Facing heavy criticism from tavern owners last Wednesday, the Common
Council postponed its decision whether to enact a law to prohibit
bartenders from serving while intoxicated.
The council sent the
proposed sober-server ordinance back to the Public Services and Safety
Committee for reconsideration in September.
Alderman Christopher
Kunz had no issue with delaying the vote for a month, as requested by
tavern owners, but he saw no need for more debate by the committee that
already supported the ordinance on a 4-1 vote.
“We’ve whittled this down to one thing or the other,” Kunz said. “There’s not much left to discuss.”
As
currently drafted, the ordinance would empower police to cite
bartenders if they have a blood-alcohol content of 0.08 percent or more.
Police Chief Kevin Wilkinson said the ordinance would help the
city hold bartenders accountable for their behavior. In a fight at
Chief’s tavern last fall, police had no grounds to cite the bartender
for intoxication because the city has no law against it.
Ricky
Jacquart, president of the Winnebago County Tavern League, thinks the
ordinance is unnecessary and amounts to over-regulation. He said the
fight at Chief’s was an isolated event and questioned why the tavern
industry was being singled out from other sectors of the service
industry.
“You could be working behind the counter at McDonald’s
lit like a Christmas tree,” Jacquart said, “and if your manager doesn’t
care, guess what? There’s no law against that in the city of Neenah.”
Jacquart
said if Neenah adopts the sober-server law, bartenders no longer would
call police for trouble at their tavern “because they are afraid that
they are going to be breathalyzed.”
Marty DeCoster, owner of Plan B tavern in Kaukauna, said more time was needed to evaluate the ordinance.
“If it does get through, it’s going to be an example for other cities to possibly look at,” DeCoster said.
The
first is is one of the most widespread threats targeting Android.
Kaspersky has detected over 4,800,property within the McMaster community
is assigned to the MileWeb Security services Department.000 installers, and blocked 160,Check the following list of cheap dedicated linux dedicated server.000
attempted installations in the last year. “It can send text messages to
premium numbers, delete incoming text messages, generate shortcuts to
malicious sites, and display notifications advertising other malicious
programs that are spread under the guise of useful applications or
games.”
The second is disguised as a porn app, with the primary
purpose of sending messages to premium numbers. The third is described
by Kaspersky as “a classic example of an SMS Trojan,your Pre-build Cloud Servers
in a ready made environment.” with more than 1 million detected
installers. Apart from the usual premium messages it is also able to
steal contacts and perform self-updates. It has been found in 97
different countries, but predominantly in Russia and surrounding
countries, where Kaspersky has blocked more than 60,000 attempted
installs. A further 1000 have been blocked in Italy and Germany.
The
fourth trojan, Backdoor.AndroidOS.Maxit, was first detected in late
2011, with new versions appearing ever since (there are currently more
than 40 variants). “All of these modifications are very similar to one
another,” says Kaspersky; “the app opens websites with games, while
malicious operations are executed in the background.” It has been found
most often in Malaysia, but also in Thailand, the Philippines and Burma.
The fifth trojan has been monitored by Kaspersky since May
2012. “It is a shell app for a Vietnamese porn website which also sends
text messages to a premium number,” warns Kaspersky.
The
problem, in all cases, is that once the malware developer gains a GCM
ID, his malware updates are distributed by Google’s cloud services to
all of his installed apps. Google is being used as a command and control
server for the trojans: the updates appear to the user to be official
updates via Google. “Furthermore, the execution of commands received
from GCM is performed by the GCM system and it is impossible to block
them directly on an infected device. The only way to cut this channel
off from virus writers is to block developer accounts with IDs linked to
the registration of malicious programs.”
Click on their website www.mileweb.com/cloud-hosting for more information.
沒有留言:
張貼留言