Saturday, October 12, 2019

Netiquette IQ Important Technical Term - Cognitive Computing



cognitive computing from whatis.com
Cognitive computing is the use of computerized models to simulate the human thought process in complex situations where the answers may be ambiguous and uncertain. The phrase is closely associated with IBM's cognitive computer system, Watson. Cognitive computing overlaps with AI and involves many of the same underlying technologies, including expert systems, neural networks, robotics and virtual reality (VR).
How cognitive computing works
Cognitive computing systems can synthesize data from various information sources, while weighing context and conflicting evidence to suggest the best possible answers. To achieve this, cognitive systems include self-learning technologies that use data mining, pattern recognition and natural language processing (NLP) to mimic the way the human brain works.
Using computer systems to solve the types of problems that humans are typically tasked with requires vast amounts of structured and unstructured data, fed to machine learning algorithms. Over time, cognitive systems are able to refine the way they identify patterns and the way they process data to become capable of anticipating new problems and model possible solutions.
To achieve those capabilities, cognitive computing systems must have five key attributes, as listed by the Cognitive Computing Consortium.
Adaptive: Cognitive systems must be flexible enough to learn as information changes and as goals evolve. The systems must be able to digest dynamic data in real time and make adjustments as the data and environment change.
Interactive: Human-computer interaction (HCI) is a critical component in cognitive systems. Users must be able to interact with cognitive machines and define their needs as those needs change. The technologies must also be able to interact with other processors, devices and cloud platforms.
Iterative and stateful: Cognitive computing technologies can also identify problems by asking questions or pulling in additional data if a stated problem is vague or incomplete. The systems do this by maintaining information about similar situations that have previously occurred.
Contextual: Understanding context is critical in thought processes, and so cognitive systems must also understand, identify and mine contextual data, such as syntax, time, location, domain, requirements, a specific user's profile, tasks or goals. They may draw on multiple sources of information, including structured and unstructured data and visual, auditory or sensor data.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
.

October as official month By Lahle Wolfe
Updated January 14, 2019
If you're Italian-American, if you're a ​cookbook author, or, if you're a country music artist, then October is the month for you. That's because October is National Italian-American Heritage Month, Cook Book Author Month, and Country Music Month, as well as (the more serious) National Cholesterol Month. The United States is very prolific at creating "national month" events. In addition to businesses (from major corporations to local ma and pa shops) numerous worthwhile organizations and special interest groups establish a promotion during a calendar month to get their name and message out to the public.
In addition to fostering awareness, creating a national month designation is an excellent way to celebrate a nationality, a religion, an interest, or a cause. 
While you may not want to hug a "Texas chef" or believe that vegetarian and pork lovers should celebrate their food preference in different months, you'll definitely find something in October to celebrate or pay attention to.
The following events are observed every year for the entire calendar month.
October Is "National Month" Calendar
  • All American Breakfast Month
  • Better Breakfast Month
  • Computer Learning Month
  • Cook Book Month
  • Country Music Month
  • Disability Employment Awareness Month
  • Diversity Awareness Month
  • Emergency Care Month
  • Family History Month
  • German-American Heritage Month
  • Gourmet Adventures Month
  • Hunger Awareness Month
  • Hug a Texas Chef Month
  • Lesbian, Gay, and Bisexual History Month
  • Mom & Apple Pie Month
  • National AIDS Awareness Month
  • National Apple Month
  • National Applejack Month
  • National Book Fair Month
  • National Car Care Month
  • National Caramel Month
  • National Collegiate Alcohol Awareness Month
  • National Cookie Month
  • National Cosmetology Month
  • National Country Ham Month
  • National Depression Education and Awareness Month
  • National Dessert Month
  • National Health Care Food Service Month
  • National Hispanic Heritage Month (Mexico): September 15th-October 15th
  • National Kitchen and Bath Month
  • National Pasta Month
  • National Pickled Peppers Month
  • National Pizza Month
  • National Popcorn Poppin' Month
  • National Pork Month
  • National Pretzel Month
  • National Restaurant Hospitality Month
  • National Seafood Month
  • National Stamp Collecting Month (Canada)
  • National Biscuit Month
  • National Breast Cancer Awareness Month
  • National Chicken Month
  • National Cholesterol Awareness Month
  • National Courtesy Month
  • National Disability Employment Awareness Month
  • National Hispanic Month
  • National Honey Month
  • National Italian-American Heritage Month
  • National Mental Illness Awareness Month
  • National Mushroom Month
  • National Organic Harvest Month
  • National Papaya Month (also, June)
  • National Piano Month
  • National Potato Month
  • National Rice Month
  • National Roller Skating Month
  • National Sight Saving Month
  • National Spinach-Lovers' Month
  • National Toilet Tank Repair Month
  • Polish-American Heritage Month
  • Self-Improvement Month
  • Vegetarian Awareness Month
  • Women of Achievement Month
  • Women's History Month (Canada)

