Thursday, October 31, 2019

Halloween And November As An Awareness Month







JGI/Jamie Grill/Getty Images
Updated March 10, 2019
Both "I" and "me" are first-person singular pronouns, but they are used in different ways. "I" is a subject pronoun, while "me" is an object pronoun.
How to Use "I"
"I" is a first-person subject pronoun, which means it is used as the subject of a sentence (the person who is performing an action or being something):
  • I am tired of eating frozen waffles.
  • I went to the library to check out some books.
In each of these examples, "I" is the subject of the sentence, the person who is "being" tired and "going" to the library.
How to Use "Me"
"Me" is a first-person subject pronoun, which means it is the direct or indirect object of an action or of a preposition:
  • Lisa tutored me.
  • The deliveryman handed a package to me.
In the first example, the pronoun "me" is the direct object of the verb "tutored"; "me" is not the one tutoring but rather the one being tutored. In the second example, "me" is the object of the preposition "to." The sentence can be rewritten without the preposition by making "me" the direct object of the verb "handed":
  • The deliveryman handed me a package.
Examples
The best way to know when to use "I" and "me" is to identify whether the word is being used as a subject or an object. If it's the subject of a sentence, the one performing an action or being something, you should use the word "I":
  • After I opened the presents, I was very happy.
  • I asked Jim to help with the project.
  • Samantha and I are taking the tour tomorrow.
When you're referring to the object of an action, whether direct or indirect, use the pronoun "me":
  • My mother told me to focus on my studies.
  • The ball came flying through the air and hit me on the head.
  • The weather did not look very pleasant to me.
How to Remember the Difference
It is usually easy to tell when you should use "I" or "me." Confusion can occur, however, when one of these pronouns is grouped with another noun.
Take the following sentence, for example:
  • The officer was looking at Jim and I.
To determine if the usage of "I" is correct, all you have to do is take out "Jim" to isolate the first-person pronoun:
  • The officer was looking at I.
This is not correct because "I" is not an object pronoun. Because the person is the object of the officer's gaze, we must use the object pronoun "me."
The same principle applies to other examples where first-person pronouns are paired or grouped with other nouns:
  • Bill and me are excited to go to the concert.
Once we remove "Bill" from this sentence, we see that the use of "me" is incorrect.
It's important to remember that when a pronoun is the object of a preposition, you must use an object pronoun. Many people make the mistake of writing "between you and I" when they should write "between you and me." Grammarist Mignon Fogarty says the former is a common example of hypercorrection, the result of people trying too hard to write correctly and using grammatical rules in places where they don't apply.
"I" and "Me" After Forms of the Verb "Be"
In Early Modern English—the language spoken by Shakespeare and others—"I" and "me" were sometimes used interchangeably after the verb "be." One example, as scholars John Algeo and Thomas Pyles point out, occurs in Shakespeare's "Twelfth Night," where the character Sir Andrew Aguecheek says, "That's mee I warrant you...I knew 'twas I."
"That's me" uses the object pronoun "me," while "'twas I" uses the subject pronoun "I." Both statements, however, are versions of the same syntactical construction: That/it is/was me/I. Strict grammarians insist that the verb "to be" must be followed by a subject pronoun; however, the object pronoun "me" is frequently used in standard English. While "It is I" is usually technically correct, you are more likely to hear the expression "It's me." The latter is grammatically correct, however, when the pronoun is followed by a relative clause that identifies the pronoun as the object of an action. For example:
  • It's me who was really hurt by your reckless behavior.
"Me" is correct in this instance because it is the object of the verb "hurt."
Sources

