This is a presentation on the state of education in NC. It was used to set the context of a professional education meeting with Teacher educators. Websites used for presentation: http://delicious.com/bethanyvsmith/diduknw
Depending on the type of library in which you work, you may assume that someone is "digitally literate." Yet what do we mean by those words and how do we know if the person meets our definition? What can we do in our libraries to increase the information and digital literacy of our users/patrons/members/owners? How does that impact the tools that we acquire and the services that we provide? Who should we be partnering with in these efforts? These and other questions will be address in this session, which will also include time for brainstorming.
Jill Hurst-Wahl is an associate professor of practice in Syracuse University’s School of Information Studies and the director of its library and information science program. She is a member of SLA’s Board of Directors, NYS Regents Advisory Council on Libraries, and the USNY Technology Policy and Practices Council. A former corporate librarian, Jill has always been an advocate for libraries being centers of learning in their communities (no matter what community they serve).
Lee Rainie, director of Internet, Science and Technology research at the Pew Research Center, described the Center’s research about public views related to facts and trust after the 2016 election at UPCEA's “Summit on Online Leadership.” He explored how education is affected as students face challenges finding and using knowledge. In addition, he covered the Center’s latest research about how ubiquitous technology shapes the new information landscape for students.
Since the Pew Research Center's Internet & American Life Project first started tracking teen cell phone use, the age at which American teens acquire their first cell phone has consistently grown younger. In Pew Internet's 2004 survey of teens, 18% of 12-year-olds owned a cell phone. In 2009, 58% of 12 year-olds own a cell phone. We also have found that cell phone ownership increases dramatically with age: 83% of teens age 17 now own a cell phone, up from 64% in 2004.
In this wide-ranging new talk that was given as a part of Dartmouth College’s Strategic Planning process and their “Leading Voices in Higher Education Speaker Series http://strategicplanning.dartmouth.edu/aspire/leading-voices-in-higher-education-speaker-series, Amanda Lenhart talked about the technological milieu of today’s teens and college students as they grew from children to young adults and the ways in which each major new technological development disrupted our previous communication strategies. The talk also explored the ways that social media is changing campus culture as well as how digital tools are changing where learning happens – MOOCs and mixed classes, flipped classrooms – as well as how it occurs for K-12 as well as within higher education.
To view all 71 minutes of the talk and Q &A, as well as shorter video on the future of the university, please visit: http://strategicplanning.dartmouth.edu/aspire/amanda-lenhart
: Lee Rainie, Director of the Pew Research Center’s Internet & American Life Project, will discuss the Project’s most recent findings about Americans use the internet and their mobile devices to learn, share, and create information. He will discuss how the changed media environment is affecting learners’ expectations about the availability of information and the ways in which learning takes place. In this new environment, the traditional boundaries between home and school, teacher and pupil, public and private are breaking down and that is affecting the way learning occurs. Lee will describe how Pew Internet has looked at these subjects and the ways in which schools and families are responding to them.
Amanda Lenhart spoke at the National Academies “Health, Safety & Well-Being of Young Adults” Symposium on May 7th in Washington, DC http://www.iom.edu/Activities/Children/ImprovingYoungAdultHealth/2013-MAY-07.aspx. Amanda discussed how young adults ages 18-29 use mobile phones and social media and they ways in which this has changed how young people make the transition from childhood to adulthood today
The talk reviews the basic findings of the Privacy report. Amanda focused particularly on data on parent and teen attitudes towards and experiences with online advertising, and third party access to a teen’s personal information posted online.
The slide deck for the presentation I'm giving at Telecoms Multi-Platform Content Management and Delivery Forum, London, June 11-13, 2008. Discusses the value of open vs closed and where value is created in networked models
Creating a Social Network: The Walled Garden ApproachBethany Smith
This presentation was given at NECC in 2009 by Bethany Smith, Dean Mantz, Dianne Krause, Amira Fouad, & Sheryl Grant on the use of Ning to create a social network in various evaluational settings
Depending on the type of library in which you work, you may assume that someone is "digitally literate." Yet what do we mean by those words and how do we know if the person meets our definition? What can we do in our libraries to increase the information and digital literacy of our users/patrons/members/owners? How does that impact the tools that we acquire and the services that we provide? Who should we be partnering with in these efforts? These and other questions will be address in this session, which will also include time for brainstorming.
