Category:Lauren Jackson

This is the category for Lauren Jackson, an Australian basketball player.

Refresh this list to see the latest articles.

  • 2 February 2013: Canberra Capitals extinguish the Fire, 76–68
  • 7 December 2012: WNBL’s Sydney Uni Flames decisively beat Canberra Capitals
  • 29 September 2012: Canberra Capitals beat Chinese women’s national B basketball team in pre-season
  • 20 August 2012: Sydney welcomes home the Australian Olympic Team
  • 23 June 2012: Basketball Australia announces final Olympic teams for the Opals and Boomers
  • 21 May 2012: Raw Opals spend week preparing for London Games
  • 16 May 2012: Australian media focuses on Olympic prospects against US for women’s basketball

From Wikinews, the free news source you can write.


File photo of Lauren Jackson in 2012. Image: LauraHale.


Sister projects
  • Commons
  • Wikipedia

Pages in category “Lauren Jackson”

Posted in Uncategorized

2012 Olympics clash with Ramadan

Sunday, October 15, 2006

Muslim groups from across the world are criticising the organisers of the 2012 Olympics in London after it was revealed that the games will take place over Ramadan. The most holy month in the Muslim calendar, which will take place from the 21 July to 20 August in 2012, involves fasting during daylight hours and will affect an estimated 3,000 athletes.

Joanna Manning Cooper, spokesman for the games said: “We did know about it when we submitted our bid and we have always believed that we could find ways to accommodate it.”Nevertheless, this will come as a huge embarrassment for the organisers who have tried to ensure the event involve all of Britain’s ethnic communities.A quarter of the athletes who took part in the 2004 Athens Olympics were from predominantly Muslim countries and the fast will put any athletes involved at a clear disadvantage.

The chairman of the Islamic Human Rights Commission, Massoud Shadjared said: “This is going to disadvantage the athletes and alienate the Asian communities by saying they don’t matter. It’s not only going to affect the participants, it’s going to affect all the people who want to watch the games.”

The president of the National Olympic Committee of Turkey, Togay Bayalti, said: “This will be difficult for Muslim athletes. They don’t have to observe Ramadan if they are doing sport and travelling but they will have to decide whether it is important to them. “It would be nice for the friendship of the Games if they had chosen a different date.”

The games will run from the 27 July to 12 August to coincide with the British Summer holidays. The summer holidays are a six week period running from mid July to early September. During this time, public transportation is generally less crowded and it will be easier to find the 70,000 volunteers needed to keep the games running. The International Olympics Committee has specified that the games must take place between July 15 to August 31. Giselle Davies, IOC spokesperson said, “We give a window to the five bid cities. The host city selects the dates within that window.”

The organisers are working with the Muslim Council of Great Britain to find ways around the problem.

Posted in Uncategorized

Can We Learn From The Baby Boomers?}

Click Here For More Specific Information On:

Can we Learn from the Baby Boomers?

by

Guide-to-Retirement-Plans.com

The baby boomer generation has already turned 60 (at least the oldest of them) and is undoubtedly pondering their upcoming retirement.

Are they ready?

According to a 2006 study conducted by the Center for Retirement Research at Boston University, many are not.

The study shows that median assets in retirement plansincluding 401ks and IRAsare just $60,000 for workers in their 50s. While this is not an average, this figure clearly suggests that quite a few baby boomers might be unprepared to meet their retirement needs.

Most financial planners say that retirees should withdrawal no more than 4% to 5% from their nest egg each year to try and make their money last. At $60,000 this allows for about $3,000 each year in withdrawals (not counting earnings). That isnt even enough for play money.

[youtube]http://www.youtube.com/watch?v=7KYq5xUvm1Y[/youtube]

What Happened to my Social Security and Pension Benefits?

While retirees can claim partial Social Security benefits at age 62, most baby Boomers will have to wait until 66 or 67 before they can claim full benefits, not 65 as it used to be. Yet another bump in the rocky road to retirement.

Of course, there may be many baby boomers that are lucky enough to have a pension benefit waiting for them when they retire. But many more have experienced the disappointment of seeing their employer scrap their defined benefit pension plans in favor of the more common defined contribution style of a Profit Sharing or 401k plan. This move may have cost those relying on this benefit dearly.

