Monday, December 31, 2018

Home - UK Cohousing Network

Home - UK Cohousing Network "Cohousing communities are intentional communities, created and run by their residents. Each household has a self-contained, private home as well as shared community space. Residents come together to manage their community, share activities, and regularly eat together."

The Monthly – Feature 12-05

The Monthly – Feature 12-05: More than simply hanging up your hat, retiring to a cohousing community can mean connecting with peers, young families, and life.

INFO 4601/5601 Readings (Spring 2018) - Google Docs

INFO 4601/5601 Readings (Spring 2018) - Google Docs "This reading list is a work-in-progress, and will change throughout the semester as the class evolves and is co-constructed. And as relevant events continue to happen!" https://caseyfiesler.com/


Cyber criminals outspend businesses in cyber security battle

Cyber criminals outspend businesses in cyber security battle: Cybercriminals are flexing their financial might and UK organisations are facing more attacks as a result

Saturday, December 29, 2018

Diagnostic Criteria : National Multiple Sclerosis Society

Diagnostic Criteria : National Multiple Sclerosis Society: 2017 McDonald MS Diagnostic Criteria

Discussions : MS Connection

Discussions : MS Connection Possible / New Diagnosis

SHG - San Diego (Mission Valley) : National Multiple Sclerosis Society

SHG - San Diego (Mission Valley) : National Multiple Sclerosis Society: Self Help Group - San Diego (Mission Valley)

Vision Problems : National Multiple Sclerosis Society

Vision Problems : National Multiple Sclerosis Society: Diplopia, or double vision, occurs when the pair of muscles that control a particular eye movement are not perfectly coordinated due to weakness in one or both pairs of muscles. #MS

Study Finds Diversity Boosts Innovation in U.S. Companies

Study Finds Diversity Boosts Innovation in U.S. Companies | NC State News | NC State University: A recent study finds that taking steps to foster diversity makes a company more innovative, in terms of product innovations, patents created and citations on patents – meaning the relevant innovations are also used to develop new technologies.

About verified accounts

About verified accounts: The blue verified badge on Twitter lets people know that an account of public interest is authentic.

Wednesday, December 26, 2018

Senate Report No. 93-1183

Senate Report No. 93-1183: "Watergate has thus been the symbolic catalyst of a tremendous upsurge of interest in securing the right of privacy:wiretapping and bugging political opponents, breaking and entering, enemies lists, the Houston plan, national security justifications for wiretapping and burglary, misuse of information compiled by government agencies for political purposes, access to hotel, telephone and bank records; all of these show what government can do if its actions are shrouded in secrecy and its vast information resources are applied and manipulated in a punitive, selective, or political fashion."

Why privacy regulations are no longer a pipe dream - Axios

Legislative History of the Privacy Act of 1974: Military Legal Resources (Federal Research Division: Customized Research and Analytical Services, Library of Congress)

Legislative History of the Privacy Act of 1974: Military Legal Resources (Federal Research Division: Customized Research and Analytical Services, Library of Congress)
http://www.loc.gov/rr/frd/Military_Law/LH_privacy_act-1974.html

Monday, December 24, 2018

Blogspot, BlogTHIS! - Blogger Publish | Ask MetaFilter

Blogspot, BlogTHIS! - Blogger Publish | Ask MetaFilter: Try to see if you can bookmark this link instead.

Stephanie Mills

Stephanie Mills, NL?
https://smillswriter.com/

Langdon Winner - Wikipedia

Langdon Winner - Wikipedia
NL per WSJ
https://en.wikipedia.org/wiki/Langdon_Winner

Chellis Glendinning - Wikipedia

Chellis Glendinning - Wikipedia
NL manifesto 
https://en.wikipedia.org/wiki/Chellis_Glendinning

Not So Fast - Neoluddites

"American Nightmare" Is an Antidote to Misguided Faith in Liberal Politics

"American Nightmare" Is an Antidote to Misguided Faith in Liberal Politics
https://truthout.org/articles/american-nightmare-is-an-antidote-to-misguided-faith-in-liberal-politics/

Howard Roark's Courtroom Speech - Work the System

Howard Roark's Courtroom Speech - Work the System
https://www.workthesystem.com/getting-it/howard-roarks-courtroom-speech/

Wrekin (The Marches Line) – demo – Wheal Alice Music

'The Abbey' is actually Shrewsbury's Abbey Church: not much else of the Abbey survived the Dissolution and Telford's roadbuilding in 1836.
https://whealalicemusic.wordpress.com/2018/12/23/wrekin-the-marches-line-demo/

Friday, December 21, 2018

Wednesday, December 12, 2018

Statement regarding hoax article | NORMA: International Journal for Masculinity Studies

Statement regarding hoax article | NORMA: International Journal for Masculinity Studies: After having reviewed the text we rejected the article as unsuitable on the grounds that the content was incomprehensible. In short, it was nonsense.