Jill Hurst-Wahl is an associate professor of practice in Syracuse University’s School of Information Studies and the director of its library and information science program. She is a member of SLA’s Board of Directors, NYS Regents Advisory Council on Libraries, and the USNY Technology Policy and Practices Council. A former corporate librarian, Jill has always been an advocate for libraries being centers of learning in their communities (no matter what community they serve).
Lee Rainie, director of Internet, Science and Technology research at the Pew Research Center, described the Center’s research about public views related to facts and trust after the 2016 election at UPCEA's “Summit on Online Leadership.” He explored how education is affected as students face challenges finding and using knowledge. In addition, he covered the Center’s latest research about how ubiquitous technology shapes the new information landscape for students.
Since the Pew Research Center's Internet & American Life Project first started tracking teen cell phone use, the age at which American teens acquire their first cell phone has consistently grown younger. In Pew Internet's 2004 survey of teens, 18% of 12-year-olds owned a cell phone. In 2009, 58% of 12 year-olds own a cell phone. We also have found that cell phone ownership increases dramatically with age: 83% of teens age 17 now own a cell phone, up from 64% in 2004.
In this wide-ranging new talk that was given as a part of Dartmouth College’s Strategic Planning process and their “Leading Voices in Higher Education Speaker Series http://strategicplanning.dartmouth.edu/aspire/leading-voices-in-higher-education-speaker-series, Amanda Lenhart talked about the technological milieu of today’s teens and college students as they grew from children to young adults and the ways in which each major new technological development disrupted our previous communication strategies. The talk also explored the ways that social media is changing campus culture as well as how digital tools are changing where learning happens – MOOCs and mixed classes, flipped classrooms – as well as how it occurs for K-12 as well as within higher education.
To view all 71 minutes of the talk and Q &A, as well as shorter video on the future of the university, please visit: http://strategicplanning.dartmouth.edu/aspire/amanda-lenhart
: Lee Rainie, Director of the Pew Research Center’s Internet & American Life Project, will discuss the Project’s most recent findings about Americans use the internet and their mobile devices to learn, share, and create information. He will discuss how the changed media environment is affecting learners’ expectations about the availability of information and the ways in which learning takes place. In this new environment, the traditional boundaries between home and school, teacher and pupil, public and private are breaking down and that is affecting the way learning occurs. Lee will describe how Pew Internet has looked at these subjects and the ways in which schools and families are responding to them.
Amanda Lenhart spoke at the National Academies “Health, Safety & Well-Being of Young Adults” Symposium on May 7th in Washington, DC http://www.iom.edu/Activities/Children/ImprovingYoungAdultHealth/2013-MAY-07.aspx. Amanda discussed how young adults ages 18-29 use mobile phones and social media and they ways in which this has changed how young people make the transition from childhood to adulthood today
The talk reviews the basic findings of the Privacy report. Amanda focused particularly on data on parent and teen attitudes towards and experiences with online advertising, and third party access to a teen’s personal information posted online.
The slide deck for the presentation I'm giving at Telecoms Multi-Platform Content Management and Delivery Forum, London, June 11-13, 2008. Discusses the value of open vs closed and where value is created in networked models
Creating a Social Network: The Walled Garden ApproachBethany Smith
This presentation was given at NECC in 2009 by Bethany Smith, Dean Mantz, Dianne Krause, Amira Fouad, & Sheryl Grant on the use of Ning to create a social network in various evaluational settings
Baruch Nachshon was born in Haifa in Mandatory Palestine (Israel) in 1939.
