be able to use their current headsets, which can run upwards of $200 for the best models, on the next-gen hardware.

This story was updated at 3:20 pm ET.

Yannick LeJacq is a contributing writer for NBC News who has also covered technology and games for Kill Screen, The Wall Street Journal and The Atlantic. You can follow him on Twitter at @YannickLeJacq and reach him by email at: Yannick.LeJacq@nbcuni.com.

Source: http://feeds.nbcnews.com/c/35002/f/663301/s/2f4d2286/sc/23/l/0L0Snbcnews0N0Ctechnology0Cmicrosoft0Eprices0Exbox0Eone0Econtroller0E60A0Eheadset0E250E6C10A78320A3/story01.htm

masters par 3 gwen stefani overeem laron landry mary j blige burger king islands 2013 nissan altima

Sunday, July 28, 2013

Will Nexus 7 beat iPad Mini by out-cooling it?

Cool?

(Credit: Google/YouTube Screenshot by Chris Matyszczyk/CNET)

I want to take you to a world that some might never be able to imagine.

It's a world in which Google is cooler than Apple.

I know, I know. In this world, the devil must be ice-skating.

Still, you'll find quite a few sentient humans who'll tell you that the Nexus 7 is better than the iPad Mini.

They're talking about the new Nexus 7. I'm talking about the old one.

I chose a Nexus 7 over the iPad Mini for the simple reason that it felt better. No, this might not be the way you buy things. But I can live with that if you can.

I use it mostly to watch TV shows and movies, as I wander about the house searching for inspiration, last night's party guests, and my orange sneakers.

Yes, I put up with the user interface, which looks like it was designed by the same man who designed hieroglyphics -- except that the work he performed for Google was done late at night, with ouzo oozing from his pores.

Still, the product works for me.

So when the new one came along with its shiny screen and glorious reviews, I was fascinated to see how Google would market it.

The answer, at least so far, is one charming ad featuring a boy trying to get a girl by trying to conquer his fear of public speaking.

I fancy many won't have seen this ad.

It certainly hasn't adorned my sports watching over the last few days, and I'm wondering if that's deliberate.

You know that when Apple comes out with its next iPad Mini, it will offer advertising in so many breaks that it'll seem like a break only when you don't see an Apple ad.

Yet, in Nexus 7, Google has a product that even a human (as opposed to techie) consensus is impressed with and yet is being released more through the positive feelings it's engendered, rather than a vast marketing push.

This might be because more ads are coming, but, in the rush of these things, they just aren't ready.

It might also be that Google is trying to let Apple flood the market more and more with ads that aren't being well-received, while itself standing back and looking, can one even conceive it, cool.

That would be an interesting strategy. Over the last couple of years, Google hasn't been afraid of public speaking.

More Technically Incorrect

Its advertising has been far more cleverly focused on real humans and has often delivered a warm, modern glow. Even the latest ad for Chromecast shows a company that's actually interested in you, for a change.

Google has never seemed entirely sure how to advertise its hardware products. Originally, the company thought it could sell Nexus phones without any real advertising at all.

And yet with the Nexus 7, it clearly has an excellent product on its hands.

Of course Apple isn't (entirely) panicking.

Because it's built a vast emotional well of commitment (as well as a severe emotional dependence on its ecosystem) from its customers over many years, those customers forgive more easily when a product isn't quite there -- or is even very late in coming.

Yet its ever-increasing global ambitions force upon it certain compromises that might cut into its public perception.

The Nexus 7 is a cool little thing. How might Google capitalize on that?

Source: http://news.cnet.com/8301-17852_3-57595851-71/will-nexus-7-beat-ipad-mini-by-out-cooling-it/?part=rss&tag=feed&subj=TechnicallyIncorrect

playstation all stars battle royale quinton coples a.j. jenkins riley reiff david decastro travis pastrana aj jenkins

Huge Bee Swarm Attacks Texas Couple, Kills Miniature Horses

PANTEGO (July 27, 2013)--A swarm of an estimated 30,000 bees attacked a North Texas couple as they exercised their miniature horses, stinging the animals so many times that they died.

Kristen Beauregard, 44, was stung about 200 times and her boyfriend about 50 times.

Beauregard said the swarm chased down her and her boyfriend.

She said they were sweeping up piles of bees "like a bad movie."

Firefighters sprayed a foam substance to clear the bees, and dragged the horses to a pasture to be treated by police and paramedics, she said.

A 6-year-old show horse named Chip died before a veterinarian arrived and Trump, a Shetland pony, was taken to a veterinary clinic but also died.

The bees are being tested to see whether they are Africanized or "killer" bees.

Source: http://www.kwtx.com/home/headlines/Huge-Bee-Swarm-Attacks-Texas-Couple-Kills-Miniature-Horses-217231181.html

Olympics 2012 Olympic Schedule 2012 NBC Olympics NBC Olympics schedule 2012 Olympics Chad Everett London Olympics

Saturday, July 27, 2013

Jezebel Watch DJ Khaled's Hilariously Sincere Proposal Video for Nicki Minaj | Kotaku The Year In JR

Jezebel Watch DJ Khaled's Hilariously Sincere Proposal Video for Nicki Minaj | Kotaku The Year In JRPGs So Far (Part Two) | Lifehacker How Can I Reduce the Risk of Data Corruption and Loss on a USB Drive? | Jalopnik Ten Affordable Ways To Improve Your Car | Paleofuture Marilyn Monroe Assembled Drones During WWII

Read more...

Source: http://lauren.kinja.com/jezebel-watch-dj-khaleds-hilariously-sincere-proposal-v-926983021

illuminati ricin Google Fiber Boston Strong Dzhokhar A. Tsarnaev Boston Bombing Suspect fbi

Production Begins on Marvel?s ?Guardians of the Galaxy?

Filming has started on Marvel Studio?s next epic adventure, Guardians of the Galaxy.

The film ? about a jet pilot who gets stranded in space and must unite with a diverse team of aliens to form a squad capable of defeating cosmic threats ? will introduce fans to a new side of the Marvel Cinematic Universe.

It boasts an all-star cast including Chris Pratt (Zero Dark Thirty, Moneyball) as Peter Quill aka Star-Lord, Zoe Saldana (Star Trek Into Darkness, Avatar) as Gamora, Dave Bautista (Riddick) as Drax the Destroyer, Lee Pace (The Hobbit, Lincoln) as Ronan the Accuser, Michael Rooker (AMC?s The Walking Dead) as Yondu, Karen Gillan (BBC TV?s Doctor Who) as Nebula, two-time Academy Award? nominee Djimon Hounsou (Amistad, Gladiator) as Korath, with Academy Award? winner Benicio del Toro (Traffic) as The Collector,? Academy Award? nominee John C. Reilly (Chicago) as Rhomann Dey, and six-time Academy Award? nominee Glenn Close (Albert Nobbs, Fatal Attraction) as Nova Prime.

Guardians of the Galaxy is being directed by James Gunn and is based on a screenplay by Gunn with a story by Nicole Perlman and Gunn.

The movie is currently filming at Shepperton Studios in the United Kingdom and will also shoot at Longcross Studios and other areas around London.

Guardians of the Galaxy is scheduled for theatrical release on August 1, 2014. Marvel Studios has more two upcoming releases ? Thor: The Dark World arrives in theaters November 8, 2013, and Captain America: The Winter Soldier opens April 4, 2014.

Source: http://www.diszine.com/content/production-begins-on-marvels-guardians-of-the-galaxy

black friday How long to cook a turkey green bean casserole green bean casserole recipe red dawn sweet potato pie sweet potato pie

Credit Union Classic underway

This section displays all of the articles related to sports published in the past 10 days.

