Monday, July 25, 2016

Error 403: Access Denied

6
Error 403: Access Denied


Rant d'jour:
Affirmative Action
Equity and Equality and *Harvard University.
Rant d'jour: Affirmative Action, Equity and Equality at *Harvard University.


In reality, Harvard only accepts the best students with the highest scores.

If they are so damn good at educating our youth, let them take those who can benefit the most from such an education.

The truth is, if Harvard only accepts the best students, their job (presumably, to turn out highest achievers; the creme de la creme; the best of the best) is *that* much easier.

Think how easy their job is given their baseline population.

This makes no sense!

If Harvard is so damn good at teaching people, let them take the worst and make them the best.

Give the Academic Elite a real challenge.

Are they up
for it?

Are you?


Elyssa D. Durant, EdM



Footnotes: *I used Harvard synbolically to represent elite Ivy League colleges and Univeristities.

Could jusr as easily subsitute Vandervilt University, Columbia, Cornell, Brown etc.

In reality, Harvard only accepts the best students with the highest scores.

If they are so damn good at educating our youth, let them take those who can benefit the most from such an education.

The truth is, if Harvard only accepts the best students, their job (presumably, to turn out highest achievers; the creme de la creme; the best of the best) is *that* much easier.

Think how easy their job is given their baseline population.

This makes no sense!

If Harvard is so damn good at teaching people, let them take the worst and make them the best.

Give the Academic Elite a real challenge.

Are they up
for it?

Are you?


Elyssa D. Durant, EdM



Footnotes: *I used Harvard synbolically to represent elite Ivy League colleges and Univeristities.

Could jusr as easily subsitute Vandervilt University, Columbia, Cornell, Brown etc.




Elyssa D. Durant. Ed.M.
Research & Policy Analyst

Error 403: Access Denied

6
Error 403: Access Denied


Rant d'jour:
Affirmative Action
Equity and Equality and *Harvard University.
Rant d'jour: Affirmative Action, Equity and Equality at *Harvard University.


In reality, Harvard only accepts the best students with the highest scores.

If they are so damn good at educating our youth, let them take those who can benefit the most from such an education.

The truth is, if Harvard only accepts the best students, their job (presumably, to turn out highest achievers; the creme de la creme; the best of the best) is *that* much easier.

Think how easy their job is given their baseline population.

This makes no sense!

If Harvard is so damn good at teaching people, let them take the worst and make them the best.

Give the Academic Elite a real challenge.

Are they up
for it?

Are you?


Elyssa D. Durant, EdM



Footnotes: *I used Harvard synbolically to represent elite Ivy League colleges and Univeristities.

Could jusr as easily subsitute Vandervilt University, Columbia, Cornell, Brown etc.

In reality, Harvard only accepts the best students with the highest scores.

If they are so damn good at educating our youth, let them take those who can benefit the most from such an education.

The truth is, if Harvard only accepts the best students, their job (presumably, to turn out highest achievers; the creme de la creme; the best of the best) is *that* much easier.

Think how easy their job is given their baseline population.

This makes no sense!

If Harvard is so damn good at teaching people, let them take the worst and make them the best.

Give the Academic Elite a real challenge.

Are they up
for it?

Are you?


Elyssa D. Durant, EdM



Footnotes: *I used Harvard synbolically to represent elite Ivy League colleges and Univeristities.

Could jusr as easily subsitute Vandervilt University, Columbia, Cornell, Brown etc.




Elyssa D. Durant. Ed.M.
Research & Policy Analyst

Report abuse on Google+

Report abuse on Google+

If you see something on Google+ that violates our User Conduct and Content Policies, you can report it. Violations might include:
  • Bullying, threatening, or harassing someone
  • Hate speech
  • Impersonating someone 
  • Spam
  • Pornographic or sexually explicit content
  • Sharing someone's personal information
  • Violent content
  • Illegal content
  • Selling regulated goods
  • Harming or exploiting minors

You can also block someone who is posting things you don't want to see.

Important: If you or someone you know is in immediate danger, please contact local law enforcement. It may be helpful to keep a record of the abuse to show them. You can create a record by taking a screenshot or printing the threatening material.

Report a post, comment, person, Collection, or Community 

  1. Open the post, comment, Collection, Community, or profile of the person you want to report.
  2. Touch or click the menu icon .
  3. Touch or click Report abuse (or for comments, Report comment).

