Thursday, June 20, 2013

Phiaton Bridge MS 500


Phiaton's latest headphones take a page from the Beats school of red flourishes paired with deep bass response, but the company gives them their own unique spin. The Phiaton Bridge MS 500 is a striking, modern headphone design with perforated leather accents and triangular ear cups. For $200 (list), lovers of deep bass won't be disappointed, but anyone seeking flat response should look elsewhere. These headphones are powerful and offer distortion-free audio even at high volumes. Extra design touches like detachable cables and a snazzy leather carrying pouch make the Bridge MS 500 earn its price, but an uncomfortable fit threatens to ruin all the positives.

Design
Visually, the Bridge MS 500 is stunning?it's that rare design that takes cues from the present (red highlights mixed with black ? la Beats) and yet seems entirely unique, thanks to its triangular earcups. Even the red trim on the headband seems born of the fashion world?it bends and folds slightly, intentionally, in a manner that stands out in the tech world of clean lines.

So, it's a bit of a bummer that this great looking headphone pair isn't terribly comfortable. This will likely vary from user to user, but even if Phiaton has tried to more or less make earpads that match the shape of the typical ear, the circumaural pads are small on the inside, and if you have medium-to-large ears, they get stuffed inside the ear cushions. It doesn't take long for things to feel uncomfortable, despite the well-padded materials. The headband's padding never feels uncomfortable nor puts too much pressure on the scalp?this is purely a problem with the earpads.Phiaton Bridge MS 500 inline

That's a big issue to get past, but if you can, the Bridge MS 500 is otherwise well-designed. It features a removable cable, and ships with two?one with an inline microphone and remote control, the other with none. Each cable is wrapped in protective red cloth and can connect to either the left or right ear. I'm a sucker for such flexibility of design and added value, as it's cheaper to replace a bad cable than an entire pair of headphones.

The Bridge MS 500 is by no means inexpensive, but headphones in this price range and higher often don't come close to this type of attention not only to detail?but useful detail. Thus, the uncomfortable fit is all the more tragic. If at all possible, it's worth trying a pair on for ten minutes or so to see if the ear pads work with your ears.

The inline remote for the Bridge MS 500 is of the single button variety?this means more compatibility with various models of cell phones, but it also means no volume controls, which is a serious bummer in this, or any, price range.

Call clarity through the inline microphone is par for the course?keeping in mind that no inline mics really sound great for cellular calls. Your call partner and you will understand each other just fine.?

The Bridge MS 500 also ships with a stylish black perforated leather carrying pouch that the headphones fall down into, as well as a ?-inch headphone jack adapter.

Performance
On songs with serious sub bass content, like the Knife's "Silent Shout," the Bridge MS 500 shows off its impressive bass response. There's no distortion at top volumes (and there shouldn't be in this price range), and at more reasonable listening levels, the low frequencies still sound intense. Phiaton doesn't go so overboard that things sound muddy.

On Bill Callahan's "Drover," the constant drumming in the background moves to the forefront due to the serious boost it gets in the lows. It doesn't quite seem to compete with Callahan's voice for your attention, as can sometimes be the case when heavy bass boosting occurs on this track, but his baritone vocal delivery and the low-end of the drums both receive some extra low-end power.

The mids and highs are sculpted enough to more or less balance things out?Callahan's voice still retains its natural sibilance without getting too bright. Overall, this track seems to have a bit too much low-end going on through the Bridge MS 500 for my taste, but bass lovers will enjoy it. It's never muddy, which is crucial, but I wouldn't mind a little more crisp, treble edge gracing the vocals and guitar strumming.

Jay-Z and Kanye West's "No Church in the Wild" benefits a bit more from the Bridge MS 500's sound signature. The attack of the kick drum loop could use a touch more high-mid presence, but the hits never sound dull. The sub-bass synth hits that punctuate the drum loop are delivered with just the right amount of gusto?they provide the round lows that make this track sound so powerful, without upsetting the overall balance too much.?

