Monday, June 3, 2013

Scarf Dancing with Cancer | Crooks and Liars

As some of our readers are aware, I?m in the middle of chemotherapy for endometrial cancer. When I began, I made a video documenting having my hair cut off in anticipation of it all falling out ? probably one of the hardest things I?ve ever done, emotionally. I had a wigmaker offer me $100 for my amputated tresses, amazingly generous on her part ? they?re not really suitable for much other than highlights for extensions. But they?ve been lovingly put away in an antique jewelry coffer, wrapped in tissue paper, because even though I know it?s just hair, I can?t bear to part with them. Not yet.

Strangely enough, this second video documenting the loss of what was left of my hair was far less traumatic ? even if the end result is far less pretty. My hair hasn?t fallen completely out and I haven?t shaved my head, because there?s just enough left for a sort of Donald Trumpesque ?comb over? so that I still have the faintest wisp of bangs peeking out from a headscarf. But what little remains is so thin that I joke that I go to the same hairdresser as Gollum from Lord of the Rings.

Some people laugh ? and so they should. Laughter is the only way anyone can endure such small personal tragedies.

I attended a Look Good, Feel Better seminar where I could try on various wigs and learn how to ?draw? natural looking eyebrows back on my face ? because along with my hair, my eyebrows have likewise faded into near oblivion. There were only three of us, one of whom was enduring her second go-round with cancer. I rather liked the neon purple punk rocker wig, although it possibly isn?t suitable for everyday. The LGFB volunteers ? who outnumbered us at nearly three to one that day ? are an amazingly skilled bunch; the woman with recurrent cancer so utterly transformed, I was genuinely impressed.

I do have a wig, borrowed. I very rarely wear it, however. It?s hot, it itches my chemo-sensitive scalp, and I can?t get my glasses to fit properly over it. Plus, I just don?t care. Wigs make me sad ? those that resemble how I used to look just remind me of what I?ve lost, and anything else doesn?t look like... me. So I prefer hats and scarves. While fleece beanies do keep my near naked scalp warm at night, I scoured YouTube to learn how to tie a scarf in a way that didn?t scream ?cancer victim? and quickly discovered the best tutorials are by black women ? the things the sisters can do with fabric is astoundingly gorgeous. I still look like a middle-aged white woman, but the fancy turbans are cool.

So when Ann Coulter made the comment on the ?Hannity? show that Katherine Russell, the widow of suspected Boston Marathon bomber Tamerlan Tsarnaev, should be tossed in prison simply for wearing a hijab, then ? when rightly called out for such a blatantly racist, malicious and just downright pathetically stupid remark ? tried to claim it was only a ?joke,? I wasn?t too amused. What is it about rightwing idiots like Coulter who don?t seem to grasp the basic comedic concept that funny can often be cruel, but cruelty on its own is never funny?

There are plenty of Muslim women teaching how to do variations of hijabs on YouTube, like Amenakin here, who are all so lovely, so bubbly and charming, they expose Ann Coulter all the more for what she truly is, an ugly, bigoted harpy who has no idea what genuine beauty, nevermind humanity, is all about. So I decided I?d learn how to wear a hijab, and gave it a go. Well... sort of. Amenakin makes it look so easy, but I needed quite a bit of help from my best mate, Terri, and we had to jerry-rig a couple bits here and there. Also, pinning things was slightly problematic, as there?s no hair underneath to protect my nearly bald head. But we finally managed, and I even threw on a bit of slap and eyeliner to make my face less washed out.

You be the judge ? I don?t think it turned out half-bad, and I admit it?s a lot more comfortable than I expected. Plus, if I wear a hijab, no one will ever suspect I?ve got Chemo Head underneath.

Source: http://crooksandliars.com/nonny-mouse/scarf-dancing-cancer

iOS 6 bank of america Yunel Escobar Eye Black Cruel Summer Endeavor shaun white carolina panthers

Prime Numbers Hide Your Secrets

A coffee shop displays signs for Visa, MasterCard and Discover.

How exactly are credit card purchases kept secure?

Photo Illustration by Justin Sullivan/Getty Images

Prime numbers are all the rage these days. I can tell something?s up when random people start asking me about the randomness of primes?without even knowing that I?m a mathematician! In the past couple of weeks we?ve heard about a beautiful result on the gaps between primes and about cicadas? prime-numbered life cycles. Our current love affair with primes notwithstanding, many people have wondered whether this is all just abstract theoretical stuff or whether prime numbers have real-world applications.

