Friday, August 22, 2008

Anti-Spam Managed Services

If your company or organization is having troubles with spam mails.. these are the companies that offer anti-spam managed service.

I am actually doing some research on this topic, so I would think i will just share.

Aladdin Knowledge Systems

601 Campus Drive
Arlington Heights, IL 60004
Tel: 800 562 2543 Fax: 847 818 3811
Email:

Clearswift

100 Marine Parkway Suite 550
Redwood City, CA 94065
Tel: 800 982 6109 Fax: 888 888 6884
Email: info@us.clearswift.com

Engate Technology Corporation

4790 Caughlin Parkway, Suite 240 Suite 240
Reno, NV 89509
Tel: 775 745 7151 Fax:
Email: tbusa@engate.com

Integralis Inc

330 Madison Avenue 6th Floor
New York, NY 10017
Tel: 646 495 5190 Fax: 646 4955 5189
Email: info@us.integralis.com

MX Logic

9781 South Meridian Boulevard
Englewood, CO 80112
Tel: 720 895 5700 Fax: 303 321 4930
Email:

Optrics Engineering

1740 South 300 West Unit 10
Clearfield, UT 84015
Tel: 877 386 3763 Fax: 801 7053 3150
Email: info@Netscaler.ca

Postini Inc

510 Veterans Boulevard
Redwood City, CA 94063
Tel: 650 216 3574 Fax:
Email: talktous@postini.com

Reflexion Network Inc

18 Commerce Way Suite 3750
Woburn, MA 1807
Tel: 781 569 6666 Fax: 781 5696 6667
Email: info.sc@reflexion.net

Sensory Networks Inc

2595 East Bayshore Road Suite 200
Palo Alto, CA 94303
Tel: 650 292 4636 Fax: 650 618 2769
Email: info@sensorynetworks.com

Sophos

3 Van de Graaff Drive 2nd Floor
Burlington, MA 01803
Tel: 866 866 2802 Fax: 781 494 5802
Email: nasales@sophos.com
Website: http://www.sophos.com

Vector Networks

3425 Corporate Way Suite D/G
Duluth, GA 30096
Tel: 770 622 2850 Fax: 770 4956 6214
Email: info@verdasys.com
Website: http://www.vector-networks.com


Source: SC Security Magazine



Set goals for your green IT strategy

There's a lot of talk about green computing these days, but implementing energy-efficient IT is about saving greenbacks as well as trees.

"Green IT is primarily about saving money," says Bryan Rood, director of Internet data center services at Quantros, a healthcare software provider in Milpitas, Calif. "If you want to have green IT, reducing the electric bill is one of the best ways to do it."

The reality is simple: Data centers use a lot of energy. In fact, the U.S. Environmental Protection Agency estimates that data center and server energy use has doubled in the past five years and will nearly double again in the next five years, to a cost of about $7.4 billion annually.

CIOs can cut their ballooning electric bills if they build a strategy to help lower IT power costs. The key is tailoring a strategy to specific company needs, says Aaron Hay, research consultant at Info-Tech Research Group, a technology research company in London, Ontario, Canada.

"You have to look at two things: what your goals are versus what you think the organization can reasonably accomplish," he says. For example, in a company with 1,000 PCs but only 15 servers, the PCs are using more collective energy. Upgrading to energy-efficient flat screen monitors would cut the energy bill more than server consolidation. On the other hand, a company with a 1,000-server farm in the data center should focus more on consolidation, he says.

CIOs should start with small, attainable projects and build a history of success. "Inventory what you have, and take the low-hanging fruit to get it out of the way," says Mark Wood, director of data center infrastructure at Highmark Insurance in Pittsburgh, Pa. For example, easily installed software will automatically turn PCs off at night and on in the morning. "In a 1,500-PC company, you're looking at about $30,000 to $40,000 in energy savings per year," says Hay.

Data centers are also ripe for energy efficiency programs. Vendors such as HP and IBM offer energy-efficient data center design and optimization services, but CIOs can also effectively retrofit existing resources. One popular implementation is server virtualization, which enables CIOs to use existing server capacity more efficiently. By doing so, they can consolidate their server farm, cutting electricity usage and cooling requirements. Wood, for example, wants to decrease his 329 servers by 30 percent, which should help him reduce power consumption by 10 percent this year.

CIOs should also build energy efficiency requirements in to future RFPs and equipment upgrades. Chip makers such as AMD have energy-saving technology in their processors, and many hardware vendors such as Dell and Sun Microsystems have embraced the energy efficiency mantra. Hay recommends looking for products that comply with the IEEE's electronic product environmental assessment tool (EPEAT) environmental standard. "There are many models available, and most are no more expensive than traditional models," he says.

Rood of Quantros participates in an energy reduction program of local utility Pacific Gas & Electric Company that rewards his use of VMware virtualization software and eGenera's energy-efficient servers. The program compares the total energy savings of a new server with the old models and will cut a check based on the savings over the life cycle of the new server.

Rood estimates that the virtualization, in combination with the energy reduction program, should yield a 35 percent power savings overall and hopes to be able to grow his data center while keeping energy consumption low. It's good for the environment, but even better, it helps his company. "It's really just good business," he says.

Get Started: 4 Steps to an Energy-Efficient IT Infrastructure

  1. Define your goals.
  2. Build a strategy that focuses on your company's needs.
  3. Start with a small project, and build on your success.
  4. Build energy efficiency requirements into future RFPs and equipment upgrades.

Carol Hildebrand is a freelance writer based in Wellesley, Mass. A former senior editor at CIO magazine, she has written on business and technology topics for more than 15 years.

Not Anymore

A young guy was complaining to his boss about the problems he was
having with his stubborn girlfriend. "She gets me so angry sometimes I
could hit her, the young man exclaimed.

"Well, I'll tell you what I used to do with my wife" replied the boss.
"Whenever she got out of hand I'd take her pants down and spank her."

