President Barack Obama has appointed Howard Schmidt, adjunct faculty member in the Georgia Tech Information Security Center (GTISC) in the College of Computing, as the new White House cybersecurity coordinator.
“Howard is one of the world’s leading authorities on computer security, with some 40 years of experience in government, business and law enforcement,” said John Brennan, assistant to the president for Homeland Security and Counterterrorism, in an e-mail announcing the appointment last month. “Howard will have regular access to the president and serve as a key member of his National Security Staff. He will also work closely with his economic team to ensure that our cybersecurity efforts keep the nation secure and prosperous.”
At Tech, Schmidt has helped set up the GTISC industry advisory board. He has worked on a research project to evaluate the cyber security policies of various United States stakeholders. He has also given lectures on security policies and strategies.
Schmidt previously served as former chief security strategist for the US CERT Partners Program and former special advisor to the White House for Cyberspace Security under President George W. Bush. He joined Tech in 2006 to work with GTISC to improve the state of information security by lending his vast knowledge and expertise in this growing technological area.
Schmidt’s distinguished career as an information security advocate includes leadership positions with both public and private sector organizations. He has served on the President’s Critical Infrastructure Protection Board, was an augmented member of the President’s Committee of Advisors on Science and Technology and held executive positions with the Information Systems Security Association, the Information Technology Information Sharing and Analysis Center, the National Institute of Standards and Technology and the Information Security Privacy Advisory Board. Schmidt also served as vice president and chief security strategist for eBay and chief security officer for Microsoft Corporation, forming and directing the computer giant’s Trustworthy Computer Security Strategies Group.
David Terraso
Georgia Tech
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Showing posts with label atlanta. Show all posts
Showing posts with label atlanta. Show all posts
Wednesday, January 6, 2010
Friday, October 23, 2009
Commission Seeks Public Input on Draft Rules to Preserve the Free and Open Internet
In the next chapter of a longstanding effort to preserve the free and open Internet, the Federal Communications Commission is seeking public input on draft rules that would codify and supplement existing Internet openness principles. In addition to providing greater predictability for all stakeholders, the Notice is aimed at securing the many economic and social benefits that an open Internet has historically provided. It seeks to do so in a manner that will promote and protect the legitimate needs of consumers, broadband Internet access service providers,
entrepreneurs, investors, and businesses of all sizes that make use of the Internet.
The Commission has addressed openness issues in a variety of contexts and proceedings,
including: a unanimous policy statement in 2005, a notice of inquiry on broadband industry
practices in 2007, public comment on several petitions for rulemaking, conditions associated
with significant communications industry mergers, the rules for the 700 MHz spectrum auction
in 2007, specific enforcement actions, and public en banc hearings. During this time period,
opportunities for public participation have generated over 100,000 pages of input in
approximately 40,000 filings from interested parties and members of the public.
The process today’s Notice initiates will build upon the existing record at the
Commission to identify the best means to achieve the goal of preserving and promoting
the open Internet.
Recognizing that the proposed framework needs to balance potentially competing
interests while helping to ensure an open, safe, and secure Internet, the draft rules would permit
broadband Internet access service providers to engage in reasonable network management,
including but not limited to reasonable practices to reduce or mitigate the effects of network
congestion.
Under the draft proposed rules, subject to reasonable network management, a provider of
broadband Internet access service:
1. would not be allowed to prevent any of its users from sending or receiving the
lawful content of the user’s choice over the Internet;
2. would not be allowed to prevent any of its users from running the lawful
applications or using the lawful services of the user’s choice;
3. would not be allowed to prevent any of its users from connecting to and using
on its network the user’s choice of lawful devices that do not harm the
network;
4. would not be allowed to deprive any of its users of the user’s entitlement to
competition among network providers, application providers, service
providers, and content providers;
5. would be required to treat lawful content, applications, and services in a
nondiscriminatory manner; and
6. would be required to disclose such information concerning network
management and other practices as is reasonably required for users and
content, application, and service providers to enjoy the protections specified in
this rulemaking.
The draft rules make clear that providers would also be permitted to address harmful traffic and traffic unwanted by users, such as spam, and prevent both the transfer of unlawful content, such as child pornography, and the unlawful transfer of content, such as a transfer that would infringe copyright. Further, nothing in the draft rules supersedes any obligation a broadband Internet access service provider may have -- or limits its ability -- to deliver emergency communications, or to address the needs of law enforcement, public safety, or national or homeland security authorities, consistent with applicable law.
The Commission is also seeking comment on how it should address “managed” or “specialized” services, which are Internet-Protocol-based offerings provided over the same networks used for broadband Internet access services. While the proceeding will seek input on how best to define and treat such services, managed services could include voice, video, and enterprise business services, or specialized applications like telemedicine, smart grid, or eLearning offerings. These services may provide consumer benefits and lead to increased deployment of broadband networks.
The Notice asks how the Commission should define the category of managed or specialized services, what policies should apply to them, and how to ensure that broadband providers’ ability to innovate, develop valuable new services, and experiment with new technologies and business models can co-exist with the preservation of the free and open Internet on which consumers and businesses of all sizes depend.
The Notice affirms that the six principles it proposes to codify would apply to all platforms for broadband Internet access, including mobile wireless broadband, while recognizing that different access platforms involve significantly different technologies, market structures, patterns of consumer usage, and regulatory history. To that end, the Notice seeks comment on how, in what time frames or phases, and to what extent the principles should apply to non-wireline forms of broadband Internet access, including mobile wireless.
Recognizing that the Commission’s decisions in this rulemaking must reflect a thorough understanding of current technology and future technological trends, the Chief of the Commission’s Office of Engineering & Technology will create an inclusive, open, and transparent process for obtaining the best technical advice and information from a broad range of engineers.
The adoption of this Notice will open a window for submitting comments to the FCC. Comments can be filed through the Commission’s Electronic Comment Filing System, and are due on Thursday, January 14. Reply comments are due on Friday, March 5. In addition, the rulemaking process will include many other avenues for public input, including open workshops on key issues; providing feedback through openinternet.gov, which will include regular blog posts by Commission staff; and other new media tools, including IdeaScale, an online platform for brainstorming and rating solutions to policy challenges.
Action by the Commission, October 22, 2009, by Notice of Proposed Rulemaking (FCC
09-93). Chairman Genachowski, Commissioners Copps and Clyburn; Commissioner McDowell
and Commissioner Baker concurring in part, dissenting in part. Separate statements issued by
Chairman Genachowski, Commissioners Copps, McDowell, Clyburn and Baker.
GN Docket No.: 09-191
WC Docket No.: 07-52
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
entrepreneurs, investors, and businesses of all sizes that make use of the Internet.
The Commission has addressed openness issues in a variety of contexts and proceedings,
including: a unanimous policy statement in 2005, a notice of inquiry on broadband industry
practices in 2007, public comment on several petitions for rulemaking, conditions associated
with significant communications industry mergers, the rules for the 700 MHz spectrum auction
in 2007, specific enforcement actions, and public en banc hearings. During this time period,
opportunities for public participation have generated over 100,000 pages of input in
approximately 40,000 filings from interested parties and members of the public.
The process today’s Notice initiates will build upon the existing record at the
Commission to identify the best means to achieve the goal of preserving and promoting
the open Internet.
Recognizing that the proposed framework needs to balance potentially competing
interests while helping to ensure an open, safe, and secure Internet, the draft rules would permit
broadband Internet access service providers to engage in reasonable network management,
including but not limited to reasonable practices to reduce or mitigate the effects of network
congestion.
Under the draft proposed rules, subject to reasonable network management, a provider of
broadband Internet access service:
1. would not be allowed to prevent any of its users from sending or receiving the
lawful content of the user’s choice over the Internet;
2. would not be allowed to prevent any of its users from running the lawful
applications or using the lawful services of the user’s choice;
3. would not be allowed to prevent any of its users from connecting to and using
on its network the user’s choice of lawful devices that do not harm the
network;
4. would not be allowed to deprive any of its users of the user’s entitlement to
competition among network providers, application providers, service
providers, and content providers;
5. would be required to treat lawful content, applications, and services in a
nondiscriminatory manner; and
6. would be required to disclose such information concerning network
management and other practices as is reasonably required for users and
content, application, and service providers to enjoy the protections specified in
this rulemaking.
The draft rules make clear that providers would also be permitted to address harmful traffic and traffic unwanted by users, such as spam, and prevent both the transfer of unlawful content, such as child pornography, and the unlawful transfer of content, such as a transfer that would infringe copyright. Further, nothing in the draft rules supersedes any obligation a broadband Internet access service provider may have -- or limits its ability -- to deliver emergency communications, or to address the needs of law enforcement, public safety, or national or homeland security authorities, consistent with applicable law.
The Commission is also seeking comment on how it should address “managed” or “specialized” services, which are Internet-Protocol-based offerings provided over the same networks used for broadband Internet access services. While the proceeding will seek input on how best to define and treat such services, managed services could include voice, video, and enterprise business services, or specialized applications like telemedicine, smart grid, or eLearning offerings. These services may provide consumer benefits and lead to increased deployment of broadband networks.
The Notice asks how the Commission should define the category of managed or specialized services, what policies should apply to them, and how to ensure that broadband providers’ ability to innovate, develop valuable new services, and experiment with new technologies and business models can co-exist with the preservation of the free and open Internet on which consumers and businesses of all sizes depend.
The Notice affirms that the six principles it proposes to codify would apply to all platforms for broadband Internet access, including mobile wireless broadband, while recognizing that different access platforms involve significantly different technologies, market structures, patterns of consumer usage, and regulatory history. To that end, the Notice seeks comment on how, in what time frames or phases, and to what extent the principles should apply to non-wireline forms of broadband Internet access, including mobile wireless.
Recognizing that the Commission’s decisions in this rulemaking must reflect a thorough understanding of current technology and future technological trends, the Chief of the Commission’s Office of Engineering & Technology will create an inclusive, open, and transparent process for obtaining the best technical advice and information from a broad range of engineers.
The adoption of this Notice will open a window for submitting comments to the FCC. Comments can be filed through the Commission’s Electronic Comment Filing System, and are due on Thursday, January 14. Reply comments are due on Friday, March 5. In addition, the rulemaking process will include many other avenues for public input, including open workshops on key issues; providing feedback through openinternet.gov, which will include regular blog posts by Commission staff; and other new media tools, including IdeaScale, an online platform for brainstorming and rating solutions to policy challenges.
Action by the Commission, October 22, 2009, by Notice of Proposed Rulemaking (FCC
09-93). Chairman Genachowski, Commissioners Copps and Clyburn; Commissioner McDowell
and Commissioner Baker concurring in part, dissenting in part. Separate statements issued by
Chairman Genachowski, Commissioners Copps, McDowell, Clyburn and Baker.
GN Docket No.: 09-191
WC Docket No.: 07-52
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Labels:
atlanta,
commission,
fayette front page,
FCC,
georgia,
georgia front page,
input,
internet,
net neutrality,
public,
regulate,
rules
Senator McCain Introduces “The Internet Freedom Act of 2009”
U.S. Senator John McCain today (October 22) introduced legislation that would prohibit the Federal Communications Commission from enacting rules that would regulate the Internet. The Commission will meet today to determine whether the historically open architecture and free flow of the Internet should be subject to onerous federal regulation. Specifically, the Commission will seek to impose “net neutrality” rules that would reign in the network management practices of all Internet service providers, including wireless phone companies.
This government takeover of the Internet will stifle innovation, in turn slowing our economic turnaround and further depressing an already anemic job market. Outside of health care, the technology industry is the nation’s fastest growing job market. Innovation and job growth in this sector of our economy is the key to America’s future prosperity. In 2008, while most industries were slashing jobs in the worst economy in nearly 30 years, high tech industries actually added over 77,000 good high-paying jobs. Just this month, Google and Yahoo both released positive earnings reports.
The wireless industry exploded over the past twenty years due to limited government regulation. Wireless carriers invested $100 billion in infrastructure and development over the past three years which has led to faster networks, more competitors in the marketplace and lower prices compared to any other country. Meanwhile, wired telephones and networks have become a slow dying breed as they are mired in state and Federal regulations, universal service contribution requirements and limitations on use.
