Page 67 of 169

Wikinews interviews Joe Schriner, Independent U.S. presidential candidate

Saturday, April 17, 2010

Journalist, counselor, painter, and US 2012 Presidential candidate Joe Schriner of Cleveland, Ohio took some time to discuss his campaign with Wikinews in an interview.

Schriner previously ran for president in 2000, 2004, and 2008, but failed to gain much traction in the races. He announced his candidacy for the 2012 race immediately following the 2008 election. Schriner refers to himself as the “Average Joe” candidate, and advocates a pro-life and pro-environmentalist platform. He has been the subject of numerous newspaper articles, and has published public policy papers exploring solutions to American issues.

Wikinews reporter William Saturn? talks with Schriner and discusses his campaign.

Retrieved from “https://en.wikinews.org/w/index.php?title=Wikinews_interviews_Joe_Schriner,_Independent_U.S._presidential_candidate&oldid=4497624”

Chinese researchers crack major U.S. government algorithm used in digital signatures

Wednesday, February 16, 2005According to computer security expert Bruce Schneier, a widely-used cryptography algorithm, known as SHA-1, has been broken by three researchers at Shandong University in China. Designed by the US intelligence agency NSA, SHA-1 has been adopted as an official US government standard and has become widely-used in security applications worldwide, notably digital signatures. The three female researchers, Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu, have reduced the amount of time needed to find two documents with the same signature by a factor of more than 2000.

The SHA-1 algorithm is used to compute a short string of numbers, known as a hash, for any digital document. The algorithm is constructed such that small changes in the document cause the hash to change drastically. By this means, the hash can be used to verify that a document has not been tampered with.

The attack that Schneier describes is a “collision attack,” rather than the more useful “pre-image” attack. In a pre-image attack, the codebreaker is able to find a document with different contents that matches an existing hash and so can claim an existing signature was on something else. In the somewhat less valuable “collision attack,” the codebreaker is able to devise two documents that both have some particular hash. A adversary might use this to claim that an altered document is the original on the grounds that they have the same hash. A crafty adversary might also be able to trick someone into signing an innocuous document, one of a pair from a collision. The other document, which might not be as harmless, would then also appear to have been signed by the same person. If collisions can be found for SHA-1, then digital signatures will no longer vouch for a document’s authenticity.

The attack, for now, is more of a theoretical than a practical kind: it would currently take thousands of years on a modern personal computer, and would still be slow even if a large number of computers were used in parallel.

Xiaoyun Wang is currently a professor at Shandong University, while Hongbo Yu is a doctoral candidate at the same institution. Yiqun Lisa Yin is currently a visiting researcher at the Princeton Architecture Laboratory for Multimedia and Security (PALMS). Last year, Xiaoyun Wang and Hongbo Yu also took part in breaking a series of similar algorithms, including the widely used MD5 hash, as documented in their paper presented at the Crypto 2004 conference.

Officials from the National Institute of Standards and Technology (NIST) have recently recommended dropping SHA-1 in favor of stronger, slower algorithms, such as SHA-256, Federal Computer Week reported on February 7, 2005, just 7 days before Schneier announced the SHA-1 break. Despite deprecating SHA-1, William Burr, the head of NIST’s security technology group, said that “SHA-1 is not broken, and there is not much reason to suspect that it will be soon.”

Retrieved from “https://en.wikinews.org/w/index.php?title=Chinese_researchers_crack_major_U.S._government_algorithm_used_in_digital_signatures&oldid=1985414”

Wikinews interviews Democratic candidate for the Texas 6th congressional district special election Daryl Eddings, Sr’s campaign manager

Tuesday, April 20, 2021

Wikinews extended invitations by e-mail on March 23 to multiple candidates running in the Texas’ 6th congressional district special election of May 1 to fill a vacancy left upon the death of Republican congressman Ron Wright. Of them, the office of Democrat Daryl Eddings, Sr. agreed to answer some questions by phone March 30 about their campaigns and policies. The following is the interview with Ms Chatham on behalf of Mr Eddings, Sr.

