Saturday, March 31, 2012

Divas, Mike Tyson surprise Timbaland with flash mob at WrestleMania Axxess

MIAMI?-- Eve promised Timbaland a "surprise" when she approached him at the WrestleMania Premiere Party and told him to come to WrestleMania Axxess.

She sure wasn't kidding! (VIEW PHOTOS |?WATCH VIDEO)

Eve and fellow WWE Diva Layla stunned the Grammy Award-winning artist at Axxess Friday night with an orchestrated flash mob involving WWE Hall of Fame inductee Mike Tyson and a group of dancers, creating a spectacular scene that had to be seen to be believed.

Lucky for you, WWE Universe, we were there to capture photos and video of the unprecedented Axxess performance.

Using Timbaland's hit new song Break Ya Back featuring Dev and choreographed moves, the Divas led a throng of dancers to tear the roof of?Miami Beach Convention Center and left the music producer and rapper?extraordinaire impressed.

Tyson, WWE.com's Social Media Ambassador for WrestleMania Week, gave the surprise an extra spark when he joined in on the fun. The former Undisputed World Heavyweight Champion is about to perform on an even grander stage on April 13-18 when he does his one-man show, Mike Tyson: Undisputed Truth, at the Hollywood Theatre inside Las Vegas' MGM Grand Hotel. (TICKETS?| MIKETYSON.COM)

Check out WWE.com's exclusive photos?of the wild dance party and come back later to view more video of the unforgettable flash mob.

aldon smith friday night lights nick santino bruce arians the misfits hook troy

Security of cloud computing

?Introduction

Over the years, desire for enhanced performance in computing in terms of speed, storage capacity, scalability, intelligent systems, has been a driving force behind Technology innovations. The progressive development of technologies ranging from distributive, Utility, Grid, Autonomic Computing, and of recent Cloud Computing are evidence of this assertion. Distributive Computing refers to the means by which a single computer program runs on multiple computers simultaneously. Utility Computing on the one hand, provides on-demand infrastructure with the ability to control, scale, and configure that infrastructure.

Grid computing on the other hand enables the sharing, selection, and aggregation of geographically distributed resources including super computers, storage systems, data sources, and specialised devices owned by multiple organisation for solving large scale problems.[18][Buyya R. etal 2008]

Finally Autonomic Computing seeks to provide software products that do not require human intervention. It is a method of enabling electronic systems to self-manage by responding to problems, recover from outages and repair faults on their own. [16p.185][Sterritt R. 2005] Generally, it is evident from above that these platforms operate on similar concept or principle, However, the difference if any is often associated with the aforementioned performance, and support needs in keeping with their independent market orientation

Cloud computing, which is the focus of this article, is where users are provided with services without knowledge, expertise, or control over the technology infrastructure that supports them.[1] Barry, 2008) [1] In this way, Customers or users access services based on their requirement or demand without regard to where the services are being hosted or delivered. It is simply a mixture of grid computing and utility computing, both of which have existed for decades. In other words, Cloud Services is where Customer IT services is outsourced to independent third parties as opposed to individual computer or commercial servers. [5] Cloud computing therefore combines existing technology concepts into a hybrid utility Service oriented architecture (SOA) and certainly not a new concept neither a technological revolution.

In cloud, physical Infrastrure, application and storage are taken away from consumers and access as Services on virtual machines (VM) such as Infrastructure as a Service [IaaS}, Platform as a Service [PaaS], and Software as a service [SaaS] and the Service Level Agreement (SLA) managed through Autonomic Computing.

Given its agility and reduce cost factor attached to these services, Commercial Enterprises are inevitably being attracted by the offerings. Security concerns with the cloud model have gain currency. Cynics such as Ellison and Stallman, have all expressed their reservation on Cloud campaign describing it as a ?marketing hype' or ?a trap aimed at forcing more people to buy into lock, proprietary system that would ultimately cost more and more'. (Ellison 2008; Stallman 2008) By the very nature of Cloud infrastructure deployment and services, Enterprises have no control and ownership over their data assets contrary to their traditional method.

This raises security questions as to what Confidentiality, Integrity and availability mechanisms are in Cloud Computing Services. (Gartner,2008) outlines seven security concerns that could apply to any outsource cloud services - Privileged user access, regulatory compliance, data Location, data segregation, recovery, investigative support, and long term viability.

This paper discusses Security issues in Cloud Computing; structured as follows. Section 2 Introduces the Cloud formations and Services. Section 3 explains the associated Risks in cloud. Section 4 underscores Security mechanism to mitigate the risks. Section 5 describes Data Recovery mechanism and Finally Section 6 draws conclusion.

?Cloud Formations & Services

To better conceptualise how Cloud Computing model impacts on security architecture, it would require an understanding of the different cloud formations and how cloud outsourcing is delivered. Cloud providers such as Amazon, Microsoft, Dell, IBM, Google and Yahoo are making offering of services to clients on their infrastructure, deployed and managed differently. Cloud Services are deployed in different formations. Jericho Forum presented eight formations in cloud environment; (i.e Internal, External, Proprietary, Open, Proprietary Internal and External, open Internal and External, Parameterised and De-parameterised).[JerichoForum, 2009 p.3] All these formations have their benefits as well as associated risks. They can also be in-sourced (internal) or outsourced (external).

However, three types of Cloud outsourcing exists; Cloud Infrastructure as a service, cloud platform as a Service and Cloud software as a Service. [19p.270](Joint A. etal 2009) In Cloud infrastructure/Platform as a Service (IaaS), applications, operating system, storage and other relevant computing resources are rented to customers. The providers run the whole computing platform and allow Clients access to the resources off-premises over the internet.

Illustrate an example of (IaaS)

Amazon for instance, is the most prominent storage provider using S3 to provide storage access to customers via REST and SOAP resources around the world.[18 p.612][Buyya R. e tal2008]? In infrastructure as a Service, the client pays consumption as utility, but has no control or ownership over the infrastructure. Cloud Storage service on the one hand, is where an Enterprise stores and retrieves data from a storage provider's facility over the Internet, owned and managed by the provider off-premises. Finally, Cloud Software as a Service (SaaS) is where software applications are run and hosted on SaaS provider's infrastructure and access by customer through internet browser. [3 p.15][Sloan K. 2009]

Cloud software as a service [SaaS]

An example of SaaS, is Google application Engine, and Gmail etc. These services are made possible through a combination of virtualised, cloud and Utility computing models. Virtualisation using Virtual machine (VM) platform, is a process of abstracting computer applications, services and operating systems from the infrastructure on which they run. [2 p.15][Slon,K. 2009] Abstraction forms an important part of virtualised environment. It could be seen in the foregoing that by the very nature of these services, data flow is pooled in public domain. In the absence of a robust cloud based security mechanism, the potential for security breach between customer and provider cannot be ruled out. In this section, I have explained the different Cloud formations and outsourcing services; the next section will discuss associated Risk in Cloud Services.

Associated Risks In Cloud

Good IT governance and managing risk and security policy forms an essential part in any Enterprise Security Architecture. In traditional Enterprise IT services, Security solutions tools against external threats are provided using Firewalls, Intrusion Detection System, virtual Private Network, Anti-virus, and encryption coupled with strict enforced policies. In contrast with cloud outsourcing, business-critical data are kept outside the Enterprise security boundary with no control or Policies to enforce. To mitigate this problem, a risk based data classification process by a customer is relevant and by far the best model for data security management in virtual and or non-virtual environment'.[Mattson,2009 p.15] Data classification process gives enterprises the opportunity to take stock of their important security exposures, and project their strategies towards solving the most critical ones.

Therefore in Cloud Infrastructure as a service the crucial issue hinges on ?security and integrity' of customer sensitive data in the facility of the provider, which raises several security questions. For instance, in the event of a problem with provider's infrastructure in a given circumstance, what mechanism is in place to ensure integrity and availability of customer's data? Secondly, what mechanism is provided to suggest that employees at provider's storage facility will not tamper with stored data on the servers? Thirdly, in the event that a particular customer is under investigation what legal mechanism is provided in making sure that the data is recoverable irrespective of where the data might be located? Finally, what is the trust level for conducting an audit in cloud? In case of any dispute between provider and customer, what exit strategy is provided for the customer?

