Sunday, September 30, 2012

AJC Applauds California Law Banning Insurance Investments in Iran

September 28, 2012 ? Los Angeles ? AJC applauds California for enacting the first law in the nation that will deprive Iran of an important source of capital derived from insurance industry indirect investments.

?

California Governor Edmund ?Jerry? Brown, Jr. signed the State Assembly bill this week. The law, known as Assembly Bill 2160, was authored by Los Angeles area Assembly members Bob Blumenfield and Mike Feuer, and followed AJC-supported legislation that also prohibits California from investing retirement funds or contracting for goods and services with companies that do business with Iran. AJC was one of the original supporters of AB 2160 and traveled to California?s state Capital, Sacramento, to advocate for its passage.

?

?The urgency of the Iranian nuclear threat compels action,? said AJC Los Angeles President Clifford P. Goldstein. ?AJC supported AB 2160 because it sends a strong message to California insurance companies that there is a steep penalty if they insist on investing in Iran's energy sector."

?AB 2160 requires a domestic insurer to treat any indirect investment in the Iranian energy sector as a non-admitted asset on the financial statements of that insurer in filings with the California Insurance Commissioner.

?

AJC is leading efforts across the country to support state-level sanctions legislation against Iran. California is the ninth state to have passed some form of Iran sanctions legislation supported by AJC this year.

Source: http://feedproxy.google.com/~r/ajcnews/~3/ze1JkytRsZw/content2.aspx

lindsay lohan playboy cover shooting at virginia tech shooting at virginia tech harry morgan john lennon death john lennon death c.j. wilson

Where did the mammoth US budget deficits come from?

Let's go back about a decade, when budget surpluses were predicted for the foreseeable future. Somehow, the math went terribly wrong, by trillions of dollars. Here's an accounting of what happened.

By Peter Grier,?Staff writer / September 28, 2012

In this image taken from video and provided by CBS, '60 Minutes' correspondent Steve Kroft speaks with President Barack Obama, at the White House in Washington. The interview aired on '60 Minutes' last Sunday.

CBS/AP/File

Enlarge

What?s the cause of the federal government?s huge budget deficits? That?s a question that is harder to answer in the particular than you might think. The general problem is obvious: Uncle Sam has been spending more money than he takes in. The specific reasons as to why this state of affairs exists are a mix of human decisions, economic circumstance, and the cumulative effect of time.

Skip to next paragraph

' + google_ads[0].line2 + '
' + google_ads[0].line3 + '

'; } else if (google_ads.length > 1) { ad_unit += ''; } } document.getElementById("ad_unit").innerHTML += ad_unit; google_adnum += google_ads.length; return; } var google_adnum = 0; google_ad_client = "pub-6743622525202572"; google_ad_output = 'js'; google_max_num_ads = '1'; google_feedback = "on"; google_ad_type = "text"; google_adtest = "on"; google_image_size = '230x105'; google_skip = '0'; // -->

Context is important here. So let?s start with 2001. That year, the Congressional Budget Office looked out over the decade to come and saw ahead nothing but blue skies and black ink. It predicted that between 2001 and 2011 the US would run budget surpluses totaling $5.6 trillion.

That didn?t happen. Instead, the US racked up $6.1 trillion in deficits over that period. CBO?s prediction was a whopping $11.7 trillion off the mark. How did things go so wrong?

CBO has gone back and studied that, as it happens. In a paper published earlier this year, the group?s economists tried to pull out and compare the reasons for the multitrillion swing.

One big problem was that CBO isn?t magical. Unblessed with the ability to predict the future, it didn?t accurately foresee the economic troubles of coming years, including the crash of the Great Recession. This meant that less tax money came in than anticipated. Overall, CBO says that about $3.3 trillion of its $11.7 prediction error can be attributed to ?economic and technical changes? to projected revenues.

Then there were the tax cuts. President George W. Bush instigated most of these, but President Obama also pushed through Congress a payroll tax cut intended to pump money into a moribund economy. Tax cuts accounted for a further $2.8 trillion of the $11.7 trillion discrepancy. (Yes, the big kahuna here is Mr. Bush?s 2001 reduction in income-tax rates, which alone accounts for about $1.2 trillion in revenue foregone over the decade.)

Finally, there are the increases in outflows unpredicted by CBO. Between 2001 and 2011, increased discretionary spending amounted to about $3 trillion. This category includes defense spending related to the wars in Iraq and Afghanistan, homeland security upgrades in the US, spending on food stamps and other hard-times safety net programs, and other general budget categories that are supposed to be approved annually by Congress.?

Mandatory spending ? a category that includes the Medicare prescription-drug program approved under Bush, the TARP bank bailout, and Mr. Obama?s economic stimulus package ? went up by about $1.4 trillion during the period in question. (This type of outflow is called ?mandatory? not because we had to do it, but because it results from formulas established by Congress instead of appropriated dollar totals.)

Charles Blahous, a former economic official in the Bush White House who is currently a Hoover Institution research fellow, has rolled all these numbers together into a simple pie chart. His answer to the question ?where did the $11.7 trillion go?? is this: 27 percent went away due to projection inaccuracy; 24 percent went to tax cuts; and 49 percent can be accounted for by various forms of increased spending.

Yes, yes, but who?s to blame? It?s election season, after all, and accusations as to which party is responsible for most of this damage are as thick on the ground as October leaves after a windstorm. Asked why the debt has increased during his four years in office during a ?60 Minutes? interview last week, Mr. Obama pointed a finger at his predecessor:

Source: http://rss.csmonitor.com/~r/feeds/csm/~3/FQU-XyFisVM/Where-did-the-mammoth-US-budget-deficits-come-from

Olympic Schedule 2012 NBC Olympics NBC Olympics schedule Alexa Vega 2012 Olympics Chad Everett London Olympics

Anne Hathaway and Adam Shulman: Married!

Source: http://www.thehollywoodgossip.com/2012/09/anne-hathaway-and-adam-shulman-married/

jessica simpson gives birth carrie underwood blown away chk ryan o neal dark knight rises trailer dark knight rises trailer vince young

Saturday, September 29, 2012

Insurance News - Sears Overhauls Health Insurance, Offering Cash ...

By Ameet Sachdev, Chicago Tribune
McClatchy-Tribune Information Services

Sept. 27--Sears Holdings Corp., in an effort to control its health care costs, has joined a private insurance exchange and will provide employees with a fixed allowance to buy insurance.

The Hoffman Estates-based retailer, with more than 90,000 workers eligible for coverage, becomes one of the largest U.S. employers to move away from traditional defined benefit health plans in favor of an approach that effectively shifts the choice of health insurance from companies to workers.

Sears said it is optimistic that more choice and competition will drive down health care costs.

"The corporate exchange model brings increased flexibility to group health coverage for our associates, giving participants a chance to choose both the level of coverage and the insurance company that best meets their needs," Sears spokesman Chris Braithwaite said in a statement.

But serious questions about the company's new arrangement remain to be answered.

The company declined to provide any specifics about the economics of its strategy. It is unknown how much money employees would receive to buy health insurance and whether contribution levels will increase if premiums in the exchange increase.

Sears employees will have choose among different health plans and insurance carriers starting with open enrollment this fall.

The Wall Street Journal first reported the news of new insurance approach, also being followed by Darden Restaurants, Thursday morning.

