Shopping Scams
Jen A. Miller warns about shopping scams such as phishing attacks, point-of-sale data captures, and USB malware.
-DDInformation Sources & Information Sifting Techniques
I am a retired librarian, most recently serving at Indiana Wesleyan University's Cleveland Education Center.
Jen A. Miller warns about shopping scams such as phishing attacks, point-of-sale data captures, and USB malware.
-DDMark Gibbs reviews a productivity app named Simplenote , which allows the easy sharing of lists.
-DDLabels: mobile apps, Simplenote
Tim Hornyak reveals that Google is using data from vessel transponders to document over fishing in remote areas of the world.
-DDLabels: over fishing, transponder data
Gary Marcus, Adam Marblestone, and Jeremy Freeman suggest how to study the brain . They call for a massive data analysis project to determine the structure and processes the brain uses to function.
-DDLabels: brain, Neuroscience
Rebecca Koenig muses whether Education majors receive too many A's . The comments reflect concerns about academic rigor in all fields, and not just teaching.
-DDLabels: Academic rigor, Teacher training
Robert Talbert explains how he makes streaming video screencasts , screen captures of his presentation with audio background.
-DDLabels: educational video, video editing
Jeremy Kirk says a security team has discovered a potential flaw in contactless credit cards . There is a potential for thieves to stand or sit with a hidden data reader, harvest the data of passer-bys, and conduct transactions. This theft scheme will not work if a PIN is required for all transactions.
-DDLabels: Contactless credit card, data security
Peter Thibodeau notes that vendor consolidation is raising costs and eliminating flexibility. He cites statistics that the development of near-monopolies is raising the cost of software for some industries by ten percent or more. Thibodeau observes that as the competition dwindles, the remaining industry giants feel less need to innovate or provide custom work. He provides tips for minimizing the impact of industry consolidation, including negotiating contract renewals long before they lapse.
-DDLabels: Contract negotiation, Industry consolidation, Vendors
Taylor Armerding reviews some of the issues that arise with monitoring student Internet use. Armerding cites a report by Jules Polonetsky and Joseph Jerome entitled Student Data: Trust, Transparency and the Right of Consent which addresses "Human Monitoring Services" such as Gaggle. Armerding provides information on proposed governmental regulation of educational institutions to restrict the collection and distribution of data about student technology use.
-DDLabels: education, FERPA, Network monitoring, privacy, Public schools
Tom Harbert reports on the rising number of employees bringing devices with NSFW images to the workplace. These employees do not realize that all of the images being viewed by a device on the network can potentially be viewed (and traced) by the network administrator. Harbert discusses current IT practices and touches on legal liability for the corporation.
-DDLabels: BYOD, Inappropriate Internet use, Pornography
The Electronic Frontier Foundation has released a scorecard rating the security of messaging apps against seven criteria. All of the popular apps, such as AIM, YahooChat, etc., failed at least one criteria.
-DDLabels: chat, cyber security
Juan Carlos Perez notes that Microsoft and Dropbox are coordinating development of new services to users.
-DDLabels: Dropbox, Microsoft Office
Ms. Smith shares choice comments on Federal legislation which would allow Federal agencies to install "backdoor" software on computer devices.
-DDLabels: security
Alex Bakman notes that hiring mobile app development typically costs $50,000 for initial deployment and similar amounts during a two year improvement cycle (until the next refresh). He proposes that people develop apps in-house using visual development tools.
-DDLabels: mobile apps, mobile development
Andy Petrizio warns about the security implications of smart televisions . He notes that smart devices send audio streams to third parties for interpretation, with the result you cannot hold a private conversation in front of a smart device.
-DDLabels: privacy, smart phones, smart television
Paul Basken reports on financial awards to projects analyzing medical data . The researchers desire to find evidence for new therapies or probabilities resulting from various treatment decisions.
-DDGeoffery Pullum and Guillaume Thierry debate whether the breadth of vocabulary imports perception to the speaker.
-DD
Labels: Vocabulary
Allyson Lewis recommends 77 books and 5 reading strategies . While I do not agree with all of Lewis' recommendations, I believe a list that gets people to read and think critically is of value.
-DDLabels: Book recommendations, reading
Brian Mathews interviewed another faculty member at Virginia Tech about his use of Google Glass and his intention to use Google folders to establish residual learning communities . He quotes Ralph Hall on the concept of residual learning communities:
My vision is that once a student takes my course, she/he never leaves. It may take a while for the concept to take root, but I believe that students will like the idea of having a lifelong intellectual connection to their university. As they progress through their professional careers, my hope is that they re-engage with the course when they have something to contribute. This is actually a key point, students can disengage and re-engage by simply deciding whether to open a folder on their computer or look at what’s happening on the Google+ community. (Ralph Hall, 2014)My thought is that lifelong mentors have been a reality in academic careers for thousands of years, so this concept involves new technology enabling distance relationships. -DD
Labels: Google Glass, Lifelong learning, Residual learning