UFO Theyyyyyyeeeeerrrrrrr Heeeeeerrrrrrrreeeee

2004 THIS IS A REAL UFO SIGHTING

“60 Minutes” in May, Mr. Bigelow said he was “absolutely convinced” that aliens exist and that U.F.O.s have visited Earth.

STUPID AMERICANS HELD BACK BY THEIR UFO JUVENILE TABOO TALK.

SCIENCE FICTION IS NOW FACT
SO GET OVER YOUR IGNORANT SELVES

The program collected video and audio recordings of reported U.F.O. incidents, including footage from a Navy F/A-18 Super Hornet showing an aircraft surrounded by some kind of glowing aura traveling at high speed and rotating as it moves. The Navy pilots can be heard trying to understand what they are seeing. “There’s a whole fleet of them,” one exclaims. Defense officials declined to release the location and date of the incident.

Luis Elizondo, who led the Pentagon effort to investigate U.F.O.s until October. He resigned to protest what he characterized as excessive secrecy and internal opposition to the program.
Mr. Bigelow, Bigelow Aerospace, Mr. Reid, Mr. John Glenn, Mr. Elizondo,  Mr. Stevens and Mr. Inouye, used to work with the Navy, C.I.A.  Pentagon, Defense Secretary Jim Mattis, Harold E. Puthoff, William Lynn III
Robert Bigelow, a billionaire entrepreneur and longtime friend of Mr. Reid, received most of the money allocated for the Pentagon program. On CBS’s “60 Minutes” in May, Mr. Bigelow said he was “absolutely convinced” that aliens exist and that U.F.O.s have visited Earth.

The sightings were reported to the Pentagon’s shadowy, little-known Advanced Aerospace Threat Identification Program
$600 billion annual Defense Department budgets, the $22 million spent on the Advanced Aerospace Threat Identification Program was almost impossible to find. Which was how the Pentagon wanted it.
https://www.nytimes.com/2017/12/16/us/politics/pentagon-program-ufo-harry-reid.html

How to report what the military calls unexplained aerial phenomena, or unidentified flying objects.

Videos filmed by Navy pilots show two encounters with flying objects.

One was captured by a plane’s camera off the coast of Jacksonville, Fla., on Jan. 20, 2015. That footage, published previously but with little context, shows an object tilting like a spinning top moving against the wind. A pilot refers to a fleet of objects, but no imagery of a fleet was released. The second video was taken a few weeks later.

#UFO Videos filmed by Navy pilots #UFOVideosfilmedbyNavyPilots

Resizeable pull the bottom right corner to the right

2018 National Assessment of Educational Progress (NAEP) in technology and engineering

2018 K12 NAEP Technology and Engineering Literacy (TEL)

https://twitter.com/naep_nces

Do U.S. students have the & skills and knowledge they need to succeed in the 21st century? Find out in the newly released NAEP Technology and Engineering Literacy Report Card.

Students who are literate in technology and engineering can use, understand, and evaluate technology. They can understand the technological principles and strategies that are needed to develop solutions and achieve goals. This includes students being able to use various technologies to communicate and collaborate.

Technology and engineering skills are an integral part of students’ everyday lives and will be critically important as they continue their educations and enter the workforce. Since technology is also integrated into other subjects, students require strong skills in this area to excel in all aspects of their coursework.

About the assessment
The computer-based assessment, administered to eighth grade public school students nationwide, asks students to complete collaborative, multimedia tasks and solve practical problems based in real-world contexts. It focuses on three major areas:

Technology & Society
Students’ understanding of the effects of technology on society and the natural world, which equips them to grapple with related ethical questions.

Design & Systems
Students’ understanding of engineering design processes, including basic aspects of managing everyday technology such as maintenance and troubleshooting.

Information & Communication Technology
Students’ ability to use technologies for accessing, creating, and communicating information, as well as facilitating creative expression.

ARTS https://www.nationsreportcard.gov/arts_2016/

Report Card 

Achievement Gaps Dashboard

State Profiles

State Performance Compared to the Nation: Data Table
Mathematics, Grade 4
Difference in average scale scores, percentage at or above Basic, percentage at or above Proficient, between all jurisdictions and National public, for All students [TOTAL], 2017

https://www.nagb.gov/naep-results/mathematics/2017-naep-reading-and-math-report.html

latest results

K12 End of the Year Classroom Activities and Games

K12 end of the school year activities, #CootieCatcher #Games and the history of those folded paper finger manipulated toys.

