information analyst
43.8K views | +0 today
Follow
information analyst
km, ged / edms, workflow, collaboratif
Your new post is loading...
Your new post is loading...
Rescooped by michel verstrepen from Professional Learning for Busy Educators
Scoop.it!

20 Ideas for Professional Development in the Digital Age - ETALE

20 Ideas for Professional Development in the Digital Age - ETALE | information analyst | Scoop.it

What is professional development?  It is pretty much anything that helps one develop professionally. At the heart, professional development is about growth and learning.  In the field of education, it seems like many quickly think of educational opportunities that mimic what they see in their schools. As a result, they turn professional learning and education into schooling.  The problem with that is that schooling is too limiting.  In this age, there are many other exciting and high-impact learning opportunities for teachers that extend beyond traditional notions of schooling.  When we hear the phrase “professional development,” certain practices likely come to mind, things like in-services and conferences. In the digital age, there are countless other opportunities for professional development and restricting one’s thoughts to just a few options limits our insight into what is possible for our students.  With that in mind, here is a brainstorm of 20 options available to educators today. This is far from an exhaustive list, but it is enough to start exploring the possibilities.  Feel free to suggest others in a comment to this post.

 

Learn more:

 

Professional Development: WHY EDUcators And TEACHers Can’t Catch UP THAT Quickly AND How-To Change It

 

LEARNing To LEARN For MY Professional Development | I Did It MY Way

 

  


Via Gust MEES, John Evans
Nataliia Viatkina/Наталія Вяткіна's curator insight, March 26, 2017 4:20 AM
Professional development for teachers themselves, as personalities, adult people, universally, independently from schooling is very interesting idea, humanistic , and useful for school eventually

Prof. Dr. Kai Reinhardt's curator insight, March 30, 2017 2:42 AM
Hier gibt es eine gute Sammlung an neuen Wissenstransfer-Formaten...
R's curator insight, April 6, 2017 1:31 PM
Growth and learning beyond schooling - think outside in-service and conferences/professional workshops.
Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Raspberry Pi Foundation releases Pixel, an OS for Windows and Apple x86 platforms | #Maker #MakerED #MakerSpaces

Raspberry Pi Foundation releases Pixel, an OS for Windows and Apple x86 platforms | #Maker #MakerED #MakerSpaces | information analyst | Scoop.it
Time to go Dr Frankenstein on your dead laptop

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Raspberry+Pi

 


Via Gust MEES
Gust MEES's curator insight, December 24, 2016 8:15 AM
Time to go Dr Frankenstein on your dead laptop

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Raspberry+Pi

 

Rosemary Tyrrell, Ed.D.'s curator insight, January 3, 2017 2:28 PM
Super cool!
 
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Stegano, le malware qui se cache dans les pixels des pubs en ligne | #CyberSecurity #Steganography

Stegano, le malware qui se cache dans les pixels des pubs en ligne | #CyberSecurity #Steganography | information analyst | Scoop.it
Des pirates s’appuient sur des fausses pubs pour diffuser à des millions d'internautes un malware particulièrement sophistiqué, qui s’appuie sur de multiples techniques de dissimulation.

 

Voilà encore une preuve que les cybercriminels deviennent de plus en plus malins. Les chercheurs en sécurité d'Eset viennent de mettre la main sur un malware qui exploite des failles dans Internet Explorer et Flash Player, et dont le code est caché directement dans les pixels d'une image de publicité. C’est pourquoi il a été baptisé « Stegano », en référence à la stéganographie, l’art de dissimuler des messages secrets dans des choses en apparence anodines, comme ici une pub en ligne.

