Skip to main content

Home/ Groups/ Dogs-to-Stars Enterprises
Steve King

Institute for Water Quality, Resources and Waste Management, TU Vienna - 0 views

  • STAN (short for subSTance flow ANalysis) is a freeware that helps to perform material flow analysis according to the Austrian standard ÖNorm S 2096 (Material flow analysis - Application in waste management).
Steve King

Sankey Helper 2.4.1 by G.Doka - 0 views

  • Sankey Helper v2.4 helps you design Sankey diagrams from Excel data ... in Excel !
Steve King

The Known, the Unknown, and the Unknowable in Financial Risk ... - 0 views

  •  
    I'm not sure I fully understand the KuU distinction.. but there seems to be thread of this stuff in high end risk theory.. leading back to this paper and beyond Gomory, R. (1995), "The Known, the Unknown and the Unknowable," Scientific American, June.
Steve King

Emerald FullText Article : From serendipity to sustainable competitive advantage: insig... - 0 views

  • The conceptual framework and value chain analysis methodology developed for this study are being refined in light of the lessons learned by the research team, and applied to further studies in other sectors, not all of which are as buoyant as bagged salad! Co-innovation is a concept in which we firmly believe and in which Houston's Farm is now firmly engaged. However, there remains much to learn about how to do it and how to research it. The value chain innovation research initiative at the University of Tasmania will, we hope, provide more valuable insights for academics and practitioners in the future.
Steve King

What is a Sankey-Diagram? - 0 views

  • Intro What is a Sankey-Diagram? References Demo version Full version   Know-How Games Software Recommendations Pinchleni Software   What is a Sankey-Diagram? A Sankey diagram is a graphic illustration of flows, like energy, material or money flows. Usually the flows are illustrated as arrows. The width of the arrows is proportional to the size of the represented flow. Sankey diagrams are a better way to illustrate which flows represent advantages and what flows are responsible for waste and emission
Steve King

e!sankey - show the flow / Good reasons to use e!Sankey - 0 views

  • Sankey diagrams are a specific type of flow chart, in which the width of the arrows is shown proportionally to the flow quantity. They are typically used to visualize energy or material transfers between processes. The flow arrows can be color-coded to indicate the type of the flow (energy, mass, costs, etc).
  •  
    Sankey diagrams are a specific type of flow chart, in which the width of the arrows is shown proportionally to the flow quantity. They are typically used to visualize energy or material transfers between processes. The flow arrows can be color-coded to indicate the type of the flow (energy, mass, costs, etc).
dhtobey Tobey

VGM U - 0 views

dhtobey Tobey

Six Sigma Training Six Sigma Certification - 0 views

  • 6 Sigma.us offers online, onsite and open enrollment six sigma training and six sigma certification in Green Belt, Black Belt, Master Black Belt, Champion and Lean Agent Certification.
Steve King

Verizon Business Security Blog » Blog Archive » Verizon Incident Metrics Fram... - 0 views

  • Today we’re making a version of that framework, the Verizon Incident Sharing Framework (VerIS), available for you to use. In the document that  you can download here, you’ll find the first release of the VerIS framework.  You can also find a shorter executive summary here.  Our goal for our customers, friends, and anyone responsible for incident response, is to be able to create data sets that can be used and compared because of their commonality.  Together, we can work to eliminate both equivocality and uncertainty, and help defend the organizations we serve.
dhtobey Tobey

MedHomeInfo - Your Resource for Becoming a Medicare Medical Home - 0 views

  • Welcome to MedHomeInfo, the resource for physicians and practices that want to participate in the Medicare Medical Home Demonstration (MMHD)
  •  
    Community Desktop prospect for Patient-Centered Medical Home
  •  
    We should add this .org as a prospect for a VivoWorks communiity desktop.
Steve King

