Thursday, February 28, 2013

NATO, European governments, hit by "MiniDuke" cyber attack

SAN FRANCISCO (Reuters) - Hackers targeted dozens of computer systems at government agencies across Europe through a flaw in Adobe Systems Inc's software, security researchers said on Wednesday, while NATO said it too had been attacked.

The alliance said its systems had not been compromised, although it was sharing the details of the attack with NATO member states and remained vigilant. Security experts say governments and organizations such as NATO are attacked on a daily basis - although the sophistication varies wildly.

These particular attacks appeared both widespread and innovative, the private computer security firms announcing the discovery said, with one expert saying he believed a nation-state might be responsible.

Russia's Kaspersky Lab and Hungary's Laboratory of Cryptography and System Security, or CrySyS, said the targets of the campaign included government computers in the Czech Republic, Ireland, Portugal and Romania.

They also said a think tank, a research institute and a healthcare provider in the United States, a prominent research institute in Hungary and other entities in Belgium and Ukraine were among those targeted by the malicious software, which they have dubbed "MiniDuke".

The researchers suspect MiniDuke was designed for espionage, but were still trying to figure out the attack's ultimate goal.

"This is a unique, fresh and very different type of attack," said Kurt Baumgartner, a senior security researcher with Kaspersky Lab. "The technical indicators show this is a new type of threat actor that hasn't been reported on before."

He said he would not speculate on who the hackers might be.

The malware exploited a recently identified security flaw in Adobe's software. Adobe said a software patch issued last week should protect users from "MiniDuke" providing they downloaded it.

Boldizs?r Bencs?th, a cyber security expert who runs the malware research team at CrySyS, told Reuters that he had reported the incident to NATO, although it was not clear if that was what first alerted the alliance.

Bencs?th said he believed a nation-state was behind the attack because of the level of sophistication and the identity of the targets, adding that it was difficult to identify which country was involved.

Exactly how serious the attacks were was not immediately clear, nor who exactly the targets were or at what level European governments were alerted.

The Czech counterintelligence agency BIS said they were not aware of any massive hacking attacks on Czech institutions from abroad recently. The Czech National Security Bureau, responsible for government data, was not immediately available for comment. Neither were officials from other states said to be affected.

A NATO official in Brussels had earlier said the alliance was not directly hit, but he said later that he had been incorrect. He gave no further details.

The researchers, who declined to further elaborate on the targets' identities, released their findings as more than 20,000 security professionals gathered in San Francisco for the annual RSA conference.

USING ADOBE, TWITTER, GOOGLE

MiniDuke attacked by exploiting recently discovered security bugs in Adobe's Reader and Acrobat software, according to the researchers. The attackers sent their targets PDF documents tainted with malware, an approach that hackers have long used to infect personal computers.

The bugs were first identified two weeks ago by Silicon Valley security firm FireEye. The firm reported that hackers were infecting machines by circulating PDFs tainted with malicious software.

The MiniDuke operators used an unusual approach to communicate with infected machines, according to the researchers. The virus was programmed to search for Tweets from specific Twitter accounts that contained instructions for controlling those personal computers. In cases where they could not access those Tweets, the virus ran Google searches to receive its marching orders.

Officials with Twitter and Google could not immediately be reached.

Bencs?th said he believed the attackers installed "back doors" at dozens of organizations that would enable them to view information on those systems, then siphon off data they found interesting.

He said researchers had yet to uncover evidence that the operation had moved to the stage where operators had begun to exfiltrate data from their victims.

Privately, many Western government and private sector computer experts say China is the clear leader when it comes to state-sponsored cyber attacks to steal information - although they rarely say so publicly and Beijing angrily denies it.

According to cybersecurity expert Alexander Klimburg at the Austrian Institute for International Affairs, however, the closest attack to this in style was a Trojan dubbed "TinBa" identified two months ago and used for banking fraud attacks. That was suspected to have been built by Russian hackers, he said, talking down the prospect of state involvement.

