<div class=Southern Minnesota plane crash kills eight
" />

Southern Minnesota plane crash kills eight

Thursday, July 31, 2008

At least eight people have been killed in a plane crash near the southern Minnesota town of Owatonna, the Associated Press and local media reported Thursday morning.

One person, who had been listed in critical condition as of 11:40 a.m. in the Owatonna hospital has died from injuries sustained in the accident, the Associated Press reported just before 3:00 p.m. that afternoon. At least one person is unaccounted for while investigator determine whether the person boarded the plane in New Jersey, according to the Steele County Sheriff’s Office.

Star Tribune reported that charter flight 81, a Raytheon BAE 125-800A commercial jet, had not landed properly on the 5,500 foot runway at Owatonna Degner Regional Airport just after 9:30 a.m local time en route from Atlantic City, New Jersey. The plane either tried to take off or could not stop in time.

The plane was owned by East Coast Jets Inc. of Allentown, Pennsylvania. Aviation Research Group told the Star Tribune that East Coast Jets operates 11 aircraft — Hawker and Lear jets — and employs 21 pilots.

“They have a good safety history,” ARG President Joe Moeggenberg told the Star Tribune, based on federal data. “There were no recent incidents.”

This model of aircraft “has a very good safety record; been around along time,” said Gary Robb, aviation expert and attorney with a Kansas City law firm that represents aviation crash victims.

Gary Robb, an aviation expert and attorney told the Star Tribune that the aircraft “has a very good safety record [and has] been around along time.”

According to the Star Tribune, the pilots have been identified as Clark Keefer of Bethlehem, Pennsylvania, and Dan D’Ambrosio of Hellertown, Pennsylvania. Pilot error has not been identified as a cause for the crash, but investigators caution it is to early for any conclusions to be made.

Graphics released by the Star Tribune show that the plane ended up past the runway it was attempting to land on. The Associated Press reports that debris was scattered 500 feet beyond the runway.

The bodies have been taken to Rochester for examination, while the plane’s data recorders have been flown to Washington, DC.

Both WCCO-TV and the Star Tribune report that the time of the crash coincided with a line of storms moving through the area, though what effect, if any the storm had, is under investigation. Witnesses told the Star Tribune that the worst of the storm had gone at the time of the crash and only light wind and rain remained. The Associated Press confirms from the National Weather Service that “the storms were subsiding at the time of the crash.”

Owatonna resident John Billingsly, a retired pilot who worked at the airport for many years, told the Star Tribune, “I saw the plane making its final approach, and it appeared nothing was wrong. We’d just had a lot of wind, but it had calmed down a bit and mostly subsided by that time.”

The plane, a charter for Viracon, Inc. of Owatonna, was flying customers from “a couple of different companies” to discuss a $2 billion dollar casino and hotel project in Las Vegas, Nevada that Revel Entertainment is building. Atlantic City Mayor Scott Evans told the Associated Press that two high-level employees for Revel and an employee of Tishman Construction. Viracon is an architectural glass fabricator and Tishman is assisting Revel.

As of 5:00 a.m Friday, five of the victims, including the two pilots, have been identified by the Associated press.

APG International, a company specializing in glass facades, lost two executives: Marc Rosenberg, the chief operating officer, and Alan Barnett, an assistant project manager, according to the Glassboro, N.J. company’s spokeswoman Amelia Townsend.

The Tishman empoyee, the only victim identified, was project manager Karen Sandland, 44, based in Newark, New Jersey company spokesman Bud Perrone told the Associated Press.

The Revel employee’s idenities were released by the Star Tribune Friday, they are: Tony Craig, 50, of Brigantine, N.J., vice president of construction development; Chris Daul, 44, of Northfield, N.J., vice president of construction development; and Lawrence (Chip) Merrigan, 62, of Absecon N.J., director of field operations.

The crash is the deadliest in Minnesota since October 2002, when Minnesota Senator Paul Wellstone and seven others died after their chartered twin-engine plane crashed in the woods near Eveleth, in Northern Minnesota, according to the Star Tribune.

The National Transportation Safety Board (NTSB), an independent agency responsible for investigation of accidents involving aviation, highway, marine, pipelines and railroads in the United States (except aircraft of the armed forces and the intelligence agencies), will be investigating the crash.

The NTSB reported Friday through the Star Tribute that the agency has 14 investigators working on the crash, with assistance from the FBI.

