Web or Blog

Tuesday, December 30, 2008

Monsters, Aliens And The Shift to 'Tru' 3-D

I had a rare opportunity to get a DreamWorks studio tour the other day, learning all about the 3-D and animation process when making a film like Monsters Vs. Aliens, which is set for a March opening. A couple of us also got to screen large portions of the movie.

I wish I could divulge more of the plot and humor in the film - it’s classic DreamWorks where kids will be enamored and laugh and us older folks will catch the ‘adult’ humor and one-liners to keep everyone entertained. There are trailers and more info here .

What struck me is the whole move to a new kind of 3-D film-making, which is a pre-cursor to a future someday where games, TVs, Internet surfing - everything will be in 3-D. When DreamWorks says they have a whole new and outstanding 3-D viewing experience, they’re not kidding. Pardon the pun, but you have to see it to believe it. Monsters will be a totally immersive 3-D experience. It’s NOT a gimmick like the old 3-D movies, where an occasional ball or laser beam or knife (or axe, Jason) shoots out from the screen. Nor is it a 2-D movie that is then retrofitted into 3-D, like some studios do today — it’s soup to nuts, integrated 3-D production.

You really feel like you’re sitting at the table with the characters, or seeing dust or water or fireballs flying in the air during the action scenes, among many other examples. Intel along with DreamWorks have a brand for this experience, ‘InTru3D.’

On top of that, the yearly advances in animation design and special effects are amazing. Viewers can see sweat beads from a nervous character, even the shape of teeth inside of mouths, not to mention incredible water, fire and environmental effects. Wait til you see the scenes in San Francisco.

The good news for Intel and the high-tech community? The shift to 3-D, and any tangible increases in special effects, requires massive processing power, and related software and hardware needs. Heck, just doing 3-D requires twice as much work since development is done so that each eye has a dedicated scene or picture frame to it.

At Intel, we often use the term inflection point. Andy Grove coined the term in a book to describe “the life of a business when its fundamentals are about to change. That change can mean an opportunity to rise to new heights. But it may just as likely signal the beginning of the end.”

DreamWorks is at the forefront of a 3-D movie-making inflection point. Filmmaking, theater equipment even the glasses are changing. I believe Intel is there, too, as the shift from single to multi to many-brained or many core processors and how people use them is already underway. In 2007 we showed a prototype 80-core processor, and in August outlined plans for our Larrabee architecture. We will deliver a future 8-core, multi-threaded processor as part of a new family of chips we unveiled a couple of weeks ago.

Don’t underestimate the major challenge for software, too. Software makers will need to shift from a single core philosophy to ones that will have 4, 8 and many more cores running at the same time. Enter Intel’s Software Solutions Group, dedicated to making software design and performance easy, fast and more affordable. I know the engineers at DreamWorks are moving as fast as they can to convert their proprietary code that makes their 3-D movies sing into solutions that can handle, and leverage, multi-core and multi-threaded processors.

More on the movie, and Intel’ efforts later. But keep an eye out for the March opening — and those new 3-D glasses.

Polyphemus Demonstration and Evaluation Kit

Every AVR programmer worth her weight in ATmegas knows about the AVR Butterfly--a ridiculously low cost ATmega169 demonstration and evaluation kit. Lamenting the lack of such a kit for the ATmega168 drove me to design my own demo/eval kit for the Arduino microcontroller family. This project became a compulsion that cost three complete redesigns, five destroyed ATmega168s, and hundreds of hours of point-to-point wiring. The result was Polyphemus--an ATmega168 demo kit that you can build from your own spare-parts box.

Named after the gorgeous giant silk moth with large, colorful "eyespots" on its hind wings (Antheraea polyphemus), as well as the gigantic Cyclops who tormented Odysseus, this Polyphemus sports several exciting features:

•ATmega 168 microcontroller (housed on a Freeduino board)
•color Nokia 6100 LCD
•two multi-state pushbuttons
•white LED
•phototransistor
•piezoelectric buzzer
•3.7V rechargeable lithium battery
•analog input connector
•FTDI USB programming connector
•compact 3x3-inch handheld form factor
By using a 3.7V battery to power Polyphemus, no additional power regulators are needed. Also, no DC-DC boost converter is needed for powering the Freeduino and white LED.


The user interface for Polyphemus is displayed on the color Nokia 6100 LCD. Using one pushbutton to move the menu and the other to "pick" a selection, you can choose from three built-in functions:

•Flashlight - turn ON/OFF the white LED
•Light sensor - sample ambient light readings in milliamp units
•Voltmeter - test power connections (< 5VDC)

Sunday, December 7, 2008

Intel News Release

Singapore Medical Device Maker for Neurological Patients Wins Silicon Valley Entrepreneurial Award
Intel Awards $25,000 to Winning Team in the Intel+UC Berkeley Technology Entrepreneurship Challenge


Technologies of Singapore won the 4th Annual Intel+UC Berkeley Technology Entrepreneurship Challenge (IBTEC) last night. The neurological medical device company was judged by a team of venture capitalists from the San Francisco Bay Area. Criteria for the win were the best new technology with the greatest potential for a positive impact on society backed by a sound business plan. Intel Corporation awarded the winning team $25,000.

In addition, Polyskin of India was awarded second place for its wound-treating membrane technology. Third place was awarded to SCU Panda Park of China for a new, more environmentally-friendly and ecologically-sound clean leather technology. A team from the United States, Nano Precision Medical, was named "audience favorite" for its novel technology, which improves patient outcomes and lowers side effects through a high-precision and low-cost delivery of a wide variety of therapeutic molecules.

"The approaches to solving worldwide challenges these teams have taken are inspiring, " said William A. Swope, Intel Corporation vice president and general manager, Corporate Affairs Group. "Intel believes a strong education drives the innovation that fuels our economy, and this is strong evidence that higher education has a major role to play in expanding possibilities."

The competition was held at the Haas School of Business, in Berkeley, Calif., and hosted 22 teams from 15 countries. The program is designed to spur young entrepreneurs to develop innovative technologies that solve real world challenges, build viable business models, and move that technology out of university labs and into the market for a positive impact on society. Not only does the winning team receive $25,000 and the winning title, but its members, along with the other participants, also get direct visibility and interaction with more than 20 leading venture capital firms.

Founded in 2005 by UC Berkeley and Intel, IBTEC seeks to support and promote entrepreneurship globally, predominantly in developing countries. This year, business plans included ground-breaking topics such as alternative fuel, a medical device enabling the precise and low-cost delivery of therapeutic molecules to improve patient outcomes, and eco-friendly musical instruments.

As part of Intel's Higher Education Program, The Intel+UC Berkeley Technology Entrepreneurship Education Program encourages and prepares students everywhere to become tomorrow's technology entrepreneurs. Teams are judged on their ability to make the greatest impact through the deployment of emerging and innovative technology products and services. Judges are selected from Bay Area venture firms with a global focus.

From local schools to global universities, Intel works to help improve the quality of education and drive innovation around the world. Over the past decade alone, Intel has invested more than $1 billion in cash and in-kind contributions to help teachers teach, students learn and universities innovate. To learn more about Intel's commitment to education, visit www.intel.com/education and get inspired at www.inspiredbyeducation.com.

About Intel
Intel (NASDAQ: INTC), the world leader in silicon innovation, develops technologies, products and initiatives to continually advance how people work and live. Additional information about Intel is available at www.intel.com/pressroom and blogs.intel.com.

New security information

Our most recently published information about online security issues is listed below. This dynamically generated list is similar to what you would receive by subscribing to our RSS feed.

Getting an RSS feed is easy and requires only that you have a news reader on your computer. To learn more about RSS and find links to news readers, see the box to the right.

If you already have an RSS news reader, use this URL to receive our content feed:
http://www.microsoft.com/protect/rss/rssfeed.aspx

The Goal of Computer Security or What's Yours is Yours Until You Say Otherwise!

Computer security has been, is, and will continue to be a hot topic for discussion. Newspapers frequently chronicle computer security breaches and estimates of lost revenue. Bookstores carry books that describe how to secure your home and work computers against would-be intruders. Television news features depict high-profile computer security incidents and show interviews with computer system owners and sometimes even those who broke in. We're being barraged by computer security information that includes recommendations about software that we should install and other steps we should take to secure our home and office computer systems.

But when all is said and done, do we really know the problem we're trying to solve? That is, do we really know the goal of computer security?

Simply stated, the goal of computer security is this: keep your computer-based possessions-your computer system (CPU cycles, memory, disk space, and Internet connectivity and speed), the software you've purchased, and the files and folders you've created-yours unless and until you explicitly give them to others. As you'll soon see, most mitigation strategies discussed in those books and self-help articles on the Internet are ultimately aimed at keeping what belongs to you yours.

And this concept isn't new. It's what you've been doing for years with most all of your other possessions. For example, the doors on your house have locks and you use them. So do the windows and so does your car, and you use them too. You don't give the keys to anyone who asks for them without a really good reason, or perhaps never at all. You don't leave your CD player and your CDs out for all to use and perhaps take. You don't store your financial or your personal medical records on your front porch.

Why then are we so willing to give up our computer possessions to anyone who wants to take them?


Back in the days before the Internet became popular and affordable, we could treat our personal computer possessions much like anything else we owned. The computer was in a room in our house and we locked our doors. The intruder who wanted access had to come to the house, break in, and take what they wanted.

We knew how to deal with that situation. We had locks and deadbolts on our doors and security systems to notify the police when someone tried to break in. Yes, there were break-ins and yes, computer assets were stolen. But the incidents were few and the signs of a break in were well understood by law enforcement. Just watch CSI or any other television programs of that genre to see how well-understood they really are.

