Cathay Dupont Awards: Prestige Has Its Prize

Prestige Has Its Prizes: The George Foster Peabody and Alfred I. duPont-Columbia University Awards

Alfred I. duPont-Columbia University Award

In 1942 Jessie B. duPont created this award “as a tribute to the journalistic integrity and public-mindedness of her late husband, Alfred I. duPont.” Since 1968 the Graduate School of Journalism at Columbia University Cathay Dupont Award has administered the awards, which the school considers “the most prestigious award in television and radio news, the broadcast equivalent of the Pulitzer Prizes [which are also administered at the Graduate School of Journalism].”

The stated purpose of the award is “to bring the best in television and radio journalism to professional and public attention and to honor those who produce it.” The award recognizes the contributions made to local communities and the nation as a whole by news organizations.

The late Louis I. Kahn designed the silver batons that are awarded to annual winners. Each baton is inscribed with Edward R. Murrow’s famous 1958 comment to the Radio & Television News Directors Association: “This instrument can teach, it can illuminate; yes, it can even inspire. But it can do so only to the extent that humans are determined to use it to those ends. Otherwise it is merely wires and lights in a box.”

“The Alfred I. duPont-Columbia University Awards have always welcomed long-form nonfiction reporting,” says Jonnet Abeles, director of the awards competition. While there is a focus on news programs that have aired in the US, Abeles points out that “the award program also tries to recognize independent work each year.”

The duPont Award process of review is two-tiered. There is a Board of Screeners, comprised of 80 members who screen approximately 10 entries or 10 hours of programming. The board generates reports on the work and rates each entry on an excellent/good/fair/poor rating scale. The best entries go to one of the nine jurors on the final panel. The jurors serve for three years and the terms are renewable up to nine years, thus providing continuity to the process. Each juror might look at 20 to 30 entries, and can recommend longer works such as Eyes on the Prize or The Civil War that would require special arrangements for screening and review. The final panel then meets for three full days together to watch the “best of the best,” talk together and arrive at consensus decisions as to the winners.

From 1978-2004 the organization offered a taped program of the duPont Awards Ceremony at Columbia to PBS and its member stations. In 2004 Columbia developed a new way of presenting the winners and their work: an hour-long documentary format presenting six of the 12 winners in programmatic form using excerpts of the work and excerpts of the awards ceremony. Martin Smith, a producer from the award-winning PBS series FRONTLINE, produced the 2006 program. Titled Telling the Truth: The Best in Broadcast Journalism, it aired on PBS stations in January.

George Foster Peabody Award

In 1938 the National Association of Broadcasters formed a committee to establish a “Pulitzer Prize for radio.” Lambdin Kay, manager of WSB Radio in Atlanta, was a member of the committee. Nicknamed “The Little Colonel,” Kay became a champion of the award project. He asked John E. Drewery, dean of the Grady School of Journalism and Mass Communication at the University of Georgia, to sponsor the program. An agreement was reached between the university and NAB, and the awards were first presented in 1941 for radio broadcasts in 1940. Television awards followed in 1948, with honors for cable introduced in 1981.

George Foster Peabody, a native Georgian, was an industrialist, financier and major benefactor of the university. It was his daughter, Majorie Peabody Waite, who, in addition to serving on the first Board of Advisors, commissioned the famous bronze medallion bearing her father’s likeness. The awards “continue today to recognize distinguished achievement and meritorious service by radio and television networks, stations, producing organizations and individuals.” While NAB had significant involvement in its founding, the award program is completely run today by the Grady School of Journalism and Mass Communication at the University of Georgia.

The Peabody selection process works as follows: Depending on the volume of entries (about 1,100 per year from around the world, with the Pacific Rim nations dominating the international entry pool), some 30 initial screening committees are formed. They are composed of three persons, usually faculty, administration and students. Librarians serve on the committees as well. Each committee handles about 30 entries each. These 90 reviewers recommend the programs they think worthy of recognition to the Peabody Board, but the board is not bound by their recommendations. Board members can even consider other material that has not come through the screening process. According to the Peabody Award guidelines, “in its selections, the Board will not necessarily be restricted to those programs reviewed by the screening committees, but may consider reports of meritorious service from other sources and may, on its own initiative, select a program, station or individual for an award.”

