Monday, May 11, 2009

Career Tips for Interviews

The job interview can be a stressful and intimidating process. Through the experience gained by connecting job seekers with employers, the Tennessee Department of Labor and Workforce Development wanted to share some key principles that will assist to make your job interview a positive experience. While no one job interview secures employment, it is your opportunity to communicate your skills, personality, attitude and work ethic to your prospective employer. Along with both personal and professional references, work experience, employability history, resume and introductory letter, all of these aspects help an employer determine if you are the right candidate for an opening. With that said, it is imperative that all of these areas receive your attention through the job hunting phase. Often young people face the challenge of limited work experience with little or no employment history. A good substitute, in this case, would be to include grades from high school or college courses which may reflect ability in a particular career cluster.

This list touches on key aspects of the interview and is in no way considered all inclusive.
  • The interview is your opportunity to sell yourself
  • Be prepared.
  • Interviewing is a skill and can be learned.
  • Through practice - your confidence will grow.
  • The interview creates impressions - consider your dress, communicate your strengths, show your personality
  • Remember your purpose, to let an employer learn about you and for you to learn about the employer. You need to be sure that this is the place for you.
  • Expect the expected! In other words, in the interview you will be discussing several issues about yourself. These areas include your interests, your skills, your education, your experience, your attitude, your strengths and weaknesses and also your career goals (5-year/10-year). If you are prepared, you can take charge and guide the conversation.
  • Know who you are interviewing with. It sends a positive impression when you are knowledgeable of an employer's products, locations, history, services, etc.
  • The interview: Be on time (10 minutes early), dress appropriately, be positive, smile, maintain eye contact, speak with confidence (practice helps), maintain your posture, answer the questions and be yourself.
  • During the interview: Emphasize your strengths and abilities (not where you are weak) to demonstrate how you can benefit your employer. Never criticize a previous employer, teacher, etc.; it sends the wrong message. Do not discuss your personal issues and always say thank you to the interviewer.
  • Regarding the salary question, know your worth. There are several ways of finding out what people in certain career fields and with certain skills and education levels earn. Be realistic. Often people hurt themselves on the salary question as asking for too little money can hurt your chances as much as asking for too much.
  • After the interview: Make sure the employer knows how to get in touch with you. Follow up with a thank-you note to the interviewer and stay positive.
  • Understand that if you do not get the job that it's okay and learn from the experience. Rejection is a very real part of a job search and in many ways teaches persistence.

Monday, May 04, 2009

Dress for Success

This information focuses on two critical aspects of the job interview which are your appearance and the message your body language is sending.

Dress

Remember that when you market your job skills it all starts with the first impression. How you look is imperative as an interviewer's assessment of you has already begun when you walk in.

Some key principles include:

  • Your attire should be appropriate to the industry. This means dress professionally for your interview.

  • Even if a company has a casual dress code, wear a suit to the interview. Chances are your competition is.

  • Your attire should be conservative - both navy and black work well on men or women, with a simple white or off-white colored shirt or blouse.

  • Jewelry, ties or other accessories should be limited and tasteful.

  • For women short skirts and open-toe shoes do not look as good as skirts that hang near or to the knee with hose and closed-toe shoes. Avoid bright, flashy colors. Pay close attention to your choice of make-up, purse and nails.

  • Men should avoid casual shoes, turtleneck and sweaters for the interview. Socks should match your color of suit and your shoes must be shined.

  • Your dress sends a message about yourself, your attitude and it's those small details that help gain an impression. Use your dress to your advantage by making the right first impression.


Non-Verbal Communication

The clothes you wear create an impression which is an important part of non-verbal communication, but so is body language. Here are some key principles as they relate to non-verbal communication.

  • Maintain eye contact. If you must look away do not look down as this is sometimes perceived as being submissive.

  • If you are asked to sit down, sit with your body leaning forward. Leaning back shows a relaxed attitude while leaning to either side looks awkward or evasive.

  • If you shake hands at the beginning or end of the interview, do so firmly while maintaining eye contact.

  • Try to reflect very little emotion. It's okay to laugh along with the interviewer but not on your own.

  • Keep your chin up even if you do not feel that you have done your best.

  • Be proud for taking the risk of putting yourself on the line.

Thursday, April 23, 2009

Tips About Career Consulting Firms for Job-hunters

Before you sign a contract or pay anything to a career consulting company you have seen advertised, take the following precautions to protect yourself and your livelihood:

  • Be skeptical of any employment service firm that promises to get you a job for an up-front fee and guarantees refunds to unhappy customers.
  • Consider the cost versus the likely benefit of their services.
  • Ask to meet with the representative in his or her office, rather than a hotel room or other temporary location.
  • Get a copy of the firm’s contract and review it carefully prior to signing. Understand the terms and conditions of their refund policy. If oral promises are made that do not also appear in the contract, reconsider doing business with them or, at a minimum, have these written into the contract.
  • Check the company's track record in Georgia and nationally through the Better Business Bureau. Remember, even if there are no complaints, they may have changed names or may be too new for complaints to have been registered against them.
  • Follow up with the corporate office of any employer listed in an employment service ad to confirm that the company is really hiring.
  • Be wary of firms promoting "previously undisclosed" federal government jobs. All federal positions are announced to the public.
  • Do not give out your credit card or bank account information on the phone unless you are familiar with the company and agree to pay for something. Anyone who has your account information can use it to take money from your account.
  • If you call an 800 number, you cannot legally be transferred to a 900 number. If this happens, you will be charged excessive fees in violation of federal law.

Friday, April 17, 2009

Sole parents - 10 career tips to help you unleash your potential

Sole parents face many challenges. They often need to juggle a whole range of different issues – childcare, family, home, work, education and financial management on their own. Here are ten tips which will help you to develop your career.

1. Take responsibility for your life & career - take charge

Be proactive and positive. Self care is an important step - only after you look after yourself can you look after others! Be kind to yourself, this can be a positive growth process - if you allow it! Be the best parent you know how to be and be proud of yourself. Ban the “G” word from your vocabulary (guilt). You don’t need to be a victim to external circumstances. You are in charge!

2. Make a 'date' with yourself

Don’t jump straight into preparing your resume; you deserve to take “time out” to think. Do a “stocktake” of your skills, values and interests. Your life experiences provide a wealth of knowledge and skills you can tap into. This can include both paid and unpaid work and volunteer jobs. Think about childhood dreams – is there something you always wanted to do? Get in touch with “yourself” – what are your talents? What resources are available on Australian WorkPlace and other websites to help you do your “stocktake”.

3. Know your challenges

Facing your challenges and fears helps you to deal with them. As a sole parent, there may be a variety of issues to deal with, such as childcare, financial stability and commitments, relationship and ongoing role of ex partner, negative perceptions of a “sole parent”, fear of failure, lack of formal education or qualifications, age and conflicting needs between home and work, etc. The important thing is to realise that if things are getting too hard for you – you don’t have to do it alone. Seek help and counselling if needed. It helps to have someone to talk to.

4. Getting the work-life balance right

There are many aspects of your life you need to consider. As a sole parent – you wear many hats – and often at the same time! Think about the things that are important to you ie work/family/study/interests and consider a portfolio approach. Work out what will guarantee your income and allow you the freedom to do things you feel passionate about including education and training. You may need time to explore and discover your direction.

5. Nurture your support networks

Childcare is often the most difficult issue and contingency plans must be in place. Meeting other people in the same situation as you can lead to many positive opportunities. Know the supports in your local community and availability of childcare. Build your network of family and friends who can help and support you.

6. Trial and error without judgement

Exploring is an exciting time, where you are heading in a different direction and trying out new things. Taking risks is necessary and at the same time learning not to judge yourself on the results. Exploring involves risks otherwise there would be no growth. Find a direction you are interested in and take small steps. Find the things that energise you and give them a try. Ideas such as home based business may be a possibility. The internet is a great place to help you explore ideas.

7. Network, network, network

Take time to talk to others about opportunities and ideas. Generally people like talking about themselves and what they do. As a sole parent – you already are a good networker – look at all the people you talk to during one day!

8. What education and training do you need?

The JET advisor at Centrelink is an excellent contact. Courses such as Work Opportunities for Women through TAFE can help you find a direction. Make an appointment to see the Counsellor at TAFE or University to help you research study choices. Local community centres may offer courses as well. This can help ease you back into study and help give you the confidence to move forward.

9. Reality check

Talk your ideas over with a trusted colleague or friend for a different point of view.

10. Inspiration

There are many web sites which can give you information and ideas. The internet is also an excellent medium to meet other sole parents. Explore sites such as

  • Community.gov.au information and services for Australians
  • Parent Link
  • The Single Parent Network
  • Single Parents

Friday, April 10, 2009

Career Tips

Work in the outdoors and make a difference!


EMPLOYERS
Positions are usually in government agencies or non-profit organizations. Many people begin with a seasonal position to gain experience and get a feel for the variety of opportunities available. These positions often do not offer the full range of benefits such as insurance and retirement, but they do offer greater flexibility and experience that can lead to a better position later on.

