DIGITALATTACKMAP.COM
Google has developed a graphical depiction of denial of service attacks around the globe. This can be seen at http://www.digitalattackmap.com
. -DDLabels: DDoS, denial of service, Digitalattackmap.com, google
Information Sources & Information Sifting Techniques
I am a retired librarian, most recently serving at Indiana Wesleyan University's Cleveland Education Center.
Google has developed a graphical depiction of denial of service attacks around the globe. This can be seen at http://www.digitalattackmap.com
. -DDLabels: DDoS, denial of service, Digitalattackmap.com, google
Yorgen Edholm muses on the growing problem of constant mobile access. He mentions a new term, "nomophobia, which he defined defined as "a condition that causes individuals to feel anxious when they have no access to mobile technology."
-DDLabels: access to mobile technology, nomophobia, smartphone, tablet
Sharon Florentine of CIO Magazine shares "Ten Job Search Tips for Introverts." Her biggest tip is "don't try to be something you're not." Honesty about your work style/expectations helps avoid later problems with fitting into the corporate environment.
-DDLabels: introverts, Job Search
The Russian equivilent of Google is Yandex.com . It offers search of the Web, images, and video, as well as translation and Web mail services.
-DDLabels: Russia, search engines, Yandex.com
Lucas Mearian reports that Verizon is launching a cloud for securely sharing data from patient remote monitoring devices . This could be a lifesaver for patients and a source of research data for clinicians. There are security risks with such a service, and some joker will probably put ice cubes on his thermometer, but overall it appears to be a benefit to society.
-DDLabels: Remote patient monitoring
Colin Nagle reports "How LinkedIn Snuck Intro Info Into Emails on iOS ." The article describes how the LinkedIn technology team bypassed security on iPhones and iPads to to allow email senders to include a links to the sender's LinkedIn profile with each outgoing email. The technology is described in more detail on LinkedIn's Engineering Blog.
LinkedIn addresses the privacy concerns of routing a person's email through the LinkedIn proxy server. There are a couple of additional concerns about the proxy technology being employed. First of all, having all of a person's mobile-generated email routed through the LinkedIn proxy server creates a new point of failure in email transmission. If the LinkedIn server is overtaxed or fails, then there is a potential for email to be delayed or undelivered.
Second, as this service was developed without Apple's approval and counter's Apple's security provisions, the possibility exists that that Apple will block the usage of the technology in a future iOS update, resulting in the inability to transmit new email from an iPhone or iPad until the LinkedIn technology is deleted.
In summary, I think the LinkedIn engineering team was very creative, but I would not opt-in for the service if I used an iPhone for critical emails.
-DDLabels: email marketing, internet security, iOS, iPad, iphone, LinkedIn
Melissa Shaw developed a PowerPoint which shares "what employers want, what job-hunters must do, and the disconnect between the two parties when it comes to interviewing, social media, etiquette and more." In her presentation, called "Nine Things Job-Hunters Expect and What Employers Really Want ," Shaw explores the expectations of job searchers, and the consequences to corporate reputation if those expectations are unmet. She cites a "CareerBuilder study, [which] shows that job seekers who don't hear back after applying to an employer are more likely to stop buying products or services from the company" (slide 9). A corporation's reputation is very important to human resources, as Shaw also notes that:
Labels: Employment, hiring, Job Search
Eden Dahlstrom, J. D. Walker and Charles Dziuban prepared the ECAR Study of Undergraduate Students and Information Technology, 2013 . Key findings are that students value privacy and expect schools to teach them the technology they require.
-DDAmy Cavendender visits the topic of creating "Civil and Productive Discussions ." This article expands on an earlier post on classroom discussions and modeling civility.
-DDLabels: Civility, Discussion
Jason Jones shares highlights from the ECAR Study of Undergraduate Students and Information Technology, 2013. Probably the most surprising classroom innovation is a large number of students are using smart phones to record lectures.
-DDLabels: information technology
Craig Mundie, Microsoft's Chief Security Advisor, is reported to have said that abusing personal data should be a felony . Network World reporter Bob Brown says "He envisions a 'usage-based way of controlling data' under which information would be protected in a sort of cryptographic wrapper (think digital rights management on movie DVDs or music CDs) with metadata defining what can – and more importantly – can’t be done with the data."
Mike Acker made a notable comment on this article: "Everyone should be recognized as owning a Creative Commons Copyright on their Personal Data. Copying or otherwise selling or distributing such data without written permission from the owner is a copyright violation just like pirating a song, $150,000 per occurence." While the concept is simple, it would inhibit bloggers such as myself, who often use the words of others in their posts.
-DDLabels: digital certificate, personal data
Over one thousand Talks at Google are available at YouTube. These talks or interviews (often featuring popular celebraties) were originally presented at Google staff meetings and are often informative. For example, science fiction author Hannu Rajaniemi muses about "The Future of the Book," sharing speculation about new book technologies and the potential for interactions between a reader and the book. And I was surprised at how uncomfortable Lady Gaga appeared in the few minutes I watched of her interview -- so different from her stage persona where she has complete control.
-DD
Labels: google, Talks at Google
Joan Goodchild shares a "rogues gallery of 9 infamous social engineers ."
-DDLabels: Pretenders, Scams, social engineering