From a risk management perspective, the most prominent risks in outsourcing are information Security concerns and loss of management control.[31p.3772][Yang D.H etal,2006]) Since there are no security standard specific to cloud computing, [20 p.11][Mansfield,2008],? the need for Customer assurance of Confidentiality, Data Integrity and Availability of their information cannot be over emphasised. The success as a provider of cloud based application services will depend on players themselves in terms of reliability, Security, availability, performance, and management of Service Level Agreement (SLA)'.[Stinchcombe, 2009 p.31] In this context, customer sensitive information in transit and at rest requires robust security mechanism and protection against potential threats and vulnerabilities associated with cloud services. The next section will discussed vulnerabilities in the three cloud service models and then followed by solutions to mitigate them.

Vulnerabilities

All Indication is that Cloud applications are browser based; an interface whose weaknesses are well known. In software as a Service [SaaS] for instance, if a customers' browser is insecure could give way to potential exploit by malicious hackers. Recently, Security researchers at Arbor Networks have discovered a malicious application in Google's cloud-based application development environment, AppEngine. The malicious application acted as a ?command-and-control hub, used by cybercriminals to issue download instructions to zombie computers that make up a botnet'.[33][Angela,2009]? Similarly, if the channel between the two ends is not fully secured; in a worse case scenario, customer's sensitive information in transit may be equally compromised. From a risk management perspective, an unencrypted data existent in the cloud may be considered ?Lost? by the customer.[32] [CSA p.12]

Platform as a service [PaaS] also has its potential vulnerabilities. The threats in this area are in two folds; firstly, security of users' browser and second a software bug on the deployed Customer application hosted on the provider's Infrastrure. These two situations if not secure could compromise customer data in transit. The Los Angeles Police Department and the city attorney's office for example, had expressed concerned that ?if their confidential information in e-mail messages were stored on Google's cloud servers instead of the city's own data centre, it might be exposed'.[34][3tera,2009] For Google to win over the council, it had to accept list of legal offers which includes among others encryption of data in transit and at rest. In this context, one may argue that security offers in Google cloud services seems dependent on the type of customer it is dealing with and in which case its security protection may differ from customer to customer. Although in cloud customer application service deployment, emphasis is place on using programming languages and tools supported by the provider such as java, python, .Net. However, when it comes to business services in the cloud, the cyber criminal only needs to exploit one hole to hack and get access to multiple sites.[20 p.9][Mansfield,2008]

Infrastructure as a service [IaaS) on the other hand, require security of both application and Customer stored data in the provider's Servers. Depending on what type of Service Level Agreement (SLA) is concluded with the customer, the responsibility of ensuring quality of service and availability of data rest on the Provider. An application that runs on virtual machine will require patched management, its thus important that providers deploy code to virtual machines to avoid users creating instances of servers using flawed, unpatched code.[Mattsson, 2009 p.16]

Virtual Machine of an IaaS

A typical VM of an Infrastructure as Service components available for customers to process and store their data locally in cloud. However, because ?local data storage is not persistent across machines restarts, most application use external persistent storage environment as illustrated in Fig 4 below.

Cloud-based persistent storage

Amazon's AWS Elastic Computer Cloud (EC2) is a good example of an IaaS offering, but MIT researchers in collaboration with University of California have identified security holes on its EC2 cloud service infrastructure. In the report sent to Amazon CEO, the researchers revealed how malicious attackers could search for, locate and attack specific targets.[34][Jaikuma,2009] Amazon acknowledged the report, and made announcement that it had taken steps to fix the problem.

In the absence of an efficient security mechanism, both Customer and Server end points are zones potentially vulnerable in IaaS model. This suggest that in spite of the transformation of existing customer infrastructure and services into cloud utility service oriented architecture, Security, Transparency and Assurance are crucial issues providers have to tackle in order to win-over security concerns of target customers. This brings into prominence the need to for a cloud based Security as a Service (SaaS) platform independent of the Providers.

Security Mechanism

The pervasiveness of Cloud computing does not represent a secure environment; Security, identity and Access control are still very immature in the cloud framework.[Jericho forum, presentation u-tube] However, collaboration among Security professionals coupled with ongoing academic Researches are important steps geared towards creating a secure environment for Businesses in cloud or intending to switch to cloud. Prominent among such efforts is the collaboration of the Jericho Forum and Cloud Security Alliance (CSA); and independent non-profit making organisation. This body have released an eighty page ?Security guidance as critical areas of focus in cloud computing'. With similar collaboration in this sphere, an ultimate realisation of an accepted standard cloud based security mechanism may come to fruition. For now CSA's best practice guidelines stands to help businesses in making sound and appropriate decisions on cloud services and deployment.

Notwithstanding the lack of standard cloud based security mechanism, existing Encryption technologies are still useful tools utilized to ensure confidentiality, integrity, authentication and non-repudiation on customer data in transit and at rest. However, the efficiency of this approach would also depend on the type of Cryptosystem used and Key management techniques.

Encryption

?Strong encryption with key management is the core mechanism that cloud computing systems must use to protect data. Encrypted data is protected; even whereas someone has the data without its corresponding keys, they cannot use the data at all.[Callas Jon, CSA p.72] Given the fact that communication between customer and provider in cloud is Web based (i.e via the internet). Security of data in transit remains vulnerable hence the need to deploy logical security mechanism that would ensure confidentiality, integrity, authentication and non-repudiation between the two entities. The use of Encryption on data in transit and at rest has been strongly recommended by CSA in their Guideline of using cloud computing and other security professionals elsewhere. The best way to achieve this goal is by using strong proprietary cryptography algorithms such as Symmetric, Asymmetric or combination of both.

In a Symmetric cryptography such as Data Encryption Standard (DES) or 3DES among others, the sender and receiver use the same Secret key for encrypting and decrypting messages. The advantage is because it is much faster than Asymmetric algorithm and harder to break if using a large Key size. The down side of this method is how to manage key exchanges. Against this backdrop, it would thus require a secure mechanism to deliver keys properly. Symmetric algorithm also provides confidentiality but not authenticity or non-repudiation. [CISSP, CH8 p.681]

On the other hand using an Asymmetric algorithm such RSA, DSA among others; two different keys are used, one private and the other Public. Sender encrypts message with the Public key of recipient and message decrypted by the recipient using his private key. The merit of this method is better key distribution, scalability and provides authentication as well as non-repudiation. Its down side is that it is much slower compared to symmetric algorithm.

Security Of Data In Cloud

In the context of cloud computing, security of data could be achieved by using combination of both symmetric and Asymmetric Algorithms on data in transit as well as at rest. These cryptosystems as discussed above would together provide security attributes of confidentiality, integrity, authentication and non-repudiation.

The key security issue here is the internet browser where contact is established between customer and server. Using a Secure Socket Layer (SSL) over HTTP or TSL could overcome this problem. This protocol can provide secure channel for key delivery between Customer and Provider Server in cloud. [Mansfield D.20 p.10, 2008] Since the job of SSL is to provide secure channel, the back end of provider's server may require further protection as well. With Asymmetric and Symmetric Cryptography deployed together, even if the data packet is intercepted along the path, confidentiality is provided by the algorithms. The intruder will find it difficult to decrypt the data in the absence of the Secret Key. Nevertheless, there are a number of other security technologies in use for encryption, Authorisation and authentication such as [Kerbros, IPSec,VPN,PGP]. Provision of security between two entities is therefore not limited to only SSL/TSL.

Security Of Data At Rest

The use of hybrid approach (Symmetric and Asymmetric cryptography) in encrypting as well as key distribution is supported by a security technology innovation by a group of developers assigned by Microsoft in 2008. The technology innovation claim to ?provide data security in an off-premise environment and enables cloud-based data storage to function as a secure ?drop-box' for data that corresponds to a customer.[Meijer et al, 2008 p.1] The technology uses a Public/private Key cryptography that correspond to a private key of customer. Key exchange between service provider and customer is handled by a system transferor via an encrypted digital envelope.