Classical tracks, like John Adams' "The Chairman Dances," can often sound ridiculously unnatural when serious bass boosting is involved, but the low frequency response of the Bridge MS 500 adds a nice low-end richness to the lower register strings and brass. The naturally bright higher register strings and brass need little help here, and so the bass response doesn't really run the risk of overshadowing the highs like it does occasionally in other genres. The real test as to whether the bass boosting is too much comes at the end of this track, with the large drum hits. While the hits do sound bigger and bass-heavier than they need to, it's an exciting sound that only purists will be bothered by.

If you care less about balance than booming sub-bass sounds, there's always the Jabra Revo. And if you you'd rather have a less bass-heavy frequency response without sacrificing low end, the Marshall Monitor is an exceptional choice, as is the Sennheiser HD 558. If all of these are a bit pricey for your budget, the Logitech UE 4000 is a solid, less expensive option that delivers crisp audio without throwing the bass out the window.

I think rabid bass fiends and those who lean subtly towards the low frequency realm will both enjoy the Bridge MS 500. It has a round, rich low end but brings enough high frequency presence to maintain a certain sense of balance, albeit a balance that favors the bass.?For $200, I have few complaints about the powerful Phiaton Bridge MS 500, but my main one is how uncomfortable, at least for me, they were. All ears are different, but don't say I didn't warn you.

Source: http://feedproxy.google.com/~r/ziffdavis/pcmag/~3/tau38lfJJOc/0,2817,2420574,00.asp

david beckham Bill Hader tim mcgraw Xbox WWE Extreme Rules 2013 powerball winner powerball winner

Tuesday, June 18, 2013

Tianhe-2 supercomputer claims the lead in Top 500 list, thanks its 3.1 million processor cores

As predicted, Chinese supercomputer Tianhe-2 has now been crowned the most powerful supercomputer in the world. Arriving years ahead of schedule, and packing 32,000 Xeon processors alongside 48,00 Xeon Phi accelerator processors, the supercomputer can manage a quadrillion mathematical calculations per second (33.85 petaflops), double that of last year's king (and closest rival), the Titan. In this year's results, 80 percent of the Top 500 used Intel processors, while 67 percent had processors with eight or more cores -- as clock speeds stall, supercomputer development has now focused on processors running in parallel. Top 500 editor Jack Dongarra adds that "most of the features of the [Tianhe-2] system were developed in China, and they are only using Intel for the main compute part," meaning that you can expect to see more Chinese entrants (and possibly champions) over the next few years. For now, however, the US still claims the majority of the Top 500, with 253 top-ranking supercomputers.

Filed under: ,

Comments

Via: CNET

Source: Top 500

Source: http://www.engadget.com/2013/06/17/tianhe-2-supercomputer-claims-the-lead-in-top-500-list-thanks-i/?utm_medium=feed&utm_source=Feed_Classic&utm_campaign=Engadget

gary johnson where do i vote dixville notch Remember Remember The 5th Of November African painted dogs What Time Do Polls Open Krysten Ritter

Monday, June 17, 2013

Secret to Prism program: Even bigger data seizure

WASHINGTON (AP) -- In the months and early years after 9/11, FBI agents began showing up at Microsoft Corp. more frequently than before, armed with court orders demanding information on customers.

Around the world, government spies and eavesdroppers were tracking the email and Internet addresses used by suspected terrorists. Often, those trails led to the world's largest software company and, at the time, largest email provider.

The agents wanted email archives, account information, practically everything, and quickly. Engineers compiled the data, sometimes by hand, and delivered it to the government.

Often there was no easy way to tell if the information belonged to foreigners or Americans. So much data was changing hands that one former Microsoft employee recalls that the engineers were anxious about whether the company should cooperate.

Inside Microsoft, some called it "Hoovering" ? not after the vacuum cleaner, but after J. Edgar Hoover, the first FBI director, who gathered dirt on countless Americans.

