• chevron_right

      Nonprofit hospitals skimp on charity while CEOs reap millions, report finds

      news.movim.eu / ArsTechnica · Thursday, 19 October, 2023 - 23:12

    The Robert Wood Johnson University Hospital in New Brunswick, New Jersey.

    Enlarge / The Robert Wood Johnson University Hospital in New Brunswick, New Jersey. (credit: Getty | Bobby Bank )

    Nonprofit hospitals are under increasing scrutiny for skimping on charity care, relentlessly pursuing payments from low-income patients, and paying executives massive multi-million-dollar salaries—all while earning tax breaks totaling billions.

    One such hospital system is RWJBarnabas Health, a large nonprofit chain in New Jersey, whose CEO made a whopping $17 million in 2021, while the hospital system only spent 1.65 percent of its nearly $6 billion in revenue on charity care.

    Sen. Bernie Sanders (I-Vt.), chairman of the Senate Health, Education, Labor, and Pensions (HELP) Committee, is gearing up for a showdown next week with the CEO of RWJBarnabas Health, Mark Manigan. Nurses at one of the chain's locations, Robert Wood Johnson University Hospital, are on strike, saying that the facility has become a dangerous place to work due to inadequate staffing levels.

    Read 9 remaining paragraphs | Comments

    • Te chevron_right

      Some tips for using TooFast.vip:443

      𝖈𝖍𝖚𝖓𝖐 · pubsub.toofast.vip / tech · Wednesday, 7 December, 2022 - 16:05 · 3 minutes

    TooFast.vip hosts a style modified instance of Movim

    There are some quirks for a newcomer to any current Movim instance, particularly this one, that might make it difficult to explore and I wanted to make a list of some things that you can do to get a ball rolling in it. One might find the lack of content in the drop in page after logging in a bit discouraging however this is what you can do:

    • Go to explore menu item > communities servers > look around in there and anything you like or would like to see show up for you in your news area and hit subscribe
    • Don't be afraid to subscribe to stuff as it's easy to unsubscribe and from my experiences so far it's not going to ping your other XMPP clients when updated.

    Some notes on your settings:

    • If you're afraid of NSFW content, like at all, do not enable that option as things will probably occur, at least on this instance ^^
    • If you don't want to redirect to the news page upon logging in then change the setting where it says to go to chat page after login. This might feel better for many people that aren't so interested in the pubsub portion of this app.
    • Dark mode styles on TooFast.vip are not currently complete yet, but still look really cool.
    • If you change your instance nickname your name title on Movim anywhere will be changed. That option is on the second tab.
    • Adhoc settings for your JID should work in the Actions tab
    • Blocking users is not finished yet on TooFast.vip as the git version grabbed for this instance originally was before that completed. I am unsure of the upstream status on that feature.
    • You can add a few things to your JID from this instance that will carry with your JID as a vcard information and some of or all will persist on your other clients. Including a little bio, avatar and a webpage, etc.
    • Don't be shy and make yourself public! Most of the movim instances don't at this time seem to promote this available feature type but I do!

    Some friendly but pressing suggestions for the pubsub use:

    • If you're around on XMPP much and you wish to publish some content you are most welcome to ask me and see if I'd be willing to create a community for you. It's suprisingly easy to do, as I'm suprisingly easy going.
    • If you have the ability to post a post please makes sure that you make it public, there is a toggle at top of post, this is extremely important to my testing of a feature I wish for on this application and if you wish to have any comments you will need to toggle it public.
    • #hashtags are encouraged to use at the bottom of your posts.
    • If you're coming from a self hosted server without a pubsub service I'd be willing to aid in your possibly configuring one to help enjoy this Movim style stuff. I've got a bit of hosting xmpp experience to help make it happen.
    • Please report all things that are disatisfactory or broken. I can give you a 🍪 aha, made of pixels :3 But honestly I, and others, would respect the effort for the greater good of us sharing this software :)

    Please note that TooFast.vip does not have a STUN/TURN server available and that may complicate audio/video for some users. It is not a desired feature at this time.

