Tag: <span>南京kb论坛</span>

Marshfield girls track second at Merrill meet

first_imgBy Paul LeckerSports ReporterMERRILL – The Marshfield girls track team placed second in the rain-shortened Otto Bacher Invitational on Friday at Merrill High School.The meet was cut short due to a thunderstorm with the boys and girls 3,200 run and 1,600 relay and the girls pole vault incomplete.Lakeland won the girls team title with 85 points, five more than Marshfield. The Marshfield boys did not compete in the meet. Marshfield had two second-place and six third-place finishes.Taking second for the Tigers were Meg Bryan in the triple jump (33 feet, 11 inches) and Alexa Aumann in the 800 (2:27.52).Individuals taking third for Marshfield were Amy Martorano in the discus (103-0), Katie Osinski in the shot put (33-4), Courtney Brown in the 400 (1:01.99), and Maddie Nikolai in the 300 hurdles (50.20).Also taking third for the Tigers were the 800 relay team of Angelina Dunomes, Aumann, Mariah Goeppinger and Nikolai (1:51.46) and the 400 relay team of Brooke McGrath, Dunomes, Goeppinger and Bryan (52.26).Marshfield has a week off before competing in the Wisconsin Dells Invitational on May 13.(Hub City Times Sports Reporter Paul Lecker is also the publisher of MarshfieldAreaSports.com.)Otto Bacher InvitationalMay 6, at Merrill High SchoolMeet suspended with boys and girls 3,200 run and 1,600 relay, and girls pole vault not completed.GirlsTeam standings: 1. Lakeland 85; 2. Marshfield 80; 3. Medford 67; 4. Wausau East 62.5; 5. Merrill 52; 6. Mosinee 47; 7. Tomahawk 46; 8. Mercer 44; 9. Rhinelander 33; 10. Antigo 20.5; 11. Three Lakes 7; 12. Crandon 1.Winners and Marshfield finishersHigh jump: 1. Emily Scott (LAK) 5-6; 3. (tie) Shantel Nienast (MAR) 4-8.Long jump: 1. Hanna Meyer (TOM) 15-9.5; 4. Brooke McGrath (MAR) 14-9.75.Triple jump: 1. Meyer (TOM) 34-6; 2. Meg Bryan (MAR) 33-11.Discus: 1. Sydney Thompson (MERC) 132-0; 3. Amy Martorano (MAR) 103-0; 9. Katie Osinski (MAR) 80-9.Shot put: 1. Thompson (MERC) 42-10.5; 3. Osinski (MAR) 33-4; 8. Martorano (MAR) 32-0.5.3,200 relay: 1. Rhinelander (Payton Hartman, Gracie Quinn, Alayna Franson, Evan O’Melia) 10:28.42; 4. Marshfield (Ana Jensen, Jocie Anderson, Maddison Clemens, Sophia Schrodi) 11:27.17.100 hurdles: 1. Enne’ Burton (WE) 16.47; 5. Isabelle Denowski (MAR) 18.33.100: 1. Sarah Heinrich (WE) 13.14; 4. Angelina Dunomes (MAR) 13.62.1,600: 1. Lena Brearley (WE) 5:35.21; 7. Lilly O’Brien (MAR) 6:19.46.800 relay: 1. Mosinee (Natalie VanBrocklin, Kira Millhausen, Kiana Pugh, Iris Schira) 1:47.79; 3. Marshfield (Dunomes, Alexa Aumann, Mariah Goeppinger, Maddie Nikolai) 1:51.46.400: 1. Lakyn Kummer (MED) 1:01.07; 3. Courtney Brown (MAR) 1:01.99; 7. Dani Bender (MAR) 1:06.07.400 relay: 1. Mosinee (VanBrocklin, Millhausen, Pugh, Schira) 51.81; 3. Marshfield (McGrath, Bryan, Dunomes, Goeppinger) 52.26.300 hurdles: 1. Burton (WE) 48.08; 3. Nikolai (MAR) 50.20; 8. Jensen (MAR) 54.67; 13. Denowski (MAR) 58.50.800: 1. Eva O’Melia (RH) 2:26.26; 2. Aumann (MAR) 2:27.52; 9. Anderson (MAR) 2:50.74; 13. Molly Schuster (MAR) 2:58.74.200: 1. Scott (LAK) 28.00; 4. Brown (MAR) 30.50; 9. Bryan (MAR) 35.00.BoysTeam standings: 1. Lakeland 163.5; 2. Merrill 108.5; 3. Medford 92; 4. Wausau East 81; 5. Mosinee 45; 6. Three Lakes 43; 7. Antigo 39; 8. Rhinelander 21; 9. Tomahawk 20; 10. Mercer 4; 11. Crandon 3.last_img read more