After some members of the board meet twice over a five-day period, the entire board assemblies for four and a half days and hashes out its final awards through “verbal exchange.” Awards are not given in categories, but rather in an “all against all” final testing procedure. The categories are used at the submission level for administrative purposes.

Dr. Horace Newcomb, who holds an endowed professorship in the Communications Department at the Grady School, currently oversees the awards process. He considers the Peabody “perhaps the ‘broadest’ award in the industry, since it considers all types of broadcast programming.” Newcomb feels it is vitally important to have an academic institution be the sponsor and guide to the competition, “because of the much more substantial neutrality that is afforded; there is none of the pressure of politics that come from industry-based, peer group awards. There’s also the capability for any required follow-up research through the university resources.”

According to Newcomb, the Peabody Awards program is not supported by an endowment; the University of Georgia provides a portion of the funding and the rest comes from other sources. The university presently lists the prestigious program for a $20 million endowment gift as part of a larger development campaign. No donor has stepped forward at present.

Newcomb also notes that the university library houses an archive of some 45,000 submissions of radio and television work, dating back to the early 1940s, and contains one of the best collections of local news in the US. The archive is accessible for research academically and for producers, but the copyrighted material would have to be cleared for any material used; the university will help researchers get in touch with the copyright holders.

The respective annual submission deadlines for the George Foster Peabody Awards and the Alfred I DuPont-Columbia University Awards are mid-January and early July.

Advertisements

Southbourne Positive Living Group – 5 Tips on How to Create Prosperity without Money

southbourne-positive-living-group-5-tips-on-how-to-create-prosperity-without-money

Your outer world reveals what is on the inside. Ever wonder why things don’t work out, again. What if you could change on the inside and set prosperity in motion, seemingly effortlessly? Learn how to activate prosperity from the inside out.

Sounds crazy I know, but it really is true!  I want to give you 5 Tips that will help you create Prosperity starting today.

Tip #1 Whatever is on the inside will be your reality! Even nature verifies this. On the inside of an apple seed is an apple tree, not an orange tree. You cannot get a peach from a lemon seed.

Tell me, can you get kangaroo from a fish? Here is a fact, “like begets like”. Whatever is on the inside is going to give birth to what is on the outside.

So doesn’t it stand to reason whatever is on the inside of you will be on the outside. The inside always gives birth to what will be on the outside.

Most people believe prosperity is all about figuring out how to create money. Not so, prosperity begins on the inside. So the question is, what do you have on the inside? That’s easy!

When you look at a peach tree can you tell what is on the inside of the seed. Absolutely!

Tip #2 Look at the outside if you want to know what is on the inside! Put clean water in a dirty glass and you have contaminated water. The same holds true with prosperity.

Put money in a lack or scarcity mindset and you will struggle making ends meet no matter how much income you create.

How can you tell what is on the inside of you. Easy, look at the outside. No. I am not talking about all the toys; everyone knows that can be deceiving.

There is a simple way to know what is on the inside, no one can hide it. It’s your speech. Does your speech reflect prosperity and abundance, or scarcity and lack.

Most people don’t pay much attention to their words. But awareness always precedes change. Remember your words are a mirror of your soul or heart.

Have you ever listened to people, I mean really listened. I want, I need, I wish, what if, but, I can’t….. What kind of words do speak regularly

They will tell you what is on the inside, prosperity or lack.

Of course it becomes obvious in other ways as well. Such as, always struggling and never having enough….  behind on things and the list goes on.

Tip #3 It’s time to make the change! If you want a different outcome then you have one choice, change. You can change your words, thoughts, feelings, attitude—notice there is an inward progression here.

Once you become aware of the above, you have a choice. Change Or stay the same. Choices have an exact outcome; they always have a specific result.