The NTSB reports two other fatal accidents since 1962 at Owatonna airport. A crash in 1992 killed one and injured another and a crash in 2004 killed four people.

Retrieved from “https://en.wikinews.org/w/index.php?title=Southern_Minnesota_plane_crash_kills_eight&oldid=1468258”
Posted in Uncategorized
<div class=Plane crashes into office block in Austin, Texas
" />

Plane crashes into office block in Austin, Texas

Thursday, February 18, 2010

A small plane crashed into a building, which was one of the Echelon office complex, in north Austin, Texas this morning at 09:56 local time (1456 UTC).

Federal officials say the plane owner was Joseph Andrew Stack III; presumed to be the pilot who set his house on fire on the 1800 block of Dapplegrey Lane in north Austin an hour earlier. He then drove to Georgetown Municipal Airport, approximately 20 miles away, took off and then crashed his private plane into the Echelon complex.

The Federal Aviation Authority indicated the light aircraft was a Piper Cherokee PA-28, as did news reports and eye witnesses. The FAA said the plane had no flight plan and was under Visual Flight Rules.

Mr. Stack committed suicide, and a suicide note has been located. Mr. Stack’s suicide note mentions anti-government and anti-corporate ideals, as well as problems with the Internal Revenue Service and that he lost money in the Enron scandal. Although the incident was intentional, a Department of Homeland Security official said that terrorism is not suspected. The online host of the note, T35 Hosting, later removed it in its entirety after the FBI requested its censorship. However, Wikinews has preserved the full text of the letter.

Austin Fire Department reported around 1100 local time (1600 UTC) that two people were transported to local hospitals and one was unaccounted for. One man was admitted at a local hospital under serious condition for smoke inhalation. The other man suffered from second-degree burns on 25% of his back and has been transported by helicopter to Brooke Medical Center in San Antonio and is said to be in stable condition.

The seven-story Echelon Building One is located on 9430 Research Boulevard and contains Internal Revenue Service offices. The Echelon building complex houses a number of federal offices, including Central Intelligence Agency and Federal Bureau of Investigation. Research Boulevard is the service road of U.S. Route 183. The incident has caused severe backups on both Research Boulevard and Route 183.

A witness told The Austin Statesman that he saw the plane flying lower than usual, then it made a sharp turn and hit the building.

An Austin County EMS official, James Shamard, said that smoke is visible from at least a mile from the crash site. Another official for the Austin Fire Department said that two persons who were working in the building are still unaccounted for.

MSNBC reports that there was some form of domestic dispute between Mr. Stack and his wife before the incident. He then reportedly used gasoline to light his house on fire. When the fire department arrived, they rescued his wife and teenage daughter.

According to Jerry Cullen, a pilot and former flight instructor who witnessed the crash, the plane was traveling at high speed at time of impact.

Retrieved from “https://en.wikinews.org/w/index.php?title=Plane_crashes_into_office_block_in_Austin,_Texas&oldid=4460821”
Posted in Uncategorized
Sscp Actual Exam

