Wednesday, June 19, 2013

Indonesia Open 2013: Lee Chong Wei wraps up Men's Singles title ...

Indonesia Open 2013: Lee Chong Wei wraps up Men?s Singles title in style ? Badminton news

Malaysia?s Lee Chong Wei, the best player in the world from Malaysia, proved his superior class in the arena and easily wrapped up Men?s Singles title at Djarum Indonesia Open 2013, which ended in Jakarta, on Sunday, June 16.

In the final encounter of this Premier Super Series tournament, the top seeded Chong Wei registered a comprehensive victory over Germany?s Marc Zwiebler by taking just 39 minutes.

Chong Wei was quite calm and relaxed on court and he played his complete game to outshine his un-seeded challenger in a convincing manner. He finished this title match in straight sets with a convincing 21-15 and 21-14 score on the board.

Meanwhile, the lower ranked Marc Zwiebler could not extend his giant killing run against the world?s best shuttler. He lost the final battle without winning any set but left the court with respect for putting up spectacular show throughout the tournament.

From the starting points of final encounter, Chong Wei played with precision and controlled the pace of rallies. He was quick in taking the shuttlecock and employed his powerful smashes coupled with deceptive fast drops shots that put his challenger in trouble.

Chong Wei?s positive and planned play enabled him to dictate the affairs of the game and he easily set up a reasonable lead until the one-minute break.

After the interval, the World Number One Malaysian man continued his power play without leaving any room for his German opponent. He was comfortable in the arena and easily took the first game with a good margin of 21-15.

In the following set, Zwiebler game a good fight in starting points but he was lacking the finishing touch and also failed to shake the superb defence of his Malaysian rival.

Meanwhile, Chong Wei progressed with a wonderful pace on the score board and remained in command until the end of opening half.

After the break, the impressive Chong Wei stretched his lead by dominating the pace from all corners of the court and bagged the game with a remarkable margin of 21-14 and emerged as the title winner in style.

Source: http://blogs.bettor.com/Indonesia-Open-2013-Lee-Chong-Wei-wraps-up-Mens-Singles-title-in-style-Badminton-news-a216736

ronda rousey vs miesha tate lindsay lohan snl lindsay lohan on snl real housewives of disney awakenings phantom of the opera agoraphobia

Tuesday, June 11, 2013

Obesity can be predicted from infancy, researchers find

June 11, 2013 ? Infants as young as two months old already exhibit growth patterns that can predict the child's weight by age 5, according to researchers at Case Western Reserve University's Frances Payne Bolton School of Nursing and Tennessee State University.

"Almost from birth, we quickly saw this growth pattern emerge in our curves and growth charts for weight over height," said Susan Ludington, the study's lead investigator and the Carl W. and Margaret David Walter Professor of Pediatric Nursing at Case Western Reserve.

Analyzing well-child records, normal-weight babies with a body-mass index (BMI) in the 17 percentile were found to have plateaued at about two months and rarely deviated over the next five years, she said. Overweight or obese babies crossed the 17 percentile many months later (about age 14 months) and continued an upward climb when BMI growth patterns were monitored.

The findings were reported in Clinical Pediatrics. Ludington collaborated with Lisaann Gittner, assistant professor of public service at Tennessee State University, and Harold Haller, director of Case Western Reserve's Center for Statistical Consulting.

The researchers found that, by age 5, normal-weight children developed differently from birth than those considered overweight, obese or severely obese.

For this study, 221 children were selected from 4,000 records of healthy children under the care of a health maintenance organization. Each had weight, height and medical records from nine well check-ups over the first five years of their lives.

None had a hospital or emergency room visit, medical procedure or other special medical condition, or were on medications that might skew results. No other study of early weight changes has used a sample of only healthy infants and children.

"We didn't want anything to interfere with regular eating," Ludington said.

She said the study also differed from others because researchers had access to maternal health records, with information about the mothers' pre-pregnancy weights and whether they smoked -- a factor that could influence the baby's weight.

The researchers suspect, based on prior research findings by others, how a mother ate during pregnancy might have contributed to a baby's hormones and the ability to satisfy a baby's hunger.

Tracking obesity to the first months of life came after Haller took a new statistical approach to infant growth. He plotted on a graph a baby's weight divided by height instead of using BMI scores as a guideline. By graphing, a pattern emerged that found both girls and boys known to be obese at 5 begin to show significantly higher weight over height than normal weight babies as early as 2-4 months of age.

Because such patterns emerge before children generally start eating solid food, early life growth patterns may provide important information about a person's future health issues, Ludington said.

The researchers also questioned using the BMI index as a guide to growth, which is based on European babies primarily breast-fed in the first year. In the United States, many babies have only formula feedings.

These findings could potentially change the age at which obesity is typically diagnosed, which is now at or after age two.

Ludington said the next step is to find a good intervention that takes into consideration whether a baby is fed on demand or a schedule, the amount of milk a baby receives, whether the baby should have breast milk or formula, and sleep/awake activity patterns of each infant.

