Monday, February 27, 2012

IA Corporation Executes $2.5 Million Contract for Digital Archive and Suite of CheckVision(R) Products for a Top 50 Bank.

New Services Will Keep $30B Bank in Forefront of Technology by Offering

Customers Internet Access to Statements and Electronic Delivery

EMERYVILLE, Calif., July 20 /PRNewswire/ -- IA Corporation (Nasdaq: IACPC), a leading provider of software for financial services companies leveraging the digital document, announced today the execution of a $2.5 million contract for a full CheckVision software suite and professional services for a $30 billion top tier US bank. This contract provides IA the opportunity to recognize revenue over several quarters beginning in the second quarter.

With CheckVision Archive as the cornerstone of its digital document repository, the bank will offer new Internet-based services to enhance the customer experience and improve operational efficiency. By offering secure Internet access to check images and check data and delivery of customer statements, customers realize improved service, response time and personalization. By securely accessing exact images of customer statements and checks online, bank representatives can more efficiently and effectively respond to customer inquiries, improving the customer experience and reducing unnecessary research, retrieval and delivery of paper documents.

With the implementation of IA's CheckVision Internet Inquiry(TM), the technology-savvy bank will continue its lead in providing its customers with innovative services and alternate means of electronic delivery.

"Because this top 50 bank has the reputation of being in the forefront of technology banking systems and alternate forms of delivery, IA is extremely proud to be chosen as the provider of this innovative new system," said Kevin Moran, president, chairman and chief executive of IA Corp. "By implementing a full suite of CheckVision products to complement the archive with electronic delivery, the bank will realize its return on investment through creation of new products and services, reduction in customer response time and improved customer service and operational efficiency."

The bank plans to implement a unique communications link to index and share image items among its headquarters and three remote processing centers located across central and eastern US.

Because CheckVision Archive can store on-us and transit checks images, as well as other types of transaction information, such as credit and cash tickets, remittance or loan documents, inquiries can be processed immediately.

With the addition of IA's Internet application, remote bank sites and customers can access images and other data via the Internet. Once the suite of products is implemented, bank customers will have a variety of new services to choose from to improve their daily operations.

IA's CheckVision Archive can store over a billion checks and other MICR items, which can be automatically migrated from short- to long-term electronic storage media for quick retrieval. This saves the bank days of research time, resulting in real-time customer response. Customers can have immediate access to check images from their PC, to provide input direct to the bank on exception items or to make pay or no pay decisions.

IA Corporation

IA Corporation, headquartered in Emeryville, Calif., develops and delivers software products that allow leading edge financial services organizations to integrate the power of the Internet with their network document repositories to provide the ultimate in customer service, one-to-one marketing and business intelligence.

Customers using IA's CheckVision products include leading organizations such as Comerica Bank, Harris Bank, Sanwa Bank California, LTD., SouthTrust Bank, UMB Bank, NA and Wachovia. IA is located at 1900 Powell St., Emeryville, CA 94608-1840, U.S. Telephone: 510-450-7000. Fax: 510-450-7099. Email: info@ia-us.com; Website: www.iacorporation.com.

This press release contains forward looking statements, including but not limited to statements regarding anticipated software delivery, customer usage, acceptance and the features, functions, storage capabilities and benefits of the Company's CheckVision products. The actual results of the use of the Company's software products as described in this press release may differ materially from anticipated results based on a number of factors including the Company's ability to successfully deliver and install its CheckVision products; the ability of the CheckVision products to achieve anticipated functionality and benefits; the ability of the bank to enhance the customer experience and improve operational efficiency and realize its return on investment as well as other risk factors as described in for IA's Form 10-K for the year ended December 31, 1998, and the company's 10-Q for the quarter ended March 30, 1999.

Sunday, February 26, 2012

Q & A; Readers offer cures for home Net outages.(BUSINESS)

Byline: STEVE ALEXANDER; STAFF WRITER

If you've ever had your home network lose Internet connectivity without warning, you've got plenty of company.

Several readers responded to last week's column about a California man who periodically lost his home Internet connection, but regained it after unplugging, then powering-up his home network's Netgear router.

Some readers had different ideas than I did. I suggested that he ask his Internet service provider if his router and Internet modem were compatible with the provider's network. I also said the maker of Netgear routers recommends eliminating firewall software on home PCs and relying on the router's firewall -- a risky strategy, according to security experts.

Frank Bulk of Sioux Center, Iowa, brings a technical perspective as the manager of the Internet help desk for Iowa phone company Premier Communications.

"The more likely issue is a bad router, a bad power supply for that router or a [design] bug in that router," Bulk said. "Very rarely is it the cable or DSL modem."

