The principle of keeping meetings small and made up of smart people is deeply woven into the religion of electronics behemoth Apple and is key to any organization that wants to nurture quality thinking. The idea is pretty basic: Everyone in the room should be there for a reason. There's no such thing as a mercy invitation. Either you're critical to the meeting or you're not. It's nothing personal, just business.




Apple co-founder, the late Steve Jobs, actively resisted any behavior he believed representative of the way big companies think -- even though Apple had been a big company for many years. When he called a meeting or reported to a meeting, his expectation was that everyone in the room would be an essential participant. Spectators were not welcome.


This was based on the somewhat obvious idea that a smaller group would be more focused and motivated than a large group, and smarter people will do higher quality work.


For a principle that would seem to be common sense, it's surprising how many organizations fail to observe it. How many overpopulated meetings do you sit through during the course of a year? How many of those meetings get sidetracked or lose focus in a way that would never occur if the group were half the size? The small-group rule requires enforcement, but it's worth the cost.











Related: Seven Ways to Kill Your Meetings and Unleash Productivity


One reason why large, unwieldy groups tend to be created in many companies is that the culture of a company is bigger than any one person. It's hard to change "the way we do things here."


What I Learned About Great Meetings from Steve Jobs
Apple keeps meetings small and focused


At Apple, because quality is stressed over quantity, meetings are informal and visible progress is made on a weekly -- if not daily -- basis.


In one large technology company with which I worked, I found a framed sign in every conference room designed to nudge the employees toward greater productivity. The headline on the sign was how to have a successful meeting. The content read like it came right out of a corporate manual, which it likely did. It featured a bullet-pointed list of things like "State the agenda at the start of your meeting," "Encourage participation by all attendees," and "Conclude your meeting with agreement on next steps."


Related: 10 Things to Thank Steve Jobs For


If big companies really feel compelled to put something on their walls, a better sign might read:


How to Have a Great Meeting


1. Throw out the least necessary person at the table.

2. Walk out of this meeting if it lasts more than 30 minutes.

3. Do something productive today to make up for the time you spent here.


Whatever your motivation, what you're really saying is that you don't have the right people on the job. So fix that. When populated by the smartest people, small groups will give management more confidence, not less.


Apple's advertising agency -- Chiat/Day, before it merged with TBWA Worldwide -- succeeded by the same philosophy. I was a creative director, and our small group matched up well with Apple's small group. Limiting the size of our group helped us produce work quickly, get information fast and have the agility to react to unexpected events.


Related: Four Tools for Improving Office Collaboration


The agency's founder, the late Jay Chiat, had set a similar tone decades earlier. Jay and Steve had a unique relationship in the days of the original Macintosh. I had the pleasure of being personally ejected from a meeting by Jay during one of my several stints at Chiat/Day. Surveying the room before the start of a meeting, Jay took one look at my art director partner and me and said, "What are you guys doing here?" "Beats me," I said. "We're just responding to the invitation." Jay told us to get out and "go create something."


The working styles of both Jay and Steve have stuck with me over the years. I can think of no better examples of leaders with a talent for keeping their teams focused on the mission and focused on producing great results. And both built spectacularly successful businesses. It's not a coincidence.


This article is an edited excerpt from Insanely Simple: The Obsession That Drives Apple's Success (Portfolio/Penguin, 2012) by Ken Segall.

 





The good news: International opportunities are growing, with the U.S. Export-Import Bank having increased small business financing by more than 70% since 2008.


But breaking into the global marketplace takes careful planning. Here is a look at three major export regions and the strategies of some U.S. entrepreneurs doing business there.


China

For Ocilla, Ga.-based Hudson Pecan Co., the need to start exporting became clear more than a decade ago. The problem was simple. "We had more pecans being produced than we consumed domestically," says Randy Hudson, president. But it wasn't until 2008, after reaching outside for financial assistance, that the company penetrated the Asian market in a substantial way. The Southern United States Trade Association, a federally funded program, offset half the cost for Hudson to travel and begin selling abroad, while the Ex-Im Bank provided a $2 million lender loan guarantee that ensured the company would be paid for goods sold oversees.


Hudson Pecan Co.'s Randy Hudson gives grandson, Nate, his first lesson on growing pecans.
Hudson Pecan Co.'s Randy Hudson gives grandson, Nate, his first lesson on growing pecans.

Photo Courtesy: Mary Jo Hudson


Today, the 10-person company generates 75% of its sales from exports to Hong Kong, its distribution point for Asia. Total sales surged from less than $1 million in 2008 to $7.5 million last year and are expected to approach $15 million this year, Hudson says.


Biggest Challenges: Contracts and standby letters of credit are standard practice in the U.S., but they aren't so common when selling commodities in China, Hudson says. And without a standby letter of credit attesting to the amount of business he had in the pipeline, Hudson couldn't obtain a loan from the Ex-Im Bank.


"It almost prohibited us from doing any business there by preventing borrowing significant amounts of money," he says. Ultimately, Hudson found a way around the problem by setting up his own intermediary company in Hong Kong. He then sold his pecans to the intermediary and used it to issue the necessary papers to secure a loan.


Hudson's advice: Because deals are sometimes based on personal honor rather than a formal contract, small businesses must be cautious. "If you are doing business with a Chinese businessman for many years, his word is as good as any contract," says Hudson. But until you develop a relationship of trust, "you have to be extremely careful." Hudson advises small-business owners to visit prospective customers in person to get to know them and require a larger initial deposit for the first few business exchanges. 


Related: How Online Retailers Can Ride the Exports Growth Wave












South America

Signature Systems Group LLC, a New York-based specialty flooring manufacturer, shows what a difference an export strategy can make. Before it started exporting to Argentina six years ago, it was generating $10 million in annual sales with a staff of 10. Today, it operates six offices, including one in northern England, and employs 50 people. About a third of its annual sales of $45 million come from exports to 45 countries.


Signature System Group's Arnon Rosan pictured with Nick Vignola, the company's director of purchasing.
Signature System Group's Arnon Rosan pictured with Nick Vignola, the company's director of purchasing.

Photo Courtesy: Martha Sullivan


The bulk of the company's export sales come from South America, where it does business in seven countries and has learned some important lessons--from overcoming cultural challenges to dealing with bureaucracy and red tape. Along the way, Signature Systems' senior vice president of sales, whose family is from Buenos Aires, has provided an insider's perspective and valuable local connections.


Biggest Challenges: Even with that inside connection, Signature Systems still had plenty of legwork to make sure it complied with local regulations for everything from fire ratings to safety standards. Adjusting to differences in negotiation styles also took time. "In South America, the best business deals are done face-to-face," says Arnon Rosan, president and CEO of Signature Systems. "More than any region, they want to … size you up in person."


Rosan also had to be mindful of potential legal trouble in some countries, such as requests from government-paid employees for a commission in exchange for more business. While questionable practices aren't rampant, he says, small business owners still should become well acquainted with the Foreign Corrupt Practices Act and understand the kinds of transactions to avoid.


Rosan's Advice: To build a reputable distributor network, Rosan suggests that small companies explore websites of similar businesses for distributor information. For example, Rosan looked for businesses distributing products for the oil and gas industry who were not only more likely to buy his oilfield rig mats, but also had already been vetted by another company. "It's a nice trick to getting an established dealer network fairly quickly," he says.


Related: Startup Initiatives Sprout from Global Entrepreneurship Week


Europe, South Africa and Mexico

Theoharris Christo (known professionally only by his last name) opened his Christo Fifth Avenue hair salon in 2002, but now does business well beyond the bustling streets of midtown Manhattan. The Cyprus native used his understanding of the Greek culture and market to start his hair-care products export business in Greece in 2006. Since then, he has expanded to South Africa, as well as Russia and Mexico, his two largest export markets. Christo's five product lines focus on curly hair and include shampoos, conditioners and styling tools.


Christo at the 2010 New York International Beauty Show.
Christo at the 2010 New York International Beauty Show.

Courtest of Shiran Nicholson Photography


Christo says his hair care and styling classes and demonstrations at international beauty shows have generated valuable word-of-mouth promotion in expanding export sales. He works only with distributors willing to export products themselves so that he doesn't have to deal with the complications of customs and shipping. "They know their people and their market better than me," he says.


Biggest Challenges: Regulations regarding product ingredients and packaging information demand close attention because they vary from country to country. For example, when Christo broke into the Russian market last summer, he had to find substitutes for prohibited ingredients and ensure that the information on the bottles satisfied the Russian Federation for Hair and Cosmetics requirements. Because developing new products to meet local requirements can be expensive, ranging from $6,000 to $20,000, Christo requires distributors to cover the cost. 


Christo's Advice: Christo advises small businesses to seek export experts for guidance. He works with both a lawyer and chemist familiar with regulations in his export markets. He also stays focused on quality, sticking to U.S.-made ingredients and resisting the temptation to buy cheaper materials from other countries. "The Europeans like American products," he says. But "they don't like mass production. They like quality." 


Related: Six Tips for Taking Your Franchise Global








Apple Stores provide three key lessons that business owners in any industry can benefit from. These lessons combine technology with the latest neuroscience research to appeal to the customer's "buying brain."