Report a photo 

  1. Open the photo you want to report.
  2. Touch or click the menu icon .
  3. Touch or click Report abuse.

Report a legal or copyright violation

If someone is posting content that you believe is illegal or violates your copyright, you can send Google a request to remove under applicable laws.

Note: Not all features are available across all platforms. If you can't find something you're looking for, please try a different device.



Elyssa D. Durant. Ed.M.
Research &  Policy Analyst
  

Error 403: Access Denied

Error 403: Access Denied


Rant d'jour:
Affirmative Action
Equity and Equality and *Harvard University.
Rant d'jour: Affirmative Action, Equity and Equality at *Harvard University.


In reality, Harvard only accepts the best students with the highest scores.

If they are so damn good at educating our youth, let them take those who can benefit the most from such an education.

The truth is, if Harvard only accepts the best students, their job (presumably, to turn out highest achievers; the creme de la creme; the best of the best) is *that* much easier.

Think how easy their job is given their baseline population.

This makes no sense!

If Harvard is so damn good at teaching people, let them take the worst and make them the best.

Give the Academic Elite a real challenge.

Are they up
for it?

Are you?


Elyssa D. Durant, EdM



Footnotes: *I used Harvard synbolically to represent elite Ivy League colleges and Univeristities.

Could jusr as easily subsitute Vandervilt University, Columbia, Cornell, Brown etc.

In reality, Harvard only accepts the best students with the highest scores.

If they are so damn good at educating our youth, let them take those who can benefit the most from such an education.

The truth is, if Harvard only accepts the best students, their job (presumably, to turn out highest achievers; the creme de la creme; the best of the best) is *that* much easier.

Think how easy their job is given their baseline population.

This makes no sense!

If Harvard is so damn good at teaching people, let them take the worst and make them the best.

Give the Academic Elite a real challenge.

Are they up
for it?

Are you?


Elyssa D. Durant, EdM



Footnotes: *I used Harvard synbolically to represent elite Ivy League colleges and Univeristities.

Could jusr as easily subsitute Vandervilt University, Columbia, Cornell, Brown etc.




Elyssa D. Durant. Ed.M.
Research & Policy Analyst

Sunday, July 24, 2016

Sanity for Superheroes: The Powers That Beat: Amzanig?

Sanity for Superheroes: The Powers That Beat: Amzanig?

Sanity for Superheroes: The Powers That Beat: Amzanig?

Amzanig?

Aoccdrnig to a rscheearch at Cmabridge Uinervtisy, it deosn't mttaer in waht oredr the ltteers in a wrod are, the olny iprmoent tihng is taht the frist and last ltteer be at the rghit pclae. The rset can be a tatol mses and you can sitll raed it wouthit porbelm. Tihs is bcuseae the huamn mnid deos not raed ervey lteter by istlef, but the wrod as a wlohe.

Fcuknig amzanig huh?

Wo_OT!!! 

Posted by Elyssa D'Educrat



^ed 

Attackers Can Access Dropbox, Google Drive, OneDrive Accounts Without the User’s Password « Cyber Security

Attackers Can Access Dropbox, Google Drive, OneDrive Accounts Without the User's Password « Cyber Security

Attackers Can Access Dropbox, Google Drive, OneDrive Accounts Without the User's Password

A report by Imperva shows how an attacker could easily get their grubby hands on cloud storage and synchronization accounts, without even needing the user's password, and use them in their illicit activities.

The research paper details a new technique called MITC (Man in the Cloud), which allows attackers to intrude popular cloud storage services like Box, Dropbox, Google Drive, and OneDrive.

Attackers Can Access Dropbox, Google Drive, OneDrive Accounts Without the User's Password
Attackers Can Access Dropbox, Google Drive, OneDrive Accounts Without the User's Password

MITC attacks don't rely on vulnerabilities in the syncing applications themselves, nor on security holes in the cloud storage server, but act on a design flaw.

Because of the way these services were built, not requiring a password every time a file is synced, a token is used instead to authorize these operations without constantly hampering the user.

This token is stored on each of the devices a user connects to their cloud storage device, and even if encrypted, it can be broken into and stolen by attackers.

MITC could be one of the most effective ways of delivering malware and ransomware

With new tokens added to their arsenal, an attacker could then add them to their own PC or automated scripts, and have access to compromised accounts, which they can utilize in various ways.

An attacker would have nothing standing in their way from stealing files from corrupted accounts, altering existing files, and infecting the user with malware or ransomware, effectively locking the user out of their own files.

