Searching for "security"

blockchain

35 Amazing Real World Examples Of How Blockchain Is Changing Our World

https://www.forbes.com/sites/bernardmarr/2018/01/22/35-amazing-real-world-examples-of-how-blockchain-is-changing-our-world

My note: nothing about education by this author. Here it is from our IMS blog
https://blog.stcloudstate.edu/ims/2018/01/12/blockchain-for-libraries/

https://blog.stcloudstate.edu/ims/2017/09/27/blockchain-credentialing-in-higher-ed/

https://blog.stcloudstate.edu/ims/2016/10/03/blockchain-credentialing/

Cybersecurity

Guardtime – This company is creating “keyless” signature systems using blockchain which is currently used to secure the health records of one million Estonian citizens.

REMME is a decentralized authentication system which aims to replace logins and passwords with SSL certificates stored on a blockchain.

Healthcare

Gem – This startup is working with the Centre for Disease Control to put disease outbreak data onto a blockchain which it says will increase the effectiveness of disaster relief and response.

SimplyVital Health – Has two health-related blockchain products in development, ConnectingCare which tracks the progress of patients after they leave the hospital, and Health Nexus, which aims to provide decentralized blockchain patient records.

MedRec – An MIT project involving blockchain electronic medical records designed to manage authentication, confidentiality and data sharing.

Financial services

ABRA – A cryptocurrency wallet which uses the Bitcoin blockchain to hold and track balances stored in different currencies.

Bank Hapoalim – A collaboration between the Israeli bank and Microsoft to create a blockchain system for managing bank guarantees.

Barclays – Barclays has launched a number of blockchain initiatives involving tracking financial transactions, compliance and combating fraud. It states that “Our belief …is that blockchain is a fundamental part of the new operating system for the planet.”

Maersk – The shipping and transport consortium has unveiled plans for a blockchain solution for streamlining marine insurance.

Aeternity – Allows the creation of smart contracts which become active when network consensus agrees that conditions have been met – allowing for automated payments to be made when parties agree that conditions have been met, for example.

Augur – Allows the creation of blockchain-based predictions markets for the trading of derivatives and other financial instruments in a decentralized ecosystem.

Manufacturing and industrial

Provenance – This project aims to provide a blockchain-based provenance record of transparency within supply chains.

Jiocoin – India’s biggest conglomerate, Reliance Industries, has said that it is developing a blockchain-based supply chain logistics platform along with its own cryptocurrency, Jiocoin.

Hijro – Previously known as Fluent, aims to create a blockchain framework for collaborating on prototyping and proof-of-concept.

SKUChain – Another blockchain system for allowing tracking and tracing of goods as they pass through a supply chain.

Blockverify –  A blockchain platform which focuses on anti-counterfeit measures, with initial use cases in the diamond, pharmaceuticals and luxury goods markets.

Transactivgrid – A business-led community project based in Brooklyn allowing members to locally produce and cell energy, with the goal of reducing costs involved in energy distribution.

STORJ.io – Distributed and encrypted cloud storage, which allows users to share unused hard drive space.

Government

DubaiDubai has set sights on becoming the world’s first blockchain-powered state. In 2016 representatives of 30 government departments formed a committee dedicated to investigating opportunities across health records, shipping, business registration and preventing the spread of conflict diamonds.

Estonia – The Estonian government has partnered with Ericsson on an initiative involving creating a new data center to move public records onto the blockchain. 20

South Korea – Samsung is creating blockchain solutions for the South Korean government which will be put to use in public safety and transport applications.

Govcoin – The UK Department of Work and Pensions is investigating using blockchain technology to record and administer benefit payments.

Democracy.earth – This is an open-source project aiming to enable the creation of democratically structured organizations, and potentially even states or nations, using blockchain tools.

Followmyvote.com – Allows the creation of secure, transparent voting systems, reducing opportunities for voter fraud and increasing turnout through improved accessibility to democracy.

Charity

Bitgive – This service aims to provide greater transparency to charity donations and clearer links between giving and project outcomes. It is working with established charities including Save The Children, The Water Project and Medic Mobile.