1. Create multisensory experiences. Every product in an Apple Store is working, loaded with content, and connected to the Internet. Customers are encouraged to touch and play with the products. More than anything -- more than the patented spiral staircase or the iconic glass entrance -- these multisensory experiences are the key to what drives the Apple Store experience. By encouraging customers to experience its products, the Apple Store is satisfying a deep subconscious need.


Companies across all categories can increase purchase intent by creating a multisensory context for the shopping experience, says A.K Pradeep who founded Berkeley, Calif.-based NeuroFocus, a neurological testing firm for consumer behavior.

The more you engage the senses, the more likely it is that the brain engages with the product or service on an emotional level. This stimulates information retention and the willingness to buy.











Related: 10 Ways to Green Your Retail Store


2. Educate and entertain. The Apple Store is educational and entertaining. That's the way Steve Jobs wanted it. Jobs and Ron Johnson, the former head of Apple Retail, started with the vision of "enriching lives."


Their vision led to the creation of a unique program to help people understand and enjoy their computers: One to One. The $99 one-year membership program is available with the purchase of a Mac. Apple Store instructors, who are called "creatives," offer personalized instruction at the stores. Customers can learn just about anything, from the basics about the Mac operating system to website design.


The One to One program was created to help build customers for life. It was designed on the premise that the more you understand a product, the more you enjoy it and the more likely you are to build a long-term relationship with the company. Instructors are trained not only to provide instruction, but also to inspire customers by giving them the tools to become more creative than they ever imagined. If your company can inspire customers to feel better about themselves and their abilities--and to discover abilities they didn't even know they had--they are going to be loyal to your brand and evangelize your products.


Related: Lighting Up Your Store -- and Your Sales


The Apple Store is fun, too. You might see parents and children learning to create songs together or kids playing games on iMacs in the store's "family room." Pradeep believes the buying brain is engaged through a combination of touch, education and entertainment. "Superior shopping experiences are those that enable consumers to walk away not only having absorbed a lot of information, but having extracted insight that becomes part of an education experience," Pradeep says. "A huge benefit of modern life is also the luxury of being entertained while we shop. This is such a compelling feature of the experience that we seek it out whenever we can. The combination of shopping [which the brain more or less equates with hunting and gathering] and entertainment is enormously powerful." This powerful combination is one that any entrepreneur can replicate with his own customers.


3. Mix high-tech with high-touch. Apple Store employees "showcase the technology." Walk into one of the stores and a friendly employee will check you in with an iPad. The notebook computers are positioned at 90-degree angles, forcing you to touch them to adjust the viewing angle. If you want to learn more about a computer, you will find an iPad nearby containing detailed specs. When it's time to pay for a product, a sales associate will swipe your credit card with a device attached to an iPod Touch. And the Apple Store is experimenting with a new service called Easy Pay that allows customers to use the Apple Store app on their iPhones to pay for purchases and leave the store without speaking to anyone. Easy Pay is designed for customers who want to get in and out in a hurry, but it also creates a deeper connection between customers and Apple's technology and products. Any entrepreneur can create a similar stage to showcase a product or services's best features and help customers appreciate and connect with it.


Apple has turned the boring sales floor into a playground for kids and adults. Jobs and Johnson didn't just "reimagine" the retail experience, they blew it up and started from scratch. Ask yourself how you can shake up the customer experience in your own business to surprise and delight your own customers. Showcase your products, educate and entertain your customers, and outsmart your competitors. If you do, customers will take notice, and the shine of Apple will rub off on your company.


Related: Six Design Mistakes to Avoid in Your Store

 



Whether you’re a brick and mortar or you’re strictly an online shop, you need a we site. And while many small business owners are starting to come to terms with this, I can’t tell you how many SMBs I’ve spoken to who have spent considerable amount of money (often five figures) on a website that simply “didn’t work.” Either it didn’t do a good job selling, wasn’t spiderable (please don’t build your whole site in Flash) or simply didn’t address any of the things important to wary customers.


Don’t let this happen to you.  Make sure your site will give customers the information they need before you invest in a flashy (no pun intended) design.


Below are six things your website should absolutely have. Are you covering all your bases?



1. Intuitive Navigation


A user landing on your website should not have to spend time deciphering how to work their way around. Instead, it should be intuitive. Don’t put your navigation on the right-hand side, don’t make it all Flash, don’t hide the search box, and don’t make the links so tiny a potential customer would need the physical dexterity of a neurosurgeon to click the right link. Make it simple. Something else to consider: Call things what they are instead of trying to be clever. The place where items go once a user attempts to buy them is a Shopping Cart. Call it a “product receptacle” and they’re not going to have any idea where that link goes. And then they may run away scared.


2. Sticky Content


What separates your site  from everyone else trying to be you is the strength of your content. For that reason, it’s really important that you highlight some of the “sticky” content you have on your site, preferably directly from your home page. What type of content qualifies as “sticky”? Maybe it’s that e-book you created, a business checklist you allow users to download, or the most recent article from your blog. You want to have something that will attract a potential customer and lure them further into your site. If your website is a blog, then consider using something like WP-Sticky to bring attention to the posts or articles you most want to highlight and the ones you think visitors should read first to understand your brand promise or what you’re about. Bringing attention to your best content brings attention to the best parts of your brand. Show it off a little.


3. A Blog


This probably isn’t too surprising, but I’m a really big believer in small business blogs. As an SMB, there is no better way to establish a point of difference, become known for thought leadership or consistently attract links and attention than by putting a blog on your site and using it to share information and/or start conversations. You don’t necessarily have to update it every day, but get yourself on a schedule for sharing quality content with your audience.  Your blog is your company voice and what gives your company a personality.


4. Your Address, Phone Number & Contact Information


One of the most powerful ways for a small business owner to establish credibility is to include a local address, phone number, and a few ways for customers to get in touch with them (e-mail address, Twitter, Facebook page, etc.). By highlighting this information, you show people that you’re real and that you’ll be easy to get ahold of should they have a question or a concern. This information is also super important from a search engine optimization standpoint because it gives the search engines important cues about where your business is located and what areas or neighborhoods you’re relevant to. Make sure this information is highly visible on your website.





Who do you think your products or services appeal to?


identification


If your answer is “everyone” keep reading. Businesses with too large a target market (i.e. every household in America) struggle to get any customers at all, and here’s why: not understanding who your customer really is keeps you from being able to better serve that customer.


Paint a Picture


If you’ve never completed an exercise on identifying your ideal customer, I encourage you to do one now. Grab a notebook or start typing. Answer the questions fully, and get creative if you’re not sure of the answers. The goal is to paint a picture of who your ideal customer is. You’ll likely have other types of customers, but focus on the ones that you enjoy serving, and who you want more of:



  • Who is my ideal customer in terms of age, gender, education, location?

  • What other sorts of products do they buy that relate to mine?

  • If you’re B2B, what role does your customer have in their company?

  • Where do they get their information about brands? Online? Print? Television? Friends?

  • How did they find your company?

  • What’s important to them?

  • What do they think of the value of your product?


Next, take a tip from Ivana Taylor of DIY Marketers, who suggests modeling your ideal client profile on an actual client. Consider what makes this customer perfect in your mind. You can physically draw a person or cut images and words from a magazine to visually define this person. When you’re done, your profile may be similar to this example:


“My ideal client is a male small business owner. His budget is small, but not tiny, and he understands the value of marketing, though he may not have the skills or time to work on it himself. He also invests in an accountant, as well as web-based sales software. He reads small business blogs (which is how he found my company). He values customer relationships and trust over just getting more web traffic. He finds my prices a little high, but knows that the investment is worthwhile.”


Shedding the Rest


The purpose of this exercise is to ensure that all your marketing, web copy and messaging targets this specific type of customer. Again, if your branding is too generic, and you’re trying to be all things to all people, you’ll fail. Zero in on writing your messaging directly to this ideal customer, and you’ll find that you instantly attract more of them.


The secondary purpose of the exercise is to get rid of the client types you don’t want. You know the ones – you lose money working with them simply because they take up a lot of your time. Or they try to nickel and dime you on projects. These customers aren’t worth your time, and by better targeting your messaging, you’ll send subtle signals that send them the other way.


By properly identifying who your ideal customer is, you set your company on the right track to getting more (and better) business.




China vowed on Thursday to double its trade with Central and Eastern European countries to US$100 billion by 2015, as Premier Wen Jiabao reassured leaders in the region that Beijing would deepen relations with these countries "with the greatest sincerity".

Polish officials, experts and investors welcomed Beijing's commitments, saying Poland will serve as an ideal gateway between China and the rest of Europe to boost trade and investment and help stabilize the European and global economy.

Beijing will offer $10 billion in loans to support partner projects in infrastructure, high-tech and the green economy for countries in the region, Wen said at the second annual China-Central and Eastern European Countries Economic Forum.

Last year's forum in Budapest, which Wen also attended and addressed, was a meeting of economic ministers. The summit this year, meanwhile, has drawn heads of government from 14 of the 16 nations in the region — including Croatia, Lithuania, Macedonia and Estonia — at the invitation of Poland.