Whats a Boomer to Do?

Fortunately, not all is lost. But the obvious needs to be said: If retirement savings is lacking, people will need to work longer than they expected before they decide to hang up the suit and tie.

Heres an interesting fact from the same report by the Center for Retirement Research: For every year a worker delays retirement and continues to save and invest, monthly benefits increase by 7 – 8%.

Delaying retirement for 2 years? Go ahead and tack on an additional 15% in monthly benefits.

What about 4 years? Watch your potential benefits increase by one-third! You get the idea.

Looking Ahead

There is simply no replacement for disciplined saving and investing, and its never too late to start. If youre young, start nowyoull be way ahead of the game.

If youre not as young and you feel youre behind, take heart. Revamp your budget to remove frivolous items and focus on packing away as much as possible into your retirement plans. Its a good idea to consult with a fee-based financial planner to discuss your situation. They will create investment programs tailored to your needs and will help put you on the right track.

Many baby boomers will have to modify their retirement goals and expectations to bring them down to more realistic levels. The younger generations should use this opportunity to learn and to take the time to consider where their own retirement is headed.

www.Guide-to-Retirement-Plans.com aims to arm retirement plan investors with the knowledge needed to understand retirement plans, pick the ones suitable for them, and save and invest to ensure a fulfilling retirement.

Article Source:

Can we Learn from the Baby Boomers?}

Three terrorists gunned down by police in India

Thursday, June 1, 2006An attack against the Rashtriya Swayamsevak Sangh headquarters in Nagpur was thwarted by the Maharashtra police early today morning. The militants were driving a white Ambassador car and were armed with AK-47s. They were confronted and killed by security forces as they tried to break through the security cordon surrounding the building.

Nagpur Police Commissioner S.P.S Yadav said that the car was chased by police after it broke through the first barrier about 200 metres away from the headquarters. When confronted, the militants opened fire and were killed after a five-minute shootout. Yadav also said that two policemen had been injured in the incident, one of whose condition was serious. The identities of the three men is yet to be established. A diary was also recovered from the terrorists.

A high level security alert has been declared in Nagpur and other sensitive areas in the vicinity. R.S.S chief Ram Madhav urged the government to take more steps to safeguard the offices of the organisation. This is the second time the police has prevented a major terror attack from taking place in Maharashtra. Last month the Anti-Terrorist Squad had recovered 30 kilograms of RDX, 17 AK-47 rifles and 50 hand-grenades from a jeep in Aurangabad. Eleven suspected militants were also arrested.

Posted in Uncategorized

N10 006 Free Demo Questions And Answers}

Submitted by: Kevin Renfro

Version: 9.0

Question: 1

A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?

A. Add a router and enable OSPF.

B. Add a layer 3 switch and create a VLAN.

C. Add a bridge between two switches.

D. Add a firewall and implement proper ACL.

Answer: B

Explanation:

We can limit the amount of broadcast traffic on a switched network by dividing the computers into logical network segments called VLANs. A virtual local area network (VLAN) is a logical group of computers that appear to be on the same LAN even ifthey are on separate IP subnets. These logical subnets are configured in the network switches. Each VLAN is a broadcast domain meaning that only computers within the same VLAN will receive broadcast traffic.

To allow different segments (VLAN) to communicate with each other, a router is required to establish a connection between the systems. We can use a network router to route between the VLANs or we can use a Layer 3 switch. Unlike layer 2 switches that can only read the contents of the data-link layer protocol header inthe packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.

Question: 2

The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service?

A. Layer 3 switch

B. Proxy serve

C. Layer 2 switch

D. Smart hu

Answer: A

Explanation:

The question states that the traffic being transported is a mixture of multicast and unicast signals. There are three basic types of network transmissions: broadcasts, which are packets transmitted to every node on the network; unicasts, which are packets transmitted to just one node; and multicasts, which are packetstransmitted to a group of nodes. Multicast is a layer 3 feature of IPv4 & IPv6. Therefore, we would need a layer 3 switch (or a router) to reroute the traffic. Unlike layer 2 switches that can only read the contents of the data-link layer protocol header in the packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.

Question: 3

Which of the following network devices use ACLs to prevent unauthorized access into company systems?