+++++++++++++++++++++++++++++++++++++++++++++++++++


09/30/2019 05:09 PM EDT


Original release date: September 30, 2019
October is National Cybersecurity Awareness Month (NCSAM), which is a collaborative effort between the Cybersecurity and Infrastructure Security Agency (CISA) and its public and private partners—including the National Cyber Security Alliance (NCSA)—to ensure every American has the resources they need to stay safe and secure online while increasing the resilience of the Nation against cyber threats. This year’s theme, “Own IT. Secure IT. Protect IT.,” focuses on promoting personal accountability and positive behavior when it comes to cybersecurity.
CISA encourages organizations to see the NCSAM 2019 webpage and the NCSAM 2019 Toolkit
Paul, every year millions of Americans find themselves unable to vote because they miss a registration deadline, don’t update their registration, or aren’t sure how to register.

Our partners at Vote Forward have made it easy to contact historically under-represented, not-yet-registered voters living in key 2020 swing states to provide them with everything they need to register to vote.

Click the link to set up an account or sign in, then scroll down to the second row of options and choose one of the campaigns that includes voter registration forms.


+++++++++++++++++++++++++++++++++++++++++++++++++






air gapping
Air gapping is a security measure that involves physically isolating a computer or network to prevent it from connecting directly or wirelessly to other systems that can connect to the Internet. Air gapping is used to protect many types of critical systems, including those that support the stock market, the military, the government and industrial power industries.
To prevent unauthorized data extrusion through electromagnetic or electronic exploits, there must be a specified amount of space between the air-gapped system and outside walls and between its wires and the wires for other technical equipment. In the United States, the U.S. National Security Agency TEMPEST project provides best practices for using air gaps as a security measure.

For a system with extremely sensitive data, a Faraday cage can be used to prevent electromagnetic radiation (EMR) escaping from the air-gapped equipment. Although such measures may seem extreme, van Eck phreaking can be used to intercept data such as key strokes or screen images from demodulated EMR waves, using special equipment from some distance away. Other proof-of-concept (POC) attacks for air- gapped systems have shown that electromagnetic emanations from infected sound cards on isolated computers can be exploited and continuous wave irradiation can be used to reflect and gather information from isolated screens, keyboards and other computer components.

As of this writing, the Defense Advanced Research Projects Agency (DARPA) is awarding grants for prototype hardware and software designs that will keep sensitive data physically isolated. The grants are made possible under the Guaranteed Architecture for Physical Security (GAPS) program.

Enhancing air-gapped security measures

The problem with physical separation as a security technique is that, as complexity increases in some system or network to be isolated, so does the likelihood that some unknown or unauthorized external connection will arise.

Perhaps the most important way to protect a computing device or network from an air gap attack is through end user security awareness training. The infamous Stuxnet worm, which was designed to attack air-gapped industrial control systems, is thought to have been introduced by infected thumb drives found by employees or obtained as free giveaways.
The software-defined perimeter (SDP) framework is another tool network engineers can use to create a type of "virtual air gapping" through policy enforcement. SDP requires external endpoints that want to access internal infrastructure to comply with authentication policies and ensures that only authenticated systems can see internal IP addresses.


In my books, noted below, I often lament about the lack of civility, deterioration of written communication and abuse of the power of the Internet. Electronic communication, in my opinion, breeds negativity and behavior which does not exist in direct communication. 

The following is an except from my first book which addresses angry email replies.