 

L’impact de ce malware, en revanche, est loin d’être anodin. Selon Eset, la publicité vérolée a été diffusée entre autres sur des sites d’actualités très populaires, lui permettant d’être affichée par « plus d’un million d’internautes », explique Robert Lipovsky, l’un des chercheurs d’Eset, dans une note de blog. L’attaque se déroule de façon totalement automatique, la victime n’a pas même pas besoin de cliquer sur la publicité. D’après les chercheurs, Stegano a été utilisé par les cybercriminels pour installer sur les machines des victimes des chevaux de Trois bancaires, des portes dérobées et des logiciels espions. Mais en théorie, il n’y a pas vraiment de limite. « Les victimes pourraient également être confrontées à de méchantes attaques de ransomware », souligne Robert Lipovsky.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Steganography

 


Via Gust MEES
Gust MEES's curator insight, December 10, 2016 5:06 AM
Des pirates s’appuient sur des fausses pubs pour diffuser à des millions d'internautes un malware particulièrement sophistiqué, qui s’appuie sur de multiples techniques de dissimulation.

 

Voilà encore une preuve que les cybercriminels deviennent de plus en plus malins. Les chercheurs en sécurité d'Eset viennent de mettre la main sur un malware qui exploite des failles dans Internet Explorer et Flash Player, et dont le code est caché directement dans les pixels d'une image de publicité. C’est pourquoi il a été baptisé « Stegano », en référence à la stéganographie, l’art de dissimuler des messages secrets dans des choses en apparence anodines, comme ici une pub en ligne.

 

L’impact de ce malware, en revanche, est loin d’être anodin. Selon Eset, la publicité vérolée a été diffusée entre autres sur des sites d’actualités très populaires, lui permettant d’être affichée par « plus d’un million d’internautes », explique Robert Lipovsky, l’un des chercheurs d’Eset, dans une note de blog. L’attaque se déroule de façon totalement automatique, la victime n’a pas même pas besoin de cliquer sur la publicité. D’après les chercheurs, Stegano a été utilisé par les cybercriminels pour installer sur les machines des victimes des chevaux de Trois bancaires, des portes dérobées et des logiciels espions. Mais en théorie, il n’y a pas vraiment de limite. « Les victimes pourraient également être confrontées à de méchantes attaques de ransomware », souligne Robert Lipovsky.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Steganography

 

Rescooped by michel verstrepen from 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)...
Scoop.it!

Microsoft Has a Whole New Kind of Computer Chip—and It’ll Change Everything | Project #Catapult | #ICT #Research

Microsoft Has a Whole New Kind of Computer Chip—and It’ll Change Everything | Project #Catapult | #ICT #Research | information analyst | Scoop.it
The tech world, Burger explained, was moving into a new orbit. In the future, a few giant Internet companies would operate a few giant Internet services so complex and so different from what came before that these companies would have to build a whole new architecture to run them. They would create not just the software driving these services, but the hardware, including servers and networking gear. Project Catapult would equip all of Microsoft’s servers—millions of them—with specialized chips that the company could reprogram for particular tasks.

Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

MIT researchers unveil new anonymity scheme that could rival Tor | #Privacy 

MIT researchers unveil new anonymity scheme that could rival Tor | #Privacy  | information analyst | Scoop.it
In response to the disclosure of vulnerabilities in Tor's design, researchers at MIT have created Riffle, a system that allegedly provides better security and uses bandwidth more efficiently.

 


Via Gust MEES
Gust MEES's curator insight, July 16, 2016 5:52 AM

In response to the disclosure of vulnerabilities in Tor's design, researchers at MIT have created Riffle, a system that allegedly provides better security and uses bandwidth more efficiently.

 

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

The Ethereum Computer brings smart contracts and blockchain technology to the entire home | #Technology

The Ethereum Computer brings smart contracts and blockchain technology to the entire home | #Technology | information analyst | Scoop.it

The Ethereum Computer

 

The Ethereum Computer brings smart contracts and blockchain technology to the entire home.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/luxembourg-europe/?tag=Blockchain

 

http://www.scoop.it/t/luxembourg-europe/?tag=Bitcoin

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=blockchain

 


Via Gust MEES
Gust MEES's curator insight, June 9, 2016 7:28 PM

The Ethereum Computer

 

The Ethereum Computer brings smart contracts and blockchain technology to the entire home.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/luxembourg-europe/?tag=Blockchain

 

http://www.scoop.it/t/luxembourg-europe/?tag=Bitcoin

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=blockchain

 

Rescooped by michel verstrepen from 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)...
Scoop.it!

