Friday, December 30, 2016

Friday, December 23, 2016

How do synthesizers work? - Explain that Stuff

How do synthesizers work? - Explain that Stuff: "When two instruments play exactly the same musical note, at roughly the same volume, they can sound completely different. "



'via Blog this'

What Every Logic Pro User Ought To Know About Synthesizers

What Every Logic Pro User Ought To Know About Synthesizers: "Instead, rip some funky vintage synth riffs! This guide will show you which synth is right for the riff."



'via Blog this'

ElCapitan: App Nap

ElCapitan: Experiences: "You can also turn off App Nap in El Capitan in Terminal:



defaults write NSGlobalDomain NSAppSleepDisabled -bool YES"



'via Blog this'

Wednesday, December 14, 2016

Monday, December 5, 2016

Global Law Enforcers Finally Take Down Avalanche Cybercrime Ring: Here's How They Did It : TECH : Tech Times

Global Law Enforcers Finally Take Down Avalanche Cybercrime Ring: Here's How They Did It : TECH : Tech Times: "Companies and consumers should take this opportunity to scan their systems for the different families of malware that the Avalanche botnet distributed," said Stephen Cobb, senior security researcher for ESET, a security company in Slovakia."



'via Blog this'

Sunday, December 4, 2016

The Future Of Insider Threats

Half of IT Pros Say Insider Threats Are a Bigger Concern Than Hackers - Infosecurity Magazine

Half of IT Pros Say Insider Threats Are a Bigger Concern Than Hackers - Infosecurity Magazine

http://www.infosecurity-magazine.com/news/half-of-it-pros-say-insider/

More than 5,550 defense contractors have basic insider threat programs, DoD says - FederalNewsRadio.com

More than 5,550 defense contractors have basic insider threat programs, DoD says - FederalNewsRadio.com

http://federalnewsradio.com/industryassociations/2016/12/5550-defense-contractors-basic-insider-threat-programs-dod-says/

Gov. Brown Signs Legislation Punishing Ransomware | Senator Robert M. Hertzberg

EIA - Electricity Data (outages)

Beware of these cyber hazards in 2017 | VentureBeat | Security | by Avi Chesla, empow

Beware of these cyber hazards in 2017 | VentureBeat | Security | by Avi Chesla

http://venturebeat.com/2016/12/03/beware-of-these-cyber-hazards-in-2017/

EHR adverse events data cause for alarm | Healthcare IT News

Deaths by medical mistakes hit records | Healthcare IT News

Friday, December 2, 2016

After mothballing Comma One, George Hotz releases free autonomous car software | Ars Technica

After mothballing Comma One, George Hotz releases free autonomous car software | Ars Technica: "How does anybody make money? Our goal is to basically own the network. We want to own the network of self driving cars that is out there.”"



'via Blog this'

Tuesday, November 29, 2016

Masooda Bashir | ischool.illinois.edu

Masooda Bashir | ischool.illinois.edu: "Unfortunately, the U.S. lacks the cyber security workforce needed to manage many of the threats our society faces."



'via Blog this'

Monday, November 28, 2016

Graduation Dates

Graduation Dates: The College of Social Sciences, Arts and Humanities

PropOrNot - Black Friday Report On Russian Propaganda Network Mapping.pdf - Google Drive

PropOrNot - Black Friday Report On Russian Propaganda Network Mapping.pdf - Google Drive

https://drive.google.com/file/d/0Byj_1ybuSGp_NmYtRF95VTJTeUk/view

Hatemi: Not by twins alone: Using the extended family... - Google Scholar

Hatemi: Not by twins alone: Using the extended family... - Google Scholar

https://scholar.google.com/scholar?cites=10005905925752745289&as_sdt=2005&sciodt=0,5&hl=en

Not by Twins Alone: Using the Extended Family Design to Investigate Genetic Influence on Political Beliefs

Not by Twins Alone: Using the Extended Family Design to Investigate Genetic Influence on Political Beliefs - Hatemi - 2010 - American Journal of Political Science - Wiley Online Library


http://onlinelibrary.wiley.com/doi/10.1111/j.1540-5907.2010.00461.x/full

Sunday, November 27, 2016

Continuous Monthly Calendar for Excel

Continuous Monthly Calendar for Excel: "This new continuous monthly calendar template for Microsoft Excel® will let you create and print a calendar without breaks between months, all on one worksheet. "



'via Blog this'

Advanced Calendar Creator

Advanced Calendar Creator: "This is the advanced configuration form for the calendar customizer. "



'via Blog this'

White Nationalist Richard Spencer Uses Diffusionist Fringe History in Speech Praising Trump, White America - Jason Colavito

Tweetable...

http://www.jasoncolavito.com/blog/white-nationalist-richard-spencer-uses-diffusionist-fringe-history-in-speech-praising-trump-white-america

Intel NUC Mini PC Review: Core i5 and i7 Benchmarked

Check it out...

http://www.tomsguide.com/us/intel-broadwell-nuc-mini-pc,review-2688.html

ZOTAC ZBOX MAGNUS EN1070 Gaming Mini PC, ZBOX-EN1070-U, Intel Core i5-6400T Quad-core CPU NVIDIA GeForce GTX 1070 Graphics

Video editor...

http://www.newegg.com/Product/Product.aspx?Item=9SIA24G5326076

How to use an external graphics card with a laptop

Good explanation...

http://www.pcworld.com/article/2984716/laptop-computers/how-to-transform-your-laptop-into-a-gaming-powerhouse-with-an-external-graphics-card.html

A Cyber Security Agency –A Suggestion to President-Elect Trump | A blog written by Dr. Stephen Bryen

A Cyber Security Agency –A Suggestion to President-Elect Trump | A blog written by Dr. Stephen Bryen

http://www.bryensblog.com/cyber-security-agency-suggestion-president-elect-trump/

Pauline Oliveros, Creator of ‘Deep Listening,’ Dies at 84 | Billboard

Friday, November 25, 2016

Twitter Best Practices: Why, When And How To Say "Thank You" To Your Followers

Twitter Best Practices: Why, When And How To Say "Thank You" To Your Followers: "Follow Friday was devised in 2009 by @micah (according to Mashable). It’s a way to provide good recommendations on who people ought to follow."



'via Blog this'

Monday, November 21, 2016

Saturday, November 19, 2016

About - Jason Savard

About - Jason Savard: "I'm my own boss, no more suits or CVs! Just living on contributions to my apps"

'via Blog this'

Forget The Gimmicks: Here’s the Best Way to Organize Your Gmail Inbox

Forget The Gimmicks: Here’s the Best Way to Organize Your Gmail Inbox: "To use a more classic inbox in Gmail, click the gear icon and select Settings. Click over to the Inbox tab, click the Inbox type box, and select Unread first. All the tabs and priority options will vanish."

'via Blog this'

Nodak misalliance

Sunday, November 13, 2016

Trump says cybersecurity maybe hardly doable

The answer that best exemplifies how badly Donald Trump was out of his depth in the debate - The Washington Post: "So we have to get very, very tough on cyber and cyber warfare. It is — it is a huge problem. I have a son. He's 10 years old. He has computers. He is so good with these computers, it's unbelievable. The security aspect of cyber is very, very tough. And maybe it's hardly doable."

What Trump's victory means for cybersecurity - CSMonitor.com

What Trump's victory means for cybersecurity - CSMonitor.com



"The security aspect of cyber is very, very tough. And maybe it's hardly doable."

Trump's First 100 Days: Restoring National Security Act

"Restoring National Security Act. Rebuilds our military by eliminating the defense sequester and expanding military investment; provides Veterans with the ability to receive public VA treatment or attend the private doctor of their choice; protects our vital infrastructure from cyber-attack; establishes new screening procedures for immigration to ensure those who are admitted to our country support our people and our values."

http://www.npr.org/2016/11/09/501451368/here-is-what-donald-trump-wants-to-do-in-his-first-100-days

Donald Trump is about to face a rude awakening over Obamacare - SFGate

Some good points...

http://www.sfgate.com/news/article/Donald-Trump-is-about-to-face-a-rude-awakening-10610353.php?ipid=articlerecirc

Saturday, November 12, 2016

When the dam breaks Part 3 | Local News Stories | willistonherald.com

When the dam breaks Part 3 | Local News Stories | willistonherald.com: While it would take a full day and half to reach the city, the flood would still decimate Williston.

Thursday, November 10, 2016

Critical Infrastructure Sectors | Homeland Security

Critical Infrastructure Sectors | Homeland Security: "There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof."



'via Blog this'

ASUS Chromebook C301SA | Notebooks | ASUS USA

ASUS Chromebook C301SA | Notebooks | ASUS USA: "The incredibly sleek and light Chromebook C301 is designed to go everywhere you want to go. Weighing just 2.97 lbs"



'via Blog this'

ASUS ZenPad S 8.0 (Z580CA) | Tablets | ASUS USA

ASUS ZenPad S 8.0 (Z580CA) | Tablets | ASUS USA:



Need to check firmware by SKU?



'via Blog this'

Wednesday, November 9, 2016

Donald Trump wins US Presidential election 2016: What does it mean for the tech sector?

Donald Trump wins US Presidential election 2016: What does it mean for
the tech sector? - Computer Business Review

http://www.cbronline.com/news/verticals/central-government/donald-trump-wins-us-presidential-election-2016-mean-tech-sector/

China Passes Long-Awaited Cyber Security Law

Blog it...

http://www.forbes.com/sites/roncheng/2016/11/09/china-passes-long-awaited-cyber-security-law/#5bce2cfb6868

Cyber Security for Critical Infrastructure Protection - SCADAhacker

Cyber Security for Critical Infrastructure Protection - SCADAhacker: "SCADAhacker was conceived with the idea of providing relevant, candid, mission-critical information relating to industrial security of Supervisory Control and Data Acquisition (SCADA), Distributed Control (DCS) and other Industrial Control Systems (ICS) in a variety of public and social media forums."

'via Blog this'

Donald Trump wins US Presidential election 2016: What does it mean for the tech sector? - Computer Business Review

Donald Trump wins US Presidential election 2016: What does it mean for
the tech sector? - Computer Business Review

http://www.cbronline.com/news/verticals/central-government/donald-trump-wins-us-presidential-election-2016-mean-tech-sector/

Library of Resources for Industrial Control System Cyber Security

Library of Resources for
Industrial Control System Cyber Security:

https://scadahacker.com/library/index.html

University of Utah researcher: Trump University lawsuits lay groundwork for potential impeachment of Donald Trump | UNews

University of Utah researcher: Trump University lawsuits lay
groundwork for potential impeachment of Donald Trump

http://unews.utah.edu/university-of-utah-researcher-trump-university-lawsuits-lay-groundwork-for-potential-impeachment-of-donald-trump/

Tuesday, November 8, 2016

IoT security window closing

IoT security window closing: Industry players need to address the security of internet of things (IoT) devices urgently before it is too late, according to Lorie Wigle, general manager, IoT security at Intel.