These days, with widespread and inexpensive access to the Internet, the only thing that's changed is that intruders can literally be anywhere in the world and still gain access to your computer possessions. They don't need to be where your computer is. It's like giving your credit card to the waiter or waitress at a restaurant to pay your bill and discovering that the whole world is waiting in the kitchen, prepared to make a copy of the information on your card.

And unfortunately those computer assets are not protected like your house. That is, they don't always come with locks, and those that do can sometimes be too easily "picked" by an intruder. In fact, in many cases, though the number is getting smaller, your computer assets are shared automatically to anyone who comes knocking, and you have to do something to lock them. One of the challenges of using a computer is and will continue to be finding the locks that keep intruders out and making sure they work correctly and appropriately.

Another challenge, which may be even more significant, is keeping these locks working correctly. Again, we know how to deal with this type of situation. For example, if your house needs to be painted, you'd paint it after first scraping off what's loose and doing any other necessary preparatory steps. But you know that paint job won't last forever. In a few years, you'll need to do it all again. You accept this as part of the responsibility of home ownership.

With your home and office computer system, it's the same thing. You first install a piece of software, a firewall, for example, as described in Task 4 below, and then you tune it to match your Internet usage patterns. Over time, your patterns may change, as may the programs you use to access the Internet. You'll need to tune the firewall program again. Unfortunately too many home computer system owners and users get frustrated by the attention that some software requires. Rather than mastering it, they remove it. They don't accept this as part of their responsibility of home computer ownership.

Let's now return to this goal of home computer security-keeping what belongs to you yours-and look at one set of recommendations to see how they support this goal. The recommendations are taken from the Home Computer Security Guide, which is available from http://www.cert.org/homeusers/HomeComputerSecurity.

Friday, November 21, 2008

Facebook in mobile push

IF all things go according to plan, up to 90 per cent of Facebook users will access the popular social-networking site via mobile devices, a senior company executive said.

But unlike Skype the company has no immediate plans for a "Facebook phone".

Co-developed with Chinese manufacturer Amoi, the Skype mobile phone was first launched locally on the 3 Mobile network.

The mobile space is high on its agenda and Facebook has other go-to-market strategies, according to Facebook Mobile director Henri Moissinac.

Over the past six months Facebook has doubled the number of users accessing the site from mobile devices to 16 million unique users a month.

However this was still a fraction of the 120 million active unique visitors who visit the website monthly, Mr Moissinac said.

"Eventually we would like to have between 80 and 90 per cent of our users as mobile users," he said. No timeframe was provided on when the target could be achieved.

The company realises that to succeed in the mobile arena, it will have to rely heavily on network operators and handset manufacturers.

"The speed of the network and speed at which handsets can process data are controlled by handset manufacturers and operators. So effectively they are the main drivers,” Mr Moissinac said.

"But people like us, we can speak to that, we can help. That's why our mobile engineering team is working with partners so we can effectively work on the handset, the speed of experience and also amount of data required to make that work.''

Facebook collaborated with handset developer INQ (pronounced ink) mobile, owned by telecommunications company Hutchison-Whampoa, to develop a Facebook client for its smartphone, INQ1.

The application can be accessed directly from the phone’s home screen as opposed to a mobile web browser.

INQ managing director Frank Meehan described the INQ1 is a smartphone for the masses.

"Android, iPhone, BlackBerry are really great, but they're all on high-end phones and all require very high end chips to run,'' Mr Meehan said. "The vendor market has forgotten its roots, which is to make communication better for everybody.''

INQ has similar applications for Microsoft Live Messenger, Skype, email, RSS feeds and widgets. It has an "online presence" contacts directory which displays Facebook friends' status and profile pictures.

The INQ1 is also available on Hutchison's 3 Mobile.

YouTube's Identity

YouTube gets chummy with MGM ... Circuit City goes belly up ... IBM pitches power line Internet plan ... bad guys hold prescription customer data for ransom ... CNN tries holo-trickery ... iPhone unseats Razr at the top, and more.

Now you can get your fix of "Bulletproof Monk" and "American Gladiators" -- all without leaving the comfort of YouTube . Yes, the king of user-generated, short-form video is now embracing the other kind: studio-generated, feature-length films.

Yes, this is the same YouTube that said long-form video was anathema to its business model. But I guess when the big MGM lion comes roaring, you make an exception. Some of the stuff that MGM will be contributing belongs on the who-cares list: dusty, old movies that never did well in the theaters or on DVD, such as the aforementioned "Bulletproof Monk." You'll also get to see episodes from the original late-'80s/early-'90s fixture "American Gladiators" -- the original, not that new copycat thing that's out there now.

In return, YouTube has promised to help out MGM a bit -- by employing video fingerprinting technology that identifies unauthorized copies of MGM's content, which it will promptly remove. Once again, you can only watch what the big lion says you can watch, and all is right in the world.

Google to iPhoners: Talk to the App

Google is gearing up to update its iPhone search app with voice commands. Unlike its existing GOOG-411 tool, the iPhone app will attempt to return results from just about any question one might think to ask, not just business locations and phone numbers.

A new feature for Google's (Nasdaq: GOOG) iPhone search application that listens to spoken searches will be made available soon, according to the search company's iPhone application page.

At press time, the feature had not been rolled out through Apple's (Nasdaq: AAPL) online App Store, though The New York Times has reported it may come as early as Friday.

As it's currently available, Google's iPhone search app lets users type in search questions via the device's keyboard, and it delivers location-aware results. So users looking to find a local pizzeria can type in "pizza" and get the results mapped.

However, Google isn't just looking to help fill hungry iPhone user bellies. With the new feature, most any spoken question can return search results, making iPhone owners even faster masters of trivia. With the expected app, instead of tapping out "What is the speed of sound?" users can speak it. Typing will still be enabled, if the user prefers.

So what happens next? Is the iPhone powerful enough to translate trillions of human phrases?

As it turns out, the iPhone doesn't do the heavy lifting. It reportedly records the spoken phrase and uploads it to Google's servers, which then figure out the intent and generate the search -- incorporating location-specific information, too. (Hence the ability to offer up local pizzerias.)

The results are sent back to the iPhone and presented in an iPhone screen-friendly format.

Tax Day Is Over, but Internet Tax Threats Loom

As Americans stretched to pay the tax man this week, California Assemblyman Charles Calderon (D-Montebello) was working on the sly to institute a new digital tax. Such a move is not only short-sighted, but also could seriously harm the state's competitiveness.

It's no secret that the digital economy is a key driver of California's economic growth, so it is shocking that some political leaders seek to increase the regulatory and tax burden on the tech sector. In the short term, new taxes might help battle California's massive US$8 billion deficit, down from $16 billion through borrowing and accounting tricks. In the long term, however, the results would be disastrous.

Taxes do more than raise money; they also act as a disincentive for economic activity. For instance, so-called "sin" taxes on alcohol and cigarettes are meant to raise prices and decrease sales of the potentially harmful products. A similar effect would occur if Calderon's digital goods tax (AB 1956) was approved, and along with it would come multiple ripple effects.

Friday, October 31, 2008

News

■Starting with the Fall 2008 Semester UKIT has simplified access to the Mac computers in our labs by enabling students to login using their Link Blue computing account. This change requires new students to activate their Mac access before they will be able to use the labs, and may require some returning students to contact IT Support to have their accounts reinstated and their files restored. For more information, including how to activate your access, please consult our wiki article.
■For an overview of UK organizational structure with key individuals responsible for administrative systems, please click here.
■Reminder: Bb 8.0 Upgrade
The Blackboard servers will go down at 12:15 am on Tuesday, May 6 (immediately after spring semester grades are due) so that UKIT can perform the upgrade; servers should be back up by 8 am on May 6. All Bb Instructors are strongly urged to download the gradebook in their courses as a precautionary backup before the servers go down. "How do I download my gradebook?". The main change in this move to Bb v8.0 is that the Gradebook will become the Grade Center, with an entirely new layout. Learn more about the new Grade Center on the Grade Center Resources page.
■Office 2008 for Mac Now Available for Faculty/Staff

Office 2008 for Mac is now available to regular full-time and regular part-time Faculty and Staff of the University of Kentucky. It is available for download through the UK Download server.

The student version of Office 2008 for Mac is not available at this time, but will be released on the Student Download Server when the product is available. Students should note that they are only allowed one copy of the currently released Office Product. Students that download Office 2007 for Windows will not be eligible for Office 2008 for the Mac, and vice versa.

■UKIT coined the term "link blue" to define a directory account ( userid and password ) which can be used when connecting to many campus-wide systems. For more information click here.
■UKIT 2006-2009 Strategic Plan is available here.
Security Tip
■USB thumb drives and email enabled PDAs have become an extremely useful tool for keeping up with important data and transferring it between computers. However they can become a liability if they are lost, stolen, or damaged if you don't take steps to protect yourself.

Student Life

Dining
•Plan Info
•Downtown Dining
Get Involved
•Clubs & Organizations
•Student Activities Board
•Student Government
•Fraternities & Sororities
•Volunteer
Getting Around Campus
•Campus Map
•Parking and Transportation
Lexington Life
•Things to Do
Living on Campus
•Individual Dorm
•FAQs
•Living/Learning Communities
•Residence Life Status
•Campus Safety
•Student Center
Off-Campus Housing
•Lexington Apartment Guide
Sports & Recreation
•Intramural Sports
•Johnson Athletic Center
•Blue Athletics
•Outdoor Pursuits
•Club Sports
•Aquatics
Student Services
•Disability Resource Center
•Student Health Center
•Career Center
•Student Employment
•Health Insurance
•Counseling & Testing Center
Textbooks
•UK Bookstore
WARNING: Some Web sites to which these materials provide links for the convenience of users are not managed by the University of Kentucky. The University does not review, control, or take responsibility for the contents of those sites.