Example of cloud-Based secure data repository.

In this system, data that is drop by customer is encrypted using a Public Key that corresponds to a user's specific private key. Since the private key is kept secret by both parties, the stored data is protected. Further security is also added to the data at rest by partitioning of the cloud based data repository into multiple partitions. This creates independent secure storage for every Customer, and each with its own separate key pair. ?Each of these multiple partitions can correspond to any number of indexing criteria , and not limited to identity of user, data type, data content, data topic or author, etc; [p.1 para. 0010] as illustrated in Fig? below.

Example of the Security and Key Management components of the system.

As depicted above, the system has ability to facilitate encryption of data stored in each partition in a way that data can be secured and limited for use by designated services or customer. This limited use is made possible by control of the private key needed for decryption of the stored data. Furthermore, the security component received data inputs from customer, whereas the key management component analyse the input, automatically to determine an appropriate public key which then encrypt the input prior to storage into data partition. [ibid, p.4]

The key management component generates the Public/Private cryptographic key pair as a function of the identity of the customer. [Ibid p.8] Based on the nature of this cloud security system, one could argued that since the service provider has private keys to decrypt stored data in the various partition, security of stored data in this context has be based on SLA Trust agreement between the parties.

Data Recovery

?Investigative support

Service Level Agreement (SLA)

Conclusion

Bibliography

?Krissi Danielson:?? Distinguishing Cloud Computing from Utility Computing March 26, 2008: Interview with 3Tera Chairman and CEO Barry X Lynn; Utility Computing Company. <URL: http://www.ebizq.Net/MT4-cp.cgi?_mode=view&amp;blog_Id=32&amp;Id=8>

Richard Stallman with Guardian: Cloud Computing; Guardian Technology News Monday 29 September 2008; URL: Http://www.guardian.co.uk/technology/2008/Sep/25/Computing.Internet/

?Larry Ellison: Oracle's Ellison nails cloud computing; September 26, 2008 URL: http://news.cnet.com/8301-13953_3-10052188-80.html

?Security in? Virtualised World: Network Security, Volume 2009 .Issue 6, august 2009,pp.15-18 - Kevin Sloan-

?A concise introduction to autonomic Computing: Advanced Engineering Informatics, Volume 19, issue 3, July 2005, pp.181-187 - Roy Sterritt, Manish Parashar, Huaglory Tianfield, rainer Unland.

?Cloud Computing and emerging IT Platforms: Vision, hype, and Reality for delivering computing as the 5th Utility: Future Generation Computer Systems, Vol 25, issue 6, June 2009, pp.599-616 - Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg, Ivon Brandic

?Hey, you, get off of the cloud? Computer law & security review, Vol 25, issue 3, 2009, pp.270-274 -Andrew Joint, Edwin Baker, Edward Eccles

?Danger in the Clouds - Network Security, Vol.2008, issue, December 2008, Pages 9-11 Steve Mansfield- Devine

?Developing a decision model for Business process outsourcing- Dong hoon Young, Seongcheol Kim, Changi Nam, Ja-won Min - Elsevier - May 2006.

?CSA: Cloud Security Allaince: Security Guidance for critical areas of focus in cloud Computing: April 2009 - URL: www.cloudsecurity alliance.org/guidance/>

?Moscaritolo Angela November 10 2009, Rogue appEngine application - Arbor Networks - URL: www.scmagazeous.com/Rogue-AppEngine-app/article/157518/

?Vijayan Jaikumar (2009) Amazon downplays reports of vulnerabilities in its EC2 cloud services. URL-www.inforworld.com/d/cloud-computing/amazon-downplays-reports-vulnerabilities-in-its-cloud-services-994/

?Ulf Mattsson (2009) Real security for virtual machines: Network Security- Elsvier

?Neil Stinchcombe (setember/October (2009) Technology- inforsecurity- Elsvier

?Henricus Johannes Maria Meijer, William H. Gates, Raymond E. Ozzle, Thomas F. Bergstraesser, Michel Connolly, Alexander G. Gounares, Debi P. Mishra, IraL. Snyder, Melora Zaner-Godsey -? April 2008 - Data Security in an Off-Premise Enviroment - pp.1-11

?John Sherwood, Andrew Clark, David Lynas (2005) Enterprise Security Architecture: A Business driven Approach; CMP Books, USA.

?Shon Harris (2008) All-in-one CISSP Exam Guide - 4th edn. McGraw Hill, New York. P.

dog the bounty hunter tacoma narrows bridge weather nyc open marriage department of justice doj dept of justice

Pre Diabetic Diet Tips | AHIP&#39;s Health Care Plans

You may have been diagnosed with pre-diabetes or insulin resistance if your doctor advised you to follow a pre diabetic diet. This would mean that your blood glucose tests show that your body is becoming resistant to insulin. It?s possible for your blood glucose to be higher than normal but not enough for you to be diagnosed of having diabetes. There are steps you can take in order to avoid becoming a diabetic.

A serious illness is diabetes and it can have some significant complications. Damage to the nerves, circulation, and arteries are what diabetics can suffer from. These problems can lead to impaired vision, kidney failure, impotence, heart attacks and strokes, among other things. Diabetes is very common these days but it still needs to be taken seriously. You will want to avoid it if you can.

In many ways, people diagnosed with pre diabetes are lucky. They had a warning and can still turn things around. A few changes to your lifestyle could mean that you can escape ever having a diagnosis of diabetes.

Following a pre diabetic diet will be the most important thing that you can do for your health right now. Reducing weight is what your doctor will probably recommend if you?re overweight. Just as important as reducing calories are making changes to what and when you eat.

In a pre diabetic diet, one of the most important factors is cutting down on sugar and refined carbs while increasing the amount of fiber that you eat. Below are some pre diabetic diet tips you can follow:

Better to choose whole fruit than fruit juice. If you?re trying to normalize your blood glucose levels, you don?t want your blood sugar to spike but this is what will happen if you have juice because the fiber had been removed so the natural sugars are absorbed into the bloodstream much faster.

Don?t peel potatoes and other root vegetables. That?s because the peel has more fiber. Avoid pesticides that may be found in the peel by buying organic. Don?t buy pizza, burgers, breaded chicken or other food that you like in a fast food restaurant and make them at home instead. Besides using whole grain bread, you can also use less fat and end up with fewer calories.

Eat meals at regular times. This will better regulate your blood sugar. If you have a sugar rush after eating, followed by a low a few hours later, choose foods that are lower on the glycemic index and eat more often.

If you?re sleepy after you ate, then it?s possible you ate too much. Before your main course, eat more greens or have a salad. Doing this can fill the stomach without taking too many calories.

Making sure that you have regular exercise is important as well as a pre diabetic diet. To keep your systems running smoothly and regulate your blood glucose levels, do some physical activity every day. Even though what you do depends on your fitness levels, you still need to at least take a half hour walk every day.

Exercise helps your body to use insulin effectively. When you are using insulin effectively, the body will convert blood glucose to energy. But it will be converted to fat when you?re not effectively using insulin. This is the way exercise regulates blood sugar levels. Because the effect only lasts between 12-48 hours, exercising everyday is important if you have pre diabetes. But this is in addition to your pre diabetic diet which you should follow.

Turn to Father and Son when you need exterior doors Philadelphia PA.

