Are you ready to deal with “denial of sleep” attacks? Those are attacks using malicious code, propagated through the Internet of Things, aimed at draining the batteries of your devices by keeping them awake.
Security. threats extend well beyond denial of sleep: “The IoT introduces a wide range of new security risks and challenges to the IoT devices themselves, their platforms and operating systems, their communications, and even the systems to which they’re connected.
Analytics. IoT will require a new approach to analytics. “New analytic tools and algorithms are needed now, but as data volumes increase through 2021, the needs of the IoT may diverge further from traditional analytics,” according to Gartner.
Device (Thing) Management. IoT things that are not ephemeral — that will be around for a while — will require management like every other device (firmware updates, software updates, etc.), and that introduces problems of scale.
Low-Power, Short-Range IoT Networks. Short-range networks connecting IT devices will be convoluted. There will not be a single common infrastructure connecting devices.
Low-Power, Wide-Area Networks. Current solutions are proprietary, but standards will come to dominate.
Processors and Architecture. Designing devices with an understanding of those devices’ needs will require “deep technical skills.”
Operating Systems. There’s a wide range of systems out there that have been designed for specific purposes.
Event Stream Processing. “Some IoT applications will generate extremely high data rates that must be analyzed in real time.
Platforms. “IoT platforms bundle many of the infrastructure components of an IoT system into a single product.
Standards and Ecosystems. as IoT devices proliferate, new ecosystems will emerge, and there will be “commercial and technical battles between these ecosystems” that “will dominate areas such as the smart home, the smart city and healthcare.
In November 2015, the Open University released the latest edition of its ‘Innovating Pedagogy’ report, the fourth rendition of an annual educational technology and teaching techniques forecast. While the timelines and publishing interval may remind you of the Horizon Report, the methodology for gathering the trends is different.
The NMC Horizon Team uses a modified Delphi survey approach with a panel of experts.
10 Innovative Pedagogy Trends from the 2015 Edition:
Crossover Learning: recognition of diverse, informal achievements with badges.
Learning through Argumentation: To fully understand scientific ideas and effectively participate in public debates students should practice the kinds of inquiry and communication processes that scientists use, and pursue questions without known answers, rather than reproducing facts.
Incidental Learning: A subset of informal learning, incidental learning occurs through unstructured exploration, play and discovery. Mobile technologies can support incidental learning. An example is the app and website Ispot Nature.
Context-based Learning:Mobile applications and augmented reality can enrich the learners’ context. An example is the open source mobile game platform ARIS.
Computational Thinking: The skills that programmers apply to analyze and solve problems are seen as an emerging trend . An example is the programming environment SCRATCH.
Learning by Doing Science with Remote Labs: A collection of accessible labs is ilab
Embodied learning:involving the body is essential for some forms of learning, how physical activities can influence cognitive processes.
Adaptive Teaching:intelligent tutoring systems – computer applications that analyse data from learning activities to provide learners with relevant content and sequence learning activities based on prior knowledge.
Analytics of Emotions: As techniques for tracking eye movements, emotions and engagement have matured over the past decade, the trend prognoses opportunities for emotionally adaptive learning environments.
Stealth Assessment: In computer games the player’s progress gradually changes the game world, setting increasingly difficult problems through unobtrusive, continuous assessment.
6 Themes of Pedagogical Innovation
Based upon a review of previous editions, the report tries to categorize pedagogical innovation into six overarching themes:
“What started as a small set of basic teaching methods (instruction, discovery, inquiry) has been extended to become a profusion of pedagogies and their interactions. So, to try to restore some order, we have examined the previous reports and identified six overarching themes: scale, connectivity, reflection, extension, embodiment, and personalisation.”
Delivering education at massive scale.
Connecting learners from different nations, cultures and perspectives.
Fostering reflection and contemplation.
Extending traditional teaching methods and settings.
Recognizing embodied learning (explore, create, craft, and construct).
Creating a personalized path through educational content.
Follow these links to blog posts and EdITLib resources to further explore selected trends:
Interested in the Innovating Pedagogy report? Read our review of the 2014 edition, and reflect which trends are closer to becoming common practice.
I second Keepass. Not only is it free, open source, and multi-OS, but it lives on your computer, not in the cloud (although the database can be put on a shared drive or in DropBox for access across devices). Personally that makes me feel much safer. There are clients available for Windows, Mac, Linux, IPhone, Android and even Blackberry.
I use lastpass as well. However, LastPass was just bought by LogMeIn, so lots of people are holding their breath hoping that things stay good. Another open source, multi-os, alternative is keepass (keepass.info)
I really like Dashlane (dashlane.com) – it has a lot of options, including the ability to give someone else access to your passwords in certain situations (plus, they support Firefox financially via low-impact ads). I think of this sometimes when I think about what would happen if a piano fell on me tomorrow – what a mess it would be for my spouse to cope with my digital life! That said, although I use Dashlane, I still have not quite managed to get myself to use all its functionality.
