Debates: Education 17 Apr 2014 The case: Teaching creationism in US schools On April 11 2012, Tennessee passed a law that will protect teachers who choose to explore the merits of creationism alongside theories of evolution in public school science classes. Governor Bill Haslam claimed that the legislation would not... 31 Mar 2014 Social Media Influence: 10 Theories to Know For Greater Persuasion What are we really talking about when we’re talking about conversions? Persuasion, right? Influence. When we talk about conversions, we are—most of the time—discussing ways we can be more persuasive, more influential. We’re interested in meeting the needs of customers, fans, and followers and doing so in a way that truly speaks to them.
Out-of-date browser plug-ins are attractive targets for cybercriminals For example, Adobe Reader is installed in 83% of enterprise browsers, and 56% of those installations are out of date, according to the report, which is based on a review of enterprise web traffic flowing through Zscaler’s cloud-based web and email security product. “That is a huge attack surface….This is really what the attackers are going after”, commented Michael Sutton, vice president of research at Zscaler ThreatLabZ. The Blackhole exploit kit has picked up on this and includes a variety of payloads designed to target recent Adobe Reader vulnerabilities, the report noted. The State of the Web report also found that Apple iOS has taken the lead in the workplace, with 42.4% of the mobile device usage on corporate networks, followed by Blackberry with 40.2% and Android with 17.4%. Sutton, who is an author of the report, told Infosecurity that he believes that iOS is a more secure platform than Android. Also, Zscaler found that the JS/Crypted was the top virus signature blocked.
8 Steps To Great Digital Storytelling Stories bring us together, encourage us to understand and empathize, and help us to communicate. Long before paper and books were common and affordable, information passed from generation to generation through this oral tradition of storytelling. Consider Digital Storytelling as the 21st Century version of the age-old art of storytelling with a twist: digital tools now make it possible for anyone to create a story and share it with the world. WHY Digital Storytelling?
Reciprocity Norm Explanations > Theories > Reciprocity Norm Description | Research | Example | So What? | See also | References Description The Hacker Manifesto by +++The Mentor+++ Written January 8, 1986 Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Cicero’s Web: How Social Media Was Born in Ancient Rome by Maria Popova How the dynamics of papyrus scrolls explain Facebook. We’ve already seen that modern social media come from a long lineage of primitive predecessors — from the florilegia of the Middle Ages, which predated Tumblr by half a millennium, to Voltaire’s Republic of Letters, the Facebook of its day, to Edison’s early “viral” cat videos to Félix Fénéon’s analog “Twitter” of early 20th-century France. But it turns out social media originated even earlier than that, in ancient Rome. In Writing on the Wall: Social Media — The First 2,000 Years (public library), history-whisperer Tom Standage takes us to task with debunking our presentism bias by tracing the surprising, scintillating history of what we know as “social media” today.
Aristotle's Rhetoric 1. Works on Rhetoric According to ancient testimonies, Aristotle wrote an early dialogue on rhetoric entitled ‘Grullos’, in which he put forward the argument that rhetoric cannot be an art (technê); and since this is precisely the position of Plato's Gorgias, the lost dialogue Grullos has traditionally been regarded as a sign of Aristotle's (alleged) early Platonism. The OpNewblood Super Secret Security Handbook « welcome to serpent's embrace The #OpNewblood Super Secret Security Handbook If you have not gone through the IRC chat client setup for your operating system, we recommend you go back and get started there. Master Table of Contents 1) Preface 2) Setting up Tor 3) Firefox Recommended Add-Ons 4) Setting up i2p 4.1) Installation 4.2) Firefox Configuration 4.3) IRC Client Configuration 4.4) I2p IRC on Android via irssi connectbot 5) Advanced IRC 5.1) Commands 5.2) Browsing 6) Advanced Defense Techniques 7) Portable Solutions 8 ) ADVANCED GUIDE TO HACKING AND SECURITY VULNERABILITY Section 1: Preface NOTE: If at any time you need help with any topic found in this guide, feel free to join us at and you’ll be able to find someone to help you figure it out.
Death To PowerPoint: How To Speak Like A Pro Without The Slides The more times I give my standard speech on time management, the more aware I am of something curious. When I speak without PowerPoint--just me up on the stage, trying to entertain and instruct people--I enjoy the experience far more than when I use slides. The audience has a different energy. I think that’s because I have a different energy. According to Nick Morgan, a speaking coach, president of communications firm Public Words, and author of the forthcoming Power Cues, I’m on to something.
Fascinating Podcasts on Fundraising & Philanthropy - Monsterful Resources As a voracious podcast consumer, I’m always excited when one of my favorite podcasters does an episode about philanthropy and fundraising. Sure, there are lots of podcasts out there devoted to the topic but I think what delights me is that these issues are being heard by a more general audience. Maybe it will reduce the number of people who ask, “So…What, exactly, do you DO?” What Gives? Anonymous: From the Lulz to Collective Action Taken as a whole, Anonymous resists straightforward definition as it is a name currently called into being to coordinate a range of disconnected actions, from trolling to political protests. Originally a name used to coordinate Internet pranks, in the winter of 2008 some wings of Anonymous also became political, focusing on protesting the abuses of the Church of Scientology. By September 2010 another distinct political arm emerged as Operation Payback and did so to protest the Motion Picture Association of America (MPAA), and a few months later this arm shifted its energies to Wikileaks, as did much of the world's attention. It was this manifestation of Anonymous that garnered substantial media coverage due the spectacular waves of distributed denial of service (DDoS) attacks they launched (against PayPal and Mastercard in support of Wikileaks).
14 Must-Know Stats About Fundraising, Social Media, and Mobile Technology Spring is report season in the nonprofit sector. A slew of new data is released and this year the emerging theme is that online fundraising is rapidly rising, especially on mobile devices. Nonprofits that have not yet adopted a mobile-first approach to online communications and fundraising can use the new data to help convince executive staff and board that a new mobile-compatible website should be high on their priority list.
ARP spoofing A successful ARP spoofing (poisoning) attack allows an attacker to alter routing on a network, effectively allowing for a man-in-the-middle attack. ARP spoofing may allow an attacker to intercept data frames on a network, modify the traffic, or stop all traffic. Often the attack is used as an opening for other attacks, such as denial of service, man in the middle, or session hijacking attacks.