How to Stop Saying Um, Uh, and Other Filler Words - 1 views
-
After listening to one of my posts to voicethread, that I thought was pretty solid, I did what my old English teacher did and counted the "um"'s one my fingers. It was bad. I didn't even know I was doing it. But I was doing 2 'um's about every sentence...it's so distracting from your point. I will work on this.
-
Its funny you posted this. My fiance was listening to me comment and he pointed out that almost everyone says um uh and other filler words i thought he was wrong but then i started to notice i was saying it alot and couldnt help but try and stop.
Down the Security Rabbithole - 0 views
http://resources.idgenterprise.com/original/AST-0084883_2013_Threat_Report.pdf - 1 views
Enterprise Network Guide - 1 views
-
White paper describing impacts and benefits to new technologies and the requirments and pressures for organizations to implement them (Cyber nightmare?)
- ...1 more comment...
-
Hmmm I agree with you both, this seems like a horrible idea. I cannot imagine the amount of people who do not properly update, patch and run security scans on their personal devices, I for one would not want to be connected to that in anyway, especially on a business function. I also have to think heavily about the government and contractors dealing with highly sensitive material and I cannot see these trends happening with them. Not just BYOD but also getting rid of the wired LAN's. Good/interesting post.
-
Testing
2013 Emerging Cyber Threats Report - 2 views
-
Georgia Tech's security summit report
- ...1 more comment...
-
Great article. Thing like this are very interesting to me. The section on Cloud Computing was by far my favorite. This type of technology is emerging and at the same time it has turned into a challenge for attackers to try to break. Security is going to be very vital for this service to work and more likely will be the subject of any topic related to cloud technology. Cloud service providers need to make a stronger statement and provide some type of assurance to the customer. Thanks!
-
I had actually read this article before, but it was good to read it again. While they are many elements that are concerning I find the "filter bubbles" troubling. A user has the right to know that their search results have been filtered. You think you're conducting an open search, only to read this and find out your results may be limited.
Centralized Management | Sourcefire - 0 views
-
Testing.....
- ...1 more comment...
-
Bob, still not sure what was up (prob my issue), I can def. see/comment on it now. The sourcefire technologies you posted stuck out to me mainly in one way...they boast that they are a little bit more secure, which is always good, but at under half the price (of the industry average for IDS). They have many good ideas and tools in place to try and get to the top it seems!
-
I used this product in 2010. Very cool and as I recall rather expensive.
Cognitive biometrics: A very personal login - 2 views
-
Retina and iris scans, fingerprint and palm logins rely on possession of unique anatomical characteristics that you cannot forget as you might a password. But, Kenneth Revett of the British University in Egypt, in El-Sherouk City, reviews the state of the art in an alternative approach to user authentication in the inaugural issue of the International Journal of Cognitive Biometrics.
-
Very interesting article Justin. I like the idea of using biometrics as an authentication layer, vs. relying on a CA to issue digital certificates. In my opinion, biometrics should only use functions that can be read or measured when the person is alive.
-
Biometrics is great for a multi factored authentication. It is a very expensive approach to authenticating as well. I doubt there will be a market for it until the price for implementation drops drastically. I would not use it as a stand alone authentication approach.
Big Data, Trying to Build Better Workers - 2 views
Hacker says phone app could hijack plane - 0 views
Local police grapple with abilities to respond to cybercrimes and cyberthreats - 2 views
UMUC Achiever Spring 2013 - 2 views
DHS seeks student hackers - 0 views
Anonymous vs. WBC - 0 views
« First
‹ Previous
41 - 60
Next ›
Last »
Showing 20▼ items per page