10 months agoEverton threaten Spurs plans for Boca Juniors midfielder Wilmar Barrios

first_imgTagsTransfersAbout the authorPaul VegasShare the loveHave your say Everton threaten Spurs plans for Boca Juniors midfielder Wilmar Barriosby Paul Vegas10 months agoSend to a friendShare the loveEverton are being linked with Boca Juniors midfielder Wilmar Barrios.Barrios has been linked with several of Europe’s top clubs, including Real Madrid, Tottenham and AC Milan.And Everton have now joined the race to land the Colombia central midfielder.He has a €20m (£18m) in his Boca Juniors contract, which could be triggered in January by the Toffees.Marca says the 25-year-old is up for moving to Europe from Argentina and a switch to Goodison Park would allow him to settle in alongside pal Yerry Mina, who joined from Barcelona in the summer. last_img read more

Cyclist Represents Elton John AIDS Foundation

first_imgUpcoming 18yo star South African cyclist and sprint champion of last year’s Cape Rouleur, Nicholas Dlamini is to ride 2014 Cape Rouleur from 2-6 March as an Ambassador for the Elton John AIDS Foundation.Nicholas Dlamini Rides For EJAFDlamini has proved himself a talented cyclist and was crowned the winner of the Amateur Green 36One Sprinter’s Jersey during the 2013 Cape Rouleur (part of the HotChillee Global Event Series) with Ride Magazine flagging him as a ‘name to watch’. Growing up in Khayelitsha and Capricorn Park in Cape Town, riding for the Foundation in this year’s Cape Rouleur has added significance.“Growing up in and around Khayelitsha, I understand the damage that HIV has done to families, neighbourhoods and the country as a whole. I am excited and proud that my passion for cycling can help raise funds and awareness to fight HIV in my country. I’m looking forward to riding with the guys from UBS, and am delighted to be of help to the Elton John AIDS Foundation, that has done so much to fight HIV around the world”, says Nicholas Dlamini.The Elton John AIDS Foundation has given over ZAR196 million (GBP£16 million) to 197 projects throughout South Africa including since 1993 reaching over two million people living with and affected by HIV/AIDS. The Foundation continues to work extensively in and around the areas where Nicholas grew up.The charity’s Founder, Sir Elton John, commented ‘At my Foundation, we are passionate about helping to create an AIDS-free future for South Africa’s youth, so it’s fantastic to have such an inspirational young man as Nicholas joining forces with us. He understands that lifelong commitment is essential in realising your dreams. This kind of commitment is what will save lives in South Africa. On behalf of all of us at the Foundation, I want to wish Nicholas and his team every success for the Cape Rouleur.’“Nicholas is one of a range of new Ambassadors for the Foundation” commented Anne Aslett, Executive Director of the Elton John AIDS Foundation. “These are champions who are using their personal passion and skill to raise awareness and funds for our work and, ultimately, for an AIDS-free future”. In his capacity as Ambassador, Nicholas will head a team of cyclists from UBS who are also riding to support the charity.Nicholas will head a team of cyclists from UBS who are also riding to support the charity.Sean Bennett, CEO of UBS South Africa and Head of UBS Sub-Saharan Africa, who will be part of the UBS team for the Cape Rouleur commented “At UBS, we are excited to be part of this superb race in support of the Elton John AIDS Foundation. It will be an immense physical challenge for me personally and I am inspired by the dedication and talent of Nicholas as well as the enthusiasm of my fellow team mates. UBS is delighted to be partnering with the Elton John AIDS Foundation which has done such great work on the African continent, particularly in South Africa. “The 2014 Cape Rouleur is full week of cycling, comprising a prologue and three stages of the Cape Rouleur, a 112km Festival ride into Cape Town and ends with the Cape Argus Pick n Pay Momentum Cycle Tour.To support Nicholas and the EJAF/UBS team with a donation to the Elton John AIDS Foundation, go to www.ejaf.com.last_img read more


first_img Twitter LEAVE A REPLY Cancel replyLog in to leave a comment The Cirque du Soleil Entertainment Group has announced the acquisition of a Minnesota-based company that produces theatrical shows, exhibits, cruise ship activities and outdoor events.The deal announced Thursday is for VStar Entertainment Group and its Florida-based subsidiary, Cirque Dreams.While terms were not disclosed, Cirque du Soleil president Daniel Lamarre told The Canadian Press the transaction is worth “several million dollars.” Advertisement Advertisement The PAW Patrol Live ‘Race to the Rescue’ tour visited 250 cities in 18 countries on four continents last year. (Associated Press)center_img Facebook Advertisement Login/Register With: VStar, which has about 120 employees, is best known for its children and family shows, including “PAW Patrol.”The PAW Patrol Live ‘Race to the Rescue’ tour visited 250 cities in 18 countries on four continents in 2017.last_img read more

Mens hockey Mason Jobst named firstteam four other Buckeyes receive B1G honors

OSU sophomore forward Mason Jobst (26) tries to get past Michigan State redshirt freshman defender Jerad Rosburg (57) in a game on March 3 at the Schottenstein Center in Columbus, Ohio. Credit: Kevin Stankiewicz | Lantern photographerFive members of the 13th-ranked Ohio State men’s hockey team received Big Ten honors on Monday.Sophomore forward Mason Jobst was named to the All-Big Ten first team and recognized as the conference’s scoring co-champion with Minnesota sophomore forward Tyler Sheehy, racking up 34 points in conference play. Sheehy won Big Ten Player of the Year.Jobst had 13 goals and 21 assists in league play, and collected 51 points on 18 goals and 33 assists in the regular season.A trio of seniors were named to the All-Big Ten second team — goaltender Christian Frey, defenseman Josh Healey and forward captain Nick Schilkey.Sophomore forward Dakota Joshua was an honorable mention selection, scoring a career-high 11 goals and 22 assists, including nine goals and 11 assists coming in Big Ten play.On Saturday at Wisconsin, Jobst scored a goal and had an assist to surpass the 50-point barrier for the first time since R.J. Umberger had 53 points in 2003.Jobst ranks ninth in the NCAA in points per game (1.42), but leads the nation in the category since the start of the second half of the year (1.67).Following first-team honors in 2016, Healey earned his way onto the second-team all-conference with 24 points on four goals and 20 assists. His plus-18 rating is third among blue-liners in the conference and ranks eighth nationally at his position.Schilkey was the do-it-all player for the Buckeyes in the regular season. The senior from Marysville, Michigan, led the Big Ten with 26 goals and ranks second in the NCAA with .81 goals per game. The 26 goals are the highest single-season total for one player in the program since 1997. He had 39 points in the regular season, 18 of which came against Big Ten opponents.Frey ended the season with a .916 save percentage in conference games and a .910 save percentage in the regular season. Frey was injured for part of the season, and shared playing time with fellow senior goaltender Matt Tomkins. Frey was 9-7-3 with one shutout this season.Senior goaltender Logan Davis received one of six Big Ten sportsmanship awards.OSU plays in the Big Ten quarterfinals against Michigan State in Detroit at Joe Louis Arena on Thursday at 4:30 p.m. read more