Sscp Actual Exam

SSCP Actual Exam by John AdamsQuestion: 1A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is:A. concern that the laser beam may cause eye damageB. the iris pattern changes as a person grows older.C. there is a relatively high rate of false accepts.D. the optical unit must be positioned so that the sun does not shine into the aperture.Answer: D Explanation:Because the optical unit utilizes a camera and infrared light to create the images, sun light can impact the aperture so it must not be positioned in direct light of any type. Because the subject does not need to have direct contact with the optical reader, direct light can impact the reader.An Iris recognition is a form of biometrics that is based on the uniqueness of a subject’s iris. A camera like device records the patterns of the iris creating what is known as Iriscode.It is the unique patterns of the iris that allow it to be one of the most accurate forms of biometric identification of an individual. Unlike other types of biometics, the iris rarely changes over time. Fingerprints can change over time due to scaring and manual labor, voice patterns can change due to a variety of causes, hand geometry can also change as well. But barring surgery or an accident it is not usual for an iris to change. The subject has a high-resoulution image taken of their iris and this is then converted to Iriscode. The current standard for the Iriscode was developed by John Daugman. When the subject attempts to be authenticated an infrared light is used to capture the iris image and this image is then compared to the Iriscode. If there is a match the subject’s identity is confirmed. The subject does not need to have direct contact with the optical reader so it is a less invasive means of authentication then retinal scanning would be.Reference(s) used for this question:AIO, 3rd edition, Access Control, p 134.AIO, 4th edition, Access Control, p 182.Wikipedia – http://en.wikipedia.org/wiki/Iris_recognitionThe following answers are incorrect:concern that the laser beam may cause eye damage. The optical readers do not use laser so, concern that the laser beam may cause eye damage is not an issue.the iris pattern changes as a person grows older. The question asked about the physical installation of the scanner, so this was not the best answer. If the question would have been about long term problems then it could have been the best choice. Recent research has shown that Irises actually do change over time: http://www.nature.com/news/ageing-eyes-hinder-biometric-scans-1.10722there is a relatively high rate of false accepts. Since the advent of the Iriscode there is a very low rate of false accepts, in fact the algorithm used has never had a false match. This all depends on the quality of the equipment used but because of the uniqueness of the iris even when comparing identical twins, iris patterns are unique.Question: 2In Mandatory Access Control, sensitivity labels attached to object contain what information?A. The item’s classificationB. The item’s classification and category setC. The item’s categoryD. The items’s need to knowAnswer: B Explanation:A Sensitivity label must contain at least one classification and one category set.Category set and Compartment set are synonyms, they mean the same thing. The sensitivity label must contain at least one Classification and at least one Category. It is common in some environments for a single item to belong to multiple categories. The list of all the categories to which an item belongs is called a compartment set or category set.The following answers are incorrect:the item’s classification. Is incorrect because you need a category set as well.the item’s category. Is incorrect because category set and classification would be both be required.The item’s need to know. Is incorrect because there is no such thing. The need to know is indicated by the catergories the object belongs to. This is NOT the best answer.Reference(s) used for this question:OIG CBK , Access Control (pages 186 – 188)AIO, 3rd Edition, Access Control (pages 162 – 163)AIO, 4th Edittion, Access Control, pp 212-214.Wikipedia – http://en.wikipedia.org/wiki/Mandatory_Access_ControlQuestion: 3What are the components of an object’s sensitivity label?A. A Classification Set and a single Compartment.B. A single classification and a single compartment.C. A Classification Set and user credentials.D. A single classification and a Compartment Set.Answer: D Explanation:Both are the components of a sensitivity label.The following are incorrect:A Classification Set and a single Compartment. Is incorrect because the nomenclature “Classification Set” is incorrect, there only one classifcation and it is not a “single compartment” but a Compartment Set.A single classification and a single compartment. Is incorrect because while there only is one classifcation, it is not a “single compartment” but a Compartment Set.A Classification Set and user credentials. Is incorrect because the nomenclature “Classification Set” is incorrect, there only one classifcation and it is not “user credential” but a Compartment Set. The user would have their own sensitivity label.Question: 4What does it mean to say that sensitivity labels are “incomparable”?A. The number of classification in the two labels is different.B. Neither label contains all the classifications of the other.C. the number of categories in the two labels are different.D. Neither label contains all the categories of the other.Answer: D Explanation:If a category does not exist then you cannot compare it. Incomparable is when you have two disjointed sensitivity labels, that is a category in one of the labels is not in the other label. “Because neither label contains all the categories of the other, the labels can’t be compared. They’re said to be incomparable”COMPARABILITY:The label:TOP SECRET [VENUS ALPHA] is “higher” than either of the labels:SECRET [VENUS ALPHA] TOP SECRET [VENUS] But you can’t really say that the label:TOP SECRET [VENUS] is higher than the label:SECRET [ALPHA] Because neither label contains all the categories of the other, the labels can’t be compared. They’re said to be incomparable. In a mandatory access control system, you won’t be allowed access to a file whose label is incomparable to your clearance.The Multilevel Security policy uses an ordering relationship between labels known as the dominance relationship. Intuitively, we think of a label that dominates another as being “higher” than the other. Similarly, we think of a label that is dominated by another as being “lower” than the other. The dominance relationship is used to determine permitted operations and information flows.DOMINANCEThe dominance relationship is determined by the ordering of the Sensitivity/Clearance component of the label and the intersection of the set of Compartments.Sample