SlideShare a Scribd company logo
Silence by  Larry Watson LC WTUC Dec 2006
Larry Watson
http://www.thackermountain.com/new/pictures/show.php?id=163
Biography http://www.larry-watson.com/index.htm
[object Object]
[object Object]
[object Object]
[object Object]
Paragraph 1, p. 105 ,[object Object],[object Object],[object Object]
Paragraph 4-5, p. 105-106 ,[object Object]
Paragraph 7, p. 106 ,[object Object],[object Object]
[object Object]
[object Object],[object Object]
Line 48-52, p. 111 ,[object Object],[object Object],[object Object]
[object Object]
[object Object]
[object Object]
[object Object]

More Related Content

More from Aiden Yeh

Note taking
Note takingNote taking
Note taking
Aiden Yeh
 
Podcasting interview
Podcasting interviewPodcasting interview
Podcasting interview
Aiden Yeh
 
Tainan
TainanTainan
Tainan
Aiden Yeh
 
Create a print ad catered to specific audience
Create a print ad catered to specific audienceCreate a print ad catered to specific audience
Create a print ad catered to specific audience
Aiden Yeh
 
Creating an e zine
Creating an e zineCreating an e zine
Creating an e zine
Aiden Yeh
 
Methodology section inclass-discussion
Methodology section inclass-discussionMethodology section inclass-discussion
Methodology section inclass-discussion
Aiden Yeh
 
Writing the introduction mla
Writing the introduction mlaWriting the introduction mla
Writing the introduction mla
Aiden Yeh
 
Common errors in citations
Common errors in citationsCommon errors in citations
Common errors in citations
Aiden Yeh
 
Letter to the editor
Letter to the editorLetter to the editor
Letter to the editor
Aiden Yeh
 
Fitshoes
FitshoesFitshoes
Fitshoes
Aiden Yeh
 
Singuist 20140605 1
Singuist 20140605 1Singuist 20140605 1
Singuist 20140605 1
Aiden Yeh
 
Common errors in writing references
Common errors in writing referencesCommon errors in writing references
Common errors in writing referencesAiden Yeh
 
Methodology, results, discussion general comments
Methodology, results, discussion general commentsMethodology, results, discussion general comments
Methodology, results, discussion general commentsAiden Yeh
 
Cronbach joanna-attitude-q7
Cronbach joanna-attitude-q7Cronbach joanna-attitude-q7
Cronbach joanna-attitude-q7Aiden Yeh
 
Sample cronbach analysis using kara
Sample cronbach analysis using karaSample cronbach analysis using kara
Sample cronbach analysis using karaAiden Yeh
 
Why we run cronbach’s alpha
Why we run cronbach’s alphaWhy we run cronbach’s alpha
Why we run cronbach’s alphaAiden Yeh
 
Correlation satisfaction-loyalty
Correlation satisfaction-loyaltyCorrelation satisfaction-loyalty
Correlation satisfaction-loyaltyAiden Yeh
 
Getting frequency data
Getting frequency dataGetting frequency data
Getting frequency dataAiden Yeh
 
Measurement scales
Measurement scalesMeasurement scales
Measurement scalesAiden Yeh
 
Photo press release with task
Photo press release with taskPhoto press release with task
Photo press release with task
Aiden Yeh
 

More from Aiden Yeh (20)

Note taking
Note takingNote taking
Note taking
 
Podcasting interview
Podcasting interviewPodcasting interview
Podcasting interview
 
Tainan
TainanTainan
Tainan
 
Create a print ad catered to specific audience
Create a print ad catered to specific audienceCreate a print ad catered to specific audience
Create a print ad catered to specific audience
 
Creating an e zine
Creating an e zineCreating an e zine
Creating an e zine
 
Methodology section inclass-discussion
Methodology section inclass-discussionMethodology section inclass-discussion
Methodology section inclass-discussion
 
Writing the introduction mla
Writing the introduction mlaWriting the introduction mla
Writing the introduction mla
 
Common errors in citations
Common errors in citationsCommon errors in citations
Common errors in citations
 
Letter to the editor
Letter to the editorLetter to the editor
Letter to the editor
 
Fitshoes
FitshoesFitshoes
Fitshoes
 
Singuist 20140605 1
Singuist 20140605 1Singuist 20140605 1
Singuist 20140605 1
 
Common errors in writing references
Common errors in writing referencesCommon errors in writing references
Common errors in writing references
 
Methodology, results, discussion general comments
Methodology, results, discussion general commentsMethodology, results, discussion general comments
Methodology, results, discussion general comments
 
Cronbach joanna-attitude-q7
Cronbach joanna-attitude-q7Cronbach joanna-attitude-q7
Cronbach joanna-attitude-q7
 
Sample cronbach analysis using kara
Sample cronbach analysis using karaSample cronbach analysis using kara
Sample cronbach analysis using kara
 
Why we run cronbach’s alpha
Why we run cronbach’s alphaWhy we run cronbach’s alpha
Why we run cronbach’s alpha
 
Correlation satisfaction-loyalty
Correlation satisfaction-loyaltyCorrelation satisfaction-loyalty
Correlation satisfaction-loyalty
 
Getting frequency data
Getting frequency dataGetting frequency data
Getting frequency data
 
Measurement scales
Measurement scalesMeasurement scales
Measurement scales
 
Photo press release with task
Photo press release with taskPhoto press release with task
Photo press release with task
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Silence