3,602 research outputs found

    Switch access to technology - A comprehensive Guide.

    Get PDF
    When most of us use a computer we use the standard interface of a keyboard and mouse. However, what do you do if you cannot use a keyboard or mouse? A number of alternative access systems exist, for example: alternative keyboards, tracker balls, touchscreens, head pointers etc. But for some people these devices are also an impossibility, and this is where switches 'kick in'. The main subject of this document is the switch user. For completeness we have include a brief mention of other input devices, which may be grouped together as 'alternative access systems'.We aim to: - Encourage developers to include switch access into their products - Standardise practice and terminology. This document explains some of the issues involved for people with severe physical difficulties who access computers and other electronic devices with switches. It details the ways in which switch users interact with computer programs and other technology designed to be directly accessible to them. The document includes some precise definitions of terms. It also attempts to survey the whole range of issues associated with switch use. As such it should be useful to professionals working or entering the field, those software developers considering switch users for the first time and also for those already developing in this area

    Adopting Digital Technology in Midwifery Practice – Experiences and Perspectives From Six Projects in Eight Countries (2014 – 2016)

    Get PDF
    This paper describes the cases of six midwifery projects of the Women Observatory for eHealth at the Millennia2025 Women and Innovation Foundation, to support the adoption of information and communication technologies (ICTs) in midwifery practice in eight countries from 2014 to 2016. The WeObservatory is a digital inclusion incubator aimed at reducing maternal and neonatal mortality in countries with limited resources by strengthening midwifery practice through the access to ICTs and eHealth applications. This paper describes how the collaboration with the WeObservatory supported these projects in the development and adoption of digital solutions for midwifery practice. It examines responses from the project leaders to an online survey conducted by the WeObservatory in January of 2018. Their responses provide insights on opportunities and challenges faced by these projects that can inform future midwifery eHealth projects. Building capacity among midwives for the adoption of digital competencies will help improve the quality of healthcare provided to mothers and their newborn babies in low-income countries

    QuizPower: a mobile app with app inventor and XAMPP service integration

    Get PDF
    This paper details the development of a mobile app for the Android operating system using MIT App Inventor language and development platform. The app, Quiz Power, provides students a way to study course material in an engaging and effective manner. At its current stage the app is intended strictly for use in a mobile app with App Inventor course, although it provides the facility to be adapted for other courses by simply changing the web data store. Development occurred during the spring semester of 2013. Students in the course played a vital role in providing feedback on course material, which would be the basis for the structure of the quiz as well as the questions. The significance of the project is the integration of the MIT App Inventor service with a web service implemented and managed by the department

    TLAD 2011 Proceedings:9th international workshop on teaching, learning and assesment of databases (TLAD)

    Get PDF
    This is the ninth in the series of highly successful international workshops on the Teaching, Learning and Assessment of Databases (TLAD 2011), which once again is held as a workshop of BNCOD 2011 - the 28th British National Conference on Databases. TLAD 2011 is held on the 11th July at Manchester University, just before BNCOD, and hopes to be just as successful as its predecessors.The teaching of databases is central to all Computing Science, Software Engineering, Information Systems and Information Technology courses, and this year, the workshop aims to continue the tradition of bringing together both database teachers and researchers, in order to share good learning, teaching and assessment practice and experience, and further the growing community amongst database academics. As well as attracting academics from the UK community, the workshop has also been successful in attracting academics from the wider international community, through serving on the programme committee, and attending and presenting papers.Due to the healthy number of high quality submissions this year, the workshop will present eight peer reviewed papers. Of these, six will be presented as full papers and two as short papers. These papers cover a number of themes, including: the teaching of data mining and data warehousing, databases and the cloud, and novel uses of technology in teaching and assessment. It is expected that these papers will stimulate discussion at the workshop itself and beyond. This year, the focus on providing a forum for discussion is enhanced through a panel discussion on assessment in database modules, with David Nelson (of the University of Sunderland), Al Monger (of Southampton Solent University) and Charles Boisvert (of Sheffield Hallam University) as the expert panel

    TLAD 2011 Proceedings:9th international workshop on teaching, learning and assesment of databases (TLAD)

    Get PDF
    This is the ninth in the series of highly successful international workshops on the Teaching, Learning and Assessment of Databases (TLAD 2011), which once again is held as a workshop of BNCOD 2011 - the 28th British National Conference on Databases. TLAD 2011 is held on the 11th July at Manchester University, just before BNCOD, and hopes to be just as successful as its predecessors.The teaching of databases is central to all Computing Science, Software Engineering, Information Systems and Information Technology courses, and this year, the workshop aims to continue the tradition of bringing together both database teachers and researchers, in order to share good learning, teaching and assessment practice and experience, and further the growing community amongst database academics. As well as attracting academics from the UK community, the workshop has also been successful in attracting academics from the wider international community, through serving on the programme committee, and attending and presenting papers.Due to the healthy number of high quality submissions this year, the workshop will present eight peer reviewed papers. Of these, six will be presented as full papers and two as short papers. These papers cover a number of themes, including: the teaching of data mining and data warehousing, databases and the cloud, and novel uses of technology in teaching and assessment. It is expected that these papers will stimulate discussion at the workshop itself and beyond. This year, the focus on providing a forum for discussion is enhanced through a panel discussion on assessment in database modules, with David Nelson (of the University of Sunderland), Al Monger (of Southampton Solent University) and Charles Boisvert (of Sheffield Hallam University) as the expert panel

    Security and Privacy Issues of Big Data

    Get PDF
    This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.Comment: In book Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence, IGI Global, 201
    • …
    corecore