Showing posts with label computer. Show all posts
Showing posts with label computer. Show all posts

September 30, 2022

Dall-e AI Digital Art Generator

Here’s a new tool that you really need to know about that utilizes AI, which is computer thinking based on billions of algorithms based on huge datasets, with your creative mind to create almost any kind of art digitally that you can imagine. I’m talking about the new Dall-e AI art generator that’s just been released for public use, pretty much for free. If you start creating a lot of images, you will need to pay for tokens or purchase an account. But just to play with the tool and see what it is, and to understand how powerful AI can be for generating new ideas, you can do this with a free account.


The first image I created in a matter of minutes.

After creating your free account on the Dall-e AI art generator website, you can get started creating new art right away. Your digital art creations are only limited by your creativity as this AI tool is very powerful. I definitely encourage you to try it for yourself. If you can open compose and send an email, then you will be able to create digital art with this new tool.

Trying out the tool

Using some of my favorite, creative keyword terms like cats and cheese, space nebula, Legos, water, coffee, chickens, and astronauts. I created these first basic images with the AI tool. Once you create an image, you can also ask the system for more variations similar to an image that you like. I think this would be really neat to use for story illustrations or unique digital art.

Here are some of my other favorite digital images from Dall-e:


A squirrel in the nebula, clearly a masterpiece.


Soccer stars floating jump in skittles.

In addition to the natural speaking text that the generator uses to create your art, you can also add words like 3-D render or oil pastel to get different medium replications when your image is created.


Oil pastel of cats floating in starry night.

This new technology is one that your students and clients will want to apply, if the tool is one that will bring value to your field and applications in an efficient way and not as a distraction. It’s really an exciting new use of Ai, natural text recognition, and big data to create something novel, innovative, and possibly even beautiful.

How could this tool be used for education?

For my friends and education and training, I thought I would include some ideas for how this Dall-e AI art generator might be used to enhance education. These are just a few ideas, but could clearly be expanded on:

- The obvious - creating digital art for art or art infused learning. Using an AR generator to create digital art allows students to be creative and focus solely on the imaginative creation instead of actually being able to create the piece of art if they lack in skills.

- For teaching creativity and creative thought generation

- For teaching probabilities, matrices in math

- For teaching about AI and natural speech text based programming


Screenshots of the tool

Here are some screenshots of signing up and what the interface looks like.


The credits system to make more images than a free account allows.


The Dall-e interface with my first creation terms and four returned generated images.

What kind of creations are you going to create with this new emerging technology tool? Tag me on your creations with #AmberCLee so I can see what you’ve created too.

You can sign up for your own Dall-e AI art generator account at DALL·E (https://labs.openai.com/).


Ninja cat water wave in space station.

#emergingtech #AmberCLee #dalleai

April 18, 2022

Twenty-Post Challenge: Question Answered

This is the seventh post in a twenty-post series blogging challenge. The challenge is to answer a question that somebody has asked you online or in-person.

I was asked in a job interview recently: How would I go about creating technical documentation for a product? Read on below to find out how I might approach a technical documentation or curriculum design project.

First, I would get to know my audience. Where is my audience posting their thoughts? Are they posting on Hacker News or Reddit; or are they reading white papers? I need to find my audience and get a picture of what’s important to them, what problems they’re having, and what kind of language they’re using to describe the tool or product. What’s they’re overall impression and what information is currently prominent about my product? These questions will give me an accurate description of who I should write for.

Next, I would learn the tool myself and document my steps starting with how to complete basic functions with the tool or product. How do they get started with the install and a basic project? If developer’s notes are available, I will integrate them into my outlined understanding of the tool. If there’s current documentation, it can be remixed or used to build new, better documentation. Sometimes this step requires some trial and error to learn how a new user would organically use a new tool.

Once I have a good understanding of the basics of a tool and an outline of the documentation started, I would then take screenshots and create images where visual support to understanding is needed. Sometimes it’s easier to complete the outline of the major functions and the instructions and then come back at the end to take screenshots when you fully understand what you’re looking at.

Lots of code on this screen. Image by Tudor Baciu.

Lastly, I would finalize the documentation and request feedback from any stakeholders available to review the documentation, ensuring its accuracy and efficiency to reaching the stated goals. I would verify the consistency of word usage, directional word usage, headings, formatting, and accessibility best practices applied. The documentation would then be deployed externally and I would appreciate feedback from any user utilizing the documentation.

