Monday, June 28, 2010

TAKEOURJOBS.ORG



TAKE OUR JOBS

There are two issues facing our nation--high unemployment and undocumented people in the workforce--that many Americans believe are related.

Missing from the debate on both issues is an honest recognition that the food we all eat - at home, in restaurants and workplace cafeterias (including those in the Capitol) - comes to us from the labor of undocumented farm workers.

Agriculture in the United States is dependent on an immigrant workforce. Three-quarters of all crop workers working in American agriculture were born outside the United States. According to government statistics, since the late 1990s, at least 50% of the crop workers have not been authorized to work legally in the United States.





RMF Course, 800-53 Database, Cybersecurity Symposium



Date:
June 28, 2010 6:12:26 PM EDT
To: Multiple recipients of list <fisma-project@nist.gov>
Subject: RMF Course, 800-53 Database, Cybersecurity Symposium

 
*** The following message is from the NIST FISMA Implementation Project ***
 
 
June 28, 2010
 
  • On-line Course Available: "Applying the Risk Management Framework to Federal Information Systems"
 
The purpose of this course is to provide people new to risk management with an overview of a methodology for managing organizational risk—the Risk Management Framework (RMF). The RMF was developed by the National Institute for Standards and Technology (NIST) to help organizations manage risks to and from Information Technology (IT) systems more easily, efficiently and effectively. This course describes at a high-level the importance of establishing an organization-wide risk management program, the information security legislation related to organizational risk management, the steps in the RMF, and the NIST publications related to each step. The course is available at http://csrc.nist.gov/groups/SMA/fisma/rmf-training.html. Patricia Toth may be contacted for more information at patricia.toth@nist.gov.
 
 
  • SP 800-53 Rev 3 database updated
 
NIST released an update to SP 800-53 Revision 3 Reference Database Application making the database consistent with the May 01, 2010 security control errata changes made to Special Publication 800-53 Revision 3, Recommended Security Controls for Federal Information Systems and Organizations, August 2009 (includes errata updates as of 05-01-2010).   See Support Tools, http://csrc.nist.gov/groups/SMA/fisma/support_tools.html.  
The NIST SP 800-53 database application requires Microsoft Windows 7, Vista, XP, Server 2003, and Server 2008 and will not run under Windows 9x.  The application is a self-contained read-only executable and requires at least 200 MB of free disk space.  To install it, extract the zip archive in a directory where the user has read, write, and execute permissions. Open the SP_800-53_Rev-3_DB-R1.4.1-BETA directory and double-click the SP_800-53_Rev-3_DB-R1.4.1-BETA.exe file to run the application.  For more information please contact Arnold Johnson at Arnold.johnson@nist.gov.
  
  • Cybersecurity and Innovation in the Information Economy – July 27 Symposium
 
July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation
 
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the Department of Commerce will hold a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010, at the Ronald Reagan Building and International Trade Center in Washington, D.C. The event is designed for all interested stakeholders to participate and comment on the relationship between cybersecurity in the commercial space and innovation in the Internet economy, with particular emphasis on businesses that operate non-critical infrastructure.
 
Several senior government officials are scheduled to speak, including Commerce Secretary Gary Locke, NIST Director Patrick Gallagher, Commerce General Counsel Cameron Kerry, U.S. Chief Technology Officer Aneesh Chopra and White House Cybersecurity Coordinator Howard Schmidt. Private-sector panelists include Vint Cerf, Google; Larry Clinton, Internet Security Alliance; and James Lewis, Center for Strategic and International Studies.  The symposium will place particular emphasis on cybersecurity issues faced by businesses that operate non-critical infrastructure.  The agenda currently contemplates panels on "Assessing the Macro-Economic Threat and the Commercial Sector's Response," "Micro-Economic Successes and Challenges in Risk Management," "Effecting Behavioral Change" and "Roles, Responsibilities and the Global Path Forward."
 
This meeting is part of a review being conducted by the Commerce Department's Internet Policy Task Force, which was launched by Secretary Locke in April. The Task force is investigating successful cybersecurity strategies, the roles of the private and public sectors in cybersecurity in the commercial arena, and the relationship of cybersecurity policy to consumer welfare, job creation, and international trade.  The review is being coordinated with the Office of the Cybersecurity Coordinator, Executive Office of the President.
 
Task force members include representatives from the National Institute of Standards and Technology, National Telecommunications and Information Administration, and the International Trade Administration.
 
The event will be held in the Amphitheater of the Ronald Reagan Building, from 8:30 a.m. to 4:30 p.m., and will be open to the public on a first-come, first-served basis.  Registration, agenda, and the videotaped proceedings will be available on NIST web site www.nist.gov/itl/cybersecurity.cfm.
 