___

(c)2012 Chicago Tribune

Visit the Chicago Tribune at www.chicagotribune.com

Distributed by MCT Information Services

Source: http://insurancenewsnet.com/article.aspx?id=359071&type=lifehealth

michael kidd gilchrist national championship calipari national archives brock lesnar kentucky jayhawks

HBT: Millwood contemplating retirement

Kevin Millwood pitched decently for the Mariners this this season before a sore shoulder put an early end to things this month, but the impending free agent told Greg Johns of MLB.com yesterday that he?s not sure whether he wants to come back for another season.

?I?m going to go home and just relax and play with my kids and see what happens, see how I feel and see what pops into my head,? Millwood said Friday. ?I don?t have any definite plans right now on next year, but I?m sure at some point in the offseason it?ll hit me on what I want to do.?

?I knew I wanted to play this year,? he said. ?But like I said, now I?m just trying to figure out physically if I can do it. I still definitely believe I can get people out, but whether it?s time to stay home and spend more time with my kids or try it again, I don?t know the answer to that yet.?

Millwood signed a minor league deal with the Mariners last offseason and made the team out of spring training. The 37-year-old right-hander ended up posting a 4.25 ERA and 107/56 K/BB ratio over 161 innings in 28 starts. And he wasn?t just a Safeco Field creation either, as his ERA was only slightly higher on the road (4.35) than it was at home (4.15). Still, it?s unlikely any team will give him much of a guarantee at this point, so he?s understandably thinking about whether it?s worth trying to put his body through another season.

Millwood has a 169-152 record and a 4.11 ERA over 16 major league seasons. While he has averaged an unspectacular 6.9 K/9 for his career, he ranks 59th all-time with 2,083 strikeouts. He is the active leader in strikeouts among right-handed pitchers.

Source: http://hardballtalk.nbcsports.com/2012/09/29/kevin-millwood-is-thinking-about-retirement/related

sports illustrated swimsuit 2012 aretha franklin whitney houston paul williams paul babeu kevin costner budweiser shootout animal house

Western Digital My Passport Edge


The Western Digital My Passport Edge ($99.99 list) fulfills a niche: ready-to-go pocket hard drives. As such, it comes in one flavor: a 500GB drive with a USB 3.0 interface. The line is built on a simpler premise: This hard drive is meant to be a convenience item to be purchased with very little effort. And that concept pretty much works. Instead of having to agonize over color choices and capacities, it's the hard drive to recommend to your friends or relatives when they "just need a hard drive."

Design and Features
The My Passport Edge is a compact, pocket-sized drive measuring about 0.5 by 3.25 by 4.5 inches (HWD), which makes it a little shorter than an iPhone 4S, a smidge wider, and almost as thin. It's thinner, but otherwise about the same size as other recent My Passport drives like the Western Digital My Passport Studio (2TB) ($299.99 list, 4 stars) and Western Digital My Passport (2TB) ($249.99 list, 3.5 stars). The drive is made mostly of matte black polycarbonate plastic, with a thin metal lid with the drive's name and a dot-based design printed on it. One edge houses the drive's USB 3.0 micro-b connector. The drive comes with a USB 3.0 cable, so it's ready to use right out of the box. There's a three-year warranty, which is better than some competitors like the Editor's Choice Seagate Backup Plus , which makes do with a two-year warranty. Both warranties are better than more basic drives that come with a one-year warranty.

The drive comes formatted for NTFS, to work with Windows systems. You can reformat the drive as HFS+ for use with a Mac, plus the drive comes with a set of Mac and Windows utilities. The drive comes with WD's SmartWare (an easy to use backup utility), WD Security (simple hardware encryption), and WD Drive Utilities (diagnostics and sleep timer). Really, if you're not planning on setting up automatic backup on Windows, you don't have to use any of the included utilities. The drive is also ready to go (after a reformat) as a Time Machine backup disk for Macs. The drive's 500GB capacity is certainly enough to backup most laptops and ultrabooks. The drive can also be used as a quick way to transfer large multi-GB files between computers.

Performance
The My Passport Edge is a speedy drive, par for the course. It took a scant 16 seconds to copy our standard 1.2GB test folder over USB 3.0. We also gained good scores on the PCMark 5 (6,158 points) and PCMark 7 (1,536 points) hard drive tests. This compared well to the current Editor's Choice for portable hard drives, the Seagate Backup Plus (which scored 6,463 on PCMark 05 and 1,498 on PCMark 7). The larger capacity My Passport (2TB) was also in the same ballpark (6,106 on PCMark 05). Essentially, if you have a USB 3.0 equipped laptop or desktop, all three choices will be speedy, much speedier than USB 2.0, which takes over forty seconds to copy the same folder on all three drives.

The Western Digital My Passport Edge is a good hard drive, and will serve you well if you get one. It's fast, and it has a good warranty. However, the Seagate Backup Plus has an interchangeable interface, which is a better choice for techie users who need to use other interface like FireWire or Thunderbolt. The Seagate also has a better dollar per GB ratio: the My Passport costs 20 cents a GB, while the Seagate is about 14 cents per GB. It's even better when you realize that some online merchants are selling the Seagate for the same $99.99 price as the My Passport Edge. Though the My Passport Edge has a better warranty, the Seagate Backup Plus still holds on to its portable hard drive Editors' Choice award due to its better bang for the buck. That said, if you're a tech savvy person who needs to convince her tech brain-dead relative to backup their files, the My Passport Edge is a stress-free recommendation you can give without hesitation.

COMPARISON TABLE
Compare the Buffalo MiniStation Thunderbolt (HD-PA1.0TU3) with several other hard drive side by side.

More hard drive reviews:
??? Western Digital My Passport Edge
??? Western Digital My Book VelociRaptor Duo
??? LaCie Rugged USB 3.0 Thunderbolt (120GB SSD)
??? Buffalo MiniStation Thunderbolt Portable HDD (HD-PA1.0TU3)
??? CRU-DataPort ToughTech Duo 3SR
?? more

Source: http://feedproxy.google.com/~r/ziffdavis/pcmag/~3/peM57AqgQMw/0,2817,2410382,00.asp

oklahoma city bombing robbie robertson the curious case of benjamin button secret service prostitute rich ross april 20 jennifer love hewitt

Friday, September 28, 2012

Ubuntu 13.04's final release slated for April, alpha to arrive in December

Ubuntu 13.04's final release slated for April, alpha to arrive in December

Quantal Quetzal won't properly launch until October 18th, but a tentative timeline for Ubuntu 13.04 has already appeared on the horizon. Come December 1st, the as-of-yet unnamed version will hit its first alpha and transition into its second testing stage on February 7th. After touching the beta milestone on March 7th, the release is just a small stretch away from its proposed April 25th launch. If the wait feels entirely too long, you can spend time perusing potential pseudonyms for the OS at the more coverage link below.

Filed under:

Ubuntu 13.04's final release slated for April, alpha to arrive in December originally appeared on Engadget on Thu, 27 Sep 2012 05:42:00 EDT. Please see our terms for use of feeds.

Permalink OMG! Ubuntu!  |  sourceUbuntu Wiki  | Email this | Comments

Source: http://www.engadget.com/2012/09/27/ubuntu-13-04-final-release-april/

What Is Labor Day jersey shore Pasquale Rotella Michael Clark Duncan michael jackson courtney stodden Ncaa Football Scores

Republicans assail Obama on 9/11 attack in Libya

WASHINGTON (AP) ? Republicans lashed out at President Barack Obama and senior administration officials over their evolving description of the deadly Sept. 11 attack on the U.S. Consulate in Libya, a late campaign-season broadside challenging the veracity and leadership of an incumbent on the upswing.

