Archive of ‘information technology’ category

AI autonomous cars libraries

AI, Autonomous Cars, and Libraries

at RMG’s Annual Presidents’ Seminar:
The View from the Top on Friday February 9, 2018, 2:00 p.m. – 4:00 p.m.
ALA Midwinter Conference, Denver Colorado Convention Center Room 505

Who, When, Where?

  • How will these disruptive technologies enter the

Library Industry ?

  • Who will lead the innovation?
  • And what about Robots, Blockchain, and the loss of Net Neutrality?
  • How will Artificial Intelligence and Self-Driving Cars improve library services and performance?
  • • In the age of click and digital download, will driverless library (or Uber or Lyft) delivery services plus robots-to-the-door put printed books and other physical items into readers’ hands with comparable ease? Or transport and escort readers to Library programs and browsing opportunities?
  • • Alexa:   Please deliver to my weekend address the Hungarian cookbook I checked out from my Branch Library last year and fresh — not frozen — ingredients for goulash for six. Text me by Thursday if I can’t get all this by Friday 6pm. Also, could you recommend a suitable under $15 red wine available at my weekend Whole Foods?
  • • Siri or Alexa:   Call the Library and make reservations for my two grandchildren and me for the February program on Spring solstice, and ask them to text each of us confirmations. Also, could you ask the Library to send them links to e-books that explain the history of astronomy? And deliver to Amy a book in English or Mandarin about ancient Chinese astronomy a week before the program?

The Seminar is open to everyone for dialogue on topical issues and concerns — registration is not required.

Attendees are invited to ask questions of Library Industry executives entrusted with delivering platforms and solutions for global library systems, services, and content to thousands of libraries serving millions of library users worldwide.

Participating companies & executives include:

Axiell (Ann Maelerts), BiblioLabs (Mitchell Davis),

Demco Software (Ravi Singh), Easy Mile, Index Data (Sebastian Hammer), Innovative Interfaces (James Tallman),  Overdrive (Steve Potash), ProQuest (Rich Belanger), SirsiDynix (Bill Davison), The Library Corporation (Annette Murphy)

Rob McGee  will moderate the session with assistance from Marshall Breeding and RMG’s Geoff Payne (Melbourne Office).

++++++++++++++
more on artificial intelligence in this ims blog
https://blog.stcloudstate.edu/ims?s=artificial+intelligence

SOE workshop gamification

School of Education workshop on gaming and gamification

shortlink: http://bit.ly/soegaming

Join us for a LIVE broadcast:

Live broadcast on Adobe Connect:
https://webmeeting.minnstate.edu/scsuteched
Live broadcast on Facebook:
https://www.facebook.com/events/1803394496351600

 

Outline:
The Gamification of the educations process is not a new concept. The advent of educational technologies, however, makes the idea timely and pertinent. In short 60 min, we will introduce the concept of gamification of the educational process and discuss real-live examples.

Learning Outcomes:

  • at the end of the session, participants will have an idea about gaming and gamification in education and will be able to discriminate between those two powerful concepts in education
  • at the end of this session, participants will be able search and select VIdeo 360 movies for their class lessons
  • at the end of the session, participants will be able to understand the difference between VR, AR and MR.

if you are interested in setting up a makerspace and/or similar gaming space at your school, please contact me after this workshop for more information.

  1. Gaming in education
    Minecraft.edu
    https://blog.stcloudstate.edu/ims/2017/10/26/pedagogically-sound-minecraft-examples/
    Simcity.com

+++++++++++++++++++++++++++++++++
Here some online games suitable for educators:
http://www.onlinecolleges.net/50-great-sites-for-serious-educational-games/

https://www.learn4good.com/games/for-high-school-students.htm

+++++++++++++++++++++++++++++++++

Let’s learn more about gaming and education with Kahoot (please click on Kahoot):

https://play.kahoot.it/#/k/78e64d54-3607-48fa-a0d3-42ff557e29b1

Let’s take a quiz together:

++++++++////////////////+++++++++++/////////////////+++++++++++++///////////////++++++++

  1. Gamification in education
    1. How would you define gamification of the educational process?
    2. Gaming and Gamification in academic and library settings (paper)
      Short URL: http://scsu.mn/1F008Re
      Gamification takes game elements (such as points, badges, leaderboards, competition, achievements) and applies them to a non-game setting. It has the potential to turn routine, mundane tasks into refreshing, motivating experiences (What is GBL (Game-Based Learning)?, n.d.).
      Gamification is defined as the process of applying game mechanics and game thinking to the real world to solve problems and engage users (Phetteplace & Felker, 2014, p. 19; Becker, 2013, p. 199; Kapp, 2012). Gamification requires three sets of principles: 1. Empowered Learners, 2. Problem Solving, 3. Understanding (Gee, 2005).
    3. Apply gamification tactics to existing learning task
      split in groups and develop a plan to gamify existing learning task
    4. gamification with and without technology
      https://www.thespruce.com/board-games-for-college-kids-3570593

+++ hands-on ++++++++++++++++ hands-on ++++++++++++++++ hands-on ++++++

  1. Video 360 in the classroom (proposed book chapter)
    1. the importance of Video 360
      p. 46 Virtual Reality
      https://blog.stcloudstate.edu/ims/2017/08/30/nmc-horizon-report-2017-k12/
      p. 47 Google is bringing VR to UK kids
      http://www.wired.co.uk/article/google-digital-skills-vr-pledge
      Video 360 movies for education:
      http://virtualrealityforeducation.com/google-cardboard-vr-videos/science-vr-apps/
      Watch this movie on the big screen:

      from the web page above, choose a movie or click on this lin
      k:
      https://youtu.be/nOHM8gnin8Y (to watch a black hole in video 360)
      Open the link on your phone and insert the phone in Google Cardboard. Watch the video using Google Cardboard. 
    2. Discuss the difference between in your experience watching the movie on the big screen and using Google Cardboard. What are the advantages of using goggles, such as Google Cardboard?
      Enter your findings here:
      https://docs.google.com/document/d/1Nz42T6CaYsx8qVl9ee_IC25EyqS0A8aZcQdX2F6RMjg/edit?usp=sharing

Let’s learn more about gaming and education with Kahoot (please click on Kahoot):

https://play.kahoot.it/#/k/6c9e7368-f830-4a9c-8f5a-df1899e96665

  1. VR, AR, MR and Video 360.
    1. discuss your ideas to apply VR/AR/MR and Video 360 in real life and your profession
      https://docs.google.com/document/d/1Cq6zDXJ9xkN7h81RpiLkdflbAuX8y_my2VrbO3mZ5mM/edit?usp=sharing
  2. Creating your own games:
    https://blog.stcloudstate.edu/ims/2018/02/19/unity/

++++++ RESOURCES ++++++++++ RESOURCES ++++++++++ RESOURCES +++++++

https://blog.stcloudstate.edu/ims?s=games

https://blog.stcloudstate.edu/ims?s=gamification

https://blog.stcloudstate.edu/ims?s=virtual+reality

https://blog.stcloudstate.edu/ims?s=video+360

+++++++++++++++++++++++++++++++++++++++++++++++++++++

For further information about Information Media:

IM Facebook Group https://www.facebook.com/groups/326983293392/
IM Facebook Page http://www.facebook.com/Informationmedia
IM Blog blog.stcloudstate.edu/im
IM LinkedIn https://www.linkedin.com/in/information-media-department-31360b28/
Twitter https://twitter.com/IM_SCSU
Youtube https://www.youtube.com/channel/UCIluhVNJLJYEJ7983VmhF8w

cybersecurity threats for schools

The top 5 cybersecurity threats for schools

BY EARL D. LAING November 29th, 2017
https://www.eschoolnews.com/2017/11/29/cybersecurity-threats-schools/

1. Link Security

From ransomware to phishing and other types of security breaches, direct contact is the number one way that you can create a vulnerability in your system. Those who commit these online crimes are finding smarter and sneakier ways to infiltrate your data every day. Sometimes the attack can even come as an email from a legitimate sender, or appear to be a perfectly normal message on social media. The goal is usually to get you to click on a link.

Solution: Make sure the security preferences for your email account(s) are set up to filter spamming, phishing and executable files that aren’t recognized.

2. Unknown Devices

Solution: Your IT system should include a solution that tracks all devices, including those not owned by your school, that enter the network.

3. Out of Date Technology

Contrary to popular misconception, user interaction isn’t always required for a cyber attack to be launched. The WannaCry attack targeted hundreds of computers all with the same security vulnerability on their Windows operating systems.

Solution: Again, an IT solution that tracks all devices is important, but one that can also check on software upgrades and block access to certain apps is ideal.

4. User Error

A data breach in Florida is just one example of the chaos user error can provoke. This issue didn’t begin with hackers at all. It began with carelessness that caused sensitive information to become public.

User error occurs regularly, and a common root of this is failing to restrict access to files or certain sites that may be compromised.

Solution: Restrict user access to sensitive documents only to those who absolutely need them, and make sure that your site architecture is set up to require a secure login for access. You may also want to create a white list of safe sites and applications and block the rest.

5. No Backup

As disheartening as it sounds, even when you take all the necessary precautions to protect your vital information, data breaches can still occur. When an attack happens, it’s often a major blow to productivity to try and get all the information back into a secure place. Worse, vital work can be lost for good.

Solution: Install a backup system on each school device that sends data to a remote server throughout the day (not just at night) to help make sure nothing is lost.

+++++++++++++++
more on cybersecurrity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

Analytics Data Integration and Governance

Supporting Analytics through Data Integration and Governance

https://www.educause.edu/focus-areas-and-initiatives/enterprise-and-infrastructure/enterprise-it-program/supporting-analytics-through-data-integration-and-governance

Support analytics initiatives with data integration and governance. The changing landscape of enterprise IT is characterized by an expanding set of services, systems, and sourcing strategies. Data governance, cross-enterprise partnerships, and data integration are key ingredients in supporting higher education’s growing need for reliable information.

Enterprise IT Case Studies

In this set of EDUCAUSE Review case studies, see how Drake University, the University of Tennessee, and the University of Montana improved their analytics initiatives through data integrations and governance.

 

 

+++++++++
more on analytics in this IMS blog
https://blog.stcloudstate.edu/ims?s=analytics

https://blog.stcloudstate.edu/ims?s=data+governance

WhatsApp privacy France

French privacy watchdog raps WhatsApp over Facebook data sharing

 France’s data privacy watchdog may fine messaging app WhatsApp if it does not comply with an order to bring its sharing of user data with parent company Facebook into line with French privacy law.
Separately, Germany’s cartel office said on Tuesday it had found Facebook had abused its dominant market position, in a ruling that questioned the company’s model of monetizing the personal data of its users through targeted advertising.
My note: it seems the EU is gearing toward in increase scrutiny of social media giants regarding users’ privacy:
https://blog.stcloudstate.edu/ims/2018/01/05/tinder-dating-privacy/ 

++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

 

snapchat leading social media app

Snapchat is still the network of choice for U.S. teens — and Instagram is Facebook’s best shot at catching up

Good news, Snap investors. By

https://www.recode.net/2017/12/16/16783570/snapchat-instagram-teenagers-rbc-survey-favorite-app

  • Some 79 percent of U.S. 13- to 18-year-olds surveyed said they have a Snapchat account, more than any other type of social media. Of that age group, 73 percent have an Instagram account and just 57 percent say they are on Facebook.
  • Respondents had to choose only one social network they could keep if they were “trapped on a deserted island.” This time, 44 percent of teens picked Snapchat, ahead of Instagram (24 percent) and Facebook (14 percent). One year ago, for RBC’s same survey question, the percentage of teens who insisted on keeping Snapchat on a desert island led with 28 percent — suggesting the app is still growing in necessity/popularity among young people.

Snapchat features
+++++++++++
more on Snapchat for education in this IMS blog
https://blog.stcloudstate.edu/ims?s=snapchat

ECAR Study of Undergraduate Students and Information Technology, 2017

ECAR Study of Undergraduate Students and Information Technology, 2017

  • Students would like their instructors to use more technology in their classes.Technologies that provide students with something (e.g., lecture capture, early-alert systems, LMS, search tools) are more desired than those that require students to give something (e.g., social media, use of their own devices, in-class polling tools). We speculate that sound pedagogy and technology use tied to specific learning outcomes and goals may improve the desirability of the latter.
  • Students reported that faculty are banning or discouraging the use of laptops, tablets, and (especially) smartphones more often than in previous years. Some students reported using their devices (especially their smartphones) for nonclass activities, which might explain the instructor policies they are experiencing. However, they also reported using their devices for productive classroom activities (e.g., taking notes, researching additional sources of information, and instructor-directed activities).

++++++++++++++
more on ECAR studies in this IMS blog
https://blog.stcloudstate.edu/ims?s=ecar

eagles combat drones

Avi Selk The Washington, P. (2017, February 26). Terrorists are building drones and France is destroying them with eagles. Toronto Star (Canada).

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3drps%26AN%3d6FPTS2017022641609776%26site%3dehost-live%26scope%3dsite

in France, four eggs “were placed before birth on top of drones while still inside the eggshell and, after hatching, (were kept) there during their early feeding period,” Reuters reported in November.

The eagles were named after characters in The Three Musketeers, and by February proved capable of intercepting drones in lightning-fast horizontal chases.

“Soon they will be casting off from peaks in the nearby Pyrenees Mountains,” AFP reported.

The military has already ordered a second brood of eagles, according to AFP.

++++++++++++++++
more on drones in this IMS blog
https://blog.stcloudstate.edu/ims?s=drones

Tinder dating privacy

I asked Tinder for my data. It sent me 800 pages of my deepest, darkest secrets

The dating app knows me better than I do, but these reams of intimate information are just the tip of the iceberg. What if my data is hacked – or sold?

Every European citizen is allowed to do so under EU data protection law, yet very few actually do, according to Tinder.

With the help of privacy activist Paul-Olivier Dehaye from personaldata.io and human rights lawyer Ravi Naik, I emailed Tinder requesting my personal data and got back way more than I bargained for.

Some 800 pages came back containing information such as my Facebook “likes”, links to where my Instagram photos would have been had I not previously deleted the associated account, my education, the age-rank of men I was interested in, how many Facebook friends I had, when and where every online conversation with every single one of my matches happened … the list goes on.

Reading through the 1,700 Tinder messages I’ve sent since 2013, I took a trip into my hopes, fears, sexual preferences and deepest secrets. Tinder knows me so well. It knows the real, inglorious version of me who copy-pasted the same joke to match 567, 568, and 569; who exchanged compulsively with 16 different people simultaneously one New Year’s Day, and then ghosted 16 of them.

“What you are describing is called secondary implicit disclosed information,” explains Alessandro Acquisti, professor of information technology at Carnegie Mellon University. “Tinder knows much more about you when studying your behaviour on the app. It knows how often you connect and at which times; the percentage of white men, black men, Asian men you have matched; which kinds of people are interested in you; which words you use the most; how much time people spend on your picture before swiping you, and so on. Personal data is the fuel of the economy. Consumers’ data is being traded and transacted for the purpose of advertising.”.

In May, an algorithm was used to scrape 40,000 profile images from the platform in order to build an AI to “genderise” faces. A few months earlier, 70,000 profiles from OkCupid (owned by Tinder’s parent company Match Group) were made public by a Danish researcher some commentators have labelled a “white supremacist”, who used the data to try to establish a link between intelligence and religious beliefs. The data is still out there.

 

+++++++++++
more on social media dating in this IMS blog
https://blog.stcloudstate.edu/ims?s=tinder

1 65 66 67 68 69 114