Searching for "data security"

code4lib 2018

Code2LIB February 2018

http://2018.code4lib.org/

2018 Preconference Voting

10. The Virtualized Library: A Librarian’s Introduction to Docker and Virtual Machines
This session will introduce two major types of virtualization, virtual machines using tools like VirtualBox and Vagrant, and containers using Docker. The relative strengths and drawbacks of the two approaches will be discussed along with plenty of hands-on time. Though geared towards integrating these tools into a development workflow, the workshop should be useful for anyone interested in creating stable and reproducible computing environments, and examples will focus on library-specific tools like Archivematica and EZPaarse. With virtualization taking a lot of the pain out of installing and distributing software, alleviating many cross-platform issues, and becoming increasingly common in library and industry practices, now is a great time to get your feet wet.

(One three-hour session)

11. Digital Empathy: Creating Safe Spaces Online
User research is often focused on measures of the usability of online spaces. We look at search traffic, run card sorting and usability testing activities, and track how users navigate our spaces. Those results inform design decisions through the lens of information architecture. This is important, but doesn’t encompass everything a user needs in a space.

This workshop will focus on the other component of user experience design and user research: how to create spaces where users feel safe. Users bring their anxieties and stressors with them to our online spaces, but informed design choices can help to ameliorate that stress. This will ultimately lead to a more positive interaction between your institution and your users.

The presenters will discuss the theory behind empathetic design, delve deeply into using ethnographic research methods – including an opportunity for attendees to practice those ethnographic skills with student participants – and finish with the practical application of these results to ongoing and future projects.

(One three-hour session)

14. ARIA Basics: Making Your Web Content Sing Accessibility

https://dequeuniversity.com/assets/html/jquery-summit/html5/slides/landmarks.html
Are you a web developer or create web content? Do you add dynamic elements to your pages? If so, you should be concerned with making those dynamic elements accessible and usable to as many as possible. One of the most powerful tools currently available for making web pages accessible is ARIA, the Accessible Rich Internet Applications specification. This workshop will teach you the basics for leveraging the full power of ARIA to make great accessible web pages. Through several hands-on exercises, participants will come to understand the purpose and power of ARIA and how to apply it for a variety of different dynamic web elements. Topics will include semantic HTML, ARIA landmarks and roles, expanding/collapsing content, and modal dialog. Participants will also be taught some basic use of the screen reader NVDA for use in accessibility testing. Finally, the lessons will also emphasize learning how to keep on learning as HTML, JavaScript, and ARIA continue to evolve and expand.

Participants will need a basic background in HTML, CSS, and some JavaScript.

(One three-hour session)

18. Learning and Teaching Tech
Tech workshops pose two unique problems: finding skilled instructors for that content, and instructing that content well. Library hosted workshops are often a primary educational resource for solo learners, and many librarians utilize these workshops as a primary outreach platform. Tackling these two issues together often makes the most sense for our limited resources. Whether a programming language or software tool, learning tech to teach tech can be one of the best motivations for learning that tech skill or tool, but equally important is to learn how to teach and present tech well.

This hands-on workshop will guide participants through developing their own learning plan, reviewing essential pedagogy for teaching tech, and crafting a workshop of their choice. Each participant will leave with an actionable learning schedule, a prioritized list of resources to investigate, and an outline of a workshop they would like to teach.

(Two three-hour sessions)

23. Introduction to Omeka S
Omeka S represents a complete rewrite of Omeka Classic (aka the Omeka 2.x series), adhering to our fundamental principles of encouraging use of metadata standards, easy web publishing, and sharing cultural history. New objectives in Omeka S include multisite functionality and increased interaction with other systems. This workshop will compare and contrast Omeka S with Omeka Classic to highlight our emphasis on 1) modern metadata standards, 2) interoperability with other systems including Linked Open Data, 3) use of modern web standards, and 4) web publishing to meet the goals medium- to large-sized institutions.

In this workshop we will walk through Omeka S Item creation, with emphasis on LoD principles. We will also look at the features of Omeka S that ease metadata input and facilitate project-defined usage and workflows. In accordance with our commitment to interoperability, we will describe how the API for Omeka S can be deployed for data exchange and sharing between many systems. We will also describe how Omeka S promotes multiple site creation from one installation, in the interest of easy publishing with many objects in many contexts, and simplifying the work of IT departments.

