Features
Former Winnipegger Zev Cohen publishes book of short stories: “Twilight in Saigon”
Former Winnipegger Zev Cohen, who now lives part of the year in Israel and part of the year in Calgary, has just published a book of short stories titled “Twilight in Saigon”. The book is available for purchase on Amazon. Here is how the book is described on Amazon: This eclectic collection of stories crosses genre lines – war, crime, romance, espionage, science fiction, fantasy –
as it moves in time from World War II through the present and into the distant future. Its common thread is humanity and love in the face of adversity.
A journalist finds love and misfortune in the upheaval of the Vietnam war.
Working for the West, a spy is saved from the hands of the KGB.
A straight-laced British accountant finds the love of his life and evil in Hong Kong.
Immigrants grapple with despair, love, and the vicissitudes of life in new surroundings.
Politics, love and tragedy in the life of a president.
Stationed on a distant world, a Terran ambassador adapts to an alien culture as love overcomes sentient diversity.
A loyal android fights for his cruel leader.
Teenage romance during the Six Day War.
A day in a dog’s life.
…and much more
We present here one of the stories from the book, titled “Gulfs and Pleasures”:
I DO NOT RECOMMEND HAVING SEX WHILE WEARING A GAS MASK. BEYOND the empirical fact that it prevents kissing from being part of the act, it’s difficult to breathe during the strenuous effort. Within a couple of seconds, the mask fogs up, and you can’t see a thing. Moreover, the waves of giggling break your concentration. Try imagining what a naked woman and a naked man look like while wearing gas masks. You’d have to agree with me that it looks funny if not grotesque. But when there’s no choice, you do what you must do and enjoy it, if only in a limited way.
I called Orna’s cell phone as soon as the siren went off in the middle of the night. She picked up after the first ring.
“Are you alright? Is he at home?”
“No. Two hours ago, he was called up and ran off to join the guys and play war. I don’t believe that he’ll be back today. Who knows how long it will last? It’s scary, and we didn’t even prepare an airtight room. He insists that there’s no chance that it will hit us of all people. Anyway, what does he care? He’s sitting in the underground bunker ogling the girl soldiers. Nothing will happen to him.”
Orna was one of the regular participants in my first-year course on the history of European art since the Renaissance that I ran in the large lecture hall of the Gillman building. She used to sit in the front row with the other “stenographers.” Those were the co-eds who conscientiously scribbled down every word that came out of my mouth, including flat jokes and burps. She was older than them, mature and sure of her intelligence amid those Barbie dolls. As opposed to them, she would, from time to time, fire a challenging comment that proved she was listening carefully and under- standing. To my shame, or not, I wasn’t attracted to her brains, although they did arouse my curiosity. As I droned along, lecturing on autopilot, my look wandered from her hazel-green eyes to the swell of her breasts and her shapely legs. What could I do? Even a professor is a human being, isn’t he? On a depressing winter’s day, between perusal of desolate seminar papers on the play of light and shadow in Venetian painting and suicidal thoughts, I ran into her in the cafeteria. The usually hectic and packed room was unusually quiet. We were alone, not counting Sonia behind the counter. Perhaps the atmosphere of impending doom chased the regular café denizens away.
I’ll jump forward because there’s not much to say about the develop- ment of our relationship. We didn’t go for in-depth discussions about art, politics, or interpersonal relations. There was no sophisticated seduction or so-called love at first sight. We were two lonely people with their eyes open, who found something in each other that had been missing up to that specific moment. We went for it. For me, her presence filled a void that was characteristic of my life here since returning from New York and a string of what Erica Jong called “zipless fucks.” She never revealed what she found in me. I doubted that it was about my less than god-like physique. I didn’t ask for fear of bursting the bubble. I didn’t want to find out that I was just a reasonable alternative to Amnon, her here again, gone again husband. And the sex was great.
“Amnon will always be Amnon,” I replied with a tinge of baseless hypocrisy. “With or without Iraqi ground to ground missiles, he’ll always look out for number one. Anyway, you always know how to take care of yourself.”