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++.
October as official month By Lahle Wolfe
Updated January 14, 2019
If you're Italian-American, if you're a ​cookbook author, or, if you're a country music artist, then October is the month for you. That's because October is National Italian-American Heritage Month, Cook Book Author Month, and Country Music Month, as well as (the more serious) National Cholesterol Month. The United States is very prolific at creating "national month" events. In addition to businesses (from major corporations to local ma and pa shops) numerous worthwhile organizations and special interest groups establish a promotion during a calendar month to get their name and message out to the public.
In addition to fostering awareness, creating a national month designation is an excellent way to celebrate a nationality, a religion, an interest, or a cause. 
While you may not want to hug a "Texas chef" or believe that vegetarian and pork lovers should celebrate their food preference in different months, you'll definitely find something in October to celebrate or pay attention to.
The following events are observed every year for the entire calendar month.
November Is "National Month" Calendar



+++++++++++++++++++++++++++++++++++++++++++++++++++


09/30/2019 05:09 PM EDT



Original release date: September 30, 2019
October is National Cybersecurity Awareness Month (NCSAM), which is a collaborative effort between the Cybersecurity and Infrastructure Security Agency (CISA) and its public and private partners—including the National Cyber Security Alliance (NCSA)—to ensure every American has the resources they need to stay safe and secure online while increasing the resilience of the Nation against cyber threats. This year’s theme, “Own IT. Secure IT. Protect IT.,” focuses on promoting personal accountability and positive behavior when it comes to cybersecurity.

CISA encourages organizations to see the NCSAM 2019 webpage and the NCSAM 2019 Toolkit

Paul, every year millions of Americans find themselves unable to vote because they miss a registration deadline, don’t update their registration, or aren’t sure how to register.

Our partners at Vote Forward have made it easy to contact historically under-represented, not-yet-registered voters living in key 2020 swing states to provide them with everything they need to register to vote.

Click the link to set up an account or sign in, then scroll down to the second row of options and choose one of the campaigns that includes voter registration forms.


+++++++++++++++++++++++++++++++++++++++++++++++++






air gapping
Air gapping is a security measure that involves physically isolating a computer or network to prevent it from connecting directly or wirelessly to other systems that can connect to the Internet. Air gapping is used to protect many types of critical systems, including those that support the stock market, the military, the government and industrial power industries.
To prevent unauthorized data extrusion through electromagnetic or electronic exploits, there must be a specified amount of space between the air-gapped system and outside walls and between its wires and the wires for other technical equipment. In the United States, the U.S. National Security Agency TEMPEST project provides best practices for using air gaps as a security measure.

For a system with extremely sensitive data, a Faraday cage can be used to prevent electromagnetic radiation (EMR) escaping from the air-gapped equipment. Although such measures may seem extreme, van Eck phreaking can be used to intercept data such as key strokes or screen images from demodulated EMR waves, using special equipment from some distance away. Other proof-of-concept (POC) attacks for air- gapped systems have shown that electromagnetic emanations from infected sound cards on isolated computers can be exploited and continuous wave irradiation can be used to reflect and gather information from isolated screens, keyboards and other computer components.

As of this writing, the Defense Advanced Research Projects Agency (DARPA) is awarding grants for prototype hardware and software designs that will keep sensitive data physically isolated. The grants are made possible under the Guaranteed Architecture for Physical Security (GAPS) program.

Enhancing air-gapped security measures

The problem with physical separation as a security technique is that, as complexity increases in some system or network to be isolated, so does the likelihood that some unknown or unauthorized external connection will arise.

Perhaps the most important way to protect a computing device or network from an air gap attack is through end user security awareness training. The infamous Stuxnet worm, which was designed to attack air-gapped industrial control systems, is thought to have been introduced by infected thumb drives found by employees or obtained as free giveaways.
The software-defined perimeter (SDP) framework is another tool network engineers can use to create a type of "virtual air gapping" through policy enforcement. SDP requires external endpoints that want to access internal infrastructure to comply with authentication policies and ensures that only authenticated systems can see internal IP addresses.


In my books, noted below, I often lament about the lack of civility, deterioration of written communication and abuse of the power of the Internet. Electronic communication, in my opinion, breeds negativity and behavior which does not exist in direct communication. 

The following is an except from my first book which addresses angry email replies.