Technical documentation, especially for a tool that will have updates and new features in the future, is a flexible, growing foundation for learning a product or removing headaches when a problem presents itself: A communication of solutions and pathways.

#amberclee #20postchallenge

October 14, 2021

Google’s Free Security Checkup Tool

Doesn’t it seem like online security has gotten a little excessive lately? Our phones and computers are always under attack. Even people who think they are internet aware can be misled and be harmed by malicious hackers with increasingly sophisticated attacks. And how is anyone supposed to remember so many passwords, without writing them or storing them somehow?


Password combinations have to be unique, which makes creating and storing them challenging in this complex, hostile cybersecurity environment.

The answer to all of these concerns is effective cybersecurity practices. As we continue talking about Cybersecurity Security Month - many of you may be unsure how to continue increasing your digital environment defenses, without being mislead or breaking the bank.

Here is a cool tool for you to try out that’s also completely free. This tool will be especially helpful if you utilize a Google account, Gmail, or the Google chrome browser for your internet use. This cybersecurity checks the passwords saved to your Google account for data breaches and overall password strength; verifies the recovery email and phone number set is still current, checks for suspicious account activity, verifies all logged-in devices, and informs you of all third party apps with access to your account.

Google’s Free Security Checkup



 

You would be surprised to find out how many data breaches occur even at major companies (data breaches happen all the time!). Protecting your logins and your online identity is extremely important, and repairing damaged finances or an identity stolen is very costly. An entire business sector has been built around aiding people who’ve been attacked and need to rebuild.

Here are some of the major data breaches:

  • AOL
  • Ancestry.com
  • TD Ameritrade
  • Apple
  • Bank of America
  • Capital One
  • The Department of Homeland Security
  • Facebook
  • Reddit
  • Sega
  • eHarmony
  • LinkedIn
  • Orbitz


Some companies make the list multiple times, like Uber, Twitch, and Marriott International Hotels. Many of us have used these household-name companies without thinking that our privacy would ever be stolen and that our sensitive data would be handed over by insufficiently protected networks to hackers. You can read more about data breaches and the large amount of data stolen on Wikipedia.

These malicious parties are an increasing problem that we regular folks need safe, trusted and self-maintaining protections to help keep us safe. The free Google Security Checkup tool and the many great anti-virus solutions we recommend below are a great way to enhance your personal cybersecurity.

Webroot Internet Security Complete with Antivirus Software 2021 - 5 Device, Includes Android, IOS, Password Manager, System Optimizer and Cloud Backup, 2 Year (PC Download)



McAfee Total Protection 2021 Unlimited Devices, Antivirus Internet Security Software Password Manager, Parental Control, Privacy, 1 Year Subscription - Download Code

Norton 360 Platinum 2021 – Antivirus software for 20 Devices with Auto Renewal - 3 Months FREE - Includes VPN, PC Cloud Backup & Dark Web Monitoring [Download]

ESET Multi-Device Internet Security Premium | 2021 Edition | 3 Devices | 1 Year | Antivirus Software | Password Manager | Privacy Protection | Antispam | Anti-Theft | Digital Download [PC/Mac/Android/Linux Online Code]



Norton 360 Deluxe 2021 | Antivirus software for 5 Devices [Key Card] and Microsoft 365 Family | 3 Months Free, Plus 12-Month Subscription [PC/Mac Download] (Both renew to 12-Month Subscriptions)



 

AVG Internet Security 2021 | Antivirus Protection Software | 10 Devices, 2 Years [PC/Mac/Mobile Download]



 

Avast Premium Security 2021 | Antivirus Protection Software | 1 PC, 1 Year [Download]

 
#amberclee #Cybersecurity #CyberSecurityAwarenessMonth #CommissionsEarned #Ad

October 11, 2021

Cyber Security Awareness Month (October)

October has been declared Cybersecurity Awareness month. Do you know your cybersecurity safety status, both on the computer and on your smartphone?

View the video presentation or read the transcript to learn basic tips for protecting your digital assets and online privacy. Check out the anti-virus software we’ve recommended below.


Enhance your cybersecurity protection with the antivirus softwares recommended below.

