web analytics

Can You Pass Bv Back And Forth

How To Do Basic YoYo Tricks How To Do The Walk The Dog YoYo Trick

When you become a yoyo playerperformer,there's one trick that everyone wants to see and it's walk the dog. Walk the dog lookslike this. From a strong sleeper. You touch it to the ground and let it run. I'll trythat again so we can get the full view. It runs right across the ground like so. It worksa little bit better on a hard floor. On the carpet it slows it down a little bit. Trythis on a hard floor, somewhere that the yoyo is going to slide a little bit more as it'srunning. To do walk the dog what you do is you hold the yoyo, you're going to do a sleeper.Just like we showed you before. Strong sleeper. If you're over carpet again, you're goingto want a really strong sleeper because you

need a lot of momentum going so it doesn'tslow the yoyo down. What you do is you throw it. When you first start throwing your sleeper,you might get this. It's kind of a little bit of sway motion. It's important that youstudy that out. The easiest way to study it out is when you throw, if it's rocking backand forth like that you just swing your hand a little bit and it'll steady right out. Thenyou're ready to walk the dog. When you're at a competition, it's usually about one foot.You just go from the back of your foot to the front and walk it like so. Get it backto your hand. That's going to be walk the dog. The farther you go, obviously, the longerit's going to spin out, but you can do some

cool variations with it if you practice alittle bit. This one is walk the dog in between the legs. It can be a pretty fancy trick.That way the next time someone asks you to do walk the dog, you'll be prepared. That'swalk the dog.

ITS SOS Security Series 6

Ed : area where a body will give a data set to a faculty member, to a department and have specific controls that need to go with that data. And so really we're seeing a lot of compliance issues come back making sure that we are maintaining the proper protection of that data. Also, for a risk analysis and mitigation, we're really getting into an area where we don't really know where a lot

of this data is. Throughout the recent years with our PCI Compliance program and some with our AD 19 authorization to hold social security numbers through the privacy office, we've been able to get some control of the data, but however, a lot of the other data, we really don't have an idea where it's at and if it's properly being protected. So to do some proper risk analysis, we need to figure out where this data is at. And finally, fundamental security. Really, because of the distributed and diverse nature of Penn State, we know that there's data

almost everywhere. So, really trying to get a grasp of where that data is at and to make sure that the right data is being properly protected. So, a question, in Adobe Connect, could be another show of hands. Do you remember when data categorization was first introducedé Cathy, four years ago, three years ago, we put it.there's a Wikispace up. It was previously called data classification.

Yeah, Cathy began pioneering it in 1994, but we had a Wikispace up with a request for comments. Several. 2008, several years ago. Show of hands, anybody remember thaté Some people remember it. Just.what stood out the most about that.of those people who saw ité Okay, we have one person who says, it was complicated. Yeah, well, there's still some

complicating factors around that. And really, when you think about that Wikispace, that was a combination of the classification and the security controls that went with that. For this project, we're just really pulling out the data classification portions and worrying about that. The minimum security baseline, which is what the security controls. They were previously called Security Controls, now it's Minimum Security Baseline. That's actually in front of the IT Leadership Council as we speak and they're reviewing that. Anybody elseé Anything that stood out

for themé Nobody! It's actually surprising because when we talk, for instance, security, when we talk to a lot of people, they bring up this document and certain pain points with that document. So this is the second time we've asked this question and really haven't gotten too much response back. So it's good. We're moving on. Some of the timeline and scope and we're actually starting to assign some timelines to this so

Leave a Reply