Make Cootie Catchers, Games, Music Games, Memory Certificates, Saying Goodbye to Teacher, Memory Video Project, Collect Children’s songs games chants, Preschool graduation Party, (BEFORE CHATBOTs) produce a chatterbox, fortune teller, You May Also Connect Autograph Books to the National Standards: FINE ARTS: Visual Arts GRADES K – 12 Understanding the Visual Arts In Relation to History and Cultures.

The Cootie Catcher Game

cite: Educational CyberPlayGround, Inc.
https://www.edu-cyberpg.com/
Title: K12 END-OF-YEAR ACTIVITIES K12 end of the year activities that combine fun and learning. Find great ideas for the LAST DAYS OF SCHOOL AND THROUGH THE SUMMER
3/31/2019
https://www.edu-cyberpg.com/Teachers/newteacherlastday.html

#LICE CATCHERS #LOUSE CATCHERS #COOTIE CATCHERS FORTUNE TELLERS OR COOTIE CATCHERS The history of those folded paper finger manipulated toys.

“Sue Samuelson traces the origin of cooties to the earliest use of cootie,” meaning body louse, as 1917.
Fortune tellers: Opies’ Lore and Language of School children
We all know “no more pencils no more books no more students dirty looks” but do you know when they first appeared?

HOW TO MAKE A COOTIE CATCHER!

HOW TO PLAY WITH A COOTIE CATHER FORTUNE TELLER

MAKING AN AUTOGRAPH BOOK

Autograph books are a significant piece of Americana, recollecting the times, but they have been given little attention in the body of folklore.


25 JUMBO INDEX CARD, RIBBON, HOLE PUNCHER
www.youtube.com/watch?v=RwH3G2e4hmg

You May Also Connect Autograph Books to the Core Standards:

FINE ARTS: Visual Arts GRADES K – 12
Understanding the Visual Arts In Relation to History and Cultures
LANGUAGE ARTS: English GRADES K – 12 Reading for Perspective Communication Skills Applying Knowledge

Autograph books are a significant piece of Americana, recollecting the times, but they have been given little attention in the body of folklore. Such books have a history, possibly continuing the German tradition of writing sentiments of affection in family keepsake albums and of friendship in school notebooks.

Try this on in a yearbook or someone’s autograph book:

If you think you are in love,
And there is still some question,
Don’t worry much about it.
It may be indigestion.

End of the School Year ACTIVITIES

LINK TO YOUR SCHOOL CLASSROOM STEM  COOTIE CATCHER VIDEO

K12PlayGround.com

Register – login
find or update your school information 

Add your school
or Update your School information page,
|
then link to your video project

CAN I TELL YOUR FORTUNE?  GET “FLEXED”
HEXAFLEXAGON  Richard Feynman

NEVER FLEXAGATE WITHOUT SCISSORS

BUILD YOUR HEXAFLEXAGON SKILLS

Girls change the world and can do anything

Educational CyberPlayGround: Websites for Girls and Young Women who want to be involved with Technology
WEBSITES FOR GIRLS AND YOUNG WOMEN
How to help girls get into technology.
Real women engineers and other role models for girls.
Changing Girls’ Attitudes About Computers

“Don’t worry your pretty little head over it.”
Special Edition
Computer Wonder Women
National Women’s History Month
GIRLS WHO CODE: GIRLS CAN DO ANYTHING – GIRLS CAN CHANGE THE WORD
https://www.youtube.com/watch?v=dr6b4nwo-5k