"There are some interesting aspects to the attacks," said Klimburg, pointing to the use of Twitter. "(But) most of the attack does not seem that new at all. Some of the... 'tricks', such as using pictures to hide data, are more reminiscent of proficient students rather than government agencies."

(Additional reporting by Peter Apps in London, Jan Lopatka in Prague and Adrian Croft in Brussels; Editing by Jeremy Laurence, Leslie Gevirtz and Mohammad Zargham)

Source: http://news.yahoo.com/hackers-target-european-governments-via-adobe-bug-researchers-141356498--sector.html

Caster Semenya Medal Count 2012 Olympics victoria beckham London 2012 rhythmic gymnastics Meteor Shower August 2012 jessie j jessie j

Black Hole's Mystery 'Wave' Surprises Scientists

Astronomers studying an unusual black hole system have spotted a never-before-seen structure in the disk of matter encircling the system.

Swift J1357.2, an X-ray binary system that regularly emits outbursts of high energy, consists of a black hole slowly consuming its companion star. Matter from the doomed star falls into the accretion disk, which surrounds the black hole, feeding it dust and gas.

While observing the system, a team of scientists noticed an unusual vertical feature traveling through the material.

"It's the first time we can resolve such [a] structure in an accretion disk, and it might be ubiquitous in X-ray binaries during the outburst state," Jesus Corral-Santana, of the Astrophysical Institute of the Canary Islands in Spain, told SPACE.com by email. [The Strangest Black Holes in the Universe]

A hidden structure

The black hole contained in Swift J1357.2 is one of the millions of stellar black holes that dot the Milky Way galaxy.

About three times as massive as the sun, the behemoth likely formed when a single star collapsed inward on itself. The resulting, city-sized body packed a great deal of mass into a tiny package, creating a strong gravitational pull on nearby dust and gas.

Located in the Virgo constellation, approximately 4,900 light-years from Earth, Swift J1357.2 also contains a small companion star, which has only a quarter the mass of the sun. This companion star orbits the pair's center of mass every 2.8 hours, one of the shortest known orbital periods for such systems.

The black hole pulls material from the companion star into its accretion disk, occasionally emitting the X-ray bursts that enabled scientists to find this otherwise hard-to-spot system, researchers said.

Corral-Santana and his team took hundreds of optical images of the system using the Isaac Newton and the William Herschel Telescopes, both of which are in the Canary Islands. Studying the light produced by the accretion disk, the researchers noticed a periodic dimming in the system, sometimes occurring over the course of only a few seconds.

"Since the orbital period of the system is 2.8 hours, those dips cannot be produced by eclipses of the companion star. They are much faster," Corral-Santana said. "Therefore, they must be produced by a hidden structure placed very close to the black hole, in the inner accretion disk."

The new find can only been seen in the outer, optical portion of the accretion disk, not on the inside, where X-ray bursts originate. The X-ray emission, which shows no periodic variation, unlike its optical counterpart, indicated a vertical structure was hiding the black hole, Corral-Santana said.

Rather than appearing at a set, predictable time, the structure shows up over a steadily increasing period, indicating a wave-like movement through the accretion disk.

"It is a wave produced in the accretion disk, moving outward," Corral-Santana said, "like the wave produced when a stone is dropped in calm water."

The missing population

The wave-like feature also provides information about the orientation of the black hole.

Objects in space face Earth at a variety of angles, or inclinations. They can be seen edge-on, face-on or somewhere in between. Swift J1357.2 is the only one of 50 suspected similar black-hole systems found with an edge-on accretion disk ? what scientists call a high inclination. However, astronomers think approximately 20 percent of these systems should provide such a perspective.

In order to see the wave-like structure in the accretion disk, scientists must have such an edge-on view of the disk, or one close to it. A view from a lower inclination, closer to face-on, would not reveal the sudden rises and falls in the total light coming from the system.