Developments in the field of information and telecommunications in the context of international security – UNODA

Developments in the field of information and telecommunications in the context of international security – UNODA: The issue of information security has been on the UN agenda since the Russian Federation in 1998 first introduced a draft resolution in the First Committee of the UN General Assembly. It was adopted without a vote (A/RES/53/70)

Since that time there have been annual reports by the Secretary-General to the General Assembly with the views of UN Member States on the issue:

Trunk Cases | Plasma Cases | Crate Style Cases | Bare Wood Cases

Trunk Cases | Plasma Cases | Crate Style Cases | Bare Wood Cases Call me a rambling man, but these are cool.

Freight Rate Calculator: Freight Shipping Costs via Air, Ocean, Sea | Freightos

Freight Rate Calculator: Freight Shipping Costs via Air, Ocean, Sea | Freightos: Tap into the world’s largest database of freight rates with our international freight rate calculator. Use it to get instant shipping estimates for your international freight

Tuesday, December 11, 2018

How To Enable HTTPS On Your Blogger Blog With Custom Domain

How To Enable HTTPS On Your Blogger Blog With Custom Domain: "So finally wait is over, Google has been released the official SSL certificates (HTTPS) for blogger blogs with the custom domain, and it’s super easy to do this,"

How to Point a Domain to Blogger

How to Point a Domain to Blogger: "These records can be added using any DNS editor"

The Only Guide You Need To Setup BlogSpot Custom Domain

The Only Guide You Need To Setup BlogSpot Custom Domain: "Login to your Godady account dashboard & click on manage domains"

How To Set Up a Custom Domain in Blogger - The Right Way! - Wonder Forest

How To Set Up a Custom Domain in Blogger - The Right Way! - Wonder Forest: "I realize that this looks daunting, but I promise it really isn’t..." Oh yes it is.

'Buy Nothing' phenomenon on the rise in San Diego

Tax Advice For US Expats Living In The UK - Experts for Expats

Tax Advice For US Expats Living In The UK - Experts for Expats: "If you would like assistance with your US/UK tax affairs, enter your details using the form and we will introduce you to a US/UK tax specialist who will contact you to arrange a date/time to briefly discuss your affairs and provide a quotation for further support if required."

UK/US Dual Citizens Tax Guidance - Experts for Expats

UK/US Dual Citizens Tax Guidance - Experts for Expats: "If you are a dual citizen of the US and UK currently residing in the UK and would like assistance and clarification around your tax affairs, we recommend that you request a free initial consultation with a qualified accountant from our network."

Monday, December 10, 2018

Is It “Techno-Chauvinist” & “Anti-Humanist” to Believe in the Transformative Potential of Technology?

Is It “Techno-Chauvinist” & “Anti-Humanist” to Believe in the Transformative Potential of Technology?: "Properly understood, “technology” and technological innovation are simply extensions of our humanity and represent efforts to continuously improve the human condition. In that sense, humanism and technology are compliments, not opposites." - not really.

FBI — Crime in the U.S. 2017

FBI — Crime in the U.S. 2017: A summary of crime in the nation in 2017

Crime Data Downloads

CDE :: Downloads: The Crime Data Explorer (CDE) provides select bulk data sets for download. Incident-based data by state, summary data with estimates, and data on specific topics like assaults on law enforcement officers, hate crime, or human trafficking are available for download in CSV files below.

OCR Fines Florida Physicians Group $500,000 for HIPAA Failures

OCR Fines Florida Physicians Group $500,000 for HIPAA Failures: "To make matters worse, while ACH was founded in 2005, the company failed to conduct a risk analysis until March 4, 2014. Further, they never implemented security measures or any other written HIPAA policies or procedures prior to 2014."

UK Bed Sizes vs. US Bed Sizes: Find the Right Bed Size for Your Needs - The London Connection

Opt Out | Quantcast

Privacy | Criteo

Tapad privacy policy

Privacy International files complaints against seven companies for wide-scale and systematic infringements of data protection law

Friday, December 7, 2018

Philanthropy Needs To Take A Hard Look At Its Colonial Roots

Philanthropy Needs To Take A Hard Look At Its Colonial Roots: "bold new book, Decolonizing Wealth, a provocative exploration of the dysfunctional colonial dynamics at play in the world of high finance and philanthropy."

Wednesday, December 5, 2018

Tuesday, December 4, 2018

AI winter – update – Piekniewski's blog

AI winter – update – Piekniewski's blog: "Not too long after that, a first fatal autopilot accident happened (Joshua Brown) and Mobileye dropped the relationship with Tesla, apparently noting that their use of technology was irresponsible."

UK and IT

Sunday, November 25, 2018

EasyExpat.com - Information for Expatriates, Expat Guides

EasyExpat.com - Information for Expatriates, Expat Guides: "Info for International Relocation Portal: Move, Work, Live Abroad."

International Air Freight & Air Shipping Charges, Rates, & Cost | Freightos

International Air Freight & Air Shipping Charges, Rates, & Cost | Freightos: If the volumetric weight exceeds the actual weight of the product, the volumetric weight becomes the chargeable weight. For light shipments, use this chargeable weight calculator to work out whether your shipment will be charged by actual weight or dimensional weight.

Broadband in Coventry - maybe

Broadband in Coventry -: fibre broadband is available to homes within a 5 mile radius of Coventry.