Because this study offers a good control group of healthy children, Ludington said, a broader study with thousands of children will determine if those growth patterns hold up for all children, as well as healthy ones.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/top_news/top_science/~3/J1ZdgB7K5p0/130611111708.htm

jesse jackson whitney houston funeral video tyler perry whitney houston r kelly r. kelly macular degeneration whitney houston funeral

Presidential cyberwar directive gives Pentagon long-awaited marching orders

The US Defense Department has been given a bright green light to draw up a global cyberattack target list at which it can deploy digital weapons with ?little or no warning to the adversary or the target,? according to a Top Secret policy document leaked to the press.

The policy document, dubbed ?Presidential Policy Directive 20? or PPD-20, is an 18-page cyberpolicy roadmap for the Pentagon that directs it to get on with the business of defending the US and its critical infrastructure, such as the power grid and financial sector, from foreign cyberattack.

While the existence of the document and its broad outlines were revealed in news reports last fall, and a ?fact sheet? on PPD-20 was released in January, the detailed policy document leaked at week?s end shows the unleashing of a military juggernaught.

RECOMMENDED: How much do you know about cybersecurity? Take our quiz.

Military use of cyberweapons had been paused for about three years, waiting for the end of an intense policy debate and for orders to move ahead with force into cyberspace, cybersecurity experts say.

?What this document does is lay out authority for the US Cyber Command and Joint Chiefs to use cyberweapons,? says James Lewis, a senior fellow with the Center for Strategic and International Studies in Washington. ?It lays out how and when you would use these weapons, what you would target, and how you would do so in ways consistent with the Laws of Armed Conflict, rather than just shooting at random.?

Couched in legalistic language, the document authorizes development of offensive and defensive cybersystems that are consistent with the US Constitution, US law, and the international Law of Armed Conflict ? and of a target list to hit with them.

Want your top political issues explained? Get customized DC Decoder updates.

For instance, ?Offensive Cyber Effects Operations,? or OCEO, is defined in the document as authorizing digital weapons for ?manipulation, disruption, denial, degradation, or destruction? of ?physical or virtual? computer systems.

The document says OCEO ?can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.?

Under the heading "Policy Reviews and Preparation," the document states that: "The secretary of defense, the DNI [Director of National Intelligence], and the director of the CIA ? shall prepare for approval by the president through the National Security Advisor a plan that identifies potential systems, processes and infrastructure against which the United States should establish and maintain OCEO capabilities."

Most cyberattacks must be authorized by the president, but because attacks happen in milliseconds, the document authorizes the military and other agencies to respond to the threat of an imminent attack or an emergency situation.

Protecting critical infrastructure in the US also is outlined in the document.

Despite years of wrangling, Congress has still not approved legislation addressing cybersecurity for the nation?s infrastructure, and the document does not permit the Pentagon to intrude into networks of domestic companies, such as utilities, and install defenses within computer networks that control the power grid.

But it does allow the military to defend the infrastructure from outside those networks ? by identifying and undermining or destroying the attacking system and its key infrastructure. It allows government agencies, not just the military, to take ?anticipatory action ? against imminent threats? to infrastructure or other systems vital to the US or to US foreign policy.

The procedures outlined in the directive are consistent with the US Constitution, including the president?s role as commander-in-chief, and other applicable law and policies, the White House said in a statement.

?As we have already publicly acknowledged, last year the president signed a classified presidential directive relating to cyberoperations, updating a similar directive dating back to 2004,? Caitlin Hayden, a spokeswoman for the National Security Council, said in a statement released Friday. ?This step is part of the administration?s focus on cybersecurity as a top priority. The cyberthreat has evolved, and we have new experiences to take into account.?

This directive, she writes, will ?establish principles and processes that can enable more effective planning, development, and use of our capabilities. It enables us to be flexible, while also exercising restraint in dealing with the threats we face. It continues to be our policy that we shall undertake the least action necessary to mitigate threats and that we will prioritize network defense and law enforcement as the preferred courses of action.?

Indeed, the top-secret document does in several places warn those using the roadmap to use cyberweapons only when absolutely necessary. Because cyberspace is interconnected globally, cyberweapons threaten ?collateral consequences that may affect US national interests in many locations.?

Yet it?s not only collateral damage from cyberweapons, but the fuel that unleashing them provides for the current global cyberarms race that worries Ralph Langner, the Hamburg-based cybersecurity expert who in 2010 first publicly identified the Stuxnet cyberweapon that was used to attack and destroy a substantial chunk of Iran?s centrifuge system for developing nuclear fuel.

Stuxnet, the first publicly identified weapons-grade digital warhead, was created and deployed by the US ? an attack authorized by President Obama and dubbed ?Operation Olympic Games,? according to news reports that the White House has still not formally corroborated.

The biggest threat posed by the PPD-20, Mr. Langner writes, is the model it creates for unleashing powerful cyberweapons into the global network that can then be reworked either by hackers or rogue nation states like Iran and North Korea and relaunched back at the US.

?Nobody actually is able to predict the mid- and long-term effect of cyberweapons,? Langner notes. ?The big issue is proliferation: It is much easier to rebuild a cyberweapon that is out in the open than a kinetic weapon.?

