ORANGE, Calif. - Chapman University's Walter Piper, Ph.D., has just published research in a leading science journal that shows animals choose habitat similar to where they were raised rather than that likely to maximize reproductive success. This finding runs counter to current tenets of habitat selection theory.

The paper is published in the Proceedings of the Royal Society B on June 26 and includes co-authors Michael Palmer, Nathan Banfield and Michael Meyer. Dr. Piper's research focuses on his long-term study of loons.

"The basic finding is that young loons chose to settle on territories that are very similar to their natal territories," noted Dr. Piper, professor in Chapman's Schmid College of Science and Technology. "This behavioral pattern seems to indicate that loons choose habitat so as to promote their survival, not their breeding success. This is exciting because it flies in the face of current dogma in the field of habitat selection."

Here is the abstract from the research: Scientists have long presumed that animals settle on breeding territories according to the ideal free model, which presumes that animals select habitat that maximizes the number of offspring they can produce. But settlement data often show that, in fact, animals do not select high quality habitat. Indeed, here we report that young common loons have a striking tendency to settle on breeding lakes that resemble their natal lake in terms of both size and pH. Preference for natal like rather than high quality habitat, might allow a young animal to feed on familiar prey and, hence, increase its likelihood of surviving its early breeding years.

To see the paper, titled Can settlement in natal-like habitat explain maladaptive habitat selection?, click here: http://www.chapman.edu/scst/_files/piper-research-paper-2013.pdf
More information on Dr. Piper's research on loons can be found at The Loon Project website: http://loonproject.org/

Consistently ranked among the top universities in the West, Chapman University provides a uniquely personalized and interdisciplinary educational experience to highly qualified students. Our programs encourage innovation, creativity and collaboration, and focus on developing global citizen-leaders who are distinctively prepared to improve their community and their world. Visit www.chapman.edu

Follow us on Facebook at:       Chapman University Facebook
On Twitter at:                  @ChapmanU
On YouTube at:          Chapman University YouTube Channel


###

DAVENPORT, IA - June 27, 2013 - Today's businesses are operating at a blistering pace and IT infrastructure has become the backbone of small to mid-sized businesses across the nation. The complexity and strain placed on networks has exposed SMBs to greater security threats than ever before. Natural disasters, power outages, employee errors and failed system upgrades all pose significant threats to the network and failing to address these risks can cause severe network damage and immobilize a company for hours, days or weeks. The best way to combat this dynamic is to understand the risks, address the problem, and make sure the proper precautions have been taken.

One of the risks most easily mitigated is when data simply hasn't been backed up. Oftentimes organizations fail to have a regular backup procedure in place, whether partially or completely, and having a data backup program can help get around this issue. According to Symantec's 2011 SMB Disaster Preparedness Survey, "only half [of SMBs] back up at least 60% of their data, meaning they would lose 40% of their data in the event of a disaster. In addition, organizations often fail to back up corporate PCs, or take an "all or nothing" approach if it can't be all-inclusive. For example, of those surveyed, 31% don't back up email, 21% don't back up application data, and 17% don't back up customer data." The biggest benefit in having a process in place is that employees never have to redo work. If data is ever lost, it can be recovered rather quickly and with minimal effort.

Another risk to address is failing to protect branch offices or telecommuters. "Out of sight, out of mind," doesn't exactly fare too well in the corporate arena. When businesses are subject to compliance or regulatory standards, they must ensure that all company endpoints are protected in an appropriate fashion. When there is a centralized IT support staff, they can often overlook users that are not primarily in the office, as in the case of salespeople for example.

Failure to consistently backup company data is another common oversight. The benefit of having an automated or regularly scheduled backup is paramount. According to Enterprise Security Group, even with all the advancements in storage technology, only about 20% of backup jobs are successful. This is exactly why consistency and frequency are such key metrics in evaluating any backup solution.

Utilizing outdated equipment such as tape or disk media poses a threat as well in that these solutions are hardware, meaning that they can be lost, stolen or improperly stored. Any of those situations usually results in irretrievable data, therefore rendering that equipment useless when a recovery is most needed.

