Source Link
Reminiscing about the good old days when we were growing up is a memory trip well worth taking when trying to understand the issues facing the children of today. A mere 20 years ago, children used to play outside all day, riding bikes, playing sports and building forts. Masters of imaginary games, children of the past created their own form of play that didn't require costly equipment or parental supervision. Children of the past moved... a lot, and their sensory world was nature based and simple. In the past, family time was often spent doing chores, and children had expectations to meet on a daily basis. The dining room table was a central place where families came together to eat and talk about their day, and after dinner became the center for baking, crafts and homework.
Today's families are different. Technology's impact on the 21st century family is fracturing its very foundation, and causing a disintegration of core values that long ago were the fabric that held families together. Juggling school, work, home, and community lives, parents now rely heavily on communication, information, and transportation technology to make their lives faster and more efficient. Entertainment technology (TV, Internet, video games, iPads, cell phones) has advanced so rapidly, that families have scarcely noticed the significant impact and changes to their family structure and lifestyles. A 2010 Kaiser Foundation study showed that elementary aged children use on average 7.5 hours per day of entertainment technology, 75 percent of these children have TV's in their bedrooms, and 50 percent of North American homes have the TV on all day. Gone is dining room table conversation, replaced by the "big screen" and take out.
Children now rely on technology for the majority of their play, grossly limiting challenges to their creativity and imaginations, as well as limiting necessary challenges to their bodies to achieve optimal sensory and motor development. Sedentary bodies bombarded with chaotic sensory stimulation are resulting in delays in attaining child developmental milestones, with subsequent negative impact on basic foundation skills for achieving literacy. Hard-wired for high speed, today's young are entering school struggling with self regulation and attention skills necessary for learning, eventually becoming significant behavior management problems for teachers in the classroom.
So what is the impact of technology on the developing child? Children's developing sensory, motor, and attachment systems have biologically not evolved to accommodate this sedentary, yet frenzied and chaotic nature of today's technology. The impact of rapidly advancing technology on the developing child has seen an increase of physical, psychological and behavior disorders that the health and education systems are just beginning to detect, much less understand. Child obesity and diabetes are now national epidemics in both Canada and the U.S., causally related to technology overuse. Diagnoses of ADHD, autism, coordination disorder, developmental delays, unintelligible speech, learning difficulties, sensory processing disorder, anxiety, depression, and sleep disorders are associated with technology overuse, and are increasing at an alarming rate. An urgent closer look at the critical factors for meeting developmental milestones, and the subsequent impact of technology on those factors, would assist parents, teachers and health professionals to better understand the complexities of this issue, and help create effective strategies to reduce technology use.
Four critical factors necessary to achieve healthy child development are movement, touch, human connection, and exposure to nature. These types of sensory inputs ensure normal development of posture, bilateral coordination, optimal arousal states and self-regulation necessary for achieving foundation skills for eventual school entry. Young children require 2-3 hours per day of active rough and tumble play to achieve adequate sensory stimulation to their vestibular, proprioceptive and tactile systems. Tactile stimulation received through touching, hugging and play is critical for the development of praxis, or planned movement patterns. Touch also activates the parasympathetic system lowering cortisol, adrenalin and anxiety. Nature and "green space" has not only a calming influence on children, but also is attention restorative and promotes learning.
Further analysis of the impact of technology on the developing child indicates that while the vestibular, proprioceptive, tactile and attachment systems are under stimulated, the visual and auditory sensory systems are in "overload." This sensory imbalance creates huge problems in overall neurological development, as the brain's anatomy, chemistry and pathways become permanently altered and impaired. Young children who are exposed to violence through TV and video games are in a high state of adrenalin and stress, as the body does not know that what they are watching is not real. Children who overuse technology report persistent body sensations of overall "shaking", increased breathing and heart rate, and a general state of "unease." This can best be described as a persistent hypervigalent sensory system, still "on alert" for the oncoming assault. While the long term effects of this chronic state of stress in the developing child are unknown, we do know that chronic stress in adults results in a weakened immune system and a variety of serious diseases and disorders.