'); if(infobox=='True' && ShowInfoBox_l675051_1==false){ jQuery("#player_infobarl675051_1").trigger('click'); ShowInfoBox_l675051_1==true; } }; if (false) { $.setup_player(Play_Conf); } //info bar setup jQuery('#player_infobarl675051_1').click(function() { var $info =jQuery('#player_info_contentl675051_1'); if($info.text()!=''){ var $content = jQuery('div',$info); //min heigth var min = $content.css('min-height'); var max = $content.css('max-height'); $info.slideToggle(600); ShowInfoBox_l675051_1=!ShowInfoBox_l675051_1; } }); });

Google Has Showed Another Living Room Device - Sources - Digits ...

By Shira Ovide and Christopher S. Stewart

Google's home-entertainment experiments extend beyond the gadget the company announced Wednesday, which turns TV sets into an extra screen for watching Web videos and other content.

The Internet giant in January used the Consumer Electronics Show to privately show off a prototype of a previously unreported set-top box device, similar to existing digital-media hubs sold by companies such as Apple and Roku, said people briefed on the device.

These people said Andy Rubin, a Google executive at the time, led the demonstrations of the set-top box, which was powered by the company?s Android operating software and had as a core feature Google?s video-conference service, Hangouts. The device as demonstrated had a video camera and motion sensor, they said.

A Google spokeswoman declined to comment Thursday.

Google?s unreleased device is another indication that the living room has sparked a land grab by technology and media companies. Players such as Google Amazon.com, Apple and Intel are jockeying with established media companies for ways to meld traditional TV with elements of the Web.

The fight could shape how people watch movies, TV and surf the Web and the fortunes of consumer-electronics makers, the entertainment industry, pay-television companies such as Comcast and the advertising business.

So far, however, technology companies have been longer on vision than on products people have purchased in large numbers. Google has had some notable stumbles so far, including a largely unsuccessful effort launched in 2010 called Google TV and the Nexus Q, a media-streaming device that Google announced a year ago but put on hold.

The Google device Mr. Rubin showed was different than Chromecast, a Web-to-TV connector Google announced Wednesday. The device, about the size of a USB drive, plugs into TV sets and lets people pick YouTube videos or streaming Netflix movies from their phones and laptops and display the images on their TV sets.

The people briefed on Google?s plans said the set-top box Google showed off in January had a broader set of features. One of these people said the device allowed people to stream YouTube videos, watch TV shows or movies from the Google Play digital-programming store, and access Android apps such as videogames or, potentially, digital media services such as Netflix and Pandora.

One of these people said Google had planned to launch the set-top box at Google I/O, the company?s software-developer conference held in May.

It?s unclear whether the device shown in January was scrapped in favor of Chromecast, or if it might eventually move forward in some form.

Google and other technology companies continue to grab for footholds in home television, which still commands the biggest chunk of consumers? entertainment time. The Wall Street Journal earlier this month reported that Google has approached media companies to discuss a possible Internet-television service similar to cable TV.

Companies vying to play broader roles in Internet-based TV include Microsoft and Sony?in part through their videogame consoles?as well as Apple, Amazon.com and chip maker Intel.

Separately, the day after Chromecast went on sale, Google said it would stop a Netflix service discount that was a highly touted element of Wednesday?s launch. The company had offered three months of free Netflix service for people who bought Chromecast?lowering the effective price of the $35 device to roughly $11. On Thursday, Google said the promotion, which it said was available in limited quantities, is no longer available because of ?overwhelming demand? for the Chromecast device.

Source: http://blogs.wsj.com/digits/2013/07/25/google-has-showed-another-living-room-device-sources/

josh johnson kim kardashian flour matt forte jeremy shockey new orleans saints ireland vangogh

Estrogen's effects on fat depends on where it's located

[unable to retrieve full-text content]Why women tend to accumulate fat in the stereotypical ?pear? shape, with more fat in the buttocks and thighs (a shape that?s thought to be healthier than men?s stereotypical ?apple? shape, with more fat around the belly), is still unclear. A new study gathers clues to help understand the role of estrogen?s effects on fat.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/top_news/top_health/~3/WnA106ejEb0/130726131218.htm

texas lottery Dell Levis Fireman Ed Allegiant Air Melissa Rycroft Cyber Monday Deals 2012

Sri Lanka?s Thisara Perera scores 35 runs off one over against South Africa

New Delhi: Sri Lanka all-rounder Thisara Perera went on complete rampage in the third One-Day International against South Africa and hit five sixes and a four in a single over at Pallekele on Friday.

Perera lit up the gloomy evening for the hosts by smashing five sixes and a boundary in the 33rd over sent down by left-arm spinner Robin Peterson.

With the second ball declared a wide, the 35 runs taken in the over fell just one run short of the world record of six sixes hit by South African batsman Herschelle Gibbs off Dutch bowler Daan van Bunge during the 2007 World Cup.
?? ?
Perera's run sequence in the over was six, a wide, six, six, six, four and a six. Left-handed Perera made 65 off 49 balls with five sixes and as many boundaries, before he was caught in the deep off Farhaan Behardien, who finished with three for 19.

However, his sensational hitting came too late for the hosts to deliver an unlikely win. David Miller and Lonwabo Tsotsobe played key roles as South Africa stunned hosts Sri Lanka by 56 runs in the third one-dayer to stay afloat in the five-match series.

The victory ended South Africa's 11-match losing streak in one-day cricket on Sri Lankan soil and gave AB de Villiers' tourists a badly-needed win in the current series.
?? ?
With Sri Lanka 2-1 ahead, South Africa must also win the fourth match at the same venue on Sunday to take the series into the decider in Colombo next Wednesday.

(JPN/Agencies)

Latest News from Sports News Desk

Source: http://post.jagran.com/sri-lankas-thisara-perera-scores-35-runs-off-one-over-against-south-africa-1374909459

2013 NFL Mock Draft paleo diet paleo diet earth day Luis Suarez Earth Day 2013 westboro baptist church

Alabama reports NCAA secondary violations

Published: Thursday, July 25, 2013 at 8:07 p.m.
Last Modified: Thursday, July 25, 2013 at 8:07 p.m.

The report, which was posted Thursday on the UA's athletic compliance website, outlines 31 violations in 11 sports from July 1, 2012, to the end of June this year, with seven violations in football and eight in swimming and diving.

Pannunzio, who is identified only as a "staff member" in UA's violations listing, was also required to attend an NCAA rules seminar and prohibited from recruiting communications for 90 days for providing "impermissible benefits to a prospect and his family" and introducing the prospect to a booster while Pannunzio was at Miami.

According to a 2011 report by Yahoo, Pannunzio facilitated a meeting between recruit Matt Patchen and booster Nevin Shapiro at Shapiro's Miami Beach mansion. The report also cites phone records that show 422 text messages between Pannunzio and Shapiro between 2006 and 2010, when Pannunzio was tight ends coach and special teams coordinator for the Hurricanes.

Alabama did not independently investigate the Yahoo allegations against Pannunzio, The Tuscaloosa News has learned. The salary freeze, lack of contract extension, rules education and prohibition against recruiting contact were levied based on the allegations in the Yahoo report. Pannunzio, who has a $170,000 annual salary, was not named in the NCAA's official Notice of Allegations against Miami.

Yahoo also reported that Jeff Stoutland, Alabama's offensive line coach for the past two seasons, was present at the meeting between Patchen and Shaprio. Stoutland, Miami's offensive line coach from 2007-10, took a job with the Philadelphia Eagles of the National Football League after last season.

One violation involved a swimming team assistant coach posting bond for a swimmer who had been arrested. The coach was ultimately fired over the offense, The Tuscaloosa News has learned.

Other secondary football violations were:

* A player's name was involved in promoting his start-up business. The player was declared ineligible and reinstated.

