Big upset at cherry-pit spitting contest in Mich.

EAU CLAIRE, Mich. (AP) ? Ronn Matt's wife encouraged him to enter the annual International Cherry Pit Spitting Championship in southwestern Michigan on Saturday.

It's a good thing she did.

The 46-year-old Chicagoan pulled a big upset, winning the contest in his initial try and becoming the first champion not named Krause or Lessard in 20 years.

Matt spit a pit 69 feet at Tree-Mendus Fruit Farm near Eau Claire, just north of the Indiana border.

Owner Herb Teichman launched the tournament on a lark nearly four decades ago. It now attracts competitors from the U.S. and beyond, and has six divisions, including dignitaries.

Since 1992, members of the Krause and Lessard families have dominated the event.

Brian "Young Gun" Krause of Dimondale holds the world-record spit ? more than 93 feet ? and had won the past two years. But the 34-year-old finished fifth Saturday with a spit of 52 feet, 10 inches.

Krause's father, Rick "Pellet Gun" Krause, came in second with a spit of 61 feet, 2 inches. And Brian Krause's brother, Matt, earned a third-place finish with his 60-foot, 11-inch spit.

The tournament typically is timed to the start of the cherry harvest, but competition spokeswoman Lynne Sage said that due to an unusually warm spring, it's already complete. Saturday's installment was held in sweltering temperatures.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/aa9398e6757a46fa93ed5dea7bd3729e/Article_2012-07-07-Pit%20Spitting/id-a7ad0947bd55461c8561bdf9f0e52c8a

jason campbell doobie brothers jennie garth peter facinelli marques colston golden state warriors free agents nfl 2012 milwaukee bucks

Face.com kills developer APIs and Klik app three weeks after Facebook acquisition

face-com-kills-developer-apis-facebook

A ripple went through Face.com's developer community three weeks ago when the company was acquired by Facebook. After all, what earthly reason would the social network have for continuing third-party developer support of the product? None, as it turns out -- API support for the firm's mug recognition software will be dropped in early August, and its iPhone app, Klik, is now gone from the App Store. Despite recent assurances to the contrary (pictured above) Face.com pulled the plug in order to devote its resources to Zuckerberg and Co., according to an email it sent to developers. Naturally, the sudden reversal has inflamed that group, with prominent members tweeting language like "boycotting" and "months of work wasted." There's a sliver of hope, however, for forlorn developers -- at least one member of the community says he's been granted an API extension through October. In the meantime, developers will likely be venting -- and won't even be able to track that rollercoaster of emotions anymore.

Face.com kills developer APIs and Klik app three weeks after Facebook acquisition originally appeared on Engadget on Mon, 09 Jul 2012 03:41:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceTNW  | Email this | Comments

Source: http://www.engadget.com/2012/07/09/face-com-kills-developer-apis-and-klik-app-three-weeks-after-fac/

slither slither chris christie naacp glen campbell jerusalem artichoke bud shootout

john_keim: also from sun: sidebar to prev tweet... #NFL helps ease transition, as does Priority Sports & entertainment http://t.co/rEqUqT9n #redskins

Sorry, Readability was unable to parse this page for content.

Source:

mickael pietrus heart transplant the international preppers geraldo obama trayvon martin pietrus

GOP Vote on Obamacare Again

Posted by CAGLE CARTOONS in Health, Law, Politics.
Jul 9th, 2012 | one response -->

Daryl Cagle, MSNBC.com

This copyrighted cartoon is licensed to run on TMV. Unauthorized reproduction prohibited.

Leave a Reply

You must be logged in to post a comment.

Source: http://feedproxy.google.com/~r/themoderatevoice/~3/sjNzemVxMw4/

frozen four joe avezzano kanye west theraflu joey votto the masters live mega millions winner holy thursday

The Guardian Is Ignoring The Critical Paradox Of Peak Oil

George Monbiot recently made a major about-face on his peak oil stance, on the grounds that unconventional oil represents a new reality. The basis of his u-turn is?a recent report on unconventional oil?by Leonardo Maugeri, (former) oil executive at Italy's Eni, published at Harvard University, where Maugeri's a Senior Fellow at the John Kennedy School, Belfer Center, which we discussed here at TAE in?Unconventional Oil is NOT a Game Changer.

George Monbiot:

We were wrong on peak oil. There's enough to fry us all

Peak oil hasn't happened, and it's unlikely to happen for a very long time.