Today's business continuity and disaster recovery solutions address these risks and provide a software-based solution that virtualizes all data to the cloud. This enhances overall performance by providing greater accuracy, efficiency, security and archiving functionality to a business's disaster recovery plan. Simply put, technology has come too far for SMBs to have to deal with the notion of losing important data and risking going out of business. With today's powerful solutions and the assistance of a trusted IT advisor, SMBs can protect themselves, their employees and their customers' data from these threats.

ABOUT MIDLAND COMMUNICATIONS

Midland Communications began more than 60 years ago in 1946 as the Worldwide Marketing Arm of Victor-Animagraph Projectors. In 1977 a communications division was formed due to a partnership with NEC America. Today, As a distributor of NEC America, for 33 years, Midland Communications has a customer base of more than 3,000 satisfied customers that include general businesses, government agencies, Universities, colleges, hospitals, and hotels.
Midland provides a wide range of communication services including VOIP, PBX and key systems, Wide Area and Local Area networking, computers, Computer integration, voice mail, CCIS, and video conferencing and paging systems. Our philosophy is simple, provide quality products at a fair price, backed by an average emergency response time of twenty minutes, and the best service in the industry. For more information on Midland Communications, call (563) 326-1237 or visit www.midlandcom.com.

###

Asset Protection Lawyer Offers 3 Steps to Take Now

Now, you really can live forever, but that's not necessarily a good thing.

Many of your online accounts - from automatic bill payments to eBay - may remain active after you pass away, unless you take steps to ensure they don't, says attorney Hillel Presser, author of "Financial Self-Defense (Revised Edition), "www.assetprotectionattorneys.com.

Automatic bill pay, for example, can theoretically keep tapping your bank account long after you're gone or, at least, until your money is.

"It's important to make sure your online bank and shopping accounts, even your social media, can be closed out, or that your loved ones are authorized to access them," Presser says. "You may ask, 'Why would I care if I'm gone?' I can tell you from experience: because it can create real headaches, and more heartache, for your family."

Bank and shopping accounts will be vulnerable to identity theft, which would affect your estate if someone opens credit cards in your name. You might have valuable intellectual property, like domain names. They may need access to your health records, particularly if you died under questionable circumstances, he says.

There's the sentimental stuff - photos and emails -- that your family may want as a remembrance of you, and the libraries of music and ebooks, which may represent a considerable investment on your part.

"The problem is, even if you provide a family member with all of your accounts, log-ins and passwords, they may not be legally allowed to access them," Presser says. "In many cases, they may be violating the accounts' terms of service or violatingfederal privacy and computer fraud laws. Some states have laws governing online materials, but they're different and which of your accounts are covered depends on where the provider is located."

What can you do to ensure your family isn't left with a virtual nightmare after your passing? Presser offers these tips:

• Create a list of all of your accounts, including log-innames, passwords, and answers to any security questions. Obviously, your list will need to be securely stored. Since you'll need to update it regularly as you add accounts or change passwords,  it will be easiest if you keep the list on your computer in a password-protected folder. Some versions of Windows allow you to create protected folders, but you may need to get third-party software to do this, such as freeAxCrypt. Remember to create a backup of your list, whether it's on a jump drive or printed out on paper. Store the backup in a secure place such as a safe deposit box. Do not put password information in your will, which is a public document.

• If you have a Google account, set up the new inactive account manager. In May 2013, Google became the first site to give users an option for choosing what becomes of their content if they should become debilitated or die. Under the profile button, click "Account," scroll down to "Account Management," and you'll find instructions for "Control what happens to your account when you stop using Google." You can select how long the account should be inactive before your plans are set into motion; choose to whom you want to offer content, such as YouTube videos, Gmail, Google+ posts, Blogger and Picasa web albums, or whether it should simply be deleted.

• Appoint a digital executor. Perhaps the simplest way to ensure your online life is taken care of is to appoint a digital executor - a tech-savvy person who will be willing and able to carry out your wishes. Authorize the person to access your inventory of log-in information and spell out what you want done with each account, whether it's providing access to loved ones or business partners, or deleting it.

The digital world has grown and transformed so rapidly, the law hasn't kept up, which makes managing your digital afterlife challenging, Presser says.

