<div class=UK Wikinews Shorts: July 8, 2013
" />

UK Wikinews Shorts: July 8, 2013

A compilation of brief news reports for Monday, July 8, 2013.

Retrieved from “https://en.wikinews.org/w/index.php?title=UK_Wikinews_Shorts:_July_8,_2013&oldid=1981592”
Posted in Uncategorized
<div class=Finnish terrestrial analogue TV network shut down
" />

Finnish terrestrial analogue TV network shut down

Saturday, September 1, 2007

The terrestrial analogue television broadcasts in Finland ended in September 1, 2007, at 04:00 local time, marking the transition to the digital DVB-T standard. DVB broadcasts were started in 2001, Users of terrestrial TV are no longer able to receive the formerly nationally available TV channels – YLE TV1, YLE TV2, MTV3, and Nelonen – without set-top boxes or TV sets with built-in digital receivers. SVT Europa is also no longer available in analogue networks.

Cable networks are permitted to make the analogue mode available until the end of February 2008.

While over 75% of households already use digital TV, as of mid-August, over 220 000 households that depend on terrestrial broadcasts have not yet purchased a set-top box. There are also areas where digital terrestrial broadcasts are not yet available. This is being remedied through relay transmitters that will be set up over the following months.

Retrieved from “https://en.wikinews.org/w/index.php?title=Finnish_terrestrial_analogue_TV_network_shut_down&oldid=488237”
Posted in Uncategorized
How Drone Technology Is Evolving The Industrial Industry

How Drone Technology Is Evolving The Industrial Industry

These are some of the benefits that you need to know about, when it comes to robots and drones in the industrial industry, changing the way we are doing things. These are the benefits of using drones and robots.

Improving the safety inspection of workers

By using drones and robots, you are going to improve the safety inspections of workers. Normally with industrial companies, workers have certain PPE that they need to wear to stay safe. And, it is important to make sure that you can inspect the workers on a daily basis to ensure that they are wearing their PPE.

This is why it is great to use robots and drones. It can do the safety inspections on a daily basis, without interrupting the work that the workers are doing. And, it will be able to do this a lot faster, than what it would be if the safety supervisor is visiting all divisions of the industry.

Able to perform different types of inspections

When people are doing the inspections, there is always just a limit that they can do. For example, they will only be able to perform inspections on the floor. If there are workers that are working remotely, it is harder to do the inspections on higher ground.

However, with a drone, this will be possible. To do the inspections, no matter on what height the workers are working. You can even inspect the equipment that they are using, to ensure that the equipment is still in perfect working order.

Quicker inspection time

With any type of inspections, it is taking up a lot of time. It is expensive and takes up time that the inspectors could have used better.

This is why the robots and drones are such a great idea. It is doing all the work so that the inspectors can get to their real work a lot faster. Taking less time, and is making the work more efficiently and effectively. The industry can even start hiring fewer inspectors, because of the time that the robots and drones are saving. Not only will it be done faster, but it will also be done more effectively.

Reduce insurance because of better safety

Insurance premiums will be less. This is because the industrial company will have a much better safety record. Normally with a business like the industrial industry, safety isn’t as great. Accidents happen and workers don’t really do wear their PPE. This is why the insurance of these companies is higher.

But with the robots and drones that are doing the rounds on a daily basis, accidents will be less. And, this means that the safety will be better and the insurance premiums will be a lot less. With the insurance premiums reduced, it will mean that the company can use that money to expand the business.

Who can make use of robots and drones?

The question is who can make use of robots and drones to improve their safety, work, and equipment? Any type of business, company, and industry that is working with expensive equipment, workers that need to be aware of safety and where inspections need to be done on a regular basis.

This will ensure that the inspections are getting done a lot faster, more effective, and ensure better safety with workers. Many companies are struggling with workers that aren’t wearing their PPE. Now, with the drones doing regular inspections, all the workers will need to wear their PPE. This is why any business will benefit from using drones and robots.

