The document provides tips for journalists to safely surf the internet. It discusses threats like viruses, spyware and unauthorized access. It recommends using a hardware router, firewall software, hosts file, Firefox browser with security plugins, antivirus software, VPNs, strong unique passwords for different accounts, and being cautious of public wireless networks. The focus is on protecting devices, encrypting data, and practicing safe online behavior.
Cloud Computing Webinar: Legal & Regulatory Update for 2012itandlaw
Cloud computing has revolutionized computing, providing organizations with the opportunity to outsource their computing capability to a third party provider of networks, servers, storage, applications or services located in multiple jurisdictions. This webinar explored the global legal and regulatory developments in cloud computing that have occurred during 2012
This document discusses originator control (ORCON) and how it can provide persistent control over data as it is shared beyond the enterprise. ORCON is related to digital rights management and information rights management as it allows the originator or enterprise to specify access controls for shared data, such as preventing forwarding or rescinding access. The document argues that while networks and infrastructure are difficult to secure, focusing protection at the data layer through encryption and ORCON can provide better persistent control over sensitive data as it moves to different domains.
Este documento resume las infecciones agudas más comunes de las vías respiratorias superiores en niños, incluyendo faringoamigdalitis, sinusitis y otitis media aguda. Detalla la epidemiología, etiología, síntomas, diagnóstico y tratamiento recomendado para cada una, con énfasis en el uso de antibióticos como amoxicilina, claritromicina y penicilina benzatínica. También describe posibles complicaciones y cirugía de amígdalas.
Este documento presenta un glosario de términos relacionados a la computación e informática. Define términos como archivo, bit, byte, capacidad de almacenamiento, categorías y tipos de computadoras, datos e información, hardware, software, sistemas operativos, redes, entre otros. El glosario provee definiciones concisas de estos términos técnicos para propósitos educativos.
The document lists 5 things teachers can do in 5 minutes for continuing professional development (CPD). It encourages teachers to join professional communities on Glow, meet with other teachers online, use the CPDReflect tool to reflect on learning, and stay up to date by following the National CPD Team on Twitter and checking their blog. The document also provides links to these online resources and thanks readers.
What are segments, and why should you care about them? This presentation explains and then walks you through using Google Analytics' new Advanced Segments feature.
Cloud Computing Webinar: Legal & Regulatory Update for 2012itandlaw
Cloud computing has revolutionized computing, providing organizations with the opportunity to outsource their computing capability to a third party provider of networks, servers, storage, applications or services located in multiple jurisdictions. This webinar explored the global legal and regulatory developments in cloud computing that have occurred during 2012
This document discusses originator control (ORCON) and how it can provide persistent control over data as it is shared beyond the enterprise. ORCON is related to digital rights management and information rights management as it allows the originator or enterprise to specify access controls for shared data, such as preventing forwarding or rescinding access. The document argues that while networks and infrastructure are difficult to secure, focusing protection at the data layer through encryption and ORCON can provide better persistent control over sensitive data as it moves to different domains.
Este documento resume las infecciones agudas más comunes de las vías respiratorias superiores en niños, incluyendo faringoamigdalitis, sinusitis y otitis media aguda. Detalla la epidemiología, etiología, síntomas, diagnóstico y tratamiento recomendado para cada una, con énfasis en el uso de antibióticos como amoxicilina, claritromicina y penicilina benzatínica. También describe posibles complicaciones y cirugía de amígdalas.
Este documento presenta un glosario de términos relacionados a la computación e informática. Define términos como archivo, bit, byte, capacidad de almacenamiento, categorías y tipos de computadoras, datos e información, hardware, software, sistemas operativos, redes, entre otros. El glosario provee definiciones concisas de estos términos técnicos para propósitos educativos.
The document lists 5 things teachers can do in 5 minutes for continuing professional development (CPD). It encourages teachers to join professional communities on Glow, meet with other teachers online, use the CPDReflect tool to reflect on learning, and stay up to date by following the National CPD Team on Twitter and checking their blog. The document also provides links to these online resources and thanks readers.
