Saturday, December 31, 2016

Thursday, December 29, 2016

Talking Doll Cayla Hacked To Spew Filthy Things (UPDATE) | The Huffington Post

Talking Doll Cayla Hacked To Spew Filthy Things (UPDATE) | The Huffington Post

http://m.huffpost.com/us/entry/6647046

Friday, December 23, 2016

How do synthesizers work? - Explain that Stuff

How do synthesizers work? - Explain that Stuff: "When two instruments play exactly the same musical note, at roughly the same volume, they can sound completely different. "



'via Blog this'

What Every Logic Pro User Ought To Know About Synthesizers

What Every Logic Pro User Ought To Know About Synthesizers: "Instead, rip some funky vintage synth riffs! This guide will show you which synth is right for the riff."



'via Blog this'

ElCapitan: App Nap

ElCapitan: Experiences: "You can also turn off App Nap in El Capitan in Terminal:



defaults write NSGlobalDomain NSAppSleepDisabled -bool YES"



'via Blog this'

Wednesday, December 14, 2016

Monday, December 5, 2016

Global Law Enforcers Finally Take Down Avalanche Cybercrime Ring: Here's How They Did It : TECH : Tech Times

Global Law Enforcers Finally Take Down Avalanche Cybercrime Ring: Here's How They Did It : TECH : Tech Times: "Companies and consumers should take this opportunity to scan their systems for the different families of malware that the Avalanche botnet distributed," said Stephen Cobb, senior security researcher for ESET, a security company in Slovakia."



'via Blog this'

Sunday, December 4, 2016

Friday, December 2, 2016

After mothballing Comma One, George Hotz releases free autonomous car software | Ars Technica

After mothballing Comma One, George Hotz releases free autonomous car software | Ars Technica: "How does anybody make money? Our goal is to basically own the network. We want to own the network of self driving cars that is out there.”"



'via Blog this'

Tuesday, November 29, 2016

Masooda Bashir | ischool.illinois.edu

Masooda Bashir | ischool.illinois.edu: "Unfortunately, the U.S. lacks the cyber security workforce needed to manage many of the threats our society faces."



'via Blog this'

Monday, November 28, 2016

Graduation Dates

Graduation Dates: The College of Social Sciences, Arts and Humanities

Not by Twins Alone: Using the Extended Family Design to Investigate Genetic Influence on Political Beliefs

Not by Twins Alone: Using the Extended Family Design to Investigate Genetic Influence on Political Beliefs - Hatemi - 2010 - American Journal of Political Science - Wiley Online Library


http://onlinelibrary.wiley.com/doi/10.1111/j.1540-5907.2010.00461.x/full

Continuous Monthly Calendar for Excel

Continuous Monthly Calendar for Excel: "This new continuous monthly calendar template for Microsoft Excel® will let you create and print a calendar without breaks between months, all on one worksheet. "



'via Blog this'

Advanced Calendar Creator

Advanced Calendar Creator: "This is the advanced configuration form for the calendar customizer. "



'via Blog this'

Friday, November 25, 2016

Twitter Best Practices: Why, When And How To Say "Thank You" To Your Followers

Twitter Best Practices: Why, When And How To Say "Thank You" To Your Followers: "Follow Friday was devised in 2009 by @micah (according to Mashable). It’s a way to provide good recommendations on who people ought to follow."



'via Blog this'

64 Online Resources to Learn to Code for Free

64 Online Resources to Learn to Code for Free: "Large online course library, where classes are taught by real university professors. All courses are free of charge, but you have the option to pay for a “Coursera Verified Certificate” to prove course completion."



'via Blog this'

Saturday, November 19, 2016

About - Jason Savard

About - Jason Savard: "I'm my own boss, no more suits or CVs! Just living on contributions to my apps"

'via Blog this'

Forget The Gimmicks: Here’s the Best Way to Organize Your Gmail Inbox

Forget The Gimmicks: Here’s the Best Way to Organize Your Gmail Inbox: "To use a more classic inbox in Gmail, click the gear icon and select Settings. Click over to the Inbox tab, click the Inbox type box, and select Unread first. All the tabs and priority options will vanish."

