Saturday, July 11, 2015

Netiquette Five Ground Rules to Keep Up With Technology in Education - Via Netiquette IQ


                                                                                          
====================================================
Five Ground Rules to Keep Up With Technology in Education
By Gary Marx on June 18, 2015 9:24 AM edweek.org
Ubiquitous, interactive technology is shaping how we live, how we learn, how we work, how we see ourselves, and how we relate to the world. Technologies have a way of bursting onto the scene, leaving a trail of opportunity and disruption. It's happened before...and it's happening again. The big difference? The pace of change.
What we've gained is an avalanche of new technologies, each with a set of life-changing benefits and possible consequences. What we've lost is what the "ancients of a previous decade" called "the between" or "between time." For the consumer, the time between anticipation and gratification continues to shrink.
In this brief essay, I'll take snapshots of nine realities, possibilities, and concerns, all driven by our tech-accelerated move from an Industrial Age into a Global Knowledge/Information Age, even an Age of Knowledge Creation and Breakthrough Thinking.
Expect many technologies to become even more mobile, wearable, and invisible. We'll put them on when we get dressed and hardly give it a second thought. Iowa City Community Schools Superintendent Stephen Murley observes, "Technology immigrantsthink about technology. For digital natives, children and young adults, it just is."
Technology is more than a device with a keyboard.Nanotechnology, at the molecular level, is allowing us to move atoms around within a molecule to produce a revolution in materials science. Biotechnology, robotics, and development of higher-capacity batteries are exploding fields, along with data analytics. Expect billions of devices to be connected to the Internet of Things.
A fixed physical workplace will become less significant. With widely distributed computing power, networks, and portability, many of us will be able to do our jobs nearly anywhere. Think of cottage industries, consultants, free-lancers, and employees of large and small firms who spend a lion's share of their time working from a variety of locations.
Equal opportunity for bandwidth will become part of the level playing field. It might even be seen as a civil right.
The power of social media will continue to increase. By whatever future names they are given, interactive social media will rally people to sing anthems at shopping centers, protest or support public issues, and send suggestions directly to classroom teachers.
Increasing numbers of people will be blindsided by their own dashboards. A word of warning to those who program their dashboards to give them only one side of a story: You just might lose touch with the broader world.
Discovery, enabled in part by immersive technologies, will bring greater life to education. We all know that the thrill of discovery teaches us lessons we never forget.   
Tools of the learning trade will grow by the minute. We're surrounded by new tools for teaching and learning, and they are multiplying. Artificial Intelligence and Augmented Reality are among them. Students are reporting on their research (learning through inquiry) using writing, speaking, thinking, reasoning, problem solving, creativity, collaboration, and interdisciplinary skills. Their tools often include videos they produce, PowerPoint presentations, and lessons for their classes. Learning-technology veteran Gary Rowe of Rowe, Inc. sees the evolution of 3D visual media making virtual travel a possibility. He suggests virtual field trips to "Bunker Hill, Bell Labs, and the Great Barrier Reef."
Getting and keeping attention will become exponentially more challenging. Whether we're speaking to staff, constituents, a community group, or students, we know up front that nearly all of us have access to the same information. While using communication technologies can help us stay in touch and up to date, it can also give us graphic, animated tools to help us make learning more exciting and novel. In Talk Like TED, author Carmine Gallo quotes Northwestern University Adjunct Professor Martha Burns, who observes, "Our goal as teachers is to get our students addicted to learning."
A Few Suggested Ground Rules for Technology:
•  The same device that can connect us to the world can also isolate us from personal face-to-face communication. We may need remedial units or courses on how to talk with each other.
•  Each technology can be used constructively or destructively. An aircraft that can take us to exotic places can also bring down an office building.
•  Not everything on the Internet is factual. Thinking, reasoning, problem solving, research, and other skills are essential in separating wheat from chaff, truth from fiction.
•  Consequences for ourselves and others should be clear if we ignore the rules of netiquette.
•  Finally, students should know that we are depending on them to invent or develop entirely new or next generations of existing technologies that will help us shape our future. Today's entrepreneurial students will be the ones who conceive of new industries and job opportunities that may be beyond our imaginations.
The silicon chip may not be able to give us the exponential increases we've come to expect in computer speed and capacity. Already, quantum computers are in various stages of invention. Each will likely be built around a qubit. All of us will be jolted by the quantum impact these dazzling devices have on an already dizzying pace of change.
Just for perspective. Remember five or ten years ago when we declared we would never be able to use some of the new technologies? Today, we can't do without them.

===============================================
For a great email parody, view the following link:

https://www.youtube.com/watch?v=HTgYHHKs0Zw&__scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
==============================================**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Friday, July 10, 2015

Netiquette IQ Security Bulletin - VMware Releases Security Advisory

National Cyber Awareness System:
07/10/2015 10:12 AM EDT

Original release date: July 10, 2015
VMware has released security updates to address a host privilege escalation vulnerability in VMware Workstation, Player and Horizon View Client for Windows. Exploitation of this vulnerability may allow an attacker to escalate privileges on an affected VMware system.
Updates available include:
  • VMware Workstation 11.1.1
  • VMware Workstation 10.0.7
  • VMware Player 7.1.1
  • VMware Player 6.0.7
  • VMware Horizon Client for Windows (with Local Mode Option) 5.4.2
Users and administrators are encouraged to review the VMware Security Advisory VMSA-2015-0005 and apply the necessary updates.
===============================================
For a great email parody, view the following link:

https://www.youtube.com/watch?v=HTgYHHKs0Zw&__scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
==============================================**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Netiquette IQ Security Bulletin For 7/10/15 - OpenSSL Releases Security Advisory


National Cyber Awareness System:
07/09/2015 12:31 PM EDT

Original release date: July 09, 2015
OpenSSL has released updates to address a vulnerability that could impact proper certificate verification. A remote attacker could ‘issue’ invalid certificates that pass validation by affected versions.
Updates available include:
  • OpenSSL 1.0.2d for 1.0.2b/1.02c users
  • OpenSSL 1.0.1p for 1.0.1n/1.0.1o users
Users and administrators are encouraged to review the OpenSSL Security Advisory and apply the necessary updates.

===============================================
For a great email parody, view the following link:

https://www.youtube.com/watch?v=HTgYHHKs0Zw&__scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
 --------------------------------------------------------------------------
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Thursday, July 9, 2015

Netiquette IQ Blog Of 7/9/2015 - FBI, DOJ Want Companies To Back off End-to-End Encryption

 

Many companies and users are implementing encryption for their. Even though this offers create security, governments are quite often opposed for reasons noted in the article below. Additionally, there is a possibility that by encrypting traffic, there is no checking for malware which might be a part of the payload.
==============================================================

infoworld.com 7/9/2015 - Grant Gross

FBI, DOJ want companies to back off end-to-end encryption
The agencies want tech vendors to retain access to encrypted data to comply with court-ordered warrants
U.S. tech companies should retain access to the encrypted information of their customers, instead of providing end-to-end encryption, in order to give police the tools they need to investigate crimes and terrorist activity, two senior law enforcement officials said.
The U.S. Department of Justice and the FBI aren't seeking new legislation to require tech companies to comply with warrant requests, at least for now, and they don't want companies to build encryption back doors that give the agencies direct access to communications and information stored on smartphones, said Sally Quillian Yates, the DOJ's deputy attorney general.
Instead, the DOJ and FBI, in their continuing efforts to combat the use of encryption by criminals and terrorists, are proposing that tech and communications companies retain internal access to encrypted information so that they can comply with court-ordered search warrants, she told the Senate Judiciary Committee Wednesday. Several tech companies already retain some access to customers' encrypted data, she said.
Legislation may eventually be necessary, but the DOJ is now looking for voluntary compliance from tech companies, she said.
With new encryption services from tech companies, "critical information becomes, in effect, warrant-proof," Yates said. "We are creating safe zones where dangerous criminals and terrorists can operate and avoid detection."
A recent push by tech companies toward end-to-end encryption, partly in response to reports of mass surveillance programs, has led the DOJ and FBI to raise concerns about law enforcement agencies "going dark" when investigating crime. Last September, FBI Director James Comey Jr. first questioned decisions by Apple and Google to offer encryption by default on their smartphone operating systems.
"The world has changed in the last two years," Comey told senators. "Encryption has moved from something available to something that is the default, both on devices and on data in motion."
Terrorist group ISIL (Islamic State of Iraq and the Levant) has used encryption effectively, Yates said. ISIL makes first contact with many potential recruits on Twitter, where the group has about 21,000 followers of its English language feed, but then directs them to communicate further on an encrypted messaging service, she said.
"This is a serious threat, and our inability to access these communications with valid court orders is a real national security problem," Yates added. "We must find a solution to this pressing problem, and we need to find it soon."
U.S. tech companies should be able to find a way to provide law enforcement access to encrypted data and still provide many of the security and privacy benefits of encryption, Comey said. "The tools we are being asked to use are increasingly ineffective in our national security work and in our criminal work," he said. "I don't come with a solution -- this is a really, really hard problem."
But Comey also rejected arguments by some computer scientists who say it's impossible to allow police access to encrypted data without also opening it up to hackers.
"I think Silicon Valley is full of folks [who] have built remarkable things that changed our lives," he said. "Maybe this is too hard, but given the stakes ... we've got to give it a shot."
While companies like Google and Apple were not included in the hearing, senators gave a mixed reaction to the testimonies of Yates and Comey. Some senators suggested it would be nearly impossible to prevent foreign tech vendors from offering encrypted communication products.
Senator Al Franken, a Minnesota Democrat, pressed Yates to provide statistics about the number of criminal cases affected by encrypted data.
Before creating new regulations, Congress needs to have a "clear understanding of the scope and the magnitude of law enforcement's security interests," Franken said.
Bottom of Form
Yates couldn't provide a number of cases affected, saying it was difficult because, in many cases, police don't seek a warrant when they know the information they want is encrypted. But Cyrus Vance Jr., district attorney in Manhattan, told senators his office has tried to pull data off 92 Apple phones running iOS 8 in the past six months, and on 74 of those devices, the data was encrypted.
Other senators were sympathetic to the encryption dilemma faced by law enforcement agencies. Senator John Cornyn, a Texas Republican, pressed Comey to tell lawmakers that U.S. residents will die if a solution wasn't found. Comey declined, saying he doesn't want to scare people. The FBI will do the best job it can with the crime-fighting tools it has, he said.
Still, Cornyn questioned companies that offer encryption without retaining some access to the data. "It strikes me as irresponsible, and perhaps worse, for a company to intentionally design a product in such a way that prevents them from complying with a lawful court order," he said.
==========================================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================