In fact, they have applications to something as ubiquitous and mundane as making a purchase online. Every time you enter your credit card number on the Internet, prime numbers spring into action. Before your card number is sent over the wires, it must be encrypted for security, and once it?s received by the merchant, it must be decrypted. One of the most common encryption schemes, the RSA algorithm, is based on prime numbers. It uses a ?public key,? information that is publicly available, and a ?private key,? something that only the decoding party (merchant) has. Roughly speaking, the public key consists of a large number that is the product of two primes, and the private key consists of those two primes themselves. It?s very difficult to factor a given large number into primes. For example, it took researchers two years recently to factor a 232-digit number, even with hundreds of parallel computers. That?s why the RSA algorithm is so effective.

Prime numbers are whole numbers greater than 1 that are not divisible by any whole number other than 1 and itself. The first few are 2, 3, 5, 7, 11, 13 ? To explain how the RSA algorithm works, I need to tell you first about something called Fermat?s little theorem. It was discovered by Pierre Fermat, the same French mathematician who came up with the famous Fermat?s last theorem. Fermat had a penchant for being cryptic; in the case of his last theorem, he left a note on the margin of a book stating his theorem and adding: ?I have discovered a truly marvelous proof of this, which this margin is too narrow to contain.? Call it the 17th-century version of a Twitter proof. Many professional mathematicians and amateurs tried to reproduce Fermat?s purported proof, and it took more than 350 years to come up with a real one.

To understand what Fermat?s little theorem means, we need to learn how to do arithmetic ?modulo N.? This is something, in fact, we do all the time when adding angles. If you rotate an object by 180 degrees, and then by another 270 degrees, the net result will be rotation by 90 degrees. That?s because 180 + 270 = 450, and then we subtract 360 from it, because rotation by 360 degrees means no net rotation at all. This is what mathematicians call addition ?modulo 360.? Likewise, we can do addition modulo any whole number N instead of 360. (Another familiar example is adding hours, where N = 12.) And we can also do multiplication modulo N.

Now suppose that N is a prime number. Then we have the following remarkable fact: Raising any number to the Nth power modulo N, we get back that same number. For example, if N = 5, then the 5th power of 1 is 1 and the 5th power of 2 is 32, which is equal to 2 modulo 5 because after you subtract the closest multiple of 5 (in this case, you subtract 30, or 5 ? 6), you are left with 2 (because 32 = 5 ? 6 + 2). Likewise, the 5th power of 3 is equal to 3 modulo 5, and so on. This is Fermat's little theorem. Fermat first divulged it in a letter to a friend. ?I would send you a proof of it,? he wrote, ?but I am afraid it?s too long.? He was such a tease, this Fermat. Unlike the proof of his last theorem, however, the proof of the little one is surprisingly simple?it could even fit in the margin of a book. I would write it here, but my editor tells me that my article is already too long. No worries though, you can read the proof in this excerpt from my book Love and Math.

This is neat, but what does it have to with Internet security? We need to devise a two-step procedure: First encrypt a credit card number and then decrypt it, so that if we follow both steps we get back the original number. The good news from Fermat?s little theorem is that raising a card number to a prime power modulo that prime is a procedure that gives us back the original number. The bad news is that because a prime is not divisible by anything, there is no way to break this procedure into two steps. However, Ron Rivest, Adi Shamir, and Leonard Adleman, after whom the RSA algorithm is named, were not discouraged. They took Fermat?s idea one step further. They asked: What if we take N which is the product of two primes?call them p and q. Then we have the following analogue of Fermat?s little theorem: Raising any number to the power (p ? 1)(q ? 1) + 1 will give us back the same number modulo N. For example, N = 15 is the product of p = 3 and q = 5. Then (p ? 1)(q ? 1) + 1 = (3 ? 1)(5 ? 1) + 1 = 9. If you raise any number to the 9th power, you get back the same number modulo 15. It looks like a miracle, but in fact the proof is no more complicated than that of Fermat?s little theorem.

And now we can use it for encryption: For the given prime numbers p and q, the combination (p ? 1)(q ? 1) + 1 will typically be a number that is not a prime. Hence it can be represented as the product of two whole numbers, call them r and s. (In our example, (p ? 1)(q ? 1) + 1 = 9, so we can take r = 3 and s = 3.) Raising a number to the power (p ? 1)(q ? 1) + 1 can now be broken into two steps: raising it to the rth power and then raising it to the sth power.