Retail

OpenBazaar – OpenBazaar is an attempt to build a decentralized market where goods and services can be traded with no middle-man.

Loyyal – This is a blockchain-based universal loyalty framework, which aims to allow consumers to combine and trade loyalty rewards in new ways, and retailers to offer more sophisticated loyalty packages.

Blockpoint.io – Allows retailers to build payment systems around blockchain currencies such as Bitcoin, as well as blockchain derived gift cards and loyalty schemes.

Real Estate

Ubiquity – This startup is creating a blockchain-driven system for tracking the complicated legal process which creates friction and expense in real estate transfer.

Transport and Tourism

IBM Blockchain Solutions – IBM has said it will go public with a number of non-finance related blockchain initiatives with global partners in 2018. This video envisages how efficiencies could be driven in the vehicle leasing industry.

Arcade City – An application which aims to beat Uber at their own game by moving ride sharing and car hiring onto the blockchain.

La’Zooz – A community-owned platform for synchronizing empty seats with passengers in need of a lift in real-time.

Webjet – The online travel portal is developing a blockchain solution to allow stock of empty hotel rooms to be efficiently tracked and traded, with payment fairly routed to the network of middle-men sites involved in filling last-minute vacancies.

Media

Kodak – Kodak recently sent its stock soaring after announcing that it is developing a blockchain system for tracking intellectual property rights and payments to photographers.

Ujomusic – Founded by singer-songwriter Imogen Heap to record and track royalties for musicians, as well as allowing them to create a record of ownership of their work.

It is exciting to see all these developments. I am sure not all of these will make it into successful long-term ventures but if they indicate one thing, then it is the vast potential the blockchain technology is offering.

Bernard Marr is a best-selling author & keynote speaker on business, technology and big data. His new book is Data Strategy. To read his future posts simply join his network here.

+++++++++++++
more on blockchain in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain

Microsoft patch for Meltdown and Spectre

Microsoft withdraws Spectre and Meltdown patch that’s borking AMD machines

As we look forward to the ‘Skyfall’ and ‘Casino Royale’ vulnerabilities

Chris Merriman 09 January 2018

https://www.theinquirer.net/inquirer/news/3024061/microsofts-withdraws-spectre-and-meltdown-patch-thats-borking-amd-machines

If your computer runs on AMD processor (instead of Intel) and has Windows 10, you might want to delay the anti-virus installation. 

MICROSOFT HAS POINTED the finger of blame in the direction of AMD after update designed to protect against the recent Meltdown and Spectre vulnerabilities started bricking machines using the company’s processors.

++++++++++++
more on Meltdown and Spectre in this IMS blog
https://blog.stcloudstate.edu/ims?s=spectre

social media election fake news

Election Strife, Protest And Noise: In 2017, Russia Cranked Up The Volume

The Russian Facebook scandal damages liberals as much as the right

The Republicans might have been tarnished by the St Petersburg troll factory, but Democratic fantasies about social media were rubbished in the process
The ads in question were memes, manufactured and posted to a number of bluntly named, pseudo-American Facebook accounts in 2016 by workers at a troll farm in St Petersburg, Russia. There were thousands of these ads, it seems, plus parallel efforts on Instagram and Twitter. Between them, they reached over 100 million people.
The memes were big news for a while because they showed what Russian interference in the 2016 election actually looked like, in vivid color. Eventually the story faded, though, in part because it was superseded by other stories, but also, I think, because the Russian ad story was deeply distasteful to both sides of our atrophied political debate.
The ads were clumsily written. They were rife with spelling errors and poor grammar. Their grasp of American history was awful. And over them all hovered a paranoid fear that the powerful were scheming to flip the world upside-down in the most outlandish ways: to turn our country over to the undocumented … to punish the hardworking … to crack down on patriots and Christians … to enact Sharia law right here at home.
The social media platforms aren’t neutral arbiters, selflessly serving the needs of society. As is all too obvious now, they are monopolies that manipulate us in a hundred different ways, selecting our news, steering us towards what we need to buy. The corporate entities behind them wield enormous power in Washington, too, filling Democratic campaign coffers and keeping the revolving door turning for trusted servants. Those who don’t comply get disciplined.
++++++++++++++

