Three former Ascension Parish high school students with theatrical aspirations recently starred with leading roles in a musical production being hailed as one of the most successful ever at Northwestern State University in Natchitoches.
Source: www.ascensioncitizen.com
This is a win-win situation!'' said Anna York, student body vice president and a student member of the University of Tennessee Board of Trustees. "The students can enjoy our amazing Lady Vols while also having the chance to win free tuition and other ...
Source: www.msnbc.msn.com
A $30 million gift from Herb Alpert will fund a new music school at the University of California, Los Angeles.
Source: www.topix.com
Scottish universities will be allowed to increase their foreign students and forge closer alliances with industry to ensure they can compete with elite English universities
Source: education.guardian.co.uk
Children who are made fun of for being overweight may carry deep psychological scars because of it, according to The Boston Globe. A new Yale University study "found that overweight and obese children who are subjected to verbal taunts and...
Source: blogs.edweek.org
Saturday, November 17, 2007
Oxford University Press Monitoring the Blogosphere for New Words
Labels: Oxford
A short entry on OxfordMail.net says the Oxford University Press is searching the blogosphere to find new words.
Staff at Oxford University Press have started monitoring the use of English in web logs to find new words.
Lexicographers responsible for updating the Oxford English Corpus, which provides the basis for its dictionaries, will trawl through some 70 million 'blogs' in their search.
And with 120,000 new ones created every day, they may be in for quite a search.
A Guardian books blog post also discusses the decision by the Oxford University Press (OUP) to monitor "the use of English in weblogs." They also provide this recently published list from OUP of the 15 most frequently blogged words.
15 Most Frequently Blogged Words: blogger, blog, stupid, me, myself, my, oh, yeah, ok, post, stuff, lovely, update, nice, shit :)
These words don't exactly make us bloggers sound like masters of prose. In addition to scouring the blogosphere for new words the Oxford University Press also has a blog of its very own.
Source: Mark.
Staff at Oxford University Press have started monitoring the use of English in web logs to find new words.
Lexicographers responsible for updating the Oxford English Corpus, which provides the basis for its dictionaries, will trawl through some 70 million 'blogs' in their search.
And with 120,000 new ones created every day, they may be in for quite a search.
A Guardian books blog post also discusses the decision by the Oxford University Press (OUP) to monitor "the use of English in weblogs." They also provide this recently published list from OUP of the 15 most frequently blogged words.
15 Most Frequently Blogged Words: blogger, blog, stupid, me, myself, my, oh, yeah, ok, post, stuff, lovely, update, nice, shit :)
These words don't exactly make us bloggers sound like masters of prose. In addition to scouring the blogosphere for new words the Oxford University Press also has a blog of its very own.
Source: Mark.
Cornell University outlines security and privacy incident response plans
If someone hacks into a Cornell University computer and pulls out personal and private information about members of the Cornell community, the people whose data has been compromised will be notified promptly, according to Cornell Information Technologies and the University Counsel's office.
Although the exact procedures have not been worked out, notification would be by ordinary mail, according to Norma Schwab, associate university counsel. E-mail notification, she said, is not legally adequate and might be unreliable, especially in an age when users are bombarded with "phishing" messages with subject lines like "your account has been compromised."
The notification plan is being developed by an ad hoc group called the Data Incident Response Team, which includes members from the Office of Information Technologies, the Office of University Counsel, Cornell Police and the University Audit Office. The group meets periodically to consider data security policy and comes together whenever there is a concern that sensitive data may have been accessed.
The action is in response to a New York state law, the Information Security Breach and Notification Act, passed in August and going into effect Dec. 8. The law requires any business -- including nonprofits -- that maintains personal and private data to provide notification when its systems are invaded and there is a reasonable belief that personal information might have been revealed. The kinds of data involved include Social Security and driver's license numbers and credit card information, and the notification requirement is intended to help consumers fend off possible identity theft.
"It made sense that we should let people know that we are complying with the new law," said Steve Schuster, director of information security. Schuster said he plans to take advantage of the opportunity to make Cornell staff more aware of their responsibilities to protect sensitive data.
"We're still in a state where our data resides in a lot of different areas," he explained. "We all have to take responsibility for it." In other words, sensitive information is not all on one university mainframe, but may also be on ordinary desktop computers in various departments. Schuster plans to require that all new staff members receive a policy and practices briefing -- a short version of the Travelers of the Electronic Highway course required for new students -- before they are issued net IDs. He hopes eventually to set up some sort of annual review of security procedures for all staff. For nontechnical staff, security measures include using strong passwords, protecting those passwords from disclosure and physically securing the computer.
