Google just shut down all the social media accounts for Glass
The social media team behind Glass made one final posting on Google+ — pointing to a place where problems can be reported — and shut down the Twitter account.
The Google Glass name is being phased out and replaced by Glass: Enterprise Edition. Google has recently been letting more partners try Glass, according to the report, as it aims to drum up interest in its product.
Follow the history of GG through our IMS blog entries:
Student’s relationship with technology is complex. They recognize its value but still need guidance when it comes to better using it for academics.
|Educause’s ECAR Study, 2013
|IMS faculty would be happy to meet with you or your group at your convenience.
Please request using this Google Form: http://scsu.mn/1OjBMf9 or
by email: firstname.lastname@example.org | email@example.com
How you can reach us:
Services we provide:
- Instruct and collaborate with faculty, staff and students on specific computer, Cloud and mobile applications
- Assist faculty in course design and instruction to incorporate SCSU’s resources
- Join faculty in the classroom instructional design to assist students with learning technology application for the class
- Consult with faculty on instructional design issues, particularly those that use the World Wide Web, multimedia techniques and interactivity
- Collaborate with faculty, staff and students on technology-related projects
- Work with campus units in technology planning and acquisition
- Respond to faculty, staff and students requests and technology developments
Content May Be King, But Branded Video Content Rules Marketing Tactics
According to a study by Cisco:
- The number of mobile-connected devices exceeded the world’s population in 2014 and by 2019 there will be nearly 1.5 mobile devices per capita
- By 2019, more than half of all devices connected to the mobile network will be “smart” devices.
- Mobile video viewing was responsible for 55% of total mobile data traffic in 2014 and 72% of the world’s mobile data traffic will be video by 2019.
Pizza Hut’s “Danger of Self Sticks PSA” which has been viewed nearly 4 million times on YouTube as well as Vooza’s “Startup Class” video
- Start with the audience. Figure out who you’re trying to reach with your content and then reverse engineer from there. For example, we like going after Apple because Apple fans are so insane about their products.
- Expect to roll out a lot of content consistently over time. It takes a while to build up an audience.
- Get an email list going–it’s still the best way to reach fans.
- Answer this question: “Why would people want to share this?” Because if people don’t share it organically, it probably won’t go far. For example, designers love sharing this CEO video with each other because they can all relate to the know-it-all CEO who thinks he/she knows best how to design a logo.
- The more heavy-handed you are with the sales pitch, the less likely people are to share it. Let the funny lead the way whenever possible.
- Don’t be so fearful to push people’s buttons. Have some edge. Make fun of people. HBO is great because there are no advertisers who say, “Don’t say that.”
- Find your intersection. What’s the thing that you can make that no one else can? That’s your island. For Vooza, it’s funny plus tech.
- Make it findable. Think about how people search for things online and get into that stream with the right headlines, keywords, etc.
Tablet Shipments Drop 7 Percent in Second Quarter of 2015 with Apple Posting Largest Decline
Apple saw the largest decline
“Longer life cycles, increased competition from other categories such as larger smartphones, combined with the fact that end users can install the latest operating systems on their older tablets has stifled the initial enthusiasm for these devices in the consumer market,”
Smarter Wearables – A vision of the future of the Smart Watch
upgradability, material usage, fashion accessorizing, or interface design
More on wearables in this blog:
I am including a couple whitepapers you can review and forward to all staff who may be curious about our teaching and learning tool and would be attending the demo on May 11th at 1.00pm
Please see the go to meeting instructions for our Bluepulse v1.5 walkthrough.
United States: +1 (312) 757-3126
Access Code: 822-849-653
As you mentioned faculty may be very interested in using Bluepulse, I wanted to include the link for our instructor video: https://www.youtube.com/watch?v=XgdpQT3jkBQ&feature=youtu.be
If you have any questions about the integration, training or implementation, please do not hesitate to email or call and as always I am more than happy to help.
Bluepulse Account Manager
harvest students; feedback – anonymous way to ask questions. D2L surveys offer already this opportunity; Twitter and other the free options for polling apps give the same option, e.g. Polleverywhere gives a word cloud option
the follow up q/n as demonstrated is limited to 160 characters. Why?
i like that it compartmentalize the anonymity but I really ask myself: would SCSU faculty go to such length?
presumptions: non-tenured faculty is interested in the top layers students and wants to find out what works for them best. this loaded, since, if there ARE different learning styles, then what worked for the top layer might be exactly what did not work for the bottom layer, but this approach will gave the faculty a justification to keep stratifying students, instead of thinking of diverse ways to approach all layers. this part of sale, not pedagogy. sorry.
weakness; the entire presentation is trying to sell a product, which might be good for different campus, but not for SCSU, where faculty are overworked, the class load is so great that going to such details might be questionable.
exporting CSV for data massaging is not big deal. indeed the easy of this particular software is admirable, but if the faculty has time to go into such details, they can export the data from D2L or Google Forms and open it in SPSS
Greg’s question: mobility.
libraries and services. pole users without being tied to course. again, that all can be done with other services in the library. if the library cares about it at all.
The Brutal Authenticity Of BYOD
By allowing students to bring in their own devices for learning–rather than insisting that they learn both content and device in school–there is an important opportunity to connect with not just their personal lives, but their natural way of doing things.
While there are students who badly want technology and can’t afford even the $50, that doesn’t seem to be a strong argument against BYOD adoption, especially in light of what it costs—in time and money—to purchase, train, integrate, and maintain—state-funded, district-purchased, school-assigned devices. This is where schools, local organizations, and communities can step in.
Money and Learning
In the United States there can be a tendency to throw money at problems that are not fully understood. As a nation, America lags behind internationally, the “learning market” being one of the few markets proving evasive in lieu of continued effort, struggle, and spending.
More on BYOD in this blog:
11 Sample Education BYOT Policies To Help You Create Your Own
A Bried History of BIG Data
Volume, Velocity, Variety
Internet of Things
privacy, security, intellectual property
Sizing Up Wearable Tech and IoT in the Enterprise
Kayla Bittner 358 842 843 Twitter:#smartoffice
Det Ansinn speaker
Android Wear (java)
Samsung Tizen (HTML5)
Apple Watch WatchKit (Swift, Objective-C support is buggy)
WatchKit is the least mature
limitations: no keyboard, no mouse, no touch screen, battery life, limited usable screen real estate, CPU performance
opportunities: hands-free, speech for text input, sensors (gyro, camera, accelerometer), gesture-based input, BLE (bluetoothSmart)
GOod wearable Design: Recognizes immediacy, leverages context of the wearer
challenging to develop good experiences for these devices.
802.11 will eat short battery life, in addition to bluetooth. Samsung Gear S will get notification even from afar, but usually smartwatch notification is paired only in immediate proximity of the bluetoothed device.
industrial uses of wearable: tag and quickmessages, not occupying hands.
keyboard is with swipe gestures.
Frank Schloendorn, Fiberlink, speaker
build in security is limited. Jailbroken / rooted devices are at higher risk> Open to hacking, still in infancy. No real MDM (Mobile Device Management) type solutions available
Do you currently own smartwatch
no management solutions exist today. OS: Tizen, Android, PebbleOS, Apple Watch OS etc
Cameras and other sensors cant be managed, monitored (spy scenario)
Is wearable an independent device or an extension of a smartphone
manage the connected device, not the wearable
be aware of what data can “leak” to a wearable device
if necessary, take more extreme measures (block bluetooth, ban devices)
new security options for mobile devices linked to wearables. bypass lock screen with presence of wearable, content sensitive security.