Tuesday, December 13, 2011

R9 Navigation



This video help pilots learn how to use the R9 to teach navigation

Sunday, December 11, 2011

R9 Frequency Input

 
This video teaches how to enter both com and navigation frequencies into the Avidyne R9 FMS.

Thursday, June 16, 2011

Introduction to Avidyne R9 Avionics

How to setup and use the basic functions on the R9 computer simulator by Avidyne

Wednesday, June 1, 2011

Engaging the 21st Century Student

Notes from Dr. Mark Taylor Presentation 
Western Michigan University Fetzer Auditorium, Kalamazoo Michigan
May 16, 2011
Meet Generation NeXt: Understanding and Teaching Today’s Students

www.taylorprograms.com 

Kids today have grown up with the digital world at their fingertips and parents who managed their time. The students in school today have a few different characteristics then past students.  Not that they are all the same, but as a group they tend to be less compliant and less idealist.  Many of them see their parents as friends who offered options, instead of authority figures.  They all got the trophy for just showing up, so many do not value hard work and may take criticism poorly.  Protected from normal outcomes, many have not developed decision making skills, but love to offer their opinions.

College has been a struggle for some.  Part of it might be that they are used to their parents bulldozing the way.  The very few hours of studying a week which got them by, in high school, does not cut it in college.   Many have said that their connection to the net has left them easily distracted with attention issues.   Yet when they are engaged in something they value, with their ideas of unlimited horizons they can accomplish many things.

Mark Taylor’s opening lecture was about comparing this group of students with past and how to better engage them.  Generally today’s students are good at finding information very quickly, especially if they value the information.    By moving towards less lecturing and involving students more, they will learn to value and apply the required knowledge.  What worked for us, may not work for the average student. Most of us were automatically engaged in school, we loved the stuff we were learning, that is why we are teaching it.

Dr. Taylor gave some ideas for engaging the 21st century student.  They included
  • Improve students’ understanding of class expectation.
  • Moving content out of the classroom to before class study.
  • Make students responsible by quizzing them on being prepared.
  • Make class more active and a time of discovery.
  • Have students teach each other by rephrasing learned material.
  • Use the limited class time to teach students what information to value and to link knowledge with the skill that uses it.
  • Improving student future orientation, by showing them what they will be doing as the professional they aspire to become.  
  • Showing students the benefits of your class by linking class goals to needed skills.
Dr. Taylor ideas for working with student workers included

  • Make them feel as part of a team they value memberships and relations.
  • Understand the difference between age groups of workers. (Working with the Generations)
  • Helping them understand the expectation of adult life including
    • Orientation to authority  (Taking orders),
    • Importance of productivity,
    • Dealing with customers, and
    • Expected appearances.
  • Expecting some defensiveness – remember they think they are special and grew up with praise
  • Realizing your expectations may seem unrealistic to them, so help them by
    • Using another of the same generation to talk to them,
    • Sandwich praise with feedback to correct them related to a goal,
    • Giving more procedural and development feedback, and
    • Giving less personal feedback.
  • Helping them learn methods to stay on task.
 See blog entry from Mark Taylor first WMU visit from September 2010 at Notes on Dr. Taylor Sept 2010 WMU visit 



Reference

Taylor, Mark . (2011, May). Meet Generation NeXt – Understanding and Teaching Today’s Students: Lecture delivered at Western Michigan University Fetzer Auditorium, Kalamazoo, MI.

Thursday, April 28, 2011

Cloud Computing Security

Cloud Computing Security

Introduction
In the recent years, there has been a tendency to move away from mass in-house storage and keep data on the web or in “The Cloud”. A big advantage to this, is that this comes at a reduce price over in-house storage. This allows people access to your information, anywhere you have internet access. All types of things can be stored; some common ones include pictures, music, and e-mail. Weather you know it or not, you most likely already use cloud computing, if you use email like Yahoo Mail, Gmail, or Hotmail or social media like Facebook. Businesses can use “The Cloud” for many different business applications. The applications are almost limitless, but some common uses include data processing, accounting, email, office productivity software, and call center automation. These applications also include some Software-as-a-Services that are also moving off your computer and on to the web. This paper looks at exactly what is “The Cloud”, the questions ‘how safe is “The Cloud”, does it keep your information safe?’, and ‘what preparation can be done to protect you or your business?’

Formal Definition
The National Institute of Standards and Technology, Information Technology Laboratory defines Cloud computing as a
“model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

The NIST goes on to list essential characteristics
• On-demand self-service
• Broad network access
• Resource pooling
• Rapid elasticity
• Measured Service

Just as there are many different clouds in the sky, there are different types of cloud deployments. A Private cloud is run exclusively for one organization. A Community cloud is used for a group of organizations with similar needs or requirements. Public clouds are usually run by a business selling services to the general public or a group of businesses. The last is a Hybrid cloud, which is a unique combination of the first three. Services can also be broken up, between infrastructure, platform, or software.

How safe
The fact you can reach your information from all around the world, brings up the question “who else can also get this information?” Do you really know where your data is kept, or by whom? Do you know if any protections are taken to keep your information or data safe from thief or loss? These controls of security procedures are relinquished when computing is outsourced to the cloud.
In the article, Google Blames Software Update for Lost Gmail Data, Steve Musil states that about 40,000 Google accounts suddenly and mysteriously lost e-emails, contacts, and folders. Luckily for the users, Google keeps multiple copies of data in many different data centers.