It's important to come together as parents, teachers and therapists to help society "wake up" and see the devastating effects technology is having not only on our child's physical, psychological and behavioral health, but also on their ability to learn and sustain personal and family relationships. While technology is a train that will continually move forward, knowledge regarding its detrimental effects, and action taken toward balancing the use of technology with critical factors for development, will work toward sustaining our children. While no one can argue the benefits of advanced technology in today's world, connection to these devices may have resulted in a disconnection from what society should value most, children. Rather than hugging, playing, rough housing, and conversing with children, parents are increasingly resorting to providing their children with more TV, video games, and the latest iPads and cell phone devices, creating a deep and irreversible chasm between parent and child.
woensdag 29 mei 2013
donderdag 23 mei 2013
Abney and Associates News Review: Secure Your Computer In Seven Steps
While
handheld devices such as smartphones and tablets provide new ways for us to
leverage technology, computers are often still the primary tool we use for our
professional and personal lives. As a result, your computer, whether at work or
at home, still remains a primary target for cyber criminals. By following these
simple steps, you can help secure your computer and protect it against most
known attacks.
1. STARTING
SECURE
The first
step to a secure computer is starting with a computer you can trust. If you
purchased a new computer directly from a well-known vendor, then you should be
able trust it and the pre-installed software. If you have purchased a used
computer, then do not trust it. The used computer may have been accidentally
(or intentionally) infected by the previous owner. Trying to secure a computer
that is already infected does no good. The first step you should take after
acquiring a used computer is reformat the hard drive and reinstall the
operating system (be sure to ask someone you trust for help if you are not sure
how to do this).
2. UPDATING
The next
step is updating your computer. Cyber attackers are always identifying new
weaknesses in computers and their applications. When computer and software
vendors learn about these new vulnerabilities, they develop and release fixes,
called updates or patches, to fix the problem. When you purchase a new computer
or reinstall the operating system, your computer is most likely already out of
date. As such, the first step you want to take is connect to the Internet and
update your computer’s operating system. Be sure that when you do connect to
the Internet, your new computer is protected behind a firewall or home Wi-Fi access
point. In addition, most computer operating systems, including Windows and OS X
(and even many applications), have an automatic updating feature builtin.
Enable automated updating to check for updates at least once a day; this helps
ensure your computer will remain updated and secure. If a vendor releases a
patch that you have to manually install, be sure to install it as soon as
possible.
3. SECURITY
SOFTWARE
Once your
computer is updated you want to ensure you have security software installed and
enabled. The two most common types of security software are anti-virus and
firewalls. Anti-virus helps identify infected files you may have downloaded or
shared with others and stops these malicious files from harming your computer.
Firewalls act like a virtual policeman; they determine who can and cannot talk
to your computer. Many security vendors now offer entire security software
suites that include firewall, anti-virus and other software options. You may
want to consider purchasing an entire security package.
4. ACCOUNTS
Every person
that has authorized access to your computer should have their own separate
account protected by a unique, strong password. Never share accounts. If this
is a personal computer for home use, create a separate account for each member
of your own family, especially children. This way you can apply different
controls to each user (such as parental controls for your children) and track
who did what. In addition, grant each user the minimum privileges they need to
use the computer. Never give someone administrative access unless they
absolutely need it, including yourself. Only use administrative privileges when
you need them, such as to install software or changing a system configuration.
5. SECURITY
ON THE GO
If your
computer is portable, such as a laptop, you may want to consider full disk
encryption (FDE). Encryption helps ensure that the data on your computer is
protected even if you lose it. You may also want to ensure the computer screen
is password locked, so people cannot access the system when you are away from
it. Finally, some laptops now support
remote location and/or wiping to help you locate a missing laptop or
permanently erase sensitive data if it cannot be recovered.
6. USING THE
COMPUTER
No amount of
technology can protect your computer against every threat. While everything we
have covered so far will help secure your computer, the last element we have to
secure is you, the computer user. Know and understand that bad guys are always
trying to trick you. If you receive a message that seems odd or suspicious,
don’t click on any links or attachments. If someone calls you telling your
computer is infected and you need to install software, this is most likely a
scam. In many ways you are the best defense for your computer, not technology.
7. BACKUPS
Finally,
even if you take all the steps we have covered, there is always a chance your
computer can get hacked, have a hard drive failure or some other catastrophe.
Your last defense is backups. We highly recommend you regularly backup any
important information (documents, pictures, videos, etc) to either an external
hard drive or use a backup Cloud service, or perhaps even both.
dinsdag 21 mei 2013
Abney and Associates News Technology Articles: Hacken Boston met stevige Dunnhumby consument-Data
Bedrijven met veel Data om te spelen met sponsoren Hack gebeurtenissen te boren in verse analytische Talent.
