Category Archives: Post for MiddPoints

Digital Surrealism as Research Strategy April 5th

Please join us Tuesday, April 5th at 12:15 PM in the CTLR Lounge for a lunchtime discussion with Kevin Ferguson on some playful and interdisciplinary approaches to digital scholarship that use technologies developed in other fields (like the medical imaging software ImageJ) to answer humanistic questions. Lunch will be served, so please RSVP here. He also has some free time during the day on Wednesday, so if you’d like to learn more about ImageJ or chat with him email Alicia Peaker with your availability.

Most digital humanities approaches pursue traditional forms of scholarship by extracting a single variable from cultural texts that is already legible to scholars. Instead, this talk advocates a mostly-ignored “digital-surrealism” that uses computer-based methods to transform film texts in radical ways not previously possible. The return to a surrealist and avant-garde tradition requires a unique kind of research, which is newly possible now that humanists have made the digital turn. I take a surrealist view of the hidden in order to imagine what aspects of media texts are literally impossible to see without special computer-assisted techniques. What in the archive is in plain sight but still invisible? What in the cinema is so buried that our naked eyes are unable to see it? Here I present one such method, using the z-projection function of the scientific image analysis software ImageJ, to sum film frames in order to create new composite images. I examine four corpora of what would normally be considered rather different types of film: (1) the animated features produced by Walt Disney Animation Studios, (2) a representative selection of the western genre (including American and Italian “spaghetti” westerns), (3) a group of gialli (stylish horror films originating from Italy that influenced American slasher films), and (4) the series of popular Japanese Zatoichi films, following the adventures of the titular blind masseuse and swordsman living in 1830s Japan.

Kevin Ferguson is an Assistant Professor of English and Director of Writing at Queens College (CUNY). He teaches undergraduate and graduate courses on college writing, contemporary literature, and film adaptation.

Notes for Core Team March 29, 2016

[RE] Introductions

We all knew each other from the CTT, so this was a chance to reaffirm a commitment to looking at technologies and the services around them that make them successful. The re-boot to the ACTT structure provides definition and focus, while sticking to the mission to evaluate and recommend technology services and innovations for teaching, learning and research.

Review Charge and Process

We reviewed the slides at go/delta, paying attention to the responsibilities of the various Team members. The Extended Team is made up of experts, Program Teams, and Project Teams.

Program Teams

The Middlebury Institute of International Studies is in the process of forming a Team, similar to the CTT, that will focus on cyberinfrastructure conversations pertaining to Monterey. They will have their own sponsorship (Amy McGill) and leadership (Bob Cole), set their own agenda topics, and determine how they will communicate together. Bob and Amy will share information between the MIIS Team and the ACTT.

Other Program Teams may develop in the future. MIIS has a head start, the DLC is a good hub for these conversations.

Project Teams

Small Project Teams carry out the charge of the evaluation. Their activities may include gathering requirements, identifying solutions, contacting vendors, and starting drafts of recommendations. These Teams will share information with the Extended Team, this allows the Project Teams to be nimble while still gaining a variety of perspectives. The ACTT Core Team is responsible for the final proposals.

Academic Cyberinfrastructure

We agreed on the importance of looking at the practices and people associated with technologies. Joe presented a short definition of cyberinfrastructure, others provided their own understanding. The Core Team is currently working on a shared definition that will help describe what we do. Joe will start share his definition, others will contribute.

 

Make Decisions About Communication

We decided an email group and slack channel, Joe will make these happen.

We have started building a schedule of meetings.

Plan Open Kick-Off for April 5th

Joe will present the slides avalable at http://act.middcreate.net/site/. Everyone will provide their own input. MIIS will have a number of people who are interested in their Program Team attend.

Set Agendas for Future Meetings

Future topics include video streaming, RStudio, and the Academic Cyberinfrastructure Inventory. There is also an interest in learning about GoogleAppsforEdu and One Drive, especially knowing what will be available for the fall. Joe will confirm presenters, then we will share the topics and dates as far out in advance as we can.

ACTT Kick-off Meeting: April 5th, 2016

Tuesday, April 5th from 3-4pm
LIB 105A or Polycom 712833

Agenda

We will be starting the new ACTT process with a Kick-Off meeting. This is an open, non-mandatory meeting for anyone who is interested in learning about the Academic Cyberinfrastructure Transformation Team to attend. We will introduce the new team members, structure, and thoughts on how the Team activities will be evaluated.