University policies on security are being updated. The venerable Responsible Use of Electronic Communications policy is being expanded as Responsible Use of Information Technology Resources, and it will incorporate policies on data management and security. Data will be broken into three categories: regulated information for which state and federal laws require security, such as Social Security numbers and grades; "Cornell confidential" information, such as salaries and performance reviews; and public data. Security should be tailored to the level of confidentiality of the data. "It will be necessary for departments to inventory where these data reside in their systems," Schuster said.
Despite having very talented people around, higher education institutions are not immune to security breaks, Schuster pointed out. "In the first six months of 2005 there were 72 media-worthy computer compromises in the United States," he reported, "and slightly over half of them were in higher ed. We deal with break-ins here all the time, but we have a really good process in place."
The New York law, patterned on one passed about two years ago in California, was inspired by several incidents in which large corporate databases were compromised. In the most widely publicized case, ChoicePoint, a credential-verifying firm, allowed criminals to obtain personal data on some 140,000 people. At least 15 states have passed similar laws, and legislation is pending at the federal level.
Source: privacylawyer.ca
Although the exact procedures have not been worked out, notification would be by ordinary mail, according to Norma Schwab, associate university counsel. E-mail notification, she said, is not legally adequate and might be unreliable, especially in an age when users are bombarded with "phishing" messages with subject lines like "your account has been compromised."
The notification plan is being developed by an ad hoc group called the Data Incident Response Team, which includes members from the Office of Information Technologies, the Office of University Counsel, Cornell Police and the University Audit Office. The group meets periodically to consider data security policy and comes together whenever there is a concern that sensitive data may have been accessed.
The action is in response to a New York state law, the Information Security Breach and Notification Act, passed in August and going into effect Dec. 8. The law requires any business -- including nonprofits -- that maintains personal and private data to provide notification when its systems are invaded and there is a reasonable belief that personal information might have been revealed. The kinds of data involved include Social Security and driver's license numbers and credit card information, and the notification requirement is intended to help consumers fend off possible identity theft.
"It made sense that we should let people know that we are complying with the new law," said Steve Schuster, director of information security. Schuster said he plans to take advantage of the opportunity to make Cornell staff more aware of their responsibilities to protect sensitive data.
"We're still in a state where our data resides in a lot of different areas," he explained. "We all have to take responsibility for it." In other words, sensitive information is not all on one university mainframe, but may also be on ordinary desktop computers in various departments. Schuster plans to require that all new staff members receive a policy and practices briefing -- a short version of the Travelers of the Electronic Highway course required for new students -- before they are issued net IDs. He hopes eventually to set up some sort of annual review of security procedures for all staff. For nontechnical staff, security measures include using strong passwords, protecting those passwords from disclosure and physically securing the computer.
University policies on security are being updated. The venerable Responsible Use of Electronic Communications policy is being expanded as Responsible Use of Information Technology Resources, and it will incorporate policies on data management and security. Data will be broken into three categories: regulated information for which state and federal laws require security, such as Social Security numbers and grades; "Cornell confidential" information, such as salaries and performance reviews; and public data. Security should be tailored to the level of confidentiality of the data. "It will be necessary for departments to inventory where these data reside in their systems," Schuster said.
Despite having very talented people around, higher education institutions are not immune to security breaks, Schuster pointed out. "In the first six months of 2005 there were 72 media-worthy computer compromises in the United States," he reported, "and slightly over half of them were in higher ed. We deal with break-ins here all the time, but we have a really good process in place."
The New York law, patterned on one passed about two years ago in California, was inspired by several incidents in which large corporate databases were compromised. In the most widely publicized case, ChoicePoint, a credential-verifying firm, allowed criminals to obtain personal data on some 140,000 people. At least 15 states have passed similar laws, and legislation is pending at the federal level.
Source: privacylawyer.ca
Conte says Bonds doping test no "smoking gun": reports (AFP via Yahoo! News)
BALCO laboratory founder Victor Conte told the Washington Post and the New York Times that the positive doping test cited in the indictment of baseball star Barry Bonds is not a "smoking gun."
Subscribe to:
Posts (Atom)