"Stock Download Link In Description "
"Stock Download Link In Description "
"Stock Download Link In Description "
-------------------------------------------
Digital Transformation: The opportunity and getting it right (Highlights) - Duration: 3:41.
Digital transformation is the big challenge facing Europe's economy.
How do Europe's citizens and heavy industries prepare for data flows and workflows in a
changing environment.
Is the regulatory approach balanced?
Is it fair for the future, for the road ahead?
Is Europe's business about to grow or about to slow?
We're joined by the Bulgarian presidency and Microsoft to discuss these challenges and
the road map for Europe's future digital economy.
It's my pleasure to welcome you to the Microsoft Center for this evening's event.
The opportunities of digital transformation are tremendous, and yet in a time of so much
change, it is important to reflect on how to do it well and how to ensure that we can
bring about the change while preserving our values and our social benefits.
I'm working in the digital field for over 15 years now, and back then, it was exotic.
Now it's everyday life, and I'm fully convinced that this is the future, that's the innovation
that's coming our way.
We have announced that we are here for growth and jobs.
Of course, that's one of the ways to see that, I think, how we can really benefit from digital
transformation in terms of our economic growth, competitiveness of European industries, and
I think there are future opportunities for our people in very broad terms, and I think
that we are modernising our societies and economy.
The digital single market principle has put things in the right framework, but, I mean,
we should do more.
There are some issues, like on the manufacturing industry, the Industry 4.0 where Europe could
do more, and I think it should also be more reflective of value.
I think more could be done to green the digital industry and the overall industry.
So right direction, but more integration and a more value-based approach will be needed.
We are having assets in traditional industries which are not necessarily digital, but of
course I think that to combine these traditional industrial assets together with digital ones,
I guess that that would be kind of the challenge, and I would say that I think it's an opportunity
that Europe can really survive and flourish.
We have a number of great achievements in terms of building user confidence and being
more inclusive in our policies and level the playing field for the small and medium-sized
economies, and the industry has been sort of lagging behind digitalisation.
The future challenge now is going to be to increase the technological absorption, make
sure that we create and become more innovative as an economy, and that's going to be more
difficult than quite a, just a few regulations that we need to reenact.
We need to do the necessary.
That's the most important part.
Necessary for our citizens, for our businesses, and we have to be able to move forward, to
expand our horizons and to be ready for what's in front of us.
-------------------------------------------
WOW! Discrimination Scandal Exposes Weird Double Standard, Digital Crushing TV, Russia Fires, & More - Duration: 15:00.
'sup you beautiful bastards
I hope you're having a
fantastic Tuesday welcome back to the Philip DeFranco show and let's just jump into it. And the first thing we're gonna talk about today is the
Story, and controversy around Bailey Davis, a now former New Orleans Saints cheerleader
And she's in the news because she filed a complaint with the Equal Employment Opportunity Commission
Against the Saints. This for alleged gender discrimination her complaint claiming that female cheerleaders are held to a very different and higher personal conduct
standard than male players. And this complaint is coming after Davis was fired for breaking a team rule that only applied to female
cheerleaders. And according to Davis's complaint,
here's why she said she was fired. In January, she posted a photo of herself in a one-piece
Outfit on her private Instagram although right now
It's not clear which specific picture the Saints were upset about and the Saints claim that she broke a rule because the team prohibits cheerleaders
From appearing nude semi nude or in lingerie. And at the time she posted this photo the team was already looking into other
Incidents involving her.
Davis claiming the team had been
Investigating whether or not she had attended a party with Saints players- a claim that she denies. According to Davis's complaint the Saints also accused
Her of receiving messages from players on Instagram today
She admits to receiving messages from players, but has also said that she never responded to those messages
And she also claims that after posting the photo Ashlee Deaton the director of the team's cheerleading squad sent her a text saying very poor
Judgment to post a picture like that especially considering our recent
Conversations about the rumors going around about you, and then four days later Davis was fired
and so that's why Davis is now claiming the rules that got her fired or discriminatory because mail players are not subjected to the
Same conduct rules. According to Davis's complaint Saints cheerleaders are barred from following any players or coaches on social media must block any Saints player
Who follows them on social media, can't contact players respond to messages from them or like any of their social media photos,
Photos can't post any images of themselves in Saints gear can't post any images of themselves that are considered semi nude or that show them
In lingerie must avoid making eye contact
and move to the side if they encounter a player in the tunnel that leads into the stadium and must leave a
restaurant bar or party if an NFL player is already there or
Arrives after them and according to the complaint players are not held to these standards
And they are also reportedly not penalized for pursuing the cheerleaders
And I will say if this is 100% accurate that the cheerleaders are held to this policy
But the players aren't that is extremely odd
That would be the organization
Regulating and penalizing the target rather than the potential weapons. The cheerleaders have to double check who's following them on social media
Just in case someone from the team at the cheering for is following them
And then they have to block them when it seems like you could have a policy like hey players
Stop trying to fuck our cheerleaders
But that's that I'm trying to reserve full judgement for now because the Saints haven't really fully respond
But we have gone from them
Though is a lawyer representing the organization told the New York Times the Saints organization
strives to treat all employees fairly including miss Davis at the appropriate time and in the appropriate forum the Saints will defend the
Organization's policies and workplace rules for now it's sufficient to say that miss Davis was not subjected to discrimination
Because of her gender with that said you have the story you also have my opinion and now I'd love to pass the question off
To you what are your thoughts around this is this discrimination?
Is this unfair or no I'd love to know your thoughts and why then in streaming news youtube news
I forgot to mention this yesterday. I want to congratulate you to Borel Rubeus
He's a massive Spanish gamer with over 28 million subscribers on YouTube. We're talking about him because he set up this massive
livestream event of youtubers playing for tonight it was he and 99 others and just a few hours they drew more than
1.1 million concurrence, I mean these numbers are amazing and crazy last time we talked about a streaming record regarding fortnight
We were talking about twitch and specifically ninja and Drake they at the time had completely destroyed the single player
Livestream record on Twitch there's been like two seconds. We're already talking about someone beating that number by over five hundred thousand
This is great for everyone. It's good for the platforms. It's good for the game
It's good for the the player is actually playing it's great for the internet and streaming in general because it's just pure
numbers every day we see these new numbers the
Audience's grow it becomes less of a this is the future and more of a this is the now that's one of the reasons why?
As of last year reportedly digital advertising spending is now surpassing that of television
I'm very excited to see what happens next I do want to end this on two notes one keep it up and two
minecraft youtubers who stopped actually enjoying Minecraft years and years ago
But then really still liked the money the numbers are saying you should feel free to now enjoy a new game
But from that I want to share some stuff
I love today and today an awesome brought to you by Cee Cee geek of course fantastic take it out that takes
Confusion out of buying tickets for all kinds of live events concerts comedy shows whatever, but all the tickets in one place
They give them 0 to 100 scores. You know if you're getting a good deal or not
I've got the app on my phone
and it is by far the easiest way to buy tickets whether it be something last-minute or something down the
Are you looking forward to like maybe you want some childish gambino?
Kendrick Lamar in your future so if you want to check it out like many from the nation already have go to see geek fill
Com download the app and be sure you enter an offer code filled is when you do that. See key
Will give you $20 off your first ticket purchase the first bit of Awesome is actually self promo after massive demand
Stemming from when I said it we are now officially launching the I'm gonna boycott your boycott of their boycott with my own
Boycott and I'm going to preemptively announce
I'm boycotting anyone who boycotts my boycott boycott
Everyone shirt and/or hoodie the perfect shirt for 2018 which so far seems to be the year of the boycott
Also, if you find this shirt to be offensive please boycott it because I would love the free promo yeah
If you want to snag one well you can link down below
Then we got a trailer for the house with a clock in its wall starring Jack Black and Kate
Blanchette got the honest trailer for Star Wars the last Jedi that Umbro us and we had dude perfect doing boomerang trick shots
And if you want to see the full versions everything I just share the secret link of the day anything at all
Links is always on the description down below and we a quick update around the self-driving goober death out of Arizona, Arizona
Governor Doug Ducey has now suspended
over from testing self-driving vehicles on public roads saying I found the video to be disturbing and alarming and it raises many questions about the
Ability of uber to continue its testing in Arizona and following this uber responded be proactively suspended self-driving
operations in all cities immediately following the tragic incident last week we continue to help investigators in any way we can and we'll keep a
Dialogue open with the governor's office going forward also around this story. We have a new accusation
That's come out from active PLC or the company that makes the collision avoidance
Technology a spokesman for the company telling Bloomberg we don't want people to be confused or think it was a failure of the technology that
We supply for Volvo because that's not the case and then reportedly alleging that uber
Disabled the standard collision avoidance technology in the Volvo SUV that struck and killed that woman
Uber was instead using its own
self-driving sister and in a response to this uber declined to comment and Volvo said that they are waiting for the results of an investigation
That's where we are as of right now, and we'll see if new information comes out soon
And then let's talk about Facebook because a lot has happened since we last talked about them in their Cambridge
Analytical scandal their stock plummeted even more we saw headlines saying that they lost over 100 billion dollars in value
That's also meaning that Zuckerberg net worth went down billions and Zuckerberg has been in damage control mode saying
I'm really sorry Leigh's book also bought and released full-page
in US and UK newspapers including the New York Times The Washington Post Wall Street
Journal The Sunday Telegraph in The Sunday Times the ads saying we have a
Responsibility to protect your information if we can so we don't deserve it also calling the Cambridge analytical situation a breach of trust adding
I'm sorry. We didn't do more at the time. We're now taking steps to make sure this doesn't happen again
I will say personally from my standpoint. I think it makes sense that they're trying to own this you know it's it's smart PR
I'm also confused like many others were why they would choose to buy a
Giant ad in newspapers rather than releasing it digitally your Facebook. Why not release it on Facebook also
I don't think a full-page apology is really gonna do the trick because
Everyday we're now seeing a new Facebook store in this same news cycle
We're seeing headlines like Facebook scraped call text message data for years from Android phones this popped up because people have been
Downloading their data from Facebook this week. I'll link down below the instructions for how you do this
It's actually really simple and the information they have on you is really interesting as far as the collection of call data
SMS data Facebook has now responded saying this feature is opt-in adding
We never sell this data, and this feature does not collect the content of your text messages
Or calls also saying you can opt out in settings and once you do so all that data will be deleted
we all saw Elon Musk deleting Tesla's and
SpaceX's Facebook accounts support early Facebook's also on the cusp of their very own ad pocalypse
Several companies have decided to suspend their ad campaign among them you have Mozilla Pep Boys
Commerzbank Sonos and actually on the note of Mozilla. They have released a Facebook centric extension
They've now announced and released the Facebook container extension saying this extension helps you control more of your web activity from Facebook by
isolating your identity into a separate container this makes it harder for Facebook to track your activity on other websites via third-party cookies and they
Go on to explain it the mindset behind
This is rather than stop using a service you find valuable and miss out on those adorable photos of your nephew
We think you should have the tools to limit
What data others can collect about you that includes us Mozilla does not collect data from your use of the Facebook container?