Four Reasons HR Professionals Should Use an RSS Reader

first_imgWhenever I talk with HR pros about social media and technology, there’s one question that regularly comes up.“How do you find the time to get everything done?”Technology isn’t supposed to make things more complex and time consuming. It’s supposed to help us do our jobs faster and more efficiently. One of the tools I use every day to help me stay on top of what’s happening in my industry and profession is an  RSS reader.Some of you might be wondering – What’s an RSS reader? RSS stands for rich site summary or real simple syndication. Anytime you see one of those orange buttons with what looks like a radio wave, the site has an RSS feed available.RSS allows you to put all of your reading in one location. And it’s not your email inbox. If you’re not currently using RSS, here are a few reasons you might want to consider trying it out.Time – You’re a busy person. You don’t have time to visit websites every day to see what’s new. With RSS, you select your fave sites and when they post something new, it will automatically feed into your reader. Also many readers have apps for your smartphone and/or tablet so you can read away from your office. And others give you the ability to read offline.Productivity – Since RSS readers put content in one place, it allows you to be incredibly productive. Let’s say you want to read ten blogs. And, the last thing you want is to receive ten emails every time the blog updates their content. You shouldn’t have to say, “I’m only going to subscribe to five blogs, because I can only handle five emails.” With an RSS, you can subscribe to as many or as few sites as you wish.Research – Your boss has just asked you to put together a presentation on employee engagement for the Q3 managers meeting. With an RSS, you can flag content from your reader for a future date. So when you see an interesting article on employee engagement, you can tag it for your presentation.Organization – I have varied interests. I like reading business blogs and food blogs. With an RSS, I can organize them so each type of content is separate. I read the business ones first thing in the morning so I’m up on what’s happening. Then the food blogs at night.Before I started writing HR Bartender, I had no idea what RSS was. Over time, I’ve found so many great blogs that I want to read…RSS became a necessity. Alton Brown once said, “Organization will set you free.” It’s true and RSS can help you do it.Do you use an RSS reader? Let us know which one in the comments.last_img read more

Cloud Conversations: How and Where Do You Secure the Cloud

first_imgHeading to the Cloud Hotel? Consider your security issues.Here is an analogy for looking at security in the cloud: a multi-tenant hotel. I’m sure the analogy will break down at some point, but it seems to work at this point.When you’re moving applications into a cloud environment, it’s a bit like renting a hotel room from a distance, sight unseen. You want to be sure you select a safe building, in a safe neighborhood, and with building management you can trust. To that end, you have certain security expectations for the hotel owner and onsite management.Let’s look at these expectations.Building security [Security policies]. Like the hotel owner, the cloud provider is responsible for basic security, such as protection of the perimeter of the site and controlling access to the building. The hotel owner can be held liable if he fails to meet these obligations. We are only just beginning to see contractual terms from cloud providers along these lines. As the cloud tenant, you are responsible for the applications and data kept in your rented room. You set the policies dictating who can go into the room and under what circumstances, and what they can do while they are in the room.Hotel design and maintenance [Trusted configurations]. The hotel is responsible for designing a secure facility and maintaining it in such a way as to maintain that level of security (or better). The cloud provider is responsible for maintaining IT configurations in accordance with trusted, verifiable policies that are defined in advance.Safe hotel environment [Hardware root of trust]. The hotel owner must ensure that the hotel is operated in a safe and secure manner. Renting a room in a hotel, I really want to be certain that I am getting the room I expect in the location I expect. Likewise, the cloud owner must provide proof that he is maintaining a safe, secure IT environment. This responsibility includes hardware-level protections that attest to the configuration of the hypervisors and enable the isolation and safe migration of virtual machines.Hotel key cards [Data encryption]. When you rent a hotel room, you take responsibility for the valuables left in your room. The same holds true with the cloud. As the cloud renter, you are responsible for maintaining the security of your data while it is at rest in your room or moving to or from the room. These days, the only data I leave in my hotel room is encrypted.Hotel access logs [Auditing]. To make the bean counters happy, hotel owners get audited to ensure they are meeting required safety and security guidelines. Similarly, users of cloud servers need to be able to audit their configurations to confirm that they are built according to the guidelines. The cloud owner gets audited for compliance with various requirements, such as ISO 27002 for information security and SAS 70 for maintenance of internal controls. As the cloud tenant, you get audited for compliance with the standards of your industry, such PCI-DSS for credit card transactions and HIPAA (Health Insurance Portability and Accountability Act) for medical records.Those are all just some of the security concerns based on this analogy. There are, of course, many other things to consider when you rent a room at the Cloud Hotel, such as power, cooling, and access to high-speed networking, to name just a few areas of concern.last_img read more