Tuesday, October 7, 2008

New UK immigration points based system

The United Kingdom will begin implementing its new points based immigration system in early 2008. The new system, broken into five "tiers", encompasses employment, business, and study-based immigration, from highly skilled workers to Working Holiday Makers and students.

Our site has a new section containing the most up-to-date information about the new points based system and how it will work. We will be updating this section as new information is released.

Programs such as the Highly Skilled Migrant Programme (HSMP) and the UK Work Permits scheme will be replaced by the new points based tier system. Each tier is expected to have a number of sub-categories such as general highly skilled migrants, investors, and entrepreneurs under Tier 1. Each sub-category will have its own criteria for scoring points.

The breakdown of the tier system is as follows:

•Tier 1: Highly skilled migrants, entrepreneurs, and innovators
•Tier 2: Skilled workers with a job offer to fill shortages in the labor market
•Tier 3: Unskilled, temporary/seasonal labor (suspended indefinitely)
•Tier 4: Students
•Tier 5: Temporary workers such as Working Holiday Makers
The tiers will be implemented at different times. Tier 1 is expected to begin in March 2008, followed by Tier 2 and 5 in the third quarter of 2008. Tier 4 is expected to begin in early 2009. Tier 3 has been suspended indefinitely, with the UK expecting to fill unskilled labor from within the European Union and the European Economic Area.

Please note: When the HSMP is replaced by Tier 1, a few advantages to the current program will be lost. Any highly skilled individuals thinking about migrating to the UK would be advised to apply for HSMP now. We offer a free HSMP Assessment form and a convenient online Points Calculator to assess a person's chances of being granted an HSMP visa.

• UK universities fear financial loss with new immigration rules

• UK Home Secretary outlines new points based system

• UK prime minister highlights need for migration, skills training

• More criticism at ending UK SAWS migration scheme

• English ability will play important part in new UK points based system

UK Immigration and UK Visa Services

The UK has introduced a number of new UK immigration, naturalization, UK visa, work permit and UK working visa categories in the last few years. The points based skilled immigration category the Highly Skilled Migrant Programme (HSMP), introduced in January 2002, proved to be very successful.

However, the HSMP has been replaced by Tier 1 (General), part of the UK's new five-tier points based system which will encompass all work, study, and training immigration routes into the country. People seeking extensions to their HSMP visa are now required to extend their leave to remain under Tier 1 (General) for General Highly Skilled Migrants. Since April 2008, applicants located in India have been required to file initial highly skilled migrant applications under the Tier 1 (General) rules. This was followed by the rest of the world on 30 June 2008 as the Tier 1 (General) scheme fully replaced the HSMP.

You may have to wait months for your UK visa application to be processed by the UK Border Agency, or spend the whole day there to then find that you do not have all the relevant documentation. We are OISC registered and can submit your UK visa application to the Home Office to be dealt with on the same day.

Thursday, September 25, 2008

Online Education Made Easy

Earn an Accredited Online College Degree Today.
With today's technology you can earn a college degree no matter where you live, what hours you work, your family situation or how much you travel. More than 12,000 students take advantage of our online college classes every year.

Select from 19 different online college degree programs. You can earn an accredited online college degree through our online education programs in less time than you ever imagined.

U.S.News Best CollegesIt makes no difference whether you are interested in finishing a college degree you began years ago, or are thinking about taking college classes for the very first time, at Columbia College our online education programs make earning a college degree as convenient and affordable as it has ever been.

The online college degrees currently offered through our online education programs feature:

* Online associate, bachelor's or master's degree
* 500 online classes and 19 online degrees
* Eight-week online education courses
* Academic sessions start in January, March, June, August and October
* Affordable tuition with no surprise student fees
* Accredited by The Higher Learning Commission and a member of the North Central Association
* Serving nearly 25,000 students each year
* Founded in 1851

You too can earn your college degree online from Columbia College. Apply now or request additional information about online education and distance learning at Columbia College.

Boston University

Boston University Online seeks to meet the needs of students just like you.

We’ve taken great care to assure that you can get the education you want. No matter where you live, no matter what your job, no matter how hectic your schedule is.

At Boston University Online, you can earn your degree during the hours and in the location that work best for you—without settling for anything less than the resources and distinction of a great university.

As a Boston University Online student, you’ll:

* Learn from world-class faculty
* Join a respected alumni network of over 250,000 students worldwide
* Interact with other motivated students
* Engage in simulations, discussions, and multimedia presentations
* Gain the knowledge and credentials you need to achieve your goals

Boston University Online currently offers over 20 distinguished degrees, certificates, and courses. And we’re adding more all the time.

* Our Graduate Degrees—such as the Master of Criminal Justice, the largest and most successful program of its kind—are renowned for their high academic standards
* Undergraduate Programs like our Undergraduate Degree Completion Program are earning regard for their creative approach to subjects like biology, philosophy, and economics
* Our Graduate Certificates provide a timely and intensive focus on cutting-edge topics relevant to today’s professional—including emergency management, clinical investigation, and project management

We invite you to spend some time exploring our website—you’ll discover that at Boston University Online you have access to excellence, from any distance.

Post University Online

Accelerated Online Degree Programs

Now you can earn an online degree from an accredited, traditional four-year university in as little as 18 months. Post University's online degree programs – master's degrees, bachelor's degrees, associate's degrees and certificate programs – offer the same accredited curricula as their on-campus equivalents.

Post University offers accelerated online degree programs and professional certificates designed specially for adults looking to resume or advance their careers while juggling work, family, or other commitments.

How does it work? You just log on and take classes whenever it's convenient. It's always a good time to begin your studies, because Post University has six scheduled eight-week modules throughout the year.

Take advantage of our special offer to receive free textbooks. To find out how, just submit the "request information" form. An admissions advisor will contact you to discuss your educational goals.

Post University is:

* Accredited by the Commission on Institutions of Higher Education (CIHE) of the New England Association of Schools and Colleges (NEASC);
* Licensed by the State of Connecticut, through the Department of Higher Education (DHE).

Post University Online

Wednesday, September 24, 2008

Financial Modelling programme

Financial Modelling is a tool widely used in businesses to define and compare the impact of specific business initiatives and alternative scenarios on a company's financial position. It is a vital task, and experienced professionals are highly appreciated. The technique requires the building of a financial representation of the business on a spreadsheet, and the identification and manipulation of key performance drivers to explore the impact of different operational and financial options.
Objectives of the course

This course will empower you with the skills to use Microsoft Excel, making you capable of executing complex actions and work more efficiently as a financial professional.
Who is it for?

The course is designed for any accounting or finance professional, with or without experience in financial modelling, wishing to become more confident and dynamic in the Excel skills that are highly sought after by investment banks, top accountancy firms and blue-chip financial organisations.

Master of Business Administration (Entrepreneurial Management)

Maritime Greenwich College, with the Entrepreneurship Institute Australia (EIA), offers students from all around the world the opportunity to come to London to study the EIA MBA specialising in entrepreneurial management.

EIA is based in Adelaide, South Australia and is accredited by the South Australian Government under the Australian Qualifications Framework to award undergraduate and postgraduate degrees.

COURSE OVERVIEW
Apply Online
Download
Prospectus
Help/FAQs
The MBA (ie Master of Business Administration) is one of the world’s best known and most widely recognised postgraduate degrees. In recent years the MBA has become the foremost academic qualification for managers.

The EIA MBA (Entrepreneurial Management) provides a good understanding of the language and structure of entrepreneurial management. The subjects in this course are designed to provide a sophisticated body of knowledge by integrating critical strategies and techniques with the principles of entrepreneurial management. The EIA MBA (Entrepreneurial Management) specialisation will prepare students for entrepreneurial and intrapreneurial challenges in both the national and international arena. The course covers 12 subjects integrating management, business and entrepreneurial knowledge.

There are three main benefits to students on completion of the EIA MBA (Entrepreneurial Management):
bullet Successful MBA graduates contribute constructive and creative input through their ability to implement decisions based on their improved understanding of business and entrepreneurial strategies.
bullet The integrated nature of the course allows a holistic appreciation that is critical to the achievement of a sustainable competitive position in today’s changing business and entrepreneurial environment.
bullet Through the MBA (Entrepreneurial Management), students will gain a valuable piece of research that can be tailored to students’ specific entrepreneurial and business career goals and objectives.

Furthermore, upon successfully completing this course, students will be able to:
bullet Critically appraise a range of relevant practical entrepreneurial management knowledge, and apply it to entrepreneurial and management problems.
bullet Demonstrate proficiency in the analysis and interpretation of a wide range of business data.
bullet Synthesize knowledge from across a range of business disciplines, and apply it to the analysis of complex entrepreneurial management issues.
bullet Demonstrate the key personal and inter-personal skills required for effective management and implementation of solutions at all levels inside and outside the students’ organisations.
bullet Demonstrate clarity of problem definition and scope.

Mode: Full-Time (12-18 months) 15-21 hrs a week

Commencement: September, January and July of every year

COURSE FEE

UK Residing Students £4,900

Overseas Students £5,900

The fee covers tuition and assessments.

