10 ways Microsoft tools can help you build a classroom that works for every student |

In today’s classroom, diversity is the new normal. Teachers don their superhero capes every day, going to extraordinary lengths to reach every one of their students, from creating inclusive curriculum in core subjects like reading, writing, and math, to enabling every student to have a voice. We’re honoring their work, and highlighting some tools to help, in this month’s episode of What’s New in EDU.

At Microsoft Education, we work to support teachers in their mission to create an inclusive classroom for all students.  Here are 10 ways our tools support learning across unique needs and abilities.

  1. Understand word meanings more easily and improve vocabulary

Seeing a word and attaching meaning to it involves a number of cognitive processes. We’re trying to support students learning to make those connections with Picture Dictionary and Read Aloud in Immersive Reader. Select a word and Picture Dictionary will show you a descriptive image, even providing multiple images for words with more than one meaning. Read Aloud connects the text to students with visual impairments and helps with pronunciation practice. Providing visual and audio inputs gives all students, and especially students with dyslexia, the multi-sensory experiences they need to ingrain that word into their vocabulary.

Try this: Next time you give a vocabulary quiz, try providing the list of vocabulary words in OneNote. Show students that they can click Immersive Reader, then click the vocabulary word to see a picture of what the word means and have it read aloud.

  1. Make it easier to focus on reading

With the media multitudes that surround students, it’s not always easy to prevent distractions online and across devices. Immersive Reader’s flexible text sizing, line focus, and background color options make any document, notebook or web page focus friendly. This is particularly helpful for students with ADD and ADHD as well as for students with dyslexia.

Try this: Next time you assign reading to be done from a device, show students how to select Immersive Reader in OneNote, make the font bigger, and select line focus mode. Learn more about Learning Tools like Immersive Reader!

  1. Improve pronunciation of longer words

We know a time-tested tactic is breaking up words into syllables and sounding them out. Now, students have a tool that will do so automatically, helping them to nail the pronunciation. Students can even check their pronunciation by selecting Read Aloud and seeing how close they were. This is particularly helpful for students with dyslexia who often have trouble matching letters to sounds.

Try this: Next time you assign reading to be done at home, instruct students to break the words into syllables in Immersive Reader or, if they can’t remember how to pronounce them, to use Read Aloud.  

  1. Understand grammar and sentence structure more quickly

Understanding parts of speech is critical for developing reading fluency. Immersive Reader can help by labeling or highlighting nouns, verbs, adjectives, and adverbs. This supports all students, especially those with dyslexia, as they develop their ability to find patterns in words.

Try this: Next time you assign grammar practice, let students know they can check their work by selecting the Parts of Speech toggles in Immersive Reader.

  1. Empower students to improve the quality of their writing

When you spend a long time writing, you want to make sure the final work is polished. Read Aloud in Immersive Reader allows you to have the document you’ve written read out loud, so you can more easily catch mistakes. Editor in Word helps students identify misspellings, provides synonyms for those misspelled words, and offers the option to have the suggested spelling correction and synonyms read aloud. This all helps students with dysgraphia who have a hard time reviewing their own written work.

Try this: During the editing and revising process, encourage students to use Read Aloud to listen to their work read back to them. This will help them identify revisions and improve their writing!

  1. Make it easier to start writing, and kick writer’s block

We’ve all stared down an empty page in fear wondering how we’re going to fill it with beautiful writing. With Dictate, in OneNote and Word, students can have their speech turned to on-screen text. This is especially helpful for students with dysgraphia who struggle with writing.

Try this: When students are having trouble getting started, encourage them to turn on Dictate, then brainstorm out loud. Just getting some ideas and words on the page will build momentum and help them conquer the blank page! Check out more ideas for utilizing Dictate in the classroom!

  1. Break down the language barrier

Students can use all the same tools above when they learn their first language—and then when they learn a second language! With document and word translation in Immersive Reader, you could start with a text in Spanish and translate either individual words or the entire document into English. This is helpful for students with dyslexia, who are learning new languages, and ESL learners, who can match the words they know in their first language with their second language more easily than ever before using sounds, pictures and text.

Try this: When you assign passages for reading, put a copy in OneNote and show students they can translate either by word or document in Immersive Reader.

