- Loading...
- No images or files uploaded yet.
![]() Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. PDLeapfrog-EMSLearning01.pdfWhat Science Says About Achieving Peak PerformanceKnowledge@Wharton-May 10, 2017 ... consciousness (cf. the hard problem of consciousness)(Wikipedia). ... A number of futures studies scenarios combine elements from both ...
WikiLinks Eric Hoffer: Dr. James R. Holmes(The Habits of Strategy) CSR-i4CQuest ...USNI-Strategy-Holmes01x.txt (Outline-WPExport)
How Can Futures Thinking Amplify Design Thinking?Core77.com (blog)-Jul 1, 2010
In the field of futures studies, this is called environmental scanning.It's a strategic approach to acquiring information in order to stay current on ...
SmARTregions.USvia “Sustainable Commons”DIKW-Scenario-Spinning
Fast Company Draft 4sf.pdf (TCRI-SFont)
EarthSea-Keeping Whale Tales (Pinterest Album)
FEMA Presents Guiding Principles and Practical Strategiesfor Building a **Culture of Preparedness**
FEMA recommends the “novel methodology” of “Culture Brokers”to help operationalize the guiding principles.
It identifies people with local knowledge and the trust of community members who are capable of bridging gaps, willing to help, and would be trained to use the guiding principles to enhance local levels of preparedness.
|
|
Comments (3)
Bob-RJ Burkhart said
at 8:59 am on Feb 15, 2019
ASAP - Checkout http://dokkio.com/faqs/
Bob-RJ Burkhart said
at 4:30 pm on Feb 15, 2019
Attention InfraGard member,
You have received a new broadcast message.
Multiple documents from various sources have been posted.
Rail Awareness Daily Analytic Report (RADAR) February 8 – 14 (RAN)
Multiple Vulnerabilities in Mozilla Thunderbird Could Allow for Arbitrary Code Execution (MS-ISAC)
The Cyber Shield – February 15 (NMCIWG)
Open Source News – February 15 (IT-ISAC)
These documents are located in the following area: Publications > Documents > General Information
China: The Risk to Academia
China: The Risk to Corporate America
Case Example: Front Companies (Chinese Citizen's Targeting of Former Employees to Acquire Chemical Refinement Process)
Case Example: Cyber Threats (Chinese Cyber Hackers' Targeting of U.S. Aerospace and Military Intellectual Property)
Case Example: Non-Traditional Collectors (Chinse Government Sponsored Theft of U.S. Proprietary Insulation Technology)
Case Example: Insider Threat and Non-Traditional Collection (Chinese Citizen's Theft of Proprietary Corn Seeds to Fulfill China's Development Goals)
Case Example: Insider Threats and Joint Ventures (A U.S. Superconductor Company Targeted for Trade Secrets)
Case Example: Non-Traditional Collector (Chinese Citizen's Theft of Weapons Technology for Chinese Employment Opportunity)
Case Example: Research Partnerships (Chinese Engineer's Targeting of Highly Sensitive Defense Materials)
OPS Daily Digest – February 15
These documents are located in the following area: Publications > Documents > FBI Report
To view these documents, you must login to the InfraGard system.
Access to the system will require the use of your InfraGard user name and password.
Bob-RJ Burkhart said
at 5:03 pm on Feb 15, 2019
Please forward this invitation to your colleagues in the sector.
The webinar will be recorded and made available the following day
along with the slide deck at http://waterisac.org/awia.
Please contact info@waterisac.org with any questions.
You don't have permission to comment on this page.