This document discusses graph data science and Neo4j's capabilities. It describes how Neo4j can help simplify graph data science through its native graph database, graph data science library, and data visualization tool. Example use cases are also provided that demonstrate how Neo4j has helped companies with fraud detection, customer journey analysis, supply chain management, and patient outcomes.
The Data Platform for Today's Intelligent Applications.pdfNeo4j
Do you know how graph technology is used in today’s data-driven applications? We’ll get you up to speed and introduce you to the Neo4j product portfolio.
Pilot Study of Apply Education AI Virtual Assistant in Groups’Wisdom Created and Shared Ecosystem—A Case Study on Education Learning as a Service(ELaaS)with mFHC Bank.
Full Paper Download,http://bit.ly/2DExgrh
---
張大明 育睿科技 執行長
[email protected]
羅志傑 育睿科技 教務長
[email protected]
王詩帆 優睿亞科技 教學設計總監
[email protected]
淡江大學守謙國際會議中心—2019學術研討會:AI在教育科技的應用與實踐。淡水校園。
Full paper-
https://www.researchgate.net/publication/332727759_Pilot_Study_of_Apply_Education_AI_Virtual_Assistant_in_Groups'Wisdom_Created_and_Shared_Ecosystem-A_Case_Study_on_Education_Learning_as_a_ServiceELaaSwith_mFHC_Bank
翻轉學習的四大基礎— Four Pillars:F . L . I . P
Flexible Environments(彈性的學習環境)
Learning Culture(不同的學習文化)
Intentional Content(更明確的內容)
Professional Educators(更專業的教師)
-----------------------------
能仁家商翻轉教育講座
The document discusses Ivan's experience and qualifications in SEO and WordPress, including 18 years of experience, building 50 sites for testing, handling over 400 WordPress projects, and leading various meetup groups. It also provides information on becoming a client for Ivan's consulting and training services. The document serves as an introduction and overview of Ivan's background and available services.
This document discusses various types of AI, including text-to-text, text-to-image, text-to-speech, and text-to-video. It provides biographical information about Ivan So and his experience in SEO, WordPress, and organizing events. The document also lists client services such as consulting and training. It includes sections on what AI is and examples of different AI applications. Generative AI and parameters in AI are explained. Popular AI models like GPT-3 and techniques like GANs are mentioned.
Ad
More Related Content
Similar to How Blockchain affecting us - Dr Sin.pdf (20)
翻轉學習的四大基礎— Four Pillars:F . L . I . P
Flexible Environments(彈性的學習環境)
Learning Culture(不同的學習文化)
Intentional Content(更明確的內容)
Professional Educators(更專業的教師)
-----------------------------
能仁家商翻轉教育講座
The document discusses Ivan's experience and qualifications in SEO and WordPress, including 18 years of experience, building 50 sites for testing, handling over 400 WordPress projects, and leading various meetup groups. It also provides information on becoming a client for Ivan's consulting and training services. The document serves as an introduction and overview of Ivan's background and available services.
This document discusses various types of AI, including text-to-text, text-to-image, text-to-speech, and text-to-video. It provides biographical information about Ivan So and his experience in SEO, WordPress, and organizing events. The document also lists client services such as consulting and training. It includes sections on what AI is and examples of different AI applications. Generative AI and parameters in AI are explained. Popular AI models like GPT-3 and techniques like GANs are mentioned.
Inspire@eLC Chapter 4 - How Data Analytics Transforming Digital Marketing on 7 October 2022 by Mr. Ralph Szeto, Chairman, Hong Kong Association of Interactive Marketing
Inspire@eLC Chapter 4 - How Data Analytics Transforming Digital Marketing on 7 October 2022 by Mr. Saron Leung, Industry Head of Financial Services, Google Hong Kong
Inspire@eLC Chapter 3 - HKTVMall: Leading Technology Evolution for eCommerce Industry by Ms. Jelly Zhou, Executive Director and Chief Executive Officer (Hong Kong) of Hong Kong Technology Venture Company Limited
Digital Oasis is a Hong Kong-based technology company that specializes in innovative electronic products using patented material sound and conduction technologies. They design and manufacture thin, light audio devices that can play sound through materials like metal and can be painted with customizable designs. Their products include smart home speakers and sound wall panels for home theaters that combine audio and decorative art.