"Until there are more consistent laws and procedures governing this area, it's best to plan ahead, leave clear instructions and be sure you have a list of accounts where your estate lawyer or a loved one can find it and access it," he says. "It will make a world of difference to your survivors."

About Hillel L. Presser, Esq., MBA

Hillel L. Presser's firm, The Presser Law Firm, P.A., represents individuals and businesses in establishing comprehensive asset protection plans. He is a graduate of Syracuse University's School of Management and Nova Southeastern University's law school, and serves on Nova's President's Advisory Council. He is a former adjunct faculty member for law at Lynn University. Complimentary copies of "Financial Self-Defense" are available through www.assetprotectionattorneys.com.

Trade Shows Expert Shares 3 Cutting-Edge New Technologies

Most of us think about technology on a mostly two-dimensional plane as we flick our way from screen to screen on touch glass. But today's tech includes applications that are far from flat, says major-events expert Ann Windham.

"What if you could control all primary aspects of major events like trade shows, big weddings and awards ceremonies through your iPad or smartphone; imagine shutting everything down at the end of a long and exhausting night by pushing one button on your phone - that's just some of what's possible with today's software," says Ann Windham, president and CEO of Imagine Xhibits, Inc. (imaginexhibits.com/events).

Lights, climate control, projectors and monitors, curtains, fountains and much more can be controlled with an app, and the data that you take away from trade shows can be used to quickly follow up on sales leads, says Windham, who will be showcasing this cutting-edge technology July 9 at Trade Show Technology Summit 2013, to be held at the Irving Convention Center at Las Colinas in Irving, Texas.

The summit will show attendees how to manage technology such as QR codes, mobile apps, virtual trade shows, social media, on-line asset management, interactive media and live stream video on electronic devices as simple as a mobile phone, she says.

"We'll show planners the newest event management tools for efficiency and streamlining tasks before, during and after their event. We'll also have hands-on, educational workshops to show them how to use management," she says.

Windham shares three of her favorite new technologies:

• Pre-show - Event Management Software: This one-stop source for managing every detail about your event - from Fed Ex tracking numbers to vendor contact information to photos from the show - even allows you to manage multiple events from any location. "In the past, we carried all the details for each show in one huge binder. If you were at a show in Texas and someone called with a question about the show in Oregon, you wouldn't have that information handy," Windham says. Event management software relies on cloud storage, so members of your team can access it from their smart phone or iPad no matter where they are. Another benefit: You've got just one place to input all that data.

• During the show - Remote Sensors: Sensors built into the walls of an exhibit allow you to control all of the electronics from your smart phone or iPad. Not only does it save time, it's an easy way to add valuable theatrics during a demonstration. "Say you're standing at the back of the room and you realize the speaker can't be heard, you just turn up the volume on his mic, right from your your iPad," Windham says. "Or, if you want to create special effects using lighting and room temperature, you can dim the lighting and drop the temperature." Her favorite feature? At the end of a long day, rather than walking from one device to the next, shutting off each, you press just one button and turn everything off while walking out the door.

• Post-show - Sales Leads Follow-up: Seventy percent of percent of exhibitors who capture sales leads at trade shows don't collect qualifying information, according to the Center for Exhibition Industry Research (CEIR).Scanners collect only the most basic data from visitors to each booth - there's no way of knowing whether they were a "hot" lead ready to buy, or someone who stopped by for the free T-shirt, Windham says. Now, however, event management software allows exhibitors to include qualifying information every time a visitor's badge is scanned. "At the end of the event, you can quickly see who your hottest leads were and send them an email or postcard before you've even left the event," Windham says.

For planners who've been hamstrung by personnel cutbacks in recent years, these new tools are lifesavers, she says.

"The days of 'The Jetsons' has arrived."

About Ann Windham

Ann Windham is the president and CEO of Imagine Xhibits, Inc., a full-service trade show marketing company that offers custom design exhibits using modular components. Windham's company offers customers more than 50 percent savings on operating expenses; expert face-to-face marketing consultants that will work to increase ROI with four-step marketing; quarterly seminars offering continuous education by certified trainers; in-house design services for custom structures, graphic design and brand development; turn-key services and exhibit management program for all logistical needs; and a one-stop shop for meeting planning, promotional products, collateral web-site and more.

