Author: Admin

Wikinews interviews Jim Hedges, U.S. Prohibition Party presidential candidate

Saturday, January 29, 2011

U.S. Prohibition Party presidential candidate Jim Hedges of Thompson Township, Pennsylvania took some time to answer a few questions about the Prohibition Party and his 2012 presidential campaign.

The Prohibition Party is the third oldest existing political party in the United States, having been established in 1869. It reached its height of popularity during the late 19th century. The party heavily supported the Eighteenth Amendment to the United States Constitution, which banned the sale of alcohol, and resulted in the US period known as Prohibition (1919–33). It was repealed in 1933. The party has declined since this period, but has continued to nominate candidates for the presidential election.

In 2003, the party split into two factions. Preacher Gene Amondson and perennial candidate Earl Dodge were nominated for the presidency by their respective factions. After Dodge’s death in 2007, the party reunified and named Amondson as its sole presidential nominee for 2008. During the election, Amondson was interviewed by Wikinews. He died in 2009, leaving an opening in the party for 2012.

Jim Hedges is a longtime Prohibition activist, who holds the distinction of the first individual of the 21st century (and the first since 1959) to be elected to a political office under the Prohibition Party banner. In 2001, he was elected as the Thompson Township tax assessor, and was re-elected to the post in 2005. He served until his term expired in 2010. Hedges declared his intent to run for the Prohibition Party presidential nomination on February 18, 2010. This marks his first run for the presidency.

Retrieved from “https://en.wikinews.org/w/index.php?title=Wikinews_interviews_Jim_Hedges,_U.S._Prohibition_Party_presidential_candidate&oldid=4261311”

Anthrocon 2007 draws thousands to Pittsburgh for furry weekend

Tuesday, July 17, 2007

Pittsburgh, Pennsylvania — Local caterers get ready for big business, as almost three thousand fans converge on the David L. Lawrence Convention Center over the Independence Day weekend for the world’s largest ever furry convention, Anthrocon 2007.

Many hope to renew acquaintances, or meet new friends. Others look to buy from dealers and artists, or show off new artwork or costumes. Some attend to make money, or even learn a thing or two. But one thing unites them: They’re all there to have fun.

Retrieved from “https://en.wikinews.org/w/index.php?title=Anthrocon_2007_draws_thousands_to_Pittsburgh_for_furry_weekend&oldid=4606745”

Inaugural African Protected Areas Congress closes

Thursday, July 28, 2022

The inaugural African Protected Areas Congress hosted in Kigali, Rwanda, closed on Saturday with delegates adopting the Kigali Call to Action, committing countries to greater investments in the conservation of nature.

The conference ran from July 18-23, and was organised by Rwanda, the International Union for Conservation of Nature and the African Wildlife Foundation, with the aim of discussing the challenges and opportunities in the conservation of nature and wildlife across Africa. Over 2300 delegates were present representing countries, the private sector, indigenous groups and conservation organisations.

Initiatives included the launching of a Pan-African Conservation Trust, with African governments encouraged to approve its establishment. This would see a $200 billion pan-African trust fund created for the financing of all 8,500 of Africa’s protected areas in perpetuity.

Congress closed with delegates adopting the Kigali Call to Action, committing countries to spending 1% of their GDP on funding biodiversity programs, alongside increasing collaborations between the public and private sectors. The Call to Action also called for the strengthening of the rights of indigenous peoples and local communities.

Retrieved from “https://en.wikinews.org/w/index.php?title=Inaugural_African_Protected_Areas_Congress_closes&oldid=4691862”

Senior UK politicians talk at Confederation of British Industry conference

Monday, November 21, 2016

UK Prime Minister Theresa May and opposition leader Jeremy Corbyn both spoke at the annual Confederation of British Industry conference today, talking about Britain after its planned ‘Brexit’ from the European Union, and future plans for business.