Police identify man killed in singlevehicle crash on SR94 in La Mesa

first_imgPolice identify man killed in single-vehicle crash on SR-94 in La Mesa , SAN DIEGO (KUSI) — Authorities identified a man killed in a single- vehicle crash on a La Mesa freeway Sunday.Charles Dilhalla III died when he apparently struck a concrete barrier while traveling at over 100 miles per hour.It happened after 9 a.m. on westbound state Route 94, directly under a ramp to state Route 125.Dilhalla was in the slow lane of the 94 when he lost control of his vehicle and it struck a concrete barrier, ejecting him.Witnesses pulled over and attempted to give him CPR. Paramedics arrived and continued CPR, but were unable to revive Dilhalla, and he was pronounced dead at the scene.Three lanes of the freeway had to be blocked while authorities investigated, but all were reopened by the afternoon. Posted: December 10, 2017 UPDATE: All lanes have reopened to traffic on WB SR-94 at SR-125. #SDCaltransAlert— Caltrans San Diego (@SDCaltrans) December 10, 2017 Categories: Local San Diego News FacebookTwitter December 10, 2017last_img read more

Man wanted in connection with random stabbing attack in Hillcrest

first_img KUSI Newsroom, April 11, 2018 Posted: April 11, 2018 Man wanted in connection with random stabbing attack in Hillcrest KUSI Newsroom SAN DIEGO (KUSI) — Authorities reached out to the public Wednesday for help in identifying a man believed responsible for an apparently random stabbing attack that left a pedestrian severely wounded in Hillcrest last weekend.The suspect, a thin Latino who appeared to be in his mid-20s to mid-30s, was seen walking around in the area of Essex and Richmond streets in San Diego for about a half-hour early Sunday evening, seemingly looking for someone to fight, according to police.He eventually threw a rock at a 51-year-old pedestrian and walked off, but returned short time later and attacked the same victim with a knife, stabbing him in the head and neck, police said. The assailant then fled to the west.Medics took the victim to a trauma center for treatment of severe wounds. The man, who remained hospitalized this morning, is expected to survive.A surveillance camera near the scene of the attack captured images of the suspected attacker.Anyone with information about the case is asked to call San Diego County Crime Stoppers at (888) 580-8477 or contact the agency online at sdcrimestoppers.org. Tipsters may remain anonymous and could be eligible for a reward of up to $1,000. Categories: Local San Diego News FacebookTwitterlast_img read more

Wiredcom Adds Two New Channels

first_img Transportation, which previously lived as a subsection of Wired’s “Gear” channel, will now occupy a tab of its own, headed by associate editor Alex Davies. Prior to joining Wired in 2014, Davies spent two years as a reporter for Business Insider. The new sections join Wired’s existing channels—Business, Design, Gear, Science, and Security—on Wired.com, which received a redesign in March. “The new WIRED Culture section will be home to smart thinking about how society is changing: how we communicate, what we value, how we grow,” the introductory note reads. “Every tomorrow is brighter than the one before it, and that’s bigger than entertainment—that’s culture.” Citing Wired’s coverage of recent innovations like Audi’s self-driving car and Tesla’s electric SUV, Davies explained in an editor’s note, “How we move around on the planet (and beyond it) is fundamentally changing—and as it does, it will change a great deal about who we are, how we interact, and what our lives look like.” Senior editor Peter Rubin—who oversaw the former entertainment tab—will head up the new culture section, while former Yahoo! Movies managing editor Brian Raftery will be a senior writer. The section will publish 40 to 50 stories each month, according to the company. The transportation vertical will publish about 40 pieces per month, at least 40 percent of which will be related to automotive technology. Wired is looking to bring in two additional full-time writers for the new section. center_img The new culture section is a re-branding, of sorts, of the tab formerly known as entertainment. An introductory note describes the shift as reflective of the increasingly-dominant role that the internet and social media play in defining “WIRED culture”—from memes and hashtags to Vines and Periscope streams—extending far beyond movies, music, television, and video games. Wired kicked off 2016 by adding two new sections to its website: Culture and Transportation. Transportation-related content accounted for eight percent of all traffic to Wired.com in 2015, according to the company, up 30 percent from the year prior. Ford Motor Company serves as the transportation section’s launch sponsor.last_img read more

Critics Say Gov Abbott Shouldnt Be Part Of MLK Parade Call For

first_img Share CHRISTOPHER CONNELLY / KERA NEWSDominique Alexandor, a pastor and leader of Next Generation Action Network, says Abbott’s inclusion as an honorary grand marshal in a Martin Luther King Day parade is “an insult to the black community.”What was billed as a region-wide celebration of the life and legacy of Dr. Martin Luther King, Jr., has drawn fire from local civil rights groups and community activists. They’re angry over the inclusion of Gov. Greg Abbott as an honorary grand marshal of the Toyota North Texas Dr. Martin Luther King Jr. Parade & Celebration, which is scheduled for next Monday in Arlington.Dominique Alexander from the Next Generation Action Network said he was shocked when he heard Abbott was given top billing at the festivities.“We will not tolerate this, and we call for an effective boycott of the North Texas Martin Luther King Parade,” Alexander said, calling the decision an “insult to the black community.”Alexander says he and others are planning to protest the event.The Arlington chapter of the National Association for the Advancement of Colored People said Abbott’s inclusion, “stings with hypocrisy.” In a statement, the group said Abbott has “done more to damage and undermine African-American and Latino civil and voter rights, educational opportunities and economic empowerment than any other modern-day Texas governor.”The NAACP will hold a town hall meeting on Thursday evening to discuss the parade.Rev. Jeff Hood said Martin Luther King stood up for the rights of poor and marginalized people and that they should be front and center in the parade.“Right now, with Greg Abbott being the grand marshal, we don’t have a keeper of the dream, we have a killer of the dream,” he said.“The governor is the governor,” said parade spokeswoman Winsor Barbee. “He is our top elected official for the state of Texas,” which is why the organizers invited him to participate.Barbee said part of King’s legacy is engaging with people even when you don’t agree with them, and that participation shouldn’t be seen as an endorsement of any particular policies.Retired Tarrant County District Judge Clifford Davis, a civil rights lawyer, will serve as grand marshal for the parade, which is intended to unite six counties into one regional celebration. There are a range of activities leading up to the parade, which will include floats, bands, elected officials and car clubs.A spokeswoman for the governor said Abbott looks forward to honoring Dr. King’s legacy and reflecting on “the triumphs, tragedies, and lessons of the past.”“It’s a shame that some are politicizing what should be a unifying event,” said Ciara Matthews, deputy communications director for the governor’s office.“I am at odds with the governor’s policies. This is not politics,” said Ruby Fay Woolridge, an Arlington community activist who’s running for Congress in the 6th district. The Democrat says Abbott’s support for voter ID laws and defense of gerrymandered districts undermines the voting power of people of color.“Those policies, as well as [his opposition to] expanding Medicaid, those things hurt the African-American community. Let’s be clear about that,” she said.Woolridge says she hopes that if Abbott does take part in the parade, he’ll also sit down with local civil rights leaders and community groups to talk about the impact of his policies.last_img read more