Enjoy the article and check out the website!
================================================== 

======================    
 For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================


Wednesday, October 9, 2019

Technical Definitions - 6G Networks


6G
https://cdn.ttgtmedia.com/rms/onlineImages/rouse_margaret.jpg
Posted by: Margaret Rouse
Contributor(s): Gerry Christensen
6G (sixth-generation wireless) is the successor to 5G cellular technology. 6G networks will be able to use higher frequencies than 5G networks and provide substantially higher capacity and much lower latency. One of the goals of the 6G Internet will be to support one micro-second latency communications, representing 1,000 times faster -- or 1/1000th the latency -- than one millisecond throughput.
The 6G technology market is expected to facilitate large improvements in the areas of imaging, presence technology and location awareness. Working in conjunction with AI, the computational infrastructure of 6G will be able to autonomously determine the best location for computing to occur; this includes decisions about data storage, processing and sharing
Advantages of 6G over 5G
6G is expected to support 1 terabyte per second (Tbps) speeds. This level of capacity and latency will be unprecedented and will extend the performance of 5G applications along with expanding the scope of capabilities in support of increasingly new and innovative applications across the realms of wireless cognition, sensing and imaging. 6G's higher frequencies will enable much faster sampling rates in addition to providing significantly better throughput. The combination of sub-mmWave (e.g. wavelengths smaller than one millimeter) and the use of frequency selectivity to determine relative electromagnetic absorption rates is expected to lead to potentially significant advances in wireless sensing solutions.
Additionally, whereas the addition of mobile edge computing (MEC) is a point of consideration as an addition to 5G networks, MEC will be built into all 6G networks. Edge and core computing will become much more seamlessly integrated as part of a combined communications/computation infrastructure framework by the time 6G networks are deployed. This will provide many potential advantages as 6G technology becomes operational, including improved access to artificial intelligence (AI) capabilities.
When to expect 6G
6G is expected to launch commercially in 2030. 6G is being developed in response to the increasingly distributed radio access network (RAN) and the desire to take advantage of the terahertz (THz) spectrum to increase capacity and lower latency. While some early discussions have taken place to define 6G, research and development (R&D) activities will start in earnest in 2020. Many of the problems associated with deploying millimeter wave (MM wave) radio for 5G new radio are expected to be solved in time for network designers to address the challenges of 6G.
What 6G will look like
It's expected that 6G wireless sensing solutions will selectively use different frequencies to measure absorption and adjust frequencies accordingly. This is possible because atoms and molecules emit and absorb electromagnetic radiation at characteristic frequencies and the emission and absorption frequencies are the same for any given substance.
6G will have big implications for many government and industry solutions in public safety and critical asset protection such as:
· Threat detection
· Health monitoring
· Feature and facial recognition
· Decision making (in areas like law enforcement and social credit systems)
· Air quality measurements
· Gas and toxicity sensing
Do we even need 6G?
More than ever before, the sixth generation of cellular wireless communications will integrate a set of previously disparate technologies, including deep learning and big data analytics. The introduction of 5G paves the way for much of this convergence.
The need to deploy edge computing to ensure overall throughput and low latency for ultra-reliable, low latency communications solutions is an important driver for 6G, as is the need to support machine-to-machine communication in the internet of things (IoT).  Furthermore, a strong relationship has been identified between future 6G solutions and high-performance computing (HPC). While some of the IoT device data will be handled by edge computing resources, much of it will require processing by more centralized HPC resources.
Who is working on it?
The race to 6G will draw the attention of many industry constituents, such as major test and measurement vendor Keysight Technologies who has also indicated a commitment to its development. This may very well make the race to reach 5G supremacy look minor compared to the wait to see which countries can dominate the 6G technology market and its related applications, services and solutions.
· The University of Oulu in Finland is committed to a 6G research initiative referred to as 6Genesis. The project will be conducted for the next eight years and will develop a vision for 2037.
· SGHz) to 3 THz.
In terms of vendor commitments to 6G, major infrastructure companies such as Huawei, Nokia and Samsung have all signaled that they have R&D in the works.
Future scope
About ten years ago, the phrase 'Beyond 4G' (B4G) was coined to refer to the need to move beyond what was currently envisioned as part of the evolution for 4G via the LTE standard. Since it was not clear what 5G might entail, and only pre-standards R&D level prototypes were in the works at the time, the term B4G lasted for a while, referring to what could be possible and potentially useful beyond 4G. Somewhat ironically, the LTE standard is still evolving itself and some aspects will be used in 5G.
· outh Korea’s Electronics and Telecommunications Research Institute is conducting research
· on Terahertz band for 6G and envisions making it 100 times faster than 4G LTE networks and 5 times faster than 5G networks.
· The Ministry of Industry and Information Technology (MIIT) in China is directly investing and monitoring the research and development process.
The United States is planning to open up 6G frequency for R&D purposes pending approval from the Federal Communications Commission (FCC) for frequencies over 95 gigahertz .