“Today I’m pleased to introduce ‘The Internet Freedom Act of 2009’ that will keep the Internet free from government control and regulation,” said Senator John McCain. “It will allow for continued innovation that will in turn create more high-paying jobs for the millions of Americans who are out of work or seeking new employment,” McCain continued. “Keeping businesses free from oppressive regulations is the best stimulus for the current economy.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
www.artsacrossgeorgia.com
Arts Across Georgia
This government takeover of the Internet will stifle innovation, in turn slowing our economic turnaround and further depressing an already anemic job market. Outside of health care, the technology industry is the nation’s fastest growing job market. Innovation and job growth in this sector of our economy is the key to America’s future prosperity. In 2008, while most industries were slashing jobs in the worst economy in nearly 30 years, high tech industries actually added over 77,000 good high-paying jobs. Just this month, Google and Yahoo both released positive earnings reports.
The wireless industry exploded over the past twenty years due to limited government regulation. Wireless carriers invested $100 billion in infrastructure and development over the past three years which has led to faster networks, more competitors in the marketplace and lower prices compared to any other country. Meanwhile, wired telephones and networks have become a slow dying breed as they are mired in state and Federal regulations, universal service contribution requirements and limitations on use.
“Today I’m pleased to introduce ‘The Internet Freedom Act of 2009’ that will keep the Internet free from government control and regulation,” said Senator John McCain. “It will allow for continued innovation that will in turn create more high-paying jobs for the millions of Americans who are out of work or seeking new employment,” McCain continued. “Keeping businesses free from oppressive regulations is the best stimulus for the current economy.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
www.artsacrossgeorgia.com
Arts Across Georgia
Labels:
atlanta,
fayette front page,
FCC,
freedom,
georgia,
georgia front page,
internet,
legislation,
mccain,
net neutrality,
regulate,
takeover
Thursday, October 1, 2009
No, Your Social Networking “Friend” Isn’t Really in Trouble Overseas
According to the Internet Crime Complaint Center (IC3), there has been an increase in the number of hijacked social networking accounts reported to www.ic3.gov.
One of the more popular scams involves online criminals planting malicious software and code onto to victim computers. It starts by someone opening a spam e-mail, sometimes from another hijacked friend’s account.
When opened, the spam allows the cyber intruders to steal passwords for any account on the computer, including social networking sites. The thieves then change the user’s passwords and eventually send out distress messages claiming they are in some sort of legal or medical peril and requesting money from their social networking contacts.
So far, nearly 3,200 cases of account hijackings have been reported to the IC3 since 2006.
Cyber thieves are also using spam to promote phishing sites, claiming a violation of the terms of service agreement or creating some other issue which needs to be resolved. Other spam entices users to download an application or view a video. Some of these messages appear to be sent from friends, giving the perception of legitimacy. Once the user responds to a phishing site, downloads an application, or clicks on a video link, the electronic device they’re using becomes infected.
Some applications advertised on social networking sites appear legitimate but install malicious code or rogue anti-virus software. These empty applications can give cyber criminals access to your profile and personal information. These programs will automatically send messages to your contacts, instructing them to download the new application too.
Infected users are often unknowingly spreading malware by having links to infected websites posted on their webpage without the user’s knowledge. Since the e-mail or video link appear to be endorsed by a friend, social networking contacts are more likely to click on these links.
Although social networking sites are generally a safe place to interact with friends and acquaintances, keep in mind these suggestions to protect yourself while navigating the Internet:
* Adjust website privacy settings. Some networking sites have provided useful options to assist in adjusting settings to help protect your identity.
* Be selective when adding friends. Once added, contacts can access any information marked as viewable by all friends.
* Limit access to your profile to only those contacts you trust with your personal information.
* Disable options, such as photo sharing, that you might not regularly use. You can always enable these options later.
* Be careful what you click on. Just because someone posts a link or video to their wall does not mean it is safe.
* Familiarize yourself with the security and privacy settings and learn how to report a compromised account.
* Each social networking site may have different procedures on how to handle a hijacked or infected account; therefore, you may want to reference their help or FAQ page for instructions.
If your account has been hijacked or infected, report it to by visiting www.ic3.gov or www.lookstoogoodtobetrue.com.
The Internet Crime Complaint Center is a partnership between the FBI and National White Collar Crime Center (NW3C).
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
One of the more popular scams involves online criminals planting malicious software and code onto to victim computers. It starts by someone opening a spam e-mail, sometimes from another hijacked friend’s account.
When opened, the spam allows the cyber intruders to steal passwords for any account on the computer, including social networking sites. The thieves then change the user’s passwords and eventually send out distress messages claiming they are in some sort of legal or medical peril and requesting money from their social networking contacts.
So far, nearly 3,200 cases of account hijackings have been reported to the IC3 since 2006.
Cyber thieves are also using spam to promote phishing sites, claiming a violation of the terms of service agreement or creating some other issue which needs to be resolved. Other spam entices users to download an application or view a video. Some of these messages appear to be sent from friends, giving the perception of legitimacy. Once the user responds to a phishing site, downloads an application, or clicks on a video link, the electronic device they’re using becomes infected.
Some applications advertised on social networking sites appear legitimate but install malicious code or rogue anti-virus software. These empty applications can give cyber criminals access to your profile and personal information. These programs will automatically send messages to your contacts, instructing them to download the new application too.
Infected users are often unknowingly spreading malware by having links to infected websites posted on their webpage without the user’s knowledge. Since the e-mail or video link appear to be endorsed by a friend, social networking contacts are more likely to click on these links.
Although social networking sites are generally a safe place to interact with friends and acquaintances, keep in mind these suggestions to protect yourself while navigating the Internet:
* Adjust website privacy settings. Some networking sites have provided useful options to assist in adjusting settings to help protect your identity.
* Be selective when adding friends. Once added, contacts can access any information marked as viewable by all friends.
* Limit access to your profile to only those contacts you trust with your personal information.
* Disable options, such as photo sharing, that you might not regularly use. You can always enable these options later.
* Be careful what you click on. Just because someone posts a link or video to their wall does not mean it is safe.
* Familiarize yourself with the security and privacy settings and learn how to report a compromised account.
* Each social networking site may have different procedures on how to handle a hijacked or infected account; therefore, you may want to reference their help or FAQ page for instructions.
If your account has been hijacked or infected, report it to by visiting www.ic3.gov or www.lookstoogoodtobetrue.com.
The Internet Crime Complaint Center is a partnership between the FBI and National White Collar Crime Center (NW3C).
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Labels:
atlanta,
crime,
fayette front page,
georgia,
georgia front page,
hijack,
infected,
internet,
malicious,
passwords. fbi,
scams,
social networks
Friday, September 18, 2009
Twitter: The New Mathematics
/PRNewswire/ -- The following comments were delivered today by Dr. Benjamin Ola. Akande, dean of Webster University's School of Business & Technology, to introduce Twitter creator, co-founder and chairman Jack Dorsey as the University's "Success to Significance 2009 Person of the Year." The event was presented by Webster's School of Communications and School of Business & Technology.
My favorite equation in mathematics is the original equation, one from which all other equations evolve. In my opinion, it is the holy grail of mathematics. The irrefutable law of mathematics. It is the convention in conventional wisdom. 1+1 equals 2. May I dare suggest to you that this universal truth may become something of our recent past? The reason: Twitter.
Twitter has successfully created a new equation which states that, 1+1 equals countless possibilities.
1+1 is equal to 3, to 300, 3 million. It is equal to the power of the written word -- 140 characters, succinct, precise and concise. Twitter is equal to the possibility to make a difference, to be a contributor to society for the greater good of mankind. Twitter is becoming the definitive equation of our time not just for its simplicity but also for its exponential potential of increase.
One of the ways in which we verify the overwhelming impact of a product and an idea is when it becomes a verb, a part of our lexicon.
Much like Google, Twitter has become a universal descriptor for sharing ideas in a concise format that speaks to universality, democracy, immediacy and transparency.
Twittering is a conversation between two people yet the definition of two is singular, infinite and boundless. Twittering has become a language unto itself. Words and symbols strung together in a deliberate order to create spontaneous, and sustained, bursts of ideas.
Twitter has in effect dismantled the constraints and boundaries of time and space between us. It is an enabler of ideas that has empowered the young and the young at heart to share and stay connected.
Twitter has fundamentally transformed the way we talk and listen to one another; the manner in which we inform each other and has extended and strengthened the power of the written word.
If I were to state the impact on society in 140 characters or less, I'd tweet "Twitter is to our generation what Guttenberg's printing press and Bell's telephone was to theirs."
In just three short years, Twitter's 40 million users have made it a public forum for the discussion of politics, business, culture, news, celebrity, gossip and idle chatter.
People are tweeting to raise money, to recruit talent, to make government more responsible, to find and distribute news, to discover knowledge, to build personal or business networks, or to just kill a little time with friends and family.
In the new book by Shel Israel, entitled Twitterville, the author makes a convincing case that Twitter's worth is not only the ability to broadcast short messages, but also the ongoing and transformative conversation that these tweets can ignite.
You know, every generation produces individuals who come along and make life better for those around them. They are notable individuals who rise from small and big places. They come from humble beginnings, unrecognizable even while in our midst. They are innovators, doers, ordinary people who enable others to achieve what has never been done before. The new math is Twitter.
With its home campus in St. Louis, Webster University (www.webster.edu) is a worldwide institution committed to delivering high-quality learning experiences that transform students for global citizenship and individual excellence. Founded in 1915, Webster offers undergraduate and graduate degree programs through five schools and colleges, and a global network of more than 100 campuses. Its 20,000-plus student population represents almost 150 nationalities. The University's core values include excellence in teaching, joining theory and practice, small class sizes, and educating students to be lifelong independent learners, fully prepared to participate in an increasingly international society.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
My favorite equation in mathematics is the original equation, one from which all other equations evolve. In my opinion, it is the holy grail of mathematics. The irrefutable law of mathematics. It is the convention in conventional wisdom. 1+1 equals 2. May I dare suggest to you that this universal truth may become something of our recent past? The reason: Twitter.
Twitter has successfully created a new equation which states that, 1+1 equals countless possibilities.
1+1 is equal to 3, to 300, 3 million. It is equal to the power of the written word -- 140 characters, succinct, precise and concise. Twitter is equal to the possibility to make a difference, to be a contributor to society for the greater good of mankind. Twitter is becoming the definitive equation of our time not just for its simplicity but also for its exponential potential of increase.
One of the ways in which we verify the overwhelming impact of a product and an idea is when it becomes a verb, a part of our lexicon.
Much like Google, Twitter has become a universal descriptor for sharing ideas in a concise format that speaks to universality, democracy, immediacy and transparency.
Twittering is a conversation between two people yet the definition of two is singular, infinite and boundless. Twittering has become a language unto itself. Words and symbols strung together in a deliberate order to create spontaneous, and sustained, bursts of ideas.
Twitter has in effect dismantled the constraints and boundaries of time and space between us. It is an enabler of ideas that has empowered the young and the young at heart to share and stay connected.
Twitter has fundamentally transformed the way we talk and listen to one another; the manner in which we inform each other and has extended and strengthened the power of the written word.
If I were to state the impact on society in 140 characters or less, I'd tweet "Twitter is to our generation what Guttenberg's printing press and Bell's telephone was to theirs."
In just three short years, Twitter's 40 million users have made it a public forum for the discussion of politics, business, culture, news, celebrity, gossip and idle chatter.
People are tweeting to raise money, to recruit talent, to make government more responsible, to find and distribute news, to discover knowledge, to build personal or business networks, or to just kill a little time with friends and family.
In the new book by Shel Israel, entitled Twitterville, the author makes a convincing case that Twitter's worth is not only the ability to broadcast short messages, but also the ongoing and transformative conversation that these tweets can ignite.
You know, every generation produces individuals who come along and make life better for those around them. They are notable individuals who rise from small and big places. They come from humble beginnings, unrecognizable even while in our midst. They are innovators, doers, ordinary people who enable others to achieve what has never been done before. The new math is Twitter.
With its home campus in St. Louis, Webster University (www.webster.edu) is a worldwide institution committed to delivering high-quality learning experiences that transform students for global citizenship and individual excellence. Founded in 1915, Webster offers undergraduate and graduate degree programs through five schools and colleges, and a global network of more than 100 campuses. Its 20,000-plus student population represents almost 150 nationalities. The University's core values include excellence in teaching, joining theory and practice, small class sizes, and educating students to be lifelong independent learners, fully prepared to participate in an increasingly international society.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Saturday, September 12, 2009
Apple Introduces New iPod touch Lineup
/PRNewswire/ -- Apple(R) announced September 9 the new iPod touch(R) lineup starting at the breakthrough price of just $199, giving users a great iPod(R), a great pocket computer, a great game player and access to Apple's revolutionary App Store with over 75,000 applications. iPod touch features Apple's revolutionary Multi-Touch(TM) user interface, a gorgeous 3.5-inch widescreen glass display, Wi-Fi, Bluetooth, and a built-in accelerometer and speaker - all in an amazingly thin metal design that slips easily into your pocket. The 8GB iPod touch is now available for just $199, along with new models which deliver twice the capacity for the same price, with the iPod touch 32GB model for $299 and 64GB model for $399.
"At just $199 the iPod touch is the most affordable gateway to Apple's revolutionary App Store with more than 75,000 applications that you can wirelessly download right into your iPod touch," said Philip Schiller, Apple's senior vice president of Worldwide Product Marketing. "You get a great iPod, a great pocket computer with the industry's best mobile web browser and a great game player, all in this super-thin beautiful enclosure."
iPod touch is a great iPod for enjoying music, television shows, movies and podcasts. iPod touch has incredible features for music fans such as Cover Flow(R), Shake to Shuffle(TM), and access to the legendary iTunes(R) Store. And now, the new iPod touch supports Genius Mixes, which automatically creates up to 12 endless mixes of songs from your iTunes library that go great together. Movies and television shows look great on the gorgeous 3.5-inch widescreen display. iPod touch customers have the entire iTunes Store catalog at their fingertips, giving them instant access to the world's largest catalog of over 11 million songs, TV shows and Hollywood movies to purchase and download directly to their iPod touch.
iPod touch is a great game player with its built-in accelerometer, revolutionary Multi-Touch user interface, its amazing graphics performance and the over 20,000 game and entertainment titles available on the App Store. With support for peer-to-peer connections, the new iPod touch gives users the ability to play multi-player games with people next to them or around the world. iPod touch customers can add new game titles from the App Store over Wi-Fi anytime and anywhere.
iPod touch is a great pocket computer, letting users surf the web, do email, manage their calendars, organize contacts, and use social networking sites such as Facebook and Twitter. With its award-winning Safari(R) web browser, iPod touch users can experience the Internet like no other pocket-size device. iPod touch comes with the latest iPhone(TM) 3.1 software including: Cut, Copy and Paste; Spotlight(R) Search to search across iPod touch or within Mail, Contacts, Calendar and iPod; landscape keyboard for Mail, Notes and Safari; remote lock for MobileMe(TM) and anti-phishing features.
Apple's App Store is a phenomenal success with a selection of over 75,000 apps available and customer downloads topping a staggering 1.8 billion apps. iPhone and iPod touch customers in 77 countries can choose from an incredible range of apps in 20 categories, including games, business, news, sports, health, reference and travel. The App Store works with iPod touch over Wi-Fi so users can discover, purchase and download apps wirelessly and start using them instantly.
iPod touch features up to 30 hours of music playback or six hours of video playback on a single charge. The 8GB model holds up to 1,750 songs, 10,000 photos and 10 hours of video; the 32GB model holds up to 7,000 songs, 40,000 photos or 40 hours of video; and the 64GB model holds up to 14,000 songs, 90,000 photos or 80 hours of video.* The 32GB and 64GB models also include up to 50 percent faster performance and support for even better graphics with Open GL ES 2.0.
iPod is the world's most popular family of digital music players with over 220 million sold. Apple's new holiday lineup includes iPod shuffle(R) in five great colors starting at just $59; iPod classic(R) in a new 160GB model holding up to 40,000 songs for $249; the incredible new iPod nano(R) with a video camera available in nine brilliant polished aluminum colors starting at $149; and the revolutionary iPod touch starting at the breakthrough price of just $199.
Pricing & Availability
The new iPod touch is available immediately for a suggested price of $199 (US) for the 8GB model, $299 (US) for the 32GB model and $399 (US) for the 64GB model through the Apple Store(R) (www.apple.com), Apple's retail stores and Apple Authorized Resellers. iPod touch requires a Mac(R) with a USB 2.0 port, Mac OS(R) X v10.4.11 or later and iTunes 9; or a Windows PC with a USB 2.0 port and Windows Vista or Windows XP Home or Professional (Service Pack 3) or later and iTunes 9. Existing iPod touch users can update to the latest 3.1 software for just $4.95 (US) to enjoy new features including Genius Mixes and Genius for Apps. iPod touch owners who already have the 3.0 software get the 3.1 software update for free. Simply download the latest version of iTunes onto your Mac or PC, and purchase the 3.1 software update via iTunes.
*Battery life and number of charge cycles vary by use and settings. See www.apple.com/batteries for more information. Music capacity is based on four minutes per song and 128-Kbps AAC encoding; photo capacity is based on iPod-viewable photos transferred from iTunes; and video capacity is based on H.264 1.5 Mbps video at 640-by-480 resolution.
Apple ignited the personal computer revolution in the 1970s with the Apple II and reinvented the personal computer in the 1980s with the Macintosh. Today, Apple continues to lead the industry in innovation with its award-winning computers, OS X operating system and iLife and professional applications. Apple is also spearheading the digital media revolution with its iPod portable music and video players and iTunes online store, and has entered the mobile phone market with its revolutionary iPhone.
(C) 2009 Apple Inc. All rights reserved. Apple, the Apple logo, Mac, Mac OS, Macintosh, iPod touch, iPod, Multi-Touch, Cover Flow, Shuffle, iTunes, Safari, iPhone, Spotlight, MobileMe, iPod shuffle, iPod classic, iPod nano and Apple Store are trademarks of Apple. Other company and product names may be trademarks of their respective owners.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
"At just $199 the iPod touch is the most affordable gateway to Apple's revolutionary App Store with more than 75,000 applications that you can wirelessly download right into your iPod touch," said Philip Schiller, Apple's senior vice president of Worldwide Product Marketing. "You get a great iPod, a great pocket computer with the industry's best mobile web browser and a great game player, all in this super-thin beautiful enclosure."
iPod touch is a great iPod for enjoying music, television shows, movies and podcasts. iPod touch has incredible features for music fans such as Cover Flow(R), Shake to Shuffle(TM), and access to the legendary iTunes(R) Store. And now, the new iPod touch supports Genius Mixes, which automatically creates up to 12 endless mixes of songs from your iTunes library that go great together. Movies and television shows look great on the gorgeous 3.5-inch widescreen display. iPod touch customers have the entire iTunes Store catalog at their fingertips, giving them instant access to the world's largest catalog of over 11 million songs, TV shows and Hollywood movies to purchase and download directly to their iPod touch.
iPod touch is a great game player with its built-in accelerometer, revolutionary Multi-Touch user interface, its amazing graphics performance and the over 20,000 game and entertainment titles available on the App Store. With support for peer-to-peer connections, the new iPod touch gives users the ability to play multi-player games with people next to them or around the world. iPod touch customers can add new game titles from the App Store over Wi-Fi anytime and anywhere.
iPod touch is a great pocket computer, letting users surf the web, do email, manage their calendars, organize contacts, and use social networking sites such as Facebook and Twitter. With its award-winning Safari(R) web browser, iPod touch users can experience the Internet like no other pocket-size device. iPod touch comes with the latest iPhone(TM) 3.1 software including: Cut, Copy and Paste; Spotlight(R) Search to search across iPod touch or within Mail, Contacts, Calendar and iPod; landscape keyboard for Mail, Notes and Safari; remote lock for MobileMe(TM) and anti-phishing features.
Apple's App Store is a phenomenal success with a selection of over 75,000 apps available and customer downloads topping a staggering 1.8 billion apps. iPhone and iPod touch customers in 77 countries can choose from an incredible range of apps in 20 categories, including games, business, news, sports, health, reference and travel. The App Store works with iPod touch over Wi-Fi so users can discover, purchase and download apps wirelessly and start using them instantly.
iPod touch features up to 30 hours of music playback or six hours of video playback on a single charge. The 8GB model holds up to 1,750 songs, 10,000 photos and 10 hours of video; the 32GB model holds up to 7,000 songs, 40,000 photos or 40 hours of video; and the 64GB model holds up to 14,000 songs, 90,000 photos or 80 hours of video.* The 32GB and 64GB models also include up to 50 percent faster performance and support for even better graphics with Open GL ES 2.0.
iPod is the world's most popular family of digital music players with over 220 million sold. Apple's new holiday lineup includes iPod shuffle(R) in five great colors starting at just $59; iPod classic(R) in a new 160GB model holding up to 40,000 songs for $249; the incredible new iPod nano(R) with a video camera available in nine brilliant polished aluminum colors starting at $149; and the revolutionary iPod touch starting at the breakthrough price of just $199.
Pricing & Availability
The new iPod touch is available immediately for a suggested price of $199 (US) for the 8GB model, $299 (US) for the 32GB model and $399 (US) for the 64GB model through the Apple Store(R) (www.apple.com), Apple's retail stores and Apple Authorized Resellers. iPod touch requires a Mac(R) with a USB 2.0 port, Mac OS(R) X v10.4.11 or later and iTunes 9; or a Windows PC with a USB 2.0 port and Windows Vista or Windows XP Home or Professional (Service Pack 3) or later and iTunes 9. Existing iPod touch users can update to the latest 3.1 software for just $4.95 (US) to enjoy new features including Genius Mixes and Genius for Apps. iPod touch owners who already have the 3.0 software get the 3.1 software update for free. Simply download the latest version of iTunes onto your Mac or PC, and purchase the 3.1 software update via iTunes.
*Battery life and number of charge cycles vary by use and settings. See www.apple.com/batteries for more information. Music capacity is based on four minutes per song and 128-Kbps AAC encoding; photo capacity is based on iPod-viewable photos transferred from iTunes; and video capacity is based on H.264 1.5 Mbps video at 640-by-480 resolution.
Apple ignited the personal computer revolution in the 1970s with the Apple II and reinvented the personal computer in the 1980s with the Macintosh. Today, Apple continues to lead the industry in innovation with its award-winning computers, OS X operating system and iLife and professional applications. Apple is also spearheading the digital media revolution with its iPod portable music and video players and iTunes online store, and has entered the mobile phone market with its revolutionary iPhone.
(C) 2009 Apple Inc. All rights reserved. Apple, the Apple logo, Mac, Mac OS, Macintosh, iPod touch, iPod, Multi-Touch, Cover Flow, Shuffle, iTunes, Safari, iPhone, Spotlight, MobileMe, iPod shuffle, iPod classic, iPod nano and Apple Store are trademarks of Apple. Other company and product names may be trademarks of their respective owners.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Labels:
apple,
atlanta,
fayette front page,
georgia,
georgia front page,
ipod touch,
new,
pocket computer
Saturday, September 5, 2009
UGA to convene cybersecurity panel Sept. 11
Nationally recognized experts will come to the University of Georgia on Sept. 11 to teach university and community members how to protect themselves from cyberterrorism during “The Growing Cybersecurity Threat: From National Security to UGA,” a free panel discussion running from 10 a.m.–noon at the UGA Chapel.
As information sharing and Internet use become cornerstones of the average person’s wired life, keeping up-to-date about growing threats is increasingly important, said John Newton, event organizer and emergency operation coordinator in UGA’s Office of Security and Emergency Preparedness, which is co-sponsoring the event with the Center for International Trade and Security and Enterprise Information Technology Services.
“There’s been an explosion of cybersecurity threats over the past few years that affect everyone from governments and the military down to people who shop or do business online,” Newton said. “It’s something that reaches most of us nearly every day, and because the threats change rapidly it’s important to keep re-learning how to combat them.”
