2017/09/01 04:53:42:423 WPAnalytics session started

2017/09/01 04:53:42:456 Helpshift Enabled
2017/09/01 04:53:42:988 User-Agent set to: Mozilla/5.0 (iPhone; CPU iPhone OS 10_3_3 like Mac OS X) AppleWebKit/603.3.8 (KHTML, like Gecko) Mobile/14G60 wp-iphone/8.2
2017/09/01 04:53:58:058 PingHub connecting
2017/09/01 04:53:58:083 Device Token received in didRegisterForRemoteNotificationsWithDeviceToken: 4d5649ecd7a9acff32855f0fb6c70f7ec426b4e0efc84069d471291921dd93bf
2017/09/01 04:53:58:322 PingHub connected
2017/09/01 04:53:58:450 Successfully registered Device ID 18705179 for Push Notifications
2017/09/01 04:55:10:228 Received push notification:
Payload: {
aps = {
badge = 0;
sound = “”;
};
type = “badge-reset”;
}
2017/09/01 04:55:10:228 Current Application state: 0
2017/09/01 04:55:30:542 PingHub disconnecting
2017/09/01 04:55:30:890 PingHub disconnected
2017/09/01 06:06:53:604 PingHub connecting
2017/09/01 06:06:53:910 PingHub connected
2017/09/01 06:07:40:309 Received push notification:
Payload: {
aps = {
badge = 0;
sound = “”;
};
type = “badge-reset”;
}
2017/09/01 06:07:40:310 Current Application state: 0
2017/09/01 06:08:20:894 PingHub disconnecting
2017/09/01 06:08:21:488 PingHub disconnected
2017/09/01 06:08:32:477 PingHub connecting
2017/09/01 06:08:32:821 PingHub connected
2017/09/01 06:11:29:465 PingHub disconnecting
2017/09/01 06:11:30:085 PingHub disconnected
2017/09/01 06:11:56:552 PingHub connecting
2017/09/01 06:11:56:862 PingHub connected
2017/09/01 06:15:45:899 PingHub disconnecting
2017/09/01 06:15:46:148 PingHub disconnected
2017/09/01 06:45:44:988 WPAnalytics session started
2017/09/01 06:45:45:000 Helpshift Enabled
2017/09/01 06:45:45:251 User-Agent set to: Mozilla/5.0 (iPhone; CPU iPhone OS 10_3_3 like Mac OS X) AppleWebKit/603.3.8 (KHTML, like Gecko) Mobile/14G60 wp-iphone/8.2

Advertisements

Digital Devices and Learning to Grow Up

Last week the NY Times ran the sort of op-ed on digital culture that the cultured despisers love to ridicule. In it, Jane Brody made a host of claims about the detrimental consequences of digital media consumption on children, especially the very young. She had the temerity, for example, to call texting the “next national epidemic.” […]

http://thefrailestthing.com/2015/07/12/digital-devices-and-learning-to-grow-up/

Access denied | Center for Democracy & Technology >> How Ironic!

Recent Blog Posts

The staggering amount of personal health data now being collected for treatment or billing purposes has a life beyond the doctor’s clipboard. The data is collected, stripped of personally identifying information (“de-identified”) and re-used in ways that are vital for medical breakthroughs, improving patient care, or predicting public health trends.  And it’s just as valuable when used for targeted marketing campaigns or eliminating inefficiencies in the healthcare…

In a case that raises as many questions as the average sighting of Big Foot, a panel of the Sixth Circuit Court of Appeals ruled earlier this week that law enforcement officers didn’t need a warrant to obtain GPS location information generated by his cell phone.

The court’s analysis has been roundly criticized as legally incorrect,…

Consumer use of mobile technologies to stay healthy or manage a chronic health condition is increasing; likewise, an increasing number are using these technologies as a digital link to their doctors.  Yet, unlike health care providers who must follow federal privacy and security rules when using mobile technologies to share a patient’s health information, no such rules…

Access denied

You are not authorized to access this page.

https://www.cdt.org/job/job-opportunity-national-security-law-fellow

Access denied | Center for Democracy & Technology >> How Ironic!

