Enabling users to bring their own devices into the workplace BYOD presents an opportunity to use modern consumer technology to work and study more effectively and more safely.
This workshop explored ways to move from current practice to a positive adoption of BYOD.
Risk management is a powerful tool in decision making. Delegates heard about how Jisc is approaching information security risk management and how the lessons learnt in implementing flexible, robust and effective processes can help your everyday work.
Remote conferencing and collaboration: Vscene - Jisc Digital Festival 2015Jisc
Remote conferencing and collaboration is a key asset to your business and is increasingly becoming embedded in teaching and learning. This session showed how simple it is to videoconference with Vscene and the cost savings and improved productivity it offers for IT staff and Vscene users.
Get involved with codesign - Jisc Digital Festival 2015Jisc
This session gave an overview of the 5 challenges that Jisc is addressing via research and development effort.
It covered what the challenges are, and how you can get involved in developing solutions to address these.
Internet safety - how Jisc is helping providers to stay safe online - Jisc Di...Jisc
Online safety is an important consideration for everyone who engages with digital technology, this session, was an opportunity to hear about how Jisc has been helping providers in the sector to stay safe online. Delegates left the session knowing what resources are available and will have the opportunity to feed in ideas on what Jisc can do next to support the internet safety initiative.
Harnessing the power of indoor positioning technology - Jisc Digital Festival...Jisc
This surgery explored how indoor positioning technology or location based services – a rapidly emerging mainstream mobile technology – can improve student experience and organisational efficiencies.
Showcasing uk teaching resources: Jorum - Jisc Digital Festival 2015Jisc
This session will provide an overview of the UK's largest open educational resources repository Jorum and its new website. A demonstration will highlight new features, collections and content as well as an insight into upcoming developments.
The cost of curation - Jisc Digital Festival 2015Jisc
How to get to grips with understanding your digital curation and preservation costs using the curation costs tool on the Curation Costs Exchange - a community-owned platform which helps organisations of any kind assess the costs of curation practices through comparison and analysis.
Maximised discovery of institutions digital collections - Jisc Digital Festiv...Jisc
This workshop discussed a number of services and tools that Jisc is developing to support institutions boost the discoverability of their digital collections.
Risk management is a powerful tool in decision making. Delegates heard about how Jisc is approaching information security risk management and how the lessons learnt in implementing flexible, robust and effective processes can help your everyday work.
Remote conferencing and collaboration: Vscene - Jisc Digital Festival 2015Jisc
Remote conferencing and collaboration is a key asset to your business and is increasingly becoming embedded in teaching and learning. This session showed how simple it is to videoconference with Vscene and the cost savings and improved productivity it offers for IT staff and Vscene users.
Get involved with codesign - Jisc Digital Festival 2015Jisc
This session gave an overview of the 5 challenges that Jisc is addressing via research and development effort.
It covered what the challenges are, and how you can get involved in developing solutions to address these.
Internet safety - how Jisc is helping providers to stay safe online - Jisc Di...Jisc
Online safety is an important consideration for everyone who engages with digital technology, this session, was an opportunity to hear about how Jisc has been helping providers in the sector to stay safe online. Delegates left the session knowing what resources are available and will have the opportunity to feed in ideas on what Jisc can do next to support the internet safety initiative.
Harnessing the power of indoor positioning technology - Jisc Digital Festival...Jisc
This surgery explored how indoor positioning technology or location based services – a rapidly emerging mainstream mobile technology – can improve student experience and organisational efficiencies.
Showcasing uk teaching resources: Jorum - Jisc Digital Festival 2015Jisc
This session will provide an overview of the UK's largest open educational resources repository Jorum and its new website. A demonstration will highlight new features, collections and content as well as an insight into upcoming developments.
The cost of curation - Jisc Digital Festival 2015Jisc
How to get to grips with understanding your digital curation and preservation costs using the curation costs tool on the Curation Costs Exchange - a community-owned platform which helps organisations of any kind assess the costs of curation practices through comparison and analysis.
Maximised discovery of institutions digital collections - Jisc Digital Festiv...Jisc
This workshop discussed a number of services and tools that Jisc is developing to support institutions boost the discoverability of their digital collections.
Telephony is changing - is your institution ready? - Jisc Digital Festival 2015 Jisc
How you can improve your users’ experience now and in the future, and how you can really save your institution money. Learn about how other institutions have made informed purchasing decisions and how much they have saved in the process.
Finding, managing, delivering and using the right MediaHub content - Jisc Dig...Jisc
Using Jisc Digital Media advice guides, this session used content from the Jisc MediaHub resource to demonstrate effective processes for finding, managing and using copyright cleared multimedia materials to support teaching and learning.
Open access: changes in the global research market - Jisc Digital Festival 2015Jisc
All outputs of research funded under the European Commission’s Horizon 2020 and the European Research Council will be made open access. As more UK researchers collaborate in EU-funded projects, it’s crucial that they stay informed.
This session aimed to demonstrate Jisc’s leadership in the area of EU open access developments and help delegates ensure compliance with EU policies.
Electronic management of assessment - Jisc Digital Media 2015Jisc
This session provided an opportunity to hear the findings from a landscape review, engage with the challenges, and engage actively in the shaping of solutions.
Jisc geospatial services: enabling research across disciplines - Jisc Digital...Jisc
This demonstration follows a researcher’s journey through Jisc’s geospatial services from collecting raw data, through to creating new digital information, discovering datasets and plotting and analysing data to creating engaging and revealing visualisations and maps.
Total cost of ownership: reducing the cost of gold open access - Jisc Digital...Jisc
Learn how Jisc Collections is addressing the cost UK higher education institutions face in maintaining subscriptions and also paying for article processing charges to the same publishers for the same journals.
The continued development of 3D technologies has enabled more affordable and accessible use in a wide range of teaching and research disciplines.
This workshop gave delegates a better understanding of how using 3D technologies can benefit education and research.