'via Blog this'

How to update the firmware on a My Book or My Passport | WD Support

How to update the firmware on a My Book or My Passport | WD Support: "From the software download section, download the WD Universal Firmware Updater for Mac software. "



'via Blog this'

The End of Obamacare — NEJM

The End of Obamacare — NEJM: "Many ACA policies, though, are interconnected: without a requirement that individuals either obtain insurance or pay a penalty, regulations prohibiting insurers from excluding sicker people from coverage or charging them higher premiums are not viable. Picking and choosing to keep only the ACA’s popular provisions is easier said than done."

Sunday, November 13, 2016

Trump says cybersecurity maybe hardly doable

The answer that best exemplifies how badly Donald Trump was out of his depth in the debate - The Washington Post: "So we have to get very, very tough on cyber and cyber warfare. It is — it is a huge problem. I have a son. He's 10 years old. He has computers. He is so good with these computers, it's unbelievable. The security aspect of cyber is very, very tough. And maybe it's hardly doable."

What Trump's victory means for cybersecurity - CSMonitor.com

What Trump's victory means for cybersecurity - CSMonitor.com



"The security aspect of cyber is very, very tough. And maybe it's hardly doable."

Trump's First 100 Days: Restoring National Security Act

"Restoring National Security Act. Rebuilds our military by eliminating the defense sequester and expanding military investment; provides Veterans with the ability to receive public VA treatment or attend the private doctor of their choice; protects our vital infrastructure from cyber-attack; establishes new screening procedures for immigration to ensure those who are admitted to our country support our people and our values."

http://www.npr.org/2016/11/09/501451368/here-is-what-donald-trump-wants-to-do-in-his-first-100-days

Saturday, November 12, 2016

When the dam breaks Part 3 | Local News Stories | willistonherald.com

When the dam breaks Part 3 | Local News Stories | willistonherald.com: While it would take a full day and half to reach the city, the flood would still decimate Williston.

Friday, November 11, 2016

XYZprinting da Vinci 1.0 AiO 3D Printer/Scanner | Staples®

XYZprinting da Vinci 1.0 AiO 3D Printer/Scanner | Staples®: "Dual-laser 3D scanning technology for distortion-free capture of desired object. Automatic imaging takes only 5 minutes!"



'via Blog this'

Critical Infrastructure Sectors | Homeland Security

Critical Infrastructure Sectors | Homeland Security: "There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof."



'via Blog this'

Thursday, November 10, 2016

ASUS Chromebook C301SA | Notebooks | ASUS USA

ASUS Chromebook C301SA | Notebooks | ASUS USA: "The incredibly sleek and light Chromebook C301 is designed to go everywhere you want to go. Weighing just 2.97 lbs"



'via Blog this'

Cyber Security for Critical Infrastructure Protection - SCADAhacker

Cyber Security for Critical Infrastructure Protection - SCADAhacker: "SCADAhacker was conceived with the idea of providing relevant, candid, mission-critical information relating to industrial security of Supervisory Control and Data Acquisition (SCADA), Distributed Control (DCS) and other Industrial Control Systems (ICS) in a variety of public and social media forums."

'via Blog this'

Wednesday, November 9, 2016

IoT security window closing

IoT security window closing: Industry players need to address the security of internet of things (IoT) devices urgently before it is too late, according to Lorie Wigle, general manager, IoT security at Intel.

Monday, November 7, 2016

How Easy Is It To Hack A Self-Driving Car? - Vocativ

How Easy Is It To Hack A Self-Driving Car? - Vocativ: Despite several high-profile connected car hacks, experts say that our driverless future has the potential to be more secure

Saturday, November 5, 2016

Will hackers disrupt Tuesday's election? - The San Diego Union-Tribune

Will hackers disrupt Tuesday's election? - The San Diego Union-Tribune: "It’s equally possible that Tuesday will pass without incident. In general, though, there’s a growing sense that foreign and domestic hacking are becoming more pervasive and pernicious."