According to Imperva researchers, more worrying is the fact that these tokens will work in some cases even after a password change (Dropbox and Box), and to remove an attacker's entry point, a user needs to remove connected devices, or in some extreme cases, cancel their cloud storage account altogether and open a new one.

The Imperva team concludes that "while testing our concepts in the lab, we found some evidence that these types of attacks are already occurring in the wild (for example, as mentioned in 'The Inception Framework')."

For those interested, the same paper will be presented at the Black Hat USA 2015 conference that's going on these days.



^ed 

Information Warfare: Saudi Support Of Terrorism Exposed

Information Warfare: Saudi Support Of Terrorism Exposed

Information Warfare: Saudi Support Of Terrorism Exposed

Archives
Latest & Most Popular Posts

August 2, 2015:   A previously unknown hacker group, the YCA (Yemen Cyber Army) took credit for the hacks that obtained the trove of Saudi Arabian government emails the group recently released. The main thing the emails revealed was that Saudi Arabia and other oil-rich Arab countries use their money as a tool to influence political and diplomatic decisions in the Middle East and worldwide. These revelation were not surprising, but some of the details were.

It appears that Iran and Russia is behind this hack because the Iran backed Shia rebels in Yemen do not have the technical resources to crack the formidable network defenses the Saudis are known to have built. In fact, not all departments of the Saudi government appear to have been hacked. This is indicative of the high-end defenses the Saudis have bought, which isolates different bureaucracies networks so hacking one does not get you into all the others.

The YCA is still in the midst of releasing the million or more emails they obtained, so more details of the hack will become evident as more emails appear. The ones released so far confirm a lot of suspicions and hurt the Saudis by naming the people they have bribed and detailing the size (some over $200 million) of the bribes and other favors. This will make it more difficult to use bribes as those known to have already benefitted suffered embarrassment and loss of political influence and power because details became public. The Saudi bribes were often to weaken Israel and play down the popularity for Islamic terrorism among many Arabs. The bribes also sought to suppress discussion of Arab government support of Islamic terrorist groups. Because of the terrorism angle some people, in Western countries, could be prosecuted for being secretly in service to the Saudis.

All this Saudi dollar diplomacy goes back to the early 1970s, when OPEC (the Arab dominated oil cartel) was formed and the price of oil more than doubled. Most of the new cash went to Saudi Arabia and a lot of it was donated to Islamic charities. These groups, and the Saudi government, then sent money (to build mosques and religious schools) and missionaries to Moslem countries to spread the very conservative brand of Saudi Sunni Islam. This and the Iranian revolution of 1979 (that created a Shia Moslem religious dictatorship in Iran during the 1980s) are the cause of most of the subsequent increase in Islamic terrorism. The Islamic radicals were inspired, and able to network, in Pakistan during the 1980s, where the Saudis supplied billions of dollars for weapons and other supplies to support Afghan tribesmen fighting Russians in Afghanistan. Thousands of Islamic radicals from all over the world went to Pakistan to help out. Moslems pitched this as a jihad and a victory, despite the fact that the Russians left more because of economic collapse in the Soviet Union than anything else. But Islam has always thrived on fictional victories and that continues.

The Saudis continue to support Islamic terror groups, even though many of these same groups want to seize control of Saudi Arabia and establish a religious dictatorship (and execute every member of the House of Saud they can grab along the way). The Saudis are looking at the big pressure and the perceived greater danger posed by Shia Iran, which wants an Iranian Shia clergy controlling the holy places in Saudi Arabia. In this scenario Iran would also control the Saudi oil as well. This is the ultimate Saudi nightmare and they are trying to buy and bribe their way out of it. That, however, won't make their past activity disappear.



^ed 

Gartner: Internet of Things will change cybersecurity dramatically | IT News | Ashdown Group

Gartner: Internet of Things will change cybersecurity dramatically | IT News | Ashdown Group

Gartner: Internet of Things will change cybersecurity dramatically

Gartner: Internet of Things will change cybersecurity...The Internet of Things (IoT) will lead to significant changes to cybersecurity that will last forever, a new study has found.

Research from Gartner found that more than 20 per cent of enterprises will have digital security services dedicated to protecting business initiatives using devices and services in the Internet of Things (IoT) by the end of 2017. 