Shaking his head the young guy replied, "That doesn't work. Once I get
her pants down, I'm not mad anymore."

Hamburg accept Man City bid for Kompany

Hamburg have accepted a bid from Manchester City for Belgium defender Vincent Kompany, according to the German club.

Details of the agreement regarding a possible move for the 22-year-old Belgium international were not disclosed in a statement posted on Hamburg's official website.

But Kompany's future at Hamburg has been called into question in recent days after he fell out with club bosses over his continued involvement for Belgium at the Olympic Games in Beijing.

Hamburg had ordered Kompany to return from the Games in time for their first Bundesliga game of the season last Friday despite Belgium's run to the final four in Beijing.

His appearance in the season-opening fixture against Bayern Munich now appears set to be 39th and last for the club since joining from Anderlecht in 2006.

'We wish Vincent all the best for his future,' said Hamburg's director of football Dietmar Beiersdorfer.

Hamburg president Bernd Hoffmann later claimed the transfer of Kompany hinged only on the player passing a medical at City.

Hoffmann said: ``We received an enquiry from Manchester asking whether Vince could imagine moving immediately and, depending on the medical examination, we quickly agreed to this transfer.''

According to reports, Kompany is set to sign a four-year contract at the City of Manchester Stadium.

Silvestre move to Gunners stuns Vidic

Nemanja Vidic admitted Mikael Silvestre has stunned all his old Manchester United team-mates by signing for Premier League rivals Arsenal.

After looking close to joining Sunderland and Manchester City, Silvestre eventually jumped at the chance of playing under Arsene Wenger, ending a nine-year association with the Old Trafford outfit yesterday by signing a two-year contract for a £750,000 transfer fee. It is the first direct transfer between the two clubs since 1987, when Viv Anderson moved north to become one of Sir Alex Ferguson's first recruits as United boss, and Vidic can still scarcely believe it. 'It surprised me. In fact I think it has come as a surprise to everyone,' he said. 'It is not often a player leaves one big club to go to another like Arsenal or Liverpool. It does not tend to happen. 'But Mikael did not play much last year and I think he just wanted to go somewhere where he would, so in that sense I am happy for him.' Vidic has grown close to the former France international during his own two-and-a-half year stint. And, while it was obvious Silvestre's first-team chances at United were strictly limited, Vidic believes the 31-year-old is still a class act. 'He has been here a long time and he still deserves to play at the highest level,' said the Serbian. 'Mikael has given so much to this club. I am just surprised he is going to Arsenal. But he has made the choice.' Vidic can look forward to pitting his wits against Silvestre later in the season.

Sunderland complete Healy and Cisse loans

Sunderland have followed up the signing of Djibril Cisse with the capture of Fulham striker David Healy for an undisclosed fee.

The 29-year-old has moved to the Stadium of Light on a three-year deal and becomes manager Roy Keane's sixth major signing of the summer following the arrivals of Cisse, Teemu Tainio, Pascal Chimbonda, Steed Malbranque and El-Hadji Diouf.

The Northern Ireland international will be looking to kick-start his career after scoring just four Premier League goals in one season at Craven Cottage following his £1.5million move from Leeds.

Manager Roy Keane underlined Healy's top-level experience and international scoring record as one of the main reasons behind the striker's arrival in the north-east.

Keane told the club's website, safc.com: 'David will be a good signing for us.

'He has lots of experience at the top level and his international record is phenomenal.'

Keane continued: 'He scored a few goals for Fulham last season, one of them was a well-taken strike against us at Craven Cottage and he is another signing who will increase competition for places.'

Healy began his career at Manchester United alongside Keane but moved to Preston in 2001 following a successful loan spell.

He then moved on to Leeds in 2004 before his £1.5million switch to the Cottagers last summer.

While his league scoring record over the last couple of seasons has been fitful, the Downpatrick forward has found great success at international level with 34 goals in 64 games for Northern Ireland.

Healy was also the leading scorer in qualification for Euro 2008 and appeared last night in the 0-0 friendly with Scotland - although he missed a penalty which would have earned victory for his side.

Healy revealed he was looking forward to being reunited with Keane.

He explained: 'I know Roy Keane from my Manchester United days and it's a privilege to join him at Sunderland.

'I'm well aware of the passion of the Sunderland fans, having played at the Stadium of Light a few times, and I can't wait to get going. It's an exciting time for me.'

Healy's arrival means Keane has brought three new strikers to the Stadium of Light as the team look to improve on their 15th-placed finish of last season.

Central defender Anton Ferdinand is also expected to join the Black Cats from West Ham.


source: soccernet.com

Microsoft may have 2,000 developers working on Windows 7

25 'feature teams' to work on different facets of the replacement to Vista OS


Microsoft Corp.'s head of engineering for the Windows 7 operating system said there are 25 "feature teams" of about 100 employees each working on the upcoming replacement to Windows Vista.

Windows 7 teams work on anything from external features, such as user interfaces, to under-the-hood areas such as networking, according to Steven Sinofsky, Microsoft senior vice president for Windows and Windows Live engineering, in a Monday posting at the new "Engineering Windows 7" blog.

"We create feature teams with n developers, n testers, and 1/2n program managers," Sinofsky wrote in a four-page blog that introduced his views on managing large-scale software development. "On average a feature team is about 40 developers across the Windows 7 project."

Based on that arrangement, each feature team would appear to have about 40 developers writing code, an equal number of beta testers -- which Sinofsky separately described as "software development engineers in test" -- and about 20 program managers.

In other words, that would be 2,000 developers creating or testing Windows 7 code, overseen by 500 managers.

Microsoft's public relations firms declined to confirm or clarify those figures.

Sinofsky, who headed development for Microsoft Office from the 2000 to the 2007 versions before taking over Windows development from retiring chief Jim Allchin, defended the size of the Windows development team against criticism that it's no longer agile and it is a major reason why the Vista operating system and other Microsoft software have arrived late and with bloated code bases, suffering from "featuritis."