Vscene is a video conferencing service from Jisc that allows for both scheduled conferences and virtual meeting rooms. It has replaced Jisc's previous JanetVideoconference Service and offers improvements like a more intuitive interface, browser access, mobile apps, and integrated telephone access, recording, and streaming capabilities. Vscene is used across UK education and research for a variety of purposes, including tutorials, lectures, international collaboration, and expert contributions. It has provided significant cost savings compared to travel while also reducing carbon emissions.
Improving buy-in through a frictionless framework - Jisc Digital Festival 2015Jisc
This surgery explored why the adoption of e-learning is successful in some organisations and patchy in others. It will draw on experiences of organisational reviews carried out by former RSCs as evidence.
Embedding collaborative and mobile technologies - Jisc Digital Festival 2015Jisc
An informative workshop showcasing how tutors use collaborative and mobile technologies with SEN learners to promote independence, increase learner engagement and motivation within theory and practical sessions.
Student expectations of entering higher education - Jisc Digital Festival 2015Jisc
What do your incoming students’ expect from your institution’s digital environment? This panel discussion explored the tensions between institutional and personal learning practices of students as they transition from school to college or university.
Using jisc's JUSP and CCM services effectively to manage resources - Jisc Dig...Jisc
This session discussed the very real, practical benefits gained from using Jisc services (JUSP, Copac Collections Management/CCM) in enabling more effective and efficient collection management activity to take place in higher education institutions.
Staff-student partnership working to effect institutional change - Jisc Digit...Jisc
This document summarizes a presentation on staff-student partnerships working to enact institutional change. It discusses the vision of empowering students as active participants rather than mere consumers. Examples are provided of partnerships at various universities, including student fellows schemes and "Digipals" programs. The Change Agents' Network supports students as agents of technology-related change through events, resources, and a student partnership toolkit.
How to equip researchers in managing data - JIsc Digital Festival 2015Jisc
This demonstration will encourage information professionals, librarians and research support staff to become familiar with online training materials and methods to support researchers in achieving research data management best practice.
Helping you shape infrastructure to implement open access efficientlyJisc
This session focused on two projects Jisc monitor and Jisc publications router that will develop prototype solutions and other outputs that point to ways to radically reduce the administrative burden of implementing open access.
Transnational education: conversations for success - Jisc Digital Festival 2015Jisc
Transnational education (TNE), or the provision of education qualifications from institutions in one country to students in another, plays an essential role in the delivery of international strategy in UK educational institutions.
Recent reports from BIS, HEFCE and Jisc highlight the exciting opportunities and expected growth of TNE. Dr Esther Wilkinson explains why technology is so important, what our research shows and what we are doing to support the TNE agenda.
Open access - a guide to Jisc's evolving offer to universities - Jisc Digital...Jisc
Universities are implementing open access to research publications, partly in response to policies from the UK funding and research councils.
This aims to provide the “big picture” of how Jisc is supporting universities in this challenge, both now and into the future.
Mobile learning in practice - Jisc Digital Festival 2015Jisc
Want to optimise your students' learning experience through mobile technology? This workshop stimulated thinking and discussion around integration of mobile apps into teaching practice by showcasing further and higher education case studies and providing practical guidance and hands-on activities.
Building an international infrastructure for research data - Jisc Digital Fes...Jisc
Research data infrastructures exist at the national and international level and with the increasing amount of international research collaboration it is crucial that these are joined up.
This session showcased collaborative work that Jisc and its partners are undertaking to create a pan-European e-infrastructure solution through the EC funded EUDAT project.
SURFSara outlined the approach to research data infrastructure in the Netherlands alongside Jisc's approach for a UK infrastructure.
Connect More with peers in practice - Connect More 2017 BirminghamJisc
These PechaKucha style presentations (20 slides at 20 seconds each) from attendees at the event will focus on how they have implemented digital capabilities to enhance learning and teaching at their institutions.
With contributions from
Alicia Wallace, digital learning manager, Gloucestershire College
Joseph Hibbert, special educational needs and disabilities (SEND) transition lead, Gloucestershire College
Mark McManus, cloud services business manager, Microsoft
Christine Fenton, international student employability and enterprise support, University of Warwick
What does a digitally capable institution look like - Jisc Digital Festival 2015Jisc
Effective use of digital technology by university and college staff is vital in providing a compelling student experience and in realising a good return on investment in digital technology.
This workshop aimed to help delegates understand the key capabilities needed in the digital institution and help you to develop approaches and tools to support their development.
What the learners say: FE learners' expectations and experiences of technolog...Jisc
Is your college meeting your learners’ needs and expectations in relation to technology? This workshop shares current practice from providers who are engaging learners as active participants in the development of digital practices and strategies and will help equip you to develop best practice in your own college.
Telephony is changing - is your institution ready? - Jisc Digital Festival 2015 Jisc
How you can improve your users’ experience now and in the future, and how you can really save your institution money. Learn about how other institutions have made informed purchasing decisions and how much they have saved in the process.
Finding, managing, delivering and using the right MediaHub content - Jisc Dig...Jisc
Using Jisc Digital Media advice guides, this session used content from the Jisc MediaHub resource to demonstrate effective processes for finding, managing and using copyright cleared multimedia materials to support teaching and learning.
Open access: changes in the global research market - Jisc Digital Festival 2015Jisc
All outputs of research funded under the European Commission’s Horizon 2020 and the European Research Council will be made open access. As more UK researchers collaborate in EU-funded projects, it’s crucial that they stay informed.
This session aimed to demonstrate Jisc’s leadership in the area of EU open access developments and help delegates ensure compliance with EU policies.
Electronic management of assessment - Jisc Digital Media 2015Jisc
This session provided an opportunity to hear the findings from a landscape review, engage with the challenges, and engage actively in the shaping of solutions.
Jisc geospatial services: enabling research across disciplines - Jisc Digital...Jisc
This demonstration follows a researcher’s journey through Jisc’s geospatial services from collecting raw data, through to creating new digital information, discovering datasets and plotting and analysing data to creating engaging and revealing visualisations and maps.
Total cost of ownership: reducing the cost of gold open access - Jisc Digital...Jisc
Learn how Jisc Collections is addressing the cost UK higher education institutions face in maintaining subscriptions and also paying for article processing charges to the same publishers for the same journals.
