Implix launches GetResponse in ASEAN market

Ike Suarez | Oct. 13, 2014

E-mail marketing platform now supports key native languages in region.

Implix has now officially introduced its e-mail marketing platform, GetResponse into the ASEAN.

A press statement by Implix said GetResponse's formal entry was marked by a visit late Septemberby the company's CEO Simon Grabowski to three of the 10 member countries of the Association ofSoutheast Nations, namely Singapore, Malaysia and Thailand.

Accompanied by senior Implix executives, Grabowski toured Singapore as well as the capital cities of thetwo other countries, Kuala Lumpur and Bangkok, to give educational seminars on email marketing.

Web-based

The press statement pointed out that the Web-based and customized service now offers support for keynative languages in the region such as Chinese, Bahasa Malayu and Thai.

It explained that to be effective, an e-mail marketing tool must include design, device agnosticism,personalization and language support.

It said such support for the Chinese, Malay and Thai languages had been added by Implix early this 2014.It further said e-mail could also serve as a powerful marketing tool for small and medium-sizedbusinesses, if done properly.

Implix has offices in the United States, Poland and Canada, it having been founded in 1998 and beingbased in Gdansk, Poland.

Continued here:
Implix launches GetResponse in ASEAN market

UNL’s AgBiosafety for Educators

What is genetic engineering? Genetic engineering is the process of manually adding new DNA to an organism. The goal is to add one or more new traits that are not already found in that organism. Examples of genetically engineered (transgenic) organisms currently on the market include plants with resistance to some insects, plants that can tolerate herbicides, and crops with modified oil content.

Understanding Genetic Engineering: Basic Biology To understand how genetic engineering works, there are a few key biology concepts that must be understood.

Small segments of DNA are called genes. Each gene holds the instructions for how to produce a single protein. This can be compared to a recipe for making a food dish. A recipe is a set of instructions for making a single dish.

An organism may have thousands of genes. The set of all genes in an organism is called a genome. A genome can be compared to a cookbook of recipes that makes that organism what it is. Every cell of every living organism has a cookbook.

CONCEPT #2: Why are proteins important? Proteins do the work in cells. They can be part of structures (such as cell walls, organelles, etc). They can regulate reactions that take place in the cell. Or they can serve as enzymes, which speed-up reactions. Everything you see in an organism is either made of proteins or the result of a protein action.

How is genetic engineering done? Genetic engineering, also called transformation, works by physically removing a gene from one organism and inserting it into another, giving it the ability to express the trait encoded by that gene. It is like taking a single recipe out of a cookbook and placing it into another cookbook.

1) First, find an organism that naturally contains the desired trait.

2) The DNA is extracted from that organism. This is like taking out the entire cookbook.

3) The one desired gene (recipe) must be located and copied from thousands of genes that were extracted. This is called gene cloning.

4) The gene may be modified slightly to work in a more desirable way once inside the recipient organism.

Visit link:
UNL's AgBiosafety for Educators

The GOP Intensifies Its Attacks On The National Science Foundation

Rep. Lamar Smith (R-TX), the Chairman of the House Science Committee on Science, Space and Technology has repeatedly denounced the National Science Foundation for squandering taxpayer money on frivolous research. Now he's gone a step further, demanding personal political scrutiny of peer-reviewed research grants.

Smith has used several hearings this year as an opportunity to publicly lambast the National Science Foundation (NSF)including a combative March 26 hearing where he lectured White House Science Advisor John Holdren on the "lack of transparency and accountability at the agency" by singling out grants such as a study of the ecological consequences of early human-set fires in New Zealand. (That research promises to yield insights into anthropogenic climate changenot a popular topic for Smith and fellow GOP representatives on the committee.)

And now, as Jeffrey Mervis at ScienceInsider reports:

Four times this past summer. two congressional staffers spent hours poring over material relating to 20 research projects that NSF has funded over the past decade. Each folder contained confidential information that included the initial application, reviewer comments on its merit, correspondence between program officers and principal investigators, and any other information that had helped NSF decide to fund the project.

The visits from the staffers, who work for the U.S. House of Representatives committee that oversees NSF, were an unprecedentedand some say bizarreintrusion into the much admired process that NSF has used for more than 60 years to award research grants.

