21st Century Learning and Teaching
586.3K views | +10 today
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'ICT', 'Naivety'. Clear
Scooped by Gust MEES
Scoop.it!

Is it dumb to trust smart technology? | #AI #IoT #IoE #ArtificialIntelligence 

Is it dumb to trust smart technology? | #AI #IoT #IoE #ArtificialIntelligence  | 21st Century Learning and Teaching | Scoop.it
Did we learn nothing from Arthur C. Clarke's 1968 sci-fi epic, 2001: A Space Odyssey?

In the film, astronauts on a mission to Jupiter discover that the HAL 9000 artificial intelligence computer that controls and automates all functions on the spacecraft starts seriously glitching. The astronauts get worried, HAL gets paranoid -- yada, yada, yada -- HAL kills everyone on the ship.


Windows as a Service: What's it mean?
Microsoft's decision to unveil a subscription licensing model for Windows 10 for enterprises could be a
READ NOW
The moral of the story is that when lives depend on fully automated systems, it's a good idea to keep an eye on those systems anyway. (And if that's not the moral of the story, it should have been.)

How do you use something that's fully automatic, anyway? What is the responsibility of the "user"? Can we just hand over control to the bots?

Recent events in the news suggest that when it comes to using our automatic products and features, some people are doing it wrong.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Artificial+Intelligence

 

http://www.scoop.it/t/securite-pc-et-internet?q=iot

 

Gust MEES's insight:
Did we learn nothing from Arthur C. Clarke's 1968 sci-fi epic, 2001: A Space Odyssey?

In the film, astronauts on a mission to Jupiter discover that the HAL 9000 artificial intelligence computer that controls and automates all functions on the spacecraft starts seriously glitching. The astronauts get worried, HAL gets paranoid -- yada, yada, yada -- HAL kills everyone on the ship.


Windows as a Service: What's it mean?
Microsoft's decision to unveil a subscription licensing model for Windows 10 for enterprises could be a
READ NOW
The moral of the story is that when lives depend on fully automated systems, it's a good idea to keep an eye on those systems anyway. (And if that's not the moral of the story, it should have been.)

How do you use something that's fully automatic, anyway? What is the responsibility of the "user"? Can we just hand over control to the bots?

Recent events in the news suggest that when it comes to using our automatic products and features, some people are doing it wrong.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Artificial+Intelligence

 

http://www.scoop.it/t/securite-pc-et-internet?q=iot

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

A MUST READ to understand about CyberSecurity! | The Scrap Value of a Hacked PC, Revisited

A MUST READ to understand about CyberSecurity! | The Scrap Value of a Hacked PC, Revisited | 21st Century Learning and Teaching | Scoop.it

Brian KREBS @briankrebs (Twitter)


A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.


I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums.


Learn more:


https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/



Gust MEES's insight:

Brian KREBS @briankrebs (Twitter)


A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.


I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums.


Learn more:


https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

IDIOTS

It’s not a secret we love robots here at BLR, so we wanted them to be the heroes in our latest promo clip. Luxury cars with powerful engines to drive through roads under severe speed restrictions, cable TV that allows us to pay to watch all kind of sports, all from our comfortable sofa, and of course, hyper expensive cell phones that do almost everything but making a decent phone call.

.

Yes, our happiness is based on things we don’t need and governed by entities we don’t control, so what? Sit down and turn on the tv!

Gust MEES's insight:

It’s not a secret we love robots here at BLR, so we wanted them to be the heroes in our latest promo clip. Luxury cars with powerful engines to drive through roads under severe speed restrictions, cable TV that allows us to pay to watch all kind of sports, all from our comfortable sofa, and of course, hyper expensive cell phones that do almost everything but making a decent phone call.

.

Yes, our happiness is based on things we don’t need and governed by entities we don’t control, so what? Sit down and turn on the tv!


No comment yet.
Scooped by Gust MEES
Scoop.it!

Google vergisst interne Zugangsdaten auf ausrangiertem Router | NAIVETY

Google vergisst interne Zugangsdaten auf ausrangiertem Router | NAIVETY | 21st Century Learning and Teaching | Scoop.it
Ein deutscher Online-Shop hat einen generalüberholten Router verkauft, der zuvor offenbar für Google Dienst schob. Das Gerät hat den Internetriesen mit allerhand sensiblen Informationen verlassen, welche die neuen Besitzer problemlos auslesen konnten.


Learn more / En savoir plus / Mehr erfahren:


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


Gust MEES's insight:
Ein deutscher Online-Shop hat einen generalüberholten Router verkauft, der zuvor offenbar für Google Dienst schob. Das Gerät hat den Internetriesen mit allerhand sensiblen Informationen verlassen, welche die neuen Besitzer problemlos auslesen konnten.


Learn more / En savoir plus / Mehr erfahren:


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Password site ​LastPass warns of data breach | Naivety | eSkills | LEARNing2LEARN

Password site ​LastPass warns of data breach |  Naivety | eSkills | LEARNing2LEARN | 21st Century Learning and Teaching | Scoop.it
LastPass was successfully attacked last Friday. The company claims that your passwords should be safe. Nevertheless, they are requesting you to update your master passwords.


Learn more:


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


Gust MEES's insight:

LastPass was successfully attacked last Friday. The company claims that your passwords should be safe. Nevertheless, they are requesting you to update your master passwords.


Learn more:


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


Scooped by Gust MEES
Scoop.it!

A Clever Way to Tell Which of Your Emails Are Being Tracked | Privacy

A Clever Way to Tell Which of Your Emails Are Being Tracked | Privacy | 21st Century Learning and Teaching | Scoop.it
A Chrome extension called Ugly Mail shows you who’s guilty of tracking your emails.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Gust MEES's insight:

A Chrome extension called Ugly Mail shows you who’s guilty of tracking your emails.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



No comment yet.