October as official month By Lahle Wolfe
Updated January 14, 2019
If you're Italian-American, if you're a ​cookbook author, or, if you're a country music artist, then October is the month for you. That's because October is National Italian-American Heritage Month, Cook Book Author Month, and Country Music Month, as well as (the more serious) National Cholesterol Month. The United States is very prolific at creating "national month" events. In addition to businesses (from major corporations to local ma and pa shops) numerous worthwhile organizations and special interest groups establish a promotion during a calendar month to get their name and message out to the public.
In addition to fostering awareness, creating a national month designation is an excellent way to celebrate a nationality, a religion, an interest, or a cause. 
While you may not want to hug a "Texas chef" or believe that vegetarian and pork lovers should celebrate their food preference in different months, you'll definitely find something in October to celebrate or pay attention to.
The following events are observed every year for the entire calendar month.
October Is "National Month" Calendar
  • All American Breakfast Month
  • Better Breakfast Month
  • Computer Learning Month
  • Cook Book Month
  • Country Music Month
  • Disability Employment Awareness Month
  • Diversity Awareness Month
  • Emergency Care Month
  • Family History Month
  • German-American Heritage Month
  • Gourmet Adventures Month
  • Hunger Awareness Month
  • Hug a Texas Chef Month
  • Lesbian, Gay, and Bisexual History Month
  • Mom & Apple Pie Month
  • National AIDS Awareness Month
  • National Apple Month
  • National Applejack Month
  • National Book Fair Month
  • National Car Care Month
  • National Caramel Month
  • National Collegiate Alcohol Awareness Month
  • National Cookie Month
  • National Cosmetology Month
  • National Country Ham Month
  • National Depression Education and Awareness Month
  • National Dessert Month
  • National Health Care Food Service Month
  • National Hispanic Heritage Month (Mexico): September 15th-October 15th
  • National Kitchen and Bath Month
  • National Pasta Month
  • National Pickled Peppers Month
  • National Pizza Month
  • National Popcorn Poppin' Month
  • National Pork Month
  • National Pretzel Month
  • National Restaurant Hospitality Month
  • National Seafood Month
  • National Stamp Collecting Month (Canada)
  • National Biscuit Month
  • National Breast Cancer Awareness Month
  • National Chicken Month
  • National Cholesterol Awareness Month
  • National Courtesy Month
  • National Disability Employment Awareness Month
  • National Hispanic Month
  • National Honey Month
  • National Italian-American Heritage Month
  • National Mental Illness Awareness Month
  • National Mushroom Month
  • National Organic Harvest Month
  • National Papaya Month (also, June)
  • National Piano Month
  • National Potato Month
  • National Rice Month
  • National Roller Skating Month
  • National Sight Saving Month
  • National Spinach-Lovers' Month
  • National Toilet Tank Repair Month
  • Polish-American Heritage Month
  • Self-Improvement Month
  • Vegetarian Awareness Month
  • Women of Achievement Month
  • Women's History Month (Canada)

+++++++++++++++++++++++++++++++++++++++++++++++++++


09/30/2019 05:09 PM EDT


Original release date: September 30, 2019
October is National Cybersecurity Awareness Month (NCSAM), which is a collaborative effort between the Cybersecurity and Infrastructure Security Agency (CISA) and its public and private partners—including the National Cyber Security Alliance (NCSA)—to ensure every American has the resources they need to stay safe and secure online while increasing the resilience of the Nation against cyber threats. This year’s theme, “Own IT. Secure IT. Protect IT.,” focuses on promoting personal accountability and positive behavior when it comes to cybersecurity.
CISA encourages organizations to see the NCSAM 2019 webpage and the NCSAM 2019 Toolkit
Paul, every year millions of Americans find themselves unable to vote because they miss a registration deadline, don’t update their registration, or aren’t sure how to register.

Our partners at Vote Forward have made it easy to contact historically under-represented, not-yet-registered voters living in key 2020 swing states to provide them with everything they need to register to vote.

Click the link to set up an account or sign in, then scroll down to the second row of options and choose one of the campaigns that includes voter registration forms.