May formally announced plans to cut corporation tax from 20%, without giving details, in order to discourage businesses from leaving the UK post-Brexit. Corbyn said in his speech he believes investment by the government on things such as infrastructure improvements is shared ground between Labour and businesses but “businesses will need to contribute” meaning “some increase in corporation tax” under his administration.

Theresa May also toned down plans to put ordinary workers on corporate boards, a campaign promise from running to become leader of the ruling Conservative Party. She said she is working to create a “model that works for everyone” after consulting firms and the general public, with possible plans including panels or advisory committees. The General Secretary of the Trades Union Congress responded by saying “Theresa May made a clear promise to have workers represented on company boards […] This is not the way to show that you want to govern for ordinary working people.” Jeremy Corbyn also criticised this announcement saying “we need to see genuine employee representation at board level, which the prime minister promised, but I see is already backing away from.”

Theresa May also announced she wishes to spend £2Bn annually in research and development, as well as plans to start a small business research initiative to look into helping innovators get ahead. Jeremy Corbyn however said he plans to spend 3% of the UK’s GDP on R&D, significantly more than specified by May.

Jeremy Corbyn’s plans for the UK’s economy focussed on investment. Speaking at the conference he said “First and foremost, a Labour government will prioritise investing in our economy.” As well as the investment in research, Corbyn also promised funds for areas including house building and infrastructure. This would be controlled by the proposed “National Investment Bank”. Corbyn said “Our National Investment Bank will deliver long term strategic investment in our under-powered infrastructure and provide the patient finance that our businesses need across the country.”

May told the conference she would not give “a running commentary on every twist and turn” of the Brexit negotiations. This comes after allegation in the press that she she has no plan to keep under wraps, a claim that has been backed up by an alleged leaked internal government memo that talks about a “lack of overall negotiation strategy” within government.

Retrieved from “https://en.wikinews.org/w/index.php?title=Senior_UK_politicians_talk_at_Confederation_of_British_Industry_conference&oldid=4267141”

Category:Health

This is the category for Health.

Refresh this list to see the latest articles.

  • 30 September 2022: Shooting injures three at Kennywood amusement park in Pennsylvania, US
  • 9 September 2022: Top Thrill Dragster roller coaster in Ohio, US permanently closed following serious accident
  • 6 September 2022: Texas identifies first death involving monkeypox
  • 11 July 2022: Virginia reports suspected monkeypox case
  • 17 May 2022: Bans off Our Bodies protests occur across United States after leaked Supreme Court draft
  • 17 May 2022: UK defers junk food deals, advertisement restrictions
  • 22 April 2022: Indian capital New Delhi reports surge in COVID-19 cases
  • 24 March 2022: India grants Novavax Covid-19 vaccine emergency use authorisation for teens
  • 19 March 2022: Scientists announce decoy-proof Ebola antibodies
  • 2 February 2022: Tonga enters lockdown after detecting new COVID-19 cases
?Category:Health

You can also browse through all articles in this category alphabetically.

From Wikinews, the free news source you can write.



Sister projects
  • Wikibooks
  • Commons
  • Wikipedia
  • Wikiquote
  • Wikisource
  • Wiktionary
  • Wikiversity

Subcategories

Pages in category “Health”

(previous page) ()(previous page) ()

Retrieved from “https://en.wikinews.org/w/index.php?title=Category:Health&oldid=4598068”

Romania to adopt euro between 2012 and 2014

Wednesday, April 13, 2005Mugur Is?rescu, the governor of the National Bank of Romania (BNR) predicted yesterday that Romania would adopt the euro sometime between 2012 and 2014, possibly joining the Exchange Rate Mechanism II as early as 2010.

In July 2004, Romania will revalue its currency, the leu, so that 10,000 old lei will equal 1 new leu, with 1 euro being equal to approximately 3.6 new lei. Dual pricing, in both the old leu and the new leu, has already been introduced from March 2005. The transition to the new leu is expected to stabilise the Romanian currency and prepare the country for euro adoption.