[ECP] Educational CyberPlayGround NetHappenings Mailing List

<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
[ECP] Educational CyberPlayGround, Inc.
NetHappenings Mailing List copyright 1989
Educational CyberPlayGround Blog:
http://blog.edu-cyberpg.com/
*Link to the Educational CyberPlayGround
http://www.edu-cyberpg.com
*Find your School in the ECP K-12 School Directory
http://www.edu-cyberpg.com/schools/
<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
Dear NetHappenings Reader,
Happy Labor Day  looking forward to getting back into the groove.
enjoy,
<ECP>
FBI Radio: Public Service or Self-Serving?
http://dailysignal.com/2014/09/02/fbi-radio-public-service-self-serving/
FBI radio began in 1965, according to the FBI. The first series was called “FBI Washington” and aired on ABC. In 1990, it was reformatted and renamed “FBI This Week.” Since then, more than 1,200 one-minute spots have aired.
Awesome-radio – a curated list of radio resources and information
https://github.com/kyleterry/awesome-radio
My exploration into CB radio. And radio in general. A curated list of awesome radio resources. Inspired by awesome-*. I recently pulled out my CB radio and installed it in my truck. This inspired me to create an open source repository of all the radio related resources I found helpful and my notes on the subject. This project is aimed at hackers who enjoy all aspects of radio communication. While a lot of this technology isn’t usable by citizens and is heavily regulated by the FCC, just knowing anything about it is special. I’ve been interested in learning the ins and outs of radio, as well as hearing stories, new and old.
Hackers Build a Skype That’s Not Controlled by Microsoft call;ed TOX
http://www.wired.com/2014/09/tox/
Android security mystery – ‘fake’ cellphone towers found in U.S.
http://www.welivesecurity.com/2014/08/28/android-security-2/
“What we find suspicious is that a lot of these interceptors are right on top of U.S. military bases.” says Goldsmith. “Whose interceptor is it? Who are they, that’s listening to calls around military bases? The point is: we don’t really know whose they are.” What has come as a surprise is how many “interceptors” are in active use in the U.S., and that their purpose remains mysterious.
The VME Dominator™ is a real time GSM A5.1 cell phone interceptor. It cannot be detected. It allows interception of voice and text. It also allows voice manipulation, up or down channel blocking, text intercept and modification, calling & sending text on behalf of the user, and directional finding of a user during random monitoring of calls. The VME Dominator is far superior to passive systems in being able to intervene and manipulate calls and sms, working with up to 4 base stations concurrently, and up to 20 users in the system at any one time.
Shenzhen trip report – visiting the world’s manufacturing ecosystem
http://joi.ito.com/weblog/2014/09/01/shenzhen-trip-r.html
While intellectual property seems to be mostly ignored, tradecraft and trade secrets seem to be shared selectively in a complex network of family, friends and trusted colleagues. This feels a lot like open source, but it’s not. The pivot from piracy to staking out intellectual property rights isn’t a new thing. The United States blatantly stole book copyright until it developed it’s own publishing very early in US history. The Japanese copied US auto companies until it found itself in a leadership position. It feels like Shenzhen is also at this critical point where a country/ecosystem goes from follower to leader.
Russian gas giant Gazprom’s CEO Alexei Miller , Russian President Vladimir Putin and Chinese Vice Premier Zhang Gaoli attend a ceremony marking the welding of the first link of “The Power of Siberia” gas pipeline outside Yakutsk in eastern Siberia yesterday as construction of the US$20.8 billion pipeline that will bring gas from the country’s far east to China began. Work on the Chinese section is due to start 2015.
MICROSOFT Corp has been granted a 20-day deadline by a Chinese regulator to explain why it held back on its “not fully disclosed information” regarding Windows and Office suite sales.
Hong Kong’s Basic Law
http://www.reuters.com/article/idUSKBN0GV04A20140831
China’s rubber-stamp parliament is expected on Sunday to endorse the framework for Hong Kong’s first direct leadership election, due in 2017. But Beijing is likely to only allow two or three “patriotic” candidates, with no open nominations. That will anger pro-democracy activists who have threatened civil disobedience, potentially disrupting Hong Kong’s major financial hub.
China rules out full democracy for Hong Kong
http://www.reuters.com/news/video?videoId=341720115
