Roof Top Fire Causes N.H. Hospital Evacuation

first_imgHospital CEO Maria Ryan says staff was ready to evacuate the 18 patients, but the fire was in the kitchen section of the hospital and firefighters extinguished the fire before that was needed. Ryan says the fire was declared out at 9 p.m. Ryan says the fire apparently started in a dishwater motor in the kitchen. She says the kitchen is closed for breakfast, but food is being prepared at a nearby nursing home. WOODSVILLE, N.H. – No one was injured in a wind-swept fire on the roof of small New Hampshire hospital. The emergency department at the 25-bed cottage hospital in Woodsville was evacuated after the fire was reported at about 7:30 p.m. Wednesday, but the 18 patients in the hospital were able to stay in their rooms.last_img read more

Top 3 Competitors To Watch For in the WWE Cruiserweight Classic

first_img Payton Vince Payton Vince is either talking about sports or watching sports. He covers sports for Metro Networks and is also a writer for He grew up in Brooklyn Heights,Ohio for most of his life then around senior year of high school moved to Cleveland. A fan of the Cleveland Indians, Cavaliers, and a Pittsburgh Steelers, he graduated from Cuyahoga Heights High School (Class of 2014) and also graduated from the Ohio Center for Broadcasting in 2015. He bowled and played baseball in high school, and is a huge fan of independent wrestling and WWE, and can almost always find him at an independent show. Lastly, Payton is a backstage interviewer for Mega Championship Wrestling in Elyria, and is one of the three on ‘That Sports Show’ which airs daily from 2-4pm on WWE has brought back the Cruiserweight Division…sort of. Mostly everyone in this tournament, outside of Tajiri and Brian Kendrick, are known for competing in the independent wrestling scene around the world. To be in this tournament every competitor had to weigh in at or under 205 pounds. For the die hard WWE fans that do not know much about these guys, here is something that will help. Here are the competitors you should look out for in the Cruiserweight Classic.3.) Tyson DuxDux is from Canada and is weighing in at 193 pounds for the tournament. He was trained by Joe E. Legend, Scott D’Amore, and Terry Taylor. Tyson competes in Pro Wrestling Eclipse (PWE) , Smash Wrestling , and Absolute Intense Wrestling (AIW) to name a few. Tyson Dux will be competing against Zack Sabre Jr. in the First Round of the Cruiserweight Classic. Tyson Dux is known for his Entertainment on the independent scene and you can see an example below. Cedric AlexanderAlexander is from the United States of America and weights in at 200 pounds. He was trained by George South. EVOLVE Wrestling, AAW, and AIW are a few of the promotions Alexander works for.  Cedric is also a former Ring of Honor competitor. Cedric Alexander will be going up against Clement Petiot in the First Round. Cedric is an all around athletic person and is a great person to watch wrestle. Below is an example of what Cedric Alexander brings to the table in the Cruiserweight Classic. Johnny GarganoGargano is also from the United States of America, specifically the Cleveland area, and weighs in at 170 pounds. Johnny was trained by Josh Prohibition and J.T. Lightning. Gargano competes on NXT, Pro Wrestling Guerrilla (PWG) , EVOLVE Wrestling, and at his hometown promotion , AIW. He will be against NXT Tag Team partner, Tommaso Ciampa. Keep an eye on Johnny Gargano because he might just come away as the winner of the WWE Cruiserweight Classic. Mention:Akira TozawaClick the link above to see Akira Tozawa against Johnny Garganocenter_img Related TopicsAIW WrestlingAkira TozawaBrian KendrickCedric AlexanderCruiserweight DivisionEVOLVEIndependent WrestlingJohnny GarganoNXTTajiriTommaso CiampaTyson DuxWWEWWE Cruiserweight ClassicZack Sabre Jr.last_img read more