"Swift J1357.2 is the prototype of the hitherto missing population of high-inclination black holes in transient X-ray binaries," Corral-Santana said.

Because Swift J1357.2 is the first such system to allow such an edge-on view, the presence of the vertical structure takes on an added significance. No signs of such structures appear in other similar systems, but that could result simply from their unfortunate angles. Such structures could in fact exist in other, previously discovered transient X-ray binary systems, hidden only by their observational angles.

The findings were published online today (Feb 28) in the journal Science.

Follow SPACE.com on Twitter?@Spacedotcom. We're also on?Facebook?&?Google+.?

Copyright 2013 SPACE.com, a TechMediaNetwork company. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Source: http://news.yahoo.com/black-holes-mystery-wave-surprises-scientists-191744309.html

Survivor Philippines Fashion Island shooting Victor Cruz nfl standings Vicki Soto Adam Lanza fox news

Canadian government warns BBM PIN-to-PIN messaging is ?most vulnerable method of communicating on a BlackBerry?

BlackBerry Messenger SecurityBlackBerry

Canadian government agency?Public Safety Canada, which is tasked with overseeing cyber-security across all federal departments,?has issued a memo warning government workers that communicating using BlackBerry Messenger PIN-to-PIN messaging?is ?the most vulnerable method of communicating on a BlackBerry.? Canada?s?Postmedia News obtained the memo this week, which repeatedly advises workers to avoid sending?PIN-to-PIN messages on their BlackBerry (BBRY) phones.

[More from BGR: Samsung picks Apple?s pocket, ends up with Wallet [video]]

BlackBerry did not immediately have a statement available.

[More from BGR: Why every rival tech company should be scared to death of Samsung]

UPDATE: A BlackBerry spokesperson provided BGR with the following statement via email: ?BlackBerry communications remain the most secure, preferred mobile communications used by governments worldwide. In fact, BlackBerry uniquely offers scalable, customizable security options for businesses and governments which allow them to apply their desired level of security.?

According to the memo,?PIN-to-PIN messages sent via BlackBerry Messenger could be intercepted and read by any BlackBerry user anywhere in the world. Because of this, the memo states that the service isn?t ?suitable for exchanging sensitive messages.?

?Although PIN-to-PIN messages are encrypted, they key used is a global cryptographic ?key? that is common to every BlackBerry device all over the world,? Public Safety Canada official stated in the memo. ?Any BlackBerry device can potentially decrypt all PIN-to-PIN messages sent by any other BlackBerry device.?

It should be noted that?Public Safety Canada has failed?to take into account the fact that organizations have the ability to change the encryption key to a unique one, ensuring that only BlackBerry devices using the same BES network can communicate with each other. There are also several ways to encode BBM messages such as?S/MIME, which adds another layer of security.

This isn?t a new position for the Canadian?government, which has warned workers of PIN-to-PIN security issues for nearly a decade. The timing of this new warning couldn?t be worse, however, as rival offerings from Apple (AAPL) and Google (GOOG) continue to gain momentum in enterprise and government environments.

Postmedia News?states that nearly two-thirds of federal employees with government-issued mobile devices currently use BlackBerry phones.

This article was originally published on BGR.com

Source: http://news.yahoo.com/canadian-government-warns-bbm-pin-pin-messaging-most-150553379.html

natalie wood patriots Sandy Hook Hoax 2014 Corvette Stacie Halas Corvette Stingray Claire Danes

Keith Ellison and Sean Hannity Had an Epic Battle on Fox News Tuesday (Atlantic Politics Channel)

Share With Friends: Share on FacebookTweet ThisPost to Google-BuzzSend on GmailPost to Linked-InSubscribe to This Feed | Rss To Twitter | Politics - Top Stories Stories, News Feeds and News via Feedzilla.