In a time of considerable uncertainty in the global economy, cooperation suits the fundamental interests of both China and countries in the region, Wen said.

Beijing is willing to import more from the area and offer assistance to its companies coming to China for exhibitions and trade fairs, he said.

In terms of infrastructure development, Wen proposed to set up an expert committee on the construction of traffic networks to discuss joint venture possibilities in the region's highway and railway projects.

Marek Szostak, an official with the Polish Information and Foreign Investment Agency, said China has shown interest in infrastructure and renewable projects in Poland, but there is also huge potential in other sectors.

"I think China can also invest in our strategic sectors such as automobiles, electronics, aviation, modern services ... We have open-door policies to attract capital, whether it's from the West or East,"Szostak told China Daily.

He also said the two countries should accelerate the exchange of students and attract tourists from each other. "This will deepen mutual understanding and in turn boost economic and trade cooperation,"said Szostak.

Chinese investment in Poland is still at a low level: Only about 150 Chinese companies have invested in Poland so far with the contract capital of about $300 million.

Poland has access to seaports, cheap labor and free access to Europe, said Dominik Konieczny, an expert with the Poland-Asia Research Center. "I think all these advantages can help China expand investment in Poland,"Konieczny said.

Cooperation measures indicate that China has attached more importance to ties with countries from Central and Eastern Europe and tried to balance its relations with all EU members, said Zhao Junjie, an expert on European studies with the Chinese Academy of Social Sciences.

He said the cooperation between China and Central and Eastern Europe had not been as strong as China's partnerships with Western Europe, so there is great potential.

Central and Eastern European countries need a new, dependable and competitive partner to help improve their development, because it has become more difficult for them to get support from Western Europe due to the financial crisis, Zhao said.

The pragmatic cooperation between China and Central and Eastern European countries will bring practical benefits to both and promote mutual trust and relations, said Cui Hongjian, an expert on European studies with the China Institute of International Studies.

Thursday's forum was attended by a delegation of 300 Chinese enterprises.

The economic forum and leaders' summit between China and the region should be held regularly, said Wen, who met separately with 13 prime ministers and Bosnia and Herzegovina's head of government, the chairman of its Council of Ministers, on Thursday. He met his Polish counterpart Donald Tusk and President Bronislaw Komorowski a day earlier.

The heads of government of China and Poland, strategic partners since last year, will meet every two years from now on, Tusk said on Wednesday, while stressing that China's cooperation with Poland and Central and Eastern European countries in general "has never been better".

"We're now at a historical moment,"Tusk said. The prospects for Polish-Chinese cooperation on new energy, particularly on shale gas, of which Warsaw holds considerable reserves, are enormous, he said.

Wen, the first Chinese premier to visit Poland in 25 years, endorsed the idea and said bilateral cooperation also ought to deepen in infrastructure, high-tech, finances, tourism and education.

"Although phenomenal changes have taken place in both the world and in our two countries, both sides have always understood and supported each other on respective issues of sovereignty and territorial integrity," Wen said.

Poland is the last leg of Wen's four-nation tour to Europe. Wen will visit Poland's Krakow on Friday before heading back to Beijing.


Since John Maynard Keynes rescued a collection of Newton's private papers and declared that "Newton was not the first of the age of reason. He was the last of the magicians" the popular imagination has looked at the influence of esoteric arts on the emergence of Western' science. What is often forgotten is that in almost the same breath, Keynes declared Newton as "one of the greatest and most efficient of our civil servants", in recognition of his work as Master and Warden of the Mint, positions that he held longer than his Chair at Cambridge.

The significance of the relationship between mathematics and finance is often overlooked when considering the development of science. Probability is, to both Poincare and Russell, the foundation of all science, emerged out of the analysis of financial contracts and Bernoulli first identified the number e in the context of interest payments. On a more profound level, historians such as Richard Hadden, Joel Kaye and Alfred Crosby have provided compelling arguments that the uniquely European 'mathematisation' of science came out of a synthesis of commercial practice, following Fibonacci, and scholastic analysis. Copernicus wrote on money before he wrote on planets.

While equity options trading dominated the 1980s, today, the Black-Scholes-Merton pricing formula is used more as a gauge of market volatility than to price traded contracts and the problems of finance have moved on to managing the complex interactions of many agents in the economy. It is in recognition of this evolution that the financial world has changed, not just in the last four years but over the past 25 years, that the Institute of Mathematics and its Applications (the British equivalent of SIAM) is sponsoring its first conference on mathematics in finance, to take place in Edinburgh in 2013.

Algorithmic trading is currently the focus of financial innovation. Investors, such as pension funds, will use algorithms implemented on electronic trading systems to , hopefully, optimise their market transactions. Market makers, and speculators, will use algorithms to search the markets for profit opportunities, often executing transactions in milliseconds in high frequency trading. Algorithmic trading is typically light on mathematics, using simple trend following or mean reverting criteria, and relies more on computational developments.

Since the recent Financial Crises society has realised that financial innovation, like any technological development, is not always a good thing. The Quant and Mammon report of 1998 called for academics to support banks in innovation, today the emphasis has shifted and the consensus is that academics should be trying to understand the financial system and support society's eyes and ears, the Regulators, as much as the Banks. In response to this, the IMA have invited the Bank of England to help organise the conference and provide guidance on what the Regulators' key concerns are.

The Bank of England believes that recent developments in financial mathematics have focused on microeconomic issues, such as pricing derivatives. Their concern is whether there is the mathematics to support macroeconomic risk analysis, how the whole system works. While probability theory has an important role to play in addressing these questions, other mathematical disciplines, not usually associated with finance, could prove useful. For example, the Bank's interest in complexity in networks and dynamical systems has been well documented.

The initial outline of the conference is that it will have three parallel sessions, covering developments in algorithmic trading, the concerns of the Bank of England and contemporary issues in mainstream financial mathematics. For example, in the algorithmic trading stream topics could include data mining, pre-trade analysis, risk management and agent based modelling. As well as the Bank of England’s interest in models of market failure and systemic risk, more esoteric topics such as non-ergodic dynamical systems and models of learning in markets would be interesting. Topics associated with mainstream financial mathematics could include control in the presence of liquidity constraints, Knightian uncertainty and behavioural issues and credit modelling.


In addition to the main mathematics Conference organised by the IMA, the Scottish Financial Risk Academy is planning to organise an "Industry Day" at the end of the Conference.

Applied mathematics is developed as a consequence of solving problems. While it is easy to criticise the world's bankers, it is harder to come up with solutions to the complex issues they face. It is always worth remembering that the laws of physics (almost surely) do not change, but finance is constantly transforming itself. Ever since the time that Newton left Cambridge for the City, the UK has built its prosperity on financial innovation, funding the wars with France and the Industrial and Agricultural Revolutions. today financial services account for some 10% of the UK's GDP and it is only fitting that applied mathematicians consider whether they can provide solutions to the difficult problems the sector faces.

The IMA Conference on Mathematics in Finance, scheduled for early April 2013, aims to provide a forum for mathematicians to become more involved in the industry and for industry to become more involved in mathematics, and we would invite any mathematician, academic or practitioner, to attend.


If you would like to register your interest in attending the conference, please contact the IMA.

span class=


Can you just imagine the absolute horror of transparency with elected officials having to disclose their donations to keep special interests out of the political process? Egads man! That’s just un-American. Or so says Fox News. Amending the Constitution is just not done – except for all the times it was — except for all the times Republicans want/wanted to amend the Constitution — a few examples; to repeal the 17th Amendment, Repealing the 14th Amendment, which grants citizenship to anyone born in the United States, South Carolina Sen. Jim DeMint and Michigan Rep. Pete Hoekstra have introduced a “Parental Rights Amendment” designed to stem the gathering threat of the government raising children and they’ve considered just rewriting the gosh darned Constitution to rid America of Roe vs. Wade.

Here’s my favorite:

Minnesota Rep. Michele Bachmann is sponsoring an amendment that would restrict the president’s power to negotiate treaties. She’s apparently worried that the president will try to replace the U.S. dollar with a foreign currency. Seriously.

But, now they’re horrified.


After taking the high road by insulting Nancy Pelosi’s dress, the host and guests delved into the sheer audacity of Pelosi for calling out Republicans after refusing to hold a hearing on the DISCLOSE Act, the campaign finance reform bill.

Balderdash! We can’t fix this broken system, so let’s fuck it up more – right Fox? That would just leave ‘we the people’ to actually vote.

The Occupy Amendment introduced by Rep. Ted Deutch and Senator Bernie Sanders is on the table. One of the motivating forces behind the influx of supporters, was the Occupy movement which raged against money being funneled into politics, thus negating their voice and vote. If the Amendment passes, the Supreme Court’s “Citizens United” decision could be overturned.

Big thanks to Media Matters.


ShareThis

Posted in Politics, right wing media.

Tagged with Amend, Citizens United, fox news, Move to Amend.