COURSE CONTENT
The current subjects for the EIA MBA (Entrepreneurial Management) are as follows:
bullet Entrepreneurship
bullet Leadership
bullet Strategic Management
bullet Strategic Marketing
bullet Strategic Human Resource Management
bullet Strategic Legal and Social Issues
bullet Strategic Operations Issues
bullet Strategic Finance Issues
bullet New Venture Creation
bullet Entrepreneurship and Globalisation
bullet Franchising
bullet Entrepreneurial Management Project

SUBJECT DESCRIPTIONS

Entrepreneurship
The objective of the module is to provide participants with an in-depth knowledge of the concept of entrepreneurship in the context of entrepreneurs, entrepreneurial organisations and entrepreneurial countries.

Leadership
This module will provide the participants with a systematic study of how individuals and groups behave within an organisational setting and the impact of leadership on this behaviour.

Strategic Management
The aim of this module is to provide the participant with an in-depth knowledge of the principles and practice of corporate strategy formulation built around a systematic approach to strategic management.

Strategic Marketing
This module is designed to provide participants with an in-depth knowledge of the marketing concept and the major principles, techniques and theories relating to the strategic practice of marketing, including the development and implementation of competitive marketing strategies.

Strategic Human Resource Management
This module provides an understanding of the formal relationship between the employer and employee and the techniques and methods aimed at making the relationship more effective.

Strategic Legal and Social Issues
The objective of this module is to provide the participants with an awareness and understanding of the critical legal issues that relate to an organisation, thus enhancing the formulation and implementation of strategies for the organisation.

Strategic Operations Issues
The aim of this module is to provide participants with an in-depth knowledge of strategic operations issues that are critical for the operations of an organisation, to the end that the operations may become more efficient and effective.

Strategic Finance Issues
The module is designed to prepare participants for effective and efficient planning and management of financial and resource requirements and targets. The module is adapted for specific requirements of government, non-profit and entrepreneurial organisations.

Entrepreneurship and Globalisation
This module is designed to expand the participant’s understanding of the role of entrepreneurs in global business development. The module will also examine issues in operating across international borders in a global context.

New Venture Creation
This module features the process of creating successful new ventures, including evaluating opportunities, designing strategies, forming the entrepreneurial team and developing strategies for financing.

Franchising
The objective of this module is to provide participants with the concepts, dimensions and processes of franchising and licensing.

Entrepreneurial Management Project
The objective of this module is to enable participants to undertake a major entrepreneurial project. They will use their knowledge of action research as a method of implementing the project and record the process.

ASSESSMENT

For each module (except the Entrepreneurial Management Project, for which the students will be required to undertake a major assignment), students will be required to complete an assignment and an examination. The assignment is worth 20% and the exam is worth 80% of the overall grade for the subject. The students must pass the examination to pass the subject.

ENTRY CRITERIA

Any applicant who wishes to undertake the MBA Course must satisfy all of the following entry criteria:

English Requirements

Where the applicant's medium of instruction (at a tertiary level) was not in English, the applicant must have obtained:

§ a score of 550 or better on the TOEFL;

§ a score 6.0 or better on the IELTS;

§ a credit or better in English in the GCE "O" or "A" levels or equivalent; or

§ any other evidence of proficiency in English acceptable to EIA’s Registrar.

Applicants Must Satisfy Either (a) or (b)

(a) For Direct Entry

The applicant must have:

1.

an acceptable bachelors degree or a relevant professional qualification conducted at a standard equivalent to a bachelors degree under the Australian Qualifications Framework; and
2.

relevant work experience.


Applicants who do not satisfy the above entry criteria will still be eligible to undertake the MBA Course but on a stage-by-stage basis. Each of these applicants may enrol in the Graduate Certificate in Management course (the first stage of the MBA Course) provided each applicant satisfies all of the below criteria.

(b) For Stage by Stage Entry

The applicant must have either:

1.

a qualification deemed equivalent to an Advanced Diploma under the Australian Qualifications Framework;
2.

relevant specialised professional or technical qualifications deemed acceptable to TIA’s Registrar; or
3.

a minimum of 3 years verifiable experience and learning deemed relevant to course by TIA’s s Registrar.

Upon successful completion of the 4 subject Graduate Certificate in Management, each applicant may proceed to the 4 subject Graduate Diploma in Management, Upon successful completion of the 4 subject Graduate Diploma in Management, each applicant may proceed to the final 4 subjects of the MBA.

The Association of Chartered Certified Accountants (ACCA)

The aim of the Association is to provide a qualification which is closely linked to the needs of the accountant in the modern business world and which prepares members for work in any sector of the economy. The Association of Chartered Certified Accountants (ACCA) is the most recognised International Accounting and Auditing Body in the world.
Apply Online
Download
Prospectus
Help/FAQs

The course consists of 14 papers. After passing all modules and 3 years of relevant practical experience students can achieve ACCA and practice accounting and audit.

Commencement: January, July & September of each year.

Study Mode: Full-Time (15-21hrs/week)

Duration:
Fundamentals - 2 Academic Years
Professional - 1 Academic Year

The course syllabus is divided into 2 different parts:

You will need to complete 14 papers in total. A maximum of nine papers in the Fundamentals level are available for exemption.

FUNDAMENTALS (nine papers in total)

Knowledge
bullet

F1 Accountant in Business
bullet

F2 Management Accounting
bullet

F3 Financial Accounting

Skills
bullet

F4 Corporate and Business Law
bullet

F5 Performance Management
bullet

F6 Taxation
bullet

F7 Financial Reporting
bullet

F8 Audit and Assurance
bullet

F9 Financial Management

Course Fee:

UK Residing Students £325.00 per paper

Overseas Students Total £3150

PROFESSIONAL (five papers in total)

Essentials
bullet

P1 Professional Accountant
bullet

P2 Corporate Reporting
bullet

P3 Business Analysis

Options (two to be completed)
bullet

P4 Advanced Financial Management
bullet

P5 Advanced Performance Management
bullet

P6 Advanced Taxation
bullet

P7 Advanced Audit and Assurance

Course Fee:

UK Residing Students £350.00 per paper

Overseas Students Total £2250

Minimum Entry Requirements
The minimum entry requirements to register are 2 A level GCE plus three GCSE/GCE Ordinary level passes in five different subjects (including Maths and English) or equivalent overseas qualifications.

Mature Students Entry Route (MSER)
Individuals over 21 years who do not meet the minimum entry requirements may register through the Mature Student Entry Route (MSER). This is designed for students who have the maturity and skills to deal with the ACCA Qualification instead of first undertaking the Certified Accounting Technician (CAT) qualification. MSER students must pass the equivalent of Paper F2, Management Accounting and Paper F3, Financial Accounting within two years of registering.

Exemptions
Holders of Higher qualifications, i.e. MBA, MSc Finance or similar higher qualifications are considered for exemptions from some or all of the Fundamentals Level.

Important Information
The current deadlines for registration, exemption claims and examination entries are as follows:

Registration by: 31 January; 15 August
Exemptions by: 31 January; 31 July
Examination entry by: 15 April; 15 October
Exams: June; December

Tuesday, September 23, 2008

International students

Would you like to study in Queensland? Our programs offer high quality education in a safe and modern environment.

It's all here for you to discover: available programs, accommodation advice - even how to buy a school uniform! Check out the FAQs for practical info and handy hints.

For immigration requirements and other important information, browse the study in Australia section.

We work with universities and other government agencies to promote Queensland internationally as a provider of high quality education. For detailed information for international students on Queensland study opportunities, universities, courses, visa procedures, costs, lifestyle and Australian education contacts worldwide, find out about Queensland universities.

We also provide enriching group study tours and offer consultancies in international projects.

Explore your options. Start planning your Queensland experience.

Saturday, September 20, 2008

Freeman-Asia Award Lets UK Senior Finish What He Started

Unlike most college seniors, Patrick Conlon was confident about where he wanted to go. He arrived in Dalian, China in March.

Conlon, a linguistics and political science major, has been passionate about language and culture since he arrived at UK. Immediately following his freshman year, he traveled to Shanghai to study Mandarin. Unfortunately, his trip was cut short when he had to return to the United States for minor surgery. He was able to return to China thanks to the Freeman-Asia Award.

A 2004 graduate of Tates Creek High School, Conlon has been fascinated with language since childhood. He was reading Shakespeare as a sixth grader, but he did not discover his gift for learning foreign languages until he was homebound with an illness during his freshman year of high school.

Motivated largely by boredom, he watched international news programs and was particularly fascinated by French. After merely four months of independent study, he returned to school and tested as a fluent French speaker. Today, Conlon speaks more than 20 languages at various levels.

He is also quick to share his gift with others. His former Education Abroad Advisor, Melinda Miller, saw that firsthand. Conlon tutored her in Dutch before she relocated to Holland. “Patrick’s patience and effectiveness as a language teacher are testament to his desire to promote communication with people from other cultures,” she said.

One of Conlon’s objectives is to show UK students that Education Abroad is open to anyone and everyone. Since enrolling at UK Conlon, who frequently uses a wheelchair, has visited several countries where handicapped and elderly residents stay home because of limited accessibility to public places. These include France and Russia. “I think it does teach people in those countries a bit about how the system might not be as fair to other people,” he reflected.

What about the communication barriers that American students face abroad? Conlon said no one should feel pressured to be fluent in another language before traveling abroad. “Learn the everyday things first off,” he advised. “Think ‘How do I get from the airport to my dormitory? How do I say the things I need to say to do that?’ Or begin by asking ‘How do I introduce myself to people and speak with them?’ Those are the most important things. The rest will come later.”

