Search Results

1853 bookmark(s) - Sort by: Date ↓ / Title /

  1. handy perl script to make sense of postfix log files to see what's going on.
    http://adminlogs.info/2012/07/22/how-...tatistics-from-your-postfix-mail-logs
    Tags: by dnorman (2019-01-16)
  2. slides, links and content from our AR for Teaching and Learning workshop
    https://github.com/perissinotti/ARworkshop
  3. -
    https://www.prnewswire.com/news-relea...deo-content-management-300771242.html
    Tags: by dnorman (2019-01-08)
  4. -
    https://globalnews.ca/news/4815751/commentary-photos-memories
    by dnorman (2019-01-06)
  5. fantastic description of activities and tools to support teaching and learning. the 2018 version was quite different from the 2017 version - I wonder why. Possibly due to licensing of tools? some "other technologies" just dropped off for no apparent reason…
    https://www.mcgill.ca/tls/teaching/learning-technologies
  6. This study investigated the influence of physical and virtual learning spaces on students’ socialization into future professions while attending a modern university. Qualitative analysis of an undergraduate liberal arts program that employs the use of roundtable classrooms was conducted. Findings revealed that the roundtable classroom promotes socialization by facilitating the exchange of elaborate feedback and intellectual talk between students and instructors. However, some students reported feeling exposed or uncomfortable and thus less likely to participate. Virtual learning spaces influenced socialization, and their effectiveness was heavily moderated by the instructor and by the frequency and use of educational technology. Recommendations and suggestions for future research are provided.
    http://libjournal.uncg.edu/jls/article/view/1703
    Tags: by dnorman (2018-12-21)
  7. -
    http://web.ucalgary.ca
    by dnorman (2018-12-04)
  8. First of all, be real: you probably do not know yourself as well as you think you know yourself. It’s the Dunning-Kruger of self-awareness. If you’ve gone through any deep coaching, self-awareness practice, or therapy, what you learn over time is how hard it is to be 100% honest about yourself and your motivations. If you’ve gone through very little of that, well, you are almost certainly in deep denial about your behaviors and how well they actually reflect your conscious beliefs. I know myself well enough to know that I might usually behave in alignment with certain personal values and expectations, but I will break that alignment at the worst possible times (you’re most likely to break with your best intentions in times of high stress).
    http://www.elidedbranches.com/2018/11/i-hate-manager-readmes.html
    by dnorman (2018-11-29)
  9. "The net messages in all of this –

    A vendor that takes information security this serious probably deserves to be instantly added to your short-list, provided they have the requisite skill and experience in the products and services you seek.
    There are likely substantial vendor due diligence and annual re-certification expenses you can save as well. If a vendor can pass the SOC 2 Type II audit, there is little you will review that will trip them up. They have endured far worse. Just ask for their SOC 2 Type II report and certification documentation, review it to ensure your own comfort, then check the “Exceeds Requirements” box, and move on to the next vendor to review.
    Yes, we are essentially saying that SOC 2 Type II vendors should be given a “free pass” (of sorts). Give them an explicit opportunity to strut their stuff in your RFP process. And, by no means was it FREE. It has cost them dearly, but they think earning your business and peace of mind is worth it."
    https://www.mpamag.com/news/the-impor...ations-in-vendor-sourcing-108901.aspx
    Tags: , , , , by dnorman (2018-11-16)
  10. "In short, you must be able to cover not only security of the cloud (the cloud provider’s infrastructure), but also security in the cloud (how you configure and use the cloud infrastructure and services, as well as your applications and data) and security outside of the cloud (your software development processes, user endpoint devices, training and awareness, etc.)"
    https://jupiterone.io/blog/what-is-soc2-compliance
    Tags: , , , by dnorman (2018-11-16)

Top of the page

First / Previous / Next / Last / Page 1 of 186

About - Propulsed by SemanticScuttle