Tags: diabetes, disease, Disease and Illness, fitness, health and fitness, Health and Medicine, health conditions, Health Conditions and Diabetes, Health Conditions and Disease, Illness, Medical Treatments, medicine, Physical Fitness

justin verlander pepper spraying cop pepper spraying cop somaya reece juelz santana juelz santana greg halman

DoubleTwist adds Google Music support, gets an alarm clock app

DoubleTwist Alarm Clock
DoubleTwist is certainly still one of the better music management options for Android, and it just keeps improving. Two days ago the player app got an update and now it can hook into Google Music, though, it only recognizes songs that you've checked for offline access from within the Google app. An unfortunate restriction, but at least your tracks don't disappear into the ether if you prefer to play back your tunes via DoubleTwist. There's also new functionality coming to what is now less an app than an ecosystem, thanks to the just released DoubleTwist Alarm Clock. The functionality is pretty much what you'd expect -- set a time and pick a song from your DoubleTwist library to gently rouse you from your slumber (or kick your butt out of bed). The Alarm Clock is just $0.99 in the Play Market right now for the first 10,000 customers. After that it'll go up to $1.99. So don't waste any time, go download it now.

DoubleTwist adds Google Music support, gets an alarm clock app originally appeared on Engadget on Fri, 30 Mar 2012 12:00:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments


Source: http://feeds.engadget.com/~r/weblogsinc/engadget/~3/eUcfrJ01cRw/

cranberry sauce oregon usc la auto show powerball winning numbers powerball winning numbers uc davis pepper spray uc davis pepper spray

Friday, March 30, 2012

Clownfish (and Seahorse) Release Project 2012 | scuba-fish.com

Western Clownfish or Anemonefish at Ko Haa, Ko Lanta, Thailand

Scubafish are delighted to be supporting Pimalai?s 9th Clownfish Release Project event on 2nd April 2012 at Ko Haa. This year, Dr Thon Thamrongnawasawat and his team of marine scientists, plan to release over 100 Western Clownfish and are extending their project to include 50 Seahorses to release at Island #1 and #6 at popular local dive site, Ko Haa.

Anurat Tiyaphorn, owner of Pimalai Resort & Spa proudly announced;

?After 7 years of experiment and numerous learning experiences we are proud that by 2010 we had successfully helped to restock the waters around Koh Haa with a sustainable population of little orange ?Nemos? (aka clownfish).

We are now ready for the next big step. This year Dr. Thorn and his team, together with volunteer divers and representatives of Pimalai Resort & Spa and Scubafish Dive Centre, will release juvenile yellow seahorses to join their clownfish cousins around the divesites at Ko Haa.?

The Clownfish Release Project, which started back in 2002, has two main aims; to research and improve techniques for reintroducing marine life bred in nurseries back into ocean environments, and to raise awareness about marine conservation, education and preservation, specifically relating to poaching for aquarium sales.

Jeuvenile Clownfish in a bag ready for release

The clownfish is a small species of fish that is found around tropical coral reefs. The most commonly known species of clownfish is orange with white markings but clownfish can be found in many different colours and can also differ in shape. In the wild, clownfish are said to live for six-eight years, and they grow up to only three to five inches!

There are 28 recognised species of clownfish, seven of which can be found in Thailand. The clown fish is also found as far north as the Red Sea and inhabits the Great Barrier Reef, on the Australian east coast.

Western Clownfish Ko Haa

Due to their small size, clown fish are preyed upon by a number of predators but can be difficult to catch and they often retreat into the safety of the sea anemone. Large species of fish, sharks and eels are the main predators of the clown fish in the water but the human is the biggest overall threat to the clown fish as they are caught to keep in tanks and aquariums.

The clownfish rose to international fame and stardom in the popular animated movie ?Finding Nemo?. Fish shops, aquariums and clownfish breeders reported significant increases in clownfish sales and demand.

It is indeed a sad irony, observed Dr Thon Thamrongnawasawat, head of the Department of Marine Sciences at Kasetsart University, that the success of a movie which tried to spread the message that clownfish should be left in peace has actually stimulated demand for them as pets, to the point where the very survival of the species is now at risk.

Khun Anurat?s daughter, who is also a keen marine conservationist, felt compelled to take part in the Clownfish Release Project right from the start;

?We started our Nemo project not knowing how difficult it was to return something back to nature whose existence we had always taken for granted. The World?s famous ?Finding Nemo? movie led to the rapid increase in demand to catch clownfish and sell them as pet fish. Clownfish are not funny and neither is the fact that, all the clownfish in the Ko Haa area, were caught and sold to fish markets as cheaply as 10 Baht each!?

Seahorse Release Project VolunteerKhun Anurat?s daughter was heartbroken to learn that all the Nemos were cruelly caught and sold and felt that, not only should something be done to increase the numbers of clownfish in the Ko Haa area, but that by demonstrating to the world that she was on the side of Mother Nature, she could also help to educate people to know that it requires a lot of sweat, time, patience, education and resources to successfully return fish (and seahorses) to their traditional homes.

The first few years of the Clownfish Release Project saw Dr Thorn?s team introduce several thousand clownfish into the reefs around Ko Haa.

The team assumed that the fish would have a natural instinct to find a safe haven in the ocean, but this was not the case! Many larger fish enjoyed a free snack.

The next approach was to provide a temporary refuge for the clownfish while they were released. The clownfish were introduced to their new home in a temporary wire-net basket, sized so that the clownfish could swim in and out of, but that prevented predators from gaining entry. The baskets were placed near to anemones so that the clownfish could also shelter within the anemone tendrils.

Clownfish and sea anemones provide a great number of benefits for one another ? anemones protect clownfish from predators, as well as providing food through the scraps left from the anemones? meals. In return, clownfish protect anemones by dining on invasive parasites that could harm the anemones.

Clownfish Cages

Dr Thorn has seen a marked improvement in the success of repopulating Ko Haa with clownfish over the last few years and believes that with further research and monitoring, he and his team can continue to repopulate tropical coral reefs with marine species that may be in decline.

?We have obtained partial success in reintroducing clownfish into the waters around Hoh Haa but we will need to further monitor the population of these fish and their survival rate before we can say ?we won ? job done?.?

Globally, seahorse populations are thought to have been endangered in recent years by overfishing and habitat destruction. Seahorses are the main ingredients in traditional Chinese herbology, and as many as 20 million seahorses are caught each year and sold for this purpose.

Tigertail Seahorse

Again, in cooperation with Dr Thorn and the Department of Fisheries, Pimalai and Scubafish are pleased to participate in an attempt to protect and enhance the seahorse population near Ko Haa.

The release is scheduled to be on Monday 2 April 2012. For divers who are interested in volunteering to help in the release, please contact diving@pimalai.com The boats will leave from Pimalai Resort & Spa jetty at 08:00am. Limited space is available!!

?


?

Related posts:

  1. Western Clownfish ? Amphiprion ocellaris Clownfish Facts: Clownfish actually belong to a group of fish...
  2. Scubafish joins the CoralWatch Project Scubafish has joined Project AWARE and CoralWatch, a nonprofit research...
  3. Kantiang Mooring Project Ko Lanta is a fairly unusual island in this area,...
  4. Scubafish: Winners of the 2010 Project AWARE Conservation Award! Scubafish: Winners of the 2010 Project AWARE Conservation & Environmental...
  5. Seahorse ? Hippocampus Seashorse Facts: The seahorse species ranges in size from .6...

Source: http://www.scuba-fish.com/aqualogy/clownfishand-seahorse-release-project-2012

justin bieber boyfriend marianas trench camille grammer camille grammer us supreme court ncaa breaking dawn part 2 trailer

Thursday, March 29, 2012

Impact Investing: Finding Resources for CSR Start ... - Business Ethics

by Evan Steiner, Hub Ventures
via?CSRwire

Impact investing is an emerging asset class focused on the flow of capital towards companies that align market incentives with scalable impact. In other words, investing in for-profit companies that are making the world a better place.

Think_Bigger_Sign_iStock_000018675764XSmallIt is a paradigm shift away from a bifurcated non-profit vs. for-profit perspective, into a blended approach that seeks to make money and do good.??The sector, generally referred to as ?social enterprise,? has garnered a lot of attention and interest recently, especially since it represents a way for many to align their careers with their personal values.

After working in impact investing for a short while, I discovered a little secret that people don?t bring up enough: there is actually very little investment being made, especially for seed and early-stage companies.