After Is?rescu’s declaration, many people commented that they were surprised by how late the target date for euro adoption had been set, being 7-9 years away. However, Is?rescu responded by stating that the new Central European members of the European Union, which joined in 2004, have not yet joined the euro, and that countries such as the Czech Republic, Poland and Hungary are only expected to adopt the currency between 2008-2010, 4-6 years after accession. In Romania’s case, the adoption will take place 5–7 years after accession in 2007.

Retrieved from “https://en.wikinews.org/w/index.php?title=Romania_to_adopt_euro_between_2012_and_2014&oldid=4456545”

Category:Cornwall

This is the category for Cornwall, a county in England.

Refresh this list to see the latest articles.

  • 15 May 2014: Cornwall police arrest coach driver after two killed in crash
  • 15 February 2014: Two dead in storms with no sign of floods letting up in Britain
  • 25 February 2013: Three die in Cornwall, UK caravan park of suspected carbon monoxide poisoning
  • 12 March 2011: English policeman Nicholas Stone cleared of rape, facing jail for misconduct
  • 7 May 2010: 2010 UK general election results
  • 24 December 2009: Two killed, 47 injured in coach crash in Cornwall, England
  • 21 December 2009: Man killed in harbour car crash in Cornwall, England
  • 16 November 2009: Edward Woodward, English actor, dies aged 79
  • 7 June 2008: Wikinews interviews manager of site ‘Lose The Game’
  • 10 March 2008: Strong winds and heavy rain across southern UK
?Category:Cornwall

From Wikinews, the free news source you can write.


Biomes of the Eden Project, 2006 (Image: Jürgen Matern)



Sister projects
  • Commons
  • Wikidata
  • Wikipedia
  • Wikiquote
  • Wikisource
  • Wiktionary
  • Wikiversity
  • Wikivoyage

Subcategories

Pages in category “Cornwall”

Retrieved from “https://en.wikinews.org/w/index.php?title=Category:Cornwall&oldid=4511165”

What Are Survivable Computer Systems

Submitted by: Darren Miller

Definition Of A Survivable Computer System

A computer system, which may be made up of multiple individual systems and components, designed to provide mission critical services must be able to perform in a consistent and timely manner under various operating conditions. It must be able to meet its goals and objectives whether it is in a state of normal operation or under some sort of stress or in a hostile environment. A discussion on survivable computer systems can be a very complex and far reaching one. However, in this article we will touch on just a few of the basics.

Computer Security And Survivable Computer Systems

Survivable computer systems and computer security are in many ways related but at a low-level very much different. For instance, the hardening of a particular system to be resistant against intelligent attacks may be a component of a survivable computer system. It does not address the ability of a computer system to fulfill its purpose when it is impacted by an event such as a deliberate attack, natural disaster or accident, or general failure. A survivable computer system must be able to adapt, perform its primary critical functions even if in a hostile environment, even if various components of the computer system are incapacitated. In some cases, even if the entire “primary” system has been destroyed.

As an example; a system designed to provide real-time critical information regarding analysis of specialized medications ceases to function for a few hours because of wide spread loss of communication. However, it maintains the validity of the data when communication is restored and systems come back online. This computer system could be considered to have survived under conditions outside of its control.

[youtube]http://www.youtube.com/watch?v=0BHn4Su2qEo[/youtube]

On the other hand, the same system fails to provide continuous access to information under normal circumstances or operating environment, because of a localized failure, may not be judged to have fulfilled its purpose or met its objective.

Fault Tolerant And Highly Availability Computer Systems

Many computer systems are designed with fault tolerant components so they continue to operate when key portions of the system fail. For instance; multiple power supplies, redundant disk drives or arrays, even multiple processors and system boards that can continue to function even if its peer component is destroyed or fails. The probability of all components designed to be redundant failing at one time may be quite low. However, a malicious entity that knows how the redundant components are configured may be able to engineer critical failures across the board rendering the fault tolerant components ineffective.