I couldn’t help adding a bit of pretentious and hollow male know it all superiority, and I said, “But he’s right about one thing. The chance that a missile will land on top of you, in Ramat Gan of all places, is tiny.”
“Yes, definitely, Mr. Professor of art history and great international expert on ballistic missiles,” she shot back, taking me down a few notches. “Do you suggest that I drink a glass of water and calm down? In a minute, you’re going to replace Nachman Shai.”
I tried another tack.
“I can be over at your place in a few minutes to set up an airtight room. I’ve been hoarding plastic sheeting obsessively for months, and I’m sure there’s a technical drawing by Da Vinci that could guide me through it.” She giggled. It worked. She could have guessed that my building skills were negligible, but there was nothing like a bit of self-deprecating humor to bring her around and hide the truth. She accepted my generous offer, and I was on my way before she put down the virtual receiver.
The streets were abandoned at that early hour. The oily puddles left by the rain reflected the brake lights of the few cars on the road. On the radio, there was an endless stream of talking and talking. Nobody could say what was happening. Were we hearing distant explosions or just echoing thunder? Should we put on our masks or take them off? It all just went by me. My thoughts focused on expectations of Orna – hot caresses, electrifying touches, sweet breath, erect nipples, wet, wet, wet.
Here’s another suggestion for my male friends. Don’t come to your lovers tight as a spring, heart beating rapidly with passion and sweaty palms. And it doesn’t matter if it’s the first day of war or any other circumstance. You’ll come, in every meaning of the word, and it’ll be over in seconds. Much too quickly.
We were getting ready for another round when the second siren went off. Being good citizens, we put on our masks and checked the limits of human sexual capabilities under the threat of chemical attack. Between bursts of muffled laughter and the pungent smell of rubber, we got a passing grade for the efforts invested.
The cell phone rang, and Orna answered. “It’s him,” her lips expressed silently. Amnon.
“Yes, I understand. I’ll think about it. I’m not sure that it’s a good idea. She must already be hysterical, and she’ll make me crazy too. That’s the situation. Yeah, it’s disgusting, but I got them out of the attic, and if they tell us to, I’ll put on the mask. Be careful. Call me when you can. Kiss, kiss. Bye.”
She looked pale. “It looks as though it’s serious this time,” she explained after the short conversation with her loving and concerned husband. “His unit is moving, and for the next few days, he’s not coming home and won’t be available on the phone.”
“Where is he going? Somewhere around here?” I wasn’t asking because of some sudden fear for Amnon’s safety. I just wanted to weigh the chances that he might show up by surprise and see what the civilians were doing in the rear…at his home.
“He said that it’s secret and he can’t talk about it. He wants me to move in with his mother in Jerusalem until things calm down. You heard what I told him. It’s out of the question.”
Amnon’s secret location was troubling. My plan to get comfortable in Orna’s bed for the next few days has a whiff of danger about it now. Suddenly he calls. Suddenly he’s worried about her and wants to send her to Jerusalem. What is he scheming? He might even show up unannounced to see if she was okay.
There wasn’t much time to consider the options, as the undulating howl of a siren broke the silence. This time we could distinctly hear the distant boom that followed it. The minute that the all-clear sounded, we were in the car on our way to Eilat. We even sang “Heading South to Eilat” loudly on a childish high at 4 a.m. On the Arava highway, we joined a slowly crawling jam of vehicles. It appeared that others, lots of them, came up with Orna’s brilliant idea to get out of the bull’s eye and as far outside of the missiles’ range as possible.
Orna wanted us to move into a holiday apartment in the southern town owned by her former schoolmate, best friend, and current neighbor, Rachel. Thanks to her outstanding bodily dimensions, Rachel had taken up a modeling career that frequently brought her to Paris, London, and New York. She changed her name to Tiffany and, when traveling, left the keys to her apartment and the Eilat hideaway with Orna. She often invited her and Amnon to use the Eilat domicile. I tried to convince Orna to come to a hotel with me to survive the war in bed with room service.
Near Beer Ora, Amnon called again. He heard as we did that a missile had hit Ramat Gan, destroying his and my low probability theory.
“Calm down. I’m still at home, and nothing happened on our street,” she told him. “There was a giant explosion, pretty close by, and the walls shook, but nothing more than that.” The lies slipped off her tongue smoothly. What else could she say?
“I might go to your mother’s later. In the meantime, if you can’t reach me on the phone, it’s because I’m down in the shelter. I don’t trust that plastic sheeting that we don’t have anyway.”
After saying goodbye with kisses, she reported no chance that he would make it home in the coming days. He must make do with the underwear he took with him. I breathed easier.
In Eilat, we dragged from hotel to hotel, the bed and room service plan falling to pieces. The same scene played out everywhere. Lobbies had turned into battlefields between separate Jewish combatants. Israel war-time solidarity gave way to exchanges of curses, pushing and shoving, and an awakening of Sephardi-Ashkenazi infighting. Never did hotel managers discover so many long-lost close friends from school and the army, relatives on the side of granny from Afula, and various other people with exclusive rights. Everyone was squeezing up against the reception desks trying to get hold of even the smallest partially furnished closet. It was a nightmare. In one of the luxury properties, the security guards were unsuccessfully attempting to take apart an outpost of suitcases and sleeping bags established by two families with a hive full of nervous brats.
Again, it’s Amnon on the phone. Orna shouldn’t try to reach him at his unit. He won’t be available due to radio silence and communications security. That’s fine, I thought. The walls have ears.
We dredged up Orna’s original plan. In a few minutes, we found the holiday apartment building. It was a nondescript structure with balconies overlooking a dilapidated neighborhood minimarket. The elevator was out of service, so we climbed the stairs to the fourth floor. On each landing, we stopped for a couple of moments of hurried necking, expecting what was coming. Hands were sent out to intimate parts, lips locked, tongues writhed. As Orna tried to fish the keys out of her bag while loosening my belt, I was busily unbuttoning her blouse to get at her bra.
The door opened, and we fell into the apartment. A pleasantly cold gust of air from the air conditioner welcomed us in. Someday had left it on since the last visit. We couldn’t wait for the bed. Clothes were rapidly removed and thrown aside, and the plush carpet hosted our vigorous sexual duet.
Eventually, things calmed down, and we could hear muffled, unidenti- fiable voices coming from somewhere else in the apartment: mumbling, quiet moaning, a cadence of creaking. We got up to check the noises that seemed to be coming from behind the closed but flimsy door of the bedroom. Just in case, I picked up a thick rolling pin in the kitchen. I pushed the door open, and no terrorist jumped me. Only Orna’s somewhat hysterical laughter penetrated my consciousness. Amnon pulled back from between Tiffany/Rachel’s legs spread wide as though bitten by a snake and stared at us incredulously.
Features
Hacker and Fraud Prevention for Online Gambling Profiles
Safeguard your online casino & sports betting accounts from cyber threats
Follow these 10 vital steps to reinforce your online gambling profile by enabling two-factor authentication, using VPNs, unique passwords and more.
With the global online gambling market projected to reach over $100 billion by 2026, securing your online casino and sportsbook accounts is more critical than ever. As digital wallets swell with winnings so too does the motivation for cybercriminals to steal credentials and loot accounts.
#1. Activate Two-Factor Authentication
Topping the list is two-factor authentication (2FA) – requiring two credentials to login instead of one at FanDuel. Often this entails providing your password plus a one-time code sent via SMS or email.
Per an Oracle study, implementing 2FA would have thwarted 99% of historical cyber attacks that involved stolen credentials.
Most regulated online gambling sites offer 2FA, accessible under account settings. Turn it on immediately for stronger defense.
#2. Never Reuse or Recycle Passwords
A cardinal sin is recycling the same password across multiple sites or services. Once one account is breached, cyber thieves can access more accounts using that same password.
To avoid this, every account deserves a unique, strong password. For simplicity, utilize a password manager app to randomly generate and store site-specific passwords.
#3. Install a VPN for Public Wi-Fi Access
When playing online casino games on shared/open wireless networks, your data flows openly and risks interception. That’s where virtual private networks (VPNs) come in.
