This document discusses heart rate zones for exercise and fitness. It notes that there are 5 heart rate zones defined relative to an individual's maximum heart rate, with zone 1 being the lowest intensity and zone 5 being the highest intensity. Staying within different heart rate zones can help target different fitness goals, with lower zones focusing more on recovery and higher zones on performance and endurance training. A data source is provided for an online heart rate calculator.
This document introduces programming education resources that use animals and robots to teach fundamental concepts to kids. It discusses computational thinking and how programming allows solving complex problems. It promotes learning programming through playing games with robotic characters Dash and Dot, and mentions a computer science challenge and provides contact information for further resources from the organization Fifth Wisdom.
Microsoft has partnered with the Education Bureau of Hong Kong (EDB) since 2004 to promote IT education, signing memorandums of understanding focused on empowering learning with technology. The latest partnership from 2013-2018 will provide $250 million globally to focus on areas like e-learning, mobile learning, and cloud computing. Microsoft Office 365 will be offered free to schools along with teacher training programs and digital content to empower students with learning activities and e-textbooks on any device anywhere.
This document discusses heart rate zones for exercise and fitness. It notes that there are 5 heart rate zones defined relative to an individual's maximum heart rate, with zone 1 being the lowest intensity and zone 5 being the highest intensity. Staying within different heart rate zones can help target different fitness goals, with lower zones focusing more on recovery and higher zones on performance and endurance training. A data source is provided for an online heart rate calculator.
This document introduces programming education resources that use animals and robots to teach fundamental concepts to kids. It discusses computational thinking and how programming allows solving complex problems. It promotes learning programming through playing games with robotic characters Dash and Dot, and mentions a computer science challenge and provides contact information for further resources from the organization Fifth Wisdom.
Microsoft has partnered with the Education Bureau of Hong Kong (EDB) since 2004 to promote IT education, signing memorandums of understanding focused on empowering learning with technology. The latest partnership from 2013-2018 will provide $250 million globally to focus on areas like e-learning, mobile learning, and cloud computing. Microsoft Office 365 will be offered free to schools along with teacher training programs and digital content to empower students with learning activities and e-textbooks on any device anywhere.
The document introduces the Hour of Code and discusses computer science and programming. It explains that computer science involves the study of computers, how they are designed and programmed, and how they can be used to solve problems using logic and math. The document also lists what programming involves, such as problem solving, using math, learning new languages, creating things, having fun, and helping others. It provides additional resources for learning computer science including websites, videos, and magazines.
Lenovo is a major player in personal computers and mobile devices, holding the number one position in PCs and tablets. It has the widest product portfolio across notebooks, desktops, servers, storage, networking and software. Lenovo supports businesses globally with over 1000 stocking locations and 3000 service centers. The document discusses how technology is being redefined by cloud, mobility, analytics and big data. It predicts enterprises will double their use of cloud apps and storage in the next 2-3 years. Lenovo aims to help customers manage complex cloud infrastructure and deploy the latest Motorola smartphones to adopt mobility strategies.
Teach your kids how to program with Python and the Raspberry PiJuan Gomez
RaspberryPis are the new frontier in enabling kids (and curious adults) to get access to an affordable and easy-to-program platform to build cool things. Over a million of these nifty little devices have been sold in less than a year and part of their popularity has been due to how easy it is to start programming on them.
In this session you'll learn how to get started with the Raspberry PI, initial set-up, configuration and some tips and tricks. Then we'll have a brief introduction to basic Python and we'll write a few simple programs that run on the RaspberryPI. The last section of the session will be dedicated to PyGame, we'll learn about surfaces, events, inputs, sprites, etc and demonstrate how to build very simple games that are as much fun for kids to write, than to play!
This document discusses common hacking incidents like website defacement, information theft, and data modification. It provides examples of vulnerabilities like SQL injection, outdated content management systems, and sensitive files with weak protections. The document demonstrates how a hacker could potentially deface a sample educational website within 10 minutes by browsing it, finding unprotected directories, exploiting vulnerabilities like SQL injection, and uploading code to control the server. It concludes with tips to assess websites for security issues, apply countermeasures, and improve security awareness.
Dr. Chui Chun Kit is a lecturer and teaching consultant in the Department of Computer Science at the University of Hong Kong. He discusses how coding training has become an important part of tertiary education and how coding can be taught to everyone, including kids. Coding is presented as an important skill for problem solving using technologies like mobile and web applications. Examples are given showing how kids can learn logical thinking and creativity through basic coding lessons using Scratch and App Inventor. The goal is to help the next generation become technology creators rather than just consumers.
This document discusses redesigning kids coding education using design thinking principles. It suggests that the curriculum should be less focused on hard-core science and more fun and creative. The classroom setup should be less traditional with desks and chairs and more lively with toys and props. Coding tools should be less traditional computers and more toys with embedded technologies. The mindset should also be redesigned to involve adults and teachers less and focus more on participating in children's activities. A case study of AutoGami is presented as an example of how kids can learn physics and electronics concepts while enjoying a paper craft activity.
This document provides an introduction to C++ for Java developers. It discusses the C++ standard and standard library, which includes containers, strings, input/output streams, and other functionality. It also covers installing compilers like GCC, compiling and running simple C++ programs, code style, using Makefiles, and includes examples of basic C++ syntax like output, input, datatypes, and strings.
The document introduces the Hour of Code and discusses computer science and programming. It explains that computer science involves the study of computers, how they are designed and programmed, and how they can be used to solve problems using logic and math. The document also lists what programming involves, such as problem solving, using math, learning new languages, creating things, having fun, and helping others. It provides additional resources for learning computer science including websites, videos, and magazines.
Lenovo is a major player in personal computers and mobile devices, holding the number one position in PCs and tablets. It has the widest product portfolio across notebooks, desktops, servers, storage, networking and software. Lenovo supports businesses globally with over 1000 stocking locations and 3000 service centers. The document discusses how technology is being redefined by cloud, mobility, analytics and big data. It predicts enterprises will double their use of cloud apps and storage in the next 2-3 years. Lenovo aims to help customers manage complex cloud infrastructure and deploy the latest Motorola smartphones to adopt mobility strategies.
Teach your kids how to program with Python and the Raspberry PiJuan Gomez
RaspberryPis are the new frontier in enabling kids (and curious adults) to get access to an affordable and easy-to-program platform to build cool things. Over a million of these nifty little devices have been sold in less than a year and part of their popularity has been due to how easy it is to start programming on them.
In this session you'll learn how to get started with the Raspberry PI, initial set-up, configuration and some tips and tricks. Then we'll have a brief introduction to basic Python and we'll write a few simple programs that run on the RaspberryPI. The last section of the session will be dedicated to PyGame, we'll learn about surfaces, events, inputs, sprites, etc and demonstrate how to build very simple games that are as much fun for kids to write, than to play!
This document discusses common hacking incidents like website defacement, information theft, and data modification. It provides examples of vulnerabilities like SQL injection, outdated content management systems, and sensitive files with weak protections. The document demonstrates how a hacker could potentially deface a sample educational website within 10 minutes by browsing it, finding unprotected directories, exploiting vulnerabilities like SQL injection, and uploading code to control the server. It concludes with tips to assess websites for security issues, apply countermeasures, and improve security awareness.
Dr. Chui Chun Kit is a lecturer and teaching consultant in the Department of Computer Science at the University of Hong Kong. He discusses how coding training has become an important part of tertiary education and how coding can be taught to everyone, including kids. Coding is presented as an important skill for problem solving using technologies like mobile and web applications. Examples are given showing how kids can learn logical thinking and creativity through basic coding lessons using Scratch and App Inventor. The goal is to help the next generation become technology creators rather than just consumers.
This document discusses redesigning kids coding education using design thinking principles. It suggests that the curriculum should be less focused on hard-core science and more fun and creative. The classroom setup should be less traditional with desks and chairs and more lively with toys and props. Coding tools should be less traditional computers and more toys with embedded technologies. The mindset should also be redesigned to involve adults and teachers less and focus more on participating in children's activities. A case study of AutoGami is presented as an example of how kids can learn physics and electronics concepts while enjoying a paper craft activity.
This document provides an introduction to C++ for Java developers. It discusses the C++ standard and standard library, which includes containers, strings, input/output streams, and other functionality. It also covers installing compilers like GCC, compiling and running simple C++ programs, code style, using Makefiles, and includes examples of basic C++ syntax like output, input, datatypes, and strings.
