SORT BY Relevancy
Dana Laake and her special guest Dr. James Duke will be discussing herbistatins – herbal alternatives to synthetic statins using wholesome foods that lower the bad LDL cholesterol and raise the good HDL with fewer negative side effects.
James A. Duke, PhD, held several posts in his more than three decades with the US Department of Agriculture including chief of the Medicinal Plant Resources Laboratory. He also developed the phytochemical and ethnobotanical databases at the USDA. He is the author of more than 30 texts and popular books, including the The Green Pharmacy and Handbook of Medicinal Herbs, and is on the board of advisors for Prevention.
Dr. Stephanie Seneff is a MIT research scientist formerly trained in robotics and artificial intelligence. In recent years she has switched her focus back towards biology. She is concentrating mainly on the relationship between nutrition and health. Since 2011, she has written 10 papers (7 as first author) in various medical and health-related journals on topics such as modern day diseases (e.g., Alzheimer, autism, cardiovascular diseases), analysis and search of databases of drug side effects using NLP techniques, and the impact of nutritional deficiencies and environmental toxins on human health.
Award-winning documentary storyteller, Leonard Smith lll of LS3 Studios provides an insightful approach on how he discovered information about his enslaved 3rd great-grandmother. He shares his roadmap technique on how to use online databases, public and courthouse records.
Genealogist Leonard Smith lll discusses the story of Louise, who demonstrated her commitment and courage to gain freedom for herself and her children by fighting in the Assumption Parish Court System for eleven years form 1845-1853. Leonard will be conducting a genealogy workshop on March 29, 10:30 a.m. - 1 p.m. at the New Orleans Main Library Auditorium.
Please join host Antoinette Harrell as she interview Leonard Smith lll. This workshop is sponsored by the African American Resource Center. Seating is limited, please call to reserve your seat.
CAROL AND RENE' will tell the story of how identities are stolen, people are created, dead people are resurrected in order to commit fraud on the courts/land records and our nation. Hear how the systemic identity theft affects you ALL. From every court of records IN THE NATION to every BANK in the WORLD the crimes exist, the most heinous are through using the identities of children. The third party unsecured debt collectors and attorneys who represent the banks are involved and there are shadow cases and dockets falsely placing warrants and bonds on your backs! And, the fake properties and fake deeds of trust are created to further the thefts and create fraud upon the courts. The nation has been fighting MORTGAGE FRAUD, but in reality it all comes stems from identity theft and fraudulent documents filed into our land records aka: CRIME SCENES. The electronic Databases used by the crooks create unjust enrichment for the banksters and elite, our people are being betrayed. Guests will include Moms and Dads from across the nation who will talk about how this has affected their families! call in and listen: 646-478-3875
TUNE IN AND LISTEN!
Rhiannon Held is author of the SILVER series, an urban fantasy series about werewolves from Tor. In her day job she works as a professional archaeologist. Unfortunately, given that it’s real rather than fictional archaeology, fedoras, bullwhips, aliens, and dinosaurs are in short supply. Most of her work is done on the computer, using databases to organize data, and graphics programs to illustrate it.
In REFLECTED, the third book of the series that began with her debut novel, SILVER, Rhiannon Held continues the secret lives of the werewolf packs that live and hunt alongside human society. Silver and her mate Andrew Dare are pack leaders of the entire North American werewolf population, and that makes the more traditional packs in Europe very nervous indeed.
In book 2 of the series, TARNISHED, Andrew Dare finds his mate in Silver, but they haven’t found the pack they can call home. Andrew has baggage—his violent history with the packs of Spain and the rumors of his lack of control. And then there’s Silver—the werewolf who has lost her wild self to a monster’s assault, and who can no longer shift forms.
In SILVER, Andrew Dare is a werewolf. He’s the enforcer for the Roanoke pack, and responsible for capturing or killing any Were intruders in Roanoke’s territory. But the lone Were he’s tracking doesn’t smell or act like anyone he’s ever encountered. And when he catches her, it doesn’t get any better. She’s beautiful, she’s crazy, and someone has tortured her by injecting silver into her veins. Silver represents a terrible threat to every Were on the continent.
Articles read: http://www.asha.org/publications/leader/2006/060228/f060228b.htm http://www.cchfreedom.org/cchf.php/847#.UvAVebR_SN8 http://hstlj.org/articles/concerns-associated-with-expanding-dna-databases/ Monday through Friday our focus will be on: Hour 1: Public Safety We Love you [click here to join our Facebook page] Hour 2: US Constitution Saturday and Sunday: La Bussola [the compass] - navigating life with faith, hope and encouragement.
Computer America Hour one: Going on a date with someone new? DirtSearch them first! DirtSearch is a search engine like Google. It simply gathers information, patterns or names, from public records and returns results. DirtSearch's Mission is to accurately search public records databases and data sources with intuitive, accurate information on parties whose names have been inputted into the search engine. Their goal is to accurately link all of the online public records an
Caleb talks with Joe DiPietro about practical security controls for databases and big data environments. The following aspects of security and compliance will be covered:
- what to monitor
- how to discover sensitive information
- validating security controls & database policies
- what role does the business owner play in the security framework
- what to protect in a big data environment
The Ready for IBM Security Intelligence Partner Program Webinar link reference in the show is as follows: https://www-950.ibm.com/events/swgeer/swgeer06.nsf/signin?openform&seminar=kwoamoe8zkpv4&lang=en
On tonight's episode we disuss ways to launch your startup quickly without writing a line of code! We will discuss: Ways to launch a website without writing code Ways to add advanced functionality to your site without writing code Ways to create complete web applications without writing code Using databases without writing code Startups that have successfully launched without writing code Call in and ask your questions!
Learn of the increased focus placed on data security, compliance, and privacy to deal with the constant threats to enterprises, and how a leading industry actor effectively makes data protection possible in their growing diverse IT ecosystem. As company's environments become more open and complex, sensitive data can be found not only on internal databases, but also in datawarehouses, Big Data (Hadoop or NoSQL) platforms, and file systems including those outsourced and in the Cloud. We will be discussing best practices approaches (like data activity monitoring and SIEM) to make data protection and regulation compliance a reality for the organization, while keeping costs down in an ever growing and changing IT deployment.
Computer America Hour one: Wright Business. With the explosion of bring your own device (BYOD) to the workplace, companies may find this to be a cost cutters dream but doing so could send your company straight into the depths of hell....violating security, opening your systems to hacking and the harvesting of high security databases. Now your employees cell phone, Kindle, wireless tablet are all viable avenues to hackers everywhere...To learn more about what types of security breaches BYOD can
Join Host Live Chats
There are no live chats in progress