'via Blog this'

Friday, November 4, 2016

Cybersecurity Legislation | Cybercrime Laws | Cyber Security News - ISACA

Cybersecurity Legislation | Cybercrime Laws | Cyber Security News - ISACA: Before adjourning for the year, the US Congress passed the Cybersecurity Act of 2015, and President Barack Obama signed the measure into law on December 18, 2015.

Sunday, October 30, 2016

Coming to a Government Contract Near You: Mandatory Information Safeguarding Requirements | Cybersecurity Law Watch

Coming to a Government Contract Near You: Mandatory Information Safeguarding Requirements | Cybersecurity Law Watch



"The government recently finalized a sweeping amendment to the Federal
Acquisition Regulation (“FAR”) that will impose basic information system
safeguarding requirements on many federal acquisitions, marking the
latest in the continuing government effort to regulate and enhance
cybersecurity protections in the industry. The Final Rule, effective
June 15, 2016, imposes fifteen basic safeguarding requirements for
contractors with information systems containing information provided by,
or generated for, the government under a federal contract."

Wednesday, October 26, 2016

BeagleBone Green – Seeed │DigiKey

BeagleBone Green – Seeed │DigiKey: the new BeagleBone Green Wireless has a 2.4-GHz wireless module on board which add 2x2 MIMO Wi-Fi Bluetooth functionality making it ideal for IoT designs.

Emailchemy 13.2.1 Released – Weird Kid Software

Emailchemy 13.2.1 Released – Weird Kid Software: "Emailchemy’s built-in IMAP server is now compatible with the Apple Mail app that comes with macOS Sierra (10.12)."



'via Blog this'

Monday, October 24, 2016

GSA Proposes New Highly Adaptable Cybersecurity Services Special Item Number (SIN) | Interact

GSA Proposes New Highly Adaptable Cybersecurity Services Special Item Number (SIN) | Interact: In support of the President’s Cybersecurity National Action Plan, the General Services Administration (GSA) intends to establish a new Special Item Number (SIN) on the IT Schedule 70 contract vehicle to offer cybersecurity services that Federal agencies can quickly leverage to assess and protect their IT assets and infrastructure.

On freedom of the press, Donald Trump wants to make America like England again - The Washington Post

On freedom of the press, Donald Trump wants to make America like England again - The Washington Post:



Until recently, English law was so tough on the media that disgruntled subjects of news reports could use the country's court system to carry out what the New York legislature called “libel terrorism.” 



'via Blog this'

Migrating Eudora from Windows to the MAC (w. la... | Official Apple Support Communities

Migrating Eudora from Windows to the MAC (w. la... | Official Apple Support Communities:



http://www.aid4mail.com/email-migration



"application will convert on the PC my Emails to MBOX files that can be then copied to the MAC and imported into Apple's mail. "  



'via Blog this'

Startup key combinations for Mac - Apple Support

Startup key combinations for Mac - Apple Support: Press and hold the keys immediately after you turn on your Mac and hear the startup sound. Keep holding until the described behavior occurs.

Donald Trump loses it, calls for “revolution” - Salon.com

""We should have a revolution in this country." That was the opinion of Donald Trump after President Obama won re-election..."

http://www.salon.com/2012/11/07/donald_trump_loses_it_calls_for_revolution/

Trump calls for revolution, blasts Electoral College | TheHill

"The real estate mogul and host of reality show "The Apprentice" has been an outspoken supporter of Mitt Romney. He used Twitter to object vehemently to the Electoral College system that he predicted would give the win to Obama and the popular vote to the GOP challenger."

http://thehill.com/blogs/twitter-room/other-news/266423-trump-calls-for-revolution-blasts-electoral-college

Hackers, Organizational Doxing, and Data Forgeries - The Atlantic

Hackers, Organizational Doxing, and Data Forgeries - The Atlantic: "But what if hackers were to alter documents before releasing them? This is the next step in organizational doxing—and the effects can be much worse."

