On Wednesday, May 4th from 8-11 PM, the Writing Center at Middlebury College will join 75 other colleges and universities who sponsor a Write-In between the weeks of April 24-May 5. Supported by CTLR, the Writing Program and the Library, the Write-In fosters a writing community by creating a calm time and space in LIB 201, LIB 145 and the Harman Reading Room for students to write together. A Peer Writing Tutor and a Research Librarian will be on hand in LIB 201 to provide support. During the Write-In, students may work on academic papers, do personal writing, or brainstorm writing for fellowships, internships, and jobs. We’ll provide snacks and prizes. See Swarthmore’s International Write-In page for more information.
Why come to a Write-In?
Writing can be lonely, solitary work. Joining a group of other student writers can be motivating, productive, and calming.
How will this work?
- Come to Davis Family Library 201 any time between 8-11 PM. Stay from 15 minutes to 3 hours.
- Sign in to receive prizes
- If you want, we’ll give you a pen and a pad.
- Have some tasty snacks (Cheese and Crackers, Chicken Satay, Rice Krispie Treats, Brownies)
- Meet with a Peer Writing Tutor or Research Librarian.
- Stay in Lib 201, or go to one of our two reserved quiet spaces: Lib 145 and the Harman Reading Room.
What kind of writing should I do?
- Academic writing (Start your end of the semester papers this week!) (We’ll provide some research questions.)
- Personal writing (No idea where to start? We’ll provide some writing prompts.)
- Brainstorm writing for fellowships, internships, and job applications (We have a handy worksheet to get you started.)
Who is making this great event happen?
You may not realize it, but you are a phishing target at school, at work, and at home. Phishing attacks are a type of computer attack that use malicious emails to trick targets into giving up sensitive information. Ultimately, you are the most effective way to detect and stop phishing scams. When viewing email messages, texts, or social media posts, use the following techniques to prevent your passwords, personal data, or private information from being stolen by a phishing attack.
- Verify the source. Check the sender’s email address to make sure it’s legitimate. Remember that the name of the sender is not the important part. The sender’s email address is what you are really looking for. If in doubt, forward your message to email@example.com.
- Read the entire message carefully. Phishing messages may include a formal salutation, overly-friendly tone, grammatical errors, urgent requests, or gimmicks that do not match the normal tone of the sender.
- Avoid clicking on erroneous links. Even if you know the sender, be cautious of links and attachments in messages. Don’t click on links that could direct you to a bad website. Hovering your mouse over a link should disclose the actual web address that the link is directing you too, which may be different from what is displayed in the message. Make sure this masked address is a site you want to visit.
- Verify the intent of all attachments with the sender before opening them. Even when you know a sender, you should never open an attachment unless have checked with the sender to verify the attachment was sent intentionally. Word and Excel documents can contain malicious macros which could harm your computer. Other files, such as zip files and PDF files, could download malware onto your system. Always verify the intent of attachments with the sender before you open them from an email.
- Verifying a message is always better than responding to a phish. If you ever receive a message that provides reason to pause, it is always better to forward the message to firstname.lastname@example.org or to send a separate email to the sender to verify its intent, before clicking a link or opening an attachment that could potentially impact the security of your computer..
- Change your passwords if you have fallen for a phish. If you think you have fallen for a phishing attack, change your password at go/password and then contact the helpdesk at x2200. It is also a good practice to change your personal passwords outside of the College.
Watch for phishing scams. Common phishing scams are published at sites such as http://IC3.gov , http://phishing.org ,https://www.irs.gov/uac/Report-Phishing. These resources will also allow you to report phishing attacks if you should fall victim outside of the College. Again, if you think you have fallen victim to a phishing attack, always start by changing your passwords.
Presenters – Jeff Davis and Andy Tumas from Panopto
Project: Video Streaming Service
Student presentations, screen and lecture capture, academic assignment, videos from Communications to promote Middlebury, Athletics events, live streams
Accounts & Access
1) How are accounts created when we have SSO? Are accounts pre-created in bulk, are they created when a user signs in, some other else model?
- We can discuss in more detail, but since Middlebury uses Canvas ( Moodle as well?), if possible, it makes sense to provision access control from Canvas.
2) Can your solution restrict access to content based on Groups in Active Directory or LDAP?
3) How are personal or shared quotas handled?
- Panopto does not enforce a limit on storage so there should be no need to apply quotas.
4) Can we programmatically provision shared-spaces with a quota?
- Panopto does not enforce a limit on storage so there should be no need to apply quotas.
5) Does this application or service PROCESS, STORE, or TRANSMIT any REGULATED DATA?
- No. However, we would have liked to clarified a bit more with a text box. Panopto only stores a user’s first name, last name, e-mail address (Directory Information) and is not considered PII.
- If adopted, Panopto would need to integrate with both Moodle and Canvas for one year.
- Supports CAS, AD, and SAML 2.0
- A brief look at their API documentation suggests that we should be able to provision accounts and course-groups on request via the Course Hub as we do with Canvas, Moodle, SANSSpace, etc.
- Either CAS or SAML 2.0 (ADFS) for SSO authentication in combination with this provisioning via their API.
1) Is it possible to have a hybrid solution where some content is served from your cloud solution but you have a locally hosted content on our campus for other data? How does that change pricing?
- Panopto does not offer a hybrid solution, either hosted or cloud based or we Panopto can be deployed on-premise. However, when we host, there are no storage charges, so hoping this helps with the discussion.
2) What are the maximum file-size/length/quality limits for upload? Can multi-hour videos be ingested?
- There are no size limits, and yes, multi-hour videos can be uploaded.
3) Can individuals have their own space?
- Panopto is managed through a folder structure, and yes, Faculty, Staff, and Students can have their own folders.
4) Is there the concept of quotas? Can we programmatically create shared spaces with specific quota? E.g. Create 12 shared spaces with each having 10GB of quota?
- No concept of quotas since storage is unlimited.
1) Does your solution support closed-captioning files?
- Yes, we provide Closed Captioning as a Service, or Middlebury can partner with one of 3 integrated partners, including: 3Play Media, Automatic Sync Technologies, and Cielo 24.
2) Can it create closed-captioning files?
- When one of the services mentioned above is utilized, Panopto provides the ability to download the caption files that have been generated
3) What other accessibility features does it have?
- Panopto’s student-facing interfaces (viewer, embedded viewer and folders, session list view) Support 508 and WCAG 2.0 accessibility. Panopto provides keyboard navigation and compatibility with NVDA, JAWS, and Voiceover screen readers. 508 compliant captioning also supported.
- Search occurs within a recording and across multiple recordings.
- Search will include captioning and transcriptions of audio, character recognition in video, and notes (See answer to “What kind of metadata does your platform support?” below.
- Text must be present in video for a while to be recognized.
- Captioning uses speech recognition
- Captioning displayed on side of video, working to overly captioning on video playback.
- Captioning in English, only.
- Can ingest captioning files.
- Uses adaptive streaming, will adjust the quality based on connection speed of viewer.
1) Does integration with Moodle & Canvas cost extra?
- No, the cost of Panopto includes support and integrations.
2) Can you describe the integration process for Moodle and Canvas?
- Panopto supports the majority of higher education LMS platforms, including a feature rich integrations with Canvas and Moodle. Both integrations includes SSO, ability to provision access control, controlled publishing to Canvas or Moodle, and rolling course synchronization for enrolled students. Please see links to integration overview videos below:
3) Do you have an API that we can use to pull lists of videos to which a user has access to provide browsing interface from within our web applications (Moodle, WordPress, Drupal, etc)?
- Users may use Moodle or Canvas to access Panopto, or they may access Panopto directly.
- Faculty and students may add Panopto videos/presentations via a button in the WYSIWYG editor.
- Uses embedded iFrame.
1) How does asset management work in your platform?