* A coach exceeded the permissible number of phone calls within a week to a prospect. The coach received a letter of admonishment and was restricted from calling prospects for two weeks.

* A prospect was mailed a recruiting letter prior to the permissible date. UA restricted itself from sending recruiting material to the prospect for 60 days.

* The coaching staff exceeded the permissible number of off-campus contacts with a recruit. The coaches involved were held out of the spring evaluation period for a week and UA reduced its number of recruiting person days in the spring from 168 to 162.

* A first-year junior college player was allowed an unofficial visit. Alabama dropped recruiting activity with the prospect.

* Some football players received impermissible meals. They were declared ineligible and reinstated after donating the value of the meals to charity.

Alabama's track and rowing teams each had three secondary violations. Gymnastics, women's basketball and men's basketball each had two. Cross country, men's golf, volleyball and softball had one violation each. Eight of the violations involved text messages or Twitter, and several others were for sending emails to recruits at impermissible times.

For the full report, go to http://www.rolltide.com/compliance/pdf/VIOLATION-TRACKING-FORM-2012-13.pdf.

UNIVERSITY OF ALABAMA SECONDARY VIOLATIONS SUMMARY

(July 1, 2012, to June 30, 2013)

FOOTBALL

Rule ? 12.4.4

Violation ? Student-Athlete's name was involved in promoting his own newly started business.

Resolution ? Declared SA ineligible and had him reinstated. Provided rules education to SA and entire team.

Rule ? 13.01.2, 13.01.4, 13.1.2.1, 13.2.1, 13.2.1.1 (f), 13.7.2.1.2

Violation ? While at another institution, staff member provided impermissible benefits to a prospect and his family and introduced prospect to a booster while at another institution.

Resolution ? Salary frozen and contract not extended for one year, required to attend an NCAA regional rules seminar, prohibited from any permissible recruiting communications for 90 days.

Rule ? 13.1.3.1.2

Violation ? A football coach exceeded the permissible number of phone calls within a week to a prospective student-athlete.

Resolution ? No phone calls for involved coach for two weeks.

Letter of admonishment.

Rules education.

Rule ? 13.4.1

Violation ? A football prospective student-athlete received a recruiting letter prior to the permissible date.

Resolution ? Rules education.

No recruiting materials for 60 days following first permissible date for PSA involved.

Rule ? 13.1.5.2

Violation ? The football coaching staff exceeded the permissible number of off-campus contacts with a prospective student?athlete.

Resolution ? Rules education.

Letter of admonishment.

Restricted involved coaches from recruiting off campus for the first week of the Spring Evaluation Period.

Reduced recruiting person days in spring from 168 to 162.

Rule ? 13.1.1.2

Violation ? A prospective student-athlete enrolled in his first year at a two-year college was allowed to take an unofficial visit, making contact with football staff members.

Resolution ? Rules education.

Letter of admonishment to asst. coach.

One week ban from recruiting activity for asst. coach.

Cessation of all recruiting activity directed towards involved prospective student-athlete.

Rule ? 16.11.2

Violation ? Some student-athletes received impermissible meals.

Resolution ? Student-athletes declared ineligible and were reinstated after donating the value of the meal to a charity.

Rules Education for student-athletes.

SWIMMING AND DIVING

Rule ? 14.1.4

Violation ? A walk-on was allowed to practice with the team before signing the mandatory NCAA Drug-Testing Consent Form due to an administrative oversight.

Resolution ? Changes were made to our roster management policies to prevent this from occurring in the future.

Rules Education.

Rule ? 13.4.1.2

Violation ? A swimming assistant coach sent two text messages to a recruit while the recruit was on campus for an official visit regarding the logistics of the recruit's return flight home.

Resolution ? No phone calls for 14 days.

Letter of Admonishment.

Rules Education.

No member of the coaching staff may contact the particular recruit for a period of 30 days.

Rule ? 17.02.13

Violation ? The swimming and diving coaches took attendance at voluntary workouts on three separate occasions.

Resolution ? The swimming and diving teams were prohibited from conducting six hours of required practice time.

Letter of Reprimand.

Rules Education.

Rule ? 13.8.1

Violation ? A coach accompanied a prospect's club coach to lunch and our coach paid for the club coach's meal because the two had been friends for a number of years.

Resolution ? Letter of Admonishment to the coach involved.

Rules education.

The involved coach may not recruit off campus for 15 days.

The involved coach may not contact any prospect involved in the subject swim club for 30 days.

Rule ? 13.4.1.2

Violation ? A swimming assistant coach sent three text messages to a recruit while picking up the recruit at the airport for an official visit after the recruit's flight was delayed.

Resolution ? No phone calls for 14 days.

Letter of Admonishment.

Rules Education.

No member of the coaching staff may contact the particular recruit for a period of 30 days.

Rule ? 13.4.1.2

Violation ? A swimming assistant coach sent a congratulatory text message to a recruit who had signed an NLI with the University of Alabama.

Resolution ? No phone calls for 14 days.

Letter of admonishment.

Rules education.

Rule ? 13.1.3.1

Violation ? A swimming coach exceeded the permissible number of phone calls in a week to two prospective student-athletes.

Resolution ? No phone calls for the entire staff for 7 days.

No phone calls to PSA's involved for 14 days.

Letter of admonishment.

Rules education.

Rule ? 16.11.2.3

Violation ? Assistant coach posted bond for a student-athlete.

Resolution ? Letter of admonishment, benefit repaid by student-athlete, education to staff.

TRACK AND FIELD

Rule ? 13.4.1.2

Violation ? A track coach sent a text message to a prospective student-athlete.

Resolution ? Rules education.

Letter of admonishment.

No phone calls for the involved coach for 14 days.

Rule ? 13.02.5.4

Violation ? Track assistant coach met with a prospect during a quiet period. Coach mistakenly thought the quiet period started the next week after he had the contact.

Resolution ? Letter of admonishment issued to coach. Coach prohibited from recruiting off-campus for 60 days.

Rule ? 16.1.4

Violation ? A student-athlete sold an award that was received for participation in intercollegiate athletics for less than $100.

Resolution ? The student-athlete was declared ineligible and was reinstated.

The student-athlete donated the value of the award to a charity.

Rules Education for all student-athletes.

ROWING

Rule ? 13.1.3.1 & 13.4.1

Violation ? A member of the coaching staff misread a recruiting website and mistakenly believed a recruit was a year older than she actually was and based upon that misunderstanding, called and emailed her prior to the allowable date.

Resolution ? No phone calls for 14 days.

Letter of Admonishment.

Rules Education.

No member of the coaching staff may contact this particular recruit via phone or email for 60 days after the dates that those communications would normally become permissible.

Rule ? 13.1.3.1

Violation ? A women's rowing coach returned a phone call to a woman who left 2 prior messages merely identifying herself by her first name and repeatedly asking the coach to return the call. The woman turned out to be a 2014 prospect's mother who intentionally left vague messages for fear the coach would not return them if the coach knew the caller was the mother of a recruit who was not old enough for the coach to permissibly call.

Resolution ? Given the unique nature of the facts, the only penalty was Rules Education.

Rule ? 17.1.6.5

Violation ? The rowing team mistakenly engaged in six days of CARA during a week in their offseason when the rules only allow them to engage in five days of CARA. However, they did not go over the 8 hour maximum for the week, despite using an additional day.

Resolution ? Rules Education.

2-for-1 penalty?the team was prohibited from engaging in CARA for two days when it otherwise was permissible, since it participated in one extra day.

GYMNASTICS

Rule ? 13.4.1.2

Violation ? Two gymnastics coaches replied to text messages that they mistakenly believed were private messages sent by other gymnastics coaches but they were in fact group text messages that also included a prospect in the group.

