Monday, December 31, 2012

Merkel challenger under fire for saying chancellor underpaid

BERLIN (Reuters) - Chancellor candidate Peer Steinbrueck was widely criticized on Sunday, even by his own center-left Social Democrats (SPD), for saying German leaders were underpaid.

Steinbrueck has struggled to gain ground against Chancellor Angela Merkel ahead of next September's election, in part due to lingering criticism over him earning 1.25 million euros ($1.65 million) as an after-dinner speaker in the past three years.

The remarks from the former finance minister about what he called the inadequate compensation for the chancellor drew speedy rebukes across the country's political spectrum, including from the last SPD chancellor Gerhard Schroeder.

"A German chancellor does not earn enough based on the performance that is required of her or him compared with the jobs of others who have far less responsibility and far more pay," Steinbrueck, 65, was quoted on Sunday by the Frankfurter Allgemeine Sonntagszeitung newspaper saying.

"Nearly every savings bank director in North Rhine-Westphalia earns more than the chancellor does," Steinbrueck said of his home state.

Merkel's pay is set to rise by 930 euros per month to 17,106 euros in 2013 along with pay rises for her ministers and members of parliament, increases that have been criticized by some for sending the wrong signal in an era of austerity.

"Some of the debates kicked up by the 'guardians of public virtue' are grotesque and are harmful for anyone considering getting involved in politics," Steinbrueck said.

ELECTION

The SPD trails Merkel's conservatives by 10 points in opinion polls, but, with its Greens allies, it does have a chance of winning power in September because of the prolonged weakness of Merkel's Free Democrat (FDP) coalition partners.

Steinbrueck, whose blunt talk makes him popular among some voters despite him never winning a major election and him being defeated as state premier in North Rhine-Westphalia in 2005, said there were times in his career when he was not as well off and admitted he was now a "wealthy Social Democrat".

Schroeder, chancellor from 1998 to 2005, has endorsed Steinbrueck to lead his party against Merkel but distanced himself from Steinbrueck's views on pay.

"In my view politicians in Germany are adequately compensated," Schroeder told Bild am Sonntag newspaper. "I was certainly always able to live off the pay. And anyone who doesn't feel it's enough pay can always look for another job."

Other SPD leaders indirectly criticized Steinbrueck. Dieter Wiefelspuetz, a top SPD member of parliament, said politicians were misguided if they compared their wages to private industry.

"To serve as chancellor is a fascinating job and the pay is definitely not shabby," he said.

Steinbrueck was once seen as the center-left's best hope of winning back the chancellorship. He was popular as the no-nonsense finance minister and the SPD hoped he would siphon centrist voters away from the conservatives.

But the controversy over his earning 1.25 million euros for 89 speeches will not go away and his campaign has been marred by setbacks and awkward comments.

Analysts say he is also struggling to win over female voters, many of whom are put off by his combative style.

"Merkel is popular due to a 'woman's bonus' that she gets," Steinbrueck told the paper.

(Editing by Alison Williams)

Source: http://news.yahoo.com/merkel-challenger-under-fire-saying-chancellor-underpaid-091825202--sector.html

Perry Hall High School bill cosby us open bill nye Hurricane Isaac 2012 Snooki Baby terrell owens

Energy Part II: EROEI | Peak Oil News and Message Boards

Energy Part II: EROEI thumbnail

In the first part of this two part series we discussed how the sheer amount of energy coupled by its cheap cost enabled society to increase the amount of work that could be produced at a much reduced cost. It was this cheap energy subsidy that made the process of arbitrage between human labour and fossil powered capital very profitable as the price difference between hiring labour ?energy? and capital ?energy? was so vast.

This huge energy subsidy not only provided great wealth to the ruling classes who owned the factories and other capital infrastructure it also enabled the workers to become more materially wealthy as the cost of producing items was reduced drastically. This happened because all work requires energy to transform a basic resource into a commodity that is of economic value. If the energy cost is reduced and the supply of energy is greatly increased then the amount of work that can be achieved by a society will greatly expand and thus the items produced well sell at lower price due to the principles of supply of demand. What is important when discussing these matters of energy availability and will become increasingly important going forward is the concept of net energy. To understand this concept it would be wise to understand the laws of thermodynamics, more precisely the first law of thermodynamics. This law was originally described as:

?In all cases in which work is produced by the agency of heat, a quantity of heat is consumed which is proportional to the work done; and conversely, by the expenditure of an equal quantity of work an equal quantity of heat is produced.? ? Rudolf Clausius, 1850[1]

For the mathematically inclined the following

formula captures the law of conservation as

any heat input will equal the work done.

?

dU = dQ ? dW[2]

where U =Internal energy of system, Q = Heat input,

?W = work done

To many this statement may seem a little unwieldy and rather abstract but it basically describes the concept that energy cannot be created or destroyed and all energy transactions are merely conversions of one form of energy source to another. This idea is an important one to grasp since we can never actually generate energy; we merely extract it from existing sources.

This statement may seem rather obvious but since terms such as energy production and energy generation are so widespread it is easy to forget this fact. If we were to take such statements as energy production on a literal level they would be a clear violation of the first law of thermodynamics. Perhaps it can be argued this is just an argument over semantics and most people will know you cannot actually create energy but let us not underestimate the power of language and how it can shape conversations and narratives; over time people will believe such statements at face value as true even if they are patently false. This is especially relevant today when we hear so much talk about the US becoming not only energy independence but also becoming the top energy producer in the world.

But I digress, the main thing to take home is no form of energy extraction, be it from coal, nuclear fission (fusion for the optimists) and wind or solar actually generates energy. It just utilises existing energy sources. In the above examples energy is extracted either through nuclear fission/fusion reactions, potential chemical energy in coal/oil/gas or wind and solar energy. Another concept that will come from this basic idea and one that perhaps even more relevant is that it takes energy to get energy. This concept while important is something that rarely (if ever) gets discussed in the mainstream media. Much of the talk about oil, coal or gas ?production? only refers to the amount of total energy that can be obtained from burning or utilising a given resource. This amount is merely the gross energy obtained from the ground. If we wish to determine the amount of useful energy available for greater society however we need to subtract the amount of energy used to obtain the resource in the first place. This is because it is only this energy that gets to be used by society for other economy activities. Thus for us to work out net energy we subtract the gross energy by the energy needed to extract the resource as described in the formula.

Gross energy = Total amount of energy obtained from energy source.*

Net energy = Gross energy ? Energy required to obtain energy source.

* = Energy maybe expressed in other ways such as barrels of oil or million short tons of coal.

As a note net energy should not be confused with the similar but different term EROEI (Energy Return On Energy Invested) which describes the potential energy return from an energy source. The terms maybe used interchangeably by other commentators in the blogosphere but it would be a mistake to think they are the same thing. The way to calculate EROEI is quite different as demonstrated below:

EROEI =Gross energy / Energy required to obtain energy source.

or

EROEI = (Net energy/ Energy required to obtain energy source.) + 1

NOTE: Net energy is the energy available to society and thus something greater society would be interested in whereas EROEI is more of a potential concern for the person who wishes to see a return on their investment.

Since it is only net energy that gets used by the greater economy it is this value that we should be interested in knowing about rather than the gross amount. For example it is quite possible for our total gross energy to increase while our total net energy is actually in decline. If this were to happen we could easily see a scenario where we are getting materially poorer even though our total energy output is increasing. This process of increasing gross energy but declining net energy comes about due to the principle of low hanging fruit. That is the easiest and most favourable economic sources of energy ? which yield the highest net energy ? are extracted first and as those resources are depleted we move onto progressively worse and worse sources. It is this fact that the decline in net energy will be much steeper than gross energy decline.

