This is an information technology update to the University System of Georgia community provided as a keynote at the 2013 Rock Eagle Annual Computing Conference.
This presentation examines the University System of Georgia pursue of student success and how technology supports that endeavor. From providing an update on the current state of technology to where we are headed, this presentation will provide a catalyst for discussion by interested faculty, students, and staff. Where we will be in ten years will be a very different place than where we are today and technology will play an increasingly important role in enabling that change. We live in transformational times for both technology and education and this presentation examines the interaction between technology and education.
ALA Presentation on Broadband Deployment to Libraries -> September 27, 2007 A...mbard
Presentation from Mark Bard at the American Library Association's Office for Information Technology Policy on how broadband is changing public libraries & how to improve connectivity.
Reports used for data in the slides can be found at:
http://www.ala.org/ala/washoff/contactwo/oitp/papersa/public_version_final.pdf
http://www.ala.org/plinternetfunding
This document discusses the progress and prospects of learning technology. It notes that while e-learning use has grown significantly over the past decade, its potential is still largely untapped. E-learning opens up new opportunities for learning when combined with other forms of learning. The document also explores emerging technologies like social networking, virtual worlds, and electronic performance support systems that can further support and direct learning through online tools, communities, and job aids. Overall, technology holds great potential to enhance learning but design must focus on engagement and relevance for learners.
Introduction – John Felton, NLC. One of the opportunities available to assist libraries in supporting their broadband connectivity costs is applying for E-rate discounts on internet service. This necessitates complying with the requirements of the Children’s Internet Protection Act (CIPA) by filtering internet access. In this session we will hear about what CIPA actually requires, about the issues a library director must deal with when deciding to filter internet access, about how filtering can be accomplished with low cost, and about the results of a survey completed by Nebraska libraries that have installed a filter.
CIPA: Myths vs. Reality – Christa Burns, NLC, will clear up some of the misconceptions about CIPA and how it relates to E-rate.
Filtering Internet Content – Pam Soreide, Holdrege Area Public Library, & George Matzen, Webermeier Memorial Library. Participants in this session will leave with a sense of what factors should be considered in the decision whether or not to filter Internet content at public workstations. Discussion will include patron perceptions and management issues.
The document summarizes a presentation about measuring and monitoring network performance in school districts across Georgia. It discusses how the Georgia Measurement and Monitoring (GAMMON) project collects quantitative data on network usage and application performance. This data helps identify bandwidth limitations that impact education technology use in classrooms. GAMMON also analyzes how districts' network capacities align with their technology plans and provides recommendations on improving performance.
This document discusses top technology trends in education over the next 1-5 years based on the 2010 Horizon Report. These include mobile computing, open content, electronic books, simple augmented reality, gesture-based computing, and visual data analysis within 1-2 years. It also discusses the growth of K-12 online education and eBooks. Emerging technologies like augmented reality use cameras and sensors for tracking. Gesture-based computing uses touch displays and surfaces. Resources mentioned include virtual worlds for teaching and open educational resources.
Presentation for African Utility Week providing early lessons on the use of ICT (Information Communications Technology) in the water sector in developing countries. Given 15 May 2013 in Cape Town by David Schaub-Jones, co-founder of SeeSaw, an organisation that specialises in "smarter water systems through training, advice and software". Find more at http://greenseesaw.com
This presentation examines the University System of Georgia pursue of student success and how technology supports that endeavor. From providing an update on the current state of technology to where we are headed, this presentation will provide a catalyst for discussion by interested faculty, students, and staff. Where we will be in ten years will be a very different place than where we are today and technology will play an increasingly important role in enabling that change. We live in transformational times for both technology and education and this presentation examines the interaction between technology and education.
ALA Presentation on Broadband Deployment to Libraries -> September 27, 2007 A...mbard
Presentation from Mark Bard at the American Library Association's Office for Information Technology Policy on how broadband is changing public libraries & how to improve connectivity.
Reports used for data in the slides can be found at:
http://www.ala.org/ala/washoff/contactwo/oitp/papersa/public_version_final.pdf
http://www.ala.org/plinternetfunding
This document discusses the progress and prospects of learning technology. It notes that while e-learning use has grown significantly over the past decade, its potential is still largely untapped. E-learning opens up new opportunities for learning when combined with other forms of learning. The document also explores emerging technologies like social networking, virtual worlds, and electronic performance support systems that can further support and direct learning through online tools, communities, and job aids. Overall, technology holds great potential to enhance learning but design must focus on engagement and relevance for learners.
Introduction – John Felton, NLC. One of the opportunities available to assist libraries in supporting their broadband connectivity costs is applying for E-rate discounts on internet service. This necessitates complying with the requirements of the Children’s Internet Protection Act (CIPA) by filtering internet access. In this session we will hear about what CIPA actually requires, about the issues a library director must deal with when deciding to filter internet access, about how filtering can be accomplished with low cost, and about the results of a survey completed by Nebraska libraries that have installed a filter.
CIPA: Myths vs. Reality – Christa Burns, NLC, will clear up some of the misconceptions about CIPA and how it relates to E-rate.
Filtering Internet Content – Pam Soreide, Holdrege Area Public Library, & George Matzen, Webermeier Memorial Library. Participants in this session will leave with a sense of what factors should be considered in the decision whether or not to filter Internet content at public workstations. Discussion will include patron perceptions and management issues.
The document summarizes a presentation about measuring and monitoring network performance in school districts across Georgia. It discusses how the Georgia Measurement and Monitoring (GAMMON) project collects quantitative data on network usage and application performance. This data helps identify bandwidth limitations that impact education technology use in classrooms. GAMMON also analyzes how districts' network capacities align with their technology plans and provides recommendations on improving performance.