JDI develops a 23 inch LCD display packed at 651ppi

first_img Citation: JDI develops a 2.3 inch LCD display packed at 651ppi (2012, June 6) retrieved 18 August 2019 from https://phys.org/news/2012-06-jdi-inch-lcd-651ppi.html More information: www.displaybank.com/_eng/resea … _view.html?id=227267 (Phys.org) — Japan Display Inc. has created a small direct-view display that is packed with so many pixels that it features twice the resolution of the current iPhone 4 with its Retina display. And while the number of pixels is the same as what many believe the new MacBook Pro will have, the new display by JDI squeezes them into a much smaller screen, enabling the device to display lines without jagging, resulting in a display that is far sharper than anything else on the market. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. The resolution format of the new screen is 1280 x 800 pixels, which means that each has to be incredibly tiny to fit on a 2.3 inch screen. While some may argue that the limit for what is discernible by the human eye has already been reached with the iPhone 4, JDI says that after conducting ergonomic visual tests with an unknown group of subjects, they have determined that people can see the difference and report that images appear clearer or are sharper to them than when viewing other high resolution displays and thus the company says the new technology should mark a new milestone in LCD electronic displays. They add that the image produced by the new display is comparable to film based photography equipment.To achieve this new level of clarity, the company used polysilicon TFTs as the driver elements when making the screens at low temperatures and in addition to smoothing out jagged edges, the company says that characters are sharper and that when people look at images on the screen, they experience sensations similar to when looking at objects directly in the real world with the naked eye.The announcement by JDI is likely to spur new sales of cell phones and likely tablet computers as well which some suggest might be the final nail in the coffin for the personal computer. Of course, the user community will have to wait for manufactures to get their hands on the new technology and incorporate it into new devices. JDI says it will be providing more information about their new screen as well as a demonstration of their new technology at the 2012 SID International Symposium, Seminar & Exhibition.center_img The worlds smallest 3D HD display Explore further © 2012 Phys.Orglast_img read more

WestJet hosts Travel Agent Advisory Board at twoday conference

first_img CALGARY — More than 30 travel agents joined WestJet for its WestJet Travel Agency Advisory Board (TAAB) at the WestJet Campus in Calgary, where the agenda included brainstorming sessions, a tour of the WestJet Campus and hangar, and presentations from WestJet guest speakers on topics including network planning, WestJet Rewards, WestJet Vacations, guest experience, marketing and communications.The WestJet TAAB members also had the chance to share their feedback and engage with WestJet employees face-to-face.“This conference was a great opportunity to have an open discussion about what WestJet is doing right, and where we can improve to ensure we’re delivering the products and services the travel agent community is looking for,” said Jane Clementino, WestJet Director, Agency Sales. “Since the creation of the TAAB in 2015, we’ve really embraced their feedback to better serve our industry partners and become even easier to do business with.”WestJet has implemented more than 25 material enhancements since 2015 thanks to the contributions of the TAAB, she added.More news:  CIE Tours launches first-ever River Cruise CollectionWestJet TAAB members serve a two-year term and for many, this was their final meeting.“We would like to extend a sincere thank you to all of our second year TAAB members for their continued partnership and their dedication to this committee. WestJet wouldn’t be where it is today without their invaluable feedback,” said Clementino. “We’re looking forward to the insights our 2017/2018 members will bring and the initiatives we will be able to implement as a result of their engagement.” << Previous PostNext Post >> WestJet hosts Travel Agent Advisory Board at two-day conference Posted by Share Travelweek Group Monday, June 19, 2017 last_img read more

Rep Hoitenga to host December office hours

first_img Categories: Hoitenga News,News 07Dec Rep. Hoitenga to host December office hours State Rep. Michele Hoitenga of Manton announced her final office hours of 2018 for Mecosta, Osceola and Wexford counties.“I believe it is important to keep my commitment of staying accessible to the people I represent,” Rep. Hoitenga said. “I encourage everyone to attend and voice their thoughts or questions about our state government as we wrap up a successful year.”The December office hours schedule is as follows:·       Friday, Dec. 14o   Noon to 1 p.m. at Cranker’s Coney Island, 231 S. State St. in Big Rapids;o   1:30 to 2:30 p.m. at Osceola County Courthouse, 301 W. Upton Ave. in Reed City; ando   3 to 4 p.m. Hermann’s European Café, 214 N. Mitchell St. in Cadillac.State Senate-elect Curt VanderWall of Ludington will be joining Rep. Hoitenga for office hours in Reed City and Cadillac.No appointment is necessary. Anyone unable to attend is encouraged to contact Hoitenga’s office at (517) 373-1747, or email at MicheleHoitenga@house.mi.gov.#####last_img read more

Iran is set to launch eight new thematic televisio

first_imgIran is set to launch eight new thematic television channels after the The Islamic Republic of Iran Broadcasting (IRIB) approved the plans.IRIB chief Ezzatollah Zarghami announced it would launch new channels covering entertainment, news and science. This follows the launch of the country’s first home shopping channel, which launched earlier this year.last_img


first_img CAR BURNT OUT AT BALLYARNETT COUNTRY PARK – DUFFYCOUNCILLOR SANDRA DUFFYDerryNA MAGHA GAC “Speaking to parents they said it was  very lucky no one was hurt as this car was driven through the park.“The police have been informed and the neighbourhood team are following up on information.“A bad news story we could be doing without,” added Cllr Duffy.CAR BURNT OUT AT BALLYARNETT COUNTRY PARK – DUFFY was last modified: July 9th, 2016 by John2John2 Tags: Sinn Fein councillor Sandra DuffySINN Féin Councillor Sandra Duffy has condemned those who left a burnt out car in Derry this week.She said: “Another bad night for our community.“A car was stolen and  burnt out at Ballyarnett Country Park, with much of the green around the park destroyed with it rallying thought it.“This all took place as Na Magha GAC were holding a competition on their newly built site.center_img ShareTweetlast_img read more

We also raised the issue of the wider repercussio

first_img“We also raised the issue of the wider repercussions of this investigation. In the wake of the report, people’s confidence has been shattered and some families are concerned for their loved ones who are currently living in care homes. “The SDLP is clear that residents and their families must be kept in mind during this time and their concerns must also be listened to.“Frustratingly, there are still many questions left to answer. “The SDLP will be seeking an urgent meeting with the Assistant Chief Constable and the RQIA. People must be held accountable for their actions – or in some cases, inaction,” added Mr Durkan.Durkan leads SDLP delegation to meet Commissioner for Older People was last modified: June 26th, 2018 by John2John2 Tags: AN SDLP delegation led by SDLP Foyle MLa Mark H Durkan has met with the Commissioner for Older People over a damning report and investigation into a care home.Mr Durkan was joined at the meeting by party colleagues Pat Catney MLA and Councillor Brian Heading.The SDLP Health Spokesperson said: “The report regarding Dunmurry Manor Care Home from the Commission for OIder People made for difficult reading. Brian HeadingDunmurry Manor Care HomeDurkan leads SDLP delegation to meet Commissioner for Older PeopleHEALTH SPOKESPERSONMark H DurkanPat CatneySDLP ShareTweet “The findings that were contained within the report about the treatment some residents endured, while they were in a place that was meant to care for them, is heart-wrenching.“The report shows that vulnerable people, living with dementia, experienced violations that no-one should have to endure. “Residents and their loved ones were placed in awful situations and it is dreadful to hear of the horror that was inflicted on people.“During the meeting, we discussed the findings of the investigation and those who failed to step up and step in. last_img read more

