Category: News

  • Best Buy Black Friday Sales

    The Best Buy Black Friday Sales start at 5:00 am on November 27, 2009. If you find cannot wait till Thanksgiving, best Buy is opening their online doors Thursday at 2:00 am with the same deals that will be offered the following day. Because of the sheer size of Best Buy, if you make a purchase online, it is advised to make your selection as an in-store pickup and print out a copy of the ad with you to the store. All stores will be extremely busy and this will help reduce any problems that might occur.

    The sale items that will be offered online are supposed to be the same as what is being offered in the stores but may vary from location to location. Check with the availability of the product you want to purchase before you select it.

    Presently online there are selected items that are marked at below black Friday prices. A few examples are the Motorola H710 Noise cancelling Bluetooth headsets for $39.99 and the Dell 10.1” netbook with Intel Atom Processor, 1GB of memory and 160 GB harddive for just $379.99.

    The Pre-Black Friday 4-day Sale at best Buy stated November 22 and will run thru Wednesday the 26th of November. Many of the items will still be at this reduced price on Friday but some will have to be raised. The opportunity is now to find the best items at the lowest price while supplies last at the pre Best Buy Black Friday Sales going on now.

  • Bauer-Power Episode 14

    Hello out there to everyone on the big WWW! It is that time again after three months or so for another episode of the highly acclaimed, IPTV show Bauer-Power!

    In this episode, Paul talks about Ubuntu 9.10, as well as some controversies with Karmic Koala, plus the release of Bauer-Puntu 9.10. Sundance talks about beta software that sucks including Twitter and Facebook plug-ins for Xbox, Google’s Chrome OS, and Office 2010. Along with our ramblings, we have also created a public service announcement for those who wear blue tooth headsets all the time, and have put together a random montage of bikini’s, time travel, fast cars, egg nog, and Thanksgiving. Enjoy!

    This will probably be the last episode in this format. I spoke to my co-host Sundance about it, and he agrees that our shows are way too long for internet attention spans. We will go with a one how-to topic/one funny bit segment format per month now. Our goal is to get every new show down to 10 minutes or less so we can broaden our reach as far as video hosting sites go. Right now our videos are way too long for Youtube, and that is probably the best site to be.

    You can add our show to your iPod/iPhone by subscribing to the show’s RSS feed here: http://bauer-power.blip.tv/rss

    Please visit the links to our sponsors!

    As always, we welcome your feedback, so please hit us up in the comments!

  • Google Chrome Extensions Gallery Opens Up for Developers

    Google Chrome extensions are here for everyone. Well, almost, for everyone who’s a developer. The extensions gallery which we’ve been getting hints of for more than a week now is finally open for business, but for the moment, only to allow developers to upload their extensions. The gallery went live just as Google updated the dev channel to Chrome 4.0.249.11, a small update which fixes a couple of things.

    “During the last few months, our team has been working hard to support extensions in Google Chrome’s beta channel. Today, we are getting one step closer to this goal; developers can now upload their extensions to Google Chrome’s extension gallery. We are making the upload flow available early to make sure that developers have the time to publish their extensions ahead of our full launch,” Lei Zheng, a software engineer at Google, wrote.

    This is one of the last steps before launching extension support in the beta version and launching the dedicated gallery. But Google can’t launch an empty gallery, so it’s giving developers a chance to upload their creations. For the most part, it should be a seamless process, at the very least developers have to submit the code and an icon, but they also have the option to include some text, screenshots of the extension in action, and even a YouTub… (read more)

  • Work With Me One On One To Destress Yourself

    If you are stressed and would like to work with me please email me at [email protected] or call 661-877-7800.  My programs are inexpensive and personally suited to your specific needs.  This is not therapy, it is a step by step educational  process that I take you through in order to Destress Yourself.

    ABOUT DESTRESS YOURSELF DOT COM & ME

    If you are suicidal please call The National Suicide Prevention Lifeline at 1-800-273-8255 or 911.

    I hope to hear from you because if you are stressed I know I can help.

    Have a wonderful day and don’t forget to have fun and be playful…

    Elizabeth

  • Beijing’s Caijing Magazine Refuses To Go Down Without A Fight

    Caijing

    Beijing’s excellent Caijing magazine has suffered crippling blows to its staff, after seeing the departure of its top writers.

