body~politic

~~~~~~~~~> Does DEBT  become SERFDOM ?

Tweet me @ColonialSerf, and let me know, and I'll share the answers HERE!!!

Saturday, May 23, 2015

This 45-Year-Old Has An Amazing Booty | Playboy

This 45-Year-Old Has An Amazing Booty | Playboy



#6

Loaded with Obscure References

Loaded with Obscure References



I hinted at the theme for this episode several times in the previous episode.  I never planned it; I try to live as random, yet totally simple, a life as possible.  Sometimes, that allows for a unique set of circumstances to build upon themselves and keep building to something more.  It's right for me, right for most other people too.  They want it; they don't know how to get it, but don't know how easy it is to get it.  What I'm talking about is Adventure.

Reading this episode, the previous episode and fututre episodes is an Adventure.  The three years between writing episodes of LORE was an Adventure.  As I write this, it has already been nearly two weeks since the previous episode was published.  Many Adventures have happened since then.  Even then, indeed.

France Makes It Illegal For Supermarkets To Waste Food - mindbodygreen.com

France Makes It Illegal For Supermarkets To Waste Food - mindbodygreen.com



he French — known for their complex and refined cuisine — obviously care deeply about ingredients. But the country is taking its love of food to a whole new level, by making sure none of it goes to waste.
In order to cut its food waste in half by 2025, France is making it illegal for large supermarkets to throw away food, reports the Guardian. Instead, they must give it to charities or allow it to be turned into animal feed, compost or energy.
Right now, it's common practice for French supermarkets to deliberately spoil unsightly produce with bleach to discourage dumpster-diving. But as of July 2016, if a large supermarket does this, it will face fines up to $82,000.
This move to repurpose rather than toss mirrors a trend we're seeing here in the US, where progressive cities like Seattle have implemented the nation's first penalties for wasting food. Here in New York, chef Dan Barber of Blue Hill is revered for his food philosophy which includes using every bit (nose-to-tail and stem-to-seed) of what's plentiful instead of what's popular.
About a third of the world's food ends up in the trash; so hopefully we can all follow in France's footsteps.

Thursday, May 21, 2015

Los tesoros arqueológicos de Palmira caen en manos del Estado Islámico

Los tesoros arqueológicos de Palmira caen en manos del Estado Islámico



La peor noticia se ha confirmado. Tras siete días de asalto, el Estado Islámico (EI) ha tomado el control de la ciudad histórica de Palmira, en el corazón de Siria y a solo 215 kilómetros de la capital, Damasco. El EI podría ahora destruir como ya hizo antes uno de los mayores patrimonios arqueológicos del mundo.




Hackers build a new Tor client designed to beat the NSA

Hackers build a new Tor client designed to beat the NSA



Even though Tor is designed to provide complete anonymity to its users, the NSA’s position means they can potentially see and measure both traffic entering the Tor network and the traffic that comes out. When an intelligence agency can see both,simple statistics help an autonomous system at their control match the data up in a timing attack and discover the identity of the sender.
Anonymity over.
This kind of threat has been known to Tor developers for over a decade. They’ve been trying to make eavesdropping difficult for spy agencies for just as long.
To counter the threat, American-Israeli researchers built Astoria, a new Tor client focused on defeating autonomous systems that can break Tor’s anonymity.
Astoria reduces the number of vulnerable circuits from 58 percent to 5.8 percent, the researchers say. The new solution is the first designed to beat even the mostrecently proposed asymmetric correlation attacks on Tor.
Designed to beat such attacks, Astoria differs most significantly from Tor's default client in how it selects the circuits that connect a user to the network and then to the outside Internet. The tool, at its foundation, is an algorithm designed to more accurately predict attacks and then securely select relays that mitigate timing attack opportunities for top-tier adversaries.
Astoria adroitly considers how circuits should, according to the researchers, be made “when there are no safe possibilities,” how to safely balance the growing bandwidth load across the Tor network, and how to keep Tor’s performance “reasonable” and relatively fast even when Astoria is in its most secure configuration.
All this while under the unblinking gaze of the world’s best intel services.
Defeating timing attacks against Tor completely isn’t possible because of how Tor is built, but making the attacks more costly and less likely to succeed is a pastime that Tor developers have dedicated a decade to. Astoria follows in those footsteps.