The panel will consist of FBI Special Agent Lee Kirschbaum; Brian Rivers, director of information security at UGA, and Kevin Mandia, a cybersecurity expert and owner of the information security firm Mandiant Systems
“As far as information security risks and threats, they always change, but for the most part the university has changed and adapted along with the threats,” Rivers said. “But threats continue to evolve. People are getting better at attacking us. Over the last 10 years there’s been a shift from people hacking for fun to people hacking for profit. It’s now big business overseas.”
As Web surfers increase their online business transactions and store more personal information on the Internet, the availability of data to potentially harmful sources ramps up. Over-the-net business is overwhelmingly safe, but it’s important to be watchful for new trends in hacking, said Kirschbaum, who works at the Atlanta FBI headquarters.
“We want to make folks at UGA aware of some of the threats that are out there, so if they come up, they may sense them. When you’re in academia and doing research, the propensity is to share your information with anybody and everybody because we all want to see knowledge advance,” Kirschbaum said. “But at times the information you’re giving out can be too sensitive. People may begin to ask questions that are too probing, and at that point in time we want people to realize that this maybe something that they should let law enforcement know about.”
Modern hackers use a variety of computer intrusion techniques like unsolicited e-mails, malware and programs embedded on thumb drives that can invade entire computer networks and send back users’ private information, he said. A one-computer virus does not rate the same threat level as it did a few years ago.
Beyond personal and professional significance, the issue has national prominence as well. Cyberterrorism grabbed worldwide headlines in July, when the U.S. and South Korea fell victims to an orchestrated network attack. While no major harm was done, the incident revealed computer weaknesses in the governments that could have been disastrous and caused renewed interest in cyber health, said Igor Khripunov, interim director of the Center for International Trade and Security.
“The newly-announced U.S. Cyber Command will likely make great strides in protecting national-level critical infrastructure and systems from cyberterrorists,” he said. “However, other systems are at risk, including those here at the University of Georgia.”
“According to the Homeland Security Department, cyber attacks on federal computer systems alone have increased by more than 250 percent over the last two years,” he added. “But a few fundamental management changes—centralized management of information technology systems, better education and training, and tougher access control—could prevent man of the most common attacks.”
The event is part of OSEP’s Academic-Professional Security Series. For more information, see www.osep.uga.edu.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
As information sharing and Internet use become cornerstones of the average person’s wired life, keeping up-to-date about growing threats is increasingly important, said John Newton, event organizer and emergency operation coordinator in UGA’s Office of Security and Emergency Preparedness, which is co-sponsoring the event with the Center for International Trade and Security and Enterprise Information Technology Services.
“There’s been an explosion of cybersecurity threats over the past few years that affect everyone from governments and the military down to people who shop or do business online,” Newton said. “It’s something that reaches most of us nearly every day, and because the threats change rapidly it’s important to keep re-learning how to combat them.”
The panel will consist of FBI Special Agent Lee Kirschbaum; Brian Rivers, director of information security at UGA, and Kevin Mandia, a cybersecurity expert and owner of the information security firm Mandiant Systems
“As far as information security risks and threats, they always change, but for the most part the university has changed and adapted along with the threats,” Rivers said. “But threats continue to evolve. People are getting better at attacking us. Over the last 10 years there’s been a shift from people hacking for fun to people hacking for profit. It’s now big business overseas.”
As Web surfers increase their online business transactions and store more personal information on the Internet, the availability of data to potentially harmful sources ramps up. Over-the-net business is overwhelmingly safe, but it’s important to be watchful for new trends in hacking, said Kirschbaum, who works at the Atlanta FBI headquarters.
“We want to make folks at UGA aware of some of the threats that are out there, so if they come up, they may sense them. When you’re in academia and doing research, the propensity is to share your information with anybody and everybody because we all want to see knowledge advance,” Kirschbaum said. “But at times the information you’re giving out can be too sensitive. People may begin to ask questions that are too probing, and at that point in time we want people to realize that this maybe something that they should let law enforcement know about.”
Modern hackers use a variety of computer intrusion techniques like unsolicited e-mails, malware and programs embedded on thumb drives that can invade entire computer networks and send back users’ private information, he said. A one-computer virus does not rate the same threat level as it did a few years ago.
Beyond personal and professional significance, the issue has national prominence as well. Cyberterrorism grabbed worldwide headlines in July, when the U.S. and South Korea fell victims to an orchestrated network attack. While no major harm was done, the incident revealed computer weaknesses in the governments that could have been disastrous and caused renewed interest in cyber health, said Igor Khripunov, interim director of the Center for International Trade and Security.
“The newly-announced U.S. Cyber Command will likely make great strides in protecting national-level critical infrastructure and systems from cyberterrorists,” he said. “However, other systems are at risk, including those here at the University of Georgia.”
“According to the Homeland Security Department, cyber attacks on federal computer systems alone have increased by more than 250 percent over the last two years,” he added. “But a few fundamental management changes—centralized management of information technology systems, better education and training, and tougher access control—could prevent man of the most common attacks.”
The event is part of OSEP’s Academic-Professional Security Series. For more information, see www.osep.uga.edu.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Wednesday, September 2, 2009
Emory on iTunes U Passes the One Million Downloads Mark
One million downloads have been made from Emory’s iTunes U site – a free service hosted by Apple on their iTunes store. Emory celebrates its one-year anniversary on iTunes U in October and now offers more than 1,700 audio and video podcasts related to the University and its community.
Emory’s site hosts public lectures and events, interviews with top faculty and researchers, and a wealth of consumer health and less-commonly taught language materials. “Our most popular collections are language videos for self-study, talks from the Dalai Lama’s visit to Emory and readings from Alice Walker’s placing of her archives at the University,” says Shannon O’Daniel, Emory’s iTunes U system administrator.
Emory captured the No. 20 spot for all iTunes U downloads in October 2008 for chemistry professor David Lynn’s lecture on evolution, and a reading from Alice Walker at Emory reached the No. 6 spot in all downloads.
Apple has featured on the noteworthy section of its home page, many of Emory’s collections, including King Tutankhamun, Emory faculty’s Life of the Mind series, Cartooning for Peace, and Evolution Revolution with world-renowned biologist E.O. Wilson.
Students and Emory organizations use an internal iTunes U site, “Exclusively Emory,” to access course materials, presentations and other resources, averaging nearly 1,200 downloads per week. Students say they value the ease, convenience and portability of this new study device.
Access Emory on iTunes U. The project is a collaboration between University Technology Services and Communications & Marketing.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Emory’s site hosts public lectures and events, interviews with top faculty and researchers, and a wealth of consumer health and less-commonly taught language materials. “Our most popular collections are language videos for self-study, talks from the Dalai Lama’s visit to Emory and readings from Alice Walker’s placing of her archives at the University,” says Shannon O’Daniel, Emory’s iTunes U system administrator.
Emory captured the No. 20 spot for all iTunes U downloads in October 2008 for chemistry professor David Lynn’s lecture on evolution, and a reading from Alice Walker at Emory reached the No. 6 spot in all downloads.
Apple has featured on the noteworthy section of its home page, many of Emory’s collections, including King Tutankhamun, Emory faculty’s Life of the Mind series, Cartooning for Peace, and Evolution Revolution with world-renowned biologist E.O. Wilson.
Students and Emory organizations use an internal iTunes U site, “Exclusively Emory,” to access course materials, presentations and other resources, averaging nearly 1,200 downloads per week. Students say they value the ease, convenience and portability of this new study device.
Access Emory on iTunes U. The project is a collaboration between University Technology Services and Communications & Marketing.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Labels:
atlanta,
download,
emory university,
fayette front page,
georgia,
georgia front page,
itunes
Thursday, August 27, 2009
World's First Real-time Fashion Search Engine
/24-7/ -- Go to http://www.thatssoswag.com. "That's So Swag" is the hottest new Twitter application that keeps you up to date on what "tweeple" are buzzing about right now in the world of fashion.
VivaSwag.com, a new online shopping site that uses Twitter to reach out to their 18-24 female demographic, came up with the real-time fashion engine in response to the spam filled searches that kept turning up whenever they tried to search Twitter for fashion news.
Says Carlos Rodriguez, Viva Swag's Creative Director and the designer of VivaSwag.com and VivalaDrama.com, "In order for Viva Swag to be relevant, it was very important for our merchandisers to be able to key into top fashion news among celebrities as well as everyday women. But, every time we ran a search on Twitter, it would be filled with spam, and it would take hours to wade through."
With the help of Pablo Bornacin, Viva Swag's top programmer, they put their heads together and began brainstorming on a way to bring a clean and easy search that would be useful to Viva Swag as well as the rest of the Twitter community. They came up with an idea to use Twitter's already prolific "Trending Topic" (Trending topics are the topics that are most talked about on Twitter) so that people can search fashion trending topics as well as related products.
Bornacin says: "ThatsSoSwag.com is extremely user friendly. EVERYONE, even those without a Twitter account, can search the hottest news and products in the world of fashion."
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
VivaSwag.com, a new online shopping site that uses Twitter to reach out to their 18-24 female demographic, came up with the real-time fashion engine in response to the spam filled searches that kept turning up whenever they tried to search Twitter for fashion news.
Says Carlos Rodriguez, Viva Swag's Creative Director and the designer of VivaSwag.com and VivalaDrama.com, "In order for Viva Swag to be relevant, it was very important for our merchandisers to be able to key into top fashion news among celebrities as well as everyday women. But, every time we ran a search on Twitter, it would be filled with spam, and it would take hours to wade through."
With the help of Pablo Bornacin, Viva Swag's top programmer, they put their heads together and began brainstorming on a way to bring a clean and easy search that would be useful to Viva Swag as well as the rest of the Twitter community. They came up with an idea to use Twitter's already prolific "Trending Topic" (Trending topics are the topics that are most talked about on Twitter) so that people can search fashion trending topics as well as related products.
Bornacin says: "ThatsSoSwag.com is extremely user friendly. EVERYONE, even those without a Twitter account, can search the hottest news and products in the world of fashion."
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Labels:
application,
atlanta,
fashion,
fayette front page,
georgia,
georgia front page,
swag,
tweeple,
twitter
Tuesday, August 18, 2009
Cyberbullying Advice for Parents from InternetSafety.com & the Cyberbullying Research Center
/PRNewswire/ -- Cyberbullying, the practice of harassing another individual through digital channels such as email, instant/text messaging, and social networking websites, affects roughly one in five children. At times it has led to tragic results such as the recent suicide of Australian teenager Chanelle Rae, who took her own life after nasty messages were circulated online about her appearance. The problem has received national attention in the U.S. as well with a series of highly publicized incidents, including the recent introduction of the Megan Meier Cyberbullying Prevention Act named after a 13-year-old who committed suicide in 2006 after an online harassment campaign initiated by a friend's mother.
According to Sameer Hinduja, InternetSafety.com's cyberbullying expert and co-founder of the Cyberbullying Research Center, cyberbullying ups the ante on the age-old practice of bullying in several ways. First, victims often do not know who the bully is or why they are being targeted. The cyberbully can cloak his or her identity behind a computer or cell phone using anonymous email addresses or pseudonymous screen names. Second, the hurtful actions of a cyberbully are viral, enabling an entire school to be involved in a cyber-attack or at least find out about the incident with a few keystrokes. This can add immeasurably to the victim's trauma.
Signs that a child is being cyberbullied include a marked change in computer habits such as less frequent computer use, nervousness when a new e-mail or instant message arrives, constant looking over his or her shoulder when at the computer, and anger or depression either at or away from the machine.
To deal with cyberbullying, InternetSafety.com and Hinduja recommend strategies such as:
-- Working together with the child to arrive at a mutually agreeable
course of action, including soliciting input from the child for
resolving the situation.
-- When necessary, explaining the importance of scheduling a meeting with
school administrators (or a trusted teacher) to discuss the matter.
-- Refraining from immediately banning access to instant messaging,
e-mail, social networking Web sites, or the Internet in general.
Hinduja warns that this strategy neither addresses the underlying
interpersonal conflict nor eliminates current or future instances of
cyberbullying victimization. It will also likely close off a candid
line of communication and promote overt defiance of the ban for
children accustomed to frequent online access.