From: email@example.com [mailto:firstname.lastname@example.org] On Behalf Of Cary Gordon
Sent: Wednesday, January 06, 2016 12:37 PM
Subject: Re: [lita-l] Question on password management
From: email@example.com [mailto:firstname.lastname@example.org] On Behalf Of COLLINS, MATTHEW
Sent: Wednesday, January 06, 2016 12:35 PM
Subject: RE: [lita-l] Question on password management
I have used Roboform for at least 10 years and never had a problem. It manages passwords for logins and bookmarks on my PCs, my iPhone and iPad. It synchs online so work, home, tablet and phone all have the same info. It also stores personal info (name & multiple addresses) and confidential notes and other info.
Note: CAPS is used here and there to call attention without extra Gmail formatting, not to shout at anyone. Still…I know I look like I yell here. I have flogged myself, I will now bathe in the River Salt.
Ok, check it out.
Plugins, macros, group/profile/source/target/timing locks, separate DBs and separate metadata for these if you like, INTERNALLY-ROTATING SUPERKEYS via REGULARKEYTRANSORMATIONS and TWO-CHANNEL AUTO-TYPE OBFUSCATION (for obfuscating your auto-typed passwords or keys, if you select Auto)….!!!…
…and well-reasoned, well-EXPLAINED approaches to certain critical areas of password management in general and to KeePass in particular.
For instance: In the FAQ, read the logic breakdown (thought-by-thought explanation) of why Keepass does NOT lock itself when a SUB-dialogue box is open in Keepass whle the user then LOCKS the workstation. =)
Why doesn’t KeePass lock when Windows locks and a KeePass sub-dialog is open?
My support of Keepass as a primary, then a close alternative, comes from four of my six years in IT being in direct computer and network security roles. Sure, not the most trench years out there, but they are all engineering and tiered-analyst roles for several major US corporations.
I’m proud of that…and in terms of relevance, I worked – and still work – with and around many engineers, analysts, and scientists (data, algorithmic). I look up to these people a great deal, and many of these coworkers come fully assembled having forgotten more than I’ll ever know and still learning faster than I could ever talk about… and even THEY use Keepass and they use it powerfully.
Detection of each site’s contact (HTTP GET, form forcus, etc) or “touch” can be different with each browser it integrates into, and that’s just for starters. One can also script up a different timing to use before the credentials are passed….;)….one can also relegate references to a central database, or one can refer only to the local system or even just a specific profile that can access said .kdbx file (KeePass database), or one can limit the data source to just one .kdbx single-instance database file, or one can use the .kdbx as a secondary for some other central repository failure, if that happens.
One can make several .kdbx files for different uses…no requirement to have just one! Each a diffferent base of unique data keys, each wtih a different direction administered on when it is referenced, how it is run, and where it lives on a system.
Aaaaaand it can integrate with other DBMs, it’s not an island!
Keepass is not the end-all be-all, but it IS FOSS (Free and Open-Source Software, great for investigating its machinery). Also it is:
– Programmable (via the Plugins model, you can write some yourself if you like!)
– Modularizable (again, via the Plugins model)
– Profile lockable, (<— really neat!)
– SMM (Secure Memory Manageable, for Windows Clipboard and the like)
– and more!
Anyway, Keepass is rad for its cost, but, like the others on this thread, I will second LastPass as well. LastPass is a an alternative to Keepass. =)
is it possible that the Iranian government realized the evolution of social media and his respective obsolescence and this is why they freed him prematurely?
Blogs were gold and bloggers were rock stars back in 2008 when I was arrested.
The hyperlink was a way to abandon centralisation – all the links, lines and hierarchies – and replace them with something more distributed, a system of nodes and networks. Since I got out of jail, though, I’ve realised how much the hyperlink has been devalued, almost made obsolete.
Nearly every social network now treats a link as just the same as it treats any other object – the same as a photo, or a piece of text. You’re encouraged to post one single hyperlink and expose it to a quasi-democratic process of liking and plussing and hearting. But links are not objects, they are relations between objects. This objectivisation has stripped hyperlinks of their immense powers.
At the same time, these social networks tend to treat native text and pictures – things that are directly posted to them – with a lot more respect. One photographer friend explained to me how the images he uploads directly to Facebook receive many more likes than when he uploads them elsewhere and shares the link on Facebook.