    Yet the remaining editorial team, apparently now just 20 people compared to 200 not too long before, isn’t giving up. Their latest issue makes it clear that they’ll fight to keep Caijing alive:

    Caijing, via China Realtime Report: Overnight, an editorial team that took 12 years to put together up and left. It was this team that achieved a leading position in the industry, and turned Caijing magazine into a top brand. Ms. Hu Shuli, the representative figure of this team, also won applause from both our readers and public, thanks to her sharp personality and her commitment to ideals. I deeply regret the separation from a partner of so many years.

    the last two weeks I have spent a lot of time pondering this – why is it that this magazine, that holds such a special place in China, has to fact such a severe challenge? I’m still not sure whether I have found the answer yet. But one thing I understand very clearly is that the responsibility that I bear and the responsibility borne by the SEEC [Stock Exchange Executive Council], the owner of the magazine, is not is not alleviated by one bit, instead, it is heavier than before.

    In my heart, Caijing doesn’t only belong to its founders and managers. Neither does it belong only to you — our most respected readers. Caijing also belongs to the social justice and conscience that you represent, and Caijing belongs to a more reformed and more open China.

    Time will only tell if Caijing can live up to it’s past reputation, and even perhaps exceed it. Deep down, what made the magazine great was the freshness of its critical commentary regarding sensitive Chinese issues. Such critical analysis doesn’t take 200 people, nor does it take 20. It just takes one willing writer. If Caijing can realize this, and continue with it’s tradition, then their smaller numbers won’t matter. Just crank out a few quality pieces per month and we bet readers will stay loyal.

    Check out Caijing here.

    Join the conversation about this story »

    See Also:

  • PS3 Slims having syncing issues after patch 3.10?

       Have you encountered any syncing problems on your PS3’s after installing the latest firmware update 3.10? If yes, don’t worry, you’re not…

  • Lebanon & MENA Weekly Economic Reports – Weeks 44/5/6

    MWM-Week-44.pdf
    LWM-Week-44.pdf

    MWM-Week-46.pdf
    LWM-Week-46.pdf

    MWM-Week-45.pdf
    LWM-Week-45.pdf

    tags: economic, report, economy, lebanon, finance, financial, pdf, lebanese, bank, beirut, middle east, north africa

  • Filmmaker Allowed To Use The Name Rin Tin Tin To Describe Rin Tin Tin

    Looks like the courts got one right concerning a trademark claim involving famed movie dog Rin Tin Tin. It seems that some movie makers wanted to make a movie about Rin Tin Tin, which seemed reasonable enough. However, Rin Tin Tin Inc., a company that continues to breed “Rin Tin Tin dogs” for movies objected to the use of the name, saying that since they held the trademark on Rin Tin Tin, the movie was infringing. Thankfully, the judge disagreed, noting that the movie is about Rin Tin Tin, and thus was descriptive and a perfectly reasonable use of the name.

    Permalink | Comments | Email This Story





  • Bill Gross’s Government Bond Holdings Hit 5-Year High

    billgross generic tbi

    Bill Gross’s Pimco Total Return Fund is now the most heavily invested in U.S. government-related debt that it’s been since 2004.

    63% of the mammoth fund’s $192.6 billion in assets are now parked in debt backed by the full faith and credit of the U.S. taxpayer.

    It’s a clear sign that Mr. Gross doesn’t see interest rates or inflation rising any time soon. It also shows that he isn’t worried about foreigners ditching U.S. bonds due to American budget concerns either. (Since such an event would trigger rising interest rates, hurting government bond prices)

    Unfortunately his benign inflation and interest rate outlook also means that he doesn’t see the U.S. economy accelerating beyond the modest rebound it has staged already. Note he’s also cut his mortgage exposure to the lowest level since 2004 as well.

    Bloomberg: “With unemployment in the double digits and likely to stay close to that for the next six months despite job creation ahead, the Fed has no where to go, [ie., Can’t raise interest rates]” Gross, co-founder and co- chief investment officer of Pimco, said in a Bloomberg Television interview on Nov. 19 from Newport Beach, California.

    Join the conversation about this story »

    See Also:

  • Melting Ice in Greenland Responsible for 1/6 of Sea Level Increase

    Greenland-Ice.jpg
    With the buzz surrounding climate talks in Copenhagen next month, the news about climate change is rather grim. For example, researchers have documented Greenland has lost “1500 cubic kilometres of ice between 2000 and 2008, making it responsible for one-sixth of global sea-level rise. Even worse, there are signs that the rate of ice loss is increasing.”
    1/6 of sea-level rise translates to “0.75 millimetres per year”. That may not sound like much, but year after year the effect is cumulative.


