ROAR - LanSchool assists teachers in classroom management and computer monitoring - 8 views
-
LanSchool
-
How does it work and what can it do?
-
As long as the students computers are connected to the teachers network, the program will allow teachers to send, share and monitor contents of the students, share a student's screen with the class and direct students to particular websites and programs. Teachers can also send individual notes to a students' screens, decreasing class interruptions.
-
When the students attend a class, they will sign onto the teacher channels. By signing onto the teacher's channel, it allows teachers to monitor their students using their laptops during class time. Teachers can also control the student's screen, share a screen with the class etc.
-
This program allows teachers to view and control students' computers when they are logged into the teacher's channels during lessons. This program would only work when they are connected to the school's network.
-
When the students are in a classroom to attend a particular class, the program designed will be allow the teacher in charge to view every students computer screen as the students connect to the network.
-
-
LanSchool students download the software onto their computer,
-
can you for see any problems with this?
-
Since the program allows the teacher to access and control the student computer, theres a possibility that the teacher access students files on their computer while they're away.
-
A bit related to invasion of privacy.
-
This allows teachers to view student's personal details/files without consent, when they are logged into their channel.
-
This might lead to privacy problems due to the lack of security in the program. When the students connect to the teacher's computer, the teacher will have full access of the student's computer.
-
-
When students leave the class, they sign off of the channel, disabling the teacher from viewing the student’s screen.
-
how does this work
-
when the student's laptop is not within a certain range from the teacher's channel, students are automatically sign off of that channel (not sure if this is done by network or just the connection between the teacher's computer and the student's computer)
-
The program would stop broadcasting the student's screen as soon as they leave the "channel". The program would use the school network to proxy the two computers and once the student has logged off the "channel", the program stops the connection
-
In order to run LanSchool students download the software onto their computer. When students leave the class, they sign off of the channel, disabling the teacher from viewing the student's screen. Since they leave the class, their computers would either be on standby or switch off mode, therefore the network accessibilty on the students computer would be switched off as well, therefore disabling connection with the network, and disabling the teacher from viewing the students screen.
-
When the student leaves the network or exit the channel that they signed in to in order for the teachers to view their screens, the teachers will be able to access or view the students screen afterwards. Once the connection is lost, the program disables the connection between the 2 parties.
-
Supermarkets Nix Self-Checkout - 7 views
Five tips for protecting customer data | TechRepublic - 4 views
-
encrypt
-
Tokenization
-
anti-phishing software
- ...1 more annotation...
Auracle Geospatial Science, Inc. (AGS) Remote Sensing and Geospatial Intelligence News ... - 4 views
-
Figure 4 illustrates a satellite remote sensing process as applied to agricultural monitoring processes. The sun (A) emits electromagnetic energy (B) to plants (C). A portion of the electromagnetic energy is transmitted through the leaves. The sensor on the satellite detects the reflected energy (D). The data is then transmitted to the ground station (E). The data is analyzed (F) and displayed on field maps (G).
Gantt Charts - Project Management Tools from MindTools.com - 4 views
-
Figure 1. Gantt Chart Example: Planning a custom-written computer project Task Earliest start Length Type Dependent on... A. High level analysis Week 0 1 week Sequential B. Selection of hardware platform Week 1 1 day Sequential A C. Installation and commissioning of hardware Week 1.2 2 weeks Parallel B D. Detailed analysis of core modules Week 1 2 weeks Sequential A E. Detailed analysis of supporting modules Week 3 2 weeks Sequential D F. Programming of core modules Week 3 2 weeks Sequential D G. Programming of supporting modules Week 5 3 weeks Sequential E H. Quality assurance of core modules Week 5 1 week Sequential F I. Quality assurance of supporting modules Week 8 1 week Sequential G J. Core module training Week 6 1 day Parallel C,H K. Development and QA of accounting reporting Week 5 1 week Parallel E L. Development and QA of management reporting Week 5 1 week Parallel E M. Development of Management Information System Week 6 1 week Sequential L N. Detailed training Week 9 1 week Sequential I, J, K, M
Robbins v. Lower Merion School District - Wikipedia, the free encyclopedia - 4 views
-
Covert surveillance capability
-
Covert surveillance capability The school loaded each student's computer with LANrev's remote activation and tracking software. This included the now-discontinued "TheftTrack".[17][25][26][27] While TheftTrack was not enabled by default on the software, the program allowed the school district to elect to activate it, and to enable whichever of TheftTrack's surveillance options the school desired.[8] The school elected to enable TheftTrack to allow school district employees to secretly and remotely activate a tiny camera webcam embedded in the student's laptop, above the laptop's screen.[17][25][26][27] That allowed school officials to secretly take photos through the webcam, of whatever was in front of it and in its line of sight, and send the photos to the school's server.[8][17] The system snapped and sent a new photo every 15 minutes when the laptop was on, and TheftTrack was activated, though school employees could adjust the timeframe to as low as one-minute intervals.[8][28][29] LANrev disabled the webcams for all other uses (e.g., students were unable to use Photo Booth or video chat), so most students mistakenly believed that their webcams did not work at all.[30] In addition, TheftTrack allowed school officials to take screenshots (pictures of whatever was on the laptop's screen), and send them to the school's server.[8][17] Furthermore, a locating device would record the laptop's Internet (IP) address, enabling district technicians to discover which city the laptop was located and its internet service provider. (A subpoena to the provider would be required to pinpoint the exact location.) [29] In addition, LANrev allowed school officials to take snapshots of instant messages, web browsing, music playlists, and written compositions.[17][31] After sending the image to the school's server, the laptop was programmed to erase the "sent" file created on the laptop. That way, there would not be any trace by which students might realize that they were being watche
London Riots: BlackBerry Messenger Used More than Facebook or Twitter - 4 views
-
iOS or Android smartphones
-
police and media attention was drawn to a particular post on the Facebook page
-
tweet from rioters describing their deeds and where they were headed next. Some posted pictures of looting and burning police cars
- ...1 more annotation...
Braille for computers - 6 views
Technology - 3 views
-
accelerometers
-
gyroscopes
-
torque sensor
BBC News - Touchless payment coming to mobile phones - 3 views
-
Much of the discussion at Mobile World Congress has been about turning the mobile phone into a payment device.
Companies re-think policies on working from home - 3 views
-
FTP site for uploading
-
virtual private network (VPN) connection.
-
email, Skype, Windows Live Messenger or with other communication tools
- ...2 more annotations...
The death of privacy - Ireland's CIO and strategy news and reports service - Siliconrep... - 3 views
-
In the US this year, there was outrage when people in job interviews and in schools were asked to hand over their Facebook passwords. Dwyer said that in the future and with the arrival of the semantic web and linkable data there is a danger that insurance companies may be able to find out if applicants had done a search for keywords like cancer stretching back 15 years.
-
In the US this year, there was outrage when people in job interviews and in schools were asked to hand over their Facebook passwords. Dwyer said that in the future and with the arrival of the semantic web and linkable data there is a danger that insurance companies may be able to find out if applicants had done a search for keywords like cancer stretching back 15 years
BBC News - Military fact file: Drones - 3 views
-
These strange-looking planes carry a wealth of sensors in their bulbous noses: colour and black-and-white TV cameras, image intensifiers, radar, infra-red imaging for low-light conditions and lasers for targeting. They can also be armed with laser-guided missiles.
-
Each multi-million dollar Predator or Reaper system comprises four aircraft, a ground control station and a satellite link.
-
Although drones are unmanned, they are not unpiloted - trained crew at base steer the craft, analyse the images which the cameras send back and act on what they see
Add-On gives power and nuance to 'Do Not Track' (Wired UK) - 2 views
-
Do Not Call list
-
prevented from tracking visitors
-
a signal sent by your browser to a website.
- ...5 more annotations...
How will the national identity card work? - 2 views
-
For the smart card technology to work, it must be backed up by fingerprint and eye-scanners in banks, shops, estate agents, hotels, and public services such as hospitals. To check your identity they in turn must have 24hr access to the National Identity Register (NIR). Every time the card is used, information about when, where, and how it was used is stored on the database in the form of an audit log.
Generation 5: Artificial Intelligence Repository - Military Applications of AI - 2 views
-
Morality: A Quick Thought
-
Military Applications of AI
-
- ...1 more annotation...
Sino Group of Hotels Selects MICROS OPERA Customer Information System -- HONG KONG, Jun... - 2 views
-
MICROS OPERA
-
customer relationship management.
-
expandable modules
- ...7 more annotations...
RTÉ Sport: GAA - Problems Viewing Content In Northern Ireland - 2 views
-
How does IP geo-access work?
-
How is my IP address issued?
-
How does dynamic IP address allocation work?
- ...4 more annotations...