This frenetic, manual process was the forerunner to Prism, the recently revealed highly classified National Security Agency program that seizes records from Internet companies. As laws changed and technology improved, the government and industry moved toward a streamlined, electronic process, which required less time from the companies and provided the government data in a more standard format.

The revelation of Prism this month by the Washington Post and Guardian newspapers has touched off the latest round in a decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is essential to keep the nation safe.

But interviews with more than a dozen current and former government and technology officials and outside experts show that, while Prism has attracted the recent attention, the program actually is a relatively small part of a much more expansive and intrusive eavesdropping effort.

Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA effort that snatches data as it passes through the fiber optic cables that make up the Internet's backbone. That program, which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for analysis.

Whether by clever choice or coincidence, Prism appears to do what its name suggests. Like a triangular piece of glass, Prism takes large beams of data and helps the government find discrete, manageable strands of information.

The fact that it is productive is not surprising; documents show it is one of the major sources for what ends up in the president's daily briefing. Prism makes sense of the cacophony of the Internet's raw feed. It provides the government with names, addresses, conversation histories and entire archives of email inboxes.

Many of the people interviewed for this report insisted on anonymity because they were not authorized to publicly discuss a classified, continuing effort. But those interviews, along with public statements and the few public documents available, show there are two vital components to Prism's success.

The first is how the government works closely with the companies that keep people perpetually connected to each other and the world. That story line has attracted the most attention so far.

The second and far murkier one is how Prism fits into a larger U.S. wiretapping program in place for years.

___

Deep in the oceans, hundreds of cables carry much of the world's phone and Internet traffic. Since at least the early 1970s, the NSA has been tapping foreign cables. It doesn't need permission. That's its job.

But Internet data doesn't care about borders. Send an email from Pakistan to Afghanistan and it might pass through a mail server in the United States, the same computer that handles messages to and from Americans. The NSA is prohibited from spying on Americans or anyone inside the United States. That's the FBI's job and it requires a warrant.

Despite that prohibition, shortly after the Sept. 11 terrorist attacks, President George W. Bush secretly authorized the NSA to plug into the fiber optic cables that enter and leave the United States, knowing it would give the government unprecedented, warrantless access to Americans' private conversations.

Tapping into those cables allows the NSA access to monitor emails, telephone calls, video chats, websites, bank transactions and more. It takes powerful computers to decrypt, store and analyze all this information, but the information is all there, zipping by at the speed of light.

"You have to assume everything is being collected," said Bruce Schneier, who has been studying and writing about cryptography and computer security for two decades.

The New York Times disclosed the existence of this effort in 2005. In 2006, former AT&T technician Mark Klein revealed that the company had allowed the NSA to install a computer at its San Francisco switching center, a spot where fiber optic cables enter the U.S.

What followed was the most significant debate over domestic surveillance since the 1975 Church Committee, a special Senate committee led by Sen. Frank Church, D-Idaho, reined in the CIA and FBI for spying on Americans.

Unlike the recent debate over Prism, however, there were no visual aids, no easy-to-follow charts explaining that the government was sweeping up millions of emails and listening to phone calls of people accused of no wrongdoing.

The Bush administration called it the "Terrorist Surveillance Program" and said it was keeping the United States safe.

"This program has produced intelligence for us that has been very valuable in the global war on terror, both in terms of saving lives and breaking up plots directed at the United States," Vice President Dick Cheney said at the time.

The government has said it minimizes all conversations and emails involving Americans. Exactly what that means remains classified. But former U.S. officials familiar with the process say it allows the government to keep the information as long as it is labeled as belonging to an American and stored in a special, restricted part of a computer.

That means Americans' personal emails can live in government computers, but analysts can't access, read or listen to them unless the emails become relevant to a national security investigation.

The government doesn't automatically delete the data, officials said, because an email or phone conversation that seems innocuous today might be significant a year from now.