Extension we only know the number of times the extension is installed or removed
We've also seen the Federal Trade Commission the FTC announcing that they are now investigating Facebook
We also have Congress and Parliament updates in the States Congress said they wanted to hear from
Zuckerberg whether Zuckerberg was gonna do it or not that not been officially confirmed
But today we did get a report from CNN's Dylan Byers who said Facebook sources
Tell me the 33 year old CEO has come to terms with the fact that he will have to testify before
Congress within a matter of weeks and Facebook is currently planning the strategy for his testimony
We also had Bloomberg saying on April 12 Zuckerberg would be appearing before a House panel
As I'm recording this video the committee says that nothing is confirmed yes
That's still a little bit up in the air as far as Parliament in the UK it appears that as of right now
Zuckerberg has no plans to go himself MP
Damien Collins had written a letter to Facebook saying it's now time that I hear from a senior Facebook executive with the sufficient authority to
Give an accurate account of this catastrophic failure of process
There's a strong public interest test regarding user protection and Facebook responded yesterday with we have responded to mr.
Collins in the DCMS and offered for two senior company
Representatives from our management team to meet with the committee depending on timings most convenient for them adding both Chris Cox and Mike Schroepfer report
Directly to Mark Zuckerberg and are among the longest-serving senior
representatives in Facebook's 15-year history and to this Collins responded we will seek to clarify with Facebook whether he is available to give evidence or
Not because that wasn't clear from our correspondents if he is able to give evidence
And we will be happy to do that either in person or by video link if that will be more convenient for him and all
Of this is happening well as I'm recording the stock is down another 4% today with that said a question
I'll pass off to you regarding Facebook how much do you actually trust are you aware of what you are with them?
What do you care about the privacy? How do you feel about the privacy? Also did you or anyone?
You know actually shut down your Facebook accounts any and all things I'd love to know in those comments down below
And then let's talk about this horrible story coming out of Russia around 4:00 p.m.
on Sunday a massive fire broke out at the winter cherry mall in the city of
Kemerovo Russia and according to Russia's Investigative Committee at least 64 people died in the fire with 41 of them being children and the reason
the number of children is so high as the fire is thought to have broken out on the fourth floor of the mall in the
Children's play area next to the cinema then spreading to the third floor after the fourth floor partially collapsed notice
What is captured by the CCTV cameras and it is?
Horrifying the fire and the smoke it spreads so fast it some of the worst footage
I'm not gonna show in this video involve people jumping from the fourth floor because they were unable to get out any other way
So I'm even hitting things on the way down reportedly 288 firefighters arrived at the mall it took 19 hours to put the fire out
According to the head of the city's fire department the blaze spread via
Flammable 3rd insulation making it especially difficult to extinguish under the question of what caused this fire
There are two competing reports one according to cameras vice-governor this started in the play area and quote the preliminary suspicion
Is that a child had a cigarette lighter which ignited foam rubber in this trampoline room, and it erupted like gunpowder
but other Russian media sources such as state-run Interfax and reported that there are possible violations and the
installation and maintenance of the malls
Electrical greasing the grade cannot withstand an increase load that day and did not have protection against different voltages
Which caused the fire and as far as why the official death toll is high and in fact may be higher because there are missing
People the mall was really busy as sunday was the first day of a week-long school holiday in Russia
Investigators are also saying that there were serious building violations at the mall this including blocked fire exits videos including this one popped up online
Seeming to show people unable to escape through locked fire exits
There are also reports on a security officer turned off the PA system when informed about the blaze in a Facebook post an tango Relkin
a member of parliament for Kemerovo wrote children died next to fire exits
They knew where to run they were going in the right direction
But doors were locked also saying that a fire extinguisher that could put out the flames did not work and also single
I know the owners and developers
Of the mall for taking shortcuts with its construction writing people whose pockets were filling with millions from this shopping
Mall knew that one day this money will smell of blood or okay?
And also adding the building's
Acceptance certificate was signed by the Commission main signature was signed by the deputy mayor he is also the head of the city
Improvement department he could close his eyes to obvious security problems only in one case. I think if his eyes were closed with money
They've also been reports from eyewitnesses saying the building's fire alarms
Never sounded leaving many including those in a movie theater unaware that there was even an emergency
Investigators have detained five people thus far in connection with this fight this including the technical director of the mall the tenant of the area
From where the fire is thought to have begun the head of the company servicing fire alarm system
And the security guard who allegedly failed to raise alarm when the fire broke out
We also saw a Russian President Vladimir Putin flying to Kemerovo both offering condolences to the families as well as blaming criminal negligence
Hooten also saying 100 investigators were on the scene trying to determine the exact cause of the fire
Around the same time of Putin's visit there was an angry crowd that formed in front of the city's main municipal building portably starting with
Just a few dozen people then growing to around
4,000 reported and many of the demonstrators
Believing that the death count is actually much higher great Interfax relatives have reported that 85 people are still missing and most of them are
children on the note of criminal negligence
Let's talk about the alleged owner of the mall some Russian media sources have reported that the owner of the mall is Denis Stengel oh
and shingle of is a Russian snack and candy tycoon who was involved in many ventures in the country and at the time of the
Fire he actually wasn't in the country was in Australia where he lives part time and when reached by Russian journalist after the fire reportedly
Refused to answer whether he owned the mall or not, which hey, I was gonna insert my opinion
Here is a weird fucking response to a pretty basic question
But he did admit that his company helped fund its construction single of then went on to say something that I found weird for someone
That seemed to not be sure if he actually owned this thing or not
Saying his company would pay the equivalent of fifty two thousand dollars to the families of each person killed in the fire also when asked
If he would be returning to Russia
He reportedly said to come just to go to jail so there was that
And on top of that there also seemed to be another failure
2016 the chief fire inspector for the Ministry of Emergency Situations told state news agency Tass that a scheduled inspection in 2016 never took place
because of quote
supervisory holidays this failure after failure after failure
And now you have all of these people dead all of these children dead and as of right now
That's where we are hopefully we get more information from these investigators, but also at the same time
I have limited faith in the information that we're going to get because what we're talking about is systemic corruption
And it just makes me wonder are they actually going to find the people that are responsible for this and I mean
Top down or are you just gonna see a fall guy or two and not the?
prosecution of the people that set up the dominoes in the first place and that's where I'm going to ends at Asia and remember if
You like this video you like what I'm trying to do on this channel
That like button if you're new here hit that subscribe button ring that Bell. Also if you missed yesterday's Philip DeFranco
Show you want to catch up click or tap right there to watch that or maybe you want something lighter
You can watch the news behind-the-scenes vlog click a tap right there box. That said of course as always my name is philip defranco
You've just been phill'd in a la vo faces, and i'll see you tomorrow
-------------------------------------------
'Surrealism Tattoos' The Art of Ink (Season 2) Digital Exclusive | Paramount Network - Duration: 6:07.
(upbeat music)
- [David] I just let my subconscious speak for me.
Try to lead your viewer into an adventure
by creating an image that may take a second to see,
but a lifetime to understand.
- [John] The strange and absurd stuff,
it's just an appreciation for things
that are out of the norm.
- [Joey] A lot of it comes from a dream-like state,
where you are creating things
that are just coming from inside of you.
- [Jesse] The whole purpose of art is
to make you feel something, how the universe works,
why we're all here, what we're all made of,
kinda breaking away and showing the subconscious within.
- I started gravitating towards realism in high school,
seeing works by Dolly and M. C. Escher,
taking the realistic elements and putting them
in situations where maybe they wouldn't normally exist.
So, I bought a tattoo kit, started tattooing friends
in the basement and it kinda grew from there.
- I mean my background was carpentry and construction
and doing whatever I had to do in order to
help my habit of wanting to make art.
I just like making weird things
that look like they're out of dreams.
- I was about 19, and I was in graphic design college.
I just decided to learn about surrealism tattooing.
It's the non-conformity of it,
it's the fact that I can incorporate elements
that are not part of our reality that we can perceive.
It's really a way of making people look at an object
in a second way,
making people see their realities differently.
- Well, I just like surrealist tattoos,
you know, they're very playful.
You can get way more loose
and you can add different aspects to it,
just to see if people would get it.
- The word surrealism itself is like something that people
talk about today when they can't really describe something.
Like, "That was a moment that was surreal."
What is surrealism?
It's just the idea of mixing together odd components,
things that are gonna make a dream-like reality.
- Surrealism started post-World War I.
It was a movement to kind of link
the subconscious with the conscious world.
So trying to use writings and imagery to represent that.
- People were like, "We should just try new things.
"Try to blend things that are not supposed to be together.
"Let's take an apple,
"and make it levitate in front of a man."
which became this very famous painting,
The Son of Man from Magritte.
It's just taking things
and bringing them to another perspective.
Dali would take a clock, and why would it be melting?
Have you ever seen a melting clock?
But the reason why he came up with it,
was probably 'cause he was not thinking too much,
he was just going with the flow.
Letting the ideas just flow down
and probably just paint with the brush
and come up with things on the spot.
- The kind of symbols that are usually
associated with surrealism, it would be:
hands, faces,
screaming faces,
bricks, brick patterns,
televisions,
these are things that you can kind of put a twist on.
Everyone wants a girl head for a tattoo.
They make great tattoos,
but to make it surrealist,
maybe I use two girl heads inside of itself.
(upbeat music)
- With the tattoos I'm creating,
I'm trying to represent that mindset when you enter,
you know, into like a REM sleep, or that dream-like state.
Those walls start to break down
and your subconscious comes to the forefront.
- I definitely hope that people relate to my tattoos,
'cause I'm creating these out of my imagination.
What they mean, I don't really know,
but usually there's someone
somewhere that can say, "Oh, I love that image!"
and then, there's a communication there,
so now you're communicating through images.
- We don't really think when we create.
It's just this part of the brain that creates right away.
I just let my subconscious speak for me,
like, "What would happen if gravity changes right now?
"What would I be doing?
"What if I put it into art,
"maybe it'll be a way of people taking
"a different perspective on classic object."
(upbeat music)
- I think that color use in surrealist tattooing
is important because with colors,
you can evoke different feelings in people,
but with the colors, that's when you don't necessarily
get a psychedelic look, would you get more of a dreamy look,
would you get more of these different realms of thought
that people go into, because color always evokes thought.