"Some have said that the Windows team is just too big and that it has reached a size that causes engineering problems. At the same time, I might point out that just looking at the comments there is a pretty significant demand for a broad set of features and changes to Windows," Sinofsky wrote. "It takes a set of people to build Windows and it is a big project. The way that I look at this is that our job is to have the Windows team be the right size -- that sounds cliche but [what] I mean by that is that the team is neither too large nor too small, but is effectively managed so that the work of the team reflects the size of the team and you see the project as having the benefits we articulate."

Scheduled to arrive in 2010, Windows 7 will include touch-screen technology and other new features. It will be fairly similar under the hood to Windows Vista in order to minimize application and device compatibility problems.

Sinofsky suggested that critics who think Microsoft should simply remove features from Windows or start over from scratch are being naive.

"I'm reminded of a scene from [the movie] Amadeus where the Emperor suggests that the Marriage of Figaro contains 'too many notes' to which Mozart proclaims 'there are just as many notes, Majesty, as are required, neither more nor less.' Upon the Emperor suggesting that Mozart remove a few notes, Mozart simply asks 'which few did you have in mind?'" he wrote.

Countermeasures against targeted attacks in the enterprise

In the early days of computing, viruses commonly hopped from one machine to another via floppy disk. Few machines had proper antivirus protection, and even fewer users cared about security as malware was largely benign and had limited network and application resources at their disposal.

Now we are entering a new age when not only is malware prevalent and dangerous, but human actions also matter more than any myriad of security technologies an organization may have in place. This confluence has spawned a flood of targeted attacks that look to exploit human mistakes. At the core of many of these attacks, we find social engineering. Social engineering attacks prey on human vulnerabilities, and are fueled by the availability of data about potential victims.

This tip will explore some of the most prevalent and dangerous varieties of targeted attacks victimizing enterprise users today, and how security organizations can defend against them.

The effectiveness of social data mining
A key piece of the puzzle in preventing targeted attacks is to make data mining difficult. Also known as buddy mining, this is when attackers seek to learn who knows who, and how. If attackers have an understanding of the trusted relationships within an organization, they can exploit that knowledge to plant malware and acquire sensitive data.

For instance, if an attacker learns that two employees with an organization, Joe and Lucy, are friends, he or she might send Joe an email purporting to be from Lucy. The text of the message might say, "Joe, take a look at this funny slideshow I put together. Later! Lucy." If the attacker can persuade Joe to open the email amid the guise of his trusted relationship with Lucy, it gives the attacker power over that user to spread malware virtually at will.

Similarly, consider a malicious email to all employees appearing to come from the system admin, saying "We are under attack by viruses, and I am working on updating our firewalls. To help me protect the system, please install the attached virus shield on your machines right away. Thanks! Bob". Such a message seeks to exploit the trusted relationship between employees and IT staffs.
How can an attacker obtain the organizational charts of a company he or she wishes to target? There are many ways. For example, consider the simple Google query: "at site:linkedin.com"

This will return a list of public LinkedIn profiles to be returned, and each result will specify the name of the person working in the specified company, his or her position, and maybe even a list of his or her closest colleagues. An attacker who knows the email address formatting conventions within a company would automatically know the email addresses of many potential victims. But knowing the names of employees may let him find personal email addresses for target individuals, too, in order to reach victims outside the protective shields of their companies. This can be achieved by looking for other instances of name and other identifying information; after all, given only name, gender and zip code, 90% of Americans are uniquely identifiable.

Defending against social data mining
How can enterprises defend against social data mining? To aim at the root of the problem, one can protect the names of employees on corporate websites, and discourage employees from maintaining public profiles on social networks (whether for work or for fun). That makes it harder for an attacker to design and initiate an attack. Companies can also scan computers that are brought inside the corporate firewall; this protects against device infections that occur in employees' homes and in public places beyond the network perimeter.

There are secondary lines of defense to consider, too. For one, better spam filtering makes it harder to reach the potential victims, and good antivirus protection from an established vendor that provides regular, reliable updates will effectively block many dangerous attachments.

But we must recognize that since social engineering takes advantage of human vulnerabilities, and not technical weaknesses, that also means that education must be a part of the defense system, just like technical countermeasures are. If users are at least vaguely familiar with the common techniques used by fraudsters, they are likely to be less susceptible to such attacks. And providing users with an understanding of how much personal information is commonly accessible to just about anybody may humble them, making them less likely to believe that every correctly addressed email is legitimate.

The worst thing an enterprise can do is to think: "Why us? We do not stick out, why would anybody target our employees?" Almost nobody thinks they will have a traffic accident, but still, people do. Sometimes, a spoonful of paranoia is a good first step.

About the author:
Dr. Markus Jakobsson is a Principal Scientist at Palo Alto Research Center. He is a founder of the security startup RavenWhite, which addresses security problems associated with authentication, malware and click-fraud. He is also one of the founders of SecurityCartoon, an educational approach targeting typical Internet users.

Previously, he has held positions as Associate Professor at Indiana University, Adjunct Associate Professor at New York University, Principal Research Scientist at RSA Security, and was a member of the Technical Staff at Bell Labs. He is a visiting research fellow of the Anti-Phishing Working Group (APWG), and is a consultant to the financial sector.

Dr. Jakobsson teaches on phishing and counter-measures, click-fraud, the human factor in security, cryptography, network security and protocol design.

Nokia admits security flaws in Series 40 OS

Widely used operating system could allow activation of stealth applications

August 21, 2008 (IDG News Service) Nokia Corp. confirmed today that its widely used Series 40 operating system has security vulnerabilities that could allow stealth installation and activation of applications.

But the company was evasive on whether it paid nearly $30,000 to researcher Adam Gowdiak of Security Explorations, who wanted payment for effort spent finding the flaws.

