Archive of ‘information technology’ category

virtual tours museums

Palace of Versailles

https://www.google.com/culturalinstitute/collection/palace-of-versailles?projectId=art-project

The National Gallery, London

https://www.google.com/culturalinstitute/collection/the-national-gallery-london?projectId=art-project

Smithsonian American Art Museum – Washington – Freer and Sackler Galleries

http://www.ba-bamail.com/content.aspx?emailid=19785

Van Gogh Museum – Amsterdam

https://www.google.com/culturalinstitute/collection/van-gogh-museum?projectId=art-project

Hermitage Museum – St. Petersburg

https://www.google.com/culturalinstitute/collection/the-state-hermitage-museum?projectId=art-project

Museum Kampa – Prague

https://www.google.com/culturalinstitute/collection/museum-kampa?projectId=art-project

National Gallery of Modern Art – New Delhi

https://www.google.com/culturalinstitute/collection/national-gallery-of-modern-art-ngma-new-delhi?hl=uk&projectId=art-project

Alte Nationalgalerie – Berlin

https://www.google.com/culturalinstitute/collection/alte-nationalgalerie-staatliche-museen-zu-berlin?projectId=art-project

The Israel Museum – Jerusalem

https://www.google.com/culturalinstitute/collection/the-israel-museum-jerusalem

Uffizi – Florence

https://www.google.com/culturalinstitute/collection/uffizi-gallery?projectId=art-project&hl=it

Please have also a similar virtual tour for Alhamra in Granada, Spain and The Hofburg and Belvedere Palace created by Plamen Miltenoff in 2002:

 

 

surveillance and privacy

FBI quietly changes its privacy rules for accessing NSA data on Americans

Classified revisions accepted by secret Fisa court affect NSA data involving Americans’ international emails, texts and phone calls

The FBI has quietly revised its privacy rules for searching data involving Americans’ international communications that was collected by the National Security Agency, US officials have confirmed to the Guardian.

Pro Domo Sua: Are We Puppets in a Wired World? Surveillance and privacy revisited…

More on privacy in this IMS blog:
https://blog.stcloudstate.edu/ims/page/2/?s=privacy&submit=Search

more on surveillance in this IMS blog:
https://blog.stcloudstate.edu/ims/?s=surveillance&submit=Search

Code for Humanity

Santa Clara U Students Code for Humanity

come up with apps to help two organizations serving the poorest people. Santa Clara University’s Association for Computing Machinery chapter held its third annual hackathon, “Hack for Humanity.”

The 24-hour event brought together participants from area colleges studying not just computer science or engineering but also business, biotech, communications and graphic design. Students worked individually or in teams of four to develop applications for either of two recipients.

One is Catholic Charities, where coders were encouraged to improve one of its many services and programs for “very low income people.” For example, the students could come up with apps for improving the organization’s existing job skills training, immigration test training or nutrition information programs.

The other is VillageTech, a company that has created Looma, a low-power, affordable portable computer and projector box for classroom use in schools in developing countries. There, the hackers are supposed to come up with apps for use by students in Nepal, such as creating a content management and navigation system, to build an on-screen keyboard, to add to the maps available for Looma, to improve the speech capability, to create a tool for managing the webcam and related functions.

denial of sleep attacks

Security Tops List of Trends That Will Impact the Internet of Things

By David Nage 02/25/16

https://campustechnology.com/articles/2016/02/25/security-tops-list-of-trends-that-will-impact-the-internet-of-things.aspx

Are you ready to deal with “denial of sleep” attacks? Those are attacks using malicious code, propagated through the Internet of Things, aimed at draining the batteries of your devices by keeping them awake.

  1. Security. threats extend well beyond denial of sleep: “The IoT introduces a wide range of new security risks and challenges to the IoT devices themselves, their platforms and operating systems, their communications, and even the systems to which they’re connected.
  2. Analytics. IoT will require a new approach to analytics. “New analytic tools and algorithms are needed now, but as data volumes increase through 2021, the needs of the IoT may diverge further from traditional analytics,” according to Gartner.
  3. Device (Thing) Management. IoT things that are not ephemeral — that will be around for a while — will require management like every other device (firmware updates, software updates, etc.), and that introduces problems of scale.
  4. Low-Power, Short-Range IoT Networks. Short-range networks connecting IT devices will be convoluted. There will not be a single common infrastructure connecting devices.
  5. Low-Power, Wide-Area Networks. Current solutions are proprietary, but standards will come to dominate.
  6. Processors and Architecture. Designing devices with an understanding of those devices’ needs will require “deep technical skills.”
  7. Operating Systems. There’s a wide range of systems out there that have been designed for specific purposes.
  8. Event Stream Processing.  “Some IoT applications will generate extremely high data rates that must be analyzed in real time.
  9. Platforms. “IoT platforms bundle many of the infrastructure components of an IoT system into a single product.
  10. Standards and Ecosystems. as IoT devices proliferate, new ecosystems will emerge, and there will be “commercial and technical battles between these ecosystems” that “will dominate areas such as the smart home, the smart city and healthcare.

best podcasts

how to subscribe to a podcast:

These are the best podcasts you should be listening to right now

badges for teachers

start with the teachers, not with the students

OPINION So You Want to Drive Instruction With Digital Badges? Start With the Teachers

https://www.edsurge.com/news/2015-10-31-so-you-want-to-drive-instruction-with-digital-badges-start-with-the-teachers

Participating teachers advance through a series of inquiry-based professional development modules. Teachers are awarded a digital badge for the successful completion of each 10-hour module. To accomplish this, they must complete the following steps: 1) study module content, 2) participate in a focused discussion with peers working on the same module, 3) create an original inquiry-based global lesson plan that incorporates new learning, 4) implement the original lesson plan in the classroom, 5) provide evidence of classroom implementation and 6) reflect on and revise the lesson created.

The final product of every module is a tested, global lesson plan that articulates learning objectives, activities, assessments, and resources for each stage of inquiry. Upon completion, teachers may publish finalized lessons in a resource library where they can be accessed by other educators. As designed, the HISD badging system will be a four-year, 16-badge approach that equates to 160 hours of professional learning for teachers.

five key features that taken together increase significantly the likelihood that the learning experience for a teacher will lead to results in the classroom for students — which, after all, is the point of professional development:

 

  • Badging requires demonstrating understanding and implementation of a target content or skill. 
  • Badging provides recognition and motivation. 
  • Badging allows for knowledge circulation among teachers. 
  • Badging can be tracked and assessed. 
  • Badging is a scalable enterprise. 

 

Bloom Digital Taxonomy

Bloom’s Digital Taxonomy Cheat Sheet for Teachers

http://www.educatorstechnology.com/2016/02/blooms-digital-taxonomy-cheat-sheet-for-teachers.html

Resources for Bloom’s Digital Taxonomy
iPad Apps Android Apps Web Tools
Creating
Evaluating
Analyzing
Applying
Understanding
Remembering

Follow the discussion on the LinkedIn ISTE discussion group:

https://www.linkedin.com/groups/2811/2811-6107212405878566913

Similar visual representation in this IMS blog entry:

Bloom’s Wheel With Technology

organization of info across apps and platforms

Event: FridayLive! A Way through the Information Jungle: February 26th
Date: 26 Feb 2016 2:00 PM –  EST

LOGIN INFORMATION:
To login to FridayLive! on February 26, 2016 starting at 1:30 pm ET
Join from PC, Mac, Linux, iOS or Android:
1st try this short URL: tlt/gs/zoom
2nd try https://zoom.us/j/2758853550
Meeting ID: 275 885 3550
https://zoom.us/j/2758853550

Description

Ever wonder if there is a better way to manage all the information to which we have access. We want to find it, filter it, organize it, consume it, store it, share it – on and offline – across all our devices –  and save time and effort while we do it all.

Our guests for this session will share their work flows and associated applications they have found to be successful such as Pocket, Feedly, Evernote, DIIGO, INNO reader, etc. There will also be an opportunity for participants to share their works flows.
The TLT Group
301-270-8312

https://www.netvibes.com/en

https://gmail.powerbotapps.com/#main

https://www.wunderlist.com/

http://moocie.org/curating-tools/

http://webtools4u2use.wikispaces.com/Curation+Tools

philosophy and technology

Philosophy’s influence on technology design – and why it needs to change

http://phys.org/news/2016-02-philosophy-technology-designand.html

How we communicate is as important as why

Communication technology has tapped into a very human need to be liked and appreciated.

Why should any of this matter to designers, manufacturers, and users of technology? A narrow view of why we communicate inevitably limits the sorts of we build. Interestingly, many of the things we do with technology are byproducts of what they were originally designed for (e.g. the internet emerged as the result of a US Defence project researching possibilities for network packets). Once we drop our preconceived ideas that transmitting information is their only purpose – an assumption that carries with it a shortsighted vision – the possibilities of what we could create are endless.
There is a difference between understanding the words a speaker has said, and understanding the speaker – understanding the “why” as well as the “what”.

1 94 95 96 97 98 114