Here?s how it works in practice: The merchant picks two large prime numbers p and q (there are various algorithms for generating primes), takes their product N, and chooses r and s. He or she then makes r and N known to everyone; this is the public key. The encryption consists of raising a credit card number to the rth power modulo N. Anyone can do it (on a computer, because the numbers involved are quite large). The decryption, on the other hand, consists of raising the resulting number to the sth power modulo N. This gives back the original credit card number (see here for more details). The merchant keeps the number s secret. Therefore the transmission of the credit card numbers is secure. The only way to find s, and hence to be able to decrypt the card numbers, is to determine the prime factors p and q of the number N. For sufficiently large N, however, using known methods of prime factorization, it may take many months to find p and q, even on a network of powerful computers. But if one could come up with a more efficient way to factor numbers into primes (for example, by using a quantum computer), then one would have a tool for breaking the RSA algorithm. That?s why a lot of research is directed toward factoring numbers into primes. Scores of legitimate mathematicians are working on this, and perhaps not so legitimate ones as well.

To an outsider, the RSA algorithm appears like a card trick: You pick a card from a stack, hide it (this is like encryption), and after some manipulations the magician produces your card?bazinga! Well, that's pretty much what the RSA algorithm does ? except that the role of magic is now played by math.

Source: http://www.slate.com/articles/health_and_science/science/2013/06/online_credit_card_security_the_rsa_algorithm_prime_numbers_and_pierre_fermat.html

jane russell meryl streep martin scorsese sacha baron cohen best picture nominees 2012 academy awards 2012 albert nobbs

One Day You'll Be Able To Touch Everything On TV (Yes, Everything)

Designed to allow persons with visual impairments to touch and feel objects being referenced on TV, this haptic feedback system will no doubt get co-opted for less benevolent uses like advertising, and of course, adult entertainment.

Read more...

    


Source: http://feeds.gawker.com/~r/gizmodo/full/~3/gty_H5J3uKI/one-day-youll-be-able-to-touch-everything-on-tv-yes-511032760

goldman sachs brandon carr knicks coach encyclopedia britannica white lion mike d antoni resigns holes

Targeting Frequent Health Care Users With Severe Addictions

Targeting Frequent Health Care Users With Severe Addictions

A program co-led by St. Michael?s Hospital could be the next widely used model to treat patients who are frequent users of the health care system and have severe addictions, often complicated by homelessness and mental health problems.

The Toronto Community Addiction Team (TCAT) was developed to improve health and social outcomes for people with addictions who are frequent users of health services by providing one-on-one intensive case management from a harm reduction approach. The team works with clients to provide services such as individual therapy, finding a physician, securing housing, managing budgets and care plans that are based on clients? strengths and choices.

?Developing interventions to engage these frequent users in community-based care and alleviate pressures from costly hospital-based services ? which are not designed to meet their needs ? is a system priority,? said Dr. Vicky Stergiopoulos, psychiatrist-in-chief at St. Michael?s Hospital and evaluation lead for the program. ?The TCAT is a great example of a client-centred approach that works to do exactly this. It shows promise in reducing re-admission rates which can ultimately save money for the health care system.?

The program provides city-wide mobile intensive case management for people with frequent re-admissions to a withdrawal management system ? 10 or more in a year ? and and/or hospital emergency departments ? 20 or more in a year.

?Many of these patients cycle between jail, the shelter system, withdrawl management and hospitals,? Dr. Stergiopoulos said. ?They can?t access services, and the services are not helpful because many of them only accept patients who are at a different place in the recovery process. The TCAT works on strength-based principles and supports people from a harm reduction orientation. The program is uniquely focused on empowering the client by promoting respect and dignity so they can make their own choices.?

Dr. Stergiopoulos led the program evaluation, published online in the journal Substance Use and Misuse this month.

Based on interviews with clients and a review of records from the Withdrawal Management System, the results found a statistically significant decreases in service use, alcohol and drug use. Clients also described increased access to primary and psychiatric care and increased collaboration with various stakeholders within the wider system of care.

Dr. Stergiopoulos said the goal is to divert care for these patients from a place like the emergency department to the community because it can improve outcomes for both the patients and the system.

?This model worked well in the city of Toronto, and may be considered in other large urban centres that face similar challenges with frequent service users who have alcohol and drug related problems, often complicated by homelessness and lack of support and resources,? she said.