Gartner defines digital security as the risk-driven expansion and extension of current security risk dangers that defend digital assets of all types in the digital business and guarantees that relationships of these assets can be trusted. 

In an IoT world, information is the "fuel" to alter the physical state of environments through devices that are not general-purpose computers, though devices and services are often designed for certain purposes. 

Because of this, the IoT is redrawing the lines of IT responsibilities for the enterprises, with IoT possessing the ability to alter the state of an environment.

Even though an IoT device may seem new and unique, a hybrid of old and new technology infrastructure allows services to perform. Securing the IoT will cause most enterprises to use old and new technologies from all generations to secure devices and services.

A new characteristic of the IoT is the number of possible combinations of device technologies and services that can be used by the technology. 

Ganesh Ramamoorthy, research vice president at Gartner, said: "The IoT redefines security by expanding the scope of responsibility into new platforms, services and directions.

"Moving forward, enterprises should consider reshaping IT or cybersecurity strategies to incorporate known digital business goals and seek participation indigital business strategy and planning."

Posted by Jon Aspinell
Ashdown IT Recruitment - 12.5% Fee / 3 Month, 100% Rebate - Transparent Recruitment Fees Since 1999.Sign up to our e-newsletter service to receive our headline news directly to your inboxADNFCR-1914-ID-801799680-ADNFCR


^ed 

Legal / Regulatory & Consumer Resources

Legal / Regulatory & Consumer Resources
Which one of you pussies reporter me?






Legal / Regulatory & Consumer Resources

IMPORTANT NOTICE: Sprint's opt-in Mobile Advertising program, which allows Sprint to use information it collects to provide service to you to make the ads you see on your device more relevant, and Sprint's opt-out Reporting and Analytics program, which creates and shares certain business and marketing reports, are governed by this privacy policy. We do not share any information that identifies you personally under either of these programs. For detailed information on these programs and to learn how to opt in or out, please visit sprint.com/privacy.
(En Español)

This Privacy Policy ("Policy") describes how Sprint Corporation ("Sprint") will collect, access, use or disclose your personal information. It applies to all of our products, services, and web sites ("Services"). A few of our Services are covered by different privacy policies and in the event of a conflict between the two, the product or service specific policy governs. For example, we may have a separate policy or agreement for certain products, services or brands. Our collection, access, use, disclosure and safeguarding of your personal information is subject to U.S. law.

  • INFORMATION COLLECTED
  • USE OF PERSONAL INFORMATION
  • INFORMATION WE SHARE
  • NETWORK AND INFORMATION SECURITY
  • INFORMATION CHOICES AND CHANGES
  • CHILDREN
  • CONTACTING US
  • UPDATING THIS POLICY
  • YOUR CALIFORNIA PRIVACY RIGHTS
  • INTERNATIONAL DATA PRIVACY POLICY

INFORMATION COLLECTED

We collect personal information about you in various ways. We may also get information from other sources, including from affiliates, and may combine it with information we collect about you. Personal information does not include information that is not used to identify you, including aggregate or anonymous information.

Information you give us. The personal information we collect includes information you give us, such as name, postal address, telephone number, e-mail address, date of birth, social security number or other government identification number, demographics, activities, location information, and personal preferences. You may give us information in a variety of ways, including when you sign up for Services, communicate with customer care or register on www.sprint.com.

Information that we automatically collect. We automatically receive certain types of information whenever you use our Services. We may collect information about your device such as the type, version of operating system, signal strength, whether it is on and how it is functioning, as well as information about how you use the device and services available through it, such as your call and data usage and history, your location, web sites you have visited, applications purchased, applications downloaded or used, and other similar information. We may link information we automatically collect with personal information, such as information you give us at registration or check out. We may use systems or tools to follow your use of our Services and other applications, including using cookies, web beacons and other mechanisms, along with analysis of network and device information. For example, we allow collection by analytic service provider(s) of site click-stream and cookie data to help track aggregate and individual use of our Services. We sometimes use cookies to enable features on our sites, such as the ability to save your shopping cart or set preferences. Advertisers and advertising networks that serve ads on our sites may also use their own mechanisms, including cookies. These third party cookies or tools are governed by the privacy policies of the entities placing the ads and are not subject to this Policy.