Source: http://news.feedzilla.com/en_us/stories/politics/top-stories/287688624?client_source=feed&format=rss

double fine adventure turbo tax katharine mcphee cold mountain valentines day ideas the villages florida egoraptor

Wednesday, February 27, 2013

The Place of Review Filters in Local Search | We Build eCommerce ...

Posted by David Mihm

In its recent report on "Yelp's Rocky Relationship with Small Businesses," PBS Media Shift was the latest mainstream media outlet to cover one of the most controversial topics in all of local search: search engines' filtering of customer reviews.

The topic first came to prominence four years ago in Kathleen Richards' landmark piece on Yelp's aggressive sales pitches -- or extortion, depending on your perspective and whom you believe. While I was never fully convinced of corporate misbehavior on Yelp's part, the company hasn't done itself any favors by continuing to allow its field operatives to use?deceptive sales tactics. Despite?its best efforts to educate?both business owners and everyday users of the site,?the poor reputation of Yelp's salespeople continues to contribute to confusion around review filtering among the small business community. I hope to be able to clear up some of that confusion with this post and offer a few tactical tips to help avoid the frustration these filters can cause.

Why review filters exist

As local search usage among the general public has exploded over the last several years, more and more directories have (rightly) seen reviews as a way to:

  • Gauge the offline popularity of a business in their algorithms
  • Provide better insight to searchers into the experience at that business
  • Increase the "stickiness" of their sites by increasing the sense of community
  • Get out of Google's Panda/Farmer purgatory by adding unique user content

In many ways, Yelp was ahead of its time on all four of these bullet points, and as a result, it had to tackle the inevitable review spam that accompanied its popularity. ?

Its answer was arguably the first widespread local review filter: an algorithm for detecting and removing spam or suspicious-looking content. ?In Yelp's own words:?

For those of you who couldn't quite keep up with Yelp's version of Micro Machines man, the primary reasons are:

  • To make sure reviews are left by actual people (not robots)
  • To make sure reviews are left by customers?and not just hired third parties
  • To make sure businesses don't leave reviews of themselves

Yelp's CEO, Jeremy Stoppelman, recently gave his own slower version of this rationale in a company-produced video:

How review filters work

While I don't have any detailed knowledge of Yelp's review filter specifically, many comparable filters seem to kick into action if any of the following is present in the content of the review:

  • Use of extreme adjectives or profanity in the review
  • Over-use of keywords in the review
  • Inclusion of links in the review

Another criterion that also tends to trigger filtering is a sudden burst of reviews preceded by or followed by a long lull between them.

Some of the more sophisticated review filters, including Yelp's, take a look at user characteristics, too, including:

  • Total number of reviews a user has left on the site
  • Distribution of ratings across all of a user's reviews
  • Distribution of business types among all of a user's reviews
  • Frequency of reviews that a user has left on the site
  • IP address(es) of the user when leaving reviews

The bottom line is that reviews written by active users have an astronomically-higher likelihood of "sticking" on a local search engine than those written by first-time or infrequent reviewers. And even beyond their stickiness, many local search experts (including myself) speculate that reviews left by active users also influence rankings to a much greater extent than those left by first-time or infrequent reviewers.

?

Problems with review filters

?

?I Can See the Future of Your Google Reviews?by Margaret Shulock is licensed under a?Creative Commons Attribution 3.0 Unported License. Based on a work at?blumenthals.com

The algorithms behind review filters are far from perfect, as many readers probably know, and Yelp is far from the only local search engine with a review filter. In fact, Google+ has probably accrued more ire from business owners?as a result of its filter in 2012 and 2013 than any other site. ?

Unfortunately, these filters frequently:

  • Lead to?less-informed consumer decisions?about the experience at a business
  • Remove legitimate reviews, especially from less-sophisticated, less-active customers
  • Discourage new users from leaving reviews

All of which leads to frustration from the standpoint of a small business owner.

