<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / of</title>
<link>http://netvouz.com/lillymark/tag/of?feed=rss&amp;pg=1</link>
<description>lillymark&#39;s bookmarks tagged &quot;of&quot; on Netvouz</description>
<item><title>New Version of Systems Engineering Body of Knowledge Now Available</title>
<link>http://www.computer.org/portal/web/pressroom/New-Version-of-Systems-Engineering-Body-of-Knowledge-Now-Available</link>
<description>A new version of the Guide to the Systems Engineering Body of Knowledge (SEBOK) has been released, along with a collaborative space that will allow systems engineers to contribute more directly.Version 1.1.2 of SEBOK is available at http://www.sebokwiki.org/wiki.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 28 Aug 2013 09:18:12 GMT</pubDate>
</item><item><title>Rock Stars Of Big Data -October 29 2013</title>
<link>http://cloudcomputing.ieee.org/conferences/calendar/view/319/23</link>
<description>Don&#39;t miss Rock Stars of Big Data, where you can hear firsthand how executives from GE, Google, IBM, Intel, Kaiser Permanente, Netflix, and others have unleashed the power of Big Data. - Register for Rock Stars of Big Data http://www.computer.org/Big-Data.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 22 Oct 2013 10:00:46 GMT</pubDate>
</item><item><title>Rock Stars of Big Data Registration</title>
<link>https://www.regonline.com/Register/Checkin.aspx?EventID=1246083</link>
<description>There are still seats available for Rock Stars of Big Data, Oct. 29 at the Computer History Museum. Register now. http://bit.ly/H5F3id</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 25 Oct 2013 07:16:22 GMT</pubDate>
</item><item><title>Rock Stars of Big Data: See Who’s Attending</title>
<link>http://www.computer.org/portal/web/Big-Data/Blog/-/blogs/rock-stars-of-big-data%3A-see-who%E2%80%99s-attending?_33_redirect=http%3A%2F%2Fwww.computer.org%2Fportal%2Fweb%2FBig-Data%2FBlog%3Fp_p_id%3D33%26p_p_lifecycle%3D0%26p_p_state%3Dnormal%26p_p_mode%3Dview%26p_p_col_id%3Dcolumn-2%26p_p_col_count%3D2</link>
<description>Besides the opportunity to come away with actionable insights from industry-leading speakers, one of the advantages of attending a face-to-face event like Rock Stars of Big Data is the chance to network with colleagues.To register, visit http://www.computer.org/Big-Data.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 09 Oct 2013 11:30:11 GMT</pubDate>
</item><item><title>Sandeep Duggal&#39;s Interview on KLIV CEO&#39;s show - Extron</title>
<link>http://www.youtube.com/watch?v=u-OCE_Tspso&amp;feature=plcp</link>
<description>Sandeep Duggal, CEO of Extron being interviewed in the CEO&#39;s Show of KLIV 1590 AM radio News Station.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 10 Dec 2012 10:09:58 GMT</pubDate>
</item><item><title>Understanding Phishing Attacks and Solutions</title>
<link>http://www.slideshare.net/Phishnix/understanding-phishing-attacks-and-solutions</link>
<description>Technological growth in the form of networked environment, data centers, software applications smartphones and hand held devices that enable access to the critical data has changed today&#39;s corporate landscape.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 16 Oct 2013 05:56:56 GMT</pubDate>
</item><item><title>India Moves to Simplify Procedures for Incorporation of Companies, Amends Requirements for Reporting Foreign Investment</title>
<link>http://www.nair-co.com/nareadmore.aspx?id=147</link>
<description>Indian authorities are considering proposals to simplify procedures for companies, including foreign companies, to set up entities in the country. The proposals, if accepted, could reduce the average time taken for incorporation of a company to as little as one day.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 06 Apr 2011 05:27:54 GMT</pubDate>
</item><item><title>‘Hour of Code&#39; Kicks Off to Introduce K-12 Students to Computer Programming</title>
<link>http://www.computer.org/portal/web/pressroom/Hour-of-Code-Kicks-Off-to-Support-Computer-Science-education</link>
<description>IEEE Computer Society is joining Code.org, the nonprofit dedicated to promoting computer science education, in calling on every K-12 student in America to join an &quot;Hour of Code.&quot;</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 22 Oct 2013 06:04:47 GMT</pubDate>
</item><item><title>‘Meaningful Use’ Audits Begin- Are You Ready?</title>
<link>http://www.egestalt.com/blog/2012/08/09/meaningful-use-audits-begin-are-you-ready/</link>
<description>Have you attested to ‘meaningful use’ of EHR? If so, here’s some important news for you: The Centers for Medicare &amp; Medicaid Services (CMS) have hired a New York based accounting firm, Figliozzi &amp; Company to carry out audits to determine compliance with ‘meaningful use’. Hospitals and physician practices which have qualified for Medicare EHR Meaningful Use (MU) incentives will be audited soon.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 10 Aug 2012 04:39:41 GMT</pubDate>
</item><item><title>10 Tips to Prevent Phishing Attacks and Scams</title>
<link>http://www.zimbio.com/Technology+Access/articles/JNX_Xvb-ndB/10+Tips+Prevent+Phishing+Attacks+Scams?success=Your+edit+was+saved.</link>
<description>With the phishers employing sophisticated techniques to steal personal information and credit card details, users need to implement foolproof security measures to plug in leaks. But how to protect against phishing scams which are growing at an alarming rate.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 16 Jan 2014 11:12:25 GMT</pubDate>
</item></channel></rss>