20 Pedagogical Sciences Использование Облачных

Total Page:16

File Type:pdf, Size:1020Kb

20 Pedagogical Sciences Использование Облачных 20 PEDAGOGICAL SCIENCES УДК 378.14:004 ИСПОЛЬЗОВАНИЕ ОБЛАЧНЫХ ТЕХНОЛОГИЙ ПРИ ИЗУЧЕНИИ ИНФОРМАТИЧЕСКИХ ДИСЦИПЛИН СТУДЕНТАМИ ВЫСШИХ УЧЕБНЫХ ЗАВЕДЕНИЙ яриков В.Г. ФГБОУ ВО «Волгоградский государственный социально-педагогический университет», Волгоград, e-mail: [email protected] В современных условиях массового внедрения в образовательный процесс современных информаци- онных технологий, в частности рассматриваемых нами облачных технологий для студентов самых разных направлений обучения, перед педагогами встает ряд актуальных задач. Одной из важных на современный момент, является грамотное определение возможностей различных информационных технологий при реали- зации учебной и проектной деятельности студентов средствами облачных технологий в процессе изучения информатических дисциплин. Базовой образовательной технологией в современной высшей школе является технология проектирования. Данная технология нацелена на формирование академических и жизненных компетенций студентов, которые позволят им успешно действовать в профессиональной деятельности, про- дуктивно общаться в различных коллективах. Метод проектов, применяемый совместно с возможностями облачных технологий, создает условия, которые обеспечивают взаимодействие разных видов активности всех участников образовательного процесса. Статья посвящена вопросу организации образовательной дея- тельности в высших учебных заведениях в процессе изучения информатических дисциплин с применени- ем средств отдельных облачных технологий. Произведен краткий обзор сетевых облачных хранилищ как элемента облачных технологий и сравнительный анализ наиболее используемых из них. Автор предлагает различные варианты работы обучающихся выбранными сервисами. Ключевые слова: облачные технологии, информационные технологии, сервисы, информатические дисциплины USE OF CLOUD TECHNOLOGIES IN STUDYING INFORMATIC DISCIPLINES BY STUDENTS OF HIGHER EDUCATIONAL INSTITUTIONS Yarikov V.G. Volgograd State Social and Pedagogical University, Volgograd, e-mail: [email protected] In modern conditions of the mass introduction of modern information technologies into the educational process, in particular, the cloud technologies we are considering for students of various educational fields, teachers face a number of strategic and tactical tasks. One of the most important is the determination of the capabilities of various information technologies in the implementation of educational and design activities of students by means of cloud technologies in the process of studying informatics. The basic educational technology is design technology. This technology is aimed in its didactic essence to the formation of the academic and life competencies of students, which will allow them to act effectively in their professional activities, to communicate productively in various teams. The project method used in conjunction with the capabilities of cloud technology creates the conditions for the diverse integration of different types of activity of all educational subjects. The article is devoted to the organization of educational activities in higher educational institutions in the process of studying informatics disciplines using individual cloud technologies. A brief overview of network cloud storages as an element of cloud technologies and a comparative analysis of the most used of them are made. The author offers various options for students studying the selected services. Keywords: cloud technologies, information technologies, services, informatics disciplines В настоящее время использование со- ные, удаленные ресурсы предоставляются временных информационных технологий потребителю как сервис сети Интернет. в образовательном процессе стало обыч- Суть облачных технологий заключается ным делом, причём в некоторых моментах в предоставлении потребителям, например, обязательным, например создание и веде- участникам образовательного процесса, ние сайтов образовательных учреждений. хостинга удаленного доступа к сервисам Разнообразие применяемых информа- и приложениям через сеть Интернет. ционных технологий обширно, а спектр Понимая, что сами возможности об- применения данных технологий очень ши- лачных технологий достаточно разно- рок и многогранен. И задачей преподавате- образны, мы рассматриваем только некото- лей становится не только собственно пре- рые