Today’s Top LP Jobs

first_imgDistrict Asset Protection Manager, JCPenney, (NC) As the District Asset Protection Manager you will lead asset protection activities for your assigned stores in accordance with company policies and procedures, in order to drive sales and profits.  Actively walks the floor and coaches in the moment to enhance each associate’s ability to develop; Frequently conducts developmental conversations with direct reports and maintains notes on observations of strengths and opportunities; Interviews and hires Asset Protection talent for the store; Coaches associates and advises Store/District Leadership Teams when opportunities are noted… Learn moreMarket Investigator – Organized Retail Crime, Uniqlo, (NJ) Responsible to conduct field investigations to identify potential organized retail crime; train store employees on LP policy and procedure and ensure compliance; conduct surveillance at offsite and Uniqlo locations; detect and capture shoplifters according to company standards; Monitor potential employee theft suspicions; partner with LP manager to address concerns… Learn more[text_ad use_post=’2385′]- Sponsor – District Loss Prevention Manager, Kohl’s, (NY) The DLPM develops and implements the loss prevention program for 6 -15 selling locations. The DLPM is responsible for driving results through achievement of goals related to inventory shortage, budget lines, cash variance, and operational compliance. In addition, the DLPM is responsible for the selection and career development of all exempt and non-exempt loss prevention personnel within the assigned locations… Learn moreArea Asset Protection Manager, JCPenney, (FL) As the Area Asset Protection Manager you will lead asset protection activities for your assigned stores in accordance with company policies and procedures, in order to drive sales and profits.  Actively walks the floor and coaches in the moment to enhance each associate’s ability to develop; Frequently conducts developmental conversations with direct reports and maintains notes on observations of strengths and opportunities; Interviews and hires Asset Protection talent for the store; Coaches associates and advises Store/District Leadership Teams when opportunities are noted… Learn more Stay UpdatedGet critical information for loss prevention professionals, security and retail management delivered right to your inbox.  Sign up nowlast_img read more

DTT Closes $80 Million Facility with Capital One and Completes Acquisition of LP Innovations…

first_imgDTT has recently announced the closing of an $80 million debt facility led by Administrative Agent, Capital One and CapitalSource, a division of Pacific Western Bank. The facility will be used primarily for the acquisition of LP Innovations Inc. (LPI), a loss prevention provider to the retail industry and for additional growth capital.“We are very excited to join forces with the LPI team led by Steve May. LPI is a venerable loss prevention company with over 20 years of excellence in the retail industry” said Sam Naficy, CEO and founder of DTT. “The merger makes DTT the first and only company that can provide clients with a full suite of LP solutions across multiple industries, merging standard LP solutions together with leading-edge solutions, including BI Tools, POS integration, video analytics and remote audits.”DTT has grown tremendously since its founding in 1999 through customer referrals, new product launches, and the development of its professional staff. The acquisition of LPI will enable DTT to continue developing data analysis and risk mitigation technology and to maintain its position as a leading provider of managed loss prevention solutions in all of retail.- Sponsor – “At LPI, we are focused on protecting the investments of our clients” said Steven May, president of LPI. “Our solutions are a great fit for DTT’s service offerings, and as a result of this merger, we will now be working together to deliver the value of our combined companies to our customers, helping them grow their businesses and increase their operational efficiency.”John Robuck, managing director and head of security finance at Capital One, said, “We continue to enjoy the long-standing partnership with DTT, and we’re excited to play a role in this significant expansion opportunity for the business.” Stay UpdatedGet critical information for loss prevention professionals, security and retail management delivered right to your inbox.  Sign up nowlast_img read more

Cloud Computing: IT Departments Take on Role of Facilitator

first_imgA report from CompTIA finds that use of the cloud by businesses is increasing.  80 percent of companies are using some form of cloud computing and half of those say that they’ll increase their investment in the cloud by more than 10 percent in 2012.  Despite initial resistance to the cloud, IT managers are now instead enthusiastically embracing it.   85 percent of IT managers said that they feel positive about the benefits of cloud computing.  That’s an increase from 72 percent in 2011.Subscription pricing and easy sign-ups to cloud services have allowed many departments to end-run their IT groups.  But this wild west behavior seems to be getting more under control.  IT is increasingly becoming more of a facilitator for identifying and procuring technology, and the CompTIA report finds that now typically IT groups are are still decision makers or able to provide input on technology purchases before the final decision is made.  IT is still typically involved in creating policy around technology use, particularly in the area of security of company data and use of mobile devices.Seth Robinson, director, technology analysis at CompTIA, said that “What’s significant here is not so much the usage of cloud, that’s the same trend line as before.  But there are some underlying transformations in the way they procure IT solutions and the way they operate with IT in a cloud environment… Internal IT departments also are on the edge of major transformation.  The option for cloud solutions for various parts of the computing stack is opening the doors for IT professionals to perform new tasks, or at least perform old tasks in new ways. It’s also creating new job roles and functions to more tightly integrate IT teams with lines of business.”last_img read more