Saturday, November 24, 2018

FreeRTOS TCP/IP Stack Vulnerabilities Put A Wide Range of Devices at Risk of Compromise: From Smart Homes to Critical Infrastructure Systems | Zimperium Mobile Security Blog

FreeRTOS TCP/IP Stack Vulnerabilities Put A Wide Range of Devices at Risk of Compromise: From Smart Homes to Critical Infrastructure Systems | Zimperium Mobile Security Blog: During our research, we discovered multiple vulnerabilities within FreeRTOS’s TCP/IP stack and in the AWS secure connectivity modules. The same vulnerabilities are present in WHIS Connect TCP/IP component for OpenRTOS\SafeRTOS.

Echo Barrier | Outdoor Sound Barrier | Acoustic Barrier Fence

Echo Barrier | Outdoor Sound Barrier | Acoustic Barrier Fence: Unique roll-up design for compact storage and transportation

Versipanel Portable Acoustical Wall for Offices and Studios

Versipanel Portable Acoustical Wall for Offices and Studios: These portable partition walls are constructed with acoustical ribbed fabric and heavy foam cores.

Is caller ID spoofing driving you nuts?� - The FCPA Blog - The FCPA Blog

Is caller ID spoofing driving you nuts? The FCPA Blog: The FCC says "spoofing" is when a caller deliberately falsifies the information transmitted to your caller ID display to disguise their identity.

How to Create a Successful Patron Campaign for Your Podcast | Podbean Podcast Blog

How to Create a Successful Patron Campaign for Your Podcast | Podbean Podcast Blog: Here are a few tips about setting up a great crowdfunding page:

Monday, November 19, 2018

International Programs - Totalization Agreement with the United Kingdom

International Programs - Totalization Agreement with the United Kingdom: If you don't wish to file a claim for benefits but would like more information about the agreement, write to:

International Programs - Totalization Agreement with the United Kingdom

International Programs - Totalization Agreement with the United Kingdom: The following table shows the various types of Social Security benefits payable under the U.S. and U.K. Social Security systems and briefly describes the eligibility requirements that normally apply for each type of benefit.

CERTIFICATE OF COVERAGE REQUEST FORM - Select the Request Form Type

CERTIFICATE OF COVERAGE REQUEST FORM - Select the Request Form Type: Please complete application forms as completely and accurately as possible.

International Programs- International Programs and Resources

International Programs- International Programs and Resources: The United States has bilateral Social Security agreements with 28 countries. The agreements improve benefit protection for workers who have divided their careers between the United States and another country.

Medicare coverage when living abroad - Medicare Interactive

Medicare coverage when living abroad - Medicare Interactive: Although Medicare does not typically cover medical costs you receive when you live abroad, you still need to choose whether to enroll in Medicare when you become eligible or to turn down enrollment.

Chondrodermatitis nodularis helicis: Symptoms and treatment

Chondrodermatitis nodularis helicis: Symptoms and treatment: a painful bump to develop on the top rim or helix of the ear or the curved piece of cartilage just inside, known as the antihelix.

Relapsing polychondritis | Genetic and Rare Diseases Information Center (GARD) – an NCATS Program

Relapsing polychondritis | Genetic and Rare Diseases Information Center (GARD) – an NCATS Program: The exact underlying cause of RP is unknown; however, scientists suspect that it is an autoimmune condition

Thursday, November 15, 2018

The Importance of Existential Intelligence – Awecademy – Medium

The Importance of Existential Intelligence – Awecademy – Medium: Asking questions — and asking good ones — is how we move forward as a species. It is the foundation of any major scientific discovery or existential breakthrough. It all starts with a question.

Playa Blanca, Tijuana, Baja California — Point2 Homes

Playa Blanca, Tijuana, Baja California — Point2 Homes: Another Playa Blanca feature is its location between Rosarito and Tijuana. It has its own highway ramp and is just 15 minutes south of the border with easy freeway access.

The Park At Malibu, Tijuana, Baja California — Point2 Homes

The Park At Malibu, Tijuana, Baja California — Point2 Homes: Halfway between Playas de Tijuana and Rosarito, you can walk to convenience store, restaurants, pizza, cafe, nail salon and of course San Antonio del Mar sandy beach.

Monday, November 12, 2018

Friday, November 9, 2018

Monday, November 5, 2018

Perception and action de-coupling in congenital amusia: sensitivity to task demands. - Goldsmiths Research Online

Perception and action de-coupling in congenital amusia: sensitivity to task demands. - Goldsmiths Research Online: we find evidence of a double dissociation: while a minority of amusics had lower (better) thresholds for production compared to perception of pitch, more than half showed the reverse pattern.

Reduced sensitivity to emotional prosody in congenital amusia rekindles the musical protolanguage hypothesis | PNAS

Reduced sensitivity to emotional prosody in congenital amusia rekindles the musical protolanguage hypothesis | PNAS: We examined sensitivity to emotion in speech prosody in a sample of individuals with congenital amusia, a neurodevelopmental disorder characterized by deficits in processing acoustic and structural attributes of music.