Reports from?JPMorgan forecasted impact investing to be a $400 billion to one trillion investment opportunity over the next decade. However, right now most of that money exists only for growth stage companies, and it is very difficult for start-up entrepreneurs to get the resources they need to launch their companies. The reasons are fairly consistent: aversion to risk, small investments exceed the operational bandwidth of existing impact investment funds, and few examples of social enterprises that have had exits and liquidity events.

However, if there is little investment available for early-stage companies, how will the sector grow and social enterprise jobs be created?

Aligning Impact Investing and Corporate Social Responsibility

To address the lack of capital and resources to early-stage social ventures,?Hub Ventures was launched in 2010 out of the?Hub Bay Area, a community of social entrepreneurs in San Francisco with over 1,000 members. Hub Ventures is a 12-week accelerator program providing resources and support to seed-stage social ventures.

In order to increase the flow of investment to Hub Ventures participants, we are taking an innovative approach that aligns social responsibility programs of large corporations with the entrepreneurs and companies going through our program.

Recently, Hub Ventures partnered with?Lakeland Ventures Development, whose corporate client is in the business of saving lives.??Lakeland has committed to put $380,000 into startups focused on ?human health and safety,? which includes a broad array of possibilities including clean water, digital health, and public safety.??Lakeland is focused on identifying investment and acquisition opportunities that align with the CSR and core business strategy of their client.

Of the eight to 10 slots for the spring cohort of Hub Ventures, four will be reserved for companies that fit these criteria. Each company will receive $20,000 when accepted and all are eligible for $75,000 at the end of the program.

Most corporate social responsibility focuses on launching green initiatives, giving money to charity, or reducing the footprint of the supply chain. Often these initiatives are just rhetoric, paying lip service to improve the corporate image, and they don?t offer any really substantive solutions to social or environmental challenges.

Lakeland is making investments into companies that are addressing big challenges and that also align with the values of their corporate clients.??It is a much more engaged and action-oriented approach to corporate social responsibility, one that simultaneously benefits the large corporations and the small start-ups.

The companies applying to Hub Ventures represent a diversity of sectors including technology for good, civic engagement, environmental sustainability, public health, poverty alleviation, and more.

My hope is that more corporate clients will see the value in supporting these entrepreneurs and their world changing ideas.

This article originally appeared on CSRwire and is republished with permission.

Post to Twitter

Related Posts:


Tagged as: Corporate Social Responsibility, CSR, Hub Ventures, Impact Investing, J.P. Morgan, Social Enterprise, Socially Responsible Investing, SRI

Source: http://business-ethics.com/2012/03/29/9325-impact-investing-finding-resources-for-csr-start-ups/

the talented mr ripley weather new orleans orcl the hartford illinois primary 2012 michael bay ostara

NASA's TRMM satellite sees newborn Tropical Storm Pakhar's heavy rain

NASA's TRMM satellite sees newborn Tropical Storm Pakhar's heavy rain [ Back to EurekAlert! ] Public release date: 29-Mar-2012
[ | E-mail | Share Share ]

Contact: Rob Gutro
Robert.j.gutro@nasa.gov
443-858-1779
NASA/Goddard Space Flight Center

System 96W intensified overnight and became Tropical Storm Pakhar during the morning hours on March 29. NASA's TRMM satellite measured rainfall rates within the storm, and noticed areas of heavy rain west of the center as the storm continued to strengthen.

NASA's Tropical Rainfall Measuring Mission (TRMM) satellite passed over Pakhar on March 29, and saw that it was generating mostly light to moderate rainfall around the entire system, with areas of heavy rain in the southwestern and northeastern quadrants. Light to moderate rainfall rates were between .78 to 1.57 inches (20 to 40 mm) per hour and heavy rain was falling at a rate of 2 inches/50 mm per hour. The banding of thunderstorms has continued to consolidate and strengthen since March 28, which accounts for the cyclone's increase in strength.

On March 29 at 1500 UTC (11 a.m. EDT) Pakhar's maximum sustained winds virtually exploded from 35 knots (40.2 mph/64.8 kph) to 60 knots (69 mph/111 kph) within 12 hours because it is in an environment with lower wind shear and warm sea surface temperatures. Pakhar is centered near 10.0 North and 111.6 East, about 300 nautical miles east of Ho Chi Minh City, Vietnam. It is moving to the west-northwest near 3 knots (3.4 mph/5.5 kph).

Forecasters at the Joint Typhoon Warning Center expect Pakhar to make landfall in central Vietnam, north of Ho Chi Minh City on March 31. Residents should prepare for rough surf along beaches, gusty winds and heavy rainfall.

###


[ Back to EurekAlert! ] [ | E-mail | Share Share ]

?


AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.


NASA's TRMM satellite sees newborn Tropical Storm Pakhar's heavy rain [ Back to EurekAlert! ] Public release date: 29-Mar-2012
[ | E-mail | Share Share ]

Contact: Rob Gutro
Robert.j.gutro@nasa.gov
443-858-1779
NASA/Goddard Space Flight Center

System 96W intensified overnight and became Tropical Storm Pakhar during the morning hours on March 29. NASA's TRMM satellite measured rainfall rates within the storm, and noticed areas of heavy rain west of the center as the storm continued to strengthen.

NASA's Tropical Rainfall Measuring Mission (TRMM) satellite passed over Pakhar on March 29, and saw that it was generating mostly light to moderate rainfall around the entire system, with areas of heavy rain in the southwestern and northeastern quadrants. Light to moderate rainfall rates were between .78 to 1.57 inches (20 to 40 mm) per hour and heavy rain was falling at a rate of 2 inches/50 mm per hour. The banding of thunderstorms has continued to consolidate and strengthen since March 28, which accounts for the cyclone's increase in strength.

On March 29 at 1500 UTC (11 a.m. EDT) Pakhar's maximum sustained winds virtually exploded from 35 knots (40.2 mph/64.8 kph) to 60 knots (69 mph/111 kph) within 12 hours because it is in an environment with lower wind shear and warm sea surface temperatures. Pakhar is centered near 10.0 North and 111.6 East, about 300 nautical miles east of Ho Chi Minh City, Vietnam. It is moving to the west-northwest near 3 knots (3.4 mph/5.5 kph).

Forecasters at the Joint Typhoon Warning Center expect Pakhar to make landfall in central Vietnam, north of Ho Chi Minh City on March 31. Residents should prepare for rough surf along beaches, gusty winds and heavy rainfall.

###


[ Back to EurekAlert! ] [ | E-mail | Share Share ]

?


AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.


Source: http://www.eurekalert.org/pub_releases/2012-03/nsfc-nts032912.php

meteor shower bachmann bachmann iowa caucus results dan savage sickle cell trait michigan football