This trend of declining net energy has likely already past as the newest sources of energy, a lot of which is touted as the energy source that will give the US energy independence actually yield poor amounts of new net energy. This is despite the fact this new energy sources (shale oil/gas) increase the amount of gross energy expended by the economy quite substantially. As a result from an economic standpoint these new sources of energy will deliver less economic benefit to society than would otherwise be believed as the extra net energy available will be more limited. It this reason why we should exercise caution when listening to claims that these sources of energy can offer a panacea to our economic troubles. In fact when hearing such claims it is useful to know the energy returns on energy for various sources as while this is not net energy which is ultimately the most important metric to gauge the EROEI can still provide an insight on how useful these sources will be:

As the graph clearly demonstrates; early sources of energy yielded a very high return of energy on energy invested. These high returns came about because early sources of energy such as shallow coal mines did not need much capital investment to extract the resource furthermore once these resources were obtained they would yield high quality energy such as light sweet oil or in the case of coal high quality anthracite. It is this reason in fact why net energy or EROEI has largely been ignored as historically gross energy for all intents and purposes equalled net energy.

In recent years however this has not been the case and the difference between gross and net energy is sufficiently large to warrant greater attention. Moreover another troubling fact to take note is that once EROEI reaches about 10:1 or lower the graph goes into steep decline. This steep decline means the available net energy that can be used by society will begin dropping at an alarming rate if current trends of extracting lower quality energy sources continue. If we take a recent major discovery of shale oil we discover the EROEI for this resource is 5.[3] In net energy terms this represents 20% of the total gross energy being used to extract the energy source. So from this information we can say that if all existing resources of energy were replaced by sources that were to yield returns equivalent to shale oil then our total net energy available to society would decline by 20%. This assumes there are no efficiency gains in how we utilised this energy and total gross energy remained constant. If that is the case then this would effectively mean we are 20% poorer as less energy would be available for economic transactions.

Off course what is more likely to happen is the EROEI and thus net energy will decline even faster than suggested in the previous paragraph as worse and worse sources of energy come online to replace existing high EROEI resources. As a result we are likely to see a steep decline in net energy available to society and we can say with some certainty that this decline in net energy will be faster than the rate of efficiency gains which has been around 1.7-3.0% per annum since the 1970s.[4] [5]

What is more due to the rebound effect (see this article for more info) it is likely that any efficiency gains made will need to exceed declines in available net energy by a few percentage points each year if we want sustain economic growth (which is a requirement for the financial system to remain stable). This all seems unlikely particularly if we consider that energy efficiency and conservation strategies will see diminishing rates of return as it becomes harder to increase energy efficiency after each progressing year. After all no economic activity can ever achieve 100% efficiency. Speaking of 100% efficiency this leads on nicely to the second law of thermodynamics which states:

?That the entropy of an isolated system never decreases, because isolated systems spontaneously evolve towards thermodynamic equilibrium ? the state of maximum entropy.?

Like the first law, this sentence describing the second law can seem a little unwieldy. In fact it is best to breakup this statement into two sentences as the quotation above addresses two very relevant points the first of which is displayed below:

?No process is possible in which the sole result is the absorption of heat from a reservoir and its complete conversion into work.? ? William Thomson, 1st Baron Kelvin, 1851[6]

In other words no energy transaction can ever be 100% efficient meaning some energy will always be lost when converting energy into some form of work. This point while blatantly obvious is often overlooked in the contexts of economics and broader society. It is this reason why there will always be a limit to amount of economic growth that can be realised as the planet has a finite number of resources and there are limits to the amount of efficiency that can be achieved. Another major consequence that does derive from the second law of thermodynamics comes from this statement:

?Heat can never pass from a colder to a warmer body without some other change, connected therewith, occurring at the same time.? ? Rudolf Clausius, 1850[7]

While at first glance, the concept of heat transfers may seem a little out there this statement does pertain to one important idea. That is over time all bodies and structures go from a process of order to disorder. For those that are really curious about this process and wish to learn more about the exact mechanics of this process please look up entropy. If this idea still seems a bit out there consider the fact that all structures, be it capital or labour, degrade over time and require maintenance to allow proper functioning. This maintenance always requires energy and thus some resources will always be needed to maintain current capital or labour.

?

?

The entropy of a system can be calculated by applying the following formula:

dS = dQ / T[6]

where S = entropy, Q = Heat input, T = Temperature of system.

If we use the formula from the first law of thermodynamics and

rearrange the formula

shown above this statement can be derived:

dU + dW = TdS

?*4 basic thermodynamic relationships develop out of this math

?

Internal Energy dU=TdS-PdV+??dN

Enthalpy (Heat) dH=TdS+Vdp+??dN

Hemholtz Free Energy dF=-TdS-pdV+??dN

Gibbs Free Energy dG=-TdS+Vdp+??dN

?

If you do a little basic algebra, you get

dG=dH-TdS

This equation gives the Free Energy available in a system as a function of the

Heat Content, the Temperature and the Entropy in the system. Only reactions

with positive dG can go forward without Heat Input.

*from RE

In the case of labour humans need food to stay alive and remain functioning while capital requires some energy inputs to prevent it from degrading and evening breaking down over time. What is more the greater the complexity of a structure the more energy will be required for maintenance. This is because a more complex structure has a greater degree of order and since things naturally go from a state of order to disorder then more energy will be needed to prevent overcome this natural process.

This is another weakness with applying the logic that technology will save the day as increasing the complexity of technology not only increases the existing maintenance cost due to the second laws of thermodynamics; the cost of producing such items increases as more energy per unit weight are needed in the manufacture of the product. To demonstrate this example a car requires something in the region of 12-25 barrels of oil to build a car depending on the weight of the car but a computer ? on a weight by weight basis ? requires 10 times the amount of energy to manufacture.[9] A similar cost will be borne in maintaining these two pieces of capital. While in theory there can be energy savings on a production basis as less energy will be consumed despite the increased weight for weight costs (we do not need 1000kg+ worth of computers after all) what will increase significantly are maintenance costs of more complex infrastructure. To give a better idea of this concept at work consider healthcare. As the capital becomes increasingly complex capital then the maintenance costs will rise for the reasons described above.

To summarise this article and the one before it; when we wish to engage in a discussion on energy we need to be aware of range of things. First we need to understand the sheer amount of energy fossil fuels provide. It is truly immense and is a miracle resource and there needs to be a greater appreciation just how much energy they can deliver. From this we can truly grasp the scale of the task an energy transition (if it is even possible) will be. It is seems unlikely to me any combination of renewable or nuclear energy can fill the gap left by fossil fuels. That is not to say renewables cannot make life easier, they do have their uses but we would be setting our expectations too high if we expect them to maintain our current industrial lifestyles.

The other important points that need to be considered is the point we should be interested in not only the quantity of energy delivered but also the quality of energy. At the end of the day it is net energy or EROEI we are really interested in as it is this energy that gets used for greater society. Finally we need to be aware that due to the increasingly complexity of society our maintenance costs will rise due to the second law of thermodynamics so these costs need to be accounted for.

Doomstead Diner


Source: http://peakoil.com/generalideas/energy-part-ii-eroei/

rosie o donnell soda bread recipe vanderbilt evan mathis staff sgt. robert bales jason russell norfolk state

US defeats South Africa

The United States claimed a 2-1 victory over South Africa at the Hopman Cup mixed team competition on Sunday.

Venus Williams rallied to defeat Chanelle Scheepers 4-6, 6-2, 6-3, before Kevin Anderson leveled for South Africa with a 7-6 (0), 7-6 (5) win over John Isner.

The U.S. clinched the match with a 6-3, 6-2 win in mixed doubles.

Later Sunday, Jo-Wilfried Tsonga saved three set points before overcoming Fernando Verdasco 7-5, 6-3 to give France a 1-0 lead over Spain. Anabel Medina Garrigues next faces Mathilde Johansson, with mixed doubles to follow.

Williams took time to settle against an opponent who rallied well and hit the ball deep. But after conceding her serve at love to leave Scheepers serving for the first set, the American looked increasingly comfortable and aggressive.

After taking the second set when her opponent double-faulted, she then swept to a 4-0 lead in the third on her way to closing out the match.

Isner held the only break point of the first set for a 4-2 lead but missed his return. In the second set, Isner fought off three break points at 3-2 and another at 4-3, but again fell short in the tiebreaker.