The continued development of 3D technologies has enabled more affordable and accessible use in a wide range of teaching and research disciplines.
This workshop gave delegates a better understanding of how using 3D technologies can benefit education and research.
Vscene is a video conferencing service from Jisc that allows for both scheduled conferences and virtual meeting rooms. It has replaced Jisc's previous JanetVideoconference Service and offers improvements like a more intuitive interface, browser access, mobile apps, and integrated telephone access, recording, and streaming capabilities. Vscene is used across UK education and research for a variety of purposes, including tutorials, lectures, international collaboration, and expert contributions. It has provided significant cost savings compared to travel while also reducing carbon emissions.
Improving buy-in through a frictionless framework - Jisc Digital Festival 2015Jisc
This surgery explored why the adoption of e-learning is successful in some organisations and patchy in others. It will draw on experiences of organisational reviews carried out by former RSCs as evidence.
Embedding collaborative and mobile technologies - Jisc Digital Festival 2015Jisc
An informative workshop showcasing how tutors use collaborative and mobile technologies with SEN learners to promote independence, increase learner engagement and motivation within theory and practical sessions.
Student expectations of entering higher education - Jisc Digital Festival 2015Jisc
What do your incoming students’ expect from your institution’s digital environment? This panel discussion explored the tensions between institutional and personal learning practices of students as they transition from school to college or university.
Using jisc's JUSP and CCM services effectively to manage resources - Jisc Dig...Jisc
This session discussed the very real, practical benefits gained from using Jisc services (JUSP, Copac Collections Management/CCM) in enabling more effective and efficient collection management activity to take place in higher education institutions.
Staff-student partnership working to effect institutional change - Jisc Digit...Jisc
This document summarizes a presentation on staff-student partnerships working to enact institutional change. It discusses the vision of empowering students as active participants rather than mere consumers. Examples are provided of partnerships at various universities, including student fellows schemes and "Digipals" programs. The Change Agents' Network supports students as agents of technology-related change through events, resources, and a student partnership toolkit.
How to equip researchers in managing data - JIsc Digital Festival 2015Jisc
This demonstration will encourage information professionals, librarians and research support staff to become familiar with online training materials and methods to support researchers in achieving research data management best practice.
Helping you shape infrastructure to implement open access efficientlyJisc
This session focused on two projects Jisc monitor and Jisc publications router that will develop prototype solutions and other outputs that point to ways to radically reduce the administrative burden of implementing open access.
Transnational education: conversations for success - Jisc Digital Festival 2015Jisc
Transnational education (TNE), or the provision of education qualifications from institutions in one country to students in another, plays an essential role in the delivery of international strategy in UK educational institutions.
Recent reports from BIS, HEFCE and Jisc highlight the exciting opportunities and expected growth of TNE. Dr Esther Wilkinson explains why technology is so important, what our research shows and what we are doing to support the TNE agenda.
Open access - a guide to Jisc's evolving offer to universities - Jisc Digital...Jisc
Universities are implementing open access to research publications, partly in response to policies from the UK funding and research councils.
This aims to provide the “big picture” of how Jisc is supporting universities in this challenge, both now and into the future.
Mobile learning in practice - Jisc Digital Festival 2015Jisc
Want to optimise your students' learning experience through mobile technology? This workshop stimulated thinking and discussion around integration of mobile apps into teaching practice by showcasing further and higher education case studies and providing practical guidance and hands-on activities.
Building an international infrastructure for research data - Jisc Digital Fes...Jisc
Research data infrastructures exist at the national and international level and with the increasing amount of international research collaboration it is crucial that these are joined up.
This session showcased collaborative work that Jisc and its partners are undertaking to create a pan-European e-infrastructure solution through the EC funded EUDAT project.
SURFSara outlined the approach to research data infrastructure in the Netherlands alongside Jisc's approach for a UK infrastructure.
Connect More with peers in practice - Connect More 2017 BirminghamJisc
These PechaKucha style presentations (20 slides at 20 seconds each) from attendees at the event will focus on how they have implemented digital capabilities to enhance learning and teaching at their institutions.
With contributions from
Alicia Wallace, digital learning manager, Gloucestershire College
Joseph Hibbert, special educational needs and disabilities (SEND) transition lead, Gloucestershire College
Mark McManus, cloud services business manager, Microsoft
Christine Fenton, international student employability and enterprise support, University of Warwick
What does a digitally capable institution look like - Jisc Digital Festival 2015Jisc
Effective use of digital technology by university and college staff is vital in providing a compelling student experience and in realising a good return on investment in digital technology.
This workshop aimed to help delegates understand the key capabilities needed in the digital institution and help you to develop approaches and tools to support their development.
What the learners say: FE learners' expectations and experiences of technolog...Jisc
Is your college meeting your learners’ needs and expectations in relation to technology? This workshop shares current practice from providers who are engaging learners as active participants in the development of digital practices and strategies and will help equip you to develop best practice in your own college.
Thinking beyond me-portfolios Jisc Digital Festival 2015Jisc
This document discusses different types of portfolios and proposes embedding task portfolios into curriculum. It distinguishes between me-portfolios, which focus on the author, and task portfolios, which focus on activities. Task portfolios can benefit me-portfolios by providing context and opportunities for students to demonstrate learning through incremental tasks with feedback. The document advocates for portfolios that are personally customizable, task-based, and developed over time through evidence, reflections, and contributions from others in order to provide the richest evidence for me-portfolios.
This panel session discussed current practice, trends and challenges in the strategic use of technology-enhanced learning in higher education and includes key barriers and enablers to driving change in the student and staff experience.
This session will be streaming live.
Meeting the RDM challenge - exercise - Jisc Digital Festival 2014Jisc
The document discusses research data management (RDM) challenges and components needed for research data services. It notes that libraries are primarily responsible for providing support and leadership, while research offices and IT departments also play roles. The Digital Curation Centre (DCC) aims to build RDM capacity and skills across UK higher education through needs assessments, policy development, guidance, training, and advocacy to support institutions in implementing RDM.
