Home » 2011 » April (Page 3)

Centreville, Maryland, Author Publishes New Book about the Constitution

Centreville, Maryland, Author Publishes New Book about the Constitution










Pittsburgh, PA (Vocus/PRWEB) March 10, 2011

One Man’s Opinion: A Suggested Rewrite for the Constitution of the United States, a new book by William Kuehler, Jr., has been released by Dorrance Publishing Co., Inc.

If you could change one thing about the United States and our government, what might you consider? William D. Kuehler, Jr. has a profound respect for the American Constitution of 1787, which gave rise for the world’s first great democracy. It has successfully served our nation for over two hundred years, providing for our people and fending off external threats. Yet, our Constitution has proven perishable over time. Even with amendments, it has become apparent that much was not included, such as a provision mandating a balanced federal budget.

In humble recognition to those who have made the ultimate sacrifice in defending our way of life, William D. Kuehler, Jr. puts forth a new constitution, which corrects the inadequacies of the original and forces the government to behave in a more logical way. Through One Man’s Opinion: A Suggested Rewrite for the Constitution of the United States, Kuehler seeks to overhaul our constitutional foundation to make it stronger, so that we, as a nation, shall continue moving upward toward a bright future.

A native of Ridley Park, Pennsylvania, William David Kuehler, Jr. has lived in Centerville, Maryland for the past twenty years. Kuehler earned a bachelor’s degree in Aerospace Engineering from Northrop Institute of Technology in 1969 and a master’s degree in Engineering Science for Pennsylvania State University in 1980. After a thirty-four-year career as a Mechanical Design Engineer, Kuehler retired in 2006 from the Northrop Grumman Company. In his spare time, he enjoys gardening, fishing, golfing, model boat building, and model trains.

One Man’s Opinion: A Suggested Rewrite for the Constitution of the United States is an 48-page paperback with a retail price of $ 10.00. The ISBN is 978-1-4349-0946-6. It was published by Dorrance Publishing Co., Inc of Pittsburgh, Pennsylvania. For more information, or to request a review copy, please go to our virtual pressroom at http://www.dorrancepressroom.com or our online bookstore at http://www.dorrancebookstore.com.

###





















Vocus©Copyright 1997-

, Vocus PRW Holdings, LLC.
Vocus, PRWeb, and Publicity Wire are trademarks or registered trademarks of Vocus, Inc. or Vocus PRW Holdings, LLC.







Related The Constitution Press Releases

Latest Freedom Of Religion News

A time for reflection and rebirth
ADELAIDE”S church leaders deliver their messages for the weekend.
Read more on News.com.au

Comment on Looking Back on Sarawak Elections 2011 by looes74
Matsab, No, Taib would make sure Najib would mampus. That’s for sure. For me, I just wanna enjoy the show! Bean, Why everything got to be with western tainted glass? It’s Tianmen, I agree….Chill out man http://www.youtube.com/watch?v=RPwDqFf4NJI&feature=related
Read more on Din Merican

Are Sobriety Checkpoints Really Constitutional?

“I rather doubt that the Framers of the Fourth Amendment would have considered “reasonable” a program of indiscriminate stops of individuals not suspected of wrongdoing.” Said Justice Clarence Thomas in his dissention for Michigan Dept. of State Police v. Sitz.  The case debated the dispute of whether or not sobriety checkpoints are legal or a violation of Fourth Amendment rights.  According to this amendment citizens are protected “against unreasonable searches and seizures…[without] probable cause.”  So it seems the Constitution prohibits people from being stopped without a search warrant or at least without probable cause that they have committed a crime.

The Supreme Court decided that sobriety roadblocks are an exception to the rule in a vote of 6-3 in 1990.  According to Justice Rehnquist “the state interest in reducing drunk driving outweighed this minor infringement.”  However the Court placed several stipulations on sobriety checkpoints including a neutral formula for selecting which vehicles to stop (i.e. every other car), clear warning lights and signs, limitations on the time and length of a checkpoint to limit the length of motorist detention and maximize effectiveness, and advance notice to promote the deterrent effect of checkpoints.  In spite of these restrictions on sobriety checkpoints, there are still eleven states that prohibit them altogether.