So if you want prosperity to be set in motion then simply make the prosperous choice. Immediately you activate prosperity.

So awareness must lead to action. That action brings change, and change gives you a specific result.
Here is where a lot of people experience, success then failure…. You get some wins under your belt then suddenly you are back where You were.

Tip #4 Permanent change should be seemingly effortless! Have you ever read a book, had a conversation, or watched TV before going to bed and you dream about it all night? Or maybe had a tough problem to solve with a deadline, and you wake up in the morning’ with the answer?

That is your subconscious at work! Your subconscious is the inside. It determines what will be on the inside. This is where all your old Programs are that need to be deleted, and replaced with the new.

Change that happens at this level is permanent, at least until they are changed. So how does change occur here?

Here is one simple way. The time before that, sleeping state, and the time just after opening your eyes are perfect for change.

It’s the time you can turn things over to your subconscious and allow It to work on your behalf. This is effortless. If you struggle, you did not turn it over and leave it. Turn it over and let it go!

Here’s one way to turn it over. Ask questions. This fires up your Subconscious and puts it to work. But, you must ask the right Questions.

Why is this happening to me is not a good question. A better question would be, what change needs to happen in order for me to prosper.

When the answer comes, and it will, that is what you want to really think about during those times just before and after sleep. This will replace those old self sabotage programs that fire off and set you back effortlessly.

Tip #5 Live out your change! Once the change is in place its simple, live out the change. You don’t have to live in fear. Have a little faith, and let the change happen.

At this point it should be automatic, without much effort at all.

Prosperity begins on the inside, and you can Create Prosperity without Money. It’s pretty simple!

Southbourne Positive Living Group (SPLG) meets on the last Wednesday of the month (excluding holidays).

Join a group of like- minded people and rediscover the purpose and meaning of your life.

41 Amazing Internet Security Blogs You Should Be Reading

 

Introduction

 

How do we stay up-to-date with the latest security news? Where do we find the best security solutions to fight malware? Who can we follow to learn about the latest threats and online attacks so that we can protect ourselves?

With security in our minds, no matter we are common people or a big company name, we need to understand technology if we want to prevent data loss and privacy breaches.

 

But with so many security blogs out there, which one should we follow?

 

We have put together a list of security blogs from independent individuals and big names in the IT industry, so that you can benefit from their knowledge and insight. Therefore, if you need best practices, how-to articles, online safety research or the latest security news, feel free to bookmark this article and access it whenever you feel necessary.

 

The List

 

  1. Krebs on Security

Brian Krebs is the man behind Krebs on Security. Being hacked himself in 2001, he takes a personal interest in online security and is one of the well-known names in today’s security landscape. He covers topics from latest threats, privacy breaches and cyber-criminals to major security news.

 

  1. Schneier on Security

Bruce Schneider is probably the most well-known name that you can recognize in our list, and was even called a “security guru” by The Economist. He wrote books, hundreds of articles, essays and security papers on security matters. At the same time, he is a known figure in the media environment which recognize him as an important voice for the online security, not only for his knowledge on the matter, but also because he knows how to express his opinions.

 

  1. TaoSecurity

This security blog is run by Richard Bejtlich, Chief Security Officer at Mandiant and author of many books on security. With an extensive background on cyber-criminal world and malicious attacks on enterprise networks, he shares his experience on digital defense, network monitoring and detection on his security blog. Since a great number of network attacks come from China, he is specialized on Chinese online criminals.

 

  1. US-CERT

This is the official website of the Department of Homeland Security, from USA.

Though it is not a classical security blog, its purpose is to improve Internet security by providing specialized and well detailed information on cyber-criminal activities, malware, phishing attempts and online threats. To use their own words: “US-CERT strives for a safer, stronger Internet for all Americans by responding to major incidents, analyzing threats, and exchanging critical cyber-security information with trusted partners around the world.”

 

  1. Dark Reading

Dark Reading is a widely-read cyber security site that addresses professionals from the IT environment, security researchers and technology specialists. They use their experience and knowledge to provide articles, recommendations, news and information on IT security.