USE OF PERSONAL INFORMATION

We use your personal information for a variety of purposes, including providing you with Services. We use your personal information to do things like:

  • Process your orders.
  • Protect our rights and property and those of our customers.
  • Respond to legal process and emergencies.
  • Develop or inform you of new products and services.
  • Anonymize or aggregate personal information for various purposes like market analysis or traffic flow analysis and reporting.
  • Monitor, evaluate or improve our products, Services, systems, or networks.
  • Customize or personalize your experience with our Services.
  • Customize or personalize online advertising to bring you information about products and services of Sprint or others that may interest you, including co-branded offers.

INFORMATION WE SHARE

We do not share information that identifies you personally with third parties other than as follows:

Affiliates. We may share personal and non-personal information with affiliated entities for approved business purposes.

Service Providers. We may share personal information with third parties who perform services on our behalf.

Group Account Holders. We offer group accounts to business and government customers, family customers and other group account holders ("Group Accounts"). The account holder for Group Accounts is the entity or person that buys the service or product for its employees, family members or other authorized users. You (as the user of a device) may receive service, certain pricing, terms or other benefits through a Group Account with us. If so, we may share with that Group Account holder customer registration and other information related to your use of our services.

Third Party Verification Services. We may share limited personal information (e.g., address, phone number) with non-Sprint entities to assist with identity verification, and to prevent fraud and identity theft.

Other Third Parties with Your Consent. We may share information with other third parties with your consent. For example, you may agree to our sharing your information with other third parties to hear about their products and services. Use of the information you agree to share will be subject to those third parties' separate privacy policies.

Disclosures to Third Party Application and Service Providers. You may choose to use services and products offered by third parties through our Services or devices such as third party applications. When you leave our network you may also use mobile roaming services provided by third parties. Your use of such services and applications may result in these third parties collecting your personal information and obtaining information from Sprint, including location information (when applicable). You may also choose to give personal information directly to third parties when using our Services. In each case, personal information you give a third party will be subject to its terms, conditions, and policies—not this policy. You should review a third party's privacy policy and terms of service before providing your information or using the service.

Business Transfers. Personal information about you may be disclosed as part of any merger, acquisition, sale of company assets or transition of service to another provider. In the unlikely event of an insolvency, bankruptcy or receivership, personal information may also be transferred as a business asset.

Protection of Sprint and Others. We may access, monitor, use or disclose your personal information or communications to do things such as:

  • comply with the law or respond to lawful requests or legal process;
  • protect the rights or property of us, our agents, members, our customers, and others including to enforce our agreements, policies and terms of use;
  • respond to emergencies;
  • initiate, render, bill, and collect for services; or
  • facilitate or verify the appropriate calculation of taxes, fees, or other obligations due to a local, state, or federal government requirement; or determine eligibility for government benefits.

We may share information that is de-identified or in an aggregated form that does not directly identify you. We share de-identified or aggregate information for purposes such as to:

  • Conduct market or traffic flow analysis and reporting or produce or facilitate production by others of business and marketing reports to share with third parties. For example, we may aggregate customer information across a particular region and create a report showing that 10,000 subscribers from a given city visited a sports stadium. If you do not wish for us to use your information to produce de-identified and aggregated data sets in the reports we share with third parties, you may opt out at any time. See sprint.com/privacy for details.
  • With your opt-in consent only, customize or personalize advertising based on information we collect about your use of your wireless device in order to provide wireless service to you. For example, we may use information about your mobile web browsing or use of mobile applications to deliver advertisements tailored to your interests, and we may share de-identified information about your use of your device with third parties so that they can tailor advertising to your interests based on that information. To participate in this program, you must opt in. See sprint.com/privacy for details on how to do so.

NETWORK AND INFORMATION SECURITY

We maintain a variety of physical, electronic, and procedural safeguards. These safeguards help protect your personal information from loss, misuse and unauthorized access, disclosure, alteration and destruction. Be sure to use a strong password to access your information on Sprint.com and not one you use for other services. You can learn more about how you can protect your information by reviewing our privacy FAQs.

INFORMATION CHOICES AND CHANGES

We offer you choices regarding how we contact you for marketing-related communications and whether we use information regarding your online or mobile web activities for marketing purposes. We also offer you choices regarding the use of de-identified information to make ads you see on your mobile device more relevant and to produce or facilitate production of business and marketing reports shared with third parties. Visit sprint.com/privacy to learn about your choices and how to register your privacy preferences with us.

