Archive of ‘technology literacy’ category

IBM acquires Red Hat

IBM’s acquisition of Red Hat is huge news for the Linux world

Red Hat, although not quite a household name, is an undeniably significant company, with lots of fingers in lots of pies, especially when it comes to cloud computing and the Linux ecosystem.

The gem in its crown is arguably the platform-as-a-service (PaaS) provider OpenShift, which directly competes with the Salesforce-owned Heroku and Google App Engine. It also owns and develops Red Hat Enterprise Linux (RHEL), which is employed across several commercial settings, including workstations, servers, and supercomputers.

Red Hat is an enthusiastic contributor to several major Linux projects, playing a role in developing Libre Office and GNOME, as well as the Kernel itself.

in 2016, Red Hat was the second most prolific contributor to the Linux Kernel, narrowly trailing silicon mega-titan Intel

 

AI and VR for teaching learning

Egan, K., Foley, J., Nicholson, K., & Sloane, K. (2018, May 22). The Promise and Pitfalls of AI and VR for Teaching and Learning [Virtual]. eXtended Reality (XR): How AR, VR, and MR Are Extending Learning Opportunities. Educause. Retrieved from https://events.educause.edu/eli/focus-sessions/2018/extended-reality-xr-how-ar-vr-and-mr-are-extending-learning-opportunities/agenda/the-promise-and-pitfalls-of-ai-and-vr-for-teaching-and-learning
https://drive.google.com/file/d/1YL5bpAQeDcVUJnEuykl4KHnJMZXIWcis/view
https://events.educause.edu/~/media/files/events/eli/focus-sessions/2018/fs1801/ol03/transcript.doc
+++++++++++
more on AI in this IMS blog
https://blog.stcloudstate.edu/ims?s=artificial+intelligence
more on VR in this IMS blog
https://blog.stcloudstate.edu/ims?s=virtual+reality

multi-user reference support experiences

https://www.emeraldinsight.com/eprint/AU2Q4SJGYQG5YTQ5A9RU/full

Hahn, J. (2018). Virtual reality learning environments | Development of multi-user reference support experiences | Information and Learning Science | Ahead of Print. EmeraldInsight. Retrieved from https://www.emeraldinsight.com/eprint/AU2Q4SJGYQG5YTQ5A9RU/full
case study: an undergraduate senior projects computer science course collaboration whose aim was to develop textual browsing experiences, among other library reference functionality, within the HTC Vive virtual reality (VR) headset. In this case study, readers are introduced to applied uses of VR in service to library-based learning through the research and development of a VR reading room app with multi-user support. Within the VR reading room prototype, users are able to collaboratively explore the digital collections of HathiTrust, highlight text for further searching and discovery and receive consultative research support from a reference specialist through VR.
Library staff met with the project team weekly over the 16 weeks of both semesters to first scope out the functionality of the system and vet requirements.
The library research team further hypothesized that incorporating reference-like support in the VR environment can support library learning. There is ample evidence in the library literature which underscores the importance of reference interactions as learning and instructional experiences for university students
Educational benefits to immersive worlds include offering a deeper presence in engagement with rare or non-accessible artifacts. Sequeira and Morgado (2013, p. 2) describe their Virtual Archeology project as using “a blend of techniques and methods employed by historians and archaeologists using computer models for visualizing cultural artefacts and heritage sites”.
The higher-end graphics cards include devices such as the NVIDIA GeForceTM GTX 1060 or AMD RadeonTM RX 480, equivalent or better. The desktop system that was built for this project used the GeForce GTX 1070, which was slightly above the required minimum specifications.

Collaboration: Library as client.

Specific to this course collaboration, computer science students in their final year of study are given the option of several client projects on which to work. The Undergraduate Library has been a collaborator with senior computer science course projects for several years, beginning in 2012-2013 with mobile application design and chat reference software re-engineering (Hahn, 2015). (My note: Mark Gill, this is where and how Mehdi Mekni, you and I can collaborate)

The hurdles the students had the most trouble with was code integration – e.g. combining various individual software parts towards the end of the semester. The students also were challenged by the public HathiTrust APIs, as the system was developed to call the HathiTrust APIs from within the Unity programming environment and developing API calls in C#. This was a novel use of the HathiTrust search APIs for the students and a new area for the research team as well.

There are alternatives to Unity C# programming, notably WebVR, an open source specification for VR programming on the open web.

A-Frame has seen maturation as a platform agnostic and device agnostic software programming environment. The WebVR webpage notes that the specification supports HTC Vive, Oculus Rift, Samsung Gear VR, Google Daydream and Google Cardboard (WebVR Rocks, 2018). Open web platforms are consistent with library values and educational goals of sharing work that can be foundational in implementing VR learning experience both in VR environments and shareable on the web, too.

++++++++++++++
more on VR in libraries in this IMS blog
https://blog.stcloudstate.edu/ims?s=virtual+reality+library

ALA VR in libraries

Virtual and Augmented Reality in Libraries

Hannah PopeLibrary Technology Reports

Hannah Pope is the Emerging Technologies Librarian at the Belk Library and Information Commons at Appalachian State University. She has been working with virtual and augmented reality devices for almost two years. She continues to grow the program at her library and frequently works with faculty members to incorporate virtual and augmented reality into their curriculum by providing avenues for students to experience curated applications. Pope has an MS library science degree from the University of North Carolina at Chapel Hill.

+++++++++
more on VR in libraries in this IMS blog
https://blog.stcloudstate.edu/ims?s=virtual+reality+library

Encyclopedia of Criminal Activities and the Deep Web

>>>>>>> Publishing Opportunity <<<<<<<<<<<<<<

Encyclopedia of Criminal Activities and the Deep Web

Countries all over the world are seeing significant increases in criminal activity through the use of technological tools. Such crimes as identity theft, cyberattacks, drug trafficking, and human trafficking are conducted through the deep and dark web, while social media is utilized by murderers, sex offenders, and pedophiles to elicit information and contact their victims. As criminals continue to harness technology to their advantage, law enforcement and government officials are left to devise alternative strategies to learn more about all aspects of these modern criminal patterns and behavior, to preserve the safety of society, and to ensure that proper justice is served. Regrettably, the lack of adequate research findings on these modern criminal activities is limiting everyone’s abilities to devise effective strategies and programs to combat these modern technology-related criminal activities.

In an effort to compile the most current research on this topic, a new major reference work titled Encyclopedia of Criminal Activities and the Deep Web is currently being developed. This comprehensive Encyclopedia is projected to encompass expert insights about the nature of these criminal activities, how they are conducted, and societal and technological limitations. It will also explore new methods and processes for monitoring and regulating the use of these tools, such as social media, online forums, and online ads, as well as hidden areas of the internet including the deep and dark web. Additionally, this Encyclopedia seeks to offer strategies for predicting and preventing criminals from using technology as a means to track, stalk, and lure their victims.

You are cordially invited to share your research to be featured in this Encyclopedia by submitting a chapter proposal/abstract using the link on the formal call for papers page here. If your chapter proposal is accepted, guidelines for preparing your full chapter submission (which should be between 5,000-7,500 total words in length) can be accessed at: http://www.igi-global.com/publish/contributor-resources/ (under the “For Authors” heading – “Encyclopedia Chapter Organization and Formatting”).

Recommended topics for papers include, but are not limited to:

  • Bitcoin and Crime
  • Botnets and Crime
  • Child Exploitation
  • Contract Killing
  • Criminology
  • Cryptocurrency
  • Cyber Espionage
  • Cyber Stalking
  • Cybercrime
  • Cybercriminals
  • Cybersecurity Legislation
  • Cyberterrorism Fraud
  • Dark Web
  • Dark Web Vendors
  • Darknets
  • Data Privacy
  • Dating Websites and Crime
  • Deep Web
  • Drug Trafficking
  • E-Banking Fraud
  • Email Scams
  • Fraud and Internet
  • Gaming and Crime
  • Government Regulations of the Dark Web
  • Hacking and Crime
  • Hacktivism
  • Human Trafficking
  • Identity Theft
  • International Regulations of the Dark Web
  • Internet Privacy
  • Internet Regulations
  • Internet Safety & Crime
  • Online Advertisement Websites and Crime
  • Online Blackmail
  • Online Forums and Crime
  • Online Hate Crimes
  • Online Predators
  • Online Privacy
  • Social Media Deception
  • Social Networking Traps
  • Undercover Dark Web Busts
  • Undercover Operations
  • Vigilante Justice
  • Virtual Currencies & Crime
  • Whistleblowing

IMPORTANT DATES: Chapter Proposal Submission Deadline: October 15, 2018; Full Chapters Due: December 15, 2018

Note: There are no publication fees, however, contributors will be requested to provide a courtesy to their fellow colleagues by serving as a peer reviewer for this project for at least 2-3 articles. This will ensure the highest level of integrity and quality for the publication. 

Should you have any questions regarding this publication, or this invitation, please do not hesitate to contact: EncyclopediaCADW@igi-global.com

Mehdi Khosrow-Pour, DBA
Editor-in-Chief
Encyclopedia of Criminal Activities and the Deep Web
EncyclopediaCADW@igi-global.com

Webinar vs. Podcast

Webinar vs. Podcast: Making The Right Choice For Your Business

August 16, 2018 https://blog.clickmeeting.com/webinar-vs-podcast

What is a podcast?

Simply put, a podcast is an audio file posted on a website that people can download and listen to. Businesses use them to establish themselves as experts in their field or to share information about their product or service.

Why are podcasts so popular for businesses?

1. Podcasts are readily available.

2. Your audience can listen to them anywhere.

3. You get to share your expertise.

What are the advantages of webinars?

Webinars are an increasingly popular way to build relationships with current and potential clients. They are multi-media meetings, seminars or classes held over the Internet and done in real time.

1. Webinars allow you to interact with your audience.

live Q&A session, Question Mode, Chat, Polls and Surveys.

2. Webinars have engaging multi-media features

have audio and video. Presentation feature, The Whiteboard Screen Sharing Share infographics, charts and other data quickly and easily.

3. Webinars allow you to earn money on the spot.

Paid Webinars allow you to monetize your expertise. Y

The Call to Action feature allows you to provide a customized call to action button during your webinar

Still wondering which is best for your business?

1. Do you want to cast a wide net to find new audiences?

If so, podcasts are a great way to do that. Your audience has easy access to you and they can listen anywhere to learn more about you and your expertise in your field.

2. Are you looking to go deeper and turn contacts into clients?

Then webinars are for you. They allow you to build relationships through thoughtful interaction.

 

Limbic thought and artificial intelligence

Limbic thought and artificial intelligence

September 5, 2018  Siddharth (Sid) Pai

https://www.linkedin.com/pulse/limbic-thought-artificial-intelligence-siddharth-sid-pai/

An AI programme “catastrophically forgets” the learnings from its first set of data and would have to be retrained from scratch with new data. The website futurism.com says a completely new set of algorithms would have to be written for a programme that has mastered face recognition, if it is now also expected to recognize emotions. Data on emotions would have to be manually relabelled and then fed into this completely different algorithm for the altered programme to have any use. The original facial recognition programme would have “catastrophically forgotten” the things it learnt about facial recognition as it takes on new code for recognizing emotions. According to the website, this is because computer programmes cannot understand the underlying logic that they have been coded with.
Irina Higgins, a senior researcher at Google DeepMind, has recently announced that she and her team have begun to crack the code on “catastrophic forgetting”.
As far as I am concerned, this limbic thinking is “catastrophic thinking” which is the only true antipode to AI’s “catastrophic forgetting”. It will be eons before AI thinks with a limbic brain, let alone has consciousness.
++++++++++++++++++

Stephen Hawking warns artificial intelligence could end mankind

https://www.bbc.com/news/technology-30290540
++++++++++++++++++++
thank you Sarnath Ramnat (sarnath@stcloudstate.edu) for the finding

An AI Wake-Up Call From Ancient Greece

  https://www.project-syndicate.org/commentary/artificial-intelligence-pandoras-box-by-adrienne-mayor-2018-10

++++++++++++++++++++
more on AI in this IMS blog
https://blog.stcloudstate.edu/ims?s=artifical+intelligence

4th industrial revolution

Are You Ready For The 4th Industrial Revolution?

Bernard Marr

https://www.linkedin.com/pulse/you-ready-4th-industrial-revolution-bernard-marr/

the Fourth Industrial Revolution, or Industry 4.0. The adoption of cyber-physical systems, the Internet of Things and the Internet of Systems

While in some ways it’s an extension of the computerization of the 3rd Industrial Revolution (Digital Revolution), due to the velocity, scope and systems impact of the changes of the fourth revolution, it is being considered a distinct era. The Fourth Industrial Revolution is disrupting almost every industry in every country and creating massive change in a non-linear way at unprecedented speed.

In his book, The Fourth Industrial Revolution, professor Klaus Schwab, founder and executive chairman of the World Economic Forum, describes the enormous potential for the technologies of the Fourth Industrial Revolution as well as the possible risks.

Our workplaces and organizations are becoming “smarter” and more efficient as machines, and humans start to work together, and we use connected devices to enhance our supply chains and warehouses. The technologies of the Fourth Industrial Revolution might even help us better prepare for natural disasters and potentially also undo some of the damage wrought by previous industrial revolutions.

There might be increased social tensions as a result of the socioeconomic changes brought by the Fourth Industrial Revolution that could create a job market that’s segregated into “low-skill/low-pay” and “high-skill/high-pay” segments.

We need to develop leaders with the skills to manage organizations through these dramatic shifts.

++++++++++++
More on the 4th industrial revolution in this IMS blog
https://blog.stcloudstate.edu/ims?s=industrial+revolution

Cloud-Native Technologies

Beyond Kubernetes – 5 Promising Cloud-Native Technologies To Watch

  1. Istio

After Kubernetes,Istio is the most popular cloud-native technology. It is a service mesh that securely connects multiple microservices of an application. Think of Istio as an internal and external load balancer with a policy-driven firewall with support for comprehensive metrics. The reason why developers and operators love Istio is the non-intrusive deployment pattern. Almost any Kubernetes service can be seamlessly integrated with Istio without explicit code or configuration changes.

Google recently announced a managed Istio service on GCP.  Apart from Google, IBM, Pivotal, Red Hat, Tigera and Weaveworks are the active contributors and supporters of the project.

Istio presents an excellent opportunity for ISVs to deliver custom solutions and tools to enterprises. This project is bound to become one of the core building blocks of cloud-native platforms. I expect every managed Kubernetes service to have a hosted Istio service.

  1. Prometheus

Prometheus is a cloud-native monitoring tool for workloads deployed on Kubernetes. It plugs a critical gap that exists in the cloud-native world through comprehensive metrics and rich dashboards.

  1. Helm

If Kubernetes is the new OS, Helm is the application installer. Designed on the lines of Debian packages and Red Hat Linux RPMs, Helm brings the ease and power of deploying cloud-native workloads with a single command.

  1. Spinnaker

One of the promises of cloud-native technology is the rapid delivery of software. Spinnaker, an open source project initially built at Netflix delivers that promise. It is a release management tool that adds velocity to deploying cloud-native applications.

  1. Kubeless

Event-driven computing is becoming an integral part of modern application architecture. Functions as a Service (FaaS) is one of the delivery models of serverless computing which complements containers through event-based invocation. Modern applications will have services packaged as containers and functions running within the same environment.

Teacher Brand and Digital Reputation

Rise and Shine! How to Boost Your Teacher Brand and Digital Reputation

By Kasey Bell     Apr 5, 2016

https://www.edsurge.com/news/2016-04-05-rise-and-shine-how-to-boost-your-teacher-brand-and-digital-reputation

Five tips to help you create a personal brand and a positive digital reputation

1. What will they find when they Google you?

2. What is branding?

Your brand is what you represent, the content that you share, your audience, your Personal Learning Network (PLN), and your teaching philosophy. You want your brand to demonstrate that you are trustworthy, and offer quality content, insightful comments, and experience. Your brand tells your audience that what you offer is of value. Together, the elements that create your brand should communicate a distinct, cohesive story. For instance, when you visit any of my social media profiles, you will see a consistent message. The avatar and logo for my website Shake Up Learning are more recognizable than my face, and that’s intentional. That isn’t to say that every brand needs an avatar. But do find a creative way to tell your personal story.

3. Choose the right platforms

There is no right or wrong platform. Choosing where you want to build your online presence depends on the audience that you want to engage. If you want to reach parents and school community stakeholders, Facebook is a strong bet. If you want to reach other educators, Twitter and Pinterest are big winners. The bottom line is that you don’t have to use them all. Find and connect with your audience where your audience resides.

4. Claim your social media real estate

Before you settle on a username, check that it’s available on all of the social media platforms that you want to use—and then keep it consistent. You will lose your audience if you make it hard to find you. Also keep your handle simple and short, and try to avoid special characters. When a new platform arrives, claim your username early even if you aren’t sure that you will maintain a presence there.

5. Optimize your social media profiles

Guy Kawasaki, co-author of The Art of Social Media, khas nearly 1.5 million followers on Twitter alone, and he offers effective social media tips in his book. Here are the basics:

  • Add a picture of your face or logo. Your picture validates who you are. No more eggheads! Using the default egg avatar on Twitter says you don’t have a brand, and doesn’t tell your audience that you are trustworthy.
  • Use your real name. Sure, you can lie, but that isn’t going to help you build a brand and online presence. Many platforms allow you to show your name as well as your handle.
  • Link to your website, blog or About.me page. Don’t have one? Get one! You may not be ready to start a blog, but anyone can easily set up an About.me page—which is like an online resume.
  •  Compose a meaningful bio, which will help others find and follow you. It should describe your experience in the field of education and highlight topics that you follow like Maker EdGoogle Apps, or edtech.
  • Add a cover image. Choose an image that tells your story. Who are you? What do you do that sets you apart? Canva is a graphic design tool that makes creating a cover image easy. It offers ready-made templates in the right size for all of the major social media platforms.
  • Be consistent across all mediums. You want your followers to see the same brand on all of your social media profiles. This also means you shouldn’t change your profile picture every five minutes. Be recognizable.

Tools to build your brand and online presence

  •  About.me: A quick and easy personal homepage that shows your audience who you are and how to connect with you.
  •  Canva: An easy-to-use design tool for creating images, with templates for social media.
  •  Fiverr: A marketplace for services that you can use to commission a logo, avatar, or web design.
  •  Wix: A free website builder.
  •  Weebly: A free website builder.
  •  Buffer: A free web tool for sharing and scheduling content across multiple social media platforms.
  •  Nuzzel: A free web tool that lets you see the content trending among the people you follow.
  •  The Art of Social Media: A guide to creating a compelling social media presence, by Guy Kawasaki and Peg Fitzpatrick.
  •  What Happens in Vegas Stays on YouTube: Tips for preserving your digital reputation, by Erik Qualman.
  •  What Happens on Campus Stays on YouTube: Advice for students on protective their digital reputations, by Erik Qualman.

++++++++++++
more on digital citizenship in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+citizenship

also:

https://www.pinterest.com/pin/628252216744698154/
social media cheat sheet and content calendar

1 19 20 21 22 23 66