The Republican aides were looking for anything that Representative Lamar Smith.could use to support his ongoing campaign to demonstrate how the $7 billion research agency is "wasting" taxpayer dollars on frivolous or low-priority projects, particularly in the social sciences.

There's no end in sight: The visits are expected to continue into the fall, because NSF has accededafter some resistanceto Smith's request to make available information on an additional 30 awards.

As Mervis notes, Smith's request created a serious dilemma for NSF Director France Crdova. While Congress has the authority to obtain information as part of its job to oversee federal agencies, the NSF promises researchers that the peer-review process of their proposals will remain confidential.

More:
The GOP Intensifies Its Attacks On The National Science Foundation

Polish: New NATO chief visits Poland, promises "spearhead force" to deal with "threats" – Video


Polish: New NATO chief visits Poland, promises "spearhead force" to deal with "threats"
Video ID: 20141007-010 W/S Polish Prime Minister Eva Kopacz and NATO Secretary-General Jens Stoltenberg arriving SOT, Jens Stoltenberg, NATO Secretary-General (in English): "We will maintain...

By: RuptlyTV

Original post:

Polish: New NATO chief visits Poland, promises "spearhead force" to deal with "threats" - Video

One dead as suicide blast targets NATO convoy in Kabul

KABUL - A suicide bomber targeted a NATO convoy in Afghanistan's capital Kabul on Monday, killing an Afghan civilian but causing no casualties among foreign troops, officials said.

The explosion struck around dawn in Kabul's east, on the road to the city of Jalalabad, Afghan authorities said.

"A suicide bomber blew up his vehicle loaded with explosives in Qabil Bai," deputy interior minister General Mohammad Ayub Salangi said in a tweet, adding that "one person was killed and three injured in this attack".

A spokesman for NATO's International Security Assistance Force said there were "no ISAF casualties" in the attack.

No group has yet claimed responsibility for the bombing, but it had all the hallmarks of those carried out by the Taliban.

The group's last attack on NATO forces in Kabul was on September 16, also when a bomber rammed an explosives-laden car into a NATO convoy, triggering a massive blast that killed two Americans and one Polish soldier, and wounded a dozen civilians.

Kabul was also rocked two weeks ago by a series of suicide attacks staged during the inauguration of new president Ashraf Ghani. More than a dozen people were killed in several attacks on Afghan security forces.

About 40,000 NATO troops are serving in Afghanistan, but their combat mission is scheduled to finish at the end of this year, and the Taliban's recent offensives have severely tested Afghan soldiers and police.

NATO's follow-up mission, which will take over on January 1, will be made up of 9,800 US troops and about 3,000 soldiers from Germany, Italy and other member nations.

Link:

One dead as suicide blast targets NATO convoy in Kabul

Afghans allege NATO airstrike kills 7 civilians

A U.S. army soldier, center, takes his position at the site of a suicide attack in Kabul, Afghanistan, Monday, Oct. 13, 2014. An Afghan official said a suicide bomber targeting a NATO convoy in Kabul killed one civilian and wounded three others. (AP Photo/Massoud Hossaini)

KABUL, Afghanistan (AP) A mountain ambush by Taliban fighters killed at least 14 Afghan security force troops, authorities said Monday, as villagers elsewhere in the country alleged a NATO airstrike that the coalition said targeted militants actually killed civilians.

The fighting in Sari Pul province, as well as the disputed NATO airstrike in eastern Paktia province, show the serious challenges facing new Afghan President Ashraf Ghani Ahmadzai. Former President Hamid Karzai repeatedly clashed with NATO forces over civilian casualties from airstrikes, straining relations as public anger against the coalition grew.

The ambush in Sari Pul, where Taliban fighters reportedly have been massing for days, happened Sunday in its Kohistanat district. There, militants opened fire on an Afghan Army unit heading back to the capital after several months being deployed there, killing 12 soldiers and two police officers, said Kazim Kenhan, a spokesman for the provincial police chief.

Kenhan said 13 troops and four police officers were wounded and six troops are missing after the ambush there, some 340 kilometers (210 miles) northwest of the capital, Kabul.

