Thứ Tư, 28 tháng 3, 2018

Auto news on Youtube Mar 28 2018

Hello friends, you are watching Drama today. Please subscribe us and don't forget to turn on the notification bell.

In this drama, Zahid Alla Uddin's emotional blackmailing has changed the decision of Zahid.

He flatters him that's why Zahid takes his words back.

Robina convinces him that it is not right.

You should not refuse your words. but he does not pay heed to her.

Next day, Robina is taken to hospital because of her critical condition.

She gives birth to a beautiful baby boy

Will Zahid sustain his stubbornness?

To know this keep watching drama today and please subscribe us.

For more updates. Subscribe to our Drama today.

For more infomation >> Aangan Drama Episode 22 Promo| ARY Digital Drama | - Duration: 1:53.

-------------------------------------------

Edición Digital Houston - Duration: 34:14.

For more infomation >> Edición Digital Houston - Duration: 34:14.

-------------------------------------------

Small Business Digital 101 seminar: Learn to grow your audience using Google - Duration: 2:04:11.

For more infomation >> Small Business Digital 101 seminar: Learn to grow your audience using Google - Duration: 2:04:11.

-------------------------------------------

#Dhoni | Digital Painting Effect In Photoshop cc Tutorials | IPL SERIES | - Duration: 57:41.

"Stock Download Link In Description "

"Stock Download Link In Description "

"Stock Download Link In Description "

For more infomation >> #Dhoni | Digital Painting Effect In Photoshop cc Tutorials | IPL SERIES | - Duration: 57:41.

-------------------------------------------

The Drive Toward A Digital India | The Big Story | Real Vision Television - Duration: 3:15.

For more infomation >> The Drive Toward A Digital India | The Big Story | Real Vision Television - Duration: 3:15.

-------------------------------------------

WOW! Discrimination Scandal Exposes Weird Double Standard, Digital Crushing TV, Russia Fires, & More - Duration: 15:00.

'sup you beautiful bastards

I hope you're having a

fantastic Tuesday welcome back to the Philip DeFranco show and let's just jump into it. And the first thing we're gonna talk about today is the

Story, and controversy around Bailey Davis, a now former New Orleans Saints cheerleader

And she's in the news because she filed a complaint with the Equal Employment Opportunity Commission

Against the Saints. This for alleged gender discrimination her complaint claiming that female cheerleaders are held to a very different and higher personal conduct

standard than male players. And this complaint is coming after Davis was fired for breaking a team rule that only applied to female

cheerleaders. And according to Davis's complaint,

here's why she said she was fired. In January, she posted a photo of herself in a one-piece

Outfit on her private Instagram although right now

It's not clear which specific picture the Saints were upset about and the Saints claim that she broke a rule because the team prohibits cheerleaders

From appearing nude semi nude or in lingerie. And at the time she posted this photo the team was already looking into other

Incidents involving her.

Davis claiming the team had been

Investigating whether or not she had attended a party with Saints players- a claim that she denies. According to Davis's complaint the Saints also accused

Her of receiving messages from players on Instagram today

She admits to receiving messages from players, but has also said that she never responded to those messages

And she also claims that after posting the photo Ashlee Deaton the director of the team's cheerleading squad sent her a text saying very poor

Judgment to post a picture like that especially considering our recent

Conversations about the rumors going around about you, and then four days later Davis was fired

and so that's why Davis is now claiming the rules that got her fired or discriminatory because mail players are not subjected to the

Same conduct rules. According to Davis's complaint Saints cheerleaders are barred from following any players or coaches on social media must block any Saints player

Who follows them on social media, can't contact players respond to messages from them or like any of their social media photos,

Photos can't post any images of themselves in Saints gear can't post any images of themselves that are considered semi nude or that show them

In lingerie must avoid making eye contact

and move to the side if they encounter a player in the tunnel that leads into the stadium and must leave a

restaurant bar or party if an NFL player is already there or

Arrives after them and according to the complaint players are not held to these standards

And they are also reportedly not penalized for pursuing the cheerleaders

And I will say if this is 100% accurate that the cheerleaders are held to this policy

But the players aren't that is extremely odd

That would be the organization

Regulating and penalizing the target rather than the potential weapons. The cheerleaders have to double check who's following them on social media

Just in case someone from the team at the cheering for is following them

And then they have to block them when it seems like you could have a policy like hey players

Stop trying to fuck our cheerleaders

But that's that I'm trying to reserve full judgement for now because the Saints haven't really fully respond

But we have gone from them

Though is a lawyer representing the organization told the New York Times the Saints organization

strives to treat all employees fairly including miss Davis at the appropriate time and in the appropriate forum the Saints will defend the

Organization's policies and workplace rules for now it's sufficient to say that miss Davis was not subjected to discrimination

Because of her gender with that said you have the story you also have my opinion and now I'd love to pass the question off

To you what are your thoughts around this is this discrimination?

Is this unfair or no I'd love to know your thoughts and why then in streaming news youtube news

I forgot to mention this yesterday. I want to congratulate you to Borel Rubeus

He's a massive Spanish gamer with over 28 million subscribers on YouTube. We're talking about him because he set up this massive

livestream event of youtubers playing for tonight it was he and 99 others and just a few hours they drew more than

1.1 million concurrence, I mean these numbers are amazing and crazy last time we talked about a streaming record regarding fortnight

We were talking about twitch and specifically ninja and Drake they at the time had completely destroyed the single player

Livestream record on Twitch there's been like two seconds. We're already talking about someone beating that number by over five hundred thousand

This is great for everyone. It's good for the platforms. It's good for the game

It's good for the the player is actually playing it's great for the internet and streaming in general because it's just pure

numbers every day we see these new numbers the

Audience's grow it becomes less of a this is the future and more of a this is the now that's one of the reasons why?

As of last year reportedly digital advertising spending is now surpassing that of television

I'm very excited to see what happens next I do want to end this on two notes one keep it up and two

minecraft youtubers who stopped actually enjoying Minecraft years and years ago

But then really still liked the money the numbers are saying you should feel free to now enjoy a new game

But from that I want to share some stuff

I love today and today an awesome brought to you by Cee Cee geek of course fantastic take it out that takes

Confusion out of buying tickets for all kinds of live events concerts comedy shows whatever, but all the tickets in one place

They give them 0 to 100 scores. You know if you're getting a good deal or not

I've got the app on my phone

and it is by far the easiest way to buy tickets whether it be something last-minute or something down the

Are you looking forward to like maybe you want some childish gambino?

Kendrick Lamar in your future so if you want to check it out like many from the nation already have go to see geek fill

Com download the app and be sure you enter an offer code filled is when you do that. See key

Will give you $20 off your first ticket purchase the first bit of Awesome is actually self promo after massive demand

Stemming from when I said it we are now officially launching the I'm gonna boycott your boycott of their boycott with my own

Boycott and I'm going to preemptively announce

I'm boycotting anyone who boycotts my boycott boycott

Everyone shirt and/or hoodie the perfect shirt for 2018 which so far seems to be the year of the boycott

Also, if you find this shirt to be offensive please boycott it because I would love the free promo yeah

If you want to snag one well you can link down below

Then we got a trailer for the house with a clock in its wall starring Jack Black and Kate

Blanchette got the honest trailer for Star Wars the last Jedi that Umbro us and we had dude perfect doing boomerang trick shots

And if you want to see the full versions everything I just share the secret link of the day anything at all

Links is always on the description down below and we a quick update around the self-driving goober death out of Arizona, Arizona

Governor Doug Ducey has now suspended

over from testing self-driving vehicles on public roads saying I found the video to be disturbing and alarming and it raises many questions about the

Ability of uber to continue its testing in Arizona and following this uber responded be proactively suspended self-driving

operations in all cities immediately following the tragic incident last week we continue to help investigators in any way we can and we'll keep a

Dialogue open with the governor's office going forward also around this story. We have a new accusation

That's come out from active PLC or the company that makes the collision avoidance

Technology a spokesman for the company telling Bloomberg we don't want people to be confused or think it was a failure of the technology that

We supply for Volvo because that's not the case and then reportedly alleging that uber

Disabled the standard collision avoidance technology in the Volvo SUV that struck and killed that woman

Uber was instead using its own

self-driving sister and in a response to this uber declined to comment and Volvo said that they are waiting for the results of an investigation

That's where we are as of right now, and we'll see if new information comes out soon

And then let's talk about Facebook because a lot has happened since we last talked about them in their Cambridge

Analytical scandal their stock plummeted even more we saw headlines saying that they lost over 100 billion dollars in value

That's also meaning that Zuckerberg net worth went down billions and Zuckerberg has been in damage control mode saying

I'm really sorry Leigh's book also bought and released full-page

in US and UK newspapers including the New York Times The Washington Post Wall Street

Journal The Sunday Telegraph in The Sunday Times the ads saying we have a

Responsibility to protect your information if we can so we don't deserve it also calling the Cambridge analytical situation a breach of trust adding

I'm sorry. We didn't do more at the time. We're now taking steps to make sure this doesn't happen again

I will say personally from my standpoint. I think it makes sense that they're trying to own this you know it's it's smart PR

I'm also confused like many others were why they would choose to buy a

Giant ad in newspapers rather than releasing it digitally your Facebook. Why not release it on Facebook also

I don't think a full-page apology is really gonna do the trick because

Everyday we're now seeing a new Facebook store in this same news cycle

We're seeing headlines like Facebook scraped call text message data for years from Android phones this popped up because people have been

Downloading their data from Facebook this week. I'll link down below the instructions for how you do this

It's actually really simple and the information they have on you is really interesting as far as the collection of call data

SMS data Facebook has now responded saying this feature is opt-in adding

We never sell this data, and this feature does not collect the content of your text messages

Or calls also saying you can opt out in settings and once you do so all that data will be deleted

we all saw Elon Musk deleting Tesla's and

SpaceX's Facebook accounts support early Facebook's also on the cusp of their very own ad pocalypse

Several companies have decided to suspend their ad campaign among them you have Mozilla Pep Boys

Commerzbank Sonos and actually on the note of Mozilla. They have released a Facebook centric extension

They've now announced and released the Facebook container extension saying this extension helps you control more of your web activity from Facebook by

isolating your identity into a separate container this makes it harder for Facebook to track your activity on other websites via third-party cookies and they

Go on to explain it the mindset behind

This is rather than stop using a service you find valuable and miss out on those adorable photos of your nephew

We think you should have the tools to limit

What data others can collect about you that includes us Mozilla does not collect data from your use of the Facebook container?

