Among the main strengths of this important, highly readable book, says David H. Rothman, is its history of how we got into the mess in the first place. We blew our chance by not making higher education more of a tax-supported public good with academic values prevailing over commercial ones. The GI Bill and other measures helped, but what if the aid had been even more extensive with far less reliance on the marketplace? Even elite Ivy schools got caught up in the mania—wildly overpaying administrators and indulging in ever-more-expensive dorms and gyms and other luxuries to compete for the students from well-off families most likely to donate. So much for the poor and middle class, even with scholarships. The result was that America squandered brainpower.
What is proof-of-stake? A computer scientist explains a new way to make cryptocurrencies, NFTs and metaverse transactions
Prof. Scott Ruoti briefs us on yet another new component in Digital Ledger Technology. Proof-of-stake is a mechanism for achieving consensus on a blockchain. Blockchain is a technology that records transactions that can’t be deleted or altered. It’s a decentralized database, or ledger, that is under no one person or organization’s control. Since no one controls the database, consensus mechanisms, such as proof-of-stake, are needed to coordinate the operation of blockchain-based systems.
Prof. Cindy Guyer, Senior Law Librarian and Adjunct Assistant Professor Law at the University of Southern California Gould School of Law, has been experimenting with incorporating infographics in her teaching to present information and knowledge visually, using graphs, flowcharts, timelines, and diagrams, which are components of instructional design.
Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Lens reflections may betray your secrets in Zoom video calls; Multi-factor authentication (MFA) fatigue; How Pig Butchering Scams Work; and Crypto giveaway scams continue to escalate.