Russia calls for answers after Chechen leader’s Instagram is blocked

Internet watchdog demands explanation after Ramzan Kadyrov claimed Facebook also suspended him without explanation

https://www.theguardian.com/world/2017/dec/26/chechnya-ramzan-kadyrov-social-media-russia-instagram-facebook

Kadyrov has accused the US government of pressuring the social networks to disable his accounts, which he said were blocked on Saturday without explanation. The US imposed travel and financial sanctions on Kadyrov last week over numerous allegations of human rights abuses.

The former rebel fighter, who is now loyal to the Russian president, Vladimir Putin, is a fan of social media, particularly Instagram, which he has used in recent years to make barely veiled death threats against Kremlin critics.

Leonid Levin, the head of the Russian parliament’s information technologies and communications committee, suggested the move by Facebook and Instagram was an attack on freedom of speech.

Dzhambulat Umarov, the Chechen press and information minister, described the blocking of Kadyrov’s accounts as a “vile” cyber-attack by the US.

Neither Instagram nor Facebook had commented at the time of publication.

In 2015, Kadyrov urged Chechen men not to let their wives use the WhatsApp messaging service after an online outcry over the forced marriage of a 17-year-old Chechen to a 47-year-old police chief. “Do not write such things. Men, take your women out of WhatsApp,” he said.

++++++++++
more on fake news in this IMS blog
https://blog.stcloudstate.edu/ims?s=fake+news

Social Democrats in Disarray

What’s Left?: Social Democrats in Disarray

Alan Johnson Summer 2015

Why has the right, including the populist right, rather than the left, been the main political beneficiary of the anger and bitterness that has roiled Europe since the 2008 financial crash, the eurozone crisis, and the resulting deep recession and brutal austerity? After all, these events surely proved the relevance of the left’s critique of capitalism.

The left is increasingly marginal to political life in Europe despite the fact that, in the words of Owen Jones, an important voice of the British left, “Living standards are falling, public assets are being flogged to private interests, a tiny minority are being enriched at the expense of society and the hard-won gains of working people—social security, rights in the workplace and so on—are being stripped away.” And the radical parties and movements to the left of the social democratic parties have been faring no better. In the brutally honest assessment of the British Marxist Alex Callinicos, “Nearly seven years after the financial crash began, the radical left has not been weaker for decades.”

But the European left’s inability to forcefully meet the crisis is not due to a failure of individual political leaders, but the fact that it has not developed, in theory or practice, a response to the three great waves of change—economic, socio-cultural, and politico-intellectual—that have crashed over it since the late 1970s.

The fruits of this radical transformation of European social democracy into a political force pursuing a slightly kinder and a slightly gentler neoliberalism—which some dub “social neoliberalism”—have been bitter.

While capital is global, mobile, and regnant, organized labor is increasingly deindustrialized, indebted, and precarious; often temporary, part-time, insecure, and, quite frankly, unorganized.

an explosion of inequality, relative poverty, and acquisitive individualism.

The manic, pathological quality of neoliberal consumerism has produced an explosion of personal debt.

the crisis of the European left is also intellectual.

 

Malware, Phishing, Hacking, Ransomware

Keeping Safe in a Digital World

How Not to be Hacked

Malware, Phishing, Hacking, Ransomware – oh my! Learn about the threats to you, your users and your library.  During this session, we will explore the threats to online security and discuss solutions that can be implemented at any level. Most importantly, we will look at how we can educate our users on current threats and safety

Date: December 5th, 10AM

Presenter: Diana Silveira

Register: https://netforum.avectra.com/eweb/DynamicPage.aspx?Site=SEFLIN&WebCode=EventDetail&evt_key=bec597af-02dd-41a4-9b3a-afc42dc155e4