Webroot Internet Security Complete with Antivirus Software 2021 - 5 Device, Includes Android, IOS, Password Manager, System Optimizer and Cloud Backup, 2 Year (PC Download)



McAfee Total Protection 2021 Unlimited Devices, Antivirus Internet Security Software Password Manager, Parental Control, Privacy, 1 Year Subscription - Download Code

Norton 360 Platinum 2021 – Antivirus software for 20 Devices with Auto Renewal - 3 Months FREE - Includes VPN, PC Cloud Backup & Dark Web Monitoring [Download]

ESET Multi-Device Internet Security Premium | 2021 Edition | 3 Devices | 1 Year | Antivirus Software | Password Manager | Privacy Protection | Antispam | Anti-Theft | Digital Download [PC/Mac/Android/Linux Online Code]



Norton 360 Deluxe 2021 | Antivirus software for 5 Devices [Key Card] and Microsoft 365 Family | 3 Months Free, Plus 12-Month Subscription [PC/Mac Download] (Both renew to 12-Month Subscriptions)



 

AVG Internet Security 2021 | Antivirus Protection Software | 10 Devices, 2 Years [PC/Mac/Mobile Download]



 

Avast Premium Security 2021 | Antivirus Protection Software | 1 PC, 1 Year [Download]

 
#amberclee #Cybersecurity #CyberSecurityAwarenessMonth #CommissionsEarned #Ad

August 16, 2021

Online Learning, A Pandemic Bandaid

I was hopeful when all of America collectively implemented online learning last year - that people who had never tried it before may come to like it and find it efficient for teaching and learning - but instead the application was poor and many students did not achieve the learning gains possible. Online learning has pretty much been badmouthed in the media - but yet here we go again, rushing to remote learning due to the new rise in more dangerous Covid variants.

Online learning is not for everyone?

Now as another in-person school year is threatened by the Covid delta variant, the same students will be rushed into an online learning system that could produce less than mediocre learning results (and probably being implemented by the same staff badmouthing online learning). It’s normal to be frustrated with technology - but I encourage you to give online learning a try with a fresh perspective and utilizing the tips below.

Through modern curriculum design methods, online learning should be successful for most learners with the proper supports, like having trained teachers (teachers properly trained to support online learners, and who are not overloaded with in-person teaching duties at the same time) and reliable learning management systems. Online learners that are successful are also typically self-motivated and strong readers (usually English is necessary but ESOL programs are available too).

Supporting online learners

To support this rushed transition to online “remote” learning with these students:

Support and structure learning for self-discipline. Use regular turn-in intervals for assignments, predictable activity schedules, mandatory in-person check-ins, a clear agenda posted for each unit, predictable assignment successions, succinct rubrics that are shared in advance of the assignment, and apply metacognitive strategies to maximize your students’ learning. 

Humanize the online environment and build authentic connections. This is really the most important tip - if you don’t build instructor-to-student support, peer-to-peer community, and learner-to-content personal connection; then prepare for your learners to check out from your lesson. Learners are motivated and build connections while learning in an online environment through these elements - these authentic, humanized connections are what we all need in the online environment. 

Create clear instructions. Try to be succinct and don’t be superfluous with your word choices. Sometimes a video is needed to explain an assignment, which is also a chance to build instructor presence. State your instructions starting with a directional verb: look at what is used in this article, telling you to “support,” “humanize,” "build," “create,” and “remember.” Have someone else proofread your instructions (if appropriate, an advanced student in the class) or at least read them aloud to yourself. You could also work in community with other instructors to provide support for each other.

Recognize that every learner is different and will need varying levels of interaction and support to grasp the lesson. The learners that already lack support to be successful in a traditional in-person classroom: these students will likely need the most instructor support on a regular basis. Are you sure that your learners have reliable access to the internet and a device capable of completing the online work? Is there district or school level technical support for teachers to help ensure this access?

One last thought that’s super important about supporting students through this online transition: as we send individual students (or groups of students) home to quarantine for two weeks at a time, are we also sending meals home with them? Hunger is endemic to the children in our school systems. I don’t think this is currently being done. This program could be run similarly to the summer breakfast/lunch pickup program already run throughout the country (through Covid too). Let’s make sure these kids are being taught effectively... and being fed!

What are your thoughts about online learning? Have you had successes or failures - share a comment below. 