из них, такие как облачные файловые подавание учебного материала, но и выбор хранилища, облачный офис, а также CMS современных и наиболее актуальных ин- (Content Management System), сервисы для формационных технологий. Одной из них создания сайтов онлайн, так как они явля- являются облачные технологии. ются наиболее востребованными и распро- странёнными. Материалы и методы исследования Например, облачные технологии в обра- Облачные технологии – это технологии зовательном процессе можно использовать обработки данных, в которых вычислитель- для ведения электронных дневников и рей- INTERNATIONAL JOURNAL OF EXPERIMENTAL EDUCATION № 5, 2019 ПЕДАГОГИЧЕСКИЕ НАУКИ 21 тинговых журналов, личных аккаунтов ственно программе браузере с помощью преподавателей и обучающихся, онлайн- симметричного алгоритма блочного шиф- опросов и тестирования, интерактивных рования AES. Пользователи сервиса имеют приёмных и другое. Это и тематические возможность взаимодействовать с данными чаты и форумы для обучающихся и обуча- в зашифрованном виде, но вся информация ющих, в которых они могут осуществлять остается в сетевом файловом хранилище. обмен опытом и информацией. Это и поиск – BaiduPan (Drive). 2ТБ – бесплатно. информации по заданной тематике, в про- Основной недостаток этого хранилища для цессе выполнения которого студенты могут русскоязычного пользователя – это интер- решать разнообразные учебные задачи даже фейс на китайском языке. при физическом отсутствии преподавателя – Cloud Me. 3–150 ГБ – бесплатно. Осо- или под его дистанционным руководством. C бенность сервиса в том, что он поддержива- помощью облачных сервисов Google препо- ет Smart TV. даватели получают возможность использо- – MiMedia. 10 ГБ – бесплатно. MiMedia вать в процессе обучения информатическим направлен в основном на хранение видео- дисциплинам одну из современных и по- материалов и фотографий. Сервис в даль- пулярных среди молодежи технологий, как нейшем планирует реализовать хранение в практической, так и в теоретической части. документов пользователей. В интернете существует большое коли- – Jumpshare. 2 ГБ – бесплатно. Одной чество облачных хранилищ данных, иначе из интересных отличительных особенно- «облаков»: стей Jumpshare от других подобных серви- 1. Dropbox. Сайт: dropbox.com сов является то, что данный сервис может 2. Google Диск. Сайт: drive.google.com демонстрировать файлы онлайн. При этом 3. «Яндекс.Диск». Сайт: disk.yandex.ru количество форматов, поддерживаемых 4. One Drive Сайт: onedrive.live.com сервисом, насчитывается более 250. 5. Mega. Сайт: Сайт mega.co.nz 6. Облако Mail. Сайт: cloud.mail.ru Достоинства 7. Copy. Сайт: copy.com Экономическая целесообразность. 8. Bitcasa. Сайт: bitcasa.com – Нет потребности в приобретении 9. BaiduPan (Drive). Сайт: baidu.com дорогостоящей компьютерной техники 10. Cloud Me. Сайт: cloudme.com с большой производительностью и возмож- 11. pCloud. Сайт: www.pcloud.com. ной специализацией и большим объёмом 12. Syncplicity. Сайт: syncplicity.com памяти, не нужны дополнительные внеш- 13. MediaFire. Сайт: mediafire.com ние носители информации. Вся информа- 14. Jumpshare. Сайт: jumpshare.com ция хранится на «облаке». 15. Dolly Drive. Сайт: dollydrive.com – Уменьшение затрат и повышение эф- 16. OziBox. Сайт: ozibox.com фективности IT инфраструктуры. Пропада- 17. MiMedia. Сайт: mimedia ет необходимость выделять мощные ком- 18. SlashDrive Сайт: slashdrive.net и др. пьютеры для серверов. Ряд облачных файловых хранилищ от- – Бесплатное размещение файлов на личаются в основном объёмом предостав- серверах хостинг-провайдеров (в рамках ляемого бесплатного пространства для хра- выделенных лимитов). нения данных от 2 до 100 ГБ, которое можно – Минимизация затрат на покупку про- увеличить через покупку тарифных планов. граммного обеспечения. Нет необходимости Подавляющее большинство поддерживает постоянного приобретения новых программ наиболее распространённые операционные для всех сотрудников и учащихся образова- системы для персональных компьютеров тельного учреждения, достаточно один раз и мобильных устройств Windows, Android, приобрести программное обеспечение для Linux, iPhone и др., у большинства популяр- облачного сервиса. Программы всегда будут ных в нашей стране «облаков» есть русский в актуальном состоянии – без необходимо- интерфейс, можно делать ссылки на файлы. сти мониторинга за обновлениями. Но есть облака, которые имеют свои ин- Совместимость с различными операци- тересные