Students asked what technologies they wish their instructors used more, and we asked faculty what technologies they think could make them more effective instructors. Both agree that content and resource-focused technologies should be incorporated more and social media and tablets should be incorporated less.
con?:with the advent of personal assistants like Siri and Google Now that aim to serve up information before you even know you need it, you don’t even need to type the questions.
pro: Whenever new technology emerges — including newspapers and television — discussions about how it will threaten our brainpower always crops up, Harvard psychology professor Steven Pinker wrote in a 2010 op-ed in The New York Times. Instead of making us stupid, he wrote, the Internet and technology “are the only things that will keep us smart.”
Pro and con: Daphne Bavelier, a professor at the University of Geneva, wrote in 2011 that we may have lost the ability for oral memorization valued by the Greeks when writing was invented, but we gained additional skills of reading and text analysis.
con: Daphne Bavelier, a professor at the University of Geneva, wrote in 2011 that we may have lost the ability for oral memorization valued by the Greeks when writing was invented, but we gained additional skills of reading and text analysis.
con: A 2008 study commissioned by the British Library found that young people go through information online very quickly without evaluating it for accuracy.
pro or con?: A 2011 study in the journal Science showed that when people know they have future access to information, they tend to have a better memory of how and where to find the information — instead of recalling the information itself.
pro: The bright side lies in a 2009 study conducted by Gary Small, the director of University of California Los Angeles’ Longevity Center, that explored brain activity when older adults used search engines. He found that among older people who have experience using the Internet, their brains are two times more active than those who don’t when conducting Internet searches.
the Internet holds great potential for education — but curriculum must change accordingly. Since content is so readily available, teachers should not merely dole out information and instead focus on cultivating critical thinking
make questions “Google-proof.”
“Design it so that Google is crucial to creating a response rather than finding one,” he writes in his company’s blog. “If students can Google answers — stumble on (what) you want them to remember in a few clicks — there’s a problem with the instructional design.”
The differences between the most popular 3D printing technologies, including: fused deposition modeling (FDM), stereolithography (SLA), digital light processing (DLP), and selective laser sintering (SLS)
How to understand a 3D printer specifications chart
What 3D printing resolution quality mean in 3D printing
How educators at universities, high schools, and colleges around the world are using the Form 2 to empower students and conduct research
Web search engines such as Google, Bing, and Yahoo are integral to making information more discoverable on the open web. How can you expose data about your organization, its services, people, collections, and other information in a way that is meaningful to these search engines?
In this 90 minute session, learn how to leverage Schema.org and semantic markup to achieve enhanced discovery of information on the open web. The session will provide an introduction to both Schema.org and the JSON-LD data format. Topics include an in-depth look at the Schema.org vocabulary, a brief overview of semantic markup with a focus on JSON-LD, and use-cases of these technologies. By the end of the session, you will have an opportunity to apply these technologies through a structured exercise. The session will conclude with resources and guidance for next steps.
Participants will leave this webinar with tools for increasing the discoverability of information on the open web.
This program will include presentation slides, bibliographic references to resources referenced to in the slides, and hands-on exercise material. The exercise material will include instructions, template records for attendees to practice applying Schema.org and JSON-LD, and example records as reference material.
Who Should Attend
Librarians and other professionals interested in increasing discovery of their organization’s information and collections on the open web. General knowledge of metadata concepts and standards is encouraged. Familiarity with the concept of data formats (XML, JSON, MARC, etc.) would be helpful.
Jacob Shelby is the Metadata Technologies Librarian at North Carolina State University (NCSU) Libraries, where he performs metadata activities that support library information services and collections. He has collaborated on endeavors to enhance the discovery of library services and collections on the open web, including exposing NCSU Libraries digital special collections data as Schema.org data. In addition to these endeavors, Jacob has taught workshops at NCSU Libraries on Schema.org and semantic markup.
he General Services Administration (GSA) has ordered the removal of Kaspersky software platforms from its catalogues of approved vendors. Meanwhile, the Senate is considering a draft bill of the 2018 National Defense Acquisition Authorization (known as the NDAA, it specifies the size of and uses for the fiscal year 2018 US Defense Department budget) that would bar the use of Kaspersky products in the military.
W.H. cybersecurity coordinator warns against using Kaspersky Lab software
The whole ordeal is a nightmare for Kaspersky Lab. The company looks incompetent at preventing state-sponsored hacks in the best-case scenario and complicit with the Russian government in the worst-case scenario. However it plays out, the unfolding drama will certainly hurt the software maker’s footprint in the U.S., where Congress has already taken action to purge the government of the company’s software.
The United States Computer Emergency Readiness Team (Cert) issued a warning on Sunday in response to the vulnerability.
“The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection and others,” the alert says, detailing a number of potential attacks. It adds that, since the vulnerability is in the protocol itself, rather than any specific device or software, “most or all correct implementations of the standard will be affected”.
Uribe-Tirado, A., Pinto, M., & Machin-Mastromatteo, J. (2017). Developing information literacy programs: Best practices from Latin America, Spain and Portugal. Information Development, 33, 543–549. https://doi.org/10.1177/0266666917728470