Nachshon began painting at an earlyage, He developed his relationship to art
and to artists throughout his youth. During his military service Nachshon herded
flocks for the IDF, filling his life with a love and appreciation for nature. His
work work is filled with the life and imagery he received then. Upon
completing his military service Nachshon was torn between temptation
of an artists life in Paris and his deep love for the land of Israel.
Nachshon Chose Israel, his spiritual home. He continued his art
training with Shlomo Nerani, Cezanne's only pupil, his mentor from
childhood.Nachshon, whom Nerani viewed as his spiritual heir,
was his only student allowed to see the master at work.
Nachshon is a devoted Lubavitch Hassid since being drawn
to the movement by its evocative, spiritual melodies.
In 1965, Nachshon met with his Rebbe, Menachem Mendel
Schneerson in a private session, lasting three hours. The
young artist was able to share with the Rebbe his concerns and
misgivings about his role as a Jewish artist and the conflicts which
confront him. The Rebbe advised Nachshon that for many generations
the art of painting had failed to find its ultimate rectification in holiness,
but that with the help of God he might come to bring about that long
anticipated rectification. The Rebbe then offered to fund Nachshon's
studies in New York on the condition that he would find a program of
study acceptable to Jewish religious values. Despite the difficulty
inherent in such a task, Nachshon gladly received the Rebbe's offer
and devoted himself fully to the celebration of the wisdom of the
Creator through visual art.
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...Dr. Mokter Hossain
This paper presents quantitative and qualitative data that examine the prospective U.S. mathematics teachers’ engagement in the use of the Internet, hand-held cellular devices, and Web 2.0 activities and their perception of using these technologies for the teaching and learning of Euclidean geometry and other mathematics courses. The study revealed that prospective mathematics teachers in the U.S. have massive engagement in accessing the Internet and Web 2.0-based activities through cellular and handheld mobile devices as well as in their self-reported skills in using Internet, without any significant differences based on their gender. Prospective mathematics teachers experienced numerous advantages and a few minor problems of the blogging activity as a supportive tool in the Euclidean Geometry course. They found blogs a supportive and useful tool for collaborative teaching and learning purposes. Thus, they suggest that blogs and other Web 2.0 tools should be incorporated in the middle and high school mathematics education curricula.
-Identify the uses for mobile devices and the implications it has in today’s classrooms.
-Discover sites, tools, apps and resources
-What critical 21st century skills can be mastered when using mobile devices?
Technology in its myriad of forms is pervasive in our daily lives. Women interact with technology differently than men and women across the generations use technology for different purposes. This talk will look at how women of all ages use technology to express themselves and engage with the world around them. We will explore the impact of computers, the Internet, mobile devices, video, and other technologies on the ways in which women form and express their identities from childhood through the senior years.
A presentation by Mary Madden at the Chicago Wallace Audience Engagement Network. As arts organizations consider expanding their presence online and connecting with audiences on their own terms, they often need data to make tough decisions about how to spend limited budgets and human resources on developing new media strategies. 4/22/08
Social Media and Mobile Internet Use Among Teens And Young AdultsJulius Trujillo
These surveys of teens and adults reveal a decline in blogging among teens and young adults and a modest rise among adults 30 and older. Although 12-17 teens do not use Twitter in large numbers, high school-aged girls show the greatest enthusiasm for the application.
Find out how today’s teens and twentysomethings are reshaping the USA at: www.pewresearch.org/millennial
QR Codes are everywhere, on products, at museums, and even on people! But how can you use them at your institution? QR Codes are great ways to get more information to your users, they can be used to link to websites, videos and even contact information. Imagine adding QR Codes to your business cards for faster contact sharing. Link QR codes to books in your library to get more information, or a list of similar books. Even imagine creating a QR code scavenger hunt around your building for new students - the possibilities are endless! In this session we will discuss the ways to create a QR Code as well as how they can be used in and outside of the classroom.
