Search DU CTLAT Blog

Tuesday, April 3, 2012

WIA Report: Tracking the Progress of Women in Academia

A Check-Up of Women in Academic Nursing
Enrollments in nursing degree programs at all levels are increasing and men, while still a [...]
 
 
 
http://www.wiareport.com/
 
Florida State Researcher Examines What Impacts Women’s Persistence in STEM Disciplines
Florida State Researcher Examines What Impacts Women’s Persistence in STEM Disciplines
Roxanne Hughes was recently honored by Phi Delta Kappa International for having one of the [...]
 

 

Share/Bookmark

TLT Group FREE Event Announcement: New Roundtables Working Group, 05 Apr 2012



New Roundtables Working Group
05 Apr 2012 2:00 PM EDT

New Roundtables Working Group

April 5, 2012, 2-3 pm eastern


An extension of our 2012 March Symposium, New Roundtables for Collaborative Change, the New Roundtables Working Group will continue building on ideas set forth by the Symposium. The Working Group is designed to address participants' questions and give room for volunteers to explore areas of interest.

In this first session, recorded answers to the Fundamental Questions (in the context of New Roundtables) by members who participated in the Symposium, will be shared.


We welcome all in higher education - faculty, librarians, faculty developers, administrators, but we especially encourage small groups of colleagues from the same institution.

The Working Group is free to individual members.  Check your institution's status here if you have your membership through an institutional subscription.


Join us!

Participants should sign-in 15 minutes early for tech instructions and to meet others in the group; they also have the option of remaining online for a half-hour follow-up discussion immediately after the workshop.

All of the TLT Group’s online offerings include use of “low threshold” tools, examination of controversial issues, options for participants with a range of experience, and suggestions for assessment as you integrate what you’ve learned into your repertoire. 



More information and online registration:
New Roundtables Working Group

Hope you can join us!

Sally

The TLT Group, A Non-Profit Organization    301-270-8312
 

Share/Bookmark

ICCRK International Conference on Computer Related Knowledge (ICCRK' 2012) Invitation & Call for Paper



International Conference on Computer Related Knowledge (ICCRK' 2012)
July 5-7, Sousse, Tunisia
                                                           Call for papers: www.iccrk.org

 Researchers are invited to submit abstracts or papers through EDAS or, Easychair; or by e-mail: pchair@iccrk.org; reporting original, unpublished research results in Computer Related Studies by April 25, 2012. All accepted papers will be printed in the conference proceeding and candidate for publication in specific International journals related to corresponding research areas. ICCRK 2012 will have a poster session for which we will also accept late submissions; such late poster papers will be included in a special proceeding, and also candidate for journal publication. ICCRK 2012 invites original contributions on all Computer Relater Knowledge, including, but not limited to:

Conference Chairs
Rachid Sammouda
King Saud University, Saudi Arabia
Nejmeddine Tagoug
King Saud University, Saudi Arabia

Program Chairs
Noboru Niki
University of Tokushima, Japan
Rachid Ben Lamri
Lakehead University, Canada
Mudasser Wyne
National University, USA

Organization Chairs
Takoua Abdellatif
University of Sousse, Tunisia
Adel Ben Manouer
Dar Al Uloom University, KSA.
Amer Touir
King Saud University, Saudi Arabia

