Gordon And Mike's Ict Podcast

Informações:

Sinopse

Perspectives on Technology and Education from Gordon F. Snyder, Jr. & Mike Qaissaunee

Episódios

  • Ten Minutes with OP-TEC Webmaster Ian Anderson

    09/04/2017 Duração: 09min

    The National Center for Optics and Photonics Education, OP-TEC, is a consortium of two-year colleges, high schools, universities, national laboratories, industry partners, and professional societies funded by the National Science Foundation’s Advanced Technological Education (ATE) program. The participating entities of OP-TEC have joined forces to create secondary-to-postsecondary as well as returning adult “pipelines” of highly qualified and strongly motivated students and to empower two-year colleges to prepare technicians in optics and photonics.

  • Hacking Car Anti-collision Systems [19:08]

    28/08/2016 Duração: 19min

    Hacking Car Anti-collision Systems, August 28, 2016 A group of researchers presenting at this month’s Def Con hacker conference showed how they were able to trick Tesla's sophisticated anti-collision sensors to make a car hit an object it would normally detect in its path. Before we start on the cars – you went to Def Con this year Mike – how was it? So let’s get to the cars now – who did this research? The group consisted of Chen Yan, a PhD student at Zhejiang University, Jianhao Liu, a senior security consultant at Qihoo 360, and Wenyuan Xu, a professor at Zhejiang University and The University of South Carolina. So can you give a quicker overview of what they did? They discovered methods for "quieting" sensors to diminish or hide obstacles in a car's path, "spoofing" them to make an object appear farther or closer than it actually is, and jamming, which, Yan said, renders the sensor useless as it's "overwhelmed by noise." Could this be done now? I mean, if someone is driving a Tesla or any other car with t

  • Lock It and Still Lose It [24:11]

    15/08/2016 Duração: 24min

    Q: Could you tell us a little about how this research began? A: Actually in 2013 Flavio Garcia, a computer scientist at University of Birmingham, and a team of researchers were about to reveal a vulnerability in the ignition of Volkswagen cars that allowed them to start the car and drive off without a key. This vulnerability was present in millions of VWs. Q: You say “about to reveal”? A: Yes, they were sued, which delayed the publication of the work for 2 years. They used that time to continue their research into vulnerabilities with VW cars. Q: So did they find anything new? A: They sure did. The paper they just published identifies flaws not only with the ignition system, but also with the keyless entry system. Q: How many cars are we talking about? A: The researchers claim that every Volkswagen sold since 1995 is affected. The estimate is nearly 100 million cars! Q: Which cars are affected? A: There are two distinct attacks – one impacts Audi and Škoda cars; the other Alfa Romeo, Citroen, Fiat, Ford, Mits

  • Intro To Pokemon Go [31:14]

    24/07/2016 Duração: 31min

    References: http://www.usatoday.com/story/tech/gaming/2016/07/15/beginners-guide-pokmon-go/87133450/ http://www.theregister.co.uk/2016/07/19/hacker_46_months_db_breach/  

  • 4K Ultra High Definition Television [22:37]

    07/05/2016 Duração: 22min

    Title: 4K Ultra High Definition Television  Introduction High definition has meant 1080p (1,920 by 1,080) resolution for years now, and it's ready for an upgrade. That's where 4K, also called ultra high-definition, or UHD, television comes in. 4K is finally a mature, accessible technology. In this podcast we take a close look at UHD 4K technology referencing a PC Magazine post.   Updates  First some continued bad news on the security front … Businesses pay $100,000 to DDoS extortionists who never DDoS anyone – Dan Goodin http://arstechnica.com/security/2016/04/businesses-pay-100000-to-ddos-extortionists-who-never-ddos-anyone/ Out-of-date apps put 3 million servers at risk of crypto ransomware infections – Dan Goodin http://arstechnica.com/security/2016/04/3-million-servers-are-sitting-ducks-for-crypto-ransomware-infection/ Now for a little good news … Petya Ransomware's Encryption Defeated and Password Generator Released – Lawrence Abrams http://www.bleepingcomputer.com/news/security/petya-ransomwares-encr

  • Engineering Technology and Engineering Degrees – What is the Difference [20:30]