High availability also plays a role in a survivable computer system. However this design component may not maintain computer system survivability during certain events such as various forms of malicious attack . An example of this might be a critical web service that has been duplicated, say across multiple machines, to allow continuous functionality if one or more the individual web servers was to fail. The problem is that many implementations of high availability use the same components and methodology on all of the individual systems. If an intelligent attack or malicious event takes place and is directed at a specific set of vulnerabilities on one of the individual systems, it is reasonable to assume the remaining computer systems that participate in the highly available implementation are also susceptible to the same or similar vulnerabilities. A certain degree of variance must be achieved in how all systems participate in the highly available implementation.

What’s The Difference Between An Attack, Failure, And Accident? How Do These Differences Impact A Survivable Computer System

In many cases when I am discussing the security of systems with customers, the question of business continuity and disaster recovery come up. Most companies that provide a service that they deem critical just know the system needs to be operational in a consistent manner. However, there is typically little discussion about the various events or scenarios surrounding this and that can lead to great disappointment in the future when what the customer thought was a “survivable computer system” does not meet their expectations. Some of the items I like to bring up during these conversations is what their computer systems goal and objective is, what specifically does continuous operation mean to them, and specifically what constitutes an attack, failure, or accident that can cause loss of operation or failure to meet objectives.

A failure may be defined as a localized event that impacts the operation of a system and its ability to deliver services or meet its objectives. An example might be the failure of one or more critical or non-critical functions that effect the performance or overall operation of the system. Say, the failure of a module of code that causes a cascading event that prevents redundant modules from performing properly. Or, a localize hardware failure that incapacitates the computer system.

An accident is typically an event that is outside the control of the system and administrators of a local / private system. An example of this would be natural disasters such as hurricanes, if you live in south Florida like I do, or floods, or wide spread loss of power because the utility provider cut the wrong power lines during an upgrade to the grid. About two years ago, a client of mine who provides web based document management services could not deliver revenue generating services to their customers because a telecommunications engineer cut through a major phone trunk six blocks away from their office. They lost phone and data services for nearly a week.

An now we come to “attack”. We all know accidents will happen, we know that everything fails at one time or another, and typically we can speculate on how these things will happen. An attack, executed by an intelligent, experienced individual or group can be very hard to predict. There are many well known and documented forms of attacks. The problem is intelligence and human imagination continuously advance the form of malicious attacks and can seriously threaten even the most advanced designed survivable computer systems. An accident or failure does not have the ability to think out of the box or realize that a highly available design is flawed because all participants use the same design. The probability that an attack might occur, and succeed may be quite low, but the impact may be devastating.

Conclusion

One of the reasons I wrote this article was to illustrate that it’s not all about prevention. Although prevention is a big part of survivable computer system design, a critical computer system must be able to meet its objectives even when operating under hostile or stressful circumstances. Or if the steps taking for prevention ultimately prove inadequate. It may be impossible to think of all the various events that can impact a critical computer system but it is possible to reasonably define the possibilities.

The subject of survivable computer systems is actually one of complexity and ever evolving technology. This article has only touched on a few of the basic aspects of computer system survivability. I intend on continuing this article to delve deeper into the subject of survivable computer systems.

About the Author: Darren Miller is an Information Security Consultant with over seventeen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals.Please visit us at

defendingthenet.com

Source:

isnare.com

Permanent Link:

isnare.com/?aid=40163&ca=Computers+and+Technology

Police report drug haul seizure worth up to £30 million in Brownhills, England

Monday, December 2, 2013

Police in the West Midlands in England today said nearly 200 kilograms worth of drugs with value possibly as great as £30 million (about US$49 million or €36 million) has been seized from a unit in the town of Brownhills. In what an officer described as “one of the largest [seizures] in the force’s 39 year history”, West Midlands Police reported recovering six big cellophane-wrapped cardboard boxes containing cannabis, cocaine, and MDMA (“ecstasy”) in a police raid operation on the Maybrook Industrial Estate in the town on Wednesday.