- Panopto organizes recordings into a Parent/Child Folder structure. Recordings are uploaded to folders. User roles, individual accounts, or groups will have access to these folders and, in turn, access to the recordings within those folders.
2) Can lots of people manage a particular group of videos?
- Yes, there is no limit here.
3) What is the process for a professor to upload a video on your system and embed it in the LMS?
- If created with the Panopto client, the professor would simply choose the Folder that is associated with their LMS course. The Canvas/Moodle integrations will embed the recording in a list view automatically. If created elsewhere and uploaded to Panopto, the professor would simply upload to the associated Folder. Panopto can also provide embed codes for individual recordings.
- Video can be captured from multiple devices: Windows, Mac and mobile devices.
- Video and slides from multiple devices can be captured and synced for playback.
- All streams recorded, viewer may choose which stream they view.
- Titles of slides (powerpoint or Keynote) become a timestamped table of contents that can be clicked to bring viewer to a point in the timeline.
- Slides presented as jpg thumbnails to move to point in timeline.
- Notes can be added to a table of contents
- May be public or private
- Many students can contribute notes to same video
- Student notes can be marked private globally
- Synced videos may be presented as picture-in-picture
- Presentations may be embedded in other web sites.
- A Dropbox folder is available for student assignments, only faculty and student may see content.
- Homepage of Panopto can be curated or display most popular, recently added, etc.
1) Is there a browseable view (a “library”) where users can search across all files available to them?
- Yes, Panopto provides a searchable library portal.
2) How are videos served/streamed? Is HTML5 video markup supported or is a plugin (Flash, Silverlight, etc) required for playback?
- Adaptive playback with HTML5 support. The viewer will default to use Flash if available. If not, it will play in HTML5.
3) How do you support live event streaming?
- Any recording can be live streamed by using the Panopto client for Windows or Mac.
- Url can be set in advance
4) What are your value added services, if any?
- Panopto offers Emerald Support, which includes 365 x 24 x 7 end user support, as well as one(1) day on-site training.
5) What kind of metadata does your platform support?
- Panopto indexes video in a number of ways: Contents (automated contents generated PowerPoint and Keynote slides), Slide text (fully searchable), Notes, Discussion, Captioning, Smart Search (OCR and ASR). Contents although automated, can be edited. The Panopto Editor provides for manual entry of metadata/tags/topics at any time stamp in the video timeline.
6) What options are available for content creation and interactivity?
- During a live webcast viewers can interact through a discussion panel which is similar to a chat window. They can ask questions to the presenter. After a recording is completed, Panopto allows for 3rd party web sites to be embedded in its Viewer as a secondary source. This allows you to use your existing polling/quizzing tools within Panopto.
7) Unicode support?
- Does not support right-to-left text.
- Exit strategy – all content is obtainable (video, presentations, captioning, notes, etc.) Presentation+video playback experience cannot be captured unless saved as an .mp4 (separately or picture-in-picture).
- Still some questions on editing, usability, scalability, collection management.
- More project documentation available in the Streaming Video Project folder – https://drive.google.com/a/middlebury.edu/folderview?id=0B_yW_eeeL6uTN3ZTV01DWEN6YXc&usp=sharing
We will be starting the new ACTT process with a Kick-Off meeting. This is an open, non-mandatory meeting for anyone who is interested in learning about the Academic Cyberinfrastructure Transformation Team to attend. We will introduce the new team members, structure, and thoughts on how the Team activities will be evaluated.
This is an open meeting, please share with anyone who is interested in learning about the ACTT
- Mission: “Our mission is to evaluate and recommend technology services and innovations for teach, learning and research.”
- Read “Horizon Report from NMC”, http://www.nmc.org/nmc-horizon/
- Joe is teaching a course on “Design Thinking” this semester. Design Thinking includes an “Empathy Phase”
- Q (Melissa/CNS). How will information and requests trickle up?
- “I have many day-to-day projects where I would love to have a license that exists on the Midd campus, but not the MIIS campus, or I would like to build a server with 1TB of storage to host a web site”
- “My research center, CNS, is becoming such a large consumer of storage and bandwidth”
- “On a request from Laurie Patton, I am researching a cloud services that could host our information”.