As described above, we work with advertisers and advertising networks that serve ads on our sites and that may use cookies, web beacons and other technologies to collect information about your use of our sites and other websites. This information may be used to, among other things, analyze and track data, determine the popularity of certain content, deliver advertising and content targeted to your interests on other websites and better understand your online activity. To find out more about targeted advertising and/or to "opt out" of automatic collection of information for this purpose, visit http://www.aboutads.info/choices/.

You also may register a do-not-contact request by calling Sprint customer care or sending an email to officeofprivacy@sprint.com. If you register a do-not-contact request, we still may contact you for non-promotional purposes, such as emails or wireless messages related to your accounts or our ongoing business relations. For details on Sprint's do-not-contact practices, including how we honor consumer and business customer do-not-contact requests, please visit sprint.com/privacy.

If you disable cookies on your Internet browser, you also may stop some collection and use of data when you visit our web sites. If you would like to change certain Sprint account information, you may create an online account and manage your account online. For more information, visit www.sprint.com.

Back to top

CHILDREN

You must be 18 or otherwise have legal capacity to subscribe to Sprint services. Nevertheless, as part of the Unlimited, My Way Student Promotion, a parent or legal guardian may provide a Sprint device to a child under the age of 13. In such cases, Sprint takes steps to minimize the data it collects from Sprint applications on the device and provides parents resources to control the information children can share with other parties. In some instances, a parent may be able to review or request deletion of the personal information collected from a child's device, or take steps to prevent further collection of such information. If you have any questions about Sprint's policies for student phones or about how to control the information collected on them from users under 13, or if you wish to correct or delete any personal information provided to Sprint on a student phone used by a child under 13, you can contact us using the contact information below. You may also control the content your child may access by logging into sprint.com/manage, and reviewing the My Preferences tab.

Back to top

CONTACTING US

If you have any questions about, or complaints that concern, this Policy, please call us at Sprint or email us at officeofprivacy@sprint.com. If you prefer, you also may write us at Office of Privacy -Legal Department, Sprint, P.O. Box 4600, Reston, Virginia 20195. To send us a legal notice relating to this Policy, send it to Our Legal Notices Address listed in, and by the method specified in, the Acceptable Use Policy.

UPDATING THIS POLICY

We may change this Policy at any time. When we change the Policy we will give notice by changing the date it was last updated or as required by law.

YOUR CALIFORNIA PRIVACY RIGHTS

Sprint shares personal information between Sprint affiliates and marketing agents for marketing purposes. We do not share your personal information with unaffiliated third parties for their own independent marketing purposes without your consent. California residents may request the categories of personal information Sprint shared with its affiliates during the previous calendar year, if any. To make your request, send an email to officeofprivacy@sprint.com. Written requests may be sent to the Office of Privacy -Legal Department, Sprint, P.O. Box 4600 Reston, VA 20195. Sprint will respond to these requests within 30 days. Requests that come to Sprint by other means may result in a delayed response.

INTERNATIONAL DATA PRIVACY POLICY

Our International Data Privacy Policy informs you about our practices and policies regarding the collection, use, disclosure, transfer, storage, and processing of personal information collected outside the United States in connection with Services offered by Sprint, its subsidiaries, affiliates, and agents.



^ed 

ACL Blog: Olmstead Ownership for Older Adults

ACL Blog: Olmstead Ownership for Older Adults

Olmstead Ownership for Older Adults

By Edwin Walker, Deputy Assistant Secretary for Aging

Today marks the 17th anniversary of a landmark Supreme Court decision. In Olmstead v. L.C. the Court ruled that people who need assistance with activities of daily living such as eating, bathing, dressing and walking cannot be unnecessarily segregated. They must receive services in the most integrated setting possible.

This decision, based on the Americans with Disabilities Act, has great implications for older adults.

All people should have the opportunity to live, work, retire, and contribute to diverse neighborhoods and communities, regardless of age or disability. The Olmstead decision has helped make that vision a reality for older adults and people with disabilities alike by shaping policy that ultimately provides services. For example, in the 2006 and again in 2016 Congress reauthorized the Older Americans Act, each time helping reshape the systems that provide long-term services and supports to include more home-and-community-based services.  As a result, more older adults now get help with dressing, grocery shopping, and other routine tasks, making it possible for them to continue living in their homes.

This is just one example of a shift in funding, policy, and attitudes toward community living that reflects the spirit of the Olmstead decision. As a result, more and more Americans are living in the settings they choose and are engaging in their communities throughout all stages of their lives.