?Targeting Frequent Health Care Users With Severe Addictions?

Source: http://www.tammyshealtharticles.com/targeting-frequent-health-care-users-with-severe-addictions/

japan earthquake Star Trek Into Darkness Heisman watch John McAfee Jenny Rivera Pacquiao vs Marquez 4 pacquiao

Monday, May 20, 2013

Samsung plans to launch 65-, 55-inch 4K TVs in June

Samsung plans to launch 55, 65inch 4K TVs in June

When Samsung unveiled its first 4K Ultra HD TV at CES this year, it said other sizes would follow, both larger and smaller than the initial 85-inch version. Now it's apparently ready to fulfill part of that promise, announcing in Korea that 65- and 55-inch models will launch next month. Of course our next question is how these smaller models will compare to the $39,999 MSRP 85S9 UHD TV in price. Hopefully they'll follow the path blazed by Sony, which recently introduced models at that size with pricing well below the $10,000 benchmark, although we expect Seiki's 50-incher will still hold the crown for value pricing. The press release mentions they will feature Samsung's upgradeable Smart TV platform and the "micro dimming ultimate" LED lighting of their larger cousin, but the odd "Timeless Gallery" frame / stand (pictured above on the 85-incher) was not listed.

Filed under: , , ,

Comments

Source: Korea Newswire

Source: http://www.engadget.com/2013/05/19/samsung-4k-55-65-inch-june/?utm_medium=feed&utm_source=Feed_Classic&utm_campaign=Engadget

amanda bynes dui ghost ship tiger woods masters jet crash virginia beach petrino clayton kershaw tyler perry

Arduino Yun weds Arduino, WiFi and linux at Maker Faire 2013

Arduino Yun weds Arduino, WiFi and linux at Maker Faire 2013

The Arduino Robot wasn't the only interesting product the Italian company launched at Maker Faire this past weekend. Arduino Yún combines a Leonardo board (featuring Atmel's ATmega32u4) with a MIPS-based WiFi SoC (Atheros AR9331) running Limino (an OpenWRT / linux derivative). It includes everything you'd expect from a Leonardo board plus WiFi, wired Ethernet, a USB host port and a microSD card slot. The Arduino side can be programmed wirelessly and communicates with the WiFi SoC via SPI and UART interfaces using the new Bridge Library, which delegates networking to the linux side. Out of the box, the board behaves just like any standard WiFi access point with a full web interface -- it even allows SSH access. Arduino Yún is the first of a family of WiFI-enabled products and will be available late June for $69. Check out the gallery below for some closeup shots, and follow the source for more details.

Filed under: ,

Comments

Source: Arduino blog

Source: http://feeds.engadget.com/~r/weblogsinc/engadget/~3/FiIAQrfYf8w/

earthquake today earthquake today bachelor justin timberlake gerard butler Daylight Savings Time 2013 danielle fishel

Two men charged with killing Malcolm X grandson

MEXICO CITY (Reuters) - Two men arrested in the fatal beating of the grandson of U.S. civil rights activist Malcolm X were sent to prison on Saturday to await trial, a Mexico City court spokesman said.

David Hernandez and Manuel Perez, waiters at the Palace nightclub near Mexico City's popular Garibaldi Square, face charges of murder and robbery, the official said.

Malcolm Shabazz, who police have said was 29, died May 9 at the Palace after a dispute over a $1,200 bill. Hernandez and Perez were arrested on Monday.

Shabazz, who was convicted of manslaughter as a 12-year-old for setting a fire that killed his grandmother and went to prison as an adult for attempted robbery, was in Mexico City to visit Miguel Suarez, an immigration activist who was recently deported from the United States. Shabazz

On the night of May 8 Shabazz and Suarez visited the run-down area around Plaza Garibaldi, a popular tourist area where Mariachi music groups play on the streets amid seedy strip clubs, dive bars and bordellos.

Despite its proximity to the city's grand colonial center, the area is infamous for petty crime.

Malcolm X was a civil rights activist and leader of the black Muslim movement in the United States. He was shot to death before a speaking appearance in New York City in 1965.

(Reporting by Elinor Comlay; Editing by Bill Trott)

Source: http://news.yahoo.com/two-men-charged-killing-malcolm-x-grandson-005812484.html

the curious case of benjamin button secret service prostitute rich ross april 20 secret service prostitution 4 20 george zimmerman