Resolution ? Rules Education.

Rule ? 13.4.1.2

Violation ? A gymnastics coach sent a ?pocket text? message to a recruit while the recruit was on campus for an official visit.

Resolution ? Letter of admonishment.

Rules education.

WOMEN'S BASKETBALL

Rule ? 13.4.1.2

Violation ? A women's basketball coach mistakenly sent the contact information of a prospect to the prospect via text message, instead of sending the contact information to a fellow coach, which was her intention.

Resolution ? Rules Education.

Rule ? 13.12.1.7.4

Violation ? A skills camp was held on campus and the items provided to the participants (one night in the dorm room, meals, camp apparel) ended up collectively amounting to more value than the cost of the camp to each camper.

Resolution ? Each camper was declared ineligible and may not enroll at UA until she makes restitution for the value of the impermissible benefits she received.

Letter of Reprimand.

Entire staff prohibited from off-campus recruiting for a week.

MEN'S BASKETBALL

Rule ? 14.1.4.3

Violation ? A student-athlete who was trying out for the team did not complete the drug testing consent form within the 14 day grace period.

Resolution ? Reviewed internal procedures for roster management with coaching staff.

Rules Education.

Rule ? 13.10.2

Violation ? Several student-athletes who are personal friends with a recruit made public congratulatory Twitter comments about the recruit when the recruit verbally agreed to attend Alabama next year. However, the comments were made prior to the recruit actually signing the scholarship agreement with Alabama.

Resolution ? Rules Education for the student-athletes and coaching staff.

CROSS-COUNTRY

Rule ? 12.1.1.1.3 & 16.8.1.2

Violation ? Two cross-country student-athletes were mistakenly certified for NCAA amateurism purposes and allowed to compete based upon the fact that they had previously been certified for amateurism purposes in the sport of Track & Field. Upon notice of the error, the involved student-athletes requested their cross-country amateurism from the NCAA and were certified the following day with no additional problems.

Resolution ? Both student-athletes were withheld from one competition.

Rules Education was provided to the coaching staff, compliance staff, and athletics certification staff.

MEN'S GOLF

Rule ? 13.4.1.2

Violation ? A men's golf coach sent a text message to a recruit coming to campus for an unofficial visit.

Resolution ? Letter of Admonishment.

Rules Education.

No member of the coaching staff may contact the particular recruit for a period of 30 days.

VOLLEYBALL

Rule ? 13.4.1.2

Violation ? A volleyball coach sent an email to a prospective student-athlete prior to the permissible date. The coach meant to forward the email to another volleyball coach, but accidently hit the reply button instead.

Resolution ? Rules education.

SOFTBALL

Rule ? 16.11.2

Violation ? Some student-athletes received impermissible meals.

Resolution ? Student-athletes declared ineligible and were reinstated after donating the value of the meal to a charity.

Rules Education for student-athletes.

Source: http://www.tuscaloosanews.com/article/20130725/news/130729863

Joseline Hernandez red sox phil mickelson von miller nate robinson ryan braun BBC

Thursday, July 25, 2013

Key molecular pathways leading to Alzheimer's identified

[unable to retrieve full-text content]Key molecular pathways that lead to late-onset Alzheimer's disease have been identified by neuroscientists. The findings present a new approach to Alzheimer?s research and highlight several new potential drug targets.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/top_news/top_science/~3/CejopCNEoik/130724133035.htm

hopkins dear john derrick rose torn acl undrafted free agents braveheart roy orbison the third man

New genetic cause of pulmonary hypertension identified

New genetic cause of pulmonary hypertension identified [ Back to EurekAlert! ] Public release date: 24-Jul-2013
[ | E-mail | Share Share ]

Contact: Karin Eskenazi
ket2116@columbia.edu
212-342-0508
Columbia University Medical Center

Study finds druggable target for rare fatal lung disease

NEW YORK, NY (July 25, 2013) Columbia University Medical Center (CUMC) scientists have identified new genetic mutations that can cause pulmonary arterial hypertension (PAH), a rare fatal disease characterized by high blood pressure in the lungs. The mutations, found in the gene KCNK3, appear to affect potassium channels in the pulmonary artery, a mechanism not previously linked to the condition. Cell culture studies showed that the mutations' effects could be reversed with a drug compound known as a phospholipase inhibitor. The study was published today in the online edition of the New England Journal of Medicine.

"The most exciting thing about our study is not that we've identified a new gene involved in pulmonary hypertension, but that we've found a drug that can 'rescue' some mutations," said co-senior author Wendy K. Chung, MD, PhD, associate professor of pediatrics and medicine at CUMC. "In genetics, it's common to identify a gene that is the source of a disease. However, it's relatively rare to find potential treatments for genetic diseases."

PAH is a progressive disorder characterized by abnormally high blood pressure in the pulmonary artery, which reduces blood flow from the right side of the heart to the lungs. The heart can compensate by pumping harder, but over time this can weaken the heart muscle and lead to right-sided heart failure. Common symptoms of PAH include shortness of breath, dizziness, and fainting. About 1,000 new cases are diagnosed in the United States each year. The disorder is twice as common in females as in males. There is no cure for PAH and few effective treatments. Most patients with PAH die within 57 years of diagnosis.

Some cases of PAH are caused by inherited genetic defects. Most of these "familial" cases have been linked to mutations in a gene called BMPR2 (bone morphogenetic protein receptor, type II), which was identified simultaneously in 2000 by two independent research teams, one led by the late Robin Barst and Jane Morse, CUMC researchers. However, the majority of cases are idiopathic in origin (of unknown cause). Other forms of PAH can be triggered by autoimmune diseases, congenital heart defects, infections (such as schistosomiasis), and medications (such as the now-banned diet-drug combination commonly known as fen-Phen).

Dr. Chung and her colleagues discovered the new mutations by sequencing the exomes (the portion of the genome that codes information to make proteins) of families with PAH without identified mutations. KCNK3 mutations were found in 3.2 percent of those with familial disease and in 1.3 percent of those with idiopathic PAH.

The team found that the mutations alter the function of potassium channels by reducing the activity of these channels. Potassium channels help maintain the vascular tone of the pulmonary artery and help it respond to low levels of oxygen.

"We were surprised to learn that KCNK3 appears to play a role in the function of potassium channels in the pulmonary artery," said Dr. Chung. "No one had suspected that this mechanism might be associated with PAH." The other gene linked to the disorder, BMPR2, is thought to cause PAH by ultimately promoting growth and multiplication of smooth muscle cells in the pulmonary artery, thereby restricting blood flow.

Dr. Chung also found, working in collaboration with co-senior author, Robert S. Kass, PhD, the Alumni and David Hosack Professor of Pharmacology, chair of the department, and vice dean for research at CUMC, that the effects of the KCNK3 mutations could be reversed with an experimental phospholipase inhibitor called ONO-RS-082. The findings were made in cell cultures. Further study is needed to determine whether treatment with this or other drugs that affect potassium channels might be useful in the treatment of people with PAH, said Dr. Chung.

"KCNK3 mutations are a rare cause of PAH, so I don't want to oversell our findings," said Dr. Chung. "Still, it's exciting that we've found a mechanism that can lead to the disease that is a new, druggable target. It's also possible that targeting KCNK3 may be beneficial for patients who have PAH independent of their KCNK3 genetic status."

###

The paper is titled, "A Novel Channelopathy in Pulmonary Arterial Hypertension." The other contributors are: Lijiang Ma, Danilo Roman-Campos, Eric D, Mlanie Eyries, Kevin Sampson, Florent Soubrier, Marine Germain, David-Alexandre Trgout, Alain Borczuk, Erika Berman Rosenzweig, Barbara Girerd, David Montani, Marc Humbert, and James E. Loyd.

The authors declare no financial or other conflicts of interests.

The study was supported by grants from the National Institutes of Health (R01 HL060056, P01 HL072058, K23 HL098743, and R01 HL56810) and by a Vanderbilt Clinical and Translational Science Awards (UL1 RR024975) from the National Center for Research Resources.

Columbia University Medical Center provides international leadership in basic, preclinical, and clinical research; medical and health sciences education; and patient care. The medical center trains future leaders and includes the dedicated work of many physicians, scientists, public health professionals, dentists, and nurses at the College of Physicians and Surgeons, the Mailman School of Public Health, the College of Dental Medicine, the School of Nursing, the biomedical departments of the Graduate School of Arts and Sciences, and allied research centers and institutions. Columbia University Medical Center is home to the largest medical research enterprise in New York City and State and one of the largest faculty medical practices in the Northeast. For more information, visit cumc.columbia.edu or columbiadoctors.org.


[ Back to EurekAlert! ] [ | E-mail | Share Share ]

?


AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.


New genetic cause of pulmonary hypertension identified [ Back to EurekAlert! ] Public release date: 24-Jul-2013
[ | E-mail | Share Share ]

Contact: Karin Eskenazi
ket2116@columbia.edu
212-342-0508
Columbia University Medical Center

Study finds druggable target for rare fatal lung disease

NEW YORK, NY (July 25, 2013) Columbia University Medical Center (CUMC) scientists have identified new genetic mutations that can cause pulmonary arterial hypertension (PAH), a rare fatal disease characterized by high blood pressure in the lungs. The mutations, found in the gene KCNK3, appear to affect potassium channels in the pulmonary artery, a mechanism not previously linked to the condition. Cell culture studies showed that the mutations' effects could be reversed with a drug compound known as a phospholipase inhibitor. The study was published today in the online edition of the New England Journal of Medicine.

"The most exciting thing about our study is not that we've identified a new gene involved in pulmonary hypertension, but that we've found a drug that can 'rescue' some mutations," said co-senior author Wendy K. Chung, MD, PhD, associate professor of pediatrics and medicine at CUMC. "In genetics, it's common to identify a gene that is the source of a disease. However, it's relatively rare to find potential treatments for genetic diseases."

PAH is a progressive disorder characterized by abnormally high blood pressure in the pulmonary artery, which reduces blood flow from the right side of the heart to the lungs. The heart can compensate by pumping harder, but over time this can weaken the heart muscle and lead to right-sided heart failure. Common symptoms of PAH include shortness of breath, dizziness, and fainting. About 1,000 new cases are diagnosed in the United States each year. The disorder is twice as common in females as in males. There is no cure for PAH and few effective treatments. Most patients with PAH die within 57 years of diagnosis.

Some cases of PAH are caused by inherited genetic defects. Most of these "familial" cases have been linked to mutations in a gene called BMPR2 (bone morphogenetic protein receptor, type II), which was identified simultaneously in 2000 by two independent research teams, one led by the late Robin Barst and Jane Morse, CUMC researchers. However, the majority of cases are idiopathic in origin (of unknown cause). Other forms of PAH can be triggered by autoimmune diseases, congenital heart defects, infections (such as schistosomiasis), and medications (such as the now-banned diet-drug combination commonly known as fen-Phen).

Dr. Chung and her colleagues discovered the new mutations by sequencing the exomes (the portion of the genome that codes information to make proteins) of families with PAH without identified mutations. KCNK3 mutations were found in 3.2 percent of those with familial disease and in 1.3 percent of those with idiopathic PAH.

The team found that the mutations alter the function of potassium channels by reducing the activity of these channels. Potassium channels help maintain the vascular tone of the pulmonary artery and help it respond to low levels of oxygen.

"We were surprised to learn that KCNK3 appears to play a role in the function of potassium channels in the pulmonary artery," said Dr. Chung. "No one had suspected that this mechanism might be associated with PAH." The other gene linked to the disorder, BMPR2, is thought to cause PAH by ultimately promoting growth and multiplication of smooth muscle cells in the pulmonary artery, thereby restricting blood flow.

Dr. Chung also found, working in collaboration with co-senior author, Robert S. Kass, PhD, the Alumni and David Hosack Professor of Pharmacology, chair of the department, and vice dean for research at CUMC, that the effects of the KCNK3 mutations could be reversed with an experimental phospholipase inhibitor called ONO-RS-082. The findings were made in cell cultures. Further study is needed to determine whether treatment with this or other drugs that affect potassium channels might be useful in the treatment of people with PAH, said Dr. Chung.

"KCNK3 mutations are a rare cause of PAH, so I don't want to oversell our findings," said Dr. Chung. "Still, it's exciting that we've found a mechanism that can lead to the disease that is a new, druggable target. It's also possible that targeting KCNK3 may be beneficial for patients who have PAH independent of their KCNK3 genetic status."

###

The paper is titled, "A Novel Channelopathy in Pulmonary Arterial Hypertension." The other contributors are: Lijiang Ma, Danilo Roman-Campos, Eric D, Mlanie Eyries, Kevin Sampson, Florent Soubrier, Marine Germain, David-Alexandre Trgout, Alain Borczuk, Erika Berman Rosenzweig, Barbara Girerd, David Montani, Marc Humbert, and James E. Loyd.

The authors declare no financial or other conflicts of interests.

The study was supported by grants from the National Institutes of Health (R01 HL060056, P01 HL072058, K23 HL098743, and R01 HL56810) and by a Vanderbilt Clinical and Translational Science Awards (UL1 RR024975) from the National Center for Research Resources.

Columbia University Medical Center provides international leadership in basic, preclinical, and clinical research; medical and health sciences education; and patient care. The medical center trains future leaders and includes the dedicated work of many physicians, scientists, public health professionals, dentists, and nurses at the College of Physicians and Surgeons, the Mailman School of Public Health, the College of Dental Medicine, the School of Nursing, the biomedical departments of the Graduate School of Arts and Sciences, and allied research centers and institutions. Columbia University Medical Center is home to the largest medical research enterprise in New York City and State and one of the largest faculty medical practices in the Northeast. For more information, visit cumc.columbia.edu or columbiadoctors.org.


[ Back to EurekAlert! ] [ | E-mail | Share Share ]

?


AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.


Source: http://www.eurekalert.org/pub_releases/2013-07/cumc-ngc072413.php

Boston Marathon Explosion Boston Marathon bombing new york times irs Friends Reunion Elena Delle Donne usa today

Pink Heals tour brings cancer awareness to Oshkosh

OSHKOSH, Wis. (WFRV) - A group of pink police cars and fire trucks stopped in the City of Oshkosh to help in the fight against cancer.

???

It was all part of a national cancer awareness program called Pink Heals.

???

Today, the caravan traveled to stops throughout the city? where people could share their stories and sign the trucks.

?

It's part of a larger group of pink emergency vehicles that travel the country spreading awareness and raising funds for cancer treatment programs.

"I think a lot of times, the healthcare system is broke, and focus is too much in service to one's self, instead of everyone you're supposed to be inspiring to help," tour founder Dave Graybill says. "We're creating immediate care by raising money without raising taxes and 100% of it directed to the people in need."

?

T-shirts commemorating the stop are on sale at all Oshkosh Hardees locations.

?

The money raised will go to Aurora Medical Center and Mercy Medical Center.

Source: http://wearegreenbay.com/fulltext?nxd_id=211612

jamarcus russell Beyonce Lip Sync citizens bank Hansel and Gretel LGBT Giovanna Plowman martin luther king jr quotes

Capital Gains Tax | Kiwiblog

July 25th, 2013 at 2:00 pm by David Farrar

The Herald reports:

A capital gains tax on property makes little sense unless it also applies to the family home, says Finance Minister Bill English.

