Sunday, April 27, 2008

(IT) Warehouse Vendor Manager


Location: Dandenong   

Global market Leader in it's field $ Excellent salary package Technically challenging environment My client, a GLOBAL brand is currently seeking a highly proficient Warehouse Vendor Manager to ensure the effective development and operation of a specific area of the organisation. You will take responsibility for profitability, in accordance with the organisation's policies and procedures. Responsibilities include -Ensuring that all reporting and KPI's are met -Acting as day to day interface/liaison between the organisation's providers and suppliers -Investigate stock discrepancies, delivery issues etc. -Working with warehouse management to improve warehouse processes Key skills and experience required: Solid warehousing and stock control experience with demonstrated experience in stock control and investigation Experience in a manufacturing/logistics environment Strong SAP, stock control and investigation experience Problem solving and investigative skills in stock discrepancies and delivery issues. Demonstrated ability to work with low level of direct supervision Demonstrated ability to develop, implement and monitor a plan of action Take the lead, APPLY ONLINE NOW!
    Type:PermanentLocation:DandenongCountry:AustraliaContact:Raj SharmaAdvertiser:Peoplebank incorporating Ambit Recruitment (Sydney)Start Date:ASAPReference:JS/ITITT//78866B/RSHA/KK

(IT) Analyst Programmer


Location: CBD, Australia   

Our client a leader in the finance industry has a urgent requirement for a experienced Analyst Programmer to join their team located in their production support area. As a member of the team you will be responsible for: Initial application production support for in house applications Provide level 1 and 2 Support Develop, test the applications where required Document application support processes Client Facing Activities EXPERIENCE REQUIRED: Strong written and verbal communication skills Customer facing ability Oracle 9I/10g Strong SQL skills PL/SQL Skills DESIRED SKILLS : Crystal Reports HTML .NET ASP Unix Shell Scripting This is a great opportunity for someone with experience to join a rewarding and customer focused environment where your experience and skills will be greatly appreciated. This is a genuine opportunity for someone seeking to secure and initial 12 month contract with promising views for extensions. To find out more about this role please phone Suzanne Smith on 03 8080 7213 or apply with the link below without delay.
    Type:ContractLocation:CBD, AustraliaCountry:AustraliaContact:Suzanne SmithAdvertiser:Peoplebank incorporating Ambit Recruitment (Melbourne)Start Date:ASAPReference:JS/ITITT/VIC/79527/SSM/SSM

(IT) Senior IT Specialist


Location: San Francisco, CA   

This individual will be responsible for providing technical presales support to the newly created IOD Solutions Sales Specialists, and will be responsible for effectively articulating the value proposition of IBM s MDM Portfolio. This position will entail: responding to RFPs, RFIs, creating and delivering presentations and demonstrations, and successfully executing POCs. Previous experience in an industry or vertical is a must (ie Financial Services, Healthcare, Telco, Law Enforcement, Retail, CPG, Automotive, etc). Previous experience with CDI, PIM, Entity Analytics, CRM, Supply Chain, or other Enterprise Applications is a definite plus. Fluent knowledge of Web Services, Java, Data Management, Database technology, or ETL tools is highly desirable. Major Field of Study: Computer Science, IT, Business or equiv. Min of 4 years tech. sales exp in enterprise S/W solution sales, or equiv 2 years Datamodelling/DB Technologies, Java, Web Services working exp Excellent presentation and communication skill, coordination, multi-tasking Ability to effectively articulate to technical and LOB audiences Self-starter who assumes responsibility, recognizes and solves problems Experience with complex solution sales and collaborative team selling Demonstrated success in building customer relationships Experience developing and/or architecting S/W solutions Desirable industry experience: Financial Services, Healthcare, Telco, Law ETL experience desirable Entity Analytics experience desirable
    Type:PermanentLocation:San Francisco, CACountry:United States of AmericaContact:RecruiterAdvertiser:IBMStart Date:ASAPReference:JS2068107/B044921

Fund.com (FNDM.OB) Featured in EQUITIES Magazine for its Financial Information Website

In a recent edition of EQUITIES Magazine, Fund.com (OTCBB: FNDM) was highlighted in the magazine's Special Situations section. The article covers the company's overall mission, achievements, management, and more. Fund.com is an online portal providing financial information on mutual funds, commodity funds, hedge funds, money market funds, exchange traded funds, closed end funds and other types of pooled investment options. The company generates revenue through pay-for-performance online advertising by connecting investors with financial product providers.

According to the article, Fund.com benefits from a, "massive target market; fragmented market for unbiased investment information; an incredibly complex array of investment products and getting worse; and incredible fundamental trends toward equity ownership worldwide, mostly through funds."

The magazine notes the rising demand for easy-to-understand and easy-to-find financial information on the Internet, both of which it believes Fund.com can provide. "Vertical marketplaces can deliver comprehensiveness, relevancy, and efficiency in the form of in-depth content for a specific niche to consumers and targeted, higher quality leads and advertising opportunities to advertisers," the article states. The company targets mutual funds, which are estimated to be a $22 trillion market. According to the company, more than 55 million U.S. households own some variety of funds.

Let us hear your thoughts: Fund.com, Inc. Message Board

(IT) Project Co-ordinator - Northampton (PMO)


Rate: To 25k   Location: Northampton, Northamptonshire   

Project Co-ordinator/PMO Analyst/PMO Co-ordinator - Northampton, Northamptonshire - required to join an industry leading client. You will be responsible for creating and supporting core PMO Processes (Reporting, Risks & Issues, Change Management, Planning, Dependency management), utilising project data to create MI information, production of regular reports etc. Suitable candidates will have experience of working a similar role within a project environment and have a flexible and adaptable working style to work with multiple project managers. You will ideally have a knowledge of the Project and Programme Management systems and methodologies, processes, procedures and tools. You will have MS Project experience but any PRINCE 2 knowledge/certification would also be highly desirable. This is an excellent opportunity to really progress your career within an industry leader. People with Banking industry experience are highly desirable.
    Rate:To 25kType:PermanentLocation:Northampton, NorthamptonshireCountry:UKContact:Clare BriersAdvertiser:Mortimer SpinksEmail:Clare.Briers.B3FF4.876D8@mail.jobserve.comStart Date:ASAPReference:JS37769.2

Babylon Mall - To Dress Vintage To Dress Vintage a place for the gal who loves fashion



Recommended by Junglegirljane on Mar 9, 2008

I love the late 80's fashion as well as the 50's. This dress reminds me of a 50's prom dress but shorter. Can be yours for 45.00 at To Dress Vintage. Check it out. before it's gone.

This Review is: Smart Funny Useful


Add to my wish list on ThisNext
Compliment Junglegirljane on this recommendation
Recommend this on ThisNext
PermaLink

I can has hot Wendy's burger? - VIDEO

Filed under: Video, Commercials

I don't understand why certain commercials get to become "banned." I've seen a few since the latest multitude of Super Bowl commercials, and most of those have been funnier that anything shown on TV! Who the heck decided these commercials weren't fit for television? There were even a couple of questionable ones shown during the game this year, ones that offended quite a few people. Who cleared those monstrosities?

Case in point, the following "banned" Wendy's commercial, from 2007, for their four-alarm spicy chicken sandwich. The scientist holds said sandwich out to his assistant with tongs, so you know right away this thing means business. I haven't had fast food in years, but I gotta say I started wondering where the nearest Wendy's joint was so I could try one of these bad boys; that fourth "hint" (hit?) of spice is a doozy. Continue on for the video. (And for those who don't get the headline, read up on LOLCats.)

[via Digg]

Continue reading I can has hot Wendy's burger? - VIDEO

 

Permalink | Email this | | Comments

Wordless Wednesday - Water Bubbling Through Frozen DuSable Harbor, Chicago

Super Smash Bros. Brawl



Recommended by appleman on Mar 9, 2008

The besst nintendo game out there now!

This Review is: Smart Funny Useful

Tags: air

Shop for this: Amazon.com
Add to my wish list on ThisNext
Compliment appleman on this recommendation
Recommend this on ThisNext
PermaLink

Sony XEL-1 OLED TV



Recommended by appleman on Mar 9, 2008

Wow around 3mm thin now that is something I could not live without!

This Review is: Smart Funny Useful

Tags: air

Add to my wish list on ThisNext
Compliment appleman on this recommendation
Recommend this on ThisNext
PermaLink

Makeup-Free and Fabulous: Katherine Heigl




Fashion critics often praise Katherine Heigl for her minimal makeup on the red carpet.  It seems like the gal can swipe on some mascara, run some red across her lips, and look completely glammed up.

So, it's no wonder that she is all kinds of lovely without a stitch of added color on her face.

In December, a totally fresh-faced Katherine grabbed lunch with her husband (then fiance) Josh Kelley at Los Feliz eatery Figaro Cafe.  Her skin looks flawless, does it not?

Click any image to see Katherine close up.











Photos by SHINN


Fashion critics often praise Katherine Heigl for her minimal makeup on the red carpet.  It seems like the gal can swipe on some mascara, run some red across her lips, and look completely glammed up.

So, it's no wonder that she is all kinds of lovely without a stitch of added color on her face.

In December, a totally fresh-faced Katherine grabbed lunch with her husband (then fiance) Josh Kelley at Los Feliz eatery Figaro Cafe.  Her skin looks flawless, does it not?

Click any image to see Katherine close up.