"For obvious reasons of security, we will not comment further on the detail of our activities with Security Explorations," wrote Nokia spokeswoman Kaisa Hirvensalo, in an e-mail.

Gowdiak, a researcher in Poland, said earlier this month he had found problems with Java 2 Micro Edition (J2ME), an application framework for mobile devices, as well as the Series 40 OS. Nokia claims Series 40 is the mostly widely used mobile device platform.

Gowdiak has done research on the Java Virtual Machine and wrote on his Web site that he worked at one time for its developer, Sun Microsystems Inc.

Vendors typically steer clear of paying researchers for vulnerability information and alternatively encourage what they term is "responsible disclosure," or a discrete notification before vulnerability information is made public. Otherwise, users of a particular software are at risk while a vendor tries to develop a patch.

Nokia said some of its Series 40 products are vulnerable to an attack that could result in the secret installation of applications. The company said it has also found earlier versions of J2ME could allow privilege escalation or access to phone functions that should be restricted.

"Our testing has been concentrating on products that might have both of the claims present," according to a Nokia statement.

Nokia said it isn't aware of attacks against Series 40 devices, and the problems do not represent a "significant risk."

While details on the vulnerabilities are limited, Gowdiak has said an attack could be mounted by sending maliciously crafted messages to a particular phone number.

Gowdiak could not be immediately reached for comment.

IDG.net
Story copyright 2008 International Data Group. All rights reserved.

Facebook hopes new ad scheme can engage users

'Engagement Advertisements' let users comment on ads or become a 'fan' of a product

August 21, 2008 (Computerworld) Facebook Inc. has quietly launched a new type of advertisement that it hopes will help in the struggle to find a way to help advertisers profit from the treasure trove of demographic and other data it has gathered from members of its social network.

The new, so-called Engagement Advertisements aim to encourage Facebook users to interact with ads by leaving comments or sharing virtual gifts with other members, said Jeremiah Owyang, an analyst at Forrester Research Inc. who was briefed on the new program. Facebook has not yet formally announced the new offering.

"To combat dismal click-through rates of traditional advertisements, these features emulate widgets and encourage users to increase member adoption, viral growth and brand interaction," Owyang noted in a blog post today. However, he cautioned that the plan will succeed only if advertisers create content that puts community first, find new ways to interact with users and change the criteria for measuring success.

Early users of the new advertising technique will include Paramount Pictures, Adidas and General Mills, Owyang said.

The new program lets users leave comments associated with the ads much like they post comments to their friends' profiles. It also lets advertisers create virtual items for users to share with their friends. In addition, users can become "fans" of a product, thus triggering a notification to their network of Facebook friends.

Owyang did warn potential advertisers that, according to Forrester's research, younger users of social networks are not interested in using them to learn about new products. Instead, these users are interested in communicating and expressing themselves on Facebook-like sites.

"While costly, risky and foreign to brands, the biggest missed opportunity for brands in social networks is to become part of the community, interact and build real relationships," he went on to note. "Although we should expect interaction rates and viral spread to increase with engagement ads, brands should wait and see how these ads click-through rates perform."

Owyang said that companies that do use the engagement advertising scheme should do the following things:

  • Focus ads on the community
  • Interact with users in the community -- not ask them to link to other sites
  • Change metrics of success because it can't be weighed solely on page views or referral traffic

"This announcement helps to set in place how online marketing will start to evolve," he added. "Widgets have already become advertising units, and now these advertisements are starting to become widgets."

As for Facebook, he suggested that they "hand-hold" customers as they navigate through the social network's frequently changing marketing plans.

"Facebook must develop a client solution that will help optimize these tools with professional services based on data, results and demographic information," Owyang added. "Marketers can't afford to experiment with their brands without the help of a trained and experienced group of social marketers provided by the platform."

"Inside Facebook" blogger Justin Smith spotted one of the new ads on Facebook last week when they were launched and noted that this type of ad unit could drive more engagement than any other such product on Facebook.

"The comments around the ad dramatically increase engagement with the unit, as the highly visible comments provide an opportunity for users to simultaneously draw attention to the ad by drawing attention to themselves," he noted. "While this could backfire if comments degrading the advertiser are abundant … the ad comments powerfully take advantage of Facebook's social dynamics to draw attention to an ad in a way that is impossible without the social graph."

Source: ComputerWorld By Heather Havenstein

LeBron's role on Team USA?

By LUCIANA CHAVEZ - McClatchy Newspapers

BEIJING --
USA men's basketball coach Mike Krzyzewski and his staff did not appoint a team captain for the 2008 Beijing Olympics.

LeBron James fancies himself the man for the job.

Helping the U.S. saunter undefeated into Friday's semifinal showdown with defending Olympic champion Argentina, James has not just embraced his role as the quarterback of the U.S. defense, which has decimated opponents in Beijing, or his desire to be heard on the court and in the locker room.

He has put a chokehold on those things.

James may have appointed himself but that's the point: He took the initiative amongst his peers, all NBA all-stars, on the U.S. team.

That's different than doing the same with the 11 Cavaliers who trail after the Nike pitchman and one-time "Saturday Night Live" host in Cleveland.

"I knew it had to come from someone," James said. "No matter how good we are as individuals, if you don't have a leader, it's not going to be right. I just took that responsibility from day one."

On the court, through six Olympic games, James leads the U.S. in scoring (15.8 per game), steals (16) and blocked shots (seven) and ranks second in rebounds (31) and assists (25).

Off the court, he has cajoled his teammates, reminding Dwight Howard to push himself more and telling Kobe Bryant to quit gambling so much for steals.

He's also demonstrated how to correctly calibrate that special brand of American swagger for an international audience eager to see them act like idiots and disrespect the game.

James has acted like he cares. When Aussie big man Mark Worthington set down Carmelo Anthony with a hard foul Wednesday, James rushed to Anthony's defense.

