<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 10 Apr 2026 14:29:18 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@iamelpidio/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[HUMAN COMPUTER INTERACTION PART 2]]></title><description><![CDATA[WHAT IS THE CONCEPT OF INTERACTION DESIGN? A design of interaction product and services in which a designers focus goes beyond the item in development to include the way users will interact with it. THE]]></description><link>http://direct.ecency.com/hci/@iamelpidio/human-computer-interaction-part-2</link><guid isPermaLink="true">http://direct.ecency.com/hci/@iamelpidio/human-computer-interaction-part-2</guid><category><![CDATA[hci]]></category><dc:creator><![CDATA[iamelpidio]]></dc:creator><pubDate>Mon, 20 Sep 2021 13:51:09 GMT</pubDate></item><item><title><![CDATA[HUMAN COMPUTER INTERACTION ]]></title><description><![CDATA[WHAT IS HUMAN COMPUTER INTERACTION? It is a multidisciplinary field of study focusing on the design of computer technology and, in particular, the interaction between human (the users) and computers. While]]></description><link>http://direct.ecency.com/hci/@iamelpidio/human-computer-interaction</link><guid isPermaLink="true">http://direct.ecency.com/hci/@iamelpidio/human-computer-interaction</guid><category><![CDATA[hci]]></category><dc:creator><![CDATA[iamelpidio]]></dc:creator><pubDate>Sat, 18 Sep 2021 02:17:36 GMT</pubDate></item><item><title><![CDATA[SECURITY SYSTEM 3]]></title><description><![CDATA[What is Operational Security? Operational Security is a management process that encourages managers to view operations from the perspective of an adversary in order to protect sensitive information from]]></description><link>http://direct.ecency.com/securitysystem/@iamelpidio/security-system-3</link><guid isPermaLink="true">http://direct.ecency.com/securitysystem/@iamelpidio/security-system-3</guid><category><![CDATA[securitysystem]]></category><dc:creator><![CDATA[iamelpidio]]></dc:creator><pubDate>Sat, 18 Sep 2021 02:01:33 GMT</pubDate></item><item><title><![CDATA[SECURITY SYSTEM 2]]></title><description><![CDATA[The difference of the Certification Programs to Common Body Language Certification programs - defined set of components or training programs offered by your organization to members to prove that they have]]></description><link>http://direct.ecency.com/securitysystem/@iamelpidio/security-system-2</link><guid isPermaLink="true">http://direct.ecency.com/securitysystem/@iamelpidio/security-system-2</guid><category><![CDATA[securitysystem]]></category><dc:creator><![CDATA[iamelpidio]]></dc:creator><pubDate>Tue, 14 Sep 2021 10:42:27 GMT</pubDate></item><item><title><![CDATA[SECURITY SYSTEM]]></title><description><![CDATA[What is an Information Security Assurance? Information Security Assurance plays an important role in the infrastructure that support commerce, banking, telecommunications, health care, and security driving]]></description><link>http://direct.ecency.com/securitysystem/@iamelpidio/security-system</link><guid isPermaLink="true">http://direct.ecency.com/securitysystem/@iamelpidio/security-system</guid><category><![CDATA[securitysystem]]></category><dc:creator><![CDATA[iamelpidio]]></dc:creator><pubDate>Tue, 14 Sep 2021 09:30:30 GMT</pubDate></item></channel></rss>