Optimasi Model Pembelajaran Berbasis E-Learning Dengan Dropbox Dalam Proses Kegiatan Belajar Mengajar

Total Page:16

File Type:pdf, Size:1020Kb

Optimasi Model Pembelajaran Berbasis E-Learning Dengan Dropbox Dalam Proses Kegiatan Belajar Mengajar Jurnal Pendidikan MIPA, Vol. 5. No. 2, Jul – Des 2015 ISSN: 2088-0294 OPTIMASI MODEL PEMBELAJARAN BERBASIS E-LEARNING DENGAN DROPBOX DALAM PROSES KEGIATAN BELAJAR MENGAJAR Muliansani Prodi Pendidikan Teknologi Informasi STKIP Taman Siswa Bima Email : [email protected] Abstrak Model pembelajaran yang paling umum adalah model konvensional atau tatap muka antara tenaga pengajar dengan peserta didik. Dengan kemajuan teknologi, Kegiatan Belajar Mengajar (KBM) telah banyak berubah baik dari proses maupun hasil dari KBM. Pemanfaatan kemajuan teknologi dibidang elektronik dan informasi membuat proses penyampaian informasi menjadi lebih mudah. Banyak metode yang penyampaian informasi yang telah dikembangakan oleh developer aplikasi software seperti mail, media sosial dan lainnya. Dari banyaknya model aplikasi yang ada, penulis mencoba untuk menggunakan app dropbox. Sebuah aplikasi direktori penyimpanan file yang dapat di share untuk user yang tergabung sebagai komunitas atau group dalam satu akun. Kelebihan dari app dropbox dengan aplikasi lain yang sejenis adalah feature yang dimilikinya yaitu pengaturan hak akses untuk user yang tergabung dalam group. Dari hasil analisis penerapan metode yang dilakukan, menujukan bahwa model pembelajaran e-learning dengan dropbox lebih baik dari penerapan dengan aplikasi lain seperti mail dan media sosial lainnya dalam KBM. Kata Kunci : Dropbox, Mail, Direktori, KBM, Konvensional PENDAHULUAN Pendidikan adalah mempelajari ilmu pengetahuan, keterampilan, dan kebiasaan sekelompok orang yang diturunkan dari satu generasi ke generasi berikutnya melalui pengajaran, pelatihan, atau penelitian. Pendidikan sering terjadi dibawah bimbingan orang lain, tetapi juga memungkinkan secara otodidak (Dewey, John 1944). Setiap peristiwa yang memiliki efek terhadap cara orang berpikir, merasa, atau bertindak dapat dianggap pendidikan. Pendidikan umumnya dibagi menjadi tahap seperti prasekolah, sekolah dasar, sekolah menengah, perguruan tinggi, dan magang. Kemajuan dan perkembangan teknologi saat ini telah memberian pembaharuan dalam dunia pendidikan, terutama dibidang teknologi informasi. kemajuan teknologi informasi tidak terlepas dari kemajuan teknologi perangkat elektronik yang dapat menjadi media untuk menyampaian informasi dalam bentuk digital. Kemajuan teknologi jaringan komunikasi yang juga sangat mempengaruhi perkembangan kehidupan manusia, khususnya jaringan internet. Proses kegiatan belajar mengajar (KBM) yang terjadi dalam dunia pendidikan formal telah banyak yang menggunakan jaringan internet sebagai media penyampaian informasi. Internet Internet (interconnection-networking) adalah seluruh jaringan komputer yang saling terhubung menggunakan standar sistem global Transmission Control Protocol/Internet Protocol Suite (TCP/IP) sebagai protokol pertukaran paket (packetswitching communicationprotocol) untuk melayani miliaran pengguna di seluruh 92 Jurnal Pendidikan MIPA, Vol. 5. No. 2, Jul – Des 2015 ISSN: 2088-0294 dunia.Rangkaian internet yang terbesar dinamakan Internet. Cara menghubungkan rangkaian dengan kaidah ini dinamakan internetworking (antar jaringan). Jumlah pengguna Internet yang besar dan semakin berkembang, telah mewujudkan budaya Internet. Internet juga mempunyai pengaruh yang besar atas ilmu, dan pandangan dunia. Dengan hanya berpandukan mesin pencari seperti Google, pengguna di seluruh dunia mempunyai akses Internet yang mudah atas bermacam- macam informasi. Dibanding dengan buku dan perpustakaan, Internet melambangkan penyebaran(decentralization) / pengetahuan (knowledge) informasi dan data secara ekstrem. Perkembangan Internet juga telah memengaruhi perkembangan ekonomi. Berbagai transaksi jual beli yang sebelumnya hanya bisa dilakukan dengan cara tatap muka (dan sebagian sangat kecil melalui pos atau telepon), kini sangat mudah dan sering dilakukan melalui Internet. Transaksi melalui Internet ini dikenal dengan nama e- commerce. Internet juga semakin banyak digunakan di tempat umum. Beberapa tempat umum yang menyediakan layanan Internet termasuk perpustakaan, dan Internet cafe/warnet (juga disebut Cyber Cafe). Terdapat juga tempat awam yang menyediakan pusat akses Internet, seperti Internet Kiosk, Public access Terminal, dan Telepon web.Terdapat juga toko-toko yang menyediakan akses wi-fi, seperti Wifi-cafe. Pengguna hanya perlu membawa laptop (notebook), atau PDA, yang mempunyai kemampuan wifi untuk mendapatkan akses Internet. Dalam perkembangan dunia pendidikan, model pembelajaran yang menggunakan teknologi informasi yang menggunakan perangakat elektronik disebut dengan e- learning. E-learning Dalam dunia pendidikan, telah dikenal sistem pembelajaran elektronik atau e- pembelajaran (Inggris: Electronic learning disingkat E-learning) dapat didefinisikan sebagai sebuah bentuk teknologi informasi yang diterapkan di bidang pendidikan berupa website yang dapat diakses dimana saja (Purbo, Onno W. 2002). Jaya Kumar C. Koran (2002) menyatakan e-learning sebagai sembarang pengajaran dan pembelajaran yang menggunakan rangkaian elektronik (LAN, WAN, atau internet) untuk menyampaikan isi pembelajaran, interaksi, atau bimbingan. Dong (2002) e-learning sebagai kegiatan belajar asynchronous melalui perangkatelektronik komputer yang memperoleh bahan belajar yang sesuai dengan kebutuhannya. Glossary(2001) e-learning adalah sistem pendidikan yang menggunakan aplikasi elektronik untuk mendukung belajar mengajar dengan media Internet, jaringan komputer,maupun komputer standalone. Rosenberg (2001)menekankan bahwa e-learning merujuk pada penggunaan teknologi internet untuk mengirimkan serangkaian solusi yang dapat meningkatkan pengetahuan dan keterampilan. Sedangkan Darin E. Hartley (Hartley, 2001) e-learning merupakan suatu jenis belajar mengajar yang memungkinkan tersampaikannya bahan ajar ke siswa dengan menggunakan media Internet, Intranet atau media jaringan komputer lain. E-learning merupakan dasar dan konsekuensi logis dari perkembangan teknologi informasi dan komunikasi. Dengan e-learning, peserta ajar (learner atau murid) tidak perlu duduk dengan manis di ruang kelas untuk menyimak setiap ucapan dari seorang guru secara langsung dalam satu tempat yang sama, namun dapat berinteraksi melalui media elektronik yang dapat menghubungkan kedua pihak dalam posisi yang tidak sama atau jauh baik secara real time maupun tidak. E-learning juga dapat mempersingkat 93 Jurnal Pendidikan MIPA, Vol. 5. No. 2, Jul – Des 2015 ISSN: 2088-0294 jadwal target waktu pembelajaran, dan tentu saja menghemat biaya yang harus dikeluarkan oleh sebuah program studi atau program pendidikan. E-learning dalam arti luas bisa mencakup pembelajaran yang dilakukan di media elektronik (internet) baik secara formal maupun informal. E-learning secara formal misalnya adalah pembelajaran dengan kurikulum, silabus, mata pelajaran dan tes yang telah diatur dan disusun berdasarkan jadwal yang telah disepakati pihak-pihak terkait (pengelola e-learning dan pembelajar sendiri). Pembelajaran seperti ini biasanya tingkat interaksinya tinggi dan diwajibkan oleh perusahaan pada karyawannya atau pembelajaran jarak jauh yang dikelola oleh universitas dan perusahaan-perusahaan yang memang bergerak dibidang penyediaan jasa e-learning untuk umum.E-learning bisa juga dilakukan secara informal dengan interaksi yang lebih sederhana, misalnya melalui sarana mailinglist, e-newsletter