Additional registration details:
To register for the Cybersecurity and Innovation in the Information Economy meeting please follow these instructions:
 
The NIST Conference Registration page is best viewed using either Internet Explorer or Firefox. If you are having problems accessing the Conference Registration page, please make sure that your browser is using TLS 1.0 encryption. To set the encryption mode in Internet Explorer and Firefox: Select Tools, Options, Advanced. Click to check the box Use TLS 1.0
 
The on-line registration link is https://www-s.nist.gov/CRS/conf_disclosure.cfm?conf_id=4284Please register on-line and contact Teresa Vicente, teresa.vicente@nist.gov if you have a problem. Registration closes 7/20/10.
 
 
 

Friday, June 25, 2010

Sweet -



Best part of iOS 4.
Double click, get the list of open Apps.
Slide that list to the right...
Voilà! There's your iPod controls and a handy rotation control.
Nice

Thursday, June 24, 2010

Internet Evolution - IT Clan Editor's Blog - Cloud's Forecast Grows Contentious.

 http://www.internetevolution.com/author.asp?doc_id=193635

Software Assurance Pocket Guide Series



-           

https://buildsecurityin.us-cert.gov/swa/pocket_guide_series.html

Software Assurance Pocket Guide Series

The SwA Pocket Guide Series comprises free, downloadable documents on software assurance in acquisition and outsourcing, software assurance in development, the software assurance life cycle, and software assurance measurement and information needs. SwA Pocket Guides are developed collaboratively by the SwA Forum and Working Groups, which function as a stakeholder community that welcomes additional participation in advancing and refining software security. Your input on these documents is welcome; please use the feedback form. For general inquiries, please email Software.Assurance@dhs.gov.

Parallels Server 4.0 for Mac Bare Metal Edition



Parallels Server 4.0 for Mac
Bare Metal Edition
Features

Key Features

  • Parallels Server 4.0 for Mac Bare Metal Edition is the first Parallels solution that can be installed and used on bare Apple hardware.
  • Mac OS X Leopard Server and Mac OS X Snow Leopard Server are supported as guest operating systems.
  • Powerful 12 way virtual CPU support in each Virtual Machine. Maximizes the power to your application taking advantage of Intel VT-x and VT-d technologies including VPIDs, FlexPriority & Extended Page Tables as well as AMD-V technologies offloading workloads to the system hardware to bring near native performance to the virtual environments.
  • Comprehensive built in backup solution to enable administrators to perform incremental and full backups on virtual environments to protect data, applications & configurations.
  • Simple migration of virtual environments between physical servers to minimize downtime and improve IT reaction time.
  • Easy integration into an existing environment leveraging the same management infrastructure & operational procedures.

Technical Features

  • Up to 12 way virtual CPUs supported per Virtual Machine
  • Up to 64GB of virtual RAM per Virtual Machine
  • Powerful 32/64 bit hypervisor virtualization layer for creating & managing Parallels Virtual Machines
  • Virtual disk files up to 2TB
  • Up to 8 USB 2.0 & 8 USB 1.1 devices supported per Virtual Machine
  • CPU resource limits, prioritization and disk I/O priority
  • Snapshots & automated snapshots
  • Virtual environment cloning
  • Virtual machine templates to reduce setup & configuration time for repetitive environments
  • Virtual Networking allows you to include your virtual environments in different networks
  • Integrated update utility to automate the process of keeping the software & templates up to date
  • Resource usage accounting shows CPU, memory, disk & network usage by Virtual Environment
  • Full & incremental backups
  • Live migration
  • Migration utility for P2V, C2V
  • Physical NIC dedication on VT-d enabled servers

Management Features

  • Parallels Management Console is a GUI based cross-platform management utility that supports multiple servers (recommended 5 server maximum) and the lifecycle management of Virtual Machines.
  • Parallels Virtual Automation is a web based management application that streamlines the process of managing both Parallels hypervisor & container environments as well as providing self service capabilities to improve IT responsiveness.
  • Command Line Interface allow administrators to perform different management operations on virtual environments.
  • SDK/API/Scripting provides a programming API and C/C++ and Python wrappers for API to enable the integration of Parallels Server 4.0 for Mac Bare Metal Edition into company processes and applications such as self service provisioning.

Thursday, June 17, 2010

Some clues on why QuickBase went down -

 As of Wednesday night, however, Intuit said it had identified what went wrong. "Our preliminary investigation indicates the outage occurred during a routine maintenance procedure Tuesday night," the company said. "An accidental power failure during that procedure affected both our primary and backup systems, taking a number of Intuit websites and services offline. While power was quickly restored, we're working diligently to validate our systems and bring them back into full operation."

Sunday, June 13, 2010

40 Real Time Saver Photoshop Actions


40 Real Time Saver Photoshop Actions

Photoshop Actions let you apply multiple automated processes on as many images you need, all in one go. This makes them godsends for batch processing, as you can save a lot of time and effort by using them instead of editing each image manually. ...




The iPhone 4 Retina Display Controversy [Iphone 4]


The iPhone 4 Retina Display Controversy [Iphone 4]

#iphone4 Apple makes a pretty ballsy claim about the iPhone 4's display: "The pixel density is so high that the human eye is unable to distinguish individual pixels." They're pushing against the limits of the human body. Is it true? More » ...