Recently there was an article in the Washington Post that described how a local citizen, Lisa Davis was stopped at a checkpoint in the District of Columbia.  She was obeying every law and was not intoxicated when stopped, but the law enforcement official asked her personal information for a federal database used for racial profiling studies, crime-solving, and traffic stops.  “I’ve got some serious constitutional issues with that.  I feel like it’s a violation of my rights. It’s a slippery slope to Big Brother,” said Davis.

Justice Stevens noted in his dissension that “the findings of the trial court, based on an extensive record and affirmed by the Michigan Court of Appeals, indicate that the net effect of sobriety checkpoints on traffic safety is infinitesimal and possibly negative.”  According to the American Beverage Institute, “An analysis of the NHTSA [National Highway Traffic Safety Administration] numbers shows: Every one of the 11 non-roadblock states saw a decline in alcohol-related fatalities, while almost half of roadblock states saw an increase in alcohol-related fatalities.”

For more information about drinking and driving please visit www.environmentaldiseases.com

Article from articlesbase.com

More The Constitution Articles

A Promise of Freedom

Department of Homeland Security US Citizenship and Immigration Services Produced by the National Constitution Center A Promise of Freedom: An Introduction to US History and Civics for Immigrants M-668, GPO 9780160785818, 2007 “A Promise of Freedom” is a 12 minute film based on the National Constitution Center’s “Freedom Rising.” It focuses on the history and founding of our nation and the important rights and responsibilities of US citizenship. The discussion booklet outlines concepts from that film.

Watch what happens……

Television Viewers Flock to New Internet TV Site

Television Viewers Flock to New Internet TV Site











Thomson, IL (PRWEB) November 18, 2008

Freedom TV, the revolutionary Internet TV site that allows viewers to watch thousands of channels from around the world at the click of a mouse, is mentioned in a recent article by VistaNews. The article “Follow-up: Bye, bye, CATV?” features a customer’s praise of the service.

The VistaNews article, featured on the site’s Editor’s Corner, is a follow-up to an editorial from the week before, discussing the future of television and the Internet’s potential influence. Featuring comments regarding the high price of cable television and some companies’ plans of bandwidth restrictions, the article also quotes individuals who have found alternatives to the high cost of cable and satellite services. One VistaNews reader mentioned in the article is Gregory T., who states: “I remember when cable was just $ 5.00 a month in 1973. I thought it was a scam then! Now look at it $ 100+ a month for garbage! I use Freedom TV on the Internet, $ 50 one time fee.”

Freedom TV currently features more than 4,000 television channels from 78 countries. Easy to use and 100 percent legal, Freedom TV offers a variety of programming and entertainment unmatched by even the most premium cable and satellite companies. Freedom TV features common genres and networks, such as sports channels, music channels, NBC and ABC affiliates and more; premium channels like Sci-Fi, C-Span and The Home Shopping Network; and some programming that simply can’t be found on cable or satellite, like the Baseball Channel, Classic Movies, The Baby Channel, Backyard Wrestling and many more.

Users watch Freedom TV via the site’s video feed “grabber” software, which allows immediate viewing on a PC. The site is also Mac-compatible. Many viewers are even hooking up the system to their televisions.

Freedom TV’s $ 50 fee is a lifetime membership charge for unlimited viewing. In addition to maintaining the Web site and adding new channels, the funds cover real live technical support, a feature not found on other Web TV sites. Like any cable or satellite company, Freedom TV provides its users full support, providing email and telephone technical assistance, new channel requests and more.

“With thousands of channels from around the world, in multiple languages, available at a one-time price lower than most monthly cable and satellite bills, all at the click of a mouse, Freedom TV truly is a new era in television viewing,” says Nick Sands of Freedom TV.

For more information about Freedom TV, visit http://www.usefreedomtv.com/ and http://www.orderfreetv.com/.

###




















Vocus©Copyright 1997-

, Vocus PRW Holdings, LLC.
Vocus, PRWeb, and Publicity Wire are trademarks or registered trademarks of Vocus, Inc. or Vocus PRW Holdings, LLC.