  1. Help students read, understand steps, and show their work in math

Math is all about showing your thought process and the steps you took to get to the answer. Math Solver shows students the steps to solve a math problem, giving a clear model for how to show your work. The Immersive Reader can also read the math equation notation, as well as the step-by-step instructions in Math Solver, aloud for students. This helps students with dyscalculia break down math problems and learn what to do with similar problems next time.

Try this: If a student is having trouble with a particular type of problem, encourage them to use the Math Solver to insert the steps into their OneNote page. They can reference the steps as they work on similar problems, helping them follow the same solution process but applying it to new equations.

  1. Present to students, parents, and your colleagues inclusively

When you give a presentation to students, parents, or other teachers (or when teaching students to present), make sure to turn on live captions and subtitles in PowerPoint. Live captions help students with hearing impairments, or those who speak other languages outside the classroom, to follow along with the presentation.

Meeting remotely? Connect with parents or colleagues online in a Teams meeting, and turn on live captions to make sure no one misses a moment, whether it’s a global PLC meeting or an online parent conference.

Try this: Use PowerPoint live captions and subtitles during your next parent-teacher conference. Those rooms get packed, and parents will appreciate being able to see captions. They can even download the Microsoft Translator app and translate it into the language they use most often.

  1. Build student empathy with Minecraft: Education Edition

Minecraft: Education Edition offers several features that support inclusive learning, from classroom multiplayer for better collaboration, to customizable game settings including a text-to-speech user interface. As New York City special educator and STEM coach Sean Arnold writes in this EdSurge article, “chat features are enabled with speech-to-text functionality, which lets struggling readers and writers participate with the community at their own pace.” Minecraft: Education Edition gives students with physical and intellectual disabilities the opportunity to be creative, explore without fear of failure, and feel a sense of autonomy in the classroom. Arnold explains, “my students were no longer confined to wheelchairs or leg braces; they could walk, create and even fly. It’s a world where they are free from ridicule, free from their real-world struggles and free to create a world that they desire.”

We know that better student outcomes, teacher time, school budgets, and IT staff workloads are top of mind for every school district and school leader. That’s why we partnered with Forrester Consulting to do a total economic impact analysis around Microsoft assistive technologies for education. Informed by interviews across four Microsoft 365 (M365) districts using our accessibility tools, the findings pointed to three key benefits: improved student learning, reduced cost and effort, and saved time and increased effectiveness.

This report is available to download and share in your district. We also have a deeper dive into the data available on our Tech Community blog. With the tools built into the M365 accessible platform, you can help improve learning outcomes for every student while also saving real dollars in your school budget.

Eager to explore Microsoft accessibility tools in your own classroom? Get started with Office 365 Education for free!

And don’t miss next Tuesday’s #MSFTEduChat TweetMeet, where we’ll be discussing inclusive classrooms and accessibility with a global community of educators.

Go to Original Article
Author: Microsoft News Center

ZombieLoad: More side channel attacks put Intel chips at risk

Security researchers from around the world this week revealed a new set of side channel vulnerabilities that could let malicious hackers steal sensitive information directly from Intel microprocessors.

Researchers also developed four different proof-of-concept attacks for these vulnerabilities — ZombieLoad, Fallout, Rogue In-Flight Data Load and Store-to-Leak Forwarding — that utilize security flaws in how Intel chips perform speculative execution, a feature that helps boost a chip’s performance. The new vulnerabilities and PoC attacks, which affect almost every Intel computer chip since 2011, are similar to the Meltdown and Spectre flaws that were first revealed in early 2018.

Intel is calling the new set of attacks Microarchitectural Data Sampling (MDS).

“Basically, it is exploiting information leakages at the microarchitectural level, to sample data that belong to other processes that you do not normally have privilege access to,” said Berk Sunar, professor of electrical and computer engineering at Worcester Polytechnic Institute (WPI) and a member of the Fallout research team.

The data sampling comes from the fact that the processor has different components and these components are all shared by the users, said Daniel Moghimi, a Ph.D. candidate in the computer science department at WPI. Moghimi is also a member of the ZombieLoad and Fallout research teams.

“The way it is exploited is that, you as an attacker leak data one byte at a time from different components and then you encode them and you sample them to some sort of information that you can coherently understand, like passwords, URLs and cryptographic keys,” Moghimi said.

Of the four PoC attacks, ZombieLoad is considered the most serious by the researchers. If exploited, the side-channel attack would allow a threat actor to break through layers of isolation, such as virtual machines, to read essentially another user’s data from another guest operating systems’ space or from the administrator’s privilege memory space, Sunar said.