Photos by SHINN

Angela Bassett is Caffeinated and Shy



For a gal who's quaffing down one of Starbucks' hair-curlingly-strong coffee products, Angela Bassett seems pretty reserved.

Despite her best efforts, the Meet the Browns star was spotted ambling down the streets of Los Angeles yesterday. When she noticed a pap's camera aimed at her, she tried to avoid detection by covering her face with the cup.

Nice try, Angie, but the only person we know who's actually skinny enough to hide behind a coffee cup is this gal.












Photography by DAVE/ZFI For a gal who's quaffing down one of Starbucks' hair-curlingly-strong coffee products, Angela Bassett seems pretty reserved.

Despite her best efforts, the Meet the Browns star was spotted ambling down the streets of Los Angeles yesterday. When she noticed a pap's camera aimed at her, she tried to avoid detection by covering her face with the cup.

Nice try, Angie, but the only person we know who's actually skinny enough to hide behind a coffee cup is this gal.

Photography by DAVE/ZFI

[ISN] Hacker trio finds a way to crack popular smartcard in minutes


http://www.networkworld.com/news/2008/030608-hacker-cracks-smartcard.html

By John Cox
Network World
03/06/2008

People are starting to wake up to the fact that RFID-enabled smartcards
now can be far more easily, and cheaply, cracked than ever before, as a
trio of young computer experts recently showed.

These are a particular type of processor-embedded cards, and are
different from credit cards. The actual decryption work by the
researchers was done on the widely deployed Mifare Classic wireless
smartcard, now manufactured by a Philips spinoff, NXP Semiconductors.
Decrypted, the cards can be counterfeited, and users' personal and bank
data is exposed.

That card is the basis of such new systems as the Dutch OV-Chipkaart,
being rolled out in The Netherlands as part of a multi-billion dollar
nationwide transportation ticketing system, and the so-called
CharlieCard, used in the Boston subway system. The decryption breach
triggered a firestorm of controversy, and Dutch authorities apparently
have halted the rollout and are investigating the vulnerabilities.

The card can be used in debit/credit transactions with the user's bank
account. This personal and important data is encrypted on the Mifare
Classic with a proprietary encryption scheme.

The newest attack was demonstrated at the 24th Congress of the Chaos
Computer Club in Berlin last December. Interest in the study has been
spreading steadily from the arcane world of security hackers. One of the
researchers is Karsten Nohl, a graduate student in the University of
Virginia's Computer Science Department, in Charlottesville, the other
two are Henryk Plotz and "Starbug." The trio apparently demonstrated a
practical and effective way to break the Mifare encryption key,
confirming what many cryptographers had suspected.

The team used an inexpensive RFID reader to collect encrypted data, and
then reverse-engineered the chip to figure out the encryption key to
decipher that data. They examined the chip under an optical microscope
and used micro-polishing sandpaper to remove a few microns of the
surface at time, photographing each of the five layers of circuitry.
Nohl wrote his own optical recognition software to refine and clarify
the images, and then patiently worked through the arrangement of the
logic gates to deduce the encryption algorithm, a task made possible by
the fact that the Mifare Classic relies on a secret key of no more than
48 bits.

"Regardless of the cryptographic strength of the cipher, the small key
space therefore permits counterfeiting of any card that is read
wirelessly," the team wrote in a follow-up statement issued on Jan. 8.
"Knowing the details of the cipher would permit anyone to try all
possible keys in a matter of days," the researchers noted. "Given basic
knowledge of cryptographic trade-offs and sufficient storage, the secret
keys of cards can be found in a matter of minutes."

The Dutch transit system actually uses two other types of tickets or
cards, and both have been successfully attacked by other researchers.

Nohl and his colleagues noted that other types of Phillips RFID tags,
such as the Hitag2+ and Mifare DESfire, are not affected by their
findings.

RFID security concerns have become pronounced over the past year or so,
as hackers and researchers make more concerted efforts to understand the
vulnerabilities. In mid-2007, one team used readily available RFID gear
to read the Electronic Product Code data on tagged boxes loaded on a
tractor-trailer. A year earlier, another group raised the specter that
RFID tags could be infected with computer viruses.

All contents copyright 1995-2008 Network World, Inc


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


What's On Tonight: Torchwood, 48 Hours Mystery, Spike Feresten

Filed under: Programming, What To Watch Tonight

  • At 8, FOX has a new Cops.
  • TLC has two new episodes of Flip That House at 8, followed by new episodes of Trading Spaces and Moving Up.
  • At 9, FOX has a new America's Most Wanted.
  • CNBC has a new Suze Orman Show at 9.
  • There's a Throwdown with Bobby Flay marathon on Food Network starting at 9.
  • BBC America has a new Torchwood at 9.
  • Also at 9: Cartoon Network has two new episodes of Naruto, then a new One Piece.
  • At 10, CBS has a new 48 Hours Mystery.
  • At 11:30, NBC has a new Saturday Night Live, with guests Jonah Hill and Mariah Carey.
  • At midnight, FOX has a new Talk Show with Spike Feresten.

Check your local TV listings for more.

 

Permalink | Email this | | Comments

Virtualization Congress Invites Startup Firms, for Competition Premiere


London, United Kingdom - (The Hosting News) - April 4, 2008 - Vendor independent virtualization event, Virtualization Congress, has officially opened its Call for Startups competition, inviting not yet launched or stealth mode companies focused on virtualization technologies, to participate.

Startups can now apply and get their chance to win a free keynote slot during the main days of the event: 15th - 16th October, 2008. To be eligible, the startups must agree to remain in stealth mode until Virtualization Congress, without announcing products, exposing websites or exhibiting at other tradeshows.

Additionally, these companies must be ready to show a working product on stage during their keynote. The two selected winners will have an unrivalled opportunity to launch their company's to a wide audience of potential customers, including influential journalists and analysts, potential technology and sales partners, and successful venture capitalists and angel investors.

Mark Fernandes, Managing Director of Sierra Ventures, one of the leading Silicon Valley venture capital firms noted, ''Sierra Ventures is excited to work with Virtualization Congress to create a platform to launch the most promising new startups in the virtualization space. This is a great opportunity for young companies to get the immediate attention of customers, partners and investors.''

Leading virtualization players that are supporting Virtualization Congress as Platinum sponsors include: Citrix, HP, ManageIQ, Microsoft, Phoenix Technologies, Quest and VMware. Virtualization Congress sponsors also include Marathon Technologies, Vizioncore, Veeam, VMLogix and Transitive. About Virtualization Congress Virtualization Congress, launched in 2007 by virtualization.info, is the first and only independent conference dedicated to virtualization technologies. It brings together the entire sector under one roof, giving customers and potential virtualization users the opportunity to hear about all of the latest products and technologies on the market without prejudice. The event prides itself on showcasing genuinely new technology, not just from the biggest vendors, but from the brand new entrants to the market. The event takes place between 14-16 October, 2008 at London's ExCel conference centre in Docklands.

Contest rules and application form are available at: www.virtualizationcongress.com/startups.htm Submissions are accepted until August 31, 2008.

Established in 2003, virtualization.info is recognized as the leading news and analysis site for the virtualization industry, with more than 6,000 subscribers, recording over 160,000 page views per month and referenced by more than 36,000 other sites, blogs and forums. It provides unique tools, like the Virtualization Industry Radar, to allow new customers to follow and ultimately make purchasing decisions within virtualization.

To learn more about, please visit: www.virtualization.info.

Web Hosting Firm, DiscountASP.NET, Joins Telerik, for ASP.NET UI Components


Pasadena, California - (The Hosting News) - April 3, 2008 - ASP.net hosting and SQL hosting provider, DiscountASP.NET, has entered into a partnership with vendor of advanced ASP.NET user interface components and .NET reporting solutions, Telerik.

Takeshi Eto, Vice President of Marketing at DiscountASP.NET noted, ''We specialize in ASP.NET hosting and are always interested in partnering with the vendors that provide our customers with the most useful tools that make their life easier and their sites stand out. Telerik is a well known leader in UI components for rich user experiences.''

Under this partnership, DiscountASP.NET customers can receive a $50 discount on Telerik RadControls and Reporting solutions. Telerik users can get 6 months free hosting for the first year of DiscountASP.NET's base ASP.NET hosting annual plan.

Nadia Terzieva, VP Business Development at Telerik remarked, ''The DiscountASP.NET and Telerik partnership is a natural fit. DiscountASP.NET is focused on offering advanced ASP.NET hosting for developers and we provide the tools that take their web applications to the next level.''

Last month, DiscountASP.NET debuted the integration of Microsoft Windows 2008 Hosting, on its enterprise-class shared hosting infrastructure.
The new Windows 2008 hosting platform includes many new enhancements, including:
  1. Windows Server 2008 Standard edition
  2. Internet Information Services 7.0 (IIS7)
  3. FTP 7 (including FTP over SSL)
  4. PHP5
  5. Trust Level Control
  6. Microsoft IIS Manager access
DiscountASP.NET introduces two new Control Panel tools for IIS7 hosting management. Customers can use the Application Pool Pipeline Mode chooser tool to switch between Classic and Integrated mode. In addition, a new Microsoft IIS Manager Permission tool is introduced allowing customers to manage the users that can have IIS 7 Manager access privileges.

Telerik is a leading vendor of developer tools and components for .NET. Building on our expertise in interface development and Microsoft technologies, Telerik helps customers build applications with unparalleled richness, responsiveness and interactivity. Created with passion, Telerik products help thousands of developers every day to be more productive and deliver reliable applications under budget and on time.