    29/04/2016 Duração: 20min

    Questions we try to answer in the podcast: 1. What is the difference between an Engineering Technology degree and a Bachelor of Science in Engineering? 2. Can you also get an AS or AAS degree in Engineering Technology at a Community College? 3. What is the career path for an Engineering Technology degree holder versus a Bachelor of Science in Engineering? 4. What should you be doing in high school if you are interested in an Engineering Technology or Bachelor of Science in Engineering degree? 5. What courses will you likely take in college if you pursue an Engineering Technology degree? 6. What courses will you likely take in college if you pursue a Bachelor of Science in Engineering degree? 7. What interests are common to engineering technology degree and engineering bachelor of science degree pursuers? Reference: https://floridapolytechnic.org/engineering-technology-degree/

  • FCC Spectrum Auction 2016 [32:00]

    10/04/2016 Duração: 32min

    Intro On Wednesday, March 30, 2016 the Federal Communications Commission (FCC) started a three-year process of making our mobile internet even faster and better. The government is buying underused TV airwaves and selling it to mobile carriers for billions of dollars. These radio waves—also known as spectrum—will shape mobile US connectivity as streaming video continues to swallow up bandwidth across the country and as we inch closer to 5G internet speeds. In this podcast, we discuss the auction process. Updates Ransomware Evolution is Really Bad News ­ - Angela Alcorn Recently, 10 hospitals in Maryland operated without access to their central network because their domain servers were locked by a ransomware known as Samsam http://www.makeuseof.com/tag/ransomware-evolution-is-really-bad-news-microsoft-edge-will-intelligently-pause-flash-tech-news-digest/ Victims paid more than $24 million to ransomware criminals in 2015 — and that's just the beginning – Dan Turkel The DOJ revealed that the Internet Crime Compla

  • What You Need to Know About Ransomware [32:04]

    03/04/2016 Duração: 32min

    On March 31st, 2016 the US Computer Emergency Readiness Team or US-CERT released alert TA 16-091A titled “Ransomware and Recent Variants”. Ransomware is a type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it. Already in 2016, destructive ransomware variants such as Locky and Samas were observed infecting the computers of individuals and businesses – even hospitals and healthcare facilities. The purpose of this Alert is to provide further information on ransomware, its main characteristics, its prevalence, variants that may be proliferating, and how users can prevent and mitigate against ransomware. References: https://en.wikipedia.org/wiki/Ransomware_(malware) https://www.us-cert.gov/ncas/alerts/TA16-091A 

  • Big Data Introduction

    02/03/2016 Duração: 21min

    We’ve hear the term “big data” used a lot lately. The term itself makes us thing about lots and lots of information. Sure there’s lots of information but what most important to an organization is what is done with the data. In this podcast we take an introductory look at what big data is, discuss how it is being used, and refer to an excellent document at SAS.com

  • Conducting Social Media Research Part 1 [16:48]

    08/07/2014 Duração: 16min

    As part of a National Science Foundation grant received by the Educational Development Corporation in Massachusetts, Mike and I have been involved with a group of small business social media experts from around the country defining a step-by-step social media process for Social Technology Enabled Professionals. These small business people build, maintain, manage and leverages online social networks to engage with customers, business partners, employees and key influencers with the goal of building organizational success.  In this podcast, we cover part one of the first duty and discuss some of the tasks involved. 

  • Why Social Media (21:58 min)

    15/06/2014 Duração: 21min

    All businesses and organizations desire greater engagement with their audiences. However, many are not leveraging the social media platforms that allow for the best opportunities for engagement. From static postal flyers, electronic newsletters to a lack of regular communication, engagement becomes difficult. Social media platforms call for regular, sustained communications and conversations between the businesses/organizations and their audiences. Blogs allow for that engagement by allowing readers to comment on postings, share links and/or rate postings. Some blogs allow for other interaction functionality like including a poll in a posting. On Facebook and Twitter engagement, in the form of “like,” comment, and re-tweet, is much more the norm than perhaps on blogs. This podcast will briefly introduce the listener to a three tiered social media strategy approach: .    1)  Primary (Blog or similarly organized content on an organizational website) .    2)  Secondary (Platforms such as YouTube, Instagram, Pi