What's unclear to the public is how long the government keeps the data. That is significant because the U.S. someday will have a new enemy. Two decades from now, the government could have a trove of American emails and phone records it can tap to investigative whatever Congress declares a threat to national security.

The Bush administration shut down its warrantless wiretapping program in 2007 but endorsed a new law, the Protect America Act, which allowed the wiretapping to continue with changes: The NSA generally would have to explain its techniques and targets to a secret court in Washington, but individual warrants would not be required.

Congress approved it, with Sen. Barack Obama, D-Ill., in the midst of a campaign for president, voting against it.

"This administration also puts forward a false choice between the liberties we cherish and the security we provide," Obama said in a speech two days before that vote. "I will provide our intelligence and law enforcement agencies with the tools they need to track and take out the terrorists without undermining our Constitution and our freedom."

___

When the Protect America Act made warrantless wiretapping legal, lawyers and executives at major technology companies knew what was about to happen.

One expert in national security law, who is directly familiar with how Internet companies dealt with the government during that period, recalls conversations in which technology officials worried aloud that the government would trample on Americans' constitutional right against unlawful searches, and that the companies would be called on to help.

The logistics were about to get daunting, too.

For years, the companies had been handling requests from the FBI. Now Congress had given the NSA the authority to take information without warrants. Though the companies didn't know it, the passage of the Protect America Act gave birth to a top-secret NSA program, officially called US-98XN.

It was known as Prism. Though many details are still unknown, it worked like this:

Every year, the attorney general and the director of national intelligence spell out in a classified document how the government plans to gather intelligence on foreigners overseas.

By law, the certification can be broad. The government isn't required to identify specific targets or places.

A federal judge, in a secret order, approves the plan.

With that, the government can issue "directives" to Internet companies to turn over information.

While the court provides the government with broad authority to seize records, the directives themselves typically are specific, said one former associate general counsel at a major Internet company. They identify a specific target or groups of targets. Other company officials recall similar experiences.

All adamantly denied turning over the kind of broad swaths of data that many people believed when the Prism documents were first released.

"We only ever comply with orders for requests about specific accounts or identifiers," Microsoft said in a statement.

Facebook said it received between 9,000 and 10,000 requests for data from all government agencies in the second half of last year. The social media company said fewer than 19,000 users were targeted.

How many of those were related to national security is unclear, and likely classified. The numbers suggest each request typically related to one or two people, not a vast range of users.

Tech company officials were unaware there was a program named Prism. Even former law enforcement and counterterrorism officials who were on the job when the program went live and were aware of its capabilities said this past week that they didn't know what it was called.

What the NSA called Prism, the companies knew as a streamlined system that automated and simplified the "Hoovering" from years earlier, the former assistant general counsel said. The companies, he said, wanted to reduce their workload. The government wanted the data in a structured, consistent format that was easy to search.

Any company in the communications business can expect a visit, said Mike Janke, CEO of Silent Circle, a company that advertises software for secure, encrypted conversations. The government is eager to find easy ways around security.

"They do this every two to three years," said Janke, who said government agents have approached his company but left empty-handed because his computer servers store little information. "They ask for the moon."

That often creates tension between the government and a technology industry with a reputation for having a civil libertarian bent. Companies occasionally argue to limit what the government takes. Yahoo even went to court and lost in a classified ruling in 2008, The New York Times reported Friday.

"The notion that Yahoo gives any federal agency vast or unfettered access to our users' records is categorically false," Ron Bell, the company's general counsel, said recently.

Under Prism, the delivery process varied by company.

Google, for instance, says it makes secure file transfers. Others use contractors or have set up stand-alone systems. Some have set up user interfaces making it easier for the government, according to a security expert familiar with the process.

Every company involved denied the most sensational assertion in the Prism documents: that the NSA pulled data "directly from the servers" of Microsoft, Yahoo, Google, Facebook, AOL and more.