Eddings is a federal law enforcement officer and senior non-commissioned officer in the US military. His experience as operations officer of an aviation unit in the California National Guard includes working in Los Angeles to control riots sparked by the O. J. Simpson murder case and the police handling of Rodney King, working with drug interdiction teams in Panama and Central America and fighting in the Middle East. He is the founder of Operation Battle Buddy, which has under his leadership kept in touch with over 20 thousand veterans and their families. He was born in California, but moved to Midlothian, Texas. He endeavours to bring “good government, not no government”. Campaign manager Faith Chatham spoke to Wikinews on matters ranging from healthcare to housing.

An Inside Elections poll published on March 18 shows Republican candidate Susan Wright, the widow of Ron Wright, is ahead by 21% followed by Democrat Jana Sanchez with 17% and Republican Jake Ellzey with 8% with a 4.6% margin of error among 450 likely voters. The district is considered “lean Republican” by Inside Elections and voted 51% in favour of Donald Trump in last year’s US presidential election. This is down from 54% for Trump in 2016’s presidential election, the same poll stated.

Retrieved from “https://en.wikinews.org/w/index.php?title=Wikinews_interviews_Democratic_candidate_for_the_Texas_6th_congressional_district_special_election_Daryl_Eddings,_Sr%27s_campaign_manager&oldid=4684113”

Rf Cables – Still A Fast, Reliable Choice

byadmin

Coaxial cable is the most common type of antenna feeder in use today. Often referred to a RF (radio frequency) cable, it is used in a wide number of applications wherever the transfer of radio frequency energy is required.

Although one of the most common applications is for television down-leads in domestic applications, RF cable is used in any application where high frequency signals need to be carried over a distance. These applications include:

* Commercial and industrial transmission lines* Ethernet local area networks* Wi-Fi networks* Mobile phones* Terrestrial microwave* Air traffic control* Military* Medical* RFID antennas

How Do They Work?RF cables are designed to prevent any potential interference. To achieve this, they are constructed of four circular layers – the signal-carrying wire, insulating material (usually solid plastic), a metal shield and a final plastic protective casing.

An RF or coaxial cable carries equal and opposite current in both the outer and inner conductors. This effectively confines all the fields within the cable, so it neither transmits nor receives signals.

The cable operates by broadcasting an electromagnetic wave inside itself. It is not affected by nearby objects, making it ideal for any applications where it has to be routed around or through buildings, or close to other objects. This gives it a huge advantage over other feeder cables, such as open wire or twin.

Types of RF CableThere are many different types of RF cables:

* Coaxial (coax) cable – this is the most common and is used primary to connect your TV to other appliances.* Twinaxial (twinax) cable – this has two central conductors, and is commonly used to connect data hubs.* Heliaxial (heliax) cable – often used to connect a radio transmitter and an antenna.

LimitationsRF cables do have a couple of disadvantages in some applications, when compared to “newer” types of cables. These include:* Sound can only be carried between two devices in mono, not stereo.* If the cables are not properly manufactured, they may pick up interference from power cables or magnetic sources.

AdvantagesRF cables are the best option for connecting a TV aerial to TV equipment. They:

* Exhibit low losses* Provide stable performance* Are very flexible* Have fast transmission speed

Delaire USA specializes in manufacturing custom fiber optic and RF cables and assemblies for military and telecommunication applications. Visit www.delaireusa.com for more information.

Tour de France: Alberto Contador wins stage 14

Sunday, July 22, 2007

File:060405 contador.jpg

Alberto Contador of Spain has won stage 14 of the 2007 Tour de France. Michael Rasmussen of Denmark came in second and extended his overall lead by 2′ 04′ over Cadel Evans of Australia. Contador moves into second ahead of Evans and 2′ 23″ behind Rasmussen.

Contador and Rasmussen had an animated discussion about how to share the workload up the final climb. Contador was happy to sit behind the yellow jersey-wearing Rasmussen, and pass him in the final sprint for the finish-line. The Dane had hoped for more help in setting the pace and extending his overall lead.

The winner of yesterday’s time trial, Alexandre Vinokourov, did not have a good day. Andreas Klöden will likely now be the leader for Astana Team.

This stage took the race into the Pyrenees. This stage starts with a category 2 climb out of Mazamet and then follows a relatively calm route via Carcassonne, Limoux and Quillan before taking on the Port de Pailhères (17 km at 7.2%) and a very difficult finish at Plateau-de-Beille (16 km at 7.9%).