#amberclee

August 10, 2021

Cybersecurity Basics, Revisited

Recently I’ve received more and more of those annoying and potentially unsafe texts and email phishing attempts from scammers. It seems that these criminals had nothing better to do during the pandemic lockdown except to come up with new ways to try and trick us into giving them our personal information or possibly losing money to them.

Although I work in the technology field and I’m well-versed on cybersecurity and online safety, I myself was almost tricked into clicking on a malicious link contained in a text message and had to do a double-take to stop myself. The phishing was a simple text with something about BJ’s Club membership information, and then I remembered that I didn’t even have a BJ’s Club membership, ha ha ha. This is what the text said:

There's an update to your BJ’s club order, please review the change here: bjsclub/randomurl.us

It was such a short simple text, related to “an order that I had made” - we’ve all been shopping more online this year and I’ve definitely been using the curbside pickup option with several stores. That little scam text almost tricked me into clicking almost automatically, without thinking, on the malicious link.

Basic cyber security tips

Scammers continue to get better at trying to steal our information. Realize that attacks may come in the form of a text, an email, through snail mail, or even by phone call. How do you protect yourself when using technology or online? Here are some basic tips to increase your personal security when interacting with technology or while online:

Be cautious when using public wi-fi, including your work network. Public networks give criminals the opportunity to intercept your encrypted transmissions - including when you’re using your “secure” mobile banking app or anything else where your personal data is being transferred over the wi-fi network. Wait until you’re home to conduct your important transactions or learn how to set up a virtual private network.

Plug your own charger directly into the wall outlet, not into another device (especially when traveling or away from home). When you plug your device's charger into another person's computer (or car), that computer can access your device's files.

Use a strong password or use a password manager. I personally choose to use strong passwords AND a password manager. A good password includes several unrelated words, some capitalization differences, some numbers and also some special characters.

Examples of strong passwords:
houseGolf2@cheese32
Nail$?ice5rubiX
452cucumBer#*yoyo!


Use a 2-step login process. A two step log in requires you to verify twice before accessing your sensitive information or computer - many times you will enter a password and verify an image, or enter a password and receive a text message to confirm entry.

Use HTTPS when browsing the web. When you look in the address bar, you should see “https” in front of the website address, not “http.” This ensures that any information you send over the web to that website is encrypted and therefore less likely to be hacked.

Keep your software updated. Be sure that your computer, phone, or other device has the latest software and removes any holes that hackers might exploit. Companies are very fast push out patches, but it’s your responsibility to get them installed as quickly as you can. A sidenote to software updates - always verify the origin of your software update, because this is another hole that hackers like to exploit.

Think twice before clicking any link. Links may appear to be safe, but unless you were totally sure of the sender you shouldn’t click on it. The text in the link may even appear to be safe but could be hiding a malicious site within the link.

Backup your data. Store copies or backups of important files from your phones, tablets, computers, and any other devices. Consider setting up automatic backup schedules through the settings on your device.

Put a sticker on your laptop (or other devices). There are thousands of iPads or HPs or Androids (or whatever you use!) in your surrounding area - a sticker or other identifying alteration quickly makes your device visually recognizable from other peoples’ devices. You mark your luggage- so make sure you mark your laptop too!

Don’t answer or say “yes” to any unknown caller on an incoming phone call - the unknown caller might just be a computer recording your voice to be used maliciously around the internet. Realize that your voice and other human body identifiers are now being captured by scammers to fake your identity online.


I hope you find these simple tips helpful to your safe interactions with technology. Leave me a comment below to share your experiences of scam attempts!

...And if you're looking for more Cybersecurity basics, visit my first post on Cybersecurity basics - its a fun visual presentation with a short self-test. Here's page 10 of the self-test:

 
#amberclee #cybersecurity

March 23, 2019

February 23, 2019

"Strategies for Cognitive Accessibility" at USF Bay-to-Bay Symposium on Diversity and Inclusion

Hello!

Below is a poster presentation entitled “Strategies for Cognitive Accessibility” that I recently created for the USF Bay to Bay Symposium on Diversity and Inclusion. I connect UDL, ARCS+V motivation theory, and our online course assessment rubric standards (Quality Matters); to share strategies to support learners with varying cognitive ability differences. Cognitive ability differences could be memory loss, trauma or brain injury, aging related changes, dyslexia, learning disabilities, adhd, and autism, just to name a few that you can see in the average classroom these days.