    Lastly a fun cool thing that anybody can inherit from using this website is you can have your own XMPP federated microblog! It will have a public URI if you make your profile public and add posts. You can click your avatar top left to see that. Here's an example: https://toofast.vip/?blog/cmdr_coconut%40toofast.vip

    Any concerns please message myself or another server admin 🛰️

    #tips #tutorial #help #movim #toofast #gettingstarted #whatdo #whereami #whatisthisplace

    • Sp chevron_right

      Ask Al: Help! I'm getting bounces for mail I didn't send

      pubsub.slavino.sk / spam_resource · Monday, 27 September, 2021 - 12:00 · 4 minutes

    help2.gif
    Help! I'm getting mail from MAILER-DAEMON@(various domains) with subject lines like: Delivery Status Notification (Failure), failure notice, Mail delivery failed: returning message to sender, Message Delivery Failure - Mail Delivery System, **Message you sent was blocked by our bulk email filter**, Recapito fallito, Returned mail: see transcript for details, Undelivered Mail Returned to Sender. These all seem to be bounces back from mail I didn't send. What is happening and how do I make it stop?

    In this case, my friend (the person experiencing this pain) owns their own domain name. What's happening here is that spammers are forging email addresses at their domain, using them as from addresses for their unwanted, garbage spam runs, so that bounces back from the spam come to them, because the spammer doesn't care about or want to process bounces.

    The good news is, as I mentioned all the way back in 2013 , is that spammers don't tend to fixate on one domain name or email address forever, so they'll probably move on to annoying somebody else shortly. But there are a few things you can do, as a domain owner, to help minimize the chances of having to receive these unwanted bounces:

    • Implement a Sender Policy Framework (SPF) DNS record for your domain name, specifying the IP addresses that are meant to send mail for your domain. Set it to " dash all " -- you want ISPs to know that they should be free to filter mail more harshly if it fails SPF validation checks.
    • Implement DKIM for your email sends. Even at the SMB level, most mail platforms provide instructions on how to configure things so that your email sends will all be authenticated via a DKIM signature. If you can't easily do this, SPF is quite likely "good enough" -- but if you can implement DKIM, you should. In some cases it's going to provide more robust email authentication compared to SPF. (I could spend another six pages diving into why I think that's the case, but in the interest of helping you move on with your life, I'll spare you.)
    • Implement DMARC . DMARC can be a bit scary in that you have to make sure all of the email you send legitimately is authenticated with SPF or DKIM. But, especially at the SMB level, you can do this. It's not hard, and don't let yourself be scared -- there are tools (like the colorful Mail Tester ) that will help you test your email authentication settings to make sure you've got it right. But the key here is that enabling DMARC, with a restrictive policy like p=reject, tells ISPs to block mail that purports to be from you, but doesn't pass SPF or DKIM. You don't HAVE to work with a DMARC monitoring partner to enable DMARC -- you can publish a TXT record for _dmarc.(your domain) that contains nothing more than "v=DMARC1; p=reject;" (without quotes) and that'd do it.

    DMARC is the key there. Turning that on means your domain name is no longer going to be useful to deliver spam to ISPs (like Gmail) that will block mail that fail DMARC. It makes your domain name much less palatable as an unauthorized spam sending domain.

    Bonus tip: If you own your own domain name and use it for email with something like Google Workspace, there's another setting you should look for and configure: The wildcard or catch-all email setting . It can be handy (and quite useful) to configure your email service to accept mail to any address at your domain -- for example, it can be used to create custom email addresses for different registration forms -- give irs@yourdomain to your accountant and bestbuy@yourdomain to the electronics retailer, so you can track usage and/or turn off an address later, if you want. Unfortunately, if you leave "catch-all" forwarding on, that means if a spammer makes up the address ihateyourguts@yourdomain and sends a bunch of spam, those bounces are going to come back to the "ihateyourguts" address and end up in your inbox. If you turn off the catch-all, that puts a stop to that. I know, it's a bummer to turn off the easy custom address ability, but it's something to consider -- weigh the plusses and minuses of being able to receive mail at any address at your domain, versus the unintended side effects of receiving unwanted "backscatter" bounces.

    I helped my friend implement all of these -- including disabling "catch-all" email forwarding (while helping them build a manual list of email aliases to continue forwarding to their main inbox) -- and we think it helped. It's not like we did a scientific study, but the bounces dropped off and disappeared pretty quickly. I think the spammers moved on to greener pastures.

    If you're new to all of this and wondering what SPF, DKIM and DMARC DNS records look like, here are the ones for spamresource.com: SPF , DKIM , DMARC . The SPF record contains the IP addresses of a couple of servers I own as well as an include showing that I utilize Google Workspace. The DKIM record (called a DKIM public key) is a DNS string provided by Google Workspace's DKIM configuration tool, and the DMARC record is just a very simple "tell ISPs to reject it if it doesn't pass authentication."


    Značky: #forgery, #help, #spam, #Network, #backscatter, #bounces, #spf, #dkim, #dmarc