DiscountASP.NET is a Microsoft Windows-based shared hosting provider, focused on providing the best value in ASP.NET and SQL database hosting. A Microsoft Gold Certified partner, DiscountASP.NET was one of the first hosts to launch Windows 2008 hosting, and .NET 3.5 hosting supporting LINQ and ASP.NET AJAX hosting.

For more information on Telerik, please visit: www.telerik.com.

For more information about DiscountASP.NET, please visit: www.discountasp.net.

Napster, Inc. (NAPS) Provides Outlook for Fiscal 2008 and Fourth Consecutive Quarter of Positive Cash Flow

Napster, a pioneer of digital music, announced April 3, 2008 that it fiscal year 2008 ended in record revenues of $127 million and expects its fiscal 2008 fourth quarter revenue to total $31 million. Napster advised that the fourth fiscal quarter generated positive cash flow and is the fourth consecutive quarter of positive cash flow. The Company also announced that its worldwide subscriber base increased to approximately 760,000 as of March 31st of 2008.

Napster's revenues put the Company into the top three digital music companies in the industry, well ahead of competitors such as Amazon, eMusic and Zune Marketplace, according to Mark Kirstein who is a former analyst at In-Stat and iSuppli.

Chris Gorog, Napster's Chairman and COE said, "We are pleased to have delivered solid year over year revenue growth of 14% as well as positive cash flow throughout fiscal 2008. Our recently announced win for Napster Mobile with O2 UK continues to expand our global footprint by adding a significant new wireless carrier with more than 18 million subscribers in the UK. Last week’s news that AT&T plans to make Napster Mobile available to more than 12 million customers beginning this summer is another positive development for our service. Given the recent launches with world class mobile carriers in the United Kingdom (O2 UK), Italy (Telecom Italia) and Chile (Entel), Napster Mobile is now available to more than 214 million customers of these carriers in eight countries."

Chris Gorog continues to say, "We are also pleased to confirm that the rollout of our MP3 initiative is on track for the first half of calendar 2008. This effort is expected to dramatically expand the available market for Napster’s download sales to virtually any MP3 player or music phone, including the popular iPod and iPhone. We are beginning to see the long anticipated increases in available compatible devices that we expect to fuel our fiscal 2009 growth."

Let us hear your thoughts below:

William H. Macy's Mustache Prepares to Take Flight



Celebrated actor William H. Macy Departed from Los Angeles International Airport this afternoon. We don't know what his destination was, but we choose to believe that he's heading for a mythical land populated entirely by men with mustaches as magnificent as his.

Dang, that is one nifty nostril-skirt. It surely deserves a place in the Celebrity 'Stache Hall of Fame, alongside those of Sam Elliott, Wilford Brimley, Pat O'Brien and Ned Flanders.

We bet his wife, Felicity Huffman, enjoys it too. If you know what we mean, and we think that you do.

In fact, we're not even sure that Macy needs to travel by airplane. We imagine that he could probably jump off a cliff, let his mustache catch the wind, and glide wherever he needs to go.

But he probably likes to hobnob with the hoipolloi. Check out the way he graciously takes time out to pose for pics with a TSA employee.

Which is really nice of him, considering that she probably spent at least an hour searching his mustache for bombs and other contraband.













Photography by DANIELLE Celebrated actor William H. Macy Departed from Los Angeles International Airport this afternoon. We don't know what his destination was, but we choose to believe that he's heading for a mythical land populated entirely by men with mustaches as magnificent as his.

Dang, that is one nifty nostril-skirt. It surely deserves a place in the Celebrity 'Stache Hall of Fame, alongside those of Sam Elliott, Wilford Brimley, Pat O'Brien and Ned Flanders.

We bet his wife, Felicity Huffman, enjoys it too. If you know what we mean, and we think that you do.

In fact, we're not even sure that Macy needs to travel by airplane. We imagine that he could probably jump off a cliff, let his mustache catch the wind, and glide wherever he needs to go.

But he probably likes to hobnob with the hoipolloi. Check out the way he graciously takes time out to pose for pics with TSA employees.

Which is really nice of him, considering that they probably spent at least an hour searching his mustache for bombs and other contraband.

Photography by DANIELLE

Russell Simmons' Girlfriend Inspires Clever Title




We're sure you already are, but if not:  Look at her.

She is physically perfect.

Plus, her name is Porschia, which somehow exudes sex appeal.

On Tuesday, Phat Farm mogul Russell Simmons and his new (post Kimora Lee Simmons divorce) girlfriend Porschia Coleman paraded her perfection all over a Miami beach.  As well they should.  Russell seems to be an intelligent, level-headed guy who wouldn't waste his time on a sub-par lady, so chances are she's got a lot more than a hot bod and a great name.

Next time the sexy twosome hit the sand, we wouldn't mind it if Porschia mimicked Russell's sweet yoga moves.











Photos by KADENA PRESS


We're sure you already are, but if not:  Look at her.

She is physically perfect.

Plus, her name is Porschia, which somehow exudes sex appeal.

On Tuesday, Phat Farm mogul Russell Simmons and his new (post Kimora Lee Simmons divorce) girlfriend Porschia Coleman paraded her perfection all over a Miami beach.  As well they should.  Russell seems to be an intelligent, level-headed guy who wouldn't waste his time on a sub-par lady, so chances are she's got a lot more than a hot bod and a great name.

Next time the sexy twosome hit the sand, we wouldn't mind it if Porschia mimicked Russell's sweet yoga moves.



Photos by KADENA PRESS

[ISN] Hacker gets prison for false 911 report


http://www.ocregister.com/articles/ellis-call-caller-2006151-calls-team

By ERIKA I. RITCHIE
The Orange County Register
March 26, 2008

A Washington state computer hacker – who misled police with a wild tale
of threats and a possible murder scenario – pleaded guilty Wednesday in
Orange County Superior Court.

Randal T. Ellis, 19, of Mulkiteo, Wash., was charged with computer
access fraud, false imprisonment by violence, falsely reporting a crime
and assault with a firearm.

Ellis was sentenced to three years in prison and ordered to pay $14,765
in restitution. Fourteen thousand dollars will go to the Orange County
Sheriff Department to cover the cost of the investigation, as well as
the SWAT team dispatched as a result of Ellis's actions. The remaining
amount is slated for the city of Mulkiteo, Wash. to cover the cost of
the search warrant for and arrest of Ellis.

Sheriff's Sgt. Mike McHenry, who credits Lead Investigator Brian Sims
for his diligent work in following the case, was pleased to hear that
Ellis pleaded guilty.

"There needs to be significant punishment," said McHenry. "There was
grave risk to the people involved and the deputies who responded. This
wasn't a simple prank call. It was elaborate, thought-out and scripted
to illicit significant armed response and endanger the lives of everyone
involved."

Almost a year ago on March 29, 2007, Ellis began his "swatting" call by
reporting a drug-overdose. The call came into the Orange County Fire
Authority at 11:30 p.m. The Sherriff's Department was asked to assist.

Ellis' hoax twisted and turned as patrol cars and fire department
paramedics rolled to the home of a Lake Forest couple and their two
toddlers.

The caller changed stories from reporting a drug overdose to talking
about shooting and killing his sister after she fired a shot at him.

With law enforcement fearing the worst, the Lake Forest home was
surrounded by patrol cars, the sheriff's Critical Incident Response
Team, SWAT team members as well as police dogs and helicopters.

The result ended up in a confrontation with the residents at gunpoint,
detainment and a search of the house.

Officers realized it was a hoax when they found no signs of anything the
caller had reported.

Ellis' plot was completed by using a service provider on the Internet.

"It didn't take a lot of technical hacking skills," said McHenry. "All
it required was knowledge of certain services that he used for the wrong
purpose. I hope this deters other people emulating Mr. Ellis. I would
hope they think twice before engaging in cyber terrorism."

McHenry said this hoax was one of almost 200 calls Ellis had made. While
investigators aren't sure all were swatting calls, three other calls
appeared similar.

Each of the three calls was lengthy and described similarly violent
scenarios.

Two calls – to Bullhead City, Ariz., and Milcreek Township, Pa., were
placed in 2005.

In the Arizona incident, a caller said he shot someone and had law
enforcement officers who came to investigate in the crosshairs of his
scope on his machine gun.

In this case, police detained three people until the call was determined
to be a hoax.

In Pennsylvania, the 911 caller claimed to have shot his sister, leading
officers to make a forced entry into an unoccupied home.

Authorities said Ellis made another call this year that targeted his
hometown – Mukilteo, Wash.

The caller claimed to have shot his family with an AK-47 and threatened
to shoot any officers who came to his address. He said he had a hostage
and demanded a getaway car. Police sent a SWAT team and hostage
negotiators



___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


CBS says yes to Mike Birbiglia

Filed under: Other Comedy Shows, Late Night, Pickups and Renewals

Mike Birbigilia's girlfriend probably doesn't think it's a good idea, but someone at CBS has greenlighted Mike Birbiglia's Secret Public Journal, a pilot for a new sitcom. Maybe it was Whiffle Ball Tony, you know?

Mike's sitcom will be based on the comic's stand up comedy act as well as his weekly autobiographical blog. In the show, Mike plays a Brooklyn stand-up comedian who lives with his girlfriend, works on their relationship and tries to make a success in show business. The humor, naturally, will reflect the routines he's been doing on CD (two) and on TV -- The Late Show with David Letterman (he was one of the youngest guys ever to do stand up on the show), Comedy Central and Late Night with Conan O'Brien.

Continue reading CBS says yes to Mike Birbiglia

 

Permalink | Email this | | Comments

Microsoft and Yahoo agree on acquisition price

Galen Gruman at Infoworld has the April 1, 2008 scoop:

After much internal debate and industry speculation, Yahoo today agreed to be acquired by Microsoft, adding $2.6 billion to Redmond’s original offer of $44.6 billion on Jan. 31.

Yang will join Microsoft as "chief Yahoo," with specific duties to be determined later. Employees that Microsoft decides to retain will be offered an Xbox 360 game platform and a Zune music player as tokens of appreciation, in addition to cash grants and stock-option incentives for higher-level employees, Johnson said.

Golly! What can this portend?

Reaction from analysts and consumers ranged from disbelief to praise.

"This signals the death of Yahoo as it becomes part of Microsoft's proprietary, awkward Live strategy," said Mark Kelly, an analyst at The Buckeye Group research firm.

This talent is what Microsoft bought, and the company can afford to be tolerant of a distinct Yahoo culture, at least for a while, because it is contained in the Silicon Valley,” Ruiz said. "It can't infect Redmond as easily from there, even though Redmond could stand a little infection."

"Microsoft said the same thing about its slew of small business applications such as Great Plains a decade ago, yet nothing really came out of them," Hydecomb said.

Buckeye's Kelly said he believes the acquisition was nothing more than a platform purchase to replace the anemic Microsoft MSN, ad platform, and search-engine businesses, and that once Microsoft learned to run them, it would not need to retain the Yahoo culture.

"This is a liver transplant, not a brain transplant," Kelly said.

There’s much more by following the link, but the really scary part is how April Fool imitates reality when it comes to the Microsoft acquisition of Yahoo.


eBay Stops Auctions of Digital Goods

eBay has stopped auctions that offer digital property, allowing digital goods meant sellers could put up as many auctions as they wanted, because they had an unlimited number of copies that could be delivered. eBay say this was choking up auction catagories with duplicate items,

In a policy update that went into effect on March 31, 2008, digital goods can no longer be listed or sold through the service’s traditional auction-style or fixed price formats. This new ban will affect “anything that is “shipped” to a customer via email or download link,” according to eBay, including eBooks, MP3 files, and PDF files. Instead, all digital downloadable goods must be listed using the Classified Ad listing format, which provides sellers with a fixed price 30-day ad.

“Digital goods are often reproduced at little to no cost to the seller. On eBay, this creates the potential for Feedback Manipulation (both real and perceived),” stated Brian Burke, eBay’s Director of global feedback policy in a recent general announcement. “To preserve the integrity of the Feedback system, effective March 31 all goods that can be digitally downloaded or transferred electronically must be listed using the Classified Ads format.”

[ISN] ITL Bulletin for March 2008


Forwarded from: Elizabeth Lennon <elizabeth.lennon (at) nist.gov>

ITL BULLETIN FOR MARCH 2008

HANDLING COMPUTER SECURITY INCIDENTS: NIST ISSUES
UPDATED GUIDELINES

Shirley Radack, Editor
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
U.S. Department of Commerce

Today, organizations that operate and manage information technology (IT)
systems are spending more time than ever before in responding to
security incidents. New incidents and threats that arise daily have the
potential to seriously damage and disrupt the security of the
organizationÂ's information and IT systems.

Security incidents are violations or threats of violation of the
organizationÂ's computer security policies, acceptable use policies, or
standard computer security practices. Organizations should consider
carefully their ability to handle these security incidents and threats
effectively when they plan, develop, and implement their IT security
programs.

Applying risk management procedures, organizations should identify and
assess the risks of security incidents and identify effective ways to
deal with them. The first approach is to prevent security incidents
whenever possible. But since not all incidents can be prevented,
organizations should take steps to establish an incident response
capability for rapidly detecting incidents, minimizing loss and
destruction, identifying any weaknesses in their systems that may have
been exploited, and restoring IT services. This is a complex
undertaking, requiring considerable planning and the commitment of
resources to carry out the plans.

Intrusion detection and prevention systems (IDPSs) and other mechanisms
can be used to monitor threats. Clear procedures are needed to assess
the current and potential impact of incidents and to implement effective
methods for collecting, analyzing, and reporting data. Specific
communication channels should be established with internal groups, such
as human resources and legal staffs, and with external groups, such as
law enforcement, the media, and other incident response teams.

Security Threats to IT Systems

The many security-related threats that organizations must address
include:

- Denial of Service (DoS)­an attack that prevents or impairs the
authorized use of networks, systems, or applications by exhausting
resources.

- Malicious Code­a virus, worm, Trojan horse, or other code-based
malicious entity that successfully infects a host.

- Unauthorized Access­a person gains logical or physical access without
permission to a network, system, application, data, or other IT
resource.

- Inappropriate Usage­a person violates acceptable use of any network
or computer policies.

- Multiple Component­a single incident that encompasses two or more
incidents; for example, a malicious code infection leads to
unauthorized access to a host, which is then used to gain unauthorized
access to additional hosts.

Updated Guide on Handling Security Incidents

NISTÂ's Information Technology Laboratory recently issued NIST Special
Publication (SP) 800-61 Revision 1, Computer Security Incident Handling
Guide: Recommendations of the National Institute of Standards and
Technology. Written by Karen Scarfone and Tim Grance of NIST and by
Kelly Masone of Booz Allen Hamilton, NIST SP 800-61 Revision 1 provides
practical guidance to help organizations establish an effective incident
response program, analyze and respond to information security incidents,
and reduce the risks of future incidents. The recommendations in the
guide are useful for those organizations that are just setting up their
incident handling teams, as well as those that have already done so.

The updated guide, which replaces NIST SP 800-61, Computer Security
Incident Handling Guide, focuses primarily on the procedures and
solutions for detecting, analyzing, prioritizing, and handling
incidents. The guidelines and recommended solutions can be used on many
different hardware platforms, operating systems, protocols, or
applications and can be tailored to meet the specific security and
mission requirements of different organizations.

NIST SP 800-61 Revision 1 provides in-depth information on the need for
incident response capabilities. It covers the structures of incident
response teams and discusses the other groups within an organization
that might participate in incident handling activities. The basic steps
of handling incidents effectively, including incident detection,
analysis, containment, eradication, and recovery, are presented.
Separate sections in the guide provide specific recommendations for
handling the five types of incidents: denial of service (DoS), malicious
code, unauthorized access, inappropriate usage, and multiple component
incidents. All of these incidents are defined, and examples of each are
given. The preparation, detection, analysis, containment, eradication,
and recovery steps for each type of incident are detailed. Checklists
for handling each of the five types of incidents are included.

The appendices bring together useful information sources that assist
organizations in their incident handling programs. Included are a
consolidated list of the recommendations that are discussed in the
guide, incident response scenarios, and questions for use in incident
response exercises. Also provided are suggested items of information to
be collected about each incident, a glossary, an acronym list, lists of
in-print resources, online tools, and other resources that help
organizations in planning and performing incident response activities.
In addition, the appendices present frequently asked questions about
incident response activities and the steps to be followed in incident
handling. The final section of the appendices contains incident
reporting guidelines for federal agencies from the United States
Computer Emergency Readiness Team (US-CERT) in the Department of
Homeland Security.

This ITL bulletin summarizes the updated guide, which is available at:

http://csrc.nist.gov/publications/PubsSPs.html.

Basics of Incident Handling

Organizations face major decisions and actions when they develop their
computer security incident response capabilities (CSIRC). One of the
first considerations should be to create an organization-specific
definition of the term Â"incidentÂ" so that the scope of the term is
clear. The organization should decide what services the incident
response team should provide, consider which team structures and models
can provide those services, and select and implement one or more
incident response teams. An incident response plan, and associated
policies and procedures, should be developed when a team is established
so that the incident response process is performed effectively,
efficiently, and consistently. The plan, policies, and procedures should
identify the teamÂ's interactions with other teams within the
organization as well as with external parties.

The incident response process is composed of several phases. The initial
phase involves establishing and training an incident response team, and
acquiring the necessary tools and resources to enable the team to carry
out its responsibilities. During this preparation activity, the
organization also attempts to limit the number of incidents that will
occur by selecting and implementing a set of controls based on the
results of risk assessments. However, residual risk will inevitably
persist after controls are implemented, and no control is foolproof.

The next phase is detection and analysis of security breaches, which
alerts the organization whenever incidents occur. A
containment/eradication/recovery phase follows. Depending upon the
severity of the incident, the organization can act to mitigate the
impact of the incident by containing it and ultimately recovering from
it. After the incident is adequately handled, the organization issues a
report that details the cause and cost of the incident and the steps the
organization should take to prevent future incidents. This last phase is
post-incident activity.

The organizationÂ's incident response team should be available for
contact by anyone who discovers or suspects that an incident involving
the organization has occurred. One or more team members, depending on
the magnitude of the incident and availability of personnel, should
handle the incident. The incident handlers analyze the incident data,
determine the impact of the incident, and act appropriately to limit the
damage to the organization and restore normal services. Although the
incident response team may have only a few members, the teamÂ's success
depends on the participation and cooperation of individuals throughout
the organization.

NIST Recommendations for Handling Security Incidents

NIST advises that organizations implement the following recommendations
in planning and developing their incident response capabilities:

Establish and operate a formal incident response capability.