James is a physical freak of nature who is emphasizing the physical part here in Beijing, grabbing steal after steal and throwing down dunk after dunk with power.

It seems like because he's working hard on defense, no one begrudges him the monster dunks.

Someone asked him the other day why his plays have looked so nasty here in Beijing.

"Did it look nasty?" James asked, a trifle too innocently. "Yeah, that was nasty. It felt good, too."

"For me to lead 11 other superstars, I have to kind of have that chip on my shoulder," James said.

Like any good leader, he also knows when to take a gentler approach. Before the games, James gave each of his teammates a new set of "Beats by Dr. Dre" headphones.

"(I did it), for one, because they all wanted them when they saw me with them," said James, who hooked the players up with help from rapper/producer Dr. Dre and music industry executive Jimmy Iovine.

"And it's a team camaraderie thing for me. I'm all about team. The easiest thing to do to bring a team together is to give them a gift. We all love gifts."

James said he would not have been capable of asserting himself, with Bryant, Dwyane Wade, and Tayshaun Prince, the only NBA champions on this squad, or veterans such as Jason Kidd or Michael Redd, or even close friends like Wade and Anthony or peers like Dwight Howard.

"Two or three years ago, no. Last year, maybe," he said. "I think it began last summer at the FIBA Americas tournament when we won."

James started making the transition from basketball phenom to veteran in 2004. That year, he was a late addition to an unprepared group that won bronze at the Athens Olympics, losing to Argentina in the semifinals.

James said that squad made it to the semifinals on skill alone.

"We didn't play well. We didn't have a leader. This team has a totally different feel," he said.

"It wasn't a great experience for me. I was 19 years old. I thought I was good enough to be playing but I wasn't (playing). I was away from home for 37 days and not doing what I love to do, so it was hard."

Since then, he has lifted three Cleveland teams to playoff berths the past three seasons, including to the NBA Eastern Conference finals in 2007.

James said he's a better basketball player than he was four years ago in Athens.

"Mentally and emotionally," he said. "Every game I go out there, I don't want it to be my last time, so I'm focused."

James has not played his life like a poker hand. He aims to be a successful businessman so he has sought out the help and friendship of entrepreneur extraordinaire Warren Buffet. He wants NBA titles like Bryant, Prince and Wade so he gleans what he can about them from the past three years he has spent with the national team.

"We are all our team's superstars back in the league so when we come here we give up ourselves for the team," Howard said. "It's good for all of us. ... It's been fun to watch these guys and get to know what to do when I get back to my team."

James isn't the only one who acts as a leader on the U.S. team. Kidd, Wade and Bryant all will assert themselves depending on the situation. Is that because James and those players need to lead or because the team needs them to lead?

"It's' a little bit of both," Wade said. "We have a lot of leaders on this team. LeBron is a vocal leader but he can lead by example, too. We have different ones but we need all of them."

James last won a big title his senior year at St. Vincent-St. Mary's High in Akron, Ohio, in 2003. He hasn't yet had the personnel around him to win an NBA title. An Olympic medal would trump both several times over.

"It would be the biggest thing that ever happened to me in basketball," James, 23, said.

The gold medal would fill a void for James, who knows titles turn great NBA players into the singular stars of the game.

"Absolutely, but this is separate from the NBA," James said. "This means a lot more to me than an NBA title because I'm representing my country. I approach each game like it's the last. So I'm trying to play it the right way."

Thursday, August 21, 2008

Intel plans to support 2.3GHz, 3.5GHz WiMax next year

Intel Corp. plans to extend the frequency ranges supported by its WiMax chipset next year beyond the 2.5GHz profile, according to a company executive.

WiMax support currently is an option with Intel's Centrino 2 chip package for laptops, but Intel's WiMax chipset only supports the version of the technology that uses 2.5GHz spectrum. This version of WiMax is being rolled out in the U.S., where operator Clearwire Inc. plans to launch services in three cities before the end of this year.

"For 2009, we will start supporting other markets outside of the U.S., at 2.5GHz and in other spectrum profiles," said Garth Collier, general manager of WiMax at Intel Asia-Pacific.

While Collier did not specify the additional WiMax profiles Intel plans to support, there are only three supported by the WiMax Forum's interoperability testing: 2.3GHz, 2.5GHz and 3.5GHz. Since Intel already supports 2.5GHz, Collier's reference to support for multiple additional profiles suggests the chip maker will add support for the remaining 2.3GHz and 3.5GHz profiles to its product lineup.

Collier's comments offer the first glimpse into Intel's future WiMax product plans. Until now, the company has only said it plans to add support for 2.3GHz and 3.5GHz at a future date, without specifying when that might happen.

Asked about the ambiguity that surrounds release dates for WiMax chipsets that support 2.3GHz and 2.5GHz, Collier suggested a 2009 release for such a product may not be etched in stone.

"We haven't given out a definite date," Collier said. "It's one of those chicken and egg situations, it's dependent on the development of networks, how much coverage they have [and] what the underlying demand is."

By those metrics, the release of 2.3GHz and 3.5GHz chipsets should happen sooner rather than later. Some of the world's largest commercial WiMax networks are in South Korea, which uses the 2.3GHz profile, and Pakistan, which uses 3.5Ghz spectrum.

If Intel plans to release products that support additional WiMax profiles in 2009, such an announcement could be made at the Intel Developer Forum conference, which is being held in San Francisco this week.


Reprinted with permission from

IDG.net
Story copyright 2008 International Data Group. All rights reserved.

Is Silvestre the experience Arsenal need?

Arsenal's young side have been crying out for an experienced player since the departures of Gilberto Silva, Alexander Hleb and Jens Lehmann this summer. And now they have one.

Mikael Silvestre

MarkThompson/GettyImages

The defender has moved to the Emirates.

But many Gunners' fans will have to look twice at Arsene Wenger's new acquisition, Mikael Silvestre, as he made his name at arch-rivals Manchester United.

