Redwood Village apartment fire sends one to hospital, displaces several residents May 21, 2018 Ed Lenderman Ed Lenderman, 00:00 00:00 spaceplay / pause qunload | stop ffullscreenshift + ←→slower / faster ↑↓volume mmute ←→seek . seek to previous 12… 6 seek to 10%, 20% … 60% XColor SettingsAaAaAaAaTextBackgroundOpacity SettingsTextOpaqueSemi-TransparentBackgroundSemi-TransparentOpaqueTransparentFont SettingsSize||TypeSerif MonospaceSerifSans Serif MonospaceSans SerifCasualCursiveSmallCapsResetSave SettingsEd Lendermen was live at the scene of an early Monday morning apartment fire in the Redwood Village area of Oak Park. Categories: Local San Diego News FacebookTwitter Updated: 7:30 AM Posted: May 21, 2018
Jhootha Kahin KaPR HandoutThe Panchanama Boys along with Rishi Kapoor are here as “Jhootha Kahin Ka” releases today. It has already become a talk of the town and is earning massive brownie points with the audience. With several Bollywood celebrities praising the film, trade experts are predicting good growth in box office numbers over the weekend.4 decades post the release of Rishi Kapoor-Neetu Singh starrer Jhootha Kahin Ka, this trailblazing comedy also starring Pyaar Ka Punchnama actors Sunny Singh and Omkar Kapoor aspires to earn box office merit for its comic timing, entertaining one liners and will give new direction to situational and witty humour in Bollywood.The family entertainer shot in Punjab, Mauritius and Bangkok last year, also stars Jimmy Sheirgill, Lillete Dubey, Rajesh Sharma and Manoj Joshi, and revolves around two students who are reluctant to return to India owing to their fascination for a foreign land, prompting one of the boy’s simpleton father to embark on a surprise visit, only to open up Pandora’s box of fabrications and hoaxes.The film is directed by leading Punjabi film director, Smeep Kang, the only director to have contributed 100 crores annually to the Punjabi film industry, and makes his Bollywood debut with this film.Producer Deepak Mukut states, “The film is being received very well in urban and rural centres and it is being appreciated by the audience for its’ apt comical content and casting.”Producer Anuj Sharma adds on, “We are confident of a steady run at the box office with the love the film is receiving across the country”Jhootha Kahin Ka is produced by Deepak Mukut and Anuj Sharma, under the banner of Shantketan Entertainments and presented by Soham Rockstar Entertainment. The film releases today.The film is currently sharing box office business with Kabir Singh, Super 30, Family Of Thakurganj, and Lion King
Former Democratic presidential candidate Hillary Clinton looks at a USA Today newspaper carrying an article about US vice president Mike Pence that he used personal email while in office, during her flight on American Airlines to Laguardia airport in New York City, New York, US on Friday. Reuters photo A photo of former presidential candidate Hillary Clinton glancing at a newspaper headline about US vice president Mike Pence using private email has gone viral on social media, with thousands of people commenting on it.Pence and others involved in the Republican presidential campaign last year criticized Clinton’s use of a private email server during her time as US Secretary of State.Clinton was on an airplane traveling from Boston to New York on Friday when a fellow passenger snapped a photo of her glancing down at Friday’s USA Today newspaper front page headline “Pence used personal email in office”.Pence’s use of an AOL email account was first reported by the Indianapolis Star on Thursday. It said Pence used the account, which was hacked last summer, at times to discuss sensitive matters and homeland security issues while he was governor of Indiana.Pence said on Friday he had complied with Indiana laws in his use of the email account, and he had an outside attorney review his private email records and archive those related to state business.During the campaign, US President Donald Trump and Pence said Clinton’s use of a private server broke the law and endangered national security – complaints that led their supporters to chant “Lock her up!” at rallies.The State Department’s internal watchdog said Clinton’s use of a private server broke department rules. The FBI reviewed her emails for classified material, but it found that no criminal charges were warranted.