This document discusses the interaction between cyber security and school IT policy. It outlines various IT systems, applications, and devices used in schools, such as servers, networks, cloud services, and devices. It stresses the importance of having proper IT policies to govern operation, systems and applications, control, security, and management. The document provides examples of key policies including acceptable use, network, data protection, backup, email, and disaster recovery policies. It also discusses guidelines and rules around issues like passwords, verification, training, manuals, and applications. Finally, it provides tips for effective policy making like understanding needs, problems, requirements, training users, and ongoing evaluation.
This document summarizes the results of a vulnerability assessment performed on the networks of 6 schools by HKT. It found that around 25% of systems had web services, with an average risk score of 54 and scores ranging from 20 to 78. Manual review found that 33% of vulnerabilities were high or critical risks. Common high risk issues included SQL injection, cross-site scripting, and outdated software with known vulnerabilities. The document discusses ongoing challenges in security management like complexity, recruitment, and funding. It proposes a security-centric approach with centralized monitoring, automation, and remote support provided by a managed security service partner.
This document summarizes a presentation about assessing and managing school network security. It discusses the results of vulnerability assessments conducted on 50 school websites, which found over 110 critical vulnerabilities. The top issues were SQL injection, cross-site scripting, and outdated components. Managing security is challenging due to increasing systems, data, and user touchpoints. Trends include taking a security-centric approach across the network and adopting comprehensive managed security services. Key aspects of security management are people, technology, process and having a security operations center for monitoring, alerting and incident response.
This document summarizes cybersecurity trends and tips for 2020. It discusses the top passwords used, guidelines for strong passwords, and major cybersecurity incidents in 2019 such as data breaches affecting over 500 million records. It also provides tips on protecting against phishing attacks, risks of IoT devices, and ransomware. Emerging issues like deepfakes and security risks after technologies reach end of support are mentioned. The key message is that information security requires efforts from all stakeholders.
The document discusses security challenges and prevention measures for schools. It summarizes findings from a UK cyber security audit of 432 schools, which found that 83% experienced cyber incidents. While most schools had antivirus and firewalls, only 45% included IT services in risk assessments. The document also outlines common attacks schools face like phishing, ransomware, and data breaches. It provides prevention tips and emphasizes the importance of a holistic security approach involving people, processes, and technology.
The document summarizes the findings of a penetration test project conducted on the websites and applications of over 30 schools. It identifies over 240 critical vulnerabilities across the schools, including exposed personal data, outdated software with known vulnerabilities, and SQL injection issues. Recommendations include encouraging software vendors to provide ongoing patches, implementing regular vulnerability scanning, and ensuring systems and software are regularly updated to the latest versions. Best practices for schools outlined in the document include implementing firewalls, regular backups, web application firewalls, and security awareness training for practitioners.
As an independent security consultant, the author conducted penetration tests of ten K-12 school websites over 99 hours. They found over 1,700 vulnerabilities total, including 170 critical issues exposing over 20,000 student records. Common vulnerabilities included SQL injection, outdated systems, and unencrypted passwords. The author provided demonstrations of their scanning tools and process and recommendations to schools like regular scanning, patching systems, and relying less on vulnerable third-party vendor solutions.
《美国DKU毕业证》95270640微信高仿西雅图华盛顿大学假毕业证成绩单认证, 本科UW假文凭, 硕士UW毕业证书, 研究生UW学士学位证, 伪造西雅图华盛顿大学毕业证成绩单做学历认证可以吗?Buy Fake University of Washington Diploma Degree Transcript
《美国DKU毕业证》95270640微信高仿加利福尼亚大学圣迭戈分校假毕业证成绩单认证, 本科UCSD假文凭, 硕士UCSD毕业证书, 研究生UCSD学士学位证, 伪造加利福尼亚大学圣迭戈分校毕业证成绩单做学历认证可以吗?Buy Fake University of California, San Diego Diploma Degree Transcript
《美国DKU毕业证》95270640微信高仿加州理工学院假毕业证成绩单认证, 本科Caltech假文凭, 硕士Caltech毕业证书, 研究生Caltech学士学位证, 伪造加州理工学院毕业证成绩单做学历认证可以吗?Buy Fake California Institute of Technology Diploma Degree Transcript
學習愛的語言--五種愛之語。Learn the five love languages.ssusere30c90
Ad
How Blockchain affecting us - Dr Sin.pdf
1. NFT (非同質[值]化代幣 Non-Fungible Token) 是區塊鏈上的加密代幣,既是數碼資產,又是代幣化的現實世界資產。
它常被應用在藝術品、音樂、虛擬收藏品、圖檔、視頻檔等,讓大家可以於網上交易平台進行交易。
希望透過分享,令參加者更能夠了解 NFT 的具體概念,啟發教育工作者更好地培養我們相應學科的年輕人才。
Charleston Sin PhD
Executive Director
You don’t have to agree with me. Just my views.
