...
…
continue reading
Talking about life and answering questions from my social media and helping with babysitting questions
…
continue reading
Excelsior Life: Distance EDU on Demand is an academic podcast series exploring a variety of education, business, and technology topics. Individual shows include ‘Excelsior LIVE,’ an interview series, and ‘Today in Cybersecurity,’ a daily podcast show airing each October during National Cybersecurity Month.
…
continue reading
Hihu
…
continue reading
Gege
…
continue reading
Lilu
…
continue reading
Nini
…
continue reading
Lolo
…
continue reading
Koki
…
continue reading
Mimi
…
continue reading
Yoyo
…
continue reading
Huhu
…
continue reading
Kiki
…
continue reading
Uiui
…
continue reading
Kiki
…
continue reading
Moko
…
continue reading
Juju
…
continue reading
Lili
…
continue reading
Gugu
…
continue reading
Kiki
…
continue reading
Koko
…
continue reading
Oioi
…
continue reading
Nini
…
continue reading
...
…
continue reading
...
…
continue reading
1
Babysitting tip for young babysitters
9:37
9:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
9:37
I talked about a book called “ The Babysitting Survival Guide” by Jill D. Chasse, PHD. I tell you tip that you will need to keep kids safe and keep them entertained
…
continue reading
Just tell you about my life and more
…
continue reading
1
Excelsior LIVE: Ethics of Using Games
8:01
8:01
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
8:01
Karen Schrier is an Assistant Professor of Media Arts at Marist College and Director of the Games and Emerging Media program. She joins the podcast to discuss some of the ethical issues around the use of games in education.Oleh Mike Lesczinski
…
continue reading
1
Excelsior LIVE: Tina Goodyear on the need for alternative education quality assurance
7:31
7:31
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:31
Tina Goodyear, , joins the podcast to discuss recent efforts exploring the need for a quality assurance entity (QAE) for alternative education providers, such as coding bootcamps. The project, led by the Presidents’ Forum and Distance Education Accreditation Commission (DEAC), is being funded by a $150,000 planning grant from USA Funds. Resources…
…
continue reading
1
Excelsior LIVE: Nick Fortugno on storytelling for learning
13:32
13:32
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
13:32
Nick Fortugno is recognized around the world as a leading game designer, narrative and story expert as well as an entrepreneur of digital and real-world games. The chief creative officer of Playmatics joins the podcast to discuss his upcoming presentation at Revolutionary Learning 2016: Storytelling for Learning. Resources…
…
continue reading
1
Excelsior LIVE: Clark Aldrich on teaching and learning via short simulations
16:07
16:07
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
16:07
Clark Aldrich, one of the top educational simulation designers in the world and the founder and Managing Partner of Clark Aldrich Designs, joins the podcast to discuss the game changing nature of short simulations as an educational tool.Oleh Mike Lesczinski
…
continue reading
1
Excelsior LIVE: Tina Goodyear on “The Case for CACE”
11:05
11:05
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
11:05
Tina Goodyear, COO of the Presidents’ Forum, joins Excelsior Live to discuss the new Consortium for the Assessment of College Equivalency, which brings together six institutions with expertise in Prior Learning Assessment and allows them to collaborate, pool their resources, and set common standards that could drastically improve how all of higher …
…
continue reading
1
Excelsior LIVE: Avery Rueb on good game design
7:06
7:06
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:06
In part two of the interview with the co-founders of Affordance Studio, Avery Rueb, discusses his Revoluionary Learning 2016 presentation: Brainstorm Cards: Playing a Card Game to Learn about Good Game Design.Oleh Mike Lesczinski
…
continue reading
1
Excelsior LIVE: Pascal Nataf and Avery Rueb on teaching academics to think like game designers
22:37
22:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
22:37
Pascal Nataf, co-founder of Affordance Studio, a serious game company based in Montreal and a Quebec Entrepreneur of the Year finalist joins Excelsior LIVE to discuss all things educational gaming. In part two of the interview, Avery Rueb, Affordance Studio’s other co-founder, joins the podcast to discuss his upcoming Revolutionary Learning 2016 pr…
…
continue reading
1
Excelsior LIVE: Dorcey Applyrs on public health and economic development
6:22
6:22
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:22
Dorcey Applyrs, DrPH, MPH, faculty program director forExcelsior College, discusses the reciprocal relationship betweenpublic health and economic development.Oleh Mike Lesczinski
…
continue reading
1
Excelsior LIVE: Braddock on Excelsior College Student Success Center
8:28
8:28
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
8:28
In this audio-only version of this Excelsior LIVE broadcast, Glenn Braddock, PhD, executive director of the new , discusses the new initiative, the differences between academic coaches and academic advisors, and the need for more personalized student support across all of higher education.Oleh Mike Lesczinski
…
continue reading
1
Excelsior LIVE: Andrew Hurd on cybersecurity workforce development
5:42
5:42
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
5:42
faculty program director for cybersecurity at Excelsior College, discusses the NSA Day of Cyber, what drew him to Excelsior and distance education, and why so many employers are struggling to both build an educated and adaptable cyber workforce and create an informed cyber culture.Oleh Mike Lesczinski
…
continue reading
1
Today in Cybersecurity: Virtualization Security
6:57
6:57
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:57