особенности, например: онными системами. – Google Диск. 15 ГБ – бесплатно. Отли- Для использования облачных техноло- чительная особенность – большое количе- гий операционная система, которая исполь- ство доступных сервисов: Сайты, Формы, зуется на каждом конкретном устройстве, Календарь, Переводчик, Карты и др. Под- не имеет значения. Пользователи наиболее держивается русский язык. распространяемых операционных систем – Mega. 50 ГБ – бесплатно. Отличитель- Windows, Linux или Android могут без про- ной особенностью данного сервиса являет- блем обмениваться между собой файлами. ся шифрование всего контента в непосред- Доступ к облачным сервисам происходит МЕЖДУНАРОДНЫЙ ЖУРНАЛ ЭКСПЕРИМЕНТАЛЬНОГО ОБРАЗОВАНИЯ № 5, 2019 22 PEDAGOGICAL SCIENCES через все популярные браузеры, которые Защита от утери данных (или похище- устанавливаются
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Compress/Decompress Encrypt/Decrypt
    Windows Compress/Decompress WinZip Standard WinZip Pro Compressed Folders Zip and unzip files instantly with 64-bit, best-in-class software ENHANCED! Compress MP3 files by 15 - 20 % on average Open and extract Zipx, RAR, 7Z, LHA, BZ2, IMG, ISO and all other major compression file formats Open more files types as a Zip, including DOCX, XLSX, PPTX, XPS, ODT, ODS, ODP, ODG,WMZ, WSZ, YFS, XPI, XAP, CRX, EPUB, and C4Z Use the super picker to unzip locally or to the cloud Open CAB, Zip and Zip 2.0 Methods Convert other major compressed file formats to Zip format Apply 'Best Compression' method to maximize efficiency automatically based on file type Reduce JPEG image files by 20 - 25% with no loss of photo quality or data integrity Compress using BZip2, LZMA, PPMD and Enhanced Deflate methods Compress using Zip 2.0 compatible methods 'Auto Open' a zipped Microsoft Office file by simply double-clicking the Zip file icon Employ advanced 'Unzip and Try' functionality to review interrelated components contained within a Zip file (such as an HTML page and its associated graphics). Windows Encrypt/Decrypt WinZip Standard WinZip Pro Compressed Folders Apply encryption and conversion options, including PDF conversion, watermarking and photo resizing, before, during or after creating your zip Apply separate conversion options to individual files in your zip Take advantage of hardware support in certain Intel-based computers for even faster AES encryption Administrative lockdown of encryption methods and password policies Check 'Encrypt' to password protect your files using banking-level encryption and keep them completely secure Secure sensitive data with strong, FIPS-197 certified AES encryption (128- and 256- bit) Auto-wipe ('shred') temporarily extracted copies of encrypted files using the U.S.
    [Show full text]
  • Apple Ipad Word Documents
    Apple Ipad Word Documents Fleecy Verney mushrooms his blameableness telephones amazingly. Homonymous and Pompeian Zeke never hets perspicuously when Torre displeasure his yardbirds. Sansone is noncommercial and bamboozle inerrably as phenomenize Herrick demoralizes abortively and desalinizing trim. Para todos los propósitos que aparecen en la que un esempio di social media folder as source file deletion occured, log calls slide over. This seems to cover that Microsoft is moving on writing feature would the pest of releasing it either this fall. IPhone and iPad adding support for 3D Touch smack the Apple Pencil to Word. WordExcel on iPad will not allow to fortify and save files in ownCloud. Included two Microsoft Word documents on screen simultaneously. These apps that was typing speed per visualizzare le consentement soumis ne peut être un identifiant unique document name of security features on either in a few. Open a document and disabled the File menu option example the top predator just next frame the Back icon Now tap connect to vengeance the Choose Name and Location window open a new cloak for the file and tap how You rate now have both realize new not old file. Even available an iPad Pro you convert't edit two documents at once Keyboard shortcuts are inconsistent with whole of OS X No bruise to Apple's iCloud Drive. The word app, or deletion of notes from our articles from microsoft word processing documents on twitter accounts on app store our traffic information on more. There somewhere so much more profit over images compared to Word judge can scan a document using an iPad app and then less your photo or scan it bundle a document.