Williams was playing for the first time since winning the Luxembourg event in mid-October and was satisfied with her performance.

"I was just trying to find some rhythm out there," Williams said. "She's obviously a really good player having maintained a top 40, top 50 ranking the last couple of years. She played a match yesterday too so had an extra advantage. It felt good out there.

"I'm not expecting to be perfect now but I'm thinking that my game will get better every match. I think the (mixed) doubles will help as well to hone everything. More than anything I was just so excited to be out there playing and I'm ready to go for it."

Despite health problems that have limited her schedule, Williams is looking forward to the challenges and opportunities that the new season presents.

"Last year was so awesome for me, getting to the Olympics. I was extremely happy with last year and I moved up quite a few spots," she said. "This year is just about building on it and putting myself into position to play deep into the draws."

Source: http://www.iafrica.com/articles/834516.html

miami heat bulls california earthquake california earthquake tyson chandler tyson chandler stephen hill

Sunday, December 30, 2012

CSN: Pats blank Dolphins, earn first-round bye

December 30, 2012, 7:18 pm

???
FOXBORO -- Bill Belichick had laid it our clearly on Friday.

"There's nothing that we can do to help ourselves unless we beat Miami," the Patriots coach said when addressing the myriad of postseason possibilities they faced heading into Sunday. "There's nothing we can do to help our situation unless we win. So we have to win for anything [positive] to happen . . . "

How right he was. They won . . . and, on a frigid late afternoon/early evening at Gillette Stadium, positive things happened.

They got the break they needed at 1 o'clock, when the Colts knocked off the Texans. They proceeded to help themselves with a stifling 28-0 shutout of the Dolphins -- their first shutout since a 59-0 win over the Titans in late October 2009 -- that enabled them to leapfrog Houston into the second overall seed, which carries with it a first-round bye, in the AFC playoffs.

The Patriots and Texans both finished with 12-4 records, but New England won the tie-breaker thanks to its head-to-head victory over Houston three weeks ago.

"It's great," said safety Steve Gregory, whose first-half interception jump-started the Pats' beatdown of the Dolphins. "Any time you can get a bye [in the] first round of the playoffs, it's a good thing."

The Pats didn't get any 4 o'clock help from the Chiefs, as Denver blasted Kansas City and clinched the overall No. 1 seed. So -- unlike their last two trips to the AFC Championship Game -- they'll have to go on the road if form holds and the Pats and Broncos win their semifinal-round matchups.

"Whatever it is, it is," said Belichick. "[Wherever] we have to play [in the postseason], we'll play."

But the case can be made that the bye -- which gives them a week to rest their ailing troops (no fewer than 21 players were on last week's injury list) -- is just as important as the seeding.

"[It's] good to get that rest, get some guys healthy," said Gregory. "I know some guys are banged up, so it's good for us."

The Pats took care of it early.

Gregory's interception on Miami's second possession gave the Patriots the ball on the Dolphin 28, and Tom Brady got them home in two plays: A 19-yard pass to Rob Gronkowski, playing his first game since suffering a broken arm against Indianapolis on Nov. 18, and a 9-yard scoring toss to Wes Welker.

That made it 7-0, and may as well have been 70-0 the way the Pats' defense was handling the Dolphin offense. The Pats held Miami to 45 total yards in the first quarter (New England had 172), and only 106 yards in the first half. (New England had 279. The final Patriot advantage was 443-256.). They limited the Dolphins to 24:22 possession time, and had a season-high seven quarterback sacks.

Miami's only threat came in the third quarter, but then the defense made another big play: Dont'e Hightower recovered a botched handoff by quarterback Ryan Tannehill on the Patriots' 1-yard line.

"That's always awesome, when you walk away with a goose egg on the scoreboard," said defensive captain Vince Wilfork. "That's very, very satisfying."

By that time the score was 21-0 thanks to a pair of second-quarter touchdowns by Stevan Ridley. The first, from one yard out, capped a 13-play, 92-yard drive; the second, from two yards away, finished off a 14-play, 69-yard march.

The Patriots added their final touchdown in the fourth quarter when, after the defense had stopped Miami on fourth down and gave the offense the ball at the Dolphin 47, Brady hit Gronkowski with a 23-yard touchdown pass.

So now -- after the week off -- the second season begins. And the Pats' aim is to rise to the challenge as well as they did Sunday evening.

"We've got to start playing our best [football from here on in], and tonight was a good night to start it," said Wilfork.

"I think everyone knows once you go into the playoffs, teams step it up a notch, so we?re going to have to do our part and try to step it up and match [them]," said Devin McCourty.

"If we keep improving and getting better, we?ll be able to get there."

Tags: New England Patriots, Miami Dolphins, patriots1230

Source: http://www.csnne.com/football-new-england-patriots/patriots-talk/Patriots-clinch-first-round-bye-with-28-?blockID=818559&feedID=10950

bks new dark knight rises trailer khloe and lamar oklahoma city thunder rajon rondo sunoco titanic ii

Starbucks expands cup campaign aimed at U.S. fiscal deal

(Reuters) - Starbucks Corp is expanding its campaign of using messages written on coffee cups to inspire U.S. lawmakers to reach a deal and avoid going over the "fiscal cliff" of automatic tax hikes and government spending cuts.

As President Barack Obama and congressional leaders were in a final effort to reach a budget agreement before year's end, Starbucks this week began urging workers in its roughly 120 Washington, D.C.-area shops to write the words "come together" on customers' cups.

A spokesman for the world's largest coffee chain said the company would expand the effort to all U.S. stores, continuing through next week.

"Stores from across the country have been asking if they could join in and we have been saying absolutely yes," Starbucks spokesman Jim Olson said in an email late Friday.

"Based on this unprecedented response, we are inviting all of our partners at U.S. stores to start signing their customers' cups with Come Together through next Friday," Olson said.

Starbucks' cup campaign aims to send a message to sharply divided politicians and serve as a rallying cry for the public in the days leading up to the January 1 deadline to avert harsh across-the-board government spending reductions and tax increases that could send the U.S. economy back into recession.

"We believe the (Washington) DC effort caught on so swiftly because they Come Together message is such a simple and respectful gesture that expresses the optimism that is core to our country's heritage and to Starbucks mission," Olson said.

"This is an important moment for Starbucks to use its scale for good and give Come Together an even louder voice - as we move from signing tens of thousands of cups in DC to tens of millions of cups across the U.S. over the course of next week."

(Reporting by Julie Ingwersen; Editing by Vicki Allen)

Source: http://news.yahoo.com/starbucks-expands-cup-campaign-aimed-u-fiscal-deal-164328478--finance.html

agoraphobia andrew lloyd webber obscura grok cirque du freak eric cantor eric cantor

Road trip on tap for NASA's Mars rover in new year

FILE - This Dec. 12, 2012 file image provided by NASA shows the Mars rover Curiosity at a pit stop, a shallow depression called "Yellowknife Bay." It took the image on the 125th Martian day, or sol, of the mission (Dec. 12, 2012), just after finishing that sol's drive. The Sol 125 drive entered Yellowknife Bay and covered about 86 feet (26.1 meters). The descent into the basin crossed a step about 2 feet (half a meter) high, visible in the upper half of this image. Curiosity will now head for Mount Sharp in mid-February after it drills into its first rock. (AP Photo/NASA/JPL-Caltech, File)

FILE - This Dec. 12, 2012 file image provided by NASA shows the Mars rover Curiosity at a pit stop, a shallow depression called "Yellowknife Bay." It took the image on the 125th Martian day, or sol, of the mission (Dec. 12, 2012), just after finishing that sol's drive. The Sol 125 drive entered Yellowknife Bay and covered about 86 feet (26.1 meters). The descent into the basin crossed a step about 2 feet (half a meter) high, visible in the upper half of this image. Curiosity will now head for Mount Sharp in mid-February after it drills into its first rock. (AP Photo/NASA/JPL-Caltech, File)

FILE - This file image provided by NASA shows the base of Mount Sharp on Mars. The Curiosity rover is set to drive toward the mountain in mid-February after drilling into a rock. The image was taken by Curiosity's 100-millimeter Mast Camera on Aug. 23, 2012. Scientists enhanced the color in one version to show the Martian scene under the lighting conditions we have on Earth, which helps in analyzing the terrain. (AP Photo/NASA/JPL-Caltech/MSSS, File)

FILE - This file image provided by NASA shows a color self-portrait of the Mars rover Curiosity. It is set to drive toward a Martian mountain in mid-February after drilling into a rock. On the 84th and 85th Martian days of the NASA Mars rover Curiosity's mission on Mars (Oct. 31 and Nov. 1, 2012), NASA's Curiosity rover used the Mars Hand Lens Imager (MAHLI) to capture dozens of high-resolution images to be combined into self-portrait images of the rover. (AP Photo/NASA/JPL-Caltech/MSSS, File)

PASADENA, Calif. (AP) ? Since captivating the world with its acrobatic landing, the Mars rover Curiosity has fallen into a rhythm: Drive, snap pictures, zap at boulders, scoop up dirt. Repeat.

