May 2009 bring to each of you happiness, success and be filled with peace and hope for your family and friends. May all your resolutions come true.
Happy New Year!
Fort Mackenzie is a four-story interactive treehouse water fort offering 12 levels of super-soaking fun for the family. Younger kids can climb with their parents to reach the slides at the top. The older ones will love making their way over suspension bridges and cargo nets to spray stations and soaker buckets. (Watch out below!) The grand daddy of soaker buckets is the 1,000-gallon tipper that sits atop Fort Mackenzie. Every few minutes, the warning bell clangs, and the bucket begins to tip its contents over the roof and onto the giggling group below.
A few weeks ago I had the distinct privilege and pleasure of being asked to review Rory Miller's new book, Meditations on Violence. I was really looking forward to this book. It got fabulous hype from every reviewer; one even went so far as to call it "life changing." Let me tell you, there is probably nothing that stands a greater chance of making me skeptical than being told that a martial arts book is life changing. Ok, so maybe if the author's title is something like, "10th dan shihan-dai soke jedi master" - maybe then I'd be more skeptical, but telling me that a martial arts book is "life changing?" Come on...
This book is nothing short of remarkable, truly informed, and inspiring. This is easily the best martial arts book I've ever read. Period. You simply must read this book and think about these ideas that Rory presents if you want to claim to be a martial artist.
Meditations on Violence was really the right title for this book, it's abundantly clear on every page that Miller has put time, effort and thought behind his words. If you want to know why this is so important, and the rarity of such a book covering this subject so well, go read a few of the other streetwise, self-defense style publications on the market today. Rory never comes across as a self defense blowhard who can’t see past his own ego, his book sets a standard that the typical "martial arts for the street" category seldom attains. Meditations on Violence demands to be READ, not just scanned. It’s an honest, unrefined dose of the real world coupled with insightful training guides and advice. I could go on for pages touting the depth of knowledge in this book. Even the preface is an attention-grabber.
If you are a martial arts teacher, law enforcement officer, or just a concerned civilian interested in physical violence and the steps necessary to avoid it, this book is a crucial must-have.
The Use Of The Broadsword - T. Page - 1746
Self Defence The Art Of Boxing - Ned Donnelly - 1881
Physical Culture and Self Defense - Robert Fitzsimmons - 1901
Sabre And Bayonet - AC Cunningham - 1906
The Cane As A Weapon - AC Cunningham - 1912
Ju-Jitsu Self Defence - W Bruce Sutherland - 1913
Practical Self Defence - Jacomb - 1918
Tricks of Self-Defence - WH Collingridge - 1920
Jiu Jitsu Wrsetling Defence Against A Violent Attack - The Stillman Association - 1922
How To Become Handy With Your Fists - Percy Longhurst - 1922
Master At Arms Badge For Boy Scouts - Anon - 1925
Scout Wall Chart - “The Scout” - 1925?
Combat Sans Armes - Anon - 1941
Disarming and Hand to Hand Combat - Training Bulletin GT-10 - 1942
Shooting To Live - WE Fairnairn and EA Sykes - 1942
Unarmed Action - Micky Wood - 1942
Self Defense or Jiu Jitsu - Dewey Mitchell - 1942
Self Defence For Women - WE Fairbairn - 1942
Get Tough - WE Fairbairn - 1942
Stick Play - Yerkow - 1942
Combat Without Weapons - E Hartley Leather - 1942
Martell’s Simplified Ju Jutsu Offense and Defense - Jules Martell - 1942
Commando Jiu Jitsu - Irvin Cahn - 1943
Combat Conditioning Manual Jiu Jitsu - RE Hanley - 1943
American Art of Self Protection - Samuel B Cummings - 1943
Kill Or Get Killed - Rex Applegate - 1943
Combato - Bill Underwood - 1943
Do Or Die - AJD Biddle - 1944
How To Use Jiu Jitsu - IC King - 1944
American Combat Judo - Bernard J Cosneck - 1944
Judo 41 Lessons In The New Science of Jiu-Jitsu - T Shozo Kuwashima and Ashbel R Welch - 1944
Protect Yourself, The Secrets Of Unarmed Defense - Brooks Mendell - 1944
Abwehr Englischer Gangster-Methoden - Anon - 1945?