Virtual Strategy Magazine - PC Hypervisors Virtually Change Everything - 0 views

  • With VDI, virtual desktop images are stored in a data center and provided to a client via the network. The virtual machines will include the entire desktop stack, from operating system to applications to user preferences, and management is provided centrally through the backend virtual desktop infrastructure.   The promise is that VDI will replace the need for myriad systems management and security tools that are currently deployed. No more demands for traditional desktop management tools for OS deployment, patch management, anti-virus, personal firewalls, encryption, software distribution and so on. In fact, many are suggesting that we can return to thin client computing models
  •  
    Not sure exactly how this applies to VW internal IT infrastructure and client facing apps.. but I'm sure it does! especially if we could have client VWsuite VMs running in our data center so that we abstract all the different GME/OnP/LP/KE/CRM platforms into a single VM client interface that anyone can log into with no complexity
Steve King

AchillesINSIDE™ - 0 views

  • By leveraging the proprietary data in Delphi™, the world’s largest database of industrial system vulnerabilities, Wurldtech has created a solution specifically designed to help reduce the cost and complexity of mitigation activities for process control networks by integrating specific vulnerability intelligence into common security enforcement devices such as firewalls and intrusion detections systems. This allows common IT infrastructure to be tailored for industrial network environments and continuously updated with specific rule-sets and signatures, protecting control systems immediately, substantially reducing the frequency of patching activities and reducing overall costs. This update and support service is called AchillesINSIDE™.
Steve King

Critical Infrastructure Cyber Security Blog, Wurldtech - 0 views

shared by Steve King on 04 Jul 10 - Cached
  • As of today, the Common Vulnerabilities and Exposures (CVE) database, hosted by Mitre Corporation (http://cve.mitre.org/) for the Department of Homeland Security (DHS), contains 34,542 entries. That may not seem like a large number, but any one of those entries can translate to multiple instances in the field. While the contents of this database are very important in the IT world to help security practitioners ply their trade, build rule sets, etc., there is a glaring lack of information on industrial control systems (ICS). A search of the CVE database using “SCADA” or “DCS” or “PLC” as a search ...
dhtobey Tobey

Varying Your Practice Moves May Help Improve Skills - 0 views

  • Varying the types of skills you work on in practice sessions engages a different part of the brain than the one you use when focusing on a single task, researchers say. The finding explains why variable practice improves the brain's memory of most skills better than working on just one type of task, according to the research team from the University of Southern California and the University of California, Los Angeles.In their study, published online recently in Nature Neuroscience, the investigators divided 59 volunteers into different groups. Some were asked to practice a challenging arm movement, while others did the arm movement and related tasks in a variable practice structure.The participants in the variable practice group learned the arm movement better than those who practiced only the arm movement, the study authors found.Among those in the variable practice group, the process of consolidating memory of the skill engaged a part of the brain called the prefrontal cortex, which is associated with higher level planning. Among those who practiced only the arm movement, the engaged part of the brain was the primary motor cortex, which is associated with simple motor learning, the authors explained."In the variable practice structure condition, you're basically solving the motor problem anew each time. If I'm just repeating the same thing over and over again as in the constant practice condition, I don't have to process it very deeply," study senior author Carolee Winstein, a professor of biokinesiology and physical therapy at the University of Southern California, said in a university news release.
  •  
    Study with many implications for skill-based training, such as the National Security Academy.
dhtobey Tobey

GIAC Proctor Program - Program Details - 0 views

  • All GIAC exams corresponding to new certification attempts and new recertification attempts are required to be proctored. The cost of new GIAC challenge certification attempt is $899, certification attempts taken in conjunction with the associated SANS training course are $499, and recertification attempts are $399.
  •  
    Information Assurance Certification testing centers
  •  
    Could be a great partner to work with to deliver the NBISE certification as well as in the development of the NBISE certfication test.
dhtobey Tobey

Cybersecurity panel: Federal CISOs must focus on worker training - FierceGovernmentIT - 0 views