A. IDS

B. Firewall

C. Content filte

D. Load balance

Answer: B

Explanation:

A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. Firewalls use ACLs (access control lists) to determine which traffic is allowed through the firewall. All traffic entering or leaving the intranet passes through the firewall, which examines each message and blocks or allows the message depending on rules specified in the ACL. The rules in the ACL specify which combinations of source IP address, destination address in IP port numbers are allowed.

Question: 4

[youtube]http://www.youtube.com/watch?v=dToVgCGLxho[/youtube]

Which of the following is used to define how much bandwidth can be used by various protocols on the network?

A. Traffic shaping

B. High availability

C. Load balancing

D. Fault tolerance

Answer: A

Explanation:

If a network connection becomes saturated to the point where there is a significant level of contention, network latency can rise substantially. Traffic shaping is used to control the bandwidth used by network traffic. In a corporate environment, business-related traffic may be given priority over other traffic. Traffic can be prioritized based on the ports used by the application sending the traffic. Delayed traffic is stored in a buffer until the higher priority traffic has been sent.

Question: 5

Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).

A. OSPF

B. VTP trunking

C. Virtual PBX

D. RADIUS

E. 802.1x

Answer: DE

Explanation: D: A RADIUS (Remote Authentication Dial-in User Service) server is a server with a database of user accountsand passwords used as a central authentication database for users requiring network access. RADIUS servers are commonly used by ISPs to authenticate their customers Internet connections. Remote users connect to one or more Remote Access Servers. The remote access servers then forward the authentication requests to the central RADIUS server.

E: 802.1X is an IEEE Standard for Port-based Network Access Control (PNAC). It provides an authentication mechanism to devices wishing to attach to a network. 802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client that wishes to attach to the network. The authenticator is a network device, such as an Ethernet switch, wireless access point or in this case, a remote access server and the authentication server isthe RADIUS server.

Question: 6

Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?

A. Multifactor authentication

B. ISAKMP

C. TACACS+

D. Network access control

Answer: C

Explanation:

TACACS+ (Terminal Access Controller Access-Control System Plus) is a protocol that handles authentication, authorization, and accounting (AAA) services. Similar to RADIUS, TACACS+ is a centralized authentication solution used to provide access to network resources. TACACS+ separates the authentication, authorization, and accounting services enabling you to host each service on a separate server if required.

Question: 7

A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured?

A. Leases

B. Helper addresses

C. Scopes

D. Reservations

Answer: D

Explanation:

A reservation is used in DHCP to ensure that a computer always receives the same IP address. To create a reservation, you need to know the hardware MAC address of the network interface card that should receive the IP address.For example, if Server1 has MAC address of 00:A1:FB:12:45:4C and that computer should always get

192.168.0.7 as its IP address, you can map the MAC address of Server1 with the IP address to configure reservation.

Question: 8

Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IPaddresses, to be able to access the Internet and internal company servers? (Select THREE).

A. Default gateway

B. Subnet mask

C. Reservations

D. TFTP serve

E. Lease expiration time of 1 day

F. DNS servers

G. Bootp

Answer: ABF

Explanation:

The question states that the client computers need to access the Internet as well as internal company servers. To access the Internet, the client computers need to be configured with an IP address with a subnet mask (answer B) and the address of the router that connects the company network to the Internet. This is known as the default gateway (answer A).To be able to resolve web page URLs to web server IP addresses, the client computers need to be configured with the address of a DNS server (answer F).

Question: 9

A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address?

A. Configure NAT on the firewall

B. Implement a split horizon DNS

C. Place the server in the DMZ

D. Adjust the proper internal ACL

Answer: B

Explanation:

Split horizon DNS (also known as Split Brain DNS) is a mechanism for DNS servers to supply different DNS query results depending on the source of the request. This can be done by hardware-based separation but is most commonly done in software. In this question, we want external users to be able to access the website by using a public IP address. To do this, we would have an external facing DNS server hosting a DNS zone for the website domain. For the internal users, we would have an internal facing DNS server hosting a DNS zone for the website domain. The externalDNS zone will resolve the website URL to an external public IP address. The internal DNS server will resolve the website URL to an internal private IP address.

Question: 10

When configuring a new server, a technician requests that an MX record be created in DNS for the new server, but the record was not entered properly. Which of the following was MOST likely installed that required an MX record to function properly?