Your Hards…Secret Weapons! - Brooks Mendell - 1946
Ju-Jitsu And Other Methods Of Defence Simplified - Tommy Turner - 1948
How to Use The Yawara Stick - Prof. Matsuyama - 1948
Championship Fighting - Jack Dempsey - 1950
Marine Bowie - John Styers - 1950s?
Cold Steel - John Styers - 1952
Lightning Ju-Jitsu - Harry Lord - 1950s?
Modern Self Defense - RH Sigward - 1958
Canon Of Judo - K Mifune - 1958
Special Judo Self-Defense Course - Joe Weider - 1959
Handbook Of Self Defense In Pictures and Text - John Martone - 1962
Police Ju Jitsu - James M Moynahan - 1962
Pencak Silat - Alexander, Chambers & Draeger - 1972
Close Combat - US Marine Corps - 1999
Discussion on Fairbairn, Applegate and Knife Design - William Cassidy - 1999
Le Catch As Catch Can - Bontemps, Miquet and Arnaud - Unknown
The Fine Art Of JuJutsu - Unknown - Unknown
Linda Ellis is an author, poet, columnist and inspirational speaker, as well as the creator of the world-famous, "The Dash" poem.
Available for Download
* Modern Judo Volume 1 by Charles Yerkow (1942)
* Modern Judo Volume 2 by Charles Yerkow (1942)
* Higher Judo Groundwork by Moshe Feldenkrais (1952)
* Standing Judo by Mikonosuke Kawaishi
* Lethal Blows and Kuatsu from Kano Jiu Jitsu by Hancock (1905)
* Contest at the Dojo by Sumitomo Arima from Judo: Japanese Physical Culture (1908)
* Judo: A Modern Style of Japanese Jujutsu by Sasaki Kichisaburo (Hungarian)
Judo Used in Military, Combat, and Self Defense Training
* My Method of Self Defense by Mikonosuke Kawaishi
* American Combat Judo by Bernard J. Cosneck (1944)
* Combatives: US Army Field Manual (2002)
* Combatives: US Army Field Manual (1992)
* US Marine Corps Close Combat
* US Marine Martial Arts
* Kill or Get Killed by Lt. Col. Rex Applegate (1976)
* Vital Points for Medium Range Combatives
* Deal the First Deadly Blow
* Dirty Fighting by Lt. David Morrah Jr.
* Self Defense by Wesley Brown (1951)
* Get Tough by W.E. Fairbairn
* Cold Steel by Styers
* Secret Jujitsu by Capt. Allen Smith
* Shanghai Municipal Police Manual of Self-Defence by W.E. Fairbairn (1915)
* American Jiu Jitsu by Len Lanius (1922)
* Scientific Unarmed Combat by R.A. Vairamuttu
* Unarmed Combat by James Hipkiss (1941)
* Combato -- The Art of Self Defense by Bill Underwood
Probably the earliest videographic source for French saber fencing…
This clip was filmed off an original French flip-book (Fr.: folioscope or feuilletoscope) by TodaysFinancialNews.com videographer Andy Robinson. It constitutes one of the first short animated documentary sources on the sequence of movements actually used in 19th-century fencing.
Note the frequency of cuts to the leg and ankle, as well as the moulinet feints preceding actual cuts. This, as well as other images on this site, prove that modern target restrictions are a recent invention, not part of hallowed tradition. (Of course, I already beat that point to death ten years ago in The Secret History of the Sword.)
Of particular interest to me is the right-hand fencer’s cut to the inside belly, followed with a deliberate draw cut across the full front of his opponent.
The weapons used look too long, too light, and too straight to be proper period fencing sabers. (Especially the guard looks awkward.) My guess is that, for the sake of taking the 120 photographs that make up the sequence, the photographer was forced to chose oversized, light-painted wooden weapons to make their motion better visible against the dark background.
The speed of the sequence is an educated guess. Running through the flip-book itself inevitably provides a jerky and overly fast impression. Videographer Andy Robinson did some reconstructive math on the number of images per second. Right now, the speed is at about 10 images per second… and I think it looks about right.
This video is a first rough draft. We may actually be able to produce a less jerky sequence. Pay-per-view, here we come!