  • Bits and Bytes - Disappearing Facebook, Online Cheating, 4G and Dial-Up Modems [37:43]

    07/06/2012 Duração: 37min

    Mike and Gordon discuss current topics.  Referenced Links: Seinfeld clip http://www.youtube.com/watch?v=Ia02fGpUQfU Online Classes See Cheating Go High-Tech http://chronicle.com/article/Online-Courses-Can-Offer-Easy/132093/ Facebook Will Disappear by 2020, Says Analyst http://mashable.com/2012/06/04/analyst-facebook-disappear/ Museum of Endangered Sounds http://savethesounds.info/ The Mechanics and Meaning of That Ol' Dial-Up Modem Sound http://www.theatlantic.com/technology/archive/2012/05/the-mechanics-and-meaning-of-that-ol-dial-up-modem-sound/257816/#.T8kgIfaSL7k.twitter An Honest Review of the Samsung Galaxy Nexus http://www.amazon.com/review/R3FWF2X2CYKJ1/ See You Later WiMAX http://www.gordostuff.com/2012/06/see-you-later-wimax.html

  • Bits and Bytes - 4G LTE, Motorcycles made from Car Parts, and Bamboo Clothing [36:10]

    03/06/2012 Duração: 36min

    Mike and Gordon discuss current topics.  Referenced Links: http://www.gottabemobile.com/2012/05/10/verizon-homefusion-uses-4g-lte-to-complete-last-mile-nationwide/ http://www.cariloha.com/eSource/Cariloha/ecom/eSource/default/default.aspx http://www.ted.com/talks/marcin_jakubowski.html http://translate.google.com/translate?hl=en&sl=fr&tl=en&u=http%3A%2F%2Fchameaudacier.free.fr%2Fmoto2.html

  • The Need for Speed: 802.11ac – 5th Generation Gigabit WiFi [18:40]

    07/02/2012 Duração: 18min

    Rumors are that Apple is planning on incorporating support for the new faster 802.11ac Wi-Fi specification into products this year. In this podcast we discuss the 802.11ac and other wireless specs. We discuss the following questions: - So, what’s the deal with this 802.11ac? - These 802 dot whatever standards - where do they come from? - So this 802.11ac is considered non-finalized. what does that mean? - I seem to get interference from things like wireless home phones. I know spectrum is involved. - So if I set my access point to run at 5GHz, will all my devices work? What do i need to understand to make it work? - What about range? You mentioned range limitations at 5 GHz. - Are there any ways to extend the range? I’ve heard about something called MIMO. - You mentioned 802.11a which is pretty old. Is the use of 5 GHz new? - When will we see 802.11ac products on the market? - What kinds of products from Apple? What are people saying? - What do you mean when you say potentially for th

  • Why We Are Not Google: Lessons from a Library Web site Usability Study [22:40]

    23/11/2011 Duração: 22min

    Back in September I had the chance to interview Troy Swanson, an Associate Professor / Teaching and Learning Librarian at Moraine Valley Community College in Palos Hills, IL. In the interview we discussed a paper he published with Public Service Librarian Jeremy Green, also at Moraine Valley Community College. Here's the abstract from that paper published at ScienceDirect. In the Fall of 2009, the Moraine Valley Community College Library, using guidelines developed by Jakob Nielsen, conducted a usability study to determine how students were using the library Web site and to inform the redesign of the Web site. The authors found that Moraine Valley's current gateway design was a more effective access point to library resources than a mock-up site which incorporated a central-search box on the site homepage. This finding stands in contrast to the observed trends of library Web site design that emphasizes a “Googlized” search. Troy's findings are very interesting, especially if you are managing/mdifying an exist

  • The Jester and DoS, Preventing Attacks, Seizure of Domain Names and Other Topics [32:30]