- Instead of just putting colors everywhere,
I wanna have like small, little contained areas,
where there's a lot of really bright color,
almost in like a rainbow spectrum
and then I'll kind of frame it out with heavy black.
- What I want to bring with my colors is sort of a feeling,
so I would use a lot of purples and teals together.
Purple is spooky, teal is more like of a calm color,
so what if I blend the two of them,
it gives sort of a feeling to the viewer,
and then you add a lot of black to it.
The display of those two colors tells a story.
I tattoo some people and they start crying after the tattoo
because they've rarely seen those colors work together.
(upbeat music)
- Think that surrealist tattoos are gonna continue
to evolve and go places and be popular
because people's acceptance of what a tattoo is,
is becoming way more broad.
You know, people wanna see different things and as artists
are creating more tattoo flash that look different,
more people want to try that out and get that tattoo.
- [Jesse] Think the reaction I'm hoping for
when people look at my tattoos is the initial wow factor,
and then maybe have some memories
of being somewhere that brings them to that place.
- In terms of my own art,
I just kind of want it to keep evolving.
I want the style to keep solidifying,
and that's what gets me up every morning.
Like, "I have five ideas that have to get done right now."
- Surrealism tattooing is such a new thing,
people tend to bash on it a lot, people tend to say,
"Okay, it's not the proper way of doing things
"because you guys should put outlines everywhere,
"you guys should put this and do this and that."
and we've been told what to do our all lives,
and we just don't want to be part of a movement,
we want to be the movement.
We wanna be our own selves and just be able to create
something without really having to be told what to do.
(upbeat music)
-------------------------------------------
Accelerating Digital Showreel 2018 - Duration: 18:32.
This is our digital strategy over the next few minutes we will set out what we
mean by digital and why it is important our journey so far, our vision and
strategy the delivery principles we will follow and how we intend to keep it live.
The NIHR improves the health and wealth of the nation through research
with stakeholders from industry, charities and patients and the public we
fund high quality research to improve health, train and support health
researches and provide world-class research facilities. Digital enables this
work increasing value for our stakeholders and enhancing their
experience of research. Digital includes smart phones, social media, cloud
computing, data analytics and a range of emerging technologies. We use digital in
our daily lives and in health and care. Digital is having a growing impact in
providing personalized care we are already funding research to understand
the ways digital will improve research approaches. Stakeholders expect high
quality services that work well for everyone.
Digital will also enable us to respond rapidly to the changing needs in health
and care. Work to date is the basis for
collaboration, shared systems and data standards across the NIHR. Now we want
to be more ambitious focusing on the needs of the wider research community.
Digital will mean that we can be more and more patient centered, do research
better by making it easier to be involved, make a clearer offer to the
life sciences industry, develop future clinical researchers, do our business
more efficiently as one single system. The strategy will deliver five new
digital services.
1. A platform to debate and shape research including new ways
for patients to influence the research pathway.
2. A digital experience for
patients in the public, which makes it easier to be involved.
3.An end to end digital service to streamline processes for researchers and life sciences.
4. A platform to attract and develop research professionals.
5. Data donor services so that participants consent and control the use of their data.
our approach puts patients at the center, ensures real collaboration and builds on
tech that is already available. Learning from others to apply we will review the
strategy regularly to ensure we are performing, are ambitious and responding
to changes in health and care we will challenge our assumptions and look for
lessons from others. Initially we will use a small number of projects to prove
concepts, demonstrate capability and plan a full program from April 2018. We will
look for clear benefits and key performance indicators will be
identified monitored and realized.
Hi I'm Will Crocombe I was information systems leader at a large clinical trials
unit in the UK for many years and I'm helping the NIHR with their springboard and
electronic data capture. Electronic data capture is how we get data basically
out of clinical settings and to the researchers that need it to do the
analysis of the research. So currently the problem with Electronic data capture is
that there is something like 50 clinical trials units each with individual
systems, which is obviously not efficient in terms of resource. It's not efficient
either in terms of those people are using those multiple systems and having
to log into them at the research site and that also has a major impact on what
the NIHR do. So I'm Jonathan Sheffield and I'm the Chief Executive and I'm
particularly passionate about this project because what we see when we
look out there in the Clinical Research Network are Clinical Research Nurses and
Data Managers who struggle from system to system and don't have a consistent
approach the way that they collect data. I see this as a way forward for us to
take research and the data capture involved in research into the 21st
century using modern digital platforms. So you might imagine if there was a
single platform organized by the NIHR this would reduce the burden on the clinical
trial units in terms of provisioning and maintaining these systems but also
significantly reduce the burden on the research staff at sites again having
that single logging and familiarity in the particular system. Once the digital
platform is in place we'll be able to introduce data standards of common data
tools which is also further enhanced ability to do research and reduce a
resource impact. The impact for me on this will also take forward how we
interact with the MHRA and other regulatory bodies they'd see that we
have standard procedures, standard operating procedures and hopefully that
would reduce the regulatory burden that we have to deal with in a day to day
basis in the involvement of clinical trials and if we actually
achieve that we'd start to see that we have a platform that would make the UK
the place to go to to conduct life sciences research. I think that's
absolutely the case certainly clinical trials units have a large burden in
terms of the regulatory aspects of clinical trials and you have to ask the
question is whether a clinical trials unit is an organization that should be
building infrastructure research or doing the research itself
and I think the latter is the case. So hopefully this project will deliver
over the next three months, we'll be out there talking to clinical
trials units directors and their staff about what they see the advantage and
disadvantages of this step forward and we'll also be talking out there to
people out in the field who do the day-to-day data collection, but the whole
purpose of this whole program is to try to make research in the national health
and social care environments easier, safer, quicker and more efficient to
deliver. I quite agree and I think it's entirely possible I'm very much looking
forward to talking to members of the research community of all sorts about
how we can put this together. So thank you very much your time we look forward
to meeting you and discussing this interesting project in the future.
Thank you.
It's our belief that the app is going to fundamentally change the way we work
with patients and the way we can communicate with patients and we think
it's really a 21st century approach to improving research, as you'll remember
this really came about because the NIHR does not have a way of saying
thank you to patients on a national and systematic basis. Yeah and I think we
underestimate the power of the same thank you
it research these days we still don't have researchers thanking patients and the
families for taking part in research and it's just a really small gesture but
can really make a huge difference to the way that people perceive the research
and also how they participate in research in the future as well as
getting involved in shaping research for the future as well. That's really
helpful and I think your involvement in patient involvement has really changed
the way we've done this particular project and for me is fundamental too
it. It would be so difficult to have this level of patient involvement with our
traditional approach if we wanted to say thank you we'd have to you know design a
database we'd have to manage it we'd have to
update it and then we'd have to mailshot using that. It would be very expensive it
would be very slow, probably always be out of date and big information
governance issues and frankly I guess the return from that would be pretty
poor. So at the end of the day for me at best that's 20th century with the app
we've got a 21st century approach which would really reach across the whole
country and bring us much more diversity do it in real time and through its
ongoing connection and consent processing we can have in it we would be
able to manage all the information governance and the necessary content
management system. So it really for me is the necessary step forward. I couldn't
agree more William I think we know we're missing out on so many opportunities
with regards to research for patients and
members of the public we're really not engaging properly with patients because
we need to make research truly accessible to everybody and I think
through an app which can be readily available wherever people are. I think
it will really make a significant difference to the way that we do
research, like you said really from prioritization of the research questions
and ideas through to planning research, finding where we can take part in
research and really get people excited by research. Because as a patient myself
I've witnessed first hand the power of research, not only just on my health but
my confidence and also on the skills and opportunities I've received. As you
know last week we agreed a preferred supplier Tiger spike they've got a great
team and a portfolio of products right across the world from Australia through
to healthcare and and various major corporations and they're very committed
to improving the way people work and play indeed through technology, so our
mission statements are pretty similar on this they're in development and we hope
that we will have user testing of the product in February and it will be
available for release on the App Store by the end of March. I think this is a
start of something quite unique and it may seem different, it may seem something
that we've not done before but I think we have to take that step here in the
70th year of the NHS to transform our healthcare system to one that really
meets the current needs of patients and families in the UK.
Hello my name's Mark Porcheret I'm the Clinical Lead for Primary Care in the West
Midlands and this little video is to introduce you to some work that we're
bringing to the showcase. Some work that's been done by the National primary
care specialty group and this is about how to better coordinate the use of I.T.
in general practice it's specifically about how to better use GP computer
systems such as Eavis vision system one to identify and recruit patients into
studies we can develop searches using the coded data in the databases and we
can develop little pop-ups and come back through the consultation alerting GP's
about a study and this work has been carried on over the years in a rather
piecemeal way with some networks doing a lot and some very very little and when
you have national studies it's important that we try to get this better
coordinated. So you don't have the searches being developed
perhaps in different ways across England. So the work of the national group is to
develop a system to coordinate this so that one LCRN leads on this with the
research team and develops quality assurances for research and then we have a
system to disseminate that search out to other LCRN's that that want to
want to deliver the study locally and then eventually down to practices this
is very much work in progress. We are developing a Google site to
coordinate this and we're having discussions with system providers such
as EMIS and System One as to how to use their systems to disseminate our
practices so please do come along and see us at our store.
Hi my name is David and I work with Kelly Hollier we are going to present the
Across system at the Leeds Accelerating Digital conference. Across is a one-stop shop for accessing
support from healthcare professionals such as Nurses and other Allied Healthcare professionals in the delivery of research research protocols.
It is a capacity management tool that enables us to predict how we are meeting our
targets and how we are supporting research over a six to twelve month cycle. It is a
tool that attempts to deliver equal opportunities of access to our partner
organizations and attempts to give a rapid response as to whether we can or we can't
offer support on that particular study. It enables us to use a transparent
access to service and to understand where we are and in some cases why we are
not able to support certain research projects. It also enables us to
record which research we support across a geographical area. That's us
come and see us if you have any more questions. We will be at the accelerated digital event in Leeds.
hello I'm Kaatje Lomme I'm the CRN Business Change Manager based at the
coordinating center offices in London. At the accelerating digital event I
will be representing the single research intelligence system so all the work that
relates to the CPMS / LPM integration and much more so if you would like to find out
come and have a chat with me and we can discuss everything about it.