Cambridge Analytica, the Artificial Enemy and Trump's 'Big Lie'

"I was compelled by the UK Electoral Commission,
Information Commissioners Office and the Chair of the Digital, Culture, Media and Sport
Committee's Fake News Inquiry Damian Collins MP to submit information and research
relating to campaigns by SCL, Cambridge Analytica and other actors."

https://www.parliament.uk/documents/commons-committees/culture-media-and-sport/Dr%20Emma%20Briant%20Explanatory%20Essays.pdf

Academic research into the EU Referendum campaign and propaganda during conflicts.

The interviews transcribed below were conducted by Dr Emma L Briant, a Senior Lecturer at the
University of Essex, as part of academic research into the EU Referendum campaign and
propaganda during conflicts.



https://www.parliament.uk/documents/commons-committees/culture-media-and-sport/Dr%20Emma%20Briant%20Audio%20File%20Transcripts%20with%20links.pdf

Infused resumé

An Extremely Detailed Map of the 2016 Presidential Election - The New York Times

Waiting to see the 2018 version:

An Extremely Detailed Map of the 2016 Presidential Election - The New York Times

Sunday, November 4, 2018

Are Women More Ethical Than Men? | GGM

"Our research suggests that they are, quite simply, better at creating value through collaborative exchanges."
https://greatergood.berkeley.edu/article/item/are_women_more_ethical_than_men

Cyber attackers switching to covert tactics

Cyber attackers switching to covert tactics: "This indicates cyber criminals are shifting away from the quick payout of ransomware in favour of the slower, behind-the-scenes approach of stealing computing power to mine digital currency, the report said."

Tuesday, October 30, 2018

Cimetrics BACnet Explorer

Cimetrics BACnet Explorer: With “plug-and-play”, BACnet Explorer for BACnet/IP you can discover BACnet devices on connected networks. Connect Explorer to a BACnet Network and it will automatically discover and display a listing of all BACnet devices on that network.

Amazon Patched Multiple IoT Vulnerabilities Affecting Its Smart Devices

Amazon Patched Multiple IoT Vulnerabilities Affecting Its Smart Devices: "Recently, Amazon patched multiple IoT vulnerabilities present in its operating system for smart devices. The vulnerabilities could have allowed hackers to take complete control of the device and execute remote commands. These security flaws affected numerous smart home products of Amazon as well as its AWS modules."

Third Way Cyber Enforcement Initiative – Third Way

Sunday, October 28, 2018

The White House is wooing tech workers to do tours of duty in government - The Washington Post

The White House is wooing tech workers to do tours of duty in government - The Washington Post: The White House plans to convene technology giants including Amazon.com, Google, Microsoft and IBM on Monday and urge them to make it easier for their workers to leave behind their big paychecks and snazzy office perks and do brief tours of duty in government.

132 Women In Cybersecurity To Follow On Twitter

132 Women In Cybersecurity To Follow On Twitter: "The compilation started earlier this week with an inaugural list of 58 women in cybersecurity to follow on Twitter – including CISOs, IT security pros, cybersecurity company founders and CEOs, entrepreneurs, community organizers, investors, government workers, journalists, and more."

‘War for Talent’ Emerges Amid Skilled Workforce Shortage – WWD

‘War for Talent’ Emerges Amid Skilled Workforce Shortage – WWD: "The global survey found that 62 percent of respondents are “struggling to fill skilled roles” across the supply chain and, as a result, “fashion retailers, brands, manufacturers and vendors face a shortage of workers with key, specialized skills.""

Friday, October 26, 2018

Cybersecurity Needs Women: Here's Why

Cybersecurity Needs Women: Here's Why

Good quotes...

https://www.forbes.com/sites/laurencebradford/2018/10/18/cybersecurity-needs-women-heres-why/

TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers � TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers | FireEye Inc

TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers: "FireEye Intelligence assesses with high confidence that intrusion activity that led to deployment of TRITON was supported by the Central Scientific Research Institute of Chemistry and Mechanics (CNIIHM; a.k.a. ЦНИИХМ), a Russian government-owned technical research institution located in Moscow."

ICS Cyber Security | Protect Against Threats - Nozomi Networks

ICS Cyber Security | Protect Against Threats - Nozomi Networks: "The Nozomi Networks solution improves ICS cyber resiliency and provides real-time operational visibility. Major customers have improved reliability, cyber security and operational efficiency using our technology."

Thursday, October 25, 2018

The U.S. labor shortage is reaching a critical point

The U.S. labor shortage is reaching a critical point: "The Bureau of Labor Statistics reported that April closed with 6.7 million job openings."

Top Five Sectors Exposed to Labor Shortages in 2018 – Industry Insider

Top Five Sectors Exposed to Labor Shortages in 2018 – Industry Insider: "December 2017, a record 82.0% of builders reported labor shortages as a significant problem,"

Full text of Apple CEO Tim Cook's keynote in Brussels

Full text of Apple CEO Tim Cook's keynote in Brussels: "We are responsible, however, for recognizing that the devices we make and the platforms we build have real, lasting, even permanent effects on the individuals and communities who use them."

The pilot shortage isn't changing course. Here's how UPS plans to land new talent.