Extension we only know the number of times the extension is installed or removed

We've also seen the Federal Trade Commission the FTC announcing that they are now investigating Facebook

We also have Congress and Parliament updates in the States Congress said they wanted to hear from

Zuckerberg whether Zuckerberg was gonna do it or not that not been officially confirmed

But today we did get a report from CNN's Dylan Byers who said Facebook sources

Tell me the 33 year old CEO has come to terms with the fact that he will have to testify before

Congress within a matter of weeks and Facebook is currently planning the strategy for his testimony

We also had Bloomberg saying on April 12 Zuckerberg would be appearing before a House panel

As I'm recording this video the committee says that nothing is confirmed yes

That's still a little bit up in the air as far as Parliament in the UK it appears that as of right now

Zuckerberg has no plans to go himself MP

Damien Collins had written a letter to Facebook saying it's now time that I hear from a senior Facebook executive with the sufficient authority to

Give an accurate account of this catastrophic failure of process

There's a strong public interest test regarding user protection and Facebook responded yesterday with we have responded to mr.

Collins in the DCMS and offered for two senior company

Representatives from our management team to meet with the committee depending on timings most convenient for them adding both Chris Cox and Mike Schroepfer report

Directly to Mark Zuckerberg and are among the longest-serving senior

representatives in Facebook's 15-year history and to this Collins responded we will seek to clarify with Facebook whether he is available to give evidence or

Not because that wasn't clear from our correspondents if he is able to give evidence

And we will be happy to do that either in person or by video link if that will be more convenient for him and all

Of this is happening well as I'm recording the stock is down another 4% today with that said a question

I'll pass off to you regarding Facebook how much do you actually trust are you aware of what you are with them?

What do you care about the privacy? How do you feel about the privacy? Also did you or anyone?

You know actually shut down your Facebook accounts any and all things I'd love to know in those comments down below

And then let's talk about this horrible story coming out of Russia around 4:00 p.m.

on Sunday a massive fire broke out at the winter cherry mall in the city of

Kemerovo Russia and according to Russia's Investigative Committee at least 64 people died in the fire with 41 of them being children and the reason

the number of children is so high as the fire is thought to have broken out on the fourth floor of the mall in the

Children's play area next to the cinema then spreading to the third floor after the fourth floor partially collapsed notice

What is captured by the CCTV cameras and it is?

Horrifying the fire and the smoke it spreads so fast it some of the worst footage

I'm not gonna show in this video involve people jumping from the fourth floor because they were unable to get out any other way

So I'm even hitting things on the way down reportedly 288 firefighters arrived at the mall it took 19 hours to put the fire out

According to the head of the city's fire department the blaze spread via

Flammable 3rd insulation making it especially difficult to extinguish under the question of what caused this fire

There are two competing reports one according to cameras vice-governor this started in the play area and quote the preliminary suspicion

Is that a child had a cigarette lighter which ignited foam rubber in this trampoline room, and it erupted like gunpowder

but other Russian media sources such as state-run Interfax and reported that there are possible violations and the

installation and maintenance of the malls

Electrical greasing the grade cannot withstand an increase load that day and did not have protection against different voltages

Which caused the fire and as far as why the official death toll is high and in fact may be higher because there are missing

People the mall was really busy as sunday was the first day of a week-long school holiday in Russia

Investigators are also saying that there were serious building violations at the mall this including blocked fire exits videos including this one popped up online

Seeming to show people unable to escape through locked fire exits

There are also reports on a security officer turned off the PA system when informed about the blaze in a Facebook post an tango Relkin

a member of parliament for Kemerovo wrote children died next to fire exits

They knew where to run they were going in the right direction

But doors were locked also saying that a fire extinguisher that could put out the flames did not work and also single

I know the owners and developers

Of the mall for taking shortcuts with its construction writing people whose pockets were filling with millions from this shopping

Mall knew that one day this money will smell of blood or okay?

And also adding the building's

Acceptance certificate was signed by the Commission main signature was signed by the deputy mayor he is also the head of the city

Improvement department he could close his eyes to obvious security problems only in one case. I think if his eyes were closed with money

They've also been reports from eyewitnesses saying the building's fire alarms

Never sounded leaving many including those in a movie theater unaware that there was even an emergency

Investigators have detained five people thus far in connection with this fight this including the technical director of the mall the tenant of the area

From where the fire is thought to have begun the head of the company servicing fire alarm system

And the security guard who allegedly failed to raise alarm when the fire broke out

We also saw a Russian President Vladimir Putin flying to Kemerovo both offering condolences to the families as well as blaming criminal negligence

Hooten also saying 100 investigators were on the scene trying to determine the exact cause of the fire

Around the same time of Putin's visit there was an angry crowd that formed in front of the city's main municipal building portably starting with

Just a few dozen people then growing to around

4,000 reported and many of the demonstrators

Believing that the death count is actually much higher great Interfax relatives have reported that 85 people are still missing and most of them are

children on the note of criminal negligence

Let's talk about the alleged owner of the mall some Russian media sources have reported that the owner of the mall is Denis Stengel oh

and shingle of is a Russian snack and candy tycoon who was involved in many ventures in the country and at the time of the

Fire he actually wasn't in the country was in Australia where he lives part time and when reached by Russian journalist after the fire reportedly

Refused to answer whether he owned the mall or not, which hey, I was gonna insert my opinion

Here is a weird fucking response to a pretty basic question

But he did admit that his company helped fund its construction single of then went on to say something that I found weird for someone

That seemed to not be sure if he actually owned this thing or not

Saying his company would pay the equivalent of fifty two thousand dollars to the families of each person killed in the fire also when asked

If he would be returning to Russia

He reportedly said to come just to go to jail so there was that

And on top of that there also seemed to be another failure

2016 the chief fire inspector for the Ministry of Emergency Situations told state news agency Tass that a scheduled inspection in 2016 never took place

because of quote

supervisory holidays this failure after failure after failure

And now you have all of these people dead all of these children dead and as of right now

That's where we are hopefully we get more information from these investigators, but also at the same time

I have limited faith in the information that we're going to get because what we're talking about is systemic corruption

And it just makes me wonder are they actually going to find the people that are responsible for this and I mean

Top down or are you just gonna see a fall guy or two and not the?

prosecution of the people that set up the dominoes in the first place and that's where I'm going to ends at Asia and remember if

You like this video you like what I'm trying to do on this channel

That like button if you're new here hit that subscribe button ring that Bell. Also if you missed yesterday's Philip DeFranco

Show you want to catch up click or tap right there to watch that or maybe you want something lighter

You can watch the news behind-the-scenes vlog click a tap right there box. That said of course as always my name is philip defranco

You've just been phill'd in a la vo faces, and i'll see you tomorrow

For more infomation >> WOW! Discrimination Scandal Exposes Weird Double Standard, Digital Crushing TV, Russia Fires, & More - Duration: 15:00.

-------------------------------------------

Digital Super Models and Digital Cows | Picked News #Stolk - Duration: 4:43.

For more infomation >> Digital Super Models and Digital Cows | Picked News #Stolk - Duration: 4:43.

-------------------------------------------

Digital Transformation: The opportunity and getting it right (Highlights) - Duration: 3:41.

Digital transformation is the big challenge facing Europe's economy.

How do Europe's citizens and heavy industries prepare for data flows and workflows in a

changing environment.

Is the regulatory approach balanced?

Is it fair for the future, for the road ahead?

Is Europe's business about to grow or about to slow?

We're joined by the Bulgarian presidency and Microsoft to discuss these challenges and

the road map for Europe's future digital economy.

It's my pleasure to welcome you to the Microsoft Center for this evening's event.

The opportunities of digital transformation are tremendous, and yet in a time of so much

change, it is important to reflect on how to do it well and how to ensure that we can

bring about the change while preserving our values and our social benefits.

I'm working in the digital field for over 15 years now, and back then, it was exotic.

Now it's everyday life, and I'm fully convinced that this is the future, that's the innovation

that's coming our way.

We have announced that we are here for growth and jobs.

Of course, that's one of the ways to see that, I think, how we can really benefit from digital

transformation in terms of our economic growth, competitiveness of European industries, and

I think there are future opportunities for our people in very broad terms, and I think

that we are modernising our societies and economy.

