Archive of ‘technology literacy’ category

foldable screen

View this post on Instagram

The Foldable Screen is finally here! #revolutionary #ces2019 Meet the Foldable Smartphone Being Showcased at CES 2019. The Royole FlexPai features a 7.8-inch, foldable AMOLED display. It's powered by a Qualcomm Snapdragon 855 SoC. _ What do you think of this design !? Does it look futuristic !!? Share your views comments below ⬇️ Tag your friends 🙇 Follow us 👉@engineering_enigma 🛡️ _ #engineering #technology #worldofengineering #howitsdone #mechanicalengineering #processporn #electricalengineering #howitsmade #engineeringlife #engineeringporn #science #futuristic #innovation #gadgets #Ingenieria #engineers #technologies #gadget #satisfyingvideos #software #futuretech #snapdragon #foldablephone #smartphone #mobile #computerscience #techworld #techwear Source : @cnet and Engadget (@youtube channel)

A post shared by 📝 Engineering🛠 (@engineering_enigma) on

Where Do Teachers Get Their Ideas?

https://www.edweek.org/ew/section/multimedia/data-where-do-teachers-get-their-ideas.html

January 10, 2018

a September 2017 online survey from the Education Week Research Center of a nationally representative sample of more than 500 K-12 teachers.

shaping the future of AI

Shaping the Future of A.I.

Daniel Burrus

https://www.linkedin.com/pulse/shaping-future-ai-daniel-burrus/

Way back in 1983, I identified A.I. as one of 20 exponential technologies that would increasingly drive economic growth for decades to come.

Artificial intelligence applies to computing systems designed to perform tasks usually reserved for human intelligence using logic, if-then rules, decision trees and machine learning to recognize patterns from vast amounts of data, provide insights, predict outcomes and make complex decisions. A.I. can be applied to pattern recognition, object classification, language translation, data translation, logistical modeling and predictive modeling, to name a few. It’s important to understand that all A.I. relies on vast amounts of quality data and advanced analytics technology. The quality of the data used will determine the reliability of the A.I. output.

Machine learning is a subset of A.I. that utilizes advanced statistical techniques to enable computing systems to improve at tasks with experience over time. Chatbots like Amazon’s Alexa, Apple’s Siri, or any of the others from companies like Google and Microsoft all get better every year thanks to all of the use we give them and the machine learning that takes place in the background.

Deep learning is a subset of machine learning that uses advanced algorithms to enable an A.I. system to train itself to perform tasks by exposing multi-layered neural networks to vast amounts of data, then using what has been learned to recognize new patterns contained in the data. Learning can be Human Supervised LearningUnsupervised Learningand/or Reinforcement Learning like Google used with DeepMind to learn how to beat humans at the complex game Go. Reinforcement learning will drive some of the biggest breakthroughs.

Autonomous computing uses advanced A.I. tools such as deep learning to enable systems to be self-governing and capable of acting according to situational data without human command. A.I. autonomy includes perception, high-speed analytics, machine-to-machine communications and movement. For example, autonomous vehicles use all of these in real time to successfully pilot a vehicle without a human driver.

Augmented thinking: Over the next five years and beyond, A.I. will become increasingly embedded at the chip level into objects, processes, products and services, and humans will augment their personal problem-solving and decision-making abilities with the insights A.I. provides to get to a better answer faster.

Technology is not good or evil, it is how we as humans apply it. Since we can’t stop the increasing power of A.I., I want us to direct its future, putting it to the best possible use for humans. 

++++++++++
more on AI in this IMS blog
http://blog.stcloudstate.edu/ims?s=artifical+intelligence

more on deep learning in this IMS blog
http://blog.stcloudstate.edu/ims?s=deep+learning

eportfolio as a process

4 things you should know about digital portfolios

BY MATT RENWICK December 6th, 2018
https://www.eschoolnews.com/2018/12/06/4-things-you-should-know-about-digital-portfolios/
1. Portfolio assessment is not new to education.
Digital portfolios came into prominence in the 1990s, around the time when computers became commonplace in classrooms. David Niguidula, a pioneer in this alternative form of assessment, coined the term “digital student portfolios.” He defines them as “an online collection of student work for a particular purpose and audience.” Digital portfolios cut the distance between student thinking and evidence of learning. There is no longer a need to represent understanding through a score or a grade.

2. . The best digital portfolios are process oriented.
A myth in education is that we should only showcase student’s best artifacts of learning. We might think of an artist’s body of work when considering digital portfolios as an alternative assessment.

3. It’s not a digital portfolio unless students are in charge.

4. Digital student portfolios are about more than just assessment.
The best digital portfolio processes do more than serve as an evaluation tool. They help the student develop a stronger sense of themselves as a learner and see their growth over time, such as through a series of drafts posted toward a final project and presentation.