The easiest and least expensive solution is to upgrade the router's "firmware," a bit of computer code you can download from the manufacturer's website, he said. If that doesn't work, adjust the router's settings back to their "default " position and try reinstalling the router on your network. If neither solution works, you probably need a new router or a new router power supply -- but most likely the former.

"Sometimes a faulty power supply results in an intermittent [Internet outage] issue. But it's quite rare, about one in 500 in our experience," Bulk said.

Todd Young of Inver Grove Heights says the fix for a Netgear router can be as simple as restarting it the right way.

"Hold down the reset button for a total of one minute. For the first 20 seconds, leave the power cable plugged into the router. For the next 20 seconds, unplug the power cable. For the last 20 seconds, plug in the power cable again," Young said. "I have personally used this to fix a Netgear Wi-Fi router, and it has been working for two years now with no issues."

John Mares ofDassel, Minn., points out another potential cause of Internet connection failures. Wi-Fi routers share the radio spectrum with some types of cordless phones. By that he means not cellphones, which use a much different part of the spectrum, but wired home phones that have wireless handsets. These cordless phones should be kept at least 6 feet from a Wi-Fi router, he said.

For more information, see a PC Magazine article on solving wireless router connection problems at tinyurl.com/3zvv9y8.

E-mail tech questions to steve.j.alexander @gmail.com, or write to Tech QA, 425 Portland Av. S., Minneapolis, MN 55488. Include name, city and telephone number.

Film adaptation of television show should be banned by the authorities.

Provided by 7DAYS.ae

For the good of the majority, we call on you, the authorities, to do the correct thing and ban the new 'S*x And The City' film that is due for cinematic release in a couple of weeks time. On what basis? The content is quite simply inappropriate for the region.

The programme on which the film is based (and one must assume that the two will not be dissimilar) is one that promotes immoral behaviours in the vein of casual relationships, inappropriate fashionistas and disturbingly immoral stereotypes. Whilst this may be representative of a selection of Manhattanites, how much does this matter to the rest of the world? I would lean to the side of none. Dubai heralds its own stereotypes in the shape of a Jumeirah Jane, a friendly stewardess or an opulent pilot who would fit perfectly alongside many of the programme's characters. On this basis, to think what sway a feature length "movie" promoting further materialism and insecurity would have on the "glamorous" expat population of Dubai is, frankly, unnerving.

Is the programme / film merely entertainment or does it smack of product-placing producers exemplifying Gladwell's Tipping Point to the tune of designer handbags, shoes and part-time boyfriends? Does Dubai really need such mindless promotion? A moral question does need to be asked.

Wilted Rose

Dubai

[c] 2007 Al Sidra Media LLC

Provided by Syndigate.info an Albawaba.com company

SENATE FLOOR STATEMENT: TERRORISTS ACTIVELY LOOKING TO EXPLOIT GAPS IN U.S. GUN LAWS.

WASHINGTON -- The following information was released by Michigan Senator Carl M. Levin:

Mr. President, I have long sought to bring attention to the dangerous gaps in U.S. gun laws, hoping the exposure would lead to the passage of commonsense firearm legislation. To those of us who feel that Congress can and should play a role in protecting American neighborhoods from the scourge of gun violence, enacting laws to ensure firearms stay out of the hands of dangerous people seems like a no-brainer. Unfortunately, the National Rifle Association, despite broad support for sensible gun safety laws among Americans across the political spectrum, has successfully blocked much-needed legislative changes.

Recently a startling new voice joined the discussion highlighting the weaknesses in our gun laws, most notably how we administer firearm background checks. Consider the following quote describing the so-called gun show loophole: "America is absolutely awash with easily obtainable firearms. You can go down to a gun show at the local convention center and come away with a fully automatic assault rifle without a background check and, most likely, without having to show an identification card."

While this quote does not break any new ground regarding the dangers of the gun show loophole, it is noteworthy because of the person who said it. Mr. President, these were not the words of a Member of Congress, advocating for legislation, nor were they the words of a spokesperson of groups like Mayors Against Illegal Guns or the Brady Campaign. This quote is taken from an Internet video message recorded by Adam Gadahn, an American-born, confirmed Al-Qaeda operative.

In the video, Gadahn speaks to Al-Qaeda followers and sympathizers, describing the ease with which a person can purchase a firearm from a private seller without a background check, often with no questions asked. In fact, this video is not merely a description of the loopholes in U.S. gun laws, it is an exhortation to would-be terrorists to exploit these loopholes and kill innocent Americans. To wit, the video ends with Gadahn asking his viewers, "What are you waiting for?"

This video is a chilling reminder that dangerous loopholes exist in U.S. gun laws, weaknesses that terrorists are actively trying to exploit. While Gadahn is not entirely accurateua person cannot purchase a "fully automatic assault" rifle at a gun show without government knowledgeuhe correctly describes just how simple it is for dangerous individuals to acquire deadly weapons in the United States, including semi-automatic assault rifles.