The digital single market principle has put things in the right framework, but, I mean,

we should do more.

There are some issues, like on the manufacturing industry, the Industry 4.0 where Europe could

do more, and I think it should also be more reflective of value.

I think more could be done to green the digital industry and the overall industry.

So right direction, but more integration and a more value-based approach will be needed.

We are having assets in traditional industries which are not necessarily digital, but of

course I think that to combine these traditional industrial assets together with digital ones,

I guess that that would be kind of the challenge, and I would say that I think it's an opportunity

that Europe can really survive and flourish.

We have a number of great achievements in terms of building user confidence and being

more inclusive in our policies and level the playing field for the small and medium-sized

economies, and the industry has been sort of lagging behind digitalisation.

The future challenge now is going to be to increase the technological absorption, make

sure that we create and become more innovative as an economy, and that's going to be more

difficult than quite a, just a few regulations that we need to reenact.

We need to do the necessary.

That's the most important part.

Necessary for our citizens, for our businesses, and we have to be able to move forward, to

expand our horizons and to be ready for what's in front of us.

For more infomation >> Digital Transformation: The opportunity and getting it right (Highlights) - Duration: 3:41.

-------------------------------------------

Accelerating Digital Showreel 2018 - Duration: 18:32.

This is our digital strategy over the next few minutes we will set out what we

mean by digital and why it is important our journey so far, our vision and

strategy the delivery principles we will follow and how we intend to keep it live.

The NIHR improves the health and wealth of the nation through research

with stakeholders from industry, charities and patients and the public we

fund high quality research to improve health, train and support health

researches and provide world-class research facilities. Digital enables this

work increasing value for our stakeholders and enhancing their

experience of research. Digital includes smart phones, social media, cloud

computing, data analytics and a range of emerging technologies. We use digital in

our daily lives and in health and care. Digital is having a growing impact in

providing personalized care we are already funding research to understand

the ways digital will improve research approaches. Stakeholders expect high

quality services that work well for everyone.

Digital will also enable us to respond rapidly to the changing needs in health

and care. Work to date is the basis for

collaboration, shared systems and data standards across the NIHR. Now we want

to be more ambitious focusing on the needs of the wider research community.

Digital will mean that we can be more and more patient centered, do research

better by making it easier to be involved, make a clearer offer to the

life sciences industry, develop future clinical researchers, do our business

more efficiently as one single system. The strategy will deliver five new

digital services.

1. A platform to debate and shape research including new ways

for patients to influence the research pathway.

2. A digital experience for

patients in the public, which makes it easier to be involved.

3.An end to end digital service to streamline processes for researchers and life sciences.

4. A platform to attract and develop research professionals.

5. Data donor services so that participants consent and control the use of their data.

our approach puts patients at the center, ensures real collaboration and builds on

tech that is already available. Learning from others to apply we will review the

strategy regularly to ensure we are performing, are ambitious and responding

to changes in health and care we will challenge our assumptions and look for

lessons from others. Initially we will use a small number of projects to prove

concepts, demonstrate capability and plan a full program from April 2018. We will

look for clear benefits and key performance indicators will be

identified monitored and realized.

Hi I'm Will Crocombe I was information systems leader at a large clinical trials

unit in the UK for many years and I'm helping the NIHR with their springboard and

electronic data capture. Electronic data capture is how we get data basically

out of clinical settings and to the researchers that need it to do the

analysis of the research. So currently the problem with Electronic data capture is

that there is something like 50 clinical trials units each with individual

systems, which is obviously not efficient in terms of resource. It's not efficient

either in terms of those people are using those multiple systems and having

to log into them at the research site and that also has a major impact on what

the NIHR do. So I'm Jonathan Sheffield and I'm the Chief Executive and I'm

particularly passionate about this project because what we see when we

look out there in the Clinical Research Network are Clinical Research Nurses and

Data Managers who struggle from system to system and don't have a consistent

approach the way that they collect data. I see this as a way forward for us to

take research and the data capture involved in research into the 21st

century using modern digital platforms. So you might imagine if there was a

single platform organized by the NIHR this would reduce the burden on the clinical

trial units in terms of provisioning and maintaining these systems but also

significantly reduce the burden on the research staff at sites again having

that single logging and familiarity in the particular system. Once the digital

platform is in place we'll be able to introduce data standards of common data

tools which is also further enhanced ability to do research and reduce a

resource impact. The impact for me on this will also take forward how we

interact with the MHRA and other regulatory bodies they'd see that we

have standard procedures, standard operating procedures and hopefully that

would reduce the regulatory burden that we have to deal with in a day to day

basis in the involvement of clinical trials and if we actually

achieve that we'd start to see that we have a platform that would make the UK

the place to go to to conduct life sciences research. I think that's

absolutely the case certainly clinical trials units have a large burden in

terms of the regulatory aspects of clinical trials and you have to ask the

question is whether a clinical trials unit is an organization that should be

building infrastructure research or doing the research itself

and I think the latter is the case. So hopefully this project will deliver

over the next three months, we'll be out there talking to clinical

trials units directors and their staff about what they see the advantage and

disadvantages of this step forward and we'll also be talking out there to

people out in the field who do the day-to-day data collection, but the whole

purpose of this whole program is to try to make research in the national health

and social care environments easier, safer, quicker and more efficient to

deliver. I quite agree and I think it's entirely possible I'm very much looking

forward to talking to members of the research community of all sorts about

how we can put this together. So thank you very much your time we look forward

to meeting you and discussing this interesting project in the future.

Thank you.

It's our belief that the app is going to fundamentally change the way we work

with patients and the way we can communicate with patients and we think

it's really a 21st century approach to improving research, as you'll remember

this really came about because the NIHR does not have a way of saying

thank you to patients on a national and systematic basis. Yeah and I think we

underestimate the power of the same thank you

it research these days we still don't have researchers thanking patients and the

families for taking part in research and it's just a really small gesture but

can really make a huge difference to the way that people perceive the research

and also how they participate in research in the future as well as

getting involved in shaping research for the future as well. That's really

helpful and I think your involvement in patient involvement has really changed

the way we've done this particular project and for me is fundamental too

it. It would be so difficult to have this level of patient involvement with our

traditional approach if we wanted to say thank you we'd have to you know design a

database we'd have to manage it we'd have to

update it and then we'd have to mailshot using that. It would be very expensive it

would be very slow, probably always be out of date and big information

governance issues and frankly I guess the return from that would be pretty

poor. So at the end of the day for me at best that's 20th century with the app

we've got a 21st century approach which would really reach across the whole

country and bring us much more diversity do it in real time and through its

ongoing connection and consent processing we can have in it we would be

able to manage all the information governance and the necessary content

management system. So it really for me is the necessary step forward. I couldn't

agree more William I think we know we're missing out on so many opportunities

with regards to research for patients and

members of the public we're really not engaging properly with patients because

we need to make research truly accessible to everybody and I think

through an app which can be readily available wherever people are. I think

it will really make a significant difference to the way that we do

research, like you said really from prioritization of the research questions

and ideas through to planning research, finding where we can take part in

research and really get people excited by research. Because as a patient myself

I've witnessed first hand the power of research, not only just on my health but

my confidence and also on the skills and opportunities I've received. As you

know last week we agreed a preferred supplier Tiger spike they've got a great

team and a portfolio of products right across the world from Australia through

to healthcare and and various major corporations and they're very committed

to improving the way people work and play indeed through technology, so our

mission statements are pretty similar on this they're in development and we hope

that we will have user testing of the product in February and it will be

available for release on the App Store by the end of March. I think this is a

start of something quite unique and it may seem different, it may seem something

that we've not done before but I think we have to take that step here in the

70th year of the NHS to transform our healthcare system to one that really

meets the current needs of patients and families in the UK.

Hello my name's Mark Porcheret I'm the Clinical Lead for Primary Care in the West

Midlands and this little video is to introduce you to some work that we're

bringing to the showcase. Some work that's been done by the National primary

care specialty group and this is about how to better coordinate the use of I.T.

in general practice it's specifically about how to better use GP computer

systems such as Eavis vision system one to identify and recruit patients into

studies we can develop searches using the coded data in the databases and we

can develop little pop-ups and come back through the consultation alerting GP's

about a study and this work has been carried on over the years in a rather

piecemeal way with some networks doing a lot and some very very little and when

you have national studies it's important that we try to get this better

coordinated. So you don't have the searches being developed

perhaps in different ways across England. So the work of the national group is to

develop a system to coordinate this so that one LCRN leads on this with the

research team and develops quality assurances for research and then we have a

system to disseminate that search out to other LCRN's that that want to

want to deliver the study locally and then eventually down to practices this

is very much work in progress. We are developing a Google site to

coordinate this and we're having discussions with system providers such

as EMIS and System One as to how to use their systems to disseminate our

practices so please do come along and see us at our store.

Hi my name is David and I work with Kelly Hollier we are going to present the

Across system at the Leeds Accelerating Digital conference. Across is a one-stop shop for accessing

support from healthcare professionals such as Nurses and other Allied Healthcare professionals in the delivery of research research protocols.