  • ROBOREX

    Still a bit of a work in progress but pretty much there, starting to get the hang of poly modeling a bit more. Any guesses on who inspired the paint job?
  • Stewardship of insect protection — an update in Journal of Economic Entomology

    Insect Resistance to Bt Crops can be Predicted, Monitored, and Managed

    Since 1996, crop plants genetically modified to produce bacterial proteins that are toxic to certain insects, yet safe for people, have been planted on more than 200 million hectares worldwide. The popularity of these Bt crops, named after the bacterium Bacillus thuringiensis, comes from their ability to kill some major pests, allowing farmers to save money and lessen environmental impacts by reducing insecticide sprays.
    However, since insects can evolve resistance to toxins, strategies must be implemented to ensure that Bt crops remain effective. A new study published in the December issue of Journal of Economic Entomology entitled “Field-Evolved Insect Resistance to Bt Crops: Definition, Theory, and Data” (http://www.entsoc.org/btcrops.pdf) analyzes insect resistance data from five continents, as reported in 41 studies, and concludes that existing theories and strategies can be used to predict, monitor, and manage insect resistance to Bt crops.

    According to lead author Dr. Bruce E. Tabashnik, “Resistance is not something to be afraid of, but something that we expect and can manage if we understand it. Dozens of studies monitoring how pests have responded to Bt crops have created a treasure trove of data showing that resistance has emerged in a few pest populations, but not in most others. By systematically analyzing the extensive data, we can learn what accelerates resistance and what delays it. With this knowledge, we can more effectively predict and thwart pest resistance.”

    Among the authors’ conclusions are:
    · The refuge strategy (growing non-Bt crops near the Bt crops) can slow the evolution of insect resistance by increasing the chances of resistant insects mating with non-resistant ones, resulting in non-resistant offspring.
    · Crops that are “pyramided” to incorporate two or more Bt toxins are more effective at controlling insect resistance when they are used independently from crops that contain only one Bt toxin.
    · Resistance monitoring can be especially effective when insects collected from the field include survivors from Bt crops.
    · DNA screening can complement traditional methods for monitoring resistance, such as exposing insects to toxins in the lab.
    · Despite a few documented cases of field-evolved resistance to the Bt toxins in transgenic crops, most insect pest populations are still susceptible.
    With Bt crop acreage increasing worldwide, incorporating enhanced understanding of observed patterns of field-evolved resistance into future resistance management strategies can help to minimize the drawbacks and maximize the benefits of current and future generations of transgenic crops.

    The full article is available at http://www.entsoc.org/btcrops.pdf.
    Bruce Tabashnik, the lead author can be contacted at [email protected] or 520-621-1141.

  • Day sets up shop in Boston (where tech firms go to be acquired?)

    The greater Boston area, no stranger to the Web CMS world (with companies like Percussion, PaperThin, Telerik US, and Refresh Software already based in the area), is about to add yet another content management mainstay to its denizens: Switzerland-based Day Software has announced it will move its US Headquarters to Boston (from Newport Beach, CA) on December 1.

    Kevin Cochrane, Day’s chief marketing officer, explained the move by saying: “It’s just inefficient for us to be anywhere other than Boston," adding that “the majority of the partners we need to work with today in the Enterprise 2.0 and Web 2.0 universe are in the Boston area…”

    Day’s relocation of its US headquarters to an area known for high technology probably makes good business sense, but Boston is also a hotbed of tech startups, IPOs, and merger-and-acquisition activity (or was, before the economic downturn). One wonders if Day might also be relocating to Boston to have easier access to capital markets and/or potential suitors.

    Certainly, many of Day’s activities over the past two years are consistent with those of a company primping itself in anticipation of sale — including installation of new leadership. The company got a new CEO, Erik Hansen (formerly with Interwoven), in May 2008. Later that year, Kevin Cochrane (another Interwoven alumnus) joined Day as its CMO. In August 2009, Day got a new Chairman of the Board when Barry Bycoff was elected to replace Michael Moppert.

    In tandem with the personnel alignments, the company showed a convincing return to profitability in the first half of 2009 (following the release of Day Communiqué 5.1, and a sudden surge of  "sloshover" business from the disruptions caused by the Interwoven and Vignette buyouts).