RYAN POPPEAbbott Campaign Mail-in Ballot ApplicationGov. Greg Abbott’s campaign to register mail-in ballot applications for seniors ahead of the deadline is creating costly headaches for many county election officials. During a primary election season, campaigns will try to help senior citizens register for mail-in ballots. But Texas election officials, including Bexar County’s election administrator Jacquelyn Callanen, are mailing back hundreds of applications, all of them linked to one campaign.“When we receive a primary election, we receive a number of mail-in ballot applications from a number of campaigns and we started to receive some last week that did not have a party check on them,” Callanen said.Those incomplete applications came from Abbott’s re-election campaign and were mailed not only to seniors that voted Republican in the last election but also to traditional Democrat and independent voters, according to the campaign.Campaign spokesman John Wittman said part of its effort is to attract voters who don’t traditionally vote in a Republican primary.“This mail-in ballot application drive is result of a test that Texans for Greg Abbott did in 2014. This election, we’ve expanded it 10-fold,” Wittman said.Glen Maxey, who heads up the Texas Democratic Party’s mail-in ballot campaign, was one of the first to notice problems with the Abbott application, which he said is decorated with the Abbott campaign logo and has very small printed instructions informing the voter they must indicate whether they need a Democrat or Republican mail-in ballot.“This application is about six-point type. A person of age — such as myself — I can’t read the application even with my glasses,” Maxey said.Callanen said it is costing individual counties hundreds of dollars to reject the incomplete applications, and the extra effort of sending out all the rejection letters is slowing down her office’s productivity.The deadline to submit an application for a mail-in ballot is Feb. 23. Share
Young African leaders Gorata Seleb, Adeboyega Adewolu and Angela Gichaga are participants in Morgan’s YALI program. AFRO Photo/Anderson R. WardTwenty-five young leaders from 18 African countries are on the campus of Morgan State University during June and July taking part in a multi-disciplinary learning experience. The Young African Leaders Initiative (YALI) comes to Morgan’s Public Management Institute to explore some of the key issues facing communities around the world including financial management, public health, the environment and policy analysis.Morgan’s Public Management Summer Program, which began on June 16 with an opening ceremony, runs through July 25 with activities planned daily. Program participants will tour several Baltimore and Maryland educational venues, complete a leadership training program, learn about environmental and cross-cultural issues and their impact on society, and effective communication skills. During the six-week program, the YALI leaders are expected to learn about key issues and best practices in public management that they can take back to their home countries.The public management program is part of Morgan State University’s Public Management Institute, with support from the School of Engineering and the MSU Institute for Urban Research.
Growing a business sometimes requires thinking outside the box. Register Now » Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global Opinions expressed by Entrepreneur contributors are their own. 3 min read What’s inside your own company may hurt you. Recent research reveals that internal security breaches, including accidental ones by careless employees, are dangerous and rampant.Your business’s greatest cyber threat could be festering right inside your offices. A recent report by Forrester Research, called “Understand the State of Data Security and Privacy,” shows that one-fourth of survey respondents said that a malicious employee was the most common means to a data breach within the past year. However, respondents noted that 36 percent of data breaches resulted from employee errors.Related: 10 Data-Security Measures You Can’t Do WithoutA report from MeriTalk found that 49 percent of compromises occur when workers bypass security measures, e.g., downloading e-mail files. This report focused on the federal government. If the feds can’t protect themselves, how the heck can small businesses?Businesses are spending more and more resources on protection, such as antivirus software, anti-phishing software and firewalls, plus teaching employees security awareness but the problems are crooked insiders and careless employees.The MeriTalk report also reveals that 66 percent of respondents see security as time consuming and restrictive, while 60 percent believe their work takes longer due to additional cyber security tactics. Another 20 percent say they can’t complete their work due to security measures and 31 percent skirt around security measures at least once per week.The Forrester study reveals that 36 percent of data breaches come from accidental misuse of data by workers. Only 42 percent of respondents received security training and 57 percent weren’t even aware of their company’s current security protocols. One in four reported a breach was caused by malicious inside activity.What should be done? To start, focus on workers with access to sensitive data, such as employees in human resources, accounting, legal, administration and personnel but also company officers and contractors. Businesses need to work with all the key departments to identify vulnerabilities and devise security tactics that don’t obstruct productivity. Determine the level of risk for various kinds of data and set protections accordingly.Related: 5 Ways to Avoid a Costly Data Security BreachFollowing that, conduct a cost/benefit analysis. Review the different technologies that can be incorporated with the company’s existing systems. This includes data loss prevention technologies and internal system status monitoring. The goal is to limit who has access to what kind of data. Determine why an individual needs the data.Companies also need to examine their weaknesses from an outside-attack perspective. System-wide encryption should be implemented, as well as tools that report alerts and events. Access controls should be inspected and put in place, along with password management and multi-factor authentication.Device recognition is crucial. There must also be disposal for e-data, paper data and discarded devices.Transparency is also important. The more transparent that a business’s network security and security policies are, the more effective and clear each department will be communicating their requirements, needs and differences.Don’t be let efforts to combat outside cybercriminals blind you to internal threats. Attention on one should not diffuse attention on the other.Related: A Lack of Communication on Cyber Security Will Cost Your Business Big (Infographic) August 18, 2014