+++++++++++++++++++++++++++++++++++++++++++++++++






air gapping
Air gapping is a security measure that involves physically isolating a computer or network to prevent it from connecting directly or wirelessly to other systems that can connect to the Internet. Air gapping is used to protect many types of critical systems, including those that support the stock market, the military, the government and industrial power industries.
To prevent unauthorized data extrusion through electromagnetic or electronic exploits, there must be a specified amount of space between the air-gapped system and outside walls and between its wires and the wires for other technical equipment. In the United States, the U.S. National Security Agency TEMPEST project provides best practices for using air gaps as a security measure.

For a system with extremely sensitive data, a Faraday cage can be used to prevent electromagnetic radiation (EMR) escaping from the air-gapped equipment. Although such measures may seem extreme, van Eck phreaking can be used to intercept data such as key strokes or screen images from demodulated EMR waves, using special equipment from some distance away. Other proof-of-concept (POC) attacks for air- gapped systems have shown that electromagnetic emanations from infected sound cards on isolated computers can be exploited and continuous wave irradiation can be used to reflect and gather information from isolated screens, keyboards and other computer components.

As of this writing, the Defense Advanced Research Projects Agency (DARPA) is awarding grants for prototype hardware and software designs that will keep sensitive data physically isolated. The grants are made possible under the Guaranteed Architecture for Physical Security (GAPS) program.

Enhancing air-gapped security measures

The problem with physical separation as a security technique is that, as complexity increases in some system or network to be isolated, so does the likelihood that some unknown or unauthorized external connection will arise.

Perhaps the most important way to protect a computing device or network from an air gap attack is through end user security awareness training. The infamous Stuxnet worm, which was designed to attack air-gapped industrial control systems, is thought to have been introduced by infected thumb drives found by employees or obtained as free giveaways.
The software-defined perimeter (SDP) framework is another tool network engineers can use to create a type of "virtual air gapping" through policy enforcement. SDP requires external endpoints that want to access internal infrastructure to comply with authentication policies and ensures that only authenticated systems can see internal IP addresses.


In my books, noted below, I often lament about the lack of civility, deterioration of written communication and abuse of the power of the Internet. Electronic communication, in my opinion, breeds negativity and behavior which does not exist in direct communication. 

The following is an except from my first book which addresses angry email replies.

Enjoy the article and check out the website!
================================================== 

======================    
 For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================



October as official month By Lahle Wolfe
Updated January 14, 2019 
If you're Italian-American, if you're a ​cookbook author, or, if you're a country music artist, then October is the month for you. That's because October is National Italian-American Heritage Month, Cook Book Author Month, and Country Music Month, as well as (the more serious) National Cholesterol Month. The United States is very prolific at creating "national month" events. In addition to businesses (from major corporations to local ma and pa shops) numerous worthwhile organizations and special interest groups establish a promotion during a calendar month to get their name and message out to the public.
 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++=
In addition to fostering awareness, creating a national month designation is an excellent way to celebrate a nationality, a religion, an interest, or a cause. 
While you may not want to hug a "Texas chef" or believe that vegetarian and pork lovers should celebrate their food preference in different months, you'll definitely find something in October to celebrate or pay attention to.
The following events are observed every year for the entire calendar month.
October Is "National Month" Calendar
  • All American Breakfast Month
  • Better Breakfast Month
  • Computer Learning Month
  • Cook Book Month
  • Country Music Month
  • Disability Employment Awareness Month
  • Diversity Awareness Month
  • Emergency Care Month
  • Family History Month
  • German-American Heritage Month
  • Gourmet Adventures Month
  • Hunger Awareness Month
  • Hug a Texas Chef Month
  • Lesbian, Gay, and Bisexual History Month
  • Mom & Apple Pie Month
  • National AIDS Awareness Month
  • National Apple Month
  • National Applejack Month
  • National Book Fair Month
  • National Car Care Month
  • National Caramel Month
  • National Collegiate Alcohol Awareness Month
  • National Cookie Month
  • National Cosmetology Month
  • National Country Ham Month
  • National Depression Education and Awareness Month
  • National Dessert Month
  • National Health Care Food Service Month
  • National Hispanic Heritage Month (Mexico): September 15th-October 15th
  • National Kitchen and Bath Month
  • National Pasta Month
  • National Pickled Peppers Month
  • National Pizza Month
  • National Popcorn Poppin' Month
  • National Pork Month
  • National Pretzel Month
  • National Restaurant Hospitality Month
  • National Seafood Month
  • National Stamp Collecting Month (Canada)
  • National Biscuit Month
  • National Breast Cancer Awareness Month
  • National Chicken Month
  • National Cholesterol Awareness Month
  • National Courtesy Month
  • National Disability Employment Awareness Month
  • National Hispanic Month
  • National Honey Month
  • National Italian-American Heritage Month
  • National Mental Illness Awareness Month
  • National Mushroom Month
  • National Organic Harvest Month
  • National Papaya Month (also, June)
  • National Piano Month
  • National Potato Month
  • National Rice Month
  • National Roller Skating Month
  • National Sight Saving Month
  • National Spinach-Lovers' Month
  • National Toilet Tank Repair Month
  • Polish-American Heritage Month
  • Self-Improvement Month
  • Vegetarian Awareness Month
  • Women of Achievement Month
  • Women's History Month (Canada)