Wednesday, October 12, 2016

6 Cyber Security Strategies To Protect Your Small Business

6 Cyber Security Strategies To Protect Your Small Business: Every firm is unique. Your needs may be dramatically different from those of your closest competitor. Given that, here are a handful of cyber security strategies and tips that virtually any business should consider for better security.

Tuesday, October 11, 2016

EU Finalizes General Data Protection Regulation: Implications for U.S. Businesses

EU Finalizes General Data Protection Regulation: Implications for U.S. Businesses: One of the most significant changes in the GDPR is the very fact that it is a “regulation,” as opposed to a “directive.”

6 Ways To Prepare For The EU's GDPR

6 Ways To Prepare For The EU's GDPR: "The GDPR introduces tough new privacy requirements for companies handling EU data and vests consumers with significantly greater control and rights over the manner in which their data is collected, shared, retained, and destroyed. The GDPR gives EU regulators the authority to impose fines ranging from 2 percent to 4 percent of a company’s global revenues for violations of the regulation."

GDPR: Who does the EU GDPR Apply To? | Varonis Systems

GDPR: Who does the EU GDPR Apply To? | Varonis Systems: So under these new rules, if a US company collects data from EU citizens, it would be under the same legal obligations as though the company had headquarters in say France, UK, or Germany — even though they don’t have any servers or offices there!

New Survey Shows U.S. Companies Face Major Challenges Complying with EU General Data Protection Regulations (GDPR)

New Survey Shows U.S. Companies Face Major Challenges Complying with EU General Data Protection Regulations (GDPR): 39 percent of U.S. respondents do not anonymize or leverage other techniques to depersonalize customer data before using it in application testing environments.

Internet Speed Test - HTML5 Speed Test

Internet Speed Test - HTML5 Speed Test: Welcome to the SourceForge Speed Test. This speed test is uniquely designed to test your current Internet connection speed for Latency/Ping, Jitter, Download Speed, Upload Speed, Buffer Bloat, and Packet Loss.

Monday, October 10, 2016

EU General Data Protection Regulation, Binding Corporate Rules And Privacy Shield Training Requirements | Bloomberg BNA

EU General Data Protection Regulation, Binding Corporate Rules And Privacy Shield Training Requirements | Bloomberg BNA

Under Article 37, the GDPR tasks the Data Protection Officer (DPO) with “awareness raising and training of staff involved in the processing operations.”

Under Article 43, in connection with Binding Corporate Rules(BCRs), the GDPR requires “the appropriate data protection training to personnel having permanent or regular access to personal data.”

EU-US Privacy Shield becomes operational with the GDPR on the horizon - Lexology

EU-US Privacy Shield becomes operational with the GDPR on the horizon - Lexology



The Privacy Shield will operate in parallel with other existing data transfer mechanisms including Standard Contractual Clauses ("SCCs") and Binding Corporate Rules ("BCRs").

Google Signs Up For EU/U.S. Privacy Shield | SecurityWeek.Com

Google Signs Up For EU/U.S. Privacy Shield | SecurityWeek.Com: The reality, however, is that Safe-Harbor compliance isn't a simple shoehorn into Privacy Shield compliance.

20/20 Software EU-US PRIVACY SHIELD PRIVACY POLICY

Sample of how this works: Contact - 20/20 Software: EU-US PRIVACY SHIELD PRIVACY POLICY

What is BBB EU Privacy Shield?

BBB EU Privacy Shield is a successor program to BBB EU Safe Harbor, one of two original independent dispute resolution mechanisms supporting the US-EU Safe Harbor Framework when it came into effect in 2000.

EU-U.S. ‘Privacy Shield’ Agreement: Useful Or Useless? Yahoo Surveillance Scandal Should Decide That

EU-U.S. ‘Privacy Shield’ Agreement: Useful Or Useless? Yahoo Surveillance Scandal Should Decide That: It’s the U.S. Department of Commerce, an agency in charge of helping American business interests, that needs to audit the U.S. companies for violating EU laws.

Jones Day | The EU–U.S. Privacy Shield Approved

Jones Day | The EU–U.S. Privacy Shield Approved: After months of criticism from various EU bodies and institutions, the much-anticipated EU–U.S. Privacy Shield finally has been approved by the European Commission, paving the way for self-certifying U.S. organizations to transfer legally EU personal data across the Atlantic.

Privacy Shield's Drama Is Far From Over

Privacy Shield's Drama Is Far From Over: Of US firms, 73% had previously been certified under Safe Harbor, but only 42% are currently certified or plan to seek certification under Privacy Shield. Most will rely on standard contractual clauses to set the rules.

Saturday, October 8, 2016

Monday, October 3, 2016

Saturday, October 1, 2016

DEA’s Army of 18,000 Informants Pocketed $237 Million Over Five Years

https://theintercept.com/2016/09/30/deas-army-of-18000-informants-pocketed-237-million-over-five-years/

"33 DEA sources working at Amtrak, including train attendants and ticket agents, who collectively were paid more than $1.4 million over four years"

Wednesday, September 28, 2016

Statistician – Powerful, Easy to Use Statistics Add-In for Excel

Statistician – Powerful, Easy to Use Statistics Add-In for Excel: "Statistician is a comprehensive yet simple to use add-in for Microsoft Excel 2007 or later. The software performs high quality statistical analysis based on series of easy to use forms, activated via the Excel ribbon."



'via Blog this'

Tuesday, September 27, 2016

Why Many Doctors Don't Say 'I'm Sorry' | ConsultantLive

Why Many Doctors Don't Say 'I'm Sorry' | ConsultantLive: "The legacy of the apology and admissibility law movement has turned out to be a raft of statutes that suggest new ways of protecting the medical establishment from its own mistakes. The unintended consequences of these seemingly well-intentioned laws are doctors who can't apologize for harming their patients even if they want to, and injured patients who've been abandoned by their caregivers."

Sunday, September 25, 2016

Tracing the hidden River Sherbourne under Coventry - BBC News

Tracing the hidden River Sherbourne under Coventry - BBC News: Crouching between a high rise estate and a busy dual carriageway, the slow-flowing river looks nondescript until it comes to a large caged concrete tunnel, thrusting under the city's ring road.

Tuesday, September 20, 2016

Marshmallow for Dell Venue 8 7840? - Android Mobile Products - Mobile Devices - Dell Community

"Nop, no, niet, nada. Not going to happen. Dell ditched the device 4 weeks ago (NO more support, NO more update, nothing!) and hence have given prove once again that you must never ever buy anything this company releases. I made that mistake twice now, I´m healed."

http://en.community.dell.com/support-forums/mobile-devices/f/4585/t/19664451?pi41117=2

Stop victim shaming in cyber attacks | TheHill

Stop victim shaming in cyber attacks | TheHill: "companies that publicly disclose that they have been the victim of a cybercrime are not treated like a typical victim by federal and state regulators"

A Loud Sound Just Shut Down a Bank’s Data Center for 10 Hours | UP2V

A Loud Sound Just Shut Down a Bank’s Data Center for 10 Hours | UP2V: "The Siemens White Paper indicates that various HDD fail after exposure to noise above 120dB. This noise level is reached during fire extinguishing by either Inergen or other extinguishing gas. Also the sound level of the alarms should be added to the source of noise."

Saturday, September 17, 2016

P2K Range

Try the shotgun classes?

http://www.p2krange.com/?full=true

From My iPhone

Thursday, September 8, 2016

What was Silicon Valley like after the bubble burst in the early 2000s? - Quora

What was Silicon Valley like after the bubble burst in the early 2000s? - Quora: "The company shut its doors in March 2002; as part of the legal team handling the bankruptcy, I was one of the last 50 or so employees left standing, less than two years after joining a company of 3,000."