Exploring co-design - Jisc's new approach to innovationJisc
Jisc has developed a new approach to innovation called co-design. This approach involves Jisc customers and stakeholders much more closely in every stage of the innovation process from deciding which issues and opportunities to address to managing projects and ensuring institutions benefit from outputs. Jisc piloted this approach during 2013 and this session will reflect on the pilot and the projects that were included. From 2014 onwards, all Jisc innovation work will be managed using co-design. This session will allow delegates to explore the co-design approach and help shape the themes that we will focus on this year.
Enabling mobile learning - Jisc Digital Festival 2014Jisc
Mobile learning is the “exploitation of ubiquitous handheld hardware, wireless networking and mobile telephony to facilitate, support, enhance and extend the reach of teaching and learning” (MoLeNET, quoted in Jisc infoNet’s Mobile Learning infoKit). This meta-workshop brings together Jisc’s advisory services to deliver a wide-ranging guide to best practice and pitfall avoidance to allow learners to work with the gadgets and platforms most suitable and accessible for their context.
Whether the context is learners using their own devices (that smartphone attached to their hand, that birthday present tablet), or, in some cases, institution-provided devices, there are technical, pedagogic and organisational challenges to providing the learners with a high-quality, seamless experience. This workshop will introduce the wide range of practical, relevant Jisc resources, services and tools enabling the delivery of versatile, expectation-meeting, fit for purpose mobile learning.
This session will introduce the relevant resources, distil the key issues, and outline best practice in respect to mobile learning. Jisc’s expertise has already considered issues in relation to strategy and relationship to institutional mission, pedagogy, curriculum design and delivery, learning resource issues, technical implementation, legal issues, accessibility and inclusion, and training needs.
An interactive and collaborative approach to staff development - Marion Mille...Jisc
It can be a challenge to provide engaging and interactive staff development that equips staff with the skills they need to contextualise and apply technology in their own teaching. The challenge is even greater when you need to change attitudes towards technology and encourage team working.
This will demonstrate a ‘Roadshow’ approach and how this has made a major impact within Learning Providers. Armed with a variety of mobile technologies for participants to explore, the Roadshow provides interactive training with an emphasis on collaborative scenario based activities, aimed at teachers and trainers. Participants are encouraged to chose a scenario or invent their own scenario, taking into consideration a particular student/group that they teach. They then use the technology to create a resource they then ‘sell’ the idea to the whole group.
Jisc Monitor workshop - Jo Lambert and Brian Mitchell - Jisc Digital Festival...Jisc
The Jisc APC pilot project aimed to respond to a changing global Open Access (OA) landscape by exploring key issues around the management of article processing charges. By bringing together representatives from academic institutions, publishers, funders and intermediaries, the project explored different approaches to managing Article Processing Charges (APCs) and investigated opportunities for achieving greater efficiencies.
The project indicated that Open Access publishing activity must be considered in its entirety to deliver maximum efficiencies within an institutional context. Following the pilot project, Jisc OA Monitor aims to provide a shared service enabling institutions to collate, analyse and report on all of its Open Access publishing activities and outputs (Green and Gold) both internally and to its funders. The service will offer institutions an insight into their degree of compliance with funder mandates and encourage international co-operation to assist in the development of processes, systems and standards that facilitates the sharing and exchange of relevant information between institutional, publisher and vendor systems.
An overview of Jisc OA Monitor outlining its core components. Community engagement and co-design is a key aspect of Jisc OA Monitor and the workshop will enable participants to contribute ideas to inform development of this new service.
Wikipedia: a platform for learners as producers #W03 - Dr Martin Poulter - Ji...Jisc
“Looking under the bonnet” of Wikipedia's open publication process is a chance to promote an informed, appropriately critical understanding of the free encyclopaedia that learners are already using ubiquitously. Discussing and challenging Wikipedia policies could support the teaching of general information literacy at any level. When learners improve or review Wikipedia articles, this involves them in defining established knowledge in their subjects.
To date, more than 500 course leaders in universities have set assignments in which students improve Wikipedia articles for course credit. In some areas such as psychology, management or politics, a large proportion of Wikipedia’s quality content has been produced by learners. In turn, the learners get to experience publication and review, where they are expected to read, analyse, write, and reference to a high standard.
According to the Wikimedia Foundation, a great majority of students surveyed say they prefer Wikipedia assignments to traditional assignments, and find writing for a global audience motivating. On the negative side, writing for the public can be daunting, Wikipedia’s encyclopaedic style can be hard to adjust to, and Wikipedian feedback can be blunt. So a Wikipedia assignment cannot be wandered into. It needs advance planning and careful monitoring.
This document summarizes a workshop on authority files. It discusses how authority files can transform from library silos to a web of linked data by uniquely identifying entities like people, publications, organizations, and connecting them using identifiers. Four use cases are presented: developing a repository authority file, enhancing a journal authority file to track open access evolution, integrating existing authority files to make cultural data web compliant, and using authority files to enable new analyses and business intelligence from research information systems. The benefits of authority files for discovery, reliability, accountability, and efficiency are outlined. An example of crosswalking different authority files is also provided. The document concludes with an opinion poll on authority file topics.
The University of Sheffield and University of Nottingham Research Data Manage...Jisc
The University of Sheffield and University of Nottingham have undertaken several research data management activities and initiatives. Both universities received Jisc funding to advance their RDM capabilities between 2011-2013. They have established RDM steering groups, conducted user needs assessments, provided training to staff and researchers, and face ongoing challenges around ownership, engagement, sustainability and treating data as a research output.
Meeting the Research Data Management Challenge - Rachel Bruce, Kevin Ashley, ...Jisc
Universities and researchers need to be able to manage research data effectively to fulfil research funders requirements and ultimately to contribute to research excellence. UK universities are comparatively well advanced in what is a global challenge, but none the less there needs to be further advances in university policy, technical and support services. This session will share best practice in research data management and information about key tools that can help to develop university solutions; and it will also inform participants about the latest Jisc initiatives to help build university research data services and shared services.
Crossing the threshold: moving e-portfolios into the mainstream - Jisc Digita...Jisc
Since 2002 Jisc has been exploring the use of e-portfolio processes, pedagogies, tools and technologies in a range of learning contexts. Here in this workshop we will showcase the findings and key resources from this body of work, with a focus on the results of Jisc-funded research into e-portfolio implementation at scale, including the ‘threshold concept’ model of e-portfolio implementation, and findings of a subsequent study exploring the critical success factors for implementation.
A range of resources will be shared for participants to engage with, including the ‘e-Portfolio Implementation Toolkit’, which aims to enable others to understand issues around implementation and identify case studies that are most relevant to a their contexts; and video case studies showcasing rich examples of practice. Experience from a recent implementation story using the toolkit will be shared.
Designing strategically aligned credentialing systems with open badges to eng...Jisc
Open badges are digital credentials that earners can display anywhere on the web. They are underpinned by an open accreditation infrastructure developed by Mozilla, which enables the issuing of open badges to recognise granular achievements gained through formal and informal learning opportunities and to capture attributes not picked up in formal qualifications, such as the individual qualities that could help a student stand out in the job market. This workshop will focus on effective open badge system development, introducing Mozilla and Jisc toolkits to support badge system design and a strategic approach to implementing open badges in a formal education context. The session will be led by Mozilla and Jisc, and will include tips, case studies and guidance on best practice in badge system design. Participants will gain hands-on experience with tools they can use for developing open badge systems for motivating learning, supporting engagement and progression and enhancing employability.
How to get your institution ready for open access monographs - Ellen Collins ...Jisc
How ready is your institution for Open Access (OA) monographs? Although excluded from REF2020, there is no doubt that they will be included in the future, indeed you can already publish an OA monograph now. This session will first provide a brief introduction to the OA monograph landscape – what is happening, who is doing what, what models are being explored. It will then look at how institutions are responding to landscape and based on evidence collected through institutional case studies as part of the OAPEN-UK project, present tips for getting your institution ready for OA monographs.
The OAPEN-UK project, funded by AHRC and Jisc is exploring open access monograph publishing in the humanities and social sciences. The institutional case studies included in-depth interviews with Pro-Vice Chancellors of Research, Directors of Research, Grant administrators, Finance Directors, Librarians and Repository Staff and researchers themselves. The session will be presented by Ellen Collins, Research Officer for OAPEN-UK.
Digital storytelling for public engagement - Dr Caroline Ingram and Chris Tho...Jisc
Instinctively, when people have wanted to communicate complex ideas in a simple way, encourage others to take action or demonstrate the impact of something on the real world, we have turned to stories to help.
Away from our institutions we’re telling and absorbing stories all the time. But despite this fact it’s not something we do enough of as part of our practice.
Digital storytelling is an idea that has been around for a few years but remains underused in public engagement activities. Unlike full scale video production, digital storytelling refers to a variety of technologies and approaches that allow people without advanced digital media skills to create short pieces of engaging narrative-based video, usually relating a personal experience.
Digital storytelling has applications in many areas including working with community groups, showing evidence of impact and encouraging public engagement with research.
The session aims to inspire you to investigate how you can use this flexible and accessible approach to dramatically enhance how you communicate with diverse external audiences.
We will show some example stories, including one from a practitioner academic who works in the overlapping areas of education, academia and technology. As well as evaluating these stories you will have an opportunity to develop some ideas for how you could use the techniques and find out about some of the important technological aspects of digital storytelling.
Augmented reality: a way to engage and empower learners? - Judy Bloxham - Jis...Jisc
This document discusses augmented reality (AR) and its potential uses in education. It begins by defining AR and explaining its benefits, such as engaging and empowering learners. Examples are given of how AR is already being used in different subject areas like sports science, teacher training, and automotive courses. The document then provides activities and guidance for educators to consider how AR could be implemented in their own contexts. These include identifying relevant areas of the curriculum, potential learner benefits, and aligning AR initiatives with existing technology resources. Further information is provided on publications about immersive learning experiences with AR.
Bristol's Research Data Service - Debra Hiom - Jisc Digital Festival 2014Jisc
The Research Data Service at Bristol University aims to make research data support a regular service by August 2015. It currently operates as a pilot program with staff including a service manager, research data librarians, and a technical developer. The service offers guidance on data management plans, data storage, sharing, publication, and training. It provides researchers with 5TB of storage and tools for collaboration, deposition of published datasets, and a public catalogue. Priorities for the next year include promoting the service, establishing ongoing service levels, developing an institutional research data policy, and integrating the data repository with the university's research information system.
Developing digital literacies - Sarah Davies - Jisc Digital Festival 2014Jisc
This document summarizes a presentation on developing digital literacies. It discusses defining digital literacies as the capabilities needed for living, learning and working in a digital society. It addresses aspects of digital literacy like ICT literacy, information literacy, and digital identity and career management. It also discusses supporting the development of digital literacies for students, staff, and embedding digital activities in the curriculum. The document provides examples of barriers and enablers to digital literacy development for both students and staff.
Webinar on 4th Industrial Revolution, IoT and RPARedwan Ferdous
This is a summarized presentation on the 4th Industrial Revolution, the Internet of Things and Robotic Process Automation (RPA). especially for the undergrad students and recent graduates for getting an overview of the topics-based on global and local trends. Maximum contents are from online and those are cited with due respect at the end 3 slides.
The webinar was arranged by IEEE ISTT Student Branch, Bangladesh on 15th May 2020. The session was 2 hours long.
Note: Slide# 6 ~ 42 was taken from one of my earlier sessions, presented for the IEEE RU Student Branch. That slide can be found here: https://www.slideshare.net/RedwanFerdous/roadmap-to-4th-industrial-revolutioniot-iiot
The document discusses how digital disruption is accelerating change across all industries through the forces of the Internet of Everything/Things, modern consumers and employees. It summarizes the results of a study that ranked 12 industries based on their proximity to the "center" of this digital vortex. The study found that digital disruption could displace 40% of top incumbents within 3 years, yet only 32% of companies are actively transforming. It concludes that industries will split and recombine, and that any company that does not transform digitally risks being disrupted.
