Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? I see identity management as the real issue that is going to link security and privacy. I cannot engage most security professionals in discussions about privacy. And vice versa. -- Part One Personal baggage - I have a defence and security background. The real advancement in the discussion is going to come from the privacy advocates, not the security advocates.

first we kill the jobs

Harold Jarche

The project delivered 138 modules on the locations for its holidays, flights, airport codes and so on. Donald Clark shows how WildFire , a machine-augmented instructional content development system, saved significant time and money to develop a global training program.

Module 268

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

A sense of direction (1)

Dave Snowden

The issue arrises when the nature of the system is such that the levels of uncertainty, the degree of interacting modulators is such, that unintended consequences are the only certainty. I had a really interesting exchange on twitter over the last few days.

Module 221

Sea wall or salt marsh?

Dave Snowden

The sea-wall on the other had when it breaks it breaks; the shift from high utility, predictability and security to catastrophic failure is sudden and calamitous in nature. They provide an aura of security and reliability up to the point where it all gets too much for them.

Module 149

Senses of direction

Dave Snowden

But other than in that precise context a goal is dangerous in terms of missed opportunities, confirmation bias and a general failure to realise that there are too many modulators in operation to allow predictability.

Module 149

The Only Person Who Behaves Sensibly Is My Tailor

Charles Jennings

We measure how many people have attended a class or completed an eLearning module, or read a document or engaged in a job swap or in a coaching relationship. Attending a course or completing an eLearning module tells us little apart from the fact that some activity occurred.

Martian Dougiamas on Moodle

Stephen Downes: Half an Hour

progressive: communication based pedagogies, comment developed modules, drag and drop UIs, mobile platfors, innovative workflows, integration media, etc. Conservative: security, usability, assessment, accrediting identity management, detailed management, tracking and reports, performance and stability. The approach now is for Moodle HQ to focus on a platform, such that other people can build modules on top of it. Mobile apple can now talk to Moodle securely.

Module 186

What Universities Must Learn About Social Networks

Jay Cross

Others will never do that for reasons of security, lack of the ability to customize, limited feature sets, or the risk of relying on a wildcard like Mark Zuckerberg. Very much like the continuous changes in social network software, network security is a day to day concern.

Text-to-Speech vs Human Narration for eLearning

Tony Karrer

Company-wide training modules by an IT Process & Quality Manager at a Large Global Communications Corporation. Company-wide training modules by a Lead Courseware Developer at a Security Products Corporation. Since our training modules are used world-wide, in English, we wanted voice as well as text (all our training modules have both). The support provided by Speech-Over for modulation and pronunciation is good.

Interwoven flows of activity, not a PERT chart

Dave Snowden

This gives considerable flexibility when you are building new modules, or interacting with other applications or capabilities. You don't need a full cycle test across all modules before you deploy others. If the objects test out, if the assembly in that module writes data to the database then its ready to roll. I enjoyed the two London sessions to day, talking in seminar form about version 3.0 of SenseMaker™.

How to Get the Greatest ROI from eLearning

TOPYX LMS

However, with an electronic performance support subsystem as part of an online learning system, skills can be reinforced long after a course is over, so it’s a conservative calculation for eLearning modules.”

ROI 116

Designing E-Learning 3.0 in gRSShopper - 4

Stephen Downes: Half an Hour

But I know that Chatter is run by cchat.cgi, and this in turn calls the Net::Twitter::Lite::WithAPIv1_1 module. Note that the URL Google gives you for the embed link is 'http' but you must use 'https' because otherwise it won't play (mixed secure and non-secure content types).

Design 165

Beyond the Course

Nigel Paine

Enterprise software is more complex and expensive but is locked, securely behind a firewall and integrate with other existing products. It an excellent example of applying a magazine logic to what could have been a pile of dry learning modules that would probably have been ignored.

Can Learning Management Systems Foster Experiential Knowledge in the Workplace?

TOPYX LMS

By creating interactive learning content, and offering skills tests, online assignments and quizzes, (and) self-assessment modules, learners can experiment with multiple solutions while they understand the underlying principles of the subject.”. If so, your company’s future is secure.

Can Learning Management Systems Foster Experiential Knowledge in the Workplace?

TOPYX LMS

By creating interactive learning content, and offering skills tests, online assignments and quizzes, (and) self-assessment modules, learners can experiment with multiple solutions while they understand the underlying principles of the subject.”. If so, your company’s future is secure.

A spook’s guide to the psychology of deception

Mind Hacks

The techniques in the ‘affect’ section are some general points taken from a vast experimental literature on the psychology of marketing and persuasion that describes how emotion modulates the heuristics (judgement processes) involved in persuasion.

Module 113

Business or Pleasure? - why not both: Larry's magic numbers - bite.

Martijn Linssen

Yes, I know, JDE customers are supposed to get "like-for-like" access to Fusion modules. The To Tweet Or ReTweet Flowchart Your Twitter security is an egg, not an onion "Social Influence tools" only measure Twitter use Do we need to behave differently on Twitter?

TTI Vanguard Conference Notes - 7

Stephen Downes: Half an Hour

Flow diagram of how to create a Firefox patch) Preparation -> Module ownership -> Creating a Patch - >Testing -> Gettkng Reviews -> Committing the Patch -> You are now immortal The two parts where there's no code are 'module ownership' and 'peer review'. Firefox - modules have owners. Really, what this means is, modules have editors' - I oversee all the content, I make sure it's the right format, etc.

The 2016 Look at the Future of Online Learning

Stephen Downes: Half an Hour

In the 'competitive international market' a similar sort of 'convenient' education will be the norm, such as Nottingham's ' Flexible MA ' with a range of "module options to create a personally and professionally meaningful qualification" and "modes of delivery to take account of individual needs and professional." Again, though, the problem here is the employment of education-centered language - that learners "will secure their learning outcomes".

A New Website, Part Three - Installing Drupal

Stephen Downes: Half an Hour

So I create the user (I won't tell you the name of the user I created, for security reasons). OK, picking up again after lunch. I have downloaded the Drupal archive from the Drupal website to my home computer. Then, using gftp, I have uploaded the drupal archive from my home computer to the www/drupal directory. Again, if this were just an ordinary web account, with only one domain, I would have simply uploaded it in into the main document directory, www. So the archive is sitting there.

Drupal 100

Ethical Codes and Learning Analytics

Stephen Downes: Half an Hour

Security applications are common. To support physical security, facial and object recognition technology is being used in schools and institutions. Video recognition and biometrics are also used for security purposes and exam proctoring (Rodchua, 2017).

The Future of Online Learning: Ten Years On

Stephen Downes: Half an Hour

It will be more accurate in the future to say ‘learning resource’, since many such resources will be available that do not conform to the traditional picture of a learning object – and may be as simply as a single image, or as complex as a simulation or training module. An MS-Word version of this essay is available at [link] In the summer of 1998, over two frantic weeks in July, I wrote an essay titled The Future of Online Learning.

e-Clippings (Learning As Art): "New JKO Portal to Offer Joint Online Training" (Defense Link News)

Mark Oehlert

For example, one of the portal’s first offerings, the Joint Individual Augmentee Module, will replace a week-long resident course that was offered in Suffolk, Va. e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « "Listening for Learning" (IT Conversations) | Main | Map of Online Communities (xkcd Rox!)

News 32