- There is a proposal to pilot Panopto for one year with existing funds. This will not be a comparison pilot. We have looked at Panopto (demos 1 and 2), Arc, and Ensemble. Arc is still in beta and not viable to use in pilot. Based on our research, it seems like we can do the most with Panopto (content capture, lecture capture, streaming). Feedback from other schools: faculty are using it themselves with little help. We have determined through research that Panopto is best of breed and affordable. The ACTT team supports the video streaming recommendation.
- Panopto would be available for one year. The recommendation on continuing will need to be made after the first semester. If we recommend Panopto, we should also recommend a term for continuing (e.g., 3 years).
- Is this a pilot or a staged rollout? Using the term pilot might be most appropriate, helps educate users on the process we use to evaluate systems, and gives us flexibility if we decide not to adopt it. It also clarifies the support expectations and how new to all of us this service is. Pilots are often considered to be part of staged rollouts. A pilot was planned as part of the MediaCore rollout. Team tentatively agreed to consider this an open pilot in the Fall with a more widespread rollout in the Spring, pending the decision at the end of the pilot.
- MiddMedia will be available through the pilot.
- The focus of the pilot will be academics and instruction. We are also interested in testing out its streaming capacity for events.
- Parameters of the pilot will be determined later. Will it be limited to specific classes or openly available? Should we limit it to instructional needs or to other use cases? Who should we reach out to specifically? We might set up workshops or intro videos to introduce the product. What model should we adopt as far as the contract is concerned? Enterprise (more expensive) or limited license (more management and limited use). Team felt it should be made available to the entire community.
- Should it be hooked into Course Hub during the pilot? (Anticipation of one and half months of calendar time / 1-2 weeks of work to integrate, similar to Canvas.) May be better to integrate to avoid messy cleanup with accounts if Panopto is adopted. Classes begin at Monterey during the 3rd week of August. June: begin integrating with Course Hub. Could Panopto set up a test account for Web Technology to tinker with?
- How to create shared libraries? Automatic provisioning or by request only? Who has permissions? Suggestion to have a request form to make sure the appropriate conversations happen in each case.
- We’ll need to determine an exit strategy if we don’t adopt Panopto.
- We’ll need to come up with criteria for evaluation. Asset management capability will need to be assessed during the pilot. What are our needs in this area? How will we organize our directories and assign permissions? How will we assess this?
- End of June: establish contract with Panopto.
Feedback from other colleges
Skidmore, Hamilton College, Holy Cross, Lake Forrest, and Gettysburg.
Skidmore and Hamilton are using Panopto and Ensemble for different purposes. Panopto for lecture capturing and Ensemble for video asset management. Both are happy with both products and say they are easy to use.
Holy Cross has been using Panopto for the last 2 years and they are happy with it.
Gettysburg College has been using Ensemble since the summer of 2014. It is used primarily to store videos for their library reserves (75%) and the rest for faculty created content (mostly flipped classrooms). For the most part happy with it.
Lake Forest College has had Panopto for 2 years and are pretty happy with the decision. Several faculty have done a lot of screen-casting, and they were able to get started with minimal hand-holding.
To help raise awareness about community efforts to prevent significant security issues, Middlebury Information Security has launched a ‘Security Scout of the Month’ award.
Highlighting the valuable contributions of community security scouts in an @MiddInfoSec blog post and on Middlebury’s Information Security web site is a great way to show how a cautious and thoughtful approach to computing can protect the College community from cyber risks.
As an example, this past month, an attack against Middlebury’s Banner system was avoided thanks to the contributions of an astute member of our community, Justin Allen, who spotted a targeted phishing attack and raised the awareness around this malicious event.
As Justin Allen describes it:
“I received an email that started out dear account owner which usually gets my attention and as I read down thru the email I noticed that it said I had signed up for a paperless W-2 which I did not and it wanted me to logon to view it. After that I noticed a couple of another things that did not make sense for my Middlebury account one was the sender of the email which wasn’t from the college at all and we all have been told time and time again if the address doesn’t end with middlebury.edu it’s not from the college. Below is a copy of what was sent to me.”
This astute awareness is why Justin is this month’s ‘Security Scout of the Month’.
We are excited to celebrate the hard work and security conscious efforts of our community. Please watch for the next ‘Security Scout of the Month’ and help us recognize these efforts.
If you would like to recognize an individual for their information security contributions or would like to raise an information security concern, please contact firstname.lastname@example.org.
In January, 2016, the ACTT (formerly CTT) submitted a recommendation for Middlebury to adopt Canvas. We have received budget approval, and will begin the work of moving Middlebury into the Canvas service.