ترنيمه مين غيرك بيحن عليا

ترنيمه صلوا من اجل المسيحين اضطهاد الاقباط في مصراضطهاد الاقباط في مصر احداث الكشح Over the past forty years, the government of Egypt has endorsed and fostered an environment of Islamic radicalism to recruit more Muslim fundamentals. This phenomenon played a key role to force Islam on Coptic girls and enhance the isolation of the Coptic community in Egypt. As a result of citing in the constitution that Islam is the main source of legislation in Egypt, Coptic Christians has lost the freedom of religion including the right to build churches and the right to worship in a free respect. During the 80s and under the Mubarak administration, Islamic militants instigated several violent episodes against the Copts and western tourists, attacked, sacked and burned churches and Coptic businesses

Internet Security: Human Resource Management Implications

The rise of the Internet has resulted in many important issues being raised. One of these major issues relates to privacy and security concerns.

These issues become important ones for organizations to consider for several reasons. Firstly, because private employee information is recorded on computers, secondly because organizations have their own important information recorded on computers, and thirdly because many organizations conduct business over the Internet via an informational home page or by Internet retailing.

The question of security will become an important one for organizations and will likely become the responsibility of the human resource department in many organizations, with the questions of security and privacy an extension of information systems generally handled by the human resource department (Bernardin & Russell).

In this paper, the privacy and security issues that arise from the Internet will be investigated. Recognizing that the Internet is relatively new and rapidly changing, the investigation will be completed with an eye for looking forward to the future.

Firstly, I will discuss the modern history of the Internet and how it relates to privacy and security concerns. I will then discuss several key security and privacy issues relevant to organizations. I will then briefly discuss the protection options available to deal with these issues.

THE INTERNET AND PRIVACY & SECURITY

Privacy is not a new concept, but one that has been of importance to people for centuries.

The advent of the Internet however, is taking privacy issues to a new level. Privacy is described as “the ability of individuals to determine for themselves when, how and to what extent information about them is communicated to others” (IBM).

Security also becomes of wider concern. With the importance of the Internet and information technology to society, it becomes a tool that can be used against national security, against individuals or against organizations.

As well as this, the mass of information available on the Internet can be misused.

The Internet has become a profound part of our society, impacting on every aspect of it. With this wide impact, security issues reach out across various topics and take on various forms.

Also relevant is the fact that the Internet remains in its infancy, with the Internet revolution described as “one that experts estimate is less than 10 percent complete” (IBM).

As the Internet grows and changes, new security and privacy issues will appear. As the environment changes, the privacy and security issues will be reconsidered.

There is no doubt that the issues the Internet creates are likely to change, as the Internet and society continue to adapt to each other. Even recognizing this, by assessing the issues now we can begin to see their current impact and also their future direction.

SECURITY AND PRIVACY ISSUES

Hackers

Everyone is under threat from hackers, from the organization, to government information, and through to individuals. The reason for hacking varies as widely as those that become victims of hacking,

“crackers are not necessarily after secret files or valuable corporate data, many just want a machine – fast. Most victimized machines are merely launch pads for other attacks” (Tanase). Essentially, hackers hide themselves by operating through a chain of machines.

Reasons for hacking are extremely varied and can include accessing information, changing information records and launching viruses.

For the organization, information may be extracted to be used against the organization. This information could then be used in various way. Disgruntled employees may seek information to use against the organization.

The threat of misuse also depends on the nature of the organization. A university for example has a threat of students changing their results records, while an organization involved in controversial issues, such as a gun manufacturer may be threatened by anti-gun protesters. Hackers may also operate by damaging company web sites.

The reasons and form of Internet hacking crimes are just as varied as typical crimes.

As the Internet becomes more widespread, Internet crimes may come to mirror all crimes. For example, just as a disgruntled employee may vandalize their place of employment, a disgruntled employee may vandalize the organization’s web site.

Current Effect on Business

Hacker attacks are the largest threats for governments and businesses, with ninety percent of business and governments suffering hacker attacks each year (Krebs).