Not since Brian Kidd 34 years ago has a player left United for the red half of North London and it makes you wonder: if Silvestre wasn't deemed good enough to carry on playing for the current champions, is he really the type of player that can turn Arsenal into champions?

The short answer would appear to be no. Having spent most of last season on the sidelines after suffering a knee injury, Silvestre has lost the pace, strength and solidity that made him such an important player for Fergie's men in days gone by.

More importantly from an Arsenal perspective, although the versatility of the Frenchman is a good attribute, the club have no need for a player who can fill in at left-back.

Armand Traore has shown himself to be a more than able deputy to Gael Clichy and Johan Djourou and Alex Song will fill in quite happily should anything happen to William Gallas or Kolo Toure. Of course Philippe Senderos is there in an emergency too.

If anything, Arsenal need cover for Bacary Sagna at right-back. His absence at the end of last season (along with Wenger's decision to use Toure at right-back over Emmanuel Eboue) left a gaping hole in the defence and Silvestre is a left footed defender, unable to play at right-back with any authority.

The fact that the Frenchman is 31 also raises some questions. Wenger has been loathe to sign any player over the age of 30, firstly becase it would 'kill' his youth policy, and also because of his desire not to give ageing players a long contract.

Robert Pires, Jens Lehmann and Dennis Bergkamp have all fallen victim to this policy and were never offered anything more than a one-year deal, but the injury prone Silvestre has been offered a two-year contract.

Hypocritical? Desperate? Who knows, but if Silvestre follows the lead of Younes Kaboul at Portsmouth and is the 'experienced defensive midfielder' that Wenger has been pursuing all summer, Arsenal really are in trouble.


source: John Carter, Soccernet

Arsenal sign defender Silvestre from Man Utd

Arsenal manager Arsene Wenger has bolstered his defensive options after the Gunners completed the signing of Manchester United defender Mikael Silvestre for an undisclosed fee.

NealSimpson/Empics

The Frenchman spent a lot of last season injured.

The 31-year-old, who missed a large part of last season with knee ligament damage, has agreed a two-year deal at the Emirates Stadium after nine years at Old Trafford.

Silvestre had fallen down the pecking order at United with Nemanja Vidic and Rio Ferdinand becoming Sir Alex Ferguson's first-choice partnership at the heart of the defence.

And with his contract set to expire in 2009 Ferguson has allowed Silvestre - who is the first player to leave United for Arsenal since Brian Kidd 34 years ago - to join one of their major Premier League rivals.

Arsenal though are short on experience and Wenger cited Silvestre's ability to fulfil several defensive positions as the two factors behind the deal.

Wenger said: 'We have a strong squad but a young squad and Mikael's versatility, experience and calibre will provide the extra depth we need to reinforce our challenge for honours this season.

'His defensive adaptability will serve us well and it's a big plus that Mikael has top-level experience and a great understanding of football in the Premier League.'

Silvestre, who has also won 40 caps for France and was part of the squad which reached the World Cup final in 2006, is looking forward to a new phase in his career.

'I've spent a large part of my career at United, the last nine years, and I'll remember that time fondly but feel I'm ready for a new challenge,' said Silvestre who has been handed the number 18 shirt.

'Arsenal is known for playing technical and skilful football, and has a young but experienced squad.

'I'm really excited about this next stage of my career, hopefully playing my part in helping the club to new successes.'

Speaking after Silvestre had completed the formalities of his move Ferguson thanked the French defender for his contribution during his time with the club.

He said: 'Mikael was a great servant and a wonderful professional. We wish him all the best at his new club and thank him for his service.'

Spain beats Croatia 72-59 in men’s basketball

BEIJING (AP)—Los Angeles Lakers center Pau Gasol scored 20 points to lead world champion Spain to a 72-59 win against Croatia Wednesday in men’s basketball.

Felipe Reyes added 13 points for Spain, while Toronto Raptors point guard Jose Calderon added 10. Gasol also had a game-high 10 rebounds.

Marko Banic had 15 points to lead Croatia.

The Spaniards took control of the game early with a 12-1 run in the first quarter.

source: NBA Yahoo! sports

Team USA Pounds Australia, 116-85

Kobe Bryant scored a game-high 25 points--the most by any American player in this year's Olympics--as Team USA defeated Australia 116-85 and moved to within two victories of winning the gold medal. LeBron James added 19 points, nine rebounds, three assists and four steals. Bryant played a team-high 26 minutes, while James played 25 minutes, five more than any other player on the squad. NBA fans get so caught up in debating whether Bryant or James is the best player in the league but the important thing right now is that the two best players in the world are on the same team and they are both playing at a very high level. Before the game, USA Network color commentator Doug Collins singled them out as the two most important players on the roster. He said, "The guy who has been the catalyst is LeBron James. He's the guy on the back line blocking shots (and also) stealing the basketball." Collins then spoke of Bryant's contributions, noting, "Defensively on the perimeter, he has taken the other team's toughest guy." People who fretted that Team USA does not have enough big men do not understand basketball in general and FIBA basketball in particular: James is big enough to be a big man in any league in the world and great defense starts with defensive pressure in the backcourt, which Bryant has supplied since he was added to the team last summer.

Carmelo Anthony (15 points on 5-9 field goal shooting), Chris Bosh (10 points on 3-4 shooting, six rebounds) and Deron Wiliams (10 points) also scored in double figures. Dwyane Wade had a quiet game offensively--eight points on 3-8 shooting--though he did get eight rebounds. Dynamic guard Patrick Mills led Australia with 20 points, while reserve Glen Saville added 13 points. Andrew Bogut had just four points before leaving in the second half after reinjuring his balky left ankle.