Robots and drones for improving industrial inspections for safety and equipment inspections. Something that any large and small company can consider. There are many reasons why this is something to consider, these were just to name a couple of them. If you are a company owner that is struggling with a lot of accidents at work, this is something that you can consider for sure. You will see that within a couple of days after starting to use the drone and robots, the accidents will decrease and workers will start to be more safety aware. And, your company will also benefit from using robots and drones.

CR Asia is a leading industrial plant maintenance services provider and shutdowns and turnarounds professional, delivering a complete range of services to the oil, gas, chemical, refining and power industries, including professional mechanical services, expert mechanical engineering services, flare maintenance, heat exchanger maintenance and catalyst handling and more.

<div class=Southern Minnesota plane crash kills eight
" />

Southern Minnesota plane crash kills eight

Thursday, July 31, 2008

At least eight people have been killed in a plane crash near the southern Minnesota town of Owatonna, the Associated Press and local media reported Thursday morning.

One person, who had been listed in critical condition as of 11:40 a.m. in the Owatonna hospital has died from injuries sustained in the accident, the Associated Press reported just before 3:00 p.m. that afternoon. At least one person is unaccounted for while investigator determine whether the person boarded the plane in New Jersey, according to the Steele County Sheriff’s Office.

Star Tribune reported that charter flight 81, a Raytheon BAE 125-800A commercial jet, had not landed properly on the 5,500 foot runway at Owatonna Degner Regional Airport just after 9:30 a.m local time en route from Atlantic City, New Jersey. The plane either tried to take off or could not stop in time.

The plane was owned by East Coast Jets Inc. of Allentown, Pennsylvania. Aviation Research Group told the Star Tribune that East Coast Jets operates 11 aircraft — Hawker and Lear jets — and employs 21 pilots.

“They have a good safety history,” ARG President Joe Moeggenberg told the Star Tribune, based on federal data. “There were no recent incidents.”

This model of aircraft “has a very good safety record; been around along time,” said Gary Robb, aviation expert and attorney with a Kansas City law firm that represents aviation crash victims.

Gary Robb, an aviation expert and attorney told the Star Tribune that the aircraft “has a very good safety record [and has] been around along time.”

According to the Star Tribune, the pilots have been identified as Clark Keefer of Bethlehem, Pennsylvania, and Dan D’Ambrosio of Hellertown, Pennsylvania. Pilot error has not been identified as a cause for the crash, but investigators caution it is to early for any conclusions to be made.

Graphics released by the Star Tribune show that the plane ended up past the runway it was attempting to land on. The Associated Press reports that debris was scattered 500 feet beyond the runway.

The bodies have been taken to Rochester for examination, while the plane’s data recorders have been flown to Washington, DC.

Both WCCO-TV and the Star Tribune report that the time of the crash coincided with a line of storms moving through the area, though what effect, if any the storm had, is under investigation. Witnesses told the Star Tribune that the worst of the storm had gone at the time of the crash and only light wind and rain remained. The Associated Press confirms from the National Weather Service that “the storms were subsiding at the time of the crash.”

Owatonna resident John Billingsly, a retired pilot who worked at the airport for many years, told the Star Tribune, “I saw the plane making its final approach, and it appeared nothing was wrong. We’d just had a lot of wind, but it had calmed down a bit and mostly subsided by that time.”

The plane, a charter for Viracon, Inc. of Owatonna, was flying customers from “a couple of different companies” to discuss a $2 billion dollar casino and hotel project in Las Vegas, Nevada that Revel Entertainment is building. Atlantic City Mayor Scott Evans told the Associated Press that two high-level employees for Revel and an employee of Tishman Construction. Viracon is an architectural glass fabricator and Tishman is assisting Revel.

As of 5:00 a.m Friday, five of the victims, including the two pilots, have been identified by the Associated press.

APG International, a company specializing in glass facades, lost two executives: Marc Rosenberg, the chief operating officer, and Alan Barnett, an assistant project manager, according to the Glassboro, N.J. company’s spokeswoman Amelia Townsend.

The Tishman empoyee, the only victim identified, was project manager Karen Sandland, 44, based in Newark, New Jersey company spokesman Bud Perrone told the Associated Press.

