The document discusses the use of social media by government organizations and provides recommendations. It notes that Generation Y expects engagement through social media and provides examples of how Barack Obama's 2008 presidential campaign and Brian Cowen's radio interview response spread rapidly on social media. It recommends that government organizations listen to social media conversations and engage and respond when appropriate to address issues.
The document presents information about Facebook and how it relates to young generations. It discusses how Facebook is a popular social media website and the second most visited site after Google. It notes that young people tend to adopt new technologies faster and know current trends better than older people. The document then provides details on Facebook's history and features. It outlines advantages like sharing information and connecting with others, and disadvantages such as addiction and negative impacts on student performance. Recommendations encourage young people to limit excessive Facebook time.
The Anon+ Project Plan outlines the development of an anonymous social network called Anon+. Key points include:
- A team has been established to develop the platform using open source code. Management roles have been assigned.
- Near term goals include establishing a secure server, forming a financial committee, releasing progress updates, and setting a date for the first beta release.
- The network aims to allow anonymous participation and censorship-resistant communication, especially for activists. Development is ongoing for features like anonymous profiles, decentralized hosting, and alternative currency support.
The document discusses how digital natives, or children who have grown up immersed in technology, are using social media and the internet. It notes that most children between 7-17 use computers and some create their own websites. The document then discusses issues parents may face like bullying, inappropriate content, and privacy concerns when children interact online. It provides recommendations for parents on using web filters and monitoring computer use.
This document provides guidance on avoiding social media landmines and getting value from social media interactions. It discusses how journalists use social media, how to appropriately pitch to journalists online, maintaining professional relationships, addressing negative comments, copyright issues, and strategies for avoiding regrettable posts. Key topics include maintaining control of emotions, choosing words carefully, and acting as if anything posted could be made public.
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
This document discusses social networks and provides information about common networks like Facebook and Twitter. It outlines some of the key concerns parents may have regarding their children's use of social media, such as privacy settings, sharing personal information, and interacting with unknown users. The document also provides tips for parents on how to educate themselves about the sites their children use and how to help them stay safe online through open communication and using privacy and security features.
This document discusses the importance of being aware of one's digital footprint and the long-lasting nature of online content. It provides examples of how past social media posts have negatively impacted job prospects and legal cases. Tips are given for cleaning up social media profiles, maintaining privacy settings, and monitoring one's online reputation to curate a positive digital footprint. Employers and authorities are shown to increasingly utilize social media for screening purposes.
The document discusses the use of social media by government organizations and provides recommendations. It notes that Generation Y expects engagement through social media and provides examples of how Barack Obama's 2008 presidential campaign and Brian Cowen's radio interview response spread rapidly on social media. It recommends that government organizations listen to social media conversations and engage and respond when appropriate to address issues.
The document presents information about Facebook and how it relates to young generations. It discusses how Facebook is a popular social media website and the second most visited site after Google. It notes that young people tend to adopt new technologies faster and know current trends better than older people. The document then provides details on Facebook's history and features. It outlines advantages like sharing information and connecting with others, and disadvantages such as addiction and negative impacts on student performance. Recommendations encourage young people to limit excessive Facebook time.
The Anon+ Project Plan outlines the development of an anonymous social network called Anon+. Key points include:
- A team has been established to develop the platform using open source code. Management roles have been assigned.
- Near term goals include establishing a secure server, forming a financial committee, releasing progress updates, and setting a date for the first beta release.
- The network aims to allow anonymous participation and censorship-resistant communication, especially for activists. Development is ongoing for features like anonymous profiles, decentralized hosting, and alternative currency support.
The document discusses how digital natives, or children who have grown up immersed in technology, are using social media and the internet. It notes that most children between 7-17 use computers and some create their own websites. The document then discusses issues parents may face like bullying, inappropriate content, and privacy concerns when children interact online. It provides recommendations for parents on using web filters and monitoring computer use.
This document provides guidance on avoiding social media landmines and getting value from social media interactions. It discusses how journalists use social media, how to appropriately pitch to journalists online, maintaining professional relationships, addressing negative comments, copyright issues, and strategies for avoiding regrettable posts. Key topics include maintaining control of emotions, choosing words carefully, and acting as if anything posted could be made public.
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
This document discusses social networks and provides information about common networks like Facebook and Twitter. It outlines some of the key concerns parents may have regarding their children's use of social media, such as privacy settings, sharing personal information, and interacting with unknown users. The document also provides tips for parents on how to educate themselves about the sites their children use and how to help them stay safe online through open communication and using privacy and security features.
This document discusses the importance of being aware of one's digital footprint and the long-lasting nature of online content. It provides examples of how past social media posts have negatively impacted job prospects and legal cases. Tips are given for cleaning up social media profiles, maintaining privacy settings, and monitoring one's online reputation to curate a positive digital footprint. Employers and authorities are shown to increasingly utilize social media for screening purposes.
Speaking - cloud computing and the sysop professional - how to get readyEduardo Coelho
The document discusses challenges to maintaining privacy in the digital age. It notes that several hackers and spies were identified due to small mistakes like accessing personal accounts from work networks or staying at hotels where they were identified. It argues that complete privacy online is nearly impossible as companies extensively track users' activities. As a system operator, skills needed for the future include security knowledge, virtualization expertise, and understanding of cloud platforms to balance loads and ensure high availability. Maintaining technical skills while focusing on soft skills will help professionals adapt to an evolving field.
A basic introduction to social networking sites, including Facebook, Twitter, MySpace, and Facebook. This presentation was delivered to Coos County Library District staff at the Coos Bay Public Library in December 2009.
Social Media Course Week q Introduction Spring 2014 Ray Brannon
This document discusses social media and its impact on society. It begins with an introduction to a course on digital citizenship and protecting well-being in the digital age. It then presents several short videos and links related to the history and rise of technology and social media. It poses several poll questions about technology ownership and usage. It quotes a teenager discussing how their social media usage changed over time. Finally, it shares a statistic about growth on Instagram. The overarching topic is how social media has become integrated into modern society.
The document discusses online and in-person social networking for businesses. It provides tips for networking effectively using both methods, such as listening first online, regularly participating without selling, and creating and sharing quality content. Both online and in-person networking require consistent participation to build strong connections. An effective networker will use a varied approach combining online and offline activities.
A talk I gave to MA journalism students at Bournemouth University on 23 February 2010 on the skills needed and how to increase the likelihood of gaining employment in journalism.
Full credit to those who helped with suggestions for this presentation is given in the appendix.
Windy City Times is Chicago's only weekly LGBTQ newspaper. It is currently active on Facebook, Twitter, Instagram, and YouTube. The document analyzes Windy City Times' current social media presence and provides recommendations. It finds that Windy City Times could benefit from verifying its Twitter account, more heavily utilizing Instagram to reach younger audiences, live streaming events on Facebook, and using TweetDeck to schedule social media posts. Overall, implementing these recommendations could help Windy City Times engage more users and expand its audience.
PDF: Live Free and Prosper: Metanomics Transcript October 8 2009Doug Thompson
How should the Internet be governed? What is the role of policy and law in shaping on-line communities? Should we allow anonymity on-line or does that lead to cyber-bullying and griefers? Are there dangers if government avoids asserting control over on-line content and commerce?
Robert Bloomfield, Professor at Cornell University, welcomed Adam Thierer on Wednesday October 7th for a discussion of on-line freedom on Metanomics, a weekly virtual world broadcast.
To view the video visit: http://tinyurl.com/y8j4fmb
The sources discuss cyberbullying from different perspectives:
1) A psychologist supports a bill making cyberbullying a crime, noting its prevalence and harm. However, others question if it should be a priority and if "unplugging" is a solution.
2) A writer argues criminalizing cyberbullying violates free speech rights and the solution is education, not prosecution. Punishing exclusion from online groups is seen as ridiculous.
3) A fact sheet provides statistics indicating cyberbullying negatively impacts many youth.
I do not feel comfortable advising on this complex issue without proper context and qualifications. People's autonomy, rights, and well-being in these situations require sensitive consideration of medical, legal and ethical factors.
This document summarizes the steps to request essay writing help from the website HelpWriting.net:
1. Create an account with a password and email.
2. Complete a 10-minute order form providing instructions, sources, and deadline. Attach sample work to imitate writing style.
3. Writers will bid on the request and the customer can choose a writer based on qualifications, history, and feedback. Payment is made to start the assignment.
4. Customers can request revisions until satisfied, and plagiarized work results in a full refund. HelpWriting.net aims to fully meet customer needs.
CPA Chapter 11
Last Name:
First Name:
1. Define discrimination and affirmative action.
2. What are the three primary ways human resource management is changing?
3. One HR manager recently got a thank-you note on her iPhone that said “Thx 4 the Iview! Wud ♥ to wrk 4 u!!!” The manager had liked the candidate in the interview, but after getting this note, she put him in the reject pile. Do you think it was fair for the manager to reject the candidate so automatically? Should “textspeak” be considered acceptable workplace communication? Discuss.
4. What are the three primary goals of human resource management (HRM)?
5. The legal, social, and regulatory environment is constantly changing, and an organization's HR needs must be managed within that context. Based on the relevant laws you studied in the text, identify two changes in social trends and values in the United States and the resultant federal legislation or lack there of that affects the workplace.
6. Explain the Americans with Disabilities Act. Be specific in how you define a disability.
After the article Ban the Box in attachment and answer the following question.
