Nov 032016
 

By Sandy Stachowiak at MakeUseOf.com…

If you’re working on a small project, as a freelancer, or in a company with few employees, Outlook 2016 can help you manage your projects and tasks without the need for hefty software. With simple customizations to the task section, you can set reminders and due dates, assign to-dos, and track time easily.

Source: How to Use Outlook for Simple Task and Project Management

 Posted by at 5:14 pm
Oct 302016
 

From FEMA.gov…

The link below features downloadable guides designed to help users plan and organize drills and exercises for CERT volunteers. These activities are excellent opportunities for CERT programs to practice, assess and improve emergency response plans and on-the-ground operations while engaging their volunteers and refreshing the concepts and skills learned in CERT training. Drills, tabletop exercises, functional exercises, full-scale exercises and competitive events are the different types of exercises that CER

Source: CERT Drills and Exercises | FEMA.gov

 Posted by at 9:18 am
Oct 262016
 

As someone responsible for hiring and developing employees, I think this is a great article by Melanie Pinola at Lifehacker.com…

Hiring managers make the difficult decision of who the best candidate is for the job based not just on the specific job requirements but also basic “soft skills” every worker should have, like communication and teamwork. Here are the top 10 additional job skills everyone needs.

Source: Top 10 Skills You Need at Work That Have Nothing to Do with Your Job

 Posted by at 5:02 pm
Jul 292016
 

From the White House…

The advent of networked technology has spurred innovation, cultivated knowledge, encouraged free expression, and increased the Nation’s economic prosperity. However, the same infrastructure that enables these benefits is vulnerable to malicious activity, malfunction, human error, and acts of nature, placing the Nation and its people at risk. Cyber incidents are a fact of contemporary life, and significant cyber incidents are occurring with increasing frequency, impacting public and private infrastructure lo

Source: Presidential Policy Directive — United States Cyber Incident Coordination | whitehouse.gov

 Posted by at 7:10 am
Jun 112016
 

By Mikko Hypponen at Linux.com…

Most people probably have an idea about what a hacker looks like. The image of someone sitting alone at a computer, with their face obscured by a hoodie, staring intently at lines of code in which their particular brand of crime or mischief is rooted, has become widely associated with hackers. You can confirm this by simply doing an image search for “hackers” and seeing what you come up with.

Source: Real Hackers Don’t Wear Hoodies (Cybercrime is Big Business) | Linux.com | The source for Linux information

 Posted by at 6:44 pm
Mar 062016
 

University of California, Irvine leaped into a new era with the release today of an aggressive strategic plan for the future that secures its place among elite research institutions.

Source: UCI takes a leap into the future with release of ambitious strategic plan | University Business Magazine

 Posted by at 7:38 pm