Team USA's game plan early in the game focused on feeding the ball to Dwight Howard in the paint and this worked to perfection as Howard drew two fouls on Bogut in the first 2:42. Team USA raced to a 12-3 lead as Howard converted a three point play, Anthony scored two baskets, Bryant made a jumper and James drilled a three pointer. Australia is a feisty team, though, and they battled back to cut the margin to 17-14 as Team USA took some questionable shots and had some defensive lapses. In one sequence, James inexplicably pulled up behind the three point line and launched a jumper on a 2 on 4 fast break, with Bryant in the left corner and not one Team USA player in the paint. Later, Bryant wisely passed up taking a three pointer in the half court set in order to feed the ball to Howard in the post. Howard got fouled and split a pair of free throws but Bryant, who is a great free throw line offensive rebounder, corralled the miss; his turnaround jumper was off the mark but the extra possession paid off for Team USA because Howard tipped in Bryant's shot. Australia answered with a Chris Anstey three pointer and then Bryant missed a three pointer early in the shot clock. Collins said, "I think every time the United States takes one of those quick threes it helps Australia's defense." So many people have erroneously talked about how important it is for Team USA to make three pointers but it is far more important for Team USA to defend the three point line effectively, force turnovers/missed shots and then score in transition. For Team USA, the three point shot is a luxury that can pad a lead, not a necessity for winning--something that should be evident to everyone after this contest, considering that three straight three pointers bridging the second and third quarters enabled Team USA to push a nine point lead to 18; Team USA was winning even before the three point barrage, but the outside bombing turned the game into a rout. That is why you only see Michael Redd on the court in garbage time and why defensive specialist Tayshaun Prince is the first wing player off of the bench after Wade.

Sideline reporter Craig Sager said that after a stoppage of play late in the first quarter, Coach Mike Krzyzewski told Team USA, "Stop being stupid. You are making dumb plays." In other words, stop looking for early three point shots and do a better job of guarding Australia's three point shooters; Australia shot 3-7 from three point range in the first quarter, tied the score at 21 and only trailed 25-24 after the first 10 minutes. A greater concern for Team USA than three point shooting is their free throw shooting: Team USA shot 5-11 (.455) from the free throw line in the first quarter and 18-31 (.581) for the game. Team USA can decide how many three pointers to shoot and when to shoot them but the opposing team dictates to some extent how many free throws Team USA will shoot and slowing the game down by fouling may be the best strategy against Team USA, at least for a team that has enough depth to withstand some foul trouble.

Early in the second quarter, Team USA went with a small lineup of Bryant, James, Anthony, Wade and Williams, trying to speed up the tempo against the bigger, slower Australian group that was on the court. Team USA forced a turnover that James converted into a fast break dunk for a 33-28 lead but then Anthony committed his second foul and had to go to the bench. He was replaced by Bosh, giving Team USA a more conventional--but still very quick--quintet. Bogut scored on a nice drive to the hoop but Bryant answered with an emphatic dunk in the half court set. Collins said, "Smart decision by Kobe Bryant. Looked like he was going to take the three. (David) Anderson on the closeout could not play with that type of quickness and Kobe with a brilliant play." Next came a wild sequence in which James stole the ball but threw it away and then Wade stole the ball and passed to Williams, who advanced the ball to Bryant, who faked a behind the back pass and made a layup. Australia trailed 37-30 and immediately called a timeout. On the next possession, Australia ran a great play resulting in a layup for Bogut. Collins observed, " Chris Bosh showed too quickly and when he did Andrew Bogut slipped the pick." Bryant immediately came over to Bosh and explained to him what he did wrong. That kind of leadership does not show up in the boxscore but it is exactly what Team USA was missing in previous years. Don't forget that Team USA led 33-21 early in their 101-95 loss to Greece in the 2006 FIBA World Championship. At that point, James told his teammates on the bench, "They don't know what to do"--but when Greece hit Team USA with a 24-8 run it was James and Team USA that did not know how to stop the bleeding. It is a different story now with Bryant on the team, because the defensive intensity is higher and when mistakes are made they are immediately corrected during the game. After the game, Jason Kidd said of Australia's strong early play, "We felt that in this game that they were going to live and die by the three pointer. They made a couple. We had a couple of defensive breakdowns but we took care of it. That's the beauty of this team. On the fly we can solve problems without having to call timeouts. Communication is a big weapon for us. Nobody is afraid to talk to one another because we all respect one another." Once again Kidd's boxscore numbers (four points, one assist) will not blow anyone away but he has played a big role in changing the culture for Team USA and that should not be diminished or forgotten.

Another key moment came at the 3:59 mark with Team USA leading 43-36. James failed to complete a three point play by missing a free throw, Anthony got a strong rebound and Australian reserve Mark Worthington wound up and took a big swipe at Anthony's put back attempt, clocking Anthony in the head. Anthony smartly just smiled and walked to the free throw line but players from both teams began jawing at each other. Australia knows that Anthony and Howard can be hotheads and part of their strategy was to be very physical and hopefully get those guys off of their games. That approach helped Australia to give Team USA their toughest battle in the pre-Olympic exhibition tour, with Team USA only winning by 11, 87-76. Collins noted that the Soviet Union used a similar approach against Team USA when Collins played in the 1972 Olympics and it paid off as the Soviets baited Dwight Jones into being ejected. Collins said, "This is where you have to keep your poise. Worthington comes into the game. He's a guy who has no value to the Australians except maybe to get one of the better American players thrown out." Anthony made both free throws to put Team USA up 45-36. After the mishap on the Bogut play, Team USA closed the quarter with an 18-11 run--punctuated by a buzzer beating three pointer by Williams--to make the score 55-43 at halftime.