Hawaii’s $205 Million Obamacare Exchange Implodes | Americans for Tax Reform

Hawaii’s $205 Million Obamacare Exchange Implodes | Americans for Tax Reform



Hawaii now joins Oregon, Massachusetts, Maryland, Vermont, New Mexico, and Nevada as cautionary tales in government central planning. With so many failed state exchanges, questions need to be asked about the haphazard allocation of billions of dollars in taxpayer funds and the complete lack of oversight. 

Read more: http://www.atr.org/hawaii-s-205-million-obamacare-exchange-implodes#ixzz3apnQoCK2
Follow us: @taxreformer on Twitter

Heritrix - Wikipedia, the free encyclopedia

Heritrix - Wikipedia, the free encyclopedia



Arc files[edit]

Older versions of Heritrix by default stored the web resources it crawls in an Arc file. This Arc is wholly unrelated toARC (file format). This format has been used by the Internet Archive since 1996 to store its web archives. More recently it saves by default in the WARC file format, similar to ARC but more precisely specified and flexible. Heritrix can also be configured to store files in a directory format similar to the Wget crawler that uses the URL to name the directory and filename of each resource.
An Arc file stores multiple archived resources in a single file in order to avoid managing a large number of small files. The file consists of a sequence of URL records, each with a header containing metadata about how the resource was requested followed by the HTTP header and the response. 


Blog: Ferguson protesters demand paychecks for gig they were hired to perform

Blog: Ferguson protesters demand paychecks for gig they were hired to perform



 Hired protesters with the Black Lives Matter movement have started a #CutTheCheck hashtag and held a sit-in at the offices for the successor group to the Association of Community Organizations for Reform Now (ACORN) in Missouri after the group allegedly stopped paying them.
FrontPage Magazine reports that Missourians Organizing for Reform and Empowerment (MORE) has been paying protesters $5,000 a month to demonstrate in Ferguson. Last week, hired protesters who haven’t been paid held a sit-in at MORE’s offices and posted a demand letter online.
MORE is the re-branded Missouri branch of ACORN, which filed for bankruptcy in late 2010, FrontPage reported. MORE and other groups supporting the Black Lives Matter movement have received millions of dollars from billionaire financier George Soros.
The group Millennial Activists United posted a letter on their blog demanding MORE “cut the checks” to demonstrators.


Read more: http://www.americanthinker.com/blog/2015/05/ferguson_protesters_demand_paychecks_for_gig_they_were_hired_to_perform.html#ixzz3aoLa9hZ7
Follow us: @AmericanThinker on Twitter | AmericanThinker on Facebook







Cyber Pay Equals Out at $112,000 in Government and Industry, Survey Says - Nextgov.com

Cyber Pay Equals Out at $112,000 in Government and Industry, Survey Says - Nextgov.com



Higher pay typically is not the deal breaker when information security professionals pass over military jobs for private sector positions, with the going rate now reaching $112,000 across all sectors, according to what is likely the largest-ever study of cyber professionals.
The sometimes year-long process to obtain that first paycheck is the turnoff.
According to the assessment by trade association (ISC)2, the turtle's pace of the government hiring process is a big irritation for would-be feds. The timeline for filling desks in defense and civilian agencies can range from six months to a year, whereas the turnaround for private companies is days or at most six weeks. 
"Man, can you imagine, if I’ve got to fill out this 10-page application and fax it in, what’s my everyday job going to be like?" Dan Waddell, (ISC)2 director of government affairs, said. "Especially the millennials and the people we’re trying to bring into the workforce, if that’s their first exposure to the culture . . . that painful process, they are going to run away as fast as they can."
About 1,100 military computer security pros and 730 civilian agency cyber personnel participated in the 14,000-person study, which ended in January.
In 2014, the average salary of a federal cybersecurity worker was $110,500, with federal contractors taking home $114,000. U.S. private sector cyber professionals are expected to bring in $118,000 in 2015.
Waddell, who is expected to release the results at a security professional conference today, said a high-level official at an agency Waddell could not disclose declined an invitation to the event. The official would have had the opportunity to scout out potential candidates for several job openings at his agency. 
"It would be a waste of time for me,” the official told Waddell, he said. “Thank you for giving me a free table at a career fair, but I can’t use it . . . by the time I get those candidates into my pipeline, I’ve already lost to them to the private sector."
There is no denial inside the government the federal hiring process is broken.
Right now, however, there are few ways to bypass the congestion.
