Welcome!

News Feed Item

Bite-Sized Valentine's Day Treats Get to the Heart of the Holiday

MISSION, KS -- (Marketwired) -- 01/07/14 -- (Family Features) Nothing says "I love you" on Valentine's Day more than heart-shaped, homemade treats. This year, try individual treats to make each gift recipient feel extra special. You'll love the fact that they are simple to create.

"Though small in size, mini-treats deliver a big message to all of the Valentines on your list," said Nancy Siler, vice president of consumer affairs at Wilton. "Decorating these treats is quick and easy thanks to Candy Melts Candy -- a pantry staple for any decorating project."

With a little help from Wilton you can bake to your heart's desire this Valentine's Day.

We Heart Valentine's Day - Hearts are by far the top shape of the season. From giant heart-shaped cookie pans to cookie cutters to Heart Pop pans, Wilton has a variety of bakeware options.

A Sweet Heart for Your Sweetheart - Create mini cakes, brownies or cookies with the Bite Sized Heart Dessert Shell pan. Once cooled, drizzle with red, pink and white colored Candy Melts candy for the perfect personalized heart-shaped treat.

Homemade Box of Chocolates - Make your own candies using shaped Candy Molds. Choose between hearts, lips, flowers and more. Fill the mold with the Candy Melts candy, color and flavor of your choice, and watch as you melt the hearts of your Valentines.

Give a Little Love - Valentine's Day is a top gift-giving holiday. Give your made-from-the-heart homemade treats the gourmet treatment with festive packaging like heart-shaped boxes, colorful gift bags and brightly colored baking cups.

For more Valentine's Day recipes, baking tips and gift inspiration, visit www.wilton.com.


Chocolate Heart Petit Fours
Makes about 40 mini cakes

1          cup all-purpose flour
1/2        cup cocoa powder
3/4        teaspoon baking powder
1/2        teaspoon baking soda
1/2        teaspoon salt
6          tablespoons (3/4 stick) butter, softened
2/3        cup firmly-packed brown sugar
1          egg
1/2        teaspoon pure vanilla extract
2/3        cup buttermilk
1/2        cup peanut butter, chocolate fudge ice cream topping or cherry
           pie filling
2          containers (14 ounces each) Chocolate or Vanilla Icing Glaze
           (optional)
           Jumbo hearts sprinkles (optional)

Preheat oven to 350 degrees F. Prepare 24 cavity bite-sized heart dessert shell pan with Cake Release pan coating.

In large bowl, combine flour, cocoa, baking powder, baking soda and salt.

In large bowl, beat butter and sugar with electric mixer until light and fluffy. Add egg and vanilla extract; beat until well combined. Alternately add flour mixture and buttermilk in three additions, beating until just combined. Spoon one tablespoon batter into each pan cavity.

Bake 9-11 minutes or until tops of cakes spring back when touched. Cool in pan 10 minutes. Cool completely on cooling grid.

To decorate, place cakes on cooling grid with cookie pan below. Pipe 1/2 teaspoon peanut butter, chocolate fudge or cherry pie filling into shell; fill only to top of cavity. If desired, warm glaze according to package instructions; carefully pour over shell and tap pan to smooth. If desired, add jumbo hearts sprinkles.

About Family Features Editorial Syndicate
This and other food and lifestyle content can be found at www.editors.familyfeatures.com. Family Features is a leading provider of free food and lifestyle content for use in print and online publications. Register with no obligation to access a variety of formatted and unformatted features, accompanying photos, and automatically updating Web content solutions.

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2490786

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
SYS-CON Events announced today the Docker Meets Kubernetes – Intro into the Kubernetes World, being held June 9, 2016, in conjunction with 18th Cloud Expo | @ThingsExpo, at the Javits Center in New York, NY. Register for 'Docker Meets Kubernetes Workshop' Here! This workshop led by Sebastian Scheele, co-founder of Loodse, introduces participants to Kubernetes (container orchestration). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, participants learn ...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.