ESET Knowledgebase

ESET Knowledgebase



For more information about free ESET Online Scanner visit
ESET
Knowledgebase
or run it
directly from Eset.com

Thursday, September 1, 2016

2016 Report | One Hundred Year Study on Artificial Intelligence (AI100)

2016 Report | One Hundred Year Study on Artificial Intelligence (AI100)

Check for hacking?

https://ai100.stanford.edu/2016-report

Wednesday, August 31, 2016

Why you need a CSO/CISO | CIO

Why you need a CSO/CISO | CIO: "Even though we found that cybersecurity professionals, at all levels, are fully aware, and experiencing first-hand that the available talent is not keeping pace with demand needs, I was surprised by the alarmingly low number of companies that employ a CSO/CISO who is responsible for security," says Trevor Halstead, product specialist, talent services, Cybrary.

Why a CSO/CISO?

Tuesday, August 30, 2016

Under Cyber Siege: Nearly Half of Americans Report Being Victims of Scam or Fraud; Majority Say

Under Cyber Siege: Nearly Half of Americans Report Being Victims of Scam or Fraud; Majority Say: The Digital Citizens Alliance is a consumer-oriented coalition focused on educating the public and policy makers on the threats that consumers face on the Internet and the importance for Internet stakeholders

Ultimate Guide to Harvard Referencing - Cite This For Me

Ultimate Guide to Harvard Referencing - Cite This For Me: Blogs are regularly updated webpages that are generally run by an individual.

Monday, August 29, 2016

These countries are facing the greatest skills shortages | World Economic Forum

These countries are facing the greatest skills shortages | World Economic Forum: The scale of the problem varies from country to country, but is particularly bad in Japan, where 81% of firms (with 10 or more employees) have difficulty finding qualified employees, according to recent data from the OECD

Articles by Steve Morgan | CSO Online

Articles by Steve Morgan | CSO Online: The Cybersecurity Market Report is published quarterly and covers the business of cybersecurity, including global market sizing and industry forecasts from consolidated research

Friday, August 26, 2016

How do I report independent samples T-test data in APA style?

How do I report independent samples T-test data in APA style?: It’s a good idea to report three main things in an APA style results section when it comes to t-tests. Doing so will help your reader more fully understand your results.

Thursday, August 25, 2016

Half of High School Seniors Lack Access to Computer Science -- THE Journal

Half of High School Seniors Lack Access to Computer Science -- THE Journal: Only 22 percent of 12th graders say they’ve ever taken a computer science course, according to the analysis.

Ashley Madison Blasted Over Fake Security Award

Ashley Madison Blasted Over Fake Security Award: How not to do data security

If a company’s main product is discreet sexual services, it should probably lock down its customer data good and tight.

Federal CIO: More than 10,000 Openings for Cyber Pros in the Federal Government - Nextgov.com

Federal CIO: More than 10,000 Openings for Cyber Pros in the Federal Government - Nextgov.com:

In November of 2015, federal CIO Tony Scott said he was "attempting to fill more than 10,000 estimated openings for cyber professionals in the federal government"




Wednesday, August 24, 2016

New computer science course’s challenge is finding qualified teachers to teach it | EdSource

New computer science course’s challenge is finding qualified teachers to teach it | EdSource: Expansion of a new Advanced Placement computer science course aimed at drawing young women and minorities into high-tech fields is being hampered by a nationwide shortage of teachers qualified to teach it.

Manpower says businesses face 'crippling talent shortage’ across the world

Manpower says businesses face 'crippling talent shortage’ across the world: ManpowerGroup 2015 Talent Shortage survey released��
Monday, 18 May 2015 | 11:00 AM ET|00:34
More than one-third of employers around the world are experiencing difficulty filling job positions, global employment consultancy Manpower reported on Monday.