What are segments, and why should you care about them? This presentation explains and then walks you through using Google Analytics' new Advanced Segments feature.
The document discusses viral marketing strategies and tips. It explains that each additional friend or follower (1) increases the value of all other connections due to the multiplier effect. It also notes that (2) familiarity breeds links, as people are more likely to engage with and share content from familiar sources. Finally, it provides tips for an effective viral marketing workflow, including (3) picking outlets, participating daily, building relationships, writing regularly, having a clear message, and telling your audience.
This document appears to be a series of rants and suggestions about advanced search engine optimization techniques. There is discussion of getting links from universities like Stanford, rebuilding pages to trigger re-crawling by Google, using social media surveys and paid social media followers to increase organic traffic, and buying links from various sources like industry associations and bookmarking sites to improve search engine rankings. The document emphasizes the goal of getting more backlinks and higher search engine rankings through these tactics.
This document discusses strategically using social media. It suggests identifying specific goals for social media use, such as enhancing branding, protecting reputation, building community, enhancing customer service, facilitating research and development, and driving sales or leads. It also emphasizes the importance of defining success metrics and return on investment for social media activities. The document advocates determining goals based on the target audience and their motivations online in order to effectively measure outcomes.
This document provides guidance on using Twitter effectively for business purposes. It recommends becoming a subject matter expert, knowing your audience, searching hashtags and alerts, writing engaging tweets, elevating other users, developing good taste, being a helpful resource, providing positive news, tweeting at optimal times, curating useful lists, avoiding negative or controversial topics, and directing sensitive inquiries to the proper teams. The document also includes contact information for an expert on digital marketing, customer experience, and analytics.
What Successful Nonprofits Get Right about Marketing and FundraisingKivi Leroux Miller
This document discusses strategies for nonprofit communications directors and executive directors. It provides tips for communications directors, including being CALM (Collaborative, Agile, Logical, Methodical) rather than BUSY. For executive directors, it recommends the four D's: DEDICATE time and resources to the work, DEFINE the strategy and priorities, DELEGATE work and decisions, and DISCUSS the work often through regular meetings. The goal is for communications directors to produce great results through focus, clear direction, empowerment, and collaboration.
This document discusses distributed systems approaches like REST, SOA, and WS-* over time. It provides a historical perspective on distributed systems from 1951 to the present. It argues that REST, SOA, and WS-* each have merits and weaknesses, and that a combination of approaches is often best in practice. Hybrid systems are common, with WS-* often used inside the firewall and REST principles helping even there.
Gestión de configuración con mercurial y etckeeperErnesto Crespo
El documento describe cómo usar las herramientas etckeeper y mercurial para realizar control de versiones del directorio /etc en Debian/Ubuntu. Explica cómo instalar y configurar etckeeper y mercurial, iniciar el seguimiento de cambios en /etc, realizar commits de cambios, ver historial y diferencias entre versiones, y subir el repositorio a un servidor central como Bitbucket.
- OpenCourseWare (OCW) is a collection of high-quality educational materials from universities made freely available online for anyone to use. OCW is not a distance learning program and does not offer degrees or credits.
- The OpenCourseWare Consortium (OCWC) is a collaboration between universities to advance open education worldwide by sharing open educational resources, tools, models, and best practices.
- The OCWC helps members through an expert community, conferences, technical recommendations, and collaborative tools to ensure continuity as technologies change.
This document provides an overview and instructions for using StudyWiz, an online platform for teachers to share resources with students. Some key functions of StudyWiz include automatically organizing classes and folders for each teacher, allowing teachers to upload various file types and activities for students, and having an assignment feature for students to electronically submit work. The document explains how teachers can navigate between classes, access and share resources with students, and view student assignment submissions. It also points to additional resources on how to use StudyWiz's various features.