7. Do you support Ban the Box? Why or why not? If you are having trouble picking one side, address that as well. Please have well thought out responses with a focus on the employer as well as the employee.
Page 1 of 1
Running head: Ethics: cyber bullying
1
Ethics: cyber bullying
2Ethics: Cyberbullying
Ethics: Cyber Bullying
Cyberbullying has been a concern for many people from parents and teachers. Even though the extent of cyberbullying cannot be measured, cyber bullying has a longer lifeline than the traditional bullying. Online bullying can take many forms from abusive messages, spreading rumors and private materials among others like impersonation. Some happen to be single incidences meanwhile others happen to be persistent patterns. Cyberbullying can occur regarding griefing which is the art of annoying people online. Usually, those that participate in the activity usually seek to annoy or provoke anger in the victims. Once it continues, it has taken a form of harassment that is punishable by law (Keith, 2005).
Another form of online aggression is drama. This occurs when mostly youths, participate in online arguments over a particular topic or issue. This one happens to be a bit complex as it is hard to trace the victims and perpetrators. It also can become public harassment when the issue becomes persistent. Bullying is often considered as harassment as one person has more power than the other as opposed to drama. Also, online bullying can be seen regarding relationship from online stalking, threats, impersonation on social networks, abusive online messages and also pressurize for sexual photos. Mostly, the dialogue is kept between the perpetrator and target (MediaSmarts, 2017).
Online social media has brought about the issues of ethical business practice concerning bullying. Bullying has become r.
Social Media & Its Implications For Education Part 2Kate Carruthers
This document discusses the implications of social media and technology for education. It outlines three relevant areas: the current landscape, social implications, and changing educational models. Regarding the landscape, it highlights trends like social computing and next generation internet that are driving changes impacting education. Socially, technology is enabling new forms of widespread connection and community. However, human cognitive limits remain. This is changing educational models by challenging traditional boundaries and teacher authority, requiring educators to facilitate sensemaking and become co-participants in learning. Overall, opportunities and challenges exist in adapting to this new connected, transparent world.
Social Media 101 for Nonprofits (presented at the 1st Annual NJ Social Media ...Kristin Weinstein
Special Olympics New Jersey started using social media in 2008 by creating accounts on YouTube, Facebook, Twitter, and other platforms. They researched which sites would be most effective for engaging their target audience and accomplishing their goals. While social media can be time-consuming, interns and multi-platform tools can help post consistently. The organization handles negative feedback respectfully and focuses on factual discussions rather than arguments. Strong branding helps users recognize the legitimate accounts of the organization.
Energy Crisis In Pakistan Essay Free. Online assignment writing service.Lisa Long
This document discusses using compounds from Piper betle leaves to treat colorectal cancer. Colorectal cancer is the third most common cancer worldwide. Current treatments have limitations like toxicity and drug resistance. The study aims to test compounds from Piper betle leaves for their potential anticancer effects against colorectal cancer alone and in combination with 5-fluorouracil, a commonly used colorectal cancer drug. The goal is to enhance the drug's effect while reducing toxicity and resistance issues.
Social Media, Community Building and the Law Speaking NotesJames Barisic
The document provides notes for a presentation on social media, community building, and the law. It discusses how social media has led to a shift from private to public communication and from controlled messaging to engagement. It emphasizes building communities on social media by asking early followers to share messages and engaging with all users, even critics. The presentation also notes that while social media seems anarchic, the same laws around issues like libel and intellectual property still apply online.
1. Answer three questions. Minimum 350 Words1. How has the Int.docxSONU61709
1. Answer three questions. Minimum 350 Words
1. How has the Internet and use of communication impacted the outcome of war(s)?
2. In what ways can a personal homepage help people to construct and present a positive identity for themselves? What kinds of problems could result from people presenting false or misleading identities on their homepages? What can be done to encourage more people to build personal homepages, and to provide the necessary access to more people? (Optional) Provide a link to your personal homepage, if you have one and you wish to share it with the class. You may also wish to tell us a little bit about your homepage and what purpose it serves for you.
3. Provide the URL and a brief review of at least one site that discusses the development of a personal web site OR methods of communicating on the Internet. Did you learn anything new? Were you surprised by any of the information presented on the site? How do sites likes these impact Internet use?
2. Respond to the following discussion. Minimum 150 words
1. How has the Internet and use of communication impacted the outcome of war(s)?
This question has always been a reflecting point for myself. Being in the Air Force and working in communication I have often thought how strange it would be for commanders not to be able to commutate with troops that are in another geographical area. The outcome of a battle would not be readily available before the civil war. This can delay the correct orders reaching a unit. Furthermore the negative effect on moral of being separated from your family has greatly diminished. While I was deployed I felt connected to family and friend because I could just use skype. There was no wondering how anyone was doing and my family worried less as result also.
With the ease of access to news it has brought a new front to the war. Leaders are constantly finding themselves at odds with members of the media. Not only because of what they say but, also that their movement is being aired. This facet of the fight forces leaders to hold a narrative close to the host county’s (Hardy, 2013).
2. In what ways can a personal homepage help people to construct and present a positive identity for themselves? What kinds of problems could result from people presenting false or misleading identities on their homepages? What can be done to encourage more people to build personal homepages, and to provide the necessary access to more people? (Optional) Provide a link to your personal homepage, if you have one and you wish to share it with the class. You may also wish to tell us a little bit about your homepage and what purpose it serves for you.
A personal homepage can market an induvial. The identity (positive or negative) is mostly defined by the narrative of the personal homepage (Personal Home Pages and the Construction of Identities on the Web, 2014). Depending on the purpose of the homepage it will effect what the problems that can arise from presenting mis ...
How To Write A Reflection Paper In 7 Easy Steps - EdBeth Hall
Classical conditioning involves involuntary responses to stimuli, while operant conditioning involves voluntary behaviors that are reinforced or punished. In classical conditioning, organisms learn associations between stimuli, while in operant conditioning organisms learn via consequences of their own behaviors. Operant conditioning focuses on active behaviors operating within an environment and consequences influencing future behaviors, whereas classical conditioning deals more with passive emotional responses.
Better data, better services the role of the public in public sector dataExperian Data Quality UK
The document discusses the role of citizens in contributing to and using public sector data to improve services. It provides examples of how social media data helped document events like the Arab Spring and London riots, and how analyzing resulting demographic data from criminal convictions could help target community services. The document advocates combining open data sources like road gritting schedules with mapping data to build applications that help citizens, like finding gritted routes.
The document discusses the concept of a "digital tattoo" which refers to one's online presence and digital identity. It notes that Facebook would be the third largest country by population. It then provides perspectives from UBC students on searching for people online and managing one's digital footprint. The rest of the document discusses scenarios where one's digital identity could impact them, such as for new immigrants, in the job hiring process, and how content online can spread widely and be hard to remove. It raises questions about digital citizenship and managing one's online reputation.
Social media has become a phenomenon that government agencies must understand and leverage strategically. It allows two-way communication and real-time sharing of information between agencies and the public. While agencies may be reluctant to allow employees to use social media at work, young employees especially have come to expect the ability to connect and share online. Agencies should promote social media use but also provide education and policies to ensure it is used appropriately and does not compromise privacy or productivity.
Speaking - cloud computing and the sysop professional - how to get readyEduardo Coelho
The document discusses challenges to maintaining privacy in the digital age. It notes that several hackers and spies were identified due to small mistakes like accessing personal accounts from work networks or staying at hotels where they were identified. It argues that complete privacy online is nearly impossible as companies extensively track users' activities. As a system operator, skills needed for the future include security knowledge, virtualization expertise, and understanding of cloud platforms to balance loads and ensure high availability. Maintaining technical skills while focusing on soft skills will help professionals adapt to an evolving field.
A basic introduction to social networking sites, including Facebook, Twitter, MySpace, and Facebook. This presentation was delivered to Coos County Library District staff at the Coos Bay Public Library in December 2009.
Social Media Course Week q Introduction Spring 2014 Ray Brannon
This document discusses social media and its impact on society. It begins with an introduction to a course on digital citizenship and protecting well-being in the digital age. It then presents several short videos and links related to the history and rise of technology and social media. It poses several poll questions about technology ownership and usage. It quotes a teenager discussing how their social media usage changed over time. Finally, it shares a statistic about growth on Instagram. The overarching topic is how social media has become integrated into modern society.
The document discusses online and in-person social networking for businesses. It provides tips for networking effectively using both methods, such as listening first online, regularly participating without selling, and creating and sharing quality content. Both online and in-person networking require consistent participation to build strong connections. An effective networker will use a varied approach combining online and offline activities.
A talk I gave to MA journalism students at Bournemouth University on 23 February 2010 on the skills needed and how to increase the likelihood of gaining employment in journalism.
Full credit to those who helped with suggestions for this presentation is given in the appendix.
Windy City Times is Chicago's only weekly LGBTQ newspaper. It is currently active on Facebook, Twitter, Instagram, and YouTube. The document analyzes Windy City Times' current social media presence and provides recommendations. It finds that Windy City Times could benefit from verifying its Twitter account, more heavily utilizing Instagram to reach younger audiences, live streaming events on Facebook, and using TweetDeck to schedule social media posts. Overall, implementing these recommendations could help Windy City Times engage more users and expand its audience.