Federal agencies and departments are specifically directed to establish
incident response capabilities under the Federal Information Security
Management Act (FISMA) of 2002. Federal organizations are required to
develop and implement procedures for detecting, reporting, and
responding to security incidents. Federal civilian agencies are
responsible for designating a primary and secondary point of contact
(POC) to report all incidents to the United States Computer Emergency
Readiness Team (US-CERT) and for documenting corrective actions that
have been taken and their impact. Each agency is responsible for
determining specific ways in which these requirements are to be met.

Also, policy guidance issued by the Office of Management and Budget
(OMB) requires that agencies have a capability to provide help to users
when security incidents occur in their systems and to share information
concerning common vulnerabilities and threats (OMB Circular No. A-130,
Appendix III). OMB Memorandum M-07-16, Safeguarding Against and
Responding to the Breach of Personally Identifiable Information,
provides guidance on reporting security incidents that involve
personally identifiable information.

Federal Information Processing Standard (FIPS) 200, Minimum Security
Requirements for Federal Information and Information Systems, specifies
minimum security requirements for federal information and information
systems, including incident response. The specific requirements for the
implementation of security controls are defined in NIST SP 800-53,
Recommended Security Controls for Federal Information Systems.

Organizations should take the following steps in establishing an
incident response capability:

- Create an incident response policy and plan;

- Develop procedures for performing incident handling and reporting,
based on the incident response policy;

- Set guidelines for communicating with outside parties regarding
incidents.

- Select a team structure and staffing model;

- Establish relationships between the incident response team and other
groups, both internal to and external to the organization;

- Determine the services that the incident response team should provide;
and

- Staff the incident response team and provide staff members with
appropriate training.

Reduce the frequency of incidents by effectively securing networks,
systems, and applications.

It is less costly and more effective to prevent incidents than to try to
fix the problems that occur when security controls are inadequate. Many
security incidents can overwhelm the resources and capacity of the
organization to respond, and can result in delayed or incomplete
recovery. Extensive damage may occur, and systems and information may
not be available for long periods. When the security of networks,
systems, and applications is effectively protected and maintained, the
incident response team can focus on handling serious problems.

Document the organizationÂ's guidelines for interactions with other
organizations regarding incidents.

Clear procedures should be established to guide incident handling team
members who may need to communicate with outside parties, including
other incident response teams, law enforcement, the media, vendors, and
external victims. These communications often must occur quickly, and
guidelines are needed so that only the appropriate information is shared
with the right parties. The inappropriate release of sensitive
information can lead to greater disruption and financial loss than the
incident itself. Creating and maintaining a list of internal and
external POCs, along with backups for each contact, can help
organizations to make the communications among the involved parties
easier and faster.

Emphasize the importance of incident detection and analysis throughout
the organization.

Organizations might experience thousands or millions of possible
indications of security incidents each day. These incidents are recorded
mainly by logging and computer security software. Centralized logging
and event correlation software can be effective in automating the
initial analysis of the voluminous data that is collected and in
selecting the events of interest that require human review. To assure
the quality of the data collected, organizations should establish
logging standards and procedures that facilitate the collection of
adequate information by logs and security software. This data should be
reviewed regularly by the appropriate staff members.

Develop written guidelines for prioritizing incidents.

Prioritizing the handling of individual incidents is a critical decision
point in the incident response process. Incidents should be prioritized
based on the following:

- Criticality of the affected resources and data, such as whether a
public Web server or a user workstation is affected; and

- Current and potential technical effect of the incident, such as
root compromise or destruction of data.

Combining the criticality of the affected resources and the current and
potential technical effect of the incident determines the impact of the
incident to the organization. For example, data destruction on a user
workstation might result in a minor loss of productivity; however, root
compromise of a public Web server might result in a major loss of
revenue, productivity, access to services, and reputation, as well as
the release of sensitive data. The latter breach could result in the
release of credit card numbers, Social Security numbers, and other forms
of personally identifiable information. Since incident handlers may be
under great stress during incidents, it is important to make the
prioritization process clear. Organizations should decide how the
incident response team should react under various circumstances and then
create a Service-Level Agreement (SLA) that documents the appropriate
actions and maximum response times. This documentation is particularly
valuable for organizations that outsource components of their incident
response programs. Documenting the guidelines should facilitate faster
and more consistent decision making.

Review the lessons learned from security incidents to improve the
organizationÂ's security incident handling processes.

After a major incident has been handled, the organization should hold a
meeting to review the lessons learned from the incident and the
effectiveness of the incident handling process. Then it is possible to
identify necessary improvements to existing security controls and
practices. Meetings to review lessons learned should also be held
periodically for lesser incidents. The information accumulated from all
of the meetings to review the lessons learned should be used to identify
systemic security weaknesses and deficiencies in policies and
procedures. Follow-up reports generated for each resolved incident can
be important not only for evidentiary purposes but also for reference in
handling future incidents and in training new members of the incident
response team. An incident database, with detailed information on each
incident that occurs, can be another valuable source of information for
incident handlers.

Seek to maintain situational awareness during large-scale incidents.

Organizations often are challenged to maintain situational awareness for
handling of large-scale incidents because these incidents are very
complex. Many people within the organization may play a role in the
incident response, and the organization may need to communicate rapidly
and efficiently with various external groups. Collecting, organizing,
and analyzing all the pieces of information, so that the right decisions
can be made and executed, are not easy tasks. The key to maintaining
situational awareness is to prepare to handle large-scale incidents by:

- Establishing, documenting, maintaining, and exercising on-hours
and off-hours contact and notification mechanisms for various
individuals and groups within the organization, such as the chief
information officer (CIO), head of information security, IT
support staff, and business continuity planning staff. Mechanisms
are also needed for contacts outside the organization, such as
US-CERT, incident response organizations, and counterparts at
other organizations;

- Planning and documenting guidelines for the prioritization of
incident response actions based on business impact;

- Preparing one or more individuals to act as security incident
leads with responsibility for gathering information from the
incident handlers and other parties, and distributing relevant
information to the parties that need it; and

- Practicing the handling of large-scale incidents through exercises
and simulations on a regular basis. Since these incidents happen
rarely, incident response teams often lack experience in handling
them effectively.

More Information

See Appendix J of SP 800-61 Revision 1 for information about federal
incident reporting guidelines, including definitions and reporting time
frames. The US-CERT Web page can be found at:

http://www.us-cert.gov/federal/reportingRequirements.html.

OMB directives and guidelines are available at:

http://www.whitehouse.gov/omb/.

NIST publications assist organizations in planning and implementing a
comprehensive approach to information security. See NISTÂ's Web page for
information about NIST standards and guidelines that are referenced in
the Computer Security Incident Handling Guide and other security-related
publications, covering related topics, such as security planning, risk
management procedures, security controls, intrusion detection systems,
and firewalls. http://csrc.nist.gov/publications/index.html


Disclaimer
Any mention of commercial products or reference to commercial
organizations is for information only; it does not imply recommendation
or endorsement by NIST nor does it imply that the products mentioned are
necessarily the best available for the purpose.



Elizabeth B. Lennon
Writer/Editor
Information Technology Laboratory
National Institute of Standards and Technology
100 Bureau Drive, Stop 8900
Gaithersburg, MD 20899-8900
Telephone (301) 975-2832
Fax (301) 975-2378



___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


(IT) Junior and Senior Java Developers North West


Rate: £25087 - £38989 per annum + Bonus   Location: Greater Manchester   

JAVA, JSP, J2EE, and JavaScript Skills? My internationally renowned client currently has exciting Java/JavaScript developer roles based in Cheshire. You will ideally have a related degree as well as commercial experience of applications such as J2EE and Java. Knowledge of J2EE Components such as JSP, EJB and JSF are desired and also experience of Web based applications such as JavaScript, HTML and XML are needed. Any Multimedia experience you have in Macromedia or Adobe products are also very much sought after. Database knowledge you may have gained such as SQL Server and Oracle are also advantageous. Your day-to-day role will include working with Systems Architects as well as developing software through the full product life cycle. This is an excellent opportunity to work in an internationally renowned organisation and help to develop and produce software that will be used around the world. The role offers exceptional career development in a software environment as well as an excellent salary and a yearly bonus. Apply now for an immediate interview!
    Rate:£25087 - £38989 per annum + BonusType:PermanentLocation:Greater ManchesterCountry:UKContact:Gareth PikeAdvertiser:Intelect Recruitment PLC - Manchester PermEmail:Gareth.Pike.3820E.91F53@mail.jobserve.comStart Date:ASAPReference:JSGP/JUNJAV/0404

(IT) Helpdesk Support


Rate: £9-£12/Hour   Location: South West London   

Call Loggers Required: To work within the busy IT Department of an excellent South London Organisation. Essential Skills: Needs to be computer literate Must have a good telephone manner Needs a Customer Service Ethos and be able work under pressure Good Team Player Must be flexible (required to work shifts between 8am - 6pm Mon to Fri) Desirable Skills: Have experience of Call Logging systems The ability to communicate to users and senior managers Ability to handle difficult customers 1st line support experience
    Rate:£9-£12/HourType:ContractLocation:South West LondonCountry:UKContact:Richard GilesAdvertiser:Badenoch & ClarkEmail:Richard.Giles.57331.23404@mail.jobserve.comStart Date:ASAPReference:JSLN705/HELPDESK

Cheap, Quick Logo Design - oDesk

Hi, and thank you for reading this posting. I have a few friends who will be participating in the &quot;Walk for Life&quot; which is a benefit to raise money for breast cancer. They have come up with a team name of the &quot;Tele-TaTa's&quot;  Basically the &quot;Tele&quot; stands for telephone since they work in in the voice & data industry.  Lastly, the &quot;TaTa's&quot; stands for woman's breasts.  This ties in theme for breast cancer. So, ...