Cybersecurity job market to suffer severe workforce shortage | CSO Online

Cybersecurity job market to suffer severe workforce shortage | CSO Online: Symantec is pursuing another option, which may spur a trend if it works. The National Association of Software and Service Companies (Nasscom), a non-profit trade association in the Indian information technology and business process outsourcing industry, and Symantec recently signed a pact to develop world class skilled and certified cyber-security professionals

Automated Cybersecurity Tools Can Aid Agencies Facing a Talent Gap | FedTech Magazine

Automated Cybersecurity Tools Can Aid Agencies Facing a Talent Gap | FedTech Magazine: ...And as part of the president’s Cybersecurity National Action Plan, the administration seeks to spend $62 million to combat cyberworkforce shortages. In terms of staffing, the federal government will cast a wider net to include candidates who know foreign languages, biology and anthropology; will emphasize critical measures such as training, scholarships and debt forgiveness; and will create a corps of cyberprofessionals to instill best practices across government.

Rockwell Automation addresses global skills shortage

Rockwell Automation addresses global skills shortage - Plant & Works Engineering: The five steps for addressing workforce availability include:

 • Improving machinery design to address ergonomics and safety risks for a more diverse workforce, including older and younger workers.

 • Building a Connected Enterprise to improve productivity and efficiency through information-enabled operations.

 • Training workers to preserve and pass on the knowledge of experienced workers, and to equip workers with the skills needed to take advantage of new technologies.

 • Leveraging vendors and suppliers to augment core competencies when specialised skills are only occasionally required or when local talent is not available.

 • Engaging the community to improve the skills and availability of young workers.

Only 1 in 60 students have access to digital learning opportunities outside of the classroom

Only 1 in 60 students have access to digital learning opportunities outside of the classroom: The latest numbers from the UK Parliament estimate that the digital skills gap currently costs the UK #63 billion a year. This number is hardly surprising when only 35% of teachers in the UK have the relevant degree to be teaching these skills. As a result, students need to turn to other sources of information to not only find out what options are available to them after they leave education, but to get to grips with the skills that they need to succeed once they do.

Half of High School Seniors Lack Access to Computer Science -- THE Journal

Half of High School Seniors Lack Access to Computer Science -- THE Journal: According to the U.S. Bureau of Labor Statistics, 3.8 million people in the United States work in computing occupations. Yet, CTEq determined last year that more than twice as many — 7.7 million Americans — said they use computers in complex ways in their jobs.

New Data: Bridging the Computer Science Access Gap | Change the Equation

New Data: Bridging the Computer Science Access Gap | Change the Equation: yet only 22 percent of U.S. 12th-graders say they have ever taken a computer programming class

Secrecy News 07/17/01

Secrecy News 07/17/01: "James Bamford has done more than any other individual to shed light on the National Security Agency and to promote public accountability of this intensely secretive organization, dating back to his landmark 1982 book The Puzzle Palace. The list of his reportorial coups to the present day is long and impressive."

Snowden’s New Lies for Old | The XX Committee

Snowden’s New Lies for Old | The XX Committee: "As I’ve said before, whether Ed was cooperating with the Russians before he reached Moscow is a debatable question, but his status with the FSB now is not actually an open matter, as everyone who understands Russian intelligence knows. Bamford believes his subject is the first Western intelligence defector to Russia ever not to cooperate with the Kremlin’s secret services, and that is his right. It is also everyone else’s right to point out this claim is ridiculous." Schindler

So you want to know about NSA … | The XX Committee

So you want to know about NSA … | The XX Committee: Bamford’s writings on NSA, which are considerable, are noted for their quantity, not quality.

Half of High School Seniors Lack Access to Computer Science -- THE Journal

Half of High School Seniors Lack Access to Computer Science -- THE Journal: More than half of high school seniors attend schools that don’t offer computer science, according to a new analysis by Change the Equation, a nonprofit organization that aims to mobilize businesses to improve STEM learning.

Tuesday, August 23, 2016

Hacking a WordPress Botnet - Wordfence

Hacking a WordPress Botnet - Wordfence: "While analyzing some of the attacks we see on the Wordfence Web Application Firewall, we discovered code that an attacker was trying to upload that was part of a botnet."