Desperate to reverse the apparent trajectory of the White House race, Republicans sense a political opportunity in Obama's reluctance to utter the words "terrorist attack" as well as the varying explanations emerging from the administration about the assault in Benghazi that killed Ambassador Chris Stevens and three other Americans.

Talk of Watergate-style scandal, stonewalling and cover-up echoed in the GOP ranks on Thursday, from the head of the party to members of Congress to Mitt Romney's campaign staff. This full-throated criticism comes five days before the first debate between Obama and Romney, with Republicans determined to cast the president as dishonest and ineffectual on both foreign and domestic policy.

"Amid Middle East turmoil and six weeks before the election, President Obama refuses to have an honest conversation with the American people," Reince Priebus, chairman of the Republican Party, wrote in an article for the website Real Clear Politics. "The country deserves honesty, not obfuscation, from our president."

Republicans say the administration has been slow to call the assault a terrorist attack and has criticized its initial insistence that the attack was a spontaneous response to the crude anti-Islam video that touched off demonstrations across the Middle East.

Since then, it has become clear that the Benghazi assault was distinct from the mobs that burned American flags and protested what they considered the blasphemy in the movie, but didn't attack U.S. personnel. Republicans have also suggested that the administration had intelligence suggesting the deadly attack might happen and ignored it.

"I think it's pretty clear that they haven't wanted to level with the American people. We expect candor from the president and transparency," Romney told Fox News this week.

The White House and Democrats accused the GOP of politicizing national security, with officials specifically mentioning Romney's quick swipe at Obama as an extremist sympathizer as the crisis was still unfolding in North Africa around Sept. 11.

"The Republican approach is to shoot first and ask questions later," Rep. Adam Smith of Washington state, the top Democrat on the House Armed Services Committee, said in an interview. "The administration wants to do an investigation and be as accurate as possible. That's the difference between partisan politics and trying to govern."

Democrats also used the criticism to recall the former Massachusetts governor's missteps during his summertime overseas trip and his omission in his prime-time speech at the Republican National Convention of any mention of U.S. military forces fighting in Afghanistan.

"Every time Mitt Romney has attempted to dip his toe into foreign policy quarters, it's been an unmitigated disaster," Obama campaign press secretary Jen Psaki said aboard Air Force One.

National security has provided few political openings for Romney and the GOP as Obama has shed the Democrats' past reputation for weakness by ordering the successful raid that killed terrorist leader Osama bin Laden and undercut al-Qaida. An Associated Press-GfK poll earlier this month found Obama with an edge over Romney on who Americans think can do a better job of protecting the country, 51 percent to 40 percent.

The economy and jobs are the dominant issues in the election, with few voters likely to cast their ballots based on events in Libya or conflicts overseas. Underscoring the general weariness after more than 10 years of war, some of the fiercest GOP defense hawks in Congress have suggested the United States withdraw its forces from Afghanistan, an even bolder step than Obama.

But the administration has struggled to present a coherent description of the assault in Libya, prompting questions from Republicans and Democrats about whether the United States had prior intelligence, whether the attack was planned and whether security was sufficient.

In that same AP poll, Americans approved of Obama's handling of Libya by just 45-41 percent. The poll was conducted within days of the assault.

Defense Secretary Leon Panetta on Thursday called it a terrorist attack.

"What terrorists were involved I think still remains to be determined by the investigation," he told reporters at the Pentagon. "But it clearly was a group of terrorists who conducted that attack."

Secretary of State Hillary Rodham Clinton and White House press secretary Jay Carney called the violence a terrorist attack last week. But Obama has declined several chances to call the incident a terrorist attack. He said last week that extremists used an anti-Islam video as an excuse to assault U.S. interests.

And just five days after the attack, U.S. Ambassador to the United Nations Susan Rice said the attack was a spontaneous reaction to the video. Her assessment was at odds with Libya's interim President Mohammed el-Megarif, who said there was no doubt the perpetrators had predetermined the date of the assault. Panetta said Thursday it was a "planned attack."

The FBI is investigating, but the apparent contradictions have prompted demands for information from Congress and a flurry of scathing letters to the administration.

So far, U.S. intelligence has indicated that heavily armed extremists numbering 50 or more attacked the consulate, relying on gun trucks for added firepower. They established a perimeter, limiting access to the compound. A first wave of attacks forced the Americans to flee to a fallback building, where a second group of extremists attacked with mortar fire. Stevens died of apparent smoke inhalation when he was caught inside one of the consulate buildings, which had been set on fire.

Officials have not singled out one responsible group, but have focused their attention on Ansar al-Shariah, a Libyan militant group led by a former detainee at the U.S. military-run prison in Guantanamo Bay, Cuba.

Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, said Thursday that there has been a "thread of intelligence reporting" about groups in eastern Libya trying to coalesce, but no specific threat to the consulate.

Since the fall of Libyan leader Moammar Gadhafi last year, militias, weapons and terrorists are common in Libya.

"It was just unbelievable that Ambassador Rice and Secretary Clinton and the White House spokesman and others would say that there was no evidence ? that this was a spontaneous attack, yet they say, 'come on, honey, bring your mortars, we're going to a spontaneous demonstration,'" Sen. John McCain, R-Ariz., said on CBS' "This Morning."

McCain, who called the administration's statements "disgraceful," joined three other Republican senators this week in a letter to Rice pressing her on her "troubling statements that are inconsistent with the facts."

Eight Republicans who head House committees sent a letter to Obama criticizing a "pre-9/11 mindset" of "treating an act of war solely as a criminal matter." They said they would return to Washington from their nearly two-month recess for briefings beyond the back-to-back sessions Clinton and others held last week.

Sens. Bob Corker, R-Tenn., and Johnny Isakson, R-Ga., have asked for communications between the State Department and the U.S. mission in Libya leading up to the attacks.

Senate Foreign Relations Committee Chairman John Kerry, D-Mass., has written the State Department's Thomas Nides asking him to provide the panel with a detailed accounting of the attacks on U.S. missions in Libya, Egypt and Yemen on Sept. 11, information on security and whether there was any prior intelligence.

Sen. Chris Coons, D-Del., a member of the panel, said the purpose of this letter is a bipartisan effort to get information.

"I do think it is legitimate and appropriate to ask questions," Coons said in an interview. "Some have sadly overreached and clearly are politicizing this incident."

___

Associated Press writers Robert Burns in Washington and Steve Peoples in Springfield, Va., contributed to this report.

Source: http://news.yahoo.com/republicans-assail-obama-9-11-attack-libya-203528583.html

peyton manning super bowl nsx chad ochocinco roman numerals new england patriots madonna madonna

Video: Anti-Islam film producer arrested in LA



>>> and breaking news, tonight about a man who has been identified as the producer of the video and sparked deadly and violent protests throughout the muslim world . he is in a federal courtroom in los angeles today, and a judge will decide if he violated the terms of his probation from a 2010 conviction on bank fraud charges. under the terms of the probation, he agreed not to use the internet or use aliases without permission, federal authority say he did both in distributing the video.

Source: http://video.msnbc.msn.com/nightly-news/49203393/

hcg drops reason rally mad hatter azerbaijan ryan howard ps i love you ray charles

THE REAL SECRET OF STAYING MARRIED - NewsdzeZimbabwe

THE REAL SECRET OF STAYING MARRIED newsdzeZimbabweNewsdzeZimbabwe skip to main | skip to sidebar

THE REAL SECRET OF STAYING MARRIED

Wednesday, September 26, 2012 ?NewsdzeZimbabwe ?