Monday, November 7, 2016

Saturday, November 5, 2016

Will hackers disrupt Tuesday's election? - The San Diego Union-Tribune

Will hackers disrupt Tuesday's election? - The San Diego Union-Tribune: "It’s equally possible that Tuesday will pass without incident. In general, though, there’s a growing sense that foreign and domestic hacking are becoming more pervasive and pernicious."



'via Blog this'

New cyber security strategy changes relationship between government and IT suppliers

New cyber security strategy changes relationship between government
and IT suppliers

http://www.computerweekly.com/opinion/New-cyber-security-strategy-changes-relationship-between-government-and-IT-suppliers

Friday, November 4, 2016

Cybersecurity Legislation | Cybercrime Laws | Cyber Security News - ISACA

Cybersecurity Legislation | Cybercrime Laws | Cyber Security News - ISACA: Before adjourning for the year, the US Congress passed the Cybersecurity Act of 2015, and President Barack Obama signed the measure into law on December 18, 2015.

Industrial Internet Security Framework | Industrial Internet Consortium

http://www.iiconsortium.org/IISF.htm

Re IoT article...

Sunday, October 30, 2016

Coming to a Government Contract Near You: Mandatory Information Safeguarding Requirements | Cybersecurity Law Watch

Coming to a Government Contract Near You: Mandatory Information Safeguarding Requirements | Cybersecurity Law Watch



"The government recently finalized a sweeping amendment to the Federal
Acquisition Regulation (“FAR”) that will impose basic information system
safeguarding requirements on many federal acquisitions, marking the
latest in the continuing government effort to regulate and enhance
cybersecurity protections in the industry. The Final Rule, effective
June 15, 2016, imposes fifteen basic safeguarding requirements for
contractors with information systems containing information provided by,
or generated for, the government under a federal contract."

Wednesday, October 26, 2016

BeagleBone Green – Seeed │DigiKey

BeagleBone Green – Seeed │DigiKey: the new BeagleBone Green Wireless has a 2.4-GHz wireless module on board which add 2x2 MIMO Wi-Fi Bluetooth functionality making it ideal for IoT designs.

We Left the Internet Vulnerable to Hackers. Now We’re Paying the Price.

We Left the Internet Vulnerable to Hackers. Now We're Paying the Price.

http://www.slate.com/articles/news_and_politics/war_stories/2016/10/the_dyn_ddos_attack_shows_how_vulnerable_we_ve_made_ourselves.html

Monday, October 24, 2016

Religious Psychosis - The Global Nightmare, Part 1 - The Faithless Feminist

Religious psychosis essay...

http://faithlessfeminist.com/blog-posts/religious-psychosis-global-nightmare-part-1/

GSA Proposes New Highly Adaptable Cybersecurity Services Special Item Number (SIN) | Interact

GSA Proposes New Highly Adaptable Cybersecurity Services Special Item Number (SIN) | Interact: In support of the President’s Cybersecurity National Action Plan, the General Services Administration (GSA) intends to establish a new Special Item Number (SIN) on the IT Schedule 70 contract vehicle to offer cybersecurity services that Federal agencies can quickly leverage to assess and protect their IT assets and infrastructure.

On freedom of the press, Donald Trump wants to make America like England again - The Washington Post

On freedom of the press, Donald Trump wants to make America like England again - The Washington Post:



Until recently, English law was so tough on the media that disgruntled subjects of news reports could use the country's court system to carry out what the New York legislature called “libel terrorism.” 



'via Blog this'

NICE (National Initiative for Cybersecurity Education) Conference 2016

NICE (National Initiative for Cybersecurity Education) Conference 2016



Getting ready to be NICE!

Using Rowhammer bitflips to root Android phones is now a thing | Ars Technica

For the blog...

http://arstechnica.com/security/2016/10/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing/

Sunday, October 23, 2016

Data Breach and Due Diligence: Why Boards Need to Get Involved with Cyber Insurance | ID Experts

Data Breach and Due Diligence: Why Boards Need to Get Involved with
Cyber Insurance

https://www2.idexpertscorp.com/blog/single/data-breach-due-diligence-why-boards-need-to-get-involved-cyber-insurance

Game changer: California investigating Wells Fargo for identity theft | 2016-10-19 | HousingWire

Game changer: California investigating Wells Fargo for identity theft...

http://www.housingwire.com/blogs/1-rewired/post/38325-game-changer-california-investigating-wells-fargo-for-identity-theft

How Much Will Today’s Internet Outage Cost? - The Atlantic

For the blog...

http://www.theatlantic.com/technology/archive/2016/10/a-lot/505025/

Is the Internet of Things a developer's dream or a million new headaches? | ZDNet

For the blog...

http://www.zdnet.com/article/is-the-internet-of-things-a-developers-dream-or-a-million-new-headaches/

How insecurity is damaging the IoT industry « Tech Talks

For the blog...

https://bdtechtalks.com/2016/10/23/how-insecurity-is-damaging-the-iot-industry/

How to Rig a Presidential Election in 1000 Easy Steps | WIRED

For the blog...

https://www.wired.com/2016/10/wireds-totally-legit-guide-rigging-presidential-election/?mbid=social_twitter

Heightened DDoS Threat Posed by Mirai and Other Botnets

Some good advice...

https://www.us-cert.gov/ncas/alerts/TA16-288A

Migrating Eudora from Windows to the MAC (w. la... | Official Apple Support Communities

Migrating Eudora from Windows to the MAC (w. la... | Official Apple Support Communities:



http://www.aid4mail.com/email-migration



"application will convert on the PC my Emails to MBOX files that can be then copied to the MAC and imported into Apple's mail. "  



'via Blog this'

Sunday, October 16, 2016

The Flames of November: What if some Trump backers turn to resistance? | Foreign Policy