Tomorrow’s 196 km stage should be one of the major stages of the Tour, with no fewer than five major mountain passes – including the Col de Port, the Col de Portet d’Aspet (5.7 km climb at 6.9%), the Col de Menté (7.0 km climb at 8.1%), the Port de Balès (19.5 km at 6.2%), (the first time this climb has featured in the Tour), and finally the Col de Peyresourde (9.7 km climb at 7.8%) with a downhill finish in Loudenvielle. This exhausting stage will be followed by a day of rest.

[edit]

Retrieved from “https://en.wikinews.org/w/index.php?title=Tour_de_France:_Alberto_Contador_wins_stage_14&oldid=4681551”

Charles Upham’s medals to stay in New Zealand

Wednesday, November 15, 2006

The Victoria Cross and bar awarded to soldier, Charles Upham, have been sold to Britain’s Imperial War Museum in London. The Victoria Cross and bar, also known as a double Victoria Cross, were only awarded to one combat solider, Mr Upham. The medals will, however, remain in New Zealand as they are on loan to New Zealand for 999 years, this is welcoming news to the New Zealand government.

The medals were not exactly donated to New Zealand as it is currently illegal to export the medals, but it still generous to donate them so New Zealand can still see the medals at the Queen Elizabeth II Army Memorial Museum. His family had requested that they be on view.

Amanda Upham and Virginia MacKenzie are Mr Uphams daughters and are the ones who sold the medals to the war museum in Britain. The medals were sold for an unknown amount of money, however it was known that they had wanted NZ$3.3 million.

The government had offered to buy the medals for $1 million, this was rejected by the two daughters which caused a lot of controversy. A collector had then offered $9 million.

Speaking in Hong Kong, Phil Goff, minister of defence, said: “I’m hugely pleased the Upham medals will now be held at the Waiouru Army Museum in perpetuity as part of New Zealand’s military heritage.” Mr Goff also thanked a trust that worked together with the museum to make sure that New Zealand was still able to view the medals.

Mr Upham had won his Victoria Crosses in World War Two. His first Victoria Cross was won in the Battle of Crete in 1941. And he won his bar in the Western Desert about a year after his first Victoria Cross.

A Victoria Cross is the highest medal available to be awarded for bravery in the Commonwealth Realm.

Retrieved from “https://en.wikinews.org/w/index.php?title=Charles_Upham%27s_medals_to_stay_in_New_Zealand&oldid=778533”

Inventory Control Helping You Manage Your Stocks And Inventory Better

Inventory control helping you manage your stocks and inventory better

by

john mayer123

If you are a manufacturing company or a trading concern that stocks many supplies and inventory, there is no doubt that your will have trouble keeping control of your inventory. To make sure that you have the maximum profits and also to ensure that there are no wastages, it is necessary to have a strong inventory control policy in place. If you feel that you are not very efficient at managing this job by yourself, you can always hire the services of a company that offers inventory accounting services. If you have a planned and systematic program in place, these inventory accounting companies will take over the program and make sure it runs properly.

Sudden jobs

Even if you don t have a proper inventory control system in your business concern, you need not worry. These companies can carry out any sort of

[youtube]http://www.youtube.com/watch?v=eKtc2J_7vN8[/youtube]

inventory accounting

service even at short notices or as a last minute work. The accuracy of their work and the dependability of their services are their strong points. They believe in values such as trust, integrity and kindness. These values are the foundation on which they build their reputation and name. They offer they best services using the best people trained to be professionals and experts in their field.

Trained and equipped staff

Physical stock taking of inventory and equipment can be a very hard and difficult process, both on the personnel and the nature of accounts involved in it. The companies that provide inventory accounting services make sure that their staff and employees are trained well enough to handle the pressures of physical inventory verification. The staff apart from helping in the physical stock taking will also help in generating and preparing the various reports and documents related to this process. They will also write up all the closing reports that are needed. They also conduct reviews of the reports and carry out any reconciliation if necessary.

Benefits of inventory control

There are many benefits of hiring the services of an

inventory service

provider. Having a good, strong and reliable inventory control program will result in better inventory management. You will have more control of the quantity of inventory coming in and going out of your company. You will also be able to manage the physical storage of the inventory very well. Your accounts will also be in good shape and all this will lead to better productivity and ultimately optimum profits.

