Laptops, Tablets & Smartphones: School-Issued or BYOD? Either Way Works!
Title: Mobile Device Management – Strategies for Success
Date: Wed. 11/09 | 02:00 PM EST // 11:00 AM PDT
more on BYOD in education in this IMS blog
Hayden calls Russian email hack ‘honorable state espionage’
By Matt Leonard Oct 18, 2016
The Department of Homeland Security and the Office of the Director of National Intelligence issued a joint statement earlier this month that condemned Russia for the attacks.
“Do not drop this in the cyber problem box, drop this in the Russia problem box,” Hayden suggested, saying the focus should be on the actor, not the means. “And by the way, that Russian problem box needs a bigger box, there’s a lot of stuff going on.”
Though there are aspects of cybersecurity that only government can handle, most of it will be driven by the private industry, Hayden said. Government can help the private sector by getting out of the way — removing liability, enabling legal protections, sharing information and redoing the classification system.
And since the government too depends on the private sector for security innovation, Hayden said he sides with Apple regarding whether the company should have to create a back door for the FBI to bypass iPhone encryption.
more on surveillance, government in this IMS blog:
Who better to learn about incorporating 3D printing into instruction than from an instructor who taught the curriculum?
Join us on October 26th to hear directly from Assistant Professor Steve Chomyszak who used Stratasys 3D Printing Curriculum to teach a “Special Topics” 3D printing course at the Wentworth Institute of Technology.
During this complimentary webcast, you’ll gain valuable insight into the successes and lessons learned, including:
- Overview of the 14-week project-based 3D printing curriculum
- How an interactive learning environment impacted and inspired WIT students
- How the WIT 3D printing lab went from crickets to buzzing
- How curriculum measured up according to students
- And so much more!
How to add a bigger hard drive to the PlayStation 4.
more on game consoles in this IMS blog
Internet of Things: A Primer for Product Managers
The first step to becoming an IoT Product Manager is to understand the 5 layers of the IoT technology stack.
Devices constitute the “things” in the Internet of Things. They act as the interface between the real and digital worlds.
2. Embedded software
Embedded software is the part that turns a device into a “smart device”. This part of the IoT technology stack enables the concept of “software-defined hardware”, meaning that a particular hardware device can serve multiple applications depending on the embedded software it is running.
Embedded Operating System
The complexity of your IoT solution will determine the type of embedded Operating System (OS) you need. Some of the key considerations include whether your application needs a real-time OS, the type of I/O support you need, and whether you need support for the full TCP/IP stack.
Common examples of embedded OS include Linux, Brillo (scaled-down Android), Windows Embedded, and VxWorks, to name a few.
This is the application(s) that run on top of the embedded OS and provide the functionality that’s specific to your IoT solution.
Communications refers to all the different ways your device will exchange information with the rest of the world. This includes both physical networks and the protocols you will use.
4. Cloud Platform
The cloud platform is the backbone of your IoT solution. If you are familiar with managing SaaS offerings, then you are well aware of everything that is entailed here. Your infrastructure will serve as the platform for these key areas:
Data Collection and Management
Your smart devices will stream information to the cloud. As you define the requirements of your solution, you need to have a good idea of the type and amount of data you’ll be collecting on a daily, monthly, and yearly basis.
Analytics are one of they key components of any IoT solution. By analytics, I’m referring to the ability to crunch data, find patterns, perform forecasts, integrate machine learning, etc. It is the ability to find insights from your data and not the data alone that makes your solution valuable.
The Internet of Things is all about connecting devices and sharing data. This is usually done by exposing APIs at either the Cloud level or the device level. Cloud APIs allow your customers and partners to either interact with your devices or to exchange data. Remember that opening an API is not a technical decision, it’s a business decision.
Related post: The Business of APIs: What Product Managers Need to Plan For
This is the part of the stack that is most easily understood by Product teams and Executives. Your end-user applications are the part of the system that your customer will see and interact with. These applications will most likely be Web-based, and depending on your user needs, you might need separate apps for desktop, mobile, and even wearables.
The Bottom Line
As the Internet of Things continues to grow, the world will need an army of IoT-savvy Product Managers. And those Product Managers will need to understand each layer of the stack, and how they all fit together into a complete IoT solution.
more on Internet of Things in this blog:
IP‐Please, design and development of an educational game on IT‐security
Peter Mozelius, Charlotte Lesley and Ola Olsson
Department of Computer and Systems Sciences, Stockholm University, Sweden
Game‐based learning is a research field with rich discussions on the use of games in educational contexts. Many of the educational games that exist today focus on subjects such
as Language learning, Mathematics and History, and fewer on subjects in Computer Science
and IT‐security. Dissemination of information about IT‐security is important in today’s digital
society not at least in the industry. As an example many firewalls today are misconfigured
leading to decreased security at the same time as it is hard to motivate students or employees to read long detailed and tedious PDF‐files with security information. Might
things like firewall configuration instead be learnt by an educational game and how to design
a learning game that could be used in university courses on IT‐security?
more on gaming and gamification in this blog:
Survey: Growing Interest in Cyber Security Careers Among Millennials
By Leila Meyer 10/12/16
new report from Raytheon and the National Cyber Security Alliance
The report, “Securing Our Future: Closing the Cybersecurity Talent Gap,” surveyed 3,779 adults aged 18 to 26, from 12 countries around the world, including the United States, Australia, the United Kingdom, and countries in Europe, Asia and the Middle East.
a high-paying career as a cyber security professional requires skills millennials value, such as problem solving, analytical thinking and communication — and employment opportunities are available across a wide variety of sectors, including start-ups, government and hospitals.
Key findings from the report:
- 64 percent of young adults in the U.S. heard about cyberattacks in the news last year, up from 36 percent the previous year, and compared to 48 percent of young adults worldwide;
- 70 percent of millennials in the U.S. said cyber security programs or activities are available to them, up from 46 percent the previous year, and compared to 68 percent worldwide;
- 21 percent of young men expressed interest in cyber competitions, compared to 15 percent of women;
- 48 percent or respondents said more information about the specifics of cyber security jobs would help increase interest;
- 59 percent of young men and 51 percent of young women received formal cyber safety lessons in school, up from 43 percent and 40 percent respectively last year; and
- 40 percent of respondents said parents are the most influential people helping them with career advice, and 19 percent said no one was influential in helping them with career advice.
more on cybersecurity in this blog
Roberts, C. (2010). The Dissertation Journey. A Practical and Comprehensive Guide to Planing, Writing, and Defending Your Dissertation. Corwin, Thousand Oaks, CA.
Purpose and scope
We talked about “themes” and the need to be careful with breaking them into “subthemes”: if you do a historical overview, avoid chunking it into “dates” and rather keep the thematic relation. Make sure that the relate to your topic; that’s why it is good to keep your title (even if preliminary), outline (even if in progress), thesis (even if under work) etc. on the first page of your Chapter 2 manuscript / draft.
Formulate your research question / thesis
Wednesday, October 19, 2016
1:00 p.m. – 2:30 p.m. (Eastern Time)
About the Webinar
As the cost of sensors and the connectivity necessary to support those sensors has decreased, this has given rise to a network of interconnected devices. This network is often described as the Internet of Things and it is providing a variety of information management challenges. For the library and publishing communities, the internet of things presents opportunities and challenges around data gathering, organization and processing of the tremendous amounts of data which the internet of things is generating. How will these data be incorporated into traditional publication, archiving and resource management systems? Additionally, how will the internet of things impact resource management within our community? In what ways will interconnected resources provide a better user experience for patrons and readers? This session will introduce concepts and potential implications of the internet of things on the information management community. It will also explore applications related to managing resources in a library environment that are being developed and implemented.
Education in the Internet of Things
Bryan Alexander, Consultant;
How will the Internet of Things shape education? We can explore this question by assessing current developments, looking for future trends in the first initial projects. In this talk I point to new concepts for classroom and campus spaces, examining attendant rises in data gathering and analysis. We address student life possibilities and curricular and professional niches. We conclude with notes on campus strategy, including privacy, network support, and futures-facing organizations.
What Does The Internet of Things Mean to a Museum?
Robert Weisberg, Senior Project Manager, Publications and Editorial Department; Metropolitan Museum of Art;
What does the Internet of Things mean to a museum? Museums have slowly been digitizing their collections for years, and have been replacing index cards with large (and costly, and labor-intensive) CMS’s long before that, but several factors have worked against adopting smart and scalable practices which could unleash data for the benefit of the institution, its collection, and its audiences. Challenges go beyond non-profit budgets in a very for-profit world and into the siloed behaviors learned from academia, practices borne of the uniqueness of museum collections, and the multi-faceted nature of modern museums which include not only curator, but conservators, educators, librarians, publishers, and increasing numbers of digital specialists. What have museums already done, what are they doing, and what are they preparing for, as big data becomes bigger and ever more-networked?
The Role of the Research Library in Unpacking The Internet of Things
Lauren di Monte, NCSU Libraries Fellow, Cyma Rubin Fellow, North Carolina State University
The Internet of Things (IoT) is a deceptively simple umbrella term for a range of socio-technical tools and processes that are shaping our social and economic worlds. Indeed, IoT represents a new infrastructural layer that has the power to impact decision-making processes, resources distribution plans, information access, and much more. Understanding what IoT is, how “things” get networked, as well as how IoT devices and tools are constructed and deployed, are important and emerging facets of information literacy. Research libraries are uniquely positioned to help students, researchers, and other information professionals unpack IoT and understand its place within our knowledge infrastructures and digital cultures. By developing and modeling the use of IoT devices for space and program assessment, by teaching patrons how to work with IoT hardware and software, and by developing methods and infrastructures to collect IoT devices and data, we can help our patrons unlock the potential of IoT and harness the power of networked knowledge.
Lauren Di Monte is a Libraries Fellow at NC State. In this role she develops programs that facilitate critical and creative engagements with technologies and develops projects to bring physical and traditional computing into scholarship across the disciplines. Her current research explores the histories and futures of STEM knowledge practices.
What does the internet of things mean for education?
Bryan Alexander: September 17, 2014
I’m not sure if the IoT will hit academic with the wave force of the Web in the 1990s, or become a minor tangent. What do schools have to do with Twittering refrigerators?
Here are a few possible intersections.
- Changing up the campus technology space. IT departments will face supporting more technology strata in a more complex ecosystem. Help desks and CIOs alike will have to consider supporting sensors, embedded chips, and new devices. Standards, storage, privacy, and other policy issues will ramify.
- Mutating the campus. We’ve already adjusted campus spaces by adding wireless coverage, enabling users and visitors to connect from nearly everywhere. What happens when benches are chipped, skateboards sport sensors, books carry RFID, and all sorts of new, mobile devices dot the quad? One British school offers an early example.
- New forms of teaching and learning. Some of these take preexisting forms and amplify them, like tagging animals in the wild or collecting data about urban centers. The IoT lets us gather more information more easily and perform more work upon it. Then we could also see really new ways of learning, like having students explore an environment (built or natural) by using embedded sensors, QR codes, and live datastreams from items and locations. Instructors can build treasure hunts through campuses, nature preserves, museums, or cities. Or even more creative enterprises.
- New forms of research. As with #3, but at a higher level. Researchers can gather and process data using networked swarms of devices. Plus academics studying and developing the IoT in computer science and other disciplines.
- An environmental transformation. People will increasingly come to campus with experiences of a truly interactive, data-rich world. They will expect a growing proportion of objects to be at least addressable, if not communicative. This population will become students, instructors, and support staff. They will have a different sense of the boundaries between physical and digital than we now have in 2014. Will this transformed community alter a school’s educational mission or operations?