Hello my name is Stephen Lock I'm head of business intelligence at the NIHR CRN
Coordinating Center and unfortunately I'm unable to come to the accelerating
digital showcase day this year. Which is a shame for me as last year's
event was amazing and I had the opportunity to present, but this year one
of my colleagues Rory McHugh whose Information Manager at
the coordinating center, got something really exciting to show
everybody and it's based on some work we've been developing over the last year
using a tool called geo analytics which enables us to report activity and
other things such as prevelance and incidence of disease using real
interactive maps so please you can zoom into a region where
you have an interest and see how much activity's been going on there or what
the prevalence or incidence of disease might be. We've got a real potential
for us to do some interesting stuff particularly around public health
research and so on. Rory'will show that to you all and and hopefully
gather lots of ideas from you too. So it's going to be exciting in there
hope you enjoy it
stroke Samba license to the recess ETA eight minute
let's review the image in this case we need to be as quick as possible.
I need to make a decision to thrombalise this patient or not, do you have the
criteria for whatever study you think the patient might be eligible for. Okay
so I'm thinking we should be looking at extending the
timeframe on the license. so let me just have a look here. Of all the studies that we have that's the
best one there's so many it's hard to keep track of them. Yes this is the best one.
Excellent, excellent.
So the criteria is that
we would need a PWI and DWI ratio of 1.2 or more. It's about 1.7 to me this
patient is eligible based on that. So in general we have quite a wide range of
studies that we run here and it means that we require quite extensive amount
of paperwork that will have to carry around with us when we have to refer to
informational inclusion into the trial so instead of carrying loads of
clipboards and big files it's better just to have everything on your mobile
phone and you can access it anywhere in the hospital
That is a score of 12 okay so we need a range between 4 and 26.
So it looks like you're having a stroke unfortunately, because of the time frame
that were looking at for Thrombolysis you've missed the four and a half hour mark for
Thrombolysis, but we have a study that we're running here that looks at the
thrombalysing people out of hours, is something you might be interested in.
Yes
-------------------------------------------
Chris Philp - Westminister Hall - Getting digital companies to pay a fair amount of tax - Duration: 9:15.
Chris Philp Well thank you Dame Cheryl for that very carefully considered
selection I'm glad I was the least worst alternative. [INAUDIBLE] I'm sorry that more
attractive alternative didn't present itself but it is of course an enormous
pleasure to serve under your chairmanship and I would like to add my
congratulations to the Honourable Member for Harborough for securing this debate
well Dame Cheryl I must confess. I'm not sure I ought to confess this in public but I will, I must confess when
this document corporate tax and the digital economy position paper update
arrived in my inbox in March of this year this month I quivered with
excitement because this is such an important topic and I'm delighted to
see the government and in particular the financial secretary to the Treasury who
I gather has been upgraded to be the paymaster general as well to both
there we are, he's a man of many talents I was delighted to see the financial secretary
taking the initiative in this very important area it is worth saying that
significant progress has been made in the last eight years some colleagues
have mentioned that already the tax gap of course in this country at just 6% has
gone down from the 8% it was in 2010 and it's the lowest amongst OECD countries
so that's a very good thing and the amount of corporation tax we've
collected has gone up from around about 35 billion to around about 55 billion in
the last eight years despite the fact the rate at which the tax is levied as
my honourable friend the member for Northeast Hampshire has mentioned has in
fact gone down so that is all extremely welcome and the government is to be
warmly commended for that progress however I think it is also true and this
is a view that commands widespread support that a number of companies
typically large multinational companies often providing digital services like
Google and Facebook have succeeded in organising their affairs fully in
conformity with the current international tax laws such that they
are managing to argue that the substance of their economic activity takes place
in very low tax jurisdictions often in the Caribbean which they have selected I
suspect not for their clement climate and that strikes me as fundamentally
unfair and unreasonable now the government has already taken a lead in
this area via the base erosion and profit shifting initiative, things
like limiting the deductibility of interest expense to 30% of Ebitda
is something that the UK government LED on and is to be strongly congratulated
for but I think there is scope to go significantly further it just doesn't
seem right or fair that a company like Google that has revenues in relation to
UK customers in the order of 4 billion pounds pays virtually no tax by
successfully arguing that the substance of their economic activity lies
elsewhere and that is why I was so excited Dame Cheryl by this
position paper update published a few weeks ago. Now the approach laid out in
that excellent position paper which by the way I fully support, to take a
multilateral approach trying to define or redefine on an international basis
economic activity to account for the value created by users I think is
exactly the right thing to do and I hope we're successful in doing that but of
course as with any multilateral enterprise it is going to take a certain
amount of time I expect to get agreement with many other countries particularly
when some of these companies we're talking about will use their influence
to try and slow things down and stymie progress so while the multilateral
approach to changing the way we define economic activity it's certainly the
right thing to do I think it's also important we have a plan B that can be
implemented much more quickly and this paper does that admirably it talks about
attacks on sales and as honorable members have said already that is
something the European Union are looking at I fully support that
and the sort of threshold we talked about to exclude small and even
medium-sized companies is the right thing to do the number I heard mentioned
3% of sales seems like a reasonable number I would
simply make one point and this is more for the 27 European countries rather
than for us I would take care to make sure that the European Union doesn't use
this as a pretext for retaining those those tax receipts itself and to sort of
develop for the first time a European Union Treasury function that is not
something which I think will concern us but it may concern the other 27 members
now if the European Union don't move quickly enough in this area if they
don't implement the sales tax in a timely fashion by timely I would hope
the next sort of 12 to 24 months I would advocate the UK taking unilateral action
in this area now my Right Honourable friend the member for Northeast Hampshire
raised a cautionary point about not making the UK uncompetitive but of
course this wouldn't be a tax based on where a company is domiciled it would be
a tax based on where its sales occur and where its users are so it wouldn't be
any disincentive to locating in the United Kingdom in terms of permanent
establishment or in terms of locus of incorporation so I think a sales tax or
indeed a user tax which I'll come on to wouldn't violate the principle of
competitiveness which the Honourable Member for North East Hampshire quite
rightly referred to we are generally speaking the second largest market in
the world for these companies behind the United States of America and we're
significantly larger than Germany because our economy tends to be
rather more intensively digital so I don't think if you were to unilaturally
take action in this area I don't think you'd find Google or
Facebook would suddenly say we refuse to do business in the United Kingdom
because if they did they would be pulling out of their second largest
global market now in relation to unilateral action while we're
members of the European Union and I would suspect also during the transition
period that is to say up to December 2020 I would suspect unilateral action
on a sales tax would fall foul of European
laws it would probably get classed as VAT or sufficiently similar to VAT
that it would fall foul of those regulations so if we do have to consider
unilateral action which I would advocate and support prior to our exit from
European Union or prior to the end of the transition period something other
than a sales tax would have to be considered and I think one area that we
might consider which would not fall foul of European Union regulation around
sales taxes and VATs would be a tax based on users you might
for example set a user based tax a certain pound amount per active user
again only apply to the very largest companies perhaps with the UK turnover
in excess of 100 million pounds and that would be a way of making sure they did
make some reasonable contribution before we managed to come up with a
multilateral solution either at the global level or a sales tax at the
European level that would I think be a be a good move it wouldn't undermine our
competitiveness and it would ensure these companies are seen to make a fair
contribution and I think the proceeds generated from such a tax could be
usefully applied in the area of business rates which a number of colleagues have
referred to I'm sure small businesses in our
constituencies have all raised the issue of business rates with us
of course these digital companies like Google or Facebook even Amazon because
they operate from very large warehouses in sort of remote locations that don't
have a very high rateable value all of these companies pay very little in by
way of business rates we know they pay very little by way of corporation tax
they do of course pay payroll taxes they pay their full full share of payroll
taxes but they don't pay much more of corporation tax or business rates and it
is rather inherently unfair and that our local high street businesses do pay
their full share of business rates and corporation taxes so some of the money
raised via this digital tax in whatever form it takes could be applied to offer
business rate relief excuse me particularly to smaller
businesses perhaps below twenty eight thousand pounds per year of ratable
value well Dame Cheryl I've laid out one or two ideas I'd be interested
to hear the Financial Secretary's response to those but really I want to
put on record my extremely strong and enthusiastic support for the course that
the financial secretary has laid out here and it's a great pleasure to come
here and support it this afternoon
-------------------------------------------
Morning Star - Extra Large - Infrared + Convection Countertop Digital Toaster Oven, Stainless Steel - Duration: 0:45.
Morning Star - Extra Large - Infrared (No Preheat Needed) + Convection Countertop Digital Toaster Oven, Stainless Steel, XL 21"x13"x13.5" exterior, 12-slice
Coverage for product breakdowns and malfunctions. Free shipping on all repairs with no deductibles or hidden fees. Fully transferable with gifts. Cancel anytime, full refund in the first 30 days.
If you purchase this service plan and eligible product for this service plan, you acknowledge that Amazon may send the service plan seller relevant product and price information for the purpose of administering the plan.
-------------------------------------------
Hampton City Schools - The Digital Bridge - March 27, 2018 - Duration: 3:31.
(upbeat techno music)
- Hello, and welcome to the Digital Bridge.
I'm Paul Lawrence, Director of Information Literacy
for Hampton City Schools.
This morning we're at Spratley Gifted Center
in their digital studio to visit with the production team
behind the Spratley Seahawk Morning Squawk.
- [Girl] The camera goes here.
- And the mic.
- And the charger goes here.
- All of our important dates and thought for the day,
and then there's our... - And our list of people.
- [Boy] Three, two, one.
- Good morning, and welcome to the Seahawk Morning Squawk.
This is Madison Nugen with Summer Neil.
- Many students will see the morning announcements
and ask if they can be a part of it.
They see us on their computer screen in the mornings
and I really think that they feel
we're representatives of the school.
- It's fun.
When I first started doing it in 6th grade,
it was kind of scary, 'cause I was scared to mess up,
but now if I mess up, I'm just like, it's okay.
No one will remember.
- One thing about the announcements is
it sets the tone for the day.
Part of our culture is to have quite a deal
of extracurricular activities,
and by having the announcements
and having our kids produce those,
the kids are the ones that do the work on the announcements
under the supervision of Mrs. Wilson,
it shows our students what we have to offer
outside of school and the ways that we can challenge them
beyond the classroom.
- Right now, I run down to the elementary classrooms
and get the thought for the day.
- We really focus on presenting and performing
in a technology format.
So we do podcasts, we do films, we storyboard,
we learn how to give proactive feedback and critique.
- I've learned kind of how more to work with people
and actually get along with them
even if I don't want to (laughs)
'cause I'm kind of bad at that.
So that's kind of helped me with groups.
- I love it. I've been doing it since 6th grade,
and I just enjoy it so much.
My favorite part about it is getting to hang out
with my friends in the morning
and you know, talking, joking around, you know.
Then I get to announce and it's really fun.