26 comments

By Anomaly – April 21, 2012


WASHINGTON - The college class of 2012 is in for a rude welcome to the world of work.

A weak labor market already has left half of young college graduates either jobless or underemployed in positions that don't fully use their skills and knowledge.

Young adults with bachelor's degrees are increasingly scraping by in lower-wage jobs — waiter or waitress, bartender, retail clerk or receptionist, for example — and that's confounding their hopes a degree would pay off despite higher tuition and mounting student loans.

An analysis of government data conducted for The Associated Press lays bare the highly uneven prospects for holders of bachelor's degrees.

Opportunities for college graduates vary widely.

While there's strong demand in science, education and health fields, arts and humanities flounder. Median wages for those with bachelor's degrees are down from 2000, hit by technological changes that are eliminating midlevel jobs such as bank tellers. Most future job openings are projected to be in lower-skilled positions such as home health aides, who can provide personalized attention as the U.S. population ages.

Taking underemployment into consideration, the job prospects for bachelor's degree holders fell last year to the lowest level in more than a decade.

"I don't even know what I'm looking for," says Michael Bledsoe, who described months of fruitless job searches as he served customers at a Seattle coffeehouse. The 23-year-old graduated in 2010 with a creative writing degree.

Initially hopeful that his college education would create opportunities, Bledsoe languished for three months before finally taking a job as a barista, a position he has held for the last two years. In the beginning he sent three or four resumes day. But, Bledsoe said, employers questioned his lack of experience or the practical worth of his major. Now he sends a resume once every two weeks or so.

Bledsoe, currently making just above minimum wage, says he got financial help from his parents to help pay off student loans. He is now mulling whether to go to graduate school, seeing few other options to advance his career. "There is not much out there, it seems," he said.

His situation highlights a widening but little-discussed labor problem. Perhaps more than ever, the choices that young adults make earlier in life — level of schooling, academic field and training, where to attend college, how to pay for it — are having long-lasting financial impact.

"You can make more money on average if you go to college, but it's not true for everybody," says Harvard economist Richard Freeman, noting the growing risk of a debt bubble with total U.S. student loan debt surpassing $1 trillion. "If you're not sure what you're going to be doing, it probably bodes well to take some job, if you can get one, and get a sense first of what you want from college."

Andrew Sum, director of the Center for Labor Market Studies at Northeastern University who analyzed the numbers, said many people with a bachelor's degree face a double whammy of rising tuition and poor job outcomes. "Simply put, we're failing kids coming out of college," he said, emphasizing that when it comes to jobs, a college major can make all the difference. "We're going to need a lot better job growth and connections to the labor market, otherwise college debt will grow."

By region, the Mountain West was most likely to have young college graduates jobless or underemployed — roughly 3 in 5. It was followed by the more rural southeastern U.S., including Alabama, Kentucky, Mississippi and Tennessee. The Pacific region, including Alaska, California, Hawaii, Oregon and Washington, also was high on the list.

On the other end of the scale, the southern U.S., anchored by Texas, was most likely to have young college graduates in higher-skill jobs.

The figures are based on an analysis of 2011 Current Population Survey data by Northeastern University researchers and supplemented with material from Paul Harrington, an economist at Drexel University, and the Economic Policy Institute, a Washington think tank. They rely on Labor Department assessments of the level of education required to do the job in 900-plus U.S. occupations, which were used to calculate the shares of young adults with bachelor's degrees who were "underemployed."

About 1.5 million, or 53.6 percent, of bachelor's degree-holders under the age of 25 last year were jobless or underemployed, the highest share in at least 11 years. In 2000, the share was at a low of 41 percent, before the dot-com bust erased job gains for college graduates in the telecommunications and IT fields.

Out of the 1.5 million who languished in the job market, about half were underemployed, an increase from the previous year.

Broken down by occupation, young college graduates were heavily represented in jobs that require a high school diploma or less.

In the last year, they were more likely to be employed as waiters, waitresses, bartenders and food-service helpers than as engineers, physicists, chemists and mathematicians combined (100,000 versus 90,000). There were more working in office-related jobs such as receptionist or payroll clerk than in all computer professional jobs (163,000 versus 100,000). More also were employed as cashiers, retail clerks and customer representatives than engineers (125,000 versus 80,000).

According to government projections released last month, only three of the 30 occupations with the largest projected number of job openings by 2020 will require a bachelor's degree or higher to fill the position — teachers, college professors and accountants. Most job openings are in professions such as retail sales, fast food and truck driving, jobs which aren't easily replaced by computers.

College graduates who majored in zoology, anthropology, philosophy, art history and humanities were among the least likely to find jobs appropriate to their education level; those with nursing, teaching, accounting or computer science degrees were among the most likely.

In Nevada, where unemployment is the highest in the nation, Class of 2012 college seniors recently expressed feelings ranging from anxiety and fear to cautious optimism about what lies ahead.

With the state's economy languishing in an extended housing bust, a lot of young graduates have shown up at job placement centers in tears. Many have been squeezed out of jobs by more experienced workers, job counselors said, and are now having to explain to prospective employers the time gaps in their resumes.

"It's kind of scary," said Cameron Bawden, 22, who is graduating from the University of Nevada-Las Vegas in December with a business degree. His family has warned him for years about the job market, so he has been building his resume by working part time on the Las Vegas Strip as a food runner and doing a marketing internship with a local airline.

Bawden said his friends who have graduated are either unemployed or working along the Vegas Strip in service jobs that don't require degrees. "There are so few jobs and it's a small city," he said. "It's all about who you know."

Any job gains are going mostly to workers at the top and bottom of the wage scale, at the expense of middle-income jobs commonly held by bachelor's degree holders. By some studies, up to 95 percent of positions lost during the economic recovery occurred in middle-income occupations such as bank tellers, the type of job not expected to return in a more high-tech age.

David Neumark, an economist at the University of California-Irvine, said a bachelor's degree can have benefits that aren't fully reflected in the government's labor data. He said even for lower-skilled jobs such as waitress or cashier, employers tend to value bachelor's degree-holders more highly than high-school graduates, paying them more for the same work and offering promotions.

In addition, U.S. workers increasingly may need to consider their position in a global economy, where they must compete with educated foreign-born residents for jobs. Longer-term government projections also may fail to consider "degree inflation," a growing ubiquity of bachelor's degrees that could make them more commonplace in lower-wage jobs but inadequate for higher-wage ones.

That future may be now for Kelman Edwards Jr., 24, of Murfreesboro, Tenn., who is waiting to see the returns on his college education.

After earning a biology degree last May, the only job he could find was as a construction worker for five months before he quit to focus on finding a job in his academic field. He applied for positions in laboratories but was told they were looking for people with specialized certifications.

"I thought that me having a biology degree was a gold ticket for me getting into places, but every other job wants you to have previous history in the field," he said. Edwards, who has about $5,500 in student debt, recently met with a career counselor at Middle Tennessee State University. The counselor's main advice: Pursue further education.

"Everyone is always telling you, 'Go to college,'" Edwards said. "But when you graduate, it's kind of an empty cliff."

___

Associated Press writers Manuel Valdes in Seattle; Travis Loller in Nashville, Tenn.; Cristina Silva in Las Vegas; and Sandra Chereb in Carson City, Nev., contributed to this report.
Copyright 2012 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed



Glossary

The terms presented in this glossary are taken from DigitalGuards' terminology database. I am grateful for Gregory L. Stockdale's permission to reproduce them here. You can find the most recently updated version of the terminology database at http://www.digitalguards.com/Glossary.htm. You will also find databases of network security tools and other information at the DigitalGuards web site.

Active Attack

An attack which results in an unauthorized state change, such as the manipulation of files, or the adding of unauthorized files.

Administrative Security

The management constraints and supplemental controls established to provide an acceptable level of protection for data.

AIS

Automated Information System - any equipment of an interconnected system or subsystems of equipment that is used in the automatic acquisition, storage, manipulation, control, display, transmission, or reception of data and includes software, firmware, and hardware.

Alert

A formatted message describing a circumstance relevant to network security. Alerts are often derived from critical audit events.

Ankle-Biter

A person who aspires to be a hacker/cracker but has very limited knowledge or skills related to AIS's. Usually associated with young teens who collect and use simple malicious programs obtained from the Internet.

Application Level Gateway

(Firewall) A firewall system in which service is provided by processes that maintain complete TCP connection state and sequencing. Application level firewalls often re-address traffic so that outgoing traffic appears to have originated from the firewall, rather than the internal host.

Assessment

Surveys and Inspections; an analysis of the vulnerabilities of an AIS. Information acquisition and review process designed to assist a customer to determine how best to use resources to protect information in systems.

Assurance

A measure of confidence that the security features and architecture of an AIS accurately mediate and enforce the security policy.

Attack

An attempt to bypass security controls on a computer. The attack may alter, release, or deny data. Whether an attack will succeed depends on the vulnerability of the computer system and the effectiveness of existing countermeasures.

Audit

The independent examination of records and activities to ensure compliance with established controls, policy, and operational procedures, and to recommend any indicated changes in controls, policy, or procedures.

