alysten: (Sad Panda)
[personal profile] alysten
 I have just learned that the social engineering janitor hackers are out to steal my lollipops and fun dips.  What is the world coming to.

Date: 2010-10-12 08:51 pm (UTC)
From: [identity profile] math5.livejournal.com
In this week's horrible news: one of my annual training this week informed me that: "THERE IS NO BSL-4 RESEARCH AT PENN"
Well, damn...

sigh

Date: 2010-10-12 10:18 pm (UTC)
From: [identity profile] bytchearse.livejournal.com
I hate it when I can't speak the language...

Re: sigh

Date: 2010-10-12 10:32 pm (UTC)
From: [identity profile] math5.livejournal.com
We are not allowed to work with pathogens of Ebola level of risk, which might be due to the fact that we don't have the adequate facilities ;)
I was just very amused by the vehemence of the slide.

Re: sigh

Date: 2010-10-12 11:27 pm (UTC)
From: [identity profile] beckishadow.livejournal.com
%#$@!! administrators taking all of the fun away...

Re: sigh

Date: 2010-10-13 01:07 am (UTC)
From: [identity profile] math5.livejournal.com
Don't they?

Date: 2010-10-13 12:50 am (UTC)
From: [identity profile] marajade648.livejournal.com
There's been so much hub-bub here in Boston about putting in a BSL-4 facility at Boston University Medical. All the residents think science is out to kill them. Not sure its worth the headache but the fight rages on.

Date: 2010-10-13 01:08 am (UTC)
From: [identity profile] math5.livejournal.com
OK, I was wondering why they were so vehement about that on a yearly refresher training. I guess it makes more sense.

Date: 2010-11-18 04:55 am (UTC)
From: [identity profile] razerwilliam.livejournal.com
An e-Learning course aimed at providing the most comprehensive knowledge and skills in the Network Security Courses (http://www.information-security-training.com/network-security-courses/) providing an opportunity to equip the Information Security Certification (http://www.information-security-training.com/) or Network System Administrators & Information Security Officers to understand the security concerns, vulnerabilities, attacks and to plan and implement the desired e-Security solutions.

May 2015

S M T W T F S
     12
3456789
10111213141516
17181920212223
24252627282930
31      

Style Credit

Expand Cut Tags

No cut tags
Page generated Feb. 20th, 2026 07:36 pm
Powered by Dreamwidth Studios