Of those businesses, only one third were willing to report the attacks to the FBI (Krebs).

Eighty percent reported financial losses as a result but the majority were not willing to quantify these financial losses (Krebs).

The majority of organizations and government departments do suffer from security breaches. Also noted is that this is not all from hackers, a major component is also from company staff. The fact that the majority are not willing to report or verify the problems, is an indication that this is a problem that is thought to be significant as well as damaging.

Organizations generally avoid reporting such problems to avoid alarming shareholders, while government departments avoid public concern. With shareholders and the public warranted in their right to know of these breaches, there is a future likely, where such breaches will be required to be reported.

The reality is that these threats cannot be ignored. A study by the National Institute of Standards and Technology recognized that “information and the systems that process it are among the most valuable assets of any organization. Adequate security of these assets is a fundamental management responsibility” (NIST).

The report by the National Institute of Standards and Technology provides a framework for determining a security system program. The needs of the programs are twofold:

“Agency programs must: 1) assure that systems and applications operate effectively and provide appropriate confidentiality, integrity, and availability; and 2) protect information commensurate with the level of risk and magnitude of harm resulting from loss, misuse, unauthorized access, or modification” (NIST).

This considered system and approach to determining may mirror how organizations will approach security considerations in the future.

It is also noted that “many organizations and consumers are only just beginning to realize the value of applied information technology and the increased efficiency and effectiveness of innovations in data collection and management” (IBM).

With increased realization will come increased use of information by organizations, and with this increased use will come a greater need for privacy and security considerations.

Information on the Internet

The Internet is also capable of infringing on a person’s privacy as a publisher of information.

We can see the Internet as a tool for communicating information, just as television, newspapers and other media are.

The difference with the Internet is that the information published is not as well controlled.

With television and newspapers, controls are in place to determine what will be communicated. It is generally not possible for a person to publish information without it being verified in some way.

However, with the Internet, a person can publish and communicate messages to people from all over the world with no requirement to have checks on the information.

Essentially, the Internet allows anyone to say anything, and to say that anything to a lot of people.

This leads to the Internet being capable of being used as a tool to defame others.

A recent court case shows that this does happen, where the case is described as follows:

“A state-court jury awarded -million Tuesday to a University of North Dakota physics professor who sued a former student for libel after she accused him in an online article of being a pedophile. The professor, John L. Wagner, 41, filed his lawsuit after an article titled “Kinky, Torrid Romance by Randy Physics Professor” was published on the Web site Undnews.com” (Bartlett).

This example shows how information on any subject can be widely published on the Internet. The guilty verdict indicates that the law does consider this to be a case of defamation.

The ease of publication on the Internet and the difficulty in controlling it is also evidenced by the fact that the article is now posted on another web site (Bartlett).

This situation is one that may find controls placed on it in the future, controls that act as a safeguard for what can and cannot be published on the Internet as fact.

The guilty verdict in this case also leads the way for other defamation claims to be made and defamation laws to be determined for the Internet.

While this is a case against a person, it is also possible that this same type of defamation could be carried out in regards to an organization, its products or its services. It is feasible that a disgruntled customer could publish damaging reports about the company.

More Possibilities

The possibilities of using the Internet for illegal advantages include scams as new and ingenious as the Internet itself.

One opportunity that is not currently illegal, though is concerning, is using one piece of software as a means for distributing another.

One example that is causing universities concern is KaZaA, software that is used to store and swap video clips and MP3 files. This software is specifically targeted at students and is downloaded by large numbers of students. It has been reported that this software has “software attached to it that could allow the company to use student computers and university bandwidth for commercial ventures, such as serving Internet advertisements or selling computer storage space” (Carlson).

While this is not an illegal process, it is a misleading one for the user. It also shows how technology can be used for purposes other than that which we purchase them for. This is important because this is one way information can be hidden within programs and there is potential for this to be used illegally in the future. It is also said that universities are specifically targeted because they have a considerable amount of unused hard drive space (Carlson). This could apply equally to many organizations, so organizations may also become a target of these programs in the future.