"A very intensive gun battle is going on right now and the casualty number might change overnight," Kenhan said Monday. "It is a mountainous area and very difficult to reach. We do need air support as we requested from the international forces, but they didn't help us."

In Paktia province, hundreds of villagers protested over their allegation that a NATO airstrike killed seven civilians in an operation NATO said killed "eight armed enemy combatants."

The protesters brought seven corpses to the governor's office there, claiming they were civilians killed Sunday during a NATO airstrike in a mountainous area on the outskirts of the city of Gardez. The villagers said the strike targeted eight people collecting firewood and left one man wounded.

"From the evidence it seems that all seven who have been killed in the airstrike of the coalition forces are civilians, but this needs to be investigated more to find out why and how this incident has happened," said Abdul Wali Sahee, deputy provincial governor of Paktia province.

Sahee said that there was a dead body of a 12-year-old boy among those brought to the provincial capital.

More here:

Afghans allege NATO airstrike kills 7 civilians

NATO convoy hit by suicide bomber in Afghanistan

A suicide bomber has targeted a NATO convoy in Afghanistan's capital Kabul, killing an Afghan civilian but causing no casualties among foreign troops, officials say.

The explosion struck around dawn (local time) in Kabul's east, on the road to the city of Jalalabad, Afghan authorities said.

"A suicide bomber blew up his vehicle loaded with explosives in Qabil Bai," deputy interior minister General Mohammad Ayub Salangi said in a tweet, adding that "one person was killed and three injured in this attack".

A spokesman for NATO's International Security Assistance Force said there were "no ISAF casualties" in the attack.

No group has yet claimed responsibility for the bombing, but it had all the hallmarks of those carried out by the Taliban.

The group's last attack on NATO forces in Kabul was on September 16, also when a bomber rammed an explosives-laden car into a NATO convoy, triggering a massive blast that killed two US troops and one Polish soldier, and wounded a dozen civilians.

Kabul was also rocked two weeks ago by a series of suicide attacks staged during the inauguration of new president Ashraf Ghani.

More than a dozen people were killed in several attacks on Afghan security forces.

About 40,000 NATO troops are serving in Afghanistan, but their combat mission is scheduled to finish at the end of this year, and the Taliban's recent offensives have severely tested Afghan soldiers and police.

NATO's follow-up mission, which will take over on January 1, will be made up of 9800 US troops and about 3000 soldiers from Germany, Italy and other member countries.

Go here to read the rest:

NATO convoy hit by suicide bomber in Afghanistan

20 Occifers & She Riffs Arrested by DEA , FBI, CIA, NSA, ABC….LOL – Video


20 Occifers She Riffs Arrested by DEA , FBI, CIA, NSA, ABC....LOL
2006 Privately paid corporate agents go after each other like cannibalistic vampires because of internal company policies....I mean really, like all these gov-corp #39;s don #39;t already do everything...

By: PseudoPersona (Archives for Free)

See more here:

20 Occifers & She Riffs Arrested by DEA , FBI, CIA, NSA, ABC....LOL - Video

Posted in NSA

NSA 'Core Secrets' leak points to spies working within companies

Summary: The latest Snowden leaks suggest the NSA has access to well-placed staff whose mission is to infiltrate companies to gather secret and sensitive corporate data.

New documents leaked by Edward Snowden suggest the National Security Agency (NSA) has agents working under deep cover in US and foreign companies.

First published by The Intercept on Friday, the highly-classified document points to the NSA having a small group of well-placed and heavily-vetted insiders, whose mission is to infiltrate commercial companies and work from within.

"How do you know the NSA is not sending people into your data centers?" the publication cited the American Civil Liberties Union'sChris Soghoian as saying.

The collection of six programs, under the umbrella "Sentry Eagle" program, is said to be the "core" part of the NSA's secret mission to "protect America's cyberspace."

In doing that, previous leaks have shown the US intelligence agency will work to weaken encryption standards, intercept technology for bugging once its out for delivery to customers, and conduct network exploitation and espionage.

The NSA has infiltrated a number of companies critical to its mission of targeted exploitation (TATEX). These agents, whose names are not disclosed, are said to be working in companies based in adversarial nations like China, but also allied and friendly countries, notably South Korea and Germany.