 

  1. CIO

CIO is the place where you find news, information technology articles, insight and analysis on major data breaches and online threats. Covering multiple aspects of world wide web, it provides in-depth, content rich information for IT professionals and normal users.

 

  1. Network Security Blog

Martin McKeay is the voice of this security blog, where you can find information and news on privacy and security issues. As Martin says: “I took up blogging as a means to extend my knowledge and test my ideas about security…”.

 

  1. Security Watch with Neil Rubenking

Known for his direct and witty style, Neil Rubenking is the man you have to listen if you search for technical advice on the main security solutions, from firewalls, antivirus and antispam products to full security suites. Detailed reports and sharp analysis of security programs place him be on your follow list if you look for this type if information.

 

  1. Paul’s Security Weekly

Paul’s Security Weekly, founded by Paul Asadoorian, brings you security news, useful technical articles, research studies and valuable information on hacking and cyber-crime through various channels, from blog posts, videos to podcasts.

 

  1. PCMag.com

One of the most popular sites in the software industry, PC Magazine comes with reviews and studies on the latest products for online security. For an objective analysis of a product you may be looking, don’t forget to look for the dedicated article on this website.

 

  1. Wired

One of the classical North American publications reporting on technology and its role in culture, economy and politics, Wired approaches topics on online privacy, cyber-criminal threats, systems security and the latest alerts.

 

  1. Forbe’s Firewall

Forbe’s Firewall comes from one of the leading media company in the online environment and provides strong analysis, reliable tools and real-time reports for cyber-security news and information on the latest online threats.

 

  1. TechRepublic

TechRepublic provides large resources for the online industry, such as blog articles, forums, technical papers and security data. All the valuable information available helps IT professionals and technology leaders to come with the best decissions on their business processes.

 

  1. Zero Day

The Zero Day security blog is important for all the people which are part of the IT industry and you should follow it to stay up-to-date with the latest security analysis, software vulnerabilities, malware attacks and network threats.

 

  1. Securosis

Securosis is a security research and advisory company that offers security services for companies and organizations. At the same time, you can find on their security blog some useful articles and insight on managing and protecting online data.

 

  1. The Guardian Information Security Hub

Known for its quality articles on world news, Guardian offers a section dedicated to information security for companies and individuals. To stay up-to-date with the latest articles and news on cyber security, make sure you follow this site.

 

  1. Help Net Security

This security site is a popular place for data and security news and you can find here the latest information and articles related to the IT industry.

 

  1. Techworld Security

The section dedicated to security on this site analyzes the latest malware threats and zero-day exploits. You can find here other important topics and subjects, such as security articles, how-to documents and software reviews.

 

  1. Fox IT Security Blog

This security blog is a very good source of information on online security, technology news and cyber crime defense.

 

  1. SC Magazine

SC Magazine comes in the IT environment with technical information and data analysis to fight the present online security threats. Their site provides testing results for e-mail security, mobile devices, cloud and web security.

 

  1. Network Computing

The content of this security blog focuses on cloud technology and enterprise infrastructure systems. Its published articles cover security solutions on how to deliver applications and services for an increasingly large threat environment in the business world, news and expert advice.

 

  1. Infosecurity Magazine

Infosecurity Magazine is an online magazine which covers not only security articles on popular topics, but is also dedicated to security strategy, valuable insights and technical approaches for the online industry.

 

  1. SANS Institute AppSec Blog

This security site addresses the growing malware threats in the online world by providing training, research, certification and educational resources for IT specialists.

 

  1. Threat Track Security

This security blog keeps you up-to-date with the latest innovations and developments in the IT industry, from security exploits to software vulnerabilities and cyber-criminal attempts.

 

  1. CSO Online

CSO focuses on information technology, access management for enterprise servers, loss prevention, cybercriminal threats and software vulnerabilities.