Apple offers to refund Australian iPad customers

[ [ [['A JetBlue flight from New York to Las Vegas', 3]], 'http://yhoo.it/GV9zpj', '[Related: View photos of the JetBlue plane in Amarillo]', ' ', '630', ' ', ' ', ], [ [['Afghan security forces and police killed three', 3]], 'http://yhoo.it/H9BcJE', '[Related: Bales\' wife on his alleged shooting: \'He would not do that\']', ' ', '630', ' ', ' ', ], [ [['looking for fireworks between the opposing camps', 16]], 'http://yhoo.it/GSvEsj', '[RELATED:\?It?s going to be a circus\?: Activists begin protests outside Supreme Court]', ' ', '630', ' ', ' ', ], [ [['entirely respectable way to put off the searing constitutional controversy', 8]], 'http://yhoo.it/GE6jSh', '[RELATED: Obama\?s health care law passed 2 years ago, but where are we now\?]', ' ', '630', ' ', ' ', ], [ [['Witnesses said the gunman pulled up on a black scooter', 7]], 'http://yhoo.it/GzwOIW', '[Related: New York police tighten security at Jewish sites]', ' ', '630', ' ', ' ', ], [ [['test Zimmerman for alcohol or drugs', 11]], 'http://yhoo.it/Gzn6VF', '[Related: White House says Trayvon Martin is local issue]', ' ', '630', ' ', ' ', ], [ [['Trayvon Martin decked the Neighborhood', 7]], 'http://yhoo.it/GUovUP', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/2/61/261d2c36bccf0971c2734a4d4398aa5a.jpeg', '512', ' ', 'AP/David Goldman', ], [ [['Can you create commerce in order to regulate it', 9]], 'http://yhoo.it/GSgtu8', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/7/78/778e2416573870cd705774e92403447d.jpeg', '630', ' ', 'AP/Charles Dharapak', ], [ [['associated with such a small earthquake', 4]], 'http://yhoo.it/GTco9z', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/0/b4/0b493c1a47b6e3f97f8f48a2b251d7d4.jpeg', '630', ' ', 'AP Photo/Carrie Antlfinger', ], [ [['Fox News host Geraldo Rivera sparked outrage', 3]], 'http://yhoo.it/GKMVTk', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/2/7c/27c7367bc512d233ae1790b320a5e92c.jpeg', '630', ' ', 'AP Photo/John Minchillo', ], [ [['The charges signed against Bales include', 1]], 'http://yhoo.it/wZT5zV', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/7/a0/7a07c51b2aa0f39b1a23355046d13870.jpeg', '512', ' ', 'AP Photo/DVIDS\, Spc\. Ryan Hallock\, File', ], [ [['George Zimmerman, if I had a son', 6]], 'http://news.yahoo.com/photos/thousands-protest-fla-teen-death-1332387124-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/os/152/2012/03/22/d761a49f3fcc99080a0f6a70670053cd-jpg_150905.jpg', '500', ' ', 'AP Photo/John Minchillo', ], [ [['Mohamed Merah', 10], ['prosecutor Francois Molins', 5]], 'http://news.yahoo.com/photos/four-dead-in-french-jewish-school-shooting-1332173151-slideshow', 'Click image to see more photos', 'http://l.yimg.com/cv/ip/ap/default/120321/2012_03_21t151508z_425380421_gm1e83l1sqs01_rtrmadp_3_france_shootings_raid.jpg', '630', ' ', 'REUTERS/Jean-Paul Pelissier', ], [ [['Shortly after he wrapped up his victory remarks', 2]], 'http://news.yahoo.com/photos/4-straight-romney-wins-washington-gop-caucus-1330835515-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/3/e9/3e9b0082c3c3111dcc19e3527ae94cc7.jpeg', '500', ' ', 'AP Photo/Steven Senne', ], [ [['best understands the problems of average Americans', 2]], 'http://news.yahoo.com/photos/4-straight-romney-wins-washington-gop-caucus-1330835515-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/3/e9/3e9b0082c3c3111dcc19e3527ae94cc7.jpeg', '500', ' ', 'AP Photo/Steven Senne', ], [ [['Group for Historic Aircraft Recovery', 7]], 'http://yhoo.it/GB2RVy', 'Click image to see more photos', 'http://l.yimg.com/os/152/2012/03/20/photo-1332257995646-4-0-jpg_171722.jpg', '630', ' ', 'AFP', ], [ [['xxxxxxxxxxxx', 11]], 'http://news.yahoo.com/photos/russian-grannies-win-bid-to-sing-at-eurovision-1331223625-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/1/56/156d92f2760dcd3e75bcd649a8b85fcf.jpeg', '500', ' ', 'AP', ] ]

[ [ [['presume laws are constitutional', 7]], '28747556', '0' ], [ [['has destroyed 15 to 25 houses', 7]], '28744868', '0' ], [ [['short answer is yes', 7]], '28746030', '0' ], [ [['opportunity to tell the real story', 7]], '28731764', '0' ], [ [['entirely respectable way to put off the searing constitutional controversy', 7]], '28723797', '0' ], [ [['point of my campaign is that big ideas matter', 9]], '28712293', '0' ], [ [['As the standoff dragged into a second day', 7]], '28687424', '0' ], [ [['French police stepped up the search', 17]], '28667224', '0' ], [ [['Seeking to elevate his candidacy back to a general', 8]], '28660934', '0' ], [ [['The tragic story of Trayvon Martin', 4]], '28647343', '0' ], [ [['Karzai will get a chance soon to express', 8]], '28630306', '0' ], [ [['powerful storms stretching', 8]], '28493546', '0' ], [ [['basic norm that death is private', 6]], '28413590', '0' ], [ [['songwriter also saw a surge in sales for her debut album', 6]], '28413590', '1', 'Watch music videos from Whitney Houston ', 'on Yahoo! Music', 'http://music.yahoo.com' ], [ [['keyword', 99999999999999999999999]], 'videoID', '1', 'overwrite-pre-description', 'overwrite-link-string', 'overwrite-link-url' ] ]

Source: http://news.yahoo.com/apple-offers-refund-australian-ipad-customers-005003806.html

nfl power rankings week 13 nfl power rankings week 13 patrice patrice tether lana peters lana peters

Alion Awarded Two Contracts to Help Korean Hydro and Nuclear Power Meet Nuclear Safety Requirements

[ [ [['A JetBlue flight from New York to Las Vegas', 3]], 'http://yhoo.it/GV9zpj', '[Related: View photos of the JetBlue plane in Amarillo]', ' ', '630', ' ', ' ', ], [ [['Afghan security forces and police killed three', 3]], 'http://yhoo.it/H9BcJE', '[Related: Bales\' wife on his alleged shooting: \'He would not do that\']', ' ', '630', ' ', ' ', ], [ [['looking for fireworks between the opposing camps', 16]], 'http://yhoo.it/GSvEsj', '[RELATED:\?It?s going to be a circus\?: Activists begin protests outside Supreme Court]', ' ', '630', ' ', ' ', ], [ [['entirely respectable way to put off the searing constitutional controversy', 8]], 'http://yhoo.it/GE6jSh', '[RELATED: Obama\?s health care law passed 2 years ago, but where are we now\?]', ' ', '630', ' ', ' ', ], [ [['Witnesses said the gunman pulled up on a black scooter', 7]], 'http://yhoo.it/GzwOIW', '[Related: New York police tighten security at Jewish sites]', ' ', '630', ' ', ' ', ], [ [['test Zimmerman for alcohol or drugs', 11]], 'http://yhoo.it/Gzn6VF', '[Related: White House says Trayvon Martin is local issue]', ' ', '630', ' ', ' ', ], [ [['Trayvon Martin decked the Neighborhood', 7]], 'http://yhoo.it/GUovUP', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/2/61/261d2c36bccf0971c2734a4d4398aa5a.jpeg', '512', ' ', 'AP/David Goldman', ], [ [['Can you create commerce in order to regulate it', 9]], 'http://yhoo.it/GSgtu8', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/7/78/778e2416573870cd705774e92403447d.jpeg', '630', ' ', 'AP/Charles Dharapak', ], [ [['associated with such a small earthquake', 4]], 'http://yhoo.it/GTco9z', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/0/b4/0b493c1a47b6e3f97f8f48a2b251d7d4.jpeg', '630', ' ', 'AP Photo/Carrie Antlfinger', ], [ [['Fox News host Geraldo Rivera sparked outrage', 3]], 'http://yhoo.it/GKMVTk', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/2/7c/27c7367bc512d233ae1790b320a5e92c.jpeg', '630', ' ', 'AP Photo/John Minchillo', ], [ [['The charges signed against Bales include', 1]], 'http://yhoo.it/wZT5zV', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/7/a0/7a07c51b2aa0f39b1a23355046d13870.jpeg', '512', ' ', 'AP Photo/DVIDS\, Spc\. Ryan Hallock\, File', ], [ [['George Zimmerman, if I had a son', 6]], 'http://news.yahoo.com/photos/thousands-protest-fla-teen-death-1332387124-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/os/152/2012/03/22/d761a49f3fcc99080a0f6a70670053cd-jpg_150905.jpg', '500', ' ', 'AP Photo/John Minchillo', ], [ [['Mohamed Merah', 10], ['prosecutor Francois Molins', 5]], 'http://news.yahoo.com/photos/four-dead-in-french-jewish-school-shooting-1332173151-slideshow', 'Click image to see more photos', 'http://l.yimg.com/cv/ip/ap/default/120321/2012_03_21t151508z_425380421_gm1e83l1sqs01_rtrmadp_3_france_shootings_raid.jpg', '630', ' ', 'REUTERS/Jean-Paul Pelissier', ], [ [['Shortly after he wrapped up his victory remarks', 2]], 'http://news.yahoo.com/photos/4-straight-romney-wins-washington-gop-caucus-1330835515-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/3/e9/3e9b0082c3c3111dcc19e3527ae94cc7.jpeg', '500', ' ', 'AP Photo/Steven Senne', ], [ [['best understands the problems of average Americans', 2]], 'http://news.yahoo.com/photos/4-straight-romney-wins-washington-gop-caucus-1330835515-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/3/e9/3e9b0082c3c3111dcc19e3527ae94cc7.jpeg', '500', ' ', 'AP Photo/Steven Senne', ], [ [['Group for Historic Aircraft Recovery', 7]], 'http://yhoo.it/GB2RVy', 'Click image to see more photos', 'http://l.yimg.com/os/152/2012/03/20/photo-1332257995646-4-0-jpg_171722.jpg', '630', ' ', 'AFP', ], [ [['xxxxxxxxxxxx', 11]], 'http://news.yahoo.com/photos/russian-grannies-win-bid-to-sing-at-eurovision-1331223625-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/1/56/156d92f2760dcd3e75bcd649a8b85fcf.jpeg', '500', ' ', 'AP', ] ]