The Revel employee’s idenities were released by the Star Tribune Friday, they are: Tony Craig, 50, of Brigantine, N.J., vice president of construction development; Chris Daul, 44, of Northfield, N.J., vice president of construction development; and Lawrence (Chip) Merrigan, 62, of Absecon N.J., director of field operations.

The crash is the deadliest in Minnesota since October 2002, when Minnesota Senator Paul Wellstone and seven others died after their chartered twin-engine plane crashed in the woods near Eveleth, in Northern Minnesota, according to the Star Tribune.

The National Transportation Safety Board (NTSB), an independent agency responsible for investigation of accidents involving aviation, highway, marine, pipelines and railroads in the United States (except aircraft of the armed forces and the intelligence agencies), will be investigating the crash.

The NTSB reported Friday through the Star Tribute that the agency has 14 investigators working on the crash, with assistance from the FBI.

The NTSB reports two other fatal accidents since 1962 at Owatonna airport. A crash in 1992 killed one and injured another and a crash in 2004 killed four people.

Retrieved from “https://en.wikinews.org/w/index.php?title=Southern_Minnesota_plane_crash_kills_eight&oldid=1468258”
Posted in Uncategorized
<div class=Plane crashes into office block in Austin, Texas
" />

Plane crashes into office block in Austin, Texas

Thursday, February 18, 2010

A small plane crashed into a building, which was one of the Echelon office complex, in north Austin, Texas this morning at 09:56 local time (1456 UTC).

Federal officials say the plane owner was Joseph Andrew Stack III; presumed to be the pilot who set his house on fire on the 1800 block of Dapplegrey Lane in north Austin an hour earlier. He then drove to Georgetown Municipal Airport, approximately 20 miles away, took off and then crashed his private plane into the Echelon complex.

The Federal Aviation Authority indicated the light aircraft was a Piper Cherokee PA-28, as did news reports and eye witnesses. The FAA said the plane had no flight plan and was under Visual Flight Rules.

Mr. Stack committed suicide, and a suicide note has been located. Mr. Stack’s suicide note mentions anti-government and anti-corporate ideals, as well as problems with the Internal Revenue Service and that he lost money in the Enron scandal. Although the incident was intentional, a Department of Homeland Security official said that terrorism is not suspected. The online host of the note, T35 Hosting, later removed it in its entirety after the FBI requested its censorship. However, Wikinews has preserved the full text of the letter.

Austin Fire Department reported around 1100 local time (1600 UTC) that two people were transported to local hospitals and one was unaccounted for. One man was admitted at a local hospital under serious condition for smoke inhalation. The other man suffered from second-degree burns on 25% of his back and has been transported by helicopter to Brooke Medical Center in San Antonio and is said to be in stable condition.

The seven-story Echelon Building One is located on 9430 Research Boulevard and contains Internal Revenue Service offices. The Echelon building complex houses a number of federal offices, including Central Intelligence Agency and Federal Bureau of Investigation. Research Boulevard is the service road of U.S. Route 183. The incident has caused severe backups on both Research Boulevard and Route 183.

A witness told The Austin Statesman that he saw the plane flying lower than usual, then it made a sharp turn and hit the building.

An Austin County EMS official, James Shamard, said that smoke is visible from at least a mile from the crash site. Another official for the Austin Fire Department said that two persons who were working in the building are still unaccounted for.

MSNBC reports that there was some form of domestic dispute between Mr. Stack and his wife before the incident. He then reportedly used gasoline to light his house on fire. When the fire department arrived, they rescued his wife and teenage daughter.

According to Jerry Cullen, a pilot and former flight instructor who witnessed the crash, the plane was traveling at high speed at time of impact.