Sensitivity/Clearance ordering are: Top Secret > Secret > Confidential > Unclassified s3 > s2 > s1 > s0Formally, for label one to dominate label 2 both of the following must be true: The sensitivity/clearance of label one must be greater than or equal to the sensitivity/clearance of label two. The intersection of the compartments of label one and label two must equal the compartments of label two.Additionally: Two labels are said to be equal if their sensitivity/clearance and set of compartments are exactly equal. Note that dominance includes equality. One label is said to strictly dominate the other if it dominates the other but is not equal to the other. Two labels are said to be incomparable if each label has at least one compartment that is not included in the other’s set of compartments.The dominance relationship will produce a partial ordering over all possible MLS labels, resulting in what is known as the MLS Security Lattice.The following answers are incorrect:The number of classification in the two labels is different. Is incorrect because the categories are what is being compared, not the classifications.Neither label contains all the classifications of the other. Is incorrect because the categories are what is being compared, not the classifications.the number of categories in the two labels is different. Is incorrect because it is possibe a category exists more than once in one sensitivity label and does exist in the other so they would be comparable.Reference(s) used for this question:OReilly – Computer Systems and Access Control (Chapter 3)http://www.oreilly.com/catalog/csb/chapter/ch03.htmlandhttp://rubix.com/cms/mls_domQuestion: 5Which of the following is true about Kerberos?A. It utilizes public key cryptography.B. It encrypts data after a ticket is granted, but passwords are exchanged in plain text.C. It depends upon symmetric ciphers.D. It is a second party authentication system.Answer: C Explanation:Kerberos depends on secret keys (symmetric ciphers). Kerberos is a third party authentication protocol. It was designed and developed in the mid 1980’s by MIT. It is considered open source but is copyrighted and owned by MIT. It relies on the user’s secret keys. The password is used to encrypt and decrypt the keys.The following answers are incorrect:It utilizes public key cryptography. Is incorrect because Kerberos depends on secret keys (symmetric ciphers).It encrypts data after a ticket is granted, but passwords are exchanged in plain text. Is incorrect because the passwords are not exchanged but used for encryption and decryption of the keys.It is a second party authentication system. Is incorrect because Kerberos is a third party authentication system, you authenticate to the third party (Kerberos) and not the system you are accessing.References:MIT http://web.mit.edu/kerberos/Wikipedi http://en.wikipedia.org/wiki/Kerberos_%28protocol%29OIG CBK Access Control (pages 181 – 184)AIOv3 Access Control (pages 151 – 155)Question: 6Which of the following is needed for System Accountability?A. Audit mechanisms.B. Documented design as laid out in the Common Criteria.C. Authorization.D. Formal verification of system design.Answer: A Explanation:Is a means of being able to track user actions. Through the use of audit logs and other tools the user actions are recorded and can be used at a later date to verify what actions were performed.Accountability is the ability to identify users and to be able to track user actions.The following answers are incorrect:Documented design as laid out in the Common Criteria. Is incorrect because the Common Criteria is an international standard to evaluate trust and would not be a factor in System Accountability.Authorization. Is incorrect because Authorization is granting access to subjects, just because you have authorization does not hold the subject accountable for their actions.Formal verification of system design. Is incorrect because all you have done is to verify the system design and have not taken any steps toward system accountability.References:OIG CBK Glossary (page 778)Question: 7What is Kerberos?A. A three-headed dog from the egyptian mythology.B. A trusted third-party authentication protocol.C. A security model.D. A remote authentication dial in user server.Answer: B Explanation:Is correct because that is exactly what Kerberos is.The following answers are incorrect:A three-headed dog from Egyptian mythology. Is incorrect because we are dealing with Information Security and not the Egyptian mythology but the Greek Mythology.A security model. Is incorrect because Kerberos is an authentication protocol and not just a security model.A remote authentication dial in user server. Is incorrect because Kerberos is not a remote authentication dial in user server that would be called RADIUS.Question: 8The three classic ways of authenticating yourself to the computer security software are by something you know, by something you have, and by something:A. you need.B. non-trivialC. you are.D. you can get.Answer: C Explanation:This is more commonly known as biometrics and is one of the most accurate ways to authenticate an individual.The rest of the answers are incorrect because they not one of the three recognized forms for Authentication.Question: 9A timely review of system access audit records would be an example of which of the basic security functions?A. avoidance.B. deterrence.C. prevention.D. detection.Answer: D Explanation:By reviewing system logs you can detect events that have occured.The following answers are incorrect:avoidance. This is incorrect, avoidance is a distractor. By reviewing system logs you have not avoided anything.deterrence. This is incorrect because system logs are a history of past events. You cannot deter something that has already occurred.prevention. This is incorrect because system logs are a history of past events. You cannot prevent something that has already occurred.Question: 10A confidential number used as an authentication factor to verify a user’s identity is called a:A. PINB. User IDC. PasswordD. ChallengeAnswer: A Explanation:PIN Stands for Personal Identification Number, as the name states it is a combination of numbers.The following answers are incorrect:User ID This is incorrect because a Userid is not required to be a number and a Userid is only used to establish identity not verify it.Password. This is incorrect because a password is not required to be a number, it could be any combination of characters.Challenge. This is incorrect because a challenge is not defined as a number, it could be anything.Test Information:Total Questions: 1076Test Number: SSCPVendor Name: ISC2Cert Name: SSCPTest Name: Systems Security Certified PractitionerOfficial Site: https://www.certschief.com/For More Details: https://www.certschief.com/exam/SSCP/Article Source: eArticlesOnline.com