[ [ [['measure all but certain to fail in the face of bipartisan', 4]], '28771014', '0' ], [ [['matter what you do in this case', 5]], '28759848', '0' ], [ [['presume laws are constitutional', 7]], '28747556', '0' ], [ [['has destroyed 15 to 25 houses', 7]], '28744868', '0' ], [ [['short answer is yes', 7]], '28746030', '0' ], [ [['opportunity to tell the real story', 7]], '28731764', '0' ], [ [['entirely respectable way to put off the searing constitutional controversy', 7]], '28723797', '0' ], [ [['point of my campaign is that big ideas matter', 9]], '28712293', '0' ], [ [['As the standoff dragged into a second day', 7]], '28687424', '0' ], [ [['French police stepped up the search', 17]], '28667224', '0' ], [ [['Seeking to elevate his candidacy back to a general', 8]], '28660934', '0' ], [ [['The tragic story of Trayvon Martin', 4]], '28647343', '0' ], [ [['Karzai will get a chance soon to express', 8]], '28630306', '0' ], [ [['powerful storms stretching', 8]], '28493546', '0' ], [ [['basic norm that death is private', 6]], '28413590', '0' ], [ [['songwriter also saw a surge in sales for her debut album', 6]], '28413590', '1', 'Watch music videos from Whitney Houston ', 'on Yahoo! Music', 'http://music.yahoo.com' ], [ [['keyword', 99999999999999999999999]], 'videoID', '1', 'overwrite-pre-description', 'overwrite-link-string', 'overwrite-link-url' ] ]

Source: http://news.yahoo.com/alion-awarded-two-contracts-help-korean-hydro-nuclear-140000580.html

st patricks day dark shadows st. bonaventure ira glass march madness swain match day

Out of Peru, the plant that tackles toothache

For youtube videos, paste embed code directly in the text box

-

Members do not need to provide an address

-

Rate Article

  • 1
  • 2
  • 3
  • 4
  • 5
Total votes: 0 Select Comment Validation Method
Member
Name/URL (Guest)
FaceBook (Guest) Member Commenting:


Authenticate with Facebook before submitting

OR


Make your LabSpaces comments count. Start earning LabSpaces points by becoming a member! Learn more. Please verify that you are human: Register for LabSpaces
Make your LabSpaces comments count. Start earning LabSpaces points by becoming a member! Learn more.

Please authenticate before trying to post a comment.

If you would like to remain anonymous, please enter a new name and link below


Friends

Source: http://www.labspaces.net/118784/Out_of_Peru__the_plant_that_tackles_toothache

lobster recipes hearts roses flower delivery e cards smash kate upton sports illustrated

Wednesday Candidate Schedule (TIME)

Share With Friends: Share on FacebookTweet ThisPost to Google-BuzzSend on GmailPost to Linked-InSubscribe to This Feed | Rss To Twitter | Politics - Top Stories News, News Feeds and News via Feedzilla.

Source: http://news.feedzilla.com/en_us/stories/politics/top-stories/209653137?client_source=feed&format=rss

keanu reeves whitney houston national anthem beverly hills hotel beverly hills hotel the watchmen whitney houston dies dolly parton i will always love you

Gynecologists urged to screen for heart disease

[ [ [['A JetBlue flight from New York to Las Vegas', 3]], 'http://yhoo.it/GV9zpj', '[Related: View photos of the JetBlue plane in Amarillo]', ' ', '630', ' ', ' ', ], [ [['Afghan security forces and police killed three', 3]], 'http://yhoo.it/H9BcJE', '[Related: Bales\' wife on his alleged shooting: \'He would not do that\']', ' ', '630', ' ', ' ', ], [ [['looking for fireworks between the opposing camps', 16]], 'http://yhoo.it/GSvEsj', '[RELATED:\?It?s going to be a circus\?: Activists begin protests outside Supreme Court]', ' ', '630', ' ', ' ', ], [ [['entirely respectable way to put off the searing constitutional controversy', 8]], 'http://yhoo.it/GE6jSh', '[RELATED: Obama\?s health care law passed 2 years ago, but where are we now\?]', ' ', '630', ' ', ' ', ], [ [['Witnesses said the gunman pulled up on a black scooter', 7]], 'http://yhoo.it/GzwOIW', '[Related: New York police tighten security at Jewish sites]', ' ', '630', ' ', ' ', ], [ [['test Zimmerman for alcohol or drugs', 11]], 'http://yhoo.it/Gzn6VF', '[Related: White House says Trayvon Martin is local issue]', ' ', '630', ' ', ' ', ], [ [['Trayvon Martin decked the Neighborhood', 7]], 'http://yhoo.it/GUovUP', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/2/61/261d2c36bccf0971c2734a4d4398aa5a.jpeg', '512', ' ', 'AP/David Goldman', ], [ [['Can you create commerce in order to regulate it', 9]], 'http://yhoo.it/GSgtu8', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/7/78/778e2416573870cd705774e92403447d.jpeg', '630', ' ', 'AP/Charles Dharapak', ], [ [['associated with such a small earthquake', 4]], 'http://yhoo.it/GTco9z', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/0/b4/0b493c1a47b6e3f97f8f48a2b251d7d4.jpeg', '630', ' ', 'AP Photo/Carrie Antlfinger', ], [ [['Fox News host Geraldo Rivera sparked outrage', 3]], 'http://yhoo.it/GKMVTk', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/2/7c/27c7367bc512d233ae1790b320a5e92c.jpeg', '630', ' ', 'AP Photo/John Minchillo', ], [ [['The charges signed against Bales include', 1]], 'http://yhoo.it/wZT5zV', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/7/a0/7a07c51b2aa0f39b1a23355046d13870.jpeg', '512', ' ', 'AP Photo/DVIDS\, Spc\. Ryan Hallock\, File', ], [ [['George Zimmerman, if I had a son', 6]], 'http://news.yahoo.com/photos/thousands-protest-fla-teen-death-1332387124-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/os/152/2012/03/22/d761a49f3fcc99080a0f6a70670053cd-jpg_150905.jpg', '500', ' ', 'AP Photo/John Minchillo', ], [ [['Mohamed Merah', 10], ['prosecutor Francois Molins', 5]], 'http://news.yahoo.com/photos/four-dead-in-french-jewish-school-shooting-1332173151-slideshow', 'Click image to see more photos', 'http://l.yimg.com/cv/ip/ap/default/120321/2012_03_21t151508z_425380421_gm1e83l1sqs01_rtrmadp_3_france_shootings_raid.jpg', '630', ' ', 'REUTERS/Jean-Paul Pelissier', ], [ [['Shortly after he wrapped up his victory remarks', 2]], 'http://news.yahoo.com/photos/4-straight-romney-wins-washington-gop-caucus-1330835515-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/3/e9/3e9b0082c3c3111dcc19e3527ae94cc7.jpeg', '500', ' ', 'AP Photo/Steven Senne', ], [ [['best understands the problems of average Americans', 2]], 'http://news.yahoo.com/photos/4-straight-romney-wins-washington-gop-caucus-1330835515-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/3/e9/3e9b0082c3c3111dcc19e3527ae94cc7.jpeg', '500', ' ', 'AP Photo/Steven Senne', ], [ [['Group for Historic Aircraft Recovery', 7]], 'http://yhoo.it/GB2RVy', 'Click image to see more photos', 'http://l.yimg.com/os/152/2012/03/20/photo-1332257995646-4-0-jpg_171722.jpg', '630', ' ', 'AFP', ], [ [['xxxxxxxxxxxx', 11]], 'http://news.yahoo.com/photos/russian-grannies-win-bid-to-sing-at-eurovision-1331223625-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/1/56/156d92f2760dcd3e75bcd649a8b85fcf.jpeg', '500', ' ', 'AP', ] ]