When my fatherinlaw died my wife and I took ove

first_imgWhen my father-in-law died, my wife and I took over the responsibility of looking after her mother, who I affectionately called “grandma.” We quickly connected with a very nice lady who was a broker at one of the top brokerage firms in the country. Over time she became a mentor, advisor, and friend. Although she’s been retired for quite some time, we’re still in contact and are very close. If I were to pick one attribute that sets her apart, it would be honesty. Ask her a tough question and she’ll give you a straight answer, even though it may personally cost her some money. Around the time that many of the online discount brokerage firms were emerging, our nice lady broker put in a trade where we sold 1,000 shares of a stock at $24/share, so the trade was $24,000.00. When we got the transaction sheet in the mail, there were some small fees, but her firm took a $240 commission just for handling the transaction. I called and asked her how the firm justified those fees to its clients. We were being bombarded with television commercials, letters, and flyers from discount brokers who would handle the transaction for only $19.95. Basically, I asked her what the extra $220 in commissions bought us. She was very straightforward, and it was apparent I was not the first client to ask. She said that she cut the commission to rock bottom, meaning there was no lower fee structure available, and then went on to explain that discount brokers were merely transactional brokers with no research departments and no advice. They just processed transactions. By contrast, her firm had all these high-priced folks in New York who did tons of research and analysis and provided advice and guidance. I then (with her help) wrote a letter stating that I was toying with making an investment in a particular market but wasn’t quite sure if the sector made sense – and if it did, what particular stock would be the best choice? She took my letter, put her cover letter on top of it, and sent it to her firm’s gurus in New York. A short time later, we got back a 2-3 page report discussing the sector and recommending a particular company to invest in. They recommended it as a “strong buy.” It was also clear that the primary reason they felt that way was a chart showing that 8 of 10 major firms recommended the company as a “buy or strong buy.” Other than the standard information about growth, P/E ratios etc., there was really not a whole lot of support behind why the particular stock was supposedly so appealing. Honestly, I went nuts when I read the report, because simply saying that 8 of 10 major firms recommended something was not research. Actually, it was an admission of delegating the research to some other firm and then hoping it did it right. Perhaps that was why the P/E ratio was so ridiculously high; the investing guru Benjamin Graham would have been telling his clients to sell the same stock. So I asked our broker, “What happens if some researcher gets a tip from his barber on a stock, then he goes to the office and recommends it as a ‘buy.’ Then another firm picks up on it and also recommends it, and pretty soon 8 of 10 recommend it. That alone would drive up the price of the stock, but who actually did any research?” She grinned and mentioned something about the integrity of the individual doing the job. When I wrote the letter, I’d wanted someone to do the type of research Benjamin Graham discussed in The Intelligent Investor. I wanted them to find a stock that’s not on anyone else’s list with a P/E that was within reasonable guidelines. Heck, by the time 8 of 10 major firms have rated it as a “buy or strong buy,” it’s too late. At that point Graham and his clients would be taking their profits. In today’s lingo, the Casey group would have recommended you sell at least half of it and perhaps retain some of the investment as a “free ride.” Not long after that, our friend retired, and I switched the family accounts to a discount online broker. As I was surfing its website, I noticed a “Research” tab. I clicked on it and typed in the symbol of the stock, and up popped several available reports and a one-page summary. I realized then that what we got from the high-priced, old-line brokerage firm was not much different than the summary that had just popped up on my computer screen. Sad to say, some of the things that I’ve seen passed off as research are like sugar-free Jell-O topped with fat-free Cool Whip; it has the illusion of substance… but not much else. For the next several years, what little I had for research I did through the search engine of my online broker. It was boring, tedious, and time-consuming. Perhaps like some other investors, I wanted to find an easy way out. At that time I was subscribing to several investment newsletters that all touted their research and weren’t shy about making specific investment recommendations, something the discount brokers stayed away from at the time. Some did their job better than others. For close to a decade I didn’t use investment services because we had most of our portfolio in CDs. It wasn’t until late 2008, when we began to actively self-manage our portfolio, that we began to subscribe to various newsletters again. I quickly noticed that they seemed to be more highly specialized. The newsletters had true experts in a particular market sector or investment doing the research and making the recommendations. This isn’t meant to be a shameless plug, but I read a couple of the Casey newsletters like BIG GOLD, where there are folks on the ground, photos of the various mines, backgrounds, and where the author had known the principals for a couple decades. I was impressed. I’d never read any of this kind of stuff sifting through information from my discount broker, nor had I ever seen this level of detail from the so-called “full-service” brokers either. By comparison, I saw recommendations for companies I had never heard of and never saw references to any other firm or service making those recommendations. In a recent edition of The Intelligent Investor, there’s an article in the appendix section in which the author has tracked the career of five folks who were trained by Benjamin Graham. Each went out on his own, applied the techniques he was taught and over time put together a portfolio that made him and his clients very wealthy. However, there was almost zero overlap between those portfolios. Each had used the Graham criteria – but found his own recommendations. If 8 of 10 major firms recommended a given stock as a “buy or strong buy,” they all would have likely passed it over and moved on. The recent Facebook IPO certainly caused quite an uproar. Goldman Sachs handled the IPO, and according to several reports sold over a billion dollars in Facebook stock the first day. Shortly afterward, the news was full of stories that Facebook’s earnings were downgraded just before the offer and that information had been withheld from the general public. Only certain large clients and brokerage firms were made aware of that information. I personally no longer deal with a full-service broker, and I strongly recommend doing your own due diligence as opposed to blindly accepting any recommendation. For many years major firms would put a stock on a “strong buy” list, and the stock may jump 4-5 points simply because of that recommendation. My retired friend told me of cases where she knew that the firm making the recommendation had several million shares in its inventory. When it recommended the stock as a “strong buy,” it was taking the other half of the trade and making a nice profit. She said “theoretically” the SEC has put a stop to that. I recently learned that some financial research involves picks that are paid for by the companies being recommended. That’s not the case at Miller’s Money Forever, but until recently I was naïve enough to believe that all subscription-based financial newsletters were only compensated by their subscribers. How silly of me! It makes sense to do your due diligence on the companies you invest in. But you should also understand the motivations and incentives driving your gurus, your subscription financial-services providers, and your newsletter authors. I now find myself reading the small print at the end of the newsletter very closely. Any high-quality newsletter will clearly state its position on this issue. On the good side, a lot of data is now available at the click of a mouse on discount broker and other financial websites. Folks can also subscribe to excellent newsletters published by firms with large, competent research departments. This spreads the cost of expensive research departments over a large subscriber base, which in turn makes it much easier for the small investor to tap in to a huge base of investment knowledge. It is then up to us, the individual investor, to distill this information down to use with our individual portfolio. It’s easy to go along with the crowd, but true research can keep us ahead of the curve. Until next week…last_img read more