Some of the documents also suggest that some agents may be working for US-based firms, or companies that are owned by US corporations.

The 2004-dated document says the contents "constitute a combination of the greatest number of highly sensitive facts related to NSA/CSS's overall cryptologic," referring also to theCentral Security Service, the NSA's sister agency.

Read the rest here:

NSA 'Core Secrets' leak points to spies working within companies

Posted in NSA

Ex-NSA Head Says Gov't Shouldn't Pursue Reporter

A former director of the National Security Agency says he doesn't see the need for the U.S. government to prosecute the New York Times reporter who revealed the agency's warrantless surveillance of Americans.

Michael Hayden says he is "conflicted" about whether reporter James Risen should be compelled to reveal his sources.

Risen is facing potential jail time as he battles government efforts to force him to testify at the trial of a former CIA officer accused of leaking classified information.

Hayden tells CBS' "60 Minutes" that Risen's story damaged national security. But Hayden also says it's "wrong" if "the method of redressing that actually harms the broad freedom of the press."

Hayden says "government needs to be strong," but not so strong that it threatens individual liberties.

See the original post here:

Ex-NSA Head Says Gov't Shouldn't Pursue Reporter

Posted in NSA

NSA Leaker Edward Snowden Offers Online Privacy Tips

Edward Snowden has some advice for maintaining online privacy in an age of widespread NSA surveillance. Snowden called Google and Facebook dangerous while praising Apples encryption efforts.

"We're talking about encryption. We're talking about dropping programs that are hostile to privacy, Snowden said inan interview published Saturday by theNew Yorker.For example, Dropbox? Get rid of Dropbox; it doesn't support encryption, it doesn't protect your private files. And use competitors like SpiderOak that do the same exact service, but they protect the content of what you're sharing."

Snowden, the former NSA analyst who revealed the extent of U.S. government surveillance in 2013, did so from a hotel in Hong Kong before leaving for Russia. Having ditched his Hawaii apartment and $122,000 annual salary earlier that summer, he said in the interview he intended only a brief stay in Russia before leaving for Latin America, only to face visa issues that prevented him from leaving. Snowden is now actively sought by the U.S. to face espionage charges.

Dropbox defended itself in a June blog post after Snowden bashed the services security. All of the files its users send and receive are encrypted while traveling between you and our servers and when they are at rest on Dropboxs servers. SpiderOak encrypts data locally on a users computer as well, as opposed to only when it is in transit or in the cloud.

Snowden said Facebook and Google have improved their methods of protecting user privacy but were still dangerous services that should largely be avoided. Ironically, the interview was conducted remotely over Google Hangouts and streamed live on the tech giants YouTube.

Consumers should also be wary of standard text-messaging services from wireless providers, Snowden said. Silent Circle for iPhone and Android and RedPhone, which is currently Android-only, were better replacements because they encrypt texts -- but require that both users install the app to communicate.

View post:

NSA Leaker Edward Snowden Offers Online Privacy Tips

Posted in NSA

Oral arguments set for NSA case

COEUR d'ALENE - Oral arguments before the 9th U.S. Circuit Court of Appeals are scheduled for Dec. 8 in a North Idaho nurse's legal challenge to the federal government's bulk collection of Americans' phone records.

Coeur d'Alene attorney Peter Smith will be arguing in Seattle in front of the three-judge panel, representing his wife, Anna Smith, a neonatal nurse and Verizon Wireless customer. Verizon was one of the companies ordered to disclose records to the National Security Agency.

The Smiths filed the lawsuit against President Barack Obama and several U.S. intelligence agencies after the government confirmed revelations that the NSA was collecting the data under the Patriot Act.

Peter Smith said Friday the collection and storage of the phone records violates the Fourth Amendment.

"The question comes down to: Should the government be able to get this information and keep it?" he said. "Or should it be left with the private companies?"

Once the government has all the data, that gives it power, he said. It comes down to the possession of the records, he said.

"We don't trust the government," he said.

U.S. District Court Judge Lynn Winmill dismissed Anna Smith's case. Winmill determined the legal precedent from the 1979 U.S. Supreme Court case Smith v. Maryland - about targeted phone surveillance - tied his hands.