Budget: $20.00
Starting On: March 19, 2008
Ending On:
Posted On: March 19, 2008
ID: 729927
Category: Graphic Arts & Design > Logo Design
Skills: Photoshop
Country: United States
Hours Billed: 17

click to apply

Turn Off The Lights For Earth Hour On March 29

On March 29, 2008, people around the world are invited to turn off their lights for one hour for what is called Earth Hour.  What started in Sydney, Australia last year is now spreading around the world.  I heard about this for Chicago is one of the cities participating in this program at 8 pm local time.  And this is not just a grassroots effort, as there are corporate sponsors for the event, including the local electric company.

Why not?  For someone whose condo lights could be seen from a distance a skyline shot, I am in.  I just hope too much money and effort (and electricity) is not being spent to promote it – wouldn't that defeat the purpose?

I know from personal experience keeping the lights off can make a difference in your electric bill.  Last year when having some work done on our condo, we had the main light fixture taken down in the bathroom and the replacement didn't go up for another month.  Looking at our bills, we noticed a significant decrease.  The new fixture also had compact fluorescent bulbs, and we have continued the savings.

Will you be turning off your lights for an hour?

Eric Dane Brings the Steam to 3rd Street




Eric Dane lived up to his Grey's Anatomy nickname today by looking totally swoon-worthy (or, steamy, if you prefer) while grabbing lunch with friends at celebrity stomach-filler, Joan's on Third.

Is it just us, or does Dane look strikingly like Brad Pitt in the (above) photo on the left?  Like, circa Cool World minus 3 vertical inches of hair?

Eric must be a fan of Joan's.  We spotted him and his Porsche there not so long ago.  At least he wasn't eating a bowl of JOS's finest nacho cheese like this guy.

Click any image to browse the gallery of America's second favorite hottie doctor (opinions are like a**holes, people).











Photos by MATEI/DANIELLE




Eric Dane lived up to his Grey's Anatomy nickname today by looking totally swoon-worthy (or, steamy, if you prefer) while grabbing lunch with friends at celebrity stomach-filler, Joan's on Third.

Is it just us, or does Dane look strikingly like Brad Pitt in the (above) photo on the left?  Like, circa Cool World minus 3 vertical inches of hair?

Eric must be a fan of Joan's.  We spotted him and his Porsche there not so long ago.  At least he wasn't eating a bowl of JOS's finest nacho cheese like this guy.

Click any image to browse the gallery of America's second favorite hottie doctor (opinions are like a**holes, people).



Photos by MATEI/DANIELLE


More Stone, Less Weiner (dog)




Yesterday, we brought you highlights from a biker chic Sharon Stone shopping in Paris with her weiner (dog).  (We know, we know.  We're about 5 years old.)

Today, Sharon stepped out in a more demure outfit, but with equally amusing eyewear.  Sadly, her weiner (dog) did not accompany her today.  Ms. Stone dropped into Dior today, presumably to buy another pair of bizarrely fashionable sunglasses, big enough (of course) to necessitate that ginormo (real word) bag.

Click any image to see the pics of Sharon Stone's Parisian Dior (and Starbucks) excursion.




Yesterday, we brought you highlights from a biker chic Sharon Stone shopping in Paris with her weiner (dog).  (We know, we know.  We're about 5 years old.)

Today, Sharon stepped out in a more demure outfit, but with equally amusing eyewear.  Sadly, her weiner (dog) did not accompany her today.  Ms. Stone dropped into Dior today, presumably to buy another pair of bizarrely fashionable sunglasses, big enough (of course) to necessitate that ginormo (real word) bag.

Click any image to see the pics of Sharon Stone's Parisian Dior (and Starbucks) excursion.

Comptroller William Thompson visits LPAC

Breaking news from NYC Comptroller William Thompson, who visited Latino Pastoral Action Center on Friday as part of the LPAC Leadership Series: “I’m not announcing today, but I am running [for NYC mayor].”

Here are my notes and pictures from the event.




"Economics and Communities of Color"

Controller William C. Thompson, Jr.
March 28, 2008


Introduced Carlos Ramos, Special Assistant & Eduardo Castell, Deputy Controller (and campaign manager)

What does the Comptroller do?



+ Bio: first elected office. Previously president of the Board of Education, deputy Brooklyn Borough President

+ Campaigned to be a "fiscal activist controller." Looking at the office differently. Fight for fiscal responsibility on behalf of the people. Expanded the boundaries of the office. Not just dollars and cents

+ Direct responsible for: oversight of budget spending (expense budget is $60 billion). Authority to audit agencies and non-profits. Oversees public works & construction contracts. Sets and enforces "prevailing wage" from city contractors. Controller must approve all settlements ($500 million / year). Oversees (in tandem with Mayor) city bonds. CEO for pension funds; $110B in assets.

+ Invested pension funds in low income housing. Also pioneered housing funds for teachers

Money in our neighborhoods



+ Invest in education

+ Gentrification

+ Access to capital to start, own, and grow businesses. How do we create sustainable institutions that grow communities?

+ 92% of NYC businesses employ less than 100 people

+ Wall Street pays 35% of the salaries in NYC, but in good and bad economies, small businesses remain.

What do we need to do moving forward?



+ Big believer in "faith-based community development." Increase capacity so owners can monetize assets and in the process grow neighborhood economies. Land is a scarce commodity in NYC in all five boroughs.

+ Provide access to capital through "Banking Development Districts." Use city deposits that normally sit in commercial banks in local bank branches to spur banking (create branches) in underserved communities. Tradeoff: banks give small business loans and mortgages to community. $160 million currently on deposit.

+ Check cashers: people shouldn't have to pay to get their own money. Need more bank branches in communities of color. In Manhattan, multiple branches on every block. In Bronx, one branch for more than 11,000 people.

+ Need for financial literacy. If you don't have credit, you don't have anything. Bad credit = denial of capital.

+ Greater micro-lending

+ Foreclosures. 1 year ago, they were concentrated in communities of color. Huge impact on Hispanic and black families: exploitation of immigrants; refinancing schemes. Last year, controller launched "Save our Homes" month and foreclosure helpline. So far more than 3000 active cases.

+ Initiated program to manage greater percentage of pension funds by emerging minority and female managers. Create opportunity for small businesses to do work with the city. NYC does 100s of millions each year in business. Controller registers minority firms and is trying to focus contracts there.

+ We need to build more affordable housing, and break large contracts into small contracts for small and minority businesses. Create access to opportunity.

+ 200K "disconnected youth" – teens out of school and without jobs. Yet there's a building boom in the city. Electricians start at $20/hour. Can't find plumbers. The city is importing skilled labor from Alabama and elsewhere. We need to resurrect technical education for kids that aren't interested in college.

+ NYC provides tax breaks to investment banks to build new buildings and/or stay in the city. How is that possible when many of the same firms subsidize poverty among kitchen and maintenance staff. Proposed conditional tax breaks that mandate "living wage jobs" in order to receive tax break.

Q & A



Q: Many community businesses are owned by outsiders. Dollar doesn't circulate in our neighborhoods as much as elsewhere. How do we overcome the stronghold?

A: Increase access to capital. Business development (planning, etc). Pool resources better. Faith-based institutions. Economic power comes when congregations, etc pool enough resources to build a bank locally.

Q (Wendy Calderon Payne, UYAI): Received a federal grant; took more than 6 months before the money actually arrived. Received a city grant; eight months later the money still hasn't arrived. No credit line or building equity to stop the bleeding while they wait.

A: Disbursements shouldn't take so long. Controller is trying to hold agencies accountable to public ridicule (see website). But progress is slow.

Q (Ingrid Jones, Esq.): Partner at a new 100% woman and black owned law firm. Also development director at Harlem church. 1 – How much outside counsel does NYC hire? 2 – Lots of development in Harlem, but too costly for local residents and services not growing accordingly (supermarkets, schools, shopping, etc).

A: Need more "smart growth," coordinated growth. Also, has some influence in hiring outside counsel.

Q (Henry Nixon, LPAC): How do we recruit people of influence and power to become mentors to model at-risk kids that success is attainable?

A: We would be happy to work with you there. Too many kids are limited by what they dream, because the dreams they see are bling.

The coming economic meltdown?

Let me give you three numbers that will put this economic asteroid into perspective: $200 billion, $14.1 trillion, and $53 trillion.

# $200 billion is the approximate total amount of write-downs announced so far as a result of the current credit crisis.

# $14.1 trillion is the size of the entire U.S. economy

# And $53 trillion is (drum roll please) the approximate size of this country’s bill for the Social Security and Medicare promises we’ve made.

While no one will ever mistake me for Alan Greenspan, it seems to me that the third number is quite a bit larger than the other two. It also seems very few people care.

When does the asteroid land? 2019, when the Medicaid trust fund becomes insolvent.

Matt notes the irony (and urgency) contrasting the timing of 2020 Vision for Schools.

Buddha sculpture makes $14.3 million at New York auction

A wood sculpture of a Buddha has sold for $14.3 million, in New York, a price Christie’s the auctioneer says is a world record for any Japanese work of art.