Usability and Security: Two Key Ingredients in a Healthy Solution Recipe

first_imgWhen security technologies are introduced together with usability improvements in healthcare solutions they have a much greater chance of being approved and winning acceptance by healthcare workers. This is in contrast to introducing security technologies into healthcare organizations without usability improvements which at best have no usability impact, and may in fact have negative usability impact. In my last blog, Improving Healthcare Solution Usability with Single Sign-On, I describe how too many layers of login is one of the most cumbersome usability challenges that compels healthcare workers to do risky workarounds out of compliance with privacy and security policy. Single Sign On (SSO) solutions provide a solution that can greatly reduce the number of sets of credentials as well as the number of actual logins required by healthcare workers during their day, providing major usability benefits. When such a solution is combined with more usable forms of multi-factor authentication such as wireless proximity cards (RFID, NFC or other) it can greatly improve both security and usability. In this type of solution once the healthcare worker has logged into a device they can start up multiple apps within their session without having to re-authenticate to each app. As more healthcare apps are integrated with such a SSO solution the number of separate credentials needed for the healthcare worker can be reduced, eventually to a single set of credentials required to login to the SSO solution.Many SSO solutions also enable healthcare organizations to implement policy where the first login of the day requires 2 factors, perhaps the proximity card and a password, but thereafter as long as the clinician authenticates at another point in the network with their proximity card within a configurable amount of time defined by policy, eg 2 hours, then the proximity card alone is sufficient to authenticate and no password is required. This effectively enables the clinician to move between devices throughout the day with a simple tap of their proximity card.SSO may also provide patient context sharing where different healthcare apps running in the same session track the same patient automatically so a clinician that searches and finds a patient in the Electronic Health Record (EHR) system can then switch over to a Picture Archiving and Communication System (PACS) and it has already automatically found the same patient, freeing the clinician from having to search for the patient again in each application. Such patient context capability may be based on the Clinical Context Object Workgroup (CCOW) standard. Clearly another major usability benefit that also mitigates risk of a clinician accidentally looking at different patients across different apps.Just as important as easy login is minimizing risk of a live session being hijacked once the authenticated healthcare worker moves away from the device with the open live session. This can be done by setting an inactivity timeout to a low number of minutes, which in practice is workable from a usability standpoint since a simple tap of the wireless proximity card gets the healthcare worker back into their session. In the future technologies such as facial recognition may also enable the device to detect when the healthcare worker moves away, closing the session automatically and further reducing the window of opportunity for session hijacking.Biometrics holds promise in further freeing the healthcare worker from having a wireless proximity card. This is especially compelling in healthcare where not having to touch anything can be a significant healthcare improvement since healthcare workers need to keep sterile hands. To achieve this improvement biometrics need to be both highly reliable and resilient to spoofing. For example viable facial recognition would need to have negligibly low false accept and false reject rates, and would have to be able to detect if a face in front of a device was a picture or a real person. Several strategies are emerging for this including multiple cameras able to detect depth, and facial recognition strategies that require some motion such as blinking to ensure the subject is not a static picture. The reality in healthcare is many healthcare workers, such as doctors working in multiple healthcare organizations, need separate credentials for each organization, and in a worst case a separate proximity card for each facility. As more healthcare organizations implement biometrics this has potential to reduce the number of tokens such as proximity cards required by a given healthcare worker. Furthermore, strategic initiatives such as National Strategy for Trusted Identities in Cyberspace (NSTIC) have the potential to separate Identity Providers from Service Providers where healthcare workers have one set of credentials to authenticate with the Identity Provider and could then access multiple Service Providers such as healthcare organizations without having to be issued a separate set of credentials from each healthcare organization.Another technology that holds major promise is virtualization with “follow me session” where a healthcare worker that has logged into a given device to start up a secure session, started up healthcare apps within their session, and located a given patient medical record, may then move to another device, login and get access to the same session without having to start the apps and search for that patient again. This becomes particularly compelling as the number and types of devices healthcare workers use increases and their use cases require them to move between the devices seamlessly. This capability can also be especially beneficial where healthcare workers must use many shared workstations throughout their day and switching of devices is frequent even within a given patient encounter. Along with this type of compute model one can do centralized patching and management, leading to major security, manageability and operational efficiency benefits. Where virtualized healthcare clients running on mobile devices have the ability for secure local storage of limited healthcare data, for example just records for the patients a healthcare worker will see that day, they enable healthcare workers to be productive even in areas lacking network coverage or performance, such as rural areas or patient homes. This improved availability is particularly important has healthcare becomes more decentralized.What kinds of solutions that combine usability and security improvements are you seeing in your healthcare organization?last_img read more