"He followed the law as he understood it," Peter Smith said.

The Smiths appealed to the Ninth Circuit.

Excerpt from:

Oral arguments set for NSA case

Posted in NSA

Montgomery County will not hold immigrants without probable cause — Gazette.Net

Montgomery County Executive Isiah Leggett said Tuesday the county will not comply with U.S. Immigration and Customs Enforcement civil detainer requests, unless there is adequate probable cause under the Fourth Amendment of the U.S. Constitution.

Leggetts statement comes on the heels of an identical directive from Gov. Martin J. OMalley to the Public Safety and Correctional Services Secretary Gregg Hershberger for a state-run jail in Baltimore, and advice from the Attorney Generals Office that without probable cause, continued detention likely violates the constitution.

Immigration detainers are notices to local law enforcement agencies that ICE intends to assume custody of an individual being held locally. Detainers not only notify local law enforcement that ICE means to take a person into custody once they are no longer subject to local detention, detainers also request the local agency hold individuals for up to 48 hours after their scheduled release to provide ICE time to take custody, according to http://www.ice.gov.

According to a news release from the American Civil Liberties Union of Maryland, federal courts have found that detention on the sole basis of an immigration detainer request violates the Fourth Amendment. Three federal courts have found that such detention raises constitutional concerns and that counties are liable in damages to the individuals they detain on that basis, according to the release.

In August, Adam D. Snyder, chief counsel, Opinions & Advice for the Maryland Attorney Generals Office, reached a similar conclusion finding that an ICE detainer alone does not mandate or authorize the continued detention of someone beyond when they would be released under state law.

Thus, if a local law enforcement officer does not have probable cause to extend custody over the subject of an ICE detainer, the continued detention likely constitutes a violation of the Fourth Amendment, he wrote in a letter of advice to Washington County Sheriff Douglas W. Mullendore.

In June, the ACLU of Maryland urged all counties in the state to stop complying with the detainer requests. Councilwoman Nancy Navarro requested in September that Leggett conform county policy to match the OMalleys recent directive on the issue.

In her request, Navarro (D-Dist. 4) of Silver Spring said she understood from Arthur Wallenstein, director of the County Department of Correction and Rehabilitation, that the practice locally was to contact ICE when there is a detainer in the system and the individual is available, even if local matters are concluded.

My understanding is that Montgomery Countys policy for responding to ICE civil detainer requests may be inconsistent with [state policy], Navarro wrote.

Wallenstein was not able to be reached Tuesday for comment.

Read this article:

Montgomery County will not hold immigrants without probable cause -- Gazette.Net

Love the outdoors and being Minnesotan

Posted: Monday, October 13, 2014 7:53 am

Love the outdoors and being Minnesotan pilotnews@pilotindependent.com The Pilot Independent

I received a mailing urging me to vote for Stewart Mills because he loves the outdoors and respects the Second Amendment. I, too, love the outdoors and respect the Second Amendment.

I have a conceal/carry permit. I hunt deer and small game. I manage our 260 acres of woodlands for healthy habitat for game animals and other wildlife, including the golden wing warbler. Fortunately, our private right to bear arms already has been secured by the decision of the US Supreme Court.

An online service is needed to view this article in its entirety. You need an online service to view this article in its entirety.

To become a new online only subscriber, please choose this option. By doing so, you will first proceed to a registration form. Upon completion of the registration form you will then continue by completing the subscription form. For assistance please call (218) 547-1000. Thank you.

Please note - If you have already registered during a previous visit to this web site go to directly to the login button at the top right and then proceed to the subscription form.

To become a new online only subscriber, and have your payment automatically charged every four weeks, please choose this option. By doing so, you will first proceed to a registration form. Upon completion of the registration form you will then continue by completing the subscription form. For assistance please call (218) 547-1000. Thank you.

Please note - If you have already registered during a previous visit to this web site go to directly to the login button at the top right and then proceed to the subscription form.

To become a new print and online subscriber, please choose this option. By doing so, you will first proceed to a registration form. Upon completion of the registration form you will then continue by completing the subscription form. For assistance please call (218) 547-1000. Thank you.