So one day I'll do computer
and the other day I'll announce
but usually everybody does everything on the announcements
so we all get to spread out
and have an equal chance to do everything.
- I like working with my peers,
and I think it's a good experience.
It's gotten me out of my bubble,
because last year I was really shy
and I used to do merits and I was really shy about that
so I gave that to one of my friends.
And this year I've really come out of my bubble
and that's been a huge accomplishment for me
and I've really appreciated that.
- Be definitely be serious and try to do your best always
and always encourage others to try their best
and not to just think they can't do it
just actually try and see.
- The students on this production team
learn about a lot of things here in the digital studio.
They learn about the technology that they need
to run the production.
They learn about working in front of
and behind the camera,
and they learn about teamwork.
Thank you for watching The Digital Bridge.
(upbeat techno music)
-------------------------------------------
Digital Marketing Workshop Highlights Areva Digital - Duration: 1:38.
For more infomation >> Digital Marketing Workshop Highlights Areva Digital - Duration: 1:38. -------------------------------------------
MeRIT Webinar: Digital Self Defense - Tips, Tools, and Best Practices to Stay Safe Online - Duration: 53:03.
>> CINDY SOBIERAJ: Today's webinar is titled: Digital Self Defense: Tips, Tools, and Best
Practices to Stay Safe Online. Our presenter is Ben Woelk, president and manager of the
security management at RIT, where he developed a leading security awareness program.
Ben is a member and former co-chair of the EDUCAUSE security awareness and training working
group of the higher education information security council. He's also former director
and community affairs I'm sorry. Former director and community affairs committee chair for
the society for technical communication and a current scholarship committee chair.
Ben is a certified information systems security professional. A certified professional technical
communicator accredited trainer and an iTIL, Version 3 certified.
He holds degrees from the University of Florida, Trinity International University and the University
of Rochester and an enhanced certificate in technical information design from RIT.
Ben is also adjunct faculty at RIT, teaching classroom and online courses computing security
fundamentals and technical communication. Prior to joining RIT, Ben provided technical
communication and change management consulting to number of area Fortune 500 companies. His
current interests include working with other security awareness practitioners to develop
effective security awareness programs and providing mentoring and coaching to new and
aspiring introverted leaders and speaking of presenting workshops on introverted leadership
creating security awareness programs and technical communication.
Thank you for joining us today, Ben. This is your second time back with us, and we're
thrilled to have. Let's get going. >> BEN: Okay, thanks, Cindy, and thanks everybody
for joining us today. It's a rather daunting introduction but we'll move past that.
Today we're going to talk about digital self defense and digital self defense is what we
branded our security awareness program here at RIT, and this is a slight variation to
in person class we provide to staff five or 6 times a year. We'll save the questions at
this time end but we'll have a couple of times of interactivity through the presentation.
So we're going to start with a cartoon, I'll read it for you but it has data security as
the announcement of what the event is. And in this corner, we have firewalls encryption,
antivirus software, et cetera, and in the corner, we have Dave.
I apologize to the Daves that may be on the call.
In general, what this cartoon is telling us that it doesn't really seem to what technical
concerns we have in PlayStation or what we do to protect other people or even ourselves
'cause we always manage to make a mistake at some point or another, and we're also faced
typical human adversaries and they are very creative and they will find new ways to attack
us as well. So I'm going to postulate that you are all
are targets, every single one of us. When you take a minute to enter your ideas into
the chat about why you think you personally might be a target and we'll share some of
those ideas. >> BEN: So we're getting a good variety of
responses. A lot of it, honestly, just comes down to the fact that we're online and we're
vulnerable and that we do a lot of shopping and other types of things where we where it
may put our identity on the risk. This is a word cloud. It's not one I put together.
So when people ask me about specific things in there, like "bogies," I don't really
have what they meant by that but the idea here is to give you an idea of all the possibilities
why you might be attacked and why, again again, why you're a target again.
So basically it doesn't matter if you have a million dollars in your bank account it
doesn't if you have $1,000 or less in your bank account you're still going to be targeted
by online scams of some kind or other because they have good return on their investment.
So another thing to enter in the chat here this is prefacing a little bit of research
I'll have that going to share in one slide and it's not a bunch of research but Google
did some research a couple of years ago they published, I think, in the summer of 2015
they interviewed security experts who had ideas of what people should do to stay on
safe online, but they also interviewed normal people and for the we'll is normal and the
question I have for you all, what would you tell someone to do to Stay Safe Online? What
are the biggest things they need to do. And, again, you can enter your recommendations
into the chat on that as well. >> BEN: And there are really no wrong answers
with this but again I haven't seen what y'all have been putting in the chat yet.
>> BEN: So it looks like most of what we've got up here so far has to do with passwords
and what they call authentication. However, the lasting one keeping your operating system
and B I/OS up to date and this is the second time I've presented in the last 3 years since
that research essence come out where anybody has actually come up with that answer so congratulations
on that from the security expert's view that's the thing you need to do. To install your
software updates. My computer security says never give that
as one of the things you should Stay Safe Online so given the if you plan to be experts
on this and normal people don't normally answer this question this way tells us there's a
real gap in communicating what people really need to do to Stay Safe Online.
Now, the reason that it's so important to install software updates is because what will
typically happen is that someone will discover a vulnerability or a way to exploit or break
into a program I mean, they're all building millions of lines of code and all it takes
is a little error or something that when the excuse me, when the program was developed
wasn't a problem that could be now. So what happens with the software updates is the vendors,
whether it's Adobe or Microsoft or something else, they release these patches or software
updates and this addresses those holes or vulnerabilities or weaknesses, and they said
that's really the most important thing to do.
Now, looking at the rest of the list you can see on the nonexperts top online safety practices
which we're assuming here. You think intestine software virus is on the list and other things
primarily about a couple of them are about passwords. There's about one only visiting
websites they know that makes for a very small internet and maybe safe but I think it kind
of ruins the experience, and to not share personal information which makes perfect sense.
(Coughing.) >> BEN: On the right side, the security experts
top online security practices most of those are around passwords or around passwords of
some type and we'll talk about these things and the other is install software updates
but what's interesting is that the using antivirus software is not on that list of the top 5
things that the experts think you should do, and we still have a requirement for doing
that at RIT and you should still have it, but I think part of the issue here is that
people may assume that having antivirus software protects them completely, while on a typical
day it might recognize maybe 65% or 85% of the different threats out there so it doesn't
really provide the level of protection that we might expect.
There was a really interesting survey and the results came in kind of surprisingly.
So in terms of protecting your computer and information the links on this slide are are
two resources here at RIT and what the information security office has provided. And we're going
to cover a couple of these things during this presentation today but a good part we're not
going to do but this is more information about things that you need to think about. Policy
and standards are things that you will probably run into in your workplace where you have
requirements about what you need to do in terms of using whatever the computing structure
that you have there. I have another cartoon, and some of you have
probably seen this but we're going to take a minute on this one and give you all time
to read through it. It's pretty dense. I think you can probably read it unless you're viewing
off a mobile device. But let's take a minute and then we're going to talk about what this
cartoon means. >> BEN: Like I said, a very long cartoon.
It gets a little confusing because they talk of bits of entropy, and that gets into complexity
and I'll talk about that in a minute but it's not something that you really need to be aware
of that part of that. What they're showing it here is the way security
experts have told people they need to construct passwords in the last 15 or 20 years is wrong.
They told us they need to be very complex now, troubadour and 3 is not completely because
the idea is they made us put together passwords so they're hard for humans to remember. And
because of that, we end up using the same password over and over again and make a slight
variation maybe it would be Troub4dor & 3 & 4, and people will save it on their desktops
and an Excel file and what happens you got a very limited amount of the passwords our
using something to remember those passwords by which isn't secure.
What's interesting correct horse battery staple which are four common English words -- if
you make it together, it makes a really strong password. I wouldn't use correct horse battery
staple because it's been out for a while and I'll tell you why it's really good news that
this cartoon is talking about. There's a password staple but what this kind
of does kind of measure how strong is to break based on its complexity. Now, it's a little
confusing because you could put in the word password and it would say it would take how
many things to break it something very simple so it's really only looking at things in terms
of complex not use of common passwords so if you look at the screen you can see it's
got this brute force search space analysis and you'll see that change as we go through
the example, but down at the bottom you're going to see time required to exhaustively
search this password space and that means how long to break the password and they've
got a couple of scenarios whether it's one computer online attacking you or it's somebody
has actually gotten access to your computer directly and then they've got this massive
crack erase and massive computers and they have a botnet all trying to break that password.
So let's see this haSAK.com shows us here. So 6 letter passwords, very basic password.
It's all lower case. Now, if you look at it, you'll see in that search space analysis it
says it has 6 characters and the search space is 26 because there's 26 different characters
in our alphabet. But the more important thing is when you go and look how long it takes
to break the thing if you look especially at the second tubing I think they're probably
more relevant your offline fast attacks scenario is.00321 seconds. So much faster than I was
even able to talk about it. So that's with 6 letters. So what we're going to do now we're
going to increase the complexity a little bit. And we're going to do that by adding
a number on substituting a number for the 0 because I want to keep it the same lengths
right now. So what you see the search space depth you've got 26 letters and 10 different
numerical characters to be removed and there's a lot of things for cracking tool to search
through and we've updated it to .0224 seconds so we're like 7 times more secure than we
were the first one but, obviously, not very helpful. At all. So what else could we do
to make this password stronger? You can see that we've got the lower case is checked,
the digit is checked and we'll add a symbol and make one of the letters upper case and
let's see what it does. Changing one letter to upper case all of a sudden, we're at .577
seconds. Still not good but much, much stronger than we were before. And if I make one of
these letters a symbol, all of a sudden, we're at 7.43 seconds. So it's far more far stronger
than the password was that we talked about initially. It's still not going to do it.
Obviously, you know, a 6 character password if they've got access to your computer it's
going to take 7 seconds, roughly, to break it. And hardly any time at all they've got
multiple computers that are trying to break into it.
So we're going to talk about what we can do to make it stronger. I've done all the complexity
things. We've got the upper case and the lower case and the digits and the symbols but what
I want to start doing now I want to make it a little bit longer. So right now it's at
6 so we're going to go to 8. And let's move that to 18.62 hours for the offline fast attack
or 1 minute with a massive cracking erase scenario which sounds really exciting in theory.
We're going to go to 10 characters. Now, it's gone to 19.24 years for the offline fast attack
and a week on the massive crack erase scenario. Let's go to 12 characters and see what has?