Retrieved from “https://en.wikinews.org/w/index.php?title=Plane_crashes_into_office_block_in_Austin,_Texas&oldid=4460821”
Posted in Uncategorized
Sscp Actual Exam

Sscp Actual Exam

SSCP Actual Exam by John AdamsQuestion: 1A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is:A. concern that the laser beam may cause eye damageB. the iris pattern changes as a person grows older.C. there is a relatively high rate of false accepts.D. the optical unit must be positioned so that the sun does not shine into the aperture.Answer: D Explanation:Because the optical unit utilizes a camera and infrared light to create the images, sun light can impact the aperture so it must not be positioned in direct light of any type. Because the subject does not need to have direct contact with the optical reader, direct light can impact the reader.An Iris recognition is a form of biometrics that is based on the uniqueness of a subject’s iris. A camera like device records the patterns of the iris creating what is known as Iriscode.It is the unique patterns of the iris that allow it to be one of the most accurate forms of biometric identification of an individual. Unlike other types of biometics, the iris rarely changes over time. Fingerprints can change over time due to scaring and manual labor, voice patterns can change due to a variety of causes, hand geometry can also change as well. But barring surgery or an accident it is not usual for an iris to change. The subject has a high-resoulution image taken of their iris and this is then converted to Iriscode. The current standard for the Iriscode was developed by John Daugman. When the subject attempts to be authenticated an infrared light is used to capture the iris image and this image is then compared to the Iriscode. If there is a match the subject’s identity is confirmed. The subject does not need to have direct contact with the optical reader so it is a less invasive means of authentication then retinal scanning would be.Reference(s) used for this question:AIO, 3rd edition, Access Control, p 134.AIO, 4th edition, Access Control, p 182.Wikipedia – http://en.wikipedia.org/wiki/Iris_recognitionThe following answers are incorrect:concern that the laser beam may cause eye damage. The optical readers do not use laser so, concern that the laser beam may cause eye damage is not an issue.the iris pattern changes as a person grows older. The question asked about the physical installation of the scanner, so this was not the best answer. If the question would have been about long term problems then it could have been the best choice. Recent research has shown that Irises actually do change over time: http://www.nature.com/news/ageing-eyes-hinder-biometric-scans-1.10722there is a relatively high rate of false accepts. Since the advent of the Iriscode there is a very low rate of false accepts, in fact the algorithm used has never had a false match. This all depends on the quality of the equipment used but because of the uniqueness of the iris even when comparing identical twins, iris patterns are unique.Question: 2In Mandatory Access Control, sensitivity labels attached to object contain what information?A. The item’s classificationB. The item’s classification and category setC. The item’s categoryD. The items’s need to knowAnswer: B Explanation:A Sensitivity label must contain at least one classification and one category set.Category set and Compartment set are synonyms, they mean the same thing. The sensitivity label must contain at least one Classification and at least one Category. It is common in some environments for a single item to belong to multiple categories. The list of all the categories to which an item belongs is called a compartment set or category set.The following answers are incorrect:the item’s classification. Is incorrect because you need a category set as well.the item’s category. Is incorrect because category set and classification would be both be required.The item’s need to know. Is incorrect because there is no such thing. The need to know is indicated by the catergories the object belongs to. This is NOT the best answer.Reference(s) used for this question:OIG CBK , Access Control (pages 186 – 188)AIO, 3rd Edition, Access Control (pages 162 – 163)AIO, 4th Edittion, Access Control, pp 212-214.Wikipedia – http://en.wikipedia.org/wiki/Mandatory_Access_ControlQuestion: 3What are the components of an object’s sensitivity label?A. A Classification Set and a single Compartment.B. A single classification and a single compartment.C. A Classification Set and user credentials.D. A single classification and a Compartment