took only a few days to create the clip on a desktop computer using a generative adversarial network (GAN), a type of machine-learning algorithm.
Faith in written information is under attack in some quarters by the spread of what is loosely known as “fake news”. But images and sound recordings retain for many an inherent trustworthiness. GANs are part of a technological wave that threatens this credibility.
Amnesty International is already grappling with some of these issues. Its Citizen Evidence Lab verifies videos and images of alleged human-rights abuses. It uses Google Earth to examine background landscapes and to test whether a video or image was captured when and where it claims. It uses Wolfram Alpha, a search engine, to cross-reference historical weather conditions against those claimed in the video. Amnesty’s work mostly catches old videos that are being labelled as a new atrocity, but it will have to watch out for generated video, too. Cryptography could also help to verify that content has come from a trusted organisation. Media could be signed with a unique key that only the signing organisation—or the originating device—possesses.
cyber security experts say that weaving your personal and professional lives together via a work laptop is risky business — for you and the company. Software technology company Check Point conducted a survey of over 700 IT professionals which revealed that nearly two-thirds of IT pros believed that recent high-profile breaches were caused by employee carelessness.
DON’T: Save personal passwords in your work device keychain.
DON’T: Make off-color jokes on messaging software.
DON’T: Access free public wi-fi while working on sensitive material.
DON’T: Allow friends or non-IT department colleagues to remotely access your work computer.
DON’T: Store personal data.
DON’T: Work on your side hustle while at the office.
95 percent of larger programs (those with 2,500 or more online program students) are “wholly asynchronous” while 1.5 percent are mainly or completely synchronous. About three-quarters (73 percent) of mid-sized programs (schools with between 500 and 2,499 online program students) and 62 percent of smaller programs are fully asynchronous.
The asynchronous nature of this kind of education may explain why threaded discussions turned up as the most commonly named teaching and learning technique, mentioned by 27.4 percent of respondents, closely followed by practice-based learning, listed by 27.3 percent of survey participants.
While the LMS plays a significant role in online programming, the report pointed to a distinct lack of references to “much-hyped innovations,” such as adaptive learning, competency-based education systems, simulation or game-based learning tools. (my note: my mouth run dry of repeating every time people start becoming orgasmic about LMS, D2L in particular)
four in 10 require the use of instructional design support, three in 10 use a team approach for online course design and one in 10 outsources the work. Overall, some 80 percent of larger programs use instructional design expertise.
In the smallest programs, instructional design support is treated as a “faculty option” for 53 percent of institutions. Another 18 percent expect faculty to develop their online courses independently. For 13 percent of mid-sized programs, the faculty do their development work independently; another 64 percent may choose whether or not to bring in instructional design help. (my note: this is the SCSU ‘case’)
Among the many possible quality metrics suggested by the researchers, the five adopted most frequently for internal monitoring were:
Student achievement of program objectives (83 percent);
Student retention and graduation rates (77 percent);
Maya Georgieva, an ed tech strategist, author and speaker with more than 15 years of experience in higher education and global education. Georgieva is co-founder of Digital Bodies, a consulting group that provides news and analysis of VR, AR and wearables in education
Microsoft has been collaborating with its partners, such as HP, Acer, Dell and Lenovo, to develop VR headsets that will work with lower-end desktops. Later this year, the companies will debut headsets for $299, “which is much more affordable compared to HoloLens
many Kickstarter crowdfunding efforts are bound to make high-end headsets more accessible for teaching.
the NOLO project. The NOLO system is meant for mobile VR headsets and gives users that “6 degrees of freedom” (or 6 DoF) motion tracking that is currently only found in high-end headsets.
2) Hand Controllers That Will Bring Increased Interactivity
In February, Google added WebVR to Chrome on Daydream-ready phones (like Pixel and ZenFone). The WebVR standard allows users to view virtual reality (VR) experiences in a browser like Chrome by simply tapping a link and putting on a compatible headset. Yesterday, the company revealed it added support for Google Cardboard and launched a new homepage for web-based VR experiments.
WebVR support on Chrome for Oculus Rift and HTC Vive is “coming soon.”
shows that state and federal laws, as well as industry self-regulation, have failed to keep up with a growing education technology industry.
One-third of all K–12 students in the United States use school-issued devices running software and apps that collect far more information on kids than is necessary.
Resource-poor school districts can receive these tools at deeply discounted prices or for free, as tech companies seek a slice of the $8 billion ed tech industry. But there’s a real, devastating cost — the tracking, cataloging and exploitation of data about children as young as 5 years old.
Our report shows that the surveillance culture begins in grade school, which threatens to normalize the next generation to a digital world in which users hand over data without question in return for free services
EFF surveyed more than 1,000 stakeholders across the country, including students, parents, teachers and school administrators, and reviewed 152 ed tech privacy policies.
“Spying on Students” provides comprehensive recommendations for parents, teachers, school administrators and tech companies to improve the protection of student privacy. Asking the right questions, negotiating for contracts that limit or ban data collection, offering families the right to opt out, and making digital literacy and privacy part of the school curriculum are just a few of the 70-plus recommendations for protecting student privacy contained in the report.
new report from market research firm Gartner, overall device shipments will remain flat in 2017, even as traditional PCs (including laptops) go into a decline that’s forecast to last at least through 2019. Excluding smart phones