Today, we're announcing an initiative to help bring more magazine archives and current magazines online, partnering with publishers to begin digitizing millions of articles from titles as diverse as New York Magazine, Popular Mechanics, and Ebony. Are you a baseball history fanatic? Try a search for [hank aaron pursuing babe ruth's record] on Google Book Search. You'll find a link to a 1973 Ebony article about Hank Aaron, written as he closed in on Babe Ruth's original record for career home runs. You can read the article in full color and in its original context, just as you would in the printed magazine. Scroll back a few pages, for example, and you'll find a two-page spread on 1973's fall fashions. If you'd like to read further, you can click on "Browse all issues" to view issues from across the decades.
Trust Your Tools (Tuesday, December 09, 2008)
Martial Arts Mindfulness, Intent, Thought Thursday, December 04, 2008)
On the Benefits of Being a Crippled Martial Artist (Thursday, November 13, 2008)
Djuru Three (Thursday, November 06, 2008)
SAN FRANCISCO — Internet security is broken, and nobody seems to know quite how to fix it.
Despite the efforts of the computer security industry and a half-decade struggle by Microsoft to protect its Windows operating system, malicious software is spreading faster than ever. The so-called malware surreptitiously takes over a PC and then uses that computer to spread more malware to other machines exponentially. Computer scientists and security researchers acknowledge they cannot get ahead of the onslaught.
As more business and social life has moved onto the Web, criminals thriving on an underground economy of credit card thefts, bank fraud and other scams rob computer users of an estimated $100 billion a year, according to a conservative estimate by the Organization for Security and Cooperation in Europe. A Russian company that sells fake antivirus software that actually takes over a computer pays its illicit distributors as much as $5 million a year.
With vast resources from stolen credit card and other financial information, the cyberattackers are handily winning a technology arms race.
“Right now the bad guys are improving more quickly than the good guys,” said Patrick Lincoln, director of the computer science laboratory at SRI International, a science and technology research group.
A well-financed computer underground has built an advantage by working in countries that have global Internet connections but authorities with little appetite for prosecuting offenders who are bringing in significant amounts of foreign currency. That was driven home in late October when RSA FraudAction Research Lab, a security consulting group based in Bedford, Mass., discovered a cache of half a million credit card numbers and bank account log-ins that had been stolen by a network of so-called zombie computers remotely controlled by an online gang.
In October, researchers at the Georgia Tech Information Security Center reported that the percentage of online computers worldwide infected by botnets — networks of programs connected via the Internet that send spam or disrupt Internet-based services — is likely to increase to 15 percent by the end of this year, from 10 percent in 2007. That suggests a staggering number of infected computers, as many as 10 million, being used to distribute spam and malware over the Internet each day, according to research compiled by PandaLabs.
Security researchers concede that their efforts are largely an exercise in a game of whack-a-mole because botnets that distribute malware like worms, the programs that can move from computer to computer, are still relatively invisible to commercial antivirus software. A research report last month by Stuart Staniford, chief scientist of FireEye, a Silicon Valley computer security firm, indicated that in tests of 36 commercial antivirus products, fewer than half of the newest malicious software programs were identified.
There have been some recent successes, but they are short-lived. On Nov. 11, the volume of spam, which transports the malware, dropped by half around the globe after an Internet service provider disconnected the Mycolo Corporation, an American firm with Russian ties, from the Internet. But the respite is not expected to last long as cybercriminals regain control of their spam-generating computers.
“Modern worms are stealthier and they are professionally written,” said Bruce Schneier, chief security technology officer for British Telecom. “The criminals have gone upmarket, and they’re organized and international because there is real money to be made.”
The gangs keep improving their malware, and now programs can be written to hunt for a specific type of information stored on a personal computer. For example, some malware uses the operating system to look for recent documents created by a user, on the assumption they will be more valuable. Some routinely watch for and then steal log-in and password information, specifically consumer financial information.
The sophistication of the programs has in the last two years begun to give them almost lifelike capabilities. For example, malware programs now infect computers and then routinely use their own antivirus capabilities to not only disable antivirus software but also remove competing malware programs. Recently, Microsoft antimalware researchers disassembled an infecting program and were stunned to discover that it was programmed to turn on the Windows Update feature after it took over the user’s computer. The infection was ensuring that it was protected from other criminal attackers.
And there is more of it. Microsoft has monitored a 43 percent jump in malware removed from Windows computers just in the last half year.
The biggest problem may be that people cannot tell if their computers are infected because the malware often masks its presence from antivirus software. For now, Apple’s Macintosh computers are more or less exempt from the attacks, but researchers expect Apple machines to become a larger target as their market share grows.