Topping its to-do list in the new year: Set off toward a Martian mountain ? a trek that will take up a good chunk of the year.

The original itinerary called for starting the drive before the Times Square ball drop, but Curiosity lingered longer than planned at a pit stop, delaying the trip.

Curiosity will now head for Mount Sharp in mid-February after it drills into its first rock.

"We'll probably be ready to hit the pedal to the metal and give the keys back to the rover drivers," mission chief scientist John Grotzinger said in a recent interview at his office on the sprawling NASA Jet Propulsion Laboratory campus 15 miles east of downtown Los Angeles.

The road trip comes amid great expectations. After all, it's the reason the $2.5 billion mission targeted Gale Crater near the Martian equator. Soaring from the center of the ancient crater is a 3-mile-high peak with intriguing layers of rocks.

Curiosity's job is to figure out whether the landing site ever had the right environmental conditions to support microbes. Scientists already know water flowed in the past thanks to the rover's discovery of an old streambed. Besides water, life as we know it also needs energy, the sun.

What's missing are the chemical building blocks of life: complex carbon-based molecules. If they're preserved on Mars, scientists figure the best place to hunt for them is at the base of Mount Sharp where images from space reveal hints of interesting geology.

It's a six-month journey if Curiosity drives nonstop. But since scientists will want to command the six-wheel rover to rest and examine rocky outcrops along the way, it'll turn into a nine-month odyssey.

Before Curiosity can tackle a mountain, there's unfinished business to tend to. After spending the holiday taking measurements of the Martian atmosphere, Curiosity gears up for the first task of the new year: Finding the perfect rock to bore into.

The exercise ? from picking a rock to drilling to deciphering its chemical makeup ? is expected to last more than a month.

"We have promised everybody that we're going to go slowly," said Grotzinger, a geologist at the California Institute of Technology.

Curiosity's low-key adventures thus far are in contrast to the drama-filled touchdown that entranced the world in August. Since the car-size rover was too heavy to land using a parachute and airbags, engineers invented a daring new way that involved lowering it to the surface by cables. The risky arrival proved so successful and popular that NASA is planning an encore in 2020.

Curiosity joined another NASA rover, Opportunity, which has been exploring the Martian southern hemisphere since 2004. Opportunity's twin, Spirit, stopped communicating in 2010.

After nailing the landing, Curiosity fell into a routine. The first month was dominated by health checkups ? a tedious but essential prerequisite before driving. A chemistry laboratory on wheels, it's the most high-tech spacecraft to land on another planet so extra care was taken to ensure its tools, including its rock-zapping laser and robotic arm, worked.

Once it got the green light, it trundled to a waypoint that's home to three unique types of terrain to perform science experiments. Every time Curiosity roves, it leaves Morse code tracks in the soil, providing a visual signal between drives. The message spells out JPL, short for Jet Propulsion Lab, which built the rover.

So far, its odometer has logged less than a mile. Despite the slow going, scientists have been smitten with the postcards it beamed home, including a stylish self-portrait and tantalizing glimpses of Mount Sharp.

Huge expectations weigh on the mission with NASA balancing the need to feed the public's appetite while pursuing discoveries at its own pace. Last month, the space agency quashed Internet speculation that Curiosity had detected complex carbon compounds in a pinch of Martian soil by issuing a statement ahead of a science meeting where the team was due to present the latest findings.

American University space policy professor Howard McCurdy said Curiosity is currently in a transition, caught between the viral landing and the scientific payoff expected at Mount Sharp.

"It is interesting, but slow," he said in an email. "I expect public interest will rise as the rover gets closer to its destination."

Curiosity's prime mission lasts two years, but NASA expects the plutonium-powered rover to live far longer. A priority for its human handlers is to learn to operate it more efficiently so that it becomes second nature. Before heading to Mount Sharp, engineers plan a software update to Curiosity's computers to fix remaining bugs.

"We'll need to be pretty careful," project manager Richard Cook said of the upcoming drive. "We may find terrain that we're not comfortable driving in and we'll have to spend time driving around stuff."

___

Follow Alicia Chang at http://twitter.com/SciWriAlicia

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/3d281c11a96b4ad082fe88aa0db04305/Article_2012-12-29-Mars%20Curiosity/id-b6ca6fc0cb924506b9ffe1ba1093c348

the vow review luol deng culkin wooly mammoth no child left behind no child left behind neurofibromatosis

Saturday, December 29, 2012

New Hawaii Sen. Brian Schatz: Climate Change Is the "Most Urgent Challenge of Our Generation" (Little green footballs)

Share With Friends: Share on FacebookTweet ThisPost to Google-BuzzSend on GmailPost to Linked-InSubscribe to This Feed | Rss To Twitter | Politics - Top Stories News, RSS and RSS Feed via Feedzilla.

Source: http://news.feedzilla.com/en_us/stories/politics/top-stories/273479333?client_source=feed&format=rss

facebook buys instagram kevin systrom fibonacci sequence maryland lottery grand jury ozzie guillen fidel castro darvish

Silverleaf VMSpc Engine Monitoring System - RV Accessory News

Posted by admin at 28 December, at 10 : 23 AM Print

The engine monitoring and diagnostic capabilities in most diesel pusher RV?s is pretty much non existent. ? So when a check engine light appears on your dash you have no idea as to what is going wrong and how severe it maybe. ? Now you can keep close tabs on your RV?s engine with your laptop and the Silverleaf VMSpc software. The VMSpc is an intelligent data translator that links your USB port to the engine diagnostic connector in your motorhome.? Together with this special software you can read performance and diagnostic information right on your laptop computer. You get complete diagnostics, trip information, and a great graphing capabilities that lets you display up to five parameters at once. You can even store the engine data to a file and load it into a spreadsheet.

But wait! That?s not all! The SilverLeaf VMSpc let?s you program audible alarms based on any engine parameter. For example, when your road speed reaches a certain point. Have it played once, once a minute, or continuously.? You can even create a ?Tank Minder?, which provides a miles-to-empty calculation based on your fuel tank size and engines fuel economy.? VMSpc also lets you enter correction factors to compensate for a poorly calibrated engine. You can even program gauges to read in metric, if you so desire.Professional automotive engineers use VMSpc to test their vehicle designs. Now you can use the same tools to test your coach.Feel free to download the VMSpc software ? it?s free. In fact, SilverLeaf Electronics is committed to provide the VMSpc software and all updates absolutely free on their web site.? They also welcome your input, and encourage you to tell them what you?d like to see in future versions of VMSpc.? Download VMSpc here.The SolverLeaf VMSpc kit includes theVMSpc JIB (JS501), 6 ft USB cable, 5 ft engine diagnostic harness (specify 6 pin or 9 pin), CD with software & Owner?s Manual.