    Late in 2008, Day sold off its UK agency services subsidiary, MarketingNet, to advertising company WAA. Exactly the sort of thing that could be seen as a "trimming down" effort to clean up the balance sheet in anticipation of making the company suitor-ready.

    Interestingly, before joining Interwoven, CEO Erik Hansen had been VP of Sales in EMEA for Netegrity, Inc. (the enterprise security software company which was acquired by Computer Associates in 2004). Netegrity, in turn, was founded by Day Chairman Barry Bycoff — who lives in Boston.

    With the current economic down-cycle approaching (some would say it has actually passed) its nadir, there is bound to be a vigorous M&A market when investment capital finds its way back into the tech market. Companies positioned to catch the first wave of this capital may find themselves in an enviable position if too much capital chases too few opportunities. That may be exactly what Bycoff & Co. have in mind.

    Who knows? 2010 may be an even sunnier year for Day than 2009 was — if that’s possible.

  • Senators Begin Questioning ACTA Secrecy

    Despite some sweet talk from Hollywood about how important ACTA and its secret negotiations are to America (and, once again, no, the secrecy is not at all “normal,” as some industry lawyers would have you believe), it looks like some Senators are finally beginning to question how ACTA is being handled. Senators Bernie Sanders and Sherrod Brown have sent a letter to US Trade Rep Ron Kirk asking for ACTA documents to be made public. The letter points out that “the public has a right to monitor and express informed views on proposals of such magnitude” especially considering that “there are concerns about the impact of ACTA on the privacy and civil rights of individuals, on the supply of products under the first sale doctrine, on the markets for legitimate generic medicines, and on consumers and innovation in general.” The letter also takes on the bogus claims of state secrets in protecting ACTA documents:


    We are surprised and unpersuaded by assertions that disclosures of basic information about the negotiation would present a risk to the national security of the United States, particularly as regards documents that are shared with all countries in the negotiations, and with dozens of representatives of large corporations. We are concerned that the secrecy of such information reflects a desire to avoid potential criticism of substantive provisions in ACTA by the public, the group who will be most affected by the agreement. Such secrecy has already undermined public confidence in the ACTA process…. We firmly believe that the public has a right to know the contents of the proposals being considered under ACTA, just as they have the right to read the text of bills pending before Congress.”

    Unfortunately, these are just two Senators. Supporters of ACTA likely have many more who will blindly fight to keep ACTA secret and get it approved with little or no substantive input from those it will impact most.

    Permalink | Comments | Email This Story





  • Hacker and Security System

    If you see the title above will be remembered by the term Hacker, Cracker or even Carder. Many movies, novels or articles in magazines / newspapers that they will be reviewing it, actually who are they? Why now we need to concern about their eye out? Bbrp coincidence last week I was asked to fill out a seminar you know about Hacking & Networking on Linux in Jogja Expo Center.
    The word itself is often caused hacking means different, although the original is an activity to find out the weaknesses of a system and even how to improve the ability of a good system software or hardware. So take a particular skill, such as good programming skills or understanding of electronic hardware ttg great. Whereas in the film and the novel is described only as an activity to be breaking into a system to take an advantage. Perhaps the most appropriate description for the hacking is in the movie The Matrix Reloaded, where Trinity is using a tool nmap (Network Mapper). In addition, many movies are just playing with the animation for describing hackers. Too many do-just use another tool for artificial people through a system, without great effort, we often categorize them as just œScript Kiddiesâ â € €?? or children who play with a script someone else. Actually, to be a good hacker, many hrs do business better understand TCP / IP, learn programming etc..

    So why now we need to protect information systems in your company / organization we? Used at the time of the information system is still Closed Network and technology used its proprietary (pd specific certain companies), security threats are not so worry. Once we use the standard protocol TCP / IP (yg notebene elderly and simple), a network connected to the Internet, that’s when our system becomes an easy target for mischievous orang2 out there. But such conditions it requires, for example banks hrs open Internet Banking services, hotels or travel agents to provide Online Reservation, a company must provide an e-commerce site for customer convenience, etc..