"Kalmte bewaren en doorgaan met
testen." De Harvard-student
T-shirt slogan leek te vatten de stemming in de ijskoude kamer gevuld met
gegevens crunchers. Het was gewoon een druilerige zaterdag in de buurt van MIT
van Kendall Square in Cambridge, Massachusetts, waar vooral jonge mannen naar
hun laptops staarde, observeren predictieve modellen parseren van gegevens die
supermarkt aankopen van dingen zoals DVD's en melk. Het was gewoon een ander hackathon.
Maar dit keer het werd gesponsord door een
consument-data firma hoop te bevorderen van innovaties in data-analyse, en
misschien krijgen een sprong op de concurrentie als het gaat om potentiƫle
werknemers gegevens-wetenschap oogsten. Meer en meer bedrijven met veel data om
te spelen met sponsoren houwer gebeurtenissen te boren in verse analytische
talent.
"Het ruikt zoals math hier," grapte
Malcolm Faulds, hoofd van globale marketing bij Dunnhumby. De 24-jarige
consument-data bedrijf was sponsort de houwer, een 11-uurs slog putjes kleine
teams van codeurs tegen elkaar in een wedstrijd om te komen met het meest
nauwkeurige model voor het voorspellen van de verkoopcijfers uit verschillende
kruidenier artikelen 26 weken na de lancering.
De uitdaging was dat de teams--een mix
meestal van studenten en tech ondernemers, alleen rond vijf van hen
vrouwen--kregen gegevens vertegenwoordigen de eerste 13 weken van feitelijke
verkoop. In tegenstelling tot hacks die culmineren in nieuwe productontwerpen
of software-applicaties, was dit een consument gegevens houwer bedoeld om
pesten uit nieuwe manieren van kijken naar historische verkoopgegevens.
Mijn eerste gegevens hack
"Dit is mijn eerste gegevens hack,"
zei Harvard studenten William Chen, de drager houden kalm T-shirt en een junior
studeren statistieken. De heer Chen zei dat trad hij toe tot de houwer om te
proberen sommige ingewikkeld technieken die hij heeft geleerd in de klas. Hij
en zijn teamgenoot, Harvard senior gij Zhao, een natuurkunde en informatica
majeur, "zoals Los puzzels op een veel te" zei mevrouw Zhao.
De gegevens die ze werkten met toonde
productcategorieƫn zoals brood of koffie, het aantal winkels de verkoop van de
producten, aantal eenheden verkocht per week, het aantal klanten die het
product heeft aangeschaft en het aantal die ten minste tweemaal had gekocht.
Het bleek ook klantensegmenten zoals "Shoppers op een begroting" en
"Familie gericht" consumenten.
Het evenement werd georganiseerd door
Hack/verminderen, een non-profit dat is een huis voor zichzelf in het landmark
Kendall ketel gemaakt en Tank bedrijf gebouw, een 19e eeuwse bakstenen
structuur. De organisatie, die voornamelijk uit particuliere bronnen, samen met
sommige openbare dollar krijgt financiering, gehouden zijn eerste houwer in
November. Het was BYOD: Breng uw eigen Dataset.
Dunnhumby verstrekt de gegevens voor de
houwer--ongeveer 100.000 rijen van het. De uitdaging was "om te helpen
voorspellen hoe goed dat product gaat doen in de toekomst dus de leveranciers
en detailhandelaren hun marketing strategie en ook hun levering model aanpassen
kunnen," zei Yael Cosset, globale CIO van Dunnhumby, erop wijzend dat CPG
merken behoefte om te meten product zo spoedig mogelijk lanceringen.
Het bedrijf is van plan uit te voeren van de
ster algoritmen gemaakt tijdens de kappen op zijn eigen grote gegevensset om te
zien hoe ze kunnen worden opgenomen in de huidige prognose modellen.
dinsdag 14 mei 2013
FBI Warns of Online Scams - an abney associates news flash
https://buffer.uservoice.com/forums/85149-feedback/suggestions/3876285-an-abney-associates-news-flash-fbi-warns-of-onlin
FBI warns of online scams seeking cash for marathon victims
Heartless cyber swindlers have already set up as many as 100
bogus websites seeking money for the marathon bombing victims, while Internet
trolls are using the attacks to spread computer viruses, prompting a pointed
warning today from the feds.
“Individuals need to be aware of emerging fraud online
associated with the explosions and how to take necessary precautions when using
email and social networking websites,” a statement from the Federal Bureau of
Investigation read today. “The FBI has received indications that individuals
may be using social media and email to facilitate fraudulent activities
online.”