David Miranda was detained in a London airport for

first_imgDavid Miranda was detained in a London airport for almost nine hours. When the government set him free, they kept all of his electronics so they could hack them at their leisure. Security experts believe they even turned them into stealthy listening devices. All with court approval. Your home computer—assuming you still have one, of course—should be safe from the grabby hands of public officials. In theory, at least. Law enforcement personnel are supposed to obtain a search warrant before they barge into your house and start confiscating electronic equipment. But when you’re on the road and perhaps storing important documents on your laptop, tablet, or smartphone, all bets are off. Your devices are subject to seizure on the flimsiest of pretexts, and any data they hold can be pirated. That’s the lesson every traveler should learn from the recent Miranda episode, an incident that, ironically, involved a man with the same last name as the one whose case nearly a half-century ago represents a legal landmark. The earlier Miranda (Ernesto) had his conviction on domestic violence charges voided by the Supreme Court because police failed to inform him that he had the right to remain silent and to have access to an attorney. The decision resulted in the requirement that suspects under arrest must henceforth be given “the Miranda warning,” i.e., be read their rights before any questioning can begin. The present Miranda (David) has become the poster boy for governmental abrogation of basic rights. You see, David Miranda is the partner of Glenn Greenwald, the British journalist responsible for publishing documents leaked by Edward Snowden. No matter what one may think of Snowden and his actions, what happened to Miranda is troubling. On August 18, he was traveling from Germany to his and Greenwald’s home in Brazil, a journey that included a stopover at London’s Heathrow airport. While in the transit lounge, he was stopped by officers and informed that he was to be questioned under Schedule 7 of the Terrorism Act 2000. This controversial law, which applies only at airports, ports, and border areas, allows officers to stop, search, question, and detain individuals. Miranda, a Brazilian citizen, was held for eight hours and fifty-five minutes. Not coincidentally, nine hours is the maximum allowable detention period under the law, before officers must release or formally arrest the person of interest. Even though he was released without charges, officials confiscated his electronics, including mobile phone, laptop, camera, memory sticks, DVDs, and game consoles. They wanted the time to hack them, and amazingly the British law allows it. Under the terrorism law, anyone whose property is taken in this manner is supposed to get it back seven days after confiscation. But in this instance, the UK High Court ruled that British authorities could keep Miranda’s property for continued access to his electronics for a total of ten days. Further, the High Court gave authorities judicial permission to “continue investigating the materials” they seized, allowing them to hack all of Miranda’s devices as much as they liked. As a caveat, the Court ruled that British police don’t have “official” permission to share or “use” anything they find. But that proscription amounts to little more than a polite nod to privacy advocates. No one doubts that Miranda’s hard drives were copied and all personal information extracted. Nor did the Court prohibit authorities from modifying the devices. This kind of warrantless search and seizure is hardly confined to the UK. An August 2008 exposé in the Washington Post revealed publicly for the first time that the US Department of Homeland Security had been exercising similar powers in secret for quite a while. And its reach is even broader. The policies apply to anyone entering the country by any means, and they cover hard drives, flash drives, mobile phones, iPods, pagers, beepers, and video and audio tapes, as well as books, pamphlets, and other written materials. Moreover, anything confiscated may be held indefinitely. The courts have approved all of these actions. As in Britain, there are supposedly restrictions in place. For example, federal agents are mandated to take measures to protect business information and lawyer-client privileged material. Copies of data must be destroyed when a review is completed, and no probable cause exists to keep the information. However, agents are allowed to share the contents of seized computers with other agencies and private entities for data decryption and “other reasons.” Copies sent to non-federal organizations must be returned to the DHS, but there is no way to ensure against copies of copies being made and retained. There is also no limitation on authorities keeping notes or making extensive reports about the materials. The Miranda incident raised the expected howls of protest from journalists and others who fear that such tactics lower a big chill over freedom of the press. This criticism is especially applicable since almost no one suspects Miranda of being involved with terrorism. No one but the British government, that is. Its “terrorism” net is very wide and of a very fine mesh. It has to be, in order to comply with an injunction from the British high court, which blocked law enforcement from using or sharing material seized from Miranda in a criminal investigation—shortly after a Metropolitan Police (Met) lawyer announced the force had launched just such an investigation. The injunction permits the authorities to “inspect, copy, disclose, transfer, distribute” the data only in the protection of national security or for investigating whether Miranda himself “is a person who is or has been concerned in the commission, preparation or instigation of acts of terrorism.” For its part, the Met says that it is treating this as a criminal case because Miranda was carrying tens of thousands of pages of digital documents to his partner Greenwald, including “highly sensitive material the disclosure of which would be gravely injurious to public safety.” A spokesperson added that the British Home Secretary “does not accept that we are concerned here with journalistic material” and believes that Miranda “is not a journalist, and stolen documents can’t be held in confidence and don’t qualify as journalistic materials.” The question of who is and is not a journalist is one that’s been propelled into the limelight by the Snowden/Greenwald affair, and it’s an intriguing one. But what we’re more concerned with here is technology. Breaking and Entering Specifically, what should Miranda expect has happened to his electronics and, by extension, what should you expect if your own devices are spirited away in an airport for “closer inspection,” either in the US or some other country without even minimal concern for privacy rights? Don’t think it’ll never happen. Security experts believe that, in addition to suspected terrorists and their sympathizers, there are plenty of other potential targets of domestic and foreign authorities alike, including: political activists of any stripe; journalists specializing in political stories; known hackers and data security specialists; academics involved in political research; corporate personnel connected to certain types of technology; business leaders charged with large-scale decision making; and probably any number of other focus groups that are less obvious. If you are singled out, the first concern, of course, is data theft. You must assume that all stored information has been compromised… or at least looked at and probably copied for a more leisurely perusal later on. There is no defense against this. If you have to carry sensitive material, you’re at risk. Encryption will only slow them down. Best bet is not to have anything important on there in the first place. If you must transport critical info, make sure you have copies back home—they mean it when they say “indefinite holding.” Plus, if you have a hard drive on which sensitive material was previously stored, you might want to wipe that clean. Simply erasing it isn’t enough: you need to run a program that completely overwrites all of the data, making retrieval impossible. But perhaps more insidious is that many government officials may, with impunity, “modify” your computer or phone. They can install hard- or software that gives them future access to your machine and anything you do on it. For instance, they can add a keylogger that keeps track of all your keystrokes, stores them, and transmits them to a remote computer of their choice. They can load a Trojan that will be all but impossible for you to detect. It’ll just sit there until you do something that it’s been programmed to watch for, at which time it will activate and broadcast the desired data. Or the Trojan’s purpose may be to provide a back door for a remote controller to enter your computer system, take it over, and use it for any desired purpose. You can essentially be turned into a bot and even be added to a botnet. Your phone can be turned into a listening and/or tracking device. It can be made to transmit not only your location, but also anything you do with the phone, including voice calls, texts, video, websites visited, app usage, files read, and so on to a designated receiver. This can be accomplished through physical modifications that can be difficult if not impossible to spot. One method is to remove the SIM (subscriber identity module) card that acts to identify and authenticate subscribers to a mobile service, and replace it with a clone. The spy SIM will contain additional software which allows a wide range of access to device information. Luckily, there’s a way to defeat this. Just remove your SIM card and make a tiny mark of some kind on it. Then, if your phone is ever confiscated, or lost, and returned to you, you can check the SIM card. If your mark is gone, the SIM has been compromised, and you should discard the phone. A second hardware modification a hacker might try is to replace your battery with one that’s visually identical but houses a smaller battery and a variety of surveillance tools. Again, you can mark your battery. Or, if you notice that its life diminishes after it’s been out of your hands, that could be a sign of tampering. Of course, it could also just mean it’s like any other phone and the battery is dying slowly. If you have an integrated battery like in an Apple iPhone, then this might be a pretty difficult task. Dealing with malware that’s been surreptitiously placed on your computer is difficult, because it’s sure to have a built-in capability of evading discovery. But it is possible to see if the machine is making any unauthorized transmissions. To do that, you need to be tech savvy enough to use a network sniffer such as Wireshark, which is free and open source. It can detect when your device is making an unexplained network connection, and if it is, to where. However, if the firmware itself has been modified, then even that won’t work, as programs like Wireshark are dependent on the underlying operating system and the drivers telling them the truth. Once the hardware or firmware has been changed, you won’t have any idea what’s going on. In that case, you’d need expensive and specialized external hardware to do the job. Or you could pay for a full professional examination of the device. It can be expensive, but depending on the value of the potential data loss, it could be worth it. The kinds of actions outlined here are especially likely in the case of a high-profile person like David Miranda. Gathering information from his devices on an ongoing basis would be invaluable, especially in the event of future prosecutions. He must expect that it has happened and now has no real choice except to replace all of his electronics. But the recent revelations about the extent of NSA spying should leave little doubt that one doesn’t have to be associated with a fugitive whistleblower to attract the watchful eye of the “national security” apparatus. Further, with corporate espionage on the rise and much of this technology just as available to the private sector, you never know who might be listening in on you. If someone slipped an extra chip inside your iPhone or modified the operating system under the covers, would you know? Of course not. Remember, your phone, tablet, or laptop need only be out of your sight and in a skilled hacker’s hands for a few minutes in order for the damage to be done. And at that point, there is virtually no way to know that your device is spying on you. All of this exactly why demand for security software, hardware, and services continues to rise. With the incredible proliferation of electronic devices—many of which are equipped not just with data storage and networking but with microphones, cameras, and even GPS chips and motion sensors—there is fertile ground for new threats to government, business, and personal security. Data security is only increasing in importance, and the companies that provide it are prospering. Just the kinds of companies we keep our eyes out for in Casey Extraordinary Technology.last_img read more