VPNs encrypt all network traffic to and from your device. This protects your gambling activity and account credentials from Wi-Fi eavesdroppers. VPNs also disguise your IP address.
Some top-rated services include NordVPN, ExpressVPN and CyberGhost.
#4. Keep Software Updated & Run Anti-Virus Scans
You must keep computers and mobile devices updated with the latest OS and security patches. Postponing critical updates leaves open dangerous holes that malware exploits.
Likewise run reputable anti-virus scans to catch viruses attempting to infiltrate systems and spy on login credentials for financial accounts.
#5. Verify the Security & Encryption of Sites
When signing up at online betting sites and casinos, verify the legitimacy of their security measures:
- Confirm the address starts with HTTPS, not HTTP
- Check that data transmissions are encrypted using at least 128-bit SSL
- Ensure site has proper licensing
- Review privacy policy for data storage and sharing
Reputable sites will display trust badges from companies like Norton and TrustE.
#6. Avoid Account Sharing
While tempting to give friends or relatives access to funded accounts, sharing login credentials is extremely risky. You lose control over deposits/withdrawals while exposing yourself to potential theft.
Instead, gift deposits to other player accounts or refer them to open their own secure accounts.
#7. Beware Account Takeover Scams
Exercise caution if contacted unexpectedly about unusual account activity. Savvy scammers will pretend a breach occurred to trick you into handing over your username and password.
If concerned about account integrity, directly access the site yourself and contact customer support – don’t click any links in unsolicited emails.
#8. Monitor Financial Statements
Carefully review online betting account and credit card statements to detect unauthorized transactions right away. Dispute unrecognized activity ASAP to limit losses.
For further vigilance, some banks offer real-time purchase alerts via email or SMS.
#9. Don’t Save Payment Info
Saving credit card or e-wallet details on gambling sites for faster future deposits also expedites withdrawals – by you and potentially hackers.
Instead, manually enter payment info each time to contain potential damage from any account infiltration.
#10. Create a Secure Email
A strong yet oft-overlooked defense is creating a secure email account strictly for gambling transactions. Keep it completely separate from your personal email to isolate threats.
Use a nickname, enable 2FA and establish a strong password using special characters, numbers, case changes and 15+ letters.
Table: Comparison of Top VPNs for Online Gambling Site Security
VPN Service | Encryption Standard | Number of Server Locations | Allows P2P Traffic | Number of Simultaneous Connections | Money Back Guarantee |
NordVPN | AES 256-bit | 5400+ | Yes | 6 | 30 days |
ExpressVPN | AES 256-bit | 3000+ | Yes | 5 | 30 days |
CyberGhost | AES 256-bit | 7400+ | Yes | 7 | 45 days |
Fortify Your Online Gambling Fortress
As online casinos and sportsbooks explode in popularity, no player is immune to the growing plague of cyber fraud and account theft.
Guard your profile by enabling two-factor authentication, setting strong passwords, installing critical software updates and more. Also research site security measures and payment options.
Features
Vital Role of True Randomness in Modern Computing
The critical need for true randomness in cryptography, simulations, and more
True randomness is essential for encryption, statistical sampling, simulations, and more computing applications to work effectively. We explore why.
The concept of randomness often evokes thoughts of unpredictability and chance occurrences. However in the world of computing, having access to true randomness is vital for many critical applications to function properly. Without the ability to generate random values and data, key aspects of modern technology simply would not work reliably.
In this article, we will explore what constitutes true randomness from a computational perspective, why it is crucially important, and some of the ways that software and hardware attempt to produce randomness reliably. Gaining insight into this topic highlights the dependence much of digital functionality has on the availability of non-deterministic, uniformly distributed random data.
What Makes Randomness “True”?
For data to be considered truly random from an information theory perspective, values must satisfy key mathematical and statistical qualities, for example at Lucky Seven Casino. True randomness implies meeting three core criteria:
- Uniform distribution — All potential values have an equal probability of occurring so that no bias exists towards certain numbers.
- Independence — The value at any position does not relate to or depends on values at other positions. Previous numbers do not influence future ones.