A report by the oil executive Leonardo Maugeri, published by Harvard University, provides compelling evidence that a new oil boom has begun. The constraints on oil supply over the past 10 years appear to have had more to do with money than geology. The low prices before 2003 had discouraged investors from developing difficult fields. The high prices of the past few years have changed that.

Maugeri's analysis of projects in 23 countries suggests that global oil supplies are likely to rise by a net 17m barrels per day (to 110m) by 2020. This, he says, is "the largest potential addition to the world's oil supply capacity since the 1980s". The investments required to make this boom happen depend on a long-term price of $70 a barrel ? the current cost of Brent crude is $95. Money is now flooding into new oil: a trillion dollars has been spent in the past two years; a record $600bn is lined up for 2012.

I sent George a short response to his article, by way of opening a dialogue:

What we are facing is a demand and price collapse that will render unconventional supplies uneconomic. Natural gas is leading the way over the next few years. The high cost and low EROEI are fatal flaws.

And received this reply:

If there's a collapse in demand, peak oil is not an issue, right? If there's a resurgence of demand, unconventionals become economic again. As for EROEI being a constraint, try telling that to the tar sands producers in Alberta.

With best wishes,

George

The debate continues. Here is my next installment:

A demand collapse will certainly put peak oil on the backburner for a number of years. The next few years will be remembered for financial crisis as we move into what will be at least as bad as the Great Depression (and very likely worse, since the bubble was much larger this time). Peak oil will not have gone away, however.

We have used the cheap and accessible oil (and other fossil fuels) and what remains will be exceptionally, and increasingly, expensive in both financial and energy terms. Predictable consequences will follow from this, but in a complex interaction with many other factors, notably the context of the huge credit bubble bursting. This amounts to crashing the operating system. For a while, resource constraints will be relieved due to economic seizure (i.e. the collapse of both the money supply and the velocity of money).

During the period of financial crisis, deflation and deleveraging, weak demand will buy us some time, but at the cost of setting us up for a supply crunch later. The period of sharply falling prices will kill investment in the energy sector, because the cost of production will fall less quickly than prices, meaning margins will be squeezed. Both physical and financial risks will be much higher. A lack of economic visibility will be anathema to what are inherently long term projects.

In addition, trade collapses during periods of economic depression, as for instance letters of credit become impossible to obtain, and the lack of funds for maintenance compromises the integrity of distribution infrastructure. Infrastructure may also be deliberately targeted during the inevitable upheaval. All of these factors act to reduce supply, and would be difficult, or impossible, to reverse quickly if demand were to rise.

When supply and demand become tight, what transpires is not a simple price spike, but an exaggerated boom and bust dynamic. This has been underway since 2005/06. The first full cycle unfolded from 2005/06 to 2008. The second began in 2008/09 and will probably end with a price bottom relatively early in this depression with a resurgence of military demand, given that oil is liquid hegemonic power.

That should feed into the third cycle, which should send prices sharply higher in real terms, if not to a new high in nominal terms. This price volatility, against a backdrop of severe economic contraction, upheaval and fear is leading towards a profound societal change, most likely a significant period of involuntary loss of socioeconomic complexity.

You mention the tar sands, and they are indeed an interesting case - an arbitrage between cheap natural gas and expensive syncrude that can continue while the price disparity is maintained. They are able to make money, even though they are not producing much net energy. Unfortunately for the tar sands producers, the price disparity is set to reverse.

The hype surrounding shale gas has crashed the price to the point where it is on the verge of putting producers out of business. Natural gas in North America appears to have bottomed, while the perception of glut in unconventional oil, combined with weak demand and a lack of appropriate infrastructure for internal North American sources, is set to undermine oil prices considerably.

Tar sands projects will be under acute threat under those circumstances - not imminently, but over the next five years or so. Once one cannot make money from some combination of artificial input/output price disparity, public subsidy and the ability to socialize externalties, then EROEI becomes the defining factor, and the EROEI for tar sands is pathetic.

While I agree that oil men do not base decisions on EROEI, ultimately EROEI will determine their ability to make money, and that is their driving motivation. Finance can only temporarily allow people to ignore thermodynamics.

EROEI effectively determines what is and is not an energy source for a given society (ie to maintain a given level of socioeconomic complexity).?Unconventional fossil fuels are caught in a paradox - that their EROEI is too low for them to sustain a society complex enough to produced them.