American Bird Conservancy invites all conservationists to a webinar on eagles and wind energy. Topics covered will include the proposed first Bald Eagle take permit for a wind farm. This permit is of concern to the Osage Nation of Oklahoma, and the Osage will make a presentation during the webinar. There will also be updates on proposed eagle take permits at other wind farms and the U.S. Fish and Wildlife Service's proposal to change the maximum duration of eagle take permits, as well as time for your questions.

Webinar date and time: June 13, 2013 from 2 to 3:30 pm, Eastern Time

You must register for this free webinar by going to this link: https://abcbirdsevents.webex.com/abcbirdsevents/onstage/g.php?d=668744518&t=a (registration ahead of time is highly recommended so that you receive update emails)

Audio portion will be by phone:
Call-in toll number (US/Canada): 1-650-479-3208
Access code: 668 744 518
District 93 representative hopes to expand reach to new and current constituents

JUNE 02, 2013 BETTENDORF, IA - In an effort to expand her reach and connect with voters using social media, three-term Iowa State Representative Phyllis Thede (D) has partnered with Internet Marketing Professionals Group (I.M. Pros) to launch her campaign's Digital Marketing Initiative (DMI). "In my five years as an Iowa State Representative, I've seen firsthand how technology and social media have changed the way voters access information. This is an effort to use new technology and social media to reach out to my constituents in new and exciting ways."

Robert Jackson Jr., president of I.M. Pros (improsgroup.com), echos this sentiment. "We're excited to work with Phyllis because she is one of a handful of enterprising politicians who recognize we're living in a new reality. Web 2.0 sites, the effective use of Instagram, Facebook and Twitter, and creating YouTube channels are ways we can more effectively reach voters where they live. By having these social media properties work in concert with each other we can create a powerful marketing vehicle that will sustain her message."

Deep Quad Cities Roots
Since serving her first term in the Iowa House since 2009, Phyllis Thede represents the families of Bettendorf and Davenport, Iowa. She is a Ranking Member of the Ethics Committee and, serve on the Committees of Environmental Protection, Local Government, Natural Resources, and Health and Human Services Appropriations subcommittee.

Currently living in Bettendorf, Iowa with her husband Dave, they have three successful daughters and are the proud grandparents of three grandchildren. Phyllis and family have been proud to have called the Quad-Cities home since 1980.

To connect with Phyllis, visit her website at PhyllisThede.com.

SPRINGFIELD - Governor Pat Quinn today issued the following statement regarding the Illinois House of Representatives' passage of Senate Bill 1715, the Hydraulic Fracturing Regulation Act, and encouraged the Illinois Senate to act swiftly on this bill that contains the nation's strongest environmental protections and significant economic potential. The governor called for passage in his 2013 budget address and the Quinn Administration helped negotiate the bill:

"Today's passage of hydraulic fracturing legislation in the House brings good news for jobs, economic development and environmental protection in Illinois. This legislation will unlock the potential for thousands of jobs in Southern Illinois, while ensuring that our state has the nation's strongest environmental protections in place for this industry.

"Over the past year, we have brought together lawmakers, industry and labor leaders and environmental groups in a collaborative, bipartisan effort to develop the best possible legislation. This approach has not only worked, but been praised as a national model for transparency, public participation, environmental safety and economic development.

"I want to thank Rep. John Bradley for his hard work on this issue and environmental advocates for their efforts to ensure Illinois' natural resources are protected.

"I urge the Senate to send this bill to my desk as soon as possible."