Avoiding review filters

Yelp is probably the most aggressive of its peers at enforcing its business review guidelines, which also happen to be the most onerous guidelines of any local search engine. ?Yelp's filtering is so aggressive that one in five reviews written on Yelp never shows up on the site!

To sum up those guidelines:

  • Don't ask anyone to review your business on Yelp.
  • Don't ask anyone to review your business on Yelp.
  • Don't ask anyone to review your business on Yelp.

O ye business owner who disobeys those guidelines, beware! ?You run the risk of a public shaming. ?

Although Yelp's guidelines are considerably more onerous than its peers', Google+ is?not far behind in stringency. However, many local search engines are far less prickly about soliciting reviews from customers, or even incentivizing them, and some (including Google) have even engaged in this behavior themselves.

For those who have been caught in the Google+ review filter, Mike Blumenthal has covered your travails?par excellence?and has?authored a most reasonable response. Miriam Ellis and Joy Hawkins have also given excellent advice on this front. ?

Review guidelines at major local search engines

Here are direct links to those guidelines at a few of the biggest players:

The review filters of the future

While the search engines may throttle their level of filtering?from time to time, the review filter is a local search institution that is?here to stay. ?

The primary methods of these filters, though, I think will change pretty dramatically. Rather than judging a review by its content or looking at website behavior (e.g. how many reviews a user has left for other businesses), the explosion in smartphone adoption is enabling a couple of far less easily-manipulated criteria to judge the veracity of a review.

  • Any local search platform operated by a handset maker (Google, Apple, Microsoft, Nokia, ...Amazon?) could register the device ID at the time of review and tie it to a bonafide human being.
  • Any local search platform that has implemented mobile payment processing (Google, Apple, ...Amazon?, any Square/PayPalHere partner) could disable the ability for a user to leave a review of a retail-category business unless he/she had completed a transaction at the storefront.

And even for those platforms without the handset or payment-processing advantage, requiring location-awareness for users of mobile applications prior to leaving a review seems like a no-brainer (which Yelp has already implemented and Google may be well on its way to doing).

For those sites that are more desktop-dependent, widespread adoption of primary?social logins?(Google+, Facebook, Twitter, etc.) could lead to a baked-in layer of spam-fighting. ?

As Eric Schmidt?recently said:

?Within search results, information tied to verified online profiles will be ranked higher than content without such verification, which will result in most users naturally clicking on the top (verified) results. The true cost of remaining anonymous, then, might be irrelevance.?

In some industries (e.g., DUI law, plastic surgery, psychology), anonymity may be a pre-requisite for any user reviews and these local search platforms may need a Plan B. But for most industries, requiring some sort of verified social profile would solve a lot of problems.

Facebook, of course, has a huge leg up on everyone else based on its knowledge of a user's social connections. Google+, meanwhile, could look at a user's activity across Google's entire range of products (web search, Gmail, YouTube, etc.) to stop spammers in their tracks. ?

While consumer privacy concerns around these mechanisms for review filtering may arise, many business owners would likely rejoice at a truer, less bug-ridden filtering algorithm and a more accurate and complete representation of their customers' experience.

Well, that's enough out of me for this week! How about you? What are some of your strategies for avoiding these dreaded review filters? What other methods of filtering do you see coming to Local Search?

Sign up for The Moz Top 10, a semimonthly mailer updating you on the top ten hottest pieces of SEO news, tips, and rad links uncovered by the Moz team. Think of it as your exclusive digest of stuff you don't have time to hunt down but want to read!

Source: http://www.austinecommercewebsites.com/2013/02/26/the-place-of-review-filters-in-local-search/

bent new york jets etch a sketch romney sean payton saints bounty program toulouse france ny jets

Survey Anecdote Suggests We Have No Idea What?s Going On At Google+

googleplus-200-redBy Google's count, Google+ has over 500 million "upgraded" members and some 135 million people active "in just the stream." By researchers' best estimates, however, the answer is a bit more complicated.