It’s pretty devastating in that sense that you can go through boundaries and recover passwords and lots of other sensitive information.
Berk Sunar Professor of electrical and computer engineering, Worcester Polytechnic Institute

“It’s pretty devastating in that sense that you can go through boundaries and recover passwords and lots of other sensitive information,” Sunar said. “Think about a webpage loading into your browser. … The browser enforces strong isolation so that the script running in your browser does not break through boundaries to recover any secret that belongs to you. For example, it doesn’t know what the other tab contains, or what’s running locally on your machine. With this kind of an attack you can actually break through all of those kinds of isolations.”

Werner Haas, CTO of Cyberus Technology and one of the co-discoverers of Meltdown, said there is no simple answer as to how severe the ZombieLoad flaw is because it depends on the exploitation scenario.

“For standard PC users I would not be overly worried because the well-known exploit strategies are unfortunately highly effective still,” Haas said in an email interview. “Why break the door lock if the window is left ajar? If I was using cloud services, however, I would be worried about co-hosted, unknown virtual machines on ‘my’ physical CPU.”

Attackers can easily sample data from other protection domains, such as virtual machines, Haas said, making it a real threat.

“Note, however, that an attacker needs to execute code on the same physical CPU core as the victim process, i.e., I would not be overly worried about my (hopefully) heavily shielded industrial automation control system, either,” he said via email.

What enterprises can do

According to Sunar, these are fundamental vulnerabilities at the core of the CPU architecture that will take time to resolve and will require modifications at the lowest layers of the architecture.

While Intel has released microcode updates to patch vulnerable processors, tech giants like Apple, Google, Amazon, Microsoft and Mozilla have all released patches to address the flaws.

Gartner analyst Alan Priestley advised enterprises to keep systems up to date and conduct a risk assessment to understand their exposure to flaws like ZombieLoad.

“Look at what opportunity there is for untrusted code to run on your infrastructure and then take appropriate actions based on that,” Priestley said. “If you are an enterprise organization with an on-premise data center, the chances are you don’t let untrusted code run inside your data center. If you’re a cloud service provider, every piece of code that runs inside the data centers is untrusted because you’re selling your access to your infrastructure to third parties.”

He also advised enterprises to work with their hardware suppliers and OEMs to get the updated firmware from them that include the new microcode updates.  

“Wherever possible you should look to retiring older generation of the servers — which are most vulnerable … and look at the latest generation technologies because performance impact is minimal and in many cases those generation processors have already got hardware mitigation built into them,” Priestley said.

Shared resources always carry the risk of a protection domain break down — independent from ZombieLoads — so sensitive information should be properly isolated, Haas advised. In particular, unvetted, external input should never be used in high-security domains, he added.

“If you are paranoid, disable symmetric multiprocessing = Hyper-Threading on your Intel CPUs as this makes it significantly harder to leak data,” he said. “Otherwise, please apply the microcode updates provided by Intel and any software patches required to mitigate the issues.”

But those actions can be omitted if a careful risk assessment shows that other security mechanisms prevent untrusted code execution on the system in question, Haas added.

Sunar advised companies against sharing execution spaces or hardware.

“For example, for the cloud environment if you have a highly sensitive platform, maybe you are processing credit cards, or it’s a server hosting a commercial webpage, any of those situations where you have a high value target, you want to make sure that the hardware is isolated, it is only used for you,” Sunar said. “Cloud instances that are not shared, dedicated to your operating system allocated to a single guest only, that’s the strongest way to protect against this kind of an attack.”

Short-term remedies include making sure that companies have the latest OS and microcode patch of the CPU to apply some of the patches that the vendor has produced for these attacks, Moghimi said.

“Also by now the microarchitectural security community is pretty confident that Hyper-Threading is really dangerous,” Moghimi said. “Even if somebody’s on the cloud they still want to have some sort of sharing the hardware — they should at least disable Hyper-Threading and not share the same CPU core with multiple users. That could at least reduce the damage.”

