Digital Smarts Blog

You are here

Error message

  • Deprecated function: Creation of dynamic property MemCacheDrupal::$bin is deprecated in MemCacheDrupal->__construct() (line 30 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).
  • Deprecated function: Creation of dynamic property MemCacheDrupal::$wildcard_flushes is deprecated in MemCacheDrupal->reloadVariables() (line 637 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).
  • Deprecated function: Creation of dynamic property MemCacheDrupal::$invalidate is deprecated in MemCacheDrupal->reloadVariables() (line 638 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).
  • Deprecated function: Creation of dynamic property MemCacheDrupal::$cache_lifetime is deprecated in MemCacheDrupal->reloadVariables() (line 639 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).
  • Deprecated function: Creation of dynamic property MemCacheDrupal::$cache_flush is deprecated in MemCacheDrupal->reloadVariables() (line 640 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).
  • Deprecated function: Creation of dynamic property MemCacheDrupal::$cache_content_flush is deprecated in MemCacheDrupal->reloadVariables() (line 641 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).
  • Deprecated function: Creation of dynamic property MemCacheDrupal::$cache_temporary_flush is deprecated in MemCacheDrupal->reloadVariables() (line 642 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).
  • Deprecated function: Creation of dynamic property MemCacheDrupal::$flushed is deprecated in MemCacheDrupal->reloadVariables() (line 643 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).
6
Feb

New Device Can Help Prevent Hot-Car Deaths

On average, 38 children die in hot cars each year in the U.S. In an attempt to lower those numbers, Intel has developed a device to send an alert to a smart phone to warn a parent if they have left a child in a car seat. The Intel Smart Clip attaches to a child's car seat harness and warns adults via bluetooth when the harness is fastened and conditions in the car are potentially dangerous. The high-tech clip is swapped with the one already on a child's car seat, and communicates with an app on a smartphone that displays a green check mark when a child is out of the seat or a red X when a child is still buckled in. If the smartphone goes out of range while the red X is displayed, the app will sound off an alarm. The device was introduced at the Consumer Electronics Show in January 2015 and should be on the market within the year.

6
Feb

New Device Can Help Prevent Hot-Car Deaths

On average, 38 children die in hot cars each year in the U.S. In an attempt to lower those numbers, Intel has developed a device to send an alert to a smart phone to warn a parent if they have left a child in a car seat. The Intel Smart Clip attaches to a child's car seat harness and warns adults via bluetooth when the harness is fastened and conditions in the car are potentially dangerous. The high-tech clip is swapped with the one already on a child's car seat, and communicates with an app on a smartphone that displays a green check mark when a child is out of the seat or a red X when a child is still buckled in. If the smartphone goes out of range while the red X is displayed, the app will sound off an alarm. The device was introduced at the Consumer Electronics Show in January 2015 and should be on the market within the year.

5
Feb

Therapy Apps for Teens and Young Adults Emerging

There is a growing group of technologies offering coaching, counseling and monitoring services for teens and young adults fighting eating disorders, depression, anxiety and other mental health issues. Many focus on crisis intervention, including DoSomething.org's Crisis Text Line, for teens who want free, anytime-access to trained specialists, and Mood 24/7, which lets people send daily texts about how they feel to a doctor, therapist or loved one. Others focus on having the support of others, such as The CodeBlue app, due for release this spring. The app is designed to help teens alert members of a designated support network with a text message whenever they feel acutely depressed. Lantern, a subscription-based Web and mobile service that focuses on self improvement, is set to release its eating disorder program in February for $33 to $75 a month. It has spent months testing on college campuses, where psychological problems have shot up some 28 percentage points between 2000 and 2010.

 

Critics of these technologies worry about the privacy of patients’ data, and the danger that a smartphone or tablet could obscure something that a specialist might only spot in person. When used alone, some experts warn certain apps could be inadequate because some people also need the in-person dynamic with a therapist. Proponents on the other hand, say the upside for some patients is that they can gain access to resources they've never had. As far as technology goes, it's only going to be more readily used, especially among young individuals for whom texting has become the dominant form of communication. "As a therapist," one expert says, "you're taught to meet someone where they are, and so, that's part of why tech-based tools are a good place to start." Indeed, experts say the idea is not to replace traditional therapy with tech, even though some research shows that online Cognitive Behavioral Therapy can be as effective as therapy in a clinical setting, but rather to extend therapy's impact. Whether or not you agree with the idea, it is certainly an interesting trend to watch and good to keep in mind as possible tools parents and schools can use to help kids.

5
Feb

Therapy Apps for Teens and Young Adults Emerging

There is a growing group of technologies offering coaching, counseling and monitoring services for teens and young adults fighting eating disorders, depression, anxiety and other mental health issues. Many focus on crisis intervention, including DoSomething.org's Crisis Text Line, for teens who want free, anytime-access to trained specialists, and Mood 24/7, which lets people send daily texts about how they feel to a doctor, therapist or loved one. Others focus on having the support of others, such as The CodeBlue app, due for release this spring. The app is designed to help teens alert members of a designated support network with a text message whenever they feel acutely depressed. Lantern, a subscription-based Web and mobile service that focuses on self improvement, is set to release its eating disorder program in February for $33 to $75 a month. It has spent months testing on college campuses, where psychological problems have shot up some 28 percentage points between 2000 and 2010.

 

Critics of these technologies worry about the privacy of patients’ data, and the danger that a smartphone or tablet could obscure something that a specialist might only spot in person. When used alone, some experts warn certain apps could be inadequate because some people also need the in-person dynamic with a therapist. Proponents on the other hand, say the upside for some patients is that they can gain access to resources they've never had. As far as technology goes, it's only going to be more readily used, especially among young individuals for whom texting has become the dominant form of communication. "As a therapist," one expert says, "you're taught to meet someone where they are, and so, that's part of why tech-based tools are a good place to start." Indeed, experts say the idea is not to replace traditional therapy with tech, even though some research shows that online Cognitive Behavioral Therapy can be as effective as therapy in a clinical setting, but rather to extend therapy's impact. Whether or not you agree with the idea, it is certainly an interesting trend to watch and good to keep in mind as possible tools parents and schools can use to help kids.

4
Feb

Consumers Around the World Agree: Privacy a Big Tech Negative

In a Microsoft poll of Internet users worldwide, it was found that while disagreeing markedly on a range of technology issues, consumers in developed and developing nations alike agree on two things about the personal tech boom: It's a fantastic economic stimulant and is desperately in need of privacy rules.

These findings as well as others come from a survey of 12,002 Internet users in 12 countries conducted over the past 12 months by Microsoft entitled Views from Around the Globe: 2nd Annual Poll on How Personal Technology Is Changing Our Lives. One area of deep divergence in the study shows that in developing nations, 77% of parents are excited about tech's ability to educate their kids, while in developed world 56% of parents wonder if it could be used a little less.

4
Feb

Consumers Around the World Agree: Privacy a Big Tech Negative

In a Microsoft poll of Internet users worldwide, it was found that while disagreeing markedly on a range of technology issues, consumers in developed and developing nations alike agree on two things about the personal tech boom: It's a fantastic economic stimulant and is desperately in need of privacy rules.

These findings as well as others come from a survey of 12,002 Internet users in 12 countries conducted over the past 12 months by Microsoft entitled Views from Around the Globe: 2nd Annual Poll on How Personal Technology Is Changing Our Lives. One area of deep divergence in the study shows that in developing nations, 77% of parents are excited about tech's ability to educate their kids, while in developed world 56% of parents wonder if it could be used a little less.

3
Feb

Your Kids and Minecraft

Minecraft has become one of the most popular video games for both kids and adults. Kim Komando, a writer for USA Today, thinks the game can be an educational tool for kids and has devoted one of her weekly columns to the subject, entitled Five things Minecraft teaches kids. She believes that Minecraft builds creativity, teaches real world skills, is kid friendly, is highly portable and is fun for the whole family. Before allowing kids to play an online game, she suggests having them read and sign the online agreement 10 Commandments for Kids Online, which can also serve as a great conversation starter on what is and is not acceptable behavior.

3
Feb

Your Kids and Minecraft

Minecraft has become one of the most popular video games for both kids and adults. Kim Komando, a writer for USA Today, thinks the game can be an educational tool for kids and has devoted one of her weekly columns to the subject, entitled Five things Minecraft teaches kids. She believes that Minecraft builds creativity, teaches real world skills, is kid friendly, is highly portable and is fun for the whole family. Before allowing kids to play an online game, she suggests having them read and sign the online agreement 10 Commandments for Kids Online, which can also serve as a great conversation starter on what is and is not acceptable behavior.

2
Feb

Data Held for Ransom

You may remember several months ago when Sony Pictures was hacked and nasty emails sent by studio executives were released. What got lost in the hype was that the hackers first attempted to extort money from Sony in return for not releasing the private data and e-mails. When Sony refused, the embarrassing communications emerged.

 

Taking data for ransom is done through ransomware and it doesn’t just effect corporations and governments. You can download ransomware by unwittingly clicking on tainted links, downloading infected attachments or clicking on phony advertisements. Even seemingly legitimate sources, such as Federal Express, UPS, the U.S. Postal Service and security software companies McAfee and Symantec have been reported as victims of phishing e-mails containing ransomware malware.

 

What can you do to keep ransomware off your devices? According to the article Ransomware is threatening your computer , it can easily be avoided by following general Internet safety practices. Refrain from clicking on links or downloading attachments regardless of how valid they may look until you have independently confirmed that the links and attachments are legitimate. In the case of advertising, it is better to go directly to the company's website rather than click on a link in an advertisement, because you can never be sure if it is safe or not. Even e-mails from friends can actually be e-mails from friends whose email accounts have been hacked by scammers, so use good judgment before clicking on a link in an email from anyone.

 

If you do find your data is being held for ransom, remember that paying the ransom is rarely a good choice. Rather, you should consult your security software company for help or a reputable security expert for assistance in removing the malware. In addition, two security companies, FireEye and Fox-IT, have created a website that offers free assistance in unlocking systems infected by CrytoLocker, one of the most widely used ransomware programs.

2
Feb

Data Held for Ransom

You may remember several months ago when Sony Pictures was hacked and nasty emails sent by studio executives were released. What got lost in the hype was that the hackers first attempted to extort money from Sony in return for not releasing the private data and e-mails. When Sony refused, the embarrassing communications emerged.

 

Taking data for ransom is done through ransomware and it doesn’t just effect corporations and governments. You can download ransomware by unwittingly clicking on tainted links, downloading infected attachments or clicking on phony advertisements. Even seemingly legitimate sources, such as Federal Express, UPS, the U.S. Postal Service and security software companies McAfee and Symantec have been reported as victims of phishing e-mails containing ransomware malware.

 

What can you do to keep ransomware off your devices? According to the article Ransomware is threatening your computer , it can easily be avoided by following general Internet safety practices. Refrain from clicking on links or downloading attachments regardless of how valid they may look until you have independently confirmed that the links and attachments are legitimate. In the case of advertising, it is better to go directly to the company's website rather than click on a link in an advertisement, because you can never be sure if it is safe or not. Even e-mails from friends can actually be e-mails from friends whose email accounts have been hacked by scammers, so use good judgment before clicking on a link in an email from anyone.

 

If you do find your data is being held for ransom, remember that paying the ransom is rarely a good choice. Rather, you should consult your security software company for help or a reputable security expert for assistance in removing the malware. In addition, two security companies, FireEye and Fox-IT, have created a website that offers free assistance in unlocking systems infected by CrytoLocker, one of the most widely used ransomware programs.

30
Jan

The Real Cost of Cybercrime

In all the hype over cybercrime and our rush to spend millions to prevent it, many people and businesses are failing to educate themselves on the basics. Just how easy is cybercrime? What is the payoff? And what are the real costs to consumers? Those are questions that somehow seem to get lost in the hustle of preventing it from happening. To understand more about what cybercrime is all about, take a look at “The real cost of cyber crime” written by Benjamin Dean, a Fellow at the School of International and Public Affairs at Columbia University, to understand why some of the best solutions may be the simplest. He suggests that basic encryption of sensitive data and two-factor authentication (a system that confirms the identity of a user by sending a code to another device that the account holder will have immediate access to, such as a phone) might be some of the most efficient solutions.

30
Jan

The Real Cost of Cybercrime

In all the hype over cybercrime and our rush to spend millions to prevent it, many people and businesses are failing to educate themselves on the basics. Just how easy is cybercrime? What is the payoff? And what are the real costs to consumers? Those are questions that somehow seem to get lost in the hustle of preventing it from happening. To understand more about what cybercrime is all about, take a look at “The real cost of cyber crime” written by Benjamin Dean, a Fellow at the School of International and Public Affairs at Columbia University, to understand why some of the best solutions may be the simplest. He suggests that basic encryption of sensitive data and two-factor authentication (a system that confirms the identity of a user by sending a code to another device that the account holder will have immediate access to, such as a phone) might be some of the most efficient solutions.

29
Jan

Law in Illinois Allows Schools to Demand Students’ Facebook Passwords

Privacy concerns have been raised when a new Illinois state law went into effect on January 1 that can force students to hand over their social media login credentials to their school if school and state officials believe it can help prevent hostile online behavior. Privacy advocates say it is one thing for students to have to show their social media page, but quite another to hand over access to personal information. Some districts have even hired companies to monitor the social media presence of their students. While this new law is sure to be tested in the courts, it does signal the no- nonsense approach that many lawmakers have on cyberbullying and it will be interesting to see if other states follow. It will also be interesting to see how it all plays out when Facebook's Statement of Rights and Responsibilities section 4.8 reads: "You will not share your password (or in the case of developers, your secret key), let anyone else access your account, or do anything else that might jeopardize the security of your account."

29
Jan

Law in Illinois Allows Schools to Demand Students’ Facebook Passwords

Privacy concerns have been raised when a new Illinois state law went into effect on January 1 that can force students to hand over their social media login credentials to their school if school and state officials believe it can help prevent hostile online behavior. Privacy advocates say it is one thing for students to have to show their social media page, but quite another to hand over access to personal information. Some districts have even hired companies to monitor the social media presence of their students. While this new law is sure to be tested in the courts, it does signal the no- nonsense approach that many lawmakers have on cyberbullying and it will be interesting to see if other states follow. It will also be interesting to see how it all plays out when Facebook's Statement of Rights and Responsibilities section 4.8 reads: "You will not share your password (or in the case of developers, your secret key), let anyone else access your account, or do anything else that might jeopardize the security of your account."

28
Jan

The Home-School Connection: Now Via Facebook?

Being on Facebook certainly has its pros and cons for students and parents alike. While many schools have strict policies against Facebook use at school and for teachers, some are moving towards using it as tool for school-to- home communication. Matt Renwick, an elementary school principal in Wisconsin, shares his perspective on the using the social network as a communication tool. In his post entitled “Is Facebook the New School Web Page? “, he examines it from the perspective of teachers, administrators and parents, making an interesting case that Facebook can have a place in the arsenal of tools schools can use to communicate with parents.

28
Jan

The Home-School Connection: Now Via Facebook?

Being on Facebook certainly has its pros and cons for students and parents alike. While many schools have strict policies against Facebook use at school and for teachers, some are moving towards using it as tool for school-to- home communication. Matt Renwick, an elementary school principal in Wisconsin, shares his perspective on the using the social network as a communication tool. In his post entitled “Is Facebook the New School Web Page? “, he examines it from the perspective of teachers, administrators and parents, making an interesting case that Facebook can have a place in the arsenal of tools schools can use to communicate with parents.

27
Jan

Lizzie Bennet and Classic Characters on YouTube Revive Required Reading

The digital reimagining of classic literature -- such as Jane Austen's "Pride and Prejudice" told through a YouTube Web series -- is piquing teenagers' interest in required reading. The YouTube series "The Lizzie Bennet Diaries," has attracted a young audience with characters interacting outside the series on other social media platforms, including Twitter, Tumblr and Pinterest. Teachers are using these series to introduce and supplement required reading and lessons. Other classic novels receiving the same treatment include Emma, Sanditon, Frankenstein, Much Ado About Nothing, Peter Pan and Little Women among others. These web series are good to keep in mind if one of these classic works is of interest to your teen, or if they need some incentive to read.

27
Jan

Lizzie Bennet and Classic Characters on YouTube Revive Required Reading

The digital reimagining of classic literature -- such as Jane Austen's "Pride and Prejudice" told through a YouTube Web series -- is piquing teenagers' interest in required reading. The YouTube series "The Lizzie Bennet Diaries," has attracted a young audience with characters interacting outside the series on other social media platforms, including Twitter, Tumblr and Pinterest. Teachers are using these series to introduce and supplement required reading and lessons. Other classic novels receiving the same treatment include Emma, Sanditon, Frankenstein, Much Ado About Nothing, Peter Pan and Little Women among others. These web series are good to keep in mind if one of these classic works is of interest to your teen, or if they need some incentive to read.

Pages