More on replacing business travel from Jessica Lipnack | Full Circle Associates

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

More on replacing business travel from Jessica Lipnack | Full Circle Associates


More on replacing business travel from Jessica Lipnack | Full Circle Associates

Posted: 27 Jul 2008 07:51 PM PDT


Then I saw this post on Facebook by NetTeams wizardess, Jessica Lipnack. Her emphasis on the social processes resonates. Twenty percent? Me thinks a lot higher. But, numbers aside, where Lohr's article is like all the rest – and where it misses the point – is in this: Technology alone does not solve the problem. Relief!

Brought to you by: Informal Learning Flow

Web 2.0 and Personal Learning Environments (PLEs) " Learning Matters!

Posted: 27 Jun 2008 09:16 AM PDT


Learning Matters! and Personal Learning Environments (PLEs). Filed under: Annual Gathering , Jay Cross , PLE , Steven Downes , e- Learning Guild — wadatripp @ 10:09 pm. and a bit of 3D) meets Corporate Learning — or if that is not what it was he wanted us to talk about it is certainly where it went. TED Blog.

Brought to you by: Informal Learning Flow

e-Clippings (Learning As Art): Where Do You Begin (Part II)

Posted: 26 Mar 2007 06:25 AM PDT


e-Clippings ( Learning As Art) Home Archives Subscribe About My Social Networks « Where do you begin when you havent posted in like 2 weeks? Adkins (from Learning Circuits): excerpt " Accordingto recent Ambient Insight market research, the 2006 U.S. Who Comments on Blogs , and Why? Main |.but percent." Comments?

Brought to you by: Informal Learning Flow

stevenberlinjohnson.com: Who Needs Oprah When You Have BillG?

Posted: 27 Jan 2006 02:26 PM PST


spent the morning writing in my hotel room, but in the afternoon I headed up to do a lunch panel on the brain, and then in the afternoon I attended one of the plenary sessions in the main hall on the "digital lifestyle" -- a panel featuring the CEOs of Cisco , Google, Skype, and one ex-CEO by the name of Bill Gates. It was almost a letdown.

Brought to you by: Informal Learning Flow

Edge Perspectives with John Hagel: B2B - Back to Bangalore

Posted: 07 Jan 2006 05:40 AM PST


On the other side is the top executive of Cisco Systems in India, who returned here after decades in the Bay Area and New York. worry about the future of Silicon Valley as a spike aggregating talent on a global scale and creating an incredibly rich environment for innovation, learning and capability building. Dont Count On It.

Brought to you by: Informal Learning Flow

Top Five Network Security Concerns You Should Learn

Posted: 22 Jul 2010 07:36 PM PDT



Top Five Network Security Concerns You Should Learn

Getting into establishing a stable network is one concert. After the network already built is another one concern. The concern is about the Security. To keep network run stable and available, the network need to be secured.

Here's the Top 5 Network Security Concerns You Should Learn...

Visit here...

Bank Lost Your Account Data? Here's What to Do

Posted: 22 Jul 2010 09:00 AM PDT


Until early June, AT&T had an online tool that helped iPad 3G owners sign up for its mobile Wi-Fi service: Users typed in the 19-digit serial number for their iPad's micro-SIM card, also known as the ICC-ID (integrated circuit card identifier), and the site returned the e-mail address that the owner had used to verify registration. AT&T used that e-mail address to populate a log-in field on the Web registration form.

Security Claim: Most Home Routers Vulnerable to Hack

Posted: 22 Jul 2010 09:00 AM PDT


An engineer from security firm Seismic claims he will soon release instructions on how to hack millions of wireless routers commonly used in residential Internet connections. The how-to hack instructions are part of what has become an annual chest-beating by speakers at the Black Hat security conference that hype their keynotes with end-of-PC-security-as-we-know-it promises.

Apple in trouble over spam filtering

Posted: 22 Jul 2010 09:00 AM PDT


"More than 80 percent of email is spam, which is why companies use InNova's invention rather than forcing employees to wade through billions of useless emails," said patent-infringement attorney Christopher Banys in a press release.

Corporate ID theft hits Georgia businesses

Posted: 22 Jul 2010 09:00 AM PDT


Just days after Colorado officials warned businesses about scammers who are forging corporate identities to commit financial fraud, an official in Georgia said the same has been happening in that state as well.

Google calls, raises Mozilla's bug bounty for Chrome flaws

Posted: 22 Jul 2010 09:00 AM PDT


Google this week hiked bounty payments for Chrome bugs to a maximum of $3,133, up almost $2,000 from the previous top dollar payout of $1,337.

Fake <i>femme fatale</i> shows social network risks

Posted: 22 Jul 2010 09:00 AM PDT


Social networking pages featuring the profile of a fake Navy cyberthreat analyst attracted some 300 friends in the intelligence, military and security communities in an experiment conducted by a security researcher.

Defcon social engineering contest stirs concerns

Posted: 22 Jul 2010 09:00 AM PDT


A capture-the-flag-style competition slated to take place at Defcon later this month has raised eyebrows at a number of companies who are concerned they will be embarrassed or negatively impacted in some way. CSO first reported the CTF challenge earlier this month in Defcon contest to spotlight social engineering. The challenge asks contestants to collect information about a "target" company, which they are assigned to by contest coordinators at the web site social-engineer.org.

Remains of the Day: Down by law

Posted: 22 Jul 2010 09:00 AM PDT


Shakespeare had it right: first thing we do, let's kill all the lawyers. For one thing, it would stop frivolous patent lawsuits, but I can also think of one iPhone thief who might give that a thumbs up. In other news, Dell and Motorola are both swatting hardware bugs like there's no tomorrow. Uncover the secrets in the remainders for Wednesday, July 21, 2010.

Design that ensures security, also emphasizes style

Posted: 22 Jul 2010 09:00 AM PDT


Can security, often seen as obvious and ugly, actually be stylish and suitable for a building? Architect Rick Reeder gives us a tour of a property he designed with artful security as the goal

New 'Kraken' GSM-cracking software is released

Posted: 22 Jul 2010 09:00 AM PDT


The (Global System for Mobile Communications) technology used by the majority of the world's mobile phones will get some scrutiny at next week's Black Hat security conference, and what the security researchers there have to say isn't pretty.

Microsoft warns of Windows shortcut drive-by attacks

Posted: 21 Jul 2010 09:00 AM PDT


Hackers could exploit the unpatched Windows shortcut vulnerability using drive-by download attacks that trigger an infection when people simply surf to a malicious Web site, Microsoft said.

State AGs question Google about Street View Wi-Fi snooping

Posted: 21 Jul 2010 09:00 AM PDT


Law enforcement officials from 38 states have sent a letter to Google, asking the company whether it tested its Street View mapping software before discovering it was snooping on Wi-Fi networks as the Street View cars drove through neighborhoods.

0 comments:

Post a Comment