"The trending news section is run by people in their 20s and early 30s, most of whom graduated from Ivy League and private East Coast schools like Columbia University and NYU. They’ve previously worked at outlets like the New York Daily News, Bloomberg, MSNBC, and the Guardian. Some former curators have left Facebook for jobs at organizations including the New Yorker, Mashable, and Sky Sports.
According to former team members interviewed by Gizmodo, this small group has the power to choose what stories make it onto the trending bar and, more importantly, what news sites each topic links out to. “We choose what’s trending,” said one. “There was no real standard for measuring what qualified as news and what didn’t. It was up to the news curator to decide.”"
Please remember this when you decide to use Facebook, or any social media platform for your news reading. No one knows for sure how they decide something is "trending", and there is nothing preventing them from drawing your attention to things they want you to know, while not promoting things they would prefer you not know.
National Small Business Week is underway, and the festivities didn't take long to address one of the most glaring and ever-present issues for small to midsize businesses (SMBs): cybersecurity. The Small Business Administration (SBA) is the US government agency dedicated to providing concrete help, training, and recommendations that small businesses can put into practice right away in their day-to-day operations. To that end, rather than just offer pie-in-the-sky security trends, today's SBA cybersecurity panel gave SMBs concrete tips, resources, and steps they can take to mitigate security vulnerabilities and put a comprehensive security strategy in place.
These are pretty good, and while some of them may require a bit more time and planning, there really are some things you can do right now, even if you aren't a business.
Hey you, with the mental health concerns - whatever you're going through, wherever you're at, this is a friendly reminder that there's nothing wrong with you. While approximately 1 in 5 adults in the U.S. experiences mental illness in a given year, everyone has mental health that deserves to be taken care of.<br /><br />So for anyone going through a rough time right now, we asked the JED Foundation's community to tell us one thing they'd tell a friend to encourage them to take care of their emotional health.<br /><br />Listen, friends. Here's what your community wants you to know:
These are pretty good, I think some of them may even be things I've written or said to people over the years too!
This situation tonight is something that shows the real danger of hacking. We all know what kind of havoc can be created when someone steals your personal information, but here it's not just someone gaining access to information about this kid, it's someone getting into the account and planting information.
That's the real danger in hacking, that anyone, anytime, can make public what used to be private, or create wholly new "data" from nothing, and have it accepted as truth.
Laremy Tunsil may have, at some point, smoked from a bong. It may have been years ago, as he claims, or not, we don't really know. What we do know is that video came out at exactly the right time to cost him millions of dollars. That was no accident. Someone meant for that to happen.
That is a hacker targeting an individual in order to ruin them. There are so many insecure databases out there where a hacker could do the same thing to any of us. It's only going to get worse, I'm afraid.
Hackers are getting faster whilst defenders are treading water. Over 99 per cent of attacks compromise systems within days (four out of five do it within minutes), and two-thirds of those siphon off data within days (a fifth do it in minutes). Whilst there was an improvement in the number of breaches detected in 'days or less' noted in the last DBIR, that turned out to be a temporary blip. This year, less than a quarter of breaches were detected within the same timeframe – meaning attackers have almost always gotten away with the goods before anyone notices.<br /><br />Worse yet, it's usually not the victim that notices the breach, but a third party (normally either a security researcher or law enforcement).<br /><br />Nearly two-thirds of all breaches are still traced back to weak or stolen passwords – a basic security failure.
This is not good news, not even close. Your data has been hacked, you might as well accept that.
A new study has found a link between a lack of sleep and an elevated risk for illness.<br /><br />The new study builds on previous studies that found that a lack of sleep impacts that activation of the immune system, inflammation, carbohydrate metabolism and the hormones that regulate appetite. Now Finnish researchers at the University of Helsinki have found that sleep loss also influences cholesterol metabolism.
This is why working all those extra hours is at the very least leading to a higher likelihood of illness, but might possibly be killing us as well.
Is what you're so proud to be working on at 2AM worth it?
US-CERT (U.S. Computer Emergency Readiness Team) based its alert on news Thursday from Trend Micro's TippingPoint group, which said it had been told by Apple that QuickTime on Windows had been deprecated, or dropped from support, meaning no future security updates will be issued and development has been halted.
Lose it, it has vulnerabilities and won't updated. That is a recipe for disaster on your PC.
Encryption and how you control data your is a hot topic right now, but understanding encryption and how it relates to your personal data is confusing. YouTuber CGP Grey explains encryption, as well as some of the issues up for debate right now, as simply as possible.
With 90% of children under 10 going online, and 86% of children aged between seven and 11 using some form of online communication, the risk is there from an early age.<br /><br />The more you know about the kind of social networking sites your child belongs to and what information they like to share, the more likely you’ll be able to keep them safe.
But it does require you to know about the technology that kids are using. It might be funny to joke about how the kids can use these new-fangled devices that we don't even understand, but if you expect to keep an eye on what those kids are doing, it's going to require some familiarity of your own. Social networks and online gaming might not be your cup of tea, but your kids are using them, so you should be too.