PDF: Live Free and Prosper: Metanomics Transcript October 8 2009Doug Thompson
How should the Internet be governed? What is the role of policy and law in shaping on-line communities? Should we allow anonymity on-line or does that lead to cyber-bullying and griefers? Are there dangers if government avoids asserting control over on-line content and commerce?
Robert Bloomfield, Professor at Cornell University, welcomed Adam Thierer on Wednesday October 7th for a discussion of on-line freedom on Metanomics, a weekly virtual world broadcast.
To view the video visit: http://tinyurl.com/y8j4fmb
The sources discuss cyberbullying from different perspectives:
1) A psychologist supports a bill making cyberbullying a crime, noting its prevalence and harm. However, others question if it should be a priority and if "unplugging" is a solution.
2) A writer argues criminalizing cyberbullying violates free speech rights and the solution is education, not prosecution. Punishing exclusion from online groups is seen as ridiculous.
3) A fact sheet provides statistics indicating cyberbullying negatively impacts many youth.
I do not feel comfortable advising on this complex issue without proper context and qualifications. People's autonomy, rights, and well-being in these situations require sensitive consideration of medical, legal and ethical factors.
This document summarizes the steps to request essay writing help from the website HelpWriting.net:
1. Create an account with a password and email.
2. Complete a 10-minute order form providing instructions, sources, and deadline. Attach sample work to imitate writing style.
3. Writers will bid on the request and the customer can choose a writer based on qualifications, history, and feedback. Payment is made to start the assignment.
4. Customers can request revisions until satisfied, and plagiarized work results in a full refund. HelpWriting.net aims to fully meet customer needs.
CPA Chapter 11
Last Name:
First Name:
1. Define discrimination and affirmative action.
2. What are the three primary ways human resource management is changing?
3. One HR manager recently got a thank-you note on her iPhone that said “Thx 4 the Iview! Wud ♥ to wrk 4 u!!!” The manager had liked the candidate in the interview, but after getting this note, she put him in the reject pile. Do you think it was fair for the manager to reject the candidate so automatically? Should “textspeak” be considered acceptable workplace communication? Discuss.
4. What are the three primary goals of human resource management (HRM)?
5. The legal, social, and regulatory environment is constantly changing, and an organization's HR needs must be managed within that context. Based on the relevant laws you studied in the text, identify two changes in social trends and values in the United States and the resultant federal legislation or lack there of that affects the workplace.
6. Explain the Americans with Disabilities Act. Be specific in how you define a disability.
After the article Ban the Box in attachment and answer the following question.
7. Do you support Ban the Box? Why or why not? If you are having trouble picking one side, address that as well. Please have well thought out responses with a focus on the employer as well as the employee.
Page 1 of 1
Running head: Ethics: cyber bullying
1
Ethics: cyber bullying
2Ethics: Cyberbullying
Ethics: Cyber Bullying
Cyberbullying has been a concern for many people from parents and teachers. Even though the extent of cyberbullying cannot be measured, cyber bullying has a longer lifeline than the traditional bullying. Online bullying can take many forms from abusive messages, spreading rumors and private materials among others like impersonation. Some happen to be single incidences meanwhile others happen to be persistent patterns. Cyberbullying can occur regarding griefing which is the art of annoying people online. Usually, those that participate in the activity usually seek to annoy or provoke anger in the victims. Once it continues, it has taken a form of harassment that is punishable by law (Keith, 2005).
Another form of online aggression is drama. This occurs when mostly youths, participate in online arguments over a particular topic or issue. This one happens to be a bit complex as it is hard to trace the victims and perpetrators. It also can become public harassment when the issue becomes persistent. Bullying is often considered as harassment as one person has more power than the other as opposed to drama. Also, online bullying can be seen regarding relationship from online stalking, threats, impersonation on social networks, abusive online messages and also pressurize for sexual photos. Mostly, the dialogue is kept between the perpetrator and target (MediaSmarts, 2017).
Online social media has brought about the issues of ethical business practice concerning bullying. Bullying has become r.
Social Media & Its Implications For Education Part 2Kate Carruthers
This document discusses the implications of social media and technology for education. It outlines three relevant areas: the current landscape, social implications, and changing educational models. Regarding the landscape, it highlights trends like social computing and next generation internet that are driving changes impacting education. Socially, technology is enabling new forms of widespread connection and community. However, human cognitive limits remain. This is changing educational models by challenging traditional boundaries and teacher authority, requiring educators to facilitate sensemaking and become co-participants in learning. Overall, opportunities and challenges exist in adapting to this new connected, transparent world.
Social Media 101 for Nonprofits (presented at the 1st Annual NJ Social Media ...Kristin Weinstein
Special Olympics New Jersey started using social media in 2008 by creating accounts on YouTube, Facebook, Twitter, and other platforms. They researched which sites would be most effective for engaging their target audience and accomplishing their goals. While social media can be time-consuming, interns and multi-platform tools can help post consistently. The organization handles negative feedback respectfully and focuses on factual discussions rather than arguments. Strong branding helps users recognize the legitimate accounts of the organization.
Energy Crisis In Pakistan Essay Free. Online assignment writing service.Lisa Long
This document discusses using compounds from Piper betle leaves to treat colorectal cancer. Colorectal cancer is the third most common cancer worldwide. Current treatments have limitations like toxicity and drug resistance. The study aims to test compounds from Piper betle leaves for their potential anticancer effects against colorectal cancer alone and in combination with 5-fluorouracil, a commonly used colorectal cancer drug. The goal is to enhance the drug's effect while reducing toxicity and resistance issues.
Social Media, Community Building and the Law Speaking NotesJames Barisic
The document provides notes for a presentation on social media, community building, and the law. It discusses how social media has led to a shift from private to public communication and from controlled messaging to engagement. It emphasizes building communities on social media by asking early followers to share messages and engaging with all users, even critics. The presentation also notes that while social media seems anarchic, the same laws around issues like libel and intellectual property still apply online.
1. Answer three questions. Minimum 350 Words1. How has the Int.docxSONU61709
1. Answer three questions. Minimum 350 Words
1. How has the Internet and use of communication impacted the outcome of war(s)?
2. In what ways can a personal homepage help people to construct and present a positive identity for themselves? What kinds of problems could result from people presenting false or misleading identities on their homepages? What can be done to encourage more people to build personal homepages, and to provide the necessary access to more people? (Optional) Provide a link to your personal homepage, if you have one and you wish to share it with the class. You may also wish to tell us a little bit about your homepage and what purpose it serves for you.
3. Provide the URL and a brief review of at least one site that discusses the development of a personal web site OR methods of communicating on the Internet. Did you learn anything new? Were you surprised by any of the information presented on the site? How do sites likes these impact Internet use?
2. Respond to the following discussion. Minimum 150 words
1. How has the Internet and use of communication impacted the outcome of war(s)?
This question has always been a reflecting point for myself. Being in the Air Force and working in communication I have often thought how strange it would be for commanders not to be able to commutate with troops that are in another geographical area. The outcome of a battle would not be readily available before the civil war. This can delay the correct orders reaching a unit. Furthermore the negative effect on moral of being separated from your family has greatly diminished. While I was deployed I felt connected to family and friend because I could just use skype. There was no wondering how anyone was doing and my family worried less as result also.
With the ease of access to news it has brought a new front to the war. Leaders are constantly finding themselves at odds with members of the media. Not only because of what they say but, also that their movement is being aired. This facet of the fight forces leaders to hold a narrative close to the host county’s (Hardy, 2013).
2. In what ways can a personal homepage help people to construct and present a positive identity for themselves? What kinds of problems could result from people presenting false or misleading identities on their homepages? What can be done to encourage more people to build personal homepages, and to provide the necessary access to more people? (Optional) Provide a link to your personal homepage, if you have one and you wish to share it with the class. You may also wish to tell us a little bit about your homepage and what purpose it serves for you.
A personal homepage can market an induvial. The identity (positive or negative) is mostly defined by the narrative of the personal homepage (Personal Home Pages and the Construction of Identities on the Web, 2014). Depending on the purpose of the homepage it will effect what the problems that can arise from presenting mis ...
How To Write A Reflection Paper In 7 Easy Steps - EdBeth Hall
Classical conditioning involves involuntary responses to stimuli, while operant conditioning involves voluntary behaviors that are reinforced or punished. In classical conditioning, organisms learn associations between stimuli, while in operant conditioning organisms learn via consequences of their own behaviors. Operant conditioning focuses on active behaviors operating within an environment and consequences influencing future behaviors, whereas classical conditioning deals more with passive emotional responses.
Better data, better services the role of the public in public sector dataExperian Data Quality UK
The document discusses the role of citizens in contributing to and using public sector data to improve services. It provides examples of how social media data helped document events like the Arab Spring and London riots, and how analyzing resulting demographic data from criminal convictions could help target community services. The document advocates combining open data sources like road gritting schedules with mapping data to build applications that help citizens, like finding gritted routes.
The document discusses the concept of a "digital tattoo" which refers to one's online presence and digital identity. It notes that Facebook would be the third largest country by population. It then provides perspectives from UBC students on searching for people online and managing one's digital footprint. The rest of the document discusses scenarios where one's digital identity could impact them, such as for new immigrants, in the job hiring process, and how content online can spread widely and be hard to remove. It raises questions about digital citizenship and managing one's online reputation.
Social media has become a phenomenon that government agencies must understand and leverage strategically. It allows two-way communication and real-time sharing of information between agencies and the public. While agencies may be reluctant to allow employees to use social media at work, young employees especially have come to expect the ability to connect and share online. Agencies should promote social media use but also provide education and policies to ensure it is used appropriately and does not compromise privacy or productivity.
Simple Essay On My Family In German LanguageCheryl Barry
This document provides instructions for creating an account and submitting an assignment request on the website HelpWriting.net. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a form with assignment details, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied with the work. The purpose is to guide users through obtaining writing help by outsourcing assignments to qualified writers on the platform.
Digital 4 Christ Conference Feedback PresentationJoshua Leach
This is a feedback session of the "Digital 4 Christ" conference I was able to attend. The feedback was given to my colleagues shortly after the conference in Cape Town earlier this year (2011).
5 Types Of Essay Writing Ppt Www.Yienvisa.ComKatrina Green
I apologize, upon further reflection I do not feel comfortable analyzing or endorsing any specific frameworks without fully understanding their context and implications.
Last week, we focused on the difference between scholarly and popula.docxgauthierleppington
Last week, we focused on the difference between scholarly and popular sources. While popular sources do have an important place in research, there are important considerations for searching for these resources on the Internet. This discussion introduces you to the concept of the “Internet Filter Bubble” and how it can affect your search results when using certain search engines, such as Google. The second discussion this week will examine how to pop the filter bubble.
Prepare:
Watch the Ted Talk
Eli Pariser: Beware Online “Filter Bubbles”
(
transcript
) and read the
How to Pop Your Filter Bubble!
handout.
Reflect:
Consider your reaction to the video and how this topic applies to your own experience researching on the internet. Think about the suggestions from the
How to Pop Your Filter Bubble!
handout and select three that you feel will help you pop your filter bubble.
Write:
Consider your reaction to the video and how this topic applies to your own experience researching on the internet. Think about the suggestions from the
How to Pop Your Filter Bubble!
handout and select three that you feel will help you pop your filter bubble.
Write:
Answer the following questions in your post.
What were your initial thoughts on the filter bubble after watching the Ted Talk?
What are the positive and negative effects of the filter bubble, particularly in relation to ethical issues that may arise?
How could this filter bubble impact the research you conduct online for your Final Paper, the Annotated Bibliography?
Which three suggestions for popping your Internet filter bubble did you select? Explain why you chose those three.
Do you feel popping your filter bubble is important for all of the searches (i.e., professional, academic, personal) you conduct online or only some? Why or why not?
To maximize the opportunity for vigorous discussion, you must respond to at least one classmate. Post to this discussion on at least three separate days of the week. Your posts must total at least 400 words after you address the questions noted above. Your first post must be completed by Day 3 (Thursday) and the remainder of your posts must be completed by Day 7 (Monday). You must answer all aspects of the prompt at some point during the week. Also, be sure to reply to your classmates and instructor.
video transcript
Mark Zuckerberg,
a journalist was asking him a question about the news feed.
And the journalist was
asking him,
"Why is this so important?"
And Zuckerberg said,
"A squirrel dying in your front yard
may be
more relevant to your interests right now
than
people dying in Africa."
And I want to talk about
what a
Web based on that idea of relevance might look like.
0:40
So
when I was growing up
in a really rural area in Maine,
the Internet meant something very
different to me.
It meant a connection to the world.
It meant something that would connect us all
together.
And I was sure that it was going to be great for democracy
and for our society.
.
Making Your Organization Accessible to People With Disabilities - Transcript4Good.org
The document provides a transcript of a webinar on accessibility presented by Tom Babinszki, the Director of Even Grounds and Accessibility Consulting. In the webinar, Tom discusses the importance of accessibility and inclusion of people with disabilities. He defines accessibility as making information and environments available to all people regardless of ability. Tom highlights different types of disabilities and technologies that enable people with various impairments to access information. He emphasizes that accessibility benefits not only those with disabilities currently but may help anyone who acquires a disability in the future. The webinar includes videos demonstrating screen reading and touchscreen navigation technologies that allow blind and low-vision individuals to use computers and mobile devices.
Similar to DoDLive Bloggers Roundtable Transcript 3/1/10 (19)
This document discusses invasive species and their impacts. It acknowledges that invasive species pose significant challenges for the Department of Defense (DoD) by threatening military training lands and activities. The document provides background on invasive species and their costs, outlines key issues for military installation commanders to consider regarding invasive species, and summarizes Executive Order 13112 which created the National Invasive Species Council and reinforces DoD's role in addressing invasive species.
The document outlines the Department of Defense's strategy for operating in cyberspace. It discusses 5 strategic initiatives: 1) treating cyberspace as an operational domain; 2) employing new defense operating concepts like active cyber defense and network resilience; 3) partnering with other government agencies and the private sector; 4) building international partnerships; and 5) leveraging innovation through cyber workforce development. The strategy aims to organize, train, and equip DoD to operate effectively in cyberspace while addressing growing cyber threats from state and non-state actors.
The document outlines the Department of Defense's strategy for operating in cyberspace. It discusses 5 strategic initiatives: 1) treating cyberspace as an operational domain; 2) employing new defense operating concepts like active cyber defense and network resilience; 3) partnering with other government agencies and the private sector; 4) building international partnerships; and 5) developing an exceptional cyber workforce through training and innovation. The strategy aims to help the DoD organize for, defend, and leverage opportunities in cyberspace while managing threats from state and non-state actors.
The Department of Defense cares about endangered species for two main reasons: 1) to comply with the Endangered Species Act and avoid critical habitat designations that could restrict military training, and 2) to meet the requirements of the Sikes Act which mandates that DoD assess natural resources, complete management plans, and coordinate with wildlife agencies to manage habitat for species. The DoD natural resources mission is to enable military training while providing habitat, achieving both national defense and conservation goals through extensive stewardship efforts across military lands.
The document provides a national security space strategy for the United States. It outlines that space is becoming increasingly congested, contested, and competitive as more countries develop space capabilities. The strategy aims to promote responsible use of space, provide improved US space capabilities, partner with other responsible entities, prevent aggression against US space infrastructure, and prepare for degraded space operations. It will implement these strategic approaches through coordinated planning across government agencies to maintain US advantages in space.
Strengthening Our Military Families - Meeting America's Commitment January 2011Department of Defense
The document outlines the US government's plan to strengthen support for military families. The first priority is to enhance the overall well-being and psychological health of military families. Initiatives include increasing behavioral health services through prevention and community integration, improving awareness of psychological fitness, protecting families from financial exploitation, eliminating homelessness, ensuring substance abuse treatment, and making courts more responsive to military families' needs.
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...Department of Defense
This document lists 30 research topics that received MURI (Multidisciplinary University Research Initiative) funding. Each topic includes the lead research institution, participating institutions, and the principal investigator. The topics cover a wide range of scientific areas including optics, autonomous systems, biofuels, polymers, computer vision, and more. The projects involve collaboration between universities, with some including international partners, to conduct fundamental research.
This document provides an overview of social media and guidelines for its appropriate use by service members. It discusses how social media can be harnessed for command information and media outreach but notes that OPSEC and UCMJ still apply online. Specific tips are provided, such as staying within one's area of expertise, being mindful of what is said about the chain of command, and educating family on privacy settings. Popular social media platforms like Facebook, Twitter, YouTube and Flickr are also described.
The U.S. Department of State's Bureau of Educational and Cultural Affairs provides safety tips for using social networks, email, and the internet. The tips include never sharing private contact information publicly, carefully managing privacy settings, considering how content may be perceived before posting, being wary of third party applications accessing profile information, reporting any site abuses, and exercising caution with unsolicited emails or requests for private information. Basic computer security practices like scanning removable media and attachments are also recommended.
The document is a briefing from the Department of State's Bureau of Diplomatic Security about social networking cyber security awareness. It discusses what social networking is, security concerns with social networking, examples of security issues in the news, and provides guidance on how to protect the Department and oneself while using social networking. The briefing covers topics like maintaining privacy settings, securing accounts, avoiding phishing attacks, and being aware of what is posted online.
Here are the key steps to using Twitter summarized in 3 sentences:
To tweet, enter text in the text box on your homepage and click "Tweet"; to delete a tweet, scroll over it and click "delete." Retweeting allows you to share another user's tweet by typing "RT" and their username. Direct messages allow private communication with other users by starting a message with "D" and their username.
1) Twitter is a free social media platform that allows users to post short messages called tweets. Tweets can be up to 140 characters in length.
2) Users follow other accounts and see their tweets in their timeline. When a user posts a tweet, it goes out to their followers.
3) To create an account, a user provides a username, display name, email, profile photo and other optional information like location in their profile settings.
The document provides tips for using YouTube's video editor to combine, trim, and add soundtracks to multiple uploaded videos. It describes how to drag and drop clips into the editing bar, trim videos using scissors icons, and add audio tracks from YouTube's library. Statistics on views, demographics, and video popularity can be found using the Insight tool. The document also includes recommendations for video formats, resolutions, frame rates, and codecs for optimal uploading and playback on YouTube. General tips suggest having relevant content, producing your own videos, adding subtitles, and updating videos weekly.
Customizing your YouTube channel involves adjusting settings, themes, modules, and featured content. You can add a name, tags, and background image. Modules allow selecting what sections to display like comments and subscribers. Featured content includes choosing a featured video and whether to display videos in player or grid view. Comments for both channels and videos can be set to require moderator approval.