So by the time you get to 12 characters even in this massive cracking erase scenario they're
at 1.74 centuries to break that password so not something we have to worry about and 1.74,000
centuries in terms of the offline fast attack scenario where somebody has got access to
your computer. So what this really tells us in I'll talk about it in a little bit more
is that complexity was really important but where we saw the biggest games and a strong
password was by making it longer. Now, if I tell people oh, you're going to be perfectly
safe which I'll never say but if you'll be safer using a 201character password you got
to be out of your mind I'm not doing every 20 character password I know I'm supposed
to have a different one for each one but that's just way too much trouble so let's talk about
some of the options here. Let's talk about something called a pass phrase. Now, the text
I have it was a dark and stormy night which should be familiar to many of. That comes
from a couple of places. One if you're a peanuts fan there's a cartoon Snoopy's on top of the
dog house, typing out: It was a dark and stormy night. It's actually Bluwer Lytton fiction.
It's by a late Eighteenth Century Englishman named Bluwer Lytton, and he put together a
one sentence introduction to a novel, which I'm not reproducing here but it went on and
on and on, and it's really regarded as the worse introduction to a novel in British history.
So, of course, what they did they made a contest and every year they have a contest where someone
submits the worse possible opening to a novel and they kind of rate it and score it and
whoever wins the trophy has got the worse introduction fun fact but, obviously, not
critical to what we're doing. So I'm going to use it with a dark and stormy
night for my pass phrase and I'm going to turn it into something that's actually useable
and would work for us in the computer age here. I need to increase the complexity. We've
got one upper case and all lower case letters so I'm going to change it to it was a dark215&StormyNight
and it gives us special characters and it gives us all of those different elements that
we need. Now, what's interesting is that as you've
seen looking at the previous example with the haystack thing that length is really far
more important than complexity when you're constructing passwords.
So looking at this pass phrase in that calculator, even with a magnification cracking scenario
it's at 89.14 trillion, trillion centuries to break that password. So I think we aren't
going to worry about that one too much. So that's great. Now all you have to do is have
a 25-character pass phrase for every account how hard is that going to be. That's not going
to a very good thing. So we're going to talk about something called
a password manager, and I'm going to jump because I've got a poll question here basically
ask do you use a password manager? And I would like you to complete the poll while I'm talking
about it here, but what a password manager does it manages your passwords so the examples
we have up there KeePass, Password Gorilla, LastPass are all examples of different password
management tools, and the way they work and I used LastPass about 10 years now. The way
they work is you construct this really good pass phrase kind of as your key to your Vault
where you're saving all these other passwords and it will save all the passwords for you
for all the websites that you go to. It will create complex passwords which are going to
be long passwords which have all the complexity that we know that we're supposed to have and
we'll basically provide a way for you to have a password manager on your desktop or with
your browser and be able to have a different password for pretty much every single account
you have online which is the ideal thing because you don't want to use your banking password
for your social media account because if somebody breaks it or tricks you into giving it up,
they're going to have access to your bank account.
So how did we do on the poll here? Do we have any responses yet?
>> CINDY: I'm opening it now. >> BEN: It looks like we've got a very small
percentage of users that are currently using the password managers and nobody said not
sure which is probably a good answer. (Laugh.)
>> BEN: But it's something that I haven't seen a lot of people do somebody told me about
it. They said it's really going to revolutionize the way you use the internet because now you
can have all of these different passwords. And, of course, the big question that comes
up how do I know my passwords are safe doing something like this? Because, obviously, if
you use something like LastPass -- it's a vault that's online and
it's storing millions and millions of different passwords so it's going to be a big target
so what happens with this is that the passwords are stored in an encrypted format. It's a
strong encryption and, yes, there's always a risk with information security. I will never
tell somebody you're going to be 100% secure. We just can't ever say that, but what the
tradeoff has been that I've seen is this helps you use more passwords, which we know is strong
which we know is a good practice. It's stronger to do and you've got some risk in terms of
passwords being exposed but it hasn't happened so far. I mean, lots of people are trying
to get into it and it's the kind of thing if it does happen, you're going to get a notification
and you'll have to change some passwords but again in terms of your working life it's a
lot easier to do this. So I have no stake in these password manager companies but I
do recommend one that you take one of them at least.
And the next thing I want to talk about is something called Multi Factor Authentication.
Now, I think the Google search might have called this two factor authentication. I don't
know, but Multi Factor Authentication. And some of you may recognize some of the pictures
on the slide. But Multi Factor Authentication is normally when you go online you have to
indicate who you are and something that indicates your secret passwords so that you can get
in. So that's they only call it one factor and only using one thing to prove who you
are. With Multi Factor you have something else so you have this password you know and
you have something else which is used to log in.
Now, with things like the Google Authenticator, which is the G in Duo, these are online these
are actually apps for your smart phone and mobile device and they work in conjunction
with the site that you're trying to log into so make sure when you log in to a specific
website and for RIT we've protected our Oracle information or my info site for those of you
who have been at RIT and to log into that now you have to have your user name and your
password and you have to interact with Duo and it's very simple because you basically
on the screen you're logging in and it says Duo, send me a push or Duo call my L.A.N.
line and you've got a smart phone and it buzzes and you say, yes, and you get to log right
in. Some of the other examples in here there's a YubiKey, which is a way of storing passwords
credentials that you use to log into a cower there's an RSASecurID and I had one 20 years
ago when I was doing consulting and that number would change every minute and you would have
to enter that number every time you logged in.
The other thing on the slide, Turn It On, that gives instructions for about 100 different
websites in terms of turning on two factor authentication, and it's probably the best
way to protect yourself. Again, security usually makes things a little
harder to do but it's always that tradeoff between your protection and things being a
bit harder. So my next question take a minute here into
the chat, what do you think the most common way is of getting a password. What are your
ideas on that? I'm going to answer Christina's question right now because we're in the space
right now. In terms of passwords, personally I use last
price and that has troubled in price over the last year. It's $24 a year for using it
on your computer and unlimited mobile devices so you're talking $2 a month for the protection.
There's an open source one called KeePass, which I know people who have used it for years.
I'm not really fond of it because it's open source and open source to me means that the
documentation is terrible because it's put together by a group of programmers and they
understand it. But KeePass LastPass, Password Gorilla. There's another one out there that
I'm not remembering right now, but I typically, what I would do I would search Ghoul for password
recommendations and get past the paid ads and look for the ones that may actually do
some review on it, but the important thing is you use one.
So what did we have in terms of common ways of getting passwords? What did people enter
in the chat? You're just asking for it, spoofing spoofing in the sense of pretending that you're
somebody else. Asking for it, address, pet's name or kids' name. Absolutely, people love
to use your pet's name as passwords and they also you have to post pictures of their pet
so it's not real hard to figure out but in general the and the other question that came
up here and I'm trying to read the chat one and talking which is a mistake but the dash
link the one I can't remember the name of it was, and I personally have not looked into
that very much, but the key things you're talking that I'm seeing in here so far they're
trying to fool people into giving up their passwords and that's the far most effective
way to do it there's very little risk to the attacker they want have to be clever or buy
tools to figure it out or break a password like we showed earlier. The easiest thing
is just asking for that password. Now, the nice thing about the Multi Factor
Authentication is that even if you give up that password, because it's requiring that
other piece of information, they don't have actions to it. So your account is still protected.
So that's the really that's why we think it's such an important thing in terms of protecting
account credentials. And the other trick, of course, is people
said spoofing and I'm going to use phisching in terms of people fooling you into giving
up your password. The tricky part is finding out if it's a issue if fishing account, and
if you don't have a PayPal account and you get an email from PayPal, it's obvious it's
not yours. For years it was easy to tell because the grammar would absolutely be terrible and
as long as you're not in too much of a hurry you could tell something was wrong with the
request that had come in. But essentially those kind of problems have been taken care
of because attackers can now buy kits online to do phisching attacks and it takes care
of these nice templates making it easier for you to fool with. So the rule of thumb we
have and I've got the slide out of order. Don't give up your password. No one legitimate
is going to ask you a password send you an email to ask for it. They don't need it to
reset it so just don't do it, so that he gets this slide I have up here the one on fraud
scams and malware gets into the other types of social engineering types of attacks where
they try to trick you into doing things there's been a lot of talk, you know we've all seen
lots of things about the elections lately about Russia attempting to do social engineering
and that has been their practice for many, many years. It's like we've finally woken
up this time. But the big deal is to trick people into doing things or get people to
do things they wouldn't normally do. So the kind of things we see in fraud, scams
and malware malware is malicious software which usually would be an attachment or something.
But we see requests like they came from the president's office asking for a copy of everybody's
W2 Forms. Or can you transfer the $500,000 amount and do a wire transfer quickly. We're
behind we need to get this thing paid and it looks like it's come from the chief financial
officer requesting somebody do that, and it's all where they try to trick people and it's
all different types of attacks. Say I'm a small nonprofit locally we've seen a steady
stream of fake invoices trying to trick our treasurer looking like it comes from the president
and tricking the treasurer into paying something. This is not just directed against long groups,
it's pretty much directed at all of us. The rule of thumb you don't want to take the bait
and don't give up your password and this section we're going to talk now of protecting your
identity and your online safety when you're doing social media and things like that.
So the newer threat we've seen that started probably about 2 years ago and we're seeing
more and more of is something called Ransomware and you can see this is a screen shot and
I think it says you have to pay $300 or 250 or something like that to get your files back.
But the way Ransomware works is that they trick you into installing a piece of software,
malicious software and that software goes and encrypts all the data on your computer,
and the better ones, air quotes around that, if you're connected to a network share or
a portable hard drive, it will also go in and encrypt that information as well. So the
problem is that once it's done it's too late to do anything about it and if you're lucky
maybe you're antivirus detected it before it started maybe you've unplugged your computer
really quickly and it didn't get very far into it. And you still have to figure out
what happened after you plug it back in but the key once you've been attacked it's too
late and you want to see things about the last year or two about the police departments
had their data encrypted and having to pay a large amount of the money. A large health
care system was attacked in the United Kingdom years and I believe to pay a lot of pounds
to get their data unlocked again. So the real issue is how do you protect against something
like this? You have to protect against it ahead of time. You have to back up your data
and we're all Leah about this sort of thing and it's like oh, we know we'll be okay and
we know our hardware might crash sometime but, of course, we're going to get some kind
of warning that it's going to happen which, of course, doesn't happen, and even online
accounts like Dropbox and things like that some of this Ransomware is sophisticated to
reach up into those accounts and encrypt it also. Best rule of thumb with protecting yourself
against Ransomware making sure you have a copy of your data and that means regular backups
and it means not just having a portable hard drive connected to your computer where you
copy files over. You actually need use some kind of a program for it. But so Ransomware
is probably or one of the scariest things come down the line last year.