-- Paying even greater attention to victimized children's Internet and
cell phone activities.
-- Considering installing parental control filtering software and/or an
online tracking program like Safe Eyes (http://www.safeeyes.com/) to
block emails from known cyberbullies, monitor and record online chat
sessions, or in extreme cases block IM, email or social networking
sites completely. Over 70% of teens surveyed by the National Crime
Prevention Council reported that being able to block cyberbullies was
the most effective method of prevention.
"If you're using filtering and blocking software, tell your children about it and explain why you have chosen to take that step," Hinduja said. "Open communication is key to maintaining the level of trust that children need to confide in their parents about problems they are having--online or offline."
"While cyberbullying rarely ends in suicide, these extreme cases demonstrate just how harmful the practice can be," said Joe Stradinger, Chief Evangelist for InternetSafety.com. "The Internet and other new communication methods have made bullying much more potent and troublesome, and parents need to be vigilant to protect their children from serious emotional harm."
For more on cyberbullying, visit the InternetSafety.com blog at http://blog.internetsafety.com/ and the Cyberbullying Research Center blog at http://blog.cyberbullying.us/
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
According to Sameer Hinduja, InternetSafety.com's cyberbullying expert and co-founder of the Cyberbullying Research Center, cyberbullying ups the ante on the age-old practice of bullying in several ways. First, victims often do not know who the bully is or why they are being targeted. The cyberbully can cloak his or her identity behind a computer or cell phone using anonymous email addresses or pseudonymous screen names. Second, the hurtful actions of a cyberbully are viral, enabling an entire school to be involved in a cyber-attack or at least find out about the incident with a few keystrokes. This can add immeasurably to the victim's trauma.
Signs that a child is being cyberbullied include a marked change in computer habits such as less frequent computer use, nervousness when a new e-mail or instant message arrives, constant looking over his or her shoulder when at the computer, and anger or depression either at or away from the machine.
To deal with cyberbullying, InternetSafety.com and Hinduja recommend strategies such as:
-- Working together with the child to arrive at a mutually agreeable
course of action, including soliciting input from the child for
resolving the situation.
-- When necessary, explaining the importance of scheduling a meeting with
school administrators (or a trusted teacher) to discuss the matter.
-- Refraining from immediately banning access to instant messaging,
e-mail, social networking Web sites, or the Internet in general.
Hinduja warns that this strategy neither addresses the underlying
interpersonal conflict nor eliminates current or future instances of
cyberbullying victimization. It will also likely close off a candid
line of communication and promote overt defiance of the ban for
children accustomed to frequent online access.
-- Paying even greater attention to victimized children's Internet and
cell phone activities.
-- Considering installing parental control filtering software and/or an
online tracking program like Safe Eyes (http://www.safeeyes.com/) to
block emails from known cyberbullies, monitor and record online chat
sessions, or in extreme cases block IM, email or social networking
sites completely. Over 70% of teens surveyed by the National Crime
Prevention Council reported that being able to block cyberbullies was
the most effective method of prevention.
"If you're using filtering and blocking software, tell your children about it and explain why you have chosen to take that step," Hinduja said. "Open communication is key to maintaining the level of trust that children need to confide in their parents about problems they are having--online or offline."
"While cyberbullying rarely ends in suicide, these extreme cases demonstrate just how harmful the practice can be," said Joe Stradinger, Chief Evangelist for InternetSafety.com. "The Internet and other new communication methods have made bullying much more potent and troublesome, and parents need to be vigilant to protect their children from serious emotional harm."
For more on cyberbullying, visit the InternetSafety.com blog at http://blog.internetsafety.com/ and the Cyberbullying Research Center blog at http://blog.cyberbullying.us/
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Labels:
atlanta,
children,
cyberbully,
fayette front page,
georgia,
georgia front page,
harass,
social networks,
victims
Monday, August 17, 2009
Businesses Beware Of Mass Marketing Scams
Almost everyone has heard horror stories about individuals who have been taken in by mass marketing fraud schemes—from phony sweepstakes to lottery scams. But here’s something you may not know: the very same fraudsters who target individual consumers also target businesses.
Illicit mass marketers know that the keepers of corporate funds may be just as susceptible to fake ploys as anyone else. And while business-oriented fraud usually results in losses of a few hundreds dollars the first time a company is hit, employees may continue to fall victim to these scams if the company has insufficient internal controls.
So what sort of mass marketing frauds are perpetrated against businesses? Here are just a few examples of what might happen to your companies:
* Masquerading as your usual office supplies provider, a fraudulent mass marketer contacts your employees, offering products at reduced or current prices in anticipation of impending rate increases. After paying the invoice, your company never receives the supplies it purchased.
* Your organization is asked to buy ad space in a business directory. The directory never sees the light of day, or only scammed companies like yours receive a copy.
* Criminals send invoices for unordered or undelivered products showing higher-than-agreed-upon prices, trying to exploit poor communication channels that may exist in your company and hoping that phony invoices will be paid without a second look.
* Your business receives an information packet offering to create and host your website. The packet includes a card that must be returned in order to “opt out” of the service, but the card is simply ignored or thrown out. Your company is then billed for web services it never ordered.
* In a variation of the advance-fee scheme that often targets individual consumers, perpetrators—usually targeting small businesses—offer low interest loans in exchange for an advance fee. You pay the fee, but your business never receives the loan.
While the FBI and other law enforcement agencies vigorously investigate frauds of all kinds, there are steps your businesses can take to protect themselves. For example:
* Educate yourself and your employees—especially frontline and accounts payable and receivable personnel—about common fraud schemes;
* Always ask for offers in writing, and require a written contract or purchase order for ANY transaction;
* Carefully review all invoices and compare them to expense records to make sure they are legitimate (and keep all records!);
* Use a credit card for purchasing supplies and services (if the vendor fails to deliver, you can dispute the charges);
* Don’t give out full names of employees, as fraudsters can obtain an employee’s name and then later claim this individual authorized the purchase of a product or service; and
* Be wary of accepting checks, because in some cases perpetrators have conducted a series of smaller, legitimate transactions to enhance their credibility and then used a counterfeit check to pay for a large order.
If you suspect you’ve been scammed, file a complaint with the Federal Trade Commission’s Consumer Sentinel, a database accessed by law enforcement agencies around the country. You can also contact your local FBI office.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
www.artsacrossgeorgia.com
Arts Across Georgia
Illicit mass marketers know that the keepers of corporate funds may be just as susceptible to fake ploys as anyone else. And while business-oriented fraud usually results in losses of a few hundreds dollars the first time a company is hit, employees may continue to fall victim to these scams if the company has insufficient internal controls.
So what sort of mass marketing frauds are perpetrated against businesses? Here are just a few examples of what might happen to your companies:
* Masquerading as your usual office supplies provider, a fraudulent mass marketer contacts your employees, offering products at reduced or current prices in anticipation of impending rate increases. After paying the invoice, your company never receives the supplies it purchased.
* Your organization is asked to buy ad space in a business directory. The directory never sees the light of day, or only scammed companies like yours receive a copy.
* Criminals send invoices for unordered or undelivered products showing higher-than-agreed-upon prices, trying to exploit poor communication channels that may exist in your company and hoping that phony invoices will be paid without a second look.
* Your business receives an information packet offering to create and host your website. The packet includes a card that must be returned in order to “opt out” of the service, but the card is simply ignored or thrown out. Your company is then billed for web services it never ordered.
* In a variation of the advance-fee scheme that often targets individual consumers, perpetrators—usually targeting small businesses—offer low interest loans in exchange for an advance fee. You pay the fee, but your business never receives the loan.
While the FBI and other law enforcement agencies vigorously investigate frauds of all kinds, there are steps your businesses can take to protect themselves. For example:
* Educate yourself and your employees—especially frontline and accounts payable and receivable personnel—about common fraud schemes;
* Always ask for offers in writing, and require a written contract or purchase order for ANY transaction;
* Carefully review all invoices and compare them to expense records to make sure they are legitimate (and keep all records!);
* Use a credit card for purchasing supplies and services (if the vendor fails to deliver, you can dispute the charges);
* Don’t give out full names of employees, as fraudsters can obtain an employee’s name and then later claim this individual authorized the purchase of a product or service; and
* Be wary of accepting checks, because in some cases perpetrators have conducted a series of smaller, legitimate transactions to enhance their credibility and then used a counterfeit check to pay for a large order.
If you suspect you’ve been scammed, file a complaint with the Federal Trade Commission’s Consumer Sentinel, a database accessed by law enforcement agencies around the country. You can also contact your local FBI office.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
www.artsacrossgeorgia.com
Arts Across Georgia
Labels:
atlanta,
business,
fayette front page,
fbi,
fraud,
georgia,
georgia front page,
mass marketing,
scam,
scheme
Friday, August 14, 2009
www.AutomotiveStimulusPlan.com Warns of Online Scams
/PRNewswire/ -- Some of the leading U.S. Automotive Retailers recently launched a dealer funded stimulus program to provide up to $4500 in incentives for consumers who were left behind by the government funded stimulus plan. Due to the rules of the government's program, over 90% of consumers are not eligible and consumers are not happy about it. Some of the largest retailers in the country recently launched the www.AutoStimulusPlan.com, a Stimulus Program that is more inclusive because all vehicles older than 2007 are eligible regardless of their current mpg.
The recent launch of the dealer stimulus plan sparked a nationwide wave of interest in the program, which provides up to $4,500 of trade-in credits to car-owners who trade in their vehicle for a more fuel efficient alternative. However, the flood of enthusiasm for the new dealer stimulus plan has led to the emergence of scams targeting consumers looking to benefit from the program. www.AutoStimulusPlan.com, the official website for the dealer funded stimulus, has issued a warning to consumers and is providing specific instructions on how to avoid scams. "Consumers should be cautious because some scam sites have emerged that are attempting to fraudulently capture personal financial information to be used illegally," said Scott Fletcher, director of www.AutoStimulusPlan.com.
www.AutoStimulusPlan.com warns consumers to be wary of any site that asks for personal financial information. "Avoid any website that says you need to "pre-register," or asks you for your social security number or credit card number," said Fletcher. The organization is warning consumers not to give out their personal information on these scam sites because it could result in identity theft.
The organization has advised consumers, "You are not required to sign up for this program. Participating new car dealers will add a trade-in credit to your vehicles fair trade value, assuming it meets program requirements. Don't be fooled by fake websites that portray themselves as an official website for the dealer stimulus plan because there is only one official website for the national dealer funded stimulus program, www.AutoStimulusPlan.com," said Fletcher. The organization also advises consumers to make sure they receive all the manufacturer rebates in addition to the trade-in credits they receive for their qualifying vehicle.
Some local dealerships have implemented advertising campaigns that mislead consumers to think they are a part of the national dealer Stimulus Plan. To be safe, consumers are advised not to rely on local advertising and should visit the only national dealer-funded Stimulus Plan at www.AutoStimulusPlan.com.
The dealer funded stimulus plan has gotten a lot of attention because it compensates for the gaps in the governments program by allowing consumers to purchase pre-owned vehicles and to choose a short term lease.
Automotive Stimulus Program Requirements:
1. Current vehicle is a 2006 or older
2. Current vehicle is operable
3. Current vehicle has been owned for a minimum of 6 months
4. Current vehicle has been registered for a minimum of 6 months
5. The replacement vehicle has to be more fuel efficient by a minimum
of 2mpg
Incentives vary based on the consumer's current vehicle and desired vehicle (visit www.AutoStimulusPlan.com for details). Incentives vary in some states due to state laws that regulate automotive advertising and promotion. The Auto Stimulus Plan will end on November 1st and will continue if the government's program expires before that date.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
The recent launch of the dealer stimulus plan sparked a nationwide wave of interest in the program, which provides up to $4,500 of trade-in credits to car-owners who trade in their vehicle for a more fuel efficient alternative. However, the flood of enthusiasm for the new dealer stimulus plan has led to the emergence of scams targeting consumers looking to benefit from the program. www.AutoStimulusPlan.com, the official website for the dealer funded stimulus, has issued a warning to consumers and is providing specific instructions on how to avoid scams. "Consumers should be cautious because some scam sites have emerged that are attempting to fraudulently capture personal financial information to be used illegally," said Scott Fletcher, director of www.AutoStimulusPlan.com.
www.AutoStimulusPlan.com warns consumers to be wary of any site that asks for personal financial information. "Avoid any website that says you need to "pre-register," or asks you for your social security number or credit card number," said Fletcher. The organization is warning consumers not to give out their personal information on these scam sites because it could result in identity theft.