  • Only 12 percent of federal CISOs worry about poorly trained users. According to an April 2010 study by the Ponemon Institute, 40 percent of all data breaches in the United States are the result of negligence, however a comparable statistic for the federal space is unavailable.
  • The Computer Security Act of 1987 requires federal agencies to "provide for the mandatory periodic training in computer security awareness and accepted computer security practices of all persons who are involved with the management, use, or operation of each Federal computer system within or under the supervision of that agency." At the NIST event, Hord Tipton, executive director of (ISC)², estimated that most federal employees only get an hour of training per year, under FISMA requirements.
  •  
    This points to a significant opportunity for deployment of the Critical Intelligence cybersecurity course, but also other eLearning systems that fulfill the requirements of the Computer Security Act.
dhtobey Tobey

Two heads perform better than one sometimes - Health & Families, Life & Style - The Ind... - 0 views

  • A new study published on August 26 in the journal Science explains the old adage that two heads are better than one is not always true. Professors Chris Frith of the Wellcome Trust Centre for Neuroimaging at the University College London (UCL) and Niels Bohr at the University of Aarhus in Denmark and colleagues discovered that two heads work best when they are equals and can speak freely with one another.Bahador Bahrami, MD, researcher at UCL's Institute of Cognitive Neuroscience and lead author of the study, explained, "When we are trying to solve problems, we usually put our heads together in teams, calling on each other's opinions. "For our study, we wanted to see if two people could combine information from each other in a difficult judgement task and how much this would improve their performance."Frith noted, "When two people working together can discuss their disagreements, two heads can be better than one. But, when one person is working with flawed information - or perhaps is less able at their job - then this can have a very negative effect on the outcome.
  •  
    This is just the sort of evidence we need to show that PPA (Potential Performance Analyst) is a necessary tool to develop effective collaboration.
dhtobey Tobey

Leadership Bios Jack Hagan - Deputy Director, Training and Exercises - Governor's Offic... - 0 views

  • State of California's primary advisor to the Director, Office of Homeland Security on Homeland Security Exercise and Training matters. Directs a multi-disciplinary/multi-agency staff of military and civilian subject matter experts in developing, coordinating, and producing exercises and training for California's fifty-eight counties, five Urban Area Security Initiative cities, and six hundred fifty thousand emergency responders to respond to terrorist attacks involving weapons of mass destruction (WMD) and catastrophic natural disasters. Produces the annual State wide exercise series Golden Guardian.
  •  
    This is the retired General that Rich Marshall said he wanted to introduce to me. Looks like a great contact for the workforce development pitch.
dhtobey Tobey

Section7:Factors for Cell Based Assay Development - Assay Guidance Wiki - 0 views

  • When considering the factors for development of a cell culture assay there are two major parts that need to be considered: the cell growth conditions and the cell treatment conditions. Many times variables may differ for the two parts of the assay so they need to be kept as separate parts of the assay when considering the factors. In the table below is a list of the factors that one would consider when running an experimental design to develop an assay. The range of the factor is based on literature reference, existing protocols, American Type Culture Collection (ATCC) recommendations, etc. The rationale for why these factors are detailed below.
  •  
    Factors which may be analyzed using PPT for quality control purposes
dhtobey Tobey

An Instructional Design Approach to Updating an Online Course Curriculum (EDUCAUSE Quar... - 0 views

  • To remain fresh and relevant, online courses need to be continually revised and improved. Considerations of relevant laws and institutional policies should be a core focus of every curriculum redesign. Redesigning an online curriculum presents rich opportunities to integrate the latest thinking in given disciplines and to incorporate new methodologies for teaching and learning. New, emerging, and evolving technologies can greatly enhance work to update the curriculum of an online course.
  •  
    Good advice for continual updates to online course design and content. This will be helpful during the rollout phase of the CI project, should it get completed and adopted by the industry.
‹ Previous 21 - 40 Next › Last »
Showing 20 items per page