Webinar December 5, 2017 10 AM

  • create policies. e.g. changing psw routinely
  • USB blockers for public computers (public libraries). like skimmers on gas stations
  • do not use admin passwords
  • software and firmware updates.
  • policy for leaving employees
  • HTTP vs HTTPS
  • Cybersecurity KNowledge Quiz Pew research Center
    http://www.pewinternet.org/quiz/cybersecurity-knowledge/ 

diana@novarelibrary.com

slideshare.net/dee987

facebook.com/novarelibrary

twitter @Novarelibrary

+++++++++++
more on hacking in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

weaponizing the web RT hybrid war

Fake news and botnets: how Russia weaponised the web

https://www.theguardian.com/technology/2017/dec/02/fake-news-botnets-how-russia-weaponised-the-web-cyber-attack-estonia

The digital attack that brought Estonia to a standstill 10 years ago was the first shot in a cyberwar that has been raging between Moscow and the west ever since

It began at exactly 10pm on 26 April, 2007, when a Russian-speaking mob began rioting in the streets of Tallinn, the capital city of Estonia, killing one person and wounding dozens of others. That incident resonates powerfully in some of the recent conflicts in the US. In 2007, the Estonian government had announced that a bronze statue of a heroic second world war Soviet soldier was to be removed from a central city square. For ethnic Estonians, the statue had less to do with the war than with the Soviet occupation that followed it, which lasted until independence in 1991. For the country’s Russian-speaking minority – 25% of Estonia’s 1.3 million people – the removal of the memorial was another sign of ethnic discrimination.

That evening, Jaan Priisalu – a former risk manager for Estonia’s largest bank, Hansabank, who was working closely with the government on its cybersecurity infrastructure – was at home in Tallinn with his girlfriend when his phone rang. On the line was Hillar Aarelaid, the chief of Estonia’s cybercrime police.

“It’s going down,” Aarelaid declared. Alongside the street fighting, reports of digital attacks were beginning to filter in. The websites of the parliament, major universities, and national newspapers were crashing. Priisalu and Aarelaid had suspected something like this could happen one day. A digital attack on Estoniahad begun.

“The Russian theory of war allows you to defeat the enemy without ever having to touch him,” says Peter Pomerantsev, author of Nothing is True and Everything is Possible. “Estonia was an early experiment in that theory.”

Since then, Russia has only developed, and codified, these strategies. The techniques pioneered in Estonia are known as the “Gerasimov doctrine,” named after Valery Gerasimov, the chief of the general staff of the Russian military. In 2013, Gerasimov published an article in the Russian journal Military-Industrial Courier, articulating the strategy of what is now called “hybrid” or “nonlinear” warfare. “The lines between war and peace are blurred,” he wrote. New forms of antagonism, as seen in 2010’s Arab spring and the “colour revolutions” of the early 2000s, could transform a “perfectly thriving state, in a matter of months, and even days, into an arena of fierce armed conflict”.

Russia has deployed these strategies around the globe. Its 2008 war with Georgia, another former Soviet republic, relied on a mix of both conventional and cyber-attacks, as did the 2014 invasion of Crimea. Both began with civil unrest sparked via digital and social media – followed by tanks. Finland and Sweden have experienced near-constant Russian information operations. Russian hacks and social media operations have also occurred during recent elections in Holland, Germany, and France. Most recently, Spain’s leading daily, El País, reported on Russian meddling in the Catalonian independence referendum. Russian-supported hackers had allegedly worked with separatist groups, presumably with a mind to further undermining the EU in the wake of the Brexit vote.

The Kremlin has used the same strategies against its own people. Domestically, history books, school lessons, and media are manipulated, while laws are passed blocking foreign access to the Russian population’s online data from foreign companies – an essential resource in today’s global information-sharing culture. According to British military researcher Keir Giles, author of Nato’s Handbook of Russian Information Warfare, the Russian government, or actors that it supports, has even captured the social media accounts of celebrities in order to spread provocative messages under their names but without their knowledge. The goal, both at home and abroad, is to sever outside lines of communication so that people get their information only through controlled channels.