A Compilation of Vintage Textures for Designers


A Compilation of Vintage Textures for Designers

Textures are one of the most used resources in making great designs. They can accentuate your images to better portray the feel of the design you're aiming for. Vintage textures, for instance, can add a classic or nostalgic touch to your work. ...



Friday, June 11, 2010

Hmmmm....



NIST SP 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems

 

NIST SP 800-37 Rev. 1, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach

 

 

Monday, June 7, 2010

Cotchin.com - A New Client For FourSquare --


Cotchin.com - A New Client For FourSquare

If you feel that the ways in which you can currently experience FourSquare are somehow lacking, this is an app you might like to keep an eye on. In essence, Cotchin is a new FourSquare web client that leverages HTML 5 technology in order to let you access all the functionalities of FourSquare's mobile webpage from your browser - and then some. In due time, functionalities like mini reviews of each venue will be provided along with enhanced venue search and (more interestingly) a collection of mini reviews for each featured ...




Top 8 iPhone Apps for Self-Help --


Top 8 iPhone Apps for Self-Help

Although serious psychologists sometimes bash self-help books as "vast oversimplifications," there's a reason that New York Times's best seller list includes an entire section of "advice" books. Who wouldn't rather believe that they can help themselves? Forget the $100 an hour couch session with your psychiatrist — the path to a new you fits in the palm of your ...



Sunday, June 6, 2010

Trade In, Trade Up Your iPhone--


Trade In, Trade Up Your iPhone

We've offered our fair share of rumors and speculations on the new iPhone, but most people agree it will be announced on Monday at WWDC 2010. So what do you do with your old phone when you upgrade? A company out of Kansas City, iResQ, offers an option to buy back your 3G or 3GS iPhone without the headaches, hassles, or risks associated with Craigslist or eBay. iResQ offered a similar program in 2008 when the iPhone 3G was ...




Saturday, June 5, 2010

Infosecurity (USA) - Penn State data may have been exposed -



Penn State issued a press release statement on Wednesday informing the university community that a computer in its Outreach Market Research and Data office was found to be actively communicating with a botnet CNC.

According to the statement, the database used by the office had previously contained Social Security numbers on individuals. The university, which discontinued use of SSNs for identification purposes in 2005, nevertheless found that an archived copy of the information went undetected in the computer's cache.


Thursday, June 3, 2010

Leroy Stick – the man behind @BPGlobalPR

 - READ THIS -                                                                                             
http://streetgiant.com/2010/06/02/leroy-stick-the-man-behind-bpglobalpr/

Dearest Media,
My name is Leroy Stick and I am the man behind @BPGlobalPR.  First, let me begin by explaining my name.

When I was growing up, there was a dog that lived on my block named Leroy.  Leroy was a big dog with a disdain for leashes and a thirst for blood.  He made a habit of running around our block attacking anything he saw, biting my dad and my dogs basically whenever he had the chance.  He chased me a few times, but I always escaped because I was/am an amazing tree climber.

Anyhoos, after Leroy's second or third attack on my dogs, it became clear that the police and Leroy's owner weren't going to do anything to stop him, so my dad took matters into his own hands and came up with a brilliant invention: the Leroy stick.

The Leroy stick was, you guessed it, a stick.  My dad carried an axe handle and I carried a plunger handle.  My dad told me two things about carrying the Leroy stick.  First, if Leroy came near me or the dogs, I should hit him.  Second, if I hit Leroy with my stick, I would not get in trouble.  Was it legal?  Probably not.  Was it right?  It sure felt like it.  We set the example and soon a lot of our neighbors started carrying Leroy sticks as well.  Soon enough, Leroy and his owner saw everyone carrying sticks and Leroy didn't run free anymore.

http://streetgiant.com/2010/06/02/leroy-stick-the-man-behind-bpglobalpr/

Military Health - Social Media Hub

 http://www.health.mil/News_And_Multimedia/Social_Media.aspx

How Obama Haters May Help Democrats in Midterm Elections - TIME -

 http://www.time.com/time/politics/article/0,8599,1993050,00.html?xid=aol-direct

Tuesday, June 1, 2010

Funeral home stacked overflow bodies in garage

 --Ewwwwww
http://digg.com/d31Sd5h
"Funeral home stacked overflow bodies in garage"
A Baltimore funeral home has lost its license after a state inspector
discovered what appeared to be 40 bodies intended for cremation
haphazardly piled in body bags stacked in its garage.

Mini Skirts Are The New Method of Predicting The Weather

 <--Questionable "science" here...
http://digg.com/d31Scse
--
"Mini Skirts Are The New Method of Predicting The Weather "
The rises and falls in the length of skirts are said to be a good way
of forecasting what the weather will be like three days in advance,
based on research at eBay.

Hilarious web addresses revealed in new book

 -- But who still uses AngelFire.com?
http://digg.com/d31SZNL
--
"Hilarious web addresses revealed in new book"
A list of the internet's most inadvertently amusing web addresses –
such as the home page for celebrity agent database Who Represents, or www.whorepresents.com
– have been compiled in a new book.