It is a capacity management tool that enables us to predict how we are meeting our

targets and how we are supporting research over a six to twelve month cycle. It is a

tool that attempts to deliver equal opportunities of access to our partner

organizations and attempts to give a rapid response as to whether we can or we can't

offer support on that particular study. It enables us to use a transparent

access to service and to understand where we are and in some cases why we are

not able to support certain research projects. It also enables us to

record which research we support across a geographical area. That's us

come and see us if you have any more questions. We will be at the accelerated digital event in Leeds.

hello I'm Kaatje Lomme I'm the CRN Business Change Manager based at the

coordinating center offices in London. At the accelerating digital event I

will be representing the single research intelligence system so all the work that

relates to the CPMS / LPM integration and much more so if you would like to find out

come and have a chat with me and we can discuss everything about it.

Hello my name is Stephen Lock I'm head of business intelligence at the NIHR CRN

Coordinating Center and unfortunately I'm unable to come to the accelerating

digital showcase day this year. Which is a shame for me as last year's

event was amazing and I had the opportunity to present, but this year one

of my colleagues Rory McHugh whose Information Manager at

the coordinating center, got something really exciting to show

everybody and it's based on some work we've been developing over the last year

using a tool called geo analytics which enables us to report activity and

other things such as prevelance and incidence of disease using real

interactive maps so please you can zoom into a region where

you have an interest and see how much activity's been going on there or what

the prevalence or incidence of disease might be. We've got a real potential

for us to do some interesting stuff particularly around public health

research and so on. Rory'will show that to you all and and hopefully

gather lots of ideas from you too. So it's going to be exciting in there

hope you enjoy it

stroke Samba license to the recess ETA eight minute

let's review the image in this case we need to be as quick as possible.

I need to make a decision to thrombalise this patient or not, do you have the

criteria for whatever study you think the patient might be eligible for. Okay

so I'm thinking we should be looking at extending the

timeframe on the license. so let me just have a look here. Of all the studies that we have that's the

best one there's so many it's hard to keep track of them. Yes this is the best one.

Excellent, excellent.

So the criteria is that

we would need a PWI and DWI ratio of 1.2 or more. It's about 1.7 to me this

patient is eligible based on that. So in general we have quite a wide range of

studies that we run here and it means that we require quite extensive amount

of paperwork that will have to carry around with us when we have to refer to

informational inclusion into the trial so instead of carrying loads of

clipboards and big files it's better just to have everything on your mobile

phone and you can access it anywhere in the hospital

That is a score of 12 okay so we need a range between 4 and 26.

So it looks like you're having a stroke unfortunately, because of the time frame

that were looking at for Thrombolysis you've missed the four and a half hour mark for

Thrombolysis, but we have a study that we're running here that looks at the

thrombalysing people out of hours, is something you might be interested in.

Yes

For more infomation >> Accelerating Digital Showreel 2018 - Duration: 18:32.

-------------------------------------------

How railways change landscape (Britain's Digital Railways) - Duration: 3:42.

For more infomation >> How railways change landscape (Britain's Digital Railways) - Duration: 3:42.

-------------------------------------------

Morning Star - Extra Large - Infrared + Convection Countertop Digital Toaster Oven, Stainless Steel - Duration: 0:45.

Morning Star - Extra Large - Infrared (No Preheat Needed) + Convection Countertop Digital Toaster Oven, Stainless Steel, XL 21"x13"x13.5" exterior, 12-slice

Coverage for product breakdowns and malfunctions. Free shipping on all repairs with no deductibles or hidden fees. Fully transferable with gifts. Cancel anytime, full refund in the first 30 days.

If you purchase this service plan and eligible product for this service plan, you acknowledge that Amazon may send the service plan seller relevant product and price information for the purpose of administering the plan.

For more infomation >> Morning Star - Extra Large - Infrared + Convection Countertop Digital Toaster Oven, Stainless Steel - Duration: 0:45.

-------------------------------------------

Hampton City Schools - The Digital Bridge - March 27, 2018 - Duration: 3:31.

(upbeat techno music)

- Hello, and welcome to the Digital Bridge.

I'm Paul Lawrence, Director of Information Literacy

for Hampton City Schools.

This morning we're at Spratley Gifted Center

in their digital studio to visit with the production team

behind the Spratley Seahawk Morning Squawk.

- [Girl] The camera goes here.

- And the mic.

- And the charger goes here.

- All of our important dates and thought for the day,

and then there's our... - And our list of people.

- [Boy] Three, two, one.

- Good morning, and welcome to the Seahawk Morning Squawk.

This is Madison Nugen with Summer Neil.

- Many students will see the morning announcements

and ask if they can be a part of it.

They see us on their computer screen in the mornings

and I really think that they feel

we're representatives of the school.

- It's fun.

When I first started doing it in 6th grade,

it was kind of scary, 'cause I was scared to mess up,

but now if I mess up, I'm just like, it's okay.

No one will remember.

- One thing about the announcements is

it sets the tone for the day.

Part of our culture is to have quite a deal

of extracurricular activities,

and by having the announcements

and having our kids produce those,

the kids are the ones that do the work on the announcements

under the supervision of Mrs. Wilson,

it shows our students what we have to offer

outside of school and the ways that we can challenge them

beyond the classroom.

- Right now, I run down to the elementary classrooms

and get the thought for the day.

- We really focus on presenting and performing

in a technology format.

So we do podcasts, we do films, we storyboard,

we learn how to give proactive feedback and critique.

- I've learned kind of how more to work with people

and actually get along with them

even if I don't want to (laughs)

'cause I'm kind of bad at that.

So that's kind of helped me with groups.

- I love it. I've been doing it since 6th grade,

and I just enjoy it so much.

My favorite part about it is getting to hang out

with my friends in the morning

and you know, talking, joking around, you know.

Then I get to announce and it's really fun.

So one day I'll do computer

and the other day I'll announce

but usually everybody does everything on the announcements

so we all get to spread out

and have an equal chance to do everything.

- I like working with my peers,

and I think it's a good experience.

It's gotten me out of my bubble,

because last year I was really shy

and I used to do merits and I was really shy about that

so I gave that to one of my friends.

And this year I've really come out of my bubble

and that's been a huge accomplishment for me

and I've really appreciated that.

- Be definitely be serious and try to do your best always

and always encourage others to try their best

and not to just think they can't do it

just actually try and see.

- The students on this production team

learn about a lot of things here in the digital studio.

They learn about the technology that they need

to run the production.

They learn about working in front of

and behind the camera,

and they learn about teamwork.

Thank you for watching The Digital Bridge.

(upbeat techno music)

For more infomation >> Hampton City Schools - The Digital Bridge - March 27, 2018 - Duration: 3:31.

-------------------------------------------

Digital Marketing Workshop Highlights Areva Digital - Duration: 1:38.

For more infomation >> Digital Marketing Workshop Highlights Areva Digital - Duration: 1:38.

-------------------------------------------

MeRIT Webinar: Digital Self Defense - Tips, Tools, and Best Practices to Stay Safe Online - Duration: 53:03.

>> CINDY SOBIERAJ: Today's webinar is titled: Digital Self Defense: Tips, Tools, and Best

Practices to Stay Safe Online. Our presenter is Ben Woelk, president and manager of the

security management at RIT, where he developed a leading security awareness program.

Ben is a member and former co-chair of the EDUCAUSE security awareness and training working

group of the higher education information security council. He's also former director

and community affairs I'm sorry. Former director and community affairs committee chair for

the society for technical communication and a current scholarship committee chair.

Ben is a certified information systems security professional. A certified professional technical

communicator accredited trainer and an iTIL, Version 3 certified.

He holds degrees from the University of Florida, Trinity International University and the University

of Rochester and an enhanced certificate in technical information design from RIT.

Ben is also adjunct faculty at RIT, teaching classroom and online courses computing security

fundamentals and technical communication. Prior to joining RIT, Ben provided technical

communication and change management consulting to number of area Fortune 500 companies. His

current interests include working with other security awareness practitioners to develop

effective security awareness programs and providing mentoring and coaching to new and

aspiring introverted leaders and speaking of presenting workshops on introverted leadership

creating security awareness programs and technical communication.

Thank you for joining us today, Ben. This is your second time back with us, and we're

thrilled to have. Let's get going. >> BEN: Okay, thanks, Cindy, and thanks everybody

for joining us today. It's a rather daunting introduction but we'll move past that.

Today we're going to talk about digital self defense and digital self defense is what we

branded our security awareness program here at RIT, and this is a slight variation to

in person class we provide to staff five or 6 times a year. We'll save the questions at

this time end but we'll have a couple of times of interactivity through the presentation.

So we're going to start with a cartoon, I'll read it for you but it has data security as

the announcement of what the event is. And in this corner, we have firewalls encryption,

antivirus software, et cetera, and in the corner, we have Dave.

I apologize to the Daves that may be on the call.

In general, what this cartoon is telling us that it doesn't really seem to what technical

concerns we have in PlayStation or what we do to protect other people or even ourselves

'cause we always manage to make a mistake at some point or another, and we're also faced

typical human adversaries and they are very creative and they will find new ways to attack

us as well. So I'm going to postulate that you are all

are targets, every single one of us. When you take a minute to enter your ideas into

the chat about why you think you personally might be a target and we'll share some of

those ideas. >> BEN: So we're getting a good variety of

responses. A lot of it, honestly, just comes down to the fact that we're online and we're

vulnerable and that we do a lot of shopping and other types of things where we where it

may put our identity on the risk. This is a word cloud. It's not one I put together.