+++++++++++++++++++++
24-hour Putin people: my week watching Kremlin ‘propaganda channel’ RT

https://www.theguardian.com/media/2017/nov/29/24-hour-putin-people-my-week-watching-kremlin-propaganda-channel-rt-russia-today

 Wednesday 29 November 2017 

According to its detractors, RT is Vladimir Putin’s global disinformation service, countering one version of the truth with another in a bid to undermine the whole notion of empirical truth. And yet influential people from all walks of public life appear on it, or take its money. You can’t criticise RT’s standards, they say, if you don’t watch it. So I watched it. For a week.

Suchet, the son of former ITV newsreader John Suchet and the nephew of actor David Suchet, has been working for RT since 2009. The offspring of well-known people feature often on RT. Sophie Shevardnadze, who presents Sophie & Co, is the granddaughter of former Georgian president and Soviet foreign minister Eduard ShevardnadzeTyrel Ventura, who presents Watching the Hawks on RT America, is the son of wrestler-turned-politician Jesse Ventura. His co-host is Oliver Stone’s son Sean.

My note; so this is why Oliver Stone in his “documentary” went gentle on Putin, so his son can have a job. #Nepotism #FakeNews

RT’s stated mission is to offer an “alternative perspective on major global events”, but the world according to RT is often downright surreal.

Peter Pomerantsev, author of Nothing Is True and Everything Is Possible, about Putin’s Russia, and now a senior visiting fellow in global affairs at the London School of Economics, was in Moscow working in television when Russia Today first started hiring graduates from Britain and the US. “The people were really bright, they were being paid well,” he says. But they soon found they were being ordered to change their copy, or instructed how to cover certain stories to reflect well on the Kremlin. “Everyone had their own moment when they first twigged that this wasn’t like the BBC,” he says. “That, actually, this is being dictated from above.” The coverage of Russia’s war with Georgia in 2008 was a lightbulb moment for many, he says. They quit.

+++++++++++++++

more on Russian bots, trolls:
https://blog.stcloudstate.edu/ims/2017/11/22/bots-trolls-and-fake-news/

+++++++++++++++
more on state propaganda in this IMS blog
https://blog.stcloudstate.edu/ims/2017/11/21/china-of-xi/

Mac OS High Sierra

ANYONE CAN HACK MACOS HIGH SIERRA JUST BY TYPING “ROOT”

ANDY GREENBERG 11.28.17 05:47 PM

https://www.wired.com/story/macos-high-sierra-hack-root/

THERE ARE HACKABLE security flaws in software. And then there are those that don’t even require hacking at all—just a knock on the door, and asking to be let in. Apple’s macOS High Sierra has the second kind.

malicious code running on the operating system could steal the contents of its keychain without a password.

Apple does have a bug bounty, but only for iOS, not MacOS.