atau website pribadi, organisasi dan perusahaan yang ingin mensosialisasikan jasa, program, pengetahuan atau keterampilan tertentu pada masyarakat luas. Sebagaimana yang disebutkan diatas, e-learning telah mempersingkat waktu pembelajaran dan membuat biaya studi lebih ekonomis. E-learning mempermudah interaksi antara peserta didik dengan bahan/materi, peserta didik dengan dosen/guru/instruktur maupun sesama peserta didik. Peserta didik dapat saling berbagi informasi dan dapat mengakses bahan-bahan belajar setiap saat dan berulang-ulang, dengan kondisi yang demikian itu peserta didik dapat lebih memantapkan penguasaannya terhadap materi pembelajaran. Dalam e-learning, faktor kehadiran guru atau pengajar otomatis menjadi berkurang atau bahkan tidak ada. Hal ini disebabkan karena yang mengambil peran guru adalah komputer dan panduan-panduan elektronik yang dirancang oleh “contents writer”, designer e-learning dan pemrogram komputer.Slogan yang selalu diangkat dalam penerapan e-learning, yaitu “Content is King, Conversation is Queen”. Sudah sepantasnya bagi Penggiat e-learning, untuk selalu berusaha menyajikan konten yang bisa diterima dengan baik, bisa diakses dengan mudah, dan bisa diiikuti dengan menyenangkan. Dalam dunia e-learning, SDM merupakan faktor yang sangat vital dalam implementasi e-learning. Mengapa demikian? Karena e-learning muncul justru untuk meningkatkan kualitas SDM, baik itu di perusahaan, instansi, institusi/dunia pendidikan, maupun di dalam kehidupan bermasyarakat. Oleh karena itu SDM yang ada perlu dipersiapkan dengan sebaik-baiknya sebelum e-learning dijalankan. SDM suatu perusahaan/institusi harus mempunyai pola pikir yang menyatakan bahwa e-learning menjadi kebutuhan perusahaan/institusi untuk mencapai visi dan misi perusahaan/institusi itu sendiri, sehingga e-learning harus dilakukan. Cara pandang ini tentunya membawa konsekuensi dan menuntut adanya perubahan, diantaranya adalah perubahan budaya kerja di perusahaan/institusi tersebut. Dalam hal ini manajemen SDM sebagai pengelola SDM yang ada tentunya akan membuat kebijakan-kebijakan yang sesuai dengan kebutuhan untuk menjalankan e-learning di perusahaan/institusi tersebut. Tujuan e-learning adalah untuk
Recommended publications
  • Data Protection and Collaboration in Cloud Storage
    Technical Report 1210 Charting a Security Landscape in the Clouds: Data Protection and Collaboration in Cloud Storage G. Itkis B.H. Kaiser J.E. Coll W.W. Smith R.K. Cunningham 7 July 2016 Lincoln Laboratory MASSACHUSETTS INSTITUTE OF TECHNOLOGY LEXINGTON, MASSACHUSETTS This material is based on work supported by the Department of Homeland Security under Air Force Contract No. FA8721-05-C-0002 and/or FA8702-15-D-0001. Approved for public release: distribution unlimited. This report is the result of studies performed at Lincoln Laboratory, a federally funded research and development center operated by Massachusetts Institute of Technology. This material is based on work supported by the Department of Homeland Security under Air Force Contract No. FA8721-05- C-0002 and/or FA8702-15-D-0001. Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of Department of Homeland Security. © 2016 MASSACHUSETTS INSTITUTE OF TECHNOLOGY Delivered to the U.S. Government with Unlimited Rights, as defined in DFARS Part 252.227-7013 or 7014 (Feb 2014). Notwithstanding any copyright notice, U.S. Government rights in this work are defined by DFARS 252.227-7013 or DFARS 252.227-7014 as detailed above. Use of this work other than as specifically authorized by the U.S. Government may violate any copyrights that exist in this work. Massachusetts Institute of Technology Lincoln Laboratory Charting a Security Landscape in the Clouds: Data Protection and Collaboration in Cloud Storage G. Itkis B. Kaiser J. Coll W. Smith R.