[youtube]http://www.youtube.com/watch?v=u16YMXZ752A[/youtube]
<div class=Birks to create 2010 Olympic, Paralympic jewelery; wines on menu
" />

Birks to create 2010 Olympic, Paralympic jewelery; wines on menu

Thursday, February 8, 2007

Birks was recently announced as the “Official Supplier of Jewelery” for the 2010 Vancouver-Whistler Olympics. The company will create licensed products with the logos of the 2010 Olympic Games, 2010 Paralympic Games, and the Canadian Olympic team emblem, including necklaces, earrings, pendants and rings.

The partnership was announced at an employee celebration in Vancouver, to mark the centenary of Mayors Jewelers Inc., an American company Birks acquired in 2002.

The six-year sponsorship includes the rights to the Canadian Olympic team logo during the Beijing 2008 and London 2012 Olympic Games.

Thomas A. Andruskevich, president and CEO, Birks & Mayors stated in a press release:

We are extremely proud to take part in this journey that honors our best athletes and celebrates excellence as the Vancouver 2010 Winter Games shine on the world wide stage. Canadians look to Birks to mark the most important celebrations in their lives which is why Birks wants to commemorate this important moment in Canadian history.

The products will be launched in early 2008.

Also released today is information that Jackson-Triggs Esprit will be a special line of wines, created to celebrate the athletic event. The Vincor Canada wine is named in relevance to “spirit”, both the spirit of the Olympians, and alcoholic beverage usage of the word.

President and CEO of Vincor Canada Jay Wright said, “We are thrilled to have this opportunity to honor our Canadian athletes while affirming our role as Canada’s wine industry leader. Like our Olympic and Paralympic athletes, Vincor Canada shares a passion and determination towards excellence. This agreement is by far Vincor Canada’s most ambitious and broad-reaching sponsorship and will be great for the Canadian wine industry. I hope Canada will join us in the excitement that we feel regarding this exceptional opportunity to position Canadian wine brands on the world stage.”

The wines, featuring Olympic logo, will be distributed to liquor stores and restaurants across the country this summer. Proceeds from each bottle will go towards the Canadian Olympic Team.

Both the Chardonnay and Merlot will retail for CDN$11.95 MSRP. Inniskillin Wines’ vineyards, harvested since 1975, in either the Niagara Peninsula in Ontario pr the Okanagan Valley in British Columbia will create the wine.

Within the past few weeks, the Vancouver Organizing Committee for the 2010 Olympic and Paralympic Winter Games (VANOC) has announced a Omega-brand countdown clock that will tour British Columbia events, as the company is the “Official Olympic Timekeeper”. Canadian Pacific was named official rail freight services provider, and the Royal Canadian Mint announced they will create circulation and collector coins to mark the occasion.

There are 1099 days until the XXI Olympiad, according to the official website of the event.

Retrieved from “https://en.wikinews.org/w/index.php?title=Birks_to_create_2010_Olympic,_Paralympic_jewelery;_wines_on_menu&oldid=2584570”
Posted in Uncategorized
<div class=Ukraine: media riddles around the phosphorous cloud
" />

Ukraine: media riddles around the phosphorous cloud

Saturday, July 21, 2007

The available information about the phosphorous cloud following the railway accident in the Ukraine last Monday is becoming more and more cryptic.

The political involvement of most media and other factors are causing contradictions among official sources that are making press work extremely hard. Moreover, no one is permitted to enter the accident location. The site of the accident was closed to visitors following the injury of three TV journalists who got too close.

