117 resultados para IoT, RFID, WSN, Embedded Intelligens, Web 3.0


Relevância:

100.00% 100.00%

Publicador:

Resumo:

It has long been a concern that the wider uptake of the YAWL environment may have been hindered by the usability issues identified in the current Process Editor. As a consequence, it was decided that the Editor be completely rewritten to address those usability limitations. The result has been the implementation of a new YAWL Process Editor architecture that creates a clear separation between the User Interface component layer and the core processing back end, facilitating the redesign of the default user interface. This new architecture also supports the development of multiple User Interface front ends for specific contexts that take advantage of the core capabilities the new Editor architecture has to offer.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study explores and evaluates students’ and teachers’ experiences when using a range of Web 2.0 tools in Higher Education teaching and learning. It contributes to our understanding of how Web 2.0 learning communities are constructed, experienced and the nature of the participation therein. This research extends our knowledge and understanding of the Web 2.0 phenomena, and provides a framework that can assist with improving future Web 2.0 implementation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This project explores employees’ adoption of Web 2.0 within organisations. It shows that the adoption of Web 2.0 is a challenging and dynamic process that changes over time. The adoption is, also, influenced by a number of interrelated issues including: People Traits, Social Influence, Trust, Technological Attributes, Relevance of Web 2.0, Web 2.0 Maturity, Organisational Support, and Organisational Practice.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The economics of supporting learning has seen institutional encouragement of a wide range of blended learning initiatives in face to face and online teaching and learning. This has become one of the key drivers for the adoption of technology in teaching, in a manner occassionally guilty of putting the cart before the horse. Learning spaces are increasingly equipped with a dizzying array of technological options testifying to institutional and governmental investment and commitment in supporting face to face blended learning (QUT, 2011, C/4.2). Yet innovation within traditional learning and teaching models faces a number of challenges both at an institutional level and at the teaching coal face. Web 2.0 technologies present a vast array of opportunities to harness and capture the attention of students in engaging learning opportunitites. This presentation will explore technologies supportive of active learning pedagogies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article examines the design of ePortfolios for music postgraduate students utilizing a practice-led design iterative research process. It is suggested that the availability of Web 2.0 technologies such as blogs and social network software potentially provide creative artist with an opportunity to engage in a dialogue about art with artefacts of the artist products and processes present in that discussion. The design process applied Software Development as Research (SoDaR) methodology to simultaneously develop design and pedagogy. The approach to designing ePortfolio systems applied four theoretical protocols to examine the use of digitized artefacts to enable a dynamic and inclusive dialogue around representations of the students work. A negative case analysis identified a disjuncture between university access and control policy, and the relative openness of Web2.0 systems outside the institution that led to the design of an integrated model of ePortfolio.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recently, botnet, a network of compromised computers, has been recognized as the biggest threat to the Internet. The bots in a botnet communicate with the botnet owner via a communication channel called Command and Control (C & C) channel. There are three main C & C channels: Internet Relay Chat (IRC), Peer-to-Peer (P2P) and web-based protocols. By exploiting the flexibility of the Web 2.0 technology, the web-based botnet has reached a new level of sophistication. In August 2009, such botnet was found on Twitter, one of the most popular Web 2.0 services. In this paper, we will describe a new type of botnet that uses Web 2.0 service as a C & C channel and a temporary storage for their stolen information. We will then propose a novel approach to thwart this type of attack. Our method applies a unique identifier of the computer, an encryption algorithm with session keys and a CAPTCHA verification.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social media tools are starting to become mainstream and those working in the software development industry are often ahead of the game in terms of using current technological innovations to improve their work. With the advent of outsourcing and distributed teams the software industry is ideally placed to take advantage of social media technologies, tools and environments. This paper looks at how social media is being used by early adopters within the software development industry. Current tools and trends in social media tool use are described and critiqued: what works and what doesn't. We use industrial case studies from platform development, commercial application development and government contexts which provide a clear picture of the emergent state of the art. These real world experiences are then used to show how working collaboratively in geographically dispersed teams, enabled by social media, can enhance and improve the development experience.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The emerging growth of Web 2.0 has been observed by users in the workplace, and has therefore encouraged organisations to introduce Web 2.0 technologies in their businesses. Although its adoption is beneficial, it could meets with employees resistance due to some organisational factors. The successful implementation of Enterprise Web 2.0 is based on employee adoption of such social technology. Using a qualitative study, this research explores how organizational support can influence employees’ adoption of Enterprise Web 2.0. The findings show that organisational support encourages and facilitates a smooth adoption. Such support can be provided by management and colleagues in several forms: developing a Web 2.0 strategy, providing required resources for such training, recognising and encouraging adopters, and involving managers in the adoption.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is a new type of home education parent challenging long-held assumptions about homeschooling (cf. Morton 2012). These parents are well educated (cf. Beck 2010) but have chosen to eschew the social and cultural capital (Bourdieu & Wacquant 1992) of school in favour of some- thing completely different. They are unschoolers, which involves ‘allow- ing children as much freedom to learn in the world as their parents can possibly bear’ (cf. Holt & Farenga 2003: 238). This chapter presents the approach taken by one researcher to explore the reasons families choose unschooling. These families can be difficult to access, because they often fail to register with home education units and thus remain outside the education system (cf. Townsend 2012). Their lack of registration makes them largely invisible, affecting their ability to make an important contribution to debates around education. In spite of this invisibility, many unschoolers are keen to talk to researchers to increase wider understanding of unschooling.