Source: http://feedproxy.google.com/~r/Techcrunch/~3/9EkEcL8o-fw/

Happy 4th of July 4th Of July Desserts fireworks fireworks 4th of July Andy Griffith joe johnson

Crowdfunding expert Kendall Almerico explains ... - PR NewsChannel

(PR NewsChannel) / February 25, 2013 / TAMPA, Fla.?

ClickStartMeCrowdfunding expert Kendall Almerico, the CEO of ClickStartMe.com, recently released five simple rules entrepreneurs need to follow to start a new business using crowdfunding. Almerico says that using crowdfunding to start a business allows you to raise funds without giving away equity and creates a phenomenal marketing campaign for your new business if done correctly. Almerico notes that starting a business through crowdfunding is legal and discredits the common misconception that crowdfunding to start a business is prohibited by law.? ?Nothing could be further from the truth,? the crowdfunding guru notes. ?Crowdfunding a business start-up is completely legal in every state as long as you follow five simple rules.?

Misinformation about the legality of crowdfunding a start-up business generally comes from people in the financial industry who warn of advertising or selling stock or ownership in a business online without following SEC registration requirements, according to Almerico.?? ?This is red herring that banks, investment houses and venture capital firms want you to believe,? Almerico explains. ?Yes, the same banks, investment houses and venture capital firms who will not lend you any money to start or expand your business. They are scared to death of what crowdfunding will ultimately do to their business model.?

Here are Almerico?s five rules for new businesses to follow when they choose crowdfunding to start their business:

1.????? Do not give away equity or profit participation in your business when you crowdfund. Advertising to sell equity or profit participation could turn your crowdfunding project into a ?security? which can make your crowdfunding project run afoul of securities laws.? Instead, Almerico says, a crowdfunding project may give away ?rewards? in exchange for donations, but no equity in the business.? ?Besides,? Almerico points out, ?Why would you want to give away partial ownership in your business when you do not have to??? Almerico notes that with passage of the JOBS Act in 2012, selling equity through crowdfunding will become legal at some point, once the SEC creates rules in the coming months.

2.????? Do not treat crowdfunding donations as a loan to be repaid, with or without interest.? Loans and lending are heavily regulated industries in every state, and it could run afoul of a state lending law if you promise to repay a donation to your crowdfunding project.

3.????? Do not sell real estate. Like the lending industry, real estate is a very heavily regulated industry.? Selling, or offering to sell, a parcel of real estate can land you in trouble in some states. ?Land deals are best left to other funding vehicles,? Almerico says.

4.????? Do not sell or give away anything through crowdfunding that you would not be allowed to sell or give away in your state.? For example, if you want to give away bottles of wine as a reward in your business crowdfunding project, be sure you are legally allowed to sell or distribute wine in your state before you do so. ?And it goes without saying,? Almerico points out, ?that crowdfunding a business and giving away firearms, scheduled drugs, or anything illegal, would not be a smart idea.?

5.???????? If you have a question, ask a crowdfunding attorney.? Almerico knows this from his experience not only as a crowdfunding expert, but also as an attorney himself.? ?It never hurts to get legal advice if you are not sure,? Almerico says. ?But, be sure your business attorney has expertise in crowdfunding laws. Most business lawyers do not.?

Crowdfunding expert Kendall Almerico is the CEO of ClickStartMe.com, the upstart crowdfunding site that ?puts the fun in crowdfunding? and is a JOBS Act expert.? For more information or to schedule an interview with Kendall Almerico, e-mail media@clickstartme.com or call 813.410.4658.

MEDIA CONTACT
Tess Hottenroth
media@ClickStartMe.com???????????????????????????
(813) 410-4658

Direct link:??http://www.prnewschannel.com/2013/02/25/crowdfunding-expert-kendall-almerico-explains-how-to-start-business-using-crowdfunding/

SOURCE:??ClickStartMe.com

This press release is distributed by PR NewsChannel. Your News. Everywhere.