Set.Answer: D Explanation:Both are the components of a sensitivity label.The following are incorrect:A Classification Set and a single Compartment. Is incorrect because the nomenclature “Classification Set” is incorrect, there only one classifcation and it is not a “single compartment” but a Compartment Set.A single classification and a single compartment. Is incorrect because while there only is one classifcation, it is not a “single compartment” but a Compartment Set.A Classification Set and user credentials. Is incorrect because the nomenclature “Classification Set” is incorrect, there only one classifcation and it is not “user credential” but a Compartment Set. The user would have their own sensitivity label.Question: 4What does it mean to say that sensitivity labels are “incomparable”?A. The number of classification in the two labels is different.B. Neither label contains all the classifications of the other.C. the number of categories in the two labels are different.D. Neither label contains all the categories of the other.Answer: D Explanation:If a category does not exist then you cannot compare it. Incomparable is when you have two disjointed sensitivity labels, that is a category in one of the labels is not in the other label. “Because neither label contains all the categories of the other, the labels can’t be compared. They’re said to be incomparable”COMPARABILITY:The label:TOP SECRET [VENUS ALPHA] is “higher” than either of the labels:SECRET [VENUS ALPHA] TOP SECRET [VENUS] But you can’t really say that the label:TOP SECRET [VENUS] is higher than the label:SECRET [ALPHA] Because neither label contains all the categories of the other, the labels can’t be compared. They’re said to be incomparable. In a mandatory access control system, you won’t be allowed access to a file whose label is incomparable to your clearance.The Multilevel Security policy uses an ordering relationship between labels known as the dominance relationship. Intuitively, we think of a label that dominates another as being “higher” than the other. Similarly, we think of a label that is dominated by another as being “lower” than the other. The dominance relationship is used to determine permitted operations and information flows.DOMINANCEThe dominance relationship is determined by the ordering of the Sensitivity/Clearance component of the label and the intersection of the set of Compartments.Sample Sensitivity/Clearance ordering are: Top Secret > Secret > Confidential > Unclassified s3 > s2 > s1 > s0Formally, for label one to dominate label 2 both of the following must be true: The sensitivity/clearance of label one must be greater than or equal to the sensitivity/clearance of label two. The intersection of the compartments of label one and label two must equal the compartments of label two.Additionally: Two labels are said to be equal if their sensitivity/clearance and set of compartments are exactly equal. Note that dominance includes equality. One label is said to strictly dominate the other if it dominates the other but is not equal to the other. Two labels are said to be incomparable if each label has at least one compartment that is not included in the other’s set of compartments.The dominance relationship will produce a partial ordering over all possible MLS labels, resulting in what is known as the MLS Security Lattice.The following answers are incorrect:The number of classification in the two labels is different. Is incorrect because the categories are what is being compared, not the classifications.Neither label contains all the classifications of the other. Is incorrect because the categories are what is being compared, not the classifications.the number of categories in the two labels is different. Is incorrect because it is possibe a category exists more than once in one sensitivity label and does exist in the other so they would be comparable.Reference(s) used for this question:OReilly – Computer Systems and Access Control (Chapter 3)http://www.oreilly.com/catalog/csb/chapter/ch03.htmlandhttp://rubix.com/cms/mls_domQuestion: 5Which of the following is true about Kerberos?A. It utilizes public key cryptography.B. It encrypts data after a ticket is granted, but passwords are exchanged in plain text.C. It depends upon symmetric ciphers.D. It is a second party authentication system.Answer: C Explanation:Kerberos depends on secret keys (symmetric ciphers). Kerberos is a third party authentication protocol. It was designed and developed in the mid 1980’s by MIT. It is considered open source but is copyrighted and owned by MIT. It relies on the user’s secret keys. The password is