    [Show full text]
  • WO 2015/089171 Al 18 June 2015 (18.06.2015) W P O P C T
    (12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) (19) World Intellectual Property Organization International Bureau (10) International Publication Number (43) International Publication Date WO 2015/089171 Al 18 June 2015 (18.06.2015) W P O P C T (51) International Patent Classification: ACHARYA, Visal Chandrakant; 39 Parlin Street #407, G06F 21/10 (2013.01) G06F 15/16 (2006.01) Everett, Massachusetts 02149 (US). DSILVA, Benedict Robert; 155 5th Street, Apt. 1, Cambridge, Massachusetts (21) International Application Number: 02141 (US). TEARNEN, Paul; 3221 Point Place SW, PCT/US20 14/0695 19 Seattle, Washington 981 16 (US). WENZEL, Peter; 2245 (22) International Filing Date: E. Colorado Blvd. #104-168, Pasadena, California 9 1107 10 December 2014 (10. 12.2014) (US). HELD, John; 2713 McDuffee Circle, North Aurora, Illinois 60542 (US). WEIBLEN, Charlie; 169 Franklin (25) Filing Language: English Street, Wrentham, Massachusetts 02093 (US). KANNAN, (26) Publication Language: English Ganesh; 2 Bent Avenue, Wayland, Massachusetts 01778 (US). PARIMI, Madhavi; 74 Presidential Drive, Apt 5, (30) Priority Data: Quincy, Massachusetts 02169 (US). AZUMA, Selom 61/914,682 11 December 201 3 ( 11. 12.2013) US Harry; 25 Church Street, Suite 1, Boston, Massachusetts 61/944,756 26 February 2014 (26.02.2014) US 021 16 (US). MAHAJAN, Himali; 30 Revere Beach Pkwy, (71) Applicant: INTRALINKS, INC. [US/US]; 150 East 42nd Apt# 312, Medford, Massachusetts 02155 (US). LIRIO, Street, New York, New York 10017 (US). Dario R.; 11 Goddard Street, Newton, Massachusetts 02461 (US). WALUK, Michael Joseph; 18 Mariah's Path, (72) Inventors: MCCARTHY, Kevin L.; 251 Gray Street, Ar Pembroke, Massachusetts 02359 (US).
    [Show full text]
  • Quick Hardware Tips Ground Running
    Apps & Software for Law Practice Efficiency & Security Presented by Matt Edmonds of Edmonds Legal Solutions on behalf of the Lawyers’ Insurance Association of Nova Scotia 20 May 2015 via webinar and in person at the NSBS & LIANS offices in Halifax, NS Below, I have included links to online resources related to the content of Apps & Software each slide, along with some of my own comments. If you have any questions, for Law Practice Efficiency & Security please don’t hesitate to contact me at [email protected]. Matt Edmonds These materials are available for download at edmondslegal.ca/cpd. Lawyer & Legal IT Consultant For best results, view this document digitally or print in colour. Presented on behalf of: 20 May 2015 [email protected] Edmonds Legal Solutions helps legal professionals discover and implement the right software to make their practices efficient and secure. If you'd like to use any of the tools mentioned in this presentation, and need some help deploying them, I can set things up for everyone at your firm and provide training so you can hit the Quick hardware tips ground running. Email: [email protected] Phone: 902-441-8432 Web: edmondslegal.com Twitter: @MatthewEdmonds LinkedIn: ca.linkedin.com/in/edmondsmatt [email protected] Materials available at edmondslegal.com/cpd 2015-05-20 Apps & Software for Law Practice Efficiency & Security 2 As a lawyer, your computer is probably your most important tool. Inexpensive business desktops may meet the needs of some staff, but The next computer you buy should be lawyers should think about investing in the best a MacBook, MacBook Air, or MacBook Pro machine for their own workflow.
    [Show full text]
  • Pengembangan Private Cloud Storage Sebagai Sentralisasi Data Universitas Nahdlatul Ulama Sidoarjo Berbasis Open Source Owncloud
    Jurnal Ilmu Komputer dan Desain Komunikasi Visual Vol 3, No 1, Juli 2018 ISSN (Cetak) : 2541-4550 ISSN (Online) : 2541-4585 Pengembangan Private Cloud Storage sebagai Sentralisasi Data Universitas Nahdlatul Ulama Sidoarjo Berbasis Open Source Owncloud 1 2 Moch Kholil , Syahri Mu’min 1 Program Studi D2 Penyuntingan Audio dan Video (Multimedia) Akademi Komunitas Negeri Putra Sang Fajar Blitar Jln. Tanjung No.1 Blitar [email protected] 2 Program Studi Sistem Informasi, Fakultas Ilmu Komputer, Universitas Nahdlatul Ulama Sidoarjo Jln. Mongonsidi Kav. DPR Sidoklumpuk Sidoarjo [email protected] Abstrak Cloud Storage memberikan beberapa kemudahan dalam sentralisasi penyimpanan data. Cloud Storage merupakan media penyimpanan yang di dalam pengaksesannya memerlukan jaringan internet. File dan data disimpan di komputer dimana user harus membuat akun Cloud Storage terlebih dahulu. Sebagai langkah kemudahan dalam mengakses data dalam sebuah instansi maka dibutuhkan strategi sentralisasi data yang dapat diakses dan berbagi file atau data bersama dengan biaya lebih murah. Private Cloud Storage bisa dicapai dengan mengimplementasikan Framework ownCloud berbasis Open Source. Penelitian ini bertujuan untuk mengembangkan teknologi penyimpanan data secara terpusat yang memungkinkan user bisa berbagi file atau data bersama. Kata Kunci: Cloud Storage, ownCloud, Private Cloud Storage, Open Source 1. PENDAHULUAN Perkembangan teknologi saat ini mengalami perubahan yang sangat pesat. Hal ini mempengaruhi perkembangan media penyimpanan pada komputer dari masa ke masa. Salah satu jenis berkembangannya adalah media penyimpanan berbasis cloud (awan). Cloud (awan) adalah metafora dari internet, sebagaimana awan yang sering digambarkan di diagram jaringan komputer. Menurut makalah tahun 2008 yang dipublikasikan IEEE Internet Computing, Cloud Computing merupakan suatu paradigma dimana informasi secara permanen tersimpan di server intenet dan tersimpan secara sementara di computer pengguna (client) termasuk di dalamnya desktop, komputer, tablet, notebook dan lain- lain.