Some networks, like Twitter, treat hyperlinks a little better. Others are far more paranoid. Instagram – owned by Facebook – doesn’t allow its audiences to leave whatsoever. You can put up a web address alongside your photos, but it won’t go anywhere. Lots of people start their daily online routine in these cul-de-sacs of social media, and their journeys end there. Many don’t even realise they are using the internet’s infrastructure when they like an Instagram photograph or leave a comment on a friend’s Facebook video. It’s just an app.
A most brilliant paragraph by some ordinary-looking person can be left outside the stream, while the silly ramblings of a celebrity gain instant internet presence. And not only do the algorithms behind the stream equate newness and popularity with importance, they also tend to show us more of what we have already liked. These services carefully scan our behaviour and delicately tailor our news feeds with posts, pictures and videos that they think we would most likely want to see.
Today the stream is digital media’s dominant form of organising information. It’s in every social network and mobile application.
The centralisation of information also worries me because it makes it easier for things to disappear.
But the scariest outcome of the centralisation of information in the age of social networks is something else: it is making us all much less powerful in relation to governments and corporations. Surveillance is increasingly imposed on civilised lives, and it gets worse as time goes by. The only way to stay outside of this vast apparatus of surveillance might be to go into a cave and sleep, even if you can’t make it 300 years.
real-time impact on curriculum structure, instruction delivery and student learning, permitting change and improvement. It can also provide insight into important trends that affect present and future resource needs.
Big Data: Traditionally described as high-volume, high-velocity and high-variety information.
Learning or Data Analytics: The measurement, collection, analysis and reporting of data about learners and their contexts, for purposes of understanding and optimizing learning and the environments in which it occurs.
Educational Data Mining: The techniques, tools and research designed for automatically extracting meaning from large repositories of data generated by or related to people’s learning activities in educational settings.
Predictive Analytics: Algorithms that help analysts predict behavior or events based on data.
Predictive Modeling: The process of creating, testing and validating a model to best predict the probability of an outcome.
Data analytics, or the measurement, collection, analysis and reporting of data, is driving decisionmaking in many institutions. However, because of the unique nature of each district’s or college’s data needs, many are building their own solutions.
For example, in 2014 the nonprofit company inBloom, Inc., backed by $100 million from the Gates Foundation and the Carnegie Foundation for the Advancement of Teaching, closed its doors amid controversy regarding its plan to store, clean and aggregate a range of student information for states and districts and then make the data available to district-approved third parties to develop tools and dashboards so the data could be used by classroom educators.22
Tips for Student Data Privacy
Know the Laws and Regulations
There are many regulations on the books intended to protect student privacy and safety: the Family Educational Rights and Privacy Act (FERPA), the Protection of Pupil Rights Amendment (PPRA), the Children’s Internet Protection Act (CIPA), the Children’s Online Privacy Protection Act (COPPA) and the Health Insurance Portability and Accountability Act (HIPAA)
— as well as state, district and community laws. Because technology changes so rapidly, it is unlikely laws and regulations will keep pace with new data protection needs. Establish a committee to ascertain your institution’s level of understanding of and compliance with these laws, along with additional safeguard measures.
Make a Checklist Your institution’s privacy policies should cover security, user safety, communications, social media, access, identification rules, and intrusion detection and prevention.
Communicate, Communicate, Communicate
Students, staff, faculty and parents all need to know their rights and responsibilities regarding data privacy. Convey your technology plans, policies and requirements and then assess and re-communicate those throughout each year.
“Anything-as-a-Service” or “X-as-a-Service” solutions can help K-12 and higher education institutions cope with big data by offering storage, analytics capabilities and more. These include:
• Infrastructure-as-a-Service (IaaS): Providers offer cloud-based storage, similar to a campus storage area network (SAN)
• Platform-as-a-Service (PaaS): Opens up application platforms — as opposed to the applications themselves — so others can build their own applications
using underlying operating systems, data models and databases; pre-built application components and interfaces
• Software-as-a-Service (SaaS): The hosting of applications in the cloud
• Big-Data-as-a-Service (BDaaS): Mix all the above together, upscale the amount of data involved by an enormous amount and you’ve got BDaaS
Use accurate data correctly
Define goals and develop metrics
Eliminate silos, integrate data
Remember, intelligence is the goal
Maintain a robust, supportive enterprise infrastructure.
Prioritize student privacy
Develop bullet-proof data governance guidelines
Create a culture of collaboration and sharing, not compliance.
building relationships with students so I can better connect lessons to their interests, hopes and dreams; providing them with many opportunities for organizational and cognitive choice; and creating situations where they can get positive, as well as critical, feedback in a supportive way from me, their classmates and themselves.
