Data, personal learning and learning analytics

Jenny Connected

MOOC is Data. The second allows us to think of data – and hence, of our record of that knowledge – as distributed, as being copied and shared and circulated as and when needed around the world. AI in Education Symposium – Introduction : Oct 24, 2018 Arti?cial

2018 194

Facebook Subscriptions 2018 – Stop the Whining

Laurel Papworth- Social Network Strategy

I don’t like my data being sold more than anyone but I recognise a free service has to monetise in some way. Given most people hand over their data to supermarket loyalty cards to save 50c on coca cola, I’m thinking it’s pretty low.

2018 183

Improving SharePoint Lists – Roadmap 2018

Michael Sampson - Currents

Microsoft used the recent SharePoint Conference to introduce numerous improvements to SharePoint lists scheduled for 2018. About one third of these are available now, with the reminder scheduled to be delivered by the end of December 2018.

2018 116

cRaggy 2018: design, feedback & reflections

Learning Alliances

This blog post describes the cRaggy event at the June 2, 2018 Cascadia R Conf , its design, the logic behind its design, feedback from participants and reflections on how such an event might be better in the future. Produce a minimal example demonstrating how to access the data.

2018 130

Microsoft Build 2018 – Keynote Highlights

Michael Sampson - Currents

Microsoft Build 2018, a major conference hosted by Microsoft for its developers, was held in Seattle during the past week. – the importance of data privacy to Microsoft (as it should be).

2018 116

Staff Persona Avatars: Social Media, Big Data and Employer Branding

Laurel Papworth- Social Network Strategy

Would you use big data tools that analyse social media to identify your perfect job and ditch unsuitale jobs? Should organisations use big data tools to analyse social media to identify perfect candidates and ditch less than ideal ones? Big Data and Social media and Recruitment.

2018 157

HR and #BigData – How LinkedIn Uses Data Research for Recruitment

Laurel Papworth- Social Network Strategy

HR and Big Data – How LinkedIn Uses Data Research. Microsoft said they bought LinkedIn for the data – such an interesting video on how LinkedIn intends to use the information we provide. Data/profile on every member of the global workforce (3 billion).

2018 136

Data Breaches – It’s Not Just Hackers

Michael Sampson - Currents

In the General Data Protection Regulation and other data protection regulations around the world, data breaches are a topic of concern. In all cases, the regulators do not want data breaches to happen (because it goes against the data protection mandate), and generally speaking, there is a requirement to notify a given authority when a data breach is detected. Data Protection

2018 98

Cambridge Analytica vs Beacon – Facebook Australia Quantium

Laurel Papworth- Social Network Strategy

How Facebook and Twitter work with big data companies in Australia and beyond. And while Twitter and other companies are also using this data, its the big data companies that should be looked at more carefully. Health Data for example. But it is very much like 2018.

2018 201

Identifying Dark Data in non-OCR’d Images

Michael Sampson - Currents

The new European data protection legislation goes into effect next Friday. There are many aspects required in complying with GDPR, but one core tenet is knowing where you are storing personal data. A challenging data type in this respect is images that contain personal data but where the image has not been converted to readable text. Identification of personal data is important. Data Protection

2018 104

Open Educational Resources and the Distributed Web

Jenny Connected

Instead they ‘use the hash of the data or content as an address, enabling the data to be distributed across the cloud’ , thus creating a content addressable resource. In this video, posted for the fifth week of the E-Learning 3.0 MOOC , Stephen Downes makes the case for open education.

2018 225

Facebook Eavesdropping Patent and Congress Questions

Laurel Papworth- Social Network Strategy

Particular embodiments of the special purpose client application hosted on a mobile device of a user may be configured to continuously or periodically capture ambient audio waveform data using a microphone or sensor subsystem in the mobile device.

2018 203

Security, identity, voice, opportunity and agency on the distributed web

Jenny Connected

Does projection of ourselves into the community also come with risk – risk to our data and identities? What Peace Means to Me Dec 20, 2018 video The only path toward peace and freedom from authoritarianism is the path that leads toward the creation and maintenance of the civil society.

2018 187

Using Data Analytics on People for Better Decision Making

Michael Sampson - Currents

Chantrelle and Natalie from the Workplace Analytics practice at Microsoft share three ideas of how organisations are using people analytics (defined as “ the use of data about human behavior, relationships and traits to make business decisions “): 1.

2018 116

Consensus and community in the distributed web

Jenny Connected

As of August 2018, about 1000 pages are deleted from Wikipedia each day. HolonIQ, Nov 30, 2018 Though dated last June this market map appeared in my inbox from Holon only today. Why isn’t there a clamor for Wikipedia to ease up on data collection?

2018 166

Failing to Create a Content Addressed Resource for the E-Learning 3.0 MOOC

Jenny Connected

Due: Nov 23, 2018. Nov 22, 2018 video. Nov 22, 2018 video. Nov 22, 2018 video. Nov 22, 2018 video. In this video I work with Dat, a node application that creates a Dweb node and shares files, websites and data across the distributed web.

2018 139

E-Learning 3.0 : some initial thoughts

Jenny Connected

created a web based on data and interoperability between platforms. The basic premise is that because we are moving from a world of documents to a world of distributed dynamic data, Web 3.0 will be based on a linked open data cloud.

2018 174

The Quantified, Qualified and Connected Self

Jenny Connected

We are the thread that runs through an otherwise disconnected set of data, and knowledge about ourselves, our associations, and our community will create an underlying fabric against which the value and relevance of everything else will be measured. This is not statistical data.

2018 148

Community network mapping: just get going!

Making CommunitySense

Try to follow natural reporting rhythms, instead of making the provision of mapping data an extra chore. Reuse existing data (e.g. However, don’t limited yourself to what data is ready at hand. Often, the most useful data is still in the heads of community members.

2018 219

And So It Begins

Michael Sampson - Currents

May 25, 2018. ” While all future dates are like that, May 25 this year was particularly interesting because that’s when the new European data protection law, the General Data Protection Regulation (GDPR) switches into enforcement mode. Data Protection

2018 116

What is uniquely human?

Jenny Connected

Unlike us, they don’t get tired and improve with more data. In this first week of the E-Learning 3.0 MOOC , Stephen Downes has shared a video introduction to the course (see [link] ) and also recorded a video of a conversation he had with George Siemens. This was really enjoyable to watch.

2018 170

E-Learning 3.0: Cloud Computing

Jenny Connected

From software and analytics to secure and safe data storage and networking resources, everything can be delivered via the cloud. Storing your information on OneDrive, SharePoint, or an email server is much different from keeping that data on a desktop hard drive or a USB stick. It means better data protection, improved availability, and expanded access to cutting-edge technologies. For this we will need to aggregate distributed data and resources.

Cloud 140

E-Learning 3.0 : Graph

Jenny Connected

I now know a bit more, and made some interesting discoveries, the most important one being that the graph is only as reliable/trustworthy as the data that is put in. Web: Graph Data Structure And Algorithms GeeksforGeeks , 2018/11/05. Graphs are important types of data structures.

2018 161

Spoof Intelligence Added for all Exchange Online Protection Plans #office365

Michael Sampson - Currents

Microsoft added Spoof Intelligence for email security earlier this year (January 2018 I think). Data ProtectionThis was included as a feature of the Office 365 Enterprise E5 plan, as well as a feature of the Advanced Threat Protection add-on for non-E5 customers.

2018 116

A Conversation about Community in the Distributed web

Jenny Connected

We have to build resistance to bad actors and that’s why making things harder, through blockchain, encryption and managing our own data, might be a good thing. But Roland suggested that encryption and managing our own data might also be bad for security.

2018 148

Creativity and experience on the distributed web

Jenny Connected

The week was spent gathering data on the beach and then recording it in a whole variety of ways in the evenings. The topic for the penultimate week in the E-Learning 3.0

2018 148

Digital badges and the purpose of education

Jenny Connected

But with xAPI activity data we can begin tracking things like which resources a person read, who they spoke to, and what questions they asked – anything. Indeed, the only people not benefiting are the learners themselves, with their own data.