This document discusses top technology trends in education over the next 1-5 years based on the 2010 Horizon Report. These include mobile computing, open content, electronic books, simple augmented reality, gesture-based computing, and visual data analysis within 1-2 years. It also discusses the growth of K-12 online education and eBooks. Emerging technologies like augmented reality use cameras and sensors for tracking. Gesture-based computing uses touch displays and surfaces. Resources mentioned include virtual worlds for teaching and open educational resources.
Presentation for African Utility Week providing early lessons on the use of ICT (Information Communications Technology) in the water sector in developing countries. Given 15 May 2013 in Cape Town by David Schaub-Jones, co-founder of SeeSaw, an organisation that specialises in "smarter water systems through training, advice and software". Find more at http://greenseesaw.com
13 Trends and Challenges with School Wireless NetworksCorey Anderson
This document discusses trends and challenges schools face in supporting mobile learning and provides solutions for wireless network design. It introduces two speakers: Corey Anderson, a mobility specialist, and Michael McNamee, a chief network engineer with experience deploying wireless networks in over 300 schools. The document outlines trends like 1:1 initiatives, BYOD, cloud-based mobile learning and multimedia usage. It also discusses challenges such as ensuring security, managing growth and different environments. Solutions proposed include load balancing, dual-radio access points, and centralized wireless management with real-time device visibility. The speakers offer a free wireless network design assessment to help schools determine needs.
The document discusses a survey conducted on institutional support for staff who lose access to IT resources after being made redundant. The survey found that while a third of respondents had an information literacy policy, only 15% addressed support for cloud services. Furthermore, only two institutions had a policy to support staff's use of cloud services after leaving the institution. The majority of respondents felt that providing such support was not their responsibility due to lack of resources or expertise. The document argues that information literacy policies should ensure lifelong digital skills for staff, researchers, and students beyond what their institution provides.
The document discusses emerging technologies that are likely to impact education within the next 1-5 years according to the Horizon Report 2011. Key trends include increased access to resources and relationships online, more flexible and collaborative work. Technologies highlighted are electronic books, mobile devices, augmented reality, game-based learning, and gesture-based computing. Challenges include developing digital literacy skills and appropriate evaluation metrics for new forms of online content and competition from proprietary colleges. The future of learning is predicted to involve more personalized, informal and collaborative learning through networked communities.
This document summarizes a presentation about big data. The presentation covered what big data is, the four V's of big data (volume, velocity, variety, and veracity), a brief history of big data, diving deeper into Hadoop and its ecosystem, and two case studies. The presentation also discussed the big data initiative at the company CCC and how it aims to use big data for student success, retention, graduation rates, and improving advising.
Charting a course for empowered learning through the use of technology (4)steve muzzy
The document discusses using student-owned mobile devices in schools and presents data from a survey of students, teachers, parents and administrators on their views about technology use in education. It finds that most students have mobile devices and want to use them for schoolwork, but currently face obstacles like not being able to access the school network. Both students and teachers see benefits like increased engagement, but teachers and administrators have concerns about distractions and network security. The document proposes a pilot program to experiment with allowing student devices on the school network.
This document provides an overview and planning considerations for a mobile learning project. It discusses defining mobile learning and understanding learner needs and behaviors. Key aspects to address in planning include objectives, audience, instructional strategies, content development, technical requirements, evaluation, challenges and opportunities. Testing, sustainability, and taking advantage of mobile capabilities are emphasized. Resources for mobile learning research and tools are also provided.
Lee Rainie, director of Internet, Science and Technology research at the Pew Research Center, described the Center’s research about public views related to facts and trust after the 2016 election at UPCEA's “Summit on Online Leadership.” He explored how education is affected as students face challenges finding and using knowledge. In addition, he covered the Center’s latest research about how ubiquitous technology shapes the new information landscape for students.
A presentation focusing on key lessons in applying ICT (Informations Communications Technology) to water and health challenges in developing countries. Given at the Water, Engineering and Development Centre (WEDC) conference in Kenya in July 2013.
The digital divide refers to the gap between those who have access to technology and the internet and those who do not. Several demographic factors contribute to the digital divide, including income, education level, age, disability status, and whether someone lives in a rural or urban area. Studies show that those from lower-income families, without a college education, over age 65, with disabilities, or living in rural areas have lower levels of computer and internet access at home compared to others. The digital divide is also present in schools, with lower-income and high-poverty schools having less access to technology and internet for instructional purposes. Recommendations to address the digital divide include improving access for schools and students, developing more accessible technology
AI & Work, with Transparency & the Crowd Matthew Lease
The document discusses designing human-AI partnerships and the role of crowdsourcing in AI systems. It summarizes work on designing AI assistants to work with humans, using crowds to help fact-check information, and explores challenges around protecting crowd workers who review harmful content or do "dirty jobs". It advocates for more research on ethics in AI and using crowds to help check work for ethical issues.
There is no consensus on the ideal age for children to begin using computers. While some research and guidelines recommend ages 3 or older, supervised, others argue computers should not replace real-world experiences and traditional toys for young children. The effects of computer use on young children are still unclear, with some studies finding benefits to certain skills but others noting health or social risks from excessive solo use. More research is still needed, especially on educational benefits, to develop optimal guidelines balancing computer activities with other developmentally important experiences.
The document discusses technology planning at Colgate University. It outlines the university's assumptions around technology, including that technology should enhance teaching and learning and build connections. It also discusses the university's strengths in infrastructure, collaboration, and evaluating trends. The core elements of the technology plan are described as access, organization, tools, and assistance. Recent and ongoing projects are mentioned, including online applications, networking upgrades, and exploring priorities for alumni information services.
With more than 250,000 students generating 50 million hits a day across 42 terabytes of content and 160,000 courses, the University System of Georgia's learning system is no stranger to the need for high-performance wireless infrastructure. Providing a private cloud serving other state agencies, including the Georgia Department of Education's 189 school districts and 1.6 million students, means that the university system must provide the best available wireless strategy and technologies. Join us to learn how they do it.
This document discusses measures to improve internet access, speed, and affordability in the Philippines and other countries in Southeast Asia. It provides data on internet penetration rates, connectivity speeds, and pricing in the Philippines compared to its neighbors. The Philippine Digital Strategy aims to increase internet access in schools, local government areas, and households by 2015 through measures like strengthening the National Telecommunications Commission and passing a new ICT law.
This document discusses the challenges of social media for enterprises and how to manage electronic discovery related to social media. It notes that most information today is unstructured and unmanaged, including social media content created by employees. It defines social media and contrasts traditional enterprise data with social media data. It recommends addressing social media challenges through information governance policies, education, data mapping, and electronic discovery tools that can collect, preserve, and process different types of enterprise data, including ephemeral social media content.
Darriale Bradley had to do her schoolwork at McDonald's because she lacked home internet access. However, after learning about a low-cost internet program, her family was able to get high-speed internet at home for $10 a month, allowing Bradley to complete schoolwork and research scholarships that helped pay for college. The document discusses how lack of home internet access puts students and job-seekers at a disadvantage as online access becomes increasingly necessary for school, work, and services. It also examines efforts to expand broadband access and their economic and social benefits.
The document discusses the implementation of a 1:1 program that provides each student with a netbook computer. It argues that this program aims to prepare students for the technological skills needed for future jobs by teaching students to use software programs and manipulate computers. The 1:1 program allows students to learn at their own pace and build knowledge through individual and guided use of their netbooks. The document also discusses how social media networks have become integrated into daily life and can be used to share information and help others with technological problems. It believes that providing students with constant internet access through this program will allow education to be more engaging and help students who lack experience in accessing online information.
Presentation given at the Linguistic Data Consortium (LDC), University of Pennsylvania, April 2019. Based on presentations at the 6th ACM Collective Intelligence Conference, 2018 and the 6th AAAI Conference on Human Computation & Crowdsourcing (HCOMP), 2018. Blog post: https://blog.humancomputation.com/?p=9932.
The document compares and contrasts the biblical figures of Adam and Christ, referred to as the first and second Adam. It notes similarities between the two such as both being placed miraculously, being sinless originally, being tempted, being named by God, being married, and having families. However, it also outlines contrasts in that Adam brought death to the world through his sin while Christ brought life through his sacrifice to redeem humanity. The document explores the roles of Adam and Christ in changing access to the tree of life and their impacts on life and death for humanity.
El documento trata sobre un aula de la naturaleza en Cerralba dirigida por Josefa Manceba. El aula busca enseñar a los estudiantes sobre el medio ambiente a través de actividades prácticas y aprendizaje experiencial en 2015.
13 Trends and Challenges with School Wireless NetworksCorey Anderson
This document discusses trends and challenges schools face in supporting mobile learning and provides solutions for wireless network design. It introduces two speakers: Corey Anderson, a mobility specialist, and Michael McNamee, a chief network engineer with experience deploying wireless networks in over 300 schools. The document outlines trends like 1:1 initiatives, BYOD, cloud-based mobile learning and multimedia usage. It also discusses challenges such as ensuring security, managing growth and different environments. Solutions proposed include load balancing, dual-radio access points, and centralized wireless management with real-time device visibility. The speakers offer a free wireless network design assessment to help schools determine needs.
The document discusses a survey conducted on institutional support for staff who lose access to IT resources after being made redundant. The survey found that while a third of respondents had an information literacy policy, only 15% addressed support for cloud services. Furthermore, only two institutions had a policy to support staff's use of cloud services after leaving the institution. The majority of respondents felt that providing such support was not their responsibility due to lack of resources or expertise. The document argues that information literacy policies should ensure lifelong digital skills for staff, researchers, and students beyond what their institution provides.
The document discusses emerging technologies that are likely to impact education within the next 1-5 years according to the Horizon Report 2011. Key trends include increased access to resources and relationships online, more flexible and collaborative work. Technologies highlighted are electronic books, mobile devices, augmented reality, game-based learning, and gesture-based computing. Challenges include developing digital literacy skills and appropriate evaluation metrics for new forms of online content and competition from proprietary colleges. The future of learning is predicted to involve more personalized, informal and collaborative learning through networked communities.
This document summarizes a presentation about big data. The presentation covered what big data is, the four V's of big data (volume, velocity, variety, and veracity), a brief history of big data, diving deeper into Hadoop and its ecosystem, and two case studies. The presentation also discussed the big data initiative at the company CCC and how it aims to use big data for student success, retention, graduation rates, and improving advising.
Charting a course for empowered learning through the use of technology (4)steve muzzy
The document discusses using student-owned mobile devices in schools and presents data from a survey of students, teachers, parents and administrators on their views about technology use in education. It finds that most students have mobile devices and want to use them for schoolwork, but currently face obstacles like not being able to access the school network. Both students and teachers see benefits like increased engagement, but teachers and administrators have concerns about distractions and network security. The document proposes a pilot program to experiment with allowing student devices on the school network.
This document provides an overview and planning considerations for a mobile learning project. It discusses defining mobile learning and understanding learner needs and behaviors. Key aspects to address in planning include objectives, audience, instructional strategies, content development, technical requirements, evaluation, challenges and opportunities. Testing, sustainability, and taking advantage of mobile capabilities are emphasized. Resources for mobile learning research and tools are also provided.
Lee Rainie, director of Internet, Science and Technology research at the Pew Research Center, described the Center’s research about public views related to facts and trust after the 2016 election at UPCEA's “Summit on Online Leadership.” He explored how education is affected as students face challenges finding and using knowledge. In addition, he covered the Center’s latest research about how ubiquitous technology shapes the new information landscape for students.
A presentation focusing on key lessons in applying ICT (Informations Communications Technology) to water and health challenges in developing countries. Given at the Water, Engineering and Development Centre (WEDC) conference in Kenya in July 2013.