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Developed economies are moving from an economy of corporations to an economy of people. More than ever, people produce and share value amongst themselves, and create value for corporations through co-creation and by sharing their data. This data remains in the hands of corporations and governments, but people want to regain control. Digital identity 3.0 gives people that control, and much more. In this paper we describe a concept for a digital identity platform that substantially goes beyond common concepts providing authentication services. Instead, the notion of digital identity 3.0 empowers people to decide who creates, updates, reads and deletes their data, and to bring their own data into interactions with organisations, governments and peers. To the extent that the user allows, this data is updated and expanded based on automatic, integrated and predictive learning, enabling trusted third party providers (e.g., retailers, banks, public sector) to proactively provide services. Consumers can also add to their digital identity desired meta-data and attribute values allowing them to design their own personal data record and to facilitate individualised experiences. We discuss the essential features of digital identity 3.0, reflect on relevant stakeholders and outline possible usage scenarios in selected industries.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information and communication technology (ICT) has created opportunities for students' online interaction in higher education throughout the world. Limited research has been done in this area in Saudi Arabia. This study investigated university students' engagement and perceptions of online collaborative learning using Social Learning Tools (SLTs). In addition, it explored the quality of knowledge construction that occurred in this environment. A mixed methods case study approach was adopted, and the data was gathered from undergraduate students (n=43) who were enrolled in a 15-week course at a Saudi university. The results showed that while the students had positive perceptions towards SLTs and their engagement, data gathered from their work also showed little evidence of high levels of knowledge construction.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Home education is on the rise in Australia. However, unlike parents who choose mainstream schooling, these parents often lack the support of a wider community to help them on their educational and parenting journey. This support is especially lacking as many people in the wider community find the choice to home education confronting. As such, these parents may feel isolated and alienated in the general population as their choice to home educate is questioned at best, and ridiculed at worst. These parents often find sanctuary online in homeschool groups on Facebook. This chapter explores the ways that Facebook Groups are used by marginalized and disenfranchised families who home educate to meet with others who are likeminded and aligned with their beliefs and philosophies. It is through these groups that parents, in relation to schooling it is especially mothers, are able to ask for advice, to vent, to explore options and find connections that may be lacking in the wider community.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Web 1.0 referred to the early, read-only internet; Web 2.0 refers to the ‘read-write web’ in which users actively contribute to as well as consume online content; Web 3.0 is now being used to refer to the convergence of mobile and Web 2.0 technologies and applications. One of the most important developments in mobile 3.0 is geography: with many mobile phones now equipped with GPS, mobiles promise to “bring the internet down to earth” through geographically-aware, or locative media. The internet was earlier heralded as “the death of geography” with predictions that with anyone able to access information from anywhere, geography would no longer matter. But mobiles are disproving this. GPS allows the location of the user to be pinpointed, and the mobile internet allows the user to access locally-relevant information, or to upload content which is geotagged to the specific location. It also allows locally-specific content to be sent to the user when the user enters a specific space. Location-based services are one of the fastest-growing segments of the mobile internet market: the 2008 AIMIA report indicates that user access of local maps increased by 347% over the previous 12 months, and restaurant guides/reviews increased by 174%. The central tenet of cultural geography is that places are culturally-constructed, comprised of the physical space itself, culturally-inflected perceptions of that space, and people’s experiences of the space (LeFebvre 1991). This paper takes a cultural geographical approach to locative media, anatomising the various spaces which have emerged through locative media, or “the geoweb” (Lake 2004). The geoweb is such a new concept that to date, critical discourse has treated it as a somewhat homogenous spatial formation. In order to counter this, and in order to demonstrate the dynamic complexity of the emerging spaces of the geoweb, the paper provides a topography of different types of locative media space: including the personal/aesthetic in which individual users geotag specific physical sites with their own content and meanings; the commercial, like the billboards which speak to individuals as they pass in Minority Report; and the social, in which one’s location is defined by the proximity of friends rather than by geography.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Online technological advances are pioneering the wider distribution of geospatial information for general mapping purposes. The use of popular web-based applications, such as Google Maps, is ensuring that mapping based applications are becoming commonplace amongst Internet users which has facilitated the rapid growth of geo-mashups. These user generated creations enable Internet users to aggregate and publish information over specific geographical points. This article identifies privacy invasive geo-mashups that involve the unauthorized use of personal information, the inadvertent disclosure of personal information and invasion of privacy issues. Building on Zittrain’s Privacy 2.0, the author contends that first generation information privacy laws, founded on the notions of fair information practices or information privacy principles, may have a limited impact regarding the resolution of privacy problems arising from privacy invasive geo-mashups. Principally because geo-mashups have different patterns of personal information provision, collection, storage and use that reflect fundamental changes in the Web 2.0 environment. The author concludes by recommending embedded technical and social solutions to minimize the risks arising from privacy invasive geo-mashups that could lead to the establishment of guidelines for the general protection of privacy in geo-mashups.