The statue is believed to be the work of Unkei, a renowned Japanese sculptor of the early Kamakura period in the 1190s. Despite an appraisal from the Tokyo National Museum that the statute is highly likely a work of Unkei, it has not been designated as a national treasure or an important cultural asset in Japan, like another 12 of Unkei’s works have been.

Katsura Yamaguchi, international director of Japanese and Korean art for Christie’s, said in a statement, “History was made today with the phenomenal result of $14,377,000, which is a testament to the extreme importance and beauty of this supreme Buddha, and elevates Japanese art to a new record level.”

The statue was sold on Tuesday to Mitsukoshi Ltd., one of Japan’s major department stores. Its presale estimate was $1.5 million to $2 million.

Louisiana Thoroughbred Breeders Association Announces Dates and Location of 2008 Yearling Sale

The annual Breeders Sales Company of Louisiana Inc. Yearling Sale sponsored by the Louisiana Thoroughbred Breeders Association will be held September 29 & 30. Due to the number of horses consigned at recent sales, the LTBA has decided to forego the mixed session which traditionally followed the yearling sale. The sale will be limited to 450 yearlings which will be accepted on a first come, first serve basis. Additionally, the minimum sales commission has been increased to $250 per entry. With the number and quality of entries improving annually, the LTBA expects to present the best catalog yet for the 2008 sale.

The sale is returning to the Ike Hamilton Equine Exposition Center located in West Monroe, Louisiana. The 2007 Breeders Sale moved from Louisiana Downs to the "The Ike." The 40-acre site is a fully climate controlled event-arena, with 510 stalls all under one roof and includes office space with internet service and a pre-sale ring. The facility drew rave reviews from horsemen who appreciated the fact that the event was contained under one roof.

The sale will once again be web-cast on the LTBA website at www.louisianabred.com.

AP Examines Just How Ridiculous ISP Contracts Are

We recently learned that customers of Verizon's FiOS service don't get to see the full terms of service they're agreeing to until after it's been installed. But, of course, no one actually reads those kinds of things, because if you did, you'd probably never agree to it. To help you out, the Associated Press took some time to read through various ISP end user license agreements (EULAs) and discovered that ISPs put a ton of ridiculous stuff in the fine print, which is basically to give them many different options to kick you off if they suddenly decide you've become a problem. Or, in some cases, it's because lawyers want to protect the ISPs from ridiculous lawsuits, which leads them to put in clauses warning customers that the ISP (in this case, Verizon) doesn't own the internet, so that people know they can't sue Verizon for something that happens online. Verizon recently removed that clause, apparently realizing that it was a bit extraneous. Permalink | Comments | Email This Story

Graphic Design, Logo Rework - oDesk

My company will be conducting a marketing campaign for IT services, solutions and hardware. We have a logo already designed that we would like integrated in a new fresh way for this upcoming campaign. Creativity is of utmost importance. Previous work will be evaluated to determine if you are the person we will entrust to run with the direction of this job that will be open for unique direction. Two artists will be accepted and will be asked to give two to three concepts to get a cross sectio...

Work Load: HalfTime
Estimated Duration: 3 weeks
Starting On: March 19, 2008
Posted On: March 19, 2008
ID: 729662
Category: Graphic Arts & Design > Print Design
Skills: Adobe, Corel, IT Branding, Company Identity
Country: United States
Hours Billed: 0

click to apply

Feedback on my Twitter Usage –I listened

I’m very conscious about listening to my community, it’s one of the practices I suggest to my clients, so I’d better eat my own dogfood.

A few days ago, I asked you what you thought about my Twitter usage. Here’s the results, I took some time to count up the 89 comments that came in (some were not relevant) and tried to put them into buckets. I’m pretty anal, so being a researcher is really a good fit.

At SXSW I met someone who works at a PR agency, most of the account managers are following my tweets, and some of them complained to him about my high frequency, ironic.

Here’s what you said (please note some were subjective, I had to force them into buckets, although there’s clearly a trend)

What you told me about my Twitter Usage:

1) How are my tweets doing for you?

A) Too little 4
B) Just right 43
C) Too many 8

2) How is the content?

40 respondents said it was positive
4 said it was mixed or varied
2 said it wasn’t relevant

14 people told me that I shouldn’t care about what anyone says, and just do what I want, since Twitter is opt in.

Conclusions:
Well it’s no surprise that I’ve not changed my behaviors at all, and this feedback has reinforced that.

I’ve indicated how I use Twitter, most of the time, I point to things that I think are interesting, and it sends about 50 clicks (and up to 200) clicks from an active opt-in engaged audience of early early adopters.

Microsoft claims victory in OOXML standards battle

The official results won’t be released until tomorrow, but Microsoft today claimed victory in their prolonged effort to get their Office Open XML document format declared an ISO standard:

After more than 14 months of intensive review, a Joint Technical Committee of the International Standardization Organization (ISO) and the International Electrotechnical Commission (IEC) has concluded its formal process to evaluate Ecma International's submission of the Draft International Standard (DIS) 29500: Office Open XML (Open XML).

While the final vote has not yet been announced formally, publicly available information appears to indicate the proposed Open XML standard received extremely broad support. According to documents available on the Internet, 86 percent of all voting national body members support ISO/IEC standardization, well above the 75 percent requirement for formal acceptance under ISO and IEC rules. In addition, 75 percent of the voting Participating national body members (known as P-members) support standardization, also well above the 66.7 percent requirement for this group. Open XML now joins HTML, PDF and ODF as ISO- and IEC-recognized open document format standards.

It’s not over until the fat lady sings, but a variety of leaks from the national standards bodies who got the results today indicate that the long nasty battle is over. Except for Neelie Kroes and the EU Competition Cops of course.

Microsoft is predictably ecstatic that they won’t get beat out of government and other contracts where office software is required to save documents in formats defined by “open standards,” but the continued bad vibes associated with the way this 6,000 page standards monstrosity was jammed through the “fast track” process will continue to rankle. Microsoft promises to implement the standard now known as IS 29500 (which differs and will differ further from the Open XML implemented in Office 2007) in the next version of Microsoft Office. It will be interesting to see if anyone else attempts it.

Update (April 2, 2008): The official announcement.


(IT) .NET, C#, TSQL, ASP.NET, HTML Software Developer - Paisley - £25-35k


Rate: 20k-30k Per Annum Ecxcellent beneifts   Location: Scotland Paisley   

.NET, C#, TSQL, ASP.NET, HTML Software Developer - Paisley - £25-35k .NET, C#, TSQL, ASP.NET, HTML Software Developer needed to join a vibrant Paisley based software company in the environmental arena. .NET, C#, TSQL, ASP.NET, HTML Software Developer will be working with a team delivering applications to the reverse supply chain. You will need a full working knowledge of .NET 1.1 and 2.0, 2 years commercial experience of C# and OO design skills, 2 years working with TSQL, stored procedures and have a good working knowledge of SQL 2000 and 2005. Have 2 years of development experience in ASP.NET using .NET 1.1 and 2.0 and 2 years of HTML, CSS and Javascript. Additional knowledge of Visual Studio 2003 or 2005, SQL Server Express and mobile technology development using CE.NET would be a bonus. With outstanding opportunities, this role based in Paisley, easily commutable from Glasgow, Dumbarton, Kilmarnock, Greenock, will enable you to achieve your full potential and develop your current skill set. Apply now!
    Rate:20k-30k Per Annum Ecxcellent beneiftsType:PermanentLocation:Scotland PaisleyCountry:EnglandContact:Jai DattaniAdvertiser:Monarch Recruitment Ltd.Email:Jai.Dattani.953BD.AFA8E@mail.jobserve.comStart Date:ASAPReference:JSJDPAIS

Happy Birthday Simon, Mia, and Bethany

Last year’s flood of newborn nieces and nephew all turned one within the past month. Due to a hectic travel schedule, we couldn’t attend all three parties, but we did get to enjoy Simon’s on Saturday. Here are the pics.

Related

Flickr photos of:
+ Mia
+ Bethany
+ Simon
+ All Cousins
+ (And for good measure) Judah

EXHIBITION - Tom Fong


Watercolor by Tom Fong

The Schroeder Studio Gallery presents, Tom Fong’s Bold & Spontaneous Watercolors, March 3-March 30, 2008. Reception for the Artist, Saturday, March 15, 2008. from 4 - 8 pm.

I received an e-mail postcard from Tom the other day announcing his upcoming exhibit. The postcard notes, “Tom Fong’swatercolors are bold, spontaneous, direct and have been included in many national juried exhibitions and featured in publications such as Splash 6 and American Artist. He is a signature member and the former president of Watercolor West.”

Tom is offering a watercolor workshop in the Southern California area, Saturday & Sunday. July 12 & 13, 2008, from 9:30am-4:30pm. The workshop is open to all levels, beginner thru advanced. Further details are available by clicking on this link.

Tom also is a frequent participant, demonstrator, and assistant at Henry Fukuhara’s Annual Manzanar Watercolor Workshops. Tom’s demonstrations are crowd pleasers, educationally informative, and filled with lots of fun and good humor. Tom will be at this year’s 11th Annual Henry Fukuhara Workshop to offer assistance to watercolorists of all levels. For registration information and further details, click on this link.