(One three-hour session)

24. Getting started with static website generators
Have you been curious about static website generators? Have you been wondering who Jekyll and Hugo are? Then this workshop is for you

My notehttps://opensource.com/article/17/5/hugo-vs-jekyll

But this article isn’t about setting up a domain name and hosting for your website. It’s for the step after that, the actual making of that site. The typical choice for a lot of people would be to use something like WordPress. It’s a one-click install on most hosting providers, and there’s a gigantic market of plugins and themes available to choose from, depending on the type of site you’re trying to build. But not only is WordPress a bit overkill for most websites, it also gives you a dynamically generated site with a lot of moving parts. If you don’t keep all of those pieces up to date, they can pose a significant security risk and your site could get hijacked.

The alternative would be to have a static website, with nothing dynamically generated on the server side. Just good old HTML and CSS (and perhaps a bit of Javascript for flair). The downside to that option has been that you’ve been relegated to coding the whole thing by hand yourself. It’s doable, but you just want a place to share your work. You shouldn’t have to know all the idiosyncrasies of low-level web design (and the monumental headache of cross-browser compatibility) to do that.

Static website generators are tools used to build a website made up only of HTML, CSS, and JavaScript. Static websites, unlike dynamic sites built with tools like Drupal or WordPress, do not use databases or server-side scripting languages. Static websites have a number of benefits over dynamic sites, including reduced security vulnerabilities, simpler long-term maintenance, and easier preservation.

In this hands-on workshop, we’ll start by exploring static website generators, their components, some of the different options available, and their benefits and disadvantages. Then, we’ll work on making our own sites, and for those that would like to, get them online with GitHub pages. Familiarity with HTML, git, and command line basics will be helpful but are not required.

(One three-hour session)

26. Using Digital Media for Research and Instruction
To use digital media effectively in both research and instruction, you need to go beyond just the playback of media files. You need to be able to stream the media, divide that stream into different segments, provide descriptive analysis of each segment, order, re-order and compare different segments from the same or different streams and create web sites that can show the result of your analysis. In this workshop, we will use Omeka and several plugins for working with digital media, to show the potential of video streaming, segmentation and descriptive analysis for research and instruction.

(One three-hour session)

28. Spark in the Dark 101 https://zeppelin.apache.org/
This is an introductory session on Apache Spark, a framework for large-scale data processing (https://spark.apache.org/). We will introduce high level concepts around Spark, including how Spark execution works and it’s relationship to the other technologies for working with Big Data. Following this introduction to the theory and background, we will walk workshop participants through hands-on usage of spark-shell, Zeppelin notebooks, and Spark SQL for processing library data. The workshop will wrap up with use cases and demos for leveraging Spark within cultural heritage institutions and information organizations, connecting the building blocks learned to current projects in the real world.

(One three-hour session)

29. Introduction to Spotlight https://github.com/projectblacklight/spotlight
http://www.spotlighttechnology.com/4-OpenSource.htm
Spotlight is an open source application that extends the digital library ecosystem by providing a means for institutions to reuse digital content in easy-to-produce, attractive, and scholarly-oriented websites. Librarians, curators, and other content experts can build Spotlight exhibits to showcase digital collections using a self-service workflow for selection, arrangement, curation, and presentation.

This workshop will introduce the main features of Spotlight and present examples of Spotlight-built exhibits from the community of adopters. We’ll also describe the technical requirements for adopting Spotlight and highlight the potential to customize and extend Spotlight’s capabilities for their own needs while contributing to its growth as an open source project.

(One three-hour session)

31. Getting Started Visualizing your IoT Data in Tableau https://www.tableau.com/
The Internet of Things is a rising trend in library research. IoT sensors can be used for space assessment, service design, and environmental monitoring. IoT tools create lots of data that can be overwhelming and hard to interpret. Tableau Public (https://public.tableau.com/en-us/s/) is a data visualization tool that allows you to explore this information quickly and intuitively to find new insights.

This full-day workshop will teach you the basics of building your own own IoT sensor using a Raspberry Pi (https://www.raspberrypi.org/) in order to gather, manipulate, and visualize your data.

All are welcome, but some familiarity with Python is recommended.

(Two three-hour sessions)

32. Enabling Social Media Research and Archiving
Social media data represents a tremendous opportunity for memory institutions of all kinds, be they large academic research libraries, or small community archives. Researchers from a broad swath of disciplines have a great deal of interest in working with social media content, but they often lack access to datasets or the technical skills needed to create them. Further, it is clear that social media is already a crucial part of the historical record in areas ranging from events your local community to national elections. But attempts to build archives of social media data are largely nascent. This workshop will be both an introduction to collecting data from the APIs of social media platforms, as well as a discussion of the roles of libraries and archives in that collecting.