I urge my colleagues to take up and pass two gun safety bills introduced by Senator Frank Lautenberg (D-NJ): the Gun Show Background Check Act (S.35), which would close the loophole that makes it easy for criminals, terrorists and other prohibited buyers to evade background checks and buy guns from private citizens at gun shows; and the Denying Firearms and Explosives to Dangerous Terrorists Act (S.34), which would close the loophole in federal law that hinders the ability of law enforcement to keep firearms out of the hands of terrorists by authorizing the attorney general to deny the sale of a firearm when a background check reveals that the prospective purchaser is a known or suspected terrorist.

Congressional action should not require such stark evidence that Al Qaeda and like-minded criminals are trying to use weak U.S. gun laws to carry out terrorist attacks against Americans. But the evidenceuclear, explicit and terrifyinguis here nonetheless. The time to act is long overdue.

Mr. President, I have long sought to bring attention to the dangerous gaps in U.S. gun laws, hoping the exposure would lead to the passage of commonsense firearm legislation. To those of us who feel that Congress can and should play a role in protecting American neighborhoods from the scourge of gun violence, enacting laws to ensure firearms stay out of the hands of dangerous people seems like a no-brainer. Unfortunately, the National Rifle Association, despite broad support for sensible gun safety laws among Americans across the political spectrum, has successfully blocked much-needed legislative changes.

Recently a startling new voice joined the discussion highlighting the weaknesses in our gun laws, most notably how we administer firearm background checks. Consider the following quote describing the so-called gun show loophole: "America is absolutely awash with easily obtainable firearms. You can go down to a gun show at the local convention center and come away with a fully automatic assault rifle without a background check and, most likely, without having to show an identification card."

While this quote does not break any new ground regarding the dangers of the gun show loophole, it is noteworthy because of the person who said it. Mr. President, these were not the words of a Member of Congress, advocating for legislation, nor were they the words of a spokesperson of groups like Mayors Against Illegal Guns or the Brady Campaign. This quote is taken from an Internet video message recorded by Adam Gadahn, an American-born, confirmed Al-Qaeda operative.

In the video, Gadahn speaks to Al-Qaeda followers and sympathizers, describing the ease with which a person can purchase a firearm from a private seller without a background check, often with no questions asked. In fact, this video is not merely a description of the loopholes in U.S. gun laws, it is an exhortation to would-be terrorists to exploit these loopholes and kill innocent Americans. To wit, the video ends with Gadahn asking his viewers, "What are you waiting for?"

This video is a chilling reminder that dangerous loopholes exist in U.S. gun laws, weaknesses that terrorists are actively trying to exploit. While Gadahn is not entirely accurateua person cannot purchase a "fully automatic assault" rifle at a gun show without government knowledgeuhe correctly describes just how simple it is for dangerous individuals to acquire deadly weapons in the United States, including semi-automatic assault rifles.

I urge my colleagues to take up and pass two gun safety bills introduced by Senator Frank Lautenberg (D-NJ): the Gun Show Background Check Act (S.35), which would close the loophole that makes it easy for criminals, terrorists and other prohibited buyers to evade background checks and buy guns from private citizens at gun shows; and the Denying Firearms and Explosives to Dangerous Terrorists Act (S.34), which would close the loophole in federal law that hinders the ability of law enforcement to keep firearms out of the hands of terrorists by authorizing the attorney general to deny the sale of a firearm when a background check reveals that the prospective purchaser is a known or suspected terrorist.

Congressional action should not require such stark evidence that Al Qaeda and like-minded criminals are trying to use weak U.S. gun laws to carry out terrorist attacks against Americans. But the evidenceuclear, explicit and terrifyinguis here nonetheless. The time to act is long overdue.

New Findings from E. Mert and Co-Authors Describe Advances in Neurocomputing.

"Engineering design has great importance in the cost and safety of engineering structures. Rock mass rating (RMR) system has become a reliable and widespread pre-design system for its ease of use and variety in engineering applications such as tunnels, foundations, and slopes," investigators in Kocaeli, Turkey report.

"In RMR system, six parameters are employed in classifying a rock mass: uniaxial compressive strength of intact rock material (UCS), rock quality designation (RQD), spacing of discontinuities (SD), condition of discontinuities (CD), condition of groundwater (CG), and orientation of discontinuities (OD). The ratings of the first three parameters UCS, RQD, and SD are determined via graphic readings where the last three parameters CD, CG, and OD are estimated by the tables that are composed of interval valued linguistic expressions. Because of these linguistic expresions, the estimated rating values of the last three become fuzzy especially when the related conditions are close to border of any two classes. In such cases, these fuzzy situations could lead up incorrect rock class estimations. In this study, an empirical database based on the linguistic expressions for CD, CG, and OD is developed for training Artificial Neural Network (ANN) classifiers. The results obtained from graphical readings and ANN classifiers are unified in a simulation model (USM). The data obtained from five different tunnels, which were excavated for derivation purpose, are used to evaluate classification results of conventional method and proposed model," wrote E. Mert and colleagues.