The document discusses Ivan's experience and qualifications in SEO and WordPress, including 18 years of experience, building 50 sites for testing, handling over 400 WordPress projects, and leading various meetup groups. It also provides information on becoming a client for Ivan's consulting and training services. The document serves as an introduction and overview of Ivan's background and available services.
This document discusses various types of AI, including text-to-text, text-to-image, text-to-speech, and text-to-video. It provides biographical information about Ivan So and his experience in SEO, WordPress, and organizing events. The document also lists client services such as consulting and training. It includes sections on what AI is and examples of different AI applications. Generative AI and parameters in AI are explained. Popular AI models like GPT-3 and techniques like GANs are mentioned.
Inspire@eLC Chapter 4 - How Data Analytics Transforming Digital Marketing on 7 October 2022 by Mr. Ralph Szeto, Chairman, Hong Kong Association of Interactive Marketing
Inspire@eLC Chapter 4 - How Data Analytics Transforming Digital Marketing on 7 October 2022 by Mr. Saron Leung, Industry Head of Financial Services, Google Hong Kong
Inspire@eLC Chapter 3 - HKTVMall: Leading Technology Evolution for eCommerce Industry by Ms. Jelly Zhou, Executive Director and Chief Executive Officer (Hong Kong) of Hong Kong Technology Venture Company Limited
Digital Oasis is a Hong Kong-based technology company that specializes in innovative electronic products using patented material sound and conduction technologies. They design and manufacture thin, light audio devices that can play sound through materials like metal and can be painted with customizable designs. Their products include smart home speakers and sound wall panels for home theaters that combine audio and decorative art.
This document discusses the interaction between cyber security and school IT policy. It outlines various IT systems, applications, and devices used in schools, such as servers, networks, cloud services, and devices. It stresses the importance of having proper IT policies to govern operation, systems and applications, control, security, and management. The document provides examples of key policies including acceptable use, network, data protection, backup, email, and disaster recovery policies. It also discusses guidelines and rules around issues like passwords, verification, training, manuals, and applications. Finally, it provides tips for effective policy making like understanding needs, problems, requirements, training users, and ongoing evaluation.
This document summarizes the results of a vulnerability assessment performed on the networks of 6 schools by HKT. It found that around 25% of systems had web services, with an average risk score of 54 and scores ranging from 20 to 78. Manual review found that 33% of vulnerabilities were high or critical risks. Common high risk issues included SQL injection, cross-site scripting, and outdated software with known vulnerabilities. The document discusses ongoing challenges in security management like complexity, recruitment, and funding. It proposes a security-centric approach with centralized monitoring, automation, and remote support provided by a managed security service partner.
This document summarizes a presentation about assessing and managing school network security. It discusses the results of vulnerability assessments conducted on 50 school websites, which found over 110 critical vulnerabilities. The top issues were SQL injection, cross-site scripting, and outdated components. Managing security is challenging due to increasing systems, data, and user touchpoints. Trends include taking a security-centric approach across the network and adopting comprehensive managed security services. Key aspects of security management are people, technology, process and having a security operations center for monitoring, alerting and incident response.
This document summarizes cybersecurity trends and tips for 2020. It discusses the top passwords used, guidelines for strong passwords, and major cybersecurity incidents in 2019 such as data breaches affecting over 500 million records. It also provides tips on protecting against phishing attacks, risks of IoT devices, and ransomware. Emerging issues like deepfakes and security risks after technologies reach end of support are mentioned. The key message is that information security requires efforts from all stakeholders.
The document discusses security challenges and prevention measures for schools. It summarizes findings from a UK cyber security audit of 432 schools, which found that 83% experienced cyber incidents. While most schools had antivirus and firewalls, only 45% included IT services in risk assessments. The document also outlines common attacks schools face like phishing, ransomware, and data breaches. It provides prevention tips and emphasizes the importance of a holistic security approach involving people, processes, and technology.
The document summarizes the findings of a penetration test project conducted on the websites and applications of over 30 schools. It identifies over 240 critical vulnerabilities across the schools, including exposed personal data, outdated software with known vulnerabilities, and SQL injection issues. Recommendations include encouraging software vendors to provide ongoing patches, implementing regular vulnerability scanning, and ensuring systems and software are regularly updated to the latest versions. Best practices for schools outlined in the document include implementing firewalls, regular backups, web application firewalls, and security awareness training for practitioners.