The 2014 Border Patrol Agent Pay Reform Act of 2014 authorized fast-track hiring for only select Department of Homeland Security cyber aficionados. A new policymaking cyber unit inside the White House obtained permission to fill a spot under "direct authority," an expedited hiring process used when there is a critical skill need. In March, the military got the green light to speed recruitment of 3,000 civilian computer security pros
But "you can’t take advantage of those workarounds for every single job opening," Waddell said.
Over Half Don’t Always Scan Web Services for Hacker Holes
Other areas for growth in the federal government include enforcement of cyber policies and network scans, according to the report. 
Only 13 percent of government personnel found so-called CyberStat sessions effective at providing security guidance. The in-person meetings are intended to huddle an agency's leaders, DHS -- which manages governmentwide cybersecurity, and the White House cyber team for periodic reviews of the agency's security posture. 
The unit only has about $20 million to spend on such cyber-policing activities
Another reason CyberStat sessions have yet to make a mark in government is that few understand their purpose, Waddell said.
"Most of the folks that I talk to around the beltway, they’ve never participated in one and they don’t even know about the process," he said. White House officials "need to do a better job at getting the word out exactly what these things are and what’s the value? How is it going to help me other than from a compliance perspective? How will this improve my security?" 
There seems to be a need for government, somehow, to crack down on inattention to network protections. 
More than 50 percent of government security professionals do not always scan their applications for hacker holes, if those programs are maintained in the cloud.
"That one's a pretty scary statistic," Waddell said. "They either know that they aren't doing it or they have no clue," whether the cloud provider is, "so that’s just as bad." 
The Federal Risk and Authorization Management Program, a cloud security assessment initiative, is partly aimed at nailing down vulnerability-scanning requirements at the outset of a contract.
Waddell said as FedRAMP starts to gear up with a new two-year road map, hopefully the amount of inconsistent scanning will go down -- soon. Currently, the consensus on cybersecurity hiring and operations is "there isn't a lot of confidence in government initiatives," Waddell said.





Brain implant allows paralysed man to sip a beer at his own pace - health - 21 May 2015 - New Scientist

Brain implant allows paralysed man to sip a beer at his own pace - health - 21 May 2015 - New Scientist




Byzantine fault tolerance - Wikipedia, the free encyclopedia

Byzantine fault tolerance - Wikipedia, the free encyclopedia



In fault-tolerant computer systems, and in particular distributed computing systems, Byzantine fault tolerance is the characteristic of a system that tolerates the class of failures known as the Byzantine Generals' Problem,[1]which is a generalized version of the Two Generals' Problem. The phrases interactive consistency or source congruency have been used to refer to Byzantine fault tolerance, particularly among the members of some early implementation teams.[2]
The objective of Byzantine fault tolerance is to be able to defend against Byzantine failures, in which components of a system fail with symptoms that prevent some components of the system from reaching agreement among themselves, where such agreement is needed for the correct operation of the system. Correctly functioning components of a Byzantine fault tolerant system will be able to provide the system's service assuming there are not too many faulty components.
The following practical, concise definitions are helpful in understanding Byzantine fault tolerance:[3] [4]
Byzantine fault
Any fault presenting different symptoms to different observers
Byzantine failure
The loss of a system service due to a Byzantine fault in systems that require consensus
The terms fault and failure are used here according to the standard definitions[5] originally created by a joint committee on "Fundamental Concepts and Terminology" formed by the IEEE Computer Society's Technical Committee on Dependable Computing and Fault-Tolerance and IFIP Working Group 10.4 on Dependable Computing and Fault Tolerance.[6] A version of these definitions is also described in the Dependability Wikipedia page.
Note that the type of system services which Byzantine faults affect are agreement (a.k.a consensus) services.


Cristina Conde on Twitter: "Yo estuve dada d alta como falsa autónoma, era eso o nada #FalsosAutónomos Encima fui despedida injustamente como tantos... @elEconomistaes"

Cristina Conde on Twitter: "Yo estuve dada d alta como falsa autónoma, era eso o nada #FalsosAutónomos Encima fui despedida injustamente como tantos... @elEconomistaes"

Tuesday, May 19, 2015

STEEL HEARTED BITCH on Twitter: "You mean there's feelings between hatred and numb?"

STEEL HEARTED BITCH on Twitter: "You mean there's feelings between hatred and numb?"

