In the 1980s, many schools had fancy calculators, Macintosh computers, and were even teaching students basic coding. This kind of integration often happened at the lesson or activity level, meaning that it was often surface-level, tacked-on, and perhaps a bit superficial. The power of technology is difficult to fully leverage without curriculum-level integration. This means choosing tools, platforms, and policies based on standards, assessment, and instruction. A side benefit to this approach is the possibility of teacher collaboration and same-pageness. The following technology integration matrix we spotted over on zzwriter.com s excellent blog takes a look at this idea of embedding technology at the curriculum level. Across the top are the levelssimilar to our 4 Stages:The Integration of Technology in Learning , while on the left side are descriptors of what each level might look like in the classroom. 5 Levels Of Technology Integration In Curriculum
For the original version including any supplementary images or video, visit http://www.teachthought.com/technology/5-levels-of-technology-integration-in-curriculum/
Mr Nohl says that mobile banking customers in Africa rely on the security offered by their Sim cards Mr Nohl said he had found a way to discover the authentication code by sending a device a text message masquerading as a communication from the user's mobile operator. The message contained a bogus digital signature for the network. He said most phones cut contact after recognising the signature as being a fake - but in about a quarter of cases, the handsets sent back an error message including an encrypted version of the Sim's authentication code. The encryption is supposed to prevent the authentication code being discovered, but Mr Nohl said that in about half of these cases it was based on a 1970s coding system called Digital Encryption Standard (DES), which was once thought secure but could now be cracked "within two minutes on a standard computer". Once the attacker had this information, Mr Nohl said, they could upload malware to the Sim written in the Java programming language. He said these could be used by the hacker to send texts from the device to premium rate numbers they had set up, to discover and listen in to the target's voicemail messages and to track their location. In addition, he warned that combined with other techniques, it could act as a surveillance tool. "Sim cards generate all the keys you use to encrypt your calls, your SMS and your internet traffic," Mr Nohl told the BBC. "If someone can capture the encrypted data plus have access to your Sim card, they can decrypt it. "Operators often argue that it's not possible to listen in on 3G or 4G calls - now with access to the Sim card, it very much is." Mr Nohl said that his research suggested about an eighth of all Sim cards were vulnerable to the hack attack - representing between 500 million to 750 million devices.
For the original version including any supplementary images or video, visit http://www.bbc.co.uk/news/technology-23402988
It would be stretching a point to say that traditional tattoos are wearable technology, but in some ways there are, and the same case could be made for mobile phones. They're permanently with many of us; we wear them in the same way that some of us wear tattoos that were etched onto our skin by technology. Motorola is just part of the new wave of portable technology that goes way beyond tattoos and mobiles. There are large research groups involved in this field including Georgia Tech, MIT, ETH Zurich, University of Oregon, Carnegie Mellon University, Microsoft, Sony, Samsung and the aforesaid Google. There is a surprisingly number of people in the UK who use wearable technology. A recent report by by Rackspace and the Centre for Creative and Social Technology (CAST) at Goldsmiths, University of London found that more than eight million people in this country are doing so. Early examples include pacemakers for those with heart conditions, but there has been a recent surge in less urgent technology such as smart clothing and monitors for fitness... and a future that offers Google Glass, sensors implanted subcutaneously and even cloaks that offer invisibility. The next decade will see a revolution in our behaviour, however Canute-like we want to be. Related Articles Goodwood races into digital 07 Jul 2013 Kevin Curran is a Reader in Computer Science at the University of Ulster and Senior Member of the Institute of Electronic and Electrical Engineers (IEEE) and posits the early 1990s as the time when the term wearable computer was coined when it had the noble aim of extending the human body to do extraordinary tasks; this has led to a new form of synergy between human and computer. We are not yet at the stage where wearable computers are able to take the place of our mobiles but as the miniaturisation of computer chips and components increase, we are very close to mass consumer products on the market. There is still much work to be done on standardising and improving user interfaces but the arrival of Google Glasses may change the playing field, he says. While Google Glass is obviously interesting, the discussion about its potential is over-hyped.
For the original version including any supplementary images or video, visit http://www.telegraph.co.uk/technology/news/10205121/Technology-You-wear-it-well.html