Sunday, April 05, 2009

Electron microscope

How would the field of science have developed without the invention of the microscope? Although magnification by simple lenses has been practiced since ancient times, the first compound microscope wasn't discovered until the late 16th century. While experimenting with a pair of lenses mounted on a sliding tube, Dutch spectacle makers -- Zaccharias Janssen and his son Hans -- discovered that nearby objects appeared enlarged. In 1609, Galileo improved upon their experiments and worked out the principal of lenses with a focusing device. In the late 17th and early 18th centuries, Anton van Leeuwenhoek of Holland, often referred to as the father of microscopy, developed lenses that could magnify objects up to 270 times and made numerous biological discoveries with microscopes he built. By the early 1900s, the compound microscope had evolved to its present form. Although sophisticated, special-purpose, modified microscopes have emerged since then, modern light microscopes still cannot distinguish objects smaller than half the wavelength of light and have limited magnification capabilities. In the 1930s, German scientists Max Knott and Ernst Ruska introduced the electron microscope, which utilizes an electron beam with a smaller wavelength. This invention now allows scientists to magnify at levels up to 500,000 times.

Thursday, March 26, 2009

Obama Plans to Boost U.S. Forces in Afghanistan, Set Benchmarks

President Barack Obama plans to send 4,000 more U.S. troops to Afghanistan to train local forces and set benchmarks for progress in battling militants there and in Pakistan, administration officials said.

The president’s new strategy for turning the corner in the eight-year-old war, to be announced this morning, comes amid increased insurgent activity and before Afghanistan’s presidential and provincial elections scheduled for Aug. 20.

Obama also would support legislation to boost economic aid to Pakistan to $1.5 billion a year in exchange for that country cracking down on Taliban and al-Qaeda militants hiding out along border, the officials, who briefed reporters last night, said.

The administration began outlining the new strategy for members of Congress yesterday. Obama also will be discussing it with other leaders of the North Atlantic Treaty Organization when he meets with them for a summit April 3-4 on the French- German border. The administration has been pressing the allies to shoulder more responsibility in Afghanistan.

The 4,000 extra U.S. troops, which are in addition to the 17,000 military personnel Obama already has ordered to the country, will prepare Afghan forces to take a bigger role. All the extra troops are scheduled to be in the country by fall.

“They are going to stress training the Afghans,” House Defense Appropriations subcommittee Chairman John Murtha said after a briefing by Defense Secretary Robert Gates and Admiral Michael Mullen, chairman of the Joint Chiefs of Staff.

‘Realistic’ Goals

Murtha, a Pennsylvania Democrat, said the goals of the strategy are “realistic.” He described them as: “Train the Afghans and then get the hell out of there.”

The new U.S. approach also includes strengthening Pakistan through more aid, as proposed by Senators John Kerry, a Massachusetts Democrat, and Richard Lugar, an Indiana Republican.

Kerry, chairman of the Senate Foreign Relations Committee, said parts of the plan “are very constructive and positive,” citing the need to get trainers into the country. He said he’s still concerned about terrorist bases in Pakistan.

The administration plans stepped up diplomacy in the region, as well. Secretary of State Hillary Clinton welcomed Iran’s planned participation next week in an international conference on Afghanistan. Iran “has a role to play in the region, and we hope it will be a constructive role,” Clinton said yesterday in Mexico.
Sources : http://www.bloomberg.com/apps/news?pid=20601087&sid=afZ_eWlhL6a0&refer=home

Wednesday, March 18, 2009

New Evidence From NSF-funded ANDRILL Demonstrates Climate Warming Affects Antarctic Ice Sheet Stability

A five-nation scientific team has published new evidence that even a slight rise in atmospheric concentrations of carbon dioxide, one of the gases that drives global warming, affects the stability of the West Antarctic Ice Sheet (WAIS). The massive WAIS covers the continent on the Pacific side of the Transantarctic Mountains. Any substantial melting of the ice sheet would cause a rise in global sea levels.

The research, which was published in the March 19 issue of the journal Nature, is based on investigations by a 56-member team of scientists conducted on a 1,280-meter (4,100-foot)-long sedimentary rock core taken from beneath the sea floor under Antarctica's Ross Ice Shelf during the first project of the ANDRILL (ANtarctic geological DRILLing) research program--the McMurdo Ice Shelf (MIS) Project.

The National Science Foundation (NSF), which manages the U.S. Antarctic Program (USAP), provided about $20 million in support of the ANDRILL program. The other ANDRILL national partners contributed an additional $10 million in science and logistics support.

"The sedimentary record from the ANDRILL project provides scientists with an important analogue that can be used to help predict how ice shelves and the massive WAIS will respond to future global warming over the next few centuries," said Ross Powell, a professor of geology at Northern Illinois University.

"The sedimentary record indicates that under global warming conditions that were similar to those projected to occur over the next century, protective ice shelves could shrink or even disappear and the WAIS would become vulnerable to melting," Powell said. "If the current warm period persists, the ice sheet could diminish substantially or even disappear over time. This would result in a potentially significant rise in sea levels."

ANDRILL--which involves scientists from the United States, New Zealand, Italy and Germany--refines previous findings about the relationship between atmospheric carbon dioxide concentration, atmospheric and oceanic temperatures, sea level rise and natural cycles in Earth's orbit around the Sun, through the study of sediment and rock cores that are a geological archive of past climate.

The dynamics of ice sheets, including WAIS, are not well understood, and improving scientists' comprehension of the mechanisms that control the growth, melting and movements of ice sheets was one of NSF's research priorities during the International Polar Year (IPY). The IPY field campaign, which officially ended March 2009, has been an intense scientific campaign to explore new frontiers in polar science, improve our understanding of the critical role of the polar regions in global processes, and educate students, teachers, and the public about the polar regions and their importance to the global system. NSF was the lead agency for U.S. IPY efforts.

The cores retrieved by ANDRILL researchers have allowed them to peer back in time to the Pliocene era, roughly 2 million to 5 million years ago. During that era, the Antarctic was in a natural climate state that was warmer than today and atmospheric carbon dioxide levels were higher. Data from the cores indicate the WAIS advanced and retreated numerous times in response to forcing driven by these climate cycles.

Powell and Tim Naish, director of Victoria University of Wellington's Antarctic Research Centre, served as co-chief scientists of the 2006-2007 ANDRILL project that retrieved the data and are lead authors in one of two companion studies published in Nature.

Naish said the new information gleaned from the core shows that changes in the tilt of Earth's rotational axis has played a major role in ocean warming that has driven repeated cycles of growth and retreat of the WAIS for the period in Earth's history between 3 million and 5 million years ago.

"It also appears that when atmospheric carbon dioxide concentrations reached 400 parts per million around four million years ago, the associated global warming amplified the effect of the Earth's axial tilt on the stability of the ice sheet," he said.

"Carbon dioxide concentration in the atmosphere is again approaching 400 parts per million," Naish said. "Geological archives, such as the ANDRILL core, highlight the risk that a significant body of permanent Antarctic ice could be lost within the next century as Earth's climate continues to warm. Based on ANDRILL data combined with computer models of ice sheet behavior, collapse of the entire WAIS is likely to occur on the order of 1,000 years, but recent studies show that melting has already begun."

The second ANDRILL study in Nature--led by David Pollard of Pennsylvania State University and Rob DeConto from University of Massachusetts--reports results from a computer model of the ice sheets. The model shows that each time the WAIS collapsed, some of the margins of the East Antarctic Ice Sheet also melted, and the combined effect was a global sea level rise of 7 meters above present-day levels.

Whether the beginnings of such a collapse could start 100 years from now or within the next millennium is hard to predict and depends on future atmospheric CO2 levels, the researchers said. However, the new information from ANDRILL contributes a missing piece of the puzzle as scientists try to refine their predictions of the effects of global warming.

The most recent report of the Intergovernmental Panel on Climate Change (IPCC) noted that because so little is understood about ice sheet behavior it is difficult to predict how ice sheets will contribute to sea level rise in a warming world. The behavior of ice sheets, the IPCC report said, is one of the major uncertainties in predicting exactly how the warming of the globe will affect human populations.

"From these combined data modeling studies, we can say that past warming events caused West Antarctic ice shelves and ice grounded below sea level to melt and disappear. The modeling suggests these collapses took one to a few thousand years," Pollard said.

Pollard and DeConto also underscored the role of ocean temperatures in melting of the ice.

"It's clear from our combined research using geological data and modeling that ocean temperatures play a key role," DeConto said. "The most substantial melting of protective ice shelves comes from beneath the ice, where it is in contact with seawater. We now need more data to determine what is happening to the underside of contemporary ice shelves."

The ANDRILL Science Management Office, located at the University of Nebraska-Lincoln, supports science planning and the activities of the international ANDRILL Science Committee (ASC). Antarctica New Zealand is the ANDRILL project operator and has developed the drilling system in collaboration with Alex Pyne at Victoria University of Wellington and Webster Drilling and Exploration.