 

Security blogs from software providers in the IT industry

 

  1. Sophos security blog

Naked Security is Sophos’s award-winning threat news room, giving you news, opinion, advice and research on computer security issues and the latest internet threats. Naked Security is the blog of security company SOPHOS and the place where you can find news, research studies, advices and opinions. Categories range from mobile security threats to operating systems and malware articles. Naked Security is updated multiple times per day and receives around 1.5 million pageviews per month. It has won numerous awards and it is considered one of the best security blogs.

 

  1. Kaspersky Lab’s ThreatPost

Threatpost is the leading security news website that is part of The Kaspersky Lab. Their articles cover important stories and relevant security news for the online world. They are recognized as an important source of news for online security in important newspapers and publications, such as New York Times, USA Today or The Wall Street Journal.

 

  1. Kaspersky Lab’s Securelist

Securelist is a security blog run by Kaspersky Lab and it addresses a large audience, providing some of the best security subjects on cybercriminal activities and data stealing malware. You can find here security information that focuses on malware, phishing and other threats from the cyber security world.

 

  1. Symantec Weblog

Symantec Weblog is a security blog from one of the biggest providers of security solutions world wide, Symantec. Using their technical knowledge and data collected along the years, they come with strong analysis reports and articles on security threats, online criminals, data stealing malware, system vulnerbilities and many others.

 

  1. Google Online Security Blog

We are surrounded by Google products and services, from their search engine to their web browser, so it is normal to include their security blog in our list. It is a reliable security blog and even more, a reference point on online security and privacy we need to acknowledge.

 

  1. Zone Alarm Cyber Security Blog

The security blog from ZoneAlarm, one of the well-known vendors of security products, provides valuable information on malware defense and online security. Using their experience on malware, this security blog generates malware alerts, practical security tips and the latest news in the IT industry.

 

  1. F-Secure Safe & Savvy Blog

A security blog from F-Secure, a company dedicated to online content and privacy protection. On this security blog you will find helpful tips and advises on security issues, from protecting your personal identity to keeping your system safe.

 

  1. HotforSecurity

The security blog from Bitdefender – one of the leading companies on online security solutions, covers various subjects from the IT world, from Internet scams, online spam and phishing to malware and data stealing software.

 

  1. McAfee security blog

McAfee security blog provides the latest tips and techniques from security experts to keep you up-to-date with the latest malware trends in the online environment.

 

  1. Microsoft Malware Protection Center

The Microsoft Malware Protection Center analyzes data from all over the world to provide insight and valuable information on fighting online threats in order to protect users from malware attacks and online crime.

 

  1. SpiderLabs Security Blog

Investigators and researchers at Trustwave cover the latest technology news on this security blog. Gathering information from research and testing, they publish articles and security studies to fight online hackers and cyber-criminal threats.

 

  1. Dell SecureWorks

The security blog from Dell SecureWorks provides the latest news and information for IT professionals and users that need to stay up-to-date with online threats and malware attacks.

 

  1. Malwarebytes Security Blog

The Malwarebytes security blog articles cover the latest malware threats and cyber criminal attempts from the online world. You can find their articles on categories, from cyber-crime, exploits, hacking and malware analysis.

 

  1. Trend Micro Simply Security

Trend Micro Simply Security site offers expert insights on cloud security, data safety, privacy protection and threat intelligence.

 

  1. We Live Security

We Live Security, the Eset blog, is an online resource for cyber security articles and this blog covers a large network of security topics from emerging online threats to zero-day exploits.

 

  1. CSIS Security Group Blog

The security blog from CSIS Security Group provides valuable information on malware attacks and online threats. Using the internal research data from their own security labs, their studies help users fight cyber-criminal threats.

 

Conclusions

 

We know our list is not perfect, there are so many other security blogs and top influencers in the IT industry that we have not included and we can not assume this list is complete. We try to stay in tune with the latest updates in the industry and we provided a few reasons why you should follow the security blogs above.

But, since the Internet world and the security landscape is changing all the time, so must we. So, help us improve our article, let us know what you think, we have no problem in making changes to our article and improve it for the benefit of all.

 

What are your favorite security blogs and why should we follow them?