By Daniel Jepson Guest Contributor and Chris Wood

first_imgBy Daniel Jepson, Guest Contributor and Chris Wood, Senior Analyst In last week’s article on epigenetics, we began with a brief discussion of the enormous expectations that were placed on the Human Genome Project (HGP)—such as, that its results would lead to the end of disease—and how those expectations ultimately went unfulfilled because of course, things are never that simple. More importantly, in this case, genes are only part of the story. To quote briefly from that article: “Little did the community know at the time that the project [i.e., the HGP] would only uncover a small portion of what’s really going on in our genome. They were only scratching the surface. What the architects of that project once dismissed literally as junk surrounding our genes is proving far more vital than anyone ever expected—in fact, it may hold the very keys to understanding evolution itself. When scientists began the HGP, they were expecting to find approximately 100,000 protein-coding genes to account for the complexity of our species. What they found instead was that humans only have about 25,000, about the same number as fish and mice. In fact, according to biologist Dr. Michael Skinner, “the human genome is probably not as complex and doesn’t have as many genes as plants do.” That’s sort of a problem, because if we humans are supposed to be the complex species we hold ourselves out to be, then why don’t we have as many genes as an oak tree? Maybe because genes are only part of the story.“ That article went on to discuss how our epigenome—the second layer of structure above the genome, comprised of methyl groups and histones, that changes throughout our lives—can turn our genes on and off and control the degree to which they are expressed. Cool stuff—and a very important budding area of science. But today we’d like to bring the focus back to the genome itself, more specifically to a study of the genome called ENCODE. When the HGP was finished, all scientists really had was a linear sequence of three billion DNA base pairs—in essence, just a set of boring letters consisting of As, Gs, Cs, and Ts. What was needed was something to bring those letters to life and translate them into an instruction manual for actually building a person; then we’d be better able to understand the roots of disease and generate treatments. It happened on September 5, 2012. That was the day when one of the most ambitious international science projects you may have never heard of revealed the fruits of its labor: a collection of 30 papers simultaneously published in the journals Nature, Genome Research, and Genome Biology. Taken together, they provided the results from a multiyear research endeavor—involving over 400 scientists from 32 labs around the world—known as the ENCODE Project. ENCODE, or the “Encyclopedia of DNA Elements,” was designed to pick up where the HGP left off. It sought to annotate the specific regions of the genome that are used in the various cells of the human body and to catalogue the biochemical products of this activity. A key takeaway from the ENCODE project is that even though our genes only account for approximately 2% of our genome, the bulk of the rest of our DNA—which used to be called “junk DNA” because it was thought to serve no real purpose—actually performs crucial regulatory functions. Think of them as switches attached to a particular gene that determine whether or not it will be expressed. Scientists have long been aware of such DNA configurations, but thought their number was on par with the number of genes. It turns out, however, that there are millions of such regions throughout the genome, linked to each other (and to the protein-coding genes) in an extremely complicated hierarchical network. (The metaphor of a “hairball of wires” was offered by one ENCODE scientist.) But the goodies from ENCODE don’t stop there. “It was one of those too-good-to-be-true moments.” That’s what Ewan Birney, a biologist and leading scientist from the ENCODE project consortium, had to say about one of the insights gleaned by the efforts of his team. Back to the HGP for a moment. Much of the excitement that followed the project’s completion a decade ago had to do with the notion that since we now knew how the genome was “supposed” to look, we could identify the genes whose mutations were responsible for certain diseases and devise an appropriate remedy. As noted earlier, however, things aren’t that simple. Genes are only part of the story. We know that from the results of studies that were designed to correlate genetic mutations with specific diseases (known as Genome-Wide Association Studies, or GWAS). In the majority of cases, it was found that disease-correlated DNA variants lay in the vast noncoding regions of the genome, rather than in the genes themselves. With limited understanding of the actual functional processes performed by this DNA, science has been largely unable to come up with an appropriate remedy in situations where the original DNA message has been altered. But thanks to ENCODE, we may be on the way to overcoming this obstacle. A key finding from the project—the one that caught Birney’s attention—was that many of the mutations associated with disease are located in DNA regions to which the ENCODE project was able to assign a specific functionality. In particular, many mutations were found to be located in areas of our DNA known as “promoter” and “enhancer” regions—sequences that, while not coding for protein themselves, are responsible for turning genes on and off within a cell. “[This] is a really big deal,” said Bradley Bernstein, an ENCODE scientist. “I don’t think anyone predicted that [this] would be the case.” So now a whole host of new possibilities for gene therapy will begin to open up. When we can identify the biological processes in the cell that result from a mutation, it becomes much more likely that we can formulate an effective treatment. ENCODE has already identified several hundred regions of DNA that should be of interest to researchers studying specific diseases, and this number will only increase over the next few years as the huge amounts of data generated by the project continue to be analyzed. The project has also identified the function of many noncoding RNA molecules (i.e., RNA molecules other than messenger RNAs, which are an intermediate step in the creation of a protein). Casey Extraordinary Technology subscribers need no introduction to RNAi, an extremely exciting therapeutic technology that’s based on a particular type of noncoding RNA known as small interfering RNA (siRNA). But you may not have heard of a new approach that’s appeared on the scene in recent years: microRNA therapeutics. MicroRNA (miRNA) is a close cousin of siRNA, and its implications for the biotechnology landscape are no less significant. Since their discovery little more than a decade ago, these little molecules have already been widely implicated in the development of several types of cancer: some miRNAs are overexpressed in cancer cells, while others are missing entirely. Not surprisingly, there has been a widespread effort to leverage this insight into therapeutic remedies, and some miRNA-based products have already entered Phase II trials. As biotech investors, we must remember that tomorrow’s breakthroughs will result from events taking place around us today. In order to stay ahead of the market, we must be vigilant in identifying these causes before their effects have been fully brought to light. The ENCODE project, with its “too good to be true” moments, provides a good starting point. While it has received considerably less public fanfare than the Human Genome Project, for the alert investor it points the way toward a whole host of potential new breakthroughs. To stay up to date with all the fascinating new developments in the world of biotechnology, give Casey Extraordinary Technology a risk-free trial run today.last_img read more