The digital divide refers to the gap between those who have access to technology and the internet and those who do not. Several demographic factors contribute to the digital divide, including income, education level, age, disability status, and whether someone lives in a rural or urban area. Studies show that those from lower-income families, without a college education, over age 65, with disabilities, or living in rural areas have lower levels of computer and internet access at home compared to others. The digital divide is also present in schools, with lower-income and high-poverty schools having less access to technology and internet for instructional purposes. Recommendations to address the digital divide include improving access for schools and students, developing more accessible technology
AI & Work, with Transparency & the Crowd Matthew Lease
The document discusses designing human-AI partnerships and the role of crowdsourcing in AI systems. It summarizes work on designing AI assistants to work with humans, using crowds to help fact-check information, and explores challenges around protecting crowd workers who review harmful content or do "dirty jobs". It advocates for more research on ethics in AI and using crowds to help check work for ethical issues.
There is no consensus on the ideal age for children to begin using computers. While some research and guidelines recommend ages 3 or older, supervised, others argue computers should not replace real-world experiences and traditional toys for young children. The effects of computer use on young children are still unclear, with some studies finding benefits to certain skills but others noting health or social risks from excessive solo use. More research is still needed, especially on educational benefits, to develop optimal guidelines balancing computer activities with other developmentally important experiences.
The document discusses technology planning at Colgate University. It outlines the university's assumptions around technology, including that technology should enhance teaching and learning and build connections. It also discusses the university's strengths in infrastructure, collaboration, and evaluating trends. The core elements of the technology plan are described as access, organization, tools, and assistance. Recent and ongoing projects are mentioned, including online applications, networking upgrades, and exploring priorities for alumni information services.
With more than 250,000 students generating 50 million hits a day across 42 terabytes of content and 160,000 courses, the University System of Georgia's learning system is no stranger to the need for high-performance wireless infrastructure. Providing a private cloud serving other state agencies, including the Georgia Department of Education's 189 school districts and 1.6 million students, means that the university system must provide the best available wireless strategy and technologies. Join us to learn how they do it.
This document discusses measures to improve internet access, speed, and affordability in the Philippines and other countries in Southeast Asia. It provides data on internet penetration rates, connectivity speeds, and pricing in the Philippines compared to its neighbors. The Philippine Digital Strategy aims to increase internet access in schools, local government areas, and households by 2015 through measures like strengthening the National Telecommunications Commission and passing a new ICT law.
This document discusses the challenges of social media for enterprises and how to manage electronic discovery related to social media. It notes that most information today is unstructured and unmanaged, including social media content created by employees. It defines social media and contrasts traditional enterprise data with social media data. It recommends addressing social media challenges through information governance policies, education, data mapping, and electronic discovery tools that can collect, preserve, and process different types of enterprise data, including ephemeral social media content.
Darriale Bradley had to do her schoolwork at McDonald's because she lacked home internet access. However, after learning about a low-cost internet program, her family was able to get high-speed internet at home for $10 a month, allowing Bradley to complete schoolwork and research scholarships that helped pay for college. The document discusses how lack of home internet access puts students and job-seekers at a disadvantage as online access becomes increasingly necessary for school, work, and services. It also examines efforts to expand broadband access and their economic and social benefits.
The document discusses the implementation of a 1:1 program that provides each student with a netbook computer. It argues that this program aims to prepare students for the technological skills needed for future jobs by teaching students to use software programs and manipulate computers. The 1:1 program allows students to learn at their own pace and build knowledge through individual and guided use of their netbooks. The document also discusses how social media networks have become integrated into daily life and can be used to share information and help others with technological problems. It believes that providing students with constant internet access through this program will allow education to be more engaging and help students who lack experience in accessing online information.
Presentation given at the Linguistic Data Consortium (LDC), University of Pennsylvania, April 2019. Based on presentations at the 6th ACM Collective Intelligence Conference, 2018 and the 6th AAAI Conference on Human Computation & Crowdsourcing (HCOMP), 2018. Blog post: https://blog.humancomputation.com/?p=9932.
The document compares and contrasts the biblical figures of Adam and Christ, referred to as the first and second Adam. It notes similarities between the two such as both being placed miraculously, being sinless originally, being tempted, being named by God, being married, and having families. However, it also outlines contrasts in that Adam brought death to the world through his sin while Christ brought life through his sacrifice to redeem humanity. The document explores the roles of Adam and Christ in changing access to the tree of life and their impacts on life and death for humanity.
El documento trata sobre un aula de la naturaleza en Cerralba dirigida por Josefa Manceba. El aula busca enseñar a los estudiantes sobre el medio ambiente a través de actividades prácticas y aprendizaje experiencial en 2015.
La ciudad de Asunción es la capital y ciudad más grande de Paraguay. Fundada en 1537 por Juan de Salazar y Espinosa, es el centro político, económico, industrial y cultural del país. Con más de 2.5 millones de habitantes en su área metropolitana, Asunción es un importante centro de negocios y transporte en el sur de América del Sur.
IBSA is a nonprofit organization that provides programs to promote self-sufficiency for low-income individuals. Their programs include youth development activities, employment training, small business support, and special initiatives like a car donation program and phone services for job seekers. IBSA's mission is to provide humanitarian services to those in need. The document encourages donations to support IBSA's programs and services.
Este documento trata sobre la neumonía. Explica que la neumonía es la inflamación del pulmón causada generalmente por infecciones bacterianas, virales o de hongos. Las personas de mayor riesgo son los mayores de 65 años, menores de 2 años o aquellos con problemas de salud subyacentes. El documento también cubre los síntomas, prevención, vacunas y recuperación de la neumonía.
Daniela Homza Stark is a creative industrial designer with over 20 years of experience in product development. She specializes in translating client visions into market-ready products through human-centered design processes. Some of her past projects include designs for medical devices, consumer products, and packaging. She currently works independently through her own design firm, DHS Design LLC, where she delivers high-quality work on tight deadlines.
Un padre o tutor legal está dando su consentimiento para que los profesionales de orientación en la escuela del estudiante puedan intercambiar información verbalmente con profesionales externos sobre las medidas de intervención que se están aplicando al estudiante. El padre o tutor firma el documento para proporcionar este consentimiento.