December 7, 2018

Qualitative-Land (A final reflection game board)

Below is my final reflection project for Qualitative Methods graduate level class. Each slide links to the main "game board" and audio was recorded and set on auto-play. The audio is provided in text below each slide (in lieu of hosting the full presentation somewhere).

Hope you like it!

Main Game Board


Welcome to Qualitative-Land! The game where you explore the main points that Amber learned in Dr. V’s Qualitative Research class this past Fall semester. Click on the game tiles numbers 1 through 10 to move through each learning point, and have fun!

1
 

Qualitative Research inquiry involves utilizing several methods that are organic and malleable; these methods allow for data capture from several rich and sometimes unexpected sources.

“anything can be data” –Dr. V

Many of the research studies that we explored utilized unexpected sources, such as the college dorm door art in Nathan’s text; the sound files in the Wailing Women text; and observation of people and characteristics, as found in many of our texts this semester.
 
2


Conversation and human interactions are ripe with data, including conversation (what is said, and what is not said), body language, positioning, eye contact, breaths, and other gestures.


Data can be found in big discourse analysis and little discourse analysis, in word choice, in referring terms used, and in how speech is reported whether as direct or indirect re-telling.

3


Ethnographic research is an often used and powerful tool for collecting data and telling the story of an interaction or phenomenon.

The Princeton Department of Anthropology defines ethnography as “a research method central to knowing the world from the standpoint of social relations”… and that it “involves hands-on, on-the-scene learning.” Researcher Hruska states that her ethnographic procedures “included prolonged engagement, persistent observation, and triangulation.”

Using ethnography, we also can analyze and present our own background biases as the researcher, in addition to exploring all elements of a situation or phenomenon both critically and holistically.

4


Critical Discourse Analysis involves both the microanalysis and macroanalysis of conversations; conversation collected by observation, or by reviewing an interview transcript or recording. Several frameworks exist to guide discourse analysis, including Toon Van Dyke’s and Gee’s frameworks. Conversations can be analyzed through narrative analysis, coding through counting, and thematic coding. Conversation elements such as multimodals or semiotics can also be analyzed with the text. Very little is spontaneous in speech and typically people want to look good by how they present themselves.

5


Reflective Journaling can be a key tool for any researcher, especially in qualitative methods where we are making connections, noting differences, and writing down thoughtfully our activities and ideas about a subject.


Through my journal this semester, I have been able to build my thoughts from class and apply them to projects or theories I am cultivating, and fully clarify the perspectives and methods that I have been learning in class.

6


Coding is analysis (even before the analysis begins).

Many times while working on my own thematic coding project and also the two group coding projects, we made several key decisions of analysis during our coding process that ultimately affected the data received and then formally analyzed. Choosing a deductive or inductive structure for your coding is an analysis decision; receiving the coding themes in project 2 may have limited our themes applied; and sometimes our limited knowledge of a topic develops as we code, so we then need to go back and revise our previous coding applications. Many decisions are made during coding!

7


Observation will make you feel like a secret agent.

My observation assignment really pushed me out of my comfort zone, but it gave me great confidence at the success of data collection that me and my partner had through that project. Observation is a powerful qualitative tool that can produce great amounts of data. Just make sure you conduct your observations in a public place and stealthy like a secret agent!

8


Several perspectives are available for your research outlook and also how you analyze your data, including the research perspectives of: positivist, post-positivist, constructivist, modernist, pos-modernist, feminist, critical theory, and grounded theory.

All theories have their strengths and weaknesses; and may not be applicable to the current phenomenon you are researching. Expect to try on several perspectives and frameworks when analyzing your data and approaching problems of interest.

9


Don’t forget the essential ‘housekeeping’ to research: IRB approval, consent of participants/interviewees, confidentiality, privacy, anonymity, and keeping appropriate relationships.

These important considerations must be addressed up front and any violations of these policies or ethical issues could harm someone, end the project, and possibly end your career.

10
 

Triangulation is the confirmation of your data and coding themes across resources or across researchers. Doing so can strengthen your findings and enhance validity of your study.

Triangulation can be conducted at any stage of coding or analysis; it can be conducted multiple times throughout a project; or you can compare what two or more researchers have found in the same dataset.

Semester end!

Popular Posts

(adsbygoogle = window.adsbygoogle || []).push({});