Recent Blog Posts

The staggering amount of personal health data now being collected for treatment or billing purposes has a life beyond the doctor’s clipboard. The data is collected, stripped of personally identifying information (“de-identified”) and re-used in ways that are vital for medical breakthroughs, improving patient care, or predicting public health trends.  And it’s just as valuable when used for targeted marketing campaigns or eliminating inefficiencies in the healthcare…

In a case that raises as many questions as the average sighting of Big Foot, a panel of the Sixth Circuit Court of Appeals ruled earlier this week that law enforcement officers didn’t need a warrant to obtain GPS location information generated by his cell phone.

The court’s analysis has been roundly criticized as legally incorrect,…

Consumer use of mobile technologies to stay healthy or manage a chronic health condition is increasing; likewise, an increasing number are using these technologies as a digital link to their doctors.  Yet, unlike health care providers who must follow federal privacy and security rules when using mobile technologies to share a patient’s health information, no such rules…

Access denied

You are not authorized to access this page.

https://www.cdt.org/job/job-opportunity-national-security-law-fellow

Computer Disposal Procedure

Computer Disposal Procedure

A. Reason for Procedure

 Equipment that is obsolete and no longer in use needs to be disposed of in a secure and environmentally friendly manner. Secure disposal is critical to protect personally identifiable data and other sensitive information. For these reasons, disposal of computer equipment must be done in accordance with clearly-defined and documented procedures.

B. Responsible Office and/or Officer

The Department of Computing and Information Services (CIS) is responsible for the maintenance of these procedures, and for responding to questions regarding them.  The responsible official is V. Ena Haines, Director of Information Technology.

C. Procedures

  • TC user calls CIS Help Desk to report a computer which needs to be replaced or disposed of.
    • If user contacts Facilities first, Facilities will direct user to CIS.
  • CIS Help Desk staff member will arrange a visit  to the office
    • Help Desk staff member physically removes internal hard drive from CPU
    • Help Desk staff places neon-red ‘Ready for Disposal’ sticker on CPU and monitor to be disposed of.
    • Mice and keyboards can be trashed or recycled depending on wear, but do NOT need special arrangements for pickup.
  • CIS Help Desk staff member creates a Facilities work order (at facilities.tc.columbia.edu) indicating the room number and in the description field enters ‘Computer Disposal Pickup.”
  • Facilities will go to office and pick up CPU and monitor and deliver to Shipping and Receiving for holding and appropriate disposal with approved vendor.

Tagged:

Computer Disposal Procedure

Computer Disposal Procedure

A. Reason for Procedure

 Equipment that is obsolete and no longer in use needs to be disposed of in a secure and environmentally friendly manner. Secure disposal is critical to protect personally identifiable data and other sensitive information. For these reasons, disposal of computer equipment must be done in accordance with clearly-defined and documented procedures.

B. Responsible Office and/or Officer

The Department of Computing and Information Services (CIS) is responsible for the maintenance of these procedures, and for responding to questions regarding them.  The responsible official is V. Ena Haines, Director of Information Technology.

C. Procedures

  • TC user calls CIS Help Desk to report a computer which needs to be replaced or disposed of.
    • If user contacts Facilities first, Facilities will direct user to CIS.
  • CIS Help Desk staff member will arrange a visit  to the office
    • Help Desk staff member physically removes internal hard drive from CPU
    • Help Desk staff places neon-red ‘Ready for Disposal’ sticker on CPU and monitor to be disposed of.
    • Mice and keyboards can be trashed or recycled depending on wear, but do NOT need special arrangements for pickup.
  • CIS Help Desk staff member creates a Facilities work order (at facilities.tc.columbia.edu) indicating the room number and in the description field enters ‘Computer Disposal Pickup.”
  • Facilities will go to office and pick up CPU and monitor and deliver to Shipping and Receiving for holding and appropriate disposal with approved vendor.

Tagged:

Entrez Programming Utilities Help – NCBI Bookshelf -E-utiility news from the NIH

E-utility News

  • Alternative version 2.0 DocSums now available from ESummary

  • EFetch 2.0 to be released on February 15, 2012

  • Please see the Release Notes for details and changes.

The Entrez Programming Utilities (E-utilities) are a set of eight server-side programs that provide a stable interface into the Entrez query and database system at the National Center for Biotechnology Information (NCBI). The E-utilities use a fixed URL syntax that translates a standard set of input parameters into the values necessary for various NCBI software components to search for and retrieve the requested data. The E-utilities are therefore the structured interface to the Entrez system, which currently includes 38 databases covering a variety of biomedical data, including nucleotide and protein sequences, gene records, three-dimensional molecular structures, and the biomedical literature.

Contents