The U.S. Antarctic Program and Raytheon Polar Services Corporation (RPSC) supported the science team at McMurdo Station and in the Crary Science and Engineering Laboratory, while Antarctica New Zealand supported the drilling team at Scott Base.

Thursday, March 12, 2009

Award to Recognize Phoenix Mars Lander Team

The team that developed and operated NASA's Phoenix Mars Lander mission will receive the 2009 John L. "Jack" Swigert Award for Space Exploration from the Space Foundation.

During five months of operations at a Martian arctic site after landing on May 25, 2008, the Phoenix spacecraft confirmed the presence of frozen water just below the surface, identified potential nutrients and other substances in the soil, and observed snow in the atmosphere.

The Space Foundation, based in Colorado Springs, Colo., announced Feb. 19 that it will present the award to the Phoenix team on March 30, during the foundation's 25th National Space Symposium, in Colorado Springs.

The annual award honors the memory and legacy of Apollo 13 astronaut Jack Swigert.

The Phoenix team is a collaboration of several organizations. Phoenix Principal Investigator Peter H. Smith of the University of Arizona, Tucson, is supported by an international team of science co-investigators. NASA's Jet Propulsion Laboratory, Pasadena, Calif., provided project management, mission management, and technical collaboration with the science and spacecraft teams. Lockheed Martin Space Systems, Denver, provided spacecraft development, assembly and testing, and flight-system mission operations support. International contributions have been provided by the Canadian Space Agency; the University of Neuchatel, Switzerland; the universities of Copenhagen and Aarhus, Denmark; the Max Planck Institute, Germany, and the Finnish Meteorological Institute.

Friday, March 06, 2009

Eye-socket camera films from inside the head

The Eyeborg Project

There's a blurred line between challenge and opportunity.

Having lost his eye in a childhood accident and suffered a lot of pain, Rob Spense, a 36-year-old filmmaker, has decided to do something that'll put filming and seeing into just one eye, quite literally.

His work is called the Eyeborg project, and involves his friend Kosta Grammatis, a photographer/engineer, and a team of ocularists, inventors, and engineering specialists. The team is building a prosthetic eye that can capture and transmit video.

While the idea is simple, it's a great engineering challenge. For the project to be successful, the smallest, lightest, most power-efficient technologies have to be found and implemented.

The team is using the world's smallest CMOS camera for the project. This device is about 1.5 millimeters squared. It's so small that if you sneeze while it's resting on your open palm, you might never find it again.

The eye camera captures and sends video signal wirelessly using an RF transmitter as small as the tip of a pencil. According to Kosta, the data will be sent to a recorder placed in a backpack. The eye-socket camera is powered by a lithium polymer battery that fits inside the prosthesis.

Rob and the team are currently working on a documentary about the Eyeborg Project and the experience of living with a bionic eye.

Their work could ultimately help San Francisco artist Tanya Vlach who is looking for technology to use for her own bionic eye-cam.

Source news.cnet.com/8301-17938_105-10190801-1.html

Friday, February 27, 2009

Budget plan would leave deepest hole since 1945

WASHINGTON — President Obama on Thursday delivered to Congress a $3.6 trillion spending plan that would finance vast new investments in health care, energy independence and education by raising taxes on the oil-and-gas industry, hedge-fund managers, multinational corporations and more than 2 million of the nation's top earners.

The blueprint, meanwhile, would overhaul federal programs to strengthen assistance for millions of people who have borne the consequences of what Obama called "an era of profound irresponsibility," helping them pay for college, train for better jobs and save for retirement while taxing less of their earnings.

The agenda for the fiscal year that begins in October would not come cheap. This year's budget deficit, swollen by spending to combat a severe recession, would hit a record $1.75 trillion, or 12.3 percent of the overall economy, the highest since 1945. While Obama inherited the bulk of that gap, his budget would allow for a fresh round of spending to prop up troubled financial institutions that could hit $750 billion.

Next year's deficit would approach $1.2 trillion. But Obama proposes to cut that figure roughly in half by the end of 2012, in large part by levying nearly $1 trillion in new taxes on the highest earners, defined as families with gross income of more than $250,000 a year.

In unveiling the outline of his spending priorities, Obama acknowledged his proposal would "add to our deficits in the short term to provide immediate relief to families and get our economy moving." But he argued that the economic crisis should not be used as an excuse to delay costly investments intended to modernize the economy, enhance the work force and, ultimately, reduce government spending.

"What I won't do is sacrifice investments that will make America stronger, more competitive and more prosperous in the 21st century, investments that have been neglected for too long," Obama said. Citing the need to "break free" from foreign oil, reduce "crushing health-care costs" and improve public education, Obama said: "These investments must be America's priorities, and that's what they will be when I sign this budget into law."

Source seattletimes.nwsource.com/html/politics/2008791874_budget27.htm

Tuesday, February 17, 2009

Pulau Kapas

Relatively isolated from the hustle and bustle of the mainland, this island is the perfect getaway for those looking for some blissful relaxation.

It is a lovely small island with beautiful, quiet, unspoiled sandy beaches; cool and clear blue waters, swaying coconut trees and caves with swallows’ nests. Its waters are home to beautiful marine life such as fish, turtles, corals and others.

Making it a must-visit destination, especially for discerning divers and snorkellers, is the incredible variety of hard and soft corals, seashells, fish and turtles.

The laidback atmosphere gives a perfect excuse to do nothing. Still, if you are feeling restless, there are plenty of activities to keep you occupied. Take your pick: diving, swimming, snorkelling, windsurfing, kayaking, boating and even fishing.

Pulau Kapas is difficult to access during the monsoon (November - March).

Accommodation varies from deluxe and budget chalets offering air conditioned or fan.

Thursday, February 12, 2009

Russian Leaders Examine Nursing Education in Bemidji

Russian leaders participating in the Open World Program will spend November 9 - 17, 2008, in Bemidji, MN examining Nursing Education processes and programs. North Country Regional Hospital will host the delegation. Managed by the independent Open World Leadership Center at the Library of Congress, Open World is designed to enhance understanding and capabilities for cooperation between the United States and the countries of Eurasia and the Baltic States by developing a network of leaders in the region who have gained significant, firsthand exposure to America’s democratic, accountable government and free-market system.

While in Bemidji, the delegates will engage in a professional program that will include the levels of nursing education in the US, funding and administration of programs, how technology is used in the classroom and distant learning classes, nursing skills demonstrations, and numerous other topics related to nursing education and the nursing profession.

The visiting delegates, all educators of nurses in Russia, are Inna Bespalova and Zoya Silich of Tomsk, Russia; Natalya Biryukova, Svetlana Melanich and Aleksandr Ovsyannikov of Balakovo, Russia. Tatyana Reva from Kursk, Russia, a teacher of English at the Kursk State University, will accompany them as a facilitator.

While in Bemidji, the Open World delegation is scheduled to attend work sessions with the Northwest Technical College and Bemidji State University Nursing faculties, attend a community Rotary meeting, tour classrooms and clinical sites utilized by the NTC and BSU nursing programs, attend activities to acquaint them with the Native American culture, attend an ITV (interactive television) meeting with other Wisconson nursing faculty and Russian nurses visiting LaCrosse, Wisconson nursing programs the same week, learn about student/campus life and many other professional and social activities.

Homestays will allow the Open World delegates to experience American family life. They will also take part in several cultural and community activities, including optional attendance at a city council meeting, tour at Concordia Language Villages, shopping at the local mall, grocery stores and attendance at local church services.

The Open World Leadership Center has awarded a grant to World Services of LaCrosse, Wisconson to administer this and similar exchanges in 2008. Alice Thompson, RN, BSN, BSCS and retired NTC nursing educator is the local community program coordinator. Mary Auger, Lactation Specialist at NCRH, assists with the program activities.

The U.S. Congress established Open World in 1999 to enhance understanding and capabilities for cooperation between the United States and Russia. In 2003, Congress made all post-Soviet states eligible for the program. Thanks to Open World, some 13,000 current and future Eurasian leaders have experienced American civil society and have been exposed to new ideas and practices that they can adapt for use in their own work. Open World also promotes partnerships and continued communications between delegates and their American hosts and professional counterparts. Open World currently operates exchanges for political and civic leaders from Russia, Ukraine, Moldova, Georgia, Azerbaijan, Kazakhstan, Kyrgyzstan, and Tajikistan.

Wednesday, February 04, 2009

$1.4 Billion to be Available to Pay Bills Before the New Year

CHICAGO – Because the national recession has negatively affected Illinois’ revenue and caused a $2 billion fiscal year 2009 budget deficit, the State will be selling $1.4 billion in general obligation certificates to infuse the General Revenue Fund with much needed cash to pay vendors and providers who urgently need payment.

“We are pleased to be taking this step to help the state speed payment to many organizations and agencies that have provided care for seniors, healthcare to children, or other critical services and have been waiting to be paid. Together with the Comptroller’s, Treasurer’s, and Attorney General’s offices, we are able to fulfill our commitment to these organizations,” said Ginger Ostro, Director of the Governor’s Office of Management and Budget.