Using Oral Recordings for Reflection in English (with video)Andrew McCarthy
Trialling LanSchool software to monitor student progress on analyzing oral recordings in English. The software allows combining a camera and Skitch annotation tools to develop student thinking. Students can arrange images from graphic novels to highlight themes, then add annotations to images to showcase their analysis. A Keynote presentation brings together the analyzed images and adds narration to discuss the highlighted theme.
The document discusses a project by Professor Rosemeri Krumenaur Stangue to revive classics that was presented at the 2nd State Seminar on Educational Technology in Porto Velho, Brazil on December 11-12, 2010. The project was a success and Professor Rose is congratulated for her dedication.
No Bragging and Nothing Boring: 9 Effective Ways to Share ImpactKivi Leroux Miller
The document outlines 9 effective ways for nonprofits to share their impact with donors through various forms of visual storytelling. These include: 1) Thank you videos, 2) Photos in thank you cards, 3) Client/impact testimonials, 4) Timelines or time lapse videos, 5) Real time or close dashboards, 6) Before and after photos, 7) Behind the scenes photos/videos, 8) Executive director updates, and 9) Infographics. The author encourages nonprofits to implement some of these methods by the end of summer to keep donors plugged in by sharing gratitude for their support and the impact they've made possible.
Dokumen tersebut membahas tentang pentingnya sistem informasi manajemen, termasuk pengertian data, informasi, pengetahuan, dan basis data. Dokumen juga membahas bagaimana teknologi informasi dan komunikasi dapat mendukung pelaksanaan good governance melalui pemanfaatan sistem informasi yang dapat meningkatkan aliran informasi secara fleksibel, cepat, akurat, dan dapat diakses kapan saja dan di mana saja.
The document discusses unit testing anti-patterns. It describes implementation anti-patterns like long tests with many assertions, long test files, tests with complex logic, slow tests, and tests that cannot fail. It also describes workflow anti-patterns like writing tests last, only testing for regression, testing elsewhere than in unit tests, only running tests from the command line, and not using continuous integration. It suggests approaches like writing independent tests, avoiding redundant tests, and testing frequently to avoid these anti-patterns.
This document is the answer filed by the National Hockey League and related entities (Defendants) in response to a complaint filed by Madison Square Garden, L.P. (MSG/Plaintiff). The Defendants deny many of the allegations in MSG's complaint. They admit some factual details, such as MSG owning the New York Rangers hockey team and the NHL fining MSG for certain violations of league rules. Overall, the Defendants argue that the NHL is a legitimate joint venture of its member clubs and is engaged in valid activities to produce and market the sport of hockey.
This document discusses various energy resources including geothermal energy from the earth's core, ways to conserve energy such as using solar panels and wind energy to prevent destroying the earth and flooding it with litter. It also mentions wasting energy and using a fan as ways to conserve.
Opera mini use_and_user_behavior_white_paperLiu Xing
Opera Mini is the world's most popular mobile browser. A global study analyzed trends in mobile internet browsing and compared Opera users to non-Opera users. Some key findings were:
1) Opera users are more active mobile internet users, with 56% being mobile-only users compared to 43% of non-Opera users.
2) Opera users are more satisfied with their mobile experience, rating their handset satisfaction 7.3/10 and operator satisfaction 7/10 compared to 6.6/10 and 6.7/10 for non-Opera users.
3) Opera users are stronger promoters of the Opera browser and mobile internet in general, with a net promoter score 11%
The document discusses viral marketing strategies and tips. It explains that each additional friend or follower (1) increases the value of all other connections due to the multiplier effect. It also notes that (2) familiarity breeds links, as people are more likely to engage with and share content from familiar sources. Finally, it provides tips for an effective viral marketing workflow, including (3) picking outlets, participating daily, building relationships, writing regularly, having a clear message, and telling your audience.
This document appears to be a series of rants and suggestions about advanced search engine optimization techniques. There is discussion of getting links from universities like Stanford, rebuilding pages to trigger re-crawling by Google, using social media surveys and paid social media followers to increase organic traffic, and buying links from various sources like industry associations and bookmarking sites to improve search engine rankings. The document emphasizes the goal of getting more backlinks and higher search engine rankings through these tactics.