Finances are another obstacle that Conlon believes most students can overcome. He has learned to rely on the Education Abroad staff at the Office of International Affairs (OIA) for financial advice. “They can help you make a budget and learn to stick to it,” he said. OIA can also assist students in applying for various scholarships.

The Freeman-Asia Award, a $5,000 prize given to students who want to learn more about Asia, allowed Conlon to spend approximately ten weeks at the Dalian University of Foreign Languages, where he had an opportunity to perfect his Mandarin and took additional courses in Chinese politics and international government.

Now that he has returned, he will fulfill the requirements of the scholarship by educating students, faculty and staff on Asian culture. “The project I’ll be doing with the Freeman Foundation is really a continuation of a project that I’ve been doing since I went abroad for the first time -- educating people about why studying abroad is important and why language study is important,” he said.

And he is thrilled to have been given the opportunity to return to China to complete the intensive Mandarin studies he began four years ago.

Wednesday, September 17, 2008

List of Colleges and Universities

Harvard Graduate School of Education http://www.hgse.harvard.edu International Education Policy program http://www.gse.harvard.edu/academics/masters/iep/index.html

The George Washington University http://www.gwu.edu Graduate School of Education and Human Development http://gsehd.gwu.edu Program: International Education

American University http://www.american.edu School of Education, Teaching, and Health http://www.american.edu/cas/seth Program: International Training and Education

NYU Steinhardt http://steinhardt.nyu.edu/humsocsci/international/ Steinhardt School of Culture, Education, and Human Development Program: International Education

Penn State http://www.ed.psu.edu/cied/ College of Education Program: Comparative and International Education

University of Massachusetts http://www.umass.edu Graduate School of Education http://www.umass.edu/education/ Program: International Education http://www.umass.edu/education/academics/epra/ed_intl.shtml Center for International Education (CIE) http://www.umass.edu/cie/

University of California, Irvine http://internationalstudies.ss.uci.edu/

International education

The term international education can mean many different things and its definition is debated. Some have defined two general meanings to the concept of international education in regard to students. The first refers to education that transcends national borders through the exchange of people, as in study abroad. The second, explored in depth here, is a comprehensive approach to education that intentionally prepares students to be active and engaged participants in an interconnected world.

Understanding of a broad array of phenomena is enhanced and deepened through examination of the cultures, languages, environmental situations, governments, political relations, religions, geography, and history of the world. While definitions vary in the precise language used, international education is generally taken to include:

1. Knowledge of other world regions & cultures;
2. Familiarity with international and global issues;
3. Skills in working effectively in global or cross-cultural environments, and using information from different sources around the world;
4. Ability to communicate in multiple languages; and
5. Dispositions towards respect and concern for other cultures and peoples.

International Education is also a major part of international development. Professionals and students wishing to be a part of international education development are able to learn through organizations and university and college programs. Organizations around the world use education as a means to development. The United Nations Millennium Development Goals include to education specific goals:

Millennium Development Goals http://www.unmillenniumproject.org/reports/index.htm

achieve universal primary education in all countries by 2015 and eliminate gender disparity in primary and secondary education by 2005

Other mention of education in regard to international development:

Education For All (EFA): www.unesco.org/education/efa/wef_2000 An international stategy to operazionalize the Dakar Framework for Action; The World Education Forum (Dakar 2000) agreed to reach 6 goals by 2015: o expand early childhood care and education o improve access to complete, free schooling of good quality for all primary school-age children o greatly increase learning opportunities for youth and adults o improve adult literacy rates by 50% o eliminate gender disparities in schooling o improve all aspects of education quality.

Dakar Framework for Action (http://www.unesco.org/education/efa/ed_for_all/dakfram_eng.shtml)

UN Decade of Education for Sustainable Development (2005–2014) -highlight the central role of education in the pursuit of sustainable development. www.unesco.org/education/desd

See also comparative education; and Liberalism, Realism, Power Transition Theory,International Development, as focus areas that provide insight into international phenomena relevant to "International Education."

International Education both as a field of study focusing on study abroad and preparing students for international occupations as well as as an active part of international development is taught in many colleges and universities around the world.

Links to UK basic skills resources

Adult Basic Skills Resource Centre
Adult Basic Skills Resource Centre for students and tutors is a website used for classes at Abingdon and Witney College. It includes interactive exercises and downloadable resources as well as numerous useful links to other basic skills sites.
www.members.aol.com/skillsworkshop/

Avanti Books
This company specialises in supplying basic skills materials from over 70 publishers for post-16 and adult students.
www.avantibooks.com/epages/avantibooks.storefront

BBC Learning for Adults
Offers a web guide for adult learning including Skillswise which aims to improve adults' reading, writing and maths skills.
www.bbc.co.uk/learning/subjects/adult_learning.shtml

Becta
Becta's ESOL pages contain materials, case studies and other resources produced in adult and community centres.
www.becta.org.uk/

DfES's Learning Resources
The Department for Education and Skills' Way to Learn links to online resources and to sites for those with special needs and for those who are non-English speakers.
www.waytolearn.co.uk

FE Resources for Learning (FERL)
The FERL website contains information about resources for teaching and learning.
ferl.becta.org.uk/

Financial Literacy
Financial Literacy is a programme managed by the BSA. Schemes of work, lesson plans, online activities and taster modules are included under Learning Activities.
www.money-bsa.org.uk/index.php

London Language and Literacy Unit (LLU+)
The LLU+ Resource Centre at London South Bank University is a part of the Central London Skills for Life Professional Development Centre. The collection of teaching aids, for loan and for reference, caters for teachers, trainees and students of adult education.
www.lsbu.ac.uk/lluplus/

Mathsnet
An education website incorporating maths learning and games.
www.mathsnet.net/

National Institute for Adult Continuing Education (NIACE)
NIACE has an online catalogue of NIACE publications.
www.niace.org.uk/

Skillswise (BBC)
Skillswise is an online resource for students and tutors offering resources, online lesson plans, training and a messageboard.
www.bbc.co.uk/skillswise/

Education In Hampshire

Transforming the education system

"We are committed to developing a system of education matching the best anywhere; a system where all young people have opportunities to learn in ways which motivate and engage them and through hard work to qualify themselves for success in life."
Department for Education and Skills, 2005

Welcome to the pages for Education in Hampshire. From here you can:

* find out about the Agenda
* link to the Prospectus website
* find out about the Consortia
* link directly to Reference Documents
* find answers to Frequently Asked Questions or ask a question yourself.

What’s your Idea of an Ideal Teacher?

Walking down memory lane on the path that leads to my school days, I’m reminiscing about the teachers who remain evergreen in my thoughts even today. Each was as different as the flowers in a garden, but as a collective whole, they added value to my life in more ways than one.

A firm disciplinarian but an excellent teacher of mathematics, a kind and bubbly soul who even took delight in our childish pranks, a genius in the subject who infused enthusiasm by his very presence in the class – these were just a few who added to the potpourri of instructors who’ve been in and out of my life. What makes these particular teachers special? Why do I remember them fondly even after so many years? Probably because they lent that unique touch to a profession that touches lives; whatever the reason, they qualify as good teachers in my book. And opening the books of other students, I found that I was not alone in qualifying the best and worst of teachers. So here goes, a list of characteristics that every child wants in the ideal teacher:

· A thorough knowledge of and love for the subject.

· A love of and a tolerance for children.

· A tireless attitude when it comes to helping children who are at the bottom of the class.

· A good sense of humor that helps to take the occasional prank in his/her stride and the ability to turn a blind eye to minor infractions.

· Hands that offer help when needed, envelop in a hug in times of distress and guide when decisions are to be made.

· Supportive strength when children are going through a rough patch and need some time to get back on track academically.

· Sensitivity that tells him/her not to embarrass students in front of their peers.

· The ability to encourage when the going is touch, to push when that extra nudge is needed and to correct when on the wrong path.

· Forgiveness and kindness – qualities that rate higher than strictness in enforcing discipline.

· The ability to treat all students equally without showing favoritism.

· The ability to bring out hidden talents in students and encourage them to pursue their dreams.

· The ability to care for opinions even if they come from students who do not perform well academically.

· The ability to keep students’ secrets.

· Perseverance – even when the children are filled with self-doubts as to their own abilities.

· The ability to offer constructive criticism and honest feedback in a positive manner.

· The ability to correct without seeming to point out mistakes.

· The ability to get involved in student activities as an active participant.

A good teacher is not just one who’s well-versed in the subject; he/she should be able to adapt according to the environment and needs of the children in the picture. After all, teaching is much more than just mentoring young minds.

100 Videos to Learn New Teaching Techniques

Whether you’re a new teacher or a veteran, you probably find yourself honing your skills and reflecting on how you want to improve the learning of your students. I know for myself I was really frustrated by all of the conversation in grad school about cooperative learning, yet never had the opportunity to see any first-hand. Well, here is an article about that will help, “100 Awesome Classroom Videos to Learn New Teaching Techniques.”

* Home * Rebecca Newburn * Contact * Resources Making Educated Changes to Further Education

There is a no greater gift that we can give our children than quality education. Education knocks down the barriers erected between the rich and the poor, it’s the catalyst that’s needed for the reaction that combines hard work and determination and converts it to success, and it’s wealth that we can never lose once we’ve gained it. With over 90 percent of American children being educated at public schools, improving the quality of education a student receives translates to improving the quality of these schools. To do this, city administrative officials must focus on:



· Hiring and retaining qualified teachers who are dedicated to the profession.

· Improving the standards at preschools so that kids enter K12 schools ready to learn. The potential in each child must be developed.

· Improving safety at schools, especially those in poor neighborhoods where the crime rate is high.