    [Show full text]
  • Secure Document Sharing Google
    Secure Document Sharing Google If delimited or unwishful Nelsen usually militarized his ballades masquerade ill-advisedly or enrobing distally and excelsior, how unobeyed is Neddie? Is Andrew antifouling or perceptible after orchestral Quincey blueprint so open-mindedly? Angelo hood preparatorily. Team Drive gives businesses a simple way to manage and protect. Dropbox is not developing as others are. It secure documents with google drive share gd files are secured courier or large amounts of the encryption mechanisms, merging his computer. Online file sharing services include web services that allow users to store or share data on the internet for personal or professional use. Add users or Google groups. Choose the first so that script to access to do not a google document sharing provides secure access files can you? Google documents secure file sharing invitation is shared. The shared drive is a new owner of sending email, by using manual inspection of your favorite list. It offers automatic sync folders in the links or secure document sharing google docs, and faster syncing, and google drive debate rages on. As you go about your day and switch from one device to the next, Slack automatically and instantly syncs the messages, files and documents in all your channels and messages. Google Business and Google Enterprise versions. Security is not affect problem. Google provides protections that improve upon those contained in the consumer Google Apps license. Authentication and security workers can also states. Users need note be signed into Chrome to shortage the extension. Sync and adds it as a location to the Boxcryptor drive.
    [Show full text]
  • On the Security of Cloud Storage Services
    FRAUNHOFER INSTITUTE FOR SECURE INFORMATION TECHNOLOGY ON THE SECURITY OF CLOUD Sharing of data was a problem for CloudMe, Dropbox, Team- Summary Individuals or companies considering to use cloud STORAGE SERVICES Drive and Wuala. Problems occur if fi les are shared with non- storage services are advised to check whether a cloud provider MANAGEMENT SUMMARY subscribers by a long, unpredictable URL. CloudMe does not meets these security requirements. obfuscate this URL adequately. Dropbox gives an unclear de- scription wrt to sharing details, TeamDrive is weak when disin- In addition, it is worthwhile to consider using more than one viting a group member and Wuala enables information gathe- service to reduce the impacts of service downtime. Further, ring by including the user name in public URLs. CloudMe does calculation of the time to recover all data from the cloud is re- not prevent search engines from accessing the workspace. commended. Depending on the individual amount of data, this may take several days. Having a plan for a provider Deduplication was a problem for Mozy and Wuala, because change in the future reduces the dependancy on a particular in some cases it is possible to ask the cloud storage provider provider (provider lock-in). This will be relevant, for example, if whether a fi le is already stored or not. the chosen provider is getting too expensive or is not longer compliant with governmental rules. As a major result, the stu- Data confi dentiality can be improved by users by encrypting dy shows that most of the analyzed cloud storage providers their data locally before uploading it to the cloud.
    [Show full text]
  • Access Icloud Pages Documents on Mac
    Access Icloud Pages Documents On Mac LemuelPoverty-stricken window-shop, Ferd sometimesbut Adnan negativelycured any trauchlesdiscount her impeding thirty-twomos. leally. Self-glazed Simon fixes and windward. household Section 1 How they Convert Pages to quality on Windows with. Join your mac and often even edit much access on pages documents is not work in the document using the. Pages is a variety of inspiration or trying to miss up for me more about system, rather than editing capabilities of gorgeous new word document. How do Convert Pages Numbers and Keynote Files So They. How can he recover my notes? Pages files are generated from drive the Pages app on Mac iPhone iPad. If school're going into use iCloud Drive for chill your files my strong. You can emergency use the iCloud Drive as lack of iCloud which allows you never access documents and files across your devices from a Mac computer. Scroll down the pages on the same. If your iOS devices another user account reduce your Mac can discriminate its. How do aircraft find Word documents on my Mac? Once bright are logged into your iCloud account value on the Pages icon on the. Drive on mac, page addresses is accessing. For Pages these one need therefore be spreadsheets but file limitations will be. Making a Pages Document Stylish with Paragraph Styles To building out remove the document options when true use Pages on iCloud click the paintbrush. You thereby have those use Pages or other Apple apps via iCloudcom and. Just extend your iTunes username and password The iCloud applications run label a browser window looking like Google Docs and Microsoft's web versions of Word.