This is an open meeting, please share with anyone who is interested in learning about the ACTT.

@MiddInfoSec: Phishing Alert – – “Update Announcements”

A phishing email message was sent to @middlebury.edu mailboxes today with a subject line of “Update Announcements”.  DO NOT RESPOND ON THIS MESSAGE!

The phishing email message is an attack designed to trick people into disclosing their username and password.  Do NOT follow the instructions in the message, as it could lead to your Middlebury account being compromised.

If you were tricked by the email and responded,  reset your network password immediately at go/password and then call the Helpdesk at x2200 for further assistance with your account and any possible concerns with your computer.

Here’s a sample of the phishing email message:


Dear middlebury.edu User.

Urgent Update Announcements.

Your middlebury.edu Account has been Sign in with a strange IP Address: And this indicate your mail account is been used for FRAUDULENT ACT, For these reasons, Our records indicate you are no longer our current/active user. Therefore, your account has been scheduled for deletion on this Month of APRIL, 2016. As part of this process, your account, files, email address messages etc, will be deleted from our Data Base.

To Retail Your Account.

You are required to reply with your valid ONLINE ACCESS for reactivation, to ensure Your account remains active and subscribed, Otherwise this account will be De-activated within the next 72 hours hence from now.

Name In Full:

User Name:

Pass Word:

@middlebury.edu

Thank You.



 

Mobile “Popup” Helpdesk at Bi-Hall

The Helpdesk is coming to McCardell Bicentennial Hall’s “Great Hall”!  We are offering all the services of the Call Center and Walk-in Helpdesk… on your end of campus.   Come by with your laptop, or ask for a staff member or student consultant to swing by your office in MBH to help with a desktop question.
We’ll be there to help from 10:00 AM – Noon on March 30th, April 6th & 27th, and May 11th.   Stop by and see us!
Watch for more dates and locations as we roll out our Mobile “Popup” Helpdesk.

Extended Team Membership

Academic Technology – Joe Antonioli
Center for Teaching and Learning – Bill Koulopoulos
Central Systems and Networked Services – David Guertin
Digital Learning – Sean Morris
Digital Liberal Arts – Alicia Peaker
HelpDesk – Joe Durante
InfoSec – Paul Dicovitsky
Librarians – Stacy Reardon
Media Services – Mack Pauly
MIIS Digital Learning Commons – Bob Cole, Amy Slay
SR Hardware – Jamie Carroll
SR Software – Zach Schuetz
Web Applications – Adam Franco

Extended Team responsibilities:

  • Contribute expertise.
  • Round-the-table updates.
  • Share back with their group.
  • Attendance by invitation.

Come Secure your Mobile Device

Learn about Mobile Security

Plan ahead for an afternoon RoadShow and Workshop with Middlebury ITS staff on March 30th from 2:00pm to 4:00pm in Davis Family Library 145.

This is an opportunity for you to ask questions and get hands-on help securing your mobile device(s):

  • How do I add a pin to my mobile device
  • Is my device encrypted
  • How do I track my device if lost
  • How do I remote wipe my device
  • How do I ensure my data is backed up

Image 001

ITS Staff will be present to help you secure your mobile device, so bring your iOS, Android, and/or Windows Mobile device(s)!

Follow Information Security on Twitter @MiddInfoSec.

Beware of Fake Order/Fake Invoice Emails with Malicious Attachments

Attackers commonly use the macro functionality found in Microsoft Word and Excel to attack their victims. They attach malicious documents to an email. When opened, the files can lead to a virus infection on your computer.  If you ever get a message with any of these attachments, particularly if you were not expecting it, do NOT open the attachment.

We have received reports for faked order confirmation and fake invoice emails this week that have been well crafted. The faked emails included malicious Microsoft Word documents bearing malware. A couple of examples are included below.

ALWAYS verify unexpected emails with the sender, particularly if they include attachments.

NEVER open attachments that you are not expecting without first verifying they are legitimate with the sender.

If you do open an attachment or file that you suspect is malicious unplug your network cable and contact the helpdesk at x2200 immediately.

fake-invoice-email fake-order-summary-email