The organization has advised consumers, "You are not required to sign up for this program. Participating new car dealers will add a trade-in credit to your vehicles fair trade value, assuming it meets program requirements. Don't be fooled by fake websites that portray themselves as an official website for the dealer stimulus plan because there is only one official website for the national dealer funded stimulus program, www.AutoStimulusPlan.com," said Fletcher. The organization also advises consumers to make sure they receive all the manufacturer rebates in addition to the trade-in credits they receive for their qualifying vehicle.
Some local dealerships have implemented advertising campaigns that mislead consumers to think they are a part of the national dealer Stimulus Plan. To be safe, consumers are advised not to rely on local advertising and should visit the only national dealer-funded Stimulus Plan at www.AutoStimulusPlan.com.
The dealer funded stimulus plan has gotten a lot of attention because it compensates for the gaps in the governments program by allowing consumers to purchase pre-owned vehicles and to choose a short term lease.
Automotive Stimulus Program Requirements:
1. Current vehicle is a 2006 or older
2. Current vehicle is operable
3. Current vehicle has been owned for a minimum of 6 months
4. Current vehicle has been registered for a minimum of 6 months
5. The replacement vehicle has to be more fuel efficient by a minimum
of 2mpg
Incentives vary based on the consumer's current vehicle and desired vehicle (visit www.AutoStimulusPlan.com for details). Incentives vary in some states due to state laws that regulate automotive advertising and promotion. The Auto Stimulus Plan will end on November 1st and will continue if the government's program expires before that date.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Labels:
atlanta,
auto,
dealer stimulus plan,
fayette front page,
georgia,
georgia front page,
incentives,
scam,
stimulus
Wednesday, August 12, 2009
National Cyber Security Alliance Calls on All Americans to Promote Cybersecurity Awareness
/PRNewswire/ -- The National Cyber Security Alliance (NCSA) one of the primary promoters of National Cyber Security Awareness Month each October, launched a Web portal (www.staysafeonline.org/ncsam) to encourage broad-based participation in education and awareness activities this year.
"The theme of National Cyber Security Awareness Month this year is "Our Shared Responsibility," said Michael Kaiser, executive director of the NCSA. "We can only secure cyber space if everyone gets involved in making sure that all computer users engage in safe and secure practices to protect the computers and networks they use. October is a rallying point for everyone to get involved in educating their employees, customers, students, neighbors, friends, and family. The portal is designed to make participation easy."
The user-friendly site provides a wealth of collateral to foster participation in National Cyber Security Awareness Month. From printable collateral to school curriculum for volunteers, the Web site is divided into easily navigable sections with ideas and opportunities for spreading safe and secure online practices including:
-- Customizable Posters: For the first time, there is a special National
Cyber Security Awareness Month poster that is customizable with a logo
or a message to help promote local activities.
-- Wide Variety of Media Tools: Other information and resources include
Web banners, brochures, and tip sheets for helping everyone build
awareness programs to help spread the word about how computer users
can protect themselves and our Internet infrastructure.
-- Endorsement Forms: Organizations, companies, and government agencies
can show their commitment to cybersecurity by endorsing National Cyber
Security Awareness month through an online endorsement form. Endorsers
can have their logo and web link on NCSA's website staysafeonline.org.
-- School Volunteer Program Templates and Curriculum: Reaching young
people is critical and companies and individuals are encouraged to
help young people stay safe online. NCSA's Cyber Security Awareness
Volunteer Education (C-SAVE) program is designed to help schools fill
the gap in cybersecurity education. C-SAVE volunteers are provided
with classroom presentations created by a former teacher.
Presentations are available for grades K-2, 3-5, and 6-12 and focus on
educating young people about cybersecurity and online safety issues.
-- Event Calendar: The NCSA keeps a robust calendar of National Cyber
Security Awareness Month events and welcomes submissions through a new
online form.
NOTE: All NCSA materials are free and there is no cost for endorsements or event listings.
President Obama recently released the "Cyberspace Policy Review" calling for a national campaign to promote cybersecurity awareness and digital literacy and to build a digital workforce for the 21st century. National Cyber Security Awareness Month compliments the President's public awareness priority by actively engaging public and private sector partners through events and initiatives to increase overall awareness and minimize vulnerabilities.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
"The theme of National Cyber Security Awareness Month this year is "Our Shared Responsibility," said Michael Kaiser, executive director of the NCSA. "We can only secure cyber space if everyone gets involved in making sure that all computer users engage in safe and secure practices to protect the computers and networks they use. October is a rallying point for everyone to get involved in educating their employees, customers, students, neighbors, friends, and family. The portal is designed to make participation easy."
The user-friendly site provides a wealth of collateral to foster participation in National Cyber Security Awareness Month. From printable collateral to school curriculum for volunteers, the Web site is divided into easily navigable sections with ideas and opportunities for spreading safe and secure online practices including:
-- Customizable Posters: For the first time, there is a special National
Cyber Security Awareness Month poster that is customizable with a logo
or a message to help promote local activities.
-- Wide Variety of Media Tools: Other information and resources include
Web banners, brochures, and tip sheets for helping everyone build
awareness programs to help spread the word about how computer users
can protect themselves and our Internet infrastructure.
-- Endorsement Forms: Organizations, companies, and government agencies
can show their commitment to cybersecurity by endorsing National Cyber
Security Awareness month through an online endorsement form. Endorsers
can have their logo and web link on NCSA's website staysafeonline.org.
-- School Volunteer Program Templates and Curriculum: Reaching young
people is critical and companies and individuals are encouraged to
help young people stay safe online. NCSA's Cyber Security Awareness
Volunteer Education (C-SAVE) program is designed to help schools fill
the gap in cybersecurity education. C-SAVE volunteers are provided
with classroom presentations created by a former teacher.
Presentations are available for grades K-2, 3-5, and 6-12 and focus on
educating young people about cybersecurity and online safety issues.
-- Event Calendar: The NCSA keeps a robust calendar of National Cyber
Security Awareness Month events and welcomes submissions through a new
online form.
NOTE: All NCSA materials are free and there is no cost for endorsements or event listings.
President Obama recently released the "Cyberspace Policy Review" calling for a national campaign to promote cybersecurity awareness and digital literacy and to build a digital workforce for the 21st century. National Cyber Security Awareness Month compliments the President's public awareness priority by actively engaging public and private sector partners through events and initiatives to increase overall awareness and minimize vulnerabilities.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Tuesday, August 11, 2009
AT&T Strengthens 3G Wireless Broadband Coverage In and Around Atlanta
/PRNewswire/ -- AT&T* today announced a substantial enhancement to its local 3G wireless broadband network with the launch of additional wireless spectrum in the 850 MHz band. This new spectrum adds significant capacity to the network to support ever-growing demand for 3G mobile broadband service, and provides improved in-building 3G wireless coverage for customers across the metropolitan Atlanta and surrounding areas including parts of Fulton, DeKalb, North Fulton, Cobb, Gwinnett, and Fayette Counties.
The network enhancement is part of AT&T's continual efforts to enhance and expand the scope, capacity and speed of its 3G wireless network - the fastest 3G network in Atlanta, according to recent data compiled by leading independent wireless research firms. It is also part of AT&T's ongoing investment to build the broadband networks that will create jobs and fuel economic growth, and enable its customers to quickly access the content, applications and services that matter most to them.
"Our mission is to connect people with their world, everywhere they live and work, and to do it better than anyone else," said Sylvia Russell, president-AT&T Georgia. "This substantial network upgrade is part of our commitment to deliver the nation's fastest 3G connectivity along with the highest possible levels of service quality and reliability."
"A thriving economy is driven by the ability of businesses to connect, and the investments AT&T continues to make in Georgia help us attract and retain jobs and build strong communities," said Georgia Governor Sonny Perdue. "By enhancing existing networks and bringing innovative communications technologies to Georgia, AT&T is helping position our state to be a leader as the economy recovers."
The 850 MHz spectrum has been added to the existing 1900 MHz spectrum across more than 540 cell sites in and around Atlanta to deliver a substantial increase in overall network capacity in these areas. Overall, the effort enhances 3G wireless broadband coverage across more than 3,800 square miles. The 850 MHz spectrum is part of the highest-quality spectrum band available. While specific benefits of the new spectrum will vary by location, AT&T 3G customers should receive improved quality and coverage. AT&T will continue work to fully optimize the new spectrum over the next several weeks.
"We know many of our customers depend on wireless as their primary communications connection to work, family and friends, and our mission is to ensure that every time a customer hits the 'send' key, whatever the application, it just gets done," said Keith Holmes, vice president and general manager, AT&T Mobility & Consumer Markets for Georgia. "We're enhancing our network every day to help customers do more with and get more from their wireless connections."
In markets where the 850MHz spectrum has been deployed, AT&T technicians who continuously monitor network performance for service quality and coverage have seen significant increases in total 3G data traffic.
"Atlanta consistently ranks as one of the most technology-savvy cities, and investments in technology and broadband continue to position our region for success," said Sam A. Williams, president of the Metro Atlanta Chamber. "We are truly becoming a national hotbed for technology innovation and investment."
The AT&T 3G network opens the door to a new era of advanced mobile services, devices and feature-rich audio and video content, such as AT&T Video Share(SM), a first-of-its-kind technology that allows users to share live video during a wireless call.
AT&T's wireless network is based on the 3rd Generation Partnership Project (3GPP) family of technologies, which includes GSM and UMTS, the most open and widely used wireless network platforms in the world. As a result, only AT&T can offer 3G data roaming in more than 70 countries, as well as voice calling in more than 200 countries, in addition to AT&T's continuously expanding U.S. 3G footprint.
AT&T also enables unsurpassed choice and openness in the range of devices, services and applications compatible with its 3G network. AT&T offers a wide variety of devices from more than a dozen manufacturers, including handsets that are compatible with six different operating systems and five different e-mail applications. Our Media Mall 2.0 offers more than 90,000 content options, and customers can download virtually any application over the Internet. Additionally, AT&T supports a community of more than 13,000 application developers via its devCentral portal.
AT&T's 3G network is now available in more than 350 U.S. major metropolitan areas. AT&T plans to deploy 850 MHz spectrum in the majority of these markets over the course of 2009.
*AT&T products and services are provided or offered by subsidiaries and affiliates of AT&T Inc. under the AT&T brand and not by AT&T Inc.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
The network enhancement is part of AT&T's continual efforts to enhance and expand the scope, capacity and speed of its 3G wireless network - the fastest 3G network in Atlanta, according to recent data compiled by leading independent wireless research firms. It is also part of AT&T's ongoing investment to build the broadband networks that will create jobs and fuel economic growth, and enable its customers to quickly access the content, applications and services that matter most to them.
"Our mission is to connect people with their world, everywhere they live and work, and to do it better than anyone else," said Sylvia Russell, president-AT&T Georgia. "This substantial network upgrade is part of our commitment to deliver the nation's fastest 3G connectivity along with the highest possible levels of service quality and reliability."
"A thriving economy is driven by the ability of businesses to connect, and the investments AT&T continues to make in Georgia help us attract and retain jobs and build strong communities," said Georgia Governor Sonny Perdue. "By enhancing existing networks and bringing innovative communications technologies to Georgia, AT&T is helping position our state to be a leader as the economy recovers."
The 850 MHz spectrum has been added to the existing 1900 MHz spectrum across more than 540 cell sites in and around Atlanta to deliver a substantial increase in overall network capacity in these areas. Overall, the effort enhances 3G wireless broadband coverage across more than 3,800 square miles. The 850 MHz spectrum is part of the highest-quality spectrum band available. While specific benefits of the new spectrum will vary by location, AT&T 3G customers should receive improved quality and coverage. AT&T will continue work to fully optimize the new spectrum over the next several weeks.