A. Load balance

B. FTP serve

C. Firewall DMZ

D. Mail serve

Answer: D

Explanation:

A mail exchanger record (MX record) is a DNS record used by email servers to determine the name of the email server responsible for accepting email for the recipients domain. For example a user sends an email to recipient@somedomain.com. The sending users email server will query the somedomain.com DNS zone for an MX record for the domain. The MX record will specify the hostname ofthe email server responsible for accepting email for the somedomain.com domain, for example, mailserver.somedomain.com. The sending email server will then perform a second DNS query to resolve mailserver.somedomain.com to an IP address. The sending mail server will then forward the email to the destination mail server.

Question: 11

Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?

A. BGP

B. OSPF

C. IS-IS

D. MPLS

Answer: D

Explanation:

In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself.MPLS works by prefixing packets with an MPLS header, containing one or more labels. An MPLS router that performs routing based only on the label is called a label switch router (LSR) or transit router. This is a type of router located in the middle of a MPLS network. It is responsible for switching the labelsused to route packets. When an LSR receives a packet, it uses the label included in the packet header as an index to determine the next hop on the label-switched path (LSP) and a corresponding label for the packet from a lookup table. The old label is then removed from the header and replaced with the new label before the packet is routed forward. A label edge router (LER) is a router that operates at the edge of an MPLS network and acts as the entry and exit points for the network. LERs respectively, add an MPLS label onto an incoming packet and remove it offthe outgoing packet.When forwarding IP datagrams into the MPLS domain, an LER uses routing information to determine appropriate labels to be affixed, labels the packet accordingly, and then forwards the labelled packets into the MPLS domain. Likewise, upon receiving a labelled packet which is destined to exit the MPLS domain, the LER strips off the label and forwards the resulting IP packet using normal IP forwarding rules.

Question: 12

Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?

A. Multilayer switch

B. Access point

C. Analog modem

D. DOCSIS modem

Answer: C

Explanation:

Before ADSL broadband connections became the standard for Internet connections, computers used analog modems to connect to the Internet. By todays standards, analog modems are very slow typically offering a maximum bandwidth of 56Kbps. An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computer to an analog signal to be transmitted over a standard (POTS) phone line. The modem then converts (demodulates) the incoming analog signal to digital data to be used by the computer. An analog modem uses an RJ-11 connector to connect to a phone line (POTS) in the same way a phone does.

About the Author: Test Information:Total Questions: 323Test Number: N10-006Vendor Name: CompTIACert Name: CompTIA Network+Test Name: CompTIA Network+ Certification ExamOfficial Site:

examcertify.co.uk

For More Details:

examcertify.co.uk/N10-006.html

Get20% Immediate Discount on Full Training MaterialDiscount Coupon Code: 79741B6012

Source:

isnare.com

Permanent Link:

isnare.com/?aid=1952402&ca=Computers+and+Technology}

Wikinews interviews specialists on South Korea military parade

Sunday, October 6, 2013

On Tuesday, South Korea staged a huge military parade to mark its armed forces’ 65th anniversary in a display of long-range missiles considered a direct threat to North Korea. 11,000 troops and 190 different weapons systems were on display in the parade. Wikinews interviewed several specialists about the parade’s possible significance.

Posted in Uncategorized

Florida man charged with stealing Wi-Fi

Update since publication

This article mentions that Wi-Fi stands for “Wireless Fidelity”, although this is disputed.

Thursday, July 7, 2005

A Florida man is being charged with 3rd degree felony for logging into a private Wi-Fi (Wireless Fidelity) Internet access point without permission. Benjamin Smith III, 41, is set for a pre-trial hearing this month in the first case of its kind in the United States.

This kind of activity occurs frequently, but often goes undetected by the owners of these wireless access points (WAPs). Unauthorized users range from casual Web browsers, to users sending e-mails, to users involved in pornography or even illegal endeavours.

According to Richard Dinon, owner of the WAP Smith allegedly broke into, Smith was using a laptop in an automobile while parked outside Dinon’s residence.

There are many steps an owner of one of these access points can take to secure them from outside users. Dinon reportedly knew how to take these steps, but had not bothered because his “neighbors are older.”

