Skip to main content

2013 Oscars Glizt n Glamour

Welcome to MrJones's Blog

News,Technology, i-inspire, Entertainment, Events, Lifestyle, Sport,Fashion.
 

85th Academy Awards

"Argo" took top honors at the 85th Academy Awards, winning the Oscar for Best Picture. The award, presented by First Lady Michelle Obama from the White House via satellite, capped off an eventful awards season for director/star Ben Affleck, who many believe had been snubbed without a directing nod. The Iran hostage crisis thriller also won awards for Editing and Best Adapted Screenplay.


 
Recovering from a bit of a stumble up steps to the podium, Jennifer Lawrence breathlessly accepted the Oscar for Best Actress for her performance in the David O. Russell comedy "Silver Linings Playbook."
         
 
 
 
 
                                                          Best Actor   Daniel Day-Lewis | Lincoln
Daniel Day-Lewismade Oscar history, winning his career third Best Actor trophy for his title role as the 16th president in Steven Spielberg's historical drama "Lincoln."
 
 
 
                          Ben Afleck  Best Picture - Argo
 
 
 
 Best Supporting - Actor - Christoph Waltz
Christoph Waltz claimed the first trophy of the evening with a win for Best Supporting Actor for his role as bounty hunter Dr. King Schultz in "Django Unchained," while writer/director Quentin Tarantino won Best Screenplay for his slavery-era revenge thriller.
 
 
 
 
 
Anne Hathaway dreamed a dream of Oscar gold and it came true, winning Best Supporting Actress for her turn as Fantine in the film adaptation of the hit musical "Les Misérables."



LIST OF WINNERS AT THE OSCARS 2013





                Best Picture: "Argo"
Best Actor: Daniel Day-Lewis, "Lincoln"
Best Actress: Jennifer Lawrence, "Silver Linings Playbook"
Best Supporting Actor: Christoph Waltz, "Django Unchained"
Best Supporting Actress: Anne Hathaway, "Les Misérables"
Best Director: Ang Lee, "Life of Pi"
Animated Feature Film: "Brave"
Cinematography: "Life of Pi"
Costume Design: "Anna Karenina"
Documentary Feature: "Searching for Sugar Man"
Documentary Short: "Inocente"
Film Editing: "Argo"
Foreign Language Film: "Amour" (Austria)
Makeup: "Les Misérables"
Original Score: "Life of Pi"
Original Song: "Skyfall" from "Skyfall"
Production Design: "Lincoln"
Short Film (Animated): "Paperman"
Short Film (Live Action): "Curfew"
Sound Editing: "Skyfall" & "Zero Dark Thirty" (tie)
Sound Mixing: "Les Misérables"
Visual Effects: "Life of Pi"
Best Adapted Screenplay: "Argo"
Best Original Screenplay: "Django Unchained
"


  MORE PICTURES
 
                                                                                                                              
  Halley Berry
   
 
                                                                                                                                                                                                                                       
    Charlize Theron
 
 
    Jennifer Aniston


                                                                                                                                                                                                                   
    Best Director: Ang Lee, "Life of Pi
 
 
   Jamie Fox and Daughter.
 

 

     T→F→A = R

WEALTH PRINCIPLE:


Thoughts lead to feelings. Feelings lead to actions. Actions lead to results.
                                               
 
Your financial blueprint consists of a combination of your
thoughts, feelings, and actions in the arena of money.
So how is your money blueprint formed? The answer is
simple. Your financial blueprint consists primarily of the information
or “programming” you received in the past, and
especially as a young child.
Who were the primary sources of this programming or
conditioning? For most people, the list includes parents

siblings, friends, authority figures, teachers, religious leaders,
media, and your culture, to name a few.
Let’s take culture. Isn’t it true that certain cultures have one
way of thinking and dealing with money, while other cultures
have a different approach? Do you think a child comes out of
the womb with his or her attitudes toward money, or do you
believe the child is taught how to deal with money? That’s right

Every child is taught how to think about and act in relation to
money. The same holds true for you, for me, for everyone. You
were taught how to think and act when it comes to money.
These teachings become your conditioning, which becomes
automatic responses that run you for the rest of your life.
Unless, of course, you intercede and revise your mind’s money
files. This is exactly what we are going to do in this book, and
what we do for thousands of people each year, on a deeper
and more permanent level at the Millionaire Mind Intensive
Seminar.
We said earlier that thoughts lead to feelings, that feelings
lead to actions, that actions lead to results. So here’s an interesting
question: Where do your thoughts come from? Why do
you think differently from the next person?
Your thoughts originate from the “files of information” you
have in the storage cabinets of your mind. So where does this
information come from? It comes from your past
programming. That’s right, your past conditioning determines
every thought that bubbles up in your mind. That’s why it’s
often referred to as the conditioned mind.
 

Comments

Popular posts from this blog

10 Important Cybersecurity Practices for your Business

  10 Important Cybersecurity Practices for your Business 1. EDUCATION  It’s much easier to prevent a hack than it is to recover from a hack. Once your company’s sensitive data is stolen through a ransomware attack, recovering it is often a long and arduous process. Teaching employees about basic security, personal cybersecurity, and the prevalence of cyber threats goes a long way in stopping ransomware attacks before they can really do damage. Your employees should understand that they might be targets of malicious actors, eager to exploit any entry they can find in your company. The average cost of a cyberattack is 3.86 million and the cumulative total for global cybercrime is expected to cost $6 trillion. If you don’t pay to train your employees about cybersecurity best practices eventually you may end up paying more in the long run. High quality and free trainings for your employees are available from several government resources including Department of Homeland S...
Top 20 Most Asked Third Party Risk Questions for Vendors  These questions help organizations assess the overall risk posed by third-party vendors, covering critical areas like data protection, regulatory compliance, and incident response. Here’s a list of the Top 20 Most Asked Third-Party Risk Management (TPRM) Questions for Vendors in TPRM questionnaires: 1. What types of sensitive data do you handle for our organization? Vendors should clarify the types of data they collect, process, or store, such as personal information, financial data, or intellectual property. 2. How do you protect data at rest and in transit? This question probes into the encryption methods, protocols, and security controls in place for safeguarding data during storage and transmission. 3. Do you have a formal Information Security Program in place? Vendors should describe their overall cybersecurity framework, including policies, procedures, and governance. 4. How do you manage user access to our data and s...

Nearly 500,000 workers are needed in cybersecurity roles around the country

The push to work from home during the coronavirus pandemic is straining cybersecurity professionals around the country tasked with ensuring workers are able to not only work efficiently from remote locations — but to do so safely. This rapid shift is a tall order for an industry that was already in need of skilled professionals long before the pandemic took hold.  Cybersecurity workers were taken off some or all of their typical security duties to assist with other IT-related tasks, including equipping mobile workforces, according to an April survey from global nonprofit (ISC)2, the largest association of certified cybersecurity professionals. The survey of 256 cyber pros found nearly half were re-tasked and that a quarter said cybersecurity incidents increased since the transition to remote work, with some seeing as many as double the number of incidents. Separate data from another nonprofit cybersecurity group, the Information Systems Security Association, found a 63% increase in...