If Australia had any illusion about keeping the game relatively close in the second half, Bryant quickly disabused them of that notion, draining a three pointer on Team USA's first possession of the second half and scoring nine points in just 3:20 as Team USA used a fourteen to zero run to take a 69-43 lead. Bryant shot just 1-15 from three point range in the first two games of the Olympics, leading to some poorly considered commentary in some quarters about Bryant's relative value to this team. However, I kept a level head and wrote, "Bryant shot 17-37 (.459) from three point range last summer when Team USA went 10-0 en route to winning the gold medal in the FIBA Americas tournament and he shot 7-19 (.368) from three point range when Team USA went 5-0 during their pre-Olympic exhibition tour--that adds up to 24-56 (.429) three point shooting during his 15 FIBA games prior to the Olympics. Bryant shot .361 from the 23-9 NBA three point distance last season and is a .340 career NBA three point shooter. In other words, at some point he is going to have a 6-8 game from the three point line and by the end of the Olympics his three point shooting percentage will be around its normal level." Bryant shot 4-7 from three point range versus Australia and he has shot 11-21 from behind the arc (.524) in the past four games, improving his overall three point percentage in the Olympics to .333. Bryant told Sager after the game, "The three point line now (in FIBA play), that's where I shoot fadeaways from." I read an idiotic comment somewhere in which someone asked how can Bryant be a top NBA shooting guard if he cannot make catch and shoot shots from 20 feet? As Bryant indicated, in the NBA he catches the ball at the free throw line extended and shoots turnaround jumpers from that range (or from just a little closer); Bryant is used to shooting three pointers from 23-9, so catching the ball facing the hoop at 20-6 is a little bit different. It's not that he cannot make the 20-6 shot but just that faceup shots from that range are not part of his normal repertoire. Bryant admitted that he is actually more comfortable shooting from a few steps behind the FIBA three point line, which he did a couple times in this game.

Bryant was the only Team USA player who played the entire second quarter plus the opening minutes of the third quarter, a stretch during which Team USA outscored Australia 46-24 (James sat out a little over a minute and a half during that time); except for the game against Spain when Bryant experienced early foul trouble, he typically has played most if not all of the second quarter and has almost always been on the court when Team USA breaks the game open in the second or third quarter.

Team USA pushed the margin to 85-55 before settling for an 89-61 advantage at the end of the third quarter. By that time, Bryant, James, Anthony and Kidd had been on the bench for a few minutes and one could have reasonably expected that their work was done. Wade was on the court at the end of the third quarter and he started the fourth quarter, which has been a normal rotation for this team--but Coach Krzyzewski inexplicably brought Bryant, James, Anthony and Kidd back into the game shortly after the start of the fourth quarter with Team USA leading 91-63. That quartet played alongside Redd. Maybe the idea was to spread out the defense enough so that Redd could make a shot? Redd did nail his first jumper en route to a 2-3 shooting performance in the fourth quarter to improve his Olympic shooting percentage to 10-31 (.323). Collins assured viewers that Redd could go off and make four in a row at any point to get his numbers back up to par. I have no doubt that this is true but if Redd does this it will be in garbage time, not when the game is even remotely in doubt. The bigger issue is bringing back four starters with a huge lead. Frankly, I was dumbfounded by this decision, particularly considering that Australia is a physical team and that they were no doubt frustrated about their imminent elimination from medal play. What would happen to Team USA if Australia committed a hard foul on Bryant or James and injured one of those guys?

Team USA outscored Australia 10-7 before the four starters returned to the bench. Wade came back for a cameo appearance and then he left the game for good. The curious substitution patterns slightly distorted the on court numbers for the five players who I have been tracking: Team USA outscored Australia 77-48 when Bryant was on the court, 75-48 when James was on the court, 60-37 when Anthony was on the court, 44-26 when Kidd was on the court and 48-43 when Wade was on the court. As I noted, Bryant was the only player who was on the court during Team USA's 46-24 run in the second quarter and early stages of the third quarter, though James was on the court for the vast majority of that time. Kidd helped Team USA get off to a good start by feeding Howard the ball early in the game and he was the point guard when Team USA broke the game open in the third quarter.

Argentina defeated Greece 80-78, so they will play Team USA for the right to advance to the gold medal game. Manu Ginobili scored 24 points and shot 6-13 from three point range versus Greece and it will be Bryant's job to contain him, a challenge that Bryant welcomes and relishes. After Team USA beat Australia but before Argentina played Greece, Bryant said, "We want to play the best. We want to play the defending (Olympic) champs. It's all about challenges and obviously we welcome all comers. We know what a great team Greece is. Argentina is the defending champs. You want to be able to play the guys who won it the last time. I would love for us to have the opportunity." Of course, someone tried to twist his words into a slap at the Greeks, so Bryant immediately clarified his remarks by adding, "They're both great teams. The point that I'm making is that when you're a champion, you want to have the opportunity to defend your championship. And, anyone who has aspirations to be a champion, you understand there is a sense of pride that comes along with beating a champion. That's all that comment's about."


Getty Images


Original Story: http://20secondtimeout.blogspot.com/2008....

Wednesday, August 20, 2008

Which Muscles??????

"How's your gymnast girlfriend of yours these days?" this guy asked his
buddy.

"Oh man, she's fine and in great shape! She's been working on
developing really concentrated muscle tone."

"Yeah? Which muscle is she toning up?"

"Mine."

How to delete your hotmail account

Follow these steps to delete your Hotmail account:

  1. Click Help on any Hotmail page (usually top right-hand corner).

  2. Type Close Account in the keyword search section of the Help screen.

  3. Click the Close Your Account link within the Help screen.

  4. Click the go to the Close Account link that is highlighted in blue.

  5. Read the instructions. When you are satisfied that you understand the terms associated with an account closure, click Close Account.

I recommend just stop using it because that is the simplest thing to do.

One note: if you're closing your account because you feel someone's abusing it, please be aware that some time after you close your account someone else could open a new one using your old account name and pretend to be you.

Personally, I recommend just stop using it because that is the simplest thing to do. However, in the interest of keeping your reputation safe, I'd also recommend that you do check in on it every so often to keep it active just to make sure no one else takes it. I believe the same approach is best for most all of the free email services.



source: ask leo