Technology experts and a former government official say that phrasing, taken from a PowerPoint slide describing the program, was likely meant to differentiate Prism's neatly organized, company-provided data from the unstructured information snatched out of the Internet's major pipelines.

In slide made public by the newspapers, NSA analysts were encouraged to use data coming from both Prism and from the fiber-optic cables.

Prism, as its name suggests, helps narrow and focus the stream. If eavesdroppers spot a suspicious email among the torrent of data pouring into the United States, analysts can use information from Internet companies to pinpoint the user.

With Prism, the government gets a user's entire email inbox. Every email, including contacts with American citizens, becomes government property.

Once the NSA has an inbox, it can search its huge archives for information about everyone with whom the target communicated. All those people can be investigated, too.

That's one example of how emails belonging to Americans can become swept up in the hunt.

In that way, Prism helps justify specific, potentially personal searches. But it's the broader operation on the Internet fiber optics cables that actually captures the data, experts agree.

"I'm much more frightened and concerned about real-time monitoring on the Internet backbone," said Wolf Ruzicka, CEO of EastBanc Technologies, a Washington software company. "I cannot think of anything, outside of a face-to-face conversation, that they could not have access to."

One unanswered question, according to a former technology executive at one of the companies involved, is whether the government can use the data from Prism to work backward.

For example, not every company archives instant message conversations, chat room exchanges or videoconferences. But if Prism provided general details, known as metadata, about when a user began chatting, could the government "rewind" its copy of the global Internet stream, find the conversation and replay it in full?

That would take enormous computing, storage and code-breaking power. It's possible the NSA could use supercomputers to decrypt some transmissions, but it's unlikely it would have the ability to do that in volume. In other words, it would help to know what messages to zero in on.

Whether the government has that power and whether it uses Prism this way remains a closely guarded secret.

___

A few months after Obama took office in 2009, the surveillance debate reignited in Congress because the NSA had crossed the line. Eavesdroppers, it turned out, had been using their warrantless wiretap authority to intercept far more emails and phone calls of Americans than they were supposed to.

Obama, no longer opposed to the wiretapping, made unspecified changes to the process. The government said the problems were fixed.

"I came in with a healthy skepticism about these programs," Obama explained recently. "My team evaluated them. We scrubbed them thoroughly. We actually expanded some of the oversight, increased some of the safeguards."

Years after decrying Bush for it, Obama said Americans did have to make tough choices in the name of safety.

"You can't have 100 percent security and also then have 100 percent privacy and zero inconvenience," the president said.

Obama's administration, echoing his predecessor's, credited the surveillance with disrupting several terrorist attacks. Leading figures from the Bush administration who endured criticism during Obama's candidacy have applauded the president for keeping the surveillance intact.

Jason Weinstein, who recently left the Justice Department as head of its cybercrime and intellectual property section, said it's no surprise Obama continued the eavesdropping.

"You can't expect a president to not use a legal tool that Congress has given him to protect the country," he said. "So, Congress has given him the tool. The president's using it. And the courts are saying 'The way you're using it is OK.' That's checks and balances at work."

Schneier, the author and security expert, said it doesn't really matter how Prism works, technically. Just assume the government collects everything, he said.

He said it doesn't matter what the government and the companies say, either. It's spycraft, after all.

"Everyone is playing word games," he said. "No one is telling the truth."

___

Associated Press writers Eileen Sullivan, Peter Svensson, Adam Goldman, Michael Liedtke and Monika Mathur contributed to this report.

___

Contact the AP's Washington investigative team at DCinvestigations@ap.org

___

Online:

NSA: http://www.nsa.gov

Source: http://news.yahoo.com/secret-prism-program-even-bigger-140403980.html

honda classic news channel 5 nashville weather jason varitek andrew breitbart dead sheriff joe arpaio limbaugh

Sunday, June 16, 2013

Riot police end Istanbul park protest

ISTANBUL (AP) ? Turkish riot police firing tear gas and water cannon took less than half an hour on Saturday to bring to an end an 18-day occupation of an Istanbul park at the center of the strongest challenge to Prime Minister Recep Tayyip Erdogan's 10-year tenure.