Great piece of scenario work...

http://foreignpolicy.com/2016/08/08/round-ii-what-if-trump-loses-ugly/

Donald Trump loses it, calls for “revolution” - Salon.com

""We should have a revolution in this country." That was the opinion of Donald Trump after President Obama won re-election..."

http://www.salon.com/2012/11/07/donald_trump_loses_it_calls_for_revolution/

Trump calls for revolution, blasts Electoral College | TheHill

"The real estate mogul and host of reality show "The Apprentice" has been an outspoken supporter of Mitt Romney. He used Twitter to object vehemently to the Electoral College system that he predicted would give the win to Obama and the popular vote to the GOP challenger."

http://thehill.com/blogs/twitter-room/other-news/266423-trump-calls-for-revolution-blasts-electoral-college

Hackers, Organizational Doxing, and Data Forgeries - The Atlantic

Hackers, Organizational Doxing, and Data Forgeries - The Atlantic: "But what if hackers were to alter documents before releasing them? This is the next step in organizational doxing—and the effects can be much worse."

DriveDx - the most advanced drive health diagnostics and monitoring utility

https://binaryfruit.com/drivedx

Try this!

Saturday, October 15, 2016

Trump’s supporters talk rebellion, assassination at his rallies - The Boston Globe

Trump's supporters talk rebellion, assassination at his rallies - The
Boston Globe

Note voting stat of 1.5%...

https://www.bostonglobe.com/news/politics/2016/10/15/donald-trump-warnings-conspiracy-rig-election-are-stoking-anger-among-his-followers/LcCY6e0QOcfH8VdeK9UdsM/story.html

How Cannabis Can Help You Manage Your Arthritis - The Weed Blog

How Cannabis Can Help You Manage Your Arthritis - The Weed Blog

https://www.theweedblog.com/cannabis-can-help-manage-arthritis/?google_editors_picks=true

Trump calls for U.S. to use offensive cyberweapons | PCWorld

Trump calls for U.S. to use offensive cyberweapons | PCWorld

http://www.pcworld.com/article/3126578/security/trump-calls-for-us-to-use-offensive-cyberweapons.html

Actual white supremacist: Trump’s success “proves that our views resonate with millions” - Vox

Quote!

http://www.vox.com/policy-and-politics/2016/10/14/13287532/trump-white-supremacists-racists

Billing Schemes, Part 1: Shell Companies That Don’t Deliver

ER scenario 2: http://www.journalofaccountancy.com/issues/2002/jul/billingschemespart1shellcompaniesthatdontdeliver.html

Lessons from an $8 million fraud

ER scenario 2: http://www.journalofaccountancy.com/issues/2014/aug/fraud-20149862.html

CSC sues Eric Pulier for alleged fraud

ER scenario 2: http://www.businessinsider.com/csc-sues-eric-pulier-for-alleged-fraud-2015-5

Wethersfield woman admits embezzling $1.7M from computer company | WTNH Connecticut News

ER scenario 2: http://wtnh.com/2015/08/21/wethersfield-woman-admits-embezzling-1-7m-from-computer-company/

Wednesday, October 12, 2016

Watch The New Yorker Festival | Sam Esmail on Computer Hacking and Loneliness

Watch The New Yorker Festival | Sam Esmail on Computer Hacking and
Loneliness | The New Yorker Video

http://video.newyorker.com/watch/the-new-yorker-festival-sam-esmail-on-computer-hacking-and-loneliness?c=series

6 Cyber Security Strategies To Protect Your Small Business

6 Cyber Security Strategies To Protect Your Small Business: Every firm is unique. Your needs may be dramatically different from those of your closest competitor. Given that, here are a handful of cyber security strategies and tips that virtually any business should consider for better security.

Tuesday, October 11, 2016

A history of denial

A history of denial - check it out.

http://www.washingtonpost.com/sf/brand-connect/bleecker-street/denial/

EU Finalizes General Data Protection Regulation: Implications for U.S. Businesses

EU Finalizes General Data Protection Regulation: Implications for U.S. Businesses: One of the most significant changes in the GDPR is the very fact that it is a “regulation,” as opposed to a “directive.”

6 Ways To Prepare For The EU's GDPR

6 Ways To Prepare For The EU's GDPR: "The GDPR introduces tough new privacy requirements for companies handling EU data and vests consumers with significantly greater control and rights over the manner in which their data is collected, shared, retained, and destroyed. The GDPR gives EU regulators the authority to impose fines ranging from 2 percent to 4 percent of a company’s global revenues for violations of the regulation."

GDPR: Who does the EU GDPR Apply To? | Varonis Systems

GDPR: Who does the EU GDPR Apply To? | Varonis Systems: So under these new rules, if a US company collects data from EU citizens, it would be under the same legal obligations as though the company had headquarters in say France, UK, or Germany — even though they don’t have any servers or offices there!

Top 10 operational impacts of the GDPR: Part 1 – data security and breach notification

Top 10 operational impacts of the GDPR: Part 1 – data security and breach notification



Great series to read NOW...

New Survey Shows U.S. Companies Face Major Challenges Complying with EU General Data Protection Regulations (GDPR)

New Survey Shows U.S. Companies Face Major Challenges Complying with EU General Data Protection Regulations (GDPR): 39 percent of U.S. respondents do not anonymize or leverage other techniques to depersonalize customer data before using it in application testing environments.

Internet Speed Test - HTML5 Speed Test

Internet Speed Test - HTML5 Speed Test: Welcome to the SourceForge Speed Test. This speed test is uniquely designed to test your current Internet connection speed for Latency/Ping, Jitter, Download Speed, Upload Speed, Buffer Bloat, and Packet Loss.