The document discusses trends in IT service management from past to present to future. In the past, there was no standardization, processes, virtualization, monitoring, automation or cloud capabilities. Currently, priorities include compliance, security, governance, big data and avoiding vendor lock-in. From an end user perspective, personal IT experiences now exceed enterprise IT. Looking ahead, innovation, mobility, analytics and cloud will drive new capabilities to make services fast, flexible and personalized. BMC Software helps CIOs address these trends through products that industrialize back-end operations and consumerize the front-end for users.
IoT and wearable make contextual computing a reality josephweiJoseph Wei
The document discusses contextual computing, which uses software and hardware to automatically collect and analyze data about a device's surroundings to present relevant information to users or take intelligent actions. It provides statistics showing consumers value benefits like health monitoring, safety, and ease of use from wearable technology. The rise of IoT and wearables is making contextual computing a reality. Future focuses may include more efficient use of resources through technologies like sensors, big data, and machine learning to drive innovation.
KLEMEN on INNOVATION Webster 20150611 FINALMichael Klemen
The document discusses innovation, creativity, and entrepreneurship. It covers various types of innovation including classical, "digical" combining digital and physical, and disruptive innovation. Emerging technologies like 3D printing, the Internet of Things, and digital platforms are discussed as enabling new forms of innovation. The presentation explores how trends like these technologies, new business models like network orchestrators, and global forces will shape our future.
The document is the programme for ISACA Ireland's 2015 conference on trust, security and agility.
The one-page programme provides an overview of the conference agenda, including keynote speakers, session tracks on assurance, cybersecurity, risk management, privacy, and application security/DevOps. It also lists speaker biographies and conference sponsors.
The two-page welcome letter thanks attendees for participating and emphasizes the conference theme of helping businesses prepare for tomorrow's challenges around evolving risks, disruptive technology, and maintaining trust and security in a dynamic environment.
The four-page thought leadership article discusses the need to incorporate an understanding of human psychology and behavior into cybersecurity strategies in order to better protect companies and customers
Digital Disruption - Artevelde University College Ghent - International week ...Ayman van Bregt
The internet has been around for 25 years and has caused many disruptions. With more disruptions to come, many organizations are seeking for ways to use digital opportunities in a meaningful way creating more value for customers and sustaining their business.
The impact of the development of the Web on marketing and communications and how it causes digital disruption for companies is shown in this talk. With practical examples you will get insights in how organizations can create more value for customers at the same time also the organization can benefit from these efforts. Several digital developments such as mobile, social and 'internet of things' will be presented. Besides the use of theoretical models for digital disruption and digital transformation, some case studies are presented which bring directly applicable tips to take home.
BMC Engage 2015: Optimizing Service Desk Interactions with Knowledge ManagementJon Stevens-Hall
BMC Engage presentation on Knowledge Management and Knowledge Centered Service, which also introduced some upcoming functionality to support KCS (delivered shortly afterwards in Smart IT).
Session: 101 Use Cases for IoT: "A Picture is Worth a 1000 Words"
Presenter: Jay Moodley, IOT Solutions Specialist, Eastern Canada
Date: October 6, 2015
Redefining Contract Manufacturing Through the Use of RoboticsLora Cecere
John Dulchinos, Vice President of Automation, Jabil Circuit
There were some cool humans at the Supply Chain Insights global summit and some cool robots too. John Dulchinos shared Jabil’s vision for digital manufacturing where robots help with the dirty and dull tasks in manufacturing sites that are specially-designed for robotics. The Jabil vision is a dispersed and automated manufacturing environment.
A presentation from the 2015 Supply Chain Insights Global Summit
Industry and academic partnerships july 2015 finalSteven Miller
The document discusses building skills to address the growing demand for data professionals through partnerships between IBM and academia, including providing free access to IBM's Bluemix platform and Watson cognitive services for students and faculty to develop skills in areas such as data science, data engineering, and data policy. It also outlines programs and competitions IBM sponsors to engage students in building data skills and foster collaboration between universities and IBM researchers.
The document discusses Internet of Things (IoT) and provides information on several topics related to IoT including:
- What IoT is and why it is reaching an inflection point due to factors like cheap hardware, widespread connectivity, and advances in technology.
- The importance of connecting assets and understanding IoT maturity phases from monitoring to autonomous operations.
- Benefits of IoT like increased efficiency, new products/revenue streams, and examples of smart parking and river monitoring.
- Key players in the IoT ecosystem and large market potential across various industries.
- How IoT can help with quantified self through tracking steps and life logging.
- An IoT platform called RIOT that provides features like device
The document discusses the Internet of Things (IoT) and its potential applications. It describes how technologies like cheap sensors, bandwidth, processing and ubiquitous wireless coverage have enabled the IoT. It then discusses how IoT can be used to monitor assets and connect devices in various environments like manufacturing, transportation, agriculture and more. Finally, it outlines steps to take an IoT journey and realize value from connecting devices and data.
Original article published on LinkedIn: http://bit.ly/1JTs2Rj
Why does it matter that a toaster can talk to the fridge?
Why should objects in your office know where you are, and when you might need them?
They may seem trite, but these are more than just philosophical questions. They are the meat of the matter when it comes to the Internet of Things (IoT). And as an innovator, I have to have answers to such questions from my peers in the marketing community, and I need to communicate who are the leaders in the field.
BMC Engage 2015: Smart IT, MyIT and the Power of the Service PlatformJon Stevens-Hall
The document is a presentation about digital service management given by Jon Hall of BMC Software. Some key points are:
- Expectations of customers and employees have changed and the old ways no longer work.
- To succeed at digital service innovation, companies need to focus on service innovation, personalize the customer experience, and simplify service delivery.
- BMC's suite of digital service management tools gives customers the power to innovate and transform their service through an intuitive user experience, intelligent discovery, open marketplace, and visual development tools.
The document summarizes several presentations on cybersecurity and the Internet of Things (IoT). It discusses the risks posed by IoT devices, including potential data breaches and network vulnerabilities. It provides examples of past IoT hacks, such as a 2014 incident where a Jeep's systems were remotely hacked. The document also outlines recommendations for securing IoT technologies, such as only collecting necessary data and maintaining strong access controls and encryption. Presenters emphasized that securing numerous diverse IoT devices poses major challenges that may require new security approaches from those used in traditional information technology.