Source: http://www.prnewschannel.com/2013/02/25/crowdfunding-expert-kendall-almerico-explains-how-to-start-business-using-crowdfunding/

wichita brian wilson storm chasers david blaine gotye divine mercy cabin in the woods

Your health: perfect and intact?

A Christian Science perspective.

By Lyle Young / February 26, 2013

Your health is perfect and intact ? no matter how you may feel, look, or sound.

Skip to next paragraph

' + google_ads[0].line2 + '
' + google_ads[0].line3 + '

'; } else if (google_ads.length > 1) { ad_unit += ''; } } document.getElementById("ad_unit").innerHTML += ad_unit; google_adnum += google_ads.length; return; } var google_adnum = 0; google_ad_client = "pub-6743622525202572"; google_ad_output = 'js'; google_max_num_ads = '1'; google_feedback = "on"; google_ad_type = "text"; google_adtest = "on"; google_image_size = '230x105'; google_skip = '0'; // -->

Now, before you conclude that this is a preposterous statement, let me explain.

The conventional way of thinking is that life is material, that we develop over time, having our own thoughts and bodies ? and thus our own state of health ? all of which are governed by genes and by our life experience. According to this way of thinking, we live biologically and are governed by organic laws that dictate that illness is normal and self-evident reality. Logically then, at best we try to manipulate the body with surgery or drugs or with less invasive methods such as physiotherapy or change of diet.

But instead of considering that all that I?ve just described is reality, could it be that it?s actually a state of consciousness, a way of thinking that we may have unwittingly adopted but that we can consciously change?

The founder of the Monitor, Mary Baker Eddy, contributed not only to journalism but also to health and health care. Sick for years, she teetered between living and dying. But in the Bible, her solace, she saw that the healings of Jesus were not miraculous but a natural expression of his understanding of the true nature of health. In the 1860s, when she was in her late 40s, she came to understand her way out of the health theories prevalent at that time. This restored her health, allowing her to serve society vigorously for another four decades. She began to teach this understanding, both in person and through her books. (Her main work, ?Science and Health with Key to the Scriptures,? was first published in 1875.) Soon, many of her students were practicing this method of healing, and teaching others, too. Her method of healing is not faith healing as it?s popularly known. Rather, it?s based on deep spiritual insights about the nature of identity, insights that Mrs. Eddy found in the Old and New Testaments of the Bible.

Eddy, a keen observer of human thinking, identified the kinds of thoughts that lead to illness. She saw that sickness is an unnatural, unconscious deviation from the perfection of God and of each one of us as His image and likeness. She came upon a place in thought at which individuals adopt a concept of themselves that leads either to discord and sickness or to holiness and health. She discovered that everyone can become aware of their thoughts and respond obediently to thoughts from God, those thoughts being spiritual, pure, and healthy. For her, mental self-awareness is key ? just as knowing how you?re spending money is essential to sound personal finance.

Most especially, Eddy discovered in the Bible that there?s a reliable source for healthy thoughts ? God, the one divine Mind ? that knows each of us, God?s children, as spiritual, perfect, free, and well. This fundamental truth, though not visible physically, gives each of us a strong platform from which to claim and even demonstrate that we are healthy.

Try this: Instead of assuming that you?re largely a set of body parts that can become ill, feel your oneness with this purely good, infinite Mind as its spiritual reflection. Start from the standpoint that your health is intact because goodness and wellness are inherent in this one infinite God that you reflect. This way of thinking has made a vast difference in my life, giving me both a more moral approach to living and better health. It can do the same for you.