Read this article:

Love the outdoors and being Minnesotan

With This Tiny Box, You Can Anonymize Everything You Do Online

No tool in existence protects your anonymity on the Web better than the software Tor, which encrypts Internet traffic and bounces it through random computers around the world. But for guarding anything other than Web browsing, Tor has required a mixture of finicky technical setup and software tweaks. Now routing all your traffic through Tor may be as simple as putting a portable hardware condom on your ethernet cable.

Today a group of privacy-focused developers plans to launch a Kickstarter campaign for Anonabox. The $45 open-source router automatically directs all data that connects to it by ethernet or Wifi through the Tor network, hiding the users IP address and skirting censorship. Its also small enough to hide two in a pack of cigarettes. Anonaboxs tiny size means users can carry the device with them anywhere, plugging it into an office ethernet cable to do sensitive work or in a cybercafe in China to evade the Great Firewall. The result, if Anonabox fulfills its security promises, is that it could become significantly easier to anonymize all your traffic with Tornot just Web browsing, but email, instant messaging, filesharing and all the other miscellaneous digital exhaust that your computer leaves behind online.

Now all your programs, no matter what you do on your computer, are routed over the Tor network, says August Germar, one of the independent IT consultants who spent the last four years developing the Anonabox. He says it was built with the intention of making Tor easier to use not just for the softwares Western fans, but for those who really need it more Internet-repressive regimes. It was important to us that it be portable and smallsomething you can easily conceal or even throw away if you have to get rid of it.

Anonabox is by no means the first project to attempt to integrate Tor directly into a router. But Germar argues it will strike the best balance yet of cheapness, easy setup, size and security. Tor-in-a-box projects like Torouter and PORTAL, for instance, require the user to replace the software on a stock router. Another project called OnionPi is designed to be built one from a kit, and costs roughly twice as much as Anonabox.

In terms of consumer friendliness, the closest device yet to a plug-and-play Tor router has been Safeplug, a $49 variant on a Pogoplug router modified to route all traffic over Tor. But at more than twice the size, the Safeplug isnt nearly as portable as the Anonabox. And its also been criticized for security flaws; Researchers at Princeton found in September that it didnt have any authentication on its settings page. That means a hacker could use a technique called a Cross-Site Request Forgery to trick a user into clicking on a link that would change the routers functions or turn off its Tor routing altogether. It also uses an outdated version of Tor, one that had been updated even before the device shipped last year.

Anonaboxs security hasnt yet been audited for those sorts of flaws. But its creators point out that it will be entirely open source, so its code can be more easily scrutinized for errors and fixed if necessary.

The non-profit Tor project itself is reserving judgment for now. But its executive director Andrew Lewman tells WIRED hes keeping an eye on the project, and that it looks promising so far. Micah Lee, lead technologist for Glenn Greenwalds The Intercept and a frequent developer on Tor-related projects, says hes mostly encouraged by the idea. One of the potential vulnerabilities for Tor users, after all, is that a website they visit could run an exploit on their computer, installing malware that phones home to a server across a non-Tor connection to reveal their real IP address. If youre using something like this, everything goes over Tor, so that cant happen, Lee says. A Tor router can definitely have a big benefit in that theres physical isolation.

He nonetheless cautions that Anonabox alone wont fully protect a users privacy. If you use the same browser for your anonymous and normal Internet activities, for instance, websites can use browser fingerprinting techniques like cookies to identify you. Lee suggests that even when routing traffic over Tor with Anonabox, users should use the Tor Browser, a hardened browser that avoids those fingerprinting techniques. (To avoid running their traffic through Tor twice and reducing bandwidth speeds to a crawl, he points to a setting in the Tor Browser called transparent torification, which turns off the browsers own Tor routing.)

The Anonabox has been in the works since 2010, long enough that its developers have been able to evolve their own custom board as well as an injection-molded case. That customization, Germar says, means the tiny device still packs in 64 megabytes of storage and a 580 megahertz processor, easily enough to fit the Tor software and run it without any slowdowns.

Germar says he and his friends began thinking about the possibility for the device around the time of the Arab Spring in late 2010 and early 2011. The Anonabox is ultimately intended for users in other countries where Tors anti-censorship and privacy properties can help shield activists and journalists. It can be used in a cybercafe, for instance, where users cant easily install new software on computers. And its capable of so-called pluggable transportsextensions to Tor that often allow its traffic to better impersonate normal encrypted data.