Olmstead is for all of us, and with an estimated 10,000 Americans turning 65 each day, it has never been more important to the aging community. I hope you will join me in adding the anniversary of the Olmstead decision to your calendars of dates to celebrate.

For more information on how Olmstead helps older adults:



Elyssa D. Durant. Ed.M.
Research &  Policy Analyst
  

Ensuring All People with Disabilities Can Answer One Simple Question | Disability.Blog

Ensuring All People with Disabilities Can Answer One Simple Question | Disability.Blog

Ensuring All People with Disabilities Can Answer One Simple Question

A photo of John Kemp

By Guest Blogger John D. Kemp, President & CEO, The Viscardi Center

Who do you aspire to be? When asked, no matter what your age, it's likely an individual you can relate to in some sense. All too often this question, seemingly simple in nature, becomes difficult for people with disabilities to answer. Why… because many with disabilities have few aspirational role models, leaders and mentors they can liken themselves to in their midst.

For this reason, the Henry Viscardi Achievement Awards were established in honor of our organization's founder, Dr. Henry Viscardi, Jr. Dr. Viscardi, who used prosthetic legs, transformed the lives of countless individuals with disabilities around the world. In fact, he served as disability advisor to eight presidents, wrote eight books, was the inspiration for countless disability-related organizations, led the first U.S. business to be staffed primarily by employees with disabilities, and opened an accredited, private school giving children with severe physical disabilities the opportunity for an education in a more traditional setting.

Most importantly, Dr. Viscardi was one to admire. A shining example and living proof for thousands of children and adults with disabilities, including myself, that we should aim high and that we could accomplish anything we put our minds to academically, vocationally and socially. I now have the privilege of leading the organization he founded over 60 years ago. The Viscardi Center continues to educate, employ and empower people with disabilities, guide employers on the benefits of an inclusive workforce, and shape policy changes that will benefit the people it serves.

The Henry Viscardi Achievement Awards are an opportunity to spotlight influential individuals with disabilities who are today's leaders, mentors and role models for our peers and our next generations of people with disabilities. Every day, people with disabilities are leaving their mark all over the world, with their work often transcending the geographical boundaries of where they live. Since inception, the Viscardi Award recipients have been a dedicated, diverse, and trendsetting group that reminds us all how a single person can spur change on a global scale.

The 2016 Viscardi Awards Selection Committee is being co-chaired for the fourth consecutive year by Robert Dole, former U.S. Senator, along with Sherwood "Woody" Goldberg, Esq., retired U.S. Army Colonel and current Senior Advisor for Asian Affairs at the Center for Naval Analysis.

Each year, the global nomination pool has included business and healthcare professionals, wounded warriors, advocates, governmental leaders, to name a few. Read about past Henry Viscardi Achievement Awards recipients.

I encourage you to nominate an exemplary leader in the disability community who has had a profound impact on changing attitudes, raising awareness and making the lives of people with disabilities great so we have more men and women to emulate and we can all answer the question: who do you aspire to be?

Nominations are being accepted until September 30, 2016 and more information may be found at http://www.viscardicenter.org/about/hvaa/hvaa.html.

About the Guest Blogger

John D. Kemp is president and CEO of The Viscardi Center and School in Albertson, NY, a national disability employment and education organization. He is widely respected for his many achievements in the corporate and non-profit worlds.

From 2002 to 2011, Mr. Kemp was a partner in Washington, DC's Powers Law Firm. He was awarded an Honorary Doctorate of Law from Washburn University School of Law in May 2003.

In 2006, Mr. Kemp received the Henry B. Betts Award, America's most prestigious award within the national disability community. In 2014, he received the Dole Leadership Prize from Senator Robert J. Dole's Institute of Politics at the University of Kansas.  In 2015, Mr. Kemp was one of twenty-five inaugural inductees into the National Disability Mentoring Coalition's Disability Mentoring Hall of Fame, in honor of Susan B. Daniels, for demonstrated commitment to mentoring and the impact of their contributions to improving the lives of people with disabilities. In addition, he has received top awards from the U.S. Departments of Labor and Health and Human Services. 

Mr. Kemp served as CEO of UCPA, VSA Arts, ACCSES, and USBLN, and as General Counsel for the National Easter Seal Society, and managed law and consulting firms that advised companies on state/federal civil rights, employment and education laws and policies regarding persons with disabilities.

(Visited 2,811 times, 1 visits today)



Elyssa D. Durant. Ed.M.
Research &  Policy Analyst