Агентство социальной информации - это независимое информационное агентство и некоммерческая организация, поддерживающая гражданские инициативы и реализующая социальные проекты.
Став спонсором одной из тематических рубрик, Вы внесете свой вклад в развитие гражданского общества и вдохновите других своим примером на ответственные и серьезные поступки.
Agency for Social Information is an independent information agency and a non-profit organization that supports civil initiatives and implements social projects.
If you become a sponsor of one of the informational sections on our web-site, you will contribute to the development of civil society and inspire others by your example to responsible and serious actions.
Equipamentos para Águas Residuais _ PortuguêsVibropac
Este documento fornece informações sobre produtos e serviços de tratamento de água e efluentes oferecidos pela Vibropac, incluindo unidades combinadas de pré-tratamento, preparadores de polímero, grades paralelas, peneiras rotativas, sistemas de injeção química e filtração. A Vibropac também oferece serviços de instalação, comissionamento, treinamento e manutenção.
The document discusses how consumer purchasing behavior has become more complex in the multi-device world. It notes that consumers may research products on desktop and complete purchases in stores, or research on mobile devices and purchase elsewhere. It emphasizes that companies need to optimize their websites for multiple screens and capture conversions across different devices to fully understand consumer paths. The document also introduces tools from Google like their Full Value of Mobile Calculator and call tracking capabilities to help companies better measure conversions in the multi-screen environment.
This document outlines donor levels and benefits for the organization Friends of IBSA. Donors who give between $50-$150 are listed on the online donor wall and receive event discounts and social media thanks. Donors of $150-$500 receive the same benefits plus a business listing. Donors of $500-$1,000 are listed on the donor wall, receive social media thanks, and can include their logo and link on the wall. The form allows donors to select a payment method and provides an area for business contact information.
Este documento presenta un protocolo para evaluar a un estudiante con dificultades de aprendizaje. El protocolo incluye secciones para describir aspectos generales del estudiante, sus capacidades intelectuales y sociales, su estilo de aprendizaje, y sus habilidades en lenguaje y matemáticas. El objetivo es obtener una comprensión completa del estudiante para desarrollar un plan de apoyo adecuado.
This document provides an introduction to a unit where students will work in groups to create movies about e-safety using Windows Movie Maker. Students will research e-safety topics like cyberbullying, sexting, and viruses. They will brainstorm ideas for their movies and do research as a group. The goal is for students to have fun being creative and learning about the importance of e-safety through making films.
Cayetano Roberto Campisi envía su currículum a una empresa en busca de un nuevo puesto laboral. Tiene 54 años y experiencia en administración, gestión, producción y radiodifusión. Ha creado varias radios en internet sobre música romántica, infantil y música nacional argentina. Busca una posición que aproveche sus habilidades en áreas como administración, gestión, producción o radiodifusión. Se ofrece a una entrevista para profundizar sobre cómo podría contribuir a la empresa.
This document outlines the content of a Selenium course, including:
1. An introduction to Selenium, Java, and key Selenium concepts like the Selenium IDE, WebDriver, and TestNG.
2. Technical topics covered include installing Java and Eclipse, Java basics, using loops and arrays, object-oriented programming principles, and configuring the Selenium RC and WebDriver.
3. The document also discusses testing frameworks like TestNG and tools like Ant, and concludes with more advanced topics like the Selenium Grid for parallel testing and different automation frameworks.
"Developments in Accessibility of Information" - Access Israel 's 6th Annual ...Ricardo Garcia Bahamonde
Presentation on Digital Transformation trends, the risks of the digital accessibility gap becoming increasingly large and orientations for organizations that want to adopt digital accessibility
This document summarizes how technology and the internet have changed over the past 10 years. It discusses the rise of Google and social media, how e-business has evolved, and the growth of online education. It also outlines how standardization in areas like data collection, accountability metrics, and common course numbering can help improve student outcomes at state higher education systems. Technology is enabling greater standardization, and while challenging for education, it provides opportunities if implemented carefully with student needs in mind.
Geospatial Intelligence Middle East 2013_Big Data_Steven RamageSteven Ramage
Some initial considerations and discussion points around geospatial big data. Location adds context and relevance. Need to consider a number of V factors including Value.
CapTech Talks Webinar October 2023 Bill Butler.pptxCapitolTechU
Slides from a webinar presented Oct. 19, 2023 by Capitol Technology University and featuring Dr. William Butler, discussing cyber education challenges in 2024.
Founding a Data Democracy: How Ivy Tech is Leading a Revolution in Higher Edu...Brendan Aldrich
Is your data reliable, intuitive, interactive, and immediately available to everyone who needs it? This presentation explores how Ivy Tech, the nation's largest singly-accredited community college system, coupled cloud-based and open-source platforms with predictive analytics and sustainable data practices to create a cost-effective governed data democracy that's helping administrators, staff, and faculty access the data they need to drive student success.
The document summarizes a meeting of the National Cybersecurity Network focused on building partnerships between undergraduate cybersecurity programs, technology, big data, and evidence-based practices. The agenda included discussions on the national cybersecurity landscape, assessing priority areas, meeting regional workforce needs, and establishing industry partnerships. There were also presentations on building effective cybersecurity programs and connecting academic credit with work experience and certifications.
It has been said that Mobiles +Cloud + Social + Big Data = Better Run The World. IBM has invested over $20 billion since 2005 to grow its analytics business, many companies will invest more than $120 billion by 2015 on analytics, hardware, software and services critical in almost every industry like ; Healthcare, media, sports, finance, government, etc.
It has been estimated that there is a shortage of 140,000 – 190,000 people with deep analytical skills to fill the demand of jobs in the U.S. by 2018.