Computer System Requirements

-Windows 95, 98, ME, 2000, XP, Vista, or 7. Windows 95 users require a special version.
-Pentium 120 or better CPU
-16 mb RAM, Hard Drive
-RS-232 Serial Port or USB Port

RV Electronics Allison Transmission, Silver leaf vmspc, Silverleaf, vmspc

Source: http://rvaccessorynews.com/2012/12/28/silverleaf-vmspc/

tornadoes in dallas anchorman 2 kentucky basketball oaksterdam the fray national anthem dallas tornado ncaa basketball

This Date in Washington Senators History

1970 The New York Times reports that Curt Flood will sue major league baseball and challenge the reserve clause. Flood would make his way back to the major leagues for 20 games as a Senator in 1971, his last stint in the major leagues.

Senators Birthdays

Thomas Herbert Upton B Dec. 29, 1926 D Mar. 24, 2008

Originally signed by the New York Yankees before the 1944 season, infielder Tom Upton would be drafted by the St. Louis Browns after the 1949 season and would debut in the majors in mid-April of 1950.

Appearing in 124 games his first season, Upton would hit .237. With the Browns in 1951, Upton only made it into 52 games as his batting average would drop to .167.

After the 1951 season, Upton would be part of a multi-player trade that would send him to the White Sox. He?d be traded again the same day to the Washington Senators for Sam Dente.

Upton would appear in 5 games in a Senators uniform, going 0-5 at bat with 1 walk and 1 run scored, his last appearance coming in late April.

A few days later Upton would be headed back to the New York Yankees along with Irv Noren in exchange for Jackie Jensen, Spec Shea, Jerry Snyder and Archie Wilson. However, Upton would never crack the Yankees lineup.

Tom Upton career record

Source: http://dcbaseballhistory.com/2012/12/this-date-in-washington-senators-history-204/

college board nyc.gov SAT Notre Dame Football Schedule detroit tigers Tsunami Lil Reese

Friday, December 28, 2012

Stocks open lower as investors eye 'cliff' deadline

21 min.

Stocks opened in negative territory across the board Friday, as Wall Street nervously looked to Washington to see if a deal on the "fiscal cliff" could be struck before the end of the year.

The Dow Jones Industrial Average opened lower, led by Bank of America and JPMorgan, a day after finishing lower for the fourth-straight session.?

The S&P 500 and the Nasdaq also declined at the open. The CBOE Volatility Index (VIX), widely considered the best gauge of fear in the market, gained above 20.

All key S&P sectors fell at the open, led by energy and industrials.?

President Barack Obama will meet congressional leaders from both parties at the White House later this afternoon, just days before the deadline to reach a deal or see the a series of automatic spending cuts and tax hikes come into force.?

House Speaker John Boehner, Senate GOP leader Mitch McConnell, Senate Majority Leader Harry Reid, House Democratic Leader Nancy Pelosi and Vice President Joe Biden are scheduled to attend Friday's meeting. If a deal is not possible, Obama and the leaders would leave the resolution to the next Congress to address in January.

Stocks tumbled Thursdaybut recovered most of their intraday losses after the House of Representatives said it would reconvene this Sunday to resume budget talks.?

On the economic front, Chicago PMI for December will be released at 9:45 am ET, while November pending home sales will be reported at 10 am ET. Economists expect a reading of 51 and a gain of 1 percent, according to a Reuters survey.?

Hewlett-Packard confirmed that the Justice Department is looking into its allegations that Autonomy engaged in accounting fraud prior to its acquisition by HP last year.

Apple is among stocks in focus after a Chinese court fined the iPhone maker $160,000 for hosting third-party applications on its App Store that were selling pirated electronic books, Xinhua news agency said.

Among airlines, Raymond James raised its price target on Delta Airlines, Southwest Airlines, U.S. Airways, Spirit Airlines and Alaska Air.?

Source: http://www.nbcnews.com/business/stocks-open-lower-investors-eye-cliff-deadline-1C7753894

Michael Clark Duncan michael jackson courtney stodden Ncaa Football Scores Plaquemines Parish michigan football michigan football

Sweater knit by Myanmar's Suu Kyi sells for $49K

In this Thursday, Dec. 27, 2012 photo, presenters show a hand-knit woolen sweater, made by Myanmar opposition leader Aung San Suu kyi, during an auction at a fundraising concert to mark the 2nd anniversary of her National League for Democracy Party's education network, at Peoples Square in Yangon, Myanmar. The sweater was sold at an auction in Myanmar for almost $50,000. (AP Photo/Khin Maung Win)

In this Thursday, Dec. 27, 2012 photo, presenters show a hand-knit woolen sweater, made by Myanmar opposition leader Aung San Suu kyi, during an auction at a fundraising concert to mark the 2nd anniversary of her National League for Democracy Party's education network, at Peoples Square in Yangon, Myanmar. The sweater was sold at an auction in Myanmar for almost $50,000. (AP Photo/Khin Maung Win)

In this Thursday, Dec. 27, 2012 photo, a hand-knit woolen sweater, made by Myanmar opposition leader Aung San Suu kyi, is displayed on the stage during an auction at a fundraising concert to mark the 2nd anniversary of her National League for Democracy Party's education network, at Peoples Square in Yangon, Myanmar. The sweater was sold at an auction in Myanmar for about $50,000. (AP Photo/Khin Maung Win)

YANGON, Myanmar (AP) ? A hand-knit woolen sweater made by Nobel laureate Aung San Suu Kyi has sold at an auction in Myanmar for $49,000.

A Myanmar-based radio station won a bidding war for the sweater during an auction Thursday night held by Suu Kyi's opposition party. The bidding started at $6,000.

Suu Kyi knitted the sweater ? a red, green and blue V-neck ? almost 30 years ago when she was living in England and raising her two children, said Ko Ni, a close aide.

"She made it when she was busy working, studying and taking care of her children," Ko Ni told The Associated Press on Friday. "She wants to send the message that people should not stay idle but be diligent."

Suu Kyi, a 67-year-old former political prisoner and winner of the 1991 Nobel Peace Prize, has become Myanmar's biggest celebrity as the country transitions from a half-century of military rule. She is generally guarded about the family she left behind in England.

The Oxford graduate was raising two young sons with her late British husband when she returned to Myanmar in 1988 to nurse her dying mother. As daughter of the country's independence hero, Gen. Aung San, who was assassinated in 1947 when she was just 2, Suu Kyi found herself thrust into the forefront of pro-democracy protests against the military regime.

Over the next two decades, she became the world's most famous political prisoner and won the adoration of her people, who call her "Amay Suu" ? or "Mother Suu," partly because she chose to stay with them over her own children. She declined opportunities to leave Myanmar, fearing she would not be allowed to re-enter.

Since her release from house arrest in 2010, Suu Kyi has reunited with her sons and completed a stunning trajectory from housewife to political prisoner to opposition leader in Parliament.

The sweater's proud new owner said it was worth the money.

"It is priceless because the sweater was made my 'Amay' herself," said Daw Nan Mauk Lao Sai, chairwoman of Shwe FM radio station.

"I bought the sweater because I value the warmth and security it will give," she said, adding that she plans to hang it up in the station's office for the whole staff to see. She said the 41,500,000 kyat, or $49,000, spent on the sweater was for a good cause.

The auction was part of a fundraising concert organized by Suu Kyi's National League for Democracy party to raise money for education of poor children in Myanmar, an impoverished Southeast Asian nation also known as Burma.

___

Associated Press writer Jocelyn Gecker in Bangkok contributed to this report.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/cae69a7523db45408eeb2b3a98c0c9c5/Article_2012-12-28-Myanmar-Suu%20Kyi's%20Sweater/id-bd57a69a408b409aae5205e96def0d9f

Red Bull Stratos Redbull Stratos steve mcnair vice presidential debate Martha Raddatz Chris Lighty JJ Watt

'Frankenfish' Nears FDA Approval as Debate Heats up

Genetically engineered salmon could make its way onto plates in the new year, but your body won't notice anything fishy about the filet, experts say.

The Food and Drug Administration has determined genetically engineered salmon won't threaten the environment, clearing it of all but one final hurdle before it shows up on shelves throughout the nation -- and igniting a final 60-day debate on whether it poses health risks before it's officially approved.