Retrieved from “https://en.wikinews.org/w/index.php?title=Ukraine:_media_riddles_around_the_phosphorous_cloud&oldid=4663470”
Posted in Uncategorized
<div class=Manchester City loans Joe Hart to Torino
" />

Manchester City loans Joe Hart to Torino

Saturday, September 3, 2016

On Wednesday, English football club Manchester City F.C. announced that they had loaned their goalkeeper Joe Hart to Italian club Torino F.C. till the season end.

Hart joined City from Shrewsbury Town F.C. in 2006. Since then, he has won four Premier League Golden Gloves for keeping most clean sheets in a season, which is a League record. In a decade at the Etihad Stadium, Hart has won two Premier League trophies, two Football League Cups and one FA Cup.

Hart debuted for England at the age of 21, and has represented the country at UEFA Euro 2012 and 2016 and FIFA World Cup 2014.

Signing the contract, Hart said, “I am very excited to compare myself in an important and beautiful League such as Serie A.” ((it))Italian language: ?Sono molto felice di potermi confrontare in un campionato bello e difficile come la Serie A.

Goalkeeper Joe Hart’s move away from Manchester City came about a week after Pep Guardiola signed Chilean goalkeeper Claudio Bravo from FC Barcelona.

Retrieved from “https://en.wikinews.org/w/index.php?title=Manchester_City_loans_Joe_Hart_to_Torino&oldid=4576725”
Posted in Uncategorized
How To Use Empathetic Marketing In Your Social Media Strategy

How To Use Empathetic Marketing In Your Social Media Strategy

4 Ways to Increase Social Media Reach and Engagement

If you’re like 44% of people worldwide, you’ve been spending more time on social media during the pandemic. Whether you’re catching up on the latest news on Twitter or chatting with family on Facebook, social media has allowed us to stay connected.

But as a small business owner, are you spending more time on social media being empathetic?

While sometimes confused with sympathy, which is feeling compassion for someone else, empathy means putting yourself in somebody else’s shoes.

By empathizing with your customers, you can better serve them.

Here’s the Merriam Webster definition of empathy: “the action of (or capacity for) understanding, being aware of, being sensitive to, and vicariously experiencing the feelings, thoughts, and experience of another.”

It’s important to take an empathetic approach in all of your marketing materials, from your website copy to your social media strategy.

Because social media offers such a great way to interact with a large audience, you should be willing to put in the time and effort to ensure your communications are not only engaging, but empathetic to what people are going through.

***

READ: The Importance of Empathy-Based Marketing

As we move forward from COVID-19, empathy-based marketing isn’t just the right thing to do, your customers now expect it.

Many studies done during the pandemic are showing people want brands to be more empathetic and aware of the long-term impact it will have on their lives.

Hopefully, you communicated authentically and empathetically with your customers during this time, and you’re going to have to continue to do so! Here are 3 ways to use empathetic content marketing…

Read more.

***

According to the Braze Brand Humanity Index research, around 65% of people were more loyal to brands they felt a human connection with.

So to help you get—and stay connected—with your customers, here are four ways a small business owner can build a social media presence with more empathetic content marketing.

1. Create an empathy map.

This can be a good first step to put you deeper into the mind of your customer. Originally a tool used in the design and agile development worlds, empathy mapping provides a deeper understanding of your customer. It’s usually split into four quadrants: says, thinks, does and feels.

  • With your target customer’s persona in the middle, you begin to brainstorm questions, like:
  • Why do you need my product?
  • How does using my product make you feel/think/do/say?
  • What are some stressors/fears in your life?
  • How does my product help you reach your goals?

Write out your customer’s thoughts the way you think he or she would express. Their needs, wants, desires, hopes, fears, goals and dreams will start to be more clear, and you’ll be able to build a social media presence using messaging that resonates with your followers.

2. Tap into your customers’ emotions.

I’m not talking about playing on their fears to sell your products, but rather, thinking about how your product makes them feel.

Here’s a way that a brand helped ease their smallest customers’ fears. Philips invented a miniature version of a CAT scanner called the ‘KittenScanner,’ which doctors use to educate kids about the MRI process and put them at ease. Children can try it out with toy animals, taking the focus off of their procedure and onto fun.

It was created back in 2004, but it still gets mentioned on social media, in videos and in health journals as a way to reduce the need for sedation. How could you position your brand in a helpful, stress-reducing way for your customers?

3. Use social listening to your advantage.

Social listening is all about monitoring your communication channels for brand and competitor mentions, and certain keywords and comments.

