Posts Tagged ‘IoT’

K12 ed tech trends

5 Trends Shaping K12 Ed Tech

https://s3.amazonaws.com/dive_assets/rlpsys/ED_k12_5_trends_k12_ed_tech.pdf

  1. Chromebooks. (versus iPADs)
  2. Blended learning
  3. Single sign-on and interoperability
  4. Wireless and cloud-based multimedia
  5. IoT

+++++++++++
more on tech trends in education in this IMS blog
http://blog.stcloudstate.edu/ims?s=technology+trends+education

NMC Horizon Report 2017 K12

NMC/CoSN Horizon Report 2017 K–12 Edition

https://cdn.nmc.org/wp-content/uploads/2017-nmc-cosn-horizon-report-K12-advance.pdf
p. 16 Growing Focus on Measuring Learning
p. 18 Redesigning Learning Spaces
Biophilic Design for Schools : The innate tendency in human beings to focus on life and lifelike processes is biophilia

p. 20 Coding as a Literacy

 https://www.facebook.com/bracekids/
Best Coding Tools for High School http://go.nmc.org/bestco

p. 24

Significant Challenges Impeding Technology Adoption in K–12 Education
Improving Digital Literacy.
 Schools are charged with developing students’ digital citizenship, ensuring mastery of responsible and appropriate technology use, including online etiquette and digital rights and responsibilities in blended and online learning settings. Due to the multitude of elements comprising digital literacy, it is a challenge for schools to implement a comprehensive and cohesive approach to embedding it in curricula.
Rethinking the Roles of Teachers.
Pre-service teacher training programs are also challenged to equip educators with digital and social–emotional competencies, such as the ability to analyze and use student data, amid other professional requirements to ensure classroom readiness.
p. 28 Improving Digital Literacy
Digital literacy spans across subjects and grades, taking a school-wide effort to embed it in curricula. This can ensure that students are empowered to adapt in a quickly changing world
Education Overview: Digital Literacy Has to Encompass More Than Social Use

What Web Literacy Skills are Missing from Learning Standards? Are current learning standards addressing the essential web literacy skills everyone should know?https://medium.com/read-write-participate/what-essential-web-skills-are-missing-from-current-learning-standards-66e1b6e99c72

 

web literacy;
alignment of stadards

The American Library Association (ALA) defines digital literacy as “the ability to use information and communication technologies to find, evaluate, create, and communicate or share information, requiring both cognitive and technical skills.” While the ALA’s definition does align to some of the skills in “Participate”, it does not specifically mention the skills related to the “Open Practice.”

The library community’s digital and information literacy standards do not specifically include the coding, revision and remixing of digital content as skills required for creating digital information. Most digital content created for the web is “dynamic,” rather than fixed, and coding and remixing skills are needed to create new content and refresh or repurpose existing content. Leaving out these critical skills ignores the fact that library professionals need to be able to build and contribute online content to the ever-changing Internet.