Make it so: Chinese building looks just like Star Trek's USS Enterprise

Make it so: Chinese building looks just like Star Trek's USS Enterprise



We already know history will never forget the name Enterprise, but now architecture won't either.
There's a building in China that looks almost exactly like the USS Enterprise from Star Trek.Drone footage (which we really wish was set to this music) shows how a relatively conventional-looking building from the ground dramatically transforms into a regal starship when viewed from the air.
Lest you think this is visual trickery done via Holodeck or CGI, the starship/building is clearly visible on Google Maps.
Google Maps enterprise


IMAGE: GOOGLE
Our tipster explained to us that the building is the headquarters of NetDragon Websoft, a Chinese gaming and mobile Internet company. And it's no Chinese knock-off: Company Chairman Liu DeJian is reportedly an uberTrekkie, licensing from CBS the rights to build an Enterprise replica. Construction began in 2008 and was finished in 2014; the project cost $160 million total.
The building is the only officially licensed Star Trek building on the planet
The building is the only officially licensed Star Trek building on the planet (you had your chance, Las Vegas). Besides its otherworldly shape, the building contains a replica display of a T-Rex dinosaur named Stan discovered in South Dakota in 1987, 30-foot metal slides that provide instant access to the ground floor from the third floor, and automatic sliding gates between each working area.



It's a fantastic homage to the Star Trek franchise, but which Enterprise is it? At first glance, the building looks closest to the Enterprise-E seen in the later Next Generation movies, but there are hints of the Enterprise-D and the starship design from the J.J. Abrams reboot movies.
Fans, let's settle this in the comments. Everyone else, just sit back and enjoy the ride.
Have something to add to this story? Share it in the comments.

18 Signs You're Addicted To CrossFit

18 Signs You're Addicted To CrossFit



3. You casually wear T-shirts that make outrageous claims like “I've got the best snatch in town.”




Researchers discover a 'partial workaround' for blindness

Researchers discover a 'partial workaround' for blindness



When your eyes' photoreceptors (the so-called "rods and cones") fail either due to illness or injury, so to does your vision. And until very recently, few options to correct the condition existed -- typically in the form of a bulky and intrusive wearable. But now, a long-researched gene therapy is finally ready for human trials and could pave the way for at least partial restoration of a patient's sense of sight.
The technique, which was developed by a team led by Zhuo-Hua Pan of Wayne State University in Detroit,



is part of a growing scientific field known as optogenetics. It doesn't target the dead photoreceptors themselves -- in fact, it bypasses them entirely -- instead focusing on the ganglion cells behind them. Ganglion cells carry electrical signals from the rods and cones to the optic nerve which then shuttles the information to the brain.



Researchers have found they can control the function of the ganglion cells by inserting light-sensitive molecules (derived from algae and other microorganisms) and then shining specific wavelengths of light at them. Specifically, they've inserted channelrhodopsin-2, or ChR2, into ganglion cell membranes. In the dark this protein remains closed but, when exposed to blue-wavelength light, it opens a channel through which ions can flow and triggers cells around it to do the same.


While optogenetics is technically a form of gene therapy, it functions very differently than the CRISPR/Cas9 technique that recently made headlines. Instead of knocking out a specific gene (or set of genes) to restart photoreceptor function, this technique simply converts transmitter cells into light-sensitive ones. This cleanly sidesteps the medical and ethical pitfalls of conventional gene therapy. It also could potentially be applied to the roughly 200,000 people in America alone suffering from blindness caused by any of the 250 known gene mutations. Human trials are expected to start as early as next year.
[Image Credit: Tim Flach - Getty]

Internet.org Is Not Neutral, Not Secure, and Not the Internet | Electronic Frontier Foundation

Internet.org Is Not Neutral, Not Secure, and Not the Internet | Electronic Frontier Foundation



Facebook's Internet.org project, which offers people from developing countries free mobile access to selected websites, has been pitched as a philanthropic initiative to connect two thirds of the world who don’t yet have Internet access. We completely agree that the global digital divide should be closed. However, we question whether this is the right way to do it. As we and others have noted, there's a real risk that the few websites that Facebook and its partners select for Internet.org (including, of course, Facebook itself) could end up becoming a ghetto for poor users instead of a stepping stone to the larger Internet.




Monday, May 18, 2015

The Look of Love Is in the Dog’s Eyes - NYTimes.com

The Look of Love Is in the Dog’s Eyes - NYTimes.com



Japanese researchers found that dogs who trained a long gaze on their owners had elevated levels of oxytocin, a hormone produced in the brain that is associated with nurturing and attachment, similar to the feel-good feedback that bolsters bonding between parent and child. After receiving those long gazes, the owners’ levels of oxytocin increased, too.






Greek Officials Demand Jewish Star Be Removed from Holocaust Museum | Washington Free Beacon

Greek Officials Demand Jewish Star Be Removed from Holocaust Museum | Washington Free Beacon



The ceremony was canceled at the last minute after Greek officials demanded that the Jewish Star of David “be removed before the monument can be displayed,” 




Fear The Walking Dead Eyes 6 Season Run On AMC - RenewCancelTV.com

Fear The Walking Dead Eyes 6 Season Run On AMC - RenewCancelTV.com



As for the duration of the Fear, what’s your long-term goal? 




Alan Gura | 2nd Amendment | District of Columbia

Alan Gura | 2nd Amendment | District of Columbia



As some of you may be aware, Attorney Alan Gura has been waging a legal battle against the District of Columbia (as well as other jurisdictions) based upon their unconstitutional infringement of the Second Amendment generally, and DC residents concealed carry rights in particular.

Ricoh invents super-efficient power-producing rubber

Ricoh invents super-efficient power-producing rubber



No, this is not an image of a delicious Fruit Roll-Up, it's actually a unique new flexible material from Ricoh that can create electricity from pressure and vibration. Dubbed "Energy-Generating Rubber," this piezoelectric mat combines the best features of existing ceramic and polymeric materials; high energy output and flexibility, respectively. In fact, this new rubber produces just as much power as ceramic does while surpassing the flexibility of polymeric materials, according to Ricoh. What's more, it is more easily produced than either existing form of piezoelectric.
Unfortunately, that's just about everything Ricoh has revealed about the new material so far. The company hopes to further develop the technology into a commercially viable product some point in the future. As such, it is teaming with the Tokyo University of Science to further improve the material's productive capabilities.

Bitcoin Startup 21 Unveils Product Plan: Embeddable Chips for Smartphones - Digits - WSJ

Bitcoin Startup 21 Unveils Product Plan: Embeddable Chips for Smartphones - Digits - WSJ




Historical Pics on Twitter: "I'm blown away by this photo http://t.co/w3wKUJY3K2"

Historical Pics on Twitter: "I'm blown away by this photo http://t.co/w3wKUJY3K2"

Sunday, May 17, 2015

2044 The Book on Twitter: "Today's public figures can no longer write their own speeches or books. There's some evidence they can't read them, either. Gore Vidal"

2044 The Book on Twitter: "Today's public figures can no longer write their own speeches or books. There's some evidence they can't read them, either. Gore Vidal"

City Journal on Twitter: "Disallowing federal-exchange subsidies will not create a “death spiral.” http://t.co/nj7jpDq89L #KingVsBurwell http://t.co/mASmhUSLY1"

City Journal on Twitter: "Disallowing federal-exchange subsidies will not create a “death spiral.” http://t.co/nj7jpDq89L #KingVsBurwell http://t.co/mASmhUSLY1"

AnonsGocha✝ on Twitter: "#YoProtestoPorque Venezuela está en Crisis http://t.co/ZcOXN1nYnc"

AnonsGocha✝ on Twitter: "#YoProtestoPorque Venezuela está en Crisis http://t.co/ZcOXN1nYnc"

Here’s a Post

Here’s a Post



Posted on November 11, 2014 by  - Uncategorized
computer-desktop-wallpaper-wallpapers-other-images-desktop-backgrounds1

Integer posuere erat a ante venenatis dapibus posuere velit aliquet. Praesent commodo cursus magna, vel scelerisque nisl consectetur et. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Integer posuere erat a ante venenatis dapibus posuere velit aliquet. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus.
Curabitur blandit tempus porttitor. Maecenas faucibus mollis interdum. Cras mattis consectetur purus sit amet fermentum. Cras justo odio, dapibus ac facilisis in, egestas eget quam.
Aenean eu leo quam. Pellentesque ornare sem lacinia quam venenatis vestibulum. Donec id elit non mi porta gravida at eget metus. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Cras mattis consectetur purus sit amet fermentum.

Twitter

-view CSL mobile version -



Webring Translator Thingamajig