Source: http://rss.csmonitor.com/~r/feeds/csm/~3/2inm-XDvkws/Your-health-perfect-and-intact

ladainian tomlinson pipa keystone xl sopa bill sopa and pipa piracy sopa

Linking insulin to learning: Insulin-like molecules play critical role in learning and memory

Feb. 26, 2013 ? Though it's most often associated with disorders like diabetes, Harvard researchers have shown how the signaling pathway of insulin and insulin-like peptides plays another critical role in the body -- helping to regulate learning and memory.

In addition to showing that the insulin-like peptides play a critical role in regulating the activity of neurons involved in learning and memory, a team of researchers led by Yun Zhang, Associate Professor of Organismic and Evolutionary Biology, show that the interaction between the molecules can fine-tune how, or even if, learning takes place. Their work is described in a February 6 paper in Neuron.

"People think of insulin and diabetes, but many metabolic syndromes are associated with some types of cognitive defects and behavioral disorders, like depression or dementia," Zhang said. "That suggests that insulin and insulin-like peptides may play an important role in neural function, but it's been very difficult to nail down the underlying mechanism, because these peptides do not have to function through synapses that connect different neurons in the brain"

To get at that mechanism, Zhang and colleagues turned to an organism whose genome and nervous system are well described and highly accessible by genetics -- C. elegans.

Using genetic tools, researchers altered the small, transparent worms by removing their ability to create individual insulin-like compounds. These new "mutant" worms were then tested to see whether they would learn to avoid eating a particular type of bacteria that is known to infect the worms. Tests showed that while some worms did learn to steer clear of the bacteria, others didn't -- suggesting that removing a specific insulin-like compound halted the worms' ability to learn.

Researchers were surprised to find, however, that it wasn't just removing the molecules that could make the animals lose the ability to learn -- some peptide was found to inhibit learning.

"We hadn't predicted that we would find both positive and negative regulators from these peptides," Zhang said. "Why does the animal need this bidirectional regulation of learning? One possibility is that learning depends on context. There are certain things you want to learn -- for example, the worms in these experiments wanted to learn that they shouldn't eat this type of infectious bacteria. That's a positive regulation of the learning. But if they needed to eat, even if it is a bad food, to survive, they would need a way to suppress this type of learning."

Even more surprising for Zhang and her colleagues was evidence that the various insulin-like molecules could regulate each other.

"Many animals, including the humans, have multiple insulin-like molecules and it appears that these molecules can act like a network," she said. "Each of them may play a slightly different role in the nervous system, and they function together to coordinate the signaling related to learning and memory. By changing the way the molecules interact, the brain can fine tune learning in a host of different ways."

Going forward, Zhang said she hopes to characterize more of the insulin-like peptides as a way of better understanding how the various molecules interact, and how they act on the neural circuits for learning and memory.

Understanding how such pathways work could one day help in the development of treatment for a host of cognitive disorders, including dementia.

"The signaling pathways for insulin and insulin-like peptides are highly conserved in mammals, including the humans," Zhang said. "There is even some preliminary evidence that insulin treatment, in some cases, can improve cognitive function. That's one reason we believe that if we understand this mechanism, it will help us better understand how insulin pathways are working in the human brain."

Share this story on Facebook, Twitter, and Google:

Other social bookmarking and sharing tools:


Story Source:

The above story is reprinted from materials provided by Harvard University.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Journal Reference:

  1. Zhunan Chen, Michael Hendricks, Astrid Cornils, Wolfgang Maier, Joy Alcedo, Yun Zhang. Two Insulin-like Peptides Antagonistically Regulate Aversive Olfactory Learning in C.?elegans. Neuron, 2013; 77 (3): 572 DOI: 10.1016/j.neuron.2012.11.025

Note: If no author is given, the source is cited instead.

Disclaimer: This article is not intended to provide medical advice, diagnosis or treatment. Views expressed here do not necessarily reflect those of ScienceDaily or its staff.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/most_popular/~3/HFukdteMQE0/130226162837.htm

what is autism the giver march 30 rimm pauly d project adrienne rich autism