p. 30 Rethinking the Roles of Teachers

Teachers implementing new games and software learn alongside students, which requires
a degree of risk on the teacher’s part as they try new methods and learn what works
p. 32 Teaching Computational Thinking
p. 36 Sustaining Innovation through Leadership Changes
shift the role of teachers from depositors of knowledge to mentors working alongside students;
p. 38  Important Developments in Educational Technology for K–12 Education
Consumer technologies are tools created for recreational and professional purposes and were not designed, at least initially, for educational use — though they may serve well as learning aids and be quite adaptable for use in schools.
Drones > Real-Time Communication Tools > Robotics > Wearable Technology
Digital strategies are not so much technologies as they are ways of using devices and software to enrich teaching and learning, whether inside or outside the classroom.
> Games and Gamification > Location Intelligence > Makerspaces > Preservation and Conservation Technologies
Enabling technologies are those technologies that have the potential to transform what we expect of our devices and tools. The link to learning in this category is less easy to make, but this group of technologies is where substantive technological innovation begins to be visible. Enabling technologies expand the reach of our tools, making them more capable and useful
Affective Computing > Analytics Technologies > Artificial Intelligence > Dynamic Spectrum and TV White Spaces > Electrovibration > Flexible Displays > Mesh Networks > Mobile Broadband > Natural User Interfaces > Near Field Communication > Next Generation Batteries > Open Hardware > Software-Defined Networking > Speech-to-Speech Translation > Virtual Assistants > Wireless Powe
Internet technologies include techniques and essential infrastructure that help to make the technologies underlying how we interact with the network more transparent, less obtrusive, and easier to use.
Bibliometrics and Citation Technologies > Blockchain > Digital Scholarship Technologies > Internet of Things > Syndication Tools
Learning technologies include both tools and resources developed expressly for the education sector, as well as pathways of development that may include tools adapted from other purposes that are matched with strategies to make them useful for learning.
Adaptive Learning Technologies > Microlearning Technologies > Mobile Learning > Online Learning > Virtual and Remote Laboratories
Social media technologies could have been subsumed under the consumer technology category, but they have become so ever-present and so widely used in every part of society that they have been elevated to their own category.
Crowdsourcing > Online Identity > Social Networks > Virtual Worlds
Visualization technologies run the gamut from simple infographics to complex forms of visual data analysis
3D Printing > GIS/Mapping > Information Visualization > Mixed Reality > Virtual Reality
p. 46 Virtual Reality
p. 48 AI
p. 50 IoT

+++++++++++++++
more on NMC Horizon Reports in this IMS blog

http://blog.stcloudstate.edu/ims?s=new+media+horizon

disruptive technologies higher ed

The top 5 disruptive technologies in higher ed

By Leigh M. and Thomas Goldrick June 5th, 2017
The Internet of Things (IoT), augmented reality, and advancements in online learning have changed the way universities reach prospective students, engage with their current student body, and provide them the resources they need.
Online Learning
Despite online learning’s successes, many still believe that it lacks the interaction of its in-person counterpart. However, innovations in pedagogical strategy and technology are helping make it much more engaging.

Competency-based Education

Competency-based education (CBE) recognizes that all students enter a program with different skills and proficiencies and that each moves at a different rate. We now possess the technology to better measure these differences and design adaptive learning programs accordingly. These programs aim to increase student engagement, as time is spent expanding on what the students already know rather than having them relearn familiar material.

The Internet of Things

The Internet of Things has opened up a whole new world of possibilities in higher education. The increased connectivity between devices and “everyday things” means better data tracking and analytics, and improved communication between student, professor, and institution, often without ever saying a word. IoT is making it easier for students to learn when, how, and where they want, while providing professors support to create a more flexible and connected learning environment.

Virtual/Augmented Reality

Virtual and augmented reality technologies have begun to take Higher Ed into the realm of what used to be considered science fiction.

More often than not, they require significant planning and investment into the infrastructure needed to support them.

Artificial Intelligence

an A.I. professor’s assistant or an online learning platform that adapts to each student’s specific needs. Having artificial intelligence that learns and improves as it aids in the learning process could have a far-reaching effect on higher education both online and in-person.

+++++++++++++++++++++
more on disruptive technologies in this IMS blog
https://blog.stcloudstate.edu/ims?s=disruptive+technologies

industry 4.0 and IOT

The Internet of Things will power the Fourth Industrial Revolution. Here’s how

https://medium.com/world-economic-forum/the-internet-of-things-will-power-the-fourth-industrial-revolution-heres-how-39932f03df1

By 2020 more than 50 billion things, ranging from cranes to coffee machines, will be connected to the internet. That means a lot of data will be created — too much data, in fact, to be manageable or to be kept forever affordably.

One by-product of more devices creating more data is that they are speaking lots of different programming languages. Machines are still using languages from the 1970s and 80s as well as the new languages of today. In short, applications need to have data translated for them — by an IoT babelfish, if you will — before they can make sense of the information.

Then there are analytics and data storage.

security becomes even more important as there is little human interaction in the flow of data from device to datacentre — so called machine-to-machine communication.