Decoding the human genome originally took 10 years to process; now it can be achieved in one week with the power of Analytic and BI (Business Intelligence). This lecture’s Key Messages is that Analytics provide a competitive edge to individuals , companies and institutions and that Analytics and BI are often critical to the success of any organization.
Methodology used is to teach analytic techniques through real world examples and real data with this goal to convince audience of the Analytics Edge and power of BI, and inspire them to use analytics and BI in their career and their life.
Non-Technologist’s Guide to Technology Support of Adult LearnersCurtis A. Carver Jr.
The document summarizes key technology services and priorities for the University System of Georgia (USG). It discusses the USG private cloud called PeachNet, which provides bandwidth, storage, backup, and virtual data center services. It also highlights learning tools like Desire2Learn, DegreeWorks, GALILEO, and INGRESS that support online learning and credit transfer. The USG aims to enhance these services and tools to raise education across Georgia through improved access and learning experiences.
David Keyes digital inclusion i-conference 2-8-11Brian Rowe
This document discusses digital inclusion and access to technology for underserved groups. It notes that meaningful access requires availability and affordability of internet connectivity and devices, digital literacy skills to use technology effectively, and relevant online content and services. While technology adoption is increasing overall, significant gaps remain for those with lower income, education levels, older age, language barriers or disabilities. Community technology centers aim to provide public access in trusted settings to help address barriers and close the digital divide.
Web Filtering Presentation to Student Senatejeremychobbs
Jeremy Hobbs, the Chief Information and Facilities Officer at UCDSB, presented an overview of the IT department and its strategic goals. The IT department supports over 10,000 computers across 100 locations with only 17 staff members. Some of its key responsibilities include supporting the student information system, email servers, websites, and a large private wide area network. Looking ahead, the department aims to increase personalization, mobility, and cloud services while standardizing infrastructure and automating non-essential tasks to improve efficiency with limited resources. The presentation also addressed the department's web filtering strategy and plans to differentiate policies based on user identity and age.
Use of Computational Tools to Support Planning & Policy by Johannes M. BauerLaleah Fernandez
Quello Center Director Johannes M. Bauer sharing his insights on the use of big data analytics and computational tools for policy design, implementation and monitoring at the 9th Annual Workshop on Survey Methodology, organized by NIC.br and ENCE, in São Paolo, Brazil, on May 21, 2019
The memo recommends three ways for the Computown Public School System to bridge the digital divide:
1. Build an adequate technology infrastructure with hardware, networking, and internet connectivity using free or low-cost resources.
2. Take advantage of free online educational resources like email accounts, web hosting, and course management tools to boost communications and classroom efficiency.
3. Enable administrators, teachers, students, and parents to utilize the new technology and ensure continual learning through hierarchical leadership and support from agencies that provide technology education.
Dr. James C. Spohrer discusses software convergence and how software is progressing at least as fast as hardware. He cites a study showing a 43 million-fold improvement in solving an optimization problem from 1988-2003, with faster processors accounting for a 1,000-fold improvement and better algorithms accounting for a 43,000-fold improvement embedded in software. Spohrer also discusses emerging technologies and trends like cognitive computing, smart cities, the internet of things, and how they are examples of software convergence across different domains that will transform business and society.
Cisco Live 2014: IoE in Action Public Sector Media SessionMarc Musgrove
1. There is excess parking demand and low availability during peak hours between 11am-2pm and 5pm-8pm, indicating rates may be too low during these times.
2. Analyzing occupancy rates by location reveals varying patterns of use that could inform price adjustments to specific spaces.
3. The data provides an evidence-based way for the city to change parking rates to influence driver behavior and increase space availability during high demand periods.
The digital divide refers to the gap between people who have access to the internet and the skills to use technology. There are two main aspects - access to computers and related technologies, and technological literacy. Examples of the digital divide include differences in infrastructure between urban and rural areas, cost of internet access, blocking of internet services, and differences in education and access to computer science classes. Barriers to crossing the digital divide include lack of locally and culturally relevant online content, as well as issues of poverty, poor infrastructure, and lack of digital literacy and hardware support in developing countries. Potential solutions involve government policy, non-profit programs to increase digital literacy, and use of new technologies like mobile computing and social media.
Aitp presentation ed holub - october 23 2010AITPHouston
This presentation from Gartner discusses 10 top IT infrastructure and operations trends for organizations to watch. The trends covered include virtualization, big data, energy efficiency, unified communications, staff retention, social networks, legacy migrations, compute density, cloud computing, and converged fabrics. For each trend, the presentation provides details on how the trend affects organizations and recommendations on how to prepare and respond. The overall message is that IT leaders need to be aware of these emerging trends and develop strategies to leverage and adapt to them.
Webinar - Office Productivity in the Cloud - 2016-08-18TechSoup
Visit http://www.techsoup.org for donated technology for nonprofits and libraries!
Interested in using office productivity tools in the cloud, but not sure where to begin? You can replace or add to many desktop-installed tools to create documents, spreadsheets, presentations, and more by folding cloud productivity applications into your daily routine.
Access documents from anywhere, collaborate on that budget report with remote board members, share files with your development staff on the road so you can meet those grant deadlines!
In this free webinar with Tech Impact and Amazon Web Services, learn about the ins and outs of using cloud office productivity tools, the benefits and limitations, and get help deciding whether your organization should make the switch. We also highlight the office productivity toolset from Amazon Web Services, so you can get a peek at what one looks like in real-time.
Discusses sociotechnical issues that arose in the design of a national digital learning system intended for use by more than a million students and their teachers
Topics to be covered include consolidation, Complete College Georgia, predictive analytics, student success, massive open online course (MOOC) maturity model,
MOOC experiments and results, and statewide technology frameworks that enable transformation. Our intent is to show what worked, what did not, lessons learned,
and ongoing experiments and plans
The document discusses emerging threats and opportunities in cybersecurity. It notes that nation-state threats are growing, with China, Russia, the US and UK posing the largest threats. The document references a Mandiant report finding extensive hacking by a Chinese military unit. It questions if organizations can defend against thousands of trained hackers. The document also discusses how the internet has impacted social norms and the battle for truth online. It suggests security, business intelligence, cloud computing, big data, social media, privacy and mobility as emerging opportunities.