Now, this point in time I usually pop up this slide and some of my audience I'm sure is
old enough to remember this, but these are the old duck and cover drills where everybody
hid under our seats to protect themselves from atomic bombs which, obviously, wasn't
going to do any good but it made us feel like we were doing something and I got a lot of
people in the audience who look like deer in the headlights and I want to talk about
some of the things you can protect yourself rather than telling you all the bad things
that can happen. Again, the Number 1 thing don't get hooked.
Never respond to email requests or phone calls or text messages or anything health that are
asking for your password. That's an easy one. If we just did that we'd be in great shape.
The other question I've got as we launch into this is I'm assuming most of you have mobile
devices, smart phones or tablets of some kind or other. The question I have for you we have
a question, yes. Is do you have a mobile security app on your phone? If you do, please it's
a poll so please answer the poll. I'm interested to see what the responses are here. 'Cause
I know how it goes when I'm doing this as a live in person.
>> BEN: It's not looking too good for the yes but someone it has. 2 people. So here's
part of the issue we have and all of you know this. Especially if you're an iPhone users
and I don't want to bash Apple on this but Apple has never made but they made things
easier for users and they've given a nice interface. They don't talk about security
very much and iPhones can be attacked and androids can be attacked and pretty much any
of the operating systems that are out there on smart phones and tablets and the things
like that. The list here is kind of a short list like the things like find my iPhone but
some things are actually apps that you can add from your marketplace or your Google Play
Store depending what you're using and they provide additional security. They'll scam
the applications that you're trying to install. They'll make sure they're okay and they'll
tell you if you've got weird permissions you're asking for if they're able to do things more
often than not. Again, I encourage you to research various, you know just do your Google
search of mobile security apps for whatever kind of device you have and see what the recommendations
are. You'll find that will secure things and the reason why this is so important I think
most of us are aware that over the last several years there have been far more smart phones
and iPad things and tablets stolen than regular computers and what it means for the cybercriminal
who's out there trying to trick us and get our money they're going to go after those
mobile devices. That's where people are and that's where they're going to invest their
money. And they're not as easy to protect. One of the questions I typically ask in the
class is how do you tell where a link goes to on a mobile device? And we're not going
to ask it as a question now but what happens is you can't hover your cursor over it like
you would over a computer. You can't really hover your finger over it either, and if you
just touch the link it takes you there. If you find out where it goes you actually have
to push down on the link with your finger and hold it down until it shows you where
it goes. And that is not a good design. Obviously, if you let up on your finger too soon it's
taking you to that link. So this is one of the reasons, I think, that mobile devices
are attacked so much 'cause they're just harder for us to think about defending.
Now, what's interesting is that Google question that came up really easy where the most important
thing to do was to install software updates we do that on our phones. We know we need
to do that on our phones. We get them daily for all these different apps so it's the same
thing with your computers you want to make sure things are kept up to date.
So I'm going to talk about a few other things here about protecting your information. Great
drawing created by a student who worked in our office at one point in time and it's very
it's a good illustration what's out there because something may appear to be a sheep
but it's really a wolf in the background and you cannot tell by what you see online. You
cannot tell. Friend requests hey, great. But who knows what they're really like. It's not
saying criminals can't look great either for that matter.
So my Number 1 rule of thumb we can never assume on privacy whatever we share online
we have to assume at some point it's got to be revealed. We had no control over what happened
with Equifax with them revealing all of those passwords or Yahoo! I think they revealed
2 billion passwords. They had 2 billion passwords. They revealed every account password they've
had and we have very little control but we do have control over the types of information
we share and that really comes into social media. A lot of times you'll sign up for Facebook
or some other social media account and it may ask for your birthday or hometown or ask
you where you went to school. You can provide that information but you need to think about
the types of information it's asking for and makes sure you're comfortable with providing.
But again, even if it says it's secure and private you've got to assume at some point
it will be revealed. The next screen which is probably not readable
is privacy settings that's actually from my Facebook account and what was interesting
about this is when I went down and I looked at who can look me up and the second thing
on there said who can look you up using the phone number you provided and it said everyone.
I never remembered giving Facebook permission to do that. So that must have been a default
setting, and what I recommend is that every few months go into your privacy settings in
these different social media accounts, make sure that nothing has changed and make sure
that they're all settings that you're comfortable with and change them now if they're if you're
not comfortable with them. Do what you can to protect your information.
Now, something they also provide that are good are log in alerts which you can sign
up on the various social media accounts. I was speaking in a conference in New England
in the fall and while I was there I got 6 or 7 messages from Facebook that somebody
was trying to log into my account. And they knew actually, I think they were coming from
Australia of all places, but it alerted me that was happening which was a little discomforting
but also told me I didn't need to change the password but the good news is when you log
into Facebook and let's say you log from out of town you'll get these alerts because you're
not the internet the IP address that you are connecting from and it will let you know.
A couple other tips here use something called Google alert that you can set up. You can
monitor used of your name and put in your email address and anytime that appears online
in this place Google indexes it will give you a report on that. And you can aggregate
it so you can get it maybe once a day and you can use this alert to follow various subjects,
sports teams, all sorts of things like that as well. So it's got some things it's got
some play value also. Google also has my account dashboard -- if
you're a Gmail user, which is probably 90% of the world, at least at this point, one
thing you can do is go to is go to my account dashboard and it will allow you to do a security
checkup and privacy checkup and I encourage you to do that again just so you know what
you're sharing. You can see below privacy checkpoint it will show you the activity which
has been associated with your account and if there's things on there that you haven't
done then that account has been hacked at some point.
Another nice trick which somebody told me about is doing something a Google reverse
search. I don't know how many of you have used LinkedIn and I will connect with anybody
and it looks pretty bizarre. There's fake accounts on LinkedIn and like fake accounts
on Facebook and others, and it will allow you to select the imagine depends on if you've
got Chrome and it will show you all the places that image is used. I've got a connection
request from probably one of these people right here on the right here but that same
picture was used with at least 4 different LinkedIn accounts so it's so it's a generic
picture so maybe it's one of those people but it's a good way to check to see it's the
image that's commonly used on the internet and they're using it for a fake account and
they want you a fake account because they want to get you over to your connections.
So another issue and again, it's not typically an issue with faulty or staff or audience.
You want to protect your your only image is what they see about you online. This example
here is from a poster from the University of Wisconsin and would you hire this guy and
somebody's told me at one point they think it would be milk. I'm not buying it. But the
idea again is that understanding whatever you do online people are going to make decisions
about you and make judgments about. So that is the presentation and I'm going
to pop up my next which is my website, while we're talking here, but what questions do
you all have? And thank you for the opportunity. >> CINDY: Thanks, Ben.
There are a couple coming in. So if you have additional questions, folks, please send them
in through the chat box. A couple of things that have come up what if you do not put your
portable hardware drive online. Will the Ransomware still attack it?
>> BEN: As long as the portable hardware drive is connected to your computer, yes. Depending
on the strain of Ransomware, it will go into everything you're connected to. So the idea
if I was using a portable drive for backups, I would back up and then I would unplug it
and I would plug it back in when I'm going to use it, you know, back up to it again.
Typically, my experience we use those as additional space and not backup space. We really need
to think of it as an opportunity to back it up and again, back it up and just disconnect
it and it's not going to jump into it if it's not connected.
>> CINDY: Okay, a question from Pete. What's an example of a mobile security app?
>> BEN: Well, depending on your phone and depending on how old it is, you will kind
of dictate what you really need. So one example of a mobile security app is something called
LastPass and not LastPass I've got that wrong. Lookout. It's called Lookout. Lookout what
it does you stall it from your app store and it scans all the applications that you install
to make sure there's nothing malicious in them or whether they're asking for weird permissions
like why do they need access to your computer and that sort of thing. Lookout also has the
built in thing that iPhone users have enjoyed where you can find your phone through Lookout
and what you can do is you can bring up a map and it will show you where your phone
is within 75 feet, I think, it is. And you can also get it have your phone emit a high
pitch squeal noise, and that will help in terms of trying to find it.
The main thing it does is it looks at your applications and make sure none of those are
malicious and they do sneak out occasionally where they are bad. I used a program by Sophos
for my smart phone, and it was very aggressive in terms of what it would warn me about and
it would start talking about low reputation application and it told me Google Play was
a low reputation application and a bunch of other things and it was probably a little
bit too hypersensitive so I had to kind of turn those notifications down some. But the
idea it's a third party application that you would add to your smart phone or other mobile
device. A very long answer to a short question. >> CINDY: That's okay. Thank you.
Adam has a question. What is the best way to implement a safe home network where my
spouse and I can count on safe robust backups that can be automated by software and then
what software might that be? >> BEN: Yeah, I think this is probably a question
is a little bit beyond the scope of what I was prepared to talk about. But in general
you want to use a router and some of the I'm trying to remember whether our router does
this or not I've got what they call a Cloud drive which essentially allows me to back
up to it in the house. I've got the system set up to back up to it and then it will back
up that data to the Cloud and I don't do not remember what the cost is per gigabyte or
whatever or storage but storage prices are going down and down. But ideally what you
do to protect your data is you make you get a copy of it and you have that copy somewhere
besides where the computer is located because there should be a break in or fire or anything
else, you don't want to have lost every bit of digital information you have. We've become
too dependent on it. >> CINDY: All right, um, question on that
came in from I don't know who did that come from? Jim? Is there value to use the traditional
antivirus software that works on a mobile device?
>> BEN: Yeah, so when I'm talking about a mobile security app, they will have antivirus
built in. Cybercriminals are still crafting malicious software to attack phones. A banking
Trojan a couple of years ago, which was still out there and I'm drawing a blank on the name
of it, but what the Trojan means it's like the Trojan house it looked like something
else and there was a banking Trojan and what it did it captured all your banking activity
online. It didn't worry about anything else you were doing but anytime you went to a bank
it would capture that information and send it out to somebody. The antivirus I think
what you'll find I'm not sure you can get strictly an antivirus for your phone at this
point. They'll all be more robust security suites of software.
And the good news is most of them are free. Or at least have free versions, and the reason
for that is it is it helps all of us to get this security software out in the marketplace
because it reduces the amount of the attacks that go on.
>> CINDY: Thank you. Another question came in from Adam. Do you
know if Mint.com is a good third party app for a bank security?
>> BEN: It's not anything I have used but my rule of them point of view I want to get
a good idea how many people are using it. I'm not aware of any breaches which is what
they would call the releases with Mint.com, but they be associated with Intuit which has
Turbo Tax and there have been occasional problems, but I'm a Turbo Tax user myself and I haven't
worried about that. The biggest issue is people asking for passwords and people giving them
up. In terms of Verizon security and privacy app,
I'm not familiar with it. I tend not to use I have Verizon but I tend not to use their
built in stuff. I don't like it. It takes up room that I would rather use for something
else. But in general I'm going to give you the same response. Do a Google search and
look for reviews and see what they have to say about it, and, unfortunately, it's going
to be pretty much my responses to any specific security app or software questions today because
it changes. It changes monthly depending on which one is more effective.