- Answer – Joe – Anyone who wants to make a request for technology or technology services for academic use may approach the team. Happy to be an entry point for requests that may go to ITS or other groups.
- Jim – we have to account for the resource requests during the budget request process.
- Q (Melissa/CNS). We are a collection of researchers that become PI on large grants, we need to inform others of the implications on the projects that we are running… So we can write it into
- We are giving money to non-Middlebury developers to do things that could be done inside Middlebury
- Jim: not necessarily opposed to using outside resources…
- Q (Jim): May be Amy McGill can weigh in on the MIIS budget process and how funding decisions are made.
- Amy McGill
- MIIS Research Centers are funded with base productivity requirements
- Campus community infrastructure is for day-to-day use
- Research Centers seek their own funding for larger projects that need additional resources, they do typically provide for initial as well as on-going maintenance costs.
- Amy McGill
- Q. ACTT contribution to the Strategic Planning Process?
- Q (Melissa/CNS). Is it too early to start making suggestions for agenda items?
- Q (Melissa/CNS). I would love to explore the ability to share licenses across campuses. We pay out of grant licenses for Tableau, for image processing software… I drool over some of the licenses that the Geology department has. This is not a simple request, but I would love to tackle it as a subject.
- A (Zach/ITS-SR): Let’s talk; more productive if we can get an idea of the specific titles you’re interested in, so we can check what licensing models are available.
- Q (Melissa/CNS). I would love to talk about our data storage and access to bandwidth. Because we use satellite images, large data sets, we are becoming something of a hog on the MIIS systems. I would like to open a discussion on how we can meet CNS’s research technology needs including storage, bandwidth, and some security issues.
- Joe: Has anyone done a “needs assessment for the department”?
- We don’t have a department, we are a research center within a larger campus.
- I have done a casual needs assessment. 13 TB of storage, external drives, google drives, drop boxes… Need access across three offices.
- Jim: ITS can help with a needs assessment and identify appropriate technology solutions, perhaps on campus or in the cloud, ideally consistent with other larger IT initiatives for Middlebury and work with CSN to identify, implement solutions. We did this for the Middlebury DC office a couple of years ago that included the CSN operation there for example.
- Joe: Has anyone done a “needs assessment for the department”?
- Q (Bob/MIIS). Working toward equitable cyber infrastructure across VT and Monterey campuses seems like a an appropriate activity for the Team.
Joe to build form for collecting evaluation requests.
Tuesday, April 12th from 3-4pm
LIB 105A or Polycom 712833
The new ACT Team process includes in-progress project presentations. These presentations are meant to inform the community about how things are going, what has been done and what still needs to be done, what is going well and what are the challenges.
In this meeting we will have two presentations:
- RStudio Server http://act.middcreate.net/site/projects/rstudio-server/
- Academic Cyberinfrastructure Inventory http://act.middcreate.net/site/projects/academic-cyberinfrastructure-inventory/
In-progress project presentations are open meetings, anyone may attend. Please feel free to share the invitation with anyone you feel is interested in the topics discussed.
ITS has been working on options for our customers to install licensed software on their college-owned computers using convenient, “self-service” methods that provide control over when the installations take place. (We are not licensed to provide software on personally owned computers, only college owned.) To learn how this works on college Windows computers, please visit KACE Self-Service information. If you have a college Mac, visit Mac Self Service information for details.
Initially, we have made a few of our most commonly-requested Adobe products available through self-service for both Mac and Windows platforms, as well as the new Microsoft Office 2016. We will be working to add software titles in the next few months. Please note that not all software is purchased with licensing to be available for every computer on campus.
Self-service installations work best when you are here on campus using a wired (Ethernet) connection to our network. Use of VPN or wireless connections may work but they will be much slower and are more likely to experience issues.
We are excited to offer this new service and want to hear about how it worked for you. Feel free to share your feedback, questions, or concerns with our Technology Helpdesk.