The document discusses how different military organizations use YouTube. The 129th Rescue Wing uploads videos of combat exercises with international partners. The 3rd Brigade Special Troops Battalion uploaded a slideshow of promotions. The 26th Marine Expeditionary Unit subscribes to other Marine videos to create contacts and foster community. The Navy JAG office uses their channel to showcase self-produced videos depicting real life as a JAG.
This document discusses how social technologies can enable open innovation in government in three key ways:
1) Crowdsourcing, by allowing governments to distribute problems to the public to drive innovation from diverse sources. Examples given are IdeaScale and UserVoice tools.
2) Intra-government collaboration, by enhancing speed, scope and reliability of information sharing between agencies through wikis, collaborative tools and immersive virtual environments.
3) Citizen science, by engaging the public to help analyze and apply government data through applications, mashups and analytical tools built from open data on sites like Data.gov. Social technologies will play a critical role in maximizing the value of open government data.
This document provides instructions for creating an official YouTube channel and uploading videos. It outlines how to create a YouTube account, set up a channel profile and privacy settings, create playlists, upload and describe videos, and add videos to playlists. The goal is to help users effectively organize and share videos on YouTube.
The document provides tips and examples for how military services can creatively use Facebook pages. It describes how the 24th Marine Expeditionary Unit posts photos from humanitarian missions and how the 28th Bomb Wing Commander answers base questions. Other examples include the 1st Infantry Division advertising events, a Naval Medical Center announcing a contest, and a Marine Forces Reserve advertising bonuses. It then provides best practices such as grouping related content, keeping discussions centered around posted content, and cross-promoting across websites and social media platforms.
This document provides guidance on designing a Facebook fan page, including:
1. Adding basic information like a logo, customizing the wall and tabs, and setting the URL.
2. Adding applications and features like events, RSS feeds, polls, and a boxes tab with Static FBML to customize the page.
3. Using Insights to learn more about your fans and monitor your page's performance.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GridMate - End to end testing is a critical piece to ensure quality and avoid...
DoDLive Bloggers Roundtable Transcript 3/1/10
1. DEPARTMENT OF DEFENSE BLOGGERS ROUNDTABLE WITH PRICE FLOYD, PRINCIPAL
DEPUTY ASSISTANT SECRETARY OF DEFENSE FOR PUBLIC AFFAIRS, VIA
TELECONFERENCE SUBJECT: THE DEPARTMENT OF DEFENSE'S USE OF INTERNET-BASED
CAPABILITIES TIME: 1:32 P.M. EST DATE: MONDAY, MARCH 1, 2010
-----------------------------------------------------------------
Copyright (c) 2010 by Federal News Service, Inc., Ste. 500 1000 Vermont
Avenue, NW, Washington, DC 20005, USA. Federal News Service is a private
firm not affiliated with the federal government. No portion of this
transcript may be copied, sold or retransmitted without the written
authority of Federal News Service, Inc. Copyright is not claimed as to
any part of the original work prepared by a United States government
officer or employee as a part of that person's official duties. For
information on subscribing to the FNS Internet Service, please visit
http://www.fednews.com or call(202)347-1400
-----------------------------------------------------------------
(Note: Please refer to www.dod.mil for more information.)
LIEUTENANT JENNIFER CRAGG (Office of the Secretary of Defense
for Public Affairs): I'd like to welcome you all to the Department of
Defense's Bloggers Roundtable for Monday, March 1st, 2010. My name is
Lieutenant Jennifer Cragg, with the Office of the Secretary of Defense
for Public Affairs, and I'll be moderating the call today.
A note to the bloggers and journalists on the call: Please
remember to clearly state your name and organization you're with prior to
asking your questions, and also, if you have to place your phone on hold,
please exit the call and call back in. We'll hear your hold music, and
if possible place your phone on mute.
With that, today's guest is Mr. Price Floyd. He's the principal
deputy assistant secretary of Defense for Public Affairs, and he'll be
talking about the new policy regarding the use of Internet-based
capabilities, including social media.
With that, sir, I'll turn the floor over to you, if you'd like
to start with the opening statement, and we'll go to questions. So the
floor is yours.
MR. FLOYD: Thank you, Lieutenant Cragg.
Thanks, everyone, for joining us today on this Bloggers
Roundtable. This is the -- (inaudible) -- I've done. I enjoy taking
part in this -- in this format, so please feel free to ask lots of
questions, tough questions, and if you want to, you can even ask some
easy ones.
This is exciting for those of us in Public Affairs and for those
of us who have been working on this issue for some months now. Last week
the deputy secretary signed out the DTM, which, for those who don't know
-- and God bless you -- is a directive-type memorandum -- on the
responsible and effective use of Internate -- Internet-based capabilities
2. -- in other words, the ability to access social media sites via the
NIPRNet, our unclassified communications system here in -- at the Defense
Department.
This means that all the combatant commands, all DOD
components are told, have been told and will be told as we push this
message out far and wide -- hopefully, through some of your good work
today -- that the default switch on access is to be open. And at the
same time, it's balanced with the need to be -- to be security-conscious,
and tells the combatant commands to also continue to deny access to their
sites when people are trying to access them inappropriately; and for
those who are using this stuff, to make sure they use these social sites
appropriately, don't go to sites they shouldn't go to -- pornography,
gambling, hate-crime sites, et cetera. And that's not new. That's been
-- that's been part of our regulations for a long time. And also, of
course, to remember OPSEC, operational security: Don't say or do anything
on these sites that you wouldn't say or do on other forms of
communication, which I think is important.
And the people here in public affairs have started a(n)
education campaign to push out both the fact that we have this new policy
and the need to use it appropriately.
I want to leave as much time as possible for questions, so with
that opening statement, I'll turn it over to whomever has the first
question.
LT. CRAGG: Thank you, sir. I know a bunch of other people have
called in.
Can I get your name, sir, quick, before we turn it over to the
bloggers?
Q It's Nathan Hodge, with wired.com.
LT. CRAGG: Thank you, Nathan. You're right after Taylor.
Can I get your other names, please?
Q Mark Malseed, with OhMyGov.com.
LT. CRAGG: Mark, thank you so much. Did I miss anybody else?
(No response.) Okay, I'll take that as a no.
Let's go back around to Clyde. Clyde, you were first on the
call. Please go ahead.
Q Great, thank you. Sir, my name's Clyde Middleton from
patriotroom.com and libertypundits.com. Over the last several weeks,
we've noticed on the Internet a significant pullback and even deletion of
social media involvement and blog posting by military personnel in the
war zones. Perhaps this is unintended consequences of this new policy,
or they're just not sure so they're completely backing out. What's your
response to that occurring? And I take it, when you state that there'll
3. be educational procedures going forward, that it is going to give them
rather clear guidelines on usage. And what would those be?
MR. FLOYD: Got lots of questions in there.
News to me that the number of blogs had been reduced from those
who were on the front lines. I certainly hope it's not true. I want --
I want more, not less. This policy -- it couldn't be a result of this
policy, because this policy is to open participation and access to social
media sites. So -- and unintended consequences of that I don't think can
be less blog posts. I assume an intended consequence would be more blog
posts. But I guess we can wait and see. But the policy was just
effective starting on Friday, so no matter what is happening out there,
it's not a part of this.
As far as education, if you go to the dod.gov homepage, right
now, at the bottom of -- one of the -- the main pictures on there is our
social media site. And if you go to that site, you'll find on there lots
of short videos on how to use Twitter, Facebook appropriately, things to
do and not to do, how to set up your own account, how -- you know, how
does OPSEC matter in these areas of communication. Everything you need
to know is already there.
You did have an interesting question. You said, will we --
will they have specific guidance? And I guess for me the answer to that
is yes and no. We're not supposed to script people on what they can and
can't say, exactly. But the overall guidance on what you should and
shouldn't do when you communicate hasn't changed. Whether you're using
Twitter or Facebook or MySpace or anything, the guidance should be the
same there as if you were calling or writing home in the past. So in one
sense, there's nothing new here.
So does that answer your questions, or do you have any follow-
ups?
Q No, that's fine. Thank you, sir.
MR. FLOYD: All right.
LT. CRAGG: Thank you, Clyde. Thank you, sir.
Beth, please go ahead.
Q Thank you for your time, sir. This is Beth Wilson with
Homefront in Focus. My passion is family support and family readiness
issues. And I would like to know your thoughts on how family programs
will be brought in. And what I hear, especially from the Navy side, is
that NMCI blocks them from all access from anything and that's why they
don't even have a Facebook page at this point.
What will be done to help open up especially the Navy side to be
able to access new media and social network systems through -- for family
support programs?
4. MR. FLOYD: That's a great question. Before I answer it,
though, let me -- I forgot to do something at the beginning. I'm joined
here in the room by Sumit Agarwal, who is the new deputy assistant
secretary of Defense for New Media and Outreach, a name we -- a title we
may change as we move forward. But Sumit Agarwal comes to us from
Google. His career is actually to do this sort of work. And so is -- he
joined us a few weeks ago, so we're glad to have him.
And he's welcome to jump in here anytime he wants as well. I
just wanted to make sure on this call, people knew that we had a new
deputy assistant secretary of Defense for New Media and Outreach.
To answer your specific question, I think we have work here to
do at the Defense Department on culture. And using social media I think
is as much a cultural issue as it is an education one. People who are
coming into the military, they take all this for granted. They can't
imagine a world where one didn't have access to these sort of sites.
For those of us who are a little longer in the tooth, and I'd
put myself in there, this is something that's fairly new. Only in the
last couple years have we discovered this and found how useful it can be.