U.S. government agencies are still using Windows 3.1, floppy disks and 1970s computers

U.S. government agencies are still using Windows 3.1, floppy disks and 1970s computers | information analyst | Scoop.it
Some U.S. government agencies are using IT systems running Windows 3.1, the decades-old COBOL and Fortran programming languages, or computers from the 1970s.

A backup nuclear control messaging system at the U.S. Department of Defense runs on an IBM Series 1 computer, first introduced in 1976, and uses eight-inch floppy disks, while the Internal Revenue Service's master file of taxpayer data is written in assembly language code that's more than five decades old, according to a new report from the Government Accountability Office.

Some agencies are still running Windows 3.1, first released in 1992, as well as the newer but unsupported Windows XP, Representative Jason Chaffetz, a Utah Republican, noted during a Wednesday hearing on outdated government IT systems.

The government is spending more than US$80 billion a year on IT, and "it largely doesn't work," Chaffetz said during a House of Representatives Oversight and Government Reform Committee hearing. "The federal government is years, and sometimes decades, behind the private sector."

 


Via Gust MEES
Gust MEES's curator insight, May 25, 2016 5:02 PM

Some U.S. government agencies are using IT systems running Windows 3.1, the decades-old COBOL and Fortran programming languages, or computers from the 1970s.

A backup nuclear control messaging system at the U.S. Department of Defense runs on an IBM Series 1 computer, first introduced in 1976, and uses eight-inch floppy disks, while the Internal Revenue Service's master file of taxpayer data is written in assembly language code that's more than five decades old, according to a new report from the Government Accountability Office.

Some agencies are still running Windows 3.1, first released in 1992, as well as the newer but unsupported Windows XP, Representative Jason Chaffetz, a Utah Republican, noted during a Wednesday hearing on outdated government IT systems.

The government is spending more than US$80 billion a year on IT, and "it largely doesn't work," Chaffetz said during a House of Representatives Oversight and Government Reform Committee hearing. "The federal government is years, and sometimes decades, behind the private sector."

 

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Cryptolunch.lu, la cybersécurité à la portée des citoyens  | CyberSecurity | Luxembourg | Europe | Encryption

Cryptolunch.lu, la cybersécurité à la portée des citoyens  | CyberSecurity | Luxembourg | Europe | Encryption | information analyst | Scoop.it
Cryptolunch.lu, la cybersécurité à la portée des citoyens


Cryptolunch.lu est un évènement gratuit, organisé au Luxembourg, dédié à l'information des citoyens européens à la protection de la vie privée et la sécurité en ligne.
 
L'utilisation massive des Technologies de l'Information et de l'Information a fait évoluer les limites entre vie privée et vie publique. Alors que nous sommes toujours plus connectés, une masse exponentielle de données personnelles nous concernant est échangée, tant en ligne que hors ligne. La vie privée est pourtant un droit qu'il est important de défendre.
 
Organisé en partenariat entre la maison de l'Europe et Securitymadein.lu, la finalité des cryptolunch est de mettre à disposition un lieu de rencontre où les citoyens européens auront l'opportunité de s'entretenir avec des experts en sécurité afin d'obtenir des informations sur des sujets tels que la vie privée et la sécurité numérique.
 
Créé afin de permettre à un public non spécialisé d'obtenir des réponses claires et simples à ses questions, ce rassemblement est idéal pour  répondre aux attentes de profils très variées  en termes  de  sécurité sur Internet.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 


 


Via Gust MEES
michel verstrepen's insight:

Cryptolunch.lu, la cybersécurité à la portée des citoyens


Cryptolunch.lu est un évènement gratuit, organisé au Luxembourg, dédié à l'information des citoyens européens à la protection de la vie privée et la sécurité en ligne.
 