[ [ [['presume laws are constitutional', 7]], '28747556', '0' ], [ [['has destroyed 15 to 25 houses', 7]], '28744868', '0' ], [ [['short answer is yes', 7]], '28746030', '0' ], [ [['opportunity to tell the real story', 7]], '28731764', '0' ], [ [['entirely respectable way to put off the searing constitutional controversy', 7]], '28723797', '0' ], [ [['point of my campaign is that big ideas matter', 9]], '28712293', '0' ], [ [['As the standoff dragged into a second day', 7]], '28687424', '0' ], [ [['French police stepped up the search', 17]], '28667224', '0' ], [ [['Seeking to elevate his candidacy back to a general', 8]], '28660934', '0' ], [ [['The tragic story of Trayvon Martin', 4]], '28647343', '0' ], [ [['Karzai will get a chance soon to express', 8]], '28630306', '0' ], [ [['powerful storms stretching', 8]], '28493546', '0' ], [ [['basic norm that death is private', 6]], '28413590', '0' ], [ [['songwriter also saw a surge in sales for her debut album', 6]], '28413590', '1', 'Watch music videos from Whitney Houston ', 'on Yahoo! Music', 'http://music.yahoo.com' ], [ [['keyword', 99999999999999999999999]], 'videoID', '1', 'overwrite-pre-description', 'overwrite-link-string', 'overwrite-link-url' ] ]

Source: http://news.yahoo.com/gynecologists-urged-screen-heart-disease-084636505.html

eric cantor eric cantor the beach paul pierce pope joan pope joan strawberry festival

Primal Faith Religions

In a nut shell, Primal Faith traditions are religions that have been in existence since the beginning of recorded history.? They are considered to be both pre-historic and pre-literate.? Primal, Indigenous, and traditional religions are terminologies that are used when referring to Primal Faiths.? These religions are the initial sources of human religion.? Primal religion is also referred to as the "mother" of all religions.? An integral part of primal religions are symbols and myths.? Due to the fact that these groups of religions are extremely old in age, most will not be exercised in faith today however, some aspects of the ancient faiths may still exist as rituals or specific beliefs in other practiced religions such as Judaism, Hinduism, Zoroastrianism, and Chinese folk religion.?

The initial problem with global religious conversion was a lack of planning however, as time progressed selected primal faiths began to transform global politics towards their way of life.? As these selected religions began their domination process, others were simply forgotten.? Christianity, Islam, and Buddhism were among the top three dominating religions.? Today Christianity and Islam are still the two top religions of the world at 33% and 21% respectively.? Christianity denominations are as follows: Catholic, Protestant, Eastern Orthodox, Pentecostal, Anglican, Monophysite, AIC's, Latter Day Saints, Evangelical, SDA's, Jehovah's Witness, Quakers, AOG, Nominal, etc?? Islam denominations are as follows: Shiite, Sunni, etc?? Although "Pagan" and "Idolators" were the titles that were used to refer to as Christians and Islamic faiths respectively, these titles are extremely negative in nature.? As this dissertation is written not to offend any religious beliefs, the negative titles used above are as an academic piece of information.? If in fact any person is offended by these documented reference terms, I sincerely apologize.?

The characteristics of primal Faith are as follows:

  • Oral canon, a section of oral stories of sacred nature, not written.? Oral stories have a unique way of making a story come to life however text has a way of preserving exact information and descriptive phrases.
  • A very wavy line between the spiritual and secular dimensions.
  • A pre-technology world base religious system.
  • Religions that deal with all aspects of life, nature and spirituality.
  • Life consists of two divisions, work and social.? Work and social were not considered to be opposite sides, but two items of the same concept, life.? Practicing religion was considered to be a part of life, not a separate part of life.? One practices religion the same as one breathes, every moment and without thinking.
  • Primal faiths acquired the characteristic of "eternity", not, "forever".? Forever deals with the sense of time.? Time carries with it the concept of having to "keep track" of something.? Eternity however doesn't require a watch or calendar.? It simply is timeless existence.?
  • Rituals have two characteristics: 1. Play acting or performing concepts of a specific faith or religion.? 2. The ritual carries substantial significance for the faith or religion.
  • Two concepts, harmony and balance are what make up a well achieved life and all items that interfere with this harmony must be dealt with swiftly.
  • Primal religions both have multiple Gods and believe that God and humans work together to create a well-balanced life.? Christianity however believes that there is only one God and God is above us all.
  • Magic is utilized in Primal Faiths or religions.

The afterlife of a human of a Primal faith is unique.? The body of a dead individual is thought to have gone limp due to the absence of the spirit.? The spirit has thought to have gone to the invisible world where only spirits may enter. ?Due to the method of beliefs and ritual passing (orally), the "story teller" may see to it to add, alter, or delete any information or tell the "story" in a unique flamboyant style.?

Primal Indigenous

The Primal Indigenous religions (also known as Tribal Religionists, Animists, and Ethnic religionists) are a way of life, not only a religion and it includes thousands of various religions as well.? It concerns the lives of approximately 300 million individuals within the locations of Asia and Africa.? Other sources have the religions population at between 100 and 457 million.? These totals include African Primal Indigenous religions, Shamanism and Paganism.? Many data bases and religious category indexes have Asia and India having the majority of Primal Indigenous population.? The Primal Indigenous religions are recorded as to fit into one category due to being documented in the pre-literate and pre-technological era.? They have been discovered to have been in various different countries, continents, and areas however they share similar basic common ways of life and religious concepts.? As previously stated, religion is their way of life.?

Primal Indigenous religions are known as being henotheistic (acknowledging the belief of more than one God however, only worshiping one God).? Everything that exists is thought to be connected, the material world, the immaterial world, the living, and the dead.? As Primal Faith members have no distinction and combine their work and social lives, so do Primal Indigenous religions.? They carry various superficial differences however, they practice mirrored core beliefs.

Again, as Primal Faith dates their beliefs and rituals to pre-literate, so do the Primal Indigenous.? Their beliefs and rituals are passed down through stories told by its members from generations through time.? These stories covered areas such as world views and operations, societal discoveries and workings, and of course their religious workings, having no separation from their daily life.?

Throughout my research I have come across the same messages countless times.? The messages are as follows:

  1. Their social, family and religious lives are all the same to the Primal Indigenous and Faith individuals.
  2. The basic core beliefs are the same regardless of territory, country, continent, or area.
  3. The physical and spiritual worlds are one and the same.
  4. Time is not linear, but timeless and eternal.
  5. Beliefs and traditions are known through myths passed down in an oral fashion as well as all other messages throughout the Primal faiths.

Source: http://society.ezinemark.com/primal-faith-religions-18e2f201b7d.html

new york times square jaws brock lesnar first night ball drop dick clark new years eve brock lesnar vs alistair overeem