Skip to main content

Home/ NBISE Institute/ Group items tagged computer

Rss Feed Group items tagged

dhtobey Tobey

Emulab.Net - Emulab - Network Emulation Testbed Home - 0 views

  • Emulab is a network testbed, giving researchers a wide range of environments in which to develop, debug, and evaluate their systems. The name Emulab refers both to a facility and to a software system. The primary Emulab installation is run by the Flux Group, part of the School of Computing at the University of Utah. There are also installations of the Emulab software at more than two dozen sites around the world, ranging from testbeds with a handful of nodes up to testbeds with hundreds of nodes.
  •  
    "Emulab is a network testbed, giving researchers a wide range of environments in which to develop, debug, and evaluate their systems. The name Emulab refers both to a facility and to a software system. The primary Emulab installation is run by the Flux Group, part of the School of Computing at the University of Utah. There are also installations of the Emulab software at more than two dozen sites around the world, ranging from testbeds with a handful of nodes up to testbeds with hundreds of nodes."
  •  
    Possible testbed for developing performance-based exams and simulated learning platforms. Emulab underlies DHS' DETER testbed for research and development.
dhtobey Tobey

Whatcom Community College's computer program honored for its cyber security - Top Stori... - 0 views

  • BELLINGHAM - Whatcom Community College's computer program is now considered one of the best in the country, especially in the areas of cyber security.The college was recently named as a National Center of Academic Excellence in Information Assurance by the National Security Agency and the Department of Homeland Security.
  • "It is a major threat to our security," said Corrinne Sande, Computer Information Systems program coordinator at WCC,
  • WCC is one of only 13 two-year schools in the country with the designation, which was opened to community and technical colleges last year. The University of Washington is also a Center of Academic Excellence in this area, but for a university instead of a two-year school.
  •  
    Candidate for Northwest ADAPTS program
dhtobey Tobey

Cyber Hiring to Surge by 2015 - Wired Workplace - 0 views

  • The federal cybersecurity workforce could grow to more than 61,000 employees by 2015, in part due to new demands, such as mobile computing, cloud services and social media, according to a new report. The federal government-specific results of the 2011 Global Information Security Workforce Study, conducted by (ISC)2 and Frost & Sullivan, indicate that federal information security professionals are being stretched too thin by their work to secure the increasing amount of critical information flowing through government networks. The new demands placed on cyber professionals as a result of the government's push for mobile devices, cloud computing and social media could result in a federal cyber workforce that is 61,299 strong by 2015, the report noted. The survey of 145 C-level federal executives also found that the most serious challenges facing federal IT departments are application vulnerabilities (73 percent), mobile devices (66 percent), viruses and worm attacks (64 percent), cyber terrorism (58 percent) and internal employees (58 percent).
  • Hord Tipton, executive director of (ISC)2, said
  • "We need new people, and we need younger people," he said. "The government needs defined career paths to help find the skills it needs, get them classified, evaluate what those jobs are worth and put good standards in place." The study also found that certification is far more important to the federal government than it is to other sectors. For example, 63 percent of CIOs and CISOs said security certifications were "very important," compared to 45 percent of worldwide survey respondents.
dhtobey Tobey

Security Training, CEH, Ethical Hacking, Penetration Testing, Certified Ethical Hacker,... - 0 views

  •  
    Potential partner in developing and distributing assessments targeting the entry level of operational security testing.
Michael Assante

Enhancing the Cyber Workforce - 1 views

  •  
    Our IEEE paper on workforce development
dhtobey Tobey

Time to Move to Competency-Based Continuing Professional Development « Educat... - 0 views

    • dhtobey Tobey
       
      A similar approach to GTED for teacher continuing education. Perhaps there is something to learn from this approach to competency modeling.
  • In 2008 UNESCO, in partnership with Microsoft, Intel, Cisco, and ISTE, formalized the UNESCO ICT Competency Framework for Teachers (ICT-CFT) with an aim to measure the ICT proficiency of teachers against a common international standard and to aid in their professional development
  • Often, the word competency and skill are used interchangeably. While they are related, they are not the same. A competency is a demonstrated ability to perform a particular job or task. A competency includes skills, but also behaviors and the ability to apply those skills in order to perform a job or task
  • ...1 more annotation...
  • In closing, effective competency-based professional development includes the following components: Adoption of a common set of competency standards defined by role. A computer science teacher may require different competencies contained in the ICT-CFT than a 3rd grade literacy teacher. Teachers identify areas where they need competency improvement. A rich and varied set of aligned resources is provided to teachers to fill those competency gaps which could include job shadowing, classes, workshops, or eLearning. Improved teacher competencies are verified through assessments, observation, or portfolio work. Peer support or mentoring is offered to help teachers carry forward ICT use to the classroom. Teacher competency development is refined and iterated in a continuous-improvement cycle.
dhtobey Tobey

Designing GTD Contexts - 0 views

  • David’s list is certainly a good one. Almost everyone can organize their tasks by contexts such as @Computer, @Errands, @Home, @Office, @Calls, and so on. But, the problem is that sometimes some of these context listings contain so many items that our eyes and our brains do not process the lists well.
  • I made use of this principle long ago in designing my GTD contexts. I noticed that my @Home listing was large (15 to 20 items typically), and I noted that I would only do some of them when setting on my couch. So, I created an @Couch context. About half of my @Home items wound up there. I also created an !Focus context. I wanted a way to blend the Covey style of addressing the “big rocks” with the GTD contexts. Basically, I knew there were some items that were “big rocks” for me, ones I wanted to ensure I accomplished during the week, irrespective of what context they might fall into. So, the !Focus context evolved from that.
  •  
    Good advice for setting up contexts in a task management system. Based on this I created the following contexts: !Focus, @Desk, @Errands, @Home, @Hotel, @iPad, @Mobile, @Phone. Note how the iPad is becoming a "location" for me already.. wow, Apple could quickly take over the highest cap position among public companies!
1 - 7 of 7
Showing 20 items per page