Skip to main content

Home/ elearning 2.0/ Group items tagged viewpoint

Rss Feed Group items tagged

Ihering Alcoforado

Digitisation Perspectives - Review | Subject Centre for Information and Computer Sciences - 2 views

  •  
    Book Reviews Book title: Digitisation Perspectives Type: book Author: Ruth Rikowski Year: 2010 Edition: 1st ISBN: 9460912982 Publisher: Sense Publishers Publisher's Description: This book examines various views and perspectives on digitisation. As Simon Tanner, Director Digital Consultancy, King's College London says in the Foreword: "Digitisation has become a cultural, scholastic, economic and political imperative and raises many issues for our consideration." Furthermore, that the book: "...seeks to address and answer some of the big questions of digitisation... It succeeds on many levels..." There are 22 contributors in the book, all experts in their fields. The book is divided into six parts: Part 1: 'Background and Overview to Digitisation and Digital Libraries' Part 2: 'Digitisation and Higher Education' Part 3: 'Digitisation and Inequalities' Part 4: 'Digital Libraries, Reference Services and Citation Indexing' Part 5: 'Digitisation of Rare, Valued and Scholarly Works' Part 6: 'Futuristic Developments of Digitisation' Topics covered include electronic theses, search engine technology, digitisation in Africa, citation indexing, reference services, the Scholarly Publishing and Academic Resources Coalition, new media and scholarly publishing. The final chapter explores virtual libraries, and poses some interesting questions for possible futures. The book will be of particular interest to information professionals, educators, librarians, academics and I.T. and knowledge experts. Ruth Rikowski concludes by indicating that: "...hopefully, the book will provide a source of inspiration for further research, leading to some more effective ways to proceed with the digitisation process. Also, that it will be possible to do this within a framework that can be used for good rather than ill, and for the benefit of many." Reviewer: Eric Jukes (Formerly of College of Haringey, Enfield and North East London) Book Rating: 5/5 Buy this book from Amazon  Review Summary
Nigel Coutts

Questioning our Assumptions and Considering Multiple Viewpoints - The Learner's Way - 0 views

  •  
    In "Factfulness", Hans Rosling shares a valuable insight into why we must question our assumptions. In times when we are bombarded with information, when false claims abound, having a disposition towards scepticism seems vital. Rosling urges us to not only question the facts we are presented with but the internal biases which influence how we interpret these facts.
Antwak Short videos

What is Identity and Access Management? - 0 views

  •  
    IDENTITY AND ACCESS MANAGEMENT Identity and access management (IAM) is a collective term that covers merchandise, processes, and policies for managing user identities and regulating user access in the company. Access and User are two very important IAM theories. Access refers to the permission or authorization given to access a file (read, create or modify a doc). Users can be employers, auditors, suppliers, contractors or customers. How Identity and Access Management works IAM systems are intended to perform three key undertakings: identity, authenticate, and authorise. This means, just the right people ought to access PCs, equipment, software applications, any IT assets, or perform certain tasks. IAM components forming up an IAM system include: 1. A data set containing users identities and access privileges. 2. IAM instruments for creating, observing, modifying, and deleting access advantages. 3. A system for inspecting login and access history. 4. The list of access privileges needs to be updated including new entry users and for users whose roles are ever-changing. 5. IAM works generally fall under IT divisions or sectors that handle Cybersecurity and data management. Examples of Identity and Access management Here are instances of IAM at work. When a user tries to log in to the system, the system checks his identity with the data saved in the database. Once the user is identified after authentication as the right user, he's permitted to post his work. A person who works as a contributor to content management has full access to make changes in the database. A production operator can see an online work process however may not be permitted to modify it. Through IAM, specific clients in the association are permitted to access and deal with sensitive data. And if there's no IAM, anybody (like unauthorised ) could get to confidential organization records, prompting a potential data breach. In this viewpoint, IAM assists organizations with meeting rigid
Mike Hasley

The Pulse: How Do You Define 21st Century Skills? - 0 views

  • Crafting a well-written email to an adult Holding online video chats with community members, leaders, and decision makers Analyzing the differences between viewpoint-clashing Web sites such as Wikipedia.org and Conservapedia.com Blogging responsibly Having one student write a research paper using only online resources, and another write a paper on the same topic using only print resources, and compare and contrast the final papers
    • Mike Hasley
       
      Great ideas for the classroom
1 - 6 of 6
Showing 20 items per page