    [Show full text]
  • Temel Bilgi Teknolojileri 2 Ünite-1
    TEMEL BİLGİ TEKNOLOJİLERİ 2 ÜNİTE-1 ĠġLETĠM SĠSTEMLERĠ BĠLGĠSAYAR SĠSTEMĠNĠN BĠLEġENLERĠ VE ĠġLETĠM SĠSTEMĠ Bilgisayar en basit tanımıyla, eldeki verileri (bilgi) önceden yüklenmiş belirli programlara göre matematiksel işlemler kul- lanarak işleyen, sonuç çıkaran ve bu bilgileri uygun ortamlarda saklayan, istenildiğinde geri getirebilen elektronik bir ci- hazdır. Bilgisayar sistemi genel olarak dört birimden oluşur: Donanım, Sistem Yazılımları, Uygulama Programları ve Kullanı- cılar. Bilgisayar donanımı merkezi işlem birimi, bellek ve Giriş/Çıkış birimleri (ekran, klavye, HDD, fare, tarayıcı, mikrofon, kamera, yazıcı, vb.) gibi bir bilgisayarı oluşturan fiziksel parçaların genel adıdır. (AS 2016) Bir başka ifadeyle, donanım bilgisayarda gözle görülür, elle tutulur her türlü elektronik ve elektromekanik nitelikli öğeler- dir. Bilgisayar üzerindeki yazılımları iki temel kategoride ele alabiliriz. Bunlar sistem ve uygulama yazılımlarıdır. Uygulama programları/yazılımları bilgisayarın çalışabilmesi ve istenilen işlemleri yapabilmesi için geliştirilmiş program- lardır. Kişisel ve iş yaşamımızda kullandığımız tüm yazılımlar bu sınıfa girer. Bunlar metin işleme yazılımları (Word, No- tepad vb.), medya oynatma programları (Windows media player, QuickTime Player, RealPlayer, vb.) internet tarayıcıları (Chrome, Firefox, Internet Explorer, Opera, Safari vb.), çizim programları (Paint, Photoshop), iletişim programları (Out- look, Skype vb.), veri tabanı sistemleri gibi herhangi bir görevi gerçekleştirmek üzere özel olarak geliştirilmiş uygulama programlarıdır.
    [Show full text]
  • Tech Note​--Gatelet Objects and Activities Reference
    Tech Note--Gatelet Objects and Activities Reference Tech Note--Gatelet Objects ​ and Activities Reference Symantec CloudSOC Tech Note 1 Tech Note--Gatelet Objects and Activities Reference Copyright statement Copyright (c) Broadcom. All Rights Reserved. Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. ​ ​ Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. 2 Tech Note--Gatelet Objects and Activities Reference Table of Contents Introduction Generic Gatelets Full Gatelet AddThis Adobe Document Cloud – Sign Amazon Web Services ARIS – MyCloud Asana Atlassian – BitBucket Atlassian - Jira Service Desk Atlassian - Jira Software Cloud Atlassian – Stride Basecamp Box Box Admin BV ShareX Cisco Webex Teams Concur Confluence Domo Dropbox Dropbox - Admin Console Dynamics Facebook – Workplace FileDropper GigaSize GitHub GitLab Gmail Google – Chat Google - Cloud Search Google – Contacts Google – Forms Google – Groups Google – Hangouts Google – Keep 3 Tech Note--Gatelet
    [Show full text]
  • CONNECTING with COMMUNITIES How Local Government Is Using Social Media to Engage with Citizens ANNE E HOWARD
    CONNECTING WITH COMMUNITIES How Local Government is Using Social Media to Engage with Citizens ANNE E HOWARD CONNECTING WITH COMMUNITIES August 2012 CONNECTING WITH COMMUNITIES CONNECTING WITH COMMUNITIES How Local Government is Using Social Media to Engage with Citizens ANNE E HOWARD August 2012 ISBN 978-0-9873877-0-7 Citing this report: Howard, A. 2012. Connecting with Communities: How Local Government Is Using Social Media to Engage with Citizens. ANZSOG Institute for Governance at the University of Canberra and Australian Centre of Excellence for Local Government. Further information: www.governanceinstitute.edu.au www.acelg.org.au www.iken.net.au Email: [email protected] Phone: +61 (0)2 6206 3968 @IKENdoteam i CONNECTING WITH COMMUNITIES Table of Contents Acknowledgements v Executive Summary vii 1 Introduction 1 1.1 Background to the study 1 1.2 The ACELG Innovation and Best Practice Program 1 1.3 Methodology and Approach 1 1.4 Structure of the Report 2 2 Social media in context 3 2.1 Australia and the digital age 3 2.2 E-government 3 2.3 Web 2.0 4 2.4 Web 2.0 and social media 4 2.4.1 Terminology 4 2.4.2 What’s special about social media? 5 2.4.3 What are the benefits to organisations of using social media? 5 2.5 Social media platforms 6 2.6 Widely used social media formats 7 3 Who uses social media in local government? 9 3.1 Council Leaders 9 3.2 Citizens 9 3.3 Councils 10 3.3.1 Survey results 10 3.3.2 UK and Australian local government trends 12 3.3.3 Preliminary review of council websites 12 3.4 The growing importance of council