SECURITY AND PRIVACY PROTECTION

Security Programs

Security programs currently consist of two main types. The first are virus programs that prevent damaging computer viruses from being received. One of the most interesting things about these programs is that they require constant updating.

These constant updates illustrate how quickly virus concerns change. Essentially, one group of people are constantly creating new viruses, while a second group remain alert to these viruses and create antidotes for the viruses.

The second type of security program is firewall software. Firewall software prevents hackers from accessing a computer. Just like viruses, these programs are under constant upgrading to keep up with hacker technology changes.

Security and Privacy Consultants

Security and privacy concerns have also created a new industry of consultants, who offer advice, personnel and systems to governments, organizations and also individuals.

An example of one of these firms is Rent-A-Hacker, whose company profile reads as follows:

“Rent-A-Hacker was formed to afford anyone the means to protect their valuable information assets. Unlike most Cybersecurity firms whose goal is to sell you security products, our focus is on auditing, detection and proactive prevention” (Rent-A-Hacker).

To achieve these goals, the organizations makes use of experts in Internet security and in hacking. This organization is an example of where the future of Internet security may lead.

With experts developing new ways to breach Internet security, software programs may no longer be enough. A defence system of equally effective experts may be the only way to combat hackers and other breachers of both security and privacy.

Government Actions

The Government plays an important role in effecting privacy and security concerns and does this on two levels. The first is in their role in setting the rules for the private sector. The second is in establishing guidelines for the government’s own use of information (IBM).

With the broad implications of the Internet it is also recognized that government control becomes essential, “the growing interconnectedness of society underscores the need for government officials to understand the broad implications of the Internet and the information technology revolution (IBM).

The government meets this challenge by producing a set of internationally-accepted principles, with these principles developed by the Organization for Economic Cooperation and Development and are known as the OECD guidelines (IBM).

These guidelines include ‘fair information practices’ for organizations that outline appropriate security of data and disclosure of data practices (IBM).

IBM describes the US security and privacy measures, saying:

“The US has legislatively-required protections in focus areas: government, credit reporting, banking and finance, health, and children’s information. In other commercial areas, such as retail and online marketing, the US relies on its common-law traditions coupled with industry responsibility and leadership to chart the way” (IBM).

Legal Protection

The legal component of the Internet is handled largely by the Computer Crime and Intellectual Property Section of the Department of Justice. The actions of the section are described, saying:

“Section attorneys advise federal prosecutors and law enforcement agents; comment upon and propose legislation; coordinate international efforts to combat computer crime; litigate cases; and train all law enforcement groups. Other areas of expertise possessed by CCIPS attorneys include encryption, electronic privacy laws, search and seizure of computers, e-commerce, hacker investigations, and intellectual property crimes” (CCIPS).

Legal protection in the US is wide and varied, covering a variety of issues that the Internet relates to.

This includes the considerations of e-commerce, covering topics including Internet gambling, online sales of healthcare products and consumer protection (CCIPS).

Laws are also existent relating to computer crimes. These crimes include cyberstalking, Internet fraud, child pornography and identity theft (CCIPS).

Insurance Protection

Another industry that reflects the rising importance of Internet security is the insurance industry.

Policies purchased for 2001 were just under 0 million in 2001, with it expected to rise to at least billion by the year 2007 (Salkever).

The policies available for organizations include protection from “virus attacks, denial-of-service assaults, cracking into company systems, and Web-site defacements. Some companies even write policies that cover cyber-extortion, where an online intruder or an insider steals crucial data such as customer credit-card files and demands a payoff. The rising tide of lawsuits against companies whose employees have used corporate e-mail inappropriately has also caught the attention of e-insurers” (Salkever).

It is also noted that with the insurance industry becoming a major part of Internet security, they will have the opportunity to shape the computer security business.

This will occur by insurance companies defining what types of security products and practices are acceptable. Following this, premiums will differ based on what software protection systems are used, effectively rating product systems and influencing the business consumers choice.

This is also expected to effect business, with e-insurance becoming a requirement, “as cyber-insurance goes from exotica to a business necessity, the computer-security industry will have to adapt to keep the insurers happy” (Salkever).

