More on replacing business travel from Jessica Lipnack | Full Circle Associates |
- More on replacing business travel from Jessica Lipnack | Full Circle Associates
- Web 2.0 and Personal Learning Environments (PLEs) " Learning Matters!
- e-Clippings (Learning As Art): Where Do You Begin (Part II)
- stevenberlinjohnson.com: Who Needs Oprah When You Have BillG?
- Edge Perspectives with John Hagel: B2B - Back to Bangalore
- Top Five Network Security Concerns You Should Learn
- Bank Lost Your Account Data? Here's What to Do
- Security Claim: Most Home Routers Vulnerable to Hack
- Apple in trouble over spam filtering
- Corporate ID theft hits Georgia businesses
- Google calls, raises Mozilla's bug bounty for Chrome flaws
- Fake <i>femme fatale</i> shows social network risks
- Defcon social engineering contest stirs concerns
- Remains of the Day: Down by law
- Design that ensures security, also emphasizes style
- New 'Kraken' GSM-cracking software is released
- Microsoft warns of Windows shortcut drive-by attacks
- State AGs question Google about Street View Wi-Fi snooping
More on replacing business travel from Jessica Lipnack | Full Circle Associates Posted: 27 Jul 2008 07:51 PM PDT Then I saw this post on Facebook by NetTeams wizardess, Jessica Lipnack. Her emphasis on the social processes resonates. Twenty percent? Me thinks a lot higher. But, numbers aside, where Lohr's article is like all the rest – and where it misses the point – is in this: Technology alone does not solve the problem. Relief! Brought to you by: Informal Learning Flow |
Web 2.0 and Personal Learning Environments (PLEs) " Learning Matters! Posted: 27 Jun 2008 09:16 AM PDT Learning Matters! and Personal Learning Environments (PLEs). Filed under: Annual Gathering , Jay Cross , PLE , Steven Downes , e- Learning Guild — wadatripp @ 10:09 pm. and a bit of 3D) meets Corporate Learning — or if that is not what it was he wanted us to talk about it is certainly where it went. TED Blog. Brought to you by: Informal Learning Flow |
e-Clippings (Learning As Art): Where Do You Begin (Part II) Posted: 26 Mar 2007 06:25 AM PDT e-Clippings ( Learning As Art) Home Archives Subscribe About My Social Networks « Where do you begin when you havent posted in like 2 weeks? Adkins (from Learning Circuits): excerpt " Accordingto recent Ambient Insight market research, the 2006 U.S. Who Comments on Blogs , and Why? Main |.but percent." Comments? Brought to you by: Informal Learning Flow |
stevenberlinjohnson.com: Who Needs Oprah When You Have BillG? Posted: 27 Jan 2006 02:26 PM PST spent the morning writing in my hotel room, but in the afternoon I headed up to do a lunch panel on the brain, and then in the afternoon I attended one of the plenary sessions in the main hall on the "digital lifestyle" -- a panel featuring the CEOs of Cisco , Google, Skype, and one ex-CEO by the name of Bill Gates. It was almost a letdown. Brought to you by: Informal Learning Flow |
Edge Perspectives with John Hagel: B2B - Back to Bangalore Posted: 07 Jan 2006 05:40 AM PST On the other side is the top executive of Cisco Systems in India, who returned here after decades in the Bay Area and New York. worry about the future of Silicon Valley as a spike aggregating talent on a global scale and creating an incredibly rich environment for innovation, learning and capability building. Dont Count On It. Brought to you by: Informal Learning Flow |
Top Five Network Security Concerns You Should Learn Posted: 22 Jul 2010 07:36 PM PDT ![]() Top Five Network Security Concerns You Should Learn Getting into establishing a stable network is one concert. After the network already built is another one concern. The concern is about the Security. To keep network run stable and available, the network need to be secured. Here's the Top 5 Network Security Concerns You Should Learn... Visit here... |
Bank Lost Your Account Data? Here's What to Do Posted: 22 Jul 2010 09:00 AM PDT Until early June, AT&T had an online tool that helped iPad 3G owners sign up for its mobile Wi-Fi service: Users typed in the 19-digit serial number for their iPad's micro-SIM card, also known as the ICC-ID (integrated circuit card identifier), and the site returned the e-mail address that the owner had used to verify registration. AT&T used that e-mail address to populate a log-in field on the Web registration form. |
Security Claim: Most Home Routers Vulnerable to Hack Posted: 22 Jul 2010 09:00 AM PDT An engineer from security firm Seismic claims he will soon release instructions on how to hack millions of wireless routers commonly used in residential Internet connections. The how-to hack instructions are part of what has become an annual chest-beating by speakers at the Black Hat security conference that hype their keynotes with end-of-PC-security-as-we-know-it promises. |
Apple in trouble over spam filtering Posted: 22 Jul 2010 09:00 AM PDT |
Corporate ID theft hits Georgia businesses Posted: 22 Jul 2010 09:00 AM PDT |
Google calls, raises Mozilla's bug bounty for Chrome flaws Posted: 22 Jul 2010 09:00 AM PDT |
Fake <i>femme fatale</i> shows social network risks Posted: 22 Jul 2010 09:00 AM PDT |
Defcon social engineering contest stirs concerns Posted: 22 Jul 2010 09:00 AM PDT A capture-the-flag-style competition slated to take place at Defcon later this month has raised eyebrows at a number of companies who are concerned they will be embarrassed or negatively impacted in some way. CSO first reported the CTF challenge earlier this month in Defcon contest to spotlight social engineering. The challenge asks contestants to collect information about a "target" company, which they are assigned to by contest coordinators at the web site social-engineer.org. |
Remains of the Day: Down by law Posted: 22 Jul 2010 09:00 AM PDT Shakespeare had it right: first thing we do, let's kill all the lawyers. For one thing, it would stop frivolous patent lawsuits, but I can also think of one iPhone thief who might give that a thumbs up. In other news, Dell and Motorola are both swatting hardware bugs like there's no tomorrow. Uncover the secrets in the remainders for Wednesday, July 21, 2010. |
Design that ensures security, also emphasizes style Posted: 22 Jul 2010 09:00 AM PDT |
New 'Kraken' GSM-cracking software is released Posted: 22 Jul 2010 09:00 AM PDT |
Microsoft warns of Windows shortcut drive-by attacks Posted: 21 Jul 2010 09:00 AM PDT |
State AGs question Google about Street View Wi-Fi snooping Posted: 21 Jul 2010 09:00 AM PDT |
You are subscribed to email updates from "Cisco" via ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment