guidance   2061

« earlier    

Deep Down, Cancer Alley - The Reservoir
Next, I began spending time with a family on an island that is sinking into the gulf. I would stay with the Chaisson’s — Hilton, his two wives Sue and Judy, some of their twelve children and many grandchildren. From the moment I arrive, I am the butt of their jokes. One minute someone is farting in my face, the next minute someone is trying to marry me off to an eligible cousin, uncle or brother.  The way that I am taken in and lovingly tormented helps to even the playing field of our power dynamic. This was the turning point in my work and opened me up to ways that I could further dissolve the walls between my professional and personal life. The Chaisson’s demanded this of me. I could not stay in their home unless I was willing to erase these barriers. For me, these complex and complicated relationships force photography into telling a more genuine story.
4 days ago by rlacher
Be a Better Trainer
A good rule of thumb for digital security trainers is for every fear you inspire, always have at least one solution or strategy that participants can employ to mitigate or address that fear. If the risk being discussed does not have a technical solution, be prepared to discuss “offline” or “physical” strategies and tactics that participants can master and practice instead. In cases where there are both “online” and “offline” strategies to recommend, discuss both - examples of “offline” strategies are effective for making sometimes daunting digital threats more relatable and therefore manageable.
5 days ago by rlacher
How to get new activists to stay engaged for the long haul

Deeply engaging newcomers also gives organizers a chance to counter the despair and disempowerment that easily surface when people don’t see immediate results, especially in this political climate. More than in any previous year, I have heard newcomers ask, “What will this action accomplish?” It’s a great question. My answer is “Nothing. This action by itself will accomplish nothing. But during our successful campaign to get PNC out of financing mountaintop removal coal mining, we held 125 actions, and 125 actions was enough to win against a $4 billion-a-year bank.” Then I explain how the current action is one of many and that their arrival is a sign that we are growing and building the pressure on PECO through our geographic expansion, the same strategy that won against PNC.
6 days ago by rlacher
Personal data breaches | ICO
RT : We have expanded the page on personal data breaches in our guide to the GDPR:
BizHour  GDPR  ICO  guidance  from twitter
10 days ago by loughlin
Anti-pattern - Wikipedia
According to the authors of Design Patterns, there must be at least two key elements present to formally distinguish an actual anti-pattern from a simple bad habit, bad practice, or bad idea:
A commonly used process, structure, or pattern of action that despite initially appearing to be an appropriate and effective response to a problem, has more bad consequences than good ones.
Another solution exists that is documented, repeatable, and proven to be effective.
12 days ago by rlacher
RFC 2119
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119.
rfc  guidance  reference 
6 weeks ago by brunsnik
You only need to do three things to make a great presentation
If you’ve ever frozen in front of a presentation, remember, you’re here to do three things:
-Make a point
-Make people care about your point
-Ask for something

We’ll focus on your point—how to get to it, how to structure it, and how to design it.
presentation  presenting  guidance  Quartz  Oct2017  MarkPollard 
8 weeks ago by mattclack
Azure Virtual Datacenter | Blog | Microsoft Azure
Azure Virtual Datacenter (VDC) is an approach to making the most of the Azure cloud platform's capabilities while respecting your existing security and networking policies. When deploying enterprise workloads to the cloud, IT organizations and business units must balance governance with developer agility.
azure  pdf  blog  vdc  guidance  cloud  microsoft 
10 weeks ago by geekzter

« earlier    

related tags

5-pillars  5  5p  5pillars  800-63  ;  adaag  advice  airspace  akka-http  akka  analysis  apollo  apprenticeships  architecture  arm  asic  australia  autism  automation  azure  banking  big-ip  bitcoin  bizhour  blockchain  blog  book  bug  bulletin  capacity  care  career  cat  cesg  citrix  civility  civilservice  clematis  cloud  code  coin  compliance  computer  containers  contract  contrib  contributing  contribution  control  criticism  cryptocurrency  cuba  cultivation  curbramp  currency  cve  cybersecurity  data-protection  database  db2  decisionmaking  definitions  defra  delicious  deployment  design  designthinking  devops  digital  discovery  docker  docs  documentation  dotnet  drone  ebooks  editing  education  electronics  encyclopedia  enterprise  equality  ethics  everyday  f5  facebook  fda  federal  feedy  female  fiori  firewall  five  flight  foi  forms  framework  free  front-end-dev  fundamental  fundamentals  fundraising  gap  gdpr  gender  gh  github  gituhub  godswill  governance  government  gps  guide  guideline  guidelines  gxp  h-infinity  ha  help  hipaa  hyperparameters  hypervisor  ico  ict  identity  ifttt  ignore  ignoring  imu  inertial  information  infosec  ins  institute-of-fundraising  integration  interest  intersex  ithc  japan  java  jillshinn  job  journalism  kalman  keywords  law  legal  legislation  limit  linux  logicapps  loop  machine  machinelearning  male  man  management  markpollard  material  mathematics  mentors  microservices  microsoft  migration  missile  msdn  mssql  navigation  ncsc  needsediting  network  neutral  neutrality  nist  nonbinary  nva  nyc  oct2017  offering  official  on  onboarding  open  oracle  paas  passion  password  patch  patterns  pdf  pen-test  performance  personal  pillars  pnp  policy  portal  presentation  presenting  principles  process  programming  projectmanagement  proofing  publicservice  purpose  quartz  rbac  recommendations  reference  regulation  requirements  research  resolution  respect  restricted  reunion  rfc  risk  robust  rule  rules  ruling  rural  safety  sap  search  sector  security  service  sex  shaping  sidewalk  size  sizing  smartwatches  social  socmed  solutions  space  square  sra  startup  summary  support  sysadmin  teaching  technet  technology  the  theory  things  tiff2017  tips  tm351  tpi  trans  transgender  tricks  truepurpose  twitter  uav  uk  under  universal-credit  us_history  ux  vcs  vdc  vdi  video  virtual  webcast  wiki  wikipedia  windows  woman  wordpress  work  workflow  | 

Copy this bookmark: