Information Technology Services

News & Events

Wednesday, April 19, 2017 - 10:33am

Continued coverage of the change in Facebook policy after a man broadcast a murder in Cleveland on Facebook live, quoting Hany Farid, the Albert Bradley 1915 Third Century Professor of Computer Science and the chair of the computer science department. Facebook CEO Mark Zuckerberg spoke about the video in a keynote speech on Tuesday, addressing public outrage that it took the social media platform more than two hours to take the video down. "Nearly three hours on the internet is an eternity," said Farid. "That absolutely should be lower."

Read the...

Read more.
Department:
Wednesday, March 29, 2017 - 4:08pm
Don't be fooled

 

According to the US Department of Justice, more than 17 million Americans were victims of identity theft in 2014. EDUCAUSE research shows that 21 percent of respondents to the annual ECAR student study have had an online account hacked, and 14 percent have had a computer, tablet, or smartphone stolen. Online fraud is an ongoing risk. The following tips can help you prevent identity theft.

Educate Yourself:

  • Take ITS Training Modules for Faculty and Staff....
Read more.
Department:
Tuesday, March 28, 2017 - 1:19pm

In his latest blog post for Inside Higher Ed, Joshua Kim discusses a new patent by Apple and why those in digital learning should care about an iPhone accessory that Apple may never bring to market. Kim is director of digital learning initiatives at the Dartmouth Center for the Advancement of Learning (DCAL).

Read the full story, published on 3/27/17, in Inside Higher Ed.

Department:
Tuesday, March 28, 2017 - 1:16pm

An article that briefly mentions engineers at Dartmouth have created tools to automatically detect child pornography on the internet, in an overall article about how technology companies such as Google, Facebook and Twitter need to do more to stop the spread of violent and extremist material on their platforms.

Read the full story, published 3/24/17, in The Telegraph.

Department:
Tuesday, March 28, 2017 - 1:14pm

Lists Dartmouth College as one of the Ivy League schools that offers free online courses across multiple online course platforms.

Read the full story, published on 3/26/17, in Quartz.

Department:
Tuesday, March 28, 2017 - 1:04pm

In his latest blog post for Inside Higher Ed, Joshua Kim discusses why is it that it is the browser, and not the app, still dominates digital learning. Kim is director of digital learning initiatives at the Dartmouth Center for the Advancement of Learning (DCAL).

Read the full story in the 3/22/17 issue of Inside Higher Ed.

Department:
Tuesday, March 28, 2017 - 1:01pm

As a guest on "Vermont Edition," William Hudenko, assistant professor of psychiatry and adjunct assistant professor of the department of psychological and brain sciences, discusses software and app, called Proxi, that he created that allows patients to create online networks of friends, relatives and doctors—and share information among them. It also simplifies the process of legally authorizing that information to be shared with different people.

Listen to...

Read more.
Department:
Tuesday, March 28, 2017 - 1:00pm

In his latest post for "13.7 Cosmos & Culture," Marcelo Gleiser, the Appleton Professor of Natural Philosophy, discusses transhumanism and the book To Be a Machine: Adventures Among Cyborgs, Utopians, Hackers, and the Futurists Solving the Modest Problem of Death by Marc O'Connell. "Whatever your choice, transhumanism is here to stay. Don't believe me? Look at your smart phone: the world at your fingertips, its apps an extension of yourself, your digital persona, your connectivity to the global community," says Gleiser. "Imagine the angst of not having one for one or two days...

Read more.
Department:
Tuesday, March 28, 2017 - 12:57pm

An opinion piece by Kendall Hoyt, assistant professor of medicine and lecturer at the Thayer School of Engineering, where she discusses how biosecurity and cybersecurity have similar dangers—and similar potential benefits. "In the wrong hands, both types of knowledge can be used to develop a weapon instead of a vaccine or a patch," says Hoyt. "The genetic tools and exploit software that enable these activities are becoming easier to use and to acquire, prompting security experts to ask one question with growing urgency: How can we protect against misuse without limiting discovery and...

Read more.
Department:
Thursday, March 16, 2017 - 9:48am
security travel

We all like to travel with our mobile devices (smartphones, laptops, or tablets) — whether it’s just a trip to Umpleby’s or to a café in Paris. These devices make it easy for us to stay connected while on the go, but they can also store a lot of information — including contacts, photos, videos, location, and other personal and financial data — about ourselves and our friends and family. Following are some ways to protect yourself and others.

Before you go:

If you plan on using Dartmouth’s online resources, learn how to establish a secure connection to Dartmouth’s...

Read more.
Department:

Pages

Close
Information Technology Services