They can only be produced for the relatively short period of time that the complex society built on conventional sources continues to maintain its current capacities, but as the conventional sources disappear, and that society can no longer support itself, the ability to undertake all the activities required for unconventional production will be lost. The hype has no foundation.

We have been living in a major departure from reality in many ways, as always occurs during bubble times, but those times are coming to an end. Instead of overshoot, we are headed for undershoot, and we are not going to like it.

Note the critical paradox of unconventional supplies. That is where the cornucopian view of energy, where Monbiot now seems to have landed, breaks down.

The same argument applies to renewable power as it is currently practiced. Without affordable conventional fossil fuels, the increasingly complex alternatives cannot be developed and exploited.

We find ourselves in a world of receding horizons.

Unconventional supplies are always priced at conventional energy plus a premium, thanks to their crucial dependency on conventional supplies.

What high Energy Return On Energy Investment makes possible, low EROEI will eventually take away, following a brief boom that constitutes the last gasp of our modern energy bubble era.

Source: http://feedproxy.google.com/~r/TheMoneyGame/~3/cj53-wFmWiE/a-coming-demand-collapse-will-destroy-the-shale-energy-bull-case-2012-7

obama birth control mortgage settlement macauly culkin joe namath stefon diggs nazi ss andrej pejic

Yahoo Defends Android App, Botnet Questions Remain

10 Companies Driving Mobile Security

10 Companies Driving Mobile Security

(click image for larger view and for slideshow) Is a big, bad Android botnet sending mountains of spam to unsuspecting email users?

That was the warning issued by Microsoft researcher Terry Zink last week, who said that spam traps had been capturing inordinate amounts of bogus email that had been sent using Yahoo IP addresses associated with the search giant's Android app. As security experts questioned what exactly might be happening, a Google spokesman cautioned that the available evidence didn't add up to a botnet, but rather "that spammers are using infected computers and a fake mobile signature to try to bypass anti-spam mechanisms in the email platform they're using."


Webcasts

More >>

White Papers

More >>

Reports

More >>

Facing criticism for suggesting that there was a new Android botnet sending spam, Zink fired back, saying that whether or not the email signatures are faked, something's been sending spam via Yahoo's Android channels. "The reason these messages appear to come from Android devices is because they did come from Android devices," he said in a blog post.

[ Android isn't the only one having security problems. Read iPhone Trojan App Sneaks Past Apple Censors. ]

Other information security researchers backed up that finding. "Many, including Google, have suggested the messages are forged. We see no evidence of this. The messages are delivered to our spam traps from genuine Yahoo! servers with valid DKIM [DomainKeys identified mail] signatures," said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post.

Yahoo, meanwhile, defended its Android app. "While our investigation into claims of a potential malware compromise operating as a botnet is ongoing, we can confirm that there is not a problem with our official Yahoo! Mail app for Android and there is no reason for users to uninstall the app," said a Yahoo spokeswoman Friday via email.

What's going on? "One of two things is happening here," said Wisniewski at Sophos. "We either have a new PC botnet that is exploiting Yahoo!'s Android APIs or we have mobile phones with some sort of malware that uses the Yahoo! APIs for sending spam messages."

But in fact, the culprit may not be malware-infected PCs, botnets, or some never-before-seen type of Android malware. According to mobile security firm Lookout Security, in fact, the problem is rather the Yahoo mail Android app's default use of HTTP. "Yahoo! Mail for Android does not encrypt its communications by default--it performs all its functions over HTTP, not HTTPS," according to a blog post from Lookout. "This means that any traffic that is sent by the Yahoo! Mail Android app can easily be intercepted over an open network connection such as a public Wi-Fi network. This exposes Yahoo! Mail for Android to session hijacking, a form of attack that gained mainstream attention with Firesheep."

Introduced in 2010, Firesheep is a Firefox plug-in that can be used on any unsecured Wi-Fi connection to hijack the session cookies of anyone sharing the same connection who logs onto a website that uses HTTP, but not HTTPS. Created by Eric Butler, the plug-in was designed to illustrate how--in his words--"on an open wireless network, cookies are basically shouted through the air, making these attacks extremely easy." Attackers had long been able to execute credential-hijacking attacks using free, open source tools. But in the wake of Butler's plug-in release, numerous online service providers, including Facebook, added HTTPS as an option--if not always a default.