The pilot shortage isn't changing course. Here's how UPS plans to land new talent.
https://www.courier-journal.com/story/money/companies/2018/09/17/ups-pilot-shortage-new-training-program/1210341002

Airlines are desperate for pilots and it's causing route cancellations - Business Insider

Airlines are desperate for pilots and it's causing route cancellations - Business Insider
https://www.businessinsider.com/airlines-pilot-shortage-cancelled-routes-2018-8

Is America Facing a Labor Shortage? - The Atlantic

Is America Facing a Labor Shortage? - The Atlantic
https://www.theatlantic.com/amp/article/570649/

Wednesday, October 24, 2018

Security Manager - (Pacific Northwest) - Job ID: 666060 | Amazon.jobs

Security Manager - (Pacific Northwest) - Job ID: 666060 | Amazon.jobs: Managing a large guard force across multiple regions throughout – as well as serving in support roles to the global team

Some Cybersecurity Apps Could Be Worse for Privacy than Nothing at All

Skills gap stalls construction industry growth, report says | HR Dive

Aerospace Skills Gap: Workforce Declines, As Talent Needs Increase - Area Development

One Company’s Solution To The Widening Skills Gap

One Company's Solution To The Widening Skills Gap
https://chiefexecutive.net/one-companys-solution-widening-skills-gap/

Sunday, October 21, 2018

Is It “Techno-Chauvinist” & “Anti-Humanist” to Believe in the Transformative Potential of Technology?

Is It “Techno-Chauvinist” & “Anti-Humanist” to Believe in the Transformative Potential of Technology?: "technological advancement solves far more problems than it creates by helping to reduce hunger and disease, travel further, communicate more widely, gain leisure time, and so on." Adam Thierer

Thursday, October 18, 2018

GDPR matchup: The California Consumer Privacy Act 2018

GDPR matchup: The California Consumer Privacy Act 2018: In this installment, Lydia De La Torre, CIPP/US, compares the new California Consumer Privacy Act 2018 to the GDPR.

Data breach response plans are no longer optional for public practices. Here’s what yours needs. | INTHEBLACK

Data breach response plans are no longer optional for public practices. Here’s what yours needs. | INTHEBLACK: "Now that many small businesses are required to report and respond to a data breach – and do so within 30 days – it pays to have a response plan in place to protect client confidence and avoid reputational damage." Security down under...

Sunday, October 14, 2018

One-Third of US Adults Hit with Identity Theft

One-Third of US Adults Hit with Identity Theft: "One-third of adults in the United States have experienced identity theft, putting them far ahead of other nations. Thirty-three percent is double the global average and more than three times the rate of people in France and Germany."

Saturday, October 13, 2018

What is the difference between categorical, ordinal and interval variables?

What is the difference between categorical, ordinal and interval variables?: "In talking about variables, sometimes you hear variables being described as categorical (or sometimes nominal), or ordinal, or interval. Below we will define these terms and explain why they are important."

Everything You Need to Know about NERC CIP Compliance by Dave Millier, CRISC - security management, risk, risk management & compliance

Everything You Need to Know about NERC CIP Compliance by Dave Millier, CRISC - security management, risk, risk management & compliance: Within the industry of cybersecurity,there is a non-profit organization that ensures the reliability and security of bulk power transmission in north america (USA, Canada, and Mexico).

Welcome to Triumph Music | Production Music Library

Welcome to Triumph Music | Production Music Library: "Welcome to Triumph Music’s brand new website. We have been working with the best composers, graphic designers, web developers and Made Up Music to bring the audio visual community a production library like no other."

Features - Statistical Test Selector | Laerd Statistics

Features - Statistical Test Selector | Laerd Statistics: "It is common for students and researchers to collect good data, but report the wrong findings because they selected the incorrect statistical tests to analyse their data with."

Cloud Baby Monitor - Unlimited Range Video Baby Monitor

for iPhone, iPad, iPod touch, Mac, Apple TV, and Apple Watch
https://cloudbabymonitor.com/

LIRR to Jamaica and Airtrain: Best Way to Get to JFK

LIRR to Jamaica and Airtrain: Best Way to Get to JFK...
https://travelsort.com/lirr-to-jamaica-and-airtrain-best-way-to-get-to-jfk/

Track List | Triumph Music

Thursday, October 11, 2018

Pearson Correlation - SPSS Tutorials - LibGuides at Kent State University

Pearson Correlation - SPSS Tutorials - LibGuides at Kent State University:



'The magnitude, or strength, of the association is approximately moderate (.3 < | r | < .5)."

Weight and height have a statistically significant linear relationship (p < .001).

The direction of the relationship is positive (i.e., height and weight are positively correlated), meaning that these variables tend to increase together (i.e., greater height is associated with greater weight).

Table of Pearson Correlation output. Height and weight have a significant positive correlation (r=0.513, p < 0.001).

What is the difference between categorical, ordinal and interval variables?

What is the difference between categorical, ordinal and interval variables?: "A categorical variable (sometimes called a nominal variable) is one that has two or more categories, but there is no intrinsic ordering to the categories. For example, gender is a categorical variable having two categories (male and female) and there is no intrinsic ordering to the categories. Hair color is also a categorical variable having a number of categories (blonde, brown, brunette, red, etc.) and again, there is no agreed way to order these from highest to lowest. A purely categorical variable is one that simply allows you to assign categories but you cannot clearly order the variables. If the variable has a clear ordering, then that variable would be an ordinal variable, as described below."