used to encrypt and decrypt the keys.The following answers are incorrect:It utilizes public key cryptography. Is incorrect because Kerberos depends on secret keys (symmetric ciphers).It encrypts data after a ticket is granted, but passwords are exchanged in plain text. Is incorrect because the passwords are not exchanged but used for encryption and decryption of the keys.It is a second party authentication system. Is incorrect because Kerberos is a third party authentication system, you authenticate to the third party (Kerberos) and not the system you are accessing.References:MIT http://web.mit.edu/kerberos/Wikipedi http://en.wikipedia.org/wiki/Kerberos_%28protocol%29OIG CBK Access Control (pages 181 – 184)AIOv3 Access Control (pages 151 – 155)Question: 6Which of the following is needed for System Accountability?A. Audit mechanisms.B. Documented design as laid out in the Common Criteria.C. Authorization.D. Formal verification of system design.Answer: A Explanation:Is a means of being able to track user actions. Through the use of audit logs and other tools the user actions are recorded and can be used at a later date to verify what actions were performed.Accountability is the ability to identify users and to be able to track user actions.The following answers are incorrect:Documented design as laid out in the Common Criteria. Is incorrect because the Common Criteria is an international standard to evaluate trust and would not be a factor in System Accountability.Authorization. Is incorrect because Authorization is granting access to subjects, just because you have authorization does not hold the subject accountable for their actions.Formal verification of system design. Is incorrect because all you have done is to verify the system design and have not taken any steps toward system accountability.References:OIG CBK Glossary (page 778)Question: 7What is Kerberos?A. A three-headed dog from the egyptian mythology.B. A trusted third-party authentication protocol.C. A security model.D. A remote authentication dial in user server.Answer: B Explanation:Is correct because that is exactly what Kerberos is.The following answers are incorrect:A three-headed dog from Egyptian mythology. Is incorrect because we are dealing with Information Security and not the Egyptian mythology but the Greek Mythology.A security model. Is incorrect because Kerberos is an authentication protocol and not just a security model.A remote authentication dial in user server. Is incorrect because Kerberos is not a remote authentication dial in user server that would be called RADIUS.Question: 8The three classic ways of authenticating yourself to the computer security software are by something you know, by something you have, and by something:A. you need.B. non-trivialC. you are.D. you can get.Answer: C Explanation:This is more commonly known as biometrics and is one of the most accurate ways to authenticate an individual.The rest of the answers are incorrect because they not one of the three recognized forms for Authentication.Question: 9A timely review of system access audit records would be an example of which of the basic security functions?A. avoidance.B. deterrence.C. prevention.D. detection.Answer: D Explanation:By reviewing system logs you can detect events that have occured.The following answers are incorrect:avoidance. This is incorrect, avoidance is a distractor. By reviewing system logs you have not avoided anything.deterrence. This is incorrect because system logs are a history of past events. You cannot deter something that has already occurred.prevention. This is incorrect because system logs are a history of past events. You cannot prevent something that has already occurred.Question: 10A confidential number used as an authentication factor to verify a user’s identity is called a:A. PINB. User IDC. PasswordD. ChallengeAnswer: A Explanation:PIN Stands for Personal Identification Number, as the name states it is a combination of numbers.The following answers are incorrect:User ID This is incorrect because a Userid is not required to be a number and a Userid is only used to establish identity not verify it.Password. This is incorrect because a password is not required to be a number, it could be any combination of characters.Challenge. This is incorrect because a challenge is not defined as a number, it could be anything.Test Information:Total Questions: 1076Test Number: SSCPVendor Name: ISC2Cert Name: SSCPTest Name: Systems Security Certified PractitionerOfficial Site: https://www.certschief.com/For More Details: https://www.certschief.com/exam/SSCP/Article Source: eArticlesOnline.com