4. 2009
1991
A cryptographically secured chain of blocks is
described for the first time
by Stuart Haber and W Scott Stornetta
Nakamoto implements the first blockchain
as the public ledger for transactions made
using bitcoin
• Nakamoto “We have proposed a system for electronic transaction without relying on
trust.” 我們提出了一種不依賴信任的電子交易系統
• It eliminates certain trust intermediaries, but you have to somehow trust Bitcoin, he noted.
他指出,它消除了某些信任中介,但你必須以某種方式信任比特幣
• Generally speaking, the Bitcoin system changes the nature of trust.一般來說,比特幣系統
改變了信任的性質
https://www.linuxfoundation.org/en/blog/how-blockchain-changes-the-nature-of-trust/
如何為數字文檔添加時間戳 比特幣:點對點電子現金系統
Blockchain
8. NFT – Minting Process 鑄造
u NFTs are created by artists, designers or license holders through a process referred to as “minting.” Minting involves signing a
blockchain transaction that provides the specifics or outline of the fundamental token details. NFTs can take various forms whether it
is a photo, video, or even a GIF. The information is then sent to the blockchain to trigger a smart contract function which creates the
token and assigns it to its owner. Each NFT has a unique identifier which is then stored on the blockchain. Once it is on the blockchain,
it sets the authenticity and the ownership.
• NFT 由藝術家、設計師或許可證持有者通過稱為“鑄造”的過程創建。
• 鑄幣涉及簽署區塊鏈交易,該交易提供基本代幣細節的細節或大綱。
• NFT 可以採取多種形式,無論是照片、視頻,甚至是 GIF。
• 然後將信息發送到區塊鏈以觸發智能合約功能,該功能創建代幣並將其分配給其所有者。
• 每個 NFT 都有一個唯一的標識符,然後存儲在區塊鏈上。一旦它在區塊鏈上,它就會設
置真實性和所有權。
https://www.gettingsmart.com/2022/02/18/nft-in-edu-what-does-the-future-hold/
9. NFT Fundamentals
Asset
Voucher
Certificate
What exactly is NFT?
Digital native assets
Art, Collectables, Music,
Video, In-game items, etc.
Representation of another
asset
Voucher for title of Real-life
assets, or even digital native
assets;
A proof of status
Membership, attestation,
credentials;
each NFT is a unique digital file (or token) that lives on the blockchain
such file (or token) may represent:
10. NFT Fundamentals | NFT Content
Centralized Storages Location-addressed
Personal
Decentralized Storage
Content-addressed
Business
NFT is stored
On-chain
file and metadata is stored
Off-chain
Mint
the NFT point to a
storage location
NFT is nothing more than an index on the blockchain
Content represented by the NFT is stored in an off-chain
storage location
NFT is permanent, but its content may not exist forever
NFT content
11. NFT Fundamentals | NFT Content | IPFS
NFT is stored
On-chain
Mint
NFT content
NFT content hashing hash value equal content address
IPFS Network
IPFS Pinning Services
IPFS Pinning Service provider is responsible to pin the NFT content file to
ensure they will NOT be erased during the Garbage collection process
to provide a permanent location/address of the file
to ensure permanence of the file
once a file is stored on IPFS
it cannot be changed
40. 1. How we share student artwork
This is the obvious one I guess but it really will change the world of student art – as
evidenced by Yasmeen’s success alone. Schools (and students themselves) now have the
ability to sell their digital art as NFTs to a global audience that is eager to support new
artists and content creators. Not only does this empower young content creators, but it
can help them develop entrepreneurial skills and build and understanding of marketing,
PR and cryptocurrency. It’s also worth bearing in mind that an NFT can take many forms,
including music – this is not just a space for the Art Department
2. How we store and share student records
Blockchain means that documents can be stored, and changes tracked with ease... No
more loss or information or waiting for data. It’s there and it’s accessible.