So when people ask me about specific things in there, like "bogies," I don't really

have what they meant by that but the idea here is to give you an idea of all the possibilities

why you might be attacked and why, again again, why you're a target again.

So basically it doesn't matter if you have a million dollars in your bank account it

doesn't if you have $1,000 or less in your bank account you're still going to be targeted

by online scams of some kind or other because they have good return on their investment.

So another thing to enter in the chat here this is prefacing a little bit of research

I'll have that going to share in one slide and it's not a bunch of research but Google

did some research a couple of years ago they published, I think, in the summer of 2015

they interviewed security experts who had ideas of what people should do to stay on

safe online, but they also interviewed normal people and for the we'll is normal and the

question I have for you all, what would you tell someone to do to Stay Safe Online? What

are the biggest things they need to do. And, again, you can enter your recommendations

into the chat on that as well. >> BEN: And there are really no wrong answers

with this but again I haven't seen what y'all have been putting in the chat yet.

>> BEN: So it looks like most of what we've got up here so far has to do with passwords

and what they call authentication. However, the lasting one keeping your operating system

and B I/OS up to date and this is the second time I've presented in the last 3 years since

that research essence come out where anybody has actually come up with that answer so congratulations

on that from the security expert's view that's the thing you need to do. To install your

software updates. My computer security says never give that

as one of the things you should Stay Safe Online so given the if you plan to be experts

on this and normal people don't normally answer this question this way tells us there's a

real gap in communicating what people really need to do to Stay Safe Online.

Now, the reason that it's so important to install software updates is because what will

typically happen is that someone will discover a vulnerability or a way to exploit or break

into a program I mean, they're all building millions of lines of code and all it takes

is a little error or something that when the excuse me, when the program was developed

wasn't a problem that could be now. So what happens with the software updates is the vendors,

whether it's Adobe or Microsoft or something else, they release these patches or software

updates and this addresses those holes or vulnerabilities or weaknesses, and they said

that's really the most important thing to do.

Now, looking at the rest of the list you can see on the nonexperts top online safety practices

which we're assuming here. You think intestine software virus is on the list and other things

primarily about a couple of them are about passwords. There's about one only visiting

websites they know that makes for a very small internet and maybe safe but I think it kind

of ruins the experience, and to not share personal information which makes perfect sense.

(Coughing.) >> BEN: On the right side, the security experts

top online security practices most of those are around passwords or around passwords of

some type and we'll talk about these things and the other is install software updates

but what's interesting is that the using antivirus software is not on that list of the top 5

things that the experts think you should do, and we still have a requirement for doing

that at RIT and you should still have it, but I think part of the issue here is that

people may assume that having antivirus software protects them completely, while on a typical

day it might recognize maybe 65% or 85% of the different threats out there so it doesn't

really provide the level of protection that we might expect.

There was a really interesting survey and the results came in kind of surprisingly.

So in terms of protecting your computer and information the links on this slide are are

two resources here at RIT and what the information security office has provided. And we're going

to cover a couple of these things during this presentation today but a good part we're not

going to do but this is more information about things that you need to think about. Policy

and standards are things that you will probably run into in your workplace where you have

requirements about what you need to do in terms of using whatever the computing structure

that you have there. I have another cartoon, and some of you have

probably seen this but we're going to take a minute on this one and give you all time

to read through it. It's pretty dense. I think you can probably read it unless you're viewing

off a mobile device. But let's take a minute and then we're going to talk about what this

cartoon means. >> BEN: Like I said, a very long cartoon.

It gets a little confusing because they talk of bits of entropy, and that gets into complexity

and I'll talk about that in a minute but it's not something that you really need to be aware

of that part of that. What they're showing it here is the way security

experts have told people they need to construct passwords in the last 15 or 20 years is wrong.

They told us they need to be very complex now, troubadour and 3 is not completely because

the idea is they made us put together passwords so they're hard for humans to remember. And

because of that, we end up using the same password over and over again and make a slight

variation maybe it would be Troub4dor & 3 & 4, and people will save it on their desktops

and an Excel file and what happens you got a very limited amount of the passwords our

using something to remember those passwords by which isn't secure.

What's interesting correct horse battery staple which are four common English words -- if

you make it together, it makes a really strong password. I wouldn't use correct horse battery

staple because it's been out for a while and I'll tell you why it's really good news that

this cartoon is talking about. There's a password staple but what this kind

of does kind of measure how strong is to break based on its complexity. Now, it's a little

confusing because you could put in the word password and it would say it would take how

many things to break it something very simple so it's really only looking at things in terms

of complex not use of common passwords so if you look at the screen you can see it's

got this brute force search space analysis and you'll see that change as we go through

the example, but down at the bottom you're going to see time required to exhaustively

search this password space and that means how long to break the password and they've

got a couple of scenarios whether it's one computer online attacking you or it's somebody

has actually gotten access to your computer directly and then they've got this massive

crack erase and massive computers and they have a botnet all trying to break that password.

So let's see this haSAK.com shows us here. So 6 letter passwords, very basic password.

It's all lower case. Now, if you look at it, you'll see in that search space analysis it

says it has 6 characters and the search space is 26 because there's 26 different characters

in our alphabet. But the more important thing is when you go and look how long it takes

to break the thing if you look especially at the second tubing I think they're probably

more relevant your offline fast attacks scenario is.00321 seconds. So much faster than I was

even able to talk about it. So that's with 6 letters. So what we're going to do now we're

going to increase the complexity a little bit. And we're going to do that by adding

a number on substituting a number for the 0 because I want to keep it the same lengths

right now. So what you see the search space depth you've got 26 letters and 10 different

numerical characters to be removed and there's a lot of things for cracking tool to search

through and we've updated it to .0224 seconds so we're like 7 times more secure than we

were the first one but, obviously, not very helpful. At all. So what else could we do

to make this password stronger? You can see that we've got the lower case is checked,

the digit is checked and we'll add a symbol and make one of the letters upper case and

let's see what it does. Changing one letter to upper case all of a sudden, we're at .577

seconds. Still not good but much, much stronger than we were before. And if I make one of

these letters a symbol, all of a sudden, we're at 7.43 seconds. So it's far more far stronger

than the password was that we talked about initially. It's still not going to do it.

Obviously, you know, a 6 character password if they've got access to your computer it's

going to take 7 seconds, roughly, to break it. And hardly any time at all they've got

multiple computers that are trying to break into it.

So we're going to talk about what we can do to make it stronger. I've done all the complexity

things. We've got the upper case and the lower case and the digits and the symbols but what

I want to start doing now I want to make it a little bit longer. So right now it's at

6 so we're going to go to 8. And let's move that to 18.62 hours for the offline fast attack

or 1 minute with a massive cracking erase scenario which sounds really exciting in theory.

We're going to go to 10 characters. Now, it's gone to 19.24 years for the offline fast attack

and a week on the massive crack erase scenario. Let's go to 12 characters and see what has?

So by the time you get to 12 characters even in this massive cracking erase scenario they're

at 1.74 centuries to break that password so not something we have to worry about and 1.74,000

centuries in terms of the offline fast attack scenario where somebody has got access to

your computer. So what this really tells us in I'll talk about it in a little bit more

is that complexity was really important but where we saw the biggest games and a strong

password was by making it longer. Now, if I tell people oh, you're going to be perfectly

safe which I'll never say but if you'll be safer using a 201character password you got

to be out of your mind I'm not doing every 20 character password I know I'm supposed

to have a different one for each one but that's just way too much trouble so let's talk about

some of the options here. Let's talk about something called a pass phrase. Now, the text

I have it was a dark and stormy night which should be familiar to many of. That comes

from a couple of places. One if you're a peanuts fan there's a cartoon Snoopy's on top of the

dog house, typing out: It was a dark and stormy night. It's actually Bluwer Lytton fiction.

It's by a late Eighteenth Century Englishman named Bluwer Lytton, and he put together a

one sentence introduction to a novel, which I'm not reproducing here but it went on and

on and on, and it's really regarded as the worse introduction to a novel in British history.

So, of course, what they did they made a contest and every year they have a contest where someone

submits the worse possible opening to a novel and they kind of rate it and score it and

whoever wins the trophy has got the worse introduction fun fact but, obviously, not

critical to what we're doing. So I'm going to use it with a dark and stormy

night for my pass phrase and I'm going to turn it into something that's actually useable

and would work for us in the computer age here. I need to increase the complexity. We've

got one upper case and all lower case letters so I'm going to change it to it was a dark215&StormyNight

and it gives us special characters and it gives us all of those different elements that

we need. Now, what's interesting is that as you've

seen looking at the previous example with the haystack thing that length is really far

more important than complexity when you're constructing passwords.

So looking at this pass phrase in that calculator, even with a magnification cracking scenario

it's at 89.14 trillion, trillion centuries to break that password. So I think we aren't

going to worry about that one too much. So that's great. Now all you have to do is have

a 25-character pass phrase for every account how hard is that going to be. That's not going

to a very good thing. So we're going to talk about something called

a password manager, and I'm going to jump because I've got a poll question here basically

ask do you use a password manager? And I would like you to complete the poll while I'm talking

about it here, but what a password manager does it manages your passwords so the examples

we have up there KeePass, Password Gorilla, LastPass are all examples of different password

management tools, and the way they work and I used LastPass about 10 years now. The way

they work is you construct this really good pass phrase kind of as your key to your Vault

where you're saving all these other passwords and it will save all the passwords for you

for all the websites that you go to. It will create complex passwords which are going to

be long passwords which have all the complexity that we know that we're supposed to have and

we'll basically provide a way for you to have a password manager on your desktop or with

your browser and be able to have a different password for pretty much every single account

you have online which is the ideal thing because you don't want to use your banking password

for your social media account because if somebody breaks it or tricks you into giving it up,

they're going to have access to your bank account.