The severity of the situation was driven home not long ago for Ed Amaroso, AT&T’s chief security official. “I was at home with my mother’s computer recently and I showed her it was attacking China,” he said. “ ‘Can you just make it run a little faster?’ she asked, and I told her ‘Ma, we have to reimage your hard disk.’ ”
Beyond the billions of dollars lost in theft of money and data is another, deeper impact. Many Internet executives fear that basic trust in what has become the foundation of 21st century commerce is rapidly eroding. “There’s an increasing trend to depend on the Internet for a wide range of applications, many of them having to deal with financial institutions,” said Vinton G. Cerf, one of the original designers of the Internet, who is now Google’s “chief Internet evangelist.”
“The more we depend on these types of systems, the more vulnerable we become,” he said.
The United States government has begun to recognize the extent of the problem. In January, President Bush signed National Security Presidential Directive 54, establishing a national cybersecurity initiative. The plan, which may cost more than $30 billion over seven years, is directed at securing the federal government’s own computers as well as the systems that run the nation’s critical infrastructure, like oil and gas networks and electric power and water systems.
That will do little, however, to help protect businesses and consumers who use the hundreds of millions of Internet-connected personal computers and cellphones, the criminals’ newest target.
Despite new technologies that are holding some attackers at bay, several computer security experts said they were worried that the economic downturn will make computer security the first casualty of corporate spending cuts. Security gets hit because it is hard to measure its effectiveness, said Eugene Spafford, a computer scientist at Purdue University.
He is pessimistic. “In many respects, we are probably worse off than we were 20 years ago,” he said, “because all of the money has been devoted to patching the current problem rather than investing in the redesign of our infrastructure.”
The cyber-criminals appear to be at least as technically advanced as the most sophisticated software companies. And they are faster and more flexible. As software companies have tightened the security of the basic operating systems like Windows and Macintosh, attackers have moved on to Web browsers and Internet-connected programs like Adobe Flash and Apple QuickTime.
This has led to an era of so-called “drive-by infections,” where users are induced to click on Web links that are contained in e-mail messages. Cyber-criminals have raised the ability to fool unsuspecting computer users into clicking on intriguing messages to a high art.
Researchers note that the global cycle of distributing security patches inevitably plays to the advantage of the attacker, who can continually hunt for and exploit new backdoors and weaknesses in systems. This year, computer security firms have begun shifting from traditional anti-virus program designs, which are regularly updated on subscribers’ personal computers, to Web-based services, which can be updated even faster.
Security researchers at SRI International are now collecting over 10,000 unique samples of malware daily from around the global. “To me it feels like job security,” said Phillip Porras, an SRI program director and the computer security expert who led the design of the company’s Bothunter program, available free at www.bothunter.net.
“This is always an arm race, as long as it gets into your machine faster than the update to detect it, the bad guys win,” said Mr. Schneier.
Thanksgiving Day is a harvest festival. Traditionally, it is a time to give thanks for the harvest and express gratitude in general. It is primarily a North American holiday which has generally become a national secular holiday with religious origins.
The date and location of the first Thanksgiving celebration is a topic of modest contention. Though the earliest attested Thanksgiving celebration was on September 8, 1565 in what is now Saint Augustine, Florida, the traditional "first Thanksgiving" is venerated as having occurred at the site of Plymouth Plantation, in 1621.
Today, Thanksgiving is celebrated on the second Monday of October in Canada and on the fourth Thursday of November in the United States. Thanksgiving dinner is held on this day, usually as a gathering of family members.
Q: How did Thanksgiving become a national holiday?-------------------------------------------------------------------------------------------------
A: It is on a Thursday in November in a year a long time ago
This question has alot of history behind it - allow me to tersely recapitulate such: On 11/23/39, FDR carved the the turkey at the annual Thanksgiving dinner in Georgia. However, up until this date, most Americans had celebrated Thanksgiving on 11/30.
During FDR's administration, Thanksgiving was not a fixed Holiday - it was up to the present President to declare what date Thanksgiving would be held that year in November.
When Lincoln had been President, he observed Thanksgiving on the last Thursday in November and declared it a national holiday in 1863.
However, during the Great depression, FDR found it difficult to observe Thanksgiving on the last Thursday of November.During the great depression, FDR was approached to make Thanksgiving held on the 4th Thursday of November to allow more time for people to shop for X-mas. In 1939, FDR moved the Holiday one week up.