?

Five years ago my friend (let's call her Jane) discovered her husband (let's call him Steve) was having an affair with a colleague. For a few weeks, their marriage teetered on the brink. Jane was shocked at Steve's "betrayal", uncertain whether she could ever trust him again. Everything ? including the future for the couple's two children ? hung in the balance. This week I met Jane for lunch... and what a difference five years has made. She's happy, fulfilled, forging ahead with an important work project. She and Steve have just had a holiday ? deux and their marriage seems unshakeable. But Steve still sometimes sees his other lover. And what's more, Jane now has an extramarital love interest, too. "We've got a new arrangement," is how Jane explains it. "Sometimes I think it's complicated ? at other times, it seems ridiculously easy. Basically, we sat down and worked out that we're really happy with what we've got together ? a lovely home, three gorgeous kids, fulfilling jobs. But we've been honest about the fact that we sometimes need a bit more." Rewriting the rules around marriage, as Steve and Jane have done, is catching on, and there's a spate of new books and movies out to prove it: books that aim to unpick why we can't be more imaginative in the ways we live out our long-term relationships and films such as Hope Springs that seek to remind us that a long-term relationship doesn't have to dissolve into a stale and lonely old age. Psychologist and relationship therapist Meg Barker is the author of Rewriting the Rules (Routledge), out this month. She says there are several differences in today's long-term committed relationships that underpin the need for change. "Number one is that people are living to be a lot older ? so a long-term relationship is a much longer deal," she says. "And another thing that's changed is expectations: we require so much more from a relationship than people did in the past. "There's been a huge growth in the recent past of this idea that you need one perfect relationship; that you will get everything from it ? romance and children and financial stability and friendship and a great sex life. No other generation had such huge hopes invested in just one relationship and it is an enormous ask." An enormous ask that, more and more, is prompting people to wonder if the time has come to dismantle the scaffolding that holds marriage together and to look at whether it couldn't be constructed in another way. Because perhaps the over-expectations we've come to invest in marriage have made the scaffolding too shaky: maybe the time has inevitably come to realise that, as a society, we've been piling too much weight onto just one frame. That's certainly how social scientist Catherine Hakim sees it: and her take is that it's Anglo-Saxons who are worst at loading the weights onto marriage and then watching as it wobbles under the strain. No surprise, she argues in her new book The New Rules: Internet Dating, Playfairs and Erotic Power (Gibson Square Books), that it's Britons and Americans who have the highest divorce rates on the planet ? because these nations are also the ones whose citizens have the highest (and, she would argue, the most unrealistic) expectations of the institution itself. More than 90 per cent of Americans and 80 per cent of Britons condemn extramarital affairs as wrong, compared with just two in five people in Italy and France. And guess what, says Hakim: in Italy and France, divorce is far less common. "There is no assumption [in these countries] that spouses must fulfil all of each other's needs, all of the time, exclusively," she explains. Hakim's take is that affairs happen ? and when they do, couples (especially in Britain and America) are using sledgehammers to crack nuts. That's what, she would say, a couple like Jane and Steve would have done if they'd ended their marriage five years ago. At root, their relationship is fine: not perfect (but who, and what, is?), but happy enough, and friendly enough, and even sexy enough, and certainly functional enough to make a safe home for their children to grow up in. How tragic it would have been, Hakim would say, if a couple like Jane and Steve had chosen to unravel all that in the midst of what was, all said and done, a difficult chapter in their relationship ? but one which, with some straight talking and broad thinking, they were able to work through. The French perspective on affairs is very different: the attitude there is more philosophical and more tolerant. "Affairs are not actively recommended, but they are not prohibited either," says Hakim in her book. Contrast the UK, where (despite the fact that affairs are very common), the language around them is loaded with negativity (think "cheating", "dishonesty", "love rat"). When Jane heard of Steve's extramarital relationship, she felt "betrayed": but why, exactly, did it have to be a betrayal? Relationship psychotherapist Paula Hall of Relate agrees with much of the logic of Hakim and Barker. Her line is that if anyone thinks there's a safe place in a marriage, they're kidding themselves: marriage, like everything else in life, is risky. "Monogamy has its risks ? boredom being the main one ? and an open marriage has its risks, too, in the form of jealousy, feelings of rejection and so on," she says. "But there are real differences in the landscape of a marriage these days and they're about the internet and opportunities for meeting people as well as in how great our individual expectations are. So we are the generation that can move the boundaries here and look again at how to draw up what a marriage is about," she says. It's even possible, she ventures, that monogamy has played out its usefulness to humankind. "Some experts argue that, from an evolutionary perspective, we simply don't need monogamy as much as human beings did in the past," she says. The key thread that runs through Barker's book and Hakim's, through Hall's words of wisdom and through Hope Springs, is that flexibility ? always an important component of a long-term marriage ? is even more essential today than in the past. Marriage ? certainly where children are concerned ? is well worth fighting for: but to win the war, tactics and manoeuvres that once would have been out of the question could need to be deployed.? Independent

?

Source: http://www.newsdzezimbabwe.co.uk/2012/09/the-real-secret-of-staying-married.html

cause of whitney houston death the watchmen whitney houston dies beverly hills hotel beverly hills hotel whitney houston national anthem dolly parton i will always love you

Thursday, September 27, 2012

Stop talking Price and talk Value instead | Barrett Sales Blog

Peter Finkelstein, Barrett?s Sales Strategist, and I have been discussing the increasing spate of businesses and sales people complaining about ?price? being their biggest issue when it comes to not closing enough sales. ?

?Our prices are higher than our rivals. That?s the main reason for us losing business opportunities?? Peter and I have heard that statement at just about every sales training course we have ever run.? Not just in Australia, but as Peter will attest, in South Africa, the UK, USA, Germany, France and Dubai.

In our opinion using the price argument is a lazy excuse: blaming high prices for the failing to get a deal is an easy way out for sales people and leads to nowhere fast.? But let?s not be too quick to blame the sales people for this situation. Why? Well, one of the main reasons sales people fall into this trap is that many businesses do not have clearly defined customer centric value propositions which sales people can believe and demonstrate effectively with their clients.? ?

Latest News
?Payless Shoes has been placed in voluntary administration with debts of more than $10 million. Payless Shoes operated in a ?discount land?. Well if the only real benefit they have to offer is that they?re offering shoes at a very low price and that?s all they have got, people aren?t going to spend their money with them ? as proven by the fact they are no more.?

The other biggie is that many sales people have not been taught how to have business conversations about real value (beyond product) with their clients and therefore lack of confidence and competence to do which is why they default to the price excuse.? Companies who continue training their sales people in product knowledge only are setting their sales people up for a price fall and will lose margin and sales.

So don?t be fooled, just having lower prices is definitely not THE solution to your sales woes.? Before you and your sales people go down the ?price is too high? track let?s look at the facts first:

The Price is an arbitrary figure with no inherit value in itself; the Price is just a number and means absolutely nothing until it is made relative to something of value.? For example, you want to buy a pair of sunglasses: you can go to a pharmacy or $2 shop and by a cheap no name pair for between $5-20 or you can buy an expensive designer brand for $300.? They are both perfectly good sunglasses yet why will some people pay more for one than the other?? Because those people perceive the designer brand is of greater value to them than the other.?? Value to them could mean a number of things like prestige, one-up-man-ship, superiority, aesthetics/design, and so on.