Speaking at today?s Mood of the Boardroom event in Auckland, English told the country?s top business leaders the government was maintaining its ?clear position? on the capital gains tax debate.

?We?re not supporting the extension of the current capital gains tax,? he said.

?The overseas experts who tell us we need it all say that it should be comprehensive on all capital gains. And if you don?t do the whole thing then it probably doesn?t make much difference.?

I broadly agree with this. My position on Capital Gains Tax is this:

  1. We should have a comprehensive capital gains tax (many capital gains are already taxed, but not ?incidental? ones)
  2. There should be no exemptions, including the family home. To do so will just encourage tax avoidence by giving each family member a home etc.
  3. Other tax rates (income and company rates) must drop by at least as much as the extra revenue a CGT would generate for the Government.

You need to do all three together, to get a broad based low rate tax regime ? which is what is best for economic growth. What you shouldn?t do is bring in an exemption riddled CGT and use it as a way to screw taxpayers over for more money to fund extra spending ? which appears to be Labour?s policy.

Tags: Bill English, capital gains tax

Source: http://www.kiwiblog.co.nz/2013/07/capital_gains_tax-2.html

nbc news msnbc reddit abc news Boston Police Scanner Jeff Bauman cbs news

Cal Thomas Column: The President's Take on Race

President Obama rarely misses an opportunity to insert himself into an issue. Last Friday, he appeared in the White House pressroom to comment on the George Zimmerman verdict. The president said he could have been Trayvon Martin. Not likely, given his private schooling and the way he was fast-tracked to success.

The president said the history of African-Americans partially explains the way many black people view the case. He spoke of blacks hearing car doors lock as they cross the street and of white women who clutch their purses tightly when a black person enters an elevator.

Story Continues Below Ad ?

Then he touched on the real problem: "Now, this isn't to say that the African-American community is naive about the fact that African-American young men are disproportionately involved in the criminal justice system, that they are disproportionately both victims and perpetrators of violence. It's not to make excuses for that fact, although black folks do interpret the reasons for that in a historical context. We understand that some of the violence that takes place in poor black neighborhoods around the country is born out of a very violent past in this country, and that the poverty and dysfunction that we see in those communities can be traced to a very difficult history."

OK, but what about poor people in the same neighborhoods who don't engage in violent behavior? What values are they being taught? Don't they have the same history, but make different choices?

It is not news that much poverty in the African-American community stems from broken or never-started families; or that too many black men leave black women to raise children on their own; or that the way "gangsta culture" is portrayed in the media does not produce an image that is endearing to white employers; or that public schools in minority neighborhoods are failing to build the foundations necessary for a successful life; or that the abortion rate among black women is four times higher than non-Hispanic whites among 15-19 year-olds, according to the Guttmacher Institute. Abortion, which the president has done nothing to curtail, also devalues African-American lives.

The politics of race plays a role. When black people kill each other, or murder a white person, the president usually feels no need to comment (the recent murder of 15-year-old Hadiya Pendleton being a rare exception); Al Sharpton doesn't march, Jesse Jackson doesn't call for boycotts, or label Florida an "apartheid state," as he did following the Zimmerman verdict. Are black lives only worth mentioning when they are extinguished by non-blacks?

There are black people who are disgusted by the behavior, clothing, attitude and language of some young black men. On the Washington Post's website last week, beneath a transcript of the president's remarks last Friday, a reader posting under the name "Chaquita1" offered a personal story about recently being on a train and watching an African-American woman give the evil eye to a pair of young African-American males in "gangsta wear" making a commotion. They became belligerent, talking about "the fat lady glaring at them."

The woman arose, Chaquita1 wrote, "and said 'Trayvon Martin died for nothing. His death did not empower you, it should have been a wake-up call.' She then returned to her seat, looked straight at me and said, 'You have white trash. We have black trash.'"

Discussions like this should be included in any "conversation about race" the president says he wants, along with how such attitudes and behavior contribute to racial conflict.

(Readers may e-mail Cal Thomas at tmseditors@tribune.com.)

Source: http://newsbusters.org/blogs/cal-thomas/2013/07/23/cal-thomas-column-presidents-take-race

henrik stenson jobs act greg mortenson jim marshall died 2013 toyota avalon the secret life of bees full moon

Means and Methods of Web Tracking - InfoSec Institute Resources

?1. Introduction

Below, we will discuss the reasons that incited people, businesses and governmental agencies to employ web tracking, detailed and basic methods of avoiding web tracking, and various types of cookies and their effects on privacy, and we will also examine a brief court case that concerned a particular type of cookie. Then we have included some final notes and a conclusion inferring some deductions from the context of the discussion.

2. Reasons for web tracking

Before we elucidate the means and methods of web tracking there is a simple question that ought to be answered: Why would someone want to track my web activity in the first place?

Basically, there are four reasons why websites employ web tracking or website visitor tracking.

  • Firstly, they use web tracking for advertising purposes. One option is to send the collected data to a data aggregator. A data aggregator (e.g., ChoicePoint) is a company that is responsible for extracting and bringing together bits of data dispersed in huge databases comprising information about individuals. The data, after being extracted and compiled by the data aggregator, is sold to other third parties. The data aggregator creates aggregate reports on the basis of the collected information and sells it to local, state or federal authorities or businesses. Businesses are particularly interested in such information, because such personal information substantially boosts their marketing capabilities.

Nonetheless, sending chunks of data to data aggregators is far from the only reason why websites track your activity.

Below are several tables that reveal why web tracking is utilized:

Purpose of tracking Info of interest Tracking enables Benefits of tracking
AdvertisementNB: PII* is considered as information which is not typically utilized by online advertisers for the various advertising schemes (according to the Network Advertising Initiative, amongst other sources) but it can still be used. Profile information such as age and sex (information given in registration forms, etc.). Location, purchases made online (products and services), use of social buttons to indicate what your preferences are which could expose your social media profile and in this way ?businesses may collect personally identifiable information about you (social buttons are also known as a type of web bugs), information tied to profiles in social media, sites visited in the past, browsing activity, referral link, IP address, browser and device?s info (OS, display settings, device type, connection speed, etc.), sometimes income and other interests. Personalized advertisements / targeted advertising,? contextual advertising (ads connected with the content of the page you are browsing),? behavioral advertising? (categorizes ad content on the basis of the collected client or user profile which may include age, sex, location, revenue, hobbies, activities and interests, etc. and semantic advertising (whereas in contextual advertising the content of the pages is scanned for keywords, in semantic advertising the particular context of the content is examined) Advertisers:1. Better efficiency of campaign development. 2. Boosts the effectiveness of resources delegated for advertising.3. The money spent for advertising will be used to the best advantage. 4. Improved return on the investments made (it follows from the previous three reasons)

Consumers:

1. More efficient provision of desired goods and services

2. Delivery of messages that are connected with consumers interests.

PII* = Personally Identifiable Information (such as first, last or full name, email or physical addresses, cell or landline phone numbers, birth date, government-issued identifiers, and financial account numbers).

Purpose of tracking Info of interest Tracking allows agencies to: Benefits of tracking
Law enforcement and intelligenceNB: the collection of PII is the goal of such forms of web tracking. Emails, web traffic, instant messaging, ISP and IP address, location, full name, etc. 1. Collect evidence, 2. Solve crimes, 3. Initiate investigations, 4. Find breaches of laws, 5. Identify, locate, and findsuspects 1. Prevention, investigation, and combating of Internet-related crimes such as identity theft and credit/debit card frauds.2. Increase the number of law-abiding citizens as awareness of the risk of surveillance leads to self-containment and law-abidance.3. Punishing and rehabilitating citizens who are in violation of the established laws and rules.