topics for IM260

proposed topics for IM 260 class

  • Media literacy. Differentiated instruction. Media literacy guide.
    Fake news as part of media literacy. Visual literacy as part of media literacy. Media literacy as part of digital citizenship.
  • Web design / web development
    the roles of HTML5, CSS, Java Script, PHP, Bootstrap, JQuery, React and other scripting languages and libraries. Heat maps and other usability issues; website content strategy. THE MODEL-VIEW-CONTROLLER (MVC) design pattern
  • Social media for institutional use. Digital Curation. Social Media algorithms. Etiquette Ethics. Mastodon
    I hosted a LITA webinar in the fall of 2016 (four weeks); I can accommodate any information from that webinar for the use of the IM students
  • OER and instructional designer’s assistance to book creators.
    I can cover both the “library part” (“free” OER, copyright issues etc) and the support / creative part of an OER book / textbook
  • Big Data.” Data visualization. Large scale visualization. Text encoding. Analytics, Data mining. Unizin. Python, R in academia.
    I can introduce the students to the large idea of Big Data and its importance in lieu of the upcoming IoT, but also departmentalize its importance for academia, business, etc. From infographics to heavy duty visualization (Primo X-Services API. JSON, Flask).
  • NetNeutrality, Digital Darwinism, Internet economy and the role of your professional in such environment
    I can introduce students to the issues, if not familiar and / or lead a discussion on a rather controversial topic
  • Digital assessment. Digital Assessment literacy.
    I can introduce students to tools, how to evaluate and select tools and their pedagogical implications
  • Wikipedia
    a hands-on exercise on working with Wikipedia. After the session, students will be able to create Wikipedia entries thus knowing intimately the process of Wikipedia and its information.
  • Effective presentations. Tools, methods, concepts and theories (cognitive load). Presentations in the era of VR, AR and mixed reality. Unity.
    I can facilitate a discussion among experts (your students) on selection of tools and their didactically sound use to convey information. I can supplement the discussion with my own findings and conclusions.
  • eConferencing. Tools and methods
    I can facilitate a discussion among your students on selection of tools and comparison. Discussion about the their future and their place in an increasing online learning environment
  • Digital Storytelling. Immersive Storytelling. The Moth. Twine. Transmedia Storytelling
    I am teaching a LIB 490/590 Digital Storytelling class. I can adapt any information from that class to the use of IM students
  • VR, AR, Mixed Reality.
    besides Mark Gill, I can facilitate a discussion, which goes beyond hardware and brands, but expand on the implications for academia and corporate education / world
  • IoT , Arduino, Raspberry PI. Industry 4.0
  • Instructional design. ID2ID
    I can facilitate a discussion based on the Educause suggestions about the profession’s development
  • Microcredentialing in academia and corporate world. Blockchain
  • IT in K12. How to evaluate; prioritize; select. obsolete trends in 21 century schools. K12 mobile learning
  • Podcasting: past, present, future. Beautiful Audio Editor.
    a definition of podcasting and delineation of similar activities; advantages and disadvantages.
  • Digital, Blended (Hybrid), Online teaching and learning: facilitation. Methods and techniques. Proctoring. Online students’ expectations. Faculty support. Asynch. Blended Synchronous Learning Environment
  • Gender, race and age in education. Digital divide. Xennials, Millennials and Gen Z. generational approach to teaching and learning. Young vs old Millennials. Millennial employees.
  • Privacy, [cyber]security, surveillance. K12 cyberincidents. Hackers.
  • Gaming and gamification. Appsmashing. Gradecraft
  • Lecture capture, course capture.
  • Bibliometrics, altmetrics
  • Technology and cheating, academic dishonest, plagiarism, copyright.

IT issues in 2018

EDUCAUSE: The top 10 IT issues in 2018

BY MERIS STANSBURY November 6th, 2017 https://www.ecampusnews.com/campus-administration/educause-top-10-issues-2018/

Security once again tops the list of EDUCAUSE’s Top 10 IT Issues in higher education. A focus on student success and programming becomes prominent.

 the 2017 issues here.

The Top 10 IT issues for 2018

1. Information security: Developing a risk-based security strategy that keeps pace with security threats and challenges.

2. Student success: Managing the system implementations and integrations that support multiple student success initiatives.

3. Institution-wide IT strategy: Repositioning or reinforcing the role of IT leadership as an integral strategic partner of institutional leadership in achieving institutions missions.

4. Data-enabled institutional culture: Using BI and analytics to inform the broad conversation and answer big questions.

5. Student-centered institution: Understanding and advancing technology’s role in defining the student experience on campus (from applicants to alumni).

6. Higher education affordability: Balancing and rightsizing IT priorities and budget to support IT-enabled institutional efficiencies and innovations in the context if institutional funding realities.

7. IT staffing and organizational models: Ensuring adequate staffing capacity and staff retention in the face of retirements, new sourcing models, growing external competition, rising salaries, and the demands of technology initiatives on both IT and non-IT staff.

8. (tie) Data management and governance: Implementing effective institutional data governance practices.

9. (tie) Digital integrations: Ensuring system interoperability, scalability, and extensibility, as well as data integrity, standards, and governance, across multiple applications and platforms.

10. Change leadership: Helping institutional constituents (including the IT staff) adapt to the increasing pace of technology change.

++++++++++++
more on EdUCause in this IMS blog
https://blog.stcloudstate.edu/ims?s=educause

1 11 12 13 14 15 21