Pro-democracy activists take to the streets of Hong Kong after China rejects their demands for free elections.
Hong Kong police arrest 19 in pro-democracy scuffles
http://www.reuters.com/article/idUSKBN0GX06V20140902
Hong Kong police said on Tuesday they arrested 19 people during scuffles with pro-democracy activists prompted by China’s decision not to allow the Asian financial hub to choose its next leader.
Fast food workers plan biggest US strike to date over minimum wage
http://www.theguardian.com/business/2014/sep/01/fast-food-strike-minimum-wage-workers-protest
Workers from McDonald’s, Burger King and other chains to hold walkout protest on Thursday as battle to unionize escalates. America’s fast food workers are planning their biggest strike to date this Thursday, with a nationwide walkout in protest at low wages and poor healthcare.
Bank of America seeks to void verdict in $1.27 billion ‘Hustle’ case
http://www.reuters.com/article/idUSKBN0GS2OL20140828
Bank of America Corp on Thursday asked a federal judge to throw out a jury verdict finding it liable for fraud over defective mortgages sold by its Countrywide unit that resulted in a $1.27 billion penalty.
Several Swiss banks pull out of U.S. tax program:
http://www.reuters.com/article/idUSKBN0GV09X20140831
At least 10 Swiss banks have withdrawn from a U.S. program aimed at settling a tax dispute between them and the United States, Swiss newspaper NZZ am Sonntag said on Sunday, quoting unnamed sources.
Management dictating their own terms
http://randsinrepose.com/archives/the-wolf/
The Wolf: You’ve heard of the 10x engineer, but I am here to tell you about the Wolf. They are an engineer and they consistently exhibit the following characteristics:
Man builds 3D printed concrete castle in his own backyard
http://www.3ders.org/articles/20140826-minnesotan-world-first-3d-printed-concrete-castle-in-his-own-backyard.html
2.6m historic pictures posted online
http://www.bbc.co.uk/news/technology-28976849
The Civil Rights Movement web site
http://www.crmvet.org/
continues to collect documents, stories, and biography of Civil Rights Movement workers. One document IS folklore. This leaflet hits every stereotype you’ve every heard of but, it IS  folklore from Birmingham AL
http://www.crmvet.org/docs/6106_bham_racist-leaflet.pdf
Our Use of Little Words Can, Uh, Reveal Hidden Interests
http://www.npr.org/blogs/health/2014/09/01/344043763/our-use-of-little-words-can-uh-reveal-hidden-interests
The Linguistic Inquiry and Word Count program that Pennebaker and his students built in the early 1990s has, like any computer program, an ability to peer into massive data sets and discern patterns that no human could ever hope to match. Specifically, what Pennebaker found was that when the language style of two people matched, when they used pronouns, prepositions, articles and so forth in similar ways at similar rates, they were much more likely to end up on a date.
Georgia State University Library releases Library Instruction Recorder plugin as Open Source
http://homer.gsu.edu/blogs/library/2014/08/29/georgia-state-university-library-releases-library-instruction-recorder-plugin-as-open-source/
As part of its commitment to the free culture movement, Georgia State University Library is pleased to announce the initial release of the Library Instruction Recorder (LIR). LIR is a free, open source WordPress plugin that allows librarians and library staff to record and report on library instruction sessions.
Recent research on leadership barriers for women working in tech
http://www.inc.com/kimberly-weisul/insane-double-standard-for-tech-women.html?cid=sf01002
BBC begins kids coding push with Bitesize and TV shows
http://www.bbc.co.uk/news/technology-28984411
The BBC has published computer programming study guides, quizzes and other support materials on its Bitesize site to coincide with the new computing curriculum’s introduction in England. The broadcaster also revealed several programming-themed children’s TV shows will be broadcast in the autumn. The BBC described the move as an “early start” to a wider coding initiative planned for next year.
The Serif Readability Myth August 29, 2014 / Kas Thomas
http://author-zone.com/
I’ve been involved in publishing all my life, and like many others I’ve always accepted as axiomatic the notion that typefaces with serifs (such as Times-Roman) are, in general, are more readable than non-serif typefaces (e.g., Helvetica). It never occurred to me that there was any doubt about the matter whatsoever. Were the monks who invented serifs and other text ornamentations merely engaging in idle doodling? Weren’t they consciously intending to increase the legibility of the important documents they were transcribing?