The impact this seizure will have on drug dealing in the region and the UK as a whole cannot be underestimated

The seized boxes, which had been loaded onto five freight pallets, contained 120 one-kilogram bags of cannabis, 50 one-kilogram bags of MDMA, and five one-kilogram bricks of cocaine. In a press release, West Midlands Police described what happened after officers found the drugs as they were being unloaded in the operation. “When officers opened the boxes they discovered a deep layer of protective foam chips beneath which the drugs were carefully layered”, the force said. “All the drugs were wrapped in thick plastic bags taped closed with the cannabis vacuum packed to prevent its distinctive pungent aroma from drawing unwanted attention.” Police moved the drugs via forklift truck to a flatbed lorry to remove them.

Detective Sergeant Carl Russell of West Midlands Police’s Force CID said the seizure was the largest he had ever made in the 24 years he has been in West Midlands Police and one of the biggest seizures the force has made since its formation in 1974. “The impact this seizure will have on drug dealing in the region and the UK as a whole cannot be underestimated”, he said. “The drugs had almost certainly been packed to order ready for shipping within Britain but possibly even further afield. Our operation will have a national effect and we are working closely with a range of law enforcement agencies to identify those involved in this crime at whatever level.”

Expert testing on the drugs is ongoing. Estimates described as “conservative” suggest the value of the drugs amounts to £10 million (about US$16.4 million or €12 million), although they could be worth as much as £30 million, subject to purity tests, police said.

Police arrested three men at the unit on suspicion of supplying a controlled drug. The men, a 50-year-old from Brownhills, a 51-year-old from the Norton area of Stoke-on-Trent in Staffordshire, and one aged 53 from Brownhills, have been released on bail as police investigations to “hunt those responsible” continue. West Midlands Police told Wikinews no person has yet been charged in connection with the seizure. Supplying a controlled drug is an imprisonable offence in England, although length of jail sentences vary according to the class and quantity of drugs and the significance of offenders’ roles in committing the crime.

Retrieved from “https://en.wikinews.org/w/index.php?title=Police_report_drug_haul_seizure_worth_up_to_£30_million_in_Brownhills,_England&oldid=2611781”

Wikinews holds Reform Party USA presidential candidates forum

Tuesday, January 3, 2012

Three men are currently seeking the presidential nomination of the Reform Party of the United States of America: small business owner Andre Barnett, Earth Intelligence Network CEO Robert Steele, and former college football coach Robby Wells. Wikinews reached out to these candidates and asked each of them five questions about their campaigns. There were no space limits placed on the responses, and no candidate was exposed to another’s responses before making their own. The answers are posted below in unedited form for comparison of the candidates.

The Reform Party is a United States third party that was founded in 1995 by industrialist Ross Perot. Perot ran as the party’s first presidential nominee in 1996, and won over eight percent of the popular vote, the highest percentage for a third party candidate since. In 1998, professional wrestler Jesse Ventura ran on the Reform Party ticket and was elected Governor of Minnesota. The party fell in prominence during the lead-up to the 2000 presidential election when it was plagued by infighting between ideological factions. In 2000, paleoconservative Pat Buchanan won the presidential nomination, and went on to receive only 0.4 percent of the popular vote in the general election. In 2004, the party opted to endorse consumer advocate Ralph Nader, but ended the year nearly bankrupt. In 2008, Ted Weill won the party’s presidential nomination, but appeared on the ballot in only one state and won a total of 481 votes.

The party is currently trying to rebuild and has opened several new state chapters. They will attempt to appear on the ballot in more states for the 2012 presidential election. The party is expected to nominate its presidential ticket during the National Convention this summer.

Retrieved from “https://en.wikinews.org/w/index.php?title=Wikinews_holds_Reform_Party_USA_presidential_candidates_forum&oldid=4250030”