The Office of the Governor, the Office of the Comptroller, the Office of the Treasurer, and the Office of the Attorney General have worked together on this short-term borrowing transaction which would immediately put cash into the State’s accounts so that the Comptroller can pay bills more quickly.

In addition to the state receiving less revenue than the budget projected, the state also has an uneven cash flow. This means that more dollars will come into the state during March, April and May. The short-term borrowing will allow the state to pay many bills now that have been pending, rather than waiting for this spring when additional money comes in. While short-term borrowing will not solve the budget deficit, the state needs to pay vendors and manage the uneven cash flow.

In May 2003, the state borrowed $1.5 billion to pay Medicaid assistance, medical providers of long term care, the refund fund, and state aid payments to K-12 schools. Short-term borrowing has been used in other years since to manage cash flow and ensure the state’s payment obligations are met in a timely manner.

Illinois is not alone in facing a FY09 budget shortfall due to lower than projected revenues. At a recent meeting with President-Elect Barack Obama and the nation’s governors, Chairman of the National Governors Association, Governor Ed Rendell of Pennsylvania, said 43 of 50 states currently face budget deficits.

Wednesday, January 28, 2009

Earning the Government's ENERGY STAR

Desktop and notebook (laptop) computers, game consoles, integrated computer systems, desktop-derived servers and workstations are all eligible to earn the ENERGY STAR. Those that come with the label are more efficient than ever. When purchasing a new computer, be sure to look for the ENERGY STAR before making your final decision. You should be able to find the label on the products and packaging as well as in product literature and on websites to make it easy for you to choose.

EPA has strengthened the requirements for earning the ENERGY STAR to meet energy use guidelines in three distinct operating modes: standby, active, and sleep modes. This ensures energy savings when computers are being used and performing a range of tasks, as well as when they are in standby. ENERGY STAR qualified computers must also have a more efficient internal power supply.

Since computers are in use more hours per day than they used to be, power management is important to saving energy. ENERGY STAR power management features place computers (CPU, hard drive, etc.) into a low-power “sleep mode” after a designated period of inactivity. Low-power modes for computers reduce the spinning of the hard disk, which decreases power consumption. Simply hitting a key on the keyboard or moving the mouse awakens the computer in a matter of seconds.

Thursday, January 22, 2009

Strategic role for SPT chair

SPT Chair Alistair Watson has been appointed to a government think-tank on transport.

The newly-created stakeholder group will advise the Scottish Government on its National Transport Strategy.

The group met for the first time on 1 September and will gather in Edinburgh three times a year until its findings are reviewed in 2010/11.

It will provide the government with evidence-based advice on issues such as transport integration, congestion and the environmental and social impacts of travel.

Councillor Watson said: "I am delighted SPT is using its expertise to help the Scottish Government deliver the best possible transport outcomes for the people of this country.

"I look forward to advising Ministers on important matters such as increasing public transport usage and reducing CO2 emissions, which are at the heart of SPT’s values."

Group membership also includes representatives from Transport Scotland, consumer and environmental groups, business development agencies, universities and trades unions.

Saturday, January 17, 2009

EASTERN REDCEDAR - Juniper virginiana, Linn

THE FRENCH CALLED IT baton rouge or red stick; we call it redcedar; actually it's a juniper. Redcedar will grow on almost any type of soil from the river bottoms to the barest rock bluff. It is found over most of the eastern United States including all of our state. Many variations in form, growth habits and coloration, plus its hardiness, have made it an ideal tree for ornamental purposes. There are many varieties which have been isolated and propagated as ornamentals. An old Ozark superstition says that when any cedar tree which you planted grows tall enough to shade your grave, you will die. So commonly has cedar been planted as ornamental in cemeteries, it is sometimes called graveyard tree.

An easy way of identifying this tree is by crushing the foliage and smelling the attractive juniper odor produced by the flat, scale-like leaves. The outer needles and needles on the new growth are sharp. On older twigs or deeper in the crown they are rounded and smooth. Redcedar trees, with the help of the birds scattering the seed, are quick to invade abandoned or poorly managed pastures. Their round, tear and column shapes stand out like ghosts on a bright landscape on a moon-lit night. In summer, these trees have a deep emerald green color, but in winter outer branches and exposed trees turn a copper yellow to rusty brown color.

Bright waxy-blue berries are borne on female trees. The sexes are separate on all junipers. Oil from these berries is used to flavor gin.

Fragrant oils permeate the rich, red-colored wood. Since this odor repels moths and adds a welcome woodsy fragrance to clothes, redcedar is widely used for cedar chests and closet paneling. Some cedar is used for furniture. Cedar novelties are almost trademarks of the Ozarks. Missouri is the leading producer of cedar novelties which are shipped all over this country and exported to some foreign countries. Because of its durability many cedars are used for fence posts. In the past, when it was more abundant, it was widely used for fence rails and later for pencils.

Redcedar's versatility extends still further. It is an excellent wildlife tree. Berries are sought as winter food by many songbirds. In turn the birds spread the seed when it passes through their digestive tracts. Farmer often struggle to keep it out of fence rows and pastures where the birds later roost. Doves and other birds seek the protection of the heavy foliage for their nests. Many animals use it both as food and shelter in the cold winter months, even deer browse on it heavily in winter. Wildlife plantings should include red cedar, for as a windbreak tree it is hard to beat.

Like all junipers, red cedar is an alternate host to the cedar-apple fungus disease. On wet spring days the orange, jelly-like fingered balls become apparent on many cedars. These are the spore forming organisms of the fungus. In theory, no cedars should be planted within a mile of apple orchards. However, it is usually necessary to spray apples anyway and any good fungicide will control the disease.

Thursday, January 08, 2009

Cocoa-Rich Products

Cocoa powder contains more beneficial antioxidants than several other popular chocolate products made from cocoa beans, ARS analyses have shown. A study funded in part by the American Cocoa Research Institute, using samples provided by manufacturers, also showed processing of the beans lowers antioxidant content.

ARS scientists at the Arkansas Children's Nutrition Center and the Beltsville (Md.) Human Nutrition Research Center scrutinized what's known as the total antioxidant capacity, and the levels of procyanidins—the cocoa bean's most prevalent antioxidants—in natural unsweetened cocoa powders, Dutch-processed cocoa powders, unsweetened baking chocolate, semisweet chocolate baking chips, dark chocolates and milk chocolates.

Why the interest in cocoa and chocolate antioxidants? Changes in food processing procedures or cocoa and chocolate factory formulations might make it possible to boost the antioxidant values of tomorrow's cocoa-bean-derived beverages and confections. That would be sweet news indeed, because antioxidants are thought to help prevent cancer, heart disease and stroke.

Wednesday, December 31, 2008

Conflict Diamonds

"As a result of the Kimberley Process Certification Scheme, diamonds are among the most monitored and audited of any natural resource in the world. This system has proven to be an essential and effective tool in combating the scourge of conflict diamonds." by Eli Izhakoff, Chairman World Diamond Council.

The Kimberley Process was launched in 2003 to control and monitor the trade in rough diamonds. In just three years, the international community has made remarkable strides to certify the $30 billion annual international rough diamond trade by creating a documentary record of rough diamonds from mine to polishing. Rough diamonds must be shipped in sealed containers and exported with a Kimberley Process Certificate which certifies that the diamonds are conflict free.

Tuesday, December 23, 2008

Forest Harvesting

The harvesting operation are carried out based on scientific principles of forestry. The trees, which are to be felled are marked in the coupes which are due for felling. Marking is an act of identifying and numbering suitable trees. It is done in accordance with marking rules prescribed. This work is performed by Territorial Forest Divisions. After marking, the coupes are handed over to the by Production Divisions for felling.

The felling operations are undertaken in the coupes observing all precautions. Felling normally commences in the month of September/October. After the felling of trees, logging, dragging, stacking etc. is done in coupes. Thereafter, the forest produce like timber, poles, fuel, bamboo and khair are brought to the respective depots of the divisions for sale and disposal. Newly harvested material normally starts arriving in the depot during October.

Thursday, December 18, 2008

Types of Investment Companies

Legally known as an "open-end company," a mutual fund is one of three basic types of investment companies. While this brochure discusses only mutual funds, you should be aware that other pooled investment vehicles exist and may offer features that you desire. The two other basic types of investment companies are:

Closed-end funds — which, unlike mutual funds, sell a fixed number of shares at one time (in an initial public offering) that later trade on a secondary market; and

Unit Investment Trusts (UITs) — which make a one-time public offering of only a specific, fixed number of redeemable securities called "units" and which will terminate and dissolve on a date specified at the creation of the UIT.

"Exchange-traded funds" (ETFs) are a type of investment company that aims to achieve the same return as a particular market index. They can be either open-end companies or UITs. But ETFs are not considered to be, and are not permitted to call themselves, mutual funds.

Monday, December 08, 2008

FDI

Foreign investment is essential for the long-term health of the UK economy because of its contribution to creating and underpinning British jobs, as well as boosting local and regional economies.