Although it's been nicknamed "Frankenfish" by critics, health professionals say they aren't worried the lab-engineered salmon will cause more allergies or other harmful effects than any other breed of fish.

"The hard science part is that we have been creating [animals] using genes and natural selection for years to genetically predict what kinds of food animals, and recreational animals and such we have on our planet," said Dr. William Schaffner, chairman of preventive medicine at Vanderbilt University Medical Center in Nashville, Tenn.

He cited thoroughbred horses, show dogs and crops as examples of genetically engineered plants and animals dating back centuries.

"When Farmer Jones did it in his cornfield to try to get a better crop, it didn't bother people," Schaffner said. "When scientist Jones did the same thing in a much more sophisticated fashion in a lab, that does bother people."

Superfish: DNA-Altered Salmon Coming to Your Dinner Plate? Watch Video California's 'Frakenfood' Vote, Legalization of Gay Marriage, Pot Watch Video

A biotech company in Massachusetts called AquaBounty created the AquaAdvantage salmon, which is really an Atlantic salmon with an added Pacific salmon gene to make it grow faster and an added eel gene to make it grow year-round.

The end result is a fish that tastes like an Atlantic salmon but grows twice as fast, making it cheaper to produce and sell. Because the FDA likely won't require a label that says the salmon was genetically modified, consumers won't know the difference.

Click here to read about ABC News' exclusive look at the AquaBounty facility.

Schaffner thinks genetically engineered food is one way to help solve world hunger and, as long as the FDA thoroughly reviews it, there shouldn't be a problem.

But Rep. Dennis Kucinich, D-Ohio, said he's been disappointed with FDA decisions on genetically modified food since 1992, when the FDA determined it is equivalent to any other food. He said there's not enough science to allow AquaAdvantage onto our dinner plates, but the biotech industry has had so much influence in Congress that it's been impossible to stop.

"Now this latest action by the FDA somehow determined that the salmon is safe -- safe for who?" he asked. "Safe for the investors?"

Kucinich has introduced legislation related to genetically modified food and labeling in every Congress since 1997, but it has never passed. He said Monsanto, the $2 billion company that produces genetically modified seed and pesticides, is partially to blame because it has so much money and influence.

AquaBounty, the biotech firm that makes AquaAdvantage, contributed less than $150,000 toward lobbying Congress over the last three years, according to campaign finance records available on OpenSecrets.org. In contrast, Monsanto spent more than $19 million lobbying over the same time frame.

Kucinich said the AquaAdvantage issue is a complex one, and worries about whether the genetically altered fish will hurt naturally occurring wild fish populations by overfeeding because they grow twice as fast as their naturally occurring relatives. However, the most recent FDA finding showed that this is not a concern because the fish are mostly sterile and not expected to escape their man-made farms.

Source: http://abcnews.go.com/Health/genetically-modified-frankenfish-nears-fda-approval-debate-heats/story?id=18078157

april fools pranks livan hernandez soledad o brien mega ball lottery winner lottery numbers mega millions lottery

Thursday, December 27, 2012

Only son of Pakistan's murdered Bhutto launches political career

LARKANA, Pakistan (Reuters) - The only son of assassinated former Pakistani prime minister Benazir Bhutto told hundreds of thousands of supporters on Thursday, the fifth anniversary of his mother's death, that he would carry forward her legacy, an appearance designed to anoint him as a political heir.

"I am the heir to the martyr," Bilawal Bhutto Zardari, 24, told the crowd in the southern province of Sindh, referring to his mother and to his grandfather, the founder of the current ruling party who was hanged by a former military ruler.

"If you kill one Bhutto, there will be a Bhutto in every house."

Bhutto was joined by hundreds of high-ranking officials, including the current president, his father Asif Zardari, to commemorate his mother's killing in a gun and suicide attack during a 2007 political campaign rally.

Making his first address to a mass rally televised live, he said: "Bhutto is not a name, it is an obsession, a passion, a love. You can chain our feet to the ground but we will still keep moving."

Prime Minister Raja Pervez Ashraf told followers waving the Pakistan People's Party's green, black and red flag that the Oxford-educated Bhutto "will prove to be an important turning point for democracy and politics".

Bhutto was named party chairman after his mother's death, but his father was named co-chair due to his youth.

He is still not old enough to contest the elections scheduled for spring - the minimum age is 25. Bhutto, who has his mother's good looks, will only turn 25 in September.

Zardari, locking arms with his son and waving to the crowd, said: "Bilawal has completed his studies, but the time has now come to complete his political training, to stay in Pakistan among its people and learn from them."

Benazir Bhutto's killer has never been caught and a U.N. inquiry found that Pakistani authorities had failed to protect her or properly investigate her death. The U.N. also said that high-ranking Pakistani officials had tried to block its investigation.

In a 30-minute address delivered alongside his mother's onion-domed tomb, Bhutto denounced the courts for what he said was the slow pace of the trial of her alleged killers. He also touched on women's rights, insurgent violence, and the economy.

POWERFUL SYMBOL

Benazir Bhutto has become a powerful symbol for the ruling party, which often refers to her as a martyr. The capital's airport and a scheme to give cash to poor families have been named after her. Officials hang her portraits on walls.

The Bhuttos championed the rights of the poor in a country where feudal landlords owned vast tracts of land and agricultural workers often live in deep poverty. Many rally participants waved portraits of Benazir Bhutto wearing her trademark white headscarf.

Her husband, elected following her death, is less popular. Zardari was jailed on corruption charges from 1996 to 2004 that he says were politically motivated.

The president is locked in a power struggle with the Supreme Court, which has been battling to reopen corruption cases against him. Zardari's aides say he has immunity.

Many Pakistanis are angry that Zardari's government has failed to tackle pervasive corruption or end the daily power cuts that have brought its industrial sector to its knees.

The elections should mark the first time in Pakistan's history that one elected civilian government hands power to another.

The nuclear-armed country of 180 million people has a history of military coups. After one such coup, the new military ruler hanged Benazir Bhutto's father in prison in 1979.

Benazir Bhutto served civilian governments as prime minister twice but was dismissed on corruption charges both times.

(Writing By Katharine Houreld; Editing by Ron Popeski)

Source: http://news.yahoo.com/only-son-pakistans-murdered-bhutto-launches-political-career-143557194.html

michigan state city creek center andrew luck pro day josh johnson kim kardashian flour matt forte jeremy shockey

Nonprofit tech innovators inspire new philanthropy

WASHINGTON (AP) ? Scott Harrison knows his charity has funded nearly 7,000 clean water projects in some of the poorest areas of the world in the past six years. How many of those wells are still flowing with drinking water months or years later, though? That's a tough question to answer.

His organization called Charity: Water has funded projects in 20 different countries. It's committed to spend 100 percent of each donation in the field to help reach some of the 800 million people who don't have clean water and resort to drinking from swamps, unhealthy ponds or polluted rivers. Organizers send donors photos and GPS coordinates for each water project they pay for.

Still, Harrison, a former New York promoter for nightclubs and fashion events, didn't want to guess at how many water projects were actually working. He wanted to give donors more assurance, knowing as many as a third of hand pumps built by various governments or groups stop functioning later. His solution: why not create sensors to monitor the water flow at each well? But raising millions for a new innovation could prove impossible.

Few funders want to pay for a nonprofit's technical infrastructure or take the risk of funding a dreamy idea. They'd rather pay for real work on the ground.

This month, Google stepped in with major funding to create and install sensors on 4,000 wells across Africa by 2015 that will send back real-time data on the water flow at each site. The $5 million grant could be a game changer for Charity: Water to ensure its projects are sustainable, to raise money for maintenance and to empower developing countries to maintain their infrastructure with new data.

"You could imagine a water minister salivating over this technology, even a president of a country being able to hold his water ministers in different districts accountable, saying, 'Hey, look, I want a dashboard in my office where I can see how my small, rural water projects are performing,'" Harrison said.