John Mayer is a professional author. He loves to share his idea and knowledge to make people aware about on a large variety of Best SEO Company and SEO Company Reviews.

Article Source:

ArticleRich.com

Sprint Nextel customer service rep. harasses client; Sprint cancels his account

Sunday, July 22, 2007

Virginia – Joshua Brady, a former Sprint Nextel customer, has had his cellular phone account shut off, but not because he wasn’t paying the phone bill, or even because he was late on payments, but because a customer service representative who assisted him, began to call him outside of her job, and make death threats to him in September of 2006. She was never fired for her actions, Brady says.

Brady has agreed to be interviewed by Wikinews to tell his story. All information and claims have been logged with Brady’s attorney and federal authorities.

The representative from Sprint Nextel, who for safety reasons is only being identified as Jessica, was working at the company’s call center in Ontario, Canada where Brady’s call to customer service was directed. According to Brady, Jessica then began to call him outside of her job duties at the call center after their first contact.

Brady called the center around 6:00 p.m. (eastern time) on a Saturday and attempted to receive help on a billing question and to find a way to stop prank calls. Brady requested a “soc code”, a code placed into the phone, that would allow for the number that was pranking him to be blocked. Unfortunately, Jessica did not know what that was, but tried unsuccessfully to find it. According to Brady, the only thing she could find was “the ANI feature call centers have.”

Brady then described to Jessica the billing issue he was having. He was being charged “for text messages I was not making”, even though he had unlimited text messaging with his billing plan. Meanwhile, Jessica called for a supervisor to help locate the code. As this customer service request over the phone was taking quite a bit of time, the two of them then started to discuss what two people would normally discuss if just chatting; sports, the weather, movies and music and if Virginia was a nice place to go on vacation. The supervisor then came by Jessica’s station with no luck on finding a code.

Later that night, around 10:30 p.m., Brady received a call. He answered it and much to his surprise, it was Jessica. He answered the phone with the usual “hello” and the voice on the other end answered with “hello Josh.” Brady was “surprised” that she had not said “hello Mr. Brady.”

“I then asked who it was, and she said Jessica. She told me about her day, and hoped that I did not mind her calling.” Then according to Brady, she started to describe how much she hated working in a call center, and how the job “pays the bills”, and asked if she could “come visit me sometime”. Brady said that he “immediately started to record” the call. Brady also stated that Jessica was not aware she was being recorded, and that further conversations were recorded without her knowing.

The call lasted about 15 minutes, but Brady said she “spoke so fast and moved along through things” that he “didn’t have a chance to talk if I wanted to. It [the call] ended with me interrupting her and telling her I had to go to dinner with a friend.”

Brady immediately called customer care back and reported Jessica’s actions to a supervisor (Jason), and the Floor Manager (Also named Jessica) at the Coos Bay call center, which is where his call happened to be directed. The advice he received was to “play along” and continue to report her actions until they could locate someone “better equipped” to handle the situation.

Jessica then began to call “about every other day or so” which turned out to be almost 30 calls, according to Brady who reported each call she made to Sprint Nextel.

Sprint Nextel then told Jessica to cease and desist all contact with Brady, but that didn’t stop Jessica from contacting him. She somehow found out the screen-name of his AOL Instant Messenger account, and left messages threatening to kill him. Brady logged the messages and faxed them to Sprint, who about a week later sent Brady a letter, saying that his accounts have been terminated.

“The purpose of this letter is to inform our that our office has received a complaint regarding your recent questionable interactions with our customer care group. Recent interactions with our company have prompted us to formally contact you. Sprint Nextel terms and conditions state that “termination of services. consistent with this agreement…”, said the letter from Sprint Nextel.

Brady states that Jessica is still employed with Sprint Nextel, despite the fact that all instant messages left by Jessica were forwarded to Sprint Nextel.

As recently as July 10, 2007, as many as 1,000 accounts were terminated by Sprint Nextel because customers were complaining too much and asking too many questions about billing.