International investors are some of our biggest and most innovative manufacturers, and service providers, bringing enormous benefits to the UK. These include not only job and wealth creation, but also an injection of innovation to process, product and organisational structure, adding to UK capacity in output, R&D and exports.

International investment allows companies to achieve growth and economies of scale that domestic markets alone would not allow. This makes them more productive and profitable with greater capacity for job and wealth creation. The expansion of high productivity businesses helps strengthen competition within the economy as companies are exposed to new ideas and practices.

Friday, December 05, 2008

Lead-Based Paint

Lead has long been recognized as a harmful environmental pollutant. In late 1991, the Secretary of the Department of Health and Human Services called lead the "number one environmental threat to the health of children in the United States." There are many ways in which humans are exposed to lead: through air, drinking water, food, contaminated soil, deteriorating paint, and dust. Airborne lead enters the body when an individual breathes or swallows lead particles or dust once it has settled. Before it was known how harmful lead could be, it was used in paint, gasoline, water pipes, and many other products.

Old lead-based paint is the most significant source of lead exposure in the U.S. today. Most homes built before 1960 contain heavily leaded paint. Some homes built as recently as 1978 may also contain lead paint. This paint could be on window frames, walls, the outside of homes, or other surfaces. Harmful exposures to lead can be created when lead-based paint is improperly removed from surfaces by dry scraping, sanding, or open-flame burning. High concentrations of airborne lead particles in homes can also result from lead dust from outdoor sources, including contaminated soil tracked inside, and use of lead in certain indoor activities such as soldering and stained-glass making.

Tuesday, November 25, 2008

IBM Plans 'Brain-Like' Computers

IBM has announced it will lead a US government-funded collaboration to make electronic circuits that mimic brains.

Part of a field called "cognitive computing", the research will bring together neurobiologists, computer and materials scientists and psychologists. As a first step in its research the project has been granted $4.9m (£3.27m) from US defence agency Darpa. The resulting technology could be used for large-scale data analysis, decision making or even image recognition.

"The mind has an amazing ability to integrate ambiguous information across the senses, and it can effortlessly create the categories of time, space, object, and interrelationship from the sensory data," says Dharmendra Modha, the IBM scientist who is heading the collaboration.

"There are no computers that can even remotely approach the remarkable feats the mind performs," he said. "The key idea of cognitive computing is to engineer mind-like intelligent machines by reverse engineering the structure, dynamics, function and behaviour of the brain."

Monday, November 24, 2008

The Water Cycle

Earth's water is always in movement, and the water cycle, also known as the hydrologic cycle, describes the continuous movement of water on, above, and below the surface of the Earth. Since the water cycle is truly a "cycle," there is no beginning or end. Water can change states among liquid, vapor, and ice at various places in the water cycle, with these processes happening in the blink of an eye and over millions of years.

Although the balance of water on Earth remains fairly constant over time, individual water molecules can come and go in a hurry. The water in the apple you ate yesterday may have fallen as rain half-way around the world last year or could have been used 100 million years ago by Mama Dinosaur to give her baby a bath.

Tuesday, November 18, 2008

Skin cancer

Skin cancer is the most common form of cancer in the United States. The two most common types are basal cell cancer and squamous cell cancer. They usually form on the head, face, neck, hands and arms. Another type of skin cancer, melanoma, is more dangerous but less common.

Anyone can get skin cancer, but it is more common in people who
* Spend a lot of time in the sun or have been sunburned
* Have light-colored skin, hair and eyes
* Have a family member with skin cancer
* Are over age 50

You should have your doctor check any suspicious skin markings and any changes in the way your skin looks. Treatment is more likely to work well when cancer is found early. If not treated, some types of skin cancer cells can spread to other tissues and organs.

Monday, November 10, 2008

Botanic fruit and culinary fruit

Many true fruits, in a botanical sense, are treated as vegetables in cooking and food preparation because they are not sweet. These botanical fruits include cucurbits (e.g., squash, pumpkin, and cucumber), tomato, peas, beans, corn, eggplant, and sweet pepper, spices, such as allspice and chillies.Occasionally, though rarely, a culinary "fruit" is branded as a true fruit in the botanical sense. For example, rhubarb is often referred to as a fruit, because it is used to make sweet desserts such as pies, though only the petiole of the rhubarb plant is edible.In the culinary sense, a fruit is usually any sweet tasting plant product associated with seed(s), a vegetable is any savoury or less sweet plant product, and a nut any hard, oily, and shelled plant product.

Although a nut is a type of fruit, it is also a popular term for edible seeds, such as peanuts (which are actually a legume) and pistachios. Technically, a cereal grain is a fruit termed a caryopsis. However, the fruit wall is very thin and fused to the seed coat so almost all of the edible grain is actually a seed. Therefore, cereal grains, such as corn, wheat and rice are better considered edible seeds, although some references list them as fruits.Edible gymnosperm seeds are often misleadingly given fruit names, e.g. pine nuts, ginkgo nuts, and juniper berries. A Folk taxonomy is a vernacular naming system which describes how non-scientists categorize items.

Wednesday, November 05, 2008

Google Abandons Deal With Yahoo

Google has decided to abandon its advertising partnership with Yahoo to avoid having a "protracted legal battle" with regulators.

The deal involved Google providing some of the advertising around Yahoo's search results and would have been worth $800m (£494m) a year to Yahoo.

It was originally announced in June but has faced anti-trust objections.

Yahoo said in a statement it was disappointed that Google had decided not to fight for the deal in court.

Yahoo was relying on the deal with Google to help to placate shareholders angry about Yahoo rejecting Microsoft's takeover offer.

Google said it would not allow the prospect of a legal battle to distract it from its core mission.

"That would be like trying to drive down the road of innovation with the parking brake on," Google said in a blog.

Monday, November 03, 2008

Martial arts

Martial arts are systems of codified practices and traditions of training for combat. While they may be studied for various reasons, martial arts share a single objective: to defeat one or more people physically and to defend oneself or others from physical threat. In addition, some martial arts are linked to spiritual or religious beliefs/philosophies such as Hinduism, Buddhism, Daoism, Confucianism or Shinto while others have their own spiritual or non-spiritual code of honour. Many arts are also practised competitively most commonly as combat sports, but may also be in the form of dance.

The word 'martial' derives from the name of Mars, the Roman god of war. The term 'martial arts' literally means arts of war. This term comes from 15th century Europeans who were referring to their own fighting arts that are today known as Historical European martial arts. A practitioner of martial arts is referred to as a martial artist.

Friday, October 31, 2008

Study in India

For all those who have dreams and aspirations for quality education, India is the perfect destination. With 343 universities and 17000 colleges, India offers a wide spectrum of courses that are recognised globally. Apart from undergraduate, postgraduate and doctoral courses, there are many training and diploma-level institutes and polytechnics that cater to the growing demand for skill-based and vocational education.

Studying in India, the second largest higher education network in the World, is an enriching experience in itself. A welcoming atmosphere, non-discriminative approach and an assured educational and career growth is what attracts students from all over the world to India. There are universities focusing on the study of medicine, arts & language, journalism, social work, business, commerce, planning, architecture, engineering, and other specialised studies. Most Indian universities teach in English Medium and conduct special language classes for those weak in English.

The Quality education that India offers is within the reach of every income-group considering the reasonable fee structure. With 66 distance education institutions functioning in 60 universities besides 11 open universities, India has an enlarged outreach of distance education as well. So, visit India and be a part of an educational system that lives on the values of quality, growth and truthfulness

Wednesday, October 22, 2008

In The Hunt For Extrasolar Planets, A New Find Is Shattering Records Left And Right.

A planet called WASP-12b is the hottest planet ever discovered (about 4,000 degrees Fahrenheit, or 2,200 degrees Celsius), and orbits its star faster and closer in than any other known world

This sizzling monster whips its way around its parent star about once a day (for comparison, the fastest-circling planet in the solar system, Mercury, orbits the sun once every 88 days).

To make such swift progress, the planet circles extremely close-in to its star — about 2 percent of the distance from the Earth to the sun, in fact, or 2 million miles (3.4 million kilometers).

Wednesday, October 15, 2008

Helsinki Floods

Petteri Sulonen, Helsinki, Finland:

"The ongoing winter in Finland has been extremely freaky: very mild, with record storms, culminating in a rise in the sea level of nearly two metres in Helsinki.

"The city erected flood barriers of cardboard bales, but they didn't do much to help; the water reached the streets."

Friday, October 03, 2008

The Controlled Addition And Removal Of An Electron Represents a Milestone In Atom-Scale Science

As reported in the July 23 issue of Science magazine, IBM scientists Jascha Repp and Gerhard Meyer placed and removed a single electron on an individual gold (Au) atom by positioning the tip of a low-temperature scanning tunneling microscope (STM) above the atom and applying a voltage pulse. This pulse does not affect the lateral position of the gold atom adsorbed on an ultrathin (only two atomic layers thick) insulating sodium chloride (NaCl) film on a metal substrate.