For directions to the Schroeder Studio Gallery and information about special opportunities in the gallery’s 10th anniversary year, click on this link: www.schroederstudio.com

Gallery Address & Phone:
112 E. Maple Ave.
Orange, CA 92866

(IT) Senior C# Developer


Rate: £70k-£80k + Benefits   Location: City Of London   

Senior C# Developer needed for the Operations Client Services area of a leading Investment Bank. As well a developing all business functionality, the IT team develops and supports a high volume intraday trade event tracking and event storage component. The role will entail technical analysis, hands on development of new functionality. The work involves considerable client side development using Webforms, unit/system testing and support and maintenance of existing functionality. The successful candidate will have solid experience of C#.NET, client and server. User controls, Server side controls, knowledge in the development of Websites (C#, WebForms, ASP.NET, DHTML, AJAX, JSON) and strong experience of deployment in the Microsoft IIS environment and the .NET platform. This is an excellent opportunity to join a leading Investment Bank.
    Rate:£70k-£80k + BenefitsType:PermanentLocation:City Of LondonCountry:UKContact:Richard AngioliniAdvertiser:Cititec Associates LimitedEmail:Richard.Angiolini.0F29D.70BE3@mail.jobserve.comStart Date:ASAPReference:JSCT064

Liza Minnelli Is a Rebel



Liza Minnelli was spotted at JFK airport yesterday, en route to the south of France (and eventually to an Italian television appearance in San Remo).

While waiting to board, Liza puffed on a cancer stick outside of the terminal—and right next to a sign that clearly reads, "NO SMOKING!"

Duhn-duhn-duhn!

Oh well; we suppose that none of the security staff would have the stones to give her any guff about it, after the beatdowns that she allegedly laid on ex-hubby David Gest.

And while we would never give our readers the impression that smoking is cool, you have to admire Liza's casual disregard for the rules. Stick it to the man, Liza!

Besides, after some of the things that Liza has put in her body over the years, cigarettes are probably like vitamins to her.














Photography by GA-MD Liza Minnelli was spotted at JFK airport yesterday, en route to the south of France (and eventually to an Italian television appearance in San Remo).

While waiting to board, Liza puffed on a cancer stick outside of the terminal—and right next to a sign that clearly reads, "NO SMOKING!"

Duhn-duhn-duhn!

Oh well; we suppose that none of the security staff would have the stones to give her any guff about it, after the beatdowns that she allegedly laid on ex-hubby David Gest.

And while we would never give our readers the impression that smoking is cool, you have to admire Liza's casual disregard for the rules. Stick it to the man, Liza!

Besides, after some of the things that Liza has put in her body over the years, cigarettes are probably like vitamins to her.

Photography by GA-MD

(IT) C# Analyst Programmer


Rate: 500-550/Day   Location: Docklands, London   

C# Analyst Programmer needed for the Product Control Group of a leading Investment Bank. The successful candidate will have a proven track record in database design and optimisation (SQL Server 200/2005), delivery of ASP, C#, ASP.net and VB applications as well as experience with Cruise-control, NUnit and rational clearcase. You will also have a strong Middle Office Investment Banking background.
    Rate:500-550/DayType:ContractLocation:Docklands, LondonCountry:UKContact:Richard AngioliniAdvertiser:Cititec Associates LimitedEmail:Richard.Angiolini.40116.386CC@mail.jobserve.comStart Date:ASAPReference:JSCT065

Green Growth

Next Workshop:
Sacramento, CA., March 8 & 9. Click here for details

Green Growth - DETAIL – Watercolor by Woody Hansen
(Click image to view entire painting)

Green Growth was an enjoyable, non-objective experience. In the beginning I had no value plan, nor pre-sketch, or definitive direction other than to attempt to create something unique. I allowed the shapes, colors, and values to develop—for the most part—on their own. I find the process not always pleasant, nor easy, and only infrequently pleasing. However, when it seems to work the reward is fulfilling. Some might call this approach high risk, high gain. Others might call it (fill in negative term here). So it is with Green Growth.

Every once in a great while, I do a painting that reminds me of a track from an old, Stan Kenton* album. Toward the conclusion of a cut called, Prologue (This Is An Orchestra), Stan—who during the recording comments about music and each featured musician—with great pride and authority, shouts above the crescendo of his big band—“THIS is an ORCHESTRA!”

Something to which we all aspire: the urge to shout about a watercolor, “THIS is a PAINTING!
———————–

Recommended listening …

*Stan Kenton album: Kenton New Concepts of Artistry In Rhythm
Prologue (This Is An Orchestra)
You can hear this music (free) HERE.

Traditional Auction Companies Making the move to Online Sales

When Stiles Auction, LLC opened it's doors three years ago it didn't seem like internet sales were going to be a part of the business plan.

Mike McNabb and his partner Charles Mcnabb a father and son team, obtained their State of Wisconsin Auctioneers License, went on to auction school and opened their doors to the world. At first Charles an owner of an antiques store supplied all of the items for their bi-weekly auctions. Later friends and aquantances started bringing their items and things moved along smoothly but after the first couple of years their local following wasn't growing enough to keep up with the barage of items that kept pouring in.

Mike a long time internet marketer and publicist started building a website that would allow bids to come in from around the world. The website www.stilesauction.com is much like an ebay style website except all of the items are backed by one single company. “All of the items on our site are either owned or contracted directly by us”

Having someone to hold responsible for the items listed has been a part of the huge success of our online venture. Buyers feel more comfortable knowing they can return items if they aren't represented properly.

Stiles Auction, LLC specializes in art, antiques, complete estates and real estate auctions. Their website can be found at www.stilesauction.com or you can reach them by phone at 920 373 6171

(IT) Business Project Manager - South West


Location: South West   

I am urgently looking for a Business Project Manager to work for a Life and Pensions company in the south west. The role requires developed experience working on projects from a business perspective in a life and pensions environment. You will be working on a processes efficiency/process improvement project and will need previous experience managing this type of initiative. Rate - Negotiable Duration - 6 months + Location - South West Interview and Start within 2 weeks Key Skills - Project Management, Process consultant, Process efficiency, Process Improvement. Should this role be of interest to you, please submit your CV and contact Sevanna at Project Partners on 0207 098 1414
    Type:ContractLocation:South WestCountry:UKContact:Sevanna EdwardsAdvertiser:Project PartnersEmail:Sevanna.Edwards.C9F7C.0F08A@mail.jobserve.comReference:JSPP053424

What's On Tonight: Jezebel James, Smackdown, Best Week Ever

Filed under: Programming, What To Watch Tonight

  • At 8, FOX has the series premiere of The Return of Jezebel James.
  • CBS has another Price is Right Million Dollar Spectacular at 8.
  • NBC has new episodes of Amnesia and Dateline.
  • PBS has a new NOW at 8, followed by a new Washington Week.
  • There's a new Smackdown! on The CW at 8.
  • Nickelodeon has a new H20 at 8.
  • Also at 8: TCM has Gaslight, followed by Bunny Lake is Missing.
  • At 8:30, Cartoon Network has a new Out of Jimmy's Head.
  • At 9, ABC has a new, two hour 20/20.
  • VH-1 has a new Best Week Ever at 9.
  • At 9:30, HBO has a new In Treatment.
  • At 10, Comedy Central has two new episodes of Comedy Central Presents, with Juston McKinney and Nick Griffin.
  • E! has a new episode of The Soup at 10.

Check your local TV listings for more.

 

Permalink | Email this | | Comments

Comment on Queen Sheylara, Champion of Ping.sg Game, reveals all by Qiaoyun

LLY: Thanks. Yeah, I didn’t expect I would have so much to say when I started. But halfway through typing all that, I was like WTF I already type so much but I’m not even halfway to the end yet!

Well, why would you be getting nasty comments?

paced: Thanks! *takes a bow*

uzyn: Haha Uzyn. All your fault lah!!! :P

Ridz: Thanks for letting me win, lol.

Tianhong: I think it’s up to the individual. I really have a lot of patience for just sitting there and doing monotonous stuff. lol.

Buny: You got wake up meh? I thought your final score is the same as when you left at 2+?

Daphne Maia: Haha, itchy butt? Let me scratch for you. lol. ;)

Mike M: Well, maybe not “they”. It’s just one person in particular. :P

Priss: Yeah!! I always miss MMORPG when I’m away from it for too long. But nowadays really got no time to play it obsessively. *sigh*

arzhou: Haha grats! I think among the top 5, you’re the most regular Pingster! If you had more time to play, you would undoubtedly be the champion. lol.

Monster: Hahaha. Yah, that’s why I find the whole thing hilarious!

Jairus: Thanks? Er… you’re welcome, I guess. :P

Daryl Tay: I knowwwwwwwwwwwwwwww don’t rub it in! lol.

Rykarx: My nick is Sheylara. I always use that nick no matter what game I play lah. ;) Maybe catch you in game some time! Wang Wang plays a lot of mahjong irl. I don’t really. I’m a noob. Hehe.

Wang Wang: Thanks babe! mwaks!

rinaz: It’s ok, dear. Don’t feel bad. I’m finding it amusing. ;)

Ruok: Don’t BLUFF!! Intro!!!!!! I want free creditS!!!!

Miss Loi: Um… lol. I’m sure teachers have no time sitting on their butt playing silly games for hours, especially a famous teacher like Miss Loi! :P

cobaltpaladin: Hey, no worries, man. I enjoyed reading your post, and it’s all good fun. Nobody believes a word this “Bernard” says anyway. I’m waiting for him to come here and flame me but he seems to have disappeared. Haha.

By the way, thanks for reading my entire blog on your mobile phone. OMG! Champion lah you! :P

modchip: Thanks, bud! =)

darkelfin: Yup. Envy right?

Hui Hui aka Tara: Ah… don’t worry, I’m sure there’ll be a next time! :)