Conference Coordinator
Moshira Ali
Dar Al-Uloom University, KSA

Local Organizing Chair
Abdelfettah Belghith
ENSI, Tunisia
Habib Youcef
ISTC, Hammam Sousse, Tunisia.
wahid hamdi     
ISET, Tozeur, Tunisia.
Conference Venue:
El Mouradi Hotel,  Sousse, Port El Khataoui, Tunisia.
Email for reservation: res.palace@elmouradi.com
§  Scientific Computing
§  Signal and Image Processing
§  Artificial Intelligence
§  Computer Networking
§  Computer Security
§  Virtual Reality
§  Simulation and Optimization Techniques
§  Problem Solving Environments
§  Advanced Statistical Algorithms
§  Genetic Computational Algorithms
§  Web- and Grid-based Simulation
§  Parallel Computing
§  Distributed Computing
§  Bio-informatics
§  Bioinformatics and Scientific Computing
§  Biomedical Engineering
§  Operation Research
§  Computer Games
§  Computer Graphics & Virtual Reality
§  Computer Graphics and Multimedia
§  Computer Modelling
§  Computer-aided Design/Manufacturing
§  Computing Ethics
§  Computing Practices & Applications
§  Control Systems
§  Data Communications
§  Data Compression
§  Data Encryption
§  Data Mining
§  Database Systems
§  Parallel and Distributed Computing
§  Pattern Recognition
§  Performance Evaluation
§  Programming Languages
§  Robotics and Automation
§  Computer Animation
§  Computer Architecture & VLSI
§  Computer Architecture and Embedded Systems
§  Computer Based Education
Computer Security for banking system
CONFERENCE PROCEEDINGS
Early Conference Registration Fees
Late Conference Registration Fees
Non-Student Academic Author
450 EURO
Non-Student Academic Author
550 EURO
Student Author
400 EURO
Student Author
500 EURO
Others
550 EURO
Others
650 EURO
IMPORTANT DATES
SPONSORS
Paper / Abstract submission:
Notification of acceptance
Final paper submission and authors' registration
Final registration Date
Conference Dates
April 25, 2012
May  10, 2012
May   15, 2012
May   25, 2012
July 5-7, 2012
Institut Supérieur des Etudes Technologiques (ISET) Tozeur, Tunisia.
The International Refereed Conference Proceedings will be blind peer reviewed by three competent reviewers and distributed both in Electronic CD-ROM Format and Proceeding Abstract Book.
Note. Conference registration fees include coffee break and lunch during conference days only.

Share/Bookmark

Microsoft at Work: 4 tips for safely conducting research on the web


Surprisingly, basic safety is often ignored by people using the web to research information quickly and efficiently. If you use the Internet for research of any kind, you could be exposing yourself and your company to hidden dangers such as the unauthorized transfer of confidential information. And no one wants to be the person responsible for a companywide computer network shutdown.

Whatever your reason for using the web, there is a smart way to conduct research on it: with an alert eye and a vigilant approach. Use these four tips to help protect yourself and your company from prying eyes and malicious programs.

1. Update, update, update!

Microsoft continually provides enhancements and security updates to all its products, including Internet Explorer. No program is completely safe from harm but as threats are discovered, Microsoft makes fixes, upgrades, and service packs for its products available. To maintain the highest level of security on your computer, you or your IT department must make sure to apply all service packs.
Before you venture onto the web, make sure you are using the latest version of Internet Explorer. At the time of this writing, the latest version is Internet Explorer 8.0.7. To see what version you are using, follow these steps:
  1. In Internet Explorer, on the Help menu, click About Internet Explorer. There are three items you should notice in the window that is displayed:
    • Version: Internet Explorer 8.0.7 is the latest version.
    • Cipher Strength: This is the level of encryption that the browser can support. If you are going to be sending any confidential information over the Internet, you must make sure the cipher strength is 128-bit. If it is less than this value, it will be possible for a hacker to crack the encryption code and view confidential information.
    • Update Versions: Keep your version updated to ensure the balance between security and functionality is correct.
    Use latest version of Internet Explorer Use latest version of Internet Explorer
  2. Click OK to close the window.
If your browser needs updating, go to the Microsoft Update website, where you can download the latest version of Internet Explorer.


2. Get into the zone

By setting up Internet zones to meet your personal needs, your computer can help protect you as you surf the web. A zone is a logical region or grouping of websites, based on where they are physically located and how well you trust the source. These default zones are available in Internet Explorer 8.0.7:
  • Local Intranet — Websites located on your local network. These sites do not have to communicate over the Internet to be accessed.
  • Trusted Sites — A list of websites that you trust not to harm your computer, such as sites you have identified as properly encrypted.
  • Restricted Sites — A list of websites that are known or suspected to be harmful to your computer.
  • Internet — All other sites that don't fall under the other three categories.
You can indicate how Internet Explorer should behave when it accesses a website within each of these zones. In Internet Explorer, on the Tools menu, click Internet Options. In the Internet Options dialog box, click the Security tab.