4. Protecting the community from criminals.

Purpose of tracking Info of interest Tracking allows web-owners to: Benefits of tracking
Web analytics The number of visitors over a period of time, manners in which individuals entered the website, traffic that advertisements bring to the website, approximate geographical location of the visitors,company identification (see competitors that entered the website) and technical details. Evaluate the overall performance of the website. Maximize overall revenue by gathering information such as which pages produce high profits, which banner ads produce high traffic, in which pages the customers decided to close the website, etc,. and making use of that information.
Purpose of tracking Info of interest Tracking allows web-owners to: Benefits of tracking
Usability testsClickstream analysis Comprehensive records of customers? mouse and keyboard input and sometimes even analyzing eye movements.Clickstream analysis tackles the collection and assessment of such information. ?Locate usability problems and fix them. It brings the possibility to see where exactly customers have trouble with the functionality of a website and even to categorize the computer skills of a customer and adapt the page to his skills, amongst other benefits.

3. Means and methods of web tracking.

The typical means of web tracking is to use cookies. These are necessary for session management, identification and authentication of visitors, as well as for various personalizations.

3.1. Basic information

Cookies cannot consist of more than 255 characters and be more than 4K of disk space. For the successful functioning of the cookie it is only necessary for the cookie to have a name and a value. However, there may be more parameters embedded in the cookie?s structure?its expiration time, the requirement of a secure connection in order for the cookie to function, the domain name that created the cookie and that can read it, and the path that the particular cookie is valid for. Thus, cookies are composed of six parameters, while only two of them are mandatory for the successful functioning of the cookie. Cookies are text-only strings that become embedded in the memory of the browser. They can become a file if the lifetime of the cookie is set to be longer than the time you spent surfing the website, your browser then resends these cookies to the website they are meant for every time you revisit the particular website.

Want to learn more?? The InfoSec Institute Ethical Hacking course goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to black hat hackers. Some features of this course include:
  • Dual Certification - CEH and CPT
  • 5 days of Intensive Hands-On Labs
  • Expert Instruction
  • CTF exercises in the evening
  • Most up-to-date proprietary courseware available

3.2. The various types of cookies and their effect on privacy

3.2.1 Zombie cookies

Zombie cookies (supercookies or Flash cookies) are HTTP cookies that recreate themselves after being deleted via backups located outside the standard cookie storage of the user?s web browser. Such cookies can be stored both online and on the user?s machine and are designed to resist deletion attempts. They have serious privacy implications. Firstly, they function outside the safeguards that the browser maintains.? Any web browser allows ordinary cookies only to be written, read, and deleted by the website that created them, whereas such flash cookies can track the client?s behavior and activity on multiple websites; in this way cookies do not limit themselves only to site parameters but go beyond them.

They never expire and a portion of them take the name and the file path of crucial files. They are browser-independent, meaning that they can track activity in all browsers that you use, they allow information to be shared between domains and they reinstate themselves after being deleted from the browser?s dedicated cookie storage, which makes them comparable to Trojans.? Finally, they can use 25 times the disk space of ordinary cookies. Thus, a zombie cookie can store a maximum of 100kb while an ordinary cookie can have a maximum size of 4kb. A way to get rid of zombie cookies is by installing the add-on BetterPrivacy.

They have serious privacy implications, as their chief goal is to store personal data of users for different online marketing purposes. Furthermore, in 2010 websites that used Quantcast technology and Quantcast, which provided these zombie cookies, were sued on the grounds of violation of federal computer intrusion laws while the practice was claimed to breach also state and federal fair trade laws and eavesdropping and hacking laws. Quantcast themselves said that the zombie cookies were an unintended consequence of attempting to measure web traffic precisely. The details from the lawsuit describe the practice as a ?pattern of covert online surveillance? and sought status as a class-action lawsuit. The plaintiffs sought unspecified damages and a court order forcing the companies to cease the practice in the future, remove the collected information and establish a transparent method of opting out. Quantcast settled and agreed to pay $2.4 million to settle the class-action lawsuit.

The case can be found here: http://www.wired.com/images_blogs/threatlevel/2010/07/CV10-5484-GW-JCGx-Complaint-Summons-Civil-Case-Cover-Sheet1.pdf.

Zombie cookies are actually Adobe Flash local shared objects (LSOs). Adobe Flash is a famous browser plug-in chiefly utilized for displaying web content that is animated or interactive. The flash plug-in enables servers to store LSOs (Flash cookies) which are like HTTP cookies but are managed by the Flash plug-in instead of a web browser. LSOs were created to circumvent restrictions of the traditional cookies, such as file size (traditional cookies have a limit of 4KB while LSOs 100KB).? Since LSOs are not browser-specific but are common to all applications on the machine using the Flash plug-in, users can be identified regardless of the browser they open. Moreover, Adobe Flash allows developers to evade the same-origin policy that stipulates that sites cannot access data (cookies) stored by other domains. Hence, zombie cookies can take advantage of all these benefits conferred by LSOs and use them to track unsuspecting visitors. Lastly, Adobe Flash is found to be installed on around 98% of PCs, which makes possible for almost everyone to be a possible victim.

These Flash cookies are typically stored in local shared objects of Adobe Flash but can be stored in many places, such as Silverlight isolated storage, web storage, web history, the window.name DOM property, the HTTP cookies storage, etc.

3.2.2 Third-party cookies

Third-party cookies are not created for the domain that the customer is browsing, but for external domains from which the host website fetched supplementary information such as images. These cookies are sent to the third-party server regardless of the page that the visitor is browsing, as long as it has content from the third party.

Want to learn more?? The InfoSec Institute Ethical Hacking course goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to black hat hackers. Some features of this course include:
  • Dual Certification - CEH and CPT
  • 5 days of Intensive Hands-On Labs
  • Expert Instruction
  • CTF exercises in the evening
  • Most up-to-date proprietary courseware available

Third-party cookies are also undesirable. Tracking networks that want to track people can insert???????? undetectable dummy images, a type of web bug. Every time you enter a website that has web bugs there is a request made to the domain hosting the web bug. This has the following effects on privacy:

  1. The third-party?s tracking service is aware of the entry into the website with the particular web bug of your IP address.
  2. The third-party may establish a cookie containing a unique ID on the user?s computer (or a tracking cookie). Afterwards, this tracking cookie would be sent back to the third party each time you open a page that contain one of its web bugs.

Thus, an advertising company can have web bugs embedded in multiple sites. Therefore, it can track your activity throughout your surfing session because of its cookie network.

To summarize some main points:

  1. Each time someone enters a website, some of its content may originate from other websites, such as scripts, images, and videos.
  2. Parts of this content (undetectable dummy images) may originate from advertising networks.
  3. These ad networks can track which pages you are visiting and are aware when you have visited more than one website located within their network.
  4. After step 3, these ad networks or other entities, such as data aggregators, can sell or share the information with other interested parties.

Nonetheless, almost all browsers? configurations can be modified to reject all cookies coming from a third party. Therefore, websites use the following technique: they redirect visitors to a page that belongs to the tracking company and the tracking company, accordingly, establishes a first-party cookie that can be afterwards read by web bugs present in other websites.

3.2.3 Other cookies

Persistent cookies (tracking cookies) outlive the browsing session of a user. They can record valuable information, such as how the user found the website in the first place. They can reside in the browser?s dedicated cookie storage for years, depending on their max-age proviso, or they may be permanent unless deleted by the user. They also provide functionality to the user?s experience and are not necessarily negative for the user?s privacy. Persistent cookies are ?in charge? of authentication, language, and theme preferences, in-site bookmarks and favorites, among other utilities.