The protests, which began as an environmental sit-in to prevent a development project at Taksim Square's Gezi Park, quickly spread to dozens of cities and spiraled into a broader expression of discontent about what many say is Erdogan's increasingly authoritarian decision-making.

He vehemently denies the charge, pointing to his strong support base which allowed him to win his third consecutive term with 50 percent of the vote in 2011.

The protests, which left at least four people dead and more than 5,000 injured, dented Erdogan's international reputation and infuriated him with a previously unseen defiance to his rule.

For more than two weeks, protesters had flouted Erdogan's warnings to vacate the area. On Saturday evening, he ran out of patience.

As dusk fell, hundreds of white-helmeted riot police swept through Taksim Square and Gezi Park, firing canisters of the acrid, stinging gas as they stormed through the tents set up throughout the park.

Thousands of peaceful protesters, choking on the fumes and stumbling among the tents, put up little physical resistance, even as plain-clothes police manhandled many to drive them from the park. Just moments before, the park had been full of protesters young and old, as well as families with children.

Many ran into nearby hotels for shelter. A stand-off developed at one hotel on the edge of the park, where police opened up with water cannon against protesters and journalists outside before throwing tear gas at the entrance, filing the lobby with white smoke. At other hotels, plain-clothes policemen turned up outside, demanding the protesters come out.

Some protesters ran off into nearby streets, setting up makeshift barricades and running from water cannon, tear gas and rubber bullets into the early hours of Sunday. Plumes of white tear gas rose from the streets.

As news of the raid broke, thousands of people from other parts of Istanbul gathered and were attempting to reach Taksim. Television showed footage of riot police firing tear gas on a highway and bridge across the Bosphorus to prevent protesters from heading to the area.

Demonstrations also erupted in other cities. In Ankara, at least 3,000 people swarmed into John F. Kennedy street, where opposition party legislators sat down at the front of the crowd facing the riot police ? not far from Parliament. In Izmir, thousands converged at a seafront square.

Near Gezi, ambulances ferried the injured to hospitals as police set up cordons and roadblocks around the park, preventing anyone from getting close.

Tayfun Kahraman, a member of Taksim Solidarity, an umbrella group of protest movements, said an untold number of people in the park had been injured ? some from rubber bullets.

"Let them keep the park, we don't care anymore. Let it all be theirs. This crackdown has to stop. The people are in a terrible state," he told The Associated Press by phone.

Taksim Solidarity, on its Web site, called the incursion "atrocious" and counted hundreds of injured ? which it called a provisional estimate ? as well as an undetermined number of arrests. Istanbul governor's office said at least 44 people were taken to hospitals for treatment. None of them were in serious condition, it said in a statement.

Huseyin Celik, the spokesman for Erdogan's Justice and Development Party, told NTV that the sit-in had to end.

"They had made their voice heard ... Our government could not have allowed such an occupation to go on until the end," he said.

As the tear gas settled, bulldozers moved into the park, scooping up debris and loading it into trucks. Crews of workmen in fluorescent yellow vests and plain-clothes police went through the abandoned belongings, opening bags and searching their contents before tearing down the tents, food centers and library the protesters had set up in what had become a bustling tent city.

It was a violent police raid on May 31 against a small sit-in in Gezi Park that sparked the initial outrage and spiraled into a much broader protest. While those in the park have now fled, it was unclear whether their fervor had been doused, whether they would take their movement to other places, or try to return to the park at a later time.

Saturday's raid came less than two hours after Erdogan threatened protesters in a boisterous speech in Sincan, an Ankara suburb that is a stronghold of his party.