Enjoy the article and check out the website!
================================================== 

======================    
 For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================


Happy Haloween And What Items Is November An Awareness Month





JGI/Jamie Grill/Getty Images
Updated March 10, 2019
Both "I" and "me" are first-person singular pronouns, but they are used in different ways. "I" is a subject pronoun, while "me" is an object pronoun.
How to Use "I"
"I" is a first-person subject pronoun, which means it is used as the subject of a sentence (the person who is performing an action or being something):
  • I am tired of eating frozen waffles.
  • I went to the library to check out some books.
In each of these examples, "I" is the subject of the sentence, the person who is "being" tired and "going" to the library.
How to Use "Me"
"Me" is a first-person subject pronoun, which means it is the direct or indirect object of an action or of a preposition:
  • Lisa tutored me.
  • The deliveryman handed a package to me.
In the first example, the pronoun "me" is the direct object of the verb "tutored"; "me" is not the one tutoring but rather the one being tutored. In the second example, "me" is the object of the preposition "to." The sentence can be rewritten without the preposition by making "me" the direct object of the verb "handed":
  • The deliveryman handed me a package.
Examples
The best way to know when to use "I" and "me" is to identify whether the word is being used as a subject or an object. If it's the subject of a sentence, the one performing an action or being something, you should use the word "I":
  • After I opened the presents, I was very happy.
  • I asked Jim to help with the project.
  • Samantha and I are taking the tour tomorrow.
When you're referring to the object of an action, whether direct or indirect, use the pronoun "me":
  • My mother told me to focus on my studies.
  • The ball came flying through the air and hit me on the head.
  • The weather did not look very pleasant to me.
How to Remember the Difference
It is usually easy to tell when you should use "I" or "me." Confusion can occur, however, when one of these pronouns is grouped with another noun.
Take the following sentence, for example:
  • The officer was looking at Jim and I.
To determine if the usage of "I" is correct, all you have to do is take out "Jim" to isolate the first-person pronoun:
  • The officer was looking at I.
This is not correct because "I" is not an object pronoun. Because the person is the object of the officer's gaze, we must use the object pronoun "me."
The same principle applies to other examples where first-person pronouns are paired or grouped with other nouns:
  • Bill and me are excited to go to the concert.
Once we remove "Bill" from this sentence, we see that the use of "me" is incorrect.
It's important to remember that when a pronoun is the object of a preposition, you must use an object pronoun. Many people make the mistake of writing "between you and I" when they should write "between you and me." Grammarist Mignon Fogarty says the former is a common example of hypercorrection, the result of people trying too hard to write correctly and using grammatical rules in places where they don't apply.
"I" and "Me" After Forms of the Verb "Be"
In Early Modern English—the language spoken by Shakespeare and others—"I" and "me" were sometimes used interchangeably after the verb "be." One example, as scholars John Algeo and Thomas Pyles point out, occurs in Shakespeare's "Twelfth Night," where the character Sir Andrew Aguecheek says, "That's mee I warrant you...I knew 'twas I."
"That's me" uses the object pronoun "me," while "'twas I" uses the subject pronoun "I." Both statements, however, are versions of the same syntactical construction: That/it is/was me/I. Strict grammarians insist that the verb "to be" must be followed by a subject pronoun; however, the object pronoun "me" is frequently used in standard English. While "It is I" is usually technically correct, you are more likely to hear the expression "It's me." The latter is grammatically correct, however, when the pronoun is followed by a relative clause that identifies the pronoun as the object of an action. For example:
  • It's me who was really hurt by your reckless behavior.
"Me" is correct in this instance because it is the object of the verb "hurt."
Sources