So how did we do on the poll here? Do we have any responses yet?

>> CINDY: I'm opening it now. >> BEN: It looks like we've got a very small

percentage of users that are currently using the password managers and nobody said not

sure which is probably a good answer. (Laugh.)

>> BEN: But it's something that I haven't seen a lot of people do somebody told me about

it. They said it's really going to revolutionize the way you use the internet because now you

can have all of these different passwords. And, of course, the big question that comes

up how do I know my passwords are safe doing something like this? Because, obviously, if

you use something like LastPass -- it's a vault that's online and

it's storing millions and millions of different passwords so it's going to be a big target

so what happens with this is that the passwords are stored in an encrypted format. It's a

strong encryption and, yes, there's always a risk with information security. I will never

tell somebody you're going to be 100% secure. We just can't ever say that, but what the

tradeoff has been that I've seen is this helps you use more passwords, which we know is strong

which we know is a good practice. It's stronger to do and you've got some risk in terms of

passwords being exposed but it hasn't happened so far. I mean, lots of people are trying

to get into it and it's the kind of thing if it does happen, you're going to get a notification

and you'll have to change some passwords but again in terms of your working life it's a

lot easier to do this. So I have no stake in these password manager companies but I

do recommend one that you take one of them at least.

And the next thing I want to talk about is something called Multi Factor Authentication.

Now, I think the Google search might have called this two factor authentication. I don't

know, but Multi Factor Authentication. And some of you may recognize some of the pictures

on the slide. But Multi Factor Authentication is normally when you go online you have to

indicate who you are and something that indicates your secret passwords so that you can get

in. So that's they only call it one factor and only using one thing to prove who you

are. With Multi Factor you have something else so you have this password you know and

you have something else which is used to log in.

Now, with things like the Google Authenticator, which is the G in Duo, these are online these

are actually apps for your smart phone and mobile device and they work in conjunction

with the site that you're trying to log into so make sure when you log in to a specific

website and for RIT we've protected our Oracle information or my info site for those of you

who have been at RIT and to log into that now you have to have your user name and your

password and you have to interact with Duo and it's very simple because you basically

on the screen you're logging in and it says Duo, send me a push or Duo call my L.A.N.

line and you've got a smart phone and it buzzes and you say, yes, and you get to log right

in. Some of the other examples in here there's a YubiKey, which is a way of storing passwords

credentials that you use to log into a cower there's an RSASecurID and I had one 20 years

ago when I was doing consulting and that number would change every minute and you would have

to enter that number every time you logged in.

The other thing on the slide, Turn It On, that gives instructions for about 100 different

websites in terms of turning on two factor authentication, and it's probably the best

way to protect yourself. Again, security usually makes things a little

harder to do but it's always that tradeoff between your protection and things being a

bit harder. So my next question take a minute here into

the chat, what do you think the most common way is of getting a password. What are your

ideas on that? I'm going to answer Christina's question right now because we're in the space

right now. In terms of passwords, personally I use last

price and that has troubled in price over the last year. It's $24 a year for using it

on your computer and unlimited mobile devices so you're talking $2 a month for the protection.

There's an open source one called KeePass, which I know people who have used it for years.

I'm not really fond of it because it's open source and open source to me means that the

documentation is terrible because it's put together by a group of programmers and they

understand it. But KeePass LastPass, Password Gorilla. There's another one out there that

I'm not remembering right now, but I typically, what I would do I would search Ghoul for password

recommendations and get past the paid ads and look for the ones that may actually do

some review on it, but the important thing is you use one.

So what did we have in terms of common ways of getting passwords? What did people enter

in the chat? You're just asking for it, spoofing spoofing in the sense of pretending that you're

somebody else. Asking for it, address, pet's name or kids' name. Absolutely, people love

to use your pet's name as passwords and they also you have to post pictures of their pet

so it's not real hard to figure out but in general the and the other question that came

up here and I'm trying to read the chat one and talking which is a mistake but the dash

link the one I can't remember the name of it was, and I personally have not looked into

that very much, but the key things you're talking that I'm seeing in here so far they're

trying to fool people into giving up their passwords and that's the far most effective

way to do it there's very little risk to the attacker they want have to be clever or buy

tools to figure it out or break a password like we showed earlier. The easiest thing

is just asking for that password. Now, the nice thing about the Multi Factor

Authentication is that even if you give up that password, because it's requiring that

other piece of information, they don't have actions to it. So your account is still protected.

So that's the really that's why we think it's such an important thing in terms of protecting

account credentials. And the other trick, of course, is people

said spoofing and I'm going to use phisching in terms of people fooling you into giving

up your password. The tricky part is finding out if it's a issue if fishing account, and

if you don't have a PayPal account and you get an email from PayPal, it's obvious it's

not yours. For years it was easy to tell because the grammar would absolutely be terrible and

as long as you're not in too much of a hurry you could tell something was wrong with the

request that had come in. But essentially those kind of problems have been taken care

of because attackers can now buy kits online to do phisching attacks and it takes care

of these nice templates making it easier for you to fool with. So the rule of thumb we

have and I've got the slide out of order. Don't give up your password. No one legitimate

is going to ask you a password send you an email to ask for it. They don't need it to

reset it so just don't do it, so that he gets this slide I have up here the one on fraud

scams and malware gets into the other types of social engineering types of attacks where

they try to trick you into doing things there's been a lot of talk, you know we've all seen

lots of things about the elections lately about Russia attempting to do social engineering

and that has been their practice for many, many years. It's like we've finally woken

up this time. But the big deal is to trick people into doing things or get people to

do things they wouldn't normally do. So the kind of things we see in fraud, scams

and malware malware is malicious software which usually would be an attachment or something.

But we see requests like they came from the president's office asking for a copy of everybody's

W2 Forms. Or can you transfer the $500,000 amount and do a wire transfer quickly. We're

behind we need to get this thing paid and it looks like it's come from the chief financial

officer requesting somebody do that, and it's all where they try to trick people and it's

all different types of attacks. Say I'm a small nonprofit locally we've seen a steady

stream of fake invoices trying to trick our treasurer looking like it comes from the president

and tricking the treasurer into paying something. This is not just directed against long groups,

it's pretty much directed at all of us. The rule of thumb you don't want to take the bait

and don't give up your password and this section we're going to talk now of protecting your

identity and your online safety when you're doing social media and things like that.

So the newer threat we've seen that started probably about 2 years ago and we're seeing

more and more of is something called Ransomware and you can see this is a screen shot and

I think it says you have to pay $300 or 250 or something like that to get your files back.

But the way Ransomware works is that they trick you into installing a piece of software,

malicious software and that software goes and encrypts all the data on your computer,

and the better ones, air quotes around that, if you're connected to a network share or

a portable hard drive, it will also go in and encrypt that information as well. So the

problem is that once it's done it's too late to do anything about it and if you're lucky

maybe you're antivirus detected it before it started maybe you've unplugged your computer

really quickly and it didn't get very far into it. And you still have to figure out

what happened after you plug it back in but the key once you've been attacked it's too

late and you want to see things about the last year or two about the police departments

had their data encrypted and having to pay a large amount of the money. A large health

care system was attacked in the United Kingdom years and I believe to pay a lot of pounds

to get their data unlocked again. So the real issue is how do you protect against something

like this? You have to protect against it ahead of time. You have to back up your data

and we're all Leah about this sort of thing and it's like oh, we know we'll be okay and

we know our hardware might crash sometime but, of course, we're going to get some kind

of warning that it's going to happen which, of course, doesn't happen, and even online

accounts like Dropbox and things like that some of this Ransomware is sophisticated to

reach up into those accounts and encrypt it also. Best rule of thumb with protecting yourself

against Ransomware making sure you have a copy of your data and that means regular backups

and it means not just having a portable hard drive connected to your computer where you

copy files over. You actually need use some kind of a program for it. But so Ransomware

is probably or one of the scariest things come down the line last year.

Now, this point in time I usually pop up this slide and some of my audience I'm sure is

old enough to remember this, but these are the old duck and cover drills where everybody

hid under our seats to protect themselves from atomic bombs which, obviously, wasn't

going to do any good but it made us feel like we were doing something and I got a lot of

people in the audience who look like deer in the headlights and I want to talk about

some of the things you can protect yourself rather than telling you all the bad things

that can happen. Again, the Number 1 thing don't get hooked.

Never respond to email requests or phone calls or text messages or anything health that are

asking for your password. That's an easy one. If we just did that we'd be in great shape.

The other question I've got as we launch into this is I'm assuming most of you have mobile

devices, smart phones or tablets of some kind or other. The question I have for you we have

a question, yes. Is do you have a mobile security app on your phone? If you do, please it's

a poll so please answer the poll. I'm interested to see what the responses are here. 'Cause

I know how it goes when I'm doing this as a live in person.