The document discusses how Internet of Everything (IoE) and Internet of Things (IoT) technologies can be applied in the public sector. It provides examples of how cities like Chicago, Copenhagen, and San Antonio are using sensors and real-time data to improve services across different departments in a more efficient and cost-effective way compared to operating in silos previously. Challenges around data integration, privacy, and vendor lock-in are also addressed. Real-world use cases demonstrate billions in potential economic value from asset utilization, supply chain optimization, and improved citizen experiences through an IoE approach.
Business today is starting to understand the value of data, and some organisations are outperforming their competition by putting data at the heart of their thinking. Leveraging data to change business models, understand their customers and employees better and deliver new revenue streams is the driving force in this new data centric era.
Jon Woodward - MSFT
Dave Coplin - MSFT
Mike Bugembe - JustGiving
Gary Richardson - KPMG
Small Problems Vs Great Solutions Big Data Approach for Active & Passive Self...Dimitris Bountolos
The document discusses using big data and passive self-services to solve small problems for airline customers. It describes how Iberia Airlines uses data from various airport systems and customer touchpoints to improve processes like check-in, security, boarding and baggage handling. Sensors, mobile apps, notifications and digital signs provide customers information to reduce stress during their journey. While customers want full self-service, passive interventions help during transitions between steps. Iberia has seen benefits like shorter queues and faster response times by unifying data across airport stakeholders.
This document summarizes an Internet of Things workshop presented by Dr. Mazlan Abbas. The workshop agenda includes an introduction to IoT, applications of IoT, and smart cities. Technologies enabling IoT are discussed, such as cheap sensors, bandwidth, processing power and ubiquitous wireless coverage. Maturity phases and benefits of IoT are examined through examples. Common questions around asset monitoring are presented. Finally, considerations for starting an IoT solution like data ownership and value creation from data are reviewed.
Similar to From mobile device policy to bring your own device (BYOD) (20)
The document announces a community launch event for digital storytelling in January 2024. It discusses using digital storytelling in higher education to support learning and teaching. Examples include using digital stories for formative assessment, reflective exercises, and research dissemination across various disciplines. Feedback from students and staff who participated in digital storytelling workshops was very positive and found it to be transformative and help give voice to their experiences. The document also profiles speakers who will discuss using digital stories to explore difficult concepts, hear the student voice, and facilitate staff reflections. It emphasizes that digital storytelling can introduce humanity and creativity into pedagogy and help develop core skills. Attendees will participate in a Miro activity to discuss benefits, applications,
This document summarizes a Jisc strategy forum that took place in Northern Ireland on December 14, 2023. It outlines Jisc's planned services and initiatives for 2023-2024, including expanding network access and launching new cybersecurity, analytics, and equipment services. It discusses feedback received from further and higher education members on how Jisc can better deliver solutions, empower communities, and provide vision/strategy. Activities at the forum focused on understanding members' needs/challenges and discussing how Jisc can better support key priorities in Northern Ireland, such as affordable infrastructure, digital skills, and cybersecurity for FE and efficiency, student experience, and collaboration for HE.
This document summarizes a Jisc Scotland strategy forum that took place on December 12, 2023. It outlines Jisc's planned solutions and services for 2023-2024 including deploying resilient Janet access, IT health checks, online surveys, SD-WAN services, and more. The document discusses how Jisc engages stakeholders through relationship management, research, communities, training and events. It summarizes feedback from further education and higher education members on how Jisc can improve advocacy by delivering the right solutions, empowering communities, and having a clear vision and strategy. Finally, it outlines activities for the forum, including understanding members' needs and priorities and discussing how Jisc supports national priorities in Scotland.
The Jisc provided a strategic update to stakeholders. Key highlights included:
- Achievements from the last year like data collection and analysis following the HESA merger, digital transformation support, and cost savings from licensing deals.
- Customer testimonials from Bridgend College on extending eduroam and from the University of Northampton on curriculum design support from Jisc.
- Priorities for the coming year like connectivity upgrades, new cybersecurity services, and improved customer experience.
- A financial summary showing income sources like membership fees and expenditures on areas like connectivity and cybersecurity.
This document summarizes VirtualSpeech, a company that provides virtual reality (VR) and artificial intelligence (AI) powered professional development training. It offers over 150 online courses covering topics like public speaking, leadership, and sales. Users can practice skills in immersive VR scenarios and receive feedback from conversational AI. The training is used by over 450,000 individuals across 130 countries and 150 universities. VirtualSpeech aims to enhance traditional learning with interactive VR practice sessions and real-time feedback to boost skills retention.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
4. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 4
We like mobile computing
» Research and education aren’t
just office hours
5. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 5
We like mobile computing
» Research and education aren’t
just office hours
» Work wherever/whenever
inspiration strikes
6. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 6
We like mobile computing
» Research and education aren’t
just office hours
» Work wherever/whenever
inspiration strikes
» Increased productivity
7. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 7
We like mobile computing
» Research and education aren’t
just office hours
» Work wherever/whenever
inspiration strikes
» Increased productivity
» Happier users
8. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 8
We like mobile computing
» Research and education aren’t
just office hours
» Work wherever/whenever
inspiration strikes
» Increased productivity
» Happier users
» Could your organisation cope
without it?
9. Policies
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 9
How we secure it
» De jure: the things we write down
10. Policies
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 10
How we secure it
» De jure: the things we write down
» De facto: the things we do
› This sets policy: “email on any device”
11. So how do we secure mobile computing?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 11
AccessServer Device User
12. So how do we secure mobile computing?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 12
IMAP or
web or
VTTY or
none
AccessServer Device User
13. So how do we secure mobile computing?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 13
authentication
encryption
IMAP or
web or
VTTY or
none
AccessServer Device User
14. So how do we secure mobile computing?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 14
authentication
encryption
profiles
management
IMAP or
web or
VTTY or
none
AccessServer Device User
15. So how do we secure mobile computing?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 15
authentication
encryption
policies
guidance
support
profiles
management
IMAP or
web or
VTTY or
none
AccessServer Device User
16. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 16
What do you do?