++++++++++++++++++++++++
more on eportoflio in this IMS blog
http://blog.stcloudstate.edu/ims?s=eportfolio

Blockchain next election

Blockchain Disciples Have a New Goal: Running Our Next Election

Amid vote-hacking fears, election officials are jumping on the crypto bandwagon — but cybersecurity experts are sounding an alarm

At democracy’s heart lies a set of paradoxes: a delicate interplay of identity and anonymity, secrecy and transparency. To be sure you are eligible to vote and that you do so only once, the authorities need to know who you are. But when it comes time for you to mark a ballot, the government must guarantee your privacy and anonymity. After the fact, it also needs to provide some means for a third party to audit the election, while also preventing you from obtaining definitive proof of your choice, which could lead to vote selling or coercion.
Building a system that accomplishes all this at once — and does so securely — is challenging enough in the physical world. It’s even harder online, as the recent revelation that Russian intelligence operatives compromised voting systems in multiple states makes clear.
In the decade since the elusive Satoshi Nakamoto published an infamous white paper outlining the idea behind bitcoin, a “peer-to-peer electronic cash system” based on a mathematical “consensus mechanism,” more than 1,500 new cryptocurrencies have come into being.
definition: Nathan Heller in the New Yorker, in which he compares the blockchain to a scarf knit with a single ball of yarn. “It’s impossible to remove part of the fabric, or to substitute a swatch, without leaving some trace,” Heller wrote. Typically, blockchains are created by a set of stakeholders working to achieve consensus at every step, so it might be even more apt to picture a knitting collective creating that single scarf together, moving forward only when a majority agrees that a given knot is acceptable.
Unlike bitcoin, a public blockchain powered by thousands of miners around the world, most voting systems, including Votem’s, employ what’s known as a “permissioned ledger,” in which a handful of approved groups (political parties, election observers, government entities) would be allowed to validate the transactions.
there’s the issue of targeted denial-of-service (DoS) attacks, in which a hacker directs so much traffic at a server that it’s overwhelmed and ceases to function.
Although a distributed ledger itself would likely withstand such an attack, the rest of the system — from voters’ personal devices to the many servers a vote would pass through on its way to the blockchain — would remain vulnerable.
there’s the so-called penetration attack, like the University of Michigan incursion, in which an adversary gains control of a server and deliberately alters the outcome of an election.
While it’s true that information recorded on a blockchain cannot be changed, a determined hacker might well find another way to disrupt the process. Bitcoin itself has never been hacked, for instance, but numerous bitcoin “wallets” have been, resulting in billions of dollars in losses. In early June 2018, a South Korean cryptocurrency exchange was penetrated, causing the value of bitcoin to tumble and resulting in a loss of $42 billion in market value. So although recording the vote tally on a blockchain introduces a new obstacle to penetration attacks, it still leaves holes elsewhere in the system — like putting a new lock on your front door but leaving your basement windows open.
A blockchain is only as valuable as the data stored on it. And whereas traditional paper ballots preserve an indelible record of the actual intent of each voter, digital votes “don’t produce an original hard-copy record of any kind,”
In the end, democracy always depends on a certain leap of faith, and faith can never be reduced to a mathematical formula. The Economist Intelligence Unit regularly ranks the world’s most democratic counties. In 2017, the United States came in 21st place, after Uruguay and Malta. Meanwhile, it’s now widely believed that John F. Kennedy owed his 1960 win to election tampering in Chicago. The Supreme Court decision granting the presidency to George W. Bush rather than calling a do-over — despite Al Gore’s popular-vote win — still seems iffy. Significant doubts remain about the 2016 presidential race.
While little doubt remains that Russia favored Trump in the 2016 election, the Kremlin’s primary target appears to have been our trust in the system itself. So if the blockchain’s trendy allure can bolster trust in American democracy, maybe that’s a net positive for our national security. If someone manages to hack the system, hopefully they’ll do so quietly. Apologies to George Orwell, but sometimes ignorance really is strength.

+++++++++++
more on blockchain in this IMS blog
http://blog.stcloudstate.edu/ims?s=blockchain

Bitcoin explained through Pokemon

Explaining Bitcoin with Pokemon cards

the double-spending problem
when exchanging digital goods, how do you know somebody hasn’t sent the same asset to two people simultaneously?
use a ledger (a record of transactions) to track our trade.put our trust in this third party.we gave a copy of the ledger to every pokemon trader

forming chain of blocks

if I had duplicated my card, sent one copy out earlier then tried to send the second one to you, the history of that trade would already exist, so my second trade to you would conflict and be rejected.
change a block

that digital signature that gets put on each block? That is actually generated based on the info in the block, so changing the data (i.e removing my trade) automatically changes the signature.
changed block

an open, decentralised, non-reversible, tamper-proof digital network for trading valuable assets.

This is a simplified version of how blockchain technology works, but it’s easy to see how this tech gives Bitcoin its unique and fascinating properties.

+++++++++++
more on blockchain in this IMS blog
http://blog.stcloudstate.edu/ims?s=blockchain

 

1 2 3 48