>> BEN: It's not looking too good for the yes but someone it has. 2 people. So here's

part of the issue we have and all of you know this. Especially if you're an iPhone users

and I don't want to bash Apple on this but Apple has never made but they made things

easier for users and they've given a nice interface. They don't talk about security

very much and iPhones can be attacked and androids can be attacked and pretty much any

of the operating systems that are out there on smart phones and tablets and the things

like that. The list here is kind of a short list like the things like find my iPhone but

some things are actually apps that you can add from your marketplace or your Google Play

Store depending what you're using and they provide additional security. They'll scam

the applications that you're trying to install. They'll make sure they're okay and they'll

tell you if you've got weird permissions you're asking for if they're able to do things more

often than not. Again, I encourage you to research various, you know just do your Google

search of mobile security apps for whatever kind of device you have and see what the recommendations

are. You'll find that will secure things and the reason why this is so important I think

most of us are aware that over the last several years there have been far more smart phones

and iPad things and tablets stolen than regular computers and what it means for the cybercriminal

who's out there trying to trick us and get our money they're going to go after those

mobile devices. That's where people are and that's where they're going to invest their

money. And they're not as easy to protect. One of the questions I typically ask in the

class is how do you tell where a link goes to on a mobile device? And we're not going

to ask it as a question now but what happens is you can't hover your cursor over it like

you would over a computer. You can't really hover your finger over it either, and if you

just touch the link it takes you there. If you find out where it goes you actually have

to push down on the link with your finger and hold it down until it shows you where

it goes. And that is not a good design. Obviously, if you let up on your finger too soon it's

taking you to that link. So this is one of the reasons, I think, that mobile devices

are attacked so much 'cause they're just harder for us to think about defending.

Now, what's interesting is that Google question that came up really easy where the most important

thing to do was to install software updates we do that on our phones. We know we need

to do that on our phones. We get them daily for all these different apps so it's the same

thing with your computers you want to make sure things are kept up to date.

So I'm going to talk about a few other things here about protecting your information. Great

drawing created by a student who worked in our office at one point in time and it's very

it's a good illustration what's out there because something may appear to be a sheep

but it's really a wolf in the background and you cannot tell by what you see online. You

cannot tell. Friend requests hey, great. But who knows what they're really like. It's not

saying criminals can't look great either for that matter.

So my Number 1 rule of thumb we can never assume on privacy whatever we share online

we have to assume at some point it's got to be revealed. We had no control over what happened

with Equifax with them revealing all of those passwords or Yahoo! I think they revealed

2 billion passwords. They had 2 billion passwords. They revealed every account password they've

had and we have very little control but we do have control over the types of information

we share and that really comes into social media. A lot of times you'll sign up for Facebook

or some other social media account and it may ask for your birthday or hometown or ask

you where you went to school. You can provide that information but you need to think about

the types of information it's asking for and makes sure you're comfortable with providing.

But again, even if it says it's secure and private you've got to assume at some point

it will be revealed. The next screen which is probably not readable

is privacy settings that's actually from my Facebook account and what was interesting

about this is when I went down and I looked at who can look me up and the second thing

on there said who can look you up using the phone number you provided and it said everyone.

I never remembered giving Facebook permission to do that. So that must have been a default

setting, and what I recommend is that every few months go into your privacy settings in

these different social media accounts, make sure that nothing has changed and make sure

that they're all settings that you're comfortable with and change them now if they're if you're

not comfortable with them. Do what you can to protect your information.

Now, something they also provide that are good are log in alerts which you can sign

up on the various social media accounts. I was speaking in a conference in New England

in the fall and while I was there I got 6 or 7 messages from Facebook that somebody

was trying to log into my account. And they knew actually, I think they were coming from

Australia of all places, but it alerted me that was happening which was a little discomforting

but also told me I didn't need to change the password but the good news is when you log

into Facebook and let's say you log from out of town you'll get these alerts because you're

not the internet the IP address that you are connecting from and it will let you know.

A couple other tips here use something called Google alert that you can set up. You can

monitor used of your name and put in your email address and anytime that appears online

in this place Google indexes it will give you a report on that. And you can aggregate

it so you can get it maybe once a day and you can use this alert to follow various subjects,

sports teams, all sorts of things like that as well. So it's got some things it's got

some play value also. Google also has my account dashboard -- if

you're a Gmail user, which is probably 90% of the world, at least at this point, one

thing you can do is go to is go to my account dashboard and it will allow you to do a security

checkup and privacy checkup and I encourage you to do that again just so you know what

you're sharing. You can see below privacy checkpoint it will show you the activity which

has been associated with your account and if there's things on there that you haven't

done then that account has been hacked at some point.

Another nice trick which somebody told me about is doing something a Google reverse

search. I don't know how many of you have used LinkedIn and I will connect with anybody

and it looks pretty bizarre. There's fake accounts on LinkedIn and like fake accounts

on Facebook and others, and it will allow you to select the imagine depends on if you've

got Chrome and it will show you all the places that image is used. I've got a connection

request from probably one of these people right here on the right here but that same

picture was used with at least 4 different LinkedIn accounts so it's so it's a generic

picture so maybe it's one of those people but it's a good way to check to see it's the

image that's commonly used on the internet and they're using it for a fake account and

they want you a fake account because they want to get you over to your connections.

So another issue and again, it's not typically an issue with faulty or staff or audience.

You want to protect your your only image is what they see about you online. This example

here is from a poster from the University of Wisconsin and would you hire this guy and

somebody's told me at one point they think it would be milk. I'm not buying it. But the

idea again is that understanding whatever you do online people are going to make decisions

about you and make judgments about. So that is the presentation and I'm going

to pop up my next which is my website, while we're talking here, but what questions do

you all have? And thank you for the opportunity. >> CINDY: Thanks, Ben.

There are a couple coming in. So if you have additional questions, folks, please send them

in through the chat box. A couple of things that have come up what if you do not put your

portable hardware drive online. Will the Ransomware still attack it?

>> BEN: As long as the portable hardware drive is connected to your computer, yes. Depending

on the strain of Ransomware, it will go into everything you're connected to. So the idea

if I was using a portable drive for backups, I would back up and then I would unplug it

and I would plug it back in when I'm going to use it, you know, back up to it again.

Typically, my experience we use those as additional space and not backup space. We really need

to think of it as an opportunity to back it up and again, back it up and just disconnect

it and it's not going to jump into it if it's not connected.

>> CINDY: Okay, a question from Pete. What's an example of a mobile security app?

>> BEN: Well, depending on your phone and depending on how old it is, you will kind

of dictate what you really need. So one example of a mobile security app is something called

LastPass and not LastPass I've got that wrong. Lookout. It's called Lookout. Lookout what

it does you stall it from your app store and it scans all the applications that you install

to make sure there's nothing malicious in them or whether they're asking for weird permissions

like why do they need access to your computer and that sort of thing. Lookout also has the

built in thing that iPhone users have enjoyed where you can find your phone through Lookout

and what you can do is you can bring up a map and it will show you where your phone

is within 75 feet, I think, it is. And you can also get it have your phone emit a high

pitch squeal noise, and that will help in terms of trying to find it.

The main thing it does is it looks at your applications and make sure none of those are

malicious and they do sneak out occasionally where they are bad. I used a program by Sophos

for my smart phone, and it was very aggressive in terms of what it would warn me about and

it would start talking about low reputation application and it told me Google Play was

a low reputation application and a bunch of other things and it was probably a little

bit too hypersensitive so I had to kind of turn those notifications down some. But the

idea it's a third party application that you would add to your smart phone or other mobile

device. A very long answer to a short question. >> CINDY: That's okay. Thank you.

Adam has a question. What is the best way to implement a safe home network where my

spouse and I can count on safe robust backups that can be automated by software and then

what software might that be? >> BEN: Yeah, I think this is probably a question

is a little bit beyond the scope of what I was prepared to talk about. But in general

you want to use a router and some of the I'm trying to remember whether our router does

this or not I've got what they call a Cloud drive which essentially allows me to back

up to it in the house. I've got the system set up to back up to it and then it will back

up that data to the Cloud and I don't do not remember what the cost is per gigabyte or

whatever or storage but storage prices are going down and down. But ideally what you

do to protect your data is you make you get a copy of it and you have that copy somewhere

besides where the computer is located because there should be a break in or fire or anything

else, you don't want to have lost every bit of digital information you have. We've become

too dependent on it. >> CINDY: All right, um, question on that

came in from I don't know who did that come from? Jim? Is there value to use the traditional

antivirus software that works on a mobile device?

>> BEN: Yeah, so when I'm talking about a mobile security app, they will have antivirus

built in. Cybercriminals are still crafting malicious software to attack phones. A banking

Trojan a couple of years ago, which was still out there and I'm drawing a blank on the name

of it, but what the Trojan means it's like the Trojan house it looked like something

else and there was a banking Trojan and what it did it captured all your banking activity

online. It didn't worry about anything else you were doing but anytime you went to a bank

it would capture that information and send it out to somebody. The antivirus I think

what you'll find I'm not sure you can get strictly an antivirus for your phone at this

point. They'll all be more robust security suites of software.

And the good news is most of them are free. Or at least have free versions, and the reason

for that is it is it helps all of us to get this security software out in the marketplace

because it reduces the amount of the attacks that go on.

>> CINDY: Thank you. Another question came in from Adam. Do you

know if Mint.com is a good third party app for a bank security?