How I Start: Go With Peter Bourgon
http://howistart.org/posts/go/1
Go is meant to be simple, but sometimes the conventions can be a little hard to grasp. I’d like to show you how I start all of my Go projects, and how to use Go’s idioms. Let’s build a backend service for a web app.
Download videos from YouTube (and mores sites)
https://rg3.github.io/youtube-dl/
youtube-dl is a small command-line program to download videos from YouTube.com and a few more sites. It requires the Python interpreter (2.6, 2.7, or 3.3+), and it is not platform specific. We also provide a Windows executable that includes Python. youtube-dl should work in your Unix box, in Windows or in Mac OS X. It is released to the public domain, which means you can modify it, redistribute it or use it however you like. You can also contact us on the irc channel #youtube-dl(webchat) on freenode.
Copyright © 2006-2014 Ricardo Garcia Gonzalez
Under the Microscope
[print edition title; the online title was “As Data Overflows Online, Researchers Grapple With Ethics”]
http://www.nytimes.com/2014/08/13/technology/the-boon-of-online-data-puts-social-science-in-a-quandary.html
Scholars are exhilarated by the prospect of tapping into the vast troves of personal data collected by Facebook, Google, Amazon and a host of start-ups, which they say could transform social science research. Once forced to conduct painstaking personal interviews with subjects, scientists can now sit at a screen and instantly play with the digital experiences of millions of Internet users. It’s the frontier of social science — experiments on people who may never even know they are subjects of study, let alone explicitly consent. “This is a new era,” said Jeffrey T. Hancock, a Cornell University professor of communication and information science. “I liken it a little bit to when chemistry got the microscope.”
Greenhouse gas fear over increased levels of meat eating
http://www.bbc.com/news/science-environment-29007758
Research from Cambridge and Aberdeen universities estimates greenhouse gases from food production will go up 80% if meat and dairy consumption continues to rise at its current rate. That will make it harder to meet global targets on limiting emissions. The study urges eating two portions of red meat and seven of poultry per week. However that call comes as the world’s cities are seeing a boom in burger restaurants. The research highlights that more and more people from around the world are adopting American-style diets, leading to a sizeable increase in meat and dairy consumption.
A Call for a Low-Carb Diet That Embraces Fat
http://www.nytimes.com/2014/09/02/health/low-carb-vs-low-fat-diet.html
People who avoid carbohydrates and eat more fat, even saturated fat, lose more body fat and have fewer cardiovascular risks than people who follow the low-fat diet that health authorities have favored for decades, a major new study shows.
Saving America’s honeybees
http://www.bbc.com/news/business-28983709
In the past 60 years the number of honeybee colonies has fallen from six million beehives in 1947, to just 2.5 million today, according to the White House. in June, President Obama launched a taskforce to protect the honeybee. The White House is investing $50m into research and action to stem the decline, improve habitats and promote better education around the issue.
Waking the Dead: Bringing Extinct Species Back to Life
http://longnow.org/revive/what-we-do/passenger-pigeon/
The Great Passenger Pigeon Comeback This is the first project to revive an extinct animal using its museum-specimen DNA. Once it succeeds, the techniques will be applicable to hundreds of other extinct species.
Google ‘discourages’ old browser use
http://www.bbc.co.uk/news/technology-29012038
For some the only way to get to the 2014 search page was to change their browser’s basic configuration to make Google think it was more up-to-date than it actually was. A Google engineer joined the discussion and explained that the change was not the result of a bug. “It’s working as intended,” said a Google staffer called “nealem”.
What Browser Am I Using?
http://whatbrowser.org/
<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
Educational CyberPlayGround NetHappenings  ©1989
NetHappenings: the largest and oldest K-12 Education Mailing List
Email Preferences — Subscribe – Unsubscribe – Digest
http://www.edu-cyberpg.com/Community/NetHappenings.html
Copyright FAIR USE Statements to be included when reproducing
annotations from NetHappenings.
Use the single phrase below as the copyright notice when
reproducing any portion of this report, in any format:

EDUCATIONAL CYBERPLAYGROUND
http://www.edu-cyberpg.com
NetHappenings Mailing List ©1989
http://www.edu-cyberpg.com/Community/Nethappenings.html
Blog: http://blog.edu-cyberpg.com/

Advertise on NetHappenings
http://www.edu-cyberpg.com/Community/Subguidelines.html
<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>

Dr. Kristin Yvonne Rozier – No More Helicopter Parenting: Intelligent Autonomous UAS's

Congratualtions Kristin Yvonne Rozier

Dr. Kristin Yvonne Rozier – No More Helicopter Parenting: Intelligent Autonomous UAS’s

NASA’s efforts to promote careers in STEM

Jul 28, 2014

Safety is NASA’s top priority! The search for innovative new ways to validate and verify is vital for the development of safety-critical systems. Such techniques have been successfully used to assure systems for air traffic control, airplane separation assurance, autopilots, logic designs, medical devices, and other functions that ensure human safety. Safety is important to ensure at all stages of a system’s lifetime, from design time to run time.
We take a look at an exciting recent advancement in run time System Health Management (SHM) for totally autonomous Unmanned Aerial Systems (UAS) tasked with important missions like wild-fire surveillance and earthquake response.
Our real-time, Realizable, Responsive, Unobtrusive Unit (rt-R2U2) meets the emerging needs for SHM of new safety-critical embedded systems like automated vehicles, UAS, or small satellites. SHM for these systems must be able to handle unexpected situations and adapt specifications quickly during flight testing between closely-timed consecutive missions, and must enable more advanced probabilistic reasoning for diagnostics and prognostics while running aboard limited hardware without affecting the certified on-board software.
Come learn about the new technologies that can enable a fire-fighting UAS to fly!
The series is presented by the Office of the Chief Scientist at NASA’s Ames Research Center as part of the Center’s 75th anniversary celebration.
 
LOVE FROM THE CYBERPLAYGROUND!!!
GO SYSTER GO

Earth Day April 22

On Earth Day (April 22), the Department will broadcast live on its USTREAM channel the announcement of 2014 U.S. Department of Education-Green Ribbon Schools Award winners, as well as post all nomination packages and release a highlights document.  (Note: National Environmental Education Week is April 13-19, and National Park Week is April 19-27.)

Skills for the New Economy: Preparing Students for College and Careers

Skills for the New Economy: Preparing Students for College and Careers
http://www2.ed.gov/about/overview/budget/budget15/crosscuttingissues/skillsforneweconomy.pdf
 
RETHINKING HIGH SCHOOL
 
On April 7, during his visit to Bladensburg High School in Prince George’s County, Maryland, President Obama announced 24 Youth CareerConnect grants, providing $107 million to local partnerships of school districts, institutions of higher education, workforce investment boards, and employers as they redesign the teaching and learning experience for youth to more fully prepare them with the knowledge, skills, and industry-relevant education needed to get on the pathway to a successful career, including postsecondary education or registered apprenticeship.  “We challenged America’s high schools to…say what they can do to make sure their students learn the skills that businesses are looking for in high-demand fields,” the President said.  “And we asked high schools to develop partnerships with colleges and employers and create classes that focus on real life applications for the fields of the future — fields like science and technology and engineering and math….  The winners across the board are doing the kinds of things that will allow other schools to start duplicating what they’re doing…. And that’s what we want for all the young people here.  We want an education that engages you…that equips you with the rigorous and relevant skills for college and for a career” (blog post, with remarks and video).
 
The Youth CareerConnect program was established this year by the Labor Department, in collaboration with the Education Department, using one-time revenues from the H-1B visa program.  Grants range from $2.2 million to $7 million.  The program wholly complements additional proposals in the President’s Fiscal Year 2015 budget to ensure high school students graduate ready for college and career success and to help the U.S., once again, lead the world in college attainment.
 
Bladensburg High School was part of a three-school team from the county that won a $7 million grant.  It offers several career academies with high school curricula aligned with college-level entrance requirements for Maryland’s state university system.  Through a collaborative effort with local partners, it will expand the capacity of its Health and Biosciences Academy to better prepare more students for one of the region’s highest growth industries.  Students who concentrate in health professions will be able to earn industry-recognized certifications in the fields of nursing and pharmacy.  Biomedical students will be able to earn college credit from the University of Maryland at Baltimore County and the Rochester Institute of Technology.  All students will have access to individualized college and career counseling designed to improve preparation for college-level coursework and the attainment of industry-recognized credentials.  Students will also have the ability to receive postsecondary credit while still in high school and have access to paid work experiences with employer partners such as Lockheed Martin.  Overall, the grant will help prepare 2,500 graduates at Bladensburg and other schools across the county to succeed academically and graduate career-ready in the high-demand fields of health care and information technology.
 
On the same day, the Departments of Education and Labor launched the Registered Apprenticeship-College Consortium, a new effort that will allow graduates of registered apprenticeship programs to turn their years of rigorous on-the-job and classroom training into college credits toward an associate’s or bachelor’s degree.  Registered apprenticeship programs are sponsored by joint employer and labor groups, individual employers, or employer associations.  Currently, the registered apprenticeship system includes a network of more than 19,000 programs nationwide — offering nearly 1,000 different career opportunities.  Participating sponsors will have their programs evaluated by a third-party organization (for example, the American Council on Education or the National College Credit Recommendation Service) to determine the college credit value of the apprenticeship completion certificate.  Graduates will be able to earn up to 60 credits based on their apprenticeship experience.

NSA's automated hacking engine offers hands-free pwning of the world

NSA’s automated hacking engine offers hands-free pwning of the world
With Turbine, no humans are required to exploit phones, PCs, routers, VPNs.
by Sean Gallagher – Mar 12 2014, 3:20pm EDT
Since 2010, the National Security Agency has kept a push-button hacking system called Turbine that allows the agency to scale up the number of networks it has access to from hundreds to potentially millions. The news comes from new Edward Snowden documents published by Ryan Gallagher and Glenn Greenwald inThe Intercept today. The leaked information details how the NSA has used Turbine to ramp up its hacking capacity to “industrial scale,” plant malware that breaks the security on virtual private networks (VPNs) and digital voice communications, and collect data and subvert targeted networks on a once-unimaginable scale.
Turbine is part of Turbulence, the collection of systems that also includes the Turmoil network surveillance system that feeds the NSA’s XKeyscore surveillance database. While it is controlled from NSA and GCHQ headquarters, it is a distributed set of attack systems equipped with packaged “exploits” that take advantage of the ability the NSA and GCHQ have to insert themselves as a “man in the middle” at Internet chokepoints. Using that position of power, Turbine can automate functions of Turbulence systems to corrupt data in transit between two Internet addresses, adding malware to webpages being viewed or otherwise attacking the communications stream.
Since Turbine went online in 2010, it has allowed the NSA to scale up from managing hundreds of hacking operations each day to handling millions of them. It does so by taking people out of the loop of managing attacks, instead using software to identify, target, and attack Internet-connected devices by installing malware referred to as “implants.” According to the documents, NSA analysts can simply specify the type of information required and let the system figure out how to get to it without having to know the details of the application being attacked.
<snip>

How Academia and Publishing are Destroying Scientific Innovation

How Academia and Publishing are Destroying Scientific Innovation: A Conversation with Sydney Brenner | King’s Review – Magazine
 
Publishers withdraw more than 120 gibberish papers

The publishers Springer and IEEE are removing more than 120 papers from their subscription services after a French researcher discovered that the works were computer-generated nonsense.

 Over the past two years, computer scientist Cyril Labbé of Joseph Fourier University in Grenoble, France, has catalogued computer-generated papers that made it into more than 30 published conference proceedings between 2008 and 2013.

 

…Among the works were, for example, a paper published as a proceeding from the 2013 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, held in Chengdu, China. (The conference website says that all manuscripts are “reviewed for merits and contents”.) The authors of the paper, entitled ‘TIC: a methodology for the construction of e-commerce’, write in the abstract that they “concentrate our efforts on disproving that spreadsheets can be made knowledge-based, empathic, and compact”. … The IEEE has now removed the paper)….

 

This has got to be an embarrassment to IEEE and Springer.
As of this moment, a scanned copy of the first page of the cited example is still online at
I read a bit of it to assure myself that it was really gibberish and not just a poor mechanical translation. It is definitely gibberish. Here’s the first paragraph:
“Replication must work. To put this in perspective, consider the fact that acclaimed researchers generally use wide-area networks to overcome this quagmire. Next, the notion that hackers worldwide collaborate with metamorphic algorithms is never considered unfortunate. Thus, unstable epistemologies and the location identity split have paved the way for the simulation of B-trees.”
There is also a diagram, a sort of flow chart, that has nonsensical conditions and transitions.
Is this a fraud perpetrated by the named authors or their assistants, a parody, a prank or an act of digital vandalism? In any event, Labbé’s discovery of 120 gibberish papers have exposed a flawed publication process.
This conference requests two versions of each paper: one to review and decide acceptance and one for the printer’s camera. The 2014 edition of the same conference has posted this schedule:
10 Apr 2014 Full Paper Submission Deadline
10 May 2014 Full Paper Acceptance Notification
30 May 2014 Camera Ready Papers Due
22 Jul 2014 Conference Begins
There’s not a whole lot of time for the handlers of the camera-ready copies (some of whom may not be fluent readers of English technical prose) to verify their integrity before they are printed. There is opportunity for a bad actor, whether author or vandal, to replace the submission by gibberish.
Larry Tesler

Engineers Allege Hiring Collusion in Silicon Valley – NYTimes.com