    For that, I could not help the company must prepare a Security System (Security System) which according to the needs. One example is the firewall, such as self-employed security guard. Every guest went into an office, the guard will ask for the purpose, ask ID Card, then they will be recording our presence. The firewall will check every incoming access and compare with the policy, whether access is allowed or not. But it was not enough, then in the company must have installed CCTV Camera for supervising the activities inside. So although guests are allowed in, not necessarily that he did not do aneh2, for example, plant the bomb inside, steal something for take out, etc.. Usually Firewal addition, we will install IDS (Intrusion Detection System) which will oversee the data traffic, if any anomalies / peculiarities the IDS will alert could even get close the firewall for access connections at tsb.

    Also, still needed more Authentication system ensures access to-be who, whatever may be inside, and recording their activity. For securing the line in order not bugged, required encryption technologies (encryption) so that the data are not easily read by anyone. And also required a centralized system for supervising / configure all security systems, such as space-equipped security guard monitors and Button2 lot for various activities.

    Even more important is to teach to every user on the system for our company always careful when accessing a service exit. Type of attack-called Social Engineering Attack is an attack that utilizes user weaknesses. For example an email with the sender address for all users [email protected] request for to reply with include username and password, the reason will be upgraded to the new system. Or email asking us click to a website for downloading the latest antivirus demo, pdhl it is a virus or worm.

    So in securing a system, many things must be considered reply. Not just buying software or security devices and then just installed. Wow, so busy is also yes if a connected system exit. Hence there is a mantra in the world that the Security â € œThe most secure system is unconnected Systema €?? Â € |. or even if ya want to secure all follow his motto of Andrew S. Intel’s Grove is the founder of â € œOnly The Paranoid Surviveâ €??, Although it is actually more to the business strategy. Udahan dulu deh, meet again in another story.

    source : dagdigdug.com


  • Basic Computer System Security

    Written by Carter McNamara, MBA, PhD, Authenticity Consulting, LLC. Copyright 1997-2008.

    There are two kinds of security: data and break-in. Data security is addressed by having a good backup system (see next section on computer security). Break-in security is often a matter of using passwords to files or systems where possible, locking systems in offices and managing modem dial-in. Have the modem on only when sending or receiving.

    1. To avoid losing information stored on your computers when, e.g., a disk breaks (or “crashes”), ensure that computer files are regularly backed up to another media, e.g., backed up onto magnetic tapes, “zip” disk, CD-ROM, etc. Store the media offsite, that is, in a facility other than at your organization. If a disk crashes, you can repair the disk or get a new one and then restore the information from the backup media onto the new disk.Or, if backup media cannot be afforded (most are only a few hundred dollars), ensure files are stored on at least two different media devices, e.g., stored on an internal hard disk and then also on a diskette. Using a diskette as backup simply requires the computer user to occasionally save away his or her file to the diskette in addition to the hard disk. The same diskette can be used to backup files. Label the diskette with the time period during which files were backed up to it. Note that the major software applications themselves (Word, Excel, etc.) do not have to be backed up because the organization usually has the software application’s master diskettes. The most important items to backup are usually database files, spreadsheet files and large documents written by users. Conducting regular backups is more a matter of managerial policy than technical limitations.

    2. Use electrical surge protectors to ensure your computers will not experience sudden surges of electricity, e.g., during storms, if the quality of your electricity in your building is poor, or is the computer is turned off and on.

    3. Protect unauthorized access to computer files by using passwords to log-on to your system, if possible. Critical files can be copied onto two different diskettes (with one as a backup for the other) and both stored in locked drawers. Be sure to label the diskettes such that you’ll recognize them later by the name on the diskette label.

    4. Ensure that computers remain working as much as possible (that is, maximum their uptime) by recording and testing detailed procedures for all routine, but critical, tasks performed by staff on the computers and associated peripherals, e.g., for computer backups and restores, fixing recurring problems, etc. Locate and label the procedures in a central location of which all staff are aware.

    5. Develop competent internal technical support personnel who can help others to conduct basic activities on the computers and who can call outside consultants for troubleshooting when needed. Have one or two internal people who are designated as technical support contacts for other staff members.

    6. Instruct staff to report all problems to the internal technical support people. That way, the internal people are aware of all problems and are more likely to detect oncoming problems as early as possible. They also become better trained at detecting and diagnosing problems.

    7. Record all important phone numbers for technical support consultants or contacts, and ensure staff can find these numbers when needed.

    8. Keep all software documentation, such as manuals and guides, stored in a central location where staff can find them. Post a sheet on the wall so they can check documents out and for control to ensure they are returned.