Response: Personalized Learning Is ‘Based On Relationships, Not Algorithms’
Too often, the notion of “personalized learning” means choice-based programmed rather than truly personalized. This comes from the tech world, where “personalization” is synonymous with user choice. It’s the idea of giving a thumbs up or a thumbs down on Pandora. It’s the idea of having adaptive programs that change based upon one’s personal preferences. It’s the Facebook algorithm that tells you what information is the most relevant to you. It’s about content delivery rather than user creation.
While tech companies promise personalization, they often promote independent, isolated learning. True personalization is interdependent rather than isolated. True personalization is based upon a horizontal relationship rather than a top-down customization. True personalization is based upon a deeply human relationship rather than a program or an algorithm or a set of scripts. True personalization is a mix between personal autonomy and group belonging. It’s a mix between what someone wants and what someone needs. It’s a chance to make, rather than simply a chance to consume.
Facebook was in the headlines last summer about their algorithm, when it came out that Twitter algorithm suggested the riots in Missouri in a very different way.
Facebook has been in the headline numerous times regarding their privacy issues
Who is holding a private company responsible about acts like this?Should it be hold responsible?
Learnist is a crowd-sourced collection of knowledge, with web, text and video content covering thousands of topics. Boards are curated by knowledge leaders, providing content from the people who know it best. Create your own expert knowledge boards on the Learnist website and browse with the iOS and Android apps. Learnist was launched in 2012.
Sulia is a subject-based social network to connect users with expert sources. Sulia seeks to help people to discover new sources and engage with their interests. If you’re an expert and would like to reach the audience Sulia has to offer, contact its staff, at email@example.com. Sulia also offers a Sulia Select program, which matches top experts with leading publishers and retailers.
Pheed is a free social multimedia platform, available on iOS, Android and via the web. Pheed users share voice-notes, music, photos, videos, text, and live broadcasts. Pheed channel holders can also monetize their content by charging a monthly subscription fee (between $1.99 and $34.99) or by charging for pay-per-view live broadcast events. Pheed launched with an iOS app in 2012 and an Android app in 2013.
Medium is a place where people share stories and ideas — a great place to generate expert content. Medium is designed to be collaborative, with tools to let readers offer feedback. Medium is also designed to help you find an audience, through a combination of algorithmic and editorial curation. Medium launched in 2012, and its iOS phone app launched in 2014.
Cyber Dust is a platform for temporary mobile messaging. Texts sent via Cyber Dust automatically disappear 24 seconds after being read. Users can blast messages and locations, and send disappearing promotional content, like stickers, animated GIFs, URLs and more. An alternative to Snapchat, Cyber Dust is the latest startup of maverick investor Mark Cuban, whose own legal woes motivated him to create the app.
ShareBloc is a Reddit-like link-sharing community for professionals to curate, distribute, and discuss business content. ShareBloc could also be a good resource for small businesses in the B2B sector. The site launched in 2013 as a peer-review platform for members to rate and review vendors. ShareBloc’s main obstacle will come from the competition it faces from heavyweight LinkedIn.
Thumb is a crowdsourcing platform to ask any question and quickly receive 50 to 100 responses. Easily filter by topic to get relevant responses and new content. Thumb is a resource for any small business looking for quick feedback on a new product or service. Originally launched in 2010 as a tool to give shopping feedback, Thumb has become a place to discover and give feedback on seemingly anything. The mobile app is available for Android and iOS.
Impossible is a network where people help each other out. People who need help post a request, which is shown to users most likely to fulfill it. Those with help to give can share time, skills and objects for free, as they build kindness profiles. While this network is geared toward altruism, it may be a good place for a business to put its product to work.
We Heart It is an image-based social network focused on inspiration, expression, and creativity. It’s a hipper version of Pinterest, aimed at “highly-engaged, tech-savvy, and consumption-focused millennials.” We Heart It has over 20 million monthly visitors to discover, collect, and share images on its mobile apps and website.
Chirp lets you send a message using sound — a chirp — to anyone running the app near you. Share photos, links, notes, and more, all from your built-in iPhone speaker. Chirp could be a powerful marketing tool for location-based businesses looking to entice passers-by. Chirp’s iOS app launched in 2012, and its Android app launched in 2013.
Mobli is a social application for sharing mobile photos and unlimited-length videos. It’s a feature-packed alternative to Instagram. Broadcast your live events, use photo and video filters update weekly, create looping videos, follow locations and hashtags, and more. In November of 2013, Mobil announced a capital raise of $60 million from billionaire Carlos Slim’s América Móvil.–
Vine is an application for creating and sharing six-second looping videos. Vine officially launched in 2013 (after Twitter purchased it in 2012) and quickly became the most-used video sharing application. Recently, Vine launched a new website with a variety of features to discover videos, such as channels, trending tags, and curated content. The change could deliver further gains for Vine, which according to GlobalWebIndex is used by a quarter of U.S. teens.