Discuss around table for 10 mins
Fill in the columns
17. What’s the difference with BYOD?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 17
authentication
encryption
policies
guidance
support
profiles
management
IMAP or
web or
VTTY or
none
AccessServer Device User
18. What’s the difference with BYOD?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 18
authentication
encryption
policies
guidance
support
profiles
management
IMAP or
web or
VTTY or
none
AccessServer Device User
19. What’s the difference with BYOD?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 19
authentication
encryption
policies
guidance
support
profiles
management
IMAP or
web or
VTTY or
none
AccessServer Device User
20. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 20
What controls do you enforce on mobile devices?
21. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 21
» Passphrase, patches, anti-virus, firewall
» Encryption, remote wipe
» Safe downloading, account/directory
separation
» Thinking about where you are
What we’d like…
22. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 22
» Passphrase, patches, anti-virus, firewall
» Encryption, remote wipe
» Safe downloading, account/directory
separation
» Thinking about where you are
Feels like basic good practice…
What we’d like…
23. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 23
» Passphrase, patches, anti-virus, firewall
» Encryption, remote wipe
» Safe downloading, account/directory
separation
» Thinking about where you are
Feels like basic good practice…
Actually, it’s the ICO’s recommendations
for BYOD!
» Warns against MDM/tracking of
non-owned devices
What we’d like…
24. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 24
How to be safe without device management?
Already rely on users for some controls
25. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 25
How to be safe without device management?
Already rely on users for some controls
» Their behaviour may already be
biggest risk
26. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 26
How to be safe without device management?
Already rely on users for some controls
» Their behaviour may already be
biggest risk
» Especially if they have admin rights!
27. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 27
How to be safe without device management?
Already rely on users for some controls
Possibly move some controls to
server-side
» But tightening de facto policies on
existing services is a hard sell
28. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 28
How to be safe without device management?
Already rely on users for some controls
Possibly move some controls to
server-side
» But tightening de facto policies on
existing services is a hard sell
Or, encourage users to implement them
29. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 29
How to be safe without device management?
Already rely on users for some controls
Possibly move some controls to
server-side
» But tightening de facto policies on
existing services is a hard sell
Or, encourage users to implement them
» What do you lose with corporate
mobile?
30. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 30
How to be safe without device management?
Already rely on users for some controls
Possibly move some controls to
server-side
» But tightening de facto policies on
existing services is a hard sell
Or, encourage users to implement them
» What do you lose with corporate
mobile?
» What do you lose with BYOD?
32. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 32
Self-interest
81% employees don’t care about mobile security
33. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 33
Self-interest
81% employees don’t care about mobile security
Surely more care about their own devices?
34. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 34
Self-interest
81% employees don’t care about mobile security
Surely more care about their own devices?
Their BYOD security interests are same as ours
35. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 35
Self-interest
81% employees don’t care about mobile security
Surely more care about their own devices?
Their BYOD security interests are same as ours
» If they know why/how to do the right thing
36. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 36
Self-interest
81% employees don’t care about mobile security
Surely more care about their own devices?
Their BYOD security interests are same as ours
» If they know why/how to do the right thing
» Might BYOD even be more secure?
37. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 37
How might we help?
Discuss around tables for 10 mins:
» How to motivate
» How to support
And report back good ideas…
38. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 38
Good questions...
“What should I do if I lose it?”
“What should I do when I pass it on?”
39. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 39
Good questions...
“What should I do if I lose it?”
“What should I do when I pass it on?”
“How should I back up my device?”
40. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 40
Good questions...
“What should I do if I lose it?”
“What should I do when I pass it on?”
“How should I back up my device?”
“How do I share files with others?”
“How do I get new apps?”
…
42. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 42
BYOD plan
1. Review existing measures for
mobile devices
› Already accepted risk: don’t demand
more of BYOD
› If risk now unacceptable, change mobile
43. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 43
BYOD plan
1. Review existing measures for
mobile devices
› Already accepted risk: don’t demand
more of BYOD
› If risk now unacceptable, change mobile
2. Prepare to support device owners
44. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 44
BYOD plan
1. Review existing measures for
mobile devices
› Already accepted risk: don’t demand
more of BYOD
› If risk now unacceptable, change mobile
2. Prepare to support device owners
3. Motivate device owners
› Should improve mobile security too
45. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 45
BYOD future
Design systems to be BYO-by-Default?
46. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 46
BYOD future
Design systems to be BYO-by-Default?
» Presume it is the norm
» Identify / configure systems and data
that aren’t suitable for it
47. 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 47
BYOD future
Design systems to be BYO-by-Default?
» Presume it is the norm
» Identify / configure systems and data
that aren’t suitable for it
BYOD will happen anyway
Much better to design for it than ignore it
49. BT paper
» btplc.com/News/Articles/ShowArticle.cfm?ArticleID=F5E90F45-
966A-4872-8CF6-C2C32F608541
ICO on BYOD
» ico.org.uk/for_organisations/data_protection/topic_guides/online/byod
CESG
» gov.uk/government/collections/bring-your-own-device-guidance
Me
» community.ja.net/blogs/regulatory-developments/article/mobile-
device-policy-byod
» community.ja.net/blogs/regulatory-developments/tags/BYOD
References
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 49
Editor's Notes
+++++ COVER: OPTION 1 ++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ SECTION BREAK SLIDE ++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT WITH HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT WITH HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
OK, so with BYOD you’ve lost those. How much less safe does that actually make you?
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
# insert motivational demo:
What do I lose if someone steals my corporate smartphone? Vs
What do you lose if someone steals your personal BYOD?]
# insert motivational demo:
What do I lose if someone steals my corporate smartphone? Vs
What do you lose if someone steals your personal BYOD?]
# insert motivational demo:
What do I lose if someone steals my corporate smartphone? Vs
What do you lose if someone steals your personal BYOD?]
# insert motivational demo:
What do I lose if someone steals my corporate smartphone? Vs
What do you lose if someone steals your personal BYOD?]
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ SINGLE COLUMN LAYOUT – FOR USE WITH IMAGES - CAPTIONS AND ATTRIBUTION BELOW +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
+++++ BLANK SLIDE WITH TITLE +++++++
+++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++