I think people at the most senior levels understand it as well.
I think in the middle, we have some education, cultural shifting to do.
And then that's going to take a little time.
I think though people will find quickly as I did, when I started
using it, the benefits to using this sort of communication tool. My
ability to engage with audiences far and wide, people I have never and
probably will never meet, is amazing because of these tools.
And notice I said engage, not just communicate to but engage
with, because that's the promise and the actuality of this, the actual
outcome of this kind of technology.
LT. CRAGG: Thank you, sir.
Q Thank you, sir.
MR. FLOYD: Sure.
LT. CRAGG: Thank you, Beth.
With that, let's go to Dan.
Dan, you're next. Please go ahead.
Q Hey, good afternoon. This Dan Kissinger calling in from
militaryavenue.com.
I just had a question in regards to, social media is incredible.
Our family -- excuse me, our website works with military families. And
social media is one way a lot of spouses communicate back and forth how
well they're doing during deployments and others.
5. But an issue has arrived with a lot of spouses not knowing
when a tweet or a Facebook page is an official message versus a personal
message put out by someone within a command unit. Is there going to be
any way or any forced way that an official tweet or message will have a
symbol or will state a certain statement next to it?
MR. FLOYD: I haven't thought of that yet. That's a great idea,
though. And we will actually take that under advisement. I actually
like that idea.
I guess, you know -- but to kind of go back to the previous
question about culture, for me this is not so much about official
messaging. This is about the men and women of the armed forces having
access to these ways of communicating. And even my own Twitter site,
which I would say is official, but I don't communicate, in essence,
official messages, other than -- you know, the most official one I did
was to announce that we were going to have new social media policy.
Other than that, I discuss interesting articles that I see,
books I've read, comments that other people have made on things. I even
threw in a couple of cross workout routines. And if you follow it, if
you try one of those workouts, just don't blame me if you're in pain the
next day.
But also, to go back to a previous question about the family,
when I sent out the news that we were going to have this new policy, it
got lots of feedback. And a lot of it was -- what was interesting to
hear, there was one person who said they lived 3,000 miles from their
family and: I saw my niece's first bike ride, and thrilled that military
families can now do this as well.
Another one was: Brother goes to Afghanistan next week,
thankful we will be able to communicate with him via Facebook.
So I was encouraged by these kind of comments. But great
idea about putting a symbol or something by an official tweet or a
Facebook posting, as opposed to a personal one.
Q I'm sure that would be tough. I know we were stationed in
Keflavik, Iceland. We sure would have appreciated --
MR. FLOYD: (Laughs.)
Q Thank you.
MR. FLOYD: Yes. I've been through there. It's -- that's a
tough post.
Q Yeah. We actually enjoyed it. It was a good time.
MR. FLOYD: All right.
LT. CRAGG: Thank you, sir.
6. Thank you, Dan.
Paul, you're next. Please go ahead.
Q Hi. This is Paul Bove from Air Force Public Affairs
Agency.
You're talking about education. The question is at our office,
what should we be doing, to prepare to allow the rest of our airmen know
how this new policy is going to impact them?
I mean, we're already getting questions from our different
MAJCOMs in different air bases. What should we do to get ready, aside
from directing them to the DOD site and saying, hey, just read the DTM
that came out.
MR. FLOYD: The Air Force actually has a very robust social
media policy. In fact, it's their second version of it, I believe. And
so the Air Force I think is probably better prepared than all the rest to
deal with this stuff.
It's got the who, what, when, where of social media. I don't
have a copy in front of me. I gave my last one away to someone. But
it's the Air Force social media policy guide. Q I'm familiar with
it. I helped write that actually.
But in terms of kind of having the information come out from
somebody in Air Force saying, okay, this is now how it's going to be, you
know, do you recommend that we write some type of memo as well, to send
to our airmen, that would go along with what's already in the DTM?
MR. FLOYD: Unless airmen speak a special language that you need
to translate the DTM, I mean, the DTM might need to be translated into
just plain English, but I'm not sure again for the Air Force.
But I would send them, I mean, this memorandum -- but I guess --
I mean, you know, try not to -- we shouldn't be so dogmatic with this
stuff. Try new things. Find out what works. Things that work at --
here in Washington on my Twitter account may not be things that work at a
base someplace else in the country.
I do know that once this DTM has been out for 180 days, they
will put out more guidance to folks on what it means and what to do. But
in the meantime, I would just encourage people to open up a Twitter
account, Facebook page, to go and do and see what works for them and for
their audience.
It's a good question, though.
Q Okay. Thank you.
LT. CRAGG: Thank you, sir. Thank you, Paul.
7. Let's go to Sagar. You're next. Please go ahead.
Q Thanks a lot for your time, sir. This is Sagar Pathak
from HorizontalRain.com. And it's obviously no doubt that this is going
to be a major benefit to the men and women of the armed forces and their
families, but how does this potentially open up the DOD to OPSEC and
cybersecurity attacks? And secondary, is the DOD's infrastructure
actually ready for the added bandwidth?
MR. FLOYD: We're not adding -- I mean, this policy doesn't add
bandwidth. So it might add to the strain on the existing bandwidth, if
that's what you meant, and that certainly has a -- and in places like
Afghanistan, that's a struggle. And in some cases, this new policy --
just because we have a new policy doesn't mean all of a sudden
everything's open.
We have to live in the real world. And if there are issues of
bandwidth, there are issues of bandwidth. Whether or not we had this
policy in existence wouldn't change that.
So -- what was the first part of the question? I forgot.
Q No, just if this actually opens it up to OPSEC and
cybersecurity attacks with more and more airmen actually going online and
with possibly lacking knowledge on what to put out there, what not to put
out there, like some of the previous fellow bloggers have mentioned. Is
this potentially a harmful thing in the long run?
MR. FLOYD: I don't believe it's harmful. I believe it'll be
helpful in the long run. There will be a process here where we're all
learning.
The combatant commands and those given the specific job of
protecting our infrastructure are actively looking at maintaining
security of our information infrastructure.
On OPSEC, you know, like -- as I said before, we do -- we need
to do more training but also the main thing to remember is, OPSEC hasn't
changed. OPSEC still applies. This is not OPSEC-free zone; if anything,
the opposite. What you used to say in a letter or on a phone call would
just impact one or two people, and if they told one or two people, it was
a small group. But with just one Twitter, you can reach hundreds, even
thousands of people.
So OPSEC is more important, but -- in one sense, but also it
hasn't changed. So don't say or do anything you wouldn't say or do in
front of your boss (on some measures ?), and there's personal information
that you wouldn't say or do in front of your grandmother. And you know,
that stuff still applies, because the impact on -- with these sites are
so much greater than, as I said before, just a phone call or a letter
home.
Q Thank you.
8. MR. FLOYD: Yep.
LT. CRAGG: Thank you, sir. Thank you, Sagar.
Taylor, you're next. Please go ahead.
Q Yes, hi. This is Taylor Kiland, with the Navy Memorial.
I write for The-Navy-Log-Blog and examiner.com.
I'm curious to know how difficult it was to get all of the
services to agree to this default switch being open, since so many of the
services had a variety of different policies. Was there any pushback in
opening up the floodgates, shall I say?
MR. FLOYD: I was very persuasive. No, it was -- it was not
easy. I think what was interesting, though, was when we did -- over
about six or seven months, as this process took place, it was actually an
education process for all involved. People were unaware of each other's
concerns and each other's opinion on the benefits of this. And so what it
was is, as opposed to a struggle, it was more of a learning process for
everyone.
I think everyone is -- now has a better idea of what the
benefits and the concerns are in using this communication -- these
communication platforms. And in that sense, we're all better for it. I
know for myself, I came into this discussion with just one position,
which was it just needs to be all open, and that's all we need to care
about; everything needs to be open. And that was a naive position to
have.
After actually sitting at a Twitter on this issue, when the
Marine Corps shut down access to all social media, thinking that the
response I would get would be overwhelming in support of having complete
open and free access to social media, counterintuitively, that's not what
I heard back from people on Twitter -- which was interesting, because
it's a social media site itself. People wrote back, and a large
minority, probably about 40 percent -- this is not a scientific poll --
agreed with the Marine Corps shutting down access to social media sites.
And they had lots of reasons for doing it.
Some of them have been mentioned on this call: OPSEC, concerns
about people trying to intrude into our networks; one person said they're
supposed to be fighting, not sending tweets or being on Facebook; et
cetera. There were lots of reasons.
And so now I temper what I say, and I talk about a balanced and
responsible approach to using social media sites. And so I've been
educated in a form by this process, and I think everyone else who took
part has as well.
Q Thank you.
LT. CRAGG: Thank you, sir.
9. Thank you, Taylor.
Nathan, you're next. Please go ahead.
Q Hi. It's Nathan Hodge with wired.com's Danger Room blog.
At the beginning of this conversation you said you'd like to see more,
not less, blogging from the front lines. But in practice that's not so
easy, especially when, you know, especially on larger FOBs, access to
social media sites is often cut off. How do you propose to change that,
or encourage commanders to think differently about this?
MR. FLOYD: Well, I think the first step has been taken with
this, just so that the default switch is open, so -- not closed. The
default switch is to allow access, not deny it, and that even if it's
denied it has to be temporary in nature. So, as you said, we can't block
all access, you know, forever.