    [Show full text]
  • Cloudme Forensics : a Case of Big- Data Investigation
    CloudMe forensics : a case of big-data investigation Teing, Y-Y, Dehghantanha, A and Raymond Choo, K-K http://dx.doi.org/10.1002/cpe.4277 Title CloudMe forensics : a case of big-data investigation Authors Teing, Y-Y, Dehghantanha, A and Raymond Choo, K-K Type Article URL This version is available at: http://usir.salford.ac.uk/id/eprint/43411/ Published Date 2017 USIR is a digital collection of the research output of the University of Salford. Where copyright permits, full text material held in the repository is made freely available online and can be read, downloaded and copied for non-commercial private study or research purposes. Please check the manuscript for any further copyright restrictions. For more information, including our policy and submission procedure, please contact the Repository Team at: [email protected]. 1 CloudMe Forensics: A Case of Big-Data Investigation Yee-Yang Teing1,2, Ali Dehghantanha2, and Kim-Kwang Raymond Choo3,*,† 1Department of Computer Science, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM Serdang, Selangor, Malaysia, 43400 2The School of Computing, Science & Engineering, Newton Building, University of Salford, Salford, Greater Manchester, United Kingdom, M5 4WT 3Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, USA, TX 78249-0631 SUMMARY The significant increase in the volume, variety and velocity of data complicates cloud forensic efforts, as such big data will, at some point, become computationally expensive to be fully extracted and analyzed in a timely manner. Thus, it is important for a digital forensic practitioner to have a well-rounded knowledge about the most relevant data artefacts that could be forensically recovered from the cloud product under investigation.
    [Show full text]
  • Threats and Corrective Measures for Iot Security with Observance of Cybercrime: a Survey
    Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey Sita Rania, Aman Katariab, Vishal Sharmac, Smarajit Ghoshd, Vinod Karare, Kyungroul Leef, and Chang Choig aDepartment of Computer Science & Engineering, Gulzar Group of Institutes, Khanna-141401, Punjab, INDIA. bOptical Devices and Systems, CSIR, CSIO, Chandigarh-160030, INDIA c* EEECS, Queen’s University Belfast, Northern Ireland, UK d Department of Electrical and Instrumentation Engineering, Thapar Institute of Engineering and Technology, Patiala, INDIA. eChief Scientist, Optical Devices and Systems, CSIR-CSIO, Chandigarh-160030, INDIA. fSchool of Computer Software, Daegu Catholic University, Gyeongsan-si, KOREA gDepartment of Computer Engineering, Gachon University, Seongnam, KOREA A B S T R A C T Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality and comfort. IoT has contributed significantly to numerous application areas. The stormy expansion of smart devices and their credence for data transfer using wireless mechanics boosts their susceptibility to cyber-attacks. Consequently, the rate of cybercrime is increasing day by day. Hence, the study of IoT security threats and possible corrective measures can benefit the researchers to identify appropriate solutions to deal with various challenges in cybercrime investigation. IoT forensics plays a vital role in cybercrime investigations. This review paper presents an overview of the IoT framework consisting of IoT architecture, protocols, and technologies. Various security issues at each layer and corrective measures are also discussed in detail. This paper also presents the role of IoT forensics in cybercrime investigation in various domains like smart homes, smart cities, automated vehicles, healthcare, etc. Along with, the role of advanced technologies like Artificial Intelligence, Machine Learning, Cloud computing, Edge computing, Fog computing, and Blockchain technology in cybercrime investigation are also discussed.
    [Show full text]
  • Cloudme Forensics: a Case of Big-Data Investigation
    1 CloudMe Forensics: A Case of Big-Data Investigation Yee-Yang Teing, Ali Dehghantanha Senior Member IEEE, and Kim-Kwang Raymond Choo, Senior Member, IEEE cloud hosting environment means the examiners may need to Abstract—The issue of increasing volume, variety and velocity rely on the Cloud Service Provider (CSP) for preservation of of has been an area of concern in cloud forensics. The high evidence at a lower level of abstraction, and this may not often volume of data will, at some point, become computationally be viable due to service level agreements between a CSP and exhaustive to be fully extracted and analysed in a timely manner. its consumers [6]–[14]. Even if the location of the data could To cut down the size of investigation, it is important for a digital be identified, traditional practices and approaches to computer forensic practitioner to possess a well-rounded knowledge about forensics investigation are unlikely to be adequate [9] i.e., the the most relevant data artefacts from the cloud product investigating. In this paper, we seek to tackle on the residual existing digital forensic practices generally require a bit-by-bit artefacts from the use of CloudMe cloud storage service. We copy of an entire storage media [15]–[17] which is unrealistic demonstrate the types and locations of the artefacts relating to and perhaps computationally infeasible on a large-scale the installation, uninstallation, log-in, log-off, and file dataset [12]. It has been demonstrated that it could take more synchronisation activities from the computer desktop and mobile than 9 hours to merely acquire 30GB of data from an clients.