'via Blog this'

SXSW PanelPicker

SXSW PanelPicker: Imagine the consequences of a drone in the hands of a hacker.

How do I interpret data in SPSS for an independent samples T-test?

How do I interpret data in SPSS for an independent samples T-test?: "You can conclude that there is no statistically significant difference between your two conditions. You can conclude that the differences between condition Means are likely due to chance and not likely due to the IV manipulation.
 "



'via Blog this'

Sunday, August 21, 2016

NICE strategic plan lays path for training cyber workforce

NICE strategic plan lays path for training cyber workforce: “Together, as a community, we can collectively make progress to close the cybersecurity skills gap and enhance our economic and national security.”

Top US Undergraduate Computer Science Programs Skip Cybersecurity Classes

Top US Undergraduate Computer Science Programs Skip Cybersecurity Classes: An analysis of the top 121 US university computer science and engineering programs found that none of the top 10 requires students take a cybersecurity class for their degree in computer science, and three of the top 10 don’t offer any cybersecurity courses at all.

IEEE Quote on cybersecurity path - Platt

http://theinstitute.ieee.org/career-and-education/career-guidance/no-clear-path-for-prospective-cybersecurity-specialists

“This confusion causes the profession to grow less efficiently than it could,” says IEEE Senior Member Greg Shannon, chief scientist for the CERT Division at Carnegie Mellon University Software Engineering Institute, in Pittsburgh, and chair of the IEEE Cybersecurity Initiative. “People can’t say, ‘These are the credentials I need’ and ‘This is how much it is going to cost me to get them.’”


Universities aren’t doing enough to train the cyberdefenders America desperately needs - The Washington Post

Universities aren’t doing enough to train the cyberdefenders America desperately needs - The Washington Post: None of America's top 10 computer science programs -- as ranked by U.S. News & World Report in 2015 -- requires graduates to take even one cybersecurity course, according to a new analysis from security firm CloudPassage.

Cyber security sector struggles to fill skills gap - FT.com

Cyber security sector struggles to fill skills gap - FT.com: Global demand for cyber security experts is forecast to outstrip supply by a third before the end of the decade, with companies struggling against what one senior industry figure has called the “largest human capital shortage in the world”.

The Most Serious Skill Gap Of All - Forbes

The Most Serious Skill Gap Of All - Forbes: Here is the biggest and most dangerous skills gap of all: It’s the gap between our employees’ limited or nonexistent awareness of themselves as economic units, and the reality of the world we are living in now.

Cybersecurity Snapshot: Cyberthreats, Regulations, Workforce Issues in 2016 - ISACA Now

Cybersecurity Snapshot: Cyberthreats, Regulations, Workforce Issues in 2016 - ISACA Now: "Finding well-qualified cybersecurity professionals, however, is an ongoing, global issue. Nearly half of global organizations are planning to hire more cybersecurity personnel in 2016, and 94% say they will expect to have a difficult time finding skilled candidates."



'via Blog this'

Report Shows Few Solutions to Filling Cyber Skills Gap | SecurityWeek.Com

http://www.securityweek.com/report-shows-few-solutions-filling-cyber-skills-gap

"Our experience shows that the lack of security managers is more severe and impactful than the lack of technology experts. Growing technical skills is important, but seeing a bigger picture of all threats or those relevant to a particular business is paramount." _ Kaspersky

Wednesday, August 17, 2016

Reimagining the Cybersecurity Profession | US News

Reimagining the Cybersecurity Profession | US News: "In reality, there are dozens of different types of cybersecurity jobs that have nothing to do with computer programming. In fact, 48 percent of the workforce in cyber risk management is comprised of women."



'via Blog this'

Charger: Omnicharge: Smart & Compact Portable Power Bank | Indiegogo | Indiegogo

Charger: Omnicharge: Smart & Compact Portable Power Bank | Indiegogo | Indiegogo: World's smallest power bank with (1) AC/DC Power Outlet and (2) USB Fast-Charging ports for charging or powering nearly any device.