And this is exactly the point we need to understand as sales people and business leaders: the client does not really see a price, they see and are looking for value.? So our real mission as sales people is to find out what Value means to each of our clients and we can only do that if we ask questions and don?t assume we know what is best for our clients before we ask them.?? By doing this we can begin to move away from the price conversations so many sales people find themselves in.

So how do you understand specifically what value means to each of your clients especially when products are struggling to differentiate themselves and quality is becoming a commodity in many instances?

Ask specific question about what is the value to the customer

value for the customer

Well, businesses and their sales teams need to shift their client conversations away from product as the central focus to conversations centred on Effectiveness, Efficiency, Risk and Total Cost of Ownership which includes price and other things like Access, Storage, Knowledge, Distribution, Funding, Warehousing, Logistics, Funding, Quality, Right for Use, etc.

Teaching our sales people, especially our B2B sales people, how business works; how our businesses can work in concert with our clients? businesses; how we can create real value is crucial to migrating from the product price discussion to business relationships of real value for parties concerned.? ?

Remember everybody lives by selling something.

Author: Sue Barrett, www.barrett.com.au ?

Source: http://www.barrett.com.au/blogs/SalesBlog/2012/2436/sales-attitudes/stop-talking-price-and-talk-value-instead/

tori spelling marion barber marion barber syracuse ohio state girl with the dragon tattoo ohio state basketball

Legal Theory Blog: Berman on Yaffe on Attempt

Mitchell N. Berman (University of Texas School of Law) has posted Attempts, in Language and in Law on SSRN. Here is the abstract:
    On what grounds does the law punish attempted offenses? The dominant answer is that the law punishes attempts to commit an offense precisely because they are attempts (extra-legally), and it is true as a general moral principle that if one should not X, one should not attempt to X. If this is right, then the proper contours of the law of attempts should track the contours of what are attempts (extra-legally). At least to a first approximation, that is, law should track metaphysics. Call this the ?Attempt Theory? of attempt liability. Gideon Yaffe?s recent book, "Attempts," is a rigorous and philosophically sophisticated critical analysis of attempt law predicated on just this foundational assumption ? the assumption, to repeat, that attempts to commit an offense should be criminalized because they are attempts as a pre-legal or extra-legal matter.

    However, there is another possible answer to the question. Possibly, those things that are in fact attempts are properly criminalized not because they are attempts, but because the best reasons for criminalizing the complete or ?perfect? offense are also good reasons to criminalize this conduct, and there are no compelling reasons, of policy or justice, not to. We can call this the ?Underlying Reasons Theory? of attempt liability. The Underlying Reasons Theory does recognize that there are things in the world that are attempts and that one who attempts to do what the criminal law forbids should be punished. It just maintains that the fact that an actor attempted to commit an offense is not, strictly speaking, what justifies our punishing her.

    This short review of Yaffe?s book explicates the difference between the Attempt Theory and the Underlying Reasons Theory as approaches to criminal liability for what we presently call ?attempts.? In a nutshell: paradigmatic attempts would be criminalized on both accounts, but the Underlying Reasons Theory is likely to endorse criminalization of some conduct that the Attempts Theory would not. This paper advocates the Underlying Reasons Theory and argues that we can and should assess the proper scope of ?attempt law? without working through the metaphysics of attempts

Highly recommended. Here is a link to Yaffe's important and highly recommended book: Attempts: In the Philosophy of Action and the Criminal Law

Source: http://lsolum.typepad.com/legaltheory/2012/09/mitchell-n-berman-university-of-texas-school-of-law-has-posted-attempts-in-language-and-in-law-on-ssrn-here-is-the-abst.html

joseph kennedy iii ghost hunters lightsquared david lee honduras prison fire do not call list sports illustrated

Don't recycle _ these gadgets dissolve inside you

This undated image made available by Science magazine shows a water droplet dissolving a resorbable electronics circuit. As consumers we want our electronic gadgets durable. But as patients, we might want them to dissolve - inside our bodies. They could give treatments for a specific amount of time, and then just disappear without need for surgical removal or risk of long-term side effects. Scientists reported an early step toward that goal Thursday, Sept. 27, 2012: Small electronic devices, sealed in silk from cocoons, worked as designed after being implanted in mice. Three weeks later, they were basically gone. (AP Photo/Science, Fiorenzo Omenetto)

This undated image made available by Science magazine shows a water droplet dissolving a resorbable electronics circuit. As consumers we want our electronic gadgets durable. But as patients, we might want them to dissolve - inside our bodies. They could give treatments for a specific amount of time, and then just disappear without need for surgical removal or risk of long-term side effects. Scientists reported an early step toward that goal Thursday, Sept. 27, 2012: Small electronic devices, sealed in silk from cocoons, worked as designed after being implanted in mice. Three weeks later, they were basically gone. (AP Photo/Science, Fiorenzo Omenetto)

This undated image made available by the Beckman Institute, University of Illinois via Science magazine shows a water droplet dissolving a resorbable electronics circuit. As consumers we want our electronic gadgets durable. But as patients, we might want them to dissolve - inside our bodies. They could give treatments for a specific amount of time, and then just disappear without need for surgical removal or risk of long-term side effects. Scientists reported an early step toward that goal Thursday, Sept. 27, 2012: Small electronic devices, sealed in silk from cocoons, worked as designed after being implanted in mice. Three weeks later, they were basically gone. (AP Photo/Science, Beckman Institute, University of Illinois)

(AP) ? As consumers we want our electronic gadgets to be durable. But as patients, we might want them to dissolve ? inside our bodies.

Scientists reported Thursday that they succeeded in creating tiny medical devices sealed in silk cocoons that did the work they were designed for, then dissolved in the bodies of lab mice. It's an early step in a technology that may hold promise, not only for medicine, but also for disposal of electronic waste.

The new work is "a remarkable achievement" in combining materials to produce a working device, said Christopher Bettinger of Carnegie Mellon University. He works on biodegradable electronics but was not involved in the study.

Doctors already use implants that dispense drugs or provide electrical stimulation, but they don't dissolve. The new work is aimed at making devices that do their jobs as long as needed and then just dissolved, without need for surgical removal or risk of long-term side effects.

In the experiment, the devices ? which look like tiny computer chips ? were designed to generate heat, a potential strategy for fighting infection after surgery by killing germs, said John Rogers of the University of Illinois at Urbana-Champaign, an author of the study.

The devices worked in the mice for more than a week, until their silk coatings dissolved enough for bodily fluids to erode key parts of the devices, he said. After three weeks, the tiny gadgets had basically disappeared.

Someday for people, similar devices might be programmed to monitor the body and release drugs accordingly, or produce electric current to accelerate bone healing, Rogers said.

The researchers used the protective cocoon envelope because silk can be processed to stay intact for varying periods of time ? from seconds to weeks and potentially for years, he said. The device's circuitry itself was built from other materials that degrade in the body, such as magnesium and silicon.

The federally funded research was reported online in the journal Science.

Apart from medicine, the technology offers a way to cut down on electronic waste, or E-waste, if portable consumer devices could be made with decomposing components, the researchers wrote.

And there are other potential uses, too Rogers suggested. For example, such devices could be scattered near a chemical spill to monitor things like chemical concentrations without any need to retrieve them later.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/495d344a0d10421e9baa8ee77029cfbd/Article_2012-09-27-Dissolving%20Electronics/id-ffc98d96f923405d8d8a5db692da908e

anchorman capybara duggars peter facinelli bobby rush supreme court justices 19 kids and counting

Samsung Galaxy Note II launches on three carriers in Korea

Looking for Samsung's latest big phone? Get yourself over to Korea, where the Galaxy Note II has kicked off its launch "world tour" with a party in the center of Seoul. The 5.5-inch Jelly Bean superphone will be available across SKT, KT and LG U+ carriers, supporting LTE connectivity on all three, available in 32GB and 64GB storage offerings. The Galaxy Note II will eventually arrive in 128 countries -- and we're expecting a US arrival date sometime in November, on even more carriers than its Korean debut.