    9. Promptly register all new software with the vendor to ensure you receive notification of regular software version updates and your eligibility to call the vendors for technical support if needed.

    10. Keep the serial numbers of all software packages in a clearly visible place for ease of reference when calling the software vendor’s technical support. (The vendor usually will ask you for the serial number to verify that you indeed purchased the software.)

    11. Note that if you dissemble your computer hardware, you risk losing coverage of your warranty. During your warranty period (which often covers labor during the first 90 days and hardware during the first one or two years), always call the vendor as soon as you suspect any problems. Problems usually occur during the first several weeks if they occur at all.

    12. Be sure to install a virus detector on your system. The detector should automatically check any new data brought into your system, for example, from diskettes, downloaded from the Internet, etc.

    13. Develop a disaster recovery plan. The plan should address contingencies. It should include procedures to respond to, e.g., if a disk crashes, if the computer quits working, if the network is down, if the building is somehow destroyed, etc.

    source : http://managementhelp.org


  • Brazil E-Voting Machines Not Hacked… But Van Eck Phreaking Allowed Hacker To Record Votes

    Last week, we noted that an attempt to let hackers crack e-voting machines in Brazil failed, but Slashdot points out that someone did use some Van Eck phreaking to figure out who people voted for. While that’s not quite the same as hacking the results of an election, it could lead to questions about privacy and how anonymous voting really is. Of course, to some extent, this has always been a risk with e-voting systems, but it hasn’t received that much attention.

    Permalink | Comments | Email This Story





  • New iPhone Ads From Apple Jab at Verizon

    AT&T wasn’t the only company that took offense to Verizon’s “There’s a Map for That” ad campaign and responded in kind. Monday night, Apple premiered two new iPhone ads that are actually aimed at pointing out the downsides of Verizon’s network, though they don’t state that outright.

    The two new ads, posted by BusinessWeek ahead of their U.S. television debut, depict different scenarios in which you want to access data-using features of your iPhone while also remaining on a call. This is something you can do on AT&T’s HSDPA/UMTS 3G network, but not something you can do using Verizon’s CDMA-based one.

    In the first ad, three different scenarios where you might want to check something without leaving your call are depicted. They include a client call, talking to a friend and changing a reservation, and talking to your wife and ordering flowers for your anniversary.

    The second ad depicts a single call with a friend, during which you can check movie times, location, and restaurant details. Both ads follow this post.

    The ads are clearly aimed at Verizon customers. I was actually completely unaware that the ability to use both voice calling and data access at the same time was even a feature. I do it constantly without even thinking about it. Would I miss it if I’d never had it to begin with? Hard to say.

    There’s another question the ads bring up. Does network reliability trump multitasking when it comes to cell phone usage? As convenient as it is to be able to pop in and out of the phone app to check on showtimes and other little luxuries, does it really matter if there are huge blackout zones where you can’t even take a call to begin with, let alone take one and use your network data simultaneously?

    In my opinion, these ads fare very poorly when compared to their Mac counterparts. The “Get a Mac” series of ads manages to target an Apple competitor cleverly, and in an entertaining fashion. Apple’s iPhone ads have never been anywhere near as good, but so far, they haven’t had to be. I’d expect more from Cupertino in response to the first real challenge to the iPhone’s market domination, Verizon’s Droid, than this sort of middle-of-the-road effort that doesn’t address the main concern customers wary of AT&T still have.

    Apple’s clearly doing this for AT&T, but both companies need to get their acts together if they want to counteract the clever work coming out of Verizon’s camp. Here’s a tip: A little Hodgman goes a Long way.


  • Check out the upcoming “Zombie Island DLC” trailer of Borderlands

    Gearbox Software’s upcoming downloadable content for Borderlands is said to add around six more hours of new gameplay. Titled “The Zombie Island of Dr…

  • Don’t Worry About Interest Rates — They’re A Phantom Menace

    PaulKrugman-0909-1

    A funny thing happened on the way to a new New Deal. A year ago, the only thing we had to fear was fear itself; today, the reigning doctrine in Washington appears to be “Be afraid. Be very afraid.”

    What happened? To be sure, “centrists” in the Senate have hobbled efforts to rescue the economy. But the evidence suggests that in addition to facing political opposition, President Obama and his inner circle have been intimidated by scare stories from Wall Street.

    Keep reading at NYT >

    Join the conversation about this story »

    See Also: