The Seven Revolutions Lecture – March 23, 2010

All are invited to attend this unique presentation, sponsored by the newly formed HSB Alumni Chapter. SEVEN REVOLUTIONS is a project led by the Global Strategy Institute at the Center for Strategic and International Studies (CSIS) to identify and analyze the key policy challenges that policymakers, business figures, and other leaders will face out to the year 2025. It is an effort to promote strategic thinking on the long-term trends that too few leaders take the time to consider. The key points of this research have been captured in an exciting, fast-paced, multimedia presentation that has been taken around the world by the project’s founder and director, Erik Peterson.

•Resource management and environmental stewardship
•Technological innovation and diffusion
•The development and dissemination of information and knowledge
•Economic integration
•The nature and mode of conflict
•The challenge of governance

Tuesday, March 23, 2010

5:30 PM – Reception in Mandeville Lobby
6:30 PM – Lecture in Mandeville Teletorium

COST: Free

For more information, contact Vana Zervanos at 610.660.1876 or


‘Tis the Season…

Here are some last minute gift ideas for the “techie” on your Christmas list:

Virtual Keyboard – Virtual Laser Keyboard works with any Bluetooth smartphone. It consists of a small device that uses infrared and laser technologies to project a keyboard on virtually any flat surface. ($149)   

BHEESTIE Bag® – an innovative product that gets the wet out of a cellphone, iPod® or other small  personal electronics.   ($20)

WiFi Enabled SD Card– Make your camera wireless!  ($49.99)

USB-Wrist Bands– Carries up to 4GB of Data ( $14.99 – $19.99)

With these FREE iPhone Apps,  you can use your iPhone, iPod touch, or Android phone to quickly find nearby places (below)  , while traveling this Holiday season. 

Snack Shop/Convenience Store Locator

Café/Bar Locator

Restaurant Locator

Restroom Locator

New Information Security Awareness policy Adopted

An information security awareness policy has been adopted by the university, in an effort to safeguard the integrity and confidentiality of campus information resources. Faculty and staff are encouraged to read this policy and incorporate it into their computing practices.  The Information Security Awareness website is :

Below is a “Top Ten” list of Security Tips from this site:

Top Ten Security Tips

1. Never leave your computer unattended while you’re logged on.
When your computer and account are unattended, someone could access your personal information or other confidential data. Be sure to log out of all your accounts when you step away from the computer.

2. Physically lock your computer and your office when you are not using them.
It’s very important to physically secure your laptop computer with a security cable. When your office or office suite is unoccupied, make sure that you lock the door.

3. Use strong passwords to help protect your personal information.
When selecting a password, be sure to include numbers, symbols and upper and lower case characters. A minimum length of 8 characters is recommended but a length of 10 to 12 characters makes for a stronger password. Avoid using the same password for multiple accounts.

4. Do not share your password with anyone at any time for any reason.
You are ultimately responsible for all activity performed on your account. If you give you password to friends, family or co-workers, what they do while logged in to your account will be your responsibility.

5. Keep your operating system, virus protection or anti-spyware software updated.
New viruses, worms and other malware are released across the Internet daily. Keeping your software up to date helps protect you against new problems.

6. Never provide confidential information like your username, password, credit card information or social security number in an email message or through an unsecure network.
Beware of “phishing” attempts that ask you via email to send confidential information such as your username, password or credit card information. The University’s Information Technology department will never ask you to send your username and password in an email message. Also remember that most publically available wireless networks are not secured.

7. Never store confidential information on your computer hard drive.
Never store confidential credit card information, grades or social security numbers on your computer’s hard drive. If you must store this information on your computer, you are strongly encouraged to encrypt the file.

8. Back up important files.
You can protect your important documents by storing them on an external drive, USB drive or writable CDs. You can also store information on your networked J drive, which is backed up nightly.

9. Don’t open an email attachment or click on a Web link in an email from an unknown source.
Most viruses and worms arrive on your computer in the form of email attachments. If you don’t know the source of the email or it looks untrustworthy, don’t click on it.

10. Password-protect your portable devices
Portable devices such as smart phones and USB drives are increasingly used by faculty, staff and students. Protect the information that you have stored on these devices by requiring a password to access the device. In general, do not keep confidential data of any kind on these devices.