Thank you to all of the faculty and students that participated in the pilot. Your participation and feedback (Midd and MIIS) helped to make a strong recommendation. And thank you to Joe Antonioli, Bob Cole, Bill Koulopoulos, Stacy Reardon, Shel Sax and Heather Stafford for supporting these classes during the pilot.
Also, thank you to all of the schools that provided us with insight and the benefit of their experience with Canvas. We learned a lot from you.
There is a lot of work still to be done to move Canvas from pilot to enterprise, but we do hope that you take a moment to celebrate this milestone and the collective effort to get to this point.
[This meeting was rescheduled from May 17th to May 31st.]
Tuesday, May 31st from 3-4pm
LIB 105A or Polycom 712833
The new ACT Team process includes in-progress project presentations. These presentations are meant to inform the community about how things are going, what has been done and what still needs to be done, what is going well and what are the challenges.
In this meeting we will look at the GoogleApps for Edu and OneDrive projects.
In-progress project presentations are open meetings, anyone may attend. Please feel free to share the invitation with anyone you feel is interested in the topics discussed.
No decision yet on Canvas. LS pilot is up and going with user/group provisioning via the Course Hub.
Basic Canvas overviews will need to be added to Language School orientations.
Discussion of location for Midd-created documentation about Canvas should live. http://digitallearning.middcreate.net/ ? Library and ITS wiki?
Joe has been trying out Palladio and Google Fusion Tables for visualizing the data. Mixed results, no tools totally satisfactory yet. Bob will put Joe in touch with META Lab who may have some suggestions around visualization.
What questions come to mind looking at the inventory data?
- How many tools are in the life-cycle stage bucket compared to the total number of tools? Is this sustainable?
- What criteria would trigger an evaluation? Can this be a score?
- Agreement renewals
- Changes in the environment
- New pedagogies and practices
- New programs
The next large goal is to make 1/3/5 projections for items in the inventory so that the administration & community at large has some idea of where we see this inventory shifting.
Assignment for the next meeting: Look at the Classification 2D Array and pick an intersection. Come up with a set of questions that will help us make projections for 1, 3, 5 years out.
With an increasing amount of storage space and institutional connectivity on personal devices, the value and mobility of smartphones, tablets, and laptops make them appealing and easy targets. These simple tips will help you protect against and prepare for the potential loss or theft of a laptop or mobile device.
- Don’t leave your device alone, even for a minute. If you’re not using it, lock your device in a cabinet or drawer, use a security cable, or take it with you. Middlebury has seen laptops stolen in the College library and from individual’s cars. Don’t assume your devices are safe because you feel at home with your surroundings.
- Report any lost or stolen device promptly. Both institutional and personal devices may contain Middlebury data. Even if you only lose a personal device, work with the College’s Information Security workgroup to ensure that institutional or sensitive data is accounted for. Information Security may also be able to help you recover the device. If a device is lost or stolen contact the helpdesk at x2200 immediately.
- Do not store extremely sensitive or internal data. Never store protected or sensitive data on your laptop. Refer to the Data Classification policy for clear definitions of data types. (http://go.middlebury.edu/dcp)
- Keep your master and working copy of all data on network storage. Keeping your master and working copies of all of your data on Middlebury Google Drive or other secure network file storage such as Middfiles. This ensures that your data is protected and backed-up if your laptop is stolen or lost. Photos, papers, research, and other files are irreplaceable, and losing them may be worse than losing your device.
- Record the serial number. Keep the serial number and asset tag of your device and store it in a safe place. This information can be useful for verifying your device if it’s found. This is especially important when you travel. Airport and police agencies may ask for this information when reporting lost or stolen devices.
- Enable device tracking and wiping services. Use tracking and recovery software included with most devices (e.g., the “Find iDevice” feature in iOS) Some software includes remote-wipe capabilities. This feature allows you to log on to an online account and delete all of the information on your laptop. Mobile resources can be found here:
- Apple iCloud: http://www.icloud.com
- Microsoft Account: http://account.Microsoft.com/devices
- Android Device Manager: https://support.google.com/accounts/topic/6160499?hl=e
From our Moodle host:
In order to ensure complete patching of OpenSSL the following site will be placed in maintenance mode, then rebooted during the listed maintenance window.
These patches have already been applied to the front end SSL for your site, but the reboot is a requirement for all services to run the fully patched OpenSSL version.
Hosted Site: http://moodle.middlebury.edu
Window: 1:00 AM to 5:00 AM EDT, May 20th, 2016
Please note the time zone specified above.