Skip to main content

2013 Oscars Glizt n Glamour

Welcome to MrJones's Blog

News,Technology, i-inspire, Entertainment, Events, Lifestyle, Sport,Fashion.
 

85th Academy Awards

"Argo" took top honors at the 85th Academy Awards, winning the Oscar for Best Picture. The award, presented by First Lady Michelle Obama from the White House via satellite, capped off an eventful awards season for director/star Ben Affleck, who many believe had been snubbed without a directing nod. The Iran hostage crisis thriller also won awards for Editing and Best Adapted Screenplay.


 
Recovering from a bit of a stumble up steps to the podium, Jennifer Lawrence breathlessly accepted the Oscar for Best Actress for her performance in the David O. Russell comedy "Silver Linings Playbook."
         
 
 
 
 
                                                          Best Actor   Daniel Day-Lewis | Lincoln
Daniel Day-Lewismade Oscar history, winning his career third Best Actor trophy for his title role as the 16th president in Steven Spielberg's historical drama "Lincoln."
 
 
 
                          Ben Afleck  Best Picture - Argo
 
 
 
 Best Supporting - Actor - Christoph Waltz
Christoph Waltz claimed the first trophy of the evening with a win for Best Supporting Actor for his role as bounty hunter Dr. King Schultz in "Django Unchained," while writer/director Quentin Tarantino won Best Screenplay for his slavery-era revenge thriller.
 
 
 
 
 
Anne Hathaway dreamed a dream of Oscar gold and it came true, winning Best Supporting Actress for her turn as Fantine in the film adaptation of the hit musical "Les Misérables."



LIST OF WINNERS AT THE OSCARS 2013





                Best Picture: "Argo"
Best Actor: Daniel Day-Lewis, "Lincoln"
Best Actress: Jennifer Lawrence, "Silver Linings Playbook"
Best Supporting Actor: Christoph Waltz, "Django Unchained"
Best Supporting Actress: Anne Hathaway, "Les Misérables"
Best Director: Ang Lee, "Life of Pi"
Animated Feature Film: "Brave"
Cinematography: "Life of Pi"
Costume Design: "Anna Karenina"
Documentary Feature: "Searching for Sugar Man"
Documentary Short: "Inocente"
Film Editing: "Argo"
Foreign Language Film: "Amour" (Austria)
Makeup: "Les Misérables"
Original Score: "Life of Pi"
Original Song: "Skyfall" from "Skyfall"
Production Design: "Lincoln"
Short Film (Animated): "Paperman"
Short Film (Live Action): "Curfew"
Sound Editing: "Skyfall" & "Zero Dark Thirty" (tie)
Sound Mixing: "Les Misérables"
Visual Effects: "Life of Pi"
Best Adapted Screenplay: "Argo"
Best Original Screenplay: "Django Unchained
"


  MORE PICTURES
 
                                                                                                                              
  Halley Berry
   
 
                                                                                                                                                                                                                                       
    Charlize Theron
 
 
    Jennifer Aniston


                                                                                                                                                                                                                   
    Best Director: Ang Lee, "Life of Pi
 
 
   Jamie Fox and Daughter.
 

 

     T→F→A = R

WEALTH PRINCIPLE:


Thoughts lead to feelings. Feelings lead to actions. Actions lead to results.
                                               
 
Your financial blueprint consists of a combination of your
thoughts, feelings, and actions in the arena of money.
So how is your money blueprint formed? The answer is
simple. Your financial blueprint consists primarily of the information
or “programming” you received in the past, and
especially as a young child.
Who were the primary sources of this programming or
conditioning? For most people, the list includes parents

siblings, friends, authority figures, teachers, religious leaders,
media, and your culture, to name a few.
Let’s take culture. Isn’t it true that certain cultures have one
way of thinking and dealing with money, while other cultures
have a different approach? Do you think a child comes out of
the womb with his or her attitudes toward money, or do you
believe the child is taught how to deal with money? That’s right

Every child is taught how to think about and act in relation to
money. The same holds true for you, for me, for everyone. You
were taught how to think and act when it comes to money.
These teachings become your conditioning, which becomes
automatic responses that run you for the rest of your life.
Unless, of course, you intercede and revise your mind’s money
files. This is exactly what we are going to do in this book, and
what we do for thousands of people each year, on a deeper
and more permanent level at the Millionaire Mind Intensive
Seminar.
We said earlier that thoughts lead to feelings, that feelings
lead to actions, that actions lead to results. So here’s an interesting
question: Where do your thoughts come from? Why do
you think differently from the next person?
Your thoughts originate from the “files of information” you
have in the storage cabinets of your mind. So where does this
information come from? It comes from your past
programming. That’s right, your past conditioning determines
every thought that bubbles up in your mind. That’s why it’s
often referred to as the conditioned mind.
 

Comments

Popular posts from this blog

Top 20 Most Asked Third Party Risk Questions for Vendors  These questions help organizations assess the overall risk posed by third-party vendors, covering critical areas like data protection, regulatory compliance, and incident response. Here’s a list of the Top 20 Most Asked Third-Party Risk Management (TPRM) Questions for Vendors in TPRM questionnaires: 1. What types of sensitive data do you handle for our organization? Vendors should clarify the types of data they collect, process, or store, such as personal information, financial data, or intellectual property. 2. How do you protect data at rest and in transit? This question probes into the encryption methods, protocols, and security controls in place for safeguarding data during storage and transmission. 3. Do you have a formal Information Security Program in place? Vendors should describe their overall cybersecurity framework, including policies, procedures, and governance. 4. How do you manage user access to our data and s...

10 Important Cybersecurity Practices for your Business

  10 Important Cybersecurity Practices for your Business 1. EDUCATION  It’s much easier to prevent a hack than it is to recover from a hack. Once your company’s sensitive data is stolen through a ransomware attack, recovering it is often a long and arduous process. Teaching employees about basic security, personal cybersecurity, and the prevalence of cyber threats goes a long way in stopping ransomware attacks before they can really do damage. Your employees should understand that they might be targets of malicious actors, eager to exploit any entry they can find in your company. The average cost of a cyberattack is 3.86 million and the cumulative total for global cybercrime is expected to cost $6 trillion. If you don’t pay to train your employees about cybersecurity best practices eventually you may end up paying more in the long run. High quality and free trainings for your employees are available from several government resources including Department of Homeland S...

Microsoft Warns of Data Stealing Malware That Pretends to Be Ransomware

  Thursday - Microsoft warned of a "massive email campaign" that's pushing a Java-based STRRAT malware to steal confidential data from infected systems while disguising itself as a ransomware infection. "This RAT is infamous for its ransomware-like behavior of appending the file name extension .crimson to files without actually encrypting them," the Microsoft Security Intelligence team  said  in a series of tweets. The new wave of attacks, which the company spotted last week, commences with spam emails sent from compromised email accounts with "Outgoing Payments" in the subject line, luring the recipients into opening malicious PDF documents that claim to be remittances, but in reality, connect to a rogue domain to download the STRRAT malware. Besides establishing connections to a command-and-control server during execution, the malware comes with a range of features that allow it to collect browser passwords, log keystrokes, and run remote commands an...