>> BEN: It's not anything I have used but my rule of them point of view I want to get

a good idea how many people are using it. I'm not aware of any breaches which is what

they would call the releases with Mint.com, but they be associated with Intuit which has

Turbo Tax and there have been occasional problems, but I'm a Turbo Tax user myself and I haven't

worried about that. The biggest issue is people asking for passwords and people giving them

up. In terms of Verizon security and privacy app,

I'm not familiar with it. I tend not to use I have Verizon but I tend not to use their

built in stuff. I don't like it. It takes up room that I would rather use for something

else. But in general I'm going to give you the same response. Do a Google search and

look for reviews and see what they have to say about it, and, unfortunately, it's going

to be pretty much my responses to any specific security app or software questions today because

it changes. It changes monthly depending on which one is more effective.

>> CINDY: So if I've got malware on my device, what do I do?

>> BEN: Take it to somebody to look at. If you're associated and I can't tell you exactly

who to take it to look at. If you're around here around RIT in the community I think you'd

probably go to the digital den and ask them for their recommendations on it. Worse case

you just reset the device and wipe and return it to factory specs and that should take care

of any malware that's on the device. >> CINDY: Okay. Here's a question that came

in about looking for advice for parents to communicate to young adults and students about

not sharing their personal online ID, if they're uncomfortable doing it. Any thoughts for frustrated

parents out there? >> BEN: Yeah, a couple of things. Parents

don't tend to use the same applications they're kids do and I think that's deliberate on the

part of the kids. But they'll use things like Snapchat which is supposed to be this very

brief period of time a picture is available or something like that. But people can take

a screen shot of it. They can take a picture of the device that the picture came in on.

There's also been cases where it's like oops, somebody broke into the Snapchat servers and

they found all this information that was really supposed to be ephemeral.

The best place I would tell you to look is go to a website called Stay Safe Online, and

it's a Government website that's set up and it has a whole section on parents and teens

and preteens and what kind of information to share with them. I think that will be your

best option to Stay Safe Online. >> CINDY: Okay, thank you.

Are there any additional questions? If not, we're putting that website for Stay Safe Online

into the chat box. So I guess if there are no additional questions

we will wrap up. So thanks to Ben for coming back and being

a presenter for this second time. If you do have a digital question, you can email at

to lumbar RIT.EDU_alumni with the hash tag meRIT with the webinars, and we'll try to

get you some information for the panelists today.

As a reminder all of you will receive an email from us in the next few days with a link to

today's webinar recording. Ben I can't think you enough for being our

presenter today and thanks to all of you out there for participating in today's webinar.

Our next webinar is Thursday, March 8th, called Build a Better Brand from the Office of Career

Services with Kris Stehler. Look for your special invitation and your email coming shortly.

Again, thanks to everyone for joining. You can exit this webinar by simply closing the

WebEx window and has do let us know what you thought of the webinar with by taking the

brief survey which pops up when you exit the webinar. Thanks. And have a great day.

For more infomation >> MeRIT Webinar: Digital Self Defense - Tips, Tools, and Best Practices to Stay Safe Online - Duration: 53:03.

-------------------------------------------

Digital Storytelling - Duration: 2:03.

The other girls constantly made fun of Breanna for doing her homework instead of going on her phone.

Breanna struggled with making the right decision of whether or not she should tell the other girls that they were hurting her feelings.

If you were in Breanna's situation, what would you do?

Breanna decided to stick up for herself and tell the girls how she truly felt.

Breanna made the correct decision by sticking up for herself. The kids now understand how their actions negatively effected Breanna.

After the teasers realized that their actions were wrong, they came up with the idea...

...to make posters that would spread the word about how being respectful is positive in the classroom.

The girls worked together to come up with a definition of respect that they all agreed upon.

RESPECT: to treat people in a positive manner

When it was time to go to lunch that day, the two girls left, leaving Breanna by herself.

Breanna was too shy to ask if she could tag along with them, so she stayed back and helped clean up.

When you are able to accept others differences, you are able to show them respect and advocate for acceptance!

To Breanna's surprise, the girls invited her to go to lunch with them.

Do you show respect to those who are different than you?

For more infomation >> Digital Storytelling - Duration: 2:03.

-------------------------------------------

La transformación digital del Sector Salud - Duration: 3:02.

For more infomation >> La transformación digital del Sector Salud - Duration: 3:02.

-------------------------------------------

ATTN: uses Tubular as the Measurement Standard for Digital Video - Duration: 1:02.

Our primary ways of distributing content is on Facebook.

We get about 500M video views per month.

We talk about a range of topics - everything from gender inequality to politics to racial

injustice.

What we try to do is compartmentalize issues that are complex into digestible short-form

video formats.

We have a goal of having really engaging original premium quality content and we use engagements

per video metrics, views per video metrics, shares per video metrics, comments per video

metrics to assess how good of a job we are doing at creating premium engaging video content

and Tubular helps us do that.

Pre-Tubular it's like the dark ages.

The way I describe Tubular is a platform where you get competitive intelligence on

the media landscape outside your data set.

In TV the standard for understanding the landscape is Nielsen. And I think for digital media it's Tubular.

For more infomation >> ATTN: uses Tubular as the Measurement Standard for Digital Video - Duration: 1:02.

-------------------------------------------

Digital Marketing Interview Questions And Answers 2018 | Digital Marketing Tutorials | DigitalRakesh - Duration: 1:51.

Digital Marketing Interview Questions And Answers 2018

For more infomation >> Digital Marketing Interview Questions And Answers 2018 | Digital Marketing Tutorials | DigitalRakesh - Duration: 1:51.

-------------------------------------------

Kuwait International Bank targets digital innovation for retail growth | World Finance - Duration: 4:01.

World Finance: Kuwait International Bank has been providing financial services to the country

for over 40 years. In 2007 it responded to growing demand for Sharia compliant services

and transformed into a full-fledged Islamic bank. How will it transform next?

Mohammad Said El Saka is the bank's deputy and acting CEO, and at the top of his agenda is digital innovation.

Tell me about your vision and strategy for the bank.

Mohammad Said El Saka: The main vision is to be the Islamic bank of choice in Kuwait,

and we have defined three pillars to work on. One is the digitalisation, focusing on

retail. The second one is to go advisors for the corporate, mid-to-large size. And the

third one is one stop real estate shop.

The bank has been established back in 1973 as a specialised real estate bank, not only

focusing on real estate finance, but also specialising in both property management as

well as real estate appraisals. So we wanted to capitalise on this as well.

In order to achieve these three pillars, we've been working on five core competencies. One

is digital innovation, two is service and product innovation, the third one is control

efficiency, fourth one is risk management excellence, and the last one is strategic pricing.

World Finance: So how successful was this strategy in 2017?

Mohammad Said El Saka: It was very successful actually, in terms of reflecting very good results on

the bottom line. We have growth on all the financial dimensions: total assets, financing

receivables, operating income, and customer acquisition.

We've recorded almost $4bn as deposit balances end of 2017. And here is a very successful

story about the strategy implementation, because we have relaunched the full suite of our deposits.

We had a product called Arzaq, it was relaunched back in early 2015, and it has recorded continuous

growth for the last 12 quarters.

We've also launched a new long-term deposit called Al-Boushra, it's three years that distributes

on a semi-annual basis. We have re-introduced our savings accounts, changed the payment

terms to be on a quarterly basis rather than on an annual basis, which actually recording

one of the highest if not the highest profit returns in Kuwait.

We have also launched a similar account, but for corporates, as well as the last product

is a flexible deposit end of 2017, with a magnificent impact on the market.

World Finance: Sounds like a positive year for the bank and your customers; how about

your shareholders?

Mohammad Said El Saka: There was also a good reflection on the shareholders, because we

have been listed in MSCI Morgan Stanley Capital Index for the small caps back in June

2017, and were also shortlisted in FTSE Russell Capital Equity index. Also cash dividends

payout is one of the highest as well.

World Finance: Give me some examples of the digital innovations you're bringing to market.

Mohammad Said El Saka: Two main products we launched in 2017. One is for the omni channel

and mobile application, and the second one is the first iteration of its kind; it's visual

IVR. So we're simply following the life of the customer, not only to have a normal routine

contact centre, but it became a visual one. So it's like, one of its kind in omni-channel

product that's launched in 2017, and we have a lot to go actually in 2018 as well.

World Finance: And all of this success has been recognised with a number of accolades

over the year.

Mohammad Said El Saka: Yes; first of all we had the honour to receive the World Finance

awards as the best Islamic bank in Kuwait, and best Islamic Bank in GCC, and also best

customer acquisition, which reflects our deposits.

In addition, the Union of Arab Banks has recognised us as the best vision in banking strategy.

Bankers Middle East has also recognised us as Best Change Management in Kuwait, and these

two awards reflecting the strategic implementation and the change management that we have.

Capital Finance International as well, the fastest growing Islamic banking in 2017 MENA,

and the best Sharia compliant bank. Forbes has also recognised us as one of the top 50

listed companies in Kuwait.

So it was a very successful year, and we wanted to extend our appreciation to our customers,

depositors, shareholders, employees, and special thanks to the regulatory authorities, especially

Central Bank of Kuwait for their guidance, supervision, instruction, and continuous support.

World Finance: Mohamed, thank you very much.

Mohammad Said El Saka: Thank you sir.

Thanks for watching. Click through for more interviews with Islamic finance providers,

and please subscribe for the latest international business insights from worldfinance.com

Không có nhận xét nào:

Đăng nhận xét