Monthly archives: January, 2019

LinkedIn 2019 Talent Trends: Soft Skills, Transparency and Trust

Global Industry Analyst Josh Bersin addresses critical employee workplace analysis validating people skills as highly rated employer HR and talent requirements. In professions for whom continuous delivery of outstanding customer services using collaborative and dynamic team efforts is the norm, Bersin’s data driven analysis is a benchmark to expand upon organizational mission, vision and values.

Subjects: AI, Communication Skills, KM, Leadership, Management

Pete Recommends – Weekly highlights on cyber security issues January 26 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: News outle’s email security gap; On Facebook and Twitter your privacy is at risk — even if you don’t have an account; The Smart TV Crapware Era Has Already Begun; and Mastercard Makes It Easier to Quit Free Trials.

Subjects: Cybersecurity, Email Security, Financial System, Privacy, Social Media

10 x 10: 100 Insightful KM Resources

KM expert Stan Garfield shares ten categories of KM resources, each with ten links to useful sources of knowledge about the field. The ten resources in each category are recommended starting points for those who want to learn more about KM. Each category heading is linked to a more extensive list for greater exploration.

Subjects: KM

Tax Fraud By The Numbers: The Trump Timeline

Former CPA, writer and teacher Ken Boyd provides readers with an explanation of tax fraud that is clearly presented, instructive and relevant to the ongoing Mueller investigation. Boyd uses the extensive New York Times investigative report of November 2018 that documented a history of tax fraud allegedly committed by Donald Trump, his father and siblings, as the foundation for his lesson on various types of tax fraud. The allegations documented by the Times are under review by the New York State Department of Taxation and Finance.

Subjects: Business Research, Legal Research, Legal Research Training, Public Records, Securities Law, Tax

Deep Web Research and Discovery Resources 2019

How big is the Deep Web? It is estimated to comprise 7,500 terabytes – although an exact size is not known, and the figures vary widely on this question. The magnitude, complexity and siloed nature of the Deep Web is a challenge for researchers. You cannot turn to one specific guide or one search engine to effectively access the vast range of information, data, files and communications that comprise it. The ubiquitous search engines index, manage and deliver results from the Surface web. These search results include links, data, information, reports, news, subject matter content and a large volume of advertising that is optimized to increase traffic to specific sites and support marketing and revenue focused objectives. On the other hand, the Deep Web – which is often misconstrued as a repository of dark and disreputable information [Note – it is not the Dark Web], has grown tremendously beyond that characterization to include significant content on a wide range of subject matters covering a broad swath of files and formats, databases, pay-walled content as well as communications and web traffic that is not otherwise accessible through the surface Web. This comprehensive multifaceted guide by Marcus Zillman providers you with an abundance of resources to learn about, search, apply appropriate privacy protections, and maximize your time and efforts to conduct effective and actionable research within the Deep Web.

Subjects: Big Data, Business Research, Competitive Intelligence, Discovery, Encryption, Privacy, Search Engines, Search Strategies

Pete Recommends – Weekly highlights on cyber security issues January 19 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Trick for turning your iPhone and AirPods into live spy mic goes viral; .gov security falters during U.S. shutdown; Countering Russian disinformation the Baltic nations’ way; and Why the US Government Is Terrified of Hobbyist Drones.

Subjects: Court Resources, Cybersecurity, E-Government, Privacy, Spyware

Pete Recommends – Weekly highlights on cyber security issues January 12 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. four highlights from this week: The Privacy Risks of Public Location (Meta)Data; Western companies send old servers full of sensitive info to foreign countries; NSA to release a free reverse engineering tool; and Protecting Consumers and Businesses from Fraudulent Robocalls.

Subjects: Civil Liberties, Cybersecurity, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues January 5, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – five significant highlights of this week’s column: Swamped by cyberthreats, citizens need government protection; How to recover from cybersecurity incidents: A 5-step plan; How much Facebook knows about you; Anonymous Patient Data May Not Be as Private as Previously Thought; and Opinion | Our Cellphones Aren’t Safe.

Subjects: AI, Cybercrime, Cybersecurity, Healthcare, Insurance Law, Social Media