Audit Trail

In computer security systems, a chronological record of system resource usage. This includes user login, file access, other various activities, and whether any actual or attempted security violations occurred, legitimate and unauthorized.

Authenticate

To establish the validity of a claimed user or object.

Authentication

To positively verify the identity of a user, device, or other entity in a computer system, often as a prerequisite to allowing access to resources in a system.

Automated Security Monitoring

All security features needed to provide an acceptable level of protection for hardware, software, and classified, sensitive, unclassified or critical data, material, or processes in the system.

Availability

Assuring information and communications services will be ready for use when expected.

Back Door

A hole in the security of a computer system deliberately left in place by designers or maintainers. Synonymous with trap door; a hidden software or hardware mechanism used to circumvent security controls.

Breach

The successful defeat of security controls which could result in a penetration of the system. A violation of controls of a particular information system such that information assets or system components are unduly exposed.

Buffer Overflow

This happens when more data is put into a buffer or holding area, then the buffer can handle. This is due to a mismatch in processing rates between the producing and consuming processes. This can result in system crashes or the creation of a back door leading to system access.

Bug

An unwanted and unintended property of a program or piece of hardware, especially one that causes it to malfunction.

CGI

Common Gateway Interface - CGI is the method that Web servers use to allow interaction between servers and programs.

CGI Scripts

Allows for the creation of dynamic and interactive web pages. They also tend to be the most vulnerable part of a web server (besides the underlying host security).

Circuit Level Gateway

One form of a firewall. Validates TCP and UDP sessions before opening a connection. Creates a handshake, and once that takes place passes everything through until the session is ended.

COAST

Computer Operations, Audit, and Security Technology - is a multiple project, multiple investigator laboratory in computer security research in the Computer Sciences Department at Purdue University. It functions with close ties to researchers and engineers in major companies and government agencies. Its research is focused on real-world needs and limitations, with a special focus on security for legacy computing systems.

Compromise

An intrusion into a computer system where unauthorized disclosure, modification or destruction of sensitive information may have occurred.

Computer Abuse

The willful or negligent unauthorized activity that affects the availability, confidentiality, or integrity of computer resources. Computer abuse includes fraud, embezzlement, theft, malicious damage, unauthorized use, denial of service, and misappropriation.

Computer Fraud

Computer-related crimes involving deliberate misrepresentation or alteration of data in order to obtain something of value.

Computer Network Attack

(CAN) Operations to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. (DODD S-3600.1 of 9 Dec 96)

Computer Security

Technological and managerial procedures applied to computer systems to ensure the availability, integrity and confidentiality of information managed by the computer system.

Computer Security Incident

Any intrusion or attempted intrusion into an automated information system (AIS). Incidents can include probes of multiple computer systems.

Computer Security Intrusion

Any event of unauthorized access or penetration to an automated information system (AIS).

Confidentiality

Assuring information will be kept secret, with access limited to appropriate persons.

Countermeasures

Action, device, procedure, technique, or other measure that reduces the vulnerability of an automated information system. Countermeasures that are aimed at specific threats and vulnerabilities involve more sophisticated techniques as well as activities traditionally perceived as security.

Crack

A popular hacking tool used to decode encrypted passwords. System administrators also use Crack to assess weak passwords by novice users in order to enhance the security of the AIS.

Cracker

One who breaks security on an AIS.

Cracking

The act of breaking into a computer system.

Crash

A sudden, usually drastic failure of a computer system.

Cryptography

The art of science concerning the principles, means, and methods for rendering plain text unintelligible and for converting encrypted messages into intelligible form.

Cyberspace

Describes the world of connected computers and the society that gathers around them. Commonly known as the INTERNET.

Dark-side Hacker

A criminal or malicious hacker.

DARPA

Defense Advanced Research Projects Agency.

Data Driven Attack

A form of attack that is encoded in innocuous seeming data which is executed by a user or a process to implement an attack. A data driven attack is a concern for firewalls, since it may get through the firewall in data form and launch an attack against a system behind the firewall.

Data Encryption Standard

Definition 1) (DES) An unclassified crypto algorithm adopted by the National Bureau of Standards for public use. Definition 2) A cryptographic algorithm for the protection of unclassified data, published in Federal Information Processing Standard (FIPS) 46. The DES, which was approved by the National Institute of Standards and Technology (NIST), is intended for public and government use.

Demon Dialer

A program which repeatedly calls the same telephone number. This is benign and legitimate for access to a BBS or malicious when used as a denial of service attack.

Denial of Service

Action(s) which prevent any part of an AIS from functioning in accordance with its intended purpose.

Derf

The act of exploiting a terminal which someone else has absent-mindedly left logged on.

DES

See Data Encryption Standard

DMZ

Demilitarized Zone - A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.

DNS Spoofing

Assuming the DNS name of another system by either corrupting the name service cache of a victim system, or by compromising a domain name server for a valid domain.

Encapsulating Security Payload

(ESP) A mechanism to provide confidentiality and integrity protection to IP datagrams.

Ethernet Sniffing

This is listening with software to the Ethernet interface for packets that interest the user. When the software sees a packet that fits certain criteria, it logs it to a file. The most common criteria for an interesting packet is one that contains words like login or password.

False Negative

Occurs when an actual intrusive action has occurred but the system allows it to pass as non-intrusive behavior.

False Positive

Occurs when the system classifies an action as anomalous (a possible intrusion) when it is a legitimate action.

Fault Tolerance

The ability of a system or component to continue normal operation despite the presence of hardware or software faults.

Firewall

A system or combination of systems that enforces a boundary between two or more networks. Gateway that limits access between networks in accordance with local security policy. The typical firewall is an inexpensive micro-based Unix box kept clean of critical data, with many modems and public network ports on it, but just one carefully watched connection back to the rest of the cluster.

Fishbowl

To contain, isolate and monitor an unauthorized user within a system in order to gain information about the user.

Hacker

A person who enjoys exploring the details of computers and how to stretch their capabilities. A malicious or inquisitive meddler who tries to discover information by poking around. A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn on the minimum necessary.

Hacking

Unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network.

Hacking Run

A hack session extended long outside normal working times, especially one longer than 12 hours.

Host

A single computer or workstation; it can be connected to a network.

Host Based

Information, such as audit data from a single host which may be used to detect intrusions.

IDEA

(International Data Encryption Algorithm) - A private key encryption-decryption algorithm that uses a key that is twice the length of a DES key.

IDIOT

Intrusion Detection In Our Time. A system that detects intrusions using pattern-matching.

Integrity

Assuring information will not be accidentally or maliciously altered or destroyed.

Internet Worm

A worm program (see: Worm) that was unleashed on the Internet in 1988. It was written by Robert T. Morris as an experiment that got out of hand.

Intrusion

Any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource.

Intrusion Detection

Pertaining to techniques which attempt to detect intrusion into a computer or network by observation of actions, security logs, or audit data. Detection of break-ins or attempts either manually or via software expert systems that operate on logs or other information available on the network.

IP Splicing / Hijacking

An action whereby an active, established, session is intercepted and co-opted by the unauthorized user. IP splicing attacks may occur after an authentication has been made, permitting the attacker to assume the role of an already authorized user. Primary protections against IP splicing rely on encryption at the session or network layer.

IP Spoofing

An attack whereby a system attempts to illicitly impersonate another system by using IP network address.

Key

A symbol or sequence of symbols (or electrical or mechanical correlates of symbols) applied to text in order to encrypt or decrypt.

Key Escrow

The system of giving a piece of a key to each of a certain number of trustees such that the key can be recovered with the collaboration of all the trustees.

Keystroke Monitoring

A specialized form of audit trail software, or a specially designed device, that records every key struck by a user and every character of the response that the AIS returns to the user.

LAN

Local Area Network - A computer communications system limited to no more than a few miles and using high-speed connections (2 to 100 megabits per second). A short-haul communications system that connects ADP devices in a building or group of buildings within a few square kilometers, including workstations, front-end processors, controllers, switches, and gateways.

Leapfrog Attack

Use of userid and password information obtained illicitly from one host to compromise another host. The act of TELNETing through one or more hosts in order to preclude a trace (a standard cracker procedure).

Letterbomb

A piece of e-mail containing live data intended to do malicious things to the recipient's machine or terminal. Under UNIX, a letterbomb can also try to get part of its contents interpreted as a shell command to the mailer. The results of this could range from silly to denial of service.

Mailbomb

The mail sent to urge others to send massive amounts of e-mail to a single system or person, with the intent to crash the recipient's system. Mailbombing is widely regarded as a serious offense.

Malicious Code

Hardware, software, of firmware that is intentionally included in a system for an unauthorized purpose; e.g. a Trojan horse.

Metric

A random variable x representing a quantitative measure accumulated over a period.

Mockingbird

A computer program or process which mimics the legitimate behavior of a normal system feature (or other apparently useful function) but performs malicious activities once invoked by the user.

Multihost Based Auditing

Audit data from multiple hosts may be used to detect intrusions.

Nak Attack

Negative Acknowledgment - A penetration technique which capitalizes on a potential weakness in an operating system that does not handle asynchronous interrupts properly and thus, leaves the system in an unprotected state during such interrupts.