    28/03/2011 Duração: 32min

    In this episode, we discuss a wide range of topics, including:  - The Jesters denial of service attack on the Westboro Baptist Church website. - How one might prevent such attacks - The seizure of domain names by the Department of Homeland Security - The treatment of Bradley Manning - Google and bugs in Flash - A 16-year old girl that may have hacked HBGary  - Skype and encryption data leaks and, finally - How the events in Japan may effect iPad2 availability. Layer 7 Denial of Service attacks: th3j35t3r's assault on Westboro Baptist Church Website Continues https://www.infosecisland.com/blogview/12400-Assault-on-Westboro-Baptist-Church-Website-Continues.html Live Performance Report for Westboro Church Website: four sites held down 24 days from a single 3G cellphone:  http://uptime.netcraft.com/perf/graph?site=www.godhatesfags.com Defense techniques: Protecting a Web server with a Load-Balancer  http://samsclass.info/124/proj11/proj15-haproxy.html Protecting a Web server with mod_security (a Web Application F

  • HB Gary, Voice over LTE and WiFi Breakthroughs [26:50]

    21/02/2011 Duração: 26min

    In this podcast, Mike Qaissaunee, Sam Bowne and Gordon Snyder discuss recent HB Gary and Aaron Barr news, Verizon Wireless Voice over LTE, along with a recent WiFi Breakthrough. Here's some of the questions we discuss and answer in the podcast: Gordon: Sam any new news on the HBGary/Anonymous situation? Mike: Sam, I see Anonymous has released decompiled Stuxnet code - what does that mean? What's the difference between soucre and a decompiled binary? Sam: Gordon, you wrote something about Verizon and Voice over LTE - could you tell us about that? Mike: Sam, one of my former students got a letter from his ISP after download a movie from a torrent site. #1 What do you have to say about the legal and ethical issues of what he's do

  • Community College Blogging: A Conversation with Dr Troy Swanson [30:40]

    18/02/2011 Duração: 30min

    Gordon talks with Dr Troy Swanson, an Associate Professor / Teaching and Learning Librarian at Moraine Valley Community College in Palos Hills, IL. In December Troy completed his PhD in Community College Leadership at Old Dominion University. His dissertation was titled The Administration of Community College Blogs: Considering Control and Adaptability in Loosely Coupled Systems. In the podcast, Troy discusses some of his findings.Here’s some dissertation background from Troy:Web 2.0 technologies present an unlimited potential for outreach to the public by college employees. This presents a conundrum for community college administrators that David Weinberger calls "the conundrum of control." This conundrum is that organizations need to find a way to organize people around technology to ensure that it is used to further the organization’s mission. Yet, in terms of 2.0 technologies, the more controls that are put in place, the less useful the tools become.  There is also a second conundrum around technology

  • Anonymous, Barr, Stuxnet and Soliciting Hackers [29:20]

    12/02/2011 Duração: 29min

    We talk with Sam Bowne from City College of San Francisco about how a man tracked down Anonymous and paid a heavy price, Stuxnet, The Jester and how U.S. Chamber lobbyists solicited and used hackers.  Links: How one man tracked down Anonymous—and paid a heavy price http://goo.gl/5Gkyy  US Chamber’s Lobbyists Solicited Hackers To Sabotage Unions, Smear Chamber’s Political Opponents  http://goo.gl/zI9gp  US Chamber’s Lobbyists Solicited Firm To Investigate Opponents’ Families, Children http://goo.gl/uyWB8        

  • Maximizing Your Twitter Experience - 10 Quick Tips [36:30]

    04/12/2010 Duração: 36min

    Tim Frick at Mightybytes recently talked with Inc. Magazine journalist Minda Zetlin about how people are using Twitter. Zetlin had recently featured Frick in an article titled Secrets of Highly Effective Twitter Users. After that conversation, Frick wrote his own piece titled 10 Tips For Maximizing Your Twitter Account In this podcast, we review and comment on Frick’s ten tips. Before we discuss these tips, we also discuss some recent events in technology including:The FCC and net neutralityThe iPad and Macbook Air The Rockmelt Browser that integrates social media into your browser.Tim Wu's book The Master Switch: The Rise and Fall of Information EmpiresThe London School of Business and Finance Global M.B.A. - they are offering an MBA through a Facebook applicationHere’s the 10 Twitter tips we discuss: Tip 1. 125 or less. Don’t max out characters. Tip 2: Make the most of search functions. Tip 3: Follow the right people Tip 4: Trends and hashtags Tip 5: Content strategy Tip 6: Use URL shorteners Tip 7: Don't s

página 1 de 6