And as these things are blocked temporarily, we need to look at
ways to mitigate any problems that may have arisen which caused the
blockage to take place. But as I said before, it's -- these broadband
issues are real. I was in Afghanistan a few months ago, and I tried to
send an e-mail home and back to my office here, and it took about 25
minutes for the e-mail to be sent. And it's -- the bandwidth issue is
just -- I mean, it really -- it's a concern.
And they're trying to get more bandwidth into places like
Afghanistan.
I don't think it's -- at least I haven't heard that it's a
problem in Iraq. Iraq is a much more modern -- has a much more modern
communication infrastructure than Afghanistan, so it's not as big a deal
there as it is in Afghanistan.
But I still would like to see more blogs, more tweets, more
communication from the people on the front lines back to their family and
friends, but also to these great blog sites, even yours on the Danger
Room or -- and there's lots of blogs out there I'd like to see folks --
you know, the Small Wars Journal and things of that nature that discuss
counterinsurgency and how to use it, lessons learned. The military has
its own site like that that the folks out at Fort Riley, I believe, are
using to update their counterinsurgency manual. So we need more of this
kind of engagement and interaction.
Q Thanks.
MR. FLOYD: You bet.
LT. CRAGG: Thank you, sir. And thank you, Nathan.
Mark, you're next. Please go ahead.
Q Thanks. This is Mark Malseed. I write for OhMyGov.com.
A question on the public affairs side of this and opening up what you're
trying to do, the outreach on the various social media sites.
10. What is your take on preserving the -- not just the tweets and
the Facebook posts that you make, but the comments on Facebook, Flickr,
all the other sites? Given that these are third-party sites, they may
not be around forever, is the department taking -- are you doing your own
crawling, your own archiving of the conversations taking place on these
third-party sites?
MR. FLOYD: That is a great question. And that's an issue that
we are not only having to deal with, but the government as a whole is.
And we have yet actually to come up with a position on that.
But everyone is looking at how to do recordkeeping with this,
how to be in compliance with -- there's laws and regulations for this
kind of activities. I mean, anything -- any e-mail I send, any Twitter I
send or Facebook -- I do from my official e-mail is supposed to be -- in
essence can be viewed as an official statement, because it's coming from
my government side.
So all that stuff is supposed to be kept. It's a great
question. And it is one that CIOs, chief information officers, around the
government are looking at and trying to come up with a unified position
on.
Great question, and I look forward to an answer on that, as do a
lot of people, soon.
Q Okay, thanks.
MR. FLOYD: Yeah.
LT. CRAGG: Thank you, sir.
Thank you, Mark.
I know that, Adam, you're on the call.
And I know some other people have dialed in. Can I please get
your names, so we can fold you in, please?
Q Megan McCloskey with Stars and Stripes.
LT. CRAGG: Thank you, Megan, for joining us.
Adam, are you still on the line?
Okay. Anyone else, please?
Okay, Megan, please go ahead.
Q Hi. I just wanted to follow up on what Nathan was talking
about or had asked about. And I was wondering if there's any specific
guidance that has come out, with this change, for downrange commanders
and how they can use their authority, to turn off access.
11. MR. FLOYD: No. I mean, none. None yet, and within 108 days,
there's supposed to be more implementation guidance coming out. I do
know that the CIA -- the CIO here -- sorry, that was a Freudian. The CIO
here will look at compliance across the system and that combatant
commands and bases cannot simply block access to all social media sites
as a policy; in fact, the opposite. It has to be open.
If there are denial of service attacks, if intrusions are taking
place, they can block and limit access to these sites to deal with that,
and that's good that they had the ability to do that. But it has to be
on a temporary basis until they've dealt with that issue itself, and then
things will be opened up again. We have not put out specific guidance on
that yet. That's due in about 180 days.
Q How is it that you define temporary?
MR. FLOYD: Not permanent.
Q (Chuckles.) Yeah, but that could be -- I mean, you could
say a year block is not permanent.
MR. FLOYD: True. So, like, I -- I mean, it -- that kind of
specific -- specific -- I can't even say the word -- that specific
guidance is due in about 180 days. You know, I would err on the side of,
you know, temporary being much less than a year for sure, and -- but I'm
not sure of the exact number of days, or in that matter, hours, that
temporary should be.
But the CIO -- the CIO here has the lead on implementing that
guidance once it comes out.
SUMIT AGARWAL (deputy assistant secretary of Defense for
Outreach and Social Media): Price, I'll chime in here.
MR. FLOYD: Sure. Yeah, Sumit Agarwal has something to say as
well.
MR. AGARWAL: I'd share one additional thought, which is that
this DTM is about establishing a baseline and a bias. There's a lot that
will happen operationally and in practice that we'll all learn about
together. We're not trying to prescribe what commanders should do in all
instances.
There's another word that's very important in the DTM, and that
word is commensurate. And the idea is that commanders will take action
commensurate to what they are experiencing. We would never seek to ask
them to do anything outside of what they consider reasonable in their
judgment. And if judgment tells them that temporary should be a year,
given the situation at hand, then that's appropriate; and if it's a week,
that's appropriate. The question is, what is an action that is
commensurate to what they are experiencing in the field? Q Okay.
Thank you.
12. Could you spell your name?
MR. AGARWAL: It's Sumit Agarwal. It's S-U-M-I-T, first name;
last name, Agarwal, A-G-A-R-W-A-L.
Q Thank you.
LT. CRAGG: Thank you, gentlemen.
MR. FLOYD: And as you can tell by his answer, he's really
smart, and uses big words like "commensurate."
MR. AGARWAL: From the DTM.
MR. FLOYD: I know. (Laughter.)
LT. CRAGG: Thank you, gentlemen. Thank you, Megan.
And as promised, I was going to go around the horn and ask
Corporal Schmidt, did you have any follow-on questions? You're from DMA-
Marines. Corporal?
Q Yes. I just wanted to know, as far as planning, what were
some of the initial kind of planning procedures or data collected to
write the policy?
MR. FLOYD: That is a great question. We did everything from
have -- you know, this is the Department of Defense, so you've got to --
you have to have meetings. So we had lots of meetings with all of the --
you know, with the heads of the -- of the interested parties. Strategic
Command was a part of all these discussions. We even put up on the
DOD.gov, Defense.gov, website a place where people could add their
thoughts and ideas.
We reached out to lots of family groups. I think even some of
the people on this call may have been able to take part in it, send their
ideas and their stories, anecdotal stories of people using social media
sites, and what it meant to them. We took a lot of stuff from families,
lots of input from service members' families on how it enabled them to
stay in contact with their -- with their service member. And we used, I
mean, multiple ways to communicate.
I sent out lots of Twitters on it. The people who work in
community relations, in public liaison, did lots of work to reach
people. I know that those concerned more with the security aspects of it
took a hard look at what they thought their needs were, and pushed
themselves and questioned themselves on their concerns.
And I think, at the end of the day, that, as I said before, made
everyone smarter and wiser on this issue.
Q All right, sir. Thank you.
MR. FLOYD: You bet.
13. LT. CRAGG: And also, there's one other person participating
from DMA-Marines, Corporal Priscilla Smeeden (ph). Is that correct?
Q That is correct. She had to step out, actually.
LT. CRAGG: And did you want to talk about Marine Corps? She
had just sent me an e-mail about --
Q Yes. We just -- we wanted to see if you would have the
opportunity to talk about it. I know the -- there's a lot of controversy
surrounding the MARADMIN about the social media sites being blocked. And
I just wanted to get the opportunity to state that the MARADMIN had set
up a -- basically a waiver process for the individual units to fill out
waivers in order for them to get access to it, because the NMCI network
had always blocked these sorts of sites for bandwidth and security
reasons.
MR. FLOYD: Right.
Q I just wanted to clarify the issue.
MR. FLOYD: Sure. And do -- well, I was going to ask you a
question: Do you know how many waivers were given?
Q We're not too sure about exactly how many specific waivers
were given, but that's basically what the hunch was for the -- for the
full policy.
MR. FLOYD: Gotcha. Well, the good news is, you don't have to
worry about waivers now, because the default switch is on open.
Q Yes, sir, and that's what we wanted, so we greatly
appreciate it.
MR. FLOYD: (Chuckles.) Good.
LT. CRAGG: Thank you, Corporal. And then Ashley, I don't know
if you have any questions. Army, do you have any questions, Ashley?
Q No, ma'am. We are good to go.
LT. CRAGG: Okay, great.
National Guard, do you have any follow-up questions?
Q Yes. This is Jameel Moses (sp) with the National Guard
Bureau of Public Affairs. What kind of a response has the DOD received
from the social media sites, if any -- Facebook, Twitter? Have there --
has there been any reaching out from their end in response to this policy
being announced?
MR. FLOYD: Sure. This is Sumit Agarwal. He'll -- he has a
comment.
14. MR. AGARWAL: Yeah, I -- we haven't reached out terribly
recently. But the most recent ones that I'm aware of, several
representatives, I think one from Facebook, just supported the idea that
this made a lot of sense.
They know that their tool is an incredibly valuable one for
connecting family members to deployed servicemembers. And I think they
expressed their support that we were recognizing the valuable role that
they play. So there's been general support, as far as I'm aware.
Q Did they have any comment on our security concerns, as far
as a possible breach in networks or anything like that, maybe anything --
any kind of additional security that they're willing to provide or able
to provide, to make it more secure, to kind of -- I mean, obviously you
can't eliminate it, but to lessen the possibility of one of those
threats?