Posted in Uncategorized

2008 SecuTech Expo starts in Taipei, Taiwan for grasping global security industry

Wednesday, April 16, 2008

The 11th-annual SecuTech Expo & Asian Security Week, organized by New Era International Inc., starts with topics from security devices, information security, and fire & safety on April 16 to 18. 750 companies form 20 nations participated in this fair and more then hundred security experts grasped for the safety & security industry in Global Digital Surveillance Forum, Asia-pacific Information Security Forum, Asian Manufacturer Club and Annual Summit, and Annual Summit for Industrial and Environmental Safety in Taiwan.

In the Industrial Safety and Security Device areas, products related to CCTV and digital surveillance was progressively respected by industrial executives, and before the main show of the “SecuTech Award” announcements, most of participants manufactured security products in conjunction with IT security applications. By the way of the Asia-pacific Information Security Forum, several experts from IT industry did forecasts and analyzed crisis on global IT security.

New Era International Inc., the show organizer, scheduled to promote the “SecuTech” brand to Vietnam by holding the “SechTech Vietnem” first time at Vietnam Exhibition Fair Centre (VEFAC) in Hanoi, Vietnam. And also, this fair was confirmed to move to the TWTC Nangang for more spaces to showcase the security industry worldwide including Taiwan.

Posted in Uncategorized

Two killed, two seriously injured after boulder collapses onto house in Stein an der Traun, Germany

Tuesday, January 26, 2010

I have never seen anything like this.

Two people were killed and two others were seriously injured yesterday when a boulder collapsed onto a house in the German town of Stein an der Traun, south-east of Munich. A family of four were said to have been watching television together in the lounge when a large lump of rock, about 50 tons, broke off from a 50 foot cliff above the house.

The boulder fell from about 15 metres above the residence and landed on top of the house, crushing it. The cause of the rock fall is unknown, but police have said that there had been no prior signs that the cliff was unstable.

The accident, which happened at approximately 1940 local time, killed a 45-year-old father and his 18-year-old daughter. A 40-year-old mother and her 16-year-old son were seriously injured and were taken to hospital for treatment, after a rescue operation that lasted into the early hours of the following morning. The task involved up to 250 rescue personnel, some with sniffer dogs.

An official from the international humanitarian movement the Red Cross said “[w]e made contact with them early on and kept talking with them through the night as we pulled away at the debris.” Joachim Herrmann, the Bavarian Interior Minister, spoke of his thoughts about the incident. “I have never seen anything like this,” he was quoted as saying. “This is an extremely sad and terrible day.”

Posted in Uncategorized

UK broadcaster Setanta enters administration

Tuesday, June 23, 2009

The UK operations of Setanta Sports have been placed into administration. Financial firm Deloitte Touche Tohmatsu confirmed the division would be liquidated.

The sports broadcaster, which employs 420 people in Ireland and the UK, entered administration after plans to raise fresh capital through the Russian-American businessman Leonard Blavatnik failed.

With effect from today, the company is to cease accepting payments from television customers who had subscribed to its broadcasting services, and 200 employees in the United Kingdom are to be made redundant. Administrators will attempt to find a buyer for the Irish and international arms of the company.

The administrators at Deloitte are Neville Kahn, Lee Manning, and Nick Edwards. The specific companies in administration are Setanta Sport Ltd and Setanta Transmissions (UK) Ltd. Setanta Ireland is not under administration.

Setanta’s UK sports channels, Setanta Sports 1 & 2, have ceased transmission in the UK, but are continuing transmission in Ireland. Other UK channels that have gone off-air include Setanta Golf and Setanta Sports News.

Racing UK, which was bundled by satellite and cable television operators with Setanta channels, is not owned by Setanta and will continue transmission. Customers who subscribed to the channel via Setanta will be offered the option of subscribing to the channel directly.

64 of the people facing redundancy work for ITN, which had contracted with Setanta to produce Setanta Sports News.

The rights that Setanta had to broadcast football matches to subscribers are to revert to their rights holders. The rights to broadcast 46 Premier League football matches for the next football season, and 23 matches for the three following seasons, have already reverted, and were sold to United States broadcaster ESPN for £260 million yesterday.

Because of UK and European Union monopoly and competition laws, broadcaster British Sky Broadcasting is not permitted to bid for the broadcasting rights that Setanta had.

Posted in Uncategorized