A Yahoo spokeswoman didn't immediately respond to an emailed request for comment on Lookout's theory. But according to Lookout, Yahoo's failure to use HTTPS by default means that an attacker could easily create an open Wi-Fi network, then wait for people using the Yahoo Mail app on Android to join the network, and check their email. "The attacker intercepts a particular cookie and can use it to impersonate that user, over whatever networks are available to them, including by tethering to a mobile network," said Lookout. "This allows the attacker to send spam emails that appear 100% legitimate."

Given that revelation, all Android users who employ the official Yahoo Mail app on their smartphone or tablet should immediately set the app to only check for email using HTTPS, as opposed to the default HTTP setting. According to Lookout, "from within Yahoo! Mail, simply open Options > General Settings and select 'Enable SSL.'"

Furthermore, while this latest attack targets only users of the Android Yahoo Mail app, it reinforces the need to use HTTPS whenever possible. "All mobile users should exercise caution when connecting to open Wi-Fi networks from a laptop or mobile device. We recommend that desktop users of Firefox or Chrome install the plug-in HTTPS Everywhere to ensure that their traffic to popular sites is properly secured," according to Lookout.

Employees and their browsers might be the weak link in your security plan. The new, all-digital Endpoint Insecurity issue of Dark Reading shows how to strengthen them. (Free registration required.)

Source: http://feeds.informationweek.com/click.phdo?i=4a36913f4b45545c5e480d7692648384

miss wisconsin law abiding citizen golden globes 2012 miss america lana del rey saturday night live focus on the family packers vs giants

Monkey seen? Officials search for missing macaque

(AP) ? Searchers trying to find an 8-pound monkey that escaped more than a week ago are now playing sounds of a baby monkey to try to recapture the wayward animal.

Wake Forest Baptist Medical Center spokesman Chad Campbell told the Winston-Salem Journal (http://bit.ly/MPxdJJ ) that someone reported seeing the monkey in southwestern Forsyth County on Friday. But crews didn't see the animal when they arrived. This particular type of monkey, called a macaque (muh-KAK), escaped from the Wake Forest University Primate Center.

Campbell says searchers have set up humane traps and are playing baby monkey calls to lure the animal. Officials hope the monkey will respond to the calls because she is a breeding animal used in research.

The 16-year-old macaque is originally from Indonesia and has been in captivity since 2008.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/aa9398e6757a46fa93ed5dea7bd3729e/Article_2012-07-07-Escaped%20Monkey/id-85f6145402a6415582d61d1c45b84ddc

brownback brownback salvia cybermonday deals cybermonday deals steve johnson norman reedus

Chelsea captain Terry's racism trial begins

By ROB HARRIS

AP Sports Writer

Associated Press Sports

updated 7:43 a.m. ET July 9, 2012

LONDON (AP) - The racism trial of John Terry began Monday with prosecutors contending the Chelsea captain acknowledges using offensive language on the field as a "sarcastic exclamation."

The England defender came face to face in court with Queens Park Rangers defender Anton Ferdinand, whom he is accused of racially abusing during a Premier League match in October. The 31-year-old Terry faces a maximum fine of $3,900 if he becomes the first top soccer player in England convicted of racial abuse during a game.

Ferdinand, who is black, gave evidence that he had not initially heard Terry use racist language during the game at Loftus Road. Ferdinand said he became aware of the apparent racial slur from YouTube footage. Ferdinand said he would have reported the remarks to game officials if he realized what had been said.

"When someone brings your color into (abuse), it takes it to another level and it's very hurtful," Ferdinand said.

Terry sat in the dock at Westminster Magistrates' Court behind a screen opposite Ferdinand, occasionally looking up and spending most of the time making notes.

Prosecutors opened the trial by saying Terry's comments were "uttered by way of sarcastic exclamation or inquiry in relation to a perceived false accusation made by Mr. Ferdinand" to the effect that the defendant had used a racial expletive.

Prosecutor Duncan Penny said Terry's remarks were made in response to "goading by Mr. Ferdinand on the issue of his extra-marital affair, rather than by way of exaggerated and instant querying of a perceived false allegation."

Terry was stripped of the England captaincy before the 2010 World Cup following allegations he had an affair with teammate Wayne Bridge's former girlfriend.

Terry regained the captaincy but lost it again in February with this trial pending ahead of the European Championship, at which he played in all four of England's games last month.

