Kníže Marek Basarab jako kandidát na udělení českého inkolátu v roce 1607. Muzejní a vlastivědná práce – Časopis Společnosti přátel starožitností českých 3-4/XLIV (CXIV), 2006, s. 208-212, ISSN 0027-5255
Twitter: Professional Development and Instruction Julie Anne Kent
Presentation to faculty on the following points: social networking tools that allows people to share information
a real-time feed to like-minded individuals
in an education or training context could represent a powerful way for educators to publicize research, communicate with their students, be connected with a wider learning or scholarly community, or signpost “followers” to interesting resources, and news stories.
NOZZLE: A Defense Against Heap-spraying Code Injection AttacksNorman Mayes
Heap spraying is a security attack that increases the exploitability of memory corruption errors in type-unsafe
applications. In a heap-spraying attack, an attacker coerces an application to allocate many objects containing
malicious code in the heap, increasing the success rate of
an exploit that jumps to a location within the heap. Because heap layout randomization necessitates new forms
of attack, spraying has been used in many recent security
exploits.
Twitter: Professional Development and Instruction Tool: Faculty HandoutJulie Anne Kent
Twitter defined: a 140-character micro blog considered one of several Web 2.0 social networking tools, connecting people and information in real time. In an education or training context, Twitter is a powerful way for educators / instructors / trainers / researchers to publicize research, communicate with students, connect with broader learning or scholarly community, or alert “followers” to resources and events.
There are three things that matter in relation to a networked specific practice and media production. These three terms apply to the formal attributes of digital media, and so address the qualities that practice requires, and how we participate, use, and engage with networked media. There is no hierarchy amongst these three terms, and they may prove to be insufficient. The terms are porousness, granularity, and facets. The list does not include database, user, or interactivity, as these are not causes but consequences of this triumvirate of terms.
Twitter: Professional Development and Instruction Julie Anne Kent
Presentation to faculty on the following points: social networking tools that allows people to share information
a real-time feed to like-minded individuals
in an education or training context could represent a powerful way for educators to publicize research, communicate with their students, be connected with a wider learning or scholarly community, or signpost “followers” to interesting resources, and news stories.
NOZZLE: A Defense Against Heap-spraying Code Injection AttacksNorman Mayes
Heap spraying is a security attack that increases the exploitability of memory corruption errors in type-unsafe
applications. In a heap-spraying attack, an attacker coerces an application to allocate many objects containing
malicious code in the heap, increasing the success rate of
an exploit that jumps to a location within the heap. Because heap layout randomization necessitates new forms
of attack, spraying has been used in many recent security
exploits.
Twitter: Professional Development and Instruction Tool: Faculty HandoutJulie Anne Kent
Twitter defined: a 140-character micro blog considered one of several Web 2.0 social networking tools, connecting people and information in real time. In an education or training context, Twitter is a powerful way for educators / instructors / trainers / researchers to publicize research, communicate with students, connect with broader learning or scholarly community, or alert “followers” to resources and events.
There are three things that matter in relation to a networked specific practice and media production. These three terms apply to the formal attributes of digital media, and so address the qualities that practice requires, and how we participate, use, and engage with networked media. There is no hierarchy amongst these three terms, and they may prove to be insufficient. The terms are porousness, granularity, and facets. The list does not include database, user, or interactivity, as these are not causes but consequences of this triumvirate of terms.
Vincent Forseth, 12, received a heart transplant at Children’s Hospital of Wisconsin the day before his seventh birthday. He was selected for his courage to represent Wisconsin for Children’s Miracle Network Hospitals Champions program in 2011. Vincent was the first child in the Midwest to receive a Berlin Heart, a ventricular assist device, to keep him going until a donor heart could be found. Champions like Vincent have dealt with a wide variety of injuries and illnesses. A special ceremony was held for Vincent Wednesday at a Walmart store in Madison, where he was surprised with a $500 shopping card, a performance from the University of Wisconsin marching band and a football jersey from his favorite coach, Bret Bielema.
Not all sources on the Web are equally valuable or reliable. Individual sites are not screened or standardized in any way to determine if the information they provide is accurate or useful. Critically evaluating the information you find is central to successful academic research. Determining the credibility of information found on the Web is not always easy - think of the following criteria during evaluation. The World Wide Web offers a great wealth of information, as well as the opportunity for people to express themselves and exchange ideas. This makes it a potentially great place to accomplish research on many topics. But putting documents or pages on the Web is easy, cheap or free, unregulated and unmonitored. If you are using a Web-based source for a research paper, you will need to develop skills to evaluate the credibility and appropriateness of what you find. The following checklist presents questions to ask to help determine whether a Web page is a suitable resource for a research paper, or not. Don't expect to be able to answer all the questions, all the time, for all Web sites you look at. Rather, try to use the questions as a tool to help you look at Web pages critically.