2018 148

E-Learning 3.0 : Identity Graphs

Jenny Connected

In information systems design and theory, single source of truth (SSOT) is the practice of structuring information models and associated data schema such that every data element is stored exactly once. We are now in the fourth week of this E-Learning 3.0 open course/MOOC.

2018 148

Identity graphs as a ‘source of truth’

Jenny Connected

In his video Stephen says ‘ we are the source of truth for our digital identity’; we are the thread that runs through the disconnected and distributed data that makes up our digital identity graph. be about quality, about the rich tapestry of data relations we have.

2018 148

Badges are not sufficient

Jenny Connected

Whilst this raises concerns around issues of privacy and ethical use of data, it also means that people will be more in control of their own assessment. But with activity data we can begin tracking things like which resources a person reads, who they spoke to, and what questions they asked.

2018 139

Computing on R

Learning Alliances

It’s a big deal that R code can compute on R code because R code is just as much a “first class thing” as the data we compute on. My argument in this post is that Hadley’s model for data analysis describes computation on data and computation on the R organism.

2018 169

Information Protection in Windows 10 and OneDrive

Michael Sampson - Currents

Data loss prevention stops people from flowing information to other people when it’s sensitive or confidential and the other party doesn’t have access rights. Data Protection Microsoft 365

2018 116

Email Security

Michael Sampson - Currents

Data ProtectionThe prevalence of email (addresses, services, checking behaviours) has made it a key vector for hackers, attackers, and others devoted to maleficence. There are many varieties of bad email: – spam – unwanted email messages, normally carrying a commercial offer.

2018 116

Identity from the perspective of authentication

Jenny Connected

In this way, Katie’s public key is only used to encrypt but can never be used to decrypt, keeping the data safe. And Katie can only decrypt the data with her private key and would never exposes her private key to anyone, keeping her private key safe.

2018 139

Information Protection: The What

Michael Sampson - Currents

Microsoft deals with the above through two specific products in its information protection solutions portfolio: Office 365 data loss prevention (DLP) and Azure Information Protection (AIP). Data Protection Microsoft 365

2018 116

You can stimulate curiosity for self directed learning

Joitske Hulsebosch

Examples: Introduce something completely new, for example a new theory or a new technology that will be of influence Present data that shows an unexpected pattern. This morning I cycled in the sun to a school for higher eduction to a look back at a fun and successful project.

2018 169

Information Protection: The What – Office 365 DLP

Michael Sampson - Currents

For example, if a user downloads a file with sensitive data and then syncs it with Dropbox (or some other cloud sharing service), that content has just disappeared. Data Protection Microsoft 365

2018 116

E-Learning 3.0: Conversation with Ben Werdmuller

Jenny Connected

One of the unintended consequences of making everything open is that individuals with less power have less control over their data. Those with a lot of money can make their data opaque, but for others their data is transparent.

2018 139

Some Thoughts on Identity

Jenny Connected

What do we become in a world of artificial intelligence, linked data and cryptographic functions? The topic for Week 4 of Stephen Downes’ E-Learning 3.0 MOOC is Identity.

“Information Protection”

Michael Sampson - Currents

Data Protection Microsoft 365If you thought “collaboration” was a wiggly word with lots of definitions and places it could be used, you should try the phrase “information protection” on for size.

2018 116

GDPR: To Whom Does GDPR Apply?

Michael Sampson - Currents

Article 3 of the General Data Protection Regulation (GDPR) states: Territorial Scope. This Regulation applies to the processing of personal data by a controller not established in the Union, but in a place where Member State law applies by virtue of public international law.

2018 116

Networked City development

Social Reporter

Networked City is a loose framework within which people, projects and organisations can learn how to use mapping, network building, data and technology for community and social benefit. I’m currently writing for a new Networked City blog which complements our NWC wiki and NWC forum. We are developing a network and communities of practice. Recent posts at Networked City. Smarter London Together starts on the road to people-first design. Can it also lead to strong civil society?

2018 159

Recovering from NotPetya – the DLA Piper Story

Michael Sampson - Currents

It caused significant damage to its global IT infrastructure (hat tip, ITNews): – every data centre and Windows-based server was impacted. DLA Piper , a global law firm with a presence in more than 40 countries, was hit with the NotPetya ransomware attack in June 2017.

2018 153