[youtube]http://www.youtube.com/watch?v=u16YMXZ752A[/youtube]
<div class=Birks to create 2010 Olympic, Paralympic jewelery; wines on menu
" />

Birks to create 2010 Olympic, Paralympic jewelery; wines on menu

Thursday, February 8, 2007

Birks was recently announced as the “Official Supplier of Jewelery” for the 2010 Vancouver-Whistler Olympics. The company will create licensed products with the logos of the 2010 Olympic Games, 2010 Paralympic Games, and the Canadian Olympic team emblem, including necklaces, earrings, pendants and rings.

The partnership was announced at an employee celebration in Vancouver, to mark the centenary of Mayors Jewelers Inc., an American company Birks acquired in 2002.

The six-year sponsorship includes the rights to the Canadian Olympic team logo during the Beijing 2008 and London 2012 Olympic Games.

Thomas A. Andruskevich, president and CEO, Birks & Mayors stated in a press release:

We are extremely proud to take part in this journey that honors our best athletes and celebrates excellence as the Vancouver 2010 Winter Games shine on the world wide stage. Canadians look to Birks to mark the most important celebrations in their lives which is why Birks wants to commemorate this important moment in Canadian history.

The products will be launched in early 2008.

Also released today is information that Jackson-Triggs Esprit will be a special line of wines, created to celebrate the athletic event. The Vincor Canada wine is named in relevance to “spirit”, both the spirit of the Olympians, and alcoholic beverage usage of the word.

President and CEO of Vincor Canada Jay Wright said, “We are thrilled to have this opportunity to honor our Canadian athletes while affirming our role as Canada’s wine industry leader. Like our Olympic and Paralympic athletes, Vincor Canada shares a passion and determination towards excellence. This agreement is by far Vincor Canada’s most ambitious and broad-reaching sponsorship and will be great for the Canadian wine industry. I hope Canada will join us in the excitement that we feel regarding this exceptional opportunity to position Canadian wine brands on the world stage.”

The wines, featuring Olympic logo, will be distributed to liquor stores and restaurants across the country this summer. Proceeds from each bottle will go towards the Canadian Olympic Team.

Both the Chardonnay and Merlot will retail for CDN$11.95 MSRP. Inniskillin Wines’ vineyards, harvested since 1975, in either the Niagara Peninsula in Ontario pr the Okanagan Valley in British Columbia will create the wine.

Within the past few weeks, the Vancouver Organizing Committee for the 2010 Olympic and Paralympic Winter Games (VANOC) has announced a Omega-brand countdown clock that will tour British Columbia events, as the company is the “Official Olympic Timekeeper”. Canadian Pacific was named official rail freight services provider, and the Royal Canadian Mint announced they will create circulation and collector coins to mark the occasion.

There are 1099 days until the XXI Olympiad, according to the official website of the event.

Retrieved from “https://en.wikinews.org/w/index.php?title=Birks_to_create_2010_Olympic,_Paralympic_jewelery;_wines_on_menu&oldid=2584570”
Posted in Uncategorized
<div class=Ukraine: media riddles around the phosphorous cloud
" />

Ukraine: media riddles around the phosphorous cloud

Saturday, July 21, 2007

The available information about the phosphorous cloud following the railway accident in the Ukraine last Monday is becoming more and more cryptic.

The political involvement of most media and other factors are causing contradictions among official sources that are making press work extremely hard. Moreover, no one is permitted to enter the accident location. The site of the accident was closed to visitors following the injury of three TV journalists who got too close.

Retrieved from “https://en.wikinews.org/w/index.php?title=Ukraine:_media_riddles_around_the_phosphorous_cloud&oldid=4663470”
Posted in Uncategorized
<div class=Manchester City loans Joe Hart to Torino
" />

Manchester City loans Joe Hart to Torino

Saturday, September 3, 2016

On Wednesday, English football club Manchester City F.C. announced that they had loaned their goalkeeper Joe Hart to Italian club Torino F.C. till the season end.

Hart joined City from Shrewsbury Town F.C. in 2006. Since then, he has won four Premier League Golden Gloves for keeping most clean sheets in a season, which is a League record. In a decade at the Etihad Stadium, Hart has won two Premier League trophies, two Football League Cups and one FA Cup.

Hart debuted for England at the age of 21, and has represented the country at UEFA Euro 2012 and 2016 and FIFA World Cup 2014.

Signing the contract, Hart said, “I am very excited to compare myself in an important and beautiful League such as Serie A.” ((it))Italian language: ?Sono molto felice di potermi confrontare in un campionato bello e difficile come la Serie A.

Goalkeeper Joe Hart’s move away from Manchester City came about a week after Pep Guardiola signed Chilean goalkeeper Claudio Bravo from FC Barcelona.

Retrieved from “https://en.wikinews.org/w/index.php?title=Manchester_City_loans_Joe_Hart_to_Torino&oldid=4576725”
Posted in Uncategorized
How To Use Empathetic Marketing In Your Social Media Strategy

How To Use Empathetic Marketing In Your Social Media Strategy

4 Ways to Increase Social Media Reach and Engagement

If you’re like 44% of people worldwide, you’ve been spending more time on social media during the pandemic. Whether you’re catching up on the latest news on Twitter or chatting with family on Facebook, social media has allowed us to stay connected.

But as a small business owner, are you spending more time on social media being empathetic?