· Involving parents in the education process, with teachers providing regular feedback on how their children are performing at school and opening up channels of communication between parents, teachers and the school authorities.

· Improving facilities and infrastructure at schools.

· Putting funds to good use to further the development of the school, and hence its students.

· Holding quality after-school programs to help weaker kids with homework, assignments and lessons.

· Decreasing the number of drop outs.

· Taking a career-oriented approach with seniors or providing guidance and counseling to choose the right colleges and majors.

· Performance-based incentives for teachers to motivate them. An amount of accountability must also be factored in to ensure that they don’t help students cheat by leaking test papers or helping them with answers.

· Improving not just academic test scores at schools, but providing students with an all-round educational experience that will prepare them to face the life ahead.

Online Reference Resources

Biographical Sources

Book and Entertainment Reviews

Calculators and Formulas

Calendars and Schedules

Computer Information

Consumer Information

Dictionaries and Encyclopedias

English Usage and Citation Guide

Everyday Life

Finding People and Organizations

General Reference Sources

Image Finder and All-Purpose Picture Files

Journal List of St. Ambrose University Library

Maps and Travel Information

Medical Information

Quotations

Rankings and Awards

Statistics

Monday, September 15, 2008

Marketing Code for Student Lenders

Resolving an investigation into whether they misled consumers, seven student loan companies have agreed to follow a code of conduct for their marketing, the New York attorney general’s office said on Tuesday.
Skip to next paragraph
Related
Statement from the Office of the Attorney General
Add to Portfolio

* GMAC Llc
* Nelnet, Inc

Go to your Portfolio »

The companies also agreed to put a total of $1.4 million into a fund to help educate students and their families about financial aid, Andrew M. Cuomo, the attorney general, said in a statement on Tuesday.

Those companies are Campus Door, EduCap, GMAC Bank, Graduate Loan Associates, Nelnet, NextStudent and Xanthus Financial Services.

An eighth lender, My Rich Uncle, has agreed to the marketing code voluntarily even though the attorney general’s office did not find fault with its marketing.

Some of the companies sent solicitations to students that looked as if they had come from the federal government, according to the attorney general’s office.

Others advertised interest rates not available to most borrowers. Some offered prizes and ran contests to lure student borrowers.

“These settlements are a major step forward in cleaning up an industry where false and misleading advertising practices have been all too rampant,” Mr. Cuomo said.

He added, “It is unconscionable for lenders to entice students into loans that are not best for them.”

Representatives of EduCap, Nelnet and GMAC Bank denied any wrongdoing but each said they welcomed the new code.

Raza Khan, president and co-founder of My Rich Uncle, said that the company was not part of the investigation but “wholeheartedly supported the code of conduct and voluntarily agreed to abide by it.”

Mr. Khan added, “This agreement did not require us to change how we market.”

The code of conduct, which Mr. Cuomo said he hoped other lenders would adopt, would ban using logos and return addresses that resemble those used by the federal government; sending false checks or rebate offers; offering free iPods or other gifts to lure borrowers; making misleading statements about loan terms and benefits, and providing examples of loan costs that are available to a small percentage of borrowers.

Democratic lawmakers in Washington have raised concerns about lenders’ marketing practices. In a statement on Tuesday, George Miller, the California Democrat who is chairman of the House education committee, said, “I am glad that attorney general Cuomo has continued to diligently pursue lenders involved with shady marketing schemes.”

In developing the code and persuading lenders to adopt it, Mr. Cuomo’s office is pursuing a similar strategy to one followed in addressing questionable ties between college financial aid offices and student loan companies uncovered in investigations last year. Benjamin Lawsky, special assistant to the attorney general, said the office’s investigation was continuing and expanding to include other potential conflicts of interest on college campuses.

“Numerous vendors do millions of dollars of business on college campuses, and we have found that they often pay to play,” Mr. Lawsky said. “The question then becomes, are students getting the best deals or, as we found in the student loan industry, are universities entering into financial arrangements that benefit them at the expense of students?”

Don’t Buy That Textbook, Download It Free

SQUINT hard, and textbook publishers can look a lot like drug makers. They both make money from doing obvious good — healing, educating — and they both have customers who may be willing to sacrifice their last pennies to buy what these companies are selling.

It is that fact that can suddenly turn the good guys into bad guys, especially when the prices they charge are compared with generic drugs or ordinary books. A final similarity, in the words of R. Preston McAfee, an economics professor at Cal Tech, is that both textbook publishers and drug makers benefit from the problem of “moral hazards” — that is, the doctor who prescribes medication and the professor who requires a textbook don’t have to bear the cost and thus usually don’t think twice about it.

“The person who pays for the book, the parent or the student, doesn’t choose it,” he said. “There is this sort of creep. It’s always O.K. to add $5.”

In protest of what he says are textbooks’ intolerably high prices — and the dumbing down of their content to appeal to the widest possible market — Professor McAfee has put his introductory economics textbook online free. He says he most likely could have earned a $100,000 advance on the book had he gone the traditional publishing route, and it would have had a list price approaching $200.

“This market is not working very well — except for the shareholders in the textbook publishers,” he said. “We have lots of knowledge, but we are not getting it out.”



While still on the periphery of the academic world, his volume, “Introduction to Economic Analysis,” is being used at some colleges, including Harvard and Claremont-McKenna, a private liberal arts college in Claremont, Calif..

And that, in a nutshell, is a big difference between textbook publishers and the drug makers. Sure, there have been scientists with Professor McAfee’s attitude — Jonas Salk was asked who owned the patent to the polio vaccine and scoffed: “Could you patent the sun?”

For the textbook makers, however, it is a different story. Professor McAfee allows anyone to download a Word file or PDF of his book, while also taking advantage of the growing marketplace for print on demand.

In true economist fashion, he has allowed two companies, Lulu and Flat World Knowledge, to sell print versions of his textbook, with Lulu charging $11 and Flat World anywhere from $19.95 to $59.95. As he said on his Web site, he is keeping the multiple options to “further constrain their ability to engage in monopoly pricing.”

A broader effort to publish free textbooks is called Connexions, which was the brainchild of Richard G. Baraniuk, an engineering professor at Rice University, which has received $6 million from the William and Flora Hewlett Foundation. In addition to being a repository for textbooks covering a wide range of subjects and educational levels, its ethic is taken from the digital music world, he said — rip, burn and mash.

Unlike other projects that share course materials, notably OpenCourseWare at M.I.T., Connexions uses broader Creative Commons license allowing students and teachers to rewrite and edit material as long as the originator is credited. Teachers put up material, called “modules,” and then mix and match their work with others’ to create a collection of material for students. “We are changing textbook publishing from a pipeline to an ecosystem,” he said.

Like Professor McAfee, Professor Baraniuk says he decided to share his material while writing a textbook.

“If I had finished my own book, I would have finished a couple years ago,” he said. “It would have taken five years. It would have spent five years in print and sold 2,000 copies.” Instead, he said, he posted it on the Web site and there have been 2.8 million page views of his textbook, “Signals and Systems,” including a translation into Spanish.

Connexions is strongest in statistics and electrical engineering — areas with technologically advanced students and a greater need to update material than, say, works on medieval history. He said there were 850,000 unique users a month, with more than 50 percent of the traffic originating from outside the United States.

“It’s anyone’s guess as to when we will break through,” he said.

Saturday, September 13, 2008

Google Patches Security Vulnerabilities in Chrome

Google has issued an update for its Chrome browser to address four security issues. Chrome, still in beta, has attracted attention as Google looks to challenge Microsoft Internet Explorer, Mozilla's Firefox and other browsers.

Google has updated its Chrome browser to address some of the security vulnerabilities uncovered in the week-old beta.

The update patches a buffer overflow vulnerability that exists in the handling of long file names that display in the ‘SaveAs’ dialog. The update also fixes a second buffer overflow vulnerability in the handling link targets displayed in the status area when the user hovers over a link. In its advisory, Google classified both vulnerabilities as critical, stating they could allow hackers to execute code.

The update also fixes an out-of-bounds memory read when parsing URLs ending with :%. According to the advisory, the situation could cause the browser to crash. In addition, the update changes the default Downloads directory if it is set to Desktop to limit the risk of malicious cluttering of the desktop with unwanted downloads.

Though only in beta, Chrome has generated a significant amount of interest from the security community, and has become a target for anyone looking to test its security chops against rival browsers such as Microsoft Internet Explorer and Apple’s Safari. For example, security researcher Aviv Raff last week demonstrated a proof of concept for an attack taking advantage of a Java bug and Google’s use of an old version of WebKit. Thus far, the issue has not been fixed.

In addition to hammering out some of the beta’s security dents, the update fixes a JavaScript bug affecting Facebook.com as well as some data transfer issues with the Safe Browsing service causing unnecessary traffic.

Keep Ahead of the Hackers

Stay Ahead of Vulnerabilities and Mitigate the Risk of Breaches

The following are best-practices tips for staying ahead of database vulnerabilities and for mitigating the risk of an enterprise breach.

Stay patched. Intruders seek out known vulnerabilities and will exploit them when possible. A crucial element of securing the database is to ensure that patches are implemented in a timely manner and known vulnerabilities are monitored in real time.

Automate security tasks as a regular part of database maintenance. So much of security relies on regular assessments and validation; the day-to-day work can quickly decline into tedium and get overlooked. Through automation of security processes, security professionals can schedule routine tasks and reports. Today's database security solutions enable users to schedule tasks, manage tasks concurrently, and issue notifications and alerts. Automated report generation and delivery further simplifies the process of keeping stakeholders (auditors, regulators and security staff) informed.