Filed under: ,

Samsung Galaxy Note II launches on three carriers in Korea originally appeared on Engadget on Wed, 26 Sep 2012 07:24:00 EDT. Please see our terms for use of feeds.

Permalink Sammyhub  |  sourceSamsung (Flickr), Samsung Tomorrow  | Email this | Comments

Source: http://www.engadget.com/2012/09/26/samsung-galaxy-note-ii-launch-korea/

Revolution TV Show Carly Rae Jepsen bankofamerica nfl schedule revolution rosh hashanah rosh hashanah

Wednesday, September 26, 2012

Why your next 'Passw0rd' might not be a password

Text passwords are unsafe, fingerprints and retinas can be faked. So how do you make an unbreakable password? A Canadian inventor is developing a biometric monitor that fits inside a shoe that he says is unhackable. Doors open for you ? and nobody else. Richard Lui and Bob Sullivan report on technology that will change digital security forever.

By Bob Sullivan

It's been a rough year for passwords.

First, 6.5 million LinkedIn passwords were leaked online. Soon after, millions of passwords from eHarmony and Yahoo users were published by hackers. These events exposed untold numbers of accounts to criminals, as many consumers use the same passwords across multiple accounts. ?

The leaks also proved something experts had fretted about for a while: Passwords are very easy to guess. Analysts quickly compiled results from the list of passwords and? found that really dumb choices abounded.?The most common phrase in the LinkedIn passwords, for example, was "link." Not far behind was "1234."

Despite years of warnings, the truth is incontrovertible -- mortal users do a very poor job of defending their data with passwords. To add insult to injury, a recent analysis of debit card PINs shows that 1 in 10 users pick "1234." And the "safest" PIN code, 8068, is no longer safe because it was published in the analysis.

It's quite possible that 2012 will be a turning point in the history of passwords; or rather, it may be the point that passwords become history.


For years, you've been hearing about space-aged authentication systems like retina scans and computers that recognize your voice. And yet, for the overwhelming majority of computer users and home and at work, simple user/password combinations are all that stands between their data and the bad guys.

This old-fashioned system has obvious limitations, the most evident being user memories.? Our brains are ill-suited to recall eight-digit combinations of letters, numbers and special characters that are recommended. Sticky notes with password lists taped to computer screens remain common.

Meanwhile, "Forgot your password?" is among the more popular links on websites, and among the more dangerous, as it often puts only your pet's name and your high school mascot -- easily determined from Facebook -- between your data and hackers.

There has to be a better way. And there is, if Carnegie-Mellon University and a small Canadian start-up firm are right. At the school's new "Biometrics Research and Identity Automation Lab," researchers are investigating whether the way people walk can be used as a simple yet secure way to affirm their identities.

?The continuing threats to military personnel and critical infrastructure and the growing national cybersecurity vulnerabilities demand a new breed of credentialing technology, and what our group has achieved certainly puts a whole new spin on things," said Todd Gray, president of Ottawa-based Autonomous ID, which is working with the university on the project. The system uses a "BioSole" inserted into shoes to assess a wearer?s gait, matching that distinctive pattern against an existing record to verify the person?s identity.

BioSoles are among dozens of new authentication systems vying for acceptance in a thriving industry that has gained momentum because of the recent troubles with passwords. Before we describe more of them, it's important to discuss the basics of authentication technologies and why new systems might succeed where others have failed.?

Security professionals often talk about "two-factor" authentication as a way of double-checking to see if a person logging into a system should be authorized. Traditionally, those two factors include "something you have" and "something you know." For example, a debit card is "something you have,? and a PIN code is ?something you know.? For a criminal to hack your bank account, he or she must have both elements, which is a much harder challenge than simply stealing a password.?

Biometric passwords expand the possibilities into the "something you are" category. A retina scan or fingerprint, for example, authenticates users based on something they are, and, in most cases, cannot change. Biometrics have a decided advantage over passwords because they don?t rely on users? ability to remember them -- you are who your retina says you are. There is a dramatic downside, however. Horror films have long exploited the plot line where a bad guy cuts out a target's eyeball and uses it to log into a computer or enter a secure facility.

Matt Rivera / NBC News

Facial pattern recognition maps are on display at Carnegie Mellon's CyLab.

The newest technologies retain the advantage of biometrics, but don't create the same level of physical risk. They involve "something you do," such as the way you walk, as being researched at Carnegie Mellon. Another similar tool involves quantifying the unique way users type, a technique that's been dubbed "keystroke analysis." These so-called "behavioral" authentication mechanisms give systems architects four distinct methods to choose from.?

Another promising new behavioral technique takes advantage of a skill most video game players know well -- users learn behaviors that become automatic through play.? Later, they can recall these learned behaviors ? they can recognize patterns, for example -- ?without having to think about them. Researchers at Stanford and Northwestern are working on a system that would "teach" users to recognize a pattern of dots in a puzzle-like picture, then have that puzzle serve as a password. As writer Devin Coldewey notes, the most secure password might be the one a user doesn?t have to remember.

Marty Jost, who works in Symantec Corp.'s authentication group, says he thinks behavioral techniques offer the most promise for next-generation "passwords."

"Biometrics have been around a long time, but have historically tended to be unreliable. Just when you need it most, your fingerprints are dirty and they don't read right, for example. That's what's held it back," he said. "The key to success is providing a second factor without making it difficult to use. When you try to use an exotic method, it becomes a different problem, such as a customer service problem or a user satisfaction problem."

Symantec is concentrating on behavioral techniques that don't require dramatic changes by users. For a while, token-based authentication procedures were all the rage -- banks and corporations gave users small gadgets that provided temporary passwords to prove the person logging in satisfied the "something you have" requirement -- but users often misplaced them. So now, companies like Symantec are increasingly using cell phones as tokens. A simple text message or phone call sent to an employee?s phone serves as a second authenticating factor.

"Users are much less likely to lose their phones," Jost said.

Symantec also concentrates on back-end behavioral techniques, such as observing the kind of activities the user is attempting. A user who normally logs in from New York but suddenly appears to be logging in from Hong Kong is flagged for extra security challenges. Similarly, a user who usually transfers small dollar amounts from one account to another is flagged if her or she ?suddenly requests a $10,000 transfer.

"Behavioral data over time develop a profile," he said. ?We can analyze these patterns without having to involve the user.?

Jost is pessimistic about what he calls "exotic" login tools for mass audiences, because even a small failure rate can create a big problem for consumer brands.

"If you are a bank and you?ve done something exotic, if it?s not working for 1 percent of people, that's a lot of people,? he said. ?We try to strike that balance between strength and usability. ? We do things that make the activity safer for people without them necessary even knowing about it."

A user?s tolerance for taking extra security precautions depends on motivation. Some "exotic" methods are already in use today where circumstances encourage their use. In high-crime areas of Brazil, for example, "vein printing" machines that detect blood flow patterns in the palm of a user?s hand have been deployed. In the U.S., where ATM theft rates in the U.S. are not published by banks, the American Banking Association recently said that a successful ATM crime nets more than 10 times the cash as a traditional bank hold-up, and it hopes U.S. banks adopt one or more advanced ATM protection technologies.?