Network

Two or more machines interconnected for communications.

Network Based

Network traffic data along with audit data from the hosts used to detect intrusions.

Network Level Firewall

A firewall in which traffic is examined at the network protocol (IP) packet level.

Network Security

Protection of networks and their services from unauthorized modification, destruction, or disclosure, and provision of assurance that the network performs its critical functions correctly and there are no harmful side-effects. Network security includes providing for data integrity.

Network Security Officer

Individual formally appointed by a designated approving authority to ensure that the provisions of all applicable directives are implemented throughout the life cycle of an automated information system network.

Non-Repudiation

Method by which the sender of data is provided with proof of delivery and the recipient is assured of the sender's identity, so that neither can later deny having processed the data.

Open Security

Environment that does not provide environment sufficient assurance that applications and equipment are protected against the introduction of malicious logic prior to or during the operation of a system.

Open Systems Security

Provision of tools for the secure internetworking of open systems.

Operational Data Security

The protection of data from either accidental or unauthorized, intentional modification, destruction, or disclosure during input, processing, or output operations.

Operations Security

Definition 1) The process of denying adversaries information about friendly capabilities and intentions by identifying, controlling, and protecting indicators associated with planning and conducting military operations and other activities. Definition 2) An analytical process by with the U.S. Government and its supporting contractors can deny to potential adversaries information about capabilities and intentions by identifying, controlling, and protecting evidence of the planning and execution of sensitive activities and operations.

Orange Book

See Trusted Computer Security Evaluation Criteria.

OSI

Open Systems Interconnection. A set of internationally accepted and openly developed standards that meet the needs of network resource administration and integrated network utility.

Packet

A block of data sent over the network transmitting the identities of the sending and receiving stations, error-control information, and message.

Packet Filter

Inspects each packet for user defined content, such as an IP address but does not track the state of sessions. This is one of the least secure types of firewall.

Packet Filtering

A feature incorporated into routers and bridges to limit the flow of information based on predetermined communications such as source, destination, or type of service being provided by the network. Packet filters let the administrator limit protocol specific traffic to one network segment, isolate e-mail domains, and perform many other traffic control functions.

Packet Sniffer

A device or program that monitors the data traveling between computers on a network.

Passive Attack

Attack which does not result in an unauthorized state change, such as an attack that only monitors and/or records data.

Passive Threat

The threat of unauthorized disclosure of information without changing the state of the system. A type of threat that involves the interception, not the alteration, of information.

PEM (Privacy Enhanced Mail)

An IETF standard for secure electronic mail exchange.

Penetration

The successful unauthorized access to an automated system.

Penetration Signature

The description of a situation or set of conditions in which a penetration could occur or of system events which in conjunction can indicate the occurrence of a penetration in progress.

Penetration Testing

The portion of security testing in which the evaluators attempt to circumvent the security features of a system. The evaluators may be assumed to use all system design and implementation documentation, that may include listings of system source code, manuals, and circuit diagrams. The evaluators work under the same constraints applied to ordinary users.

Perimeter Based Security

The technique of securing a network by controlling access to all entry and exit points of the network. Usually associated with firewalls and/or filters.

Perpetrator

The entity from the external environment that is taken to be the cause of a risk. An entity in the external environment that performs an attack, i.e. hacker.

Personnel Security

The procedures established to ensure that all personnel who have access to any classified information have the required authorizations as well as the appropriate clearances.

PGP (Pretty Good Privacy)

A freeware program primarily for secure electronic mail.

Phage

A program that modifies other programs or databases in unauthorized ways; especially one that propagates a virus or Trojan horse.

PHF

Phone book file demonstration program that hackers use to gain access to a computer system and potentially read and capture password files.

PHF hack

A well-known and vulnerable CGI script which does not filter out special characters (such as a new line) input by a user.

Phracker

An individual who combines phone phreaking with computer hacking.

Phreak(er)

An individual fascinated by the telephone system. Commonly, an individual who uses his knowledge of the telephone system to make calls at the expense of another.

Phreaking

The art and science of cracking the phone network.

Physical Security

The measures used to provide physical protection of resources against deliberate and accidental threats.

Piggy Back

The gaining of unauthorized access to a system via another user's legitimate connection.

Ping of Death

The use of Ping with a packet size higher than 65,507. This will cause a denial of service.

Plaintext

Unencrypted data.

Private Key Cryptography

An encryption methodology in which the encryptor and decryptor use the same key, which must be kept secret. This methodology is usually only used by a small group.

Probe

Any effort to gather information about a machine or its users for the apparent purpose of gaining unauthorized access to the system at a later date.

Procedural Security

See Administrative Security.

Profile

Patterns of a user's activity which can detect changes in normal routines.

Promiscuous Mode

Normally an Ethernet interface reads all address information and accepts follow-on packets only destined for itself, but when the interface is in promiscuous mode, it reads all information (sniffer), regardless of its destination.

Protocol

Agreed-upon methods of communications used by computers. A specification that describes the rules and procedures that products should follow to perform activities on a network, such as transmitting data. If they use the same protocols, products from different vendors should be able to communicate on the same network.

Proxy

A firewall mechanism that replaces the IP address of a host on the internal (protected) network with its own IP address for all traffic passing through it. A software agent that acts on behalf of a user, typical proxies accept a connection from a user, make a decision as to whether or not the user or client IP address is permitted to use the proxy, perhaps does additional authentication, and then completes a connection on behalf of the user to a remote destination.

Public Key Cryptography

Type of cryptography in which the encryption process is publicly available and unprotected, but in which a part of the decryption key is protected so that only a party with knowledge of both parts of the decryption process can decrypt the cipher text.

Red Book

See Trusted Network Interpretation.

Replicator

Any program that acts to produce copies of itself examples include; a program, a worm, a fork bomb or virus. It is even claimed by some that UNIX and C are the symbiotic halves of an extremely successful replicator.

Retro-Virus

A retro-virus is a virus that waits until all possible backup media are infected too, so that it is not possible to restore the system to an uninfected state.

Risk Assessment

A study of vulnerabilities, threats, likelihood, loss or impact, and theoretical effectiveness of security measures. The process of evaluating threats and vulnerabilities, known and postulated, to determine expected loss and establish the degree of acceptability to system operations.

Risk Management

The total process to identify, control, and minimize the impact of uncertain events. The objective of the risk management program is to reduce risk and obtain and maintain DAA (Designated Approving Authority) approval.

Rootkit

A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network, mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.

Router

An interconnection device that is similar to a bridge but serves packets or frames containing certain protocols. Routers link LANs at the network layer.

Routing Control

The application of rules during the process of routing so as to chose or avoid specific networks, links or relays.

RSA Algorithm

RSA stands for Rivest-Shamir-Aldeman. A public-key cryptographic algorithm that hinges on the assumption that the factoring of the product of two large primes is difficult.

Rules Based Detection

The intrusion detection system detects intrusions by looking for activity that corresponds to known intrusion techniques (signatures) or system vulnerabilities. Also known as Misuse Detection.

Samurai

A hacker who hires out for legal cracking jobs, snooping for factions in corporate political fights, lawyers pursuing privacy-rights and First Amendment cases, and other parties with legitimate reasons to need an electronic locksmith.

SATAN

Security Administrator Tool for Analyzing Networks - A tool for remotely probing and identifying the vulnerabilities of systems on IP networks. A powerful freeware program which helps to identify system security weaknesses.

Script Kiddies

See Ankle Biters

Secure Network Server

A device that acts as a gateway between a protected enclave and the outside world.

Secure Shell

A completely encrypted shell connection between two machines protected by a super long pass-phrase.

Security

A condition that results from the establishment and maintenance of protective measures that ensure a state of inviolability from hostile acts or influences.

Security Architecture

A detailed description of all aspects of the system that relate to security, along with a set of principles to guide the design. A security architecture describes how the system is put together to satisfy the security requirements.

Security Audit

A search through a computer system for security problems and vulnerabilities.

Security Countermeasures

Countermeasures that are aimed at specific threats and vulnerabilities or involve more active techniques as well as activities traditionally perceived as security.

Security Domains

The sets of objects that a subject has the ability to access.

Security Features

The security-relevant functions, mechanisms, and characteristics of AIS hardware and software.

Security Incident

Any act or circumstance that involves classified information that deviates from the requirements of governing security publications. For example, compromise, possible compromise, inadvertent disclosure, and deviation.

Security Kernel

The hardware, firmware, and software elements of a Trusted Computing Base that implement the reference monitor concept. It must mediate all accesses, be protected from modification, and be verifiable as correct.

Security Officer

The ADP official having the designated responsibility for the security of and ADP system.

Security Perimeter

The boundary where security controls are in effect to protect assets.

Security Policies

The set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information.

Security Policy Model

A formal presentation of the security policy enforced by the system. It must identify the set of rules and practices that regulate how a system manages, protects, and distributes sensitive information.

Security Requirements

Types and levels of protection necessary for equipment, data, information, applications, and facilities.

Security Service

A service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers.