While sometimes confused with sympathy, which is feeling compassion for someone else, empathy means putting yourself in somebody else’s shoes.

By empathizing with your customers, you can better serve them.

Here’s the Merriam Webster definition of empathy: “the action of (or capacity for) understanding, being aware of, being sensitive to, and vicariously experiencing the feelings, thoughts, and experience of another.”

It’s important to take an empathetic approach in all of your marketing materials, from your website copy to your social media strategy.

Because social media offers such a great way to interact with a large audience, you should be willing to put in the time and effort to ensure your communications are not only engaging, but empathetic to what people are going through.

***

READ: The Importance of Empathy-Based Marketing

As we move forward from COVID-19, empathy-based marketing isn’t just the right thing to do, your customers now expect it.

Many studies done during the pandemic are showing people want brands to be more empathetic and aware of the long-term impact it will have on their lives.

Hopefully, you communicated authentically and empathetically with your customers during this time, and you’re going to have to continue to do so! Here are 3 ways to use empathetic content marketing…

Read more.

***

According to the Braze Brand Humanity Index research, around 65% of people were more loyal to brands they felt a human connection with.

So to help you get—and stay connected—with your customers, here are four ways a small business owner can build a social media presence with more empathetic content marketing.

1. Create an empathy map.

This can be a good first step to put you deeper into the mind of your customer. Originally a tool used in the design and agile development worlds, empathy mapping provides a deeper understanding of your customer. It’s usually split into four quadrants: says, thinks, does and feels.

  • With your target customer’s persona in the middle, you begin to brainstorm questions, like:
  • Why do you need my product?
  • How does using my product make you feel/think/do/say?
  • What are some stressors/fears in your life?
  • How does my product help you reach your goals?

Write out your customer’s thoughts the way you think he or she would express. Their needs, wants, desires, hopes, fears, goals and dreams will start to be more clear, and you’ll be able to build a social media presence using messaging that resonates with your followers.

2. Tap into your customers’ emotions.

I’m not talking about playing on their fears to sell your products, but rather, thinking about how your product makes them feel.

Here’s a way that a brand helped ease their smallest customers’ fears. Philips invented a miniature version of a CAT scanner called the ‘KittenScanner,’ which doctors use to educate kids about the MRI process and put them at ease. Children can try it out with toy animals, taking the focus off of their procedure and onto fun.

It was created back in 2004, but it still gets mentioned on social media, in videos and in health journals as a way to reduce the need for sedation. How could you position your brand in a helpful, stress-reducing way for your customers?

3. Use social listening to your advantage.

Social listening is all about monitoring your communication channels for brand and competitor mentions, and certain keywords and comments.

As you “listen” to your followers this way, you can gain valuable insights into what they like, don’t like, want and need from you. You may see a tweet on Twitter from a happy customer who loved your product. Or, you may see a comment from someone who wasn’t impressed with how long it took customer service to respond to a complaint.

With social listening, you not only get information on how your small business is performing, you also get the opportunity to provide better customer service and tweak a process or product that isn’t working.

4. Inspire customers to take action.

Showing your customers you believe in them is an ideal way to increase social media reach and engagement. Think about the product or service you offer to your customers. How could you get them to use it to add value to their life and/or entertain them?

For example, Home Depot encouraged their customers to grow a living salad bowl with an infographic they shared on social channels. While there is minimal branding on this infographic, it still reinforces Home Depot’s marketing strategy of the things that are possible with their products.

No matter how you’re using empathy-based marketing to increase social media reach and engagement, remember your branding. For example, if your brand voice is “fun, upbeat and confident,” using humour might be the best way to engage your audience.

If it’s “down-to-earth, considerate and approachable,” a more heartfelt, emotional message could be the way to most effectively speak to your customers.

And don’t forget to create a social media marketing plan to save time and money!

In my AMPLiFY! Business Academy, we’ve been exploring the Empathy-based marketing model in-depth. It’s a monthly training program designed to help you navigate these murky waters on how to best market your business. Come and join us for only $1 for the next 45 days and receive solid marketing strategies that will get you through this crisis.

To your business success,Susan Friesen