Most importantly, both charge states of the atom are stable, that is, an additional electron remains on it until it is removed by a voltage pulse of reversed sign. The stabilization of the different charge states is achieved by tiny changes in the positions of the atoms in the ionic film. Owing to the film's large ionic polarization, the Cl- ion underneath the gold moves downward, while the surrounding Na+ ions move upward. In the STM image, the new charge state of the gold atom appears as a circular trough around the atom.

Jascha Repp, who designed and carried out the experiment, explains: "A simple electron transfer with no lasting changes of ion-core positions would not be stable because the electron residing in an excited state on the manipulated Au atom would rapidly tunnel beneath the insulating layer into the metal of the substrate."

"Our discovery is an important step towards using a single atom or molecule as a basic building block for possible future atomic-scale technology," says Gerhard Meyer, who leads the STM-related research efforts at IBM's Zurich Research Laboratory. "In the nanoworld, creating complex functionalized structures will require that we control not only the position of atoms, but also the electronic and chemical parameters as well." In 1990, Don Eigler of IBM's Almaden Research Center in San Jose, California, showed that an STM can place atoms on top of a surface with atomic precision. Now, a new capability has been achieved by manipulating the electrons of an atom. Jascha Repp points out: "The chemical and physical properties of ions in general are qualitatively different from those of the corresponding neutral atoms. Therefore our findings will have an impact not only on physics but also on chemistry. This research is likely to aid the atom-scale study of such diverse phenomenon as chemical catalysis to quantum information technology."

To interpret the experimental findings, Fredrik Olsson and Mats Persson from Chalmers University used first-principles density functional theory calculations. In agreement with the experiments, the theoretical investigation also finds two different stable states for Au atoms: One is nearly neutral, the other is negatively charged by one electron. The simple physical mechanism responsible for the existence of different charge states suggests that this finding is a common phenomenon for adsorbates on polar insulating films supported by a metal substrate.

The collaboration between IBM and Chalmers University was conducted within the framework of the European Union (EU) network on "Atomic and Molecular Manipulation as a new Tool for Science and Technology".

Wednesday, September 24, 2008

Obama Statement on Field Marshal Sam Manekshaw

Chicago, IL - Senator Barack Obama today released the following statement of condolence on the passing of Field Marshal Sam Manekshaw.

"I offer my deep condolences to the people of India, on the passing of Field Marshal Sam Manekshaw. He was a legendary soldier, a patriot, and an inspiration to his fellow citizens. Field Marshal Manekshaw provided an example of personal bravery, self-sacrifice, and steadfast devotion to duty that began before India's independence, and will deservedly be remembered far into the future."

Monday, September 15, 2008

Oligonucleotides

The use of synthetic oligonucleotides in gene therapy is to inactivate the genes involved in the disease process. There are several methods by which this is achieved. One strategy uses antisense specific to the target gene to disrupt the transcription of the faulty gene. Another uses small molecules of RNA called siRNA to signal the cell to cleave specific unique sequences in the mRNA transcript of the faulty gene, disrupting translation of the faulty mRNA, and therefore expression of the gene. A further strategy uses double stranded oligodeoxynucleotides as a decoy for the transcription factors that are required to activate the transcription of the target gene. The transcription factors bind to the decoys instead of the promoter of the faulty gene, which reduces the transcription of the target gene, lowering expression. Additionally, single stranded DNA oligonucleotides have been used to direct a single base change within a mutant gene.The oligonucleotide is designed to anneal with complementarity to the target gene with the exception of a central base, the target base, which serves as the template base for repair. This technique is referred to as oligonucleotide mediated gene repair, targeted gene repair, or targeted nucleotide alteration.

Tuesday, September 09, 2008

Microbial biodegradation

Interest in the microbial biodegradation of pollutants has intensified in recent years as mankind strives to find sustainable ways to cleanup contaminated environments. These bioremediation and biotransformation methods endeavour to harness the astonishing, naturally occurring, ability of microbial xenobiotic metabolism to degrade, transform or accumulate a huge range of compounds including hydrocarbons (e.g. oil), polychlorinated biphenyls (PCBs), polyaromatic hydrocarbons (PAHs), pharmaceutical substances, radionuclides and metals. Major methodological breakthroughs in recent years have enabled detailed genomic, metagenomic, proteomic, bioinformatic and other high-throughput analyses of environmentally relevant microorganisms providing unprecedented insights into key biodegradative pathways and the ability of organisms to adapt to changing environmental conditions.
The elimination of a wide range of pollutants and wastes from the environment is an absolute requirement to promote a sustainable development of our society with low environmental impact. Biological processes play a major role in the removal of contaminants and they take advantage of the astonishing catabolic versatility of microorganisms to degrade/convert such compounds. New methodological breakthroughs in sequencing, genomics, proteomics, bioinformatics and imaging are producing vast amounts of information.

Monday, August 25, 2008

Cell biology

Cell biology (also called cellular biology or formerly cytology, from the Greek kytos, "container") is an academic discipline that studies cells – their physiological properties, their structure, the organelles they contain, interactions with their environment, their life cycle, division and death. This is done both on a microscopic and molecular level. Cell biology research extends to both the great diversity of single-celled organisms like bacteria and the many specialized cells in multicellular organisms like humans.

Knowing the composition of cells and how cells work is fundamental to all of the biological sciences. Appreciating the similarities and also differences between cell types is particularly important to the fields of cell and molecular biology. These fundamental similarities and differences provide a unifying theme, allowing the principles learned from studying one cell type to be extrapolated and generalized to other cell types. Research in cell biology is closely related to genetics, biochemistry, molecular biology and developmental biology.

Thursday, August 21, 2008

Google Earth Plus

Google Earth can be upgraded to a Plus edition for a $20 annual subscription fee. Google Earth Plus is an individual-oriented paid subscription upgrade to Google Earth and adds the following features:

* GPS integration: read tracks and waypoints from a GPS device. A variety of third party applications have been created which provide this functionality using the basic version of Google Earth by generating KML or KMZ files based on user-specified or user-recorded waypoints. However, Google Earth Plus provides direct support for the Magellan and Garmin product lines, which together hold a large share of the GPS market. The Linux version of the Google Earth Plus application does not include any GPS functionality.
* Higher resolution printing.
* Customer support via email.
* Data importer: read address points from CSV files; limited to 100 points/addresses. A feature allowing path and polygon annotations, which can be exported to KML, was formerly only available to Plus users, but was made free in version 4.0.2416.
* Higher data download speeds

Monday, August 11, 2008

Benefits of Remote Service Software

Remote service software helps to:

* Increase uptime, improve performance and extend the life of a device
* Control service costs by deploying patches and upgrades remotely, and ensure a first-time fix when an onsite visit is required
* Streamline administration of pay-per-use models, with automated usage monitoring
* Focus highly trained service teams on preventative maintenance, by diagnosing and repairing issues before they cause system failure
* Increase customer satisfaction and loyalty

Manufacturers are using aftermarket service a competitive differentiator. Remote service software provides a platform for manufacturers to offer and meet stringent service level agreements (SLAs) without increasing the size of their service team.

Tuesday, August 05, 2008

Custom software development

Custom software development, also known as custom software engineering, defines omitting of predeveloped (template or boxed) solutions and views. If a customer wants to believe that their favour is unique and putting their ideas into practice, custom software development technologies are custom approaches to solving their problems. Finding new creative decisions in order to meet the specific requirements and preferences of the customer as quickly as possible may be achieved with custom software development.

A goal of custom software solutions may be to develop not for the mass auditorium (users), but rather developed to be unique, for a single customer (user) or a group. Custom developed software is encouraged to take under one hat the most progressive technologies alone with preferences and expectations of the customer. Custom developed software may be designed in stage by stage processes, allowing all nuances and possible hidden dangers to be taken into account, including issues which were not mentioned in the specifications.

Pre-developed software packages, in most cases, may not be modifiable or customized to ones needs; and are usually available to all unrelated users or groups of users. For example, software designed for a cell phone manufacturer would be 'custom,' even though there could be thousands of individual users. Software written for use by many other manufacturers would be packaged, even if there were only a single user in each factory.

Tuesday, July 29, 2008

VersionTracker

VersionTracker.com is a website that tracks software releases. It started out originally as a Mac OS software tracker, eventually expanding into Mac OS X, Microsoft Windows and Palm OS.

VersionTracker does not host the majority of the software listed (it merely links to them), only in special agreements with the developers.

VersionTracker also offers a software called VersionTracker Pro that checks software versions on a user's computer and then queries its database to see if any updates are available. This feature is available only to paid subscribers. Browsing and searching the database is free.

Monday, July 21, 2008

Data extraction

Data extraction is the act or process of retrieving (binary) data out of (usually unstructured or badly structured) data sources for further data processing or data storage (data migration). The import into the intermediate extracting system is thus usually followed by data transformation and possibly the addition of metadata prior to export to another stage in the data workflow.