Using QR Codes in the Classroom and BeyondBethany Smith
Presentation at UNCCAUSE 2011
https://cause11.appstate.edu
QR Codes are everywhere, on products, at museums, and even on people! But how can you use them at your institution? QR Codes are great ways to get more information to your users, they can be used to link to websites, videos and even contact information. Imagine adding QR Codes to your business cards for faster contact sharing. Link QR codes to books in your library to get more information, or a list of similar books. Even imagine creating a QR code scavenger hunt around your building for new students - the possibilities are endless! In this session we will discuss the ways to create a QR Code as well as how they can be used in and outside of the classroom.
NCTIES 2011 session.
iPads are fun and easy to use, but are they productive? Will they be the next generation of hardware for 1:1? In this session we will discuss the pros and cons of using iPads, their uses compared to laptops as well as how they are currently being used in the classroom. Which hardware will reign supreme? You decide!
This slidedeck is from a 1 hour presentation/workshop on how 3D works. This covers the basics of red/blue 3D and how to make your own images and glasses.
A Ning provides an excellent space to host your own social network. You may belong to a few, but how do you create your own? In this session we will go over the basics of creating a Ning, how to customize a Ning as well as best practices in facilitating Nings. NCTIES 2010 presentation
Personal Learning Networks: Beyond the ToolsBethany Smith
So you've started with Twitter, FriendFeed and Facebook. You belong to 20 different Educational Nings, but now what? How do you go beyond being a spectator in the PLN world and become an active participant. In this session you will discover tools to keep track of your contacts and why you just need to let some projects loose.
Ignite Raleigh : Presentation Zen or How to not be be boring while presenting...Bethany Smith
We've all seen bad PowerPoint - but was does it take to make a good one? This slide deck explores the dos and don'ts of Presentation Zen. Presented at Ignite Raleigh 3/ 3/10
Social Media: Where do Twitter, Facebook & others fit into education?Bethany Smith
Is social media a fad? How will it change the way we communicate, or has it already? Don't know what tools would be beneficial to you? Join us for an overview of Social Media tools as well as a discussion about how they are used in education.
This is a presentation supporting the resources available at http://bethanyvsmith.pbworks.com/mousetrap for building a mousetrap car based on Physics principles.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
2. The guiding mission of the North Carolina State Board of Education is that every public school student will graduate from high school, globally competitive for work and postsecondary education and prepared for life in the 21st Century.
3. There has been a 45% increase since 2000 in the number of teenagers who use the Internet at School
4. 17% of 11 th & 12 th graders in 2004 took the AP exam, compared to 12% nationally.
5.
6. According to Nature, Wikipedia has an average of 3.86 mistakes per article and Encyclopedia Britannica has 2.92 mistakes per article. However, Wikipedia gets fixed more quickly.
7. 86% of incoming students at NC State in the College of Education in 2007 brought laptop computers with them.
17. 62% of all Americans are part of a wireless, mobile population that participates in digital activities away from home or work.
18. Internet users ages 12 to 28 years old have embraced the online applications that enable communicative, creative, and social uses. Internet users ages 29 to 69 years old are more likely than internet users in other age groups to engage in online activities that require some capital: travel reservations and online banking.
19. Some 55% of all adult Americans now have a high-speed internet connection at home. The percentage of Americans with broadband at home has grown from 47% in early 2007.
20. More than half (55%) of all online American youths ages 12-17 use online social networking sites.
21. Some 12% of internet users say they have downloaded a podcast so they can listen to it or view it at a later time.
22. Fully 87% of online users have at one time used the internet to carry out research on a scientific topic or concept.
23. More than 53 million American adults have used the Internet to publish their thoughts, respond to others, post pictures, share files and otherwise contribute to the explosion of content available online.
24. More teens are creating and sharing material on the internet. And 28% of online teens have blogs, up from 2004. Blogging growth is almost entirely fueled by girls. A subset of teens -- super communicators -- rise as email fades as a communication tool for teens.