The researchers concluded: "Finally, it is noted that more accurate and realistic ratings are reached by means of proposed model."

Mert and colleagues published their study in Neural Computing & Applications (An assessment of total RMR classification system using unified simulation model based on artificial neural networks. Neural Computing & Applications, 2011;20(4):603-610).

For additional information, contact E. Mert, Kocaeli University, Hereke Omer Ismet Uzunyol Vocat School, Hereke Campus, TR-41800 Kocaeli, TURKEY.

The publisher of the journal Neural Computing & Applications can be contacted at: Springer, 233 Spring St., New York, NY 10013, USA.

Keywords: City:Kocaeli, Country:Turkey, Region:Eurasia, Artificial Neural Networks, Emerging Technologies, Engineering, Machine Learning, Neural Computing, Neurocomputing

This article was prepared by Internet Networks & Communications editors from staff and other reports. Copyright 2011, Internet Networks & Communications via VerticalNews.com.

Research from Indian Institute of Technology Broadens Understanding of Wireless Communications.

"Key revocation involves secure and efficient managing of the information about compromised keys. Spreading the information of revoked keys to the receivers of the key is a challenging task in public key infrastructure (PKI)," scientists writing in the journal Wireless Communications & Mobile Computing report.

"PKI is more suitable for wired Internet infrastructure and lacks any tailor-made protocols for extension over an ad hoc network. The paper presents a Mobile Ad hoc Key Revocation Server (MAKeRS) scheme which proposes to improve the performance and reliability of the system. Simulation shows that the concept presented in the paper is more reliable, faster, and scalable than the existing usage of PKI over ad hoc networks. It proposes auto-creation of zone of network availability (ZoNA) by each MAKeRS, which holds the revocation list and is the best service provider in its zone. A node automatically updates the identity of the key revocation server when it enters a new ZoNA. Each node maintains a list of identities of the key revocation servers sorted in order of their communication overhead. This list is regularly updated based on the broadcast from the servers and also gets modified based on the mobility of nodes and servers. The various scenarios of mobility of nodes and servers are considered and the scheme is designed to suit such scenarios in an optimum way. It reduces the time to gain information about the revocation list and ensures availability and, thus, improvement of the system as a whole. Hence, the proposed system results in scalable, reliable, and faster PKI infrastructure and will be attractive for the mobile ad hoc network (MANET) users who frequently connect to the Internet for secured transactions. We discuss the architecture as well as the performance of our scheme compared to the popular existing scheme. However, our scheme does not call for the entire change in PKI, but is compatible with the existing scheme," wrote S. Misra and colleagues, Indian Institute of Technology.

The researchers concluded: "Our simulations show that the proposed scheme is better for key revocation."

Misra and colleagues published their study in Wireless Communications & Mobile Computing (Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks. Wireless Communications & Mobile Computing, 2011;11(2 Sp. Iss.):146-162).

Additional information can be obtained by contacting S. Misra, Indian Institute Technology, School Informat Technology, Kharagpur 721302, W Bengal, INDIA.

The publisher of the journal Wireless Communications & Mobile Computing can be contacted at: Wiley-Blackwell, Commerce Place, 350 Main St., Malden 02148, MA, USA.

Keywords: City:Kharagpur, Country:India, Region:Asia, Electronics, Wireless Communication, Wireless Communications, Wireless Technology.

This article was prepared by Electronics Newsweekly editors from staff and other reports. Copyright 2011, Electronics Newsweekly via VerticalNews.com.

Saturday, February 25, 2012

Actor X hit by internet abuse mail; SCANDAL.(News)

Byline: RYAN PARRY

THE leading actor granted a gagging order over claims he slept with Wayne Rooney's hooker has been hounded after his identity leaked out on the internet.

The married star, who allegedly had sex with prostitute Helen Wood, 23, received a string of abusive messages after his name emerged on chat rooms.

Now the furious actor has blocked internet users from being able to message or contact him.

The cyber-slating provides yet more evidence of the difficulty in keeping a lid on the names of more than 30 stars who have successfully sought gagging orders.

Described as a father and world famous celebrity, the actor has appeared in films and on TV.

Flame-haired Wood and her pal Jennifer Thompson romped with Rooney at a Manchester hotel in 2009 while the footballer's wife Coleen was five months pregnant with his son Kai.

CAPTION(S):

ROMP Hooker Helen Wood