This document discusses strategically using social media. It suggests identifying specific goals for social media use, such as enhancing branding, protecting reputation, building community, enhancing customer service, facilitating research and development, and driving sales or leads. It also emphasizes the importance of defining success metrics and return on investment for social media activities. The document advocates determining goals based on the target audience and their motivations online in order to effectively measure outcomes.
This document provides guidance on using Twitter effectively for business purposes. It recommends becoming a subject matter expert, knowing your audience, searching hashtags and alerts, writing engaging tweets, elevating other users, developing good taste, being a helpful resource, providing positive news, tweeting at optimal times, curating useful lists, avoiding negative or controversial topics, and directing sensitive inquiries to the proper teams. The document also includes contact information for an expert on digital marketing, customer experience, and analytics.
What Successful Nonprofits Get Right about Marketing and FundraisingKivi Leroux Miller
This document discusses strategies for nonprofit communications directors and executive directors. It provides tips for communications directors, including being CALM (Collaborative, Agile, Logical, Methodical) rather than BUSY. For executive directors, it recommends the four D's: DEDICATE time and resources to the work, DEFINE the strategy and priorities, DELEGATE work and decisions, and DISCUSS the work often through regular meetings. The goal is for communications directors to produce great results through focus, clear direction, empowerment, and collaboration.
This document discusses distributed systems approaches like REST, SOA, and WS-* over time. It provides a historical perspective on distributed systems from 1951 to the present. It argues that REST, SOA, and WS-* each have merits and weaknesses, and that a combination of approaches is often best in practice. Hybrid systems are common, with WS-* often used inside the firewall and REST principles helping even there.
Gestión de configuración con mercurial y etckeeperErnesto Crespo
El documento describe cómo usar las herramientas etckeeper y mercurial para realizar control de versiones del directorio /etc en Debian/Ubuntu. Explica cómo instalar y configurar etckeeper y mercurial, iniciar el seguimiento de cambios en /etc, realizar commits de cambios, ver historial y diferencias entre versiones, y subir el repositorio a un servidor central como Bitbucket.
- OpenCourseWare (OCW) is a collection of high-quality educational materials from universities made freely available online for anyone to use. OCW is not a distance learning program and does not offer degrees or credits.
- The OpenCourseWare Consortium (OCWC) is a collaboration between universities to advance open education worldwide by sharing open educational resources, tools, models, and best practices.
- The OCWC helps members through an expert community, conferences, technical recommendations, and collaborative tools to ensure continuity as technologies change.
This document provides an overview and instructions for using StudyWiz, an online platform for teachers to share resources with students. Some key functions of StudyWiz include automatically organizing classes and folders for each teacher, allowing teachers to upload various file types and activities for students, and having an assignment feature for students to electronically submit work. The document explains how teachers can navigate between classes, access and share resources with students, and view student assignment submissions. It also points to additional resources on how to use StudyWiz's various features.
Using Oral Recordings for Reflection in English (with video)Andrew McCarthy
Trialling LanSchool software to monitor student progress on analyzing oral recordings in English. The software allows combining a camera and Skitch annotation tools to develop student thinking. Students can arrange images from graphic novels to highlight themes, then add annotations to images to showcase their analysis. A Keynote presentation brings together the analyzed images and adds narration to discuss the highlighted theme.
The document discusses a project by Professor Rosemeri Krumenaur Stangue to revive classics that was presented at the 2nd State Seminar on Educational Technology in Porto Velho, Brazil on December 11-12, 2010. The project was a success and Professor Rose is congratulated for her dedication.
No Bragging and Nothing Boring: 9 Effective Ways to Share ImpactKivi Leroux Miller
The document outlines 9 effective ways for nonprofits to share their impact with donors through various forms of visual storytelling. These include: 1) Thank you videos, 2) Photos in thank you cards, 3) Client/impact testimonials, 4) Timelines or time lapse videos, 5) Real time or close dashboards, 6) Before and after photos, 7) Behind the scenes photos/videos, 8) Executive director updates, and 9) Infographics. The author encourages nonprofits to implement some of these methods by the end of summer to keep donors plugged in by sharing gratitude for their support and the impact they've made possible.