Growing a business sometimes requires thinking outside the box. 5 min read January 19, 2015 Israeli entrepreneur Avi Brenmiller says he was coaxed by investors into selling Solel, his solar-thermal power firm, to Germany’s Siemens for $418 million in 2009. Today, little is left of it after Siemens pulled out of the business.From a thriving company that employed over 500 people, Solel has been reduced to a factory with 50 workers.Brenmiller’s experience is one of a growing number of cases illustrating the double-edged nature of Israel’s high-tech boom.While many entrepreneurs and investors have made lots of money from Israel’s startups over the past two decades, increasingly firms acquired by foreign buyers are then either shut down, with their intellectual property moving abroad, or turned into R&D centers for the parent company.Israel’s high tech industry is a major growth engine and investment magnet, attracting multinationals like Apple, Intel and Google, who have been eager to snap up local startups.High-tech goods and services account for 12.5 percent of Israel’s gross domestic product (GDP) and half of its industrial exports, government data shows. Israel leads the OECD when it comes to R&D, spending 4.3 percent of GDP on it, nearly twice the OECD average, according to Ernst & Young.Companies often tap into the skills of workers trained in the military or intelligence sectors and start-ups benefit from tax breaks and government funding.But Karin Mayer Rubinstein, head of the Israel Advanced Technology Industry association, said that while M&A brought money into Israel, patents were being “vacuumed” out.”In the last few years, most of the companies being bought don’t stay here as a separate entity,” she said.Jobs WarningMany Israeli companies are not growing into global players that acquire others rather than being acquired. This trend is creating an economic problem, said tech pioneer Dov Moran, who sold his firm M-Systems – which developed the USB flash drive – to SanDisk for $1.6 billion.He said some companies should be sold because they would not be successful on their own. He pointed to Google’s $1 billion acquisition of mapping start-up Waze as one such case.”But the fact that companies are sold is not really great for the country. Only R&D is kept in Israel, not sales, not logistics,” Moran said. “We need companies that are creating jobs not just for talented engineers and programmers.”After job creation in the high-tech sector grew an average of 2.5 percent annually from 2004-2012, it has started to shrink, contracting nearly 2 percent in total in the past two years, government figures show, even as the overall jobless rate fell.Looking back, Moran said that had he stayed the course, M-Systems could have grown to a company with $3-$4 billion a year in sales. Today it operates as a SanDisk R&D center and its workforce has fallen to 700 from 1,000 before the sale in 2006.There are 282 R&D centers in Israel, most owned by foreign firms. Eight out of 10 Israeli technology firms bought by multinationals become a foreign R&D center in Israel, or are integrated in existing foreign R&D centers, said the Israel Venture Capital (IVC) Research Center.Entrepreneurs say investors are often looking for high returns as quickly as possible.”To build a long-term success story takes hard work, many years and lots of patience,” Brenmiller said.Patience is not a strong point in Israel’s start-up culture, where entrepreneurs like to move from one idea to the next.Israeli venture capital-backed companies take an average of 3.95 years from the first round of funding to acquisition, compared with 6.41 years in Britain and 6.66 in France, according to third-quarter 2014 figures from Dow Jones VentureSource.Sign of MaturitySolel is not alone in its experience. Chromatis Networks was one of the biggest acquisitions ever of an Israeli company when it was bought by Lucent in 2000, but was shut down about a year later. IBM closed XIV in 2008 about a year after it paid $300 million for the storage technology firm, according to IVC.But there are some signs the sector is starting to mature as more companies are willing to wait longer before selling, aiming to build themselves up to a stand-alone size.In 2014 there were 70 Israeli “exits” – stake sales from mergers, acquisitions or initial public offerings (IPOs) – valued at nearly $15 billion, according to PriceWaterhouseCoopers (PwC). But of that, $9.8 billion was in IPOs – up from $1.2 billion in 2013 – while the value of M&A fell to $5 billion from $6.5 billion.This can partly be attributed to the fact many successful entrepreneurs are on their second or third company, said Rubi Suliman, head of high-tech at PwC Israel.Brenmiller is one such case. He poured $20 million from the sale of Solel into establishing Brenmiller Energy, which has developed a more efficient way to store heat from the sun.To keep more companies, the Israeli government needs a long-term plan for incentives and support rather than simply early-stage aid, Rubinstein said.With wealthier entrepreneurs and less pressure to sell, some believe Israel could begin producing more large companies such as network security provider Check Point Software.”It is very understandable that a second-time entrepreneur with a large bank account is much more patient in his next venture and much more willing to take risks,” said Suliman.(Editing by Pravin Char) This story originally appeared on Reuters Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global Register Now »