 

+++++++++++++++++++
more on IOT in this IMS blog
http://blog.stcloudstate.edu/ims?s=iot

more on industry 4.0 in this IMS blog
http://blog.stcloudstate.edu/ims?s=industrial+revolution

IoT

Survey: IoT Overtakes Mobile as Security Threat

By Rhea Kelly 06/05/17

https://campustechnology.com/articles/2017/06/05/survey-iot-overtakes-mobile-as-security-threat.aspx

a report from ISACA, a nonprofit association focused on knowledge and practices for information systems. The 2017 State of Cyber Security Study surveyed IT security leaders around the globe on security issues, the emerging threat landscape, workforce challenges and more.

  • 53 percent of survey respondents reported a year-over-year increase in cyber attacks;
  • 62 percent experienced ransomware in 2016, but only 53 percent have a formal process in place to address a ransomware attack;
  • 78 percent reported malicious attacks aimed at impairing an organization’s operations or user data;
  • Only 31 percent said they routinely test their security controls, while 13 percent never test them; and
  • 16 percent do not have an incident response plan.
  • 65 percent of organizations now employ a chief information security officers, up from 50 percent in 2016, yet still struggle to fill open cyber security positions;
  • 48 percent of respondents don’t feel comfortable with their staff’s ability to address complex cyber security issues;
  • More than half say cyber security professionals “lack an ability to understand the business”;
  • One in four organizations allot less than $1,000 per cyber security team member for training; and
  • About half of the organizations surveyed will see an increase in their cyber security budget, down from 61 percent in 2016.

++++++++++++++++++++++++++

IoT to Represent More Than Half of Connected Device Landscape by 2021

By Sri Ravipati 06/09/17

https://campustechnology.com/articles/2017/06/09/iot-to-represent-more-than-half-of-connected-device-landscape-by-2021.aspx

20121 prediction for data in North America

analysis comes from Cisco’s recent Visual Networking Index for the 2016-2021 forecast period.

  • IP video traffic will increase from 73 percent of all internet consumer traffic in 2016 to 82 percent in 2021 (with live streaming accounting for 13 percent);
  • Virtual and augmented reality traffic is expected to increase 20-fold during the forecast period at a compound annual growth rate of 82 percent; and
  • Internet video surveillance traffic is anticipated to grow during the forecast period, comprising 3.4 percent of all internet traffic.

To learn more, view the full report.

+++++++++++++++++++++++++++

5 ways to use the Internet of Things in higher ed

By Danielle R. June 14th, 2017
 1. Labeling and Finding
 campus’ buildings were able to transmit interactive map data to a student finding their way around for the first time
2. Booking and Availability
3. Preparation
4. Intervention
As FitBit and other personal wearables become better at tracking various health markers, these markers can be put to use tracking individual patterns in the student body.
 The University of Southern California is currently researching the impact that analyzing IoT-gathered data can have on student performance, but the IoT can be used to prevent more than just academic difficulties.
the privacy concerns such use might raise; as universities implement systems that integrate wearables, they will encounter this hurdle and have to implement policies to address it.
5. Research
Laboratories are often required to be completely controlled spaces with considerations made for climate, light, and sometimes even biometric data inside the lab.

+++++++++++++++++++++
http://blog.stcloudstate.edu/ims?s=internet+of+things
http://blog.stcloudstate.edu/ims?s=iot 

industry 4.0

A Strategist’s Guide to Industry 4.0. Global businesses are about to integrate their operations into a seamless digital whole, and thereby change the world.

https://www.strategy-business.com/article/A-Strategists-Guide-to-Industry-4.0
Industrial revolutions are momentous events. By most reckonings, there have been only three. The first was triggered in the 1700s by the commercial steam engine and the mechanical loom. The harnessing of electricity and mass production sparked the second, around the start of the 20th century. The computer set the third in motion after World War II.
Henning Kagermann, the head of the German National Academy of Science and Engineering (Acatech), did exactly that in 2011, when he used the term Industrie 4.0 to describe a proposed government-sponsored industrial initiative.
The term Industry 4.0 refers to the combination of several major innovations in digital technology
These technologies include advanced robotics and artificial intelligence; sophisticated sensors; cloud computing; the Internet of Things; data capture and analytics; digital fabrication (including 3D printing); software-as-a-service and other new marketing models; smartphones and other mobile devices; platforms that use algorithms to direct motor vehicles (including navigation tools, ride-sharing apps, delivery and ride services, and autonomous vehicles); and the embedding of all these elements in an interoperable global value chain, shared by many companies from many countries.
Companies that embrace Industry 4.0 are beginning to track everything they produce from cradle to grave, sending out upgrades for complex products after they are sold (in the same way that software has come to be updated). These companies are learning mass customization: the ability to make products in batches of one as inexpensively as they could make a mass-produced product in the 20th century, while fully tailoring the product to the specifications of the purchaser
.

adoption industry 4.0 by sector

Three aspects of digitization form the heart of an Industry 4.0 approach.

• The full digitization of a company’s operations

•  The redesign of products and services

•  Closer interaction with customers

Making Industry 4.0 work requires major shifts in organizational practices and structures. These shifts include new forms of IT architecture and data management, new approaches to regulatory and tax compliance, new organizational structures, and — most importantly — a new digitally oriented culture, which must embrace data analytics as a core enterprise capability.

Klaus Schwab put it in his recent book The Fourth Industrial Revolution (World Economic Forum, 2016), “Contrary to the previous industrial revolutions, this one is evolving at an exponential rather than linear pace.… It is not only changing the ‘what’ and the ‘how’ of doing things, but also ‘who’ we are.”

This great integrating force is gaining strength at a time of political fragmentation — when many governments are considering making international trade more difficult. It may indeed become harder to move people and products across some national borders. But Industry 4.0 could overcome those barriers by enabling companies to transfer just their intellectual property, including their software, while letting each nation maintain its own manufacturing networks.
+++++++++++++++++++++++++++
more on the Internet of Things in this IMS blog
http://blog.stcloudstate.edu/ims?s=internet+of+things

also Digital Learning

http://blog.stcloudstate.edu/ims/2017/03/28/digital-learning/

NMC Horizon Report 2017 Library

NMC Horizon Report > 2017 Library Edition

http://www.nmc.org/publication/nmc-horizon-report-2017-library-edition/

PDF file 2017-nmc-horizon-report-library-EN-20ml00b

p. 26 Improving Digital Literacy

As social networking platforms proliferate and more interactions take place digitally, there are more opportunities for propagation of misinformation, copyright infringement, and privacy breaches.
http://blog.stcloudstate.edu/ims/2017/03/28/fake-news-3/
http://blog.stcloudstate.edu/ims/2017/03/28/fake-news-resources/

p. 34 Embracing the need for radical change

40% of faculty report that their students ” rarely” interact with campus librarians.

Empathy as the Leader’s Path to Change | Leading From the Library, By on October 27, 2016, http://lj.libraryjournal.com/2016/10/opinion/leading-from-the-library/empathy-as-the-leaders-path-to-change-leading-from-the-library/

Empathy as a critical quality for leaders was popularized in Daniel Goleman’s work about emotional intelligence. It is also a core component of Karol Wasylyshyn’s formula for achieving remarkable leadership. Elizabeth Borges, a women’s leadership program organizer and leadership consultant, recommends a particular practice, cognitive empathy.

Leadership in disruptive times, , First Published September 27, 2016, http://journals.sagepub.com/doi/full/10.1177/0340035216658911

What is library leadership?  a library leader is defined as the individual who articulates a vision for the organization/task and is able to inspire support and action to achieve the vision. A manager, on the other hand, is the individual tasked with organizing and carrying out the day-to-day operational activities to achieve the vision.Work places are organized in hierarchical and in team structures. Managers are appointed to administer business units or organizations whereas leaders may emerge from all levels of the hierarchical structures. Within a volatile climate the need for strong leadership is essential.  