Missouri ~ Sales and Use Tax: Various Changes to Local Sales Tax Provisions Enacted

first_imgLegislation has been enacted that modifies various provisions relating to local Missouri sales taxes, as discussed below.Zoological sales tax: The legislation provides that a local sales tax approved after August 28, 2017, by voters in St. Louis City or St. Louis County for the purpose of funding zoological activities and zoological facilities must not exceed 0.125%. No county other than St. Louis County and St. Louis City can use such county sales tax revenue for the purpose of funding in whole or in part the construction, operation, or maintenance of any zoological activities, zoological facilities, zoological organizations, the Metropolitan Zoological Park and Museum District, or any zoological board. Also, residents of any county that does not adopt a zoological sales tax may be charged an admission fee for zoological facilities, programs, or events that are not part of the main campus of the St. Louis Zoo. Admission to the main campus will remain free.County sales taxes: The legislation provides that a county must not submit to the voters a proposed sales tax under the County Sales Tax for a period of two years following the date of an election in which it previously submitted a proposed sales tax, regardless of whether the initial proposed sales tax was approved or disapproved by the voters. Also, no county can submit a proposal to the voters that would result in a combined sales tax rate adopted under the County Sales Tax Act in excess of 1%. For any sales tax adopted under the County Sales Tax Act in St. Louis County, 0.375% of such rate must be included in the calculation of the county’s 1% cap.City sales taxes: The legislation provides that no city can submit a proposal to the voters which would result in a combined sales tax rate adopted under the City Sales Tax Act in excess of 2%.Sales tax exemptions: Under current law, the Director of Revenue must not send notice to any taxpayer regarding the Missouri Supreme Court’s decision in IBM Corporation v. Director of Revenue 491 S.W.3d 535 (Mo. banc 2016), relating to sales tax exemptions, prior to August 28, 2017. This act extends that date to August 28, 2018.S.B. 49, Laws 2017, effective August 28, 2017last_img read more

Hardware Assisted Virtualization to Mitigate Security Risks

first_imgIn this podcast Intel’s Malcolm Harkins and HP’s Manny Novoa chat about the latest issues in security technologies, notably the emergence of hardware assisted virtualization.With the emergence of software virtualization technologies, allowing for multiple OS’s to be run on a single system, Manny and Malcom postulate security risks at the software layer. They discuss how hardware assisted virtualization can establish the management of platform controls and protection of keys at the hardware level, reducing the risk of virtualization systems being maliciously compromised.They also discuss coping with zero-day threats and the benefits of automated management of PC fleetslast_img read more