Security Violation

An instance in which a user or other person circumvents or defeats the controls of a system to obtain unauthorized access to information contained therein or to system resources.

Server

A system that provides network service such as disk storage and file transfer, or a program that provides such a service. A kind of daemon which performs a service for the requester, which often runs on a computer other than the one which the server runs.

Simple Network Management Protocol (SNMP)

Software used to control network communications devices using TCP/IP.

Smurfing

A denial of service attack in which an attacker spoofs the source address of an echo-request ICMP (ping) packet to the broadcast address for a network, causing the machines in the network to respond en masse to the victim thereby clogging its network.

Snarf

To grab a large document or file for the purpose of using it with or without the author's permission.

Sneaker

An individual hired to break into places in order to test their security; analogous to tiger team.

Sniffer

A program to capture data across a computer network. Used by hackers to capture user id names and passwords. Software tool that audits and identifies network traffic packets. Is also used legitimately by network operations and maintenance personnel to troubleshoot network problems.

Spam

To crash a program by overrunning a fixed-site buffer with excessively large input data. Also, to cause a person or newsgroup to be flooded with irrelevant or inappropriate messages.

Spoofing

Pretending to be someone else. The deliberate inducement of a user or a resource to take an incorrect action. Attempt to gain access to an AIS by pretending to be an authorized user. Impersonating, masquerading, and mimicking are forms of spoofing.

SSL (Secure Sockets Layer)

A session layer protocol that provides authentication and confidentiality to applications.

Subversion

Occurs when an intruder modifies the operation of the intrusion detector to force false negatives to occur.

SYN Flood

When the SYN queue is flooded, no new connection can be opened.

TCP/IP

Transmission Control Protocol/Internetwork Protocol. The suite of protocols the Internet is based on.

tcpwrapper

A software tool for security which provides additional network logging, and restricts service access to authorized hosts by service.

Term Rule-Based Security Policy

A security policy based on global rules imposed for all users. These rules usually rely on a comparison of the sensitivity of the resources being accessed and the possession of corresponding attributes of users, a group of users, or entities acting on behalf of users.

Terminal Hijacking

Allows an attacker, on a certain machine, to control any terminal session that is in progress. An attack hacker can send and receive terminal I/O while a user is on the terminal.

Threat

The means through which the ability or intent of a threat agent to adversely affect an automated system, facility, or operation can be manifest. A potential violation of security.

Threat Agent

Methods and things used to exploit a vulnerability in an information system, operation, or facility; fire, natural disaster and so forth.

Threat Assessment

Process of formally evaluating the degree of threat to an information system and describing the nature of the threat.

Tiger

A software tool which scans for system weaknesses.

Tiger Team

Government and industry - sponsored teams of computer experts who attempt to break down the defenses of computer systems in an effort to uncover, and eventually patch, security holes.

Tinkerbell Program

A monitoring program used to scan incoming network connections and generate alerts when calls are received from particular sites, or when logins are attempted using certain ID's.

Topology

The map or plan of the network. The physical topology describes how the wires or cables are laid out, and the logical or electrical topology describes how the information flows.

Trace Packet

In a packet-switching network, a unique packet that causes a report of each stage of its progress to be sent to the network control center from each visited system element.

Traceroute

An operation of sending trace packets for determining information; traces the route of UDP packets for the local host to a remote host. Normally traceroute displays the time and location of the route taken to reach its destination computer.

Tripwire

A software tool for security. Basically, it works with a database that maintains information about the byte count of files. If the byte count has changed, it will identify it to the system security manager.

Trojan Horse

An apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data.

Trusted Computer System Evaluation Criteria

(TCSEC) A system that employs sufficient hardware and software assurance measures to allow its use for simultaneous processing of a range of sensitive or classified information.

Trusted Computing Base (TCB)

The totality of protection mechanisms within a computer system including hardware, firmware, and software - the combination of which are responsible for enforcing a security policy. A TCB consists of one or more components that together enforce a unified security policy over a product or system.

Trusted Network Interpretation

The specific security features, the assurance requirements and the rating structure of the Orange Book as extended to networks of computers ranging from isolated LANs to WANs.

TTY Watcher

A hacker tool that allows hackers with even a small amount of skill to hijack terminals. It has a GUI interface.

Vaccines

Program that injects itself into an executable program to perform a signature check and warns if there have been any changes.

Virus

A program that can "infect" other programs by modifying them to include a, possibly evolved, copy of itself.

Vulnerability

Hardware, firmware, or software flow that leaves an AIS open for potential exploitation. A weakness in automated system security procedures, administrative controls, physical layout, internal controls, and so forth, that could be exploited by a threat to gain unauthorized access to information or disrupt critical processing.

Vulnerability Analysis

Systematic examination of an AIS or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after implementation.

WAN

Wide Area Network. A physical or logical network that provides capabilities for a number of independent devices to communicate with each other over a common transmission-interconnected topology in geographic areas larger than those served by local area networks.

War Dialer

A program that dials a given list or range of numbers and records those which answer with handshake tones, which might be entry points to computer or telecommunications systems.

Worm

Independent program that replicates from machine to machine across network connections often clogging networks and information systems as it spreads.


This page last modified on March 2, 2011

Before we go any further it is important to realise that there are fats, and there are fats. However, conventional medical protocols continue to vilify all saturated fats.

By doing this they ignore the evidence that saturated fats are either atherogenically neutral, or negative, and do NOT contribute to heart disease via cholesterol raising.

Full fat milk (saturated fat) is far healthier than the insipid “low fat” milk.


Low fat milk does not offer any cardiac benefits, and may in fact be strongly linked to prostate cancer in males, and ovarian cancer in females.

In contrast, the health benefits of full fat milk have been shown in numerous studies. In one such study they measured the actual levels of two milk fats (pentadecanoic acid and heptadecanoic acid) in the blood of people participating in the programme. The ones drinking the full fat milk subsequently showed reductions in their risk of a heart attack.

The conjugated linoleic acid (CLA) content of milk is vital for health. Evidence suggests that CLA reduces tumour growth in animals, and in a Finnish study, CLA levels correlated with a 60% reduction in female breast cancer.

Researchers have proven that the CLA in milk reduces body fat mass (BFM) in both animals and humans.

Certainly, the supermarkets play their part in which type of milk gets promoted the most for obvious, maximum financial gain; a low fat product generates bigger profit margins for them.

Fat is removed in the creameries from the original 4% milk fat, and the residual milk blended according to the fat content required, which may be 0.1% fat (skimmed ), or 1% (very low fat), or the 1.5% to 1.8% (low fat) variety.


The proposals in some powerful quarters to reduce dietary dairy products, because of the calcium content, ignores the findings of critical science; that dairy products (full fat milk, butter, cheese, eggs) have many health supporting properties, since they contain important minerals and vitamins, such as vitamins A,D,E K2, Butyric acid and omega 3 fatty acids, and of course, CLA.

While you are enjoying your full cream milk, rest assured that you are partaking in the far healthier milk option.

The Great Outdoors
Feed the ducks at the park.
Cut some fresh wildflowers for your table.
Go fishing.
Hike somewhere with pretty scenery.
Go jogging with a friend.
Take your dog for a walk.
Get a group of friends together for a water balloon fight.
Try to find out about little-known waterfalls in your area and explore to find them.
Volunteer for a non-profit association.
Go camping at a place you’ve never been before.
Learn how to sail a catamaran.
Visit a farm with a friend.
Go off-road mountain biking.
Take horseback riding lessons.
Find a quiet place with beautiful scenery to read a favorite book.
Find a wildflower information book and explore to see how many flowers you can identify around your town.
Go kayaking.
Start a garden.
Run through a water sprinkler.
Organize a barbeque with the neighbors.

Recreation
Run a 5K race or fun walk just for fun.
Join the local community orchestra or choir.
Take ballroom dancing lessons.
Take up a new instrument.
Write a humorous poem.
Go see the nearest symphony orchestra.
Read to grade school children.
Join a recreational basketball or volleyball team from the local community center.
Go to a nearby coffee shop and listen to any intellectual conversations going on.
Become a mentor to a student that wishes to enter your profession.
Organize a scavenger hunt for friends and family.
Listen to a new genre of music.
Explore small shops downtown in your city.
Send a postcard to a child.
Ask a veteran to tell you some if his or her favorite stories from years in the service.
Send flowers or a card to a friend just for fun.
Go to a music store and try out all the grand pianos.
Go shopping to find a gift for someone who has been kind to you.
Go visit your alma mater to see what has changed since you graduated.
Go watch a high school play.