Dokumen tersebut membahas tentang pentingnya sistem informasi manajemen, termasuk pengertian data, informasi, pengetahuan, dan basis data. Dokumen juga membahas bagaimana teknologi informasi dan komunikasi dapat mendukung pelaksanaan good governance melalui pemanfaatan sistem informasi yang dapat meningkatkan aliran informasi secara fleksibel, cepat, akurat, dan dapat diakses kapan saja dan di mana saja.
The document discusses unit testing anti-patterns. It describes implementation anti-patterns like long tests with many assertions, long test files, tests with complex logic, slow tests, and tests that cannot fail. It also describes workflow anti-patterns like writing tests last, only testing for regression, testing elsewhere than in unit tests, only running tests from the command line, and not using continuous integration. It suggests approaches like writing independent tests, avoiding redundant tests, and testing frequently to avoid these anti-patterns.
This document is the answer filed by the National Hockey League and related entities (Defendants) in response to a complaint filed by Madison Square Garden, L.P. (MSG/Plaintiff). The Defendants deny many of the allegations in MSG's complaint. They admit some factual details, such as MSG owning the New York Rangers hockey team and the NHL fining MSG for certain violations of league rules. Overall, the Defendants argue that the NHL is a legitimate joint venture of its member clubs and is engaged in valid activities to produce and market the sport of hockey.
This document discusses various energy resources including geothermal energy from the earth's core, ways to conserve energy such as using solar panels and wind energy to prevent destroying the earth and flooding it with litter. It also mentions wasting energy and using a fan as ways to conserve.
Opera mini use_and_user_behavior_white_paperLiu Xing
Opera Mini is the world's most popular mobile browser. A global study analyzed trends in mobile internet browsing and compared Opera users to non-Opera users. Some key findings were:
1) Opera users are more active mobile internet users, with 56% being mobile-only users compared to 43% of non-Opera users.
2) Opera users are more satisfied with their mobile experience, rating their handset satisfaction 7.3/10 and operator satisfaction 7/10 compared to 6.6/10 and 6.7/10 for non-Opera users.
3) Opera users are stronger promoters of the Opera browser and mobile internet in general, with a net promoter score 11%
Adobe unveiled Flash Player 10.1, bringing Flash capabilities to smartphones, smartbooks, netbooks and other internet-connected devices. This allows content created with Flash to reach users across various platforms. Close to 50 companies are supporting this through the Open Screen Project. Flash Player 10.1 will provide rich browsing of applications, content and videos across different devices through a consistent runtime environment. It is expected to be available through public betas for Windows Mobile, Palm webOS and desktop platforms later in 2009, with betas for Android and Symbian in early 2010.
The document summarizes IDA's decisions on proposed guidelines regarding contract periods and early termination charges for telecommunication services offered to residential end users in Singapore.
Key points:
- IDA proposed guidelines to limit contract periods to 24 months and require graduated (decreasing) early termination charges. They received feedback supporting and opposing these proposals.
- IDA decided to implement guidelines capping contract periods at 24 months to promote competition and switching between providers. They will also require early termination charges to be graduated and exclude any costs operators avoid due to termination.
This white paper provides an overview of the Satio mobile phone. It includes a product overview describing key features like the 12.1 megapixel camera and 3.5 inch touchscreen. Technical specifications on dimensions, memory, and network support are also listed. The document then details various technologies included, such as Bluetooth, WiFi, Java, messaging, and multimedia support.
The document is the April 2009 draft of the 5th edition of the ECMAScript Language Specification published by Ecma International. It provides an introduction and overview of ECMAScript, outlines the document contents and structure, and serves as a draft standard for review and feedback by July 15, 2009.