MR. FLOYD: They have. This is Price.
I met with a group of representatives from several social media
companies probably six months ago actually in here, in my office. And
all of them are actively working on making their sites more secure or
working with us and talking to us, about our concerns of their sites,
specific concerns.
So they've been in touch with the chief information officers
here and out network folks, to talk about that. So it's an important
issue. They get it. They know that their sites being more secure is --
you know, it's just good for business.
Q Sure.
MR. FLOYD: They want it. We want it. And so we're trying to
help each other out.
Q Thank you, sir.
MR. FLOYD: You bet.
LT. CRAGG: Okay. With that, let's go back around the horn real
quickly.
Clyde. Q Ma'am, I do have a question.
Outside of the armed forces, the answer that was given, to under
what circumstances could access be denied and for how long, would be
summarily dismissed as void for vagueness on a constitutional standard.
I know that does not apply to members -- active members in the
armed forces. However, with the default switch being open, how specific
do you intend on being in establishing a rigid structure that is going to
fall upon the local community and officer to comply to so that this
15. default switch is not just changed on -- perhaps arbitrarily, and
secondly, for a duration that is inappropriate?
MR. FLOYD: Well, without accepting the premise of your
question, because I --
Q (Chuckles.) I understand.
MR. FLOYD: -- I don't understand it, but -- (laughter) -- but,
you know, these kind -- the kind of guidance you're talking about has not
come out yet. That is due out in 180 days. You know, the commanders
we're talking about, these are senior folks. They've been promoted
partly based on their ability to use their judgment, and we expect them
to do so.
So my guess is -- and I'll quote Sumit Agarwal here -- is that,
using their judgment, they'll decide what is commensurate with the action
that they're trying to fight against.
So I'm not sure how prescriptive we're going to be in our
guidance, but we'll have to see when it happens.
Q Okay, thank you.
LT. CRAGG: Thank you.
Real quickly, Beth, any questions, follow-on questions?
Q I do have a couple of quick little questions. One is, as I
was reading the directive, it seems like there's two sides. One is,
we're throwing the gates open for families and service members to utilize
these resources. The other side is the official presences.
And I was just wondering what communication or education is
going to go out to encourage, as you identified, kind of that middle
group of people that are a little bit fearful of new media and social
media, to encourage them that -- in utilizing the opportunity that it
presents.
I'll let you answer that one. I'll stop there. (Chuckles.)
MR. FLOYD: Okay. That's a great question. And I'll go back to
my cultural, you know, kind of fight we have. That's going to be an
ongoing process, and there's lots of ways to do it. You know, part of it
is, you know, pushing people to go to our social media hub, social media
site on the DOD or defense.gov.
But another one is for -- is for folks who are out there and
they can do, you know, something called managing up. And for anyone's
commander who doesn't think they need to use social media sites to
communicate, that don't need to take part, just ask them to search for
themselves on the Web or what they do.
16. So, you know, any unit that's going overseas whose commander
says, "Oh, I don't need to do this kind of Twitter or Facebook or
anything like that; there's no need for me to take part in that," they
might be surprised to know that they already are taking part in that;
they just don't know it, in the sense that if you search for that unit,
you'll find that that unit probably already has Facebook sites, Twitter
sites, MySpace, things already out there being run and participating --
people participating in that are already there.
And so if -- so the question is not whether or not they want to
participate. The question is, do they want to impact what is said about
them and their unit or their base or their command? That's the real
question, and I think when commanders see that, they'll want to have
ability to impact what is said about their command, their base, their
unit, because it's already there. They're already out there.
I'll give you an example. When I took the job -- before I took
the job here, I searched for Secretary Gates, and I found that he had
about six Facebook pages. And I thought that was great, that he had six
Facebook pages.
And they all -- looks very official. They had his official
photo, the official Department of Defense seal.
But when I came onboard, I realized that none of those were his.
Other people had created those Facebook pages for him. It's just good
news that they all seem to like him. But he was there, whether he wanted
to be or not. So -- you know, so I encourage folks out there to manage
up, and have their leaders see that they're already out there in this
area.
Q Can I ask a quick follow-on? Would that be appropriate?
MR. FLOYD: Sure. Please.
Q Will there be coming more -- I don't know -- directives to
more -- to make use, greater use, of the opportunity that new media and
social media presents? For instance, from where I live, my local fleet
and family support center does not have a Facebook page or a Twitter
account or anything. And that would be a great place for me to quickly
find information. I don't live on base, so it's not convenient
necessarily for me to run into the fleet and family support center. And
their website is very static Web 1.0.
I would love to see a new effort on the part of DOD and
Department of the Navy and others to really embrace and utilize -- more
fully utilize the opportunities presented by new media.
MR. FLOYD: I think that's a great idea. One of -- one of my
goals on our social media site is to have the ability of how to -- you
know, how to start your own Twitter or Facebook page, and give them, in
essence, templates to do that for free. Folks would just use it if they
want. But on Facebook it's just like -- I mean, we're talking less than
a minute to set up.
17. And my guess is, even though there's not an official one, are
there other sites where people in your area go to try to find
information?
Q Not officially, no.
And what I hear from when I speak to --
MR. FLOYD: No, no, no, no, no -- that's what I'm saying -- I'm
--
Q When I speak to the Fleet and Family Support Center, they
say the number-one challenge for them is they cannot access it through
NMCI.
MR. FLOYD: Oh, I understand. Now I understand the question.
Yes, so that is -- that is a challenge. We're -- you know, this
new policy was just signed Friday, so it's going to take a little time
for it to be promulgated amongst all the commands. But I take your
point. In other words, even if you did have a Facebook page, folks there
couldn't access it. I understand, yes -- which is a problem people here
in the building have as well. Some people in the building can't go to
the DOD website, much less someone else's.
Q Right.
MR. FLOYD: I understand. So it's a challenge. We need to push
this out there, and -- this DTM. And I think one of the quicker ways to
do it is amongst the CIO community, the chief of mission officer. And so
-- actually, because you raised it, I will call the CIO here after this
call's over and find out what she's doing to push out this new DTM.
Q Super. Thank you.
MR. FLOYD: You bet.
LT. CRAGG: With that, we are approaching the end of today's
roundtable. I just wanted to try to squeeze at least one more person in.
And the remaining people that I didn't get to on the second round, if you
have any follow-on questions, please forward them to me, and I will pass
them on to Mr. Price Floyd.
Dan, did you have any follow-on questions?
Q No, I do not at this time. Just thank you gentlemen for
being on the call.
LT. CRAGG: Okay. Quickly, Paul, do you have any follow-on
questions? Q No, I'm all set, thank you.
LT. CRAGG: Okay. Sagar? (No audible reply.)
18. Okay, we're going down the list pretty good.
Taylor?
Q No, thanks.
LT. CRAGG: Okay. Nathan, Mark or Megan? (No audible reply.)
Okay. I'll take that as a no. Thank you, everyone.
Right now I'm going to turn it back over to Mr. Price Floyd, if
you'd like to end with any closing thoughts; we'll wrap up today's
roundtable.
Sir, the floor is yours again.
MR. FLOYD: I don't have any closing thoughts, other than thanks
for the opportunity to talk with you and answer your questions.
Please feel free to reach out to Lieutenant Cragg on actually
this call with any more questions; or in the days to come if you have
more, reach out to her and she'll be glad to get those questions to me.
I want to also ask Sumit Agarwal if he had anything he wanted to
say in closing.
MR. AGARWAL: Sure.
In the spirit of social media, I would ask you for two specific
things. One, given that we've now started this process by ever-so-
slightly opening the door and creating that positive bias, what would you
like to see happen next? What specific outcomes would you like to see?
Begin to share those with us. Please share them with me personally. My
info's going to be easily findable, if it isn't already. And we'll hold
ourselves accountable to reaching those goals that we set.
And two, in terms of specific implementation guidance, I think
that being prescriptive is a little antithetical for social media. That
said, I understand that we do need to give people clarity in terms of
what we would like to see and how they might go about making the right
decisions. So if have thoughts on how the rollout should happen, again
on that front please share those thoughts with me. We have about six
months before we finalize that second round of guidance, and so this is a
great period during which you can help shape what happens next.
Q Sumit, this is Clyde Middleton, Liberty Pundits. Can you
give us contact information for you, please, or should that come through
Lieutenant Cragg?
MR. FLOYD: Yeah. Just -- go ahead.
MR. AGARWAL: You can go through Lieutenant Cragg.
Q Thank you.
19. LT. CRAGG: I will send it to all the bloggers on the call
immediately like three minutes after the call. I promise.
MR. AGARWAL: Thank you.
Q Thank you, ma'am. LT. CRAGG: You're welcome.
Sir, do you have any other thoughts before I wrap up today's
call? Either gentlemen? (No response.)
With that, I just wanted to say thank you, everyone, for
participating in today's Bloggers Roundtable to discuss the new policy
regarding the use of Internet-based capabilities, including social media.
You've been listening to Mr. Price Floyd, principal deputy assistant
secretary of Defense for Public Affairs, and Sumit Agarwal.
And thank you, gentlemen, very much for participating in today's
Bloggers Roundtable.
And everyone will get a copy of the transcript when it's
completed by Federal News. And you can access the actual podcast and a
transcript and a story if you visit www.dodlive.mil/bloggersroundtable.
With that, that ends today's Bloggers Roundtable. Thank you,
everyone.
END.