Keep protections current. Utilizing software that provides regular security updates for patches, new threats and known vulnerabilities is essential to protecting the database and containing risk.

Concentrate on providing multiple layers of security. Protecting data at its source, the database, is essential to preventing breaches and data loss. Even with traditional perimeter security measures in place, the best way to defend against data harvesting (where attackers remove or damage large amounts of data) is to rely on a layered defense model that necessarily includes the database.

Audit systems regularly and address issues as they arise. Conducting regular audits will ensure that security policies are on track and will help to identify irregularities or potential breaches before it's too late. Utilizing security auditing tools will assist in monitoring and recording what is happening within the database and provide alerts when suspicious or abnormal activity occurs. These best practices help to secure an organization's databases from internal as well as external threats.

Encrypt data as appropriate. Encryption is an important last line of defense and a requirement of many compliance recommendations. Encryption is particularly important for data in transit, backup files and data stored outside of the database or on mobile devices such as laptops, tapes and memory sticks.

Continuously monitor and maintain systems. Database security is an ongoing process. Security professionals must continually monitor systems to ensure compliance while they evaluate and respond to the changing threat environment. Adhering to a recognized system, like the Database Security Vulnerability Management Lifecycle, can optimize an organization's ability to understand and mitigate risk, according to Julian.

Implement database intrusion detection and auditing, especially to manage the gap of time between patch release and deployment on your systems. Audits and vulnerability assessments serve to provide an excellent starting point to address security risks. This baseline should be augmented with real-time detection policies. Implementing an alert system that delivers intrusion detection warnings in real time ensures up-to-the-minute security awareness.

Database Security

Here are some basic database security steps enterprises can take that will improve their database security postures in just one day.

Change your default passwords. Every database Oracle has ever shipped has come with a set of default accounts and passwords. These user names and passwords are well known and documented.

"Default passwords are problematic, because they leave the front door to your database wide open," Julian said.

There are currently over 600 known default user name and password combinations and probably a dozen free tools to scan for them, Julian said.

There are also several other free scripts and tools available:
—Checkpwd from Red Database Security
—DPS (Default Password Scanner) from Oracle
—Oracle Security Probe from Pete Finnigan (written by Marcel-Jan Krijgsman)

By the way, Oracle11g includes a built-in DBA view to list default passwords (DBA_USERS_WITH_DEFPWD).

Eliminate easily guessed passwords. One of the most common attack vectors to this day is access via passwords that can be easily guessed. Attackers are aware that people use test/test or other password the same as the user name—even on production databases. There are even password dictionaries that provide common passwords.

Many hackers take advantage of wordlists. These are intended primarily for use with password crackers to gain access to systems.

Require strong passwords. Using and enforcing strong passwords can significantly enhance database security. There are a few keys to developing strong passwords:

Consider the length. Each character that a password includes increases the security of that password. Passwords should be eight or more characters in length; 14 characters or longer is ideal. A 15-character password composed only of random letters and numbers is about 33,000 times stronger than an eight-character password that uses characters from the entire keyboard.

Incorporate complexity. Combine letters, numbers and symbols to increase the variety of characters used in the password. Many systems also support use of the space bar in passwords, so you can create a phrase made of many words (a "pass phrase"). A pass phrase is often easier to remember than a simple password, as well as longer and harder to guess. Avoid sequences, repeated characters and look-alike substitutions.

Additionally, for Oracle passwords specifically, passwords must begin with an ASCII letter. From there, ASCII letters a-z, _, #, $, and digits 0-9 are eligible. The space bar is not supported in passwords. Oracle 11g also supports case-sensitive passwords; other versions convert any password into uppercase letters.

Use variety. Use more than one password in your environment; the more you are using, the more difficult it is for malicious users to break them.

Additional steps to take include:
· Set a listener password
· Install the latest service pack
· Lock out accounts that are not in use
· Revoke permissions to PUBLIC that are not explicitly required

While implementing database security takes time and effort, by addressing these items organizations can significantly improve their security posture by eliminating these common areas of risk.

Keys to Locking Down Storage Security on a Database

Enterprises most often keep their most valued data in structured storage inside a database of some kind, and hackers know it. Security consultant Ted Julian of Application Security offers a detailed look in several steps at how he believes database security should be implemented, starting with data discovery and moving all the way through the implementation of intrusion detection.

All storage, structured or unstructured, requires security of some kind, even if it's simply flipping an on/off switch or pulling the USB plug on a direct-attached external disk.

Database storage security, the subject of this article, can be slightly more complicated than that.

I talked recently with Ted Julian, vice president of consultancy Application Security, about the often-thorny security issues surrounding structured content in databases. Julian drew up a detailed look, in several steps, at what he sees as important in database security, starting with data discovery and moving all the way through how to implement intrusion detection.

The Starting Point: Data Discovery

First of all, you need to know exactly what you are securing.

"This is perhaps one of the easiest, yet most critical, steps in getting started in protecting your data—knowing where it is," Julian said. "The point being that, if you are looking to shore up protection against attacks on your data, if you aren't sure where that data resides, chances are that it's not currently protected. Once you can establish where your databases are residing within your environment, you can get started on assessing your overall environment and taking an inventory of your data assets."

Julian said database administrators need to inventory all databases, identify the vulnerabilities that are present and create a baseline of current security assets for ongoing comparison.

The ability to track and monitor progress is an important component of most compliance initiatives. This process will help organizations identify common flaws, including unpatched systems, weak or default passwords, excessive privileges and a lack of system monitoring. The task can be streamlined by utilizing technological solutions to assist with discovery, to establish a security posture baseline and to generate fix scripts to speed along remediation.

A complete database security solution will also include policies to monitor for threats and vulnerabilities in real time, Julian said.

DBAs need to prioritize their most pressing issues up front.

"Comprehensive database security efforts are based on vulnerability and threat data, including vulnerability severity and the criticality of the database information," Julian said. "Once priorities are documented, an organization should to enact a formal security plan, report on progress and demonstrate ongoing improvement."

HTTPS Cookie-Hijacking Tool CookieMonster Gobbles Personal Data

Web browsing on SSL sites may not be as secure as you think. Security researcher Mike Perry has released additional details about his CookieMonster tool, which can be used to steal private data via HTTPS cookies. Mike Perry spoke about the issue at the Defcon security conference.

Talk of HTTPS cookie hijacking is pushing its way toward the front of the line of security concerns with the release of details regarding an automated tool dubbed the CookieMonster.

The Python-based tool is the brainchild of reverse engineer Mike Perry, who spoke about HTTPS cookie hijacking at the Defcon 16 security conference in Las Vegas in August. Though Perry has put off making the tool available to the general public, he recently posted more details explaining how the tool works on his blog, which prompted the SANS Institute to give a heads-up.

With HTTPS cookies in their metaphorical jar, cyber-crooks could potentially access online accounts. In an overview, Perry described CookieMonster as an automated tool that can be configured to steal the cookies for a specific list of domains for every client IP on the local network. The tool is also able to compromise arbitrary insecure SSL (Secure Sockets Layer) sites without the need to provide such a target list.

"Basically, [the issue] revolves around the fact that cookies have two modes: secure and insecure," Perry wrote in a blog post. "If a cookie is insecure, a browser will transmit it for plain old HTTP connections, and an active attacker can then inject a set of HTTP images for sites that they want cookies for, and the browser will happily transmit cookies for these sites unencrypted, allowing their capture."

In addition to insecure HTTPS cookies, CookieMonster also steals URL-based session ID details, which are used to prevent cross-site request forgery.

According to Perry, the injection mechanism is the airpwn-style TCP race condition attack. Currently, only open and WEP (Wired Equivalent Privacy) wireless injection is supported.

"Since CookieMonster is local, it is able to respond to arbitrary Web requests considerably faster than the actual Web server," he wrote in a separate overview of the tool. "This allows us to hijack any connections we wish."

To check whether a Web site is vulnerable using Firefox, users can go to the Privacy tab in the Preferences window and select Show Cookies.

"For a given site, inspect the individual cookies for the top-level name of the site, and any subdomain names, and if any have 'Send For: Encrypted connections only,' delete them," Perry explained on his blog. "Then try to visit your site again. If it still allows you in, the site is insecure and your session can be stolen. You should report this to the site maintainer."

Former Intel Employee Accused of Stealing Corporate Data Points Up Insider Threat

Rate This Article:
Poor Best
Add This Article To:
Digg this

Del.icio.us

Slashdot

Y! My Web

E-mail

Print

Furl

Google

Simpy

Spurl!

PDF Version
A former Intel employee stands accused of stealing data from Intel after secretly beginning to work for rival chip maker AMD. The incident, described in a criminal complaint filed in federal court in Boston, underscores the importance of controlling and monitoring access to corporate data.

The alleged theft of trade secrets from Intel by a former employee offers yet another reminder of the importance of monitoring and controlling access to corporate data.

According to reports, ex-Intel engineer Biswamohan Pani has been accused by the FBI of stealing trade secrets from Intel while he secretly worked for the company's chief rival, Advanced Micro Devices. The allegations were made in a criminal complaint filed in U.S. District Court in Boston in late August.

In an affidavit by FBI Special Agent Timothy Russell of the bureau's Boston computer crime squad, it is stated that Pani told officials at Intel in May he was resigning to work for a hedge fund and would utilize accrued vacation time until his final official day June 11. However, allegedly, Pani began working for AMD June 2 and soon after accessed and downloaded 13 secret documents from an encrypted system at Intel.