Two weeks after playing in the quarterfinal loss to Italy, the court only heard from Terry via statements read from interviews last year with the police and Football Association.

Terry claimed Ferdinand had shouted a "number of abusive comments" toward him and made "at least one obscene gesture with his hand, a pumping action clearly directed at me and no other Chelsea player."

"I felt he was accusing me of making a racist remark, which is simply not true," Terry said in police interviews read out to the court.

Terry's defense questioned Ferdinand on why he was "so angry" in the match after the Chelsea player tried to win a penalty. Ferdinand said that made him angry because "I'm a winner" but added he is usually a "calm and collected player."

---

Rob Harris can be reached at www.twitter.com/RobHarris

? 2012 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.


advertisement

More news

Source: http://nbcsports.msnbc.com/id/48118671/ns/sports-soccer/

stacy keibler stacy keibler all star game oscar red carpet daytona 500 start time ryan zimmerman oscars red carpet

Hackers steal BMWs in 3 minutes using security loophole

18 hrs.

There has been an unusual spike in the number of BMWs stolen in the UK this year, with some sources suggesting the number may be 300 cars or higher. The cars are being stolen without activating car alarms or immobilizers.

The suspected method involves the use of devices that plug into the car's OBD port and can program blank key fobs, leaving owners with keys to missing cars.

The essential theft process varies in detail, but all reports?seem to have a fundamental methodology in common. First, the car is entered, either via nearby RF jammers that block the fob?lock signal from reaching the car (preventing owners from securing their vehicles) or, more crudely, by breaking a window, as seen in the video in this post of the 1 Series being stolen. In cases of the window break, the thieves seem to be exploiting a gap in the car's internal ultrasonic sensor system to avoid tripping the alarm.

Once some sort of access to the vehicle is gained, the thieves connect a?device?to the car's OBD-II connector which gives them?access to the car's unique?key fob digital ID, allowing them to program a blank key fob to work with the car right then and there.

All cars sold in Europe must permit?open and unsecured access?to OBD codes, so non-franchised mechanics and garages may read the codes. BMW is not the only car company to allow key code access through the OBD port, but the?recent rash?of BMW thefts, compared to other makes, suggests another factor may be at play, possibly a good supply of blank BMW key fobs.

Used?key fobs are available, and can?usually be reprogrammed?for another car of the same model, and?new blank fobs?are available as well.

BMW?sites?and?forums?have been understandably alarmed about the issue, which is affecting all BMW series models, from the 1 to the?X6.

When contacted by Jalopnik,?BMW's UK media relations manager, Gavin Ward, shared this statement:

The battle against increasingly sophisticated thieves is a constant challenge for all car makers. Desirable, premium-branded cars, like BMW and its competitors, have always been targeted. BMW has been at the forefront of vehicle security for many years and is constantly pushing the boundaries of the latest defence systems. We work closely with the authorities and with other manufacturers to achieve this.

We are aware of recent claims that criminal gangs are targeting premium vehicles from a variety of manufacturers. This is an area under investigation.

We have a constant dialogue with police forces to understand any patterns which may emerge. This data is used to enhance our defence systems accordingly. Currently BMW Group products meet or exceed all global legislative criteria concerning vehicle security.

They're correct that the overall problem is industry-wide, but?clearly, something is up with BMWs in particular, which are being stolen in far greater quantities than would normally occur.?There appears to be a security hole that is being exploited.?

For recent-model BMW owners, options are at this point are pretty limited. The only sure-fire way to protect your car would be to disable or provide extra physical security for the OBD-II port itself. Neither is a great solution.

If manufacturers are going to provide electronic key fobs, the information needed to duplicate the key needs to be secured better. Or at all. The information needs to be available to the owner without a trip to a dealer, and perhaps should incorporate some manner of PIN or password to maintain security.

We'll keep monitoring the situation. Perhaps the world's slithering lowlifes will decide to stop stealing cars; until that happens, the ball is in BMW's court.

(Thanks to everyone for the tip!?Sources:?PistonHeads,?1Addicts,?Express & Star)

More auto awesomeness from Jalopnik:

Source: http://www.technolog.msnbc.msn.com/technology/technolog/security-loophole-lets-hackers-steal-bmws-3-minutes-868400

ghost hunters lightsquared david lee honduras prison fire do not call list sports illustrated westminster dog show 2012