Meanwhile, facial- and voice-recognition systems like Samsung?s ?Face Unlock,? and Apple?s Siri mean consumers are getting used to biometrics in their everyday mobile lives, and they might be more tolerant of similarly imperfect technologies at work and at home.

Avivah Litan, a security expert at the consulting firm Gartner, thinks that the move to mobile computing holds the key to the future of passwords.? As users perform more and more critical functions with their mobile device ? such as mobile banking ? authentication methods will have to change with the times. So-called ?out-of-band? authentication techniques, like text messages sent to web users warning that their accounts have been accessed, are clumsy to use in concert with mobile banking. So Litan thinks that, finally, mobile users will tolerate a biometric technique that they are already very comfortable with ? talking.

?I do think voice has a real shot now,? she said. ?Who wants to carry around a token that might weigh more than your iPhone??

The big hurdle with voice printing is ?enrollment,? or getting an initial clean version of a users? voice that?s used for comparison purposes later. Techniques for mass enrollment are still under development, but cell phone carriers are in a unique position to do this easily when they sell new phones, Litan noted.

?It would be easy for them,? she said. ?But there are plenty of other ways this could be accomplished.?

But despite the technological advances, the crime and all those leaked passwords, are passwords really on the way out?? Jost isn't so sure.

"I certainly think the awareness of the problem is rapidly growing," he said. "It's quite easy to guess (passwords) ? and by using other types of systems you can overcome that problem. Is this a turning point or not? I'm not really sure. But I hope so. It is a problem that gets bigger and bigger."

* Follow Bob Sullivan on Facebook.
* Follow Bob Sullivan on Twitter.

?

Source: http://redtape.nbcnews.com/_news/2012/09/25/14074229-why-your-next-passw0rd-might-not-be-a-password?lite

ndaa timberwolves weight watchers rawhide bigfoot sandra dee twilight zone

Tumor cell growth does not follow a master plan

ScienceDaily (Sep. 25, 2012) ? Scientists at Charit? -- Universit?tsmedizin Berlin could explain a yet unknown regulatory network that controls the growth of tumor cells. Understanding such networks is an important task in molecular tumor biology in order to decode the relationships between the determinants defining which molecules are produced and in what quantities, in both normal and tumor cells.

The study is published in the journal Molecular Systems Biology.

The growth of a tumor and its reaction to specifically targeted therapy is dictated by changes in its genetic material (mutations) encoding special signal molecules. These molecules activate the genetic program of tumor cells via branched signaling pathways and influence all processes needed for cell division, the mobility of cells and metastasis. Significant steering elements of these tumor-specific programs are called transcription factors. These are molecules that selectively control the transcription of the cell's genetic information (DNA) into messenger RNA and enable production of proteins . Altogether a complex network of mutually regulating transcription factors is activated.

Whereas the signal network in human tumors has already been characterized very well, it is hardly understood how transcription factors cooperate and regulate each other. In order to explain this transcription factor network, the scientists used a systems biology approach. A complex experimental data set -- in which the transcription factors in tumor cells were systematically disrupted -- was analyzed with the help of mathematical modeling. As a result, interactions within the network could be reconstructed and the network controlling tumor growth clarified.

"Contrary to a current assumption, the results show that no superordinate transcription factor exists that controls the activity of other factors as a master regulator," explains Prof. Reinhold Sch?fer, head of the Laboratory for Molecular Tumor Pathology and deputy director of the Charit? Comprehensive Cancer Center. Instead, two hierarchical groups of interacting factors exist. Each of them activates gene sets needed for growth and cancer-specific properties of the cells. The results indicate that new therapeutic approaches against tumors must target multiple rather than singular factors and consider the network structures.

Share this story on Facebook, Twitter, and Google:

Other social bookmarking and sharing tools:


Story Source:

The above story is reprinted from materials provided by Charit? - Universit?tsmedizin Berlin.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Journal Reference:

  1. Iwona Stelniec-Klotz, Stefan Legewie, Oleg Tchernitsa, Franziska Witzel, Bertram Klinger, Christine Sers, Hanspeter Herzel, Nils Bl?thgen, Reinhold Sch?fer. Reverse engineering a hierarchical regulatory network downstream of oncogenic KRAS. Molecular Systems Biology, 2012; 8 DOI: 10.1038/msb.2012.32

Note: If no author is given, the source is cited instead.

Disclaimer: This article is not intended to provide medical advice, diagnosis or treatment. Views expressed here do not necessarily reflect those of ScienceDaily or its staff.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/top_news/top_health/~3/VUpTOBdoWug/120925091548.htm

air jordans pecan pie recipe prince philip sugar cookie recipe sugar cookie recipe how the grinch stole christmas macaroni and cheese

http://realty-odessa.com/ | Business Advertising for Your Success ...

The number of tourists continues to rise in the summer each in Ukraine. Usually the first visit Ukraine and enjoy amazing architecture, stunning scenery and rich history! The next step visiting Odessa, located on the Black Sea Coast where you can not only rest, but to do business too! And the main task of the first visitors were finding a place to stay. For the first stay in Ukraine, visitors prefer to rent an apartment or house.

Hire an apartment in Odessa become more and more popular among foreign tourists who visit. Only about 10% of the tourists prefer hotels, the rest chose to rent a comfortable apartment in the center suggest. For employers who are observant, this is a very promising opportunity in the property.

Getting real estate in Ukraine is a wise decision for several reasons, First, convenient for visiting the city and each time did not think where you will be staying. Secondly, buying property in Ukraine is a good investment option.

If you want to get information on apartments for sale in Odessa, Ukraine, you can visit http://realty-odessa.com, to get more information.

Source: http://www.columbiaadclub.com/2012/09/httprealty-odessa-com/

marco scutaro betty white ed reed football schedule jo paterno dead south carolina tuskegee airmen

Tuesday, September 25, 2012

Little evidence supports medical treatment options for adolescents with autism

Tuesday, September 25, 2012

Vanderbilt University researchers are reporting today that there is insufficient evidence to support the use of medical interventions in adolescents and young adults with autism.

Despite studies that show that many adolescents and young adults with autism spectrum disorders are being prescribed medications, there is almost no evidence to show whether these medications are helpful in this population, the researchers said.

These findings are featured in the Sept. 24 issue of Pediatrics.

"We need more research to be able to understand how to treat core symptoms of autism in this population, as well as common associated symptoms such as anxiety, compulsive behaviors and agitation," said Jeremy Veenstra-VanderWeele, M.D., assistant professor of Psychiatry, Pediatrics and Pharmacology and Vanderbilt Kennedy Center investigator.

"Individuals, families and clinicians currently have to make decisions together, often in a state of desperation, without clear guidance on what might make things better and what might make things worse, and too often, people with autism spectrum disorders end up on one or more medications without a clear sense of whether the medicine is helping."

This research is part of a larger report on interventions for adolescents and young adults with autism that found there is little evidence to support findings, good or bad, for all therapies currently used.

The researchers systematically screened more than 4,500 studies and reviewed the 32 studies published from January 1980 to December 2011 on therapies for people ages 13 to 30 with autism spectrum disorders. They focused on the outcomes, including harms and adverse effects, of interventions, including medical, behavioral, educational and vocational.

Key findings:

Some evidence revealed that treatments could improve social skills and educational outcomes such as vocabulary or reading, but the studies were generally small and had limited follow-up.

