Skip to main content

Home/ CTLT and Friends/ Group items tagged security

Rss Feed Group items tagged

Joshua Yeidel

U.S. enables Chinese hacking of Google - CNN.com - 1 views

  •  
    "# Google says hackers from China got into its Gmail system # Bruce Schneier says hackers exploited feature put into system at behest of U.S. government # When governments get access to private communications, they invite abuse, he says # Government surveillance and control of Internet is flourishing, he says"
  •  
    A security expert looks at who's spying on whom... (hint: it's not just China)
  •  
    But China is clearly among the most aggressive in this area. I remember being taught in the military that most espionage is industrial (by governments for industry) but Universities are also targets for various classified research, such as DARPA funded research. I think of perhaps shock physics, for example. Certain kinds of spying are essential for peace--that which is to determine "intent" of the other helps eliminate the ill-affects of paranoia. Other kinds can be detrimental to peace, such as China's many successful attempts at acquiring U.S. military technological and operational information.
Corinna Lo

The End in Mind » An Open (Institutional) Learning Network - 0 views

shared by Corinna Lo on 15 Apr 09 - Cached
  •  
    Jon said "I wrote a post last year exploring the spider-starfish tension between Personal Learning Environments and institutionally run CMSs. This is a fundamental challenge that institutions of higher learning need to resolve. On the one hand, we should promote open, flexible, learner-centric activities and tools that support them. On the other hand, legal, ethical and business constraints prevent us from opening up student information systems, online assessment tools, and online gradebooks. These tools have to be secure and, at least from a data management and integration perspective, proprietary. So what would an open learning network look like if facilitated and orchestrated by an institution? Is it possible to create a hybrid spider-starfish learning environment for faculty and students?"
Theron DesRosier

Engaging Departments: Assessing Student Learning, Peer Review single issue - 1 views

  •  
    "Description This issue explores how departments are developing assessment approaches that deepen student learning. Recognizing that most faculty identify strongly with their discipline and that students are engaged in more complex and sophisticated practice of liberal learning as they complete their majors, the issue presents articles that advance integrative and engaged learning in and across disciplines. The features draw on sessions and presentations from AAC&U's 2009 Engaging Departments Institute. " A pdf download is available on this page.
Joshua Yeidel

Five fallacies of cloud computing - 4 views

  •  
    "much of the thinking and hype surrounding cloud computing is built upon fallacies while ignoring the market realities. Let me outline those fallacies here." Especially note Fallacy #5, which includes a discussion of "trust".
Theron DesRosier

Enemy Lurks in Briefings on Afghan War - PowerPoint - NYTimes.com - 0 views

  • “PowerPoint makes us stupid,” Gen. James N. Mattis of the Marine Corps, the Joint Forces commander, said this month at a military conference in North Carolina. (He spoke without PowerPoint.) Brig. Gen. H. R. McMaster, who banned PowerPoint presentations when he led the successful effort to secure the northern Iraqi city of Tal Afar in 2005, followed up at the same conference by likening PowerPoint to an internal threat.
  • The news media sessions often last 25 minutes, with 5 minutes left at the end for questions from anyone still awake. Those types of PowerPoint presentations, Dr. Hammes said, are known as “hypnotizing chickens.”
Gary Brown

(the teeming void): This is Data? Arguing with Data Baby - 3 views

  • Making that call - defining what data is - is a powerful cultural gesture right now, because as I've argued before data as an idea or a figure is both highly charged and strangely abstract.
  • In other words data here is not gathered, measured, stored or transmitted - or not that we can see. It just is, and it seems to be inherent in the objects it refers to; Data Baby is "generating" data as easily as breathing.
  • This vision of material data is also frustrating because it has all the ingredients of a far more interesting idea: data is material, or at least it depends on material substrates, but the relationship between data and matter is just that, a relationship, not an identity. Data depends on stuff; always in it, and moving transmaterially through it, but it is precisely not stuff in itself.
  • ...3 more annotations...
  • Data does not just happen; it is created in specific and deliberate ways. It is generated by sensors, not babies; and those sensors are designed to measure specific parameters for specific reasons, at certain rates, with certain resolutions. Or more correctly: it is gathered by people, for specific reasons, with a certain view of the world in mind, a certain concept of what the problem or the subject is. The people use the sensors, to gather the data, to measure a certain chosen aspect of the world.
  • If we come to accept that data just is, it's too easy to forget that it reflects a specific set of contexts, contingencies and choices, and that crucially, these could be (and maybe should be) different. Accepting data shaped by someone else's choices is a tacit acceptance of their view of the world, their notion of what is interesting or important or valid. Data is not inherent or intrinsic in anything: it is constructed, and if we are going to work intelligently with data we must remember that it can always be constructed some other way.
  • We need real, broad-based, practical and critical data skills and literacies, an understanding of how to make data and do things with it.
  •  
    A discussion that coincides with reports this morning that again homeland security had the data; they just failed to understand the meaning of the data.
Joshua Yeidel

Are You Doing Business In The Cloud? - Stepcase Lifehack - 0 views

  •  
    Benefits and Risks of business use of cloud computing
  •  
    Some considerations listed here are relevant as CTLT looks at cloud computing
1 - 7 of 7
Showing 20 items per page