“While we have worked to resolve your issues and questions to the best of our ability, the number of inquiries you have made to us during this time had led us to determine that we are unable to meet your current wireless needs,” said one letter to a sprint customer as recent as June 29, 2007. The letter states that the service will be terminated just one day after the letter was written despite saying they “understand switching to a new carrier causes an inconvenience.”

Two weeks ago, Sprint addressed the media about the mass-cancellations. “These accounts have been researched very carefully,” Sprint spokeswoman Roni Singleton said. “We feel strongly that the decisions we made, we stand by them. These decisions weren’t made lightly.”

“If the average person is calling less than once per month and these people are calling 40 or 50 times more, that takes away from customer service,” Singleton said. “Our priority is to improve the customer experience.”

Wikinews sent e-mails to Sprint Nextel on July 20 regarding the Brady incident; to date no response has been received.

Update: On July 23, 2007, Wikinews received an email response from a Sprint representative, going to some length to explain the termination of the customers who were calling up to hundreds of times a month. No information was given on the Brady case covered in this article; “customer privacy considerations” were cited as the reason and “no comment” was Sprint’s reply.

Retrieved from “https://en.wikinews.org/w/index.php?title=Sprint_Nextel_customer_service_rep._harasses_client;_Sprint_cancels_his_account&oldid=3970642”

Common Reasons For Undergoing Eyelid Surgery In Wichita, Ks

byadmin

Sometimes the appearance of an individual’s eyelids causes them to look like they are tired when they aren’t. As people age, their skin loses its youthful elasticity, and one of the first places this occurs is the area under and around the eyes. Thus, the upper eyelid begins to sag or droop and pockets of fatty tissue begin to develop beneath the eyes. Over the years, the muscles weaken and the skin stretches, allowing the fatty deposits to form. In many individuals, there is also a hereditary component involved as well.

Fortunately, many of these issues can be addressed through Eyelid Surgery in Wichita KS. Blepharoplasty, the medical term for eyelid surgery, is mostly performed for cosmetic reasons, however, some cases have medical relevance and as such are likely to be covered by insurance. Medical reasons for eyelid surgery include having an obstructed field of vision due to droopy eyelids or difficulty wearing contact lenses or eyeglasses due droopy eyelids or excessive fat deposits under the eye.

Regaining a youthful experience or obtaining an overall improved appearance are the primary reasons for undergoing this optional surgical procedure. Eyelid surgery is performed under anesthesia on an outpatient basis. A typical procedure involves removing the loosened skin, removing or redistributing fat deposits, and tightening the tissues and muscles.

Droopy eyelids, or ptosis, is the medical term used to describe the condition where the upper eyelid droops downward, affecting one or both eyes. The condition can be congenital, or can develop following surgical eye procedures such as cataracts, where the eyelid is manipulated during surgery, thus weakening the muscles responsible for holding the eye open. Other reasons such as stroke or head trauma can result in ptosis as well.

Click here to learn more about the types of eyelid surgeries that can be performed on either the upper or lower lids, or both, if necessary. Depending on what the surgeon deems is necessary, either excess muscle, skin, or fat may be removed. Incisions are typically performed in the eyelid’s natural crease to minimize any scarring.

Blepharoplasty, or eyelid surgery in Wichita, KS, are primarily done so by ophthalmologists or oculoplastic surgeons (a specialty of ophthalmology). Other medical professionals such as plastic surgeons, ENT surgeons, and oral and maxillofacial doctors are also skilled in performing cosmetic eyelid surgery.

Viktor Schreckengost dies at 101

Sunday, January 27, 2008

Viktor Schreckengost, the father of industrial design and creator of the Jazz Bowl, an iconic piece of Jazz Age art designed for Eleanor Roosevelt during his association with Cowan Pottery died yesterday. He was 101.

Schreckengost was born on June 26, 1906 in Sebring, Ohio, United States.

Schreckengost’s peers included the far more famous designers Raymond Loewy and Norman Bel Geddes.

In 2000, the Cleveland Museum of Art curated the first ever retrospective of Schreckengost’s work. Stunning in scope, the exhibition included sculpture, pottery, dinnerware, drawings, and paintings.

Retrieved from “https://en.wikinews.org/w/index.php?title=Viktor_Schreckengost_dies_at_101&oldid=2584756”

Page 67 of 169

Powered by WordPress & Theme by Anders Norén