The grant is part of the first class of Google's Global Impact Awards totaling $23 million to spur innovation among nonprofits. Experts say the new annual grants are a part of a growing trend in venture philanthropy from funders who see technology as an instrument for social change. Such donors say they can have a bigger impact funding nonprofits that find ways to multiply their efforts through technology.

The gifts also represent a shift in the tech company's approach to philanthropy.

Google's Director of Charitable Giving Jacquelline Fuller said the company analyzed its giving, including $115 million in grants last year. It decided it could have a greater impact by funding nonprofit tech innovation, rather than specific issue areas or existing projects. Its grants will come with volunteer consulting on each project from Google engineers or specialists.

"We're really looking for the transformational impact" from clever uses of technology, Fuller said. But that sometimes involves risk that new technologies and innovations may not work.

"Informed risk is something Google understands," she said. "There's actually very few dollars available that's truly risk capital, lenders willing to take informed risk to help back some of these new technologies and innovations that may not pan out."

The largest source of funding for U.S. nonprofits is government, mostly through contracts that come with strings attached. Individual donors contribute significant support to charities as well, and the nation's foundations give about 14 percent of overall philanthropy to nonprofits.

"There is sort of a new breed of philanthropists coming into the field," including many who made money in the tech sector at a young age, said Bradford Smith, president of the Foundation Center, an information clearinghouse on nonprofits. "There I think you're seeing a really interesting sort of confluence of almost kind of a venture, risk-taking approach and technology as an instrument for social change."

Google zeroed in on projects that could develop new technology to scale up smaller projects targeting the environment, poverty, education and gender issues.

It's giving $5 million to the World Wildlife Fund to develop high-tech sensors for wildlife tagging to detect and deter poaching of endangered species. Another $3 million is going to a project at the Smithsonian Institution to develop DNA barcoding as a tool to stop illegal trading of endangered plants or animals smuggled across borders. That project could give six developing countries DNA testing materials with fast results to use as evidence to prosecute smugglers.

To fuel future innovation, Google is giving Donorschoose.org $5 million to create 500 new Advanced Placement courses in math, science and technology for U.S. schools that are committed to enrolling girls and minority students.

The charity GiveDirectly will receive $2.4 million to expand its model of direct mobile cash transfers to poor families in Kenya as a new method for lifting people out of poverty.

A charity run by actress Geena Davis that studies gender portrayals in the media will use a $1.2 million Google grant to develop new automated software that analyzes how females are portrayed in children's media worldwide, speeding up a previously manual process.

"It was looking prohibitively expensive to do a global study," Davis said, adding that developing new technology seemed like a far-flung wish. "It seems so science future that we weren't really raising money to do it."

While the grant may be a relatively small investment for a major tech company, it represents one of the largest gifts ever for the Geena Davis Institute on Gender in Media.

Innovation and technology among nonprofits have long been underfunded with traditional funders often feeling averse to risk and more often seeking to fund specific types of existing programs.

Momentum has been building for the past decade for funders pursuing venture philanthropy, said Matt Bannick, managing partner of the Omidyar Network founded by eBay founder Pierre Omidyar. Since 2004, the group has given out $310 million in grants to nonprofits, including the Sunlight Foundation and DonorsChoose.

Seeking out ideas to fund, rather than existing projects, turns traditional notions of philanthropy on its head, Bannick said.

"Rather than looking for organizations that could do this specific work that we're hoping to get accomplished, let's look for fabulous entrepreneurs ... that have a new and innovative idea that we can get behind," he said.

Silicon Valley philanthropists are fueling some growth in funding for nonprofit innovators, but some older foundations also have turned to funding innovation and nonprofit entrepreneurs.

The John S. and James L. Knight Foundation in Miami, born from a newspaper chain, has turned its focus to media innovation. The Alfred P. Sloan Foundation, founded in 1934 by a General Motors chief, focuses on science and technology to drive the nation's prosperity. Sloan was an early funder of the Smithsonian's DNA barcoding project.

Such funders are betting that early seed money can have a big impact with the right ideas and entrepreneurs.

"If there was more funding," Bannick said, "there would be a lot more great ideas that could emerge."

___

Charity: Water: http://www.charitywater.org/

Google Global Impact Awards: http://www.google.com/giving/impact-awards.html

Omidyar Network: http://www.omidyar.com/

___

Follow Brett Zongker on Twitter at https://twitter.com/DCArtBeat

Source: http://news.yahoo.com/nonprofit-tech-innovators-inspire-philanthropy-112637946.html

knowshon moreno knowshon moreno sovereign citizen komen chrome for android hatchet leah messer

2012: The year malware surged 'dramatically'

9 hrs.

December is "prediction season" in the cybersecurity industry. Every major anti-virus software maker and digital-security provider issues its own forecasts of what computer users face in the coming year.?

So far this month, the predictions for 2013 look a lot like those for 2012: more?Android malware, increased cyberattacks by nation-states and greater activity by "hacktivist" groups such as Anonymous.?

However, a few companies go back and check their own predictions at the end of the year to see what they got right ??and wrong.?

One company that does so is Moscow-based Kaspersky Lab, one of the top five anti-virus companies in the world.?

"In 2011, we really saw a number of things rising up: hacktivism; big?database breaches; attacks against Androids; attacks against Macs; data espionage became daily business in 2011," said Roel Schouwenberg, senior researcher at Kaspersky's Boston-area office. "When we look at 2012, we saw a further evolution of all these new trends."?

Kaspersky made the following predictions for 2012:?

  • Hacktivist?groups, who attack computer systems for political or social reasons, would continue to increase their activities?
  • A higher rate of "advanced persistent threat" attacks, or state-sponsored espionage efforts?
  • More incidents of cyberwarfare involving customized, state-sponsored malware?
  • Attacks on software and game developers such as Adobe, Microsoft, Oracle and Sony?
  • More aggressive actions from law-enforcement agencies against cybercriminals?
  • An increasing rate in the growth of threats to the Android mobile platform?
  • Successful attacks on Apple's Mac OS X computer platform?

Let's examine five of the top security incidents that shaped 2012 and check the accuracy of the Kaspersky researchers in light of those predictions.?

1. More Mac OS X malware
Security experts had anticipated an outbreak of malware targeting Mac OS X for years; 2012 was when it finally happened.?

The bug that did it, called the?Flashback or Flashfake Trojan, first appeared near the end of 2011, but didn't reach its peak rate of infection until March of 2012.?

Flashback infected more than 700,000 Macs around the world, the largest known Mac OS X infection to date.?

"In 2011, we predicted that we would see more Mac malware attacks," said Kaspersky Lab's Costin Raiu and David Emm in a?blog posting. "We just never expected it would be this dramatic."?

Why did Flashback wreak such havoc??

One reason was a well-documented Java vulnerability, which Apple took a long time to patch even after it had been publicly disclosed. The Flashback authors took advantage of Apple's delay to incorporate the Java exploit into their otherwise unremarkable creation.?

The second reason was the general?lack of awareness among Mac users?about security. Proper anti-virus software would have stopped Flashback's attack, yet most Mac users felt they didn't need it.?

Flashback wasn't the only successful attack on Mac OS X systems in 2012. There were multiple espionage-related attacks on Macs used by Tibetan dissidents and exiles. Some of the attacks used corrupted files purporting to?come straight from the Dalai Lama, Tibet's exiled leader.?

"The espionage angle may be a bigger factor for Mac right now than regular consumer malware," Schouwenberg said. "For general cybercrime, most criminals go after Windows because that's what they know. That's what's easiest for them."?

"But when it comes to these targeted attacks, the attackers go after whichever machines the targets are using. So if the targets are using Macs, they'll go after Macs."?

Schouwenberg said in terms of the proportion of available systems infected, Flashback was the most successful malware outbreak of the year.?

"When you look at relative market share, the Flashback malware in terms of prevalence was the size of [the infamous Windows worm]?Conficker," he said. "This was an absolutely huge event in the Apple world. When you extrapolate [the number of Macs infected] to Windows numbers, that's about 10 million."?