Assuming no prior experience, the workshop will begin with an explanation of how APIs operate. We will then focus specifically on the Twitter API, as Twitter is of significant interest to researchers and hosts an important segment of discourse. Through a combination of hands-on and demos, we will gain experience with a number of tools that support collecting social media data (e.g., Twarc, Social Feed Manager, DocNow, Twurl, and TAGS), as well as tools that enable sharing social media datasets (e.g., Hydrator, TweetSets, and the Tweet ID Catalog).

The workshop will then turn to a discussion of how to build a successful program enabling social media collecting at your institution. This might cover a variety of topics including outreach to campus researchers, collection development strategies, the relationship between social media archiving and web archiving, and how to get involved with the social media archiving community. This discussion will be framed by a focus on ethical considerations of social media data, including privacy and responsible data sharing.

Time permitting, we will provide a sampling of some approaches to social media data analysis, including Twarc Utils and Jupyter Notebooks.

(One three-hour session)

blockchain credentialing in higher ed

2 reasons why blockchain tech has big, tangible implications for higher ed

By Jami Morshed September 27th, 2017

What Is Blockchain?

blockchain is a database or digital ledger. The data in the ledger is arranged in batches known as blocks, with each block storing data about a specific transaction. The blocks are linked together using cryptographic validation to form an unbroken and unbreakable chain–hence the name blockchain. As it relates to bitcoin, the blocks are monetary units, and the chain includes information about all past transactions of that monetary unit.

Importantly, the database (i.e., the series of blocks) is duplicated thousands of times across a network of computers, meaning that it has no one central repository. This not only means that the records are truly public, but also that there is no centralized version of the data for a hacker to corrupt. In order to make changes to the ledger, consensus between all members of the group must be obtained, further adding to the system’s security.

1. Blockchain for the Future of Credentialing

With today’s technologies, graduates and prospective employers must go through a tedious process to obtain student transcripts or diplomas, and this complexity is compounded when these credentials are spread across multiple institutions. Not only that, but these transcripts can take days or weeks to produce and send, and usually require a small fee be paid to the institution.LinkedLinek

This could be a key enabler to facilitate student ownership of this data and would allow them to instantly produce secure and comprehensive credentials to any institute or employer requesting them, including information about a student’s performance on standardized tests, degree requirements, extracurricular activities, and other learning activities.

Blockchain could play a major role in Competency-Based Education (CBE) programs and micro-credentialing, which are becoming ever more popular across universities and internal business training programs.

various companies are currently working on such a system of record. One of the most well-known is called “BlockCert,” which is an open standard created by MIT Media Lab and which the institute hopes will help drive the adoption of blockchain credentialing.

imagine the role that LinkedIn or a similar platform could play in the distribution of such content. Beyond verification of university records, LinkedIn could become a platform for sharing verified work history and resumes as well, making the job application process far simpler

2. Blockchain’s Financial Implications and Student debt

how could blockchain influence student finances? For starters, financial aid and grants could be tied to student success. Instead of students and universities having to send over regular progress reports on a recipient’s performance, automatic updates to a student’s digital record would ensure that benchmarks were being met–and open up new opportunities for institutions looking to offer merit-based grants.

Electronic tuition payments and money transfers could also simplify the tuition process. This is an especially appealing option for international students, as bitcoin’s interchangeable nature and lack of special fees for international transfers makes it a simpler and more cost-effective payment method.

++++++++++++++++++++++++++++
more on credentialing in this IMS blog
https://blog.stcloudstate.edu/ims?s=credentialing

more on blockchain credentialing in this IMS blog
https://blog.stcloudstate.edu/ims/2016/10/03/blockchain-credentialing/

Maslow hierarchy for edtech

5 ways to apply Maslow’s Hierarchy of Needs to edtech for better outcomes

By Dave Saltmarsh September 26th, 2017
My Note: when stripped from the commercialized plug in for Apple, this article makes a good memorization exercise for pedagogues.

According to American psychologist Abraham Maslow, all humans have the same fundamental needs (food, clothing and shelter), and these needs must be met before an individual is motivated to look beyond these basic needs. This motivational theory is commonly referred to as Maslow’s hierarchy of needs.