Information literacy instruction session delivered to first year students. Topics covered included APA ciation, Google syntax and search strategies, library catalogue searching, and database interface features and functionality.
Course 1: Create and Prepare Ubuntu 12.04 VM TemplateImad Daou
The following Course will focus mainly on a private Virtual Environment such VirtualBox or VMware Station. However, if you are willing to setup straight on DigitalOcean or Vultr, then you can skip Course1 and jump to Course2. But, I highly recommend to go through Course1 to build In-house local Web Hosting Server for testing or developing purpose. After all, the concept is same on either Private or Public Virtual environment.
There are no systems that are connected to the Internet that are completely safe. Cyber-attacks are the norm. Everyone with a web presence is attacked multiple times each week. To further complicate this scenario, government entities have been found to be weakening Web security protocols and compromising business systems in the interest of national security, and hyper-competitive companies have been caught engaging in cyber-espionage. Detection of these attacks in real-time is difficult due to a number of reasons. The primary ones being the dynamism and ingenuity of the attacker and the nature of contemporary real-time attack detection systems. In this talk, I will share insights on an alternative, i.e. quickly recognizing attacks in a short period of time after the incident using audit analysis.
Презентация с мастер-класса, прошедшего в рамках конференции "Преподавание информационных технологий в Российской Федерации" 17 мая 2012 г. Рассказано о самой эффективной на сегодняшний день форме обучения, которую развивает в России "Сетевая Академия ЛАНИТ" и которая получила название "персональное обучение".
Vincent Forseth, 12, received a heart transplant at Children’s Hospital of Wisconsin the day before his seventh birthday. He was selected for his courage to represent Wisconsin for Children’s Miracle Network Hospitals Champions program in 2011. Vincent was the first child in the Midwest to receive a Berlin Heart, a ventricular assist device, to keep him going until a donor heart could be found. Champions like Vincent have dealt with a wide variety of injuries and illnesses. A special ceremony was held for Vincent Wednesday at a Walmart store in Madison, where he was surprised with a $500 shopping card, a performance from the University of Wisconsin marching band and a football jersey from his favorite coach, Bret Bielema.
Not all sources on the Web are equally valuable or reliable. Individual sites are not screened or standardized in any way to determine if the information they provide is accurate or useful. Critically evaluating the information you find is central to successful academic research. Determining the credibility of information found on the Web is not always easy - think of the following criteria during evaluation. The World Wide Web offers a great wealth of information, as well as the opportunity for people to express themselves and exchange ideas. This makes it a potentially great place to accomplish research on many topics. But putting documents or pages on the Web is easy, cheap or free, unregulated and unmonitored. If you are using a Web-based source for a research paper, you will need to develop skills to evaluate the credibility and appropriateness of what you find. The following checklist presents questions to ask to help determine whether a Web page is a suitable resource for a research paper, or not. Don't expect to be able to answer all the questions, all the time, for all Web sites you look at. Rather, try to use the questions as a tool to help you look at Web pages critically.
Information literacy instruction session delivered to first year students. Topics covered included APA ciation, Google syntax and search strategies, library catalogue searching, and database interface features and functionality.
Course 1: Create and Prepare Ubuntu 12.04 VM TemplateImad Daou
The following Course will focus mainly on a private Virtual Environment such VirtualBox or VMware Station. However, if you are willing to setup straight on DigitalOcean or Vultr, then you can skip Course1 and jump to Course2. But, I highly recommend to go through Course1 to build In-house local Web Hosting Server for testing or developing purpose. After all, the concept is same on either Private or Public Virtual environment.
There are no systems that are connected to the Internet that are completely safe. Cyber-attacks are the norm. Everyone with a web presence is attacked multiple times each week. To further complicate this scenario, government entities have been found to be weakening Web security protocols and compromising business systems in the interest of national security, and hyper-competitive companies have been caught engaging in cyber-espionage. Detection of these attacks in real-time is difficult due to a number of reasons. The primary ones being the dynamism and ingenuity of the attacker and the nature of contemporary real-time attack detection systems. In this talk, I will share insights on an alternative, i.e. quickly recognizing attacks in a short period of time after the incident using audit analysis.
Презентация с мастер-класса, прошедшего в рамках конференции "Преподавание информационных технологий в Российской Федерации" 17 мая 2012 г. Рассказано о самой эффективной на сегодняшний день форме обучения, которую развивает в России "Сетевая Академия ЛАНИТ" и которая получила название "персональное обучение".