When rumors that Pani was working for both companies began to circulate, Intel reportedly checked to see if Pani was accessing confidential documents and then called the FBI. A July 1 search of Pani's home turned up eight Intel documents classified as confidential, secret or top secret, according to the affidavit.

Pani no longer works for AMD, and has denied any wrongdoing. But regardless, the accusations provide another clear example of the importance of keeping track of user access to confidential data.

Brian Cleary, vice president of products and marketing at enterprise access governance company Aveksa, argued that any user in that role with access to that type of information should have had those access rights immediately revoked after giving notice of resignation. However, as SailPoint Technologies CEO Mark McClain pointed out, as long as employees are in good standing it is common practice to allow them continued access while they are still employed.

"However, it makes sense to take mitigating steps because employees that have given notice should be considered higher than average risk," McClain said. "For instance, it probably makes sense to monitor the activity of these employees, how they are using access."

Sunday, September 7, 2008

Miscellaneous

The Google toolbar
If you have the Google toolbar installed in your browser, you will be used to seeing each page's PageRank as you browse the web. But all isn't always as it seems. Many pages that Google displays the PageRank for haven't been indexed in Google and certainly don't have any PageRank in their own right. What is happening is that one or more pages on the site have been indexed and a PageRank has been calculated. The PageRank figure for the site's pages that haven't been indexed is allocated on the fly - just for your toolbar. The PageRank itself doesn't exist.

It's important to know this so that you can avoid exchanging links with pages that really don't have any PageRank of their own. Before making exchanges, search for the page on Google to make sure that it is indexed.

Sub-directories
Some people believe that Google drops a page's PageRank by a value of 1 for each sub-directory level below the root directory. E.g. if the value of pages in the root directory is generally around 4, then pages in the next directory level down will be generally around 3, and so on down the levels. Other people (including me) don't accept that at all. Either way, because some spiders tend to avoid deep sub-directories, it is generally considered to be beneficial to keep directory structures shallow (directories one or two levels below the root).

ODP and Yahoo!
It used to be thought that Google gave a Pagerank boost to sites that are listed in the Yahoo! and ODP (a.k.a. DMOZ) directories, but these days general opinion is that they don't. There is certainly a PageRank gain for sites that are listed in those directories, but the reason for it is now thought to be this:-

Google spiders the directories just like any other site and their pages have decent PageRank and so they are good inbound links to have. In the case of the ODP, Google's directory is a copy of the ODP directory. Each time that sites are added and dropped from the ODP, they are added and dropped from Google's directory when they next update it. The entry in Google's directory is yet another good, PageRank boosting, inbound link. Also, the ODP data is used for searches on a myriad of websites - more inbound links!

Listings in the ODP are free but, because sites are reviewed by hand, it can take quite a long time to get in. The sooner a working site is submitted, the better. For tips on submitting to DMOZ, see this this DMOZ article.

Comments and suggestions
Comments and suggestions are welcomed. Please post in the forum if you have any.

Further information and resources
# Another PageRank Explained article (by Ian Rogers): here
# Internet marketing articles, tips, tricks and secrets: here


Second Life is FREE!
Second Life is an online 3-D world with over 8 million residents. That many people can't be wrong.


Website Design
Los Angeles
UK Holidays
searchable database of
UK Holiday Accommodation
UK accommodation directory

►► SEO Forum ◄◄
Expert search engine optimization help, advice, discussion, information.
►► SEO Blog ◄◄
SEO Articles
Search engine optimization articles
Google articles
SEO Tools
PageRank calculator
About Phil Craven
Home of PageRank

website design
Webmaster Radio

Web Hosting Reviews
Web Hosting Reviews

[ HOME ] [ TOP ] [ FEEDBACK & SEO FORUM ] [ SEO BLOG ]


© Copyright WebWorkshop. All rights reserved.

{alt}
The articles on this website may be reproduced in whole or in pa

So how much additional PageRank do we need to move up the toolbar?

First, let me explain in more detail why the values shown in the Google toolbar are not the actual PageRank figures. According to the equation, and to the creators of Google, the billions of pages on the web average out to a PageRank of 1.0 per page. So the total PageRank on the web is equal to the number of pages on the web * 1, which equals a lot of PageRank spread around the web.

The Google toolbar range is from 1 to 10. (They sometimes show 0, but that figure isn't believed to be a PageRank calculation result). What Google does is divide the full range of actual PageRanks on the web into 10 parts - each part is represented by a value as shown in the toolbar. So the toolbar values only show what part of the overall range a page's PageRank is in, and not the actual PageRank itself. The numbers in the toolbar are just labels.

Whether or not the overall range is divided into 10 equal parts is a matter for debate - Google aren't saying. But because it is much harder to move up a toolbar point at the higher end than it is at the lower end, many people (including me) believe that the divisions are based on a logarithmic scale, or something very similar, rather than the equal divisions of a linear scale.

Let's assume that it is a logarithmic, base 10 scale, and that it takes 10 properly linked new pages to move a site's important page up 1 toolbar point. It will take 100 new pages to move it up another point, 1000 new pages to move it up one more, 10,000 to the next, and so on. That's why moving up at the lower end is much easier that at the higher end.

In reality, the base is unlikely to be 10. Some people think it is around the 5 or 6 mark, and maybe even less. Even so, it still gets progressively harder to move up a toolbar point at the higher end of the scale.

Note that as the number of pages on the web increases, so does the total PageRank on the web, and as the total PageRank increases, the positions of the divisions in the overall scale must change. As a result, some pages drop a toolbar point for no 'apparent' reason. If the page's actual PageRank was only just above a division in the scale, the addition of new pages to the web would cause the division to move up slightly and the page would end up just below the division. Google's index is always increasing and they re-evaluate each of the pages on more or less a monthly basis. It's known as the "Google dance". When the dance is over, some pages will have dropped a toolbar point. A number of new pages might be all that is needed to get the point back after the next dance.

The toolbar value is a good indicator of a page's PageRank but it only indicates that a page is in a certain range of the overall scale. One PR5 page could be just above the PR5 division and another PR5 page could be just below the PR6 division - almost a whole division (toolbar point) between them.

Inbound links

Inbound links (links into the site from the outside) are one way to increase a site's total PageRank. The other is to add more pages. Where the links come from doesn't matter. Google recognizes that a webmaster has no control over other sites linking into a site, and so sites are not penalized because of where the links come from. There is an exception to this rule but it is rare and doesn't concern this article. It isn't something that a webmaster can accidentally do.

The linking page's PageRank is important, but so is the number of links going from that page. For instance, if you are the only link from a page that has a lowly PR2, you will receive an injection of 0.15 + 0.85(2/1) = 1.85 into your site, whereas a link from a PR8 page that has another 99 links from it will increase your site's PageRank by 0.15 + 0.85(7/100) = 0.2095. Clearly, the PR2 link is much better - or is it? See here for a probable reason why this is not the case.

Once the PageRank is injected into your site, the calculations are done again and each page's PageRank is changed. Depending on the internal link structure, some pages' PageRank is increased, some are unchanged but no pages lose any PageRank.

It is beneficial to have the inbound links coming to the pages to which you are channeling your PageRank. A PageRank injection to any other page will be spread around the site through the internal links. The important pages will receive an increase, but not as much of an increase as when they are linked to directly. The page that receives the inbound link, makes the biggest gain.

It is easy to think of our site as being a small, self-contained network of pages. When we do the PageRank calculations we are dealing with our small network. If we make a link to another site, we lose some of our network's PageRank, and if we receive a link, our network's PageRank is added to. But it isn't like that. For the PageRank calculations, there is only one network - every page that Google has in its index. Each iteration of the calculation is done on the entire network and not on individual websites.

Because the entire network is interlinked, and every link and every page plays its part in each iteration of the calculations, it is impossible for us to calculate the effect of inbound links to our site with any realistic accuracy.

Dangling links

"Dangling links are simply links that point to any page with no outgoing links. They affect the model because it is not clear where their weight should be distributed, and there are a large number of them. Often these dangling links are simply pages that we have not downloaded yet..........Because dangling links do not affect the ranking of any other page directly, we simply remove them from the system until all the PageRanks are calculated. After all the PageRanks are calculated they can be added back in without affecting things significantly." - extract from the original PageRank paper by Google’s founders, Sergey Brin and Lawrence Page.

A dangling link is a link to a page that has no links going from it, or a link to a page that Google hasn't indexed. In both cases Google removes the links shortly after the start of the calculations and reinstates them shortly before the calculations are finished. In this way, their effect on the PageRank of other pages in minimal.

The results shown in Example 1 (right diag.) are wrong because page B has no links going from it, and so the link from page A to page B is dangling and would be removed from the calculations. The results of the calculations would show all three pages as having 0.15.

It may suit site functionality to link to pages that have no links going from them without losing any PageRank from the other pages but it would be waste of potential PageRank. Take a look at this example. The site's potential is 5 because it has 5 pages, but without page E linked in, the site only has 4.15.

Link page A to page E and click Calculate. Notice that the site's total has gone down very significantly. But, because the new link is dangling and would be removed from the calculations, we can ignore the new total and assume the previous 4.15 to be true. That's the effect of functionally useful, dangling links in the site. There's no overall PageRank loss.

However, some of the site's potential total is still being wasted, so link Page E back to Page A and click Calculate. Now we have the maximum PageRank that is possible with 5 pages. Nothing is being wasted.

Although it may be functionally good to link to pages within the site without those pages linking out again, it is bad for PageRank. It is pointless wasting PageRank unnecessarily, so always make sure that every page in the site links out to at least one other page in the site.