This apology for unreadable text always makes me wince because it is a self-inflicted wound. When you show text to the jury, it should be because you want the jury to read and understand something. Large blocks of small, difficult-to-read text usually serve only to distract and annoy an audience.
I'd say this goes double for trainers. Don't repeatably, apologize for things not looking correctly, fix it.
Virtual Private Networks (VPNs) have become an important tool not just for large companies, but also for individuals to improve web privacy, dodge content restrictions and counter growing threat of cyber attacks.<br />Opera has released an updated desktop version of its web browser with a Free built-in VPN service to keep you safe on the Internet with just a click.<br />That's a great deal!
That is a pretty nice deal. Anyone used it yet?
We’ve known for years that our minds need downtime in between focused work. But add the 24/7 stimulation of smartphone technology and, psychiatrist and author Edward M. Hallowell says, we overload the brain’s circuits, which causes smart people to under-perform at work.<br /><br />This frequently happens within the standard eight-hour workday. Take that information overload and stretch it out over 10 or 15 hours of overtime at the office, and you lose productivity quickly.
Gee, just when businesses convinced themselves that all this technology could get us to work more, it turns out they may be shooting themselves in the foot with it. ;-)
"The thought that networking would be one of the most important aspects of my career never occurred to me. It wasn’t until much later that I understood what people were saying. The problem wasn’t that I was a bad networker, it was that I was following a recipe that was just not made for my personality.<br /><br />It took me years to find the type of networking that works for me. It’s more natural, more organic. It doesn’t happen in large settings, and usually doesn’t involve me thinking up questions in advance. And it certainly does not make me have an anxiety attack because I’m worrying about being interested and interesting."
Let's face it, us introverts need all the tips we can get. Here's some good ones to think about, and act on!
"Windows XP exited public support on April 8, 2014, amid some panic on the part of corporations that had not yet purged their environments of the 2001 OS. Unless companies paid for custom support, their PCs running XP received no security updates after that date"
And we wonder why there are so many vulnerable computers on the internet. This would be one, of many, reasons.
If you're running XP, you are not secure. You haven't been for a long time.
I'm going to with....
Sometimes they will contain the data necessary to prove your case, and other times they will contain all sorts of data that do nothing but muddy up your case and the discovery process.
"If Nest wanted to increase profits it could sell your home’s environment data to advertisers. Too cold? Amazon ads for blankets. Too hot? A banner ad for an air conditioner. Too humid? Dehumidifiers up in your Facebook.
To be clear, that hasn’t happened yet but Nest already shares “anonymous” data with “partners” and Google just happens to be in the business of showing you ads for things. It’s something that will eventuate."
This will absolutely happen. Everything has been turned into marketing, why wouldn't your connected home information become part of the same attempt to get personalized advertising.
"Still, we should wait before writing any eulogies. Most learning professionals doubt traditional classroom learning will ever go extinct. After all, it makes up more training hours available than any other delivery method. Instead, they envision it incorporating technology to achieve a blended format that takes advantage of both tools’ strengths. According to ATD’s research report Instructional Design Now, 70 percent of talent development professionals think a blended approach will characterize learning by 2020. "
Here's the reality that many in the training industry, especially those who work with the companies who sell online and on-deman training tools won't tell you.
Students don't learn as much as they do in classrooms.
That's not to say that online training, or recorded on-demand training doesn't have some value, and that you can't learn a lot that way, but having spent the last 4 years fulltime doing training live in person, live online and through recordings, I feel pretty strongly that online and recorded content only goes so far. The level of distraction in a classroom is nowhere near as bad as it is for the other options when no one can really see whether you're paying attention or not.
Let's be honest, if you have 3-4 days of training, how many of you could sit in front of your own computer, in your own office, and take part in that without interruption? How many of you would get through that much recorded material? Exactly.
Now, do short recordings augment the classroom training, helping you grab some small piece that you need a reminder of after the classroom? Absolutely. But people starting out watching the recordings, or interacting through a web conference, are behind their counterparts who dedicated the time and effort to attend classroom training. That's just the reality. They may eventually learn just as much, but it will be a slower process. (Albeit probably a cheaper one if the classroom involves travel.)
At least that has been what I've seen. What has your experience been?
"One interesting quote from Edelson in the article: "Firms are incapable of getting the 60-year-old rainmaking partner to not use public Wi-Fi to access client data on a computer that is not secure . . . they are just totally dropping the ball there." I can't verify whether that is accurate, but it shouldn't be happening at large law firms. Hopefully, technology and training together can prevent that problem . . . but maybe I'm wrong . . ."
I'd like to think that sort of thing isn't happening, but I worked in firms long enough to know that it probably is. Law firms targeted by this class action may find themselves in a bad way legally, and in terms of bad publicity.
This article is about lawyers and law firms, but honestly, the first two ways firms are using technology, social networks and blogs, apply to anyone who is seeking to stand out in their field.
What better way to make a name for yourself that being an informational resource on social media and blogging about important topics?
Why are technology companies who promote the use of their products for business messing around with April Fool's pranks inside those same products? That's just stupid.
Click in to find related links.