IBM’s WATSON

Have you heard of the IBM’s WATSON application? WATSON is an innovative tool invented by IBM to analyze a high volume of data and operates more like a human than a computer. Recently, it was announced the next goal for Watson is to teach third grade Math, meeting the needs of the students and the third grade teachers. Click here to learn more.

Submitted By: Chibuzo Anaeto

Any sufficiently advanced technology is equivalent to magic. – Arthur C. Clarke

Posted in Technology | Tagged , , , , , | Comments Off on IBM’s WATSON

Technology and Finance

The finance industry has been almost completely transformed due to the developments of technology and computing power over the past couple decades. With a large portion of analysis and trading done on the internet, more people can participate in investment opportunities than ever before. Technology makes the world of finance both more accessible and also much more volatile. With so much information being spread so quickly on a global scale, panic may spread quicker and may lead to unwarranted economic crisis. The introduction of the internet into finance also makes the field much more competitive because it is easier for more people to get involved, thus creating more competition. Here are a couple links to learn more about finance and several things to consider about moving into a executive role in the industry.

Submitted By: Conor Sullivan

 “An investment in knowledge pays the best interest.” – Benjamin Franklin

Posted in Technology | Tagged , , , | Comments Off on Technology and Finance

CME Business Analytics Lab

Are you a Finance major? Or interested in learning more about investing and markets? Have you had a chance to check out the CME Business Analytics Lab on the 3rd floor of the new Schreiber Center? Check online to see when the lab is available – and you will be able to walk right in and use the equipment for free. The Bloomberg terminals are available to all students. Once logged into the terminal, there are a number of free online courses and certifications you can receive – which normally cost hundreds of dollars online – plus it’s a great resume builder.

Submitted By: Conor Sullivan

The best way to predict the future is to invent it – Alan Kay

Posted in Technology | Tagged , , , , | Comments Off on CME Business Analytics Lab

Peer-2-Peer

BitTorrent, uTorrent, Pando, Transmission, what’s it all about? Though it has its uses, peer-to-peer (P2P) file sharing is not allowed on any of Loyola’s WiFi networks. Because of this, programs such as the ones listed previously will interfere with your WiFi connection while on the Loyola campus.

he best way to prevent these problems from occurring is to remove any and all P2P programs from your machine before bringing it on campus. Though it’s not allowed on campus, P2P file sharing isn’t necessarily illegal. Contrary to popular belief, there are more uses for P2P sharing than simply downloading music, videos, and games. In fact, it is completely within your rights to share these kinds of files and it only becomes illegal when you share copyrighted material (music, movies, programs, games, TV shows, etc).
That being said, even when being used for legal purposes, you must be careful using P2P sharing networks.

There is often a lot of risk associated with P2P sharing and not just because of downloading copyrighted material; it is all too easy for an individual to share a malicious file disguised as something legitimate. When this happens, you are willingly giving someone else access to your machine, files, and other personal information.
For more information about P2P file sharing and copyright law check out the following links: http://www.luc.edu/its/itspoliciesguidelines/Policy_p2p.shtml and http://www.copyright.gov/title17/ http://www.computerhope.com/issues/ch001042.htm

For more information about P2P file sharing and copyright law check out the following links:

http://www.luc.edu/its/itspoliciesguidelines/Policy_p2p.shtml http://www.copyright.gov/title17/
http://www.computerhope.com/issues/ch001042.htm

Submitted By: Ian Cassidy

Love what you do and do what you love. Doing something new and different requires a level of drive and passion that is really hard to fake. When your heart is behind what you are doing, so much is possible.” – Tracy Sun

Posted in Technology | Tagged , , , | Comments Off on Peer-2-Peer

Social Media Safety

We live in an increasingly interconnected world. In order to keep up with the happenings of the world, our friends, and our families, we have multiple social media accounts- Twitter, Facebook, Instagram, LinkedIn, etc. However, you don’t want everyone to be able to view your posts.

For one, it can be a major security risk. Websites like Facebook often track and share your location when you post information to keep your friends updated with where and what you’re doing. If this information gets into the wrong hands, however, your personal safety may be at risk, especially if everyone can view your information. However, you can manage who sees what you post on various sites, including Facebook (via Settings -> Privacy).

Alternatively, Twitter could be considered ahead of Facebook’s privacy settings by having an all or nothing privacy approach – you either have your Twitter account public or private. LinkedIn allows you to benefit more from having a public account so prospective employers can view what you’ve achieved and who you know. But keep your personal accounts where you share memes, photos, posts, etc., private for your own security. For more information on online safety.

Submitted by: Julia McCauley

The most important thing about a technology is how it changes people- Jaron Lanier

Posted in Technology | Tagged , , , | Comments Off on Social Media Safety

Need Tech Support? A Few Helpful Tips…

Try troubleshooting

Turning your device on and off, closing/reopening an application or double-checking cable connections may solve the problem. Or, try deleting the temporary files  associated with your recent activity. Chances are, if you’re having a problem with your technology, others have had similar issues if not the same issue. There are a plethora of resources available on the web that may help you resolve your issue.

Google pro tip: When you enter the problem into Google add ‘resolved’ at the end of your search so your search is limited only to results that have been resolved.

