Glide into a new wave of Video Texting

By Nikesha Harris

Unable to FaceTime, Hangout, or Snap Chat?  No problem. Whether you’re an iPhone or Android user there is a new form of video texting that complements any user with a switch view camera. This new software app called Glide.

Glide was established June 2013. It is user friendly and you start by simply opening the app. Then pick or invite the contact you would like to message and press the record button. Glide has some cool features like the ability to record a message for five minutes, replay messages, delete messages, or have group messages. And just like IG and Facebook, you can search and discover people. With apps like FaceTime and Hangouts, video calls are easily missed, but Glide allows you to play recorded video messages at your discretion.

Glide has over 10 million users running the application, so if you’re looking for a new wave of video texting, then download this fabulous software app to your phone and enjoy. Video Texting App Glide Is Going “Viral,” Now Ranked Just Ahead Of Instagram In App Store | TechCrunch

Read More >>

Cybersecurity Begins with the User

By Joshua Harkins & Tyler Blythe

Sensitive data is often compromised by cyberattacks on computers.  These attacks are often a result of malware — malicious software that attempts to gain access to a computer system with the purpose of tracking or gathering sensitive information or disrupting computer operations.  Computer viruses (payloads) and spyware are two primary types of malware. The protection of sensitive data is the responsibility of a computer user, and as such, good cybersecurity begins with the user.

In order to prevent a malware attack, the computer operating system needs to incorporate numerous safeguards to prevent personal information from being compromised.  These safeguards include:

 

For the average user, identification and authentication, encryption, and firewalls are part of a computer’s operating system.   Many computer users fail to understand the necessity of antivirus software or the need to update antivirus definitions.  These users have the false belief that installation of an antivirus program on a computer protects it against malware from that time forward.  It is a user’s responsible to verify installation and to assure maintenance, including the updating of antivirus definitions, of antivirus software.  The user should always verify the credibility of the vendor prior to purchasing and installing software.  For technical assistance the following are possible sources that a user can contact for help: computer manufacturer, operating system manufacturer, antivirus software manufacturer, and internet provider.

Additional measures a user can perform to prevent a cyber-attack include:

  • Verifying a secure site connection, https://, prior to transmitting sensitive or personal data
  • Only opening emails and email attachments from a known source
  • Maintaining operating system and antivirus software by installing authentic updates as soon as possible.

While these measures are not 100% in preventing a malware attack, it greatly reduces the possibility.  In the end, it is the user’s responsibility to be vigilant in the protection of his or her sensitive data.

References

Antivirus. (2014). Retrieved from http://www.techopedia.com/definition/5416/anti-virus-software.

Authentication. (2014). Retrieved from http://www.techopedia.com/definition/342/authentication.

Cyberattack. (2014). Retrieved from http://www.techopedia.com/definition/24748/cyberattack.

Cybersecurity. (2014). Retrieved from http://www.techopedia.com/definition/24747/cybersecurity.

Encryption. (2014). Retrieved from http://www.techopedia.com/definition/5507/encryption.

Firewall. (2014). Retrieved from http://www.techopedia.com/definition/5355/firewall.

Identification. (2014). Retrieved from http://www.techopedia.com/definition/12552/user-identification-user-id.

Kroenke, D. M.  (2014). MIS Essentials. Boston: Pearson.

Malware. (2014). Retrieved from http://www.techopedia.com/definition/4015/malicious-software-malware.

Payload. (2014). Retrieved from http://www.techopedia.com/definition/5381/payload.

Spyware. (2014). Retrieved from http://www.techopedia.com/definition/24747/cybersecurity.

Read More >>

All You Need To Do Is Speak

By Bethany LeSuer & Danielle Long

dd

Have you ever had a great idea pop into your head but you were not able to write it down? These thoughts do not always come back to you later, but now you can dictate into your smart phone by using a voice memo app.

Read More >>

The Social Revolution

By Karla Judy

III

An Egyptian man names daughter “Facebook!” Twitter usage exceeds 250,000 during the Ukrainian protests. People all around the world are using social media for more than personal networking. These days a simple tweet can start a revolution. From Arab coups, to Occupy Wall Street or the tea party movement, individuals are finding their voices and spreading information through these free tools. In the Ukraine, citizens used social media to organize protests. Ironically, police used the same media to protect the public when things became violent. Greg Satell at forbes.com. says “the playing  field has been leveled”. Before social media, large conglomerates or governments controlled communications. Now the populace has the ability to author and control more information and Governments are paying attention.

Read More >>

Free Stuff, Free Gas, Free Convenience?

By Spencer Curry & Kegan Ham

1910783_HiRes

How much do you pay for gas? It’s outrageous, right? Wouldn’t you love a solution that saves you money? Well, as cost-conscious student, we have found one at MAPCO. We are sure you’ve heard about them, but you might not realize the benefits they offer. We hope that this post will enlighten you on the subject.

Read More >>

Digital Footprint

By Bobby Smith & Kevin Keenan

digital-footprint

Let’s just take a minute and think about the countless times we use the internet each day. The reason may differ:  paying bill, social media, shopping, or reading the news.   As we do those things, we leave information about ourselves in the cyber world, this is known as a digital footprint. If you are not aware of your digital foot, you should be.

Read More >>

Fashion Meets Fitness

By Magen Bain & Sarah Murphy

MS

Have you ever thought about how much you really walk during the day versus how much you just sit around? Right now, a wearable device called the Fitbit is a great way to monitor your activity level! The Fitbit allows you to track how far you have walked and how many calories you burn. Not only does it track your activity during the day, but your calorie intake, weight, and sleep patterns as well. It also syncs automatically and wirelessly to your Apple, Android, or Windows phone. You can even keep up with your progress online or on your phone using your Fitbit app!

Read More >>

The Truth About Facebook Messenger

By Jessica Reynolds & Georgiana Lamar

Blog

Do you have the Facebook app? Most people do. Have you noticed that you can’t get messages through your app anymore? Well, there is a reason for that. Facebook is now requiring that everyone download the Facebook Messenger app which is causing quite an uproar. Huffington Post wrote an article about the app, its terms of service, and how it requests a lot of personal information. The article mentioned that the app could; send text messages, call people, record audio through the microphone, take pictures and videos, and read data about your contacts – all without your knowledge.

Read More >>

Blogging as a Class Project

By Lisa Rich

blog

How many times have your heard the word “blog”? Have you ever stopped to think about what it means? For those of you who don’t know, blog is short for web log. Blogs began as Internet spaces for online users to store lists of important websites that they wanted to revisit later, kind of like marking a page in a book that you want to reread. Over time, blogs evolved into online journals or diaries where people shared information, sometimes entirely too much information, about themselves or topics of special interest.

Read More >>

Field Trip to the Library!

By Jennifer Wolfe

???????????????????????????????

My favorite day of the year at the Athens State University Library is field trip day. Let me explain…

As a child one of my favorite things to do in the summer was to go to the Knox County Public Library’s Norwood Branch on Merchant Dr. in Knoxville, Tennessee for the summer reading program. This should have been my first clue to my future profession – a librarian.

Read More >>