Go to Original Article

Introducing the first Microsoft Edge preview builds for macOS – Microsoft Edge Blog

Last month, we announced the first preview builds of the next version of Microsoft Edge for Windows 10. Today, we are pleased to announce the availability of the Microsoft Edge Canary channel for macOS. You can now install preview builds from the Microsoft Edge Insider site for your macOS or Windows 10 PC, with more Windows version support coming soon.
Building a “Mac-like” user experience for Microsoft Edge
Microsoft Edge for macOS will offer the same new browsing experience that we’re previewing on Windows, with user experience optimizations to make it feel at home on a Mac. We are tailoring the overall look and feel to match what macOS users expect from apps on this platform.

We are committed to building a world class browser with Microsoft Edge through differentiated user experience features and connected services. With this initial release, we have made several changes to the user interface to align with the Microsoft design language whilst making it feel natural on macOS.
Examples of this include a number of tweaks to match macOS conventions for fonts, menus, keyboard shortcuts, title casing, and other areas. You will continue to see the look and feel of the browser evolve in future releases as we continue to experiment, iterate and listen to customer feedback.  We encourage you to share your feedback with us using the “Send feedback” smiley.

Additionally, we are designing user experiences that are exclusive to macOS, by leveraging specific hardware features available on Mac. For example, providing useful and contextual actions through the Touch Bar like website shortcuts, tab switching and video controls, as well as enabling familiar navigation with trackpad gestures.
Introducing the Microsoft Edge Insider Channels for macOS
The new Microsoft Edge preview builds for macOS are available through preview channels that we call “Microsoft Edge Insider Channels.” We are starting by launching the Microsoft Edge Insider Canary Channel, which you can download and try at the Microsoft Edge Insider site. This channel is available starting today on macOS 10.12 and above. The Dev Channel will be released very soon, and once available, you’ll be able to download and install it side-by-side with the Canary Channel. You can learn more about our approach and what to expect from the different channels in our blog post from last month.

A consistent platform and tools for web developers
With our new Chromium foundation, you can expect a consistent rendering experience across the Windows and macOS versions of Microsoft Edge, as well as the same powerful developer tools you’ll find on Windows.
For the first time, web developers can now test sites and web apps in Microsoft Edge on macOS and be confident that those experiences will work the same in the next version of Microsoft Edge across all platforms. (Note that platform-specific capabilities, like PlayReady content decryption on Windows 10, should continue to be feature detected for the best experience on those platforms.)
As with our Windows preview builds, our new macOS version also includes support for installable, standards-based Progressive Web Apps which you can inspect and debug using the browser developer tools. We’re working to make PWAs feel at home alongside your native apps, so when installed they will appear in your Dock, app switcher, and Spotlight just like a native app.
Sharing your feedback
We’re delighted to share our first Microsoft Edge Canary build for macOS with you!  Getting your feedback is an important step in helping us make a better browser – we consider it essential to create the best possible browsing experience on macOS. We hope you’ll try the preview today, and we look forward to your feedback and participation in the Microsoft Edge Insider community.
If you encounter any issues, and to give feedback or share suggestions with the team, head over to the Microsoft Edge Insider community forums, get in touch with us on Twitter, or just use the “Send feedback” option in the Microsoft Edge menu to let us know what you think.
For web developers, if you encounter an issue that reproduces in Chromium, it’s best to file a Chromium bug. For problems in the existing version of Microsoft Edge, please continue to use the EdgeHTML Issue Tracker.
We look forward to hearing from you!
– The Microsoft Edge Team
Updated May 20, 2019 8:07 pm

For Sale – M-ITX Desktop Computer – Intel Atom – 2GB DDR3 Ram – 500GB Hard Drive – Slim DVD – Windows 7 Pro

I have a Mini-ITX build for sale.

The motherboard and case are new, never used before, the ram was taken from another machine, the hard drive has been used before but is in full working order.

Running Windows 7 Professional already activated with a key.

Mini-ITX case
Jetway Mini-ITX NC9KDL-2550 Motherboard
2GB DDR3 Ram
Seagate 500GB Hard Drive
Intel Atom 1.86Ghz CPU
Slim DVD Re-writer drive
PS/2 Mouse
PS/2 Keyboard
USB 2.0
2 X Ethernet

Power cable included.

Price and currency: 40
Delivery: Delivery cost is included within my country
Payment method: paypal or bt
Location: leeds
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I have no preference

This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Go to Original Article

Fluid Framework opens the door to new Microsoft capabilities

Microsoft Fluid Framework promises to enhance productivity and collaboration on the web by enabling three new capabilities: multiperson co-authoring of web and document content; componentized or compound documents and intelligent agents to provide automation; and services such as text translation, editing suggestions and compliance checks.