Gender bias in health care may be harming women's health

Gender bias in health care may be harming women's health: From the way medicines are researched and tested, to the approach doctors take diagnosing and treating diseases, more and more research shows a bias against women in the health care system.

Wednesday, October 10, 2018

Email and Internet Voting: The Overlooked Threat to Election Security - Common Cause

Email and Internet Voting: The Overlooked Threat to Election Security - Common Cause: As state election officials grapple with the looming threat of cyberattack on election technology, there is a significant vulnerability that has been roundly ignored: transmission of ballots over the internet, including by email, fax and blockchain systems.

U.S. GAO - Weapon Systems Cybersecurity: DOD Just Beginning to Grapple with Scale of Vulnerabilities

U.S. GAO - Weapon Systems Cybersecurity: DOD Just Beginning to Grapple with Scale of Vulnerabilities: In recent cybersecurity tests of major weapon systems DOD is developing, testers playing the role of adversary were able to take control of systems relatively easily and operate largely undetected.

Monday, October 8, 2018

Realcomm

Realcomm: In 2018, big data business value will become a reality for many more building owners. This year will rapidly continue a trend of stepping up a level from chasing systems and features to focusing on enablement, catalysts, and business value.

Exposing the Power Vampires in Self-Driving Cars - IEEE Spectrum

Tuesday, October 2, 2018

Facebook pulls its Onavo Protect VPN app from Apple's App Store

Facebook pulls its Onavo Protect VPN app from Apple's App Store: "However, it reportedly violated Apple’s guidelines for apps, which don’t allow them to gather user data into databases and sell it to third parties. It also came under fire for running analytics on the traffic that it routed through its servers as part of its VPN service – which amounted to another way to collect information on users’ activity."

Tuesday, September 18, 2018

Cyber criminals outspend businesses in cyber security battle

Cyber criminals outspend businesses in cyber security battle: "Cyber criminals are spending 10 times more money finding weaknesses in the cyber defences of organisations than the organisations they target are spending on protecting against attack." Really?

Businesses collect more data than they can handle, only half know where sensitive data is stored - Help Net Security

Businesses collect more data than they can handle, only half know where sensitive data is stored - Help Net Security: 65% are unable to analyze all the data they collect and only 54% of companies know where all of their sensitive data is stored.

Healthcare Data Presents Lucrative Target for Cyberattackers

Healthcare Data Presents Lucrative Target for Cyberattackers: "The healthcare industry will remain one of the most targeted sectors by cyberattackers because of its valuable healthcare data"

Continental Automated Buildings Association

Contact Us - the Continental Automated Buildings Association.

(26) IoT and smart buildings and cities (Part 2, the downside) | LinkedIn

(26) IoT and smart buildings and cities (Part 2, the downside) | LinkedIn: As exciting as smart cities and buildings sound, and as big as the market is projected to grow, the path into this promising future will be bumpy.

Techno-chauvinism or just dumb

Installing and Running Elasticsearch | Elasticsearch: The Definitive Guide [2.x] | Elastic

Installing and Running Elasticsearch | Elasticsearch: The Definitive Guide [2.x] | Elastic: The only requirement for installing Elasticsearch is a recent version of Java. Preferably, you should install the latest version of the official Java from www.java.com.

Research reveals four distinct personality clusters

Research reveals four distinct personality clusters... OCEAN

https://www.medicalnewstoday.com/articles/323092.php

NPR/Marist Poll Results September 2018: Election Security

Thursday, September 6, 2018

Elechouse, Arduino Play House

Elechouse, Arduino Play House Proxmark thingie...

http://www.elechouse.com/elechouse/

Fighting ransomware with network segmentation as a path to resiliency - Help Net Security

Fighting ransomware with network segmentation as a path to resiliency - Help Net Security: 'Organization can achieve network resiliency and survivability through a strategy embracing network segmentation in general, and micro-segmentation in particular."

Defeat Ransomware Attacks with Network Segmentation | BlackRidge

Defeat Ransomware Attacks with Network Segmentation | BlackRidge: "when attack software has sneaked its way through your firewall and is ravaging your critical systems — you're going to wish you had built internal segmentation into the network"

Wednesday, September 5, 2018

CyberEdge 2018 Cyberthreat Defense Report | CyberEdge Group

CyberEdge 2018 Cyberthreat Defense Report | CyberEdge Group: download CyberEdge’s fifth-annual Cyberthreat Defense Report – a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries

Scammers pose as CNN's Wolf Blitzer, target security professionals | CSO Online

Scammers pose as CNN's Wolf Blitzer, target security professionals | CSO Online: "The person responsible for the text messages pretends to be CNN's Wolf Blitzer, and offers security professionals $300,000 yearly to come on to "The Situation Room with Wolf Blitzer" and act as security commentators. All the victim needs to do is pay $3,000 via Western Union to get security clearance and approval."

Monday, September 3, 2018

How NotPetya ransomware used legitimate tools to move laterally

How NotPetya ransomware used legitimate tools to move laterally: "demonstrated the abuse of legitimate tools to extend network penetration. Referred to as living off the land, this strategy offers several advantages to the attacker,"

Saturday, September 1, 2018

Litigating the Implied Covenant of Good Faith

Litigating the Implied Covenant of Good Faith: "The cases are challenging to both win and defend, and the results are unpredictable because the parties did not expressly contract to limit their risk."