In Betrayal, Shaw has retired from the spy game and is mourning the death of his martial arts master, a cross-dresser named Mother whose fighting system is never mentioned but resembles a type of silat.There is some talk that Snipes knows some 52 IIRC. So maybe he incorporated that into the movie? Or the director or screenwriter just googled and found the Details article by Doug Century which mentioned Mother Dear and the kissing of fists? I don't know. What I do know is that I will check on this via Daniel Marks and his site http://www.fwape.com.
...Shaw uses the exact same moves against an assassin that his instructor used 30 years earlier against a challenger - punch for punch and block for block. Shaw even kisses his fingertips before touching his downed opponent on the head, just like Mother did.
SWOT Analysis is a strategic planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture. It involves specifying the objective of the business venture or project and identifying the internal and external factors that are favourable and unfavourable to achieving that objective. The technique is credited to Albert Humphrey, who led a research project at Stanford University in the 1960s and 1970s using data from Fortune 500 companies.
Strategic Use: Orienting SWOTs to An Objective
If a SWOT analysis does not start with defining a desired end state or objective, it runs the risk of being useless. A SWOT analysis may be incorporated into the strategic planning model. An example of a strategic planning technique that incorporates an objective-driven SWOT analysis is SCAN analysis. Strategic Planning, including SWOT and SCAN analysis, has been the subject of much research.
- Strengths: attributes of the organization that are helpful to achieving the objective.
- Weaknesses: attributes of the organization that are harmful to achieving the objective.
- Opportunities: external conditions that are helpful to achieving the objective.
- Threats: external conditions which could do damage to the business's performance.
Identification of SWOTs is essential because subsequent steps in the process of planning for achievement of the selected objective may be derived from the SWOTs.
First, the decision makers have to determine whether the objective is attainable, given the SWOTs. If the objective is NOT attainable a different objective must be selected and the process repeated.
Creative Use of SWOTs: Generating Strategies
If, on the other hand, the objective seems attainable, the SWOTs are used as inputs to the creative generation of possible strategies, by asking and answering each of the following four questions, many times:
- How can we Use each Strength?
- How can we Improve each Weakness?
- How can we Exploit each Opportunity?
- How can we Mitigate each Threat?
Ideally a cross-functional team or a task force that represents a broad range of perspectives should carry out the SWOT analysis. For example, a SWOT team may include an accountant, a salesperson, an executive manager, an engineer, and an ombudsman.
See if the SWOT Analysis can help your martial arts.
November 5, 2006 -- A Con Edison employee was killed on the job yesterday when he was hit by a car in The Bronx, officials said.
A 62-year-old woman driving a Ford Focus traveling southbound on Boston Road in Crotona swerved to avoid a bicyclist at about 4:30 p.m., according to police.
As she made the evasive maneuver, she crashed into Con Ed worker Mun Yuen, smashing him against a restaurant, police said.
Yuen, 40, had been working on an underground feeder cable at East 169th Street, according to Con Ed spokeswoman Elizabeth Clark.
Yuen, of Rutgers Street in lower Manhattan, was taken to Lincoln Hospital, where he was pronounced dead, cops said.
"I heard a big boom, and when we looked, we saw the Con Ed guy, trapped," said Sarah Ferguson, 22, assistant manager at Back Home Restaurant on Boston Road.
"The guy was in front of the car laying down with blood gushing out of his mouth. He had his hand up for a while, and then slowly brought it down. I guess that's when he was slowly dying," she said.
The driver of the Ford remained at the scene and was not charged with any crime or infraction, police said.
Additional reporting by Perry Chiaramonte and Hasani Gittens
I met Mun in our college's student center... we became friends... he was sharp and had quick wits about him... we shared mutual interests in table tennis, chess and cards. We would play table tennis and he had a wicked serve which often I couldn't return.
After college, I sometimes ran into him on the streets. We would chat and catch up. At the time, he couldn't land a decent job. He was working as a bicycle messenger. Some years later, IIRC, his sister had a baby and was giving a baby shower at a local restaurant near where I lived. By coincidence, my family was having dinner there too that evening. We caught up and exchanged phone numbers and IM's. Since then, we IM'd on and off. He was usually hanging out at his friend's office who was a lawyer. He told me about the job at Con Ed. I know he was nervous about taking the Con Ed exam and he was elated when he found out he passed and was hired. I think he found a sense of direction in life after being hired by Con Ed.