Read more:

With This Tiny Box, You Can Anonymize Everything You Do Online

Bitcoin hopeful eyes ASX listing

Bitcoin Group hopes to raise $20 million. Photo: Reuters

Melbourne-basedBitcoinGroup is hoping to list on the Australian Securities Exchange in November, making it one of the firstbitcoincompanies to float on an official stock exchange as governments across the world crack down on the largely unregulated digital currency sector.

BitcoinGroup, which currently manages an arbitrage fund, is hoping to raise $20 million at 20 a share from investors as part of its plan to morph the company into a consolidated payment network.

BitcoinGroup boss and founder Sam Lee currently manages a fund that capitalises onbitcoinmarket inefficiencies.

The company built an automated cyptocurrencytrading engine that moves money between majorbitcoinexchanges when prices deviate from the historical average, and has rewarded investors with 704 per cent gains since June 2013.

Advertisement

Twenty-six-year-old Mr Lee has netted the support of Chinese millionaire Allan Gao, who made his fortunes through manufacturing, supplying and fitting fire-safety equipment in China.

Mr Gao has funded the lion's share of the company's pre-initial public offering expenses, including legal and broking fees.

Bitcoin's listing plans come at a critical time in the digital currency industry, as a Senate inquiry into the regulation ofbitcoinchaired by senator Sam Dastyari opens for submissions to develop a regulatory framework around the cryptocurrency.

Thebitcoinindustry is still seen as highly speculative and fraught with investor risk. The currency has soared as high as more than $US1000 a unit from less than $US1 just two years ago.

View original post here:

Bitcoin hopeful eyes ASX listing

Utica Comets Weekly Notebook

October 13, 2014 - American Hockey League (AHL) Utica Comets Last Week In Review: The Utica Comets left Toronto with three out of a possible four points from their doubleheader at the Ricoh Coliseum this past weekend. The Comets kicked off their 2014-15 campaign with a gritty 2-1 win on Saturday. On Sunday the Comets got their first taste of the new overtime rules with a 3-2 loss coming in the 3-on-3 portion of overtime. There's 74 games left to be played, but after the first weekend of play the Comets sit alone atop the Western Conference's North Division standings.

In non-gameplay news the Comets and the Utica Memorial Auditorium were selected by the American Hockey League to host the 2015 All-Star Classic in January. The Turning Stone Resort Casino is the presenting sponsor, and will be home to the all of the weekend's festivities besides the Skills Competition and the All-Star Game.

Saturday, October 12: Utica Comets @ Toronto Marlies - W 2-1

The Comets chased off any thoughts of a repeat of last year's disastrous 0-8-1-1 start with a 2-1 victory over the Toronto Marlies, at the Ricoh Coliseum.

The power play unit paved the way for the Comets, going 2-for-7 on the evening. Both Comets power-play goals proved critical, and both came with a 5-on-3 advantage.

Alexandre Grenier (1-1-2), and Cal O'Reilly (0-2-2), paced the Comets with two points apiece, while Jacob Markstrom made 24 saves en route to his first win as a Comet. Dustin Jeffrey chipped in the game-winning goal in his Comets debut.

Sunday, October 12: Utica Comets @ Toronto Marlies - OTL 3-2

Sunday's contest in Toronto started off a lot like the Comets-Marlies tilt on Saturday, with Toronto scoring first and the away team storming back for a 2-1 third period lead. However, the rest of the script was drastically different as Victor Loov scored twice, once in the third period and once in overtime, to give the Marlies their first victory of the young season.

Joacim Eriksson made his 2014-15 Comets debut by turning away 25 of the Marlies' 28 shots. Dustin Jeffrey (1-0-1) scored for the second time in as many games, and Brandon DeFazio (1-0-1) netted his first goal of the season as well. Alex Grenier picked up an assist for his third point in two games, while Hunter Shinkaruk picked up his first career professional point with an assist on Jeffrey's goal.

A Look Ahead:

Read the rest here:

Utica Comets Weekly Notebook