  • Physiological (basic) needs: food, water, warmth, rest
  • Safety needs: security, safety
  • Love needs: intimate relationships, friends
  • Esteem needs: feeling of accomplishment
  • Self-actualization: achieving one’s full potential

Maslow’s hierarchy of needs can serve as an analogy for what is possible with instructionally-designed technology

1. Device Deployment = Basic Needs

Device deployment is the first basic need of any school looking to leverage education technology. If schools are unable to procure devices and if IT is unable to get these devices into the hands of students and educators, there is no moving forward.

2. Communication = Safety Needs

Beyond basic communications functions, apps must be made available and installed for an additional layer of connectivity. For example, learning management systems (LMS) enable communication beyond classroom walls and empower students with the learning resources they need while at home or in the community. However, how do we ensure access off-campus for those without ubiquitous internet connections

3. Productivity = Love Needs

Communication that encourages higher-level thinking and problem solving is where dramatic learning happens.

4. Transformation = Esteem and Self-Actualization Needs

IT and educators are pairing innovative teaching methods such as blended learning (a mix of technology and traditional learning) or flipped classrooms (teaching is done at home and exercises during class time) with education apps (productivity layer).

5. Let Mobile Device Management (MDM) Be Your Stepladder

+++++++++++++++++++++
more on digital literacy for EDAD in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+literacy+EDAD

RFID blocking

There Are Plenty Of RFID-Blocking Products, But Do You Need Them?

hackers can access your credit card data wirelessly, through something called radio frequency identification, or RFID

card has a tiny RFID sensor chip. These chips are supposed to make life easier by emitting radio signals for fast identification. The technology helps keep track of livestock and inventory. It makes automatic payment on toll roads and faster scanning of passports possible, and, starting around 2004, brought us contactless payment with certain credit cards.

REI and other companies sell a range of RFID-blocking products and say the number of customers looking for travel bags and credit card sleeves has been growing. That’s despite the fact that the percentage of credit cards with RFID chips in the U.S. is extremely small.

Still, people are worried about electronic pickpocketing — worried enough to strap on RFID-blocking fanny packs, even skinny jeans. In 2014, the San Francisco-based clothing company Betabrand partnered with Norton Security to create the first pair of denim with RFID protected pockets.

Eva Velasquez, president of the Identity Theft Resource Center, says from a consumer perspective, deciding whether to invest in RFID-blocking technology is all about evaluating risk. In the next few years, there will undoubtedly be millions more of these cards on the market.

if you’re worried about e-pickpocketing but don’t want to spend much money, you can make your own blocking wallet or wrap your cards or passport in a thick piece of aluminum foil. According to Consumer Reports, that works as well as most RFID protectors on the market.
+++++++++++++++
more on cybersecurity in this IMS blog

industry 4.0 and IOT

The Internet of Things will power the Fourth Industrial Revolution. Here’s how

https://medium.com/world-economic-forum/the-internet-of-things-will-power-the-fourth-industrial-revolution-heres-how-39932f03df1

By 2020 more than 50 billion things, ranging from cranes to coffee machines, will be connected to the internet. That means a lot of data will be created — too much data, in fact, to be manageable or to be kept forever affordably.

One by-product of more devices creating more data is that they are speaking lots of different programming languages. Machines are still using languages from the 1970s and 80s as well as the new languages of today. In short, applications need to have data translated for them — by an IoT babelfish, if you will — before they can make sense of the information.

Then there are analytics and data storage.

security becomes even more important as there is little human interaction in the flow of data from device to datacentre — so called machine-to-machine communication.

 

+++++++++++++++++++
more on IOT in this IMS blog
https://blog.stcloudstate.edu/ims?s=iot

more on industry 4.0 in this IMS blog
https://blog.stcloudstate.edu/ims?s=industrial+revolution

not on your work computer

6 things you should never do on your work computer

Amy Elisa Jackson, Glassdoor Mar. 15, 2017, 10:45 AM

http://www.businessinsider.com/things-you-should-never-do-on-your-work-computer-2017-3

cyber security experts say that weaving your personal and professional lives together via a work laptop is risky business — for you and the company. Software technology company Check Point conducted a survey of over 700 IT professionals which revealed that nearly two-thirds of IT pros believed that recent high-profile breaches were caused by employee carelessness.

  1. DON’T: Save personal passwords in your work device keychain.
  2. DON’T: Make off-color jokes on messaging software.
  3. DON’T: Access free public wi-fi while working on sensitive material.
  4. DON’T: Allow friends or non-IT department colleagues to remotely access your work computer.
  5. DON’T: Store personal data.
  6. DON’T: Work on your side hustle while at the office.

