37 resultados para PSC-CUNY program


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This presentation tells how podcasts can be used to enhance the learning experience of English as a Second Language (ESL) students registered in a content-based language immersion program. The students were placed in groups of four and asked to prepare an oral presentation. The topics of the presentations included Financial Aid, College Courses and Course Schedules and Academic Policies. Each presentation was podcasted to give students an opportunity for self-evaluation and feedback.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Math teachers everywhere agree: the way to learn math is to do math. Effective homework is a key to a successful math course. With this goal in mind, a group of math professors at BCC spent the last year working with the online homework system WeBWork. Our intention is to expand our current implementation, with the hope of working across campuses. We will discuss the advantages of WeBWork and how we might work collaboratively across CUNY.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

I consider the case for genuinely anonymous web searching. Big data seems to have it in for privacy. The story is well known, particularly since the dawn of the web. Vastly more personal information, monumental and quotidian, is gathered than in the pre-digital days. Once gathered it can be aggregated and analyzed to produce rich portraits, which in turn permit unnerving prediction of our future behavior. The new information can then be shared widely, limiting prospects and threatening autonomy. How should we respond? Following Nissenbaum (2011) and Brunton and Nissenbaum (2011 and 2013), I will argue that the proposed solutions—consent, anonymity as conventionally practiced, corporate best practices, and law—fail to protect us against routine surveillance of our online behavior. Brunton and Nissenbaum rightly maintain that, given the power imbalance between data holders and data subjects, obfuscation of one’s online activities is justified. Obfuscation works by generating “misleading, false, or ambiguous data with the intention of confusing an adversary or simply adding to the time or cost of separating good data from bad,” thus decreasing the value of the data collected (Brunton and Nissenbaum, 2011). The phenomenon is as old as the hills. Natural selection evidently blundered upon the tactic long ago. Take a savory butterfly whose markings mimic those of a toxic cousin. From the point of view of a would-be predator the data conveyed by the pattern is ambiguous. Is the bug lunch or potential last meal? In the light of the steep costs of a mistake, the savvy predator goes hungry. Online obfuscation works similarly, attempting for instance to disguise the surfer’s identity (Tor) or the nature of her queries (Howe and Nissenbaum 2009). Yet online obfuscation comes with significant social costs. First, it implies free riding. If I’ve installed an effective obfuscating program, I’m enjoying the benefits of an apparently free internet without paying the costs of surveillance, which are shifted entirely onto non-obfuscators. Second, it permits sketchy actors, from child pornographers to fraudsters, to operate with near impunity. Third, online merchants could plausibly claim that, when we shop online, surveillance is the price we pay for convenience. If we don’t like it, we should take our business to the local brick-and-mortar and pay with cash. Brunton and Nissenbaum have not fully addressed the last two costs. Nevertheless, I think the strict defender of online anonymity can meet these objections. Regarding the third, the future doesn’t bode well for offline shopping. Consider music and books. Intrepid shoppers can still find most of what they want in a book or record store. Soon, though, this will probably not be the case. And then there are those who, for perfectly good reasons, are sensitive about doing some of their shopping in person, perhaps because of their weight or sexual tastes. I argue that consumers should not have to pay the price of surveillance every time they want to buy that catchy new hit, that New York Times bestseller, or a sex toy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a classroom at the New York Trade School, students in the Electrical program are shown learning to wire a house. Black and white photograph.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A student from the Data Processing program at the New York Trade School is shown working. Black and white photograph with some edge damage due to writing in black along the top.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nat Gold graduated from the Sheet Metal program at the New York Trade School in 1942. He is represented here in the sheet metal shop he owns. Notice the blueprints for the White Plains Senior High School hanging on the wall behind him. Original caption reads, "Shop Owner, Brook Sheet Metal Inc. Nat Gold - Sheet Metal 1942, represents one of many Sheet Metal graduates who became owners of their own business." Black and white photograph.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Felice Gigante a graduate from the New York Trade School Electronics program works on a machine in his job as Data Processing Customer Engineer for the International Business Machines Corp. Original caption reads, "Felice Gigante - Electronices, International Business Machines Corp." Black and white photograph with caption glued to reverse.