Exceptions to At-Will Employment in California

Exceptions to At-Will Employment in California: "At-will employment is employment that either party (employer or employee) can terminate at any time, for any reason or no reason at all."

Friday, August 31, 2018

Securing Remote Desktop (RDP) for System Administrators | Information Security and Policy

Securing Remote Desktop (RDP) for System Administrators | Information Security and Policy: "By setting your computer to lock an account for a period of time after a number of incorrect guesses, you will help prevent hackers from using automated password guessing tools from gaining access to your system (this is known as a "brute-force" attack)."

Ex-hacker launches blockchain powered cyber security solution

Thursday, August 30, 2018

Vladimir Putin and Donald Trump's great success in exploiting the rise of nationalist Christianity

Vladimir Putin and Donald Trump's great success in exploiting the rise of nationalist Christianity

https://theconversation.com/amp/vladimir-putin-and-donald-trumps-great-success-in-exploiting-the-rise-of-nationalist-christianity-92963

Blog This! for Google Sites - Google Product Forums

Blog This! for Google Sites - Google Product Forums: "not only did it stop working but the Blog This! button mysteriously disappeared from my chrome browser."

Diplomacy in Cyberspace

Diplomacy in Cyberspace: "Because cyberspace threats are almost always international, as is the technology itself, an unprecedented level of international coordination, engagement and cooperation is required both to counter threats and to embrace and drive the economic and social opportunities that cyberspace offers."

Wednesday, August 29, 2018

Tuesday, August 28, 2018

When multi-factor will not save you by Michalis Kamprianis

When multi-factor will not save you by Michalis Kamprianis - password, passwords, course | Peerlyst: There is a lot of discussion lately about multi-factor authentication and how this will upgrade everyone’s security. Indeed, it is an improvement and it was about time we start becoming more conscious about the security issues related to authentication.

Wednesday, August 22, 2018

Monday, August 20, 2018

Digital shadows: dark market report

digital shadows: Read this report to learn why businesses and consumers are still at risk after Operation Bayonet:

Amazon’s facial recognition matched 28 members of Congress to criminal mugshots - The Verge

Amazon’s facial recognition matched 28 members of Congress to criminal mugshots - The Verge: The test also showed indications of racial bias, a long-standing problem for many facial recognition systems. 11 of the 28 false matches misidentified people of color (roughly 39 percent), including civil-rights leader Rep. John Lewis (D-GA) and five other members of the Congressional Black Caucus.

Predatory journals aren't just a scam: they're also how quacks and corporate shills sciencewash their bullshit / Boing Boing

Predatory journals aren't just a scam: they're also how quacks and corporate shills sciencewash their bullshit / Boing Boing: Inside the Fake Science Factory (German/English subtitles) documents Svea Eckert and team's years of investigation into predatory journals and the criminals behind them.

Bogus journals being used to publish fake science – Naked Security

Bogus journals being used to publish fake science – Naked Security: OMICS does not tell researchers that they must pay significant publishing fees until after it has accepted an article for publication, and often will not allow researchers to withdraw their articles from submission, thereby making the research ineligible for publication in another journal.

Tuesday, August 14, 2018

Tests | Music, Sound and Performance Lab

Tests | Music, Sound and Performance Lab: The first part is to characterise and compare two disorders of music and language (Congenital Amusia and Dyslexia)

The 16 best free GarageBand plugins | TechRadar

The 16 best free GarageBand plugins | TechRadar: Once in GarageBand, you can access your AU plugins by creating a software instrument track, then clicking on the "Edit" tab in the right-hand Track Info column (see left image).

Video: Fake Science (English subtitles) - Reportage & Documentation

Video: Fake Science (English subtitles) - Reportage & Documenntation:  It's a science scandal that affects us all - an academic illusory world: increasingly poor or even falsified studies are given the appearance of being scientific. This has dangerous consequences."

Most Common Cryptocurrency Scam Methods All Investors & Traders Should Know

Most Common Cryptocurrency Scam Methods All Investors & Traders Should Know: In this article we will be writing about the most common types of fraudulent activities that affected the community.

Monday, August 13, 2018

The unsung story of amusia – The Brain Bank North West

The unsung story of amusia – The Brain Bank North West: More colloquially called “tone deafness”, approximately 4% of the population suffer from amusia.

Tone Deafness: A Broken Brain? - The Atlantic

Tone Deafness: A Broken Brain? - The Atlantic: It's been difficult for researchers to get over the idea that, with enough exposure to music, people born with amusia might somehow learn to listen. But even as music has become even more pervasive (think iPods), the condition persists.

Defending Science - Dr Nick - The Incrementalist

Defending Science - Dr Nick - The Incrementalist: The harm from these publications extends far beyond the individual papers and authors financial loss for the cost of publishing and attendance.

The Genetics of Congenital Amusia (Tone Deafness): A Family-Aggregation Study

The Genetics of Congenital Amusia (Tone Deafness): A Family-Aggregation Study: Congenital amusia (commonly known as “tone deafness”) is a lifelong impairment of music perception that affects 4% of the population.