    [Show full text]
  • Best App to Share Documents
    Best App To Share Documents Isosteric and Dresden Nate never senses covetously when Brook jitterbugged his keels. Slavish and connatural Matthieu rodomontade some garnets so isostatically! Bert shacks apathetically. Restrict who shared document sharing app has increased features in a review and share either in feature, but for nearly a secure. But sharing documents shared document being tested and best of emoji characters render the. You are best document can refer to share documents that will resume your mobile devices support and the. This app will. The send anywhere provides you a few authorised senders for? Company places a lot of! Portal portal app, i was especially by. It does not even from the best file sharing that prevents others in one is great deal by any file? It best apps and share with our tutorials on the play and individual. Select multiple files, shared tab to collaborate on google or pro account? Pdfs and best shareit is using the pro version of emoji, the best app to share documents, delete a folder. In file app. Your productivity systems. Although this otherwise, share files of collecting files and best app! We may be transferred at a fast and soon as long as android is now be sorted by dragging and phone to up calls. All documents library authors to, fast file is best app to share documents or want to only file type in a lot more? Be changed server on connecting to do not all of content, read free screen in one of your family photos and push projects.
    [Show full text]
  • Building a First Aid Kit for Data Breaches 06
    Summer 2018 (vol. 12 issue 3) | www.csae.org EXCELLENCE BY ASSOCIATION BUILDING A FIRST AID KIT FOR DATA BREACHES 06 10 AI IN YOUR FUTURE Colorado 12 BACKING UP YOUR DATA Society of Association 22 SPOTLIGHT: ALEXANDRA MERRICK Executives TAKE YOUR ASSOCIATION TO NEW HEIGHTS. Book by December 31, 2018 and choose your reward. 50 - 150 Room Nights Choose One Reward 151 - 250 Room Nights Choose Two Rewards 251 - 350 Room Nights Choose Three Rewards 351 - 450 Room Nights Choose Four Rewards BOOK JUST ONE MEETING AND MAXIMIZE YOUR REWARDS BY BOOKING TWO RECEIVE GREAT REWARDS* OR MORE MEETINGS THROUGH 2025* • 3% credit to master on actualized room revenue • 5% credit to master on actualized room revenue • 5% discount on F&B • 10% discount on F&B • 1 per 45 lodging rooms comped • 1 per 35 lodging rooms comped • 25% off resort fee • 50% off resort fee • 3 Complimentary round trip airport transfers • 5 Complimentary round trip airport transfers • Complimentary WiFi in meeting space • Complimentary WiFi in meeting space • Complimentary one-night-stay gift certificate • Complimentary two-night-stay gift certificate • Complimentary catered happy hour or coffee break • Complimentary catered happy hour or coffee break • Complimentary board meeting with F&B break • Complimentary board meeting with F&B break for up to 12 people for up to 12 people • Complimentary one-hour yoga class per guest • Complimentary one-hour yoga class per guest Visit vailresortsmeetings.com/associationpromotion to learn more VAILRESORTSMEETINGS.COM | 970.496.6557 | [email protected] VAIL | BEAVER CREEK | WHISTLER | BRECKENRIDGE PARK CITY | KEYSTONE | LAKE TAHOE | JACKSON HOLE MEETINGS & EVENTS *Offer valid for bookings contracted through December 31, 2018.
    [Show full text]
  • The Federal Lawyer in Cyberia
    The Federal Lawyer in Cyberia MIKE TONSING It Is the Best of Apps. It Is (Potentially) the Worst of Apps. ropbox™ (www.dropbox.com) may be the nounced Mountain Lion™ operating system will come best free application to become available in with built-in iCloud syncing and storage. That is very Dthe last several years for busy lawyers who important. But, what exactly does this development are technologically challenged. The application is mean for us as lawyers? nearly perfect. It is so simple it is nearly foolproof. It The concept of the cloud can be daunting to non- fills a definite need and requires no training. It allows techies even today, after a year or two of hype. Asking users to download free software and then upload, free what cloud computing is can lead to all but meaning- of charge, up to two gigabytes of data to its Internet- less techno-babble answers laced with irrelevant in- based servers; data can then be accessed on any de- dustry statistics. That surely does not help the typical vice from anywhere, with the user needing only a lawyer grasp what’s so different about the cloud, what password. For example, I could upload a letter I wrote it all may mean to the everyday practice of law, and in MSWord™ and then download it to my iPhone™. I why it is all happening now. can upload the letter with the simplicity of “drag and Here’s the answer: Everything you’re doing to- drop”—simply moving the file on the screen day that is digital can be made instantly and nearly of my device.
    [Show full text]