Team India’s victory: Congratulatory tweets flood Twitter

first_imgCongratulatory messages poured in from all corners as former cricket stars took to social media to applaud India’s resounding win against Bangladesh in the World Cup quarter-finals, on Thursday. Australian pace legend Glenn McGrath is amazed at the one-sided games so far in the knockout stage and hopes that his country also has it easy against Pakistan in the third quarterfinals on Friday. “Well played @BCCI on a convincing win over @BCBtigers Both quarter finals have been one sided. Will the trend continue tomorrow?,” McGrath tweeted just after India’s 109-run win at the MCG.Well played @OfficialCSA on a dominate win over @OfficialSLC Sad to see the legends @KumarSanga2 @MahelaJay finish their one day careers Glenn McGrath (@glennmcgrath11) March 18, 2015India now await the winner of the Australia-Pakistan clash in the semi-finals and former Aussie top-order batsman Damien Martyn feels that the ‘Men in Blue’ are in dangerous form for any side that moves into the last-four stage.”A fantastic display today by @BCCI far to good in all areas. They are a side in very dangerous form leading into the S/F,” Martyn said on twitter.A fantastic display today by @BCCI far to good in all areas. They are a side in very dangerous form leading into the S/F @cricketworldcup Damien Martyn (@dmartyn30) March 19, 2015Former India captain Bishen Singh Bedi was indeed pleased with India’s clinical showing but advised Bangladesh not to lose heart after going down to the defending champions.”Well done India once again terrific team effort. Keep up the gr8 work lads & do us all PROUD!God Bless!!”, the spinning great tweeted.advertisement”Bangladesh lost 2 World Cup holders. No disgrace in that at all!!Reaching quarters 1st ever time was an achievement in itself!!,” he said in another tweet.Another spin king Anil Kumble was not only appreciative of India’s efforts but also hailed skipper Mahendra Singh Dhoni, who achieved the feat of registering 100 ODI wins as captain.”Great knock @ImRo45 well done team India. In SF now. Congrats @msdhoni on your 100 victory. Make it 102!!!! This cwc2015,” Kumble said on twitter.Great knock @ImRo45 well done team India. In SF now. Congrats @msdhoni on your 100 victory. Make it 102!!!! This cwc2015 Anil Kumble (@anilkumble1074) March 19, 2015Former India batsman VVS Laxman also praised the team in a series of tweets and had a word of appreciation for the young Bangladesh side.”Congrats India for winning the quarterfinal in a comprehensive manner.The bowlers keep improving & impressing.Clinical performance #CWC2015.” “Bangladesh may have lost the QF but they should b proud of their performance& the way their youngsters played in this World Cup.Good luck:),” Laxman wrote on his twitter handle.Congrats India for winning the quarterfinal in a comprehensive manner.The bowlers keep improving & impressing.Clinical performance #CWC2015 VVS Laxman (@VVSLaxman281) March 19, 2015Indian cricket icon Sachin Tendulkar also expressed his happiness over the way Dhoni’s side outplayed Bangladesh in all the departments. Praising the Rohit Sharma’s match-winning 137, Sachin, who was part of the teams 2011 triumph Mumbai, also hopes that India can defend their title successfully.”Terrific all round performance team India. Keep it going for two more matches. Loved the attitude on the field and the execution of the plans. Congratulations @ImRo45 on a well constructed 100 and great job by the bowling unit #CWC15,” tweeted the batting maestro.last_img read more