According to the editor at Oxford Consulting, cyber criminals are often able to get critical information. Worse yet, these companies that are hack, often have no idea what information is stolen or lost. This lost of information highly affects consumer trust.

The homeland security newswire adds that criminals even run their own cloud services. They centrally control compromised computer with botnets, to host malicious content or to overwhelm a selected target with data. You can actually purchase virtual computers from these people. Amazon’s Elastic Computing Cloud was used by a cyber criminal to send out an immense junk e-mail operation. The newswire quotes Haroon Meer as saying “The cloud is going to offer the serious criminal huge computing resources on tap, which has lots of interesting applications”

Cloud computing security needs to be taken seriously. Redundant data storage and Identity and access management are a must. To regain control, you need to ensure that the company you pick has some serious standards in place.

Security
How do you select a cloud vendor, when you leave the in-house programs that provide a certain physical control over information? You must ask detail questions and insist on getting information on security. Make sure the company you pick have test done to verify that they can protect you. Jon Brodkin quotes Gartner, on seven specific security issues a customer should raise with a vendor before selecting

1. Privileged user access. Sensitive data processed outside the enterprise brings with it an inherent level of risk, because outsourced services bypass the "physical, logical and personnel controls" IT shops exert over in-house programs. Get as much information as you can about the people who manage your data. "Ask providers to supply specific information on the hiring and oversight of privileged administrators, and the controls over their access," Gartner says.

2. Regulatory compliance. Customers are ultimately responsible for the security and integrity of their own data, even when it is held by a service provider. Traditional service providers are subjected to external audits and security certifications. Cloud computing providers who refuse to undergo this scrutiny are "signaling that customers can only use them for the most trivial functions," according to Gartner.

3. Data location. When you use the cloud, you probably won't know exactly where your data is hosted. In fact, you might not even know what country it will be stored in. Ask providers if they will commit to storing and processing data in specific jurisdictions, and whether they will make a contractual commitment to obey local privacy requirements on behalf of their customers, Gartner advises.

4. Data segregation. Data in the cloud is typically in a shared environment alongside data from other customers. Encryption is effective but isn't a cure-all. "Find out what is done to segregate data at rest," Gartner advises. The cloud provider should provide evidence that encryption schemes were designed and tested by experienced specialists. "Encryption accidents can make data totally unusable, and even normal encryption can complicate availability," Gartner says.

5. Recovery. Even if you don't know where your data is, a cloud provider should tell you what will happen to your data and service in case of a disaster. "Any offering that does not replicate the data and application infrastructure across multiple sites is vulnerable to a total failure," Gartner says. Ask your provider if it has "the ability to do a complete restoration, and how long it will take."

6. Investigative support. Investigating inappropriate or illegal activity may be impossible in cloud computing, Gartner warns. "Cloud services are especially difficult to investigate, because logging and data for multiple customers may be co-located and may also be spread across an ever-changing set of hosts and data centers. If you cannot get a contractual commitment to support specific forms of investigation, along with evidence that the vendor has already successfully supported such activities, then only safe assumption is that investigation and discovery requests will be impossible."

7. Long-term viability. Ideally, your cloud computing provider will never go broke or get acquired and swallowed up by a larger company. But you must be sure your data will remain available even after such an event. "Ask potential providers how you would get your data back and if it would be in a format that you could import into a replacement application," Gartner says.

Cloud computing as many benefits, from portability to cost. To take advantage of these, it is important to address some important security concerns from who has access, where is the data, and how well is it backed up. With these precautions the sky is the limit.



References

Information found at http://en.wikipedia.org/wiki/Cloud_computing

Business uses for the cloud found at http://www.getapp.com/blog/cloud-computing-highly-preferred-for-business-applications/

Cloud Computing models found at https://www.infosecisland.com/blogview/5300-Top-10-Security-Concerns-for-Cloud-Computing.html

Mell, P., Grance, T. (2009, Oct 7). The NIST Definition of Cloud Computing. National Institute of Standards and Technology, Information Technology Laboratory.

Information on how safe found at http://articles.cnn.com/2010-03-12/tech/cloud.computing.security_1_computing-convenience-stored?_s=PM:TECH

Musil, S. (2011, Feb 28) Google blames software update for lost Gmail data. Digital Media. Download from http://news.cnet.com/8301-1023_3-20037554-93.html

Data from Oxford consulting found at http://oxford-consulting.com/industry-news/2011/03/shocking-data-loss-statistics-released/

Homeland Security News Wire found at http://homelandsecuritynewswire.com/cybercriminals-begin-exploit-cloud-hacking

Brodkin, . (2008, Jul 2). Gartner: Seven Cloud-computing security risk. Network World. Download from http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853

Tuesday, April 12, 2011

Do you Learn, when I teach

A link to a Video on "I teach, therefore you learn... or do you?"

Wednesday, January 5, 2011

Your Teen's Brain on Technology and Multitasking

NewHours report on teens interaction with Facebooking, texting, ...



Air version of show