Monday, October 10, 2016

EU General Data Protection Regulation, Binding Corporate Rules And Privacy Shield Training Requirements | Bloomberg BNA

EU General Data Protection Regulation, Binding Corporate Rules And Privacy Shield Training Requirements | Bloomberg BNA

Under Article 37, the GDPR tasks the Data Protection Officer (DPO) with “awareness raising and training of staff involved in the processing operations.”

Under Article 43, in connection with Binding Corporate Rules(BCRs), the GDPR requires “the appropriate data protection training to personnel having permanent or regular access to personal data.”

EU-US Privacy Shield becomes operational with the GDPR on the horizon - Lexology

EU-US Privacy Shield becomes operational with the GDPR on the horizon - Lexology



The Privacy Shield will operate in parallel with other existing data transfer mechanisms including Standard Contractual Clauses ("SCCs") and Binding Corporate Rules ("BCRs").

The EU-U.S. Privacy Shield Versus Other EU Data Transfer Compliance Options | Bloomberg BNA

The EU-U.S. Privacy Shield Versus Other EU Data Transfer Compliance Options | Bloomberg BNA: The EU-U.S. Privacy Shield Versus Other EU Data Transfer Compliance Options

Google Signs Up For EU/U.S. Privacy Shield | SecurityWeek.Com

Google Signs Up For EU/U.S. Privacy Shield | SecurityWeek.Com: The reality, however, is that Safe-Harbor compliance isn't a simple shoehorn into Privacy Shield compliance.

20/20 Software EU-US PRIVACY SHIELD PRIVACY POLICY

Sample of how this works: Contact - 20/20 Software: EU-US PRIVACY SHIELD PRIVACY POLICY

What is BBB EU Privacy Shield?

BBB EU Privacy Shield is a successor program to BBB EU Safe Harbor, one of two original independent dispute resolution mechanisms supporting the US-EU Safe Harbor Framework when it came into effect in 2000.

EU-U.S. ‘Privacy Shield’ Agreement: Useful Or Useless? Yahoo Surveillance Scandal Should Decide That

EU-U.S. ‘Privacy Shield’ Agreement: Useful Or Useless? Yahoo Surveillance Scandal Should Decide That: It’s the U.S. Department of Commerce, an agency in charge of helping American business interests, that needs to audit the U.S. companies for violating EU laws.

Jones Day | The EU–U.S. Privacy Shield Approved

Jones Day | The EU–U.S. Privacy Shield Approved: After months of criticism from various EU bodies and institutions, the much-anticipated EU–U.S. Privacy Shield finally has been approved by the European Commission, paving the way for self-certifying U.S. organizations to transfer legally EU personal data across the Atlantic.

Privacy Shield's Drama Is Far From Over

Privacy Shield's Drama Is Far From Over: Of US firms, 73% had previously been certified under Safe Harbor, but only 42% are currently certified or plan to seek certification under Privacy Shield. Most will rely on standard contractual clauses to set the rules.

Downloads - Ping Monitor

Downloads - Ping Monitor: "
EMCO Ping Monitor - Downloads"



'via Blog this'

What would a CYBERCOM-NSA split mean?

What would a CYBERCOM-NSA split mean?

http://www.c4isrnet.com/articles/what-would-a-cybercom-nsa-split-mean

Hack warnings prompt cyber 'security fatigue'

Hack warnings prompt cyber 'security fatigue'

https://news.google.com/news/amp?caurl=http%3A%2F%2Fwww.bbc.co.uk%2Fnews%2Famp%2F37573795#pt0-640939

Monday, October 3, 2016

Saturday, October 1, 2016

DEA’s Army of 18,000 Informants Pocketed $237 Million Over Five Years

https://theintercept.com/2016/09/30/deas-army-of-18000-informants-pocketed-237-million-over-five-years/

"33 DEA sources working at Amtrak, including train attendants and ticket agents, who collectively were paid more than $1.4 million over four years"

Wednesday, September 28, 2016

Statistician – Powerful, Easy to Use Statistics Add-In for Excel

Statistician – Powerful, Easy to Use Statistics Add-In for Excel: "Statistician is a comprehensive yet simple to use add-in for Microsoft Excel 2007 or later. The software performs high quality statistical analysis based on series of easy to use forms, activated via the Excel ribbon."



'via Blog this'

Tuesday, September 27, 2016

How Hackers Could Affect the Presidential Election | Inc.com

http://www.inc.com/will-yakowicz/hacking-the-vote.html?cid=sf01001&sr_share=twitter

Hacking old machines? En masse?

Why are these clowns winning? Secrets of the right-wing brain - Salon.com

Why are these clowns winning? Secrets of the right-wing brain - Salon.com

http://www.salon.com/2014/11/29/why_are_these_clowns_winning_secrets_of_the_right_wing_brain/

Transcript: Here are words Trump just used to talk about 'the cyber' - The Verge

Transcript: Here are words Trump just used to talk about 'the cyber' - The Verge: "He's 10 years old. He has computers. He is so good with these computers, it's unbelievable."



'via Blog this'

Why Many Doctors Don't Say 'I'm Sorry' | ConsultantLive

Why Many Doctors Don't Say 'I'm Sorry' | ConsultantLive: "The legacy of the apology and admissibility law movement has turned out to be a raft of statutes that suggest new ways of protecting the medical establishment from its own mistakes. The unintended consequences of these seemingly well-intentioned laws are doctors who can't apologize for harming their patients even if they want to, and injured patients who've been abandoned by their caregivers."