+++++++++++++++++++++++++++++++++++++++++++++++++++


09/30/2019 05:09 PM EDT


Original release date: September 30, 2019
October is National Cybersecurity Awareness Month (NCSAM), which is a collaborative effort between the Cybersecurity and Infrastructure Security Agency (CISA) and its public and private partners—including the National Cyber Security Alliance (NCSA)—to ensure every American has the resources they need to stay safe and secure online while increasing the resilience of the Nation against cyber threats. This year’s theme, “Own IT. Secure IT. Protect IT.,” focuses on promoting personal accountability and positive behavior when it comes to cybersecurity.
CISA encourages organizations to see the NCSAM 2019 webpage and the NCSAM 2019 Toolkit
Paul, every year millions of Americans find themselves unable to vote because they miss a registration deadline, don’t update their registration, or aren’t sure how to register.

Our partners at Vote Forward have made it easy to contact historically under-represented, not-yet-registered voters living in key 2020 swing states to provide them with everything they need to register to vote.

Click the link to set up an account or sign in, then scroll down to the second row of options and choose one of the campaigns that includes voter registration forms.


+++++++++++++++++++++++++++++++++++++++++++++++++






air gapping
Air gapping is a security measure that involves physically isolating a computer or network to prevent it from connecting directly or wirelessly to other systems that can connect to the Internet. Air gapping is used to protect many types of critical systems, including those that support the stock market, the military, the government and industrial power industries.
To prevent unauthorized data extrusion through electromagnetic or electronic exploits, there must be a specified amount of space between the air-gapped system and outside walls and between its wires and the wires for other technical equipment. In the United States, the U.S. National Security Agency TEMPEST project provides best practices for using air gaps as a security measure.

For a system with extremely sensitive data, a Faraday cage can be used to prevent electromagnetic radiation (EMR) escaping from the air-gapped equipment. Although such measures may seem extreme, van Eck phreaking can be used to intercept data such as key strokes or screen images from demodulated EMR waves, using special equipment from some distance away. Other proof-of-concept (POC) attacks for air- gapped systems have shown that electromagnetic emanations from infected sound cards on isolated computers can be exploited and continuous wave irradiation can be used to reflect and gather information from isolated screens, keyboards and other computer components.

As of this writing, the Defense Advanced Research Projects Agency (DARPA) is awarding grants for prototype hardware and software designs that will keep sensitive data physically isolated. The grants are made possible under the Guaranteed Architecture for Physical Security (GAPS) program.

Enhancing air-gapped security measures

The problem with physical separation as a security technique is that, as complexity increases in some system or network to be isolated, so does the likelihood that some unknown or unauthorized external connection will arise.

Perhaps the most important way to protect a computing device or network from an air gap attack is through end user security awareness training. The infamous Stuxnet worm, which was designed to attack air-gapped industrial control systems, is thought to have been introduced by infected thumb drives found by employees or obtained as free giveaways.
The software-defined perimeter (SDP) framework is another tool network engineers can use to create a type of "virtual air gapping" through policy enforcement. SDP requires external endpoints that want to access internal infrastructure to comply with authentication policies and ensures that only authenticated systems can see internal IP addresses.


In my books, noted below, I often lament about the lack of civility, deterioration of written communication and abuse of the power of the Internet. Electronic communication, in my opinion, breeds negativity and behavior which does not exist in direct communication. 

The following is an except from my first book which addresses angry email replies.

Enjoy the article and check out the website!
================================================== 

======================    
 For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================