There is certainly potential for insurance companies to influence both the coverage required by organizations and the products and actions required to attain this coverage, “that’s the wave of the future, as insurers exert even more pressure on the technology practices of any company wishing to insure this increasingly important facet of business” (Salkever).

Also recognized is the possible relationship between insurance companies and security products with it being argued “that insurers will demand responsibility from software companies for flaws in their products — and that they’ll have the legal firepower to hold the software outfits accountable” (Salkever).

H. S. – is the author for Istanbul Property Management Organization’s information section. Please visit Istanbul Real Estate Management for more information.

Article from articlesbase.com

Third Party Presidential Debate (Full Video)

Third Party Presidential Debate with candidates Ralph Nader and The Constitution Party’s Chuck Baldwin
Video Rating: 4 / 5

What Constitute a Heat-Treating Department Audit?

Good audit constitutes a good heat-treatment process. An audit conducted to ascertain a certain Heat Treating department is very vital since it sets the standards of that department, at the same time it’s a way of monitoring the standards of the department and keeping the processes at pace with the standard heat-treating procedures.

An audit is also essential in establishing the capabilities of a commercial heat-treating supplier, thus the audit should be specific, goal oriented, formal, and follows the required guidelines.

According to the audit checklist, a heat-treating department should be operated by skilled and competent workers. It is a basic for any operation.

The persons behind the operation should be highly competent, trained, and has capabilities in making sure the heat-treating process is in place. They should also be trained for troubleshooting purposes, and they should know the basic problem solving skills to resolve issues that may arise during the actual operation. Another consideration should be the efficiency of the heat-treating process itself.

It should be establish during the audit that the operation should be equipped with basic and qualified procedures to come up with standard quality. Quality assurance is a must during this process. The audit team as well will be very particular with regards to the workplace. The operations area should be conducive for the operation and during the Heat Treating process.

The audit will also take into account the previous audit and assessment made, and if the previous results reflect the current performance of the heat-treating department. The audit will have specific guidelines that should be met during the audit to make sure that the department still follows what should be the basic processes during the heat-treatment procedure.

If there will be any issues that will arise during the actual audit, a more specific resolution and action plans will be set to improve the issues at hand with the aid of the personnel present during the audit process.

A heat-treating department will be rated “fail” if the department will not reveal the real nature of the processes within the heat-treating operation. There are two aspects taken into account.

First is the quality which constitutes the compliance, form, instructions, and the standards of the heat treatment operation. The other consideration pertains to the aspect of performance. Performance refers to the control, processes and work control, and other basic principles of the heat-treating process. Since most of the time, the audit body look through the last audit made, and makes a reference for the recent audit, they are actually into the improvement and working out on what should be the processes that a department should improve after the last audit.

If by some means, the specific goals were not work out, and the next audit spot the same issues, that is where a department is given a “fail” rating. The Heat Treating operation is not a simple procedure. It requires a lot o skills and standard operating procedures should be mastered to come up with both quality and performance classification. Taking into account the basics of the heat-treating department audits, we will make sure that the department sticks with the basic and realistic goals of the heat-treating department, at the same time delivering a sound and quality performance.

scheygen smith is a simple woman that loves to explore and share things through writing. She loves to share her knowledge to the usrs who care to understand everything about Heat Treating. Go and visit Heat Treatingwebsite to get plenty of more information. Come and visit us at:http://heattreatingzone.com/blog/

Article from articlesbase.com

Latest Freedom Of Religion News

Ambassador for key issue
Religious and tribal differences underlie much of the uncertainty about the future of the revolutions under way across the Mideast.For the United States the issue is particularly troublesome. We have supported the minority Sunni regime governing a large
Read more on The Scranton Times-Tribune

Spirit of bonhomie, peace at Faiz festival
KARACHI, April 17: A festive combination of thought-provoking seminars, art shows, theatre activities, dance performances, music concerts and quite a few extempore colourful happenings made the daylong Jashn-i-Faiz organised by the Citizens for Democracy at the KMC Sports Complex on Sunday an event to remember.
Read more on Dawn