Play SPENT
We're going to challenge the way you think about poverty and homelessness.
Work hard. Do the right thing. Homelessness is something that will never happen to me. Sometimes, all it takes is one life-changing experience to land you on the streets: a job loss, death of a loved one, divorce, natural disaster, or serious illness.
Next thing you know, a chain of events sends your life spiraling out of control…
How would you cope? Where would you go? What would you do? Figure something out, right?
Approximately 40 percent of small and midsize businesses have suffered a breach because of malware picked up by employees while visiting the Web, social networking sites.
Minister of State in the Ministry of Defense made a statement that state-owned electronic equipment manufacturer for the armed forces has been advised not to source critical encryption components from China.
Companies offering services to Indian villages turn to mobile phones and Internet kiosks, among others, to establish connection between country's rural villages and cities
Outstanding show, explains a lot about worms vs viruses as well as botnets. It's an interview with the author so it also illustrates how to ask good questions. (useful for the project)
The gigantic networked system created by the Conficker worm is what's known as a "botnet." The Conficker botnet is powerful enough to take over computer networks that control banking, telephones, security systems, air traffic control and even the Internet itself, says Bowden. His new book, Worm: The First Digital World War, details how Conficker was discovered, how it works, and the ongoing programming battle to bring down the Conficker worm, which he says could have widespread consequences if used nefariously.
Voting electronically could prevent future problems at election polling stations, some experts claim.
The US is planning to introduce e-voting and India has already had it in place for some time.
However the British Electorial Commission has expressed concerns about the security of such systems
The riots in the UK are spreading to other major cities. Technology is being blamed, but exploring contributions made by tech-savvy citizens reveals a polarized perspective.
The Stream looks at the debate over freedom vs. safety on the net. Should governments be allowed to cut off social networks or cell service in the interest of public order? Includes video and text.
RSS, podcasts, screencasts and more. How can you stay on top of them all? The November Learning team has designed a series of handouts that can make any user comfortable with the latest technology tools. Each of our instructional handouts can be read, printed and passed out as needed. Use these in your next professional development session.
RSS, podcasts, screencasts and more. How can you stay on top of them all? The November Learning team has designed a series of handouts that can make any user comfortable with the latest technology tools. Each of our instructional handouts can be read, printed and passed out as needed. Use these in your next professional development session
CyberKnife, a non-invasive procedure that uses a robot and targeted radiation to eliminate cancerous tumors. SmartPlanet looks at the new technology and how it's working on cancer patients like Stuetzle.
By uploading images of this week's violence in Manama, the capital, to Web sites like YouTube and yFrog, and then sharing them on Facebook and Twitter, the protesters upstaged government accounts and drew worldwide attention to their demands.
A novelty less than a decade ago, the cellphone camera has become a vital tool to document the government response to the unrest that has spread through the Middle East and North Africa.
concerns have developed about invasions of privacy, for the most complete records on the travelers may be the ones they are carrying: their laptop computers full of professional and personal e-mail messages, photographs, diaries, legal documents, tax returns, browsing histories and other windows into their lives far beyond anything that could be, or would be, stuffed into a suitcase for a trip abroad. Those revealing digital portraits can be immensely useful to inspectors, who now hunt for criminal activity and security threats by searching and copying people's hard drives, cellphones and other electronic devices, which are sometimes held for weeks of analysis