###
DAVENPORT, IA - May 30, 2013 - Midland Communications, a leading unified communications provider, announced today that the company has launched a Mobile Device Management Program to Monitor and Secure Devices that are attached to customer networks. With the proliferation of Smart phones and tablets in today's business world, companies need a way to monitor and secure mobile devices that enter their company space. Whether a mobile device is company-issued or employee-owned, Mobile Device Management (MDM) is the fastest, most comprehensive way for organizations to centrally secure devices and protect their networks from intrusion.
Smartphones are here to stay and businesses need to be certain that they have an infrastructure established to bring these devices into the workplace. According to The Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast Update, "the growth of global mobile data traffic in 2012 is up 70%" from the previous year and when comparing Mobile traffic in 2012 versus entire Internet in 2000 we find that mobile traffic today has twelve-folded that of the entire Internet in 2000."
The best MDM solutions perform several functions and have a set of unique characteristics which make them the best fit for small to medium-sized businesses. First, they must integrate into existing networks well. Many MDM solutions integrate seamlessly into enterprise systems and don't require on-site servers or network reconfiguration. Another trait of a great solution is the ability to remotely locate, lock and wipe lost or stolen devices. This is vital for enhancing security, especially in an environment with shared data and content. Many solutions rely on encryption settings and established passcodes in order to monitor device compliance and detect potentially unsafe devices before they make it on the network.
"The growth of mobile is representative of a culture shift where people expect instant communication and want to be connected," stated stated Jason Smith, Vice President of Midland Communications. "This has tremendous implications for our industry and as we've noticed this evolving over the years we knew that our customers needed some way to bring security and data management to their networks. That's exactly why we have spent substantial time, effort and energy investing in leading edge technologies so our customers can be better equipped to protect their businesses. We consider it our duty to equip our customers with the best technology tools available, so they constantly have a leg up on their competitors. In the end, making them successful, keeps us successful and prolongs our relationship."

ABOUT MIDLAND COMMUNICATIONS

Midland Communications began more than 60 years ago in 1946 as the Worldwide Marketing Arm of Victor-Animagraph Projectors. In 1977 a communications division was formed due to a partnership with NEC America. Today, As a distributor of NEC America, for 33 years, Midland Communications has a customer base of more than 3,000 satisfied customers that include general businesses, government agencies, Universities, colleges, hospitals, and hotels.
Midland provides a wide range of communication services including VOIP, PBX and key systems, Wide Area and Local Area networking, computers, Computer integration, voice mail, CCIS, and video conferencing and paging systems. Our philosophy is simple, provide quality products at a fair price, backed by an average emergency response time of twenty minutes, and the best service in the industry. For more information on Midland Communications, call (563) 326-1237 or visit www.midlandcom.com.
Join us this summer at Iowa State University Extension and Outreach, Scott County as we explore the amazing world of insects in "Insectaganza!" our 4-H Clover Kids summer program.  Youth ages five through nine will closely investigate insects such as crickets, butterflies and ladybugs to learn how they communicate, eat, grow, and survive in their natural habitats.  Please note that 5 year olds must have completed kindergarten during the 2012-2013 school year.

Registration is on a first come, first served basis.  Families can chose from a Monday group OR a Wednesday group.  Both groups will meet from 1:00 p.m.-3:00 p.m. for eight weeks beginning the week of June 10, 2013.  The program costs $10.00 for new 4-H Clover Kids.  For more information and to print the registration forms visit http://www.extension.iastate.edu/scott or contact Jodi at (563) 359-7577 or jmbecker@iastate.edu.
WASHINGTON - In a weekly video address, Senator Chuck Grassley said continued investment in wind energy production emphasizes the value and the success of the federal production tax credit.

Click here for the audio.

Here is the text of Grassley's address:

This week, Iowa's largest energy company announced it will seek to add enough wind generation in Iowa by the end of 2015 to require an additional 656 wind turbines in Iowa.

This investment is more good news about wind energy production.  It emphasizes the value and the success of the federal production tax credit.

Wind energy is proving that it's a force in America's energy supply -- providing clean, renewable, and home-grown power.  Wind energy comes from local farms, it's for local customers and, most often, adds investment value to local communities.

Nationwide, the wind-energy industry supports 75,000 jobs.  Iowa ranks second among all states for wind production, and there are 6,000 wind-energy related jobs in Iowa.

I've worked to extend the wind energy production tax credit numerous times since I first authored it as part of the Energy Policy Act of 1992.  Producers are eligible for a tax credit for each kilowatt-hour of electricity produced by a qualified project during the first 10 years of operations.  Right now, the tax credit is 2.2 cents per kilowatt-hour.

The wind-energy production tax credit is available when wind energy is produced, so it's tax relief that rewards results.

 

Pages