Youve made this mistake before—sometime between t

first_imgYou’ve made this mistake before—sometime between the age of 15 and 25. I can almost guarantee it. And it probably involved a good-looking girl… or boy. Whatever your preference. You took someone for granted and chased after someone new. Then they both dropped you. One big bank is making a similar mistake. Only it’s not chasing tail. It’s chasing customers. A few years back Bank of America began buying every “Bank of Your Little Town” it could. With some 5,000 retail branches across the US, it seemed serious about retail banking. If not, why bother operating all those branches? Meanwhile, it put the moves on Merrill Lynch. Problem is, retail customers just don’t like Bank of America. J.D. Power ranked it dead last in four of 11 regions across the nation this year. And as Bloomberg Business reported, “Bank of America Corp. ranked worst among its peers in retail customer satisfaction in states where it has the most branches, California and Florida….” Part of the problem is that is behaves like an investment bank toward its customers. Back in 2013, Bank of America began phasing out its drive-through windows. A retired bank executive shared a rumor with me: it’s closing drive-through windows to force customers into the branch so they can sell Merrill Lynch products. I’m inclined to believe him. In March, we made a rare trip into a Bank of America branch in Florida to deposit a large check from the sale of our home. The branch manager swooped us into his office and began pitching investment products the minute we walked in. I know; it’s just one example. But they’re hassling long-term customers every day. People don’t like it. But they don’t know there’s a simple, easy-to-execute alternative. First, keep enough cash at your bank to pay your bills. Nothing more. A small local bank that will cover ATM fees when you travel is your best bet. That takes care of your administrative needs. Second, take the remainder of you cash and start your own Bank of Me. This cash should earn a robust return with minimal risk and no hassles. I stand firm in my belief that about one-third of your portfolio should sit in low-risk, liquid, cash-like instruments. But near-negative interest rates negate any safety offered by FDIC-insured accounts. Your cash is just sitting there, withering away. Now is the time to start your own bank. You might be thinking, “This guy is nuts. I’m an engineer (or teacher, fireman, dentist… insert your profession). I don’t have the time or the know-how to start my own bank.” Rest assured, it takes minimal time, and you can bring yourself up to speed right now by reading one special report: Bank of Me. We lay out the process and the specific investments for you. My wife and I took our cash out of Bank of America’s claws. Now we have enough at our local bank to meet monthly expenses. No hassles there, and they call us by name. There’s even a drive-through. And the rest of our cash is carrying its own weight once again. I’d love to show you how to do the same. Click here to learn how to fire your bank.last_img read more