    [Show full text]
  • The What, How and Why of Social Media a Guide for Local Government
    The What, How and Why of Social Media A Guide for Local Government A Report for Sydney Coastal Councils Group Anne Howard Howard Partners Pty Ltd May 2013 Becoming Social: Report for the Sydney Coastal Councils Group The Sydney Coastal Councils Group and the Becoming Social Project The Sydney Coastal Councils Group Incorporated (SCCG) is a voluntary Regional Organisation of Councils representing fifteen Sydney coastal councils. Established in 1989, its mission is to provide leadership through a coordinated approach to sustainable coastal management. SCCG are part of an exciting project entitled Becoming Social, which aims to develop strategies and tools for local government in the use of social media in relation to environmental issues. More particularly, the project has as one of its goals: To increase skills and knowledge in Local Government to utilise social media as a relationship and policy development tool to engage, consult and educate communities in relation to local and regional coastal environmental issues. The Project is guided and informed by a Steering Committee comprised of social media, environment, local government and other specialists. Following the establishment of the steering committee, the conduct of a stakeholder survey among the 15 SCCG member councils to explore their current understanding and use of social media, the next stage of this project was to investigate, summarise and synthesise social media and its use in Government engagement, consultation, education and policy development. This Report addresses all key elements of social media to provide an insight into how it can be harnessed to advance communication and engagement activities. The New South Wales Government through its Environmental Trust has assisted this project .
    [Show full text]
  • Protect Your Data by Using Encryption
    ISSUE 138 | SEPTEMBER 2019 Malpractice Prevention Education for Oregon Lawyers LAW PRACTICE Protect Your Data by Using Encryption By Hong Dao stolen, or hacked, there is a high risk that the data will be compromised if it’s not secure. Encrypting This article is a continuance of our cybersecurity the entire hard drive on your computer (called full series. It focuses on encryption as a way to protect disk encryption) ensures that no one can access your data from physical loss or cyberattacks. anything on it. The encryption makes all data on your Encryption is a critical step in adopting and computer unreadable unless it is decrypted with a key implementing a security policy in any law office. It (password) that only you have. transforms information so it is unintelligible to an Computers running on Microsoft Windows have unintended recipient. It uses specific algorithms to a free built-in full disk encryption program called scramble the data into jumbled unreadable codes. BitLocker Drive Encryption. They also have Bitlocker The recipient needs to unscramble the data using an to Go that can be used to encrypt external drives encryption key in order to decrypt the information. like USB flash drives and other portable hard You do not need to know how encryption technically drives. However, both Bitlocker programs are only works to use it. Your “usage” of encryption typically available in the Professional or Enterprise editions of involves turning on the native encryption program Windows 8 or 10, or the Ultimate version of Windows built into your computing devices. Or it may involve 7.