"We know many of our customers depend on wireless as their primary communications connection to work, family and friends, and our mission is to ensure that every time a customer hits the 'send' key, whatever the application, it just gets done," said Keith Holmes, vice president and general manager, AT&T Mobility & Consumer Markets for Georgia. "We're enhancing our network every day to help customers do more with and get more from their wireless connections."
In markets where the 850MHz spectrum has been deployed, AT&T technicians who continuously monitor network performance for service quality and coverage have seen significant increases in total 3G data traffic.
"Atlanta consistently ranks as one of the most technology-savvy cities, and investments in technology and broadband continue to position our region for success," said Sam A. Williams, president of the Metro Atlanta Chamber. "We are truly becoming a national hotbed for technology innovation and investment."
The AT&T 3G network opens the door to a new era of advanced mobile services, devices and feature-rich audio and video content, such as AT&T Video Share(SM), a first-of-its-kind technology that allows users to share live video during a wireless call.
AT&T's wireless network is based on the 3rd Generation Partnership Project (3GPP) family of technologies, which includes GSM and UMTS, the most open and widely used wireless network platforms in the world. As a result, only AT&T can offer 3G data roaming in more than 70 countries, as well as voice calling in more than 200 countries, in addition to AT&T's continuously expanding U.S. 3G footprint.
AT&T also enables unsurpassed choice and openness in the range of devices, services and applications compatible with its 3G network. AT&T offers a wide variety of devices from more than a dozen manufacturers, including handsets that are compatible with six different operating systems and five different e-mail applications. Our Media Mall 2.0 offers more than 90,000 content options, and customers can download virtually any application over the Internet. Additionally, AT&T supports a community of more than 13,000 application developers via its devCentral portal.
AT&T's 3G network is now available in more than 350 U.S. major metropolitan areas. AT&T plans to deploy 850 MHz spectrum in the majority of these markets over the course of 2009.
*AT&T products and services are provided or offered by subsidiaries and affiliates of AT&T Inc. under the AT&T brand and not by AT&T Inc.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Friday, August 7, 2009
Michael Jackson's Death, Swine Flu and Obama's Presidency Were Top Three Issues Used to Distribute Malware This Year, According to PandaLabs
/PRNewswire/ -- Panda Security, the Cloud Security Company, today announced that PandaLabs, the company's laboratory for detecting and analyzing malware, has published an analysis of major malware campaigns in 2009 and determined that cybercriminals are more frequently using current events as their primary vehicles for distributing malware.
Michael Jackson's death, swine flu and Barack Obama's political campaign and presidency have been the top issues used by hackers in the past year to distribute viruses via email or through social media such as Twitter or Facebook. By being aware of people's increasing use of the Internet to search for the latest news on social events, virus creators are relying upon highly trafficked terms and the latest news items as bait to spread viruses.
Issues involving applications for spying on partners when suspecting infidelity are also highly successful. For example, attackers have been offering applications that supposedly allow people to read the SMS messages sent or received on a specific cell phone via the Internet. Visual representations of these types of messages can be found here on Flickr:
http://farm4.static.flickr.com/3574/3788395766_453dee9d10_m.jpg
http://farm4.static.flickr.com/3458/3788395738_812abf7621_m.jpg
PandaLabs' study of the top issues cybercriminals used from January to July to distribute viruses resulted in the following breakdown:
Topic %
Michael Jackson's death 30%
H1N1 (swine flu) virus 27%
Obama's campaign and presidency 11%
Software to spy on partners' SMSs 9%
Independence Day 8%
Reuters agency news 5%
Online shopping discount vouchers 4%
Valentine's Day cards 2%
Farrah Fawcett's death 2%
Links to Pussycat Dolls videos 1%
Other 1%
One of the most active virus families as of late is Waledac. Waledac appeared two years ago and is still thriving, using topics like those above. For more information about these techniques, please visit: http://www.pandasecurity.com/img/enc/Boletines%20PandaLabs5_en.pdf.
Simple Tips to Avoid Falling Victim
Usually, once attackers have attracted attention, they redirect users to web pages to view or download something. However, YouTube's official website, for example, does not require users to download a codec to watch videos. If you are taken to a Web page that looks exactly the same as a legitimate one, such as YouTube, for example, make sure that the URL displayed in the address bar is the official one.
If you don't know what the official address is, find it by performing a search in any of the search engines that you normally use. Generally, the first result corresponds to the official site.
You can use security software to avoid carrying out these checks manually.
If you do not have a solution that provides this service and do not know whether the Web page accessed is dubious, you can still prevent your computer from being infected. Remember that you must agree to the file download for the malicious code to download and install on the system. Finally, scan every file with a security solution before running it.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Michael Jackson's death, swine flu and Barack Obama's political campaign and presidency have been the top issues used by hackers in the past year to distribute viruses via email or through social media such as Twitter or Facebook. By being aware of people's increasing use of the Internet to search for the latest news on social events, virus creators are relying upon highly trafficked terms and the latest news items as bait to spread viruses.
Issues involving applications for spying on partners when suspecting infidelity are also highly successful. For example, attackers have been offering applications that supposedly allow people to read the SMS messages sent or received on a specific cell phone via the Internet. Visual representations of these types of messages can be found here on Flickr:
http://farm4.static.flickr.com/3574/3788395766_453dee9d10_m.jpg
http://farm4.static.flickr.com/3458/3788395738_812abf7621_m.jpg
PandaLabs' study of the top issues cybercriminals used from January to July to distribute viruses resulted in the following breakdown:
Topic %
Michael Jackson's death 30%
H1N1 (swine flu) virus 27%
Obama's campaign and presidency 11%
Software to spy on partners' SMSs 9%
Independence Day 8%
Reuters agency news 5%
Online shopping discount vouchers 4%
Valentine's Day cards 2%
Farrah Fawcett's death 2%
Links to Pussycat Dolls videos 1%
Other 1%
One of the most active virus families as of late is Waledac. Waledac appeared two years ago and is still thriving, using topics like those above. For more information about these techniques, please visit: http://www.pandasecurity.com/img/enc/Boletines%20PandaLabs5_en.pdf.
Simple Tips to Avoid Falling Victim
Usually, once attackers have attracted attention, they redirect users to web pages to view or download something. However, YouTube's official website, for example, does not require users to download a codec to watch videos. If you are taken to a Web page that looks exactly the same as a legitimate one, such as YouTube, for example, make sure that the URL displayed in the address bar is the official one.
If you don't know what the official address is, find it by performing a search in any of the search engines that you normally use. Generally, the first result corresponds to the official site.
You can use security software to avoid carrying out these checks manually.
If you do not have a solution that provides this service and do not know whether the Web page accessed is dubious, you can still prevent your computer from being infected. Remember that you must agree to the file download for the malicious code to download and install on the system. Finally, scan every file with a security solution before running it.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Tuesday, August 4, 2009
NASA Astronaut Sends First Tweets From Space Station
/PRNewswire/ -- NASA astronaut and U.S. Army Col. Tim Kopra has become the first International Space Station crew member to use the social media tool Twitter to discuss living and working in orbit.
Kopra (@Astro_Tim) recently joined the Expedition 20 crew after arriving at the orbiting laboratory July 17 aboard space shuttle Endeavour. He is set to return to Earth on the STS-128 mission, which is targeted to launch Aug. 25. To follow Kopra on Twitter, visit:
www.twitter.com/Astro_Tim
Kopra will provide followers with a unique perspective as an Expedition 20 flight engineer and member of the Army. He is an Army aviator and West Point graduate. He periodically will answer questions submitted on the Army's Web site. To submit questions and view Kopra's answers, visit:
www.goarmy.com/space
This is Kopra's first spaceflight. He completed his first spacewalk July 18 during the STS-127 mission. Kopra is in orbit with station Commander Gennady Padalka and Roman Romanenko -- both Russian cosmonauts -- and NASA astronaut Mike Barratt, European Space Agency astronaut Frank DeWinne and Canadian Space Agency astronaut Bob Thirsk.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Kopra (@Astro_Tim) recently joined the Expedition 20 crew after arriving at the orbiting laboratory July 17 aboard space shuttle Endeavour. He is set to return to Earth on the STS-128 mission, which is targeted to launch Aug. 25. To follow Kopra on Twitter, visit:
www.twitter.com/Astro_Tim
Kopra will provide followers with a unique perspective as an Expedition 20 flight engineer and member of the Army. He is an Army aviator and West Point graduate. He periodically will answer questions submitted on the Army's Web site. To submit questions and view Kopra's answers, visit:
www.goarmy.com/space
This is Kopra's first spaceflight. He completed his first spacewalk July 18 during the STS-127 mission. Kopra is in orbit with station Commander Gennady Padalka and Roman Romanenko -- both Russian cosmonauts -- and NASA astronaut Mike Barratt, European Space Agency astronaut Frank DeWinne and Canadian Space Agency astronaut Bob Thirsk.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Labels:
astronaut,
atlanta,
fayette front page,
georgia,
georgia front page,
nasa,
space station,
twitter
Sunday, August 2, 2009
Will Skype Survive the Legal Battle?
Shock threat to shut Skype
Asher Moses
July 31, 2009
eBay says it may have to shut down Skype due to a licensing dispute with the founders of the internet telephony service.
The surprise admission puts a cloud over the 40 million active daily users around the world who use Skype for business or to keep in touch with friends and far-flung relatives.....http://www.theage.com.au/technology/biz-tech/shock-threat-to-shut-skype-20090731-e3qe.html
-----
Community News You Can Use
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Asher Moses
July 31, 2009
eBay says it may have to shut down Skype due to a licensing dispute with the founders of the internet telephony service.
The surprise admission puts a cloud over the 40 million active daily users around the world who use Skype for business or to keep in touch with friends and far-flung relatives.....http://www.theage.com.au/technology/biz-tech/shock-threat-to-shut-skype-20090731-e3qe.html
-----
Community News You Can Use
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Thursday, July 30, 2009
Online Rental Ads Could be Phony
You can’t believe your good fortune—you find a rental home in a nice area through a Craigslist classified ad at an unbelievably low rate. The landlord—who had to leave the country and travel to Nigeria—asks that you wire him two months’ worth of rent. You arrive at the home on the agreed-upon date, but there’s just one small problem—the house is not actually for rent and its owners know nothing about your agreement.
This latest scam being perpetrated by Nigerian criminals located halfway around the world has been seen in a number of U.S. states, perhaps in response to the current housing market—with fewer people buying, more people are renting.
share.gif
But it’s not really a new scam, just a variation of an old one. The so-called 419 scheme—named after the Nigerian penal code section under which this particular kind of fraud is prosecuted—has been around since the early 1980s. The common thread running through these kinds of scams? The victims are solicited by Nigerian criminals to transfer money out of the U.S. and into the criminals’ pockets…usually by being promised something in return. And these schemes are profitable, costing victims millions of dollars annually.
In South Carolina, the rental scam problem has become so prevalent that Columbia FBI Special Agent in Charge David Thomas recently issued a warning about it to homeowners and prospective renters, particularly in the Charleston, Columbia, and Hilton Head areas. The scam has also ensnared victims in Rhode Island, Illinois, Colorado, and California, among other states.
How exactly does the rental housing scam work? The criminals search websites that list homes for sale. They take the information in those ads—lock, stock, and barrel—and post it, with their own e-mail address, in an ad on Craigslist (without Craigslist’s consent or knowledge) under the housing rentals category. To sweeten the pot, the houses are almost always listed with below-market rental rates.
An interested party will contact the “homeowner” via e-mail, who usually explains that he or she had to leave the U.S. quickly because of some missionary or contract work in Africa. Victims are usually instructed to send money overseas—enough to cover the first and last month’s rent—via a wire transfer service (because the crooks know it can’t be traced once it gets picked up on the other end).
Renters might sometimes be asked to fill out credit applications asking for personal information like credit history, social security numbers, and work history. The Nigerian crooks can then use this info to commit identity fraud and steal even more money from their victims.
How to avoid being victimized:
* Only deal with landlords or renters who are local;
* Be suspicious if you’re asked to only use a wire transfer service;
* Beware of e-mail correspondence from the “landlord” that’s written in poor or broken English;
* Research the average rental rates in that area and be suspicious if the rate is significantly lower;
* Don’t give out personal information, like social security, bank account, or credit card numbers.