Sunday, September 25, 2016

Tracing the hidden River Sherbourne under Coventry - BBC News

Tracing the hidden River Sherbourne under Coventry - BBC News: Crouching between a high rise estate and a busy dual carriageway, the slow-flowing river looks nondescript until it comes to a large caged concrete tunnel, thrusting under the city's ring road.

Tuesday, September 20, 2016

Marshmallow for Dell Venue 8 7840? - Android Mobile Products - Mobile Devices - Dell Community

"Nop, no, niet, nada. Not going to happen. Dell ditched the device 4 weeks ago (NO more support, NO more update, nothing!) and hence have given prove once again that you must never ever buy anything this company releases. I made that mistake twice now, I´m healed."

http://en.community.dell.com/support-forums/mobile-devices/f/4585/t/19664451?pi41117=2

Stop victim shaming in cyber attacks | TheHill

Stop victim shaming in cyber attacks | TheHill: "companies that publicly disclose that they have been the victim of a cybercrime are not treated like a typical victim by federal and state regulators"

Sunday, September 18, 2016

John Zimmer: Here's how Lyft will roll out its driverless cars

Smoking?

https://news.google.com/news/ampviewer?caurl=http%3A%2F%2Fwww.recode.net%2Fplatform%2Famp%2F2016%2F9%2F18%2F12955162%2Flyft-gm-self-driving-cars#0


From My iPhone

Why can't Americans vote online? via Engadget

Not bad...

https://www.engadget.com/2016/09/17/why-cant-americans-vote-online/

A Loud Sound Just Shut Down a Bank’s Data Center for 10 Hours | UP2V

A Loud Sound Just Shut Down a Bank’s Data Center for 10 Hours | UP2V: "The Siemens White Paper indicates that various HDD fail after exposure to noise above 120dB. This noise level is reached during fire extinguishing by either Inergen or other extinguishing gas. Also the sound level of the alarms should be added to the source of noise."

Saturday, September 17, 2016

P2K Range

Try the shotgun classes?

http://www.p2krange.com/?full=true

From My iPhone

Thursday, September 8, 2016

What was Silicon Valley like after the bubble burst in the early 2000s? - Quora

What was Silicon Valley like after the bubble burst in the early 2000s? - Quora: "The company shut its doors in March 2002; as part of the legal team handling the bankruptcy, I was one of the last 50 or so employees left standing, less than two years after joining a company of 3,000."

ESET Knowledgebase

ESET Knowledgebase



For more information about free ESET Online Scanner visit
ESET
Knowledgebase
or run it
directly from Eset.com

Thursday, September 1, 2016

2016 Report | One Hundred Year Study on Artificial Intelligence (AI100)

2016 Report | One Hundred Year Study on Artificial Intelligence (AI100)

Check for hacking?

https://ai100.stanford.edu/2016-report

Wednesday, August 31, 2016

Why you need a CSO/CISO | CIO

Why you need a CSO/CISO | CIO: "Even though we found that cybersecurity professionals, at all levels, are fully aware, and experiencing first-hand that the available talent is not keeping pace with demand needs, I was surprised by the alarmingly low number of companies that employ a CSO/CISO who is responsible for security," says Trevor Halstead, product specialist, talent services, Cybrary.

Why a CSO/CISO?

Tuesday, August 30, 2016

Under Cyber Siege: Nearly Half of Americans Report Being Victims of Scam or Fraud; Majority Say

Under Cyber Siege: Nearly Half of Americans Report Being Victims of Scam or Fraud; Majority Say: The Digital Citizens Alliance is a consumer-oriented coalition focused on educating the public and policy makers on the threats that consumers face on the Internet and the importance for Internet stakeholders

Ultimate Guide to Harvard Referencing - Cite This For Me

Ultimate Guide to Harvard Referencing - Cite This For Me: Blogs are regularly updated webpages that are generally run by an individual.

Sunday, August 28, 2016

These countries are facing the greatest skills shortages | World Economic Forum

These countries are facing the greatest skills shortages | World Economic Forum: The scale of the problem varies from country to country, but is particularly bad in Japan, where 81% of firms (with 10 or more employees) have difficulty finding qualified employees, according to recent data from the OECD

Articles by Steve Morgan | CSO Online

Articles by Steve Morgan | CSO Online: The Cybersecurity Market Report is published quarterly and covers the business of cybersecurity, including global market sizing and industry forecasts from consolidated research

Friday, August 26, 2016

How do I report independent samples T-test data in APA style?

How do I report independent samples T-test data in APA style?: It’s a good idea to report three main things in an APA style results section when it comes to t-tests. Doing so will help your reader more fully understand your results.

Why distributed networks and smart sensors won’t survive in self-driving cars | Computerworld

Why distributed networks and smart sensors won't survive in
self-driving cars | Computerworld

http://www.computerworld.com/article/3112729/car-tech/why-distributed-networks-and-smart-sensors-wont-survive-in-self-driving-cars.html?google_editors_picks=true

Thursday, August 25, 2016

Half of High School Seniors Lack Access to Computer Science -- THE Journal

Half of High School Seniors Lack Access to Computer Science -- THE Journal: Only 22 percent of 12th graders say they’ve ever taken a computer science course, according to the analysis.

Ashley Madison Blasted Over Fake Security Award

Ashley Madison Blasted Over Fake Security Award: How not to do data security

If a company’s main product is discreet sexual services, it should probably lock down its customer data good and tight.

