5 resultados para Access to Content

em University of Southampton, United Kingdom


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This short 3-minute video show how you can make a recording available to anyone on the internet and how to restrict access again. It also shows how to disable and re-enable student access to a specific recording.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This 6-minute video shows tutors how they can control access to recordings made using panopto. They can disable access completely, restrict access to specific individuals or make a recording available to anyone in the world.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Looking at the Wider Picture of Open Access and other Open Agendas affecting Universities

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Free online training resources on using web 2.0 tools for busy lecturers. - 'Outstanding ICT initiative of the year' winner of the JISC award is commended for 'commitment to open access to online content' A wealth of openly available multimedia content won the JISC/Times Higher Award. Created by University of Westminster lecturer Russell Stannard's websites build upon pioneering work using video to mark students' work. Using screen recording software, Stannard recorded himself walking through various Web 2.0 technologies with a voice-over, which were then uploaded to a website - www.teachertrainingvideos.com. The site quickly proved popular and rapidly built into a bank of over 30 videos.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The use of electronic documents is constantly growing and the necessity to implement an ad-hoc eCertificate which manages access to private information is not only required but also necessary. This paper presents a protocol for the management of electronic identities (eIDs), meant as a substitute for the paper-based IDs, in a mobile environment with a user-centric approach. Mobile devices have been chosen because they provide mobility, personal use and high computational complexity. The inherent user-centricity also allows the user to personally manage the ID information and to display only what is required. The chosen path to develop the protocol is to migrate the existing eCert technologies implemented by the Learning Societies Laboratory in Southampton. By comparing this protocol with the analysis of the eID problem domain, a new solution has been derived which is compatible with both systems without loss of features.