This is both an approach and an SDK. Microsoft plans to integrate Fluid Framework into Office 365 experiences such as Word, Teams and Outlook to transform the capability of the applications and make the technology available to third-party developers.

Of the new capabilities, the most powerful is potentially the compound document or canvas that contains content and would traditionally exist across separate Microsoft document formats. In Microsoft’s traditional computing model, a document is managed by its appropriate application: Word manages text documents, PowerPoint manages presentation documents, Excel manages spreadsheet documents, Outlook manages email documents and so on. These applications interoperate to some extent through copy-paste or object embedding.

Compound documents enable snippets of content to be easily changed from within different applications. For example, two users would be able to make edits to a Word document simultaneously in real time — one from part of the document in a chat window and the other within the originating Word document.

Another example of Fluid Framework technology is simultaneous dynamic translation to multiple languages. A use case for this might include global collaboration on a corporate HR manual, developed in multiple languages. The local country team would see the manual in their own language translated in real time from contributions made in other languages and other locations during the co-authoring process.

Fluid Framework could also potentially eliminate the need for multiple document types — such as Excel, Word and PowerPoint — and open the door to a single canvas or document format. For example, if you have a PowerPoint document to open but don’t have the program on your computer, you would potentially be able to open it in Word instead.

Provided other collaboration tool vendors adopt Fluid Framework, it will be an exciting future for cross-vendor tools, content authoring and collaboration. Microsoft is ahead of vendors in that it has many content creation applications in its offerings, owns the desktop in many businesses with its Office application products and has good adoption of Office 365.

Benefits for users of other vendor applications, if they adopt the Fluid Framework, are clear: plug-and-play of content development across partners, customers and suppliers regardless of applications used by those parties. The benefits for the vendors of other collaboration tool vendors are less clear, and it might be a competitive threat to offer users a migration path to Microsoft Office tools.

Go to Original Article

Explore Office 365 phishing protection updates

Most administrators who have the unenviable task of preventing intrusions and data breaches know full well that traditional antispam or antivirus tools are just not adequate.

Bad actors are always on the prowl, continuously launching new, more sophisticated attacks to steal user credentials or deceive users to get money wired to a criminal’s account. But as these phishing attacks increase in frequency, organizations on Microsoft’s Office 365 platform see the company take serious steps to keep its subscribers more secure. On the flip side, the new technologies are advanced and sophisticated, which require administrators to understand how to use them and learn the proper implementation of them to avoid misconfigurations.

Based on one statistic released during the 2018 Ignite conference, Microsoft said the email security features on Office 365 blocked more than 5 billion phishing emails that year. That number should motivate Exchange administrators to implement email protection systems at their disposal to ward off ever-changing threats. Microsoft, Barracuda, Proofpoint and other vendors have developed sophisticated Office 365 phishing protection offerings, but there is no bulletproof measure to prevent an intrusion. IT workers need to stay up to date on the types of dangers and the types of tools that can stop them.

Bespoke threats show the depths cybercriminals will take to get funds

The goal of a cybercriminal is to deliver a payload via email that leads to a data breach, money transfer or ransomware situation. The attacks have grown increasingly sophisticated. Bad actors will often perform reconnaissance to determine what technologies and applications exist in their target and then build a customized email designed to deceive the end user.

The goal of a cybercriminal is to deliver a payload via email that leads to a data breach, money transfer or ransomware situation.

In one security incident I encountered, a new hire from a small company received an email requesting them to purchase $1,000 worth of Google Play gift cards for use at an upcoming event. The email appeared to come from the employee’s manager and did not arouse any suspicion. The phishing attempt failed when the employee called the manager for confirmation and discovered it was a scam.

This example highlights how difficult it is to detect and protect from advanced phishing techniques. But before IT starts shopping for a suite of security products in the marketplace, admins already on either Exchange Online or the full Office 365 platform should examine the latest integrated services from Microsoft.