Leaders are developed and educated within the working environment where they act and co-work with their partners and colleagues. Effective leadership complies with the mission and goals of the organization. Several assets distinguish qualitative leadership:

Mentoring. Motivation. Personal development and skills. Inspiration and collaboration. Engagement. Success and failure. Risk taking. Attributes of leaders.

Leaders require having creative minds in shaping strategies and solving problems. They are mentors for the staff, work hard and inspire them to do more with less and to start small and grow big. Staff need to be motivated to work at their optimum performance level. Leadership entails awareness of the responsibilities inherent to the roles of a leader. However, effective leadership requires the support of the upper management.

p. 36. Developments in Technology for Academic and Research Libraries

http://horizon.wiki.nmc.org/Horizon+Topics

  1. consumer technologies
  2. Digital strategies are not so much technologies as they are ways of using devices and software to enrich teaching, learning, research and information management, whether inside or outside the library. Effective Digital strategies can be used in both information and formal learning; what makes them interesting is that they transcended conventional ideas to create something that feels new, meaningful, and 21st century.
  3. enabling technologies
    this group of technologies is where substantive technological innovation begins to be visible.
  4. Internet technologies.
  5. learning technologies
  6. social media technologies. could have been subsumed under the consumer technology category, but they have become so ever-present and so widely used in every part of society that they have been elevated to their own category. As well-established as social media is, it continues to evolve at a rapid pace, with new ideas, tools, and developments coming online constantly.
  7. Visualization technologies.  from simple infographics to complex forms of visual data analysis. What they have in common is that they tap the brain’s inherent ability to rapidly process visual information, identify patterns, and sense order in complex situations. These technologies are a growing cluster of tools and processes for mining large data sets, exploring dynamic processes, and generally making the complex simple.

new horizon report 2017 technologies

 

 

p. 38 Big Data
Big data has significant implications for academic libraries in their roles as facilitators and supporters of the research process. big data use in the form of digital humanities research. Libraries are increasingly seeking to recruit for positions such as research data librarians, data curation specialists, or data visualization specialists

p. 40  Digital Scholarship Technologies

digital humanities scholars are leveraging new tools to aid in their work. ubiquity of new forms of communication including social media, text analysis software such as Umigon is helping researchers gauge public sentiment. The tool aggregates and classifies tweets as negative, positive, or neutral.

p. 42 Library Services Platforms

Diversity of format and materials, in turn, required new approaches to content collection and curation that were unavailable in the incumbent integrated library systems (ILS), which are primarily designed for print materials. LSP is different from ILS in numerous ways. Conceptually, LSPs are modeled on the idea of software as a service (SaaS),which entails delivering software applications over the internet.

p. 44 Online Identity.
incorporated  the  management of digital footprints into their programming and resources

simplify the idea of digital footprint as“data about the data” that people are searching or using online. As resident champions for advancing digital literacy,304 academic and research libraries are well-positioned to guide the process of understanding and crafting online identities.

Libraries are becoming integral players in helping students understand how to create and manage their online identities. website includes a social media skills portal that enables students to view their digital presence through the lens in which others see them, and then learn how they compare to their peers.

p. 46  Artificial Intelligence

https://www.semanticscholar.org/

p. 48 IoT

beacons are another iteration of the IoT that libraries have adopted; these small wireless devices transmit a small package of data continuously so that when devices come into proximity of the beacon’s transmission, functions are  triggered based on a related application.340 Aruba Bluetooth low-energy beacons to link digital resources to physical locations, guiding patrons to these resources through their custom navigation app and augmenting the user experience with location-based information, tutorials, and videos.

students and their computer science  professor  have  partnered  with   Bavaria’s State Library to develop a library app that triggers supplementary information about its art collection or other points of interest as users explore the space

+++++++++++++++++++++++++++
more on Horizon Reports in this IMS blog
http://blog.stcloudstate.edu/ims?s=horizon+report

code4lib

Code4Lib Proposed Preconference Workshops

http://2017.code4lib.org/workshops/proposed-workshops.html

Introduction to functional programming principles, including immutability, higher-order functions, and recursion using the Clojure programming language. This workshop will cover getting started with the Clojure REPL, building programs through function composition, testing, and web-development using ClojureScript.