Federal CIO: More than 10,000 Openings for Cyber Pros in the Federal Government - Nextgov.com

Federal CIO: More than 10,000 Openings for Cyber Pros in the Federal Government - Nextgov.com:



In November of 2015, federal CIO Tony Scott said he was "attempting to fill more than 10,000 estimated openings for cyber professionals in the federal government"




Reporter's Notebook: Testing Out the World's First Self-Driving Taxi

Reporter's Notebook: Testing Out the World's First Self-Driving Taxi

https://news.google.com/news/ampviewer?caurl=http%3A%2F%2Fwww.wsj.com%2Famp%2Farticles%2Freporters-notebook-testing-out-the-worlds-first-self-driving-taxi-1472125855#pt0-44718

The biggest threat facing connected autonomous vehicles is cybersecurity | TechCrunch

The biggest threat facing connected autonomous vehicles is
cybersecurity | TechCrunch

https://techcrunch.com/2016/08/25/the-biggest-threat-facing-connected-autonomous-vehicles-is-cybersecurity/

How We Can Identify Promising Candidates for Open IT Security Positions

How We Can Identify Promising Candidates for Open IT Security Positions

http://www.tripwire.com/state-of-security/risk-based-security-for-executives/connecting-security-to-the-business/how-we-can-identify-promising-candidates-for-open-it-security-positions/?utm_medium=twitter&utm_source=twitterfeed

Apple could be on the hook for $19 billion in taxes, and the Obama administration is livid

Apple could be on the hook for $19 billion in taxes, and the Obama
administration is livid

https://news.google.com/news/ampviewer?caurl=https%3A%2F%2Famp.businessinsider.com%2Fapple-taxes-us-treasury-european-commission-2016-8#pt0-992520

Wednesday, August 24, 2016

New computer science course’s challenge is finding qualified teachers to teach it | EdSource

New computer science course’s challenge is finding qualified teachers to teach it | EdSource: Expansion of a new Advanced Placement computer science course aimed at drawing young women and minorities into high-tech fields is being hampered by a nationwide shortage of teachers qualified to teach it.

Manpower says businesses face 'crippling talent shortage’ across the world

Manpower says businesses face 'crippling talent shortage’ across the world: ManpowerGroup 2015 Talent Shortage survey released��
Monday, 18 May 2015 | 11:00 AM ET|00:34
More than one-third of employers around the world are experiencing difficulty filling job positions, global employment consultancy Manpower reported on Monday.

Cybersecurity job market to suffer severe workforce shortage | CSO Online

Cybersecurity job market to suffer severe workforce shortage | CSO Online: Symantec is pursuing another option, which may spur a trend if it works. The National Association of Software and Service Companies (Nasscom), a non-profit trade association in the Indian information technology and business process outsourcing industry, and Symantec recently signed a pact to develop world class skilled and certified cyber-security professionals

Automated Cybersecurity Tools Can Aid Agencies Facing a Talent Gap | FedTech Magazine

Automated Cybersecurity Tools Can Aid Agencies Facing a Talent Gap | FedTech Magazine: ...And as part of the president’s Cybersecurity National Action Plan, the administration seeks to spend $62 million to combat cyberworkforce shortages. In terms of staffing, the federal government will cast a wider net to include candidates who know foreign languages, biology and anthropology; will emphasize critical measures such as training, scholarships and debt forgiveness; and will create a corps of cyberprofessionals to instill best practices across government.

Rockwell Automation addresses global skills shortage

Rockwell Automation addresses global skills shortage - Plant & Works Engineering: The five steps for addressing workforce availability include:

 • Improving machinery design to address ergonomics and safety risks for a more diverse workforce, including older and younger workers.

 • Building a Connected Enterprise to improve productivity and efficiency through information-enabled operations.

 • Training workers to preserve and pass on the knowledge of experienced workers, and to equip workers with the skills needed to take advantage of new technologies.

 • Leveraging vendors and suppliers to augment core competencies when specialised skills are only occasionally required or when local talent is not available.

 • Engaging the community to improve the skills and availability of young workers.

Only 1 in 60 students have access to digital learning opportunities outside of the classroom

Only 1 in 60 students have access to digital learning opportunities outside of the classroom: The latest numbers from the UK Parliament estimate that the digital skills gap currently costs the UK #63 billion a year. This number is hardly surprising when only 35% of teachers in the UK have the relevant degree to be teaching these skills. As a result, students need to turn to other sources of information to not only find out what options are available to them after they leave education, but to get to grips with the skills that they need to succeed once they do.

Half of High School Seniors Lack Access to Computer Science -- THE Journal

Half of High School Seniors Lack Access to Computer Science -- THE Journal: According to the U.S. Bureau of Labor Statistics, 3.8 million people in the United States work in computing occupations. Yet, CTEq determined last year that more than twice as many — 7.7 million Americans — said they use computers in complex ways in their jobs.

New Data: Bridging the Computer Science Access Gap | Change the Equation

New Data: Bridging the Computer Science Access Gap | Change the Equation: yet only 22 percent of U.S. 12th-graders say they have ever taken a computer programming class

Secrecy News 07/17/01

Secrecy News 07/17/01: "James Bamford has done more than any other individual to shed light on the National Security Agency and to promote public accountability of this intensely secretive organization, dating back to his landmark 1982 book The Puzzle Palace. The list of his reportorial coups to the present day is long and impressive."

Snowden’s New Lies for Old | The XX Committee

Snowden’s New Lies for Old | The XX Committee: "As I’ve said before, whether Ed was cooperating with the Russians before he reached Moscow is a debatable question, but his status with the FSB now is not actually an open matter, as everyone who understands Russian intelligence knows. Bamford believes his subject is the first Western intelligence defector to Russia ever not to cooperate with the Kremlin’s secret services, and that is his right. It is also everyone else’s right to point out this claim is ridiculous." Schindler

So you want to know about NSA … | The XX Committee

So you want to know about NSA … | The XX Committee: Bamford’s writings on NSA, which are considerable, are noted for their quantity, not quality.

