case study: an undergraduate senior projects computer science course collaboration whose aim was to develop textual browsing experiences, among other library reference functionality, within the HTC Vive virtual reality (VR) headset. In this case study, readers are introduced to applied uses of VR in service to library-based learning through the research and development of a VR reading room app with multi-user support. Within the VR reading room prototype, users are able to collaboratively explore the digital collections of HathiTrust, highlight text for further searching and discovery and receive consultative research support from a reference specialist through VR.
Library staff met with the project team weekly over the 16 weeks of both semesters to first scope out the functionality of the system and vet requirements.
The library research team further hypothesized that incorporating reference-like support in the VR environment can support library learning. There is ample evidence in the library literature which underscores the importance of reference interactions as learning and instructional experiences for university students
Educational benefits to immersive worlds include offering a deeper presence in engagement with rare or non-accessible artifacts. Sequeira and Morgado (2013, p. 2) describe their Virtual Archeology project as using “a blend of techniques and methods employed by historians and archaeologists using computer models for visualizing cultural artefacts and heritage sites”.
The higher-end graphics cards include devices such as the NVIDIA GeForceTM GTX 1060 or AMD RadeonTM RX 480, equivalent or better. The desktop system that was built for this project used the GeForce GTX 1070, which was slightly above the required minimum specifications.
Collaboration: Library as client.
Specific to this course collaboration, computer science students in their final year of study are given the option of several client projects on which to work. The Undergraduate Library has been a collaborator with senior computer science course projects for several years, beginning in 2012-2013 with mobile application design and chat reference software re-engineering (Hahn, 2015). (My note: Mark Gill, this is where and how Mehdi Mekni, you and I can collaborate)
The hurdles the students had the most trouble with was code integration – e.g. combining various individual software parts towards the end of the semester. The students also were challenged by the public HathiTrust APIs, as the system was developed to call the HathiTrust APIs from within the Unity programming environment and developing API calls in C#. This was a novel use of the HathiTrust search APIs for the students and a new area for the research team as well.
There are alternatives to Unity C# programming, notably WebVR, an open source specification for VR programming on the open web.
A-Frame has seen maturation as a platform agnostic and device agnostic software programming environment. The WebVR webpage notes that the specification supports HTC Vive, Oculus Rift, Samsung Gear VR, Google Daydream and Google Cardboard (WebVR Rocks, 2018). Open web platforms are consistent with library values and educational goals of sharing work that can be foundational in implementing VR learning experience both in VR environments and shareable on the web, too.
Hannah Pope is the Emerging Technologies Librarian at the Belk Library and Information Commons at Appalachian State University. She has been working with virtual and augmented reality devices for almost two years. She continues to grow the program at her library and frequently works with faculty members to incorporate virtual and augmented reality into their curriculum by providing avenues for students to experience curated applications. Pope has an MS library science degree from the University of North Carolina at Chapel Hill.
Encyclopedia of Criminal Activities and the Deep Web
Countries all over the world are seeing significant increases in criminal activity through the use of technological tools. Such crimes as identity theft, cyberattacks, drug trafficking, and human trafficking are conducted through the deep and dark web, while social media is utilized by murderers, sex offenders, and pedophiles to elicit information and contact their victims. As criminals continue to harness technology to their advantage, law enforcement and government officials are left to devise alternative strategies to learn more about all aspects of these modern criminal patterns and behavior, to preserve the safety of society, and to ensure that proper justice is served. Regrettably, the lack of adequate research findings on these modern criminal activities is limiting everyone’s abilities to devise effective strategies and programs to combat these modern technology-related criminal activities.
In an effort to compile the most current research on this topic, a new major reference work titled Encyclopedia of Criminal Activities and the Deep Web is currently being developed. This comprehensive Encyclopedia is projected to encompass expert insights about the nature of these criminal activities, how they are conducted, and societal and technological limitations. It will also explore new methods and processes for monitoring and regulating the use of these tools, such as social media, online forums, and online ads, as well as hidden areas of the internet including the deep and dark web. Additionally, this Encyclopedia seeks to offer strategies for predicting and preventing criminals from using technology as a means to track, stalk, and lure their victims.
You are cordially invited to share your research to be featured in this Encyclopedia by submitting a chapter proposal/abstract using the link on the formal call for papers page here. If your chapter proposal is accepted, guidelines for preparing your full chapter submission (which should be between 5,000-7,500 total words in length) can be accessed at: http://www.igi-global.com/publish/contributor-resources/ (under the “For Authors” heading – “Encyclopedia Chapter Organization and Formatting”).
Recommended topics for papers include, but are not limited to:
Bitcoin and Crime
Botnets and Crime
Dark Web Vendors
Dating Websites and Crime
Fraud and Internet
Gaming and Crime
Government Regulations of the Dark Web
Hacking and Crime
International Regulations of the Dark Web
Internet Safety & Crime
Online Advertisement Websites and Crime
Online Forums and Crime
Online Hate Crimes
Social Media Deception
Social Networking Traps
Undercover Dark Web Busts
Virtual Currencies & Crime
IMPORTANT DATES: Chapter Proposal Submission Deadline: October 15, 2018; Full Chapters Due: December 15, 2018
Note: There are no publication fees, however, contributors will be requested to provide a courtesy to their fellow colleagues by serving as a peer reviewer for this project for at least 2-3 articles. This will ensure the highest level of integrity and quality for the publication.
Simply put, a podcast is an audio file posted on a website that people can download and listen to. Businesses use them to establish themselves as experts in their field or to share information about their product or service.
Why are podcasts so popular for businesses?
1. Podcasts are readily available.
2. Your audience can listen to them anywhere.
3. You get to share your expertise.
What are the advantages of webinars?
Webinars are an increasingly popular way to build relationships with current and potential clients. They are multi-media meetings, seminars or classes held over the Internet and done in real time.
1. Webinars allow you to interact with your audience.
It will be eons before AI thinks with a limbic brain, let alone has consciousness
AI programmes themselves generate additional computer programming code to fine-tune their algorithms—without the need for an army of computer programmers. In AI speak, this is now often referred to as “machine learning”.
An AI programme “catastrophically forgets” the learnings from its first set of data and would have to be retrained from scratch with new data. The website futurism.com says a completely new set of algorithms would have to be written for a programme that has mastered face recognition, if it is now also expected to recognize emotions. Data on emotions would have to be manually relabelled and then fed into this completely different algorithm for the altered programme to have any use. The original facial recognition programme would have “catastrophically forgotten” the things it learnt about facial recognition as it takes on new code for recognizing emotions. According to the website, this is because computer programmes cannot understand the underlying logic that they have been coded with.
Irina Higgins, a senior researcher at Google DeepMind, has recently announced that she and her team have begun to crack the code on “catastrophic forgetting”.
As far as I am concerned, this limbic thinking is “catastrophic thinking” which is the only true antipode to AI’s “catastrophic forgetting”. It will be eons before AI thinks with a limbic brain, let alone has consciousness.
the Fourth Industrial Revolution, or Industry 4.0. The adoption of cyber-physical systems, the Internet of Things and the Internet of Systems
While in some ways it’s an extension of the computerization of the 3rd Industrial Revolution (Digital Revolution), due to the velocity, scope and systems impact of the changes of the fourth revolution, it is being considered a distinct era. The Fourth Industrial Revolution is disrupting almost every industry in every country and creating massive change in a non-linear way at unprecedented speed.
In his book,The Fourth Industrial Revolution, professor Klaus Schwab, founder and executive chairman of the World Economic Forum, describes the enormous potential for the technologies of the Fourth Industrial Revolution as well as the possible risks.
Our workplaces and organizations are becoming “smarter” and more efficient as machines, and humans start to work together, and we use connected devices to enhance our supply chains and warehouses. The technologies of the Fourth Industrial Revolution might even help us better prepare for natural disasters and potentially also undo some of the damage wrought by previous industrial revolutions.
There might be increased social tensions as a result of the socioeconomic changes brought by the Fourth Industrial Revolution that could create a job market that’s segregated into “low-skill/low-pay” and “high-skill/high-pay” segments.
We need to develop leaders with the skills to manage organizations through these dramatic shifts.
After Kubernetes,Istio is the most popular cloud-native technology. It is a service mesh that securely connects multiple microservices of an application. Think of Istio as an internal and external load balancer with a policy-driven firewall with support for comprehensive metrics. The reason why developers and operators love Istio is the non-intrusive deployment pattern. Almost any Kubernetes service can be seamlessly integrated with Istio without explicit code or configuration changes.
Google recently announced a managed Istio service on GCP. Apart from Google, IBM, Pivotal, Red Hat, Tigera and Weaveworks are the active contributors and supporters of the project.
Istio presents an excellent opportunity for ISVs to deliver custom solutions and tools to enterprises. This project is bound to become one of the core building blocks of cloud-native platforms. I expect every managed Kubernetes service to have a hosted Istio service.
Prometheus is a cloud-native monitoring tool for workloads deployed on Kubernetes. It plugs a critical gap that exists in the cloud-native world through comprehensive metrics and rich dashboards.
If Kubernetes is the new OS, Helm is the application installer. Designed on the lines of Debian packages and Red Hat Linux RPMs, Helm brings the ease and power of deploying cloud-native workloads with a single command.
One of the promises of cloud-native technology is the rapid delivery of software. Spinnaker, an open source project initially built at Netflix delivers that promise. It is a release management tool that adds velocity to deploying cloud-native applications.
Event-driven computing is becoming an integral part of modern application architecture. Functions as a Service (FaaS) is one of the delivery models of serverless computing which complements containers through event-based invocation. Modern applications will have services packaged as containers and functions running within the same environment.
Five tips to help you create a personal brand and a positive digital reputation
1. What will they find when they Google you?
2. What is branding?
Your brand is what you represent, the content that you share, your audience, your Personal Learning Network (PLN), and your teaching philosophy. You want your brand to demonstrate that you are trustworthy, and offer quality content, insightful comments, and experience. Your brand tells your audience that what you offer is of value. Together, the elements that create your brand should communicate a distinct, cohesive story. For instance, when you visit any of my social media profiles, you will see a consistent message. The avatar and logo for my website Shake Up Learning are more recognizable than my face, and that’s intentional. That isn’t to say that every brand needs an avatar. But do find a creative way to tell your personal story.
3. Choose the right platforms
There is no right or wrong platform. Choosing where you want to build your online presence depends on the audience that you want to engage. If you want to reach parents and school community stakeholders, Facebook is a strong bet. If you want to reach other educators, Twitter and Pinterest are big winners. The bottom line is that you don’t have to use them all. Find and connect with your audience where your audience resides.
4. Claim your social media real estate
Before you settle on a username, check that it’s available on all of the social media platforms that you want to use—and then keep it consistent. You will lose your audience if you make it hard to find you. Also keep your handle simple and short, and try to avoid special characters. When a new platform arrives, claim your username early even if you aren’t sure that you will maintain a presence there.
5. Optimize your social media profiles
Guy Kawasaki, co-author of The Art of Social Media, khas nearly 1.5 million followers on Twitter alone, and he offers effective social media tips in his book. Here are the basics:
Add a picture of your face or logo. Your picture validates who you are. No more eggheads! Using the default egg avatar on Twitter says you don’t have a brand, and doesn’t tell your audience that you are trustworthy.
Use your real name. Sure, you can lie, but that isn’t going to help you build a brand and online presence. Many platforms allow you to show your name as well as your handle.
Link to your website, blog or About.me page. Don’t have one? Get one! You may not be ready to start a blog, but anyone can easily set up an About.me page—which is like an online resume.
Compose a meaningful bio, which will help others find and follow you. It should describe your experience in the field of education and highlight topics that you follow like Maker Ed, Google Apps, or edtech.
Add a cover image. Choose an image that tells your story. Who are you? What do you do that sets you apart? Canva is a graphic design tool that makes creating a cover image easy. It offers ready-made templates in the right size for all of the major social media platforms.
Be consistent across all mediums. You want your followers to see the same brand on all of your social media profiles. This also means you shouldn’t change your profile picture every five minutes. Be recognizable.
Tools to build your brand and online presence
About.me: A quick and easy personal homepage that shows your audience who you are and how to connect with you.
Canva: An easy-to-use design tool for creating images, with templates for social media.
Fiverr: A marketplace for services that you can use to commission a logo, avatar, or web design.
breakdown of IoT functionality, from Deloitte. They give 5 general types of services that IoT “things” can do:
Internal state: Heartbeat- and ping-like broadcasts of health, potentially including diagnostics and additional status reporting (for example, battery level, CPU/memory utilization, strength of network signal, up-time or software/platform version).
Location: Communication of physical location via GPS, GSM, triangulation or proximity techniques
Physical attributes: Monitoring the world surrounding the device, including altitude, orientation, temperature, humidity, radiation, air quality, noise and vibration
Functional attributes: Higher-level intelligence rooted in the device’s purpose for describing business process or workload attributes
Actuation services: Ability to remotely trigger, change or stop physical properties or actions on the device.
Examples of IoT in action
There are some pretty well-known IoT products that some of you already use, including:
Nest Thermostat (and others). These allow you to control your AC from your phone, anywhere that you can connect to the Internet.
Smart lights: Same concept, but for lights. You can turn lights on/off from your phone. Phillips Hue is an example of this
Bluetooth Trackers – Tile (https://www.thetileapp.com/) is an example of a Bluetooth Tracker. Put one on that thing you always lose (i.e., car keys). The next time you lose those keys, you can find them again via an app on your phone.
Smart Home appliances – things like Google Home, Amazon Echo, and Apple HomeKit.
Smart power switches – Belkin’s Wemo Insight Wi-Fi Smart Plug is an example. They let you turn the plug (and therefore anything connected to it) on and off, set schedules for the plug, monitor energy consumption and use, etc. You can also connect it to Amazon Alexa and Google Home for hands-free voice control
Health and exercise trackers – Fitbits “fit” into this category, too.
How does IoT affect libraries?
Here are some ways libraries are already incorporating IoT technology into their libraries:
Smart Building Technology: As libraries retrofit their buildings with newer technology (or build new buildings/branches), they are starting to see more IoT-based technology. For example, some libraries can can adjust heating, cooling and lights from a smartphone app. Some newer building monitoring and security systems can be monitored via mobile apps.
RFID: RFID technology (sensors in books) is a type of IoT technology, and has been around for awhile.
Beacon Technology: There are at least two library-focused companies experimenting with Beacon technology (Capira Technologies and Bluubeam).
People counters: Check out Jason Griffey’s Measure the Future project. Here’s what he says about Measure the Future: “Imagine having a Google-Analytics-style dashboard for your library building: number of visits, what patrons browsed, what parts of the library were busy during which parts of the day, and more. Measure the Future is working to make that happen by using open-hardware based sensors that can collect data about building usage that is now invisible. Making these invisible occurrences explicit will allow librarians to make strategic decisions that create more efficient and effective experiences for their patrons.”
Library classes! Libraries are also teaching classes about the Internet of Things. These include classes focused on introducing patrons to IoT technology, and classes that focus on an aspect of IoT, like a class on making things with Arduinos or how to use your new Fitbit.