Microsoft pours more resources into Advanced Threat Protection

The new set of protections available as part of Office 365 Advanced Threat Protection and its enhanced antiphishing defense include the following:

  • Protections against spoofing and impersonations: Administrators get the ability to detect and block spoofing and impersonation attempts of their domains and users. The system attempts to reduce some of the commonly used phishing attempts that mimic an email sent from an executive or employee to another individual in the organization with instructions to open an attachment, visit a website or transfer funds.
  • Content detonation and protection: Early iterations of this feature scanned content prior to the email going into an end user’s inbox to block content that can cause harm to the user and the organization’s systems. Microsoft added new features that detect text lures that encourage users to click on a link that could lead them to malicious content.
  • Content evaluation across multiple platforms: Cybercriminals, not content to limit themselves to email-based attacks, have branched out to OneDrive and SharePoint. A common method is to introduce malicious files shared through those platforms with hijacked credentials. Once there, users will assume the content is safe since it is an internal resource that’s part of their intranet. To help protect against that, Microsoft offers file detonation in OneDrive and SharePoint.
  • Phishing vulnerability assessment: Thanks to the popularity of products like KnowBe4 that send test phishing emails and track which users took the bait, Microsoft developed its own version of an attack simulator for Office 365. The administrators can launch similar phishing attempts to identify which users will require training to spot these dangerous emails and how to avoid them. This feature is a must-have for any administrator to help increase end-user awareness.

Despite some of the advanced capabilities that are available with the Office 365 suite and some of its security add-ons, administrators need to take adequate steps to understand what the implications are when it comes to setting up filters and policies that could inadvertently block sensitive content that is meant to be shared internally, such as medical records, Social Security numbers or banking details.

Go to Original Article

Noise-cancelling headphones, smart glasses: how technology is making museums more accessible | Microsoft On The Issues

Museums are places for people to immerse themselves in culture, as well as learn, create, share and interact.

Being accessible — designed for everyone — is one way museums can maximize that role, and a growing number are working hard to do just that to serve the more than  one billion people worldwide experience some form of disability.

Here is how technology is helping museums get closer to the communities they serve.

Noise-cancelling headphones

We don’t all experience the world in the same way — everyone is different. People with autism, for example, may find certain situations cause a sensory overload.

New York’s Intrepid Sea, Air & Space Museum offers noise-cancelling headphones for people who might have auditory over-stimulation. This museum also helps parents of children with sensory processing disabilities plan their visits by emailing them images and illustrations in advance.

Museums in Chicago (including the Shedd Aquarium, the Field Museum and the Chicago Children’s Museum) also help visitors plan their trips through an app that highlights exhibitions that are sensory friendly.

[Subscribe to Microsoft On The Issues for more on the topics that matter most.]

Audio descriptions

Statue and El Prado Museum

Tactile displays and audio descriptions can help bring museum experiences to life.

The Smithsonian museums in Washington, D.C., are giving visitors who are blind or with low vision a rich and rewarding experience through their smartphones or smart glasses. Using a video-streaming service, users are connected to an “agent” who provides a bespoke, detailed description of their surroundings.

The use of Braille descriptions has become increasingly common in museums around the world, and one Spanish institution has improved upon that. Madrid’s Prado Museum has made parts of its collection tactile, allowing visitors to be hands-on with the exhibitions.

The Louvre in Paris, and the Guggenheim Museum and the Metropolitan Museum of Art in New York, have all established tactile tours, where visitors can touch the art on display or touch casts of well-known works.

Hearing loops

Field Museum of Natural History

Tools such as hearing loops — also known as audio induction loops — use wireless signals to transmit audio directly to someone’s hearing aid and can be used in a variety of settings, including museum exhibitions. The Met in New York is just one example of this.

Another New York museum, the Whitney Museum of American Art, has been trying something different. It has developed a series of vlogs, or video blogs, with messages, explanations and exhibition information in sign language.

As well as opening up the museum’s content to visitors with hearing loss and deafness, the museum, on its website, says it hopes to “create a communications laboratory to expand the ASL vocabulary of contemporary art terms,” referring to American Sign Language.

The Dutch Rijksmuseum believes everyone should be able to access information on the art in their own language. It recently launched a video tour in Dutch Sign Language integrated in its app. The tour has been set up in close collaboration with and by deaf entrepreneurs.

Immersive experiences

Rocket Garden at Kennedy Space Center

A few years ago, the Pokémon Go craze took off, introducing many people to the possibilities of augmented reality. By creating immersive experiences, AR and other technology is being used to reimagine the way visitors relate to museums and historic sites.