Innovation, agility, and a fight for survival a love storyv2Curtis A. Carver Jr.
This document discusses innovation, agility, and survival in the face of growing cyber threats. It notes that state-sponsored hacking groups like China's Unit 61398 pose serious risks, maintaining access to companies for over a year on average. To adapt, organizations must constantly innovate and fail gracefully to increase agility. CIOs must sense changes and threats to embrace their dual role of protecting systems while enabling innovation through controlled risk-taking. Threats and change create opportunities if met with the right response.
The document discusses emerging threats to cybersecurity from nation states like China, Russia, and Iran, citing a report that a Chinese military group compromised over 140 companies over 10 years. It notes that nation states can break into systems if they want. It also discusses how the internet undermines truth and could enable "denial of truth attacks" and "zombie armies of disinformation." Additionally, it argues that the internet has flattened norms of human behavior in ways that threaten humanity's existence. However, it also notes emerging opportunities around mobile devices, cloud computing, big data, and social/location technologies if organizations respond quickly and think about security, business, and consumerization.
Deploying and utilizing statewide private cloud lessons learnedCurtis A. Carver Jr.
Transforming the data center to a virtualized and private cloud environment is one of the biggest trends in IT today. However, while the move to cloud-based data addresses some security concerns, it is also causing an architecture evolution in which new security risks are emerging. We’ll look at the move to virtualize data centers, with an eye to identifying and addressing the new types of security concerns that come with this trend.
The document discusses emerging threats to cybersecurity from nation states like China and Iran, referencing a report about Chinese hackers maintaining access to companies for over a year. It notes the growing battle for truth online conducted by both experts and amateurs. While these threats endanger humanity, opportunities also exist in harnessing the intelligence of billions of connected people and emerging technologies to improve security and governance through data sharing and classification. The presentation calls for action and conversation on addressing these challenges.
Windows of Opportunity in Hallways of Distractions: the race between threats,...Curtis A. Carver Jr.
4. Curtis A. Carver Jr. “Windows of Opportunity in Hallways of Distractions: the race between threats, security, and collective” Atlanta, GA. June 6, 2013. Argoyle Chief Information Officer Leadership Forum. Keynote Speaker
This document discusses mentoring goals and strategies at West Point. It provides the following key points:
- West Point aims to prepare graduates to respond effectively to a changing world through creativity, moral awareness, lifelong learning, and strong communication skills.
- Mentoring can help accomplish West Point's goals of developing well-rounded, adaptable leaders. Rather than optimizing only the classroom, mentoring involves inspiring and empowering individuals through one-on-one interactions on their own terms.
- A example is provided of a West Point graduate who was mentored and continues to mentor others, illustrating how mentoring relationships can last a lifetime.
The document discusses various examples of using the right information at the right time to support effective decision-making, including building systems to support tactical decisions in wartime, strategic decisions in the War in Afghanistan, and strategic decisions for a state university system. It also examines why the systems worked well and the long-term impacts of implementing decision support systems.
The document discusses system level innovation at the University System of Georgia. It describes starting as the new Vice Chancellor and Chief Information Officer, with challenges that included low morale, siloed agencies, and audit findings. Early steps focused on reorganizing, addressing salary issues, and improving customer relationships. Goals were established to be a nationally recognized leader in higher education IT. Innovations included a new learning management system, upgrades at the system office, and developing a private cloud.
The document discusses IT innovation in the University System of Georgia amid declining resources. It notes rising enrollments but decreasing state funding per student. Charts show enrollment growth outpacing state funding increases. The system is pursuing innovation through shared services across campuses to reduce costs, including infrastructure as a service and IT project management as a service. Innovation is also needed to engage the upcoming Generation Z and leverage social media for collaboration across campuses. Key systems like the LMS and SIS are centralized to realize economies of scale, while allowing campuses flexibility for additional services.
The document discusses 4 important IT trends in 20 minutes:
1. A shortage of IT personnel.
2. The movement of IT services to public and private clouds to gain economies of scale and reduce costs.
3. The consumerization of IT and how personal devices and apps will impact campuses.
4. The rise of big data, location-based data, and using data to make decisions. Centralizing systems across the University System of Georgia can provide cost savings and efficiencies.
This document discusses bringing personal devices into the workplace at state agencies. It notes that consumerization of IT will change workplace culture and processes. The author advocates embracing this change rather than trying to maintain control. The document outlines key questions around supporting different devices, applications, data usage, and balancing work and personal life on these devices. These include questions around which operating systems and apps to support, managing data security and privacy, and setting appropriate usage policies. The author argues that state government faces unique challenges in enabling bring-your-own-device policies but should not try to maintain full control and instead focus on protecting data.
The document discusses the need for organizations to build a strong security culture. It notes that traditional perimeter defenses and passive security awareness training methods are no longer sufficient due to the increasing speed and complexity of cyber attacks. Building an effective security culture where all employees understand their security responsibilities is presented as a better approach to addressing modern security challenges. Specific reasons cited include attacks now occurring faster than software patches can be applied, vulnerabilities being exploited before organizations are aware, and individual employee actions impacting the security of the whole organization.
The document summarizes a keynote presentation given to the GIL User Group about the current state and future direction of Galileo and libraries in Georgia. It discusses how libraries are evolving from physical collections to becoming places of collaboration and value-added resources. It also outlines OIIT's strategic plan which recognizes libraries' important role and a strategic roadmap for the future, including developing universal discovery tools, mobile apps, distance education resources, and more. The presentation concludes with an invitation for questions and discussion.
“Data security prep for the holidays or how not to go dark on black fridayCurtis A. Carver Jr.
This document discusses the importance of having strong security policies, technology, and education programs to protect against cyber threats. It provides examples of how social engineering attacks are increasingly targeting organizations and individuals. The document advocates for taking a holistic approach involving policy, technology, and educating users to recognize abnormal behaviors. It also describes some innovative education programs, like having students launch simulated phishing attacks against each other, to increase awareness in a memorable way.
Transformation and innovation in the new normal a call to actionCurtis A. Carver Jr.
This document discusses the need for transformation and innovation in higher education in the "new normal" post-COVID era. It provides background on the University System of Georgia, which oversees 35 public higher education institutions. It highlights the impact of education on lifetime earnings and discusses technology trends, such as the consumerization of IT, that require institutions to maintain control while gaining flexibility, pace and agility by losing micromanagement gracefully. The vice chancellor calls the institutions to action to adapt to the changing environment and rising expectations for online and technology-enabled learning.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Rock eagle thursday presentation
1. Student Success: An Update to
the USG IT Community
Dr. Curtis A. Carver Jr.
Vice Chancellor and CIO
Board of Regents
2. Agenda
• System Update
• Georgia Student Success
• Future Trends
• Services Update
• Questions, Comments, a Conversation
3. ITS Services
Service
Availability
Service
2013 20 Best Ideas to Steal:Governor’s Data
Data Analytics
100.00% INGRESS
Distance Ed
99.93% LMS
Email
99.82% SharePoint
100.00%
99.98% PeachNet
Financials (iS)
Availability
99.99%
2013 ED-Tech Cover Article: PeachNet
99.98%
Financials (PS)
99.88% Student
2013 GTA Innovation Award: The Advising
Point
GALILEO
100.00% Student Info System
GIL
100.00%
2013 Information Week Top 500: #9
• Highest Ranked Educational Company
• Highest Ranked Georgia-based Company
100.00%
99.95%
99.89%
5. Percent of Adults Age 25 to 34 Holding an
Associate’s Degree or Higher
Source: OECD Education at a Glance (2008); U.S. Census Bureau; American College Survey
9. I need a low cost, flexible
higher educational
experience that fits the rest
of my lifestyle.
Residential
Experience
Access
Selective
Experience
Experience
Student
Success
10. I need an educational
experience utilizing the latest
technologies and graduate
with no debt.
Residential
Experience
Access
Selective
Experience
Experience
Student
Success
11. I need a selective higher
educational experience at
one of the best institutions in
the world.
Residential
Experience
Access
Selective
Experience
Experience
Student
Success
15. This space for rent by
Chinese National Army.
Please contact Dr. Curt
Carver as we can read all
his email anyway.
PREMISE 1: GROWING THREAT
16. Emerging Threats
(on a scale of 1 to 10)
10 United States,
United Kingdom,
Russia
7
China
3
Iran
17. Can You Defend Against
100,000 Professionally
Trained Hackers?
18. Consider Mandiant Report on AG1
• Believed to be People Liberation Army Unit 61398.
• State sponsored, state funded, state secret.
• Since 2006, they have compromised 141 companies
spanning 20 major industries.
• Maintained access for an average of 356 days. Longest
measured access was 1,764 days.
19. Focus on Nation States
If a nation state wants
to break into your system,
will they?
20. Quiz
• Question: What happens if you Google a
system error?
• Answer: Nation states run a site that provides
guidance on answering a system error while
attacking your computer.
23. It is the best of times,
for morons and geniuses alike.
24.
25. Quick Recap
We live in a world of growing threats where a
battle for the truth rages conducted by morons
and geniuses alike, operating from safe havens
created by a flattening of the norms of human
behavior which threaten the very existence of
mankind….
[run-on but
very depressing sentence continues]
30. Desire2Learn
• On budget and on time
• Strong adoption by campuses
– 100% system availability in first year
– 50 million hits a day on ITS hosted services –
more than 160 times a day per student
– 15,000 concurrent sessions at any given time
• Version 10.3 release in December
31. Desire2Learn
• Intelligent agents available now
(think free predictive analytics)
• 7, 8, 9 campuses implementing D2L analytics
• Functionality Support (think open enrollment)
• MOOC Support (particularly state MOOCs)
– Need more student registration support
– Need more peer assessment support
32. Central Banner
• New Banner Managed Services going very well:
– Campus control, cost effective, high availability
– 9 institutions in new model
– Two more 2 institutions transitioning in FY15
• 1/3 of Banner Georgia Mods retired allowing
increased focus on important mods like HOPE.
• Increased communications with campus
communities on desired functionality.
33. Banner Contract
• Up for renegotiation in 2017.
• Campuses who bought services are contractually
bound to those services until 2017.
• There is limited flexibility to prematurely curtail
the contract.
34. DegreeWorks
• All USG and TCSG institutions are
utilizing this software.
• 11 institutions are hosted by ITS.
• Complete campus control and lowest possible cost.
• Scribing available at no additional cost (2 scribes).
35. PeachNet
• Major Upgrade to backbone underway
from 2 -> 10 Gbps.
• Dual homing of institutions bid and work underway.
• Working on finding a dual path to the
last institution (Coastal).
• Department of Education is likely join PeachNet in
FY15. Will create tremendous opportunities for
USG.
36. PeachNet
•
•
•
•
Storage as a service
Backup as a service
Virtual Data Centers as a service
Virtual Computers as a service (maybe, soon, you
tell me)
• Services run about 25% less expensive than
Amazon.
37. GALILEO
• New GALILEO Discovery Tool
(think Google of Steroids)
• Possible reinvestment in GALILEO
– Focus on affordable resources
– New Library Management System
– Possible greater inclusion of other educational
state agencies
38. Other Topics
Consumerization of IT
• Bring Your Own Device
Standard
• Cell Phone Stipends
• Mobility
– Ellucian
– N2N
• IT Handbook
– Change Management
• Data
– Regent Mobile App
– Desire2Learn
– Banner
• Cloud
– PeachNet
– Amazon, Microsoft 365,
Google, PeachNet