Once an organization begins employing virtualization, they become less secure unless they utilize fault tolerance to keep things running in the event of the loss of a physical server running multiple virtual machines. of the National Cybersecurity Institute explains.Oleh Mike Lesczinski
…
continue reading
1
Today in Cybersecurity: Insider versus Outsider Threats
6:41
6:41
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:41
Threats come from inside through employees or vendors, and from the outside through hackers or infected websites. Both types of threats should be considered and policies and procedures developed for each threat. of the National Cybersecurity Institute explains.Oleh Mike Lesczinski
…
continue reading
1
Today in Cybersecurity: Physical Security
7:16
7:16
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:16
Physical security has to do with all aspects of making sure that information systems are protected from anything in their physical environment. of the National Cybersecurity Institute explains.Oleh Mike Lesczinski
…
continue reading
A honeypot is a computer on a network that is deliberately vulnerable, in order to lure attackers away from other more critical systems. This keeps the attacker busy giving attention to a systems that has no real information on it. of the National Cybersecurity Institute explains.Oleh Mike Lesczinski
…
continue reading
1
Today in Cybersecurity: Separation of Duties
6:25
6:25
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:25
Separation of duties, together with the principle of least privilege, are two important areas to address in order to reduce or eliminate fraud and protect the organization. One individual should not perform multiple duties, to prevent the possibility of improper actions. of the National Cybersecurity Institute explains.…
…
continue reading
1
Today in Cybersecurity: The Principle of Least Privilege
6:34
6:34
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:34
An individual should only be given the least amount of privilege necessary to do their job. Granting more access than is necessary can lead to unnecessary security violations. of the National Cybersecurity Institute explains.Oleh Mike Lesczinski
…
continue reading
1
Today in Cybersecurity: Access Control
6:29
6:29
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:29
Access control is applied to packets on a network, connections between computers, and users and their ability to access files and folders on company systems. Controlling access is essential to security in keeping information out of the wrong hands. of the National Cybersecurity Institute explains.Oleh Mike Lesczinski
…
continue reading
What is the cloud? Where is it located? How is our data protected while in the cloud? What happens when there is a problem within the cloud provider? Why is it important to read the cloud license agreement? of the National Cybersecurity Institute explains.Oleh Mike Lesczinski
…
continue reading
1
Today in Cybersecurity: Penetration Testing
7:37
7:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:37
Penetration testing is a process in which we try to infiltrate computers or devices on a network from the outside or the inside, typically using a black box test or a white box test. of the National Cybersecurity Institute explains.Oleh Mike Lesczinski
…
continue reading
1
Today in Cybersecurity: Baselining
6:48
6:48
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:48
Baselining is a technique we use to enhance our security and alert us that something is not right and may need further investigation. Any behavior that does not fit the baseline should be considered suspicious until it is examined. of the National Cybersecurity Institute explains.Oleh Mike Lesczinski
…
continue reading
1
Today in Cybersecurity: Disaster Recovery and Business Continuity
6:37
6:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:37
Disaster recovery is part of business continuity, and is concerned with getting essential services for the organization up and running as fast as possible after a disaster. Business continuity is concerned with the long-term health and growth of the company. of the National Cybersecurity Institute explains.…
…
continue reading
Passwords are the single most common thing we use to authenticate ourselves to a computer system. But it is surprising how little care people use in choosing and managing their passwords. of the National Cybersecurity Institute explains.Oleh Mike Lesczinski
…
continue reading
1
Today in Cybersecurity: Zero-day Attacks
6:18
6:18
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:18
A zero-day attack is a malware attack that is so new it is not recognized by signature-based anti-virus software, and is therefore able to infect a system without detection. of the National Cybersecurity Institute explains.Oleh Mike Lesczinski
…
continue reading
1
Today in Cybersecurity: Computer Forensics
6:48
6:48
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:48
Computer forensics is a set of processes used to acquire and analyze digital evidence. This is useful in determining how malware entered a system and also for proving or disproving that information of a certain form exists or does not exist on a system. of the National Cybersecurity Institute explains.…
…
continue reading
1
Today in Cybersecurity: Risk Assessment
6:55
6:55
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:55
A risk assessment is used to identify assets within an organization, determine the threats to those assets, evaluate the probabilities of the asset being compromised, the impact to the organization, and a plan to mitigate or eliminate the risks. of the National Cybersecurity Institute explains.Oleh Mike Lesczinski
…
continue reading
1
Today in Cybersecurity: Encryption
6:47
6:47
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:47
Encryption is a process where we take information that is readable and make it unreadable. Symmetric encryption uses one key to encrypt and decrypt. Asymmetric encryption uses two keys: one key to encrypt and a second key to decrypt. of the National Cybersecurity Institute explains.Oleh Mike Lesczinski
…
continue reading