Joe Merlo
Granite Energy, Inc. (OTC: GNGI) (the Company), today announced the
completion of drilling operations on the TigerShark #2-12 well, located on
the CardShark prospect in Seminole County, Oklahoma. The Company also
announced that 4,300 feet of production casing was run and cemented down the
hole, and final completion is slated for later this month. Initial drill
stem testing indicates IP (initial production) figures could range from 100
to 136 Barrels per day of oil production.
"We experienced deviation during drilling operations that set the total
depth location approximately 177 feet Northeast of the target. During
mud-logging, we identified a fault line that was not indicated on our
pre-drill seismic shoot, this fault appears to have proven additional
drilling locations within the prospect," stated Granite Energy's Senior
Field Engineer, David Hanks.
Granite Energy ("Granite") (NASDAQ OTC symbol: GNGI) is a leading
independent energy company headquartered in Salt Lake City, UT and focused
on oil and gas development, exploration and production. With oil
professionals in offices throughout North America, Granite executes on a
proprietary business model that enhances the lifecycle for oil producing
properties. Granite Energy has growing oil and gas holdings in Texas, New
Mexico and Oklahoma. The combination of Granite's methodologies, geological
and technical expertise enables Granite to deliver the tangible economic
benefits in the acquisition and development of oil and gas fields with both
current production as well as exploration and development of new prospects.
"Safe Harbor" Statement under the Private Securities Litigation Reform Act
of 1995.
Statements in this press release relating to plans, strategies, economic
performance and trends, projections of results of specific activities or
investments, and other statements that are not descriptions of historical
facts may be forward-looking statements within the meaning of the Private
Securities Litigation Reform Act of 1995, Section 27A of the Securities Act
of 1933 and Section 21E of the Securities Exchange Act of 1934.
Forward-looking information is inherently subject to risks and
uncertainties, and actual results could differ materially from those
currently anticipated due to a number of factors, which include, but are not
limited to, risk factors inherent in doing business. Forward-looking
statements may be identified by terms such as "may," "will," "should,"
"could," "expects," "plans," "intends," "anticipates," "believes,"
"estimates," "predicts," "forecasts," "potential," or "continue," or similar
terms or the negative of these terms. Although we believe that the
expectations reflected in the forward-looking statements are reasonable, we
cannot guarantee future results, levels of activity, performance or
achievements. The company has no obligation to update these forward-looking
statements.
http://www.energyautomation.com/
John Schrerer
I. BACKGROUND
Spyware is typically not a virus, so many anti-virus programs are not
equipped to block, detect, or eliminate it. Spyware is not typically a
cookie that you can simply delete through your browser tools.
Often installed on your computer without your consent, spyware will:
A. Monitor your computer activity and then report it to third parties.
B. Actually and physically control your computer use.
C. Send you pop-up ads.
D. Redirect your computers automatically to undesirable websites.
E. Record your keystrokes and report them to third parties as a prelude to
identity theft.
II. SPYWARE SIGNS
All business computer users should understand the signs of spyware, and then
take the appropriate steps to delete it. The clues that spyware resides on
your business computers include:
A. A barrage of pop-up ads.
B. A hijacked browser.
C. A sudden or repeated change in your computer's Internet home page.
D. New and unexpected toolbars.
E. New and unexpected icons at the bottom of your computer screen.
F. Keys that no longer seem to work.
G. Random error messages.
H. Sluggish or slow performance when opening programs or saving files.
III. IMMEDIATE ACTION STEPS
If a business suspects its computers might contain spyware, it should
immediately take three steps:
A. Get anti-spyware software, such as Spybot Search & Destroy or Ad-Aware.
B. Use the software to perform an immediate scan.
C. Delete any software programs the anti-spyware program suggests.
D. Set it to automatically scan on a regular weekly basis.
IV. THE GOOD NEWS
The good news is that a business can prevent spyware installation. You
should consider taking the following steps:
A. Update your operating system and Web browser software. Your operating
system vendor may offer free software "patches" to close holes in the system
that spyware exploits.
B. Download free software only from sites you know and trust. It can be
appealing to download free software like games, peer-to-peer file-sharing
programs, customized toolbars, or other programs that may change or
customize the functioning of your computer. Be aware, however, that some of
these free software applications bundle other software, including spyware.
C. Don't install any software without knowing exactly what it is. Take the
time to read the end-user license agreement (EULA) before downloading any
software. If the EULA is hard to find — or difficult to understand — think
twice about installing the software.
D. Minimize "drive-by" downloads. Make sure your browser security setting is
high enough to detect unauthorized downloads, for example, at least the
"Medium" setting for Internet Explorer. Keep your browser updated.
E. Don't click on any links within pop-up windows. If you do, you may
install spyware on your computer. Instead, close pop-up windows by clicking
on the "X" icon in the title bar.
F. Don't click on links in spam that claim to offer anti-spyware software.
Some software offered in spam actually installs spyware.
G. Install a personal firewall to stop uninvited users from accessing your
computer.
H. A firewall blocks unauthorized access to your computer and will alert you
if spyware already on your computer is sending information out.
http://www.videoprofessor.com
I am writing to ask all of you to think carefully when you vote.
The board election is very important and many good people are running.
But it is better for Wikipedia's future to keep a bad person off than
to have the best people on.
There are three seats open. When you make your three choices if you
think only to choose the best you risk making an opening for someone
bad, so '''you must also consider who can win'''.
Look at the endorsements:
http://meta.wikimedia.org/wiki/Board_elections/2007/Endorsements
It is clear that only some have the standing to keep
a bad person off the board. So even if you know in your heart that
someone else is better, you should not pick them because if you do
your vote is WASTED.
If you have already voted and made the error of picking the wrong people you
can still change your vote but you must do it right away before the
election closes.