L'utilisation massive des Technologies de l'Information et de l'Information a fait évoluer les limites entre vie privée et vie publique. Alors que nous sommes toujours plus connectés, une masse exponentielle de données personnelles nous concernant est échangée, tant en ligne que hors ligne. La vie privée est pourtant un droit qu'il est important de défendre.
 
Organisé en partenariat entre la maison de l'Europe et Securitymadein.lu, la finalité des cryptolunch est de mettre à disposition un lieu de rencontre où les citoyens européens auront l'opportunité de s'entretenir avec des experts en sécurité afin d'obtenir des informations sur des sujets tels que la vie privée et la sécurité numérique.
 
Créé afin de permettre à un public non spécialisé d'obtenir des réponses claires et simples à ses questions, ce rassemblement est idéal pour  répondre aux attentes de profils très variées  en termes  de  sécurité sur Internet.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

Gust MEES's curator insight, March 4, 2016 6:39 PM

Cryptolunch.lu, la cybersécurité à la portée des citoyens


Cryptolunch.lu est un évènement gratuit, organisé au Luxembourg, dédié à l'information des citoyens européens à la protection de la vie privée et la sécurité en ligne.
 
L'utilisation massive des Technologies de l'Information et de l'Information a fait évoluer les limites entre vie privée et vie publique. Alors que nous sommes toujours plus connectés, une masse exponentielle de données personnelles nous concernant est échangée, tant en ligne que hors ligne. La vie privée est pourtant un droit qu'il est important de défendre.
 
Organisé en partenariat entre la maison de l'Europe et Securitymadein.lu, la finalité des cryptolunch est de mettre à disposition un lieu de rencontre où les citoyens européens auront l'opportunité de s'entretenir avec des experts en sécurité afin d'obtenir des informations sur des sujets tels que la vie privée et la sécurité numérique.
 
Créé afin de permettre à un public non spécialisé d'obtenir des réponses claires et simples à ses questions, ce rassemblement est idéal pour  répondre aux attentes de profils très variées  en termes  de  sécurité sur Internet.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Google Maps now lets you revisit your location history in a detailed timeline | DigitalFootPrint | DigitalCitiZEN

Google Maps now lets you revisit your location history in a detailed timeline | DigitalFootPrint | DigitalCitiZEN | information analyst | Scoop.it

It’s inspiring — in a crazy sort of way — to consider how efficient Google can be in keeping track of information about you. Today, Google announced the launch of “Your Timeline,” a tool in Google Maps that shares with you all the places you have been. It works if you chose to store your Location History with Google.


Product manager Gerard Sanz detailed the feature in blog post, as the company gradually rolls out the timeline for Maps users.


It could definitely serve as a convenience. What with our busy lives, sometimes it’s hard to remember all the stops along the way. Google sees Your Timeline as a way to quickly recall, and even view your past whereabouts.



Via Gust MEES
Mei Lin Fung's curator insight, July 28, 2015 10:40 AM

like fire.... it has risks and rewards

Calliope Global Fran's curator insight, July 31, 2015 2:36 PM

It’s inspiring — in a crazy sort of way — to consider how efficient Google can be in keeping track of information about you. Today, Google announced the launch of “Your Timeline,” a tool in Google Maps that shares with you all the places you have been. It works if you chose to store your Location History with Google.


Product manager Gerard Sanz detailed the feature in blog post, as the company gradually rolls out the timeline for Maps users.

 

It could definitely serve as a convenience. What with our busy lives, sometimes it’s hard to remember all the stops along the way. Google sees Your Timeline as a way to quickly recall, and even view your past whereabouts.

 

Dennis Swender's curator insight, August 10, 2015 12:00 PM

It’s inspiring — in a crazy sort of way — to consider how efficient Google can be in keeping track of information about you. Today, Google announced the launch of “Your Timeline,” a tool in Google Maps that shares with you all the places you have been. It works if you chose to store your Location History with Google.

 

Product manager Gerard Sanz detailed the feature in blog post, as the company gradually rolls out the timeline for Maps users.

 

It could definitely serve as a convenience. What with our busy lives, sometimes it’s hard to remember all the stops along the way. Google sees Your Timeline as a way to quickly recall, and even view your past whereabouts.

 

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Where In the World Is the Internet? [Infographic]

Where In the World Is the Internet? [Infographic] | information analyst | Scoop.it
The Internet has become a major part of most people’s days and nights. It’s often the thing people check first thing in the morning, and the thing people do last with their smartphones before bedtime.

Via Gust MEES
Gust MEES's curator insight, July 6, 2013 7:05 AM

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Michelle Gilstrap's curator insight, July 8, 2013 9:55 AM

Very good perspective on the use of the Internet around the world. What is the use in other countries? Now you can see quickly. If you are planning a business venture, it is wise to know the use.

Helena Capela's curator insight, July 8, 2013 1:54 PM

Interesting. Vatican City is very well positioned

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Google und Microsoft kämpfen um den Raspberry Pi | #InternetOfThings #IoT #IoE #Coding #OS 

Google und Microsoft kämpfen um den Raspberry Pi | #InternetOfThings #IoT #IoE #Coding #OS  | information analyst | Scoop.it
Mit einer angepassten Android-Version will Google auf den Raspberry Pi. Das vom Unternehmen auf den Namen Android Things getaufte System konkurriert hier unter anderem mit Microsofts Windows 10-Version für den Bastel-Rechner.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Raspberry+Pi

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 


Via Gust MEES
Gust MEES's curator insight, December 30, 2016 12:16 PM
Mit einer angepassten Android-Version will Google auf den Raspberry Pi. Das vom Unternehmen auf den Namen Android Things getaufte System konkurriert hier unter anderem mit Microsofts Windows 10-Version für den Bastel-Rechner.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Raspberry+Pi

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Methbot: Russian botnet steals millions from US companies every day | #CyberCrime

Methbot: Russian botnet steals millions from US companies every day | #CyberCrime | information analyst | Scoop.it
Russian hackers are stealing between $3 million to $5 million per day from US brands and media companies in one of the most lucrative botnet operations ever discovered.

On December 20, researchers from White Ops said the scheme, dubbed "Methbot," is a Russian operation set up to watch up to 300 million video-based adverts automatically every day.

These adverts, displayed on legitimate domains owned by companies including the Huffington Post, Economist, Fortune, ESPN, Vogue, CBS Sports, and Fox News, are used to generate additional revenue through advertising sponsors which help keep these businesses afloat.

However, White Ops says Methbot capitalizes on this revenue generation by targeting the most expensive advertising on the web -- such as full-blown video adverts on branded websites -- and is programmed to show signs of "engagement" to fool ad providers into thinking the content is being watched legitimately.

Faked clicks, mouse movements, social network login information, and typical "working hours" are all methods to keep the operation under wraps.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cybercrime

 


Via Gust MEES
Gust MEES's curator insight, December 20, 2016 3:28 PM
Russian hackers are stealing between $3 million to $5 million per day from US brands and media companies in one of the most lucrative botnet operations ever discovered.

On December 20, researchers from White Ops said the scheme, dubbed "Methbot," is a Russian operation set up to watch up to 300 million video-based adverts automatically every day.

These adverts, displayed on legitimate domains owned by companies including the Huffington Post, Economist, Fortune, ESPN, Vogue, CBS Sports, and Fox News, are used to generate additional revenue through advertising sponsors which help keep these businesses afloat.

However, White Ops says Methbot capitalizes on this revenue generation by targeting the most expensive advertising on the web -- such as full-blown video adverts on branded websites -- and is programmed to show signs of "engagement" to fool ad providers into thinking the content is being watched legitimately.

Faked clicks, mouse movements, social network login information, and typical "working hours" are all methods to keep the operation under wraps.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cybercrime

 

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

World's Top 1001+ Free Electronics Engineering Project Ideas | #Maker #MakerED #MakerSpaces 

World's Top 1001+ Free Electronics Engineering Project Ideas | #Maker #MakerED #MakerSpaces  | information analyst | Scoop.it
Get tested electronics engineering project ideas, embedded electronics projects, and mini projects for electronics enthusiasts at Electronics For You.

 

Learn more / En savoir plus / Mehr erfahren:

 

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=electronics

 


Via Gust MEES
Gust MEES's curator insight, December 4, 2016 5:50 PM
Get tested electronics engineering project ideas, embedded electronics projects, and mini projects for electronics enthusiasts at Electronics For You.

 

Learn more / En savoir plus / Mehr erfahren:

 

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=electronics

 

Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Weebly hacked, 43 million credentials stolen | CHANGE your passwords asap!!! | #CyberSecurity #DataBreaches

Weebly hacked, 43 million credentials stolen | CHANGE your passwords asap!!! | #CyberSecurity #DataBreaches | information analyst | Scoop.it
The web design platform Weebly was hacked in February, according to the data breach notification site LeakedSource. Usernames and passwords for more than 43 million accounts were taken in the breach, although the passwords are secured with the strong hashing algorithm bcrypt.

Weebly said in an email to customers that user IP addresses were also taken in the breach.

“We do not believe that any customer website has been improperly accessed,” Weebly said in the notice to users.” The company also said that it does not store credit card information, making fraudulent charges unlikely.

LeakedSource said it received the Weebly database from an anonymous source and notified Weebly of the breach. In addition to the customer notification emails, LeakedSource claims that password resets are being issued — but, if you’re a Weebly user and you don’t receive a password reset, you probably want to change your password anyway.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 


Via Gust MEES
Gust MEES's curator insight, October 21, 2016 9:27 AM
The web design platform Weebly was hacked in February, according to the data breach notification site LeakedSource. Usernames and passwords for more than 43 million accounts were taken in the breach, although the passwords are secured with the strong hashing algorithm bcrypt.

Weebly said in an email to customers that user IP addresses were also taken in the breach.

“We do not believe that any customer website has been improperly accessed,” Weebly said in the notice to users.” The company also said that it does not store credit card information, making fraudulent charges unlikely.

LeakedSource said it received the Weebly database from an anonymous source and notified Weebly of the breach. In addition to the customer notification emails, LeakedSource claims that password resets are being issued — but, if you’re a Weebly user and you don’t receive a password reset, you probably want to change your password anyway.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

 

Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Vous utilisez les réseaux Wi-Fi publics ? Vous espionner est un jeu d’enfant. | #CyberSecurity #Privacy #Cybercrime #VPN 

Vous utilisez les réseaux Wi-Fi publics ? Vous espionner est un jeu d’enfant. | #CyberSecurity #Privacy #Cybercrime #VPN  | information analyst | Scoop.it
Le hacking, désormais, est d’une simplicité enfantine.... Même les non-hackers s'y amusent ! Prenons le Wi-Fi public, par exemple. Pour espionner la navigation web de clients qui sirotent tranquillement leur café dans une brasserie avec Wi-Fi gratuit, pas besoin d’être un pro.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 


Via Gust MEES
Gust MEES's curator insight, June 22, 2016 5:47 AM
Le hacking, désormais, est d’une simplicité enfantine.... Même les non-hackers s'y amusent ! Prenons le Wi-Fi public, par exemple. Pour espionner la navigation web de clients qui sirotent tranquillement leur café dans une brasserie avec Wi-Fi gratuit, pas besoin d’être un pro.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

20 Ideas for Professional Development in the Digital Age

20 Ideas for Professional Development in the Digital Age | information analyst | Scoop.it
What is professional development?  It is pretty much anything that helps one develop professionally. At the heart, professional development is about growth and learning.  In the field of education, it seems like many quickly think of educational opportunities that mimic what they see in their schools. As a result, they turn professional learning and education into schooling.  The problem with that is that schooling is too limiting.  In this age, there are many other exciting and high-impact learning opportunities for teachers that extend beyond traditional notions of schooling.  When we hear the phrase “professional development,” certain practices likely come to mind, things like in-services and conferences. In the digital age, there are countless other opportunities for professional development and restricting one’s thoughts to just a few options limits our insight into what is possible for our students.  With that in mind, here is a brainstorm of 20 options available to educators today. This is far from an exhaustive list, but it is enough to start exploring the possibilities.  Feel free to suggest others in a comment to this post.

 

Learn more:

 

Professional Development: WHY EDUcators And TEACHers Can’t Catch UP THAT Quickly AND How-To Change It

 

LEARNing To LEARN For MY Professional Development | I Did It MY Way

 

 

 


Via Gust MEES
Nataliia Viatkina/Наталія Вяткіна's curator insight, March 26, 2017 4:20 AM
Professional development for teachers themselves, as personalities, adult people, universally, independently from schooling is very interesting idea, humanistic , and useful for school eventually

Prof. Dr. Kai Reinhardt's curator insight, March 30, 2017 2:42 AM
Hier gibt es eine gute Sammlung an neuen Wissenstransfer-Formaten...
R's curator insight, April 6, 2017 1:31 PM
Growth and learning beyond schooling - think outside in-service and conferences/professional workshops.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

EU GDPR Infographic: What the new Regulation means in 1 minute – IT Governance Blog | #Privacy #EU #laws

EU GDPR Infographic: What the new Regulation means in 1 minute – IT Governance Blog | #Privacy #EU #laws | information analyst | Scoop.it
If your organisation does business within the European Union or collects data on European citizens you’ve likely been told about the newly approved EU General Data Protection Regulation (GDPR), which will come into force in spring 2018.

The GDPR will increase privacy for individuals and give regulatory authorities greater powers to take action against businesses that breach the law.

Are you prepared to take the steps necessary for compliance? Here’s a brief overview of everything you need to know about the new Regulation and what it means for your business.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 


Via Gust MEES
Gust MEES's curator insight, May 10, 2016 1:54 PM
If your organisation does business within the European Union or collects data on European citizens you’ve likely been told about the newly approved EU General Data Protection Regulation (GDPR), which will come into force in spring 2018.

The GDPR will increase privacy for individuals and give regulatory authorities greater powers to take action against businesses that breach the law.

Are you prepared to take the steps necessary for compliance? Here’s a brief overview of everything you need to know about the new Regulation and what it means for your business.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

 

Bruillon's curator insight, May 23, 2016 1:52 PM
Nouvelle réglementation sur PDP
Rescooped by michel verstrepen from digital marketing strategy
Scoop.it!

The Four V's of Big Data | Infographic

The Four V's of Big Data | Infographic | information analyst | Scoop.it

BM data scientists break big data into four dimensions: volume, variety, velocity and veracity.

 

 

 

Via Tobias Frydman, Gust MEES, malek
Gust MEES's curator insight, February 8, 2016 11:53 AM

IBM data scientists break big data into four dimensions: volume, variety, velocity and veracity.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Big+Data...


Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

A framework for content curation

A framework for content curation | information analyst | Scoop.it
In conversation at EduTECH earlier this month, Harold Jarche evoked George E. P. Box's quote that "all models are wrong, but some are useful". Of course, the purpose of a model is to simplify a com...


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Curation


https://globaleducationandsocialmedia.wordpress.com/2014/01/19/pkm-personal-professional-knowledge-management/



Via Ana Cristina Pratas, Gust MEES
Dr. Pyrate's curator insight, June 19, 2015 9:00 AM

How do I know I'm curating this? (go meta!) Well, inserting comments helps. I can't read the top level in this image, so this could be improved.

Karen Dunlap's curator insight, June 19, 2015 7:43 PM

Could be nicely applied to online PLC formation. 

Zhang Meilan's curator insight, June 25, 2015 11:20 PM

该内容策展的框架,虽招致很多争议,但其将策展能激发学生参与到让学生的策展产生价值,分成了三个类别,8个层次,这对指导策展教学很有意义。

第一类是引起学生注意:1.吸引我; 2.激励我。

第二类是告诉学生:3.告诉我; 4.给我看。

第三类是让学生自己行动:5.让我来;6.支持我;7.让我做的更好;8.让我产生价值。