An oversized ruby-colored sphere rising in the sky as a total lunar eclipse turns the normally pallid moon scarlet is enough to make some people swoon. And perhaps with good reason, as the fiery glow is the most dramatic of the three types of lunar eclipses (the other two are called partial and penumbral).
In addition, perfection is a must: A total lunar eclipse happens only when the sun, Earth and moon are perfectly lined up.
So when the moon tiptoes into the outer portion of Earth’s shadow, becoming totally bathed in the darkest part of that shadow, why isn’t the result a “lights out” for the sky? Why instead does the moon become engulfed in a light-orange to blood-red glow?
Credit card fraud is growing over the Internet, email, traditional mail, and telephone. “Phishing” is when scammers send out fraudulent emails asking for your personal information, such as your credit card number or bank account number. Never respond to these—delete them immediately.
In a similar phishing scam, someone may phone you pretending to be your bank, the fraud department of your credit card company, or another organization, and may ask to “verify your information” or “verify you are in possession of your card.” They often ask for your 3-digit verification code on the back of the card or ask for the first 12 digits of your card (they may already have the last 4 digits from a discarded receipt). Reputable companies do not call and ask for this information. If you did not initiate the call, do not give them any information and hang up immediately.
Courtesy CB Insights
Everybody (except colleges) is complaining about the cost of a university education. This graph makes it clear how bad it really is.
On the plus side, mobile apps and SaaS are making software affordable, and if you have any money left over after paying for your education, childcare and healthcare, you can get a great deal on toys.
Sexual harassment is a big problem in the modern workplace. The Equal Employment Opportunity Commission (EEOC) and state agencies handled a total of 11,364 sexual harassment charges in 2011 (the most recent combined reporting data). Of those cases, 26 percent were decided in favor of complainants, with employers of all sizes paying out $52.3 million in victim settlements in that year alone.
Sexual harassment can happen to, and be committed by, workers of any professional level or gender. It is a form of discrimination that violates Title VII of the Civil Rights Act of 1964, which states that it is unlawful to harass a person in the workplace. However, this federal regulation applies only to employers with 15 or more employees, and even businesses that pass that threshold are not legally required to have an official sexual harassment policy.
Security expert Emma Philpott has said: “There’s a lot of great talk, but most SMEs do nothing about cyber security. It’s shocking.”
The threat of cyber security is one that is very, very real to SME’s. In fact, despite the tales of the large corporations being victims of cyber-attacks – it appears its predominantly small- medium businesses that are being targeted. In 2015 a government report found that 74% of small businesses reported a breach in security.
Small businesses are often guilty of falling into the trap of feeling that they aren’t likely to be targeted due to their size and that hackers or cyber criminals couldn’t possibly be interested in what they do – but in reality, it’s the opposite that is true.
To determine the most effective TV spots of the Olympics, Google tracked the top 12 brands with ads that aired during NBC’s broadcasts by length and frequency, including Coca-Cola, Nike and BMW.
Collectively, the ads generated 3.5 billion impressions. The company’s data includes online surveys as well as traffic stats about Google searches.
Per Google’s findings, 34.4 percent of consumers remembered seeing Nike’s “Unlimited” campaign, which champions the stories of everyday athletes like Chris Mosier, Sister Madonna Buder and Kyle Maynard—the first quadruple amputee to climb Mount Kilimanjaro.
Ten days after deadly flash flooding tore through southeastern Louisiana, tens of thousands of devastated residents are working to recover.
As of this morning, 60,700 homes were reported to be damaged or destroyed throughout the state and 102,000 people have registered for federal assistance, said Mike Steele, spokesman for the Governor’s Office of Homeland Security and Emergency Preparedness.
The flash flooding first struck the Baton Rouge area Aug. 12, forcing unsuspecting residents out of their homes.
Louisiana Gov. John Bel Edwards has called the flood that killed at least 13 “unprecedented” and “historic.” The situation was declared an emergency and the Federal Emergency Management Agency (FEMA) called in to provide resources and funding to help with recovery efforts.
For some displaced residents, it brought back painful memories of evacuating during Hurricane Katrina 11 years ago.
Nakeisha Hall’s job was to help taxpayers. Hall, the daughter of a long-time IRS employee, started working for the Internal Revenue Service (IRS) in 2000. In 2007, she began work at the IRS Taxpayer Advocate Service (TAS) office in Birmingham, Alabama and subsequently worked in TAS offices in Nebraska, Louisiana, and Utah. At TAS, Hall was responsible for helping taxpayers who were having difficulties with the IRS, including victims of identity theft.
As it turns out, Hall wasn’t doing her job. Instead, she was using her job to steal from taxpayers.
Microsoft has picked up another productivity app — announcing the acquisition of AI-powered scheduling tool Genee. In a blog post today the software giant said it will be plugging Genee into its cloud productivity suite, Office 365. Terms of the deal were not disclosed.
“As we continue to build new Office 365 productivity capabilities and services our customers value, I’m confident the Genee team will help us further our ambition to bring intelligence into every digital experience,” writes Rajesh Jha, CVP of Outlook and Office 365.
Genee launched in public beta a year ago, offering an end-to-end scheduling tool that integrates with calendar apps and email providers to take the strain out of arranging meetings.
Understanding the basics behind point of sale (POS) compliance can be something of a chore, but it is key to making sure you select the right POS system for your business. A good point of sale system can be way more than just a cash register and a payment terminal. Indeed, a terrific POS can help you with inventory management, referral programs, rewards programs, and other elements of customer relationship management. However, without substantial compliance, your POS can be something you never want it to be: a liability.
In this article, we are going to look at three elements of POS compliance and how they can help to keep your customers safe. These elements are PCI, PAYware Connect, and EMV.