If you go to the hospital for medical treatment an

first_imgIf you go to the hospital for medical treatment and scientists there decide to use your medical information to create a commercial product, are you owed anything as part of the bargain?That’s one of the questions that is emerging as researchers and product developers eagerly delve into digital data such as CT scans and electronic medical records, making artificial-intelligence products that are helping doctors to manage information and even to help them diagnose disease.This issue cropped up in 2016, when Google DeepMind decided to test an app that measures kidney health by gathering 1.6 million records from patients at the Royal Free Hospital in London. The British authorities found this broke patient privacy laws in the United Kingdom and put a stop to it.But the rules are different in the United States. The most notable cases have involved living tissue, but the legal arguments apply to medical data as well. One of the best examples dates back to 1976, when John Moore went to UCLA to be treated for hairy cell leukemia.Prof. Leslie Wolf, director of the Center for Health, Law and Society at the Georgia State University College of Law, says Moore’s doctors gave him good medical care, “but they also discovered there was something interesting about his cells and created a cell line from his cells without his knowledge,” she says.”And what complicated things even more is they asked Mr. Moore to travel down from his home in Seattle to L.A. multiple times, for seven years, to get additional cells without telling him they had this commercial interest in his cells.”Moore sued. In 1990, The California Supreme Court decided that he did not own his cells, but found his doctors had an obligation to inform him that his tissue was being used for commercial purposes and to give him a chance to object. Moore reached a settlement following his court battle, “but Mr. Moore certainly felt betrayed through the process,” Wolf says.The most famous case of this nature involves a Maryland woman, Henrietta Lacks. Back in 1951, doctors at the Johns Hopkins hospital in Baltimore collected cells from her cervical cancer and turned them into the world’s first immortal cell line, which grows perpetually in the lab and is used widely in research. As documented in Rebecca Skloot’s book and an HBO biopic starring Oprah Winfrey, the family learned only much later what had transpired and received no compensation. In 2013, the National Institutes of Health came to an agreement with her family guiding the use of her genetic information, but the family has continued to raise the issue.While those fights were about living tissue, “in a certain sense whether it’s cells or [digital] bits and bytes, it’s all information about an individual, at some level,” says Dr. Nabile Safdar, a radiologist at Emory University and author of a recent paper discussing the issue of patients’ rights as it pertains to their medical scans.This information is increasingly being used in research, and that in turn can easily end up being used to develop a commercial product that’s worth millions. Are the patients entitled to a cut?”That’s a question that I think we need to figure out,” Safdar says. “And if were a patient and my data were used to develop something that was being shared outside as a product, I’d want to know.”That’s not how it’s usually done. At many research hospitals, patients routinely sign a paper, in that huge stack of admission paperwork, giving permission for the institution to use their personal data for research.”For someone to sign away the rights in perpetuity for their data to be used for all possible research applications in the future, that’s something I think would deserve a lot of scrutiny, and that’s not something I would agree with,” Safdar says.Here’s a current example. Researchers at Johns Hopkins Medicine are mining years of CT scans that were performed initially to care for patients. Those patients signed a form saying it was okay to use that data for research. And the research has been approved by the university’s institutional review board, which is charged with weighing the ethics of research projects, says Dr. Karen Horton, director of radiology.Horton is now using some of this data to teach computers how to recognize pancreatic cancer. She says part of their agreement is that the data are stripped of all information that could identify an individual patient, “so there’s no [privacy] risk to a patient to have their images used to train the computer.”And Horton says technically, the data don’t belong to the patients. “Right now as the law defines it, your medical images are property of the health system,” she says. “You don’t own the image.”But Wolf, the law professor and ethicist at Georgia State, says she’s not sure that’s a strong argument. “Yes, they [the doctors] created the scans,” she says, “but certainly the patient has rights related to the scans,” such as the right to view them and of course to decide at the outset whether they can be used in research.It generally takes thousands of scans from many individuals to develop a commercial product, so no single person’s data is especially valuable on its own. Overall, Wolf says, patients don’t have much of a legal argument here, but there is an ethical issue.”My own concern is not that it is problematic per se,” she says. But, “I don’t think we’ve done a really good job of letting people know that this is in fact what we do with their data.”She cites lawsuits where blood samples that had been taken at birth ended up being used for research.”One of the moms in the case said if ‘I had been asked I think I would have said yes,’ but it was the sense of not even being asked, and having the data used,” Wolf says. “People generally will agree, but they want to be asked, at least at some level.”And Safdar says there are times when people might, indeed, want to object to how their data are being used.”There’s a wealth of information in a CT scan or an MRI,” Safdar says. Looking at features such as liver fat, artery clogs and brain atrophy, researchers might calculate a probability for how long that person is likely to live.These algorithms are generally called “black boxes,” because there’s no way to know how they reach their conclusions. And if the computer algorithm “spits out that you have two months to live, there are implications for employment, for insurability, for all kinds of things that impacts that person’s daily life,” Safdar says. “That worries me a little bit, especially when it’s not clear how that black box is making those decisions.”And what if the algorithm has actually baked in an unconscious prejudice of some sort, he asks, such as about race, age or sex? “When that same model, when trained [to work] on a specific group of people, is now applied to a totally different group of people, it could make totally erroneous decisions.”These issues are becoming more pressing as these AI-based products start coming to market.You can contact Richard Harris at rharris@npr.org. Copyright 2018 NPR. To see more, visit http://www.npr.org/.last_img read more

New Jersey Voters Likely Just Approved Legalized Marijuana

first_img Subscribe Now New Jersey Voters Likely Just Approved Legalized Marijuana 3 min read Guest Writer Get 1 Year of Green Entrepreneur for $19.99 Phil Murphy, the Democratic nominee for governor, was emphatic about his commitment to legalizing marijuana. He won by a wide margin. November 16, 2017 New Jersey may have decided more than just the governor’s race in the election held this month. They have put the Garden State on the path to becoming the eighth U.S. state to allow recreational marijuana sales. As pointed out last month, a vote for Democrat Phil Murphy meant a vote for creating a state-regulated adult-use marijuana industry. During the campaign, Murphy promised to sign a bill creating a legalized marijuana market in New Jersey during his first 100 days in office. That bill already is moving through the state Legislature.And this hasn’t been a kind of, maybe sort of thing. Murphy has been clear about his intentions on marijuana.“The criminalization of marijuana has only served to clog our courts and cloud people’s futures, so we will legalize marijuana,” Murphy said after winning the Democratic primary earlier this year. “And while there are financial benefits, this is overwhelmingly about doing what is right and just.”Murphy won 56 percent of the vote, with 42 percent going to Republican Kim Guadagno.Related: Jeff Session’s ‘Guidance’ Cited by Maine’s Governor In His Veto of Legal Marijuana BillWhat happens nextMurphy will be inaugurated governor in January 2018. The bill legalizing recreational marijuana sales in New Jersey is still working through revisions in the state Legislature.The “within 100 days” promise actually originates with Senate President Stephen Sweeney. Sweeney, who controls which bills come before the full Senate, has vowed to have the bill before Murphy within the first 100 days of his administration.For his part, Murphy has said he will sign it. His argument is that criminalization of marijuana has destroyed many lives, particularly in minority communities. In the final debate before the election, he said New Jersey has the dubious honor of having “the widest white, non-white gap of persons incarcerated in America.”He blamed much of that on low-end drug crimes involving marijuana. On his website, Murphy also said that legalizing marijuana would free police to focus on more violent crimes.In all of this, Murphy is the polar opposite of his predecessor, Republican Gov. Chris Christie. Christie often railed against legalized marijuana. During the run-up to his bid for the Republican presidential nomination, he vowed to “crack down and not permit” legalized marijuana if elected president.Related: Cannabis Industry Rallies to Overcome Unique Legal Barriers to Recovery From Northern California FiresVirginia decriminalizationThe victory of Democrat Ralph Northam in the Virginia’s governor’s race also could lead to changes in that state’s marijuana laws. While stopping short of legalization, Northam has argued that possession of small amounts of marijuana should be decriminalized. He has addressed the issue from the standpoint of racial discrimination and the financial impact on the state.In a letter to the Virginia State Crime Commission sent earlier this year, Northam wrote that marijuana laws and enforcement have been “disproportionately harmful to communities of color.” He also noted the state spends $67 million on marijuana law enforcement, which he noted is enough to send 13,000 more kids to pre-K school.Follow dispensaries.com on Instagram to stay up to date on the latest cannabis news. dispensaries.com Add to Queue –shares Easy Search. Quality Finds. Your partner and digital portal for the cannabis community. Image credit: Eduardo Munoz Alvarez | Getty Images Cannabis Opinions expressed by Entrepreneur contributors are their own. Next Article Green Entrepreneur provides how-to guides, ideas and expert insights for entrepreneurs looking to start and grow a cannabis business.last_img read more