"I say this very clearly: either Taksim Square is cleared, or if it isn't cleared then the security forces of this country will know how to clear it," he told tens of thousands of supporters at a political rally.

A second pro-government rally is planned in Istanbul Sunday. Erdogan has said the rallies were not designed as "an alternative" to the demonstrations at Gezi Park, but part of early campaigning for local elections next March ? though he used the occasion to both criticize the protesters and praise his supporters.

"You are here, and you are spoiling the treacherous plot, the treacherous attack!" he told the cheering crowd, insisting unspecified groups both inside and outside Turkey had conspired to mount the protests ? and that he had the documents to prove it.

The crowd chanted in response: "Stand straight, don't bow, the people are with you!"

According to the government's redevelopment plan for Taksim Square that caused the sit-in, the park would be replaced with a replica Ottoman-era barracks. Under initial plans, the construction would have housed a shopping mall, though that has since been amended to the possibility of an opera house, a theater and a museum with cafes.

On Friday, Erdogan offered to defer to a court ruling on the legality of the government's contested park redevelopment plan, and floated the possibility of a referendum on it. The protesters felt those concessions were not enough, however, and vowed to press on. But that was before the raid ousted them.

___

Keaten reported from Ankara, Turkey. Suzan Fraser in Ankara, Turkey, contributed to this report.

Source: http://news.yahoo.com/riot-police-end-istanbul-park-protest-211114124.html

Kenny Vaccaro Kate McKinnon gwyneth paltrow Pink moon Schwab cispa Katherine Russell Tsarnaev

Friday, June 14, 2013

Obama admin. says it ?strongly? opposes religious freedom in military | Alliance Defending Freedom

ALLIANCE DEFENDING FREEDOM COMMENT
June 13, 2013?? FOR IMMEDIATE RELEASE
CONTACT MEDIA AND PUBLIC RELATIONS:?(480) 444-0020?or?www.adfmedia.org/home/contact

?

The following quote may be attributed to?Alliance Defending Freedom Litigation Counsel Kellie Fiedorek?regarding the Obama administration?s?announcement?that it ?strongly? opposes a proposed amendment to the National Defense Authorization Act that would protect the religious freedom of men and women in the armed forces:

?Service members shouldn?t be denied the very constitutional liberties they have volunteered to defend. It is clear that the Obama administration opposes constitutional religious freedom for service men and women, and this is the latest example of this administration?s hostility toward religious service members. Antagonism toward people of faith?namely Christians?in the military is real, and it is disappointing that the president is unwilling to support laws that protect and defend the basic liberty of religious freedom.?

?

  • Pronunciation guide: Fiedorek (Fih-DOHR?-eck)

?

Alliance Defending Freedom is an alliance-building, non-profit legal organization that advocates for the right of people to freely live out their faith.

?

# # #

Source: http://www.alliancealert.org/2013/06/13/obama-admin-says-it-strongly-opposes-religious-freedom-in-military-alliance-defending-freedom/

mike dantoni bulls heat goldman sachs brandon carr knicks coach encyclopedia britannica

HIV drug can also protect injection drug users

ATLANTA (AP) ? U.S. health officials say doctors should consider giving a daily AIDS drug to another high risk group to prevent infection ? people who shoot heroin, methamphetamines or other injection drugs.

A similar recommendation is already in place for gay men and heterosexual couples.

The new advice was triggered by a study done in Thailand. Drug users who took the daily pill were about 50 percent less likely to become infected with HIV than those given a dummy pill.

Drug users represent about 1 in 13 new infections in the U.S. but they account for the majority of cases in Eastern Europe and central Asia.

The research was done by the Centers for Disease Control and Prevention and the Thai government. The findings were released Wednesday by the journal Lancet.

Source: http://news.yahoo.com/hiv-drug-protect-injection-drug-users-190347482.html

annette funicello joel osteen Accidental Racist Fallon Fox Chris Webber linda perry WrestleMania 29