I recall my last IM with him, we were going to set up dimsum with a mutual friend and his wife. Life plays cruel tricks on you. You get caught up in the rat race and postpone getting together with friends... always busy and stressed with work or the kids... never had time to hook up with him.
There were days I wondered why I didn't see him on IM. I could've picked up the phone and called him.... busy with work... stressed at the end of the day and head home to my wife and kids. How long would a phone call take?
I was having dimsum with my wife and kids one Saturday in the city. We were meeting her aunt and uncle for dimsum in a restaurant we usually don't go to. I ran into EC and his family... been years since I saw him. Another college buddy and he also knew Mun. We exchanged phone numbers, emails and IM's. Fast forward to about 1 year later, EC IM's me and asks if it's ok to call me. I said yes. He calls with the sad news of Mun's passing. He emails me the link to the New York Post article. I recall that day, I was visibly shaken up. I told the trader I work with what happened. Tears welled up in my eyes. My heart felt like a knife was plunged into it. I had an error that day, I was typing up an order to buy 500 shares at the market of some illiquid stock. I don't know if it was the tears or just the heavy heart... i typed up to buy 5000 shares at the market and it end up costing us. The trader I work with told me to just go home and take the rest of the day off.
I miss Mun. My sincerest condolences to his family. He would've been 43 today.
Part of this entry is in memory of Mun... part of this entry is to say: sometimes just pick up the phone, hit up the IM or email a friend who you've lost contact with. Catch up just for a few minutes. In this day and age of electronic communication, there really is no reason not to catch up. I try to live life with no regrets, however, I regret never making time to have dimsum with Mun.About a month ago, a buddy from junior high school, contacted me to invite me to his wedding party. He used to live across the street from me. We hung out during college. Due to work, he moved to New Jersey and I lost contact with him. Been about 10 years. My wife and I go to the party and I meet up with 2 other college buddies who I've not seen for the same amount of time. They all lived in NJ and have kids. We had our digital cameras and showed pictures of the kids. One of the topics of conversation was about Mun. They weren't sure if I had heard.
Veterans Day is an annual American holiday honoring military veterans. Both a federal holiday and a state holiday in all states, it is usually observed on November 11. However, if it occurs on a Sunday then the following Monday is designated for holiday leave, and if it occurs Saturday then either Saturday or Friday may be so designated. It is also celebrated as Armistice Day or Remembrance Day in other parts of the world, falling on November 11, the anniversary of the signing of the Armistice that ended World War I. (Major hostilities of World War I were formally ended at the 11th hour of the 11th day of the 11th month of 1918 with the German signing of the Armistice.) The holiday is commonly printed as Veteran's Day or Veterans' Day in calendars and advertisements. While these spellings are grammatically acceptable, the United States government has declared that the attributive (no apostrophe) rather than the possessive case is the official spelling.
U.S. President Woodrow Wilson first proclaimed an Armistice Day for November 12, 1919. The United States Congress passed a concurrent resolution seven years later on June 4, 1926, requesting the President issue another proclamation to observe November 11 with appropriate ceremonies. An Act (52 Stat. 351; 5 U. S. Code, Sec. 87a) approved May 13, 1938, made the 11th of November in each year a legal holiday; "a day to be dedicated to the cause of world peace and to be thereafter celebrated and known as 'Armistice Day'."
In 1953, an Emporia, Kansas, shoe store owner named Al King had the idea to expand Armistice Day to celebrate all veterans, not just those who served in World War I. King had been actively involved with the American War Dads during World War II. He began a campaign to turn Armistice Day into "All" Veterans Day. The Emporia Chamber of Commerce took up the cause after determining that 90% of Emporia merchants as well as the Board of Education supported closing their doors on November 11, 1953, to honor veterans. With the help of then-U.S. Rep. Ed Rees, also from Emporia, a bill for the holiday was pushed through Congress. President Dwight Eisenhower signed it into law on May 26, 1954.Congress amended this act on November 8, 1954, replacing "Armistice" with Veterans, and it has been known as Veterans Day since.
16 years ago today , the FMA world lost a revered eskimador, Punong Guro Edgar Sulite. In his all-too-short time of 40 years, he w...