Through the Digital Wormhole: Creating Virtual Value

first_imgHow do you create new value? Is it possible to push your physical products through what I call “the digital wormhole” to create virtual components of value for your products? A look at the evolution of the way people enjoy music suggests that the answer is ‘yes’. Twenty-five years ago, people listened to records on turntables, a very analog and physical process. Then, in the ‘80s and ‘90s, they moved to CDs and CD players—a digital process, but still mostly a physical reality. Now, people listen to online audio with services such as Spotify* that give them access to millions of tracks, allow browsing, social network interaction and offer recommendations based on listening habits. Much of the value that these services provide is created in the digital domain—it’s a virtual value. When creating new products, designers should ask themselves up front: how much of this product’s value will be physical, and how much will be digital?For example, an invisible, conductive ink called T+Ink* that can be read with a capacitive touchscreen, is making it possible to think about linking products to digital content by simply touching the products to a screen. Over time, you could add digital value to physical products just by linking them through that interface.As discussed in my previous blog, making things smart has the potential to add lots of value. The question is—how do you do it? Today, designing and building smart objects is still harder than it needs to be, but it’s going to get exponentially easier and become more and more attractive to designers as computing continues to shrink and drop in price, and as design tools become more sophisticated. One of the ways this will happen is with easy-to-use building blocks such as the Intel® Edison compute module, a computer on a tiny board that has Wi-Fi, Bluetooth and connects to the cloud. Or the button-sized Intel Curie platform1 that makes it easy to add smart wearable capability to garments and other items. These types of platforms enable product designers to start incorporating ‘smart’ tech into their products without having to staff up with a small army of hardware and software engineers.Smart Technology: Retail ApplicationsWhat other types of retail applications might benefit from the use of smart technology? Think about smart infrastructure—store shelves that understand not only what product is being set upon them, but also who is standing in front of them; shelves that  help retailers understand more about shopper behavior, that offer more information to shoppers and that even start to broker the conversation between product manufacturers and shoppers. This type of information exchange will be a boon to manufacturers and retailers, as will the ability to do dynamic pricing at the shelf.Putting smart technology into the physical space of retail has the potential to make an enormous difference. But even more dramatic are the changes likely to result as, in the next five to eight years, computers are able to see, hear and understand more of the world around them. This trend toward closing the gap between the digital and physical worlds has been occurring for twenty-five years or more, but now it’s beginning to yield some very interesting possibilities for retail.Visual recognition technology will free robots to coexist safely among us—a trend that’s already started. No longer trapped in cages because of their inability to see (which makes them hazardous to human safety), customer service and inventory robots are at work in trials at California retail stores.Drone technology, for use in warehouses and in making deliveries, is attracting interest from a number of companies with a desire to smooth operations and deliver products not just the same day, but the next hour.Digital value will also be created in retail via augmented and mixed reality that overlays a digital layer on the physical world. Shoppers will be able to more easily imagine, for example, how a new kitchen will look in their homes or how clothing will look on them using such technology.Technology is advancing in ways that offer enormous opportunities for solving business problems in retail. For further discussion on how it’s being deployed to optimize for specific outcomes, check back in this space in the weeks to come.Steve BrownSenior Industry Advisor, Retail and HospitalityIntel Corporation1 This device has not been authorized as required by the rules of the Federal Communications Commission. This device is not, and may not be, offered for sale or lease, sold or leased, until authorization is obtained.Curie, Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.* Other names and brands may be claimed as the property of others.© 2016 Intel Corporationlast_img read more

Key Lessons from the 2016 Verizon Data Breach Incident Report

first_imgThe annual Data Breach Incident Report (DBIR) is out and reinforcing the value of well-established cybersecurity practices.  The good folks at Verizon Enterprise have once again published one of the most respected annual reports in the security industry, the DBIR.  The report sets itself apart with the author intentionally avoiding unreliable ‘survey’ data and instead striving to truly communicate what is actually happening across the cybersecurity breach landscape.  The perception of security typically differs greatly from reality, so this analysis provides some of the most relevant lessons for the field.Report data is aggregated from real incidents that the company’s professional security services have responded to for external customers.  Additionally, a large number of security partners now also contribute data for the highly respected report.  Although this is not comprehensive across the industry, it does provide a unique and highly-valuable viewpoint, anchored in real incident response data.Much of the findings support long-standing opinions on the greatest cybersecurity weaknesses and best practices.  Which is to say, I found nothing too surprising and it does reinforce the current directions for good advice.Key Report Findings1. Human Weaknesses30% of phishing messages were opened by their intended victim12% of those targets took the next step to open the malicious attachment or web link2. Ransomware Rises39% of crime-ware incidents were ransomware3. Money for Data95% of data breaches were motivated by financial gain4. Attackers Sprint, Defenders Crawl93% of data breaches were compromised in minutes83% of victims took more than a week to detect breaches5. Most of the Risk is from a Few Vulnerabilities 85% of successful traffic was attributed to the top 10 CVE vulnerabilities.  Although difficult to quantify and validate, it’s clear that top vulnerabilities should be prioritizedKey Lessons to Apply1. Train users.  Users with permissions and trust are still the weakest link.  Phishing continues to be highly effective for attackers to leverage poorly trained users to give them access.  2. Protect financially-valuable data from confidentiality, integrity, and availability attacks.  Expect attacks and be prepared to respond and recover.3. Speed up detection capabilities.  Defenders must keep pace with attackers.  When preventative controls fail, it is imperative to quickly detect the exploit and maneuver to minimize overall impact.4. Patch top vulnerabilities in operating systems, applications, and firmware.  Patch quickly or suffer.  It is a race; treat it as such.  Prioritize the work based upon severity ranking Serious vulnerabilities should not languish for months or years!This is just a quick review.  The report contains much more information and insights.I recommend reading the Executive Summary or the full DBIR Report. Interested in more?  Follow me on Twitter (@Matt_Rosenquist) and LinkedIn to hear insights and what is going on in cybersecurity.last_img read more