You can take an AR tour of Pompeii, where a headset will put you right in the heart of the vibrant Roman city that was destroyed by the catastrophic eruption of Mount Vesuvius in A.D. 79.

Visitors to Bone Hall, in the Smithsonian National Museum of Natural History in Washington, D.C., meanwhile, can use AR to view the exhibits in a new light seeing the skeletons appear as living creatures.

The Petersen Automotive Museum in Los Angeles is using technology to bring cars from Hollywood alive with a mixed reality exhibition using Microsoft’s HoloLens technology. The “Worlds Reimagined” experience explores classic and futuristic cars from films and video games, including “Back to the Future” and the video game franchise “Halo.”

Other museums are using this technology to bring new experiences to their patrons including the Intrepid Sea, Air and Space Museum in New York with “Defying Gravity”; and the Museum of Flight’s mobile VR experiences in Washington state. The Musée des Plans-Reliefs in Paris used AI to create a digital twin of the historic Mont-Saint- Michel, which had to be captured from every angle.

In 1962, President John F. Kennedy captured the Space Race zeitgeist, when he said: “We choose to go to the moon in this decade and do the other things, not because they are easy, but because they are hard.” The Kennedy Space Center in Florida uses immersive technologies to recapture that energy, excitement and enthusiasm. At its “Heroes & Legends” exhibition, visitors can experience spacewalks, look inside space capsules and feel close to the action.

By bringing the past to life in a way that adds richness and depth, and, of course, accessibility, technology is helping museums reach a wider audience.

For more on these innovations and on accessibility initiatives at Microsoft, visit microsoft.com/en-us/accessibility and follow @MSFTIssues

Go to Original Article
Author: Microsoft News Center

Leanplum, Amplitude unite for personalized mobile marketing

Leanplum and Amplitude have teamed up to optimize mobile marketing campaigns and accelerate product improvements.

Leanplum, which specializes in mobile marketing engagement, and Amplitude, which specializes in product intelligence, decided they would be better together. Combining the platforms allows users to:

  • Align in-app experience with messaging campaigns.
  • Conduct A/B testing of product features and identify which variants drive desired behaviors.
  • Understand in real time the effect of campaigns on metrics around adoption, engagement conversion, retention and lifetime user value.
  • Identify lookalike personas to uncover more users who will respond favorably to a campaign.
  • Adjust strategy based on an understanding of user behavior.

The partnership enables marketing teams to use Leanplum to run personalized campaigns across mobile marketing channels and use Amplitude’s product analytics to find actionable usage insights and increase the impact of campaign returns, the companies claim.

According to the companies, Amplitude shows trends in user behavior and triggers that lead to the desired user outcome, while Leanplum can target those trends for improved key performance indicators.

Additionally, the partnership allows for new product features to be tested before they are released, and for experiences to be personalized for various user segments.

Leanplum and Amplitude have a feedback loop that enables bidirectional data to be transmitted between the two platforms, allowing marketing teams to analyze user behavior to create behavior-driven campaigns. Data from Leanplum mobile campaigns and A/B tests is exported into Amplitude for behavioral analysis. Lookalike audiences can then be exported back into Leanplum’s platform.

Go to Original Article

For Sale – Intel NUC DN2820FYKH with 300Gb Drive, 4Gb Ram and Licenced Windows 10

Discussion in ‘Desktop Computer Classifieds‘ started by lscolman, Apr 26, 2019.

  1. lscolman

    Well-known Member

    Jul 31, 2003
    Products Owned:
    Products Wanted:
    Trophy Points:
    Tyne & Wear


    For sale an Intel NUC. Cracking machine, that can be mounted on a wall mount or the back of a monitor. Supplied with original packaging and all original supplied accessories.

    Spec’s are here

    Intel® NUC Kit DN2820FYKH Product Specifications

    Cheers, Lee

    Price and currency: 110
    Delivery: Delivery cost is not included
    Payment method: Bank Transfer, Paypal or Cash on Collection
    Location: Sunderland, North East England
    Advertised elsewhere?: Advertised elsewhere
    Prefer goods collected?: I prefer the goods to be collected

    This message is automatically inserted in all classifieds forum threads.
    By replying to this thread you agree to abide by the trading rules detailed here.
    Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

    • Landline telephone number. Make a call to check out the area code and number are correct, too
    • Name and address including postcode
    • Valid e-mail address

    DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Share This Page


Go to Original Article