Knowledge Handler

Information Sources & Information Sifting Techniques

My Photo
Name:
Location: Independence, Ohio, United States

Librarian at Indiana Wesleyan University's Cleveland Education Center.

Wednesday, February 28, 2018

External Drives

Gordon Mah Ung provides criteria for evaluating external drive technology , and recommends USB drives that are currently on the market.

-DD

Labels: , ,

Tuesday, February 27, 2018

Education Deserts

Urban Wire reports that three million Americans are disconnected from higher education opportunities.

-DD

Labels: ,

Monday, February 26, 2018

HTTPS Required

Gregg Keizer reports that Google Chrome may begin marking all unencrypted sites as insecure after June 30, 2018.

-DD

Labels: , ,

Sunday, February 25, 2018

Email Security Protocols

David Strom explains three email protocols for keeping an enterprise email server secure: DMARC, SPF, and DKIM .

-DD

Labels: , , , , ,

Saturday, February 24, 2018

"Card Not Present" Theft

VISA offers a booklet on the threat of card not present transactions - transactions which are not protected by security chips.

-DD



Labels:

Friday, February 23, 2018

Microsoft Academic Database

Microsoft Academic is a database with a collection of scholarly STEM articles. This provides a limited set of research literature to those without access to commercial databases. Microsoft Word 2016 has a link to Microsoft Academic, making it a convenient resource to those students who just require a few articles to construct a paper.

-DD

Labels: ,

Thursday, February 22, 2018

Academic Libraries of the Future

Patrick Cain shares notes from a brainstorming session on the academic library in the 21st century .

-DD

Labels: ,

Windows 10 Security Updates

Susan Bradley reviews new Windows 10 security features .

-DD

Labels: , ,

Wednesday, February 21, 2018

Word 2016 Overview and Shortcuts

Preston Gralla provides an overview of the new features found in Word 2016 , including research tools and collaborative tools.

-DD

Labels: , , ,

Tuesday, February 20, 2018

Smishing and Phishing

Rhea Kelly exposes the "click rates" of those exposed to phishing attacks in education and retail. She also defines "smishing", attacks using SMS technology.

-DD

Labels: ,

Accommodating Faith on Campus

Anayat Durrani writes about efforts of global universities to accommodate a variety of faiths .

-DD

Labels: ,

Monday, February 19, 2018

WikiTribune

Jimmy Wales, the founder of Wikipedia, has created WikiTribune , a crowd-sourced platform for reporting news.

-DD

Labels:

Sunday, February 18, 2018

Chrome Remote Desktop

J. R. Raphael shares a video about Chrome Remote Desktop .

-DD

Labels: ,

Saturday, February 17, 2018

Chrome Extensions for Business

Howard Wen writes about eight Chrome extensions that have a business case.

-DD

Labels: ,

Friday, February 16, 2018

Cryptocurrency Implications

Lucas Mearian considers the implications of government adoptation of cryptocurrency .

-DD

Labels:

Thursday, February 15, 2018

Travel Apps

John Brandon and Howard Wen recommend ten apps for business travelers.

-DD

Labels: , ,

Wednesday, February 14, 2018

Romance Scams

Roger Grimes talks about the prevalence of scams on dating sites, and how to counsel a person embroiled in a scam.

-DD

Labels:

Microsoft Office Versions Explained

Gregg Keizer explains the differences between the various versions of Microsoft Office : Office 365 and Office 2016. He approaches this from a corporate prospective: for those who qualify for Academic pricing, this page explains the pricing and download rights.

-DD

Note that "Office Online" does not allow the display of "track changes" or other "comments" by instructors or colleagues.

Labels:

Tuesday, February 13, 2018

Faculty Workload

Julian Wyllie interviewed John Ziker about his research into faculty workloads and workweeks.

-DD

Labels: ,

Mobile Apps and Student Retention

Shalina Chatlani suggests that a quality mobile app enhances student retention.

-DD

Labels: ,

Monday, February 12, 2018

Facebook Patents Social Class Algorithm

Violet Blue warns that Facebook has patented an algorithm which predicts an individual's social class . Blue inidicates this technology would allow banks and other marketers to "target the lower class, the working class -- which are often people of color, too -- because data shows poor people (those least in a position to take high-interest loans) are more likely than the general population to be so desperate that they'll take on a bad loan."

-DD

Labels: , , , ,

Sunday, February 11, 2018

Addictive Apps

Peter Sayer calls attention to a campaign to keep children from being hooked on addictive apps .

-DD

Labels: ,

Saturday, February 10, 2018

Access Control

James Martin reviews the need for access control in any corporate network serving employees restricted information.

-DD

Labels:

Friday, February 09, 2018

Speech Recognition

Both Google and Microsoft are researching speech recognition.

-DD

Labels: , ,

Thursday, February 08, 2018

Windows Retirement Dates

Gregg Keizer provides a calendar of Windows update and retirement dates . Once support ends for an operating system, apps cease to be written to work with it, as assistance from Microsoft is not available to software developers.

-DD

Labels:

Wednesday, February 07, 2018

Using Cortana

Matt Kapco explains how Microsoft's Cortana may be useful for productivity and research. Kapco notes that:

In late 2017, Microsoft added more accessibility features. It can now read an overview of new emails or read high-priority emails from specific people and allow the recipient to dictate replies by voice. Cortana can also help users find the best time for a meeting with someone in their company – all using voice commands.
Cortana’s other core features include making lists, pulling helpful information from LinkedIn like the professional backgrounds and company details for participants in an upcoming meeting, and creating a leisure planner that tracks upcoming travel reservations and recommends activities.

-DD

Labels:

ATM Theft

Samuel Burke of CNN conducts a video interview with U.S. Secret Service Agent Matthew O'Neill about ATM thieves which hack ATMs. The hackers disguise themselves as repair technicians to conduct their theft.

-DD

Labels: ,

Tuesday, February 06, 2018

Majestic Indexes

Chloe of Majestic reviews the two Web indexes the firm maintains: a "fresh index" of recently crawled sites, and an historic index dating back five years.

-DD

Labels: ,

Monday, February 05, 2018

Training and Employment

Heather Kelly interviews Google's Eric Schmidt about the future of employment in developed economies.

-DD

Labels: , ,

Sunday, February 04, 2018

Apple Mac

Johnny Evans gives 40 tips to improve productivity with an Apple Macintosh computer.

-DD

Labels: ,

Saturday, February 03, 2018

Android Video Instruction

ComputerWorld has 10 videos in its Android Intelligence video blog series, which shows how to use a Android phone.

-DD

Labels: ,

Friday, February 02, 2018

Microsoft Data Collection in Windows 10

Gregg Keizer notes that Microsoft is revealing the breadth of its data collection done in Windows 10.

-DD

Labels: ,

Google Uses Blue as Link Color

Barry Schwartz observes that Google continues to use blue as the color designating links.

It makes sense to me. The color blue has been associated with links for decades.

-DD

Labels:

Thursday, February 01, 2018

Chromebook Productivity Tips

J. R. Raphael suggests 40 tips for using a Chromebook productively.

-DD

Labels: ,