Other cookies, such as session cookies, are important for the proper operation of websites and provide functionality to the website being viewed. They expire at the end of each session and are not designed to stay longer or permanently on your machine, therefore, they do not have negative privacy effects. Session cookies are used, for example, when ordering products. Session cookies can store the relevant ordering information necessary for shopping carts to function; without session cookies, the users would have to memorize all the objects that they have placed in the shopping cart. Also, session cookies are used to store data about the customer?s page activities so the customer can easily continue browsing from the last viewed page. There are many other benefits that session cookies entail.

Users may be identified via their IP addresses, but this is rather uncertain in today?s Internet for numerous reasons, so cookies offer the best method to identify each visitor.

There are other cookies as well such as secure cookies and HttpOnly cookies. but these are not central to this particular discussion.? There are also different varieties of supercookies (from the one we discussed above)

4. Ways to avoid being tracked.

Detailed methods of avoiding web tracking:

  1. Delete all HTTP cookies at the end of each browsing session.
  2. Stop/block third party cookies.
  3. Permit only session cookies.
  4. Delete every single Flash LSO at the end of each browsing session.
  5. Utilize a proxy server to mask your IP address as an anonymization service.
  6. Do not maintain a browser history.
  7. If you do not trust the particular website?s privacy policies do not use its social buttons.
  8. Use the ?Do Not Track? feature. It is available for Internet Explorer, Safari and Firefox
    (http://donottrack.us). It enables you to opt-out of tracking by sites that you are not visiting such as analytics service providers and ad networks. ?Do Not Track provides users with a single, simple, persistent choice to opt out of third-party web tracking?.
  9. Use the ?HTTPS Everywhere? extension. It is currently available for Firefox and there is a beta version for Chrome (https://www.eff.org/https-everywhere). It encrypts your communication with many of the important websites as some of them provide only limited HTTPS, only some pages being secure or the communication channel defaults to unsecure HTTP at some point, ?HTTPS Everywhere? is an attempt to remedy this, as its title suggests.
  10. If you want websites not to know how you end up on their site, what you typed in the search engine to get there, or which website?s link you followed, install the add-on ?Referrer Control? http://goo.gl/G8vkC for Chrome and http://goo.gl/gdx8X for Firefox).
  11. You can block ads, whether in the form of banners, pop-ups or video, even if they are located in such websites like Facebook and Youtube with Adblock Plus (https://adblockplus.org/en/chrome). It is currently available for Chrome, Firefox, Opera, and Android.
  12. PeerBlock enables you to control the entities with which your computer is ?talking? on the Internet. ?You can effectively stop and block any communications with ad-oriented or spyware-oriented servers, among other functionalities.
  13. Use a VPN to hide your IP address as an anonymization service
  14. Install the extension ?Window Name Eraser? to stop user-tracking methods such as evercookies from transferring information via the window.name property (http://goo.gl/gkEW6)? .
  15. You can also install Web of Trust (WOT), which will provide you with a warning if you encounter a potentially harmful website and leave you with the choice to enter the website or not? and it will provide rating of website characteristics such as privacy and trustworthiness.
  16. You can get Priveazy, which will send you ?notifications of problematic privacy and security settings as you browse?? (https://www.priveazy.com/)
  17. You can use the BetterPrivacy add-on to delete zombie cookies (https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/ ? Firefox).
  18. You can use Tor and Privoxy, preferably in pair.

Basic methods of avoiding tracking:

  1. Ensure that the website is safe before sharing any information there or filling out any registration forms (by checking the website?s privacy policy and commentaries about the website).
  2. Ensure that your online accounts in the different websites are configured for providing optimal privacy levels.
  3. Use an email provider that has a reliable dedication to the protection of the privacy of its customers.
  4. Enhance the privacy of your browser through various add-ons and extensions.

5. Conclusion

From the discussion above it can be concluded that cookies are a necessary part of the web browsing, although there are certain types of cookies that show the increasing interference of ad networks and businesses in the private life of individuals. It can be deduced that while cookies are positive in nature they also have certain negative. The reasons for web tracking are enumerated, shedding some light on the necessity of web tracking where it is justified and where it is for the proper, smooth functioning and development of the Web and its constituent websites and businesses, having their interests in mind. Furthermore, it can be concluded that the protection of privacy is a cumbersome process, a conclusion that can easily be deduced even from the short discussion on ways of protecting oneself from web tracking endeavors.

6. Final notes

There are many other manners of web tracking and client identification, such as browser fingerprinting, JavaScript trackers (also known as beacons or web bugs), deep packet inspection, http referrer (actually mentioned in this article), identification by IP address (uncertain in today?s Internet), hidden form fields, URL query strings, HTTP authentication, and using the window.name DOM property. However, for the sake of this article we have constrained ourselves to reasonable bounds.

7. References:

  1. Adobe, ?Advertising services.? Available at: http://www.adobe.com/privacy/advertising-services.html
  2. VB, ?How advertisers track you and what information they collect (infographic).? Available at: http://venturebeat.com/2013/03/04/online-tracking/
  3. Ask MetaFilter, ?What information can website owner track about visitors.? Available at: http://ask.metafilter.com/153927/What-information-can-website-owner-track-about-visitors
  4. Byron Acohido, ?Web tracking has become a privacy time bomb.? Available at: http://usatoday30.usatoday.com/tech/news/2011-08-03-internet-tracking-mobile-privacy_n.htm
  5. Abine, ?How you can be tracked online.? Available at: http://www.abine.com/tracking.php
  6. Niklas Schmucker, ?Web Tracking.? Available at: http://www.snet.tu-berlin.de/fileadmin/fg220/courses/SS11/snet-project/web-tracking_schmuecker.pdf
  7. Wikipedia, ?Like button.? Available at: https://en.wikipedia.org/wiki/Like_button
  8. Ereachconsulting, ?Benefits of Targeted Advertisements: A Spotify Fail.? Available at: http://www.ereachconsulting.com/benefits-of-targeting-advertisements/
  9. Ask Leo, ?What is contextual advertising, and how does it affect my privacy.? Available at: http://ask-leo.com/what_is_contextual_advertising_and_how_does_it_affect_my_privacy.html
  10. Wikipedia, ?Computer surveillance.? Available at: http://en.wikipedia.org/wiki/Computer_surveillance
  11. Savindra, ?Web Tracking Techniques.? Available at: http://superoxideblog.wordpress.com/2013/03/19/web-tracking-methods/
  12. NAI, ?Personally Identifiable Information (PII).? Available at: http://www.networkadvertising.org/glossary/term/personally-identifiable-information-pii
  13. Chiron, ?How to Protect Your Online Privacy.? Available at: http://www.techsupportalert.com/content/how-protect-your-online-privacy.htm
  14. Wikipedia, ?HTTP cookie.? Available at: http://en.wikipedia.org/wiki/HTTP_cookie
  15. Wikipedia, ?Zombie cookie.? Available at: http://en.wikipedia.org/wiki/Zombie_cookie
  16. Christian Olsen, ?Supercookies: What You Need to Know About the Web?s Latest Tracking Device.? Available at: http://mashable.com/2011/09/02/supercookies-internet-privacy/
  17. Cory Janssen, ?Zombie cookie.? Available at: http://www.techopedia.com/definition/25736/zombie-cookie
  18. COOKIE CONTROLLER, ?Flash cookies.? Available at: http://cookiecontroller.com/internet-cookies/flash-cookies/
  19. AllAboutCookies, ?What are persistent cookies used for.? Available at: http://www.allaboutcookies.org/cookies/persistent-cookies-used-for.html

Source: http://resources.infosecinstitute.com/means-and-methods-of-web-tracking-its-effects-on-privacy-and-ways-to-avoid-getting-tracked/

SB5 michael jackson NBA Draft 2013 Jrue Holiday Jillian Bynes jodie sweetin OUYA