As you “listen” to your followers this way, you can gain valuable insights into what they like, don’t like, want and need from you. You may see a tweet on Twitter from a happy customer who loved your product. Or, you may see a comment from someone who wasn’t impressed with how long it took customer service to respond to a complaint.

With social listening, you not only get information on how your small business is performing, you also get the opportunity to provide better customer service and tweak a process or product that isn’t working.

4. Inspire customers to take action.

Showing your customers you believe in them is an ideal way to increase social media reach and engagement. Think about the product or service you offer to your customers. How could you get them to use it to add value to their life and/or entertain them?

For example, Home Depot encouraged their customers to grow a living salad bowl with an infographic they shared on social channels. While there is minimal branding on this infographic, it still reinforces Home Depot’s marketing strategy of the things that are possible with their products.

No matter how you’re using empathy-based marketing to increase social media reach and engagement, remember your branding. For example, if your brand voice is “fun, upbeat and confident,” using humour might be the best way to engage your audience.

If it’s “down-to-earth, considerate and approachable,” a more heartfelt, emotional message could be the way to most effectively speak to your customers.

And don’t forget to create a social media marketing plan to save time and money!

In my AMPLiFY! Business Academy, we’ve been exploring the Empathy-based marketing model in-depth. It’s a monthly training program designed to help you navigate these murky waters on how to best market your business. Come and join us for only $1 for the next 45 days and receive solid marketing strategies that will get you through this crisis.

To your business success,Susan Friesen

<div class=Ash-triggered flight disruptions cost airlines $1.7 billion
" />

Ash-triggered flight disruptions cost airlines $1.7 billion

Wednesday, April 21, 2010

The International Air Transport Association (IATA) said today that the flight disruptions triggered by the recent eruption of a volcano in Iceland cost the global airline industry a total of $1.7 billion dollars.

For an industry that lost $9.4bn last year and was forecast to lose a further $2.8bn in 2010, this crisis is devastating

According to the IATA, airlines lost a total of $400 million daily for the first three days of the week that European airspace was closed. The closures also impacted an estimated 1.2 million passengers around the world each day, until airspace around Europe began reopening last night. IATA’s chief executive officer, Giovanni Bisignani, said that “[f]or an industry that lost $9.4bn last year and was forecast to lose a further $2.8bn in 2010, this crisis is devastating.” He also claimed that the airline industry would require three years to recover from the effects of the crisis, and called on governments to provide some form of compensation to airlines.

Bisignani also criticized the response of European governments to the ash threat, saying that they had over-reacted and the shutdown of all airspace was excessive. He said that “Airspace was being closed based on theoretical models, not on facts. Test flights by our members showed that the models were wrong. [The crisis] is an extraordinary situation exaggerated by a poor decision-making process by national governments.” Individual airlines also criticized the airspace closures. Micheal O’Leary, CEO of Ryanair, said that “It might have made sense to ground flights for a day or two…But by the time that that cloud has dispersed through 800 or 1,000 nautical miles of air space, a full ban should never have been imposed.”

In defense of the European airspace controller, Eurocontrol, the CEO of the Irish Aviation Authority, Eamonn Brennan, said: “It’s important to realize that we’ve never experienced in Europe something like this before. So it wasn’t just a simple matter of saying: Yes, you could have operated on Saturday or Sunday or Monday. We needed the four days of test flights, the empirical data, to put this together and to understand the levels of ash that engines can absorb.” Additionally, scientists in Switzerland said that studies of ash content in the atmosphere were high enough that the total closure of most European airspace was warranted.

Restrictions over air travel in Europe have been lifted in many parts of the continent today; three-quarters of the scheduled flights were operating, and most of the European airspace having been opened. Only parts of British, French and Irish airspace remain closed, and most of Europe’s major airports are open, although not necessarily operating at full capacity; at London Heathrow Airport, about half the scheduled departing flights were canceled.

Retrieved from “https://en.wikinews.org/w/index.php?title=Ash-triggered_flight_disruptions_cost_airlines_$1.7_billion&oldid=4577500”
Posted in Uncategorized
<div class=World’s largest passenger airliner makes first flight
" />

World’s largest passenger airliner makes first flight

April 27, 2005

The world’s largest passenger aircraft, the Airbus A380, has made its maiden flight after lifting off from Toulouse in France.