- Unpredictability — Knowing some values provides no useful information to predict other values. Guessing upcoming numbers is mathematically impossible.
Hence, true randomness requires generated data featuring high entropy (information density) with no observable patterns or correlations over any length or time period analyzed. Values must pass various statisticatests of randomness to qualify. True randomness exists only in specific natural phenomena scientists believe exhibit fundamental uncertainty such as radioactive decay. Computational methods can attempt to produce randomness but technically generate only an approximation usually called pseudo-randomness. However for many practical purposes, computationally generated randomness proves sufficient if it passes robust statistical testing.
Why True Randomness Matters Cryptography
Arguably, the area with the most crucial dependence on true randomness is cryptography. All modern encryption technologies require random number generation to ensure security. Encryption systems work by utilizing random numbers for:
- Key generation
- Initialization vectors
- Salts
- Nonces
- Padding
Any bias, predictability or correlation within random values used for the above purposes significantly compromises encryption protocols and introduces vulnerabilities. With trillions of dollars transferred online daily and vast amounts of sensitive data stored digitally, safeguarding cryptography requires high-quality random number generation rooted in solid entropy sources.
Simulations & Modeling
Outside of security, many more computing applications need randomness to operate correctly per their design intent. Monte Carlo simulations extensively utilize randomness to model complex real-world behaviors by running many iterations with differing random inputs. Financial analysis, climate modeling, nuclear reactions and molecular behavior represent common Monte Carlo simulation applications.
Games, Artificial Intelligence & Machine Learning
Gaming, AI and ML commonly incorporate randomness to increase variation, introduce unpredictability, and improve realism. For example, non-player characters in video games use randomness for movement, dialog and behavior to feel more lifelike and less robotic. AI/ML leverage randomness to train networks more thoroughly against a wider possibility space and build more resilient models less prone to biases.
Generating True Randomness via Hardware
Given the pervasive need for genuine randomness across computing, how do software and hardware reliably produce it? Most systems today use either specialized hardware random number generators or hybrid combinations of hardware and software.
Hardware options utilize the inherent randomness within low-level physical phenomena to produce entropy. Different techniques for generating randomness exist but most hardware implementations focus on three main sources:
- Thermal Noise
- Semiconductor Quantum Physics
- Chaotic Oscillator Outputs
Generator Type | Description |
Thermal Noise | Amplifies and extracts random electrical noise from resistor thermal vibrations |
Quantum Physics | Leverages quantum mechanical properties like photon emission timing from LEDs/lasers |
Chaotic Circuits | Uses unpredictable oscillator circuit outputs from chaos theory |
Semiconductor-based solutions can generate high bitrates up to 5Gbps using compact modern chip fabrication allowing extensive harvestingof entropy. However these sources derive from complex, random physical processes proving impossible to predict or fully model mathematically. This unpredictability provides excellent entropy quality unattainable via software algorithms alone.
Most general-purpose computers now integrate random number generators within CPUs allowing applications access to decent hardware-based random data. For the highest security use cases, dedicated standalone hardware random number generators exist exceeding >100Gbps speeds. Hence accessing genuine randomness is available today even on common computing devices.
Cryptographically Secure Pseudo-Random Number Generators
While hardware mechanisms utilize hard-to-predict physical phenomena to produce randomness, software solutions must take a different approach. Algorithmically-generated randomness cannot achieve true randomness from a physics perspective. However clever mathematical techniques like cyclical algorithms can generate randomness passing many statistical tests of randomness within their output bit length limits.
Cryptographically secure pseudo-random number generators (CSPRNG) serve as the premier software-based method for generating randomness. CSPRNGs work by repeatedly applying cryptographic primitives like hash or cipher functions on initial random seed values. This process produces a chain of output bits not reproducible without the original seed key. Leading CSPRNG algorithms include:
- Hash_DRBG
- HMAC_DRBG
- CTR_DRBG
Software libraries implement these CSPRNGs so developers can integrate quality randomness into applications with proper seeding. Seeding establishes the initial starting point for randomness generation using an entropy source like hardware random number generators or timing variability.