1. Surfing the Internet Safely
(for Journalists)
Foreign Correspondents Club of China
June 19, 2008
Andrew Lih
http://www.andrewlih.com/
Copyright 2009 Andrew Lih
8. Definitions
• URL: Uniform Resource Location
http://www.foo.com/news.html
• DNS: Domain name system
Convert www.foo.com to numerical address
• Internet protocol (IP) address:
Unique ID of computer on Internet
(like 128.51.56.122)
Used to route packets across the Internet
9. Typical Scenario
• Computer connects to Internet
DSL, Starbucks, corporate, et al.
• Gets a DHCP welcome package
IP address and DNS server
• Access web page URL
http://www.foo.com/news.html
10.
11.
12.
13.
14.
15.
16.
17. Sequence
• Happens quickly (hopefully)
• Multiple “GET”s for images, ads, video,
scripts, documents, audio, et al.
35. Motivation
• Annoyance
• Productivity
• Corporate safety and privacy
• Time
36. 1. Hardware router
• Prevents outside traffic
to naked computer
• Share single connection, Wi-Fi
• Use NAT “shield”
• Use WPA or WPA-2 encryption (not WEP)
• Manufacturers: Linksys, Netgear, D-Link, TP-
LINK, Apple, Travel: Apple Airport
37. 2. Firewall software
• Turn on Windows Firewall
• Only allow known connections in/out
• May need some customization
• Apple: Security preferences
38.
39. 3. Hosts file
• Blacklist of known bad sites (built into
Windows/Mac)
• HostMan (Windows) manages hosts file
• http://www.abelhadigital.com (Wordpress)
40.
41. 4. Browser execution
• Web 2.0: no longer just a read-only page
• Javascript (AJAX, Google Docs, et al.)
• Flash (YouTube)
• Java
• ActiveX (Microsoft)
47. McAfee Siteadvisor
• Firefox plugin, warns of bad sites
• McAfee trusted name in security
• Integrates with Google searches
48.
49.
50. 5. Viruses/Spyware
• Infect computer through email, web
surfing, or just sitting on the Internet
• Virus: destroy data, nuisance
• Spyware: sucks processor time, steals
private data, becomes part of botnet
51. 5. Viruses/Spyware
• Get good software
• BitDefender or Kaspersky ($)
• Avira AntiVir (free)
• Ad-aware (free)
• Spybot Search and Destroy (free)
• Webroot Spysweeper
52. 6. Secure connections
• Virtual Private Network (VPN)
• Your news operation/company may already
give you this capability
• Surf any site, no Great Firewall blocks
• Public options:
HotspotVPN ($8.88/mo)
PublicVPN ($59.95/yr)
Witopia personalVPN ($39.99/yr)
55. Passwords
• Have three types on hand
• Trivial (“buddha”)
• Nontrivial (“h@ppybuddh@”)
• Banking strength
("6eijin9spring!1978", like Beijing Spring)
57. Internet access
• Home, cafes, wireless, hotels on the road
• Consider extremely insecure
• Who can contact your computer?
• Who can read what you’re doing?
• Passwords in the clear?
58. Steps
• Google mail - https://mail.google.com/mail
• Note the “S” and must be that address!
• Entire session is encrypted
• Yahoo/Hotmail - encrypted login, not
session!
60. VPN
• VPNs good for general use
• Protect against snoopers in Starbucks and on
hotel broadband
61. Prescriptions
• Have some type of VPN accessible
• Use Secure Google Mail (https://
mail.google.com/)
• Use Skype for secure chat
• Use a broadband router at home (Linksys
WRT-54G or Apple Airport)
• Use Apple Macintosh (w/Windows)
62. Review
• If you remember nothing else today...
• Hardware firewall
• Firefox and plugins
• Antivirus/Antispyware software
• Avoid Yahoo/Hotmail
• www.andrewlih.com/securitytips
63. Retooled
Old New
Internet Explorer Mozilla Firefox
Yahoo/Hotmail Google mail (https)
Weak password Strong passwords
Cleartext transmissions VPN or secure email
Naked computer Router/firewall
No security software Antivirus/Antispyware
Instant messaging Skype
Naked email HushMail