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++.
October as official month By Lahle Wolfe
Updated January 14, 2019
If you're Italian-American, if you're a ​cookbook author, or, if you're a country music artist, then October is the month for you. That's because October is National Italian-American Heritage Month, Cook Book Author Month, and Country Music Month, as well as (the more serious) National Cholesterol Month. The United States is very prolific at creating "national month" events. In addition to businesses (from major corporations to local ma and pa shops) numerous worthwhile organizations and special interest groups establish a promotion during a calendar month to get their name and message out to the public.
In addition to fostering awareness, creating a national month designation is an excellent way to celebrate a nationality, a religion, an interest, or a cause. 
While you may not want to hug a "Texas chef" or believe that vegetarian and pork lovers should celebrate their food preference in different months, you'll definitely find something in October to celebrate or pay attention to.
The following events are observed every year for the entire calendar month.
November Is "National Month" Calendar



+++++++++++++++++++++++++++++++++++++++++++++++++++


09/30/2019 05:09 PM EDT



Original release date: September 30, 2019
October is National Cybersecurity Awareness Month (NCSAM), which is a collaborative effort between the Cybersecurity and Infrastructure Security Agency (CISA) and its public and private partners—including the National Cyber Security Alliance (NCSA)—to ensure every American has the resources they need to stay safe and secure online while increasing the resilience of the Nation against cyber threats. This year’s theme, “Own IT. Secure IT. Protect IT.,” focuses on promoting personal accountability and positive behavior when it comes to cybersecurity.

CISA encourages organizations to see the NCSAM 2019 webpage and the NCSAM 2019 Toolkit

Paul, every year millions of Americans find themselves unable to vote because they miss a registration deadline, don’t update their registration, or aren’t sure how to register.

Our partners at Vote Forward have made it easy to contact historically under-represented, not-yet-registered voters living in key 2020 swing states to provide them with everything they need to register to vote.

Click the link to set up an account or sign in, then scroll down to the second row of options and choose one of the campaigns that includes voter registration forms.


+++++++++++++++++++++++++++++++++++++++++++++++++






air gapping
Air gapping is a security measure that involves physically isolating a computer or network to prevent it from connecting directly or wirelessly to other systems that can connect to the Internet. Air gapping is used to protect many types of critical systems, including those that support the stock market, the military, the government and industrial power industries.
To prevent unauthorized data extrusion through electromagnetic or electronic exploits, there must be a specified amount of space between the air-gapped system and outside walls and between its wires and the wires for other technical equipment. In the United States, the U.S. National Security Agency TEMPEST project provides best practices for using air gaps as a security measure.

For a system with extremely sensitive data, a Faraday cage can be used to prevent electromagnetic radiation (EMR) escaping from the air-gapped equipment. Although such measures may seem extreme, van Eck phreaking can be used to intercept data such as key strokes or screen images from demodulated EMR waves, using special equipment from some distance away. Other proof-of-concept (POC) attacks for air- gapped systems have shown that electromagnetic emanations from infected sound cards on isolated computers can be exploited and continuous wave irradiation can be used to reflect and gather information from isolated screens, keyboards and other computer components.

As of this writing, the Defense Advanced Research Projects Agency (DARPA) is awarding grants for prototype hardware and software designs that will keep sensitive data physically isolated. The grants are made possible under the Guaranteed Architecture for Physical Security (GAPS) program.

Enhancing air-gapped security measures

The problem with physical separation as a security technique is that, as complexity increases in some system or network to be isolated, so does the likelihood that some unknown or unauthorized external connection will arise.

Perhaps the most important way to protect a computing device or network from an air gap attack is through end user security awareness training. The infamous Stuxnet worm, which was designed to attack air-gapped industrial control systems, is thought to have been introduced by infected thumb drives found by employees or obtained as free giveaways.
The software-defined perimeter (SDP) framework is another tool network engineers can use to create a type of "virtual air gapping" through policy enforcement. SDP requires external endpoints that want to access internal infrastructure to comply with authentication policies and ensures that only authenticated systems can see internal IP addresses.


In my books, noted below, I often lament about the lack of civility, deterioration of written communication and abuse of the power of the Internet. Electronic communication, in my opinion, breeds negativity and behavior which does not exist in direct communication. 

The following is an except from my first book which addresses angry email replies.

Enjoy the article and check out the website!
================================================== 

======================    
 For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================