Limited evidence supports the use of medical interventions in adolescents and young adults with autism. The most consistent findings were identified for the effects of antipsychotic medications on reducing problem behaviors that tend to occur with autism, such as irritability and aggression. Harms associated with medications included sedation and weight gain.

Only five articles tested vocational interventions, all of which suggested that certain vocational interventions may be effective for certain individuals, but each study had significant flaws that limited the researchers' confidence in their conclusions. The findings on vocational interventions were featured in the Aug. 27 issue of Pediatrics.

Although the prevalence of autism is on the rise, much remains to be discovered when it comes to interventions for this population, the researchers concluded.

As recently as the 1970s, autism was believed to affect just one in 2,000 children, but newly released data from the Centers for Disease Control and Prevention (CDC) estimates that one in 88 children has an autism spectrum disorder. Boys with autism outnumber girls 5-to-1, which estimates that one in 54 boys in the United States has autism.

###

Vanderbilt University Medical Center: http://www.mc.vanderbilt.edu/npa

Thanks to Vanderbilt University Medical Center for this article.

This press release was posted to serve as a topic for discussion. Please comment below. We try our best to only post press releases that are associated with peer reviewed scientific literature. Critical discussions of the research are appreciated. If you need help finding a link to the original article, please contact us on twitter or via e-mail.

This press release has been viewed 13 time(s).

Source: http://www.labspaces.net/123795/Little_evidence_supports_medical_treatment_options_for_adolescents_with_autism__

London 2012 Soccer dwight howard Olympics closing ceremony PGA Championship 2012 John Witherspoon hope solo hope solo

Small Biz / Entrepreneurship, Liber8Me Online Business Mentoring ...

Bank of America Hires More Than 130 Small Business Bankers Across Florida

Bank of America today announced that it has hired more than 130 small business bankers throughout Florida to provide guidance to local small business owners. The additions are part

FedEx Launches New Small Business Grant Competition

FedEx has launched its first-ever, nationwide small business grant competition which will award a total of ,000 to six deserving U.S. small businesses. The top winner will recei

Online Marketing DNA Opens Local Small Business Marketing Services

Learn how to take out an insurance policy for your online success. Discover why your business needs a competitive analysis report before you open your doors.Orange, CA (PRWEB) September 25, 2012 Wouldn?t it be nice if you had a road map to guide you to success that was affordable and simple to access? Well, until now there really wasn?t an affordable online solution for small businesses to do an ...

My1Stop.com, America's Online Printing Superstore, Named 2012 Best Small Business Website from Webaward.org

My1Stop.com, America?s Online Printing Superstore, announced the receipt of Best Small Business Website Award for web development from webaward.org the prestigious web competition of the Web Marketing Association.Fort Scott, KS (PRWEB) September 25, 2012 My1Stop.com, America?s Online Printing Superstore, is pleased to announce they have been awarded the Best Small Business Website Award from ...

American Web Loan Adopts Online Lenders Alliance Updated Best Practices Standards

American Web Loan has adopted the recently updated best practices of the Online Lenders Alliance , furthering the industry organization's standards for marketing short-term, small-dollar loans online.

Internet Marketing for Small Businesses Event Now Registering Attendees

Internet marketing for small businesses event by Internet Marketing for Beginners is now registering attendees. The Marketer's Black Book team is part of the special guest instructors and this event is taking place on November 9th, 2012 is Jacksonville, FL to help small businesses to grow a new or existing business online.Boston, Massachusetts (PRWEB) September 24, 2012 Internet marketing for ...

2012 Online Journalism Award Winners Announced at ONA12

FRONTLINE, ProPublica, NYTimes.com, France's Rue 89, Storify and Homicide Watch were among the news and technology organizations that took top honors Saturday night at the 2012 Online Journalism Awards ...

Kabbage Raises Million To Boost Its Small Business Financing

Atlanta-based Kabbage, which provides working capital to online sellers, announce a million round of funding.

Digital River buys online payments co LML for M

Digital River is buying LML Payment Systems Inc. for about .3 million, which will help expand its online payment processing services to small businesses.

Innovative ReachLocal Mobile App for SMBs Puts Leads in the Palms of Their Hands

ReachLocal, Inc. , a leader in local online marketing solutions for small- and medium-sized businesses , announced today a new, easy-to-use mobile app that provides real-time notifications of leads and results from online marketing and advertising.

Source: http://ecommerce.matrix-e.com/eshops/141-small-biz-entrepreneurship/21982-small-biz-entrepreneurship-liber8me-online-business-mentoring-programme.html

Ryan Dempster Phelps NBC Olympics Live Olympic medal count Medal Count 2012 London 2012 Fencing olympics

Deal: Techwick Clothing from Eastern Mountain Sports

Get access to a wide range of coupons here by store. Pick your store of choice to see all the available coupons for that store. Clicking on store coupons takes you to that store to complete your purchase with coupon.
Featured Stores

Hot Offers

Today's Feautred Article


Shopping Coupons Where To Look

Now that the trend, shopping with online coupon codes has become a part of our daily lives. And the sole aim of using online coupons is saving and taking advantage of the discounts offered. But it is important to know where to find the right coupons and how to use them for bigger savings. So to know more about this, read through this article.

You cannot find coupon codes directly on retailers' websites. They are usually placed on affiliate sites or other sites as a way of advertising to fetch online shoppers to the retailers websites. Major retailers brands always keep updating their coupons and discounts. You can search these codes in popular coupon websites, where coupons get updated every second. Another way of finding latest working coupon codes is using the search engines like Google, Yahoo! or other. For example, you want to buy Timberland shoes, just type "Timberland coupon codes" and you will find hundreds of results. Even you can compare prices for the item you are looking for on several sites and coupon sites before making a decision to buy.

The codes are entered in a "coupon code" "promotional code" box while ordering. The codes have specific offer attached to them. The offers can contain discount up to certain percentage like 10%, 20% or 50% off, along with free shipping. Once customer enters the code, the discount applies automatically.

When you see the right code you have been searching for, click on the link provided and follow the instructions to buy the product. Do remember to check the discount/saving applied to your shopping cart before finishing the order. And most importantly check with the expiry of these codes before using them.

Bookmark the best sites and whenever you need to buy something, just go through the codes listed on the sites. It is easy to find codes of the retailer or brand you want in these coupon sites. The coupon sites generally have a search box on the top of their pages where customers can type retailer name or website to see the latest codes of the respective retailers.
Always make sure to check online retailers before deciding on buying any item in brick and mortar stores. You might get the same item with bigger discount and might qualify for free shipping with the help of coupon codes.
Subscribe to e-mail newsletters of your favorite online stores and coupon sites to keep yourself updated with the coolest and latest offers.
There are other types of coupons available online apart from coupon codes like discount codes, promotional codes and printable coupons. So, let us discuss about printable coupons. These coupons carry discounts and sometimes made available online by retailers. These coupons are made to be printed and redeemed at local stores. These coupons are quite similar to coupons that consumers cut from newspapers, coupon mailers, flyers, magazines, etc except consumers need to print the online coupons themselves. These coupons range from grocery to restaurants to local services to other products.

Information on promo coupon codes and coupon codes that will save your money.

Author: Olivia Lopezs
Article Source: EzineArticles.com
Digital camera for low light picture

Source: http://shoppincoupons.com/deal-techwick-clothing-from-eastern-mountain-sports/apparel

east west shrine game haywire underworld awakening dog the bounty hunter tacoma narrows bridge weather nyc open marriage