Around the house
Bake some cookies for your neighbors.
Buy a pretty house plant.
Try out a new kind of tea or coffee.
Make gift baskets for a local charity.
Start a canned food drive for needy families.
Mow an elderly neighbor’s lawn and talk with them afterward.
Find an ugly corner in the yard and turn it into a small garden.
Try out a new recipe for supper.
Take a bicycle ride.
Organize a neighborhood-wide game of sardines.
Take some time to look through old family photos.
Invite friends and family over for supper.
Start a scrapbook.
Get the family together and watch old home videos.
Let a child help you give your dog a bath (this doesn’t work so well with cats)
Make your own root beer. As an added benefit, this is also a nice money saver.
Make up your own variety of smoothie with your favorite fruit.
Start a practical joke war with a sibling or long suffering friend.
Record yourself singing a friend’s favorite songs and give the CD to them.
Save a snowball in the freezer and get to throw it at someone on a hot summer day.
Make your own fountain with Diet Coke and Mentos.
Camp out in the living room with your kids.
Build a fort out of cardboard boxes.
Make homemade ice cream.
Listen to your old cassette tapes or records.
Call your parents just to say “hi.”
Help your kids make homemade cards for relatives.
Check out a book of jokes and read it.
Build a house out of cards.
Make a gingerbread house during the summer.
Print some digital pictures and hang them in your house.
Repaint a room with a cheerful color.
Rearrange your furniture.
Put your TV in the closet for a month.
Reupholster an old piece of furniture.
Make a slip ‘n slide for your family. (keep safety in mind)
Make a pie, draw or paint a picture, or grow and arrange flowers to enter in the county fair.
Help your kids make cards for nursing home residents.
Explore iTunes for new music to listen to.
Try out Pandora Radio.

This article was useful when looking for:
how to enjoy life (2562)
enjoy life (597)
ways to enjoy life (263)
enjoying life (126)
100 ways to enjoy life (69)
how to enjoy the life (36)
how to enjoy life? (29)
enjoy the life (22)
Be Sociable, Share!




In June 1969, LIFE magazine published a feature that today, incredibly, remains as moving and, in some quarters, as controversial as it was when it sparked debate and intensified a nation’s soul-searching more than 40 years ago. On the cover, a young man’s face — the very model of middle-America’s “boy next door” — along with 11 stark words: “The Faces of the American Dead in Vietnam: One Week’s Toll.” Inside, across 10 funereal pages, LIFE published picture after picture and name after name of 242 young men killed halfway around the world — in the words of the official announcement of their deaths — “in connection with the conflict in Vietnam.”


LIFE, June 27, 1969


To absolutely no one’s surprise, the public’s response was immediate, and visceral. Some readers expressed amazement, in light of the thousands of American deaths suffered in a war with no end in sight, that it took so long for LIFE to produce something as dramatic and pointed as “One Week’s Toll.” Others were outraged that the magazine was, as one reader saw it, “supporting the antiwar demonstrators who are traitors to this country.” Still others — perhaps the vast majority — were quietly and disconsolately devastated. (See reader’s responses at the bottom of this page.)

Here, on the anniversary of the 1973 withdrawal of the last American combat troops from Vietnam — and as the United States, four decades later, again finds itself in a protracted, ambiguous war with a shadowy enemy on the other side of the globe — LIFE.com is republishing every picture and every name that originally appeared in (as the article itself was titled) “One Week’s Dead.”

Below is the text, in full, that not only accompanied portraits of those killed, but also explained why LIFE chose to publish “One Week’s Dead” when — and in the manner — it did.

NOTE: We recommend that readers take advantage of the “full screen” option when viewing this gallery. And to see how “One Week’s Dead” looked when it ran in LIFE in 1969, click here. (Link opens in new window.)

From the June 27, 1969, issue of LIFE:

The faces shown on the next pages are the faces of American men killed — in the words of the official announcement of their deaths — “in connection with the conflict in Vietnam.” The names, 242, of them, were released on May 28 through June 3 [1969], a span of no special significance except that it includes Memorial Day. The numbers of the dead are average for any seven-day period during this stage of the war.

It is not the intention of this article to speak for the dead. We cannot tell with any precision what they thought of the political currents which drew them across the world. From the letters of some, it is possible to tell they felt strongly that they should be in Vietnam, that they had great sympathy for the Vietnamese people and were appalled at their enormous suffering. Some had voluntarily extended theirs tours of combat duty; some were desperate to come home. Their families provided most of these photographs, and many expressed their own feelings that their sons and husbands died in a necessary cause. Yet in a time when the numbers of Americans killed this war — 36,000 — though far less than the Vietnamese losses, have exceeded the dead in the Korean War, when the nation continues week after week to be numbed by a three-digit statistic which is translated to direct anguish in hundreds of homes all over the country, we must pause to look into the faces. More than we must know how many, we must know who. The faces of one week’s dead,unknown but families and friends, are suddenly recognized by all in this gallery of young American eyes.

Below is the text, in full, from the last page of the “One Week’s Dead” feature in LIFE:

‘I see death coming up the hill’

On the back of a picture he sent home shortly before his death near Saigon, Sgt. William Anderson, 18, of Templeton, Pa., jotted a wry note: “Plain of Reeds, May 12, 1969. Here’s a picture of a 2-star general awarding me my Silver Star. I didn’t do anything. They just had some extra ones.” His family has a few other recent photographs of the boy, including one showing him this past February helping to put a beam into place on his town’s new church. His was the first military funeral held there.

Such fragments on film, in letters, in clippings and in recollection comprise the legacies of virtually every man show in these pages. To study the smallest portion of them, even without reference to their names, is to glimpse the scope of a much broader tragedy. Writing his family just before the time he was scheduled to return to the U.S., a California man said, “I could be standing on the doorstep on the 8th [of June]…As you can see from my shaky printing, the strain of getting ‘short’ is getting to me, so I’ll close now.” The ironies and sad coincidences of time hang everywhere.

One Pfc. from the 101st Airborne was killed on his 21st birthday. A waiting bride had just bought her own wedding ring. A mother got flowers ordered by her son and then learned he had died the day they arrived. A Texan had just signed up for a second two-year tour of duty when he was killed, and his ROTC instructor back home remembered with great affection that the boy, a flag-bearer, had stumbled a lot. In the state of Oregon a solider was buried in a grave shared by the body of his brother, who had died in Vietnam two years earlier. A lieutenant was killed serving the battalion his father had commanded two years ago. A man from Colorado noted in his last letter that the Marines preferred captured North Vietnamese mortars to their own because they were lighter and much more accurate. At four that afternoon he as killed by enemy mortar fire.

Premonitions gripped many of the men. One wrote, “I have given my life as have many others for a cause in which I firmly believe.” Another, writing from Hamburger Hill, said, “You may not be able to read this. I am writing it in a hurry. I see death coming up the hill.” One more, who had come home on leave from Vietnam in January and had told his father he did not want to go back and was considering going AWOL, wrote last month, “Everyone’s dying, they’re all ripped apart. Dad, there’s no one left.” “I wish now I had told him to jump,” the boy’s father recalled. “I wish I had, but I couldn’t.”

Such despair was not everywhere. A lieutenant, a Notre Dame graduate, wrote home in some mild annoyance that he had not been given command of a company. (“I would have jumped at the chance but there are too many Capts. floating around”) and then reported with a certain pleasure that he was looking forward to his new assignment, which was leader of a reconnaissance platoon. In an entirely cheerful letter to his mother a young man from Georgia wrote, “I guess by now you are having some nice weather. Do you have tomatoes in the garden? ‘A’ Co. found an NVA farm two days ago with bananas, tomatoes and corn. This is real good land here. You can see why the North wants it.”

There is a catalogue of fact for every face. One boy had customized his 13-year-old car and planned to buy a ranch. Another man, a combat veteran of the Korean War, leaves seven children. A third had been an organist in his church and wanted to be a singer. One had been sending his pay home to contribute to his brother’s college expenses. The mother of one of the dead, whose son was the third of four to serve in the Army, insists with deep pride, “We are a patriotic family willing to pay that price.” An aunt who had raised her nephew said of him, “He was really and truly a conscientious objector. He told me it was a terrible thought going into the Army and winding up in Vietnam and shooting people who hadn’t done anything to him…such a waste. Such a shame.”

Every photograph, every face carriers its own simple and powerful message. The inscription on one boy’s picture to his girl reads:

To Miss Shirley Nash
We shall let no Love come between Love.
Only peace and happiness from Heaven Above.
Love always.

Perpetually yours,
Joseph

Below are some of the reactions from readers that were published in the August 18, 1969, issue of LIFE — in which the entire Letters section of the magazine was given over to responses to “One Week’s Dead”:

Your story was the most eloquent and meaningful statement on the wastefulness and stupidity of war I have ever read. — From a reader in California

Certainly these tragic young men were far superior to the foreign policy they were called upon to defend. — From a U.S. Marine Corps Captain (resigned)

I feel you are supporting the antiwar demonstrators who are traitors to this country. You are helping them and therefore belong to this group. — From a reader in Texas

I cried for those Southern black soldiers. What did they die for? Tar paper shacks, malnutrition, unemployment and degradation? — From a reader in Ohio

While looking at the photographs I was shocked to see the smiling face of someone I used to know. He was only 19 years old. I guess I never realized that 19-year-olds have to die. — From a reader in Georgia

I felt I was staring into the eyes of the 11 troopers from my platoon who were killed while fighting for a cause they couldn’t understand — From a Marine second lieutenant in New Jersey who had commanded a rifle platoon in Vietnam