If you suspect a scam, have already been victimized, or know someone who has fallen victim to a scam, please report it to our Internet Crime Complaint Center to help us determine the extent of the problem.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
This latest scam being perpetrated by Nigerian criminals located halfway around the world has been seen in a number of U.S. states, perhaps in response to the current housing market—with fewer people buying, more people are renting.
share.gif
But it’s not really a new scam, just a variation of an old one. The so-called 419 scheme—named after the Nigerian penal code section under which this particular kind of fraud is prosecuted—has been around since the early 1980s. The common thread running through these kinds of scams? The victims are solicited by Nigerian criminals to transfer money out of the U.S. and into the criminals’ pockets…usually by being promised something in return. And these schemes are profitable, costing victims millions of dollars annually.
In South Carolina, the rental scam problem has become so prevalent that Columbia FBI Special Agent in Charge David Thomas recently issued a warning about it to homeowners and prospective renters, particularly in the Charleston, Columbia, and Hilton Head areas. The scam has also ensnared victims in Rhode Island, Illinois, Colorado, and California, among other states.
How exactly does the rental housing scam work? The criminals search websites that list homes for sale. They take the information in those ads—lock, stock, and barrel—and post it, with their own e-mail address, in an ad on Craigslist (without Craigslist’s consent or knowledge) under the housing rentals category. To sweeten the pot, the houses are almost always listed with below-market rental rates.
An interested party will contact the “homeowner” via e-mail, who usually explains that he or she had to leave the U.S. quickly because of some missionary or contract work in Africa. Victims are usually instructed to send money overseas—enough to cover the first and last month’s rent—via a wire transfer service (because the crooks know it can’t be traced once it gets picked up on the other end).
Renters might sometimes be asked to fill out credit applications asking for personal information like credit history, social security numbers, and work history. The Nigerian crooks can then use this info to commit identity fraud and steal even more money from their victims.
How to avoid being victimized:
* Only deal with landlords or renters who are local;
* Be suspicious if you’re asked to only use a wire transfer service;
* Beware of e-mail correspondence from the “landlord” that’s written in poor or broken English;
* Research the average rental rates in that area and be suspicious if the rate is significantly lower;
* Don’t give out personal information, like social security, bank account, or credit card numbers.
If you suspect a scam, have already been victimized, or know someone who has fallen victim to a scam, please report it to our Internet Crime Complaint Center to help us determine the extent of the problem.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Labels:
419 scheme,
atlanta,
fayette front page,
fbi,
georgia,
georgia front page,
housing market,
nigerian,
rental scam
Wednesday, July 29, 2009
How to Keep Kids Out of Cyber-Trouble: Top Tips for 6 Problem Areas
/PRNewswire/ -- Every day, it seems, the news carries another cyber-horror story. Last week, five Internet predators in Pennsylvania were arrested for sexually propositioning undercover agents in a chat room, in several cases sending nude webcam videos of themselves to agents they believed were 13- and 14-year-old girls. On the same day, a truck driver in England pleaded guilty to seven counts of rape after admitting forming relationships with two girls on the Internet before sexually assaulting them.
For parents, the first line of defense against Internet dangers is to have frank and ongoing discussions about online stranger-danger, the need to keep personal information private, and the potential consequences of inappropriate online behavior. A revealing photo sent on a cellphone or posted on a social network site, for example, can live on in cyberspace for years with damaging effects on everything from personal relationships to job prospects. And a flirtatious online conversation can literally turn deadly.
Beyond the need for parent-child communication on the subject of cyber-risks, InternetSafety.com
recommends a variety of strategies that parents can use to help keep their children safe. Here are some basic tips for six common activities:
-- Sexting - The increasingly common practice of sending sexually
suggestive text messages, photos or videos through cell phones is a
big worry. It can invite public humiliation, cyberbullying or even
sexual assault. Teenagers are even being charged with child
pornography for sending or posting racy photos. One way to limit
children's sexting opportunities is to retrieve their cellphones at
night and charge them in the parents' room. Phones today are simply
small computers, and they should be regulated in the same way as those
larger machines.
-- Social Networking - Rule #1 is that children should never post
anything they wouldn't be comfortable showing to their parents,
teacher, or youth worker. One way to discourage inappropriate entries
is to join the social networks that your kids are on and 'friend' your
own children so that you can monitor what they're posting.
-- Chatting - Chat rooms are not only nesting places for predators, but
they often indirectly encourage rude and even abusive interactions
between users due to the anonymity and lack of consequences. If your
child is using chat rooms, find out which ones and check them out for
yourself. If you are uncomfortable with specific chat sites, you might
consider using filtering software to block access to those sites or
log all chats for later review.
-- Gaming - Increasingly popular MMOGs (Massive Multiplayer Online Games)
like Final Fantasy and World of Warcraft are massively addictive, with
reports of non-stop sessions as long as 48 or 72 hours. To prevent the
unhealthy practice of spending more time in a virtual world than a
real one, parents should either refuse to buy these games or impose
time limits. (The American Academy of Pediatrics recommends no more
than two hours of screen time per day per child 12 and under.) If the
child breaks the rules, simply uninstall the game from the computer or
confiscate the disc.
-- Searching - On most popular search engines including Google, the
safe-search settings aren't completely effective and are easy to turn
off. For that reason, younger children should not have a computer in
their room, and their computer use should be supervised. Filtering
software can also protect both younger and older children from
exposure to websites with adult, violent or other inappropriate
content.
-- File-Sharing - Peer-to-peer (P2P) file-sharing networks such as
BitTorrent, uTorrent, Bearshare and Limewire allow totally unregulated
access to files that other network members have shared, including
illegal pirated material and child pornography, not to mention opening
computers to security risks. Banning these programs in your home is a
good idea. Check your family computer periodically to be sure that no
one has downloaded any of them, and remove them if they have.
More tips as well as tools to safeguard children against cyber-dangers can be found at www.internetsafety.com .
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
www.artsacrossgeorgia.com
Arts Across Georgia
For parents, the first line of defense against Internet dangers is to have frank and ongoing discussions about online stranger-danger, the need to keep personal information private, and the potential consequences of inappropriate online behavior. A revealing photo sent on a cellphone or posted on a social network site, for example, can live on in cyberspace for years with damaging effects on everything from personal relationships to job prospects. And a flirtatious online conversation can literally turn deadly.
Beyond the need for parent-child communication on the subject of cyber-risks, InternetSafety.com
recommends a variety of strategies that parents can use to help keep their children safe. Here are some basic tips for six common activities:
-- Sexting - The increasingly common practice of sending sexually
suggestive text messages, photos or videos through cell phones is a
big worry. It can invite public humiliation, cyberbullying or even
sexual assault. Teenagers are even being charged with child
pornography for sending or posting racy photos. One way to limit
children's sexting opportunities is to retrieve their cellphones at
night and charge them in the parents' room. Phones today are simply
small computers, and they should be regulated in the same way as those
larger machines.
-- Social Networking - Rule #1 is that children should never post
anything they wouldn't be comfortable showing to their parents,
teacher, or youth worker. One way to discourage inappropriate entries
is to join the social networks that your kids are on and 'friend' your
own children so that you can monitor what they're posting.
-- Chatting - Chat rooms are not only nesting places for predators, but
they often indirectly encourage rude and even abusive interactions
between users due to the anonymity and lack of consequences. If your
child is using chat rooms, find out which ones and check them out for
yourself. If you are uncomfortable with specific chat sites, you might
consider using filtering software to block access to those sites or
log all chats for later review.
-- Gaming - Increasingly popular MMOGs (Massive Multiplayer Online Games)
like Final Fantasy and World of Warcraft are massively addictive, with
reports of non-stop sessions as long as 48 or 72 hours. To prevent the
unhealthy practice of spending more time in a virtual world than a
real one, parents should either refuse to buy these games or impose
time limits. (The American Academy of Pediatrics recommends no more
than two hours of screen time per day per child 12 and under.) If the
child breaks the rules, simply uninstall the game from the computer or
confiscate the disc.
-- Searching - On most popular search engines including Google, the
safe-search settings aren't completely effective and are easy to turn
off. For that reason, younger children should not have a computer in
their room, and their computer use should be supervised. Filtering
software can also protect both younger and older children from
exposure to websites with adult, violent or other inappropriate
content.
-- File-Sharing - Peer-to-peer (P2P) file-sharing networks such as
BitTorrent, uTorrent, Bearshare and Limewire allow totally unregulated
access to files that other network members have shared, including
illegal pirated material and child pornography, not to mention opening
computers to security risks. Banning these programs in your home is a
good idea. Check your family computer periodically to be sure that no
one has downloaded any of them, and remove them if they have.
More tips as well as tools to safeguard children against cyber-dangers can be found at www.internetsafety.com .
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
www.artsacrossgeorgia.com
Arts Across Georgia
Friday, July 24, 2009
U.S. Forces Afghanistan Logs 20,000 Facebook Fans
U.S. Forces Afghanistan's Facebook page logged its 20,000th fan today, passing the milestone a little more than two months after going public, making it the fastest-growing official military Facebook page, military officials here said.
The fan page at http://www.facebook.com/usforcesafghanistan is one of the main tools used by the U.S. military in Afghanistan to disseminate news and imagery from its operations, and counter and pre-empt extremist propaganda, officials said.
In June, for example, command officials posted video on the page to quickly counter terrorist claims that U.S. troops had attacked civilians in the city of Asadabad. The video, captured by Combined Joint Task Force 82, exonerated U.S. troops and shifted blame for the attack to insurgents, who threw a grenade into a crowd gathered near a disabled American truck.
The command used the site in May to display a series of videos taken from the biggest drug interdiction operation of the war. More recently, officials shared videos of U.S. air strikes, illustrating the care forces take to ensure civilian safety when using close-air support.
As subscribers to the page, fans receive regular updates from the U.S. headquarters here. Roughly 2,000 people, including fans, visit the page daily. Fans also have full access to post their own comments, links, photos and videos.
To date, the page has fans from at least 18 countries, and is followed by major U.S. and Western media organizations and celebrities. The page's fan base has expanded rapidly, adding more than 250 followers per day, on average, since the launch. Nearly 250 news releases, 19 videos and hundreds of photos have been added to the site.
(American Forces Press Service; From a U.S. Forces Afghanistan news release.)
---
Community News You Can Use
Follow us on Twitter: @gafrontpage
www.FayetteFrontPage.com
www.GeorgiaFrontPage.com
www.PoliticalPotluck.com
www.ArtsAcrossGeorgia.com
---
The fan page at http://www.facebook.com/usforcesafghanistan is one of the main tools used by the U.S. military in Afghanistan to disseminate news and imagery from its operations, and counter and pre-empt extremist propaganda, officials said.
In June, for example, command officials posted video on the page to quickly counter terrorist claims that U.S. troops had attacked civilians in the city of Asadabad. The video, captured by Combined Joint Task Force 82, exonerated U.S. troops and shifted blame for the attack to insurgents, who threw a grenade into a crowd gathered near a disabled American truck.
The command used the site in May to display a series of videos taken from the biggest drug interdiction operation of the war. More recently, officials shared videos of U.S. air strikes, illustrating the care forces take to ensure civilian safety when using close-air support.
As subscribers to the page, fans receive regular updates from the U.S. headquarters here. Roughly 2,000 people, including fans, visit the page daily. Fans also have full access to post their own comments, links, photos and videos.
To date, the page has fans from at least 18 countries, and is followed by major U.S. and Western media organizations and celebrities. The page's fan base has expanded rapidly, adding more than 250 followers per day, on average, since the launch. Nearly 250 news releases, 19 videos and hundreds of photos have been added to the site.
(American Forces Press Service; From a U.S. Forces Afghanistan news release.)
---
Community News You Can Use
Follow us on Twitter: @gafrontpage
www.FayetteFrontPage.com
www.GeorgiaFrontPage.com
www.PoliticalPotluck.com
www.ArtsAcrossGeorgia.com
---
Subscribe to:
Posts (Atom)