The take-off, at 08:30 UTC, was apparently normal and took place exactly on time. The aircraft flew into clear blue skies with a flight crew of six (all wearing parachutes as a safety precaution) and twenty tonnes of test equipment on board.

Around 50,000 people watched the maiden flight, many sitting on grass banks lining the runway. More people watched the flight on a giant screen erected in the centre of Toulouse.

The test flight lasted four hours, with the aircraft flying no higher than 10,000 nor further than 100 miles from Toulouse as it circled the Bay of Biscay.

The A380, known for many years during its development phase as the Airbus A3XX, will be the largest airliner in the world by a substantial margin when it enters service.

The first A380 prototype was unveiled during a lavish ceremony in Toulouse, France, on January 18, 2005. Its manufacturer’s serial number is 001, and it is registered F-WWOW.

The new Airbus will initially be sold in two versions: the A380-800, a full double-decker configuration, able to carry 555 passengers in a three-class configuration or up to 800 passengers in a single-class economy configuration. Range for the A380-800 model is expected to be 8,000 nautical miles (14,800 km). The second model, the A380-800F dedicated freighter, will carry 150 tons of cargo 5,600 miles (10,400 km).

The cost of the project so far is £8.4bn, £1bn over budget. 144 planes have already been ordered. Singapore Airlines, which will be the first company to operate the new air giant, in July 2006, have opened a reservation site for this first regular flight.

Retrieved from “https://en.wikinews.org/w/index.php?title=World%27s_largest_passenger_airliner_makes_first_flight&oldid=1108844”
Posted in Uncategorized
<div class=Salmonella outbreak sickens over one thousand in United States
" />

Salmonella outbreak sickens over one thousand in United States

Thursday, July 10, 2008

Over 1000 cases of illness have now been identified in a foodborne salmonellosis outbreak that began in mid-April 2008 in the United States.

As of July 8, the Centers for Disease Control and Prevention (CDC) has reported 1013 confirmed infections throughout the United States, along with four cases in Canada. 203 hospitalizations have been linked to the outbreak. It has caused at least one death, and it may have been a contributing factor in another. The pathogen responsible is the rare Saintpaul strain of Salmonella enterica.

Nearly half of the reported illnesses were in Texas and New Mexico. According to unnamed sources close to the investigation, most illness clusters in the outbreak involve Mexican restaurants. Illness clusters in the hard hit state of Illinois were publicly identified by local health departments as involving three Mexican restaurants.

The CDC is in the process of investigating the outbreak and trying to identify the contamination’s point of origin. The U.S. Food and Drug Administration (FDA) currently suspects that the contaminated food product is an ingredient in fresh salsa, such as fresh jalapeño pepper, fresh serrano pepper, fresh cilantro, or certain types of raw tomato.

Some produce industry insiders doubt that fresh produce is to blame for the outbreak. They point to the absence of Salmonella on all of the tested produce samples to date, as well as divergent results from produce tracebacks. They also say that the extended time frame of new sicknesses makes it unlikely that either raw tomatoes or fresh jalapeños, the government’s two main suspects, could be responsible. Will Steele, President and CEO of Frontera Produce, said that “the outbreak is probably related to processed goods and they’re looking in the wrong closets.”

Steele’s Texas based company has been forced to hold shipments of fresh jalapeño peppers after loads of produce were repeatedly flagged by the FDA for testing. Although independent testing of both loads showed no sign of Salmonella, the peppers are still on hold until the FDA finishes its own testing of the second load flagged on July 1st. “There are still no results,” Steele says. “The salability of that produce in two to three days is gone. We ceased harvesting. There is no sense in bringing in more product and having it rot.”

Steele, like others in the produce industry, believes that the FDA should be focusing on processed produce instead of fresh produce. “Methodology is backward,” he says. “FDA is reaching for answers. You can’t tie jalapeño pepper shipped on June 30 back to April 10.”

Still, the FDA and the CDC consider testing of fresh jalapeños and other fresh produce a high priority. The CDC writes that “the accumulated data from all investigations indicate that jalapeño peppers caused some illnesses.”

The FDA is cautioning that people who would be in the most danger if infected with Salmonella (infants, the elderly, and those with compromised immune systems) should avoid eating the suspected types of produce listed on their website.

Retrieved from “https://en.wikinews.org/w/index.php?title=Salmonella_outbreak_sickens_over_one_thousand_in_United_States&oldid=2262033”
Posted in Uncategorized