Proposed by: Sam Popowich

This workshop will do a deep dive into approaches and recommend best practices for customizing Blacklight applications. We will discuss a range of topics, including styling and theming, customizing discovery experiences, and working with Solr.

Proposed by: Chris Beer, Jessie Keck, and Jack Reed

We all encounter failure in our professional lives: failed projects, failed systems, failed organizations. We often think of failure as a negative, but it has intrinsic value — and since it’s inevitable that we’ll eventually experience failure ourselves, it’s important to know how to accept it, how to take lessons from it, and how to grow from it professionally. Fail4Lib, now in its 5th year, is the perennial Code4Lib preconference dedicated to discussing and coming to terms with the failures that we all face in our professional lives. It is a safe space for us to explore failure, to talk about our own experiences with failure, and to encourage enlightened risk taking. The goal of Fail4Lib is for participants to be adept at failing gracefully, so that when we do fail, we do so in a way that moves us forward. This half-day preconference will consist of case studies, round-table discussions, and, for those interested in sharing, lightning talks on failures we’ve dealt with in our own work.

Proposed by: Andreas Orphanides and Bret Davidson

Intro to programming in Ruby on Rails

Proposed by: Carolyn Cole and Laney McGlohon

Amazon Web Services currently offers 58 services ranging from the familiar compute and storage systems to game development and the internet of things. We will focus on the 20-some services that you should be aware of as you move your applications to their cloud.

The morning session will be mostly overview and the afternoon session will be more practical examples and discussion. This could be broken into two sessions.

Proposed by: Cary Gordon, t/b/d, and t/b/d

FOLIO is a library services platform — infrastructure that allows cooperating library apps to share data. This workshop is a hands-on introduction to FOLIO for developers of library apps. In this tutorial you will work with your own Vagrant image through a series of exercises designed to demonstrate how to install an app on the platform and use the data sources and design elements the platform provides.

REQUIREMENTS Laptop (4GB) with Vagrant installed.

Proposed by: Peter Murray

Have an idea for an app? Want to work with FOLIO developers and others in the community on the FOLIO platform to make it happen. Come to this half-day hack-a-thon! Ideas for new developers will be posted in the project Jira, or bring your own concepts and work with others to make them reality.

REQUIREMENTS Laptop (4GB) with Vagrant installed. Attending the FOLIO Tutorial is recommended, but not required.

Proposed by: Peter Murray

Google Apps script is a server-side implementation of JavaScript which supports API calls to Google Services. This can provide an excellent platform for developing simple library applications. The libraries at Georgetown University and the University of Dayton have successfully deployed applications built with Google App Script.

In this workshop, we will step through the various types of applications that can be built with Google Apps Script.
(1) Custom cell formulas
(2) Spreadsheet Add On Functions (menu items, time based triggers)
(3) Google Apps Script as a Web Service
(4) Google Apps Script Add-Ons that can be shared globally or by domain

In this workshop, we will build sample instances of each of these types of applications (wifi-permitting) and spend some time brainstorming additional applications that would be useful for the library community.

Sample Applications: http://georgetown-university-libraries.github.io/#google-sheets

Proposed by: Terry Brady and Craig Boman

Calls to mindfulness and self care can have mixed reception in our field. While some view this important work as navel-gazing or unnecessary, it is integral to being present and avoiding burnout. Often this skewed attention to output comes at the expense of our personal lives, our organizations, our health, our relationships, and our mental well-being. Learning to prioritize self-care is an ongoing project among those who perform emotional labor. While some view the work of mindfulness as self-indulgent, it has proven to keep many on the track of being present and avoiding burnout.*

The purpose of this preconference is to provide a short introduction to self care and mindfulness with practical work we can use regardless of setting. We’ll discuss microaggressions and allyship (microaggressions being the brief and commonplace verbal, behavioral, or environmental indignities that marginalized people of various groups experience daily and allyship referring to the powerful role that individuals from privileged groups can play in supporting marginalized individuals). We will then transition to a modified unconference setting where participants can practice scenarios and learn practical solutions. Each of the presenters has different set of skills and experiences that allow for many techniques and strategies to be explored. Preconference attendees will participate in sessions like “Mentor Speed Dating” where they get to talk to and question potential mentors/mentees. They may be coached through a guided meditation or walked through a calming breathing exercise. For those looking to a more physical space, office yoga and stretching techniques may be shared depending on the outcomes of the unconference interest.

Foundational materials and articles will be shared with the registrants prior to the meeting with the option of further discussion at the workshop. An open access guide to all the resources and readings will be available after the preconference, and people will be encouraged to share additional their tools on a website.

Suggested Hashtag #c4lselfcare

* Abenavoli, R.M., Jennings, P.A., Greenberg, M.T., Harris, A.R., & Katz, D.A. (2013). The protective effects of mindfulness against burnout among educators. Psychology of Education Review, 37(2), 57-69

Proposed by: Carmen Mitchell, Lia Friedman, and Torie Quinonez

In this preconference, participants will be introduced to Virtual Reality uses in library settings, notably, by way of the VR Reading Room. Within the VR Reading Room prototype, users can collaboratively explore digital collections (e.g. HathiTrust) by way of VR headsets. Participants of this workshop will have the opportunity to experience HTC Vive functionality. The system will be setup with a prototype e-book experiment in order to model several VR affordances. Once attendees have been introduced to the HTC Vive hardware and sample project, groups of participants will have an opportunity to further brainstorm novel uses cases.

Proposed by: Jim Hahn

Python[1] has become one of the dominant languages in scientific computing and is used by researchers around the world. Its popularity is due in large part to a rich set of libraries for data analysis like Pandas[2] and NumPy[3] and tools for exploring scientific code like Jupyter notebooks[4]. Join us for this half-day workshop on the basics of using Pandas within a Jupyter notebook. We will cover importing data, selecting and subsetting data, grouping data, and generating simple visualizations. All are welcome, but some familiarity with Python is recommended, e.g. the concepts covered in the Codecademy[5] or Google[6] Python courses.

[1] https://www.python.org/
[2] http://pandas.pydata.org/
[3] http://www.numpy.org/
[4] http://jupyter.org/
[5] https://www.codecademy.com/learn/python
[6] https://developers.google.com/edu/python/

Proposed by: Bret Davidson and Kevin Beswick

Learn about the features and capabilities of Sufia, a Hydra-based repository solution. Attendees will participate in a hand-on demonstration where they deposit content, edit metadata, create collections, and explore access control options. Attendees should bring laptops with Chrome, Firefox, or Safari installed. Please plan on bringing at least one image, document, or other digital content that you’re comfortable uploading and using for demo and experimentation purposes 🙂

Proposed by: Mark Bussey and Justin Coyne

The web can be a trove of openly accessible data, but it is not always readily available in a format that allows it to be downloaded for analysis and reuse. This workshop aims to introduce attendees to web scraping, a technique to automate extracting data from websites.

Part one of the workshop will use browser extensions and web tools to get started with web scraping quickly, give examples where this technique can be useful, and introduce how to use XPath queries to select elements on a page.

Part two will introduce how to write a spider in Python to follow hyperlinks and scrape several web pages using the Scrapy framework. We will conclude with an overview of the legal aspects of web scraping and an open discussion.

You don’t need to be a coder to enjoy this workshop! Anyone wishing to learn web scraping is welcome, although some familiarity with HTML will be helpful. Part two will require some experience with Python, attendees unfamiliar with this language are welcome to stay only for part one and still learn useful web scraping skills!

Proposed by: Thomas Guignard and Kim Pham

Paper prototyping is a low-cost, structured brainstorming technique that uses materials such as paper and pencils to better understand the way users interact with physical, visual, and textual information. It can help us learn how to better think through workflows, space design, and information architecture. Session attendees will learn about the ways low-fidelity prototyping and wireframing can be used to develop ideas, troubleshoot workflows, and improve learning and interaction.

In the first half of the workshop, participants will step through activities in icon design, persona development, and task development. In the second half they will develop a low fidelity prototype and step through a guerilla usability testing process with it.

Proposed by: Ekatarina (Eka) Grguric and Andreas Orphanides

IoT hack

My note:
I listened to the report in my car yesterday. It is another sober reminder for being proactive rather then reactive (or punitive). We must work toward digital literacy and go beyond that comfortably numb stage of information literacy.

An Experiment Shows How Quickly The Internet Of Things Can Be Hacked

http://www.npr.org/sections/alltechconsidered/2016/11/01/500253637/an-experiment-shows-how-quickly-the-internet-of-things-can-be-hacked

We have basic security in place in modern devices that screen out the most obvious attacks. Really getting phished, if you will, is more of a problem where you are tricked in surrendering your password or username to a common service. If you plug in your webcam into your router or to your Wi-Fi, you’re relatively safe.

I think the biggest security concern for folks at home would be if their router actually is old, it might have an easily guessed password that someone could gain control. Most modern devices don’t have that problem, but that certainly is a concern for older devices.


+++++++++++
more on cybersecurity in this blog:
http://blog.stcloudstate.edu/ims?s=cybersecurity

IoT for Product Managers

Internet of Things: A Primer for Product Managers

https://medium.com/@delizalde/internet-of-things-a-primer-for-product-managers-5b6bef0a8b9b#.aitrbiy0h

The first step to becoming an IoT Product Manager is to understand the 5 layers of the IoT technology stack.

5 layers of IoT

1. Devices

Devices constitute the “things” in the Internet of Things. They act as the interface between the real and digital worlds.

2. Embedded software

Embedded software is the part that turns a device into a “smart device”. This part of the IoT technology stack enables the concept of “software-defined hardware”, meaning that a particular hardware device can serve multiple applications depending on the embedded software it is running.

Embedded Operating System

The complexity of your IoT solution will determine the type of embedded Operating System (OS) you need. Some of the key considerations include whether your application needs a real-time OS, the type of I/O support you need, and whether you need support for the full TCP/IP stack.

Common examples of embedded OS include Linux, Brillo (scaled-down Android), Windows Embedded, and VxWorks, to name a few.

Embedded Applications

This is the application(s) that run on top of the embedded OS and provide the functionality that’s specific to your IoT solution.

3. Communications

Communications refers to all the different ways your device will exchange information with the rest of the world. This includes both physical networks and the protocols you will use.

4. Cloud Platform

The cloud platform is the backbone of your IoT solution. If you are familiar with managing SaaS offerings, then you are well aware of everything that is entailed here. Your infrastructure will serve as the platform for these key areas:

Data Collection and Management

Your smart devices will stream information to the cloud. As you define the requirements of your solution, you need to have a good idea of the type and amount of data you’ll be collecting on a daily, monthly, and yearly basis.

Analytics

Analytics are one of they key components of any IoT solution. By analytics, I’m referring to the ability to crunch data, find patterns, perform forecasts, integrate machine learning, etc. It is the ability to find insights from your data and not the data alone that makes your solution valuable.

Cloud APIs

The Internet of Things is all about connecting devices and sharing data. This is usually done by exposing APIs at either the Cloud level or the device level. Cloud APIs allow your customers and partners to either interact with your devices or to exchange data. Remember that opening an API is not a technical decision, it’s a business decision.

Related post: The Business of APIs: What Product Managers Need to Plan For

5. Applications

This is the part of the stack that is most easily understood by Product teams and Executives. Your end-user applications are the part of the system that your customer will see and interact with. These applications will most likely be Web-based, and depending on your user needs, you might need separate apps for desktop, mobile, and even wearables.

The Bottom Line

As the Internet of Things continues to grow, the world will need an army of IoT-savvy Product Managers. And those Product Managers will need to understand each layer of the stack, and how they all fit together into a complete IoT solution.

++++++++++++++

more on Internet of Things in this blog:

http://blog.stcloudstate.edu/ims?s=internet+of+things

1 2