Wednesday, August 8, 2018

Endpoint security suites must have these features | CSO Online

Endpoint security suites must have these features | CSO Online: "New endpoint security technologies tended to come in one of two areas. Advanced prevention tools added new techniques for detecting malware that bypassed AV signatures. Many of these tools also contained anti-exploit technologies for detecting and blocking common memory exploits and/or attacks against common applications like browsers."

Fighting ransomware with network segmentation as a path to resiliency - Help Net Security

Fighting ransomware with network segmentation as a path to resiliency - Help Net Security: Organization can achieve network resiliency and survivability through a strategy embracing network segmentation in general, and micro-segmentation in particular.

Tuesday, August 7, 2018

Monday, August 6, 2018

Sunday, August 5, 2018

Top 5 - Most Affordable - Portland Suburbs : Real Estate Agent PDX

Top 5 - Most Affordable - Portland Suburbs : Real Estate Agent PDX: If you don’t mind a bit of airplane traffic noise and want to be reasonably close to the heart of Portland, check out the neighborhoods east of 205 in Northeast Portland. Parkrose, Argay, Parkrose Heights, and Russel all have median home values similar to the more far-flung suburbs mentioned here.

iPhone supplier TSMC shut down factories after virus attack - The Verge

Wednesday, August 1, 2018

OP0182 Gout and dementia in the elderly: a medicare claims study | Annals of the Rheumatic Diseases

OP0182 Gout and dementia in the elderly: a medicare claims study | Annals of the Rheumatic Diseases: a large French population-based study in the elderly (65 years or older) showed that hyperuricemia was associated with a higher risk of dementia and with MRI changes of ageing in the brain

Tuesday, July 31, 2018

SMB Cyber Attacks | Hackers Now Prefer Targeting SMBs vs. Enterprise Companies | Pivot Point Security

SMB Cyber Attacks | Hackers Now Prefer Targeting SMBs vs. Enterprise Companies | Pivot Point Security:

Information Security Practices Missing in Many Small Businesses:

1. Data backups

2. Security awareness training

3. Patch and configuration management

4. Incident response planning

The Biggest Threat to SMBs are Cyber Attacks - Jive Resource Center

The Biggest Threat to SMBs are Cyber Attacks - Jive Resource Center: But it’s a dangerous mindset to think that mom and pop stores and SMBs are safe. In fact, it’s critical that all SMBs invest in some form of cybersecurity in 2018.

Your SMB Is At Risk: 10 Cyber-security Trends to Watch Out For In 2018 - Netcetera

Your SMB Is At Risk: 10 Cyber-security Trends to Watch Out For In 2018 - Netcetera: Malicious exploits and ransomware demands are just a few of the many challenges facing businesses this year, but even though 62% of all attacks hit SMBs, most small to medium enterprises are still not adequately prepared.

AbbVie, Pfizer drive 2017 pharma TV ad spending above 2016's tally | FiercePharma

https://www.fiercepharma.com/marketing/pharma-tv-ad-spending-tops-2016-tally-abbvie-and-pfizer-brands-lead

1. AbbVie's Humira: $341 million
2. Pfizer's Lyrica: $216 million
3. Pfizer's Xeljanz: $167 million
4. Eli Lilly's Trulicity: $145 million
5. Pfizer and Bristol-Myers Squibb's Eliquis: $142 million
6. Merck's Keytruda: $127 million
7. Bayer and Johnson & Johnson's Xarelto: $120 million
8. Eli Lilly's Taltz: $116 million
9. GlaxoSmithKline's Breo: $103 million
10. Novartis' Cosentyx: $100 million
11. Novo Nordisk's Victoza: $98 million
12. AstraZeneca's Farxiga: $87.4 million
13. Boehringer Ingelheim and Eli Lilly's Jardiance: $86.9 million
14. Bristol-Myers Squibb: Opdivo: $82 million
15. Celgene's Otezla: $78 million
16. Gilead's Harvoni: $75 million
17. Allergan's Linzess: $73 million
18. Novartis' Entresto: $71 million
19. Otsuka and Lundbeck's Rexulti: $69 million
20. Johnson & Johnson's Invokana: $63 million

Thursday, July 26, 2018

These are the websites your clean-install Windows PC connects to by itself - MSPoweruser

These are the websites your clean-install Windows PC connects to by itself - MSPoweruser: Since the release of Windows 10, Microsoft has been accused of breaching privacy and connecting users to services without proper disclosure.

Dual Nationality

Dual Nationality: U.S. nationals, including dual nationals, must use a U.S. passport to enter and leave the United States.�Dual nationals may also be required by the foreign country to use its passport to enter and leave that country. Use of the foreign passport to travel to or from a country other than the United States is not inconsistent with U.S. law.��

7 Simple Steps to Help You Shoot an Interview

7 Simple Steps to Help You Shoot an Interview: Topics discussed include assessing the physical space, any ambient and/or lighting considerations, setting up lights and the types of lights you might want to use,’

Scientists Have Found a Disturbing Link Between Suicide Rates And Climate Change