Half of High School Seniors Lack Access to Computer Science -- THE Journal

Half of High School Seniors Lack Access to Computer Science -- THE Journal: More than half of high school seniors attend schools that don’t offer computer science, according to a new analysis by Change the Equation, a nonprofit organization that aims to mobilize businesses to improve STEM learning.

Tuesday, August 23, 2016

The Real Russian Mole Inside NSA | | Observer

The Real Russian Mole Inside NSA | | Observer

http://observer.com/2016/08/the-real-russian-mole-inside-nsa/

Hacking a WordPress Botnet - Wordfence

Hacking a WordPress Botnet - Wordfence: "While analyzing some of the attacks we see on the Wordfence Web Application Firewall, we discovered code that an attacker was trying to upload that was part of a botnet."



'via Blog this'

SXSW PanelPicker

SXSW PanelPicker: Imagine the consequences of a drone in the hands of a hacker.

How do I interpret data in SPSS for an independent samples T-test?

How do I interpret data in SPSS for an independent samples T-test?: "You can conclude that there is no statistically significant difference between your two conditions. You can conclude that the differences between condition Means are likely due to chance and not likely due to the IV manipulation.
 "



'via Blog this'

Sunday, August 21, 2016

NICE strategic plan lays path for training cyber workforce

NICE strategic plan lays path for training cyber workforce: “Together, as a community, we can collectively make progress to close the cybersecurity skills gap and enhance our economic and national security.”

Top US Undergraduate Computer Science Programs Skip Cybersecurity Classes

Top US Undergraduate Computer Science Programs Skip Cybersecurity Classes: An analysis of the top 121 US university computer science and engineering programs found that none of the top 10 requires students take a cybersecurity class for their degree in computer science, and three of the top 10 don’t offer any cybersecurity courses at all.

IEEE Quote on cybersecurity path - Platt

http://theinstitute.ieee.org/career-and-education/career-guidance/no-clear-path-for-prospective-cybersecurity-specialists

“This confusion causes the profession to grow less efficiently than it could,” says IEEE Senior Member Greg Shannon, chief scientist for the CERT Division at Carnegie Mellon University Software Engineering Institute, in Pittsburgh, and chair of the IEEE Cybersecurity Initiative. “People can’t say, ‘These are the credentials I need’ and ‘This is how much it is going to cost me to get them.’”


Universities aren’t doing enough to train the cyberdefenders America desperately needs - The Washington Post

Universities aren’t doing enough to train the cyberdefenders America desperately needs - The Washington Post: None of America's top 10 computer science programs -- as ranked by U.S. News & World Report in 2015 -- requires graduates to take even one cybersecurity course, according to a new analysis from security firm CloudPassage.

Report Shows Few Solutions to Filling Cyber Skills Gap | SecurityWeek.Com

Report Shows Few Solutions to Filling Cyber Skills Gap | SecurityWeek.Com: few new insights and no new solutions to the problem

Cyber security sector struggles to fill skills gap - FT.com

Cyber security sector struggles to fill skills gap - FT.com: Global demand for cyber security experts is forecast to outstrip supply by a third before the end of the decade, with companies struggling against what one senior industry figure has called the “largest human capital shortage in the world”.

The Most Serious Skill Gap Of All - Forbes

The Most Serious Skill Gap Of All - Forbes: Here is the biggest and most dangerous skills gap of all: It’s the gap between our employees’ limited or nonexistent awareness of themselves as economic units, and the reality of the world we are living in now.

Sadly truthy... http://xkcd.com/1718

Sadly truthy...

http://xkcd.com/1718

Saturday, August 20, 2016

Cybersecurity Snapshot: Cyberthreats, Regulations, Workforce Issues in 2016 - ISACA Now

Cybersecurity Snapshot: Cyberthreats, Regulations, Workforce Issues in 2016 - ISACA Now: "Finding well-qualified cybersecurity professionals, however, is an ongoing, global issue. Nearly half of global organizations are planning to hire more cybersecurity personnel in 2016, and 94% say they will expect to have a difficult time finding skilled candidates."



'via Blog this'

Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information | RAND

Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information | RAND: nationally representative survey of the consumer experience with data breaches

Report Shows Few Solutions to Filling Cyber Skills Gap | SecurityWeek.Com

http://www.securityweek.com/report-shows-few-solutions-filling-cyber-skills-gap

"Our experience shows that the lack of security managers is more severe and impactful than the lack of technology experts. Growing technical skills is important, but seeing a bigger picture of all threats or those relevant to a particular business is paramount." _ Kaspersky

Wednesday, August 17, 2016

Reimagining the Cybersecurity Profession | US News

Reimagining the Cybersecurity Profession | US News: "In reality, there are dozens of different types of cybersecurity jobs that have nothing to do with computer programming. In fact, 48 percent of the workforce in cyber risk management is comprised of women."



'via Blog this'

Charger: Omnicharge: Smart & Compact Portable Power Bank | Indiegogo | Indiegogo

Charger: Omnicharge: Smart & Compact Portable Power Bank | Indiegogo | Indiegogo: World's smallest power bank with (1) AC/DC Power Outlet and (2) USB Fast-Charging ports for charging or powering nearly any device.

11 things you can do to protect against ransomware, including Cryptolocker

11 things you can do to protect against ransomware, including Cryptolocker: Ransomware is malicious software that cyber criminals use to hold your computer or computer files for ransom, demanding payment from you to get them back.