3. Exam results and other achievements
Storing official certifications on chain is not only inevitable, it’s essential
3 Ways NFTs will Disrupt the Education Sector
https://www.gesseducation.com/gess-talks/articles/3-ways-nfts-will-disrupt-the-education-sector
Education
41. https://www.gettingsmart.com/2022/02/18/nft-in-edu-what-does-the-future-hold/
When a student or teacher does well, to make it memorable, the
academic sector can now create and design an NFT. The use of NFTs as
diplomas and resumes could help better track and access what
students have earned throughout their school careers. By using NFTs,
it serves to stop students from falsifying their academic certifications
because the token serves as a permanent, unchangeable and unique
“transcript.”
Preply, a global language learning platform founded in 2012, minted
three NFTs on Open Sea as a way to reward tutors in 2021. Amy
Pritchett, the Student Success Manager of Preply says: “We wanted to
experiment with NFTs as a way to reward Preply tutors and the great
education they provide our students. Once you have one of these
tokens you can keep it or sell them. Pritchett added some ideas for
using NFTs such as creating online ‘trophy cases’ of their NFTs as
artifacts or perhaps creating digital portfolios, which can be shared
with prospective employers or even college admissions. Teachers can
also issue NFTs to represent when students successfully demonstrate
learning the class material. Pritchett added, “We are only starting to
see the beginning of how NFTs and education can come together. They
are an emerging trend that we all continue to be curious about.”
Education
Incentive or Rewards to
Students, Teachers, & Tutors
Igor Dyachenko, co-Founder & CEO
Studyum, a blockchain-built education
platform for students and educators that
actually incentivizes learning by using NFTs
as reward payments for studying.
Learn-to-Earn
42. Education
NFTs for Education are useful for school cluster-wide or territory-wide
applications as they inherit the digital trust from the underlying blockchain.
These tokens are stored in the owner's wallets and can be produced when
requested with the owner's consent. NFTs are tied to digital artworks, so they
can act as the digital copy of the physical object, such as membership card.
Applications include:
• Certificate issuance and authenticity check
• Achievement badges (academical, extra curricular such as scout proficiency
badges, sports medals)
• Membership cards (school, cluster, library, organisation)
• Course credits
• Academic records (grades, achievements, transcripts)
• Education contents (course, textbook, references, quiz/tests/exams, can be
traded to encourage creativity, excellence and sharing)
• Artwork
Source: Dr Eddie Hui
43. “This is MIT’s way of saying that it is only
through the combination of thought and
practical action that we will be able to
solve current and future problems. It is
only through the application (hand) of
theory (mind) that we will be able to make
real change and make a real difference.”
The MIT Secret Sauce Education
44. The old view of education, Sarma says, saw students’ minds as pieces of paper, and the teacher’s job
was essentially to write information on that paper. That’s all wrong, he says. “The student is building
a model of the world, like a plant growing. What you need to do is tend to that plant.”
已有的教育觀將學生的思想視為一張白紙,而老師的工作本質上就是
在紙上寫下信息。他說,那都是錯的。 “學生正在建立一個世界模型,
就像植物生長一樣。你需要做的就是照料那株植物。”
45. CoolThink continues to support CT education policy
45
EDB finalized CT and coding education
supplemental document and recommended CT
education for all primary schools in July 2020
Education
49. • Learning is easy. You just need the right tools and strategies.
• If you can find meaning in your study, your learning is going to get
better, fast. 如果你能在學習中找到意義,你的學習就會變得更好、
更快。
• You’ll need to set small, specific goals to master a skill, but first you’ll
want to be sure of the basics.
• When it comes to learning, the importance of feedback can’t be
overemphasized.
• You can improve your learning by immersing yourself in your field and
making things visual. 您可以通過沉浸在您的領域中並使事物可視化
來提高您的學習能力。
• Understanding relationships between concepts and practicing different
approaches to a skill makes for better learning.了解概念之間的關係並
練習不同的技能方法有助於更好地學習。
• We can eliminate overconfidence by reviewing our knowledge.
Education
50. Digital Literacy Pathway
數字素養學習途徑
• Computational
Thinking
• Team Action Learning
with real challenges
C
u
r
r
i
c
u
l
a
r
B
a
s
e
d • AI Programming with Python
• Creativity Mindset
• Experiments
• AI Ethic
E
x
t
r
a
-
C
u
r
r
i
c
u
l
a
r
B
a
s
e
d
• Entrepreneurship
• Innovation
• Project Based Learning
• Action Learning