A new vision for virtual meetings

With everything factored in - the loss of productivity while people travel to and fro, the travel costs, refreshments, incidental expenses and possibly overnight accommodation - it really mounts up. Rethinking videoconferencing Over the years there have been lots of studies trying to identify an average hourly cost per person per meeting, but – in spite of the scary figures... >>

Mark O'Leary

Technology-enhanced learning for efficiencies and enhancement

First published on the Efficiency Exchange blog . ‘Efficiency’ is a term which is still regarded with some suspicion by many people working in learning and teaching within higher education, due to its association with cost-cutting and a perceived trade-off with quality. 'Efficiency' is a term which is still regarded with some suspicion by many people However, looking at the... >>

Sarah Davies

Storing and sharing research data after the ‘Space Race’

At the storage stage, a lot of researchers in the UK have been benefiting from the extra data storage space offered by Dropbox as a part of its ‘Space Race’ promotion. By convincing colleagues and students to sign up it was possible for individuals to gain access to significantly enhanced storage space, all synchronised from local machines in the usual... >>

John  Kaye

Signed up for Networkshop43 yet?

If you’ve never been before, Networkshop is an annual, three-day event designed to give technical people working in the education and research community an opportunity to network and explore developments in advanced network services. This year, it takes place at the University of Exeter from Tuesday, 31 March until Thursday, 2 April. Just by registering you have a chance to... >>

Networkshop 42
Creative Commons attribution information
Networkshop 42
©Jisc

A shot in the ARM: Catapults give UK tech a boost

If like me you are a child of the 1970s and 80s, you probably grew up surrounded by the first wave of the tech revolution – personal computers, video games consoles, and all sorts of other home electronics. But then something went horribly wrong, and those promising ideas and the firms behind them largely disappeared. Of course what happened was... >>

CrowdEmotion demo their emotion recognition software at the Digital Catapult
Creative Commons attribution information
CrowdEmotion demo their emotion recognition software at the Digital Catapult
©Paul Clarke for the Digital Catapult
Martin Hamilton

A window on the Jisc stakeholder forum

Earlier last week, after leaving the house in Linlithgow, I headed the 15 miles to Edinburgh airport to catch the 6:50 flight into London to attend my first Jisc stakeholder forum. The day’s ambition was to engage fruitfully with Jisc’s higher education, further education and skills customers, and government The day’s ambition was to engage fruitfully with Jisc’s higher education... >>

Ken Thomson

Five steps for embedding technology use in colleges

Although not always recounted as a series of logical steps, successful transitions from a strategic approach often have five things in common: 1. A shared vision that everyone has a stake in At the start of any journey needs to be a shared commitment, and recognition of the benefits for both senior leaders and teachers - creating improved outcomes for... >>

Students with tablets
Creative Commons attribution information
©University of the Fraser Valley via Flickr

ETAG – a good Bett for UK education?

After a few weeks of frantic activity, parents were invited to school to view the children’s creations. There were models made of papier-mâché, Lego, and even shoe boxes and old loo roll holders. My daughter decided to make an entire model school in Minecraft on her iPad. Fast forward to late January 2015 and all eyes were on Bett 2015... >>

ETAG illustration
Creative Commons attribution information
ETAG illustration
©Bryan Mathers, City and Guilds
All rights reserved
Martin Hamilton

Calling all university and colleges website managers – secure your domains for the future

There’s been quite a lot of confusion about what this entails, and I want to shed some light on the situation and help operators make the transition to the new standard. Why are the changes happening? SHA-1 (Secure Hash Algorithm) is a popular cryptographic hashing function for encryption on the public web that is used in a lot of security... >>

Wall of keys
Creative Commons attribution information
©Kris Krug via Flickr
Simon Cooper

How technology-enabled data sharing could aid medical research

Researchers at the University of Leicester and University Hospitals Leicester NHS Trust are working at the forefront of such international initiatives . The issue With the rapid increase in the data available to biomedical translational researchers, the need for adaptable informatics tools to support them is now overwhelming. Currently, much of their research is not reused outside of the individual... >>

Dr Jonathan Tedds