>> CINDY: So if I've got malware on my device, what do I do?
>> BEN: Take it to somebody to look at. If you're associated and I can't tell you exactly
who to take it to look at. If you're around here around RIT in the community I think you'd
probably go to the digital den and ask them for their recommendations on it. Worse case
you just reset the device and wipe and return it to factory specs and that should take care
of any malware that's on the device. >> CINDY: Okay. Here's a question that came
in about looking for advice for parents to communicate to young adults and students about
not sharing their personal online ID, if they're uncomfortable doing it. Any thoughts for frustrated
parents out there? >> BEN: Yeah, a couple of things. Parents
don't tend to use the same applications they're kids do and I think that's deliberate on the
part of the kids. But they'll use things like Snapchat which is supposed to be this very
brief period of time a picture is available or something like that. But people can take
a screen shot of it. They can take a picture of the device that the picture came in on.
There's also been cases where it's like oops, somebody broke into the Snapchat servers and
they found all this information that was really supposed to be ephemeral.
The best place I would tell you to look is go to a website called Stay Safe Online, and
it's a Government website that's set up and it has a whole section on parents and teens
and preteens and what kind of information to share with them. I think that will be your
best option to Stay Safe Online. >> CINDY: Okay, thank you.
Are there any additional questions? If not, we're putting that website for Stay Safe Online
into the chat box. So I guess if there are no additional questions
we will wrap up. So thanks to Ben for coming back and being
a presenter for this second time. If you do have a digital question, you can email at
to lumbar RIT.EDU_alumni with the hash tag meRIT with the webinars, and we'll try to
get you some information for the panelists today.
As a reminder all of you will receive an email from us in the next few days with a link to
today's webinar recording. Ben I can't think you enough for being our
presenter today and thanks to all of you out there for participating in today's webinar.
Our next webinar is Thursday, March 8th, called Build a Better Brand from the Office of Career
Services with Kris Stehler. Look for your special invitation and your email coming shortly.
Again, thanks to everyone for joining. You can exit this webinar by simply closing the
WebEx window and has do let us know what you thought of the webinar with by taking the
brief survey which pops up when you exit the webinar. Thanks. And have a great day.
-------------------------------------------
Digital Storytelling - Duration: 2:03.
The other girls constantly made fun of Breanna for doing her homework instead of going on her phone.
Breanna struggled with making the right decision of whether or not she should tell the other girls that they were hurting her feelings.
If you were in Breanna's situation, what would you do?
Breanna decided to stick up for herself and tell the girls how she truly felt.
Breanna made the correct decision by sticking up for herself. The kids now understand how their actions negatively effected Breanna.
After the teasers realized that their actions were wrong, they came up with the idea...
...to make posters that would spread the word about how being respectful is positive in the classroom.
The girls worked together to come up with a definition of respect that they all agreed upon.
RESPECT: to treat people in a positive manner
When it was time to go to lunch that day, the two girls left, leaving Breanna by herself.
Breanna was too shy to ask if she could tag along with them, so she stayed back and helped clean up.
When you are able to accept others differences, you are able to show them respect and advocate for acceptance!
To Breanna's surprise, the girls invited her to go to lunch with them.
Do you show respect to those who are different than you?
-------------------------------------------
ATTN: uses Tubular as the Measurement Standard for Digital Video - Duration: 1:02.
Our primary ways of distributing content is on Facebook.
We get about 500M video views per month.
We talk about a range of topics - everything from gender inequality to politics to racial
injustice.
What we try to do is compartmentalize issues that are complex into digestible short-form
video formats.
We have a goal of having really engaging original premium quality content and we use engagements
per video metrics, views per video metrics, shares per video metrics, comments per video
metrics to assess how good of a job we are doing at creating premium engaging video content
and Tubular helps us do that.
Pre-Tubular it's like the dark ages.
The way I describe Tubular is a platform where you get competitive intelligence on
the media landscape outside your data set.
In TV the standard for understanding the landscape is Nielsen. And I think for digital media it's Tubular.
-------------------------------------------
DeLonghi EO241150M Livenza Stainless Steel Digital Convection Oven - Duration: 0:34.
DeLonghi EO241150M Livenza Stainless Steel Digital Convection Oven
Coverage for product breakdowns and malfunctions. Free shipping on all repairs with no deductibles or hidden fees. Fully transferable with gifts. Cancel anytime, full refund in the first 30 days.
If you purchase this service plan and eligible product for this service plan, you acknowledge that Amazon may send the service plan seller relevant product and price information for the purpose of administering the plan.
-------------------------------------------
Question 11 - Melissa Lee to the Minister of Broadcasting, Communications and Digital Media - Duration: 4:55.
For more infomation >> Question 11 - Melissa Lee to the Minister of Broadcasting, Communications and Digital Media - Duration: 4:55. -------------------------------------------
Volker Jung - Zwischenfazit des Digital-Workshops am 23. und 24. März in Frankfurt - Duration: 1:07.
For more infomation >> Volker Jung - Zwischenfazit des Digital-Workshops am 23. und 24. März in Frankfurt - Duration: 1:07. -------------------------------------------
DIGITAL MARKETTING Fashiontech - Duration: 0:31.
For more infomation >> DIGITAL MARKETTING Fashiontech - Duration: 0:31. -------------------------------------------
Gender Diversity Matters - DWP Digital and Department of Health event - Duration: 2:18.
For more infomation >> Gender Diversity Matters - DWP Digital and Department of Health event - Duration: 2:18. -------------------------------------------
Digital Communication Video Project - Duration: 7:48.
[VOICEOVER] Good morning Professor Shivani
My name is Yojant Danza
and I attend Physics 2017 on Tuesdays and Thursdays.
I wanted to notify a week in advance about my upcoming absence
on Thursday April 19, 2018
I will be in the doctor's office for a dentist appointment
however, I am willing to make up any missed classwork or homework assignments
and have it ready by Tuesday
If possible, please let me know what I can do in the
meantime so that I will not fall behind
Thank you and have a wonderful day
Hey Yojant!
Hey, what's up?
Dude, you wanna go to a party tonight?
There's gonna be like liquor, there's gonna be drugs
It's gonna be lit
I can't I have class tonight
So what? Ditch it
You sure?
Yeah man
Alright, let me just tell my professor first
Alright
[VOICEOVER] What up Chadda
dis your boy lil danza
I ain't gon be here cause my dog ate my homework and
she got me tight
Too emotionally distressed right now so yeah
Deuces prof. Link to my soundcloud below
#YOLO
#ganggang
The mixtape according to professor Pons out on paypal now
Ok so I have here Ima Güdstüdent's application
And from what I see here, she has a very strong GPA
at 4.0 unweighted
She volunteers regularly at the animal shelter and
she also plays the ukulele for children in hospice care
And she has a total of 1,300 hours
Perfect.
So now we just have to verify the student so we can admit her
Ok, let me check the paperwork twice
before we get started on reviewing her social media
Ok, everything seems in order. Let's review her profiles
There you go
So the first one we have is an Instagram
First picture
Ok we see her with animals. That's a good sign
Family-oriented
There's the ukulele
Another animal
She's a very well-rounded student
Family
-She's family-oriented -Yeah!
- She loves art, animals -There it is. Perfect
-Awesome -Let's get ready to accept her
Yes
I've reviewed Ashley Johnson's application
-It says here she has a strong GPA at 4.0 unweighted -Perfect
She volunteers at the local church and
she has a total 500 hours of community service. -Ok
It also says here that she's able to pay for full tuition without government help
Oh that's-- that's amazing
-Now let's verify the student -Yeah!
That would be great
Uuuum...
That's weird. It says here that she has a..
A 2.0 GPA, on her transcript
Could this be an error?
And only 50 hours of community service hours
-Maybe this is an error, let's -I'm sure it is -Well
We're gonna call back the school to verify
Because I-- maybe this is an error
-Ok let's view her social media -Yes
I think it's not very good but- go on
Why? Why do you say so?
-Look at her profile -You reviewed it already? -Mhm
Let's see
Oh! There's a book!
-Oka -Maybe she likes to read
-Wait... [reading caption] Where do I plug this in?
Oh... great
I really hope this is a joke
-(Sigh) Next picture -Next
[Reading caption] Getting ready to party bi-- ok uh
Ok that's very obscene
[Reading caption] me at my grades
Yikes
Ok so, that can be proof of the 2.0 GPA
-That's my reaction to her application actually -Me too
[Reading caption] I literally never used this pen before
- (Sigh) I'm actually having second thoughts about this. -Me too
[Reading caption] Stuntin' on--
-Oh no no -No -No no
And underage drinking? This is-- no
No, that's very inappropriate
and smoking. No. -No
This is unacceptable
That's it, she's unqualified
Yeah, she's not a good student
You can throw this in the trash
-Good morning! I-- -Oh! Good morning!
I have this job application
I was just reviewing and she seems very qualified
-I wanted you to review her LinkedIn profile -Ok
-If you like her, please tell me so I can schedule her for an interview -Sure!
-Yeah perfect! Thank you so much! Have a great day -You too
Ok, she was right about the résumé
That's very good, let's see her LinkedIn account
Ok so it's Barbara Torres, she's a student at Miami Dade College
Um. Does she have any experience?
-She does -Yes -Retail associate
She has very good skills. Organization
We especially need that
-Yes -Ok
It seems that everything that we need is there
-Yeah -So yes let's call her back in so we can schedule an interview
Hi! Good morning! Ma'am, sir. Um
I have a job applicant, her name is Barbara Torres
I'd like you to review her LinkedIn profile
I was looking at this, she doesn't seem totally qualified
-Ok -Ok, we'll take a look at it, thank you so much, Maria. We'll call you back
when we need you
Um.
There's not much here
-Uh, maybe in her LinkedIn profile, there'll be more. -Hopefully, yeah maybe it's more--
Um, it says that she works in Burger King? -In Burger King.. Ok..
How many years?
Uh. Let's go on her profile.
Here it is
-She's only worked for one year -One year. Less than a year.
There's nothing else, there's no skills
-That's all. -There's no-- uh
-We don't know anything about her -Yeah, no degree, um, the picture's not very professional
-Yes, hello. We reviewed the-- um her LinkedIn profile and
-She's not qualified. -Yeah
Không có nhận xét nào:
Đăng nhận xét