CSPRNGs allow the production of vast quantities of randomized data for any purpose needed. Compared to hardware mechanisms limited by physics on maximum speeds, algorithms scale boundlessly in the bits created as long as adequate computational power exists.
Yet key differences between software and hardware randomness remain. While CSPRNG outputs pass statistical testing and contain no observable patterns, their pseudo-randomness means given the same seed, the exact same value sequence will generate each time. Also, if a CSPRNG algorithm or implementation has flaws, adversaries could predict and exploit output resulting in compromised security. Still, with proper cryptographic design and regular reseeding, CSPRNGs provide quality randomness for most software needs.
Conclusion
From the above exploration, we see true randomness plays a pivotal role across computing – from cybersecurity to simulations and beyond. While no substitutes for true physically-derived entropy exist, modern hardware and hybrid hardware-software solutions provide abundant randomness for practical usage.
However as computing continues evolving with new technologies like quantum, ensuring high-quality randomness generation tackles emerging information security and system reliability challenges. Access to ample true randomness stands necessary now for current computing functionality and lays the foundation for future innovation.
Features
News from Israeli hotels
Introduction: The current wars in Gaza and Lebanon have had a disastrous effect on Israeli tourism. Recently we were contacted by a friend in the advertising business in Israel who asked us whether we would help to promote a couple of well-known Israeli hotels – who are hoping for a huge rebound in bookings once the wars come to an end.
Here is news about two leading Israeli hotels:
Mr. Roy Avidor is the new GM at The Ritz-Carlton, Herzliya.
We are delighted to welcome Roy Avidor as the new General Manager of The Ritz-Carlton, Herzliya!
Roy brings over a decade of leadership in the international hospitality industry, with a proven track record of operational excellence.
Most recently, Roy served as Director of Operations at the Sheraton Grand Tel Aviv, where he oversaw daily operations across multiple departments, always ensuring the highest standards of service. Prior to that, he held management positions at Celebrity Cruise Line and Isrotel Hotel Chain.
Roy’s extensive background in luxury hospitality, combined with his passion for service, makes him the perfect addition to our team and to his newest position as General Manager.
Boaz Elani Appointed General Manager of Sheraton Grand Hotel Tel Aviv
Boaz Elani has been named the new General Manager of the Sheraton Grand Hotel Tel Aviv, a prestigious property within the global luxury Marriott portfolio.
Bringing extensive expertise in luxury hospitality, Boaz most recently served as the General Manager of the Ritz-Carlton Herzliya, also part of the Marriott group. During his three-year tenure, he successfully navigated the hotel through two major challenges: the COVID-19 pandemic and the conflict in Israel. His steadfast dedication to exceptional service significantly enhanced guest satisfaction, solidifying the hotel’s reputation as a premier destination.
“I am honored by Marriott’s trust in me and thrilled to join the Sheraton Grand Tel Aviv team,” said Boaz. “This hotel holds a distinguished place as one of Israel’s finest and most iconic. Following its comprehensive renovation, we are committed to delivering unmatched experiences for our guests and continuing its tradition of excellence.”
The Sheraton Grand Tel Aviv, overlooking the Mediterranean, features 320 beautifully redesigned rooms, including premium, deluxe, and club accommodations, along with luxurious suites. Guests staying in club-level rooms enjoy exclusive access to the 18th-floor lounge, offering breathtaking sea views. The recent renovations incorporate modern aesthetics with natural, seaside-inspired materials, creating a serene and inviting ambiance.
The hotel boasts a range of world-class amenities, including a newly updated beachfront pool, a popular sushi bar open to both guests and the public, and a renowned gourmet breakfast. Its versatile meeting spaces and state-of-the-art conference halls have garnered international acclaim, earning it the 2024 World MICE Award for Best Event and Conference Hotel.
In line with Marriott’s global commitment to sustainability, the Sheraton Grand Tel Aviv has held Green Key Certification since 2014, highlighting its dedication to environmentally responsible practices.
With Boaz Elani at the helm, the Sheraton Grand Tel Aviv is poised to further elevate its status as a premier destination for both leisure and business travelers.
You must be logged in to post a comment Login