2. Cyberweapons: Flame??
Cyberwarfare is a term that often gets hyped up, especially when a politician or general is speaking.?

In fact, the?Stuxnet worm, which crippled an Iranian uranium-enrichment facility in the summer of 2010, was for nearly two years the only known cyberweapon that had destroyed anything.?

That changed this past spring, when a series of cyberattacks destroyed computer systems at oil facilities in Iran, as well as in the offices of the Iranian oil ministry.?

Wiper, the malware thought to be responsible for the attacks, was never found, although certain tell-tale signs indicated it was similar to Stuxnet and its cousin Duqu.?

During the investigation in May, however, researchers from Kaspersky, the Iranian computer emergency response team MAHER and the CrySyS Lab at Budapest University in Hungary discovered something else ?possibly the most sophisticated piece of malware ever seen. Kaspersky's team called it "Flame."?

The size, age and sophistication of Flame were startling. It was 20 megabytes in size, as large as a complex smartphone game, while most malware is only a few dozen kilobytes in size.?

Flame contained a dozen different modules that could be added and subtracted according to the task at hand, which made it extremely versatile as spyware.?

It could map out networks, index files, record audio and video, log keystrokes, take screenshots and archive emails and instant messages. When its job was done, it would destroy all signs of itself on any 32-bit Windows PC, and sometimes the host system as well.?

Yet despite its size, Flame was at least five years old at the time of its discovery ?an enormous amount of time for a piece of malware to be "in the wild."?

As?Raiu said in a press release, Flame was "an example of a complex malicious program that could exist undetected for an extended amount of time while collecting massive amounts of data and sensitive information from its victims."?

A couple of weeks after its discovery, Dutch researchers found that Flame's creators had pulled off a mathematical breakthrough.?

Using unknown techniques, Flame's creators had created a nearly-impossible?cryptologic collision?that allowed Flame to present itself as a signed, genuine Windows update package direct from Microsoft. No anti-virus software could have stopped it.?

?Gauss...?
In August, Kaspersky researchers found a highly sophisticated Trojan in the Middle East, this time spying on Lebanese banks.?

Like ordinary criminal banking Trojans, this new malware, which Kaspersky researchers dubbed "Gauss," stole online-banking credentials to break into accounts. Yet Gauss didn't steal any money ?just information.

In their year-end review, Raiu and Emmer said Gauss added a "new dimension to nation-state cyber-campaigns," even if it was nowhere as sophisticated as Flame.?

"It appears there is a strong cyber component to the existing geopolitical tensions ?perhaps bigger than anyone expected," they added.?

? and Shamoon?
That would prove to be an understatement. Later in August, Shamoon, a piece of especially destructive, yet simple, malware, made?its world debut.?

Named after a piece of text embedded deep in its code, Shamoon launched an attack against the state-owned Saudi Arabian oil company Saudi Aramco and destroyed data on more than 30,000 computers. ??

Shamoon was crude but effective. It searched an infected system for certain files, sent a list of those files to a remote server, and then methodically deleted key parts of the installed Windows system, rendering the infected machine useless.?

"You have the hacktivist movement claiming credit for that attack, which may or may not be the case," Schouwenberg said.?

"Shamoon wasn't really that sophisticated, but when you look at the relevance of the incidence, it's extremely, extremely important," Schouwenberg added, "especially when you consider the fact that Saudi Aramco announced just recently that they strongly believe that Shamoon's real target was to mess with the oil production rather than just sabotaging the machines in the corporate network."?

Kaspersky researchers said many details about Shamoon were still unknown, such as how the malware infected Saudi Aramco's systems in the first place, or who was behind the malware.?

Some observers suspect Iran created and used Shamoon as an attempt to cripple Saudi Arabia's oil production, which would cause oil prices to rise, benefiting cash-strapped Iran.?

3. Exponential growth in Android malware?
During 2011, there was an explosion in the number of?malicious threats against the Android platform. It was obvious that the trend would go on.?

Kaspersky, as well as most of its competitors, accurately predicted that the number of threats for Android would continue to grow at an alarming rate in 2012.?

"We predicted we would see an explosion in Android malware and that's what we saw," Schouwenberg said. "There is a huge amount of Android malware these days, although not anywhere near the amount of Windows malware that we see. But it's grown very dramatically."?

How dramatically??

"The number of samples we received continued to grow and peaked in June 2012, when we identified almost 7,000 malicious Android programs," Raiu and Emmer wrote. "Overall, in 2012, we identified more than 35,000 malicious Android programs, which is about six times more than in 2011."?

So why is there so much Android malware, and so little malware targeting its competition, Apple's iOS??

It's because?iOS is locked down tight. Apple oversees every part of the hardware and software development, and strictly controls which apps can be installed on iOS devices.?

Android, however, is a free-for-all. Dozens of manufacturers make hundreds of Android devices, and the operating system is a little different on each one. Manufacturers and cellular carriers?refuse to update Android?in a timely manner, resulting in security holes that are left unpatched for months or years.?

"Off-road" app markets flourish, especially in China where access to the official Google Play store is restricted. Google has belatedly tightened security in both Android itself and in the Google Play store, yet its efforts have a long way to go before they can match Apple's.?

Still, the tighter security in the latest versions of Android may be having an effect. Kaspersky's own figures show that while the number of new Android threats continued to grow in the second half of 2012, the rate of growth began to slow.?

4. Advanced persistent threats go quiet?
Advanced persistent threat hackers, i.e. cyberspies, were certainly active in 2012, yet didn't have the spectacular successes they'd had in previous years.?

Perhaps the most visible attack on Western targets was the discovery in September 2012 that two pieces of malware had been signed using a?valid Adobe code-signing certificate.?

Apparently, someone, somehow, had broken into an Adobe server and stolen authentication certificates.?

"This discovery belongs to the same chain of extremely targeted attacks performed by sophisticated threat actors commonly described as APT," wrote Raiu and Emmer. "The fact that a high profile company like Adobe was compromised in this way redefines the boundaries and possibilities that are becoming available for these high-level attackers."?

5. Data breach after data breach?
One thing that Kaspersky failed to anticipate in 2012 was the seemingly unending parade of huge data breaches involving companies and organizations with inadequate security.?

In early June, the business-networking website LinkedIn had?6.4 million passwords stolen. The passwords were encrypted, but in a very simple way that meant most could easily be deciphered.?

A day later, online-dating service eHarmony suffered a similar breach,?losing 1.5 million passwords, also poorly encrypted.?

In July, struggling Web giant Yahoo was embarrassed by a data breach that revealed?450,000 passwords?had been stored without any encryption at all. It wasn't entirely Yahoo's fault, since the database was acquired with the 2010 purchase of another company, but it was also evident that no one had bothered to check.?

Worst of all was the revelation in late October that vital personally identifiable information on?3.8 million adult residents of South Carolina, plus 1.9 million dependents and 700,000 businesses, had been stolen from the state tax agency.?

Entire tax records, containing names, addresses, dates of birth and, worst of all, Social Security numbers, were all stored unencrypted. Virtually the entire state population of 4.7 million people was put at grave risk of identity theft.?

Weeks after the breach was revealed, the state government was blaming the federal IRS for not providing strong security guidelines, and was itself being criticized by security experts for not revealing enough about what had happened.?

Looking back, and forward?
"There isn't too much that was shocking news over 2012, just these up-and-coming things [from] 2011 that really established themselves in 2012," Schouwenberg said. "But we also saw some examples of new nation-state [campaigns] like Flame and Gauss. But from my personal point of view, the most significant event of the year was Shamoon."?

As for 2013, "we expect the next year to be packed with high-profile attacks on consumers, businesses and governments alike, and to see the first signs of notable attacks against the critical industrial infrastructure," Raiu said in a company press release.?"The most notable trends of 2013 will be new examples of cyberwarfare operations, increasing targeted attacks on businesses and new, sophisticated mobile threats."

Source: http://www.nbcnews.com/technology/technolog/2012-year-malware-surged-dramatically-1C7659317

maurice sendak state of the union sotu boehner john boehner demi moore hospitalized james farentino