For example, even after the design of the F-35 fighter jet is leaked, it still requires a nation state to actually build one, he writes in an e-mail interview. Not so for cyber. A cyberweapons workshop can operate completely under the radar of satellite surveillance. It could even operate in foreign locations or on hostile soil. And, while building a fighter jet based on stolen blueprints may take a decade or so, it would require a dedicated team of cyberweapons experts just months to reengineer a devastating cyberweapon against US critical infrastructure, he adds.

?It?s kind of a gamble,? Langner writes. ?The US is betting the farm on a short-term win.... Nuclear weapons are the best-case example, here. They were used just twice. I?m afraid that won?t be the case with cyberweapons, if only because of their advantage. They are ideally suited for low-intensity conflict. This makes me project that they will be used much more often than kinetic force.?

At present, about 30 countries are actively building up offensive cyberpower, including rogue states like Iran and North Korea. Against that scenario, he envisions the US essentially supplying its adversaries with cyberweapon designs.

?It?s hard to believe that they will not try to take advantage of a new poor man?s tool for creating destruction,? Langner writes, ?especially when it is so well suited to hitting technologically advanced adversaries like the United States.?

RECOMMENDED: How much do you know about cybersecurity? Take our quiz.

Related stories

Read this story at csmonitor.com

Become a part of the Monitor community

Source: http://news.yahoo.com/presidential-cyberwar-directive-gives-pentagon-long-awaited-marching-013424340.html

nsa Purge Annabel Tollman Yasiel Puig boston bruins bruins henry cavill

Sony E3 2013 PlayStation briefing roundup: PS4 takes E3 with $399 price tag

Sony E3 2013 PlayStation briefing roundup PS4 takes E3 with $399 price tag

Finally, the PS4's menacing-looking box has been revealed. More importantly, however, Sony clearly aimed for the Xbox One's throat during its E3 press conference -- especially with software, services and a cheaper retail price. Alongside a friendly policy toward used games and epic title reveals for the PS4, Sony introduced a new PS3 bundle for the fall and more. Get you fix of all the stories from the event by clicking past the break for our full roundup.

Follow all of our E3 2013 coverage at our event hub.

Filed under: , ,

Comments

Source: http://feeds.engadget.com/~r/weblogsinc/engadget/~3/8JKH9R0pH8o/

gizmodo iPhone 5 9-11 Chris Brown Tattoo Innocence of Muslims Clara Schumann Jael Strauss

Sony announces PS Plus edition of Driveclub will be free for a year

Sony announces Driveclub free to PS Plus members for a year

Sony's feeling pretty unstoppable right now, and it's adding to the momentum by announcing that the PlayStation Plus edition of Driveclub will be free for the first year to Plus members. The game, which was announced alongside a litany of other PS4 titles in February, is a team-based driving game that features realistic vehicles modeled after their real-life counterparts. Alongside Driveclub you'll find Don't Starve, Outlast and Secret Ponchos as part of the PS Plus instant game collection as well.

Follow our liveblog for all of the latest news from E3 2013.

Filed under: ,

Comments

Source: http://feeds.engadget.com/~r/weblogsinc/engadget/~3/h_OC7xSisL8/

acl earthquake los angeles unemployment 2012 nfl draft grades young justice d rose iman shumpert

Apple Overhauls Desktop Notifications So That They're Actually Useful

Apple Overhauls Desktop Notifications So That They're Actually Useful

A centralized Notification Center was a great addition to OS X. The problem? Based on their original design, they caused more problems than they solve. In OS X Mavericks, Apple's fixing the notifications so that you can deal with the notification right from a dialog rather than needing to fire up a whole application to use them.

Read more...

    


Source: http://feeds.gawker.com/~r/gizmodo/full/~3/oa42KPX3shY/apple-overhauls-desktop-notifications-so-that-theyre-a-512322006

Adrienne Maloof Telemundo real housewives of beverly hills Pink Floyd 12 12 12 Concert amazing race Cam Cameron

Tuesday, May 7, 2013

Giants owner Mara confident Cruz will sign

NEWARK, N.J. (AP) ? New York Giants owner John Mara says progress is slow but steady in the contract negotiations between the team and Pro Bowl wide receiver Victor Cruz.

Mara also says he's confident a deal will be reached. Mara made his comments Tuesday on NFL.com.

Cruz caught 86 passes for 1,092 yards and 10 touchdowns last season, tops on the team.

The Giants allowed Cruz to test the free agent market by making him a first-round tender, but no other team offered him a deal. He can play for roughly $2.9 million, but wants a long-term deal. He has been absent from the team's voluntary offseason program.

Mara says the Giants "are the right place" for Cruz to play and a deal "will eventually" get done.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/347875155d53465d95cec892aeb06419/Article_2013-05-07-FBN-Giants-Mara-Cruz/id-1fc4eb21024d4ab4a4f932b118718b29

tom brady sister dad shoots daughters laptop brandon jennings the vow review luol deng culkin wooly mammoth