    [Show full text]
  • Message from the CEO PLF Chief Executive Officer Position
    ISSUE 138 | SEPTEMBER 2019 Malpractice Prevention Education for Oregon Lawyers PLF UPDATES Message from the CEO By Carol J. Bernick, PLF Chief Executive Officer After five of the most professionally satisfying years of my career, I am leaving the PLF in the next few months. I am re-joining my former colleagues at Davis Wright Tremaine. I will serve as a strategic partner in a variety of ways, with a focus on mentoring, training, and career development of associates, especially women and lawyers of color. Closing the gender and race gap present in the partnership track of large law firms has been a passion of mine my entire professional life. The opportunity to have a real impact is too important for me to pass up. Yet the decision to leave the PLF was not easy: the quality of work performed by the entire staff is its hallmark. It has been my privilege to work with the PLF’s talented and dedicated staff and defense panel and to witness the impact the PLF has on Oregon lawyers. I thank the PLF Board and everyone at the PLF for giving me this opportunity. Because of your dedication, I am confident that the PLF will continue to serve Oregon lawyers well for years to come. PLF Chief Executive Officer Position The Professional Liability Fund is seeking a new CEO with a desired start date of December 1, 2019. As an independently managed subdivision of the Oregon State Bar, the PLF has a staff of 50 and annual budget of $28 million. Reporting to the PLF’s board, the CEO provides strategic leadership and management for the PLF.
    [Show full text]
  • Canada's Cloud Imperative
    CANADA’S CLOUD IMPERATIVE: IMPROVING BUSINESS OPPORTUNITIES THROUGH ENABLING SERVICES September 2013 Information and Communications Technology Council Series on Emerging Sub-Sectors Information and Communications Technology Council Conseil des technologies de l’information et des communications 116 Lisgar Street, Suite 300, Ottawa, ON K2P 0C2 116, rue Lisgar, pièce 300, Ottawa, ON K2P 0C2 (tel) 613-237-8551 (fax) 613-230-3490 (tél) 613-237-8551 (téléc) 613-230-3490 TABLE OF CONTENTS EXECUTIVE SUMMARY .............................................................................................................................. 2 1.0 THE NEXT STAGE IN THE INTERNET’S EVOLUTION ........................................................................ 4 2.0 METHODOLOGY .................................................................................................................................... 5 3.0 CLOUD COMPUTING: WHAT IT IS AND WHERE IT STARTED .......................................................... 7 3.1 Sudden Arrival or Slow Evolution? ...................................................................................................... 7 3.2 Deployment Models ............................................................................................................................ 8 4.0 GLOBAL CLOUD ECOSYSTEMS ........................................................................................................ 12 4.1 What It Means for Canada ...............................................................................................................
    [Show full text]
  • NA10 (2015) Cloud Service Provider Contract Terms
    InterPARES Trust Project Final Report Title: 10-Contract Terms with Cloud Service Providers Status: Final Version: 3 Date submitted: 2016-01-30 Last reviewed: 2016-01-30 Author: InterPARES Trust Project Writer(s): Robert McLelland and Grant Hurley with additional contributions from Daniel Collins Research domain: Infrastructure URL: Project lead Yvette Hackett 1 Document Control Version history Version Date By Version notes 1.0 Feb 12, 2014 YH, GH, RM Drafted and submitted 1.0 Feb 15, 2014 CR Formatted, minor copy edits 2.0 May 18, 2014 RM Changed category group names, added discussion on European cloud service providers, added analysis of European contacts, enhanced conclusion paragraph. 3.0 January 30, RM Added section on terminology, final 2016 proof reading. 2 Table of Contents 1. Introduction ........................................................................................................................................ 6 2. Purpose and Scope of Study ........................................................................................................... 6 3. Methodology ....................................................................................................................................... 6 3.1 Terminology ............................................................................................................................... 7 4. Overview of the Cloud ...................................................................................................................... 7 4.1 Types of Cloud ..........................................................................................................................
    [Show full text]