Report Troubleshooting steps

If trouble shooting steps don’t work and you contact technical support, share your troubleshooting steps, including error messages you may have received and this can help a technician diagnose the problem and provide an appropriate resolution. For example, when you try x, does the problem happen every single time. If browser related, does the problem occur in multiple browsers? For example, java may be required to view webpage content and browsers like Google Chrome – no longer supports Java plugins and applets in which case Chrome might not be the browser for your particular task. Nevertheless, make sure that you record information and provide it to the technician so they can customize your tech support experience and solve the problem.

Have a positive mindset

Computers are a great tool used to complete numerous tasks.  Most of the time the issue is caused by a setting that was switched and the fix is really as simple as exploring the Options/Settings portion of your computer, application, or browser and configuring the settings to your liking.

Submitted By: Bill Christides

The number one benefit of information technology is that it empowers people to do what they want to do. It lets people be creative. It lets people be productive. It lets people learn things they didn’t think they could learn before, and so in a sense it is all about potential. – Steve Ballmer

Posted in Technology | Tagged , , | Comments Off on Need Tech Support? A Few Helpful Tips…

LUC Rambler Tech Checkout

Loyola Ramblers – are you looking to check out technology equipment for course or project work? Some one of the many resources include adapters/cables, analog/digital converters, audio mixers and laptops. Checkout an exhaustive list here.

Submitted By: Bill Christides

“It’s still magic even if you know how it’s done.” ― Terry Pratchett

Posted in Technology | Tagged , | Comments Off on LUC Rambler Tech Checkout

Computer Science

The field of computer science is rapidly evolving to meet the changing demands of consumers and technology companies. Programmers are expected to be proficient in one or more programming languages to secure a job. Learning programming languages can be challenging and time-consuming, and there is no clear consensus on which languages should be included in an undergraduate curriculum; as such, it is only natural for a student to wonder which language(s) they should dedicate their time to learning.

For example, the PopularitY of Programming Language index– available on GitHub – tracks popularity based on the volume of Google searches on each language. Java is currently ranked #1 on the PYPL, with Python as #2. A variety of other languages, including PHP, Javascript, and variants of C, make up the rest of the top 10 spots on the list. Websites such as LinkedIn and eBay are primarily written in Java, whereas Sites like YouTube, Dropbox, and Reddit are structured around Python.  Additionally, the growing number of sites utilizing Python explains the sudden jump in Google searches on the language — PYPL shows an increase of 2.4% over the past year.

For students who are not well-versed in any programming languages, the best thing to do is start somewhere. Although the variety of programming languages can be overwhelming, many of the same principles and techniques are cross-applicable, such as the value placed on efficiency and the practice of consistently naming variables. After learning your first language, you will find the process of learning subsequent languages significantly easier, and you can be on your way to a dynamic and engaging career in computer science.

Submitted By: Max Dabek

We may encounter many defeats but we must not be defeated – Maya Angelou

Posted in Technology | Tagged , , , , | Comments Off on Computer Science

Public Wi-Fi: Convenience over Security?

It is an undeniable fact internet access is an essential requirement for our society and has a direct impact on the level of productivity in our day-to-day operations. Whether we respond to email via a laptop at a café or checking grades on our smartphone, the availability of “free” (AKA open) Wi-Fi connections may seem like a great convenience.

However, consumers must be cautious when using open Wi-Fi networks as such a network can be a perfect platform for malicious hackers to steal your information and wreak havoc on your device. Many times, open Wi-Fi networks are generally unencrypted, allowing for anyone on the network to view your internet traffic with quite ease. Even with an encrypted network requesting a passphrase, users can still be susceptible to “man-in-the-middle” attacks. In this type of attack, the malicious hacker positions themselves between your device and the network in order to quite literally gain access to all of your traffic. One can imagine the potential damage if someone was, say, banking online. This is only one method of a myriad avenues of attacks but there are definitely ways a consumer can protect themselves:

  1. Use a Virtual Private Network (VPN) service: many paid and free services do a solid job of protecting your traffic while on A public Wi-Fi network via an encrypted connection or “VPN tunnel.”
  2. Say no to sharing: some smartphone apps automatically transfer data in the background so be sure to have those setting turned off when using public Wi-Fi.
  3. Don’t access any accounts containing sensitive information (i.e. bank accounts) when connected to a public Wi-Fi network. Additionally, confirm the open Wi-Fi network you’re trying to connect to has the correct SSID / network name from the provider of the Wi-Fi. Many times, malicious hackers set up Wi-Fi networks to mimic “safe” networks in order to get your device in their hands.

Submitted By: DJ Derda

A good teacher can inspire hope, ignite the imagination, and instill a love of learning
– Brad Henry

Posted in Technology | Tagged , , , , | Comments Off on Public Wi-Fi: Convenience over Security?

Loyola University Chicago’s Technology Resources

As we prepare for the upcoming academic year, one of the first things we do as students, faculty and staff includes checking into the technologies needed to successfully complete our jobs in the workplace and classroom. The prep ranges from tools used to complete academic research, professional services and/or personal tech savvy development. Take a look at the ITS’ website to learn more about technologies offered at Loyola and see how various software applications and/or services can help you.

Longevity means we have to evolve, that we have to change and be able to change – Wolfgang Puck

Posted in Technology | Tagged , , , , , | Comments Off on Loyola University Chicago’s Technology Resources