++++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

more on surveillance in this IMS blog:
https://blog.stcloudstate.edu/ims?s=surveillance

K12 cyber incidents

K–12 Cyber Incidents Have Been Increasing in 2017

The creator of a national K–12 Cyber Incident Map warns that schools should act now, not later, to bolster their security.

By Richard Chang 06/08/17

https://thejournal.com/articles/2017/06/08/k12-cyber-incidents-have-been-increasing-in-2017.aspx

Ed Tech Strategies' K–12 Cyber Incident Map. Courtesy of Doug Levin.

K–12 Cyber Incident Map , Doug Levin, president of Ed Tech Strategies

Levin has been tracking the publicly disclosed K–12 incidents on a color-coded map on his website, edtechstrategies.com. His sources include media reports, DataBreaches.net and the Privacy Rights Clearinghouse.

In a post published this week on the newly revamped Ferpa Sherpa education privacy site, Levin argues that not only have schools been “experiencing an increasing number of cyber incidents,” but “the range of cyber threats affecting schools appears to be diverse and shifting over time.”

K12 cyber incidents 2016 to present

concrete steps schools can take to improve their security, such as:

  • Use special software or hardware to protect data;
  • Create better password and authorization policies;
  • Use secondary authentication methods;
  • Train school staff, particularly about phishing and downloading of unfamiliar files; and
  • Hire more staff with IT security expertise.

++++++++++++++++++++
more on cyber security in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

IoT

Survey: IoT Overtakes Mobile as Security Threat

By Rhea Kelly 06/05/17

https://campustechnology.com/articles/2017/06/05/survey-iot-overtakes-mobile-as-security-threat.aspx

a report from ISACA, a nonprofit association focused on knowledge and practices for information systems. The 2017 State of Cyber Security Study surveyed IT security leaders around the globe on security issues, the emerging threat landscape, workforce challenges and more.

  • 53 percent of survey respondents reported a year-over-year increase in cyber attacks;
  • 62 percent experienced ransomware in 2016, but only 53 percent have a formal process in place to address a ransomware attack;
  • 78 percent reported malicious attacks aimed at impairing an organization’s operations or user data;
  • Only 31 percent said they routinely test their security controls, while 13 percent never test them; and
  • 16 percent do not have an incident response plan.
  • 65 percent of organizations now employ a chief information security officers, up from 50 percent in 2016, yet still struggle to fill open cyber security positions;
  • 48 percent of respondents don’t feel comfortable with their staff’s ability to address complex cyber security issues;
  • More than half say cyber security professionals “lack an ability to understand the business”;
  • One in four organizations allot less than $1,000 per cyber security team member for training; and
  • About half of the organizations surveyed will see an increase in their cyber security budget, down from 61 percent in 2016.

++++++++++++++++++++++++++

IoT to Represent More Than Half of Connected Device Landscape by 2021

By Sri Ravipati 06/09/17

https://campustechnology.com/articles/2017/06/09/iot-to-represent-more-than-half-of-connected-device-landscape-by-2021.aspx

20121 prediction for data in North America

analysis comes from Cisco’s recent Visual Networking Index for the 2016-2021 forecast period.

  • IP video traffic will increase from 73 percent of all internet consumer traffic in 2016 to 82 percent in 2021 (with live streaming accounting for 13 percent);
  • Virtual and augmented reality traffic is expected to increase 20-fold during the forecast period at a compound annual growth rate of 82 percent; and
  • Internet video surveillance traffic is anticipated to grow during the forecast period, comprising 3.4 percent of all internet traffic.

To learn more, view the full report.

+++++++++++++++++++++++++++

5 ways to use the Internet of Things in higher ed

By Danielle R. June 14th, 2017
 1. Labeling and Finding
 campus’ buildings were able to transmit interactive map data to a student finding their way around for the first time
2. Booking and Availability
3. Preparation
4. Intervention
As FitBit and other personal wearables become better at tracking various health markers, these markers can be put to use tracking individual patterns in the student body.
 The University of Southern California is currently researching the impact that analyzing IoT-gathered data can have on student performance, but the IoT can be used to prevent more than just academic difficulties.
the privacy concerns such use might raise; as universities implement systems that integrate wearables, they will encounter this hurdle and have to implement policies to address it.
5. Research
Laboratories are often required to be completely controlled spaces with considerations made for climate, light, and sometimes even biometric data inside the lab.

+++++++++++++++++++++
https://blog.stcloudstate.edu/ims?s=internet+of+things
https://blog.stcloudstate.edu/ims?s=iot 

mobile apps for libraries

Apps for Librarians: Empower Your Users with Mobile App Literacy eCourse
Nicole Hennig
Item Number: 1541-9076  Publisher: ALA Editions Price: $250.00

http://www.alastore.ala.org/detail.aspx?ID=11270&zbrandid=4634&zidType=CH&zid=42706629&zsubscriberId=1026665847&zbdom=http://ala-publishing.informz.net

Estimated Hours of Learning: 28
Certificate of Completion available upon request

Learning outcomes

After participating in this eCourse, you will:

  • Gain experience using some of the best apps available and understand how they enable learning
  • Learn how to evaluate and review mobile apps
  • Learn how tablets complement laptops, and how their capabilities are creating new learning opportunities
  • Learn how apps are being used by people with special needs, and where to find additional resources for learning more
  • Receive guidance for creating your own app guides, offering workshops, and advising colleagues

In this 5-week eCourse, you’ll learn about the most useful apps available on tablet and mobile devices and how they can be applied in your library to create the best learning experiences for your patrons and students.

Mobile apps are empowering for people of all ages and abilities. Contrary to the popular idea that apps are only useful for “consumption,” the best apps are being used effectively as tools to enable learning and knowledge creation. In this eCourse, Nicole Hennig will show you how to incorporate apps as learning tools at your library.

eCourse Outline

Week 1 – E-Reading

The Apps

  • Book reading
  • Magazine reading
  • Apps for Reading PDFs, web pages, and news feeds
  • Individual book apps

Readings & Discussion

  • Readings about e-reading & future of the book
  • Your thoughts on the readings (discussion forum)
  • Optional app review assignment

Week 2 – Productivity & Writing

The Apps

  • Productivity
    • Cloud storage, passwords, to do lists, notes
    • Handwriting, speech recognition, scanning, barcodes
  • Writing & Presenting
    • Word processing, spreadsheets, slides
    • More presentation apps

Readings & Discussion

  • Readings about security, writing, mobile apps in academia
  • Your thoughts on the readings (discussion forum)
  • Optional app review assignment

Week 3 – Reference

The Apps

  • Dictionaries, encyclopedias
  • Unit converters, maps, languages
  • Specialized reference apps
  • Subscription databases & citations

Readings & Discussion

  • Readings about jailbreaking, platforms, & mobile web
  • Apple’s iOS Human Interface Guidelines
  • Your thoughts on the readings (discussion forum)
  • Optional app review assignment

Week 4 – Multimedia

The Apps

  • Art viewing
  • Art creation
  • Photography and photo editing
  • Music listening
  • Music creation
  • Video viewing and editing

Readings & Discussion

  • Readings about technology & children
  • Your thoughts on the readings (discussion forum)
  • Optional app review assignment

Week 5 – Accessibility & More

Accessibility features of mobile devices

Readings & Discussion

  • Readings about assistive technology
  • Your thoughts on the readings (discussion forum)

Idea generation assignment

  • Ideas for using apps in library programs & services
  • Apps that wow

How this eCourse Works

The eCourse begins on June 5, 2017. Your participation will require approximately five to six hours a week, at times that fit your schedule. All activities take place on the website, and you will be expected to:

  • Read, listen to or view online content
  • Post to online discussion boards
  • Complete weekly assignments or activities

Instructor Nicole Hennig will monitor discussion boards regularly during the five-week period, lead group discussions, and will also answer individual questions. All interaction will take place on the eCourse site, which will be available 24 hours a day, 7 days a week. It’s recommended that students log into the site on the first day of class or within a few days for an overview of the content and to begin the first lesson.

+++++++++++++
more on mobile apps in this IMS blog
https://blog.stcloudstate.edu/ims?s=mobile+apps

Susan Grajek at Bryan Alexander on IT and education

Susan Grajek at Bryan Alexander on IT and education

Forum takes a deep dive into higher education and technology. On Thursday, March 23rd, from 2-3 pm EST we will be joined by Susan Grajek, the vice president for communities and research at EDUCAUSE

+++++++++++++++++++

Top 10 IT Issues, 2017: Foundations for Student Success

1 9 10 11 12 13 14

Skip to toolbar