Archive of ‘technology’ category

first snow in 360

Well, technically not the first for 2016, but certainly beautiful:

https://app.viar360.com/media?leaf=2LlIRQqu1Wto

Best experience with VR goggles: Google Cardbox, Veve etc. (please ask for more info if needed). If you have goggles, choose “VR Mode” (1), if viewing on your computing device (desktop, laptop, smart phone, tablet) and/or don’t have goggles, choose “Panorama Mode” (2)

Virtual Reality

Save

If you would like to brainstorm ideas to apply Virtual Reality, Augmented Reality and/or 360 video in your courses, please let us know…

signal open whisper system

signal app
open whisper system is the company
download from the NPR Marketplace Tech available here:
http://play.podtrac.com/APM-MarketplaceTechReport/play.publicradio.org/rss/d/podcast/marketplace/tech_report/2016/11/16/tech_20161116_pod_64.mp3?siteplayer=true&dl=1

More on the app in the Codebreaker podcast

++++++++++++++++++++++++++++
more on cybersecurity in this blog:
http://blog.stcloudstate.edu/ims?s=cybersecurity
More on civil disobedience in this blog:
http://blog.stcloudstate.edu/ims?s=civil

 

visualization of cyberattacks

Carnegie Mellon Researchers Create Data Visualization Tool to Identify Cyber Attacks

By Rhea Kelly 11/07/16

https://campustechnology.com/articles/2016/11/07/carnegie-mellon-researchers-create-data-visualization-tool-to-identify-cyber-attacks.aspx

Researchers at Carnegie Mellon University‘s CyLab Security and Privacy Institute have developed a new tool for analyzing network traffic and identifying cyber attacks. The tool uses data visualization to make it easier for network analysts to see key changes and patterns generated by distributed denial of service attacks, malware distribution networks and other malicious network traffic.

presented the tool last week at the IEEE Symposium on Visualization for Cybersecurity in Baltimore, MD.

+++++++++++++++++++
more on cybersecurity in this IMS blog
http://blog.stcloudstate.edu/ims?s=Search

hacking voting

A Voice Cuts Through, and Adds to, the Intrigue of Russia’s Cyberattacks

++++++++++++++++++++
more on Eastern European hackers in this IMS blog:
http://blog.stcloudstate.edu/ims/2016/06/22/ukrainian-hacker-and-fbi/

Google AI

Google Researchers Create AI That Builds Its Own Encryption

BY TOM BRANT OCTOBER 28, 2016 04:45PM EST

http://www.pcmag.com/news/349154/google-researchers-create-ai-that-builds-its-own-encryption

Alice and Bob have figured out a way to have a conversation without Eve being able to overhear, no matter how hard she tries.

They’re artificial intelligence algorithms created by Google engineers, and their ability to create an encryption protocol that Eve (also an AI algorithm) can’t hack is being hailed as an important advance in machine learning and cryptography.

Martin Abadi and David G. Andersen, explained in a paper published this week that their experiment is intended to find out if neural networks—the building blocks of AI—can learn to communicate secretly.

As the Abadi and Anderson wrote, “instead of training each of Alice and Bob separately to implement some known cryptosystem, we train Alice and Bob jointly to communicate successfully and to defeat Eve without a pre-specified notion of what cryptosystem they may discover for this purpose.”

same in German

Googles AI entwickelt eigenständig Verschlüsselung

von – 31.10.2016
http://www.com-magazin.de/news/verschluesselung/googles-ai-entwickelt-eigenstaendig-verschluesselung-1145175.html
Google-Forscher Martin Abadi und David G. Andersen des Deep-Learning-Projekts “Google Brain” eine neue Verschlüsselungsmethode entwickelt beziehungsweise entwickeln lassen. Die Forscher haben verschiedene neurale Netze damit beauftragt, eine abhörsichere Kommunikation aufzustellen.

++++++++++++++++
more on AI in this IMS blog:
http://blog.stcloudstate.edu/ims?s=artificial+intelligence

actual use of LMS

How people actually use Blackboard, according to Blackboard

Blackboard use

http://blog.blackboard.com/patterns-in-course-design-how-instructors-actually-use-the-lms/

My note: Bryan Alexnader finished his blog entry with this q/n: I wonder if that holds true across other LMS tools (Moodle, Sakai, Canvas, etc).
++++++++++++++

more on use of LMS in education:
http://blog.stcloudstate.edu/ims?s=LMS

hack the drones

Hackers are able to seize control of consumer drones and make them fall from the sky

https://plus.google.com/+ScrewMuggz/posts/KMtnAxhMYtc

there aren’t clear rules about what manufacturers need to do to secure drones to prevent them from being tampered with by malicious hackers.

Police have owned signal jamming tools to interfere with consumer drones for years. After all, it was a regular consumer drone that a member of ISIS turned into a kamikaze to bomb Kurdish fighters.

My note: from jamming devices, to raptors (birds) to hacking the apps – #BumpyRoad for drones

+++++++++++++++++
more on drones in this IMS blog:
http://blog.stcloudstate.edu/ims?s=drones

how to digital storytelling

An excellent example of practical approach to a real digital storytelling case:

https://plus.google.com/+GeorgeCohn/posts/XfaXtgp5amA

++++++++++++++++++++

more on digital storytelling in this IMS blog:
http://blog.stcloudstate.edu/ims?s=digital+storytelling

Blackboard Learn Gets Dropbox Integration

By David Nagel 10/25/2016

https://thejournal.com/articles/2016/10/25/blackboard-learn-gets-dropbox-integration.aspx

Announced at the Educause 2016 conference, Blackboard Learn users will now be able to collaborate on documents using the cloud sharing platform Dropbox.

My note: BB is only catching up with Google, which has Google Drive (~ Dropbox) and Google Classroom (~ BB). It doesn’t matter how much hype BB is trying to produce, the fact is that BB is behind.
D2L is even farther behind, without an integration of any video tool. Google has Google Hangouts and BB purchased several video conferencing tools until it got “the right one.”
D2L announce in 2010 an integration with Skype but it has not happened. Now, D2L will be double behind without integration of a cloud-based file space.

++++++++++++++++++

more on LMS in this IMS blog:
http://blog.stcloudstate.edu/ims?s=lms

1 2 3 4 40