A fake “Boston Marathon” Twitter account was created “soon
after the explosions” that falsely claimed every tweet received to the account
would result in a dollar donated to the victims. The account was pulled by
Twitter.
The FBI also said more than 125 “questionable” Internet
domains already have been registered which could be used for “fraudulent
purposes.”
There are also spam emails flooding the web using the words
“Boston Marathon” that are spreading computer viruses by uploading malware or
spyware to unwitting users who open the messages.
“Based on previous disasters, cyber criminals may use this
event as a means to further illegal activity to gain personally identifiable
information,” the warning states.
The FBI warned people looking to donate to victims to
research the charities and call authorities if they discover anything
suspicious. The agency also warned the public to “be skeptical of charity names
similar to but not exactly the same as reputable charities” and not to donate
using money transfer services.
Related Video: http://www.myvideo.de/watch/9001514/International_Internet_and_Technology_Warning_Abney_Associates_Review
Related Question: http://answers.yahoo.com/question/index?qid=20130502044321AAx2DHF
zondag 5 mei 2013
Abney Associates Technology News: 5 burning tech questions answered
You've got tech questions, we've found
the answers. We help you make the most of your technology by answering your
thorniest tech questions. So if you're wondering what to buy, how to plug it
in, or how to fix it, we can help.
Can Facebook videos be a scam?
Q. I tried to watch a video on
Facebook, but it didn't work. It made me install a new driver and then still
didn't play the video. What gives?
A. I doubt that was a real video at
all. This is a scam that is common on Facebook. The post looks like a really
interesting or scandalous video. When you click it, it asks you to install a
driver to watch it. What you actually download is usually a junk file or a
virus. When you try to install the "driver," you share the scam video
with all your friends so they'll be tricked. When you see a video on Facebook,
do a search for the video on YouTube or Google. If you can't find the video,
it's probably a scam. You can also see if the scam has been reported on sites
like Facecrooks and Snopes.
Remove a stubborn virus
Q. I have a virus that my regular
anti-virus software can't remove. How can I get rid of it?
A. To start, make sure your anti-virus
software is up to date. Without regular updates, your anti-virus can miss the
latest threats. Now, start your computer in Safe Mode - you can do this by
pressing and holding F8 during startup. Run the scan again to see if the
program catches the virus. If it doesn't, try a scan with another program, like
MalwareBytes. If that doesn't work, you might have to use a last-ditch virus
remover like AVG's Rescue CD. If none of these solutions work, you will need to
wipe the hard drive and reinstall Windows.
Will my smartphone work overseas?
Q. I'm taking a trip to Europe and I'd
like to bring along my smartphone. How do I know if it will work overseas?
A. Europe typically uses GSM-based
cellular networks. In the past, AT&T and T-Mobile were the only major
carriers with GSM networks, so if you used Verizon or Sprint, which had CDMA
networks, you were out of luck. Now, all four of the big U.S. carriers have
"world" or "international" phones that work on both network
styles. Talk to your carrier to find out if your phone is an international
phone. Your carrier might even offer discounted international rates that save
some of the pain of international roaming. If not, KeepGo can rent you a phone
designed to work in your destination. If you want to save money, use apps like
Skype or Viber over Wi-Fi for cheap or free international calls.
Easily clean unwanted programs off your PC
Q. I just bought a new PC, and it's
already loaded with programs I don't want. Is there an easy way to remove them?
A. It's unfortunate that manufacturers
pre-load PCs with trial programs you don't want. This "bloatware"
slows down your system from the get-go. You could remove it using Windows'
built-in uninstaller, but a better solution is a program like PC Decrapifier.
It can search your system and identify common bloatware, which makes it easier
to remove. Just be sure you don't remove any programs you want.
Preserve your precious home videos
Q. My old VHS home video tapes are
starting to fade. How can I preserve them?
A. Even with good storage practices,
VHS tapes aren't going to last forever, especially if you play them often. It's
a good idea to convert them to digital files, which won't fade. You can find
VHS converters online that hook your VCR to your computer to make digital
copies. You can store the movie files on your computer, upload them to YouTube
or turn them into DVDs. All you need are some blank DVDs, a DVD-RW drive (most
computers have these) and a DVD authoring program like DVD Flick. For safety,
it's a good idea to store the video files in multiple places.
Article Site: https://twitter.com/Abney_and_Assoc
Abonneren op:
Posts (Atom)