Usually, the term data extraction is applied when (experimental) data is first imported into a computer from primary sources, like measuring or recording devices. Today's electronic devices will usually present a electrical connector (e.g. USB) through which 'raw data' can be streamed into a personal computer.

Monday, July 14, 2008

Hierarchical model

In a hierarchical data model, data is organized into a tree-like structure. The structure allows repeating information using parent/child relationships: each parent can have many children but each child only has one parent. All attributes of a specific record are listed under an entity type. In a database, an entity type is the equivalent of a table; each individual record is represented as a row and an attribute as a column. Entity types are related to each other using 1: N mapping, also known as one-to-many relationships. The most recognized example of hierarchical model database is an IMS designed by IBM.

Tuesday, July 08, 2008

Data quality

1. Data Quality refers to the degree of excellence exhibited by the data in relation to the portrayal of the actual phenomena. GIS Glossary

2. The state of completeness, validity, consistency, timeliness and accuracy that makes data appropriate for a specific use. Government of British Columbia

3. The totality of features and characteristics of data that bears on their ability to satisfy a given purpose; the sum of the degrees of excellence for factors related to data

Wednesday, July 02, 2008

Image spam

Image spam is a kind of E-mail spam where the message text of the spam is presented as a picture in an image file. Since most modern graphical E-mail client software will render the image file by default, presenting the message image directly to the user, it is highly effective at circumventing normal E-mail filtering software.

The basic rationale behind image spam is that it is difficult to detect using spam filtering software designed to detect patterns in text in the plain-text E-mail body. Attempts to filter text in image spam are easily defeated because optical character recognition of text in image spam can be prevented using a variety of obfuscation techniques which will not prevent the spam image from being read by human beings. This is the same phenomenon exploited by CAPTCHAs, but put to the ends of spammers, rather than to deter their activity.

Monday, June 23, 2008

Gathering of addresses

In order to send spam, spammers need to obtain the e-mail addresses of the intended recipients. To this end, both spammers themselves and list merchants gather huge lists of potential e-mail addresses. Since spam is, by definition, unsolicited, this address harvesting is done without the consent (and sometimes against the expressed will) of the address owners. As a consequence, spammers' address lists are inaccurate. A single spam run may target tens of millions of possible addresses — many of which are invalid, malformed, or undeliverable.

Sometimes, if the sent spam is "bounced" or sent back to the sender by various programs that eliminate spam, or if the recipient clicks on an unsubscribe link, that may cause that email address to be marked as "valid", which is interpreted by the spammer as "send me more".

Monday, June 16, 2008

Blacklisting

Attempts to stop spam by blacklisting sender's IP addresses still allows a small percentage through. Most IP addresses are dynamic, i.e. they are frequently changing. An ISP, or any organization directly connected to the Internet, gets a block of real Internet addresses when they register in the DNS. Within that block, they assign individual addresses to customers as needed. A dial-up customer may get a new IP address each time they connect. By the time that address appears on blacklists all over the world, the spammer will have new addresses for the next run. There are 4 billion possible IPv4 addresses on the Internet. The game of keeping up with these rapidly changing IP addresses has been facetiously called "whack-a-mole".

So called policy lists are black lists that contain IP addresses on a preventive basis. An IP address can be listed therein even if no spam has ever been sent from it, because it has been variously classified as a dial-up address, end-user address, or residential address, with no formal definition of such classification schemes. Not requiring evidence of spam for each enlisted address, these lists can collect a greater number of addresses and thus block more spam. However, the policies devised are not authoritative, since they have not been issued by the legitimate user of an IP address, and the resulting lists are therefore not universally accepted.

Wednesday, June 11, 2008

Microsoft Reciprocal License (Ms-RL)

This Microsoft license allows for distribution of derived code so long as the modified source files are included and retain the Ms-RL. The Ms-RL allows those files in the distribution that do not contain code originally licensed under Ms-RL to be licensed according to the copyright holder's choosing. This is equivalent to the CDDL or LGPL (GPL with a typical "linking exception"). Initially known as the Microsoft Community License, it was renamed during the OSI approval process.

On December 9, 2005, the Ms-RL license was submitted to the Open Source Initiative for approval by John Cowan. OSI then contacted Microsoft and asked if they wanted OSI to proceed. Microsoft replied that they did not wish to be reactive and that they needed time to review such a decision.

At the O'Reilly Open Source Convention in July 2007, Bill Hilf, director of Microsoft's work with open source projects, announced that Microsoft had formally submitted Ms-PL and Ms-RL to OSI for approval. It was approved on October 12, 2007 along with the Ms-PL. According to the Free Software Foundation, it is a free software license. However, unlike the Microsoft Public License, it is not compatible with the GNU GPL.

Monday, June 02, 2008

Concurrent Versions System

In the field of software development, the Concurrent Versions System (CVS), also known as the Concurrent Versioning System, provides a version control system based on open-source code. Version control system software keeps track of all work and all changes in a set of files, and allows several developers (potentially widely separated in space and/or time) to collaborate. Dick Grune developed CVS in the 1980s. CVS has become popular in the open source software world and is released under the GNU General Public License.

Tuesday, May 27, 2008

Types of systems psychology

In the scientific literature different kind of systems psychology have been mentioned in the scientific literature:

Applied systems psychology

De Greene in 1970 described applied systems psychology as being connected with engineering psychology and human factor.

Cognitive systems theory
Cognitive systems psychology is a part of cognitive psychology and like existential psychology, attempts to dissolve the barrier between conscious and the unconscious mind.

Contract-systems psychology

Contract-systems psychology is about the human systems actualization through praticipative organizations.

Family systems psychology
Family systems psychology is a more general name for the subfield of family thearpists and like Murray Bowen, Michael E. Kerr, and Baard. and researchers have begun to theoretize a psychology of the family as a system.

Organismic-systems psychology

Through the application of organismic-systems biology to human behavior Ludwig von Bertalanffy conceived and developed the organismic-systems psychology, as the theoretical prospect needed for the gradual comprehension of the various ways human personalities may evolve and how could they evolve properly, being supported by a holistic interpretation of human behavior.

Monday, May 19, 2008

Developmental robotics

Developmental Robotics (DevRob), sometimes called epigenetic robotics, is a methodology that uses metaphors from developmental psychology to develop controllers for autonomous robots. The focus is on a single robot going through stages of autonomous mental development. Researchers in this field study artificial emotions, self-motivation, and other methods of self-organization.

DevRob is related to, but differs from, evolutionary robotics (ER). ER uses populations of robots that evolve over time, whereas DevRob is interested in how the organization of a single robot's control system develops through experience, over time.

DevRob is also related to work done in the domains of Robotics, Artificial Life.

Similar to developmental robotics, Epigenetic robotics is an interdisciplinary research area with the goal of understanding biological systems by the integration between neuroscience, developmental psychology and engineering sciences. Epigenetic systems are characterized by a prolonged developmental process through which varied and complex cognitive and perceptual structures emerge as a result of the interaction of an embodied system with a physical and social environment. An additional goal is to enable robots to autonomously develop skills for any particular environment instead of programming them for a specific environment.

Monday, May 12, 2008

Open source software

Open source software is computer software for which the human-readable source code is made available under a copyright license (or arrangement such as the public domain) that meets the Open Source Definition. This permits users to use, change, and improve the software, and to redistribute it in modified or unmodified form. It is often developed in a public, collaborative manner. Open source software is the most prominent example of open source development and often compared to user generated content.

Tuesday, May 06, 2008

Columbian Exchange

The Columbian Exchange has been one of the most significant events in the history of world ecology, agriculture, and culture. The term is used to describe the enormous widespread exchange of plants, animals, foods, human populations (including slaves), communicable diseases, and ideas between the Eastern and Western hemispheres that occurred after 1492. Many new and different goods were exchanged between the two hemispheres of the Earth, and it began a new revolution in the Americas and in Europe. In 1492, Christopher Columbus' first voyage launched an era of large-scale contact between the Old and the New World that resulted in this ecological revolution: hence the name "Columbian" Exchange.

Monday, April 28, 2008

Pre-Columbian Islamic contact theories

Pre-Columbian Islamic contact theories are theories which contend that medieval Muslim explorers from the Islamic world (specifically Al-Andalus, Africa or China) may have reached the Americas (and possibly made contact with the indigenous peoples of the Americas) at some point before Christopher Columbus' first voyage to the Americas in 1492. Proponents of these theories cite as evidence reports of expeditions and voyages conducted by Muslim navigators and adventurers who they allege reached the Americas from the late 9th century onwards

Monday, April 21, 2008

Cargo

Carg is a term used to denote goods or produce being transported generally for commercial gain, usually on a ship, plane, train, van or truck. Nowadays containers are used in most intermodal long-haul cargo transport.

Cargo represents a concern to U.S. national security. It was reported out of Washington, DC that in 2003 over 6 million cargo containers are entering the United States each year. After the terrorist attacks of September 11th, the security of this magnitude of cargo has become highlighted. The latest US Government response to this threat is the CSI: Container Security Initiative. CSI is a program intended to help increase security for containerized cargo shipped to the United States from around the world.