Internet zones can help protect you. Internet zones can help protect you
When you select a web content zone, you can change the security levels. For all but the Internet zone, you can add specific sites to a zone based on your personal requirements. And Custom Level allows you to enable or disable a variety of options based on personal preference. For example, you may want to allow automatic logons only to websites that are located in your Intranet zone instead of everywhere on the Internet. The User Authentication section of the Custom Level zone allows you to set that preference. Or, you may want to ensure your Pop-up Blocker is enabled. Custom Level is where you can ensure your security settings allow your blocker to operate.
Follow the prompts in the Internet Options dialog box in the zone you want to customize by either clicking Sites or Custom Level.


3. Limit your intake of cookies

Cookies are small files stored on your computer that contain information needed on certain websites. A cookie can be used to store user ID, password, preferences, personalization, or other information that is helpful to enhance your experience on that site. For example, suppose you visit a website that allows you to select a preferred language. So you don't have to choose the language preference each time you enter the site, a text file on the site stores language preference directly on your computer as a file, or cookie.
Here's the catch: you don't know what the cookie has been programmed to collect. You don't know if the cookie is malicious or not. If it's malicious, you could quickly end up with a spiteful little program stored directly on your hard drive. A malicious cookie can collect and store almost any information that you may not want it to, such as your name, credit card information, address, or more. Cookies make it possible for unwanted information to be stored and accessed repeatedly when you visit a website.
By default in Internet Explorer, cookies are allowed for all zones except the Restricted Sites zone. However, if you want to limit cookies for a particular zone, here's how you do it:
  1. In Internet Explorer, on the Tools menu, click Internet Options. In the Internet Options dialog box, click the Privacy tab.
  2. In the Settings section, move the slider up or down to adjust the settings.
    Select settings for Internet Zones Select settings for Internet Zones
    Moving the slider up incrementally increases the Internet security on your computer, so that cookies are not accepted. Moving the slider down incrementally decreases the security, so that cookies are accepted. Check with the IT department for your organization if you are not sure which settings are appropriate to use.
  3. Also in the Settings section, click Sites to explicitly set a cookie policy for individual websites. Here, you can specify which sites you want to allow or not allow to use cookies. Enter the desired website address in the Address of website text box. Click the Block button to block all cookies for the entered site, or the Allow button to allow all cookies for the entered site.
  4. Continue entering settings for each specific website for which you want to set a cookie policy.
  5. Click OK to return to the Internet Options dialog box. Click OK.
If you are concerned that you may already have cookies on your computer that contain personal information, you can delete cookies and other temporary Internet files by following these steps:
  1. In Internet Explorer, on the Tools menu, click Internet Options.
  2. Make sure the General tab is selected. (This is the default.)
  3. In the Temporary Internet files section, click the Delete button. You will be prompted for confirmation before continuing.
  4. The Temporary Internet files that you can delete are listed and selected for deletion by default, including Cookies. Clear the check box beside any temporary Internet file types that you do not want to delete.
  5. Click OK.
Delete Browsing History Delete Browsing History
Get more information on privacy features in Internet Explorer 8.


4. Check for encryption before entering information on a site

While surfing the Internet is less dangerous than finding an abandoned bag in an airport, security should still be taken seriously. Encryption is a method that website owners use to help protect sensitive information, such as user names, passwords, addresses, phone numbers, and credit card numbers. If a website you visit does not use encryption, any sensitive information you place on it is easily accessible to hackers who want that information for unsavory purposes.
There are two ways to ensure you are viewing an encrypted site.
  • Make sure you are using the latest version of Internet Explorer as outlined in Tip 1 ("Update, update, update!") above.
  • Make sure that a website uses encryption when you are entering or viewing sensitive information. There are two ways to see whether a site uses encryption. One is a small yellow "lock" icon on the status bar of Internet Explorer. The other is in the web address itself. If it begins with https:// (note the "s"), then the site is secure. If you ever visit a website without either of these encryption indicators, do not click a Submit, Save, or OK button, because sensitive information will be transmitted without being encrypted.



S.E. Slack

S.E. Slack S. E. Slack specializes in simplifying complex topics so the masses can both understand and apply difficult concepts. She is a co-author of Breakthrough Windows Vista: Find Your Favorite Features and Discover the Possibilities and CNET Do-It-Yourself Digital Home Office Projects. She has written five other books.

Share/Bookmark