Monday, April 14, 2008

Computer-aided software engineering

Computer-aided software engineering (CASE) is the use of software tools to assist in the development and maintenance of software. Tools used to assist in this way are known as CASE Tools.

Some typical CASE tools are:

* Code generation tools

* Data modeling tools

* UML

* Refactoring tools

* QVT or Model transformation Tools

* Configuration management tools including revision control

Monday, April 07, 2008

Alpha Five

Alpha Five relational database management system and Rapid Application Development system (RAD) for building Windows desktop and Web (including AJAX) applications.

It is created by Alpha Software, Inc., which has been continually producing end-user and developer database application software since 1982. Finalist in the DR Dobbs JOLT awards for 2008 as the Best Development environment with Alpha Five v8 and winner of Product of the Year award from CRN. Applications can be created against its built-in DBF engine and against MySQL, Oracle, MS SQL Server, DB2, Enterprise DB, Postgress and any other SQL database engines through ODBC sources. The latest version now incorporates Portable SQL, a feature that allows users to switch database back ends without having to rewrite queries.

Friday, April 04, 2008

Relational model

The relational model for database management is a database model based on predicate logic and set theory. It was first formulated and proposed in 1969 by Edgar Codd with aims that included avoiding, without loss of completeness, the need to write computer programs to express database queries and enforce database integrity constraints. "Relation" is a mathematical term for "table", and thus "relational" roughly means "based on tables". It did not originally refer to the links or "keys" between tables, contrary to popular interpretation of the name.

Monday, March 24, 2008

CrossFTP Server

CrossFTP Server is free secure FTP server program for multiple platforms. It supports FTP, FTPS, and the monitoring of the connections. Its main features are:

* Multi platform support and multithreaded design.
* UTF-8 directory encoding for internationalization support.
* User virtual directory, write permission, idle time-out and upload/download bandwidth limitation support.
* You can monitor all the user activities.
* Anonymous login support.
* Both upload and download files are resumable.
* Handles both ASCII and binary data transfers.
* IP restriction support to allow/ban IPs.
* Database and LDAP can be used to store user data.
* All the FTP messages are customizable.
* Implicit/explicit SSL/TLS support.
* MDTM support - your users can change the date-time stamp of files.
* "MODE Z" support for faster data upload/download.

Monday, March 17, 2008

Search Based Software Engineering (SBSE)

Search Based Software Engineering (SBSE) is an approach to apply metaheuristic search techniques like genetic algorithms, simulated annealing and tabu search to software engineering problems. It is inspired by the observation that many activities in software engineering can be formulated as optimization problems. Due to the computational complexity of these problems, exact optimization techniques of operations research like linear programming or dynamic programming are mostly impractical for large scale software engineering problems. Because of this, researchers and practitioners have used metaheuristic search techniques to find near optimal or good-enough solutions.

Sunday, March 09, 2008

solar tracker

A solar tracker is a device for orienting a solar photovoltaic panel or concentrating solar reflector or lens toward the sun. Concentrators, especially in solar cell applications, require a high degree of accuracy to ensure that the concentrated sunlight is directed precisely to the powered device, which is at (or near) the focal point of the reflector or lens. Non-concentrating applications require less accuracy, and a tracker is not necessary, but can substantially improve the amount of power produced by a system by enhancing morning and afternoon performance.

Tuesday, March 04, 2008

Pharmacists

Pharmacists are health professionals who practice the art and science of pharmacy. In their traditional role, pharmacists typically take a request for medicines from a prescribing health care provider in the form of a medical prescription and dispense the medication to the patient and counsel them on the proper use and adverse effects of that medication. In this role, pharmacists ensure the safe and effective use of medications. Pharmacists also participate in disease state management, where they optimise and monitor drug therapy – often in collaboration with physicians and/or other health professionals.

Wednesday, February 27, 2008

HDTV blur

HDTV blur is a common term used to describe a number of different artifacts on consumer modern high definition television sets:

The following factors are generally the primary or secondary causes of HDTV blur; in some cases more than one of these factors may be in play at the studio or receiver end of the transmission chain.

• Pixel response time on LCD displays (blur in the color response of the active pixel)
• Slower camera Shutter speeds common in hollywood production films (blur in the HDV content of the film)
• Blur from eye tracking fast moving objects on sample-and-hold LCD, Plasma, or Microdisplay.
• Resolution resampling (blur due to resizing image to fit the native resolution of the HDTV)
• Blur due to 3:2 pulldown and/or motion-speed irregularities in framerate conversions from film to video
• Computer generated motion blur introduced by video games

Friday, February 22, 2008

Acoustic Intelligence

Sensors relatively close to a nuclear event, or a high-explosive test simulating a nuclear event, can detect, using acoustic methods, the pressure produced by the blast. These include infrasound microbarographs (acoustic pressure sensors) that detect very low-frequency sound waves in the atmosphere produced by natural and man-made events.

Closely related to the microbarographs, but detecting pressure waves in water, are hydro-acoustic sensors, both underwater microphones and specialized seismic sensors that detect the motion of islands.

Sunday, February 17, 2008

Derivative action

The derivative part is concerned with the rate-of-change of the error with time: If the measured variable approaches the setpoint rapidly, then the actuator is backed off early to allow it to coast to the required level; conversely if the measured value begins to move rapidly away from the setpoint, extra effort is applied — in proportion to that rapidity — to try to maintain it.

Derivative action makes a control system behave much more intelligently. On systems like the temperature of a furnace, or perhaps the motion-control of a heavy item like a gun or camera on a moving vehicle, the derivative action of a well-tuned PID controller can allow it to reach and maintain a setpoint better than most skilled human operators could.

Friday, February 08, 2008

System dynamics

System Dynamics was founded in the late 1950s by Jay W. Forrester of the MIT Sloan School of Management with the establishment of the MIT System Dynamics Group. At that time, he began applying what he had learned about systems during his work in electrical engineering to everyday kinds of systems. Determining the exact date of the founding of the field of system dynamics is difficult and involves a certain degree of arbitrariness.

Jay W. Forrester joined the faculty of the Sloan School at MIT in 1956, where he then developed what is now System Dynamics. The first published article by Jay W. Forrester in the Harvard Business Review on "Industrial Dynamics", was published in 1958. The members of System Dynamics Society have chosen 1957 to mark the occasion as it is the year in which the work leading to that article, which described the dynamics of a manufacturing supply chain, was done.

Sunday, January 27, 2008

Marxist feminism

Marxist feminism is a sub-type of feminist theory which focuses on the dismantling of capitalism as a way to liberate women. Marxist feminism states that capitalism, which gives rise to economic inequality, dependence, political confusion and ultimately unhealthy social relations between men and women, is the root of women's oppression.

According to Marxist theory, in capitalist societies the individual is shaped by class relations; that is, people's capacities, needs and interests are seen to be determined by the mode of production that characterises the society they inhabit. Marxist feminists see gender inequality as determined ultimately by the capitalist mode of production. Gender oppression is class oppression and women's subordination is seen as a form of class oppression which is maintained (like racism) because it serves the interests of capital and the ruling class. Marxist feminists have extended traditional Marxist analysis by looking at domestic labour as well as wage work in order to support their position.

Thursday, January 17, 2008

Health psychology

Health psychology concerns itself with understanding how biology, behavior, and social context influence health and illness. Health psychologists generally work alongside other medical professionals in clinical settings, although many also teach and conduct research. Although its early beginnings can be traced to the kindred field of clinical psychology, four different approaches to health psychology have been defined: clinical, public health, community and critical health psychology.

Thursday, January 10, 2008

Quantitative psychology

Quantitative psychology involves the application of mathematical and statistical modeling in psychological research, and the development of statistical methods for analyzing and explaining behavioral data. The term Quantitative psychology is relatively new and little used (only recently have Ph.D. programs in quantitative psychology been formed), and it loosely covers the longer standing subfields psychometrics and mathematical psychology.

Psychometrics is the field of psychology concerned with the theory and technique of psychological measurement, which includes the measurement of knowledge, abilities, attitudes, and personality traits. Measurement of these unobservable phenomena is difficult, and much of the research and accumulated knowledge in this discipline has been developed in an attempt to properly define and quantify such phenomena. Psychometric research typically involves two major research tasks, namely: (i) the construction of instruments and procedures for measurement; and (ii) the development and refinement of theoretical approaches to measurement.

Friday, January 04, 2008

Nihilism

Nihilism (from the Latin nihil, not something) is a philosophical position which argues that Being, especially past and current human existence, is without objective meaning, purpose, comprehensible truth, or essential value. Nihilists generally assert some or all of the following:
• there is no reasonable proof of the existence of a higher ruler or creator,
• a "true morality" does not exist, and
• objective secular ethics are impossible; therefore, life has, in a sense, no truth, and no action is objectively preferable to any other.
The term nihilism is sometimes used synonymously with anomie to denote a general mood of despair at the pointlessness of existence.